scene.org File Archive

File download

<root>­/­mirrors­/­amigascne­/­Scrollers­/­C-Groupstext­/­Culprits/Culprits-CodersSceneMag01.txt

File size:
45 864 bytes (44.79K)
File date:
2012-10-01 23:03:41
Download count:
all-time: 213

Preview

The Brand New Coder's Scene Magazine!                Issue #1 (Pilot) Aug 1990
                                                                              
 Hello, and welcome to this, the only disk magazine dedicated to Amiga 68000  
 Coders.   Well, click the Mouse over page one, and read on for more details. 
                                                                              
 Main - Menu.                                                                 
å------------------------°å------------------------°å------------------------°
|  About The Magazine    ||  Interesting Tel Nos.. ||  U.S.A Blue Boxes 1    |
|  Christmas Virus 1     ||  Random Numbers 1      ||   ~     ~   Boxes 2    |
|    ~  ~    Virus 2     ||   ~  ~  Numbers 2      ||   ~     ~   Boxes 3    |
|    ~  ~    Virus 3     ||  How To Make L.S.D!    ||   ~     ~   Boxes 4    |
|  Neccesity Deviance 1  ||  N.A.S.A. SpaceLink 1  ||  U.S.A More Boxes.. 1  |
|     ~         ~     2  ||     ~        ~      2  ||    ~    ~     ~     2  |
|     ~         ~     3  ||     ~        ~      3  ||                        |
|     ~         ~     4  ||     ~        ~      4  ||                        |
|     ~         ~     5  ||  Classified Adverts..  ||                        |
|  Ten Things.....    1  ||                        ||                        |
|   ~     ~           2  ||                        ||                        |
|  Sprite Tips....       ||                        || ** EXIT MAGAZINE **    |
æ------------------------ßæ------------------------ßæ------------------------ß
                                                                              
 To contribute, write to the addresses shown in the pages above.              
                                                                              
Instructions: Select Desired Item Using Mouse to Highlight Bar, Then Click    
 LEFT Mouse To Read Page, and Press RIGHT Mouse To Progress A Page.  Press    
 LEFT mouse Button to return to Main-Menu.  Eg: To Read The N.A.S.A Article,  
 Click on it's 1st Page, then read each page by pressing RIGHT mouse, then    
 Press LEFT mouse to return to the Main-Menu.                                 
 Joystick=Colour Change:    Up=Blue+, Left=Green+, Right=Red+, Fire=Default.  
                                                                              
 Coded By/Editor: THE SNOWMAN.    Co-Editor: COUNT ZERO.    Material: VARIOUS.


About The Coder's Scene Magazine. 

  Hello & Welcome.  This is a pilot for the ~real thing~ magazine, when I get 
things off the ground.  This magazine will take a standard format (much like
this pilot........),     and will be one executable file that can be
put on compacts etc..
  Issues will be put out every time I have enough material to put one together
and will cater really for Coders on the Amiga (but will also contain much,
other interesting material, such as all the ~hacking~ info in this pilot
issue).
  This issue has over 60k of text alone, the next will have a little more.
  Well, this is the best part, if you want to offer any advice, or contribute 
in any way (ie. writing things in ASCII format 80 columns wide...), then you
should do so soon, and send it to The Editor/Co-Editor:

The Snowman, Magazine Stuff, 18 Palm Grove, Whitby, Ellesmere Port, L66 2PU.  
Count Zero, Magazine Stuff, 40 Vine Road, Backford Cross, S.Wirral, L66 2XX.  
  The kind of stuff I'm looking for are the following:

 A> Articles about something interesting...  B> Letters (Got Coding Problems?)
 C> Coding Articles...                       D> Circuit Diagrams? 
 E> Hacking Information...                   F> Anything.... 
 G> Classified Ads (Contacts Etc..)          H> Anything.... 

