1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-08 10:46:32 +02:00
This commit is contained in:
OPSXCQ
2017-11-07 12:28:58 -03:00
parent a5c93427aa
commit cbc842d120
6 changed files with 1852 additions and 0 deletions

36
textfiles.com/100/ad.txt Normal file
View File

@@ -0,0 +1,36 @@
View: RAD AD
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
: Call The Upside Down BBS at (201) 398-2953 300/1200 Baud 10 megabytes :
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
System currently operating with ; Other Information
--------------------------------- -----------------
T-Net BBS Software version 1.6 20 Sub-boards
Apple ][ + w/64 K 100+ G-files
Apple-Cat ][ Modem On-line Ascii express
Apple-Cat 212a Upgrade Card 300 + Users
Apple-Cat ][ Firmware Rom Chip 5300 + Calls to date
Videx UPPER/lower Case Chip
2 Apple ][ Disk Drives
'THE SIDER' 10 Megabyte Hard Drive
Thunderclock + Call Today ! and get yourself
Bell Fone Linez A Password !
PSE&G Electric
Apple Monitor /// and/or Taxan RGB I
Epson Salt (MX-80)
2 Maxell Md1 Floppy disks
Bambergers deluxe desk topSystem saver fan
System saver fan
TG Joystick
Dayton axial fan CMF (Boosts cooling, all slots are full)
==============================================================================
Upside Down AE Line 300/1200 baud apple-cat ][ (201) 625-8929 p/w = run
------------------------------------------------------------------------------
(>


View File

@@ -0,0 +1,132 @@
***************************************
* *
* ADVENTURE *
* *
* Solving it in easy steps *
* *
* *
***************************************
FROM: THE ROM RAIDER
DR. DIGITAL
CALL HER MAJESTY'S SECRET SERVICE
3 0 3 - 7 5 1 - 2 0 6 3
WARNING: THIS WALK-THRU SHOWS HOW TO SOLVE THIS ADVENTURE STEP BY STEP, THESE
ARE NOT HINTS!
SPECIFIC INSTRUCTIONS ARE ENCLOSED IN QUOTES, SO TYPE WHAT YOU SEE.
START OFF BY GOING "N". YOU ARE NOW STANDING AT THE END OF A ROAD BEFORE A
SMALL BRICK BUILDING. THIS BUILDING IS THE WELLHOUSE, AND IS AN IMPORTANT PART
OF THE GAME. THE OBJECT OF THIS GAME IS TO GET THE 15 TREASURES BACK TO THE
WELLHOUSE.
CONTINUE WITH "IN", AND YOU ARE INSIDE THE WELL HOUSE, SO "GET FOOD", "GET
LAMP", "GET KEYS", "GET BOTTLE". NOW, THERE ARE THREE MAGIC WORDS YOU NEED TO
USE. THEY ARE PLUGH, XYZZY AND PLOVER. TWO OF THESE WORDS ARE USED TO GET TO
AND FROM THE WELLHOUSE AND PARTS OF THE CAVE. THE THIRD, PLOVER IS USED TO GET
BETWEEN TWO PARTS OF THE CAVE. ANOTHER THING TO REMEMBER IS THAT YOUR LAMP
LIGHT IS LIMITED, SO TURN OFF YOUR LAMP WHEN YOU DO NOT NEED IT!
NOW ON TO THE CAVE. SAY "PLUGH", THEN "LAMP ON", "S", "GET SILVER", "DROP
KEYS", "DROP FOOD", "DROP BOTTLE", "N". YOU ARE NOW BACK AT Y2. HERE IS WHERE
YOU USE PLOVER. SO SAY "PLOVER", THEN "NE", "GET PYRAMID", "S", "LAMP OFF",
"DROP LAMP", "DROP SILVER", "DROP PYRAMID", "GET EMERALD", "W", "DROP EMERALD",
"BACK". THE REASON YOU DID ALL OF THAT WAS THAT THE ONLY WAY TO GET THE
EMERALD OUT OF THE PLOVER ROOM IS OUT THROUGH THE CRACK, BUT YOU CAN NOT CARRY
ANYTHING ELSE WITH YOU.
NOW "GET LAMP", "GET SILVER", "GET PYRAMID", THEN "PLOVER" AND "PLUGH". YOU
ARE NOW BACK IN THE WELLHOUSE, SO DROP OFF YOUR TREASURES SO FAR. TYPE "DROP
SILVER", "DROP PYRAMID". BACK TO THE CAVE WITH "XYZZY", AND "LAMP ON", "E",
"GET CAGE", "W", "GET ROD", "W", "W","DROP ROD", "GET BIRD", "GET ROD", "W",
"D","W", "WAVE ROD". THERE IS NOW A CRYSTAL BRIDGE ACROSS THE CHASM. CONTINUE
WITH "DROP ROD", THEN GO "W", "GET DIAMONDS", "E", "E", "S", "GET GOLD", "N",
"D". AT THIS POINT YOU WILL SEE A HUGE GREEN SNAKE BARING YOUR WAY. TO BE RID
OF THE SNAKE, "DROP BIRD", AND THE SNAKE IS DRIVEN AWAY.
AT THIS POINT I NEED TO EXPLAIN SOMETHING ELSE. DURING THE COURSE OF THE
GAME, A DWARF WILL SEEK YOU OUT AND THROW AN AXE AT YOU. GET THE AXE. THE
NEXT TIME YOU SEE THE DWARF, THROW THE AXE AT HIM TO KILL HIM. THIS MAY HAPPEN
SEVERAL TIMES, SO JUST KEEP KILLING THE DWARVES. ANOTHER PERSON TO WATCH OUT
FOR IS THE PIRATE. HE WILL SHOW UP AT SOME POINT IN THE GAME, AND STEAL
WHATEVER TREASURES YOU ARE CARRYING. IF THIS HAPPENS, YOU CAN GET THE
TREASURES BACK WHEN YOU FIND HIS TREASURE CHEST.
CONTINUE WITH "DROP CAGE", "SW", "W". HERE IS A DRAGON SITTING ON A PERSIAN
RUG. YOU NEED TO KILL THE DRAGON TO GET THE RUG SO TYPE "KILL DRAGON". THE
GAME WILL RESPOND WITH "WITH WHAT? YOUR BARE HANDS?". ANSWER "YES".
CONGRATULATIONS, YOU HAVE NOW KILLED THE DRAGON!. SO, "GET RUG", THEN "E",
"E", "S", "GET JEWELRY", "N", "W", "GET COINS", "E", "N", "N", "LAMP OFF", AND
"PLUGH". YOU ARE AGAIN BACK IN THE WELLHOUSE, SO DROP YOUR TREASURES WITH
"DROP DIAMONDS", "DROP GOLD", "DROP RUG", "DROP JEWELRY", "DROP COINS". BACK
TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "GET FOOD", "GET KEYS", "GET
BOTTLE", "D", "W", "D", "W", "W", THEN SAY "ORIENTAL" TO GET TO THE ORIENTAL
ROOM. THEN "GET VASE", "W", "DROP KEYS", "DROP FOOD", "BACK", "N", "W", AND
YOU HAVE NOW FOUND THE EMERALD YOU PREVIOUSLY PLACED THERE. SO "GET EMERALD",
"NW", "S", "SE", "E", "GET PILLOW". THE PILLOW IS USED TO PLACE THE VASE ON,
SO YOU DON'T BREAK IT.
NOW GO "BACK", "W", "W", "D", "WATER PLANT", "U". THE PLANT IS CRYING FOR MORE
WATER, SO NOW YOU NEED TO GO GET IT SOME WATER. BUT BEFORE YOU DO THAT DROP
OFF YOUR TREASURES AT THE WELL- HOUSE BY GOING "E", "E", "NE", "E", "U", "E",
"U", "N", "LAMP OFF", "PLUGH" AND YOU ARE BACK IN THE WELLHOUSE. SO "DROP
PILLOW", "DROP VASE", "DROP EMERALD".
BACK TO THE CAVE WITH "PLUGH", "LAMP ON", "S", "D", "E", "D", "FILL BOTTLE".
YOUR BOTTLE IS NOW FILLED WITH WATER, SO GO "U", "W", "W", "D", "W", "W", "W",
"W", "D", "WATER PLANT", "U", "E", "D", "GET OIL", "U", "W", "D". NOW YOU CAN
CLIMB THE BEANSTALK SO, "CLIMB", "W", "GET EGGS", "N", "OIL DOOR", "DROP
BOTTLE", "N", "GET TRIDENT", "W", "D", "DROP TRIDENT", "GET KEYS", "GET FOOD",
"SW", "U". YOU ARE NOW IN FRONT OF A BRIDGE WITH A TROLL GUARDING IT. THE
ONLY THING THAT WILL CAUSE THE TROLL TO LEAVE IS TO THROW HIM A TREASURE.
THERE IS ONLY ONE TREASURE YOU CAN THROW HIM AND THAT IS THE EGGS. SO "THROW
EGGS", THEN "CROSS".
