From cbc842d120707aa638b8f9c68c5fed5869a7b998 Mon Sep 17 00:00:00 2001 From: OPSXCQ Date: Tue, 7 Nov 2017 12:28:58 -0300 Subject: [PATCH] update --- textfiles.com/100/ad.txt | 36 ++ textfiles.com/100/adventur.txt | 132 ++++++ textfiles.com/100/angela.art | Bin 0 -> 6656 bytes textfiles.com/100/anonymit | 778 +++++++++++++++++++++++++++++++++ textfiles.com/100/applemaf.hum | 493 +++++++++++++++++++++ textfiles.com/100/apples.txt | 413 +++++++++++++++++ 6 files changed, 1852 insertions(+) create mode 100644 textfiles.com/100/ad.txt create mode 100644 textfiles.com/100/adventur.txt create mode 100644 textfiles.com/100/angela.art create mode 100644 textfiles.com/100/anonymit create mode 100644 textfiles.com/100/applemaf.hum create mode 100644 textfiles.com/100/apples.txt diff --git a/textfiles.com/100/ad.txt b/textfiles.com/100/ad.txt new file mode 100644 index 00000000..3283453f --- /dev/null +++ b/textfiles.com/100/ad.txt @@ -0,0 +1,36 @@ +View: RAD AD +:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: +: Call The Upside Down BBS at (201) 398-2953 300/1200 Baud 10 megabytes : +:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: + +System currently operating with ; Other Information +--------------------------------- ----------------- +T-Net BBS Software version 1.6 20 Sub-boards +Apple ][ + w/64 K 100+ G-files +Apple-Cat ][ Modem On-line Ascii express +Apple-Cat 212a Upgrade Card 300 + Users +Apple-Cat ][ Firmware Rom Chip 5300 + Calls to date +Videx UPPER/lower Case Chip +2 Apple ][ Disk Drives +'THE SIDER' 10 Megabyte Hard Drive +Thunderclock + Call Today ! and get yourself +Bell Fone Linez A Password ! +PSE&G Electric +Apple Monitor /// and/or Taxan RGB I +Epson Salt (MX-80) +2 Maxell Md1 Floppy disks +Bambergers deluxe desk topSystem saver fan +System saver fan +TG Joystick +Dayton axial fan CMF (Boosts cooling, all slots are full) + +============================================================================== + +Upside Down AE Line 300/1200 baud apple-cat ][ (201) 625-8929 p/w = run +------------------------------------------------------------------------------ + + + + +(> + \ No newline at end of file diff --git a/textfiles.com/100/adventur.txt b/textfiles.com/100/adventur.txt new file mode 100644 index 00000000..7b9f271b --- /dev/null +++ b/textfiles.com/100/adventur.txt @@ -0,0 +1,132 @@ + + *************************************** + * * + * ADVENTURE * + * * + * Solving it in easy steps * + * * + * * + *************************************** + FROM: THE ROM RAIDER + DR. DIGITAL + + CALL HER MAJESTY'S SECRET SERVICE + 3 0 3 - 7 5 1 - 2 0 6 3 + + +WARNING: THIS WALK-THRU SHOWS HOW TO SOLVE THIS ADVENTURE STEP BY STEP, THESE +ARE NOT HINTS! + +SPECIFIC INSTRUCTIONS ARE ENCLOSED IN QUOTES, SO TYPE WHAT YOU SEE. + +START OFF BY GOING "N". YOU ARE NOW STANDING AT THE END OF A ROAD BEFORE A +SMALL BRICK BUILDING. THIS BUILDING IS THE WELLHOUSE, AND IS AN IMPORTANT PART +OF THE GAME. THE OBJECT OF THIS GAME IS TO GET THE 15 TREASURES BACK TO THE +WELLHOUSE. + +CONTINUE WITH "IN", AND YOU ARE INSIDE THE WELL HOUSE, SO "GET FOOD", "GET +LAMP", "GET KEYS", "GET BOTTLE". NOW, THERE ARE THREE MAGIC WORDS YOU NEED TO +USE. THEY ARE PLUGH, XYZZY AND PLOVER. TWO OF THESE WORDS ARE USED TO GET TO +AND FROM THE WELLHOUSE AND PARTS OF THE CAVE. THE THIRD, PLOVER IS USED TO GET +BETWEEN TWO PARTS OF THE CAVE. ANOTHER THING TO REMEMBER IS THAT YOUR LAMP +LIGHT IS LIMITED, SO TURN OFF YOUR LAMP WHEN YOU DO NOT NEED IT! + +NOW ON TO THE CAVE. SAY "PLUGH", THEN "LAMP ON", "S", "GET SILVER", "DROP +KEYS", "DROP FOOD", "DROP BOTTLE", "N". YOU ARE NOW BACK AT Y2. HERE IS WHERE +YOU USE PLOVER. SO SAY "PLOVER", THEN "NE", "GET PYRAMID", "S", "LAMP OFF", +"DROP LAMP", "DROP SILVER", "DROP PYRAMID", "GET EMERALD", "W", "DROP EMERALD", +"BACK". THE REASON YOU DID ALL OF THAT WAS THAT THE ONLY WAY TO GET THE +EMERALD OUT OF THE PLOVER ROOM IS OUT THROUGH THE CRACK, BUT YOU CAN NOT CARRY +ANYTHING ELSE WITH YOU. + +NOW "GET LAMP", "GET SILVER", "GET PYRAMID", THEN "PLOVER" AND "PLUGH". YOU +ARE NOW BACK IN THE WELLHOUSE, SO DROP OFF YOUR TREASURES SO FAR. TYPE "DROP +SILVER", "DROP PYRAMID". BACK TO THE CAVE WITH "XYZZY", AND "LAMP ON", "E", +"GET CAGE", "W", "GET ROD", "W", "W","DROP ROD", "GET BIRD", "GET ROD", "W", +"D","W", "WAVE ROD". THERE IS NOW A CRYSTAL BRIDGE ACROSS THE CHASM. CONTINUE +WITH "DROP ROD", THEN GO "W", "GET DIAMONDS", "E", "E", "S", "GET GOLD", "N", +"D". AT THIS POINT YOU WILL SEE A HUGE GREEN SNAKE BARING YOUR WAY. TO BE RID +OF THE SNAKE, "DROP BIRD", AND THE SNAKE IS DRIVEN AWAY. + +AT THIS POINT I NEED TO EXPLAIN SOMETHING ELSE. DURING THE COURSE OF THE +GAME, A DWARF WILL SEEK YOU OUT AND THROW AN AXE AT YOU. GET THE AXE. THE +NEXT TIME YOU SEE THE DWARF, THROW THE AXE AT HIM TO KILL HIM. THIS MAY HAPPEN +SEVERAL TIMES, SO JUST KEEP KILLING THE DWARVES. ANOTHER PERSON TO WATCH OUT +FOR IS THE PIRATE. HE WILL SHOW UP AT SOME POINT IN THE GAME, AND STEAL +WHATEVER TREASURES YOU ARE CARRYING. IF THIS HAPPENS, YOU CAN GET THE +TREASURES BACK WHEN YOU FIND HIS TREASURE CHEST. + +CONTINUE WITH "DROP CAGE", "SW", "W". HERE IS A DRAGON SITTING ON A PERSIAN +RUG. YOU NEED TO KILL THE DRAGON TO GET THE RUG SO TYPE "KILL DRAGON". THE +GAME WILL RESPOND WITH "WITH WHAT? YOUR BARE HANDS?". ANSWER "YES". +CONGRATULATIONS, YOU HAVE NOW KILLED THE DRAGON!. SO, "GET RUG", THEN "E", +"E", "S", "GET JEWELRY", "N", "W", "GET COINS", "E", "N", "N", "LAMP OFF", AND +"PLUGH". YOU ARE AGAIN BACK IN THE WELLHOUSE, SO DROP YOUR TREASURES WITH +"DROP DIAMONDS", "DROP GOLD", "DROP RUG", "DROP JEWELRY", "DROP COINS". BACK +TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "GET FOOD", "GET KEYS", "GET +BOTTLE", "D", "W", "D", "W", "W", THEN SAY "ORIENTAL" TO GET TO THE ORIENTAL +ROOM. THEN "GET VASE", "W", "DROP KEYS", "DROP FOOD", "BACK", "N", "W", AND +YOU HAVE NOW FOUND THE EMERALD YOU PREVIOUSLY PLACED THERE. SO "GET EMERALD", +"NW", "S", "SE", "E", "GET PILLOW". THE PILLOW IS USED TO PLACE THE VASE ON, +SO YOU DON'T BREAK IT. + +NOW GO "BACK", "W", "W", "D", "WATER PLANT", "U". THE PLANT IS CRYING FOR MORE +WATER, SO NOW YOU NEED TO GO GET IT SOME WATER. BUT BEFORE YOU DO THAT DROP +OFF YOUR TREASURES AT THE WELL- HOUSE BY GOING "E", "E", "NE", "E", "U", "E", +"U", "N", "LAMP OFF", "PLUGH" AND YOU ARE BACK IN THE WELLHOUSE. SO "DROP +PILLOW", "DROP VASE", "DROP EMERALD". + +BACK TO THE CAVE WITH "PLUGH", "LAMP ON", "S", "D", "E", "D", "FILL BOTTLE". +YOUR BOTTLE IS NOW FILLED WITH WATER, SO GO "U", "W", "W", "D", "W", "W", "W", +"W", "D", "WATER PLANT", "U", "E", "D", "GET OIL", "U", "W", "D". NOW YOU CAN +CLIMB THE BEANSTALK SO, "CLIMB", "W", "GET EGGS", "N", "OIL DOOR", "DROP +BOTTLE", "N", "GET TRIDENT", "W", "D", "DROP TRIDENT", "GET KEYS", "GET FOOD", +"SW", "U". YOU ARE NOW IN FRONT OF A BRIDGE WITH A TROLL GUARDING IT. THE +ONLY THING THAT WILL CAUSE THE TROLL TO LEAVE IS TO THROW HIM A TREASURE. +THERE IS ONLY ONE TREASURE YOU CAN THROW HIM AND THAT IS THE EGGS. SO "THROW +EGGS", THEN "CROSS". + +YOU ARE NOW ACROSS THE CHASM. CONTINUE WITH "NE", "E", "NE", "E", "GET +SPICES", "W", "N", (HERE IS THE VOLCANO), "S", "S", "SE", "S", "IN". YOU ARE +NOW IN A ROOM WITH A FEROCIOUS BEAR, WHO IS LOCKED UP WITH A GOLD CHAIN. YOU +NEED TO GET THE CHAIN, SO "FEED BEAR", THEN "UNLOCK" THE CHAIN, "GET BEAR", +"GET CHAIN", "DROP KEYS", AND "OUT". THE BEAR WILL NOW FOLLOW YOU WHEREVER YOU +GO. SO GO "U", "U", "W", "W", AND "CROSS". FROM NOWHERE, THE TROLL APPEARS +AGAIN. JUST "DROP BEAR", AND THE TROLL WILL DISAPPEAR. NOW "CROSS" THE +BRIDGE, THEN GO "SW", "D", "GET TRIDENT", "SE", "SE", "NE", "E", "N". YOU ARE +IN THE CLAM ROOM, SO NOW "OPEN CLAM". (IT IS NECESSARY TO HAVE THE TRIDENT +BEFORE YOU CAN OPEN THE CLAM). NOW YOU NEED TO GO AFTER THE PEARL SO GO "D", +"D", "GET PEARL". THEN "U", "U", "S", "U", "E", "U", "N", "LAMP OFF", AND SAY +"PLUGH". THEN "DROP CHAIN", "DROP PEARL", "DROP TRIDENT", "DROP SPICES". + +BACK TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "D", "W", "D", "W", "W", +"W", "W", "D", "CLIMB", "W". YOU ARE NOW BACK AT THE SPOT WHERE YOU ORIGINALLY +FOUND THE EGGS WHICH YOU THREW TO THE TROLL. THE REASON YOU THREW THE EGGS WAS +BECAUSE YOU CAN GET THEM BACK AGAIN! JUST SAY "FEE", "FIE", "FOE", "FOO", AND +THEY MAGICALLY APPEAR! SO "GET EGGS", THEN "N", "N", "W", "D", "SE", "SE", +"NE", "E", "U", "E", "U", "N", "LAMP OFF", AND "PLUGH". THEN "DROP EGGS". + +NOW ON TO FIND THE LAST TREASURE, THE PIRATE'S CHEST! GO THERE WITH "PLUGH", +"LAMP ON", "E", "U", "W", "W", "W", "S", "E", "S", "S", "S", "N", "E", "E", +"NW", "GET CHEST", "BACK", "N", "D", "E", "E", "XYZZY". YOU ARE BACK AT THE +BUILDING, SO "DROP CHEST". CONGRATULATIONS, YOU NOW HAVE ALL 15 TREASURES! + +AT THIS POINT YOU HAVE ONE MORE THING TO ACCOMPLISH BEFORE YOU GO THE THE GRAND +FINALE. SO SAY "XYZZY", THEN GO "W", "W", "W", "D", "D", "N", "D", "W", "D", +"E", "GET MAGAZINES". YOUR QUEST IS TO TAKE THE MAGAZINES, AND PLACE THEM JUST +INSIDE WITT'S END. THIS ACTION IS OFTEN MISSED BY PEOPLE PLAYING THIS GAME, +AND AS A RESULT, THEY DO NOT FINISH THE GAME WITH ALL 350 POINTS AND THE GRAND +MASTER STATUS. NOW GO "E", THEN "DROP MAGAZINES", AND "BACK". + +NOW COMES THE EASY PART, JUST WANDER AROUND THESE PASSAGES, AS YOU NOW HAVE +SOME TIME TO KILL. THE GAME GIVES YOU A SET NUMBER A MOVES AFTER ALL THE +TREASURES ARE IN THE WELLHOUSE, AND THEN YOU ARE TRANSPORTED TO THE GRAND +FINALE. THE MESSAGE YOU WILL GET WILL START BY SAYING "THE CAVE IS NOW +CLOSED", ECT. AT THIS POINT YOU ARE TRANSPORTED TO THE NORTHEAST END OF AN +IMMENSE ROOM. DO THE FOLLOWING: "SW", "GET ROD", "NE", "DROP ROD", "SW". +WHAT YOU HAVE DONE IS PLACED A STICK OF DYNAMITE AT THE OPPOSITE END OF THE +ROOM. NOW YOU SAY THE MAGIC WORD - "BLAST". YOU HAVE NOW EXPLODED A HOLE IN +THE FAR WALL, AND YOU MARCH THROUGH IT INTO THE MAIN OFFICE. YOU HAVE NOW +FINISHED THE GAME OF ADVENTURE! + + \ No newline at end of file diff --git a/textfiles.com/100/angela.art b/textfiles.com/100/angela.art new file mode 100644 index 0000000000000000000000000000000000000000..c446a7e788821297278278ad45230ec206d2bccb GIT binary patch literal 6656 zcmaKw&5ol+6h^ZiX%^XLh1jt1@Br)>DHB_YqFzKO@Bbt@=etz}c6$bF8mjL1b8i&| z?){&?