( All Disks Returned With The Latest Issue On Them If Postage Is Included....)
NOTE: All information in this mag CANNOT be verified, and all hacking info is 
 for Informational/Interest purposes ONLY (as is ALL the text in the mag....) 
 laws CAN be broken if various instructions in texts were carried out, and I  
 can accept NO responsability for ANY STUPID actions taken !


 Some Interesting Phone Numbers....... 

Falkland Is. Governors Office      :        010 500 2202 
Falkland Is. Secretarys Office     :        010 500 2201 
Cable and Wireless Port Stanley    :        010 500 2405 
Le Figaro, Paris                   :        0800 898058  
Access Credit Card Validation      :        0702 352222  
Checkpoint Cheque Validation Scheme:        0800 424949  
Barclaycard Validation             :        0345 555555  
KGB                                :        010 7 095 222 70762 
NSA                                :        0101 381 688 6311 
DTI Space SVCS                     :        01 215 2138       
DTI Cordless Telephones            :        01 215 2208       
Scramble Facts                     :        0101 712 343 0130 
New Dialtones                      :        061 246 8011/0203 8011 
System X Demo                      :        061 246 8011    
Downing Street                     :        01 270 3000     
Buck. House                        :        01 930 4832     
Space Shuttle Comm.                :        0101 900 410 6272 
Watergate                          :        0101 202 965 2900 
Pentagon                           :        0101 202 545 6706 
The Presidents Office              :        0101 202 456 2858 
Vice Presidents Office             :        0101 202 456 7123 
Prestel Operational Computer Centre:        01 248 0480       


(SOME NUMBERS MAY HAVE CHANGED!)


HACKING PAGES #1              *BLUE BOX*                                      
   THE ~BLUE BOX~ WAS SO NAMED BECAUSE OF THE COLOR OF THE FIRST ONE FOUND.   
THE DESIGN AND HARDWARE USED IN THE BLUE BOX IS FAIRLY SOPHISTICATED, AND     
ITS SIZE VARIES FROM A LARGE PIECE OF APPARATUS TO A MINIATURIZED UNIT THAT   
IS APPROXIMATELY THE SIZE OF A ~KING SIZE~ PACKAGE OF CIGARETTES. 

   THE BLUE BOX CONTAINS 12 OR 13 BUTTONS OR SWITCHES THAT EMIT MULTI- 
FREQUENCY TONES CHARACTERISTIC OF THE TONES USED IN THE NORMAL OPERATION OF
THE TELEPHONE TOLL (LONG DISTANCE) SWITCHING NETWORK. THE BLUE BOX ENABLES
ITS USER TO ORIGINATE FRAUDULENT (~FREE~) TOLL CALLS BY CIRCUMVENTING   
TOLL BILLING EQUIPMENT. THE BLUE BOX MAY BE DIRECTLY CONNECTED TO A PHONE
LINE, OR IT MAY BE ACOUSTICALLY COUPLED TO A TELEPHONE HANDSET BY PLACING THE 
BLUE BOX'S SPEAKER NEXT TO THE TRANS MITTER OR THE TELEPHONE HANDSET. THE
OPERATION OF A BLUE BOX WILL BE DISCUSSED IN MORE DETAIL BELOW.

   TO UNDERSTAND THE NATURE OF A FRAUDULENT BLUE BOX CALL, IT IS 
NECESSARY TO UNDERSTAND THE BASIC OPERATION OF THE DIRECT DISTANCE
DIALING (DDD) TELEPHONE NETWORK. WHEN A DDD CALL IS PROPERLY ORIGINATED, THE  
CALLING NUMBER IS IDENTIFIED AS AN INTEGRAL PART OF ESTABLISHING THE
CONNECTION. THIS MAY BE DONE EITHER AUTOMATICALLY OR, IN SOME CASES, BY AN    
OPERATOR ASKING THE CALLING PARTY FOR HIS TELEPHONE NUMBER. THIS INFORMATION  
IS ENTERED ON A TAPE IN THE AUTOMATIC MESSAGE ACCOUNTING (AMA) OFFICE. THIS   
TAPE ALSO CONTAINS THE NUMBER ASSIGNED TO THE TRUNK LINE OVER WHICH THE CALL  
IS TO BE SENT. THE INFORMATION RELATING TO THE CALL CONTAINED ON THE TAPE     
INCLUDES: CALLED NUMBER INDENTIFICATION, TIME OF ORIGINATION OF CALL, AND INFO
THAT THE CALLED NUMBER ANSWERED THE CALL. THE TIME OF DISCONNECT AT THE END   
OF THE CALL IS ALSO REFORDED.                                         (CONT'D)

