mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-08 09:56:43 +02:00
update
This commit is contained in:
36
textfiles.com/100/ad.txt
Normal file
36
textfiles.com/100/ad.txt
Normal file
@@ -0,0 +1,36 @@
|
||||
View: RAD AD
|
||||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||
: Call The Upside Down BBS at (201) 398-2953 300/1200 Baud 10 megabytes :
|
||||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||
|
||||
System currently operating with ; Other Information
|
||||
--------------------------------- -----------------
|
||||
T-Net BBS Software version 1.6 20 Sub-boards
|
||||
Apple ][ + w/64 K 100+ G-files
|
||||
Apple-Cat ][ Modem On-line Ascii express
|
||||
Apple-Cat 212a Upgrade Card 300 + Users
|
||||
Apple-Cat ][ Firmware Rom Chip 5300 + Calls to date
|
||||
Videx UPPER/lower Case Chip
|
||||
2 Apple ][ Disk Drives
|
||||
'THE SIDER' 10 Megabyte Hard Drive
|
||||
Thunderclock + Call Today ! and get yourself
|
||||
Bell Fone Linez A Password !
|
||||
PSE&G Electric
|
||||
Apple Monitor /// and/or Taxan RGB I
|
||||
Epson Salt (MX-80)
|
||||
2 Maxell Md1 Floppy disks
|
||||
Bambergers deluxe desk topSystem saver fan
|
||||
System saver fan
|
||||
TG Joystick
|
||||
Dayton axial fan CMF (Boosts cooling, all slots are full)
|
||||
|
||||
==============================================================================
|
||||
|
||||
Upside Down AE Line 300/1200 baud apple-cat ][ (201) 625-8929 p/w = run
|
||||
------------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
|
||||
(>
|
||||
|
132
textfiles.com/100/adventur.txt
Normal file
132
textfiles.com/100/adventur.txt
Normal file
@@ -0,0 +1,132 @@
|
||||
|
||||
***************************************
|
||||
* *
|
||||
* ADVENTURE *
|
||||
* *
|
||||
* Solving it in easy steps *
|
||||
* *
|
||||
* *
|
||||
***************************************
|
||||
FROM: THE ROM RAIDER
|
||||
DR. DIGITAL
|
||||
|
||||
CALL HER MAJESTY'S SECRET SERVICE
|
||||
3 0 3 - 7 5 1 - 2 0 6 3
|
||||
|
||||
|
||||
WARNING: THIS WALK-THRU SHOWS HOW TO SOLVE THIS ADVENTURE STEP BY STEP, THESE
|
||||
ARE NOT HINTS!
|
||||
|
||||
SPECIFIC INSTRUCTIONS ARE ENCLOSED IN QUOTES, SO TYPE WHAT YOU SEE.
|
||||
|
||||
START OFF BY GOING "N". YOU ARE NOW STANDING AT THE END OF A ROAD BEFORE A
|
||||
SMALL BRICK BUILDING. THIS BUILDING IS THE WELLHOUSE, AND IS AN IMPORTANT PART
|
||||
OF THE GAME. THE OBJECT OF THIS GAME IS TO GET THE 15 TREASURES BACK TO THE
|
||||
WELLHOUSE.
|
||||
|
||||
CONTINUE WITH "IN", AND YOU ARE INSIDE THE WELL HOUSE, SO "GET FOOD", "GET
|
||||
LAMP", "GET KEYS", "GET BOTTLE". NOW, THERE ARE THREE MAGIC WORDS YOU NEED TO
|
||||
USE. THEY ARE PLUGH, XYZZY AND PLOVER. TWO OF THESE WORDS ARE USED TO GET TO
|
||||
AND FROM THE WELLHOUSE AND PARTS OF THE CAVE. THE THIRD, PLOVER IS USED TO GET
|
||||
BETWEEN TWO PARTS OF THE CAVE. ANOTHER THING TO REMEMBER IS THAT YOUR LAMP
|
||||
LIGHT IS LIMITED, SO TURN OFF YOUR LAMP WHEN YOU DO NOT NEED IT!
|
||||
|
||||
NOW ON TO THE CAVE. SAY "PLUGH", THEN "LAMP ON", "S", "GET SILVER", "DROP
|
||||
KEYS", "DROP FOOD", "DROP BOTTLE", "N". YOU ARE NOW BACK AT Y2. HERE IS WHERE
|
||||
YOU USE PLOVER. SO SAY "PLOVER", THEN "NE", "GET PYRAMID", "S", "LAMP OFF",
|
||||
"DROP LAMP", "DROP SILVER", "DROP PYRAMID", "GET EMERALD", "W", "DROP EMERALD",
|
||||
"BACK". THE REASON YOU DID ALL OF THAT WAS THAT THE ONLY WAY TO GET THE
|
||||
EMERALD OUT OF THE PLOVER ROOM IS OUT THROUGH THE CRACK, BUT YOU CAN NOT CARRY
|
||||
ANYTHING ELSE WITH YOU.
|
||||
|
||||
NOW "GET LAMP", "GET SILVER", "GET PYRAMID", THEN "PLOVER" AND "PLUGH". YOU
|
||||
ARE NOW BACK IN THE WELLHOUSE, SO DROP OFF YOUR TREASURES SO FAR. TYPE "DROP
|
||||
SILVER", "DROP PYRAMID". BACK TO THE CAVE WITH "XYZZY", AND "LAMP ON", "E",
|
||||
"GET CAGE", "W", "GET ROD", "W", "W","DROP ROD", "GET BIRD", "GET ROD", "W",
|
||||
"D","W", "WAVE ROD". THERE IS NOW A CRYSTAL BRIDGE ACROSS THE CHASM. CONTINUE
|
||||
WITH "DROP ROD", THEN GO "W", "GET DIAMONDS", "E", "E", "S", "GET GOLD", "N",
|
||||
"D". AT THIS POINT YOU WILL SEE A HUGE GREEN SNAKE BARING YOUR WAY. TO BE RID
|
||||
OF THE SNAKE, "DROP BIRD", AND THE SNAKE IS DRIVEN AWAY.
|
||||
|
||||
AT THIS POINT I NEED TO EXPLAIN SOMETHING ELSE. DURING THE COURSE OF THE
|
||||
GAME, A DWARF WILL SEEK YOU OUT AND THROW AN AXE AT YOU. GET THE AXE. THE
|
||||
NEXT TIME YOU SEE THE DWARF, THROW THE AXE AT HIM TO KILL HIM. THIS MAY HAPPEN
|
||||
SEVERAL TIMES, SO JUST KEEP KILLING THE DWARVES. ANOTHER PERSON TO WATCH OUT
|
||||
FOR IS THE PIRATE. HE WILL SHOW UP AT SOME POINT IN THE GAME, AND STEAL
|
||||
WHATEVER TREASURES YOU ARE CARRYING. IF THIS HAPPENS, YOU CAN GET THE
|
||||
TREASURES BACK WHEN YOU FIND HIS TREASURE CHEST.
|
||||
|
||||
CONTINUE WITH "DROP CAGE", "SW", "W". HERE IS A DRAGON SITTING ON A PERSIAN
|
||||
RUG. YOU NEED TO KILL THE DRAGON TO GET THE RUG SO TYPE "KILL DRAGON". THE
|
||||
GAME WILL RESPOND WITH "WITH WHAT? YOUR BARE HANDS?". ANSWER "YES".
|
||||
CONGRATULATIONS, YOU HAVE NOW KILLED THE DRAGON!. SO, "GET RUG", THEN "E",
|
||||
"E", "S", "GET JEWELRY", "N", "W", "GET COINS", "E", "N", "N", "LAMP OFF", AND
|
||||
"PLUGH". YOU ARE AGAIN BACK IN THE WELLHOUSE, SO DROP YOUR TREASURES WITH
|
||||
"DROP DIAMONDS", "DROP GOLD", "DROP RUG", "DROP JEWELRY", "DROP COINS". BACK
|
||||
TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "GET FOOD", "GET KEYS", "GET
|
||||
BOTTLE", "D", "W", "D", "W", "W", THEN SAY "ORIENTAL" TO GET TO THE ORIENTAL
|
||||
ROOM. THEN "GET VASE", "W", "DROP KEYS", "DROP FOOD", "BACK", "N", "W", AND
|
||||
YOU HAVE NOW FOUND THE EMERALD YOU PREVIOUSLY PLACED THERE. SO "GET EMERALD",
|
||||
"NW", "S", "SE", "E", "GET PILLOW". THE PILLOW IS USED TO PLACE THE VASE ON,
|
||||
SO YOU DON'T BREAK IT.
|
||||
|
||||
NOW GO "BACK", "W", "W", "D", "WATER PLANT", "U". THE PLANT IS CRYING FOR MORE
|
||||
WATER, SO NOW YOU NEED TO GO GET IT SOME WATER. BUT BEFORE YOU DO THAT DROP
|
||||
OFF YOUR TREASURES AT THE WELL- HOUSE BY GOING "E", "E", "NE", "E", "U", "E",
|
||||
"U", "N", "LAMP OFF", "PLUGH" AND YOU ARE BACK IN THE WELLHOUSE. SO "DROP
|
||||
PILLOW", "DROP VASE", "DROP EMERALD".
|
||||
|
||||
BACK TO THE CAVE WITH "PLUGH", "LAMP ON", "S", "D", "E", "D", "FILL BOTTLE".
|
||||
YOUR BOTTLE IS NOW FILLED WITH WATER, SO GO "U", "W", "W", "D", "W", "W", "W",
|
||||
"W", "D", "WATER PLANT", "U", "E", "D", "GET OIL", "U", "W", "D". NOW YOU CAN
|
||||
CLIMB THE BEANSTALK SO, "CLIMB", "W", "GET EGGS", "N", "OIL DOOR", "DROP
|
||||
BOTTLE", "N", "GET TRIDENT", "W", "D", "DROP TRIDENT", "GET KEYS", "GET FOOD",
|
||||
"SW", "U". YOU ARE NOW IN FRONT OF A BRIDGE WITH A TROLL GUARDING IT. THE
|
||||
ONLY THING THAT WILL CAUSE THE TROLL TO LEAVE IS TO THROW HIM A TREASURE.
|
||||
THERE IS ONLY ONE TREASURE YOU CAN THROW HIM AND THAT IS THE EGGS. SO "THROW
|
||||
EGGS", THEN "CROSS".
|
||||
|
||||
YOU ARE NOW ACROSS THE CHASM. CONTINUE WITH "NE", "E", "NE", "E", "GET
|
||||
SPICES", "W", "N", (HERE IS THE VOLCANO), "S", "S", "SE", "S", "IN". YOU ARE
|
||||
NOW IN A ROOM WITH A FEROCIOUS BEAR, WHO IS LOCKED UP WITH A GOLD CHAIN. YOU
|
||||
NEED TO GET THE CHAIN, SO "FEED BEAR", THEN "UNLOCK" THE CHAIN, "GET BEAR",
|
||||
"GET CHAIN", "DROP KEYS", AND "OUT". THE BEAR WILL NOW FOLLOW YOU WHEREVER YOU
|
||||
GO. SO GO "U", "U", "W", "W", AND "CROSS". FROM NOWHERE, THE TROLL APPEARS
|
||||
AGAIN. JUST "DROP BEAR", AND THE TROLL WILL DISAPPEAR. NOW "CROSS" THE
|
||||
BRIDGE, THEN GO "SW", "D", "GET TRIDENT", "SE", "SE", "NE", "E", "N". YOU ARE
|
||||
IN THE CLAM ROOM, SO NOW "OPEN CLAM". (IT IS NECESSARY TO HAVE THE TRIDENT
|
||||
BEFORE YOU CAN OPEN THE CLAM). NOW YOU NEED TO GO AFTER THE PEARL SO GO "D",
|
||||
"D", "GET PEARL". THEN "U", "U", "S", "U", "E", "U", "N", "LAMP OFF", AND SAY
|
||||
"PLUGH". THEN "DROP CHAIN", "DROP PEARL", "DROP TRIDENT", "DROP SPICES".
