mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-08 05:16:46 +02:00
update
This commit is contained in:
36
textfiles.com/100/ad.txt
Normal file
36
textfiles.com/100/ad.txt
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
View: RAD AD
|
||||||
|
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||||
|
: Call The Upside Down BBS at (201) 398-2953 300/1200 Baud 10 megabytes :
|
||||||
|
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||||
|
|
||||||
|
System currently operating with ; Other Information
|
||||||
|
--------------------------------- -----------------
|
||||||
|
T-Net BBS Software version 1.6 20 Sub-boards
|
||||||
|
Apple ][ + w/64 K 100+ G-files
|
||||||
|
Apple-Cat ][ Modem On-line Ascii express
|
||||||
|
Apple-Cat 212a Upgrade Card 300 + Users
|
||||||
|
Apple-Cat ][ Firmware Rom Chip 5300 + Calls to date
|
||||||
|
Videx UPPER/lower Case Chip
|
||||||
|
2 Apple ][ Disk Drives
|
||||||
|
'THE SIDER' 10 Megabyte Hard Drive
|
||||||
|
Thunderclock + Call Today ! and get yourself
|
||||||
|
Bell Fone Linez A Password !
|
||||||
|
PSE&G Electric
|
||||||
|
Apple Monitor /// and/or Taxan RGB I
|
||||||
|
Epson Salt (MX-80)
|
||||||
|
2 Maxell Md1 Floppy disks
|
||||||
|
Bambergers deluxe desk topSystem saver fan
|
||||||
|
System saver fan
|
||||||
|
TG Joystick
|
||||||
|
Dayton axial fan CMF (Boosts cooling, all slots are full)
|
||||||
|
|
||||||
|
==============================================================================
|
||||||
|
|
||||||
|
Upside Down AE Line 300/1200 baud apple-cat ][ (201) 625-8929 p/w = run
|
||||||
|
------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
(>
|
||||||
|
|
132
textfiles.com/100/adventur.txt
Normal file
132
textfiles.com/100/adventur.txt
Normal file
@@ -0,0 +1,132 @@
|
|||||||
|
|
||||||
|
***************************************
|
||||||
|
* *
|
||||||
|
* ADVENTURE *
|
||||||
|
* *
|
||||||
|
* Solving it in easy steps *
|
||||||
|
* *
|
||||||
|
* *
|
||||||
|
***************************************
|
||||||
|
FROM: THE ROM RAIDER
|
||||||
|
DR. DIGITAL
|
||||||
|
|
||||||
|
CALL HER MAJESTY'S SECRET SERVICE
|
||||||
|
3 0 3 - 7 5 1 - 2 0 6 3
|
||||||
|
|
||||||
|
|
||||||
|
WARNING: THIS WALK-THRU SHOWS HOW TO SOLVE THIS ADVENTURE STEP BY STEP, THESE
|
||||||
|
ARE NOT HINTS!
|
||||||
|
|
||||||
|
SPECIFIC INSTRUCTIONS ARE ENCLOSED IN QUOTES, SO TYPE WHAT YOU SEE.
|
||||||
|
|
||||||
|
START OFF BY GOING "N". YOU ARE NOW STANDING AT THE END OF A ROAD BEFORE A
|
||||||
|
SMALL BRICK BUILDING. THIS BUILDING IS THE WELLHOUSE, AND IS AN IMPORTANT PART
|
||||||
|
OF THE GAME. THE OBJECT OF THIS GAME IS TO GET THE 15 TREASURES BACK TO THE
|
||||||
|
WELLHOUSE.
|
||||||
|
|
||||||
|
CONTINUE WITH "IN", AND YOU ARE INSIDE THE WELL HOUSE, SO "GET FOOD", "GET
|
||||||
|
LAMP", "GET KEYS", "GET BOTTLE". NOW, THERE ARE THREE MAGIC WORDS YOU NEED TO
|
||||||
|
USE. THEY ARE PLUGH, XYZZY AND PLOVER. TWO OF THESE WORDS ARE USED TO GET TO
|
||||||
|
AND FROM THE WELLHOUSE AND PARTS OF THE CAVE. THE THIRD, PLOVER IS USED TO GET
|
||||||
|
BETWEEN TWO PARTS OF THE CAVE. ANOTHER THING TO REMEMBER IS THAT YOUR LAMP
|
||||||
|
LIGHT IS LIMITED, SO TURN OFF YOUR LAMP WHEN YOU DO NOT NEED IT!
|
||||||
|
|
||||||
|
NOW ON TO THE CAVE. SAY "PLUGH", THEN "LAMP ON", "S", "GET SILVER", "DROP
|
||||||
|
KEYS", "DROP FOOD", "DROP BOTTLE", "N". YOU ARE NOW BACK AT Y2. HERE IS WHERE
|
||||||
|
YOU USE PLOVER. SO SAY "PLOVER", THEN "NE", "GET PYRAMID", "S", "LAMP OFF",
|
||||||
|
"DROP LAMP", "DROP SILVER", "DROP PYRAMID", "GET EMERALD", "W", "DROP EMERALD",
|
||||||
|
"BACK". THE REASON YOU DID ALL OF THAT WAS THAT THE ONLY WAY TO GET THE
|
||||||
|
EMERALD OUT OF THE PLOVER ROOM IS OUT THROUGH THE CRACK, BUT YOU CAN NOT CARRY
|
||||||
|
ANYTHING ELSE WITH YOU.
|
||||||
|
|
||||||
|
NOW "GET LAMP", "GET SILVER", "GET PYRAMID", THEN "PLOVER" AND "PLUGH". YOU
|
||||||
|
ARE NOW BACK IN THE WELLHOUSE, SO DROP OFF YOUR TREASURES SO FAR. TYPE "DROP
|
||||||
|
SILVER", "DROP PYRAMID". BACK TO THE CAVE WITH "XYZZY", AND "LAMP ON", "E",
|
||||||
|
"GET CAGE", "W", "GET ROD", "W", "W","DROP ROD", "GET BIRD", "GET ROD", "W",
|
||||||
|
"D","W", "WAVE ROD". THERE IS NOW A CRYSTAL BRIDGE ACROSS THE CHASM. CONTINUE
|
||||||
|
WITH "DROP ROD", THEN GO "W", "GET DIAMONDS", "E", "E", "S", "GET GOLD", "N",
|
||||||
|
"D". AT THIS POINT YOU WILL SEE A HUGE GREEN SNAKE BARING YOUR WAY. TO BE RID
|
||||||
|
OF THE SNAKE, "DROP BIRD", AND THE SNAKE IS DRIVEN AWAY.
|
||||||
|
|
||||||
|
AT THIS POINT I NEED TO EXPLAIN SOMETHING ELSE. DURING THE COURSE OF THE
|
||||||
|
GAME, A DWARF WILL SEEK YOU OUT AND THROW AN AXE AT YOU. GET THE AXE. THE
|
||||||
|
NEXT TIME YOU SEE THE DWARF, THROW THE AXE AT HIM TO KILL HIM. THIS MAY HAPPEN
|
||||||
|
SEVERAL TIMES, SO JUST KEEP KILLING THE DWARVES. ANOTHER PERSON TO WATCH OUT
|
||||||
|
FOR IS THE PIRATE. HE WILL SHOW UP AT SOME POINT IN THE GAME, AND STEAL
|
||||||
|
WHATEVER TREASURES YOU ARE CARRYING. IF THIS HAPPENS, YOU CAN GET THE
|
||||||
|
TREASURES BACK WHEN YOU FIND HIS TREASURE CHEST.
|
||||||
|
|
||||||
|
CONTINUE WITH "DROP CAGE", "SW", "W". HERE IS A DRAGON SITTING ON A PERSIAN
|
||||||
|
RUG. YOU NEED TO KILL THE DRAGON TO GET THE RUG SO TYPE "KILL DRAGON". THE
|
||||||
|
GAME WILL RESPOND WITH "WITH WHAT? YOUR BARE HANDS?". ANSWER "YES".
|
||||||
|
CONGRATULATIONS, YOU HAVE NOW KILLED THE DRAGON!. SO, "GET RUG", THEN "E",
|
||||||
|
"E", "S", "GET JEWELRY", "N", "W", "GET COINS", "E", "N", "N", "LAMP OFF", AND
|
||||||
|
"PLUGH". YOU ARE AGAIN BACK IN THE WELLHOUSE, SO DROP YOUR TREASURES WITH
|
||||||
|
"DROP DIAMONDS", "DROP GOLD", "DROP RUG", "DROP JEWELRY", "DROP COINS". BACK
|
||||||
|
TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "GET FOOD", "GET KEYS", "GET
|
||||||
|
BOTTLE", "D", "W", "D", "W", "W", THEN SAY "ORIENTAL" TO GET TO THE ORIENTAL
|
||||||
|
ROOM. THEN "GET VASE", "W", "DROP KEYS", "DROP FOOD", "BACK", "N", "W", AND
|
||||||
|
YOU HAVE NOW FOUND THE EMERALD YOU PREVIOUSLY PLACED THERE. SO "GET EMERALD",
|
||||||
|
"NW", "S", "SE", "E", "GET PILLOW". THE PILLOW IS USED TO PLACE THE VASE ON,
|
||||||
|
SO YOU DON'T BREAK IT.
|
||||||
|
|
||||||
|
NOW GO "BACK", "W", "W", "D", "WATER PLANT", "U". THE PLANT IS CRYING FOR MORE
|
||||||
|
WATER, SO NOW YOU NEED TO GO GET IT SOME WATER. BUT BEFORE YOU DO THAT DROP
|
||||||
|
OFF YOUR TREASURES AT THE WELL- HOUSE BY GOING "E", "E", "NE", "E", "U", "E",
|
||||||
|
"U", "N", "LAMP OFF", "PLUGH" AND YOU ARE BACK IN THE WELLHOUSE. SO "DROP
|
||||||
|
PILLOW", "DROP VASE", "DROP EMERALD".
|
||||||
|
|
||||||
|
BACK TO THE CAVE WITH "PLUGH", "LAMP ON", "S", "D", "E", "D", "FILL BOTTLE".
|
||||||
|
YOUR BOTTLE IS NOW FILLED WITH WATER, SO GO "U", "W", "W", "D", "W", "W", "W",
|
||||||
|
"W", "D", "WATER PLANT", "U", "E", "D", "GET OIL", "U", "W", "D". NOW YOU CAN
|
||||||
|
CLIMB THE BEANSTALK SO, "CLIMB", "W", "GET EGGS", "N", "OIL DOOR", "DROP
|
||||||
|
BOTTLE", "N", "GET TRIDENT", "W", "D", "DROP TRIDENT", "GET KEYS", "GET FOOD",
|
||||||
|
"SW", "U". YOU ARE NOW IN FRONT OF A BRIDGE WITH A TROLL GUARDING IT. THE
|
||||||
|
ONLY THING THAT WILL CAUSE THE TROLL TO LEAVE IS TO THROW HIM A TREASURE.
|
||||||
|
THERE IS ONLY ONE TREASURE YOU CAN THROW HIM AND THAT IS THE EGGS. SO "THROW
|
||||||
|
EGGS", THEN "CROSS".
|
||||||
|
|
||||||
|
YOU ARE NOW ACROSS THE CHASM. CONTINUE WITH "NE", "E", "NE", "E", "GET
|
||||||
|
SPICES", "W", "N", (HERE IS THE VOLCANO), "S", "S", "SE", "S", "IN". YOU ARE
|
||||||
|
NOW IN A ROOM WITH A FEROCIOUS BEAR, WHO IS LOCKED UP WITH A GOLD CHAIN. YOU
|
||||||
|
NEED TO GET THE CHAIN, SO "FEED BEAR", THEN "UNLOCK" THE CHAIN, "GET BEAR",
|
||||||
|
"GET CHAIN", "DROP KEYS", AND "OUT". THE BEAR WILL NOW FOLLOW YOU WHEREVER YOU
|
||||||
|
GO. SO GO "U", "U", "W", "W", AND "CROSS". FROM NOWHERE, THE TROLL APPEARS
|
||||||
|
AGAIN. JUST "DROP BEAR", AND THE TROLL WILL DISAPPEAR. NOW "CROSS" THE
|
||||||
|
BRIDGE, THEN GO "SW", "D", "GET TRIDENT", "SE", "SE", "NE", "E", "N". YOU ARE
|
||||||
|
IN THE CLAM ROOM, SO NOW "OPEN CLAM". (IT IS NECESSARY TO HAVE THE TRIDENT
|
||||||
|
BEFORE YOU CAN OPEN THE CLAM). NOW YOU NEED TO GO AFTER THE PEARL SO GO "D",
|
||||||
|
"D", "GET PEARL". THEN "U", "U", "S", "U", "E", "U", "N", "LAMP OFF", AND SAY
|
||||||
|
"PLUGH". THEN "DROP CHAIN", "DROP PEARL", "DROP TRIDENT", "DROP SPICES".
