diff --git a/textfiles.com/bbs/polaris.txt b/textfiles.com/bbs/polaris.txt new file mode 100644 index 00000000..2cab3f31 --- /dev/null +++ b/textfiles.com/bbs/polaris.txt @@ -0,0 +1,119 @@ +The following text was captured from POLARIS Citadel 10/30/84: + +.Help HISTORY + + ump

ause top + + This is the Polaris message system. It is running on a +kaypro 10 with a hayes 1200 modem. The name Polaris was +chosen from the computer that this bbs was originally +set up on - a Northstar Horizon with a pair of double +density floppies. (Polaris = the north star...) + The program that this system is running is called Citadel. +Citadel is a program that was conceived and written locally +at the end of 1981 by an individual who chose to use +the pseudonym "Cynbe ru Taren" - the name taken from Poul +Andersons book "Star Fox", and chosen from the plot of the +book. The creature Cynbe is an individual in a hive +culture... + Citadel was written to allow conversations to flow more +naturally, and evenly. To allow people to group the +conversations as they saw fit, and to generally make the +media more useful. The first room system in the country was +Cynbe's ODD-DATA, and it proved to be much more popular +than other systems of the time. + As he thought about the idea of the board and coded it, +Cynbe and another local, Glenn Gorman, spent a lot of +time together working out the details and polishing the +design. But they disagreed on whether a room system >could< +be written in BASIC. Cynbe thought it couldn't , Glenn +thought it could, and finally wrote the second major room +system in the area - Minibin. + ODD-DATA lasted almost six months, before a hardware +failure forced it offline, much to the dismay of it's +userbase. Glenn's system became the only room system in +the area, and it thrived. After a short interval, David +Mitchell, another local, heard of a bulletin board written +in C, and was intrigued. So much so that he convinced Rich + Knox and Jerry George to host the second incarnation of +Citadel - ICS. + ICS was long distance from most of the eastside, as it +was located on Bainbridge Island, and this was seen as a +blessing. Most of the twits of that era were reluctant to +host the long distance charges, and so the system +went relatively unabused for a period of 9 months. + Cynbe kept thinking about the system and how it ran, and +found that having a remote site was a blessing - it +served as a beta test site, and tended not to be too much +trouble. + As the bulletin boards proliferated, we saw a variety +of systems come and go, and the userbase swell. Gradually +the userbase became less technical and more humanities +oriented. Boards that failed form lack of use now +flourished, and a rather lively discussion on virtually +every topic was to be found on any one of 30 local boards. + Several minor squabbles showed up during this time, +but got generally ignored - "300 baud misunderstandings" +was coined by Cynbe, and came to mean any problem that would +>never< happen in person, but for some reason seemed to +thrive on the bulletin boards. + One squabble in particular began to show up on every +board. It's rather a famous episode now, and had to do +with the uses and abuses of pseudonyms. Many people got +hurt, and a few felt themselves affected +drastically. When this squabble spread to ICS, it was +tolerated for six months, and then code was written to +delete messages. + Cynbe, seeing a thing that he'd had a major hand in used +to hurl hate messages between one pseudonym and another, +withdrew from the bulletin board community, and from the +people in it specifically. + ICS went down from the sysops' unwillingness to host +a series of petty arguments. Arcade went down due to +apathy. Minbin and Seacom both got embroiled in the +controversy, and finally both banned any mention of it. + T'an T'u put up Polaris on the day that ICS went down, +and ran it as an open system. This system proved to be a +very busy one, and rapidly proved to be very difficult to +get onto. + T'an also supplied the C source code to David Bonn, who +implemented CKMCMS and ESI, maher masu who implemented +Gates of Mordecai, and helped disseminate the code even +further, and Anchor Computers, who he then worked for, as +well as SIG/M and the BDS C Users Group - Citadel having +been written with the BDC C compiler. + CKMCMS came up, ESI came up, Anchor Citadel came up, +Polaris stayed up. + As time went by, T'an noticed that callers who had better +things to do tended not to call polaris. They didn't +have the time to spend calling a system for an hour +only to read a few messages, and so the old userbase +dropped off, one by one. As this happened, the amount of +thought put into each message dropped, and this helped the +process - as the busier callers finally managed to +beat the busy signal, they tended to be greeted by 20 +"Van Halen rules" type messages, and some of them +started to scratch Polaris off of the list. + The final straw for T'an was the original large squabble +resurfacing on several of the major boards. The decision +was made to go to a limited access system, and in +september, 1983, polaris became the first system to go +to a limited access system. + Anchor's technicians took Anchors' Citadel down. ESI +went down when David Bonn stopped working for them. +Gates of Mordecai was up, but quietly so. The number was +never published, and it soon gained a rather good +reputation as a place to go for quiet conversation. +CKMCMS remained up and fairly trouble free. Minibin cloned, +and Eskimo North came into existence. + This remained fairly stable for about six months... +Gates of Mordecai went down - Maher moved to Dallas. CKM +tottered on the edge of solvency. Minibin and Polaris +both stayed up and popular. Eskimo North gained a +reputation for having a userbase consisting of under-13 +year old pirates. The Hermitage was founded, as was +Screaming Eagle and Insomnia. LIDS Citadel came and went in +less than a month, as well as a host of others. + + And so it remains today... + diff --git a/textfiles.com/bbs/prelim.txt b/textfiles.com/bbs/prelim.txt new file mode 100644 index 00000000..6f0bc2e9 --- /dev/null +++ b/textfiles.com/bbs/prelim.txt @@ -0,0 +1,74 @@ +Oct 25th was the second round in the legal situation of the State of Oklahoma +vs Tony Davis and the seizure of the Oklahoma Information Exchange BBS. On +that day the Preliminary Trial took place. + +Generally the Prelim is a fairly cut and dry issue. It is a one-sided affair +where the DA calls up the police witnesses to tell their side of the story to +show that there was probable cause that a crime was committed to determine if +the case should be held over for trial. + +There was little doubt of the outcome, and as expected, the case was held +over. + +Even though the defense did not present any evidence at the Prelim, a number +of 'facts' were presented by the DA which were extremely surprising. + + 1> The original affidavit requesting a search warrant was sworn out by Sgt +Tony Gracey. In that affidavit, he stated that he was acting on information +given him by a confidential informant. When asked about that informant on the +stand, he then contradicted his sworn statement and said that he did not have +an informant, that the information came from his Lieutenant. Then when the +Lieutenant was asked on the stand about his informant, he contradicted Sgt +Gracey and swore that he did not have one, but that Sgt. Gracey initiated the +investigation based on his own informant. + +The inconsistent statements of these two officers will create a situation +where the legality of the entire search warrant will be closely scrutinized in +a brief to the trial judge. + + 2> Sgt Gracey also stated that he was aware that there was a network located +in the 'back room' at the 1501 SE 66th location prior to the execution of the +search warrant, but failed to place that information about the 'network' in +the affidavit requesting the search warrant or have it placed on the search +warrant itself. + +This will also become an issue in the brief of pre-trial motions to the trial +judge to find if any information about the BBS will be admissable or +suppressible. + + 3> In an other unexpected surprise, Sgt Gracey also told the court, that +during his undercover investigation, the defendant had told him that he had +not viewed any of the files on the CDs in question, and the defendant did not +know of the content of the CDs. Although this has no bearing on guilt or +innocence, it certainly sheds some light on the matter of intent. + + 4> Although there has been grounds for a civil law suit under two separate +federal laws, no suit had yet been filed because prior to the Prelim there was +questions on if the seizure was actually done by the OCPD acting on it's own +or under direction of the County DA. Since the county DA is indemnified under +law, until the exact responsibility of the seizure was identified, all civil +law suits were delayed. + +When Sgt Wenthal was questioned under oath on who else he had contacted for +help on determining which laws were possibly violated, he stated "no one". +Then when directly asked who made the decision to seize the computer +equipment, he stated "I did". + +The Federal Privacy Protection Act is one of the few Federal statutes that +allow for direct compensation from the acting officer as well as the agency he +was acting for. That 30 seconds of testimony by Sgt Wenthal stopped all road +blocks in the civil suits, and it is expected that a minimum of two federal +law suits against both the City of Oklahoma City, and Sgt Wenthal will be +filed within the next 14 days. + +Sgt Wenthal was also asked about the 'Your Busted' TV segment. Under oath, he +stated that he had personably wrote the script for the show. This puts the +responsibility for the 'Your Busted' information directly back to Sgt Wenthal +and the OCPD, not Channel 5, who would have been protected by 1st Amendment +rights. + +A number of other inconsistencies and questions were also raised, but to a non +attorney, these seemed to be the major ones. + +Tony + \ No newline at end of file diff --git a/textfiles.com/bbs/product.txt b/textfiles.com/bbs/product.txt new file mode 100644 index 00000000..3b150c37 --- /dev/null +++ b/textfiles.com/bbs/product.txt @@ -0,0 +1,115 @@ +ROSTER OF DEVONLINE PRODUCTS -- +---------------------------- + +Unlike many other DOOR authors and DOOR writing groups, DevPal MetroNet +Communications places much more emphasis on research and development of new +projects and on product debugging and reinforcement than on selling our +products. This has fortunately given us a solid reputation for providing +top-notch software and friendly, personal support... not just to our +customers but to anyone requiring assistance or having questions about our +products. + +Unfortunately, regrettable side effects of this are: + + a) a certain lack of product promotion, on our part + + and + + b) a lack of knowledge concerning all of our product lines, on the + part of sysops. + +This list of short blurbs is a little step in improving our product pro- +motions so that you, as an intelligent and discerning sysop, will be more +informed concerning our products, both current ones and ones which are very +close to completion. We hope that you will continue to send in your +suggestions for improving our online games and ideas for the creation of +more online games, as we are deeply committed to both the continual im- +provement of our own products and the advancement of BBS-related software +technology in general. + + +ARM OF THE DRAGON : + + AotD is the introductory BattleTech(tm) simulations online game that + has brought the excitement and complexity of 'Mech warfare from FASA + Corporation's combat system to online (and offline) game players the + world over. AotD was the first online game released to bring home + the action of huge war machines to game players before any other + software house, and AotD remains the premier game of this genre. + + The AotD game itself is now in its third edition, and although + development for AotD/3 has effectively ceased, related products and + a "successor" to AotD are currently being developed and are going to + be released shortly. Our AotD development team is hard at work to + match a GUI-like environment for game players with the universality + of BBS communications to bring about the same suspense derived from + DevOnline's 1984 AotD/UNIX game to the DOS arena. + +AVATARS OF SCREAMING STEEL : + + AoSS is DevOnline's entry into the Simple Personal Combat Category + of online games, with a post nuclear war holocaust theme and an + involved combat scheme. AoSS introduces a revolutionary approach to + combat, using the concept of anticipating your opponent's moves and + offering a special method in which to enter in your combat actions. + +COHERENCE : + + Coherence is not a single game, but rather a series of cyberpunk + online games following an ultra-dark storyline (very much in keeping + with the cyberpunk genre). Coherence brings the nightmarish gloss + and glamour of the rogue themes of cyberpunk into a cutting-edge + sharp focus that will engulf your players in its intimations of the + stormy near-future on Earth. Our Earth. Of only a few years away... + + The Coherence Project originally began in 1988, with the AI guru + Alexander Wei at the head of the development team. However, because + of unexpected production and integration delays and the even more + unexpectedly demise of Dr. Wei, none of the games in the Coherence + line were ever released to the public. In early 1992, the Coherence + Project was reopened by a some of Dr. Wei's friends and proteges, + and the first Coherence game, BLACKJACK 20/40, is due out shortly. + +FLUMEN MUSAE NOVAE : + + One of the first DOS online games produced under the DevOnline + banner, FMN was also the first fantasy wargame and true role-playing + game available for play on BBS's. This game was originally produced + for WWIV systems (way back when the only BBS program to support + "DOORs" was WWIV). Although the original rendition is no longer in + circulation, an updated version for all major BBS programs will be + making its appearance very soon, bringing back the mystery and magic + that -is- Flumen Musae Novae, the River of the New Muse! + +METRO-MEZZANINE : + + "A BBS carousel? What's that?" Thousands of BBS users from all over + the world have paused at the sometimes bewildering and definitely + exciting Ghostwheel that has graced the entrypoints to DevPal + systems for over a decade. A BBS carousel enables the enterprising + sysop to run more than one BBS program on a phone line. It also + allows a sysop to add a special flair to his system that makes it + truly unique, even though the particular BBS programs used on that + system may not have many options that allow customability. + + Metro-Mezzanine helps to bring together any front-end/mailer program + (like BinkleyTerm, FrontDoor, QFront, and many others) and any + number of BBS programs which accept command-line options in a + coherent manner which enable users, upon login (and at other points) + to choose to access one BBS program (and, depending upon the BBS + programs, even switch between BBS programs!). No other product + offers such configurability at the same registration price, or even + beyond! + +PEREGRINE, Reforging the Galactic Trust : + + This is one of the few online games which has a strong following + even BEFORE it has been released! Peregrine is currently still in + alpha-testing stages, but many sysops and users have "peeked" at + technical documents and source literature pertaining to this game, + and they have fallen in love with this interstellar conquest/trading + game. If your players enjoy the concept of a science fiction online + game but are sick and tired of the blandness of Trade Wars and its + clones, Peregrine may be your cup of tea. Coming soon to a DevOnline + distribution site near you! + diff --git a/textfiles.com/bbs/prose.txt b/textfiles.com/bbs/prose.txt new file mode 100644 index 00000000..a7a05bbc Binary files /dev/null and b/textfiles.com/bbs/prose.txt differ diff --git a/textfiles.com/bbs/protogen.txt b/textfiles.com/bbs/protogen.txt new file mode 100644 index 00000000..42f443c8 --- /dev/null +++ b/textfiles.com/bbs/protogen.txt @@ -0,0 +1,1024 @@ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ + + The Sentinal could not locate Protogen anywhere in the OutPost. +Passages are hidden to the Sentinal's scanners, so finding the overseer +is a timely task. + +Send message to [Protogen #1]? [No] : No + + + +The Cyborgs look at you with a close eye. Each of them are +recording your moves onto a PùCD for FMG Records... + +ÞSÝentinal will search for Protogen throughout the OutPost +ÞRÝeturn to the Outer Area of the Central tower + +þ Cyborgs are at the doors +þ Walk up to which one:ÿS +Are you sure you want to enter?ÿY + + The Cyborgs will release the Sentinal to find the OverSeer. If you are +to speak with him, keep it short. But, first, you must answer some +questions the guard has for you. + +The guard wishes to inquire your reason. +:I know your there ya damn fucken bastard asshole + +þ The Sentinal searches for Protogen in the Tower... + +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ +ÄÄÄÄÄÄÅÄÄÄþ EastùWestùSouth and North þÄÄÄÅÄÄÄÄÄÄ + + The Sentinal could not locate Protogen anywhere in the OutPost. +Passages are hidden to the Sentinal's scanners, so finding the overseer +is a timely task. + +Send message to [Protogen #1]? [No] : No + + + +The Cyborgs look at you with a close eye. Each of them are +recording your moves onto a PùCD for FMG Records... + +ÞSÝentinal will search for Protogen throughout the OutPost +ÞRÝeturn to the Outer Area of the Central tower + +þ Cyborgs are at the doors +þ Walk up to which one:ÿR + +þ Light Hours: 00:38:29 +þ Main Entrance:ÿU + +Scan for NEW CytoUrns? (Y/N)ÿN + +þ Light Hours: 00:38:26 +þ Vault: 1 ........ Upload Directory +þ CytoOrg Storage Vaults:ÿU + + Insure the CytoUrn is DeMoleculized with the LZH or ARJ method. If not, +your CytoUrn would not be credited. Trading with the FMG could be a +frustrating experience... + +þ 4824K free in the storing room.ÿ + +Filename: X.ZIP + + +Searching for duplicate files ... none found. + +Upload "X.ZIP"? [Yes] : Yes + +Enter a single "\" in front of the description if it +is for the SysOp ONLY. + +Please enter a one line description (54 chrs max) +:\a + + +þ A light flashed in your eyes and Protogen confronts you. + + + + + +þ A light had flashed once more and he dissappears... + + + +þ A light flashed in your eyes and Protogen confronts you. + + + +þ A light had flashed once more and he dissappears... + + + +þ A light flashed in your eyes and Protogen confronts you. + +Wht the fuck is your problem Asian fucker + +nothing + +Wait, this is not Chansak. You would've typed 3 dots like you always do and +said "heh...heh...heh...heh...heh...heh..." + +nop + +Who the fuck is this? + +im his white bro + +You have to be b lack to be a bro. I'm down with the bloods + +im adopted + +How old are you? + +7 +you are cool +87iui6y htg +yup +Press f9 +Did you press it yet? + +y +ok see ya +/q +Chat Aborted... + +þ A light had flashed once more and he dissappears... + + +Leave a verbose description? [No] : No + +Protocol (?=list) : Q + +þ Light Hours: 00:38:11 +þ Vault: 2 ........ Upload Directory +þ CytoOrg Storage Vaults:ÿ[ + +þ Light Hours: 00:38:09 +þ Vault: 1 ... Graphix Core Software +þ CytoOrg Storage Vaults:ÿ[ + +File base 0: GCE Staff/SysOp Directory +Password? +Wrong. + +Lowest accessible file base. + +þ Light Hours: 00:38:04 +þ Vault: 1 ... Graphix Core Software +þ CytoOrg Storage Vaults:ÿQ + +þ Light Hours: 00:38:04 +þ Main Entrance:ÿ* + +þ Light Hours: 00:38:00 +þ Lord's Area:ÿ? + + + + ÄÄÄÄÄÄÅÄÄÄþ OvErSeEr's ArEa þÄÄÄÅÄÄÄÄÄÄ + ÄÄÄÄÄÄÅÄÄÄþ PrIvAtE ArEa: WaRnInG þÄÄÄÅÄÄÄÄÄÄ + +ÞBÝoard Editor ÞCÝhange to User ÞDÝOSùMini ÞEÝvent Editor +ÞFÝile Base Editor ÞGÝoodbye ÞIÝnit Voting ÞLÝogs SysOp +ÞNÝText Editor ÞPÝSystem Config ÞQÝuit Þ@ÝQuit to Main +ÞTÝfile Base Edit ÞUÝser Editor ÞVÝoting Result ÞXÝProtocol Edit +Þ­ÝSystem Log Þ#ÝMenu Editor Þ$ÝConference Edit Þ!ÝShell to DOS +ÞþÝEmergency Chat + +þ Light Hours: 00:37:59 +þ Lord's Area:ÿU +Sysop PW? ùùùùùùùùùùùùùùùùùù + + +User #50 of 69 Status:Normal SL:255 DSL:255 +User name:LEPERACHAUN AR:-------------------------- +Real name:Josh Mc Carthy AC:----------/---- +Address :164 Rochambeau Avenue Sex/Age :M15 (04/04/78) +City / State :Providence, RI Zip-code:02906 +Computer type:Macintosh Se Phone # :401-273-4915 +SysOp note : Last/1st:05/21/93 (04/10/93) +Occupation :Student At A Shitty High School Lockfile:inactive. +BBS reference:From Cerebral Babylon Password:xxxxxxxxxxxxxxxxxxxx +Call records- TC:13 TT:166 CT:1 TL:45 Tbank:0 +Mail records- Pub:3 Priv:13 Net:0 Credit:10000 Debit:0 +File records- DL:0-0k UL:2-248k Pts:30 + +Option :1 + +Call records: +(0)Total calls: 13 (1)Total time on: 166 +(2)Calls today: 1 (3)Time left today: 45 +(4)Illegal logon attempts: 0 + +Select: (0-4) [M]ail [F]ile [Q]uit : + + +User #50 of 69 Status:Normal SL:255 DSL:255 +User name:LEPERACHAUN AR:-------------------------- +Real name:Josh Mc Carthy AC:----------/---- +Address :164 Rochambeau Avenue Sex/Age :M15 (04/04/78) +City / State :Providence, RI Zip-code:02906 +Computer type:Macintosh Se Phone # :401-273-4915 +SysOp note : Last/1st:05/21/93 (04/10/93) +Occupation :Student At A Shitty High School Lockfile:inactive. +BBS reference:From Cerebral Babylon Password:xxxxxxxxxxxxxxxxxxxx +Call records- TC:13 TT:166 CT:1 TL:45 Tbank:0 +Mail records- Pub:3 Priv:13 Net:0 Credit:10000 Debit:0 +File records- DL:0-0k UL:2-248k Pts:30 + +Option :I + +Enter new occupation. +: +Function aborted! + + +User #50 of 69 Status:Normal SL:255 DSL: +Aborted. + +Option :U +Enter user name, #, or partial search string: 1 + + +User #1 of 69 Status:Normal SL:255 DSL:255 +User name:PROTOGEN AR:-B------------------------ +Real name:Chan S. Sam AC:----------/1234 +Address :Somewhere Sex/Age :M15 (08/14/77) +City / State :Planet Earth Zip-code:00000 +Computer type:Intel ù Processor Phone # :401-421-0921 +SysOp note : Last/1st:05/18/93 (01/07/93) +Occupation : Lockfile:inactive. +BBS reference:... Password:xxxxxxxxxxxxxxxxxxxx +Call records- TC:251 TT:589 CT:0 TL:1440 Tbank:0 +Mail records- Pub:78 Priv:47 Net:0 Credit:10000 Debit:0 +File records- DL:0-0k UL:0-0k Pts:0 + +Option :Q + +þ Light Hours: 00:37:20 +þ Lord's Area:ÿ? + + + + ÄÄÄÄÄÄÅÄÄÄþ OvErSeEr's ArEa þÄÄÄÅÄÄÄÄÄÄ + ÄÄÄÄÄÄÅÄÄÄþ PrIvAtE ArEa: WaRnInG þÄÄÄÅÄÄÄÄÄÄ + +ÞBÝoard Editor ÞCÝhange to User ÞDÝOSùMini ÞEÝvent Editor +ÞFÝile Base Editor ÞGÝoodbye ÞIÝnit Voting ÞLÝogs SysOp +ÞNÝText Editor ÞPÝSystem Config ÞQÝuit Þ@ÝQuit to Main +ÞTÝfile Base Edit ÞUÝser Editor ÞVÝoting Result ÞXÝProtocol Edit +Þ­ÝSystem Log Þ#ÝMenu Editor Þ$ÝConference Edit Þ!ÝShell to DOS +ÞþÝEmergency Chat + +þ Light Hours: 00:37:18 +þ Lord's Area:ÿP +Sysop PW? ùùùùùùùùùùùùùùùùùù +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : A +Modem Configuration + +1. Maximum BPS rate : 2400 +2. COM port number : 1 +3. Modem init string : "ATE0Q0V0M1X4&C1&D2 S7=55 S11=60 S0=0" +4. Modem answer string : "ATA" +5. Modem hangup string : "^A^A^A~~~ATH0" +6. Modem offhook string: "ATH1M0" +7. No-call init time : 5 +8. COM port locked : No +9. Locked port BPS rate: N/A +F. Flow control : Disabled +R. Modem result codes + +Enter selection or (Q)uit : Q +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : C +System ACS Settings + +A. Full SysOp :"s255 a14" B. Full Co-SysOp :"s200 a12" +C. Message base SysOp :"s200 a12" D. File base SysOp :"s200 a12" +E. SysOp PW at logon :"s200 a12" F. See PWs remotely :"s255 a12" +G. Post public :"s20" H. Post private :"s20" +I. Post NetMail :"s20" J. See anon pub post :"s200 a12" +K. See anon priv post :"s200 a12" L. Post anon public :"s20" +M. Post anon private :"s200 a12" N. See unval. files :"s200 a12" +O. DL unval. files :"s200 a12" P. No UL/DL ratio :"s200 a12" +R. No post/call ratio :"s200 a12" S. No file pt checking:"s200 a12" +T. ULs auto-credited :"s20" + +Enter selection or (Q)uit : A + +New ACS: s255 +System ACS Settings + +A. Full SysOp :"s255" B. Full Co-SysOp :"s200 a12" +C. Message base SysOp :"s200 a12" D. File base SysOp :"s200 a12" +E. SysOp PW at logon :"s200 a12" F. See PWs remotely :"s255 a12" +G. Post public :"s20" H. Post private :"s20" +I. Post NetMail :"s20" J. See anon pub post :"s200 a12" +K. See anon priv post :"s200 a12" L. Post anon public :"s20" +M. Post anon private :"s200 a12" N. See unval. files :"s200 a12" +O. DL unval. files :"s200 a12" P. No UL/DL ratio :"s200 a12" +R. No post/call ratio :"s200 a12" S. No file pt checking:"s200 a12" +T. ULs auto-credited :"s20" + +Enter selection or (Q)uit : A + +New ACS: s255 a12 +System ACS Settings + +A. Full SysOp :"s255 a12" B. Full Co-SysOp :"s200 a12" +C. Message base SysOp :"s200 a12" D. File base SysOp :"s200 a12" +E. SysOp PW at logon :"s200 a12" F. See PWs remotely :"s255 a12" +G. Post public :"s20" H. Post private :"s20" +I. Post NetMail :"s20" J. See anon pub post :"s200 a12" +K. See anon priv post :"s200 a12" L. Post anon public :"s20" +M. Post anon private :"s200 a12" N. See unval. files :"s200 a12" +O. DL unval. files :"s200 a12" P. No UL/DL ratio :"s200 a12" +R. No post/call ratio :"s200 a12" S. No file pt checking:"s200 a12" +T. ULs auto-credited :"s20" + +Enter selection or (Q)uit : Q +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : D +System Variables + +A. Max private posts per call:100 B. Max NetMail posts per call:100 +C. Max public posts per call :100 D. Max chat attempts per call:3 +E. SysOp chat color :7 F. User chat color :5 +G. Min. space for posts :100 H. Min. space for uploads :500 +I. Back SysOp Log keep days :7 J. Blank WFC menu minutes :3 +K. Default video line length :80 L. Default video page length :24 +M. Number of logon attempts :3 + +Enter selection or (Q)uit : Q +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : E +System Flagged Functions + +A. Special effects :On B. Use EMS for overlay file :On +C. Handles allowed on system:On D. Phone number in logon :On +E. Local security protection:Off F. Local screen security :Off +G. Global activity trapping :Off H. Auto chat buffer open :On +I. AutoMessage in logon :On J. Bulletins in logon :Off +K. Last few callers in logon:Off L. "Your info" in logon :Off +M. BBS is multi-tasking :Off N. Offhook in local logon :On +O. Mandatory voting :Off P. Compress file/msg numbers :On +R. UL duplicate file search :On S. SysOp Log type :File only +T. Strip color off SysOp log:Off U. Use WFC menu logo :On +V. Use BIOS for video output:Off W. Suppress snow on CGA :Off +X. Execute system .BAT files:Off + +1. New user message sent to :2 2. Guest user number :Off +3. Mins before timeout bell :4 4. Mins before timeout :5 + +Enter selection or (Q)uit : Q +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : H +Miscellaneous Configuration + +A. System start-out menu :"FIRST" +B. Default bulletin prefix file:"BULLET" +C. Default batch file extension:"BAT" +D. Full screen editor command :"QUICKED @P @B @T 300" + +Enter selection or (Q)uit : Q +System Configuration + +A. Modem configuration +B. File paths & BBS configuration +C. System ACS settings +D. System variables +E. System flagged functions +F. File system configuration +G. New user and auto-validation settings +H. Miscellaneous configuration +I. Network configuration +J. String configuration +K. Default colors + +1. Time limitations +2. Call allowance/day +3. UL/DL # files ratio +4. UL/DL K-bytes ratio +5. Post/call ratio + +Enter selection or (Q)uit : Q + +þ Light Hours: 00:35:48 +þ Lord's Area:ÿ? + + + + ÄÄÄÄÄÄÅÄÄÄþ OvErSeEr's ArEa þÄÄÄÅÄÄÄÄÄÄ + ÄÄÄÄÄÄÅÄÄÄþ PrIvAtE ArEa: WaRnInG þÄÄÄÅÄÄÄÄÄÄ + +ÞBÝoard Editor ÞCÝhange to User ÞDÝOSùMini ÞEÝvent Editor +ÞFÝile Base Editor ÞGÝoodbye ÞIÝnit Voting ÞLÝogs SysOp +ÞNÝText Editor ÞPÝSystem Config ÞQÝuit Þ@ÝQuit to Main +ÞTÝfile Base Edit ÞUÝser Editor ÞVÝoting Result ÞXÝProtocol Edit +Þ­ÝSystem Log Þ#ÝMenu Editor Þ$ÝConference Edit Þ!ÝShell to DOS +ÞþÝEmergency Chat + +þ Light Hours: 00:35:46 +þ Lord's Area:ÿD + +Type "EXIT" to return to the BBS. + +[C:\TG\AFILES] cd\ +Bad command or file name +[C:\TG\AFILES] cd .. +[C:\TG] cd .. +[C:\] del *.* +"IO.SYS": Could not delete! +"MSDOS.SYS": Could not delete! +"MIRORSAV.FIL": Could not delete! +"MIRROR.FIL": Could not delete! +[C:\] dir + + Directory of C:\*.* + +BWAVE

3-13-93 11:52a +CRACK 3-10-93 10:02p +DOORS 3-10-93 10:02p +DOS 1-07-93 6:00p +DOWNLOAD 3-10-93 10:06p +FD 3-10-93 10:08p +GRAPHICS 3-10-93 10:10p +NETMAIL 3-18-93 6:58p +SF 3-10-93 10:12p +TC 3-10-93 10:13p +TELIX 3-10-93 10:17p +TEST 3-13-93 7:27p +TEST2 3-31-93 5:51p +TG 3-10-93 10:17p +UPLOADS 3-11-93 9:04p +PCTRACKR DEL 36768 5-22-93 5:16p +MIRROR FIL 48640 5-22-93 6:35a + 17 File(s) 5036032 bytes free + +[C:\] cd tg +[C:\TG] del *3 +[C:\TG] del *.* +[C:\TG] dir + + Directory of C:\TG\*.* + +. 3-10-93 10:17p +.. 3-10-93 10:17p +AFILES 3-10-93 10:17p +GFILES 3-10-93 10:17p +LOGS 3-10-93 10:18p +MENUS 3-10-93 10:18p +MSGS 3-10-93 10:18p +PROTOCOL 3-10-93 10:18p +TEMP 3-10-93 10:49p +TFILES 3-10-93 10:49p +UTILS 3-10-93 10:18p + 11 File(s) 6002688 bytes free + +[C:\TG] cd logs +[C:\TG\LOGS] del *.* +[C:\TG\LOGS] cd .. +[C:\TG] cd .. +[C:\] ext attrib -R -H -S pctrackr.del +[C:\] del pctrackr.del +[C:\] rd tg +Unable to remove directory. +[C:\] dir + + Directory of C:\*.* + +BWAVE 3-13-93 11:52a +CRACK 3-10-93 10:02p +DOORS 3-10-93 10:02p +DOS 1-07-93 6:00p +DOWNLOAD 3-10-93 10:06p +FD 3-10-93 10:08p +GRAPHICS 3-10-93 10:10p +NETMAIL 3-18-93 6:58p +SF 3-10-93 10:12p +TC 3-10-93 10:13p +TELIX 3-10-93 10:17p +TEST 3-13-93 7:27p +TEST2 3-31-93 5:51p +TG 3-10-93 10:17p +UPLOADS 3-11-93 9:04p +PCTRACKR DEL 36768 5-22-93 5:18p +MIRROR FIL 48640 5-22-93 6:35a + 17 File(s) 6901760 bytes free + +[C:\] del pctrackr.del +[C:\] dir *.del + + Directory of C:\*.DEL + +PCTRACKR DEL 36768 5-22-93 5:18p + 1 File(s) 6901760 bytes free + +[C:\] ext attrib pctrackr.del >com1 +[C:\] dir *.del + + Directory of C:\*.DEL + +PCTRACKR DEL 36768 5-22-93 5:19p + 1 File(s) 6901760 bytes free + +[C:\] cd dos +[C:\DOS] del *.* +[C:\DOS] dir + + Directory of C:\DOS\*.* + +. 1-07-93 6:00p +.. 1-07-93 6:00p +TEMP 1-07-93 8:17p + 3 File(s) 9064448 bytes free + +[C:\DOS] rd temp +Unable to remove directory. +[C:\DOS] cd temp +[C:\DOS\TEMP] dir + + Directory of C:\DOS\TEMP\*.* + +. 1-07-93 8:17p +.. 1-07-93 8:17p + 2 File(s) 9064448 bytes free + +[C:\DOS\TEMP] cd.. +Bad command or file name +[C:\DOS\TEMP] cd .. +[C:\DOS] rd c:\dos\temp +Unable to remove directory. +[C:\DOS] cd .. +[C:\] cd tg +[C:\TG] dir + + Directory of C:\TG\*.* + +. 3-10-93 10:17p +.. 3-10-93 10:17p +AFILES 3-10-93 10:17p +GFILES 3-10-93 10:17p +LOGS 3-10-93 10:18p +MENUS 3-10-93 10:18p +MSGS 3-10-93 10:18p +PROTOCOL 3-10-93 10:18p +TEMP 3-10-93 10:49p +TFILES 3-10-93 10:49p +UTILS 3-10-93 10:18p + 11 File(s) 9064448 bytes free + +[C:\TG] cd utils +[C:\TG\UTILS] del *.* +[C:\TG\UTILS] cd .. +[C:\TG] cd msgs +[C:\TG\MSGS] del *.* +[C:\TG\MSGS] dir + + Directory of C:\TG\MSGS\*.* + +. 3-10-93 10:18p +.. 3-10-93 10:18p +WINCNET 3-21-93 7:07p + 3 File(s) 11368448 bytes free + +[C:\TG\MSGS] cd wincnet +[C:\TG\MSGS\WINCNET] del *.* +[C:\TG\MSGS\WINCNET] diur +Bad command or file name +[C:\TG\MSGS\WINCNET] dir + + Directory of C:\TG\MSGS\WINCNET\*.* + +. 3-21-93 7:07p +.. 3-21-93 7:07p +BITSBYTE 3-21-93 9:09p +FREETIME 3-21-93 9:09p +GLOBALCT 3-21-93 9:09p +PRICERIT 3-21-93 9:10p +PSYCHICS 3-21-93 9:10p +ROLEPLAY 3-21-93 9:11p +STOPRESS 4-13-93 4:12p +TEEN-SIT 3-21-93 9:11p +USEVOICE 3-21-93 9:12p +WOMENTAK 3-21-93 9:12p +WORDS-UP 3-21-93 9:13p + 13 File(s) 11368448 bytes free + +[C:\TG\MSGS\WINCNET] cd .. +[C:\TG\MSGS] cd .. +[C:\TG] cd .. +[C:\] dir + + Directory of C:\*.* + +BWAVE 3-13-93 11:52a +CRACK 3-10-93 10:02p +DOORS 3-10-93 10:02p +DOS 1-07-93 6:00p +DOWNLOAD 3-10-93 10:06p +FD 3-10-93 10:08p +GRAPHICS 3-10-93 10:10p +NETMAIL 3-18-93 6:58p +SF 3-10-93 10:12p +TC 3-10-93 10:13p +TELIX 3-10-93 10:17p +TEST 3-13-93 7:27p +TEST2 3-31-93 5:51p +TG 3-10-93 10:17p +UPLOADS 3-11-93 9:04p +PCTRACKR DEL 36768 5-22-93 5:21p +MIRROR FIL 48640 5-22-93 6:35a + 17 File(s) 11368448 bytes free + +[C:\] cd telix +[C:\TELIX] del *.* +[C:\TELIX] dir + + Directory of C:\TELIX\*.* + +. 3-10-93 10:17p +.. 3-10-93 10:17p +SCRIPT 3-10-93 10:17p + 3 File(s) 11843584 bytes free + +[C:\TELIX] cd script +[C:\TELIX\SCRIPT] del *.* +[C:\TELIX\SCRIPT] dir + + Directory of C:\TELIX\SCRIPT\*.* + +. 3-10-93 10:17p +.. 3-10-93 10:17p + 2 File(s) 11847680 bytes free + +[C:\TELIX\SCRIPT] d.. +Bad command or file name +[C:\TELIX\SCRIPT] cd .. +[C:\TELIX] rd script +[C:\TELIX] cd.. +Bad command or file name +[C:\TELIX] cd .. +[C:\] rd telix +[C:\] dir + + Directory of C:\*.* + +BWAVE 3-13-93 11:52a +CRACK 3-10-93 10:02p +DOORS 3-10-93 10:02p +DOS 1-07-93 6:00p +DOWNLOAD 3-10-93 10:06p +FD 3-10-93 10:08p +GRAPHICS 3-10-93 10:10p +NETMAIL 3-18-93 6:58p +SF 3-10-93 10:12p +TC 3-10-93 10:13p +TEST 3-13-93 7:27p +TEST2 3-31-93 5:51p +TG 3-10-93 10:17p +UPLOADS 3-11-93 9:04p +PCTRACKR DEL 36768 5-22-93 5:22p +MIRROR FIL 48640 5-22-93 6:35a + 16 File(s) 11851776 bytes free + +[C:\] rd dos +Unable to remove directory. +[C:\] cd dos +[C:\DOS] dir + + Directory of C:\DOS\*.* + +. 1-07-93 6:00p +.. 1-07-93 6:00p +TEMP 1-07-93 8:17p + 3 File(s) 11851776 bytes free + +[C:\DOS] d temp +Bad command or file name +[C:\DOS] cd temp +[C:\DOS\TEMP] dir + + Directory of C:\DOS\TEMP\*.* + +. 1-07-93 8:17p +.. 1-07-93 8:17p + 2 File(s) 11851776 bytes free + +[C:\DOS\TEMP] cd .. +[C:\DOS] rd temp +Unable to remove directory. +[C:\DOS] rd \dos\temp +Unable to remove directory. +[C:\DOS] cd .. +[C:\] rd \dos\temp +Unable to remove directory. +[C:\] cd dos +[C:\DOS] ext rd temp +[C:\DOS] dir + + Directory of C:\DOS\*.* + +. 1-07-93 6:00p +.. 1-07-93 6:00p +TEMP 1-07-93 8:17p + 3 File(s) 11851776 bytes free + +[C:\DOS] cd .. +[C:\] dir + + Directory of C:\*.* + +BWAVE 3-13-93 11:52a +CRACK 3-10-93 10:02p +DOORS 3-10-93 10:02p +DOS 1-07-93 6:00p +DOWNLOAD 3-10-93 10:06p +FD 3-10-93 10:08p +GRAPHICS 3-10-93 10:10p +NETMAIL 3-18-93 6:58p +SF 3-10-93 10:12p +TC 3-10-93 10:13p +TEST 3-13-93 7:27p +TEST2 3-31-93 5:51p +TG 3-10-93 10:17p +UPLOADS 3-11-93 9:04p +PCTRACKR DEL 36768 5-22-93 5:23p +MIRROR FIL 48640 5-22-93 6:35a + 16 File(s) 11851776 bytes free + +[C:\] cd tc +[C:\TC] del *.* +[C:\TC] dir + + Directory of C:\TC\*.* + +. 3-10-93 10:13p +.. 3-10-93 10:13p +BGI 3-10-93 10:13p +BIN 3-10-93 10:13p +C 3-10-93 10:15p +CLASSLIB 3-10-93 10:15p +DOC 3-10-93 10:16p +INCLUDE 3-10-93 10:16p +LIB 3-10-93 10:16p + 9 File(s) 11851776 bytes free + +[C:\TC] cd lib +[C:\TC\LIB] del *.* +[C:\TC\LIB] cd .. +[C:\TC] del *.* +[C:\TC] cd bin +[C:\TC\BIN] del *.* +[C:\TC\BIN] cd \tg +[C:\TG] dir + + Directory of C:\TG\*.* + +. 3-10-93 10:17p +.. 3-10-93 10:17p +AFILES 3-10-93 10:17p +GFILES 3-10-93 10:17p +LOGS 3-10-93 10:18p +MENUS 3-10-93 10:18p +MSGS 3-10-93 10:18p +PROTOCOL 3-10-93 10:18p +TEMP 3-10-93 10:49p +TFILES 3-10-93 10:49p +UTILS 3-10-93 10:18p + 11 File(s) 17539072 bytes free + +[C:\TG] rd utils +Unable to remove directory. +[C:\TG] rd \utils +Unable to remove directory. +[C:\TG] rd \tg\utils +Unable to remove directory. +[C:\TG] cds afiles +Bad command or file name +[C:\TG] +[C:\TG] cd afiles +[C:\TG\AFILES] del *.* +[C:\TG\AFILES] wwwcd .. +Bad command or file name +[C:\TG\AFILES] dir + +Files not found 17747968 bytes free + +[C:\TG\AFILES] dir + +Files not found 17747968 bytes free + +[C:\TG\AFILES] what r you doing +Bad command or file name +[C:\TG\AFILES] I'm fixing his BBS to make it better +Bad command or file name +[C:\TG\AFILES] cd .. +[C:\TG] dir + +Files not found 17747968 bytes free + +[C:\TG] for what +Bad command or file name +[C:\TG] I am his friend +Bad command or file name +[C:\TG] who +Bad command or file name +[C:\TG] Chansak +Bad command or file name +[C:\TG] cd logs +[C:\TG\LOGS] del +Bad command or file name +[C:\TG\LOGS] del *.*nlk +[C:\TG\LOGS] d +Bad command or file name +[C:\TG\LOGS] ir +Bad command or file name +[C:\TG\LOGS] dir + +Files not found 17747968 bytes free + +[C:\TG\LOGS] cd . +[C:\TG\LOGS] . +Bad command or file name +[C:\TG\LOGS] cd . +[C:\TG\LOGS] .. +Bad command or file name +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] STO +Bad command or file name +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] +[C:\TG\LOGS] PSTOP +Bad command or file name +[C:\TG\LOGS] +[C:\TG\LOGS] let me see what bbs look like +Bad command or file name +[C:\TG\LOGS] No -- you can't see the difference, it is just better speed (slight +ly) +Bad command or file name +[C:\TG\LOGS] who are you +Bad command or file name +[C:\TG\LOGS] Chansak's friend wait we can talk later just let me fix some more +ok? +Bad command or file name +[C:\TG\LOGS] ok +Bad command or file name +[C:\TG\LOGS] cd .. +[C:\TG] cd menus +[C:\TG\MENUS] del *.* +wµø«i¹Í¿ÿ³yoÿûä8±õ~?~éc/ñ³Ûÿ³ÿùû«à~?~? +NO CARRIER +TM3 +OK +ATL3 +OK +CONNECT 2400 + +FrontDoor 2.02; Noncommercial version + +Press Escape twice for ùTG/PRSYSù + + Ú¿ Ú¿ + ÀÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÙ + ³ úùþ PrOtOgEn'S SyStEmSúYour Host is PrOtOgEn þùú ³ + ÚÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅ¿ + ÀÙ ÀÙ + ù Front Door v2.02 NC ù WinCNet + ù 1ú401ú421ú0921 USA ù Node 49:401/21 + + ù Telegard 2.70 Standard ù Grafix Core Elite 1992 - 1993 + ù IBM 2400 BPS Modem ù Home BBS of Grafix Core Elite + + ù PrSys v0.93 from Graphix Core Elite will be ready in a few short + ù weeks. Please excuse the lack of BBSing hours till then... + ù Graphix Core PreTG System Checker v0.93 + ù Checking Base RAM: 618K Available + ù Checking Base XMS: MSùHIMEM 3.3 + ù Checking Base EMS: 940K Available +ATH0 +XJþÄ%Ü +NO CARRIER + \ No newline at end of file diff --git a/textfiles.com/bbs/ques b/textfiles.com/bbs/ques new file mode 100644 index 00000000..084e5ac5 --- /dev/null +++ b/textfiles.com/bbs/ques @@ -0,0 +1,114 @@ +Question and Answers +Copyright (c) 1993, Joe DeRouen +All rights reserved + + +Each month, we'll ask a (hopefully) interesting question to users on +various nets and BBS's across the world and include the best answers +we get in this column. + +The question we asked for this month was: "If you could have one wish, +what would you wish for and why?" + +This age-old question was met by a lot of wishes for more wishes (I +expected that) but also more than a few interesting, insightful +answers. And maybe even one or two just plain strange ones. + +The messages are reproduced here in their entirety (minus quoting), +with the permission of the people involved. + + +======================================================================== + +Number : 15104 of 15533 Date : 08/25/93 16:31 +Reply To: 14191 +Confer : Writers +From : Valerie Patterson +To : Joe Derouen +Subject : Re: Wishes.. +------------------------------------------------------------------------ + +If I had one wish I would sincerely and earnestly wish for world peace. +I know this is an old over used answer to an age old question, but it +truly would be my wish. I'm fairly young (in my twenties) and married +for a short time. Eventually I would like to have children, but I can't +help wondering what would be left for my children to grow old in. When +we were warring over in the gulf I cried many evenings over the news. +I'm frightened at the thought of my old age and my children's lives. +Each day brings more and more violence, even more hatred for "different" +folk. I can't help thinking we're a world about to self-destruct. We +live in a "throw-away" society, perhaps we're throwing away our +children's futures? Perhaps wishing for world peace is better left to +children who are still shielded from the harsh realities of life and of +war. But, I feel compelled to point out our children know more about +world hate than we know. Yes, I'd wish for peace, if not for my sake, +than for the sake all children, born and unborn. + +I hope this is along the lines of what you wanted. I'm sorry it wasn't +sent privately, but I'm still learning this BBS stuff and I'm not quite +sure how to do that. At any rate, here it is... -Valerie- + + +... Reality-ometer: [\........] Hmmph! Thought so... +___ Blue Wave/QWK v2.12 +--- + * The NutHouse BBS Waynesburg , PA. * (412)852-2847 Zoom v.32bis + * PostLink(tm) v1.07 NUTHOUSE (#5303) : RelayNet(tm) + +======================================================================== + + * * * + +======================================================================== + +Number : 15105 of 15534 Date : 08/26/93 00:30 +Reply To: 14191 +Confer : Writers +From : Aaron Turpen +To : Joe Derouen +Subject : Wishes.. +------------------------------------------------------------------------ + + That's harder to answer than it seems. I think, however, that I'd wish +to be made into a Terminator(R)(TM)(etc.)-like robot with my brain/mind +intact. This seems stupid and childish, but think of all the problems +that'd be solved: + +1) I'd be bigger, stronger, and buffer than everyone else. +2) I'd talk with a nift accent. +3) I wouldn't have to worry about walking out on the street and getting shot + because my clothes are a certain color or my hand moved the wrong way. +4) I'd have no use for a car. I could just run wherever I wanted to be (how + CHEAP!) +5) I wouldn't ever get tired from working, playing, or whatever. Plus there + wouldn't be a need for sleep. +6) It would be cool. + + So that's what I'd wish. + +--Thanatos (I was intrigued and had to answer.) + + +___ Blue Wave/QWK v2.12 +--- + * The Brass Cannon, Orem, Utah, (801)226-8310 + * PostLink(tm) v1.07 BRASS (#1126) : RelayNet(tm) + +======================================================================== + + +We didn't start this column until well into the Sept. issue, so not too +many people had a chance to respond. Hopefully, next issue will be +different. + +It's probably fair that I answer my own question, thus I'll do so right +now, then bid you adieu until next month. + +If I had one wish, my wish would be that everyone in the universe, +including myself, got what they most desired in all the world with the +one restriction on that desire being that it couldn't hurt anyone else, +infringe upon their rights, or make them unhappy. + +Thanks for reading QUESTION AND ANSWERS, and I hope you'll stick with us +until next month! + diff --git a/textfiles.com/bbs/quiz.txt b/textfiles.com/bbs/quiz.txt new file mode 100644 index 00000000..7a212b48 --- /dev/null +++ b/textfiles.com/bbs/quiz.txt @@ -0,0 +1,69 @@ + Are You A BBSaholic? + +1. Do you cancel important appointments (such as your wedding) because it +would have conflicted with your BBS time? +2. Can you recite BBS menus verbatim? +3. Have you named your kids after your favorite Sysop(s)? +4. Are the words "HI" and "Bye" burned into your monitor? +5. Do you get lost in thought wondering what the ideal screen name would be? +6. Are you tempted to get out of bed for "just one more hour"? +7. Is Dominoes Pizza delivery number taped to your monitor? +8. Do you get more emontional fulfillment from your online romance than from +your real mate? +9. Do you unplug your keyboard and take it to work with you? +10.Do you get upset when someone calls while you're oline and interrupts a +conversation? +11.Do you spend 80% of your time rooted to your computer chair? +12.Do you find it hard to relax without the soft whirl of the computer fan +humming in the background? +13.Do you fantasize about the perfect "compu-wedding"? +14.Is your social calender glowing with flourescent marked online events? +15.Do you look forward to e-mail more than real mail? +16.Do you watch hypnoically as the "dialing" "connecting" "password" +highlights, unable to breathe, move or speak until you are logged on? +17.Do you throw things in anger because "all ports are busy" or "host unavail- +able through network" or "host is unresponsive"? (for national BBS's) +18.Is your modem-sex better than real life sex? +19.Do you have a phobia of the words "No Carrier"? +20.When was the last time you were offline in time to make love to your mate +before they fell asleep? +21.Do you have nightmares about hard drive failure? +22.Have you lost 10 pounds from missing meals due to being online? +23.Does your computer boot right to your favorite BBS? +24.Do you see screen scrolling text when you shut your eyes? +25.Has your typing skills improved greatly in the last few months? +26.When was the last time you heard from your family? +27.Have you bought another computer and phone line just so you and your spouse +can logon at the same time? +28.Did you buy a faster, more powerful computer JUST so you can run BBS's +faster? +29.Do you rush home at lunch time JUST so you can check your e-mail, see who's +online and make your online game moves? +30.Do you have an anxiety attack when another family member needs the computer +for something? +31.When was the last time you went out with friends other than online friends? +32.When was the last time you played/used all those magnificent and expensive +programs and games you bought? +33.How many times have you heard from family or friends "I give up trying to +call you, your line is ALWAYS busy"? +34.Can you remember what you did for "leisure" time before you started BBSing? +35.When was the last time you were all caught up on your household chores? +36.Is the answer ALWAYS the same if someone asks a family member your where- +abouts......"on the computer....where else"? +37.Do you belong to more than one board so if one is crashed, or busy you can +logon to another? +38.When at work, instead of calling a meeting do say..."Wanna go into Chat"? +39.Do you have a chronic sore neck, from always looking over your shoulder, +when in "chat", for fear of a family member walking in? +40.In desperation has your mate devised acrobatic ways of making love to you +while you're online? +41.If your mate is a "user" do you call each other by your screen names? +42.Do you have a sticker on your window, notifying firemen the location of +your computer? +43.Do you have family members trained to bring you food and drink so you never +have to leave the keyboard? +44.Does :) :( :* ad the like starting to appear on your business and other +mail? +45.Do you find yourself SAYING..Kiss...Hugs..Smooch...LOL..instead of DOING +it? + This List Was Complied From ODYSSEY BBS c.1991 diff --git a/textfiles.com/bbs/qwkformt.txt b/textfiles.com/bbs/qwkformt.txt new file mode 100644 index 00000000..cda15788 --- /dev/null +++ b/textfiles.com/bbs/qwkformt.txt @@ -0,0 +1,52 @@ +====[ QWK file format ]================================================= + +All of the messages in a mail packet are contained in a file named +MESSAGES.DAT. The file's logical record length is 128 bytes. The first +record of MESSAGES.DAT always contains a copyright notice produced by +whatever mail door. Messages start in record 2 and use this format: + +Offset Length Description +------ ------ ---------------------------------------------------- + 1 1 Message status flag + ' ' = public + '-' = public and read + '+' = private + '*' = private and read + 2 7 Message number (as characters) + 9 8 Date (mm-dd-yy) + 17 5 Time (hh:mm) + 22 25 To + 47 25 From + 72 25 Subject + 97 12 Password (Not used by any PCBoard mail doors I know) +109 8 Refer to number (as characters) +117 6 Number of 128 byte blocks in message (counting the + header) +123 1 Killed message? 225 is active, 226 is killed +124 1 Conference number (0-255) + I have heard that MarkMail 2.0 uses two bytes for + the conference number, so the next byte may be used + too. +125 4 Not used + +The text of message continues in the next record. You can find out how +many blocks make up one message by looking at the value of "Number of +128 byte blocks". Message text is delimited by a "ASCII 227" symbol +between lines. + +The xxx.NDX files contain record numbers that point into the +MESSAGES.DAT file for actual messages. Each conference that contains +messages has its own "xxx.NDX" file. The "xxx" is the conference number +for the index file. + +Each NDX file uses a five byte logical record length and is formatted +to: + +Offset Length Description +------ ------ ---------------------------------------------------- + 1 4 Record number to point to corresponding message. + This number is in the Microsoft MKS$ BASIC format. + 5 1 Conference number. + +====[ QWK file format ]================================================= + \ No newline at end of file diff --git a/textfiles.com/bbs/qwkpacket.txt b/textfiles.com/bbs/qwkpacket.txt new file mode 100644 index 00000000..f2152f65 --- /dev/null +++ b/textfiles.com/bbs/qwkpacket.txt @@ -0,0 +1,82 @@ +This file briefly describes the QWK file format. + +The following is an abbreviated version of Appendix G of DELUXE.DOC: +DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD + All of the messages in a mail packet are contained in a file + named MESSAGES.DAT. The file's logical record length is 128 + bytes. The first record of MESSAGES.DAT always contains + Sparkware's copyright notice produced by The Qmail Door. + Messages start in record #2 and use this format: + + Starting Position,Length Description + ------------------------ ---------------------------- + 1,1 Message status flag + 2,7 Message number + 9,8 Date (MM-DD-YY) + 17,5 Time (HH:MM) + 22,25 To + 47,25 From + 72,25 Subject + 97,12 Password + 109,8 Message reference number + 117,6 Number of blocks + 123,1 Message status + 124,2 Conference number + + The text of message continues in the next record. You can + find out how many blocks make up one message by looking at + the value of "Number of blocks". Message text is delimited + by a pi symbol (ASCII 227) between lines. + + The xxx.NDX files contain record numbers that point into the + MESSAGES.DAT file for actual messages. Each conference that + contains messages has its own "xxx.NDX" file. The "xxx" is + the conference number for the index file. + + Each .NDX file uses a five byte logical record length and is + formatted to: + + Starting Position,Length Description + ------------------------ ------------------------ + 1,4 Record number of message + in MKS$ format. + 5,1 Conference number. +DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD + +The formula for converting x, a LONGINT in MKS$ format, to MKSToNum, a +binary integer, is: + +MKSToNum := ((x AND NOT $ff000000) OR $00800000) + SHR (24 - ((x SHR 24) AND $7f)); + +It's not pretty but it works (and it only handles positive numbers). + +The CONTROL.DAT is a text file containing information about +the host BBS and conference information. Here is a sample +one with comments: + +Ivo Andric Memorial BBS ;bbs name +Victoria, BC, CANADA ;bbs location +604-380-0297 ;bbs number +Gwen Barnes, Sysop ;format is "First Last, Sysop" +20001,ANDRIC ;DOOR_SERIAL,PACKET_ID +01-09-1991,14:54:44 ;mm-dd-yyyy,hh:mm:ss ..pkt time +GREG HEWGILL ;user name + ;name of QMENU file if exists +0 ;unknown +0 ;unknown +254 ;total # of conferences - 1 +0 ;# of first conf +Local ;name of conf (10 chars max) +1 ;# of second conf +I_Central ;etc...for 255 confs +... +255 ;this is the 255'th conf (#24 +U_C_Prog ; is omitted from this packet) +HELLO ;filename of welcome file +NEWS ;filename of news file +GOODBYE ;filename of goodbye file + +If you're looking at a real CONTROL.DAT, any further lines you can +ignore because current mail doors don't generate it (it's obsolete). + \ No newline at end of file diff --git a/textfiles.com/bbs/r&estory.txt b/textfiles.com/bbs/r&estory.txt new file mode 100644 index 00000000..881286e0 --- /dev/null +++ b/textfiles.com/bbs/r&estory.txt @@ -0,0 +1,219 @@ +=============================================== + FILES FROM THE FBI - BULLETIN BOARDS AND BADGES + =============================================== + + RUSTY & EDIE'S BBS SEIZED BY THE FBI + ------------------------------------ + +Rusty & Edie's BBS touted the fact that they had only two rules: 1. Have fun +and 2. No More Rules. It would appear they are going to soon add a third rule +to their operation - No Commercial Software. + +After several years operating as the biggest open secret in BBSland, the 124 +line BBS operated from the home of Russell And Edwina Hardenburgh in Boardman +Ohio was raided by the FBI. On Saturday afternoon, January 30, FBI agents +presented Rusty with a search warrant. Approximately 130 personal computers, +modems, LAN cabling, software packages, and subscriber records were seized as +evidence and hauled away - essentially terminating all operations. + +Claiming some 14,000 subscribers to a system sporting a registration fee of +some $89 per year and 124 access telephone lines, Rusty & Edie's was one of +the nation's largest bulletin board systems. They claimed some 3.4 million +calls since going online and were receiving some 4000 calls daily when the +system went offline. The system featured over a 100,000 shareware files on 19 +Gigabytes of file storage. They were charged with distributing copyrighted +commercial software on their BBS. And while the Software Publishers +Association (SPA) was quick to step forward and take credit for the FBI +action, it was actually quite late on the scene with this one. And therein +lies a tale. + +Five years ago, Bob Fairburn had a heart attack. A restaurant manager in +Kansas with a wife and children, Fairburn could not obtain life insurance and +was assured by doctors that he had a life expectancy of five years or less. +He pondered for months on how he could somehow assure his family an income +after his death. And he decided that there were two things a man could do in +America to generate ongoing income - write a book or invent something. + +So he set out to write the Great American Novel. After months of effort, he +read through his manuscript and decided even he wouldn't buy it. So he cast +about for something he could invent. But again, he found he just didn't have +the inspiration to be an Edison. His son had a small personal computer and +was already writing games in BASIC. Fairburn took a look at it and decided +this was something he could do. + +He bought every book he could find on computer programming, and he signed up +on Bob Mahoney's Shorewood Wisconsin EXEC-PC BBS. He downloaded hundreds of +files from the BBS containing code fragments, examples, programming +tutorials, and anything he could find on programming. Starting in BASIC, he +eventually moved on to PASCAL. And he came up with an idea for a program. He +called it HOME DESIGNER and it was basically a simple CAD package to design +home floor plans, place and arrange furniture, and try out various designs +for your home or office. + +Fairburn decided shareware wasn't the way to go to generate cash. So he +solicited software distributors for months. Eventually, a company in Florida +called Expert Software picked up the title and launched Expert Home Design - +at the staggering price of $14.95 retail. + +According to Fairburn, he only gets fifty cents for each copy sold, but the +program caught on and he reached the point that he was making a living. He +bought a farm outside of Leavenworth Kansas and to get needed physical +exercise, began clearing it and converting it into a wildlife park. He hired +an assistant, and continued software development. + +About a year ago, he dialed his old haunt at Bob Mahoney's EXEC-PC BBS, and +there was his commercial software program listed in the download directory +with BBS callers downloading it madly. Stunned, he called Bob Mahoney voice +and asked him about. Mahoney immediately apologized and removed the file from +the directory. In examining the file, they found a small file in it +advertising that it came from Rusty & Edie's BBS. Mahoney explained that +sometimes callers are confused by the difference between shareware software +and commercial software and in an effort to contribute something, they upload +commercial software to bulletin boards sometimes without realizing the +impact. "Most BBS operators will remove it immediately if you call their +attention to it," Mahoney assured him. + +So Fairburn dialed Rusty & Edie's BBS and did indeed find his program +available for download there as well. He selected the editor and began +drafting a message to the sysop explaining the situation and asking that the +file be removed. According to Fairburn, while he was typing the message, +Rusty broke into real-time chat and rather rudely told him that he wasn't +responsible for every file that anybody uploaded to the BBS, that they +received megabytes of file uploads each day, and that he would remove the +file whenever he felt like it and got around to it. + +Despite the harsh tone, Fairburn accepted this explanation. But when he +called a week later, the file was still there. + +"Understand," explains Fairburn, "I'm not Bill Gates. I only get fifty cents +per copy sold, and my family depends on this for a living. This guy was +running a giant bulletin board and taking in lots of subscriptions, and +basically he was stealing my software. I just got mad about it." + +Fairburn called the FBI office in Kansas City and complained. They were quite +nice but not very helpful during the call. But about a month later, Fairburn +answered a knock on the door to find an FBI agent on the front porch - there +to investigate his problem. Fairburn took the agent into the den and logged +onto Rusty & Edie's BBS. They logged the session to disk and he showed him +not only his own program in the directory, but copies of Borland's Software, +Novell's LAN software, a number of Microsoft programs, Quicken, and according +to Fairburn, "virtually every commercial game program made." + +Fairburn was discouraged to learn that the agent knew nothing about +computers. But he gave him a disk with the logged session on it, some files +they actually downloaded, and a copy of PKZIP so he could extract the files. +He patiently explained what PKZIP did, and why it needed to be done. The +agent thanked him and left - telling him they would turn it over to their +Cleveland office. + +Last October, nearly six months after the initial contact, the FBI contacted +Fairburn to ask if he would be willing to fly to Ohio at their expense to +testify against the Hardenburgh's in the event they decided to prosecute the +case. Fairburn agreed as long as they would cover his travel expenses. + +He had also notified the publishing company that distributed his software. +And apparently they did contact the SPA. The FBI had apparently contacted +several of the other software vendors whose programs were found in the log +files, and they had in turn contacted the SPA - ergo the SPA involvement. + +On January 30th, the FBI served a search warrant on Rusty & Edie's BBS, and +essentially trucked it away - an estimated $200,000 worth of computing +equipment. + +The bust has evoked mixed reactions online. While the eternally concerned on +the Internet were outraged by the Constitutional implications, competing BBS +operators were not quite so adamant. According to Kevin Behrens of Aquila +BBS, a 32-line PCBoard system in Chicago, "Rusty Edie's was the worst-kept +secret in the industry. I don't know if it's a shame or about time." + +Bob Mahoney of EXEC-PC was a bit more direct. "In some ways, this is a +competitive situation and every honest sysop is at a disadvantage. Imagine +operating a car wash with a competing car wash across the street. The +difference is that they give away a $20 gold piece with each car wash, but +you aren't allowed to because it is against the law." + +Mahoney went on to note, "There's also something a bit annoying about +computer people (BBS operators) ripping off other computer people (software +authors). It's a bit like cannibalism within the family. I have a problem +with that." + +Hardenburgh refused to comment on the situation noting the usual advice of +his lawyer not to discuss the case. "I will say I never thought something +like this could happen in America and I'm shocked and very disappointed." +Hardenburgh vowed to have the system back up on new equipment by March 1 at +the (xxx)xxx-xxxx number, and expressed his hope that "his caller base would +back him on this one." + +"When this is all over, I want to come out to that ONE BBSCON in Colorado and +tell you all an earful. You're not going to believe what can happen to a +BBS," vowed Hardenburgh. + +The situation may be further complicated by a recent change to the copyright +law, ostensibly driven by the SPA. On October 28, 1992, the 102nd Congress +passed Senate Bill 893 - which became Public Law 102-561 revising Title 18 of +the United States Code. Under Section 2319(b) of title 18, the criminal +penalties for copyright infringement were dramatically changed. Previously, +anyone making 1000 copies or more of a copyrighted work were eligible for the +maximum penalty. Under the revision, that is reduced to anyone making 10 or +more copies with a retail value exceeding a total of $2500 or more within a +180-day period. If found guilty, they may be subject to sentences of up to +five years and fines of up to $250,000. + +As of this writing, Hardenburgh has not been charged with any crime. Thomas +F. Jones, Cleveland special agent-in-charge noted in a statement that the +Youngstown FBI did serve a search warrant on Hardenburgh's home January 30th. +The warrant alleges the couple illegally distributed copyrighted computer +software programs to bulletin board subscribers without permission of +copyright owners. There was apparently no implication of pornography. + +And Fairburn? Well, he's exceeded his five year projected life span and seems +to be doing reasonably will from a cardiac perspective. He did drop a piece +of a tree on his arm with a loader in January and has a bit of a problem with +his arm. But his Expert Home Designer was extremely well reviewed in the +After Hours column of PC Magazine's August '92 issue, and while at $14.95 +it's not one of the big dollar generating software packages, numerically it +is the 17th fastest selling software package in America. It's discounted to +as little as $7.95 in grocery stores and apparently the country wants to +rearrange their furniture on screen. The program is available from Expert +Software, PO Box 143376, Coral Gables, FL 33134; (800)759-2562 voice; +(305)443-3255 fax. Bob Fairburn can be reached at 1004 2nd Ave., Leavenworth +KS, 66048; (913)651-3715 voice. + +Other BBS operators are concerned by the implications of the raids. +Typically, any BBS is subject to receiving uploads of commercial software +from callers. And while most do a very good job of screening out the obvious +Microsoft Word or Lotus 123 program, there are tens of thousands of +commercial programs like EXPERT HOME DESIGNER that aren't immediately obvious +in an environment that also includes over 100,000 shareware titles that are +perfectly acceptable to carry online. + +Most attempts by conscientious system operators to automate the task of +separating commercial software from shareware software have had very limited +success. Typically, search software examines uploaded .ZIP files to detect +content files with a certain 32-bit Cyclic Redundancy Check (CRC) signature. +But these signatures have not proven to be reliable or unique. Andy Keeves of +Executive Network BBS in Mount Vernon, New York, has devised what may be the +beginnings of a solution. A database has been compiled using the FWKCS +"Content Signature" system made available by Dr. F.W. Kantor of New York with +the cooperation of several software manufacturers. Kantor's system uses a 64 +bit signature based on both a CRC of the file and the file length. This is +proving significantly more reliable. + +The Executive Network supplies a diskette with instructions to any software +manufacturer on request in order to help them identify critical components of +their work. When the manufacturer submits the generated "signatures" to the +Executive Network, they are incorporated into a database. A software program +automatically deletes any uploads containing one of the registered +signatures. Software manufacturers can request the identification software by +contacting Mr. Black at Executive Network voice (914)667-2150 or by modem at +(914)667-4567. There is no charge for either the diskette or the service. BBS +operators will be able to download the database for their own use at no +charge. According to Keeves, the database already contains several thousand +signatures. + +Executive Network is one of the largest bulletin boards in the country with +over 12 GB of files online, international e-mail, and vendor support areas. +The Executive Network Information System, 10 Fiske Place, Mount Vernon, NY +10550; (914)667-2150 voice; (914)667-4567 BBS; (914)667-4817. + +Origin: TGC Adult BBS 812-284-1321/5465 \ No newline at end of file diff --git a/textfiles.com/bbs/r0dent.txt b/textfiles.com/bbs/r0dent.txt new file mode 100644 index 00000000..21d73bc9 --- /dev/null +++ b/textfiles.com/bbs/r0dent.txt @@ -0,0 +1,239 @@ + + + + *********************************** + ** A DAY IN THE LIFE OF A R0DENT ** + ** Viewed From: Music City BBs ** + ** 300/1200/2400 Baud, 20 Megs ** + ** (516)374-3092 24 Hours/7 Days ** + *********************************** + + + This is a summary of a typical day in r0dentia and if this is in any way +offensive to you, then please, by all means, feel free at any time during the +listing, to FUCK OFF AND DIE!!! + ==== === === ====== + + +-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- + +[Monday, 5:30 am] + + An alarm clock goes off and Johnny is getting out of bed. The first thing +he does is go over to his brand new apple computer that he got for Christmas. +It came with a deluxe Networker modem, a disk drive, even a color monitor! He +is going over to see if any rad piratez called his board during the night. + +"DARNIT!", he says... +"Watch your language, young man!", his mother replies, "That is no way for a +twelve year old to talk!" +"Sorry, mommy", he calls back. + + Johnny then hits 'G' on his copy of Gbbs 1.7d and he logs on to his board, +The Data Realm... + +[A similation of Johnny logging on] + +W +e +L +c +0 +m +E + +T0: + + +T! +h! +e! + ! +D! +a! +t! +a! + ! +R! +e! +a! +l! +m! + - + +** New passw0rdzzzz as 0f t0day!! + +** We R w0rking 0n all 0f the latest + m0dzzz including spinning kurs0rs!!!!!!!!!!!!!!!!!!! + + L8T0R0N.... + + D0ct0r Data + "J0hnny" + +LAST NAME +:><::> :> :> :> :> :> :><:<:<:<:<::> +:>DTATA +<: + +PASSWORD + +:>X1SYS0P +<: + +That's +rong!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! +Go home, crasher! U R A FAG!! + +L8T0R0N.... + + Johnny forgot his password on his own bbs! What a r0dent! + + Now, he gets out his latest version of A.E. and he decides he's going to +auto-dial The Safehouse. + +[Similation of D0CT0R DATA calling] + +Number ->16127247066 + +(He has a pulse dialing Networker) + +AE:Dialing aborted... + +Number ->// + + +AE:Dialing:16127247066 + +(Remember, he has a Networker!) + + He now gets out a printing of all 94 of his users (not including himself) +and starts reading it, deciding who to call for new warezzzzzzzzzzz + +"No way! I'm on The Safehouse!!!!!!!!" + +...connected to access port #2... + + + +PASSWORD (OR 'NEW'):'NEW' + +INVALID PASSWORD! + +PASSWORD (OR 'NEW'): + +BANDIT IS HERE! + + + (The sysop breaks into chat mode wonder ing what the hells going on...) + +Sysop:Who is this? + +D0ct0r Data:this is d0ct0r da +ta, who is th s +????????????????????       +S:This is the sysop... + +D:oh, what clubzzz r u i + in? + + + I JUST STARTED A LCLUB. + +HERE IS A MACRO: + +KAWL THE DATA REALM!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! + +LEAVE D0CT0R DATA FEEDBACK AND MAYBE +Y0U T00 CAN BE A MEMBER OF THE BEST +CLUB IN THIS AREA CODE, THE DATA THIEVES!!!!!!!!!!!!!!!! SO0 CAKAWL NOW!! + +LAYTRE.... + +L8T0R0N... + +D0C + + [The sysop now hangs up on him...] + + Johnny goes over and boots up his board The Data Realm.... + + He sits there watching the screen for 4 hours but no one "kawls" his board. +He then notices that the phone isn't even plugged into the wall and either is +the modem. So, he plugs them in... An hour laytre someone calls and they +chat +about the latest "warezzzzzzzz", about girls, and most of all, about SEX!!! +They seem to have this fantasy that they can get any girl they want. + + "Time for bed!", his mother calls up to him in his room at aroung 8:30 pm. + "Ok, mom!", he yells back... + On the screen he types to the other user: + "My mom is such a fucking bitch! She's making me go to bed and she wont buy +me that new hard drive i wanted! she sez i have to earn the money myself for +a +change! my parents are both ass holes! im shure! they only buy me a +computer, modem, disk drive, and a color monitor, and my own fone line. so +why +cant they buy me a hard drive?" + + [As you can see, most r0dentzzzz have no respect or gratitude for their +parents (z?) at all...] + + Some r0dentzz like to use movie charac- ters for their alias'. They use +such names as "Dirty Harry" or "The Ghost- buster" , etc., etc.... + +R0dentzzz always post on warezz boards. +(God forbid if they didn't!) + + They always "kawl" the new boards and try to krash them or even become co- +systems operator of them so they can put a spinning kurs0r in just like the +one +on The >> NEWS RELEASE <<< + +Dateline: San Luis Obispo, California + +The Constitutional right of Freedom of Speech by using the +Information Superhighway is being roadblocked by Joseph Provenzano, +one of the District Managers for Radio Shack - a division of Tandy +Corporation. + +Ms. Rochelle C. Skwarla, one of the System Operators (SYSOP) for a +local hobby computer Bulletin Board System (BBS) and also an employee +of Radio Shack was advised to consider shutting down her system or +leaving the company. + +Searchlight of San Luis Obispo, California has been in operation +since March 1990 and has become one of the largest, most popular, and +well respected BBSs on the Central California Coast. + +Ms. Skwarla has also been employed by one of the local Radio Shack +stores since April 1991. + +Ms. Skwarla and another coworker were advised on Saturday, May 14, +1994 by the company that the operation of their free (donation +optional) system was a conflict of interest and she should choose one +or the other. + +Rochelle gave the following statement: + +"I am a very strong believer in everyone's right to freedom of +speech. Preventing me from operating a free BBS would deny me and the +many hundreds of my callers this Constitutional freedom. I cannot +allow this to happen. I don't really have much of a choice. I am not +only standing up for my own rights, but most-importantly, for the +rights of everyone to access and make available the means to use the +Information Superhighway. If I allow my employer to dictate to me +what I can and can't do with my own equipment on my own time, where +will it end?" + +"Their control stops at the timeclock. If this were not so then +everyone's rights are in jeopardy. Your employer could tell you that +you can't do such-and-such off the job. For example: You work for an +insurance company that refuses to insure motorcycle riders because +they consider them to be too high a risk. Now lets say you own some +land which you allow off-road bikers to use free. Your employer says +that this is a conflict of interest and you can't do it. Should this +be allowed? How about if you wrote a letter to the local newspaper +editor why you felt motorcycle riders should not be discriminated +against. Should you be fired?" + +"A computer Bulletin Board System, or Online Information Service as I +prefer to call them, is a form of media. Something like a party line +telephone, mail, library, radio, television, magazine, and newspaper +all rolled into one. Almost everything --books, letters, speeches, +movies, and songs-- are now available through electronic means. How +you access it is through a BBS or OIS. Some systems are free, others +are not. We are talking about freedom of the press and the people. +The Information Superhighway is just now starting to be built. My +system is one of the on-ramps. It is open to traffic and will +continue to be so for years to come. I will fight this tooth and +nail if I have to. Like a turtle, you will never get anywhere if you +don't stick your neck out." + +John V. Roach, CEO and Chairman, Tandy Corporation, Tandy Trends, +Volume 9, Number 1, Page 8: "...I urge you to contact your +congressional representatives'offices - either by phone or by mail - +and let them know that you cannot support these bills [H.R. 3626, +H.R. 3636 & S.1822] unless they protect your Right to Own, your Right +to Choose, and your Right of Access on the Information Superhighway." + +>>> UPDATE: <<< + +The week following the ultimatum Ms. Skwarla's weekly hours were cut +back to 15. The following week to 8 1/2. On May 27, 1994 her hours +were cut back to 0 and she was advised that her services would no +longer be needed at that store. diff --git a/textfiles.com/bbs/raid.txt b/textfiles.com/bbs/raid.txt new file mode 100644 index 00000000..e3d34487 --- /dev/null +++ b/textfiles.com/bbs/raid.txt @@ -0,0 +1,66 @@ + +FBI raids major San Fernado valley computer bulletin board; +action follows joint investigation with SPA + +The Federation Bureau of Investigation on Tuesday, Sep. 13, 1994, +raided "Moonbeams," a computer bulletin board located in Northridge, +CA, which has allegedly been illegally distributing copyrighted +software programs. Seized in the raid on the Moonbeams bulletin +board were computers, hard disk drives and telecommunications equipment, +as well as financial and subscriber records. For the past several +months, the Software Publishers Association ("SPA") has been working +with the FBI in investigating the Moonbeams bulletin board, and as +part of that investigation has downloaded numerous copyrighted business +and entertainment programs from the board. + +The SPA investigation was initiated following the receipt of complaints +from a number of SPA members that their software was being illegally +distributed on the Moonbeams BBS. The Moonbeams bulletin board. It had +2 nodes available to callers and over 6,000 subscribers throughout +the United States and several foreign countries. To date, the board has +logged in excess of 1 million phone calls, with new calls coming in at +the rate of over 250 per day. It was established in 1987 and had +expanded to include over 6 gigabytes of storage housing over 10,000 +files available to subscribers for downloading. It had paid subscribers +throughout the United States and several foreign countries, including +Canada, Luxembourg, France, Germany, Finland, the Netherlands, Spain, +Sweden and the United Kingdom. + +A computer bulletin board allows personal computer users to access a +host computer by a modem-equipped telephone to exchange information, +including messages, files, and computer programs. The systems operator +(Sysop) is generally responsible for the operation of the bulletin board +and determines who is allowed to access the bulletin board and under +what conditions. For a fee of $49.00 per year, subscribers to the Moon- +beam's bulletin board were given access to the board's contents +including many popular copyrighted business and entertainment packages. +Subscribers could "download" or receive these files for use on their own +computers without having to pay the copyrighted owner anything for them. + +"The SPA applauds the FBI's action today," said Ilene Rosenthal, general +counsel for the SPA. "This shows that the FBI recognizes the harm that +theft of intellectual property causes to one of the U.S.'s most vibrant +industries. It clearly demonstrates a trend that the government +understands the seriousness of software piracy." The SPA is actively +working with the FBI in the investigation of computer bulletin boards, +and similar raids on other boards are expected shortly. Whether it's +copied from a program purchased at a neighborhood computer store or +downloaded from a bulletin board thousands of miles away, pirated +software adds to the cost of computing. According to the SPA, in 1991, +the software industry lost $1.2 billion in the U.S. alone. Losses +internationally are several billion dollars more. + +"Many people may not realize that software pirates cause prices to be +higher, in part, to make up for publisher losses from piracy," says Ken +Wasch, executive director of the SPA. In addition, they ruin the +reputation of the hundreds of legitimate bulletin boards that serve an +important function for computer users." The Software Publishers +Association is the principal trade association of the personal computer +software industry. It's over 1,000 members represent the leading +publishers in the business, consumer and education software markets. +The SPA has offices in Washington DC, and Paris, France. + + + CONTACT: Software Publishers Association, Washington + Ilene Rosenthal, 202/452-1600 Ext. 318 + Terri Childs, 202/452-1600 Ext. 320 diff --git a/textfiles.com/bbs/rbbs.txt b/textfiles.com/bbs/rbbs.txt new file mode 100644 index 00000000..c8c63405 --- /dev/null +++ b/textfiles.com/bbs/rbbs.txt @@ -0,0 +1,107 @@ + =*^*=*^*=*^--------------------------------^*=*^*=*^*= + =*---------HOW TO DESTROY AN RBBS-PC SYSTEM---------*= + =*----------PRESENTED BY PHREAK'S CABARET-----------*= + =*^*=*^*=*^---------612 755 3432-----------^*=*^*=*^*= + + + + IN THE COURSE OF YOUR HACKING AND PHREAKING ACTIVITIES, +YOU WILL RUN ACROSS A GEEK SYSOP OR TWO. IN THIS SERIES OF +ARTICLES, I AM GOING TO DESCRIBE WAYS TO DESTROY THESE GEEK +BOARDS. I WILL COVER MOST OF THE MAJOR BBS PROGRAMS IN THE +COURSE OF THIS TUTORIAL SET. THIS ISSUE WILL DEAL WITH THE +RBBS SYSTEM. + +BASIC SYSTEM FACTS : +-------------------- + +HARDWARE : IBM-PC (OR XT) + 2 DRIVES + 128K OR MORE + HAYES SMARTMODEM + +FILES : COMMENTS TO SYSOP STORED IN "COMMENTS" + MESSAGES STORED IN "MESSAGES" + HELP FILES : "HELP01" - "HELP07" + DOWNLOAD DIRCTORIES : "DIR" - "DIR 99" + (DIR CONTIANS LIST OF DIRECTORIES ON CPC 12.1C AND OVER. + IN EARLIER VERSIONS, ALL FILES ARE CONTAINED HERE.) + USER FILES (PASSWORDS, ETC) : "USERS" + SYSTEM CONFIG FILE (SYSOP'S PASSWORD, ETC) : "RBBS-PC.DEF" + + + BUG #1 : DOWNLOADING THE USER FILE + ---------------------------------- + +VERSIONS THAT MAY BE ATTACKED THIS WAY : CPC 12.1C AND BEFORE. + +PROCEDURE : DOWNLOAD "USERS." + READ PASSWORDS. + HAVE PHUN. + +NOTE : LOOK FOR PASSWORDS MARKED "SYSOP". THESE PASSWORDS ON CPC 12.1F HAVE +THE ABILITY TO DROP TO DOS. + +EXPLAINATION : +-------------- + + IBM'S BASIC (BY MICROSOFT) IS A RATHER HIGH LEVEL BASIC, WITH MANY +POWERFUL COMMANDS. PC DOS, HOWEVER, IS A RATHER IDIOT-PROOF DISK SYSTEM. +THE PROBLEM LIES IN THE DIFFERENT WAYS DOS AND BASIC INTERPRET A STRING +OF CHARACTERS. IN THE RBBS PROGRAM IS A LINE THAT SAYS : + + IF FN$ = USERS$ THEN 13520 + + FN$ IS THE NAME OF THE FILE YOU REQUESTED FOR DOWNLOAD. + USER$ IS THE NAME OF THE USER FILE (USERS). + 13520 IS THE LINE THAT PRINTS "FILE XXXX NOT FOUND. TYPE L FOR DIR" + + NOW THAT YOU KNOW HOW RBBS WAS MEANT TO TRAP HACKERS, IT IS EASY TO +EXPLAIN THE FALACY OF IT'S WAYS. BASIC SAYS THAT "USERS" IS NOT EQUAL +TO "USERS." (AND FOR GOOD REASON!!!). BUT PC DOS SAYS THAT "USERS" IS +EQUAL TO "USERS.". SO YOU ARE ACCESSING THE SAME FILE, BUT UNDER 2 +DIFFERENT NAMES. SINCE THE SYSTEM ONLY TRAPS ONE OF THEM, YOU CAN USE THE +OTHER ONE AND GET THE SAME DATA. THIS PROBLEM IS WELL KNOWN AND MOST +RBBS SYSTEMS HAVE BEEN FIXED TO AVOID THIS BUG. + + BUG #2 : DOWNLOADING THE SYSOP'S PASSWORD + ----------------------------------------- + +VERSIONS ATTACKABLE : ANY RBBS UP TO VERSION 12.2, WHICH IS STILL + IN TESTING BY TOM MACK. + +PROCEDURE : DOWNLOAD "RBBS-PC.DEFF" + READ PASSWORD + HAVE PHUN + + THE SYSOP'S PASSWORD IS CONTAINED IN A FILE CALLED "RBBS-PC.DEF". +THERE IS A TRAP IN THE RBBS CODE TO PREVENT YOU FROM DOWNLOADING IT. +BUT, HERE AGAIN, BASIC AND DOS ARE NOT IN AGREEMENT ABOUT THE +EQUIVILANCE OF STRINGS. BASIC SAYS THAT "RBBS-PC.DEFF" <> "RBBS-PC. +DEF" (AGAIN, RIGHTFULLY SO!!). BUT DOS TRUNCATES THE EXTRA CHARACTER, +AND ALLOWS YOU TO GET THE SAME FILE UNDER THIS NAME. (NOTE THAT ANY +CHARACTER WILL WORK AFTER THE "F" IN .DEF. SO IF THE SYSOP HAS FIXED +THIS BUG, TRY ANOTHER CHARACTER. HE MIGHT HAVE BEEN TOO DUMB TO SET +UP A LENGTH TEST AND JUST TRAPPED "RBBS-PC.DEFF"). THIS BUG, TOO, IS +WELL KNOWN, AND MAY BE FIXED ON SOME BOARDS. + + BUG #3 : OVERLOADING THE USER FILE + ---------------------------------- + +VERSIONS ATTACKABLE : ALL + +PROCEDURE : WRITE A PROGRAM THAT CALLS THE BOARD REPEATEDLY UNDER + NEW NAMES EACH TIME. + +EXPLAINATION : +-------------- + + THIS IS RATHER OBVIOUS. IF YOU KEEP FILLING UP THE USERLOG +WITH BULLSHIT I.D.'S, YOU WILL CAUSE IT TO BECOME TOO LARGE, AND +DOS WILL NOT ALLOW IT TO BE WRITTEN TO. THIS WILL CAUSE IT TO +"FATAL ERROR" WHENEVER A CALLER LOGS ON. + + + WELL, THAT ABOUT WRAPS IT UP FOR THIS TIME. NEXT TIME : HOW +TO CRASH A NET-WORKS SYSTEM. + diff --git a/textfiles.com/bbs/rbbsbox.txt b/textfiles.com/bbs/rbbsbox.txt new file mode 100644 index 00000000..6ac89571 --- /dev/null +++ b/textfiles.com/bbs/rbbsbox.txt @@ -0,0 +1,59 @@ + +RBBS-PC of Chicago presents..... + + The Official RBBS-PC "RBBS-In-A-Box"(tm) CD-ROM!! + + In an effort to make the setup and operation of a *good* bulletin +board system as quick, simple and painless as possible, we are happy +to annouce the RBBS-In-A-Box CD-ROM!! + + Using the laser technology of CD-ROM we have packed a ready-to-run +RBBS-PC bulletin board onto a CD-ROM. Plug it in, run the simple, +automatic installation program and you'll be up and running....it's +just that easy! Average installation time is under five minutes! +Unlike the other shareware CDs floating around, this one was designed +from the ground up to be used by Sysops. If you've seen any of the other +CD offerings, you'll be impressed with this one. + + This disk features the following: + + - A system designed by an experienced Sysop especially + for Sysops! + - The latest version of RBBS-PC, version 17.2A! + - Automatic installation of a complete, ready-to-run RBBS-PC + system, including all menus, bulletins, welcome screens + and help files! + - Over 7,000 public domain and shareware files ready for + downloading! + - All files compressed using the latest ZIP format for + maximum compression! + - All files categorized and organized into RBBS' File + Management System (FMS) format for instant access through + the BBS! + - CD-ROM optimized for speedy access to files! + - RBBS-PC Documentation files uncompressed and readily + available to Sysop on CD-ROM! + - CD-ROM user can quickly find and copy any file on the CD-ROM + in seconds through our special utility included on the disk! + - Supported through RBBS-PC of Chicago, with eight lines and + a Gig of storage on-line! + + All this for $149 plus $3 shipping!! (Illinois residents at 7% +sales tax $10.43). To order on-line using MasterCard or Visa, contact +RBBS-PC of Chicago at (312) 352-1035, then select the A)nswer option on +the Main menu. Choose the ORDERCD questionnaire and fill it out completely. +You'll be prompted for all the information necessary to process your order. + + Or you can mail a check for the above amount to: + + RBBS-PC of Chicago + P.O. Box 127 + LaGrange, IL 60525-0127 + + + Allow two weeks for delivery. For overnight deliver via +Federal Express, add $15. + + This disk was produced by RBBS-PC of Chicago, a service of +Loren D. Jones & Associates, Ltd. + diff --git a/textfiles.com/bbs/rcpm-ug.prn b/textfiles.com/bbs/rcpm-ug.prn new file mode 100644 index 00000000..64b175d0 --- /dev/null +++ b/textfiles.com/bbs/rcpm-ug.prn @@ -0,0 +1,1782 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + RCP/M GUIDE + + A users guide to the operation of remote CP/M systems. + + by + Jon Schneider + Sysop - Rio Grande RCP/M + 915-592-4976 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + RCP/M GUIDE + + + + + + + + + + + + + + + + Table of Contents + +0.00 INTRODUCTION 1 + +1.00 NULLS 2 + +1.01 THE LOG-ON 2 + +1.02 THE MAIN MENU 5 + +2.00 A FEW FUNDAMENTALS 8 + +2.01 MOVING AROUND 9 + +2.02 FINDING OUT WHAT'S THERE 10 + +2.03 WHAT'S IT DO ? 13 + +2.04 HOW DO I GET IT ? 17 + +2.05 MISCELLANEOUS COMMANDS 19 + +2.06 HELPFUL HINTS 23 + +3.00 GLOSSARY 24 + + + + + + + + + + + + + + + + +TABLE OF CONTENTS Page TOC-1 + + + + + + + + + RCP/M GUIDE + + + + INTRODUCTION + + + + When logging onto my first RCP/M system (Seneca, when it was +still in El Paso), I was confronted with a system that was +totally alien to me. My only contact with bulletin board systems +until then had been with Compuserve and some local BBS's that +were menu driven. + + Since I was totally lost, I decided that it would be best to +find some documentation on the operation of RCP/M's before +logging on again. If you have attempted to find such +documentation, you are well aware that it is not readily +available (I never did find any). + + Over the next year or so, I became familiar with the proper +operation of RCP/M's, and am now running my own. I have been +watching new users as they attempt to use my system, and it is +evident that many users do not know how to properly operate the +system. Even those that can eventually get what they need could +operate in a more effective manner. + + It is with these thoughts in mind that I have written this +users guide. There are many different BBS packages in use on the +various RCP/M's, but many of them have the same command structure +for the basic functions, and almost all of the utilities +available for use in CP/M are operated in the same manner. I have +attempted to cover as much as I can without being too specific in +regards to the implementation of the particular system you will +be using. + + I hope that this users guide will make the transition into +the world of RCP/M's much less frustrating for you than it was +for me. Please feel free to pass this document on to anyone who +is new to telecommunications, and let others have the chance to +learn how to operate with a minimum of effort and frustration. + + + + Jon Schneider + Sysop - Rio Grande RCP/M + El Paso, TX 915-592-4976 + + + + + + + + + + + + + +Introduction Page 1 + + + + + + RCP/M GUIDE + + +1.00 NULLS + + On the majority of the RCP/M's that you will find, the first +thing that you will be confronted with is the number of nulls +prompt. The usual reply will be 0, but some terminals, when +operating at 1200 baud, will have a tendency to drop characters +from the leftmost portion of the screen. This is caused by the +terminal's inability to move the cursor fast enough to the left +of the screen after receiving a carriage return. As the remote +terminal is still moving the cursor, the host system begins +transmitting the characters that make up the next line. + + This lack of speed will result in one or more characters +being lost. To eliminate this problem, nulls can be sent after a +carriage return, allowing the cursor to return to the far left. +The best way to determine the correct number of nulls is to +increase it by one until the problem of lost characters is +eliminated. + + +1.01 The Log-on + + After correctly setting the number of nulls, the next step +is to log onto the system with your name. Some systems expect the +first and last names to both be entered on one line, and others +will prompt for them seperatly. Pay close attention to this, as +you must log onto the system with the EXACT same name each time, +or the system will think you are a new user. + + Most systems will prompt you for the city and state if you +are logging on for the first time, so if you get this prompt, and +you have been on the system before, then you did not log in with +the same name as you did previously. Abort the call, and call +back using the correct name. + + If the system has determined that you are logging on for the +first time, you will be asked to enter a password. Be sure to pay +attention to the minimum or maximum number of characters allowed, +and since some systems are case sensitive, be sure to make note +of the case you used (upper or lower). + + You will more than likely next receive a new users file that +will give some of the do's and don'ts of the system, and the +steps that are necessary to become a validated member. READ THIS +FILE, as you won't see it on your next log-on. + + Most RCP/M's use a tiered system of access. A new user will +probably only be able to read the messages, and leave a parting +comment to the sysop. Validated users will be able to leave +messages, and if it is requested, have access to CP/M. You must +leave the required information before the sysop will validate +you, so be sure to see what the sysop requires. + + + + + +The BBS Page 2 + + + + + + RCP/M GUIDE + + + Most sysops will NOT leave you a message letting you know if +the access level you requested has been granted, so the only way +to ascertain if it has been is to attempt the function that you +requested. If the function is still not available, then access +has not yet been granted. Try again in 24 hours, and if still not +validated, leave another message to the sysop. + + I have included a sample log-on session below for a MBBS +system. Most are similar in nature. + +================================================================= + +How many nulls do you need? (0-9)? 0 + +>>> Rio Grande RCP/M +>>> Micro Bulletin Board System (tm) +>>> (MBBS 3.0 05/04/85 - (c) 1983 Kim Levitt) + +(ctrl-S or S pauses/ctrl-C or C aborts/ctrl-X or X skips) + +>>> Online since March 22, 1985 + + + (This would be the systems log-on message) + + +What is your FIRST name? JOHN + and your LAST name? DOE + +Scanning users file... + +Hello JOHN DOE, welcome to Rio Grande RCP/M... + +Is your name spelled correctly? Y + +Where are you calling from? (City, State)? El Paso, TX + +Please enter a logon password (60 chars. max): + +(Use any characters except controls, end with return. Enter +return only if you wish no password. Password does not echo.) + +Password? ############ + +Please re-enter password now to verify it has been received correctly. + +Password? ############ + +On next log on, this password will be required, so please don't forget it! + +Logging JOHN DOE to disk... + + + + + + +The BBS Page 3 + + + + + + RCP/M GUIDE + + + +You are caller # 554 + + Total # of log-ons: 1 + Current highest msg #: 44 + Active # of messages: 25 + +Building message index... + + + + This RCPM system is set up mainly to support the CP/M user, +and to operate it effectively, a knowledge of CP/M is required. +If you are not familiar with CP/M, it is recommended that you not +request access to CP/M. If you haven't used it before, you would +be completely lost. + + If you are interested in having access to the CP/M portion +of this board, leave a parting comment to the Sysop with your +name, address, phone number, type of computer, and type of termi- +nal program you are using. + + If you are only interested in access to the BBS, just leave +your name and phone number. The BBS portion of this board is very +easy to use, and no knowledge of CP/M is required. + + + Jon Schneider - Sysop + + + + +NOTE: The operator of this system assumes no responsibility for +the information contained in and/or distributed via this system. +This is an open-access communications system and is provided +as a public service to the community. All messages and files +which are placed on this system are the responsibility of the +contributor. Only public domain software and messages +relating to public access systems and computer hobbyists are +allowed to remain on-line, but the system operator cannot +be held liable for any illegal activities conducted via this +system. Users are cautioned not to use this system for such +activities or they will not be allowed access. + + +No MAIL waiting for you. + +Use 'S;NEW' to scan 18 message(s) added since your last log on. + + +05/13/85 4:23 PM [mins on: 1, mins left: 29] + +MBBS Function (A,B,C,E,G,H,K,M,N,P,Q,R,S,T,U,W,X or ? for menu)? + + + + +The BBS Page 4 + + + + + + RCP/M GUIDE + + +1.02 The Main Menu + + After a successful log-on, you will usually see a summary of +the message file, and then the main menu. The main menu is +usually a series of letters for the various functions, and almost +all will give a detailed list if the '?' is typed at the prompt. + If you are not familiar with the functions of a particular +BBS, be sure to save the menu in the ASCII save buffer of your +terminal program for print out and referral. Another useful +function that is usually available is H for HELP, and it should +also be saved to your buffer for later referral. + + The following listings will show the menu functions of some +of the more popular RBBS packages. + +================================================================= + + +MBBS Function (A,B,C,E,G,H,K,M,N,P,Q,R,S,T,U,W,X or ? for menu)? ? + + +(ctrl-S or S pauses/ctrl-C or C aborts/ctrl-X or X skips) + + + MBBS Functions: + + A = Auto wrap toggle K = Kill message S = Scan messages + B = show Bulletins M = '[More]' toggle T = Talk with sysop + C = exit to CP/M N = set # of Nulls U = Upper/lower case + E = Enter message P = change Password W = Welcome message + G = Goodbye (hangup) Q = Quick summary X = eXpert mode toggle + H = show Help file R = Read message ? = print this menu + + ; = separator used to enter multiple commands & data on one line + NEW, MAIL, TAGGED, 'search' = words useable as message 'numbers' + + (Use HELP, WELCOME message and BULLETINS for more information.) + + (NOTE: password required for CP/M access, but a clue is given.) + + + + + + + + + + + + + + + + + + +The BBS Page 5 + + + + + + RCP/M GUIDE + + +RBBS4102b + + +Major Functions supported (Capital letters on command line): + + C = Exit to CP/M E = Enter message + F = List subject files G = Goodbye (disconnect) + K = Kill message R = Read message + S = Quick summary N = Read New messages + +Minor Functions supported (Small letters on command line): + + b = Retype bulletins m = Show status of messages + p = Change password t = Toggle bell prompt + u = List user file w = Retype welcome + x = eXpert user mode + +Two subcommands are supported in support of major commands K,R & S: + + + = Lists following a message number operates on all messages + the user is authorized pausing appropriately between them + + * = Performs the same operation without pausing (for use with + hardcopy devices + +Commands may be strung together, separated by semicolons. For +example 'R;123' retrieves message number 123. For forward +sequential retrieval, use '+' or '*' after message number. N is +equivalent to R;#+. + +Software exchange is done under CP/M using the XMODEM program +(for intelligent transfer) or the TYPE fn.ft command (simple +ASCII listing). + + +Functions supported: by RBBS vers. 3.7 + + Bulletin File Chat with SYSOP + Enter Message * GO 'Leave the system' + Feedback for SYSOP News and information + Read Message Scan message base + Kill Message * Users file (Valid Members) + Toggle BELL List last callers * + Welcome Message

Password Change + Jump to CP/M X'pert User + Help + +* Special function requirements Verified users only + +Repeated Ctrl-K's abort, Ctrl-S pauses +Messages are Private unless addressed to ALL + +For Sequential retrieval (not scanning), use '+' after message #. +For example, R;10+ reads message #10 and all that follow, a Ctrl K +can be used to 'SKIP' to the next message in this mode. + + +The BBS Page 6 + + + + + + RCP/M GUIDE + + + + K-NET 84 (tm) RBBS Module Commands + + - display READ-ME file. - List system users. + - Exit to CP/M. - Message file status. + - Enter message(s). - display NEWFILES file + - Goodbye (log-off).

- Page Sysop (CHAT). + - HELP, display menu. - Read message(s). + - Kill a message. - Scan message file. + - Display this menu. - Video mode for Kaypro/MEX. + - Display this menu. + +Use "S" to quick scan the message file. + S;1 = Scan ALL S;NEW = Scan only new msgs since last logon. + +You can Read the messages in several different ways: + + R;1;R;5;R;9 Read msgs 1,5, and 9 (no pause between msgs). + R;1+ Read msgs in forward sequential mode (pause). + R;NEW Read new msgs since your last logon (pause). + +================================================================= + + + A few of the commands available require further explanation, +and different letters may be used for the same commands on +different boards, so be sure to list the menu for the system you +will be using. + + EXPERT USER TOGGLE: This is used to toggle the command line +prompts to much shorter prompts, such as "Command:". If you are +familiar with the system, this will save you time. + + TOGGLE BELL: Many systems will ring the bell on your +terminal every time they expect user input. If you find this +annoying, just toggle the bell off with this function. + + ENTER MESSAGE: This function will vary greatly from system +to system, and it will be necessary to read the help file for the +one that you are using. Some will support Word Star like line +editing (RBBS 4102), while others will require retyping the +entire line to be edited. + + The rest of the functions are pretty much self-explanatory, +so no further detail is necessary. The rest of this users guide +will be devoted to operation while in CP/M (usually entered by +typing 'C' from the function prompt). + + + + + + + + + + +The BBS Page 7 + + + + + + RCP/M GUIDE + + + +2.00 A FEW FUNDAMENTALS + + + The real power of a RCP/M is in it's database. Many systems +are running hard disks, some up to 150MB. That is a huge amount +of software, and it is usually separated into different drive and +user areas. For those not familiar with user areas, they are the +number you will see after the drive letter, such as 'A2>' or +'D5>'. + + If you are use to the standard Console Command Processor +(CCP) that CP/M uses, you have been receiving only a drive letter +as the command prompt. If you ever changed user areas, you had to +use the USER command. Even while in a user area other than 0, you +still only received a drive letter for the prompt, with no +indication a what user area you were in. + + Most RCP/M's have replaced the standard CCP with one of the +popular replacements, ZCPR, ZCPR2, ZCPR3, NZCPR, or EZCPR. These +packages will allow you to change drives and user areas at the +same time, and will show the both the drive and user area in the +prompt. + + Another difference between the standard CCP and one of it's +replacements is in the way commands are handled. The sysop will +define what is called a search path for the user. This means that +the user can be logged onto any drive and user area, and if the +command he desires lies in any of the drive/user area defined in +the search path, the command will be executed, without the +operator having to prefix the command with the drive/user area, +or be logged into the drive/user area where the command resides. + + Most sysops will define the search path as "Current Drive, +Current User", then "Drive A, User 0". All of the commands that +are available to the user are then placed on drive "A0:" The +easiest way to find out what commands are available to you is to +do a directory of drive "A0:", and any file with the extension +".COM" is an available command. + + +Listed below is a directory of a typical RCP/M's drive "A0:" + +A0>DIR + +Time on system is 10 minutes + + + Drive A0: files: 16 space used: 184k (2056k free) +-ROOT . 0k | LDIR .COM 8k | TYPE .COM 8k +05/11/85.DQR 32k | LUX .COM 8k | WHATSFOR.COM 8k +BYE .COM 8k | MAP .COM 8k | WHATSNEW.COM 8k +CHAT .COM 8k | MBBS .COM 48k | XMODEM .COM 8k +DIR .COM 8k | RDIR .COM 8k | +FILE .COM 8k | SECTION .COM 8k | + + +Once in CP/M Page 8 + + + + + + RCP/M GUIDE + + + If you were logged onto this system, the only commands that +would be available to you are those with the .COM extension. +Several of the commands (DIR and TYPE) appear to be the same as +the standard CCP's resident commands, but in reality, they are +enhanced versions of the commands, with the resident versions +disabled. + + You will also notice that two of the files are not .COM +files, '-ROOT' and '05/01/85.DQR'. You will usually find the +first file in a directory has a '-' in front of it, and occupies +0k of disk space. This is the name of the particular directory +that you are logged onto. + + In this case, you are logged onto the 'ROOT' of the system, +where all the commands reside. The other file is a squeezed +master directory, made on the date listed. I will explain what a +squeezed file is later in this guide. + + +2.01 MOVING AROUND + + + One of the first things you must learn how to do, once you +have entered CP/M, is to find out where you want to go, and how +to get there. The two commands that facilitate this are SECTION +and MAP. There are others used on some systems (ones using ZCPR3 +in particular), and they will be covered also. + +SECTION: This command has two functions, one is to list the +available sections, and the other is to move to the section +desired. If the command SECTION is typed by itself, you will get +the following display. + +A0>SECTION + +Available sections are: +ROOT UTIL ZCPR DBASE +TELECOM LANG PC-MSDOS WS +KAYPRO MISC SYSLIB TANDY +NEWIN MODEM TRSDOS TEXT +HELP + +Type "SECTION ?" for detailed list + of available sections. + +Type "SECTION " to log + into a particular section. + + As you can see, a listing of all the sections (directory +names) is supplied, and if a more detailed explanation of what +each section contains is desired, you can type 'SECTION ?'. All +that has to be done to log onto the section that you are +interested in is to type the command 'SECTION . + + + + +Once in CP/M Page 9 + + + + + + RCP/M GUIDE + + +A0>SECTION MISC + +C2> + + You are now logged onto drive 'C2:', and are in the section +dedicated to miscellaneous files. The same basic procedure is +followed with the command PWD. After typing the PWD command, a +listing of available sections is shown. To log onto that section, +all that is necessary is to type the sections name at the command +prompt, followed by a semicolon. + + +A0>MISC: +C2> + + The command GO functions in much the same way as SECTION. +Another way to move around is with the command MAP. + + +A0>MAP + +MAP v1.02, 03-01-1985 + +A0: = ROOT | A1: = UTIL | A2: = ZCPR | A3: = DBASE +A4: = TELECOM | A5: = MODEM | A6: = NEWIN | A7: = HELP + +B0: = TRSDOS | B1: = LANG | B2: = PCMSDOS | + +C0: = WS | C1: = KPRO | C2: = MISC | + +D0: = SYSLIB | D1: = TANDY | D2: = TEXT | + +Use SECTION to log into the area by name + + + You now have the option of using SECTION to log into the +directory that you want (if SECTION is available), or logging +onto the drive/user with its actual drive designation. If you are +using the system for the first time, it would be wise to capture +the information supplied from these utilities in your text buffer +for later referral. + + +2.02 FINDING OUT WHAT'S THERE + + There are very few systems that do NOT use Super Directory +(SD) as the directory command, so that is the program that will +be covered in detail. The command DIR by itself will invoke the +following display. + + + + + + + + +Once in CP/M Page 10 + + + + + + RCP/M GUIDE + + +A4>DIR + +Time on system is 22 minutes + + + Drive A4: files: 19 space used: 952k (1824k free) +-TELECOM. 0k | MBYE35 .LBR 96k | RDIR13 .LBR 24k +GO .ASM 24k | MBYE36 .LBR 80k | SD98 .LBR 80k +LDIR13 .LBR 16k | MBYEMOD .001 8k | SECTION2.AQM 8k +MAP .AQM 16k | RBBS .LBR136k | TYPEL36 .LBR 24k +MBBS29 .LBR136k | RBS4102B.LBR104k | WHATSNEW.LBR 24k + + + More information is supplied with SD than is normally +obtained with the standard CCP's resident command. The size of +the file is listed, and the listing is alphabetized. The size of +the file as shown by DIR may not necessarily be the same size +that will be occupied once it is on your disk. This is dependent +on the size of the allocation blocks of the drives that the file +is on. + + SD has many options available, and I will cover the more +useful ones. All options must be supplied after a '$' at the end +of the command . I will give several examples to give you a +general idea. + + A - Show all user areas + D - Show all drives + L - Give a directory of a Library file + N - No paging (no MORE prompt) + 4 - Give a 40 column display + 6 - 64 column + 8 - 80 column (usually the default) + + +DIR $AD - Will show a directory of all drive and user areas. +DIR $ADLN - Will show a directory of all drive and user areas, + including directories of all library files, and + will give a continuous display without the 'MORE' + prompt. + +DIR RBBS.LBR $L - Will show a library directory of the file + RBBS.LBR (assuming you are logged onto the + drive/user where the file resides). +DIR RBBS.LBR $AD - Will search all drive/user areas, and show + where the file RBBS.LBR is located. +DIR RBBS*.* $AD - Will search all drive/user areas for any file + which contains RBBS as the first 4 letters, + and show where they are located. + + If at any time you wish to abort the directory program, type +^C, and it will terminate. There are many more options available, +but they are usually accessible only to the sysop, so they won't +be covered. + + + +Once in CP/M Page 11 + + + + + + RCP/M GUIDE + + + Another directory program that is available is RDIR, and it +is used to ascertain the time necessary to download a file. It +will usually co-exist with DIR, and will automatically determine +the baud rate that you are logged on at. + +A4>RDIR + +-TELECOM. 0k 0:00 | GO .ASM 24k 10:04 +MAP .AQM 16k 5:55 | MBBS29 .LBR 136k 81:32 +MBYE36 .LBR 80k 45:18 | MBYEMOD .001 8k 2:18 +RBS4102B.LBR 104k 62:09 | RDIR13 .LBR 24k 13:09 +SECTION2.AQM 8k 4:55 | TYPEL36 .LBR 24k 11:18 +XM-MBYE .DQC 8k 1:55 | XMDM106 .LBR 96k 59:00 + +A4>> Files: 19 Used: 952k Free: 1824k Time: 8:59:40 at 300 baud + + + In the example shown above, the file 'GO.ASM' would take 10 +minutes and 4 seconds to download at 300 baud. + + There is one more commonly used directory program, but +before it is covered, a short explanation of library files is in +order. As far as CP/M is concerned, a library file is handled as +one file on the disk, but it will actually contain many separate +files, and include its own directory. The individual files can be +extracted from the library, and then used in the manner that they +were originally intended. + + The reason for libraries is beyond the scope of this users +guide, but the utilities and documentation for them are available +on most all RCP/M's, and many of the system commands will support +them. The one that will be covered now is LDIR, and it is nothing +more than a program that will show the directory of a library +file (like DIR $L did). + + +A1>LDIR VF150 (note that the extension .LBR is not needed) + +LBR directory for VF150 .LBR: (size in k) + +VF150 .DQC 4k | VF150 .COM 12k + + This is a small library file, and in actual practice they +can contain 100 entries or more. Usually all the files necessary +for a particular application will be contained within one +library. Without libraries, RCP/M's would not be able to hold +near the amount of software that they do now. It also makes it +easier to obtain all the files necessary for one application, as +you will only need to perform one file transfer, rather then +several. + + + + + + + +Once in CP/M Page 12 + + + + + + RCP/M GUIDE + + +2.03 WHAT'S IT DO ? + + Now that you know where the files are, and how to get there, +you need to be able to find out just what the file does . Many of +the file names for CP/M programs are cryptic, to say the least, +and unless you are familiar with it, you have no idea what its +function is. This is where the TYPE command comes in. + + TYPE is usually the program TYPEL, and it, like SD, is much +more versatile than the standard CCP resident command. Only +certain files can be TYPE'd, so now is a good a time as any to +cover the standard file extensions, and what they mean. All of +those listed directly below can be TYPE'd. + + + BAS - Basic language source code. + TXT - A standard format text file. + CCC - 'C' source code. + DOC - A documentation text file. + WS - A Word Star formatted text file. + PAS - Pascal source code. + ASM - Assembly source code. + MAC - Assembly source code for MAC. + DIR - A directory listing. + HLP - Help file. + + + If the second letter of the extension is 'Q', then the file +is a SQUEEZED file, and it must be handled differently. For +example, if a file has the extension .BQS, it is squeezed basic +source code, and .WQ means it is a squeezed Word Star formatted +text file. + + Squeezing is a method used to compress a file, and after a +file has been squeezed, it will take up less disk space. A file +that has been compressed in this manner is not usable until it +has been UNSQUEEZED, but TYPE will allow you to view it, as it +knows that the file has been squeezed by the 'Q' in the +extension, and will handle it accordingly. + + There are many files that cannot be TYPE'd, and the more +common ones are listed below. If a file type you are interested +in is not contained in either of these extension lists, go ahead +and try it, as the most damage that can be done is usually to +mess up your display by sending video control codes. + +UN-TYPEable file extensions. + + COM - Command files. + LBR - Library files (individual members CAN be TYPE'd). + REL - Relocatable object code. + OBJ - Object code (usually a COM file). + OVL - Overlays. + + + + +Once in CP/M Page 13 + + + + + + RCP/M GUIDE + + + To TYPE a file, just enter the command TYPE filename.ext, +for example; + +A0>TYPE DEMO.TXT + +TYPEL v3.3 (c) ESKAY 07-07-84 +(DEMO.TXT) + +This is a short demo of a text file as typed by this program. + +A0> + + + To TYPE a file from within a library, enter the command TYPE +LBR-FN MEMBER-FN.EXT. For example, if the library is named +RBBS.LBR, and the file in the LBR was RBBS.DQC, enter the command +'TYPE RBBS RBBS.DQC'. Notice that the LBR extension was not +necessary, as TYPEL assumes that if two filenames are supplied as +arguments, then the first filename is a LBR. + + The sysop has the option of limiting the number of lines +that TYPEL will display before aborting, and this is sometimes +done to avoid having the system tied up by someone TYPE'ing a +very long text file. By reading the first few lines, a user can +usually determine if he wants the file, and if he does, other +methods are available to obtain it. + + One other type of file is usually found on RCP/M's and they +are there for the express purpose of being TYPE'd. They usually +have a filename like -READ.ME or README.NOW. These files are +short text files that contain information that is important, and +should be read by the user. + + If the command TYPE is entered with no parameters, you will +receive a short help file that is built into the program. It will +show the various options that are available. + + +A0>TYPE + +TYPEL v3.3 (c) ESKAY 07-07-84 + +TYPEL v3.3 universal single-file lister +Usage; + TYPEL [du:]fn[.ft] [fn.ft] +Examples: + TYPEL MDM722 MDM722.IQF types member file in LBR + TYPEL TEST.AQM types normal file + TYPEL F4:TEST.BQS0 accepts ZCPR drive/user + TYPEL FOO.ASM $N $N option=not paging + TYPEL BAR.ZOT $L $L option=LST: device +If 1 argument is supplied, single file is typed. +If 2 arguments, TYPEL assumes first arg is type LBR +and attempts to type LBR member. + + + +Once in CP/M Page 14 + + + + + + RCP/M GUIDE + + + + + To reiterate, the method used to find out what a file does +is to locate either within the LBR directory, or on the same +drive/user area, a DOC or text file, or the source code, and TYPE +the file. You should be able to ascertain the purpose of the file +within the first few lines of the selected text file. + + There is another utility that makes finding out what a file +is for much easier, but it is fairly new, and is not yet popular. +It is one of the best programs available for RCP/M usage to come +out recently, and I hope that it gains wide acceptance. It's +WHATSFOR, and can be implemented on any system that is running +XMODEM104 or later. + + If you type the command 'WHATSFOR' with no parameters, a +complete listing of the database will be supplied, including a +short description of each file. As large as some RCP/M's are, +this file can be quite lengthy, but since the last files entered +into the database are the first listed, you only need to read the +first entries to find out what the newest programs added do, and +then abort the rest of the listing with a ^C. + + If you supply a parameter to the WHATSFOR command, the file +descriptions will be searched for matches with the parameter, and +only those matching will be printed. For example, + +A0>WHATSFOR SPREADSHEET + +WHATSFOR - copyright 1985 by Irvin M. Hoff - 02/22/85 +[type ^S to pause, ^C, ^X or ^K to abort, ? for help] + +wait a moment... +------------------------------ +CHALK.LBR + A public domain spreadsheet. + +------------------------------ +[End of listing] + +A0> + + + You could then use the command 'DIR CHALK.LBR $AD' to find +out which drive/user area the file was located on. There are +several options available for parameters, and entering the +command 'WHATSFOR ?' will display the built in help file. + + + + + + + + + + +Once in CP/M Page 15 + + + + + + RCP/M GUIDE + + +A0>WHATSFOR ? + +WHATSFOR - copyright 1985 by Irvin M. Hoff - 02/22/85 +[type ^S to pause, ^C, ^X or ^K to abort, ? for help] + +wait a moment... + + Examples of how to use: + + B>WHATSFOR MOD + B>WHATSFOR MOD|BYE + B>WHATSFOR M7 + B>WHATSFOR \M7 + B>WHATSFOR WPHL + B>WHATSFOR .A?M + + If no string is included, all the file is shown. A '|' allows + numerous strings to be used at the same time. '?' is used for + "any character at this position". A '\' fakes a line feed and + looks only at the start of the filename line. + +B0> + + + There is another fairly new RCP/M utility called WHATSNEW, +and when used in conjunction with WHATSFOR, provides a very quick +method of finding out what the latest uploads are, where they are +located, and what they do. + + WHATSNEW is utility that will print out a listing of the +uploads portion of the XMODEM log file, showing all recent +uploads, where they are located, the time it took to upload, and +who uploaded it. For example; + +A0:WHATSNEW + +WHATSNEW Type ^S to pause, ^C, ^X or ^K to abort + +wait a moment... + +D/U Filename Size Speed Date Time Uploaded by + +A06: MBBS30 .LBR 150k 1200 bps 05/08/85 05:00 BILL ZUMWALT +A06: MXO-MDM2.AQM 5k 1280 bps 05/05/85 17:10 SYSOP +A06: VF150 .LBR 15k 1200 bps 05/05/85 14:21 GRANT SMITH +A06: SDL30 .LBR 5k 1200 bps 05/05/85 14:17 JOHN DOE +A06: LU8643 .DQC 7k 1200 bps 05/05/85 07:26 JANE SMITH +A06: LU8643 .EXE 24k 1200 bps 05/05/85 07:23 BILL ZUMWALT + + + After you examined the WHATSNEW log file, and have decided +that one of the files appears interesting, or you have no idea +what it does, use WHATSFOR. If you wanted to find out what the +file MBBS30.LBR was, you would enter the following command; + + + +Once in CP/M Page 16 + + + + + + RCP/M GUIDE + + +A0:WHATSFOR MBBS30 + +WHATSFOR - copyright 1985 by Irvin M. Hoff - 02/22/85 +[type ^S to pause, ^C, ^X or ^K to abort, ? for help] + +wait a moment... + +------------------------------ +MBBS30.LBR + A BBS package that needs MBYE to run under. It is the BBS that + this board is running. One of the nicest packages currently + available. + +------------------------------ +[End of listing] + +A0> + + + As you may have noticed, I did not have to type the entire +file name and extension for WHATSFOR to find the description. If +there were any other file descriptions that contained the string +MBBS30, their descriptions would have been listed. + + These utilities makes any RCP/M system much easier to use, +and it's amazing how little they are utilized by most callers. If +you are in the habit of calling RCP/M's long distance, then they +can save you a considerable amount of time and money. If the +system you use does not have these utilities online, try to talk +the sysop into making them available. + + +2.04 HOW DO I GET IT ? + + Now that you what the file does, where it is located, and +that you want it, you need to find some way to get it onto your +disk. All of the systems that I know of use the same program to +transfer files, XMODEM. It is very simple to operate, but gives +new users more problems than any other. + + There are only a few options available, and a list of them +can be obtained by entering the command 'XMODEM' with no +parameters, as shown in the next example. + + + + + + + + + + + + + + +Once in CP/M Page 17 + + + + + + RCP/M GUIDE + + +A0>XMODEM + +Time on system is 17 minutes. + +XMODEM v106 + +Uploads files to A6: (1696k free space is available) +Private files to D14: + +++ Examples of valid options ++ +XMODEM S B1:HELLO.DOC to send from a named drive/area + +XMODEM L CAT.LBR CAT.COM to send a file from a library +XMODEM L CAT CAT.COM (.LBR extent may be omitted) +XMODEM R HELLO.DOC to receive a file from you +XMODEM RP HELLO.DOC to receive in a private area + +XMODEM A to show areas/available space for uploads + +(the "C" in RC or RPC receives via checksum rather than CRC) +(If you use R, it will switch from CRC to checksum mode after 5 retries) + +A0> + + + There are two ways to initiate a transfer TO you. Use the S +parameter for normal files, and the L parameter for a file within +a library. Be sure that you are either logged onto the drive/user +area where the file resides, of specify it as part of the file +name as shown in the above help file. + + +B0>XMODEM S KSMED.BAS + +Time on system is 8 minutes. + +XMODEM v106 +File open: 30 records (4k) +Send time: 2 mins, 18 secs at 300 bps +To cancel: use CTRL-X numerous times + +(Now is the time to do whatever your terminal program requires) + +B0> + + + After receiving the previous message, the file transfer must +be started from your end. How this is done is dependent on the +terminal program that you are using. For example, if you are +using MEX, you would enter a ^J, followed by E. You would then be +in the command mode, and from the command prompt you would enter +the command 'RT KSMED.BAS'. This tells MEX to start a file +transfer, it will be receiving the file, its to be named +KSMED.BAS and to return to terminal mode when finished. + + + +Once in CP/M Page 18 + + + + + + RCP/M GUIDE + + + When the file transfer is complete, you will be returned to +the drive/user prompt, and the file will be on your disk. The +procedure to follow for uploads is very similar, except you use +either the R or RP parameter. The RP parameter is for uploading a +file to a private area for the sysop, where other users will not +have access to it. The procedure for MEX on a file upload would +be almost identical to procedure followed for downloading, except +the command 'ST' would be entered from the MEX command prompt. + + + +A0>XMODEM R TEST.OBJ + + +Time on system is 28 minutes. + +XMODEM v106 (CRC is enabled) +File will be received on A6: +1696k free space is available +File open - ready to receive + +(This is the time to do whatever your terminal program requires) + + +A0> + + + XMODEM versions 104 and higher have built in support for the +WHATSFOR utility. If this feature has been implemented, after the +upload is completed, you will be prompted for a description of +the file. This description must be 7 lines or less, and is the +description that other users will see when using WHATSFOR. + + +2.05 MISCELLANEOUS COMMANDS + + + There are several more standard commands, but they are all +simple to use. They will be covered in the following text. + + CHAT - Used to page the sysop, and 'chat' with him. + RBBS - Used to enter the BBS. To re-enter without relogging + on, type RBBS P (sometimes will be MBBS). + BYE - Used to log-off the system. + LUX - A library utility used to log into a library file, + contains its own documentation. + TOS - Time on system. + FILE - Used to locate the drive/user area a file is on. + + + + + + + + + +Once in CP/M Page 19 + + + + + + RCP/M GUIDE + + + LUX is a library utility that allows "logging on" a library +file, and performing many of the standard RCP/M operations on an +individual library member. To invoke LUX, just type the command +LUX, followed by the library's filename. For example; + + +A0>LUX NULU11F1 + +LUX v4.2 as of 07-Oct-84 + + + LUX directory for NULU11F1.LBR + +MLOAD23 .COM 3k : NULU11 .DQC 34k : NULU11 .NOT 1k +NULU11F1.COM 16k : NULUTERM.AQM 3k : NULU11F1.ASM 2k + +This file contains 6 members in 445 active sectors for a total of 56k + + +[ in LUX CTRL-C to exit, HELP for menu ] + +A1:NULU11F1.LBR=> + + + You are now logged onto the library NULU11F1, and can +perform many functions on the libraries individual members. To +obtain a short HELP menu, just type HELP from the LUX command +prompt. + + +A1:NULU11F1.LBR=>HELP + +You are presently attached to a library file with the +LUX utility. These are the available commands: + +LUX filename - Attach to another LBR file +LUX du:filename - Attach to LBR file on specified du: +DIR, D, or SD - Display attached library members +FILES - Display other .LBR files on this du: +TYPE filename.typ- Display ASCII file contents +CHEK filename.typ- Run CHEK on requested member +CRCK filename.typ- Run CRCK on requested member +SEND filename.typ- Sends a library member file +XMODEM S filename.typ- Same as SEND command +CHAT - Chat with SYSOP (if available) +BYE - logs off the system +TIME - Displays date and current time +NEW (WHATSNEW) - List of new files on-line +HELP - Displays this menu + +[ in LUX CTRL-C to exit, HELP for menu ] + +A1:NULU11F1.LBR=> + + + + +Once in CP/M Page 20 + + + + + + RCP/M GUIDE + + + If you wanted to 'TYPE' one of the members of the library, +you would only need to invoke the command TYPE fn.ext, for +example; + + +[ in LUX CTRL-C to exit, HELP for menu ] + +A1:NULU11F1.LBR=>TYPE NULU11.NOT + + +LUXTYPE ^S pause, ^C aborts, ^X skips to next file + +Listing of member file: NULU11.NOT + +2/1/85 + +Please let me know if you work with libraries that have in excess +of 200 members. I am seriously considering some future NU( +upgrades that would limit the maximum library size to somewhere + + (I aborted with a CTRL C) + +[ in LUX CTRL-C to exit, HELP for menu ] + +A1:NULU11F1.LBR=> + + + It should be noted that when you invoke the DIR command +while in LUX, you will obtain a directory of the library, not the +currently logged drive/user area. To obtain a directory of the +drive, invoke the command 'FILES'. This will give a directory of +all library files on the currently logged disk. For example; + + +A1:NULU11F1.LBR=>FILES + +Time on system is 07 minutes + + + Drive A1: files: 26 space used: 584k (2056k free) +@ .LBR 8k | DU-V89 .LBR 48k | LOGALL .LBR 8k +BISH111 .LBR 24k | DUPUSR2 .LBR 8k | MLOAD24 .LBR 32k +BROWSE .LBR 16k | EDFILE .LBR 24k | NSWP207 .LBR 32k +BU14 .LBR 72k | EDIT11 .LBR 16k | NULU11F1.LBR 56k +COMPARE .LBR 8k | FBAD59 .LBR 32k | PRINT23 .LBR 8k +DIF .LBR 32k | FINDU11 .LBR 16k | PROBE12 .LBR 24k +DIRREP1 .LBR 16k | LISTT15 .LBR 8k | PSET13 .LBR 24k + +[ in LUX CTRL-C to exit, HELP for menu ] + + +A1:NULU11F1.LBR=>CTRL-C entered + + >> exiting LUX - standby +A1> + + +Once in CP/M Page 21 + + + + + + RCP/M GUIDE + + + + You can also perform xmodem transfers of individual members +while logged onto the library, and you do not have to exit LUX to +perform them. The syntax for the transfer will differ from a +normal xmodem library member transfer, so be sure to read the +help file. + + Another useful utility available on some systems is 'FILE'. +It is used to locate a particular file(s) in the database, and is +easier to use than the 'DIR $AD' option. For example, to locate +all files that begin with the characters "MB"; + + +A0>FILE MB*.* + + +FILE v21 - ^X to abort +searching... + + A0:MBBS .COM A4:MBYE36 .LBR A6:MBYEOVL1.LBR + +A0> + + + + CHAT is a command used to page the sysop, and will allow the +sysop and the user to communicate by entering text at their +keyboards. For example; + + +A0>CHAT + + +CHAT v42 +Hold on, SYSOP ..... +Will page operator, use ^C or ^X to abort. + |-------------------------| +Ringing: ... + +Operator is available, please go ahead... +(Use ^C or ^X to exit and return to CP/M) + + +This is a demo of CHAT. + +A0> + + + + I believe that covers most of the common RCP/M utilities. If +you read this manual carefully, you should be able to operate +effectively on any system. + + + + + +Once in CP/M Page 22 + + + + + + RCP/M GUIDE + + +2.06 HELPFUL HINTS + + If you are attempting to use a utility on a file, and are +advised that the file does not exist, make sure that you are +logged on the the drive/user area where the file is located, or +specify the drive/user in the appropriate location in the +utilities parameter. + + If you are logging onto a system for the first time, have +your ASCII save buffer toggled on for the session so that you can +read the important files offline, and can familiarize yourself +with the system commands and layout. + + Always try to locate and download a system directory so that +you can browse through it at your leisure, and plan your next +session in advance. + + When you leave a message in the BBS, try not to use all +upper or lower case, as that makes it difficult for others to +read. + + Some RCP/M's have an input time-out feature where the system +will drop you if there is no input from you for a set amount of +time (around 2 minutes). If you are interrupted during a session, +and don't want to be dropped, just hit 'space', 'return' every 30 +seconds or so. Don't do this for too long, as you are +unnecessarily tying up the system. + + If you are not a reasonably fast typist, don't request to +CHAT with the sysop, as it is very annoying to sit and wait while +the user hunts and pecks the keyboard and can only type one line +per minute. + + Most of the utilities will give a listing of what control +characters to use to skip, pause, or abort when they are invoked. +A general rule is that ^S will pause and restart, ^X will skip, +and ^C will abort. Some of the utilities will allow either the +control sequence or the letter by itself. + + If you see a command that is available, and do not know what +it does, try invoking it with no parameters, or with a '?' as the +parameter. That will usually display the utilities built in help +file (if one is available). + + Before attempting to upload a file, make sure that it does +not already exist on in the database. For example, if you wanted +to upload a file called 'FINDBIOS.OBJ', enter the command +'DIR FINDBIOS.* $AD'. If the file is anywhere on the disk, it +will be located. If the utility WHATSFOR is available, it could +also be used. + + If you have logged onto a system at 1200 baud, and have +problems with line noise, log off, and call back at 300 baud. If +you wanted to download a file, wait till the problem clears up, +and try again at 1200 baud. + + +Once in CP/M Page 23 + + + + + + RCP/M GUIDE + + + + GLOSSARY OF TERMS + +BAUD - A number that represents the speed of a communications + link between two computers. Most common are 300 and 1200. Some + newer systems support 2400 baud. The higher the baud rate, the + quicker the data is transferred. + +BBS - Bulletin Board System. The program that allows the entering + and reading of messages and bulletins. + +BDOS - The Basic Disk Operating System. This portion of CP/M is + the same for all computer systems running CP/M. + +BIOS - Basic Input Output System. This is the part of CP/M that + is customized for each computer. + +BYE - The core program of a RCP/M that allows the computer to + operate as a remote terminal. Also is the command used to + log off the system. + +CCP - The Console Command Processor. The part of CP/M that + handles user commands, and loading of programs. + +CHAT - A command to page the sysop. + +CHECKSUM - Another (older) error checking protocol. Less accurate + than CRC. + +CP/M - Control Program for Micro computers. The operating system + under which most RCP/M's run. + +CRC - Cyclic Redundancy Checking. An error checking protocol used + by the latest terminal programs. Replaced the Checksum method. + +DATABASE - The term often used to refer to the collection of + programs contained on the systems assorted drive/user areas. + +DIR - A command to display the contents of a drive/user area. + +EXTENSION - The letters following the '.' in a file name. No more + than three letters long. + +FILE - A specific collection of data, stored on a disk or other + media, referenced by a specific name. + +FILE TYPE - See EXTENSION. + +I/O - Input/Output + +LDIR - A command to display the directory of a library file. + +MAP - A command available to print out a map of the drive/user + areas of the system you are logged onto. + + + +Glossary Page 24 + + + + + + RCP/M GUIDE + + +MEX - A very powerful and popular public domain terminal + program. + +LIBRARY - A file type that contains two or more files within one + file on the disk. + +LUX - A utility program to operate on libraries. + +OPERATING SYSTEM - An organized collection of techniques and + procedures used for operating a computer. + +PWD - Another utility to show available sections in a database. + + +RCP/M - Remote CP/M. The name given to the systems that allow + another computer with a modem to operate the system as though + he were seated at the console. + +RBBS - Remote Bulletin Board System. Also a command to return to + the BBS from CP/M (sometimes MBBS). + +RDIR - A command to display a directory of a drive/user area, + showing the time needed to download the files. + +SECTION - A command used to display the database sections that + are available to a user, and to move from area to area. + +SQUEEZE - A method of file compression. + +SYSOP - SYStem OPerator. A term used to refer to the person that + operates a particular RCP/M. + +TPA - Transient Program Area. The amount of free memory available + for programs. + +TYPE - A command to display the contents of an ASCII file to the + console. + +WHATSFOR - A command used to search a descriptive database file, + and show matching file descriptions. + +WHATSNEW - A command to show information on the latest database + uploads. + +XMODEM - A command to initiate the transfer of files between to + computers, complete with error checking and correction. + +ZCPR - A public domain replacement for CP/M's standard Console + command processor (CCP). + + + + + + + + +Glossary Page 25 + + + + + diff --git a/textfiles.com/bbs/real.bbs.users b/textfiles.com/bbs/real.bbs.users new file mode 100644 index 00000000..01bff7a3 Binary files /dev/null and b/textfiles.com/bbs/real.bbs.users differ diff --git a/textfiles.com/bbs/real.bbses b/textfiles.com/bbs/real.bbses new file mode 100644 index 00000000..91a8f6fe Binary files /dev/null and b/textfiles.com/bbs/real.bbses differ diff --git a/textfiles.com/bbs/real.pirates.5 b/textfiles.com/bbs/real.pirates.5 new file mode 100644 index 00000000..7275bf28 Binary files /dev/null and b/textfiles.com/bbs/real.pirates.5 differ diff --git a/textfiles.com/bbs/real.r0dents.gd b/textfiles.com/bbs/real.r0dents.gd new file mode 100644 index 00000000..34de6ead Binary files /dev/null and b/textfiles.com/bbs/real.r0dents.gd differ diff --git a/textfiles.com/bbs/realbbsd.txt b/textfiles.com/bbs/realbbsd.txt new file mode 100644 index 00000000..868d0fc6 --- /dev/null +++ b/textfiles.com/bbs/realbbsd.txt @@ -0,0 +1,108 @@ + + /-------------------/\-------------------\ + | / \ | + | Real / 6 \ A production | + | | 1 | of | + | BBSes | 8 | | + | |----| Dirty Bird's | + | Don't | 3 | Nest BBS | + | | 9 | 150 MB | + | Eat | 7 | (A real BBS) | + | |----| | + | Upload | 7 | Written by: | + | | 6 | Suicidal | + | Credits | 8 | Maniac | + | \ 7 / | + | \ / | + \-------------------\/-------------------/ + + + I feel that this text file needs a before-hand explaination. This + is a run off of Real users and Real sysops. I enjoyed those text files + and I wanted to see more of them. I hope that this does not offend a + bunch of uptight sysops who actually write a constitution of rules for + their BBS. (Really, I could care less.) I mainly wrote this file + because I wanted to poke fun at sysops who thought that in order to + retain authority think they have to make rules so that you can't do + anything, but post nice little just stopping by to say hi messages. I + thought the whole idea of BBSes is to give and get files, and to keep + conversation going. + + + On with the show! + + Real BBSes do not require newusers to give their social security + numbers. + + Real BBSes have AT LEAST 2400 baud. + + Real BBSes are run on software that best fits their storage. + + Real BBSes are run by easy going sysops. + + Real BBSes don't have a complete downloadable rule book. + + Real BBSes are run on registered software. + + Real BBSes offer some support for unpaid users, or no fee. + + Real BBSes don't need to advertise. + + Real BBSes don't have a sysop that uses his first name and makes all + other callers use their full name. + + Real BBSes aren't run on disk based systems. + + Real BBSes don't have sysops that preview every message. + + Real BBSes don't have the upload download ratio limit set to 2 to 1. + + Real BBSes support more than 3 protocols. + + Real BBSes have more than 2 message bases. + + Real BBSes have shoot-the-breeze message bases, as well as formal. + + Real BBSes run off of a machine faster than 2 mHz. + + Real BBSes are up-to-date on software. + + Real BBSes do not require newusers to answer a 300 question + questionnairre. + + Real BBSes do not send validation notices in the mail. + + Real BBSes do not say they are the best in town. + + Real BBSes do not say be here or be square. + + Real BBSes have real sysops. + + Real BBSes have more than 50 users. + + Real BBSes have at least 5 active message bases. + + Real BBSes require an affordable fee (not $50 a year). + + Real BBSes don't have an hourly charge. + + Real BBSes don't put others down. + + Real BBSes model themselves off of Dirty Bird's Nest. + + Real BBSes support ansi graphics. + + Real BBSes get at least 40% activity during the day, and 50% on the + weekends. + + Real BBSes do not brag! + + Real BBSes do not have lazy ass sysops that never do any maintenance. + + Real BBSes aren't scared to broadcast this text file!!!!! + + + ADD ONS: + ----------------------------------------------------------------------- + + diff --git a/textfiles.com/bbs/realbbsusers.txt b/textfiles.com/bbs/realbbsusers.txt new file mode 100644 index 00000000..a9a790a5 --- /dev/null +++ b/textfiles.com/bbs/realbbsusers.txt @@ -0,0 +1,120 @@ + +[*************************************] +[ An addition to: ] +[Real Sysops and Unreal Board Crashers] +[ Real BBS Users ] +[*************************************] + + Written By The Master Watchman + of + The Encounter (619) 433-7075 + +--------------------------------------- + + Well, as inspired by The Silver Elf, +I have decided to make an addition to +the lists. Hopefully it will get at +least a few laughs. (Especially to +us Real Sysops!) + +--------------------------------------- +Real users do not scan all the boards +and read all the messages looking for +something exciting. + +Real users post occasionally something +of interest which does NOT include: + Backspacing tips + Messages saying "Just taking up + space" + Messages asking for E-Mail + Messages saying "Got some new stuff + .. Send mail." + Messages telling about "A Micro- + modem for sale! $215" + or + Messages saying they will trade + a MM for an Apple-Cat in working + condition. + +Real users don't try every command on +the main menu, then try them again to +see if they do something amazingly +different. + +Real users don't automatically assume +The Sysop will be there all the time, +and don't get annoyed and press Ctrl-G +10,000 times when he's not there. + +Real users don't expect the Sysop Stat +message to say anything but "Not +available" + +Real users don't constantly bug The +Sysop for levels. + +Real users do things to deserve levels. + +Real users do not leave stupid questions +in feedback or messages and expect +answers. + +Real users do not look for important +people in your user file and then start +supporting them and sending them E-Mail +hoping to pick up some great tips or be +recognized as a "Real Pirate" from them. + +Real users are not poor. + +Real users do not expect The Sysop to +remember everything they have ever +said, Real users understand that they +are not the most important figure on +the board. + +Real users do not command search. (I.E. +A,B,C,D,E,F,G,H,I,...,!,@,#,$,%,^,&,*) + +Real users read the system news when it +has been updated so they don't have to +command search. + +Real users have long since printed out +the menu and other things so they do +not have to continually return to them. + +Real users do not call right back after +their time is up. + +Real users are not afraid when The +Sysop answers the phone. Real users +will at least acknowledge that they are +there. + +Real users don't expect the board to be +up all 24 hours all the time. + +Real users are not terminally boring. + +On the War board: +Real users do not create stupid wars +like "Pepsi vs. Coke". + +Real users are not afraid to post with +their name. Real users hardly ever post +anonymously. + +Real users enjoy killing unreal users +with Commodores who post that their +toy is best. + +In fact, real users do not reply to +Commodores, they find out their +address and destroy their house. + + +--------------------------------------- + + diff --git a/textfiles.com/bbs/realgphi.txt b/textfiles.com/bbs/realgphi.txt new file mode 100644 index 00000000..90b114d7 Binary files /dev/null and b/textfiles.com/bbs/realgphi.txt differ diff --git a/textfiles.com/bbs/ripcowar.txt b/textfiles.com/bbs/ripcowar.txt new file mode 100644 index 00000000..752c1ec3 --- /dev/null +++ b/textfiles.com/bbs/ripcowar.txt @@ -0,0 +1,1578 @@ + *** SEIZURE WARRANT DOCUMENTS FOR RIPCO BBS *** + +******************************************************************** +On May 8, 1990, RIPCO BBS was closed and the equipment seized as the result +of a seizure warrant. FULL DISCLOSURE Magazine obtained publicly available +copies of the various documents related to the warrant, which are +reproduced below. + +The documents include (in order presented): + +1. Government's petition for Assistance during Execution of Search Warrant +2. ORDER approving assistance +3. Order authorizing blocking out income telephone and data calls +4. Application for order to block out calls +5. Application and affidavit for seizure warrant (Barbara Golden, affiant) +6. Application and affidavit for seizure warrant (G. Kirt Lawson, affiant) + +Attached to the original documents (but not presented here) are an +application (by Ira H. Raphaelson and William J. Cook, United States +attorney and AUSA) to suppress the seizure warrant for 90 days, and a +variety of photographs of Dr. Ripco's premises. + + +******************************************************************* + +**************************************** +Government's Petition for Assistance +**************************************** + + UNITED STATES DISTRICT COURT + NORTHERN DISTRICT OF ILLINOIS + EASTERN DIVISION + +UNITED STATES OF AMERICA ) + ) + v. ) No. 90-M-187 & 90-M-188 + ) Magistrate James T. Balog + ) +xxxx NORTH CLYBOURN, CHICAGO ) +ILLINOIS AND xxxx NORTH ) +LAWNDALE, CHICAGO, ILLINOIS ) + + + GOVERNMENT'S PETITION FOR ASSISTANCE + DURING EXECUTION OF SEARCH WARRANT + + The United States of America, by its attorney, Ira H. +Raphaelson, United States Attorney for the Northern District of +Illinois, petitions this Court for an order directing +representatives of AT&T's Corporate Security Division to accompany +Special Agents of the Secret Service during the execution of the +search warrant against the premises of xxxx North Clybourn, +Chicago, Illinois, and xxxx North Lawndale, Chicago, Illinois. This +petition is supported by the following: + 1. The affidavit of Special Agent Barbara Golden of the +Secret Service is incorporated herein by reference. + 2. AT&T has offered the assistance of Jerry Dalton and John +Hickey of AT&T Corporate Security/Information Protection to the +government and this Court. Both men are very experienced in the +operation of computers and especially in the analysis of UNIX +systems. + 3. We also request that Sergeant Abigail Abrahams of the +Illinois State Police be authorized in the execution of the +aforementioned warrants. Sergeant Abrahams has investigated the +computer bulletin board (BBS) operation since approximately 1988 + + - 1 - + +and has extensive details with respect to the structure of the BBS +and its contents. + + While these individuals will not be seizing evidence, their +assistance is necessary to quickly read and identify the +critical files in the computer being searched. Moreover, their presence +during the search will insure that the records on the computer are +not accidentally erased and remain intact. + + + Respectfully submitted, + + IRA H. RAPHAELSON + United States Attorney + + + BY: (signature of) + WILLIAM J. COOK + Assistant United States Attorney + + - 3 - + + + UNITED STATES DISTRICT COURT + NORTHERN DISTRICT OF ILLINOIS + EASTERN DIVISION + +UNITED STATES OF AMERICA ) + ) + v. ) No. 90-M-187 & 90-M-188 + ) Magistrate James T. Balog + ) +xxxx NORTH CLYBOURN, CHICAGO ) +ILLINOIS AND xxxx NORTH ) +LAWNDALE, CHICAGO, ILLINOIS ) + + + ORDER + + In view of the specialized nature of the evidence that is +being sought in this warrant, _______________, as indicated in the +government's petition and the affidavit for the search warrant, +which is incorporated herein by reference; + It is Hereby Ordered that representatives of AT&T's Corporate +Security Division and Sergeant Abigail Abrahams of the Illinois +State Police accompany Special Agents of the United States Secret +Service during the execution of the search warrant to assist those +agents in the recovery and identification of the evidence sought +in the warrant. + + + (signature) James T. Balog + 5-7-90 UNITED STATES MAGISTRATE + + + - 3 - + + + + UNITED STATES DISTRICT COURT + NORTHERN DISTRICT OF ILLINOIS + EASTERN DIVISION + +IN THE MATTER OF THE ) +APPLICATION OF THE UNITED STATES ) +OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188 +BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog +AND DATA CALLS AT (312 )528-5020 ) +(312 )xxx-xxxx AND (312)xxx-xxxx ) + +ORDER AUTHORIZING BLOCKING OUT INCOME TELEPHONE DATA CALLS + + An application having been made before me by Colleen D. +Coughlin, an Assistant United States Attorney for the Northern +District of Illinois, pursuant to Title 28, United States Code, +Section 1651, for an Order to "block out" incoming telephone and +data calls by the Illinois Bell Telephone company, and there is +reason to believe that requested actions are relevant to a +legitimate law enforcement investigation; + + IT IS ORDERED THAT: + + 1. Illinois Bell Telephone company servicing said telephone +lines shall "Block out" of incoming telephone and data calls on +(312) 528-5020, (312) xxx-xxxx and (312) xxx-xxxx, which telephone +and data lines are on premises which are the subject of federal +search warrants to be executed the 8th day of May, 1990 at +approximately 0630 hours. Such "blocking out" of incoming +telephone and data calls shall commence at 0500 hours on May 8, +1990 and continue up to and incoming 1700 hours on May 8, 1990, or +until the completion of the search warrants, whichever is the +earlier. + + 2. The "blocking out" of incoming telephone and data calls +will likely assist in the execution of search warrants seeking + + - 4 - + +evidence of violations of Title 18, United States Code, Sections +1343, 1030, 1962, 1963, and 371. + + + (signature of) + JAMES T. BALOG + Magistrate + + 5-7-89 (sic) + + + - 5 - + + + UNITED STATES DISTRICT COURT + NORTHERN DISTRICT OF ILLINOIS + EASTERN DIVISION + +IN THE MATTER OF THE ) +APPLICATION OF THE UNITED STATES ) +OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188 +BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog +AND DATA CALLS AT (312 )528-5020 ) +(312 )xxx-xxxx AND (312)xxx-xxxx ) + + + A P P L I C A T I O N + + + Now comes the UNITED STATES OF AMERICA, by IRA H. RAPHAELSON, +United States Attorney and Colleen D. Coughlin, Assistant United +States Attorney, and makes application pursuant to Title 28, United +States Code, Section 1651, the All Writs Act, for an Order to stop +or "block out" incoming telephone calls to particular telephone +and/or data lines, as described below, by the Illinois Bell +Telephone Company. + + In support of this Application the undersigned states as +follows: + + 1. This Application seeks an order requiring the Illinois +Bell Telephone Company to "block out" incoming telephone and data +calls from 0500 hours until 1700 on May 8, 1990 regarding the +following numbers (312) 528-5020, (312) xxx-xxxx and (312) xxx- +xxxx. + + 2. The United States Secret Service has been conducting a +two year investigation into the activities of computer hackers +which will result in thirty-two search warrants being executed +across the United States on May 8, 1990 beginning at 0630 hours. + + 3. Because the United States Secret Service needs to ensure +the integrity of the evidence at each of these locations from +remote access tampering, alteration, or destruction, this "blocking +out" order is required. + + 4. This action by Illinois Bell Telephone will only "block +out" incoming calls and the telephones will at all times be capable +of making "outgoing" calls. Thus, the telephone lines will at all +times be available for emergency outgoing calls. + + 5. It is reasonably believed by the United States Secret +Service, based on experience and their investigation in this +case, that the requested action will be of substantial assistance +in forwarding this criminal investigation. + + 6. The All Writs Act, 28 U.S.C. 1651, provides as follows: + + The Supreme Court and all courts + established by the Act of Congress may issue all + writs necessary and appropriate in aid of their + respective jurisdictions and agreeable to the + uses and principles of law. + + 7. A Federal Court has power to issue "such commands under +the All Writs Act as may be necessary or appropriate to effectuate +and prevent the frustration of orders it has previously issued in +the exercise of its jurisdiction...." UNITED STATES v. NEW YORK +TELEPHONE CO., 434 U.S. 159, 172 (1977). + + WHEREFORE, on the basis of the allegations contained in this +Application, applicant requests this Court to enter an order for +"blocking out" of income telephone and/or data calls at the above +described telephone numbers. + + It is further requested that Illinois Bell Telephone Company +may be ordered to make no disclosure of the existence of this +Application and Order until further order of this Court since + + - 2 - + +disclosure of this request to the individual or individuals whose +telephone lines are affected would threaten or impede this computer +investigation. + + + Respectfully submitted, + + IRA H. RAPHAELSON + United States Attorney + + + By: (signed) + COLLEEN D. COUGHLIN + Assistant United States Attorney + + + + - 3 - + +**************************************************** +{transcriber's note:} +Following is the APPLICATION AND AFFADAVIT FOR SEIZURE WARRANT, +Case number 90-M-187, dated May 7, 1990. + +Affiant: Barbara Golden, Special Agent, U.S. Secret Service +Location: United State District Court, Northern District of Illinois +Judicial Officer: Magistrate James T. Balog +The warrant alleges violations under Title 18, USC, Sections +1343, 1030, 1029, 1962, 1963, and 371. +******************************************* + + --------------(Begin Barbara Golden's Affidavit)----------------- + +State of Illinois ) + ) SS +County of Cook ) + + + AFFIDAVIT + + 1. I, Barbara Golden, am a Special Agent of the United States +Secret Service and have been so employed for the past fourteen years; the +past three years as a Special Agent. I am present assigned to the +Computer Fraud Section of the United States Secret Service in Chicago. I +am submitting this affidavit in support of the search warrants for the +residence of Bruce Xxxxxxxxxxx xxxx North Lawndale, Chicago, Illinois +(including the detached garage behind the house) and his business address +at xxxx North Clybourn, Chicago, Illinois. + 2. This affidavit is based upon my investigation and information +provided to me by Special Agent G. Kirt Lawson of the United States Secret +Service in Phoenix, Arizona and by other agents of the United States +Secret Service. I have also received information from Sergeant Abigail +Abrahams of the Illinois State Police. + 3. Additionally, I have received technical information and +investigative assistance from Roland Kwasny of Illinois Bell Telephone +Corporate Security. + + VIOLATIONS INVOLVED + + 4. This warrant is requested to recover unauthorized and illegally +used access codes posted on the RIPCO BBS by computer hackers and to +develop evidence of their illegal use of those codes in violation of +federal criminal laws, including: + + - 1 - + + a. 18 USC 2314 which provides federal criminal sanctions against +individuals who knowingly and intentionally transport stolen property or +property contained by fraud, valued at $5,000.00 or more, in interstate +commerce. + b. 18 USC 1030(a)(6) provides federal criminal sanctions against +individuals who, knowingly and with intent to defraud, traffic in +interstate commerce any information through which a computer may be +accessed without authorization in interstate commerce. + c. Other federal violations involved in this case may include Wire +Fraud (18 U.S.C. 1343), Access Device Fraud (U.S.C. 1029) and other +violations listed and described on page 15, 16, and 17 of the attached +affidavit of Special Agent Lawson. + + LAWSON AFFIDAVIT + + 5. The attached affidavit of Special Agent Kirt Lawson is +incorporated herein in its entirety and is attached as Attachment 1. +Lawson's affidavit is based upon a two year undercover investigation of +the United States Secret Service involving an undercover bulletin board +located in Phoenix, Arizona. Essentially, Lawson's affidavit and my +investigation establish probably cause to believe: + a. Bruce Xxxxxxxxxxx, using the computer hacker handle "Dr. Ripco", +has been operating the RIPCO BBS in Chicago since approximately +December 10, 1983. + + - 2 - + + b. During the time period named in the Lawson affidavit unauthorized +access codes were posted on the RIPCO BBS by various computer hackers. + c. The access codes posted on the RIPCO BBS have been determined by +Special Agent Lawson to be valid access codes which are being used without +authorization of the true authorized user of the access codes. Moreover, +in many cases the access codes have been reported stolen by the true +authorized user(s). + d. Special Agent Lawson's investigation has further determined that +the access codes posted on the RIPCO BBS are not concealed from the system +administrator of the BBS and could be seen by the system administrator +during an examination of the BBS. + + 6. I have personally worked with S.A. Lawson on computer crime +investigations and known him to be a reliable agent of the Secret Service +and an expert in the field of telecommunication investigations. + 7. I personally received the attached affidavit on May 1, 1990 and +have verified with S.A. Lawson that it is in fact his affidavit and have +verified with S.A. Lawson that it is in fact his affidavit and that it +accurately reflects his investigation. I have verified information with +respect to his investigation with Special Agent Lawson as recently as May +7, 1990. + + - 3 - + + + UPDATED PROBABLE CAUSE + + 8. On May 1, 1990, I personally observed that the surveillance +cameras described on pages 32 and 33 of Lawson's affidavit still +appear to be in operation. (The antennas and surveillance cameras +located at the Clybourn address are reflected in the photographs +attached as Attachment 2.) + 9. On May 4, 19900, I personally updated the status of the +telephone lines at the Clybourn address with Roland Kwasny of Illinois +Bell Telephone. Kwasny advised me that those telephones continue to +be in active service at this time. + + ITEMS TO BE SEIZED + + 10. On pages 36 to 39 of his affidavit S.A. Lawson describes the +items to be seized at the search locations. + + + Locations to be Searched + + 11. The complete description of the business location to be searched +on Clybourn Street is contained on page 30 of S.A. Lawson's affidavit. +(Photographs of that location are in Attachment 2.) I have personally +observed the resident to be searched on Lawndale on May 1, 1990. The +photographs attached to this affidavit as Attachment 3 truly and +accurately show the residence known as xxxx North Lawndale, Chicago, +Illinois, as of May 1, 1990. + + - 4 - + + + EXAMINATION OF COMPUTER RECORDS + + 13. Request is made herein to search and seize the above described +computer and computer data and to read the information contained in and on +the computer and computer data. + + 14. The following attachments are incorporated herein by reference: +Attachment 1 - Affidavit of S.A. Lawson (39 pages): Attachment 2 - +Photographs of the Clybourn address (2 pages); Attachment 3 - Photographs +of the Lawndale address (1 page). + + + (signature) + Special Agent Barbara Golden + United States Secret Service + + +Sworn and Subscribed to before +me this 7th day of May, 1990. + + +(signature) +James T. Balog +UNITED STATES MAGISTRATE + + + - 5 - + + ** (End Barbara Golden's Affidavit) ** + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + ** (Begin G. Kirt Lawson's affidavit) ** + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + +State of Arizona ) + ) SS +County of Maricopa ) + + + AFFIDAVIT + + 1. Your affiant G. Kirt Lawson has been a Special Agent of the U.S. +Secret service for eighteen years and in the course of his employment has + +investigated over 100 cases involving credit card fraud, theft, computer- +related crime, and other offenses. I have training from the Secret +Service in the investigation of