                       HISTORY OF THE CHRISTMAS VIRUS 

     It all began as a joke for Christmas. A student in West Germany wrote 
     a little program called ~Christma~ and  sent  it to all his friends on
     the network of Claustahal Technical University, south of Hanover. 
      Sending it through the network was simple: the program handled that by
     reading a couple of files containing lists of all regular corres- 
     pondents and all recently sent and received mail: Names and Netlog.
      When the program was run the recipients saw a festive Christmas tree
     appear on their screens. Very nice too. However Christma also secretly
     read the recipients Names and  Netlog  files, moved forward on its
     merry way and, rather ungratefully, then deleted itself from the host.
      The next, rather larger, batch  of  recipients (who were of course all
     used to unknown programs appearing through the network) ran Christma
     as well and saw the pretty graphics come and go. Of course they all had
     Names and Netlog files too...  

                        That was December 9th 1987.

       No Hard discs scrambled,  no  system  lockups,  no discs infected with 
     AIDS... no harm done surely?  Just a seasonal greeting transmitted by    
     good ol' Info Tech.  Well that's what the writer of Christma thought     
     too and he was very mistaken.
       The problem lay  in  the  speed  of  communication  and  the increased 
     linking of computer networks in many fields.  And continents.
     The virus program spread with accelerating speed throughout Europe
     via its link into EARN: the European Academic Research Network. 
     EARN is also linked to universities in the US via Bitnet...hundreds of
     automatic mailers busily  consulted  Netlogs and the  volume  of traffic 
     grew exponentially.
                                                                      (CONT'D)
  TAKING THE ~RANDOM~ OUT OF RANDOM                                     PAGE 1 
    One of the most notable factors in so-called tables of
  computerized ~random~ numbers is that there are two basic ways of
  creating them. The first method is to create a table that will 
  provide what can statistically be said to be a random list - that 
  is no number or letter would theoretically occur more frequently
  than any other number or letter. Most systems, however, simply 
  rely on an electronic component that creates alledgedly ~random~
  numbers. These hardware random number generators are usually
  biased in their number selections.  

     One simple test of a random number generator is called the 
  ~coin toss test.~ A program is written to simulate the results of
  a thousand or so coin tosses. Were the random number generator
  truly random, heads would appear about as frequently as tails. In
  an actual test, however, heads appeared 421 times, and tails
  appeared 579 times - a significant bias. A test such as this could
  be performed over the entire alphanumeric character list and the
  component's bias chartered.  Once this information was known, the
  cracking computer could be programmed to insert this selection bias
  into it's own attempts to generate passwords. This is yet another
  step that evens the odds between the hacker and the so-called
  ~uncrackable~ password. This testing scheme, requiring either a
  component or a computer like the target computer, would be a lengthy
  process, but some people might regard the product as worth the time
  involved in preparing such an analysis.                             (Cont'd)
HACKING PAGES #2              *BLUE BOX CONTD*

   ALTHOUGH THE TAPE CONTAINS INFO WITH RESPECT TO MANY DIFFERENT CALLS, THE  
VARIOUS DATA ENTRIES WITH RESPECT TO A SINGLE CALL ARE EVENTUALLY CORRELATED  
TO PROVIDE BILLING INFO FOR USE BY YOUR BELL'S ACCOUNTING DEPARTMENT. 