|
||||
|
||||
BACK TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "D", "W", "D", "W", "W",
|
||||
"W", "W", "D", "CLIMB", "W". YOU ARE NOW BACK AT THE SPOT WHERE YOU ORIGINALLY
|
||||
FOUND THE EGGS WHICH YOU THREW TO THE TROLL. THE REASON YOU THREW THE EGGS WAS
|
||||
BECAUSE YOU CAN GET THEM BACK AGAIN! JUST SAY "FEE", "FIE", "FOE", "FOO", AND
|
||||
THEY MAGICALLY APPEAR! SO "GET EGGS", THEN "N", "N", "W", "D", "SE", "SE",
|
||||
"NE", "E", "U", "E", "U", "N", "LAMP OFF", AND "PLUGH". THEN "DROP EGGS".
|
||||
|
||||
NOW ON TO FIND THE LAST TREASURE, THE PIRATE'S CHEST! GO THERE WITH "PLUGH",
|
||||
"LAMP ON", "E", "U", "W", "W", "W", "S", "E", "S", "S", "S", "N", "E", "E",
|
||||
"NW", "GET CHEST", "BACK", "N", "D", "E", "E", "XYZZY". YOU ARE BACK AT THE
|
||||
BUILDING, SO "DROP CHEST". CONGRATULATIONS, YOU NOW HAVE ALL 15 TREASURES!
|
||||
|
||||
AT THIS POINT YOU HAVE ONE MORE THING TO ACCOMPLISH BEFORE YOU GO THE THE GRAND
|
||||
FINALE. SO SAY "XYZZY", THEN GO "W", "W", "W", "D", "D", "N", "D", "W", "D",
|
||||
"E", "GET MAGAZINES". YOUR QUEST IS TO TAKE THE MAGAZINES, AND PLACE THEM JUST
|
||||
INSIDE WITT'S END. THIS ACTION IS OFTEN MISSED BY PEOPLE PLAYING THIS GAME,
|
||||
AND AS A RESULT, THEY DO NOT FINISH THE GAME WITH ALL 350 POINTS AND THE GRAND
|
||||
MASTER STATUS. NOW GO "E", THEN "DROP MAGAZINES", AND "BACK".
|
||||
|
||||
NOW COMES THE EASY PART, JUST WANDER AROUND THESE PASSAGES, AS YOU NOW HAVE
|
||||
SOME TIME TO KILL. THE GAME GIVES YOU A SET NUMBER A MOVES AFTER ALL THE
|
||||
TREASURES ARE IN THE WELLHOUSE, AND THEN YOU ARE TRANSPORTED TO THE GRAND
|
||||
FINALE. THE MESSAGE YOU WILL GET WILL START BY SAYING "THE CAVE IS NOW
|
||||
CLOSED", ECT. AT THIS POINT YOU ARE TRANSPORTED TO THE NORTHEAST END OF AN
|
||||
IMMENSE ROOM. DO THE FOLLOWING: "SW", "GET ROD", "NE", "DROP ROD", "SW".
|
||||
WHAT YOU HAVE DONE IS PLACED A STICK OF DYNAMITE AT THE OPPOSITE END OF THE
|
||||
ROOM. NOW YOU SAY THE MAGIC WORD - "BLAST". YOU HAVE NOW EXPLODED A HOLE IN
|
||||
THE FAR WALL, AND YOU MARCH THROUGH IT INTO THE MAIN OFFICE. YOU HAVE NOW
|
||||
FINISHED THE GAME OF ADVENTURE!
|
||||
|
||||
|
BIN
textfiles.com/100/angela.art
Normal file
BIN
textfiles.com/100/angela.art
Normal file
Binary file not shown.
778
textfiles.com/100/anonymit
Normal file
778
textfiles.com/100/anonymit
Normal file
@@ -0,0 +1,778 @@
|
||||
From caf-talk Caf Jun 8 19:52:43 1992
|
||||
Newsgroups: comp.society
|
||||
Subject: Anonymity and privacy on the network
|
||||
Message-ID: <92083.072152SOCICOM@auvm.american.edu>
|
||||
Date: 23 Mar 92 12:21:52 GMT
|
||||
Organization: The American University - University Computing Center
|
||||
Lines: 759
|
||||
Approved: SOCICOM@AUVM
|
||||
|
||||
|
||||
Moderator's note: The following article is a lengthy excerpt from a
|
||||
recent issue of FIDONEWS concerning individual privacy and the use of
|
||||
aliases or handles in computer-based communications. It was submitted by
|
||||
a comp.society reader who used a handle; because the excerpt is a cross-
|
||||
post from another electronic publication, I have taken the liberty of
|
||||
viewing the use of a handle by sender as a request for privacy and
|
||||
anonymity similar to the request a newspaper editor might receive in a
|
||||
letter to the editor. Thus, while reprinting the submission, the name
|
||||
and address of the sender are "withheld upon request." The article
|
||||
raises a number of good points; the submission by a reader using a handle
|
||||
to preserve anonymity makes a point; and the editorial action of
|
||||
submitting the reader's posting anonymously makes the question current.
|
||||
What are the implications of using aliases on the net?
|
||||
|
||||
Greg Welsh, moderator, comp.society
|
||||
Internet: Socicom@american.edu
|
||||
Bitnet: Socicom@auvm.bitnet
|
||||
|
||||
[begin excerpt]
|
||||
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
|
||||
The newsletter of the |
|
||||
FidoNet BBS community | Published by:
|
||||
_ |
|
||||
/ \ | "FidoNews" BBS
|
||||
/|oo \ | (415)-863-2739
|
||||
(_| /_) | FidoNet 1:1/1
|
||||
_`@/_ \ _ | Internet:
|
||||
| | \ \\ | fidonews@fidonews.fidonet.org
|
||||
| (*) | \ )) |
|
||||
|__U__| / \// | Editors:
|
||||
_//|| _\ / | Tom Jennings
|
||||
(_/(_|(____/ | Tim Pozar
|
||||
(jm) |
|
||||
----------------------------+---------------------------------------
|
||||
Published weekly by and for the Members of the FidoNet international
|
||||
amateur network. Copyright 1992, Fido Software. All rights reserved.
|
||||
Duplication and/or distribution permitted for noncommercial purposes
|
||||
only. For use in other circumstances, please contact FidoNews.
|
||||
|
||||
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
|
||||
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
|
||||
|
||||
For more information about FidoNews refer to the end of this file.
|
||||
--------------------------------------------------------------------
|
||||
|
||||
|
||||
[...some editing...]
|
||||
======================================================================
|
||||
ARTICLES
|
||||
======================================================================
|
||||
|
||||
|
||||
The Joy of Handles
|
||||
Mahatma Kane Jeeves
|
||||
101/138.8
|
||||
David Lescohier
|
||||
101/138.0
|
||||
|
||||
|
||||
|
||||
|
||||
THE JOY OF HANDLES
|
||||
------------------
|
||||
or:
|
||||
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
|
||||
(but have no right to ask)
|
||||
--------------------------
|
||||
|
||||
|
||||
* * * * *
|
||||
|
||||
|
||||
We should never so entirely avoid danger as to appear
|
||||
irresolute and cowardly. But, at the same time, we should
|
||||
avoid unnecessarily exposing ourselves to danger, than
|
||||
which nothing can be more foolish. [Cicero]
|
||||
|
||||
|
||||
* * * * *
|
||||
|
||||
|
||||
|
||||
Do you trust me?
|
||||
|
||||
If you participate in computer conferencing, and you use
|
||||
your real name, then you'd better.
|
||||
|
||||
"Why?", you ask. "What can you do with my name?" To start
|
||||
with, given that and your origin line, I can probably look
|
||||
you up in your local phone book, and find out where you
|
||||
live. Even if you are unlisted, there are ways to locate
|
||||
you based on your name. If you own any property, or pay any
|
||||
utility bills, your address is a matter of public record.
|
||||
Do you have children in the public schools? It would be
|
||||
easy to find out. But that's just the beginning.
|
||||
|
||||
Former Chairman of the U.S. Privacy Protection Commission
|
||||
David F. Linowes, in his book "Privacy in America" (1989),
|
||||
writes of New York private investigator Irwin Blye:
|
||||
|
||||
"Challenged to prove his contention that, given a little
|
||||
time and his usual fee, he could learn all about an
|
||||
individual without even speaking with him, Blye was
|
||||
presented with a subject -- a New Jersey
|
||||
newspaperman.... The result was a five-page, single-
|
||||
spaced, typed report which documented, though not always
|
||||
accurately, a wide sweep of the journalist's past, and
|
||||
was detailed to the point of disclosing his father's
|
||||
income before his retirement."
|
||||
|
||||
Who am I? If I don't post, you might not even know I exist.
|
||||
I could be on your local Police Department, or an agent
|
||||
working with the IRS, or some federal law-enforcement
|
||||
agency. I could be a member of some fanatical hate group,
|
||||
or criminal organization. I might even be a former Nixon
|
||||
White-House staffer!
|
||||
|
||||
I could be that pyromaniacal teenager you flamed last
|
||||
weekend, for posting a step-by-step description of how he
|
||||
made plastic explosive in his high-school chem lab. He
|
||||
seemed kind of mad.
|
||||
|
||||
But you're an upstanding citizen; you have nothing to hide.
|
||||
So why not use your name on the nets? Trust me. There's
|
||||
nothing to worry about.
|
||||
|
||||
Is there?
|
||||
|
||||
* * * * *
|
||||
|
||||
WHAT'S ALL THIS BROUHAHA?
|
||||
-------------------------
|
||||
|
||||
Stupidity is evil waiting to happen. [Clay Bond]
|
||||
|
||||
|
||||
Not long ago in Fidonet's BCSNET echo (the Boston Computer
|
||||
Society's national conference), the following was posted by
|
||||
the conference moderator to a user calling himself "Captain
|
||||
Kirk":
|
||||
|
||||
"May we ask dear Captain Kirk that it would be very
|
||||
polite if you could use your real name in an echomail
|
||||
conference? This particular message area is shared
|
||||
with BBS's all across the country and everyone else is
|
||||
using their real name. It is only common courtesy to
|
||||
do so in an echomail conference."
|
||||
|
||||
One of us (mkj) responded with a post questioning that
|
||||
policy. Soon the conference had erupted into a heated
|
||||
debate! Although mkj had worried that the subject might be
|
||||
dismissed as trivial, it apparently touched a nerve. It
|
||||
brought forth debate over issues and perceptions central to
|
||||
computer communications in general, and it revealed profound
|
||||
disparities in fundamental values and assumptions among
|
||||
participants.
|
||||
|
||||
This article is a response to that debate, and to the
|
||||
prevailing negative attitudes regarding the use of handles.
|
||||
Handles seem to have a bad reputation. Their use is
|
||||
strangely unpopular, and frequently forbidden by network
|
||||
authorities. Many people seem to feel that handles are rude
|
||||
or dishonest, or that anyone wishing to conceal his or her
|
||||
identity must be up to no good. It is the primary purpose
|
||||
of this article to dispel such prejudices.
