|   | NIA #60NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 
 Founded By:    |  _                        _______
 Guardian Of Time |  __      N.I.A.   _      ___   ___  Are you on any WAN? are
 Judge Dredd    |  ____     ___    ___    ___     ___ you on Bitnet, Internet
 ------------------+  _____    ___    ___    ___     ___  Compuserve, MCI Mail,
 ?           /      ___ ___  ___    ___    ___________  Sprintmail, Applelink,
 +---------+       ___  ___ ___    ___    ___________    Easynet, MilNet,
 | 26OCT90 |       ___   ______    ___    ___     ___    FidoNet, et al.?
 | File 60 |       ___    _____    ___    ___     ___ If so please drop us a
 +---------+               ____     _     __      ___        line at
 ___           _       ___ [email protected]
 Other World BBS        __
 Text Only            _    Network Information Access
 Ignorance, There's No Excuse.
 
 Network Thought Machine [2]
 Guardian Of Time And The Net
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 Early Apple Phreaking Days
 
 Those that don't know, I was busted, back in 1980, and I will explain in this
 file, what lead up to me being busted, what happened, how I got out of it.
 
 1980, I got my first computer which was an Apple //e for a Xmas Present, and
 I immediately started out in the world of Apple Phreaking.  Thanks to a friend
 of mine (The Mad Cracker (409) (BTW, How is Nuclear School? hehehe)), we began
 our trail, meeting up w/ a person by the name of Joe Nowak from Michigan.
 
 Joe was the person that taught both of us, who where just young pups at that
 time, what Phreaking was, gave us the rules to follow, how to phreak, how to
 hack, how to crack, everything.
 
 I created my first handle, which was The Rammaster, as you can tell, I quickly
 changed it to my present one.  My friend, dreamt up the handle of The Mad
 Cracker (even though at the time, he NEVER cracked anything that later
 changed).  We had our handles and we where ready for the Apple Pirate World.
 
 Apple Pirates at that time, where the cream of the crop w/ Jack The Ripper,
 Taran King running The Metal Shop AE, in Houston there was Wizzardry, Sub
 Station Charlie, and the infamous Mines Of Moria (w/ the Tele Trials!), and
 the 414 Group (busted for breaking into a Hospital Computer and altering
 vital records), Phrack was just a dream to be made, and the ever so popular
 Apple Cat Modems and running 10 megs with Ascii Express Professional.
 
 Just for a side note, those of you who don't know what AE (Ascii Express) was,
 it made all of us IBM people look bad for having Ratio's, for AE was LEECH and
 LEECH it was, you would dial into an AE line, get the prompt, and then you
 would have the capability (if your access was allowed), to d/l everything in
 whatever disk drives or harddrives where set up.  Meaning you could call and
 d/l all of the latest game and never worry about Ratio's for the ratio was
 set up something like 1 u/l for every 1000 d/ls or mostly they never had any
 ratio's on there at all.  As the year progressed, many AE lines became part
 of BBS's (GBBS) as a door, and only the "Elite" or "Pirate Access" users would
 have access to it.  By 1982 most of the AE lines had gone away and left where
 phrases like "running AE off of my 2 double sided double density 5 1/4 inch
 disk drives".  Those people where generally considered lame.  Comparison would
 be like calling up an Em/2 board running off of an IBM w/ 2 3 1/2 inch drives
 and having PART of the latest game in the Xfer Section.
 
 Those days people had massive parties, brought their Apples over and just did
 MASSIVE coppying, for their copy protection was crude, and well with
 Locksmith 5.0 you could crack just about everything under the sun.  Pirating
 was in, and phreaking was in, for there was not even a thought of ESS, or of
 Operation Sundevil.  Black Boxing was just being figured out, by the telco
 company, and they figured out a way of "listening" for the device, but hey, w/
 our trusty Apple Cat modems we just didn't send a pure 2600 htz tone and that
 solved that problem, but then the Telco company got wise to that.
 
 Well as years progressed, the phone company started getting their act together
 there was rumors flying in and out of every major BBS that people where starting
 to be arrested.  The term 'BUSTED' came into play, which meant, being caught
 by either the Feds, or by the Telco Company, while you where phreaking off of
 their system.  Also ESS was just starting to be testing in rural areas...
 