computer fraud, have attended six or more +seminars on investigative procedures from AT&T and the Secret Service, and +have lectured on computer crime for the IEEE (an international +professional group of electrical engineers) and Bellcore (the research / +security organization owned by the regional Bell operating companies.) +Within the last year, I have assisted the Arizona Attorney General's +office with the execution of three computer-crime search warrants, and the +Austin, Texas field office of the Secret Service with the execution of +another computer-related search warrant. Over the last two years, I +have assisted numerous state, local, and federal law enforcement +agents in half a dozen U.S. cities by providing information and +technical assistance which has led to the execution of over a dozen +search warrants in computer crime cases nationwide. + + - 1 - + + + SOURCES OF INFORMATION + + 2. Your affiant has also received technical information and +investigative assistance from the following experts in the field of +telecommunication fraud and computer crime: + a. R.E. "Sandy" Sandquist,, Regional Security Manager, U.S. Sprint +Communications Company, who has been so employed since 1987, and was +previously employed by General Telephone (GTE) as a special agent, +technical investigations since 1983. He has investigated cases of +communications fraud involving computer hackers, computer bulletin board +systems (see Definitions section below), and the abuse of voice mail +message computers, involving over 100 systems. He has assisted law +enforcement search teams in the execution of search warrants, and has +trained many state, local and federal agents in the investigation of +computer and communications crime. + b. Stephen R. Purdy, Special Agent, U.S. Secret Service, currently +the Assistant to the Special Agent In Charge of Fraud Division of the +Computer Diagnostic Lab in Washington, D.C. He is a member of the Federal +Computer Investigations Committee, and is currently its Co-Chair. He has +helped to design training programs in computer crime and +telecommunications fraud investigations for the Federal Law Enforcement +Training Center in Glynco, Georgia. He also developed and instructs in +the Secret Service's training program in computer fraud investigations. + + - 2 - + + c. George Mehnert has been a Special Agent with the Arizona Attorney +General's office for more than twelve years; for the last three years, he +has been responsible for special projects including the investigation of +computer crime. He has taken courses relating to computer hardware and +software programs from various industry sources and a local college, and +has worked with computer hardware and software, including communications +equipment and analysis tools, in investigative matters for more than six +years. Mehnert has instructed numerous state and local law enforcement +agencies in the methodology of executing search warrants involving +computers, and in the investigation of computer crimes. He recently +published of article on this subject in a law enforcement periodical. In +the past two years, Mehnert has been involved in thirty warrant searches +relating to the seizure of computer of communications-related evidence. + d. In addition to the above, affiant has also received technical +assistance and information from the following communication industry +sources: Steve Matthews, Telenet; Leila Stewart, MCI; Sue Welch, MCI; +Toni Ames, U.S. West; Connie Bullock, ComSystems (a long-distance +carrier); Karen Torres, MidAmerican Communications Company; Richard +Petiollo and Richard Kopacz, AT&T; Hank Kluepfel and David Bauer, +Bellcore (a research/security company owned by the Bell Regional Operating +Companies); Marty Locker, International Telephone and Telegraph (ITT), +and credit industry sources: Valerie Larrison, American Express; MaryAnn +Birkinshaw, TRW: Michelle Mason, CBI (TRW and CBI are national card +bureaus). + + - 3 - + + + DEFINITIONS AND EXPLANATIONS + + + 3. Computer hackers: individuals involved in the unauthorized +intrusion into computer systems by various means. They commonly identify +themselves by aliases of "hacker handles" when communicating by voice or +electronically with other hackers. Because they normally communicate +through electronic bulletin board systems in several states, and because +they often conduct their hacking activities against victims at many +locations outside their local calling area, computer hackers typically use +long-distance carrier customer authorization codes without the permission +of the individuals or corporations to which they are assigned, in order to +achieve "free" long distance telecommunications (over standard voice +lines, or over data-communications services). Search warrants executed in +hacker cases routinely produce evidence of theft of communications +services, and often product of possession, use, and/or distribution of +credit cards as well. + 4. Electronic Bulletin Board System (BBS): an electronic +bulletin board is a computer operated as a medium of electronic +communications between computer users at different locations. +Users access the BBS by telephone from distant locations (often +their residences), using their own computers and communication +devices (modems). Typical functions of a BBS include (1) providing +storage for a software library; (2) allowing users to "download" +(copy to their own computers) various files or software programs; +(3) allowing users to + + - 4 - + +exchange and store messages by "electronic mail"; and (4) publishing +of text files and tutorials, which contain information or instructions +on various subjects of interest to the users. Although many BBS's are +operated as commercial services to the public (large services such as +Compuserve and The Source may offer many more functions than those +listed above), thousands of BBS's are privately operated by +individuals who run them from their residences, or by special-interest +clubs. It is common for a BBS to have several sections or +"conferences" on the system, to which a particular level of access is +required: many users might have access to lower-level sections, while +only some users would be permitted to access the highest-level +sections (many sysops --defined below-- "voice validate" a prospective +user, using a telephone call to screen users and determine whether +they are law enforcement, adults, or other undesirables). This is +particularly true of BBS's whose members are involved in some form of +criminal activity. Many "underground" or criminal bulletin boards +contain subsections through which the users regularly exchange stolen +customer authorization codes, credit card numbers, and information on +techniques or methods for the commission of such crimes as computer +fraud and abuse, access device fraud and wire fraud. + 5. System operator/system administrator (sysop): the person(s) +charged with the responsibility for operating a particular computer +bulletin board system (usually the owner of + + - 5 - + +the computer who lives in the residence where the BBS is operating). +In order to perform their necessary supervisory and maintenance +functions, sysops who run or own the BBS give themselves the highest +level of access, or privileges, available on a system. In the case +of a bulletin board sysop, these functions typically include deciding +whether or not to to give access or type of privileges to allow to +different users, and the ability to read the entire content stored on +the BBS (including "private mail" -- see electronic mail, below.) +Sysops control the BBS, can remove contents, add and delete users, +change the programming, alter the communications parameters, and +perform a number of administrative and maintenance tasks associated +with operation of the BBS. + 6. Electronic mail (E-mail): electronic mail is a means of +communication among computer users, and is one of the features normally +found on a BBS. Each user on a criminal BBS has a distinct +identifier, with a computer hacker's "username" or "login" often +identical to his hacker handle (handles tend toward the theatrical, +I.e. Prophet of Doom, DungeonMaster, Ax Murderer, etc.) and a unique +confidential password; each user may also be assigned a user number by +the system. Users may send "public" mail by leaving a message in a +section of the system where all who call in may read the message and +respond. They may also send "private mail" by sending a message +limited to a particular individual or group. + + - 6 - + +In this instance, other users would not be able to read the private + +message. (Except, of course for the sysop, as explained above.) + 7. Chat: unlike electronic mail, which consists of messages and +responses entered and stored for later review, the "chat" communication on +a BBS consists of simultaneous interactive communication between the sysop +and a user, or between two or more users -- the computer equivalent of a +conference call. A more sophisticated BBS may have more than one +telephone line connected to the system, so that two or more users can +"talk" to each other though the BBS from their own computer systems at one +time. + 8. Voice Mail System (VMS): a voice mail system is an electronic +messaging computer which acts as an answering service. These systems are +generally either (1) operated for hire to the public by commercial +communications companies, often in combination with cellular telephone or +paging services, or (2) by corporations for the convenience of employees +and customers. In either case, the subscriber or employee is assigned an +individual "mailbox" on the system which is capable of performing several +functions. Among these functions are receiving and storing messages from +callers, sending messages to other boxes on the system, and sending +messages to a pre-selected group of boxes. These functions are performed +by pushing the appropriate numerical commands on a telephone keypad for +the desired function. + + - 7 - + + 9. While voice mail systems vary among manufacturers, in general, a +caller dials either a local area code and number, or an "800" number to +access the system. Generally, the caller hears a corporate greeting +identifying the system and listing instructions for leaving a message and +other options. To leave a message, the caller enters a "mailbox number," +a series of digits (often identical to the assigned owner's telephone +extension), on his own telephone keypad. The caller then hears whatever +greeting the mailbox owner has chosen to leave. Again, the caller can +usually exercise several options, one of which is to dictate an oral +message after a tone. + 10. In this respect, the voice mail system operates much like a +telephone answering machine. Rather than being recorded on audio tape, +however, the message is stored in digitized form by the computer system. +When the message is retrieved, the computer plays it back as sound +understandable by the human ear. The entire VMS is actually a computer +system accessible through telephone lines; the messages are stored on +large-capacity computer disks. + 11. A caller needs to known only the extension or mailbox number in +order to leave a message for the employee or subscriber. In order to +retrieve the messages or delete them from the system, however, the person +to whom the box is assigned must have both the box number and a +confidential password: the password ensures privacy of the communications, +by acting as a "key" to "unlock" the box and reveal its contents. Anyone + + - 8 - + +calling the telephone number of the mailbox hears the owner's greeting -- +only the content of messages left for the owner is protected by the +password or security code. The person to whom the box is assigned may +also have the ability to change his password, thereby preventing access to +the box contents by anyone who may have learned his password. + 12. Private Branch Exchange (PBX): a private branch exchange is a +device which operates as a telephone switching system to provide internal +communications between telephone facilities located on the owner's +premises as well as communications between the company and other private +or public networks. By dialing the specific telephone number of a PBX +equipped with a remote access feature and entering a numeric password or +code on a telephone keypad or by means of a computer modem, the caller can +obtain a dial tone, enabling the caller to place long distance calls at +the expense of the company operating the PBX. + 13. Phone phreak: phone phreaks, like computer hackers, are +persons involved in the theft of long-distance services and other +forms of abuse of communications technology, but they often do not +have computer systems. Rather than communicating with each other +through BBS's, they communicate with each other and, exchange stolen +carrier customer authorization codes and credit cards, either directly +or by means of stolen or "hacked" corporate voice mailboxes. Phone +phreaks may also set up fraudulent conference calls for the + + - 9 - + +exchange of information. A phone phreak may operate a "codeline" (a +method of disseminating unauthorized access devices) on a fraudulently +obtained voice mailbox, receiving messages containing stolen credit +card numbers from his co-conspirators, and in turn "broadcasting" them +to those he shares this information with during the greeting (box +owner's message to callers), which can be heard by anyone dialing the +mailbox number. Phone phreaks and computer hackers sometimes share +information by means of the conference calls and codelines. Like +computer hackers, phone phreaks also identify themselves by "handles" +or aliases. + + BACKGROUND OF THE INVESTIGATION + + 14. Over the past several years, the U.S. Secret Service has received +and increasing number of complaints from long distance carriers, credit +card companies, credit reporting bureaus, and other victims of crimes +committed by computer hackers, phone phreaks, and computer bulletin board +users and operators (see Definitions section), which have resulted in +substantial financial losses and business disruption to the victims. +Because the persons committing these crimes use aliases or "handles", mail +drops under false names, and other means to disguise themselves, they have +been extremely difficult to catch. They also conspire with many others to +exchange information such as stolen long distance carrier authorization +codes, credit card numbers, and technical information relating to the +unauthorized invasion of computer systems and voice mail + + - 10 - + +messaging computers, often across state or national borders, making +the investigation of a typical conspiracy extremely complex. Many of +these persons are juveniles or young adults, associate electronically +only with others they trust or who have "proven" themselves by +committing crimes in order to gain the trust of the group, and use +characteristic "hacker jargon." By storing and trading information +through a network of BBS's, the hackers increase the number of +individuals attacking or defrauding a particular victim, and therefore +increase the financial loss suffered by the victim. + 15. For all of the above reasons, the U.S. Secret Service established +a computer crime investigation project in the Phoenix field office, +utilizing an undercover computer bulletin board. The purpose of the +undercover BBS was to provide a medium of communication for persons +engaged in criminal offenses to exchange information with each other and +with the sysop (CI 404-235) about their criminal activities. The bulletin +board began operating on September 1, 1988 at 11:11 p.p., Mountain +Standard Time, was located at 11459 No. 28th Drive, Apt. 2131, Phoenix, +Arizona, and was accessed through telephone number (602) 789-9269. It was +originally installed on a Commodore personal computer, but on January 13, +1989 was reconfigured to operate on an Amiga 2000 personal computer. + 16. The system was operated by CI 404-235, a volunteer paid +confidential informant to the U.S. Secret Service. CI 404-235 was +facing no criminal charges. Over the past eighteen + + - 11 - + +months, information by CI 404-235 (see paragraph 16) has consistently +proved to be accurate and reliable. The Arizona Attorney General's +office executed six search warrants related to affiant's investigation +in 1989 and 1990 (affiant participated in three of these). Evidence +obtained in those searches corroborated information previously given +to affiant or to George Mehnert, Special Agent of the Arizona Attorney +General's office by CI 404-235. In over a dozen instances, CI +404-235's information was verified through other independent sources, +or in interviews with suspects, or by means of a dialed number +recorder (pen register). One arrest in New York has been made as a +result of CI 404-235's warning of planned burglary which did occur at +a NYNEX (New York regional Bell operating company) office. Throughout +this investigation, CI 404-235 has documented the information provided +to the affiant by means of computer printouts obtained from the +undercover BBS and from suspect systems, and consensual tape +recordings of voice conversations or voice-mail messages. + 17. Because many of the criminal bulletin board systems require that +a new person seeking access to the telephone code or credit card sections +contribute stolen card information to demonstrate "good faith," when asked +to do so, CI 404-235 has "posted," (left on the system in a message) + +Sprint, MidAmerican or ComSystems authorization codes given to affiant by +investigators at these companies for that purpose. + + - 12 - + + + EVIDENCE IN HACKER CASES + + 18. Computer hackers and persons operating or using computer bulletin +board systems commonly keep records of their criminal activities on paper, +in handwritten or printout form, and magnetically stored, on computer hard +drives, diskettes, or backup tapes. They also commonly tape record +communications such as voice mail messages containing telephone +authorization codes and credit cards. On several occasions, affiant +has interviewed George Mehnert, Special Agent, Arizona Attorney +General's office and R.E. "Sandy" Sandquist, Security Manager, U.S. +Sprint, about the types of evidence normally found in connection with +computer/ communications crimes. Both have assisted more than 20 +search teams in the execution of search warrants in such cases. Both +Mehnert and Sandquist stated that because of the sheer volume of +credit card numbers, telephone numbers and authorization codes, and +computer passwords, and other information necessary to conduct this +type of criminal activity, in almost every case, they have found a +large volume of paper records and magnetically-stored evidence at +scenes being searched. Because of the ease of storing large amounts +of information on computer storage media such as diskettes, in a very +small space, computer hackers and bulletin board users or operators +keep the information they have collected for years, rather than +discarding it. Mehnert stated that in virtually every +communications/computer crime case he has investigated, the suspect was +found to have records in his possession dating + + - 13 - + +back for years -- Mehnert stated that it is common in such cases to +find records dating from 1985 and sometimes, even earlier. + 19. Sandquist confirmed Mehnert's experience, stating that hackers +and phone phreaks typically also keep a notebook listing the location of +information especially important to them, for easy access. Mehnert has +seized several of these "hacker notebooks" in computer/communications +crime cases; they were usually found quite close to the computer system, +or in the hacker's possession. Both Mehnert and Sandquist stated that it +is common for a person involved in the theft of communications services +(long distance voice or data calls, voice mail boxes, etc.) also to be +involved in the distribution or use of stolen credit cards and/or numbers; +hackers and phone phreaks often trade codes for credit cards, or the +reverse. Both Mehnert and Sandquist stated that it is common to find +credit card carbons at locations being searched for stolen telephone +authorization codes. + 20. Both Mehnert and Sandquist also stated other evidence commonly +found in connection with these cases includes telephone lineman tools and +handsets (used for invading telephone company pedestal or cross-boxes and +networks, or for illegal interception of others' communications), tone +generators (for placing fraudulent calls by electronically "fooling" +the telephone network into interpreting the tones and legitimate +electronic switching signals), computer systems (including central +processing unit, monitor or screen, keyboard, modem for + + - 14 - + +computer communications, and printer), software programs and +instruction manuals. Sysops of bulletin boards also commonly keep +historical backup copies of the bulletin board contents or message +traffic, in order to be able to restore the system in the event of a +system crash, a power interruption or other accident. An important +piece of evidence typically found in connection with a criminal +bulletin board is the "user list" -- sysops normally keep such a list +on the BBS, containing the real names and telephone numbers of users +who communicate with each other only by "handles." The user list is a +very substantial piece of evidence linking the co-conspirators to the +distribution of telephone codes and credit cards through the BBS +messages or electronic mail. + 21. Mehnert and Sandquist stated that it is also common to find lists +of voice mailboxes used by the suspect or his co-conspirators, along with +telephone numbers and passwords to the voice mailboxes. Many suspects +also carry pagers to alert them to incoming messages. + + + CRIMINAL VIOLATIONS + + 22. Criminal violations may include, but are not limited to, the +following crimes: + 23. Wire fraud: 18 U.S.C. ~ 1343 prohibits the use of interstate +wire communications as part of a scheme to defraud, which includes +obtaining money or property (tangible or intangible) by a criminal or +the loss of something of value by the victim. Investigation by your +affiant has determined that + + - 15 - + +the actions of the computer hackers, phone phreaks and bulletin board +operators detected in this investigation defrauded telephone companies +whose customer authorization codes were exchanged through the BBS's) +gained valuable property because their fraud scheme provided them with +telephone customer authorization codes and other access devices which +in turn could be used by them to obtain telephone services and +property which would be charged to the victim companies. Their scheme +also provided them with access to private branch exchange (PBX) +numbers and codes which could be used to obtain telephone service +which was charged to the victim companies. + 24. Computer fraud and abuse: 18 U.S.C. ~ 1030 prohibits +unauthorized access to a federal interest computer with intent to defraud. +Intent to defraud has the same meaning as in the wire fraud statute above. +A federal interest computer is defined as "one of two or more computers +used in committing the offense, not all of which are located in the same +state," as well as computers exclusively for the use of a financial +institution or the United States Government, among others defined in the +statute. This section also prohibits unauthorized access to financial +records and information contained in consumer reporting agency files. + 25. Access device fraud: 18 U.S.C. ~ 1029 prohibits the +unauthorized possession of 15 or more unauthorized or counterfeit +"access devices" with intent to defraud, and + + - 16 - + +trafficking in authorized access devices with an intent to defraud and +an accompanying $1,000 profit to the violator or loss to the victim. +These prohibitions also apply to members of a conspiracy to commit +these offenses. Intent to defraud has the same meaning as in the wire +fraud statute above. "Access devices" includes credit cards, long +distance telephone authorization codes and calling card numbers, voice +mail or computer passwords, and PINS (personal identification +numbers). An "unauthorized access device" is any access device +obtained with the intent to defraud, or is lost, stolen, expired, +revoked, or cancelled. + 26. Other offenses: other federal statutes violated in this case may +include 18 U.S.C. ~ 1962 and 1963 which prohibit the commission of two or +more acts of racketeering (including two or more acts in violation of 18 +U.S.C. ~ 1343 and/or 1029), and permits forfeiture of the +instrumentalities used or obtained in the execution of a crime; and 18 +U.S.C. ~ 371, the federal conspiracy statute. + + PROBABLE CAUSE + BULLETIN BOARD SYSTEM 312-528-5020 + + 27. CI 404-235 has accessed a public electronic bulletin board at +312-528-5020 over three dozen times between 4/7/89 and 12/31/90. The +most recent access was on 4/28/90. In the "Phone Phun" subsection of +the BBS, CI 404-235 has regularly seen messages posted by users of the +BBS, which contain long distance carrier customer + + - 17 - + +authorization codes, references to hacking, and to credit cards and +credit bureaus. This affidavit is in support of a search warrant for +two premises where evidence of the operation of the BBS is expected to +be found. CI 404-235 provided to affiant copies of messages posted to +the BBS, including the following: + + + Numb 12 (54r4q9kl-12) + Sub miscellaneous... + From DON THOMPSON (#689) + To all + Date 03/17/89 03:55:00 PM + + + o.k.: + + 1999: 322300 342059 + 366562 344129 + 549259 549296 + 492191 496362 + 422000 549659 + + 28. In the above message, "1999" refers to the last four digits of +the local access number assigned to Starnet, a long distance network owned +by ITT Metromedia Communications. To use such codes, a caller dials the +local access number, the customer authorization code, and the area code +and number to be called. Marty Locker, ITT Security, verified that the +local access number 950-1999 is Starnet's (Starnet's authorization codes +and six digits long). Loss figures on the above are unknown. + 29. On 3/20/89, user #452 "Blue Adept" replies to a previous message, +as follows: + + + - 18 - + + +Numb 25 (54r4q9kl-25) + Sub Reply to: Reply to: Legal expenses +>From BLUE DEPT (#452) + To all +Date 03/20/89 08:42:00 AM + +1999 is starnet. they've busted several people I know. +they live to bust people. mainly with extraordinarily +large fines. I've heard of them taking it to court +though. first person they busted was the +Diskmaster/Hansel. really cool guy. hacked em 300 +times with the applecat and they busted him. he didn't + +"Hacked em 300 times" refers to the number of timers that +"Diskmaster/Hansel" is supposed to have attempted to hack out a Starnet +customer authorization code. "Applecat" is the name of a modem (computer +communications device) and related software program which automates the +code-hacking process. + + +Numb 69 (54r4q9kl-69) + Sub loop +>From JOE FRIDAY (#120) +To all +Date 03/25/89 07:10:00 PM + +IF ANYONE HAS A LOOP FOR THE 404 AREACODE I WOULD APPR. +IT VERY MUCH!! IF THERE ARE ANY REAL PHREAKS THAT STILL +DO HACK ALOT LEAVE I THINCK YOU MIGHT BENEIFIT FROM IT. + +18002370407-8010464006ACN- +8205109251- +IF ANYONE STILL GETS INTO LMOSE LEAVE ME A MESSAGE.. + + 30. On 4/17/90 Mark Poms, Director of Security, Long Distance +Service of Washington D.C., verified the following: 1) +1-800-237-0407 is his company's assigned 1-800-line number. +Authorization code 8010464006 has suffered $6, 287.22 in fraud + + - 19 - + +losses, and 8205109251 has suffered $970.34 in fraud losses. + 31. In the above message, "LOOP" refers to a telephone company "loop +around test line". Hackers commonly exchange information on loops, in +order to be able to communicate with each other without divulging their +home telephone numbers. If two hackers agree to call a loop number at a +certain time, they loop allows them to speak with each other -- neither + +hacker needs to know or to dial the other's telephone number. "LMOSE" +refers to a type of computer system (LMOS) operated by Bell regional +operating companies (local telephone companies). This computer system +contains data such as subscriber records, and the LMOS system is solely +for the use of telephone company employees for the purpose of maintaining +telephone service. (Explanations provided by Bellcore computer security +technical staff member David Bauer.) + + +Numb 136 (56r5q9kl-136) + Sub Suicide? +>From THE RENEGADE CHEMIST (#340) +To All +Date 04/18/89 05:33:00 PM + + + +9501001 +074008 +187438 +057919 +068671 +056855 +054168 +071679 + + - 20 - + + + 32. On 3/20/90 Karen Torres, MidAmerican Communications, a long +distance carrier which a local access number of 950-1001 as valid +MidAmerican customer authorization codes. She advised that all but the +invalid code were terminated "due to hacking". + + 950-1001 +074008 Valid code, no loss +187438 Valid code, no loss +057919 Invalid +068671 Valid code, no loss +056855 Valid code, no loss +054168 Valid code, no loss +071697 Valid code, no loss + + +Numb 109 (53r3q0k2-109) + Sub Reply to: Reply to: Reply to: Reply to: + Reply to: John Anderson +>From BRI PAPE (#22) +To ALL... +Date 06/28/89 05:31:00 AM + +ANOTHER valid code.. + + +AND A DIVERTER... + +215-471-0083..(REMAIN QUIET) + + 33. 950-0488 is the local access number for ITT Metromedia +Communications, according to Marty Locker, ITT Security. Fraud, +losses, if any, on this customer authorization code are unknown. + 34. On 4/16/90, Kathy Mirandy, Director of Communications, +Geriatrics and Medical Center Incorporated, + + - 21 - + +United Health Care Services, in Philadelphia, PA, verified that +1-215-471-0083 is her company's telephone number. She stated that +between 12/28/88 nand 5/15/89, her company suffered a fraud loss of +$81,912.26 on that number. In the above message, + +"diverter" refers to a common hacker/phone phreak term for a means of +placing telephone calls through a telephone facility which belongs to +someone else. The hacker "diverts" his call through the other +facility, and if the outgoing "diverted" call is a long distance call, +the owner of the facility is billed for the call as though it +originated from the victim telephone facility. + 35. On 7/3/89, CI 404-235 accessed the BBS and observed the +following message, a copy of which was provided to the affiant: + + +Numb 137 (56r3q0k2-137) + Sub dib. +>From POWER ASSIST (#524) +To * +Date 07/02/89 12:01:00 AM + +Divertors: 1800 543 7300 + 543 3300 + +I'm not sure if this is a 800 to 800 : 800 777 2233 + + 36. On 4/18/90 Delores L. Early, Associate General Counsel of the +Arbitron Company, Laurel, Maryland, verified that 1-800-543-7300 is +listed to her company. She advised that her company suffered a direct +fraud loss by October, 989 of $8,100 on that line, as well as +additional expenses in for form of the installation of "an elaborate +security procedure to prevent this + + - 22 - + +type of fraudulent use," and lost employee time in identifying and +correcting the problem. "800 to 800" refers to whether the "divertor" +posted in the above message can be used to call out to another 800 +number. + + +Numb 113 (53r6q0k2-113) + Sub Codes +>From BLUE STREAK (#178) + To ALL +Date 07/26/89 05:05:00 AM + +Here is a code: +1800-476-3636 +388409+acn + + +950-0266 +487005 +8656321 +6575775 +oops first one is 4847 not 487 + +Blue Streak. + +Blee blee blee thats all pholks. + + 37. On 4/2/90. Dana Berry. Senior Investigator, Teleconnect (a +division of Tele*Com USA, a long distance carrier), verified that 1-800- +476-3636 code 388409 is her company's authorization code and it has +suffered a fraud loss of x176.21 {transcrib. note: portion of dollar +figure (first digit) is illegible on copy of affidavit} + 38. On 4/20/90, Christy Mulligan, ComSystems Security, whose company +is assigned the local access number 950-0266, verified the following: + + - 23 - + + 1) 4847005 $2,548.75 loss due to fraud + 2) 8656321 $2,000.00 loss due to fraud + 3) 6575775 $ 753.61 loss due to fraud + + + +Numb 122 (57r3qlk2-122) + Sub TRW +>From NEMESIS TKK (#311) +To Garth +Date 09/30/89 04:01:00 AM + + I have no ideas about accessing TRW through +any type of network, but,m you cal dial TRW directly +(although you will probably want to code out..Even if +format has changed or anything in the past 5 years.. its +still db idpw first, ast, etc...So anyway, if you do +know how to use it,you can get at it from that number. + + + 39. In the above, "Nemesis" gives a telephone number in area code 602 +(Arizona) for TRW. "Code out" refers to using a stolen customer +authorization code ("if only to save yourself the fone bill") to call the +TRW number. The format for getting in to the TRW computer that he gives +Marianne Birkinshaw, TRW investigator advised that the telephone number +posted in the message is "a legitimate telephone number into TRW's +database". + + +Numb 138 (57r4q2k2-138) + Sub 5 +>From Chris X (#134) +To PEOPLE WHO HAVE OR HACK CODEZ +Date 01/22/90 05:54:00 PM + + - 24 - + + +Dear Anyone, + + I am in desperate need of a code. SOMEONE +PLEASE Post a code with a dialup and the format the code +must be entered. I will be ever so greatful. PLEASE +HELP!!! + + + Max Man - Chris X + + 40. In the above, user #134 asks for a code (customer authorization +code), "dialup" (the local access or 800 number through which the code may +be used), and the format (the order in which code, area code and number +must be dialed in order to place a call on the particular network). + + + +Numb 146 + Sub Here's your code beggar +>From POWER ASSIST (#524) +To beggars +Date 01/23/90 12:40:00 AM + +950-0266 + +6552513 1564844 + +probably die before you use it. + -PA + + 41. On 4/19/90, John Elerick, ComSstems Security, verified that the +codes posted with his company's local access number (950-0266) in the + +above message are valid; 6552513 has suffered $185.31 in fraud loss, and +it" refers to the code -- customer authorization codes "die" when they are +deactivated or cancelled by the carrier. + + - 25 - + + + 42. On 1/26/90, CI 404-235 again accessed the BBS and observed the +following message, a copy of which was provided to the affiant: + + +Numb 147 (50r5q2k2-147) + Sub ALL +>From THE SILENCER (#269) +To ALL +Date 01/25/90 08:26:00 PM + +YO...UMM...WHO ASKED FOR CARDS? hahahahah that is +pretty pathetic..god. If you want Credit Cards get +your own. One step closer to safe carding....getting +cc's off bbs's is the most disgusting thing I've ever +heard...use TRW..use +CBI...trash...steal...pickpocket....but dont get em off +a bbs...jeez.. +0266 working:1593527 +lets hope that this dies real fast so the REAL phreaks +will be left alone by the leacherz...heheheh + + - Silencer + + 43. In the above message, "carding" is a common hacker/phone phreak +term which refers to the fraudulent use of credit cards or credit card +numbers to obtain merchandise which will be billed to the cardholder. +"The Silencer" advises "all" users on the BBS to use TRW, or CBI (both +national credit bureaus) or to "trash" (the practice of obtaining credit +card numbers and related information from receipts or carbons discarded in +trash -- sometimes also referred to as "dumpster diving"), steal or +pickpocket, but not to get them (credit cards) from a bulletin board +system. He then gives the a ComSystems code identified by the the last +four digits (0266) of the ComSystems local access number. "Leacher" +is a common hacker insult for those BBS + + - 26 - + +users who copy codes, credit cards, or software from a BBS but do not +contribute their share. + 44. On 4/13/90, John Elrick, ComSystems Security, verified that +1593527 is a valid customer authorization code which has suffered $27, +353.34 in fraud loss. + 45. It should be noted that in message #138 above, dated 1/22/90, +Chris X asked for codes. On 1/26/90 the following followup +message was noted by CI 404-235: + + +Numb 149 (50rq2k2-149) + Sub Credit Card's for Codez +>From Chris X (#134) +To ALL +Date 02/26/90 07:43:00 AM + +Okay, + Tell ya what. I will exchange any amount of credit +cards for a code or two. You name the credit limit you +want on the credit card and I will get it for you. I do +this cause i go to ganitorial work at night INSIDE the bank +when no one is there..... heheheheheh + + 46. On 1/30/90, Zimmerman left a message on the BBS for CI 404-235, +stating that he "will be ready to exchange your codez for cards. I have +got 2 right now. 1 witch contains a $1500 credit limit and the other +containing a $2200 credit limit. I will 'steal' some more when I go to +the bank this weekend. Talk to ya tomorrow..." On 1/31/90 CI 404-235 + +gave Chris X Sprint Customer authorization code 25259681433275, +provided to affiant by U.S. Sprint Regional Security Manager R.E. +Sandquist for this purpose. On 3/18/90 in a computer-to-computer + + - 27 - + +conversation (not on the BBS), Chris X gave CI 404-235 a list of +ten (10) credit card numbers with names, addresses, credit limits, and +expiration dates. All of the credit cards appear to be issued in +Illinois. Zimmerman told CI 404-235 that all of the cards "belong" to +Consumers Co Op Credit Union. + 47. On 4/28/90, CI 404-235 again accessed the BBS and provided +printouts of messages which he observed on the BBS. In one, dated +3/27/90, "Scott Sxxxxx", user #160, offered to trade "virgin" credit +cards (newly acquired and not yet used for fraudulent purposes) for AT&T +cards (calling card numbers), PBX's (see Definition section above) or +numbers that will call overseas. In a message dated 4/17/90, "SLI FOLKS", +user #572, stated that he was calling from Edmonton, Canada, "using a +stolen account on Datapac for this call" (Datapac is a data communications +carrier). He tells "all" users that he has access to phone rooms for two +apartment buildings "which gives me access to several hundred phone lines. +new bpox that lets me get free LD on someone elses line frommy house. So +I hope you guys can teach me some stuff." On 4/24/90, Chris X +left another message to "anyone" offering to trade credit cards and codes +for information on how to get "information on a non-published person. It +can be found if you have a persons phone number and want a name and +address or vice-versa." (He is referring to obtaining non-published +subscriber information maintained by the telephone companies.) + + - 28 - + + 48. In attempting to located the BBS which operates on telephone +number 312-528-5020, affiant has discovered several significant facts +which appear to indicated that an attempt has been made to disguise the +actual location of the BBS. These facts, and the sources for them, are +detailed below. In summary, the BBS telephone line is listed to an +address as one of its facilities, the BBS telephone line ends at an +Illinois Bell junction box where an non-Illinois Bell (unauthorized) line +leads from the BBS line to an apparent retail/office structure at another +address. The BBS telephone bills are sent to a post office box opened in +the corporate name, but the applicant, who is not listed as an officer of +the corporation, described himself in a police report as "self-employed". +A second, unlisted, telephone line, billed to the post office box +applicant's home address, is installed at the retail/office structure +where the non-Illinois bell (BBS) line also leads. + 49. Illinois Bell telephone records show that the BBS telephone +number 312-528-5020 is subscribed to by Mxxx Xxxxxx, Inc., xxxx West +Belmont, xxxx xxx, Chicago, Illinois. The bills for this service are +sent in the name of Mxxx Xxxxxx, Inc., at P.O. Box xxxx, Chicago, +Illinois, 60618-0169. The BBS line was installed on December 1, 1982. + 50. In April of 1989, Sgt. Abigail Abraham, Illinois State Police, +conducted an investigation of the bulletin board + + - 29 - + +system at telephone number 312-528-5020. She checked directory +assistance, and both white and yellow-page telephone directories: +although she found several telephone numbers and address for Micro +Repair, Inc., 312-528-5020 and xxxx West Belmont were not among them. +She investigated the purported BBS site, and determined that xxxx West +Belmont, xxxx xxx, Chicago, Illinois, does not exist. She reported +that at xxxx W. Belmont, there is a structure which would incorporate +the address of xxxx W. Belmont. Sgt. Abraham had a telephone company +repairman check the physical junction pole: they discovered that the +312-528-5020 line ran from the phone via a non-Illinois Bell +(unauthorized) connection to a building at xxxx N. Clybourn, Chicago, +Illinois. This building appears to be a retail/office structure, at +which, according to SA Conway, Secret Service Chicago field office, as +of 4/16/90 "there is nothing to indicate that there are any businesses +operating out of xxxx N. Clybourn, Chicago, Illinois." It is a one +story section of a larger one-and-two story building which is "V" +shaped, fronting on both Clybourn and Belmont Avenues. The third leg +of the larger building (southeast side) fronts on a parking lot, with +a fenced courtyard section off the parking lot. The xxxx address is +approximately the last thirty feet at the south end of the Clybourn +side of the building. + + - 30 - + + 51. Illinois Bell records show that a non-published telephone line is +installed at xxxx N. Clybourn, which is 312-xxx-xxxx. Per Sgt. Abraham, +the subscriber is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois and +the bills are mailed to Fred Xxxxxxxxxxx at the same address. Telephone +service for 312-xxx-xxxx was installed at xxxx N. Clybourn on January 1, +1982. + 52. On April 26, 1989, Sgt. Abraham wrote down all of the vehicle +license plates parked in the parking lot next to xxxx N. Clybourn and +those parked immediately in front of it. PTxxxx, which was a 1987, four- +door Ford, was registered to Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, +Illinois. + 53. On 4/5/90, the Secret Service office in Chicago was notified by +the Illinois Department of Revenue that there are not business +licenses for xxxx N. Clybourn, Chicago, Illinois, nor are there any +licenses issued to Bruce Xxxxxxxxxxx. + 54. On 4/2/90 the Illinois Secretary of State, Corporation Division, +advised that Martin and Wendy Gilmore are the only officers for Micro +Repair listed on its Illinois Articles of Incorporation. + 55. On 4/3/90, the Chicago Postal Inspector's Office informed the +Secret Service office in Chicago that the billing address for telephone +number 312-528-5020 (the BBS) is Post Office Box xxxx and is open in the +name of Mxxx Xxxxxx. The name of the person who made the application for +the post office box is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois, + + - 31 - + +telephone number 312-xxx-xxxx. Identification used to open the +box was Illinois Driver's License exxx-xxxx-xxxx (per the Illinois +Secretary of State this license is that of Bruce Xxxxxxxxxxx), and according +to Sgt. Abraham, his license address is also xxxx N. Lawndale. + 56. To the rear of the property where xxxx N. Clybourn is located, +there is an antenna and a satellite dish. SA William P. Conway of the +Chicago field office contacted the Coast Guard for assistance in +determining the latitude and longitude of the satellite antenna. On +4/3/90, the Coast Guard Air Operations Duty Officer at the Glenview Naval +Air Station, Chicago, Illinois, advised that the Belmont/Western/Clybourn +intersection, Chicago, Illinois, has a latitude of 41 degrees, 56 minutes, +9 seconds north, and a longitude of 87 degrees, 41 minutes, 5 seconds +west. With that information, SA Conway was able to obtain assistance from +the Federal Communications Commission in determining the owner of the +satellite antenna. Will Gray, of the Chicago FCC office, advised that the +FCC license for the antenna (which is mounted on a tower located in the +fenced courtyard section of the larger building of which xxxx N. Clybourn +is a part) is registered to the American United Cab Company at xxxx N. +Belmont. The satellite dish is affixed to the rear of xxxx N. Clybourn. +Mounted on the tower are two closed circuit cameras. The first camera is +located approximately 20 feet above the ground, the second camera is +approximately 45 feet above the ground. + + - 32 - + + + 57. Chicago Police Department General Offense Report #Mxxxxxx, dated +3/13/89, lists Bruce Xxxxxxxxxxx as the victim, with the address of +occurrence listed as xxxx N. Clybourn, Chicago, Illinois. Xxxxxxxxxxx +reported that his car window was broken by two subjects. Per this police +report, Xxxxxxxxxxx states that he watched on a closed circuit security +camera as the two subjects entered the parking lot adjacent to xxxx N. +Clybourn, and broke his automobile window. Xxxxxxxxxxx told the officers +that the cameras are used for parking lot security, due to "breakins". +This incident took place at 2:30 PM. The report lists Xxxxxxxxxxx's +residence address as xxxx N. Lawndale, Chicago, Illinois, his home phone +number as 312-xxx-xxxx (that telephone number is listed to Fred Xxxxxxxxxxx +at the xxxx N. Lawndale address, according to Sgt. Abraham), and his work +phone number as 312-xxx-xxxx (the unlisted line billed to his residence). +He stated that he is self-employed. + 58. On 4/5/90, the Chicago Office of the Secret Service requested +Rolonie Kwasny, Security Supervisor, Illinois Bell Telephone to verify +that there are no other authorized or unauthorized telephone lines into +xxxx N. Clybourn other than 312-528-5020 and 312-xxx-xxxx. + 59. On 4/6/90, Kwansy notified the Chicago Office that early on that +date the xxxx N. Clybourn address was checked. The larger building of +which xxxx N. Clybourn is part, is serviced by 13 working phone lines +through the box attached to the Belmont Side of the building, which also +services the xxxx address. + + - 33 - + + 60. The only authorized phone line to the xxxx address is 312-xxx-xxxx +(the number Bruce Xxxxxxxxxxx gave as his business number in the police +report). The only other phone line (unauthorized) into the xxxx address +is bulletin board number 312-528-5020, the line which leads from the +junction box to the building. Kwasny advised that this type of hookup +required no special knowledge. + 61. Affiant has interviewed Sandquist, Mehnert, and CI 404-235, all +of whom have operated electronic bulletin boards themselves. All three +advised affiant that the sysop of a BBS must continuously perform a great +many maintenance or "housekeeping" chores necessary to operation of the +BBS. A sysop's maintenance functions include constantly making changes on +the BBS, such as adding or removing users, raising or lowering users' +level of access, removing files or programs uploaded to the BBS (added to +the system by a user). If a user places a virus or logic bomb which could +disrupt the functioning of the BBS, for example, on the sysop's computer, +the sysop can remove it. + 62. Since many BBS's (including this one) operate 24 hours a day, +for the convenience of sysops, BBS software allows many of these +functions to be performed from what is called "remote" locations, +I.e., by the sysop using another computer, over the telephone line to +the BBS. If the BBS is operating at a + + - 34 - + +business address, for example, the sysop can perform his maintenance +functions at night or any other time from his residence or from any +other location where he has a computer, modem, and telephone +communication to the BBS. BBS users commonly communicate directly +with the sysop on the BBS, either in "chat" mode or by leaving him +electronic mail (see Definitions section, above). A BBS sysop is +essentially "on call" during the entire time the BBS is in operation, +to solve equipment/software problems or interruptions to the operation +of the BBS, for the supervision of users, and to communicate with +them. Operating a BBS is extremely time-consuming, according to +Mehnert, Sandquist, and CI 404-235. + 63. CI 404-235 advised affiant that, when he logs on to the BBS, he +sees a screen in which the first two lines advised that connection has +been made to the BBS, the third line lists the baud rates, or speeds, at +which a user may communicate with the BBS, and the fourth line states "On +line since 12/10/83". This indicates that approximately one year after +the 312-528-5020 number was subscribed to by Bruce Xxxxxxxxxxx, the BBS began +operating. As of 4/29/90, all attempts to locate any residence for Bruce +Xxxxxxxxxxx other than that listed on his driver's license, auto +registration, post office box application, and subscriber records for +telephone number 312-xxx-xxxx, have been negative. Therefore, it appears +that his residence address is xxxx N. Lawndale, Chicago, Illinois. + + - 35 - + + 64. The telephone bills for the unlisted line (312-xxx-xxxx) which is +installed in the xxxx N. Clybourn building where the unauthorized BBS line +(312-528-5020) leads, are mailed to the same address, xxxx N. Lawndale, +Chicago, Illinois, to Fred Xxxxxxxxxxx. + 65. If the sysop is accessing the BBS from his residence, it is +likely that evidence of the sysop's identity and evidence relating to the +operating of the BBS will be found on a computer system at the residence, +or on diskettes, printouts, and other records at the residence. The +telephone bills for unlisted number are also likely to be found at the +residence, along with financial records such as cancelled checks or +receipts, which will assist in identifying the individual who paid them. + 66. At the xxxx N. Clybourn address, evidence of the connection of +the BBS equipment to the 312-528-5020 telephone line, and evidence +relating to the operation of the BBS, are expected to be found. Entry +into the premises at this location, and physical inspection, are necessary +in order to determine whether the 312-xxx-xxxx line is also connected to +the BBS. + 67. Based upon all of the foregoing, affiant believes that evidence +of violations of 18 U.S.C. ~~ 1343, 1030, 1029, 1962, 1963, and 371, will +be found at xxxx N. Lawndale, Chicago, Illinois, and at xxxx N. Clybourn, +Illinois, such evidence consisting of: + + - 36 - + + 68. Electronic data processing and storage devices, computers and +computer systems including central processing units; internal and +peripheral storage devices such as fixed disks, floppy disk drives and +diskettes, tape drives and tapes, optical storage devices or other memory +storage devices; peripheral input/output devices such as keyboards, +printers, video display monitors, optical readers, and related +communications devices such as modems; together with system documentation, +operating logs and documentation, software and instruction manuals. + 69. Telephone equipment such as lineman's handsets, memory +telephones, automatic dialers, programmable telephone dialing or +signalling devices, electronic tone generating devices. + 70. Records pertaining to ComSystems, ITT and other long distance +companies' access numbers and customer authorization codes; credit card +numbers; telephone numbers for computer bulletin boards, voice mail +systems, and corporate computer systems; PBX codes and related telephone +numbers; records and information related to the unauthorized access into +computer systems or to the sale, sharing, or other distribution of long +distance companies' access numbers and customer authorization codes, +credit card numbers, including financial records, receipt of payments, +worksheets, correspondence, memoranda, computer bulletin board downloads +or messages, and other documentation. + 71. Records pertaining to Mxxx Xxxxxx Inc., to Post + + - 37 - + +Office box number xxxx, telephone bills for 312-528-5020 and to +312-xxx-xxxx from 1982 to the present date, bank account records +including statements and cancelled checks for Bruce Xxxxxxxxxxx from 1982 +to the present date, business records relating to the occupancy of the +xxxx N. Clybourn premises, including rent/mortgage payment receipts, +rental or mortgage contracts, utility bills and proof of payment, and +records pertaining to the purchase, ownership, and maintenance of the +BBS computer system and software. + 72. All of the above records, whether stored or on paper, on magnetic +media such as tape, cassette, disk, diskette, or on memory storage devices +such as optical disks, programmable instruments such as telephones, +"electronic address books", programmable wristwatches, calculators, or any +other storage media, together with the indicia of use, ownership, +possession or control of all of the above property or records, including +bills, letters, identification, personal effects, memoranda, and other +documentation. + 73. Since much of the above-described evidence is likely to be found +in electronic form or machine-readable media which cannot be read or +analyzed by affiant in its present form, + + - 38 - + +affiant requests authorization to seize, listen to, read, review, and +maintain the above described property and records and to convert the +above records to human-readable form as necessary. + + + (Signature/G. Kirt Lawson) + Affiant + + + + Subscribed and Sworn before me this 30th day of + APRIL, 1990. + (signature) Cynthaia M. Penumire {??illegible) + Notary Public + + + +My Commission Expires (illegible) + + + +9865e/ + + + - 39 - + + + ---end of documents----- + + + + + \ No newline at end of file diff --git a/textfiles.com/bbs/safeinfo.fun b/textfiles.com/bbs/safeinfo.fun new file mode 100644 index 00000000..e959791b --- /dev/null +++ b/textfiles.com/bbs/safeinfo.fun @@ -0,0 +1,46 @@ +3 + + +(%=------------------=%) +) Safehouse Blueprints ( +(%=------------------=%) + +=-> 24 Hours + =-> 300/1200 baud + =-> 16 Megabytes Online + =-> Two seperate phone lines + + The Safehouse is run off of two seperate Apple //e's, connected to two +seperate phone lines (both at 300/1200 baud). If you call on and one line is +busy, it will automatically switch you over to the next line (or "port") if it +is available. + + The two Apple //e's are connected to a Corvus Omnidrive (which is capable +of handling up to 64 simultaneous computers of different types). Each +computer has 128K memory/80 column card, 212 Apple-Cat II Modem, +Thunderclock Plus clock card, and Zenith monitor. Port #2 also has a +System Saver, one floppy drive, and an ATS peripheral for current outdoor +temperature monitoring. + + The software running the system is the ProDOS version of the Apple-Net +BBS (sold through Dataware--see ad in the info booth) which will be available +very soon. Its a modular program, which means different parts of the program +get loaded into memory as you move around the system. With a hard drive, +this enables you to move around the system very quickly, and we also have a +virtually unlimited amount of space to add new features... + + Many people ask how X-talk is done. X-talk is Safehouse's section where +the two people that are currently logged into the system can chat with each +other by just typing lines & pressing RETURN. Since we have 2 Apples networked +with the Corvus Omnidrive, we use the drive for intercommunication between +users on each computer. We use what is called "pipes" on the Corvus drive, +which is basically an area set aside on the drive for computers on the +network to exchange information. Its split-second read/write time enables +the X-talk feature of Safehouse to be almost instant, as soon as you hit the +RETURN key. (If you are interested in the X-talk module for your BBS, leave +feedback to the Sysop for more info). Right now, Corvus and SunOl are the +only hard drives that I know of which are capable of using something like +"pipes". + +[<1-6>, ?=Menu, Q=Quit] : + \ No newline at end of file diff --git a/textfiles.com/bbs/safter b/textfiles.com/bbs/safter new file mode 100644 index 00000000..8f354db7 --- /dev/null +++ b/textfiles.com/bbs/safter @@ -0,0 +1,316 @@ + ' The Scene, as I see it, and a warning to all + my modem acquaintences ' + + By: Sought After + T/Date: 11:47pm Feb 3 1992 + + After seeing what has happened to The Grim Reaper, and TNSHB, their +boards, their groups, all that has happened since their bust, and the +reaction everyone is showing, I got pretty shook up about it. +(Yes, I got shook up) + + Everything seemed normal, as far as police procedure, but after +talking to TGR and hearing that he and TNSHB were not charged with anything, +after all of the things they (Mostly her) were involved in, I became +suspicious as to what was really happening. I mean, people don't just get +busted by the S.S., State, and Local authorities for the hell of it. And when +they are busted, they are BUSTED. They are taken downtown, and they are +charged with the crime(s) they committed, etc. From what I know, they were +not charged with anything. Enterprise was the Courier HQ for USA, a board +containing MANY warez, a board that had a HD loaded with shit the Feds would +take an intertest in. Now, why did the Feds take 3 of her other computers, +and not take the Enterprise as well? Reguardless if she could prove she owned +that computer/modem, etc by receipt of purchase, it would still contain +stuff that is illegal to have, therefore it would need to be confiscated, +and the data looked over by the authorities, then the computer would be +returned to the owner AFTER the trial, and they had been sentenced in a +court of law, IF the Judge saw fit to return it, and not until then. +Now, this is totally opposite of procedure normally taken by the Feds. +They should have been charged with numerous Federal charges, they should +have been in jail until a Michigan State Judge decided bail, or to release +them, and ALL of her equipment should have been confiscated, not just some. +This is the first time I have seen anything like this happen, this is why I +have decided to do what I am doing. + + I called THE GRIM REAPER up voice last night, and asked him how things +were going. I wanted to get his side of the story. We discussed various +things concerning this 'bust', and I noticed a lot of what is floating around +has been exagerated, but not really. (Something is being hidden from all of +us by TGR/TNSHB, this I am sure of, that is why I am writing this file, that +is why I made so many phone calls to see what the hell is going on) + + I program for a living, mostly Telecommunications Security type programs, +to keep 'hackers' out of corporate databases. Since I do this, I do make +friends with government agents, bell security, etc, and can find out what +is going on. (No, I have NOTHING to do with ANY type of investigation on +ANYONE ever at ANY time. I am not one of them, I just use my knowledge gained +through years of hacking to keep hackers out, but I do meet people who are +interested in what I can do, and they do have lose tongues, that is all. +I am not in any way, shape, or form involved with any law enforcement agency, +wheather National, State, County, or Local. Nor any software company, nor any +phone company. I am not a payed informant for any of the above. I would never go as low as busting ANYONE, +that is one reason I am telling you guys what is going on, SO, now you know +where I get my info, so don't go making any uneducated assumptions, ok? +Thanks) + + There has been an investigation conducted by the FBI for the last 1.5 +years. This investigation was to be done differently from any in the past. +Normally in the past, just one or two people would be arrested for whatever +they were doing, but the rest of the people in the 'scene' were not really +touched. This only put a bit of fear in a minority of the 'scene' for a +short period of time, and before long whatever it was that was being done +(Carding, Phreaking, Pirating, whatever) was back into action full speed. +What does this mean? This means the Feds were having a very small success +rate, and basically waisting government time, money, their time, and it all +ammounting to a lot of paper work, and the amount of frauds increasing. +Software companies lose an estimated $2 Billion a year, IEC's (LD Companies) +usually lose about $5 Billion a year, and who knows how much Credit Card +companies lose a year. These large corporations can only take so much, and +since all this shit is either a Federal thing, or is done over state lines, +the FBI are the guys who handle it. Now the FBI know what is going on out +there. They know that they are not doing any good, so that is why they +decided to conduct this extensive 'open file' investigation of the whole +scene. When they make a bust, the new tactic has been to find out as much +information about the "bustee's" friends in the scene as possible. Who +his friends are, what they are known to do, who they know, etc. They then +let this person off that gave them the info.(I only assume they let them off, +by the way TGR and TNSHB's case has been handled, and what a DA told me) +This type of busting can best be visualized by the term you find in most +BBS softwares, "Read messages by threads?". Do you understand now? The busts +are being/going-to-be conducted by threads. People who were close friends, +associates-in-fraud, closely associated will be taken down in threads. The +whole group of people. The first major bust done like this is TNSHB and +THE GRIM REAPER. What next? If Cool Hand goes (Just hypothetical, my friend), +then who with him? The Cracksmith, and their buddies? + + Right now I am pretty positive that THE GRIM REAPER and The Not So Humble +Babe are doing the same thing other people have been doing with the Feds, +and that is giving the Feds everything they know about everyone. I am talking +detailed shit. Why? Because the more the Feds know, the better they know how +to handle each group of people. A lot of people are in danger right now. +Especially people who were in close and consistent communication with +TGR and TNSHB. Sucks, eh? No joke. Well, what to do to make it safe for +yourself? QUIT THE SCENE NOW! NOT TOMORROW! The sooner the better. And, when +you quit publically announce it, as myself, and as The Eel has done. Why +publically? Because then the little 'informants' will get the word to the +Feds, and then you will be marked off their list. If you quit now, then +the Feds most likely will not have a chance to bust you for anything. +You won't have a Pirate board to bust, you won't be phreaking, you won't be +talking to people who are, you won't be uploading and downloading the latest +wares, you won't be keeping that high-profile which draws so much attention, +therefore you are not a target. Just because someone implicates you as a +major guy to bust because of , doesn't mean you are going +to be busted. They have to find SOME proof to back up the statement. Quit now, +and they have no proof. How do you guys like your freedom? I kinda like to be +able to wake up in the morning, at any hour I like, eat my own food, take +showers whenever I want, go wherever I want, do whatever I want, have no +limitations upon myself, have some pussy, live life, go places. What is all +that called? It's called freedom. Freedom is what makes life liveable. +Not all the people who get busted will get to be the Fed's tutors in who +we are, what we do, who we know, etc. Only a very few. I think the rest of +the guys who get busted, most likely only 2-5 people will get as lucky as +that, if you want to call losing your computer lucky, wheather they were +charged or not. Some of you are pretty damn established in the modem world, +as was I, and don't want to give it up. You might want to risk staying in. +But it's not worth it. Don't take chances. Look, I am not a religious person +at all, but I am a person who would rather be safe then sorry. About 5 years +ago I went to a Christian Church, learned their teachings, and did what I +needed to become one of them, so that in the end, according to their +teachings, I would go to Heaven. I don't really believe in a Heaven or Hell, +or in going to Church, but I did that ONLY in case it was true. I mean, what +would I lose? I did it, it's over, if it was all true I do go to 'heaven' when +I die, and if I had otherwise not done it, I would have gone to 'hell', and if +it turns out untrue, then it was at least an educational experiance, and no +loss to me. If you only dropped the scene for a few months and watched what +happens to those who stay, perhaps that will even do. I don't plan on ever +comming back to the scene, but for those who really are unsure about giving +up, just quit and see what happens in the next few month. When you see +what happens to those who do stay, you will be glad you didn't take that +chance. Look, all of you guys in the scene are VERY talented. Some more then +others, but at the very least you can operate a computer. That is a required +skill these days. But for those of you who can crack, code, those of you +who are artist, those of you who organize, you can utilize your skills in +the real world, and make a HELL of a lot of money. Just gotta call the +right people. I would guess there are only about 500 of you guys that I can +think of, maybe 1,500 in the whole country. Not many out of a country that +has 250 Million in it, is it? That means that all of you could find a job +utilizing your knowledge learned from the computer, your abilities (Cracking, +coding, artists, organizers, etc) in a way that is productive in the long-run, +earn money from it, and feel good that you accomplished something that counts. +Do you guys realize how much socializing is done on the boards? It is all +politics, diplomacy, socialization, communciation, and having skill in each +of those is really helpful. Yuo know that you all have most likely learned +that you can read someone's personality by the way they organize their +thoughts on paper? Neat I think. Anyway, you guys have the chance to pull +out of the scene now, and put your skills to good use. Otherwise, some Fed +could knock at your door the next morning, arrest you, take your computer, +and take you to Court. After court you most likely will pay a very large +fine for any pirated wares, restitutional charges for any phreaking/Credit +Card theft, and fines for Carding, etc. This goes on your permanent criminal +record, and scars you for life. Then, it would be like 90% harder to get that +good paying computer-related job, or anywhere you wanted to work. Pull out +now, guys. It is the only wise decision. Don't let the feds have a reason +to bust you. Yes, getting busted for software piracy does suck, and I +personally don't think it should be illegal, but don't take the cance of +getting a criminal record for having the newest K-Kewl warez, and the fine +that comes with it. At LEAST wait for this shit to die over. I am +leaving the scene most likely forever because I want to leave it all behind. +I have had a good 'career' here. Was -=INC=- Secretary, was -=IUD=- President, +was in iCE and ACiD, was in FelonyNET, ran Crewel Lye, got recognition, did my +job effitiently, I have gotten all I can get out of it, it is time to move +on. I am not going to lose all I have because I stayed around too long. + + I hope I have gotten the point accross. I am not blowing shit up +anyone's ass. I am telling you guys this because you have a future ahead +of you, even people as old as Cracker Jack ;), and you don't need to go +through the crap the Feds can give you. I like you all, even though some +people I had disagreements with, they were still good people, and not +disserving of a bust. + + I am going to finish this now, I don't know what else to say. +Already 12k long, pretty fucking big. heh. Well, I will close out by +sending my last greets to all I can think of. + + + + Line Noise - Hey guy, was great being in INC. The people were great, +the atmosphere was great, and the group had moral it seemed (Till the end). +Also, I do applaud you for running your group w/out drug money, and hot +hardware to support the cashflow for software. You are a very intelligent +person, and I know you will succede in life. Take it safe, and easy man, +and no hard feelings. You did what you thought was right. + + Cool Hand - Really enjoyed talking to you as much as I did. You are +a great person, even though we were incompatable in the end. I think we were +both a little unreasonable, but hey, no hard feelings. You were a great +person to work under, and I enjoyed your 'care-free' personality. You remind +me of that character from the movie Total Recall, Cohagen. As the people were +giving out of air in Venusville, Cohagen said, "Fuck 'em". That is a phrase +you often used, and I found it quite humorous. As TNSHB said, you have two +kids and a wife, 3 very good reasons to be careful now. I would give the +scene up, at least temporarily, don't leave them w/out a husband man, they +need you. Take care. + + Bloody ButCher - You were a true friend, and the most loyal of people I +have ever met, thanks. I will miss our 'About that time again' conversations. +But, I will always know that Mai gno Lam! heh. Take it easy man, and Ace +your classes! + + The Grim Reaper - Looks like they got you man, and you were one of the +luckier ones, eh? Well, hope it all works out for you. I did enjoy all our +conversations, and will miss them. Hey Cool Hand, this was a loyal fucker, +too. He and Bloody make your group shine. (As much as I hate to admit that ;) +Now I guess I am off to Rio for some sun, as you suggested. Take care! + + The Triton - Haven't seen you ANYWHERE? Anyway, enjoyed the chats we had. +You are an interesting character. Still going to shove your "Big Philipeno +dick up Vigilante's ass"? Would be good, someone should dispose of that loser. +Take it easy man, perhaps I will come see you sometime? We live near enough. + + The Cracksmith - You were one of the fairest people I met in the scene +man, thanks for trying to smooth things out for me before I left INC. +Anyway, good luck to you. + + Warlord - Selfish pig. Get your mind off yourself and think of others for +once, and perhaps then you might get something besides an XT. Greed gets you +know where. + + Genesis - Shit, what happened to you man? After Amy's demise, never +saw you again? Oh well. I enjoyed all of our talks we had months back. +You were another of the most unique people I met in the scene. Hope things +all work out for you, take it easy. + + Striker - A most dedicated Courier indeed! One that INC doesn't +realize is so good. Good luck guy. + + Warlock - Another dedicated personality, sorry I never got to make you +a real Courier in the group, you sure as hell earned it. Take care. + + Honus Wagner - A gifted artist and true friend. + + Black SpyriT - A gifted artist and one I would consider a friend. +Remember, "Moan, groan, hold on a sec, Dave".hahah. My ghod, he was a +humourous person sometimes wasn't he? And, I love your initials - BS. +Every time I see them I think the opposite of what I should. +BTW, your magazine was truly the best out there. + + Centurion - We never met for lunch? Still want to? (As long as we don't +discuss group politics). + + RaD MaN - Another gifted artist. Appreciate the membership in the +finest ANSi/VGA group, I am honored. Take care, and use your skill in a +profitable way, and get off the damn phone, your bill is too high ;) + + JED - The most talented of artist, I thank you for the ANSi's you made +for my members, I hope to see more of your art someday, eh? Take care. + + The Eel - You are a truly great person, and have foresight, and plan +for the future. Let us hope the rest do the same. Take care. + + The Dark Knight - Thanks for having faith in me, sorry to let you down. +You too are one of the few who seem so loyal. I consider you also a true +friend. Take care. + + Optical Ilusion - A True loser you are. I hope the bbs world is +rid of you forever. + + Navajo - Another truly talented artist, I appreciate the VGA you did. + + Cyberpunk - A dedicated person again. Take care. + + Lestat - I remember when I made you a Trial Courier in INC, one of the +first as I recall. I see you made it quite far in there, glad for you man. +You are a really cool person, and allow me to quote TGR, 'You have a killer +accent'. No joke, a genuine accent indeed. Take care man. + + SCi-Fi - You Couriered for me for a while. And greeted me in a WARES +release, Norton Commander 4.0, I believe. Greets in return. Take care. + + Dark Spyre - A backstabber and loser of the highest order. I am sure +others will see that in time. You have earned the rep you have. + + The Guardian - Was a short stay for you. Good luck my friend. + + The PieMaN - You are a cool person, hope things stay well for you. + + Axiom Codex - Another true friend out there. Gee, there were more of +you then I thought. That's nice to know. I won't abandon you guys. I will +vacation for a while, then call you. No law against talking to you guys. +Take it safe man. + + Tank - Thanks for the ANSi's man, they were your last, I shall remember +them as commemratives. + + The NotSoHumble Babe - Everyone gets what they deserve, especially when +they are as stupid as you. Oh well, losers are losers. + + Shadowalker - Or was it ShadowLord? (grin) + + Lord Blix - Life is so short. (Where are the rest of the Heart +Breakers?) + + Marshall Law - Another talented artist, and I never got my ANSi from +you. What happened? Take care. + + AfterMath - Good luck with V-X man, it's a GREAT software. But be wise, +and don't engauge in such foolish things as did the previous admin. You +are a great guy. Take care. + + Ryec - Good luck with V-X man. I hope to see it continue to thrive, and +win everyone's respect. It is a truly awesome software. And I know it will +get into production now that someone dedicated is in charge. + + Zodact - Sorry things didn't work out w/INC. Is Razor dead now too? + + + +That's all the people I can think of. To those I forgot, may you take it +easy, and learn from all this shit. I will quote someone, "You may very +well be witnessing the end of the pirate world". It's no shit. Uncool +thought, but neat to witness it, eh? I hope you all take the message in this +letter seriously. It is no joke man, life is very serious. Good luck to all. + +Black SpyriT - Put this in iNSANiTY #4 along with Mike's, will you? I always + diff --git a/textfiles.com/bbs/sanessay.txt b/textfiles.com/bbs/sanessay.txt new file mode 100644 index 00000000..223c4949 --- /dev/null +++ b/textfiles.com/bbs/sanessay.txt @@ -0,0 +1,204 @@ + Released 9/25/92 + -----=====> SANctuary <=====----- +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +Ripco ][ BBS - 312.528.5020 G. I. C. - 412.475.4969 + Sysop: Dr. Ripco Sysop: The Road Warrior + SANctuary Distribution Site SANctuary Distribution Site + +Temple of the Dog - 206.886.2283 CompuTron - 813.885.5974 + Sysop: Xiola Blue Sysop: Tron + SANctuary Distribution Site SANctuary Distribution Site + +~~~~~~~~~~~~~~~~~~~| The Matrix BBS - 908.905.6691 |~~~~~~~~~~~~~~~~~~~~ + |Sysops: Digital-Demon & Wintermute| + | Home of Modernz | + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +As a member of a speech and debate team I had to write an essay on, +well...whatever I wanted. So deciding to write about what I knew, I wrote +about the Computer Underground and here we have it. It is basically a +philsopshy session (remember, I had to deliver this publically, like in +front of teachers..) about the mind and habits of the hacker, so those of +you expecting hardcore facts, figures and phone numbers - you've got the +wrong file. However, if you are interested in knowing a little about how +the hacker ticks, because just getting passwords from other people is NOT +hacking, than you might wanna read this. Also, if it's a short research +paper you need for your sociology class on deviant cultures (i.e. the +Computer Underground, Hippies, Skinheads, etc.), well then again, you're in +luck. + - Havok Halcyon + +So we're off... + + Cruising the Electronic Highways + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + + A boy in his early teens sits in a brown swivel chair with an oak desk +in front of him. A light tapping sound fills the room as the average +looking fourteen year old adeptly types on his keyboard. His hands moving +quickly, the adolescent stares into a computer that glows a bright green. +Across the monitor the cursor zips side-to-side speaking the language in +which the child is so well versed. "Access granted", the words blink on +the screen; the young man's face lights up as he smiles wide and his eyes +come alive with anticipation. Now he's inside someone else's computer, +set for the exploration of an unknown and distant place. Welcome to the +world of the hacker. + A computer hacker; someone who, usually between the ages of thirteen and +twenty, uses his personal computer to investigate other people's by way of +a link through telephone lines. That's the technical explanation, the same +one most commonly expressed through articles in newspapers or stories in +magazines. That is also only the icing on a cake that has many layers, for +the true definition of a computer hacker goes much deeper. + A hacker worships the computer and the systems he peruses through. To +him the possibilities that the computer is capable of are limitless in +power and infinite in scope. A person who hacks is someone who has been +born to explore. And when a hacker sits down and prepares for one of these +journeys, a hacker does not think, 'Is what I'm doing legal or illegal?'. +A real hacker just does it because he must satisfy his intense curiosity +and want of learning. + Christopher Columbus was a hacker; Of course not in the same technical +sense as the computer hackers of today, but he did possess the same need +for exploration and want of learning that the computer hackers have. +Columbus explored new lands simply because they were there for the +exploring. Upon his discovery of the New World, Columbus didn't stop to +wonder how his finding would affect the inhabitants there; He just did it. +Leonardo da Vincci was a hacker. He explored the human body, by performing +autopsies. This specific activity was forbidden by the church, but Da +Vincci had an intense desire to know what made the human body tick so he +just did it.1 + Throughout history our world has been pushed through innovation by +hackers of all sorts. It's true that these people may have at times used +questionable means, but that's when you must consider, do the ends justify +the means? Columbus found us new lands and Da Vincci gave us early +glimpses of human anatomy. If it wasn't for hackers of all generations +questioning and sometimes even disobeying the authority that presided over +them, we wouldn't be where we are in history today. I'm sure we wouldn't +still be wearing shining armor and gallivanting around on horses while +carrying out the codes of chivalry; however, we wouldn't be by far quite as +advanced. For this, we owe a lot to the hackers. + The media will often portray computer hackers merely as juvenile +delinquents who go through systems to purposely invade others' privacy, +perhaps get rid of some long distance phone calls, or possibly even raise a +grade or two on his report card; This isn't a true hacker. This person is +an example of a bad apple in society. All societies have them, and the +underground hacking community is not immune to this. + A true hacker damages nothing, and leaves behind as little a trace of +himself as possible. This is done out of respect for fellow hackers who +naturally don't enjoy bad media attention, and out of respect for the owner +of the system, towards whom the hacker intends no harm. + Yet there are people out there who do fear hackers and think that these +kids are bent on destroying every tiny piece of information they can get +their hands on. In his 1984 Newsweek article, Richard Stanza said that +computer hackers are nothing more than "high tech street gangs dedicated to +making mischief". First one computer, then the downfall of our whole +economic system! What's next? The nation? The world? + For all of the people that feel that hackers represent such a tremendous +threat, why not try putting some of this immense energy within these youths +to work. Instead of screaming how people are just walking through their +systems, why not harness the innate curiosity that is driving these kids? +Utilize the skills they possess to provide something that is positive for +everyone. A working example of this is the conversion of The Legion of +Doom. This one time underground computer group consisting of some of the +most able hackers to ever grace the electronic highways has now become +Comsec Data Security. From adolescent break-in artists to one of the most +knowledgeable computer security companies in the nation, these people have +transformed an obsession of youth into a money making venture known the +world over. + In this country, privacy is dead. We are living in an age when the +American Government keeps files on just about everyone, whether it be +because you have a driver's license, received a college loan, or because +you pay your taxes on time every year. These are indeed suspicious +activities! The extent to which information is kept on the average citizen +is astounding. There are people out there that can go rummaging through +your house on a regular basis without you even knowing it. + Companies such as TRW, which holds files on over 150 million people, +regularly sell information to other companies and business persons looking +for new customers. It's a fact - every time you open up your mailbox and +see a pile of junk mail staring back at you, someone, somewhere has +accessed your credit records.2 Ironically, people didn't even know what +TRW was doing until hackers broke into their computer system and exposed +them in 1984. TRW considered this intrusion an invasion of privacy, but +stated that their collections of personal data on millions of people was +perfectly fine and dandy. + And still we should be worried about young, teen-age kids that will +occasionally poke around some computer? Just maybe they'll happen to read a +tidbit that says I bought two lamps and a toaster from Macy's last year. +Oh no, my life is ruined, what ever shall I do? The true invaders of +privacy have slipped through the fingers of lady justice. If a company +such as TRW is caught, a rare occurrence indeed, they will receive a whole- +hearted slap on the wrists. So for a change, how about leaving alone the +thirteen year old rummaging through trash bins, looking for written down +passwords that may have been thrown out by some absent-minded secretary? +Instead, let's realign our misdirected fire at the real crooks such as TRW, +Exxon, and political parties. + The computer hackers of today represent something that this country is +in dire need of, those willing to take risks in order to learn and to +achieve. People like these can wake up our generally apathetic society; +Continuing to push it through the world market with the creativity and +ideas that have made this country great. The old adage is 'the key to +success is hard work'. Here we have a culture full of young people that +only attain their goals through strict persistence, diligence and chutzpah +. Isn't this exactly what we are looking for in tomorrow's adults? +Tomorrows leaders? + And yes, the majority of these hackers are young. Is this much of a +surprise to anyone? In this country we are quickly losing touch with our +people, especially our youth. In the Winter 1990 issue of 2600 Magazine, a +letter to the editor read: + + Here we stand, bitterly complaining how many youths cannot read a + map(much less read) ... and yet we have those able to discover new + means of accessing information which even the so-called 'experts' + never realized existed! We are punishing talent that this country + desperately needs, rather than reaching out to exhort this raw and + excellent energy into new and vital means beneficial to all. + + The hackers of today must survive. Looking back on history, we see how +the ones of the past have shaped out future. A key to ending the fear that +the public holds for hackers is education. Our society needs to learn what +hackers are, and who they are. The people in our country must also try to +ignore the derogatory press they read about the deeds of computer hackers +because, let's be honest, a computer hacker that does no harm and maybe +even helps someone out, does not make the five o'clock news. The minority +few that do cause trouble, those are the ones you're going to see on your +TV set. + Eric Corley wrote in an article for 2600 Magazine: + + Hacking is not wrong. Hacking is healthy. Hacking is not + the same as stealing. Hacking uncovers design flaws and + security deficiencies. Above all, hacking proves that the + ingenuity of a single mind is still the most powerful tool + of all... We are hackers. We always will be... Call us co- + conspirators, fellow anarchists, whatever you want. We intend + to keep learning. To suppress this desire is contrary to + everything that is human... Like the authors who rose to defend + Salman Rushdie from the long arm of hysteria, we must rise to + defend those endangered by the hacker witch-hunts. After all, + they can't lock us all up and until they do, hacking is here to stay. + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + Originally written around 3/19/92, or a little before +Footnotes +~~~~~~~~~ + 1. 2600 Magazine: The Hacker Quarterly, Winter 1990, pg. 34 + 2. Ibid., pg. 33 + +Bibliography +~~~~~~~~~~~~ + 2600 Magazine: The Hacker Quarterly, Winter 1990 + Richard Stanza, "Night of the Hackers", _Newsweek_,1984. + And some other stuff which I don't remember, oh well.. Shoot me.. +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + This has been a SANctuary Production + Hey! Get up! You look silly bowing like that! + Feel free to distribute this file all over the known world +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Ohh in another world......./Yeah he could wear a dress - The Wonder Stuff + +Damn blast, look at my past,/rippin up my feet over broken glass. +Oh wow, look at me now,/I'm building up my problems to the size of a cow. + - The Wonder Stuff + +Maybe I should take the mike,/stand up tall like Michael Stipe, +/and try to solve the problems of the earth./Or maybe then I should sit +back down,/scratch my chin and use my frown,/and try to figure out exactly +what I'm worth. - The Wonder Stuff diff --git a/textfiles.com/bbs/sbbbs85.txt b/textfiles.com/bbs/sbbbs85.txt new file mode 100644 index 00000000..f37706f7 --- /dev/null +++ b/textfiles.com/bbs/sbbbs85.txt @@ -0,0 +1,131 @@ +"BBSing in L.A -Yes, it's quite different from here [Santa Barbara], +mainly because most boards are specialized--there are Commodore boards, +Apple boards, Atari boards, CP/M boards, IBM boards; gaming boards, ham +radio boards, dating boards, etc. There is no board that I have seen that +even remotely resembles the Enterprize, Empire, Citadel, Stonehenge, or what +have you. Most users rarely call more than one board, and the ones who do +are usually only on a certain group of boards. There is a heavy segregation +of users... while here in S.B. there seems to be a BBS melting pot. " + -- Danny Howell, Enterprize BBS, 06-Apr-87 + +My first contact with BBS's anywhere was in Summer 1985, at a Santa Barbara +Apple Users Group meeting, at a computer store (long defunct) in Loreto +Plaza. As part of a demonstration, we dialed into the Citadel, Noah's Ark, +and Father John's Place (q.v.). + +Later that year, and throughout 1986 I had limited access to the local +boards, by using a borrowed NEC 8216 laptop computer (with built-in modem). +In early 1987, I was able to set up my own system (a TI-99/4a, limited to +300 baud) for calling BBS's. + +I left the Santa Barbara area in Summer 1987, and returned to Los Angeles, +but I still continued to call Bowhead Whale, and occasionaly other SB boards, +until mid-1989 or so. This is a listing of the the BBS's that were active +in Santa Barbara during 1985-1987, when I was there. No phone numbers are +given because almost all of these systems are now defunct. However, each +system is listed with its sysop and/or software (if known) in parentheses. + +If anyone has any corrections, or additional historical information to add to +this document, please let me know. + +- Charles P. Hobbs + +[ed. note: Please let me know, too.] + + +SB BBS's of special note + +These were the systems that I called regularly in 1985-1987 and that seemed +to have the most consistent activity. + +* The Citadel (Tom "Toad" Marazita, Citadel) +The quintessential SB BBS. Extremely popular and busy, with many message +bases. Terminated operations in Summer 1986. + +1. Bowhead Whale (Bob Blaylock, Citadel/Stonehenge) +Where most of the SB BBS conversational activity went after Citadel shut +down. Great message bases, some files. + +2. Enterprize (Barry Boone and others, Custom software) +Another good conversational board (no file section). This is where the +first known BIFF attack took place. There was at least one major +disagreement ("Enteprize-gate") among the sysops of this board around +early April 87. + +3. Heechee Board/Macross City ("Oreo Cat"-Jim Lick, Stonehenge) +Again, mostly message bases, with good selection of files (including Mac +graphics). Somewhat younger, more free-wheeling crowd than Bowhead or +Enterprize + +4. Programmer's Shack (Joi Thompson, Fidonet) +Fidonet board, but only occasionally received echomail. Good file section +(IBM, Apple, ASCII text files and pictures) though. + +5. Oxgates (two systems: one in Santa Barbara and one in Goleta) +These two CP/M based BBS's required mail-in registration for access, but +offered a reasonable selection of downloads (CP/M and IBM mostly) + +6. Compucations (Craig Lindstrom, BBS-PC, then Citadel) +Operated on C64, then Amiga. One of the first known BBS's anywhere to offer +Internet e-mail (in 1987, via UCSB VAX system). + +Other experiments included networked C64's +Good discussions, small file sections due to no hard drive. + +7. Noah's Ark (TBBS) +Had discussion sections on birds and animals, but was most noted for its +file section. (and strict download ratios!) + +B. Other SB BBS systems (I called these less frequently, if at all.) + +8. System Royale +Unstable CP/M board (crashed a lot with "Bdos Error on B" type messages). +It operated for only a few weeks in 1986 and, again in 1987 + +9. Minas Tirith/Infinity's Edge ("The Omega"/"The Vision", a.o, Applenet) +"Private" system, difficult for most users to get validated on. . . + +10. The Wimp (Jim Patchell) +Great political discussions, but no new-users allowed! + +11. The Beast +Atari software for download, message bases + +12. Father John's Place +Religious board with good discussions (1986) + +13. The Breadbasket +Another religious board (1987). Featured an overzealous "cussing filter" +that replaced such words as "balls" with asterisks (even if you were +talking about plural convex spheroids). . . + +14. Quark (Howard Owen, BBS-PC) +Amiga board started up in 1987. + +15. ECO BBS +Another Fidonet board started in late 1987. Named after the sysop's late +Springer Spaniel (Any connection with current ECO BBS?) + +16. Third Eye +300 baud. Attempted to emphasize quality discussions, as opposed to file +transfers. + +17. Empire +18. Sanctuary +IBM and/or Atari boards with discussion bases, D&D games and file transfers. + +19. Backdoor +20. The Trap +21. Guru's Hookah +Commodore-64 boards of varying quality. At least one of these displayed "If +you don't have at least ten new C-64 games, hang up now!" at signon. + +22. Digital Dungeon (Glen Heinz, Custom software) +Started in Summer '87. For a while, networked with a board (of the same name) +in Los Angeles. + +23. UCSB Fido (Pete Gontier?, Fidonet) +Operated for a short time in mid-1986. No direct affiliation w/UCSB. + +24. Tri-Tec Center (Conrad Weiler?) +Operated by Santa Barbara City College, or a division thereof. diff --git a/textfiles.com/bbs/sbbstips.txt b/textfiles.com/bbs/sbbstips.txt new file mode 100644 index 00000000..e52c411e --- /dev/null +++ b/textfiles.com/bbs/sbbstips.txt @@ -0,0 +1,522 @@ + + + SUPERBBS TIP FILE + Len Morgan + QST BBS + P.O. Box 13965 + Sacramento, Ca. 95853-3965 + + Fido Address: 1:203/730 + BBS Phone: (916) 920-1288 + +This file contains most common mistakes when setting up SuperBBS. I +have tried to catagorize the problems for an easier time finding your +solution. I am constantly updating this file, so you may want to +periodically check for a new version. + +While it my intention is to assist the user with as many hints as +possiible, there are no guarantees that these fixes are related to the +problem of all users. Each computer system may exibit different +problems associated with hardware and applcations. This is a list of +suggested solutions only. + + INDEX + + Fossil ................................................ 1 + Batch file ............................................ 2 + Modem ................................................. 3 + Multinode ............................................. 4 + SuperBBS .............................................. 5 + Door .................................................. 6 + + + +1. FOSSIL PROBLEMS: + --------------- + +PROBLEM: BBS starts to load then gives a message of No fossil present, +then it ends. + +SOLUTION: You must have a program loaded as a TSR (Terminate and Stay +Ready) that allows the bbs to communicate with your comport. This is +called a FOSSIL driver. Two common fossil drivers are X00 and BNU and +can be found on most bbs's. + +PROBLEM: I run a HST modem, all my users get garbage when calling in +at 2400 baud and below. + +SOLUTION: You are using a HST modem and you did not lock your baud +rate. This is the rate at which your computer and modem communicate and +is usually locked at 19,200 or 38,400 baud. You lock your baud rate +with a fossil driver. An example of a locked fossil driver on com 1 +with X00 is: X00.EXE B,0,19200 E + +SOLUTIION: One of your modem settings control the DTE and DCD rates. +These are the baud rates that your modem and computer talk and your +software and callers. Your passing the modem to computer baud rate +to the callers. Check your modem settings. + +PROBLEM: My bbs won't load when a call comes in. The modem answers the +phone but the bbs won't load. + +SOLUTION: You may have set up either your fossil or SuperBBS with an +incorrect port. When loading SuperBBS for com 2 you need to load it +with: BBS.EXE -P2 the port in X00 is designated as the second +parameter (X00.EXE B,1,19200 E). + + + +2. BATCH FILE PROBLEMS: + ------------------- + +PROBLEM: My bbs loads, but when a user logs off it drops to dos. + +SOLUTION: You are not loading your bbs with a batch file or you have an +incorrect batch and it is not looping back to reload the bbs. Use this +simple batch file if you don't have a mailer program loading before +SuperBBS. Place it in your SBBS directory and run it: + +Echo off + +:start +bbs.exe -P1 -E0 + +:afterbbs +if errorlevel 2 goto end +goto start + +:end +Echo SuperBBS is down..... + +PROBLEM: I run a mailer and it won't pass the baud rate to the bbs +correctly. + +SOLUTION: While it is difficult to know all your mailer settings, you +will need to understand how your mailer passes the baud rate to your +bbs. SuperBBS can load several different ways including the user of +indiividual baud rates (-B300, -B1200, Etc.) or passing the baud rate to +a dobbs.bat file (-B%1), and depends on the method of batching your +using (SPAWNING or EXITING). Read the documents in the back of Sbbs +117 to learn about methods to know how to load baud rates. + +PROBLEM: I run a mailer and SuperBBS loads, but when a user logs off it +won't reload the mailer. + +SOLUTION: Your batch file isn't looping back to a starting point to +reload the mailer. If you use the spawning method, you need to reload +the mailer batch file. If your running the EXITING method see that it +returns to a label to start the batch file and reload the mailer. An +example would be: + +echo off +:start-------<----<-----<-------- + | | +cd\fd <--- | +fd.exe -->--------->---------- ^ + | | +if errorlevel 200 goto 2400 <-> | +goto end | ^ + | | +:2400 <----------------------- | +bbs.exe -B2400 -P1 -E0 ^ +goto afterbbs --->-- | + | | +:afterbbss <----<--- ^ +if errorlevel 3 goto mail | +goto start ----->---------->----- + +PROBLEM: I can't receive callers at baud rates above 2400 and I run a +HST modem with a mailer program. + +SOLUTION: You have the maximum baud rate in SuperBBS Config/Modem set +too low. Your maximum baud rate in SuperBBS should be your locked baud +rate. + +SOLUTION: Your not passing the baud rate from your mailer to SuperBBS +properly. See the batch file examples in the back of 1.17 documents. +Check your mailer setup and make sure your setup properly to pass the +hiigher baud rates to your batch file. + + +3. MODEM PROBLEMS: + -------------- + +PROBLEM: SuperBBS won't init my modem. It tries many times then fails. + +SOLUTION: You need to find the proper init string for your modem. File +request INITS.ARJ from QST and see if your modem is listed. + +PROBLEM: I added a HST modem and now I get errors during high speed +transfers. + +SOLUTION: You may be using an external modem and your I/O requires a +16550 Uart chip to buffer the high speed flow of data. You are loosing +data due to not having the buffers in your Uart chip. Check you I/O card +for either a 8250 or 16450 Uart chip (40 pin I.C.) and if you find it, +either the card or I.C. (if it unplugs) needs to be replaced with a +16550A, AN, or AFN Uart chip. + +SOLUTIION: If you don't have a 16550 Uart chip, lower your locked baud +rate to 19,200 Bps until you can replace it. + +SOLUTION: If loading DSZ in an external door, the command line, when +loading DSZ, needs to have the locked baud switch. + +PROBLEM: My modem drops carrier after answering the phone. + +SOLUTION: Most modems use the command &C1&D2 to control what the modem +does after answering. Check your DCD and DTE settings in your manual. + +PROBLEM: SuperBBS hangs up on 2400 baud users. + +SOLUTION: Check your config/modem and see what baud rate you specified +as your highest baud rate. You might have set it too low. + +PROBLEM: I set the init string in my modem and use the ATZ in SBBS to +init the modem, however, it won't save my init string correctly. + +SOLUTION: Use the AT&W command to save your init when done. + + + +4. MULTINODE + +PROBLEM: I keep getting the wrong download limits for users on lines. + +SOLUTION: Your set command of SET SBBS=C:\SBBS sets the enviroment for +SuperBBS and causes it to look in that directory for the needed files. +You are leaving the FILES.BBS in the main directory and SuperBBS is +finding them with the set command and loading them without looking in +your line directory. Remove FILES.BBS, CONFIG.BBS, Etc. from the system +directory and have them in each line directory. + +PROBLEM: I get the wrong menus for each line. + +SOLUTION: If your menus differ for each line, you need to have a +duplicate set and put them in the MENUS1,2, Etc. directory. Then edit +them for each line and change the path in the config of SuperBBS. + +PROBLEM: My menu editor changes the menus, but when I logon to a node +it isn't changed. + +SOLUTION: Put your user editor in each line directory and load it from +there. Make sure your config.bbs is removed from the system directory, +and put in the line directory that the menu editor is loaded from. + +PROBLEM: I keep getting corrupted files or loose my message base when +two users access it at the same time. + +SOLUTION: Install SHARE.EXE. You are opening the message base by both +users and corrupting it. + +PROBLEM: When my users line 2 access a game, they are getting names of +users on line 1 in the game. + +SOLUTION: Load config/Other/On/Off and answer Yes to the question Create +DORINFO?.DEF. This will make a dorinfo1,1,2, etc. for each node. + +PROBLEM: I can't get TopEd (Ansi Editor) to work. + +SOLUTION: Configure TopEd for all your nodes. + +SOLUTION: Make sure you have the Make dorinfo?.def set to yes in +config.bbs of each line directory and you are loading TopEd with the *N +switch from SuperBBS config. + +PROBLEM: No matter what I do in the config, it loads the settings +wrong. + +SOLUTION: Remove your config.bbs from the main directory and have the +config.bbs in each line directory, then load the bbs from the line +directory. Remember to remove ALL control files from the root or your +set command will look in the SBBS directory first and load what it finds +from there. + +SOLUTION: Load BBS.EXE -N1, -N2, Etc., for each line directory from +your batch file. Make sure you create a different batch file for +each line you run. + +SOLUTION: Make a seperate directory for each line and don't use the +SuperBBS directory for anymore callers. + +PROBLEM: I can't get my internal file transfers to work. + +SOLUTION: Obtain a copy of DSZ and put it into your SuperBBS directory +then ad this statment to you autoexec.bat file: SET +DSZLOG=C:\SBBS\DSZ.LOG, or whatever directory path you want to use for +it. + +SOLUTION: Make sure you have the EXTPE.EXE in the SBBS directory. + +PROBLEM: It won't run and gives a message of incorrect path to common +directory. + +SOLUTION: In SuperBBS config/multinode there is a path for a common +directory, name it and create one. + + + +5. SUPERBBS PROBLEMS: + ----------------- + +PROBLEM: I can't get SuperBBS to execute my events on the days I set +up. + +SOLUTION: Make sure your using X's and Dashes. X's denote the days you +want it to execute. + +PROBLEM: When I try to list files in a file area, SuperBBS tells me +that it can't find the files.bbs, but I have one in the directory. + +SOLUTION: Check your directory path to each file area in Config/Files. +Make sure you do not put the FILES.BBS after the pathway, it is assumed. + +PROBLEM: SuperBBS can't find my message base or user files. + +SOLUTION: In your autoexec.bat file, put SET SBBS=C:\SBBS, or whatever +drive and path you are using for your system directory. + +PROBLEM: My users upload a .REP packet for QWK offline reader and after +transfer SuperBBS says ".PKT not found". + +SOLUTION: Your packet is arriving, however, your archive program isn't +working to extract the .PKT message package inside. Check your +archivers and make sure they are in your path statment. + +PROBLEM: Users start a download and then it aborts. + +SOLUTION: You may be running out of memory. Turn on the swapping +option in config. Make sure you have buffers=20 files=20 in config.sys +or add some more memory. + +PROBLEM: All my users are getting the same time limit and it isn't +right. + +SOLUTION: Check that you defined the users time limit in LIMITS.BBS by +user level. + +PROBLEM: Scan.exe isn't working. + +SOLUTION: Sbbs has a problem handling McAfee's Scan. Remove it from +the Config and leave it blank. Put your latest copy of Scan.exe in a +directory that is in your path or in the SuperBBS directory. Make sure +you update the file on each change, because it will hang up with a +notice that you might be using a old version of Scan and asking if you +want to continue. + +PROBLEM: I moved my OVRSBBS.OVR to another directory and now I get an +overlay error -2. + +SOLUTION: Specify the path to the overlay with it's name, in +autoexec.bat. SET SBBSOVR=C:\OVERLAY\OVRSBBS.OVR or whatever drive and +directory you prefer. + +PROBLEM: I only want my users to use the english language but SBBS +won't find it. + +SOLUTION: Make a file called LANGUAGE.CTL and on the first line put +ENGLISH.LNG. Make sure you have both of these files in the SuperBBS +directory. + +SOLUTION: Load Lconfig and define the name of the language file your +using at the bottom of the first screen. + +SOLUTION: You don't have the DEFAULT.LNG in the system directory for +that line. + +PROBLEM: My lastread pointers don't work. + +SOLUTION: You may have converted from another bbs program and your +users all have a lastread count higher than your lastread.bbs file. +Delete the lastread.bbs and if possible reset all users lastread counter +to zero. They will have to begin over, but it will track properly. +There are programs that allow you to reset fields globally in the SuperBBS +user file. + +SOLUTION: Your users are setting their lastread counters higher than +the last message number. + +SOLUTION: You may be renumbering the messages with your message base +utility and not resetting the users.bbs file. + +SOLUTION: Make sure your message base is in the SuperBBS directory. + +PROBLEM: I have a CD-ROM and SuperBBS takes forever finding flagged +files. + +SOLUTION: This is a problem with versions prior to v1.18. Upgrade or +use ACfiles to handle CD-ROM's. + +SOLUTION: Discontinue the user of download counters. + +PROBLEM: My computer locks up after a download. + +SOLUTION: There is a problem with some computers when using the +download brackets [] and removing their use will solve the problem. + +PROBLEM: SuperBBS can't find my message base or user files. + +SOLUTION: You didn't put the set command in your autoexec.bat file. Put +ths statment in the autoexec.bat file: SET SBBS=C:\SBBS or whatever +drive and path you prefer. + +SOLUTION: Put your message base files (MSGTEXT.BBS, MSGINFO.BBS, +MSGHDR.BBS) in the SBBS directory. + +PROBLEM: SuperBBS won't show my usage graph properly. + +SOLUTION: This has been a problem with recent versions of Sbbs and +should be fixed in v1.18. Persistancy has payed off however, deleting +the timelog.bbs file and allowing it to rebuilt will sometimes cause it +to work properly. + + + +6. DOORS + ----- + +PROBLEM: When runnning a Bi-Modem protocol like HSLink, and a user uploads +at the same time they download, it puts the upload in the wrong directory. + +SOLUTION: This is not a problem, so much, with SuperBBS, but more of a +problem with the third party software not fitting it to SuperBBS. A +work around would be to use DSZ2ICOM to load just before the Bi-Modem +protocol. It will direct to upload the the proper directory before +beginning the transfer. + +SOLUTION: Have one directory for all uploads, then sort and toss them +manually at a later date. + +PROBLEM: I'm running an external protocol door and a HST modem. I get +slow CPS transfer rates and errors when some one uses it. + +SOLUTION: When running a protocol like DSZ, you must use hand shaking +and speed settings. Try loading the DSZ protocol like this; DSZ port %P +speed 19200 ha both est 0 %b sz %F. The "speed" will depend on if your +using a 16550 Uart chip or not. Locking your comport at 38400 may +require a 16550 Uart. The variables of %P, %F will depend on the door +your using to load DSZ and may change with the door program, they load +the port and file to be transfered. The "sz" if for send and "rz" for +receive. Xmodem and Ymodem DSZ are loaded in a simular fashion. + +PROBLEM: When a user loads a game, I run out of memory. + +SOLUTION: Use the *S command after the batch file name to swap SuperBBS +out to memory. + +PROBLEM: I run a HST modem and my bbs works fine, but when a user loads +a game all they see is garbage. It looks fine on my end. + +SOLUTION: The game door your using doesn't check the comport to get the +users baud rate and it is passing the locked baud rate to the user. +Complain to the author or install a program to unlock the baud rate +before loading the game, then lock it back after done. + +PROBLEM: I'm running a door for RA and it uses the dorinfo1.def and my +user base is getting corrupted. + +SOLUTION: Discontinue using the door or convert it over with Door +Master. It is a different structure then SuperBBS. + +PROBLEM: I need to run a door from another bbs on SuperBBS and it +doesn't use the same dorinfo1.def, it uses another type. + +SOLUTION: Use Door Master to convert the Dorinfo1.def to the bbs type +the program was written for. + +PROBLEM: I need a remote user editor so I can manage my message base +remotely. + +SOLUTION: Use Doorway. It allows you to run a program that isn't +supposed to be sent over the modem. This way, you can use the SuperBBS +SBBSUSER.EXE remotely. + +PROBLEM: What do I use to load Bluewave from the Config/door. + +SOLUTION: *C /c C:\BLUE\BLUE.BAT BW *N *P *S *MQ *E, change the path and +name to suit your setup. Be sure to make the batch file. :-) + +PROBLEM: I can't load a batch file within the config/doors. + +SOLUTION: In order to load a batch file in doors you must use the +command *C /c then the path and name of your batch file. You must also +have the statment in your autoexec.bat file SET COMSPEC=C:\COMMAND.COM. + +PROBLEM: When a door loads, it won't pass parameters like time +remaining, graphics, etc.. + +SOLUTION: You didn't use the paramters of *F *L *B *G *T *S *E after +the batch file name. They set the users first, last, baud, graphics, +time remaining, swap to dos, reset users info from exitinfo.bbs file. + +PROBLEM: SuperBBS loads my program, but it won't show up on the users +end. + +SOLUTION: The program may not be written to detect the comport and you +may need to use GATEWAY to direct it. + +SOLUTION: The program is not written to be used on a bbs as a door. + +PROBLEM: When my door loads it is asking for a file I don't have. + +SOLUTION: It is written for another bbs program like PCboard and you +need a program to convert the dorinfo?.def from the drop file it uses. +Find a copy of Door Master. + +Your assistance is appreciated in adding any problems that are not +covered. Please be sure to send me your problem/solution for updating +this file. + + CHECK LIST + +Many problems with installing or running SuperBBS are operator error +when installing the software. Here are some things to check. + +AUTOEXEC.BAT: + +SET SBBS=C:\SBBS or whatever path and directory name you prefer to +your system directory. + +SET COMSPEC=C:\COMMAND.COM to set dos to handle batch files. + +PATH=C:\;C:\DOS;\C:\SBBS to set the pathways for directories you will +need in Sbbs. + +CONFIG.SYS: + +DEVICE=C:\DOS\ANSI.SYS to load ansi. + +DEVICE=C:\DOS\X00 E to load the fossil driver. More is needed for HST +operation. + +BUFFERS=20 + +FILES=20 + +SUPERBBS: + +Keep your user files and message base in the SBBS directory. + +Load Config and enter all information correctly. Avoid any "Multi-line" +settings and directories unless you go multi-line. + +Load Lconfig and check your pathways to the system directory, menus, and +textfile directories. Don't forget to specify the language file your +using and make sure it is in the system directory. + +Create a batch file that reloads the bbs after a user logs off. See +examples in the back of 1.17 documents. + +You will need to experiment with modem settings in Config/Modem to get +your modem to init. If you have problems, file request INITS.ARJ from +QST and see if your modem settings are in there. If not, contact a +support site or SuperBBS echo and ask for a working setting for a +"Standalone" bbs for you modem model and type. + +NOTES: + +Most users don't give us enough of the problem to solve it. Be very +exact on what is happening and when. What kind of equipment your +running and when possble your autoexec.bat, config.sys, config.bbs, and +all batch files you use. + diff --git a/textfiles.com/bbs/sbfree.txt b/textfiles.com/bbs/sbfree.txt new file mode 100644 index 00000000..f59ec85c --- /dev/null +++ b/textfiles.com/bbs/sbfree.txt @@ -0,0 +1,513 @@ + ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» + º Welcome to the º + º Strictly Business!BBS º + º Free (or very low cost) Offers º + º To Help Your Business Grow º + º º + º (C) 1992 All Rights Reserved º +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÊÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÊÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + +FREE ÿ- ÿGuides to financial planning. ÿReceive: ÿA ÿÿConsumer ÿGuide ÿTo +Financial Independence, ÿConsumer Bill of Rights for Financial ÿPlanning, +The Registry Consumer Guide To Comprehensive Financial Planning, ÿplus up +to ÿ4 names and addresses of qualified financial planners in ÿyour ÿarea. +Available ÿÿby ÿcontacting: ÿÿInternational ÿAssociation ÿfor ÿÿFinancial +Planning, Two Concourse Parkway, Suite 800, Atlanta, GA 30328. ÿOr call: +404-395-1605. +========================================================================= + +FREE ÿ- Advice on using mailing lists effectively. ÿLearn the 7 rules on +how to increase your chances for a return on your mailing ventures before +you ÿspend a lot money buying mailing lists. ÿAlso offers ÿresources ÿon +this topic. ÿWrite to: ÿCalagraphics Publications, ÿ247 ÿOld Bergen Rd., +Jersey City, NJ 07305 or call 800-836-8266. +========================================================================= + +FREE ÿ- ÿReference Guide to answer questions about the UPC ÿsymbol. ÿÿIf +you're selling a product, one of the most important concerns today should +be ÿthe ÿscannability ÿof the UPC symbol. ÿThis ÿvaluable ÿguide ÿoffers +valuable ÿinsight ÿand answers some of the most common ÿquestions. ÿÿGet +yours today by calling 800-245-1168 ÿor writing to: ÿMattews Int'l Corp., +252 Park West Drive, P.O. Box 318, Pittsburgh, PA 15230. +========================================================================= + +FREE - Booklet! ÿOffered by the QUILL Business Library, ÿthis publication +shows ÿyou how to save money by knowing how the office products ÿindustry +works, ÿhow to shop for better prices and recognize any extra charges and +available discounts on office supplies, ÿand how to avoid the mistake ÿof +more costly items because of the manufacturer's name. ÿYou will be ÿable +to ÿsave ÿyour company money, ÿimprove the service you receive, ÿget ÿthe +quality you need, ÿand make your job easier. ÿTo receive your free copy, +contact QUILL Corporation, 100 Schelter Rd., Lincolnshire, IL 60069-3621. +Or Phone 708-634-8000. ÿFAX: ÿ708-634-5708. ÿPut to the attention of the +Director of Advertising and Marketing. +========================================================================= + +FREE - Publication! ÿAimed at helping businesses understand issues unique +to the international market, such as pricing, accounting, legal and sales +information ÿto ÿdevelop ÿmarkets, ÿthe U.S. ÿÿPostal ÿService ÿhas ÿmade +available ÿa publication called the INTERNATIONAL DIRECT MARKETING GUIDE: +Regional ÿMarkets ÿand ÿSelected ÿCountries ÿ(IDMG). ÿÿThere ÿare ÿbrief +overviews ÿof ÿsix ÿregional markets as well as detailed ÿinformation ÿon +seven ÿselected countries. ÿAlso, ÿthere are more than 80 ÿpages of next +step resources - publications, ÿdirect marketing associations, ÿU.S. ÿand +foreign commerical services offices, U.S. embassies and consulates, int'l +ZIP Code information, ÿplus much more! ÿAvailable through a local Postal +Service account representative or marketing office. +========================================================================= + +FREE - Foreign Exchange Tips for anyone planning to travel overseas, ÿAND +Foreign ÿCurrency Guide Tips (converting to the U.S. ÿdollar equivalent). +These ÿtwo ÿpamphlets ÿoffer ÿa ÿwealth ÿof ÿinformation ÿto ÿhelp ÿÿyour +international ÿtraveling needs. ÿTo receive your free pamphlets, ÿsend a +SASE to: Ruesch Int'l, 1350 Eye Street NW, Washington, D.C. 20005. +========================================================================= + +FREE - Booklet! Careers In Advertising is a valuable resource for anyone +considering a career in this area whether you become a consultant or work +for ÿsomeone ÿelse. ÿAddresses creative aspects, ÿmedia ÿconsiderations, +research, support services, client issues, plus much more. Also includes +a valuable bibliography which includes periodicals, directories, national +groups in advertising, ÿmarketing and related fields. Contact: ÿAmerican +Advertising Federation, 1400 K Street N.W., Suite 1000, Washington, ÿD.C. +20005. +========================================================================= + +FREE - Export Hotline! This FAX-back retrieval service, ÿoperated by AT&T +and ÿseveral ÿmultinational ÿcompanies, ÿhas ÿup-to-date ÿdetails ÿof ÿ50 +industries of all the US' ÿmajor trading partners. The service's mission +is ÿto help small and growing US businesses get into the ÿexport ÿmarket. +Call 800-USA-XPORT(872-9767) ÿfor the menu and code numbers of ÿavailable +documents. You then use your fax machine to reach the system and receive +the custom reports. Cost is only the fax call. You can receive additional +information via your fax or postal mail, call 800-872-9767. +========================================================================= + +FREE - Marketing Reports! ÿReceive from the National Center for Database +Marketing, ÿtwo special reports - 38 ÿRADICAL, ÿNEW TRENDS: ÿCHANGING THE +MARKETING ÿLANDSCAPE ÿFOREVER, ÿand TEN TOP ÿINDUSTRY ÿLEADERS' ÿÿHOTTEST +DATABASE ÿMARKETING TIPS. ÿIn addition, ÿyou'll receive their new ÿInfo- +Source ÿDatabase ÿMarketing catalog, ÿa ÿcomprehensive source ÿof ÿexpert +information ÿon database marketing strategies for beginning and ÿadvanced +professionals. ÿIt includes workbooks, ÿaudio & video tapes, books, ÿand +unique software. ÿAll this is available for FREE by calling (916) ÿÿ292- +3000, fax your request to 916-292-3504, or write: The National Center for +DATABASE MARKETING, ÿInc., Suite 888, 14618 Tyler Foote, Nevada City, ÿCA +95959-8599. +========================================================================= + +FREE - Publication. ÿThe National Association of Manufacturers (NAM) and +the Department of Energy have jointly published a booklet called ÿ"Energy +Efficiency - The Competitive Edge". ÿIt discusses how mid-size and small +companies can take advantage of energy-efficient programs. You can order +your FREE copy by contacting: ÿNAM, ÿAttn: John Cohen, 1331 ÿPennsylvania +Ave. NW, Suite 1500-North Lobby, Washington, D.C. 20004-1703. ÿPhone 202- +637-3161. +========================================================================= + +FREE - Demo Disk! Stay in Contact! The CONTACT PLUS(R) System will help +you ÿÿincrease ÿyour ÿpersonal ÿproductivity ÿthrough ÿthe ÿcomplete ÿand +automatic tracking of all your personal and professional ÿcorrespondence. +Every ÿdetail ÿof past letters, ÿmemos, ÿnotes and phone calls to ÿfuture +correspondence is instantly accessible at the touch of a few ÿkeystrokes. +After ÿdialing ÿthe ÿphone, ÿCONTACT PLUS(R) ÿwill ÿrecord ÿthe ÿoutcome, +duration ÿand ÿa ÿshort message of each ÿconversation, ÿÿquickly ÿpreview +previous correspondence, ÿbrowse through contacts, ÿmail merge or report, +popup ÿwindows, ÿtickler, ÿview appointments and ticklers in ÿ"week-at-a- +glance" ÿÿcalendar of easy scheduling. ÿAlso includes unlimited ÿhistory, +laptop compat., mailing labels, data import/export, record sorting, 'hot' +keys, ÿuser's manual, online help, optional interfaces, auto. backup. ÿTo +receive ÿyour FREE demo disk of this powerful contact management ÿsystem, +call 1-800-366-9876. ÿOr write to: ÿCONTACT PLUS Corporation, ÿP.O. ÿBox +2577, Satellite Beach, FL 32937-2577. +========================================================================= + +FREE ÿ- ÿBook! ÿÿHow to make $500 ÿA ÿDAY EVERY DAY IN YOUR ÿMAIL ÿORDER +BUSINESS. ÿThe author made over $1,000,000 ÿa ÿhome mail-order business, +and started with only $500. ÿThe 165-page book shows you how you can ÿdo +it too! To receive your free copy, write: Eileen K Rohleder, 305 E. Main +St., Suite 104, Goessel, KS 67053. Or call 1-316-367-2600. +========================================================================= + +FREE - Demo Disk! BUSINESS VISION II(R), The Accounting System for Small +Business(tm). ÿÿIncludes: ÿAll-In-One/On-Line Time Accounting, ÿaccounts +receivable, ÿaccounts payable, general ledger, ÿinventory control, ÿorder +entry ÿ& ÿbilling, ÿÿpoint-of-sale billing/cash ÿdrawer ÿcontrol, ÿÿsales +analysis, ÿÿpayroll, ÿÿexport, ÿbank reconciliation, ÿautomatic ÿposting, +financial reporting, ÿmailing list/labels, ÿinteractive ÿtuturial/on-line +help/user handbook, no special forms/adapts to your stationary, adapts to +your business terminology, ÿplus much more! ÿ1000's of businesses across +North America recognize BUSINESS VISION II as a winner. ÿTo receive your +FREE demo disk of this IBM compat. program, call or write: BusinessVision +Management ÿSystems Inc., ÿ5000 ÿBirch Street, ÿSuite 3000, ÿWest ÿTower, +Newport Beach, CA 92660-2140. Or call 1-714-476-3770. FAX: 714-752-2160. +========================================================================= + +FREE - Booklet! ÿCall Shred-It and Forget-It, ÿA ÿGuide To Shredding For +Document ÿSecurity. ÿCovers type of materials to be shredded, ÿtypes ÿof +shreds, ÿÿrecycling ÿis ÿgood business, ÿtypes and ÿsizes ÿof ÿshredders, +shredding systems, plus more. For your FREE booklet, call 1-800-621-5528 +or ÿFAX ÿ708-299-4939. ÿCUMMINS SHREDDERS, ÿCummins Allison ÿCorp. ÿÿ50+ +Factory Offices Nationwide. +========================================================================= + +FREE ÿ- Send for a full-color Limited Edition Print. ÿThe spirit of ÿthe +early ÿWest ÿis ÿreflected in this painting by ÿwell-known ÿartist ÿDavid +Thatcher. Limited edition prints of this painting, ÿsigned by the artist +and individually numbered, ÿ17" ÿx ÿ14", ÿsuitable for framing, ÿand ÿare +accompanied ÿby a brief history of the stagecoach in the early West. ÿÿTo +order, ÿÿcall W.A. ÿCHARNSTROM at 1-800-328-2962. ÿWe'll send you a FREE +print ÿtogether with our current catalog of Mail Handling ÿEquipment ÿand +Furniture, ÿÿthe ÿmost complete line in the industry. ÿPlease allow ÿ4-6 +weeks for delivery. Quanities of the print are limited, so call today! Or +write: ÿW.A. ÿCHARNSTROM, ÿ10901 Hampshire Avenue, So., ÿMinneapolis, ÿMN +55438-2385. LIMITED TIME OFFER!! +========================================================================= + +FREE ÿ- Demo Disk and Brochure. ÿMulti-User Software for lead ÿgeneration +and tracking, ÿtelemarketing, ÿcustomer service and more. ÿIncludes super +dialing/queueing, ÿÿintegrated ÿinbound, ÿunlimited fields ÿand ÿscreens, +direct ÿaccess to Paradox and dBase, ÿcreate custom databases, ÿup to 150 +users ÿon a LAN, ÿscripts integrated with database, ÿscripts with ÿlogic, +colors and branching, realtime reporting, and Word Perfect interface. For +a FREE demo disk and brochure, ÿwrite to Digisoft Computers, ÿInc., ÿÿ245 +East 92nd Street, New York, NY 10128 or call (212)289-0991. +========================================================================= + +FREE - Pamphlet: ÿIS THAT TRAVELING SALES JOB FOR YOU? ÿThis informative +publication ÿoffers suggestions on what to look for/lookout for when ÿyou +are ÿinterviewing ÿfor ÿa ÿtraveling ÿsales ÿjob, ÿÿsigning ÿa ÿcontract, +responsibilities ÿwhile on the job, ÿethical standards, ÿplus much ÿmore. +Receive your free copy by writing: ÿDirect Selling Education ÿFoundation, +1776 ÿK Street, NW, Suite 600, Washington, D.C. 20006. ÿOr call 202-293- +5760. +========================================================================= + +FREE ÿ- Demo Disk. ÿAGENTY POWER is a powerful business oriented software +tool for Inbound Call Center Managers. ÿIt will forecast agent needs and +provide ÿwork ÿschedules to match staffing to workload. ÿÿAlso ÿprovides +marketing ÿdata ÿon ÿtransaction mix, ÿtracks agent ÿproductivity ÿdaily, +monthly, and year-to-date, displays current service levels and agent work +status, ÿÿshows ÿkey ÿinformation for agent ÿmotivation ÿon ÿeasy-to-read +Display Board(s), plus much more. ÿCall or write to receive a FREE AGENT +POWER demo disk. ÿProfessional Resource Management, Inc., 579 ÿFirst Bank +Drive, Suite 250, Palataine, IL 60067. (708)359-3990 or 1-800-PRM-9985. +========================================================================= + +FREE - Report from the General Accounting Office (GAO). ÿCall to receive +"Management Practices: U.S. Companies Improve Performance Through Quality +Efforts." ÿOver 31,000 copies have been sold, ÿbut its now yours for the +asking! ÿCall the GAO general distribution center at (202)275-6241 or FAX +your request to (301)258-4066. +========================================================================= + +FREE ÿ- ÿWith ÿone call you will learn how to handle dozens ÿof ÿcustomer +calls instantly without increasing costs. ÿThe RobotOperator interactive +voice ÿresponse ÿsystem automatically answers calls on the first ring ÿ24 +hours ÿa ÿday and processes routine inquiries such as: ÿAccount ÿBalance, +Stock Quotations, ÿEmployee Benefits, ÿOrder Status, ÿBilling Information +and ÿmore. ÿÿYour ÿcustomers ÿare never put on hold, ÿÿyour ÿservice ÿis +enhanced, ÿand your costs remain low. ÿCall for a FREE IBM PC-Compatible +demonstration ÿdisk. ÿÿ(212)669-3988. ÿOr ÿwrite: ÿÿinterVoice, ÿÿ17811 +Waterview Parkway, Dallas, TX 75252. +========================================================================= + +FREE - Pop-Up E-MAIL Trial for Novell Users. ÿRequest a FREE trial ÿ(with +no ÿobligation ÿand ÿnothing to return) ÿand see why ÿmore ÿthan ÿ100,000 +Novell(R) ÿÿLAN users choose Notework(R) ÿfor E-Mail, ÿFAX and ÿTelephone +Messaging: ÿÿSimple 5 minute installation; ÿUse on 5K RAM; ÿ5 ÿminutes to +learn; ÿÿWorks ÿunder DOS, ÿWindows or both; ÿFAX ÿOption; ÿÿWide ÿE-Mail +Connectivity; ÿScheduling available; Remote version. ÿCall Tim Harris at +1-800-767-6683 for a FREE trial! +========================================================================= + +FREE ÿ- ÿCatalog. ÿIf you can't find the computer and office supply ÿyou +need now, call VISIBLE. They offer: ÿfast shipping - most orders shipped +within 24 ÿhours, ÿeasy toll-free ordering, hassle-free returns, ÿmonthly +specials, ÿ100% ÿsatisfaction guaranteed. ÿTo receive your FREE 164-page +catalog, call 1-800-323-0628. +========================================================================= + +FREE - Pamphlet for the budget-minded travelers. "Traveling on a Budget" +from the Budgetel Inns gives advice on lodging, meals, transportation and +sightseeing. ÿÿList phone numbers of states' ÿtourism offices to ÿrequest +further information. Don't be fooled by advertised hotel discounts. ÿOne +hotel's everyday rate might beat a competitor's discounted rate. ÿCall 1- +800-428-3438 to order. +========================================================================= + +FREE ÿ- Demo Disk on Instant SCSI Capabilities! ÿTrantor's MiniSCSI is a +new concept in SCSI interface hardware: a pocketsized, ÿstandalone device +which ÿadds SCSI I/O capabilities to almost any standard parallel printer +port. Retains simultaneous use of the parallel port. ÿIncludes software +for ÿhard disks; ÿmagneto optical; ÿSyQuest/Bernoulli Box drives and ÿCD- +ROMs; ÿÿPowered ÿby ÿthe ÿSCSI device; ÿNo batteries ÿor ÿexternal ÿpower +required; ÿSimple external plug-in -- Perfect for laptops. ÿTo receive a +FREE Demo Disk, call 1-800-275-8344. +========================================================================= + +FREE - all new 1992 catalog. ÿData Communications Products - Short range +communications, ÿTI and DDS, ÿMultiplexers, Sharing Devices, ÿToken Ring, +Data Compressors, ÿFiber Optics, PC Devices, ÿplus much more! ÿSend your +business card to: RAD Data Communications, Inc., 151 W. Passaic, Rochelle +Park, NJ 07662-9968. +========================================================================= + +FREE ÿ- Publication "Money Sense Overseas." ÿIn this small brochure from +Travel Enterprises, you'll find advice on where to convert currency, ÿhow +to ÿget ÿthe best exchange rate, ÿhow to budget and how to pick ÿa ÿmoney +converter, ÿÿand tipping guidelines for hotels, ÿrestaurants, ÿtaxis ÿand +other services. ÿIncludes a checklist of necessities for travel planning +(like a passport and incoculations, canceling newpapers delivery, etc. To +receive your FREE copy, ÿsend a self-addressed, stamped business envelope +to: Traveler's Tips, 3602 W. Glen Branch, Peoria, IL 61614. +========================================================================= + +FREE - Catalog to meet all your networking service needs. ÿIncludes: ÿLAN +service kits, ÿcrimping tools, ÿcoax strippers, ÿRS-232 ÿconnector ÿkits, +diagnostic ÿsoftware, ÿwire/cable & connectors, ÿtesting equipment, ÿÿLAN +connectivity devices, ÿshipping containers, and lots more! ÿTo order your +FREE catalog, call 602-968-6231. +========================================================================= + +FREE ÿ- ACCOUNTING/DISTRIBUTION Demo Diskette. ÿ"If you expect the ÿmost +out of your accounting system, get Macola." - PC Magazine 10/15/91. ÿThe +new MACOLA 5.0 ÿincludes: Graphic User Interface; ÿEasy to Install & Use; +Solutions for Manufacturing, Distribution, Service & Retail. To receive a +FREE Demo Diskette, call 1-800-468-0834. +========================================================================= + +FREE - Catalog! ÿWith MCM Electronics you can always count on the best of +everything ÿ- every time! ÿThe best service including toll-free ordering, +24-hour ÿshipping ÿand technical assistance. ÿThe best product ÿselection +with over 17,000 ÿitems stocked. ÿThe best catalog featuring hundreds ÿof +new items. Call 1-800-543-4330 for your FREE catalog subscription. +========================================================================= + +FREE ÿ- Small Business Success. ÿIf you are thinking about ÿstarting ÿor +already ÿown ÿa ÿbusiness, ÿa ÿFREE annual publication from the ÿSBA ÿand +Pacific Bell that might be of interest. Called "Small Business Success", +the 72-page edition covers how to get financing, ÿselling your ÿbusiness, +surviving ÿduring a recession, ÿautomating your company, ÿpurchasing ÿfax +machines, ÿcellular phones, computers, plus much more! Also, ÿan 18-page +directory includes references to agencies, ÿarticles, books, and more. To +receive your FREE copy, write to: Pacific Bell Directory, 101 ÿSpear St., +ATTN: Communications Dept., P-CWS4, Room 429, San Francisco, CA. 94105. +========================================================================= + +FREE ÿ- ÿNew 288 ÿpage Catalog and Reference ÿGuide. ÿÿData ÿacquisition, +communications, ÿand software products. ÿfor IBM PC/XT/AT, ÿPS/2, ÿMicro +Channel computers an compatibles. ÿWrite: Keithley Metrabyte, 440 ÿMyles +Standish Blvd., Taunton, MA 02780-9962. +========================================================================= + +FREE ÿ- ÿWorks ÿwith ÿWindows! ÿJoin the ÿgrowing ÿranks ÿof ÿscientists, +engineers, ÿÿand other professionals who are using PLOT-IT(R) ÿto produce +and ÿpublish ÿthousands ÿof graphs and diagrams. ÿOver ÿ60 ÿÿgraph ÿtypes +including ÿ3D * Versions for DOS, ÿOS/2 ÿ& ÿWINDOWS 3.1 ÿ* ÿWordPerfect & +Ventura ÿcompatibility ÿ* ÿMuch ÿmore. ÿÿWrite: ÿÿScientific ÿProgramming +Enterprises, ÿPO Box 669, Haslett, MI 48840-0669. ÿ(Demo disk available +for qualified responders.) ÿInclude your name, ÿaddress, ÿcompany ÿname, +title, ÿÿphone #, ÿgraphics software now used, ÿand whether your need ÿis +immediate, 3-6 months, or 6 months+. +========================================================================= + +ALMOST ÿFREE ÿ- ÿLIFETIME SUBSCRIPTION to TECHNOLOGY ÿHOTLINES ÿfor ÿonly +$9.88. ÿPublished every month, ÿreceive information on new products ÿand +ideas ÿto ÿhelp ÿautomate your business. ÿFind out whats new ÿin ÿPC ÿand +compatible products. ÿCall (813) 461-3317 or write: ÿTECHNOLOGY HOTLINES, +P.O. Box 719, Clearwater, FL 34617. +========================================================================= + +FREE - Samples & Catalog. Simplify The Accounting, Inventory Control and +Security ÿof ÿyour ÿvaluable ÿassets ÿwith BAR ÿCODE ÿTAGS ÿfor ÿProperty +Identification. Label equipment, tag inventory, mark installations. ÿFor +free samples and catalog, ÿcall 800-243-6624 ÿor write: ÿSeton Name Plate +Co., P.O. Box CD-1331, New Haven, CT 06505-9970. +========================================================================= + +FREE - Demo for Windows! Take a closer look at Drafix(R) Windows CAD(tm)! +Send for a free output restricted working CAD model for Windows! Explore +the ÿfeatures ÿand ÿeasy-to-use ÿinterface of Drafix ÿWindows ÿCAD ÿ($695 +suggested retail). ÿCall 800-231-8574 or FAX (816)891-8018. ÿOr write to: +Foresight Resources Corp., 10725 Ambassador Dr., Kansas, MO. 64153. +========================================================================= + +FREE - Booklet called "The TRUTH About: ÿFINANCING A SMALL BUSINESS". ÿTo +get your copy, you must include your business card or business letterhead +(to ÿshow you are really in business). ÿInclude $2 ÿP&H. ÿWrite to: ÿJ.F. +(Jim) ÿStraw, ÿFINANCING YOUR SMALL BUSINESS, ÿ301-JL Plymouth Drive N.E. +Dalton, GA. 30721-9983. +========================================================================= + +FREE ÿ- ÿBooklet on what to look for in a ÿcopier. ÿÿContains ÿobjective +advice without alot of promotional hype. Write: Xerox Corp., 1 Xerox 05B- +IB, Rochester, NY 14644. +========================================================================= + +FREE - Employer's legal responsibilities under federal law and lists ÿthe +number of to call for further information. Request: Wage Withholding For +Child Support: ÿAn Employer's Guide For Small Business. ÿWrite to: ÿChild +Support, Pueblo, CO. 81009. +========================================================================= + +FREE ÿ- 'A Guide For Small Business Owners' ÿanswers insurance ÿquestions +such ÿas how to structure a health care plan, ÿhow to attract & hold good +employees, ÿÿprotecting ÿyour company, ÿhow state & ÿfederal ÿregulations +affect your health insurance choices as a small busines owner, ÿand more! +For a free copy, ÿcall 1-800-942-4242 or write: Health Insurance Associa- +tion of America, 1025 Connecticut Ave., NW, Washington, D.C. 20036-3998. +========================================================================= + +FREE - Export Opportunity Hotline. Call 1-800-243-7232. Operated by the +Small Business Foundation of America. +========================================================================= + +FREE - EXECUTIVE COMPENSATION, published by Price Waterhouse, is a 19 pg. +booklet ÿwhich addresses executive-compensation options including phantom +stock, ÿÿstock-appreciation ÿrights, ÿand ÿdeferred-performance ÿbonuses. +Brief descriptions explain how each technique works and its advantages ÿ& +tax ÿconsequences. ÿÿFor a free copy, ÿcall Price Waterhouse's ÿNational +Headquarters at 1-212-819-5000, or call one of their local offices. +========================================================================= + +PAYROLL ÿTAX ÿGUIDE - Free publication offers changing facts, ÿforms ÿand +figures ÿevery employer should know. ÿDetails deadlines. ÿÿCovers ÿlast +year's 500 ÿstatutory tax law changes. ÿWrite to: ÿADP Response Center, +335 ÿBishop Hollow Rd., Newtown Sq., PA 19073. ÿOr call 1-800-225-5237, +Ext-125. +========================================================================= + +FREE COPY of 'Common Concerns'. ÿAddresses insurance questions and needs +affecting small businesses. ÿWrite to: National Life Insurance Co., ÿOne +National Life Drive, Dept. IN3, Montpelier, VT 05604. +========================================================================= + +FREE ISSUE! ÿ- TECHNOLOGY & LEARNING is the #1 information source to over +80,000 computer and technology-using educators and administrators. ÿEach +issue ÿoffers ÿcurriculum ÿplanning, ÿsystem development, ÿÿand ÿcreative +computing. Call 1-800-543-4383 or write to: Technology & Learning, ÿ2451 +E. River Rd., Dayton, OH 45439. +========================================================================= + +FREE ÿReport. ÿDiscover why silver may be one of the best investments of +the '90s. ÿInternationally respected economist John Pugsley, ÿauthor ÿof +the bestselling book, ÿCommon Sense Economics, explains in this exclusive +report ÿwhy ÿhe believes silver presents one of the ÿgreatest ÿinvestment +opportunities ÿof ÿthe ÿ1990s. ÿGet his FREE report. ÿÿLook ÿinto ÿthis +important investment opportunity new. ÿThere's no obligation. ÿCall ÿour +24-hour toll-free information hotline today. 1-800-854-3361. +========================================================================= + +FREE FOR ONE YEAR. The Total Personal Excellence Catalog. ÿNow get over +80 ÿÿfree recommendations every 90 ÿdays on the best things available for +improving your life. ÿYou'll get detailed suggestions for making all the +money ÿyou need, ÿbeing health, ÿhaving the most rewarding relationships, +finding your ideal job...and more! For fast delivery, ÿcall 714-393-8454 +or write: ÿThe Total Personal Excellence Catalog, ÿ16143 ÿFirestone Lane, +Chino Hills, CA 91709. +========================================================================= + +FREE ÿFOR THE FIRST 90 ÿDAYS! ÿReady or not--postal rates have gone ÿup! +Now's ÿthe perfect time to try metered mail from Pitney ÿBowes--and ÿit's +free ÿfor ÿyour first 90 ÿdays. ÿ(Basic unit). ÿTo order ÿor ÿfor ÿmore +information, ÿcall today: 1-800-MR BOWES. 8am to 8pm Eastern time, Monday +thru Friday. (Basic unit. Trial offer for new customers only). +========================================================================= + +FREE copy of "Employer's Guide to Investigation Services." ÿFind out how +to ÿspot ÿa crook...Before you sign a deal, ÿfind out about the ÿcompany. +Background investigation on any business, ÿfranchiser, ÿor person ÿyou're +thinking ÿof trusting with your funds. ÿPre-employment job ÿapplications +checked. ÿTo receive your free copy, ÿcall Pickerton's at 1-800-232-7465 +or FAX: 404-364-8592. +========================================================================= + +FREE ÿCOPY ÿof ÿWhy Salesmen Fail!...And What To Do About ÿIt! ÿÿHow ÿto +qualify in the first 10 ÿminutes. ÿEnd call-reluctance forever. ÿHow to +overcome price objections. And much more! Call 1-800-638-5686. +========================================================================= + +FREE DEMO! ÿFOLLOW-UP software program reminds you who and when to call. +Produces form letters with the built-in word processor or works with your +present ÿone; ÿÿalso prints mailing labels. ÿKeeps multiple ÿappointment +calendars. ÿÿMaintains "to do" ÿlists. ÿEasily produces accurate ÿsales +forecasts and sales call reports. ÿFor IBM PC and compatible desktop ÿor +laptop. ÿÿNetwork version available. ÿCall 1-800-428-8457. ÿÿOr ÿwrite: +FOLLOW UP Software Co., 2456 Lakeside Ave., Cleveland, OH 44114. +========================================================================= + +FREE ÿMAILING ÿLIST CATALOG! ÿBusiness, ÿÿFinancial, ÿÿMedical, ÿÿLegal, +Technical, ÿInstitutional, Consumer, and all mailing lists. ÿCall 1-800- +243-4360 or write: Research Projects, P.O.Box 449, Woodbury, CT 06798. +========================================================================= + +FREE Six-Month Trial Subscription to the HOPE HEALTH NEWSLETTER. ÿSee if +you ÿdon't agree that the HOPE Letter is the ideal publication to commun- +icate your company's health promotion and cost-containment ÿobjectives... +and ÿthe perfect publication to motivate employees to become more health- +cost conscious. ÿFor fast service, ÿcall 616-343-0770, ÿext.159, ÿor FAX +616-343-6260 ÿor write: HOPE Health Publications, ÿInt'l Health Awareness +Center, 350 E. Michigan Ave., Suite 301, Kalamazoo, MI. 49007-9833. +========================================================================= + + This information is brought to you by: + + Strictly Business!BBS + - - - - - - - - - - - + An Informational Exchange Service For + Entrepreneurs, Managers & Business Professionals + + * Helping Your Grow A More Positive + Positive Business * + +EXCLUSIVES! - Online Guide To Business Planning Series - FREE! + " - Strictly Business! Success Catalog - FREE! + " - Strictly Business! Online Newsletter - FREE! + " - Int'l Venture Capital Institute's Directory of + Domestic and International Venture Groups Directory + " - Businesses You Can Start From Home Without Spending A + Fortune + " - Information you won't find on any other BBS, anywhere! + " - Plus much, much more! + + * Hundreds of Business-Related Articles * + * Directories and Software Programs * Messaging * + * Discounts and Specials * MA*RT (Market Analysis-Research Trends) * + * Download on first call * Newsletters * National Job Search Database * + And always lots more... + + CALL: 614/538-9250 (modem); 8/N/1; 24 Hours A Day! + +- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +Disclaimer: +Strictly ÿBusiness!BBS and it's Sponsors & Members is not affiliated with +nor ÿwill ÿnot ÿbe held responsible for anything ÿthat ÿmay ÿresult ÿfrom +contacting ÿany ÿof the persons/organizations listed in ÿthis ÿdirectory. +The listing is provided as an informational service only. We've tried to +list ÿthe ÿinformation as accurately as possible. ÿYou assume all ÿrisks. +Offers ÿmay ÿbe voided, ÿcancelled or withdrawn by ÿpersons/organizations +listed in this file without notice. + +This file may be freely distributed on other computerized bulletin board +systems as long as it is not edited, altered or changed in any manner. + +HEY! Do you have a FREE or 'verrry low cost (next to nothing)' ÿbusiness- +related ÿoffer ÿthat ÿyou would like to be included ÿin ÿthis ÿdirectory? +Great! Contact Bruce via any of the following ways listed below. + +Questions ÿor ÿconcerns about this directory ÿand ÿStrictly ÿBusiness!BBS +should be directed to: Bruce Kullberg, Sysop, Strictly Business!BBS. + + Mailing Address: 933 Varsity Ave., Columbus, OH 43221 + Strictly Business!BBS: 614/538-9250 (modem) + FAX: 614/777-1924 + CompuServe: 70421,1373 + GEnie: B.KULLBERG + + + H A V E A G R E A T D A Y ! + +(C)opyright 1992 Strictly Business!BBS. All rights reserved. +------------------------------------------------------------------------- + + diff --git a/textfiles.com/bbs/scared.pwp b/textfiles.com/bbs/scared.pwp new file mode 100644 index 00000000..11503479 --- /dev/null +++ b/textfiles.com/bbs/scared.pwp @@ -0,0 +1,88 @@ +[ver] + 4 +[sty] + default.sty +[files] +[prn] + Epson FX-80 +[lang] + 1 +[desc] + + + + + + 724464632 + 1 + 724463712 +[fopts] + 0 + 1 + 0 + 0 +[lnopts] + 2 + Body Text +[docopts] + 5 + 2 +[l1] + 0 +[pg] + 1 + 10 0 0 1025 49152 0 0 65535 65535 Standard 0 0 0 0 0 0 0 0 0 0 65535 0 0 0 0 0 0 +[edoc] + This story in all it will sound like exargarations is completly truthful +and I want you all to know that it was hard for me to put out this +message but I am worried about it happening to another bbs'er.... + + + The Other day I called The Communacations BBS and well I don't know +I guess I just felt like it... My friend had told me that it was okay. +So i called it and I connected I realized that this must be an adult +board well it had all the makings hell the Sysop was named Charles +Bare... Well I called and signed on as a newuser and all the like....I +completely forgot about it the next day when me and my brother went +out late at night to go pick up a pizza, well when I got back my father +told me that some man had called saying this " Your son is now validated +and he can get all the pornography he wants" my father just went along +with it....so I guess I figured that I wanted to call up this BBS +and check out the man's so called "Pornography" well he had pornography +and all but then I went into chat with him and he said that he wanted +me to u\l things so I said alright I haveto call back later he said +don't call modem call voice....So i said yes and hung up...All the +while knowing that this man freaaked me out so I knew i wasn't going +to call him voice so I didn't.....I called modem And he said "I SAID +CALL ME VOICE DAMMIT" but he called me and said he wanted GIFS of +naked men and all that so I like said yes yes and all that and hung +up and so i called the next day knowing I wasn't gonna u\l anything +and it said that I was locked out.....and I didn't thin anything of +it until my mom said when I got home from school today that some man +had called at 3am and said that 'HE WAS GOING TO BURN MY HOUSE DOWN +FOR PUTTING THREATINING MESSAGES ON HIS BBS" so I said alright I have +had enough of this so I called him and said "BUDDY YOU STOP CALLIN +MY JHOUSE OR I WILL CALL THE COPS" there was a long period of Silence +and he hung up...I called back and he said "ALRIGHT YOU BLOODY CUNT +CALL THE COPS I DON'T CARE I WILL BURN YOUR HOUSE DOWN WITH EVERYONE +IN IT" and he hung up so I called Squinky and said please Jarrett +do something so he called the guy well he is calling him right now +telling him not to do anything and that I won't call again....So I +called my friend who had named this board and he said once he had +u\l'ed a GIF of two men and the guy had said + +SYSOP: ARE YOU GAY? + +MARK: NO + +SYSOP: TOO BAD BECAUSE I WANTED TO FUCK YOU UP THE ASS + +well here is my story I am asking for you people out there to give +me suggestions... + +____________ + + /he Edge + + + \ No newline at end of file diff --git a/textfiles.com/bbs/security.txt b/textfiles.com/bbs/security.txt new file mode 100644 index 00000000..f5a1895f --- /dev/null +++ b/textfiles.com/bbs/security.txt @@ -0,0 +1,133 @@ + + WILDCAT!(tm) BBS system + Security Emergency + Documentation + January 2, 1989 + Richard B. Johnson + PROGRAM EXCHANGE + (303) 440-0786 + + There exists within the WILDCAT!