YOU ARE NOW ACROSS THE CHASM. CONTINUE WITH "NE", "E", "NE", "E", "GET
SPICES", "W", "N", (HERE IS THE VOLCANO), "S", "S", "SE", "S", "IN". YOU ARE
NOW IN A ROOM WITH A FEROCIOUS BEAR, WHO IS LOCKED UP WITH A GOLD CHAIN. YOU
NEED TO GET THE CHAIN, SO "FEED BEAR", THEN "UNLOCK" THE CHAIN, "GET BEAR",
"GET CHAIN", "DROP KEYS", AND "OUT". THE BEAR WILL NOW FOLLOW YOU WHEREVER YOU
GO. SO GO "U", "U", "W", "W", AND "CROSS". FROM NOWHERE, THE TROLL APPEARS
AGAIN. JUST "DROP BEAR", AND THE TROLL WILL DISAPPEAR. NOW "CROSS" THE
BRIDGE, THEN GO "SW", "D", "GET TRIDENT", "SE", "SE", "NE", "E", "N". YOU ARE
IN THE CLAM ROOM, SO NOW "OPEN CLAM". (IT IS NECESSARY TO HAVE THE TRIDENT
BEFORE YOU CAN OPEN THE CLAM). NOW YOU NEED TO GO AFTER THE PEARL SO GO "D",
"D", "GET PEARL". THEN "U", "U", "S", "U", "E", "U", "N", "LAMP OFF", AND SAY
"PLUGH". THEN "DROP CHAIN", "DROP PEARL", "DROP TRIDENT", "DROP SPICES".
BACK TO THE CAVE WITH "PLUGH", THEN "LAMP ON", "S", "D", "W", "D", "W", "W",
"W", "W", "D", "CLIMB", "W". YOU ARE NOW BACK AT THE SPOT WHERE YOU ORIGINALLY
FOUND THE EGGS WHICH YOU THREW TO THE TROLL. THE REASON YOU THREW THE EGGS WAS
BECAUSE YOU CAN GET THEM BACK AGAIN! JUST SAY "FEE", "FIE", "FOE", "FOO", AND
THEY MAGICALLY APPEAR! SO "GET EGGS", THEN "N", "N", "W", "D", "SE", "SE",
"NE", "E", "U", "E", "U", "N", "LAMP OFF", AND "PLUGH". THEN "DROP EGGS".
NOW ON TO FIND THE LAST TREASURE, THE PIRATE'S CHEST! GO THERE WITH "PLUGH",
"LAMP ON", "E", "U", "W", "W", "W", "S", "E", "S", "S", "S", "N", "E", "E",
"NW", "GET CHEST", "BACK", "N", "D", "E", "E", "XYZZY". YOU ARE BACK AT THE
BUILDING, SO "DROP CHEST". CONGRATULATIONS, YOU NOW HAVE ALL 15 TREASURES!
AT THIS POINT YOU HAVE ONE MORE THING TO ACCOMPLISH BEFORE YOU GO THE THE GRAND
FINALE. SO SAY "XYZZY", THEN GO "W", "W", "W", "D", "D", "N", "D", "W", "D",
"E", "GET MAGAZINES". YOUR QUEST IS TO TAKE THE MAGAZINES, AND PLACE THEM JUST
INSIDE WITT'S END. THIS ACTION IS OFTEN MISSED BY PEOPLE PLAYING THIS GAME,
AND AS A RESULT, THEY DO NOT FINISH THE GAME WITH ALL 350 POINTS AND THE GRAND
MASTER STATUS. NOW GO "E", THEN "DROP MAGAZINES", AND "BACK".
NOW COMES THE EASY PART, JUST WANDER AROUND THESE PASSAGES, AS YOU NOW HAVE
SOME TIME TO KILL. THE GAME GIVES YOU A SET NUMBER A MOVES AFTER ALL THE
TREASURES ARE IN THE WELLHOUSE, AND THEN YOU ARE TRANSPORTED TO THE GRAND
FINALE. THE MESSAGE YOU WILL GET WILL START BY SAYING "THE CAVE IS NOW
CLOSED", ECT. AT THIS POINT YOU ARE TRANSPORTED TO THE NORTHEAST END OF AN
IMMENSE ROOM. DO THE FOLLOWING: "SW", "GET ROD", "NE", "DROP ROD", "SW".
WHAT YOU HAVE DONE IS PLACED A STICK OF DYNAMITE AT THE OPPOSITE END OF THE
ROOM. NOW YOU SAY THE MAGIC WORD - "BLAST". YOU HAVE NOW EXPLODED A HOLE IN
THE FAR WALL, AND YOU MARCH THROUGH IT INTO THE MAIN OFFICE. YOU HAVE NOW
FINISHED THE GAME OF ADVENTURE!


Binary file not shown.

778
textfiles.com/100/anonymit Normal file
View File

@@ -0,0 +1,778 @@
From caf-talk Caf Jun 8 19:52:43 1992
Newsgroups: comp.society
Subject: Anonymity and privacy on the network
Message-ID: <92083.072152SOCICOM@auvm.american.edu>
Date: 23 Mar 92 12:21:52 GMT
Organization: The American University - University Computing Center
Lines: 759
Approved: SOCICOM@AUVM
Moderator's note: The following article is a lengthy excerpt from a
recent issue of FIDONEWS concerning individual privacy and the use of
aliases or handles in computer-based communications. It was submitted by
a comp.society reader who used a handle; because the excerpt is a cross-
post from another electronic publication, I have taken the liberty of
viewing the use of a handle by sender as a request for privacy and
anonymity similar to the request a newspaper editor might receive in a
letter to the editor. Thus, while reprinting the submission, the name
and address of the sender are "withheld upon request." The article
raises a number of good points; the submission by a reader using a handle
to preserve anonymity makes a point; and the editorial action of
submitting the reader's posting anonymously makes the question current.
What are the implications of using aliases on the net?
Greg Welsh, moderator, comp.society
Internet: Socicom@american.edu
Bitnet: Socicom@auvm.bitnet
[begin excerpt]
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
The newsletter of the |
FidoNet BBS community | Published by:
_ |
/ \ | "FidoNews" BBS
/|oo \ | (415)-863-2739
(_| /_) | FidoNet 1:1/1
_`@/_ \ _ | Internet:
| | \ \\ | fidonews@fidonews.fidonet.org
| (*) | \ )) |
|__U__| / \// | Editors:
_//|| _\ / | Tom Jennings
(_/(_|(____/ | Tim Pozar
(jm) |
----------------------------+---------------------------------------
Published weekly by and for the Members of the FidoNet international
amateur network. Copyright 1992, Fido Software. All rights reserved.
Duplication and/or distribution permitted for noncommercial purposes
only. For use in other circumstances, please contact FidoNews.
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
For more information about FidoNews refer to the end of this file.
--------------------------------------------------------------------
[...some editing...]
======================================================================
ARTICLES
======================================================================
The Joy of Handles
Mahatma Kane Jeeves
101/138.8
David Lescohier
101/138.0
THE JOY OF HANDLES
------------------
or:
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
(but have no right to ask)
--------------------------
* * * * *
We should never so entirely avoid danger as to appear
irresolute and cowardly. But, at the same time, we should
avoid unnecessarily exposing ourselves to danger, than
which nothing can be more foolish. [Cicero]
* * * * *
Do you trust me?
If you participate in computer conferencing, and you use
your real name, then you'd better.
"Why?", you ask. "What can you do with my name?" To start
with, given that and your origin line, I can probably look
you up in your local phone book, and find out where you
live. Even if you are unlisted, there are ways to locate
you based on your name. If you own any property, or pay any
utility bills, your address is a matter of public record.
Do you have children in the public schools? It would be
easy to find out. But that's just the beginning.
Former Chairman of the U.S. Privacy Protection Commission
David F. Linowes, in his book "Privacy in America" (1989),
writes of New York private investigator Irwin Blye:
"Challenged to prove his contention that, given a little
time and his usual fee, he could learn all about an
individual without even speaking with him, Blye was
presented with a subject -- a New Jersey
newspaperman.... The result was a five-page, single-
spaced, typed report which documented, though not always
accurately, a wide sweep of the journalist's past, and
was detailed to the point of disclosing his father's
income before his retirement."
Who am I? If I don't post, you might not even know I exist.
I could be on your local Police Department, or an agent
working with the IRS, or some federal law-enforcement
agency. I could be a member of some fanatical hate group,
or criminal organization. I might even be a former Nixon
White-House staffer!
I could be that pyromaniacal teenager you flamed last
weekend, for posting a step-by-step description of how he
made plastic explosive in his high-school chem lab. He
seemed kind of mad.
But you're an upstanding citizen; you have nothing to hide.
So why not use your name on the nets? Trust me. There's
nothing to worry about.
Is there?
* * * * *
WHAT'S ALL THIS BROUHAHA?