|
||||
|
||||
Let us make one thing perfectly clear here at the outset: We
|
||||
do NOT challenge the need or the right of sysops to know the
|
||||
identities of their users! But we do believe that a sysop
|
||||
who collects user names has a serious responsibility to
|
||||
protect that information. This means making sure that no
|
||||
one has access to the data without a legal warrant, and it
|
||||
certainly means not pressuring users to broadcast their real
|
||||
names in widespread public forums such as conferences.
|
||||
|
||||
* * * * *
|
||||
|
||||
SO YOU WANT TO BE A STAR?
|
||||
-------------------------
|
||||
|
||||
John Lennon died for our sins. [anonymous]
|
||||
|
||||
|
||||
Andy Warhol said that "In the future, everyone will be
|
||||
famous for fifteen minutes". The computer nets, more than
|
||||
any other medium, lend credibility to this prediction. A
|
||||
network conference may span the globe more completely than
|
||||
even satellite TV, yet be open to anyone who can afford the
|
||||
simplest computer and modem. Through our participation in
|
||||
conferencing, each of us becomes, if only briefly, a public
|
||||
figure of sorts -- often without realizing it, and without
|
||||
any contemplation of the implications and possible
|
||||
consequences.
|
||||
|
||||
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
|
||||
periodic surveys of Usenet conference readership. His
|
||||
statistical results for the end of 1991 show that of the
|
||||
1,459 conferences which currently make up Usenet, more than
|
||||
fifty percent have over 20,000 readers apiece; the most
|
||||
popular conferences are each seen by about 200,000 readers!
|
||||
Mr. Reid's estimate of total Usenet readership is nearly TWO
|
||||
MILLION people.
|
||||
|
||||
Note that Mr. Reid's numbers are for Usenet only; they do
|
||||
not include any information on other large public nets such
|
||||
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
|
||||
they take into account thousands of private networks which
|
||||
may have indirect public network connections. The total
|
||||
number of users with access to public networks is unknown,
|
||||
but informed estimates range to the tens of millions, and
|
||||
the number keeps growing at an amazing pace -- in fact, the
|
||||
rate of growth of this medium may be greater than any other
|
||||
communications medium in history.
|
||||
|
||||
The special problems and risks which arise when one deals
|
||||
with a large public audience are something about which most
|
||||
computer users have little or no experience or
|
||||
understanding. Until recently, those of us involved in
|
||||
computer conferencing have comprised a small and rather
|
||||
elite community. The explosion in network participation is
|
||||
catching us all a little unprepared.
|
||||
|
||||
Among media professionals and celebrities, on the other
|
||||
hand, the risks of conducting one's business in front of a
|
||||
public audience are all too familiar. If the size of one's
|
||||
audience becomes sufficiently large, one must assume that
|
||||
examples of virtually every personality type will be
|
||||
included: police and other agents of various governments,
|
||||
terrorists, murderers, rapists, religious fanatics, the
|
||||
mentally ill, robbers and con artists, et al ad infinitum.
|
||||
It must also be assumed that almost anything you do, no
|
||||
matter how innocuous, could inspire at least one person,
|
||||
somewhere, to harbor ill will toward you.
|
||||
|
||||
The near-fatal stabbing of actress Theresa Saldana is a case
|
||||
in point. As she was walking to her car one morning near her
|
||||
West Hollywood apartment, a voice behind her asked, "Are you
|
||||
Theresa Saldana?"; when she turned to answer, a man she had
|
||||
never seen before pulled out a kitchen knife and stabbed her
|
||||
repeatedly.
|
||||
|
||||
After her lengthy and painful recovery, she wrote a book on
|
||||
the experience ("Beyond Survival", 1986). In that book she
|
||||
wrote:
|
||||
|
||||
|
||||
[pg 12] "... Detective Kalas informed me that the
|
||||
assailant, whom he described as a Scottish drifter, had
|
||||
fixated upon me after seeing me in films."
|
||||
|
||||
[pg 28] "... it was through my work as an actress that
|
||||
the attacker had fixated on me. Naturally, this made
|
||||
me consider getting out of show business ..."
|
||||
|
||||
[pg 34] "For security, I adopted an alias and became
|
||||
'Alicia Michaels.' ... during the months that followed
|
||||
I grew so accustomed to it that, to this day, I still
|
||||
answer reflexively when someone calls the name Alicia!"
|
||||
|
||||
Or consider the fate of Denver radio talk show host Alan
|
||||
Berg, who in 1984 died outside his home in a hail of
|
||||
gunfire. Police believe he was the victim of a local neo-
|
||||
nazi group who didn't like his politics.
|
||||
|
||||
We are reminded of the murders of John Lennon and Rebecca
|
||||
Shaffer; the Reagan/Hinckley/Foster incident; and a long
|
||||
string of other "celebrity attacks" of all sorts, including
|
||||
such bizarre events as the occupation of David Letterman's
|
||||
home by a strange woman who claimed to be his wife! There is
|
||||
probably no one in public life who doesn't receive at least
|
||||
the occassional threatening letter.
|
||||
|
||||
Of course, ordinary participants in network conferencing may
|
||||
never attract quite the attention that other types of
|
||||
celebrities attract. But consider the following, rather less
|
||||
apocalyptic scenarios:
|
||||
|
||||
-- On Friday night you post a message to a public
|
||||
conference defending an unpopular or controversial
|
||||
viewpoint. On Monday morning your biggest client
|
||||
cancels a major contract. Or you are kept up all
|
||||
night by repeated telephone calls from someone
|
||||
demanding that you "stop killing babies"!
|
||||
|
||||
-- You buy your teenage son or daughter a computer and
|
||||
modem. Sometime later you find your lawn littered
|
||||
with beer bottles and dug up with tire marks, or
|
||||
your home vandalized or burglarized.
|
||||
|
||||
-- One day you are nominated to the Supreme Court. Who
|
||||
are all these strange people on TV claiming to be
|
||||
your friends? How did that fellow know your position
|
||||
on abortion? Your taste in GIFs?
|
||||
|
||||
Celebrities and other professional media personalities
|
||||
accept the risks and sacrifices of notoriety, along with the
|
||||
benefits, as part of their chosen careers. Should computer
|
||||
conference participants be expected to do the same? And who
|
||||
should be making these decisions?
|
||||
|
||||
* * * * *
|
||||
|
||||
OTHER MEDIA
|
||||
-----------
|
||||
|
||||
When thou art at Rome, do as they do at Rome [Cervantes]
|
||||
|
||||
|
||||
Older media seem to address the problems of privacy very
|
||||
differently than computer media, at least so far. We are
|
||||
not aware of ANY medium or publication, apart from computer
|
||||
conferencing, where amateur or even most professional
|
||||
participants are required to expose their true names against
|
||||
their will. Even celebrities frequently use "stage names",
|
||||
and protect their addresses and phone numbers as best they
|
||||
can.
|
||||
|
||||
When a medium caters specifically to the general public,
|
||||
participants are typically given even greater opportunities
|
||||
to protect their privacy. Television talk shows have been
|
||||
known to go so far as to employ silhouetting and electronic
|
||||
alteration of voices to protect the identities of guests,
|
||||
and audience members who participate are certainly not
|
||||
required to state their full names before speaking.
|
||||
|
||||
The traditional medium most analogous to computer
|
||||
conferencing may be talk radio. Like conferencing, talk
|
||||
radio is a group discussion and debate medium oriented
|
||||
toward controversy, where emotions can run high. Programs
|
||||
often center around a specific topic, and are always run by
|
||||
a "host" whose role seems analogous in many respects to that
|
||||
of a conference moderator. It is therefore worth noting
|
||||
that in talk radio generally, policy seems to be that
|
||||
callers are identified on the air only by their first names
|
||||
(unless of course they volunteer more).
|
||||
|
||||
Finally, of course, authors have published under "pen names"
|
||||
since the dawn of publishing, and newspapers and magazines
|
||||
frequently publish letters to the editor with "name and
|
||||
address withheld by request" as the signature line. Even
|
||||
founding fathers Alexander Hamilton, James Madison and John
|
||||
Jay, in authoring the seminal Federalist Papers in 1787 for
|
||||
publication in the Letters columns of various New York City
|
||||
newspapers, concealed their identities behind the now-famous
|
||||
psuedonym "Publius".
|
||||
|
||||
What would you think if someone called a radio talk show
|
||||
demanding to know the identity of a previous caller? Such a
|
||||
demand would undoubtedly be seen as menacing and
|
||||
inappropriate in that context. Yet that same demand seems
|
||||
to arise without much challenge each time a handle shows up
|
||||
in a computer conference. The authors of this article feel
|
||||
that such demands should always be looked upon as
|
||||
suspicious, and that it would be beneficial for moderators
|
||||
to take upon themselves the responsibility of making sure
|
||||
that besieged handle-users are aware of their right to
|
||||
refuse such inappropriate demands.
|
||||
|
||||
It is reasonable to assume that privacy policies in
|
||||
traditional media are the result of hard-won wisdom gained
|
||||
from long experience. Are we so arrogant that we cannot
|
||||
learn from others? It is not hard to imagine the sorts of
|
||||
problems and experiences which shaped these policies in the
|
||||
old media. Will we have to wait for similar problems to
|
||||
occur on the computer networks before we learn?
|
||||
|
||||
* * * * *
|
||||
|
||||
PRIVACY AND SURVEILLANCE
|
||||
------------------------
|
||||
|
||||
In an effort to identify people who fail to file tax
|
||||
returns, the Internal Revenue Service is matching
|
||||
its files against available lists of names and
|
||||
addresses of U.S. citizens who have purchased
|
||||
computers for home use. The IRS continues to seek
|
||||
out sources for such information. This information
|
||||
is matched against the IRS master file of taxpayers
|
||||
to see if those who have not filed can be
|
||||
identified.
|
||||
[COMPUTERWORLD, Sept. 1985]
|
||||
|
||||
Date: Thu, 23 May 91 11:58:07 PDT
|
||||
From: mmm@cup.portal.com
|
||||
Subject: The RISKS of Posting to the Net
|
||||
-
|
||||
I just had an interesting visit from the FBI. It
|
||||
seems that a posting I made to sci.space several
|
||||
months ago had filtered through channels, caused the
|
||||
FBI to open (or re-open) a file on me, and an agent
|
||||
wanted to interview me, which I did voluntarily...
|
||||
I then went on to tell him about the controversy
|
||||
over Uunet, and their role in supplying archives of
|
||||
Usenet traffic on tape to the FBI...
|
||||
[RISKS Digest]
|
||||
|
||||
Also frequent are instances where computers are
|
||||
seized incident to an unrelated arrest. For
|
||||
example, on February 28, 1991, following an arrest
|
||||
on charges of rape and battery, the Massachusetts
|
||||
state and local police seized the suspect's computer
|
||||
equipment. The suspect reportedly operated a 650-
|
||||
subscriber bulletin board called "BEN," which is
|
||||
described as "geared largely to a gay/leather/S&M
|
||||
crowd." It is not clear what the board's seizure is
|
||||
supposed to have accomplished, but the board is now
|
||||
shut down, and the identities and messages of its
|
||||
users are in the hands of the police.
|
||||
[CONSTITUTIONAL, LEGAL, AND ETHICAL
|
||||
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
|
||||
FILES IN THE AGE OF CYBERSPACE, Harvey A.
|
||||
Silverglate and Thomas C. Viles]
|
||||
|
||||
|
||||
Most of us have been brought up to be grateful for the fact
|
||||
that we live in a nation where freedom is sacred. In other
|
||||
countries, we are told as children, people are afraid to
|
||||
speak their minds for fear they are being watched. Thank
|
||||
God we live in America!