(tm) external protocol pro- + cedures the considerable possibility that somebody who is + familiar with the system could execute a copy of COMMAND.COM + and have full control of your computer, erasing or format- + ting disks, and creating all kinds of havoc. Basically, any- + thing that you could do from the keyboard can be done by the + remote-user if he knows how to do it. + + Please read all the ".DOC" files in this archive and the + archives included within. I also suggest that you implement + LOG (LOG.ARC) if you haven't already done so. I was able to + detect an attempt at breaching security on my own system. + The only thing that prevented the hacker from getting to the + DOS level was he didn't know what the "upload" filename was + on my system. The LOG utility was what first called my + attention to this problem. + + Note that I was able to log onto a system in Colorado as a + new user and, within 60 seconds I was at the 'DOS' level. It + had taken me only 20 seconds on my own system but I knew the + names of the "upload" batch files and the communications + adapter port being used. + + The problem is that the external protocol setup, as advised + by Mustang Software, will allow an "upload" batch file to be + replaced by a batch file of the same name during an upload! + If your communications adapter port is COM1, and you use a + batch file called JUP.BAT for JMODEM uploads, the hacker + could upload the following JUP.BAT file: + + REM * hacker's special + REM + REM + REM + REM + REM + REM + REM + IF %3 == HACKER.TXT GOTO BREAK + GOTO END + :BREAK + @ECHO OFF + CTTY COM1 + COMMAND + :END + + + + + + + + + + + - 1 - + + + + + + It works this way. The first "upload" is a file called + JUP.BAT. JMODEM (could be ZMODEM or any external protocol) + dutifully overwrites the existing JUP.BAT and exits with no + errors. + + COMMAND.COM, when executing a ".BAT" file opens then closes + the file for each line in the file. COMMAND.COM "knows" that + the last line was, perhaps, line 4. It therefore looks at + line 5 for its next instruction. It executes one of the + several "REM" statements, then exits at the ":END" label + since the filename (%3) was not HACKER.TXT. + + The BBS system software regains control and, finding no file + transferred, simply continues like nothing happened. + + The hacker then attempts to upload HACKER.TXT using the + JMODEM protocol. JUP.BAT has been replaced with the hacker's + new version. Since the %3 parameter is now HACKER.TXT, the + batch file branches to label ":BREAK". The console input is + redirected to the COM1 port and an additional copy of + COMMAND.COM is loaded with its I/O having been redirected to + the COM1 port. + + Of course the hacker has not executed any external protocols + on his system. He's just sitting there in terminal-mode in + full control of your system. + + Caveat modulus carborundum. + + - finis - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - 2 - + + \ No newline at end of file diff --git a/textfiles.com/bbs/seizures.txt b/textfiles.com/bbs/seizures.txt new file mode 100644 index 00000000..9ffe079b --- /dev/null +++ b/textfiles.com/bbs/seizures.txt @@ -0,0 +1,575 @@ + +CS-ID: #3760.proline/net@pro-sol 31241 chars +Date: Fri, 1 Jun 90 11:20:19 PDT +From: nazgul@alphalpha.com (Kee Hinckley) +Subject: Dangers in running a BBS + +I've been following the news regarding BBS seisures for a while now, +but this is the first time that I've seen most all of the information +in one place. While "2600" magazine (the Phreaker publication from which +this excerpted (by way of the Risks Digest at CSL.SRI.COM)) is somewhat +biased towards the harmlessness of hackers, the article is relatively +balanced and those references with which I'm familiar are presented +factually. + +The fact of the matter is that a BBS operator may be arrested because +of things that the BBS users placed on their system. It remains to be +seen whether you can be convicted of crimes on that basis, but the +initial outlook is not good. If nothing else the mere time it takes +to get through the court system could do you in. It's quite likely +that the systems currently seized won't be returned for several years. +Ironicly it seems to me that the electronic privacy act prevents the +sysop from determining whether users are doing anything illegal, even +though the sysop is liable if they are. But then, we live in a country +where the government is allowed to break foreign and US laws in foreign +countries; in order to bring a foreigner back here where we then accuse +them of breaking US laws in foreign countries. I guess expecting it +make sense is asking too much. + +The following article is excerpted from: + +--- +RISKS-LIST: RISKS-FORUM Digest Saturday 26 May 1990 Volume 9 : Issue 95 + + FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS + ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator + +Contents: + Possible Anti-Virus Legislation + (Robert Smithmidford via Thomas Zmudzinski via Linda K. Perez) + Secure UNIX Infected? (Craig Harmer via Russ Davis via Linda K. Perez) + Follow-up on Fed Raids on Hackers (David Ruderman) + Crypto '90 conference, 11-15 August 1990, UC Santa Barbara (John Gilmore) + +ALL CONTRIBUTIONS ARE CONSIDERED AS PERSONAL COMMENTS; USUAL DISCLAIMERS APPLY. +The RISKS Forum is moderated. Contributions should be relevant, sound, in good +taste, objective, coherent, concise, and nonrepetitious. Diversity is welcome. + +CONTRIBUTIONS to RISKS@CSL.SRI.COM, with relevant, substantive "Subject:" line +(otherwise they may be ignored). REQUESTS to RISKS-Request@CSL.SRI.COM. +TO FTP VOL i ISSUE j: ftp CRVAX.sri.comlogin anonymousAnyNonNullPW + cd sys$user2:[risks]get risks-i.j . Vol summaries now in risks-i.00 (j=0) + +... +------------------------------ + +Date: Tue, 22 May 90 14:49:22 EDT +From: ruderman@sbcs.sunysb.edu (David Ruderman) +Subject: Follow-up on Fed Raids on Hackers (Including factual information) + +THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-RELEASED SPRING EDITION OF +2600 MAGAZINE, THE HACKER QUARTERLY. WE FEEL THAT THE CURRENT HAPPENINGS +IN THE COMPUTER WORLD ARE EXTREMELY SIGNIFICANT FOR ANYONE WHO HAS ANY +INTEREST IN COMMUNICATIONS AND/OR TECHNOLOGY. WE'D BE MOST INTERESTED IN +ANY FEEDBACK ON THIS TOPIC. [See the end of this message.] + + ************************ + ARTICLE ONE: AN OVERVIEW + ************************ + +A year ago, we told the stories of Kevin Mitnick and Herbert Zinn, two hackers +who had been sent to prison. It was then, and still is today, a very disturbing +chain of events: mischief makers and explorers imprisoned for playing with the +wrong toys and for asking too many questions. We said at the time that it was +important for all hackers to stand up to such gross injustices. After all, they +couldn't lock us all up. + +It now appears that such an endeavor may indeed be on the agendas of some very +powerful U.S. governmental agencies. And even more frightening is the +realization that these agencies don't particularly care who or what gets swept +up along with the hackers, as long as all of the hackers get swept up. +Apparently, we're considered even more of a threat than we had previously +supposed. + +In retrospect, this doesn't come as a great deal of a surprise. In fact, it now +seems to make all too much sense. You no longer have to be paranoid or of a +particular political mindset to point to the many parallels that we've all been +witnesses to. Censorship, clampdowns, "voluntary" urine tests, lie detectors, +handwriting analysis, surveillance cameras, exaggerated crises that invariably +lead to curtailed freedoms.... All of this together with the overall view that +if you're innocent, you've got nothing to hide. And all made so much more +effective through the magic of high tech. Who would you target as the biggest +potential roadblock if not the people who understand the technology at work? It +appears the biggest threats to the system are those capable of manipulating it. + +What we're about to tell you is frightening, plain and simple. You don't have +to be a hacker to understand this. The words and ideas are easily translatable +to any time and any culture. + +Crackdown + +"We can now expect a crackdown...I just hope that I can pull through this one +and that my friends can also. This is the time to watch yourself. No matter +what you are into.... Apparently the government has seen the last straw in +their point of view.... I think they are going after all the 'teachers'...and +so that is where their energies will be put: to stop all hackers, and stop +people before they can become threats." + +This was one of the reactions on a computer bulletin board to a series of raids +on hackers, raids that had started in 1989 and spread rapidly into early 1990. +Atlanta, St. Louis, and New York were major targets in what was then an +undetermined investigation. + +This in itself wouldn't have been especially alarming, since raids on hackers +can almost be defined as commonplace. But this one was different. For the very +first time, a hacker newsletter had also been shut down. + +Phrack was an electronic newsletter published out of St. Louis and distributed +worldwide. It dealt with hacker and phone phreak matters and could be found on +nearly all hacker bulletin boards. While dealing with sensitive material, the +editors were very careful not to publish anything illegal (credit card +numbers, passwords, Sprint codes, etc.). We described "Phrack World News" (a +regular column of Phrack) in our Summer 1989 edition as "a must-read for many +hackers". In many ways Phrack resembled 2600, with the exception of being sent +via electronic mail instead of U.S. Mail. That distinction would prove to be +Phrack's undoing. + +It now turns out that all incoming and outgoing electronic mail used by Phrack +was being monitored by the authorities. Every piece of mail going in and every +piece of mail coming out. These were not pirated mailboxes that were being +used by a couple of hackers. These had been obtained legally through the +school the two Phrack editors were attending. Privacy on such mailboxes, +though not guaranteed, could always be assumed. Never again. + +It's fairly obvious that none of this would have happened, none of this could +have happened had Phrack been a non-electronic magazine. A printed magazine +would not be intimidated into giving up its mailing list as Phrack was. Had a +printed magazine been shut down in this fashion after having all of their mail +opened and read, even the most thick-headed sensationalist media types would +have caught on: hey, isn't that a violation of the First Amendment? + +Those media people who understood what was happening and saw the implications +were very quickly drowned out in the hysteria that followed. Indictments were +being handed out. Publisher/editor Craig Neidorf, known in the hacker world as +Knight Lightning, was hit with a seven count indictment accusing him of +participating in a scheme to steal information about the enhanced 911 system +run by Bell South. Quickly, headlines screamed that hackers had broken into +the 911 system and were interfering with emergency telephone calls to the +police. One newspaper report said there were no indications that anyone had +died or been injured as a result of the intrusions. What a relief. Too bad it +wasn't true. + +In actuality there have been very grievous injuries suffered as a result of +these intrusions. The intrusions we're referring to are those of the +government and the media. The injuries have been suffered by the defendants +who will have great difficulty resuming normal lives even if all of this is +forgotten tomorrow. + +And if it's not forgotten, Craig Neidorf could go to jail for more than 30 +years and be fined $122,000. And for what? Let's look at the indictment: + +"It was... part of the scheme that defendant Neidorf, utilizing a computer at +the University of Missouri in Columbia, Missouri would and did receive a copy +of the stolen E911 text file from defendant [Robert J.] Riggs [located in +Atlanta and known in the hacker world as Prophet] through the Lockport +[Illinois] computer bulletin board system through the use of an interstate +computer data network. + +"It was further part of the scheme that defendant Neidorf would and did edit +and retype the E911 Practice text file at the request of the defendant Riggs +in order to conceal the source of the E911 Practice text file and to prepare +it for publication in a computer hacker newsletter. + +"It was further part of the scheme that defendant Neidorf would and did +transfer the stolen E911 Practice text file through the use of an interstate +computer bulletin board system used by defendant Riggs in Lockport, Illinois. + +"It was further part of the scheme that the defendants Riggs and Neidorf would +publish information to other computer hackers which could be used to gain +unauthorized access to emergency 911 computer systems in the United States and +thereby disrupt or halt 911 service in portions of the United States." + +Basically, Neidorf is being charged with receiving a stolen document. There is +nothing anywhere in the indictment that even suggests he entered any computer +illegally. So his crimes are receiving, editing, and transmitting. + +Now what is contained in this document? Information about how to gain +unauthorized access to, disrupt, or halt 911 service? Hardly. The document +(erroneously referred to as "911 software" by the media which caused all kinds +of misunderstandings) is quoted in Phrack Volume 2, Number 24 and makes for +one of the dullest articles ever to appear in the newsletter. According to the +indictment, the value of this 20k document is $79,449. [See story that follows t +his one] + +Shortly after the indictments were handed down, a member of the Legion of Doom +known as Erik Bloodaxe issued a public statement. "[A group of three hackers] +ended up pulling files off [a Southern Bell system] for them to look at. This +is usually standard procedure: you get on a system, look around for +interesting text, buffer it, and maybe print it out for posterity. No member +of LOD has ever (to my knowledge) broken into another system and used any +information gained from it for personal gain of any kind...with the exception +of maybe a big boost in his reputation around the underground. [A hacker] took +the documentation to the system and wrote a file about it. There are actually +two files, one is an overview, the other is a glossary. The information is +hardly something anyone could possibly gain anything from except knowledge +about how a certain aspect of the telephone company works." + +He went on to say that Neidorf would have had no way of knowing whether or not +the file contained proprietary information. + +Prosecutors refused to say how hackers could benefit from the information, nor +would they cite a motive or reveal any actual damage. In addition, it's widely +speculated that much of this information is readily available as reference +material. + +In all of the indictments, the Legion of Doom is defined as "a closely knit +group of computer hackers involved in: a) disrupting telecommunications by +entering computerized telephone switches and changing the routing on the +circuits of the computerized switches; b) stealing proprietary computer source +code and information from companies and individuals that owned the code and +information; c) stealing and modifying credit information on individuals +maintained in credit bureau computers; d) fraudulently obtaining money and +property from companies by altering the computerized information used by the +companies; e) disseminating information with respect to their methods of +attacking computers to other computer hackers in an effort to avoid the focus +of law enforcement agencies and telecommunication security experts." + +Ironically, since the Legion of Doom isn't a closely knit group, it's unlikely +that anyone will be able to defend the group's name against these charges -- +any defendants will naturally be preoccupied with their own defenses. +(Incidentally, Neidorf was not a part of the Legion of Doom, nor was Phrack +a publication of LOD, as has been reported.) + +The Hunt Intensifies + +After learning of the Phrack electronic mail surveillance, one of the system +operators of The Phoenix Project, a computer bulletin board in Austin, Texas, +decided to take action to protect the privacy of his users. "I will be adding +a secure encryption routine into the e-mail in the next 2 weeks - I haven't +decided exactly how to implement it, but it'll let two people exchange mail +encrypted by a password only known to the two of them.... Anyway, I do not +think I am due to be busted...I don't do anything but run a board. Still, +there is that possibility. I assume that my lines are all tapped until proven +otherwise. There is some question to the wisdom of leaving the board up at +all, but I have personally phoned several government investigators and invited +them to join us here on the board. If I begin to feel that the board is +putting me in any kind of danger, I'll pull it down with no notice - I hope +everyone understands. It looks like it's sweeps-time again for the feds. Let's +hope all of us are still around in 6 months to talk about it." + +The new security was never implemented. The Phoenix Project was seized within +days. + +And the clampdown intensified still further. On March 1, the offices of Steve +Jackson Games, a publishing company in Austin, were raided by the Secret +Service. According to the Associated Press, the home of the managing editor +was also searched. The police and Secret Service seized books, manuals, +computers, technical equipment, and other documents. Agents also seized the +final draft of a science fiction game written by the company. According to the +Austin American-Statesman, the authorities were trying to determine whether +the game was being used as a handbook for computer crime. + +Callers to the Illuminati bulletin board (run by Steve Jackson Games), received +the following message: + +"Before the start of work on March 1, Steve Jackson Games was visited by agents +of the United States Secret Service. They searched the building thoroughly, +tore open several boxes in the warehouse, broke a few locks, and damaged a +couple of filing cabinets (which we would gladly have let them examine, had +they let us into the building), answered the phone discourteously at best, and +confiscated some computer equipment, including the computer that the BBS was +running on at the time. + +"So far we have not received a clear explanation of what the Secret Service was +looking for, what they expected to find, or much of anything else. We are +fairly certain that Steve Jackson Games is not the target of whatever +investigation is being conducted; in any case, we have done nothing illegal +and have nothing whatsoever to hide. However, the equipment that was seized is +apparently considered to be evidence in whatever they're investigating, so we +aren't likely to get it back any time soon. It could be a month, it could be +never. + +"To minimize the possibility that this system will be confiscated as well, we +have set it up to display this bulletin, and that's all. There is no message +base at present. We apologize for the inconvenience, and we wish we dared do +more than this." + +Apparently, one of the system operators of The Phoenix Project was also +affiliated with Steve Jackson Games. And that was all the authorities needed. + +Raids continued throughout the country with reports of more than a dozen +bulletin boards being shut down. In Atlanta, the papers reported that three +local LOD hackers faced 40 years in prison and a $2 million fine. + +Another statement from a Legion of Doom member (The Mentor, also a system +operator of The Phoenix Project) attempted to explain the situation: + +"LOD was formed to bring together the best minds from the computer underground +- not to do any damage or for personal profit, but to share experiences and +discuss computing. The group has always maintained the highest ethical +standards.... On many occasions, we have acted to prevent abuse of systems.... +I have known the people involved in this 911 case for many years, and there +was absolutely no intent to interfere with or molest the 911 system in any +manner. While we have occasionally entered a computer that we weren't supposed +to be in, it is grounds for expulsion from the group and social ostracism to +do any damage to a system or to attempt to commit fraud for personal profit. + +"The biggest crime that has been committed is that of curiosity.... We have +been instrumental in closing many security holes in the past, and had hoped to +continue to do so in the future. The list of computer security people who +count us as allies is long, but must remain anonymous. If any of them choose +to identify themselves, we would appreciate the support." + +And The Plot Thickens + +Meanwhile, in Lockport, Illinois, a strange tale was unfolding. The public UNIX +system known as Jolnet that had been used to transmit the 911 files had also +been seized. What's particularly odd here is that, according to the electronic +newsletter Telecom Digest, the system operator, Rich Andrews, had been +cooperating with federal authorities for over a year. Andrews found the files +on his system nearly two years ago, forwarded them to AT&T, and was +subsequently contacted by the authorities. He cooperated fully. Why, then, was +his system seized as well? Andrews claimed it was all part of the +investigation, but added, "One way to get [hackers] is by shutting down the +sites they use to distribute stuff." + +The Jolnet raid caused outrage in the bulletin board world, particularly among +administrators and users of public UNIX systems. + +Cliff Figallo, system administrator for The Well, a public UNIX system in +California, voiced his concern. "The assumption that federal agents can seize +a system owner's equipment as evidence in spite of the owner's lack of proven +involvement in the alleged illegal activities (and regardless of the +possibility that the system is part of the owner's livelihood) is scary to me +and should be to anyone responsible for running a system such as this." + +Here is a sampling of some of the comments seen around the country after the +Jolnet seizure: + +"As administrator for Zygot, should I start reading my users' mail to make +sure they aren't saying anything naughty? Should I snoop through all the files +to make sure everyone is being good? This whole affair is rather chilling." + +"From what I have noted with respect to Jolnet, there was a serious crime +committed there -- by the [federal authorities]. If they busted a system with +email on it, the Electronic Communication Privacy Act comes into play. +Everyone who had email dated less than 180 days old on the system is entitled +to sue each of the people involved in the seizure for at least $1,000 plus +legal fees and court costs. Unless, of course, the [authorities] did it by the +book, and got warrants to interfere with the email of all who had accounts on +the systems. If they did, there are strict limits on how long they have to +inform the users." + +"Intimidation, threats, disruption of work and school, 'hit lists', and +serious legal charges are all part of the tactics being used in this +'witch-hunt'. That ought to indicate that perhaps the use of pseudonyms wasn't +such a bad idea after all." + +"There are civil rights and civil liberties issues here that have yet to be +addressed. And they probably won't even be raised so long as everyone acts on +the assumption that all hackers are criminals and vandals and need to be +squashed, at whatever cost...." + +"I am disturbed, on principle, at the conduct of at least some of the federal +investigations now going on. I know several people who've taken their systems +out of public access just because they can't risk the seizure of their +equipment (as evidence or for any other reason). If you're a Usenet site, you +may receive megabytes of new data every day, but you have no common carrier +protection in the event that someone puts illegal information onto the Net and +thence into your system." + +Increased Restrictions + +But despite the outpourings of concern for what had happened, many system +administrators and bulletin board operators felt compelled to tighten the +control of their systems and to make free speech a little more difficult, for +their own protection. + +Bill Kuykendall, system administrator for The Point, a public UNIX system in +Chicago, made the following announcement to the users of his system: + +"Today, there is no law or precedent which affords me... the same legal rights +that other common carriers have against prosecution should some other party +(you) use my property (The Point) for illegal activities. That worries me.... + +"I fully intend to explore the legal questions raised here. In my opinion, the +rights to free assembly and free speech would be threatened if the owners of +public meeting places were charged with the responsibility of policing all +conversations held in the hallways and lavatories of their facilities for +references to illegal activities. + +"Under such laws, all privately owned meeting places would be forced out of +existence, and the right to meet and speak freely would vanish with them. The +common sense of this reasoning has not yet been applied to electronic meeting +places by the legislature. This issue must be forced, or electronic bulletin +boards will cease to exist. + +"In the meantime, I intend to continue to operate The Point with as little risk +to myself as possible. Therefore, I am implementing a few new policies: + +"No user will be allowed to post any message, public or private, until his name +and address has been adequately verified. Most users in the metropolitan +Chicago area have already been validated through the telephone number +directory service provided by Illinois Bell. Those of you who received +validation notices stating that your information had not been checked due to a +lack of time on my part will now have to wait until I get time before being +allowed to post. + +"Out of state addresses cannot be validated in the manner above.... The short +term solution for users outside the Chicago area is to find a system closer to +home than The Point. + +"Some of the planned enhancements to The Point are simply not going to happen +until the legal issues are resolved. There will be no shell access and no file +upload/download facility for now. + +"My apologies to all who feel inconvenienced by these policies, but under the +circumstances, I think your complaints would be most effective if made to your +state and federal legislators. Please do so!" + +These restrictions were echoed on other large systems, while a number of +smaller hacker bulletin boards disappeared altogether. We've been told by some +in the hacker world that this is only a phase, that the hacker boards will be +back and that users will once again be able to speak without having their words +and identities "registered". But there's also a nagging suspicion, the feeling +that something is very different now. A publication has been shut down. +Hundreds, if not thousands, of names have been seized from mailing lists and +will, no doubt, be investigated. The facts in the 911 story have been twisted +and misrepresented beyond recognition, thanks to ignorance and sensationalism. +People and organizations that have had contact with any of the suspects are +open to investigation themselves. And, around the country, computer operators +and users are becoming more paranoid and less willing to allow free speech. In +the face of all of this, the belief that democracy will triumph in the end +seems hopelessly naive. Yet, it's something we dare not stop believing in. Mere +faith in the system, however, is not enough. + +We hope that someday we'll be able to laugh at the absurdities of today. But, +for now, let's concentrate on the facts and make sure they stay in the +forefront. + +==> Were there break-ins involving the E911 system? If so, the entire story +must be revealed. How did the hackers get in? What did they have access to? +What could they have done? What did they actually do? Any security holes that +were revealed should already have been closed. If there are more, why do they +still exist? Could the original holes have been closed earlier and, if so, why +weren't they? Any hacker who caused damage to the system should be held +accountable. Period. Almost every hacker around seems to agree with this. So +what is the problem? The glaring fact that there doesn't appear to have been +any actual damage. Just the usual assortment of gaping security holes that +never seem to get fixed. Shoddiness in design is something that shouldn't be +overlooked in a system as important as E911. Yet that aspect of the case is +being side-stepped. Putting the blame on the hackers for finding the flaws is +another way of saying the flaws should remain undetected. + +==> Under no circumstance should the Phrack newsletter or any of its editors be +held as criminals for printing material leaked to them. Every publication of +any value has had documents given to them that were not originally intended +for public consumption. That's how news stories are made. Shutting down Phrack +sends a very ominous message to publishers and editors across the nation. + +==> Finally, the privacy of computer users must be respected by the government. +It's ironic that hackers are portrayed as the ones who break into systems, +read private mail, and screw up innocent people. Yet it's the federal +authorities who seem to have carte blanche in that department. Just what did +the Secret Service do on these computer systems? What did they gain access to? +Whose mail did they read? And what allowed them to do this? + +Take Exception + +It's very easy to throw up your hands and say it's all too much. But the facts +indicate to us that we've come face to face with a very critical moment in +history. What comes out of this could be a trend-setting precedent, not only +for computer users, but for the free press and every citizen of the United +States. Complacency at this stage will be most detrimental. + +We also realize that one of the quickest ways of losing credibility is to be +shrill and conspiracy-minded. We hope we're not coming across in this way +because we truly believe there is a significant threat here. If Phrack is +successfully shut down and its editors sent to prison for writing an article, +2600 could easily be next. And so could scores of other publications whose +existence ruffles some feathers. We cannot allow this to happen. + +In the past, we've called for people to spread the word on various issues. More +times than not, the results have been felt. Never has it been more important +than now. To be silent at this stage is to accept a very grim and dark future. + + ************************************************* + ARTICLE TWO: A REVIEW OF THE E911 DOCUMENT ITSELF + ************************************************* + +Documentation on the E911 System +March 1988 +$79,449, 6 pages +Bell South Standard Practice +660-225-104SV +Review by Emmanuel Goldstein + +It otherwise would have been a quickly forgotten text published in a hacker +newsletter. But due to all of the commotion, the Bell South E911 document is +now very much in the public eye. Copies are extremely easy to come by, despite +Bell South's assertion that the whole thing is worth $79,449. + +While we can't publish the actual document, we can report on its contents since +it's become a news story in itself. But don't get excited. There really isn't +all that much here. + +Certain acronyms are introduced, among them Public Safety Answering Point +(PSAP), also known as Emergency Service Bureau (ESB). This is what you get (in +telco lingo) when you dial 911. The importance of close coordination between +these agencies is stressed. Selective routing allows the 911 call to be routed +to the proper PSAP. The 1A ESS is used as the tandem office for this routing. +Certain services made available with E911 include Forced Disconnect, +Alternative Routing, Selective Routing, Selective Transfer, Default Routing, +Night Service, Automatic Number Identification, and Automatic Location +Identification. + +We learn of the existence of the E911 Implementation Team, the brave men and +women from Network Marketing who help with configuration in the difficult +cutover period. This team is in charge of forming an ongoing maintenance +subcommittee. We wouldn't want that juicy tidbit to get out, now would we? + +We learn that the Switching Control Center (SCC) "is responsible for E911/1AESS +translations in tandem central offices". We're not exactly shocked by this +revelation. + +We also find out what is considered a "priority one" trouble report. Any link +down to the PSAP fits this definition. We also learn that when ANI fails, the +screens will display all zeroes. + +We could go on but we really don't want to bore you. None of this information +would allow a hacker to gain access to such a system. All it affords is a +chance to understand the administrative functions a little better. We'd like to +assume that any outside interference to a 911 system is impossible. Does Bell +South know otherwise? In light of their touchiness on the matter, we have to +wonder. + +We'd be most interested in hearing from people with more technical knowledge on +the subject. What does this whole escapade tell us? Please write or call so the +facts can be brought forward. + + ***************************************************************************** + 2600 MAGAZINE WANTS TO HEAR YOUR THOUGHTS AS WELL AS ANY ADDITIONAL FACTS YOU + MAY BE ABLE TO SHARE WITH US. POST PUBLIC COMMENTS HERE. YOU CAN SEND PRIVATE + MAIL TO 2600@well.sf.ca.us OR 2600 EDITORIAL DEPARTMENT, P.O. BOX 99, MIDDLE + ISLAND, NY 11953. IF YOU WANT TO CALL US, OUR PHONE NUMBERS ARE: + (516) 751-2600 (VOICE/MACHINE) OR (516) 751-2608 (FAX). + ***************************************************************************** + +------------------------------ + + ++-----------------------------------------------------------------------------+ +| Alphalpha Software, Inc. | Voice/Fax: 617/646-7703 | Home: 617/641-3805 | +| 148 Scituate St. | Smart fax, dial number. | | +| Arlington, MA 02174 | Dumb fax, dial number, | BBS: 617/641-3722 | +| nazgul@alphalpha.com | wait for ring, press 3. | 300/1200/2400 baud | ++-----------------------------------------------------------------------------+ + + + + + + + + + + + + + + + + + + + diff --git a/textfiles.com/bbs/sel-bbs b/textfiles.com/bbs/sel-bbs new file mode 100644 index 00000000..eaf114b3 --- /dev/null +++ b/textfiles.com/bbs/sel-bbs @@ -0,0 +1,199 @@ + 21 Considerations in Selecting BBSs to Use & Enjoy + + Ken Buchholz + The Washington Towne Crier BBS + 708-803-0428 + +BBSs are like mushrooms in spring - they seem to sprout up with every +rain, and suddenly, without warning, disappear into thin air. There +are thousands of BBSs to use, and since you can't spend every waking +hour BBSing, you need to be selective in the system you choose to use. +Here's some helpful hints to guide you in selecting the BBSs you +utilize: + +1. The SYSOP. You can tell a lot about the SYSOP without seeing the + system in action. As you log on, what is the flavour of the + SYSOP's comments and prompts for answers? If he/she nasty? Does + he/she give you the feeling that they believe they are God? Does + the SYSOP ask too personal questions, such as detailed information + on where you work or live, your income or your sexual preferences? + If so, don't bother completing the logon sequence - hang up and + take your business elsewhere. + +2. Does the system provide adequate telecommunications support, such + as a high enough baud rate? Systems which don't provide at least + 9600 baud today are probably going to be VERY slow in terms of + user activity, and slow systems are dead systems. Is the system + constantly busy? If a system is constantly busy, either the + system has too many users, the system doesn't restrict session + times, or the SYSOP is constantly taking his/her system down + to play games, do their homework, etc. Regardless of reason, + find another BBS to frequent. + +3. Does the SYSOP force you to suffer through endless screens of + totally useless information, such as last N number of callers, + lists of those who haven't uploaded enough (in the SYSOP's own + opinion), lists of useless trivia such as "On this date in + history..." and the like? Are you forced to suffer through + a seemingly endless list of "system messages" that date back + more than a week or two? Do it take more than 15-20 seconds to + log on? If the answer to any of these questions is "Yes", forget + this system and hang-up immediately. + +4. Do the logon screens/prompts change frequently? This can reek + havoc on your attempts to fully automate your logon sequence via + script files. And it illustrates just how much of a plaything + the SYSOP considers his/her system to be. Again, forget these + systems and go elsewhere. + +5. The name of the system: If the SYSOP picks some space-faced + name (Galacticom Gladiators or Space Base North, for example) + or overly-cutesy name (Gina's Boutique or Dick's Doghouse), + it will attract users of a similar mindset. If this matches + your mindset, continue to logon, otherwise hang up immediately. + +6. Does the BBS' name change with the weather? This is indicative + of a SYSOP who is about as stable as Jello. Get your desert + elsewhere... + +7. Does the system require users to maintain an upload/download + ratio? If so, move on - there are too many systems around + which don't have such restrictions to have to bother with those + which do. Again, move on... quickly... + +8. Does the SYSOP allow "war-boarding", profanity and other trash? + "War-boards" = "Kiddy-boards". If you're a kiddy, great news! + For the more mature user, dial another number and don't look + back... + +9. Is the system well-policed? For example, how old are the messages + in the public forums? If they are more than a month or two old, + you really must reconsider the wisdom of using the system. If + they date back 4-6 months or more, boggie on... to another system. + +10. Is the system well organized in a logical fashion? Are there + different topical SIGs/forums/message bases, or is everything + tossed into one big bucket? Same goes for the File Libraries - + are they organized into logical areas, or will you be spending + time weeding through files of no interest to you to find those + which are? Again, there is no need to have to suffer through + a mess when there are so many BBSs around which are well- + organized and well-policed. + + Conversely, does the system have a SIG/forum/message base for + absolutely everything under the sun? Are the SIGs/forums/ + message bases splintered too much? (Example: SIGs for DOS, Batch + Files, Disk Utilities, Keyboard Utilities, Memory Management + Utilities, etc., rather than a single DOS SIG/) + +11. Are the files online available for downloading packed with PKZIP, + ARC or some other packer, or are they available ONLY in an + uncompressed state? Time IS money and uncompressed files take + far longer to download. The only general exception to this rule + are GIF graphics. If you can't get your downloads in packed + format, look elsewhere. + +12. Privacy of YOUR information: Does the system allow users to gain + access to the personal and usually VERY private information about + its users, or is this restricted - available ONLY if the users + elect to make the information available? If you don't have + complete control over your own personal information, hang up + immediately. + +13. What is the "theme" or purpose of the BBS? If the purpose of the + system is "stamp collecting" and you have no interest in stamp + collecting, don't waste your time and that of others in trying + to change the theme of the system. Move on. In contrast, if you + ARE interested in stamp collecting, use the system to the max - + its definitely in YOUR interest to support the system. + +14. What is the user activity in the public forums/message bases? + If there is little activity and the BBS has been around for more + than 2-3 months (i.e., the system is NOT just starting up and + gaining recognition), move on. Again, a slow system is a dead + system. + +15. What is the age of the SYSOP? Many youngsters 9-15 go through + the stage where they absolutely MUST be the SYSOP of their own + system. Its genetic. A FEW of these systems are run by mature + young men/women, but most are just passing fancies and thus the + systems will be online for 3 months or less. Especially when + Mom and Dad decide to punish Junior for getting that D in Math. + If you use such systems, just don't be surprised one evening + when you call and the Ma Bell Electronic Lady tells you "The + number you have reached has been disconnected." + +16. Does the system provide the transfer protocol(s) of choice for + today? For example, currently ZMODEM is the protocol most + popular, and for good reason. Does the system offer ZMODEM? + +17. Network mail. So-called BBSs which offer network messages are + not BBSs in the original sense. Network BBSs tend to be "just + another node" and don't have the local intensity and don't + foster the spirit of comraderia that truly local BBSs do. This + is NOT to say that network systems are not worth using - quite + the contrary. If you need to get electronic mail to someone + in another state and are too cheap to subscribe to CIS, GEnie, + America Online, etc., and you don't mind exchanging electronic + mail at a snail's pace, they are just your cup of tea! But if + you desire the spirit of a local system, network nodes are not + going to satisfy you. Personally I prefer local BBSs and + Reach Out America - time is more valuable than money to me, + so I pay the few cents to get my mail to someone instantly + rather than wait a week to get the mail there and get the + reply back. Just personal preference... But, if the network + BBS is charging you for each message sent out on the network, + go elsewhere, period. + +18. The spirit of the users. What makes a BBS is the quality of its + users. If the users are mature, friendly, knowledgable and + outgoing, the system will be hopping and you'll get the most + from it. If, on the other hand, the system fosters users who + only want to logon and take downloads, forget forging any + friendships or getting much help, such as answers to your + questions. + +19. Hours of operation: Is the system available 24 hrs/day, 7 days/ + week? If not, forget it; the SYSOP isn't committed to running + a solid system if he/she doesn't spring for at least ONE + dedicated line, and why should you have to rearrange your life + around the system's availability? Such systems never last very + long. Mushrooms in spring... + +20. Is the system easy to use? In other words, are the commands + logical and make sense? Or are they Unix-like, cryptic and + Greek? If you need to download a manual to learn the system, + forget it - go read a nice novel and get some enjoyment in + life! If you are on the system for 3 min and still haven't + mastered the commands, Alt-H and dial another system. + +21. Is the system free? If not, be absolutely sure what you're going + to be getting for your money BEFORE you ship the cabbage. There + are thousands upon thousands of BBSs which are free, and if a BBS + is going to charge you for your use of the system, make darn sure + they are going to be providing you with something than you can't + get for free further down the road. Also know that many of the + BBSs which have attempted to go the subscription route have failed + miserably and either folded altogether or have reverted back to + being a free, public-access system. If the pay-for-use system + you are considering goes back to being a free system, will you + get your money back? If the system goes offline permanently, will + you get your cabbage refunded? Chances are the answers to both + questions are "No". + + Before you send in your money, the pay-for-use system should allow + you some "free" connect time to investigate the system and the + services it provides. Unless you get some free time to investigate + the entire system, move on. + +This is by far NOT a comprehensive list of considerations to make +in selecting which BBSs you utilize, but it should provide you with +some elementary considerations as a start. The key to maximizing +the benefits of using BBSs lies in being selective. BBSs should +be places to go for learning, for getting public domain and +shareware files, for exchanging thoughts, for getting news and for +making friends who share some common interests (such as computers). +But most of all, BBSs should be FUN. + + + diff --git a/textfiles.com/bbs/sfagenda.txt b/textfiles.com/bbs/sfagenda.txt new file mode 100644 index 00000000..85754621 --- /dev/null +++ b/textfiles.com/bbs/sfagenda.txt @@ -0,0 +1,145 @@ + Leeched from... +THE POLKA AE/cDc 806/794-4362 pwrd:KILL + + ______________________________________________________________________________ + + _________________ + |\ \ + \ \ * a \ + \ \ t - g \ _______________________ + \ \ h f e \ |\ ___________________ /| + \ \ e y n \ | | | | + _\ \ t d \_____| | Byte Bastards BBS | | + /| \ \ e a \ | | (201) 697-7001 | | + | | \ \ r \ | |___________________| | + | | \ \________________\ |/_____________________\| + | | \|________________| | + | | _ | + | | An Analysis by |he Ramsacker | + | | October 7, 1991 | + | |___________________________________| + |/____________________________________/ + + ______________________________________________________________________________ + + + Yes folks, you have just witnessed the cheeziest textfile intro design +ever conjured up in G-phile history. + + ______________________________________________________________________________ + + + A couple years ago in 1989 when life was simple and I was just a "c0dez +d00d", I chanced upon calling a BBS called Third Planet in 516, the official +Star League headquarters. It must have been around 2:00 AM my time (West +Coast) when I was logging in new and the sysop broke in to chat. Being a +typical c0dez d00d, I immediately dropped carrier...no actually I thought I'd +humor the sysop and see what the hell he was doing up at 5:00 AM his time. He +told me he had been working on the system and must have fell asleep in his +chair (comfortable chair). Curious about this entire Star League concept that +I had come into limited contact with from time to time and wanting to know +more, I began asking the sysop questions about it. He proceeded to tell me, as +best as my recollection allows, the following, (which is my summary of what I +remember him telling me): + + The Star League concept was born out of the frustration of + calling different BBS' across the country only to encounter endless + rag wars and egotistical competition amongst pirates. The pirate + world was supposed to be a united community, dedicated to getting + new wares out to everyone instead of embroiling the release of + them into a overly-competitive rat race where every group was trying + to undermine and out-do the other. The idea behind the League was + to promote cooperation between different pirates and groups and to + provide a haven for those people who were alienated by all the + hostility they encountered. Those pirates and groups allied under + the Star League banner would cooperate in cracking and distributing + wares rather than compete for all the glory. After all, the pirate + world was founded on the concept of hackers cooperating to achieve + a common goal, and it was supposed to be fun. + + The Star League member structure was based upon a hierarchy. + There were different levels and ranks assigned to persons based on + their accomplishments and contributions to the pirate community at + large. Methods of increasing your ranking within the hierarchy + included cracking wares, distributing wares, or being an outstanding + contributor to different Star League bases in the way of uploading + and posting messages. Those aligned with the Star League called + themselves "*-fyters" and usually accompanied their handles with + this label. + + + Rylos, the sysop of Third Planet and founder of the Star League, was a +school teacher (of what grade level, either he didn't tell me or I forgot). +Keeping this in mind, when one ponders it, everything about the Star League was +like being in grade school; you were always taught to be kind and sharing to +your fellow students...the same principals that Rylos adopted and applied to +the Apple pirate world as the basis for the Star League. He wanted to promote +sharing and kindness amongst pirates to try and bring order to the chaos of the +Apple pirate world, but he didn't totally succeed. + + There are several reasons why the Star League concept never became as +widespread and successful as Rylos would have desired. First of all, it was a +utopian idea, and utopias don't always work the way you expect them to. +Secondly, a lot of the members of the Star League were, plain and simple, +geeks. They were mostly those dreadful Christmas modemers. You know, those 14 +year olds that get a Volksmodem from Mom and Pop on the 25th of December (or +The Chanukah Modemers for the Jewish amongst you). Lastly, and most important +of all, the Apple pirate community was an anarchy, and it was therefore a +paradox and an impossibility to try and govern it. Most everyone involved was +in it for THEIR own reasons, whether to get wares, to show off ones talent in +cracking wares, to simply rag on others because of inferiority complexes in +real life, or whatever. To survive you had to be able to hold your own. Those +who couldn't joined the Star League. In all fairness, the Star League +federation never had the talent it needed to advance its ideals. Who would +want to be governed by an organization that encouraged "niceness" when you +could start your own group and dominate the Apple ][ pirate world with a +cracking empire? Simply the fact that it is a given that most people who +became heavily involved in the pirate community had large egos, its not very +likely that any one person would be able to get everyone to submit to one +solitary confederacy. + + Although I never read the book, I do know enough about the story to say +that Rylos had a "Catch 22" idea in mind. He wanted to see if he could +successfully create a federation of persons dedicated to the ideals that he +laid out for them, that of cooperating to achieve a common goal, the common +goal being the cracking and distribution of wares. Based upon the fact that +the only contribution from the Star League that I am aware of is an Edu-ware +called Planetary Construction Set, I wouldn't call Rylos' experiment a very +successful one, although I can see how an older person, especially a school +teacher, would be fascinated with the experience. But because of the reasons I +have pointed out above, the idea was doomed from the start. I personally don't +believe the idea could have ever worked. + + I don't know if the Star League still exists. The Byte Bastards used +to be aligned with them, but quit soon after I joined the group, and that's the +last major contact I came into with the Star League. If you think you'd still +like to try calling a Star League BBS, here's the number for Third Planet: +(516) 361-6744. I don't know if it is up any longer so call at your own +discretion. + + ______________________________________________________________________________ + + + Thanks to Guns-N-Roses and The Moody Blues for kindly playing on my +dilapidated Sears stereo while I typed this file (even though I wasn't a fan, I +bought Use Your Illusion I & II anyway and found them to be pretty good +listening). Thanks also go out to my Penis for being there when I needed it. +Ok, on to... + + THE END + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + You'd think the American Government would get a clue from the events +going on in Eastern Europe and the Soviet Union and leave our rights alone. +But they're fucked in the head and think they have the right to control us. +Well, they'll soon discover that they can't take away rights they never owned +in the first place. + + The Ramsacker + October 7, 1991 + 2:51 PM + + ______________________________________________________________________________ + + diff --git a/textfiles.com/bbs/sha2 b/textfiles.com/bbs/sha2 new file mode 100644 index 00000000..05b1d5aa --- /dev/null +++ b/textfiles.com/bbs/sha2 @@ -0,0 +1,69 @@ +The Best on the Boards +Copyright (c) 1993, Russell Mirabelli +All rights reserved + + +Many bulletin boards across the nation have a huge amount of +software to choose from for download. Most have so many titles +that determining which ones might be worth the download time is +difficult. In this column, I will attempt to help you sort through +the huge morass of shareware available and let you know which +titles I feel are worth your evaluation. All the software reviewed +in this column is available on many bulletin boards throughout the +country. If you have difficulty locating a particular title, I +recommend that you contact its author at the address listed. + +DRAG AND ZIP is a Windows shell for PKZIP and PKUNZIP. In that +brief description, it may not sound like much, but it is so very +easy to use that it falls into the category of "can't live +without" software. + +Most of my days are spent entirely within Windows, and I often +am bringing compressed files form one computer to another. Until +I met DNZ, I had to exit Windows, change directories, run PKZIP +from the command line, and then bring Windows back up. NO MORE! +now, I simply double-click on a .ZIP file in the file viewer, +and DNZ will take care of making sure that the files all reach +the directories I want. + +Zipping files up is equally easy. DNZ's zipping program sits, +minimized as an icon, and all that the user needs to do is drag +the files from the file manager and drop them on top of the DNZ +icon. A dialog box will ask for a file name and options, and +then it's taken care of. + +Another nice feature of DNZ is that it allows the user to get +use of all the obscure command-line parameters that PKZIP +offers. Without DNZ, I would never use fast memcopy, EMS, 386 +protection, or any of the other two dozen options I now use +regularly. + +DNZ does require that you already have a copy of PKZIP, and it +will support the latest version (as of this writing:2.1g). + +This may sound like a rave, and it is. I simply could not get +much of my work done as quickly as I do if it were not for Drag +and Zip. Its $25 registration fee is a pittance for the +heavy-duty functionality that it provides. If you haven't +downloaded this one yet, DO IT NOW!!! + +Value 10 +Usability 9 +Performance 7 +-------------- +Overall 9 + +Dan Baumbach +Canyon Software +1527 Fourth St. Ste 131 +San Rafael, CA 94901 + +If you are a shareware author and would like to see your product +reviewed in this column, please contact me either via e-mail at the STTS +bulletin board, through RIME, WME, or P&BNET, or via conventional mail. +My conventional mail address is: + + Russell Mirabelli + 1216 Lamar Blvd E #508 + Arlington, TX 76011 + diff --git a/textfiles.com/bbs/sjgames1.txt b/textfiles.com/bbs/sjgames1.txt new file mode 100644 index 00000000..5cd71150 --- /dev/null +++ b/textfiles.com/bbs/sjgames1.txt @@ -0,0 +1,53 @@ +3/16/93 Secret Service Held Guilty Of Violating Computer Privacy + + By Bob Ortega + + A federal court in Austin, Texas, ruled that the U.S. Secret Service +violated privacy laws in seizing an electronic bulletin board, electronic +mail and computer records from a computer games maker three years ago, The +Wall Street Journal reported. + + Federal Judge Sam Sparks also ruled that the Secret Service, contrary to +government denials, had read, disclosed and erased messages on the bulletin +board it seized, in violation of the Electronic Communications Privacy Act. + + "Though the ruling is not as clear as we'd have liked, it's the first +opinion I know of that holds that electronic communications on a bulletin +board are protected" by the federal Privacy Protection Act, said Peter +Kennedy, attorney for Steve Jackson Games of Austin, the plaintiff in the +case. Justice Department attorneys couldn't immediately be reached for +comment. + + The case, which provoked fierce debate over how widely the government can +cast its net in combating computer crime, led to the founding of a +computer-user's rights group, the Electronic Frontier Foundation, which +sponsored the suit against the government. Yesterday, the foundation hailed +the verdict. "This case should send a message to law-enforcement groups +everywhere that they can't ignore the rights of those who communicate by +computer," said Mike Godwin, the foundation's counsel. + + In March 1990, the Secret Service was tracking a "911 program" that agents +believed computer hackers had stolen from BellSouth. Agents, saying they +suspected that an employee of Steve Jackson's was involved, raided the +company under a warrant issued by the local U.S. Magistrate. They seized +computer equipment, an electronic bulletin board, and files that contained a +computer game the company had been about to publish. + + The Service held onto the property for months, and destroyed some of the +files and electronic messages. + + In his opinion, Judge Sparks said there was never any basis for suspicion +that the company or its owner, Steve Jackson, had broken any laws; and that +if agents hadn't been so "sloppy" in their investigation, they would have +realized that the company was a legitimate publisher, entitled to the +protection of the Privacy Protection Act. That act shields files and work +records of newspapers, broadcasters and publishers from government search or +seizure. + + Judge Sparks did support the Secret Service's contention, on a separate +count, that despite seizing and reading electronic messages on the bulletin +board, it hadn't "intercepted" them under the meaning of the Electronic +Communications Privacy Act. + + He awarded Jackson, his company, and three bulletin board users a total of +about $55,000, plus attorney's fees. diff --git a/textfiles.com/bbs/sjgames2.txt b/textfiles.com/bbs/sjgames2.txt new file mode 100644 index 00000000..0212173d --- /dev/null +++ b/textfiles.com/bbs/sjgames2.txt @@ -0,0 +1,120 @@ +3/18/93 Court Ruling Gives Laws On Privacy A Hi-Tech Edge + + By Bob Ortega + + A recent ruling by a federal judge in Austin, Texas, pushed privacy laws a +bit further into the technology age, The Wall Street Journal reported. + + For the first time, say attorneys, a federal court has explicitly ruled +that the Privacy Protection Act, which mandates subpoenas in many cases, +applies to electronically stored information, and that computer bulletin +boards and electronic mail are safeguarded by federal wiretap laws against +government eavesdropping. + + The case stemmed from a U.S. Secret Service raid three years ago on Steve +Jackson Games, an Austin-based publisher of role-playing games and books. The +raid, one of many the service conducted in search of electronic documents +believed stolen from BellSouth, resulted in the seizure of some of the +company's computers and masses of electronically stored information. + + Though the ruling isn't binding on other federal courts, and still faces a +possible appeal, attorneys say Judge Sam Sparks's opinion has broad +implications for privacy law and its restraints on law-enforcement +investigations. Last week's decision, they noted, could strengthen the legal +protections available both to traditional news-gathering concerns and +publishers and to the users of fast-growing computer services such as +electronic mail and computer bulletin boards. + + "It's a highly visible case in the computer world," said Marc Rotenberg, an +attorney for Computer Professionals for Social Responsibility. "The judge has +recognized and uplifted values that are taken for granted in the +nonelectronic world." + + At the same time, some law-enforcement officials see the decision as a +threat to their ability to investigate hackers and computer crime. And +Dorothy Denning, computer science chairwoman at Georgetown University, says +past cases have shown hackers can do great damage. "I don't think the +government's fear was misplaced," she said. + + In recent decades, federal law and court rulings haven't kept pace with the +rapid changes in technology, say attorneys schooled in First Amendment and +privacy cases. The Privacy Protection Act of 1980, for example, generally +safeguards newspapers, broadcasters and publishers from unreasonable +government search or seizure, by forcing law-enforcement officials to get a +subpoena before they can demand "work product," such as a reporter's notes. +That process gives the target of the subpoena a chance to contest the +government's demands. + + But "these days, even traditional publishers do all their work on +computers," says Mike Godwin, counsel for the Electronic Frontier Foundation, +a computer-user civil rights group; and until now, no federal court has said +that electronically stored files and information in computers are +specifically protected under the act. + + Also significant is Judge Sparks's rejection of the Justice Department's +claim that the Privacy Protection Act didn't apply to records it seized +"inadvertently," while carting off more than 300 floppy disks, two computers +and the computer on which a bulletin board was run. "If they could seize all +that from these guys legally, why not seize records at the New York Times?" +says Jane Kirtley, executive director of the Reporters Committee for Freedom +of the Press. + + Godwin says the ruling also extends protections enjoyed by traditional +publishers and news organizations to the growing number of nontraditional +publishers such as Steve Jackson Games. Further, the ruling makes clear that, +just as the government can't wiretap or rummage through the post office for +an individual's mail without court permission, it can't monitor electronic +mail, says Jim George, an Austin attorney who represented the publishing +company. + + He says he believes this ruling is the first step toward treating +electronic mail and bulletin boards like more traditional means of +communication. "The concept of privacy in communications shouldn't depend on +the medium of delivery," he says. + + The Secret Service and the Justice Department declined comment on the +ruling. In court, however, a federal attorney argued strenuously against +applying the privacy and wiretap laws in this case, saying that so doing +would make it very hard for the government to get information or computer +documents representing criminal activity. + + In his opinion, Judge Sparks noted that the Secret Service had legitimate +concerns about intrusions into computer systems, including those of telephone +systems and the Defense Department. But in its rush to raid, the Secret +Service didn't care what other information it seized "incidentally," or what +impact its actions had on the company, he said. + + Don Delaney, a senior investigator for computer crime and +telecommunications fraud with the New York State Police, says Judge Sparks's +opinion is sure to be closely studied by law-enforcement agencies around the +country. "Whether it's binding here or not, any decision that's logical, and +complies with what the law says, will be looked at for guidance," he says. + + The search and seizure at Steve Jackson Games in March 1990 was part of a +wider crackdown on computer hacking provoked by widely reported computer +viruses. Agents, saying they believed Loyd Blankenship, an employee of Steve +Jackson Games, might have stored a copy of telephone documents on a +company-run bulletin board, used a search warrant to seize several computers +and large amounts of electronically stored data, including more than 160 +electronic messages, and an electronically stored book and game the company +was about to publish. + + As it turned out, the allegedly sensitive data in the telephone document +was publicly available for about $13 from another Bell company. No charges of +any kind have ever been filed against Blankenship, Jackson or his company. + + Further, there was "no valid reason" not to copy and return all the seized +material within hours or days, Judge Sparks said. Jackson said the four +months' delay forced him to lay off eight employees. + + By keeping its search warrant and seizure order secret, the Secret Service +disregarded the safeguards in federal laws that should have given Steve +Jackson Games a chance to contest or modify the seizure order, the judge +said. And, despite government denials, Judge Sparks said evidence showed the +agency read and destroyed messages in violation of federal wiretap laws. + + Jackson was overjoyed with the ruling. But he had already taken a small +measure of revenge: He wrote and sold nearly 6,000 copies of a new game, +Hacker, that satirized bumbling Secret Service agents and, he says, the kind +of evil, rogue hackers "that exist mostly in the imagination of the Secret +Service." diff --git a/textfiles.com/bbs/so.wannabe.syso b/textfiles.com/bbs/so.wannabe.syso new file mode 100644 index 00000000..65121367 Binary files /dev/null and b/textfiles.com/bbs/so.wannabe.syso differ diff --git a/textfiles.com/bbs/sol_text.lst b/textfiles.com/bbs/sol_text.lst new file mode 100644 index 00000000..aebbff56 --- /dev/null +++ b/textfiles.com/bbs/sol_text.lst @@ -0,0 +1,1944 @@ + + Text Files listing for Socialism OnLine! + + Ûßß Ü Ü Ü ßßÛ Üßßßß ÜßßßÜ Û Ûßß Ü Ü Ü ßßÛ + Û ÜÛßÛÜ Û ßßßÜ Û Û Û Û ÜÛßÛÜ Û + ÛÜÜ ÜßÛßÜ ÜÜÛ ÜÜÜÜß ßÜÜÜß ÛÜÜÜÜ ÛÜÜ ÜßÛßÜ ÜÜÛ + + +FidoNet 1:128/105.0 ++1(719) 392-7781 +300-14400 bps HST/MNP/V42bis, 24 hrs. + + + [*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*] + [*] [*] + [*] Files listing for Socialism OnLine! [*] + [*] [*] + [*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*] + + +This is a listing of available files found on Socialism OnLine!, node number +1:128/105 in the FidoNet Matrix. All files listed may be downloaded by first- +time callers or they may be file-requested during any time except ZMH. + +This files listing reflects the interests of SOL's Sysop and users. We try to +specialize in various text files, including many on left politics, socialism +and communism, and a few various other files. We do not pretend -- or even +try -- to carry every file in existence. + +The following 'magic' filenames are supported on Socialism OnLine! + +Magic Name - What you'll get +------------------------------------------------------------------------------ +FILES - List of all available file-requestable files from this system. +OS2FILES - A listing of all available OS/2-related files from this system. +TEXTFILES - A listing all available text file areas from this system. +DOSFILES - A listing of all available MS-DOS-related file areas. +ABOUT - Short text file about this system. +NODELIST - The current FidoNet nodelist in .ZIP archive format. +PROGLIST - The latest 'Progressive BBS Listing' in .ZIP archive format. + + + +(Wed Nov 25 18:52) Available: 762 files in 24 areas (19 MB) + Maximum privilege shown: Privil + Date flag: new on this system since: * = 1 week, + = 1 month + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û º Text: Marxist Text Files + ÜÛ º Available: 26 files (0.4 MB) + ÛÛ º Privilege: Disgrace + ÛÛ º Newest: WHY_SOC.TXT 11-08-92 (avail: 11-08-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +90S.TXT 8K 12-05-89 Article: Why the '90s will belong to socialism. +COC_DOC.ARJ 18K 10-12-92 Documents from the Marxist 'Committees of + Correspondence.' Press releases, statement of + purpose, etc. +COC_STND.ARJ 6K 10-12-92 Statement of Principles from the Marxist group + 'Committees of Correspondence.' +COMMUNST.TXT 5K 4-01-90 A letter from a person joining the Communist + Party, USA. Interesting. +DEMO_SOC.ARJ 24K 10-12-92 Text of speeches from an evening of international + Marxist speakers. +DI_INIT1.ARJ 50K 10-22-92 CofC newsletter, Dialogues and Initiative, #1. +DI_INIT2.ARJ 71K 10-22-92 CofC newsletter, Dialogues and Initiative, #2. +DI_INIT3.ARJ 47K 10-22-92 CofC newsletter, Dialogues and Initiative, #3. +INTRNATL.TXT 2K 12-25-91 The lyrics to the song "The Internationale" - the + classic anthem of socialist and communist + movements! +KNOWMARX.TXT 2K 12-03-90 Little known trivia facts about Marx. +LENIN_US.TXT 8K 7-03-90 Lenin's 'Letter to American Workers.' +LIFE2ME.ARJ 10K 7-18-90 'What Life Means to Me' by Jack London. +MANFESTO.ARJ 19K 12-09-89 The text of the Communist Manifest, by Karl Marx + and Frederick Engels. A timeless classic, get + this! +MARX.TXT 10K 3-10-91 A short biography of Karl Marx. Written by an + anti-Marxist author containing some mistakes and + omissions, still somewhat valuable anyway. +MARXNTS1.ARJ 16K 3-12-90 'Why I became a Marxist,' part 1 of 3. +MARXNTS2.ARJ 13K 3-12-90 'Why I became a Marxist,' part 2 of 3. +MARXNTS3.ARJ 10K 3-12-90 'Why I became a Marxist,' part 3 of 3. +REV_PROC.TXT 6K 10-11-92 An article by the head of the Communist Party, + USA, Gus Hall, entitled, The Revolutionary Process + and the New World Balance of Forces. +SOCPLAT1.TXT 45K 5-17-92 1991-1992 Platform of Socialist Party USA. Read + this for an idea of what a socialist government in + the USA would mean for you. +SOC_BETR.TXT 4K 2-18-92 Article: Socialism Betrayed, Not Failed. +SOC_FUTR.TXT 20K 10-12-92 Article - Socialism and the Future. +SOC_INTL.ARJ 8K 10-07-89 A 1951 declaration by the Socialist International. +STRATEGY.ARJ 7K 7-30-90 A report of strategy and tactics to the Communist + Party USA. Interesting reading! +THEORY.ARJ 47K 10-27-88 Several files on Marxist theory. Interesting. +THESESON.ARJ 4K 7-30-90 Marx's work: Theses on Feuerbach. +WHY_SOC.TXT 17K 11-08-92+ An article by a famous socialist, Albert Einstein, + entitled, "Why Socialism?" + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ º Text: Economics Files + Û º Available: 38 files (0.5 MB) + ÛÛßßßßß º Privilege: Disgrace + ÛÛÜÜÜÜÛ º Newest: YPOV_FAM.ARJ 4-17-92 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1PERCENT.TXT 4K 9-24-92 How much do the richest 1% of Americans make? Who + are they? How do they make their money? Read this! +2ND_BILL.ARJ 3K 1-17-92 Excerpts from FDR's State of the Union speech + "Economic Bill of Rights." Why don't we have + these rights today?! Read this one. +AMER_BUS.TXT 5K 9-26-92 An article written by the Sysop, entitled: Why + Can't American Business Compete? Informative + reading. +BOTTLINE.ARJ 4K 11-16-89 Satire: The bottom line. +BUDGET.ARJ 3K 12-25-91 Some details about the U.S. budget and how YOUR + money is spent, very interesting. +C-WORTH.ARJ 4K 11-11-89 A case is made for comparative worth. +CAPGAINS.ARJ 3K 11-24-89 Article about the capital gains tax cut for the + rich. +CT_ECON.ARJ 4K 12-02-90 A proposed CT Economic Bill of Rights! Very + interesting proposal for solving many of that + state's economic problems. +ECON_90S.TXT 8K 10-11-92 Article - Economic Slump in the Nineties. Written + by a well-known Canadian Marxist economist. +ENERGY.ARJ 3K 12-25-91 Quick reference to the Bush Administration's BS + energy policy. +EXP_MYTH.ARJ 8K 5-11-92+ Witness for Peace, 1492-1992 Expose the Myths: + Calling for a Just World Order Myth of the + Month--Debt Crisis and Structural Adjustment +FUTR_JOB.ARJ 16K 1-07-92 A passage from the book _Robots_ on what the + future job market will be like if left only to + "free market" forces. Scary reading! +F_TRADE.ARJ 25K 4-24-91 An analysis of the U.S.-Mexico "free" trade + agreement, a very important issue! +GLOOM.TXT 6K 7-07-91 Jim Cairns on Economists and Economics! +GOVTSALE.TXT 4K 5-04-92 Article: Government for Sale, New Privatization + Drive Against Labor. Read what King George has + planned for "your" gov't. +HOMEPOWR.ARJ 266K 2-08-92 The best of Homepower mag. +INJUST.ARJ 4K 11-30-90 Read about the NEW Reagan/Bush-era tax policies + and how they are soaking the poor and middle + classes. Lots of data with sources! +JAPSTOCK.TXT 5K 4-19-92 Article: Why the Drop in the Nikkei (Japanese + Stock) Exchange Alarms U.S. Capitalists. + Fascinating look at U.S. dependence on Japan. +LBO_23.ARJ 21K 11-16-88+ A sample issue of the Left Business Observer. +LBO_45.ARJ 19K 1-18-92+ A sample issue of the Left Business Observer + (LBO). An easy to read and superb newsletter on + economic issues. +LBO_48.ARJ 20K 3-28-92+ A sample issue of the Left Business Observer. A + *superb* newsletter of economics and business + issues, easy to read and informative! +LBO_49.ARJ 21K 3-28-92+ A sample issue of the Left Business Observer. A + *superb* newsletter of economics and business + issues, easy to read and informative! +LETS9202.ARJ 24K 2-03-92 Cairns LETSystem LETS TALK & Trading Post Vol.1 + No.8 Feb 1992. +LIESLIES.TXT 6K 5-28-92 Article: Lies, Damn Lies. A journalist takes a + look at Bush's economic 'recovery' compared to + state gov't statistics. +MEXLABOR.TXT 4K 6-10-92 Article: North Carolina Worker Visits Mexico to + Urge Unionization of Her Runaway Shop. +MEXTRADE.ARJ 6K 2-27-91 A background article on the U.S.-Mexico 'free' + trade agreement. What will this mean to U.S. and + Mexican workers and labor unions? +RUS_DEPR.TXT 6K 7-24-92 Article - The Great Russian Depression of 1991. + Thoughtful insight into Russian economic history + and its current problems. +SHADOW.ARJ 4K 1-15-92 Article: Shadow Government -- a plea for human + decency in the workplace and a Second Bill of + Rights for American Workers. +SHORTHRS.ARJ 4K 11-11-89 A strong case is made here for the 35-hour + workweek and no forced overtime for workers. Very + good info. +TAXESCUT.TXT 10K 2-07-92 Article arguing that a Tax Cut won't help US + working people. Contains a pretty good intro to + some Marxist economic theories. +UNION.YES 2K 7-22-90 Compare unionized workers' wages with non-union + ones. Do you dare? The U.S. gov't does and this + tells of the results! +US_PERIS.ARJ 4K 11-07-89 Article: Perestroika U.S. style. +WAGES.TXT 2K 7-14-89 Read about how the minimum wage has gone down + DRAMATICALLY over the years to the detriment of + ALL workers. +WHOFED.ARJ 7K 4-08-92 Graphic Charts On WHO Owns The FED. +WORLDBNK.ARJ 3K 11-10-90 Information On The World Bank. +WRLDBANK.ARJ 13K 6-30-92+ Article - The World Bank's New Indigenous Policy: + A Change in International Economic Development + Strategies. +YOURTAX.ARJ 3K 3-14-91 How much of your Income Tax $$$ goes to support + the military? Find out! +YPOV_FAM.ARJ 7K 4-17-92+ Article: America's Young Families with Children + Devastated by Two Decades of Shrinking Incomes, + Soaring Poverty. A sad report w/stats. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßÛ º Text: Environmental Files + ÜÜÜÜÛÜ º Available: 16 files (0.1 MB) + ÛÛ º Privilege: Disgrace + ÛÜÜÜÜÛÛ º Newest: LAND_OWN.ARJ 1-04-92 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +BIODECAY.ARJ 3K 2-20-92 Is the Earth's biosphere system decaying? + Provocative reading! +BRC.ARJ 4K 5-17-91 The gov't wants to deposit toxic nuclear wastes in + ANY dump or landfill in YOUR town! Read about how + to stop this lunacy! +BULL38.ARJ 18K 3-20-91 Feb. 91 list of "environmental" BBS's. +ECOBBS2.ARJ 24K 2-10-91 Nov. 90 Earth Science BBS list. +ECOBBSFB.ARJ 18K 2-23-92 Environmental BBS listing. +ECOHEMP.ARJ 5K 12-24-90 Hemp and the environment. +ECOLABOR.ARJ 3K 11-17-89 Environmentalists and labor unions fight to save + the forests & to prevent huge amounts taxpayer + money from being given to timber corps. +ENRGYFRM.ARJ 9K 12-24-90 Energy farming in America. How 6% of US land + planted with hemp could greatly lessen our + dependence on oil and provide a cleaner fuel. +ENV_REPT.TXT 4K 5-11-92 Article: Caution, Environmental Reporting Can Be + Hazardous To Your Career. +EW0990TX.ARJ 26K 8-29-90 EarthWatch 90 magazine. +LAND_OWN.ARJ 3K 1-04-92 Article: Who Really Owns the Land? Thought + provoking. +NONTOX_H.TXT 10K 10-04-92 A guide/tutorial on how to make and clean your + house with non-toxic household cleaners. +NUKE_RES.TXT 6K 4-16-92 Nuclear Information and Resource Service list of + publications and services. +POLLUTE.ARJ 3K 11-01-89 Satirical article about the Bush proposal to sell + 'pollution rights' between corporations. +SAVE_FOR.ARJ 8K 2-22-92 Article: Saving the Forests, Forging a Global + Compact. +SPOT_OWL.ARJ 10K 8-29-92 Recent (see file date) news about the controversy + over the Spotted Owl in the Pacific Northwest. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û Û º Text: Human Rights Files + Û Û º Available: 11 files (0.1 MB) + ÛÜÜÜÜÛÜ º Privilege: Disgrace + ÛÛ º Newest: UN_HUM_R.ARJ 9-11-92 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +ARABHATE.ARJ 19K 3-02-91 An ADC report on anti-Arab hate crimes. +COF88.ARJ 36K 9-04-90 Report: The Cost of Freedom. A report on the + Israeli occupation of the West Bank and Gaza + Strip. +COL_HIST.ARJ 7K 10-07-92+ Excerpt from the book, _A People's History of the + United States_, from a chapter entitled, + "Columbus, the Indians, and Human Progress." +CUBA_HUM.TXT 5K 2-28-92 Article: Cuba Says 'Human Rights Violations' Are + Made in U.S.A. Interesting! +DEATH_P.TXT 3K 8-29-92 Article - It's Easy to Believe in the Death + Penalty: If You Ignore the Facts. Little known + facts about the death penalty. +KUW_RIGH.ARJ 5K 12-25-91 An article about the human rights conditions in + post-war Kuwait. +POL_PRIS.ARJ 8K 11-30-89 Complaint against the U.S. gov't to release its + political prisoners. What - political prisoners in + the U.S.? Yup! Read about them. +SMITHACT.ARJ 12K 2-22-91 A fascinating article of the repression of + Americans by the Cold War-era Smith Act. A + disturbing and little-known era of US history. +SWP_SPY.ARJ 5K 7-08-90 An fascinating example of how the gov't spies on + and illegally 'disrupts' any political parties the + gov't disagrees with. Free speech? +UN_HUM_R.ARJ 6K 9-11-92+ The text of the U.N. Universal Declaration of + Human Rights. Why does the U.S. gov't refuse to + sign this document?! +USDEATH.ARJ 9K 11-30-90 Article: Salvadoran Death Squads: A Pattern of + U.S. Complicity. Sad but true story of + U.S.-supported murder and tyranny. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Ûßßßßßß º Text: Anti-Militarism Files + ÛÜÜÜÜÜÜ º Available: 40 files (0.6 MB) + ÛÛ º Privilege: Disgrace + ÛÜÜÜÜÛÛ º Newest: BLOODOIL.ARJ 2-21-91 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +12DRAFT.ARJ 7K 12-25-91 12 foolproof ways to stay out of the draft +BIO_CHEM.ARJ 4K 2-27-91 A history of biological and chemical wars. +BLOODOIL.ARJ 2K 2-21-91 A poem titled: No Blood for Oil. +BUSHGULF.ARJ 4K 12-25-91 An article from The Nation. +CHEM_WAR.ARJ 8K 12-25-91 Chemical & biological warfare: a pattern repeated. + Very informative article. +CHOICWAR.ARJ 5K 12-25-91 Article: Making a Choice - Conscientious Objection + or Refusing to Register. +CO_APP.ARJ 4K 12-25-91 Article: War is the Death of Conscience. +CO_LTR.ARJ 4K 12-25-91 An Open Letter to Military Servicemembers. +DISCHARG.ARJ 19K 12-03-90 How to get out of the military. +DRAFT_ME.ARJ 5K 12-25-91 Article: Draft registration is no joke! +FONDA.ARJ 4K 4-07-88 Text of Jane Fonda's North Vietnam speeches. +FUTURVET.ARJ 8K 2-04-91 What Future Vets Should Know. A series of + articles from the Nam Vets newsletter. Must + reading for all military people and families. +GEORGE_L.ARJ 18K 9-05-92 Article - George Bush's Linguistic Structuring of + the Persian Gulf Conflict: Making Sanctions + Impossible and Warfare Inevitable. +GI.ARJ 3K 12-01-90 Advice to military reservists! Text of a pamphlet + discussing military reservists or Nat'l Guard + persons and their options in CO. +GIRESIST.ARJ 52K 11-28-90 GIs resist the military buildup to protect the oil + companies profits, families torn apart protest, + articles, press releases and more! +GPPUNDIT.ARJ 58K 3-15-91 Greenpeace's "Pundit Watch" newsletters. A superb + (and funny) chronicle of the oil war. +GULFWAR.ARJ 19K 2-08-91 An article by a professor of linguistics on + metaphors used to justify George's Gulf war. Very + good article, definitely worth reading! +GULFWAR1.ARJ 115K 3-21-91 Part 1 of 3 of SOL's Gulf/Oil war article + collection. A wealth of information! +GULFWAR2.ARJ 124K 3-21-91 Part 2 of 3 of Gulf/Oil war articles. +GULFWAR3.ARJ 84K 3-21-91 Part 3 of 3 of Gulf/Oil war articles. +INDUSTRY.ARJ 10K 2-19-91 Article: Peace Dividend Down; War Dividends Up. A + report of war profiteering. +INVASION.ARJ 6K 4-06-91 One hundred years of U.S. invasions. A concise + listing of U.S. invasions in the 1900s. +I_SAID.ARJ 7K 1-21-92 Article: What I Would Have Said to Judge Freedman. + A war tax resister, denied the right to speak in + court, speaks now. +MLK.ARJ 9K 12-25-91 Martin Luther King's essay Loving Your Enemies. +NOPARADE.ARJ 6K 5-25-91 Article: Not Everyone Loves A Parade. An article + concerning the militaristic parades happening in + California (and other places). +OPPOSE.ARJ 5K 1-27-91 Oppose the media bias of the Gulf war. How to help + counter the media bias against the peace movement + in the corporate media. +PEACEPAK.ARJ 3K 12-25-91 Mennonite Peace Pack. A resource of info on + Conscientious Objection, military and tax + resistance, and more. +PHONEWAR.ARJ 3K 12-25-91 How you can "Hang Up on War." War-tax resisters + urge you not pay your phone-bill taxes. Phone + service CANNOT be interrupted if you refuse. +TOYS.ARJ 3K 5-11-91 Good article on how this society pushes violence + and war on our children. +US_COLL.ARJ 6K 3-02-91 Is your college doing DOD research? +US_DRAFT.ARJ 7K 2-27-91 Article: The Gulf War and the Draft. +US_HABIT.ARJ 8K 8-28-90 A filthy American habit - the Pentagon. +US_KUWA.ARJ 5K 3-02-91 Pentagon outlines key US role in Kuwaiti recovery. +WAR@HOME.ARJ 4K 12-25-91 Excerpts from the book 'War at Home.' +WARMETA.ARJ 17K 4-13-92 War As Metaphore, an excellent analysis of + language used during gulf action. +WARPRAYR.ARJ 5K 5-19-90 Mark Twain's War Prayer. +WARTAX92.ARJ 3K 12-25-91 What part of your income tax goes to war? +WAR_COMM.ARJ 4K 5-25-91 Article: All's Fair in War and Commerce. An + article about selling war to children and adults + and militarism in the U.S. +WAR_TAX.ARJ 6K 12-25-91 The story of one person's war tax refusal. +WRL.ARJ 10K 3-24-91 2 Good articles from the Nonviolent Activist (mag. + of the War Resisters League). + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ º Text: CIA/FBI Files + ÛÜÜÜÜÜÜ º Available: 22 files (0.4 MB) + Û ÛÛ º Privilege: Disgrace + ÛÜÜÜÜÛÛ º Newest: COMPANY.ARJ 12-25-91 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +AIDS_CIA.ARJ 8K 6-23-90 AIDS: PsyWar or BioWar? Theories. +BUSHPLOT.ARJ 42K 12-09-88 George Bush, arms, drugs and the CIA. Read about + this conspiracy. +CIABOOKS.ARJ 14K 1-27-91 A reading list on intelligence agencies and + political repression. Excellent list of books + about the CIA & its heinous activities. +CIABWASH.ARJ 18K 9-25-87 CIA brainwashing techniques - your gov't at work! + Learn about immoral CIA activities. +CIANEWS.ARJ 16K 4-08-92 Rockefeller's CIA Mis-Adventures. +CIA_BOXR.ARJ 11K 12-25-91 Superb text of many illegal CIA human rights + abuses and covert operations from a Congressional + debate. +CIA_COKE.ARJ 9K 3-17-90 More info on CIA drug smuggling into the U.S. +CIA_GULF.ARJ 35K 3-04-91 The CIA in the Persian Gulf. An article +CIA_RAP.ARJ 9K 12-25-91 The lyrics to a new rap song -- get it! +COMPANY.ARJ 5K 12-25-91 Interesting text on the theory that modern + governments originated from Britain's East India + Company. Provocative! +COSIGA.ARJ 18K 10-12-90 Italy's President Links CIA, Palme Murder, + Contra/Drugs & More. Read about how the U.S. + funded terrorists in Italy and rigged elections. +COVERT_B.ARJ 8K 3-17-90 Biblography of U.S. covert operations, lists many + good books! +COVRTWAR.ARJ 7K 11-29-90 Article: The Legacy of a Covert War - The Boys We + Left Behind. Provocative reading about our actions + in SouthEast Asia. +DRUGRUNR.ARJ 6K 3-17-90 War ON drugs? Hell no, war WITH drugs. CIA drug + smuggling. +FBI.ARJ 52K 10-27-88 Little known information about illegal FBI + operations and tactics inside the U.S. +FBI_BBS.ARJ 6K 12-25-91 Is the FBI assembling a team to spy on BBS's? + This article says definitely YES! +GUERRILA.ARJ 35K 1-19-92 CIA manual for guerrilla warfare. This is the + controversial manual that the CIA distributed + during the U.S. war against Nicaragua. +MARCHETI.ARJ 12K 3-17-90 Interview with an ex-CIA official. Very + informative. +NED.ARJ 6K 11-24-89 An interview about the 'National Endowment for + Democracy' - NED. Very good information about this + little known gov't agency. +NIXINDON.ARJ 18K 4-19-92 Indonesia 1958: Nixon, The CIA, The Secret War, + and 700,000 - 1 million Indonesians murdered with + U.S. help. +NUGANHAN.ARJ 16K 12-27-91 Nugan Hand Bank - CIA Bank Corruption. +SHEEHAN.ARJ 38K 3-17-90 Fantastic text of a speech concerning the + Iran-contra affair and illegal CIA activities. Why + didn't Congress touch on these subjects? + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ßßßßßßÛ º Text: Civil Liberties Files + ÜÛ º Available: 22 files (0.2 MB) + ÛÛ º Privilege: Disgrace + ÛÛ º Newest: ARGUE2.ARJ 10-07-92 (avail: 10-13-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1ST_AMND.TXT 8K 10-11-92 Article - Look Who's Attacking and Defending Free + Speech. +ACLU_INF.TXT 15K 4-04-92 Information and a brief history of the American + Civil Liberties Union (ACLU). +ARGUE2.ARJ 10K 10-07-92 A series of arguements against Amendment 2, an + Anti-gay proposal. These took place on the Colo. + Springs Local Politics Echo. +CCRSUIT.ARJ 11K 1-18-92 Read about a new law that enables the US to round + up so-called terrorists while evading the + Constitution! +CHRISTIC.ARJ 9K 10-26-90 What is the Christic Institute? Find out about + this superb organization and how it helps protect + you. +CITIZEN.TXT 2K 7-09-92 Announcement of a local Pikes Peak civil liberties + and fight-back organization. Protect your rights + - read this one! +CIVIL.ARJ 6K 11-28-90 Do you know where your civil liberties are?! + Learn about the 'Foreign Intelligence Surveillance + Act' and how it threatens you. +CLTHOMAS.ARJ 11K 1-18-92 The Center for Constitutional Rights report on + Clarence Thomas: Unfit for Court. Contains + interesting info not reported. +CONCAMP.ARJ 28K 2-15-92 Concentration Camps In USA? You Bet! Read about a + law on the books to suspend the Constitution and + plans to seize people. +COPSTALK.ARJ 3K 12-25-91 Should you talk to the cops when they just want to + ask you a "few simple" questions? +DECINDEP.ARJ 6K 7-05-90 A NEW version of the Declaration of Independence. +DRUGTEST.ARJ 4K 11-25-90 Test your knowledge about the 'drug war.' +FEMA_LAW.ARJ 11K 1-24-91 The FEMA and the law. How easily could martial + law be imposed? The laws that could suspend the + constitution are already on the books! +FOIA_KIT.ARJ 14K 11-02-88 Freedom of Information Act kit. Get YOUR files! +INTRNLAW.ARJ 11K 2-10-92 Native Americans and International Law. +NAT_LAW.ARJ 14K 2-14-92 Laws & Rulings Effecting Native American. +ROBOCITZ.ARJ 14K 4-08-92 Programming The Robotic Citizen. +SEC_ACT.ARJ 7K 1-24-91 Security precautions for activists. +SSN-FAQ.ARJ 7K 12-27-91 What To Do When They Ask For Your Social Security + Number. +SURVEILL.ARJ 4K 11-04-89 Employers snoop and eavesdrop on their employees. + Big Brother is here! Learn what you can do about + it. +USADOCS.ARJ 18K 8-16-86 Documents from US history. Gettysburg address, the + constitution, etc. +VISABANS.ARJ 4K 11-28-90 U.S. bans foreign citizens from travelling into + the U.S. because of what they might TELL the U.S. + public. Free speech anyone? + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßÛ º Text: Conspiracy Theories + ÜÛÜÜÜÛÜ º Available: 28 files (0.8 MB) + Û ÛÛ º Privilege: Disgrace + ÛÜÜÜÜÛÛ º Newest: HIT_BUSH.ARJ 10-14-92 (avail: 10-15-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +ABBIEHOF.ARJ 14K 6-23-90 Was Abbie Hoffman assassinated? Some messages + speak about different theories. +AIDSPLOT.ARJ 14K 9-16-90 AIDS As A Weapon Of War. +AIDS_ORG.TXT 49K 4-23-92 Article from Rolling Stone mag: 'The Origin of + AIDS.' Could AIDS have been transmitted from + monkeys to humans in the polio vaccine? +BUSHIRAN.ARJ 17K 11-09-88 Info about Bush and the Iran-contra theory. +BUSHKNEW.ARJ 7K 6-11-90 Article: Did Bush know about Iran-contra? +BUSHTHYR.ARJ 4K 5-21-91 Article: Did Bush's thyroid condition effect his + decision-making before and during the Gulf war? + Very interesting article! +CONTRA.ARJ 6K 5-01-91 Review/summary of the Iran-contra + scandal/conspiracy. +GOVTAIDS.ARJ 8K 11-30-90 AIDS: Made - purposely - in the U.S.A.? Read what + a summary of what a German magazine has to say + about the origin of the AIDS virus. +HIT_BUSH.ARJ 56K 10-14-92 Article on Bush and his link with far-right + elements and Nazi Germany. Truth or fiction? +JFKFILE1.ARJ 85K 4-11-92 Part 1 of 5 of a ton of information on the + assassination of JFK. +JFKFILE2.ARJ 67K 4-11-92 Part 2 of 5 of a ton of information on the + assassination of JFK. +JFKFILE3.ARJ 79K 4-11-92 Part 3 of 5 of a ton of information on the + assassination of JFK. +JFKFILE4.ARJ 56K 4-11-92 Part 4 of 5 of a ton of information on the + assassination of JFK. +JFKFILE5.ARJ 62K 4-11-92 Part 5 of 5 of a ton of information on the + assassination of JFK. +JFK_LOOT.ARJ 8K 1-18-92 Article: Who Killed JFK? The media whitewash + continues. +JFK_MRDR.ARJ 64K 4-05-92 Text file: A variety of viewpoints as to who + REALLY killed John F. Kennedy. +JFK_WW.ARJ 6K 1-18-92 A report that the media is trying to discredit + Oliver Stone's movie "JFK." +KINGCONS.ARJ 3K 12-25-91 Article: Was Martin Luther King Jr. killed for his + anti-war political activities? +MIAMIHER.ARJ 7K 3-17-90 Miami Herald/Christic Institute article about + little known facts of the Iran-contra conspiracy. +NORTH.ARJ 7K 6-11-90 Article: What was in Ollie North's personal, + private notebooks? Find out! +PROPCRIS.ARJ 16K 1-27-91 Producing the "proper" crisis. Speech by ex-CIA + agent Philip Agee who has been stopped from making + this speech in the U.S. by the gov't. +RFKPLOT.ARJ 38K 11-28-90 Was there a plot to assassinate Robert F. Kennedy? + Informative article talks about the facts in the + case. +ROCKSYND.ARJ 38K 4-19-92 Rockefeller Syndicate, Secret Government Pt. 1. +SDI-ART1.ARJ 12K 5-03-90 Who killed 22 SDI researchers? +SPACGATE.ARJ 117K 8-08-91 SpaceGate: The "TRUTH" about the Worldwide UFO + Coverup. This is the Complete Shocking Story. MUST + READ! +SURPRISE.ARJ 10K 11-30-90 Article: The October Suprise: The Verdict is + Treason. Read this fascinating story of U.S. + presidential election engineering and deception! +UFOS.ARJ 26K 8-08-92 Transcript of speech by Milton Cooper, ex US Navy, + regarding conspiracy/coverup by US Government of + UFO phenonomenon. Interesting. +WHY_WAR.ARJ 6K 12-25-91 An Australian newspaper article titled 'Why U.S. + Wanted War.' A war perspective from Oz. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ º Text: Latin American Files + Û Û º Available: 18 files (0.3 MB) + ßßßßßÛÛ º Privilege: Disgrace + ÛÛ º Newest: CUBACRIS.ARJ 3-25-90 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +300_YEAR.ARJ 5K 1-25-92 Article: 300 Years of Washington's Anti-Cuba + Policy. +BAYOPIGS.ARJ 4K 12-25-91 Lessons from the Bay of Pigs. +BAYPIGS.ARJ 5K 12-25-91 Cuba's view of the Bay of Pigs. +CUBACRIS.ARJ 3K 3-25-90 Background on the Cuban missile crisis. +CUBADRUG.ARJ 15K 3-02-91 Cuba and drug trafficking: a smear? +CUBA_TV.ARJ 7K 7-26-90 Article: Cuba battles for its airwaves. +CUBMISCR.ARJ 5K 2-07-92 Article: Cuban Missile Crisis, More Than Just + History. +GUANTANA.TXT 6K 4-04-92 Background information on the U.S. military base + in Guantanamo Bay, Cuba. +GUAT_DEM.ARJ 10K 3-04-91 Guatemala: A 'Democratic Transition'? +GUEVARA.ARJ 4K 10-19-90 Article: Remembering Che Guevara. +JAN25CAS.ARJ 5K 2-06-92 A speech/letter by Fidel Castro given to the + attendees of the Jan. 25 pro-Cuba protest rally. +NIC_FAIL.ARJ 10K 10-17-90 Nicaragua's 'Capitalist Miracle' fails. +PANAMA.ARJ 160K 7-08-90 Many informative files about the Panama invasion. + Gives background history on the illegal invasion + that our corporate mass media ignored. +PAN_HR.ARJ 14K 3-17-90 Human rights group's report on the Panama + invasion. Learn what the gov't is covering up! +TV_WAR.ARJ 6K 10-26-89 U.S. prepares to 'invade' Cuba with illegal TV + broadcasts. Cuba is ready to retaliate, read about + it. +WHY_CUBA.TXT 9K 5-04-92 Article: Why Cuba Won't Surrender. Some + background info on Cuba's revolution. +WOMEN_CU.ARJ 13K 4-29-91 Several articles concerning the status of women in + Cuban society today. Interesting. +WORLDPOL.ARJ 5K 10-17-90 Article: The Return of the World's Policeman. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßßßÛ º Text: Third World Files + ÜÛ Û ÜÛ º Available: 12 files (0.2 MB) + ÛÛ Û ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: SOM_FAMN.ARJ 10-18-92 (avail: 10-25-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +ASA-BELL.ARJ 15K 2-07-92 Article: Global networks and international + communications: AFRINET. +ASA-GARR.ARJ 16K 2-07-92 Article: Packet radio in earth and space + environments for relief and development. +ASA-JENS.ARJ 10K 2-07-92 Article: Low cost global electronic communications + networks for Africa. +IRISH_AM.ARJ 9K 10-28-90 Article: The Case for a Free and United Ireland. +LIBYA_F.ARJ 4K 12-25-91 Some facts about Libya. +QADHAFI.ARJ 20K 4-19-91 A series of texts about Libya and Col. Muammar + Qadhafi. Learn what Qadhafi thinks that isn't + found in our normal mass media. +RESOURC1.ARJ 43K 12-27-91 Available Resources (books) On Middle East From + AFSC. +RESOURC2.ARJ 37K 12-27-91 Books Available On Third World Resources. +SOM_FAMN.ARJ 10K 10-18-92 Article - Somalia Famine: Imperialism Starves + Africa. +TWR491.ARJ 52K 5-20-91 Third World resources. A quarterly review of + resources/articles about the Third World. +UNICEF89.ARJ 8K 7-08-90 1988 UNICEF report. How the overexploited 3rd + World nations are paying billions to the rich + nations and how this kills children! +ZAIRE.ARJ 3K 1-25-92 Analysis of the Bush administration support for + the Zaire dictatorship. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û Û º Text: Media-Awareness Files + ÜÛ ÜÛ º Available: 46 files (0.2 MB) + ÛÛ ÛÛ º Privilege: Disgrace + ÛÛ ÛÛ º Newest: CIA_MURD.ARJ 12-25-91 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +ADDMEDIA.ARJ 3K 12-25-91 Addresses of major national media outlets. Become + a 'media consumer' and let the media know what you + think of their reporting! +ALTNEWS.ARJ 6K 6-23-90 A few sources of alternative news. +CHOMLOOT.ARJ 8K 5-09-92 MIT Professor Noam Chomsky takes a look at some of + our media's propaganda, lies, and contradictions + about the Gulf Massacre. +CHOMSKY.ARJ 7K 5-19-90 Article: Propaganda, American Style. Written by an + MIT professor. Learn how the media manipulates the + news AND the public. +INVERT.ARJ 5K 12-25-91 Article: Inverted Media & The War +JUST_WAR.ARJ 12K 2-25-91 Article: The Press and the Just War. +LINGUICI.ARJ 6K 12-25-91 Article: Media Linguicide and Class Wars. +M-U-S-H.ARJ 9K 2-25-91 Article: M*U*S*H - A report on the media. +MEDIA.ARJ 3K 5-21-91 Various media addresses. +MEDIACAN.TXT 8K 4-19-92 Article: Constructing the Candidates, Have the + Media Already Picked the Next President? + Insightful reading! +MEDIAWAR.ARJ 4K 12-25-91 Article: The Media War (from Australia). +MEDIAWRK.ARJ 5K 12-25-91 Anti-war media work - we've got to get busy +MISEVENT.ARJ 5K 12-25-91 Article: The Media Missed the Event. +NATOBREN.ARJ 3K 12-25-91 One of the most 'censored' stories: The story of + CIA support for European terrorists. +PROPHOME.ARJ 5K 12-25-91 Article: The Propaganda War at Home. +PUB_NEWS.TXT 3K 7-05-92 Information: How to get free publicity for your + newsletter or magazine. +PUBS.ARJ 12K 12-25-91 Superb listing of various alternative news + publications, activist groups listed, along with + some leftist/progressive news sources. +SMARTBOM.ARJ 6K 12-25-91 Article: Smart bombs, Dumb TV +SOL_NEWS.ARJ 5K 12-25-91 A newspaper article about THIS BBS! Read how it + was changed due to this system's political + content/social emphasis. +TV_BATTL.ARJ 5K 12-25-91 TV's other battles: Suits vs Screamers. +WARPOLLS.ARJ 9K 12-25-91 Article: Public Misinformed -- New Opinion Survey. + This study shows alarming misinfo among the US + public and a bias to support Bush's war. + + FAIR (Fairness and Accuracy In Reporting) Reports and articles. + ----------------------------------------------------------------- +FAIR_SRC.ARJ 6K 12-25-91 An analysis of the media's "expert" sources used + for commentary during the war in the Gulf. +WAR_BIAS.ARJ 3K 12-25-91 A FAIR (Fairness and Accuracy in Reporting) report + on how much time the mass media is gave the + anti-war demonstration (far less than 1%!). + + The below files are part of the annual "Project Censored." Project Censored + uncovers non- or under-reported news stories and prints them in an annual + report. Find out what the media *knows* but is NOT telling the public! + ----------------------------------------------------------------------------- +4TH_ESTA.ARJ 3K 12-25-91 Covering the Gulf War: Mortgaging the Fourth + Estate. Is the media selling out? +BILL_DRU.ARJ 3K 12-25-91 The Bill of Rights had a close call in 1990. +BUSH_OIL.ARJ 3K 12-25-91 President Bush's leaky oil barges. +B_CRISIS.ARJ 3K 12-25-91 America's banking crisis, coming soon to a bank + near you. +CENSOR87.ARJ 36K 5-26-88 Censored information gets to you. Some of the 'top + 10' most censored stories of 1987. Very + informative. +CENSOR89.ARJ 5K 6-24-90 The top 10 'most censored' stories of 1989. Learn + what the media hasn't been telling you! +CENSOR90.ARJ 5K 12-25-91 The Top 10 most 'censored' stories of 1990 + according to a panel of media experts. Find out + what 'big brother' hasn't been telling you! +CENSOR91.TXT 7K 5-25-92 The Top 10 'Most Censored' (or under-reported) + news stories of 1991. Read this to find out what + the media hasn't been telling you! +CIABANKS.ARJ 5K 12-25-91 Info about the CIA's looting of S&L banks to pay + for illegal operations. Submitted for one of + 1990's top 10 most censored stories. +CIA_CRIM.ARJ 3K 12-25-91 Nat'l media ignoring CIA misdeeds. +CIA_MURD.ARJ 3K 12-25-91 CIA, the La Penca bombing and a murder indictment: + no news? +COKECHEM.ARJ 3K 12-25-91 The chemical industry and its cocaine connection. +EL_SHOCK.ARJ 4K 12-25-91 Return of electroshock: the 'new, improved' + psychiatric therapy. +FRAUD_DR.ARJ 3K 12-25-91 Continued media blackout of drug war fraud. +GEORGE_I.ARJ 3K 12-25-91 Where George was during Iran-contra. +GLIBRARY.ARJ 3K 12-25-91 American Library Association's fight against + government secrecy. +M_CANCER.ARJ 3K 12-25-91 Medical establishment suppressing alternative + cancer treatments? +NORTH_I.ARJ 3K 12-25-91 North acquittal: All in the family. +PENT_BUD.ARJ 4K 12-25-91 The Pentagon's secret billion dollar black budget. +REAL_PAN.ARJ 4K 12-25-91 What really happened to Panama is a different + story. +TEAM_100.ARJ 3K 12-25-91 Bush's "Team 100": A new era of fat-cat influence + in Washington. +T_SQUARE.ARJ 4K 12-25-91 The real story about the Tienanmen Square + Massacre? +VDT_RADI.ARJ 3K 12-25-91 Media's VDT radiation stories that didn't make it + into the news. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßßßÛ º Text: Current Events/News + ÜÛ Û º Available: 41 files (0.3 MB) + ÛÛ ÛÛßßßßß º Privilege: Disgrace + ÛÛ ÛÛÜÜÜÜÛ º Newest: USSR_CIS.ARJ 1-21-92 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +AIDSFREE.TXT 8K 5-20-92 Article from the Houston Post: Do Cold, Hard AIDS + Facts Lie In Freezer? +AIDSSTAT.ARJ 15K 10-14-92+ AIDS statistics (tons of 'em) from the Centers for + Disease Control. +AUS_VIEW.ARJ 4K 1-22-92+ An Australian view of the US medical/health care + "system." +BBSTING.ARJ 4K 6-23-90+ Police set up a BBS to 'sting' users. +BLACKBUD.ARJ 6K 5-15-92+ The Pentagon's Black Budget - Blacker Than We + Think. +BODYCOUN.ARJ 6K 12-25-91+ The hidden body count of the Panama invasion. + Read what U.S. GIs have to say about the REAL body + count. Shocking story of gov't coverup! +BUSH_JAP.ARJ 4K 1-24-92+ Commentary/analysis about Bush's recent trip to + Japan. +COS_CHRI.TXT 8K 5-18-92 Article: Christian Hate Groups Take Root in + Colorado. Read about who has come to Colorado + Springs! +DANE_LAB.ARJ 6K 6-06-79+ Find out how Danish labor unions plan to use + computers to aid them. +DOD1970.ARJ 4K 2-22-91+ Senate Committee Minutes re: Synthetic Biological + Agents. +EURO_CH.ARJ 16K 10-06-92+ Article - Fourth Reich Bankers Detonate + Euro-Chaos. Read about what's happening with + Europe's unification. +EURO_COM.TXT 2K 9-26-92 The results of a poll done in Eastern Europe + report that 75% of people there prefer their old + regimes instead of capitalism! +GREED_VI.ARJ 4K 1-25-92+ Article: Burning Down the Dachas, Greed Fuels + Social Violence in Moscow. +HEALTHIN.ARJ 4K 11-16-89+ Article: The private health insurance scam. Very + good reading. +INT_AFFA.TXT 7K 10-11-92 An article from the Canadian Communist Party + entitled, International Affairs. +IRAQBOMB.ARJ 5K 2-07-92+ An interview with a victim of the US bombing of + Iraq. +MAYDAY92.TXT 7K 5-15-92 A report of various May Day '92 celebrations + around the world. +MED_RACE.TXT 5K 5-15-92 Article: How the Media Promote Racism, Victims are + Portrayed as Criminals. +MILIT_LA.ARJ 6K 9-14-92+ Article - The Belly of the Beast: Linking + Militarization and Urban Plight in Los Angeles. +MYTH_JUL.ARJ 6K 7-08-92+ Witness for Peace 'Myth of the Month.' July 92: + 'Linkages.' +MYTH_JUN.ARJ 7K 7-07-92+ Witness for Peace 'Myth of the Month.' June 92: + 'Free Trade.' +NATLCARE.ARJ 3K 11-16-89+ Article: Why not national health care? +NAZI_POG.ARJ 9K 9-08-92+ Article - Smash Nazi Pogroms in Germany! +NEEDY.ARJ 5K 6-05-90+ Article: The Truly Needy. +NHEALTHC.ARJ 14K 12-25-91+ How to win quality health care. Very informative + text about our current health care system and the + possibilities for a new one. +NWO_US.TXT 6K 10-11-92 Article - New World Order: U.S. Style. +PENTAWLD.ARJ 14K 4-08-92+ Pentagon's Plans For World Conquest. Bush's plans + for a 'New World Order.' Read this one! +PEP_WARS.TXT 8K 7-06-92 Article - Linking Wars on Crime and Foreign Wars. +PETE_SAY.ARJ 11K 1-25-92+ Article: What Pete's Not Saying, The Real State of + the Golden State. +POPE_CIA.TXT 9K 3-26-92 Article: The Reagan-Pope Plot for + Counter-revolution. How the CIA/U.S. gov't and + the Pope conspired to destabilize Eastern Europe. +RADIOLIB.ARJ 4K 12-25-91+ The U.S. propaganda war against the USSR still + lives with Radio 'Liberty' broadcasting + inflammatory, separatist propaganda. Read this! +RAM_GULF.ARJ 6K 9-26-90+ Speech on Gulf crisis by a former U.S. Attorney + General. +REALITY.ARJ 8K 1-19-92+ Info on food - world hunger and inefficiency. +RUS_YEL.ARJ 10K 8-30-92+ Article - One Year After Yeltsin Countercoup: + Soviet Workers Bleed. +SDI.ARJ 4K 6-20-88+ The Pentagon's Spiritual Defense Initative. +SDIFRAUD.ARJ 3K 4-08-92+ Is SDI A Fraud? +STALIN_P.TXT 2K 10-11-92 An article by the mainstream Vancouver (Canada) + Sun newspaper, entitled, Stalin's Appeal Soars in + Free Russia. +USSRUPD1.ARJ 4K 2-15-92+ How The USA Brought Down The USSR! +USSR_CIS.ARJ 11K 1-21-92+ Article: The Nature of the New Commonwealth. + Interesting article on political developments in + the ex-USSR. +US_IRAQ2.ARJ 8K 9-08-92+ Article - Bush Election Ploy: Bombing for Votes. + U.S. Targets Iraq, Again. +US_YUGO.ARJ 15K 9-05-92+ A series of articles giving a great deal of + background information on what is happening in + Yugoslavia. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßßÛ º Text: Political Text Files + ÜÛ ÜÜÜÜÛÜ º Available: 43 files (0.3 MB) + ÛÛ ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: RON_DANL.ARJ 10-17-92 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +10_REASN.TXT 3K 10-11-92 Article - 10 Reasons Not to Vote for George Bush; + and 10 Reasons Not to Vote for Bill Clinton. +12_MYTHS.ARJ 9K 12-11-89+ 12 common myths about Democratic Socialism. + Informative. +21ST_NEW.ARJ 6K 10-11-92+ An article written by the Sysop which gives an + impression/overview of the "21st Century Party" + and "The New Party." +ANARCHO.ARJ 10K 5-03-91+ Biographies and the ideas of the major anarchist + philosophers. +ANARCHY.ARJ 4K 5-18-91+ Article from the WRL organizers manual on anarchy. +AYF.ARJ 3K 5-18-91+ Flyer: What is the Anarchist Youth Federation. +BUGS.ARJ 9K 6-23-90+ Bugs, tails, mail covers: How to cope with them. +BUSHBOYS.ARJ 5K 6-23-90+ Article: Bush's Boys Club, Skull and Bones. +CAN_ELEC.ARJ 4K 10-11-92+ An article from the Canadian Communist Party + entitled, The Coming Federal Election and the + Drive to the Right. +CLINT92.ARJ 17K 9-24-92+ Details on Clinton's economic plan. +CLIN_TAX.TXT 5K 9-05-92 What's the truth about George Bush's claim that + Clinton raised taxes 128 times? Read what the Palm + Beach Post had to say. +CONGRFAX.ARJ 12K 1-19-92+ Fax numbers to our Senators and so-called + 'Representatives.' +COORS.ARJ 5K 12-25-91+ What is the Coors family up to lately? What is + your beer money paying for? Find out! +CPC_CONS.TXT 2K 10-11-92 Canadian Communist Party press release, Re: + Referendum on Consensus Report On the + Constitution. +DEATHSQ.ARJ 3K 12-23-89+ Satire: Save the death squads! +DEMOCRAC.ARJ 4K 11-04-89+ Essay: Communists and Democracy. +D_QUAYLE.ARJ 23K 11-01-92+ All you ever wanted to know about Dan Quayle! +FREESCOT.ARJ 9K 4-10-92+ Article: The Scottish Question. An examination of + Scotland's independence. +GREEN.ARJ 13K 5-12-89+ A series of message about the U.S. Green Party + movement. +INDCITZN.ARJ 11K 2-03-92+ Native American Citizenship Issues. +INDGOVT.ARJ 12K 2-04-92+ Native American Self-Governance Issues. +IND_SELF.ARJ 14K 1-31-92+ Article: American Indian Self-Governance, Fact, + Fantasy and Prospects for the Future. +INT_ROND.ARJ 6K 6-03-92+ An interview with Ron Daniels about his thoughts + on American politics. +IROQUOIS.ARJ 29K 9-02-91+ The Haudenosaunee Confederacy's Constitution. +KNOWCPUS.ARJ 8K 12-25-91+ What everyone should know about the Communist + Party, USA. Learn what the CPUSA *REALLY* stands + for, not the misinfo the media spouts off. +MULT_DEM.ARJ 5K 7-31-92+ Article - Multicultural Democracy: Toward a New + Strategy for Progressive Activism. +NEA_CZAR.ARJ 6K 6-22-92+ Article - The Decency Czarina: Anne-Imelda Radice, + the Right's watchdog inside the NEA. +OPP_CLIN.ARJ 12K 10-17-92+ Article - Beyond the Ballot Box: WHY THE LEFT + SHOULD OPPOSE CLINTON. +PCTMANUA.ARJ 9K 5-16-92+ Precinct Manual - as issued to precinct chairs in + Travis County, Texas, by that county's Democratic + Party - a how-to manual. +PEOP_YES.TXT 6K 6-05-92 Article: The People, Yes. Part of the Shadow + Government series. +PEROTGAY.TXT 8K 6-26-92 An open letter to Henry Ross Perot concerning his + statements about gays and lesbians. Part of the + Shadow Gov't series. +PEROT_B.ARJ 7K 7-05-92+ Article by the Sysop - Henry Ross Perot: + Entrepreneur or Welfare Billionaire? +PEROT_IN.TXT 7K 6-25-92 Article - Perot's Private Probes, A Billionaire + pursues his own Iran and MIA trail. +PEROT_PM.ARJ 11K 10-27-92+ Article - Perot's Post-Modern Pastoralism. + Interesting reading about our current presidential + race. +POLBBS.ARJ 3K 3-17-90+ Listing of some politically-oriented BBS's. +PROG_AGN.ARJ 7K 6-18-92+ Article - Building a Progressive Agenda in 1992. +QUAYLE.ARJ 5K 12-22-91+ Some quotes from our illustrious Vice Pres. +REDBAIT.ARJ 29K 10-27-87+ Right-wing reality: red-baiting. Good +RHETREAL.ARJ 5K 11-01-92+ Article - Rhetoric versus Reality: George Bush + Just Doesn't Get It. +RON_DANL.ARJ 19K 10-17-92+ A ton of excerpts/quotes from presidential + candidate Ron Daniels' speeches, along with some + info on the Campaign for a New Tomorrow. +SMEARS.ARJ 7K 12-25-91+ Political smears as disinformation. +WHITHOUS.TXT 1K 5-12-92 Poem: Get Ye Out of the White House. +WHY_VOTE.TXT 2K 5-25-92 A listing of reasons for why to vote, or why not + to vote. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û Û Û º Text: CUD Newsletters + ÜÛ Û Û º Available: 154 files (2.4 MB) + ÛÛ ÛÜÜÜÜÛÜ º Privilege: Disgrace + ÛÛ ÛÛ º Newest: CUD455.ARJ 11-05-92 (avail: 11-14-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +CUD100.ARJ 20K 1-11-92 Computer Underground Digest newsletter. +CUD101.ARJ 15K 1-11-92 Computer Underground Digest newsletter. +CUD102.ARJ 11K 1-11-92 Computer Underground Digest newsletter. +CUD103.ARJ 14K 1-11-92 Computer Underground Digest newsletter. +CUD104.ARJ 32K 1-11-92 Computer Underground Digest newsletter. +CUD105.ARJ 13K 1-11-92 Computer Underground Digest newsletter. +CUD106.ARJ 14K 1-11-92 Computer Underground Digest newsletter. +CUD107.ARJ 13K 1-11-92 Computer Underground Digest newsletter. +CUD108.ARJ 14K 1-11-92 Computer Underground Digest newsletter. +CUD109.ARJ 12K 1-11-92 Computer Underground Digest newsletter. +CUD110.ARJ 14K 1-23-92 Computer Underground Digest newsletter. +CUD111.ARJ 15K 1-09-92 Computer Underground Digest newsletter. +CUD112.ARJ 14K 1-09-92 Computer Underground Digest newsletter. +CUD113.ARJ 15K 1-09-92 Computer Underground Digest newsletter. +CUD114.ARJ 12K 1-09-92 Computer Underground Digest newsletter. +CUD115.ARJ 7K 1-09-92 Computer Underground Digest newsletter. +CUD116.ARJ 17K 1-09-92 Computer Underground Digest newsletter. +CUD117.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD118.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD119.ARJ 12K 1-09-92 Computer Underground Digest newsletter. +CUD120.ARJ 10K 1-09-92 Computer Underground Digest newsletter. +CUD121.ARJ 15K 1-09-92 Computer Underground Digest newsletter. +CUD122.ARJ 19K 1-09-92 Computer Underground Digest newsletter. +CUD123.ARJ 18K 1-09-92 Computer Underground Digest newsletter. +CUD124.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD125.ARJ 13K 1-09-92 Computer Underground Digest newsletter. +CUD126.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD127.ARJ 15K 1-09-92 Computer Underground Digest newsletter. +CUD128.ARJ 15K 1-09-92 Computer Underground Digest newsletter. +CUD129.ARJ 17K 1-09-92 Computer Underground Digest newsletter. +CUD200.ARJ 16K 9-03-90 Computer Underground Digest newsletter. +CUD201.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD202.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD203.ARJ 20K 1-09-92 Computer Underground Digest newsletter. +CUD204.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD205.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD206.ARJ 16K 1-09-92 Computer Underground Digest newsletter. +CUD207.ARJ 19K 1-09-92 Computer Underground Digest newsletter. +CUD208.ARJ 17K 1-09-92 Computer Underground Digest newsletter. +CUD209.ARJ 19K 1-10-92 Computer Underground Digest newsletter. +CUD210.ARJ 17K 1-10-92 Computer Underground Digest newsletter. +CUD211.ARJ 16K 1-10-92 Computer Underground Digest newsletter. +CUD212.ARJ 21K 1-10-92 Computer Underground Digest newsletter. +CUD213.ARJ 17K 1-10-92 Computer Underground Digest newsletter. +CUD214.ARJ 20K 1-10-92 Computer Underground Digest newsletter. +CUD215.ARJ 19K 1-10-92 Computer Underground Digest newsletter. +CUD216.ARJ 14K 1-10-92 Computer Underground Digest newsletter. +CUD217.ARJ 17K 1-10-92 Computer Underground Digest newsletter. +CUD218.ARJ 19K 1-10-92 Computer Underground Digest newsletter. +CUD219.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD300.ARJ 18K 1-12-92 Computer Underground Digest newsletter. +CUD301.ARJ 12K 1-11-92 Computer Underground Digest newsletter. +CUD302.ARJ 17K 1-11-92 Computer Underground Digest newsletter. +CUD303.ARJ 20K 1-11-92 Computer Underground Digest newsletter. +CUD304.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD305.ARJ 20K 1-11-92 Computer Underground Digest newsletter. +CUD306.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD307.ARJ 15K 1-11-92 Computer Underground Digest newsletter. +CUD308.ARJ 16K 1-11-92 Computer Underground Digest newsletter. +CUD309.ARJ 19K 1-11-92 Computer Underground Digest newsletter. +CUD310.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD311.ARJ 16K 1-11-92 Computer Underground Digest newsletter. +CUD312.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD313.ARJ 20K 1-11-92 Computer Underground Digest newsletter. +CUD314.ARJ 18K 1-11-92 Computer Underground Digest newsletter. +CUD315.ARJ 20K 1-11-92 Computer Underground Digest newsletter. +CUD316.ARJ 17K 1-11-92 Computer Underground Digest newsletter. +CUD317.ARJ 16K 1-11-92 Computer Underground Digest newsletter. +CUD318.ARJ 13K 1-11-92 Computer Underground Digest newsletter. +CUD319.ARJ 17K 1-11-92 Computer Underground Digest newsletter. +CUD320.ARJ 19K 1-11-92 Computer Underground Digest newsletter. +CUD321.ARJ 16K 1-11-92 Computer Underground Digest newsletter. +CUD322.ARJ 19K 1-11-92 Computer Underground Digest newsletter. +CUD323.ARJ 19K 1-11-92 Computer Underground Digest newsletter. +CUD324.ARJ 17K 1-11-92 Computer Underground Digest newsletter. +CUD325.ARJ 17K 7-15-91 Computer Underground Digest newsletter. +CUD326.ARJ 18K 7-27-91 Computer Underground Digest newsletter. +CUD327.ARJ 20K 8-10-91 Computer Underground Digest newsletter. +CUD328.ARJ 22K 8-10-91 Computer Underground Digest newsletter. +CUD329.ARJ 16K 8-10-91 Computer Underground Digest newsletter. +CUD330.ARJ 18K 8-18-91 Computer Underground Digest newsletter. +CUD331.ARJ 20K 8-28-91 Computer Underground Digest newsletter. +CUD332.ARJ 19K 9-13-91 Computer Underground Digest newsletter. +CUD333.ARJ 17K 9-18-91 Computer Underground Digest newsletter. +CUD334.ARJ 15K 9-28-91 Computer Underground Digest newsletter. +CUD335.ARJ 20K 10-05-91 Computer Underground Digest newsletter. +CUD336.ARJ 11K 10-13-91 Computer Underground Digest newsletter. +CUD337.ARJ 15K 10-20-91 Computer Underground Digest newsletter. +CUD338.ARJ 18K 10-28-91 Computer Underground Digest newsletter. +CUD339.ARJ 14K 11-06-91 Computer Underground Digest newsletter. +CUD340.ARJ 17K 11-11-91 Computer Underground Digest newsletter. +CUD341.ARJ 15K 11-28-91 Computer Underground Digest newsletter. +CUD342.ARJ 15K 11-29-91 Computer Underground Digest newsletter. +CUD343.ARJ 18K 12-09-91 Computer Underground Digest newsletter. +CUD344.ARJ 14K 12-29-91 Computer Underground Digest newsletter. +CUD400.ARJ -- Off-Line -- Computer Underground Digest newsletter. +CUD401.ARJ 12K 1-12-92 Computer Underground Digest newsletter. +CUD402.ARJ 17K 1-18-92 Computer Underground Digest newsletter. +CUD403.ARJ 8K 1-31-92 Computer Underground Digest newsletter. +CUD404.ARJ 19K 1-29-92 Computer Underground Digest newsletter. +CUD405.ARJ 13K 2-06-92 Computer Underground Digest newsletter. +CUD406.ARJ 20K 2-10-92 Computer Underground Digest newsletter. +CUD407.ARJ 19K 2-18-92 Computer Underground Digest newsletter. +CUD408.ARJ 19K 2-24-92 Computer Underground Digest newsletter. +CUD409.ARJ 19K 2-29-92 Computer Underground Digest newsletter. +CUD410.ARJ 19K 3-09-92 Computer Underground Digest newsletter. +CUD411.ARJ 18K 3-11-92 Computer Underground Digest newsletter. +CUD412.ARJ 14K 3-16-92 Computer Underground Digest newsletter. +CUD413.ARJ 16K 3-17-92 Computer Underground Digest newsletter. +CUD414.ARJ 19K 3-25-92 Computer Underground Digest newsletter. +CUD415.ARJ 19K 3-29-92 Computer Underground Digest newsletter. +CUD416.ARJ 19K 4-13-92 Computer Underground Digest newsletter. +CUD417.ARJ 16K 4-14-92 Computer Underground Digest newsletter. +CUD418.ARJ 20K 4-21-92 Computer Underground Digest newsletter. +CUD419.ARJ 16K 4-26-92 Computer Underground Digest newsletter. +CUD420.ARJ 18K 5-04-92 Computer Underground Digest newsletter. +CUD421.ARJ 17K 5-12-92 Computer Underground Digest newsletter. +CUD422.ARJ 21K 5-18-92 Computer Underground Digest newsletter. +CUD423.ARJ 21K 5-26-92 Computer Underground Digest newsletter. +CUD424.ARJ 16K 6-03-92 Computer Underground Digest newsletter. +CUD425.ARJ 18K 6-08-92 Computer Underground Digest newsletter. +CUD426.ARJ 18K 6-15-92 Computer Underground Digest newsletter. +CUD427.ARJ 16K 6-23-92 Computer Underground Digest newsletter. +CUD428.ARJ 18K 7-01-92 Computer Underground Digest newsletter. +CUD429.ARJ 17K 7-06-92 Computer Underground Digest newsletter. +CUD430.ARJ 17K 7-13-92 Computer Underground Digest newsletter. +CUD431.ARJ 17K 7-20-92 Computer Underground Digest newsletter. +CUD432.ARJ 16K 7-23-92 Computer Underground Digest newsletter. +CUD433.ARJ 19K 7-26-92 Computer Underground Digest newsletter. +CUD434.ARJ 17K 8-03-92 Computer Underground Digest newsletter. +CUD435.ARJ 18K 8-11-92 Computer Underground Digest newsletter. +CUD436.ARJ 18K 8-17-92 Computer Underground Digest newsletter. +CUD437.ARJ 20K 8-21-92 Computer Underground Digest newsletter. +CUD438.ARJ 18K 8-24-92 Computer Underground Digest newsletter. +CUD439.ARJ 19K 8-28-92 Computer Underground Digest newsletter. +CUD440.ARJ 15K 8-31-92 Computer Underground Digest newsletter. +CUD441.ARJ 16K 9-03-92 Computer Underground Digest newsletter. +CUD442.ARJ 18K 9-10-92 Computer Underground Digest newsletter. +CUD443.ARJ 17K 9-14-92 Computer Underground Digest newsletter. +CUD444.ARJ 22K 9-21-92 Computer Underground Digest newsletter. +CUD445.ARJ 18K 9-28-92 Computer Underground Digest newsletter. +CUD446.ARJ 19K 9-28-92 Computer Underground Digest newsletter. +CUD447.ARJ 20K 10-01-92 Computer Underground Digest newsletter. +CUD448.ARJ 19K 10-06-92 Computer Underground Digest newsletter. +CUD449.ARJ 20K 10-10-92 Computer Underground Digest newsletter. +VOL1XIND.ARJ 5K 1-05-92 Text index of Computer Underground Digest volume + 1.xx articles. +VOL2XIND.ARJ 4K 1-05-92 Text index of Computer Underground Digest volume + 2.xx articles. +VOL3XIND.ARJ 3K 1-05-92 Text index of Computer Underground Digest volume + 3.xx articles. +CUD452.ARJ 19K 10-20-92+ Computer Underground Digest +CUD450.ARJ 18K 10-14-92+ Computer Underground Digest +CUD453.ARJ 21K 10-27-92+ Computer Underground Digest +CUD451.ARJ 21K 11-01-92+ Computer Underground Digest V451 +CUD454.ARJ 15K 11-03-92+ Computer Underground Digest +CUD455.ARJ 20K 11-05-92+ Computer Underground Digest + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û Ûßßßßßß º Text: Misc. Newsletters + ÜÛ ÛÜÜÜÜÜÜ º Available: 21 files (1.2 MB) + ÛÛ ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: FNEWS947.LZH 11-22-92 (avail: 11-23-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +CONVERG.ARJ 27K 1-18-92 The Christic Institute's newsletter Convergence, + Sep 91 issue. Read about the drug war and its + history. Informative! +FNEWS941.ARJ 18K 10-12-92+ FidoNews newsletter. Read me! +FNEWS942.ARJ 15K 10-19-92+ FidoNews newsletter. Read me! +FNEWS943.ARJ 20K 10-26-92+ FidoNews newsletter. Read me! +FNEWS944.ARJ 22K 11-02-92+ FidoNews newsletter. Read me! +FNEWS946.ARJ 26K 11-16-92+ FidoNews newsletter. Read me! +FNEWS947.LZH 14K 11-22-92* FidoNews newsletter. Read me! +HICN0504.ARJ 59K 4-19-92 Health InfoCom Network Newsletter +INC0392.ARJ 18K 4-12-92 03/92 - INCITEMENT - Newsletter of American + Disabled for Attendant Programs Today (ADAPT) - + Protests - Arkansas Action. +PHRACK22.ARJ 93K 6-03-92 Phrack V22 "Hacker digest" +PHRACK23.ARJ 59K 6-03-92 Phrack V23 "Hacker digest" +PHRACK30.ARJ 72K 12-25-89 Phrack, the Hackers Digest. +PHRACK31.ARJ 60K 7-29-90 Phrack, the Hackers Digest. +PHRACK32.ARJ 129K 11-29-90 Phrack, the Hackers Digest. +PHRACK35.ARJ 130K 6-03-92 Phrack, the Hackers Digest. +PHRACK36.ARJ 72K 6-03-92 Phrack V36 Computer digest +PHRACK37.ARJ 125K 6-03-92 Phrack V37 Hacker publication +PHRACK38.ARJ 132K 10-15-92+ Phrack V38, the hackers journal. +PNL010.ARJ 113K 9-29-92 Pascal Newsletter #10 March 1992 +RAG0392.ARJ 44K 4-21-92 03/92 - The Disability Rag - March/April 92 + (America's Hard News Disability Magazine) Includes + Access Guide. +RAG0592.ARJ 41K 4-26-92 05/92 - The Disability Rag - May/June 92 + (America's Hard News Disability Magazine) Cover + Story: Disability as a Hate Crime. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßßßÛ º Text: ANEWS Echo Archives + ÜÛ ÛÜÜÜÜÜÜ º Available: 31 files (6.6 MB) + ÛÛ Û ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: 92NOV326.ARJ 11-22-92 (avail: 11-22-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +92APR102.ARJ 128K 4-12-92 Echo: News of the US & World - The Week ending + Saturday, 11-Apr-1992 +92APR109.ARJ 115K 4-19-92 Echo: News of the US & World - The Week ending + Saturday, 18-Apr-1992 +92APR116.ARJ 136K 4-26-92 Echo: News of the US & World - The Week ending + Saturday, 25-Apr-1992 +92MAY123.ARJ 181K 5-03-92 Echo: News of the US & World - The Week ending + Saturday, 02-May-1992 +92MAY130.ARJ 99K 5-10-92 Echo: News of the US & World - The Week ending + Saturday, 09-May-1992 +92MAY137.ARJ 281K 5-17-92 Echo: News of the US & World - The Week ending + Saturday, 16-May-1992 +92MAY144.ARJ 333K 5-24-92 Echo: News of the US & World - The Week ending + Saturday, 23-May-1992 +92MAY151.ARJ 231K 5-31-92 Echo: News of the US & World - The Week ending + Saturday, 30-May-1992 +92JUN158.ARJ 211K 6-07-92 Echo: News of the US & World - The Week ending + Saturday, 06-Jun-1992 +92JUN179.ARJ 197K 6-28-92 Echo: News of the US & World - The Week ending + Saturday, 27-Jun-1992 +92JUL186.ARJ 242K 7-05-92 Echo: News of the US & World - The Week ending + Saturday, 04-Jul-1992 +92JUL193.ARJ 147K 7-12-92 Echo: News of the US & World - The Week ending + Saturday, 11-Jul-1992 +92JUL200.ARJ 280K 7-19-92 Echo: News of the US & World - The Week ending + Saturday, 18-Jul-1992 +92JUL207.ARJ 198K 7-26-92 Echo: News of the US & World - The Week ending + Saturday, 25-Jul-1992 +92AUG214.ARJ 246K 8-02-92 Echo: News of the US & World - The Week ending + Saturday, 01-Aug-1992 +92AUG221.ARJ 277K 8-09-92 Echo: News of the US & World - The Week ending + Saturday, 08-Aug-1992 +92AUG228.ARJ 135K 8-16-92 Echo: News of the US & World - The Week ending + Saturday, 15-Aug-1992 +92AUG235.ARJ 289K 8-23-92 Echo: News of the US & World - The Week ending + Saturday, 22-Aug-1992 +92AUG242.ARJ 202K 8-30-92 Echo: News of the US & World - The Week ending + Saturday, 29-Aug-1992 +92SEP249.ARJ 280K 9-06-92 Echo: News of the US & World - The Week ending + Saturday, 05-Sep-1992 +92SEP256.ARJ 168K 9-13-92 Echo: News of the US & World - The Week ending + Saturday, 12-Sep-1992 +92SEP263.ARJ 119K 9-20-92 Echo: News of the US & World - The Week ending + Saturday, 19-Sep-1992 +92SEP270.ARJ 214K 9-27-92 Echo: News of the US & World - The Week ending + Saturday, 26-Sep-1992 +92OCT277.ARJ 84K 10-04-92 Echo: News of the US & World - The Week ending + Saturday, 03-Oct-1992 +92OCT284.ARJ 162K 10-11-92 Echo: News of the US & World - The Week ending + Saturday, 10-Oct-1992 +92OCT291.ARJ 383K 10-18-92 Echo: News of the US & World - The Week ending + Saturday, 17-Oct-1992 +92OCT298.ARJ 323K 10-25-92 Echo: News of the US & World - The Week ending + Saturday, 24-Oct-1992 +92OCT305.ARJ 538K 11-01-92+ Echo: News of the US & World - The Week ending + Saturday, 31-Oct-1992 +92NOV312.ARJ 241K 11-08-92+ Echo: News of the US & World - The Week ending + Saturday, 07-Nov-1992 +92NOV319.ARJ 104K 11-15-92+ Echo: News of the US & World - The Week ending + Saturday, 14-Nov-1992 +92NOV326.ARJ 187K 11-22-92* Echo: News of the US & World - The Week ending + Saturday, 21-Nov-1992 + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ßßßßßßÛ º Text: Activist's Letters + ÜÛ ÜÛ º Available: 9 files (0.0 MB) + ÛÛ ÛÛ º Privilege: Disgrace + ÛÛ ÛÛ º Newest: ELEC_LET.TXT 10-17-92 (avail: 10-17-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +CHRYSLER.TXT 15K 9-09-92 A series of letters to Chrsler Corporation + concering Will perkins franchise and his support + of Amendment 2 +CYANAMID.DOC 4K 4-23-91 Protest a New Jersey chemical company that is + shipping toxic wastes to the racist gov't of South + Africa polluting Black African land. +ELEC_LET.TXT 8K 10-17-92 A series of letters concerning this year's + elections for you to edit and/or mail to + newspapers. +HEALTH_C.DOC 5K 1-21-92 A letter in support of HR-1300, the Universal + Health Care Act. A plea for a single-payer + national health care system. +LETTER.TIP 2K 4-17-91 Tips on how to write an effective letter. Please + feel free to add your own tips to this and to + improve/expand on what is here! +PESTIEXP.DOC 2K 4-25-91 Oppose hazardous pesticides being exported to 3rd + World nations! Stop the 'circle of poison' killing + us. Check this one out!!! +POLIT.ADD 5K 2-11-92 Addresses of some of our politicians and media + organizations. (Needs some updating, please help!) +R2STRIKE.DOC 7K 1-21-92 Protect a worker's right to strike! Bills to stop + companies from using "permanent replacment + workers" to break strikes. +TAX_RICH.DOC 4K 2-01-92 A letter in support of House Minority Leader Ruth + Wright's proposals to increase taxes on the rich + in Colorado. Read/send this one! + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßÛ º Text: Fascist/Right-Wing Files + ÜÛ ÜÛÜÜÜÛÜ º Available: 8 files (0.3 MB) + ÛÛ Û ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: OUTLINE.ARJ 10-21-90 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +BELLANT.ARJ 119K 5-18-91 Archived report; Old Nazis in America. Russ + Bellant's groundbreaking report on Nazis & the + Republican Party in the US. Excellent!!! +BO_GRITZ.TXT 24K 9-12-92 A ton of info about Bo Gritz, the presidential + candidate of the racist, neo-Nazi Populist Party. + Much background on the Populist Party too. +CFV.ARJ 52K 7-27-92 This is the propaganda distributed by Colorado + Family Values justifying their discrimination + against gays, lesbians, & others. +FARRIGHT.TXT 9K 6-01-92 An expose on the far-right of U.S. politics: + Strategy in Elections. +FASC_BBS.TXT 12K 5-16-92 Article: Bigotry and Violence Online/Neo-Nazi + Bulletin Board Services. Read about what the far + right-wing is doing with BBS's. +RFA_INFO.TXT 8K 9-12-92 Info about the racist, anti-semitic, neo-Nazi + 'Radio Free America' radio network. +WOO_LEFT.TXT 37K 9-10-92 Article - Right Woos Left Over War Issue. Learn + how the far right is trying to attract the left in + support of their causes. +- If you think the far left is "in to" conspiracy theories, then you haven't +- seen some of the far right's wild ideas. Look for more various right-wing +- conspiracy theories in the "Conspiracy Theory" file area. +OUTLINE.ARJ 43K 10-21-90 Timeline Of Illuminiti History. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Û ÛßßßßßÛ º Text: Drug War-related Files + ÜÛ Û Û º Available: 16 files (0.2 MB) + ÛÛ ßßßßßÛÛ º Privilege: Disgrace + ÛÛ ÛÛ º Newest: HEMP-MED.ARJ 9-21-90 (avail: 10-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +CANNABIS.ARJ 10K 10-09-90 Benefits of Cannibis throughout history. Learn how + marijuana was made illegal. +DRUGPOOR.ARJ 8K 6-10-90 Text file about "drug war" and it's real enemies, + the poor, not the drug runners. +ECSTASY.ARJ 25K 4-20-90 Text file on Ecstasy (MDMA/MDA...). +GAZANIGA.ARJ 16K 3-22-90 Interview with a professor about drugs. +HEMP-MED.ARJ 3K 9-21-90 Medical uses of hemp/Marijuana. +HEMPINFO.ARJ 17K 12-24-90 More info on hemp. +HEMP_AMI.ARJ 13K 10-19-90 Amicus curiae brief on legal cannibis. +HFV.ARJ 6K 9-27-90 Hemp For Victory - Transcript of 1942 USDA film on + the benefits of hemp. +MARIJUAN.ARJ 6K 12-24-90 10 things every Parent, Teacher and Teenager + should know about marijuana. +NORML.ARJ 7K 1-01-80 Info on tax-deductible organization lobbying for + marijuana decriminalization. +PERUWAR.ARJ 3K 8-11-90 War against Peru that they call the Drug War. +POTLAWS.ARJ 4K 12-28-90 Marijuana laws - state by state. +POTMYTHS.ARJ 7K 5-03-91 Some common myths about marijuana. +PROBCHIL.ARJ 129K 2-10-92 The inventor of LSD speaks about his child. +TESTDRUG.ARJ 4K 5-03-91 Know the drug war? Take this test! +URINETXT.ARJ 5K 12-18-90 How to deal with Urine Tests on short notice. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ ÛßßßßßÛ º Text: Brookings Institute Files + Û Û ÜÛ º Available: 44 files (0.3 MB) + ÛÛßßßßß Û ÛÛ º Privilege: Disgrace + ÛÛÜÜÜÜÛ ÛÜÜÜÜÛÛ º Newest: TECHNLGY.ARJ 7-15-91 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +$REFORM.TXT 7K 8-01-90 Brookings: DOLLAR POLITICS: The beat goed on-and + on- as congress again tackles campaign spending + reform. +AFRICA.TXT 6K 9-01-90 Brookings: The cry for human rights: in Africa and + throughout the world. +AGENCIES.TXT 7K 8-15-90 Brookings: What's good for policy isn't + necessarily good for administration. +AUTOS.TXT 6K 6-20-91 Brookings: Loss of Faith: Examining American's + lost loyalty to U.S. Cars. +BASEBALL.TXT 6K 3-31-92 Brookings: The nation's pastime: It's really a + business after all. +BPEA89-2.TXT 6K 2-05-90 Brookings: Will today's low unemployment trigger + renewed inflation tomorrow? +BPEA90-2.TXT 8K 2-08-91 Brookings: SuperInflation, Joblessness, Stock + Market Explored in latest Brookings papers on + economic activities. +CANADA.TXT 8K 4-07-92 Brookings: Will Canada Collapse: a new look at the + possibilities. +CHINA.TXT 9K 2-27-92 Brookings: China-U.S. Relations: Reassmentents + needed in a post-cold war world. +COLLEGE.TXT 8K 8-22-91 Brookings: Keeping college affordable: Who should + pay? +COMMAND.TXT 9K 6-05-91 Brookings: Overhaul of alliance command system + vital to reform of NATO in COLD WAR'S aftermath. +DEFENSE.TXT 10K 9-25-91 Brookings: Defense decisions: Fashioning a + military budget to fir the new world order. +EGYPT.TXT 6K 7-29-91 Brookings: Crony Capitalists: Why development + efforts in Egypt fail. +EUROPE92.TXT 8K 6-26-90 Brookings: Europe's challenge to America: Renewed + vigilance for U.S. export interests. +FREIGHT.TXT 6K 6-05-90 Brookings: Truck and freight train deregulation: A + better deal for shippers and consumers. +GATT.TXT 4K 2-28-92 Brookings: Bringing Eastern Europe and the former + Soviet Republics into the global trading arena. +HEALTH1.TXT 8K 6-24-91 Brookings: Health Care from conception to old age + with manageable costs. +HEALTH2.TXT 8K 12-18-91 Brookings: When babies die: Helping mothers and + children get Health Care. +HEALTH3.TXT 7K 4-13-92 Brookings: A solution to the U.S. Health Care + Crisis? +JAPAN.TXT 7K 3-20-90 Brookings: To market, to market: The problem of + gaining access to Japan's economy. +JOBS.TXT 7K 3-15-90 Brookings: America's Blue-Collar Blues: Where have + all the good jobs gone? +LIABLTY.TXT 8K 6-13-91 Brookings: The Liability Crisis: Does it promote + safety-while stifling industrial creativity? +MEDIA.TXT 8K 9-03-91 Brookings: Live from Capitol Hill! Has the PRESS + Really taken over CONGRESS? +MERGERS.TXT 6K 7-20-91 Brookings: Why the wave of corporate takeovers, + and what are the economic consequences? +MISSILES.TXT 7K 3-11-91 Brookings: Third-World Threat-Missiles in + developing nations add new risks to global + security. +OVERSGHT.TXT 5K 1-16-90 Brookings: Congressional oversight: The vital role + of catitol hill in a checks-and balances + government. +PERU.TXT 5K 1-23-91 Brookings: PERU: A study in hyper inflation, + economic chaos and social upheaval-is there any + way out? +POLICY.TXT 7K 5-15-90 Brookings: Priorities for the 1990s: "Determining + whether AMERICA chooses excelence or mediocrity." +PRDCTVTY.TXT 5K 1-17-90 Brookings: Want to boost productivity? - Try + giving workers a bigger say! +RELIGION.TXT 8K 6-04-92 Brookings: Articles of faith, Articles of peace: + Living with our deepest differences. +RUSSIA.TXT 8K 6-04-92 Brookings: Continuing reform, help from West vital + to economics of former Soviet Republics. +SCHOOLS.TXT 8K 6-04-92 Brookings: Rx for Public Schools: Supplant + America's "ONE BEST SYSTEM: with free-market + competition for study. +SCIENCE1.TXT 7K 6-04-92 Brookings: America's postwar science policy-from + concensus to confusion to cooperation. +SCIENCE2.TXT 5K 6-04-92 Brookings: Good counsel or bad? The use and misuse + of scientific advice in government policymaking. +SOVIET.TXT 4K 6-04-92 Brookings: Chronicling the conception and birth of + the Soviet Reform Movement. +SOVIET2.TXT 8K 6-04-92 Brookings: Prelude to Perestroika: Brookings + author traces recent history of changes in Soviet + defense. +TECHNLGY.ARJ 6K 7-15-91+ Brookings: Government assisted technology: Must it + always be destined for failure? +TELECOMM.TXT 7K 2-04-91 Brookings: Seven years after the breakup: + Assessing the impact of competition and the AT&T + breakup in the telco. +TRADE.TXT 5K 2-12-92 Brookings: How "FAIR" are America's "UNFAIR TRADE" + Laws? +TRADE2.TXT 5K 10-24-90 Brookings: As world trade rules change, U.S. must + decide best course for the 1990s. +TUITION.TXT 7K 2-28-90 Brookings: TUITION DILEMMA: Policy makers need to + study students changeing financial needs. +UNDRCLSS.TXT 9K 4-16-91 Brookings: The Urban Underclass: Challenging the + myths about AmeriCA'S URBAN POOR. +WARMING.TXT 5K 10-30-90 Brookings: Curbing Greenhouse warming through + burden-sharing on carbon emissions. +WELFARE.TXT 7K 10-30-90 Brookings: State-set Welfare: Disparate benefits + create more havoc than help. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ Û º Text: Technical Computer Files + Û ÜÛ º Available: 33 files (1.6 MB) + ÛÛßßßßß ÛÛ º Privilege: Disgrace + ÛÛÜÜÜÜÛ ÛÛ º Newest: ZEN10.ARJ 9-08-92 (avail: 10-11-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +AVATAR0.ARJ 6K 8-23-88 Specs for basic Avatar. +AVT0PLUS.ARJ 5K 11-25-89 Extension of basic Avatar. +AVT1CON.ARJ 36K 2-14-91 AVT/1 Console specs & AVATAR.SYS. +AVT1_MEM.ARJ 13K 1-20-91 AVT/1 programs to display memory contents. +AVTCTL.ARJ 7K 1-27-91 Controls AVATAR.SYS, explains options. +AVTDEMO.ARJ 6K 7-27-90 Demonstrates some of AVT/1 abilities. +BBSLANG.ARJ 3K 5-21-90 Learn the 'sign' language of BBS's! :-) +BBS_ABBR.TXT 7K 6-22-92 Learn dozens of abbreviations used on BBS systems. +BITSBAUD.ARJ 5K 7-15-90 Explanation of the difference between bits (bps) + and baud. +CCITTV42.ARJ 12K 7-15-90 Explanation of V42 error correction for modems. +DOSREF20.ARJ 186K 6-17-91 DOS technical reference manual, includes info on + DOS 5, tons of info! +FRED_CFG.ARJ 6K 9-19-92 Configuration text for FredMail and Maximus. +INTADR.ARJ 8K 4-07-92 Internet Addressing info. +INTER28A.ARJ 223K 11-17-91 Ralf Brown's interrupt list. A complete listing of + both software and hardware interrupts. Part 1 of + 3. +INTER28B.ARJ 180K 11-17-91 Software/Hardware Interrupt list, part 2 of 3. +INTER28C.ARJ 124K 1-13-92 Software/Hardware Interrupt list, part 3 of 3. +INTERNET.ARJ 44K 10-27-91 Internet information. +LINUXFAQ.ARJ 60K 10-11-92 Frequently Asked Questions (FAQ) about Linux, the + un*x-clone operating system. +LXV95AIN.ARJ 4K 4-18-92 Info file: What is Linux? +NEWSYSOP.ARJ 20K 2-22-88 An interesting guide for the new Sysop or User + interested in the FidoNet. Much info! +OS2_ART.TXT 9K 3-05-92 An article about the future of computer Operating + Systems. +PRGREF12.ARJ 147K 1-01-80 Complete DOS programmer's reference manual. How to + write DOS device drivers, manage control blocks, + use and load .EXE files, etc. +RFC1206.ARJ 24K 3-14-91 FAQ about the Internet. +RFC1207.ARJ 13K 3-19-91 Internet Questions and answers. +RFC1208.ARJ 15K 3-19-91 Networking terms. +SHARE.ARJ 4K 4-15-91 Text on DOS SHARE violations. +THEREF42.ARJ 129K 10-02-91 'The Reference' -- a full and complete reference + on CD-ROM, Floppy, Hard Disk and controller + hardware. Very informative! +TIFF50.ARJ 50K 1-05-92 Latest TIFF specifications. +UFGHOW.ARJ 19K 10-27-91 How to use FidoNet's "ufgates" to access the + internet. +UNIX-TUT.ARJ 211K 3-04-89 Beginners guide/tools/tutor to the UNIX operating + system, nicely done, informative. +UPLDMSG.ARJ 7K 2-18-91 How to create and upload a message. +USEANSI.ARJ 7K 1-17-86 Learn about/how to use ANSI commands. +ZEN10.ARJ 68K 9-08-92 Zen and the Art of the Internet. Internet + info/beginner's guide. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ ÛßßßßßÛ º Text: Miscellaneous Text Files + Û Û º Available: 65 files (1.2 MB) + ÛÛßßßßß ÛÛßßßßß º Privilege: Disgrace + ÛÛÜÜÜÜÛ ÛÛÜÜÜÜÛ º Newest: ILO_CONV.ARJ 7-11-92 (avail: 11-10-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +25CHILI.ARJ 14K 2-15-92 25 Good chili recipes. +AD_SOL.TXT 1K 1-11-92 An advertisement for Socialism OnLine! (Pass me + around.) +ARMY1.ARJ 5K 9-29-89 Excerpt of Army chaplain's handbook on dealing + w/Pagans. +BBS_LST.TXT 6K 7-31-92 A fairly recent, and fairly complete, Colorado + Springs BBS list. +BELLSYS.ARJ 8K 5-25-87 Information about Ma Bell's tainted past. +BOYCOTT.ARJ 2K 12-25-91 3 Corporations you should boycott and why. +BRAINWSH.ARJ 20K 3-25-90 The battle for your mind, brainwashing. +BUSHNOSE.ARJ 2K 10-06-90 One person's cartoon of the Gulf crisis. +CHFSEATL.ARJ 4K 6-01-92 Chief Seattle's eloquent reply to Pres. Franklin + Pierce (1854): a classic! +COLMBDAY.ARJ 5K 1-14-92 American Indian Movement's views about Columbus + Day. +COMPETE.ARJ 6K 12-04-90 An article on the effects of competition on people + and our society. +COMPLANT.ARJ 3K 2-06-92 A listing of "companion" plants (species that do + well together) with other interesting info. +COMPUDEF.TXT 6K 7-16-92 What certain computer terms REALLY mean. +CREATION.ARJ 5K 1-11-90 Two articles about the science of creation. +CWIS-CAT.ARJ 14K 7-01-92 Center for World Indigenous Studies catalog. +EARTH2U.ARJ 4K 12-25-91 The Earth as seen by aliens. +EFF-INFO.ARJ 11K 10-17-92 Electronic Frontier Foundation "charter." +EQ-COMIC.ARJ 2K 9-07-90 A pointed comic about women's equality. +FEDBBS.ARJ 4K 1-20-90 A listing of gov't BBS's. +FLATHEAD.ARJ 9K 2-05-92 Racism on the Flathead Reservation. +GIFTS_I.TXT 6K 6-30-92 A listing of various "gifts" given between White + Europeans and the Indians. +GLOBVILL.ARJ 2K 12-25-91 What if the world were a global village of 1,000 + people? What'd it look like? Statistics. +GROUPS.ARJ 7K 12-25-91 List of various citizens and grassroots groups + that are involved with misc diplomatic/friendship + relations and progressive causes. +HABOO.ARJ 14K 1-31-92 Native American Stories From Puget Sound. +HELPLINE.ARJ 12K 5-25-92+ A listing of various 'help' phone numbers. This + covers a HUGE variety of contact points for people + in trouble and for activists. +HOLIDAY.ARJ 3K 12-28-89 Holidy greetings in dozens of languages. +HYPRBOLE.TXT 1K 5-11-92 A poem entitled, HYPERBOLE: Or I must be Mad +ILL_COMP.ARJ 6K 6-03-92+ Article: Society Suffers From Ill-Effects of + Competition. +ILO_CONV.ARJ 9K 7-11-92+ Report of a convention on indigenous and tribal + peoples by the International Labour Organization. +KAREN.ARJ 2K 1-15-90 A poem/song about Karen Silkwood. +MAGNA.ARJ 12K 4-27-91 The text of the Magna Carta. +MAILLIST.ARJ 47K 7-26-92 An address list for radical organizers. Tons of + addresses of various progressive and leftist + groups *worldwide*! +MED0992.ARJ 15K 9-07-92 Black Bag's Medical BBS list +MONEY_P.TXT 2K 6-03-92 Poetry: Money. +NAT_COLU.ARJ 6K 1-14-92 History of Native Americans and Columbus. +NA_MYTHS.ARJ 7K 10-23-91 Native American stories frm N&S America. +NCONTEST.TXT 4K 6-22-92 Book review - No Contest: The Case Against + Competition. Fascinating reading! +PAC-INTR.ARJ 8K 3-02-86 Mini-Intro to Packet BBSing +PACKETUT.ARJ 10K 3-01-87 PACKET radio tutor. +PARA_PH.ARJ 7K 3-11-91 A Tale of Paranoia and Phone Tappers. +PCMAGADD.TXT 1K 7-31-92 Internet E-Mail addresses for PC Magazine. Write + them your opinions! +PCOMINFO.ARJ 8K 4-07-88 Info on Packet products from PAC-COMM Inc. +PEACENET.TXT 17K 3-23-92 A brochure explaining what the PeaceNet is and how + to subscribe. +PROG_BBS.LST 14K 8-02-92 A text-file listing of 'progressive'-oriented + BBS's. +PROG_BBS.Z15 6K 8-02-92 A Zip archive listing of 'progressive'-oriented + BBS's. Check me out! +QUOTES.ARJ 16K 8-29-92 This is the file where this BBS grabs its random + quotes from. Quotes for all occasions! +REAL.ARJ 3K 8-20-89 What real programmers do. +RU486INF.TXT 6K 5-11-92 Questions and Answers about RU-486. +SHAPPENS.ARJ 2K 6-12-90 Humor: How shit happens. +SMILES.ARJ 3K 7-06-87 Learn the smile :-) language of BBSing. +SYSLAW.ARJ 4K 12-25-91 Book review about BBS laws. What every sysop + should know. +THEWORD.ARJ 35K 2-16-92 This is a philosophy of sarcasm. Looking for + editors or printing markets. +THISLAND.TXT 2K 3-02-92 Complete lyrics to Woody Guthrie's song, including + 3 stanzas usually censored out. +TOP100.ARJ 3K 12-25-91 Top 100 scanner frequencies nationwide. +TRANSFER.SUB 8K 11-09-91 Application form for the New York Transfer News + Service. Tons of alternative news available + online! +UFOBOOKS.ARJ 28K 12-10-91 America West Catalog of Geo-Political, Global + Politics and Exciting UFO Information! +UNIONBBS.ARJ 5K 8-26-92 A BBS listing of labor union-oriented BBS's! +UNIX.TXT 2K 7-05-92 A humorous unix text file. try these at work! +USAFCHAP.ARJ 17K 8-07-89 Chapter on UFO's from a USAF training manual. +USE_HERO.ARJ 4K 2-13-92 An article in the Shadow Government series + entitled "Uses for Heroes." +VALGOL.ARJ 2K 9-22-89 Humorous specs for a new computer language. +WORK_ASS.TXT 5K 2-22-92 Read about a Long Distance phone company that + gives money to peace, human rights, and social + justice groups! Join it today! +WORLD92B.ARJ 773K 8-07-92 Facts on world countries (1400 pages of info!) + Supplied by CIA? +XMASSTAR.ARJ 5K 12-25-88 Article about the Xmas star at Christ's birth. +XTIC_PUB.ARJ 8K 1-18-92 A resource listing (books, videos, classroom + resources) from the Christic Institute. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ ÛßßßÛ º Text: Available Files Listings + Û Û ÜÛÜÜÜÛÜ º Available: 11 files (0.5 MB) + ßßßßßÛÛ Û ÛÛ º Privilege: Disgrace + ÛÛ ÛÜÜÜÜÛÛ º Newest: SOL_DOS.ZIP 11-25-92 (avail: 11-25-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +SOLFILES.NEW 14K 11-25-92* New files online within the last 30 days. Updated + daily. +SOLFILES.ZIP 89K 11-24-92* Archived listing of all available files on this + system. Updated daily. +SOL_DOS.LST 44K 11-25-92* A listing of all available MS-DOS files on this + system. Updated daily. Aka DOSFILES. +SOL_DOS.NEW 10K 11-25-92* New MS-DOS files online within the last 30 days. + Updated daily. Aka DOSFILES. +SOL_DOS.ZIP 19K 11-25-92* Archived listing of all available MS-DOS files on + this system. Updated daily. Aka DOSFILES. +SOL_OS2.LST 99K 11-25-92* A listing of all available OS/2 files on this + system. Updated daily. Aka OS2FILES. +SOL_OS2.NEW 22K 11-25-92* New OS/2 files online within the last 30 days. + Updated daily. Aka OS2FILES. +SOL_OS2.ZIP 43K 11-25-92* Archived listing of all available OS/2 files on + this system. Updated daily. Aka OS2FILES. +SOL_TEXT.LST 104K 11-24-92* A listing of all available Text files on this + system. Updated daily. Aka TXTFILES / TEXTFILES. +SOL_TEXT.NEW 19K 11-24-92* New Text files online within the last 30 days. + Updated daily. Aka TXTFILES / TEXTFILES. +SOL_TEXT.ZIP 39K 11-24-92* Archived listing of all available Text files on + this system. Updated daily. Aka TXTFILES / + TEXTFILES. + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + ÛßßßßßÛ ÛßßßßßÛ º All: Temporary Files + Û Û Û Û º Available: 7 files (0.1 MB) + ßßßßßÛÛ ßßßßßÛÛ º Privilege: Disgrace + ÛÛ ÛÛ º Newest: 128-116.Z27 11-22-92 (avail: 11-22-92) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Filename Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +- If you see any files in this area that you'd like, download them +- quickly because they're subject to deletion at any time! + +128-116.Z27 36K 11-22-92* 128-116 Xenobi Files List +128-86.Z24 36K 11-19-92* Files listing for Jackpot!!. +128_69.A11 9K 11-06-92+ Files listing for Time Safari at 719-473-7841 +EGGDIFF.A25 3K 11-20-92* Eggnet nodediff for day 325 +EGGLIST.A25 22K 11-20-92* This weeks EGGLIST! +OS2LIST.Z25 7K 11-20-92* OS2LIST for day 325 +XENOBIA.Z09 33K 11-04-92+ Xenobia 128/116 file list + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + Üßßßß Û Û ÛÜ ÜÛ ÛÜ ÜÛ ÜßßßÜ ÛßßßÜ Û Û + ßßßÜ Û Û ÛßÛßÛ ÛßÛßÛ ÛÜÜÜÛ ÛÜÜÜß ßÛÜÛß + ÜÜÜÜß ßÜÜÜß Û Û Û Û Û Û Û ßÜÜ Û +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +Area Description Files Bytes +ÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ +1 Text: Marxist Text Files 26 460K +2 Text: Economics Files 38 544K +3 Text: Environmental Files 16 146K +4 Text: Human Rights Files 11 109K +5 Text: Anti-Militarism Files 40 656K +6 Text: CIA/FBI Files 22 378K +7 Text: Civil Liberties Files 22 206K +8 Text: Conspiracy Theories 28 869K +9 Text: Latin American Files 18 279K +10 Text: Third World Files 12 222K +11 Text: Media-Awareness Files 46 235K +12 Text: Current Events/News 41 266K +13 Text: Political Text Files 43 352K +14 Text: CUD Newsletters 154 2488K +15 Text: Misc. Newsletters 21 1277K +16 Text: ANEWS Echo Archives 31 6716K +17 Text: Activist's Letters 9 48K +18 Text: Fascist/Right-Wing Files 8 299K +19 Text: Drug War-related Files 16 255K +20 Text: Brookings Institute Files 44 277K +21 Text: Technical Computer Files 33 1641K +22 Text: Miscellaneous Text Files 65 1251K +98 Text: Available Files Listings 11 497K +99 All: Temporary Files 7 143K +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ + Total: 762 19613K + + + ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + List created with DOWNSORT 5.5j by Rob Hamerling + on Wed Nov 25 18:52 under OS/2 2.0 + ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + + Suggestions for improving our file areas, as with file contributions, + are always welcome. + + + + Text Files listing for Socialism OnLine! + + Ûßß Ü Ü Ü ßßÛ Üßßßß ÜßßßÜ Û Ûßß Ü Ü Ü ßßÛ + Û ÜÛßÛÜ Û ßßßÜ Û Û Û Û ÜÛßÛÜ Û + ÛÜÜ ÜßÛßÜ ÜÜÛ ÜÜÜÜß ßÜÜÜß ÛÜÜÜÜ ÛÜÜ ÜßÛßÜ ÜÜÛ + + +FidoNet 1:128/105.0 ++1(719) 392-7781 +300-14400 bps HST/MNP/V42bis, 24 hrs. + + + [*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*] + [*] [*] + [*] Files listing for Socialism OnLine! [*] + [*] [*] + [*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*][*] + + +This is a listing of available files found on Socialism OnLine!, node number +1:128/105 in the FidoNet Matrix. All files listed may be downloaded by first- +time callers or they may be file-requested during any time except ZMH. + +This files listing reflects the interests of SOL's Sysop and users. We try to +specialize in various text files, including many on left politics, socialism +and communism, and a few various other files. We do not pretend -- or even +try -- to carry every file in existence. + +The following 'magic' filenames are supported on Socialism OnLine! + +Magic Name - What you'll get +------------------------------------------------------------------------------ +FILES - List of all available file-requestable files from this system. +OS2FILES - A listing of all available OS/2-related files from this system. +TEXTFILES - A listing all available text file areas from this system. +DOSFILES - A listing of all available MS-DOS-related file areas. +ABOUT - Short text file about this system. +NODELIST - The current FidoNet nodelist in .ZIP archive format. +PROGLIST - The latest 'Progressive BBS Listing' in .ZIP archive format. + + + +(Wed Nov 25 18:52) Last 5 weeks newest of a total of 762 files (19 MB) + Maximum privilege shown: Privil + Date flag: new on this system since: * = 1 week, + = 1 month + +Filename Area Size Date Description +ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +SOL_DOS.ZIP 98 19K 11-25-92* Archived listing of all available MS-DOS + files on this system. Updated daily. Aka + DOSFILES. +SOL_DOS.LST 98 44K 11-25-92* A listing of all available MS-DOS files on + this system. Updated daily. Aka DOSFILES. +SOL_DOS.NEW 98 10K 11-25-92* New MS-DOS files online within the last 30 + days. Updated daily. Aka DOSFILES. +SOL_OS2.ZIP 98 43K 11-25-92* Archived listing of all available OS/2 files + on this system. Updated daily. Aka OS2FILES. +SOL_OS2.LST 98 99K 11-25-92* A listing of all available OS/2 files on this + system. Updated daily. Aka OS2FILES. +SOL_OS2.NEW 98 22K 11-25-92* New OS/2 files online within the last 30 + days. Updated daily. Aka OS2FILES. +SOLFILES.NEW 98 14K 11-25-92* New files online within the last 30 days. + Updated daily. +SOLFILES.ZIP 98 89K 11-24-92* Archived listing of all available files on + this system. Updated daily. +SOL_TEXT.ZIP 98 39K 11-24-92* Archived listing of all available Text files + on this system. Updated daily. Aka TXTFILES + / TEXTFILES. +SOL_TEXT.LST 98 104K 11-24-92* A listing of all available Text files on this + system. Updated daily. Aka TXTFILES / + TEXTFILES. +SOL_TEXT.NEW 98 19K 11-24-92* New Text files online within the last 30 + days. Updated daily. Aka TXTFILES / + TEXTFILES. +FNEWS947.LZH 15 14K 11-22-92* FidoNews newsletter. Read me! +92NOV326.ARJ 16 187K 11-22-92* Echo: News of the US & World - The Week + ending Saturday, 21-Nov-1992 +128-116.Z27 99 36K 11-22-92* 128-116 Xenobi Files List +EGGLIST.A25 99 22K 11-20-92* This weeks EGGLIST! +EGGDIFF.A25 99 3K 11-20-92* Eggnet nodediff for day 325 +OS2LIST.Z25 99 7K 11-20-92* OS2LIST for day 325 +128-86.Z24 99 36K 11-19-92* Files listing for Jackpot!!. +FNEWS946.ARJ 15 26K 11-16-92+ FidoNews newsletter. Read me! +92NOV319.ARJ 16 104K 11-15-92+ Echo: News of the US & World - The Week + ending Saturday, 14-Nov-1992 +CUD455.ARJ 14 20K 11-05-92+ Computer Underground Digest +CUD454.ARJ 14 15K 11-03-92+ Computer Underground Digest +USSR_CIS.ARJ 12 11K 1-21-92+ Article: The Nature of the New Commonwealth. + Interesting article on political developments + in the ex-USSR. +US_IRAQ2.ARJ 12 8K 9-08-92+ Article - Bush Election Ploy: Bombing for + Votes. U.S. Targets Iraq, Again. +US_YUGO.ARJ 12 15K 9-05-92+ A series of articles giving a great deal of + background information on what is happening + in Yugoslavia. +SDIFRAUD.ARJ 12 3K 4-08-92+ Is SDI A Fraud? +USSRUPD1.ARJ 12 4K 2-15-92+ How The USA Brought Down The USSR! +REALITY.ARJ 12 8K 1-19-92+ Info on food - world hunger and inefficiency. +RUS_YEL.ARJ 12 10K 8-30-92+ Article - One Year After Yeltsin Countercoup: + Soviet Workers Bleed. +SDI.ARJ 12 4K 6-20-88+ The Pentagon's Spiritual Defense Initative. +RADIOLIB.ARJ 12 4K 12-25-91+ The U.S. propaganda war against the USSR + still lives with Radio 'Liberty' broadcasting + inflammatory, separatist propaganda. Read + this! +RAM_GULF.ARJ 12 6K 9-26-90+ Speech on Gulf crisis by a former U.S. + Attorney General. +PENTAWLD.ARJ 12 14K 4-08-92+ Pentagon's Plans For World Conquest. Bush's + plans for a 'New World Order.' Read this one! +PETE_SAY.ARJ 12 11K 1-25-92+ Article: What Pete's Not Saying, The Real + State of the Golden State. +NHEALTHC.ARJ 12 14K 12-25-91+ How to win quality health care. Very + informative text about our current health + care system and the possibilities for a new + one. +MILIT_LA.ARJ 12 6K 9-14-92+ Article - The Belly of the Beast: Linking + Militarization and Urban Plight in Los + Angeles. +MYTH_JUL.ARJ 12 6K 7-08-92+ Witness for Peace 'Myth of the Month.' July + 92: 'Linkages.' +MYTH_JUN.ARJ 12 7K 7-07-92+ Witness for Peace 'Myth of the Month.' June + 92: 'Free Trade.' +NATLCARE.ARJ 12 3K 11-16-89+ Article: Why not national health care? +NAZI_POG.ARJ 12 9K 9-08-92+ Article - Smash Nazi Pogroms in Germany! +NEEDY.ARJ 12 5K 6-05-90+ Article: The Truly Needy. +IRAQBOMB.ARJ 12 5K 2-07-92+ An interview with a victim of the US bombing + of Iraq. +GREED_VI.ARJ 12 4K 1-25-92+ Article: Burning Down the Dachas, Greed Fuels + Social Violence in Moscow. +HEALTHIN.ARJ 12 4K 11-16-89+ Article: The private health insurance scam. + Very good reading. +DOD1970.ARJ 12 4K 2-22-91+ Senate Committee Minutes re: Synthetic + Biological Agents. +EURO_CH.ARJ 12 16K 10-06-92+ Article - Fourth Reich Bankers Detonate + Euro-Chaos. Read about what's happening with + Europe's unification. +BUSH_JAP.ARJ 12 4K 1-24-92+ Commentary/analysis about Bush's recent trip + to Japan. +DANE_LAB.ARJ 12 6K 6-06-79+ Find out how Danish labor unions plan to use + computers to aid them. +BLACKBUD.ARJ 12 6K 5-15-92+ The Pentagon's Black Budget - Blacker Than We + Think. +BODYCOUN.ARJ 12 6K 12-25-91+ The hidden body count of the Panama invasion. + Read what U.S. GIs have to say about the REAL + body count. Shocking story of gov't coverup! +AUS_VIEW.ARJ 12 4K 1-22-92+ An Australian view of the US medical/health + care "system." +BBSTING.ARJ 12 4K 6-23-90+ Police set up a BBS to 'sting' users. +AIDSSTAT.ARJ 12 15K 10-14-92+ AIDS statistics (tons of 'em) from the + Centers for Disease Control. +YPOV_FAM.ARJ 2 7K 4-17-92+ Article: America's Young Families with + Children Devastated by Two Decades of + Shrinking Incomes, Soaring Poverty. A sad + report w/stats. +EXP_MYTH.ARJ 2 8K 5-11-92+ Witness for Peace, 1492-1992 Expose the + Myths: Calling for a Just World Order Myth of + the Month--Debt Crisis and Structural + Adjustment +WRLDBANK.ARJ 2 13K 6-30-92+ Article - The World Bank's New Indigenous + Policy: A Change in International Economic + Development Strategies. +LBO_45.ARJ 2 19K 1-18-92+ A sample issue of the Left Business Observer + (LBO). An easy to read and superb newsletter + on economic issues. +LBO_48.ARJ 2 20K 3-28-92+ A sample issue of the Left Business Observer. + A *superb* newsletter of economics and + business issues, easy to read and + informative! +LBO_49.ARJ 2 21K 3-28-92+ A sample issue of the Left Business Observer. + A *superb* newsletter of economics and + business issues, easy to read and + informative! +LBO_23.ARJ 2 21K 11-16-88+ A sample issue of the Left Business Observer. +TECHNLGY.ARJ 20 6K 7-15-91+ Brookings: Government assisted technology: + Must it always be destined for failure? +ILO_CONV.ARJ 22 9K 7-11-92+ Report of a convention on indigenous and + tribal peoples by the International Labour + Organization. +ILL_COMP.ARJ 22 6K 6-03-92+ Article: Society Suffers From Ill-Effects of + Competition. +HELPLINE.ARJ 22 12K 5-25-92+ A listing of various 'help' phone numbers. + This covers a HUGE variety of contact points + for people in trouble and for activists. +UN_HUM_R.ARJ 4 6K 9-11-92+ The text of the U.N. Universal Declaration of + Human Rights. Why does the U.S. gov't refuse + to sign this document?! +COL_HIST.ARJ 4 7K 10-07-92+ Excerpt from the book, _A People's History of + the United States_, from a chapter entitled, + "Columbus, the Indians, and Human Progress." +RON_DANL.ARJ 13 19K 10-17-92+ A ton of excerpts/quotes from presidential + candidate Ron Daniels' speeches, along with + some info on the Campaign for a New Tomorrow. +SMEARS.ARJ 13 7K 12-25-91+ Political smears as disinformation. +RHETREAL.ARJ 13 5K 11-01-92+ Article - Rhetoric versus Reality: George + Bush Just Doesn't Get It. +PROG_AGN.ARJ 13 7K 6-18-92+ Article - Building a Progressive Agenda in + 1992. +QUAYLE.ARJ 13 5K 12-22-91+ Some quotes from our illustrious Vice Pres. +REDBAIT.ARJ 13 29K 10-27-87+ Right-wing reality: red-baiting. Good +POLBBS.ARJ 13 3K 3-17-90+ Listing of some politically-oriented BBS's. +PCTMANUA.ARJ 13 9K 5-16-92+ Precinct Manual - as issued to precinct + chairs in Travis County, Texas, by that + county's Democratic Party - a how-to manual. +PEROT_B.ARJ 13 7K 7-05-92+ Article by the Sysop - Henry Ross Perot: + Entrepreneur or Welfare Billionaire? +PEROT_PM.ARJ 13 11K 10-27-92+ Article - Perot's Post-Modern Pastoralism. + Interesting reading about our current + presidential race. +MULT_DEM.ARJ 13 5K 7-31-92+ Article - Multicultural Democracy: Toward a + New Strategy for Progressive Activism. +NEA_CZAR.ARJ 13 6K 6-22-92+ Article - The Decency Czarina: Anne-Imelda + Radice, the Right's watchdog inside the NEA. +OPP_CLIN.ARJ 13 12K 10-17-92+ Article - Beyond the Ballot Box: WHY THE LEFT + SHOULD OPPOSE CLINTON. +INT_ROND.ARJ 13 6K 6-03-92+ An interview with Ron Daniels about his + thoughts on American politics. +IROQUOIS.ARJ 13 29K 9-02-91+ The Haudenosaunee Confederacy's Constitution. +KNOWCPUS.ARJ 13 8K 12-25-91+ What everyone should know about the Communist + Party, USA. Learn what the CPUSA *REALLY* + stands for, not the misinfo the media spouts + off. +INDGOVT.ARJ 13 12K 2-04-92+ Native American Self-Governance Issues. +IND_SELF.ARJ 13 14K 1-31-92+ Article: American Indian Self-Governance, + Fact, Fantasy and Prospects for the Future. +FREESCOT.ARJ 13 9K 4-10-92+ Article: The Scottish Question. An + examination of Scotland's independence. +GREEN.ARJ 13 13K 5-12-89+ A series of message about the U.S. Green + Party movement. +INDCITZN.ARJ 13 11K 2-03-92+ Native American Citizenship Issues. +D_QUAYLE.ARJ 13 23K 11-01-92+ All you ever wanted to know about Dan Quayle! +DEATHSQ.ARJ 13 3K 12-23-89+ Satire: Save the death squads! +DEMOCRAC.ARJ 13 4K 11-04-89+ Essay: Communists and Democracy. +CONGRFAX.ARJ 13 12K 1-19-92+ Fax numbers to our Senators and so-called + 'Representatives.' +COORS.ARJ 13 5K 12-25-91+ What is the Coors family up to lately? What + is your beer money paying for? Find out! +BUSHBOYS.ARJ 13 5K 6-23-90+ Article: Bush's Boys Club, Skull and Bones. +CAN_ELEC.ARJ 13 4K 10-11-92+ An article from the Canadian Communist Party + entitled, The Coming Federal Election and the + Drive to the Right. +CLINT92.ARJ 13 17K 9-24-92+ Details on Clinton's economic plan. +BUGS.ARJ 13 9K 6-23-90+ Bugs, tails, mail covers: How to cope with + them. +ANARCHY.ARJ 13 4K 5-18-91+ Article from the WRL organizers manual on + anarchy. +AYF.ARJ 13 3K 5-18-91+ Flyer: What is the Anarchist Youth + Federation. +21ST_NEW.ARJ 13 6K 10-11-92+ An article written by the Sysop which gives + an impression/overview of the "21st Century + Party" and "The New Party." +ANARCHO.ARJ 13 10K 5-03-91+ Biographies and the ideas of the major + anarchist philosophers. +12_MYTHS.ARJ 13 9K 12-11-89+ 12 common myths about Democratic Socialism. + Informative. +PHRACK38.ARJ 15 132K 10-15-92+ Phrack V38, the hackers journal. +FNEWS944.ARJ 15 22K 11-02-92+ FidoNews newsletter. Read me! +FNEWS943.ARJ 15 20K 10-26-92+ FidoNews newsletter. Read me! +FNEWS942.ARJ 15 15K 10-19-92+ FidoNews newsletter. Read me! +FNEWS941.ARJ 15 18K 10-12-92+ FidoNews newsletter. Read me! +WHY_SOC.TXT 1 17K 11-08-92+ An article by a famous socialist, Albert + Einstein, entitled, "Why Socialism?" +92NOV312.ARJ 16 241K 11-08-92+ Echo: News of the US & World - The Week + ending Saturday, 07-Nov-1992 +128_69.A11 99 9K 11-06-92+ Files listing for Time Safari at 719-473-7841 +XENOBIA.Z09 99 33K 11-04-92+ Xenobia 128/116 file list +CUD453.ARJ 14 21K 10-27-92+ Computer Underground Digest +CUD451.ARJ 14 21K 11-01-92+ Computer Underground Digest V451 +92OCT305.ARJ 16 538K 11-01-92+ Echo: News of the US & World - The Week + ending Saturday, 31-Oct-1992 +CUD452.ARJ 14 19K 10-20-92+ Computer Underground Digest +CUD450.ARJ 14 18K 10-14-92+ Computer Underground Digest +92OCT298.ARJ 16 323K 10-25-92 Echo: News of the US & World - The Week + ending Saturday, 24-Oct-1992 +EFF-INFO.ARJ 22 11K 10-17-92 Electronic Frontier Foundation "charter." +SOM_FAMN.ARJ 10 10K 10-18-92 Article - Somalia Famine: Imperialism Starves + Africa. +DI_INIT3.ARJ 1 47K 10-22-92 CofC newsletter, Dialogues and Initiative, + #3. +DI_INIT1.ARJ 1 50K 10-22-92 CofC newsletter, Dialogues and Initiative, + #1. +DI_INIT2.ARJ 1 71K 10-22-92 CofC newsletter, Dialogues and Initiative, + #2. + + + ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + List created with DOWNSORT 5.5j by Rob Hamerling + on Wed Nov 25 18:52 under OS/2 2.0 + ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + + Suggestions for improving our file areas, as with file contributions, + are always welcome. + + + \ No newline at end of file diff --git a/textfiles.com/bbs/spoof.txt b/textfiles.com/bbs/spoof.txt new file mode 100644 index 00000000..b67b3ff1 --- /dev/null +++ b/textfiles.com/bbs/spoof.txt @@ -0,0 +1,22 @@ +Spoof - for Sysops especially +Ever seen anything like this? +=-=-=-=-=-=-=-=-=-=-=-=-=-=-= + + + Hi! I'm New. + +HI!!!! I AM A NEW USER ON THIS BBBS!!!!! SEND MUY OOOPPPPSSSS!!!!! +SNED ME OOOPPPSSS!!!!!! SEND ME MAIL!!!!!!!!!!!!!!!!!! I THINK THIS +IS REELY NEATE!!!!!!!!!!!!! SEND ME MAIL!!!!! HYE, DID YOU HEAR +WHY THE PUNK CORSSED THEY RODE?????? BECAUZ HE WAS STAPLED TO +THEE CHICKEN!!!!!!!!! HAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!!!! SEND +ME JOAKZ!!!!!!!!! SEND ME MAIL!!!!!!! WELL GOTTA GO NOW!!!!!!! +L8R D00DZ!!!!!!!! HAHAHA!!!!!!! I SAW THAT SOMEWHERE!!!!!!!!! +/S /Q /K ^S ^Q ^K HEY SYSOP!!!!!!! HEY!!!!!! +! SEND ME MAIL!!!!!!! TELL ME HOW 2 SAVE THIS MESSAGE!!!!!!! +HEY!!!!!!! HELP ME I'ME TRAPPED IN HEAR AND I GOTTA STUDY 4 A +HEALTH TEST TOMORROE!!!!!!!! ANYBUDDY FROM DAN KWAYLE JUNIOR HIGH +HEAR WHO CAN GIVE ME THE ANSWERS??!!!!!!??!!!!!! HELP!!!!!!!!!!!! + + (*@$#&o*&( NO CARRIER + diff --git a/textfiles.com/bbs/star.fytr.agnda b/textfiles.com/bbs/star.fytr.agnda new file mode 100644 index 00000000..5c2caa45 --- /dev/null +++ b/textfiles.com/bbs/star.fytr.agnda @@ -0,0 +1,141 @@ + ______________________________________________________________________________ + + _________________ + |\ \ + \ \ * a \ + \ \ t - g \ _______________________ + \ \ h f e \ |\ ___________________ /| + \ \ e y n \ | | | | + _\ \ t d \_____| | Byte Bastards BBS | | + /| \ \ e a \ | | (201) 697-7001 | | + | | \ \ r \ | |___________________| | + | | \ \________________\ |/_____________________\| + | | \|________________| | + | | _ | + | | An Analysis by |he Ramsacker | + | | October 7, 1991 | + | |___________________________________| + |/____________________________________/ + + ______________________________________________________________________________ + + + Yes folks, you have just witnessed the cheeziest textfile intro design +ever conjured up in G-phile history. + + ______________________________________________________________________________ + + + A couple years ago in 1989 when life was simple and I was just a "c0dez +d00d", I chanced upon calling a BBS called Third Planet in 516, the official +Star League headquarters. It must have been around 2:00 AM my time (West +Coast) when I was logging in new and the sysop broke in to chat. Being a +typical c0dez d00d, I immediately dropped carrier...no actually I thought I'd +humor the sysop and see what the hell he was doing up at 5:00 AM his time. He +told me he had been working on the system and must have fell asleep in his +chair (comfortable chair). Curious about this entire Star League concept that +I had come into limited contact with from time to time and wanting to know +more, I began asking the sysop questions about it. He proceeded to tell me, as +best as my recollection allows, the following, (which is my summary of what I +remember him telling me): + + The Star League concept was born out of the frustration of + calling different BBS' across the country only to encounter endless + rag wars and egotistical competition amongst pirates. The pirate + world was supposed to be a united community, dedicated to getting + new wares out to everyone instead of embroiling the release of + them into a overly-competitive rat race where every group was trying + to undermine and out-do the other. The idea behind the League was + to promote cooperation between different pirates and groups and to + provide a haven for those people who were alienated by all the + hostility they encountered. Those pirates and groups allied under + the Star League banner would cooperate in cracking and distributing + wares rather than compete for all the glory. After all, the pirate + world was founded on the concept of hackers cooperating to achieve + a common goal, and it was supposed to be fun. + + The Star League member structure was based upon a hierarchy. + There were different levels and ranks assigned to persons based on + their accomplishments and contributions to the pirate community at + large. Methods of increasing your ranking within the hierarchy + included cracking wares, distributing wares, or being an outstanding + contributor to different Star League bases in the way of uploading + and posting messages. Those aligned with the Star League called + themselves "*-fyters" and usually accompanied their handles with + this label. + + + Rylos, the sysop of Third Planet and founder of the Star League, was a +school teacher (of what grade level, either he didn't tell me or I forgot). +Keeping this in mind, when one ponders it, everything about the Star League was +like being in grade school; you were always taught to be kind and sharing to +your fellow students...the same principals that Rylos adopted and applied to +the Apple pirate world as the basis for the Star League. He wanted to promote +sharing and kindness amongst pirates to try and bring order to the chaos of the +Apple pirate world, but he didn't totally succeed. + + There are several reasons why the Star League concept never became as +widespread and successful as Rylos would have desired. First of all, it was a +utopian idea, and utopias don't always work the way you expect them to. +Secondly, a lot of the members of the Star League were, plain and simple, +geeks. They were mostly those dreadful Christmas modemers. You know, those 14 +year olds that get a Volksmodem from Mom and Pop on the 25th of December (or +The Chanukah Modemers for the Jewish amongst you). Lastly, and most important +of all, the Apple pirate community was an anarchy, and it was therefore a +paradox and an impossibility to try and govern it. Most everyone involved was +in it for THEIR own reasons, whether to get wares, to show off ones talent in +cracking wares, to simply rag on others because of inferiority complexes in +real life, or whatever. To survive you had to be able to hold your own. Those +who couldn't joined the Star League. In all fairness, the Star League +federation never had the talent it needed to advance its ideals. Who would +want to be governed by an organization that encouraged "niceness" when you +could start your own group and dominate the Apple ][ pirate world with a +cracking empire? Simply the fact that it is a given that most people who +became heavily involved in the pirate community had large egos, its not very +likely that any one person would be able to get everyone to submit to one +solitary confederacy. + + Although I never read the book, I do know enough about the story to say +that Rylos had a "Catch 22" idea in mind. He wanted to see if he could +successfully create a federation of persons dedicated to the ideals that he +laid out for them, that of cooperating to achieve a common goal, the common +goal being the cracking and distribution of wares. Based upon the fact that +the only contribution from the Star League that I am aware of is an Edu-ware +called Planetary Construction Set, I wouldn't call Rylos' experiment a very +successful one, although I can see how an older person, especially a school +teacher, would be fascinated with the experience. But because of the reasons I +have pointed out above, the idea was doomed from the start. I personally don't +believe the idea could have ever worked. + + I don't know if the Star League still exists. The Byte Bastards used +to be aligned with them, but quit soon after I joined the group, and that's the +last major contact I came into with the Star League. If you think you'd still +like to try calling a Star League BBS, here's the number for Third Planet: +(516) 361-6744. I don't know if it is up any longer so call at your own +discretion. + + ______________________________________________________________________________ + + + Thanks to Guns-N-Roses and The Moody Blues for kindly playing on my +dilapidated Sears stereo while I typed this file (even though I wasn't a fan, I +bought Use Your Illusion I & II anyway and found them to be pretty good +listening). Thanks also go out to my Penis for being there when I needed it. +Ok, on to... + + THE END + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + You'd think the American Government would get a clue from the events +going on in Eastern Europe and the Soviet Union and leave our rights alone. +But they're fucked in the head and think they have the right to control us. +Well, they'll soon discover that they can't take away rights they never owned +in the first place. + + The Ramsacker + October 7, 1991 + 2:51 PM + + ______________________________________________________________________________ + \ No newline at end of file diff --git a/textfiles.com/bbs/start-bb.txt b/textfiles.com/bbs/start-bb.txt new file mode 100644 index 00000000..43d4d2b1 --- /dev/null +++ b/textfiles.com/bbs/start-bb.txt @@ -0,0 +1,1301 @@ +6 + + So you want to start a BBS? Page 1 + + + + + + + + + + + + + + + + + So You Want to Start a BBS? + + by Jerry Shifrin + + SYSOP, East Coast Forth Board + + 703-442-8695, McLean, VA + + + May 23, 1987 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 2 + + + + 1 Introduction + + I was asked about starting a BBS. Rather than give a short, + private response, I thought I'd take the time to provide a more + detailed description. + + First of all, it's almost impossible to overestimate the time + needed to run a good BBS. A lot of time is spent on adminis- + trative BS. Then there's the time you spend on managing files - + which to keep, which to review/plug, which to trash. The largest + chunk of time is spent on messages - answering questions (like + this one), helping new callers, moderating threads and + conferences, etc. + + In this paper I'll attempt to give you some idea of what you're + letting yourself in for, but I'll probably overlook some of the + areas which you'll need to know about. Don't worry, SYSOPs as a + breed are very helpful and most will be happy to help you out + with any other problems you run into. Feel free to ask your + favorite SYSOP for help in any area. + + Since I use PCBoard (from Clark Development Company, Inc., P. O. + Box 71365, Murray, Utah, 84107, 801-964-6692 (voice)), some of + the following discussion is specific to that system, but most of + the areas will be similar for whichever system you select. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 3 + + + + 2 What's in it for me? + + The first question you should ask yourself is "why am I thinking + about doing this?" Hopefully it's not to make money. You will + surely end up paying more in terms of hardware, software, + supplies, and telephone charges than you will ever take in from + user donations. At best, you can hope to recover your operating + expenses, but you should really write off your original outlay + for equipment. + + Well, what else can you expect? Lots. If you provide a high- + quality service and attract a good set of users, you will benefit + from it in several ways: + + 1. Software - good users will reciprocate for their + download activities by uploading other software they've + come across while cruising the boards. Of course, + you'll get a lot of junk, but you'll also get a number + of good packages you'll enjoy using. + + 2. Information - BBS's have become the best place to share + information about new hardware, software, vendors, + books, etc. They are also the best place to get help + with hardware or software problems. The spirit of + sharing or, as the Capitol PC User's Group likes to + describe it, "users helping users" is alive and + thriving on the bulletin boards. + + 3. Friends and business contacts - it's not unusual for + casual conversations on bulletin boards to develop into + friendships, business arrangements, and sometimes even + marriages. + + 4. Karma - call it what you like, but by offering a good + bulletin board service, you're giving something back to + the community which helped you along with free soft- + ware, advice, etc. Without getting mystical about it, I + firmly believe that there is a balance to the universe, + or as the Beatles said, "the love you take is equal to + the love you make." Or call it the Golden Rule. + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 4 + + + + 3 Hardware + + Well, let's go over some of this in a bit of detail. First of + all, hardware. Naturally, you need at least a PC, monitor, hard + disk, and modem. Don't assume you can just run the BBS when + you're not using it - you really have to dedicate the hardware to + the bulletin board, otherwise both you and your callers will get + frustrated at the intermittent system availability. + + You really need at least a 20 megabyte hard disk. Your BBS + software, utilities, message files and logs will easily consume + 4-5 megs. You'll be surprised at how quickly the rest of it fills + up with files for downloading. A larger disk minimizes the + frequency of required maintenance cycles. (about $400 with + controller card). + + I prefer a monochrome monitor. Since your system will mostly be + showing text data, you'll find a monochrome monitor easier on + your eyes as well as being less expensive (about $100-150). + + Of course, you need another PC for your own usage and for BBS + maintenance. One alternative is to run on an AT class machine + with two partitions (DoubleDOS, Taskview, or Desqview) and two + monitors, but you should realize that having this type of + complicated operating environment is much more fragile and will + fail with certain ill-behaved software. + + I find it helpful to have both computers connected to a single + printer via a printer switch (about $30-40). This allows me to + print out some of the longer messages and refer to this listing + when composing a response on the other computer. + + Obviously you also need a second phone line. It's helpful to also + have a second modem - this way you can test changes to the board + (e.g. doors, new BBS releases, utilities) without having to wait + for someone to call in and try things out. + + I would suggest that for the BBS, you get the best modem you can + afford. Many of the inexpensive modems which promise Hayes + compatibility, really are not fully compatible and may not + operate correctly when used for a BBS. Additionally, the more + expensive modems have better equalization circuitry which will + give your callers cleaner connections. Also, consider getting at + least a 2400 bps modem - your users with faster modems will + appreciate the greater throughput. I really can't recommend that + you shell out for a 9600 bps modem yet - there are just too many + incompatibilities among the high-speed modem vendors. + + You should probably consider adding an EMS card eventually. + Whether you use it as a RAM disk or disk cache, it will provide a + dramatic increase in system performance and save wear and tear on + your hard disk. + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 5 + + + + Oh yeah, you need disks -- lots of disks. You should have at + least two sets of backup disks and alternate between them. Also, + you'll want to periodically move some things offline: outdated or + low-usage files, older messages, caller logs, etc. Naturally you + could just trash this stuff, but I find it occasionally helpful + to keep them available for reference. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 6 + + + + 4 Utility software + + While none of this is required, you'll find that having the right + tools will ease your workload and improve your system + performance. For most of these there are public domain or + shareware alternatives. In general, I prefer the commercial + packages - you will be using these a lot and for most of them + will require reasonable support and updates. + + 1. Backup utility - unless you can afford a tape drive + ($500-1000), you really need a backup utility. I prefer + Fastback (about $100). Another alternative is the DOS + BACKUP program, but you'll find Fastback to be faster, + more reliable, easier to use for both backup and + restore, and able to put more data on a single floppy. + + Even if you can afford a tape drive, you might want to + consider adding a second hard disk instead (about $300 + assuming you put both disks on a single controller) and + use it strictly for backups. This is a lot faster, but + not quite as reliable since a huge power surge could + easily wipe out both disks (not to mention a fire). + + 2. Cache utility - whether you have an EMS card or not, a + cache utility will add a good deal to the performance + of your system, especially with an EMS card. I use + Vcache from Golden Bow Software (about $50). Other + choices are Lightening and a few shareware offerings. + + 3. Disk organizer - with all of the disk activity to + message bases, system logs, files, etc., eventually + your hard disks will become hopelessly fragmented, + increasing your system overhead. A disk organizer will + defragment your files, minimizing disk arm movement. I + use Vopt from Golden Bow Software (about $50). Other + choices are the shareware program DOG and a program + from Softlogic (whose name escapes me at the moment). + + 4. Disk Maintenance utility - considering that your system + will be running night and day for months on end without + interruption (hopefully), eventually you will have some + disk problems. The right maintenance utility can some- + times save you from having to do a full disk restore. I + use PCTOOLS from Central Point Software (about $30), + but a better choice might be the Mace Utilities (about + $100). Another possibility is the Norton Utilities. + + 5. Editors - I'm sure you have your own favorites here, so + whatever I say will be ignored, but I would suggest + that you need two different editors - a full-function + wordprocessor for composing lengthy messages, + bulletins, etc. and a quick little editor for making + little fixes to directories, configuration files, etc. + I use Framework II from Ashton-Tate (about $400) for + + + + May 24, 1987 + + + + So you want to start a BBS? Page 7 + + + + the large stuff and QEDIT, shareware from Sammy Mitchel + ($35) for all the little things. The nice thing about + QEDIT is that it's real fast and doesn't require any + other files for its operation. Also you can configure + it to be similar to whatever other editor you're + comfortable with. Of course, there are hundreds of + alternatives. + + I'd really suggest that you not stint on these tools. It's like + working on a car -- the right tool can turn a difficult task into a + real breeze, and the less time you spend on maintenance the better. + You'll have plenty of other things which will consume your time. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 8 + + + + 5 Selecting a BBS package + + OK, we have the hardware, the phone line, and the utilities. Next + we need to choose some BBS software. Assuming you're running an + IBM PC or clone you have three main choices along with a number + of less common alternatives. + + Tom Mack's RBBS-PC is the grandaddy of PC BBS's. It has numerous + add-ons (utilities, doors), and may be the widest used (with + PCBoard nipping at its heels). It's semi-public domain (free, no + donation requested, but copyrighted). It suffers from the lack of + control over its operation - most RBBS systems will differ in + details of their operation and every caller has to learn each + board's individual operation. + + FIDO is another widely used system and it features the ability to + have national and international messages, conferences, and file + transfer. Within each region there is a designated gateway node + and all of the FIDO boards will contact their gateways in the + middle of the night for message and file transfer. On the + negative side, FIDO is slow and suffers from, I think, an awkward + user interface. FIDO is also distributed as public domain (or + share-ware, I forget). + + I use and (naturally) recommend PCBoard. It's considerably faster + than the above two boards, features a simpler, single-level user + interface. Also, to the best of my (limited) understanding it is + much simpler to operate from the SYSOP's point of view than the + other two. PCBoard is sold as a commercial product, costing + between $100-200 depending on features (doors or networking + support). For that price you also get some incredibly useful + utilities and a year's maintenance via the authors' BBS ($50 for + each following year). I can categorically state that the authors + provide great support. My questions are answered quickly and my + suggestions often show up as features in the next release. Also, + Clark Development releases improved versions of PCBoard about + every two or three months. + + I think it's somewhat like paying for the right tools. If PCBoard + makes it easier to run your system, then the money you've paid + will quickly be recovered in terms of your time-savings. Also, + considering that this will account for 99% of your system usage, + it's a small component of the total cost. + + All three of these packages have been around for a few years and + show no signs of becoming unsupported orphans. + + Aside from these three there are several less-widely used + alternatives - DBBS, Collie, Wildcat, and others, but I'm afraid + I can't offer too much information on these (except that DBBS is + real fast). + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 9 + + + + Since I really can't discuss the others, I'll assume you've + chosen PCBoard, though most of what follows applies to every BBS + - you have to deal with callers, files, and messages no matter + what choice you've made. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 10 + + + + 6 Getting Started + + You'll probably find it fairly easy to do the initial BBS setup. + PCBoard comes with a couple of hundred pages of documentation + which explains how to set up your modem, file directories, + conferences, etc. You should be able to get going by just taking + most of the defaults, though as you become familiar with all of + the features you'll eventually want to start customizing things. + + I'd suggest avoiding things like doors, graphic displays, + conferences, networks, timed-events, and the like until you + become fairly comfortable with the system's operational + characteristics. Start out small with a few directories and + bulletins until you know where you want to go. + + There are a number of files you'll have to create to get going: + + 1. Welcome message - this is what your caller sees each + time he or she calls your system (though it may be + skipped). You should at least identify your system + here. Some SYSOPs put incredible amounts of energy into + designing flashy displays for these. I don't. + + 2. New user message - a file which is displayed to every + new caller the first time they logon. This should + provide them with a brief list of rules and let them + know where to go for more information. + + 3. Level message - a unique file for each level of user + you define for your system: unregistered, bad guy, + registered, participating, contributing, visiting + SYSOP, etc. You should let the user know where they are + and what to do next (answer the questionnaire, upload + files, etc.). + + 4. News - this is where you may put any daily news + announcements (system going down for maintenance, + important events, etc.). + + 5. Questionnaire - this file contains a list of questions + which will be asked of your callers if they issue the + [S]cript questionnaire command. Most SYSOPs use this + for caller validation. + + 6. Bulletins - Here's where you may put all the detail + information you want to make available: rules, helpful + hints, system statistics, honor role of users, etc. + Feel free to use any of the ECFB bulletins (with proper + accreditation) you think worthwhile. + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 11 + + + + Several of these are optional and there are a few additional files + you may choose to provide: customized menus, additional + questionnaires, goodbye message or questionnaire, additional + versions of these files for each conference, graphics versions of + these, etc. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 12 + + + + 7 File Directories + + Naturally, a fair amount of your caller activity will be + uploading and downloading files (mostly downloading). You should + organize your files in a way which makes sense for your user + community: helpful files for novices, disk utilities, + communications, etc. You will probably find it helpful to set up + a separate directory for each category. There are a number of + utilities around which will help with this. The best of these + come with PCBoard: PCBFiler. + + PCBFiler allows you distribute your uploaded files into the + proper directories, maintain file lists, edit file names, file + descriptions, etc. This program is worth the price of PCBoard all + by itself. If you set things up properly you will find your file + maintenance reduced to just a few minutes each week. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 13 + + + + 8 Decisions, Decisions + + You have a number of decisions to make on how you will run your + board. I can't begin to touch the surface of all these, but will + describe a few of them. + + 1. Open or restricted access? - will you let anyone dial + in and access all of your board's facilities (down- + loads, messages, conferences, doors, etc.)? Or will you + restrict access to those who have registered, answered + a questionnaire, read your bulletins, mailed in a form, + sent you a check, etc.? Many SYSOPs restrict downloads + to those who have answered a questionnaire and been + validated. A few go so far as to personally call each + and every new user and chat with them before granting + full access. I allow limited access until the caller + completes a questionnaire. I apply a "sanity check" on + their information (sometimes calling them if it looks + suspicious) and then grant then full access. + + 2. Free or pay? - will you accept, request, or demand + payment for use of the board? There are pros and cons + to each of these alternatives. If you accept payments + at all, then you are committing yourself to keeping the + board available and probably allowing your paying + callers to tie up your board without any other parti- + cipation. Is it worth the $20 or so to you to have a + paying caller logon every few days and do nothing but + download? If you demand payment then you may be exclud- + ing people who could possibly enrich your board in + other ways. On the other hand, if your board is totally + free and open, then you may find yourself swamped with + people who do nothing but download. + + I would suggest that, until your board is fairly well + established, you not insist on payment. You may wish to + provide incentives for people to contribute money to + your boards operation - special conferences or download + directories, extra time, first crack at new files, etc. + + 3. Monitor downloads? - Many SYSOPs monitor upload to + download ratios, at least for their non-paying callers. + Typical is requiring at least one upload for each 10 or + 20 downloads. A few SYSOPs are tougher, demanding 1:3 + or 1:5 ratios. I guess the question is whether you're + doing this in order to collect software or if you're + trying to provide a public service. I'd suggest being + fairly loose about this until you have established a + good reputation for your board. + + 4. Games and pictures? - If you allow games and graphic + pictures (known as Readmacs, often R-rated) on your + board, then you will certainly get your share of + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 14 + + + + immature callers of all ages. On the other hand, games + are a important part of most people's computer usage. + What to do? What to do? Beats me. + + 5. 300 bps callers? - Many SYSOPs restrict 300 bps callers + since they tend to be in the category of immature + callers and they can't make as efficient use of your + facilities as callers with faster modems. Again, by + doing this you may deprive yourself of good, contribut- + ing callers who happen to lack a faster modem. I allow + 300 bps callers on the ECFB, but restrict their down- + loading activities to the wee hours of the morning. + + 6. Operator page? - Do you want callers to be able to page + you by sounding an alarm on the PC speaker? It's nice + to be helpful to new callers, but I'm amazed at the + number of people who feel free to page you in the + middle of the night. If your PC will be located within + hearing distance of your bedroom, I'd suggest you + disallow the page bell, especially if you're married to + someone like my wife, who's a light sleeper and doesn't + like being awakened. + + Well there are hundreds of other decisions you'll have to make to + set up your board, but this should give you some feel for the kind + of stuff you're getting into. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 15 + + + + 9 Maintenance + + 9.1 Daily + + You really need to check your board at least once a day. At first + this might seem like fun, but after awhile it becomes a bit of a + drag. + + 1. Message check - you really MUST read (at least scan) + every message on your board. Your standards are your + own, of course, but I'd suggest making sure that no one + is promoting software piracy, phone phreaking, or + whatever else you consider offensive. Some SYSOPs + disallow bad language; I don't feel strongly about + that, but don't want to have anyone leave abusive + messages on the board. + + 2. Registration - you should promptly register new + callers, especially if you require that they complete a + questionnaire to gain access to your board. It's + discouraging for someone to make several long-distance + calls before they're allowed to read messages or + download files. + + 3. File check - you should do at least a quick check of + any uploaded files to ensure that people haven't + uploaded commercial software. If possible, you should + verify that the software isn't a "Trojan" or "worm". If + you do this, try out new software on a system without + hard disks (or one on which you can disable the hard + disk). Also, there is some public domain software + around which will attempt to discover or protect you + from such software. Be especially careful with uploads + from people you're not yet familiar with. + + 4. Respond to questions - your callers will really + appreciate it if you're consistent in replying to their + questions within a day or so. You must be responsive if + you want to attract a good set of callers. + + 5. Defragment - I'd suggest that you run your defragmenter + (disk optimizer, etc.) daily. It'll surely improve your + overall system performance. I include Vopt as part of + my AUTOEXEC.BAT. + + 6. Reboot - PCs have gotten a lot more reliable in the + last few years, but I'd still encourage you to reboot + on a daily basis; this way you'll be starting out each + day with a clean slate. + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 16 + + + + 9.2 Weekly + + There are several maintenance activities which are needed every + week or so. + + 1. File maintenance - distribute your uploaded files into + their proper directories. If you use PCBFiler, this + will only take a few minutes. Take the time to verify + that you aren't keeping several copies of the same + program with different names, or that you don't have + out-of-date versions of a package. If you let file + maintenance drag on for a month or so, you will find + yourself faced with an almost insurmountable task. + + 2. Backups - it's a real drag, but you really should do + full backups on a weekly basis. At the very least, you + should back up your user directory and message bases. + + 3. Message cleanup - if you have an active message base, + you should probably go though it once a week, deleting + older or irrelevant messages. I usually protect the + non-general interest messages (thank-yous, etc.) so + that they're only visible by the intended recipient. + Your other callers will appreciate not having to sit + through this stuff. + + + 9.3 Monthly + + You may need to do these things more or less frequently depending + on your board's activity. + + 1. User maintenance - eventually your user directory will + have a large number of entries for people who haven't + called in quite a while. They may have lost interest, + moved, or died. It doesn't matter. People who haven't + called in a while should be purged from your user + directory. I give unvalidated users (those who never + completed the questionnaire) 30 days, 90 days for + validated users, and 6 months or longer for those at + higher levels. PCBoard includes SYSOP commands to help + you with this. + + Also, you will probably wish to sort your user + directory so that your best callers are at the top of + the file (this will slightly speed up their logons). + PCBoard comes with another excellent utility, PCBEdit, + which lets you sort and edit your user directory. + + 2. Message base maintenance - you must periodically prune + your message base of outdated or deleted messages. + PCBoard has a maximum limit of 1000 messages per + conference, but the larger the message base, the longer + it will take your users to logon and switch confer- + + + + May 24, 1987 + + + + So you want to start a BBS? Page 17 + + + + ences. Fortunately there is a SYSOP command you can use + to compress your message base. PCBoard will copy only + the active messages to a new file and leave your old + file available as a backup. I compress and save these + backups on floppies. + + 3. Caller log - PCBoard produces a log of all significant + caller activity (logons, uploads, downloads, messages, + doors, etc.). For an active board this can easily grow + quite large. You should probably start a new log at + least once a month. Also you may wish to run your log + through one of the analysis utilities (see below) which + will create a system usage file you may wish to post as + a bulletin. + + 4. Full backups - C'mon now - at least once a month! If + you use Fastback it will only take a half-hour (and + 40-50 diskettes) for a 20 meg backup. + + + 9.4 More than monthly + + Here's a list of other things you'll want (or need) to do on a + periodic basis: + + 1. Hardware maintenance - especially if you're a smoker, + I'd suggest you give your machine a good cleaning every + so often. I dust or clean all the exposed surfaces. + Also, I vacuum around the keyboard, vents, etc. Clean + your monitor! Dusty or greasy monitors will make it + hard to read. + + 2. Software upgrades - you'll probably want to take + advantage of the new features in upgrades to PCBoard + and the various utilities. I'd suggest keeping copies + of the previous versions until you've verified the + correct operation of new releases in your environment. + + 4. Bulletin maintenance - you probably need to go through + your bulletins periodically and verify that they're + still accurate for your system. Of course, you may need + to do this more frequently if you maintain bulletins of + current events, software or magazine reviews, etc. + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 18 + + + + 10 Utilities + + There are a number of public-domain or shareware utilities around + which will help you run a high-quality BBS operation. You can + find these on most of the larger BBS's, especially those which + have a SYSOP's conference. I couldn't hope to describe all of the + available utilities (besides, it changes every week), but here's + an idea of the type of stuff currently available. + + 1. PCBFiler - this one comes with PCBoard and was + described previously. It helps you do file and + directory maintenance in a fraction of the time it + would take you to do it manually. Essential! + + 2. PCBEdit - also described previously, this is also + distributed as part of PCBoard. It allows you to edit + all of your user directory information. You may also + use this to sort and print your user directory and + adjust their access level based on upload/download + ratios. + + 3. QNE - a nice little utility from Scott Pazur (of the + Fleamarket BBS which gives you a fast, simple way of + updating your PCBoard news file. + + 4. Arcvue, ARCDoor, PCBArc - doors which allow your users + to inspect an archived file without having to first + download them. I use Earl Beachler's Arcvue door since + I support non-IBM PC callers and Arcvue allows them to + extract files for subsequent download (in case their + system doesn't support the ARC file format). + + 5. CALLSTAT - analyzes your caller's log and generates a + file of interesting caller statistics (files most + frequently downloaded, number of callers in various + categories, bulletin/conference/door usage, etc. There + are several utilities which provide this capability. + This is the one I use. + + 6. PCBMSG, PCBMFIX - allows you to recover a damaged + message base. PCBMFIX also allows you to edit portions + of a message. Since I wrote PCBMSG I'm a bit partial to + it. + + 7. PCBMT - selectively copies portions of a message base + (based on message number, subject, protection, etc.) to + an ASCII text file. Includes a utility to summarize all + of the message subjects. Written by, ahem, myself. I + use it to create files out of some of the more + interesting message threads. + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 19 + + + + 8. File transfer doors - there are several utilities + around which allow callers to transfer files using + protocols not currently supported by PCBoard (e.g. + Kermit, Zmodem, etc.). + + This doesn't begin to touch the surface. There are utilities around + for viewing messages and callers logs, creating databases of your + user's directory info, summarizing your questionnaires, doors for + playing games, etc. It seems that many of the PCBoard SYSOPs are + also programmers and it doesn't take much for them to generate new + utilities based on real or perceived needs. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + + + So you want to start a BBS? Page 20 + + + + 11 Where to go from here + + If, after all this, you're still convinced you want to start a + BBS, I'd suggest you first decide which BBS system you'd like to + run. If you don't know, then dial into a number of your local + boards and decide which of these is easiest for you, as a user, + to navigate. Whichever is easiest to use will probably also be + easiest to operate. Performance is also of crucial importance. + It's no fun to pay long-distance charges to use a slow board. The + meter keeps on running, whether or not you're doing anything + useful. + + Once you've settled on a system, establish contact with one of + the larger boards in your area of that system. If the board is + public domain or shareware, you'll probably be able to download + it from there. Make sure the SYSOP understands what you're doing + so that he or she will be more forgiving of the large amount of + downloading you're about to do. PCBoard has a demo version + available if you wish to check it out before shelling out your + money. You may find it helpful to experiment with that (but it's + really not suitable for operating an actual BBS). + + Now it's up to you! Just remember that a BBS without callers + isn't very worthwhile. Be nice to them -- you'll reap dividends + in the long run. It's up to you to provide an interesting and + entertaining forum for people to visit. The files and messages + are for their benefit, not for yours. Also keep in mind that + every BBS started somewhere -- you'll make mistakes, but if you + work at it, you'll end up with an operation you can be proud of. + + Finally, keep in mind that there are hundreds (thousands?) of + other SYSOPs who have already gone through the hassle you've set + out to deal with. The vast majority of these people will be + happy, even eager, to help you along. Feel free to ask them how + they've dealt with the problem with which you're struggling. + You'll be amazed at just how helpful we can be. + + + + + + + + + + + + + + + + + + + + + + May 24, 1987 + + \ No newline at end of file diff --git a/textfiles.com/bbs/startbbs.txt b/textfiles.com/bbs/startbbs.txt new file mode 100644 index 00000000..3af50220 --- /dev/null +++ b/textfiles.com/bbs/startbbs.txt @@ -0,0 +1,135 @@ +__________________________________________ +Tips on Starting Your Own BBS +Written by Pazuzu - November 11, 1993 +(C) Copyright 1993 Digital News Associates +ALL RIGHTS RESERVED +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Most people, after they've been calling out for a while, eventually come to +the decision that they should start their own BBS. The allure of running +your own board is very strong - you dream of the immense power you'll have to +delete anyone on a whim, to create your own virtual city on-line for people +to call into and live for a few minutes (or hours) each day. However, few +people realize the immense amount of time it takes to set up, configure, and +run a BBS. Having been a SysOp for a number of years, I feel I am qualified +to give a few tips on how to create a successful BBS. + +There are a lot of things one must consider when starting a system - what +software to run, what to name the system, what types of files and message +areas to have and so on and so on. One of the most important things about +your system is the name. If you have a lame name, people are going to think +your system is lame (unless you're a CdC site...). Try to avoid generic +names. There are probably about 50,000 bulletin board systems in the U.S. +alone, and I think about 80% of them have very generic names. You should of +course choose a name that is reflective in some way of your system's content +- a good reason why my system is named "DnA Systems, Inc.". Anything with +"Dark" in it is OUT. In my 11 or so years of modeming I have seen so many +"Dark Realm"s, "Dark World"s, etc, to make me want to vomit. BE ORIGINAL! +Or at least try. Also try to avoid using names of famous BBS's of the past. +Especially Cemetary Gates. Cemetary Gates was a HUGE board back in the +mid-80's to early-90's. EVERYONE who has been out here for any length of +time has heard of it and we're all sick of everyone copying its name. This +also includes adding a "II" to the end of the name like "The Drop Site II" or +"Louder Than Bombs II" - this is even worse than just copying the name. + +Of course, you must also decide what software to run. The sheer number of +BBS packages available today is insane and it can be very hard to pick one. +You must first consider what features you require and then find out which +softwares have those features. Configurability is also a big issue. You want +to be able to make the BBS look and function the exact way you want it to and +you don't want to spend six years doing so. Networking support is also very +important - if you want to join WWiVNet (goD forbid!), running a forum hack +would be very stupid. It would be totally impossible to go over every +package available, but I shall try to cover the major ones, at least for +MS-DOS systems anyhow. + +There are basically three "families" of BBS software out there - The WWiV +hacks and work-a-likes, Forum hacks (1,000's of them), and PCBoard +/ RBBS / Wildcat work-a-likes. + +The WWiV hacks/work-a-likes are quite numerous. There is of course WWiV +itself (DO NOT run WWiV), then there's Telegard, TAG, Renegade, Dominions, +and Synchronet. NO, Synchronet IS NOT a WWiV hack (I HAVE the source.), but +it looks a lot like it. Telegard and Renegade are quite similar (well, since +Renegade is a Telegard hack I wonder why?). They add a menu editor to the +system so you can make the BBS do whatever you like whenever whatever key is +pressed. Dominions is a Telegard hack with not very much changed. I run +Renegade and like it a lot. It does basically everything, and you can +configure it to look like whatever you want. Synchronet costs quite a bit of +money so you'll probably want to stay away from that unless you can pirate it +from somewhere. + +The Forum hacks are extremely numerous and they all look the same in the end. +Included are: Vision, Vision/2, VisionX, Liquid (bugs, bugs, bugs), Oblivion, +Celerity (or CELERY as I like to call it), and about 100,000,000 more that I +can't think of right now. There are LOTS. There isn't much to distinguish one +from the other, except the bug level. Liquid is by far the worst I've seen. +Stay away from it unless you are a hardcore masochist. Setting up Fido-type +nets (such as CyberCrime and DnANeT) on forum hacks is notoriously tricky, so +you may want to avoid them if you plan on being in any fido-type nets. + +The PCBoard/Wildcat/RBBS/Etc family are utterly hideous and most people I +know won't even CALL a board running them. The message base operation on +these abominations is utterly horrid and the person that invented it should +be flogged. Avoid these softwares like the plague. + +After you pick a software, you've got to configure it to the way you want it. +DO NOT run a BBS "out-of-the-box". It looks really lame, and people will +notice right off that you haven't spent any time setting up your system and +aren't likely to call very often. It can be very difficult to set up a BBS, +but the time spent is well worth it. You've got to change prompts and menus, +set up logon and newuser info files, create message and file areas, and +things like that. + +You've also got to come up with a "hook" - something that makes your system +different from the billion other systems out there. Mine is the unusual +combination of phreak/hack/virus/etc, conspiracy/legal/political info, and +the occult. It's an unusual combo that many people like, and keep calling +for. It's also one a lot of people have imitated. One I've never seen done +is pirated software and good phreak/hack stuff, without the board becoming +involved in the 0.1 second warezzzzz set. I'd like to see someone pull it +off. + +The issue of nets is a big one these days - it seems EVERY system is in one +net or the other. The big problem with nets is that some systems get onto a +net, then become "a netnode". There's nothing to the system but the net. This +is something you want to avoid. If people are calling your system only for +the net, you've got some changes to make. Now, I'm not knocking nets - they +can be great - I'm on 4 of 'em myself. But choose them carefully and DO NOT +allow yourself to become a slave of the net. Most nets these days are of the +Fido-standard variety - a complicated subject for most people. There isn't a +single doc file in existence that attempts to help the fido novice understand +how to set up and run on a fido-type net. Until now, that is. Read my article +on the subject in this issue of DnA BEFORE you set yourself up on one of +these nets. I am SICK of SysOps who can't figure out how to run their mailer, +who make the net coordinator set it up for them, then GO DOWN when something +weird happens with their mailer or echo processor. My article will explain +all you need to know. + +Once you get your board up, you've got to advertise. This is usually in the +form of posts on boards you call, or on a net. There is a great rule that N +Sult once told me (you may know him as D-Tox of ACiD, he's long gone now...) +- NEVER ADVERTISE YOUR SYSTEM ON A SYSTEM OF LESS QUALITY - ELSE YOU WILL +*BECOME* THAT QUALITY. This is a great rule to live by. Always try to +advertise your system on systems of a quality YOU'D like your system to +achieve, then people will think you are, and hence your system will become +that quality. So, if you want your system to be the next big name in the p/h +world, advertising it on your local clone of the "Streetfighter II BBS" (WHY +THE FUCK DOES EVERY SINGLE GOD DAMNED NPA HAVE ONE OF THESE???) is a bad +move. + +Well, once you've got your system up, advertised it, and got people calling, +you're pretty much set. Running the system on a day-to-day basis isn't as bad +as most people make it out to be. Sure, you've got to validate new users (and +delete the idiots), make sure posts are of sufficient quality and on-topic, +make sure files get uploaded to the right directories (WHY THE HELL DO SO +MANY PEOPLE FIND IT SO DIFFICULT TO UPLOAD THINGS TO THE RIGHT SPOT???), and +so on. + +Good luck to you. + + + +>> EOF << + + diff --git a/textfiles.com/bbs/stbfiles.bbs b/textfiles.com/bbs/stbfiles.bbs new file mode 100644 index 00000000..271db250 --- /dev/null +++ b/textfiles.com/bbs/stbfiles.bbs @@ -0,0 +1,813 @@ +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ ³ +³ Listing of ALL files in system on Thursday, November 19, 1992 at 09:15 ³ +³ ³ +³ Files marked with * following the FileDate are less than 30 days old. ³ +³ ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ New *UTESTED* Uploads ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + RECENT UPLOADS - WARNING - Not TESTED and NOT Scanned! + +LINKS105.ZIP 242081 11-06-92* Self-ext. LINKS386.EXE & .DOC ver. 1.05 -- + Corrects most video probs (eg. S3-chips), new + VESA's, centers picture on 640x480 screens. +INSTALL!.ZIP 14598 10-06-92 Install your programs with this program for + software authors. It is small, and very fast! +AMTAX91.ZIP 171264 10-13-92 Tax program +EABK21.ZIP 105520 11-08-92* OS/2 Extended Attribute backup util V2.02 + prepares disk for backup with DOS utility or + restores EA after disk restore. +TE2120.ZIP 314239 11-08-92* TE/2 1.20 comm program for OS/2 with Zmodem + also get CP2101.zip fixes +CP2101.ZIP 67688 11-08-92* fixes for TE2120.zip TE/2 comm program +HELP-STB.TXT 41119 11-17-92* INFO FOR TECH SUPPORT ATTN: JOHN BOWLIN. +IS16550.ZIP 3743 11-17-92* Checks for prescence of 16550 UART + +> Total of 8 files (960252 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Utilities/Misc. ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + GENERAL FILES, UTILITIES, MISC. + + YOU MUST GET A COPY OF THIS BEFORE DOWNLOADING .ZIP FILES +PKZ110.EXE 149504 01-16-91 Latest version of PKZip compress/decompress. + REQUIRED to unzip most files on this BBS (and + many others) + + Other Compression Programs + +ARJ230.EXE 200363 02-04-92 ARJ 2.30 - the BEST compression prog. Freeware! +PKLTE112.ZIP 38166 10-31-91 Compress EXE files but they're still runnable! +LZHUF1.ZIP 26910 09-24-92 Info on file compression. +LZHE100.ZIP 6052 10-31-91 LZH decompressor. +LZEXE91.ZIP 44036 09-24-92 Compression program that compresses .EXE files. +LHA212.ZIP 25663 10-31-91 LHARC v2.2 by Yoshi (for LZH/LHA files) +LARC24.ZIP 40945 10-09-90 Achiving Utility creates smallest arc files. + + QWK-Compatible Offline Mail Readers + +WR14.ZIP 65130 08-31-91 Windows 3.0 compatible QWK offline mail reader. +WINQ099.ZIP 53749 12-16-91 Windows 3.0 comp. QWK offline mail reader. good! +SLMR20.ZIP 165533 12-16-91 DOS QWK-style Offline mail reader - very good. +POWER201.ZIP 199762 10-18-91 PowerMail QWK reader - pretty good. +MEGAR210.ZIP 200981 12-01-91 MEGAreader QWK reader - must use MEGAmail door. +EZRDR129.ZIP 175987 08-20-91 EZ-Reader QWK reader - fairly good. +D2-112.ZIP 269184 08-15-91 Deluxe-2 QWK-compat. offline mail reader. + + TELECOMMUNICATIONS PROGRAMS + +DSZ0503.ZIP 91525 10-07-92 Latest 05/03/92 Version of DSZ + Zmodem/Ymodem/Xmodem external protocol for + up/downloading. You can use stand-alone or + link into comm. prog. +DSZ0503X.ZIP 40417 10-07-92 EXE Version (05/03/92) of DSZ. This program is + the industry standard for Zmodem! Get it! +ZBOOT20.ZIP 25895 10-07-92 Zmodem (DSZ) Interface for many terminal + programs (inc. Telix) +TLX315_1.ZIP 151023 10-07-92 PART 1/3: Telix 3.15 Com Prog. THE BEST! +TLX315_2.ZIP 123782 10-07-92 PART 2/3: INCLUDES *internal* Z-Modem support! +TLX315_3.ZIP 63538 10-07-92 PART 3/3: Very easy to install/use/add features. +PICKUP10.ZIP 13547 10-07-92 Pickup 1.0 - Excellent utility for + point-n-shoot uploading for Telix 3.x +TAGGER37.ZIP 31299 10-07-92 Download Tagger 3.7 - Lets you tag files on + screen for easier downloading, works with many + telecom. programs inc. Telix 3.x +EXHOST16.ZIP 109211 10-07-92 Executive Host 1.6 Host Mode for Telix 3.x +T3TOOLS.ZIP 52395 10-07-92 Telix 3.x Utilities +TELIX-4.ZIP 1350 10-07-92 Warning on hacked Telix 4.0 Bogus copy + + OTHER Files and Utilities + +INFOP141.ZIP 107744 05-20-92 InfoPlus - gives various system information. +4DOS401P.ZIP 288567 09-18-92 4-DOS 4.01 (1/2) GREAT command.com replacement! +4DOS401D.ZIP 257546 09-18-92 4-DOS 4.01 (2/2) MANY new features for DOS! +CLEAN95C.ZIP 153470 08-20-92 Latest Clean by McAfee for Virii cleaning +SCAN95B.ZIP 144905 08-19-92 Latest Scan by McAfee for Virii detection +SHEZ80.ZIP 238490 08-20-92 Latest SHEll-for-Zips (archives) version 8.0. + Supports conversion/manipulation with + ARJ/LZH/ZIP/ARC/ZOO/PAK/etc. Excellent program! +ARJ239A.EXE 122315 09-02-92 Arj 2.39a wide-beta for 2.40. WARNING! BETA + software is use-at-your-own-risk! +DSZ0729.ZIP 88879 11-06-92* ZMODEM Protocol - ver. 7/29/91 +LHA213.EXE 44416 10-10-92 LHA ver. 2.13 (7/20/91) - + Compression/Decompression Program +PCZ406.ZIP 68515 10-10-92 Free-ware version of Zmodem protocol similar to + Omen-Technology's DSZ. Supports fossil-driver + communication for high speed modems. +QM45TD-1.ZIP 333660 10-27-92* Q-MODEM COMUNICATION PACKAGE DISK 1/2 +QM45TD-2.ZIP 332257 10-27-92* Q-MODEM DISK 2/2 (disk one was qm45td-1.ZIP) +GSZ1214.ZIP 111825 10-29-92* Graphical Zmodem (like DSZ) 12-14-91 version. + Supports Ymodem, Ymodem/G, and Xmodem too. Add + to nearly any Telecommunications program. + +> Total of 39 files (4658536 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Information (Text) Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + INFORMATIONAL TEXT FILES + +STBFILES.TXT STORED OFF-LINE List of all the files on this BBS! +STBFILES.ZIP 12468 10-05-92 Compressed Version of above. +NEWSTB.LST 11302 10-01-92 List of the files uploaded in last 30 days. +NEWFILES.ZIP 2945 10-05-92 Compressed Version of above. + +WNDXDAC.TXT 1072 12-19-91 Info on WIND/X and Hi-Color (32k or more) + support +PGDAC.TXT 3743 06-06-91 Info on P/G & ERGO on Hi-Color DACs. +PV2_PIC.ASC 1093 05-10-91 Ascii drawing of the P/V 2. +PV2_TXT.ASC 962 05-10-91 Acii text accompaning PV2_PIC.ASC. +PG_PIC.ASC 1836 07-10-91 Ascii drawing of P/G PCboard +PG_TXT.ASC 1075 07-11-91 Ascii text accompaning PG_PIC.ASC +AVGA_PIC.ASC 1456 06-25-91 Auto VGA board layout & useful info +OS20FIXA.TXT 11200 09-18-92 List of various fixes for OS/2 2.0 +PGX24.TXT 8062 09-18-92 2 NEW ACCELERATOR SuperVGA cards from STB +HSMODHLP.TXT 7743 09-21-92 Information on HIGH-SPEED (9600+) modems +OS2TIPS.TXT 1706 09-21-92 Tips for OS/2 2.0 and PowerGraph with WIN-OS/2 + + +> Total of 14 files (66663 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ GIF Files & VGA Software ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + GRAPHICS FILES, DEMOS, UTILITIES + + DEMO SOFTWARE + +DKBHC.ZIP 62720 04-04-91 DKB 2.10 (Ray Tracer) with high color sup'rt. + This version of DKB supports the STB P/G and + ERGO cards in 256 and 32k colors. +DKBDOC.ZIP 65792 04-04-91 Documentation files for the DKB 2.10 Tracer +DKBDAT.ZIP 67456 04-04-91 Data files for the DKB Ray Tracer (Ver. 2.10). + These are the basic data files and svrl sample + trace data files for the DKB Ray Tracer. +COLORWPG.ZIP 5120 04-29-91 16 color and 256 color WordPerfect graphics +DAZZLE50.ZIP 177181 09-24-92 Dazzle V5.0 - VGA kaleidascope +ATOMS.ZIP 24192 06-22-91 a neat test pattern +KALS.ZIP 15715 10-31-91 Kalidascope program, kind of interesting. +PLASMA1.GIF 101831 11-05-91 "Plasma Landscape" Beautiful GIF + + MISC. DRIVERS and UTILITIES + +SETFONT.ZIP 3001 11-14-91 Setfont - change font size in graphics modes. +SCRNPEAC.ZIP 75136 01-14-92 Windows 3.0 "freeware" screen blanker +CHKVESA.ZIP 4096 10-08-91 CHKVESA V1.1 - checks for VESA on your VGA card. +PBUPDATE.ZIP 58085 01-01-92 Drvs for PC PaintBrush Plus Ver 1.1 +TDVAPI.ZIP 15199 02-22-92 Source code for tdvideo.dll needed file for + Turbo Debugger for Windows under SVGA. + + GIF VIEWERS & UTILITIES + +GIF2BMP.ZIP 22759 05-20-92 GIF to Windows BMP conversion utility +GRABB380.ZIP 111616 05-31-91 GRABBER V3.80 screen capture TSR +NGIF302.ZIP 41308 08-10-91 GIF file viewer will support P/G and other SVGA +VPIC50C.ZIP 140206 09-18-92 Latest GIF/PCX/TGA/etc. viewer w/ many STB drvs. +STBVPCFG.ZIP 1668 09-21-92 VPIC 5.0c Configuration files for many STB cards +PIXFOLIO.ZIP 304315 09-21-92 PixFolio - a Windows 3.x GIF/TGA/PCX/etc. Viewer +NGIF303.ZIP 41344 11-21-91 Newest ver of viewGIF now finds ERGO card + + GIF FILES + +MILL.GIF 238465 03-01-90 (640*480*256) River Mill +PARROT.GIF 57691 01-04-80 (320*200*256) Colorful Parrot +WINTER2H.GIF 753159 05-22-90 (1024*768*256) Winter Scene +TREEFROG.GIF 72704 02-03-91 (640*400*256) Tree Frog +TRITON.GIF 267264 01-24-91 (640*480*256) Surface of Triton, moon of Jupiter +SHUT01.GIF 140288 05-10-91 (640*480*256) Space Shuttle +VIVID3HI.GIF 415391 08-06-91 (1024*768*256) Supurb graphics software sample +VIVID1HI.GIF 316325 08-06-91 (1024*768*256) Another excellent sample + + TARGA (TGA ie. HIGH-color) FILES and VIEWERS + +HICDEMO2.ZIP 373808 12-12-91 TGA viewer w/ picture, for demoing 32k colors + for P/G and ERGO cards. +HICOLDEM.ZIP 215850 12-12-91 TGA viewer w/ picture, for demoing 32k colors + for P/G and ERGO cards. +DISPLAY.ZIP 28653 11-09-92* TARGA (TGA) True Color & High Color viewer for + most STB Video Cards. +DJPEGEX.ZIP 51632 11-07-92* JPEG (JPG) File Viewer for High Color and True + Color for MOST STB Video Cards. +TGA-BALL.ZIP 124096 06-26-92 Sample TGA file of ball: use DISPLAY.ZIP to view +PUPPIES.ZIP 362117 06-14-92 A 32K TARGA-16 file of 2 puppies + + NEW Unsorted material: + +VPIC-STB.ZIP 144510 10-04-92 vpic ver. 5.1 with stb drivers +CFG-VPIC.ZIP 2449 10-04-92 vpic stb drivers +EATMELON.ZIP 276471 10-12-92 VIVID 32K TARGA of boy eating watermelon. +CSHOW850.ZIP 136597 11-06-92* Cshow ver. 8.50 works great w/evolution 24bit + mode +F16SPACE.ZIP 104961 10-14-92 25bit image of f16 traveling through hole +JPDISP.ZIP 54016 10-25-92* Shareware program to display JFIF JPEG files on + WIND-X/HC and Powergraph/ERGO-HC cards +JPEG3386.ZIP 201600 10-25-92* JFIF JPEG compression for 386/486 machines +JPEGV3.ZIP 96896 10-25-92* JFIF JPEG compressor for 8086/'286 machines +PALACE5.JPG 10496 10-27-92* 24 bit raytrace at JPEG Q=5 quality factor +ALAMO.GIF 327424 10-31-92* 640X480X256 JPix VERY NICE +PALACE75.JPG 58240 11-01-92* palace raytrace at JPEG Quality=75 (default) +CHESS.GIF 181362 11-02-92* Award winning gif of contemporary Chess set. +CANYON.GIF 262875 11-02-92* 640x480x256 JPix +LITHOUS2.GIF 649429 11-02-92* 1024x768x256 JPix +PALACE95.JP0 138496 11-04-92* raytrace palace at JPEG quality Q=95, the + original is 922k bytes in size! +PALACE95.JPG 138496 11-01-92* Raytrace of Palace at 95% + +> Total of 50 files (7540501 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ PowerGraph & ERGO (/MC) Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + POWERGRAPH, ERGO, POWERVIEW, and ERGO/MC (ie. ET4000 boards) + + Abreviations: + P/G = PowerGraph + P/V = PowerView + ERGO = PowerGraph ERGO, PowerGraph Combo, and ERGO-VGA/MC + drvs = display drivers + + + POWERGRAPH ERGO & ERGO-VGA/MC (note: can also use POWERGRAPH drvs) + +RAPIDBIO.ZIP 4954 09-15-92 Updated (9-15-92) RapidBIOS for ERGO. +PGEGEM.ZIP 58683 10-28-91 Gem 2.2/3.0/3.1 drvs for the ERGO +PGELOTUS.ZIP 6542 10-28-91 ERGO text drvs for Lotus ver 2.x. +PGERIXAI.ZIP 50021 10-25-91 8514/A emulation drvs for P/G & ERGO +PGEUTIL.ZIP 42931 10-25-91 Utilities (setmode, demo, etc) for the ERGO. +PGEVEN.ZIP 60806 10-28-91 Ventura 2.0 drvs for the ERGO. +PGEWP.ZIP 9646 10-25-91 Word Perfect 5.0 & 5.1 dvrs for ERGO. +PGEWRDS.ZIP 39545 10-25-91 WordStar 5.5 and 6.0a-6.0d drvs for ERGO + + POWERGRAPH (can use most generic ET4000 drvs and most ERGO drvs) + +PGACAD.ZIP 24271 10-28-91 AutoCAD 9/10 drvs for the P/G +PGGEM.ZIP 115361 10-28-91 Gem 2.2/3.0/3.1 drvs for the P/G. +PGLOTUS.ZIP 6542 10-28-91 Text drvs for the P/G & Lotus 2.x. +PGOS2-20.ZIP 296133 07-08-92 OS/2 2.0 Pre-Release ET4000 16 color drvs! +PGRIXAI.ZIP 48402 01-27-92 8514/A emulation drvs for the P/G. +PGUTIL.ZIP 41744 10-28-91 P/G utilities ( setmode,rapidbio, etc) +PGVEN.ZIP 60806 10-28-91 Ventura 2.0 drvs for the P/G. +PGWIN386.ZIP 110481 10-28-91 Windows 286/386 drvs for the P/G. +PGWRDPRF.ZIP 9646 10-28-91 P/G drvs for WordPerfect 4.2/5.0/5.1.*5/30/91* +PGWRDST.ZIP 39516 01-27-92 P/G drvs for WordStar 5.5 & 6.0a-6.0d. + + POWERVIEW (can use some P/G drvs and some Generic ET4000 drvs) + +PVACAD.ZIP 24236 10-28-91 AutoCAD 9/10 drvs for the P/V. +PVGEM.ZIP 115367 10-28-91 Gem 2.2/3.0/3.1 drvs for the P/V. +PVLOTUS.ZIP 6542 10-28-91 Text drvs for Lotus 2.x and the P/V. +PVUTIL.ZIP 26552 10-28-91 P/V utilities ( Setmode, Rapidbio, ect) +PVVEN.ZIP 60804 10-28-91 Ventura 2.0 drvs for the P/V. +PVWIN386.ZIP 110479 10-28-91 Windows 286/386 drvs for the P/V. +PVWIN31.ZIP 603131 11-11-92* Windows 3.1 Drivers for PowerView and 512k + PowerGraph. +PVWRDPRF.ZIP 9645 10-28-91 PoweerView drvs for WordPerfect 4.2/5.0/5.1. + + GENERIC ET4000 Drivers for P/G, P/V, & ERGO + +DEMOSRC1.ZIP 54966 10-29-91 Demo source code for ET4000 based STB products. + Compiled with MS compiler but may work with + others. +PANARND.ZIP 177001 01-16-92 Latest (1-16-92) AutoCAD r.11 protected-mode + drvs from Panacea for P/G, ERGO, and ERGO/MC +STBWIN3.ZIP 429605 02-20-92 Windows 3.0 drvs for P/G, P/V, and ERGO cards + NOT for Windows 3.1, see PGWIN31.ZIP for that. + (1/15/92) +VESACADD.ZIP 29696 03-04-91 Generic CADD 3D VESA drvs for P/G, P/V & 800/16 +VTGA.ZIP 13653 10-29-91 TGA viewer supporting Sierra High Color DAC. +SVGABG15.ZIP 12080 06-03-91 Super VGA Borland BGI drvs for many cards, + including Tseng ET3000 (EM-16) and ET4000 (P/G + & ERGO) +CKVESA.ZIP 103656 10-31-91 CADKEY VESA drvs - may work w/ ET4000-based + + + MICROSOFT WINDOWS 3.0/3.1 DRIVERS FOR P/G, P/V, and ERGO cards! + +PGWIN31.ZIP 1024276 06-17-92 Windows 3.0/3.1 drvs for P/G, P/V, & ERGO. + FULL SET of drivers including ALL resolutions + (6-17-92) + + + BROKEN-UP version of WIN 3.0/3.1 drvs for P/G, P/V, & ERGO + +PVWIN31.ZIP 603131 11-11-92* Windows 3.1 Drivers for PowerView and 512k + PowerGraph. Doesn't have 256 color or greater + for higher than 640x480. +PGWIN31F.ZIP 433390 06-17-92 Win 3.1 P/G drvs - Font and Support files only +PGWIN314.ZIP 80561 06-17-92 640x480 drvs -- must have PGWIN31F too! +PGWIN316.ZIP 250756 06-17-92 800x600 drvs -- must have PGWIN31F too! +PGWIN317.ZIP 168843 06-17-92 1024x768 drvs -- must have PGWIN31F too! +PGWIN311.ZIP 91217 06-17-92 1280x1024 dvs -- must have PGWIN31F too! + + + SCREEN CENTERING UTILITIES for ET4000-Based Cards + +CENTRE7.ZIP 45774 11-27-91 Centering utility for ET4000 cards. +PGESNUTL.ZIP 11885 10-25-91 Screen centering utilities for ERGO, includes + 75Hz.com, 70Hz.com, & others. +HZTSR.ZIP 8660 11-14-91 Assorted screen centering utilities for ET4000 + cards (P/G, ERGO, etc.) +REL9514.ZIP 3945 10-31-91 TSR for Relisys 9514 monitor & P/G/ERGO at + 1024x768 16 and 256 color interlaced. +HICOLR.ZIP 1977 01-28-92 TSR to reduce flicker at 800x600x32k with the + P/G & ERGO cards used with NON-ERGO monitors. + NOTE! FIRST read the READ.ME file! + +> Total of 45 files (5527858 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ WIND/X & 1280 GrxSys Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + WIND/X GUI Accelerator FILES + +FASTWIN3.EXE STORED OFF-LINE FILE WAS REPLACED BY WDXWIN31.ZIP (new version + 1.2) +WDXWIN31.ZIP 954183 11-18-92* WIND/X Windows 3.0/3.1 drivers (by STB) release + 1.2 (use "-D" to build subdirs when + decompressing) +WDEMO.ZIP 32372 08-10-92 WIND/X DEMO program for testing with +WDXAC_11.ZIP STORED OFF-LINE FILE WAS REPLACED BY WDXACD11.ZIP (new version) +WDXACD11.ZIP 32499 11-18-92* AutoCAD r.11 prot-mode drivers for WIND/X +WDXACDOS.ZIP STORED OFF-LINE FILE WAS REPLACED BY WDXADC10.ZIP (new version) +WDXACD10.ZIP 20449 11-18-92* AutoCAD r.9/10 ADI driver for WIND/X +WDXVERCD.ZIP 26771 11-18-92* VersaCAD drivers for WIND/X +WDXWRD5.ZIP 14758 11-18-92* MS-Word 5.0 drvs for WIND/X +WDXWP51.ZIP 8343 11-18-92* WordPerfect 5.0/5.1 drvs for WIND/X +WDXL123.ZIP 27121 11-18-92* Lotus 1-2-3 rel 2.0 drvs for WIND/X +WDXCV.ZIP 9174 11-18-92* CADvance 3.50 drvs for WIND/X +WDXMSPC.ZIP 10626 11-18-92* MicroStation PC drvs for WIND/X +WDXGCADD.ZIP 9794 11-18-92* Generic CADD 1.1 lvls 1-3 drvs for WIND/X +WDXUTIL.ZIP 10197 11-18-92* Utilities (setmode & rapidbio) for WIND/X +WDXGEM.ZIP 32493 11-18-92* GEM drvs for WIND/X +WDXVEN.ZIP 32344 11-18-92* Ventura Publisher drvs for WIND/X +WXCADKEY.ZIP 17199 03-04-92 CADKEY & DataCAD drvs for WIND/X +README.SCO 768 12-17-91 Fix for using the WIND/X card with SCO S/W +UNIX.SH 16000 12-18-91 Patch for all versions of SCO Unix to fix boot + problems with WIND/X + + 1280 Graphics System 8514/a Compatible Accelerator FILES + + NOTE! The utilities for the 1280 VGA Module are identical to the + QuickVGA drivers (see the QuickVGA file area). + +1280OS2.ZIP 706 06-17-92 Init program for OS/2 and 1280 GrxSys +1280ACAD.ZIP 84046 06-17-92 AutoCAD ADI 4.0 (rel 9-11) drvs for 1280 GrxSys +1280WIN3.ZIP 442231 07-02-92 NEW Windows 3.0/3.1 drvs for 1280 GrxSys +1280UTIL.ZIP 55236 06-17-92 Utilities for 1280 Graphics System. Includes: + SETUP480 - sets refresh for you monitor + GOCOLOR - force to color mode vs. mono mode + AI8 and AI4 - 8514/a interface drivers + TREES, BOXES, MOTION *fast* demos use w/ AI8 + + +> Total of 21 files (1837310 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ MVP Multi-VGA Card Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + MVP Multi-VGA port and Channel-4 NTSC cards + + NOTE: Many of the drivers for the MVP products are SOLD SEPERATELY and + are not availible as free downloads from STB. These include the + four-screen Windows and OS/2 drivers and AutoCAD 2 Screen Deluxe + Display List driver. If you're interested in these drivers, + please contact STB Sales or Tech Support. 214-234-8750. + +MVP2DEMO.ZIP 39617 02-26-92 Setmode & Demo for the MVP-2. +MVP2OS2.ZIP 259166 02-26-92 OS/2 1.2 & 1.3 drvs for the MVP-2. +MVP2UTIL.ZIP 15858 02-26-92 Utilities (MVPDV, MVPHK, ect.) for the MVP-2. +MVP2WIN3.ZIP 350839 02-26-92 Windows 3.0 drvs for the MVP-2. +MVP2WN31.ZIP 638923 07-29-92 NEW! Windows 3.1 drvs for the MVP-2. +MVPUTIL.ZIP 53858 10-16-92 Utilies/Demo for the MVP-4. +HOTSYNC.ZIP 1920 11-21-91 Hotsync 1.00 - TSR syncronizes vertical sync + signal on MVP-4 +HOTSYNC2.ZIP 1961 11-17-92* NEW Hotsync 1.01 - TSR synchronizes vertical + sync signal on MVP-4 and MVP-2 cards. +MVP16BIT.COM 52 04-03-92 Patch for MVP cards to run multiple MVP's 16-bit +MVPSEL.ZIP 4454 05-15-92 MVP-Select: util to select the port to view on + +MV2OS2-7.ZIP 356903 07-08-92 OS/2 2.0 Drivers 1024x768x16 for MVP-2 & MC +MV2OS2-6.ZIP 265844 07-08-92 OS/2 2.0 Drivers 800x600x16 for MVP-2 & MC +MV2OS2-4.ZIP 265760 07-08-92 OS/2 2.0 Drivers 640x480x16 for MVP-2 & MC +MVP2OS22.ZIP 885131 07-08-92 OS/2 2.0 Drivers ALL RESOLUTIONS for MVP-2 & MC + +CHAN4UTL.ZIP 24131 08-05-92 Channel-4 (4-screen NTSC card) Utilities + + +> Total of 15 files (3164417 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ TV-GRX & MultiMedia Cards ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + TV-GRX & Multi-Media Cards + +TVGRXUTL.ZIP 54007 02-26-92 TV/Grx utilities for DOS & Windows 3.0. +TVGRX15.ZIP 54151 07-08-92 NEW Updated TV-GRX Software version 1.5. + + +> Total of 2 files (108158 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ QuickVGA Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + QUICK-VGA DRIVERS (also for 1280 VGA Module and Quick-Combo) + +450DOC.ZIP 47987 06-01-92 QuickVGA DRIVERS DOCUMENTATION +450DISK1.ZIP STORED OFF-LINE QuickVGA DRIVERS DISK 1 +450DISK2.ZIP 447969 09-24-92 QuickVGA DRIVERS DISK 2 + + Either get all of the above for QuickVGA disks, OR... + get one or more of the following which is the SAME DRIVERS + as found in the DISK version above! + +450ACAD.ZIP 136987 06-01-92 QuickVGA AutoCAD 9, 10, and 11 ADI drvs +450CDKEY.ZIP 12163 06-01-92 QuickVGA CADKey drvs +450CDVNC.ZIP 18236 06-01-92 QuickVGA CADvance drvs +450FW3.ZIP 9887 06-01-92 QuickVGA FrameWork 3 drvs +450GEM3.ZIP 36896 06-01-92 QuickVGA GEM 3 drvs +450GENCD.ZIP 6641 06-01-92 QuickVGA Generic CADD level 3 drvs +450LOTUS.ZIP 7220 06-01-92 QuickVGA Lotus 1-2-3, Symphony drvs +450OS2PM.ZIP 194284 06-01-92 QuickVGA OS/2 1.21 and 1.3 PM drvs +450SCOOD.ZIP 4754 06-01-92 QuickVGA SCO Unix Open DeskTop Drvs +450SETUP.ZIP 24089 06-01-92 QuickVGA SETUP pgm (must build dsks to use) +450UTIL.ZIP 30757 06-01-92 QuickVGA Utilities +450VCAD.ZIP 26160 06-01-92 QuickVGA VersaCAD drvs +450VESA.ZIP 29855 06-01-92 QuickVGA VESA utilities/drivers +450WIN3X.ZIP 423297 06-01-92 QuickVGA Windows 3.x drvs +450WORD5.ZIP 13442 06-01-92 QuickVGA MS-Word 5.0 drvs +450WRD55.ZIP 15356 06-01-92 QuickVGA MS-Word 5.5 drvs +450WP50.ZIP 6051 06-01-92 QuickVGA WordPerfect 5.0 drvs +450WP51.ZIP 10808 06-01-92 QuickVGA WordPerfect 5.1 drvs + + +> Total of 20 files (1502839 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Extra/EM & EM-16 Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + DRIVER FILES FOR STB EXTRA/EM & EM-16 (TSENG ET3000 CARDS) + +ET3KWN31.ZIP 595161 05-08-92 Tseng ET3000 drivers for Windows 3.1 +EMWIN3.ZIP 142290 10-30-91 Tseng ET3000 drivers for Windows 3.0 (not 3.1) +ET3WIN3.ZIP 175315 10-31-91 BETA (untested) Tseng ET3000 Windows 3.0 drvs +EMWN386.ZIP 120463 10-30-91 Tseng ET3000 drivers for Windows 2.xx/286 & 386 +EMUTIL.ZIP 94244 10-30-91 Utilities for the VGA Extra/EM & VGA EM/16 +DEMO304.ZIP 58437 10-30-91 Demo source code for ET3000 based boards rv 3.04 +EMACAD.ZIP 34939 10-09-91 AutoCAD rel 9 & 10 drivers for Extra/EM & EM-16 +EMGEMDRV.ZIP 115800 10-09-91 GEM 2.2, 3.0, 3.1 drivers for Extra/EM & EM-16 +EMLOTUS.ZIP 5259 10-09-91 Lotus 123 ver 2.x drivers for Extra/EM and EM-16 +EMVPDRV.ZIP 113820 10-09-91 Ventura 1.1 & 2.0 drivers for Extra/EM and EM-16 +STB-VESA.ZIP 2744 08-04-92 STB VESA TSR for the EMs and older PowerVGAs. + Adds VESA modes to non-VESA BIOSes. + + +> Total of 11 files (1458472 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ AutoVGA & AVGA/16 Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + AutoVGA and AVGA/16 FILES + +AV16AC10.ZIP 114704 08-14-91 AutoCAD 9&10 AutoSHADE & AutoSKETCH drvs AVGA/16 +AV16AC11.ZIP 18909 08-14-91 AutoCAD r11, AutoSHADE & AutoSKETCH drvs AVGA/16 +AV16GCAD.ZIP 17712 08-14-91 Generic CADD v1.1 drivers for the AVGA/16. +AV16GEM3.ZIP 77680 08-14-91 GEM v3.0 drvs for the AVGA/16. +AV16L123.ZIP 11317 08-14-91 Lotus, Symphony & ReportWriter drvs for AVGA/16 +AV16OCAD.ZIP 18606 08-14-91 OrCAD v3.22 drivers for the AVGA/16. +AV16UTIL.ZIP 36986 08-14-91 Utilities/Demo for the AVGA/16. +AV16VP2.ZIP 87392 08-14-91 Ventura 2.0 drvs for the AVGA/16. +AV16W30.ZIP 131644 08-14-91 Windows 3.0 driver for the AVGA/16. +AV16WP.ZIP 3950 08-14-91 WordPerfect 5.1 drivers for the AVGA/16. + +AVGAACAD.ZIP 46977 10-30-91 AutoCAD drvs for the Auto VGA +AVGAGEM3.ZIP 52195 10-30-91 Gem 3.x drvs for the Auto VGA. +AVGAL123.ZIP 11317 10-30-91 Lotus 2.x and lower drvs Auto VGA. +AVGAUTIL.ZIP 37460 10-30-91 Utilities/Demo for the AutoVGA. +AVGAVP_2.ZIP 61075 10-30-91 Ventura 2.0 drvs for the Auto VGA. +AVGAW286.ZIP 48949 10-30-91 Windows 2.xx/286 drvs for the Auto VGA. +AVGAW30.ZIP 79897 10-30-91 Windows 3.0 drivers for the Auto VGA. +AVGAW386.ZIP 206334 10-30-91 Windows 2.xx/386 drvs for the Auto VGA. + + +> Total of 18 files (1063104 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ VGA 800/16 Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + VGA 800/16 FILES + + (see the BETA files section for some BETA 800/16 drivers) + +800ACAD.ZIP 90288 10-30-91 AutoCAD rel 9 & 10 drvs for the VGA 800/16. +800FW2.ZIP 11559 10-30-91 Framework II rel 1.0 drvs for the VGA 800/16. +800GEM2.ZIP 56443 10-30-91 Gem 2.2 drvs for the VGA 800/16. +800GEM3.ZIP 37297 10-30-91 Gem 3.0 drvs for the VGA 800/16. +800LOTUS.ZIP 5606 10-30-91 Lotus 2.x drvs for the VGA 800/16. +800UTIL.ZIP 41383 10-30-91 Utilities/Demo for the VGA 8000/16. +800VEN1.ZIP 108449 10-30-91 Ventura 1.0,1.1 drvs for the VGA 800/16. +800VEN2.ZIP 34941 10-30-91 Ventura 2.0 drvs for the VGA 800/16. +800WIN3.ZIP 49066 10-30-91 Windows 3.0 drivers for the VGA 800/16. +800WN386.ZIP 102315 10-30-91 Window 2.xx/286 & 386 drvs for the VGA 800/16 +800WP50.ZIP 2275 10-30-91 WordPerfect 5.0 drvs for the VGA 800/16. + + +> Total of 11 files (539622 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Evolution, Mach 512, & A1VGA ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + AVGA1 (A1), MACH-512 (A2), and EVOLUTION VGA (A3) CARD FILES + +A1WIN31.ZIP 87040 05-08-92 AVGA1 Drivers for Windows 3.1 + +A2WIN31.ZIP 214656 05-08-92 AVGA2 Drivers for Windows 3.1 for MACH-512 + +16MWATER.ZIP 702969 08-07-92 16 Million Color DEMO for Evolution VGA! +EVOLDSK1.ZIP 918175 10-01-92 Evolution VGA Utilities/Drivers rel. 1.1 DISK + ONE (use pkunzip -d to build subdirs when + decompressing) +EVOLWIN3.ZIP 608696 10-01-92 Evolution VGA Windows 3.0/3.1 Drivers rel. 1.1 + DISK TWO (use pkunzip -d to build subdirs when + decompressing) +EVOL-OS2.ZIP 287426 10-01-92 Evolution VGA OS/2 2.0 Drivers rel. 1.0 DISK + THREE (use pkunzip -d to build subdirs when + decompressing) + + The following files are individual drivers from EVOLDSK1.ZIP. + If you get that file, you do not need to download any of these files. + +A3CLUTIL.ZIP 136832 10-01-92 A3 Cirrus Logic Utilities (to set monitor type + & video modes) (also in EVOLDSK1.ZIP) +A3MISC.ZIP 1495 10-01-92 A3 Misc Drivers (also in EVOLDSK1.ZIP) +A33DS.ZIP 175319 10-01-92 A3 3D-Studio (also in EVOLDSK1.ZIP) +A3ACAD.ZIP 151840 10-01-92 A3 AutoCAD rel. 9 & 10 (also in EVOLDSK1.ZIP) +A3ACAD12.ZIP 175319 10-01-92 A3 AutoCAD rel. 12 (also in EVOLDSK1.ZIP) +A3ACAD11.ZIP 175319 10-01-92 A3 AutoCAD rel. 11 & 10/386 (also in + EVOLDSK1.ZIP) +A3SHADE1.ZIP 151840 10-01-92 A3 AutoShade rel 1 (also in EVOLDSK1.ZIP) +A3SHADE2.ZIP 175319 10-01-92 A3 AutoShade rel 2 (also in EVOLDSK1.ZIP) +A3SKETCH.ZIP 151840 10-01-92 A3 AutoSketch (also in EVOLDSK1.ZIP) +A3FW3.ZIP 9397 10-01-92 A3 FrameWork III (also in EVOLDSK1.ZIP) +A3123.ZIP 4071 10-01-92 A3 Lotus 1-2-3 rel. 2.x (also in EVOLDSK1.ZIP) +A3123R3.ZIP 36147 10-01-92 A3 Lotus 1-2-3 rel. 3 (also in EVOLDSK1.ZIP) +A3GEM3VP.ZIP 61340 10-01-92 A3 GEM/3 and Ventura Publisher 2.x & 3.x (also + in EVOLDSK1.ZIP) +A3PCAD.ZIP 13813 10-01-92 A3 PCAD (also in EVOLDSK1.ZIP) +A3VCD386.ZIP 12333 10-01-92 A3 VersaCAD/386 (also in EVOLDSK1.ZIP) +A3VRSCAD.ZIP 10738 10-01-92 A3 VersaCAD (also in EVOLDSK1.ZIP) +A3WORD5.ZIP 12576 10-01-92 A3 MS-Word 5 (also in EVOLDSK1.ZIP) +A3WP50.ZIP 1679 10-01-92 A3 WordPerfect 5.0 (also in EVOLDSK1.ZIP) +A3WP51.ZIP 6588 10-01-92 A3 WordPerfect 5.1 (also in EVOLDSK1.ZIP) +A3WS.ZIP 44867 10-01-92 A3 WordStar 4.x-6.x (also in EVOLDSK1.ZIP) +A3WS2.ZIP 44867 10-01-92 A3 WordStar 2000 (also in EVOLDSK1.ZIP) + +> Total of 27 files (4372501 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ MicroChannel Card ADF Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + MICROCHANNEL *.ADF FILES FOR STB MC CARDS + + NOTICE: + + The ERGO-VGA/MC is compatible with the PowerGraph and PowerGraph ERGO + drivers found in a different section on the board. The MVP-2/MC is + compatible with the MVP-2 drivers found in another section. + +ERGODADF.ZIP 975 02-27-92 Ergo/MC Dual port ADF file for MVP-2/MC. +ERGOSADF.ZIP 1220 02-27-92 Ergo/MC Single port ADF file for ERGO-VGA/MC. +EMC-UTIL.ZIP 43865 05-20-92 ERGO-VGA/MC Utilities (with latest ADF file) +ADF.ZIP 1204 09-18-91 ADF file for Serial/Parallel 2 + + +> Total of 4 files (47264 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Other VGA Cards ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + OTHER VGA CARDS (ie. ones that don't have thier own area) + +640UTIL.ZIP 41339 10-30-91 VGA 640 utilities/Demo. +VGAEX1.ZIP 121599 10-30-91 Drvs/utils for VGA Extra 3/4 length w/ 1.39 BIOS +VGAEX2.ZIP 266152 10-30-91 Drvs/utils for VGA Extra 1/2 length w/ 1.55 BIOS + + +> Total of 3 files (429090 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Older (CGA/EGA/MDA) Video ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + OLDER VIDEO CARDS (ie. EGA/CGA/Mono) + +4OTFALL.ZIP 154552 08-22-91 Utils/Drivers for 4-On-The-Floor EGA adapter. +RD4OTFSW.ZIP 32986 09-18-91 4-on-the-floor switchless sample source. + +AEGAUTIL.ZIP 38224 10-30-91 Utilities for the AutoEGA. +MR2ACAD.ZIP 48728 10-30-91 AutoCAD v2.62 drvs for the Multi-Res II. +MR2ALL.ZIP 255109 10-30-91 All drvs & utils mentioned above, for the MR2 +MR2UTIL.ZIP 62652 10-30-91 Utilities & demo for the Multi-Res II. +MR2WIN.ZIP 61113 10-30-91 Windows 2.xx/286 & 386 drvs for the MR-2. +MR2WIN3.ZIP 102170 10-30-91 Windows 3.0 drvs for the Multi-RES II. +VGAMASK.ZIP 1198 10-30-91 TSR to disable VGA regs on AutoEGA & MR II, + used to fool some auto-detect software that + think it's a VGA card. + +CHHTL123.ZIP 35896 11-04-91 Chauffeur HT Lotus 1.x & 2.x txt/grx drvs. +CHHTUTIL.ZIP 85415 11-04-91 Chauffeur HT utilities/demo +CHHTWIN1.ZIP 8104 11-04-91 Chauffeur HT Windows 1.x drivers. + + +> Total of 12 files (886147 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Memory & I/O Card Files ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + MEMORY CARDS + +MEMCOMP.ZIP 22739 10-31-91 Memory drvs for the Memory Companion/PC. +PMUTIL.ZIP 147504 10-31-91 Setup Util for PowerMEG - works the RapidMEG. + NOTE: Disable ALL Memory Managers & Disk Cache + before running! +PM_V102.ZIP 147941 10-31-91 *BETA* release of PMSETUP v 1.02 utility. + NOTE: Disable ALL Memory Managers & Disk Cache + before running! +RMUTIL.ZIP 109898 10-31-91 Setup utilities for the RapidMEG. + + I/O CARDS + +CLOCK.ZIP 10251 10-31-91 STB clock utilities for older boards. + + +> Total of 5 files (438333 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ *BETA* Test Files (Untested!) ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + *BETA* TEST DRIVERS AND FILES (ie. not fully tested by STB) + +S3WIN31.ZIP 1123647 10-29-92* *BETA* WIND/X Windows 3.1 drvs ver. 1.51 from + S3 (ie. not STB) Use PKUNZIP -D to build + sub-dirs when you decompress. Fix for Aldus PM + 4.0. + +S3CADKEY.ZIP 11770 10-26-92* CADKey drivers for WIND/X (BETA!) +S3CADVNC.ZIP 6680 10-26-92* CADVance drivers for WIND/X (BETA!) +S3GENCAD.ZIP 8204 10-26-92* Generic CADD drivers for WIND/X (BETA!) +S3LOTUS.ZIP 26050 10-26-92* Lotus 1-2-3 drivers for WIND/X (BETA!) +S3MSWORD.ZIP 13995 10-26-92* MS-Word drivers for WIND/X (BETA!) +S3PADI41.ZIP 31553 10-26-92* AutoCAD R11 Protected-mode ADI 4.1 driver for + WIND/X (BETA!) +S3RADI41.ZIP 18490 10-26-92* AutoCAD R9/10 Real-mode ADI driver for WIND/X + (BETA!) +S3USTATN.ZIP 8050 10-26-92* MicroStation drivers for WIND/X (BETA!) +S3VRSCAD.ZIP 26771 10-26-92* VersaCAD drivers for WIND/X (BETA!) +S3WRDPRF.ZIP 7558 10-26-92* Word Perfect drivers for WIND/X (BETA!) + +L123BETA.ZIP 39127 12-27-91 *BETA* Lotus 123 r.2.2 & r.2.3 drvs for ET4000 +OS2BETA.ZIP 62633 10-29-91 *BETA* 800x600 OS/2 PM 1.3 drvs for P/G,P/V,ERGO +OS2BETA2.ZIP 168300 10-29-91 EARLIER *BETA* OS/2 PM 1.2 drvs for ET4000 + based boards. (1024x768 & 800x600, 16 colors) +STBAPP.ZIP 39541 10-29-91 *BETA* Wordstar APP drvs for P/V, P/G, ERGO + + + BETA TEST of CHIPS & TECHNOLOGIES (VGA 800/16) DRIVERS + +DRVRDOCS.ZIP 147169 05-20-92 DOCUMENTATION files for the BETA C&T Drivers +CT-ACAD.ZIP 116409 05-20-92 BETA C&T AutoCAD drvs used with VGA 800/16 +CT-CAD.ZIP 32438 05-20-92 BETA C&T asst'd CAD drvs used with VGA 800/16 +CT-GEMVP.ZIP 223158 05-20-92 BETA C&T Gem/Ventura drvs used with VGA 800/16 +CT-PM12.ZIP 61179 05-20-92 BETA C&T OS/2 drvs used with VGA 800/16 +CT-WIN3.ZIP 48939 05-20-92 BETA C&T Windows 3.0 drvs used with VGA 800/16 + + + BETA TEST of CIRRUS LOGIC 5320 DRIVERS + +5320TXT.ZIP 51972 01-10-92 Text files about the BETA Cirrus 5320 drivers + ie. driver installation instructions. +5320INST.ZIP 86104 01-10-92 BETA Drv setup util for for CL 5320 disks will + have to rebuild the disks to use this. +WIN30DRV.ZIP 130048 03-14-91 BETA Cirrus Logic Windows 3.0 NEW VDD drivers +5320ACAD.ZIP 23250 01-10-92 BETA AutoDESK ADI driver for ACAD v9,v10 +5320ACDP.ZIP 18626 01-10-92 BETA Protected-mode drvs for ACAD & CL5320 +5320ASHP.ZIP 11809 01-10-92 BETA drvs, Protected-mode AutoShade +5320CLU.ZIP 61107 01-10-92 BETA Cirrus Logic VGA utils +5320CV.ZIP 8149 01-10-92 BETA drvs for Cadvance v4.x +5320FW3.ZIP 4031 01-10-92 BETA drvs for Framework III v 3.0 +5320GCAD.ZIP 5868 01-10-92 BETA drv for Generic CADD v 1.x +5320GEM3.ZIP 25801 01-10-92 BETA drvs for GEM/3 v3.x +5320L123.ZIP 5705 01-10-92 BETA drv for Lotus 123/Symphony/Report Writer +5320PCAD.ZIP 6888 01-10-92 BETA drvs for PCAD v4.5 +5320PM4.ZIP 70390 01-10-92 BETA drvs for Pagemaker 4.0 +5320SCO.ZIP 2252 01-10-92 BETA drvs for SCO Open Desktop v1.1 +5320VESA.ZIP 1509 01-10-92 BETA VESA BIOS Extensions for the CL 5320 +5320VP2.ZIP 34413 01-10-92 BETA Ventura Publisher 2.x drvs +5320W386.ZIP 102727 01-10-92 BETA drvs for Windows/386 2.xx +5320WIN3.ZIP 56838 01-10-92 BETA drvs for Windows 3.0 +5320WORD.ZIP 12296 01-10-92 BETA drvs for Microsoft Word v5.0 & v5.5 +5320WP.ZIP 3810 01-10-92 BETA drvs for WordPerfect 5.1 +OS2_5320.ZIP 66422 01-10-92 BETA OS/2 1.x drvs for CL 5320 + + NEW Untested (really untested) Stuff: + +450WIN3A.ZIP 212997 11-06-92* QuickVGA Windows drvs (BETA!) +450WIN3B.ZIP 212554 11-06-92* QuickVGA Windows drvs (BETA!) + +> Total of 45 files (3437227 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Windows 3.0/3.1 Utils/Apps ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + MS-Windows 3.0/3.1 Utilities/Applications (Shareware & Freeware) + + (Please upload anything you feel is a "must-have" for Windows) + +CLYSB131.ZIP 83741 09-18-92 Clysmic Icon Bar 1.31 - GREAT Progman replacer! +HEARTS.ZIP 66970 07-05-92 Windows 3.x game of card game hearts +SIZEIT.ZIP 11248 09-18-92 Resizes your windows apps each time you run. +SPEAK.EXE 22312 06-19-92 Speaker Driver for WAV's for Windows 3.1 +VBRUN.ZIP 169189 09-18-92 VBRUN.DLL needed for Visual Basic WinApps. +WINSTART.ZIP 8439 09-18-92 Save your Windows desktop for next re-start! +WINTREK2.ZIP 55880 09-18-92 DEMO version of WinTrek 2.0 - Great game! +WINUTILS.ZIP 70025 09-18-92 A collection of good Windows utilities. +BIGDESK.ZIP 39621 09-21-92 BigDesk - increase your virtual Win workspace +WINBENCH.ZIP 46918 09-21-92 PCLabs WinBENCH (older version) Win Benchmarker +PIXFOLIO.ZIP 304315 09-21-92 PixFolio - Win 3.x GIF/TGA/PCX/etc. viewer. + + NEW Unsorted Material + +LANDER.ZIP 24448 10-05-92 Luner Lander for Windows +STELLAR.ZIP 619465 10-06-92 Old Star Trek game rewritten for Windows +WCK30.ZIP 270038 10-13-92 Checkbook for Windows 3.0 +TBEBMP.ZIP 13428 08-20-92 Toolbox Editor icons for Word for Windows 2.0 + (to change the icon bar) + +> Total of 15 files (1806037 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ OS/2 2.0 Utils/Apps ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; + + + OS/2 2.0 Utilities/Applications (shareware & freeware) + + Please upload anything you feel is "must-have" for OS/2 2.0 + +OS2BFIX.ZIP 83038 06-08-92 Contains VSVGA fix and BVHSVGA.DLL fix for + ET4000 & OS/2 2.0. +ELITEIMS.EXE 187020 07-03-92 OS/2 2.0 Multi-line Information Service +MR2_110.ZIP 156951 09-24-92 MR/2 QWK compatible Mail Reader for OS/2 +LISTOS.ZIP 19456 08-16-92 OS/2 version of Vern Buergs popular LIST +OS2FAQ2E.ZIP 25774 09-18-92 Answers to common questions about OS/2 2.0 +OS20FIXA.TXT 11200 09-18-92 List of various fixes for OS/2 2.0 + + NEW Unsorted Material + +OS2TND.ZIP 83792 09-22-92 9/15/92 version IBM's OS/2 Tips & Techniques +LSTPM100.ZIP 83859 10-04-92 PM based list type utility for OS/2 + +> Total of 8 files (651090 bytes) in this area + +ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ +³ Total number of files = 373 Total number of bytes = 40495421 ³ +ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; diff --git a/textfiles.com/bbs/strknkd2.txt b/textfiles.com/bbs/strknkd2.txt new file mode 100644 index 00000000..4c29a45b --- /dev/null +++ b/textfiles.com/bbs/strknkd2.txt @@ -0,0 +1,338 @@ + *********************************************** + STARK NAKED + The Journal of Stark County Telecom + Support BBS: The Dragon's Lair BBS + Running Renegade Beta 216-966-8970 + August 1, 1992 Volume #1, Issue #2 + *********************************************** + + + + + [ Akron Bulletin Board Closed by Authorities ] + + The Akron bulletin board, Akron Anamoly (run by Mark + Lehrer) is no more. After a police sting operation, the BBS + was closed because of "obscene" files online. The Anamoly, + which was known for its vast Fidonet message bases and OS/2 + support, was closed after a parent complained to police + because of the "dirty" GIFs that were available for download. + + The following pieces include capture buffers from Akron boards + discussing the incident as well as the actual news story + concerning it. + + This article is reprinted from the Cleveland [Ohio, USA] Plain Dealer, +Tuesday, July 21, 1992, Page B3 (?). + +*********************************************************************** + +POLICE PULL PLUG ON COMPUTER IN MORALS STING + +Munroe Falls Police Chief Steve Stahl knows computers are big with kids +these days, byt he never thought he'd see the day when a healthy +15-year-old boy would choose a floppy disk over a playboy centerfold. + But now that Stahl's seen some of the floppy disks popular with +local youths, he understands the facscination. + "Give me any kid, I know what he's going to donwload," Stahl said. + In May, Munroe Falls police received a complaint fromn a resident +who feared that a local computerized community byulletin board containing +sexually explicit material might be accessible to children. + Stahl said the resident showed him files called "Alison" and +"Amber," both of which featured naked women. Stahl told the concerned +resident, "Oh well, geez, I can see how that would be upsetting." + For the past two months, police conducted an investigation and +sting using a local 15 year old boy. After the youth was able to hook into +the bulletin board, police arrested Mark Lehrer, 22, owner and operator of +Akron Anomaly, a 1000-member bulletin board. Police also seized all of +Lehrer's computer equipment. + Lehrer is accused of distributing graphic sexual material via a +computer modem from his parent's home in Munore Falls. Lehrer, whose +father is chairman of the village's charter review commission, has been +charged in Cuyahoga Falls municipal court with one count each of +disseminating matter harmful to juveniles and possession of computer [probably +was originally "criminal" -mst] tools +-- in this case, his computer. + A preliminary hearing is scheduled for today. The case will +probably be turned over to a Summit County grand jury. + Lehrer did not return a phone call yesterday. + Stahl said this will be the first case in Northeast Ohio and one +of the first in the state in which an adult is accused of distributing +graphic sexual materials to juveniles via a computer. + "There's not a whole lot of case law on this kind of thing," he +said, adding most material comes from books, magazines, or movies. + According to Stahl, members of Akron Anomaly paid $15 to $30 a year +to link into Lehrer's bulletin board. For that fee, they had access to +games like chess, basketball, and euchre, compouter programming +instructions, and a series of "gif" -- "graphic interface files" [should be +"'graphic information files'" -mst] -- that +feature pictures from James Bond to Captain Kirk to Scooby Doo. + Some are labeled specifically for adults and are not supposed to be +accessible to those under age 18, while many others are contained in a +general file. However, when police seized Lehrer's records they found that +even the "clean" files contained images not entirely wholesome. + "One was Bugs Bunny eating a carrot, one was Bart Simpson riding a +skate board and one was called (a slang term for oral sex) [probably "blow +job" -- drc], and that was in the clean file," Stahl said. + Stahl said many files not listed in the adult category contained +pictures of naked women and of naked women engaged in sexual acts. One +file allegedly shows a nude image of Christina Applegate, who plays Peg on +the television show "Married With Children." + "Parents are happy their kids are upstairs using their computers. +One parent we talked to was thrilled they weren't finding Playboy magazine. +Well, I've got news for them, this is a rude awakening," Stahl said. + In addition to the graphic interface images, juveniles were able to +access adult movies, which are transmitted on color monitors. + +************************************************************************ + +A brief editorial comment: this sucks. +Any comments, please send e-mail, as I don't monitor this group. + +David +-- +=-=-=-=-=-=-=-=-=-=-= THIS MESSAGE IS FROM =-=-=-=-=-=-=-=-=-=-= +| David R. Cohen or Tracey L. Ridgeway | +| bx953@cleveland.freenet.edu | +=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= + +*** + + +Msg # 171 of 184 Date: Fri 7-24-92, 8:43 +From: TERMINATOR Read: 11 times [1 Reply] +To: THE ASSASSIN +Subject: Re: Anomaly + +The Munroe Falls police cooperating with FTC federal trade commision.Sent +the 15 year old on to the system to find such files. +I agree with Mark's lawyer its just a small town police station trying to +gain publicity,and may cause problems for other bbs systems. +Through the grape vine I have heard bulliten board system may be requiring a +license by the city here in the near future,giving them a chance to do +periodical checks of the system at any given time,I think this is unfair and +maybe some of the bulliten boards should go underground to avoid the attack +by the city,this would be for private members only. + + + Terminator + +*** + +Msg # 177 of 184 Date: Sat 7-25-92, 15:44 +From: METAL STORM +To: All +Subject: Akron Anomoly + + + We as BBS user's and some as Sysops should ban together to support this +kind of invasion. I DO NOT agree with such setups as to using a 15 year old +child to find a little bit of incriminating evidence to shut down a BBS that +was not causing any harm to begin with. The Sysop by Federal Regulation is +NOT RESPONSIBLE for the content of his BBS from which users upload this kind +of material. Also the actual theme of The Akron Anomoly BBS was not that of +an X-Rated board. I myself do not download this kind of material because I +feel that it is a little off colored, but I do not aggree with this type of +action. BBS systems all over Akron are in serious threat because of the raid +on AA BBS, and we should all send letters. + + ACT NOW. or you may not be chatting like this in the future. I will post +some address real soon on this message area and others soon. + +Metal Storm... + +Msg # 178 of 184 Date: Sat 7-25-92, 23:17 +From: ALATNA Read: 9 times [1 Reply] +To: METAL STORM +Subject: Re: Akron Anomoly + +I'm all for it. I run a Cleveland BBS and have been in that community for a +while, they've also much threat. Also, if they were hit, there are many +things that could be found there, ranging from satanism (yes, Cleveland DOES +have at least ONE board like that) to Drug Dealing. Maybe some of those +boards should be shut down, but, I believe people have a right to chose and +if they chose to communicate about this stuff online, they shouldn't be +afraid to do so. + +*** + +Msg # 180 of 184 Date: Sun 7-26-92, 4:42 +From: METAL STORM Read: 9 times +To: ALATNA +Subject: Re: Akron Anomoly + + + Well, I feel that using your phone for voice or for data is virtually the +same. Having someone put restrictions on a BBS is like putting restrictions +on your voice conversation with your friend. If the contents of your BBS +were being broadcast so all could see and here then I could see some concern +in that, but online BBS systems do not fall into that category. I do agree +that some of those BBS systems you mentioned should be down because I do not +support anything that is ilegal or immoral but I do have to mention that it +is still basically a phone conversation and should be dealt with as one. + + +Metal Storm... + +*** + +Msg # 182 of 184 Date: Sun 7-26-92, 18:31 +From: THE ASSASSIN Read: 3 times +To: METAL STORM +Subject: Re: Akron Anomoly + +I was chatting with a sysop that knows Mark (the Sysop of Anomaly) and he +said that Mark had been warned several times. He also said that distribution +of pornographic materials to minors is wrong. No ifs, ands, or buts about +it. It is unfortunate that Mark got in trouble, but he should have been more +careful. And you are sadly mistaken. A sysops responsibility is too the +BOARD, and the ARE responsible for what is uploaded and downloaded, since +they can be put in jail for it. You can now go to prison and be fined +severely for having commercial software on a bbs. If the sysop does not +regulate their files, then they should not have a files section in the first +place. + +The Assassin + + [ ... ] + + Information concerning a sysop effort to put pressure on law + enforcement officials will be featured in further issues of + Stark Naked. Also featured will be specific FCC regulations + concerning adult access for minors, how to protect yourself, + etc. Stay tuned to Stark Naked for further developments on + this story. + + + [ Stark Modem Meeting a "Success" ] + + The Modem Meeting that Swells was held on Sunday, July 26th, + at the Country Manor on West Tusc at 7:30pm. Attendance was + much better than expected with a few surprises. Among the + various users that showed up early included Varicose Brain, + the Sorcerer, Spew Queen, Anarchy, Semidri, Beef Jerky, + Sentinel, the Magister, Sidewinder, Ceasaro, Strider and + Iron Eagle. Later on, the JEW Krew came down from Akron to + visit, bringing Ziltron, The Human Computer and Rattlehead. + A surprise visit by Elminster and Nightstalker added to the + "enjoyment" of the evening. Of course, where Elminster goes + ... the Lion's Pride goes. Rampant Lion, the Joker, Silicon + Mage and Gunslinger showed up with surprisingly few words + for Elminster. Their focus appeared to be on Sentinel, who + was also known for a short while as the Lion Tamer. + + The course of events eventually led to a verbal argument + between Sentinel and TLP, which ended rather peacefully. + Rampant Lion, who was toting a cam-corder (apparently for + a future demo) was heard saying to Sentinel, "Hey, man, I + was just joking around with you," as he was going to his + car. + + The evening came to a startling close around 10:30pm when + the Sorcerer received a phone call from Country Manor, who + wanted the money for his bill! Supposedly, the bills were + switched and the Sorcerer ended up paying for someone else's + meal. + + For the most part, a good time was had by all and hopefully, + future modem meetings will be as much of a success. + + + + [ Canton Connection Censors Newsletter ] + + An Editorial by the Sorcerer + + I hope that what you read in this newsletter is useful + and informative to you. I know that in the research I've + done both for this issue and future issues, I have + learned quite a lot about what is going on around me. + Unfortunately, certain sysops in the Stark area do not + share the same enthusiasm that I do. + + When Stark Naked Issue #1 first came out, I posted it on + the Canton Connection. I received a note (which I thought) + was nasty from Larry, the sysop at Canton Connection. He + said that he didn't want my "modem wars" on his bulletin + board and that I am just making myself look "small." So I + posted a message telling people that the newsletter was in + existence and was available on other bulletin boards. That + message, too, was deleted. Finally, I just posted a + message asking people to send me private e-mail concerning + something that I was not allowed to post publicly about. I + was under the misconception that private e-mail on Canton + Connection was just that -- private. + + Sunday morning when I logged onto Canton Connection, I + was answering numerous e-mail that I had received + concerning the newsletter. In the middle of one of my + replies I was knocked off the bulletin board. Dismissing + it as line trouble or something akin to that, I called + back to find that my ID no longer worked. I was puzzled, + because I didn't think that private e-mail was something + interfered with on Canton Connection. After repeated + attempts of logging on as new, I asked Larry to call me + voice. He did and told me that I was no longer welcome on + Canton Connection. He also said that he wished to talk + to my parents about harrassment charges. However, I told + him that my parents were not home and that I could handle + these situations by myself. He insisted that because I was + a minor I couldn't ... but I did. + + So now I'm stuck off Canton Connection. I can't say it is + that much of a loss to me, though. However, it certainly + does say something for the direction of telecommunications + in this area. It used to be that the free exchange of + information was the key to bulletin boarding. Now it seems + like the only free exchange is that which is approved by + sysops who feel they should decide what their users can + read and can't read. Larry did say one thing: he pays the + bills for Canton Connection. And he's right. He does pay + the bills and it is his board. But the day that sysops + start ignoring user suggestions and start censoring is the + day that I'm happy not to be part of that system. + + I'd like to thank the users that came to my defense on + that system. I've talked to a few of you. The rest of + you ... if you are concerned about the course of events + that is taking place here ... perhaps you should speak to + the sysops of Canton Connection and get their side of the + story as well. + + As for me, I am very disappointed. But, oh well. I'm just + a minor. + + + [ In future issues of Stark Naked ... ] + + In upcoming issues of Stark Naked, we'll be taking a more + in-depth look at the Akron Anamoly incident and how it + affects bulletin boards everywhere, we'll explore Unix and + Internet, we'll be looking at Renegade BBS and its features, + and we'll be talking more about the first anniversary of + the Dragon's Lair BBS. Until then ... speak freely among + yourselves! + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/textfiles.com/bbs/strknkd3.txt b/textfiles.com/bbs/strknkd3.txt new file mode 100644 index 00000000..fa8f6d55 --- /dev/null +++ b/textfiles.com/bbs/strknkd3.txt @@ -0,0 +1,340 @@ + ************************************************************* + STARK NAKED + The Journal of Stark County Telecom + Support BBS: The Dragon's Lair BBS + Running Renegade Beta 216-966-8970 + August 8, 1992 Volume #1, Issue #3 + ************************************************************* + + [ Akron Anomoly Follow-Up: Authorities Crack Down on BBS'es ] + [ A Look at Ohio Law, House Legislation] + + As reported in the last issue of STARK NAKED, the Akron BBS + Akron Anomoly was closed by authorities for offering porno + GIFs to minors. In this issue of STARK NAKED, we'll look at + other cases similar to that in Akron, viewpoints on either + side of the issue, legislation and local efforts concerning + Akron Anomoly. + + This was posted at 8:21am on July 25th by Robert + Nykvist (DCJG12A) on Prodigy's Communications Board. + + SUBJECT: POLICE SEIZED BBS + Mobile Alabama - Police seize sex computer. More than + $10,000 worth of computer equipment and a quantity of + allegeded obscene materials were seized this week after a + search warrant was served at a local residence. The seizure + followed a citizen's complaint of sexually explicit + materials being made available via a computer network that + had public access. No arrests have been made, and an + investigation is continuing. + + ** In response, Prodigy user SPKX39A, David McClain, + posted this on July 28 at 10:52am. + + SUBJECT: POLICE SEIZED BBS + If they are carrying porn, every citizen should point the + finger! There are lots of subjects for a bbs, Porn doesn't + have to be one of them. It is really sad to see that it is + so prevalent in the bbs world. How would one of these people + feel if they just downloaded the latest porn Gif from the + local board, they hurry to get out the old gif viewer, + Sweating, itching with anticipation......the picture comes + up, and there lays there daughter, or mother, or wife... + How would they feel then? + + The following message appeared on PCRelay and gives more + details on the Mobile, Alabama arrest. + + + From : DAVID KAHAN Number : 1241 of 1381 + To : MICHAEL HARRISON Date : 07/27/92 8:53am + Subject : BUSTED BBS Reference : NONE + Read : NO Private : NO + Conf : 018 - [ Sysop ] Relay + + MH>I am a sysop of a bulletin board system in a small town in Alabama about + MH>1 hours drive from Mobile Alabama. I was watching the local Mobile news + MH>tonight and was very upset about a BBS system that was closed down by + MH>local Mobile police. According to the news this system was charging $25 + MH>dollars a year for access to the system. On his system he had an Adult + MH>section, as alot of BBSes do, and had Homosexal material on it. + MH>One of his PAYING users + MH>downloaded of of the pictures and + MH>didn't like the recived image so he called the Police and the system + MH>was shut down and his equipment taken. No charges have of yet been + MH>filled but all his equipment is gone. I do not like Homosexal + MH>activity or .GIFs of it but what gives the Police the right to + MH>take equipment. This , I believe, should be a violation of the first + MH>amendment. After all, the user did not walk into a 7-11 and see it + MH>nor did he turn on the TV and see it. He requested it! As a sysop + MH>myself, I am conserned that a unhappy user can have my equipment + MH>taken. I am no lawer but something seems quit wrong with this + MH>picture. Operation Sunburst comes to mind here. I am righting this to + MH>inform the BBS world what is going on and to see if anyone else has + heard of such a case. + + Mike, I agree with you. This user didn't have to download the file. + Every file should have a description and if he didn't read it + completely, it's his fault for downloading it. + + Reading stuff like that sometimes makes me think. "Do I or don't I want + an adult area?" I know I am very picky on who I allow in my adult areas, + but you never can tell. + + Dave + +--- + MORE BBS (401)849-1874/849-2215 Middletown RI + + This information, also from PCRelay, gives an opinion on + the Alabama incident as well as some more information on + Alabama. + + From : JAY HEYL Number : 1323 of 1381 + To : MICHAEL HARRISON Date : 07/27/92 11:04 + Subject : BUSTED BBS Reference : NONE + Read : NO Private : NO + Conf : 018 - [ Sysop ] Relay + + I personally agree with your thoughts about violation of First + Amendment rights, but the Supreme Court has determined that it's up to + local communities to establish what is considered obscene (not + protected by the First Amendment) and what is not. Alabama has taken + a very limited view of what is protected by the First Amendment as far + as explicit sexual images are concerned. They have effectively shut + down at least one former "adult" satellite TV operation because this + company was beaming their signal into Alabama. (Sending obscene + material across the state line.) Never mind that the only people who + could view this signal had to have a decoder rented from the company. + As for why the police can confiscate the equipment, that's been + discussed ad naseum in this forum. Suffice it to say that if the + police had a valid search warrant and deemed that there was sufficient + evidence to indicate a crime had been committed (distribution of + obscene material in this case), they are within their rights to + confiscate the equipment to use as evidence. If the sysop is not + found guilty of a crime, his equipment should be returned after it is + no longer needed as evidence. (SHOULD is the operative term here, but + that's a whole 'nother discussion.) + +--- + þ SPEED 1.10 #1054 þ The Cookie Jar þ 714.997.0350 þ Running GAP 6.0/M + The Crow's Nest BBS - Monarch Beach, CA + + *** So what exactly can Mark Lehrer be charged with? + This is what the Ohio Criminal Code says about + obscene material. Note that the reference in the + law seem specific to magazine racks and really + aren't in reference to online "porn." + + Ohio Criminal Law [2907.31.1] 2907.311 + "(A) No person who has custody, control, or supervision + of a commercial establishment, with knowledge of the + character or content of the material involved, shall + display at the establishment any material that is harmful + to juveniles and that is open in view by juveniles as + part of the invited general public. + (B) It is not a violation of division (A) of this + section if the material in question is displayed by + placing it behind `blinder racks' or similar devices + that cover at least the lower two-thirds of the material, + if the material in question is wrapped or placed behind + the counter, or if the material in question otherwise is + covered or located so that the portion that is harmful to + juveniles is not open to the view of juveniles. + (C) Whoever violates this section is guilty of displaying + matter harmful to juveniles, a misdemeanor of the first + degree. Each day during which the offender is in violation + of this section constitutes a separate offense." + + Just off of the top of my head (I'm no lawyer), it + seems that 1) the teenager that downloaded these + GIFs had to be a paying user because of the "commercial" + clause, 2) the material was not just in open view, + it had to be downloaded and a proper program run. + + One of the more disturbing things I found while + researching for this article was this interesting + text file from California, courtesy of the Pleasure + Dome BBS. It is a verbatim transcript of a letter + sent to a local sysop. In it are some scary things + especially from a sysop's end. + + Read some of the things in it and think about what + these people are saying. + + "From: The National Coalition Against Pornography "Standing Together" + Newsletter. Community Action Column, March-April 1990" + + "Computer pornography? It's Everywhere...." + by Christine Marshall + + "CHILD MOLESTER NETWORKS + + Apparently, the U.S. Customs Agency has been aware of and investigating + adult BBS's for some time. Obscene BBS programs that originate in other + countries and are illegally imported, are being used by American computer + hobbyists. The privately used foreign programs are now breaking + obscenity laws and causing damage through computer networks across + the country. U.S. Customs has learned that many of the BBS's make it + easier for pedophiles to molest children by listing the names and + locations of potential victims-and by encouraging sexual activity with + minors. + + Some of the programs found to this date have come from Germany. U.S. + Customs has been involved in investigations because the importation of + obscene material is prohibited by law. In their investigations, they + have documented the use of these networks by pedophiles as an aid in + molestation of children. + + ACTION STEPS + + When I learned of all this, I immediately wondered what course of action + I could take as a relative "computer-illiterate" and average citizen. + This is what I found that we all can do: + + 1. If you have access to a computer and modem, check your local BBS + networks for adult services. If you find any, notify your sheriff and + the local U.S. Customs agent. Give them as much information as possible + to aid in their investigations. + 2. Let other concerned neighbors and groups know of the existence of + the adult BBS's. Encourage them to join you on Action Step 1. + 3. Write or call the U.S. Customs Agency to encourage them to continue + investigating pornographic BBS's. You can write them at 1301 + Constitution Ave. NW, Washington, DC, 20229, or call (202) 566-8195." + + Those are direct quotes from that article. When I read + about "child-molestation networks" I almost had to laugh, + but then realized exactly what this woman was saying + and what it would do. I read in USA Today that only 33% + of the American population own personal computers. And + of that 33%, most do not own a modem. And of those that + do own a modem, many of them are not active on local + bulletin boards. So when a woman who sounds like she knows + what she is talking about begins to make this allegations, + people believe her. + + + [ Canton Connection Follow-Up: Rearing Our Ugly Heads (ED) ] + + An Editorial by the Sorcerer + + As I told you in the last issue, Canton Connection BBS has + refused to allow this newsletter on their system, for some + reason. And after asking them about it a few times, I was + refused on their system! + + Since then, I'd like to thank the users that have stood up + for me on there. There are many who do not want to have + their names published, but the ones that have let me know + what side they are on include the Lord, Elminster, Electric + Messiah, the Magister, and others. + + When Elminster found out that the newsletter had been deleted, + he posted a public message in the Hello Sig just asking the + sysops to explain why they thought that the newsletter was + unfit for download. The message was deleted. So was Elminster. + + Sanguinius also had poetry deleted in the Poetry Sig. This + news came to me a few days ago and I don't really have any + details on it. + + So Elminster and I thought that we would call up Larry Smith, + co-sysop of Canton Connection, and ask him about Elminster's + account. I was called by Larry right after he deleted me + last Sunday morning but Elm had been given no reason or anything + for his "dismissal." + + We called Larry a few days ago. The conversation was extremely + interesting. Although not verbatim, it went something like, + "Hello, is Larry there?" + "This is Larry." + "Larry, this is the Sorcerer and Elminster. We just want to + talk to you about Elm's account getting deleted." + "This is who?" + "You know, Longshot and Elminster. From your bulletin board." + "I don't run a bulletin board..." + ELM: "You have a modem?" + "A modem? What's that?" + "Uh, Larry, no offense, but we've talked to you before and + we know your voice." + >> CLICK << + + So we called back. + >> CLICK << + + Again, that is not a verbatim account of what happened, but + it is pretty close. I found it interesting that this Larry + Smith that we called knew enough to know that one "runs" a + bulletin board, yet he didn't know what a modem was. Most + people who aren't aware of what a modem is don't know what + a bulletin board is, either. + + So, I take it that we aren't going to get a straight answer + out of the Canton Connection staff. I guess that the users + there will be happy ... until they post something that the + sysops don't like. + + By the way, the number that we called for Larry Smith was + confirmed by three sources. And trust me: it was him. + + At any rate, I would urge everyone that does not believe + that we should put up with censorship on bulletin boards + should ask Larry about their decision. And let us know + what happens. I know that I'm interested. Thanks. + + -The Sorcerer + + [ Making the Rounds: Stark Naked is Getting Around the Area ] + + Imagine my surprise while going through the messages at + Saturday !! BBS to see this post: + + Msg # 77 of 79 Date: Mon 7-27-92, 11:43 pm + From: BRENT WOODFORD + Read: 9 times + To: SYSOP & ALL + Subject: Re: Akron Anamoly? + + I just uploaded a txt file that I got from Triway BBS. It is some sort of a + newsletter from Dragon's Lair BBS. It has a lot of information on the Akron + Anamoly bust. It was a sting operation in which the police co-operated with + a 15 year old for 2 months to bust Mark. They confiscated all of his + equipment. The newsletter also include an article which was in the Plain + Dealer (July 21, I think). Put it on line so it can be downloaded for more + info. + + BAW! + + Again Reply Mail Prev Next Goto Thread Other Quit + + Wow ... wasn't I excited! The newsletter is making its way + around the area! + + + [ Have Something to Say? ... Information on Stark Naked ] + + Got something to say? Want it published? You can send it + to me at the Dragon's Lair BBS. The number is (216) 966-8970 + running Renegade Beta at 3/12/2400, 24 hours a day, 7 days + a week. + + Also, any sysop who would like his/her system to be a + distribution site for Stark Naked should contact me. If I + am a regular user on your system, you can leave me mail there. + + The next issue of Stark Naked will move away from the Canton + Connection line and also a little from the Akron Anomoly line. + New stories will be here. + + Let me know how I am doing! I have gotten a little feedback on + the stuff in Stark Naked Issue #2, but I'd always like to hear + what you have to say. + + I leave you with this SLMR thought: All prosecutors will be + violated. + + + + + diff --git a/textfiles.com/bbs/strknkd4.txt b/textfiles.com/bbs/strknkd4.txt new file mode 100644 index 00000000..af6819d9 --- /dev/null +++ b/textfiles.com/bbs/strknkd4.txt @@ -0,0 +1,420 @@ + ************************************************************* + STARK NAKED + + The Journal of Stark County Telecom + Brought to you by: The Necropolis BBS + (216)/966-8970 (3/12/2400 8N1 24 hrs) + Running Renegade Beta + Located in North Canton, Ohio + Sept 1, 1992 : Volume #1, Issue #3 + >> Now Serving Stark County & Summit County << + ************************************************************* + + [ The Dragon's Lair Goes Back Up: But Exactly Where is It?! ] + [ Stark Naked Resumes Publication] + + As most all bulletin board'ers in the Stark County area + have known, the Dragon's Lair BBS was a private board + all of a sudden one day a couple weeks ago. The reasons + that led to this decision are now prominantly posted in + the Computer Discussion Base there, since it is now back + online for the public. However, users expecting the TDL + are going to be in for quite a surprise! The BBS is no + longer called the Dragon's Lair BBS. The name has been + changed to the Necropolis BBS, which means City of the + Dead. The change was made because of the juvenile + sound of the Dragon's Lair, among other reasons. + + (Ed's Note: Those "adults" who still feel that children + are the only users of the Necropolis BBS should not feel + bad because they can no longer call it "The Kiddie's + Lair" -- we realize that it must have taken hours of + exhaustive creative research to come up with that + zinger. As you know -- because you are adults and are + obviously more educated than an upstart like myself -- + -polis means "city." So you may refer to the board as + the "Kiddie City." Not only does it rhyme, but it gets + the point across. I just didn't want you to spend too + much of your precious adult time thinking up a new one. + Thanks. -- The Sorcerer) + + Changes that brought about the Necropolis BBS include + the entire re-structuring of the file sigs, echoes from + AlterNet, Boondocks Net, PODSNet, conference + re-structure, software support for Apogee Software, + new ANSI screens, Net Runner v1.02 door, Gang Warfare + door by Cott Lang, re-structuring of the message bases, + and other things. Future changes include a 14.4k+ modem, + possibility of a second node, and more hard drive space. + The Necropolis has also taken on a rigorous policy of + mandatory participation. Too many people do too little + to warrant their use of the board. So as a warning to + users who think that they can leech off of the + Necropolis BBS: Think again. + + + [ Farewell to Users: Stark County Users Leave for College! ] + + Several users have or will be departing the Stark + County modem scene for a while. First, Cleopatra is + leaving for a few months on an extended student tour of + Europe and the surrounding countries. Raistlin has + already left for college. Ceasaro will be leaving the + first couple weeks of September to go to college in + Berea. Tape God left for Miami U. a few weeks ago. + Phoebe is leaving 12 September for Ohio University. + + +---------------------------+ + : * A Stark Naked Special * : THE FUTURE OF STARK COUNTY + : : TELECOMMUNICATIONS + +---------------------------+ [ Part 1 ] + + As some people are aware, the situation in Stark + County -- in the way of telecommunications - is very + grim. So, this issue of Stark Naked will go into + detail into the Rise and Fall of the Stark County + Modem Community ... as well as a look at how we can + improve things in general. + + The first part of this special is an interview with a + long-standing member of the telecom scene as well as + self-proclaimed modem "deity." Elminster, a.k.a. the + Ninja Master, was sysop of House of the Rising Sun BBS + as well as Forgotten Realm BBS. + + + ** An Interview with Elminster ** + + + +SN: First, give us a short background of your modeming career here + in Stark County. + + +Elm: Well, I got my modem for Christmas in 86'. 300 baud 1660. Wow. + :) Anyway, I put up a BBS about oh ... 2 weeks later. I had + been exposed to modeming before I got my OWN modem. My bbs was + what I would characterize ANY BBS put up by an inexperiences user: + It was a rodent BBS. :) + +SN: And this bulletin board was ... + + +Elm: The first House of the Rising Sun. My handle was The Ninja Master. + + +SN: And then you later went on to 1200 baud, re-opening HRS, and then + finally came to Forgotten Realm, which was up in the early part + of 1991. + + +Elm: Correct. Forgotten Realms was not just MY board of course. I ran + it with my fiend (haha) ... er, friend, Nightstalker. + + +SN: Now, it isn't really a hidden fact that you are probably one of + the last remaining modem users that have actually been around for + a while, save the Lion's Pride and some other people that weren't + really active ... but were still there. Right? + + +Elm: The only people still active who have been around as long as I have, + or longer, are Muad Dib, Gary Cox of CanCom and ... well, I don't + know if I should count Chuck Davis! Lets just say, his BBS has been + around AWHILE. + + +SN: Ok ... now moving on to the real point of this conversation ... would + you say that the quality of modeming in this area has declined in the + past, oh, four or five years? + + +Elm: (shout) YES! + + +SN: Hehehe ... could you be more specific? + + +Elm: There used to be Oh.... 6 to 8 bbs systems in the area, and 5 of + them were Quality systems. You could call up every day, and there + would ALWAYS be new messages. The people were a bit friendlier ... + and the messages themselves used to be more interesting. People who + used the modem also has active lives outside the modem community, + and so had a lot to share on the BBS. Unfortunatly, this trend + hasn't continued. + + +SN: A long-time nemesis of yours but modem veteran in his own respect -- + Tom Olson -- has described the modem community of the past as + "something special you just can't put your finger on" -- a sort of + collection of circumstance and events that make it a really cool time + that just can't ever be duplicated. Do you agree with him that the + period of time referred to as the Golden Age of Stark Telecom is + something that just happened and can't be re-lived ... or are there + certain steps we can take to change the downward trend in the Stark + County telecom scene? + + +Elm: Modems used to be pretty expensive. That used to be GOOD, because + only a SERIOUS USER would have a modem and would call. Now, MANY + people have modems ... and most of them are simply interested in + playing silly games. It's kind of sad. How to FIX the problem? There + are lots of solutions. Enforcing manditory participation rules, + creating a sysop's co-op ... it just takes dedicated people, and I + don't see that anywhere anymore. + + +SN: From a user's point of view ... what would you change about user + behavior on bulletin boards? What should users do to make things + more like they used to be? + + +Elm: POST! Say something. Don't waste the sysop's time, or other user's + time by just calling and giving nothing back. If the system has a + UD section, and you want files, it's LAME to sit around and b**** + about the ratio and idiot things like that. Just give something back. + That's all. + + +SN: Some users say that mandatory participation is cruel and unusual! + They say that if the sysop is in agreement and that if all the users + want to do is sit around and chat all day, then that's fine and that's + the way it should be. How do you react to that ideology? + + +Elm: The sysop of a BBS has the ultimate say as to what he wants for + his/her BBS. However, BBS stands for BULLETIN BOARD SYSTEM, not + CHAT BOARD SYSTEM. I guess it's just a matter of choice. Personally, + i'm not interesting in chatting ALL the time .. although an occasional + chat with someone interesting doens't seem to bad to me. + + +SN: Ok, what bulletin boards around here would you recommend to someone + first coming into the community ... since as you know, most users + feel most comfortable with the bulletin board that are "baptized" + on ... + +Elm: The Necropolis... Amiga Asylum ... that's about it. Most other + systems either don't have enough to offer, or would, in my opinion, + "ruin" the user. + +SN: Ok. And lastly -- anything you would like to add? + + +Elm: There's one place I WOULDN'T send a new user ... especially + one under 16. + + +SN: I won't even ask! :) Ok, thanks Elminster. + + + + Future issues of Stark Naked will feature more ways + to improve on our "condition" as well as the state + of events. + + + [ Is the Government Watching You? A Big Brother Report ] + + This message was recently captured from a Sk8Net echo: + + Date: 08-29Ä92 (16:20) Number: 295 of 306 (Echo) + To: ALL Refer#: NONE + From: LORD SHADOWKEEPER Read: HAS REPLIES + Subj: Big Brother Status: PUBLIC MESSAGE + Conf: HACK-PHREAK (6) Read Type: GENERAL (+) + + From something I picked up on my rounds... + + From : Leonard Church + To : All + Subject: Bbs Freedom ][ + + As someone involved in the telephone industry on the level of security + and data integrity... I would like to inform everyone that uses modems + and/or are bbs operators of some information. + + The first thing that everyone that uses a modem should know is that + every time you fire up your modem your activating monitoring equipment + somewhere in the U.S. I have worked for several large telephone + networks that routinely monitor and reroute modem and fax transmissions + through devices that allow them to view what is being transmitted and + even decodes encrypted data and fax packets used by major corporations + and governmental agencies. This is allowed under the heading of + "Maintenance Monitoring" and may be continued for up to 6 months without + the need of any legal paperwork being generated. Under an obscure + pre-WWII ruling by the agency that is now the FCC... "No information may + be encoded or transmitted over PUBLIC or PRIVATE forms of telephony or + radio with the exception of those agencies involved in the National + Security" a further designation goes on to say "with the exception of + the MORSE system of 'transmittal', any communication that is not + interpretable by the human ear is forbidden and unlawful." + + The information gathered goes to 3 seperate database facilities...1 is + codenamed Diana and is located in Brussels, the 2nd is named Fredrick + and is located somewhere in Malaysia, the 3rd is named Elizabeth and is + located in Boulder, Colorado. The information stored in these systems + is accessable by the US Government, Interpol, Scotland Yard and various + other such agencies. Your credit rating is also affected by your modem + usage... if you ever get a copy of your credit history and find a + listing that has HN06443 <--= this is a negative risk rating. or a code + 87AT4 <---= an even more negative risk rating.... these will usually + have no description on them... and if you inquire about them they will + tell you that it just comes from the system that way. + + I am currently working for another major carrier as a consultant and + have been able to watch these systems operate...at one unnamed long + distance carrier here in Columbus Ohio in their NCC, Network Control + Center, you can see several rows of computer terminals which have + approximately 30 to 40 separate windows in each... these windows have + data transmissions that are being monitored... banks of 9 track tapes + are going constantly to record everything. Everyone should realize that + even if a sysop posts a disclaimer at the beginning of his bbs about no + access to governmental agencies or law enforcement...that it isn't worth + the time it takes to type it in... looking forward to hearing reactions + to this. + + + [ A Paler Shade of Humanity: An Editorial by the Sorcerer ] + + An old joke that used to circulate around the Stark area + telecom scene was supposedly originated by the Prophet. + The joke was, "Why would it be impossible for Jesus to + be born in the Stark County telecom community? A: + Because you wouldn't be able to find three wise men or a + virgin." + + Now I'm not too positive about the virgin part, but it + has become increasingly obvious over the past couple of + months that the wise men part is. As you probably are + aware, the publication of this newsletter led to my + deletion from the Canton Connection BBS. And for some + odd reason, that deletion was accompanied by a sort of + backstabbing from someone who I considered a "modem + friend," Ramsey. This was all very mysterious to me + and it all struck me as rather odd. I tried calling + Ramsey, but she insisted that she had nothing more + to say to me. Why? I have no idea. + + After a while, this no longer bothered me because I + really could do without Canton Connection and I + suppose that anyone that treated me the way Ramsey did + was certainly no friend at all. I assumed that Ramsey, + being an adult, would handle things that way. I was + wrong. + + About a week ago, I was told by several people from CC + that Ramsey has been spreading numerous lies about me + through chat. And the worst part was that people + actually believed her! + + I decided to call her up again and ask her why she was + doing this sort of thing. My answer: a stonewall. This + is an excerpt from the conversation that pretty much + sums up the entire thing. It is really quite amusing + in a way. The same critics that refer to me as a child + seem to be acting quite infantile. + + Me: I'm confused why you're so upset with me in the first + place. + + Ra: Frankly, Ryan, I really don't care. + + Me: You don't care that I'm confused? + + Ra: Nope. + + Me: Wouldn't you like to set the record straight? + + Ra: Nope. + + Me: So, what you're saying, is you'd rather talk behind + my back without giving me a chance to give my side + of the story. + + Ra: You have a side? + + As you can see, it was totally impossible to even try + to reason with Ramsey. And as you also know, I have + found it utterly impossible to even talk to Larry. It + appears to me that these people are acting incredibly + immature. + + So let me say this to ANYONE that is told ANYTHING by + Ramsey, or Larry, or really anyone else: here is the + lithmus test to prove validity. Here is how you can + tell if what they say is true. I am always prepared to + talk to ANYONE about what they say. However, the other + party will NOT. For instance, I know what Ramsey has + been saying about me. And at any time, I will talk to + them openly -- on the phone, via chat, in person .. + whatever -- about it. Of course, they will not. And + why won't they? Because they know that they are wrong. + The next time they tell you something regarding me, + ask them to say it in a forum where I can respond. + Ramsey and Larry both have full access to my system + whenever they want to give their side of the story. I + do not have that luxury with Canton Connection, for + obvious reasons. + + [ Short Takes: News, Rumors, Hints, Gossip, Overheard .... ] + + ... A NEW release of TradeWars 200X is scheduled for + this fall! Registered sysops do NOT receive a new + copy of TW. No further information was available + about the new release, by Gary Martin. + + ... As callers of Arrakis BBS already know, this board + is now carrying echo bases! As part of a C-Net + echo base exchange, Arrakis is carrying a number + of echoes! The number is (216) 833-6159. + + ... For those of you wondering what happened to + Seraglio BBS, it was temporarily closed because + the sysop moved. It should be resuming operation + soon. + + ... A football pool is beginning on the Necropolis + BBS! Get involved to win prizes. The football + pool is part of a new sports conference that + also has a Sports Echo. + + + + ---------------------------------------------------------------- + + Stark Naked claims no legal responsibility for anything contained + within it. It is published as an informative newsletter for users + of the Stark and Summit County telecom community. + + If you would like to become a distribution site for Stark Naked, + contact the Sorcerer through a New User Msg at the Necropolis + BBS. The number is (216) 966-8970. + + If you would like to become a reporter for Stark Naked, please + get in touch with the Sorcerer as soon as possible. + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/textfiles.com/bbs/strknkd5.txt b/textfiles.com/bbs/strknkd5.txt new file mode 100644 index 00000000..7c9b708b --- /dev/null +++ b/textfiles.com/bbs/strknkd5.txt @@ -0,0 +1,342 @@ + ************************************************************* + STARK NAKED + + The Journal of Stark County Telecom + Brought to you by: The Necropolis BBS + (216)/966-8970 (3/12/2400 8N1 24 hrs) + Running Renegade Beta + Located in North Canton, Ohio + Sept 20, 1992 : Volume #1, Issue #5 + >> Now Serving Stark County & Summit County << + ************************************************************* + + [ Mandatory Participation: Growing Trend or Ancient Relic? ] + + Just recently, Tim Stedman announced that his BBS, the + Amiga Asylum, will begin enforcing a mandatory + participation rule. Thus, the Amiga Asylum becomes the + third local bulletin board to enforce such a rule. + + While many sysops feel that mandatory participation is + a great idea, there are others who feel that it is not + something that is necessary. This ideology is far from + how things used to be: expressions like "post or roast" + could be seen on just about every bulletin board. But + today, many sysops don't like the idea of using BBS + priveleges as an incentive to participate. + + Mandatory participation goes beyond the mere upload- + download ratio. Mandatory participation often means the + use of PCRs -- Post/Call Ratios. For every call, the + user must post so many times or BBS rights will be + taken away. Often, the BBS program will automatically + do this for the sysop. + + Mandatory Participation Stances in Stark County + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + + The Necropolis - A post/call ratio is in effect for + online games. Long-time lurkers are + deleted. + Arrakis - Selective rights: if a user posts, + he has access to the subs. If not, + his access there is revoked. + Amiga Asylum - New anti-lurker attitude. + Rising Power - None. + Canton Conn - None. + Walkman's Ware - Unknown. + + The question that must arise is: do programs like these + work? Does mandatory participation help out a bulletin + board? The first few days after the Asylum began the + mandatory participation rule, people who never posted + began to post. Reports of success from the Necropolis + have also supported the theory. + + It is the opinion of STARK NAKED that post-call ratios + and mandatory participation is in the best interest of + Stark County telecommunications. + + + + [ The Shareware Update: Continuing News on New Releases! ] + + STARK NAKED will attempt to offer readers current news + on Shareware programs in each issue. + + PKWare ::::::::::::::::::::::::::::::::::::::::::::::::::: + PKZip v2.x will be out soon, according to Phil Katz. + Remember that v2.01 and v2.2 are HACKS and you will + not want to use them. + PKWare has also signed a business agreement with ASi + (a multi-platform development company out of Dayton) + that will, among other things, allow PKWare Data + Compression libraries to be ported to other computer + platforms. In the plans right now are ports through + Unix, MacIntosh, MVS, Amiga, and Ultrix. A rep from + ASi hopes that PKWare/ASi will become an industry + standard for data compression. + + TradeWars 2002 ::::::::::::::::::::::::::::::::::::::::::: + Gary Martin is planning a release of TradeWars 2112 + within the next two years. Current registered sysops + will have to re-register. Little other information + is available on TradeWars 2112. + + + + [ Bob Larson Comes to Akron: Necropolis Users Set to Go! ] + + Radio talk-show host and Christian fundamentalist, Bob + Larson, is coming to the Akron Civic Center to speak on + issues relating to occultism October 23. The Necropolis + BBS, which is known for "Bob-bashing," is planning on + organizing a Necropolis Caravan to see Bob speak. If + interested in going, users should contact the Sorcerer, + Elminster, or just leave sysop feedback on the + Necropolis. Information will be posted publicly at the + Necropolis BBS on the Theology Sub. + + + + [ Akron Sysop Organization Cancelled: Pegasus Goes Down ] + + The proposed Akron Area Sysop's Organization (AASO) was + recently cancelled along with the Pegasus BBS, an Akron + bulletin board running on Maximus. According to Dan + Steill, the ex-sysop of Pegasus, the bulletin board had + to be taken down because of personal reasons. With the + the Pegasus BBS went the sysop group. Steill does think + that a sysop organization would be helpful for all area + sysops. An FBI agent was scheduled for the first meet + to discuss pirated software and copyright laws. + + + + [ Random Scribblings: Various Notes from Various BBS'es ] + + ... Still no word on the future of Seraglio BBS. Attempts + to contact the sysop have resulted in busy signals! + Stay tuned to Stark Naked for further developments. + + ... Power Man's BBS (the name of which is unconfirmed) + is allegedly going to be carrying the Boondock nets. + In response, the Necropolis BBS will be dropping the + Boondock nets in favor of an international network + which has yet to be named. One echo that will be + definitely pulled will be a Christian echo, which + will balance the Pagan/New Age selection currently + on-line. The Boondock/MSI/Wildnet nets are also + being carried by the Confederate BBS and the Pentagon + BBS. + + ... Several issues of Stark Naked were recently sighted + on a bulletin board in South Carolina! The editors + of Stark Naked would like to know who uploaded them + there ... to thank them! Stark Naked has also been + making rounds on packet radio boards! The message + of Stark Naked (aside from the news of local events) + is for freedom of telecommunication ... hopefully + that message is being spread! + + ... A new conference at the Necropolis ... the Star + Trek / Science Fiction conference has been put up + not only for ST/TNG fans ... but also for political + reasons. Apparently, after a small war on the USS + Paramount BBS, the Sorcerer decided to put up a + "conference that would teach the Paramount how to + run a Star Trek theme." The conference features a + Star Trek echo, Science Fiction echo, TradeWars + 2002 Echo, as well as a number of sci-fi related + files. The sysops of USS Paramount refused to + comment. + + ... Several changes have occured at Stark's first + commercial BBS ... Canton Communications. The + most apparent is the addition of a high speed modem. + Other changes include a more efficient logon method, + addition of the Fred Fish library for Amiga, and + the entire CD-Rom collection for IBM and Amiga. A + new SIG, the Debate Sig, headed by Andy Curlutu, + was also added. The high-speed modem line number + is 478-0548. + + + ... With the recent events in campaign politics, the + Perot for President ECHO has been re-activated. + The echo, which is part of the Searchlight net, + was running in an effort to spread information + about Ross Perot, the Texas billionaire whose name + is now on the ballot of every state. + + ... In the next issue of STARK NAKED, we'll be taking + an in-depth look at the world of x-rated BBS'ing! + Features will include an update on Akron Anomoly + (hopefully), a special section on Chat Sex, as well + as legal implications of running an adult board. + Also, a new feature that will hopefully be added to + STARK NAKED is a New BBS Spotlight. If you know of + a new bulletin board system in the Stark/Summit + area, let us know and we'll do a feature article on + them. The world needs more good boards! + + + [ NEW BBS Software on the Market: Spec Sheet Available ] + + Synchronet Version 1a + Features + + * Designed from the ground up as a reliable and feature rich + multinode BBS + * Up to 250 simultaneous nodes with multinode chat and online + program support + * Enhanced DESQview operation mode + * Runs under DOS 3.0 or higher on any 80x86 compatible computer + with 500k free RAM - BBS can shrink to 16k to execute external + programs + * Pay BBS features: + Time credits, user expiration dates, credits, and 900/976 + billing. + * Interrupt driven COM I/O for the fastest through-put possible + - even with multiple nodes per CPU via DOS multitasker + * Any COM port configuration supported (one IRQ line per COM port) + * Blazing fast even on a 10mhz XT + * Familiar hotkey user interface with '?' activated menus at every + prompt + * The most advanced BBS security ever: Impenetrable to remote + hackers, 100 security levels with 52 sysop configurable flags + per user, Sysop can allow or disallow users to choose their own + passwords, Sysop can force periodic password changes (uniqueness + is also forced), External programs cannot access the command + processor + * QWK mail packet support built-in + * Up to 10,000 message groups, up to 20,000 total message + sub-boards with up to 5,000 messages per sub-board. + * Up to 10,000 file libraries, up to 20,000 total file directories + with up to 5,000 files per directory. + * Extensive File Transfer Section: + Up to 500 transfer protocols with optional DSZLOG support + Batch uploads, downloads, and bidirectional file transfers + Transfer credit system is completely configurable + File viewing, extraction, and partial downloading of archives + File descriptions can contain content rating and multidisk + numberings + Personal user to user(s) file transfers + Optional batch download file flagging for user convenience + Internal support for offline directories + Multiple sysop file removal/move/edit search criteria + Directories can be sorted by filename or date, ascending or + descending + Advanced extended descriptions + Complete CDROM and other slow media support + * Professional error handling and logging + * Sysop inter-node control (remote or local): + Interrupting - hang-up on any node + Locking - only sysops can logon a locked node till lock + is removed + Rerunning - reexecutes BBS, reinitializing configuration, + etc. + * Inter-node message services: + Current node status - user online, action, connect rate, + and more, User activity - credited downloads, mail activity, + logons, and logoffs, User communications - paging, one-line + messages, and multinode chat + * 48 Local macros and sysop function hotkeys + * Real-time user database: + Amazingly complete user edit function + Remote changes to online-user data are immediately effective + Disk image is always current for enhanced system fault tolerance + Linked free-form data file for every user + * Online, sysop configurable, chatting artificial intelligence + engine + * Up to 500 online external programs: + Multiuser or single user programs + Programs that use DOS I/O (don't use COM port directly) + supported + Multiple door file formats created + Supports native WWIV color code expansion + Free Software Development Kit (SDK) avaiable for program + development + * Multiple Events + Logon and logoff events + New user events + Upload events (integrity testing, adding of comments, + virii scan, etc.) + Node and system daily events + Timed event that supports forced exclusive execution + * The most configurable BBS available today: + Powerful object oriented menu driven configuration program + All menus, text, and colors are sysop configurable without + source code + The use of aliases can be allowed or disallowed + New User Questionaire is available and customizable + Source code available for nearly unlimited customization + (extra cost) + + To download the DEMO version of Synchronet (and purchasing information), + call Vertrauen (Synchronet development site) at 714-529-9525 (2400bps) + or 714-529-9547 (V.32bis/HST) + + + + +-----------------------------------------------------------------+ + STARK NAKED :::: The Journal of Stark County Telecom + Editor: The Sorcerer :::: Support BBS: The Necropolis BBS + Published Periodically :::: (216) 966-8970 + September 20, 1992 :::: Sysops interested in becoming a + "If your sysop doesn't :::: Stark Naked Support BBS, please + carry Stark Naked on :::: contact the Sorcerer. Users who + a regular basis ... :::: are interested in reporting can + find out why!" :::: also contact the Sorcerer. + + ::: Stark Naked appreciates _any_ feedback that readers might + ::: have. Stark Naked also accepts any letters to the editor + ::: concerning issues raised in Stark Naked. + + +-----------------------------------------------------------------+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/textfiles.com/bbs/stupidki b/textfiles.com/bbs/stupidki new file mode 100644 index 00000000..2a8dfeeb --- /dev/null +++ b/textfiles.com/bbs/stupidki @@ -0,0 +1,98 @@ + +FROM: A ANYNONMOUS SOURCE. + +DURING THE PAST EIGHT YEARS, I HAVE BEEN HEAVILY INVOLVED WITH "BULLETIN +BOARD" SYSTEMS RUNNING ON MICROS AND MAINFRAMES. I'D LIKE TO GIVE A FEW +EXAMPLES OF THE DESTRUCTIVENESS OF MANY OF THESE "KIDS." + +MOST HAVE PROBABLY HEARD OF OR CALLED AN RCP/M. FIVE YEARS AGO, I WROTE A +SIMILAR TYPE SYSTEM FOR A TRS-80. THIS SOFTWARE RAN FOR 3.5 YEARS WITHOUT +A PROBLEM. BUT NOW, AS MORE AND MORE POTENTIAL CRACKERS HAVE ACCESS TO +COMMUNICATIONS EQUIPMENT, THIS SYSTEM HAS BEEN CRASHED REPEATEDLY. + +WHEN I WAS BACK IN HIGH SCHOOL, THE BIG THING WAS TO FIND A BUG IN THE OS. +BUT, ONCE WE FOUND IT, INSTEAD OF USING IT TO KEEP THE SYSTEM FLAT ON ITS +BACK, WE DOCUMENTED IT AND SOMETIMES EVEN FIXED IT. DOESN'T SEEM LIKE THAT +IS THE CASE ANYMORE... + +ON THIS SYSTEM, SOME CALLER BREAKS IN, DELETES ALL THE FILES, AND THEN +WRITES A PROGRAM WHICH KEEPS THE DRIVES SELECTED; THIS BURNS OUT THE MOTORS +ON 5.25" DRIVES, ESPECIALLY WHEN THEY RUN ALL NIGHT. THIS WAS DONE SO +OFTEN, THE SYSTEM WAS BROUGHT DOWN FOR A LONG TIME (UNTIL A TRACE COULD BE +PUT ON THE DIAL-UP). + +I RUN MY OWN SYSTEM AND PUBLISH SOFTWARE THAT TURNS A TRS-80 INTO A MAIL +AND MESSAGE SYSTEM. I HAVE SAT AND WATCHED CALLERS SYSTEMATICALLY ATTACK +THE SYSTEM. THIS TAKES SEVERAL FORMS: + +1) ALL COMMANDS, SERIES OF COMMANDS, AND OPTIONS ARE TRIED. + +2) THE SYSTEM IS ASSAULTED WITH ALL MANNERS OF CONTROL SEQUENCES, TRYING TO +GET SOME UNEXPECTED RESULT. + +3) I HAVE EVEN SEEM SOMEONE DROP AND THEN RE-INITIATE CARRIER TO SEE IF +THEY COULD GET SOMEWHERE. + + IF THAT DOESN'T WORK, THEY BEGIN TO CRACK PASSWORDS. THEY KNOW WHAT THEY ARE +DOING... IN ONE CASE, I WATCHED AS SOMEONE WENT THROUGH WHAT LOOKED LIKE THE +BEGINNING OF THE WEBSTER'S DICTIONARY TRYING TO GET SUPERUSER STATUS. SINCE +MOST PEOPLE USE WORDS, NOT A BAD IDEA, RIGHT? LESS INTELLIGENT ONES START WITH +A AND JUST TRY AND TRY AND TRY. + +OH, BY THE WAY, THEY ARE DEFINITELY USING AUTO-DIAL MODEMS AND SOFTWARE TO +DO THIS. + + IF ALL ELSE FAILS, THEY SIMPLY TIE UP THE SYSTEM. THEY CHOOSE THE MOST +OBVIOUSLY DISK INTENSIVE COMMAND, AND EXECUTE IT AGAIN AND AGAIN. SINCE MANY +SYSTEMS ONLY TIMEOUT AFTER INACTIVITY, THIS COULD TIE UP THE SYSTEM FOR MANY +HOURS (NOT TO MENTION THE WEAR AND TEAR ON THE EQUIPMENT). + +THESE LITTLE BASTARDS CERTAINLY AREN'T DOING ANYTHING CONSTRUCTIVE. + + SEVEN YEARS AGO, I CALLED UP MIT-MC AND GOT A TOURIST ACCOUNT WHICH I KEPT +FOR THREE YEARS UNTIL I GOT AN AUTHORIZED ONE. IT WAS A FREE ACCOUNT ON AN +OPEN SYSTEM; THE ONLY STRINGS WERE THAT I USE IT AFTER HOURS AND NOT TIE UP TOO +MANY RESOURCES. BUT THINGS HAVE CHANGED. YOU CAN'T HAVE TOTALLY OPEN SYSTEMS +ANYMORE WITHOUT MANY PRECAUTIONS AND ALMOST CONSTANT SUPERVISION. + +FOR EXAMPLE, I HAVE HAD TO ADD MANY SECURITY FEATURES TO THESE SMALL +SYSTEMS: + +1) THREE ATTEMPTS AND YOU LOSE THE CONNECTION. NINE ILLEGAL ATTEMPTS AT A +USERNAME WITHOUT A CORRECT LOGIN CAUSES A SUSPENSION . ANYONE TRYING TO +LOGIN UNDER THAT NAME IS IMMEDIATELY SUSPENDED (WITH SOME EXCEPTIONS). + +2) CONNECTION LIMITED USE. + +3) APPLICATION PROCESS REVIEWED BY SYSOP BEFORE SOMEONE CAN USE ALL +FEATURES, OR EVEN USE THE SYSTEM. + +4) ISOLATE THE USER COMPLETELY FROM ALL OPERATING SYSTEM FUNCTIONS, EVEN TO +THE POINT OF MODIFYING THE DOS TO HANG OR RESET WHEN NECESSARY. + + I DO HAVE ONE LITTLE "JOKE" UP MY SLEEVE. THERE IS AN ACCOUNT ON THESE +SYSTEMS CALLED SYSOP. NOW, IF I WAS GOING TO BREAK IN, THAT IS WHERE I WOULD +START. I'VE PUT A LITTLE PATCH INTO MY HOST. AFTER 39 INCORRECT TRIES ON THAT +ACCOUNT, IT ALLOWS THE CALLER THROUGH. HE GETS A WELCOME MESSAGE AND SYSOP +COMMAND:. HE CAN RENUMBER MESSAGES, CHANGE THE DATE AND TIME, EVEN DELETE FROM +THE DIRECTORY, CHANGE USERNAMES AND PASSWORDS. HE CAN DO ALL THE THINGS THAT A +SYSOP CAN DO. OF COURSE, HE ISN'T *REALLY* DOING ANYTHING (HE HE HE!) AFTER, +OH SAY, 10 MINUTES, OUTPUT STOPS. 24 LINEFEEDS ARE ISSUED AND THE FOLLOWING +APPEARS (SLOWLY, AS IF FROM A TTY): + + HELLO INTRUDER! GEE, I WANT TO THANK YOU FOR HANGING AROUND FOR + THE PAST TEN MINUTES WHILE WE HAD A CHANCE TO TRACE YOUR CALL. IT + IS TOO BAD THAT SOME PEOPLE JUST CAN'T LIVE RESPONSIBLY. BUT, I + GUESS THAT IS THE REASON WE HAVE THE POLICE AND FBI, RIGHT? + [DISCONNECT] + + I DON'T KNOW WHAT THE ANSWER IS, BUT I DO KNOWS THAT TREATING THIS TYPE OF +BEHAVIOR CASUALLY MUST BE STOPPED. THERE WILL ALWAYS BE PEOPLE WHO WILL TRY TO +CIRCUMVENT ALL SECURITY MEASURES, SOMETIMES OUT OF CURIOUSITY, BUT RECENTLY +MORE OFTEN WITH THE INTENTION OF DOING SOMETHING DESTRUCTIVE. + + IT'S TOO BAD THAT THE DAYS OF THE UNSECURED SYSTEMS IS COMING TO A CLOSE, BUT +WITH HUNDREDS OF PEOPLE SCANNING THE EXCHANGES WITH THEIR AUTO-DIAL MODEMS +LOOKING FOR CARRIERS, ARMED WITH 10 PAGES OF PIRATED MCI ACCESS CODES, WE DON'T +HAVE MUCH CHOICE. + diff --git a/textfiles.com/bbs/suckage.nfo b/textfiles.com/bbs/suckage.nfo new file mode 100644 index 00000000..9e9c69d6 --- /dev/null +++ b/textfiles.com/bbs/suckage.nfo @@ -0,0 +1,291 @@ +LAMERIGHT NOTICE *************************************************************** + Lameright means simply that if you steal anything in this magazine, + (except of course for the stolen things) that you are now a lamer. + You may not know it. Your friends may not call you a lamer, but deep + down, deny it as you will--you are a lamer. We give credit to all + groups whose stuff we used and if we did it was either (a) with their + permission or (b) the stuff was released into the public domain + expressly for everyone's use. If you rip anything, we will find you + and come to your house and shave your cat. Then we will pee on your + VCR and eat all your corn nuts. You will be sad. We will laugh + and laugh and laugh. Ha ha. Do you see now that this is wrong and + bad and is hardly worth the price you will pay? I certainly hope so. +******************************************************************************** + +greets at endish of file... + +Important notes : + + 1. notice big bob is not a lithium member anymore...there are many + very good reasons for this : + (a) _everyone_ in lithium hates him + (b) he has been a complete prick + (c) he never does anything, we wonder if he can...no we don't + wonder because we know he can't. + (d) we think he might be gay but we're not sure yet + (e) he has insulted the Great Natas One one too many times + and made him very unhappy. + (f) he cuts on everyone in lithium even though they are all + far better at what they do than he could ever hope to be + (g) he never does anything + (h) he never does anything + (i) _everyone_ in lithium _hates_ him. + 2. copper bars by Apex, starfield code by Apex + 3. any 3d dots you may have seen in our old bbs-ads are the asm + routines made by Sir Phrack-A-Lot + 3 1/2. doomish-slide-off-bleedish-effect in intro coded by nomad + 4. sound system is Midas Sound System by Sahara Surfers get it get it + it's so fucking awesome...better than goldplay, better than MODOBJ + ...better than PDPLAY, SATPLAY, HSCOBJ, STMIK, PPS, VLA MODPLAY + ...better than Sound System (whoever thats by)...it's just great + and comes with full source c+asm, handles mod and s3m (tho the mod + support will need some work I think)...supports PAS, WSS, GUS, SB. + has all kinds of shit for the programming interface--everything + DSMI has! EVERYTHING. Just a few less formats. ;) Maybe I could + hack some new loaders for it? Hm.... + 5. JESUS CHRIST SOUL ON ICE SLEEP WITH THE MOTHERFUCKIN' FISHES TONIGHT + 6. Mouse support added...added properly too I might add...quite proud + I am, yes siree...quite... thanx to Rodney Loos for his helpful + source code on the subject. ^ this is very easy to do + +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° +°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° L i T H i U M °±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±° +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° + + Music by -=>Bedlamite<=- + *** IMPORTANT NOTE *** +( Some stuff in the mod was changed from the original by natas to make it work + better with midas and play longer in the mag and be smaller in the file... + don't blame him if you think this version sucks. his original is available + on ftp.eng.ufl.edu and archive.epas.utoronto.ca... and wherever fine mods + are to be found. Get his MEDICROM.S3M it's most excellent... ) + + _.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._ +*'`^Alt-1 : the magazine you can read on the shitter ^`'*- + + (if u have a lapt0p) + _.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._ +*'`^ ^`'*- + ___ __ _ Ú¿ _ ___ _ ___ + þ Ã\ ³_ ³ Ä ³ þ /\/\ ³- /\/\ ³´ ³- â þ ³_ ³ _/ ³ þ + ~~~ ~ ÀÙ ~ ~~~ + ^ look i'm 3lit3 now...golly... + + Natas í Articles, Poetry, Editor, Coding, ANSi GFX, Disitribution, Organizing + (a.k.a. Naças DoGg) + Nomad í Articles, Poetry, Coding + (a.k.a. 1cE-ïímad) + Mortal í Grafix dude, ARTiCLES + (a.k.a. 1cE-M0âçal-DogG) + + Maynard í Official replacement for Big Bob + Eyore í Official LiTHiUM hippie. + (a.k.a. EZ-Ey0rE) + + *Bedlamite* í External Music Dude + ( ^ not a LiTHiUM member ) + + Sarah Maurer (ex-gf of Natas) + Medusa (cur. gf of Natas) <- and the best by far + (a.k.a. SaLç-N'-PîpA MedUsA) + ( ^ she's totally hot ) + Opi í Poetry + (a.k.a. Quîîï 0p1) + Ry + + Phantom Warrior í Sysop + + Currently Inactive Yet Cool LiTHiUM Members : + ÄÄÄÍÍÍððð===---===ðððÍÍÍÄÄÄ + Jesus í (M.I.A.) VGA GFX, VGA Coding/3d Shit + ( ^ Had to sell his 486 ) + Apex í Coding, VGA GFX + Sir Phrack-A-Lot í Coding, VGA GFX + + _.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._ +*'`^ ^`'*- + +We did it. We killed JKF. We buried Hoffa so fucking deep they'll never find +him. We killed Elvis. I personally planted the bomb that took down Buddy Holly +and his merry fellows. I did it. I answered the suicide hotline when Kobain +called, I said "Go ahead you sellout fuck, just die and get it over with. Nobody +fucking cares anyways.". My alias used to be Judas about 2000 years ago. I +killed OJ's wife. I enjoyed it too. I set him up. I framed Roger Rabbit, it +was me. I told Hal not to open the pod bay doors. And I'm not even sorry. No, +it wasn't the butler--it was me. I killed him too to make it look good. You +might see me on a grassy knole somewhere. I like them. I dropped the bomb, I +did it, it was me. Fuck you. Everything is fucked and I'm starting to get + used to it. + + _.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._.,-*'`^`'*-,._ +*'`^ ^`'*- + +Greets and shit like anyone fucking cares : + +Sahara Surfers - u rule. Midas is awesome. I wish it was a little smaller + but it is so cool anyways. it rules. did i mention it rules? + well, in case i forgot it rules. release a demo or something + cool. +Bedlamite - cool fucking s3m...hope to get more from you in the future. +Maelcum/KLF - thanks for the cool response, your mods are fucking awesome. +Apex/LITHIUM - r u dead? +Sir Phrack-A-Lot/LITHIUM - r u dead? +Control-C - too good to talk to us these days? well piss off then. +Someone - r u in jail? +Shadow Sorcerer/Unicorn - long time no speak, if you see this mag contact me + we could use some awesome ansi like yours... + hanson4@nes.nersc.gov! +JCAB - thanx for putting source code with DEMOVT it was most helpful! +Pengo/ex-LiTHiUM - ya'll is a bitch. +Fizban / S.C.R.U.B. - send me mods. you make mostest goodest mods. +Monax - long time no speak...hope you get this maggy...contact me! +Grimace - you got greeted, aren't you happy now? +Ned - if you are reading this, you suck slightly less than before. +Gold One / LiTHiUM - you already know you're a bitch so nevermind. +Ironhead - did you die? whas up? +Positron - i fucked your sister...i'm sorry...(just kidding teri! i swear!) +Opi - i fucked your boyfriend...i'm sorry...(i was really drunk) +Medusa - i really didn't fuck his sister...it was just a joke. +B00mer - you should have joined my group. too bad you live in tx. + PA kicks too, though... +Bub/bub's place - your board may be dead or maybe im just lame but you were a + cool sysop with a kick-ass board. if you have a bbs contact + me about becoming a dist-site i would be like honored and + stuff. +Net Distorsion - change your alias d00d...nomad says your cool so you must + be...vision has more bugs than all of my programs combined.. + probably more source too ;) BUT THAT DOSEN'T MAKE IT OK. +Mental Crusher - change your alias. soon. +Big Bob - lamer. +Nomad - i'll take your brain to another dimension..pay close attention. +Mortal - pet shop boys man...the way of the future. +Data Warriors - BLEAH! YOU SUCK! I puke I puke I puke. + +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° +°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° L i T H i U M °±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±° +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° + +the official lithium mascot is this kitten named 'maynard' i have sitting on +the floor of my room staring at me. it is no longer ned. sorry ned. and all +ned and oodles of poodles fans. fuck me fuck me fuck me + +YOU PUT THESE IN THE MIDAS ENVIRONMENT VARIABLE...if you don't know what +that is then you probably can't hook the cables up to your SB anyways. + +Options: + -sx Force Sound Device x (1 = GUS, 2 = PAS, 3 = WSS, 4 = SB, + 5 = No Sound) + -pxxx Force I/O port xxx (hex) for Sound Device + -ix Force IRQ x for Sound Device + -dx Force DMA channel x for Sound Device + -mxxxxx Set mixing rate to xxxxx Hz + -e Disable EMS usage + -t Disable ProTracker BPM tempos + -u Enable Surround + -oxxx Force output mode (8 = 8-bit, 1 = 16-bit, s = stereo, m = mono) + + +no good + +start the dance + +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° +°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° L i T H i U M °±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±° +°±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±° + +Other LiTHiUM productionz : + + [] LAMESHELL [] - LS0??.ZIP : + Natas's cool assed ModPlayer shell that is in NO WAY lame + and he thinks you should go get it. Supports all formats, + has archive support, looks cooler than shit on a frozen pond + in january, and swaps out and shit like that. Also has + link files to link mods to different directories, etc... + Includes : + MODDIR - makes a DESCRIPT.ION file of mods... + + [] MIDASPT [] - MIDASPT.ZIP : + Patch for Midas to load .MODs from the EXE...and source + files for loading only .S3Ms and no nosound support, as + well as WSS removed. What the hell it saves you some time. + + [] UC [] - UC??.ZIP : + Natas's mutli-format archive-converter utility. Very nice. + Handles : + () Adding ads to arcs... + () Virus scanning... + () Archive checking... + () Ad deleting... + () Comment add... + () BBS ad in MODs... + () MODCLEANing... + () Renaming MOD.