-------------------------
Stupidity is evil waiting to happen. [Clay Bond]
Not long ago in Fidonet's BCSNET echo (the Boston Computer
Society's national conference), the following was posted by
the conference moderator to a user calling himself "Captain
Kirk":
"May we ask dear Captain Kirk that it would be very
polite if you could use your real name in an echomail
conference? This particular message area is shared
with BBS's all across the country and everyone else is
using their real name. It is only common courtesy to
do so in an echomail conference."
One of us (mkj) responded with a post questioning that
policy. Soon the conference had erupted into a heated
debate! Although mkj had worried that the subject might be
dismissed as trivial, it apparently touched a nerve. It
brought forth debate over issues and perceptions central to
computer communications in general, and it revealed profound
disparities in fundamental values and assumptions among
participants.
This article is a response to that debate, and to the
prevailing negative attitudes regarding the use of handles.
Handles seem to have a bad reputation. Their use is
strangely unpopular, and frequently forbidden by network
authorities. Many people seem to feel that handles are rude
or dishonest, or that anyone wishing to conceal his or her
identity must be up to no good. It is the primary purpose
of this article to dispel such prejudices.
Let us make one thing perfectly clear here at the outset: We
do NOT challenge the need or the right of sysops to know the
identities of their users! But we do believe that a sysop
who collects user names has a serious responsibility to
protect that information. This means making sure that no
one has access to the data without a legal warrant, and it
certainly means not pressuring users to broadcast their real
names in widespread public forums such as conferences.
* * * * *
SO YOU WANT TO BE A STAR?
-------------------------
John Lennon died for our sins. [anonymous]
Andy Warhol said that "In the future, everyone will be
famous for fifteen minutes". The computer nets, more than
any other medium, lend credibility to this prediction. A
network conference may span the globe more completely than
even satellite TV, yet be open to anyone who can afford the
simplest computer and modem. Through our participation in
conferencing, each of us becomes, if only briefly, a public
figure of sorts -- often without realizing it, and without
any contemplation of the implications and possible
consequences.
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
periodic surveys of Usenet conference readership. His
statistical results for the end of 1991 show that of the
1,459 conferences which currently make up Usenet, more than
fifty percent have over 20,000 readers apiece; the most
popular conferences are each seen by about 200,000 readers!
Mr. Reid's estimate of total Usenet readership is nearly TWO
MILLION people.
Note that Mr. Reid's numbers are for Usenet only; they do
not include any information on other large public nets such
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
they take into account thousands of private networks which
may have indirect public network connections. The total
number of users with access to public networks is unknown,
but informed estimates range to the tens of millions, and
the number keeps growing at an amazing pace -- in fact, the
rate of growth of this medium may be greater than any other
communications medium in history.
The special problems and risks which arise when one deals
with a large public audience are something about which most
computer users have little or no experience or
understanding. Until recently, those of us involved in
computer conferencing have comprised a small and rather
elite community. The explosion in network participation is
catching us all a little unprepared.
Among media professionals and celebrities, on the other
hand, the risks of conducting one's business in front of a
public audience are all too familiar. If the size of one's
audience becomes sufficiently large, one must assume that
examples of virtually every personality type will be
included: police and other agents of various governments,
terrorists, murderers, rapists, religious fanatics, the
mentally ill, robbers and con artists, et al ad infinitum.
It must also be assumed that almost anything you do, no
matter how innocuous, could inspire at least one person,
somewhere, to harbor ill will toward you.
The near-fatal stabbing of actress Theresa Saldana is a case
in point. As she was walking to her car one morning near her
West Hollywood apartment, a voice behind her asked, "Are you
Theresa Saldana?"; when she turned to answer, a man she had
never seen before pulled out a kitchen knife and stabbed her
repeatedly.
After her lengthy and painful recovery, she wrote a book on
the experience ("Beyond Survival", 1986). In that book she
wrote:
[pg 12] "... Detective Kalas informed me that the
assailant, whom he described as a Scottish drifter, had
fixated upon me after seeing me in films."
[pg 28] "... it was through my work as an actress that
the attacker had fixated on me. Naturally, this made
me consider getting out of show business ..."
[pg 34] "For security, I adopted an alias and became
'Alicia Michaels.' ... during the months that followed
I grew so accustomed to it that, to this day, I still
answer reflexively when someone calls the name Alicia!"
Or consider the fate of Denver radio talk show host Alan
Berg, who in 1984 died outside his home in a hail of
gunfire. Police believe he was the victim of a local neo-
nazi group who didn't like his politics.
We are reminded of the murders of John Lennon and Rebecca
Shaffer; the Reagan/Hinckley/Foster incident; and a long
string of other "celebrity attacks" of all sorts, including
such bizarre events as the occupation of David Letterman's
home by a strange woman who claimed to be his wife! There is
probably no one in public life who doesn't receive at least
the occassional threatening letter.
Of course, ordinary participants in network conferencing may
never attract quite the attention that other types of
celebrities attract. But consider the following, rather less
apocalyptic scenarios:
-- On Friday night you post a message to a public
conference defending an unpopular or controversial
viewpoint. On Monday morning your biggest client
cancels a major contract. Or you are kept up all
night by repeated telephone calls from someone
demanding that you "stop killing babies"!
-- You buy your teenage son or daughter a computer and
modem. Sometime later you find your lawn littered
with beer bottles and dug up with tire marks, or
your home vandalized or burglarized.
-- One day you are nominated to the Supreme Court. Who
are all these strange people on TV claiming to be
your friends? How did that fellow know your position
on abortion? Your taste in GIFs?
Celebrities and other professional media personalities
accept the risks and sacrifices of notoriety, along with the
benefits, as part of their chosen careers. Should computer
conference participants be expected to do the same? And who
should be making these decisions?
* * * * *
OTHER MEDIA
-----------
When thou art at Rome, do as they do at Rome [Cervantes]
Older media seem to address the problems of privacy very
differently than computer media, at least so far. We are
not aware of ANY medium or publication, apart from computer
conferencing, where amateur or even most professional
participants are required to expose their true names against
their will. Even celebrities frequently use "stage names",
and protect their addresses and phone numbers as best they
can.
When a medium caters specifically to the general public,
participants are typically given even greater opportunities
to protect their privacy. Television talk shows have been
known to go so far as to employ silhouetting and electronic
alteration of voices to protect the identities of guests,
and audience members who participate are certainly not
required to state their full names before speaking.
The traditional medium most analogous to computer
conferencing may be talk radio. Like conferencing, talk
radio is a group discussion and debate medium oriented
toward controversy, where emotions can run high. Programs
often center around a specific topic, and are always run by
a "host" whose role seems analogous in many respects to that
of a conference moderator. It is therefore worth noting
that in talk radio generally, policy seems to be that
callers are identified on the air only by their first names
(unless of course they volunteer more).
Finally, of course, authors have published under "pen names"
since the dawn of publishing, and newspapers and magazines
frequently publish letters to the editor with "name and
address withheld by request" as the signature line. Even
founding fathers Alexander Hamilton, James Madison and John
Jay, in authoring the seminal Federalist Papers in 1787 for
publication in the Letters columns of various New York City
newspapers, concealed their identities behind the now-famous
psuedonym "Publius".
What would you think if someone called a radio talk show
demanding to know the identity of a previous caller? Such a
demand would undoubtedly be seen as menacing and
inappropriate in that context. Yet that same demand seems
to arise without much challenge each time a handle shows up
in a computer conference. The authors of this article feel
that such demands should always be looked upon as
suspicious, and that it would be beneficial for moderators
to take upon themselves the responsibility of making sure
that besieged handle-users are aware of their right to
refuse such inappropriate demands.
It is reasonable to assume that privacy policies in
traditional media are the result of hard-won wisdom gained
from long experience. Are we so arrogant that we cannot
learn from others? It is not hard to imagine the sorts of
problems and experiences which shaped these policies in the
old media. Will we have to wait for similar problems to
occur on the computer networks before we learn?
* * * * *
PRIVACY AND SURVEILLANCE
------------------------
In an effort to identify people who fail to file tax
returns, the Internal Revenue Service is matching
its files against available lists of names and
addresses of U.S. citizens who have purchased
computers for home use. The IRS continues to seek
out sources for such information. This information
is matched against the IRS master file of taxpayers
to see if those who have not filed can be
identified.
[COMPUTERWORLD, Sept. 1985]
Date: Thu, 23 May 91 11:58:07 PDT
From: mmm@cup.portal.com
Subject: The RISKS of Posting to the Net
-
I just had an interesting visit from the FBI. It
seems that a posting I made to sci.space several
months ago had filtered through channels, caused the
FBI to open (or re-open) a file on me, and an agent
wanted to interview me, which I did voluntarily...
I then went on to tell him about the controversy
over Uunet, and their role in supplying archives of
Usenet traffic on tape to the FBI...