   THE TYPICAL BLUE BOX USER USUALLY DIALS A NUMBER THAT WILL ROUTE THE CALL  
INTO THE TELEPHONE NETWORK WITHOUT CHARGE. FOR EXAMPLE, THE USER WILL VERY 
OFTEN CALL A WELL-KNOWN INWATS (TOLL-FREE) CUSTOMER'S NUMBER. THE BLUE BOX    
USER, AFTER GAINING THIS ACCESS TO THE NETWORK AND, IN EFFECT, ~SEIZING~
CONTROL AND COMPLETE DOMINION OVER THE LINE, OPERATES A KEY ON THE BLUE BOX
WHICH EMITS A 2600 HERTZ (CYCLES PER SECOND) TONE. THIS TONE CAUSES THE
SWITCHING EQUIPMENT TO RELEASE THE CONNECTION TO THE INWATS CUSTOMER'S LINE.  
THE 2600HZ TONE IS A SIGNAL THAT THE CALLING PARTY HAS HUNG UP. THE BLUE BOX  
SIMULATES THIS CONDITION. HOWEVER, IN FACT THE LOCAL TRUNK ON THE CALLING
PARTY'S END IS STILL CONNECTED TO THE TOLL NETWORK. THE BLUE BOX USER NOW
OPERATES THE ~KP~ (KEY PULSE) KEY ON THE BLUE BOX TO NOTIFY THE TOLL SWITCH-  
ING EQUIPMENT THAT SWITCHING SIGNALS ARE ABOUT TO BE EMITTED. THE USER THEN   
PUSHES THE ~NUMBER~ BUTTONS ON THE BLUE BOX CORRESPONDING TO THE TELEPHONE #  
BEING CALLED. AFTER DOING SO HE/SHE OPERATES THE ~ST~ (START) KEY TO
INDICATE TO THE SWITCHING EQUIPMENT THAT SIGNALLING IS COMPLETE. IF THE
CALL IS COMPLETED, ONLY THE PORTION OF THE ORIGINAL CALL PRIOR TO THE EMISSION
OF 2600HZ TONE IS RECORDED ON THE AMA TAPE. THE TONES EMITTED BY THE BLUE BOX 
ARE NOT RECORDED ON THE AMA TAPE. THEREFOREF, BECAUSE THE ORIGINAL CALL TO THE
INWATS # IS TOLL-FREE, NO BILLING IS RENDERED IN CONNECTION WITH THE CALL.

   ALTHOUGH THE ABOVE IS A DESCRIPTION OF A TYPICAL BLUE BOX OPERATION USING  
A COMMON METHOD OF ENTRY INTO THE NETWORK,THE OPERATION OF A BLUE BOX  (CONTD)

                     HISTORY OF THE CHRISTMAS VIRUS Page2 

       Within TWO DAYS networks were seriously overloaded on both continents. 
     By  the  11th  December  the  jamming   was  so  serious  that  system   
     programmers from EARN  and Bitnet came together to try to track and kill 
     Christma. For the first time in the history of Virus hunting a Seeker
     program was developed (by Eric Thomas of the Ecole Centrale de Paris)
     which traced the flow of Christma by reading Netlog files, chasing and   
     then erasing it.  Meanwhile  systems  on  which  Christma had appeared   
     were taken off the network while discs were checked.

          By the 14th December the academic networks were free.

     But Christma was not yet dead, although the author probably wished
     that he was. IBM  has  a  private  network  VNET,  which  is linked to   
     Bitnet...VNET corporate users tend to hold very large Names files.
     The entire IBM corporate E-mail system was closed down for 72 hours
     until the infection was eradicated! 