 Soon BBS's started to go "private", the term "elite" no longer meant someone
 w/ a special talent, or an infamous computer handle (Count Zero, Jack The
 Ripper), the term started to apply to BBS's.  The BBS initself, became "elite".
 About the same time this was happening, BBS INFOFORMS came up, testing ones
 ability. The idea at the time was to get onto said Elite BBS, you just passed
 a simple test.  Fill out this Questionaire and if you answered the questions
 accurately then there was a chance you could get onto this Elite BBS.  Problem
 w/ that was shortly aftwards, Acronym Lists started floating around.  Funny how
 someone w/ absolutely no knowledge on a given subject, could pass the toughest
 questionaire w/out blinking an eye.
 
 How To Phreak files started to pop up everywhere, people where pumping out text
 files left and right.  Many people tested these files out w/out every thinking
 of what they where doing, and again many people where caught by the phone co,
 for being stupid.
 
 As 1988 passed, the "Old Group" as most of us are now called, have either
 pulled out or went into hiding.  Many of the later 80's people are still
 around, probably laughing at this file now (hehehehe, I am), and well it is
 a shame, but what have we to look for?
 
 Todays phreakers/hackers are uneducated people. I don't mean to sound like I
 know what I'm doing b/c I don't either.  I pulled out in 1983 and haven't
 phreaked since.  But as I scan BBS hacking/phreak bases I see the exact same
 thing that was started back in 1983.  The home computer was priced just right,
 so just about every middle class person could afford one. People went out
 bought one, bought a modem, and just started away at BBSing coming across those
 dreaded Bad BBS's or those "Underground BBS's".  People don't read the old text
 files anymore, there where many ground rules laid down by many text file
 magazines (Phrack, Lod, etc) you did a certain thing and not this, and the
 reason why you don't do it THIS way is b/c you will get busted, yet people don't
 read the warning label that says danger anymore why?
 
 I was busted, as I mentioned earlier, but what happened? Nothing special, I got
 this registered letter in the mail, which contained about 5 pages worth of BBS
 numbers, I checked against my own records (I kept detailed records of what code
 what service, what time and what BBS I called), narrowed down a 10,000.00$ bill
 down to around 2500$.  I don't remember the exact figures but it was around
 those mentioned.  If I refused to pay the bill, I would then appear in Galveston
 County's local District Court.  I mailed in a letter stating that I had made
 only certain calls, attatched a sheet that contained all my codes used, numbers
 dialed (fax machines where still in testing...), and they returned my letter
 accepting the offfer I proposed to them.
 
 Remember todays carders, phreakers, and hackers, are reckless, uncaring for
 the system they aquire, the service they use, or the cards they card off of.
 People are not what they used to be, times have changed, and they have changed
 for the worse (my opinion), if we do not start re-educating people about what
 to do and what not to do, and making sure that people do not abuse our knowledge
 then Operation Sundevil will be a fairly common word etched in our minds.
 People that card, don't be so damned stupid, carding to your house? Jesus, what
 moron would do that?  Someone w/ a modem and pc.  Someone that is uneducated,
 and someone that should be stopped.
 
 I close this small file w/ a quote from a respected BBS User in our Community:
 
 1980's Hacker:  A person who hacked into a system w/ the sole intent on
 learning the system, inside and out.  To better educate
 oneself, w/ no thought of harm or destructive means.
 
 1990's Hacker:  A person who hacks into a system w/ the sole intent of
 destructive purposes.  No benefit has come of this type
 of hacker.
 
 Today the word hacker means to break into a system for malice intent.  Why
 has this happened?  I propose that question to you.
 
 I hope that some of you will recall that more and more people are being busted,
 it is no longer anyones fault, but YOUR own for being busted, the rules have
 been layed down for years now, you just need to re-educate yourself and learn
 something...
 
 Guardian Of Time
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 "Whats In A Name? : Brad Templeton"
 
 People keep trying to figure out what an electronic forum (or bulletin board)
 is in traditional terms -- common carrier or publication.
 
 I think that it is not analogous to any of the old forms, and a new type
 of law has to be created to apply to it.
 