* files... + () Attribute fixing for Amiga files... + () RAR, ARJ, UC2, ZOO, ZIP, etc...supported. + () Lots of options, optional .INI file... + + [] MODSHELL [] - MODSHL??.ZIP : + Natas's old ModPlayer shell...very very buggy but otherwise + quite nice. + + [] SH [] - SH??.ZIP : + Natas's old Norton Commander clone...VERY buggy...discontinued + due to lack of my interest... + + [] SHELL [] - SHELL??.ZIP : + Natas's VERY VERY VERY old shell...VERY VERY VERY buggy... + Discontinued due to lameness of program. + + [] LITHUTIL [] - LITHUTIL.ZIP : + A bunch of utilities by Natas...lots of little thingies. + + [] DESTAL [] - DESTAL.ZIP : + Natas's installer program like DEICE with ripped UNZIP + routines...discontinued due to lost sourcecode... + Oops. + + [] LAMETRO [] - LAMETRO.ZIP : + Small LiTHiUM intro to show off some routines. + By Apex, Sir Phrack-A-Lot, and Natas. + + [] EZ4U2C [] - EZ4U2C.COM : + BBS ad by Natas. + + [] BBS_AD [] - BBS_AD.EXE : + BBS ad by Natas. + + [] ALT1CUBE [] - ALT1CUBE.ZIP : + Little ad for old LiTHiUM BBS to show off Renderman's + 3d routines. + + [] IRON [] - IRON.ZIP : + Never finished LiTHiUM demo...don't look for it. + + [] PALED [] - PALED??.ZIP : + Natas's screen-editor program...I can't find the source so + don't look for it anytime soon. + + [] 3DSHIP [] - 3DSHIP.PCX : + Pic by Renderman. + + [] NEW2OLD [] - NEW2OLD.PCX : + Pic by Renderman. + + [] THEBOGV2 [] - THEBOGV2.ZIP : + S3M file by LiTHiUM's old musician Fizban. + + [] LITHANSI [] - LITHANSI.ZIP : + ANSi stuff by Natas. + + [] OLD2NEW [] - OLD2NEW.PCX : + Pic by Renderman. + + [] RACE_BSI [] - RACE_BSI : + Pic by Renderman. + + [] WATERFAL [] - WATERFAL.ZIP : + Small intro thingy by Renderman. + + [] WATER [] - _WATER_.EXE : + Small intro thingy by Natas. + diff --git a/textfiles.com/bbs/sundevil.txt b/textfiles.com/bbs/sundevil.txt new file mode 100644 index 00000000..271372dd --- /dev/null +++ b/textfiles.com/bbs/sundevil.txt @@ -0,0 +1,1341 @@ +Good text file about Operation Sundevil + +What follows is a description of hacking (cracking? Funny, I've heard people +use 'cracking' as a synonym for having sex :-) ) generally as well as the +government's efforts to violate our constitutional liberties (guaranteed under +the fourth and first amendments). This is a long article. Incidently, the +headers which precede the article are about as interesting as the article +itself. + +This article is available in the files/text section of MARS.EE.MSSTATE.EDU +(130.18.64.3) under the name 'Operation_Sun_Devil(long).' This file can +be transferred via ftp or download from the mars bbs. + +--sophist +---------------------------------here----------------------------------------- + +From sls1 Sun Jul 1 02:34:15 1990 +Return-Path: +Received: by Ra.MsState.Edu (4.1/5.0s); id AA18334; Sun, 1 Jul 90 02:34:14 CDT +Date: Sun, 1 Jul 90 02:34:14 CDT +From: Stefanie L. Sharp +Message-Id: <9007010734.AA18334@Ra.MsState.Edu> +To: pam1 +Status: R + +>From @CUNYVM.CUNY.EDU:SHAG@MERCURY.BITNET Fri Jun 29 14:57:01 1990 +Return-Path: <@CUNYVM.CUNY.EDU:SHAG@MERCURY.BITNET> +Received: from CUNYVM.CUNY.EDU by Ra.MsState.Edu (4.1/5.0s); id AA20529; Fri, 29 Jun 90 14:56:47 CDT +Message-Id: <9006291956.AA20529@Ra.MsState.Edu> +Resent-Message-Id: <9006291956.AA20529@Ra.MsState.Edu> +Received: from MERCURY.CCCC.NJIT.EDU by CUNYVM.CUNY.EDU (IBM VM SMTP R1.2.2MX) with BSMTP id 7071; Fri, 29 Jun 90 15:56:44 EDT +Received: by MERCURY (Mailer R2.04) id 1664; Fri, 29 Jun 90 15:49:28 EDT +Resent-Date: Fri, 29 Jun 90 15:45:56 EDT +Resent-From: Shag +Resent-To: Bey , Sven , + Azoth-V , aliu@aludra.usc.edu, karl@cs.duke.edu, + spx117@psuvm.psu.edu, aj639@cleveland.freenet.edu, sls1@ra.msstate.edu, + scott.howard@bbs.acs.unc.edu, skar@plains.nodak.edu, + jmorgan@loki.uif.uiuc.edu +Date: 29-JUN-1990 00:19:32.15 +From: Mirth and Joy +Subject: reading material +To: shag@MERCURY.BITNET +Status: R + +Here it is - read and smile + +----------------------------Original message---------------------------- +Received: from YaleVM.YCC.Yale.Edu by EAGLE.WESLEYAN.EDU; Fri, 22 Jun 90 02:50 + EST +Received: by YALEVM (Mailer R2.03B) id 6064; Fri, 22 Jun 90 00:55:16 EDT +From: Take a little ride with the elevator man +Subject: the Net, the Fuzz, and you +To: jkleiman@EAGLE.WESLEYAN.EDU, Apostle of the Night + , jleventhal@EAGLE.WESLEYAN.EDU, + jmcmillan@EAGLE.WESLEYAN.EDU, jraynor@EAGLE.WESLEYAN.EDU + +Hi everyone, + + A friend sent me this article today. I think it is *very* important to +all of us, as Net residents and citizens in a supposedly free society. It's +very long; I urge you to read the entire thing. It begins with a long, +background section, and then moves on to the scary stuff. + + I apologize to those of you who will receive this more than once, being on +more than one of my mailing lists. + + Those of you on the Politics list, discussion is more than welcome.... + + + Pickle, + + -The Elder Thing, + -Grand P00bah, Bull M00se, and + Treasurer of the Bill Dickson + chapter of the M00se Illuminati, + -Practitioner of Indiscriminate + Generalization, + -Possessor of the Damned Thing + -Official Mole of the M00se Illuminati + + (Bill D.) + +=============================================================================== + + +From: don@cs.umd.edu (Don Hopkins) +Subject: [hugh@xanadu.com: The fight for Liberty is again begining...] + + This is a LONG article on what I think of as Goverment involvment in +the Net, where the net is all of Cyberspace - be it a BBS, Usenet or +even just the pc in your home. Many of us have tryed to keep the +goverment out of our lives in the net, but it looks like a lot might +be happening very fast soon, and the people who make up the goverment +are scared. They will want In, in a big way. + The challange is to keep ahead of the the mess, if we are fighting +to get back 'rights' we will have missed the boat. Maybe we can even +put some of the bite back in the Consittution if we are VERY lucky. + + This is a pice for the next issue of the Whole Earth Review, as such +please do not publish on paper till after it has come out in the WER. +John has given permission for it to be passed far and wide on the Net. + + ||ugh + + + +CRIME AND PUZZLEMENT +by + +John Perry Barlow +barlow@well.sf.ca.us + +Desperados of the DataSphere + +So me and my sidekick Howard, we was sitting out in front of the 40 Rod +Saloon one evening when he all of a sudden says, "Lookee here. What +do you reckon?" I look up and there's these two strangers riding into +town. They're young and got kind of a restless, bored way about 'em. + +A person don't need both eyes to see they mean trouble... Well, that +wasn't quite how it went. Actually, Howard and I were floating blind as +cave fish in the electronic barrens of the WELL, so the whole incident +passed as words on a display screen: + +Howard: Interesting couple of newusers just signed on. One calls himself + acid and the other's optik. + +Barlow: Hmmm. What are their real names? + +Howard: Check their finger files. + +And so I typed !finger acid. Several seconds later the WELL's Sequent +computer sent the following message to my Macintosh in Wyoming: + + Login name: acid In real life: Acid Phreak + +By this, I knew that the WELL had a new resident and that his corporeal +analog was supposedly called Acid Phreak. Typing !finger optik yielded +results of similar insufficiency, including the claim that someone, somewhere +in the real world, was walking around calling himself Phiber Optik. I doubted +it. + +However, associating these sparse data with the knowledge that the WELL +was about to host a conference on computers and security rendered the +conclusion that I had made my first sighting of genuine computer crackers. +As the arrival of an outlaw was a major event to the settlements of the Old +West, so was the appearance of crackers cause for stir on the WELL. + +The WELL (or Whole Earth 'Lectronic Link) is an example of the latest +thing in frontier villages, the computer bulletin board. In this kind of +small town, Main Street is a central minicomputer to which (in the case of +the WELL) as many as 64 microcomputers may be connected at one time by +phone lines and little blinking boxes called modems. + +In this silent world, all conversation is typed. To enter it, one forsakes bot\ +h +body and place and becomes a thing of words alone. You can see what your +neighbors are saying (or recently said), but not what either they or their +physical surroundings look like. Town meetings are continuous and +discussions rage on everything from sexual kinks to depreciation +schedules. + +There are thousands of these nodes in the United States, ranging from PC +clone hamlets of a few users to mainframe metros like CompuServe, with +its 550,000 subscribers. They are used by corporations to transmit +memoranda and spreadsheets, universities to disseminate research, and a +multitude of factions, from apiarists to Zoroastrians, for purposes unique +to each. + +Whether by one telephonic tendril or millions, they are all connected to +one another. Collectively, they form what their inhabitants call the Net. It +extends across that immense region of electron states, microwaves, +magnetic fields, light pulses and thought which sci-fi writer William +Gibson named Cyberspace. + +Cyberspace, in its present condition, has a lot in common with the 19th +Century West. It is vast, unmapped, culturally and legally ambiguous, +verbally terse (unless you happen to be a court stenographer), hard to get +around in, and up for grabs. Large institutions already claim to own the +place, but most of the actual natives are solitary and independent, +sometimes to the point of sociopathy. It is, of course, a perfect breeding +ground for both outlaws and new ideas about liberty. + +Recognizing this, Harper's Magazine decided in December, 1989 to hold +one of its periodic Forums on the complex of issues surrounding +computers, information, privacy, and electronic intrusion or "cracking." +Appropriately, they convened their conference in Cyberspace, using the +WELL as the "site." + +Harper's invited an odd lot of about 40 participants. These included: +Clifford Stoll, whose book The Cuckoo's Egg details his cunning efforts to +nab a German cracker. John Draper or "Cap'n Crunch," the grand-daddy of +crackers whose blue boxes got Wozniak and Jobs into consumer +electronics. Stewart Brand and Kevin Kelly of Whole Earth fame. Steven +Levy, who wrote the seminal Hackers. A retired Air Force colonel named +Dave Hughes. Lee Felsenstein, who designed the Osborne computer and +was once called the "Robespierre of computing." A UNIX wizard and +former hacker named Jeff Poskanzer. There was also a score of aging +techno-hippies, the crackers, and me. + +What I was doing there was not precisely clear since I've spent most of my +working years either pushing cows or song-mongering, but I at least +brought to the situation a vivid knowledge of actual cow-towns, having +lived in or around one most of my life. + +That and a kind of innocence about both the technology and morality of +Cyberspace which was soon to pass into the confusion of knowledge. + +At first, I was inclined toward sympathy with Acid 'n' Optik as well as their +colleagues, Adelaide, Knight Lightning, Taran King, and Emmanuel. I've +always been more comfortable with outlaws than Republicans, despite +having more certain credentials in the latter camp. + +But as the Harper's Forum mushroomed into a boom-town of ASCII text +(the participants typing 110,000 words in 10 days), I began to wonder. These +kids were fractious, vulgar, immature, amoral, insulting, and too damned +good at their work. + +Worse, they inducted a number of former kids like myself into Middle +Age. The long feared day had finally come when some gunsel would yank +my beard and call me, too accurately, an old fart. + +Under ideal circumstances, the blind gropings of bulletin board discourse +force a kind of Noh drama stylization on human commerce. Intemperate +responses, or "flames" as they are called, are common even among +conference participants who understand one another, which, it became +immediately clear, the cyberpunks and techno-hippies did not. + +My own initial enthusiasm for the crackers wilted under a steady barrage of +typed testosterone. I quickly remembered I didn't know much about who +they were, what they did, or how they did it. I also remembered stories +about crackers working in league with the Mob, ripping off credit card +numbers and getting paid for them in (stolen) computer equipment. + +And I remembered Kevin Mitnik. Mitnik, now 25, is currently serving +federal time for a variety of computer and telephone related crimes. Prior +to incarceration, Mitnik was, by all accounts, a dangerous guy with a +computer. He disrupted phone company operations and arbitrarily +disconnected the phones of celebrities. Like the kid in Wargames, he +broke into the North American Defense Command computer in Colorado +Springs. + +Unlike the kid in Wargames, he made a practice of destroying and altering +data, including the credit information of his probation officer and other +enemies. Digital Equipment claimed that his depredations cost them more +than $4 million in computer downtime and file rebuilding. Eventually, he +was turned in by a friend who, after careful observation, had decided he +was "a menace to society." + +His spectre began to hang over the conference. After several days of +strained diplomacy, the discussion settled into a moral debate on the ethics +of security and went critical. + +The techno-hippies were of the unanimous opinion that, in Dylan's words, +one "must be honest to live outside the law." But these young strangers +apparently lived by no code save those with which they unlocked +forbidden regions of the Net. + +They appeared to think that improperly secured systems deserved to be +violated and, by extension, that unlocked houses ought to be robbed. This +latter built particular heat in me since I refuse, on philosophical grounds, +to lock my house. + +Civility broke down. We began to see exchanges like: + +Dave Hughes: Clifford Stoll said a wise thing that no one has + commented on. That networks are built on trust. If they + aren't, they should be. + + Acid Phreak: Yeah. Sure. And we should use the 'honor system' as a + first line of security against hack attempts. + + Jef Poskanzer: This guy down the street from me sometimes leaves + his back door unlocked. I told him about it once, but he + still does it. If I had the chance to do it over, I would go + in the back door, shoot him, and take all his money and + consumer electronics. + + It's the only way to get through to him. + +Acid Phreak: Jef Poskanker (Puss? Canker? yechh) Anyway, now + when did you first start having these delusions where + computer hacking was even *remotely* similar to + murder? + +Presented with such a terrifying amalgam of raw youth and apparent +power, we fluttered like a flock of indignant Babbitts around the Status +Quo, defending it heartily. One former hacker howled to the Harper's +editor in charge of the forum, "Do you or do you not have names and +addresses for these criminals?" Though they had committed no obvious +crimes, he was ready to call the police. + +They finally got to me with: + +Acid: Whoever said they'd leave the door open to + their house... where do you live? (the address) + Leave it to me in mail if you like. + +I had never encountered anyone so apparently unworthy of my trust as +these little nihilists. They had me questioning a basic tenet, namely that +the greatest security lies in vulnerability. I decided it was time to put that +principal to the test... + +Barlow: Acid. My house is at 372 North Franklin Street in + Pinedale, Wyoming. If you're heading north on + Franklin, you go about two blocks off the main drag + before you run into hay meadow on the left. I've got + the last house before the field. The computer is always + on... + + And is that really what you mean? Are you merely just + the kind of little sneak that goes around looking for + easy places to violate? You disappoint me, pal. For all + your James Dean-On-Silicon rhetoric, you're not a + cyberpunk. You're just a punk. + +Acid Phreak: Mr. Barlow: Thank you for posting all I need to get + your credit information and a whole lot more! Now, + who is to blame? ME for getting it or YOU for being + such an idiot?! I think this should just about sum + things up. + + Barlow: Acid, if you've got a lesson to teach me, I hope it's \ +not + that it's idiotic to trust one's fellow man. Life on those + terms would be endless and brutal. I'd try to tell you + something about conscience, but I'd sound like Father + O'Flannigan trying to reform the punk that's about to + gutshoot him. For no more reason that to watch him + die. + + But actually, if you take it upon yourself to destroy my + credit, you might do be a favor. I've been looking for + something to put the brakes on my burgeoning + materialism. + +I spent a day wondering whether I was dealing with another Kevin Mitnik +before the other shoe dropped: + +Barlow: ... With crackers like acid and optik, the issue is less + intelligence than alienation. Trade their modems for + skateboards and only a slight conceptual shift would + occur. + +Optik: You have some pair of balls comparing my talent with + that of a skateboarder. Hmmm... This was indeed + boring, but nonetheless: + +At which point he downloaded my credit history. + +Optik had hacked the core of TRW, an institution which has made my +business (and yours) their business, extracting from it an abbreviated +(and incorrect) version of my personal financial life. With this came the +implication that he and Acid could and would revise it to my disadvantage +if I didn't back off. + +I have since learned that while getting someone's TRW file is fairly trivial, +changing it is not. But at that time, my assessment of the crackers' black +skills was one of superstitious awe. They were digital brujos about to +zombify my economic soul. + +To a middle-class American, one's credit rating has become nearly identical +to his freedom. It now appeared that I was dealing with someone who had +both the means and desire to hoodoo mine, leaving me trapped in a life of +wrinkled bills and money order queues. Never again would I call the +Sharper Image on a whim. + +I've been in redneck bars wearing shoulder-length curls, police custody +while on acid, and Harlem after midnight, but no one has ever put the +spook in me quite as Phiber Optik did at that moment. I realized that we +had problems which exceeded the human conductivity of the WELL's +bandwidth. If someone were about to paralyze me with a spell, I wanted a +more visceral sense of him than could fit through a modem. + +I e-mailed him asking him to give me a phone call. I told him I wouldn't +insult his skills by giving him my phone number and, with the assurance +conveyed by that challenge, I settled back and waited for the phone to ring. +Which, directly, it did. + +In this conversation and the others that followed I encountered an +intelligent, civilized, and surprisingly principled kid of 18 who sounded, +and continues to sound, as though there's little harm in him to man or +data. His cracking impulses seemed purely exploratory, and I've begun to +wonder if we wouldn't also regard spelunkers as desperate criminals if +AT&T owned all the caves. + +The terrifying poses which Optik and Acid had been striking on screen +were a media-amplified example of a human adaptation I'd seen before: +One becomes as he is beheld. They were simply living up to what they +thought we, and, more particularly, the editors of Harper's, expected of +them. Like the televised tears of disaster victims, their snarls adapted +easily to mass distribution. + +Months later, Harper's took Optik, Acid and me to dinner at a Manhattan +restaurant which, though very fancy, was appropriately Chinese. Acid and +Optik, as material beings, were well-scrubbed and fashionably-clad. They +looked to be dangerous as ducks. But, as Harper's and the rest of the media +have discovered to their delight, the boys had developed distinctly showier +personae for their rambles through the howling wilderness of Cyberspace. + +Glittering with spikes of binary chrome, they strode past the kleig lights +and into the digital distance. There they would be outlaws. It was only a +matter of time before they started to believe themselves as bad as they +sounded. And no time at all before everyone else did. + +In this, they were like another kid named Billy, many of whose feral deeds +in the pre-civilized West were encouraged by the same dime novelist who +chronicled them. And like Tom Horn, they seemed to have some doubt as +to which side of the law they were on. Acid even expressed an ambition to +work for the government someday, nabbing "terrorists and code abusers." + +There is also a frontier ambiguity to the "crimes" the crackers commit. +They are not exactly stealing VCR's. Copying a text file from TRW doesn't +deprive its owner of anything except informational exclusivity. (Though +it may said that information has monetary value only in proportion to its +containment.) + +There was no question that they were making unauthorized use of data +channels. The night I met them, they left our restaurant table and +disappeared into the phone booth for a long time. I didn't see them +marshalling quarters before they went. + +And, as I became less their adversary and more their scoutmaster, I began +to get "conference calls" in which six or eight of them would crack pay +phones all over New York and simultaneously land on my line in +Wyoming. These deft maneuvers made me think of sky-diving stunts +where large groups convene geometrically in free fall. In this case, the risk +was largely legal. + +Their other favorite risky business is the time-honored adolescent sport of +trespassing. They insist on going where they don't belong. But then teen-age +boys have been proceeding uninvited since the dawn of human puberty. It +seems hard-wired. The only innovation is in the new form of the +forbidden zone the means of getting in it. + +In fact, like Kevin Mitnik, I broke into NORAD when I was 17. A friend +and I left a nearby "woodsie" (as rustic adolescent drunks were called in +Colorado) and tried to get inside the Cheyenne Mountain. The chrome- +helmeted Air Force MP's held us for about 2 hours before letting us go. +They weren't much older than us and knew exactly our level of national +security threat. Had we come cloaked in electronic mystery, their alert +status certainly would have been higher. + +Whence rises much of the anxiety. Everything is so ill-defined. How can +you guess what lies in their hearts when you can't see their eyes? How can +one be sure that, like Mitnik, they won't cross the line from trespassing +into another adolescent pastime, vandalism? And how can you be sure +they pose no threat when you don't know what a threat might be? + +And for the crackers some thrill is derived from the metamorphic +vagueness of the laws themselves. On the Net, their effects are +unpredictable. One never knows when they'll bite. + +This is because most of the statutes invoked against the crackers were +designed in a very different world from the one they explore. For example, +can unauthorized electronic access can be regarded as the ethical equivalent +of old-fashioned trespass? Like open range, the property boundaries of +Cyberspace are hard to stake and harder still to defend. + +Is transmission through an otherwise unused data channel really theft? Is +the track-less passage of a mind through TRW's mainframe the same as +the passage of a pickup through my Back 40? What is a place if Cyberspace +is everywhere? What are data and what is free speech? How does one +treat property which has no physical form and can be infinitely +reproduced? Is a computer the same as a printing press? Can the history +of my business affairs properly belong to someone else? Can anyone +morally claim to own knowledge itself? + +If such questions were hard to answer precisely, there are those who are +ready to try. Based on their experience in the Virtual World, they were +about as qualified to enforce its mores as I am to write the Law of the Sea. +But if they lacked technical sophistication, they brought to this task their +usual conviction. And, of course, badges and guns. + + + + + + Operation Sun Devil + +"Recently, we have witnessed an alarming number of young people who, +for a variety of sociological and psychological reasons, have become +attached to their computers and are exploiting their potential in a +criminal manner. Often, a progression of criminal activity occurs which +involves telecommunications fraud (free long distance phone calls), +unauthorized access to other computers (whether for profit, fascination, +ego, or the intellectual challenge), credit card fraud (cash advances and +unauthorized purchases of goods), and then move on to other destructive +activities like computer viruses." "Our experience shows that many +computer hacker suspects are no longer misguided teenagers +mischievously playing games with their computers in their bedrooms. +Some are now high tech computer operators using computers to engage in +unlawful conduct." + +--Excerpts from a statement by +Garry M. Jenkins +Asst. Director, U. S. Secret Service \ + + +"The right of the people to be secure in their persons, houses, papers, and +effects, against unreasonable searches and seizures, shall not be violated, an\ +d +no warrants shall issue but upon probable cause, support by oath or +affirmation, and particularly describing the place to be searched, and the +persons or things to be seized." + +--Amendment VI +United States Constitution + + On January 24, 1990, a platoon of Secret Service agents entered the +apartment which Acid Phreak shares with his mother and 12 year-old +sister. The latter was the only person home when they burst through the +door with guns drawn. They managed to hold her at bay for about half an +hour until their quarry happened home. + +By then, they were nearly done packing up Acid's worldly goods, including +his computer, his notes (both paper and magnetic), books, and such +dubiously dangerous tools as a telephone answering machine, a ghetto +blaster and his complete collection of audio tapes. One agent asked him to +define the real purpose of the answering machine and was frankly +skeptical when told that it answered the phone. The audio tapes seemed +to contain nothing but music, but who knew what dark data Acid might +have encoded between the notes... + +When Acid's mother returned from work, she found her apartment a +scene of apprehended criminality. She asked what, exactly, her son had +done to deserve all this attention and was told that, among other things, +he had caused the AT&T system crash several days earlier. (Previously +AT&T had taken full responsibility.) Thus, the agent explained, her +darling boy was thought to have caused over a billion dollars in damage to +the economy of the United States. + +This accusation was never turned into a formal charge. Indeed, no charge +of any sort of was filed against Mr. Phreak then and, although the Secret +Service maintained resolute possession of his hardware, software, and +data, no charge had been charged 4 months later. + +Across town, similar scenes were being played out at the homes of Phiber +Optik and another colleague code-named Scorpion. Again, equipment, +notes, disks both hard and soft, and personal effects were confiscated. +Again no charges were filed. + +Thus began the visible phase of Operation Sun Devil, a two-year Secret +Service investigation which involved 150 federal agents, numerous local +and state law enforcement agencies. and the combined security resources +of PacBell, AT&T, Bellcore, Bell South MCI, U.S. Sprint, Mid-American, +Southwestern Bell, NYNEX, U.S. West and American Express. + +The focus of this impressive institutional array was the Legion of Doom, a +group which never had any formal membership list but was thought by the +members with whom I spoke to number less than 20, nearly all of them in +their teens or early twenties. + +I asked Acid why they'd chosen such a threatening name. "You wouldn't +want a fairy kind of thing like Legion of Flower Pickers or something. But +the media ate it up too. Probing the Legion of Doom like it was a gang or +something, when really it was just a bunch of geeks behind terminals." + + + + Sometime in December 1988, a 21 year-old Atlanta-area Legion of +Doomster named The Prophet cracked a Bell South computer and +downloaded a three- page text file which outlined, in bureaucrat-ese of +surpassing opacity, the administrative procedures and responsibilities for +marketing, servicing, upgrading, and billing for Bell South's 911 system. + +A dense thicket of acronyms, the document was filled with passages like: + +"In accordance with the basic SSC/MAC strategy for provisioning, the +SSC/MAC will be Overall Control Office (OCO) for all Notes to PSAP +circuits (official services) and any other services for this customer. +Training must be scheduled for all SSC/MAC involved personnel during +the pre-service stage of the project." + +And other such. + +At some risk, I too have a copy of this document. To read the whole thing +straight through without entering coma requires either a machine or a +human who has too much practice thinking like one. Anyone who can +understand it fully and fluidly has altered his consciousness beyond the +ability to ever again read Blake, Whitman, or Tolstoy. It is, quite simply, +the worst writing I have ever tried to read. + +Since the document contains little of interest to anyone who is not a +student of advanced organizational sclerosis...that is, no access codes, trade +secrets, or proprietary information...I assume The Prophet only copied this +file as a kind of hunting trophy. He had been to the heart of the forest and +had returned with this coonskin to nail to the barn door. + +Furthermore, he was proud of his accomplishment, and since such +trophies are infinitely replicable, he wasn't content to nail it to his door +alone. Among the places he copied it was a UNIX bulletin board (rather +like the WELL) in Lockport, Illinois called Jolnet. + +It was downloaded from there by a 20 year-old hacker and pre-law student +(whom I had met in the Harper's Forum) who called himself Knight +Lightning. Though not a member of the Legion of Doom, Knight +Lightning and a friend, Taran King, also published from St. Louis and his +fraternity house at the University of Missouri a worldwide hacker's +magazine called Phrack. (From phone phreak and hack.) + +Phrack was an unusual publication in that it was entirely virtual. The only +time its articles hit paper was when one of its subscribers decided to print +out a hard copy. Otherwise, its editions existed in Cyberspace and took no +physical form. + +When Knight Lightning got hold of the Bell South document, he thought +it would amuse his readers and reproduced it in the next issue of Phrack. +He had little reason to think that he was doing something illegal. There is +nothing in it to indicate that it contains proprietary or even sensitive +information. Indeed, it closely resembles telco reference documents which +have long been publicly available. + +However, Rich Andrews, the systems operator who oversaw the operation +of Jolnet, thought there might be something funny about the document +when he first ran across it in his system. To be on the safe side, he +forwarded a copy of it to AT&T officials. He was subsequently contacted by +the authorities, and he cooperated with them fully. He would regret that +later. + +On the basis of the forgoing, a Grand Jury in Lockport was persuaded by the +Secret Service in early February to hand down a seven count indictment +against The Prophet and Knight Lightning, charging them, among other +things, with interstate transfer of stolen property worth more than $5,000. +When The Prophet and two of his Georgia colleagues were arrested on +February 7, 1990, the Atlanta papers reported they faced 40 years in prison +and a $2 million fine. Knight Lightning was arrested on February 15. + +The property in question was the affore-mentioned blot on the history of +prose whose full title was A Bell South Standard Practice (BSP) 660-225-104SV- +Control Office Administration of Enhanced 911 Services for Special Services an\ +d +Major Account Centers, March, 1988. + +And not only was this item worth more than $5,000.00, it was worth, +according to the indictment and Bell South, precisely $79,449.00. And not a +penny less. We will probably never know how this figure was reached or +by whom, though I like to imagine an appraisal team consisting of Franz +Kafka, Joseph Heller, and Thomas Pyncheon... + +In addition to charging Knight Lightning with crimes for which he could +go to jail 30 years and be fined $122,000.00, they seized his publication, +Phrack, along with all related equipment, software and data, including his +list of subscribers, many of whom would soon lose their computers and +data for the crime of appearing on it. + +I talked to Emmanuel Goldstein, the editor of 2600, another hacker +publication which has been known to publish purloined documents. If +they could shut down Phrack, couldn't they as easily shut down 2600? + +He said, "I've got one advantage. I come out on paper and the Constitution +knows how to deal with paper." + +In fact, nearly all publications are now electronic at some point in their +creation. In a modern newspaper, stories written at the scene are typed to +screens and then sent by modem to a central computer. This computer +composes the layout in electronic type and the entire product transmitted +electronically to the presses. There, finally, the bytes become ink. + +Phrack merely omitted the last step in a long line of virtual events. +However, that omission, and its insignificant circulation, left it vulnerable +to seizure based on content. If the 911 document had been the Pentagon +Papers (another proprietary document) and Phrack the New York Times, a +completion of the analogy would have seen the government stopping +publication of the Times and seizing its every material possession, +from notepads to presses. + +Not that anyone in the newspaper business seemed particularly worried +about such implications. They, and the rest of the media who bothered to +report Knight Lightning's arrest were too obsessed by what they portrayed +as actual disruptions of emergency service and with marvelling at the +sociopathy of it. One report expressed relief that no one appeared to have +died as a result of the "intrusions." + +Meanwhile, in Baltimore, the 911 dragnet snared Leonard Rose, aka +Terminus. A professional computer consultant who specialized in UNIX, +Rose got a visit from the government early in February. The G-men +forcibly detained his wife and children for six hours while they +interrogated Rose about the 911 document and ransacked his system. + +Rose had no knowledge of the 911 matter. Indeed, his only connection had +been occasional contact with Knight Lightning over several years...and +admitted membership in the Legion of Doom. However, when searching +his hard disk for 911 evidence, they found something else. Like many +UNIX consultants, Rose did have some UNIX source code in his +possession. Furthermore, there was evidence that he had transmitted +some of it to Jolnet and left it there for another consultant. + +UNIX is a ubiquitous operating system, and though its main virtue is its +openness to amendment at the source level, it is nevertheless the property +of AT&T. What had been widely d istributed within businesses and +universities for years was suddenly, in Rose's hands, a felonious +possession. + +Finally, the Secret Service rewarded the good citizenship of Rich Andrews +by confiscating the computer where Jolnet had dwelt, along with all the e- +mail, read and un-read, which his subscribers had left there. Like the +many others whose equipment and data were taken by the Secret Service +subsequently, he wasn't charged with anything. Nor is he likely to be. +They have already inflicted on him the worst punishment a nerd can +suffer: data death. + +Andrews was baffled. "I'm the one that found it, I'm the one that turned it +in...And I'm the one that's suffering," he said. + +One wonders what will happen when they find such documents on the +hard disks of CompuServe. Maybe I'll just upload my copy of Bell South +Standard Practice (BSP) 660-225-104SV and see... + +In any case, association with stolen data is all the guilt you need. It's quit\ +e +as if the government could seize your house simply because a guest left a +stolen VCR in an upstairs bedroom closet. Or confiscate all the mail in a +post office upon finding a stolen package there. The first concept of +modern jurisprudence to have arrived in Cyberspace seems to have been +Zero Tolerance. + + + + Rich Andrews was not the last to learn about the Secret Service's debonair +new attitude toward the 4th Amendment's protection against +unreasonable seizure. + +Early on March 1, 1990, the offices of a roll-playing game publisher in +Austin, Texas called Steve Jackson Games were visited by agents of the +United States Secret Service. They ransacked the premises, broke into +several locked filing cabinets (damaging them irreparably in the process) +and eventually left carrying 3 computers, 2 laser printers, several hard +disks, and many boxes of paper and floppy disks. + +Later in the day, callers to the Illuminati BBS (which Steve Jackson Games +operated to keep in touch with roll-players around the country) +encountered the following message: + +"So far we have not received a clear explanation of what the Secret Service +was looking for, what they expected to find, or much of anything else. We +are fairly certain that Steve Jackson Games is not the target of whatever +investigation is being conducted; in any case, we have done nothing illegal +and have nothing whatsoever to hide. However, the equipment that was +seized is apparently considered to be evidence in whatever they're +investigating, so we aren't likely to get it back any time soon. It could be a\ + +month, it could be never." It's been three months as I write this and, not +only has nothing been returned to them, but, according to Steve Jackson, +the Secret Service will no longer take his calls. He figures that, in the +months since the raid, his little company has lost an estimated $125,000. +With such a fiscal hemorrhage, he can't afford a lawyer to take after the +Secret Service. Both the state and national offices of the ACLU told him to +"run along" when he solicited their help. + +He tried to go to the press. As in most other cases, there were unwilling to +raise the alarm. Jackson theorized, "The conservative press is taking the +attitude that the suppression of evil hackers is a good thing and that +anyone who happens to be put out of business in the meantime...well, +that's just their tough luck." + +In fact, Newsweek did run a story about the event, portraying it from +Jackson's perspective, but they were almost alone in dealing with it. + +What had he done to deserve this nightmare? Role-playing games, of +which Dungeons and Dragons is the most famous, have been accused of +creating obsessive involvement in their nerdy young players, but no one +before had found it necessary to prevent their publication. It seems that +Steve Jackson had hired the wrong writer. The managing editor of Steve +Jackson Games is a former cracker, known by his fellows in the Legion of +Doom as The Mentor. At the time of the raid, he and the rest of Jackson +staff had been working for over a year on a game called GURPS +Cyberpunk, High-Tech Low-Life Role-Playing. + +At the time of the Secret Service raids, the game resided entirely on the +hard disks they confiscated. Indeed, it was their target. They told Jackson +that, based on its author's background, they had reason to believe it was a +"handbook on computer crime." It was therefore inappropriate for +publication, 1st Amendment or no 1st Amendment. + +I got a copy of the game from the trunk of The Mentor's car in an Austin +parking lot. Like the Bell South document, it seemed pretty innocuous to +me, if a little inscrutable. Borrowing its flavor from the works of William +Gibson and Austin sci-fi author Bruce Sterling, it is filled with silicon +brain implants, holodecks, and gauss guns. + +It is, as the cover copy puts it, "a fusion of the dystopian visions of George +Orwell and Timothy Leary." Actually, without the gizmos, it describes a +future kind of like the present its publisher is experiencing at the hands of +the Secret Service. + +An unbelievably Byzantine world resides within its 120 large pages of small +print. (These roll-players must be some kind of idiots savants...) Indeed, +it's a thing of such complexity that I can't swear there's no criminal +information in there, but then I can't swear that Grateful Dead records +don't have satanic messages if played backwards. Anything's possible, +especially inside something as remarkable as Cyberpunk. + +The most remarkable thing about Cyberpunk is the fact that it was printed +at all. After much negotiation, Jackson was able to get the Secret Service to +let him have some of his data back. However, they told him that he +would be limited to an hour and a half with only one of his three +computers. Also, according to Jackson, "They insisted that all the copies be +made by a Secret Service agent who was a two-finger typist. So we didn't +get much. " + +In the end, Jackson and his staff had to reconstruct most of the game from +neural rather than magnetic memory. They did have a few very old +backups, and they retrieved a some scraps which had been passed around +to game testers. They also had the determination of the enraged. + +Despite government efforts to impose censorship by prior restraint, +Cyberpunk is now on the market. Presumably, advertising it as "The book +that was seized by the U.S. Secret Service" will invigorate sales. But Steve +Jackson Games, the heretofore prosperous publisher of more than a +hundred role-playing games, has been forced to lay off more than half of +its employees and may well be mortally wounded. + +Any employer who has heard this tale will think hard before he hires a +computer cracker. Which may be, of course, among the effects the Secret +Service desires. + + + + On May 8, 1990, Operation Sun Devil, heretofore an apparently random +and nameless trickle of Secret Service actions, swept down on the Legion +of Doom and its ilk like a bureaucratic tsunami. On that day, the Secret +Service served 27 search warrants in 14 cities from Plano, Texas to New +York, New York. + +The law had come to Cyberspace. When the day was over, transit through +the wide open spaces of the Virtual World would be a lot trickier. + +In a press release following the sweep, the Secret Service boasted having +shut down numerous computer bulletin boards, confiscated 40 computers, +and seized 23,000 disks. They noted in their statement that "the +conceivable criminal violations of this operation have serious +implications for the health and welfare of all individuals, corporations, +and United States Government agencies relying on computers and +telephones to communicate." + +It was unclear from their statement whether "this operation" meant the +Legion of Doom or Operation Sun Devil. There was room to interpret it +either way. + +Because the deliciously ironic truth is that, aside from the 3 page Bell South +document, the hackers had neither removed nor damaged anyone's data. +Operation Sun Devil, on the other hand, had "serious implications" for a +number of folks who relied on "computers and telephones to +communicate." They lost the equivalent of about 5.4 million pages of +information. Not to mention a few computers and telephones. + +And the welfare of the individuals behind those figures was surely in +jeopardy. Like the story of the single mother and computer consultant in +Baltimore whose sole means of supporting herself and her 18 year old son +was stripped away early one morning. Secret Service agents broke down +her door with sledge hammers, entered with guns drawn, and seized all +her computer equipment. Apparently her son had also been using it... + +Or the father in New York who opened the door at 6:00 AM and found a +shotgun at his nose. A dozen agents entered. While one of the kept the +man's wife in a choke-hold, the rest made ready to shoot and entered the +bedroom of their sleeping 14 year old. Before leaving, the confiscated every +piece of electronic equipment in the house, including all the telephones. + +It was enough to suggest that the insurance companies should start writing +policies against capricious governmental seizure of circuitry. + +In fairness, one can imagine the government's problem. This is all pretty +magical stuff to them. If I were trying to terminate the operations of a +witch coven, I'd probably seize everything in sight. How would I tell the +ordinary household brooms from the getaway vehicles? + +But as I heard more and more about the vile injustices being heaped on my +young pals in the Legion of Doom, not to mention the unfortunate folks +nearby, the less I was inclined toward such temperate thoughts as these. I +drifted back into a 60's-style sense of the government, thinking it a thing of +monolithic and evil efficiency and adopting an up-against-the-wall +willingness to spit words like "pig" or "fascist" into my descriptions. + +In doing so, I endowed the Secret Service with a clarity of intent which no +agency of government will ever possess. Despite almost every experience +I've ever had with federal authority, I keep imagining its competence. + +For some reason, it was easier to invest the Keystone Kapers of Operation +Sun Devil with malign purpose rather than confront their absurdity +straight- on. There is, after all, a twisted kind of comfort in political +paranoia. It provides one such a sense of orderliness to think that the +government is neither crazy nor stupid and that its plots, though wicked, +are succinct. + +I was about to have an experience which would restore both my natural +sense of unreality and my unwillingness to demean the motives of others. +I was about to see first hand the disorientation of the law in the featureless +vastness of Cyberspace. + + + + +In Search of NuPrometheus + + "I pity the poor immigrant..." + +-- Bob Dylan + + Sometime last June, an angry hacker got hold of a chunk of the highly +secret source code which drives the Apple Macintosh. He then distributed +it to a variety of addresses, claiming responsibility for this act of +information terrorism in the name of the Nu Prometheus League. + +Apple freaked. NuPrometheus had stolen, if not the Apple crown jewels, +at least a stone from them. Worse, NuPrometheus had then given this +prize away. Repeatedly. + +All Apple really has to offer the world is the software which lies encoded in +silicon on the ROM chip of every Macintosh. This set of instructions is the +cyber-DNA which makes a Macintosh a Macintosh. + +Worse, much of the magic in this code was put there by people who not +only did not work for Apple any longer, might only do so again if +encouraged with cattle prods. Apple's attitude toward its ROM code is a +little like that of a rich kid toward his inheritance. Not actually knowing +how to create wealth himself, he guards what he has with hysterical +fervor. + +Time passed, and I forgot about the incident. But one recent May morning, +I leaned that others had not. The tireless search for the spectral heart of +NuPrometheus finally reached Pinedale, Wyoming, where I was the object +of a two hour interview by Special Agent Richard Baxter, Jr. of the Federal +Bureau of Investigation. + +Poor Agent Baxter didn't know a ROM chip from a Vise-grip when he +arrived, so much of that time was spent trying to educate him on the +nature of the thing which had been stolen. Or whether "stolen" was the +right term for what had happened to it. + +You know things have rather jumped the groove when potential suspects +must explain to law enforcers the nature of their alleged perpetrations. + +I wouldn't swear Agent Baxter ever got it quite right. After I showed him +some actual source code, gave a demonstration of e-mail in action, and +downloaded a file from the WELL, he took to rubbing his face with both +hands, peering up over his finger tips and saying, "It sure is something, +isn't it" Or, "Whooo-ee." + +Or "my eight year old knows more about these things than I do." He didn't +say this with a father's pride so much as an immigrant's fear of a strange +new land into which he will be forcibly moved and in which his own +child is a native. He looked across my keyboard into Cyberspace and didn't +like what he saw. + +We could have made it harder for one another, but I think we each sensed +that the other occupied a world which was as bizarre and nonsensical as it +could be. We did our mutual best to suppress immune response at the +border. + +You'd have thought his world might have been a little more recognizable +to me. Not so, it turns out. Because in his world, I found several +unfamiliar features, including these: + +1. The Hacker's Conference is an underground organization of computer +outlaws with likely connections to, and almost certainly sympathy with, +the NuPrometheus League. (Or as Agent Baxter repeatedly put it, the +"New Prosthesis League.") + + 2. John Draper, the affore-mentioned Cap'n Crunch, in addition to being a +known member of the Hacker's Conference, is also CEO and president of +Autodesk, Inc. This is of particular concern to the FBI because Autodesk +has many top-secret contracts with the government to supply Star Wars +graphics imaging and "hyperspace" technology. Worse, Draper is thought +to have Soviet contacts. + +He wasn't making this up. He had lengthy documents from the San +Francisco office to prove it. And in which Autodesk's address was certainly +correct. + +On the other hand, I know John Draper. While, as I say, he may have once +distinguished himself as a cracker during the Pleistocene, he is not now, +never has been, and never will be CEO of Autodesk. He did work there for +awhile last year, but he was let go long before he got in a position to +take over. + +Nor is Autodesk, in my experience with it, the Star Wars skunk works +which Agent Baxter's documents indicated. One could hang out there a +long time without ever seeing any gold braid. + +Their primary product is something called AutoCAD, by far the most +popular computer-aided design software but generally lacking in lethal +potential. They do have a small development program in Cyberspace, +which is what they call Virtual Reality. (This, I assume is the "hyperspace" +to which Agent Baxter's documents referred.) + +However, Autodesk had reduced its Cyberspace program to a couple of +programmers. I imagined Randy Walser and Carl Tollander toiling away in +the dark and lonely service of their country. Didn't work. Then I tried to +describe Virtual Reality to Agent Baxter, but that didn't work either. In +fact, he tilted. I took several runs at it, but I could tell I was violating o\ +ur +border agreements. These seemed to include a requirement that neither of +us try to drag the other across into his conceptual zone. + +I fared a little better on the Hacker's Conference. Hardly a conspiracy, the +Hacker's Conference is an annual convention originated in 1984 by the +Point Foundation and the editors of Whole Earth Review. Each year it +invites about a hundred of the most gifted and accomplished of digital +creators. Indeed, they are the very people who have conducted the +personal computer revolution. Agent Baxter looked at my list of Hacker's +Conference attendees and read their bios. "These are the people who +actually design this stuff, aren't they?" He was incredulous. Their +corporate addresses didn't fit his model of outlaws at all well. + +Why had he come all the way to Pinedale to investigate a crime he didn't +understand which had taken place (sort of) in 5 different places, none of +which was within 500 miles? + +Well, it seems Apple has told the FBI that they can expect little cooperation +from Hackers in and around the Silicon Valley, owing to virulent anti- +Apple sentiment there. They claim this is due to the Hacker belief that +software should be free combined with festering resentment of Apple's +commercial success. They advised the FBI to question only those Hackers +who were as far as possible from the twisted heart of the subculture. + +They did have their eye on some local people though. These included a +couple of former Apple employees, Grady Ward and Water Horat, Chuck +Farnham (who has made a living out of harassing Apple), Glenn Tenney +(the purported leader of the Hackers), and, of course, the purported CEO of +Autodesk. + +Other folks Agent Baxter asked me about included Mitch Kapor, who wrote +Lotus 1-2-3 and was known to have received some this mysterious source code. +Or whatever. But I had also met Mitch Kapor, both on the WELL and in +person. A less likely computer terrorist would be hard to come by. + +Actually, the question of the source code was another area where worlds +but shadow-boxed. Although Agent Baxter didn't know source code from +Tuesday, he did know that Apple Computer had told his agency that what +had been stolen and disseminated was the complete recipe for a Macintosh +computer. The distribution of this secret formula might result in the +creation of millions of Macintoshes not made by Apple. And, of course, +the ruination of Apple Computer. + +In my world, NuPrometheus (whoever they, or more likely, he might be) +had distributed a small portion of the code which related specifically to +Color QuickDraw. QuickDraw is Apple's name for the software which +controls the Mac's on-screen graphics. But this was another detail which +Agent Baxter could not capture. For all he knew, you could grow +Macintoshes from floppy disks. + +I explained to him that Apple was alleging something like the ability to +assemble an entire human being from the recipe for a foot, but even he +know the analogy was inexact. And trying to get him to accept the idea +that a corporation could go mad with suspicion was quite futile. He had a +far different perception of the emotional reliability of institutions. + +When he finally left, we were both dazzled and disturbed. I spent some +time thinking about Lewis Carroll and tried to return to writing about the +legal persecution of the Legion of Doom. But my heart wasn't in it. I +found myself suddenly too much in sympathy with Agent Baxter and his +struggling colleagues from Operation Sun Devil to get back into a proper +sort of pig- bashing mode. + +Given what had happened to other innocent bystanders like Steve Jackson, +I gave some thought to getting scared. But this was Kafka in a clown suit. +It wasn't precisely frightening. I also took some comfort in a phrase once +applied to the administration of Frederick the Great: "Despotism tempered +by incompetence." + +Of course, incompetence is a double-edged banana. While we may know +this new territory better than the authorities, they have us literally out- +gunned. One should pause before making well-armed paranoids feel +foolish, no matter how foolish they seem. + + + + + +The Fear of White Noise + + +"Neurosis is the inability to tolerate ambiguity." + +--Sigmund Freud, +appearing to me in a dream + + I'm a member of that half of the human race which is inclined to divide +the human race into two kinds of people. My dividing line runs between +the people who crave certainty and the people who trust chance. + +You can draw this one a number of ways, of course, like Control vs. +Serendipity, Order vs. Chaos, Hard answers vs. Silly questions, or Newton, +Descartes & Aquinas vs. Heisenberg, Mandelbrot & the Dalai Lama. Etc. + +Large organizations and their drones huddle on one end of my scale, busily +trying to impose predictable homogeneity on messy circumstance. On the +other end, free-lancers and ne'er-do-wells cavort about, getting by on luck +if they get by at all. + +However you cast these poles, it comes down to the difference between +those who see life as a struggle against cosmic peril and human infamy +and those who believe, without any hard evidence, that the universe is +actually on our side. Fear vs. Faith. + +I am of the latter group. Along with Gandhi and Rebecca of Sunnybrook +Farm, I believe that other human beings will quite consistently merit my +trust if I'm not doing something which scares them or makes them feel bad +about themselves. In other words, the best defense is a good way to get +hurt. + +In spite of the fact that this system works very reliably for me and my kind, +I find we are increasingly in the minority. More and more of our +neighbors live in armed compounds. Alarms blare continuously. +Potentially happy people give their lives over to the corporate state as +though the world were so dangerous outside its veil of collective +immunity that they have no choice. + +I have a number of theories as to why this is happening. One has to do +with the opening of Cyberspace. As a result of this development, +humanity is now undergoing the most profound transformation of its +history. Coming into the Virtual World, we inhabit Information. Indeed, +we become Information. Thought is embodied and the Flesh is made +Word. It's weird as hell. + +Beginning with the invention of the telegraph and extending through +television into Virtual Reality, we have been, for a over a century, +experiencing a terrifying erosion in our sense of both body and place. As +we begin to realize the enormity of what is happening to us, all but the +most courageous have gotten scared. + +And everyone, regardless of his psychic resilience, feels this overwhelming +sense of strangeness. The world, once so certain and tangible and legally +precise, has become an infinite layering of opinions, perceptions, litigation, +camera-angles, data, white noise, and, most of all, ambiguities. Those of us +who are of the fearful persuasion do not like ambiguities. + +Indeed, if one were a little jumpy to start with, he may now be fairly +humming with nameless dread. Since no one likes his dread to be +nameless, the first order of business is to find it some names. + +For a long time here in the United States, Communism provided a kind of +catch-all bogeyman. Marx, Stalin and Mao summoned forth such a spectre +that, to many Americans, annihilation of all life was preferable to the +human portion's becoming Communist. But as Big Red wizened and lost +his teeth, we began to cast about for a replacement. + +Finding none of sufficient individual horror, we have draped a number of +objects with the old black bunting which once shrouded the Kremlin. Our +current spooks are terrorists, child abductors, AIDS, and the underclass. I +would say drugs, but anyone who thinks that the War on Drugs is not +actually the War on the Underclass hasn't been paying close enough +attention. + +There are a couple of problems with these Four Horsemen. For one thing, +they aren't actually very dangerous. For example, only 7 Americans died +in worldwide terrorist attacks in 1987. Fewer than 10 (out of about 70 +million) children are abducted by strangers in the U.S. each year. Your +chances of getting AIDS if you are neither gay nor a hemophiliac nor a +junkie are considerably less than your chances of getting killed by +lightning while golfing. The underclass is dangerous, of course, but only, +with very few exceptions, if you are a member of it. + +The other problem with these perils is that they are all physical. If we are +entering into a world in which no one has a body, physical threats begin to +lose their sting. + +And now I come to the point of this screed: The perfect bogeyman for +Modern Times is the Cyberpunk! He is so smart he makes you feel even +more stupid than you usually do. He knows this complex country in +which you're perpetually lost. He understands the value of things you +can't conceptualize long enough to cash in on. He is the one-eyed man in +the Country of the Blind. + +In a world where you and your wealth consist of nothing but beeps and +boops of micro-voltage, he can steal all your assets in nanoseconds and +then make you disappear. + +He can even reach back out of his haunted mists and kill you physically. +Among the justifications for Operation Sun Devil was this chilling tidbit: + +"Hackers had the ability to access and review the files of hospital patients. +Furthermore, they could have added, deleted, or altered vital patient +information, possibly causing life-threatening situations." [Emphasis +added.] + +Perhaps the most frightening thing about the Cyberpunk is the danger he +presents to The Institution, whether corporate or governmental. If you are +frightened you have almost certainly taken shelter by now in one of these +collective organisms, so the very last thing you want is something which +can endanger your heretofore unassailable hive. + +And make no mistake, crackers will become to bureaucratic bodies what +viruses presently are to human bodies. Thus, Operation Sun Devil can be +seen as the first of many waves of organizational immune response to this +new antigen. Agent Baxter was a T-cell. Fortunately, he didn't know that +himself and I was very careful not to show him my own antigenic tendencies. + +I think that herein lies the way out of what might otherwise become an +Armageddon between the control freaks and the neo-hip. Those who are +comfortable with these disorienting changes must do everything in our +power to convey that comfort to others. In other words, we must share our +sense of hope and opportunity with those who feel that in Cyberspace they +will be obsolete eunuchs for sure. + +It's a tall order. But, my silicon brothers, our self-interest is strong. If w\ +e +come on as witches, they will burn us. If we volunteer to guide them +gently into its new lands, the Virtual World might be a more amiable +place for all of us than this one has been. + +Of course, we may also have to fight. + + + + + +Defining the conceptual and legal map of Cyberspace before the +ambiguophobes do it for us (with punitive over-precision) is going to +require some effort. We can't expect the Constitution to take care of itself. +Indeed, the precedent for mitigating the Constitutional protection of a new +medium has already been established. Consider what happened to radio in +the early part of this century. + +Under the pretext of allocating limited bandwidth, the government +established an early right of censorship over broadcast content which still +seems directly unconstitutional to me. Except that it stuck. And now, +owing to a large body of case law, looks to go on sticking. + +New media, like any chaotic system, are highly sensitive to initial +conditions. Today's heuristical answers of the moment become +tomorrow's permanent institutions of both law and expectation. Thus, +they bear examination with that destiny in mind. + +Earlier in this article, I asked a number of tough questions relating to the +nature of property, privacy, and speech in the digital domain. Questions +like: "What are data and what is free speech?" or "How does one treat +property which has no physical form and can be infinitely reproduced?" +or "Is a computer the same as a printing press." The events of Operation +Sun Devil were nothing less than an effort to provide answers to these +questions. Answers which would greatly enhance governmental ability +to silence the future's opinionated nerds. + +In over-reaching as extravagantly as they did, the Secret Service may +actually have done a service for those of us who love liberty. They have +provided us with a devil. And devils, among their other galvanizing +virtues, are just great for clarifying the issues and putting iron in your +spine. In the presence of a devil, it's always easier to figure out +where you stand. + +While I previously had felt no stake in the obscure conundra of free +telecommunication, I was, thanks to Operation Sun Devil, suddenly able +to plot a trajectory from the current plight of the Legion of Doom to an +eventual constraint on opinions much dearer to me. I remembered +Martin Neimoeller, who said: + +"In Germany they came first for the Communists, and I didn't speak up +because I wasn't a Communist. Then they came for the Jews, and I didn't +speak up because I wasn't a Jew. They came for the trade unionists, and I +didn't speak up because I wasn't a trade unionist. Then they came for the +Catholics, and I didn't speak up because I was a Protestant. Then they +came for me, and by that time no one was left to speak up." + +I decided it was time for me to speak up. + +The evening of my visit from Agent Baxter, I wrote an account of it which I +placed on the WELL. Several days later, Mitch Kapor literally dropped by +for a chat. + +Also a WELL denizen, he had read about Agent Baxter and had begun to +meditate on the inappropriateness of leaving the our civil liberties to be +defined by the technologically benighted. A man who places great emphasis +on face-to-face contact, he wanted to discuss this issue with me in person. +He had been flying his Canadair bizjet to a meeting in California when he +realized his route took him directly over Pinedale. + +We talked for a couple of hours in my office while a spring snowstorm +swirled outside. When I recounted for him what I had learned about +Operation Sun Devil, he decided it was time for him to speak up too. + +He called a few days later with the phone number of a civil libertarian named +Harvey Silverglate, who, as evidence of his conviction that everyone +deserves due process, is currently defending Leona Helmsley. Mitch +asked me to tell Harvey what I knew, with the inference that he would +help support the costs which are liable to arise whenever you tell a lawyer +anything. + +I found Harvey in New York at the offices of that city's most distinguished +constitutional law firm, Rabinowitz, Boudin, Standard, Krinsky, and +Lieberman. These are the folks who made it possible for the New York +Times to print the Pentagon Papers. (Not to dwell on the unwilling +notoriety which partner Leonard Boudin achieved back in 1970 when his +Weathergirl daughter blew up the family home...) + +In the conference call which followed, I could almost hear the skeletal click +as their jaws dropped. The next day, Eric Lieberman and Terry Gross of +Rabinowitz, Boudin met with Acid Phreak, Phiber Optik, and Scorpion. + +The maddening trouble with writing this account is that Whole Earth +Review, unlike, say, Phrack, doesn't publish instantaneously. Events are +boiling up at such a frothy pace that anything I say about current +occurrences surely will not obtain by the time you read this. The road +from here is certain to fork many times. The printed version of this will +seem downright quaint before it's dry. + +But as of today (in early June of 1990), Mitch and I are legally constituting +the Computer Liberty Foundation, a two (or possibly three) man +organization which will raise and disburse funds for education, lobbying, +and litigation in the areas relating to digital speech and the extension of +the Constitution into Cyberspace. + +Already, on the strength of preliminary stories about our efforts in the +Washington Post and the New York Times, Mitch has received an offer +from Steve Wozniak to match whatever funds he dedicates to this effort. +(As well as a fair amount of abuse from the more institutionalized +precincts of the computer industry.) + +The Computer Liberty Foundation will fund, conduct, and support legal +efforts to demonstrate that the Secret Service has exercised prior restraint +on publications, limited free speech, conducted improper seizure of +equipment and data, used undue force, and generally conducted itself in a +fashion which is arbitrary, oppressive, and unconstitutional. + +In addition, we will work with the Computer Professionals for Social +Responsibility and other organizations to convey to both the public and the +policy-makers metaphors which will illuminate the more general stake in +liberating Cyberspace. + +Not everyone will agree. Crackers are, after all, generally beyond public +sympathy. Actions on their behalf are not going to be popular no matter +who else might benefit from them in the long run. + +Nevertheless, in the litigations and political debates which are certain to +follow, we will endeavor to assure that their electronic speech is protected +as certainly as any opinions which are printed or, for that matter, +screamed. We will make an effort to clarify issues surrounding the +distribution of intellectual property. And we will help to create for +America a future which is as blessed by the Bill of Rights as its past has +been. + + + +John Perry Barlow +barlow@well.sf.ca.us +Friday, June 8, 1990 + + + \ No newline at end of file diff --git a/textfiles.com/bbs/suprt.lst b/textfiles.com/bbs/suprt.lst new file mode 100644 index 00000000..c30191a6 --- /dev/null +++ b/textfiles.com/bbs/suprt.lst @@ -0,0 +1,625 @@ + TECHNICAL SUPPORT LIST + BBS'S, DATAFAX'S & INTERNET SITES + COMMERCIAL & SHAREWARE + + DECEMBER 1995 + SUPRT512 + + This list contains only BBS's, Datafax's and Internet Sites ran by Hardware +Manufacturers, Commercial Software Companies and Shareware Software Companies. +If you have any support sites that should be added or changes on this list, +please fill out the SUPRTADD.FRM and send it in via one of the following: + +1) Call the Digicom BBS 812-479-1310 +2) FidoNet Users Send Netmail to 1:2310/200 (Gary Barr) +3) Fax the form into (812) 474-2264 +4) CompuServe Mail to 70007,4634 +5) Internet Users Send Mail to garybarr@digicom.com +6) By US Mail to Gary Barr, 7624 Syls Drive, Evansville, IN 47712 +7) American Online Email to GABarr +8) Delphi Email to AlanBarr + + +COMPANY/BBS NAME........... BBS NUMBER DATAFAX INTERNET ADDRESS +------------------------------------------------------------------------------ +3Com....................... 408-980-8204 ...-...-.... http://www.3com.com +3rd Planet Software, Inc... 213-841-2260 ...-...-.... ........................ +Abacus Concepts............ 616-698-8106 ...-...-.... ........................ +Abaton Technology.......... 510-226-9694 ...-...-.... ........................ +Ablesoft................... 804-867-7966 ...-...-.... ........................ +Above Software............. 714-851-5102 ...-...-.... ........................ +Access Software............ 801-364-7449 ...-...-.... ........................ +Access Solutions Corp...... ...-...-.... 609-988-8007 ........................ +Accolade................... 408-296-8800 ...-...-.... ........................ +Accton Technology.......... 408-452-8828 ...-...-.... ........................ +Acculogic Corporation...... 714-454-8124 ...-...-.... ........................ +Ace Software............... 408-451-0571 ...-...-.... ........................ +Acecad..................... 408-655-1988 ...-...-.... ........................ +Acer America............... ...-...-.... 800-554-2494 http://www.acer.com +Adaptec.................... 408-945-7727 408-957-7150 http://adaptec.com +ADI Systems................ ...-...-.... 800-767-8182 ........................ +Adobe Systems.............. 206-623-6984 ...-...-.... ........................ +Advanced Digital Corp...... 714-894-0893 ...-...-.... ........................ +Advanced Gravis Computer... 604-431-5927 ...-...-.... ........................ +Advanced Logic Research.... 714-458-6834 714-581-3332 ........................ +Agfa Compugraphics......... 508-694-9577 ...-...-.... ........................ +Aldus Corporation.......... 206-623-6984 ...-...-.... ........................ +All Computer............... 416-960-8679 ...-...-.... ........................ +AllFix..................... 416-222-9644 ...-...-.... ........................ +Alloy Computer Products.... 508-486-4044 ...-...-.... ........................ +Allied Telesis............. 415-964-2994 ...-...-.... ........................ +Alpha Software............. 617-229-2915 ...-...-.... ........................ +Altima..................... 510-356-2456 ...-...-.... ........................ +Altsys..................... 214-680-9696 ...-...-.... ........................ +Amdek Corporation.......... 408-922-4400 ...-...-.... ........................ +American Megatrends (AMI).. 404-246-8780 800-836-8028 ........................ +American Power Conversions. ...-...-.... 800-347-3299 ........................ +American Small Business Co. 918-825-4878 ...-...-.... ........................ +Andyne Computing........... 613-548-1032 ...-...-.... ........................ +Apogee Software............ 508-365-2359 ...-...-.... ........................ +Applied Engineering........ 214-241-6677 ...-...-.... ........................ +Appoint.................... 510-803-9018 ...-...-.... ........................ +Arabesque Software......... 206-881-0905 ...-...-.... ........................ +Archtek America Corp....... 818-912-3980 ...-...-.... ........................ +Arsenal Computer........... 913-234-9395 ...-...-.... ........................ +Artisoft................... 602-293-0065 ...-...-.... ........................ +Artist Graphics............ 612-631-7669 ...-...-.... ........................ +Ask Sam Systems............ 904-584-8287 ...-...-.... ........................ +Aspen Peripherals.......... 503-286-9620 ...-...-.... ........................ +Asymetrix.................. 206-451-1173 ...-...-.... ........................ +AST Research............... 714-727-4723 800-347-3299 ........................ +AST Research Canada........ 905-512-8558 ...-...-.... ........................ +ATI Technologies........... 905-764-9404 ...-...-.... ........................ +Attachmate................. 206-649-6660 ...-...-.... ........................ +Aurora Terra............... 301-230-1214 ...-...-.... ........................ +Autodesk Inc............... 415-507-5921 ...-...-.... ........................ +Automated Design Systems... 404-394-7448 ...-...-.... ........................ +Avatar..................... 404-740-8428 ...-...-.... ........................ +Beagle Bros................ 801-226-1605 ...-...-.... ........................ +Best Power Technology...... 608-565-7424 ...-...-.... ........................ +Bestgift Service........... 813-978-3044 ...-...-.... ........................ +Bethesda Software.......... 301-990-7552 ...-...-.... ........................ +Big State Doors............ 512-376-5644 ...-...-.... ........................ +Bit Software............... 510-490-6637 ...-...-.... ........................ +Black Box Corporation...... ...-...-.... 412-746-5500 ........................ +Blackmond Software......... 505-589-0319 ...-...-.... ........................ +Boca Research.............. 407-241-1601 ...-...-.... http://www.boca.org +Borland.................... 408-439-9096 800-822-4269 http://www.borland.com +Bottom Line Software, Inc.. 214-394-4170 ...-...-.... ........................ +Bourbaki................... 208-342-5823 ...-...-.... ........................ +Brightbill Roberts......... 315-472-1058 ...-...-.... ........................ +Brightwork Dvlpmnt (McAfee) 408-988-4004 ...-...-.... ........................ +Broderbund................. 415-883-5889 ...-...-.... ........................ +Buerg Software............. 707-778-8944 ...-...-.... ........................ +Buffalo Creek Software..... 515-225-8496 ...-...-.... ........................ +Bureau Of Electronic Publ.. 201-808-0085 ...-...-.... ........................ +Cabletron.................. 603-335-4803 ...-...-.... ........................ +Calcomp.................... 714-236-3045 ...-...-.... ........................ +Calera Recognition Systems. 408-773-9068 ...-...-.... ........................ +Campbell Services.......... 313-559-6434 ...-...-.... ........................ +Canon Computer Systems Inc. 714-438-3325 800-423-2366 ........................ +Canon Printer Division..... 516-488-6528 ...-...-.... ........................ +Canon Printer (Italy)......39-2-58010997 ...-...-.... ........................ +Capstone................... 305-471-8962 ...-...-.... ........................ +Cardinal Technologies...... 717-293-3074 800-775-0899 ........................ +Cardz...................... 604-734-5400 ...-...-.... ........................ +Castelle................... 408-496-1807 ...-...-.... ........................ +CBIS, Inc.................. 404-446-0485 ...-...-.... ........................ +cc:Mail.................... 415-691-0401 ...-...-.... ........................ +Central Point.............. 503-690-6650 503-984-2490 ........................ +Certus..................... 408-973-9834 ...-...-.... ........................ +CH Products................ 619-598-3224 ...-...-.... ........................ +Cheyenne Software.......... 516-484-3445 ...-...-.... ........................ +Chinon America............. 310-320-4160 ...-...-.... ........................ +Chipsoft................... 619-550-5018 ...-...-.... ........................ +Chwatal Development Co..... 318-487-0800 ...-...-.... ........................ +Cirrus Logic Corp.......... 510-440-9080 ...-...-.... ........................ +Citizens America Corp...... 310-453-7564 ...-...-.... ........................ +Citrix Systems............. 305-346-9004 ...-...-.... ........................ +Clarion Software........... 305-785-2594 ...-...-.... ........................ +Claris Corp................ 408-987-7421 800-800-8954 ........................ +Clark Development Corp..... 801-261-8976 ...-...-.... ........................ +Clear Software............. 617-965-5406 ...-...-.... ........................ +Cleo Communications........ 313-996-1213 ...-...-.... ........................ +CMS Enhancements........... 714-222-6601 ...-...-.... ........................ +CNET....................... 408-954-1787 ...-...-.... ........................ +Coconut Computing Inc...... 619-456-0815 ...-...-.... ........................ +Codenoll................... 914-965-1972 ...-...-.... ........................ +Colorado Memory Systems.... 303-635-0650 800-368-9673 ........................ +Columbia Data Products..... 407-862-4724 ...-...-.... ........................ +Commsoft................... 707-838-6373 ...-...-.... ........................ +Communications Research.... 708-933-5333 ...-...-.... ........................ +Compaq Computer Systems.... 713-378-1418 800-345-1518 ........................ +Complete PC................ 408-434-9703 ...-...-.... ........................ +Complex Inc................ 714-630-2570 ...-...-.... ........................ +Comprehensive Video Supply. 201-767-7990 ...-...-.... ........................ +Compton's New Media........ 619-929-2597 ...-...-.... ........................ +Compulink Management Center 310-212-5850 ...-...-.... ........................ +Computer Associates........ 516-434-1753 ...-...-.... ........................ +Computer Peripherals....... 805-499-9646 ...-...-.... ........................ +Computer Support........... 214-404-8652 ...-...-.... ........................ +Computone.................. 404-343-9737 ...-...-.... ........................ +Comtrol.................... 612-631-8310 ...-...-.... ........................ +Conner International....... 408-456-4415 408-456-4903 http://www.conner.com +Conner Peripherals......... 407-263-3502 ...-...-.... ........................ +Core International......... 407-241-2929 ...-...-.... ........................ +Corel System............... 613-728-4752 ...-...-.... ........................ +Cornerstone................ 408-435-8943 ...-...-.... ........................ +Corvus System, Inc......... 408-972-9154 ...-...-.... ........................ +CoStar..................... 203-661-6292 ...-...-.... ........................ +Covox Corpoartion.......... 503-342-8261 ...-...-.... ........................ +Creative Labs.............. 405-742-6660 ...-...-.... ........................ +Cross Communications....... 303-444-9003 ...-...-.... ........................ +CrossTies.................. 714-732-6754 ...-...-.... ........................ +Crystal Services........... 604-681-9516 ...-...-.... ........................ +CTX International.......... 909-594-8973 ...-...-.... ........................ +Cyrix Corporation.......... 214-680-3187 ...-...-.... ........................ +DAC Software............... 214-931-6617 ...-...-.... ........................ +DAK Online Resource Center. 818-715-7153 ...-...-.... ........................ +Dariana Technology Group... 714-236-1388 ...-...-.... ........................ +Dartek Computer Supply..... ...-...-.... 708-832-8707 ........................ +Darwin Systems............. 301-251-9206 ...-...-.... ........................ +Data Access................ 305-238-0640 ...-...-.... ........................ +Data I/O................... 206-882-3211 ...-...-.... ........................ +Datadesk/Prometheus........ 503-691-5199 ...-...-.... ........................ +DataEase Int'l............. 203-374-6302 ...-...-.... ........................ +Dataman.................... 407-649-3159 ...-...-.... ........................ +Dataproducts Corp.......... 818-887-8167 ...-...-.... ........................ +Datastorm Technologies..... 314-875-0503 ...-...-.... ........................ +DataWatch.................. 919-549-0042 ...-...-.... ........................ +Data Technology............ 408-942-4010 408-942-4005 ........................ +David Systems.............. 408-720-0406 ...-...-.... ........................ +Dayna Communications....... 801-269-7389 ...-...-.... ........................ +DCA........................ 404-740-8428 ...-...-.... ........................ +DEC PC Support............. 508-496-8800 ...-...-.... ........................ +Dell Computer Corp......... 512-728-8528 800-950-1329 ........................ +Delphi..................... 800-365-4636 ...-...-.... ........................ +Delrina Technology Inc..... 416-441-2752 416-443-1614 ........................ +DeltaComm Development...... 919-481-9399 ...-...-.... ........................ +DeScribe................... 916-929-3237 ...-...-.... ........................ +Diagnostic Technologies.... 905-607-6570 ...-...-.... ........................ +DiagSoft................... 408-438-8997 ...-...-.... ........................ +Diamond Computer........... 408-524-9301 ...-...-.... ........................ +Digiboard.................. 612-943-0812 612-943-0447 ........................ +Digital Communications..... 513-433-5080 ...-...-.... ........................ +Digital Dynamics........... 714-529-5313 ...-...-.... ........................ +Digital Equipment Corp..... ...-...-.... 800-388-3228 ........................ +Digital Research........... 408-649-3443 ...-...-.... ........................ +Digital Theatre............ 404-446-0485 ...-...-.... ........................ +Digital Vision............. 617-329-8387 ...-...-.... ........................ +Disk Technician Corporation 619-272-9240 ...-...-.... ........................ +Disney Software............ 818-567-4027 ...-...-.... ........................ +Distibuted Processing Tech. 407-831-6432 ...-...-.... ........................ +D-Link Systems, Inc........ 714-455-1779 ...-...-.... ........................ +DNA Networks, Inc.......... 215-296-9558 ...-...-.... ........................ +Dove Computer.............. 919-343-5616 ...-...-.... ........................ +DPT........................ 407-830-1070 ...-...-.... ........................ +DSP Solutions.............. 415-494-1621 ...-...-.... ........................ +DTK Computer Inc. Of Texas. 713-568-9941 ...-...-.... ........................ +Dudley Software............ 615-966-3574 ...-...-.... ........................ +Dynamic Microprocessor..... 516-462-6638 ...-...-.... ........................ +E-Machines................. 408-541-6190 ...-...-.... ........................ +E-WARE..................... 714-236-1388 ...-...-.... ........................ +Eagle Technology........... 408-607-7444 ...-...-.... ........................ +EagleSoft.................. 812-479-1310 ...-...-.... ........................ +E.D.S. Development......... 812-423-3394 ...-...-.... ........................ +Elan Software.............. 310-459-3443 ...-...-.... ........................ +Elite Business App's....... 410-987-2335 ...-...-.... ........................ +Emac/Everex................ 510-226-9694 ...-...-.... ........................ +Emerald Systems............ 619-673-4617 ...-...-.... ........................ +Enable Software............ 518-877-6316 ...-...-.... ........................ +Envisio.................... 612-633-0051 ...-...-.... ........................ +Epson America, Inc......... 310-782-4531 800-922-8911 http://www.epson.com +Equilibrium................ 415-332-6152 ...-...-.... ........................ +Equinox Systems, Inc....... 305-791-1633 ...-...-.... ........................ +eSoft Inc.................. 303-699-8222 ...-...-.... http://www.esoft.com +ETS Incorporated........... 801-265-0919 ...-...-.... ........................ +Exabyte.................... 913-492-8751 ...-...-.... ........................ +Excalibur.................. 408-244-0813 ...-...-.... ........................ +Excalibur Communications... 918-496-8113 ...-...-.... ........................ +Expervision................ 408-456-0280 ...-...-.... ........................ +EZX Publishing............. 713-280-8180 ...-...-.... ........................ +Family Scrapbook........... 904-249-9515 ...-...-.... ........................ +Farallon Computing......... 510-865-1321 ...-...-.... ........................ +Fifth Generation Systems... 504-295-3344 ...-...-.... ........................ +Folio...................... 801-375-9907 ...-...-.... ........................ +Foresight Resources........ 816-891-8465 ...-...-.... ........................ +Frame Technology........... 408-975-6729 ...-...-.... ........................ +Franklin Quest Company..... 801-977-1991 ...-...-.... ........................ +Frederick Engineering, Inc. 301-290-6944 ...-...-.... ........................ +Fresh Technology........... 602-497-4235 ...-...-.... ........................ +Fujitsu Computer Products.. 408-944-9899 408-428-0456 ........................ +Future Domain.............. 714-253-0432 ...-...-.... ........................ +FutureSoft Engineering..... 713-588-6870 ...-...-.... ........................ +Galacticomm................ 305-583-7808 ...-...-.... ........................ +GammaLink.................. 408-745-2216 ...-...-.... ........................ +GAP Development Company.... 714-493-3819 ...-...-.... ........................ +Gateway 2000............... 605-232-2224 800-846-4526 http://www.gw2k.com +Gateway Communications..... 703-960-8509 ...-...-.... ........................ +Gazelle Systems............ 801-375-2548 ...-...-.... ........................ +GEcho...................... 316-263-5313 ...-...-.... ........................ +General DataComm Ind....... 203-598-0593 ...-...-.... ........................ +GEnie Information Services. 800-638-8369 ...-...-.... ........................ +Genicom.................... 703-949-1576 ...-...-.... ........................ +Genoa Systems.............. 408-943-1231 ...-...-.... ........................ +Gensoft Development........ 206-562-9407 ...-...-.... ........................ +GeoWorks................... 510-549-1884 ...-...-.... ........................ +GeoClock................... 703-241-7980 ...-...-.... ........................ +Gibson Research............ 714-362-8848 ...-...-.... ........................ +GigaTrend, Inc............. 619-931-9469 ...-...-.... ........................ +Global Computer Supply..... ...-...-.... 516-625-6268 ........................ +Global Village Comm........ 415-390-8334 ...-...-.... ........................ +GoldDisk................... 905-602-7534 ...-...-.... ........................ +Goldstar Technologies...... 205-772-4612 ...-...-.... ........................ +Graphic Workshop........... 416-729-4609 ...-...-.... ........................ +Great American Software.... 603-889-7292 ...-...-.... ........................ +Gupta Technologies, Inc.... 415-617-4700 ...-...-.... ........................ +GVC Technologies........... 201-579-2380 ...-...-.... ........................ +Gwynn's Communications..... 703-494-0098 ...-...-.... ........................ +Hayes Microcomputer........ 800-874-2937 800-333-1917 ........................ +Hayes Microcomputer........ 404-446-6336 800-333-1917 ........................ +Hazard Soft................ 405-243-3200 ...-...-.... ........................ +HDC Computer............... 206-869-2418 ...-...-.... ........................ +Helix Software............. 718-392-4054 ...-...-.... ........................ +Hercules Computer.......... 510-623-7449 800-711-4372 http://www.hercules.com +Hewlett Packard BBS........ 208-344-1691 800-333-1917 http://www.hp.com +Houston Instruments........ 512-873-1477 ...-...-.... ........................ +Hyundai Electronics Amer... 408-473-9899 ...-...-.... ........................ +IBM........................ 919-517-0001 800-426-3395 http://www.ibm.com...... +IBM Canada................. 905-316-4244 ...-...-.... ........................ +IBM AntiVirus Netherlands..+31-79-223300 ...-...-.... ........................ +Intelligent Graphics Corp.. 408-441-0386 ...-...-.... ........................ +IMC Networks............... 714-724-0930 ...-...-.... ........................ +IMSI Software.............. 415-454-2893 ...-...-.... ........................ +Infinity Computer Services. 215-965-8028 ...-...-.... ........................ +Infochip Systems........... 408-727-2496 ...-...-.... ........................ +Informix................... 913-492-2089 ...-...-.... ........................ +InfoShare.................. 703-803-8000 ...-...-.... ........................ +Innovative Data Concepts... 215-357-4183 ...-...-.... ........................ +Inset Corporation.......... 203-740-0063 ...-...-.... ........................ +Insignia Solutions......... 415-694-7694 ...-...-.... ........................ +Intel Components Support... 503-264-7999 800-525-3019 http://www.intel.com +Intel Application Support.. 916-356-3600 800-628-2283 ........................ +InterPlay Productions...... 714-252-2822 ...-...-.... ........................ +Intracorp.................. 305-378-8793 ...-...-.... ........................ +Iomega..................... 801-392-9819 801-778-5763 ........................ +IQ Software................ 206-821-5486 ...-...-.... ........................ +Irwin Magnetics............ 407-263-3662 ...-...-.... ........................ +Jaton Corporation.......... 408-263-8529 ...-...-.... ........................ +Jetfax..................... 415-324-1259 ...-...-.... ........................ +Jetform.................... 613-563-2894 ...-...-.... ........................ +JDR Microdevices........... 408-494-1430 ...-...-.... ........................ +Jovian Logic............... 510-651-6989 ...-...-.... ........................ +Kent Marsh................. 713-522-8921 ...-...-.... ........................ +Kenwood Italy.............. 39-229516558 ...-...-.... ........................ +Keyfile.................... 603-883-5968 ...-...-.... ........................ +Keytronics................. 509-927-5288 ...-...-.... ........................ +Kingston Technology........ 714-435-2636 714-435-2677 ........................ +Knowledge Adventure........ 818-248-0166 ...-...-.... ........................ +Kodiak Technology.......... 510-659-0857 ...-...-.... ........................ +Kurta Corp................. 602-243-9440 ...-...-.... ........................ +LAN Master................. 817-771-0233 ...-...-.... ........................ +LAN Systems................ 801-373-6980 ...-...-.... ........................ +LAN Works.................. 416-238-0253 ...-...-.... ........................ +Laser Go................... 619-450-9370 ...-...-.... ........................ +Laser Master............... 612-835-5463 ...-...-.... ........................ +Laser Printer Accessories.. 619-674-2196 ...-...-.... ........................ +Laser Tools................ 510-420-1942 ...-...-.... ........................ +Lattice.................... 708-916-1200 ...-...-.... ........................ +Leading Edge............... 508-836-3971 ...-...-.... ........................ +Lexmark.................... 606-232-5238 ...-...-.... ........................ +Liant Software............. 206-236-6485 ...-...-.... ........................ +Lightning Communications... 714-457-9429 ...-...-.... ........................ +Link Technologies.......... 510-623-6680 ...-...-.... ........................ +Linksys.................... 714-222-5111 ...-...-.... ........................ +LlanoWare Doors............ 805-264-0443 ...-...-.... ........................ +Locus Computing............ 310-337-5995 ...-...-.... ........................ +Logical Connection......... 503-585-5797 ...-...-.... ........................ +Logitech................... 510-795-0408 800-245-0000 ........................ +Lotus...................... 617-693-7001 ...-...-.... ........................ +Lotus...................... 404-395-7707 ...-...-.... ........................ +Lucas Arts Entertainment... 415-257-3070 ...-...-.... ........................ +Lucid...................... 214-994-8125 ...-...-.... ........................ +Mace, Paul Software........ 503-482-7435 ...-...-.... ........................ +Madge Networks............. 408-955-0262 ...-...-.... ........................ +Magee Enterprises, Inc..... 404-446-6650 ...-...-.... ........................ +Magitronic Technology...... 516-454-8262 ...-...-.... ........................ +Magnavox................... 310-532-6436 ...-...-.... ........................ +Main Lan................... 407-331-7433 ...-...-.... ........................ +Mannesman Tally............ 206-251-5513 ...-...-.... ........................ +Mansfield Software Group... 203-429-3784 ...-...-.... ........................ +Manugistics................ 301-984-5222 ...-...-.... ........................ +Manx Software Systems...... 201-542-2793 ...-...-.... ........................ +Manzanila Software Systems. 916-784-9099 916-773-9287 ........................ +Martek..................... 714-453-1210 ...-...-.... ........................ +MASS Microsystems.......... 408-956-5999 ...-...-.... ........................ +Masterclip Graphics........ 305-967-9453 ...-...-.... ........................ +Mathematica................ 813-683-6840 ...-...-.... ........................ +Matrix Technology.......... 617-569-3787 ...-...-.... ........................ +Matrox Graphics Inc........ 514-685-6008 ...-...-.... ........................ +Maxi Host Support.......... 209-836-2402 ...-...-.... ........................ +Maxis Software............. 510-254-3869 ...-...-.... ........................ +Maxtor/Miniscribe.......... 303-678-2020 800-262-9867 http://www.maxtor.com +Maynard Electronics........ 407-263-3502 ...-...-.... ........................ +McAfee Assoc............... 408-988-4004 ...-...-.... ........................ +MECA Software.............. 203-259-2191 ...-...-.... ........................ +Media Vision............... 510-770-0968 ...-...-.... ........................ +Mediacom................... 510-521-5757 ...-...-.... ........................ +Mediacom................... 510-521-5758 ...-...-.... ........................ +Megahertz.................. 801-320-8840 ...-...-.... ........................ +Mergent International...... 203-257-4305 ...-...-.... ........................ +Meridian Data.............. 408-439-9509 ...-...-.... ........................ +Merisel.................... 508-485-8507 ...-...-.... ........................ +Merit Software............. 214-702-8641 ...-...-.... ........................ +Metz Software.............. 206-644-3663 ...-...-.... ........................ +Micro Display Systems...... 612-438-3513 ...-...-.... ........................ +Micro Help................. 404-516-1497 404-591-6454 ........................ +Micro Solutions............ 815-756-9100 ...-...-.... ........................ +Microcom................... 617-255-1125 ...-...-.... ........................ +Microdyne.................. 703-960-8509 ...-...-.... ........................ +Micron Technology.......... 208-465-8982 ...-...-.... ........................ +Micronics.................. 510-651-6837 ...-...-.... ........................ +Micropolis Corp............ 818-709-3310 ...-...-.... ........................ +Microrim................... 206-649-9836 ...-...-.... ........................ +MicroProse................. 410-785-1841 ...-...-.... ........................ +Microspeed................. 510-490-1664 ...-...-.... ........................ +Microsoft.................. 206-936-6735 800-727-3351 http://www.microsoft.com +Microsoft Advanced Systems. ...-...-.... 800-936-4400 http://www.microsoft.com +Microsoft Desktop Apps..... ...-...-.... 800-936-4100 http://www.microsoft.com +Microsoft Operating System. ...-...-.... 800-936-4200 http://www.microsoft.com +Microsoft Development...... ...-...-.... 800-936-4300 http://www.microsoft.com +Microsystems Software...... 508-875-8009 ...-...-.... ........................ +Microtech.................. 203-469-6430 ...-...-.... ........................ +MicroTek Lab............... 310-297-5102 310-297-5101 ........................ +Microtest.................. 602-996-4009 ...-...-.... ........................ +Midwest Micro.............. 513-368-3741 ...-...-.... http://www.mwmicro.com +Mitsubishi................. 714-236-6286 ...-...-.... ........................ +Modem Doctor............... 410-256-3631 ...-...-.... ........................ +Moon Valley Software....... 805-781-3887 ...-...-.... ........................ +Mountain Network Solutions. 408-438-2665 ...-...-.... ........................ +Mouse Systems (MSC)........ 510-683-0617 800-786-6873 ........................ +Multi-Tech Systems......... 612-785-9875 ...-...-.... ........................ +Mustang Software........... 805-873-2400 ...-...-.... ........................ +Mutant Group............... 405-372-6621 ...-...-.... ........................ +Mylex...................... 510-793-3491 ...-...-.... ........................ +National Semiconductor..... 408-245-0671 ...-...-.... ........................ +NCD Distribution........... 305-599-0749 ...-...-.... ........................ +NCR........................ 719-596-1649 ...-...-.... ........................ +NEC Technologies........... 508-635-4706 800-366-0476 ........................ +NetSoft.................... 714-753-0380 ...-...-.... ........................ +Network Products Corp...... 818-441-6933 ...-...-.... ........................ +NetWorth................... 214-869-2959 ...-...-.... ........................ +New Media Graphics......... 714-453-0214 ...-...-.... ........................ +NewCom Inc................. 805-371-7677 ...-...-.... ........................ +NewGen..................... 714-641-3869 ...-...-.... ........................ +Night Owl.................. 716-483-3925 ...-...-.... ........................ +NISCA...................... 214-446-0646 ...-...-.... ........................ +Northgate.................. 612-361-5217 ...-...-.... ........................ +Norton-Lambert............. 805-683-2249 ...-...-.... ........................ +Novell..................... 801-429-3308 800-638-9273 ........................ +Novell Desktop Systems..... 408-649-3443 ...-...-.... ........................ +Nuiq Software Inc.......... 914-833-1479 ...-...-.... ........................ +Number Nine................ 617-862-7502 ...-...-.... ........................ +Ocean Isle Software........ 407-778-2407 ...-...-.... ........................ +OCR Systems................ 215-938-7245 ...-...-.... ........................ +Okidata.................... 609-234-5344 ...-...-.... ........................ +Olicom..................... 214-422-9835 ...-...-.... ........................ +Omen Technology............ 503-621-3746 ...-...-.... ........................ +Ontrack Computer Systems... 612-937-0860 ...-...-.... ........................ +Open Network............... 718-638-2239 ...-...-.... ........................ +Orchid Technology.......... 510-683-0555 ...-...-.... ........................ +Origin..................... 512-328-8402 ...-...-.... ........................ +Pacific Data Products...... 619-452-6329 ...-...-.... ........................ +Pacific Microelectronics... 415-941-9699 ...-...-.... ........................ +Packard Bell............... 801-250-1600 ...-...-.... ........................ +Palindrome................. 708-505-3336 ...-...-.... ........................ +Panasonic.................. 201-863-7845 ...-...-.... ........................ +Paperback Corporation...... 415-644-0782 ...-...-.... ........................ +Paradise Systems........... 714-753-1234 ...-...-.... ........................ +Patton & Patton Software... 408-778-9697 ...-...-.... ........................ +PC World Magazine.......... ...-...-.... 800-234-0455 ........................ +Peachtree Software......... 404-564-8071 404-925-2777 ........................ +Pentax Technologies........ 303-460-1637 ...-...-.... ........................ +Peripheral Land............ 510-651-5948 ...-...-.... ........................ +Persoft Software........... 608-273-6595 ...-...-.... ........................ +Phoenix Technologies....... 714-453-8619 ...-...-.... ........................ +Pinnacle Publishing........ 206-251-6217 ...-...-.... ........................ +Pinpoint Publishing........ 707-523-0468 ...-...-.... ........................ +Pioneer Software........... 919-851-1381 ...-...-.... ........................ +PKWare..................... 414-354-8670 ...-...-.... ........................ +PLI........................ 510-651-5948 ...-...-.... ........................ +Plus Development........... 408-434-1664 ...-...-.... ........................ +Polaris Software........... 619-592-2674 ...-...-.... ........................ +Power Computing............ 516-822-7396 ...-...-.... ........................ +Powercore.................. 815-468-2633 ...-...-.... ........................ +Practical Peripherals...... 805-496-4445 800-225-4774 ........................ +Priam Systems.............. 408-434-1646 ...-...-.... ........................ +Princeton Graphic Systems.. 404-664-1210 ...-...-.... ........................ +ProBoard International..... 612-537-8659 ...-...-.... ........................ +Procom Technologies........ 714-852-1305 ...-...-.... ........................ +Prometheus Products........ 503-691-5199 ...-...-.... ........................ +Promise Tech............... 408-452-1267 ...-...-.... ........................ +Proteon.................... 508-366-7827 ...-...-.... ........................ +Provantage................. ...-...-.... 216-494-7727 ........................ +Public Brand Software...... 317-856-2087 ...-...-.... ........................ +Pure Data.................. 214-242-3225 ...-...-.... ........................ +Qmail...................... 901-382-5583 ...-...-.... ........................ +QMS........................ 205-633-3632 ...-...-.... ........................ +Quadram.................... 404-564-5678 ...-...-.... ........................ +Qualitas................... 301-907-8030 ...-...-.... ........................ +Quantum.................... 408-894-3214 800-434-7532 http://www.quantum.com +Quarterdeck Office Systems. 310-314-3227 ...-...-.... http://www.qdeck.com +Quercus Systems............ 408-867-7488 ...-...-.... ........................ +Quess Micro................ 719-597-8670 ...-...-.... ........................ +QuickBBS................... 407-896-0494 ...-...-.... ........................ +Racal Interlan/Rabbit Soft. 508-264-4345 ...-...-.... ........................ +Race....................... 305-271-2146 ...-...-.... ........................ +Radio Shack................ ...-...-.... 800-323-6586 ........................ +Rams' Island Software...... 303-841-6269 ...-...-.... ........................ +Reference Software......... 801-225-4444 ...-...-.... ........................ +RelayNet National.......... 301-229-5623 ...-...-.... ........................ +Remote Control Int......... 619-431-4030 ...-...-.... ........................ +Revelation Technologies.... 206-641-8110 ...-...-.... ........................ +Rix Softworks.............. 714-476-0728 ...-...-.... ........................ +Rybs Electronics........... 303-443-7437 ...-...-.... ........................ +Saber Software............. 214-361-1883 ...-...-.... ........................ +Salt Air BBS............... 801-261-8976 ...-...-.... ........................ +Samsung Info Systems....... 201-691-6238 201-229-4053 ........................ +Santronics Software........ 305-248-7815 ...-...-.... ........................ +SAS Institute.............. 919-677-8155 ...-...-.... ........................ +SEAboard................... 201-473-1991 ...-...-.... ........................ +Seagate.................... 408-438-8771 408-438-2620 http://www.seagate.com +Searchlight Software....... 216-631-9285 ...-...-.... ........................ +SemWare.................... 404-641-8968 ...-...-.... ........................ +SFE Systems USA............ 205-650-0107 ...-...-.... ........................ +Sharp...................... 404-962-1788 201-529-9113 ........................ +Shiva Corporation.......... 617-273-0023 ...-...-.... ........................ +Shiva Systems Inc.......... 502-893-6360 ...-...-.... ........................ +Sitka Corporation.......... 415-769-8774 ...-...-.... ........................ +Sierra Online.............. 209-683-4463 ...-...-.... ........................ +Sigma Design............... 510-770-0111 ...-...-.... ........................ +Silicon Valley Computers... 415-967-8081 ...-...-.... ........................ +Sitka...................... 510-769-8774 ...-...-.... ........................ +Smith Micro Software....... 714-362-5822 ...-...-.... ........................ +SMS Technology............. 408-954-8231 ...-...-.... ........................ +Sofnet..................... 404-984-9926 ...-...-.... ........................ +SoftArc Inc................ 416-609-2250 ...-...-.... ........................ +Softklone.................. 904-878-9884 ...-...-.... ........................ +Softlogic Solutions........ 603-644-5556 ...-...-.... ........................ +Softronics................. 719-593-9295 ...-...-.... ........................ +Software Creations......... 509-365-2359 ...-...-.... ........................ +Software Products Intl..... 619-450-2179 ...-...-.... ........................ +Software Security.......... 203-329-7263 ...-...-.... ........................ +Software Store Products.... 516-589-4984 ...-...-.... ........................ +Software Support........... 408-439-9096 ...-...-.... ........................ +Software Venture........... 510-849-1912 ...-...-.... ........................ +Solectek Accessories....... 619-450-6537 ...-...-.... ........................ +Solutions Systems.......... 617-237-8530 ...-...-.... ........................ +Sony Electronics........... 408-955-5107 ...-...-.... ........................ +Sound Source Unlimited..... 805-373-8589 ...-...-.... ........................ +SparkWare.................. 901-382-5583 ...-...-.... ........................ +Spectra-Physics............ 513-233-2006 ...-...-.... ........................ +Spectra Publishing......... 408-730-8326 ...-...-.... ........................ +Spectrum Holobyte.......... 510-522-8909 ...-...-.... ........................ +SprintNet.................. 800-546-1000 ...-...-.... ........................ +Stac Electronics........... 619-431-5956 619-431-8585 ........................ +Standard Microsystems Corp. 516-434-3162 ...-...-.... ........................ +Star Micronics............. 908-572-5010 ...-...-.... ........................ +STB Systems................ 214-437-9615 ...-...-.... ........................ +Storage Dimensions......... 408-944-1221 ...-...-.... ........................ +Streamline Design.......... 905-793-1411 ...-...-.... ........................ +Summit Memory Systems...... 408-439-6774 ...-...-.... ........................ +Sunrise Software........... 404-256-9525 ...-...-.... ........................ +Sunriver................... 512-835-8082 ...-...-.... ........................ +Supermac Software.......... 408-541-6190 ...-...-.... ........................ +Supra Corp................. 503-967-2444 503-967-0072 ........................ +Sydex...................... 503-683-1385 ...-...-.... ........................ +SyDOS...................... 407-994-4367 ...-...-.... ........................ +Symantec................... 503-484-6699 800-554-4403 ........................ +Synopsys................... 408-970-3719 ...-...-.... ........................ +Systems Compatibility...... 312-670-4239 ...-...-.... ........................ +Syquest.................... 510-656-0473 ...-...-.... ........................ +Swan Technologies.......... 814-237-6145 ...-...-.... ........................ +T&J Software BBS........... 717-325-9481 ...-...-.... ........................ +T.A.G. BBS................. 313-582-6671 ...-...-.... ........................ +Tallgrass Technologies..... 913-492-8751 ...-...-.... ........................ +TEAMate.................... 213-318-5302 ...-...-.... ........................ +Technology Concepts........ 503-691-5199 ...-...-.... ........................ +Tecmar..................... 216-349-0853 ...-...-.... ........................ +Tektronix.................. 503-685-4504 ...-...-.... ........................ +Tektronic Test & Measurmnt. 503-627-5658 ...-...-.... ........................ +Telebit.................... 408-745-3861 ...-...-.... ........................ +Telix Support.............. 919-481-9399 ...-...-.... ........................ +Template Garden Software... 212-627-5089 ...-...-.... ........................ +Texas Instruments.......... 817-774-6809 ...-...-.... ........................ +TheSoft Programming........ 415-581-3019 ...-...-.... ........................ +Thomas Conrad.............. 512-836-8012 ...-...-.... ........................ +Thumper Technologies....... 918-627-0059 ...-...-.... ........................ +Thunderbyte USA............ 302-732-6399 ...-...-.... ........................ +Tiara Computer Systems..... 415-966-8533 ...-...-.... ........................ +Timeline Software.......... 415-892-0408 ...-...-.... ........................ +Timeslips.................. 508-768-7581 ...-...-.... ........................ +Tool Technology............ 415-289-7414 ...-...-.... ........................ +Tops microsystems.......... 510-769-8774 ...-...-.... ........................ +TopSoft Software........... 502-425-9941 ...-...-.... ........................ +Toshiba Printer Products... 714-837-4408 714-583-3800 ........................ +TouchStone Software........ 714-969-0688 ...-...-.... ........................ +Trantor Systems............ 510-656-5159 ...-...-.... ........................ +Traveling Software......... 206-485-1736 ...-...-.... ........................ +Trident Microsystems....... 415-691-1016 ...-...-.... ........................ +Trio Information Systems... 919-846-4987 ...-...-.... ........................ +TriSoft Software........... 207-941-0805 ...-...-.... ........................ +Triton Technologies........ 908-855-9609 ...-...-.... ........................ +Trius...................... 508-794-0762 ...-...-.... ........................ +True Vision................ 317-577-8783 ...-...-.... ........................ +TSR Systems................ 516-331-6682 ...-...-.... ........................ +Tseng Labs, Inc............ 215-579-7536 ...-...-.... ........................ +Turbo Tax.................. 619-453-5232 ...-...-.... ........................ +TurboCom................... 503-482-2633 ...-...-.... ........................ +Turtle Beach............... 717-767-5934 ...-...-.... ........................ +Ultimate Technographics.... 514-954-9059 ...-...-.... ........................ +Unicorn Software........... 317-784-2147 ...-...-.... ........................ +UniNova Service Corp....... 509-925-3893 ...-...-.... ........................ +US Robotics................ 708-982-5092 800-762-6163 http://www.usr.com +US Sage.................... 417-331-7433 ...-...-.... ........................ +ValuStor................... 408-437-1616 ...-...-.... ........................ +Velocity................... 708-991-0597 ...-...-.... ........................ +Ven Tel.................... 408-922-0988 ...-...-.... ........................ +Ventura Software........... 313-592-7400 ...-...-.... ........................ +Vermont Microsystems....... 802-655-7461 ...-...-.... ........................ +Viewsonic.................. 909-468-1241 909-869-7318 ........................ +Virex...................... 919-419-1602 ...-...-.... ........................ +Virgin Software............ 714-833-3305 ...-...-.... ........................ +Virtual Technologies....... 210-787-8974 ...-...-.... ........................ +Visual Business Systems.... 404-953-1613 ...-...-.... ........................ +Volkswriter................ 408-648-3015 ...-...-.... ........................ +Vortex Systems............. 412-322-3216 ...-...-.... ........................ +Wacom...................... 415-960-0236 ...-...-.... ........................ +Walker,Richer, & Quinn..... 206-217-0145 ...-...-.... ........................ +Wall Data.................. 206-814-4361 ...-...-.... ........................ +Walt Disney Software....... 818-567-4027 ...-...-.... ........................ +Wangtek.................... 805-582-3620 ...-...-.... ........................ +Wantree Development........ 913-441-0595 ...-...-.... ........................ +Warner Instruments......... 616-842-1471 ...-...-.... ........................ +Wearnes Technology......... 408-436-0586 ...-...-.... ........................ +Webster's Lexxicon Publish. 718-897-6902 ...-...-.... ........................ +Western Digital............ 714-753-1068 714-932-5000 http://www.wdc.com +White Water Systems........ 708-328-9442 ...-...-.... ........................ +Whole Counsel Ministies.... 804-590-1659 ...-...-.... ........................ +Willow Peripherals......... 718-993-2066 ...-...-.... ........................ +Word Perfect Corp.......... 801-225-4444 800-228-9960 ........................ +Wordtech................... 415-254-1141 ...-...-.... ........................ +WorldWide Video............ 201-491-5147 ...-...-.... ........................ +Wyse....................... 408-922-4400 ...-...-.... ........................ +Xircom..................... 805-376-9130 ...-...-.... ........................ +Xyquest.................... 508-667-5669 ...-...-.... ........................ +Zenith Data Systems........ 708-808-4942 ...-...-.... http://www.zds.com +Zenographics............... 714-851-3860 ...-...-.... ........................ +Zeos Interntational, Ltd... ...-...-.... 800-845-2341 ........................ +Zoneware................... 414-461-9702 ...-...-.... ........................ +Zoom Telephonics........... 617-423-3733 ...-...-.... http://www.zoomtel.com +Zsoft...................... 404-514-6332 ...-...-.... ........................ +ZyXEL...................... 714-693-0762 ...-...-.... ........................ + +ADDITIONS/CHANGES: + +EDITORS NOTE: + We are currently working on setting up our own Internet Web Page, where you +can gain access to the latest issues of this list, along with sending in +updates for the list. You can also still contact us through our BBS System +at 812-479-1310 (Using WorldGroup BBS Software). + +REGISTERATION: + This list is of course, free for all, but to insure that I want to keep on +updating this list, please call our BBS and subscribe. We have subscription +rates as low as $7.00. I ask this not to make money, but to atleast help +towards the costs of maintaining this list. To give you an idea, I pay $30 +a month for Internet Access and probably spend $30-$50 a month in long +distance charges while I call and verify the new systems and make sure the old +ones are still available...plus not to mention the endless hours of editing. +But I love the list and I'm happy to hear from so many of you that find this +list a useful tool! + + Gary Barr + SUPRT Editor + garybarr@digicom.com diff --git a/textfiles.com/bbs/syndrome.txt b/textfiles.com/bbs/syndrome.txt new file mode 100644 index 00000000..be31b868 --- /dev/null +++ b/textfiles.com/bbs/syndrome.txt @@ -0,0 +1,97 @@ + + + + + The Hacker Syndrome - How they did it + September 5, 1986 + + + + Be on the look out for the following 2 computer hackers + that have recently started a raid of computer bulletin boards + in the Southern Calif. area. + Their names are: Steve Shaw and Pat Rajabi. They also + go by the following aliases: Jim Brooks, Brian Ohart, John + Aron, Jarrod Anderson, Sysop zz, Yocon Liber, John Smith, + Nick Rivers, Marc Williams and Max Sterling. + They have broken into a large PCBoard in this area and + have downloaded their membership list and crashed the board. + They have edited this list down to all sysops that have + logged onto this PCBoard and have been calling these boards, + logging on as they sysop and using the sysop's password. If + you are a sysop and if you use different passwords you have + nothing to fear. But, if you use the same password for + calling other boards and use it on your own board, you are in + for some real trouble, especially if your system is a PCBoard + or a Fido BBS. + I have called some sysops about this but gave up when I + learned that they had all ready been hit or knew about the + breech. If you operate a BBS-PC system you are relatively + safe. They will download your membership directory in search + of more sysops and that is about all. For other boards, they + can be very destructive. + When they log on to your board using your name and + password they will quickly assign themselves top level + security access and log off in hope of not being noticed. + Then they will log back on using their own name, enter + your membership records and create the above fictious names + and give them all sysop status. If they run out of things to + do they will try and exit to DOS and attempt a format of your + discs. + I have 100 pages of docs on hand showing what they do + and how they do it (all my boards activities are logged to + disk) and also they were dumb enough to upload their hit list + from a PCBoard they raided that contains names of many sysops + not only in Calif., but also in other states. + One sysop I talked to knows these criminal's real + addresses and phone numbers and is contacting the + authorities. This sysop talked to Steve Shaw and told me + that Steve Shaw informed him that they were out to destroy + "every PCBoard in America." This threat should not be taken + lightly. This guy means exactly what he says. He has all + ready proven it in this area. + If you notice these people's names on your BBS I would + suggest deleting your entire membership log and starting over + requiring your members to enter with new passwords that they + have not used before. + If you haven't been hit, I would strongly suggest + changing your password to your board daily or weekly. These + hackers are not exceptionally bright and are easy to catch if + you are aware of how they operate. + If you have any further questions, or if you would like + to know if you are on their hit list please contact BBS-Buena + + + page + 1 + + + + + The Hacker Syndrome - How they did it + September 5, 1986 + + + Park at (714) 821-5014. Don't ask for a copy of their hit + list because I will not put it out on the boards for security + reasons to others. But, if you know of a Pirate BBS, I'm + sure that this list is on their. It is an extensive list and + I'm sure that it has come from one of the very popular + PCBoards in this area. I don't know which one, if that is + what you are asking yourself. + I am sure that these hackers will have their fun and + quit but until then: play it safe! + + Ken Hedgecock + SysOp: BBS-Buena Park + + + + + + + + + + +[1] Tfiles: (1-8,?,Q) : \ No newline at end of file diff --git a/textfiles.com/bbs/sys b/textfiles.com/bbs/sys new file mode 100644 index 00000000..1cf6ce05 --- /dev/null +++ b/textfiles.com/bbs/sys @@ -0,0 +1,55 @@ +ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» +º The Sysops Tale º +º º +º BBSing is so much fun, º +º I did it all the time, º +º so I thought I'd start a bbs, º +º that was just for me and mine. º +º º +º The first week was really great, º +º new callers I was meeting, º +º and reading lots of great new mail, º +º and passing out my greetings. º +º º +º The second week was almost fun, º +º the message base was growing, º +º the files were going up and down, º +º things were smoothly flowing. º +º º +º The third week was OK I think, º +º a few problems here and there, º +º but so far I had only gained, º +º a very few gray hairs. º +º º +º The first month was over now, º +º the board was still on-line, º +º but folks had started writing me, º +º and answers took so much time, º +º º +º And after that it got so busy, º +º with all that mail to do, º +º I wished I had the time and cash, º +º to hire an extra crew. º +º º +º The messages were growing now, º +º the mail was piling up, º +º I barely had sufficient time, º +º to fill my coffee cup. º +º º +º The doors started going down, º +º the modem overheated, º +º the hard disk crashed and lost my files, º +º and I just felt defeated. º +º º +º But this stuff is so much fun, º +º I really can't stop now, º +º I'll cut and paste it back on-line, º +º and make it work somehow. º +º º +º And now I'm so much wiser, º +º I'll never let it fail, º +º for now I'll just have to go, º +º and answer all my mail. º +º º +º Copyright (c) 1992, John Chambers º +ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ diff --git a/textfiles.com/bbs/sys_liab.txt b/textfiles.com/bbs/sys_liab.txt new file mode 100644 index 00000000..deee6908 --- /dev/null +++ b/textfiles.com/bbs/sys_liab.txt @@ -0,0 +1,3784 @@ +This paper first appeared in the Albany Law Journal of Science and +Technology, Volume 3, Number 1. Care has been taken so that each +printed page has been indicated in this file (by strings of 70 "=" +signs, which can be search/replaced with page breaks in most word +processors), this way the paper may be cited without the need to track +down an official printed copy. (The only thing lost should be the +itallics and the small caps.) + +This paper may be freely distributed under the following conditions: + +1. It must be distributed without alteration. +2. It may not be distributed for a direct profit. +3. This paper is being distributed as postcard-ware. If you find it + informative or useful, please drop a note to the author and tell him + how you got a hold of this paper. + + David Loundy + 465 Pleasant Ave. + Highland Park, IL 60035 + +This paper is not intended to constitute legal advice pertaining to any +particular factual situation.. If you have a problem, or are seeking +advice as to how to avoid one, see an attorney to discuss your specific +situation. + + + +====================================================================== + E-LAW: LEGAL ISSUES AFFECTING COMPUTER INFORMATION SYSTEMS AND + SYSTEM OPERATOR LIABILITY[FN+] + + David J. Loundy[FN*] + +TABLE OF CONTENTS + + I. Introduction.................................... 81 + II. Computer Information Systems Defined............ 82 + A. Bulletin Board Systems....................... 82 + B. Teletext and Videotex or Videotext........... 85 + C. Information Distribution Systems............. 85 + D. Networks..................................... 86 + E. Issues Involved.............................. 87 + F. Legal Analogies.............................. 88 + III. Current Regulatory Environment.................. 89 + A. Defamation................................... 90 + B. Speech Advocating Lawless Action............. 98 + C. Fighting Words............................... 100 + D. Child Pornography............................ 101 + E. Computer Crime............................... 104 + F. Computer Fraud............................... 105 + G. Unauthorized Use of Communications Services.. 107 + H. Viruses...................................... 108 + I. Protection From Hackers...................... 111 + IV. Privacy......................................... 112 + A. Pre-Electronic Communication Privacy Act of + 1986. .................................... 112 + B. Electronic Communications Privacy Act of 1986 113 +-------------------------- +[FN+] Copyright 1992-1993 by David Loundy All Rights Reserved +[FN*] The author has a J.D. from the University of Iowa Law School and +has a B.A. in Telecommunications from Purdue University. He has been +active in the use and administration of computer bulletin board systems +for a number of years, and served on the Law School Computer Committee. +The author would like to thank Christina King and Professor Nicholas +Johnson for their assistance during the writing of this paper. +====================================================================== +80 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + C. Access to Stored Communications............. 116 + D. An Apparent Exception for Federal Records... 117 + E. Privacy Protection Act of 1980.............. 118 + V. Obscene and Indecent Material.................. 121 + A. Obscenity................................... 121 + B. Indecent Speech............................. 123 + VI. Copyright Issues............................... 124 + A. Basics of Copyrights........................ 124 + B. Copyrighted Text............................ 130 + C. Copyrighted Software........................ 130 + D. Copyrighted Pictures........................ 132 + VII. Liability for Computer Information System Content 134 + A. Information System as Press................. 135 + B. Information System as Republisher/ + Disseminator............................... 138 + C. Information System as Common Carrier........ 140 + D. Information System as Traditional Mail...... 143 + E. Information System as Traditional Bulletin + Board...................................... 145 + F. Information System as Broadcaster........... 149 + VIII. Suggestions for Regulation..................... 152 +====================================================================== +81 E-Law Copyright 1992-1993 by David Loundy + + Introduction + + + Over the last 50 years, the people of the developed + world have begun to cross into a landscape unlike any + which humanity has experienced before. It is a region + without physical shape or form. It exists, like a + standing wave, in the vast web of our electronic + communication systems. It consists of electron states, + microwaves, magnetic fields, light pulses and thought + itself. + It is familiar to most people as the "place" in + which a long-distance telephone conversation takes + place. But it is also the repository for all digital or + electronically transferred information, and, as such, it + is the venue for most of what is now commerce, industry, + and broad-scale human interaction. William Gibson called + this Platonic realm "Cyberspace," a name which has some + currency among its present inhabitants. + Whatever it is eventually called, it is the homeland of + the Information Age, the place where the future is destined + to dwell.[FN1] + +"Computer information systems," as the term is used in this paper, +refers to a variety of computer services that, together, make up +"Cyberspace." Cyberspace is the realm of digital data. Its shores +and rivers are the computer memories and telephone networks that +connect computers all over the world. Cyberspace is a hidden +universe behind the automatic teller machines, telephones, and +WESTLAW terminals which many of us take for granted. It is also a +way for computer users all over the world to interact with each +other instantaneously. At ever increasing rates, people are +beginning to see the advantages of this new electronic medium and +incorporate travels into Cyberspace as a regular part of their +lives. However, the growth of electronic communication and data +manipulation has not been matched by an equal growth in +understanding on the part of legislatures, the judiciary, or the +bar. + This paper examines the current regulatory structure +governing a few of the "Empires of Cyberspace," such as bulletin +board systems, electronic databases, file servers, networks and +the like. Different legal analogies that may apply will be +illustrated, and some of their strengths, weaknesses and +alternatives will be analyzed. We will begin by looking at +different types of computer information systems, and then the +major legal issues surrounding +-------------------------- +[FN1] Mitchell Kapor & John P. Barlow, Across the Electronic +Frontier, July 10, 1990, available over Internet, by anonymous +FTP, at FTP.EFF.ORG (Electronic Frontier Foundation). +====================================================================== +82 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +computer information systems will +be surveyed in brief.[FN2] Next, the different legal analogies which +could be applied to computer information systems will be examined. +These different analogies provide an understanding of how courts +have seen various communication technologies, and how more +traditional technologies are similar to computer information +systems. Liability for improper activities Ñ both defining what is +improper and who can be held responsible Ñ has been determined by +the analogy the courts decide to apply. Finally, an evaluation +will be made of where the law affecting computer information +systems now stands, and how it should be developed. + + II. Computer Information Systems Defined + + A. Bulletin Board Systems + + Often referred to simply as a BBS, a computer bulletin board +system is the computerized equivalent to the bulletin boards +commonly found in the workplace, schools and the like. Instead of +hanging on a wall covered with notes pinned up with thumbtacks, +computer bulletin boards exist inside the memory of a computer +system.[FN3] Rather than walking up to a bulletin board and reading +notes other people have left or sticking up notes of his or her +own, the BBS user connects his or her personal computer to the +"host" computer,[FN4] usually via a telephone line.[FN5] Once connected +to the host computer, a user can read the notes (also referred to +as +-------------------------- +[FN2] Each of the legal issues could be discussed in papers at least +this large, so only the most important aspects will be covered. +[FN3] To run a computer bulletin board system, three things are +needed beginning with a computer. Bulletin board systems can be +run on virtually any size computer, from a small personal computer +costing a few hundred dollars, to a large mainframe computer +affordable only to large corporations and universities. In +addition to the computer, bulletin board software is also needed, +which is obtainable either commercially or free. Finally, you need +a way for people (usually called "users" in computer jargon) to +access your bulletin board. This is accomplished via a modem or by +connection to a computer network. +[FN4] A host computer is the computer on which the bulletin board +software runs and which stores the messages left by users of the BBS. +[FN5] Connection via a telephone line may be accomplished by a modem, +a device which converts computer data to an audio signal which can +then be transferred over a standard telephone wire where it is +received by another computer, also equipped with a modem, which +then converts the signal back into a form comprehensible to the +receiving computer. More and more often computers may be found +connected together in a network, such as computers in a lab at a +university, or office computers which share resources. +====================================================================== +83 E-Law Copyright 1992-1993 by David Loundy + +messages or posts) of other users or type in his or her own +messages to be read by other users. These Computer Bulletin Boards +are referred to as "systems" because they often provide additional +services or several separate "areas" for messages related to +different topics.[FN6] + Bulletin board systems can be classified in a number of ways. +One way to classify them is by the number of users BBSs support +simultaneously. The majority of BBSs run by hobbyists are single- +user boards which means they can only be used by one person at a +time. But some bulletin boards are able to support many users at +the same time, often upwards of fifty users at once. Another way +to differentiate between BBSs is by means of access: some are +available only by direct dial, other BBSs are available through a +network.[FN7] + There are a number of different things bulletin board systems +allow one to do. As their name implies, their primary function is +as a place to post messages and read messages posted by others. +Whatever the user's interests, there is probably a BBS to cater to +it. However, like any communications forum, this can raise some +serious First Amendment concerns over some of the potential uses, +such as availability of pornographic material, defamation, etc. + Another use for bulletin board systems is the sending of +electronic mail, or E-Mail, as it is commonly called. Electronic mail +-------------------------- +[FN6] These "areas" may be referred to by a variety of names, such as +forums, special interest groups (SIGs), conferences, rooms, +newsgroups, etc. +[FN7] Because of the way a BBS is accessed, some easily have national +or international reach. The international aspects of computer +information systems are beyond the scope of this paper, though +with the increasingly international reach of telecommunications it +is important to keep in mind that some computer systems may be +used by people in other countries as easily as they may be used by +people in their home countries. +Bulletin board systems originally started on a small scale, used +by local computer "hackers" to exchange information among +themselves. The term "hacker" is used in a number of different +ways. It was originally used to refer to someone who uses his or +her computer knowledge to break into other computer systems. See +Eric C. Jensen, An Electronic Soapbox: Computer Bulletin Boards +and the First Amendment, 39 FED. COM. L.J. 217 n.50 (1987). With +the rise of national and international computer networks, BBSs are +becoming more accessible to the general populace not just for +local users, but also for users all over the world. Some countries +already provide their citizens easy access to state-endorsed +computer information systems. The world leader has been France, +which has provided its "Minitel" service since 1982. Wallys W. +Conhaim, Maturing French Videotext becomes Key International +Business Tool, 9 INFO. TODAY 28 (1992). Minitel has grown to a +system of about six million terminals as of the end of 1991, and +it includes access to over 16,000 information services. Carol +Wilson, The Myths and Magic of Minitel; France's Minitel Videotex +Service, TELEPHONY, Dec. 2, 1991, at 52, 52. +====================================================================== +84 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +is a message that is sent from one computer user to another, +occurring either between users on the same computer, or between +users on different computers connected together in a network. +Electronic mail is different from regular mail in three important +ways. First, E-mail is provided by private parties and, thus, is +not subject to government control under the postal laws.[FN8] +However, it is under the control of the System Operator (often +called the SYSOP) of the bulletin board system. This gives rise to +the second issue Ñ privacy. Unlike the U.S. mail, electronic mail +is almost always examinable by someone other than the sender and +the receiver.[FN9] By necessity, the communications provider may not +only have access to all mail sent through the computer system, but +may also have to keep copies (or "backups") in case of system +failure.[FN10] Third, E-mail is interactive in nature and can involve +almost instantaneous communication, more like a telephone than +regular mail,[FN11] so much so that regular users of E-mail often +refer to the U.S. mail as "snail mail." + Another service many bulletin board systems make available is +the uploading and downloading of files.[FN12] A BBS providing a +section of files for its users to download, can distribute almost +any type of computer file. This may consist of text, software, +pictures, or even sounds. Multiple user bulletin board systems are +also frequently used for their "chat" features, allowing a user to +talk to other users who are on-line (connected to the host +computer) at the same time.[FN13] +-------------------------- +[FN8] Robert W. Kastenmeier et al., Communications Privacy: A +Legislative Perspective, 1989 WIS. L. REV. 715, 727. +[FN9] Id. +[FN10] Id. +[FN11] Id. +[FN12] Downloading entails transferring files from the computer on +which the BBS runs to the user's computer, and uploading is the reverse. +[FN13] This operates as a way to get information more directly from +other people and even to meet new friends. In fact, for some +people a BBS is a major social outlet, allowing communication on +equal terms without first impressions being formed by physical +appearances. Some people have even decided to get married to other +users, solely based on the messages they have exchanged. John +Johnston, Looking for Log-On Love, Gannett News Service, Mar. 25, +1992, available in LEXIS, Nexis Library, Currnt file. Others are +not looking for information or casual conversation, but rather for +"net sex." Chat features can be used much like telephone 900 +number dial-a-porn services. Before cracking down on them, the +French Minitel system determined that sex oriented messages +constituted nearly 20 percent of the usage of its conferencing +system. John Markoff, The Nation; The Latest Technology Fuels the +Oldest of Drives, N.Y. TIMES, Mar. 22, 1992, ¤ 4, at 5. +====================================================================== +85 E-Law Copyright 1992-1993 by David Loundy + + B. Teletext and Videotex or Videotext + + Another kind of computer information system is Teletext,[FN14] a +one-way distribution system, generally run over a cable television +system.[FN15] It sends out a continually repeating set of information +screens.[FN16] By using a decoder, a user can select which screen he +or she wants.[FN17] The decoder then "grabs" the requested screen and +displays it as it cycles by.[FN18] Since Teletext is only a one-way +service, a user can only read the information the service has +available for his or her reading. There is no way for the user to +contribute his or her own input to the system. + More advanced than Teletext is videotex[FN19] (often called +videotext).[FN20] Videotex is a two-way service which usually uses a +personal computer as a terminal.[FN21] When provided via a telephone, +videotex is basically the same as any other computer information +system discussed in this paper, so the terms "videotex" and +"computer information system" are used synonymously for ease of +discussion. + + C. Information Distribution Systems + + Computers are used frequently for distributing information of +various types. One common type of information distribution system +is the database.[FN22] These services allow the user to enter a +variety of "search terms" to look through the information the +service has collected.[FN23] + Another type of information distribution system is the "file +-------------------------- +[FN14] See generally Richard N. Neustadt, Symposium: Legal Issues in +Electronic Publishing: 1. Background -- The Technology, 36 FED. COM +L.J. 149 (1984). +[FN15] Id. +[FN16] Id. +[FN17] Id. +[FN18] Id. +[FN19] Id. +[FN20] The final "t" is often left off because on many computers, +filenames are limited to eight characters. See A Glossary of +Computer Technology Terms, AM. BANKER, Oct. 25, 1989, at 10 +[hereinafter Glossary]. +[FN21] Neustadt, supra note 14, at 149. +[FN22] Examples include WESTLAW, LEXIS, DIALOG, ERIC, and the local +library's card catalog. +[FN23] Some of these services are quite large, and may contain the +whole text of books and periodicals, though some may contain only +citations requiring the user to look elsewhere to find the actual +material desired. These services differ significantly in their +degree of complexityÑfor example, in the types of search terms +they will allow. +====================================================================== +86 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +server."[FN24] A file server (or just "server") is a storage device, +such as a disk drive or CD ROM, hooked up to a computer network, +which lets any computer connected to it access the files contained +on the server.[FN25] These files may consist of virtually anything, +ranging from software to news articles distributed by a "news +server." While file servers may be found as part of another +computer information system, the server itself is used only for +storing and retrieving files.[FN26] + + D. Networks + + A network is a series of computers, connected often by +special types of telephone wires.[FN27] Many networks are conduits +used to call up a remote computer in order to make use of that +computer's resources from a remote personal computer or +terminal.[FN28] Many networks allow a much broader range of uses such +as sending E-mail and more interactive forms of communication +between machines,[FN29] transferring computer files, and also +providing the same remote access and use that the simpler networks +allow.[FN30] + Some of these networks are so sophisticated and far-reaching +that they provide an ideal communications medium for the computer +literate. They can be used not only for personal E-mail, but they +are also used for a number of special kinds of electronic +publishing.[FN31] +-------------------------- +[FN24] See MACUSER, June 1991, at 134. +[FN25] See Glossary, supra note 20. +[FN26] On large networks, such as the Internet, there are even +databases called "archies," which index file servers available all +over the network. They have small descriptions of available +software, and give a listing of what machines on the network have +the file available. Alan Emtage, What Is 'Archie', EFFECTOR ONLINE, +Oct. 18, 1991, available over Internet, by anonymous FTP, at +FTP.EFF.ORG (Electronic Frontier Foundation)(Vol. 1, No. 12). +[FN27] CHRISTOPHER CONDON & YALE COMPUTER CENTER, BITNET USERHELP, 1988. +Available over Bitnet by sending the command "get bitnet userhelp" +to NETSERV@BITNIC. Id. +[FN28] Some of the major examples of networks are Tymnet, Sprintnet, +and specifically for WESTLAW and LEXIS users there is Westnet and +Meadnet. +[FN29] An example of such interactive communication is the UNIX "Talk" +command which allows a person to talk instantaneously with a +remote user. Both users can type simultaneously; one user's text +appears on the top of his or her computer screen while the other +user's text appears on the bottom. +[FN30] Some examples of these more full-service type networks include +the Internet, Bitnet, and ARPANET. +[FN31] One such special use is the electronic forum, basically an +automated mailing list. A message is sent to a "LISTSERVER" where +it is then automatically distributed to other people on its +electronic mailing list. A LISTSERVER is an automated computer +mailing program running out of a computer account. Mail is sent to +the account; the LISTSERVER then redistributes the message. The +people on the list then receive the message as E-mail. They can +respond by sending a reply back to the LISTSERVER which then +distributes that message to its list, which includes the first +message sender. This works, in effect, like a group of people +standing around discussing a topic, though some people are left +behind in the discussion if they do not log on to read their mail +regularly. CONDON & YALE COMPUTER CENTER, supra, note 27. A similar +type of electronic publication is the electronic digest; a message +is sent to the LISTSERVER, but, instead of being automatically +sent out, it is held. A "moderator" then sorts through and edits +the material for distribution to the people on the digest's +mailing list. Id. The most formal type of electronic publishing is +the Electronic magazine or journal, often called the E-journal. +These are "real" magazines, just like print magazines, but they +are distributed electronically, rather than in hard copy. Id. +====================================================================== +87 E-Law Copyright 1992-1993 by David Loundy + + E. Issues Involved + + Computer information systems present a whole slew of legal +issues. Whenever a new form of communication emerges, there is a +concern that, along with legitimate users will come some abusers. +Just as a bulletin board system can be used for political debate, +it can also be used as an outlet for defamation. How should this +be treated? Who is liable? Is it the user who originally posted +the defamation, or the system operator who controls and provides +the forum? Currently, these are hotly debated issues. + Whenever a new communications medium develops, there is a +risk that it will be used to deliver material which society frowns +upon, such as obscene or indecent data. Computer information +systems allow the distribution of this material in the forms of +text, picture, and sound. + One major use for computer information systems is +transferring files; in fact, that is the whole purpose for +services such as file servers. Legal issues arise when these +transfers contain copyrighted material for example, either text, +pictures, sounds, or computer software which violates copyright +law. + A growing threat to computer users is the computer virus. The +Computer Virus Industry Association reports that in 1988, nearly +90,000 personal computers were affected by computer viruses.[FN32] +Viruses can be distributed via computer information systems, both +consciously and unconsciously. They can be put into a system by +someone intending to cause harm, or they can be innocently +transferred by a user who has an infected disk.[FN33] + Privacy is another issue for users and system operators of +-------------------------- +[FN32] Dawn Stover, Viruses, Worms, Trojans, and Bombs; Computer +"Infections", POPULAR SCI., Sept. 1989, at 59. +[FN33] Id. Some people consider them such a threat that Lloyd's of +London even offers an insurance policy that specifically covers +viruses. Id. +====================================================================== +88 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +computer information systems. With society becoming increasingly +computerized, people need to be made aware of how secure their +stored data and electronic mail really is. The Fourth Amendment to +the United States Constitution reads: "The right of the people to +be secure in their persons, houses, papers, and effects, against +unreasonable searches and seizures, shall not be violated, and no +Warrants shall issue, but upon probable cause, supported by Oath +or affirmation, and particularly describing the place to be +searched and the persons or things to be seized."[FN34] Yet, how does +this Amendment apply to Cyberspace. Cyberspace is a vague, +ethereal place with no readily identifiable boundaries, where a +"seizure" may not result in the loss of anything tangible and may +not even be noticed? + In all of these cases, questions arise as to who is liable. +If SYSOPs are not made aware of the legal issues they may face in +running a computer system, they may either fail to reduce or +eliminate harm when it is within their power to do so, or they may +unnecessarily restrict the services they provide out of fear of +liability. + + F. Legal Analogies + + Liability for illegal activities in Cyberspace is affected by +how the particular computer information service is viewed. Some +services allow one entity to deliver its message to a large number +of receivers. In this regard the service acts like a publisher. +Some theorists already refer to computer networks as "the printing +presses of the 21st century."[FN35] Many publishers use BBSs to +supplement their printed editions either by providing additional +stories or by providing computer information services on a BBS.[FN36] +However, other services are more like common carriers than +publishers. Networks just pass data from one computer to another +Ñthey do not gather and edit data. Still other services are more +akin to broadcasting than common carriage. This similarity exists +because computer services can be provided by sending data over the +airwaves, thus providing the same services available from +computers networked together by wire. Computer services can also +be used to +-------------------------- +[FN34] U.S. CONST. amend. IV. +[FN35] M.I.T. Professor Ithiel de Sola Pool, quoted in John Markoff, +Some Computer Conversation Is Changing Human Contact, N.Y. TIMES, +May 13, 1990, ¤ 1, at 1. +[FN36] See generally 'Fred The Computer'; Electronic Newspaper +Services Seen as 'Ad-Ons', COMM. DAILY, Apr. 10, 1990, at 4. +====================================================================== +89 E-Law Copyright 1992-1993 by David Loundy + +allow many entities to deliver their messages +simultaneously to many other entities. In this way, computer +information systems are likened to traditional public fora, such +as street corners or community bulletin boards. + None of these analogies is especially useful taken +individually. Each is accurate in describing some situations, but +lacking in describing others. There is a tendency to look at a +service and give it a label, and then regulate it based on its +label. This labeling works well in some instances; but, when a +service has a number of communication options, such as a BBS that +provides a series of bulletin boards, E-mail, and a chat feature, +and that makes available electronic periodicals in the BBS's file +system, one analogy is insufficient. To regulate computer +information systems properly, lawyers, judges, and juries need to +understand computer information systems and how they work. + + III. Current Regulatory Environment + + The current regulatory environment governing computer +information systems is somewhat confused because of the +multiplicity of the means which can be employed in regulating a +wide variety of dissimilar services. The Federal Communications +Commission, which regulates broadcasters and common carriers +providing electronic data, considers computer information systems +to be "enhanced" services, and, therefore, computer information +systems are not regulated by the F.C.C.[FN37] However, some specific +aspects of computer information systems are governed by existing +case law and statutes. + Let us start with a hypothetical situation. The Data +Playground is a large, full service bulletin board system. In the +BBS's message system, one of the fora, called the Sewer, is set +aside for the users as a place to blow off some steam, and express +their anger at whatever they feel like complaining about. Samantha +Sysop, the bulletin board operator, feels such a forum is +necessary. She feels that without it, frustrated users will leave +unpleasant messages in the other fora which are meant for rational +discussions of serious topics. By providing the Sewer, users who +get upset with other users or with life in general can "take their +problem to the Sewer." +-------------------------- +[FN37] Second Computer Inquiry 61 F.C.C.2d 103 (1976) (Amendment of +Section 64.702 of the Commission's Rules and Regulations, Notice +of Inquiry and Proposed Rulemaking). See also Second Computer +Inquiry, 77 F.C.C.2d 384, 420-21 (1980) (Final Decision) (The +talks directly discuss BBSs as enhanced services.). +====================================================================== +90 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +Because she is unsure of any liability for +posts in the Sewer which get too heated, she posts a disclaimer, +which can be seen the first time a user posts in or reads the +Sewer, which states that the SYSOP disclaims all liability for +anything that is said in the Sewer. Samantha Sysop reads the posts +left in the Sewer, and once in a while posts a message there +herself. One day a user, Sam Slammer, leaves the following message +in the Sewer: + + From: Sam Slammer + + I am sick and tired of logging onto this damned bulletin + board and seeing that damn user Dora Defamed here. She + is always here. However, at least if she is here it + means that she is not still at home beating her young + daughter. In fact, her daughter is too good looking to + be stuck with a mother like Dora. She should be stuck + with someone like me, after all, I really like young + girls, and having sex with her would be a real catch. + (If anyone would like to see the films of the last + little girl I had sex with, leave me mail) Anyway, Dora: + it is a wonder that kid isn't brain damaged, seeing as + you are so badly warped. I would really like to do + society a favor and kill you before you get the chance + to beat any more children. In fact, if anyone is near + the computer where Dora is connected to this BBS from, I + urge you to go over to her and kill her. Do us all a + favor. + +This hypothetical post raises a number of issues. In one post +there is potentially defamatory speech, speech advocating lawless +action, fighting words, and an admission and solicitation of child +pornography. + + A. Defamation + + Defamation can occur on a computer information system in a +number of forms: posts on a bulletin board system, like the one in +the Sam Slammer hypothetical can be defamatory, as can electronic +periodicals; file servers and databases can distribute defamatory +material; E-mail can contain defamatory statements. Defamation can +even be distributed in the form of a scanned photograph.