[RISKS Digest]
Also frequent are instances where computers are
seized incident to an unrelated arrest. For
example, on February 28, 1991, following an arrest
on charges of rape and battery, the Massachusetts
state and local police seized the suspect's computer
equipment. The suspect reportedly operated a 650-
subscriber bulletin board called "BEN," which is
described as "geared largely to a gay/leather/S&M
crowd." It is not clear what the board's seizure is
supposed to have accomplished, but the board is now
shut down, and the identities and messages of its
users are in the hands of the police.
[CONSTITUTIONAL, LEGAL, AND ETHICAL
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
FILES IN THE AGE OF CYBERSPACE, Harvey A.
Silverglate and Thomas C. Viles]
Most of us have been brought up to be grateful for the fact
that we live in a nation where freedom is sacred. In other
countries, we are told as children, people are afraid to
speak their minds for fear they are being watched. Thank
God we live in America!
It would surprise most of us to learn that America is
currently among the premiere surveillance nations in the
world, but such, sadly, is indeed the case. Our leadership
in technology has helped the U.S. government to amass as
much information on its citizens as almost any other nation
in history, totalitarian or otherwise. And to make matters
worse, a consumer surveillance behemoth has sprung up
consisting of huge private data-collection agencies which
cater to business.
As Evan Hendricks, editor of "Privacy Times" (a Washington
D.C.-based newsletter) has put it: "You go through life
dropping bits and pieces of information about yourself
everywhere. Most people don't realize there are big vacuum
cleaners out there sucking it all up." [Wall Street
Journal, March 14, 1991].
To get an idea of how much of your privacy has already been
lost, consider the bits and pieces of information about
yourself which are already available to investigators, and
how thoroughly someone might come to know you by these clues
alone.
A person's lifestyle and personality are largely described,
for example, by his or her purchases and expenses; from your
checking account records -- which banks are required by law
to keep and make available to government investigators -- a
substantial portrait of your life will emerge. Credit card
records may reveal much of the same information, and can
also be used to track your movements. (In a recent case,
"missing" Massachusetts State Representative Timothy O'Leary
was tracked by credit-card transactions as he fled across
the country, and his movements were reported on the nightly
news!)
Then there are your school records, which include IQ and
other test results, comments on your "socialization" by
teachers and others, and may reveal family finances in great
detail. Employment and tax records reveal your present
income, as well as personal comments by employers and co-
workers. Your properties are another public record of your
income and lifestyle, and possibly your social status as
well. Telephone billing records reveal your personal and
business associations in more detail. Insurance records
reveal personal and family health histories and treatments.
All of this information is commonly accessed by government
and private or corporate investigators. And this list is
far from exhaustive!
Now consider how easily the computer networks lend
themselves to even further erosions of personal privacy. The
actual contents of our mail and telephone traffic have up to
now been subjected to deliberate scrutiny only under
extraordinary conditions. This built-in safety is due
primarily to the difficulty and expense of conducting
surveillance in these media, which usually requires extended
human intervention. But in the medium of computer
communications, most surveillance can be conducted using
automated monitoring techniques. Tools currently available
make it possible and even cost-effective for government and
other interests to monitor virtually everything which
happens here.
Why would anyone want to monitor network users? It is well
documented that, throughout the 1960s and 1970s, the FBI and
other agencies of government, in operations such as the
infamous COINTELPRO among others, spent a great deal of time
and effort collecting vast lists of names. As Computer
Underground Digest moderators Jim Thomas and Gordon Meyer
recalled in a recent commentary (CuD #3.42):
"A 1977 class action suit against the Michigan State
Police learned, through FOIA requests, that state and
federal agents would peruse letters to the editor of
newspapers and collect clippings of those whose politics
they did not like. These news clippings became the basis
of files on those persons that found there way into the
hands of other agencies and employers."
To get onto one of these government "enemies" lists, you
often needed to do nothing more than telephone an
organization under surveillance, or subscribe to the "wrong"
types of magazines and newspapers. Groups engaged in
political activism, including environmental and women's
rights organizations, were commonly infiltrated. The sort
of investigative reporting which uncovered these lists and
surveillances back in the '60s and '70s is now rare, but
there is little reason to assume that such activities have
ceased or even slowed. In fact, progressive computerization
of local police LEIU activities (Law Enforcement
Intelligence Units, commonly known as "red squads") suggests
that such activities may have greatly increased.
Within the realm of computer conferencing especially, there
is ample reason to believe that systematic monitoring is
being conducted by government and law-enforcement
organizations, and perhaps by other hostile interests as
well. In a recent issue of Telecom Digest
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
on the results of a recent Freedom of Information Act
request for documents from the Secret Service:
" ... The documents also show that the Secret Service
established a computer database to keep track of
suspected computer hackers. This database contains
records of names, aliases, addresses, phone numbers,
known associates, a list of activities, and various
[conference postings] associated with each individual."
But the privacy issues which surround computer
communications go far beyond the collection of user lists.
Both government and industry have long pursued the elusive
grail of personality profiling on citizens and consumers. Up
to now, such ambitions have been restrained by the practical
difficulty and expense of collecting and analyzing large
amounts of information on large numbers of citizens. But
computer communications, more than any other technology,
seems to hold out the promise that this unholy grail may
finally be in sight.
To coin a phrase, never has so much been known by so few
about so many. The information commonly available to
government and industry investi-gators today is sufficient
to make reliable predictions about our personalities,
health, politics, future behavior, our vulnerabilities,
perhaps even about our innermost thoughts and feelings. The
privacy we all take for granted is, in fact, largely an
illusion; it no longer exists in most walks of life. If we
wish to preserve even the most basic minimum of personal
privacy, it seems clear that we need to take far better care
on the networks than we have taken elsewhere.
* * * * *
FREEDOM
-------
Human beings are the only species with a history.
Whether they also have a future is not so obvious.
The answer will lie in the prospects for popular
movements, with firm roots among all sectors of the
population, dedicated to values that are suppressed
or driven to the margins within the existing social
and political order...
[Noam Chomsky]
In your day-to-day social interactions, as you deal with
employers, clients, public officials, friends, acquaintances
and total strangers, how often do you feel you can really
speak freely? How comfortable are you discussing
controversial issues such as religion, taxes, politics,
racism, sexuality, abortion or AIDS, for example? Would you
consider it appropriate or wise to express an honest opinion
on such an issue to your boss, or a client? To your
neighbors?
Most of us confine such candid discussions to certain
"trusted" social contexts, such as when we are among our
closest friends. But when you post to a network conference,
your boss, your clients, and your neighbors may very well
read what you post -- if they are not on the nets today,
they probably will be soon, as will nearly everyone.
If we have to consider each post's possible impact on our
social and professional reputations, on our job security and
income, on our family's acceptance and safety in the
community, it could be reckless indeed to express ourselves
freely on the nets. Yet conferences are often geared to
controversy, and inhibitions on the free expression of
opinions can reduce traffic to a trickle, killing off an
important conference topic or distorting a valuable sampling
of public opinion.
More important still is the role computer networks are
beginning to play in the free and open dissemination of news
and information. Democracy is crippled if dissent and
diversity in the media are compromised; yet even here in the
U.S., where a "free press" is a cherished tradition, the
bulk of all the media is owned by a small (and ever-
shrinking) number of corporations, whose relatively narrow
culture, interests and perspec-tives largely shape the
public perception.
Computer communication, on the other hand, is by its nature
very difficult to control or shape. Its resources are
scattered; when one BBS goes bust (or is busted!), three
others spring up in its place. The natural resiliency of
computer communications (and other new, decentral-ized
information technologies such as fax, consumer camcorders
and cheap satellite links) is giving rise to a new brand of
global "guerrilla journalism" which includes everyone, and
defies efforts at suppression.
The power and value of this new journalistic freedom has
recently shown itself during the Gulf War, and throughout
Eastern Europe and the Soviet Union, as well as within the
U.S. Just think of the depth and detail of information
available on the nets regarding the Secret Service's recent
"Operation Sundevil" and associated activities, compared to
the grossly distorted, blatantly propagandistic coverage of
those same activities given to the general public through
the traditional media.
Historically, established power and wealth have seldom been
disposed to tolerate uncontrolled media, and recent events
in this country and elsewhere show that computer media are
sometimes seen as threats to established interests as well.
To understand the role of handles in this context, it is
useful to note the flurries of anti-handle sentiment which
have arisen in the wake of crackdowns such as Sundevil, or
the Tom Tcimpidis raid in the early 1980s. Although few
charges and fewer convictions have typically resulted from
such operations, one might be tempted to speculate that the
real purposes -- to terrorize the nets and chill freedoms of
speech and assembly thereon -- have been achieved.
In this way, sysops and moderators become unwitting
accomplices in the supression of freedom on the networks.
When real name requirements are instituted, anyone who fears
retaliation of any sort, by any group, will have to fear
participation in the nets; hence content is effectively
controlled. This consideration becomes especially important
as the nets expand into even more violent and repressive
countries outside the U.S.