|
||||
|
||||
It would surprise most of us to learn that America is
|
||||
currently among the premiere surveillance nations in the
|
||||
world, but such, sadly, is indeed the case. Our leadership
|
||||
in technology has helped the U.S. government to amass as
|
||||
much information on its citizens as almost any other nation
|
||||
in history, totalitarian or otherwise. And to make matters
|
||||
worse, a consumer surveillance behemoth has sprung up
|
||||
consisting of huge private data-collection agencies which
|
||||
cater to business.
|
||||
|
||||
As Evan Hendricks, editor of "Privacy Times" (a Washington
|
||||
D.C.-based newsletter) has put it: "You go through life
|
||||
dropping bits and pieces of information about yourself
|
||||
everywhere. Most people don't realize there are big vacuum
|
||||
cleaners out there sucking it all up." [Wall Street
|
||||
Journal, March 14, 1991].
|
||||
|
||||
To get an idea of how much of your privacy has already been
|
||||
lost, consider the bits and pieces of information about
|
||||
yourself which are already available to investigators, and
|
||||
how thoroughly someone might come to know you by these clues
|
||||
alone.
|
||||
|
||||
A person's lifestyle and personality are largely described,
|
||||
for example, by his or her purchases and expenses; from your
|
||||
checking account records -- which banks are required by law
|
||||
to keep and make available to government investigators -- a
|
||||
substantial portrait of your life will emerge. Credit card
|
||||
records may reveal much of the same information, and can
|
||||
also be used to track your movements. (In a recent case,
|
||||
"missing" Massachusetts State Representative Timothy O'Leary
|
||||
was tracked by credit-card transactions as he fled across
|
||||
the country, and his movements were reported on the nightly
|
||||
news!)
|
||||
|
||||
Then there are your school records, which include IQ and
|
||||
other test results, comments on your "socialization" by
|
||||
teachers and others, and may reveal family finances in great
|
||||
detail. Employment and tax records reveal your present
|
||||
income, as well as personal comments by employers and co-
|
||||
workers. Your properties are another public record of your
|
||||
income and lifestyle, and possibly your social status as
|
||||
well. Telephone billing records reveal your personal and
|
||||
business associations in more detail. Insurance records
|
||||
reveal personal and family health histories and treatments.
|
||||
|
||||
All of this information is commonly accessed by government
|
||||
and private or corporate investigators. And this list is
|
||||
far from exhaustive!
|
||||
|
||||
Now consider how easily the computer networks lend
|
||||
themselves to even further erosions of personal privacy. The
|
||||
actual contents of our mail and telephone traffic have up to
|
||||
now been subjected to deliberate scrutiny only under
|
||||
extraordinary conditions. This built-in safety is due
|
||||
primarily to the difficulty and expense of conducting
|
||||
surveillance in these media, which usually requires extended
|
||||
human intervention. But in the medium of computer
|
||||
communications, most surveillance can be conducted using
|
||||
automated monitoring techniques. Tools currently available
|
||||
make it possible and even cost-effective for government and
|
||||
other interests to monitor virtually everything which
|
||||
happens here.
|
||||
|
||||
Why would anyone want to monitor network users? It is well
|
||||
documented that, throughout the 1960s and 1970s, the FBI and
|
||||
other agencies of government, in operations such as the
|
||||
infamous COINTELPRO among others, spent a great deal of time
|
||||
and effort collecting vast lists of names. As Computer
|
||||
Underground Digest moderators Jim Thomas and Gordon Meyer
|
||||
recalled in a recent commentary (CuD #3.42):
|
||||
|
||||
"A 1977 class action suit against the Michigan State
|
||||
Police learned, through FOIA requests, that state and
|
||||
federal agents would peruse letters to the editor of
|
||||
newspapers and collect clippings of those whose politics
|
||||
they did not like. These news clippings became the basis
|
||||
of files on those persons that found there way into the
|
||||
hands of other agencies and employers."
|
||||
|
||||
To get onto one of these government "enemies" lists, you
|
||||
often needed to do nothing more than telephone an
|
||||
organization under surveillance, or subscribe to the "wrong"
|
||||
types of magazines and newspapers. Groups engaged in
|
||||
political activism, including environmental and women's
|
||||
rights organizations, were commonly infiltrated. The sort
|
||||
of investigative reporting which uncovered these lists and
|
||||
surveillances back in the '60s and '70s is now rare, but
|
||||
there is little reason to assume that such activities have
|
||||
ceased or even slowed. In fact, progressive computerization
|
||||
of local police LEIU activities (Law Enforcement
|
||||
Intelligence Units, commonly known as "red squads") suggests
|
||||
that such activities may have greatly increased.
|
||||
|
||||
Within the realm of computer conferencing especially, there
|
||||
is ample reason to believe that systematic monitoring is
|
||||
being conducted by government and law-enforcement
|
||||
organizations, and perhaps by other hostile interests as
|
||||
well. In a recent issue of Telecom Digest
|
||||
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
|
||||
on the results of a recent Freedom of Information Act
|
||||
request for documents from the Secret Service:
|
||||
|
||||
" ... The documents also show that the Secret Service
|
||||
established a computer database to keep track of
|
||||
suspected computer hackers. This database contains
|
||||
records of names, aliases, addresses, phone numbers,
|
||||
known associates, a list of activities, and various
|
||||
[conference postings] associated with each individual."
|
||||
|
||||
But the privacy issues which surround computer
|
||||
communications go far beyond the collection of user lists.
|
||||
Both government and industry have long pursued the elusive
|
||||
grail of personality profiling on citizens and consumers. Up
|
||||
to now, such ambitions have been restrained by the practical
|
||||
difficulty and expense of collecting and analyzing large
|
||||
amounts of information on large numbers of citizens. But
|
||||
computer communications, more than any other technology,
|
||||
seems to hold out the promise that this unholy grail may
|
||||
finally be in sight.
|
||||
|
||||
To coin a phrase, never has so much been known by so few
|
||||
about so many. The information commonly available to
|
||||
government and industry investi-gators today is sufficient
|
||||
to make reliable predictions about our personalities,
|
||||
health, politics, future behavior, our vulnerabilities,
|
||||
perhaps even about our innermost thoughts and feelings. The
|
||||
privacy we all take for granted is, in fact, largely an
|
||||
illusion; it no longer exists in most walks of life. If we
|
||||
wish to preserve even the most basic minimum of personal
|
||||
privacy, it seems clear that we need to take far better care
|
||||
on the networks than we have taken elsewhere.
|
||||
|
||||
* * * * *
|
||||
|
||||
FREEDOM
|
||||
-------
|
||||
|
||||
Human beings are the only species with a history.
|
||||
Whether they also have a future is not so obvious.
|
||||
The answer will lie in the prospects for popular
|
||||
movements, with firm roots among all sectors of the
|
||||
population, dedicated to values that are suppressed
|
||||
or driven to the margins within the existing social
|
||||
and political order...
|
||||
[Noam Chomsky]
|
||||
|
||||
|
||||
In your day-to-day social interactions, as you deal with
|
||||
employers, clients, public officials, friends, acquaintances
|
||||
and total strangers, how often do you feel you can really
|
||||
speak freely? How comfortable are you discussing
|
||||
controversial issues such as religion, taxes, politics,
|
||||
racism, sexuality, abortion or AIDS, for example? Would you
|
||||
consider it appropriate or wise to express an honest opinion
|
||||
on such an issue to your boss, or a client? To your
|
||||
neighbors?
|
||||
|
||||
Most of us confine such candid discussions to certain
|
||||
"trusted" social contexts, such as when we are among our
|
||||
closest friends. But when you post to a network conference,
|
||||
your boss, your clients, and your neighbors may very well
|
||||
read what you post -- if they are not on the nets today,
|
||||
they probably will be soon, as will nearly everyone.
|
||||
|
||||
If we have to consider each post's possible impact on our
|
||||
social and professional reputations, on our job security and
|
||||
income, on our family's acceptance and safety in the
|
||||
community, it could be reckless indeed to express ourselves
|
||||
freely on the nets. Yet conferences are often geared to
|
||||
controversy, and inhibitions on the free expression of
|
||||
opinions can reduce traffic to a trickle, killing off an
|
||||
important conference topic or distorting a valuable sampling
|
||||
of public opinion.
|
||||
|
||||
More important still is the role computer networks are
|
||||
beginning to play in the free and open dissemination of news
|
||||
and information. Democracy is crippled if dissent and
|
||||
diversity in the media are compromised; yet even here in the
|
||||
U.S., where a "free press" is a cherished tradition, the
|
||||
bulk of all the media is owned by a small (and ever-
|
||||
shrinking) number of corporations, whose relatively narrow
|
||||
culture, interests and perspec-tives largely shape the
|
||||
public perception.
|
||||
|
||||
Computer communication, on the other hand, is by its nature
|
||||
very difficult to control or shape. Its resources are
|
||||
scattered; when one BBS goes bust (or is busted!), three
|
||||
others spring up in its place. The natural resiliency of
|
||||
computer communications (and other new, decentral-ized
|
||||
information technologies such as fax, consumer camcorders
|
||||
and cheap satellite links) is giving rise to a new brand of
|
||||
global "guerrilla journalism" which includes everyone, and
|
||||
defies efforts at suppression.
|
||||
|
||||
The power and value of this new journalistic freedom has
|
||||
recently shown itself during the Gulf War, and throughout
|
||||
Eastern Europe and the Soviet Union, as well as within the
|
||||
U.S. Just think of the depth and detail of information
|
||||
available on the nets regarding the Secret Service's recent
|
||||
"Operation Sundevil" and associated activities, compared to
|
||||
the grossly distorted, blatantly propagandistic coverage of
|
||||
those same activities given to the general public through
|
||||
the traditional media.
|
||||
|
||||
Historically, established power and wealth have seldom been
|
||||
disposed to tolerate uncontrolled media, and recent events
|
||||
in this country and elsewhere show that computer media are
|
||||
sometimes seen as threats to established interests as well.
|
||||
To understand the role of handles in this context, it is
|
||||
useful to note the flurries of anti-handle sentiment which
|
||||
have arisen in the wake of crackdowns such as Sundevil, or
|
||||
the Tom Tcimpidis raid in the early 1980s. Although few
|
||||
charges and fewer convictions have typically resulted from
|
||||
such operations, one might be tempted to speculate that the
|
||||
real purposes -- to terrorize the nets and chill freedoms of
|
||||
speech and assembly thereon -- have been achieved.
|
||||
|
||||
In this way, sysops and moderators become unwitting
|
||||
accomplices in the supression of freedom on the networks.
|
||||
When real name requirements are instituted, anyone who fears
|
||||
retaliation of any sort, by any group, will have to fear
|
||||
participation in the nets; hence content is effectively
|
||||
controlled. This consideration becomes especially important
|
||||
as the nets expand into even more violent and repressive
|
||||
countries outside the U.S.
|
||||
|
||||
We must decide whether freedom of information and open
|
||||
public discussion are in fact among the goals of network
|
||||
conferencing, and if so, whether handles have a role in
|
||||
achieving these goals. As access to the networks grows, we
|
||||
have a rare opportunity to frustrate the efforts of
|
||||
governments and corporations to control the public mind! In
|
||||
this way above all others, computers may have the potential
|
||||
to shape the future of all mankind for the better.