{``CY`o(?v)wWLSy8a?&o#%C)Rw?G6#I4gjPs=*5+hgNs?E6qd*x9znV}m!* z?_$>(rj1~~BUbLu(V>CLQ1{L}liD=BdR|+20zH)HvV!xM_=IDIy$-~iWbLN<47kv5 z=;L330l?D>BAM#G7(Iqr8_J{#QaK##%a89rR3_qMeSDy8h3KWe zw8zt!2PPTWX?NJS_2Xk(`oLuJtbn^~q@*3nfcYSOS8$rCW0nPO=B87gv}haKI(OUC z`hfQVd{0k$J?oLGI)>DRwkY@6t7!Z__9zEc1YTEGXzAw#OBF2!J=+$r!Sgqc-%{Tc zWZQRBpn-fi>AKt_7*=8q*il0k9fGC|5v+GcFoUJ{o~}?6Hp4mNyxzF1Z2`{Nem@*% zW|6WTxh_EA1PXX@BpK2h8)Iu5gAQTF$#jQZ`#=J9vH5+SVP7Y(;8L*w4<}x$Q`eM) zIisrd>_-`AjA^ zb*U-lBhG!)*!rk|%x&l3tbFd~e0R%<36g>HEh`KB#YS*#dw%3F^b15b>s(UR3td3#}+vIMK^SdWKdz;rsD{&bJo zlBB$0wZARkC9JV+k>|`-sct9DvByW3s2|mM%OpU42>s) z+!C!Bd-9wx3wtvVamTD7teDfMTCnRa357(wQMQ~WILpLIS8E4MP}44+VhAs3<}bBL z7EC`1##F0K=_1fmy9$Y@*x9o9wZXKpRWSryhrwtY!d66v;&y&ynV_c(_&jqM%0ck< z5i3)s~3P(N$|cq^mbcP`fmGmbk1(+33u_42xG!EP`#z9%R6oh0U6O z++2c`XwnxNml=7AB{cvLHD`5H%d1^{8Ys4Db19o4IX^vSlxDP~4XN87S2FC6V& zJ!?eXyd(6qbf66=80~eUIM2B}r(d-Hyz$^d6j-vTn4rKxZ1~AojX=oVKU=-rt+A#v9c8 z0MVa7nF+h^25o@B6RECu4?uJNiDM_xYs%b7Ks)wlxq?hlRXxkKSu7Zv=-Vnyj)s;B z+S5J8vf&WCMG7SR1v*b1n)&h$SwQrJp1PbBl;*dZt7Afx+khJCg-~iM-6ze$HKc23 zW$6fsSilDQio6)Sr~-+>K!m=IW_nv<;PmXEr&iHa)Vt`DSz7#LC<+LddctzZip3J} z3gtz~2(iI?Wo)o1o7Y4fFVL{&(5!|CD8E?MR+%yhStweX$TNk z9ovC~2Pw=pY9!d!I@loi#HPKvO|v2`P_PY54;=&Cbc<8e1t~$G{Gy0*BP}q!@jQN; zU%*lDz}>~OY=CX@(O%Fb5Y$D~P7)I*RIDKy%qyxM)ZJ5b>{hoCBUOJkv0u=Fhj5GZoNQC3W5Wsc_|LV#M)+=xdxC+3`}=;wmDVnI@GlOqe=t$=|u4 ks?)u_D_^J*RtX|jS6lo2(o-Bf29O*7OuWPN$8YEMKZG`ZiU0rr literal 0 HcmV?d00001 diff --git a/textfiles.com/100/anonymit b/textfiles.com/100/anonymit new file mode 100644 index 00000000..cbe180a4 --- /dev/null +++ b/textfiles.com/100/anonymit @@ -0,0 +1,778 @@ +From caf-talk Caf Jun 8 19:52:43 1992 +Newsgroups: comp.society +Subject: Anonymity and privacy on the network +Message-ID: <92083.072152SOCICOM@auvm.american.edu> +Date: 23 Mar 92 12:21:52 GMT +Organization: The American University - University Computing Center +Lines: 759 +Approved: SOCICOM@AUVM + + +Moderator's note: The following article is a lengthy excerpt from a +recent issue of FIDONEWS concerning individual privacy and the use of +aliases or handles in computer-based communications. It was submitted by +a comp.society reader who used a handle; because the excerpt is a cross- +post from another electronic publication, I have taken the liberty of +viewing the use of a handle by sender as a request for privacy and +anonymity similar to the request a newspaper editor might receive in a +letter to the editor. Thus, while reprinting the submission, the name +and address of the sender are "withheld upon request." The article +raises a number of good points; the submission by a reader using a handle +to preserve anonymity makes a point; and the editorial action of +submitting the reader's posting anonymously makes the question current. +What are the implications of using aliases on the net? + +Greg Welsh, moderator, comp.society +Internet: Socicom@american.edu +Bitnet: Socicom@auvm.bitnet + +[begin excerpt] +F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992) + The newsletter of the | + FidoNet BBS community | Published by: + _ | + / \ | "FidoNews" BBS + /|oo \ | (415)-863-2739 + (_| /_) | FidoNet 1:1/1 + _`@/_ \ _ | Internet: + | | \ \\ | fidonews@fidonews.fidonet.org + | (*) | \ )) | + |__U__| / \// | Editors: + _//|| _\ / | Tom Jennings + (_/(_|(____/ | Tim Pozar + (jm) | +----------------------------+--------------------------------------- +Published weekly by and for the Members of the FidoNet international +amateur network. Copyright 1992, Fido Software. All rights reserved. +Duplication and/or distribution permitted for noncommercial purposes +only. For use in other circumstances, please contact FidoNews. + +Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US +Electronic Price: . . . . . . . . . . . . . . . . . . . . . free! + +For more information about FidoNews refer to the end of this file. +-------------------------------------------------------------------- + + +[...some editing...] +====================================================================== + ARTICLES +====================================================================== + + +The Joy of Handles +Mahatma Kane Jeeves +101/138.8 +David Lescohier +101/138.0 + + + + + THE JOY OF HANDLES + ------------------ + or: + EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME + (but have no right to ask) + -------------------------- + + + * * * * * + + +We should never so entirely avoid danger as to appear +irresolute and cowardly. But, at the same time, we should +avoid unnecessarily exposing ourselves to danger, than +which nothing can be more foolish. [Cicero] + + + * * * * * + + + +Do you trust me? + +If you participate in computer conferencing, and you use +your real name, then you'd better. + +"Why?", you ask. "What can you do with my name?" To start +with, given that and your origin line, I can probably look +you up in your local phone book, and find out where you +live. Even if you are unlisted, there are ways to locate +you based on your name. If you own any property, or pay any +utility bills, your address is a matter of public record. +Do you have children in the public schools? It would be +easy to find out. But that's just the beginning. + +Former Chairman of the U.S. Privacy Protection Commission +David F. Linowes, in his book "Privacy in America" (1989), +writes of New York private investigator Irwin Blye: + + "Challenged to prove his contention that, given a little + time and his usual fee, he could learn all about an + individual without even speaking with him, Blye was + presented with a subject -- a New Jersey + newspaperman.... The result was a five-page, single- + spaced, typed report which documented, though not always + accurately, a wide sweep of the journalist's past, and + was detailed to the point of disclosing his father's + income before his retirement." + +Who am I? If I don't post, you might not even know I exist. +I could be on your local Police Department, or an agent +working with the IRS, or some federal law-enforcement +agency. I could be a member of some fanatical hate group, +or criminal organization. I might even be a former Nixon +White-House staffer! + +I could be that pyromaniacal teenager you flamed last +weekend, for posting a step-by-step description of how he +made plastic explosive in his high-school chem lab. He +seemed kind of mad. + +But you're an upstanding citizen; you have nothing to hide. +So why not use your name on the nets? Trust me. There's +nothing to worry about. + +Is there? + + * * * * * + + WHAT'S ALL THIS BROUHAHA? + ------------------------- + + Stupidity is evil waiting to happen. [Clay Bond] + + +Not long ago in Fidonet's BCSNET echo (the Boston Computer +Society's national conference), the following was posted by +the conference moderator to a user calling himself "Captain +Kirk": + + "May we ask dear Captain Kirk that it would be very + polite if you could use your real name in an echomail + conference? This particular message area is shared + with BBS's all across the country and everyone else is + using their real name. It is only common courtesy to + do so in an echomail conference." + +One of us (mkj) responded with a post questioning that +policy. Soon the conference had erupted into a heated +debate! Although mkj had worried that the subject might be +dismissed as trivial, it apparently touched a nerve. It +brought forth debate over issues and perceptions central to +computer communications in general, and it revealed profound +disparities in fundamental values and assumptions among +participants. + +This article is a response to that debate, and to the +prevailing negative attitudes regarding the use of handles. +Handles seem to have a bad reputation. Their use is +strangely unpopular, and frequently forbidden by network +authorities. Many people seem to feel that handles are rude +or dishonest, or that anyone wishing to conceal his or her +identity must be up to no good. It is the primary purpose +of this article to dispel such prejudices. + +Let us make one thing perfectly clear here at the outset: We +do NOT challenge the need or the right of sysops to know the +identities of their users! But we do believe that a sysop +who collects