We must decide whether freedom of information and open
public discussion are in fact among the goals of network
conferencing, and if so, whether handles have a role in
achieving these goals. As access to the networks grows, we
have a rare opportunity to frustrate the efforts of
governments and corporations to control the public mind! In
this way above all others, computers may have the potential
to shape the future of all mankind for the better.
* * * * *
A CALL TO ACTION
----------------
The move to electronic communication may be a turning
point that history will remember. Just as in
seventeenth and eighteenth century Great Britain and
America a few tracts and acts set precedents for
print by which we live today, so what we think and do
today may frame the information system for a
substantial period in the future.
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
There was a time when anybody with some gear and a few
batteries could become a radio broadcaster -- no license
required. There was a time when anyone with a sense of
adventure could buy a plane, and maybe get a contract to
carry mail. Those early technological pioneers were
probably unable to imagine the world as it is today, but
their influence is strongly felt in current laws,
regulations and policies with roots in the traditions and
philosophies they founded and shaped.
Today the new pioneers are knitting the world together with
computers, and the world is changing faster than ever. Law
and ethics are scrambling to keep up. How far will this
growth take us? No one can say for sure. But you don't
need a crystal ball to see that computer communications has
the potential to encompass and surpass all the functionality
of prior media -- print, post, telegraph, telephone, radio
and television -- and more. It seems reasonable to assume
that computer communications will be at least as ubiquitous
and important in the lives of our grandchildren as all the
older media have been in ours.
It will be a world whose outlines we can now make out only
dimly. But the foundations of that world are being built
today by those of us exploring and homesteading on the
electronic frontier. We need to look hard at what it will
take to survive in the information age.
In this article we have attempted to show, for one very
narrow issue, what some of the stakes may be in this future-
building game. But the risks associated with exposing your
name in a computer conference are not well defined, and
various people will no doubt assess the importance of these
risks differently. After all, most of us take risks every
day which are probably greater than the risks associated
with conferencing. We drive on the expressway. We eat
sushi. To some people, the risks of conferencing may seem
terrifying; to others, insignificant.
But let us not get side-tracked into unresolvable arguments
on the matter. The real issue here is not how dangerous
conferencing may or may not be; it is whether you and I will
be able to make our own decisions, and protect ourselves (or
not) as we see fit. The obvious answer is that users must
exercise their collective power to advance their own
interests, and to pressure sysops and moderators to become
more sensitive to user concerns.
To help in that effort, we would like to recommend the
following guidelines for user action:
-- Bear in mind John Perry Barlow's observation that
"Liberties are preserved by using them". Let your
sysop know that you would prefer to be using a
handle, and use one wherever you can.
-- Try to support boards and conferences which allow
handles, and avoid those which don't.
-- When using a handle, BEHAVE RESPONSIBLY! There will
always be irresponsible users on the nets, and they
will always use handles. It is important for the
rest of us to fight common anti-handle prejudices by
showing that handles are NOT always the mark of an
irresponsible user!
-- Educate others about the importance of handles (but
NEVER argue or flame anyone about it).
To sysops and moderators: We ask you to bear in mind that
authority is often used best where it is used least. Grant
users the right to engage in any harmless and responsible
behaviors they choose. Protect your interests in ways which
tread as lightly as possible upon the interests of others.
The liberties you preserve may be your own!
In building the computer forums of today, we are building
the social fabric of tomorrow. If we wish to preserve the
free and open atmosphere which has made computer networking
a powerful force, while at the same time taking care against
the risks inherent in such a force, handles seem to be a
remarkably harmless, entertaining and effective tool to help
us. Let's not throw that tool away.
----------------------------------------------------------------------
[end of excerpt]
--
David Collier-Brown, | davecb@Nexus.YorkU.CA | lethe!dave
72 Abitibi Ave., |
Willowdale, Ontario, | He's so smart he's dumb.
CANADA. 416-223-8968 | -- Joyce Collier-Brown
From caf-talk Caf Jun 10 00:17:10 1992

View File

@@ -0,0 +1,493 @@
No such file
(>View: THE APPLE MAFIA F STORY/F/THE SA
*******************************************************************************
******* *******
******* The Apple Mafia Story *******
******* *******
******* As Told To: Red Ghost *******
******* *******
*******************************************************************************
The reason I'm writing this file is to (hopefully) once and for all, clear up
all the rumors, false statements, and just lies, that are going around about
one of the first 3 pirate groups ever. (Untouchables, Apple Mafia, Dirty Dozen)
I won't get into the other two, because there already is "The Untouchables"
story, and I'm not qualified to make comments about the Dirty Dozen.
Everything in this file is fact. I grew up in Queens NY (now 718). Where many
of the "original" pirates and phreaks, were from. Many of the readers will
question certain aspects of this file, or my authority to write it. But they
are always more than welcome to go to the sources themselves and find the truth
is what I am writing.
*******************************************************************************
To begin with, I'm now 22 and going to college. I have been out of the "wares
world" for the better part of 2 years. What prompted me to write this is a
younger friend of mine, who is now a "pirate" and spends his life calling all
the boards, and getting all the wares (Not making fun of anyone, I went
through the same phase when I started, but it was very different from the
pirates world of today). About a week ago he told me about the "Apple Mafia"
regrouping. I said bullshit. And I was right. He gave me some of the files
on discussions now going on about the "new" "apple mafia" and I must say it's
pretty sad.
I felt the real story of what went on should be told, so here it is.
One more thing before I start. I was never in the Apple Mafia, or any of the
other groups mentioned here. I never had that deep an interest in computers
as anything but game machines or better typewriters. But I grew up in close
proximety to many of the people involved, and spent time with them in other
areas besides computers.
*******************************************************************************
From the messages posted about the controversy I have seen. I think it might be
best to go through them 1 by 1. So here's the first one:
(Buffer of msg's. Untouched by me, except the conversion from 40 to 80 cols.)
*******************************************************************************
To:The Fake Apple Mafia From:Disk Rigger
You are definatly not the real Apple Mafia. It was a popular group a while ago.
It incluted Bioc Agent 003, Tuc, Hight Technology, Creative Cracker and a few
others. I will inform them of you losers using there names and you will be
ragged out of your minds. I would recomend you changed your group name or you
will feel the wrath of Bioc!
This is serious and you losers can keep your unoriginal name but You will pay
for it.
(Someone's reply.)
Disk Digger:
Get a life dude. The Apple Mafia is OVER. BIOC Agent was thrown out of
the Apple Mafia. The final members were Tuc, Lord Digital, Creative
Cracker, High Technology, Big Brother the Phantom, Silicon Scorpion, &
Sherlock Apple. Nobody is going to Feel the wrath of Bioc
(hahahahahhahahahahha). because 1. he quit the phreak/pirate world over a year
ago. 2. if he WAS around he wouldnt give a shit. 3. The old members who are
still around probably care even less.
(Someone elses reply.)
While the new "apple mafia" (get a life you fuckups. you might as well call
yourselves the Untouchables.) are idiots.
new warez r0dentz who sure as hell weren't around when the REAL apple mafia was
around, are even bigger r0dents. This means YOU disk digger.
Naming yourself after a program used to pack new wherez. get a life you fat
fuckup. And if the people in the apple mafia knew YOU were throwing their names
around on a fucking catfur, YOU are the one they would be mad at.
FUckup
*******************************************************************************
Despite incorrect statements in both parties messeges, this seems like a good
time to point out that Bioc Agent was never in the Apple Mafia to begin with.
The members changed through time, but Bioc was never a member. (More on him at
a later time) The Final members were: (If you doubt this, then boot up any ware
cracked by them in 84-85. Which was the final regrouping of the Mafia)
The Godfather (Charles). The Phantom (Eric). Creative Cracker (Marc).
High Technology (Craig). Lord Digital (Patrick). Jacque Lafitte (Jack).
The Magnet (Joe). Sherlock Apple (Dave). Silicon Scorpion (Mark).
Data Dragon (Jordon). Big Brother (Andy). & towards the very end: Tuc (Scott).
Former members who were thrown out or quit: The Parasite, Tylenol Cyanide,
Yosemite Sam, and people I don't remember from CA.
(More Messages)
*******************************************************************************
Number > 7
Subject> Apple Mafia? (Ha)
Viewer > DISK RIGGER <Elite>
Posted > MON MAR 17 4:24:17 PM
Genius. Are you talking about that
loser group in 213? They are in for it.
If you didnt know already there was
already a group Called Apple Mafia. Too
bad two of 'em were FEDS.
Hey, Where ANY of you ever on The Old
Sherwood Forest's? [ /, //, /// ]?
(Another msg.)
Number > 8
Subject> SHERWOOD FORESTS
Author > CHRONOS
Posted > MON MAR 17 5:03:32 PM
Yeah, I was on // and ///... I never got an answer at / though... Wasn't the
Apple Mafia (later Micro Mafia) running those boards?