|
||||
|
||||
* * * * *
|
||||
|
||||
A CALL TO ACTION
|
||||
----------------
|
||||
|
||||
|
||||
The move to electronic communication may be a turning
|
||||
point that history will remember. Just as in
|
||||
seventeenth and eighteenth century Great Britain and
|
||||
America a few tracts and acts set precedents for
|
||||
print by which we live today, so what we think and do
|
||||
today may frame the information system for a
|
||||
substantial period in the future.
|
||||
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
|
||||
|
||||
|
||||
There was a time when anybody with some gear and a few
|
||||
batteries could become a radio broadcaster -- no license
|
||||
required. There was a time when anyone with a sense of
|
||||
adventure could buy a plane, and maybe get a contract to
|
||||
carry mail. Those early technological pioneers were
|
||||
probably unable to imagine the world as it is today, but
|
||||
their influence is strongly felt in current laws,
|
||||
regulations and policies with roots in the traditions and
|
||||
philosophies they founded and shaped.
|
||||
|
||||
Today the new pioneers are knitting the world together with
|
||||
computers, and the world is changing faster than ever. Law
|
||||
and ethics are scrambling to keep up. How far will this
|
||||
growth take us? No one can say for sure. But you don't
|
||||
need a crystal ball to see that computer communications has
|
||||
the potential to encompass and surpass all the functionality
|
||||
of prior media -- print, post, telegraph, telephone, radio
|
||||
and television -- and more. It seems reasonable to assume
|
||||
that computer communications will be at least as ubiquitous
|
||||
and important in the lives of our grandchildren as all the
|
||||
older media have been in ours.
|
||||
|
||||
It will be a world whose outlines we can now make out only
|
||||
dimly. But the foundations of that world are being built
|
||||
today by those of us exploring and homesteading on the
|
||||
electronic frontier. We need to look hard at what it will
|
||||
take to survive in the information age.
|
||||
|
||||
In this article we have attempted to show, for one very
|
||||
narrow issue, what some of the stakes may be in this future-
|
||||
building game. But the risks associated with exposing your
|
||||
name in a computer conference are not well defined, and
|
||||
various people will no doubt assess the importance of these
|
||||
risks differently. After all, most of us take risks every
|
||||
day which are probably greater than the risks associated
|
||||
with conferencing. We drive on the expressway. We eat
|
||||
sushi. To some people, the risks of conferencing may seem
|
||||
terrifying; to others, insignificant.
|
||||
|
||||
But let us not get side-tracked into unresolvable arguments
|
||||
on the matter. The real issue here is not how dangerous
|
||||
conferencing may or may not be; it is whether you and I will
|
||||
be able to make our own decisions, and protect ourselves (or
|
||||
not) as we see fit. The obvious answer is that users must
|
||||
exercise their collective power to advance their own
|
||||
interests, and to pressure sysops and moderators to become
|
||||
more sensitive to user concerns.
|
||||
|
||||
To help in that effort, we would like to recommend the
|
||||
following guidelines for user action:
|
||||
|
||||
-- Bear in mind John Perry Barlow's observation that
|
||||
"Liberties are preserved by using them". Let your
|
||||
sysop know that you would prefer to be using a
|
||||
handle, and use one wherever you can.
|
||||
|
||||
-- Try to support boards and conferences which allow
|
||||
handles, and avoid those which don't.
|
||||
|
||||
-- When using a handle, BEHAVE RESPONSIBLY! There will
|
||||
always be irresponsible users on the nets, and they
|
||||
will always use handles. It is important for the
|
||||
rest of us to fight common anti-handle prejudices by
|
||||
showing that handles are NOT always the mark of an
|
||||
irresponsible user!
|
||||
|
||||
-- Educate others about the importance of handles (but
|
||||
NEVER argue or flame anyone about it).
|
||||
|
||||
To sysops and moderators: We ask you to bear in mind that
|
||||
authority is often used best where it is used least. Grant
|
||||
users the right to engage in any harmless and responsible
|
||||
behaviors they choose. Protect your interests in ways which
|
||||
tread as lightly as possible upon the interests of others.
|
||||
The liberties you preserve may be your own!
|
||||
|
||||
In building the computer forums of today, we are building
|
||||
the social fabric of tomorrow. If we wish to preserve the
|
||||
free and open atmosphere which has made computer networking
|
||||
a powerful force, while at the same time taking care against
|
||||
the risks inherent in such a force, handles seem to be a
|
||||
remarkably harmless, entertaining and effective tool to help
|
||||
us. Let's not throw that tool away.
|
||||
|
||||
----------------------------------------------------------------------
|
||||
[end of excerpt]
|
||||
|
||||
|
||||
--
|
||||
David Collier-Brown, | davecb@Nexus.YorkU.CA | lethe!dave
|
||||
72 Abitibi Ave., |
|
||||
Willowdale, Ontario, | He's so smart he's dumb.
|
||||
CANADA. 416-223-8968 | -- Joyce Collier-Brown
|
||||
|
||||
From caf-talk Caf Jun 10 00:17:10 1992
|
||||
|
493
textfiles.com/100/applemaf.hum
Normal file
493
textfiles.com/100/applemaf.hum
Normal file
@@ -0,0 +1,493 @@
|
||||
|
||||
No such file
|
||||
|
||||
(>View: THE APPLE MAFIA F STORY/F/THE SA
|
||||
|
||||
*******************************************************************************
|
||||
******* *******
|
||||
******* The Apple Mafia Story *******
|
||||
******* *******
|
||||
******* As Told To: Red Ghost *******
|
||||
******* *******
|
||||
*******************************************************************************
|
||||
|
||||
The reason I'm writing this file is to (hopefully) once and for all, clear up
|
||||
all the rumors, false statements, and just lies, that are going around about
|
||||
one of the first 3 pirate groups ever. (Untouchables, Apple Mafia, Dirty Dozen)
|
||||
|
||||
I won't get into the other two, because there already is "The Untouchables"
|
||||
story, and I'm not qualified to make comments about the Dirty Dozen.
|
||||
|
||||
Everything in this file is fact. I grew up in Queens NY (now 718). Where many
|
||||
of the "original" pirates and phreaks, were from. Many of the readers will
|
||||
question certain aspects of this file, or my authority to write it. But they
|
||||
are always more than welcome to go to the sources themselves and find the truth
|
||||
is what I am writing.
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
To begin with, I'm now 22 and going to college. I have been out of the "wares
|
||||
world" for the better part of 2 years. What prompted me to write this is a
|
||||
younger friend of mine, who is now a "pirate" and spends his life calling all
|
||||
the boards, and getting all the wares (Not making fun of anyone, I went
|
||||
through the same phase when I started, but it was very different from the
|
||||
pirates world of today). About a week ago he told me about the "Apple Mafia"
|
||||
regrouping. I said bullshit. And I was right. He gave me some of the files
|
||||
on discussions now going on about the "new" "apple mafia" and I must say it's
|
||||
pretty sad.
|
||||
|
||||
I felt the real story of what went on should be told, so here it is.
|
||||
|
||||
One more thing before I start. I was never in the Apple Mafia, or any of the
|
||||
other groups mentioned here. I never had that deep an interest in computers
|
||||
as anything but game machines or better typewriters. But I grew up in close
|
||||
proximety to many of the people involved, and spent time with them in other
|
||||
areas besides computers.
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
From the messages posted about the controversy I have seen. I think it might be
|
||||
best to go through them 1 by 1. So here's the first one:
|
||||
|
||||
(Buffer of msg's. Untouched by me, except the conversion from 40 to 80 cols.)
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
To:The Fake Apple Mafia From:Disk Rigger
|
||||
|
||||
You are definatly not the real Apple Mafia. It was a popular group a while ago.
|
||||
It incluted Bioc Agent 003, Tuc, Hight Technology, Creative Cracker and a few
|
||||
others. I will inform them of you losers using there names and you will be
|
||||
ragged out of your minds. I would recomend you changed your group name or you
|
||||
will feel the wrath of Bioc!
|
||||
This is serious and you losers can keep your unoriginal name but You will pay
|
||||
for it.
|
||||
|
||||
|
||||
(Someone's reply.)
|
||||
|
||||
|
||||
Disk Digger:
|
||||
Get a life dude. The Apple Mafia is OVER. BIOC Agent was thrown out of
|
||||
the Apple Mafia. The final members were Tuc, Lord Digital, Creative
|
||||
Cracker, High Technology, Big Brother the Phantom, Silicon Scorpion, &
|
||||
Sherlock Apple. Nobody is going to Feel the wrath of Bioc
|
||||
(hahahahahhahahahahha). because 1. he quit the phreak/pirate world over a year
|
||||
ago. 2. if he WAS around he wouldnt give a shit. 3. The old members who are
|
||||
still around probably care even less.
|
||||
|
||||
|
||||
(Someone elses reply.)
|
||||
|
||||
|
||||
While the new "apple mafia" (get a life you fuckups. you might as well call
|
||||
yourselves the Untouchables.) are idiots.
|
||||
new warez r0dentz who sure as hell weren't around when the REAL apple mafia was
|
||||
around, are even bigger r0dents. This means YOU disk digger.
|
||||
Naming yourself after a program used to pack new wherez. get a life you fat
|
||||
fuckup. And if the people in the apple mafia knew YOU were throwing their names
|
||||
around on a fucking catfur, YOU are the one they would be mad at.
|
||||
|
||||
FUckup
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
Despite incorrect statements in both parties messeges, this seems like a good
|
||||
time to point out that Bioc Agent was never in the Apple Mafia to begin with.
|
||||
The members changed through time, but Bioc was never a member. (More on him at
|
||||
a later time) The Final members were: (If you doubt this, then boot up any ware
|
||||
cracked by them in 84-85. Which was the final regrouping of the Mafia)
|
||||
|
||||
The Godfather (Charles). The Phantom (Eric). Creative Cracker (Marc).
|
||||
High Technology (Craig). Lord Digital (Patrick). Jacque Lafitte (Jack).
|
||||
The Magnet (Joe). Sherlock Apple (Dave). Silicon Scorpion (Mark).
|
||||
Data Dragon (Jordon). Big Brother (Andy). & towards the very end: Tuc (Scott).
|
||||
|
||||
Former members who were thrown out or quit: The Parasite, Tylenol Cyanide,
|
||||
Yosemite Sam, and people I don't remember from CA.
|
||||
|
||||
(More Messages)
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
Number > 7
|
||||
Subject> Apple Mafia? (Ha)
|
||||
Viewer > DISK RIGGER <Elite>
|
||||
Posted > MON MAR 17 4:24:17 PM
|
||||
|
||||
|
||||
Genius. Are you talking about that
|
||||
loser group in 213? They are in for it.
|
||||
If you didnt know already there was
|
||||
already a group Called Apple Mafia. Too
|
||||
bad two of 'em were FEDS.
|
||||
|
||||
Hey, Where ANY of you ever on The Old
|
||||
Sherwood Forest's? [ /, //, /// ]?
|
||||
|
||||
|
||||
(Another msg.)
|
||||
|
||||
|
||||
Number > 8
|
||||
Subject> SHERWOOD FORESTS
|
||||
Author > CHRONOS
|
||||
Posted > MON MAR 17 5:03:32 PM
|
||||
|
||||
|
||||
|
||||
Yeah, I was on // and ///... I never got an answer at / though... Wasn't the
|
||||
Apple Mafia (later Micro Mafia) running those boards?
|
||||
|
||||
[chronos/KOTBC]
|
||||
|
||||
And didn't they break up before they got busted? I remember something about
|
||||
them just giving up, cause 2 guys were doing all the work...then they put
|
||||
Yellowbeard in charge and it was never heard from again...