user names has a serious responsibility to +protect that information. This means making sure that no +one has access to the data without a legal warrant, and it +certainly means not pressuring users to broadcast their real +names in widespread public forums such as conferences. + + * * * * * + + SO YOU WANT TO BE A STAR? + ------------------------- + + John Lennon died for our sins. [anonymous] + + +Andy Warhol said that "In the future, everyone will be +famous for fifteen minutes". The computer nets, more than +any other medium, lend credibility to this prediction. A +network conference may span the globe more completely than +even satellite TV, yet be open to anyone who can afford the +simplest computer and modem. Through our participation in +conferencing, each of us becomes, if only briefly, a public +figure of sorts -- often without realizing it, and without +any contemplation of the implications and possible +consequences. + +Brian Reid (reid@decwrl.DEC.COM) conducts and distributes +periodic surveys of Usenet conference readership. His +statistical results for the end of 1991 show that of the +1,459 conferences which currently make up Usenet, more than +fifty percent have over 20,000 readers apiece; the most +popular conferences are each seen by about 200,000 readers! +Mr. Reid's estimate of total Usenet readership is nearly TWO +MILLION people. + +Note that Mr. Reid's numbers are for Usenet only; they do +not include any information on other large public nets such +as RIME (PC-Relaynet), Fido, or dozens of others, nor do +they take into account thousands of private networks which +may have indirect public network connections. The total +number of users with access to public networks is unknown, +but informed estimates range to the tens of millions, and +the number keeps growing at an amazing pace -- in fact, the +rate of growth of this medium may be greater than any other +communications medium in history. + +The special problems and risks which arise when one deals +with a large public audience are something about which most +computer users have little or no experience or +understanding. Until recently, those of us involved in +computer conferencing have comprised a small and rather +elite community. The explosion in network participation is +catching us all a little unprepared. + +Among media professionals and celebrities, on the other +hand, the risks of conducting one's business in front of a +public audience are all too familiar. If the size of one's +audience becomes sufficiently large, one must assume that +examples of virtually every personality type will be +included: police and other agents of various governments, +terrorists, murderers, rapists, religious fanatics, the +mentally ill, robbers and con artists, et al ad infinitum. +It must also be assumed that almost anything you do, no +matter how innocuous, could inspire at least one person, +somewhere, to harbor ill will toward you. + +The near-fatal stabbing of actress Theresa Saldana is a case +in point. As she was walking to her car one morning near her +West Hollywood apartment, a voice behind her asked, "Are you +Theresa Saldana?"; when she turned to answer, a man she had +never seen before pulled out a kitchen knife and stabbed her +repeatedly. + +After her lengthy and painful recovery, she wrote a book on +the experience ("Beyond Survival", 1986). In that book she +wrote: + + + [pg 12] "... Detective Kalas informed me that the + assailant, whom he described as a Scottish drifter, had + fixated upon me after seeing me in films." + + [pg 28] "... it was through my work as an actress that + the attacker had fixated on me. Naturally, this made + me consider getting out of show business ..." + + [pg 34] "For security, I adopted an alias and became + 'Alicia Michaels.' ... during the months that followed + I grew so accustomed to it that, to this day, I still + answer reflexively when someone calls the name Alicia!" + +Or consider the fate of Denver radio talk show host Alan +Berg, who in 1984 died outside his home in a hail of +gunfire. Police believe he was the victim of a local neo- +nazi group who didn't like his politics. + +We are reminded of the murders of John Lennon and Rebecca +Shaffer; the Reagan/Hinckley/Foster incident; and a long +string of other "celebrity attacks" of all sorts, including +such bizarre events as the occupation of David Letterman's +home by a strange woman who claimed to be his wife! There is +probably no one in public life who doesn't receive at least +the occassional threatening letter. + +Of course, ordinary participants in network conferencing may +never attract quite the attention that other types of +celebrities attract. But consider the following, rather less +apocalyptic scenarios: + + -- On Friday night you post a message to a public + conference defending an unpopular or controversial + viewpoint. On Monday morning your biggest client + cancels a major contract. Or you are kept up all + night by repeated telephone calls from someone + demanding that you "stop killing babies"! + + -- You buy your teenage son or daughter a computer and + modem. Sometime later you find your lawn littered + with beer bottles and dug up with tire marks, or + your home vandalized or burglarized. + + -- One day you are nominated to the Supreme Court. Who + are all these strange people on TV claiming to be + your friends? How did that fellow know your position + on abortion? Your taste in GIFs? + +Celebrities and other professional media personalities +accept the risks and sacrifices of notoriety, along with the +benefits, as part of their chosen careers. Should computer +conference participants be expected to do the same? And who +should be making these decisions? + + * * * * * + + OTHER MEDIA + ----------- + + When thou art at Rome, do as they do at Rome [Cervantes] + + +Older media seem to address the problems of privacy very +differently than computer media, at least so far. We are +not aware of ANY medium or publication, apart from computer +conferencing, where amateur or even most professional +participants are required to expose their true names against +their will. Even celebrities frequently use "stage names", +and protect their addresses and phone numbers as best they +can. + +When a medium caters specifically to the general public, +participants are typically given even greater opportunities +to protect their privacy. Television talk shows have been +known to go so far as to employ silhouetting and electronic +alteration of voices to protect the identities of guests, +and audience members who participate are certainly not +required to state their full names before speaking. + +The traditional medium most analogous to computer +conferencing may be talk radio. Like conferencing, talk +radio is a group discussion and debate medium oriented +toward controversy, where emotions can run high. Programs +often center around a specific topic, and are always run by +a "host" whose role seems analogous in many respects to that +of a conference moderator. It is therefore worth noting +that in talk radio generally, policy seems to be that +callers are identified on the air only by their first names +(unless of course they volunteer more). + +Finally, of course, authors have published under "pen names" +since the dawn of publishing, and newspapers and magazines +frequently publish letters to the editor with "name and +address withheld by request" as the signature line. Even +founding fathers Alexander Hamilton, James Madison and John +Jay, in authoring the seminal Federalist Papers in 1787 for +publication in the Letters columns of various New York City +newspapers, concealed their identities behind the now-famous +psuedonym "Publius". + +What would you think if someone called a radio talk show +demanding to know the identity of a previous caller? Such a +demand would undoubtedly be seen as menacing and +inappropriate in that context. Yet that same demand seems +to arise without much challenge each time a handle shows up +in a computer conference. The authors of this article feel +that such demands should always be looked upon as +suspicious, and that it would be beneficial for moderators +to take upon themselves the responsibility of making sure +that besieged handle-users are aware of their right to +refuse such inappropriate demands. + +It is reasonable to assume that privacy policies in +traditional media are the result of hard-won wisdom gained +from long experience. Are we so arrogant that we cannot +learn from others? It is not hard to imagine the sorts of +problems and experiences which shaped these policies in the +old media. Will we have to wait for similar problems to +occur on the computer networks before we learn? + + * * * * * + + PRIVACY AND SURVEILLANCE + ------------------------ + + In an effort to identify people who fail to file tax + returns, the Internal Revenue Service is matching + its files against available lists of names and + addresses of U.S. citizens who have purchased + computers for home use. The IRS continues to seek + out sources for such information. This information + is matched against the IRS master file of taxpayers + to see if those