[FN38] But +what is defamation, and what risks and obligations does it present +to a system operator? + Defamation occurs in two forms Ñ libel and slander. The +difference between these two forms of defamation is often not +apparent, based on a common sense approach, rather it is solely a +matter of +-------------------------- +[FN38] See Gregory G. Sarno, Annotation, Libel and Slander: Defamation +by Photograph, 52 A.L.R. 4th 488, 495 (1987). +====================================================================== +91 E-Law Copyright 1992-1993 by David Loundy + +form and "no respectable authority has ever attempted to +justify the distinction on principle."[FN39] With the rise of new +forms of technology which confuse the distinction between libel +and slander, many courts have advocated the elimination of the +distinction.[FN40] Speech on a computer information system has more +of the characteristics of libel than slander. Most courts have +argued, based on libel cases, that messages appearing on computer +information systems are libel and not slander; often judges used +the generic term "defamation."[FN41] + Slander is publication in a transitory form Ñ speech, for +example, is slander.[FN42] Libel, on the other hand, is embodied in a +physical, longer lasting form, or "by any other form of +communication that has the potentially harmful qualities +characteristic of written or printed words."[FN43] Written or printed +words are considered more harmful than spoken words because they +are deemed more premeditated and deliberate. For example, Sam +Slammer had to sit down at a keyboard and compose his post; it is +not a matter of a comment carelessly made in a fit of anger. +Printed words also last longer, because they are put in a form in +which they can serve to remind auditors of the defamation, while +the spoken word is gone once uttered.[FN44] Had Sam Slammer accused +Dora Defamed of child abuse in person, the statement would be +fleeting; on the BBS it is stored for viewing by any user who +decides to read what posts have been left in the Sewer. For days, +weeks, or months people can read Sam's statement unless Samantha +Sysop removes it. Any user can save a copy of the post on his or +her own computer, and can distribute it, verbatim, to anyone else, +with Sam's name right at the top. Text on a computer screen shares +more traits with libel than with slander. Computer text appears as +printed words, and it is often more pre-meditated than spoken +words. Computer text can be called up off of a disk as many times +as is needed. The message can even be printed out, and the text +can be more widely circulated than the same words when they are +spoken. + In its barest form, libel is the publication of a false, +defamatory +-------------------------- +[FN39] RESTATEMENT (SECOND) OF TORTS ¤ 568 cmt. b (1989). +[FN40] Id. +[FN41] See, e.g., Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc. +472 U.S. 749 (1985). +[FN42] RESTATEMENT (SECOND) OF TORTS ¤ 568(2). +[FN43] Id. ¤ 568(1). +[FN44] See Tidmore v. Mills, 32 So. 2d 769, 774 (Ala. Ct. App.), cert. +denied, 32 So. 2d 782 (Ala. 1947). +====================================================================== +92 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +and unprivileged statement to a third person.[FN45] +"Defamatory" communication is defined as communication that tends +to harm the reputation of another so "as to lower him [or her] in +the estimation of the community or to deter third persons from +associating or dealing with him [or her]."[FN46] Actual harm to +reputation is not necessary for a statement to be defamatory, and +the statement need not actually result in a third person's refusal +to deal with the object of the statement; rather the words used +must merely be likely to have such an effect.[FN47] For this reason, +if the person defamed already looks so bad in the eyes of the +community that his or her reputation could not be made worse, or +if the statements are made by someone who has no credibility, +there will not be a strong case for defamation.[FN48] "Community" +does not refer to the entire community, but rather to a +"substantial and respectable minority" of the community.[FN49] Even +more specifically, the community is not necessarily seen as the +community at large, but rather as the "relevant" community.[FN50] +This means, for example, that one could post a defamatory message +on a bulletin board system defaming another user and be subject to +a libel suit, even though only other BBS users see the post. + In the hypothetical, we don't know whether Sam's accusations +of child beating are true. If they are, Sam would have a defense +against a charge of libel. The comment is being "published" to any +other BBS user who reads the message Sam has left publicly, and as +already discussed, the computer message has the same harmful +qualities as a message written and distributed on paper. In fact, +Sam's comments are potentially reaching a larger audience than Sam +could have reached by simply posting a notice on a bulletin board +in the local computer center. The remark about child abuse has the +potential for lowering people's estimation of Dora, and could +easily encourage people to avoid associating with her. Even if +people do not avoid Dora because of the remark, in a defamation +suit it is sufficient that the statements have the potential to have +-------------------------- +[FN45] RESTATEMENT (SECOND) OF TORTS ¤ 558 (1989). +[FN46] Id. ¤ 559. +[FN47] Id. ¤ 559 cmt. d. +[FN48] Id. +[FN49] Id. ¤ 569 cmt. e. +[FN50] See, e.g., Ben-Oliel v. Press Publishing Co., 167 N.E. 432 +(N.Y. 1929). This case involved a newspaper article on Palestinian +art and custom which was mistakenly credited to the plaintiff, an +expert in the field. The article contained a number of +inaccuracies that, while still impressive to the lay reader, would +embarrass the plaintiff among other experts. +====================================================================== +93 E-Law Copyright 1992-1993 by David Loundy + +that effect, and here they clearly do. + The community at issue here is not the world at large, but +rather a substantial and respectable minority of the "relevant" +community. Bulletin board systems can give rise to a close knit +group of users. Here, she is being attacked in a public forum in +front of the whole community of users. This raises another issue: +Can a person sue for defamation that occurred to a fictitious name +or a persona that appears on a computer? If "Dora Defamed" was not +the BBS user's real name, could the real user sue Sam Slammer for +defaming the user's "Dora" persona on the BBS? In a bulletin board +community, unless users know each other in real life away from the +computer, the only impression one user gets of another is from how +he or she appears on the computer screen. The user in real life +may not even be the same sex as the person he or she portrays on +the bulletin board system. On the BBS, people only know and +associate with Dora; not the real person behind the name. When +Dora is defamed, in essence, so is the person behind the computer +representation of Dora. The user is defamed in the eyes of the +users behind all of the other BBS personalities that read Sam's +post. It should not matter if Dora Defamed is not the user's real +identity - a defamation action should still be allowed. The last +issue is whether Dora is being defamed in front of at least a +"substantial and respectable" minority of the relevant community. +This hinges on who reads the Sewer forum. If the Sewer is widely +read, a defamation suit will be more likely to succeed than if the +Sewer is largely ignored. + Because defamation involves speech, defamation raises serious +First Amendment concerns. Just because speech is defamatory, does +not mean that it is left unprotected. Analysis is based on the +party or parties privy to the defamation. In our hypothetical, the +relevant parties are Sam and Dora. Constitutional protection was +first found for some types of defamation in New York Times v. +Sullivan.[FN51] This case involved an advertisement taken out in a +newspaper expressing grievances with the treatment of blacks in +Alabama.[FN52] An elected city commissioner sued, claiming that the +statements made in the advertisement defamed him and that the +advertisement contained some inaccuracies.[FN53] Justice Brennan +argued that the case should be considered "against the background +-------------------------- +[FN51] New York Times v. Sullivan, 376 U.S. 254 (1964). +[FN52] Id. at 256. +[FN53] Id. +====================================================================== +94 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +of a profound national commitment to the principle that debate on +public issues should be uninhibited, robust, and wide-open, and +that it may well include vehement, caustic, and sometimes +unpleasantly sharp attacks on government and public officials."[FN54] +The court held that, because one of the main purposes of the First +Amendment was to preserve debate and critical analysis of the +affairs of elected officials, any censorship of that speech would +be detrimental to society.[FN55] Because of this, the court said +libel laws should be relaxed where the speech pertains to the +affairs of elected officials.[FN56] Likewise, due to the importance +of being able to examine the worthiness of public officials, the +court felt that speech critical of officials should also be less +open to attack on grounds of falsity.[FN57] False speech that is made +known can be investigated, but true speech that the critic worries +may be false and may result in a libel suit, will remain +undisseminated.[FN58] Because of the importance of monitoring elected +officials, the court held that allowing speech that would aid in +the monitoring of elected officials' conduct was more important +than protecting officials from potential harm resulting from +defamatory speech.[FN59] A balance between open debate and freedom +from defamation was struck by establishing an "actual malice" +standard of liability for the publisher.[FN60] "Actual malice" is a +term of art with a specific meaning in the publishing context. As +the court stated: + + The constitutional guarantees require, we think, a federal + rule that prohibits a public official from recovering damages + for a defamatory falsehood relating to his [or her] official + conduct unless he [or she] proves that the statement was made + with "actual malice" -- that is, with knowledge that it was + false or with reckless disregard of whether it was false or + not.[FN61] + + This standard applies to electronic publishing as clearly as +it applies to print or speech. SYSOPs and users are freed from +liability for defamation carried on computer information systems, +as it applies to public officials, so long as the material is not +allowed to remain when the SYSOP or user knows of its falsity or +has reckless +-------------------------- +[FN54] Id. at 270. +[FN55] Id. at 279. +[FN56] Id. +[FN57] Id. +[FN58] Id. +[FN59] Id. +[FN60] Id. at 279-80. +[FN61] Id. +====================================================================== +95 E-Law Copyright 1992-1993 by David Loundy + +disregard for its truth. Dora, as far as we know, is +not a public official. If Dora were a persona on the bulletin +board system, and not the user's actual name, and if there is no +way for the average user to associate the persona with the real +person, then even if "Dora" were defamed and the real user was a +public official, it would be questionable as to whether the public +official privilege would apply. In this situation, the rationale +behind the privilege would not be relevant to the actual facts. +Statements about Dora do not reflect on the actual user's +abilities to perform his or her official job. If, however, the +public official can be linked to the Dora persona, then the basis +for privileging statements about public officials does apply to +the situation, and Sam Slammer's statement may be privileged, +presuming no actual malice was intended. + The New York Times standard was expanded in two important +cases, Curtis Publishing Co. v. Butts,[FN62] and its companion case, +Associated Press v. Walker.[FN63] Both cases involved defamation of +people who did not fit under the "public official" heading, but +who were "public figures." As discussed in the concurrence, some +people, even though they are not part of the government, are +nonetheless sufficiently influential to affect matters of +important public concern.[FN64] The Court subsequently has defined +public figures as "[t]hose who, by reason of the notoriety of +their achievements or the vigor and success with which they seek +the public's attention, are properly classed as public figures ... +."[FN65] Because these people have influence in our governance, just +as public officials do, the same "actual malice" standard should +apply to such public figures.[FN66] Here, as in the case of public +officials, we don't really know who Dora Defamed is. If she is a +public figure, Sam's child abuse claim may be privileged; if she +is not, he may be liable. + Another major case defining the constitutional protection of +defamation is Gertz v. Robert Welch, Inc.[FN67] In Gertz, a magazine +published an article accusing a lawyer of being a "Communist- +fronter" and a "Marxist."[FN68] The article accused the plaintiff of +plotting +-------------------------- +[FN62] Curtis Publishing Co. v. Butts, 388 U.S. 130 (1967), aff'g 351 +F.2d 702 (5th Cir. 1965), reh'g denied, 389 U.S. 889 (1967). +[FN63] Associated Press v. Walker, 388 U.S. 130 (1967), rev'g 393 +S.W.2d 671 (Tex. Civ. App. 1965), reh'g denied, 389 U.S. 889 (1967). +[FN64] See 388 U.S. at 164 (Warren, C.J., concurring). +[FN65] Gertz v. Robert Welch, Inc., 418 U.S. 323, 342 (1974). See +infra text accompanying notes 67-79. +[FN66] 418 U.S. at 343. +[FN67] Id. at 323. +[FN68] Id. +====================================================================== +96 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +against the police.[FN69] The plaintiff was a lawyer who +played a role in the trial of a police officer who was charged +with shooting a boy.[FN70] The lawyer sued for defamation. The +publisher's defense was based on another exception to defamation +law that the court had carved out in Rosenbloom v. Metromedia, +Inc.[FN71] Rosenbloom extended the New York Times standard to include +not just public officials and public figures, but also private +figures who were actively involved in matters of public +concern.[FN72] The Gertz court held that this expansion went too +far,[FN73] and the court overruled Rosenbloom.[FN74] The court in Gertz +acknowledged that the press should not be held strictly liable for +false factual assertions where matters of public interest were +concerned.[FN75] Strict liability would serve to chill the +publisher's speech by leading to self censorship where facts are +in doubt.[FN76] This First Amendment interest was balanced against +the individual's interest in being compensated for defamatory +falsehood.[FN77] The court reasoned that private individuals were +deserving of more protection than public officials and public +figures because private persons do not have the same access to +channels of communication, and they have not voluntarily exposed +themselves to the public spotlight.[FN78] The court held that "so +long as they do not impose liability without fault, the States may +define for themselves the appropriate standard of liability for a +publisher or broadcaster of defamatory falsehood injurious to a +private individual."[FN79] Courts have not made it very difficult for +private people to sue for defamation where there is no matter of +public concern at issue; in one of the more famous defamation +cases, Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc.,[FN80] Dun +& Bradstreet was held liable for a credit report made from +inaccurate records contained in a database.[FN81] The court argued +that statements on +-------------------------- +[FN69] Id. at 326. +[FN70] Id. +[FN71] See Rosenbloom v. Metromedia, Inc., 403 U.S. 29 (1971). +[FN72] Id. at 31-32. +[FN73] 418 U.S. at 345. +[FN74] Id. at 346. +[FN75] Id. at 340. +[FN76] Id. +[FN77] Id. at 341. +[FN78] Id. at 344. +[FN79] Id. at 347. +[FN80] 472 U.S. at 749 (involving a suit for defamation because of a +false credit report). +[FN81] Id.; cf. Thompson v. San Antonio Retail Merchants Ass'n, 682 +F.2d. 509 (5th Cir. 1982). +====================================================================== +97 E-Law Copyright 1992-1993 by David Loundy + +matters of no public concern, especially when +solely motivated by profit, did not deserve sufficient First +Amendment protection to outweigh the individual's interest in +suing for defamation.[FN82] + In our hypothetical, we must look to the subject of Sam +Slammer's defamatory comment to see if it is a matter of public +concern. Sam is accusing Dora of "beating her kid." While child +abuse may be a matter of public concern, whether Dora is such an +abuser is not likely a matter of public concern. Just as people's +inabilities to pay their debts can be a matter of public concern, +as was found in the Dun & Bradstreet case,[FN83] the ability of one +particular company to pay its debts is not necessarily a matter of +public concern. Child abuse is not the issue in this hypothetical; +Dora Defamed's potential child abuse is the issue. + The press has been found to have other privileges as a result +of the kind of news the press is reporting. One such privilege, is +for fair report, or "neutral reportage,"[FN84] (which is not an issue +in our hypothetical). This isolates a reporter from defamatory +statements that he or she is reporting.[FN85] The reasoning behind +this is that the fact that some statements were made is a matter +of public interest, especially around sensitive issues, and +therefore the public interest is best served by allowing the press +to inform people of these statements without the risk of +liability.[FN86] Neutral reporting is privileged, but if the reporter +is found not to have lived up to the "actual malice" standard +(knowing or careless disregard for the truth), his or her report +will not be considered neutral and therefore the fair report +privilege will not apply. + Statements of opinion are also privileged.[FN87] Protection of +opinion is, of necessity, not absolute otherwise "a writer could +escape liability ... simply by using, explicitly or implicitly, +the words `I think.'"[FN88] Sam Slammer cannot defend himself by +saying, "Well, I think Dora beats her daughter." The court in +Cianci v. New Times +-------------------------- +[FN82] 472 U.S. at 761-62. +[FN83] Id. +[FN84] See, Edwards v. National Audubon Soc'y, Inc., 556 F.2d 113 (2d. +Cir. 1977). See also Time, Inc. v. Pape, 401 U.S. 279, reh'g +denied, 401 U.S. 1015 (1971) (Newspaper's coverage of a government +report which, due to inaccuracies, defamed a public official, +could not result in liability unless the newspaper published the +story with actual malice); Beary v. West Publishing Co., 763 F.2d +66 (2d Cir. 1985) (holding a publisher that exactly reprinted a +court opinion was absolutely privileged for any defamatory +comments in the court opinion). +[FN85]763 F.2d at 68. +[FN86] 556 F.2d at 119. +[FN87] See, e.g., Greenbelt Coop. Publishing Ass'n v. Bresler, 398 +U.S. 6 (1970). +[FN88] Cianci v. New York Times Publishing Co., 636 F.2d 54, 64 (1980) +====================================================================== +98 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +Publishing Co.[FN89] succinctly laid out the limits of the opinion +privilege: + + (1) that a pejorative statement of opinion concerning a public figure + generally is constitutionally protected ... no matter how vigorously + expressed; + (2) that this principle applies even when the statement includes a + term which could refer to criminal conduct if the term could not + reasonably be so understood in context; but + (3) that the principle does not cover a charge which could reasona- + bly be understood as imputing specific criminal or other wrongful + acts.[FN90] + +In the hypothetical, Sam made an outright accusation that Dora +Defamed committed a criminal act. Even if he had stated that he +believes that she beats her daughter, unless the statement is +clearly one interpretable as an opinion, he still is likely to be +held liable for his remark. + In sum, what this means for computer information systems, +whether speech on a bulletin board, text in an electronic journal, +or in any of the other forms of electronic publication, is that +liability may result if the message is libelous. It may not result +in liability if the defamation concerns public figures, public +officials, or matters of public interest. Communications that +defame a user may not constitute defamation to the community at +large, but the statements may still give rise to liability if it +lowers the opinion of the user in the eyes of the rest of the +bulletin board users. + + B. Speech Advocating Lawless Action + + The First Amendment states that "Congress shall make no law +... abridging the freedom of speech, or of the press."[FN91] The +First Amendment is one of the most important guarantees in the +Bill of Rights, because speech is essential for securing other +rights.[FN92] +-------------------------- +[FN89] Id. +[FN90] Id. (referring to Greenbelt Coop. Letter Carriers v. Austin, +418 U.S. 264 (1974); Gertz v. Robert Welsh 418 U.S. 323 (1974); +Buckley v. Littell, 539 F2d 882, cert. denied, 429 U.S. 1062 +(1977); Rinaldi v. Holt, Rinehart & Winston, Inc., 366 N.E.2d 1299 +(N.Y.), cert. denied, 434 U.S. 969 (1977)) (The court in Cianci +held the privilege inapplicable to a situation in which the +plaintiff was clearly accused of committing a criminal act.). +[FN91] U.S. CONST. amend. I. +[FN92] Legal Overview: The Electronic Frontier and the Bill of Rights, +available over Internet, by anonymous FTP, at FTP.EFF.ORG +(Electronic Frontier Foundation). +====================================================================== +99 E-Law Copyright 1992-1993 by David Loundy + +While the right of free speech has been challenged by +the emergence of each new medium of communication, the right of +free speech still applies to the new forms of communication, +although it is, at times, more restrictive.[FN93] An example of such +a restriction is the regulation of radio and television by the +Federal Communications Commission.[FN94] The rationale for F.C.C. +governance is based on spectrum scarcity. Currently, this is not a +real issue with computer information systems, but with the rise of +packet radio and wireless networks which transmit computer data +through the airwaves,[FN95] the F.C.C. may choose to regulate some +aspects of computer information systems. Some people advocate +that, with changes in technology, distinctions between different +forms of media, such as between electronic and print media, should +be eliminated; instead, one all-encompassing standard should be +used.[FN96] No matter what the standard employed, some forms of +speech are currently not allowed on the local street corner or on +the local computer screen. In our Sam Slammer hypothetical, +questions arise as to whether his message contains some of this +speech which is inappropriate for public consumption. + One type of speech not permitted is advocacy of lawless +action, as laid out in Brandenburg v. Ohio.[FN97] The court in +Brandenburg held that the guarantees of free speech and free press +do not forbid a state from proscribing advocacy of the use of +force or of law violation "where such advocacy is directed to +inciting or producing imminent lawless action and is likely to +incite or produce such action."[FN98] Sam threatened to kill Dora, +and he urged others to kill her as well. An important distinction +is made between mere advocacy and incitement to imminent lawless +action Ñthe first is protected speech, while the second is not. + This distinction is quite important, yet can be blurry, in a +computer context. On a bulletin board system, for instance, +messages may be read by a user weeks after they have been posted. +It is hard to imagine such "stale" messages as advocating imminent +lawless action. In our hypothetical, Sam encourages anyone near +-------------------------- +[FN93] Id. +[FN94] Hereinafter F.C.C. +[FN95] Matt Kramer, Wireless Communication Net: Dream Come True; +Wireless Distributed Area Networks The Wide View, P.C. WEEK, Mar. +5, 1990, at 51, 51. +[FN96] Harvey Silverglate, Legal Overview, The Electronic Frontier and +the Bill of Rights,available over Internet, by anonymous FTP, at +FTP.EFF.ORG (Electronic Frontier Foundation). +[FN97] Brandenburg v. Ohio, 395 U.S. 444 (1969). +[FN98] Id. at 447. +====================================================================== +100 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +the computer Dora is using to go kill her. A user who reads the +post hours later, may no longer have the opportunity to take the +requested action, even if so inclined. Dora may be, for example, +at home (beating her daughter?), and no longer at that computer. +The action was advocated, but other users will not be incited to +carry out the action because the act would not be possible at the +time. An information system with a chat feature, which allows +users to talk nearly instantaneously to one another, is, however, +altogether different. With such a "chat" feature, it would be +possible to make a Brandenburg incitement threat. + + C. Fighting Words + + Another kind of speech not given First Amendment protection +is "fighting words." Fighting words are "those which by their very +utterance inflict injury or tend to incite an immediate breach of +the peace.[FN99] In Chaplinsky v. State of New Hampshire, the court +held that fighting words (as well as lewd, obscene, profane, and +libelous language) "are no essential part of any exposition of +ideas, and are of such slight social value as a step to truth that +any benefit that may be derived from them is clearly outweighed by +the social interest in order and morality."[FN100] The court further +defined fighting words as words that have a direct tendency to +provoke acts of violence from the individual to whom the remarks +are addressed, as judged not by what the addressee believes, but +rather by what a common person of average intelligence would be +provoked into fighting.[FN101] A message posted on a bulletin board or +sent by E-mail could contain fighting words. Dora is being accused +of being a child abuser, and in the message someone offers to +sexually abuse her young daughter. There is no imminence +requirement in Chaplinsky as there is in Brandenburg.[FN102] Fighting +words can be considered delivered to the addressee when the +message is read. Dora will become enraged when she reads Sam's +message. When Sam left the message has little bearing on when Dora +will be ready to fight. While it is hard to fight with the message +sender when he or she may not be nearby or even in the same +country, that does not preclude some forms of "fighting." Of +course, if the sender of the fighting words is nearby, actual +fighting could occur. If the +-------------------------- +[FN99] Chaplinsky v. State of New Hampshire, 315 U.S. 568, 572 (1942). +[FN100] Id. +[FN101] Id. at 573. +[FN102] Compare id. with 395 U.S. at 446. +====================================================================== +101 E-Law Copyright 1992-1993 by David Loundy + +sender of the message is on a +computer network, an angered recipient could "fight" by trying to +tamper with or otherwise damage the sender's computer account. If +Sam had written his post about Samantha Sysop instead of Dora, he +could find himself unable to access the bulletin board system, or +he may find that his copy of his master's thesis which he was word +processing is suddenly missing from his computer account. + + D. Child Pornography + + Other areas of content are regulated on computer information +systems. One is child pornography. New York v. Ferber[FN103] held that +states can prohibit the depiction of minors engaged in sexual +conduct. The Ferber court gave five reasons for its holding. +First, the legislative judgment, that using children as subjects +of pornography could be harmful to their physical and +psychological well-being, easily passes muster under the First +Amendment.[FN104] Second, application of the Miller standard for +obscenity (discussed infra) is not a satisfactory solution to the +problem of child pornography.[FN105] Third, the financial gain +involved in selling and advertising child pornography provides +incentive to produce such material Ñ and such activity is +prohibited throughout the United States.[FN106] Fourth, the value of +permitting minors to perform/appear in lewd exhibitions is +negligible at best.[FN107] Finally, classifying child pornography as a +form of expression outside the protection of the First Amendment +is not incompatible with earlier court decisions.[FN108] The court +said, "[T]he distribution of photographs and films depicting +sexual activity by juveniles is intrinsically related to the +sexual abuse of children ..."[FN109] and is therefore within the +state's interest and power to prohibit. The Federal government has +explicitly addressed child pornography as it pertains to computer +communication.[FN110] Section 2252 of Title 18 of the U.S. Code +forbids knowing foreign or interstate transportation or reception +by any means +-------------------------- +[FN103] New York v. Ferber, 458 U.S. 747 (1982). +[FN104] Id. at 756-57 (citing Globe Newspaper Co. v. Superior Court, +457 U.S. 596, 607 (1982)). +[FN105] Id. at 759 (citing Miller v. California, 413 U.S. 15, reh'g +denied, 414 U.S. 881 (1973)). +[FN106] Id. at 761. +[FN107] Id. at 762. +[FN108] Id. at 763. +[FN109] Id. at 759. +[FN110] See 18 U.S.C. ¤ 2252 (1978). +====================================================================== +102 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +including, for example, visual depictions of minors +engaged in sexually explicit conduct which have been converted +into a computer-readable form.[FN111] Pictures are easily converted +into a computer-readable form. Once in such a form, they can be +distributed, interstate, over a computer information system. +Pictures are put into a computer by a process called "scanning" or +"digitizing."[FN112] Scanning is accomplished by dividing a picture up +into little tiny elements called pixels.[FN113] The equivalent can be +seen by looking very closely at a television screen or at a +photograph printed in a newspaper. The computer examines each of +these dots, or pixels, and measures its brightness; the computer +does this with every pixel. The picture is then represented by a +series of numbers that correspond to the brightness and location +of each pixel. These numbers can be stored as a file for access on +a bulletin board system or file server or can be transferred over +a network.[FN114] + Computers do not differentiate between "innocuous" pictures +and pictures that are pornographic. A piece of child pornography +can be scanned and distributed by file server, bulletin board, or +through E-mail just like any other computer file. If Sam Slammer +had received a response from someone interested in seeing the +pictures of the last time he had sex with a child, the pictures +could easily be scanned into a computer-readable form and +distributed over a BBS or computer network. While a computer may +not differentiate between subject matter of pictures, the law +does. Persons responsible for distributing child pornography could +be prosecuted for child abuse, and such a suit could result in +$50,000 or more in fines and damages.[FN115] If Sam Slammer did try to +distribute the pictures he made of the last time he had sex with a +minor, his distribution of those pictures over a computer +information system could result in a prosecution for child abuse. + Another issue raised by section 2252 is possession of +pornographic material. Anyone who "knowingly possesses 3 or more +books, magazines, periodicals, films, video tapes, or other matter +which contain any visual depiction [of child pornography] that has +been mailed, or has been shipped or transported in interstate or +foreign commerce, or which was produced using materials which +-------------------------- +[FN111] Id. ¤ 2252(a)(1). +[FN112] See Lois F. Lunin, An Overview of Electronic Image Information, +OPTICAL INFO. SYSS., May 1990. +[FN113] Id. +[FN114] Id. +[FN115] See 18 U.S.C. ¤ 2255(a) (1986). +====================================================================== +103 E-Law Copyright 1992-1993 by David Loundy + +have been mailed or so shipped or transported, by means including +computer"[FN116] can be fined and imprisoned for up to five +years.[FN117] +While the requirement of knowledge may insulate some computer +information systems such as networks, it clearly does not protect +computer users who knowingly traffic in pornographic material +stored in computer files. Thus, if Sam were distributing +pornographic pictures in and out of his computer account, he could +be charged under section 2252 with transporting material used in +child pornography. He would probably need to be caught with three +pictures in his account at the time, but it is likely that a +prosecutor could ask a system operator to look through any back- +ups of the computer data which was in Sam's account at an earlier +time. + Typically, a system operator will make a backup copy of +all of the data stored on a computer system. This is done so that +if the computer should malfunction, the information can be +restored by use of this backup. Backups are often kept for a while +before being erased, in essence freezing all of the users' +accounts as they were at a time in the past. If pictures were also +found in the backups, a claim could be made that Sam was in +possession of these pictures as well. This would be an easy claim +to make if Sam had the ability to ask the SYSOP to recover any of +the files that are on these back-ups, but which are no longer in +his actual account. Based on the public policy against child +pornography, it is likely that an attempt would be made to hold +Sam responsible for the knowing possession of any files that were +formerly in his account that could still be recovered from the +system operator's backups of Sam's data. As to Samantha Sysop's +liability, unless she knew what was stored in Sam's account, it is +unlikely that she would be held liable for having child +pornography stored on her computer system. Section 2252, as quoted +above, contains a knowledge requirement. If Samantha Sysop did not +know what was in Sam's account, she would not meet that knowledge +requirement. If she had reason to know that Sam had pictures of +child pornography in his account, but intentionally turned her +back, she may be considered to have constructive knowledge of the +presence of the pornographic material on her system, and therefore +she could be charged with the knowing possession of the material. +It is not likely to make a difference that the material is in +Sam's account; Sam's account is still +-------------------------- +[FN116] ¤ 2252(a)(4)(B). +[FN117] Id. ¤ 2252(b). +====================================================================== +104 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +on Samantha's computer +system which she is responsible for maintaining in a legal manner. + Child pornographers, or pedophiles, may use bulletin board +systems and E-mail for more than just storing and transporting +pictures. There has been some publicity over bulletin boards being +used by pedophiles to contact each other.[FN118] Law enforcement use +of bulletin board systems to track down pedophiles has not +resulted in prosecutions of system operators, but there have been +convictions of BBS users who have arranged to make "snuff films" +through contacts they have made over a computer.[FN119] + + E. Computer Crime + + Some areas of "computer crime" are regulated.[FN120] Computer +crime is an issue which computer information system operators +should be aware of, as they may be on the receiving end at some +point. The term "computer crime" covers a number of offenses,[FN121] +such as: the unauthorized accessing of a computer system;[FN122] the +unauthorized accessing of a computer to gain certain kinds of +information (such as defense information or financial records);[FN123] +accessing a computer and removing, damaging, or preventing access +to data without authorization;[FN124] trafficking in stolen computer +passwords;[FN125] spreading computer viruses;[FN126] and a number of +other related offenses.[FN127] All of these are activities which are +often referred to as "hacking."[FN128] +-------------------------- +[FN118] See, Jim Doyle, FBI Probing Child Porn On Computers: Fremont +Man Complains of Illicit Mail, SAN FRANCISCO CHRON., Dec. 5, 1991 at +A23. See also, Robert F. Howe, Va. Man Pleads Guilty in Child Sex +Film Plot; Computer Ads Led to Youth Volunteer's Arrest, WASH. +POST., Nov. 30, 1989, at C1.; Robert L. Jackson, Child Molesters +Use Electronic Networks; Computer-Crime Sleuths Go Undercover, +L.A. TIMES, Oct. 1, 1989, at 20. +[FN119] See United States v. Lambey, 949 F.2d 133 (1991). +[FN120] Note, Addressing the New Hazards of the High Technology +Workplace, 104 HARV. L. REV. 1898, 1913 (1991). +[FN121] Id. at 1898. +[FN122] See 949 F.2d 133; Jensen, supra note 7, at 222. +[FN123] See 949 F.2d 133; Note, supra note 120, at 1898; Jensen, supra +note 7, at 222. +[FN124] See 949 F.2d 133; Note, supra note 120, at 1898; Jensen supra +note 7, at 222. +[FN125] Note, supra note 120, at 1899; Jensen, supra note 7, at 222. +[FN126] See United States v. Morris, 928 F.2d 505 (2d Cir.), cert. +denied, 112 S. Ct. 72 (1991). +[FN127] Jensen, supra note 7, at 222. +[FN128] Id. +====================================================================== +105 E-Law Copyright 1992-1993 by David Loundy + + F. Computer Fraud + + The first federal computer crime law, entitled the +Counterfeit Access Device and Computer Fraud and Abuse Act of +1984, was passed in October of 1984.[FN129] + + [T]he Act made it a felony knowingly to access a computer + without authorization, or in excess of authorization, in + order to obtain classified United States defense or foreign + relations information with the intent or reason to believe + that such information would be used to harm the United States + or to advantage a foreign nation.[FN130] + +Access to obtain information from financial records of a financial +institution or in a consumer file of a credit reporting agency was +also outlawed.[Fn131] Access to use, destroy, modify or disclose +information found in a computer system, (as well as to prevent +authorized use of any computer used for government business if +such a use would interfere with the government's use of the +computer) was also made illegal.[FN132] The 1984 Act had several +shortcomings, and was revised in The Computer Fraud and Abuse Act +of 1986.[FN133] The 1986 Act added three new crimes Ñ a computer fraud +offense,[FN134] modeled after federal mail and wire fraud +statutes;[FN135] +an offense for the alteration, damage or destruction of +information contained in a "federal interest computer;"[FN136] and an +offense for trafficking in computer passwords under some +circumstances.[FN137] + This Computer Fraud and Abuse Act presents a powerful weapon +for SYSOPs whose computers have been violated by hackers. It was +made even more powerful by the first person charged with its +violation.[Fn138] Robert T. Morris Jr. was charged with releasing a +"worm" onto a section of the Internet computer network,[FN139] causing +numerous government and university computers to either +-------------------------- +[FN129] Dodd S. Griffith, The Computer Fraud and Abuse Act of 1986: A +Measured Response to a Growing Problem, 43 VAND. L. REV. 453, 455 +(1990). +[FN130] Id. at 460. +[FN131] Id. +[FN132] Id. +[FN133] The Computer Fraud and Abuse Act of 1986, 18 U.S.C. ¤ 1030 +(1988). +[FN134] Griffith, supra note 129, at 474. +[FN135] Id. +[FN136] Id. +[FN137] Id. +[FN138] United States v. Morris, 928 F.2d 504 (2d Cir.), cert. denied, +112 S. Ct. 72 (1991). +[FN139] Id.; Nicholas Martin, Revenge of the Nerds; The Real Problem +with Computer Viruses Isn't Genius Programmers, It's Careless +Ones, PSYCHOL. TODAY, Jan. 1989, at 21. +====================================================================== +106 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +"crash" or become "catatonic."[FN140] Morris is the son of the Chief +Scientist at the National Security Agency's National Computer Security +Center.[FN141] His father is also a former researcher at AT&T's Bell +Laboratories where he worked on the original UNIX operating +system.[FN142] UNIX is the operating system that many mainframe +computers use. Morris claims that the purpose of his worm program +was to demonstrate security defects and the inadequacies of +network security, not to cause harm.[FN143] However, due to a small +error in his worm program, it got out of control and caused +numerous computers to require maintenance to eliminate the worm at +costs ranging from $200 to $53,000.[FN144] District Judge Munson read +the Computer Fraud and Abuse Act largely as defining a strict +liability crime. The relevant language applies to someone who: + + (5) intentionally accesses a Federal interest computer + without authorization, and by means of one or more + instances of such conduct alters, damages, or destroys + information in any such Federal interest computer, or + prevents authorized use of any such computer or + information, and thereby - + + (A) causes loss ... of a value aggregating + $1,000 or more ....[FN145] + +Judge Munson's interpretation is that this language requires +intent only to access the computer, not intent to cause actual +damage.[FN146] On appeal, Munson's reading was affirmed by the Court +of Appeals,[FN147] and the Supreme Court refused to hear further +appeals.[FN148] + Morris' lawyer, Thomas Guidoboni, described the statute as +"perilously vague" because it treats intruders who do not cause +any harm just as severely as computer terrorists.[FN149] While the +Judge's interpretation of the statute makes it a more powerful +weapon in a prosecutor's corner, Guidoboni argues that Munson's +interpretation violates the sense of fairness that underlies the +U.S. +-------------------------- +[FN140] 928 F.2d. at 506. +[FN141] Robin Nelson, Viruses, Pests, and Politics: State of the Art, +20 COMPUTER & COMM. DECISIONS, Dec. 1989, at 40, 40. +[FN142] Id. +[FN143] 928 F.2d. at 504. +[FN144] Id. at 506. +[FN145] 18 U.S.C. ¤ 1030(a)(5)(A). +[FN146] 928 F.2d at 506-07. +[FN147] 328 F2d. 504 (1991). +[FN148] 112 S. Ct. at 72. +[FN149] Thomas A. Guidoboni, What's Wrong with the Computer Crime +Statute?; Defense and Prosecution Agree the 1986 Computer Fraud +and Abuse Act is Flawed but Differ on How to Fix It, COMPUTERWORLD, +Feb. 17, 1992, at 33, 33. +====================================================================== +107 E-Law Copyright 1992-1993 by David Loundy + +criminal justice system, which almost always differentiates +between people who intend to cause harm and those who do not.[FN150] +No one seems to argue that what Morris did was right, but many do +not agree that he should be charged with a felony although he was +convicted.[FN151] + The jury in the Morris case indicated that the most difficult +question was whether Morris' access to the Internet was +unauthorized even though defense counsel pointed out that 2 +million subscribers had the same access.[FN152] The jury's difficulty +in resolving this issue is indicative of a lack of understanding +of how computer networks work.[FN153] + + G. Unauthorized Use of Communications Services + + One of the favorite targets of computer hackers is the +telephone company. Telephone systems are susceptible to computer +hackers' illegal use. By breaking into the telephone company's +computer, hackers can then place free long distance calls to other +computers.[FN154] They can also break into telephone companies' +computers and get lists of telephone credit card numbers.[FN155] +Trafficking of stolen credit card numbers and other kinds of +telecommunications fraud costs long distance carriers about $1.2 +billion annually.[FN156] Distribution of fraudulently procured long +distance codes is often accomplished over bulletin board systems, +or by publication in electronic journals put out by hackers over +computer networks.[FN157] The major protection for the telephone +companies is found in section 1343 of the Mail Fraud Chapter of +the U.S. Code.[FN158] This section prohibits the use of wires, radio +or television in order to fraudulently deprive a party of money or +-------------------------- +[FN150] Id. +[FN151] Mike Godwin, Editorial: Amendments Would Undue Damage of Morris +Decision, EFFECTOR ONLINE, Oct. 18, 1991, available over Internet, +by anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation). +[FN152] David F. Geneson, Recent Developments in the Investigation and +Prosecution of Computer Crime, 301 PLI/Pat 45, at 2. The +difficulty arises from the fact that Morris had authorized access +to some computers but not others, presenting the question whether +Morris' actions amounted to unauthorized access or whether his +actions exceeded authorized access. 928 F.2d at 510. +[FN153] Geneson, supra note 152, at 2. +[FN154] Cindy Skrzycki, Thieves Tap Phone Access Codes to Ring Up +Illegal Calls, WASH. POST, Sept. 2, 1991, ¤ 1 at A1. +[FN155] Id. +[FN156] Id. +[FN157] Id. +[FN158] Fraud by Wire, Radio, or Television, 18 U.S.C. ¤ 1343 (1992). +====================================================================== +108 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +property.[FN159] This statute has been held to include fraudulent use +of telephone services.[FN160] Presumably, this statute may also cover +fraudulent theft of computer services when the computer is +accessed by wire. Computer information systems that knowingly +distribute information aiding in wire fraud could be charged with +conspiracy to violate section 1346 of the Mail Fraud Chapter,[FN161] +which specifically covers schemes to defraud.[FN162] Some state laws +exist to punish theft of local telephone service or publication of +telephone access codes.[FN163] + + H. Viruses + + As pointed out in the introduction, computer viruses are +increasingly of concern Ñ both for operators of computer +information systems, as well as for users of the systems. But what +is a virus? A virus refers to any sort of destructive computer +program, though the term is usually reserved for the most +dangerous ones.[FN164] Computer virus crime involves an intent to +cause damage, "akin to vandalism on a small scale, or terrorism on +a grand scale."[FN165] Viruses can spread through networked computers +or by sharing disks between computers.[FN166] Viruses cause damage by +either attacking another file or by simply filling up the +computer's memory or by using up the computer's processor +power.[FN167] There are a number of different types of viruses, but +one of the factors common to most of them is that they all copy +themselves (or parts of themselves).[FN168] Viruses are, in essence, +self-replicating. + Also discussed earlier was a "pseudo-virus," called a worm. +People in the computer industry do not agree on the distinctions +between worms and viruses.[FN169] Regardless, a worm is a program +-------------------------- +[FN159] Id. +[FN160] See, e.g., Brandon v. United States, 382 F.2d 607 (10th Cir. +1967). +[FN161] 18 U.S.C. ¤ 1346. +[FN162] Id. +[FN163] See, e.g., State v. Northwest Passage, Inc., 585 P.2d 794 +(Wash. 1978) (en banc). +[FN164] See, e.g., Daniel J. Kluth, The Computer Virus Threat: A Survey +of Current Criminal Statutes, 13 HAMLINE L. REV. 297 (1990). +[FN165] Id. +[FN166] David R. Johnson et al., Computer Viruses: Legal and Policy +Issues Facing Colleges and Universities. 54 EDUC. L. REP. (West) +761 (Sept. 14, 1989). +[FN167] Id. at 762. +[FN168] Id. +[FN169] Eric Allman, Worming My Way; November 1988 Internet Worm, UNIX +REV., January 1989, at 74. +====================================================================== +109 E-Law Copyright 1992-1993 by David Loundy + +specifically designed to move through networks.[FN170] A worm may have +constructive purposes, such as to find machines with free +resources that could be more efficiently used, but usually a worm +is used to disable or slow down computers. More specifically, +worms are defined as, "computer virus programs ... [which] +propagate on a computer network without the aid of an unwitting +human accomplice. These programs move of their own volition based +upon stored knowledge of the network structure."[FN171] + Another type of virus is the "Trojan Horse."[FN172] These are +viruses which hide inside another seemingly harmless program.[FN173] +Once the Trojan Horse program is used on the computer system, the +virus spreads.[FN174] The virus type which has gained the most fame +recently has been the Time Bomb, which is a delayed action virus +of some type.[FN175] This type of virus has gained notoriety as a +result of the Michelangelo virus. A virus designed to erase the +hard drives of people using IBM compatible computers on the +artist's birthday, Michelangelo was so prevalent, it was even +distributed accidentally by some software publishers when the +software developers' computers became infected.[FN176] + One concern many have about statutes dealing with computer +viruses is the problem that the statutes need some kind of intent +requirement.[FN177] Without some sort of intent requirement, virus +statutes may be sufficiently overbroad so as to cover defective +computer programs.[FN178] + What legal remedies are available for virus attacks? +Distributing a virus affecting computers used substantially by the +government or financial institutions is a federal crime under the +Computer Fraud and Abuse Act.[FN179] If a virus also involves +unauthorized access to an electronic communications system +involving interstate commerce, the Electronic Communications +Privacy Act may come into play.[FN180] Most states have statutes that +make it a crime to +-------------------------- +[FN170] Kluth, supra note 164, at 298. +[FN171] Id. at note 14. +[FN172] See Stover, supra note 32. +[FN173] Id. +[FN174] Kluth, supra note 164, at 298. +[FN175] See Stover, supra note 32. +[FN176] Electronic Mail Software Provider Reports Virus Contamination, +UPI, Feb. 3, 1992, available in LEXIS, Nexis Library, UPI File. +[FN177] See Kluth, supra note 164. +[FN178] Id. +[FN179] 18 U.S.C. ¤ 1030 (1984). +[FN180] Electronic Communications Privacy Act of 1986, 18 U.S.C. ¤2510 +(1984). +====================================================================== +110 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +intentionally interfere with a computer +system.[FN181] These statutes will often cover viruses as well as +other forms of computer crime. State statutes generally work by +affecting any of ten different areas:[FN182] + 1. Expanded definitions of "property" to include computer + data.[FN183] + 2. Prohibiting unlawful destruction of computer files.[FN184] + 3. Prohibiting use of a computer to commit, aid or abet + commission of a crime.[FN185] + 4. Creating crimes against intellectual property.[FN186] + 5. Prohibiting knowing or unauthorized use of a computer or + computer services.[FN187] + 6. Prohibiting unauthorized copying of computer data.[FN188] + 7. Prohibiting the prevention of authorized use.[FN189] + 8. Prohibiting unlawful insertion of material into a computer + or network.[FN190] + 9. Creating crimes like "Voyeurism"Ñ Unauthorized entry into + a computer system just to see what is there.[FN191] + 10. "Taking possession" of or exerting control of a computer + or software.[FN192] + SYSOPs must also worry about being liable to their users as a +result of viruses which cause a disruption in service. Service +outages caused by viruses or by shutdowns to prevent the spreading +of viruses could result in a breach of contract where continual +service is guaranteed; however, contract provisions could provide +for excuse or deferral of obligation in the event of disruption of +service by a virus. + Similarly, SYSOPs are open to tort suits caused by negligent +virus control.[FN193] "[A SYSOP] might still be found liable on the +-------------------------- +[FN181] Johnson et al., supra note 166, at 764. See Anne W. Branscomb, +Rogue Computer Programs and Computer Rogues: Tailoring the +Punishment to Fit the Crime, 16 RUTGERS COMPUTER TECH. L.J. 1, 30-31, +61 (1990). +[FN182] Branscomb, supra note 181, at 32. +[FN183] Id. +[FN184] Id. at 33. +[FN185] Id. +[FN186] Id. at 34. +[FN187] Id. +[FN188] Id. at 35. +[FN189] Id. +[FN190] Id. +[FN191] Id. at 36. +[FN192] Id. at 37. +[FN193] See Johnson et al., supra, note 166, at 764, 766. +====================================================================== +111 E-Law Copyright 1992-1993 by David Loundy + +ground that, in its role as operator of a computer system or +network, it failed to use due care to prevent foreseeable damage, +to warn of potential dangers, or to take reasonable steps to limit +or control the damage once the dangers were realized."[FN194] The +nature of "care" still has not been defined by court or +statute.[FN195] But still, it is likely that a court would find that a +provider is liable for failure to take precautions against viruses +when precautions are likely to be needed. SYSOPs are also likely +to be held liable for not treating files they know are infected. +Taking precautions against viruses would be likely to reduce the +chances or degree of liability. + + I. Protection from Hackers + + System Operators need to worry about damage caused by hackers +as well as damage caused by viruses. While hackers are liable for +the damage they cause, SYSOPs may find themselves on the receiving +end of a tort suit for being negligent in securing their computer +information system. For a SYSOP to be found negligent, there must +first be a duty of care to the user who is injured by the +hacker.[FN196] There must then be a breach of that duty[FN197] Ñ the +SYSOP must display conduct "which falls below the standard established +by law for the protection of others against unreasonable risk of +harm."[FN198] Simply put, the SYSOP must do what is generally expected +of someone in his or her position in order to protect users from +problems a normal user would expect to be protected against. +Events that the SYSOP could not have prevented Ñ or foreseen and +planned for Ñ will not result in liability.[FN199] A SYSOP's duty "may +be defined as a duty to select and implement security provisions, +to monitor their effectiveness, and to maintain the provisions in +accordance with changing security needs."[FN200] SYSOPs should be +aware of the type of information stored in their systems, what +kind of security is needed for the services they provide, and what +users are authorized to use what data and which services. +-------------------------- +[FN194] Id. at 766. +[FN195] Id. +[FN196] W. PAGE KEETON ET AL., PROSSER AND KEETON ON THE LAW OF TORTS +¤30(1), at 164 (5th ed. 1984). +[FN197] Id. ¤ 30(2), at 164. +[FN198] Id. ¤ 31, at 169. +[FN199] Id. ¤ 29, at 162. +[FN200] Cheryl S. Massingale & A. Faye Borthick, Risk Allocation for +Computer System Security Breaches: Potential Liability for +Providers of Computer Services, 12 W. NEW ENG. L. REV. 167, 187 +(1990). +====================================================================== +112 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +SYSOPs also have a duty to explain to each user the extent of his or her +authorization to use the computer information service.[FN201] + The same analysis applies to operator-caused problems. If the +SYSOP accidentally deletes data belonging to a user or negligently +maintains the computer system, resulting in damage, he or she +would be liable to the user to the same extent as he or she would +be from hacker damage that occurred due to negligence. + + IV. Privacy + + Privacy has been a concern of computer information system +providers from the very beginning. With the speed, power, +accessibility, and storage capacity provided by computers comes +tremendous potential to infringe on people's privacy. It is +imperative that users of services such as electronic mail +understand how these services work, i.e., how private the users' +communications really are, and who may have access to the users' +"personal" E-mail. The same is true for stored computer files. +Just as importantly, System Operators should be aware of what +restrictions and requirements exist to maintain users' privacy +expectations. + + A. Pre-Electronic Communications Privacy Act of 1986 + + One of the most significant cases establishing privacy for +electronic communications is Katz v. United States.[FN202] Katz +involved the use of an electronic listening device (or "bug") +mounted on the outside of a public telephone booth.[FN203] The +government (who placed the bug) assumed that, because the bug did +not actually penetrate the walls of the booth, and was not +actually a "wire tap," there was no invasion of privacy.[FN204] +However, Defendant argued that the bug was an unlawful search and +seizure in violation of the Fourth Amendment.[FN205] The court held +that "the Fourth Amendment protects people, not places. What a +person knowingly exposes to the public, even in his own home or +office, is not a subject of Fourth Amendment protection. +[citations omitted] But what he seeks to preserve as private, even +in an area accessible to the public, may be constitu- +-------------------------- +[FN201] Id. at 188-89. +[FN202] Katz v. United States, 389 U.S. 347 (1967). +[FN203] Id. at 348. +[FN204] Id. at 351. +[FN205] Id. +====================================================================== +113 E-Law Copyright 1992-1993 by David Loundy + +tionally protected."[FN206] The decision in this case is also understood +to say that if a person does not have a reasonable expectation of +privacy, there is, in fact, no Fourth Amendment protection.[FN207] The +person must have a subjective expectation of privacy, and to be +reasonable, it must be an expectation that society is willing to +recognize as reasonable.[FN208] For example, most people have a +reasonable expectation that calls made from inside a closed +telephone booth will be private. For computer users, this means +that, because the computer operator has control over the system +and can read any messages, the user cannot reasonably protect his +or her privacy. If there is no reasonable expectation of privacy, +there can be no violation of privacy, and, therefore, no Fourth +Amendment claim.[FN209] + Statutory protection of the right to privacy was originally +provided by the Federal Wiretap Statute.[FN210] However, this statute +affected only "wire communication," which is limited to "aural +[voice] acquisition."[FN211] In United States v. Seidlitz,[FN212] the +court held that interception of computer transmission is not an +"aural acquisition" and, therefore, the Wiretap Act did not +provide protection.[FN213] Even if the Act did cover transmission, it +still does not cover stored computer data.[FN214] This does not result +in significant or comprehensive protection of E-mail or stored +data. + + B. Electronic Communications Privacy Act of 1986 + + Prior to the passage of the Electronic Communications + Privacy Act, communications between two persons were + subject to widely disparate legal treatment depending on + whether the message was carried by regular mail, + electronic mail, an analog phone line, a cellular phone, + or some other form of electronic communication system. + This technology-dependent legal approach turned the + Fourth Amend- +-------------------------- +[FN206] Id. +[FN207] See, e.g., Oliver v. U.S. 466 U.S. 170 (1984). +[FN208] See 389 U.S. at 347; see also California v. Ciraolo 476 U.S. +207, reh'g denied, 478 U.S. 1014 (1986). +[FN209] See Ruel Hernandez, Computer Electronic Mail and Privacy, +available over Internet, by anonymous FTP, at FTP.EFF.ORG +(Electronic Frontier Foundation). +[FN210] 18 U.S.C. ¤ 2510 (1968). +[FN211] See Hernandez, supra note 209. +[FN212] United States v. Seidlitz, 589 F.2d 152 (4th Cir. 1978), cert. +denied, 441 U.S. 922 (1979). +[FN213] Id. at 157. +[FN214] See Hernandez, supra note 209. +====================================================================== +114 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + ment's protection on its head. The Supreme + Court had said that the Constitution protects people, + not places, but the Wiretap Act did not adequately + protect all personal communications; rather, it extended + legal protection only to communications carried by some + technologies.[FN215] + +The Federal Wiretap Act was updated by the Electronic +Communications Privacy Act of 1986.[FN216] The Electronic +Communications Privacy Act deals specifically with the +interception and disclosure of interstate[FN217] electronic +communications[FN218], and functions as the major sword and shield +protecting E-mail. It works both to guarantee the privacy of E- +mail and also to provide an outlet for prosecuting anyone who will +not respect that privacy. The statute provides in part that "any +person who (a) intentionally intercepts, endeavors to intercept, +or procures any other person to intercept or endeavor to intercept +any wire, oral, or electronic communication"[FN219] shall be fined or +imprisoned.[FN220] The intentional disclosure or use of the contents +of any wire, oral, or electronic communication that is known or +could reasonably be known to have been intercepted in violation of +the statute is prohibited.[FN221] This largely guarantees the privacy +of E-mail as well as data transfers over a network or telephone +line going to or from a computer information system. In essence, +E-mail cannot legally be read except by the sender or the receiver +even if someone else actually intercepted the message. Further +disclosure or use of the message contents by any party, other than +the message sender and its intended recipient, is prohibited if +the intercepting party knows or has reason to know that the +message was illegally intercepted. + Section 2 of the Electronic Communications Privacy Act[FN222] +provides an exception for SYSOPs and their employees to the extent +necessary to manage properly the computer information system: + + It shall not be unlawful under this chapter for an + operator of a switchboard, or an officer, employee, or + agent of a provider of wire or electronic communication + service, whose facilities are used in the transmission + of a wire communication, to intercept, disclose, or use +-------------------------- +[FN215] Robert W. Kastenmeier et al., supra note 8, at 720 (citations +omitted). +[FN216] Electronic Communications Privacy Act of 1986, 18 U.S.C. ¤2510 +(1968). +[FN217] Id. ¤ 2510(12). +[FN218] 18 U.S.C. ¤ 2511. +[FN219] Id. ¤ 2511(1)(a). +[FN220] Id. ¤ 2511(4). +[FN221] Id. ¤ 2511(1)(c). +[FN222] Id. ¤ 2511(2)(a)(i). +====================================================================== +115 E-Law Copyright 1992-1993 by David Loundy + + that communication in the normal course of his + employment while engaged in any activity which is a + necessary incident to the rendition of his service or to + the protection of rights or property of the provider of + that service, except that a provider of wire + communication service to the public shall not utilize + service observing or random monitoring except for + mechanical or service quality control checks.[FN223] + +"Electronic Communication System" is defined as "any wire, radio, +electromagnetic, photooptical or photoelectronic facilities for +the transmission of electronic communications, and any computer +facilities or related electronic equipment for the electronic +storage of such communications."[FN224] Further exceptions are made +for SYSOPs of these systems when the originator or addressee of +the message gives consent;[FN225] when the message is being given to +another service provider to be further forwarded towards its +destination;[FN226] where the message is inadvertently obtained by the +SYSOP; and appears to pertain to a crime;[FN227] when the divulgence +is being made to a law enforcement agency;[FN228] or where the message +is configured so as to be readily accessible to the public.[FN229] It +is worth noting that this section also applies to broadcast +communications, as long as they are in a form not readily +accessible to the general public (with some exceptions).[FN230] This +will probably cover the up-and-coming technologies of radio-WANS +(Wide Area NetworksÑcomputer networks which link computers by +radio transmission rather than wires), and also packet radio. +These technologies are especially likely to be covered by the +statute if data is transmitted using some sort of encryption +scheme.[FN231] + For law enforcement agencies to intercept electronic +communications, they must first obtain a search warrant by +following the procedure laid out in section 2518 of this Act.[FN232] +The statute does not prohibit the use of pen registers or trap and +trace devices.[FN233] The +-------------------------- +[FN223] Id. +[FN224] Id. ¤ 2510(14). +[FN225] Id. ¤ 2511(3)(b)(ii). +[FN226] Id. ¤ 2511(3)(b)(iii). +[FN227] Id. ¤ 2511(3)(b)(iv). +[FN228] Id. ¤ 2511(3)(b)(iv). +[FN229] Id. ¤ 2511(3)(b)(i). +[FN230] Id. ¤ 2511. +[FN231] Encryption is in essence a coding of the data so it cannot be +understood by anyone without the equipment or knowledge necessary +to decode the transmission. +[FN232] 18 U.S.C. ¤ 2518 (1968). +[FN233] Id. ¤ 2511(2)(h)(i). A pen register is a device which records +the telephone numbers called from a specific telephone; a trap and +trace device records the phone originating calls to a specific +telephone. +====================================================================== +116 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +warrant requirement makes it harder for law +enforcement officials to get at the contents of the +communications, but does not substantially impede efforts to find +out who is calling the computer information system. + + C. Access to Stored Communications + + Section 2511 of the Electronic Communications Privacy Act +concerns the interception of computer communications. Section 2701 +of the Act prohibits unlawful access to communications which are +being stored on a computer.[FN234] The section reads, in part, +"whoever -- (1) intentionally accesses without authorization a +facility through which an electronic communication service is +provided; or (2) intentionally exceeds an authorization to access +that facility; and thereby obtains, alters, or prevents authorized +access to a wire or electronic communication while it is in +electronic storage in such system"[FN235] shall be subject to fines +and/or imprisonment, or both.[FN236] Like section 2511, this section +includes provisions prohibiting the divulgence of the stored +messages.[FN237] Importantly, while this statute allows law +enforcement agencies to gain access to stored communications, +subject to a valid search warrant,[FN238] it does specifically allow +the government to permit the system operator to first make backup +copies of stored computer data, so that the electronic +communications may be preserved for use outside of the +investigation.[FN239] Such a statute is needed because the government +often takes the stored data to sort through during the course of +its investigation, as was the case in Steve Jackson Games, Inc. v. +United States Secret Service.[FN240] In this case, the Secret Service +raided a publisher and seized its bulletin board system, +electronic mail and all. The court held that the government had to +go through the procedures established by section 2701 et seq., +covering stored wire and electronic communications, in order to +discover +-------------------------- +[FN234] Id. ¤ 2701. +[FN235] Id. ¤ 2701(a). +[FN236] Id. ¤ 2701(b). +[FN237] Id. ¤ 2702. +[FN238] See id. ¤ 2703. +[FN239] Id. ¤ 2703(a) +[FN240] Steve Jackson Games, Inc. v. United States Secret Serv., 816 +F. Supp. 432 (W.D. TEX. 1993). +====================================================================== +117 E-Law Copyright 1992-1993 by David Loundy + +properly the contents of the electronic mail on the +BBS.[FN241] The court said that the evidence of good faith reliance +on what the Secret Service believed to be a valid search warrant +was insufficient.[FN242] The government knew that the computer had +private electronic communications stored on it, and therefore the +only means they could legally use to gain access to those +communications was by compliance with the Act, and not by seizing +the BBS.[FN243] + The Steve Jackson Games Case was also valuable for showing +the interplay between protection against interception of +electronic communication[FN244] and access to stored +communication.[FN245] Judge Sparks held, in essence, that taking a +whole computer is not an "interception" as contemplated by section +2510 et seq., especially in light of the protection of stored +communication by section 1701 et seq. He analogized the situation +to the seizure of a tape recording of a telephone conversation and +said that the "aural acquisition" occurs when the tape is made, +not each time the tape is played back by the police.[FN246] This +interpretation of an intellectually complex concept[FN247] makes +sense when the two code sections are read together. + + D. An Apparent Exception for Federal Records + + A recent case presents an apparent exception to the +Electronic Communications Privacy Act.[FN248] In Armstrong v. +Executive Office of the President,[FN249] while not mentioning the +Electronic Communications Privacy Act, the court required certain +electronic mail and stored data to be saved and made available for +the National Archives.[FN250] While electronic communications are +normally +-------------------------- +[FN241] Id. at 434. +[FN242] Id. at 443. +[FN243] Id. at 442-43. +[FN244] Id.; 18 U.S.C. ¤ 2510. +[FN245] 816 F. Supp. at 442-43. +[FN246] 816 F. Supp. at 441-42; 18 U.S.C. ¤ 2701. +[FN247] Stored communications may be intercepted in some sense because +the message writer may have sent the E-mail, but it has not yet +been read by the recipient. Also, messages being sent from one BBS +user to another on bulletin board systems which support multiple +users simultaneously may never be stored on the computer. By +reading the two sections as complimentary, the complexities should +be accounted for - communications not covered by ¤ 2510 should be +covered by ¤ 2701 and vise versa. +[FN248] See 18 U.S.C. ¤ 2511 (1968). +[FN249] Armstrong v. Executive Office of the President, 810 F. Supp +335 (D.C. Cir. 1993). +[FN250] Id. at 348. +====================================================================== +118 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +protected under the Electronic Communications Privacy +Act, the Federal Records Act[FN251] requires that: + + all ... machine readable materials, or other documentary + materials, regardless of physical form or + characteristics, made or received by an agency of the + United States under Federal law or in connection with + the transaction of public business and preserved or + appropriated for preservation by that agency ... as + evidence of the organization, functions, policies, + decisions, procedures, operations, or other activities + of the Government or because of the informational value + of the data in them [be preserved].[FN252] + +The court held that the actual computer records must be saved, not +just paper copies of the electronically mailed notes, because the +computer records contain more information than printouts.[FN253] +Printed copies of the messages contain the text of the notes, but +only the computer records contain information such as who received +the E-mail messages and when the communication was received.[FN254] + A similar possible exception to the privacy of E-mail is the +Presidential Records Act,[FN255] which requires that all records +classified by the Act as "Presidential Records"[FN256] be preserved +for historical researchers. However, the only case to apply this +statute to Presidential E-mail held that the Presidential Records +Act impliedly precludes judicial review of the President's +compliance with the Act.[FN257] + + E. Privacy Protection Act of 1980 + + It is also possible that computer information systems will be +-------------------------- +[FN251] Federal Records Act, 44 U.S.C. ¤¤ 2101-2118, 2901-2910, 3101- +3107, 3301-3324. +[FN252] Id. ¤ 3301. +[FN253] 810 F. Supp. at 342, 343. +[FN254] Id. at 341. +[FN255] 44 U.S.C. ¤ 2201. +[FN256] Section 2201(2) of the Act defines a Presidential record as: + + documentary materials ... created or received by the + President, his immediate staff, or a unit or individual in + the Executive Office of the President whose function is to + advise and assist the President, in the course of conducting + activities which relate to or have an affect upon the + carrying out of the constitutional, statutory, or other + official or ceremonial duties of the President. + +Id. +[FN257] Armstrong v. Bush, 924 F.2d. 282, 290 (D.C. Cir. 1991). +====================================================================== +119 E-Law Copyright 1992-1993 by David Loundy + +protected under the Privacy Protection Act of 1980.[FN258] The +Privacy Protection Act immunizes from law enforcement search and +seizure any "work product materials possessed by a person +reasonably believed to have a purpose to disseminate to the public +a newspaper, book, broadcast, or other similar form of public +communication, in or affecting interstate commerce."[FN259] This +statute was passed to overturn the decision in Zurcher v. Stanford +Daily,[FN260] a case which held that a newspaper office could be +searched, even when no one working at the paper was suspected of a +crime.[FN261] The only exceptions to the law's prohibition on +searches of publishers are the following: probable cause to +believe that the person possessing the materials has committed or +is committing the crime to which the materials relate,[FN262] or the +immediate seizure is necessary to prevent the death or serious +injury to a human being.[FN263] Based on the list of types of +"publishers" covered by this statute, electronic publishers should +fall under this section. + The first case that attempted to apply this statute to +electronic publishers was the Steve Jackson Games case, mentioned +in the preceding section. It is a good case study in law +enforcement violations of electronic data privacy. Steve Jackson +Games is a small publisher of fantasy role-playing games in +Texas.[FN264] The company also ran a BBS to gain customer feedback on +the company's games.[FN265] The Secret Service took all of the +company's computers, both their regular business computers and the +one on which they were running the company's BBS (private +electronic mail etc.).[FN266] They also took all of the copies of +their latest game, GURPS Cyberpunk, which one of the Secret +Service agents referred to as "a handbook for computer crime."[FN267] +The raid by the Secret Service caused the company to temporarily +shut down;[FN268] Steve Jackson Games also had to lay off half its +employees.[FN269] The release of +-------------------------- +[FN258] Privacy Protection Act of 1980, 42 U.S.C. ¤ 2000aa (1980). +[FN259] Id. ¤ 2000aa(a). +[FN260] Zurcher v. Stanford Daily, 436 U.S. 547 (1978). +[FN261] Id. at 549. +[FN262] 42 U.S.C. ¤2000aa(a)(1). +[FN263] Id. ¤2000aa (a)(2). +[FN264] Mitchell Kaypor, Civil Liberties in Cyberspace; Computers, +Networks and Public Policy, SCI. AM., Sept. 1991, 158, 158. +[FN265] Id. +[FN266] Steve Jackson Games, Inc. v. United States Secret Serv., 816 +F. Supp. 432, 439 (W.D. Tex. 1993). +[FN267] Id. at 439-40. +[FN268] Id. at 438. +[FN269] Id. +====================================================================== +120 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +the game was delayed for months, +since the Government took all of the word processing disks as well +as all of the printed drafts of the game.[FN270] The Electronic +Frontier Foundation, which provided legal counsel for Steve +Jackson, likened the Secret Service's action to an indiscriminant +seizure of all of a business's filing cabinets and printing +presses.[FN271] Steve Jackson Games was raided because one of its +employees ran a BBS out of his home Ñ one out of a possible +several thousand around the country that distributed the +electronic journal "Phrack," in which a stolen telephone company +document was published.[FN272] The document contained information +which was publicly available in other forms.[FN273] The employee was +also accused of being a part of a fraud scheme Ñ the fraud being +the explanation in a two line message what Kermit is Ña publicly +available communications protocol.[FN274] The employee was also co- +SYSOP of the bulletin board system at Steve Jackson Games.[FN275] + The case held that at the time of the raid, the Secret +Service did not know that Steve Jackson Games was a publisher +(even though they should have), as the Privacy Protection Act[FN276] +requires, though they did know shortly after.[FN277] Judge Sparks +said the continued refusal to return the publisher's work product, +once the Secret Service had been informed that Steve Jackson Games +was a publisher, amounted to a violation of the Act.[FN278] In the +raid, the Secret Service seized a number of Steve Jackson's +computers, and a number of papers.[FN279] As mentioned, this included +the company's BBS, which contained public comments on newspaper +articles submitted for review, public announcements, and other +public and private communications.[FN280] + While the judge did find a violation of the Privacy +Protection Act,[FN281] he did not specify which items led to the +violation. The vio- +-------------------------- +[FN270] Legal Case Summary, May 10, 1990, available over Internet, by +anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation). +[FN271] Id. +[FN272] 816 F. Supp. at 436. +[FN273] United States v. Riggs, 743 F. Supp. 556 (N.D. Ill. 1990). +[FN274] Special Issue: Search Affidavit for Steve Jackson Games, +COMPUTER UNDERGROUND DIG., Nov. 13, 1990, available over Internet, by +anonymous FTP, at FTP.EFF.ORG (Electronic Frontier Foundation). +[FN275] 816 F. Supp. at 436. +[FN276] 42 U.S.C. ¤ 2000aa. +[FN277] 816 F. Supp. at 437. +[FN278] Id. +[FN279] Id. +[FN280] Id. at 439-40. +[FN281] Id. at 441. +====================================================================== +121 E-Law Copyright 1992-1993 by David Loundy + +lation could have been the seizure of the +papers, the computers used for word processing, or the BBS. Thus, +the question still remains unanswered as to whether the seizure of +the BBS alone, which was being used to generate work product for +the publisher, would have amounted to a violation of the Act. +Importantly, other users of the BBS who had posted public comments +about Steve Jackson's Games were also plaintiffs in the case. They +were not allowed recovery based on the Privacy Protection Act.[FN282] +Therefore, either the individual message posters were not +considered to be publishers themselves (only perhaps authors of +works published in electronic form by Steve Jackson Games' BBS) or +their messages were not considered to be work product subject to +protection. + + V. Obscene and Indecent Material + + Computer information systems can contain obscene or indecent +material in the form of text files, pictures, or sounds (such as +the sampled recording of an indecent or obscene text). Different +degrees of liability depend on which legal analogy is applied to +computer information systems. Differences in regulation based on +medium are a result of differing First Amendment concerns.[FN283] + + A. Obscenity + + The constitutional definition of "obscenity," as a term of +art,[FN284] was solidified in Roth v. United States.[FN285] The Roth +definition asks if the material deals with sex in a manner +appealing to prurient interests.[FN286] This standard was further +explained in Miller v. California,[FN287] a case which explored the +constitutionality of a state statute prohibiting the mailing of +unsolicited sexually explicit material.[FN288] The court expressed +the test for obscenity as: + + whether (a) the average person, applying community + standards +-------------------------- +[FN282] Id. +[FN283] See, e.g., F.C.C. v. Pacifica Foundation, 438 U.S. 726, reh'g +denied, 439 U.S. 883 (1978). +[FN284] The term "obscene material" is used synonymously with +"pornographic material." See Miller v. California, 413 U.S. 15, +n.2, reh'g denied, 414 U.S. 881 (1973). +[FN285] Roth v. United States, 354 U.S. 476 (1957). +[FN286] Id. at 487. +[FN287] 413 U.S. at 15. +[FN288] Id. +====================================================================== +122 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + would find that the work, taken as a whole, + appeals to the prurient interest, (b) whether the work + depicts or describes, in a patently offensive way, + sexual conduct specifically defined by the applicable + state law; and (c) whether the work, taken as a whole, + lacks serious literary, artistic, political, or + scientific value.[FN289] + +The first two prongs of this test have been held to be issues left +to local juries, while the last prong is to be determined by the +court.[FN290] Courts have been unwilling to find a national standard +for obscenity, and have held that a carrier of obscenity must be +wary of differences in definition between the states.[FN291] This has +profound implications for computer information systems which have +a national reach. It means SYSOPs must be aware of not only one +standard of obscenity, but fifty. SYSOPs must be aware of the +different standards because the Constitution's protection of free +speech does not extend to obscenity, and states are free to make +laws severely restricting its availability, especially to +children.[FN292] Although states can regulate the availability of +obscene material, they cannot forbid the mere possession of it in +the home.[FN293] The justification for this is based on privacy.[FN294] +In the now famous words of Justice Marshall in Stanley v. +Georgia,[FN295] + + Whatever may be the justifications for other statutes + regarding obscenity, we do not think they reach the + privacy of one's home. If the First Amendment means + anything, it means that a State has no business telling + a man, sitting alone in his own house, what books he may + read, or what films he may watch. Our whole + constitutional heritage rebels at the thought of giving + government the power to control men's minds.[FN296] + +Stanley has been interpreted as establishing a "zone of privacy" +about one's home.[FN297] Many computer information system users are +connected to the system by modem from their homes. Because of +this, any pornographic material they have stored on their home +computers is protected from government regulation.[FN298] However, +-------------------------- +[FN289] Id. at 24. +[FN290] Pope v. Illinois, 481 U.S. 497, 500 (1987) (citing Smith v. +United States, 431 U.S. 291 (1977)). +[FN291] Hamling v. United States, 418 U.S. 87 (1974). +[FN292] See, e.g., 413 U.S. 15; Kois v. Wisconsin, 408 U.S. 2219 +(1972). +[FN293] Stanley v. Georgia, 394 U.S. 557 (1969). +[FN294] Id. at 565. +[FN295] Id. +[FN296] Id. +[FN297] Jensen, supra note 7. +[FN298] Note that an exception would be made for child pornography, +see discussion supra part III.D. +====================================================================== +123 E-Law Copyright 1992-1993 by David Loundy + +connecting to a remote computer information system entails moving +obscene material in and out of this zone of privacy, and therefore +may not be insulated from state legislation.[FN299] Support for this +argument comes from U.S. v. Orito[FN300] which held that Congress has +the authority to prevent obscene material from entering the stream +of commerce, either by public or private carrier.[FN301] While a +person's disk drive on his or her computer is analogous to his or +her home library, connecting to a computer information system can +be seen as analogous to going out to a bookstore.[FN302] Stanley[FN303] +may protect a person's private library, but "[c]ommercial +exploitation of depictions, descriptions, or exhibitions of +obscene conduct on commercial premises open to the adult public +falls within a State's broad power to regulate commerce and +protect the public environment."[FN304] + + B. Indecent Speech + + Speech which is not considered obscene may qualify as +indecent. In F.C.C. v. Pacifica Foundation, Inc., the court held +that indecent speech is protected by the First Amendment, unlike +obscene and pornographic material, though it can still be +regulated where there is a sufficient governmental interest.[FN305] +Indecent language is that which "describes, in terms patently +offensive as measured by community standards ... sexual or +excretory activities and organs ..."[FN306] This language comes from +F.C.C. v. Pacifica Foundation, Inc.,[FN307] a broadcasting case which +upheld the channeling of indecent language into time periods when +it was not as likely that children would be in the audience. +Discussion of indecent speech will be continued in the analysis of +the different legal analogies that may apply to computer +information systems. +-------------------------- +[FN299] Jensen, supra note 7. +[FN300] U.S. v. Orito, 413 U.S. 139 (1973). +[FN301] Id. at 143. +[FN302] See Cubby, Inc. v. CompuServe, Inc., 776 F. Supp. 135 +(S.D.N.Y. 1991). +[FN303] 394 U.S. at 565. +[FN304] Paris Adult Theatre I v. Slaton, 413 U.S. 49, 68-69, reh'g +denied, 414 U.S. 881 (1973). +[FN305] 438 U.S. at 726. +[FN306] Id. at 732. +[FN307] Id. at 726-27. +====================================================================== +124 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + VI. Copyright Issues + + A. Basics of Copyrights + + Text, pictures, sounds, software Ñ all of these can be +distributed by computer information systems, and all can be +copyrighted. The Constitution guarantees Congress the power to +"promote the Progress of Science and Useful Arts, by securing for +limited Times to Authors and Inventors the exclusive right to +their respective Writings and Discoveries."[FN308] This power is +exercised in the form of the Copyright Act, Title 17 of the U.S. +Code.[FN309] Section 102 of the Copyright Act allows protection of +"original works of authorship fixed in any tangible medium of +expression, now known or later developed, from which they can be +perceived, reproduced, or otherwise communicated, either directly +or with the aid of a machine or device."[FN310] The statute lists +several types of works as illustrations of types of works which +qualify for copyright protection.[FN311] Relevant to computer +information systems, the list includes literary works; pictorial, +graphic, and sculptural works; motion pictures and other +audiovisual works; and sound recordings.[FN312] The "now known or +later developed" language allows expansion of copyright coverage +to meet any new means of expression, such as those available over +a computer information system.[FN313] In fact, the notes accompanying +this code section acknowledge that copyright protection applies to +a work "whether embodied in a physical object in written, printed, +photographic, sculptural, punched, magnetic, or any other stable +form."[FN314] The element of fixation is important in the copyright +statute; a work which is not fixed is not covered by the statute, +and any possible protection must come from local common law.[FN315] +This can lead to some strange results. A live concert cannot be +copyrighted under this statute, but if the performer records the +concert while he or she performs, the concert can then be +copyrighted.[FN316] For computer information systems, +-------------------------- +[FN308] U.S. CONST. art. I, ¤ 8, cl. 8. +[FN309] Copyright Act of 1947, 17 U.S.C. ¤ 101 (1947). +[FN310] Id. ¤ 102(a). +[FN311] Id. ¤ 101. +[FN312] Id. ¤ 102(a) Other categories include musical works, dramatic +works, pantomimes and choreographic works, and architectural works. Id. +[FN313] See ¤ 101 (Historical and Statutory Notes). +[FN314] Id. +[FN315] Id. +[FN316] Id. +====================================================================== +125 E-Law Copyright 1992-1993 by David Loundy + +this implies that conversations occurring over a computer or network +which are not stored on a disk[FN317] are unprotected by the Copyright +Act, but if any party to the conversation, or the system operator, +stores the messages, it is then possible to copyright some elements of +the conversation. + Copyright protection extends to works of authorship; it does +not extend to ideas, processes, concepts, inventions and the +like.[FN318] Distinguishing between works of authorship and processes +can at times result in some subtle distinctions. An example of +this is computer typefaces, or fonts (which can often be found +available for downloading on file servers or bulletin board +systems). There are two major kinds of type faces, bit-mapped and +postscript. Bit-mapped fonts are composed of data describing where +points are drawn in order to make out the shape of the letter.[FN319] +Postscript fonts, on the other hand, consist of a computer program +which describes the outline of the letter.[FN320] Digital typefaces +are not considered copyrightable, because they are seen as just a +copy of the underlying letter design, a process for drawing a +representation of a letter, and thus bit-mapped fonts are not +copyrightable.[FN321] Postscript fonts are seen as computer programsÑ +the program is a work of authorship, it just so happens to draw +letters, and they have been held to be copyrightable.[FN322] + The Copyright Act gives the copyright holder exclusive rights +to his or her works.[FN323] This allows the author to reproduce, +perform, display, or create derivative works as he or she pleases, +and to do so to the exclusion of all others.[FN324] This means a +computer information system can distribute only material that is +either not copyrighted, or for which the SYSOP has permission to +copy. This presents no problem for material the system operator +acquires personally, but two problems exist regarding material +that users +-------------------------- +[FN317] Data which is not stored on a disk is kept in a computer's +"RAM" (Random Access Memory). RAM is a volatile information store +where the computer keeps the information it is actively +processing. When the computer is turned off, all of this data is +lost; thus, anything stored in RAM is missing the required element +of "fixation." +[FN318] Id. ¤ 102(b). +[FN319] See Charles Von Simon, Page Turns in Copyright Law with Adobe +Typeface Ruling, COMPUTERWORLD, Feb. 5, 1990, at 120. +[FN320] Id. +[FN321] See Adobe Successfully Registers Copyright Claim for Font +Program, COMPUTER LAWYER, Feb. 1990, at 26. +[FN322] Von Simon, supra note 319. +[FN323] Copyright Act of 1947, 17 U.S.C. ¤ 106 (1947). +[FN324] Id. +====================================================================== +126 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +upload to the computer system. First, even if the SYSOP +sees that the material a user has uploaded is copyrighted, how is +the SYSOP to know that permission has not been granted by the +copyright holder? Second, copyright notices can be removed by the +person posting copyrighted material, in which case the SYSOP may +have no way to know if the data is copyrighted. A SYSOP cannot +just ignore a suspicion that a work is copyrighted, because such +an act could lead to the conclusion that the SYSOP was a +participant in the copyright infringement by allowing the computer +file to be distributed on his or her system.[FN325] There is no +intent or knowledge requirement to find a copyright violation. +Copyright infringement is a strict liability crime. When a work is +copied, even if the person making the copy does not know or have +reason to know, that the work is copyrighted, an infringement may +still be found.[FN326] Even subconscious copying has been held to be +an infringement.[FN327] + One protection the Copyright Act gives to a computer +information system is a compilation copyright. A compilationn +copyright gives the SYSOP a copyright on the data contained in the +computer information system as a whole.[FN328] This does not give the +SYSOP a copyright to the individual copyrighted elements carried +on the system, but it does allow a copyright for the way the +material is organized.[FN329] An example of this would be the +electronic journal composed from articles submitted by users. The +compiler of the journal would not own a copyright to the +individual articles, but he or she would own a copyright in those +elements which are original to the compiler, for example, to the +arrangement of the articles which makes up the periodical as a +whole.[FN330] A bulletin board system could presumably also copyright +its entire message base. + As mentioned, the Copyright Act gives an author the exclusive +rights to make copies of his or her works, as well as create +derivative works.[FN331] This includes copies in computer readable +form.[FN332] Thus, scanned pictures, digitized sounds, machine +readable texts, +-------------------------- +[FN325] See Screen Gems-Columbia Music, Inc. v. Mark-Fi Records, Inc., +256 F. Supp. 399 (S.D.N.Y. 1966). +[FN326] De Acosta v. Brown, 146 F.2d 408 (2d Cir. 1944). +[FN327] Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F. +Supp. 177 (S.D.N.Y. 1976). +[FN328] 17 U.S.C. ¤ 103. +[FN329] Id. +[FN330] Feist Publications, Inc. v. Rural Tel. Serv. Co., Inc., 111 +S.Ct. 1282 (1991). +[FN331] 17 U.S.C. ¤ 106. +[FN332] 17 U.S.C. ¤ 101. +====================================================================== +127 E-Law Copyright 1992-1993 by David Loundy + +and computer programs are all subject to an +author's copyright. Any attempt to turn original material into one +of these computer-readable forms without the author's permission +(and unless the copy falls under one of the exceptions in sections +107-120) is a violation of the author's copyright. + With decreasing costs of data storage, and increasing access +to computer networks, comes an increase in the number of computer +archives. These computer archives store various types of data +which can be searched by the archive user. The archive site can be +searched, and the information can be copied by anyone with +sufficient access to the archive. This ease with which information +can be accessed and duplicated has some profound copyright +implications. I will use as an example a "lyric server," an +archive that stores lyrics to songs by assorted artists. Other +types of information that can be distributed will be discussed +shortly. + In my lyric server example, if someone is sitting down with +an album jacket and typing the lyrics into the computer for +distribution in the archive, the translation of the lyrics from +the album jacket to a computer text file constitutes an +unauthorized copy. Similarly, if someone else types in the file +and a System Operator then puts the file into the archive for +distribution, the SYSOP has violated the author's right to make +and distribute copies of his or her work.[FN333] + Once the file is in the archive for distribution, every time +the information is copied, there may be a copyright violation. +There is a difference here between copying and viewing. As +mentioned, the Copyright Act protects against unauthorized copying +of a work. The Act defines a copy as a fixation "from which the +work can be perceived, reproduced, or otherwise communicated, +either directly or with the aid of a machine or device."[FN334] Thus, +if someone connects to the computer information system and just +peruses the archive, if the information is not "downloaded," +"screen captured," or otherwise recorded on computer disk, tape, +or printout, then no fixation is made and thus, no copy. However, +while the archive user may not be making a copy, if the archive is +publicly accessible viewing some types of files may constitute a +public performance or display[FN335] of the copyrighted work, which +are also protected rights.[FN336] +-------------------------- +[FN333] 17 U.S.C. ¤¤ 106(1), (3). +[FN334] 17 U.S.C. ¤ 101 +[FN335] Id. +[FN336] 17 U.S.C. ¤ 106 +====================================================================== +128 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + Whether the unauthorized archiving of a copyrighted work or +whether further copying of a protected work by the archive user +constitutes a violation of section 106 of the Copyright Act is +also determined by whether the copying falls under one of the +Act's exceptions. The two relevant exceptions are the "fair use" +provision[FN337] and the "reproduction by libraries and archives" +provision.[FN338] + + [F]air use was traditionally a means of promoting educational + and critical uses. Fair use, then, is an exception to the + general rule that the public's interest in a large body of + intellectual products coincides with the author's interest in + exclusive control of his work, and it is decided in each case + as a matter of equity ... ."[FN339] + +The fair use provision contains a list of uses that are presumed +to be acceptable uses of copyrighted works, and a list of four +factors that must be taken into account to determine if the use +constitutes a fair use of the work. The list includes use for +criticism, comment, news reporting, teaching, scholarship, or +research.[FN340] This list may provide some guidance as to what +constitutes legal use for the user of a computer information +system, but not for the provider of the archive. The archive user +may be safe in copying song lyrics from the lyric server if he or +she is using the lyrics for the purpose of commentary, for +example, but the SYSOP who provides the service may not have the +same defense. + The four factors to be applied in deciding whether the use of +a copyrighted work in each case constitutes fair use are: + + (1) the purpose and character of the use, including + whether such use is of commercial nature or is for + nonprofit purposes: + (2) the nature of the copyrighted work; + (3) the amount and substantiality of the portion used + in relation to the copyrighted work as a whole; and + (4) the effect of the use upon the potential market + for or the value of the copyrighted work.[FN341] + +Applying these factors to the System Operator's liability for a lyric +server, the character of the use depends on whether access to the +-------------------------- +[FN337] 17 U.S.C. ¤ 107. +[FN338] 17 U.S.C. ¤ 108. +[FN339] Bruce J. McGiverin, Note, Digital Sound Sampling, Copyright +and Publicity: Protecting Against the Electronic Appropriation of +Sounds, 87 COLUM. L. REV. 1723, 1736 (1987) (citations omitted). +[FN340] 17 U.S.C. ¤ 107. +[FN341] Id. +====================================================================== +129 E-Law Copyright 1992-1993 by David Loundy + +lyrics is available for free, or as a profit making +venture. The nature of the work is song lyrics, likely intended +for commercial sale. The amount used, is the entire lyrics to each +copyrighted song.[FN342] A use of the copyrighted work which makes +the original obsolete will obviously be more likely to be found an +unfair use than a use which brings more notoriety to the original. +And finally, placing copyrighted lyrics on a publicly accessible +computer information system may have a profound impact on the +potential market for the computerized distribution of lyrics, +depending upon the potential number of users of the lyric server. + The other possible exception to the copyright holder's +exclusive rights is section 108 which deals with copying by +libraries and archives.[FN343] Unlike the section 107 fair use +provision, which in this case is more aimed at the end user, +section 108 is aimed more at the information provider. Section 108 +allows the archive itself to reproduce or distribute no more than +one copy or phonorecord of a work, and as long as the archive is +available to the public or to researchers not affiliated with the +library or archive, the archive does not get direct or indirect +profit from making or distributing the copy, and the copy contains +a notice of copyright.[FN344] It is reasonable to argue that when the +user requests a host computer to send a text file containing the +lyrics to a specific song, the archive is making this type of +copy. Section 108 allows the user to request copies of "no more +than one article or other contribution to a copyrighted collection +or periodical issue, or ... a small part of any other copyrighted +work"[FN345] as long as the copy becomes the property of the user, +the archive has no notice that the copy is to be used for anything +other than study, scholarship, or research, and as long as the +archive displays prominently "at the place where orders are +accepted, and includes on its order form, a warning of copyright +in accordance with requirements that the Register of Copyrights +shall prescribe by regulation."[FN346] This requirement of the +posting of copyright notice would clearly apply to the lyric +server, just as it does to a library photocopier. Even if a +passive computer system is held to be more like a self-serve +copier, and the SYSOP +-------------------------- +[FN342] While the use of the entire song's lyrics weighs heavily +against the use being a fair use,, the Supreme Court has held that +use of the entire work can be a fair use. See Sony Corp. of Am. v. +Universal City Studios, Inc., 464 U.S. 417 (1984). +[FN343] 17 U.S.C. ¤ 108. +[FN344] 17 U.S.C. ¤ 108(a). +[FN345] 17 U.S.C. ¤ 108(d). +[FN346] Id. +====================================================================== +130 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +plays no part in the copying by the user, if +the archive is made available so that copying may occur, the +system operator is still subject to a copyright infringement claim +if the "reproducing equipment" does not bear a notice that any +copies made may be subject to copyright law.[FN347] + To summarize with the lyric server example, while a system +operator may not be liable for the use to which users put any +copyrighted text they copy off of the computer information system, +the SYSOP still must be wary of some obstacles. Copyright notice +must be provided, and, specifically, the notice that is prescribed +by the Register of Copyrights may require that each file have its +own copyright notice. Access to the archive must be fairly open. +The archive must not directly or indirectly profit from +distributing the copyrighted works. Potentially the biggest hurdle +is that care must be taken in assembling the archive so that any +materials that need to be converted into a computer-readable form +are converted without violating the author's section 106 rights.[FN348] + + B. Copyrighted Text + + Copyrighted text can appear on computer information systems +as either files in a file server or database; or it can appear in +an E-mail message or post on a BBS; or it can be worked into an E- +journal. The most obvious place to find copyrighted text is on +information systems such as LEXIS/NEXIS, WESTLAW and Dialog. +Textual material, such as electronically stored journals, gets a +fairly straightforward copyright analysis; the hardest job for a +SYSOP may be discovering what text is copyrighted. Once infringing +text is discovered, the SYSOP must remove it, or risk being held +as a conspirator in the copyright infringement.[FN349] + + C. Copyrighted Software + + Bulletin board systems, network file servers, and main-frame +computers that use FTP (File Transfer Protocol) all offer the +opportunity to copy software. The Software Publisher's Association +(SPA) offers the opportunity to be on the receiving end of a +-------------------------- +[FN347] 17 U.S.C. ¤ 108(f)(1). +[FN348] See 17 U.S.C. ¤ 106. +[FN349] See Screen Gems-Columbia Music, Inc. v. Mark-Fi Records, Inc., +256 F. Supp. 523 (S.D.N.Y. 1966). +====================================================================== +131 E-Law Copyright 1992-1993 by David Loundy + +lawsuit if any of that copied software is copyrighted.[FN350] The SPA +is a group established by a number of software publishers in order +to cut down on software piracy.[FN351] The SPA monitors bulletin +board systems for distribution of copyrighted software.[FN352] They +warn SYSOPs that they will be monitored, giving the SYSOP the +opportunity to remove any software he or she does not have the +right to distribute.[FN353] The SPA also examines office computers +for unlicensed software.[FN354] + Violators are asked to remove illegally held software, +purchase legally licensed copies, and pay a fine equal to the +amount of the purchase price of the software package.[FN355] +Compliance with the SPA requirements saves the offender the +additional cost of a lawsuit.[FN356] Noncompliance will result in a +lawsuit filed by the SPA.[FN357] + As mentioned, not all copying of copyrighted software is +illegal. Two exceptions are worth noting. One is for the making of +backup copies. The Copyright Act allows a copy of legally licensed +software to be made if such a copy is needed to use the +software.[FN358] The Act also allows a copy to be made for archival +purposes, as long as the copy is destroyed "in the event that +continued possession of the computer program should cease to be +rightful."[FN359] The other exception is shareware. Shareware is a +popular method of software publishing which allows a software +programmer to distribute his or her work without all of the +marketing costs, often via a computer information system.[FN360] A +user can call up a BBS, download software, and try it out for a +while. If the user likes the software, he or she sends the +programmer a shareware fee. The difference between shareware and +public domain software is that public-domain software is freely +distributed with the consent of the copyright owner, while +shareware is not distributed without restriction Ñ use of +shareware beyond a reasonable trial period (often specified in the +documentation distributed with the +-------------------------- +[FN350] Janet Mason, Crackdown on Software Pirates; Industry Watchdogs +Renew Efforts to Curb Illegal Copying, COMPUTERWORLD, Feb. 5, 1990, +at 107. +[FN351] Id. +[FN352] Id. +[FN353] Id. +[FN354] Id. +[FN355] Id. +[FN356] Id. +[FN357] Id. +[FN358] 17 U.S.C. ¤ 117(1). +[FN359] Id. ¤ 117(2). +[FN360] Steve Givens, Sharing Shareware: Non-Traditional Marketing +Relies on Honor System, ST. LOUIS BUS. J., July 1, 1991, ¤ 2 at 1B. +====================================================================== +132 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +software) without payment of +the shareware fee is a violation of copyright law.[FN361] + + D. Copyrighted Pictures + + As mentioned earlier,[FN362] pictures can be scanned into a +computer and stored. Pictures can also be drawn directly on a +computer by means of graphics software. A hybrid of the two is +also possible Ñ pictures can be scanned, and once scanned, they +can be further altered with image processing software.[FN363] All of +these forms are covered by the Copyright Act.[FN364] Pictures created +on the computer using graphics or "paint box" software are in an +original copyrightable form.[FN365] Images that are scanned are in +violation of the original copyright holder's rights, unless +permission to distribute the scanned image has been obtained.[FN366] +In fact, even the unauthorized initial scan made of a copyrighted +work is in violation of the copyright, even without further +distribution.[FN367] As one author said, "[t]he law is quite +straightforward; a copy is a copy, period. There is no wording +that differentiates among images produced by scanners, by +photocopiers, or by crocheting them into toilet seat covers."[FN368] +Images which are scanned that are not copyrighted, such as works +on which the copyright has already expired,[FN369] do not violate the +Copyright Act, and, if sufficient creativity is contributed in the +scanning process, the images may be eligible for copyright +protection in their own right.[FN370] If a scan of a copyrighted +picture is then altered into a new image, the modified version +likely still falls +-------------------------- +[FN361] Id. +[FN362] See supra text accompanying notes 114-16. +[FN363] Legal aspects of the doctoring of photographs are beyond the +scope of this paper Ñ for a good discussion of such issues, see +Benjamin Seecof, Scanning into the Future of Copyrightable Images: +Computer-Based Image Processing Poses a Present Threat, 5 HIGH +TECH. L.J. 371 (1990). +[FN364] 17 U.S.C. ¤ 102(a)(5). +[FN365] Id. ¤ 102(a). +[FN366] Id. ¤ 101 (defining a copy); id. ¤ 106 (Section 106 gives the +copyright holder exclusive rights to make copies and derivative +works of his or her creation.). +[FN367] Id. ¤ 101. +[FN368] Ezra Shapiro, More on Copyright; Digitizing of Copyrighted +Images, MACWEEK, Oct. 11, 1988, at 27. +[FN369] 17 U.S.C. ¤ 302 (applying to works created after Jan. 1, 1978, +provides that a copyright shall expire 50 years after the death of +the author of the work). +[FN370] See, e.g., Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. +53 (1984) (holding that photographs are copyrightable by virtue of +the creativity that goes into arranging the subject elements and +photographic variables into a distinct picture). +====================================================================== +133 E-Law Copyright 1992-1993 by David Loundy + +under the original copyright.[FN371] It therefore +enjoys no protection on its own, and copyright release must be +obtained from the holder of the copyright in order to distribute +the image (or to modify it in the first place).[FN372] + Once again, one of the most difficult tasks for a system +operator is determining which images are copyrighted. The +Copyright Act provides an author with the right to have his or her +name associated with his or her own work, as well as the right to +have his or her name disassociated with a mutilation of his or her +work, (along with the right to prevent such mutilations in the +first place).[FN373] Based on these rights, a SYSOP should be +especially careful of images which appear to be doctored. Many of +the larger computer information services settle the dilemma over +establishing copyright status by allowing the images under the +assumption that no one will mistake a scanned copy for an +original, and that therefore no one is being hurt.[FN374] This +argument has no basis in the law of copyrights. The Copyright Act +gives the author the right to make copies of his or her work, and +this includes bad copies.[FN375] Also, the claim that no damage is +being done is an unreasonably narrow view. The copyright holder, +and not the public, is allowed exclusive control of the channels +through which his or her work reaches the market.[FN376] + Computerized images present a whole new market for an +artist's work, and widespread, unauthorized distribution can +destroy the potential to disseminate the work in the computer +market Ñ a right clearly given to the author of the work. Some +computer information services also defend the possibility that +some of their stored images are provided on the basis of the "fair +use"[FN377] +-------------------------- +[FN371] 17 U.S.C. ¤ 106; see Gracen v. Bradford Exch., 698 F. 2d. 300, +(7th Cir. 1983); cf. Copyright Registration for Colorized Versions +of Black and White Motion Pictures, 37 C.F.R. 202 (1987). +[FN372] Id. ¤ 106A. +[FN373] Id. +[FN374] Ezra Shapiro, Copywrongs on Consumer Info Networks? Posting of +Scanned Images on Electronic Services Infringes Copyrights, +MACWEEK, Aug. 30, 1988, at 20. +[FN375] 17 U.S.C. ¤ 106. +[FN376] Franklin Mint Corp. v. National Wildlife Art Exch., 575 F.2d +62 (3d Cir. 1978); see also Zaccini v. Scripps-Howard Broadcasting +Co., 433 U.S. 562 (1977) (involved TV station covering the +plaintiff's entire act (human cannonball), depriving the plaintiff +of a chance to sell tickets to the television viewers, since they +had already seen his act). +[FN377] 17 U.S.C. ¤ 107. +====================================================================== +134 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +exception.[FN378] Relying on fair use is also not a very +realistic position to take. One artist found some of his work +scanned and available on a BBS, only after he was told of its +presence by a friend. The artist's name and copyright notice had +been cropped off. By the time the artist protested, 240 people had +downloaded his images.[FN379] Such wide infringement into a +potentially new market for the artist is not likely to be found by +a court to constitute "fair" use. For a SYSOP to be free from +liability, the only thing he or she can do is to make sure the +image is either not protected by copyright, or that the use of the +image has been approved by the copyright holder. + The above analysis applies to sampled sounds, as well as +images, stored in a computer information system; though for sounds +it is even more difficult to determine what material is being +distributed in violation of the copyright laws. In addition, if +there is a false attribution as to the origin of the work and an +element of unfairness or deception, unauthorized use of +copyrighted material on a computer information system may +constitute the tort of unfair competition.[FN380] Unauthorized use +where "a plaintiff believes that the defendant, at little or no +cost, has appropriated what the plaintiff considers the +plaintiff's own commercially valuable property" may constitute a +subset of unfair competition-misappropriation.[FN381] + + VII. Liability for Computer Information System Content + + In order to determine who is liable for illegal activity of +the kind so far discussed, it is necessary to know how computer +information systems are viewed by the law. Computer information +systems may be seen by the law as analogous to one of the other +communications media, such as newspapers or common carriers, or +they may be seen as unique media. Specific legislation geared +towards the computer media has already been discussed. However, +the law still leaves some issues unresolved. To resolve such +issues, it is necessary to understand how other media are +regulated, and how computer information systems are similar to or +different from those media. +-------------------------- +[FN378] Shapiro, supra note 374. +[FN379] Liz Horton, Electronic Ethics of Photography; Use of Images in +Desktop Publishing, FOLIO: THE MAG. FOR MAG. MGMT., Jan. 1990, at 71. +[FN380] Thomas C. Moglovkin, Note, Original Digital: No More Free +Samples, 64 S. CAL. L. REV. 135, 163 (1990). +[FN381] Id. at 165. +====================================================================== +135 E-Law Copyright 1992-1993 by David Loundy + + In all cases where the law would hold a party guilty for +actions carried out on a computer information system, this paper +assumes that the SYSOP is liable if he or she is the initial cause +of that violation because the law, by its terms, would clearly +apply to the system operator. The primary question at issue here +is the extent of a SYSOP's liability for illegal conduct conducted +by the users of the computer information system. + + A. Information System as Press + + Many services on a computer information system are similar to +those of print publishers. Just as there are magazines and +newspapers, there are electronic periodicals. Just as there are +street corner pamphleteers, so are there E-mail activists. Just as +First Amendment privileges apply to the print media, so, one can +argue, they should apply to the electronic press. Often the only +practical difference between print media and electronic media is +paper. In fact, with electronic word processing and page layout +programs used by most print publishers, even printed periodicals +at one stage exist in the same form as electronic journals do when +they are published. + Even bulletin board operators sometimes see themselves as +being analogous to print publishers. Prodigy is an example of a +service that sees itself as a publisher. In fact, Prodigy refers +to the people who screen messages posted in their conferences as +"editors" and not censors, and Prodigy claims all of them have +journalism backgrounds.[FN382] Both Prodigy and the local newspaper +take "articles" by "authors" and "publish" them in their +respective media for the consumption of their "subscribers." + There are two types of publishers, primary and secondary. A +primary publisher is presumed to play a part in the creative +process of creating the message which is then disseminated.[FN383] +Primary publishers are what one generally thinks of when thinking +of publishers. Prodigy claims to be such a publisher. While the +Constitution provides some protection to the editor's judgment as +to what to print,[FN384] the protection is not complete. All of the +restrictions on content discussed earlier apply to publishers +Ñadvocacy of lawless +-------------------------- +[FN382] Mitchell Kapor, A Day in the Life of Prodigy, EFFECTOR ONLINE, +available over Internet, by anonymous FTP, at FTP.EFF.ORG +(Electronic Frontier Foundation) (Vol. 1, No. 5). +[FN383] Robert Charles, Computer Bulletin Boards and Defamation: Who +Should be Liable? Under What Standard?, 2 J.L. & TECH 121, 131 (1987). +[FN384] U.S. CONST. amend. I. +====================================================================== +136 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +action, child pornography, obscenity, +defamation, etc. The SYSOP, as an electronic publisher, shares the +same liability as a print publisher would, for example, the New +York Times[FN385] "actual malice" standard for defamation, and a +"knowing" standard as required by the statutes forbidding the +transportation of material involved in child pornography.[FN386] The +publisher is generally held to know what is being published +because he or she has editorial control over the material that is +published. + The question then becomes, is knowledge enough to result in +liability? This is determined by the actual crime with which the +publisher is charged. Defamation generally requires the publisher +to have published the defamation with "knowing or reckless +disregard for the truth."[FN387] For a SYSOP, at least a "know or +have reason to know" standard would be necessary. A publisher +generally knows he or she is publishing, as well as what is being +published. A SYSOP for a large computer information system with a +lot of users may not be able to keep track of all of the +electronic journals and messages on bulletin boards which are +being run on his or her system. While a SYSOP may have the same +editorial control that a print publisher has, the sheer size may +effectively prohibit actual editorial control over what is being +published over the computer system. For this reason, it would be +unfair to hold a SYSOP to a standard that requires less than a +"knowing or reason to know" standard. An argument for this minimum +requirement is supported by some cases, for example, those which +do not allow the publisher to be held liable for everything in his +or her periodical, such as the safety of products sold by their +advertisers.[FN388] As the court in Yuhas v. Mudge held, + + [t]o impose the [duty to check the truth of the claims + of all of their advertisers] upon publishers of + nationally circulated magazines, newspapers and other + publications would not only be impractical and + unrealistic, but would have a staggering adverse effect + on the commercial world and our economic system. For the + law to permit such exposure to those in the publishing + business ... would open the doors to "liability in an + indeterminate amount for an indeterminate time, to an + indeterminate class."[FN389] +-------------------------- +[FN385] New York Times v. United States, 403 U.S. 713 (1971). +[FN386] 18 U.S.C. ¤ 2252. +[FN387] 403 U.S. at 713. +[FN388] See, e.g., Yuhas v. Mudge, 322 A.2d 824, 825 (N.J. Super. Ct. +App. Div. 1974). +[FN389] Id. +====================================================================== +137 E-Law Copyright 1992-1993 by David Loundy + +Operators of large systems are quick to support the view that the +job of monitoring every communication on their systems would be a +prohibitively large task.[FN390] If a "know or have reason to know" +standard were applied to computer information systems, offending +material reported to a SYSOP would have to be dealt with under +threat of liability. Also, any offending material discovered by +the SYSOP would need to be removed. A SYSOP also could not avoid +monitoring for improper content, knowing such content is present, +and then later claim ignorance. However, holding a SYSOP +responsible even for material that he or she did not know was on +the computer system would require a much larger time commitment on +the part of the SYSOP or the hiring of staff to supervise the +activities taking place on the computer system. Most small +hobbyists running bulletin board systems would not be able to +support this additional commitment and would be forced to cease +operating out of fear of liability. Larger commercial services +would have to either increase costs to the users or decide that +providing some services are no longer worth the expense. The net +result would be a contracting of the number of outlets for free +expression by means of computer. By requiring at least a "reason +to know" standard, a balance can be struck Ñ the service can be +provided, but a SYSOP could not hide his or her head in the sand +to avoid liability. Any problem brought to the SYSOP's attention +would have to be addressed; any problem the SYSOP discovered would +also need to be taken care of; and any problem likely to be +present could not be ignored by the SYSOP. + A secondary publisher is someone who is involved in the +publication process, such as a press operator, mail carrier, or +radio and television engineer, who usually does not know when a +statement he or she transmits is defamatory and is usually not in +a position to prevent the harm Ñ a secondary publisher generally +has no control over the content of the message, unlike a primary +publisher.[FN391] Unless the secondary publishers know or have reason +to know of the defamatory nature of the material they are +transmitting, they are free from liability for defamation.[FN392] +Secondary publishers are often treated synonymously with +republishers which are discussed in the next section. +-------------------------- +[FN390] Information Policy, Computer Communications Networks Face +Identity Crisis over Their Legal Status, DAILY REP. FOR EXECUTIVES, +Feb. 26, 1991, at A-6. +[FN391] Joseph P. Thornton, et al., Symposium: Legal Issues in +Electronic Publishing: 5. Libel, 36 FED. COM. L.J. 178, 179 (1984). +[FN392] See RESTATEMENT (SECOND) OF TORTS ¤ 581 (1989). +====================================================================== +138 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + B. Information System as Republisher/Disseminator + + A republisher, or disseminator, is defined as "someone who +circulates, sells, or otherwise deals in the physical embodiment +of the published material."[FN393] Some computer information systems +are like republishers because all they do is make available files, +just like a book seller or library makes texts available. A +librarian cannot be expected to read every book in the library, +just as the system operator of a service may not be able to read +every text file stored on the computer system. File servers and +data bases can be large enough to store complete texts of books +and periodicals, as users of services such as WESTLAW and +LEXIS/NEXIS are well aware. Computer information systems can also +contain massive quantities of software, E-mail and electronic +journals, all stored ready for users to peruse like a library +book. One of the characteristics of secondary publishers; is that +they are "presumed, by definition, to be ignorant of the +defamatory nature of the matter published or to be unable to +modify the defamatory message in order to prevent the harm."[FN394] + The case that first established the immunity from liability +for distributors, breaking the common law tradition, was Smith v. +California.[FN395] Smith involved a bookseller who was convicted of +violating a statute that made it illegal to deal in obscene +materials. The lower court held violators of the statute strictly +liable. However, the court held that a law which holds a +bookseller strictly liable for the contents of the books he or she +sells is unconstitutional. Justice Brennan stated his reasons as +follows: + + For if the bookseller is criminally liable without knowledge + of the contents ... he will tend to restrict the books he + sells to the ones he has inspected; and thus the State will + have imposed a restriction upon the distribution of + constitutionally protected as well as obscene literature. It + has been well observed of a statute construed as dispensing + with any requirement of scienter that: "Every bookseller + would be placed under an obligation to make himself aware of + the contents of every book in his shop. It would be + unreasonable to demand so near an approach to omniscience." + And the bookseller's burden would become the public's burden + ... . The bookseller's limitation in the amount of reading + material with which he could familiarize himself, and his + timidity in the face of absolute criminal +-------------------------- +[FN393] Jensen, supra note 7, at 3. +[FN394] Charles, supra note 383, at 131. +[FN395] Smith v. California, 361 U.S. 147 (1959), reh'g denied, 361 +U.S. 950 (1960). +====================================================================== +139 E-Law Copyright 1992-1993 by David Loundy + + liability, thus + would tend to restrict the public's access to forms of the + printed word which the State could not constitutionally + suppress directly.[FN396] + +While this case did not determine the degree of liability +appropriate for a bookseller, it did find that strict liability +was too restrictive.[FN397] Later courts, however, were willing to +set a minimum standard of liability, and that standard was set to +a "know or have reason to know" standard.[FN398] In addition, +secondary publishers are not required to investigate the contents +of the messages they are delivering in order to avoid +liability.[FN399] + Recently, a court has applied the Smith[FN400] analysis to +computer information systems. Cubby, Inc. v. CompuServe, Inc.[FN401] +is a major decision supporting the analogy of the computer +information system as a republisher or disseminator of media. +CompuServe was one of the first public computer information +systems, founded in 1969 as a time-sharing system by H&R Block in +order to make use of some of its surplus computer facilities.[FN402] +CompuServe is now so large that it contracts out its editorial +control of various discussion groups to other companies, who +maintain the forum in accordance with CompuServe's general +guidelines.[FN403] The groups maintaining the forums are similar to +print publishers Ñ they take articles submitted by users and then +publish them, exerting editorial control over the material where +necessary. CompuServe works, in essence, like an electronic book +store. CompuServe sells to its users the materials that the +discussion groups publish. In Cubby, one of the forums uploaded +and made available an on-line publication which defamed the +plaintiff.[FN404] CompuServe had no opportunity to review the +periodical's contents before it was made available to CompuServe's +subscribers.[FN405] District Judge Leisure held that, since +CompuServe had no editorial control over the periodical, and +CompuServe did not know or have reason to know of the defamation +-------------------------- +[FN396] Id. at 153 (citation omitted). +[FN397] Id. at 155. +[FN398] Seton v. American News Co., 133 F. Supp. 591 (N.D. Fla. 1955); +cf. Manual Enters., Inc. v. Day, 370 U.S. 478 (1962). +[FN399] 133 F. Supp. at 593. +[FN400] 361 U.S. at 950. +[FN401] 776 F. Supp. at 135. +[FN402] Clifford Carlsen, Wide Area Bulletin Boards Emerge as Method +of Corporate Communications, SAN FRANCISCO BUS. TIMES, Mar. 15, 1991, +at 15. +[FN403] 776 F. Supp. at 137. +[FN404] Id. at 138. +[FN405] Id. +====================================================================== +140 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +contained in the periodical, CompuServe was in essence "an +electronic, for-profit library."[FN406] Like a bookstore or library, +CompuServe had the option to carry or not to carry the periodical, +but once the decision was made CompuServe had no editorial control +over the periodical. The court recognized the function of +technology and admitted that a computer database is the functional +equivalent to a news distributor or a public library, and +therefore, so as not to impede the flow of information, the same +"know or have reason to know" standard should apply.[FN407] + This holding has a number of profound implications for the +law governing computer information systems. First, it establishes +a clear determination of SYSOP liability: where the SYSOP does not +exert editorial control, and does not know or have reason to know +of the dissemination of offensive material, he or she cannot be +held liable. This also implies that once a SYSOP is made aware, or +has reason to believe, that the computer system is being used for +illegal purposes, he or she is obligated to remedy the situation +under penalty of liability. It also implies that a SYSOP can +reduce potential liability by avoiding awareness of message +content on his or her system, limited by the "reason to know" +element Ñ a SYSOP could not, however, escape liability by sticking +his or her head in the sand while knowing that the computer +information system was likely being used for illicit purposes. The +scope of this holding is arguably broad, especially since the +court relied on an obscenity case to determine a defamation issue. +This means that the same standard may now apply in both defamation +and obscenity cases involving computer systems whose operators do +not exert editorial control.[FN408] + + C. Information System as Common Carrier + + Network transmissions, E-mail, and some other features of a +computer information systems such as "chat" features all work in a +way similar to a common carrier. A common carrier is a service +that: + + is [of] a quasi-public character, which arises out of the + undertaking +-------------------------- +[FN406] Id. at 140. +[FN407] Id. +[FN408] The Compuserve Case: A Step Forward in First Amendment +Protection for Online Services, EFFECTOR ONLINE, Jan. 7, 1992, +available over Internet, by anonymous FTP, at FTP.EFF.ORG +(Electronic Frontier Foundation) (Vol. 2, No. 3). +====================================================================== +141 E-Law Copyright 1992-1993 by David Loundy + + "to carry for all people indifferently + ... ." This does not mean that the particular services + offered must practically be available to the entire + public; a specialized carrier whose service is of + possible use to only a fraction of the population may + nonetheless be a common carrier if he [or she] holds + himself [or herself] out to serve indifferently all + potential users.[FN409] + +Importantly, a computer information system need not be classified +according to only one communications analogy Ñ a system can act at +times like a publisher, and at times like a common carrier. A +service is defined as a common carrier when it acts as such based +on the way it conducts its activities.[FN410] + Common carriers have generally been considered secondary +publishers,[FN411] and as such, have traditionally functioned under a +reduced standard of liability.[FN412] That standard is, once again, a +"know or have reason to know" standard of liability.[FN413] This +standard has been widely adopted and applied to the electronic +communications media: from telegraph,[FN414] to telephone,[FN415] and +even to options such as telephone answering services.[FN416] There +are a number of reasons for applying a knowing standard to a +common carrier. + One reason is efficiency; service providers would not be able +to do their job transmitting as well if they also had to monitor +content.[FN417] Another reason is fairness; common carrier operators +are not trained in what is libelous and what is not, and, even if +they were, they would have to make many decisions at a quick rate +Ñ not a fair burden to place on the common carrier.[FN418] And a +third reason is privacy; by removing a need for common carriers to +monitor content of transmissions, the likelihood is increased that +transmissions will be held private. A "know or have reason to +know" standard makes a lot of sense for computer networks, as all +of the above interests would be served by regulating a network as a +-------------------------- +[FN409] National Ass'n of Regulatory Util. Comm'rs v. F.C.C., 533 F.2d +601, 608 (1976). +[FN410] Id. at 608. +[FN411] E.g., Von Meysenbug v. Western Union Tel. Co., 54 F. Supp 100 +(S.D. Fla. 1944); Mason v. Western Union Tel. Co., 52 Cal. App. 3d +429, (1975). +[FN412] RESTATEMENT (SECOND) OF TORTS ¤ 612 (1989). +[FN413] Id. ¤ 581. +[FN414] 54 F. Supp at 100; Western Union Tel. Co. v. Lesesne, 182 F.2d +135 (4th Cir. 1950); O'Brien v. Western Union Tel. Co., 113 F.2d +539 (1st Cir. 1940). +[FN415] Anderson v. New York Tel. Co., 320 N.E.2d 647 (N.Y. 1974). +[FN416] People v. Lauria, 251 Cal. App. 2d 471 (1967). +[FN417] Charles, supra note 383, at 143. +[FN418] Id. at 123. +====================================================================== +142 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +common carrier. + Like a common carrier, computer networks carry data from one +computer to another with no regard for the information being +transferred. Data that is transferred over a computer network +often consists of electronic mail being forwarded from an account +on a sending machine to an account on a receiving machine. Network +traffic may also contain confidential documents being passed from +computer to computer. Support for a "knowing" standard is gained +from the Electronic Communications Privacy Act of 1986[FN419] which +statutorily applies this standard to the interception and use of +intercepted E-mail and network communications. For a SYSOP to be +liable for a user's illegal use of the system, the SYSOP would +have to know or guess that the illegal use was going on, and he or +she would then be under an obligation to prevent such a use. + It is worth mentioning at this point that not all +communications over a common carrier are unregulated. There are +some uses of electronic common carriers which are forbidden: an +example is obscenity by phone. A recent issue with the growth of +900 telephone numbers has been "dial-a-porn," where people can +call a number and hear sexually oriented messages. The use of a +telephone to convey obscene, indecent, or harassing messages is +outlawed.[FN420] An exception is made for indecent telephone +messages, so long as provisions are used to prevent minors from +receiving these indecent messages.[FN421] Allowable safeguards +include: scrambling messages so they cannot be understood without +a descrambler, issuing a password by mail with age verification, +or requiring a credit card number before transmission of the +message.[FN422] While this statute applies only to communication over +a telephone, it does not distinguish between aural and data +communications. Without making this distinction, the statute may +also cover connecting to a bulletin board system or other service +which provides indecent material. If this statute were applied to +computer information systems, as it is applied to dial-a-porn, +SYSOPs would have to employ one of the same means of preventing +access to minors, and would have to make sure that the service +offered met the standards of constitutionally protected indecency +and that it did not cross the line into prohibited obscenity.[FN423] +-------------------------- +[FN419] Electronic Communications Privacy Act of 1986, 18 U.S.C. +¤2510. +[FN420] 47 U.S.C. ¤ 223. +[FN421] 47 C.F.R. ¤ 64.201 +[FN422] Id. +[FN423] See Sable Communications v. F.C.C., 492 U.S. 115 (1989). +====================================================================== +143 E-Law Copyright 1992-1993 by David Loundy + + As discussed earlier, there is no national standard for +obscenity. A SYSOP would have to be careful not to break the +obscenity laws in any state to which the computer information +system reached. With the ease of access of a computer information +system by means of a long distance telephone call, this would make +computer information systems subject to the obscenity laws of +every state. It is not hard to see how computer porn services +should be subject to regulation in the same form as dial-a-porn. +In both cases, the material being transmitted to the caller is the +same: for dial-a-porn the material is transmitted aurally; for +computer porn it is transmitted over a computer screen visually. +With a computer's ability to transmit images and sounds as well as +text, the justification for regulating computer distributed +indecent material is equal to or greater than the justification +for regulating standard audio dial-a-porn. The regulations on +dial-a-porn could simply be applied in a computer context. The +distribution means is essentially the same Ñ a wire connection +from the sender to the receiver. In the case of dial-a-porn, this +wire is a telephone line. In the case of material transmitted by +computer, the wire is either a telephone line or a network +connection. The means of preventing access by minors could also be +made the same, regardless of the means of access; a password, a +credit card, or age verification by mail could still be required +to access the service. + + D. Information System as Traditional Mail + + Since a major use for computer information systems is sending +E-mail, it is only sensible to compare such a use to the U.S. +mail. The U.S. mail is a type of common carrier mandated expressly +by the Constitution.[FN424] U.S. mail, or "snail mail" is governed by +a statute which gives "regular" mail the same kind of privacy that +the Electronic Communications Privacy Act[FN425] gives E-mail. The +postal service act punishes + + [w]hoever takes any letter ... out of any post office or + any authorized depository for mail matter, or from any + mail carrier, or which has been in any post office or + authorized depository, or in the custody of any letter + or mail carrier, before it has been delivered to the + person to whom it was directed, with design to obstruct + the correspondence, or to pry into the business or + secrets of another, or +-------------------------- +[FN424] U.S. CONST. art. I, ¤ 8. +[FN425] 18 U.S.C. ¤ 2510. +====================================================================== +144 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + + opens, secretes, embezzles, or destroys the same ... .[FN426] + +This statute has the same effect as the statutes specifically +geared towards electronic communications Ñ it protects both mail +in transmission,[FN427] as well as mail being stored for the +recipient.[FN428] Just as the Electronic Communications Privacy Act +protects stored communications in the form of an E-mail +recipient's "mail box,"[FN429] so does the postal service protect a +"snail mail" recipient's mail box.[FN430] U.S. mail recipients have +certain protections which E-mail recipients may also create for +themselves. U.S. mail recipients can ask the post office to block +mail from particular senders who are distributing what the +receiver sees as sexually offensive mail.[FN431] However, the reason +for this protection from unpleasant U.S. mail Ñ based on notions +of trespass[FN432] Ñ could easily apply to E-mail and network +communications as well. In the case of electronic mail, a computer +program could be set up to automatically reject incoming mail from +certain senders. A program could also be used to search through +the text of an incoming message and reject any message which +contained certain terms which would indicate that the message's +contents were something which the receiver did not want to see. + The same similarity analysis between E-mail and the U.S. Mail +would work to preserve an advertiser's right to send out E-mail +for commercial purposes, just as commercial U.S. mail enjoys some +Constitutional protection.[FN433] The one significant bar to the +creation of a large junk E-mail industry is access. The U.S. mail +is a true common carrier and as such they do not prohibit material +based on advertising content. E-mail in many contexts may appear +to be a common carrier, but if it is sent over a company's +computer system, for instance, there may be no way for an +advertiser to gain access to the company's E-mail system. +Similarly, large networks, such as the Internet, exist for +educational purposes. While network authorities do not censor E- +mail, in keeping the network in line with the definition of a +common carrier, a user could still report a +-------------------------- +[FN426] Mail, 18 U.S.C. ¤ 1702. +[FN427] Compare ¤ 1702 with E-mail, 18 U.S.C. ¤ 2510. +[FN428] Compare ¤ 1702 with ¤ 2511. +[FN429] ¤ 2511. +[FN430] ¤ 1702; see also United States Postal Serv. v. Council of +Greenburgh Civic Ass'n, 453 U.S. 114 (1981). +[FN431] Rowan v. United States Postal Dep't, 397 U.S. 728 (1970). +[FN432] Id. at 737. +[FN433] Bolger v. Young Drug Prods. Corp., 463 U.S. 60 (1983). +====================================================================== +145 E-Law Copyright 1992-1993 by David Loundy + +company which was trying to advertise over the network. Since the +Internet is not meant to be used for profit making purposes, an +offending company reported by a user could be denied access privileges +to the network. + + E. Information System as Traditional Bulletin Board + + For centuries courts have been looking at liability for +notices posted on bulletin boards, bathroom walls, sides of +buildings, and wherever else defamatory material can be posted. In +the past few hundred years there has been little debate about +proprietor liability for the content of the "bulletin boards" +under its control. The law of Great Britain, as parent to the U.S. +legal system, is illustrative. The English Star Chamber in +Halliwood's Case (1601) held that "if one finds a libel, and would +keep himself out of danger, if it be composed against a private +man, the finder may either burn it or deliver it to a +magistrate."[FN434] A fairly modern case (1937) which is cited more +frequently in this country is Byrne v. Deane. This case involved a +poem, placed on the wall of a private golf club, which was alleged +to be defamatory of one of the club's members.[FN435] Judge Hilbery +held that the owners of the club could be held liable as +republishers of the defamation.[FN436] He based this conclusion on +the fact that the club owners had complete control of the walls of +the club;[FN437] they had seen the poem;[FN438] they could have removed +it;[FN439] and yet they did not.[FN440] In the words of Judge Greer, "by +allowing the defamatory statement ... to rest upon their wall and +not to remove it, with the knowledge that they must have had that +by not removing it it would be read by people to whom it would +convey such meaning as it had, were taking part in the publication +of it."[FN441] + Courts in this country have made rulings on the posting of +defamatory material since at least 1883. Woodling v. +Knickerbocker[FN442] involved two placards left on a table at a +furniture dealer, +-------------------------- +[FN434] As quoted in Byrne v. Deane, 1 K.B. 818, 824 (Eng. C.A. 1937). +[FN435] Id. at 818. The case finally held against the plaintiff on the +grounds that the message was not defamatory. Id. +[FN436] Id. at 820. +[FN437] Id. at 821. +[FN438] Id. at 838. +[FN439] Id. +[FN440] Id. +[FN441] Id. +[FN442] Woodling v. Knickerbocker, 17 N.W. 387 (Minn. 1883). +====================================================================== +146 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +one which read, "[t]his was taken from Dr. +Woodling as he would not pay for it; for sale at a bargain,"[FN443] +and the other which read, "Moral: Beware of dead-beats."[FN444] The +court found for the plaintiff, holding that regardless of who left +the sign, anyone who allowed or encouraged its placement, or who +had authority to remove the sign after it was placed, could be +held liable for its publication.[FN445] Importantly, the court also +discussed the liability of one of the furniture store owners who +had not seen the defamation.[FN446] The court said that she could not +be held liable for her partner's nonfeasance in removing the sign +because there was no way to imply that she had given him authority +to act as a publisher of defamatory material, and this was beyond +the scope of their business.[FN447] This situation was contrasted +with that of a business involved in publishing or selling books or +magazines.[FN448] In the case of a publisher or seller, all of the +partners are to be regarded as having given authority to the other +partners in deciding what to publish or sell, and therefore all of +the partners are to be held liable for defamation.[FN449] This +implies that a SYSOP who either does not monitor the content of +publicly accessible parts of the system under his or her control, +or a SYSOP or computer information system owner who delegates such +responsibility may still be held liable for defamatory material. + Fogg v. Boston & L. R. Co.[FN450] supports this theory. In this +case, a newspaper article defaming a ticket broker was posted in +the defendant's railway office.[FN451] The court held that a jury +could properly have found that the defendant, by way of its +agents, had knowledge of what was posted in its office.[FN452] Also, +by not having it removed in a timely manner the company could be +construed as having endorsed or ratified the posting of the +defamatory article, even if it had not been responsible for its +posting in the first place.[FN453] + Hellar v. Bianco is a case in which the proprietor of an +establish- +-------------------------- +[FN443] Id. +[FN444] Id. +[FN445] Id. +[FN446] Id. +[FN447] Id. +[FN448] Id. +[FN449] Id. +[FN450] Fogg v. Boston & L. R. Co., 20 N.E. 109 (Mass. 1889). +[FN451] Id. +[FN452] Id. at 110. +[FN453] Id. +====================================================================== +147 E-Law Copyright 1992-1993 by David Loundy + +ment was originally unaware of the defamation, and this +case raised the issue as to what constituted a reasonable time to +remove defamatory posts once a proprietor is made aware of their +existence.[FN454] Hellar involved "libelous matter indicating that +appellant was an unchaste woman who indulged in illicit amatory +ventures"[FN455] which was scrawled on a men's room wall of a +tavern.[FN456] After the woman who was the subject of the note began +getting calls about the graffiti, the bartender was asked to have +the message removed.[FN457] Later that evening, when it was not +removed, the tavern owner was charged with republication of the +libel.[FN458] The court held that republication occurred when the +bartender knew of the libel, and had an opportunity to remove it, +but did not do so.[FN459] In this set of circumstances, a short +period of time was sufficient to constitute republication. + A longer period of time was found not to constitute +republication in Tacket v. General Motors Corp.[FN460] Tacket +involved a defamatory sign posted in a GM factory.[FN461] The court +said that it was conceivable that it could take three days to +remove a sign because of the speed at which large bureaucracies +work.[FN462] The court did say that a second sign which had been +posted for seven or eight months was different and that a lengthy +time of posting without removal could be found by a jury to be +republication by implied ratification.[FN463] + A more recent case, Scott v. Hull,[FN464] appears, at first +glance, to hold in a manner contrary to these earlier cases. In +Scott, graffiti defaming the plaintiff was written on the side of +a building.[FN465] The plaintiff told the defendant about the +graffiti and asked that it be removed; the defendant refused.[FN466] +The court held that the building owners were not liable as +republishers, and they were under no duty to remove the +graffiti.[FN467] The reasoning behind this decision is +-------------------------- +[FN454] Hellar v. Bianco, 244 P.2d 757 (Cal. Ct. App. 1952). +[FN455] Id. at 758. +[FN456] Id. +[FN457] Id. at 759. +[FN458] Id. +[FN459] Id. +[FN460] Tacket v. General Motors Corp., 836 F.2d 1042 (7th Cir. 1987). +[FN461] Id. at 1043-34. +[FN462] Id. at 1047. +[FN463] Id. +[FN464] Scott v. Hull, 259 N.E. 160 (Ohio Ct. App. 1970). +[FN465] Id. at 160. +[FN466] Id. at 161. +[FN467] Id. at 162. +====================================================================== +148 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +that the viewing of the graffiti was not at the invitation of the +owners Ñ as it was in the earlier cases.[FN468] + In Scott v. Hull, the graffiti was on the outside of the +defendant's building.[FN469] It was placed there by strangers and +read by strangers.[FN470] The defamation was not put there by an act +of the defendant, and the court refused to find liability for +nonfeasance in this instance.[FN471] In Hellar,[FN472] the defamation +was "published" in the restroom on the defendant's premises. The +graffiti was placed there by invitees of the defendant,[FN473] and +was read by other invitees.[FN474] Byrne v. Deane,[FN475] Woodling v. +Knickerbocker,[FN476] and Tacket v. General Motors Corp.[FN477] are +similar to Hellar. The same was true in Fogg v. Boston & L. R. +Co.,[FN478] except there the defamation was even related to the +defendant's business. + Invitee analysis of defamation raises two issues involving +computer information systems. First, can someone post "outside" of +a computer? An example of this might be someone who defames +someone by electronic mail sent from one user on a computer to +several others. If the injured party sued the operator of a +bulletin board which also runs on that computer, the invitee +analysis would indicate that the BBS operator could not be held +liable. This would make sense assuming the BBS SYSOP has nothing +to do with the electronic mail, and has no control over the mail +system. Although the offending message is on the same computer as +the bulletin board system, the mail does not appear on the +computer at the request of the BBS operator, unlike a post left by +a user invited to use the BBS. Messages sent by E-mail would go +beyond the scope of the BBS's invitation; therefore it would be +unreasonable to hold the bulletin board operator liable as +responsibility would fall on the operator of the mail system. If, +however, the BBS operator had been given the power to remove an +offending message left anywhere on the computer system, then an +agency argument would say that the BBS SYSOP has the duty to +remove the of- +-------------------------- +[FN468] Id. +[FN469] Id. at 160. +[FN470] Id. +[FN471] Id. at 162. +[FN472] 244 P.2d at 757. +[FN473] Id. +[FN474] Id. +[FN475] 1 K.B. at 818. +[FN476] 17 N.W. at 387. +[FN477] 836 F.2d at 1042. +[FN478] 20 N.E. at 109. +====================================================================== +149 E-Law Copyright 1992-1993 by David Loundy + +fending message, or have someone else do it. This is +similar to the case of graffiti in a bar Ñ a bartender could not +easily claim immunity from a defamation charge with the argument +that removing graffiti was not the job of a the bartender. If the +bartender is not hired to clean, the bartender could at least +inform someone who was, rather than leave the defamatory graffiti +in place. + The second issue the invitee analysis raises is messages +posted by someone who is clearly not an invitee, for instance, a +computer hacker who is essentially a trespasser. In this +situation, a SYSOP should likely be required to remove any +defamatory messages left by a hacker under the same reasoning as +the above cited cases. These cases all assume that the writing was +left by an invitee raising the presumption that the SYSOP is aware +of the message, so just because defamatory messages are left by a +trespasser does not mean the SYSOP or building owner should be any +less liable if they know of the message, have the opportunity to +remove it, and yet do not do so. + + F. Information System as Broadcaster + + With the rise of packet radio and radio WANS (wireless +networks), the analogy of a computer information system as +broadcaster is also of growing importance. Authority to govern +broadcasting is given to the F.C.C. under the Communications Act +of 1934.