 There are 4 types of BB today:
 A) The completely open BB with no supervision (USENET newsgroup, some
 BBS operations)
 B) The supervised open BB.  (most BBS, GEnie, CIS forums, etc.)
 C) The heavily supervised BB.  (Prodigy, moderated USENET group)
 D) The fully edited electronic publication
 
 D is a direct analog of the traditional publication.  C is very close, but
 not quite.   A is close to the "common carrier" model, but does not match
 it exactly.   B has little analog in traditional publishing.
 
 All four are of course(*) deserving of constitutional protection of free
 speech.  For all are published forms of expression.
 
 The closest thing to A is common carrier or enhanced service provider
 status, where the carrier is not liable for what is transmitted.  However
 there are many differences.   For one, I have not heard of a "public broadcast"
 common carrier, where messages are sent to arbitrary members of the public
 who request the material.  The closest analog might be Ham radio, although
 Hams are licenced and thus not classed as general public.   They are also
 restricted in use.  Of course "Ham radio" is a thing, not an organization.
 
 In addition, most type A systems do have some controls and checks and
 balances.  They do not have the "service to anybody who asks is mandatory"
 rule of common carriers.
 
 I would view each individual author as the publisher, and the system owner
 as a tool in this case.  On the other hand, I would support the right of
 system owners to restrict *who* has access, if not necessarily what they
 say.
 
 Type B is also a new animal.   Such systems are supervised, but
 supervised after-the-fact.  ie. any user can post any message, but the
 SYSOP/supervisor/moderator can delete things after the fact.  The amount
 of this deletion ranges from almost none to moderate.   Sometimes it is
 there as an option, but never actually practiced.   This needs a new type
 of law.
 
 Type C is very close to a publication, and may not need a new type of law.
 In this case, all messages must be approved before they go out -- ie. they
 pass through a human being first.  This is not too different from a
 classical publication.   However, in most such cases, the editors do not
 truly act as editors.   They merely select material based on appropriateness
 to a forum.  Only because the law requires it do they also sometimes
 attempt to remove libel and criminal activity.  The editors almost never
 select material to match their own views, and it is not assumed that
 postings reflect the editor's views.
 
 Thus in A and B it is clear that the author is the publisher and the
 system is the medium.  In C the author and system operator are jointly
 involved in publication.  In D the system operator is the publisher, and
 the author is just the author.
 
 What new types of law?  This we can discuss.
 
 Type A:
 Authors fully responsible for their postings.  No liability
 for SYSOP unless illegal activity deliberately encouraged.
 (ie. "The Phone Phreak BBS" might have a liable SYSOP, but
 "Joe's Amiga BBS" would not be liable if somebody posts a phone
 credit card number.)
 
 NO complete anonymity.  Author's names need not be revealed in
 the forum itself, but a record should exist for the authorities
 in case of libel or other illegal activity by an author.  The
 sysop must maintain this list in return for the limit of SYSOP's
 liability.
 
 (Note SYSOPS still have the right to delete material, but not
 the obligation.)
 
 Type B:
 Authors continue to be responsible for their postings.  SYSOPS
 responsible for illegal material which they are aware of but do
 not delete in a timely fashion.   Anonymity possible, if desired.
 
 Type C:
 Authors responsible together with SYSOPS for postings.  If Author
 warrants to SYSOP that material is legit, most liability goes to
 Author.   SYSOP must not permit any obviously illegal material,
 and delete any material found to be illegal ASAP.
 
 Type D:
 Standard publication.  No new law.
 --
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 "Musing On Constituionality : Karl Lehenbauer"
 
 In article <[email protected]> [email protected] (Lars
 Poulsen) writes:
 >By analogy, it may not be unreasonable to hold the "publisher" (i.e. the
 >owner/SYSOP) jointly liable with the poster for whatever appears on the
 >bulletin board.
 
 >Indeed, this may require that the SYSOP not allow unmoderated discussion
 >except within closed user groups whose members have all signed a pledge
 >of responsible behaviour and are all known to the SYSOP.
 
 >Seems pretty reasonable to me ...
 
 If this were the case, it would be the end of Usenet.  Further, it would
 have a chilling effect on free speech via bulletin boards.  As a sysop,
 I would have to be very careful to never allow anything out that was
 in the least bit controversial, and would always want to err on the side of
 not allowing a message to go out unless I was really sure there was no chance
 of me getting in trouble for it.
 