|
||||||
|
|
||||||
|
BACK TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "D", "W", "D", "W", "W",
|
||||||
|
"W", "W", "D", "CLIMB", "W". YOU ARE NOW BACK AT THE SPOT WHERE YOU ORIGINALLY
|
||||||
|
FOUND THE EGGS WHICH YOU THREW TO THE TROLL. THE REASON YOU THREW THE EGGS WAS
|
||||||
|
BECAUSE YOU CAN GET THEM BACK AGAIN! JUST SAY "FEE", "FIE", "FOE", "FOO", AND
|
||||||
|
THEY MAGICALLY APPEAR! SO "GET EGGS", THEN "N", "N", "W", "D", "SE", "SE",
|
||||||
|
"NE", "E", "U", "E", "U", "N", "LAMP OFF", AND "PLUGH". THEN "DROP EGGS".
|
||||||
|
|
||||||
|
NOW ON TO FIND THE LAST TREASURE, THE PIRATE'S CHEST! GO THERE WITH "PLUGH",
|
||||||
|
"LAMP ON", "E", "U", "W", "W", "W", "S", "E", "S", "S", "S", "N", "E", "E",
|
||||||
|
"NW", "GET CHEST", "BACK", "N", "D", "E", "E", "XYZZY". YOU ARE BACK AT THE
|
||||||
|
BUILDING, SO "DROP CHEST". CONGRATULATIONS, YOU NOW HAVE ALL 15 TREASURES!
|
||||||
|
|
||||||
|
AT THIS POINT YOU HAVE ONE MORE THING TO ACCOMPLISH BEFORE YOU GO THE THE GRAND
|
||||||
|
FINALE. SO SAY "XYZZY", THEN GO "W", "W", "W", "D", "D", "N", "D", "W", "D",
|
||||||
|
"E", "GET MAGAZINES". YOUR QUEST IS TO TAKE THE MAGAZINES, AND PLACE THEM JUST
|
||||||
|
INSIDE WITT'S END. THIS ACTION IS OFTEN MISSED BY PEOPLE PLAYING THIS GAME,
|
||||||
|
AND AS A RESULT, THEY DO NOT FINISH THE GAME WITH ALL 350 POINTS AND THE GRAND
|
||||||
|
MASTER STATUS. NOW GO "E", THEN "DROP MAGAZINES", AND "BACK".
|
||||||
|
|
||||||
|
NOW COMES THE EASY PART, JUST WANDER AROUND THESE PASSAGES, AS YOU NOW HAVE
|
||||||
|
SOME TIME TO KILL. THE GAME GIVES YOU A SET NUMBER A MOVES AFTER ALL THE
|
||||||
|
TREASURES ARE IN THE WELLHOUSE, AND THEN YOU ARE TRANSPORTED TO THE GRAND
|
||||||
|
FINALE. THE MESSAGE YOU WILL GET WILL START BY SAYING "THE CAVE IS NOW
|
||||||
|
CLOSED", ECT. AT THIS POINT YOU ARE TRANSPORTED TO THE NORTHEAST END OF AN
|
||||||
|
IMMENSE ROOM. DO THE FOLLOWING: "SW", "GET ROD", "NE", "DROP ROD", "SW".
|
||||||
|
WHAT YOU HAVE DONE IS PLACED A STICK OF DYNAMITE AT THE OPPOSITE END OF THE
|
||||||
|
ROOM. NOW YOU SAY THE MAGIC WORD - "BLAST". YOU HAVE NOW EXPLODED A HOLE IN
|
||||||
|
THE FAR WALL, AND YOU MARCH THROUGH IT INTO THE MAIN OFFICE. YOU HAVE NOW
|
||||||
|
FINISHED THE GAME OF ADVENTURE!
|
||||||
|
|
||||||
|
|
BIN
textfiles.com/100/angela.art
Normal file
BIN
textfiles.com/100/angela.art
Normal file
Binary file not shown.
778
textfiles.com/100/anonymit
Normal file
778
textfiles.com/100/anonymit
Normal file
@@ -0,0 +1,778 @@
|
|||||||
|
From caf-talk Caf Jun 8 19:52:43 1992
|
||||||
|
Newsgroups: comp.society
|
||||||
|
Subject: Anonymity and privacy on the network
|
||||||
|
Message-ID: <92083.072152SOCICOM@auvm.american.edu>
|
||||||
|
Date: 23 Mar 92 12:21:52 GMT
|
||||||
|
Organization: The American University - University Computing Center
|
||||||
|
Lines: 759
|
||||||
|
Approved: SOCICOM@AUVM
|
||||||
|
|
||||||
|
|
||||||
|
Moderator's note: The following article is a lengthy excerpt from a
|
||||||
|
recent issue of FIDONEWS concerning individual privacy and the use of
|
||||||
|
aliases or handles in computer-based communications. It was submitted by
|
||||||
|
a comp.society reader who used a handle; because the excerpt is a cross-
|
||||||
|
post from another electronic publication, I have taken the liberty of
|
||||||
|
viewing the use of a handle by sender as a request for privacy and
|
||||||
|
anonymity similar to the request a newspaper editor might receive in a
|
||||||
|
letter to the editor. Thus, while reprinting the submission, the name
|
||||||
|
and address of the sender are "withheld upon request." The article
|
||||||
|
raises a number of good points; the submission by a reader using a handle
|
||||||
|
to preserve anonymity makes a point; and the editorial action of
|
||||||
|
submitting the reader's posting anonymously makes the question current.
|
||||||
|
What are the implications of using aliases on the net?
|
||||||
|
|
||||||
|
Greg Welsh, moderator, comp.society
|
||||||
|
Internet: Socicom@american.edu
|
||||||
|
Bitnet: Socicom@auvm.bitnet
|
||||||
|
|
||||||
|
[begin excerpt]
|
||||||
|
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
|
||||||
|
The newsletter of the |
|
||||||
|
FidoNet BBS community | Published by:
|
||||||
|
_ |
|
||||||
|
/ \ | "FidoNews" BBS
|
||||||
|
/|oo \ | (415)-863-2739
|
||||||
|
(_| /_) | FidoNet 1:1/1
|
||||||
|
_`@/_ \ _ | Internet:
|
||||||
|
| | \ \\ | fidonews@fidonews.fidonet.org
|
||||||
|
| (*) | \ )) |
|
||||||
|
|__U__| / \// | Editors:
|
||||||
|
_//|| _\ / | Tom Jennings
|
||||||
|
(_/(_|(____/ | Tim Pozar
|
||||||
|
(jm) |
|
||||||
|
----------------------------+---------------------------------------
|
||||||
|
Published weekly by and for the Members of the FidoNet international
|
||||||
|
amateur network. Copyright 1992, Fido Software. All rights reserved.
|
||||||
|
Duplication and/or distribution permitted for noncommercial purposes
|
||||||
|
only. For use in other circumstances, please contact FidoNews.
|
||||||
|
|
||||||
|
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
|
||||||
|
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
|
||||||
|
|
||||||
|
For more information about FidoNews refer to the end of this file.
|
||||||
|
--------------------------------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
[...some editing...]
|
||||||
|
======================================================================
|
||||||
|
ARTICLES
|
||||||
|
======================================================================
|
||||||
|
|
||||||
|
|
||||||
|
The Joy of Handles
|
||||||
|
Mahatma Kane Jeeves
|
||||||
|
101/138.8
|
||||||
|
David Lescohier
|
||||||
|
101/138.0
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
THE JOY OF HANDLES
|
||||||
|
------------------
|
||||||
|
or:
|
||||||
|
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
|
||||||
|
(but have no right to ask)
|
||||||
|
--------------------------
|
||||||
|
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
|
||||||
|
We should never so entirely avoid danger as to appear
|
||||||
|
irresolute and cowardly. But, at the same time, we should
|
||||||
|
avoid unnecessarily exposing ourselves to danger, than
|
||||||
|
which nothing can be more foolish. [Cicero]
|
||||||
|
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Do you trust me?
|
||||||
|
|
||||||
|
If you participate in computer conferencing, and you use
|
||||||
|
your real name, then you'd better.
|
||||||
|
|
||||||
|
"Why?", you ask. "What can you do with my name?" To start
|
||||||
|
with, given that and your origin line, I can probably look
|
||||||
|
you up in your local phone book, and find out where you
|
||||||
|
live. Even if you are unlisted, there are ways to locate
|
||||||
|
you based on your name. If you own any property, or pay any
|
||||||
|
utility bills, your address is a matter of public record.
|
||||||
|
Do you have children in the public schools? It would be
|
||||||
|
easy to find out. But that's just the beginning.
|
||||||
|
|
||||||
|
Former Chairman of the U.S. Privacy Protection Commission
|
||||||
|
David F. Linowes, in his book "Privacy in America" (1989),
|
||||||
|
writes of New York private investigator Irwin Blye:
|
||||||
|
|
||||||
|
"Challenged to prove his contention that, given a little
|
||||||
|
time and his usual fee, he could learn all about an
|
||||||
|
individual without even speaking with him, Blye was
|
||||||
|
presented with a subject -- a New Jersey
|
||||||
|
newspaperman.... The result was a five-page, single-
|
||||||
|
spaced, typed report which documented, though not always
|
||||||
|
accurately, a wide sweep of the journalist's past, and
|
||||||
|
was detailed to the point of disclosing his father's
|
||||||
|
income before his retirement."
|
||||||
|
|
||||||
|
Who am I? If I don't post, you might not even know I exist.
|
||||||
|
I could be on your local Police Department, or an agent
|
||||||
|
working with the IRS, or some federal law-enforcement
|
||||||
|
agency. I could be a member of some fanatical hate group,
|
||||||
|
or criminal organization. I might even be a former Nixon
|
||||||
|
White-House staffer!
|
||||||
|
|
||||||
|
I could be that pyromaniacal teenager you flamed last
|
||||||
|
weekend, for posting a step-by-step description of how he
|
||||||
|
made plastic explosive in his high-school chem lab. He
|
||||||
|
seemed kind of mad.
|
||||||
|
|
||||||
|
But you're an upstanding citizen; you have nothing to hide.
|
||||||
|
So why not use your name on the nets? Trust me. There's
|
||||||
|
nothing to worry about.
|
||||||
|
|
||||||
|
Is there?
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
WHAT'S ALL THIS BROUHAHA?
|
||||||
|
-------------------------
|
||||||
|
|
||||||
|
Stupidity is evil waiting to happen. [Clay Bond]
|
||||||
|
|
||||||
|
|
||||||
|
Not long ago in Fidonet's BCSNET echo (the Boston Computer
|
||||||
|
Society's national conference), the following was posted by
|
||||||
|
the conference moderator to a user calling himself "Captain
|
||||||
|
Kirk":
|
||||||
|
|
||||||
|
"May we ask dear Captain Kirk that it would be very
|
||||||
|
polite if you could use your real name in an echomail
|
||||||
|
conference? This particular message area is shared
|
||||||
|
with BBS's all across the country and everyone else is
|
||||||
|
using their real name. It is only common courtesy to
|
||||||
|
do so in an echomail conference."
|
||||||
|
|
||||||
|
One of us (mkj) responded with a post questioning that
|
||||||
|
policy. Soon the conference had erupted into a heated
|
||||||
|
debate! Although mkj had worried that the subject might be
|
||||||
|
dismissed as trivial, it apparently touched a nerve. It
|
||||||
|
brought forth debate over issues and perceptions central to
|
||||||
|
computer communications in general, and it revealed profound
|
||||||
|
disparities in fundamental values and assumptions among
|
||||||
|
participants.
|
||||||
|
|
||||||
|
This article is a response to that debate, and to the
|
||||||
|
prevailing negative attitudes regarding the use of handles.
|
||||||
|
Handles seem to have a bad reputation. Their use is
|
||||||
|
strangely unpopular, and frequently forbidden by network
|
||||||
|
authorities. Many people seem to feel that handles are rude
|
||||||
|
or dishonest, or that anyone wishing to conceal his or her
|
||||||
|
identity must be up to no good. It is the primary purpose
|
||||||
|
of this article to dispel such prejudices.
|
||||||
|
|
||||||
|
Let us make one thing perfectly clear here at the outset: We
|
||||||
|
do NOT challenge the need or the right of sysops to know the
|
||||||
|
identities of their users! But we do believe that a sysop
|
||||||
|
who collects user names has a serious responsibility to
|
||||||
|
protect that information. This means making sure that no
|
||||||
|
one has access to the data without a legal warrant, and it
|
||||||
|
certainly means not pressuring users to broadcast their real
|
||||||
|
names in widespread public forums such as conferences.