[chronos/KOTBC]
And didn't they break up before they got busted? I remember something about
them just giving up, cause 2 guys were doing all the work...then they put
Yellowbeard in charge and it was never heard from again...
(Another msg.)
Number > 13
Subject> Sherwood Forest
Viewer > WARE BANDIT <Elite>
Posted > TUE MAR 18 3:43:11 PM
What two members of The Real Apple
Mafia were feds? Because I knew several
including High tech, and Creative.
And the reason you neve got an answer
at sherwood forest / was because that
was the old sherwood forest //... High
tech moved from Ny, and after he set it
up at his new place he called it
Sherwood forest //.... Well I have many
old files, and posts saved from the
last grand adventure (that was thier
logo), So if you would like to view
them then just leave me a message on
the underground.
later, [Ware Bandit]
(Another msg.)
Number > 14
Subject> WB..
Viewer > DISK RIGGER <Elite>
Posted > TUE MAR 18 4:17:52 PM
I think Magnetic Surfer ran it. Yeah I
also have a lot of things saved on
Buffer. They had a LARGE G-File
section. And a TRUELY awesome Elite
sub.
And some people got the impression that
Creative Cracker was a lazy ass. It is
not true. The board was being runned by
Federal Agents. He just came in to look
at it.
(Another msg.)
Number > 15
Subject> SERIOUS?
Author > CHRONOS
Posted > TUE MAR 18 5:44:17 PM
Sherwood Forests were really being run by Feds? I'd like to know who... they
let it get pretty far before they busted them then...
[chronos/KOTBC]
(Another msg.)
Number > 18
Subject> The forest
Viewer > WARE BANDIT <Elite>
Posted > WED MAR 19 3:23:11 PM
Okay this might clear some things up between some people that might be confused
on the subject.
Sherwood Forest .... Used to be run by High Tech. About 2-3 years ago.
Sherwood Forest // The later Sherwood forest run by High tech. when he moved.
Sherwood Forest /// Ran by Creative Cracker, a good friend of High tech.
and no they were not feds, they just got a little carried away with the way
they were running thier boards by letting just about anyone access most of the
phreak sections that they had on-line. The Treasury dept. finally closed them
down along with cryton and some other un-heard of hack boards.
If you have any questions feel free to ask.. I was going to run thier number 4
board, but shortly after I was offered the opurtunity they went under...
*******************************************************************************
I don't know where these msg's are from, or who these people are. But almost
everything said in them is wrong.
"I heard 2 guys were doing all the work, so they quit". Whoever said that has
obviously read the 1984 loserlist, because that is a verbatim quote from it.
Not only is it wrong in slandering everyone from Apple Bandit, Hot Rod, and
Wombat/Gonif, to Bioc Agent, Lord Digital and Paul Muad'Dib. But it's written
in a such a ridiculous fashion, that any points the author was trying to make
are lost in the jumble (For those who care it was written by "The Atom").
Sherwood Forests (The last grand adventure).
The FIRST Sherwood Forest was started in 1979 by Magnetic Surfer. The only
people who were on it back then, and still recognized would be Mr. Xerox and
Lord Digital. Other members included Nickie Halflinger, Captain Crunch,
Napoleon Bonaparte, and many others, whose names are probably meaningless to
the people around today.
There was a 20 page write up on "Hackers", before it was in vogue to write
about them (Before WarGames and the 414 busts), In a 1982 issue of "California"
magazine. Which detailed the bust of Ron Austin, who was at the time of arrest
22 years old and being tried for everything from credit card fraud, to grand
theft. Also included in the article was a write up on Hacker bbs systems he
was on and people he knew. The Sherwood Forest mentioned in that article was
Magnetic Surfer's, not the later ones.
Sherwood forest was run on a micromodem and 1 disk drive. There were no Cat's,
DOS was at 3.1, and Disk Drives were still a novelty. It went down in 1981 for
whatever reasons, and went back up as a public system with 1200 & a 46 mb hard
drive in 1983. Shortly thereafter it went private and became the Knights of
Shadow Base bbs. During it's final days in 1984, this was the FINAL memberlist:
SYSTEM OPERATOR <-- Magnetic Surfer. TKOS member
PIT FIEND <-- Local Queens person
LORD DIGITAL <-- Name speaks for itself. Apple Mafia & TKOS member
CRIMINAL ELEMENT <-- Local Queens person, semi notorious for being a ass
STEPHEN FALKEN <-- aka: Jon Gleich of Earth News Central
THE SURGE <-- Unknown. Access from Lord Digital
BIG BROTHER <-- 617 phreak/pirate. Apple Mafia & TKOS member
E.F. HUTTON <-- 312 Phreak/Hacker. TKOS member
THE KNIGHTS OF SHADOW <-- TKOS account
MR. XEROX <-- Name speaks for itself. TKOS founder
CAPTAIN AVATAR <-- aka: Skip Rooney
DISK DEMON <-- Local Queens person
GUEST ACCOUNT <-- A guest account
THE MAGNET <-- Apple Mafia co-founder
THE PROWLER <-- Canadian Phreak, NOT the 612 Prowler
BIOC AGENT 003 <-- Name speaks for itself. TKOS member
QUASI MOTO <-- TKOS member. Ran PloverNet
PHONE FIEND <-- Local Queens person
TUC TUCBBS <-- Tuc. Name speaks for itself. TKOS member
PAUL MUAD'DIB <-- Name speaks for itself. TKOS member
HARDWARE HACKER <-- Local Queens person
TOM TONE <-- Brooklyn person
THE GODFATHER <-- Apple Mafia co-founder
PETER MCIVERS <-- 617 phreak/hacker
THE PHANTOM <-- Apple Mafia member
NICKIE HALFLINGER <-- Hacker, EEE, in his mid 30's
LEX LUTHOR <-- 305 person. Nobody at this time, later founded LOD
UNCLE JOE <-- Have no idea who this is
LESLIE KARASIC <-- Have no idea who this is
THE NECROMANCER <-- TKOS member
DR JIMMY MR JIM <-- TKOS member
THE WIZARD <-- Asshole from 713. Access from Quasi Moto
FRODO HOBBIT <-- Unknown, from 201. Access from Magnetic Surfer
THE DJIN <-- Unknown, from 718. Access from Magnetic Surfer
RICH DOUGAN <-- Unknown, from 718. Access from Magnetic Surfer
APPLE CAT <-- Unknown, from 718. Access from The Phantom
NAPOLEON BONAPARTE <-- TKOS member. Ex of: Inner Circle. ex Sys of SL
CHRISTOPHER BUNN <-- Unknown, from 718. Access from The Phantom
DR. DOOM <-- Have no idea who this is
WILD CAT <-- Have no idea who this is
THE DISKLAIMER <-- Have no idea who this is
MR IBM <-- Have no idea who this is
DRAGON LADY <-- Ex girlfriend of Chesire Catalyst
GAP DRAGON <-- Have no idea who this is
THE MARK <-- Have no idea who this is
CABLE PAIR <-- Fed par excellance`
STOSH FIXER <-- Have no idea who this is
MILO PHONBIL <-- Sysop of Once & Future OSUNY
MR. GUCCI <-- Sysop of AT&T Phone Center
DR. NIBBLEMASTER <-- TKOS member
STAINLESS STEAL RAT <-- TKOS member
And that's it. Reading the list you have to keep in mind that this was right
after the Inner Circle folded, and almost a year before LOD even began. So many
of the current "Big Names", didn't even own computers yet.
In 1983 a friend of their's (The 212/718 people), called Creative Cracker put
up a bbs called Sherwood Forest ][. For a while it had an ae line simply known
as "Sherwood Forest" in 201, then in 1984 Sherwood Forest ]I[ went up, run by
High Technology. The original co-sysops on SF ][ were High Tech & Jack The
Ripper. Jack was dropped, High Tech became a full sysop, and the new co-sysops
became: Tuc, Bioc & Big Brother.
SF ][ started on a disk ][ & a Rana ]I[ disk drive, Micromodem, and a clock. It
went down for 2 weeks in 1984, then came back up with all new software, 20 megs
and 1000's of files.
SF ]I[ went up with a disk ][ & a Rana ]I[, and that's as big as it ever got.
Creative Cracker was a full sysop. And the co-sysops were Sharp Razor, X-Man,
and Wizard 414. co-sub-ops of maintenence (whatever that is), were: Sherlock
Apple and Silicon Scorpion. All co-sysops and sub-ops were dropped after about
2 months.
None of the boards except for Magnetic Surfer's could be considered really
impressive by todays standards. Impressive in terms of hardware that is. This
is the time when just about the only hard drive was a corvus, whose prices for
a 6 meg started at $2000 in that time. and a complete Apple-Cat/212 card/exp-
ansion module system, came to over $1000.
And finally the Apple Mafia, was NEVER the "Micro Mafia", this was yet another
group of losers cashing in on their group name.