                   ::::::::::::::::::::::::::::::::::::::

       Horrifying or amusing, depending on your point of view, Christma
     really happened and very recently. The implications for users and
     manufacturers are profound.  We have all heard of Trojan files on
     Bulletin Boards, the Amiga Virus and others not so widely publicised.
     Hardware designers and manufacturers have viewed the issues as
     unimportant to their business. In other words it's the users problem.
     IBM for one may well be rethinking this strategy!
       Technically, it has  been  possible  for  many  years  to design safer 
     systems.  A  program should not be able to run in a system that is
                                                                      (CONT'D)

  TAKING THE ~RANDOM~ OUT OF RANDOM...                                  PAGE 2
    A strategy of cracking Dow Jones system, given the rules listed
  above, would be to create a program with an algorithm that provided
  combinations of passwords meeting the criteria above. As each
  creation was tested, a pattern might be found in the successful
  creations that would make the algorithm even more selective. One
  would expect, for example, that simular to the MILNET and ARPANET
  passwords, certain confusing characters would be eliminated from
  passwords. The number, ~0~ is often eliminated, for example, because
  it is easily confused with the letter ~O~.



Taken From A BBS Hacking Section.


HACKING PAGES #3              *BLUE BOX CONTD*

MAY VARY IN ANY ONE OR ALL OF THE FOLLOWING RESPECTS:

      (A) THE BLUE BOX MAY INCLUDE A ROTARY DIAL TO APPLY THE 2600HZ TONE
AND THE SWITCHING SIGNALS. THIS TYPE OF BLUE BOX IS CALLED A ~DIAL PULSER~ OR 
~ROTARY SF~ BLUE BOX.

      (B) ENTRANCE INTO THE DDD TOLL NETWORK MAY BE EFFECTED BY A PRETEXT
CALL TO ANY OTHER TOLL-FREE # SUCH AS UNIVERSAL DIRECTORY ASSISTANCE
(555-1212) OR ANY # IN THE INWATS NETWORK, EITHER INTER-STATE OR INTRA-
STATE, WORKING OR NON-WORKING.

      (C) ENTRANCE INTO THE DDD TOLL NETWORK MAY ALSO BE IN THE FORM OF
~SHORT HAUL~ CALLING. A ~SHORT HAUL~ CALL IS A CALL TO ANY # WHICH WILL
RESULT IN A LESSER AMOUNT OF TOLL CHARGES THAN THE CHARGES FOR THE CALL
TO BE COMPLETED BY THE BLUE BOX. FOR EXAMPLE, A CALL TO BIRMINGHAM FROM
ATLANTA MAY COST $.80 FOR THE FIRST 3 MINUTES WHILE A CALL FROM ATLANTA TO
LOS ANGELES IS $1.85 FOR 3 MINUTES. THUS, A SHORT HAUL, 3-MINUTE CALL TO
BIRMINGHAM FROM ATLANTA, SWITCHED BY USE OF A BLUE BOX TO LOS ANGELES, WOULD
RESULT IN A NET FRAUD OF $1.05 FOR A 3 MINUTE CALL.

       (D) A BLUE BOX MAY BE WIRED INTO THE TELEPHONE LINE OR ACOUSTICALLY
COUPLED BY PLACING THE SPEAKER OF THE BLUE BOX NEAR THE TRANSMITTER OF THE
PHONE HANDSET. THE BLUE BOX MAY EVEN BE BUILT INSIDE A REGULAR TOUCH-TONE
PHONE, USING THE PHONE'S PUSHBUTTONS FOR THE BLUE BOX'S SIGNALLING TONES.

       (E) A MAGNETIC TAPE RECORDING MAY BE USED TO RECORD THE BLUE BOX
TONES REPRESENTATIVE OF SPECIFIC PHONE #'S. SUCH A TAPE RECORDING COULD BE
USED IN LIEU OF A BLUE BOX TO FRAUDULENTLY PLACE CALLS TO THE PHONE #'S
RECORDED ON THE MAGNETIC TAPE.                                        (CONT'D)
                     HISTORY OF THE CHRISTMAS VIRUS Page3 

     completely unprotected.  It should operate in isolation until tested
     and known. There should be no way that a program can read files without  
     the users knowledge and express permission.  Equally, users should be
     more careful about running  programs on systems which are vital to us.
     Easier said than done.
       At present it seems there are no simple solutions except never to down 
     load...