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
SO YOU WANT TO BE A STAR?
|
||||||
|
-------------------------
|
||||||
|
|
||||||
|
John Lennon died for our sins. [anonymous]
|
||||||
|
|
||||||
|
|
||||||
|
Andy Warhol said that "In the future, everyone will be
|
||||||
|
famous for fifteen minutes". The computer nets, more than
|
||||||
|
any other medium, lend credibility to this prediction. A
|
||||||
|
network conference may span the globe more completely than
|
||||||
|
even satellite TV, yet be open to anyone who can afford the
|
||||||
|
simplest computer and modem. Through our participation in
|
||||||
|
conferencing, each of us becomes, if only briefly, a public
|
||||||
|
figure of sorts -- often without realizing it, and without
|
||||||
|
any contemplation of the implications and possible
|
||||||
|
consequences.
|
||||||
|
|
||||||
|
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
|
||||||
|
periodic surveys of Usenet conference readership. His
|
||||||
|
statistical results for the end of 1991 show that of the
|
||||||
|
1,459 conferences which currently make up Usenet, more than
|
||||||
|
fifty percent have over 20,000 readers apiece; the most
|
||||||
|
popular conferences are each seen by about 200,000 readers!
|
||||||
|
Mr. Reid's estimate of total Usenet readership is nearly TWO
|
||||||
|
MILLION people.
|
||||||
|
|
||||||
|
Note that Mr. Reid's numbers are for Usenet only; they do
|
||||||
|
not include any information on other large public nets such
|
||||||
|
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
|
||||||
|
they take into account thousands of private networks which
|
||||||
|
may have indirect public network connections. The total
|
||||||
|
number of users with access to public networks is unknown,
|
||||||
|
but informed estimates range to the tens of millions, and
|
||||||
|
the number keeps growing at an amazing pace -- in fact, the
|
||||||
|
rate of growth of this medium may be greater than any other
|
||||||
|
communications medium in history.
|
||||||
|
|
||||||
|
The special problems and risks which arise when one deals
|
||||||
|
with a large public audience are something about which most
|
||||||
|
computer users have little or no experience or
|
||||||
|
understanding. Until recently, those of us involved in
|
||||||
|
computer conferencing have comprised a small and rather
|
||||||
|
elite community. The explosion in network participation is
|
||||||
|
catching us all a little unprepared.
|
||||||
|
|
||||||
|
Among media professionals and celebrities, on the other
|
||||||
|
hand, the risks of conducting one's business in front of a
|
||||||
|
public audience are all too familiar. If the size of one's
|
||||||
|
audience becomes sufficiently large, one must assume that
|
||||||
|
examples of virtually every personality type will be
|
||||||
|
included: police and other agents of various governments,
|
||||||
|
terrorists, murderers, rapists, religious fanatics, the
|
||||||
|
mentally ill, robbers and con artists, et al ad infinitum.
|
||||||
|
It must also be assumed that almost anything you do, no
|
||||||
|
matter how innocuous, could inspire at least one person,
|
||||||
|
somewhere, to harbor ill will toward you.
|
||||||
|
|
||||||
|
The near-fatal stabbing of actress Theresa Saldana is a case
|
||||||
|
in point. As she was walking to her car one morning near her
|
||||||
|
West Hollywood apartment, a voice behind her asked, "Are you
|
||||||
|
Theresa Saldana?"; when she turned to answer, a man she had
|
||||||
|
never seen before pulled out a kitchen knife and stabbed her
|
||||||
|
repeatedly.
|
||||||
|
|
||||||
|
After her lengthy and painful recovery, she wrote a book on
|
||||||
|
the experience ("Beyond Survival", 1986). In that book she
|
||||||
|
wrote:
|
||||||
|
|
||||||
|
|
||||||
|
[pg 12] "... Detective Kalas informed me that the
|
||||||
|
assailant, whom he described as a Scottish drifter, had
|
||||||
|
fixated upon me after seeing me in films."
|
||||||
|
|
||||||
|
[pg 28] "... it was through my work as an actress that
|
||||||
|
the attacker had fixated on me. Naturally, this made
|
||||||
|
me consider getting out of show business ..."
|
||||||
|
|
||||||
|
[pg 34] "For security, I adopted an alias and became
|
||||||
|
'Alicia Michaels.' ... during the months that followed
|
||||||
|
I grew so accustomed to it that, to this day, I still
|
||||||
|
answer reflexively when someone calls the name Alicia!"
|
||||||
|
|
||||||
|
Or consider the fate of Denver radio talk show host Alan
|
||||||
|
Berg, who in 1984 died outside his home in a hail of
|
||||||
|
gunfire. Police believe he was the victim of a local neo-
|
||||||
|
nazi group who didn't like his politics.
|
||||||
|
|
||||||
|
We are reminded of the murders of John Lennon and Rebecca
|
||||||
|
Shaffer; the Reagan/Hinckley/Foster incident; and a long
|
||||||
|
string of other "celebrity attacks" of all sorts, including
|
||||||
|
such bizarre events as the occupation of David Letterman's
|
||||||
|
home by a strange woman who claimed to be his wife! There is
|
||||||
|
probably no one in public life who doesn't receive at least
|
||||||
|
the occassional threatening letter.
|
||||||
|
|
||||||
|
Of course, ordinary participants in network conferencing may
|
||||||
|
never attract quite the attention that other types of
|
||||||
|
celebrities attract. But consider the following, rather less
|
||||||
|
apocalyptic scenarios:
|
||||||
|
|
||||||
|
-- On Friday night you post a message to a public
|
||||||
|
conference defending an unpopular or controversial
|
||||||
|
viewpoint. On Monday morning your biggest client
|
||||||
|
cancels a major contract. Or you are kept up all
|
||||||
|
night by repeated telephone calls from someone
|
||||||
|
demanding that you "stop killing babies"!
|
||||||
|
|
||||||
|
-- You buy your teenage son or daughter a computer and
|
||||||
|
modem. Sometime later you find your lawn littered
|
||||||
|
with beer bottles and dug up with tire marks, or
|
||||||
|
your home vandalized or burglarized.
|
||||||
|
|
||||||
|
-- One day you are nominated to the Supreme Court. Who
|
||||||
|
are all these strange people on TV claiming to be
|
||||||
|
your friends? How did that fellow know your position
|
||||||
|
on abortion? Your taste in GIFs?
|
||||||
|
|
||||||
|
Celebrities and other professional media personalities
|
||||||
|
accept the risks and sacrifices of notoriety, along with the
|
||||||
|
benefits, as part of their chosen careers. Should computer
|
||||||
|
conference participants be expected to do the same? And who
|
||||||
|
should be making these decisions?
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
OTHER MEDIA
|
||||||
|
-----------
|
||||||
|
|
||||||
|
When thou art at Rome, do as they do at Rome [Cervantes]
|
||||||
|
|
||||||
|
|
||||||
|
Older media seem to address the problems of privacy very
|
||||||
|
differently than computer media, at least so far. We are
|
||||||
|
not aware of ANY medium or publication, apart from computer
|
||||||
|
conferencing, where amateur or even most professional
|
||||||
|
participants are required to expose their true names against
|
||||||
|
their will. Even celebrities frequently use "stage names",
|
||||||
|
and protect their addresses and phone numbers as best they
|
||||||
|
can.
|
||||||
|
|
||||||
|
When a medium caters specifically to the general public,
|
||||||
|
participants are typically given even greater opportunities
|
||||||
|
to protect their privacy. Television talk shows have been
|
||||||
|
known to go so far as to employ silhouetting and electronic
|
||||||
|
alteration of voices to protect the identities of guests,
|
||||||
|
and audience members who participate are certainly not
|
||||||
|
required to state their full names before speaking.
|
||||||
|
|
||||||
|
The traditional medium most analogous to computer
|
||||||
|
conferencing may be talk radio. Like conferencing, talk
|
||||||
|
radio is a group discussion and debate medium oriented
|
||||||
|
toward controversy, where emotions can run high. Programs
|
||||||
|
often center around a specific topic, and are always run by
|
||||||
|
a "host" whose role seems analogous in many respects to that
|
||||||
|
of a conference moderator. It is therefore worth noting
|
||||||
|
that in talk radio generally, policy seems to be that
|
||||||
|
callers are identified on the air only by their first names
|
||||||
|
(unless of course they volunteer more).
|
||||||
|
|
||||||
|
Finally, of course, authors have published under "pen names"
|
||||||
|
since the dawn of publishing, and newspapers and magazines
|
||||||
|
frequently publish letters to the editor with "name and
|
||||||
|
address withheld by request" as the signature line. Even
|
||||||
|
founding fathers Alexander Hamilton, James Madison and John
|
||||||
|
Jay, in authoring the seminal Federalist Papers in 1787 for
|
||||||
|
publication in the Letters columns of various New York City
|
||||||
|
newspapers, concealed their identities behind the now-famous
|
||||||
|
psuedonym "Publius".
|
||||||
|
|
||||||
|
What would you think if someone called a radio talk show
|
||||||
|
demanding to know the identity of a previous caller? Such a
|
||||||
|
demand would undoubtedly be seen as menacing and
|
||||||
|
inappropriate in that context. Yet that same demand seems
|
||||||
|
to arise without much challenge each time a handle shows up
|
||||||
|
in a computer conference. The authors of this article feel
|
||||||
|
that such demands should always be looked upon as
|
||||||
|
suspicious, and that it would be beneficial for moderators
|
||||||
|
to take upon themselves the responsibility of making sure
|
||||||
|
that besieged handle-users are aware of their right to
|
||||||
|
refuse such inappropriate demands.
|
||||||
|
|
||||||
|
It is reasonable to assume that privacy policies in
|
||||||
|
traditional media are the result of hard-won wisdom gained
|
||||||
|
from long experience. Are we so arrogant that we cannot
|
||||||
|
learn from others? It is not hard to imagine the sorts of
|
||||||
|
problems and experiences which shaped these policies in the
|
||||||
|
old media. Will we have to wait for similar problems to
|
||||||
|
occur on the computer networks before we learn?
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
PRIVACY AND SURVEILLANCE
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
In an effort to identify people who fail to file tax
|
||||||
|
returns, the Internal Revenue Service is matching
|
||||||
|
its files against available lists of names and
|
||||||
|
addresses of U.S. citizens who have purchased
|
||||||
|
computers for home use. The IRS continues to seek
|
||||||
|
out sources for such information. This information
|
||||||
|
is matched against the IRS master file of taxpayers
|
||||||
|
to see if those who have not filed can be
|
||||||
|
identified.
|
||||||
|
[COMPUTERWORLD, Sept. 1985]
|
||||||
|
|
||||||
|
Date: Thu, 23 May 91 11:58:07 PDT
|
||||||
|
From: mmm@cup.portal.com
|
||||||
|
Subject: The RISKS of Posting to the Net
|
||||||
|
-
|
||||||
|
I just had an interesting visit from the FBI. It
|
||||||
|
seems that a posting I made to sci.space several
|
||||||
|
months ago had filtered through channels, caused the
|
||||||
|
FBI to open (or re-open) a file on me, and an agent
|
||||||
|
wanted to interview me, which I did voluntarily...
|
||||||
|
I then went on to tell him about the controversy
|
||||||
|
over Uunet, and their role in supplying archives of
|
||||||
|
Usenet traffic on tape to the FBI...
|
||||||
|
[RISKS Digest]
|
||||||
|
|
||||||
|
Also frequent are instances where computers are
|
||||||
|
seized incident to an unrelated arrest. For
|
||||||
|
example, on February 28, 1991, following an arrest
|
||||||
|
on charges of rape and battery, the Massachusetts
|
||||||
|
state and local police seized the suspect's computer
|
||||||
|
equipment. The suspect reportedly operated a 650-
|
||||||
|
subscriber bulletin board called "BEN," which is
|
||||||
|
described as "geared largely to a gay/leather/S&M
|
||||||
|
crowd." It is not clear what the board's seizure is
|
||||||
|
supposed to have accomplished, but the board is now
|
||||||
|
shut down, and the identities and messages of its
|
||||||
|
users are in the hands of the police.
|
||||||
|
[CONSTITUTIONAL, LEGAL, AND ETHICAL
|
||||||
|
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
|
||||||
|
FILES IN THE AGE OF CYBERSPACE, Harvey A.
|
||||||
|
Silverglate and Thomas C. Viles]
|
||||||
|
|
||||||
|
|
||||||
|
Most of us have been brought up to be grateful for the fact
|
||||||
|
that we live in a nation where freedom is sacred. In other
|
||||||
|
countries, we are told as children, people are afraid to
|
||||||
|
speak their minds for fear they are being watched. Thank
|
||||||
|
God we live in America!