[FN479] The justification for content regulation over the +airwaves is "spectrum scarcity." There are only so many radio and +television stations that can be on the air at once. "Without +government control, the medium would be of little use because of +the cacophony of competing voices, none of which could be clearly +and predictably heard."[FN480] In order to preserve the "market place +of ideas" from monopolization, the F.C.C. governs the use of the +airwaves to preserve the rights of viewers and listeners to be +informed.[FN481] An equal concern is to protect children from +inappropriate material; this is especially true because of radio +and television's special reach Ñ they can even bring indecent +messages to those children too young to read.[FN482] Radio and +television are given special treatment, including the "channeling" +of constitu- +-------------------------- +[FN479] Communications Act of 1934, 47 U.S.C. ¤ 301. +[FN480] Red Lion Broadcasting Co. v. F.C.C., 395 U.S. 367, 376 (1969). +[FN481] Id. at 390. +[FN482] F.C.C. v. Pacifica Foundation, Inc., 438 U.S. 726, reh'g +denied, 439 U.S. 883 (1978). +====================================================================== +150 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +tionally protected speech, because: + + 1. children have access to radios and in many cases are + unsupervised by parents; 2. radio receivers are in the + home, a place where people's privacy interest is + entitled to extra deference; 3. unconsenting adults may + tune in a station without any warning that offensive + language is being or will be broadcast; and 4. there is + a scarcity of spectrum space, the use of which the + government must therefore license in the public + interest.[FN483] + +These facts allow the F.C.C. to promulgate rules to channel +constitutionally protected "indecent" speech to times of the day +when children are not as likely to be in the listening audience, +but the F.C.C. may not altogether prohibit indecent speech.[FN484] + The four factors justifying channeling of speech do not work +very well when applied to wired computer communication, such as +computer information systems. No spectrum scarcity issue is +involved when calling a computer information system. Any indecent +material available via computer must be actively sought, as there +is a reduced risk of having the telephone ring and being +spontaneously assaulted by a computer spewing lewd data.[FN485] While +computers, like radio receivers, are in the home, it takes an +active effort to obtain indecent material via computer, so the +risks of accidental exposure to such material at issue in the +broadcasting situation are just not present. Finally, although +children do have unsupervised access to computers, they also may +have some potential unsupervised access to dial-a-porn and cable +television. Neither dial-a-porn nor cable are restricted as +severely as broadcasting. As far as the four factors justifying +channeling of indecent speech applying to wireless data +transmission (packet radio, radio-WAN), the element of spectrum +scarcity comes back into play, giving the F.C.C. more of a reason +to regulate computer communications sent via the airwaves. +However, it is less likely that offensive material will +accidentally be received, since data being broadcast may be +encrypted in order to avoid its unauthorized interception by +minors. + As well as channeling indecent speech, the other exceptions and +-------------------------- +[FN483] Id. at 731. +[FN484] Action for Children's Television v. F.C.C., 932 F.2d. 1504 +(D.C. Cir), reh'g denied, 1991 U.S. App. LEXIS 25527, reh'g denied +1991 U.S. App. LEXIS 25425 (1991) (en banc). +[FN485] It is possible for telemarketers to use computers for phone +solicitation; it is similarly possible for an individual to prompt +a computer to make lewd or obscene phone calls. +====================================================================== +151 E-Law Copyright 1992-1993 by David Loundy + +guarantees of free speech that apply to publishers apply to +broadcasters. For instance, a broadcaster does not have the right +to make defamatory statements with knowing or reckless disregard +for the truth.[FN486] + Cable television and cable audio signals are governed in a +similar fashion to regular broadcasting. These services are seen +as an "ancillary" services to broadcasting, and therefore fall +under the F.C.C.'s authority.[FN487] Like computer information +systems, but unlike broadcasting, cable television must be +actively brought into the home. Because of this, cable television +traditionally was not seen as being as "pervasive" as +broadcasting, and therefore the Pacifica[FN488] obscenity standard +traditionally was not extended to cable.[FN489] Recent cable +television regulation, however, acknowledges the growth of cable, +which now reaches nearly sixty per cent of all television +households.[FN490] The Communications Act of 1934[FN491] allowed a cable +franchising authority to prohibit or restrict any service that "in +the judgment of the franchising authority is obscene, or is in +conflict with community standards in that it is lewd, lascivious, +filthy, or indecent or is otherwise unprotected by the +Constitution of the United States." The 1992 amendments to the +Communications Act allow a cable operator to establish a policy of +excluding "programming that the cable operator reasonably believes +describes or depicts sexual or excretory activities or organs in a +patently offensive manner as measured by contemporary community +standards."[FN492] Thus, this standard taken from Pacifica now can be +applied to cable television. The new amendments require the F.C.C. +to create regulations to channel indecent material onto a single +cable channel which must then be blocked out unless requested in +writing by the subscriber, thus preventing access by minors.[FN493] +Also, analogous to the postal service statutes, the new cable +regulations add a provision for service users to have the service +provider block out unsolicited sexually explicit materials on +re- +-------------------------- +[FN486] Adams v. Frontier Broadcasting Co., 555 P.2d 556 (Wyo. 1976). +[FN487] Mail, 47 U.S.C. ¤ 151; see also United States v. Midwest Video +Corp., 406 U.S. 649 (1972). +[FN488] 438 U.S. at 726. +[FN489] Community Television, Inc. v. Roy City, 555 F. Supp. 1164 (D. +Utah 1982); Cruz v. Ferre, 755 F.2d 1415 (11th Cir. 1985). +[FN490] Cable Television Consumer Protection and Competition Act of +1992, Pub. L. No. 102-385, ¤ 2(3), 106 Stat. 1460. +[FN491] 47 U.S.C. ¤ 532(h). +[FN492] Cable Television Consumer Protection Act of 1992, ¤10(a)(2). +[FN493] Id. ¤ 10(b). +====================================================================== +152 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +quest.[FN494] Because wired computer networks are more like cable, +cable provides a better analogy than broadcasting. In fact, as +mentioned earlier, teletext services are usually provided over +cable television. + The use of computers over the air waves is currently +limited, but it promises to increase in the future as technology +advances. In any case, because computer data can be easily +encrypted, radio networks do not share the same need for content +restrictions that broadcasters require. While cable television is +a better analogy for traditional computer information systems than +is broadcasting, some of the other regulatory schemes still fit +computer information systems more tightly. This is because +computer information systems do not provide the same sorts of +services as cable television. Rather, computers are used as the +common carriers, bulletin boards, and electronic presses that have +already been discussed. + + VIII. Suggestions for Regulation + + Now that the current regulatory environment of computer +information systems has been discussed, we are left wondering how +well the regulations function to control Cyberspace. Many people +fear that the current law does not effectively protect the rights +of voyagers through Cyberspace. This has given rise to groups such +as Computer Professionals for Social Responsibility[FN495] and the +Electronic Frontier Foundation.[FN496] Groups such as these work to +increase access to technology for the general masses; to help +legislatures understand what it is they are regulating; to help +aid in the passing of responsible, workable, laws; and, where +necessary, to help defend people whose rights are being violated +because of legislation which does not properly cover computer +information systems. Constitutional law professor Laurence Tribe +has even proposed a new amendment to the Constitution to protect +individuals from such violations of their rights. His proposed +amendment reads: + + This Constitution's protections for the freedoms of + speech, press, petition, and assembly, and its + protections against unreasonable searches and seizures + and the deprivation of life, liberty, or property +-------------------------- +[FN494] Id. ¤ 15. +[FN495] Katy Ring, Computer Professionals for Social Responsibility +Seeks to Change Lay Preconceptions, COMPUGRAM INT'L, Oct. 9, 1990. +[FN496] John P. Barlow, Crime and Puzzlement: In Advance of the Law on +the Electronic Frontier; Cyberspace, WHOLE EARTH REV., Sept. 22, +1990, at 44. +====================================================================== +153 E-Law Copyright 1992-1993 by David Loundy + + without due process of law, shall be construed as fully + applicable without regard to the technological method or + medium through which information content is generated, + stored, altered, transmitted, or controlled.[FN497] + +This amendment would serve to ensure that the speech and privacy +right that we currently enjoy in other media would be applied to +electronic communications as well. An amendment such as this would +avoid incidents like the raid on Steve Jackson Games. This +amendment would serve to guarantee that a computer bulletin board +publishing the contemporary editor's message would enjoy the same +constitutional protection as the print publisher's printing press. + Some authors focus more on how liability should be assessed +and damages determined in a new medium which offers the +opportunity for violation of rights on an instantaneous, global +scale. For example, one author believes that SYSOPs should be at +least jointly liable with the poster of the offending +material.[FN498] He argues that the average subscriber to a BBS does +not have the resources to compensate adequately for injuries +caused by the potentially widespread reach of offending +material.[FN499] Also, it may not even be able to discover the reach +of offending material.[FN500] Copyrighted material could be spread +from computer to computer all over the world after just one file +transfer.[FN501] + Others want to simplify the issue of system operator +liability by holding the SYSOP liable, in addition to the original +poster, as a means of compensating victims and deterring computer +crime.[FN502] These people argue that SYSOPs should be liable for +content because they are easier to track down than the users who +posted the offending material, and also, by holding them liable, +SYSOPs are more likely to work at deterring others from the use of +their service for inappropriate purposes. + What is necessary to regulate computer information system +content and system operator liability is, first and foremost, an +understanding of the technology. The law is a slow evolving, +tradi- +-------------------------- +[FN497] Laurence Tribe Proposed Constitutional Amendment, available +over Internet, by anonymous FTP, at FTP.EFF.ORG (Electronic +Frontier Foundation). +[FN498] See generally Charles, supra note 383. +[FN499] Id. +[FN500] Id. +[FN501] Id. +[FN502] Johnathan Gilbert, Computer Bulletin Board Operator Liability +for User Misuse, 54 FORDHAM L. REV. 439, 441 (1985). +====================================================================== +154 ALB. L. J. SCI. & TECH. [Vol. 3 1993] + +tion-bound beast. Computers are an upstart technology +pioneered by people who do things like create viruses to let loose +on their friends in order to hone their programming skills.[FN503] If +judges, juries, lawyers and legislators do not understand current +technology, the technology will have changed before the law +catches up to it. Many of our current laws will work well if +adapted to computer information systems. The Electronic +Communications Privacy Act of 1986[FN504] works well to regulate +electronic mail because it is modeled after the statute that +governs the U.S. mail.[FN505] For many people, these new +communications fora are direct replacements for the ones that they +represent; therefore they should be regulated like the ones they +represent. This may entail using several different regulatory +schemes, but this should not be too difficult to employ by people +who understand the technology at issue Ñ simply regulate E-mail +like U.S. mail, regulate networks like common carriers, etc. It +would not be difficult to employ the correct legal analogy if the +computer information service at issue is looked at from the point +of view of the user. Where novel legislation is needed is in +defining terms to be used in the developing law. An example is +trespassing. If someone hacks into a computer system, is he or she +breaking and entering, or is the situation more analogous to +someone making a prank telephone call? + Tribe's proposed Constitutional amendment is similar to a +modern day spelling out of a natural law concept. The law already +exists, so it should be assumed that the Constitution covers all +technologies equally, including Cyberspace. In theory an amendment +to the Constitution is not necessary; however, a new amendment +would leave no doubts and would make for streamlined judicial +decisions. As computer information systems grow in popularity and +scope, older media will pass away. The structure already exists to +regulate the new technology, because, in essence, the new +technology is just a new incarnation of the old. +-------------------------- +[FN503] See Branscomb, supra note 181, at 7-11. +[FN504] 18 U.S.C. ¤ 2511. +[FN505] 18 U.S.C. ¤ 1702. + diff --git a/textfiles.com/bbs/sysfun.txt b/textfiles.com/bbs/sysfun.txt new file mode 100644 index 00000000..c0c02080 --- /dev/null +++ b/textfiles.com/bbs/sysfun.txt @@ -0,0 +1,246 @@ + + Courtesy of Mutant Offspring + Sysop Fun + ----- --- + First, you must be a sysop. +(Obviously!) Or, you may be at a +sysop's house (When he or she is not +around.) + Second, you must be VERY popular, +or VERY daring. Either way, your +victim will have a strong tendency +to: a) crash your board, b) hate you, +or c) spread malicious rumors about +you, and, or your board to everyone +in the world that will listen. + I am going to write about AE +fun first, and then Net-Worx. + + AE Fun + -- --- + So you are bored, and want to +have some fun, huh? + Go into your room, or wherever +you have your apple, and sit down. +Turn on the monitor, and lets see +if there is a leech on the line. +(-note: if you are the unlucky type, +I suggest that you give this up, +because for all you know, that sysop +of the 20meg board is on your line, +and he's going to be your victim!!) + Now for some of these pranks, you +will need to make things before- +hand. I suggest you read this through, +and make the necessary mods. + +1) This one is probably my meanest +trick, and should only be used on +people like Matt Ackerett. + + Your victim has to be leeching +a game off of your AE for this to +work. + You wait until your victim is at +his last 2 blocks of memory to go +until the transfer is done, and +you take out the disk. + This will ruin the >entire< +transmission. It won't piss them off +too bad if it is only 50 or so blocks, +but can you imagine: + +Send: Matt Ackerett is a fag +290 blocks +crc=167 +<289> + + Note- The victim has to get 290 +blocks, you only let the victim get +289! + At that point, take out the disk! +They have just waited 1/2 hour for +nothing! They can't get the last block +and have to go through the whole +thing again!! Ha ha! + This is very mean, especially if +they aren't phreaking, they have +been >paying< for it all! + + +2) If you want to see if the person +on is intelligent...simply let him +catalog your drive once, then when he +is done, take the disk out, and +put in the disk from the other drive. +When they catalog the disk next, it +will be different! + This will freak them out, they will +think that they have switched to d1 +somehow. The victim will then L)og the +drive, and find it still on D2. Wow! + Hopefully they will catalog D1 +anyway, thinking that they were +originally on D1 and it switched. +Now comes the fun. + Put the right disk back in D2, +and put the disk that used to be in D2 +into D1, so they will get the same +catalog. + Now they are confused. Now +they will catalog D2, and find the +normal stuff. Hopefull they will +read something, now take the disk +out while they are typing in the name, +and slip the other disk in. It +will say 'file not found.' + Good. Now they will catalog it, +and look! The wares have changed! +Now something is wrong here! They +will say: + +hey! stop it! + + Oh no! They are on to your scheme! +But, 1 last joke! Get a copy-protected +type disk, one that you bought. +They won't be able to catalog this +at all! Ha! + If they get mad, they might +say something like: + + Hey! Stop it! + + But will you listen? nnnoooooo! +Take the disk out, and slip something +totally new, preferably the disk that +has "sneakers" or some ancient wares. +Maybe they will think these are the +latest! Watch them post!: + + Hey! I just got some new + Warez! Do you want to trade?? + +hah hah! + + Satisfied, you may put the normal +disks back in and walk off to see +some football game. + +3) Lock out the space-bar. This will +make it so that they can't type a +. Then, they can't read +anything that requires a space. +Most likely the victim will think that +there is something wrong with >his< +computer. Thusly sending him/her/it +into a 1/2 hour scan of their install +program to see what is wrong. + +4) Change the commands...such as: + +d)irectory= c)irectory +- - + + They will have to hack at the +commands! This won't be too funny, +because they won't do anything stupid +like posting: + + hey your commands are screwed! + + Most likely they wont find the +command for 'copy'. + + +5) lock out the "ctrl-c". This will +piss them off when the victim just +can't exit from posting. Ha! + +6) Change the ring count, most, or +almost >all< AE lines are set to +pick up after just 1 ring. Change it +to...say...5 rings, and only tell your +friends that it is at 5 rings. When +they call, they will only wait for +about 2 rings, and hang up thinking +that the line is down. Only the people +you like will get on, because they +will be the only ones to wait 5 rings. +Mean huh? + +7) When someone is posting, or c)opy- +ing a message, pick up the voice line, +and blow into the reciever. This will +put all of these weird characters onto +the screen. He will save a gay looking +message, that will make it look like +the victim can't type!! + + + Net Works + --- ----- + + I don't have as many fun tricks +with net-worx as I do with AE, but +here are a couple of my favorites... + +1) In the program, make a bug, like +"ctrl-k" that when pushed (like ctrl-t +for chat) it will dump you into basic. +take out the disks, and put in like +the "bare-bones" net-worx disk and let +them have fun reading fake messages, +mail, and passwords. Ooooh! They will +think: + +oh yay! I have everyone's pass! + +Now, see if he/she will init the +disks, if they do, you know what type +of user it is. If they are nice, +and 'hang' the line for you so that +no one wil be able to get on after, +or they try to beep you, then give +them a level raise. + +2) Be a tyrant. Juggle their levels +while they are on. Like break into +chat, change their level, and watch +them get all mad. + +3) Break into chat, and just walk off, +leaving a frustrated user sitting +there. + +4) break into chat, and change the +time. In other words, leave them +with -10 minutes, instead of 35 or +so. + +5) when they log off, and they get +that stupid message about: + + Thank you for + calling + +and all of that, press 'ctrl-c' a +few times, and they will be brought +back. Wow! What happened? Let them +try to log off a few times nd keep +pressing ctrl-c. Finally they should +just press 'reset'. He he! + + + I hope you have enjoyed these +little pranks. Your users will hate +you if you do this too often, unless +they are like Matt Ackeret or Little +Al. Then it doesn't matter much. + Remember! I hold no responsibilty +for people wanting to crash your +system because they are so pissed +at you! +############################################################################### + +Press RETURN... \ No newline at end of file diff --git a/textfiles.com/bbs/syslaw.txt b/textfiles.com/bbs/syslaw.txt new file mode 100644 index 00000000..9a9449d6 --- /dev/null +++ b/textfiles.com/bbs/syslaw.txt @@ -0,0 +1,81 @@ +Book Review: SYSLAW: The Sysop's Legal Manual + +by J. D. Abolins + +SYSLAW, the Sysop's Legal Manual by Jonathan D. Wallace Esq. and Rees +Morrison Esq.; LLM Press, 150 Broadway, Suite 607, New York, NY 10038; +Copyright 1988. Price: $19 plus $2 postage (New York residents, include +8.25% sales tax.) + +As the title says, SYSLAW is a guide to the legal issues faced by computer +bulletin board system (BBS) systems operators (SysOps). After examining the +current selection of computer law books, I believe that SYSLAW is the only +book that deals with BBS's and computer law. It is good that such a book is +available since the past few years have presented legal issues that can +threaten BBS's as a current Indiana lawsuit well demonstrates. Fortunately +for SysOps, this book is packed with useful, practical information written in +standard English. + +Both of the book's authors are computer-literate New York City attorneys. Both +are SysOps. Jonathan Wallace is the Assistant SysOp of Compuserve's Law Forum +and the SysOp of the LLM BBS. Rees Morrison is the SysOp of ABFORUM, the +portion of the American Bar Association's ABA/net for the Economics of Law +Practice Section. Jonathan Wallace has dealt directly with computer law issues +by representing SysOps, and parties suing pirate BBS's. Mr. Wallace also +publishes the Computer Law Letter, a "shareware" newsletter about computer law. + +SYSLAW covers subjects such as ownership of information on a BBS, illegal +material posted on BBS's, libel, the Electronic Communications Privacy Act +(ECPA), and search and seizure of BBS's. It also includes the texts for the +ECPA and New York State's Computer Crime Law. At first glance through the +book, many SysOps will be stunned by the array of legal issues facing them +(especially if they thought of themselves as little deities in their own +microcosm.) But the purpose of SYSLAW is anything but to discourage SysOps. +It matter-of-factly presents the legal matters and then explains the +safeguards SysOps should take. One section of the book even addresses BBS +program developers, giving them suggestions how to make their software legally +safer. (This is something that has been neglected by most of the existing BBS +software.) + +A great feature of SYSLAW is its presentation of the reasoning behind some +of the legal issues. In discussing a SysOp's liability for illegal uploads +on his/her BBS, the book explains the principle developed from liability +lawsuits against grocery stores- the "banana peel on the floor" concept. +One is not liable for the harmful condition being there unless one failed +to correct the situation with a reasonable period of time. This and other +such details are quite enlightening. + +Anything that is lacking in this book is not due to negligence on the part of +the authors but due to the vast territory of computer law. For example, the +book's section on state computer laws focus mainly on New York State laws and +nothing about other states.. There is no mention of legal issues affecting +international computer telecommunications either. Again, this is not the +fault of the authors. As the introduction to the section about state computer +laws say, "It would require a book several times the size of this one to +analyze computer crime laws of all fifty states." Hopefully, future books +can fill in the gaps. + +It must be mentioned that no book, even SYSLAW can be considered as a +substitute for competent legal counsel in certain situations. The purpose +of the books is to educate the reader, not to act as a "paper attorney". +(However, SYSLAW has a chapter explaining how to seek competent legal +advice and related matters.) With this disclaimer said, I advise any SysOp +to get a copy of this book. Even many BBS users will benefit from it. The +BBS world is advancing rapidly. With the new technologies come new versatility +and more power. With all this comes new responsibilities. Ignorance of these +legal responsibilities is foolhardy. SYSLAW is an excellent introduction to +these responsibilities written with the SysOp in mind. + +--------------------------------------------- +[First submitted to THE LOST CLUSTER NEWSLETTER] + J. D. Abolins + 301 N. Harrison Streeet; # 197 (mail only) + Princeton, NJ 08540 + +Source: LLM BBS (212) 766-3788 +Downloaded from: + Sappho's Exchange BBS - + Online Communications & Information for Women 212-697-3793 + + By: The NY Transfer BBS 718-448-2358 + diff --git a/textfiles.com/bbs/syslibli.txt b/textfiles.com/bbs/syslibli.txt new file mode 100644 index 00000000..e8b95cab --- /dev/null +++ b/textfiles.com/bbs/syslibli.txt @@ -0,0 +1,2860 @@ +From langz@ebay.sun.com Mon Apr 23 21:05:51 1990 +Received: from Sun.COM by gaak.LCS.MIT.EDU via TCP with SMTP + id AA09583; Mon, 23 Apr 90 21:05:27 EDT +Received: from EBay.Sun.COM (male.EBay.Sun.COM) by Sun.COM (4.1/SMI-4.1) + id AA21291; Mon, 23 Apr 90 18:03:56 PDT +Received: from khayyam.EBay.Sun.COM by EBay.Sun.COM (4.1/SMI-4.1) + id AA04566; Mon, 23 Apr 90 18:02:40 PDT +Received: by khayyam.EBay.Sun.COM (4.0/SMI-4.0) + id AA09346; Mon, 23 Apr 90 17:57:50 PDT +Date: Mon, 23 Apr 90 17:57:50 PDT +From: langz@ebay.sun.com (Lang Zerner) +Message-Id: <9004240057.AA09346@khayyam.EBay.Sun.COM> +To: ptownson@gaak.LCS.MIT.EDU +Subject: Defamation Liability of Sysops article +Status: R + + + D E F A M A T I O N L I A B I L I T Y + O F + C O M P U T E R I Z E D + B U L L E T I N B O A R D O P E R A T O R S + A N D P R O B L E M S O F P R O O F + + + + + + + + + John R. Kahn + CHTLJ Comment + Computer Law Seminar + Upper Division Writing + February, 1989 + + + + D E F A M A T I O N L I A B I L I T Y + O F + C O M P U T E R I Z E D + B U L L E T I N B O A R D O P E R A T O R S + A N D P R O B L E M S O F P R O O F + +John R. Kahn +CHTLJ Comment/Upper Division Writing/Computer Law Seminar + +February, 1989 + +_________________________________________________________________ + +I. INTRODUCTION + + + A computer user sits down at her personal computer, + +turns it on, and has it dial the number of a local computerized + +bulletin board service (BBS) where she has been exchanging + +opinions, information, electronic mail, and amicable + +conversation with other users. Upon connecting with the BBS, she + +enters a secret "password", presumably known only to herself and + +to the bulletin board operator, so as to gain access to the + +system. + + To her surprise, she finds herself deluged with lewd + +electronic mail from complete strangers and hostile messages + +from persons with whom she believed she was on friendly terms. + +The messages read: "Why did you call me a worthless son-of-a ---- + +- yesterday? I really thought we could be friends, but I guess I + +was wrong"; "Hey, baby, I liked your fetish you were telling me + +about yesterday: call me at home, or I'll call YOU"; and, "Why + +didn't you get around to telling me about your venereal disease + +sooner?". Yet our user has not called this BBS in weeks and has + +never made any of these statements. Dismayed and angered, the + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 2 + +user comes to realize that she is the victim of computerized + +bulletin board abuse. + + A personal computer hobbyist (hereafter "SYSOP") who + +operates a computerized bulletin board system notices a rash of + +heated arguments, profanity and complaints being reported to him + +by users on what had been a forum for the peaceful exchange of + +ideas. Investigating the complaints, he discovers that + +previously responsible users have suddenly and + +uncharacteristically been leaving insulting, rude and false + +messages about other users on the bulletin board. One user is so + +enraged about a public message accusing her of sexual + +misadventures that she is threatening to sue the computer + +hobbyist in libel for having permitted the message to appear. + +The SYSOP realizes that both he and his subscribers have + +suffered computerized bulletin board abuse. + + The aggravating force behind both the above situations + +is most likely a third user (known hereafter as "the + +masquerader") who maliciously exploits both his computer + +knowledge and his access to BBSes. Since the masquerader has + +discovered the password and name of the regular user, and uses + +them to access bulletin boards, he appears for all intents and + +purposes to be that regular user. The computer thus believes it + +has admitted a legitimate subscriber to its database when it has + +in fact given almost free reign to a reckless hacker. The + +masquerader, posing as another legitimate user, is then free to + +portray that user in whatever light he pleases and also to + +harass other users of the bulletin board. + + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 3 + + When validated users later discover that someone else + +has been impersonating them, they invariably cancel their + +subscriptions to that BBS and often bring a defamation action + +against its SYSOP for the smearing of their good names. + +Conversely, the SYSOP, in an effort to avoid liability, + +reluctantly engages in monitoring each and every piece of + +information posted daily by hundreds of users. If the SYSOP + +chooses instead to stop running his BBS altogether, another + +efficient and valuable forum for ideas is lost. + + What sort of defamation action may be maintained by the + +wrongfully disparaged user? Is the computerized bulletin board + +offered by the SYSOP subject to the stricter self-scrutiny of + +newspapers, or does it operate under some lesser standard? How + +may the initial party at fault - the masquerader - be held + +accountable for his computerized torts? + + The scope of this Comment will be to examine the + +defamation liability of computerized BBS operators and + +evidentiary proof issues that arise in tracing computerized + +defamation to its true source. Other possible Tort causes of + +action - intentional infliction of emotional distress, invasion + +of privacy, trespass to chattels - are not addressed. It is + +assumed throughout that the plaintiff is a private person and + +that the issues involved are not matters of "public interest" as + +defined in Gertz v. Robert Welch, Inc.1 + + A. Background + + Computerized BBSes exist as a quick, easy and efficient + +way to acquire and exchange information about the entire + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 4 + +spectrum of interests.2 The growing popularity of these + +electronic forums was demonstrated in a recent study which + +numbered BBSes at more than 3,500 nationwide.3 The size and + +complexity of computerized BBSes range from relatively simple + +programs, run on privately-owned microcomputers with a few + +hundred subscribers, to vast, multi-topic database systems with + +nationwide lists of subscribers and operated for profit.4 + + The process of reaching, or "accessing" one of these + +bulletin boards is quite simple: all that is required is a + +computer, a computer program that allows the computer to + +communicate over the phone lines, and a "modem" (a device which + +converts the computer's electrical signals into acoustic + +impulses, defined infra).5 Once she has accessed the BBS, the + +caller is free to trade useful non-copyrighted computer + +programs, exchange ideas on a host of topics, post electronic + +mail for later reading by others, and much more.6 The ease with + +which most BBSes may be accessed and the wealth of interests to + +be found there ensure that they will continue to be important + +sources of information and discourse. + + However, the speed and efficiency of computerized BBSes + +also subject them to serious, wide-ranging civil and criminal + +abuse. Recently a young computer user paralyzed several major + +computer systems across the nation by sending a harmful computer + +program (or "worm") to them over telephone lines. The worm + +quickly replicated itself in the computers' memories and thus + +decreased their output capacities.7 Further, certain computer + +abusers (known as "hackers") use the power of the computerized + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 5 + +forum to ply illegal copies of copyrighted programs, bilk + +hundreds of millions of dollars annually from credit card and + +phone companies, and to wrongfully access others' data files.8 A + +minority of other BBSes exist mainly to circulate racist + +ideologies.9 + + What is more, it now appears that the ancient tort of + +defamation is actively being practiced through the use of + +computerized BBSes.10 Due to the almost ethereal way + +computerized BBSes operate - one person may conveniently leave + +an electronic message for others to respond to at their leisure + +and there is no need for the parties to converse directly or + +even to know each other11 - the risk of detection when the BBS + +is abused is lower than that for defamation practiced in the + +print media.12 Difficulties arise with identifying the true + +party at fault and with authenticating the computer records as + +evidence of the defamation.13 Adding to this problem is an + +uncertainty in the laws concerning the appropriate liability of + +SYSOPs for defamatory messages on their BBSes of which they were + +unaware.14 + + B. Definitions + + The following are brief definitions of some important + +technical terms connected with electronic BBSes: + + SYSOP: An abbreviation for "System Operator", this is + +the individual generally responsible for organizing information + +and for trouble-shooting on a computerized bulletin board. On + +larger bulletin boards covering hundreds of topics, several + +SYSOPS may be in charge of maintaining information contained in + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 6 + +separate discrete fields.15 But when the BBS is privately owned + +and operated, a single SYSOP may very well oversee all aspects + +of the board's operations, in addition to being able to access + +all his users' passwords and personal information.16 + + Modem: An abbreviation for "Modulator/Demodulator". + +This is a device which links a computer to an ordinary phone + +line and converts computer signals to auditory phone signals. A + +computer modem on the other end of the transmission then + +reverses the process. Computers using modems transfer data + +rapidly across phone lines and thus share information.17 + + Validation: Basically this is a set of procedures used + +by responsible SYSOPs to do everything reasonably possible to + +verify that the personal information supplied by a user is true + +and correct. Common sense and emerging legal standards dictate + +that the SYSOP should not merely rely on the name provided by a + +potential user when the SYSOP does not personally know that + +individual. The SYSOP may be required to independently + +corroborate the prospective subscriber's information by first + +asking the potential user's name, address and phone number and + +then by checking that information with directory assistance.18 + +These procedures will hopefully aid the operator in identifying + +wrongdoers if misuse occurs;19 however, as will be seen, these + +procedures are by no means foolproof. + + Database: Any collection of data in a computer for + +purposes of later retrieval and use, i.e., names, addresses, + +phone numbers, membership codes, etc. + + User: Anyone who accesses a computerized bulletin board + + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 7 + +system and is exposed to the information stored there. Users may + +be identified by their true names, by an assigned numerical + +code, or by colorful "handles", or "usernames."20 + + Operating System: This is a program which controls the + +computer's basic operations and which recognizes different + +computer users so that their actions do not interfere with one + +another.21 For example, most multi-user operating systems will + +not allow one user to delete another's data unless the second + +user gives explicit permission.22 BBS system software programs + +perform this function through their use of "accounts" and + +"passwords":23 private electronic mail sent to a particular user + +may not be read or deleted by others. The BBS' operating system + +is also designed to deny access to those attempting to log on + +under an unvalidated or unrecognized name.24 + + Account/Username: As another part of BBS system + +security, each user chooses an "account", or "username", + +consisting of one to eight letters or numbers.25 The BBS' + +operating system then will not allow commands issued by one user + +of one account to modify data created by another account;26 nor + +will it grant access to an account that has been terminated or + +invalidated. + + Password: Yet another aspect of BBS system security is + +the use of "passwords" as a prerequisite to accessing the + +computer system. Most operating systems require the user to + +enter both her account name and password to use the account.27 + +Because electronic mail cannot be sent without the username to + +which it is being addressed, and because the account cannot be + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 8 + +used without knowledge of the password, usernames are generally + +public knowledge while passwords are a closely-guarded secret, + +known only to the user and the operating system.28 + + Teleprocessing: This is defined as accessing a computer + +from a remote location, usually over a telephone line or similar + +communications channel.29 + + Uploading/Downloading: For purposes of exchanging + +computer programs or electronic mail over the phone lines, the + +process of transferring information from one's personal computer + +to the bulletin board is called uploading. The reverse process - + +transferring information from a bulletin board to a personal + +computer - is known as downloading.30 + + + +II. DEFAMATION LIABILITY OF COMPUTERIZED BBS OPERATORS + + A. Computerized Defamation: Libel or Slander? + + Libel is the "publication of defamatory matter by + +written or printed words, by its embodiment in physical form, or + +by any other form of communication that has the potentially + +harmful qualities characteristic of written or printed words."31 + +Publication of a defamatory matter is "its communication + +intentionally or by a negligent act to one other than the person + +defamed."32 A communication is defamatory if it "tends to so + +harm the reputation of another as to lower him in the estimation + +of the community or to deter third persons from associating or + +dealing with him."33 The difference between libel and slander + +has traditionally depended upon the form of the communication: + +oral defamation generally is considered slander, while written + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 9 + +defamation is generally considered libel.34 The distinction is + +important, because libel requires no proof of special damages + +and is actionable by itself, while slander generally requires + +proof of special damages in order to be actionable.35 + + However, with the advent of electronic media, the + +traditional libel/slander distinctions as they apply to sight + +and hearing are no longer valid. For example, passing defamatory + +gestures and signals, though visible to sight, were considered + +slander;36 an ad-libbed statement on a telecast impugning a + +person's financial status was found to be libel.37 + + It has been suggested that the real distinction between + +libel and slander is the threat and magnitude of harm to + +reputation inherent in the form of publication.38 Libel has been + +historically associated with writings because (1) a writing is + +made more deliberately than an oral statement; (2) a writing + +makes a greater impression to the eye than does an oral + +statement to the ear; (3) a writing is more permanent than + +speech; and (4) a writing has a wider area of dissemination than + +speech.39 These four qualities inherent in a writing made the + +possible harm to reputation greater than mere spoken words. In + +applying libel to the new form of computerized communication + +used on BBSes, the potentiality for harm to reputation is + +significant, and should again be considered the controlling + +factor. + + In our hypothetical situation, the user discovered that + +another user (the masquerader) had usurped her account name and + +password, causing her great embarrassment and humiliation. The + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 10 + +act of prying into and taking another's computer information to + +misuse it elsewhere would indicate a certain deliberation on the + +actor's part to spread defamatory messages. Secondly, the + +defamatory message is displayed to other users on their computer + +monitors in the form of electronic characters, making a visual + +impression. Third, this electronic defamation is more permanent + +than mere words because it is stored in the BBS' memory until + +erased by the user or SYSOP. Finally, the message arguably has a + +wider area of dissemination than a one-to-one spoken defamation + +because, as a message on an electronic BBS, it has the potential + +of being viewed by hundreds, perhaps thousands, of users each + +day. Based on these four criteria, the capacity for harm to our + +user's reputation due to the masquerader's activities is indeed + +great enough to be considered libellous. + + B. Defamation Liability of the SYSOP + + Having established the electronic message as being + +libellous, the next issue is to determine the extent of + +liability for the SYSOP who unknowingly permits the message to + +be communicated over his BBS. Case law indicates that the + +SYSOP's liability depends upon the type of person defamed and on + +the subject matter of the defamation. + + 1. Degree of fault required + + The United States Supreme Court has addressed modern + +defamation liability in two major decisions. Both conditioned + +the publisher's liability on the type of person defamed and on + +the content of the defamation. In New York Times v. Sullivan,40 + +the Court determined that in order for a public official to + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 11 + +recover damages in a defamation action, the statement must be + +shown to have been made with "actual malice", i.e., with + +knowledge of its falsity or with reckless disregard for its + +truth.41 Due to society's interest in "uninhibited, robust and + +wide-open" debate on public issues, neither factual error nor + +defamatory content sufficed to remove the First Amendment's + +shield from criticism of an official's conduct.42 + + The Supreme Court further elaborated on defamation + +liability standards in the private and quasi-private sphere when + +it decided Gertz v. Robert Welch, Inc.43 In Gertz, the publisher + +of a John Birch Society newsletter made certain false and + +inaccurate accusations concerning an attorney who represented a + +deceased boy's family. The family had civilly sued the policeman + +who murdered the boy. In rebutting what he perceived to be a + +secret campaign against law and order, the publisher labelled + +the family's attorney a "Leninist" and "Communist-fronter".44 In + +addition, the publisher asserted that the attorney had been a + +member of the National Lawyers Guild, which "'probably did more + +than any other outfit to plan the Communist attack on the + +Chicago police during the 1968 Democratic Convention.'"45 In + +publishing these statements throughout Chicago, the managing + +editor of the Birch Society newsletter made no effort to verify + +or substantiate the charges against the attorney.46 + + The Supreme Court held in Gertz that while First + +Amendment considerations protect publications about public + +officials47 and about "public figures"48, requiring a showing of + +"actual malice" before defamation damages could be recovered, + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 12 + +the same was not true for defamation suits brought by private + +citizens49, a group to which the attorney was held to belong.50 + +Private citizens were seen as deserving more protections from + +defamation than public officials or public figures, so they were + +not required to show "actual malice" as a precondition to + +recovery.51 The Court then left it to the states to decide the + +precise standard of liability for defamation of private + +individuals, so long as liability without fault was not the + +standard.52 + + By Gertz, then, the appropriate standard of liability + +for publicizing defamation of private parties falls somewhere + +below actual malice and above strict liability. The problem with + +defining the defamation standard for computerized BBS operators, + +however, is a lack of uniform standards. In such circumstances, + +the objective "reasonable person" standard will likely be + +applied to the SYSOP's actions.53 Several cases may be usefully + +applied by analogy. + + The court in Hellar v. Bianco54 held that a bar + +proprietor could be responsible for not removing a libellous + +message concerning the plaintiff's wife that appeared on the + +wall of the bar's washroom after having been alerted to the + +message's existence.55 The court noted that "persons who invite + +the public to their premises owe a duty to others not to + +knowingly permit their walls to be occupied with defamatory + +matter.... The theory is that by knowingly permitting such + +matter to remain after reasonable opportunity to remove [it], + +the owner of the wall or his lessee is guilty of republication + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 13 + +of the libel."56 The Hellar court then left the ultimate + +determination of the bar owner's negligence to the jury.57 This + +holding seems to be in accord with the Restatement of Torts, + +which provides: + + + + PUBLICATION: + (2) One who intentionally and unreasonably + fails to remove defamatory matter that + he knows to be exhibited on land or + chattels in his possession or under his + control is subject to liability for its + continued publication.58 + + + Contrarily, however, the Ohio court of appeals in Scott + +v. Hull59 found that the building owner and agent who had + +control over a building's maintenance were not responsible for + +libel damages for graffiti inscribed by an unknown person on an + +exterior wall.60 The court distinguished Hellar by noting that + +in Hellar the bartender constructively adopted the defamatory + +writing by delaying in removing it after having been expressly + +asked to do so: + + + + "It may thus be observed from these cases + that where liability is found to exist it is + predicated upon actual publication by the + defendant or on the defendant's ratification + of a publication by another, the ratification + in Hellar v. Bianco...consisting of at least + the positive acts of the defendants in + continuing to invite the public into their + premises where the defamatory matter was on + view after the defendants had knowledge of + existence of same."61 + + + The Scott court held that defendants could only be + +responsible for publishing a libellous remark through a positive + +act, not nonfeasance; thus, their mere failure to remove the + +graffiti from the building's exterior after having it called to + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 14 + +their attention was held not to be a sufficient basis of + +liability.62 + + A situation similar to Scott arose recently in Tackett + +v. General Motors Corporation.63 There, an employee brought a + +libel suit against his employer for, inter alia, failing to + +remove allegedly defamatory signs from the interior wall of its + +manufacturing plant after having notice of their existence. One + +large sign remained on the wall for two to three days while a + +smaller one remained visible for seven to eight months.64 + +Instead of focussing on the Scott malfeasance/nonfeasance + +test,65 the Tackett court considered defendant's implied + +adoption of the libellous statement to be the correct basis of + +liability.66 While saying that failure to remove a libellous + +message from a publicly-viewed place may be the equivalent of + +adopting that statement, and noting that Indiana would follow + +the Restatement view "when the time comes,"67 the Tackett court + +held that the Restatement view could be taken too far. Citing + +Hellar, the court wrote: + + + + The Restatement suggests that a tavern owner + would be liable if defamatory graffiti + remained on a bathroom stall a single hour + after the discovery [Citation to Hellar]. The + common law of washrooms is otherwise, given + the steep discount that readers apply to such + statements and the high cost of hourly + repaintings of bathroom stalls [Citation to + Scott]. The burden of constant vigilance + exceeds the benefits to be had. A person is + responsible for statements he makes or + adopts, so the question is whether a reader + may infer adoption from the presence of a + statement. That inference may be unreasonable + for a bathroom wall or the interior of a + subway car in New York City but appropriate + for the interior walls of a manufacturing + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 15 + + plant, over which supervisory personnel + exercise greater supervision and control. The + costs of vigilance are small (most will be + incurred anyway), and the benefits + potentially large (because employees may + attribute the statements to their employer + more readily than patrons attribute graffiti + to barkeeps).68 + + + According to this reasoning, then, the location and + + +length of time the libel is allowed to appear plays an integral + + +part in determining whether a given defendant has adopted the + + +libel, and thus has published it. + + + An application of the foregoing analysis to the issue + + +at hand highlights the need for greater care in allowing the + + +posting of electronic mail messages on a BBS. The Tackett court + + +noted that while the content of graffitti scrawled on bathroom + + +walls might be subject to healthy skepticism by its readers, the + + +same might not be true for other locations such as interiors of + + +subway cars or manufacturing plant walls.69 If this is true, + + +then it is reasonable to assume that a defamatory message + + +displayed in a forum for the exchange of ideas is more apt to be + + +taken seriously by its readers - especially when the libellous + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 16 + +message purports to be written by the subject of the libel.70 + + + Further, the Tackett court indicated that the high cost + + +of repainting bathroom stalls by the hour outweighed its + + +perceptible benefits. The same is not true for electronic BBSes, + + +where the costs of prevention are minimal in light of the threat + + +of widespread harm to users' reputations.71 + + + 2. Damages + + + Once the plaintiff establishes that the SYSOP failed to + + +act reasonably in removing statements known to be libellous from + + +his BBS or in negligently failing to prevent their appearance + + +there,72 no proof of special damages is necessary as libel is + + +actionable per se.73 The state's interest in protecting private + + +reputations has been held to outweigh the reduced constitutional + + +value of speech involving matters of no public concern such that + + +presumed and punitive damages may be recovered absent a showing + + +of actual malice.74 + + + The proper gauge of liability has again raised some + + +questions.75 One writer has noted that if the burden of proof is + + + + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 17 + +to rest on the plaintiff, she may be at a disadvantage in + + +producing sufficient evidence to demonstrate negligent conduct + + +on the part of the SYSOP.76 Solutions to this problem have + + +ranged from a rebuttable presumption of negligence in favor of + + +the plaintiff77 to adoption of a set of standards similar to + + +those set out in the Federal Fair Credit Reporting Act.78 In + + +either event, damage awards for computer abuse have been + + +addressed both by federal and state law.79 + + + 3. Suggestions + + + Because computerized BBSes are still a relatively new + + +technological phenomena, consistent standards for SYSOPs' duties + + +have yet to be developed.80 However, at least one users' group + + +has adopted a voluntary code of standards for electronic BBSes, + + +applicable to both users and SYSOPs of boards open to the + + +general public: + + + + + + SCOPE: + This Minimum Code of Standards applies to + both users and SYStem Operators (SYSOPs) of + electronic bulletin boards available to the + general public. + FREEDOM OF SPEECH AND IDEAS + Each user and SYSOP of such systems shall + actively encourage and promote the free + exchange and discussion of information, + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 18 + + ideas, and opinions, except when the content + would: + - Compromise the national security of the + United States. + - violate proprietary rights. + - violate personal privacy, + - constitute a crime, + - constitute libel, or + - violate applicable state, federal or + local laws and regulations affecting + telecommunications. + DISCLOSURE + Each user and SYSOP of such system will: + - disclose their real name, and + - fully disclose any personal, financial, + or commercial interest when evaluation + any specific product or service. + PROCEDURES + SYSOPS shall: + - review in a timely manner all publicly + accessible information, and + - delete any information which they know + or should know conflicts with this code + of standards. + A 'timely manner' is defined as what is + reasonable based on the potential harm that + could be expected. Users are responsible for: + - ensuring that any information they + transmit to such systems adheres to this + Minimum Code of Standards, and + - upon discovering violations of the + Minimum Code of Standards, notifying the + SYSOP immediately. + IMPLEMENTATION + Electronic bulletin board systems that choose + to follow this Minimum Code of Standards + shall notify their users by publishing this + Minimum Code, as adopted by the [Capitol PC + Users Group], and prominently display the + following: + 'This system subscribes to the Capitol PC + Users Group Minimum Code of Standards for + electronic bulletin board systems.'81 + + + While non-binding on publicly-accessible BBSes, the + +above guidelines furnish sound basic policies that all SYSOPs + +might use in shielding themselves from defamation liability. Our + +hypothetical at the beginning of this Comment described a + +situation where a malicious intruder was able to access and + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 19 + +masquerade as a validated user on a BBS; the following are some + +additional computer security measures that the reasonable SYSOP + +could conduct to avoid that situation: + + a. Special "screening" software: One writer has + +suggested discouraging potential BBS misuse through programming + +the BBS to reject those messages containing common defamatory + +and obscene language;82 such a program would discard a message + +containing any of those terms and would presumably notify the + +SYSOP of their presence. Drawbacks to this procedure are that + +computer programs cannot understand all the nuances of libellous + +messages83 and would thus lead to the rigid deletion of many + +otherwise legitimate messages.84 + + b. Unique passwords: A more fundamental and + +economical approach would be for the SYSOP to both notify all + +new users about the potential for computerized BBS abuse and to + +encourage their use of a unique password on each BBS they call. + +This would have the practical effect of keeping a masquerader + +from using the names and passwords found on one BBS to + +wrongfully access and masquerade on other BBSes. A drawback to + +this procedure is that the truly malicious masquerader may still + +discover a BBS' most sensitive user records by way of a renegade + +computer program called a "trojan horse".85 However, one could + +speculate that the SYSOP acts reasonably in informing potential + +users of the existing threat and in helping them avoid it. + + c. Encryption: This is essentially a way for the + +SYSOP to make the users' passwords unique for them. The power of + +the computer allows complex algorithms to be applied to data to + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 20 + +encode it in such a way that, without the key to the code, it is + +virtually impossible to decode the information.86 This technique + +would have the added benefit of forcing the masquerader, upon + +accessing the BBS with a trojan horse program, to search for the + +secret decoding algorithm in addition to the BBS' secret user + +files. Indeed, it is conceivable that a special encryption or + +password could be devised to allow only the SYSOP access to the + +BBS' decoding algorithm. However, encryption involves a + +significant overhead - impractical for most small, privately- + +operated BBSes - and is more frequently used to protect messages + +from one system to another where the data is vulnerable to + +interception as it passes over transmission lines.87 + + d. Prompt damage control: In accord with Hellar,88 + +the Restatement (Second) of Torts,89 and possibly Tackett,90 a + +SYSOP acts reasonably in promptly assisting the libelled user to + +partially reverse the effects of the masquerader's actions. + +Recall that in those instances a defendant was held to have + +impliedly adopted a defamatory statement by acting unreasonably + +slowly in removing it from his property once having been made + +aware of it.91 While it may be unreasonable to expect the SYSOP + +to monitor each message posted every day - especially where the + +defamatory message appears to have been left by the true user - + +it is not too much to require the SYSOP to quickly remedy + +security flaws in his BBS as they are pointed out to him.92 To + +this end, the SYSOP has several options. In situations where the + +defaming user libels another without masquerading as the + +libelled party, the SYSOP could simply delete the defamer's + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 21 + +account. In situations where a user masquerading as another + +posts a libellous message, the SYSOP could publish a retraction + +to all his subscribers, urging them to use a different password + +on each BBS they call. Further, where a masquerader published + +the libel, the SYSOP should offer his full cooperation to the + +maligned user in tracking down the time and date the libellous + +message was posted93 in order to better limit the SYSOP's + +liability. + + Certain BBS SYSOPs claim that holding them liable for + +information appearing on their BBSes violates their First + +Amendment rights by restricting their right to free speech94 and + +by holding them responsible for the libel perpetrated by the + +masquerader. It has been suggested that the SYSOP should be held + +to the same standard of liability as a neighborhood supermarket + +which furnishes a public bulletin board:95 just as the + +supermarket would not be liable for posting an advertisement for + +illicit services, so should the BBS SYSOP escape liability for + +libellous messages left on his board, especially when its poster + +appears to be a validated user.96 + + However, this comparison lacks merit for the reasons + +given by the Seventh Circuit in Tackett v. General Motors + +Corporation.97 The defendant's liability in that case rested on + +its publication of libel by implicitly adopting the statement.98 + +Defendant's failure to remove a defamatory sign painted on one + +of the interior walls of its factory for seven or eight months + +after discovering its presence was such that "[a] reasonable + +person could conclude that Delco 'intentionally and unreasonably + + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 22 + +fail[ed] to remove' this sign and thereby published its + +contents."99 + + There would certainly be accomplice liability if the + +supermarket unreasonably delayed removing an advertisement for + +illegal services from its bulletin board once it was made aware + +of it. The market could be seen as having adopted the ad's + +statements by not acting responsibly to its viewing public. + +Similarly, a SYSOP would be liable for defamatory messages + +posted on his BBS - even by what appears to be the true user - + +if he fails to act reasonably by using his computer skill to + +eviscerate the libel.100 While the computerized BBS may be + +nothing more than a hobby of the SYSOP, the speed with which it + +can disseminate potentially damaging information among its users + +demands the standards of responsibility described above. + + C. Defamation Liability of the Masquerader + + 1. Degree of fault required + + It should be noted that the liability and proof issues + +concerning the SYSOP and masquerader are inverse. As to the + +SYSOP who allows libellous messages to be posted on his BBS, his + +liability may be inferred simply by those messages having + +appeared there;101 however, his degree of fault - actual malice + +or simple negligence - is subject to debate.102 Conversely, + +while the masquerader's degree of fault is clearly evident,103 + +tracing that fault back to him is a more elusive matter.104 The + +requisite degree of fault for masqueraders is set out in federal + +and state law.105 + + 2. Damages + + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 23 + + Assuming arguendo that the masquerader's defamatory + +publications have been successfully traced back to him by the + +plaintiff, actual and punitive damages may then be recovered + +from him based on his knowledge of the publication's falsity or + +reckless disregard for its truth.106 Federal and state law have + +also specified certain remedies.107 + + + +III PROBLEMS OF PROOF + + A. Proof of SYSOP's Actions + + We have seen that while the appropriate degree of fault + +for a SYSOP to be liable for defamatory messages appearing on + +his BBS is subject to dispute,108 a showing that the defamation + +appeared there due to the SYSOP's negligence is much more + +capable of resolution.109 The jury should be made aware of the + +actual validation/security procedures practiced by the SYSOP and + +should weigh them in light of the prevailing practice.110 + +Several facets of an emerging standard of care for SYSOPs have + +already been suggested in this Comment,111 and the SYSOP's + +adherence to them could be shown through users' testimony. + + B. Proof of Masquerader's Actions + + In contrast with the degree of fault required to + +establish the SYSOP's publication of the libellous message, the + +degree of fault for the masquerader is much less subject to + +debate. The masquerader's actions are not likely to be + +considered merely inadvertent or negligent.112 However, because + +the masquerader has intentionally discovered and usurped the + +user's name and password, he appears to be that user on all + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 24 + +computer records. Tracing the masquerader's defamatory + +publication back to him thus encounters some important + +evidentiary barriers: the maligned user is forced to rely on + +computerized records produced by the BBS and phone company in + +trying to link the masquerader's libellous publication back to + +him.113 We turn now to consider the evidentiary hurdles to be + +overcome in tracing the libellous communication to its true + +source. + + 1. The Hearsay Rule & Business Records Exception + + The first evidentiary obstacle to connecting the + +masquerader with his libellous publication is the hearsay rule. + +As defined by the Federal Rules of Evidence, hearsay is "a + +statement, other than one made by the declarant while testifying + +at the trial or hearing, offered in evidence to prove the truth + +of the matter asserted";114 as such, it is inadmissible as + +evidence at trial.115 Computer-generated evidence is subject to + +the hearsay rule, not because it is the "statement of a + +computer", but because it is the statement of a human being who + +entered the data.116 To the extent the plaintiff user relies on + +computer-generated records to show that a call was placed from + +the masquerader to the BBS at the time and date in question, + +then, her evidence may be excluded. + + However, numerous exceptions to the hearsay rule have + +developed over the years such that evidence which might + +otherwise be excluded is deemed admissible. The most pertinent + +hearsay exception as applied to computerized evidence is the + +"business records exception", which admits into evidence any + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 25 + +records or data compilations, so long as (1) they were made + +reasonably contemporaneously with the events they record; (2) + +they were prepared/kept in the course of a regularly conducted + +business activity; and (3) the business entity creating these + +records relied on them in conducting its operations.117 The + +veracity of the compvter seco0ds and of the actual business + +practices are shown by the record custodian's or other qualified + +witness' testimony, unless the circumstances indicate lack of + +trustworthiness.118 The term "business" as used in this rule + +includes callings of every kind, whether or not conducted for + +profit.119 + + Statutes and judicial decisions in several states have + +gradually recognized that the business records exception extends + +to include computer-generated records.120 This is largely due to + +(1) modern business' widespread reliance on computerized record- + +keeping, (2) the impracticability of calling as witnesses every + +person having direct personal knowledge of the records' + +creation, and (3) the presumption that if a business was willing + +to rely on such records, there is little reason to doubt their + +accuracy.121 + + Using this exception to the hearsay rule, plaintiff + +user would most likely seek to admit the BBS' computer-generated + +username/password log-in records plus the phone company's call + +records to establish the connection between the masquerader's + +telephone and the BBS at the precise instant the libellous + +message was posted.122 As an initial matter, however, plaintiff + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 26 + +must first lay a foundation for both the BBS' and phone + +company's computer-generated business records. + + A sufficient foundation for computer-generated records + +was found recently to exist in People v. Lugashi.123 There, the + +California Court of Appeal affirmed a conviction of grand theft + +based on evidence adduced from computer-generated bank records. + +Defendant, an oriental rug store owner, had been convicted of + +fraudulently registering thirty-seven sales on counterfeit + +credit cards. The issuing banks became suspicious of criminal + +activity when charge card sales data from defendant's store + +showed 44 fraudulent uses of charge cards at defendant's store + +within only five weeks.124 As each fraudulent credit card + +transaction was completed, defendant registered the sale + +simultaneously with the banks' computers.125 Each night, as + +standard bank practice, the banks then reduced the computer + +records of credit card transactions to microfiche. Information + +gleaned from these microfiche records was entered against + +defendant at trial.126 + + The California Court of Appeal recognized the trial + +court judge's wide discretion in determining whether a + +sufficient foundation to qualify evidence as a business record + +has been laid.127 It held that defendant's allocations of error + +were without merit since defendant himself had acknowledged that + +the bank's computer entries memorialized in the microfiche + +record were entered simultaneously as they occurred in the + +regular course of business.128 Further, the Court of Appeals + +dismissed defendant's claim that only a computer expert could + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 27 + +supply testimony concerning the reliability of the computer + +record: + + + + Appellant's proposed test incorrectly presumes computer + data to be unreliable, and, unlike any other business + record, requires its proponent to disprove the + possibility of error, not to convince the trier of fact + to accept it, but merely to meet the minimal showing + required for admission.... + The time required to produce this additional [expert] + testimony would unduly burden our already crowded trial + courts to no real benefit.129 + + + The Lugashi court then followed the bulk of other + +jurisdictions adopting similar analyses and upholding admission + +of computer records with similar or less foundational showings + +over similar objections.130 + + As to admission into evidence of telephone companies' + +computer-generated call records under the business records + +exception, courts have evinced a similar attitude to that in + +Lugashi. In State v. Armstead,131 a prosecution for obscene + +phone calls, the trial court was held to have properly admitted + +computer printouts showing that calls had been made from + +defendant's mother's telephone, despite defendant's contention + +that the witness who was called to lay the foundation had not + +been personally responsible for making the record.132 Because + +the printout represented a simultaneous self-generated record of + +computer operation, the court held it was therefore not + +hearsay.133 + + In an Ohio prosecution for interstate telephone + +harassment, it was held no error was committed in admitting + +defendant's computerized phone statement under the Business + +Records exception which showed that telephone calls had been + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 28 + +made from defendant's phone in Ohio to various numbers in + +Texas.134 A sufficient foundation for the admission of business + +records under Federal Rules of Evidence 803(6) was established + +when a telephone company witness identified the records as + +authentic and testified they were made in the regular course of + +business.135 + + Applying the foregoing analyses to BBSes, the plaintiff + +user would establish a foundation for the correlated BBS136 and + +telephone company phone logs by showing that (1) they were made + +contemporaneously with the posting of the libellous message;137 + +(2) they were prepared/kept in the course of a regularly + +conducted business activity, since both the BBS and telephone + +company consistently maintain accounts of all persons who use + +their services; and (3) the BBS and telephone company relied on + +those records for billing purposes.138 Once such a foundation is + +laid, the trial court has wide discretion in admitting business + +records into evidence.139 + + 2. Authentication & the Voluminous Records Exception + + The second evidentiary barrier encountered in tracing + +the masquerader's libellous messages back to him is proving his + +authorship of the libel, or "authenticating" the computerized + +records.140 The computer-generated phone and BBS records showing + +that a call from a certain phone number at a particular date and + +time resulted in a libellous message being published must + +somehow be linked to the masquerader. + + The Federal Rules of Evidence provide in pertinent + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 29 + +part: + + + + (a) General provision. The requirement of + authentication or identification as a condition + precedent to admissibility is satisfied by + evidence sufficient to support a finding that the + matter in question is what its proponent claims. + (b) Illustrations. By way of illustration only, and + not by way of limitation, the following are + examples of authentication or identification + conforming with the requirements of this rule:... + (6) Telephone conversations. Telephone + conversations, by evidence that a call was + made to the number assigned at the time by + the telephone company to a particular person + or business, if + (A) in the case of a person, circumstances, + including self-identification, show the + person answering to be the one called, + or + (B) in the case of a business, the call was + made to a place of business and the + conversation related to business + reasonably transacted over the + telephone....141 + + + The question of whether a writing is properly + +authenticated is primarily one of law for the court; if the + +court decides the question affirmatively, it is ultimately for + +the jury.142 The court will make no assumptions as to the + +authenticity of documents in deciding their initial + +admissibility.143 The difficulty presented here is that the + +Federal Rules of Evidence seem to require authentication of + +telephone calls by reference to their specific content.144 The + +specific content of a given phone call is not demonstrated by + +phone logs showing merely the date and time the call occurred. + + The authentication of extrinsic documents may be + +subject to a "best evidence rule" objection. As stated in + +Federal Rule of Evidence 1002: + + + + REQUIREMENT OF ORIGINAL: To prove the contents of a + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 30 + + writing, recording, or photograph, the original of that + writing, recording, or photograph is required, unless + provided otherwise in these rules or by an act of + Congress.145 + + + Since its introduction in the 18th century, various + +rationales have been posited for this rule.146 While earlier + +writers asserted that the rule is intended to prevent fraud, + +most modern commentators agree that the rule's main purpose is + +to convey to the court the exact operative effect of the + +writing's contents.147 + + However, at least one jurisdiction has implicitly + +equated compliance with the business records exception with the + +Best Evidence Rule. In Louisiana v. Hodgeson,148 the defendant + +in a manslaughter trial contended that a printout of her + +telephone bill, offered to show communications between her and a + +third party, was not authenticated.149 The court, while making + +no specific reference to the authentication point, rejected + +defendant's contention, noting that the information from the + +computer's storage was the company's business record and that it + +was accessible only by printout.150 + + Similarly, in an Indiana bank robbery prosecution,151 + +the state offered microfiche copies of the telephone company's + +computerized records showing certain telephone calls from + +defendant. On appeal, defendant argued that these documents were + +not authenticated because they were not the "original or first + +permanent entry," and that they therefore should not have been + +admitted into evidence. The court disagreed, saying that a + +duplicate was admissible to the same extent as an original + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 31 + +unless a "genuine issue" were raised as to the authenticity of + +the original.152 + + By these precedents, then, provided plaintiff user + +establishes that both the telephone and BBS user records were + +prepared in accordance with the business records exception,153 + +the fact that a call from the masquerader's phone is shown to + +have occurred at the same instant the libellous message was + +posted may be sufficient to authenticate that the call was made + +by the masquerader. Other circumstantial evidence adduced by + +plaintiff user would strengthen this inference.154 + + Another authentication hurdle in plaintiff's case is + +the requirement that the entire original record sought to be + +authenticated be produced.155 This requirement can prove highly + +impractical in situations where there are vast numbers of + +individual records extending over long periods of time.156 + +Requiring plaintiff to produce the entire body of these records + +would be unduly expensive and time-consuming. What is more, if + +plaintiff were to attempt to summarize vast computerized + +business data compilations so as to introduce those summaries + +into evidence without producing the complete body of computer + +records, such summaries might not be admissible on the grounds + +that they were not made "in the regular course of business."157 + + However, an exception to strict authentication + +requirements of the Federal Rules of Evidence has been + +developed. Rule 1006 provides: + + + + The contents of voluminous writings, recordings, or + photographs which cannot conveniently be examined in + court may be presented in the form of a chart, summary, + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 32 + + or calculation. The originals, or duplicates, shall be + made available for examination or copying, or both, by + other parties at reasonable time and place. The court + may order that they be produced in court.158 + + + In Cotton v. John W. Eshelman & Sons, Inc.,159 + +summaries of certain computerized records were held properly + +admitted into evidence on the theory that "[w]hen pertinent and + +essential facts can be ascertained only by an examination of a + +large number of entries in books of account, an auditor or + +expert examiner who has made an examination and analysis of the + +books and figures may testify as a witness and give summarized + +statements of what the books show as a result of his + +investigation, provided the books themselves are accessible to + +the court and to the parties."160 Under this precedent, + +plaintiff user would only need to produce the pertinent parts of + +the computerized records, as determined by an impartial auditor. + + + +IV. CONCLUSION + + It is difficult to overestimate the ease with which + +computers now enable us to compile and exchange information. + +Computerized "bulletin boards" run on personal microcomputers by + +private persons and businesses are examples of this enhanced + +form of communication. Users can trade computer programs and + +exchange a wealth of ideas, opinions, and personal information + +through such forums. + + The advantages of this process break down, however, + +when malicious users abuse the system and BBS SYSOPS + +intentionally or negligently allow this to occur. The nature of + +computerized data is such that tortious misinformation may + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 33 + +easily be spread to thousands of users before it is discovered. + +Because the potential for harm to reputation is so tremendous, + +appropriate standards of liability and methods of proof must be + +addressed. + + The requisite degree of fault in libelling private + +persons is less than that for libelling public officials/public + +figures, and may be established as against a SYSOP by a simple + +showing of his negligent failure to observe reasonably minimal + +computer security measures. The basis of liability for a + +masquerader who intentionally misappropriates another's private + +information is even less subject to debate. + + Two main evidentiary hurdles face the plaintiff seeking + +to link the masquerader with his libellous message through + +reliance on computer-generated records. First, the hearsay rule + +automatically excludes all evidence produced out-of-court that + +is being offered to prove the truth of the matter at hand. + +Second, the authentication requirement demands that the + +masquerader's connection to the entire body of proffered + +computer records be established. + + However, certain exception to both of these limitations + +ease the plaintiff's burden. First, the business records + +exception to the hearsay rule admits computer records into + +evidence if they (1) were made reasonably contemporaneously with + +the events they record; (2) were prepared/kept in the course of + +a regularly conducted business activity; and (3) the business + +entity creating these records relied on them in conducting its + +operations. Both BBS and telephone company records may come + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 34 + +under this exception. Second, the voluminous writings exception + +allows the contents of voluminous computerized records which + +cannot conveniently be examined in court to be presented in the + +form of a summary. So long as the original records or duplicates + +thereof are available for examination by other parties at + +reasonable times and places, the entire data compilation need + +not be produced. Plaintiff should employ both of these + +exceptions in an effort to convince a jury by a preponderance of + +the evidence that the masquerader has abused his computer skills + +and has damaged plaintiff's reputation. + + + ============================================== + +From telecom@eecs.nwu.edu Sat Apr 21 01:07:10 1990 +Received: from delta.eecs.nwu.edu by gaak.LCS.MIT.EDU via TCP with SMTP + id AA15278; Sat, 21 Apr 90 01:06:53 EDT +Resent-Message-Id: <9004210506.AA15278@gaak.LCS.MIT.EDU> +Received: from Sun.COM by delta.eecs.nwu.edu id aa15095; 20 Apr 90 14:45 CDT +Received: from EBay.Sun.COM (male.EBay.Sun.COM) by Sun.COM (4.1/SMI-4.1) + id AA20305; Fri, 20 Apr 90 12:46:45 PDT +Received: from khayyam.EBay.Sun.COM by EBay.Sun.COM (4.1/SMI-4.1) + id AA06083; Fri, 20 Apr 90 12:46:36 PDT +Received: by khayyam.EBay.Sun.COM (4.0/SMI-4.0) + id AA08069; Fri, 20 Apr 90 12:42:02 PDT +Date: Fri, 20 Apr 90 12:42:02 PDT +From: Lang Zerner +Message-Id: <9004201942.AA08069@khayyam.EBay.Sun.COM> +To: telecom@eecs.nwu.edu +Subject: Sysops and libel liability -- endnotes +Resent-Date: Sat, 21 Apr 90 0:05:23 CDT +Resent-From: telecom@eecs.nwu.edu +Resent-To: ptownson@gaak.LCS.MIT.EDU +Status: RO + +Here are the endnotes to the paper I submitted in a separate message. + +Be seeing you... +==Lang + +======= + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 35 + + + + ENDNOTES + + +1. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974). + +2. These interests can cover anything from science fiction + to gourmet cooking. Uyehara, Computer Bulletin Boards: + Let the Operator Beware, 14 Student Lawyer 28 (1986). + +3. Id., at 30. + +4. The data service Compuserve is one such national BBS + run for profit by business organizations. Uyehara, at + 28. Other examples of large databases of interest to + the legal profession are computerized research services + such as LEXIS and WESTLAW. + +5. Uyehara, at 28; Manning, Bulletin Boards: Everybody's + Online Services, Online, Nov. 1984, at 8,9. "Modem" is + defined infra, note 17 and accompanying text. + +6. "...computer bulletin boards offer their users + important benefits. An individual can use a bulletin + board to express his opinion on a matter of public + interest. He may find a review of a product he is + considering buying. He may find a useful piece of + software. An individual might also use the bulletin + board to ask a technical question about a specific + computer program." Note, Computer Bulletin Board + Operator Liability For User Misuse, 54 Fordham L.Rev. + 439, 440 (1985) (Authored by Jonathan Gilbert); see + also Lasden, Of Bytes And Bulletin Boards, N.Y.Times, + August 4, 1985, sec. 6, at 34, col. 1, where the author + notes computer users may now use BBSes to voice their + opinions directly to State Senators' offices. + +7. "Virus" Hits Nation's Research Computers, San Jose + Mercury News, Nov. 4, 1988, at 1, col. 1. + +8. "It is estimated that the theft of long-distance + services and software piracy each approximate $100 + million a year; credit card fraud via computers costs + about $200 million annually." Pittman, Computer + Security In Insurance Companies, 85 Best's Rev. - Life- + Health Ins. Edition, Apr. 1985 at 92. + +9. Schiffres, The Shadowy World of Computer "Hackers," + U.S. News & World Report, June 3, 1985, at 58. + +10. Pollack, Free Speech Issues Surround Computer Bulletin + Board Use, N.Y. Times, Nov. 12, 1984, note 1, at D4, + col. 6. + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 36 + +11. Note, 54 Fordham L.Rev. 440-441 (1985). + +12. Poore and Brockman, 8 Nat'l L.J. 14, (1985). + +13. See infra, Topic III, Problems of Proof. + +14. The uncertainty revolves around how to define BBSes. + When viewed as analogous to newspapers and other media, + SYSOPS would be responsible for any message posted on + their systems, much as newspaper editors are + responsible for articles appearing in their medium. + Uyehara, 14 Student Lawyer 30 (1986). But when BBSes + are compared to a bulletin board found in a public hall + or supermarket, the liability issue is focused more on + those actually posting the messages rather than on the + board's owner. Id., at 30. This Comment suggests that + BBS SYSOPs be held to a reasonable standard of care + emerging specifically for their endeavors. See infra, + Topic II. + +15. Poore and Brockman, 8 Nat'l L.J. 14, (1985). Another + writer has noted that Compuserve now has over 200,000 + users making use of nearly 100 diverse databases. + Lasden, Of Bytes And Bulletin Boards, N.Y. Times, + August 4, 1985, sec. 6, at 34, col. 1. + +16. Poore and Brockman, 8 Nat'l L.J. 14 (1985). + +17. 14 Am Jur. POF 2d Computer-Generated Evidence Sec. 11 + (1977). + +18. Note, 54 Fordham L.Rev. 439, 446 (1985). + +19. Id. + +20. See "Account," infra, note 25 and accompanying text. + +21. Garfinkel, An Introduction to Computer Security, 33 + Prac. Law.41-42 (1987). + +22. Id. + +23. See infra, notes 25 and 27 and accompanying text. + +24. Some more sophisticated operating systems provide + greater access control by (1) recording unauthorized + attempts at entry; (2) recording those attempts and + sending a warning to the perpetrator; and (3) keeping + the perpetrartor off the system permanently until + he/she is reinstated by the computer's security + administrator or SYSOP. Balding, Computer Breaking and + Entering: The Anatomy of Liability, 5 Computer Lawyer, + Jan. 1988, at 6. + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 37 + +25. Garfinkel, An Introduction to Computer Security, 33 + Prac. Law. 42 (1987). + +26. Id. + +27. Id. "A password is a secret word or phrase that should + be known only to the user and the computer. When the + user first attempts to use the computer, he must first + enter the password. The computer then compares the + typed password to the stored password and, if they + match, allows the user access." + +28. Id., at 42 and 46. + +29. 14 Am. Jur. POF 2d Computer-Generated Evidence Sec. 11 + (1977). + +30. 54 Fordham L.Rev. 439, note 2 (1985). + +31. Restatement (Second) of Torts Sec. 568(1) (1976). + +32. Restatement (Second) of Torts Sec. 577(1) (1976). + +33. Restatement (Second) of Torts Sec.559 (1976). + +34. Veeder, The History and Theory of the Law of + Defamation, 3 Colum. L.Rev. 546, 569-571 (1903). + +35. Restatement (Second) of Torts Sec. 622 (1976). + +36. Restatement, Torts Sec. 568, comment d (1938). + +37. Shor v. Billingley, 4 Misc.2d 857, 158 N.Y.S.2d 476 + (Sup. Ct. 1956), aff'd mem., 4 App.Div. 2d 1017, 169 + N.Y.S.2d 416 (1st Dep't. 1957). + +38. Torts: Defamation: Libel-Slander Distinction: + Extemporaneous Remarks Made on Television Broadcast: + Shor v. Billingley, 4 Misc. 2d 857, 158 N.Y.S.2d 476 + (Sup.Ct. N.Y. County 1957), 43 Cornell L.Q. 320, 322 + (1957) (Authored by Stephen A. Hochman). + +39. Id. + +40. 376 U.S. 254, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964), + motion denied 376 U.S. 967, 84 S.Ct. 1130, 12 L.Ed.2d + 83. + +41. 376 U.S. 254, 273. + +42. 376 U.S. 254, 280. + +43. 418 U.S. 323, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974). + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 38 + +44. Gertz v. Robert Welch, Inc., 418 U.S. 323, 326. + +45. Id. + +46. Id., at 327. + +47. "...those who hold governmental office may recover for + injury to reputation only on clear and convincing proof + that the defamatory falsehood was made with knowledge + of its falsity or with reckless disregard for the + truth." Gertz v. Robert Welch, Inc., 418 U.S. 323, 342. + "An individual who decides to seek governmental office + must accept certain necessary consequences of that + involvement in pubic affairs. He runs the risk of + closer public scrutiny than might otherwise be the + case." Id., at 344. + +48. "...[A]n individual may attain such pervasive fame and + notoriety that he becomes a public figure for all + purposes and in all contexts. More commonly, an + individual voluntarily injects himself or is drawn into + a particular public controversy and thereby becomes a + public figure for a limited range of issues. In either + case such persons assume special prominence in the + resolution of public questions." 418 U.S. 323, 351. + +49. "Even if the foregoing generalities do not obtain in + every circumstance, the communications media are + entitled to act on the assumption that public officials + and public figures have voluntarily exposed themselves + to the increased risk of injury from defamatory + falsehood concerning them. No such assumption is + justified with respect to a private individual. He has + not accepted public office or assumed an 'influential + role in ordering society.' Curtis Publishing Co. v. + Butts, 388 U.S., at 164 ...He has relinquished no part + of his interest in the protection of his own good name, + and consequently he has a more compelling call on the + courts for redress of injury inflicted by the + defamatory falsehood. Thus, private individuals are not + only more vulnerable to injury than public officials + and public figures; they are also more deserving of + recovery." Id., at 345. + +50. "...[P]etitioner was not a public figure. He ... + plainly did not thrust himself into the vortex of this + public issue, nor did he engage the public's attention + in an attempt to influence its outcome." Id., at 352. + +51. Justice Powell noted for the Court that + + "[T]he communications media are entitled to act on + the assumption that public officials and public + figures have voluntarily exposed themselves to + increased risk of injury from defamatory falsehood + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 39 + + concerning them. No such assumption is justified + with respect to a private individual. He has not + accepted public office or assumed an 'influential + role in ordering society....' He has relinquished + no part of his interest in the protection of his + own good name, and consequently he has a more + compelling call on the courts for redress of injury + inflicted be defamatory falsehood. Thus, private + individuals are not only more vulnerable to injury + than public officials and public figures; they are + also more deserving of recovery." Id., at 345. + + +52. Id., at 347. + +53. Keeton, Dobbs, Keeton and Owen, Prosser and Keeton on + Torts, sec. 32, p.174. See also Vaughn v. Menlove, 3 + Bing. (N.C.) 467, 132 Eng.Rep. 490 (1837). + +54. 111 Cal. App. 2d 424, 244 P.2d 757, 28 ALR2d 451 + (1952). + +55. 111 Cal. App. 2d 424, 427. + +56. Id., at 426. + +57. Id, at 427. + +58. Restatement (Second) of Torts Sec. 577(2) (1976). + +59. 22 Ohio App.2d 141, 259 N.E.2d 160 (1970). + +60. Scott v. Hull, 259 N.E.2d 160, 162 (1970). + +61. Id., at 161. + +62. Id., at 162. + +63. 836 F.2d 1042 (7th Cir. 1987). + +64. Id., at 1047. + +65. The Court of Appeals noted the Restatement view and + observed that Indiana law had neither embraced nor + rejected that approach. Id., at 1046. + +66. Id. + +67. Id. + +68. Id., at 1046-47. + +69. Id. + +70. Recall that in our hypothetical a third user + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 40 + + masquerading as another is transmitting messages to + others, revealing embarassing and false information. + +71. BBS systems security and other preventative measures + are discussed more fully infra, Topic 3.d. + +72. Issues in proving the SYSOP's role in publishing the + libellous statement are discussed more fully in Topic + III. A., infra. + +73. Sydney v. MacFadden Newspaper Publishing Corp., 242 + N.Y. 208, 151 N.E. 209, 44 A.L.R. 1419 (1926). See also + Restatement (Second) of Torts Sec. 621 (1976) ("One who + is liable for a defamatory communication is liable for + the proved, actual harm caused to the reputation of the + person defamed.") + +74. Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 + U.S. 749, 86 L.Ed.2d 593, 105 S.Ct. 2939 (1985). + +75. See supra, note 53 and accompanying text. + +76. Note, Protecting the Subjects of Credit Reports, 80 + Yale L.J. 1035, 1051-52, n.88 (1971). + +77. Gertz did not rule out an assumption of defendant's + negligence. See Eaton, The American Law of Defamation + Through Gertz V. Robert Welch, Inc., and Beyond: An + Analytical Primer, 61 Va. L.Rev. 1349 (1975). + +78. 15 U.S.C.A. Sec. 1681 et seq. (1974). Two standards are + proposed there: the first, willful noncompliance, is + defined as equivalent to the New York Times "actual + malice" standard, and violators are liable for actual + and punitive damages. Sec. 1681(n), supra. Presumably + this would apply to the situation where the SYSOP is + dilatory in removing the libellous message. The second + proposed standard, negligent noncompliance, occurs in + the absence of willfulness and results in liability + only for actual damages. Sec. 1681(o), supra. + Situations where the SYSOP failed to adopt reasonable + computer security measures might come under this + category. + +79. 18 U.S.C.S. Sec. 2707(b),(c) (Law. Co-op 1979 & Supp. + 1988) provides in pertinent part: + + (b) Relief. In a civil action under this section, + appropriate relief includes - + (1) Such preliminary and other equitable or + declaratory relief as may be appropriate; + (2) damages under subsection (c); and + (3) a reasonable attorney's fee and other + litigation costs reasonably incurred. + (c) Damages. The court may assess as damages in a + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 41 + + civil action under this section the sum of the + actual damages suffered by the plaintiff and + any profits made by the violator as a result + of the violation, but in no case shall a + person entitled to recover receive less than + the sum of $1,000. + + 18 U.S.C.S. Sec. 2707(e) (Law. Co-op 1979 & Supp. 1988) + limits the civil action under this section to two years + after the date upon which the claimant first discovered + or had a reasonable opportunity to discover the + violation. + As to damage provisions supplied by state law, see + California Penal Code 502(e)(1),(2) (West Pub. 1988): + + (e)(1) In addition to any civil remedy available, + the owner or lessee of the computer, computer + system, computer network, computer program, or data + may bring a civil action against any person + convicted under this section for compensatory + damages, including any expenditure reasonably and + necessarily incurred by the owner or lessee to + verify that a computer system, computer network, + computer program, or data was not altered, damaged, + or deleted by the access. For purposes of actions + authorized by this subdivision, the conduct of an + unemancipated minor shall be imputed to the parent + or legal guardian having control or custody of the + minor, pursuant to the provisions of Section 1714.1 + of the Civil Code. + (2) In any action brought pursuant to this + subdivision the court may award reasonable + attorney's fees to a prevailing party. + + +80. A lawsuit recently filed in the United States District + Court for the Southern District of Indiana may break + new ground in enunciating precisely what BBS SYSOPs' + reasonable duties of care are. Thompson v. Predaina, + Civil Action #IP-88 93C (S.D. Ind. filed 1988). The + complaint alleges, inter alia, invasion of plaintiff + user's privacy, libel, and wrongful denial of access to + the BBS in violation of U.S.C. Title 18, ss 2701 + (a)(2). As to statutory damages available, see infra, + note 105. + +81. Gemignani, Computer Law 33:7 (Lawyers Co-op 1985, Supp. + 1988) (quoting Capitol PC Users Group Minimum Code of + Standards for electronic Bulletin Board Systems, + reprinted in 4 Computer Law Reptr. 89). + +82. Note, 54 Fordham L.Rev. 439, 449 (1985) (Authored by + Jonathan Gilbert). + +83. Id., at 449. + +84. Id., at 449-50. + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 42 + + +85. A "trojan horse" program takes control of the BBS and + allows its sender to access and steal its most + sensitive information. Fites, Johnston and Kratz, The + Computer Virus Crisis, Van Nortrand/Reinhold (1989), at + 39 and 45. + +86. Balding, Computer Breaking and Entering: The Anatomy of + Liability, 5 Computer Law. (January 1988), at 6. + +87. Id. + +88. Hellar v. Bianco, 244 P.2d 757. See supra, note 54 and + accompanying text. + +89. Restatement (Second) of Torts Sec. 577(2) (1976). See + supra, note 58 and accompanying text. + +90. Tackett v. General Motors Corporation, 836 F.2d 1042 + (7th Cir. 1987). See supra, note 63 and accompanying + text. + +91. See note 53, supra, and accompanying text. + +92. It has been suggested that this would be the rough + equivalent of a newspaper publishing a retraction after + discovering what it had printed was defamatory. Note, + 54 Fordham L.Rev. 439, note 55 (1985). BBS operators + should not be held liable in this situation insofar as + they did not know of the nature of the statement at the + time it was made. Restatement (Second) of Torts Sec. + 581 (1977). + +93. Proving the masquerader's actions is discussed more + fully infra, Topic III. B. + +94. Stipp, Computer Bulletin Board Operators Fret Over + Liability for Stolen Data, Wall St. J. Nov. 9, 1984, at + 33, col. 1. + +95. Id. + +96. See Topic I., supra, where the masquerader has + discovered and uses the password and name of the + regular user; he appears for all intents and purposes + to be that regular user. + +97. 836 F.2d 1042 (7th Cir. 1987). + +98. Id., at 1047. + +99. Id. + +100. Indeed, U.S.C. Title 18, Sec. 2702 (Law. Co-op 1979 & + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 43 + + Supp. 1988) proscribes the knowing dissemination of an + electronically stored communication by the SYSOP: + + Sec. 2702. Disclosure of contents + (a) Prohibitions. Except as provided in subsection + (b)- + (1) a person or entity providing an + electronic communication service to the + public shall not knowingly divulge to any + person or entity the contents of a + communication while in electronic storage + on that service; and + (2) a person or entity providing remote + computing service to the public shall not + knowingly divulge to any person or entity + the contents of any communication which + is carried or maintained on that service- + (A) on behalf of, and received by means + of electronic transmission from (or + created by means of computer + processing of communications + received by means of electronic + transmissions from), a subscriber or + customer of such service; and + (B) solely for the purpose of providing + storage or computer processing + services to such subscriber or + customer, if the provider is not + authorized to access the contents of + any such communications for purposes + of providing any services other than + storage or computer processing. + + A similar provision is embodied in Cal. Pen. Code sec. + 502(c)(6) (West Pub. 1988), which provides: + + (c) Except as provided in subdivision (i), + any person who commits any of the + following acts is guilty of a public + offense: + (6) Knowingly and without permission + provides or assists in providing a + means of accessing a computer, + computer system, or computer network + in violation of this section. + + +101. The doctrine of res ipsa loquitor, or "the thing speaks + for itself" warrants the inference of the SYSOP's + negligence, which the jury may draw or not as its + judgement dictates. See Sullivan v. Crabtree, 36 + Tenn.App. 469, 258 S.W.2d 782 (1953). + +102. See discussion under Topic II. B., supra. + +103. As someone who intentionally accesses confidential + password information to masquerade as other users on + other BBSes, the masquerader falls well within the pale + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 44 + + of "actual malice" defined in Gertz v. Robert Welch, + Inc., 418 U.S. 323, 342, supra, note 43 and + accompanying text (a defamatory falsehood was made with + knowledge of its falsity or with reckless disregard for + the truth). + +104. Evidentiary problems involved with proving the + masquerader's actions are discussed more in Topic III. + B., infra. + +105. 18 U.S.C.S. Sec. 2707(a) (Law. Co-op 1979 & Supp. 1988) + describes the masquerader's fault thus: + + (a) Cause of action. Except as provided in section + 2703(e), any provider of electronic + communication service, subscriber, or customer + aggrieved by any violation of this chapter in + which the conduct constituting the violation + is engaged in with a knowing or intentional + state of mind may, in a civil action, recover + from the person or entity which engaged in + that violation such relief as may be + appropriate. + + California Penal Code sec. 502(c) et seq. (West Pub. + 1988) is even more specific: + + (c) Except as provided in subdivision (i), any + person who commits any of the following acts + is guilty of a public offense: + (1) Knowingly accesses and without permission + alters, damages, deletes, destroys, or + otherwise uses any data, computer, + computer system, or computer network in + order to either + (A) devise or execute any scheme or + artiface to defraud, deceive, or + extort, or + (B) wrongfully control or obtain money, + property or data. + * * * + (3) Knowingly and without permission uses or + causes to be used computer services. + (4) Knowingly accesses and without permission + adds, alters, damages, deletes, or + destroys any data, computer software, or + computer programs which reside or exist + internal or external to a computer, + computer system, or computer network. + * * * + (7) Knowingly and without permission accesses + or causes to be accessed any computer, + computer system, or computer network. + + +106. Gertz v. Robert Welch, Inc., 418 U.S. 323, 342. + +107. In addition to the remedies set forth in note 105, + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 45 + + supra, the following federal and state penalties may + apply: + 18 U.S.C.S. Sec. 2701(b),(c) (Law. Co-op 1979 & Supp. + 1988): + + (b) Punishment. The punishment for an offense + under subsection (a) of this seciton is - + (1) if the offense is committed for purposes + of commercial advantage, malicious + destruction or damage, or private + commercial gain - + (A) a fine not more dhan &250,0 +0 or + imprisonment for not more than one + year, or both, in the case of a + first offense under this + subparagraph; and + (B) a fine under this title or + imprisonment for not more than two + years, or both, for any subsequent + offense under this subparagraph; and + (2) a fine of not more than $5,000 or + imprisonment for not more than six + months, or both, in any other case. + (c) Exceptions. Subsection (a) of this section + does not apply with respect to conduct + authorized- + (1) by the person or entity providing a wire + or electronic communications service; + (2) by a user of that service with respect to + a communication of or intended for that + user; or + (3) in section 2703, 2704, or 2518 of this + title. + + For an example of state-mandated damages provisions on + this subject, see California Penal Code sec. 502(d) et + seq. (West Pub. 1988). + +108. See discussion under Topic II. B., supra. + +109. See note 101, supra. + +110. "Custom...bears upon what other will expect the actor + to do, and what, therefore, reasonable care may require + the actor to do, upon the feasibility of taking + precautions, the difficulty of change, and the actor's + opportunity to learn the risks and what is called for + to meet them. If the actor does only what everyone else + has done, there is at least an inference that the actor + is conforming to the communit`'s i`ea of reasonable + behavior." Keeton, Dobbs, Keeton and Owen, Prosser and + Keeton on Torts, sec. 33, p.194. See also James, + Particularizing Standards of Conduct in Negligence + Trials, 5 Vand. L. Rev. 697, 709-714 (1952); Ploetz v. + Big Discount Panel Center, Inc., 402 So.2d 64 (Fla. + App. 1981). + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 46 + + +111. See notes 80-93, supra, and accompanying text. + +112. See note 103, supra. + +113. See Pfau and Keane, Computer Logs Can Pinpoint Illegal + Transactions, Legal Times of Washington, vol. 6, p.16 + (May 14, 1984): "Computers can monitor their own use. + Unlike other such forms of physical evidence such as + guns, computers can keep track of individual users and + other identifying data. Imagine a gun that logs every + instance it is fired or even handled, and shows the + date, time, and activity. Recovery of such a weapon + would be essential to the prosecution. + "Most computers have long had built-in logging + capabilities....The log function was designed to + facilitate billing for the use of computer resources + rather than to assist crime detection. To the extent + that the owner of a smaller computer does not charge + for its use, he or she has no incentive to purchase a + self-executing log. Still, such logs keep surprisingly + accurate records of who is using the computer." + +114. Fed. R. Evid. 801(c). + +115. Fed. R. Evid. 802: "Hearsay is not admissible except as + provided by these rules or by other rules precribed by + the Supreme Court pursuant to statutory authority or by + Act of Congress." Exclusion of hearsay evidence is + grounded on: (1) nonavailability of the declarant for + cross-examination and observance of demeanor; (2) + absence of an oath by the person making the statement; + amd (3) significant risk that the person that the + witness may report proffered statements inaccurately. 2 + Bender, Computer Law, sec. 6.01[2]. + +116. Gemignani, The Data Detectives: Building A Case From + Computer Files, 3 Nat'l L.J. 29 (1981). + +117. Fed. R. Evid. 803(6). See also 2 Bender, Computer Law, + sec. 6.01[4] (1988). + +118. Fed. R. Evid. 803(6). + +119. Id. In current practice records kept by nonprofit + organizations, such as churches, have long been held to + be admissible. Ford v. State, 82 Tex.Cr.R. 638, 200 + S.W. 841 (1918). It is at least arguable that a + computerized BBS, although run as a hobby, falls under + the same classification. + +120. See Iowa Code Ann. Sec. 622.28; People v. Lugashi, 252 + Cal.Rptr 434 (Cal.App. 2 Dist. 1988). + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 47 + +121. See 14 Am.Jur. POF2d Sec. 15 (1977, Supp. 1988). Cf. + United States v. De Georgia, 420 F.2d 889, 2 CLSR 479, + 484 (1969, CA9 Ariz), where it was held that it is + immaterial whether a business record is maintained in a + computer rather than in company books regarding + admissibility of those records, so long as (1) the + trial court requires the proponent of the computerized + records to lay a foundation as to their + trustworthiness, and (2) the opposing party is given + the same opportunity to inquire into the computer's + accuracy as he would have to inquire into the accuracy + of written business records. + +122. The BBS program run on the SYSOP's computer ordinarily + "stamps" the date and time of day each user logs onto + the BBS. A corresponding record is automatically + affixed to each piece of electronic mail posted so that + the reader knows when it was added to the database. + Similarly, the telephone company maintains copious + records of the date and time each phone call is + connected in its dialing area. The caller has no + control over either of these processes. + +123. 252 Cal.Rptr. 434 (Cal.App. 2 Dist. 1988). + +124. Id., at 437. + +125. Id. + +126. Id. + +127. Id., at 439. + +128. Id., at 437. + +129. Id., at 440. + +130. Id., at 442. See also United States v. Russo, 480 F.2d + 1228 (CA6 Mich, 1973), cert den 414 U.S. 1157, 94 S.Ct. + 915, 39 L.Ed.2d 109; Capital Marine Supply, Inc. v. M/V + Roland Thomas II, 719 F.2d 104 (1983 CA5 La), 104 Fed + Rules Evid Serv 731; Peoples Cas & Coke Co. v. Barrett, + 118 Ill.App.3d 52, 73 Ill. Dec. 400, 455 N.E.2d 829 + (1983). + +131. 432 So.2d 837 (La., 1983). + +132. Id., at 839-40. + +133. Id., at 839. + +134. United States v. Verlin, 466 F.Supp. 155 (ND Tex, + 1979). + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 48 + +135. Id., at 158. + +136. The reasonable SYSOP should offer his full cooperation + in aiding the maligned user to regain her good name by + providing her with his BBS' phone-in records made at + the time the libellous message appeared. See note 93, + supra. + +137. See note 123, supra. + +138. Cf. note 118, supra. As to an electronic BBS being + classified as a "business" for hearsay purposes, see + note 120, supra. + +139. See note 128, supra. + +140. Authentication has been broadly described thus: "[W]hen + a claim or offer involves impliedly or expressly any + element of personal connection with a corporeal object, + that connection must be made to appear...." Wigmore, + Evidence, Sec. 2129 at 564 (2d ed. 1972). This + requirement is also known as the "Best Evidence Rule." + +141. Fed. R. Evid. 901(a),(b)(6). + +142. 2 Bender, Computer Law, sec. 5.03[1][a] (1988). + +143. Id. + +144. See Fed. R. Evid. 901(b)(6): "(6) Telephone + conversations. Telephone conversations, by evidence + that a call was made to the number assigned at the time + by the telephone company to a particular person or + business, if *** (B) in the case of a business, the + call was made to a place of business and the + conversation related to business reasonably transacted + over the telephone...." (emphasis added). + +145. Fed. R. Evid. 1002. + +146. E.W. Cleary, McCormick on Evidence, sec. 231 (2nd. Ed. + 1972). + +147. Id. Further rationales for the rule are risks of + inaccuracy contained in commonly used copying + techniques and heightened chances of witness' + forgetfulness through oral testimony. Id., sec. 231. + +148. 305 So.2d 421, 7 C.L.S.R. 1238 (La. 1974). + +149. 305 So.2d 421, 427. + +150. Id., at 428. + + + Defamation Liability of Computerized BBS Operators +& Problems of Proof (C) 1989 John R. Kahn 49 + +151. Brandon v. Indiana, 396 N.E.2d 365 (Ind. 1979). + +152. Id., at 370. + +153. See note 121, supra, and accompanying text. + +154. Other circumstantial evidence might include, among + other things: possible motive for the masquerader to + defame plaintiff; plaintiff's own inability to call + from the phone number from which the defamatory message + is shown to have originated; or even an electronic + "fingerprint" left by the particular computer from + which the defamatory message originated. Pfau and + Keane, Computer Logs Can Pinpoint Illegal Trasactions, + Legal Times of Washington, vol. 6, p.16 (May 14, 1984). + +155. Fed. R. Evid. 1002 provides: + + REQUIREMENT OF ORIGINAL. To prove the content of + a writing, recording, or photograph, the original + of that writing, recording or photograph is + required, unless provided otherwise in these + rules or by an Act of Congress. + + +156. Examples of this situation are the telephone company's + keeping of hundreds of thousands of individual + computerized records of each telephone call made within + a certain dialing area, or a BBS' extensive history of + subscriber use compiled for billing purposes. + +157. See Harned v. Credit Bureau of Gilette, 513 P2d 650, 5 + CLSR 394 (1973). + +158. Fed. R. Evid. 1006. + +159. 137 Ga.App. 360, 223 S.E.2d 757 (1976). + +160. 223 S.E.2d 757, 760. + diff --git a/textfiles.com/bbs/sysop.nws b/textfiles.com/bbs/sysop.nws new file mode 100644 index 00000000..b1bf2327 --- /dev/null +++ b/textfiles.com/bbs/sysop.nws @@ -0,0 +1,64 @@ +DATE/TIME: 04/07/89 16:32 +From : JAMES GALT +To : ALL +Subject: THE SYSOP MADNESS +Folder : A, "Main Message Area" + +Hello all, + I would like to discuss a condition known as the sysop madness. +This refers to the particular personalities that many sysops online +have. Most of this research analysys is as is due to the fact that most +bbs systems are run by children younger than 18, however older members +also posses the upcoming qualities. Many of the reasons for starting +these systems is because of the owner's need to feel superios, to play +the GOD role of small societies constructed by them to fit their own +needs, wants, desires, abnormalities, inferiorities, +unconformalities,etc. Many of these people have been known to hold +unhappiness, are subject to frequent depression in their everyday +lives, as well as being at a higher risk of suicide in general. These +peculiaralities often exist in the "computer nerd" worl anyhow. The +major group of terminal hoppers and systems owners that suffer froom + +these conditions tend tobe teenage males from the ages of 12-17. Most +of these would be considered losers, misfits, unconformists, nerds,etc. +by their peers. Many feel inadequate and must compensate for that +social loss at point blank range, to them, usingtheir computers, often +an excellent way to cure many of these symtoms, not soo much to cure +however as to give them a "nudge" into society. Soo keep on typing guys. + Specifics to the sysop category include unhappy family structure, +unattained goals, general social problems, or general mental problems. +However these symptoms do in no way refer to "all" sysops. This +category includes only thos systems operators that operate the systems +from home. They tend to oftenbe difficult to get along with, rude and +mean to others, and find great offense from those of their own age +group. Because of some of the descriptions above, many tend to have +illogival and/or hasty judgement, as well as seing life under one +perspective, theirs. +-source; cis bulliten "bbs sysops lounge" + +----------------- +This Comment ADDED by the SysOp + +Sounds just like me! + +This message was posted in an attempt to "get back" at me by an + +ex-user I locked out of the system for misusing the resource last +week. I have received phone calls from him (I suspect more than the +one where he used his real name) and now this "James Galt" posts a +poorly-spelled, terribly constructed message to tell the world how +neurotic I am. + +How predictable that he believes that he got locked out because I am +mentally ill, and not because of his behavior. This is one unhappy +ex-user. + +Since I am SURE you will see or hear of this, "James", better pay +attention: If you continue to harass me (and I WILL be able to prove +it...) I will file a formal complaint with the Nassau County District +Attorney's office. I will also tell your mommy. + +No more nonsense. + +Michael D. Hofer +SysOp +The Ancient Pond + \ No newline at end of file diff --git a/textfiles.com/bbs/sysop.txt b/textfiles.com/bbs/sysop.txt new file mode 100644 index 00000000..1d6168ea --- /dev/null +++ b/textfiles.com/bbs/sysop.txt @@ -0,0 +1,47 @@ + Golden Rules For Sysops + March 10,1989 + James Taylor Sysop and Author + Windsor Manor BBS 1-203-688-4973 + Windsor, Connecticut + +1. I will never post Golden Rules for Users, User Creeds, etc, etc to + intimidate my callers into thinking they are doing something wrong. + In the same light I will never gossip about a user. Gossip is the worst + form of a Bulletin Board Virus. + ( The time limits and upload and download ratios and Board Policies I + post will suffice.) + +2. I will never try to explain to a caller(no matter how true it is)how + expensive their usage on my BBS is costing me. + (Unless I am making a report to a Paying User.) + +3. I must realize that the caller has chosen my BBS to spend the next 30 + or more minutes to relax, and both of us are able to share information + in a relatively new and exiting way. (Good files are like Golden Treasures + to be sought and shared not hidden and the user deserves the + considerations found in Rule #1. + +4. I must realize that there are some that would seek to do harm to me + and my users through Virus and Trojan files and be vigilant and show + concern.(Even Commercial Software costing several hundred dollars will + have some statement to the effect that they are not responsible for any + damage or loss by using that product. A giant step backwards in Consumer + Protection?) + +5. I must realize the content of some files may be objectionable to some + and the users must be the final judge and jury(with the exception + of Commercial Softare in any form, and what what is within in the scope + of my personal moral and ethical bounds.."Here I Stand...")of what is + uploaded and available for downloading. + The users will eventually shape and form,by trial and error, my BBS and + the future of all BBS's. This I believe and accept. + + The above is based on the premise that the phenomenon of Bulletin Boards + is in its infancy. The changes over the next 20 years will be Great. + The future of the BBS will be more and more regulated by state and local + Governments, related industries, and by User demands. With proper direction + the Bulletin Board can become a major form of communication and home + entertainment. "The Perfect Link between the Telephone and Television." + Help Support The FREE BBS! + Jim Taylor + \ No newline at end of file diff --git a/textfiles.com/bbs/sysopblu.pro b/textfiles.com/bbs/sysopblu.pro new file mode 100644 index 00000000..06dafdfc --- /dev/null +++ b/textfiles.com/bbs/sysopblu.pro @@ -0,0 +1,98 @@ + +FROM: A ANYNONMOUS SOURCE. + +DURING THE PAST EIGHT YEARS, I HAVE BEEN HEAVILY INVOLVED WITH "BULLETIN +BOARD" SYSTEMS RUNNING ON MICROS AND MAINFRAMES. I'D LIKE TO GIVE A FEW +EXAMPLES OF THE DESTRUCTIVENESS OF MANY OF THESE "KIDS." + +MOST HAVE PROBABLY HEARD OF OR CALLED AN RCP/M. FIVE YEARS AGO, I WROTE A +SIMILAR TYPE SYSTEM FOR A TRS-80. THIS SOFTWARE RAN FOR 3.5 YEARS WITHOUT +A PROBLEM. BUT NOW, AS MORE AND MORE POTENTIAL CRACKERS HAVE ACCESS TO +COMMUNICATIONS EQUIPMENT, THIS SYSTEM HAS BEEN CRASHED REPEATEDLY. + +WHEN I WAS BACK IN HIGH SCHOOL, THE BIG THING WAS TO FIND A BUG IN THE OS. +BUT, ONCE WE FOUND IT, INSTEAD OF USING IT TO KEEP THE SYSTEM FLAT ON ITS +BACK, WE DOCUMENTED IT AND SOMETIMES EVEN FIXED IT. DOESN'T SEEM LIKE THAT +IS THE CASE ANYMORE... + +ON THIS SYSTEM, SOME CALLER BREAKS IN, DELETES ALL THE FILES, AND THEN +WRITES A PROGRAM WHICH KEEPS THE DRIVES SELECTED; THIS BURNS OUT THE MOTORS +ON 5.25" DRIVES, ESPECIALLY WHEN THEY RUN ALL NIGHT. THIS WAS DONE SO +OFTEN, THE SYSTEM WAS BROUGHT DOWN FOR A LONG TIME (UNTIL A TRACE COULD BE +PUT ON THE DIAL-UP). + +I RUN MY OWN SYSTEM AND PUBLISH SOFTWARE THAT TURNS A TRS-80 INTO A MAIL +AND MESSAGE SYSTEM. I HAVE SAT AND WATCHED CALLERS SYSTEMATICALLY ATTACK +THE SYSTEM. THIS TAKES SEVERAL FORMS: + +1) ALL COMMANDS, SERIES OF COMMANDS, AND OPTIONS ARE TRIED. + +2) THE SYSTEM IS ASSAULTED WITH ALL MANNERS OF CONTROL SEQUENCES, TRYING TO +GET SOME UNEXPECTED RESULT. + +3) I HAVE EVEN SEEM SOMEONE DROP AND THEN RE-INITIATE CARRIER TO SEE IF +THEY COULD GET SOMEWHERE. + + IF THAT DOESN'T WORK, THEY BEGIN TO CRACK PASSWORDS. THEY KNOW WHAT THEY ARE +DOING... IN ONE CASE, I WATCHED AS SOMEONE WENT THROUGH WHAT LOOKED LIKE THE +BEGINNING OF THE WEBSTER'S DICTIONARY TRYING TO GET SUPERUSER STATUS. SINCE +MOST PEOPLE USE WORDS, NOT A BAD IDEA, RIGHT? LESS INTELLIGENT ONES START WITH +A AND JUST TRY AND TRY AND TRY. + +OH, BY THE WAY, THEY ARE DEFINITELY USING AUTO-DIAL MODEMS AND SOFTWARE TO +DO THIS. + + IF ALL ELSE FAILS, THEY SIMPLY TIE UP THE SYSTEM. THEY CHOOSE THE MOST +OBVIOUSLY DISK INTENSIVE COMMAND, AND EXECUTE IT AGAIN AND AGAIN. SINCE MANY +SYSTEMS ONLY TIMEOUT AFTER INACTIVITY, THIS COULD TIE UP THE SYSTEM FOR MANY +HOURS (NOT TO MENTION THE WEAR AND TEAR ON THE EQUIPMENT). + +THESE LITTLE BASTARDS CERTAINLY AREN'T DOING ANYTHING CONSTRUCTIVE. + + SEVEN YEARS AGO, I CALLED UP MIT-MC AND GOT A TOURIST ACCOUNT WHICH I KEPT +FOR THREE YEARS UNTIL I GOT AN AUTHORIZED ONE. IT WAS A FREE ACCOUNT ON AN +OPEN SYSTEM; THE ONLY STRINGS WERE THAT I USE IT AFTER HOURS AND NOT TIE UP TOO +MANY RESOURCES. BUT THINGS HAVE CHANGED. YOU CAN'T HAVE TOTALLY OPEN SYSTEMS +ANYMORE WITHOUT MANY PRECAUTIONS AND ALMOST CONSTANT SUPERVISION. + +FOR EXAMPLE, I HAVE HAD TO ADD MANY SECURITY FEATURES TO THESE SMALL +SYSTEMS: + +1) THREE ATTEMPTS AND YOU LOSE THE CONNECTION. NINE ILLEGAL ATTEMPTS AT A +USERNAME WITHOUT A CORRECT LOGIN CAUSES A SUSPENSION . ANYONE TRYING TO +LOGIN UNDER THAT NAME IS IMMEDIATELY SUSPENDED (WITH SOME EXCEPTIONS). + +2) CONNECTION LIMITED USE. + +3) APPLICATION PROCESS REVIEWED BY SYSOP BEFORE SOMEONE CAN USE ALL +FEATURES, OR EVEN USE THE SYSTEM. + +4) ISOLATE THE USER COMPLETELY FROM ALL OPERATING SYSTEM FUNCTIONS, EVEN TO +THE POINT OF MODIFYING THE DOS TO HANG OR RESET WHEN NECESSARY. + + I DO HAVE ONE LITTLE "JOKE" UP MY SLEEVE. THERE IS AN ACCOUNT ON THESE +SYSTEMS CALLED SYSOP. NOW, IF I WAS GOING TO BREAK IN, THAT IS WHERE I WOULD +START. I'VE PUT A LITTLE PATCH INTO MY HOST. AFTER 39 INCORRECT TRIES ON THAT +ACCOUNT, IT ALLOWS THE CALLER THROUGH. HE GETS A WELCOME MESSAGE AND SYSOP +COMMAND:. HE CAN RENUMBER MESSAGES, CHANGE THE DATE AND TIME, EVEN DELETE FROM +THE DIRECTORY, CHANGE USERNAMES AND PASSWORDS. HE CAN DO ALL THE THINGS THAT A +SYSOP CAN DO. OF COURSE, HE ISN'T *REALLY* DOING ANYTHING (HE HE HE!) AFTER, +OH SAY, 10 MINUTES, OUTPUT STOPS. 24 LINEFEEDS ARE ISSUED AND THE FOLLOWING +APPEARS (SLOWLY, AS IF FROM A TTY): + + HELLO INTRUDER! GEE, I WANT TO THANK YOU FOR HANGING AROUND FOR + THE PAST TEN MINUTES WHILE WE HAD A CHANCE TO TRACE YOUR CALL. IT + IS TOO BAD THAT SOME PEOPLE JUST CAN'T LIVE RESPONSIBLY. BUT, I + GUESS THAT IS THE REASON WE HAVE THE POLICE AND FBI, RIGHT? + [DISCONNECT] + + I DON'T KNOW WHAT THE ANSWER IS, BUT I DO KNOWS THAT TREATING THIS TYPE OF +BEHAVIOR CASUALLY MUST BE STOPPED. THERE WILL ALWAYS BE PEOPLE WHO WILL TRY TO +CIRCUMVENT ALL SECURITY MEASURES, SOMETIMES OUT OF CURIOUSITY, BUT RECENTLY +MORE OFTEN WITH THE INTENTION OF DOING SOMETHING DESTRUCTIVE. + + IT'S TOO BAD THAT THE DAYS OF THE UNSECURED SYSTEMS IS COMING TO A CLOSE, BUT +WITH HUNDREDS OF PEOPLE SCANNING THE EXCHANGES WITH THEIR AUTO-DIAL MODEMS +LOOKING FOR CARRIERS, ARMED WITH 10 PAGES OF PIRATED MCI ACCESS CODES, WE DON'T +HAVE MUCH CHOICE. + \ No newline at end of file diff --git a/textfiles.com/bbs/sysopeev.txt b/textfiles.com/bbs/sysopeev.txt new file mode 100644 index 00000000..4f81f88b Binary files /dev/null and b/textfiles.com/bbs/sysopeev.txt differ diff --git a/textfiles.com/bbs/sysops b/textfiles.com/bbs/sysops new file mode 100644 index 00000000..9cca6c8d --- /dev/null +++ b/textfiles.com/bbs/sysops @@ -0,0 +1,495 @@ + +What Files are Legal for Distribution on a BBS? + +----------------------------------------------- + +Copyright (C) 1989 Exec-PC All Rights Reserved + +From Exec-PC Multi-user BBS, 414-964-5160 +Bob Mahoney, SYSOP +----------------------------------------- + +Software that is a commercial product, sold in stores or via +mailorder, that does not contain a statement saying it is OK to +give copies to others is NOT legal for distribution on a BBS. + +Example: Lotus 1-2-3 is a commercial product, it is copyrighted, +and the copyright notice states you MAY NOT copy it for others. + +Example: PC-Write (the Shareware version) is also copyrighted, +but the copyright statement clearly states you MAY make unlimited +copies for your friends. + +TRICKS TO MAKE AN EDUCATED GUESS: Sometimes it is difficult to +guess whether or not some software or diskette is legal for BBS +distribution. There are a few obvious guidelines I use on the +Exec-PC BBS: + +There is no documentation: Probably an illegal copy. A +Shareware author will always provide documentation with his +product. If he does not, nobody will be willing to make a +monetary contribution to his efforts. If the documentation takes +the form of a very short (one or two screen long) and sketchy +README file, be suspicious. The software is probably a hack +(illegal pirated copy) of a commercial product, and someone wrote +up a small hint file to help other pirates run the software. + +The software is too good to be true: It probably IS too good to +be true! A good game, a good database, a good utility of any +type, requires at least dozens of hours to write. The really +good stuff requires thousands of hours to write, sometimes dozens +of MAN YEARS to write. Nobody is going to give this away for +free! If you get a copy of a game and it seems to good to be +true, I bet it is an illegal copy. + +The software does strange things to your disk drives: For +example, when it is run, the A: drive or B: drive spin for a +moment, even though there is no disk present. This sometimes +indicates the software is looking for a key disk, but someone has +modified the software so the key disk is not needed. This is +probably illegal software. + +The software does not have an easy escape to DOS, no EXIT +command: This usually means the software is illegal, someone has +hacked it to make it run, but it was too difficult to add a +proper escape to DOS to the commercial product. + +DON'T GET ME WRONG, I am making it sound as if ALL software is +illegal. This is not the case. It is usually very easy to +recognize a fine, legal package, since the author is proud of his +work and usually puts his name, his favorite BBS number, a +disclaimer, a Shareware notice, or some other hint into the +package. It may be as simple as an initial screen saying "This +is Shareware written by so-and-so, this is Shareware, if you like +it please send $XX to the following address", and other text of +that type. + +If in doubt, ask the Sysop! + +END OF INFO + + >--------=====END=====--------< + + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + ******************************************************* + * PHILE 4: SYSOPS' LIABILITY * + ******************************************************* + +** PIRATE reprints the following that arrived over the BITNET +lines. Following with our policy, it is printed exactly as +received. Only the date of the conference was removed. ** + + /*/ SYSLAW: THE SYSOPS LEGAL MANUAL CONFERENCE /*/ + ================================================== +Editors' Note: The following conference took place on GEnie. + The only changes we have made to any of this text is the format + and spelling errors. An additional note, I just finished + reading the book. It is interesting and I encourage all BBS + operators to purchase it. If you are interested contact: LLM + PRESS, 150 Broadway (Suite 607), New York, NY 10038. (212) + 766-3785) + + FORMAL CONFERENCE + + <[Holly] HS> Welcome to our formal conference with Jonathon +Wallace, + + Thanks very much for inviting me.... + + <[Holly] HS> Can you tell us a little about yourself and your + book before we start? + + I am a lawyer in private practice in New York City + specializing in computer related matters including BBS law. I + am the co-author with Rees Morrison, of SYSLAW: The Sysop's + Legal Manual, and editor of The Computer Law Letter, a bimonthly + newsletter. + + <[Mel] NIGHTDIVER> Jon, would you talk a bit about where free + speech stops and libel begins. We obviously want to be able to + criticize a product freely but I guess we have to stop at + calling the developer names or spreading rumors that he is going + bankrupt. Where does libel start? and what is the sysops + liability for allowing such messages to stand? + + Libel varies from state to state. In many places + its a knowingly false statement. In others it may even be a + negligently false statement. The responsibility of a sysop is, + in my opinion about equivalent to the liability of a newspaper + publisher for a comment someone else makes in his paper. + Constitutional law says that a public figure can only recover + against a newspaper for a libel done with "actual malice". + + + <[Mel] NIGHTDIVER> For our purposes who would you say is a + public figure a developer pushing his product? A publisher of + an online magazine? The sysop? + + There is no precise definition. Any of those + might be held to be a public figure, as would your town + councilman, but not your next door neighbor. + + <[Mel] NIGHTDIVER> I've heard the sysop's liability in libel + compared to a news stand's liability but that boggles my mind + because I never heard of a newsstand claiming a compilation + copyright. Would you comment on the sysop's position? + + Ever since there have been BBS's, people have + debated whether a sysop is a publisher, a newsstand, a common + carrier, a bartender, etc. A sysop is NOT a common carrier + (obligated to carry all messages, can't control content) Nor is + a sysop a newsstand (too passive). I think a sysop is + essentially a sort of publisher. She has the right to edit and + control the contents of the BBS. + + I've got a few questions, but I'll try not to hog + things for others. Awhile ago, I ran into a particularly nasty + "anarchy" BBS in New York. It offered files on everything from + literally how to poison people to "kitchen improvised plastic + explosives". Is offering info like this legal? Is there any + legal precedent? + + Dave, the law says that "information doesn't kill + people.. people kill people." However distasteful, describing + how to make poisons is constitutionally protected speech. + + <[Ralph] ST.REPORT> Evening Counselor, nice to see that + information is information and not murderous non-sense. My + question is, what recourse, if any does an individual have when + they find that certain information has been labeled "overly + informative" and has been censored as a result? + + Ralph, if you mean censored by the sysop the user + really has no recourse. As I said, a sysop has the right to + edit, modify and delete the BBS's contents. + + <[Ralph] ST.REPORT> I see, well a sysop was not the cause in + this situation....in fact the sysop was quite fair about the + entire matter... much more so than the individual.....I mean as + individual to individual. + + Who censored the message, then? + + <[Ralph] ST.REPORT> The message was deleted as a result of the + ensuing hulabaloo <-? voluntarily by me. + + Ralph---The sysop is the final arbiter in such + cases. It is only censorship when the government intervenes to + prevent speech. + + <[Ralph] ST.REPORT> I agree, in effect I censored myself to + avoid more controversy, I was looking for your opinion and I + thank you for your time. + + Yes I was wondering if you could comment on + self-maintaining BBSs that automatically validate uploaded + files. Is this illegal in itself, or could the sysop be in + trouble if a copyrighted file is up for a bit of time till he + realizes it? + + Bob, there are no precise rules in this area yet. + My best guess is that the sysop has an obligation to exercise + due care. For that reason I would try and set things up so that + a pirated file would be discovered in under a couple of days. + Therefore, the idea of a self-validating BBS makes me nervous. + + I see. right - but its that couple of days that the + file might be up. ok something to think about. thanks. + + Jon, do you consider your SYSLAW book to apply much to + information service sysops, or is it 95% for the private BBS + operator? + + The book was written for the BBS sysop, but much + of what's in it applies equally to service sysops...e.g., the + discussion of copyright, libel, etc. + + Hi again. As I understand it, the libel law says + (basically) that to commit libel, you have to say something + false, know it's false, and do it with malice intended. First, + am I right? (*grin*) Second, does that apply different to public + figures vs. mere mortals? + + Dave, the rules you stated are correct for a media + defendant (newspaper, etc.) libelling a public figure. If the + "libeller" is a private citizen, the states are free to hold you + to a mere negligence standard. + + Can you expand on "negligence"? + + Yes a careless false statement, e.g. something you + didn't bother to verify. + + Along the lines of the self-validating + files...what if users upload copyrighted text into the message + bases? Song lyrics, documentation, that type of thing? + Messages are never held for validation. + + I believe a sysop should arrange to read every new + message every 24 hours or so. If its a big message base, get + some assistant sysops to help. Of course, copyrighted text may + not be easy to recognize, but if you do recognize copyrighted + material it should be deleted unless its a fair use (e.g., brief + quote from a book or song, etc.) + + <[John] JWEAVERJR> Can you comment on the differences between + the legal standards for libel and slander? And, in particular, + which category does this RTC (as a "printed record" of a live + conversation) fall? + + Slander is spoken libel is written I am fairly + sure that all online speech will be classified as libel, not + slander. Frankly, I am more familiar with the libel standards, + which we have been discussing than with slander, where they + differ. + + I did come in a bit late, if this has already been + answered; where might I find your book, and what's it retail at? + + The book is $19 plus $2 p&h from LLM Press 150 + Broadway, Suite 610, NY NY 10038. + + Okay back to libel. Are editors of magazines in + general held responsible for the content of their magazine, or + is the writer of a given article deemed libellous that's held + responsible? Or both? + + Potentially both. + + The standards would depend on if the libeller + (sounds like a referee! grin) was a public figure or private + person, also? e.g., negligence vs. malice? + + The US Constitution imposes the standards we + discussed for media defendants, and leaves the states free to + make their own laws in all other cases. + + Since networks are interstate, which states' laws +applies? + + Dave, thats something the courts will have to + settle. Magazines have been successfully sued in states where + they sold only a few copies. + + <[Mel] NIGHTDIVER> I understand there have been some cases + regarding private messages in a BB as opposed to public + messages. Does that mean that if someone sends me Email here on + GEnie and I forward it to someone else, that I could be in + trouble? + + Mel, we are getting into a whole new area here. + The Electronic Communications Privacy Act (ECPA) which protects + the privacy of email. In the case you described. There would + be no liability under ECPA, because the recipient of the message + has the right to make it public. + + <[Holly] HS> I have a related question, Jonathon...are you + familiar with Thompson v. Predaina? (The case that never was... + *grin*) + + Yes, I read the pleadings, and have talked to and + been flamed by, Linda Thompson . + + <[Holly] HS> Can you summarize the case a bit for the rest of us + and give us your opinion? (I happen to personally know both + parties... Linda was a friend of mine. Bob is a friend of mine. + Key word: "was") Everyone's been flamed by Linda Thompson. + *grin* Linda sued Bob under the ECPA claiming that he had + disclosed private messages and files of hers to the public. He + was not the recipient of the files or messages and, if the facts + as stated in the complaint are true, it seems as if there was a + technical ECPA violation. The case never went any further + because (I am told). Predaina declared bankruptcy (since you + know him, you can clarify if this turns out not to be the case). + + <[Holly] HS> Bob did declare bankruptcy, which was a wise move. + I didn't read the complaint, however, I also know that when + Linda (and Al) had a BBS, they were "guilty" of exactly what I + understood Bob did. (Allegedly) + + I've often thought it was a too drastic move on + his part. Based on the information I had, I doubted the case + would have resulted in drastic damages, even if there was a + technical violation. + + The moral of the story: Don't disclose private mail of which you + are not the sender or recipient. + + <[Holly] HS> I think it was very precautionary on Bob's part. + And, if I understand what happened, the case was dropped because + Linda was suing partially on the grounds of character defamation + which allowed Bob to dredge up some of Linda's rather tawdry + past, allegedly. (I don't think I'm spelling that right. It + looks wrong. :-) Thanks, Jonathon... I have a few more for + later... :-) + + Hi Jon, this is deb! Christensen, I take care of the + Commodore and Amiga areas here on GEnie. My question is an + unresolved one about copyrights and music. Are there any 'fair + use' guidelines which affect musical arrangements to computer + transcriptions which people upload and distribute for their + electronic friends? + + Deb....The upload of a copyrighted song or image + in electronic form is a copyright violation. I have never yet + heard of a case of a court finding such an upload to be a "fair + use" mainly because courts haven't really yet dealt with the + issue of uploads at all. However, I think the argument for a + fair use is slim, considering that the standards of fair use + include whether the use....is commercial, and how much of the + work is copied. An upload to a commercial service of an entire + song or image, for download by people paying connect charges, + seems like a pretty clear copyright infringement. + + So, a musician does not have a right to arrange music and + perform it for his friends? Is it the uploading that is a + violation or the computer arrangement for the performance? + + A private performance is not a copyright violation + but there is nothing private about an upload to a commercial + service with more than 100,000 users. + + And to a public BBS? + + Public BBS: I would say its the same thing, even + though not quite as commercial. + + Aha, so it isn't anything to do with cost involved. It is + the actual transcription which is the problem? I *know* + digitized music is a problem but had always presumed we had the + same right to make an arrangement on a computer as we did on + paper. :-( + + Deb, I would say you do have the same right to + make an arrangement, just not to distribute it to other people. + + What are the legalities of telephone companies + charging business rates for BBS telephone lines? I understand + they have either proposed it, or tried it in some places. Your + comments? + + It has happened a lot, but I understand in several + places concerted efforts to communicate with the telco got them + to back down. Not aware if anyone ever mounted a legal + challenge, though. + + I see. I don't see how a bbs constitutes the charge, + but I guess there is a large grey area there. + + The telco's argument was that the BBS was + providing a quasi-commercial service. If you look at any BBS + list, you will see a proportion of company sponsored BBS's that + confuse the issue. + + Jon, earlier you stated that the recipient of EMail was + free to distribute that mail. Is there any way to ensure + privacy in EMail? Would a Copyright notice on each message + prevent further distribution? + + I assume you are asking if there is a way to keep + the recipient of a message from making it public. + + Yes. + + The answer is not really. Putting a copyright + notice on might give many people pause, but suppose someone + violated that copyright, what are the damages? + + Got two for you. First, with BBS's and networks + being so (relatively) new, are there a large number of libel + cases of stuff going over the nets, as opposed to say magazine + cases? E.g., is it a growing practice? *grin* + + I am only aware of one case of online libel, the + one discussed in my book, the Dun & Bradstreet case (and I guess + Thompson v. Predaina also included that element). + + Second, do you find that judges and juries in such + cases (jury assuming a jury trial, of course) have a great deal + of "learning curve" to go through about networks? Most people I + know outside computers don't know a genie from a compuserve from + a hole in the wall. they can't imagine what the BBS world is + like. Does this make such a case tougher/easier on an attorney? + + I frequently will try a computer case to the + judge, waiving the jury demand less education to do but I + wouldn't necessarily do that if I were the defendant in a libel + case. Depends what part of the country you're in; in Manhattan, + you could probably get a jury that knew what a modem was. + + And if not, it would probably be prudent to try to + educate one vs. six ? Fair enough.. okay I'm done + + It really depends on the circumstances..deciding + when to go for a jury also has to do with how much you need, and + can exploit, a sympathy factor. + + <[Holly] HS> I have one last question myself before we wrap + up.... (which is not intended as a pun with regard to my + question... *grin*) Shrink wrap licenses, are they enforceable? + Legal? + + There has been some disagreement on this but my + personal opinion is that the average shrink wrap license would + not stand up. It was never negotiated, never really agreed to + and can't convert what is obviously a sale into something else + any more than calling a car a plane will change it into one. + + <[Holly] HS> However, if it is visible before the buyer actually + buys then can a presumption be made that they have read and + agreed? + + There are still other problems. The buyer hasn't + dealt with the publisher, but with a retailer. There is no + "privity" of contract. + + <[Holly] HS> "privity" meaning... ? + + No direct contractual relationship between + publisher and purchaser, despite the fiction that the license + purpotts to create. + + <[Holly] HS> Then a company who insists that this disk and this + software still belongs to them, you don't feel it is + enforceable? + + It would depend on the circumstances, but if you + buy an off the shelf product at Software to Go, in my opinion, + you have purchased the copy even if there is a shrink wrap + license that says you have only licensed it. + + <[Holly] HS> Interesting... another point of licensing... have + you read the Apple licensing agreement? + + I read it some time ago, when the case started. + + <[Holly] HS> It states that Mac ROMs can only be used in an + Apple machine. Although there is contention that the ROMs are + the heart of the machine, so whether they goest, so goest the + machine. + + Sorry, I thought you meant the Apple/Microsoft +license. + + <[Holly] HS> For those of us who use an emulator, like Spectre + or Magic Sac, it could be an important point. + + The question is a very tricky one. On the whole, + it would be....difficult to prevent a legitimate purchaser of a + ROM from doing anything he wanted with it, including sticking it + in another machine. But I haven't seen the license you refer + to. + + ======================================================================== + (C) 1989 by Atari Corporation, GEnie, and the Atari Roundtables. + May be reprinted only with this notice intact. The Atari + Roundtables on GEnie are *official* information services of + Atari Corporation. To sign up for GEnie service, call (with + modem) 800-638-8369. Upon connection type HHH (RETURN after + that). Wait for the U#= prompt. Type XJM11877,GEnie and hit + RETURN. The system will prompt you for your information. + + >--------=====END=====--------< + \ No newline at end of file diff --git a/textfiles.com/bbs/sysopsui.txt b/textfiles.com/bbs/sysopsui.txt new file mode 100644 index 00000000..8c99ca9f --- /dev/null +++ b/textfiles.com/bbs/sysopsui.txt @@ -0,0 +1,640 @@ +>>Access Denied Publications Presents... + +"SysOp Suicide! (A Day in the Life of a System Operator)" +By James C. Goldbloom + +(@) March 1988. ADP, Inc. + + +P R E F A C E: + +The daylight has not yet become visible and an illuminating glow from the +moon, resting low in the early morning sky, falls upon the keyboard and the +entanglement of varied wires, patchcords and plugs resting silently upon +the formica topped computer stand. The hour is fifteen minutes before six, +and the unconcious desire to yawn goes unnoticed by the cat stretched +solemnly on my lap, absorbed within intense sleep. The animal should be so +lucky, as I cannot close an eyelid after what I had been through the last +70 hours. There he sits, nevertheless, dreaming of catnip and front claws, +or whatever it is which worries spoiled felines. Here I sit, typing +mercilessly at the keyboard, in a vain attempt to describe in common text +just what being a System Operator (known as 'SysOp') encompasses. The words +do not adequately portray the emotional and physical requirements of this +often misunderstood and frequently expensive hobby known as online +telecommunications. I have four long, incredible years of frontline +battlefield existence, and the 'trenches' of the wonderous world of modems +are muddy, deep, and full of strange viruses which belittle the most stoic +of the online genre. For this is the night I disconnect the modem for the +last time, when I will place both backup and original user disks in never +ending storage, and for the first time in my life, use my word processor +without feeding programs and control codes through this aged modem. In +short, using simple and very carefully chosen wording, my days as SysOp are +no longer. This small contribution to the presently, and probably +eternally, unbuilt libraries of the Online Archives Building is my Last +Will and Testament, my final eulogy, my hyperbole laden memoirs of just +one 24 hour, mundane, typical day in the life of the poor being known as-- +The SysOp. To these brave and electronically tormented individuals, it is +with respect I devote this text. + + +P A R T O N E: "Starting a New Day" + + +The day in the life of a SysOp begins in the wee hours, when the toothpaste +tastes like Arm & Hammer Baking Soda, and beard stubble has grown on the +inside of your mouth. The crazy aspect of it all is that the modem stays on +all day and night, tirelessly answering phone calls, taking messages, and +never voicing even one complaint. Fully automated generosity, without +regard to anything remotely related to humanity. Thus, when the clock +strikes six, and the digital displayed tone-activated alarm clock sings its +song, I open my eyes, pick the eye-guk out, and watch the cat choke once +again on the same furball he has been ingesting for the last ten years. + +Clothes are not important in the privacy of one's own computer room. I +suspect the most beautifully insane aspect of operating a modem is that a +certain amount of anonymity can be displayed without fear of Alan Funt +jumping out behind your mirror and announcing you will make the syndicated +version of Candid Camera Strikes Again. Sitting on the soft cloth of the +chair which nobody but myself would plop upon, called The Captain's Chair +by even the most naive young SysOps, I lift my aching arms to do the usual +exercises, preparing myself for endless hours of peck-typing. + +Being a SysOp is a painfully arthritic occupation, and it is a noted +statistical fact that more knuckles and tendons have been destroyed typing +a simple validation message than most boxers would suffer in a 15 round +heavyweight fight, without gloves. To avoid 'occurences', the mainstream +and well noted computer lingo for 'accidents', one must be in shape. So +after benchpressing the monitor 20 times and leg-lifts under the printer +stand, I'm ready to start a new day in front of the setup. + +To begin the online session I must first check out the hardware for rapidly +blinking lights, those inevitable little morse code glitches of pulsating +trouble which always spell out the letters 'AH' in Morse Code. Scribbling +upon a piece of paper the alphabetical equivalent of the blinking morse +code would make it seem, and fittingly so, as if the device in question +were -- with a bit of imagination -- SCREAMING. But I do the real +hollering, and hopefully a simple troubleshooting will remedy the lights. +Of course, if one cannot see ANY lights, then it is time to invest in +something other than microchip technology as a hobby. Or, don't sit so +close to the monitor. Luma rays supposedly cause brain rot. + +Before I continue, as the reader you should note being a SysOp simply is +not a cup of tea, and requires above average tolerance for the technical +aspects and detriments of online communication. I suggest a few books, such +as the number one best seller (in China), 'Kung Fu and Commodore Too' by +the honorable Yokihana Manicottison, or, recommended by the National +Counsel for Mentally Deranged SysOps (and Reader's Digest's book of the +month through all of 1955), 'Aligning Your Disk Drives Using Atomic Waste' +by someone named Oppenheimer. Never heard of him, but it has great +diagrams, and a free sample packet with every book. + +Where were we? Oh yes. After the initial system check, the first order of +business is to login to my own system. This is not fun, when I attempt to +access and discover your ID code has been changed to negative five, and my +password describes part of the anatomy of a ground hog. But after a few +quick changes in the data files, access is restored and entry into the +system is near. As sweat meanders down my face, and hair folicles stand on +end as I pray all 300 users are intact, the all too familair title screen +appears as one more night of restless sleep is greatfully forgotten. + +The time is now ten minutes after six, and in less than two hours I will +have to shower, shave and stuff unedible pieces of melba toast down my +esophogus. Stop gagging, a SysOp has a low budget for basic staples such as +food, heat, or similar modern conveniences. Due to monetary woes, it just +is not practical for me to even consider buying groceries, when the money +could produce much more. Once, I avoided eating for three weeks to insure +the disk drive was cooled by a new fan, which was not on sale. + + +>> Coming Soon -- Part II !! << + + + + +>>Access Denied Publications Presents... + +"SysOp Suicide Part II (Or -- A Day in the Life of a System Operator)" +By James C. Goldbloom + +(@) March 1988. ADP, Inc. + + +P A R T T W O: "Time To Make the Donuts..." + + +The inevitable part of running a system is allowing access to the people +for whom you supposedly cater: The user. Of course, this is not true. The +real reason I run my system, sitting here drinking this off-pink colored +strawberry flavored 'Quick' drink, is to collect fees. Naturally, there is +no way in Hell a user will pay to call on an open phone line, spend 30 +minutes typing without being able to even trade a cracked game. You see, I +run a non-fee accessed public message system, with no file transfers to be +accessed or even viewed by the remote user. I ask for no contributions, +unless they include credit card numbers or titles and deeds signed over to +my name. Well, if someone INSISTED, I may consider. However, it is not a +common practice for an Operator like myself to demand money for something a +user can access on a FREE phone line. Was this an editorial? Dangit. I +didn't mean to do that. Let's move on. + +Time to make the donuts! That commercial should be the motto of all SysOps +even if they can afford to pay someone else to purge files, reply to all +electronic mail, or simply boot a user off the board for callous remarks. +By the way, when it comes to ethics, SysOps do not have any. Well, when I +first ran the system I was naive, young, full of unrelenting energy which +abounded into a flowing display of creative and brilliant ideology. Hell, +that wore off within a week, right after the disk drive ate the userlog and +indiscreetly spat it out, hub ring first. + +In the REAL world of SysOping, 'time to make the donuts' means I must spend +all my free hours, including those precious moments when I just HAVE to +shake the weenie, upkeeping the system. Ugh, that's disgusting. Sorry, what +do you expect in a public domain file? As I was saying, the point is simply +this: Time must be set aside for routine maintenance and chores, which are +many and time consuming. Ask any SysOp, and he or she will tell you point +blank, without the slightest bit of hesitation, "It aint worth it, pal!" + +It is worth it, and if I believed everything I said, I would have remained +a user for six years and still be calling out at 300 bits per second, using +a datasette recorder in a vain attempt to save 46.5K worth of buffered data +so I can avoid taking notes. Those days are long gone (for most of us, and +if this scenario rings true to you, no nasty commentary please, I own a +Pittbull and my other hobby is Ninja warfare) but not forgotten. + +The hardware I use to run the system is complicated, and the average setup +for the virgin Operator usually costs around $1500.00, and that is not +including the floppies, thousands of pens and labels necessary to insure +proper organization. If I had a penny for all the pieces of printer paper +used to display caller logs, error reports, and other data being generated +at unbelievabe rates I would be able to buy stock into Compuserve. Welcome +to the real world, kiddo. A SysOp must take advantage of the resources +which are available, and steal anything else necessary to get the job done. +By the way, there are no time for