*******************************************************************************
I could go on about what happens to all the people from SF, but that's not the
purpose of this file, so I'm not going to digress. There are many files out
about many of the members (Lord Digital, Paul Muad'Dib, Mr. Xerox come to mind)
already. And others have made themselves known through LOD as well (Lex). What
this file is about is The Apple Mafia, so I'm not going to get into all that.
Which brings me to the final part. The Sherwood Forest Busts....
I'm saying right now that I don't know what happened, just offering the facts
that I do know about it.
If (as is said), SF][ was indeed run by the FBI towards the end. Then why did
they let Creative Cracker keep cracking software? It doesn't seem likely they
would have let him continue, did they just not know or what?
Now if they weren't running SF][, then even more questions come to mind. The
most important one is: why run a board if you truly don't care? CC never
looked at his board, never logged in, the news was updated once every 9 months
by BIOC.
What's more, if it WAS a trap, then logically the other Apple Mafia members had
to know about it. Or most of them. NONE of them EVER posted anything at all.
With the exception of Silicon Scorpion & Sherlock Apple, who kept posting new
wares.
It could be that they lost interest in piracy (As is true of Tuc, Lord Digital,
The Phantom, Big Brother, in fact, almost all the members), BUT this still does
not clear up why NONE of them EVER posted ANYWHERE, including the phreak boards
or the elite subs. Now BIOC did post, but if you know BIOC, he always left some
500 line exerpt he typed up from some magazine, or manual (Which is actually
just about all he ever did, much like Lex), nothing that could get him in any
kind of trouble.
These are the same people whose msg's I've seen buffers of from Sherwood Forest
(Magnetic Surfer's), and World of Cryton, who were posting techniques, systems,
and information, all over. But not ONE msg. from any of them on their supposed
"home base". Pretty weird....
The logical conclusion I draw from this is: They knew the board was being
watched at the very least, and didn't want to draw attention to themselves.
In which case they left everyone else to get caught, which is in keeping with
many of the peoples present attitudes. This is also the time during which the
Apple Mafia members who were also in TKOS got a lot of heat from that group
falling apart in a rather spectacular manner. With almost all of them in danger
of being busted for grand theft.
While SF][ & ]I[ didn't go down until summer of 1985, I would say the Apple
Mafia died almost a year eairlier. I talked to Silicon Scorpion towards the
end of 1984 and as he put it: "What group? I don't even have anyones number
anymore. How am I supposed to be part of a group whose members I can't even
find?" This refers to Creative Cracker whose voice number dissapeared, and
who never answered his feedback, The Phantom, ditto. Big Brother, ditto. Tuc,
ditto. Lord Digital, ditto + he stopped calling any boards. Data Dragon, he's
never home. Who's that leave? not many.
In the cases of The Phantom, Lord Digital and Tuc, this is understandable. They
were all undoubtedly living out paranoid fantasies of everything they'd ever
done catching up with them, as it did with Mr. Xerox not too far in the past.
But what happened to everyone else?
*******************************************************************************
The Apple Mafia is over. Maybe one day some of the members will regroup just
for fun. It would be interesting. But some loser named Judge Dredd, should go
crawl back where he came from. Or find another name for his lame excuse of a
group.
*******************************************************************************
Here is the "flyer" heralding the regrouping of the Mafia in 1984. Verbatim as
typed by The Godfather:
BRIEF HISTORY OF THE APPLE MAFIA.
FOUNDED IN 1980 BY THE GODFATHER AS
A JOKE. REDONE IN 1981 AS A SEMI
SERIOUS GROUP. KICKED SOME ASS IN
'82. BLEW EVERYONE AWAY IN 83, AND
WILL DO MUCH BETTER IN 84. SINCE
THE BEGINNING THE GROUP HAS DIED
OUT AND BEEN REBORN SEVERAL TIMES,
THIS TIME LETS KEEP IT GOING. IS
CURRENTLY THE OLDEST ACTIVE GROUP,
NEXT (OF PEOPLE WHO WOULD STILL BE
AROUND) ARE THE WARE LORDS ('83 I
BEILIEVE) AND THE 1200 CLUB ('83
ALSO, I THINK). THAT'S IT.
A FEW GENERAL IDEAS WE WISH TO PROMOTE:
WHEN YOU GET SOME NEW SOFTWARE CALL
UP AS MANY MAFIA MEMBERS AND GET IT
TO THEM FIRST.
GET IT POSTED UP ON THE BOARDS AS FAST
AS POSSIBLE, NOW WITH CATS, TIME IS
CRUTIAL. BE SURE TO STICK THE MAFIA
AT THE END.
DON'T GET THE GROUP INTO FIGHTS, AND
TRY NOT TO BE AN ASSHOLE.
IT HELPS TO GIVE OUT SOFTWARE TO OTHERS
- WITH THE MOB BEHIND YOU, NO ONE
CAN STOP YOU.
KEEP IN TOUCH WITH OTHER MEMBERS, IT
SUCKS WHEN YOU LOSE CONTACT, IF YOU
NEED ANY HELP CATCHING UP, JUST ASK
SOMEONE... THEY SHOULD BE WILLING TO
HELP YOU CATCH UP.
NEW MEMBERSHIPS ARE DECEIDED BY ALL
OF THE MEMBERS, IF YOU KNOW OF SOMEONE
DECENT, TELL EVERYONE ELSE.
THATS ABOUT IT.
THE GODFATHER
1986.
The Apple Mafia Story
Red Ghost
*******************************************************************************
(>==============================================================================
___ ___
(___><___) .....And if you enjoyed this TextFile, call The Works, 914's
\ _[]_ TextFile BBS:
\______/ \_____ The Works
_\ =========
_______________ \>\ (914)-238-8195 24 Hrs. 900+ Textfiles Online
/ \ \ 300/1200 Baud, N,8,1 Home of Terror Ferret
/ \___> 10 Megabytes of Storage ANSI Graphics Optional
==============================================================================
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,413 @@
> 1
INCREMENT TITLES BY: [DEFAULT IS 10] )=->
[01] PIRATE/TRADING
[02] WARES .....
[03] CALL...
[04] ALL THE K00L STUFF
[05] AE LINE
[06] WHY NOT
[07] THE LIST
[08] APPLE WARES-->
[09] PLEASE TELL OTHERS...
[10] BASICALLY
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->
->[11] SOME WARES
->[12] THE REAL NEW WARES
->[13] APPLICATIONS AVAILABLE
->[14] NEW WARES FOR YA
[T] [R] [P] [Z] [E] [Q] [?] --->****)=->R
(1-14, LAST=0, QUIT=Q) READ MSG.#1
MESSAGE #1: PIRATE/TRADING
MSG LEFT BY: HIGH TECHNOLOGY
POSTED:
***************************************
* *
* WELCOME TO SHERWOOD FOREST /// *
* *
* THIS SUB-BOARD IS DEDICATED *
* TO APPLE SOFTWARE.... *
* *
* ENJOY THE FOREST *
* *
* )=-> SYSOP <-=( *
***************************************
(1-14, LAST=1, QUIT=Q) READ MSG.#
MESSAGE #2: WARES .....
MSG LEFT BY: SHERLOCK APPLE
POSTED:
I HAVE EM ALL !!!!!!
SHERLOCK APPLE
(1-14, LAST=2, QUIT=Q) READ MSG.#
MESSAGE #3: CALL...
MSG LEFT BY: CREATIVE CRACKER
POSTED:
Call...
__________________
_________/Sherwood Forest ][\_________
\^^^^^^^^=^^^^^^=^^/
___[914][359][1517]___
-> 20 Megs. On-Line..
-> 31 Sub-Boards..
-> 15 G-Sections..
Open 24 Hours - 7 Days a week..
Free Validation
Many Advanced Options...
Call Today!!!!
[914][359][1517]
(1-14, LAST=3, QUIT=Q) READ MSG.#
MESSAGE #4: ALL THE K00L STUFF
MSG LEFT BY: THE ROGUE
POSTED:
Yes, I've got all the new stuff or can get it real quick.
So if you want anything, new or old, just leave E-Mail.
The Rogue
Catsend/Disk-fer ONLY!!!!
very few exceptions but....
(1-14, LAST=4, QUIT=Q) READ MSG.#
MESSAGE #5: AE LINE
MSG LEFT BY: UNKNOWN PIRATE
POSTED:
.......................................
. I HAVE BEEN ON VACATION ABOUT 2 MON .
. THS AND I WANT TO PUT MY LINE .
. BACK UP BUT I GO NO SOFTWARE NEW .
. SO ANY BODY WHO WANTS TO HELP ME OU .
. T AND GET MUCH STUFF AFTER I GET BA .
. CK ON MY FEET PLEASE SEND ME E-MAIL .
. .
. LATER .
. .
. .
. BY THE WAY IF YOU WANT TO SEE WHAT .
. NEW SOFTWARE WILL BE AVALIBLE IN TH .
. E NEXT FEW MONTHS READ MY MESSAGE O .