 Shouldn't the poster of the message be accountable for its contents?
 
 Or by your reasoning, shouldn't the phone company have to listen to *all* the
 phone conversations going on at any time to make sure nothing illicit was
 being said, done or planned?  They tried this in Eastern Europe, you know.
 
 Further, this would be a new and time-consuming burden on sysops and introduce
 potentially long delays in messages getting out.
 
 If a sysop let a bad message go out and it was gatewayed to a bunch of other
 machines, or one was forged or somehow illicitly injected into the network,
 by your reasoning wouldn't the owner/sysops of all the machines the
 message went to be liable?  If that were the case, it would definitely be
 the end, because nobody has the resources to monitor, for example, all the
 traffic on the Usenet.
 
 I used Prodigy several times, and it is a heavily censored system, i.e.
 Prodigy's censors examine every article posted before it goes into the
 message base, and people on it were complaining that the censors were
 capricious, arbitrary and would not state reasons why specific articles
 had been censored.
 
 Not only is there nothing like talk.religion.*, talk.politics.*,
 soc.motss on Prodigy (they dropped a forum in which fundamentalist Christians
 and homosexuals and homosexual rights advocates were going at it, although
 they claimed it was for a different reason), but you can't even mention
 or talk about most products by name because advertising is a big part
 of their revenue base (about 20% of your display is permanently dedicated
 to advertising when using it -- ads are continually updated in this area the
 whole time you're on) and they don't want anyone to get free advertising.
 Consequently messages of the "Yeah, I bought a Frobozz 917 and it works really
 well" are censored.  If this is IBM's view of the future of personal
 electronic communications (Prodigy is a joint-venture of IBM and Sears), and
 there is every reason to believe it is since this is what they chose to
 provide, it is a bleak future indeed.  (The reason they do this, I think, is
 that Prodigy is supposed to be a "family" system.  Under your one account you
 can set up logins for your other family members.  So they don't want anything
 in there that some kid is going to read.  But that restricts everything on the
 system to a very low common denominator, namely that every message must be so
 inoffensive that *nobody* is going to be offended by it... and that is
 censorship.
 --
 -- uunet!sugar!karl
 -- Usenet access: (713) 438-5018
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 From ?The Age?, 12th October, 1990, Melbourne, Australia.
 By Leon Gettler, Communications reporter.
 
 Is it all over between PETA and LES since she found out about the
 LEOPARD?  Was SID linked to the MAFIA?  And where did DRACULA fit into
 all this?  Was he really a VAMPIRE or just one of the DAGS?
 
 Confused?  Just consult the Telecom staff dictionary, an introduction
 the to world of tele-babble.  Insiders in every profession have their
 jargon, but no one generates it faster than telecommunications
 engineers.
 
 Take, for instance the story of the chap sent to Cairns on an
 emergency mission several years ago when the phone system was wiped
 out by flood.  He designed the Cairns restoration and provisioning
 program.  No prizes for working out the acronym.  "It just rolled off
 the tongue," said a Telecom official this week.
 
 Step into the world of telecommunications and you find yourself in a
 sea of acronyms and jargon.  Some examples: DNA (does not answer), DND
 (did not dial), MBC (major business customer), HC&F (heat, coil and
 fuse), LIBFA (line bearer fault analysis), DELY (delivery), CIE
 (customer interface equipment), PP (prompt public telephone) and TTT
 (terminatng trunk tandem).
 
 Traditionally, acronyms have been used to help us remember
 terminology.  Usage has transformed many into ordinary words.
 Queensland and Northern Territory Aerial Services is always Qantas.
 The Australian and New Zealand Army Corps gave us Anzac, the North
 Atlantic Treaty Organisation is NATO.
 
 But Telecom Australia seems to have done the reverse.  It produced
 DRACULA (data recording and concentrator unit for line applications),
 VAMPIRE (videotex access monitoring and priority incident reporting
 equipment), LEOPARD (local engineering operations processing and
 analyses of recorded data), MAFIA (maintenance and fleet information
 analysis), SULTAN (subscribers' universal line testing access
 network), CARGO (complaints analysis recording and graphing
 organisation), CATNAP (computer-aided network assessment program) and
 DAGS (digit-absorbing group selector).
 