|
||||
|
||||
|
||||
(Another msg.)
|
||||
|
||||
|
||||
Number > 13
|
||||
Subject> Sherwood Forest
|
||||
Viewer > WARE BANDIT <Elite>
|
||||
Posted > TUE MAR 18 3:43:11 PM
|
||||
|
||||
What two members of The Real Apple
|
||||
Mafia were feds? Because I knew several
|
||||
including High tech, and Creative.
|
||||
|
||||
And the reason you neve got an answer
|
||||
at sherwood forest / was because that
|
||||
was the old sherwood forest //... High
|
||||
tech moved from Ny, and after he set it
|
||||
up at his new place he called it
|
||||
Sherwood forest //.... Well I have many
|
||||
old files, and posts saved from the
|
||||
last grand adventure (that was thier
|
||||
logo), So if you would like to view
|
||||
them then just leave me a message on
|
||||
the underground.
|
||||
|
||||
later, [Ware Bandit]
|
||||
|
||||
|
||||
(Another msg.)
|
||||
|
||||
|
||||
Number > 14
|
||||
Subject> WB..
|
||||
Viewer > DISK RIGGER <Elite>
|
||||
Posted > TUE MAR 18 4:17:52 PM
|
||||
|
||||
|
||||
I think Magnetic Surfer ran it. Yeah I
|
||||
also have a lot of things saved on
|
||||
Buffer. They had a LARGE G-File
|
||||
section. And a TRUELY awesome Elite
|
||||
sub.
|
||||
|
||||
And some people got the impression that
|
||||
Creative Cracker was a lazy ass. It is
|
||||
not true. The board was being runned by
|
||||
Federal Agents. He just came in to look
|
||||
at it.
|
||||
|
||||
|
||||
(Another msg.)
|
||||
|
||||
|
||||
Number > 15
|
||||
Subject> SERIOUS?
|
||||
Author > CHRONOS
|
||||
Posted > TUE MAR 18 5:44:17 PM
|
||||
|
||||
Sherwood Forests were really being run by Feds? I'd like to know who... they
|
||||
let it get pretty far before they busted them then...
|
||||
|
||||
[chronos/KOTBC]
|
||||
|
||||
|
||||
(Another msg.)
|
||||
|
||||
|
||||
Number > 18
|
||||
Subject> The forest
|
||||
Viewer > WARE BANDIT <Elite>
|
||||
Posted > WED MAR 19 3:23:11 PM
|
||||
|
||||
|
||||
Okay this might clear some things up between some people that might be confused
|
||||
on the subject.
|
||||
|
||||
Sherwood Forest .... Used to be run by High Tech. About 2-3 years ago.
|
||||
Sherwood Forest // The later Sherwood forest run by High tech. when he moved.
|
||||
Sherwood Forest /// Ran by Creative Cracker, a good friend of High tech.
|
||||
|
||||
and no they were not feds, they just got a little carried away with the way
|
||||
they were running thier boards by letting just about anyone access most of the
|
||||
phreak sections that they had on-line. The Treasury dept. finally closed them
|
||||
down along with cryton and some other un-heard of hack boards.
|
||||
|
||||
If you have any questions feel free to ask.. I was going to run thier number 4
|
||||
board, but shortly after I was offered the opurtunity they went under...
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
I don't know where these msg's are from, or who these people are. But almost
|
||||
everything said in them is wrong.
|
||||
|
||||
"I heard 2 guys were doing all the work, so they quit". Whoever said that has
|
||||
obviously read the 1984 loserlist, because that is a verbatim quote from it.
|
||||
Not only is it wrong in slandering everyone from Apple Bandit, Hot Rod, and
|
||||
Wombat/Gonif, to Bioc Agent, Lord Digital and Paul Muad'Dib. But it's written
|
||||
in a such a ridiculous fashion, that any points the author was trying to make
|
||||
are lost in the jumble (For those who care it was written by "The Atom").
|
||||
|
||||
Sherwood Forests (The last grand adventure).
|
||||
|
||||
The FIRST Sherwood Forest was started in 1979 by Magnetic Surfer. The only
|
||||
people who were on it back then, and still recognized would be Mr. Xerox and
|
||||
Lord Digital. Other members included Nickie Halflinger, Captain Crunch,
|
||||
Napoleon Bonaparte, and many others, whose names are probably meaningless to
|
||||
the people around today.
|
||||
|
||||
There was a 20 page write up on "Hackers", before it was in vogue to write
|
||||
about them (Before WarGames and the 414 busts), In a 1982 issue of "California"
|
||||
magazine. Which detailed the bust of Ron Austin, who was at the time of arrest
|
||||
22 years old and being tried for everything from credit card fraud, to grand
|
||||
theft. Also included in the article was a write up on Hacker bbs systems he
|
||||
was on and people he knew. The Sherwood Forest mentioned in that article was
|
||||
Magnetic Surfer's, not the later ones.
|
||||
|
||||
Sherwood forest was run on a micromodem and 1 disk drive. There were no Cat's,
|
||||
DOS was at 3.1, and Disk Drives were still a novelty. It went down in 1981 for
|
||||
whatever reasons, and went back up as a public system with 1200 & a 46 mb hard
|
||||
drive in 1983. Shortly thereafter it went private and became the Knights of
|
||||
Shadow Base bbs. During it's final days in 1984, this was the FINAL memberlist:
|
||||
|
||||
SYSTEM OPERATOR <-- Magnetic Surfer. TKOS member
|
||||
PIT FIEND <-- Local Queens person
|
||||
LORD DIGITAL <-- Name speaks for itself. Apple Mafia & TKOS member
|
||||
CRIMINAL ELEMENT <-- Local Queens person, semi notorious for being a ass
|
||||
STEPHEN FALKEN <-- aka: Jon Gleich of Earth News Central
|
||||
THE SURGE <-- Unknown. Access from Lord Digital
|
||||
BIG BROTHER <-- 617 phreak/pirate. Apple Mafia & TKOS member
|
||||
E.F. HUTTON <-- 312 Phreak/Hacker. TKOS member
|
||||
THE KNIGHTS OF SHADOW <-- TKOS account
|
||||
MR. XEROX <-- Name speaks for itself. TKOS founder
|
||||
CAPTAIN AVATAR <-- aka: Skip Rooney
|
||||
DISK DEMON <-- Local Queens person
|
||||
GUEST ACCOUNT <-- A guest account
|
||||
THE MAGNET <-- Apple Mafia co-founder
|
||||
THE PROWLER <-- Canadian Phreak, NOT the 612 Prowler
|
||||
BIOC AGENT 003 <-- Name speaks for itself. TKOS member
|
||||
QUASI MOTO <-- TKOS member. Ran PloverNet
|
||||
PHONE FIEND <-- Local Queens person
|
||||
TUC TUCBBS <-- Tuc. Name speaks for itself. TKOS member
|
||||
PAUL MUAD'DIB <-- Name speaks for itself. TKOS member
|
||||
HARDWARE HACKER <-- Local Queens person
|
||||
TOM TONE <-- Brooklyn person
|
||||
THE GODFATHER <-- Apple Mafia co-founder
|
||||
PETER MCIVERS <-- 617 phreak/hacker
|
||||
THE PHANTOM <-- Apple Mafia member
|
||||
NICKIE HALFLINGER <-- Hacker, EEE, in his mid 30's
|
||||
LEX LUTHOR <-- 305 person. Nobody at this time, later founded LOD
|
||||
UNCLE JOE <-- Have no idea who this is
|
||||
LESLIE KARASIC <-- Have no idea who this is
|
||||
THE NECROMANCER <-- TKOS member
|
||||
DR JIMMY MR JIM <-- TKOS member
|
||||
THE WIZARD <-- Asshole from 713. Access from Quasi Moto
|
||||
FRODO HOBBIT <-- Unknown, from 201. Access from Magnetic Surfer
|
||||
THE DJIN <-- Unknown, from 718. Access from Magnetic Surfer
|
||||
RICH DOUGAN <-- Unknown, from 718. Access from Magnetic Surfer
|
||||
APPLE CAT <-- Unknown, from 718. Access from The Phantom
|
||||
NAPOLEON BONAPARTE <-- TKOS member. Ex of: Inner Circle. ex Sys of SL
|
||||
CHRISTOPHER BUNN <-- Unknown, from 718. Access from The Phantom
|
||||
DR. DOOM <-- Have no idea who this is
|
||||
WILD CAT <-- Have no idea who this is
|
||||
THE DISKLAIMER <-- Have no idea who this is
|
||||
MR IBM <-- Have no idea who this is
|
||||
DRAGON LADY <-- Ex girlfriend of Chesire Catalyst
|
||||
GAP DRAGON <-- Have no idea who this is
|
||||
THE MARK <-- Have no idea who this is
|
||||
CABLE PAIR <-- Fed par excellance`
|
||||
STOSH FIXER <-- Have no idea who this is
|
||||
MILO PHONBIL <-- Sysop of Once & Future OSUNY
|
||||
MR. GUCCI <-- Sysop of AT&T Phone Center
|
||||
DR. NIBBLEMASTER <-- TKOS member
|
||||
STAINLESS STEAL RAT <-- TKOS member
|
||||
|
||||
And that's it. Reading the list you have to keep in mind that this was right
|
||||
after the Inner Circle folded, and almost a year before LOD even began. So many
|
||||
of the current "Big Names", didn't even own computers yet.
|
||||
|
||||
In 1983 a friend of their's (The 212/718 people), called Creative Cracker put
|
||||
up a bbs called Sherwood Forest ][. For a while it had an ae line simply known
|
||||
as "Sherwood Forest" in 201, then in 1984 Sherwood Forest ]I[ went up, run by
|
||||
High Technology. The original co-sysops on SF ][ were High Tech & Jack The
|
||||
Ripper. Jack was dropped, High Tech became a full sysop, and the new co-sysops
|
||||
became: Tuc, Bioc & Big Brother.
|
||||
|
||||
SF ][ started on a disk ][ & a Rana ]I[ disk drive, Micromodem, and a clock. It
|
||||
went down for 2 weeks in 1984, then came back up with all new software, 20 megs
|
||||
and 1000's of files.
|
||||
|
||||
SF ]I[ went up with a disk ][ & a Rana ]I[, and that's as big as it ever got.
|
||||
Creative Cracker was a full sysop. And the co-sysops were Sharp Razor, X-Man,
|
||||
and Wizard 414. co-sub-ops of maintenence (whatever that is), were: Sherlock
|
||||
Apple and Silicon Scorpion. All co-sysops and sub-ops were dropped after about
|
||||
2 months.
|
||||
|
||||
None of the boards except for Magnetic Surfer's could be considered really
|
||||
impressive by todays standards. Impressive in terms of hardware that is. This
|
||||
is the time when just about the only hard drive was a corvus, whose prices for
|
||||
a 6 meg started at $2000 in that time. and a complete Apple-Cat/212 card/exp-
|
||||
ansion module system, came to over $1000.
|
||||
|
||||
And finally the Apple Mafia, was NEVER the "Micro Mafia", this was yet another
|
||||
group of losers cashing in on their group name.