who have not filed can be + identified. + [COMPUTERWORLD, Sept. 1985] + + Date: Thu, 23 May 91 11:58:07 PDT + From: mmm@cup.portal.com + Subject: The RISKS of Posting to the Net + - + I just had an interesting visit from the FBI. It + seems that a posting I made to sci.space several + months ago had filtered through channels, caused the + FBI to open (or re-open) a file on me, and an agent + wanted to interview me, which I did voluntarily... + I then went on to tell him about the controversy + over Uunet, and their role in supplying archives of + Usenet traffic on tape to the FBI... + [RISKS Digest] + + Also frequent are instances where computers are + seized incident to an unrelated arrest. For + example, on February 28, 1991, following an arrest + on charges of rape and battery, the Massachusetts + state and local police seized the suspect's computer + equipment. The suspect reportedly operated a 650- + subscriber bulletin board called "BEN," which is + described as "geared largely to a gay/leather/S&M + crowd." It is not clear what the board's seizure is + supposed to have accomplished, but the board is now + shut down, and the identities and messages of its + users are in the hands of the police. + [CONSTITUTIONAL, LEGAL, AND ETHICAL + CONSIDERATIONS FOR DEALING WITH ELECTRONIC + FILES IN THE AGE OF CYBERSPACE, Harvey A. + Silverglate and Thomas C. Viles] + + +Most of us have been brought up to be grateful for the fact +that we live in a nation where freedom is sacred. In other +countries, we are told as children, people are afraid to +speak their minds for fear they are being watched. Thank +God we live in America! + +It would surprise most of us to learn that America is +currently among the premiere surveillance nations in the +world, but such, sadly, is indeed the case. Our leadership +in technology has helped the U.S. government to amass as +much information on its citizens as almost any other nation +in history, totalitarian or otherwise. And to make matters +worse, a consumer surveillance behemoth has sprung up +consisting of huge private data-collection agencies which +cater to business. + +As Evan Hendricks, editor of "Privacy Times" (a Washington +D.C.-based newsletter) has put it: "You go through life +dropping bits and pieces of information about yourself +everywhere. Most people don't realize there are big vacuum +cleaners out there sucking it all up." [Wall Street +Journal, March 14, 1991]. + +To get an idea of how much of your privacy has already been +lost, consider the bits and pieces of information about +yourself which are already available to investigators, and +how thoroughly someone might come to know you by these clues +alone. + +A person's lifestyle and personality are largely described, +for example, by his or her purchases and expenses; from your +checking account records -- which banks are required by law +to keep and make available to government investigators -- a +substantial portrait of your life will emerge. Credit card +records may reveal much of the same information, and can +also be used to track your movements. (In a recent case, +"missing" Massachusetts State Representative Timothy O'Leary +was tracked by credit-card transactions as he fled across +the country, and his movements were reported on the nightly +news!) + +Then there are your school records, which include IQ and +other test results, comments on your "socialization" by +teachers and others, and may reveal family finances in great +detail. Employment and tax records reveal your present +income, as well as personal comments by employers and co- +workers. Your properties are another public record of your +income and lifestyle, and possibly your social status as +well. Telephone billing records reveal your personal and +business associations in more detail. Insurance records +reveal personal and family health histories and treatments. + +All of this information is commonly accessed by government +and private or corporate investigators. And this list is +far from exhaustive! + +Now consider how easily the computer networks lend +themselves to even further erosions of personal privacy. The +actual contents of our mail and telephone traffic have up to +now been subjected to deliberate scrutiny only under +extraordinary conditions. This built-in safety is due +primarily to the difficulty and expense of conducting +surveillance in these media, which usually requires extended +human intervention. But in the medium of computer +communications, most surveillance can be conducted using +automated monitoring techniques. Tools currently available +make it possible and even cost-effective for government and +other interests to monitor virtually everything which +happens here. + +Why would anyone want to monitor network users? It is well +documented that, throughout the 1960s and 1970s, the FBI and +other agencies of government, in operations such as the +infamous COINTELPRO among others, spent a great deal of time +and effort collecting vast lists of names. As Computer +Underground Digest moderators Jim Thomas and Gordon Meyer +recalled in a recent commentary (CuD #3.42): + + "A 1977 class action suit against the Michigan State + Police learned, through FOIA requests, that state and + federal agents would peruse letters to the editor of + newspapers and collect clippings of those whose politics + they did not like. These news clippings became the basis + of files on those persons that found there way into the + hands of other agencies and employers." + +To get onto one of these government "enemies" lists, you +often needed to do nothing more than telephone an +organization under surveillance, or subscribe to the "wrong" +types of magazines and newspapers. Groups engaged in +political activism, including environmental and women's +rights organizations, were commonly infiltrated. The sort +of investigative reporting which uncovered these lists and +surveillances back in the '60s and '70s is now rare, but +there is little reason to assume that such activities have +ceased or even slowed. In fact, progressive computerization +of local police LEIU activities (Law Enforcement +Intelligence Units, commonly known as "red squads") suggests +that such activities may have greatly increased. + +Within the realm of computer conferencing especially, there +is ample reason to believe that systematic monitoring is +being conducted by government and law-enforcement +organizations, and perhaps by other hostile interests as +well. In a recent issue of Telecom Digest +(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported +on the results of a recent Freedom of Information Act +request for documents from the Secret Service: + + " ... The documents also show that the Secret Service + established a computer database to keep track of + suspected computer hackers. This database contains + records of names, aliases, addresses, phone numbers, + known associates, a list of activities, and various + [conference postings] associated with each individual." + +But the privacy issues which surround computer +communications go far beyond the collection of user lists. +Both government and industry have long pursued the elusive +grail of personality profiling on citizens and consumers. Up +to now, such ambitions have been restrained by the practical +difficulty and expense of collecting and analyzing large +amounts of information on large numbers of citizens. But +computer communications, more than any other technology, +seems to hold out the promise that this unholy grail may +finally be in sight. + +To coin a phrase, never has so much been known by so few +about so many. The information commonly available to +government and industry investi-gators today is sufficient +to make reliable predictions about our personalities, +health, politics, future behavior, our vulnerabilities, +perhaps even about our innermost thoughts and feelings. The +privacy we all take for granted is, in fact, largely an +illusion; it no longer exists in most walks of life. If we +wish to preserve even the most basic minimum of personal +privacy, it seems clear that we need to take far better care +on the networks than we have taken elsewhere. + + * * * * * + + FREEDOM + ------- + + Human beings are the only species with a history. + Whether they also have a future is not so obvious. + The answer will lie in the prospects for popular + movements, with firm roots among all sectors of the + population, dedicated to values that are suppressed + or driven to the margins within the existing social + and political order... + [Noam Chomsky] + + +In your day-to-day social interactions, as you deal with +employers, clients, public officials, friends, acquaintances +and total strangers, how often do you feel you can really +speak freely? How comfortable are you discussing +controversial issues such as religion, taxes, politics, +racism, sexuality, abortion or AIDS, for example? Would you +consider it appropriate or wise to express an honest opinion +on such an issue to your boss, or a client? To your +neighbors? + +Most of us confine such candid discussions to certain +"trusted" social contexts, such as when we are among our +closest friends. But when you post to a network conference, +your boss, your clients, and your neighbors may very well +read what you post -- if they are not on the nets today, +they probably will be soon, as will nearly everyone. + +If we have to consider each post's possible impact on our +social and professional reputations, on our job security and +income, on our family's acceptance and safety in the +community, it could be reckless indeed to express ourselves +freely on the nets. Yet conferences are often geared to +controversy, and inhibitions on the free expression of +opinions can reduce traffic to a trickle, killing off an +important conference topic or distorting a valuable sampling +of public opinion. + +More important still is the role computer networks are +beginning to play in the free and open dissemination of news +and information. Democracy is crippled if dissent and +diversity in the media are compromised; yet even here in the +U.S., where a "free press" is a cherished tradition, the +bulk of all the media is owned by a small (and ever- +shrinking) number of corporations, whose relatively narrow +culture, interests and perspec-tives largely shape the +public perception. + +Computer communication, on the other hand, is by its nature +very difficult to control or shape. Its resources are +scattered; when one BBS goes bust (or is busted!), three +others spring up in its place. The natural resiliency of +computer communications (and other new, decentral-ized +information technologies such as fax, consumer camcorders +and cheap satellite links) is giving rise to a new brand of +global "guerrilla journalism" which includes everyone, and +defies efforts at suppression. + +The power and value of this new journalistic freedom has +recently shown itself during the Gulf War, and throughout +Eastern Europe and the Soviet Union, as well as within the +U.S. Just think of the depth and detail of information +available on the nets regarding the Secret Service's recent +"Operation Sundevil" and associated activities, compared to +the grossly distorted, blatantly propagandistic coverage of +those same activities given to the general public through +the traditional media. + +Historically, established power and wealth have seldom been +disposed to tolerate uncontrolled media, and recent events +in this country and elsewhere show that computer media are +sometimes seen as threats to established interests as well. +To understand the role of handles in this context, it is +useful to note the flurries of anti-handle sentiment which +have arisen in the wake of crackdowns such as Sundevil, or +the Tom Tcimpidis raid in the early 1980s. Although few +charges and fewer convictions have typically resulted from +such operations, one might be tempted to speculate that the +real purposes -- to terrorize the nets and chill freedoms of +speech and assembly thereon -- have been achieved. + +In this way, sysops and moderators become unwitting +accomplices in the supression of freedom on the networks. +When real name requirements are instituted, anyone who fears +retaliation of any sort, by any group, will have to fear +participation in the nets; hence content is effectively +controlled. This consideration becomes especially important +as the nets expand into even more violent and repressive +countries outside the U.S. + +We must decide whether freedom of information and open +public discussion are in fact among the goals of network +conferencing, and if so, whether handles have a role in +achieving these goals. As access to the networks grows, we +have a rare opportunity to frustrate the efforts of +governments and corporations to control the public mind! In +this way above all others, computers may have the potential +to shape the future of all mankind for the better. + + * * * * * + + A CALL TO ACTION + ---------------- + + + The move to electronic communication may be a turning + point that history will remember. Just as in + seventeenth and eighteenth century Great Britain and + America a few tracts and acts set precedents for + print by which we live today, so what we think and do + today may frame the information system for a + substantial period in the future. + [Ithiel de Sola Pool, "Technologies of Freedom", 1983] + + +There was a time when anybody with some gear and a few +batteries could become a radio broadcaster -- no license +required. There was a time when anyone with a sense of +adventure could buy a plane, and maybe get a contract to +carry mail. Those early technological pioneers were +probably unable to imagine the world as it is today, but +their influence is strongly felt in current laws, +regulations and policies with roots in the traditions and +philosophies they founded and shaped. + +Today the new pioneers are knitting the world together with +computers, and the world is changing faster than ever. Law +and ethics are scrambling to keep up. How far will this +growth take us? No one can say for sure. But you don't +need a crystal ball to see that computer communications has +the potential to encompass and surpass all the functionality +of prior media -- print, post, telegraph, telephone, radio +and television -- and more. It seems reasonable to assume +that computer communications will be at least as ubiquitous +and important in the lives of our grandchildren as all the +older media have been in ours. + +It will be a world whose outlines we can now make out only +dimly. But the foundations of that world are being built +today by those of us exploring and homesteading on the +electronic frontier. We need to look hard at what it will +take to survive in the information age. + +In this article we have attempted to show, for one very +narrow issue, what some of the stakes may be in this future- +building game. But the risks associated with exposing your +name in a computer conference are not well defined, and +various people will no doubt assess the importance of these +risks differently. After all, most of us take risks every +day which are probably greater than the risks associated +with conferencing. We drive on the expressway. We eat +sushi. To some people, the risks of conferencing may seem +terrifying; to others, insignificant. + +But let us not get side-tracked into unresolvable arguments +on the matter. The real issue here is not how dangerous +conferencing may or may not be; it is whether you and I will +be able to make our own decisions, and protect ourselves (or +not) as we see fit. The obvious answer is that users must +exercise their collective power to advance their own +interests, and to pressure sysops and moderators to become +more sensitive to user concerns. + +To help in that effort, we would like to recommend the +following guidelines for user action: + + -- Bear in mind John Perry Barlow's observation that + "Liberties are preserved by using them". Let your + sysop know that you would prefer to be using a + handle, and use one wherever you can. + + -- Try to support boards and conferences which allow + handles, and avoid those which don't. + + -- When using a handle, BEHAVE RESPONSIBLY! There will + always be irresponsible users on the nets, and they + will always use handles. It is important for the + rest of us to fight common anti-handle prejudices by + showing that handles are NOT always the mark of an + irresponsible user! + + -- Educate others about the importance of handles (but + NEVER argue or flame anyone about it). + +To sysops and moderators: We ask you to bear in mind that +authority is often used best where it is used least. Grant +users the right to engage in any harmless and responsible +behaviors they choose. Protect your interests in ways which +tread as lightly as possible upon the interests of others. +The liberties you preserve may be your own! + +In building the computer forums of today, we are building +the social fabric of tomorrow. If we wish to preserve the +free and open atmosphere which has made computer networking +a powerful force, while at the same time taking care against +the risks inherent in such a force, handles seem to be a +remarkably harmless, entertaining and effective tool to help +us. Let's not throw that tool away. + +---------------------------------------------------------------------- +[end of excerpt] + + +-- +David Collier-Brown, | davecb@Nexus.YorkU.CA | lethe!dave +72 Abitibi Ave., | +Willowdale, Ontario, | He's so smart he's dumb. +CANADA. 