                                                            Sid Hancock       
How To Make ~L.S.D~ By Anon.

Note: The following was posted to me by an unknown person, and I do not in any
way condone LSD or any type of drugs, and recommend that you don't attempt to 
make any ~L.S.D~.


How to make LSD : by Dr. D-Code & The Pimp brought to CAL by CC.
------------------------------------------------------------------------------
 1. Grind up 150 grams of baby Hawaiian wood rose seeds
 2. In 130cc of petroleum ether, soak seeds for 2 days
 3. Filter solution thru a tight screen
 4. Throw away liquid and allow the seed mush to dry
 5. For 2 days allow the mush to soak in 110cc of wood alcohol
 6. Filter the solution again saving the liquid and labelling it #1
 7. Re-soak the mush in 110cc of wood alcohol for 2 days
 8. Filter and throw away the mush
 9. Add the liquid from the second soak to the solution labeled #1
10. Pour the liquid into a cookie tray and let it evaporate
11. When the liquid has evaporated, a yellow gum remains
12. Scrape the yellow stuff into capsules.


Order the seeds from a wholesaler >only<!!!! Cuz other seeds may have toxic
chemicals in 'em. You can get the seeds used in the solution from:


(Address Of Supplier Removed....)

HACKING PAGES #4              *BLUE BOX CONTD*

   ALL BLUE BOXES, EXCEPT ~DIAL PULSE~ OR ~ROTARY SF~ BLUE BOXES, MUST HAVE
THE FOLLOWING 4 COMMON OPERATING CAPABILITIES:

       (A) IT MUST HAVE SIGNALLING CAPABILITY IN THE FORM OF A 2600HZ 
TONE. THIS TONE IS USED BY THE TOLL NETWORK TO INDICATE, EITHER BY ITS
PRESENCE OR ITS ABSENCE, AN ~ON HOOK~ (IDLE) OR ~OFF HOOK~ (BUSY) CONDITION
OF THE TRUNK. 

       (B) THE BLUE BOX MUST HAVE A ~KP~ TONES THAT UNLOCKS OR READIES THE
MULTI-FREQUENCY RECIEVER AT THE CALLED END TO RECEIVE THE TONES CORRESPONDING 
TO THE CALLED PHONE #.

       (C)THE TYPICAL BLUE BOX MUST BE ABLE TO EMIT MF TONES WHICH ARE USED TO
TRANSMIT PHONE #'S OVER THE TOLL NETWORK. EACH DIGIT OF A PHONE # IS
REPRESENTED BY A COMBINATION OF 2 TONES. FOR EXAMPLE, THE DIGIT 2 IS X-MITTED 
BY A COMBINATION OF 700HZ AND 1100HZ.

       (D) THE BLUE BOX MUST HAVE AN ~ST~ KEY WHICH CONSISTS OF A COMBINA-
TION OF 2 TONES THAT TELL THE EQUIPMENT AT THE CALLED END THAT ALL DIGITS HAVE
BEEN SENT AND THAT THE EQUIPMENT SHOULD START SWITCHING THE CALL TO THE CALLED
NUMBER.

   THE ~DIAL PULSER~ OR ~ROTARY SF~ BLUE BOX REQUIRES ONLY A DIAL WITH A
SIGNALLING CAPABILITY TO PRODUCE A 2600HZ TONE.


Information Taken From A BBS Hacking Section, Only Relevant In The U.S.A.     