|
||||||
|
|
||||||
|
It would surprise most of us to learn that America is
|
||||||
|
currently among the premiere surveillance nations in the
|
||||||
|
world, but such, sadly, is indeed the case. Our leadership
|
||||||
|
in technology has helped the U.S. government to amass as
|
||||||
|
much information on its citizens as almost any other nation
|
||||||
|
in history, totalitarian or otherwise. And to make matters
|
||||||
|
worse, a consumer surveillance behemoth has sprung up
|
||||||
|
consisting of huge private data-collection agencies which
|
||||||
|
cater to business.
|
||||||
|
|
||||||
|
As Evan Hendricks, editor of "Privacy Times" (a Washington
|
||||||
|
D.C.-based newsletter) has put it: "You go through life
|
||||||
|
dropping bits and pieces of information about yourself
|
||||||
|
everywhere. Most people don't realize there are big vacuum
|
||||||
|
cleaners out there sucking it all up." [Wall Street
|
||||||
|
Journal, March 14, 1991].
|
||||||
|
|
||||||
|
To get an idea of how much of your privacy has already been
|
||||||
|
lost, consider the bits and pieces of information about
|
||||||
|
yourself which are already available to investigators, and
|
||||||
|
how thoroughly someone might come to know you by these clues
|
||||||
|
alone.
|
||||||
|
|
||||||
|
A person's lifestyle and personality are largely described,
|
||||||
|
for example, by his or her purchases and expenses; from your
|
||||||
|
checking account records -- which banks are required by law
|
||||||
|
to keep and make available to government investigators -- a
|
||||||
|
substantial portrait of your life will emerge. Credit card
|
||||||
|
records may reveal much of the same information, and can
|
||||||
|
also be used to track your movements. (In a recent case,
|
||||||
|
"missing" Massachusetts State Representative Timothy O'Leary
|
||||||
|
was tracked by credit-card transactions as he fled across
|
||||||
|
the country, and his movements were reported on the nightly
|
||||||
|
news!)
|
||||||
|
|
||||||
|
Then there are your school records, which include IQ and
|
||||||
|
other test results, comments on your "socialization" by
|
||||||
|
teachers and others, and may reveal family finances in great
|
||||||
|
detail. Employment and tax records reveal your present
|
||||||
|
income, as well as personal comments by employers and co-
|
||||||
|
workers. Your properties are another public record of your
|
||||||
|
income and lifestyle, and possibly your social status as
|
||||||
|
well. Telephone billing records reveal your personal and
|
||||||
|
business associations in more detail. Insurance records
|
||||||
|
reveal personal and family health histories and treatments.
|
||||||
|
|
||||||
|
All of this information is commonly accessed by government
|
||||||
|
and private or corporate investigators. And this list is
|
||||||
|
far from exhaustive!
|
||||||
|
|
||||||
|
Now consider how easily the computer networks lend
|
||||||
|
themselves to even further erosions of personal privacy. The
|
||||||
|
actual contents of our mail and telephone traffic have up to
|
||||||
|
now been subjected to deliberate scrutiny only under
|
||||||
|
extraordinary conditions. This built-in safety is due
|
||||||
|
primarily to the difficulty and expense of conducting
|
||||||
|
surveillance in these media, which usually requires extended
|
||||||
|
human intervention. But in the medium of computer
|
||||||
|
communications, most surveillance can be conducted using
|
||||||
|
automated monitoring techniques. Tools currently available
|
||||||
|
make it possible and even cost-effective for government and
|
||||||
|
other interests to monitor virtually everything which
|
||||||
|
happens here.
|
||||||
|
|
||||||
|
Why would anyone want to monitor network users? It is well
|
||||||
|
documented that, throughout the 1960s and 1970s, the FBI and
|
||||||
|
other agencies of government, in operations such as the
|
||||||
|
infamous COINTELPRO among others, spent a great deal of time
|
||||||
|
and effort collecting vast lists of names. As Computer
|
||||||
|
Underground Digest moderators Jim Thomas and Gordon Meyer
|
||||||
|
recalled in a recent commentary (CuD #3.42):
|
||||||
|
|
||||||
|
"A 1977 class action suit against the Michigan State
|
||||||
|
Police learned, through FOIA requests, that state and
|
||||||
|
federal agents would peruse letters to the editor of
|
||||||
|
newspapers and collect clippings of those whose politics
|
||||||
|
they did not like. These news clippings became the basis
|
||||||
|
of files on those persons that found there way into the
|
||||||
|
hands of other agencies and employers."
|
||||||
|
|
||||||
|
To get onto one of these government "enemies" lists, you
|
||||||
|
often needed to do nothing more than telephone an
|
||||||
|
organization under surveillance, or subscribe to the "wrong"
|
||||||
|
types of magazines and newspapers. Groups engaged in
|
||||||
|
political activism, including environmental and women's
|
||||||
|
rights organizations, were commonly infiltrated. The sort
|
||||||
|
of investigative reporting which uncovered these lists and
|
||||||
|
surveillances back in the '60s and '70s is now rare, but
|
||||||
|
there is little reason to assume that such activities have
|
||||||
|
ceased or even slowed. In fact, progressive computerization
|
||||||
|
of local police LEIU activities (Law Enforcement
|
||||||
|
Intelligence Units, commonly known as "red squads") suggests
|
||||||
|
that such activities may have greatly increased.
|
||||||
|
|
||||||
|
Within the realm of computer conferencing especially, there
|
||||||
|
is ample reason to believe that systematic monitoring is
|
||||||
|
being conducted by government and law-enforcement
|
||||||
|
organizations, and perhaps by other hostile interests as
|
||||||
|
well. In a recent issue of Telecom Digest
|
||||||
|
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
|
||||||
|
on the results of a recent Freedom of Information Act
|
||||||
|
request for documents from the Secret Service:
|
||||||
|
|
||||||
|
" ... The documents also show that the Secret Service
|
||||||
|
established a computer database to keep track of
|
||||||
|
suspected computer hackers. This database contains
|
||||||
|
records of names, aliases, addresses, phone numbers,
|
||||||
|
known associates, a list of activities, and various
|
||||||
|
[conference postings] associated with each individual."
|
||||||
|
|
||||||
|
But the privacy issues which surround computer
|
||||||
|
communications go far beyond the collection of user lists.
|
||||||
|
Both government and industry have long pursued the elusive
|
||||||
|
grail of personality profiling on citizens and consumers. Up
|
||||||
|
to now, such ambitions have been restrained by the practical
|
||||||
|
difficulty and expense of collecting and analyzing large
|
||||||
|
amounts of information on large numbers of citizens. But
|
||||||
|
computer communications, more than any other technology,
|
||||||
|
seems to hold out the promise that this unholy grail may
|
||||||
|
finally be in sight.
|
||||||
|
|
||||||
|
To coin a phrase, never has so much been known by so few
|
||||||
|
about so many. The information commonly available to
|
||||||
|
government and industry investi-gators today is sufficient
|
||||||
|
to make reliable predictions about our personalities,
|
||||||
|
health, politics, future behavior, our vulnerabilities,
|
||||||
|
perhaps even about our innermost thoughts and feelings. The
|
||||||
|
privacy we all take for granted is, in fact, largely an
|
||||||
|
illusion; it no longer exists in most walks of life. If we
|
||||||
|
wish to preserve even the most basic minimum of personal
|
||||||
|
privacy, it seems clear that we need to take far better care
|
||||||
|
on the networks than we have taken elsewhere.
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
FREEDOM
|
||||||
|
-------
|
||||||
|
|
||||||
|
Human beings are the only species with a history.
|
||||||
|
Whether they also have a future is not so obvious.
|
||||||
|
The answer will lie in the prospects for popular
|
||||||
|
movements, with firm roots among all sectors of the
|
||||||
|
population, dedicated to values that are suppressed
|
||||||
|
or driven to the margins within the existing social
|
||||||
|
and political order...
|
||||||
|
[Noam Chomsky]
|
||||||
|
|
||||||
|
|
||||||
|
In your day-to-day social interactions, as you deal with
|
||||||
|
employers, clients, public officials, friends, acquaintances
|
||||||
|
and total strangers, how often do you feel you can really
|
||||||
|
speak freely? How comfortable are you discussing
|
||||||
|
controversial issues such as religion, taxes, politics,
|
||||||
|
racism, sexuality, abortion or AIDS, for example? Would you
|
||||||
|
consider it appropriate or wise to express an honest opinion
|
||||||
|
on such an issue to your boss, or a client? To your
|
||||||
|
neighbors?
|
||||||
|
|
||||||
|
Most of us confine such candid discussions to certain
|
||||||
|
"trusted" social contexts, such as when we are among our
|
||||||
|
closest friends. But when you post to a network conference,
|
||||||
|
your boss, your clients, and your neighbors may very well
|
||||||
|
read what you post -- if they are not on the nets today,
|
||||||
|
they probably will be soon, as will nearly everyone.
|
||||||
|
|
||||||
|
If we have to consider each post's possible impact on our
|
||||||
|
social and professional reputations, on our job security and
|
||||||
|
income, on our family's acceptance and safety in the
|
||||||
|
community, it could be reckless indeed to express ourselves
|
||||||
|
freely on the nets. Yet conferences are often geared to
|
||||||
|
controversy, and inhibitions on the free expression of
|
||||||
|
opinions can reduce traffic to a trickle, killing off an
|
||||||
|
important conference topic or distorting a valuable sampling
|
||||||
|
of public opinion.
|
||||||
|
|
||||||
|
More important still is the role computer networks are
|
||||||
|
beginning to play in the free and open dissemination of news
|
||||||
|
and information. Democracy is crippled if dissent and
|
||||||
|
diversity in the media are compromised; yet even here in the
|
||||||
|
U.S., where a "free press" is a cherished tradition, the
|
||||||
|
bulk of all the media is owned by a small (and ever-
|
||||||
|
shrinking) number of corporations, whose relatively narrow
|
||||||
|
culture, interests and perspec-tives largely shape the
|
||||||
|
public perception.
|
||||||
|
|
||||||
|
Computer communication, on the other hand, is by its nature
|
||||||
|
very difficult to control or shape. Its resources are
|
||||||
|
scattered; when one BBS goes bust (or is busted!), three
|
||||||
|
others spring up in its place. The natural resiliency of
|
||||||
|
computer communications (and other new, decentral-ized
|
||||||
|
information technologies such as fax, consumer camcorders
|
||||||
|
and cheap satellite links) is giving rise to a new brand of
|
||||||
|
global "guerrilla journalism" which includes everyone, and
|
||||||
|
defies efforts at suppression.
|
||||||
|
|
||||||
|
The power and value of this new journalistic freedom has
|
||||||
|
recently shown itself during the Gulf War, and throughout
|
||||||
|
Eastern Europe and the Soviet Union, as well as within the
|
||||||
|
U.S. Just think of the depth and detail of information
|
||||||
|
available on the nets regarding the Secret Service's recent
|
||||||
|
"Operation Sundevil" and associated activities, compared to
|
||||||
|
the grossly distorted, blatantly propagandistic coverage of
|
||||||
|
those same activities given to the general public through
|
||||||
|
the traditional media.
|
||||||
|
|
||||||
|
Historically, established power and wealth have seldom been
|
||||||
|
disposed to tolerate uncontrolled media, and recent events
|
||||||
|
in this country and elsewhere show that computer media are
|
||||||
|
sometimes seen as threats to established interests as well.
|
||||||
|
To understand the role of handles in this context, it is
|
||||||
|
useful to note the flurries of anti-handle sentiment which
|
||||||
|
have arisen in the wake of crackdowns such as Sundevil, or
|
||||||
|
the Tom Tcimpidis raid in the early 1980s. Although few
|
||||||
|
charges and fewer convictions have typically resulted from
|
||||||
|
such operations, one might be tempted to speculate that the
|
||||||
|
real purposes -- to terrorize the nets and chill freedoms of
|
||||||
|
speech and assembly thereon -- have been achieved.
|
||||||
|
|
||||||
|
In this way, sysops and moderators become unwitting
|
||||||
|
accomplices in the supression of freedom on the networks.
|
||||||
|
When real name requirements are instituted, anyone who fears
|
||||||
|
retaliation of any sort, by any group, will have to fear
|
||||||
|
participation in the nets; hence content is effectively
|
||||||
|
controlled. This consideration becomes especially important
|
||||||
|
as the nets expand into even more violent and repressive
|
||||||
|
countries outside the U.S.