416-223-8968 | -- Joyce Collier-Brown + +From caf-talk Caf Jun 10 00:17:10 1992 + diff --git a/textfiles.com/100/applemaf.hum b/textfiles.com/100/applemaf.hum new file mode 100644 index 00000000..4f8bb680 --- /dev/null +++ b/textfiles.com/100/applemaf.hum @@ -0,0 +1,493 @@ + +No such file + +(>View: THE APPLE MAFIA F STORY/F/THE SA + +******************************************************************************* +******* ******* +******* The Apple Mafia Story ******* +******* ******* +******* As Told To: Red Ghost ******* +******* ******* +******************************************************************************* + +The reason I'm writing this file is to (hopefully) once and for all, clear up +all the rumors, false statements, and just lies, that are going around about +one of the first 3 pirate groups ever. (Untouchables, Apple Mafia, Dirty Dozen) + +I won't get into the other two, because there already is "The Untouchables" +story, and I'm not qualified to make comments about the Dirty Dozen. + +Everything in this file is fact. I grew up in Queens NY (now 718). Where many +of the "original" pirates and phreaks, were from. Many of the readers will +question certain aspects of this file, or my authority to write it. But they +are always more than welcome to go to the sources themselves and find the truth +is what I am writing. + +******************************************************************************* + +To begin with, I'm now 22 and going to college. I have been out of the "wares +world" for the better part of 2 years. What prompted me to write this is a +younger friend of mine, who is now a "pirate" and spends his life calling all +the boards, and getting all the wares (Not making fun of anyone, I went +through the same phase when I started, but it was very different from the +pirates world of today). About a week ago he told me about the "Apple Mafia" +regrouping. I said bullshit. And I was right. He gave me some of the files +on discussions now going on about the "new" "apple mafia" and I must say it's +pretty sad. + +I felt the real story of what went on should be told, so here it is. + +One more thing before I start. I was never in the Apple Mafia, or any of the +other groups mentioned here. I never had that deep an interest in computers +as anything but game machines or better typewriters. But I grew up in close +proximety to many of the people involved, and spent time with them in other +areas besides computers. + +******************************************************************************* + +From the messages posted about the controversy I have seen. I think it might be +best to go through them 1 by 1. So here's the first one: + +(Buffer of msg's. Untouched by me, except the conversion from 40 to 80 cols.) + +******************************************************************************* + +To:The Fake Apple Mafia From:Disk Rigger + +You are definatly not the real Apple Mafia. It was a popular group a while ago. +It incluted Bioc Agent 003, Tuc, Hight Technology, Creative Cracker and a few +others. I will inform them of you losers using there names and you will be +ragged out of your minds. I would recomend you changed your group name or you +will feel the wrath of Bioc! +This is serious and you losers can keep your unoriginal name but You will pay +for it. + + +(Someone's reply.) + + +Disk Digger: +Get a life dude. The Apple Mafia is OVER. BIOC Agent was thrown out of +the Apple Mafia. The final members were Tuc, Lord Digital, Creative +Cracker, High Technology, Big Brother the Phantom, Silicon Scorpion, & +Sherlock Apple. Nobody is going to Feel the wrath of Bioc +(hahahahahhahahahahha). because 1. he quit the phreak/pirate world over a year +ago. 2. if he WAS around he wouldnt give a shit. 3. The old members who are +still around probably care even less. + + +(Someone elses reply.) + + +While the new "apple mafia" (get a life you fuckups. you might as well call +yourselves the Untouchables.) are idiots. +new warez r0dentz who sure as hell weren't around when the REAL apple mafia was +around, are even bigger r0dents. This means YOU disk digger. +Naming yourself after a program used to pack new wherez. get a life you fat +fuckup. And if the people in the apple mafia knew YOU were throwing their names +around on a fucking catfur, YOU are the one they would be mad at. + +FUckup + +******************************************************************************* + +Despite incorrect statements in both parties messeges, this seems like a good +time to point out that Bioc Agent was never in the Apple Mafia to begin with. +The members changed through time, but Bioc was never a member. (More on him at +a later time) The Final members were: (If you doubt this, then boot up any ware +cracked by them in 84-85. Which was the final regrouping of the Mafia) + +The Godfather (Charles). The Phantom (Eric). Creative Cracker (Marc). +High Technology (Craig). Lord Digital (Patrick). Jacque Lafitte (Jack). +The Magnet (Joe). Sherlock Apple (Dave). Silicon Scorpion (Mark). +Data Dragon (Jordon). Big Brother (Andy). & towards the very end: Tuc (Scott). + +Former members who were thrown out or quit: The Parasite, Tylenol Cyanide, +Yosemite Sam, and people I don't remember from CA. + +(More Messages) + +******************************************************************************* + +Number > 7 +Subject> Apple Mafia? (Ha) +Viewer > DISK RIGGER +Posted > MON MAR 17 4:24:17 PM + + +Genius. Are you talking about that +loser group in 213? They are in for it. +If you didnt know already there was +already a group Called Apple Mafia. Too +bad two of 'em were FEDS. + +Hey, Where ANY of you ever on The Old +Sherwood Forest's? [ /, //, /// ]? + + +(Another msg.) + + +Number > 8 +Subject> SHERWOOD FORESTS +Author > CHRONOS +Posted > MON MAR 17 5:03:32 PM + + + +Yeah, I was on // and ///... I never got an answer at / though... Wasn't the +Apple Mafia (later Micro Mafia) running those boards? + +[chronos/KOTBC] + +And didn't they break up before they got busted? I remember something about +them just giving up, cause 2 guys were doing all the work...then they put +Yellowbeard in charge and it was never heard from again... + + +(Another msg.) + + +Number > 13 +Subject> Sherwood Forest +Viewer > WARE BANDIT +Posted > TUE MAR 18 3:43:11 PM + +What two members of The Real Apple +Mafia were feds? Because I knew several +including High tech, and Creative. + +And the reason you neve got an answer +at sherwood forest / was because that +was the old sherwood forest //... High +tech moved from Ny, and after he set it +up at his new place he called it +Sherwood forest //.... Well I have many +old files, and posts saved from the +last grand adventure (that was thier +logo), So if you would like to view +them then just leave me a message on +the underground. + +later, [Ware Bandit] + + +(Another msg.) + + +Number > 14 +Subject> WB.. +Viewer > DISK RIGGER +Posted > TUE MAR 18 4:17:52 PM + + +I think Magnetic Surfer ran it. Yeah I +also have a lot of things saved on +Buffer. They had a LARGE G-File +section. And a TRUELY awesome Elite +sub. + +And some people got the impression that +Creative Cracker was a lazy ass. It is +not true. The board was being runned by +Federal Agents. He just came in to look +at it. + + +(Another msg.) + + +Number > 15 +Subject> SERIOUS? +Author > CHRONOS +Posted > TUE MAR 18 5:44:17 PM + +Sherwood Forests were really being run by Feds? I'd like to know who... they +let it get pretty far before they busted them then... + +[chronos/KOTBC] + + +(Another msg.) + + +Number > 18 +Subject> The forest +Viewer > WARE BANDIT +Posted > WED MAR 19 3:23:11 PM + + +Okay this might clear some things up between some people that might be confused +on the subject. + +Sherwood Forest .... Used to be run by High Tech. About 2-3 years ago. +Sherwood Forest // The later Sherwood forest run by High tech. when he moved. +Sherwood Forest /// Ran by Creative Cracker, a good friend of High tech. + +and no they were not feds, they just got a little carried away with the way +they were running thier boards by letting just about anyone access most of the +phreak sections that they had on-line. The Treasury dept. finally closed them +down along with cryton and some other un-heard of hack boards. + +If you have any questions feel free to ask.. I was going to run thier number 4 +board, but shortly after I was offered the opurtunity they went under... + +******************************************************************************* + +I don't know where these msg's are from, or who these people are. But almost +everything said in them is wrong. + +"I heard 2 guys were doing all the work, so they quit". Whoever said that has +obviously read the 1984 loserlist, because that is a verbatim quote from it. +Not only is it wrong in slandering everyone from Apple Bandit, Hot Rod, and +Wombat/Gonif, to Bioc Agent, Lord Digital and Paul Muad'Dib. But it's written +in a such a ridiculous fashion, that any points the author was trying to make +are lost in the jumble (For those who care it was written by "The Atom"). + +Sherwood Forests (The last grand adventure). + +The FIRST Sherwood Forest was started in 1979 by Magnetic Surfer. The only +people who were on it back then, and still recognized would be Mr. Xerox and +Lord Digital. Other members included Nickie Halflinger, Captain Crunch, +Napoleon Bonaparte, and many others, whose names are probably meaningless to +the people around today. + +There was a 20 page write up on "Hackers", before it was in vogue to write +about them (Before WarGames and the 414 busts), In a 1982 issue of "California" +magazine. Which detailed the bust of Ron Austin, who was at the time of arrest +22 years old and being tried for everything from credit card fraud, to grand +theft. Also included in the article was a write up on Hacker bbs systems he +was on and people he knew. The Sherwood Forest mentioned