. N SHERWOOD II IT TOOK ME 1/2 HOUR T .
. O TYPE AND I DON'T FEEL LIKE TYPING .
. IT AGAIN MABBE SOME OTHER TIME .
. .
. UNKNOWN PIRATE .
.......................................
(1-14, LAST=5, QUIT=Q) READ MSG.#
MESSAGE #6: WHY NOT
MSG LEFT BY: UNKNOWN PIRATE
POSTED:
WHAT THE HELL HERES A LIST OF ALL THE S
OFTWARE FOR THE NEXT FEW MONTHS.
ATARI--YAACOV AGAM'S INTERACTIVE PAINTI
NG, FIND IT, THE ABC'S OF CPR, WHEELER
DEALER, SIMULATED COMPUTER,TELLY TURTLE
GREMLINS, TRACK AND FIELD, MARIO BROS.
DONKEY KONG JR., CRYSTAL CASTLES.
BAEN--WINGS OUT OF SHADOW, BERSERKER
RAIDS, THE ELECTRIC DRAGON,SNAKE,STARCL
ASH II.
BRODERBUND--CHAMP. LODE RUNNER, CAPTAIN
GOODNIGHT AND THE ISLANDS OF FEAR,MERCY
BIRDS, BANK ST. FILER, BANK STREET MAIL
ER, DAZZLE DRAW, WHERE IN THE WORLD IS
CARMEN SANDIEGO?.
COLECO--TARZAN,WARGAMES,CABBAGE PATCH
KID ADVENTURES,FORTUNE BIULDER,DR. SUES
S FIX UP AND MIX UP BUILDER.
DATAMOST--ANKH, MYCHESS II,EARTHY DELIG
TS.
DATASOFT--JUNO FIRST,MANOCOPTER,MERIDIA
N III,BRUCE LEE,DALLAS,ZAXXON(IIC),LOST
TOMB.
EPYX--HOT WHEELS,GI JOE,BARBIE,BREAKDAN
CE, ROBOTS OF DAWN.
FIRST STAR--ROMPER ROOM'S I LOVE MY ALP
BET,SPY VS. SPY,US ADVENTURE.
INFOCOM--CUTTHROAT
PENGUIN--XYPHUS
ORIGIN--CAR WARS, ORGE
SSI--OBJECTIVE KURST,50 MISSION CRUNCH
TRAPEZE--LIFESPAN,SETI
THATS ALL FOR APPLE CHECK OUT COMMODORE
ATARI,IBM AND POSSIBLY SOME OTHERS
ON OTHER ONLINE BOARDS OF VARIOUS BBS'S
UNKNOWN PIRATE.
(1-14, LAST=6, QUIT=Q) READ MSG.#
MESSAGE #7: THE LIST
MSG LEFT BY: UNKNOWN PIRATE
POSTED:
THE LIST I TYPED WAS A LIST OF NEW
GAMES SOON TO BE RELEASED BY THE
MANUFACTERS OR GAMES JUST RELEASE
I DON'T HAVE MOST OF THE SHIT YET.
UNKNOWN PIRATE
(1-14, LAST=7, QUIT=Q) READ MSG.#
MESSAGE #8: APPLE WARES-->
MSG LEFT BY: PRO-GRAMMER
POSTED:
Aybody out there who wants to trade apple wares,i'm all ears.I have a lot,
and can get most other stuff(the littile that i don't have that is).I'm
looking for some good business programs(compilers,assemblers,spreadsheets etc.)
so anybody interested,leave me e-mail.
LATER--->
THE
[PRO-GRAMMER]
/EX
(1-14, LAST=8, QUIT=Q) READ MSG.#
MESSAGE #9: PLEASE TELL OTHERS...
MSG LEFT BY: HIGH TECHNOLOGY
POSTED:
***************************************
* *
* PLEASE TELL OTHERS ABOUT *
* SHERWOOD FOREST ///.THE MORE CALLS *
* THAT THIS SYSTEM GETS....THE BETTER *
* THE SYSTEM GETS.... *
* *
* ALSO PLEASE POST ABOUT *
* SHERWOOD FOREST /// ON OTHER BBS'S. *
* *
* THANK-YOU *
* *
* )=-> SYSOP <-=( *
* *
* *
***************************************
(1-14, LAST=9, QUIT=Q) READ MSG.#
MESSAGE #10: BASICALLY
MSG LEFT BY: CAPTAIN CANADA
POSTED:
CAPTAIN CANADA HERE,
I HAVE THE BASICALLY NEW STUFF,
XYPHUS,EXPEDITION AMAZON ETC...
IF YOU WANT TO TRADE FOR THOSE OR EVEN
OLDER STUFF PLEASE WRITE HERE OR ON
SFII.I REALLY WANT COMPUTER AMBUSH.
CAN ANYONE HELP?
CAPTAIN CANADA
(1-14, LAST=10, QUIT=Q) READ MSG.#
MESSAGE #11: SOME WARES
MSG LEFT BY: KEY MASTER
POSTED:
OK.THIS IS THE KEYMASTER.I HAVE SOME OF THE
LATEST WARES AND I WILL TRADE WITH ANYONE WHO
HAS CATSEND 3.0 OR DISKFER(CATSEND PREFERED).
IVE HAD EXPEDITION AMAZON AND XYPHUS FOR A LONG
TIME.THEY BOTH SUCK.SKYFOX HAS SOME PRETTY GOOD
GRAPHICS AND ARCHON IS OK.ILL BE GETTING
CHAMP. LODE RUNNER FROM A FRIEND OVER THE WEEKEND.
CAPTAIN GOODKNIGHT ALSO SOMETIME SOON.ANYONE WHO
WANTS A COPY OF CASTLE SMURFENSTEIN OR ANY OF
THE OTHER WARES I NAMED(PLUSMORE) THEN CALL
ME AT THE 4TH REICH 813 734 5312.IM SYSOP,BUT
ID PREFER IF YOU LEFT EMAIL TO THE KEYMASTER
OR THE BEST WOULD BE TO CHAT.TILL THEN....
THE KEYMASTER
(1-14, LAST=11, QUIT=Q) READ MSG.#
MESSAGE #12: THE REAL NEW WARES
MSG LEFT BY: SHERLOCK APPLE
POSTED:
THE REAL NEW WARES:
SERENDIPITY
EZ TEXT
RUN FOR IT
HITCH HIKERS GUIDE TO THE GALAXY
BALTIC 1985
AIR NAV WORKSHOP
CYPRUS ][ (OR WHATEVER ITS CALLED)
DREADNAUGHTS
LATER,
SHERLOCK APPLE!
THE APPLE MAFIA
ALL THE WARES!!
(1-14, LAST=12, QUIT=Q) READ MSG.#
MESSAGE #13: APPLICATIONS AVAILABLE
MSG LEFT BY: RICH NUTS
POSTED:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ IF YOU'RE INTERESTED IN BUSINESS OR $
$ UTILITIES SOFTWARE, OR YOU NEED $
$ PROGRAMMING HELP, THEN THIS IS THE $
$ RIGHT PLACE. WE HAVE ACCESS TO ALL $
$ MAJOR BUSINESS PROGRAMS AND OTHER $
$ TYPES OF APPLICATIONS SOFTWARE, AND $
$ WE ARE ALSO EXPERT PROGRAMMERS. $
$ WE DO, HOWEVER, NEED SOME OF THE $
$ NEWER ENTERTAINMENT PROGRAMS. IF $
$ YOU'RE WILLING TO TRADE SEND E-MAIL $
$ EITHER ON THIS BOARD OR SHERWOOD $
$ FOREST // TO RICH NUTS. $
$ $
$ LATER- $
$ $$$$$$ $
$ $RICH$ $
$ $NUTS$ $
$ $$$$$$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
(1-14, LAST=13, QUIT=Q) READ MSG.#
MESSAGE #14: NEW WARES FOR YA
MSG LEFT BY: KEY MASTER
POSTED:
OK WELL,I JUST GOT SOME NEW WARES IN TONIGHT
AND A LOT MORE ARE COMING TOMORROW.HERE
IS MY CURREBT TRADING LIST:
SKYFOX
ARCHON (PATCHED VERSION!!)
CASTLE SMURFENSTEIN
BEACH LANDING
XYPHUS
E.T.
CHAMPIONSHIP LODE RUNNER (MEGA-HARD)
AND MORE TOMORROW.
IF YOU ARE REALLY INTERESTED THEN CALL THE
4TH REICH (813 734 5312) AND LEAVE FEEDBACK OR
E-MAIL TO KEY MASTER.I'LL GET IN TOUCH WITH YOU.
BE SURE TO LEAVE A LISTOF YOUR WARES ALSO.
APPLE CATS ONLY!!I ONLY TRADE IN BELL 202
THE KEYMASTER
(1-14, LAST=14, QUIT=Q) READ MSG.#Q
[T] [R] [P] [Z] [E] [Q] [?] --->***