drugs or addictive stimulants to maintain +the peak level of operating efficiency. If I was a drug dealer, would I be +typing this text? Don't answer that. + +To conclude this section of the text, it is wise to understand the most +basic reason of why a SysOp does what must be done. I have discussed the +fact that there is no money to be gained, there is no advantage in terms of +building or growing something to show for it, and certainly anyone in their +sane mind would never pay to access a service which is a local phone call +away. Why do I do it? You should be thinking of a few reasons. They could +be the education of the mind, expanding your talents and creativity in a +way so your community could benefit. Or, to trade information, resources +and ideas, relating with your peers, and being offered varied opinions and +moral beliefs with which you could ponder, henceforth originating your own +specific values upon man and his environment. Possibly to offer solutions +to world crises and bring forth changes that may not be possible unless a +large group of caring and highly motivated strangers band together and form +a common bond to take action and become united. + +Nah. The real reason is simple: We do it for SEX. + +>> Coming Soon -- Part III << + + + + +"SysOp Suicide -- Part III" (Revised) + +From Access Denied Publications, Inc. 1988 +By: James C. Goldbloom + + +Part III: "The Ethics of Operating" + +Before I continue with the story, it is only advisable to the reader that +they understand the social and legal issues which plague the calm and +steadfast operation of an online system. To name but a few of the dilemnas +which wreak havoc among computer entrepeneurs: hacking, phreaking, leeching, +black-listing and of course the ever popular (ugh) crashing. That last one +should not even be mentally imaged, and the SysOp shudders and shakes in his +or her chair with possibilites of involuntary bowel movement. This portion of +the text describes one afternoon when I encountered the most feared, awe +inspired and horrible type of user -- the crasher. + +If there were to be a sort of 10 commandments of online ethics, right after +thou shalt not commit adultry would be thou shalt not illegally enter an ID +which is greater than the national debt. One day when I was sitting in my +captain's chair, smoking a camel right after some really good -- validations +(the closest computer term for sex) I watched a user login as a new user. +At first this bright individual had the smarts to hit the HELP command a +few times and learn his way around the amazon jungle of online corridors which +branched in every which direction and seemed to lead nowhere. Suddenly, as the +system asked for his handle or alias, he paused for what seemed an eternity +and very gingerly entered: "The Disk Destroyer". Now, myself being a rather +experienced Operator and luckily being witness to this dasterdly deed in +person, I decided to lay low, and attempt to learn from the situation. Of +course my hand was but a few milimeters away from the phone cord, just incase +the human being on the other end decided to prove Darwin's theory of the +missing link. + +The system verified this ID to be valid, and I cursed loudly. At the next +prompt the system asked him his real name, to which another pause surmounted +and out popped the not so amusing "Kill SysOp". I flustered a little, but kept +reminding myself it was only a BBS, only a kid playing games, and I was going +to delete him anyway and no damage would be done. I knew my system was +indestrucatable, and all my safety nets would work perfectly. Of course, this +user would NEVER guess the backdoor I had installed just incase even I was +locked out of my own system. Never, in a million billion years could this +yahoo guess the correct word. The likelihood of that happening, on his first +try, was so astronomical, it was beyond the limitations of science. + +The little bastard got it on the first try. Then I began to drool a little and +a slight degree of spittle ran down my neck and onto the cat, startled but not +completely disrupted. Before I had the chance to disconnect, he had already +opened up the backdoor and like the parting of the red seas, all the online +'water' poured out right into his lap on the other end it seemed, and to put +it mildly, he nearly drowned from the sheer excitement of it all. In this +order, he left feedback to me explaining what type of moron I was classified +as and that the software was 'easy', far too easy and was of no challenge to +him. He mentioned something about he and his buddies frolicing in my modem, +dancing around the maintenance area, and basically short circuiting as much as +he could in the alloted time (he gave himself 2 years before logoff). After +this small note, he raised his access to mine, and proceeded to delete the +userlog right before my eyes, and all I could do was pick my nose and pull the +plug manually. But it was too late, the disk drives were scrambled. + +The most important lesson a potential sysop can learn is to make a backdoor +for a backdoor, and backup your data disks frequently, or someone like "Mr. +Kill SysOp" will backup your files for you, right into the toilet. What ever +happened to online ethics? Doesn't anybody care about the social graces of +online communication? I certainly do, and even though I am the first to admit +I have my cynical side to life and often confuse right with wrong, I would +never ever intentionally damage someone else's system. + +That is, unless they stole a mod from me or something like that... But +more on that in part 4, entitled 'Modify & Murder'.... + + +Part IV, coming soon! + + +"SysOp Suicide --- Part IV" + +From Access Denied Publications, Inc. (1988) +By: James C. Goldbloom + + +Part IV: "Modifications and Murder" + + +Unique. Supposedly, no two boards are the same. Users gather from varied +backgrounds, SysOps pride themselves on having the latest modifications (which +we in the business call 'mods') and the greatest online inventions which dare +to make the user's modeming experiencing a much simpler and efficient one. The +creative energies flow endlessly, and new ideas enable operators to enrapture +the attention of the user thereby contributing to a start of the art board +which improves the over-all quality of telecommunications. + +Hogwash. + +The truth of the matter is, we all steal like common, petty thieves and ride +in on our electronic 'horses' and rape and pillage as much of the online +community as possible with as much damage as can be done. When it comes to +secrets, the word simply does not exist in the land of bulletin boards. The +SysOp must deal with the constant painful threat of being electronically +robbed of all ideas, and the BBS in question will end up being replicated in +about 24 states and 5 countries around the globe in 8 different times zones in +as quickly as 48 hours. It is amazing what a bit of buffering can do, and +although mods are commonly duplicated without intention, there are always the +retarded nymphs who simply lack basic intelligence to come up with something +new. I personally cannot figure out why these people would do such deeds, +because there is no pride in plagiarizing. No feeling of accomplishment, but +nevertheless it is a common practicing among competing boards. + +The worst form of stealing mods is when the mod in question is displayed +prominently on the second rate system, and the SysOp of that board gladly and +quite distinctly takes full credit for the work. Once, when I saw my prompt +line show up on a nearby BBS from no apparant act of charity on my part, I +asked the SysOp to explain how the mod was accomplished, just to see what +would happen. Needless to say, the ignorant one celled animal could not even +begin to describe the complex nature of the prompt and probably could not +spell his own name without the aid of a brain. When I prompted him to explain +his method of capture of the mod, all I got was a quick disconnect. + +I caught that one. However many times my brain-blowing mods get duplicated +time and time again, and like the old 'phone game', by the time it gets to the + +100th system, the mod starts to deteriorate. It is then I wish to install a +virus, and set it so at one particular date at one distinct time, all the +boards with that mod will self destruct! It is nice to dream and get on these +power hungry trips, but SysOping is an egotistical business, ok...? + +When it comes to the actual production of new mods, that is the time a normal +and quite healthy human being can turn into a wretched and defenseless +creature doomed to a life of rubber walls and straight jackets with 'murdered +by the mod' tatooed on the vest pocket. To describe exactly what it is like to +attempt a new mod is to equate a sperm attempting to enter the uterus and +penetrate the egg for fertilization -- a massive array of mistakes and trial +and error, mindlessly swimming around - bumping into EVERY obstacle. + +Manuals, you are thinking, that is why they invented manuals. To make a +complicated 17,000 line software listing make sense, to enable an Operator to +underastand each division and subdivision of the flow of data. Well throw the +damn manuals away, if they are written in english then they probably are +outdated or written for a version which looks or acts nothing like the board +the Operator is running. The only uses I have for manuals are propping them +under the kitty litter box for absorption or emergency bathroom tissue. + +All mods are usually a life threatening process of give and take, push and +shove, and throw and kick. It is advisable all small children and any objects +not stapled to the table be removed while a SysOp is modifying. Ask any wife +or husband of any SysOp and the unanimous conjecture is that a SysOp in the +middle of modifying is more likely to turn against friend and family then when +drunken and armed with a shotgun. It's the truth, the patience simply runs out +and even if the board owner is gnawing off their own fingernails or throwing +spitballs at the monitor with slingshots, they better not be disturbed. + +That is the reason I destest someone stealing my mods. I put all that hard +work into it, and slaved for hours on end before I figured out I spelled the +word 'return' wrong somewhere in line 2534, which enabled the board to be +booted and re-booted about 250 times in succession before I got it right. The +selfless nerd who copies my work after ALL my work deserves... well, to be +punished! At least, make them boot their boards 250 times in a row and see +what happens to THEIR monitors when pens are flung at Mach-5 and become a +permanent attachment to the glass. It aint easy being a programmer and SysOp +at the same time, I wish it could be like Star Trek, just talk into the +machine and ask for "One prompt with date and time displayed, something new +and innovative" and after a second or two of regurgetation, the machine spits +out a complete listing (with documentation) fit for a king. + +No such luck, and the best we can do for now is sit on our butts and spend +hours trying to be creative, and when that first user logs on and sees the +mod, comments nicely about it in feedback, and logs off a satisfied customer, +well -- it makes it all worth it. + +So long as he hasn't buffered the whole damn thing and has already echo-mailed +it to the 'hackers-haven' computer club in Colombia, South America...... + + +Coming Soon, Part 5 -- "Dealing with Sub-Operators, the Helpers" + + + +>>Access Denied Publications Presents... + +"SysOp Suicide -- The Series, Volume 1" + +Written By: James C. Goldbloom with assistance from Liz Reynolds + + + +P A R T F I V E: The Magic & Madness of Making Messages: A Study + + +The following field study and report was compiled from countless years +of personal experience as a System Operator. The opinions expressed +herein are unimportant, inane, obtuse, and uncorrolated. But DAMNED if +it don't make good readin'... + + + + +HYPOTHESIS & INTRODUCTION: +========================= + +YOU have just logged onto the BBS of your choice and you are confronted +by the options menu. You think to yourself, "AH HA! Why not check out +the message bases and see what the other users are thinking?" +Hesitantly your fingers are poised to hit the command that will bring +you face to face with the aspect of on-line communication often +misunderstood and rarely observed: DISCUSSION! + +History plays a role in the birth and eventual maturity of such +discussion. In the beginning, God created raw data. Naturally, most +users were confronted with tempting and voluptuous features of Bulletin +Boards which involve the trading of files, the exchange of technical +enhancements, and the beauty and freedom of mastering the art of this +electronic medium. When the earth was a molten mass, when an Apple was +something that was ingested and a Commodore ALWAYS went down with his +ship, Bulletin Boards were initially utilized for the office jockey who +delivered memos and other work related materials to fellow computer +novices. In this archaic beginning, (cue the theme from 2001: A Space +Odyssey) this information represented the sterile and utterly +insensitive automation of "data transfer." Thrilling as reading +expiration dates on condom packages, but please continue... + +By the time of Christ, avid computer Apostles upon a whim decided to +preach the Gospel of electronic interaction amongst the masses. These +early teachings brought about the discovery of that which has now been +deemed mundane, staid, and pathetic: communication. Not between +silicon and wire, but flesh and blood. Dedicated purely to preserving +necessary humanity (HINT: PROFOUND STATEMENT!). + +You're probably asking what the heck all this means, aren't you? What +does religion and history have to do with the modeming scene? Nothin', +but that's not the point of this verbose paragraphing. What really +matters is the magic of message making, and how fantastic the grammar +is within the preceding text. I am just kidding about the formal +prose, as what is really important is how the sexual behavior of +non-consenting adults is "splattered" on messages bases like caged +rabbits on a bad episode of Wild Kingdom. + +However, messages do take on many forms and challenge the reader to +think, to create, and to become involved. That is what's truly +inspiring and has been forgotten. Anonymity, adult subject matter, +file transfer, high baud rates, unfriendly software and a disdain to +tradition all contribute to the erosion of honest and meaningful +dialogue. This text was written to allow a reader, like yourself, to +view on-line direct communication in a predecent or standard which has +always existed, but sadly is dormant to many. Now don't fall asleep on me +yet, as there is a point to be made. Hopefully soon, and here is some +research data I collected over the years to support my theory... + + + +MEANINGLESS DATA TO PROVE IT: +============================ + +Those who contribute to this downfall of the online community have +names, of course, and let me take a moment of your valuable online time +to list but a few of these insensitive, crass, impudent and +disgustingly oblivious individuals. I won't mention names unless +they've deleted me on their systems (don't press that STOP key, I'm +just joking). Instead I will produce for your enterainment dollar a +general classification listing, complete with species name, habitat, +migratory patterns, life cycle -- and if necessary, the "mating rituals" +and socio-economic status of such creatures within the online kingdom. + +(This listing will be from the highest level of the food chain to the +lowest form of online life possible.) + + + +SPECIES HABITAT DESCRIPTION (Migratory/Mating/Behavioral Patterns) +======= ======= ================================================== + +Patron ANY BBS Contributes selflessly to ALL message bases + Saint with creative and intelligent conversation. + (Scientific Name: Championi Supportrius) + +Garden ANY BBS Frequents sub-boards routinely, posting very + Variety interesting but umemorable form fed generic + responses of unoriginal context. + (Scientific Name: Flora No-Weedius) + +Scarce ANY BBS Has difficulty finding the messages, but somehow + Scribbler types the reply command by accident. General chit + chat directed towards no one in particular. + (Scientific Name: Scantius Doodlecti) + +Credit MOST BBS Only interested in increasing file transfer credits, + Fanatic allotted time or access. Racks these up like trophy + points. Can be seen, and hunted, but rarely heard. + (Scientific Name: Charjum Visacum) + +Typ-O 101 MOST BBS Backspaces 100 words per minute. Needs a dictionary + Scholar to spell one syllable words, is totally oblivious + to the raping of the English language. + (Scientific Name: Coronas Backspacious) + +Rampant ANY BBS Even the simplest greeting becomes akin to the + Run-On Gettysburg Address in long hand. Verbosity and + excrutiating dullness impact with each sentence. + Messages are a wonderful cure for insomnia. (yawn) + + (Scientific Name: Babbleus Eternius) + +Techno- MOST BBS Preceeds text with line numbers. Gloats of all + Nerd programaming conquests openly on any message base. + Constantly quotes technical manuals and similar + uninteresting jargon. Excessive breeding within + this catagory discounts ANY hope of extinction. + (Scientific Name: Floppius Pee-Wee-nus) + +National ALL BBS If bathroom walls could talk! Studies mating habits + Inquirer of other species. Coverts confidential tidbits to + maintain dominance over other species. Poor self + image and grooming habits. Predatory creature. + (Scientific Name: Buttinskius YurBizness) + +SysOp's ALL BBS Constant feedback and mail of an irrelevent nature + Suck-Up from this species wasting valuable disk space and + precious time of the Operator. Usually to gain + additional status in the social ladder. Blatantly + obvious and a professional BROWN-NOSER. + (Scientific Name: Operatum Fellatio-scum) + +Chronic MOST BBS Proficient at reporting (publicly) every minute + Complainer flaw in the system software. Never satisfied with + access levels, etc., but offers their constantly + neglected suggestions for unnecessary improvement. + (Scientific Name: Perpetuous Bad Bitchius) + +Old ALL BBS An on-line fossil, virtually adopted by the SysOp, + Faithful a permanent fixture since the board's conception. + Suffers from Geritol induced flash-backs of the + "good" old days, but nobody seems to care. (sigh) + (Scientific Name: Primordius Geezeratum) + +Absolute MOST BBS Wanders aimlessly through discussions which go + Airhead beyond their miniscule intellect and capacity to + absorb thought. Although totally confused about + the simplest meanings of expressed opinion, biology + and reproduction are engrained into their genes! + (Scientific Name: Cranious Lobotomus) + +Connoisseur ALL BBS Putrid display of atypical sexual "-philias", i.e. + of Kink necrophilia, farm-animalophilia, etc., even on the + public sections! Illicit fantasies and other + abnormalities of anonymous lust monopolizes any and + all topics of discussion. Cross species mating is + well documented, including (ahem) single gender + (ahem) social "intercourse". + (Scientific Name: Rob Lowe-us Minoris) + +Frequent *ALL BBS* Has never discoverd the "pause" key or command. + Flyer Reads every third line (partially) and barely + comprehends the meaning. May find topics of + interest, yet prone only to reply when conversation + is directed at themself. Requires baud rates GREATER + than the speed of light, and does not know the + meaning of the word "buffer". + (Scientific Name: Blastum Inius Outius) + +Mongers of *ALL BBS* Fornicators of filth, habitually reducing eloquent + Manure dialogue to sickening sewer scum. Complete, + immoral, unethical, anti-social, and outright + grotesque abuse of the English language. Offensive + to ALL users and Operators, be it intentional or + not. WARNING: Easy prey, deleted upon discovery + of such vulgarity by any and all SysOps. + (Scientific Name: Flingus Fecius In Fan-ius) + +The Phantom *ALL BBS* Elusive, unidentified wanderer through any or all + Phreak message areas, who simply does NOT contribute. + Mating, eating, migratory habits: UNKNOWN. The + most feared on-line predator with a callous dis- + regard for ANY aspect of terminal communications. + Abusive of other users time and waste of usable + electricity and phone lines! Excessive breeding. + (Scientific Name: No Participato Spirito) + + +Disclaimer: The above classifications are designed to descibe the spirit, +---------- essence, and personality of typical BBS users. Any references + to particular persons have been cleverly and deceptively + altered to protect no one. + + + +CONCOCTED SUMMARIZATION: +======================= + +In closing, there are many types of on-line habitants who possess the above +characteristics including some not listed due to necessary censorship. +Also, many such individuals may cross over into more than one catagory, or +dabble in a little bit of them all. Please note this listing is factually +represented with respect to a PURELY scientific study (*B.S. ALERT*) based +on years of intensive and excrutiating field investigations. + +Or...something like that. It sounds good, anyway. + + + + Researched By: + The Author and Trusty Research Assistant + (two people obsessed with BBS social misbehavior) + + +--------------------------------------------------------------------------- +For incomplete journal transcripts and copies of fabricated test results, or +if you wish to comment on this in-depth study of on-line human behavioral +patterns be sure to contact my public "research" line: + +Access Denied Public Message System +(301) 761-6216 24hrs/300-1200 8N1 +Online since 1985, Dedicated to the users. + + + + +If you like this file please feel free to distribute it. I am sure you will +continue research on your own when you call more systems, as there ARE a +surplus of available test subjects like those listed here... + +Get your note pad ready! + +* EOF, Sysop Suicide parts 1 thru 5 * + + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X + + Another file downloaded from: NIRVANAnet(tm) + + & the Temple of the Screaming Electron Jeff Hunter 510-935-5845 + Rat Head Ratsnatcher 510-524-3649 + Burn This Flag Zardoz 408-363-9766 + realitycheck Poindexter Fortran 415-567-7043 + Lies Unlimited Mick Freen 415-583-4102 + + Specializing in conversations, obscure information, high explosives, + arcane knowledge, political extremism, diversive sexuality, + insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS. + + Full access for first-time callers. We don't want to know who you are, + where you live, or what your phone number is. We are not Big Brother. + + "Raw Data for Raw Nerves" + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X diff --git a/textfiles.com/bbs/sysoptest.txt b/textfiles.com/bbs/sysoptest.txt new file mode 100644 index 00000000..b76d2f09 --- /dev/null +++ b/textfiles.com/bbs/sysoptest.txt @@ -0,0 +1,518 @@ + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +The SysOp Test (c) 1991 By Robin Francis & Bruno Gagnon +Last updated 2-Sep. 1991 (while drinking coffee and wearing mirror shades..) +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +This test has been made for amusement purposes only and is not intended to +reflect one's ability to be a SysOp. The concept for this was based upon +The Hacker's Test by Felix Lee, John Hayes and Angela Thomas. + +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Scoring Legend: + +-51 to 50 WEENIE!... Try this : ECHO Y | FORMAT C: + 50 to 100 You're not a SysOp.. You're the one who calls my board so often! +100 to 120 You made it! You're a SysOp! Welcome to the net! +120 to 140 What's this? You're not a hub yet?... You should be! +140 to 160 Power-SysOp - One who does the REAL work! +160 to 180 SysOp / Hacker - Keeps everyone on their toes! +180 to 200 SysOp / Guru - One who runs the net! +200 to 300 Did you work at the MIT AI Lab on the 9th floor in the 60's? +300 to 330 A demi-god!.. We all aspire to reach your level!! +330 to 400 You cheated!... LIAR!!! + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + +Personal Section +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Q# Pts +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1 1 Do you drink coffee? + 1 .. More than 2 cups daily? + 1 .. More than 8 cups daily? + 4 .. Do you drink it straight from the pot? + +2 1 Have you ever made a full pot of coffee for yourself? + +3 1 Do you keep your coffee warm in the coffee maker? + 1 .. on a hotplate? + 4 .. on the CPU? + +4 1 Do you smoke? + +5 1 Do you smoke more than a pack a day? + 1 .. more than two packs? + 2 .. enough to overflow your ashtray in one evening? + +6 1 Have you ever lost a full pack of cigarettes on your desk? + 2 .. For more than a week? + +7 1 Do you call your own system from remote often? + +8 1 Do you regularly make voice calls to other SysOps? + 1 .. more than 1 in the same conference call? + 2 .. more than 4 in the same conference call? + +9 1 Can you whistle 300 baud? + 1 .. 1200 baud? + 3 .. 2400 baud? + 6 .. 9600/ARQ? + 10 .. Can you download files that way? + +10 1 Do you meet with other SysOps regularly? + 2 .. Do you bring a computer too? + 2 .. Do they appreciate meeting with you? + +11 2 Do you register your bbs utils and other shareware you use? + -1 .. (If you answered no to the above) + +12 1 Have you ever tried to improve your score on the SysOp Test? + 1 .. Without cheating? + +13 1 Are you in front of your computer for more than 3 hours a day? + 1 .. More than 6 hours? + 2 .. More than 12 hours? + +14 1 Do you login before breakfast? + +15 1 Is your computer located in your living room / bedroom? + +16 -1 When replying to someone's message, do you quote more than 15 lines + at a time? + +17 -1 Do shareware authors chase you for not registering their software? + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + +Knowledge & Experience Section +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Q# Pts +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1 1 Do you know what FOSSIL stands for? + 1 Do you know what ANSI stands for? + 1 Do you know what ASCII stands for? + 1 Do you know what WYSIWYG stands for? + 1 Do you know what BBS stands for? + 1 Do you know what UPS stands for? + 1 Do you know what USR stands for? + 1 Do you know what TTFN stands for? + 1 Do you know what TTYL stands for? + 1 Do you know what FYI stands for? + 1 Do you know what RTFM stands for? + 1 Do you know what BTW stands for? + 1 Do you know what IBM stands for? + 1 Do you know what MFM stands for? + 1 Do you know what CBCS stands for? + 1 Do you know what CIS stands for? + 2 Do you know what TRFN stands for? + 1 Do you know what g stands for? + 1 Do you know what VGA stands for? + 1 Do you know what HGC stands for? + 1 Do you know what CGA stands for? + 1 Do you know what EGA stands for? + 1 Do you know what .PKT is? + 1 Do you know what .MO? is? + 1 Do you know what NUL stands for? + 1 Do you know what BASIC stands for? + 1 Do you know what COBOL stands for? + 1 Do you know what APL stands for? + 1 Do you know what FORTRAN stands for? + 2 Do you know what DANGER means? + + +2 1 If you get a "hatch" do you know what to do? + +3 1 Have you ever manually done a handshake session with a mailer? + 2 .. And received echomail or files from it? + +4 1 Have you ever written Kludgemail? + 1 .. Intentionally? + 2 .. Are you still in that net? + +5 4 Did you figure out how to set up echomail by yourself? + 1 .. Are you proud of it? + +6 1 Are you in more than 1 net? + 1 .. More than 4? + 2 .. More than 8? + 4 .. More than 16? + + + + +7 1 Do you write your own BBS utilities? + 1 .. Your own door games? + 1 .. Your own bbs software? + 1 .. Your own mailer? + 1 .. Your own operating system? + 2 .. Have you ever received money for any of the above? + +8 1 Have you ever built your own micro computer? + 1 .. Your own mini computer? + 1 .. Your own mainframe? + 1 .. Your own super computer? + 2 .. Did it work? + 4 .. The first time? + +9 1 Have you ever repaired a hard drive? + 1 .. Successfully? + 4 .. Successfully while smoking cigarettes? + +10 1 Have you ever built or designed a processor? + +11 1 Do you regularly chat online with other SysOps? + 1 .. Through Tymnet? + 1 .. Through Datapac? + 2 .. Through Milnet? + 1 .. Thought Arpanet? + +12 1 Have you ever found an undocumented feature in a bbs package? + +13 1 Have you ever found a bug in a bbs package? + 1 .. In a mailer? + 1 .. In and operating system? + 2 .. Did you fix it? + +14 1 Have you ever seen the dawn? + 1 .. Twice in a row? + +15 1 Do you hub / relay / host? + 1 For more than 1 net? + +16 1 Can you program in Batch? + 1 .. BASIC? + 1 .. QBasic? + 1 .. Any version of Pascal? + 1 .. Any version of C? + 2 .. Assembler? + 1 .. Fortran? + 1 .. Any Waterloo language? + 1 .. APL? + 1 .. COBOL? + 1 .. ALGOL? + 1 .. PL/1? + 1 .. Spitball? + 2 .. MECCA? + 5 .. Microcode? + 10 .. All of the above? + +17 1 Can you use Edlin? + -1 .. DO you use Edlin? + + + + + +18 1 Can you use Debug? + 1 .. Do you use it on a regular basis? + +19 Have you ever walked a new SysOp through a mailer installation over + 1 a voice phone? + 2 .. From memory? + 3 .. Did it work the first try? + +20 1 Ever used a floppy disk with no jacket? + +21 1 Have you ever tried to format a disk beyond its' rated capacity? + 1 .. Did it work? + +22 1 Have you ever modified a peripheral device? + 1 .. Did it work? + +23 1 Have you ever experienced a hard disk failure? + 1 .. Did you cause it? + 2 .. Intentionally? + +24 1 Do you backup at least yearly? + 1 .. Monthly? + 1 .. Weekly? + 1 .. Daily? + 2 .. More than once daily? + -5 .. "What's a backup?" + +25 1 Have you ever voided the warranty on any of your equipment? + 3 .. On ALL of your equipment? + +26 1 Have you ever built your own cables? + 2 .. In the dark? + 3 .. Honestly? + +27 1 Can you name the pin-outs for an RS-232 / serial connector? + 3 .. In numeric order? + 1 .. For a null-modem? + +28 2 Can you write a full screen ANSI for your bbs using only 'copy con'? + 4 .. Was it aligned on the first try? + +29 1 Can you pogram when you are intoxicated? + 2 .. Does it make sense the next day? + +30 1 Have you loaned manuals? + 2 .. And got them back? + +31 1 Have you ever loaned hardware? + 2 .. And seen it again? + +32 1 Have you ever borrowed software/hardware and forgot who the + original owner was? + + + + + +33 1 Have you ever made a GIF? + 1 .. A FLI? + 1 .. A self-extract MAC? + 2 .. And had them actually downloaded from your bbs? + 3 .. Were any of them "X" or "R" rated? + +34 2 Have you built your own peripheral device? + 1 .. Is it still operational? + 2 .. Has it since entered mass production? + +35 1 Have you ever flamed someone? + +36 1 Have you ever flamed someone in a national / international echo? + +37 1 Have you written more than one test message in an international echo? + 2 .. Without being noticed? + +38 1 Have you ever posted a BBS ad in a national / international echo? + 2 .. Without being noticed? + +39 -1 Do you impose a file ratio on your bbs? + +40 1 Do you have a copy of a virus? + 1 .. 4 or more? + 2 .. 16 or more? + -5 .. That you haven't been able to get rid of? + +41 1 Have you ever modified your computer in order to gain performance? + 2 .. Did it work? + +42 2 Have you ever programmed anything in order to make up for a + shortfall in the bbs package's own code? + + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + +Equipment Section +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Q# Pts +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1 1 Do you have a touch-tone phone? + +2 Do you have any other custom calling feature from your telco? + 1 (call waiting,conferencing,ISDN, etc..) + +3 -1 Do you have call waiting on your modem line? + +4 1 Do you own a phone that has unauthorized modifications made to it? + 1 .. Did you make these modifications yourself? + +5 1 Do you own a headset for your phone? + 1 .. And own replacement earplugs for it? + +6 1 Do you own a Sound Blaster / Roland / Adlib / CoVox card? + +7 3 Do you own a speech recognition system? + +8 1 Do you have a scanner? + 2 .. A full page scanner? + 3 .. A color scanner? + +9 1 Do you own a printer? + 1 .. A 9-pin? + 1 .. A 24-pin? + 1 .. A line printer? + 2 .. A drum printer? + 3 .. A laser printer? + 4 .. A color laser printer? + +10 1 Do you have a mouse? + 1 .. A gerbil? + 1 .. "A what?" + +11 1 Do you have a joystick? + +12 1 Do you have a trackball? + +13 2 Do you have a light pen? + +14 1 Do you have a modem? + 1 .. Is it capable of 300 baud? + 1 .. Is it capable of 1200 baud? + 2 .. Is it capable of 1275 baud? + 1 .. Is it capable of 2400 baud? + 1 .. Is it capable of 4800 baud? + 2 .. Is it capable of 7200 baud? + 1 .. Is it capable of 9600 baud? + 1 .. Is it capable of 14,400 baud? + 1 .. Is it capable of 19,200 baud? + 4 .. Does it have a direct fiber optic input/output? + +15 1 Do you have more than one computer? + 1 .. More than 2 computers? + 2 .. More than 4 computers? + 4 .. More than 16 computers? + 1 .. Are they connected together? + + + + +16 1 Do you have a LAN? + +17 1 Do you have at least one floppy disk drive? + 1 Do you have a hard disk? + 1 .. 2 harddisks? + 2 .. 4 harddisks or more? + +18 1 Do you own a tape backup? + +19 1 Do you own a DECwriter? + 1 .. Do you use it? + 2 .. Do you admit using it? + +20 1 Do you own a floppy disk? + 1 .. A box (of 10) or more? + 1 .. 100 or more? + 2 .. 1000 or more? + 3 .. 10000 or more? + +21 1 Do you have any multi-colored disks? + 1 .. Do you admit it? + +22 1 Do you own an acoustic coupler? + 2 .. Do you use it? + +23 2 Do you own a copy of DOS Powertools? + 1 .. The most recent copy? + 1 .. A LEGAL copy? + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + + + +User Interaction and Services Section +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Q# Pts +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +1 1 Does your system have at least 100 users? + 1 .. 200 users? + 1 .. 400 users? + 2 .. 1000 users? + +2 1 Do you reply to mail? + 1 .. Are you polite when doing so? + 2 .. Same day? + 4 .. Do they understand you? + +3 1 Do you have door games? + 1 .. More than 10? + 2 .. More than 50? + 4 .. Are they all registered? + 1 .. Do you participate? + -1 .. Do you cheat in any of them? + 1 .. Without getting caught? + +4 1 Do you chat with your users? + 3 .. At ANY time of the day or night? + +5 -1 Have you ever disconnected a user and blamed it on "line noise"? + -2 .. Just for the hell of it? + 1 .. Have they forgiven you? + +6 -1 Have you ever used an "Auto-Z" fake? + -2 .. More than 20 times on one user? + -3 .. During the same session? + +7 Do you have more than 2 keys defined to boot a user off the system + -1 in different ways? + -2 .. More than 4 keys? + -5 .. Are all your definable keys used for this purpose? + +8 1 Are you in the habit of telling your users to RTFM? + +9 -1 Have you ever withheld mail from someone? + -1 .. Altered someone's mail? + -3 .. Deleted mail before the recipient got it? + 1 .. Were you NOT caught for it? + +10 1 Do you run more than one node? + 2 .. More than 2 nodes? + 5 .. More than 10 nodes? + 10 .. More than 50 nodes? + +11 -1 Do you charge your users for access? + +12 2 Have you programmed on the fly to help a user? + +13 1 Have you standardized the archive format on your board? + -2 .. "What's an archive?" + + + + +14 1 Do you have an offline mail reader for your users? + 1 .. Is it registered? + +15 -1 Have you "twitted" a user for excessive chat requests? + +16 1 Do you have your uploads automatically checked by software? + 2 .. By your secretary? + +17 1 Do you have matrix mail accessable to your users? + +18 1 Do you have echomail available to your users? + +19 2 Do you have Usenet available to your users? + +20 1 Do you have any external protocols setup that were not originally + included with your bbs package? + +21 2 Do you reward uploads in any way at all? + +22 1 Do you have an external chat program installed with "Co-SysOp" feature? + 2 .. Is it working well enough to fool users? + +23 1 Does your bbs offer multi-lingual interaction? + +24 -10 Have you cheated on this test? + + + + + +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +Notes +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Submissions / comments / suggestions in regards to the SysOp Test should be +forwarded to: + +Robin Francis +ÄÄÄÄÄÄÄÄÄÄÄÄÄ +The Unusual BBS (613)820-0399 +100:649/4@TRFN 89:483/120@IMEx 1:163/153@FIDOnet + +Bruno Gagnon +ÄÄÄÄÄÄÄÄÄÄÄÄ +Floppies BBS (819)682-1245 +100:649/1@TRFN +CIS: 71141,2506 +PcLink: Systat + +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +** End of SysOp Test ** diff --git a/textfiles.com/bbs/tales.13.yr.old b/textfiles.com/bbs/tales.13.yr.old new file mode 100644 index 00000000..cfd96252 Binary files /dev/null and b/textfiles.com/bbs/tales.13.yr.old differ diff --git a/textfiles.com/bbs/tbk1.txt b/textfiles.com/bbs/tbk1.txt new file mode 100644 index 00000000..7382c8b7 --- /dev/null +++ b/textfiles.com/bbs/tbk1.txt @@ -0,0 +1,273 @@ + + +You are sharing this universe with: + + 0 : The Black Knight in teleconference with 84 min +Parser is Power! Opponents wanted for: + + + 1 : Tracker in teleconference with 84 min +"Undecided" Opponents wanted for: POKER,CHESS + + + 2 : Chip Fu in teleconference with 17 min +Do people still burn witches? Opponents wanted for: + + + 3 : in logon with 0 min + Opponents wanted for: + + + 5 : Bigben in teleconference with 55 min +"SPRINGBOARD STUD" Opponents wanted for: + + + 6 : Morning Star in teleconference with 234 min +"SPRING" FEVER!!! Opponents wanted for: + + +(Tracker) everyday +Private message from The Black Knight : +I can find out ALOT of things about many people.I am nosy, and I +HAVE to find +out who you were. I can't stand not knowing things +(Morning Star) hahaha + +A "Live" message is comming in +from User ID : Bigben + +The message is: I can send stuff hahaha!!!! ] + +A "Live" message is comming in +from User ID : The Black Knight + +The message is: cuz you can't .send + why   so you all have sysop access? + +A "Live" message is comming in +from User ID : The Black Knight + +The message is: no + well then? +(Morning Star) Yup I do Have It! +(Bigben) no we are donators +(Tracker) I had to expand my time +I could before today. +(Morning Star) hahahaha +Private message from The Black Knight : +gonna tell me or not? +(Bigben) no you don't MSD +(Bigben) -d +I can't tell t ypo  ou what I don't know,    +(Morning Star) Yea I KNow +(Morning Star) Just Busting +Private message from The Black Knight : +cut the hairy BS, I'll find out on my own, and then I'll tell +everyone. +(Morning Star) What did you expand it to +Tracker? +could some one tell me why TBK is harrassing mer ? he want's to +know my previous +name, I don't have one and even if I did i shouldn't have to tell +him, Right? +(Tracker) ferrari +(Morning Star) Cool +(Tracker) I had to +(Morning Star) Yup your time was just about up! +Bigben waits to see who is online 3 + +(Tracker) not anymore +(Morning Star) hehehe +.who + +You are sharing this universe with: + + 0 : The Black Knight in teleconference with 81 min +Parser is Power! Opponents wanted for: + + + 1 : Tracker in teleconference with 81 min +"Undecided" Opponents wanted for: POKER,CHESS + + + 2 : Chip Fu in teleconference with 14 min +Do people still burn witches? Opponents wanted for: + + + 3 : in logon with 0 min + Opponents wanted for: + + + 5 : Bigben in teleconference with 52 min +"SPRINGBOARD STUD" Opponents wanted for: + + + 6 : Morning Star in teleconference with 231 min +"SPRING" FEVER!!! Opponents wanted for: + + +(Morning Star) Right I guess +right to me? MS? +(Bigben) well Chip I was on here the last time you +were and you said you have a previous account +(Morning Star) Yup +If I did or didn't it is irrelevant, I don't have to give away if +I don't don't want +to. +(Morning Star) Ahhhhh Well well well! +Private message from The Black Knight : +you don't have to tellme. Just when I DO find out will spread it +around +and everyone will know who you were. What the hell do you hink I +am? STUPID? +IQ=140+! +Private message from The Black Knight : +TRECH +This guy is really annoying he sends private messages of slander, +saying he +will tell everyone, what is his point? +(Morning Star) Anyone have ROJACKS Number? +(Morning Star) heh +(The Black Knight) rojack? +(Morning Star) Yup +(The Black Knight) not on here +(Tracker) whats rojacks +(Morning Star) BBS! +(Morning Star) brb +not stupid just a weirdo +Private message from The Black Knight : +I'll find out on my own +If you have a point please make it, I don't want to hear it. what +is the point +anyway? +(The Black Knight) I never said I was nornmal +(The Black Knight) try ".user chip fu" says you've +been on here since 1-9-93! +so what? Whay do you need to know? are you an a respirator and +this will cure +you from it>? +(The Black Knight) That you are a liar and will be +doomed to hell for lying +(Morning Star) who cares! anyway! +(The Black Knight) me +(Morning Star) Both of you! +(The Black Knight) sorry +are you a religious buuff? You should be banned from telecom! +(Tracker) Talk to later +(Morning Star) Bye Tracker +(The Black Knight) Chip, the discussion has ended, go +in peace. Hope you didn't change your handle cuz people hated you +Tracker disappears in a Puff of Smoke! + +(The Black Knight) why? +No, I don't know what you are talking about, you annoying little +ediot, ScReW +You +(The Black Knight) I'm oine of the NICE guys! +(Morning Star) Thanx TBK for stopping +(Bigben) yea right!! I am nicer!!! +(Morning Star) hahahahahaha +(The Black Knight) and no I'm not a religious buff, +thought I have studed the ancient tribal customs of the +Quendorians in great +depth +Bigben is going to start in! + +(Morning Star) I'm the best!!!!! +ooohhh +Private message from The Black Knight : +C-Ya in hell! +(Morning Star) SHUT UP NOW! WHO +CARES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! +No, he is a real Jer-k for annoying me out of the blue and +posting stupoid +ballots in the voting booth! +(The Black Knight) I'm not saying another public +word +(Bigben) you shaddup!!!!!! WOMEN!! +(The Black Knight) heh +The Black Knight apolgizes to MS + + + +Channel 1 : Intrepid logged on + +(Bigben) kiss ass! +(Morning Star) iI LIKE IT WHEN YOU CALL ME +WOMAN! +(Morning Star) Excepted! +now I am gonna be the bad guy? for defending myself when this +freak starts with +me? Sorry MS but I shouldn't have to take it. +Private message from The Black Knight : +I'm not even getting warmed up, shall we go another two rounds? +Your ballots +are stupider than U are! +Bigben takes TBK's aplogy back from ms + +(Morning Star) heh +The Black Knight apolgizes again + + +The curtains part! And Intrepid appears! + +(The Black Knight) Hieya +Bigben takes it back again + +(Morning Star) I except it TBK! +(Morning Star) Hiya +(Intrepid) hello +Ha, if you guys could see the .sends he sends me, Heh, You pig, +stupid! +(Bigben) intrepid, eradicators buddy!!! +(Morning Star) DROP THE WHOLE DAMN THING WILL +YA! +(Bigben) NO! +(Intrepid) me? +Private message from The Black Knight : +You ARE the bad guy. Hell on earth? You've got it cheezwhiz +(Morning Star) No +(The Black Knight) I haven't said a word +(Intrepid) Chip, who do you have a beef with? +(Morning Star) CALL ME WOMAN AGAIN BIGBEN! +TBK is harrasing me, and trying to slander my name, heh, little +man I have more +power that n you, don't mess with me! +(The Black Knight) I haven't typed a send at% +(The Black Knight) NO CARRIER +The Black Knight disappears in a Puff of Smoke! + +good ridance, I waste my precious time dealing with ediots~! +(Intrepid) he did that to me yesterday + +Time flies when your having fun! +You have 5 minutes remaining on this call. +Check Bulletin #5 for Info on getting more time.(Bigben) what now +you are a tough guy CHIP? + + +(Morning Star) I have to go anyway for now talk +later! +Private message from Bigben : +heh... threating is fun if you have size to back yourself up I +do! +modem size is all fool! +Private message from The Black Knight : +We burn in hell together, use a damn Private message, instead of +public you +PHEWL! +(The Black Knight) bye +(Morning Star) Bye! +(Bigben) BYE WOMEN +it said I can't fuc+k face! +Private message from The Black Knight : +but below the belt size is nto +(Intrepid) Darkness told me to report eradicator, and +I did. +.exit +You have 3 minutes remaining on this call. +You have 3 minutes remaining today. + +Press [ENTER] to continue + + diff --git a/textfiles.com/bbs/tcctale.txt b/textfiles.com/bbs/tcctale.txt new file mode 100644 index 00000000..9e0f0fbf --- /dev/null +++ b/textfiles.com/bbs/tcctale.txt @@ -0,0 +1,154 @@ + +ONCE UPON A TIME ON A BBS FAR FAR AWAY ............. + + Paging sysop............. + + ....YOU ARE NOW IN THE PRESENCE OF THE ALMIGHTY GOD-LIKE SYSOP.... + + + [Papa Fractal]: Yes oh subserviant user, what do you want from my awesome- + ness? + + From Nikki: I have a complaint about some abusive users that are slandering + my name. They are saying horrible and despicable things! + + [Papa Fractal]: Do you have any PROOF that these "so-called" abusers are + saying these things? + + From Nikki: Yes, I have a capture and there are some very cruel and dis- + gusting things on the WALL. + + [Papa Fractal]: Send me your copy of this "capture" and I will look into + these matters oh small and meaningless user. + + From Nikki: I would appreciate if you would. Thank you. + + [Papa Fractal]: Yeah, whatever... + + .....YOU HAVE BEEN RELEASED FROM THE MOST HIGH REALM OF ...... + THE SYSOP GODS OF CYBERSPACE +MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM +The Next Day **************************************************************** +MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM + Paging sysop............. + + ....YOU ARE NOW IN THE PRESENCE OF THE ALMIGHTY GOD-LIKE SYSOP.... + + [Papa Fractal]: Yeah, what do you want bitch? + + Nikki: (gasp) I thought you said you were going to take care of all + those terrible things on the wall and those users who were + calling me a child molester!! + + [Papa Fractal]: I have no idea what you are talking about, even if I did + care. + + Nikki: (in utter amazement) This is outrageous, I just talked to you yest- + erday about this, weren't you even listening? + + [Papa Fractal]: Have we talked before? + + Nikki: Well if you won't do something about this then I'll have to see what + legal action I can take. This is slander and defamation of character + and I won't stand for it!!! + + [Papa Fractal]: I should warn you that any action taken against us could + be used against you. + + Nikki: Well, we'll see..... + + [Papa Fractal]: Yeah whatever Miss Jackson....er Nikki. + + *************************************************************** +******* LATER THAT EVENING AT THE HOME OF PAPA FRACTAL AND HIS MASTER ******* + *************( Over a nice candle light dinner )*************** + + Papa Fractal: I'm having some problems with that Nikki bitch.....you know + the child molester, anyway I was wondering if you think she + she could be serious about that legal advice. + + Middle Stooge: Oh honey-boy, I don't think she'll really do anything.... + She sounds like she's all talk.....just post some bullshit + in the adult forum, you know, some really incriminating shit, + and let all the other users finish her off.... Pass the + sausage will you love? + + Papa Fractal: Well...uh....I sorta already deleted her....ooops. + + Middle Stooge: What?! Why did you do that? + + Papa Fractal: Oh, I don't know, I guess I felt like it. + + Middle Stooge: Oh, ok. + + Papa Fractal: Well, I'll just make up some stuff to cover our butts. + + Middle Stooge: That sounds like a good idea...speaking of butts, you should + get yours in the shower, did you forget that Slut-Bird was + cumming over tonight to spin our hard drives? + + Papa Fractal: Oh goody, you know how I just love to ruffle her feathers. + + Middle Stooge: Well then silly boy, get that cute ass in the shower, we +don't have very much time, she'll be here in a bit.... + maybe I should help you "clean up". + + Papa Fractal: Ok, but aren't you going in to work the bar tonight? + + Middle Stooge: No, I closed up early in preparation for our Friday, I'm + going to call it "Orgy Night at the 069 Club". + + Papa Fractal: In that case let's get in the shower, and if your good I + might even drop the soap........ + +MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM +The Next Day: Posted in the ADULT FORUM on a BBS FAR FAR AWAY ............. +MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM + +Date: Sunday, December 12, 1993 11:22am /ADULT +From: Papa Fractal Msg#: 000540 + To: ALL + Re: Nikki + + In reference to a previous post: + + The message you just read, was sent to me Via Email. This type + of treatment will not be tolerated. NO USER shall have the right to + speak freely on MY...er OUR board. Nor shall ANY USER hold a personal + opinion, or speak said opinion on this board. If you THINK differently + than I do that is grounds for termination. I understand ALOT of you + have had your share of problems with Nikki. I wish to inform you all, + that the child molester will NO LONGER be calling this board. + + At this time I will acknowlage that I have had over 20+ complaints + concerning this user. However, under the guidelines of this board, + our hands were tied. It is difficult to remove a user, when they have + not only paid $25 to use it, but what the heck, its only $25 bucks. + To DEMAND anything from the sysops of this bbs, and to stand up for + her rights like she did, especially THREATENING an all powerful sysop + in Teleconference, will be immediate grounds for removal. + + When we read the previous message, we promptly went into Teleconfenece + and spoke with Nikki. She quickly got rude, obnoxious and threatening + to us, saying "She knows how to destroy us". And that we "will NEVER + see the LAST of her". + + Between this message, and the previous post, does this sound like the + words of a 27 year old bitch? (at least) I dont think so, and niether + does the other 3 stud...er....sysops, therefore, her account has been + TERMINATED. + + Thank you, and sorry for the problems she has caused you all. + I can assure you, she will not cause any more grief. + + Please continue to enjoy this most wonderful BBS, or else. + The God-like Sysops. + +(R)eply, (E)mail reply, follow (T)hread, (P)revious or (N)ext message? + + + + + + +  \ No newline at end of file diff --git a/textfiles.com/bbs/tdt-bust.nfo b/textfiles.com/bbs/tdt-bust.nfo new file mode 100644 index 00000000..0a568fc1 --- /dev/null +++ b/textfiles.com/bbs/tdt-bust.nfo @@ -0,0 +1,116 @@ + FED BUSTS -*- TDT TEMPORARLY DISBANDED + + + This will not be written with grammer or anything in mind. This is + Pepsi Man, The sysop of CARBON NATiON. CN [Carbon Nation] was a TDT + Member Board, TRWS Member Board, Skid Row Site, and Genesis Project + Site. Well things were going great with all the 0 day files coming + in from the couriers. Even calls from Sweden were coming in. Well + the trouble came up when I decided that 1.4 gigs weren't good enough. + Even though The Grim Reaper gave me some awesome deals on HD's before, + I just couldn't get enough money together. I decided I would just + card the Drive and thats all.. no more.. Eveyone would be happy.. So + Well I called up the company.. [Western Digital] and ordered a 660 + Meg HD with a Card Number I got from The Grim Reaper. SO I went to + pick it up at the post office, and everything was great.. I installed + and was running off 2 Gigs. After making many conference calls between + Myself, Grim Reaper, and Soultaker, we decided that we could really make + some money of this.. Enough to double or releases by having constant + cash flow to give to the suppliers. So I ordered 5 80 meg Maxtor HDs + with this same Card. The Grim Reaper picked them up.. by this time the + Feds are into the picture. THe fucking Feds figured out the Card was + bad on teh first order when the company called to tell them that they + suspect fraud when the owners of the card number I was using did not + make any purchases regarding computer shit. So they got intouch with + Western Digital and said to notify them next time an order came in with + this card number. SO they did this and the call was traced back to my + house. My phones have been tapped for a week or 2 now.. Hope no one + important called.. I did not know about any of this fucking shit and + when The Grim Reaper came to pick the drives up he was busted. The + stupid fuck was so selfish he turned in all active members of TDT and + gave them his accounts on many of teh largest BBS's across the known + pirate world. Well after the Fedz logged on my BBS they checked it + out and came to my house the next day.. full of warrants and all this + fucking shit. Well my BBS has been down for about 4 days now. The + Feds are logging on as me on many BBS's and checking them out. My phone + is off the hook for my BBS. The fedz have my user list and the phone tap + has about 2 weeks worth of calls logged on it. Now to everyone who knows + me, you know I could give to shits. I am a minor still and don't think + they will do shit but confinscate all my Computer shit and thats it. + THe main reason I am saying this: DO NOT CALL EITHER OF MY BBS LINES! + ALSO DO NOT CALL ME VOICE. EVERYTHING IS TAPPED AND BEING RECORDED. + I have a feeling that many sysops will be receiving some voice calls. + I encourage to quit the scene now. Not forever.. just till this shit + clears up. THe Fedz have me on Piracy, Mail and Creidt Fraud, Phone + fraud.. all this bullshit. Also Sysops: DELETE ME OFF YOUR BBS's. THE + FEDS WILL LOGON AS ME AND FUCK YOU UP! + + Also I hope this will convince you guys: Get out now. Some of + you guys have a wife and kids. Grim Reaper fucked us over big + time. Take your BBS's down at least for a week or 2.. Don't be + stupid. I admit getting the newest and hottest shit from the + best Groups is awesome but its not worth prison. You gotta + draw the fucking line somewhere. Well I've said my share.. + Hope you will heed my warning.. I speak from experience. + + Pepsi Man + -*- THE DREAM TEAM -*- + + + Well a Few Final Words: + ~~~~~~~~~~~~~~~~~~~~~~ + + The Grim Reaper: Man you were an incredible supplier. Too bad + you were too fucking lame to go down alone. + You'll always be a fucking loozer. + + + Lord Thinker: You were right man.. I guess I did have my + Priorities fucked up. Good Luck in Razor. + Looks like they will rule the scene now eh? + Too bad we got fucked up in the end. I'm + sorry about teh shit I pulled. Hope you + accept the apology. Don't call voice. You + don't need Fedz showing up at your door. + Just know I am sorry. + + Soultaker: Thanks for all the shit you did for CN. + I really appreciated it. THanks man. Call + you when all this shit cools.. + + Hard Core: You run an amazing group. Hope it can survive + the shit Grim pulled on us. Good Luck in the + future. Stay away form this though.. you got kidz. + + S.S: Get out of it man. You were a great friend who + actually cared. I should have taken your warning. + + Sought After: Busts going on everywhere eh? You were cool to + talk to.. Wish it could go on. Thanks for all. + + + To all I forgot: I have no more time. I gotta run.. I hope you + understand the problems. Stay outta the heavy + shit. I really have no more time. I love you. + You made it worth the risks. Thanks for the good + times. + + + To Sysops: DELETE MY ACCOUNTS OFF YOUR BBS'S. FEDS WILL BE + UNDER THEM. I WARNED YOU. + + + + I'll write another file after we are arrained and tell you + what the fuck is going on. I just hope it all goes well. + + Keep fucking pirating. TDT won't die. + + -Pepsi Man + -Sysop: CARBON NATiON + -TDT Member + -TRWS Member + -Genesis Project Site + -Skid Row Dist. Site + -Retiring Pirate - (Till the Fedz are off my case + that is) :*) diff --git a/textfiles.com/bbs/telecomputing.txt b/textfiles.com/bbs/telecomputing.txt new file mode 100644 index 00000000..0099901b --- /dev/null +++ b/textfiles.com/bbs/telecomputing.txt @@ -0,0 +1,1288 @@ + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + T E L E C O M P U T I N G M A G A Z I N E + Electronic Edition + October/November 1990 + (C) 1990 Galaxy Telecomm Corporation + 800-477-1788 + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + + 1 ... Superdemocracy - Tim Stryker + 2 ... Joining the Online World - Victor Baron + 3 ... The FBI Comes Rapping, Rapping at Your BBS - + Brock N. Meeks + 4 ... What's New in ZMODEM - Chuck Forsberg + 5 ... Under the Boardwalk - Dean Kerl + 6 ... Requirements To Display Telecomputing Magazine + On Electronic Bulletin Board Systems + 7 ... Table Of Contents From Our Printed Edition + (What's Missing From The Electronic Edition!) + + CALL 800-477-1788 AND REQUEST A FREE COPY OF OUR LATEST ISSUE! + Telecomputing Magazine, The Online Authority + + +SUPERDEMOCRACY +by Tim Stryker + + Online technology offers the promise of a fundamentally new form of +government: a government truly of the people, by the people, for the people. + + The form of government under which we now live is technically known as +a "representative democracy". This means that we the people do not directly +act as the government... we democratically elect representatives who act on +our behalf to create laws, enforce them, and resolve disputes. These three +functions correspond to the hallowed "separation of powers" everyone knows +from grade school: the legislative, executive, and judicial branches of +government. + + The shortcomings of this system are many. It is generally acknowledged +that although it is the best system yet developed for government on a large +scale (and I for one agree), it fails in several key respects, among them: + + 1. Vulnerability to special interests. Any economic group, such as +real estate developers or tobacco companies, has a much higher stake in the +passage of legislation favorable to the group than the average citizen has +in its defeat. The proposal to re-zone a property outside a five-mile +radius from your house, for example, is something that you personally can +only get incensed about in the abstract, whereas the real estate agents, +lawyers, and developers involved stand to make or lose millions of dollars +on the outcome. Therefore they have an enormously higher incentive than you +do to put pressure on the city or county commisioners making the decision. + + 2. Domination by busybodies. Politics tends to take into account to a +disproportionate extent the opinions of those with nothing better to do, and +single-issue constituencies. The mechanisms for candidate identification, +conducting public hearings, jury selection and so forth are all so +cumbersome and time-consuming that the average citizen has little motivation +to participate. The result is often that the outputs of these processes +suffer from the Milquetoast Effect. In particular, the only candidates +presented to the general public for voting are those that have not been +winnowed out by offending a single one of a host of highly vocal +sub-minorities. + + 3. Getting involved is too much work for the average person. You are +unusual if you even know the names of your representatives to the U.S. +Congress, much less the names of your state congresspersons, much much less +the qualifications of each of the hordes of local judges you may be asked to +vote on every few years. The reason is that, although you know exactly how +you feel about each specific issue, it would take vast research for you to +find out how each candidate feels or has voted on each of the issues +important to you, and to form, for each post, a weighted probability of the +likelihood that each candidate will perform as you wish them to. (On top of +this, if you register to vote, you are penalized with jury duty!) The +result is widespread voter "apathy", especially at the state and local +levels. This isn't really a lack of caring, it's just a sense among the +populace that voting as it stands is too indirect and requires research on +each individual's part far out of proportion to the benefit that they will +individually derive from it. + + 4. Corruption. This is just a more extreme form of vulnerability to +special interests. The incentive to influence legislation or enforcement is +often high enough that a lobby will succeed in "stocking" elective posts +with its own hirelings. The amount of money needed for a campaign, +especially lately, is huge, and it can only be expected that a successful +candidate will look more favorably on the concerns of his or her big +contributors. There is a continuum of possibilities between this state of +affairs and outright payoffs for votes or favors. All of this flies in the +face of the ideal that elected officials and representatives are supposed to +act in the best interests of the community that elected them, as a whole. + + 5. Capriciousness of justice. This concern applies mainly to the +judicial branch of government. The fact that diverse individuals are +elected or appointed to positions of coequal power means that a case may be +decided very differently, depending on which particular judge you happen to +get. The use of juries for the more serious cases is an attempt in the +right direction, but an awful lot still depends on the particular jury, +judge, prosecutor, and defense attorney you happen to wind up with. + + 6. Horse trading and smoke-filled rooms. So much of the actual +mechanics of government takes place outside public knowledge or control that +a lot of the decisions made have nothing to do with what is best for the +community at large, but only what is best for the personal agendas of the +participants. The fact that the participants are subject to removal from +office at the next election keeps them from getting too outrageously +flagrant, but the continuous on-going exchange of favors among lawmakers in +service of their personal ambitions does not exactly constitute government +of the people, by the people, for the people. + + +There Must Be A Better Way +-------------------------- + + Suppose that society could decide every issue by simple majority vote. +This tends to work well on a small scale. For example, in the city-states +of ancient Greece, the entire populace got together from time to time and +enacted the "will of the people" into law, with no man's voice given any +more authority than any other. Another example would be the "town meetings" +of early New England, at which the townspeople got together and formulated +the laws by which they regulated themselves. Today, small non-governmental +organizations such as professional societies often decide policy by direct +vote of the members. + + The reason this works well (on a small scale) is that it eliminates the +role of the "representative". You no longer have a fallible human being, +with his or her own agenda, ambitions, and preconceptions acting on behalf +of the group. The group votes directly on the issues before it, not on a +personality or a suit. + + The reasons this hasn't worked before on a larger scale are mostly +practical. The entire populace cannot physically gather in continuous +session, deciding every detail of policy and law... nothing else in the +world would get done! + + What you *could* have, though, is a continuous networked hierarchy of +online referenda, open to all. The idea would be to create an environment +in which any citizen is free to propose new laws, amend old ones, and to +vote or contribute to ongoing discussions on proposals or amendments +introduced by others at any time. I call this "Superdemocracy". + + Superdemocracy would be continuous in the sense that anyone could tap +into the system any time, 24 hours a day, 365 days a year. It would be +networked in the sense that anything posted about any issue, anywhere in the +system, would be accessible to anyone else. It would be a hierarchy in the +sense that each citizen could access his or her own local, county, +statewide, or national referenda through a single mechanism: a "tree" of +nodes able to collate discussion and voting at all appropriate levels. + + The sorts of things that people could vote on includes everything +currently decided by our legislative and judicial branches, city councils, +policy-forming bodies in the executive branch, and so on. The +implementational portion of each of these branches would be retained, and +all aspects of national life requiring instant decisions would continue to +operate under the control of executive branch personnel. The military would +retain full autonomy under civilian oversight, just as it does now, and +there would still be a President, a Cabinet, police forces, an FBI and a +CIA, and so on. + + But the broad, strategic decision-making power would be vested in the +people directly: the making of new laws, resolutions, and policies, the +amendment or repeal of old ones, the selection of the necessary executive +personnel, and the resolution of conflicts and disagreements. Let's call +these things, in general, "measures". Some key provisions of Superdemocracy +would be: + + 1. Constitutional priority. All measures passed would still be +subject to a consistency test against a statement of underlying principles. +The statement of underlying principles would require much broader levels of +support to modify or overturn. This would help to keep us from wildly +gyrating about the legal landscape as current events shape public opinion. + + 2. Instant delegation and revocation of proxy powers. Each citizen +would have the option to delegate his or her voting powers to other people +(their "representatives", if you will) in various ways, and to override or +revoke these powers at any time. This would provide for a healthy +proportion of the public's voting power to be present in even the smallest +decisions of government, without paralyzing the country in an orgy of +continuous individual voting. The flexibility of these proxy powers would +give each citizen the ability to say to a representative, "I trust your +judgement, overall, on matters within a given area that I personally don't +have enough interest in to bother with the details; however I reserve the +right to change my mind about you at any time or to override your judgement +on occasions when my opinion happens to differ from yours." + + 3. Minimum quorum requirements on every measure. By requiring a +minimum proportion of the overall voting power available to be active in +each vote, we help ensure that happenstantial distortion of the people's +will, due to low participation in a low-profile issue, will not occur. If +quorum requirements are not met in a given vote, it means that not enough +people (or their proxies) feel strongly enough about it one way or the other +to be worth their time. + + 4. Minimum debate-time requirements on every measure. After a measure +reaches quorum, there needs to be sufficient time, around 30 days or so, for +everyone to talk it over and think about it before finalizing the vote. +Each person could continue to update his or her vote status throughout this +period, and only the tally of votes at the end of this period would be +decisive. + + 5. Minimum hold-time requirements on every measure. Further +protection against wild gyrations about the legal landscape can be provided +by establishing a minimum time period, after a measure is passed, before it +can take effect. This would be on the order of 30 days. During this time, +opponents of the measure could try to repeal it or amend it, which, if +successful, would yield another 30-day period for the population to be +really sure that *this* is what it wants, and so on. Any oscillations would +quickly die down, and the true "will of the people" would then take effect. + + Several practical considerations arise. Everyone would have to have +access to a communications link and the knowledge of how to use it, just as +now everyone must have eyes, hands, and a basic ability to read and punch +holes in order to vote (special provisions for the handicapped would of +course apply). Airtight protection against fraud and invasion of privacy +would have to be developed. And, the cost of creating and maintaining this +colossal network of computers would be high. + + +Historic Trends +--------------- + + Technology, strangely enough, has always driven the development of +democracy. Think about it. Democracy has only existed when the overall +level of affluence in a population permitted a significant number of people +to take nose from grindstone long enough to consider the larger issues. + + During the Dark Ages, there were no large-scale democracies, +representative or otherwise, because travel over distances of more than a +few tens of miles was too arduous to make practical the congregation of +representatives from widely separated regions for purposes of timely +decision-making. Also, before Gutenberg, communications technology was so +poorly developed that the knowledgeability of the average villager about +anything outside a ten-mile radius from home was effectively zero. + + Our current model of representative democracy derives from conditions +in the 1700's. At that time, the technology of physical transport had +reached the point at which it was practical for representatives from +communities across the nation to commute to and from a central meeting +place. The entire communities themselves couldn't travel, of course, but at +least their elected representatives could. Similarly, the entire community +couldn't sit in on every 2-bit larceny trial, but they could elect a judge +to oversee the process for them (or, they could elect a governor who would +appoint a judge, etc.). + + As technology has improved, so has the demand for wider and more direct +participation in the democratic process. As created by our Founding +Fathers, it was not possible to vote in most states in the late 1700's +unless you were white, free, male, *and* owned a certain amount of property. +The property requirement fell away in the early 1800's, as technological +advancement brought the affluence of the average freeman -- and thus his +perceived awareness and ability to be informed about political issues -- +above a certain threshold. The race requirement was theoretically +eliminated in 1870 with the Fifteenth Amendment, once the pre-technological +abomination of slavery was forever buried... but further technological +advancements in communications and education were necessary before the poll +tax, which had been used to prevent many blacks from voting, was banned by +the Twenty-Fourth Amendment in 1964. Meanwhile, women gained the vote in +1920, after great agitation and improvements in technology sufficient to +emancipate them from the continuous servitude of housework. + + The particulars of *what* we have been able to vote about has evolved, +too. Originally, the public (as restrictively as the term was defined!) was +not considered competent to elect the President of the United States +directly. It was not even entitled to elect the electors directly! The +public elected the members of the State legislatures, among whose duties it +was to elect the members of the "Electoral College", which elected the +President. + + In this century, a growing tide of "direct democracy" has been sweeping +the nation. This movement, an outgrowth of the Populist and Progressive +movements around the turn of the century, has empowered citizens in most +states with the tools of the "initiative", the "referendum", and the +"recall". An "initiative" is a citizen-sponsored piece of legislation; a +"referendum" refers a proposed or existing law to voters for their approval +or rejection; a "recall" vote is an attempt to remove an elected official +from office prematurely. + + All developments up to this point, though, have centered around the +same cumbersome, bureaucratic methods of vote-gathering that were used in +the 1700's. Voters must first register, months in advance. Then, on the +appointed day, tens of thousands of polling places open in every village and +city neighborhood. Voters then walk or drive, typically several miles, to +their particular polling place, and wait in line while dedicated public +servants pore through mountains of paper, checking off names and handing out +ballots which are voted upon and then reverently placed in the sacred Ballot +Box. It is actually a wonderful thing, and vastly preferable to the +despotic and corrupt systems it replaced. + + +An Example of Operation +----------------------- + + Wouldn't it be incredible, though, if the people's participation in +government were to operate something like this: + + + You come home from the office after a hard day's work, kick your shoes +off, and, flipping on the tube, decide to take a quick glance at the city's +pending resolutions. You notice that today is the last day to vote on the +street-repair proposal, the referendum on funding low-income housing on the +north side of town, and the decision whether or not to permit someone named +John Hosiger to operate a liquor store downtown. The display shows you the +votes that your proxy, Sharon Imeld, will cast for you if you don't do +anything. Sharon's already fine on the street-repair thing, but she's way +off base on the low-income housing issue, so you override her there. You +never heard of John Hosiger so you figure Sharon probably looked into his +background for you and you leave that one alone. + + You flip over to the "coming-up" screen and find that the next week +contains votes on school bus purchases, giving the "Key to the City" to a +certain Mark Havrelman, a proposal to re-zone a tract of farmland nearby to +commercial, the firemen's annual contract renewal, and scores of other +items. Cosby's on in 5 minutes, but you feel intrigued by the school bus +thing, so you select that for a moment. Up on your screen comes a listing +of messages on this topic from neighbors, school administrators, and bus +manufacturers. Selecting one of the latter, you are drawn into a discussion +of the impact of different transaxle designs on fuel economy. You read +several messages containing claims and rebuttals, and you leave a +sharply-worded message of your own to one of the bus companies, contesting +one of their statements. + + Next, you pop out to the statewide level and glance through the issues +there: a debate on introducing a new form of Lottery, a proposal to reduce +state sales tax, another proposal to increase it, a new regulation on +offshore oil platforms, and many more. You've already registered your votes +on most of these, and your statewide proxy, Irwin Marsh, seems to have the +others under control. + + Next, you pop over to Trials and note with satisfaction that the 3-time +murderer and child molester, Ted Goondy, has been voted into the electric +chair. Up for decision statewide today are Blanche Newald, accused of grand +larceny, and Abe Newman, 2nd-degree manslaughter. You select Abe's case and +begin poring through the state's evidence and the defense's counterpoints. +It's a complex issue, and you decide after a few minutes' review to make a +snap decision. Whoops, the box reminds you, in capital cases a review of at +least 3 hours of the evidence is required in order to vote. + + Cosby's already started and you don't have the time, so you figure that +wiser minds will prevail on Abe's case and you pop out to National for a +quick look. Under debate are sanctions against Irate, confirmation of the +new ambassador to France, funding for fusion research, and a proposal to +eliminate the penny, among other things. You happen to feel strongly about +fusion research, so you select it and jump into the ongoing discussion. + + And ongoing it is! At the national level, with new messages coming in +at a rate of thousands every second, it is nothing like your relatively +tranquil school bus debate! You select a keyword search on "pellet", which +responds saying that 7,455 messages are on file with that word. You specify +an additional keyword of "comparison", which cuts the number down to 104. +Scrolling through these quickly, you see a number of diagrams flash by which +you recognize as comparing the pellet-implosion method to the magnetic +containment method. Examining one of these closely, you realize that one of +your previous assumptions about fusion technology is untrue! You begin a +series of hypertext jumps through the database, winding up at last in the +quaintly named Library of Congress CD-ROM archives, gleaning more +information with which to make your decision. + + Finally, sated with information and power, you indicate your vote on +the tally-screen and head for bed. You've missed Cosby but you've gained +something immeasurably greater: a sense of control over your own destiny. +Maybe tomorrow you'll write up that proposal for a new school gym you've +been thinking about, and send it up on the local node... who knows, maybe +others have been thinking about it too, and you'll hit quorum! + + +Objections +---------- + + A proposal like this is sure to stir up a hornet's nest of resistance, +if seriously considered. Some of the more likely objections are: + + 1. The "tyranny of the majority": the contention that minority rights +will be trampled in the mad lust of majority rule. This objection has been +applied to democracies throughout history, and is no more valid now than it +was before. If anything, the wider the empowerment, the less likely the +elite are to be able to force their effete and/or status-quo-oriented ideas +upon the rest of us. The lesson of small-scale democracies, and the trend +of history, is that the more a given decision can partake of the joint +common sense of everyday people, as opposed to their charismatic or +power-crazed leaders, the fairer and more equitable the decision is likely +to be. + + 2. Incompetence and/or apathy of the public. This is another +hold-over from bygone eras in which the aristocracy had an innate distrust +of the "lower classes". Another way this objection might be stated is that +Superdemocracy violates the Principle of Representation. This is a fancy +way of saying that people are better at deciding who should decide things +for them, than they are at deciding things themselves. This is false, +because the decision to elect a given politician can only be based on an +imperfect projection of the probabilities that the politician will act in +accordance with one's future desires. As for "apathy", the apathy that +currently exists is directly engendered by our hidebound mechanisms for +participation in government on the part of the populace. + + 3. Greater bamboozlement by special interests. Columnist George Will +recently denounced a proposal to allow nationwide "initiatives" to be voted +by the public directly into law: "Any national initiative would be dominated +by an intense, unelected minority using direct mail, television commercials, +and other techniques of mass persuasion." This is of course exactly how +modern-day election campaigns work, except that what is being voted upon is +not a policy or law, but a fallible human being who, once elected, +personally becomes the focus of a whole procession of "intense, unelected +minorities", behind closed doors, for the duration of his or her term in +office. + + 4. Fragility of high-tech underpinnings. It might be argued that the +country could be thrown into permanent confusion by a single well-placed +bomb or computer virus, if it has no other means of governing itself than +this consensual one. The solution is of course a manual "backup" +government, voted into being in the standard way, which would take over in +the event of a catastrophe. + + 5. Fickleness of public sentiment. Episodes of McCarthyism and the +recent "flag-burning amendment" furor make us wonder if the laws under +Superdemocracy would not change chaotically. I think that the dual measures +of adherence to a Constitution and the "30-day rules" would damp out any +wild oscillations. Those it doesn't can be regarded as the natural +consequence of a body governing itself, correcting imbalances as feedback is +obtained. They would at least not be due to a small minority of its leading +citizens behaving erratically, as is often the case now. + + 6. Greater divisiveness. This is a criticism more aptly aimed at the +proponents of "direct democracy", not Superdemocracy. By bringing complex +issues down to a simple yes/no vote, existing methods of initiative and +referendum can polarize communities, whereas due legislative process +encourages discussion, moderation, compromise, and consensus. +Superdemocracy would preserve and enhance this moderating, +consensus-building aspect of the legislative process by extending it to all +the people. Topical message bases are only one possible tool for doing +this -- to be sure, a much higher level of overall political awareness and +discussion would exist under Superdemocracy, and new tools and techniques +would inevitably spring into being. In the future, bidirectional recorded +video or other more exotic technologies could come into play. + + 7. Proxy battles: the fight for control of large delegated blocs of +votes, granted by proxy, may loom ominously large in some people's eyes. +This is a laudable objection, because it demonstrates a perceptiveness and +an ability to extrapolate into uncharted territory. Certainly, there will +be proxy battles, and individuals will seek to enhance their social status +by garnering "authority" over large numbers of votes. But the saving grace +here is the instant revocability of proxy powers, and their entirely +voluntary nature. It would be vital to have laws in place prohibiting abuse +of the proxy relationship, such as the sale of powers, or the commitment of +one's votes to another for a fixed time period, etc. If each voter is free +to change his or her mind about the attractiveness of a given proxy at any +time for any reason, then proxy abuse cannot occur. + + 8. Difficulty of reaching quorum. This is another excellent +objection, since it demonstrates insight into the process. The contention +is that many important or urgent measures will languish below quorum +indefinitely, due to insufficient voter interest or energy, thus clogging up +the wheels of government. The reason this would not be a problem is that +large proxy-holders would naturally tend to spend more time than the average +voter in the sub-quorum "pool", since their influence may be decisive there +(this pool, by the way, is expected to be *huge*). By definition, truly +important issues could not help but be significant to large numbers of +voters, so if the proxies were not doing their jobs, the public would take +charge directly. Both within the message databases and outside, in the +public media, commentary and exchange of opinions could not help but bring +all genuinely important measures into widespread play, with exactly the +speed and to exactly the extent that each in some sense "deserves". + + 9. Dominance by technocrats. A valid concern is that the high-tech +nature of the process will scare away computerphobes, or create barriers for +the less technically adept, which would lead to disproportionately high +representation of the technocracy in the voting tallies. It is an absolute +requirement that the designers of the system eliminate this concern by +making it as easy to use as a bank auto-teller. Also, a network of human +"facilitators" and manual-interaction "pavilions" should be established +nationwide to service the needs of those for whom the proficiency barrier is +insuperable. No system of voting can ever be perfect in this regard (the +current system requires at least a modicum of intelligence and initiative), +but Superdemocracy can and should be made as simple to deal with as a +banking machine, or simpler. Touch screens, voice recognition, and +progressively more advanced AI technologies can be harnessed for this +purpose as time goes by. + + 10. High cost. Certainly, to install and maintain all of the computers +and networks we are talking about would be expensive. There would also be a +need to provide communications link equipment (presumably terminals and +modems at first) to those unable to afford them, or perhaps to everybody. +The high cost is beyond dispute. But we need to weigh this against the not +insignificant costs of the current system, with its state and national +capitol buildings, representative's salaries and perks, staffers, and +colossal infrastructure. Some of those smoke-filled rooms are pretty big! +And computer and communications costs are dropping day by day, with no end +in sight. + + +Conclusions +----------- + + Superdemocracy is defined as a continuous networked hierarchy of online +referenda, open to all. + + Special interests would be able to sway the decisions of a group run +this way only by catering to the interests of a majority of the group -- in +which case they would no longer, by definition, be special interests. + + Busybodies would be able to sway the decisions of a group run this way +only by making themselves the "proxies" of large blocs of people. Even so, +they would merely be performing a public service by voting on those people's +behalf exactly as those people would, themselves, have voted anyhow -- or +the busybody would find him- or herself quickly out of votes. + + Citizen participation and morale would be dramatically improved because +each citizen would be voting on the issues that are important to that +citizen, directly. The guessing game of figuring out what somebody else is +going to do over a multi-year period, on the basis of schmoozy campaign ads +and zoot suits, is eliminated. + + Corruption would be limited to the tactical, implementational end of +government. Never again would we have to worry about corruption on the +grand scale of Teapot Dome or the S&L scandal. + + Justice would be less capricious because the same group of human beings +would review evidence and deliver a verdict in each case. This group, +instead of being just 12 people who could all happen to misconstrue a fact +the same wrong way, would be thousands or millions of everyday people, the +very people whose welfare depends on the right decisions being made in the +courtroom. + + And finally, the expense, waste, and mismanagement of smoke-filled +rooms and their seedy inhabitants would be laid to rest for once and for +all. People would begin to have some reason for optimism about the future, +and some sense of control over their own destinies. + + I don't expect any of this to happen anytime soon, but if you know +anyone who is thinking of setting up a new country, please show him or her a +copy of this article. It's certainly worth a try. + +The World Online... +Copyright 1990 Victor Baron + + Through the years, computers have been a tremendous source of +enjoyment for me, starting with playing StarTrek on a *printer* +terminal for many hours at a time, continuing with the building of a +kit IMSAI 8080 with it's seemingly hundreds of LED's on to writing and +marketing my own programs. I can't recall anything that gave me more +enjoyment, however, than the first time I went online and connected +with another computer in the city. There are still many of you out +there who lurk in the background, afraid to make the step, possibly +fearing that the experience is way beyond your level of expertise. +Hopefully, this little article can alleviate some of those fears and +open up a new world online. + + There are a *few* things to learn and some equipment to acquire but +nothing exceptionally complicated nor expensive. Depending upon your +budget, you can go from a few hundred dollars to a few thousand with +plenty of steps in between. I will try to alleviate the frustrations +that usually accompany the first attempts and computer communication. + + Since this will be your first trek into the world of computer +communications, you'll need some minimal equipment in addition to your +computer. You'll need a modem, some communication software, possibly a +serial cable and a telephone extension cord. Your computer essentially +telephones another computer and talks to it over your regular +telephone lines. The modem is the go-between. It converts the signals +from your computer to a form the telephone can understand and +vice-versa. Your standard telephone line should suffice (unless you +have a teenage daughter) with a little cooperation from other members +of your household. It is difficult to describe the visual and +emotional impact you receive when someone picks up the telephone while +you are online. + + Looking at the specifications of the many modems on the market can +cause your eyeballs to spin violently but when all the frills are +removed, you initially start with 2 types, Internal and external. The +internal modem requires only a connection to the telephone line and an +available slot in your computer. The external requires an external +source of power, a connection to the telephone line and a serial cable +that you may have to purchase separately. As in automobiles, the +features vary widely but the basics are fairly standardized. + + The final piece in your online travel kit is the communications or +terminal software. There is a wide choice of available packages +ranging from some of the more popular and inexpensive shareware +packages to the more expensive commercial packages. This remains +largely a matter of choice but it would be wise to start with one of +the simpler shareware packages until your skills develop. Simply put, +the terminal software controls what is sent and received by your +system. + + Now that you've acquired the proper equipment and software, the +next step is to install your modem. Whether internal or external, this +procedure is relatively simple and most manufacturers provide ample +guidance in their documentation. The serial cable is connected between +the modem and the serial port on your computer, the telephone cord is +connected between the modem and the telephone outlet and the modem is +plugged in. An internal modem requires only the telephone connection, +all other needs are supplied by the system. + + Before you try out your new modem you must set a few parameters +from within your communication program that will make your system +compatible with the computer you'll be calling. Most communication +programs have a 'Setup' area or a 'Port Parameter' area. This will be +your first stop. + +COM1 or COM2-- Although there is increasing support for +additional COM ports, COM1 and COM2 are the most used. Generally your +computer documentation will indicate the available ports on your +system. Start by selecting COM1, you can always go back and change it +later if needed. + +BPS or BAUD--Bits per Second is the rate of speed of data +transmission and reception through the selected com port. +Although incorrect in this instance, baudrate or baud are +generally used interchangeably with bps. The most common rate is 2400 +bps, although the decreasing cost of higher speed modems has resulted in +many non commercial systems communicating at 9600 bps and higher. +Slower speeds of 1200 bps are still generally available on some +systems and you might still find an occasional 300 bps system out +there. The main function of the 'setup' area is to assure that both +systems are communicating at the same rate. Therefore if the system +you are calling will be at 2400 bps, then your system must be set the +same or you will be unable to establish decent communications. The +most common cause of communication problems is improper parameter +setup. It's much like speaking Greek to an Italian over a long +distance telephone line, no communication is possible. + +DATA BITS--This setting determines the number of bits that make up +each byte of information. Sometimes referred to as word length. +Most BBS (Bulletin Board System) normally use a setting of 8 bits while +most commercial systems use a setting of 7 bits. + +PARITY is an error detection method used to check the validity of a +transmitted character. If the computer is using 8 *data* bits, the +parity is usually *none*, indicated by an 'N' while systems using 7 +data bits usually use *even*, indicated by an 'E'. + +STOP BITS are signaling bits attached to a character before it is +transmitted which indicate when the character ends. Each character +transmitted is preceded by one start bit and followed by one or two +stop bits and possibly a parity bit. The most common setting is to +use 1 stop bit. Therefore, your most common settings for a PC based BBS +would be 8 data bits - No parity - 1 stop bit (8N1) and for +commercial systems, 7 data bits - Even parity - 1 Stop bit (7E1). + +FULL/HALF DUPLEX also called local/remote echo is the setting that +determines which system (local/remote) is responsible for displaying +characters on the screen. Most BBS systems supply the remote echo so +the usual setting for your system should be remote echo (no local +echo). If you can't see what you type on your screen when you are +connected to another system, then you should turn your local echo on. +If your screen should ddiissppllaayy cchhaarraacctteerrss lliikkee +tthhiiss, then you know that both the local and remote systems are +echoing the characters and you should turn your local echo off (remote +on). + + Now you should be ready to give this thing a try. Your modem is +connected and your communication program is loaded. Following the +documentation for your specific program, enter the dialing directory +and select the number you wish to dial. At this point, if you press +return, most programs will dial the selected number. If your modem has +a speaker you should hear phone go off hook, dial the number and start +ringing. When the remote system answers, you will hear the modems try +to establish a connection with appropriate squealing and hissing. When +connected, you will see a message that says CONNECT or CONNECT 2400. +Congratulations! You are online! Depending on the type of system you +have called, you may have to press the carriage return a few times to +'wake up' the BBS or it may start 'talking' to you automatically. +Online etiquette is beyond the scope of this article but remember, +you are essentially a guest in someone's home. Please act as you would +have a guest act in your home. Profane language is a no-no. Finally, +when the time comes to leave the BBS, there is usually a command +similar to GO or BYE or EXIT or OFF that will take care of some +housekeeping and politely let you leave the system and hang up. Only +in an extreme case should you just HANG UP without signing off the +BBS. Doing that is similar to walking out and slamming the door +without even a goodbye. Extremely rude! On some of the old time +systems, this could hang a system thus preventing other callers from +calling in. The newer systems don't have a problem with this any +longer but it's still tacky. + + This should give you enough information to get you started +exploring the world online. The majority of the people you meet are +very friendly and helpful. When you log on to a new BBS, I recommend +that you go directly to the message base and read some of the +messages. You can get a lot of initial questions answered this way. +If you have a specific question, most BBS's will allow you to leave a +comment to the sysop (SYStem OPerator) on your first call. + + Remember, you can't hurt anything and the people you contact all +started the same way as you, so relax, happy calling and enjoy the +world online. + + +The FBI Comes Rapping, Rapping At Your BBS + +Brock N. Meeks + + The dog-eared manila envelope spilled a coffee stained report onto +my cluttered desk. The title, "The FBI and Your BBS" sounded a little +too nefarious, even for this curmudgeon of the information age. But I +figured the report was worth at least a quick read. After all, +somebody had gone to the effort to track down my address and forward a +copy of the report to me. That someone turns out to be the report's +author, Glen L. Roberts, director of The FBI Project an organization +which publishes a newsletter, Full Disclosure, under the self-defined +category "privacy/surveillance. + + The report is chilling, almost paranoid. And if more people had +known about its existence, a lot of grief might have been saved. As +I read I remembered an old, coffee-ringed file folder I'd squirreled +away. I remembered something about it's containing information on +what I'd off-handedly labeled "FBI Computer Hit Squad." When I found +the file, Roberts' report didn't seem so paranoid and knew I was in +for a long night of research and bunch of early morning wake up +interviews. + +If you dig, you hit dirt + + In 1984 a short series of discreet advertisements, placed by the +FBI, appeared in a few computer trade publications and in The Wall +Street Journal. The message was simple, and went something like: +"We're looking for computer literate persons to join the Bureau." +There was no mention of any special task force; however, it was clear +that the Bureau wanted to upgrade their high-tech prowess. + + Although the FBI won't confirm the existence of a computerized "hit +squad," an FBI public relations officer did confirm that they "have +made an extraordinary effort to recruit more technically oriented +personnel" since 1984. + + If you dig hard enough, you'll find substantial evidence that the +FBI is most definitely working overtime in its efforts to monitor the +electronic community. "They are desperately wary of the way +information flows so freely in this medium," says Roberts. + + Indeed, one has only to recall this past May when some 150 Secret +Service agents, assisted by local police (backed up with electronic +"intelligence gathered and provided by the FBI) served some 27 search +warrants in a dozen cities across the U.S. + + The bust, code-named Operation Sun Devil, was patterned after the +tactics used to take down suspected drug rings: simultaneous busts, +synchronized arrests. All in an effort to preclude any "early +warnings" reaching the West via grapevine information moving from the +East. + + I was curious about all these high tech hit tactics and armed with +my file folder and Roberts' report I called a number scrawled on the +inside flap of my file folder. It was annotated "Former agent; +possible source." I called the number, and got a story. + +"I was recruited in 1983 by the FBI for my computer skills." + + "I was recruited in 1983 by the FBI for my computer skills," the +former agent told me. Because he still does some consulting for the +Bureau, he asked not to be identified, but he laid out a very +specific plan by the FBI to increase their knowledge of the electronic +communications world. He confided, "During my time the Bureau's +monitoring of BBSs was extremely limited; we just didn't know how." In +those days, he said, the FBI drew on the expertise of a small band of +high-tech freelance snoops to augment their staff, "while we all honed +our own skills." + +Tradition + + Certainly the FBI has a tradition of "investigating" groups of +people it deems "unsavory" or threatening. + + In Roberts' The FBI and Your BBS, there's a brief history of the +FBI's willingness to gather all known information on a target group. +Pulling from the Final Report of the Select (Senate) Committee to +Study Governmental Operations with respect to Intelligence Activities, +Book IV, Supplementary Reports on Intelligence Activities, Roberts +includes this excerpt: + +"Detectives were sent to local radical publishing houses to take their +books. In addition, they were to find every private collection or +library in the possession of any radical, and to make the arrangements +for obtaining them in their entirety. Thus, when the GID (General +Intelligence Division) discovered an obscure Italian born philosopher +who had a unique collection of books on the theory of anarchism, his +lodgings were raided by the Bureau and his valuable collection become +one more involuntary contribution to the huge and ever-growing library +of the GID. [pages 87-88]." + + Change "any radical" to "any BBS" and "book" to "disk" and quite +suddenly the electronic landscape turns into a winter still-life. + +Data collection + + Roberts, quoting from his report, says, "Unlike other +communications media, information on a BBS does not get read by anyone +before its instantaneous publication. Therefore, the FBI has much +less of a possibility of intimidating the owner of a BBS into not +publishing certain information. The FBI also acts as if BBSs have a +monopoly on the distribution of so-called 'illegal information.' The +FBI often uses this 'danger' as justification to monitor the +activities on these systems. In reality, however, BBSs transfer much +less 'illegal information' than the phone system." + + Roberts statements are worth noting in light of the government's +increased interest in the marriage of criminal activity and electronic +communications. + +Crime has moved into the high-tech arena. + + A 455-page report issued by the President's Commission on Organized +Crime, dealing with drug abuse and trafficking cites that fact that +crime has moved into the high-tech arena. The report states "To the +extent that law enforcement agencies' capabilities and equipment are +inferior to those of drug traffickers, immediate steps should be taken +to rectify the situation." The report then recommends that +data-gathering efforts of several agencies (including the FBI) should +be tied together in one "all-source intelligence and operations +center." + +Any problem here? + + There are no laws prohibiting the FBI (or other agencies) from +monitoring the public message traffic on a BBS; the Electronic +Communications Privacy Act of 1986 protects private messages and +privately stored files only. But what about an FBI agent monitoring a +BBS solely for the purpose of gathering information on the board's +users? Any problem here? + + The former FBI agent I spoke with raised the concern that such +casual monitoring might be a violation of the 1968 Wiretap Act. "In +order for a wire tap, you have to get a court order. Now if an FBI +agent is monitoring a BBS to gather information, that becomes an +interesting question, because there are very specific federal rules +about a wire tap. My question to you about a BBS [being monitored] +is: "At what point does monitoring turn into a wiretap-like act?" + + Good point. The reality is, however, that there are no rules. +Unless that agent is asking for private message traffic, he can, +without impunity, monitor, store, and otherwise manipulate your public +messages as he sees fit. + + Roberts points out that a BBS with public access is fair game for +any kind of governmental snooping. But there is a way to make such +casual snooping by a federal agent a crime. + + "If you want your BBS readily accessible to the public but want to +protect against unwarranted monitoring, you have to provide a warning +to prospective users," says Roberts. "It should read: 'This BBS is a +private system. Only private citizens who are not involved in +government or law enforcement activities are authorized to use it. The +users are not authorized to divulge any information gained from this +system to any government or law enforcement agency or employee.'" + + This does two things. It makes the entire board "private." Second, +it makes any kind of monitoring by the FBI (or other agencies, such as +the Secret Service) a criminal offense (because they are would be +guilty of unauthorized access; it also forces them to use the +established guidelines of gaining information via a court ordered +search warrant. The warning also protects you in another way: it +stops "freelancers" from doing the Bureau's work. + +Get real + + How real is the possibility of the FBI monitoring your BBS? Much +more than I'd like to believe. Although details of Operation Sun +Devil are still sketchy, it's clear that the FBI, working in tandem +with the Secret Service, is monitoring several hundred "suspected" +boards across the electronic landscape. What kind of board is a +potential monitoring target? "Any board that advocates hacking," said +a Secret Service spokesman. Yet when I asked for a definition of +hacking, all I was told was "illegal activity." + +Are the "good guys" getting caught up with the bad? + + The information provided here bears out, if nothing else, an +increased interest by the FBI in the hardball practice of going after +electronic criminals. But are the "good guys" getting caught up with +the bad? + + How extensive is the FBI's actual fact gathering by monitoring +BBSs? No one knows really knows. However, given the history of +Bureau, and the hard facts that crime in the information age makes +full use of all the technology it can get its hands on, it's a small +leap to believe that at least specific monitoring, of certain target +groups, is taking place. + + Where does that leave you and me in all this? Back to square one, +watching carefully what we say online. If you're a member of a +"controversial" BBS, you might pass the concerns of Roberts on to your +sysop. If you are a sysop, you might want to consider adding a bit of +protection to the board . . . for the rest of us. + +Brock Meeks is a Washington, D.C.-based columnist whose articles have +appeared in several publications including Byte Magazine. His +favorite radical BBS is . . . well . . . private. + + +What's NEW in ZMODEM + +by Chuck Forsberg + + In early 1986, Telenet funded a project to develop a new file +transfer protocol to alleviate the throughput problems network +customers were experiencing with XMODEM and Kermit file transfers. +Designing ZMODEM from scratch allowed me to use the best ideas from +X.PC, HDLC, BISYNC, Kermit, and dozens of other protocols, while +avoiding many of their shortcomings. + + Since then ZMODEM has been incorporated into hundreds of programs. +ZMODEM's speed, reliability, and ease of use has made it the protocol +of choice for thousands of bulletin boards, GEnie, BIX, Portal, +Delphi, and other information utilities. + + From the beginning, ZMODEM was designed to be extended. Important +reliability, performance and compatibility extensions have been +developed since the Telenet project. These extensions accelerate +downloads by 5 to 30 percent in many applications, with some files +downloading many times faster. + + New programs can exploit these extensions without sacrificing +downward compatibility with older programs. This article summarizes +the most important of these ZMODEM extensions. + +CRC-32 + + Ease of implementation was one of ZMODEM's original design goals. +XMODEM CRC technology was used because XMODEM routines were widely +available in many programming languages. + + XMODEM's CRC polynomial is many times less reliable than good 16 +bit CRC's. This wasn't an issue with XMODEM because XMODEM itself was +inherently unreliable under stress. When ZMODEM's speed and +"bullet-proof" robustness soon found use in applications too harsh for +XMODEM, ZMODEM's robustness revealed XMODEM CRC to be too inaccurate. + + The first major extension to ZMODEM was the adoption of 32 bit CRC. + + ZMODEM uses the 32-bit CRC specified by ANSI X3.66, FIPS PUB 71, +and FED-STD-1003. A table driven calculation keeps processing +overhead low. ZMODEM CRC-32 is five orders of magnitude more accurate +than XMODEM CRC, and billions of times more sensitive than 1 byte +XMODEM and Kermit checksums. The extra protection of CRC-32 is vital +in high speed applications. + + ZMODEM retains XMODEM CRC capability to accommodate old programs. + + +Compression + + Compression techniques compact the redundant information in data +files to reduce storage and transmission time. ZMODEM-90(TM) +extensions include "on the fly" compression that boosts throughput on +listings and other suitable files. Compression percentages range from +-1% on already compressed files to more than 1000 percent (10 times +speedup) on the Personal Computing Magazine text file benchmark. + +Moby Turbo(tm) Accelerator + + Many files downloaded from bulletin boards are already compressed +with PKZIP or other compression programs. + + ZMODEM was developed to operate over packet switched networks that +use control characters for network control. When one of these +characters appears in the data, ZMODEM protects the network by +replacing the offending character with a two character sequence +(quoting). Standard ZMODEM quoting increases overhead on compressed +files by about 3 percent. + + The protection of control character quoting and its overhead are +not needed in many applications. ZMODEM-90(TM) offers MobyTurbo(TM) +to close the speed gap between ZMODEM and less reliable protocols +without sacrificing ZMODEM's historical robustness and reliability. +MobyTurbo reduces the character quoting overhead on compressed files +to 0.5%. In comparison tests the speed difference between YMODEM-g +and MobyTurbo(TM) is less than 1 percent. Many users feel 1% is a low +price to pay to get Crash Recovery, automatic downloads, and the +safety of 32 bit CRC error checking, + + ______________________________ + | OVERHEAD FACTORS | + | (Compressed Files) | + ------------------------------ + |1024 Byte Subpackets | .5% | + |Character Quoting | 3% | + |MobyTurbo Quoting | .5% | + ------------------------------ + +Reduced Overhead + + Some networks and modem concentrators reserve control characters +not protected by ZMODEM defaults. Previously the solution was to +protect all control characters, resulting in protocol overhead +approaching that of Kermit. + + ZMODEM-90(TM) extensions provide individual control of the +protected control characters, avoiding the high overhead of quoting +all control characters. + + +Window Management + + Many information utilities are accessed via complex packet switched +networks. These networks may behave more like a balloon than a pipe +as they pass data from a fast mainframe to a relatively slow modem. +Undelivered kilobytes swell the network's memory banks, and error +correction is impaired. + + ZMODEM allows the sender to limit this ballooning by regulating the +rate of transmission to accommodate the slowest segment of the +network. ZMODEM accomplishes this by commanding the receiver to +acknowledge data sub-blocks as they are received, and waiting for more +acknowledgements when the receiver is too far behind (window too +large). + + The optimum window size depends on the network characteristics and +modem error rate. With ZMODEM-90 the receiver can override the +sender's window size according to local conditions. Users with error +correcting modems can increase throughput by increasing the window +size. + + These ZMODEM-90 extensions give GEnie downloads 5 to 30 percent +faster than public domain ZMODEM. + + +7-Bit Environments + + A pair of ZMODEM-90 programs with 7-bit support will automatically +detect a 7-bit environment and switch to one of two 7-bit path +compatible encodings. + + The default 7-bit ZMODEM uses RLE compression and 8th bit quoting. +This mode resembles Kermit encoding, but is more efficient because the +RLE encoding is optimized and fewer control characters are quoted. +This default is well suited for text files. + + ZMODEM Pack-7 packs 4 bytes into 5 printing characters. This is +more efficient than quoting for sending compressed files. ZMODEM +Pack-7 is efficient enough to beat Kermit on ZIP files, even when +Kermit is allowed to use all 8 bits. + + A 75136 byte ZIP file was sent between two adjacent machines +directly connected at 2400 bps. These tests demonstrate the difference +in protocol performance under ideal conditions. + + Kermit transfers used one byte checksum and 2000 byte packets. +ZMODEM used 32 Bit (four byte) CRC. + + ______________________________ + | 7-BIT LINE | + ------------------------------ + |CPS| Protocol | + |156| Kermit long packet=2000| + |190| ZMODEM-90tm PACK-7 | + ------------------------------ + + + + +Intelligent Crash Recovery + + Crash Recovery allows an interrupted file transfer to be completed +without throwing away the portion transferred before the interruption. +Crash Recovery has been a favorite ZMODEM feature since 1986. + + Accurate crash recovery requires that the receiver's copy of the +file match the sender's copy up to the point where the transfer was +cut off. If you don't call back instantly the file may change, and +simply resuming the transfer will corrupt the file. If this is a +concern, choose a program that verifies the accuracy of Crash +Recovery. + + Intelligent Crash Recovery(TM) (-rr option) allows files to be +compared without transmitting the actual file contents. The sender and +receiver take a 32 bit CRC on the files and compare those numbers. The +"zmodem R" parameter controls how much of the files to compare. The +default of 0 compares the entire file. The chance of different files +producing the same 32 bit CRC is small; an independent comparison of +another segment further enhances reliability. + + Currently, ASCII file translation (Unix to DOS format, etc.) does +not allow Crash Recovery. + + A future extension should remove this restriction. + +Total Transfer Display + + ZMODEM and YMODEM now support a count of the files remaining and +their total size to the receiver. This allows the receiver to +estimate remaining transfer time, updated as conditions change. This +information is optional and may not be provided when its collection +would cause an unacceptable delay starting a transfer. + +VAX/VMS Specific Programs + + Previous versions of the RZ (Receive ZMODEM) and SZ (Send ZMODEM) +file transfer programs were poorly adapted for Digital Equipment's +VAX/VMS minicomputer operating system. + + A new VMS RZ writes variable length CR terminated records for ASCII +files and fixed 512 byte records for binary files. These record +formats are better suited for standard VMS utilities. + + A -i option may be given to the sender or receiver to force VMS +Stream_LF record format. Stream_LF format preserves the exact data +and file length. Stream_LF is suitable for C programs and PC oriented +file server and archive applications. + + VMS SZ now supports wild cards and subdirectories. + + These programs are available from Omen Technology Incorporated. + + + ZMODEM-90(TM), MobyTurbo(TM), and Intelligent Crash Recovery(TM) +are Omen Technology trademarks. + + +UNDER THE BOARDWALK + +"Hello, Dean speaking." + +"I'm going to quit my job, start a BBS, make a fortune and live +happily ever after." + +"Excuse me? That's impossible!" + +"No really, I'm going to make my living running a BBS." + +I never thought I'd have phone conversations like this a year ago, now it +happens once a week. One enthusiastic caller was dead serious when he told +me "I'm going to put CompuServe out of business." As ridiculous as these +statements sound, it should. It tells me that the BBS world is starting to +evolve in a big way. + +A schism is forming between the FREE and the PAY BBS systems. The hardcore +sysop of the past will tell you "Until they pry my cold dead fingers from +my keyboard, my system will always have free access." The enterprising +sysop of today will tell you "I'm offering a service that my customers +enjoy, and I'm not embarrassed to be compensated for it." I hope there will +always be a place for the FREE BBS. However, the pay as you go BBS system +is todays item of interest. What does it take to make real money running a +BBS? + +As an example, we'll start a fictitious BBS called OPERATION OVERKILL, or +OK BBS for short. We're going to charge $45 per year, run 4 lines at 9600 +Bps and use PCBoard on a 386 Novell Network. Congratulations, OK BBS just +consumed $10,000 like it was light beer, and nobody calls. + +Across town, HUMBLE BEGINNINGS BBS (HB BBS for short) starts up using a +spare XT, 1 phone line at 2400 Bps, runs the shareware version of PCBoard +and charges NOTHING. The new sysop of HB BBS, Horatio A., has been calling +BBS's for years and finally decides to give it a try. Six months later HB +BBS has 500 steady callers, but they complain that the BBS is busier than +the men's room at Joe's Bar on Saturday night. + +After many sleepless nights and countless cans of Jolt Cola, Horatio +asks for $20 donations to add another phone line, get a 386, buy the +multinode version of PCBoard and increase the hard drive storage. +Enough money comes in to cover half of the upgrade. Horatio digs +into his pockets for the rest and HUMBLE BEGINNINGS is now running 2 +nodes under Desqview on the new 386. He adds more file areas, throws +in some DOORS, and answers the mail from his users 3 times a day. + +In order to recoup the investment in the upgrade, Horatio adds +an Adult file section available to paying users only. He imposes +a 20:1 download/upload ratio for non-paying callers. As a bonus, +he allows callers with a 5:1 download/upload ratio full +privileges. His file area becomes inundated with new uploads as +his non-paying callers realize the cheapest way to use the system +is to upload new files. There's even a few long distance callers +which he gives full access for no charge. Heck, they're already paying +good money to our favorite charity THE PHONE COMPANY, so why not? + +HUMBLE BEGINNINGS is now busy all the time! The free callers keep +the file library bursting with new software while the paying +callers are happy to rape this fantastic software resource for +only $20 per year. In fact, HUMBLE BEGINNINGS is making a little more +money each month. A third phone line is added to keep up with the +demand. + +Horatio decides to attempt to make some real money with his BBS. +HUMBLE BEGINNINGS has been online for 2 years, pays the phone bill, +and even makes more of a profit each month. He borrows $5,000 from his +brother Donald to bring his system to 6 lines running on a Novell +network. He figures 6 lines will keep everyone happy for at least a +year. He raises the price to $45 per year, but still allows callers +with a 5:1 download/upload ratio full access. + +HUMBLE BEGINNINGS is now on it's way to possibly becoming a very +large system. Who knows, maybe in another year Horatio will be +able to quit his real job to devote 24 hours a day to his BBS. More +likely, HB BBS will become a mildly profitable small business. Is +there a moral to this story? Not really, but all the would be +entrepreneurs out there might want to memorize the countless cliches +related to starting your own business. + +BBS's must do the same as any successful small business, provide a +needed product or service, provide excellent customer service, price +it reasonably, and continue to improve while keeping one eye on the +competition. + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + T E L E C O M P U T I N G M A G A Z I N E + Electronic Edition + + Summer 1990 + + (C) 1990 Galaxy Telecomm Corporation + All Rights Reserved + 800-477-1788, 505-881-6988 - Voice + 505-881-6964 - BBS - 64 Lines + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + +Requirements To Display Telecomputing Magazine + +No Nonsense Copyright Statement + +Telecomputing Magazine is copyrighted material and must be treated as +such. Telecomputing Magazine's Electronic Edition may be transmitted +and displayed on Electronic Bulletin Board Systems. Alterations, +additions, or ommissions of material will be considered a copyright +violation. + +DON'T CHANGE ANY OF THE FILES! IF YOU DISPLAY ONE FILE, YOU MUST +DISPLAY THEM ALL. + +Feel free to pass this Electronic Edition of our magazine along to +your friends and favorite BBS's. For a free copy of our 4 color glossy +magazine, give us a call at 800-477-1788 and request a copy! + + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + T E L E C O M P U T I N G M A G A Z I N E + Electronic Edition + + October/November 1990 + + (C) 1990 Galaxy Telecomm Corporation + All Rights Reserved + 800-477-1788 + * * * * * * * * * * * * * * * * * * * * * * * * * * * * * + +TABLE OF CONTENTS OF TELECOMPUTING MAGAZINE'S PRINTED EDITION + + +COVER STORY - Tim Stryker + Superdemocracy + +FEATURES + + News from the Online World - Nia Bennett + Where Is Everybody? - Jerry Pournelle/Mike Banks + The FBI Comes Rapping, Rapping at Your BBS - Brock N. Meeks + Electronic Government - Michael E. Marotta + +TUTORIAL + + What's New in ZMODEM - Chuck Forsberg + Worried About Viruses? - William Minus + +PRODUCT REVIEW + + Intel Goes After 9600 BPS Market - Tom Scott + TDBS: The Comfortable Revolution - Phil Becker + Telecommand System 100 by JDS Technologies - Tom Scott + The Metro BBS System P.D. and Plenty of Power - Jim Reyna + +I*N*F*O + + Aladdin - Genie's Magic Lamp - Dennis Fowler + The BBSers Guide to COMDEX - Tom Scott + Joining the Online World - Victor Baron + +SOFTWARE REVIEW + + BGFT: Background File Transfer System + Falcon F-16 by Mark Hiatt + Weight Loss Software by Nia Bennett + News from Oracomm - Running a Successful BBS by Gary Young + Wildcat! BBS News - Dawn of the Information Society + +BOOK REVIEW + + "Using Computer Bulletin Boards" by John V. Hedtke + - Review by Charles Stuart Klingman + +COMMENTARY + + Software Mania - John C. Dvorak + Power Suits and Pretty Dresses For BBSing on the Edge + - Bob Mahoney + Under The Boardwalk/Commentary - Dean Kerl + +DEPARTMENTS + + From The Editor + Letters To The Editor + EXEC-PC Top 20 Downloads + telecomputing's BBS Listings (classifieds) + + + \ No newline at end of file diff --git a/textfiles.com/bbs/telegard.txt b/textfiles.com/bbs/telegard.txt new file mode 100644 index 00000000..82908a8f --- /dev/null +++ b/textfiles.com/bbs/telegard.txt @@ -0,0 +1,171 @@ +A + +Msg #: [13/20] Base: BBS Problems +Date : Sat 14 Mar 1992 8:59p Stat: Public +From : Dragon #8 +To : Shit Man! +Title: Telegard what else? +Reply: This message has 1 reply + + +******************************************************************************* + From: Martin Pollard Msg Num: 66 of 108 + To: All Date: 08 Dec 91 03:07:09 + Subj: So long, and thanks for all the fish... + Attr: Sent Read: N + Conf: Telegard BETA Discussion +******************************************************************************* +MSGID: 1:120/187 2941e46d +PID: TeleMail 1.50 +On December 13th, 1991, the TELEGARD conference will be removed from the +FidoNet EchoMail backbone, and the Telegard software will come to an end. +This is being done for various reasons... but first, a little history... + +I have been with Telegard almost since the beginning... close to three years. +When it was first released by Carl Mueller, it was little more than the WWIV +version 3.21 public domain source code with Carl's name on it. At the time, +Carl was involved in a number of illegal activities, such as hacking, +phreaking, credit card fraud, and software piracy. Telegard was originally +intended to be used by his friends who were into the same activities. + +As time went on, Carl added modifications to the software, and people began to +take an interest in the software. It mai +nly attracted software pirates +[more] because of its ability to hide pirated files. It was also full of +back doors +so that Carl could hack into any board running it and have full SysOp access. + +Carl eventually got caught and busted for phone phreaking (the charges were +eventually dropped), and the source code was turned over to Eric Oman, who +removed the back doors and continued to modify it. Later on, Todd Bolitho +joined the Alpha team in an organizational capacity, and I joined as Alpha and +co-programmer by version 1.8. After version 2.4 I was doing almost all of the +programming. It was around this time that the TELEGARD conference was placed +on the FidoNet EchoMail backbone, as version 2.5 was enhanced to support +EchoMail. + +During these three years, we've seen the software grow quite a bit, and its +popularity along with it. Unfortunately, its reputation as a pirate BBS +preceeded it, and has been an albatross around the neck of the developers +since its inception. Today, "Telegard" is synonymous with "Pirate BBS Hack", +even though that definition has not applied for two years. + +Due to creative differences between Eric, Todd and myself, the team split up, +and I was the only one left supporting Telegard. For the past year and a half +I have received quite a few compliments about the software, but many more +demands, threats and complaints, not to mention illegal hacks of the software +that claim to be the "REAL" Telegard. + +This conference was supposed to be a place where Telegard SysOps around the +world could participate in a round-table forum to receive technical support. +I moderated the conference openly and fairly, and was very lenient upon people +who broke the conference rules. From the moment that TELEGARD was put onto +the backbone, however, it has been dominated by insults, foul language, +flaming, software piracy, and overall childish behavior. I put Scott Raymond +-- who has been involved with Telegard almost as long as I have -- in charge +of the conference because he is a lot more heavy-handed than I am, and I +wanted it that way. According to the current Backbone Operating Procedure +(BOP) being followed by the Net, Regional, and Zone EchoMail Coordinators, +backbone conference moderators and co-moderators have unilateral control over +a conference, and NO ONE, not even the ZEC, is supposed to interfere in the +workings of a conference as long as it does not interfere with backbone +operations. In short, it means that a conference moderator is allowed to cut +ANY feed o the conference he sees fit without providing a reason or fair +warning; the only thing required is a note to the offending node that they +have been cut from the conference. + +Over the past two months, ten individual links and an entire net gateway were +cut from access to TELEGARD. In response, several of these people filed +policy complaints against Scott Raymond, which they had no grounds to do, +since he was well within his rights as the co-moderator of this conference. +The NCs and NECs involved decided to ignore the BOP, however, since it seemed +convenient to do so. + +Since it's still obvious that human stupidity is rampant and there will never +be a way to curtail it in a completely public forum, we are taking that forum +away. If you can't play nice with others, your toys get confiscated. This +conference will be moved to the sanctioned Telegard support network, USTGNet. +In that net, when a link is cut from the conference, it stays cut and no +policy complaints will be accepted (as the policies of FidoNet do not apply to +USTGNet). + +What does this have to do with Telegard itself? In a nutshell, version 2.7 +will be the very LAST version of Telegard ever to be released, and that +includes Beta and Alpha versions. In exchange for free software, free +utilities, and free tech support, I and the remaining Telegard support team +have received insults, hacks, stabs in the back from ex-Beta sites, and piracy +of a Beta version (several, in fact) still in the testing stages... and still +buggy. Therefore, after version 2.7, there will be no more Telegard. As far +as I am concerned, the software will be dead and buried. The source code will +NOT be released to the public. + +(The name "Telegard" itself is trademarked. Any BBS software using the name +Telegard is in violation of current trademark ownership law. The source code +for version 2.5g that found its way to the public is owned by both myself and +Eric Oman. You may not put your own name on it as the programmer unless 75% +or more of the code has been rewritten from the ground up. If this is not the +case, then you must give credit to Martin Pollard and Eric Oman in the +copyright notice. Any software not following the above requirements is in +violation of current copyright law.) + +Why am I doing this? It's very simple: I'm tired of giving away something for +nothing and getting nothing but grief in return. Except for a relative +handful of people, the majority of the Telegard users have no respect for +software authors, conference rules, or copyright laws. They not only expect +everything handed to them for free, they DEMAND it, and expect me to kiss +their asses while doing it. Thanks, but I'll pass; I'm not required to put up +with this kind of grief over a goddamn HOBBY. + +Some of you may say that I'm chickening out, that I'm giving up, that I'm +caving in to pressure from the ones who caused the trouble. I won't argue the +point. On the other hand, those of you who caused the trouble will probably +start partying and rejoicing after receiving this news, thinking you've "won" +your battle against "the bad guy". All I can say is, party away, and rejoice +in the fact that you've destroyed a great software package and reduced it to +the level of Celerity, LSD, ViSiOn, Emulex/2, and their other pirate/hack +siblings. + +To those people who have been loyal to Telegard and respected my wishes as +author, I commend you on your perseverance and thank you for the support; you +couldn't begin to guess know how much it meant to me. If you aren't already a +[more] member, I invite you to consider USTGNet (headed by Jack Reece); +you stand a +much better chance of receiving the tech support you deserve in that network. + +To those people who stabbed me in the back, pirated the software, turned this +conference into a circus, and in general destroyed what was supposed to be an +enjoyable hobby, congratulations; you got what you worked so hard to attain: +the end of Telegard. You made your bed, now die in it. + + -=[> Martin Pollard <]=- + +... TELEGARD Conference Moderator and Author of Telegard (Retired) +--- Blue Wave/TGq v2.02/C+ Beta + * Origin: The I/O Bus - TG_BETA Conference Moderator (1:120/187.0) +PATH: 120/187 278/624 + + +[13:20] Read (1-20,=Next,?=Help) : + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X + + Another file downloaded from: NIRVANAnet(tm) + + & the Temple of the Screaming Electron Jeff Hunter 510-935-5845 + Salted Slug Systems Strange 408-454-9368 + Burn This Flag Zardoz 408-363-9766 + realitycheck Poindexter Fortran 415-567-7043 + Lies Unlimited Mick Freen 415-583-4102 + Tomorrow's 0rder of Magnitude Finger_Man 408-961-9315 + My Dog Bit Jesus Suzanne D'Fault 510-658-8078 + + Specializing in conversations, obscure information, high explosives, + arcane knowledge, political extremism, diversive sexuality, + insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS. + + Full access for first-time callers. We don't want to know who you are, + where you live, or what your phone number is. We are not Big Brother. + + "Raw Data for Raw Nerves" + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X diff --git a/textfiles.com/bbs/telix2.cap b/textfiles.com/bbs/telix2.cap new file mode 100644 index 00000000..d1ecdfec --- /dev/null +++ b/textfiles.com/bbs/telix2.cap @@ -0,0 +1,122 @@ +************************************************************************* +How to upgrade your 24oo modem into a 96oo baud. (US Robotics compatible +of course) + Written By + Death Bringer (CPT/Info-Net/IRA) + + 06/7/91 + + +Be sure to turn off your modem before you begin. + +First of all, you need to go to your nearby electronics store, don't try +to go to Radio Shack, their parts have their own model numbers and you'll +have a hell of a time getting the parts you need. This upgrading of your +modem will not work on old hayes modems, but they will work on any clone +maker of modems (everex, practical peripherals, anchor, ati, intel, etc.) +It will only work with modems with the Intel Chipset. + +This technique widens the band width by using a different chip that is + +Parts Needed: +16550 UART +L4313545 IC +SC11020CN IC +L8730183 IC + +First of all, check to see if your biggest chips are soldered or socketed. +if they are soldered, you'll have to de-solder the chips before you begin. +After you get that done, replace the 8250 UART with the 16550 UART. (16550 +UARTs are required for 9600+ speeds). The other 1 or 2 chip(s) need(s) +to replaced with INTEL L4313545 instead of the chip that is already there. +If your modem has another socket or more, than you are in luck, you can +purchase a chip from US Robotics, and make your modem faster than 9600. +If you don't have the socket, than you can only go 9600. I'll get the +chip number to you in the next edition and explain how and where to +install it. I am working on a way for the people (like me) that do not have +the extra socket in their modem to speed up the rates. I am working on a way +to piggy back the chip. I'll get back to you. There should be a 22 pin +chip on your modem also with a model number of SC11005CN or some where close +to it. Replace it with the SC11020CN. Also, replace the L8630173 with the +L8730183 chip. If you have any suggestions or questions, you can locate me +through Compuserve USER ID 74702,97524 + +*****OPTIONAL, LAP-M Error correction***** + +Adding error correction is rather simple. For this these parts are +necessary: + +Potentiometer. This is a 5k audio taper variable resistor. + +Capacitor. Any non-polarized 1.0 to 1.5 uf cap should do. + +100 ohm resistor - quarter or half watt. + +Wire + +Solder, soldering iron, etc. + +Solder one end of the capacitor to PIN 1 of the phone line input jack +|-------------------| +| \ line in :: +| \ phone in :: +|-----------||||||||| pin 1^ + + + +If your modem is external, the diagram looks like this. + + +|------------------| +| /| +| ||RS-232 port +| \| :: +| |-|line in :: +| |-| pin 1^ +| |-|phone in +| |-| +|------------------| +This should be on the back of the modem. +Pin one should the farthest on the bottom left. + +Solder the other end of the capacitor to the center lug of the potentiometer +(there are three lugs on this critter). Solder one end of the resistor to the +PIN 4 of the line input jack. Solder the other end of the resistor +to either one of the remaining outside lugs of the potentiometer. Doesn't +matter which one. + +------------------------------------------------------------------------- + +ADDITION TO ORIGNAL FILE - 6/15/91 +Bill McCauley & Dark Spyre/Dr. Brains/Ryan Schwartz/Lamer/Loser + +First, a personal recomendation. _THIS WORKS!!!_ I have been plagued with +2400 baud for some time. I hate waiting for the transfer to finish so that +i can use the phone. Threw the gismo together in about 10 or 15 minutes, +took another five to adjust the pot for best results on my worst +conection, and guess what? No more slow connections! + +------------------------------------------------------------------------- + +Have Fun! + +I am working on cheap ways to install V.32/V.42bis on your modified modem + + +*************************Updated, 6/16/91******************************** + +Installing V.42bis: + +1) You will need to purchase a 27C512 ROM chip. +2) You will need to purchase a Sony CXK58257P-12L (or equivalent) Ram chip. +3) Install the Rom in the Supervisor (SUP) socket. +4) Install the Ram in the Ram socket. +5) Make up two 3 pin jumpers for P9 and P10 with pins 1 and 2 jumpered +on one and pins 2 and 3 jumpered on the other. Connect the vacant pin 1 +on the one to the vacant pin 3 on the other with a jumper wire. +6) Remove the jumpers on P9 and P10. +7) Install the jumper with pins 1 and 2 connected together on P9. +8) Connect the jumper with pins 2 and 3 connected together on P10. + + +DeathBringer '91 diff --git a/textfiles.com/bbs/textfiles.txt b/textfiles.com/bbs/textfiles.txt new file mode 100644 index 00000000..15469e29 --- /dev/null +++ b/textfiles.com/bbs/textfiles.txt @@ -0,0 +1,171 @@ + +"Textfiles" + +To the tune of "Big Time" - Peter Gabriel + +Written By Jason Scott on March 9th, 1987 + +Congratulations. It's my first parody in about a year. + + + +=========================================================================== + + + +(Hi there!) + + + +I've got textfiles, I'm writing them. (huh!) + +I'm gonna leech them all, yeah! (hey!) + +So much megs left to leech, + +I'm gonna fill my hard driveEEEE + + + +Uhhhhhhhhh..... + + + +The C-Nets that I've called, are all use-less + +They act real proud of 10 "g-philes" + +But not me! I've got more than that! + +I've searched them out. + +I've been filling my drive, from lots of AE's that I ride. + + + +It's not enough, I'm getting rough, + +With my Leechlist, my big big leechlist + +I check and mark them, and then I ARC them + +So I have more meg space + + + +And I will read all my textfiles + +But the pagelength is 4 miles... + + + +Textfiles! I'm on my way to gigabytes.. + +Textfiles! Ooo Yes! + +Textfiles! I'm gonna read them all, yeah! + +Textfiles! + +Textfiles! So much info out there.. + +Textfiles! I'm gonna leech them all, yeah! + +Textfiles! + + + +oOOOOOooooOoooo + +oOOOOOooooOoooo + + + +My hard drive has lots of cool files + +Like "Real Pirates" and "The guide to Sprint" + +"How to fuck the dead", and "Getting Fake I.D." + +And always they're real fun + +But it's real good that I take time to think + +`Bout making Bombs in my kitchen sink + +Or dumping urine in a party drink.... + + + +'Cause I know that they're still textfiles, + +And you can't know who wrote them... + + + +Textfiles! I'm on my way to hectobytes, + +Textfiles! (Huh!) + +Textfiles! I've got to leech them all, yeah! + +Textfiles! + +Textfiles! So much info to grab.. + +Textfiles! I'm gonna leech them all, yeah.. + +Textfiles! + + + +Textfiles! My drive's getting fuller! + +Textfiles! My board's getting fuller! + +Textfiles! My greed's getting greater.. + +Textfiles! And my tape drive... + + + +Textfiles! My list is getting bigger + +Textfiles! And my floppy disks. + + + +Textfiles! Look at my phone call fares + +Textfiles! Someday I might get rad + + rad + + rad + + rad + + rad + + rad + + + + rad + + + + rad + + rad + + + + rad + + rad rad rad + + rad + + + diff --git a/textfiles.com/bbs/textprime.txt b/textfiles.com/bbs/textprime.txt new file mode 100644 index 00000000..d3358299 --- /dev/null +++ b/textfiles.com/bbs/textprime.txt @@ -0,0 +1,121 @@ +[ 80 COLUMNS; LOWERCASE ] + + + + _______________________________ + | | + | The Ramsacker's | + | Textfile Primer | + | | + | A Pieces of Eight Production! | + | | + | July 27, 1989 | + |_______________________________| + + + + I have always been intrigued by the textfile as a medium for the +exchange of useful information ranging from hacking to kracking, phreaking to +anarchy, and humor to distaste. The abundance of information that can be +obtained from textfiles used to be widely understaged by the many people who +saw them merely as "g-philes", using that term in a slightly negative +connotation. As of late, I have seen a movement towards the acceptance of +textfiles as a viable form of trade through the proliferation of groups such +as cDc who's main contribution to the modeming society has been their release +of many fine textfiles ranging from tutorials to interesting stories. + + What has been bothering me as of late in my ongoing collection of +textfiles is the lack of quality of some of the files that I receive. It is +annoying to download a file that looks like some stupid fuck wrote it by +slamming his fist down on the keyboard; the spelling being atrocious and the +format being unbearable. I realize that not all of us are scholars, but it +only takes a few more minutes to check up on your spelling and format the +text a bit. What disgusts me further is that some people DO take the time to +make their files look pretty, only to have some complete looze fuck it up by +viewing it over shitty phone lines and then upload it to another system, +thus causing a perpetuation of a corrupted file. In most cases, some of the +important data gets lost or the effect of the file is shattered because you +come upon a string of line noise right in the middle of an interesting +section. If people would just take the time to handle the files with care, +there wouldn't be many crap files around. Unless you're an asshole, you +don't check a book out of a library and destroy it. Let's face it, fucked +files are just that: fucked! And nobody likes a copy of a fucked file no +matter how little they care. Everyone would rather have the file in it's +original format. + + Since I predict the exchange of textfiles to be a popular pasttime (much +like the collection of "wares" in the earlier days of Apple pirating), I +have written this file in hopes to set a guideline for file writing and +trading. You wouldn't put out a "bad" crack, or a patch that didn't work or +even fucked up what you were trying to patch. The same goes for textfiles, +in the same sense. + + Here are some guidelines to keep in mind when dealing with the trade or +writing of textfiles: + + o If possible, try to download the file using a protocol so that if any + line noise is present during your session it won't affect the file. + + o If you must V)iew files, and if you are planning to upload it to + another system, then when you buffer it, at least try to remove any + garbage that may have infiltrated the text, and PLEASE remove all + transfer prompts (i.e. "[ Volume 10 #1-11 ]" and "(>"). I find those + most annoying, especially after they have accumulated after many + transfers between different systems. + + o Don't try to do the general modem public a favor by "editing" files. + Let sleeping dogs lie. If the author intended the file to be in all + uppercase then that's how it should stay. The same goes for 40 column + textfiles. They don't need to be stretched out to 80 columns. They + still read the same either way. + + o Never add your say to a file or modify the original authors work just + because you feel strongly about the subject. You wouldn't change + Shakespear's words around in any of his works (unless you were in + school and had nothing better to do). Modifying other peoples work is + the sign of a true loser. I saw this done to "The Real Pirates Guide" + and it totally disgusted me (you're a fucken loser for that, Dak)! + + o When writing files, don't neglect to include the date (and maybe even + the time) somewhere in the file. You're writing history of sorts, + and people who read your file in the future might be interested to + know when you wrote it (especially if the material stands a chance of + being outdated in the future and will not apply, such as some phreak + info). + + o Write your files on a word processor that will add carriage returns to + all the lines or at least has word wrap. That usually solves the + problem of extra carriage returns between lines which screws up the + text somewhat. + + Remember, as an author, you should be proud of your work. So take the +time and effort to format and proofread it before you put it out. Even if it +is just a quickie file, spend a few extra seconds rounding out the rough +edges to make it at least look respectable. And you wouldn't want some +asshole fucking with your files after you put them out, so don't do it to +other peoples files. + + I hope some of my ideas catch on. Even if they don't, I figure that I +at least put forth the effort. + + + --------------------------------- + NOTICE: + --------------------------------- + No additions, deletions, or + modifications may be made to + this file AT ALL. Also, this + file is to be transferred in + its original format and any + corrupted copies should be + put out of their misery by + being deleted. + --------------------------------- + + + A Semi-Useless File from Pieces of Eight Kracking + + + The Ramsacker + July 27, 1989 + 11:17 PM diff --git a/textfiles.com/bbs/tgbackdr.txt b/textfiles.com/bbs/tgbackdr.txt new file mode 100644 index 00000000..443782c4 --- /dev/null +++ b/textfiles.com/bbs/tgbackdr.txt @@ -0,0 +1,77 @@ + ÄÄÄ TG SysOp's Protect Your Selves ÄÄÄ + ÄÄÄ From Baddies ÄÄÄ + + ÄÄÄ by Man Against The Mob ÄÄÄ + ÄÄÄ The Pie BBS 516-689-5413 ÄÄÄ + + Hey you, don't be silly, put a rubber on your willy! + +As telegard is a popular BBS software package, and is widely available +to the general public, it becomes easy for hackers to crash your system. +I have written this file to help protect your self from these people. +Included are tree ways to protect your self. I also recommend you use a +shuttle logon menu to provide more security. With one new users do not have +access to the board on their first call. + +1) The PKZIP back door - Users who wish to crash your board can call your +board, upload a zip file containing a trojan named PKZIP.EXE. they can use +the archive file menus to unzip the PKZIP.EXE trojan file to your temp file +directory. They can then run the file by selecting Add to Archive which will +then attempt to run PKZIP.EXE to zip up the file. But if a PKZIP.EXE file is +in the temporary directory, it will run that one instead of the true PKZIP +program. To protect your self from this, press //\\*P from any menu, select +option 'F' and then press 'A'. Modify the PkZip Archive entry to include the +path of the true PKZIP.EXE and PKUNZIP.EXE files. +ie. use 3) C:\ZIP\PKZIP.EXE -aex @F @I +instead of 3) PKZIP.EXE -aex @F @I. + +2) The Logoff.Bat back door - A user can ZModem batch upload a file called +Logoff.Bat to your Telegard directory using various commands in DSZ. I won't +go into them because this is a file to prevent it, not tell how to do it. +This uploading is mostly blindly giving a path name hoping it is in the +C:\BBS directory or whatever path they try. They they are trying to do is +get ZModem batch to upload a file called Logoff.Bat to the main BBS +directory. + What Logoff.Bat does is each time a user logs off, telegard will run +Logoff.Bat if it exists. It is mostly used in BBS's which use front doors to +help run echo's between different bulletin boards, such as D'Bridge. If the +Logoff.Bat file contains a nasty such as WIPEDISK C: or something to that +extent, bad things will happen. You can stop that by adding the word +'Restrict' to the end of your Zmodem upload strings. +ie. use dsz port %P speed %B rz %F Restrict +instead of dsz port %P speed %B rz %F. + +Here is DSZ's documentation or Restrict: + +restrict Restrict pathnames to the current disk and directory tree, and + disallow overwriting of existing files. When DSZ is restricted, + it will refuse to transfer files containing the string autoexec.bat + and command.com in upper or lower case. This provides some defense + from malicious uploaded files. + +3) Scan all uploaded files for viruses and trojans before you run them. +A method used by some Telegard's I have seen is to replace the Integrity +check line with a batch file which tests for initial integrity, then it +Unzips the file to a temporary directory, run the SCAN program and exit with +a good exit code telling TG it is alright. This is a sample batch file for +doing that: (You will have to look up the correct exit codes for your SCAN +and PkZip programs) + +ECHO OFF +C:\ZIP\PKUNZIP -t %1 +IF ERRORLEVEL = 1 Goto Badfile +MD\0UR12.$$$ +C:\ZIP\PKUNZIP %1 C:\0UR12.$$$ +CD\0UR12.$$$ +C:\ZIP\SCAN *.* +echo y|del *.* +:Badfile +exit + +And have in Telegard 0 (or whatever) as a good exit code. (And make sure +SCAN's exit code is not 0 (or whatever) for bad files. +For more help with Telegard Call <\ The Pie BBS /> 516-689-5413. +This text file was written by Man Against The Mob. +This text file has been brought to you by MHEB Enterprises. +ile has been brought to you by MHEB Enterprises. + \ No newline at end of file diff --git a/textfiles.com/bbs/thetruth.tdk b/textfiles.com/bbs/thetruth.tdk new file mode 100644 index 00000000..a17380ce --- /dev/null +++ b/textfiles.com/bbs/thetruth.tdk @@ -0,0 +1,72 @@ + The Real Story + + By Michael Levy + + AKA The Dark Knight +============================================================================== + +10/8/92 + +I am writing this for 2 main reasons: + +1) You will all find out about it by the end of the month anyway, one way or + another, so its better you hear the real story, from the original source. + +2) It's about time I told this story. + + +The following is a true story, following the events that took place starting +in May of 1991. + +For 4 years, I had been friends with two people, Dennis R. Haines (who was +known on BBSs at the time as 'Action Jackson' and John A. Fransckiewich. +(who was not on BBSs.) We had become good friends, and often hang out and +the like. Around March, 1991, I became friends with a guy named Michael +D. Cohen through a BBS. (He was known as 'The Wanderer') I started hanging +out with him, and, in turn, John and Dennis did too. We often had sleep +overs at my house on weekends. Since I had a job, I couldn't always hang +out so Mike became better friends with John and Dennis than with me. They +started playing tricks on me or members of my family that weren't always +funny. In fact, some of them were plain destructive. On May 13, 1991, Mike +told me that my mother was making sexual advances torward him, John, and +Dennis. I, of course, did not believe him. What had actually happened was +that he had made a pass at my mother and was told to leave. It seems over the +months he had developed quite a crush on her. He refused to leave and stood +on my front lawn yelling threats and curses and challenging my father to come +out and fight him. Of course, my father could do no such thing, being Mike was +only 16 at the time and my father was 47. My mother called the police and Mike +was taken away in a patrol car. I later found out that Mike had been spreading +roumers about certain sexual acts that he had performed with my mother. (I +won't go into details.) We thought that was the end of it and we would never +see or hear from Mike again. Unfortunatly, this was not the case. Four days +later, my parents were arrested and taken to jail. My mothers charges were +2 counts of sexual assault, 3 counts of criminal sexual contact, 1 count of +child abuse, and 3 counts of endargering the wefare of a child. My father's +charges were 2 counts of aiding & abetting sexual assault and 3 counts of +endagering the welfare of a child. It seems Mike had told his stories to the +police, and had gotten John and Dennis to go along with him. I still don't +know how he did that, but threats and/or blackmail come to mind. My grand- +mother paid the bail and my parents were released that night. An investiga- +tion was underway and many people were questioned, including myself and the +three stooges. (John, Dennis, Mike.) I have in my hand a copy of the tran- +scripts of the questioning of these three, and, needless to say, not a word +of their statments ring true. In fact, some of their statments contradict +other statments, which in itself is almost laughable. The trial date was set +for May 1992, and went as planned. It was widely publicized in papers, as i'm +sure some of you noticed. During the questioning of the three stooges, Mike +broke into tears, John contridicted himself and Dennis admitted to lying about +previous statments. In spite of all of this, 1 jourer had doubts. My father +was aquitted, and a mistrial was called on my mothers charges, the jury vote +being 11 to 1, in favor of aquittal. (Boy, I'd sure like to get my hands on +that one asshole!) It was doubtful that there would be a retrial, on account +of the vote being so close. However, my mother received a letter today in the +mail, stating that there will be a retrial on October 19, 1992. Once again, +this trial will be in the papers, so don't be suprised when you see them. I +have no doubt in my mind of my mother's aqquital. If you have any opinions or +questions about this situation, please don't hesitate to ask me. +Thank you. + +============================================================================== + + + diff --git a/textfiles.com/bbs/thirdegr.asc b/textfiles.com/bbs/thirdegr.asc new file mode 100644 index 00000000..874581ef --- /dev/null +++ b/textfiles.com/bbs/thirdegr.asc @@ -0,0 +1,1405 @@ +From Matt Huls: "This is a capture file from another BBS somewhere in the metro-Detroit area. +I'm pretty sure it's called Shadow World. An awesome catalog of files." + + + Skate Punk + WizKid + Paladin + Khatte + Atari ST Remotes are... + Marauder + Oliver W. Jones + + 1200/2400 Baud. 24 hours 7 days a week + IBM and Atari ST systems supported + S.o.F. D.R.I. & R.O.T. Support Board! + +The Cobra is ready to STRIKE! + +AutoMessage by: Runner #82 + + Okay all you Cyberpunkies out there, remember the LOOOONG posts you will +need that are in the Cyberpunk section. You might want to print them out for +your benefit. + Then remember to E-MAIL me your character ideas QUICKLY so we can get this + +show on the road! We want to start as SOON as possible! + + Oh. And unfortunately, no more room is left to join up for at LEAST +another two weeks, unless you just want to have a character made and ready to +join the adventurers as their teammates die. It on a first come, first serve +basis. + + Runner o + < V + /> + + + + Your name : THIRD DEGREE +Phone number : 313-386-9791 +Sec Level : 100 SL +DL Sec Level : 100 DSL +# times on : 3 +On today : 1 + +Public posts : 0 +E-mail sent : 1 +Mail waiting : 0 +Time on today : 00:00:50 +Total time ever: 9 Minutes +Last called : 06/29/89 +Good evening, Third Degree #112. + +You are caller #3303, +the 26th caller for today. + +Time allowed - 130 minutes +You have called - 2 times +Calls today - 1 times +Account limits - 15 calls, using a maximum of 130 minutes, per day. + +You have not voted on 3 voting questions. + + +There are no bulletins today. + /\ /_ __ __/__ / /__ __ / __/ + __\ / //-//_//_//_/_/ /_/_//_// / /_/ + MAIN MENU + + ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| + |A|uto Message |B|ulletins |C|hat w/The Cobra |/G|Quick Logoff | + |F|ile Transfer |G|oodbye |Y|our Statistics |I|nformation | + |L|og of callers |M|essage Base |N|ote to Cobra |O|ther Worlds | + |.|Doors |V|oting Booths |-|Tutorial |$|Time Bank | + |?|This Menu |P|ersonal Data &230|*|ShadowOp Menu | + ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| + +[