|
||||||
|
|
||||||
|
We must decide whether freedom of information and open
|
||||||
|
public discussion are in fact among the goals of network
|
||||||
|
conferencing, and if so, whether handles have a role in
|
||||||
|
achieving these goals. As access to the networks grows, we
|
||||||
|
have a rare opportunity to frustrate the efforts of
|
||||||
|
governments and corporations to control the public mind! In
|
||||||
|
this way above all others, computers may have the potential
|
||||||
|
to shape the future of all mankind for the better.
|
||||||
|
|
||||||
|
* * * * *
|
||||||
|
|
||||||
|
A CALL TO ACTION
|
||||||
|
----------------
|
||||||
|
|
||||||
|
|
||||||
|
The move to electronic communication may be a turning
|
||||||
|
point that history will remember. Just as in
|
||||||
|
seventeenth and eighteenth century Great Britain and
|
||||||
|
America a few tracts and acts set precedents for
|
||||||
|
print by which we live today, so what we think and do
|
||||||
|
today may frame the information system for a
|
||||||
|
substantial period in the future.
|
||||||
|
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
|
||||||
|
|
||||||
|
|
||||||
|
There was a time when anybody with some gear and a few
|
||||||
|
batteries could become a radio broadcaster -- no license
|
||||||
|
required. There was a time when anyone with a sense of
|
||||||
|
adventure could buy a plane, and maybe get a contract to
|
||||||
|
carry mail. Those early technological pioneers were
|
||||||
|
probably unable to imagine the world as it is today, but
|
||||||
|
their influence is strongly felt in current laws,
|
||||||
|
regulations and policies with roots in the traditions and
|
||||||
|
philosophies they founded and shaped.
|
||||||
|
|
||||||
|
Today the new pioneers are knitting the world together with
|
||||||
|
computers, and the world is changing faster than ever. Law
|
||||||
|
and ethics are scrambling to keep up. How far will this
|
||||||
|
growth take us? No one can say for sure. But you don't
|
||||||
|
need a crystal ball to see that computer communications has
|
||||||
|
the potential to encompass and surpass all the functionality
|
||||||
|
of prior media -- print, post, telegraph, telephone, radio
|
||||||
|
and television -- and more. It seems reasonable to assume
|
||||||
|
that computer communications will be at least as ubiquitous
|
||||||
|
and important in the lives of our grandchildren as all the
|
||||||
|
older media have been in ours.
|
||||||
|
|
||||||
|
It will be a world whose outlines we can now make out only
|
||||||
|
dimly. But the foundations of that world are being built
|
||||||
|
today by those of us exploring and homesteading on the
|
||||||
|
electronic frontier. We need to look hard at what it will
|
||||||
|
take to survive in the information age.
|
||||||
|
|
||||||
|
In this article we have attempted to show, for one very
|
||||||
|
narrow issue, what some of the stakes may be in this future-
|
||||||
|
building game. But the risks associated with exposing your
|
||||||
|
name in a computer conference are not well defined, and
|
||||||
|
various people will no doubt assess the importance of these
|
||||||
|
risks differently. After all, most of us take risks every
|
||||||
|
day which are probably greater than the risks associated
|
||||||
|
with conferencing. We drive on the expressway. We eat
|
||||||
|
sushi. To some people, the risks of conferencing may seem
|
||||||
|
terrifying; to others, insignificant.
|
||||||
|
|
||||||
|
But let us not get side-tracked into unresolvable arguments
|
||||||
|
on the matter. The real issue here is not how dangerous
|
||||||
|
conferencing may or may not be; it is whether you and I will
|
||||||
|
be able to make our own decisions, and protect ourselves (or
|
||||||
|
not) as we see fit. The obvious answer is that users must
|
||||||
|
exercise their collective power to advance their own
|
||||||
|
interests, and to pressure sysops and moderators to become
|
||||||
|
more sensitive to user concerns.
|
||||||
|
|
||||||
|
To help in that effort, we would like to recommend the
|
||||||
|
following guidelines for user action:
|
||||||
|
|
||||||
|
-- Bear in mind John Perry Barlow's observation that
|
||||||
|
"Liberties are preserved by using them". Let your
|
||||||
|
sysop know that you would prefer to be using a
|
||||||
|
handle, and use one wherever you can.
|
||||||
|
|
||||||
|
-- Try to support boards and conferences which allow
|
||||||
|
handles, and avoid those which don't.
|
||||||
|
|
||||||
|
-- When using a handle, BEHAVE RESPONSIBLY! There will
|
||||||
|
always be irresponsible users on the nets, and they
|
||||||
|
will always use handles. It is important for the
|
||||||
|
rest of us to fight common anti-handle prejudices by
|
||||||
|
showing that handles are NOT always the mark of an
|
||||||
|
irresponsible user!
|
||||||
|
|
||||||
|
-- Educate others about the importance of handles (but
|
||||||
|
NEVER argue or flame anyone about it).
|
||||||
|
|
||||||
|
To sysops and moderators: We ask you to bear in mind that
|
||||||
|
authority is often used best where it is used least. Grant
|
||||||
|
users the right to engage in any harmless and responsible
|
||||||
|
behaviors they choose. Protect your interests in ways which
|
||||||
|
tread as lightly as possible upon the interests of others.
|
||||||
|
The liberties you preserve may be your own!
|
||||||
|
|
||||||
|
In building the computer forums of today, we are building
|
||||||
|
the social fabric of tomorrow. If we wish to preserve the
|
||||||
|
free and open atmosphere which has made computer networking
|
||||||
|
a powerful force, while at the same time taking care against
|
||||||
|
the risks inherent in such a force, handles seem to be a
|
||||||
|
remarkably harmless, entertaining and effective tool to help
|
||||||
|
us. Let's not throw that tool away.
|
||||||
|
|
||||||
|
----------------------------------------------------------------------
|
||||||
|
[end of excerpt]
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
David Collier-Brown, | davecb@Nexus.YorkU.CA | lethe!dave
|
||||||
|
72 Abitibi Ave., |
|
||||||
|
Willowdale, Ontario, | He's so smart he's dumb.
|
||||||
|
CANADA. 416-223-8968 | -- Joyce Collier-Brown
|
||||||
|
|
||||||
|
From caf-talk Caf Jun 10 00:17:10 1992
|
||||||
|
|
493
textfiles.com/100/applemaf.hum
Normal file
493
textfiles.com/100/applemaf.hum
Normal file
@@ -0,0 +1,493 @@
|
|||||||
|
|
||||||
|
No such file
|
||||||
|
|
||||||
|
(>View: THE APPLE MAFIA F STORY/F/THE SA
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
******* *******
|
||||||
|
******* The Apple Mafia Story *******
|
||||||
|
******* *******
|
||||||
|
******* As Told To: Red Ghost *******
|
||||||
|
******* *******
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
The reason I'm writing this file is to (hopefully) once and for all, clear up
|
||||||
|
all the rumors, false statements, and just lies, that are going around about
|
||||||
|
one of the first 3 pirate groups ever. (Untouchables, Apple Mafia, Dirty Dozen)
|
||||||
|
|
||||||
|
I won't get into the other two, because there already is "The Untouchables"
|
||||||
|
story, and I'm not qualified to make comments about the Dirty Dozen.
|
||||||
|
|
||||||
|
Everything in this file is fact. I grew up in Queens NY (now 718). Where many
|
||||||
|
of the "original" pirates and phreaks, were from. Many of the readers will
|
||||||
|
question certain aspects of this file, or my authority to write it. But they
|
||||||
|
are always more than welcome to go to the sources themselves and find the truth
|
||||||
|
is what I am writing.
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
To begin with, I'm now 22 and going to college. I have been out of the "wares
|
||||||
|
world" for the better part of 2 years. What prompted me to write this is a
|
||||||
|
younger friend of mine, who is now a "pirate" and spends his life calling all
|
||||||
|
the boards, and getting all the wares (Not making fun of anyone, I went
|
||||||
|
through the same phase when I started, but it was very different from the
|
||||||
|
pirates world of today). About a week ago he told me about the "Apple Mafia"
|
||||||
|
regrouping. I said bullshit. And I was right. He gave me some of the files
|
||||||
|
on discussions now going on about the "new" "apple mafia" and I must say it's
|
||||||
|
pretty sad.
|
||||||
|
|
||||||
|
I felt the real story of what went on should be told, so here it is.
|
||||||
|
|
||||||
|
One more thing before I start. I was never in the Apple Mafia, or any of the
|
||||||
|
other groups mentioned here. I never had that deep an interest in computers
|
||||||
|
as anything but game machines or better typewriters. But I grew up in close
|
||||||
|
proximety to many of the people involved, and spent time with them in other
|
||||||
|
areas besides computers.
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
From the messages posted about the controversy I have seen. I think it might be
|
||||||
|
best to go through them 1 by 1. So here's the first one:
|
||||||
|
|
||||||
|
(Buffer of msg's. Untouched by me, except the conversion from 40 to 80 cols.)
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
To:The Fake Apple Mafia From:Disk Rigger
|
||||||
|
|
||||||
|
You are definatly not the real Apple Mafia. It was a popular group a while ago.
|
||||||
|
It incluted Bioc Agent 003, Tuc, Hight Technology, Creative Cracker and a few
|
||||||
|
others. I will inform them of you losers using there names and you will be
|
||||||
|
ragged out of your minds. I would recomend you changed your group name or you
|
||||||
|
will feel the wrath of Bioc!
|
||||||
|
This is serious and you losers can keep your unoriginal name but You will pay
|
||||||
|
for it.
|
||||||
|
|
||||||
|
|
||||||
|
(Someone's reply.)
|
||||||
|
|
||||||
|
|
||||||
|
Disk Digger:
|
||||||
|
Get a life dude. The Apple Mafia is OVER. BIOC Agent was thrown out of
|
||||||
|
the Apple Mafia. The final members were Tuc, Lord Digital, Creative
|
||||||
|
Cracker, High Technology, Big Brother the Phantom, Silicon Scorpion, &
|
||||||
|
Sherlock Apple. Nobody is going to Feel the wrath of Bioc
|
||||||
|
(hahahahahhahahahahha). because 1. he quit the phreak/pirate world over a year
|
||||||
|
ago. 2. if he WAS around he wouldnt give a shit. 3. The old members who are
|
||||||
|
still around probably care even less.
|
||||||
|
|
||||||
|
|
||||||
|
(Someone elses reply.)
|
||||||
|
|
||||||
|
|
||||||
|
While the new "apple mafia" (get a life you fuckups. you might as well call
|
||||||
|
yourselves the Untouchables.) are idiots.
|
||||||
|
new warez r0dentz who sure as hell weren't around when the REAL apple mafia was
|
||||||
|
around, are even bigger r0dents. This means YOU disk digger.
|
||||||
|
Naming yourself after a program used to pack new wherez. get a life you fat
|
||||||
|
fuckup. And if the people in the apple mafia knew YOU were throwing their names
|
||||||
|
around on a fucking catfur, YOU are the one they would be mad at.
|
||||||
|
|
||||||
|
FUckup
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
Despite incorrect statements in both parties messeges, this seems like a good
|
||||||
|
time to point out that Bioc Agent was never in the Apple Mafia to begin with.
|
||||||
|
The members changed through time, but Bioc was never a member. (More on him at
|
||||||
|
a later time) The Final members were: (If you doubt this, then boot up any ware
|
||||||
|
cracked by them in 84-85. Which was the final regrouping of the Mafia)
|
||||||
|
|
||||||
|
The Godfather (Charles). The Phantom (Eric). Creative Cracker (Marc).
|
||||||
|
High Technology (Craig). Lord Digital (Patrick). Jacque Lafitte (Jack).
|
||||||
|
The Magnet (Joe). Sherlock Apple (Dave). Silicon Scorpion (Mark).
|
||||||
|
Data Dragon (Jordon). Big Brother (Andy). & towards the very end: Tuc (Scott).
|
||||||
|
|
||||||
|
Former members who were thrown out or quit: The Parasite, Tylenol Cyanide,
|
||||||
|
Yosemite Sam, and people I don't remember from CA.
|
||||||
|
|
||||||
|
(More Messages)
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
Number > 7
|
||||||
|
Subject> Apple Mafia? (Ha)
|
||||||
|
Viewer > DISK RIGGER <Elite>
|
||||||
|
Posted > MON MAR 17 4:24:17 PM
|
||||||
|
|
||||||
|
|
||||||
|
Genius. Are you talking about that
|
||||||
|
loser group in 213? They are in for it.
|
||||||
|
If you didnt know already there was
|
||||||
|
already a group Called Apple Mafia. Too
|
||||||
|
bad two of 'em were FEDS.
|
||||||
|
|
||||||
|
Hey, Where ANY of you ever on The Old
|
||||||
|
Sherwood Forest's? [ /, //, /// ]?
|
||||||
|
|
||||||
|
|
||||||
|
(Another msg.)