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
I could go on about what happens to all the people from SF, but that's not the
|
||||
purpose of this file, so I'm not going to digress. There are many files out
|
||||
about many of the members (Lord Digital, Paul Muad'Dib, Mr. Xerox come to mind)
|
||||
already. And others have made themselves known through LOD as well (Lex). What
|
||||
this file is about is The Apple Mafia, so I'm not going to get into all that.
|
||||
|
||||
Which brings me to the final part. The Sherwood Forest Busts....
|
||||
|
||||
I'm saying right now that I don't know what happened, just offering the facts
|
||||
that I do know about it.
|
||||
|
||||
If (as is said), SF][ was indeed run by the FBI towards the end. Then why did
|
||||
they let Creative Cracker keep cracking software? It doesn't seem likely they
|
||||
would have let him continue, did they just not know or what?
|
||||
|
||||
Now if they weren't running SF][, then even more questions come to mind. The
|
||||
most important one is: why run a board if you truly don't care? CC never
|
||||
looked at his board, never logged in, the news was updated once every 9 months
|
||||
by BIOC.
|
||||
|
||||
What's more, if it WAS a trap, then logically the other Apple Mafia members had
|
||||
to know about it. Or most of them. NONE of them EVER posted anything at all.
|
||||
With the exception of Silicon Scorpion & Sherlock Apple, who kept posting new
|
||||
wares.
|
||||
|
||||
It could be that they lost interest in piracy (As is true of Tuc, Lord Digital,
|
||||
The Phantom, Big Brother, in fact, almost all the members), BUT this still does
|
||||
not clear up why NONE of them EVER posted ANYWHERE, including the phreak boards
|
||||
or the elite subs. Now BIOC did post, but if you know BIOC, he always left some
|
||||
500 line exerpt he typed up from some magazine, or manual (Which is actually
|
||||
just about all he ever did, much like Lex), nothing that could get him in any
|
||||
kind of trouble.
|
||||
|
||||
These are the same people whose msg's I've seen buffers of from Sherwood Forest
|
||||
(Magnetic Surfer's), and World of Cryton, who were posting techniques, systems,
|
||||
and information, all over. But not ONE msg. from any of them on their supposed
|
||||
"home base". Pretty weird....
|
||||
|
||||
The logical conclusion I draw from this is: They knew the board was being
|
||||
watched at the very least, and didn't want to draw attention to themselves.
|
||||
In which case they left everyone else to get caught, which is in keeping with
|
||||
many of the peoples present attitudes. This is also the time during which the
|
||||
Apple Mafia members who were also in TKOS got a lot of heat from that group
|
||||
falling apart in a rather spectacular manner. With almost all of them in danger
|
||||
of being busted for grand theft.
|
||||
|
||||
While SF][ & ]I[ didn't go down until summer of 1985, I would say the Apple
|
||||
Mafia died almost a year eairlier. I talked to Silicon Scorpion towards the
|
||||
end of 1984 and as he put it: "What group? I don't even have anyones number
|
||||
anymore. How am I supposed to be part of a group whose members I can't even
|
||||
find?" This refers to Creative Cracker whose voice number dissapeared, and
|
||||
who never answered his feedback, The Phantom, ditto. Big Brother, ditto. Tuc,
|
||||
ditto. Lord Digital, ditto + he stopped calling any boards. Data Dragon, he's
|
||||
never home. Who's that leave? not many.
|
||||
|
||||
In the cases of The Phantom, Lord Digital and Tuc, this is understandable. They
|
||||
were all undoubtedly living out paranoid fantasies of everything they'd ever
|
||||
done catching up with them, as it did with Mr. Xerox not too far in the past.
|
||||
|
||||
But what happened to everyone else?
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
The Apple Mafia is over. Maybe one day some of the members will regroup just
|
||||
for fun. It would be interesting. But some loser named Judge Dredd, should go
|
||||
crawl back where he came from. Or find another name for his lame excuse of a
|
||||
group.
|
||||
|
||||
*******************************************************************************
|
||||
|
||||
Here is the "flyer" heralding the regrouping of the Mafia in 1984. Verbatim as
|
||||
typed by The Godfather:
|
||||
|
||||
|
||||
BRIEF HISTORY OF THE APPLE MAFIA.
|
||||
|
||||
FOUNDED IN 1980 BY THE GODFATHER AS
|
||||
A JOKE. REDONE IN 1981 AS A SEMI
|
||||
SERIOUS GROUP. KICKED SOME ASS IN
|
||||
'82. BLEW EVERYONE AWAY IN 83, AND
|
||||
WILL DO MUCH BETTER IN 84. SINCE
|
||||
THE BEGINNING THE GROUP HAS DIED
|
||||
OUT AND BEEN REBORN SEVERAL TIMES,
|
||||
THIS TIME LETS KEEP IT GOING. IS
|
||||
CURRENTLY THE OLDEST ACTIVE GROUP,
|
||||
NEXT (OF PEOPLE WHO WOULD STILL BE
|
||||
AROUND) ARE THE WARE LORDS ('83 I
|
||||
BEILIEVE) AND THE 1200 CLUB ('83
|
||||
ALSO, I THINK). THAT'S IT.
|
||||
|
||||
A FEW GENERAL IDEAS WE WISH TO PROMOTE:
|
||||
|
||||
WHEN YOU GET SOME NEW SOFTWARE CALL
|
||||
UP AS MANY MAFIA MEMBERS AND GET IT
|
||||
TO THEM FIRST.
|
||||
|
||||
GET IT POSTED UP ON THE BOARDS AS FAST
|
||||
AS POSSIBLE, NOW WITH CATS, TIME IS
|
||||
CRUTIAL. BE SURE TO STICK THE MAFIA
|
||||
AT THE END.
|
||||
|
||||
DON'T GET THE GROUP INTO FIGHTS, AND
|
||||
TRY NOT TO BE AN ASSHOLE.
|
||||
|
||||
IT HELPS TO GIVE OUT SOFTWARE TO OTHERS
|
||||
- WITH THE MOB BEHIND YOU, NO ONE
|
||||
CAN STOP YOU.
|
||||
|
||||
KEEP IN TOUCH WITH OTHER MEMBERS, IT
|
||||
SUCKS WHEN YOU LOSE CONTACT, IF YOU
|
||||
NEED ANY HELP CATCHING UP, JUST ASK
|
||||
SOMEONE... THEY SHOULD BE WILLING TO
|
||||
HELP YOU CATCH UP.
|
||||
|
||||
NEW MEMBERSHIPS ARE DECEIDED BY ALL
|
||||
OF THE MEMBERS, IF YOU KNOW OF SOMEONE
|
||||
DECENT, TELL EVERYONE ELSE.
|
||||
|
||||
THATS ABOUT IT.
|
||||
|
||||
THE GODFATHER
|
||||
|
||||
|
||||
1986.
|
||||
The Apple Mafia Story
|
||||
Red Ghost
|
||||
|
||||
*******************************************************************************
|
||||
(>==============================================================================
|
||||
___ ___
|
||||
(___><___) .....And if you enjoyed this TextFile, call The Works, 914's
|
||||
\ _[]_ TextFile BBS:
|
||||
\______/ \_____ The Works
|
||||
_\ =========
|
||||
_______________ \>\ (914)-238-8195 24 Hrs. 900+ Textfiles Online
|
||||
/ \ \ 300/1200 Baud, N,8,1 Home of Terror Ferret
|
||||
/ \___> 10 Megabytes of Storage ANSI Graphics Optional
|
||||
==============================================================================
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
413
textfiles.com/100/apples.txt
Normal file
413
textfiles.com/100/apples.txt
Normal file
@@ -0,0 +1,413 @@
|
||||
> 1
|
||||
INCREMENT TITLES BY: [DEFAULT IS 10] )=->
|
||||
|
||||
[01] PIRATE/TRADING
|
||||
[02] WARES .....
|
||||
[03] CALL...
|
||||
[04] ALL THE K00L STUFF
|
||||
[05] AE LINE
|
||||
[06] WHY NOT
|
||||
[07] THE LIST
|
||||
[08] APPLE WARES-->
|
||||
[09] PLEASE TELL OTHERS...
|
||||
[10] BASICALLY
|
||||
|
||||
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->
|
||||
|
||||
|
||||
->[11] SOME WARES
|
||||
->[12] THE REAL NEW WARES
|
||||
->[13] APPLICATIONS AVAILABLE
|
||||
->[14] NEW WARES FOR YA
|
||||
|
||||
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->R
|
||||
|
||||
(1-14, LAST=0, QUIT=Q) READ MSG.#1
|
||||
|
||||
|
||||
MESSAGE #1: PIRATE/TRADING
|
||||
|
||||
|
||||
MSG LEFT BY: HIGH TECHNOLOGY
|
||||
POSTED:
|
||||
|
||||
***************************************
|
||||
* *
|
||||
* WELCOME TO SHERWOOD FOREST /// *
|
||||
* *
|
||||
* THIS SUB-BOARD IS DEDICATED *
|
||||
* TO APPLE SOFTWARE.... *
|
||||
* *
|
||||
* ENJOY THE FOREST *
|
||||
* *
|
||||
* )=-> SYSOP <-=( *
|
||||
***************************************
|
||||
|
||||
(1-14, LAST=1, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #2: WARES .....
|
||||
|
||||
|
||||
MSG LEFT BY: SHERLOCK APPLE
|
||||
POSTED:
|
||||
|
||||
|
||||
|
||||
I HAVE EM ALL !!!!!!
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
SHERLOCK APPLE
|
||||
|
||||
(1-14, LAST=2, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #3: CALL...
|
||||
|
||||
|
||||
MSG LEFT BY: CREATIVE CRACKER
|
||||
POSTED:
|
||||
|
||||
Call...
|
||||
|
||||
__________________
|
||||
_________/Sherwood Forest ][\_________
|
||||
\^^^^^^^^=^^^^^^=^^/
|
||||
___[914][359][1517]___
|
||||
|
||||
|
||||
-> 20 Megs. On-Line..
|
||||
|
||||
-> 31 Sub-Boards..
|
||||
|
||||
-> 15 G-Sections..
|
||||
|
||||
|
||||
Open 24 Hours - 7 Days a week..
|
||||
|
||||
Free Validation
|
||||
|
||||
Many Advanced Options...
|
||||
|
||||
Call Today!!!!
|
||||
|
||||
[914][359][1517]
|
||||
|
||||
|
||||
(1-14, LAST=3, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #4: ALL THE K00L STUFF
|
||||
|
||||
|
||||
MSG LEFT BY: THE ROGUE
|
||||
POSTED:
|
||||
|
||||
Yes, I've got all the new stuff or can get it real quick.
|
||||
So if you want anything, new or old, just leave E-Mail.
|
||||
|
||||
The Rogue
|
||||
|
||||
Catsend/Disk-fer ONLY!!!!
|
||||
very few exceptions but....
|
||||
|
||||
|
||||
|
||||
(1-14, LAST=4, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #5: AE LINE
|
||||
|
||||
|
||||
MSG LEFT BY: UNKNOWN PIRATE
|
||||
POSTED:
|
||||
|
||||
.......................................
|
||||
. I HAVE BEEN ON VACATION ABOUT 2 MON .
|
||||
. THS AND I WANT TO PUT MY LINE .
|
||||
. BACK UP BUT I GO NO SOFTWARE NEW .
|
||||
. SO ANY BODY WHO WANTS TO HELP ME OU .
|
||||
. T AND GET MUCH STUFF AFTER I GET BA .
|
||||
. CK ON MY FEET PLEASE SEND ME E-MAIL .
|
||||
. .
|
||||
. LATER .
|
||||
. .
|
||||
. .
|
||||
. BY THE WAY IF YOU WANT TO SEE WHAT .
|
||||
. NEW SOFTWARE WILL BE AVALIBLE IN TH .
|
||||
. E NEXT FEW MONTHS READ MY MESSAGE O .