in that article was +Magnetic Surfer's, not the later ones. + +Sherwood forest was run on a micromodem and 1 disk drive. There were no Cat's, +DOS was at 3.1, and Disk Drives were still a novelty. It went down in 1981 for +whatever reasons, and went back up as a public system with 1200 & a 46 mb hard +drive in 1983. Shortly thereafter it went private and became the Knights of +Shadow Base bbs. During it's final days in 1984, this was the FINAL memberlist: + +SYSTEM OPERATOR <-- Magnetic Surfer. TKOS member +PIT FIEND <-- Local Queens person +LORD DIGITAL <-- Name speaks for itself. Apple Mafia & TKOS member +CRIMINAL ELEMENT <-- Local Queens person, semi notorious for being a ass +STEPHEN FALKEN <-- aka: Jon Gleich of Earth News Central +THE SURGE <-- Unknown. Access from Lord Digital +BIG BROTHER <-- 617 phreak/pirate. Apple Mafia & TKOS member +E.F. HUTTON <-- 312 Phreak/Hacker. TKOS member +THE KNIGHTS OF SHADOW <-- TKOS account +MR. XEROX <-- Name speaks for itself. TKOS founder +CAPTAIN AVATAR <-- aka: Skip Rooney +DISK DEMON <-- Local Queens person +GUEST ACCOUNT <-- A guest account +THE MAGNET <-- Apple Mafia co-founder +THE PROWLER <-- Canadian Phreak, NOT the 612 Prowler +BIOC AGENT 003 <-- Name speaks for itself. TKOS member +QUASI MOTO <-- TKOS member. Ran PloverNet +PHONE FIEND <-- Local Queens person +TUC TUCBBS <-- Tuc. Name speaks for itself. TKOS member +PAUL MUAD'DIB <-- Name speaks for itself. TKOS member +HARDWARE HACKER <-- Local Queens person +TOM TONE <-- Brooklyn person +THE GODFATHER <-- Apple Mafia co-founder +PETER MCIVERS <-- 617 phreak/hacker +THE PHANTOM <-- Apple Mafia member +NICKIE HALFLINGER <-- Hacker, EEE, in his mid 30's +LEX LUTHOR <-- 305 person. Nobody at this time, later founded LOD +UNCLE JOE <-- Have no idea who this is +LESLIE KARASIC <-- Have no idea who this is +THE NECROMANCER <-- TKOS member +DR JIMMY MR JIM <-- TKOS member +THE WIZARD <-- Asshole from 713. Access from Quasi Moto +FRODO HOBBIT <-- Unknown, from 201. Access from Magnetic Surfer +THE DJIN <-- Unknown, from 718. Access from Magnetic Surfer +RICH DOUGAN <-- Unknown, from 718. Access from Magnetic Surfer +APPLE CAT <-- Unknown, from 718. Access from The Phantom +NAPOLEON BONAPARTE <-- TKOS member. Ex of: Inner Circle. ex Sys of SL +CHRISTOPHER BUNN <-- Unknown, from 718. Access from The Phantom +DR. DOOM <-- Have no idea who this is +WILD CAT <-- Have no idea who this is +THE DISKLAIMER <-- Have no idea who this is +MR IBM <-- Have no idea who this is +DRAGON LADY <-- Ex girlfriend of Chesire Catalyst +GAP DRAGON <-- Have no idea who this is +THE MARK <-- Have no idea who this is +CABLE PAIR <-- Fed par excellance` +STOSH FIXER <-- Have no idea who this is +MILO PHONBIL <-- Sysop of Once & Future OSUNY +MR. GUCCI <-- Sysop of AT&T Phone Center +DR. NIBBLEMASTER <-- TKOS member +STAINLESS STEAL RAT <-- TKOS member + +And that's it. Reading the list you have to keep in mind that this was right +after the Inner Circle folded, and almost a year before LOD even began. So many +of the current "Big Names", didn't even own computers yet. + +In 1983 a friend of their's (The 212/718 people), called Creative Cracker put +up a bbs called Sherwood Forest ][. For a while it had an ae line simply known +as "Sherwood Forest" in 201, then in 1984 Sherwood Forest ]I[ went up, run by +High Technology. The original co-sysops on SF ][ were High Tech & Jack The +Ripper. Jack was dropped, High Tech became a full sysop, and the new co-sysops +became: Tuc, Bioc & Big Brother. + +SF ][ started on a disk ][ & a Rana ]I[ disk drive, Micromodem, and a clock. It +went down for 2 weeks in 1984, then came back up with all new software, 20 megs +and 1000's of files. + +SF ]I[ went up with a disk ][ & a Rana ]I[, and that's as big as it ever got. +Creative Cracker was a full sysop. And the co-sysops were Sharp Razor, X-Man, +and Wizard 414. co-sub-ops of maintenence (whatever that is), were: Sherlock +Apple and Silicon Scorpion. All co-sysops and sub-ops were dropped after about +2 months. + +None of the boards except for Magnetic Surfer's could be considered really +impressive by todays standards. Impressive in terms of hardware that is. This +is the time when just about the only hard drive was a corvus, whose prices for +a 6 meg started at $2000 in that time. and a complete Apple-Cat/212 card/exp- +ansion module system, came to over $1000. + +And finally the Apple Mafia, was NEVER the "Micro Mafia", this was yet another +group of losers cashing in on their group name. + +******************************************************************************* + +I could go on about what happens to all the people from SF, but that's not the +purpose of this file, so I'm not going to digress. There are many files out +about many of the members (Lord Digital, Paul Muad'Dib, Mr. Xerox come to mind) +already. And others have made themselves known through LOD as well (Lex). What +this file is about is The Apple Mafia, so I'm not going to get into all that. + +Which brings me to the final part. The Sherwood Forest Busts.... + +I'm saying right now that I don't know what happened, just offering the facts +that I do know about it. + +If (as is said), SF][ was indeed run by the FBI towards the end. Then why did +they let Creative Cracker keep cracking software? It doesn't seem likely they +would have let him continue, did they just not know or what? + +Now if they weren't running SF][, then even more questions come to mind. The +most important one is: why run a board if you truly don't care? CC never +looked at his board, never logged in, the news was updated once every 9 months +by BIOC. + +What's more, if it WAS a trap, then logically the other Apple Mafia members had +to know about it. Or most of them. NONE of them EVER posted anything at all. +With the exception of Silicon Scorpion & Sherlock Apple, who kept posting new +wares. + +It could be that they lost interest in piracy (As is true of Tuc, Lord Digital, +The Phantom, Big Brother, in fact, almost all the members), BUT this still does +not clear up why NONE of them EVER posted ANYWHERE, including the phreak boards +or the elite subs. Now BIOC did post, but if you know BIOC, he always left some +500 line exerpt he typed up from some magazine, or manual (Which is actually +just about all he ever did, much like Lex), nothing that could get him in any +kind of trouble. + +These are the same people whose msg's I've seen buffers of from Sherwood Forest +(Magnetic Surfer's), and World of Cryton, who were posting techniques, systems, +and information, all over. But not ONE msg. from any of them on their supposed +"home base". Pretty weird.... + +The logical conclusion I draw from this is: They knew the board was being +watched at the very least, and didn't want to draw attention to themselves. +In which case they left everyone else to get caught, which is in keeping with +many of the peoples present attitudes. This is also the time during which the +Apple Mafia members who were also in TKOS got a lot of heat from that group +falling apart in a rather spectacular manner. With almost all of them in danger +of being busted for grand theft. + +While SF][ & ]I[ didn't go down until summer of 1985, I would say the Apple +Mafia died almost a year eairlier. I talked to Silicon Scorpion towards the +end of 1984 and as he put it: "What group? I don't even have anyones number +anymore. How am I supposed to be part of a group whose members I can't even +find?" This refers to Creative Cracker whose voice number dissapeared, and +who never answered his feedback, The Phantom, ditto. Big Brother, ditto. Tuc, +ditto. Lord Digital, ditto + he stopped calling any boards. Data Dragon, he's +never home. Who's that leave? not many. + +In the cases of The Phantom, Lord Digital and Tuc, this is understandable. They +were all undoubtedly living out paranoid fantasies of everything they'd ever +done catching up with them, as it did with Mr. Xerox not too far in the past. + +But what happened to everyone else? + +******************************************************************************* + +The Apple Mafia is over. Maybe one day some of the members will regroup just +for fun. It would be interesting. But some loser named Judge Dredd, should go +crawl back where he came from. Or find another name for his lame excuse of a +group. + +******************************************************************************* + +Here is the "flyer" heralding the regrouping of the Mafia in 1984. Verbatim as +typed by The Godfather: + + +BRIEF HISTORY OF THE APPLE MAFIA. + +FOUNDED IN 1980 BY THE GODFATHER AS +A JOKE. REDONE IN 1981 AS A SEMI +SERIOUS GROUP. KICKED SOME ASS IN +'82. BLEW EVERYONE AWAY IN 83, AND +WILL DO MUCH BETTER IN 84. SINCE +THE BEGINNING THE GROUP HAS DIED +OUT AND BEEN REBORN SEVERAL TIMES, +THIS TIME LETS KEEP IT GOING. IS +CURRENTLY THE OLDEST ACTIVE GROUP, +NEXT (OF PEOPLE WHO WOULD STILL BE +AROUND) ARE THE WARE LORDS ('83 I +BEILIEVE) AND THE 1200 CLUB ('83 +ALSO, I THINK). THAT'S IT. + +A FEW GENERAL IDEAS WE WISH TO PROMOTE: + +WHEN YOU GET SOME NEW SOFTWARE CALL +UP AS MANY MAFIA MEMBERS AND GET IT +TO THEM FIRST. + +GET IT POSTED UP ON THE BOARDS AS