 In many ways, Telecom employees are lucky.  They can see PARIS
 (product accounting and reporting information system) or even MARS
 (microfiche auto-retrieval system). They don't even need a MAP
 (manual assistance position), the work station for telephonists.
 
 Telephone operators-turned-philosophers can turn to PLATO (programmed
 evaluation review technique) over a few POTS (plain old telephone
 services) of CIDER (costing input, data editing and reporting) or SODA
 (service order debit advice). and romantics can contemplate EROS
 (emitter-receiver for optical systems).
 
 But things can get confusing, too.  COLDEWS (computerised lines depot
 external works scheduling) does not cover grass in the morning.  And
 TACONET is short for Telecom Australia computer network, not tapas
 tucker.  Similarly, CONTRAFAST is not a Nicaraguan health regime but
 the consolidated trunk forecast.
 
 Are Telecom employees happy with the ALP (associated line prime) after
 the [Australian] Labor Party's national conference last month?  And
 does COM (computer output to microfilm) suggest that the reds have
 escaped from under the beds and infiltrated the phone exchanges?
 
 The names are also a worry.  There are nine males (REX, JACK, SID,
 DAVID, LARS, LES, LEN, MARC AND SAM) but only four females (PETA,
 DAISY, DOT AND SUSIE).  Koorie and other non-English names do not get
 a mention.  And what about the indelicacy of TART (TACONET
 availability and response time monitoring) and TIT (technician in
 training)?
 ----------------------
 
 Don't blame me if my fingers did not type what my eyes saw!
 
 Danny
 
 [Moderator's Note: Thanks for taking the time to type in such a clever
 report. Speaking of obscure acronyms, everyone must know of CARE, the
 organization which provides assistance to other countries in need. But
 do you remember what the letters mean?  Committee on American Relief
 in Europe.  And lest we forget, the zip in the postal Zip Code refers
 to the Zone Improvement Plan. Seriously.   PAT]
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 "Vanessa Layne: Education And Cyberspace"
 
 I *can* think of a (hopefully) beneficial use to young people of Cyberspace.
 It all started with a high school aged student/friend of mine who had
 dyslexia (one of many) and was diagnosed rather late in his school career...
 
 Well, my friend had (after much sweat and tears and tutoring and really great
 supportive parents, teachers and counsilors) learned to read at age level
 ability, more or less.  More, because he was very smart; less, because no matter
 how wonderful your tutoring is, it can't make up for lost practice.  In addition
 ,
 (his greatest problem in fact) was that he just couldn't articulate his ideas
 in print.  He had trouble with literature because he was so busy reading the
 words and just figuring out what the sentences said, he missed the relevence of
 the give passage.  Myself and another of his teachers and he discussed what woul
 d
 be the most helpful to him.  We knew he needed practice reading sheer volumes of
 text, good and bad, to learn differences in quality and style.  We knew it shoul
 d
 be interesting (no Dickens [pardon me if *you're* a raving rabid Dickens fan,
 but...]) about things that were immediately relevant, at least to the people
 writing the material.  The material had to be communicating its ideas rather
 straight-forwardly, like a in a letter or essay.  But it couldn't be plain
 factual information...it had to communicate emotion, and demonstrate attemps to
 convince the reader.  And we knew he needed practice trying his own hand at
 communicating, not just writing reports on what he had read, but real writing
 trying to *communicate* his ideas and feelings.  And he needed lots of feedback,
 not just ??you missed a semicolon'' but ??What did you mean by THAT crack
 mister?!''   He needed practice at honing an argument, and describing things
 clearly and concisely.
 So we got him an account.
 