|
||||||
|
|
||||||
|
|
||||||
|
Number > 8
|
||||||
|
Subject> SHERWOOD FORESTS
|
||||||
|
Author > CHRONOS
|
||||||
|
Posted > MON MAR 17 5:03:32 PM
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Yeah, I was on // and ///... I never got an answer at / though... Wasn't the
|
||||||
|
Apple Mafia (later Micro Mafia) running those boards?
|
||||||
|
|
||||||
|
[chronos/KOTBC]
|
||||||
|
|
||||||
|
And didn't they break up before they got busted? I remember something about
|
||||||
|
them just giving up, cause 2 guys were doing all the work...then they put
|
||||||
|
Yellowbeard in charge and it was never heard from again...
|
||||||
|
|
||||||
|
|
||||||
|
(Another msg.)
|
||||||
|
|
||||||
|
|
||||||
|
Number > 13
|
||||||
|
Subject> Sherwood Forest
|
||||||
|
Viewer > WARE BANDIT <Elite>
|
||||||
|
Posted > TUE MAR 18 3:43:11 PM
|
||||||
|
|
||||||
|
What two members of The Real Apple
|
||||||
|
Mafia were feds? Because I knew several
|
||||||
|
including High tech, and Creative.
|
||||||
|
|
||||||
|
And the reason you neve got an answer
|
||||||
|
at sherwood forest / was because that
|
||||||
|
was the old sherwood forest //... High
|
||||||
|
tech moved from Ny, and after he set it
|
||||||
|
up at his new place he called it
|
||||||
|
Sherwood forest //.... Well I have many
|
||||||
|
old files, and posts saved from the
|
||||||
|
last grand adventure (that was thier
|
||||||
|
logo), So if you would like to view
|
||||||
|
them then just leave me a message on
|
||||||
|
the underground.
|
||||||
|
|
||||||
|
later, [Ware Bandit]
|
||||||
|
|
||||||
|
|
||||||
|
(Another msg.)
|
||||||
|
|
||||||
|
|
||||||
|
Number > 14
|
||||||
|
Subject> WB..
|
||||||
|
Viewer > DISK RIGGER <Elite>
|
||||||
|
Posted > TUE MAR 18 4:17:52 PM
|
||||||
|
|
||||||
|
|
||||||
|
I think Magnetic Surfer ran it. Yeah I
|
||||||
|
also have a lot of things saved on
|
||||||
|
Buffer. They had a LARGE G-File
|
||||||
|
section. And a TRUELY awesome Elite
|
||||||
|
sub.
|
||||||
|
|
||||||
|
And some people got the impression that
|
||||||
|
Creative Cracker was a lazy ass. It is
|
||||||
|
not true. The board was being runned by
|
||||||
|
Federal Agents. He just came in to look
|
||||||
|
at it.
|
||||||
|
|
||||||
|
|
||||||
|
(Another msg.)
|
||||||
|
|
||||||
|
|
||||||
|
Number > 15
|
||||||
|
Subject> SERIOUS?
|
||||||
|
Author > CHRONOS
|
||||||
|
Posted > TUE MAR 18 5:44:17 PM
|
||||||
|
|
||||||
|
Sherwood Forests were really being run by Feds? I'd like to know who... they
|
||||||
|
let it get pretty far before they busted them then...
|
||||||
|
|
||||||
|
[chronos/KOTBC]
|
||||||
|
|
||||||
|
|
||||||
|
(Another msg.)
|
||||||
|
|
||||||
|
|
||||||
|
Number > 18
|
||||||
|
Subject> The forest
|
||||||
|
Viewer > WARE BANDIT <Elite>
|
||||||
|
Posted > WED MAR 19 3:23:11 PM
|
||||||
|
|
||||||
|
|
||||||
|
Okay this might clear some things up between some people that might be confused
|
||||||
|
on the subject.
|
||||||
|
|
||||||
|
Sherwood Forest .... Used to be run by High Tech. About 2-3 years ago.
|
||||||
|
Sherwood Forest // The later Sherwood forest run by High tech. when he moved.
|
||||||
|
Sherwood Forest /// Ran by Creative Cracker, a good friend of High tech.
|
||||||
|
|
||||||
|
and no they were not feds, they just got a little carried away with the way
|
||||||
|
they were running thier boards by letting just about anyone access most of the
|
||||||
|
phreak sections that they had on-line. The Treasury dept. finally closed them
|
||||||
|
down along with cryton and some other un-heard of hack boards.
|
||||||
|
|
||||||
|
If you have any questions feel free to ask.. I was going to run thier number 4
|
||||||
|
board, but shortly after I was offered the opurtunity they went under...
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
I don't know where these msg's are from, or who these people are. But almost
|
||||||
|
everything said in them is wrong.
|
||||||
|
|
||||||
|
"I heard 2 guys were doing all the work, so they quit". Whoever said that has
|
||||||
|
obviously read the 1984 loserlist, because that is a verbatim quote from it.
|
||||||
|
Not only is it wrong in slandering everyone from Apple Bandit, Hot Rod, and
|
||||||
|
Wombat/Gonif, to Bioc Agent, Lord Digital and Paul Muad'Dib. But it's written
|
||||||
|
in a such a ridiculous fashion, that any points the author was trying to make
|
||||||
|
are lost in the jumble (For those who care it was written by "The Atom").
|
||||||
|
|
||||||
|
Sherwood Forests (The last grand adventure).
|
||||||
|
|
||||||
|
The FIRST Sherwood Forest was started in 1979 by Magnetic Surfer. The only
|
||||||
|
people who were on it back then, and still recognized would be Mr. Xerox and
|
||||||
|
Lord Digital. Other members included Nickie Halflinger, Captain Crunch,
|
||||||
|
Napoleon Bonaparte, and many others, whose names are probably meaningless to
|
||||||
|
the people around today.
|
||||||
|
|
||||||
|
There was a 20 page write up on "Hackers", before it was in vogue to write
|
||||||
|
about them (Before WarGames and the 414 busts), In a 1982 issue of "California"
|
||||||
|
magazine. Which detailed the bust of Ron Austin, who was at the time of arrest
|
||||||
|
22 years old and being tried for everything from credit card fraud, to grand
|
||||||
|
theft. Also included in the article was a write up on Hacker bbs systems he
|
||||||
|
was on and people he knew. The Sherwood Forest mentioned in that article was
|
||||||
|
Magnetic Surfer's, not the later ones.
|
||||||
|
|
||||||
|
Sherwood forest was run on a micromodem and 1 disk drive. There were no Cat's,
|
||||||
|
DOS was at 3.1, and Disk Drives were still a novelty. It went down in 1981 for
|
||||||
|
whatever reasons, and went back up as a public system with 1200 & a 46 mb hard
|
||||||
|
drive in 1983. Shortly thereafter it went private and became the Knights of
|
||||||
|
Shadow Base bbs. During it's final days in 1984, this was the FINAL memberlist:
|
||||||
|
|
||||||
|
SYSTEM OPERATOR <-- Magnetic Surfer. TKOS member
|
||||||
|
PIT FIEND <-- Local Queens person
|
||||||
|
LORD DIGITAL <-- Name speaks for itself. Apple Mafia & TKOS member
|
||||||
|
CRIMINAL ELEMENT <-- Local Queens person, semi notorious for being a ass
|
||||||
|
STEPHEN FALKEN <-- aka: Jon Gleich of Earth News Central
|
||||||
|
THE SURGE <-- Unknown. Access from Lord Digital
|
||||||
|
BIG BROTHER <-- 617 phreak/pirate. Apple Mafia & TKOS member
|
||||||
|
E.F. HUTTON <-- 312 Phreak/Hacker. TKOS member
|
||||||
|
THE KNIGHTS OF SHADOW <-- TKOS account
|
||||||
|
MR. XEROX <-- Name speaks for itself. TKOS founder
|
||||||
|
CAPTAIN AVATAR <-- aka: Skip Rooney
|
||||||
|
DISK DEMON <-- Local Queens person
|
||||||
|
GUEST ACCOUNT <-- A guest account
|
||||||
|
THE MAGNET <-- Apple Mafia co-founder
|
||||||
|
THE PROWLER <-- Canadian Phreak, NOT the 612 Prowler
|
||||||
|
BIOC AGENT 003 <-- Name speaks for itself. TKOS member
|
||||||
|
QUASI MOTO <-- TKOS member. Ran PloverNet
|
||||||
|
PHONE FIEND <-- Local Queens person
|
||||||
|
TUC TUCBBS <-- Tuc. Name speaks for itself. TKOS member
|
||||||
|
PAUL MUAD'DIB <-- Name speaks for itself. TKOS member
|
||||||
|
HARDWARE HACKER <-- Local Queens person
|
||||||
|
TOM TONE <-- Brooklyn person
|
||||||
|
THE GODFATHER <-- Apple Mafia co-founder
|
||||||
|
PETER MCIVERS <-- 617 phreak/hacker
|
||||||
|
THE PHANTOM <-- Apple Mafia member
|
||||||
|
NICKIE HALFLINGER <-- Hacker, EEE, in his mid 30's
|
||||||
|
LEX LUTHOR <-- 305 person. Nobody at this time, later founded LOD
|
||||||
|
UNCLE JOE <-- Have no idea who this is
|
||||||
|
LESLIE KARASIC <-- Have no idea who this is
|
||||||
|
THE NECROMANCER <-- TKOS member
|
||||||
|
DR JIMMY MR JIM <-- TKOS member
|
||||||
|
THE WIZARD <-- Asshole from 713. Access from Quasi Moto
|
||||||
|
FRODO HOBBIT <-- Unknown, from 201. Access from Magnetic Surfer
|
||||||
|
THE DJIN <-- Unknown, from 718. Access from Magnetic Surfer
|
||||||
|
RICH DOUGAN <-- Unknown, from 718. Access from Magnetic Surfer
|
||||||
|
APPLE CAT <-- Unknown, from 718. Access from The Phantom
|
||||||
|
NAPOLEON BONAPARTE <-- TKOS member. Ex of: Inner Circle. ex Sys of SL
|
||||||
|
CHRISTOPHER BUNN <-- Unknown, from 718. Access from The Phantom
|
||||||
|
DR. DOOM <-- Have no idea who this is
|
||||||
|
WILD CAT <-- Have no idea who this is
|
||||||
|
THE DISKLAIMER <-- Have no idea who this is
|
||||||
|
MR IBM <-- Have no idea who this is
|
||||||
|
DRAGON LADY <-- Ex girlfriend of Chesire Catalyst
|
||||||
|
GAP DRAGON <-- Have no idea who this is
|
||||||
|
THE MARK <-- Have no idea who this is
|
||||||
|
CABLE PAIR <-- Fed par excellance`
|
||||||
|
STOSH FIXER <-- Have no idea who this is
|
||||||
|
MILO PHONBIL <-- Sysop of Once & Future OSUNY
|
||||||
|
MR. GUCCI <-- Sysop of AT&T Phone Center
|
||||||
|
DR. NIBBLEMASTER <-- TKOS member
|
||||||
|
STAINLESS STEAL RAT <-- TKOS member
|
||||||
|
|
||||||
|
And that's it. Reading the list you have to keep in mind that this was right
|
||||||
|
after the Inner Circle folded, and almost a year before LOD even began. So many
|
||||||
|
of the current "Big Names", didn't even own computers yet.
|
||||||
|
|
||||||
|
In 1983 a friend of their's (The 212/718 people), called Creative Cracker put
|
||||||
|
up a bbs called Sherwood Forest ][. For a while it had an ae line simply known
|
||||||
|
as "Sherwood Forest" in 201, then in 1984 Sherwood Forest ]I[ went up, run by
|
||||||
|
High Technology. The original co-sysops on SF ][ were High Tech & Jack The
|
||||||
|
Ripper. Jack was dropped, High Tech became a full sysop, and the new co-sysops
|
||||||
|
became: Tuc, Bioc & Big Brother.
|
||||||
|
|
||||||
|
SF ][ started on a disk ][ & a Rana ]I[ disk drive, Micromodem, and a clock. It
|
||||||
|
went down for 2 weeks in 1984, then came back up with all new software, 20 megs
|
||||||
|
and 1000's of files.
|
||||||
|
|
||||||
|
SF ]I[ went up with a disk ][ & a Rana ]I[, and that's as big as it ever got.
|
||||||
|
Creative Cracker was a full sysop. And the co-sysops were Sharp Razor, X-Man,
|
||||||
|
and Wizard 414. co-sub-ops of maintenence (whatever that is), were: Sherlock
|
||||||
|
Apple and Silicon Scorpion. All co-sysops and sub-ops were dropped after about
|
||||||
|
2 months.
|
||||||
|
|
||||||
|
None of the boards except for Magnetic Surfer's could be considered really
|
||||||
|
impressive by todays standards. Impressive in terms of hardware that is. This
|
||||||
|
is the time when just about the only hard drive was a corvus, whose prices for
|
||||||
|
a 6 meg started at $2000 in that time. and a complete Apple-Cat/212 card/exp-
|
||||||
|
ansion module system, came to over $1000.
|
||||||
|
|
||||||
|
And finally the Apple Mafia, was NEVER the "Micro Mafia", this was yet another
|
||||||
|
group of losers cashing in on their group name.