FAST +AS POSSIBLE, NOW WITH CATS, TIME IS +CRUTIAL. BE SURE TO STICK THE MAFIA +AT THE END. + +DON'T GET THE GROUP INTO FIGHTS, AND +TRY NOT TO BE AN ASSHOLE. + +IT HELPS TO GIVE OUT SOFTWARE TO OTHERS +- WITH THE MOB BEHIND YOU, NO ONE +CAN STOP YOU. + +KEEP IN TOUCH WITH OTHER MEMBERS, IT +SUCKS WHEN YOU LOSE CONTACT, IF YOU +NEED ANY HELP CATCHING UP, JUST ASK +SOMEONE... THEY SHOULD BE WILLING TO +HELP YOU CATCH UP. + +NEW MEMBERSHIPS ARE DECEIDED BY ALL +OF THE MEMBERS, IF YOU KNOW OF SOMEONE +DECENT, TELL EVERYONE ELSE. + +THATS ABOUT IT. + +THE GODFATHER + + + 1986. +The Apple Mafia Story + Red Ghost + +******************************************************************************* +(>============================================================================== + ___ ___ + (___><___) .....And if you enjoyed this TextFile, call The Works, 914's +\ _[]_ TextFile BBS: + \______/ \_____ The Works + _\ ========= + _______________ \>\ (914)-238-8195 24 Hrs. 900+ Textfiles Online + / \ \ 300/1200 Baud, N,8,1 Home of Terror Ferret +/ \___> 10 Megabytes of Storage ANSI Graphics Optional +============================================================================== +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/100/apples.txt b/textfiles.com/100/apples.txt new file mode 100644 index 00000000..3c6edb4d --- /dev/null +++ b/textfiles.com/100/apples.txt @@ -0,0 +1,413 @@ +> 1 +INCREMENT TITLES BY: [DEFAULT IS 10] )=-> + + [01] PIRATE/TRADING + [02] WARES ..... + [03] CALL... + [04] ALL THE K00L STUFF + [05] AE LINE + [06] WHY NOT + [07] THE LIST + [08] APPLE WARES--> + [09] PLEASE TELL OTHERS... + [10] BASICALLY + +[T] [R] [P] [Z] [E] [Q] [?] --->****)=-> + + +->[11] SOME WARES +->[12] THE REAL NEW WARES +->[13] APPLICATIONS AVAILABLE +->[14] NEW WARES FOR YA + +[T] [R] [P] [Z] [E] [Q] [?] --->****)=->R + +(1-14, LAST=0, QUIT=Q) READ MSG.#1 + + +MESSAGE #1: PIRATE/TRADING + + +MSG LEFT BY: HIGH TECHNOLOGY +POSTED: + +*************************************** +* * +* WELCOME TO SHERWOOD FOREST /// * +* * +* THIS SUB-BOARD IS DEDICATED * +* TO APPLE SOFTWARE.... * +* * +* ENJOY THE FOREST * +* * +* )=-> SYSOP <-=( * +*************************************** + +(1-14, LAST=1, QUIT=Q) READ MSG.# + + +MESSAGE #2: WARES ..... + + +MSG LEFT BY: SHERLOCK APPLE +POSTED: + + + + I HAVE EM ALL !!!!!! + + + + + + SHERLOCK APPLE + +(1-14, LAST=2, QUIT=Q) READ MSG.# + + +MESSAGE #3: CALL... + + +MSG LEFT BY: CREATIVE CRACKER +POSTED: + +Call... + + __________________ +_________/Sherwood Forest ][\_________ + \^^^^^^^^=^^^^^^=^^/ + ___[914][359][1517]___ + + + -> 20 Megs. On-Line.. + + -> 31 Sub-Boards.. + + -> 15 G-Sections.. + + + Open 24 Hours - 7 Days a week.. + + Free Validation + + Many Advanced Options... + + Call Today!!!! + + [914][359][1517] + + +(1-14, LAST=3, QUIT=Q) READ MSG.# + + +MESSAGE #4: ALL THE K00L STUFF + + +MSG LEFT BY: THE ROGUE +POSTED: + +Yes, I've got all the new stuff or can get it real quick. +So if you want anything, new or old, just leave E-Mail. + + The Rogue + +Catsend/Disk-fer ONLY!!!! +very few exceptions but.... + + + +(1-14, LAST=4, QUIT=Q) READ MSG.# + + +MESSAGE #5: AE LINE + + +MSG LEFT BY: UNKNOWN PIRATE +POSTED: + +....................................... +. I HAVE BEEN ON VACATION ABOUT 2 MON . +. THS AND I WANT TO PUT MY LINE . +. BACK UP BUT I GO NO SOFTWARE NEW . +. SO ANY BODY WHO WANTS TO HELP ME OU . +. T AND GET MUCH STUFF AFTER I GET BA . +. CK ON MY FEET PLEASE SEND ME E-MAIL . +. . +. LATER . +. . +. . +. BY THE WAY IF YOU WANT TO SEE WHAT . +. NEW SOFTWARE WILL BE AVALIBLE IN TH . +. E NEXT FEW MONTHS READ MY MESSAGE O . +. N SHERWOOD II IT TOOK ME 1/2 HOUR T . +. O TYPE AND I DON'T FEEL LIKE TYPING . +. IT AGAIN MABBE SOME OTHER TIME . +. . +. UNKNOWN PIRATE . +....................................... + +(1-14, LAST=5, QUIT=Q) READ MSG.# + + +MESSAGE #6: WHY NOT + + +MSG LEFT BY: UNKNOWN PIRATE +POSTED: + +WHAT THE HELL HERES A LIST OF ALL THE S +OFTWARE FOR THE NEXT FEW MONTHS. + +ATARI--YAACOV AGAM'S INTERACTIVE PAINTI +NG, FIND IT, THE ABC'S OF CPR, WHEELER +DEALER, SIMULATED COMPUTER,TELLY TURTLE +GREMLINS, TRACK AND FIELD, MARIO BROS. +DONKEY KONG JR., CRYSTAL CASTLES. + +BAEN--WINGS OUT OF SHADOW, BERSERKER +RAIDS, THE ELECTRIC DRAGON,SNAKE,STARCL +ASH II. + +BRODERBUND--CHAMP. LODE RUNNER, CAPTAIN +GOODNIGHT AND THE ISLANDS OF FEAR,MERCY +BIRDS, BANK ST. FILER, BANK STREET MAIL +ER, DAZZLE DRAW, WHERE IN THE WORLD IS +CARMEN SANDIEGO?. + +COLECO--TARZAN,WARGAMES,CABBAGE PATCH +KID ADVENTURES,FORTUNE BIULDER,DR. SUES +S FIX UP AND MIX UP BUILDER. + +DATAMOST--ANKH, MYCHESS II,EARTHY DELIG +TS. + +DATASOFT--JUNO FIRST,MANOCOPTER,MERIDIA +N III,BRUCE LEE,DALLAS,ZAXXON(IIC),LOST +TOMB. + +EPYX--HOT WHEELS,GI JOE,BARBIE,BREAKDAN +CE, ROBOTS OF DAWN. + +FIRST STAR--ROMPER ROOM'S I LOVE MY ALP +BET,SPY VS. SPY,US ADVENTURE. + +INFOCOM--CUTTHROAT + +PENGUIN--XYPHUS + +ORIGIN--CAR WARS, ORGE + +SSI--OBJECTIVE KURST,50 MISSION CRUNCH + +TRAPEZE--LIFESPAN,SETI + +THATS ALL FOR APPLE CHECK OUT COMMODORE +ATARI,IBM AND POSSIBLY SOME OTHERS +ON OTHER ONLINE BOARDS OF VARIOUS BBS'S +UNKNOWN PIRATE. + +(1-14, LAST=6, QUIT=Q) READ MSG.# + + +MESSAGE #7: THE LIST + + +MSG LEFT BY: UNKNOWN PIRATE +POSTED: + +THE LIST I TYPED WAS A LIST OF NEW +GAMES SOON TO BE RELEASED BY THE +MANUFACTERS OR GAMES JUST RELEASE +I DON'T HAVE MOST OF THE SHIT YET. + + +UNKNOWN PIRATE + + +(1-14, LAST=7, QUIT=Q) READ MSG.# + + +MESSAGE #8: APPLE WARES--> + + +MSG LEFT BY: PRO-GRAMMER +POSTED: + +Aybody out there who wants to trade apple wares,i'm all ears.I have a lot, +and can get most other stuff(the littile that i don't have that is).I'm +looking for some good business programs(compilers,assemblers,spreadsheets etc.) +so anybody interested,leave me e-mail. + LATER---> + THE + [PRO-GRAMMER] + + /EX + +(1-14, LAST=8, QUIT=Q) READ MSG.# + + +MESSAGE #9: PLEASE TELL OTHERS... + + +MSG LEFT BY: HIGH TECHNOLOGY +POSTED: + +*************************************** +* * +* PLEASE TELL OTHERS ABOUT * +* SHERWOOD FOREST ///.THE MORE CALLS * +* THAT THIS SYSTEM GETS....THE BETTER * +* THE SYSTEM GETS.... * +* * +* ALSO PLEASE POST ABOUT * +* SHERWOOD FOREST /// ON OTHER BBS'S. * +* * +* THANK-YOU * +* * +* )=-> SYSOP <-=( * +* * +* * +*************************************** + +(1-14, LAST=9, QUIT=Q) READ MSG.# + + +MESSAGE #10: BASICALLY + + +MSG LEFT BY: CAPTAIN CANADA +POSTED: + +CAPTAIN CANADA HERE, + +I HAVE THE BASICALLY NEW STUFF, + +XYPHUS,EXPEDITION AMAZON ETC... + +IF YOU WANT TO TRADE FOR THOSE OR EVEN +OLDER STUFF PLEASE WRITE HERE OR ON +SFII.I REALLY WANT COMPUTER AMBUSH. +CAN ANYONE HELP? + +CAPTAIN CANADA + +(1-14, LAST=10, QUIT=Q) READ MSG.# + + +MESSAGE #11: SOME WARES + + +MSG LEFT BY: KEY MASTER +POSTED: + +OK.THIS IS THE KEYMASTER.I HAVE SOME OF THE +LATEST WARES AND I WILL TRADE WITH ANYONE WHO +HAS CATSEND 3.0 OR DISKFER(CATSEND PREFERED). +IVE HAD EXPEDITION AMAZON AND XYPHUS FOR A LONG +TIME.THEY BOTH SUCK.SKYFOX HAS SOME PRETTY GOOD +GRAPHICS AND ARCHON IS OK.ILL BE GETTING +CHAMP. LODE RUNNER FROM A FRIEND OVER THE WEEKEND. +CAPTAIN GOODKNIGHT ALSO SOMETIME SOON.ANYONE WHO +WANTS A COPY OF CASTLE SMURFENSTEIN OR ANY OF +THE OTHER WARES I NAMED(PLUSMORE) THEN CALL +ME AT THE 4TH REICH 813 734 5312.IM SYSOP,BUT +ID PREFER IF YOU LEFT EMAIL TO THE KEYMASTER +OR THE BEST WOULD BE TO CHAT.TILL THEN.... + + THE KEYMASTER + +(1-14, LAST=11, QUIT=Q) READ MSG.# + + +MESSAGE #12: THE REAL NEW WARES + + +MSG LEFT BY: SHERLOCK APPLE +POSTED: + + +THE REAL NEW WARES: + + +SERENDIPITY +EZ TEXT +RUN FOR IT +HITCH HIKERS GUIDE TO THE GALAXY +BALTIC 1985 +AIR NAV WORKSHOP +CYPRUS ][ (OR WHATEVER ITS CALLED) +DREADNAUGHTS + + + +LATER, + + +SHERLOCK APPLE! +THE APPLE MAFIA +ALL THE WARES!! + +(1-14, LAST=12, QUIT=Q) READ MSG.# + + +MESSAGE #13: APPLICATIONS AVAILABLE + + +MSG LEFT BY: RICH NUTS +POSTED: + +$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ +$ IF YOU'RE INTERESTED IN BUSINESS OR $ +$ UTILITIES SOFTWARE, OR YOU NEED $ +$ PROGRAMMING HELP, THEN THIS IS THE $ +$ RIGHT PLACE. WE HAVE ACCESS TO ALL $ +$ MAJOR BUSINESS PROGRAMS AND OTHER $ +$ TYPES OF APPLICATIONS SOFTWARE, AND $ +$ WE ARE ALSO EXPERT PROGRAMMERS. $ +$ WE DO, HOWEVER, NEED SOME OF THE $ +$ NEWER ENTERTAINMENT PROGRAMS. IF $ +$ YOU'RE WILLING TO TRADE SEND E-MAIL $ +$ EITHER ON THIS BOARD OR SHERWOOD $ +$ FOREST // TO RICH NUTS. $ +$ $ +$ LATER- $ +$ $$$$$$ $ +$ $RICH$ $ +$ $NUTS$ $ +$ $$$$$$ $ +$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ + +(1-14, LAST=13, QUIT=Q) READ MSG.# + + +MESSAGE #14: NEW WARES FOR YA + + +MSG LEFT BY: KEY MASTER +POSTED: + +OK WELL,I JUST GOT SOME NEW WARES IN TONIGHT +AND A LOT MORE ARE COMING TOMORROW.HERE +IS MY CURREBT TRADING LIST: + +SKYFOX +ARCHON (PATCHED VERSION!!) +CASTLE SMURFENSTEIN +BEACH LANDING +XYPHUS +E.T. +CHAMPIONSHIP LODE RUNNER (MEGA-HARD) +AND MORE TOMORROW. + +IF YOU ARE REALLY INTERESTED THEN CALL THE +4TH REICH (813 734 5312) AND LEAVE FEEDBACK OR +E-MAIL TO KEY MASTER.I'LL GET IN TOUCH WITH YOU. +BE SURE TO LEAVE A LISTOF YOUR WARES ALSO. +APPLE CATS ONLY!!I ONLY TRADE IN BELL 202 + + THE KEYMASTER + +(1-14, LAST=14, QUIT=Q) READ MSG.#Q + +[T] [R] [P] [Z] [E] [Q] [?] --->*** + \ No newline at end of file