|
||||
. N SHERWOOD II IT TOOK ME 1/2 HOUR T .
|
||||
. O TYPE AND I DON'T FEEL LIKE TYPING .
|
||||
. IT AGAIN MABBE SOME OTHER TIME .
|
||||
. .
|
||||
. UNKNOWN PIRATE .
|
||||
.......................................
|
||||
|
||||
(1-14, LAST=5, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #6: WHY NOT
|
||||
|
||||
|
||||
MSG LEFT BY: UNKNOWN PIRATE
|
||||
POSTED:
|
||||
|
||||
WHAT THE HELL HERES A LIST OF ALL THE S
|
||||
OFTWARE FOR THE NEXT FEW MONTHS.
|
||||
|
||||
ATARI--YAACOV AGAM'S INTERACTIVE PAINTI
|
||||
NG, FIND IT, THE ABC'S OF CPR, WHEELER
|
||||
DEALER, SIMULATED COMPUTER,TELLY TURTLE
|
||||
GREMLINS, TRACK AND FIELD, MARIO BROS.
|
||||
DONKEY KONG JR., CRYSTAL CASTLES.
|
||||
|
||||
BAEN--WINGS OUT OF SHADOW, BERSERKER
|
||||
RAIDS, THE ELECTRIC DRAGON,SNAKE,STARCL
|
||||
ASH II.
|
||||
|
||||
BRODERBUND--CHAMP. LODE RUNNER, CAPTAIN
|
||||
GOODNIGHT AND THE ISLANDS OF FEAR,MERCY
|
||||
BIRDS, BANK ST. FILER, BANK STREET MAIL
|
||||
ER, DAZZLE DRAW, WHERE IN THE WORLD IS
|
||||
CARMEN SANDIEGO?.
|
||||
|
||||
COLECO--TARZAN,WARGAMES,CABBAGE PATCH
|
||||
KID ADVENTURES,FORTUNE BIULDER,DR. SUES
|
||||
S FIX UP AND MIX UP BUILDER.
|
||||
|
||||
DATAMOST--ANKH, MYCHESS II,EARTHY DELIG
|
||||
TS.
|
||||
|
||||
DATASOFT--JUNO FIRST,MANOCOPTER,MERIDIA
|
||||
N III,BRUCE LEE,DALLAS,ZAXXON(IIC),LOST
|
||||
TOMB.
|
||||
|
||||
EPYX--HOT WHEELS,GI JOE,BARBIE,BREAKDAN
|
||||
CE, ROBOTS OF DAWN.
|
||||
|
||||
FIRST STAR--ROMPER ROOM'S I LOVE MY ALP
|
||||
BET,SPY VS. SPY,US ADVENTURE.
|
||||
|
||||
INFOCOM--CUTTHROAT
|
||||
|
||||
PENGUIN--XYPHUS
|
||||
|
||||
ORIGIN--CAR WARS, ORGE
|
||||
|
||||
SSI--OBJECTIVE KURST,50 MISSION CRUNCH
|
||||
|
||||
TRAPEZE--LIFESPAN,SETI
|
||||
|
||||
THATS ALL FOR APPLE CHECK OUT COMMODORE
|
||||
ATARI,IBM AND POSSIBLY SOME OTHERS
|
||||
ON OTHER ONLINE BOARDS OF VARIOUS BBS'S
|
||||
UNKNOWN PIRATE.
|
||||
|
||||
(1-14, LAST=6, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #7: THE LIST
|
||||
|
||||
|
||||
MSG LEFT BY: UNKNOWN PIRATE
|
||||
POSTED:
|
||||
|
||||
THE LIST I TYPED WAS A LIST OF NEW
|
||||
GAMES SOON TO BE RELEASED BY THE
|
||||
MANUFACTERS OR GAMES JUST RELEASE
|
||||
I DON'T HAVE MOST OF THE SHIT YET.
|
||||
|
||||
|
||||
UNKNOWN PIRATE
|
||||
|
||||
|
||||
(1-14, LAST=7, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #8: APPLE WARES-->
|
||||
|
||||
|
||||
MSG LEFT BY: PRO-GRAMMER
|
||||
POSTED:
|
||||
|
||||
Aybody out there who wants to trade apple wares,i'm all ears.I have a lot,
|
||||
and can get most other stuff(the littile that i don't have that is).I'm
|
||||
looking for some good business programs(compilers,assemblers,spreadsheets etc.)
|
||||
so anybody interested,leave me e-mail.
|
||||
LATER--->
|
||||
THE
|
||||
[PRO-GRAMMER]
|
||||
|
||||
/EX
|
||||
|
||||
(1-14, LAST=8, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #9: PLEASE TELL OTHERS...
|
||||
|
||||
|
||||
MSG LEFT BY: HIGH TECHNOLOGY
|
||||
POSTED:
|
||||
|
||||
***************************************
|
||||
* *
|
||||
* PLEASE TELL OTHERS ABOUT *
|
||||
* SHERWOOD FOREST ///.THE MORE CALLS *
|
||||
* THAT THIS SYSTEM GETS....THE BETTER *
|
||||
* THE SYSTEM GETS.... *
|
||||
* *
|
||||
* ALSO PLEASE POST ABOUT *
|
||||
* SHERWOOD FOREST /// ON OTHER BBS'S. *
|
||||
* *
|
||||
* THANK-YOU *
|
||||
* *
|
||||
* )=-> SYSOP <-=( *
|
||||
* *
|
||||
* *
|
||||
***************************************
|
||||
|
||||
(1-14, LAST=9, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #10: BASICALLY
|
||||
|
||||
|
||||
MSG LEFT BY: CAPTAIN CANADA
|
||||
POSTED:
|
||||
|
||||
CAPTAIN CANADA HERE,
|
||||
|
||||
I HAVE THE BASICALLY NEW STUFF,
|
||||
|
||||
XYPHUS,EXPEDITION AMAZON ETC...
|
||||
|
||||
IF YOU WANT TO TRADE FOR THOSE OR EVEN
|
||||
OLDER STUFF PLEASE WRITE HERE OR ON
|
||||
SFII.I REALLY WANT COMPUTER AMBUSH.
|
||||
CAN ANYONE HELP?
|
||||
|
||||
CAPTAIN CANADA
|
||||
|
||||
(1-14, LAST=10, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #11: SOME WARES
|
||||
|
||||
|
||||
MSG LEFT BY: KEY MASTER
|
||||
POSTED:
|
||||
|
||||
OK.THIS IS THE KEYMASTER.I HAVE SOME OF THE
|
||||
LATEST WARES AND I WILL TRADE WITH ANYONE WHO
|
||||
HAS CATSEND 3.0 OR DISKFER(CATSEND PREFERED).
|
||||
IVE HAD EXPEDITION AMAZON AND XYPHUS FOR A LONG
|
||||
TIME.THEY BOTH SUCK.SKYFOX HAS SOME PRETTY GOOD
|
||||
GRAPHICS AND ARCHON IS OK.ILL BE GETTING
|
||||
CHAMP. LODE RUNNER FROM A FRIEND OVER THE WEEKEND.
|
||||
CAPTAIN GOODKNIGHT ALSO SOMETIME SOON.ANYONE WHO
|
||||
WANTS A COPY OF CASTLE SMURFENSTEIN OR ANY OF
|
||||
THE OTHER WARES I NAMED(PLUSMORE) THEN CALL
|
||||
ME AT THE 4TH REICH 813 734 5312.IM SYSOP,BUT
|
||||
ID PREFER IF YOU LEFT EMAIL TO THE KEYMASTER
|
||||
OR THE BEST WOULD BE TO CHAT.TILL THEN....
|
||||
|
||||
THE KEYMASTER
|
||||
|
||||
(1-14, LAST=11, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #12: THE REAL NEW WARES
|
||||
|
||||
|
||||
MSG LEFT BY: SHERLOCK APPLE
|
||||
POSTED:
|
||||
|
||||
|
||||
THE REAL NEW WARES:
|
||||
|
||||
|
||||
SERENDIPITY
|
||||
EZ TEXT
|
||||
RUN FOR IT
|
||||
HITCH HIKERS GUIDE TO THE GALAXY
|
||||
BALTIC 1985
|
||||
AIR NAV WORKSHOP
|
||||
CYPRUS ][ (OR WHATEVER ITS CALLED)
|
||||
DREADNAUGHTS
|
||||
|
||||
|
||||
|
||||
LATER,
|
||||
|
||||
|
||||
SHERLOCK APPLE!
|
||||
THE APPLE MAFIA
|
||||
ALL THE WARES!!
|
||||
|
||||
(1-14, LAST=12, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #13: APPLICATIONS AVAILABLE
|
||||
|
||||
|
||||
MSG LEFT BY: RICH NUTS
|
||||
POSTED:
|
||||
|
||||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||||
$ IF YOU'RE INTERESTED IN BUSINESS OR $
|
||||
$ UTILITIES SOFTWARE, OR YOU NEED $
|
||||
$ PROGRAMMING HELP, THEN THIS IS THE $
|
||||
$ RIGHT PLACE. WE HAVE ACCESS TO ALL $
|
||||
$ MAJOR BUSINESS PROGRAMS AND OTHER $
|
||||
$ TYPES OF APPLICATIONS SOFTWARE, AND $
|
||||
$ WE ARE ALSO EXPERT PROGRAMMERS. $
|
||||
$ WE DO, HOWEVER, NEED SOME OF THE $
|
||||
$ NEWER ENTERTAINMENT PROGRAMS. IF $
|
||||
$ YOU'RE WILLING TO TRADE SEND E-MAIL $
|
||||
$ EITHER ON THIS BOARD OR SHERWOOD $
|
||||
$ FOREST // TO RICH NUTS. $
|
||||
$ $
|
||||
$ LATER- $
|
||||
$ $$$$$$ $
|
||||
$ $RICH$ $
|
||||
$ $NUTS$ $
|
||||
$ $$$$$$ $
|
||||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||||
|
||||
(1-14, LAST=13, QUIT=Q) READ MSG.#
|
||||
|
||||
|
||||
MESSAGE #14: NEW WARES FOR YA
|
||||
|
||||
|
||||
MSG LEFT BY: KEY MASTER
|
||||
POSTED:
|
||||
|
||||
OK WELL,I JUST GOT SOME NEW WARES IN TONIGHT
|
||||
AND A LOT MORE ARE COMING TOMORROW.HERE
|
||||
IS MY CURREBT TRADING LIST:
|
||||
|
||||
SKYFOX
|
||||
ARCHON (PATCHED VERSION!!)
|
||||
CASTLE SMURFENSTEIN
|
||||
BEACH LANDING
|
||||
XYPHUS
|
||||
E.T.
|
||||
CHAMPIONSHIP LODE RUNNER (MEGA-HARD)
|
||||
AND MORE TOMORROW.
|
||||
|
||||
IF YOU ARE REALLY INTERESTED THEN CALL THE
|
||||
4TH REICH (813 734 5312) AND LEAVE FEEDBACK OR
|
||||
E-MAIL TO KEY MASTER.I'LL GET IN TOUCH WITH YOU.
|
||||
BE SURE TO LEAVE A LISTOF YOUR WARES ALSO.
|
||||
APPLE CATS ONLY!!I ONLY TRADE IN BELL 202
|
||||
|
||||
THE KEYMASTER
|
||||
|
||||
(1-14, LAST=14, QUIT=Q) READ MSG.#Q
|
||||
|
||||
[T] [R] [P] [Z] [E] [Q] [?] --->***
|
||||
|
Reference in New Issue
Block a user