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
I could go on about what happens to all the people from SF, but that's not the
|
||||||
|
purpose of this file, so I'm not going to digress. There are many files out
|
||||||
|
about many of the members (Lord Digital, Paul Muad'Dib, Mr. Xerox come to mind)
|
||||||
|
already. And others have made themselves known through LOD as well (Lex). What
|
||||||
|
this file is about is The Apple Mafia, so I'm not going to get into all that.
|
||||||
|
|
||||||
|
Which brings me to the final part. The Sherwood Forest Busts....
|
||||||
|
|
||||||
|
I'm saying right now that I don't know what happened, just offering the facts
|
||||||
|
that I do know about it.
|
||||||
|
|
||||||
|
If (as is said), SF][ was indeed run by the FBI towards the end. Then why did
|
||||||
|
they let Creative Cracker keep cracking software? It doesn't seem likely they
|
||||||
|
would have let him continue, did they just not know or what?
|
||||||
|
|
||||||
|
Now if they weren't running SF][, then even more questions come to mind. The
|
||||||
|
most important one is: why run a board if you truly don't care? CC never
|
||||||
|
looked at his board, never logged in, the news was updated once every 9 months
|
||||||
|
by BIOC.
|
||||||
|
|
||||||
|
What's more, if it WAS a trap, then logically the other Apple Mafia members had
|
||||||
|
to know about it. Or most of them. NONE of them EVER posted anything at all.
|
||||||
|
With the exception of Silicon Scorpion & Sherlock Apple, who kept posting new
|
||||||
|
wares.
|
||||||
|
|
||||||
|
It could be that they lost interest in piracy (As is true of Tuc, Lord Digital,
|
||||||
|
The Phantom, Big Brother, in fact, almost all the members), BUT this still does
|
||||||
|
not clear up why NONE of them EVER posted ANYWHERE, including the phreak boards
|
||||||
|
or the elite subs. Now BIOC did post, but if you know BIOC, he always left some
|
||||||
|
500 line exerpt he typed up from some magazine, or manual (Which is actually
|
||||||
|
just about all he ever did, much like Lex), nothing that could get him in any
|
||||||
|
kind of trouble.
|
||||||
|
|
||||||
|
These are the same people whose msg's I've seen buffers of from Sherwood Forest
|
||||||
|
(Magnetic Surfer's), and World of Cryton, who were posting techniques, systems,
|
||||||
|
and information, all over. But not ONE msg. from any of them on their supposed
|
||||||
|
"home base". Pretty weird....
|
||||||
|
|
||||||
|
The logical conclusion I draw from this is: They knew the board was being
|
||||||
|
watched at the very least, and didn't want to draw attention to themselves.
|
||||||
|
In which case they left everyone else to get caught, which is in keeping with
|
||||||
|
many of the peoples present attitudes. This is also the time during which the
|
||||||
|
Apple Mafia members who were also in TKOS got a lot of heat from that group
|
||||||
|
falling apart in a rather spectacular manner. With almost all of them in danger
|
||||||
|
of being busted for grand theft.
|
||||||
|
|
||||||
|
While SF][ & ]I[ didn't go down until summer of 1985, I would say the Apple
|
||||||
|
Mafia died almost a year eairlier. I talked to Silicon Scorpion towards the
|
||||||
|
end of 1984 and as he put it: "What group? I don't even have anyones number
|
||||||
|
anymore. How am I supposed to be part of a group whose members I can't even
|
||||||
|
find?" This refers to Creative Cracker whose voice number dissapeared, and
|
||||||
|
who never answered his feedback, The Phantom, ditto. Big Brother, ditto. Tuc,
|
||||||
|
ditto. Lord Digital, ditto + he stopped calling any boards. Data Dragon, he's
|
||||||
|
never home. Who's that leave? not many.
|
||||||
|
|
||||||
|
In the cases of The Phantom, Lord Digital and Tuc, this is understandable. They
|
||||||
|
were all undoubtedly living out paranoid fantasies of everything they'd ever
|
||||||
|
done catching up with them, as it did with Mr. Xerox not too far in the past.
|
||||||
|
|
||||||
|
But what happened to everyone else?
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
The Apple Mafia is over. Maybe one day some of the members will regroup just
|
||||||
|
for fun. It would be interesting. But some loser named Judge Dredd, should go
|
||||||
|
crawl back where he came from. Or find another name for his lame excuse of a
|
||||||
|
group.
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
Here is the "flyer" heralding the regrouping of the Mafia in 1984. Verbatim as
|
||||||
|
typed by The Godfather:
|
||||||
|
|
||||||
|
|
||||||
|
BRIEF HISTORY OF THE APPLE MAFIA.
|
||||||
|
|
||||||
|
FOUNDED IN 1980 BY THE GODFATHER AS
|
||||||
|
A JOKE. REDONE IN 1981 AS A SEMI
|
||||||
|
SERIOUS GROUP. KICKED SOME ASS IN
|
||||||
|
'82. BLEW EVERYONE AWAY IN 83, AND
|
||||||
|
WILL DO MUCH BETTER IN 84. SINCE
|
||||||
|
THE BEGINNING THE GROUP HAS DIED
|
||||||
|
OUT AND BEEN REBORN SEVERAL TIMES,
|
||||||
|
THIS TIME LETS KEEP IT GOING. IS
|
||||||
|
CURRENTLY THE OLDEST ACTIVE GROUP,
|
||||||
|
NEXT (OF PEOPLE WHO WOULD STILL BE
|
||||||
|
AROUND) ARE THE WARE LORDS ('83 I
|
||||||
|
BEILIEVE) AND THE 1200 CLUB ('83
|
||||||
|
ALSO, I THINK). THAT'S IT.
|
||||||
|
|
||||||
|
A FEW GENERAL IDEAS WE WISH TO PROMOTE:
|
||||||
|
|
||||||
|
WHEN YOU GET SOME NEW SOFTWARE CALL
|
||||||
|
UP AS MANY MAFIA MEMBERS AND GET IT
|
||||||
|
TO THEM FIRST.
|
||||||
|
|
||||||
|
GET IT POSTED UP ON THE BOARDS AS FAST
|
||||||
|
AS POSSIBLE, NOW WITH CATS, TIME IS
|
||||||
|
CRUTIAL. BE SURE TO STICK THE MAFIA
|
||||||
|
AT THE END.
|
||||||
|
|
||||||
|
DON'T GET THE GROUP INTO FIGHTS, AND
|
||||||
|
TRY NOT TO BE AN ASSHOLE.
|
||||||
|
|
||||||
|
IT HELPS TO GIVE OUT SOFTWARE TO OTHERS
|
||||||
|
- WITH THE MOB BEHIND YOU, NO ONE
|
||||||
|
CAN STOP YOU.
|
||||||
|
|
||||||
|
KEEP IN TOUCH WITH OTHER MEMBERS, IT
|
||||||
|
SUCKS WHEN YOU LOSE CONTACT, IF YOU
|
||||||
|
NEED ANY HELP CATCHING UP, JUST ASK
|
||||||
|
SOMEONE... THEY SHOULD BE WILLING TO
|
||||||
|
HELP YOU CATCH UP.
|
||||||
|
|
||||||
|
NEW MEMBERSHIPS ARE DECEIDED BY ALL
|
||||||
|
OF THE MEMBERS, IF YOU KNOW OF SOMEONE
|
||||||
|
DECENT, TELL EVERYONE ELSE.
|
||||||
|
|
||||||
|
THATS ABOUT IT.
|
||||||
|
|
||||||
|
THE GODFATHER
|
||||||
|
|
||||||
|
|
||||||
|
1986.
|
||||||
|
The Apple Mafia Story
|
||||||
|
Red Ghost
|
||||||
|
|
||||||
|
*******************************************************************************
|
||||||
|
(>==============================================================================
|
||||||
|
___ ___
|
||||||
|
(___><___) .....And if you enjoyed this TextFile, call The Works, 914's
|
||||||
|
\ _[]_ TextFile BBS:
|
||||||
|
\______/ \_____ The Works
|
||||||
|
_\ =========
|
||||||
|
_______________ \>\ (914)-238-8195 24 Hrs. 900+ Textfiles Online
|
||||||
|
/ \ \ 300/1200 Baud, N,8,1 Home of Terror Ferret
|
||||||
|
/ \___> 10 Megabytes of Storage ANSI Graphics Optional
|
||||||
|
==============================================================================
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
413
textfiles.com/100/apples.txt
Normal file
413
textfiles.com/100/apples.txt
Normal file
@@ -0,0 +1,413 @@
|
|||||||
|
> 1
|
||||||
|
INCREMENT TITLES BY: [DEFAULT IS 10] )=->
|
||||||
|
|
||||||
|
[01] PIRATE/TRADING
|
||||||
|
[02] WARES .....
|
||||||
|
[03] CALL...
|
||||||
|
[04] ALL THE K00L STUFF
|
||||||
|
[05] AE LINE
|
||||||
|
[06] WHY NOT
|
||||||
|
[07] THE LIST
|
||||||
|
[08] APPLE WARES-->
|
||||||
|
[09] PLEASE TELL OTHERS...
|
||||||
|
[10] BASICALLY
|
||||||
|
|
||||||
|
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->
|
||||||
|
|
||||||
|
|
||||||
|
->[11] SOME WARES
|
||||||
|
->[12] THE REAL NEW WARES
|
||||||
|
->[13] APPLICATIONS AVAILABLE
|
||||||
|
->[14] NEW WARES FOR YA
|
||||||
|
|
||||||
|
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->R
|
||||||
|
|
||||||
|
(1-14, LAST=0, QUIT=Q) READ MSG.#1
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #1: PIRATE/TRADING
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: HIGH TECHNOLOGY
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
***************************************
|
||||||
|
* *
|
||||||
|
* WELCOME TO SHERWOOD FOREST /// *
|
||||||
|
* *
|
||||||
|
* THIS SUB-BOARD IS DEDICATED *
|
||||||
|
* TO APPLE SOFTWARE.... *
|
||||||
|
* *
|
||||||
|
* ENJOY THE FOREST *
|
||||||
|
* *
|
||||||
|
* )=-> SYSOP <-=( *
|
||||||
|
***************************************
|
||||||
|
|
||||||
|
(1-14, LAST=1, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #2: WARES .....
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: SHERLOCK APPLE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
I HAVE EM ALL !!!!!!
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
SHERLOCK APPLE
|
||||||
|
|
||||||
|
(1-14, LAST=2, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #3: CALL...
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: CREATIVE CRACKER
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
Call...
|
||||||
|
|
||||||
|
__________________
|
||||||
|
_________/Sherwood Forest ][\_________
|
||||||
|
\^^^^^^^^=^^^^^^=^^/
|
||||||
|
___[914][359][1517]___
|
||||||
|
|
||||||
|
|
||||||
|
-> 20 Megs. On-Line..
|
||||||
|
|
||||||
|
-> 31 Sub-Boards..
|
||||||
|
|
||||||
|
-> 15 G-Sections..
|
||||||
|
|
||||||
|
|
||||||
|
Open 24 Hours - 7 Days a week..
|
||||||
|
|
||||||
|
Free Validation
|
||||||
|
|
||||||
|
Many Advanced Options...
|
||||||
|
|
||||||
|
Call Today!!!!
|
||||||
|
|
||||||
|
[914][359][1517]
|
||||||
|
|
||||||
|
|
||||||
|
(1-14, LAST=3, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #4: ALL THE K00L STUFF
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: THE ROGUE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
Yes, I've got all the new stuff or can get it real quick.
|
||||||
|
So if you want anything, new or old, just leave E-Mail.
|
||||||
|
|
||||||
|
The Rogue
|
||||||
|
|
||||||
|
Catsend/Disk-fer ONLY!!!!
|
||||||
|
very few exceptions but....