 One of the fascinating phenomina I have noticed, in myself and others, is how
 much better a person becomes (usually) at communicating via print after
 doing it over the net for a while.  When a person first begins using newsgroups,
 emailing lists, and (here at MIT) discuss and zephyr, usually s/he will try
 to communicate by typing down what it was they (damnit, I *will* use the
 plural for a gender indefinite pronoun) would have said out loud, if what
 they were responding to were a spoken conversation.  This tends to fail
 miserably (though I have known people who always sounded funny when they
 talked because they talked as they read and wrote, who then ?e-sounded' fine
 here in Cyberspace).  I once heard that 90% of all realtime communication is
 via body language.  I'm not so sure that is unreasonable.  Certainly
 printed-out speach is odd stuff.  The raised eyebrows, which turned a demand
 into a statement of mock-dismayed-disbelief, disappear.  The turning up of
 the lips which made an insult a friendly tease disappear.  The grating pulled
 out note of mockery which makes a bald statement into its very inverse
 disappears.  How many times have you seen what was originally supposed to be
 sarcasm interpreted to be opposite of what the sender intended?  Printed-out
 speach is raw, and cold, and its impact is not lessened by any cloaking
 tones: it does not pull its punches. So the culture here developed :) :( :? ;)
 :P and ///italics/// and *emphasis* and so forth to try to let the reader know
 when the ??speaker'' would have done such things in realspace.  But they are not
 adequate for most of the subtleties people wish to get across.  So they wind up
 honing their skill with written English, often from reflex and not conscious
 determination...you keep plugging away at the argument until 1) you are
 understood  2) your account gets nuked enough that you decide it's not worth it.
 First, usually, people figure out about the tone implicit in word choice
 .
 People, when speaking, and at first on the net, will vehemently deny such a thin
 g
 exists.  But there is obvious difference between ??I think you are incorrect''
 and ??I think you're wrong'' and that difference is in implied attitude.  Next,
 people seem to pick up on supporting arguments (like when you're nth grade teach
 er
 harassed you about writing essays w/ three paragraphs of support for your three
 points?)...if you hear ??What makes you say that?!''  ??Who ever heard of such a
 thing?''  ??Well *i've* seen...'' enough times, you begin to respond ??Well, whe
 n
 I...'' or ??I noticed...'' or ??Well haven't you seen...''
 The more a person writes in Cyberspace, the more it seems s/he is able
 to see the mood and point of other writers.  Something in a person's subconsciou
 s
 goes ??gee, I said something in just that way when I was tired.''  People get
 better at this.
 If you are not clear in Cyberspace, someone is *going* to misunderstand
 you (yes, someone will probably if you are clear as well, but no need to encoura
 ge
 it).  If you are not concise (my sin [if you hadn't noticed]) your letter will
 be flushed before it is read.  If either happens you are GOING to be FLAMED.  An
 d
 if you really gave a damn about what you were trying to tell people, you will
 try again, on another tack, or clarifying your previous statements (all the whil
 e
 making mental notes not to let yourself be misunderstood the same way again,
 unless it is a deliberate firestarter tactic).  So people inprove, and surprizin
 g
 to say (for all those insulting Humanitites out there), people who use the net
 for communication, get better at using the printed word, both to express
 themselves and to glean the insights of other writing.  I don't think it is
 necessarily so that we'll all become Shakespears, but maybe it will help some
 kids understand what he was saying about people.
 Computers cannot solve nearly as many problems in education as many
 teachers seem to hope, but surely Cyberspace is not evil, and may be a benefit
 in varying degrees to those kids who need it.  And certainly its computer
 science benefits are not the only ones, and maybe not even it's greatest.  Cyber
 -
 space is the greatest communications network in history to date, and perhaps
 can help teach what today is that most relevant of skills: the use of the printe
 d
 word.
 
 Vanessa Layne
 [email protected]
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 "Triva Of A Hacker: Bob Bickford"
 
 In article <[email protected]> [email protected] (Bob Vaughan) writes:
 >
 >A friend of mine posed an interesting trivia question.
 >
 >What was the system manager password for the Burroughs 6700
 >at the Universty Of The Pacific in 1977?
 >
 >This password was included in a utility program that the TA's used
 >for job control (they weren't allowed to have the system manager
 >password, so the program had a line that allowed the utility to
 >run as the system manager)
 >
 >Please reply by email.
 >
 >Thanks in advance
 >
 
 I'm the friend.  Here, I'll make this even easier:
 
 1) The TA's utility was written in the Burroughs - specific variant of
 the ALGOL language called "DCALGOL"; it used the construct
 
 REPLACE MYSELF.USERCODE BY "XXXXXXX/YYYYY."
 
 to change its permissions to the system manager's.  The TA's were
 very interested in the DCALGOL language; I distinctly recall being
 in the computer center with them late one night as they waited
 breathlessly for the compiler to come online so they could try
 out an MCP-modifying program that they'd written.  It worked, as
 I recall, which was rather scary.  (Yes, MCP means Master Control
 Program, as in the movie TRON.  No, I don't know if they were
 thinking of the Burroughs machines when they wrote the movie.)
 