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
(1-14, LAST=4, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #5: AE LINE
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: UNKNOWN PIRATE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
.......................................
|
||||||
|
. I HAVE BEEN ON VACATION ABOUT 2 MON .
|
||||||
|
. THS AND I WANT TO PUT MY LINE .
|
||||||
|
. BACK UP BUT I GO NO SOFTWARE NEW .
|
||||||
|
. SO ANY BODY WHO WANTS TO HELP ME OU .
|
||||||
|
. T AND GET MUCH STUFF AFTER I GET BA .
|
||||||
|
. CK ON MY FEET PLEASE SEND ME E-MAIL .
|
||||||
|
. .
|
||||||
|
. LATER .
|
||||||
|
. .
|
||||||
|
. .
|
||||||
|
. BY THE WAY IF YOU WANT TO SEE WHAT .
|
||||||
|
. NEW SOFTWARE WILL BE AVALIBLE IN TH .
|
||||||
|
. E NEXT FEW MONTHS READ MY MESSAGE O .
|
||||||
|
. N SHERWOOD II IT TOOK ME 1/2 HOUR T .
|
||||||
|
. O TYPE AND I DON'T FEEL LIKE TYPING .
|
||||||
|
. IT AGAIN MABBE SOME OTHER TIME .
|
||||||
|
. .
|
||||||
|
. UNKNOWN PIRATE .
|
||||||
|
.......................................
|
||||||
|
|
||||||
|
(1-14, LAST=5, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #6: WHY NOT
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: UNKNOWN PIRATE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
WHAT THE HELL HERES A LIST OF ALL THE S
|
||||||
|
OFTWARE FOR THE NEXT FEW MONTHS.
|
||||||
|
|
||||||
|
ATARI--YAACOV AGAM'S INTERACTIVE PAINTI
|
||||||
|
NG, FIND IT, THE ABC'S OF CPR, WHEELER
|
||||||
|
DEALER, SIMULATED COMPUTER,TELLY TURTLE
|
||||||
|
GREMLINS, TRACK AND FIELD, MARIO BROS.
|
||||||
|
DONKEY KONG JR., CRYSTAL CASTLES.
|
||||||
|
|
||||||
|
BAEN--WINGS OUT OF SHADOW, BERSERKER
|
||||||
|
RAIDS, THE ELECTRIC DRAGON,SNAKE,STARCL
|
||||||
|
ASH II.
|
||||||
|
|
||||||
|
BRODERBUND--CHAMP. LODE RUNNER, CAPTAIN
|
||||||
|
GOODNIGHT AND THE ISLANDS OF FEAR,MERCY
|
||||||
|
BIRDS, BANK ST. FILER, BANK STREET MAIL
|
||||||
|
ER, DAZZLE DRAW, WHERE IN THE WORLD IS
|
||||||
|
CARMEN SANDIEGO?.
|
||||||
|
|
||||||
|
COLECO--TARZAN,WARGAMES,CABBAGE PATCH
|
||||||
|
KID ADVENTURES,FORTUNE BIULDER,DR. SUES
|
||||||
|
S FIX UP AND MIX UP BUILDER.
|
||||||
|
|
||||||
|
DATAMOST--ANKH, MYCHESS II,EARTHY DELIG
|
||||||
|
TS.
|
||||||
|
|
||||||
|
DATASOFT--JUNO FIRST,MANOCOPTER,MERIDIA
|
||||||
|
N III,BRUCE LEE,DALLAS,ZAXXON(IIC),LOST
|
||||||
|
TOMB.
|
||||||
|
|
||||||
|
EPYX--HOT WHEELS,GI JOE,BARBIE,BREAKDAN
|
||||||
|
CE, ROBOTS OF DAWN.
|
||||||
|
|
||||||
|
FIRST STAR--ROMPER ROOM'S I LOVE MY ALP
|
||||||
|
BET,SPY VS. SPY,US ADVENTURE.
|
||||||
|
|
||||||
|
INFOCOM--CUTTHROAT
|
||||||
|
|
||||||
|
PENGUIN--XYPHUS
|
||||||
|
|
||||||
|
ORIGIN--CAR WARS, ORGE
|
||||||
|
|
||||||
|
SSI--OBJECTIVE KURST,50 MISSION CRUNCH
|
||||||
|
|
||||||
|
TRAPEZE--LIFESPAN,SETI
|
||||||
|
|
||||||
|
THATS ALL FOR APPLE CHECK OUT COMMODORE
|
||||||
|
ATARI,IBM AND POSSIBLY SOME OTHERS
|
||||||
|
ON OTHER ONLINE BOARDS OF VARIOUS BBS'S
|
||||||
|
UNKNOWN PIRATE.
|
||||||
|
|
||||||
|
(1-14, LAST=6, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #7: THE LIST
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: UNKNOWN PIRATE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
THE LIST I TYPED WAS A LIST OF NEW
|
||||||
|
GAMES SOON TO BE RELEASED BY THE
|
||||||
|
MANUFACTERS OR GAMES JUST RELEASE
|
||||||
|
I DON'T HAVE MOST OF THE SHIT YET.
|
||||||
|
|
||||||
|
|
||||||
|
UNKNOWN PIRATE
|
||||||
|
|
||||||
|
|
||||||
|
(1-14, LAST=7, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #8: APPLE WARES-->
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: PRO-GRAMMER
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
Aybody out there who wants to trade apple wares,i'm all ears.I have a lot,
|
||||||
|
and can get most other stuff(the littile that i don't have that is).I'm
|
||||||
|
looking for some good business programs(compilers,assemblers,spreadsheets etc.)
|
||||||
|
so anybody interested,leave me e-mail.
|
||||||
|
LATER--->
|
||||||
|
THE
|
||||||
|
[PRO-GRAMMER]
|
||||||
|
|
||||||
|
/EX
|
||||||
|
|
||||||
|
(1-14, LAST=8, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #9: PLEASE TELL OTHERS...
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: HIGH TECHNOLOGY
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
***************************************
|
||||||
|
* *
|
||||||
|
* PLEASE TELL OTHERS ABOUT *
|
||||||
|
* SHERWOOD FOREST ///.THE MORE CALLS *
|
||||||
|
* THAT THIS SYSTEM GETS....THE BETTER *
|
||||||
|
* THE SYSTEM GETS.... *
|
||||||
|
* *
|
||||||
|
* ALSO PLEASE POST ABOUT *
|
||||||
|
* SHERWOOD FOREST /// ON OTHER BBS'S. *
|
||||||
|
* *
|
||||||
|
* THANK-YOU *
|
||||||
|
* *
|
||||||
|
* )=-> SYSOP <-=( *
|
||||||
|
* *
|
||||||
|
* *
|
||||||
|
***************************************
|
||||||
|
|
||||||
|
(1-14, LAST=9, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #10: BASICALLY
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: CAPTAIN CANADA
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
CAPTAIN CANADA HERE,
|
||||||
|
|
||||||
|
I HAVE THE BASICALLY NEW STUFF,
|
||||||
|
|
||||||
|
XYPHUS,EXPEDITION AMAZON ETC...
|
||||||
|
|
||||||
|
IF YOU WANT TO TRADE FOR THOSE OR EVEN
|
||||||
|
OLDER STUFF PLEASE WRITE HERE OR ON
|
||||||
|
SFII.I REALLY WANT COMPUTER AMBUSH.
|
||||||
|
CAN ANYONE HELP?
|
||||||
|
|
||||||
|
CAPTAIN CANADA
|
||||||
|
|
||||||
|
(1-14, LAST=10, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #11: SOME WARES
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: KEY MASTER
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
OK.THIS IS THE KEYMASTER.I HAVE SOME OF THE
|
||||||
|
LATEST WARES AND I WILL TRADE WITH ANYONE WHO
|
||||||
|
HAS CATSEND 3.0 OR DISKFER(CATSEND PREFERED).
|
||||||
|
IVE HAD EXPEDITION AMAZON AND XYPHUS FOR A LONG
|
||||||
|
TIME.THEY BOTH SUCK.SKYFOX HAS SOME PRETTY GOOD
|
||||||
|
GRAPHICS AND ARCHON IS OK.ILL BE GETTING
|
||||||
|
CHAMP. LODE RUNNER FROM A FRIEND OVER THE WEEKEND.
|
||||||
|
CAPTAIN GOODKNIGHT ALSO SOMETIME SOON.ANYONE WHO
|
||||||
|
WANTS A COPY OF CASTLE SMURFENSTEIN OR ANY OF
|
||||||
|
THE OTHER WARES I NAMED(PLUSMORE) THEN CALL
|
||||||
|
ME AT THE 4TH REICH 813 734 5312.IM SYSOP,BUT
|
||||||
|
ID PREFER IF YOU LEFT EMAIL TO THE KEYMASTER
|
||||||
|
OR THE BEST WOULD BE TO CHAT.TILL THEN....
|
||||||
|
|
||||||
|
THE KEYMASTER
|
||||||
|
|
||||||
|
(1-14, LAST=11, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #12: THE REAL NEW WARES
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: SHERLOCK APPLE
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
|
||||||
|
THE REAL NEW WARES:
|
||||||
|
|
||||||
|
|
||||||
|
SERENDIPITY
|
||||||
|
EZ TEXT
|
||||||
|
RUN FOR IT
|
||||||
|
HITCH HIKERS GUIDE TO THE GALAXY
|
||||||
|
BALTIC 1985
|
||||||
|
AIR NAV WORKSHOP
|
||||||
|
CYPRUS ][ (OR WHATEVER ITS CALLED)
|
||||||
|
DREADNAUGHTS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
LATER,
|
||||||
|
|
||||||
|
|
||||||
|
SHERLOCK APPLE!
|
||||||
|
THE APPLE MAFIA
|
||||||
|
ALL THE WARES!!
|
||||||
|
|
||||||
|
(1-14, LAST=12, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #13: APPLICATIONS AVAILABLE
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: RICH NUTS
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||||||
|
$ IF YOU'RE INTERESTED IN BUSINESS OR $
|
||||||
|
$ UTILITIES SOFTWARE, OR YOU NEED $
|
||||||
|
$ PROGRAMMING HELP, THEN THIS IS THE $
|
||||||
|
$ RIGHT PLACE. WE HAVE ACCESS TO ALL $
|
||||||
|
$ MAJOR BUSINESS PROGRAMS AND OTHER $
|
||||||
|
$ TYPES OF APPLICATIONS SOFTWARE, AND $
|
||||||
|
$ WE ARE ALSO EXPERT PROGRAMMERS. $
|
||||||
|
$ WE DO, HOWEVER, NEED SOME OF THE $
|
||||||
|
$ NEWER ENTERTAINMENT PROGRAMS. IF $
|
||||||
|
$ YOU'RE WILLING TO TRADE SEND E-MAIL $
|
||||||
|
$ EITHER ON THIS BOARD OR SHERWOOD $
|
||||||
|
$ FOREST // TO RICH NUTS. $
|
||||||
|
$ $
|
||||||
|
$ LATER- $
|
||||||
|
$ $$$$$$ $
|
||||||
|
$ $RICH$ $
|
||||||
|
$ $NUTS$ $
|
||||||
|
$ $$$$$$ $
|
||||||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||||||
|
|
||||||
|
(1-14, LAST=13, QUIT=Q) READ MSG.#
|
||||||
|
|
||||||
|
|
||||||
|
MESSAGE #14: NEW WARES FOR YA
|
||||||
|
|
||||||
|
|
||||||
|
MSG LEFT BY: KEY MASTER
|
||||||
|
POSTED:
|
||||||
|
|
||||||
|
OK WELL,I JUST GOT SOME NEW WARES IN TONIGHT
|
||||||
|
AND A LOT MORE ARE COMING TOMORROW.HERE
|
||||||
|
IS MY CURREBT TRADING LIST:
|
||||||
|
|
||||||
|
SKYFOX
|
||||||
|
ARCHON (PATCHED VERSION!!)
|
||||||
|
CASTLE SMURFENSTEIN
|
||||||
|
BEACH LANDING
|
||||||
|
XYPHUS
|
||||||
|
E.T.
|
||||||
|
CHAMPIONSHIP LODE RUNNER (MEGA-HARD)
|
||||||
|
AND MORE TOMORROW.
|
||||||
|
|
||||||
|
IF YOU ARE REALLY INTERESTED THEN CALL THE
|
||||||
|
4TH REICH (813 734 5312) AND LEAVE FEEDBACK OR
|
||||||
|
E-MAIL TO KEY MASTER.I'LL GET IN TOUCH WITH YOU.
|
||||||
|
BE SURE TO LEAVE A LISTOF YOUR WARES ALSO.
|
||||||
|
APPLE CATS ONLY!!I ONLY TRADE IN BELL 202
|
||||||
|
|
||||||
|
THE KEYMASTER
|
||||||
|
|
||||||
|
(1-14, LAST=14, QUIT=Q) READ MSG.#Q
|
||||||
|
|
||||||
|
[T] [R] [P] [Z] [E] [Q] [?] --->***
|
||||||
|
|
Reference in New Issue
Block a user