 2) The name of the utility was "LOOKING-GOOD".  When I obtained that
 usercode/password combination, one of the things I did was to print
 out a source-code listing of same, which I still have.  (I was then
 invited to the Dean's office for a morning chat.... ah, the trials
 and irresponsibilities of youth.)  I realize now, looking at it,
 that it's *horribly* bad code, but in 1977 I didn't know any better.
 
 3) I was at UOP from September of 1976 through January of 1978; the
 password being queried about was in use in the Spring of 1977.
 They changed it, obviously, after my little adventure.....
 
 4) I obtained this totally by accident; I was curious as to how the
 TA's utility worked, and printed out the object code.  Before I
 arrived at UOP, that was illegel and would crash the system every
 time; I didn't know that and had crashed the system twice earlier
 in the year by printing the wrong file.  So they "fixed" it; what
 you got was a page full of question-marks, with any quoted strings
 from the source code appearing in cleartext form.  So when I printed
 out the object to LOOKING-GOOD, there were lots of strings lying
 around in it, including one that said  XXXXXXX/YYYYY.  which I
 immediately recognized as an ALGOL usercode/password string.  So
 I tried it...... and was immediately caught (but not before I'd
 made a printout of the program, as mentioned above).  When they
 explained to me what the ramifications of having that knowledge
 were, I got real scared.
 
 BTW, the LOOKING-GOOD object file had the security attributes
 "CLASSA-OUT" which meant that *anybody* could read it and print it
 out as I had done.  I pointed that fact out to them...... and the
 Dean had a few hard words with the computer center manager.  His
 name was Jerry (no, that won't help you guess the password) but he
 was later replaced by a friend whom I had introduced to the B6700
 that year named Ed.
 
 Ed helped me late one night to print out a voluminous system
 logging file that also turned out to have lots of sensitive
 security info in it; we left one copy of the printout on Jerry's
 desk the next morning (Ed took the other, I don't think he ever
 did anything with it) along with instructions that *any* user
 could use to print the same thing out with.  We were playful and
 harmless; I gather that a year or so later some guys came along
 that tried to repeat my stunt but with malign intent: they were
 caught, and prosecuted.
 
 I'm revealing all this now because I've finally stopped using that
 password as my own on any system, and because it makes a rather
 interesting challenge as a trivia question.  A harmless one, too.
 
 --
 Robert Bickford        ?apple,pacbell,hplabs,ucbvax?!well!rab
 [email protected]
 "A Hacker is any person who derives joy from
 discovering ways to circumvent limitations."
 
 NIA---NIA---NIA---NIA---NIA---NIA---NIA
 
 [OTHER WORLD BBS]
 
 This text smeared across cyberspace by:
 ________________________________________________________
 ||                Junk Culture Hallucination                |
 |                      xe0nsun ration                       ||
 ||Junk Culture|!|1093-686!|002400|!|24hrs Per Midnight||
 ||                                                       |
 ||                     |!|-Creators-|!|                      ||
 ||                Bg: Pydea Koft                      ||
 ||           Remote Bog: Carcinoenic Nam Crse           |
 ||                                                           |
 ||                 |!-Well-oers-|!|                     ||
 ||           Nuker The Liing Ego Willia F. Tel         ||
 ||              Howitzer Explosion Guy, Armitag            ||
 ||               Otat of te Helioscrotums                ||
 ||                                                     ||
 || "Surrealist Manifesto" 'zine i a Junk Cuture Prodution ||
 ||      Officia Dropsite f "One Eight Two" Magazine       |
 ||                                                      |
 ||           "Whos' there?                               ||
 ||           Ah splendid show in the infinite.            |
 ||                                  -- Aragn            ||
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 
 
 
 |   |