 THE NECCESITY OF DEVIANCE, By Jack Stevenson                           PAGE 1
  In the Ideal utopia, individual freedomflourishes. In such a state of
existence there would be no deviants since there would be nothing to deviate  
from. Everyone would bloom like a beautiful flower according to their own 
precaurioyus individual natures. There would be no stifling society codes, no 
predjudice, no repression, no crime. 
  Unfortunately, or rather fortunately, Utopia is unobtainable. Deviation is  
the only thing that's kept the human race from dying off from bad ideas, lack 
of style or just plain boredom, not to mention tyranny, incompetence or       
stupidity.
  As it is, within every religion, within every country, within every city and
small town, deviance springs up unwanted like some ugly evil mushroom, much to
the horror of civil and moral ~authorities.~ It is the one irrepressible,     
ineludable constant of human existence. Thank God.
  It is the deviant, at first persecuted, then martyred and worshipped, who   
changes society, starts all the new religions and philosophies. It is the     
deviant virus buzzing around in the rotted innards of established countrys and
belief systems that keeps the decaying carcass on it's feet until something   
paramutates off, and it crashes to the ground a stinking corpse... although   
sometimes it actually takes a few centuries to fall over.
  On a less grandoise scale, deviation worms it's way into fashion, art, and  
every other form of human conduct, often while the guise of perfect           
respectability is maintained. Deviance is a neccesity of life, on a par with  
food, shelter and clothing. And like any other activity, it can be pursued in 
a cowardly, or courageous fashion.
  Society seeks to maintain the status quo out of pure bloated inertia.       
Industrialization gave rise to the middle class in all developed countries,   
and soon the middle class had began it's own culture: a culture of cowardice, 
conformity and sterility whose holy ground became the suburbs. Conformity was 
                                                                      (CONT'D)
 THE NECCESITY OF DEVIANCE, By Jack Stevenson                           PAGE 2
required, the Status quo worshipped.
  Yet the stricter the status-quo is enforced by social codes, the more       
widespread the deviant urge becomes: today the suburbs are hot-beds of        
deviance and depravity, while inner cities - admittedly more violent - are    
staid in comparison.
  Look through any window in suburbia to see men dressed in leotards or neo-  
nazis in full regelia drowning kittens in bath tubs while through ghetto      
windows, you see earnest young dope dealers and pimps chasing the standard    
capitalist dream. Sexual and other deviations are shunned in the ghettos while
the suburbs provide the privacy, leisure time and money to engage in such     
activities.
  It is the pointlessness and boredom of middle class life more than anything 
that spurs and motivates people into a life of deviance. Poor people are too  
busy trying to ~make it~, chasing commercial images of success, and rich      
people hide all their glorious deviance behind the impenetrable wall of       
discretion propriety. It is out of the belly of the middle class that pulls a 
virtual army of ~deviance~ as they are quick to be called. Punk rockers are   
drop-outs from suburbia, with their anti-beauty esthetics. Before them the    
Hippies were the drop-outs with their drugs and anti-materialism. Many Gays in
New York, San Fransisco and other big cities are escapees from middle class   
conformity. A thousand bizarre cults worldwide are gourged on the children of 
the middle class. It is the greatest contribution of the middle class to      
culture.
  Deviance in it's most spectacular, sensational and violent forms has become 
a new religion, merging Punk rock with Satanism, Nazism and modern death      
technology. Mark Pauline, a San Fransisco artist, builds engine powered       
contraptions, that animate the corpses of chickens and rabbits in a grotesque 
fandango. Autopsy videos are all the latest rage, and a small mouvement of    
                                                                      (CONT'D)

 THE NECCESITY OF DEVIANCE, By Jack Stevenson                           PAGE 3
Xeroxed fanzines that idolize mass-murderers is cropping up, reflecfting wider
interest in this new industrial death culture that has in fact been well      
recieved in the art world.
  Mass murderers are replacing football players as focal points of youthful   
fascination. Gilles de Rais emerges from the muck of his history as the John  
The Baptist of this new order. The richest noble and bravest knight of early  
15th century France, de Rais won a prominent place in French history books for
his battlefield heroism in the cause of Joan Of Arc, personally rescuing her  
from the English at least twice. His later career as a lunatic, devil         
worshipper and sex murderer of hundreds of young peasant children won him a   
place in the wax museums.
  Ed Gein, killer and cannibal of the American 1950s, exploded as a blinding  
supernova in the holy firmament of sexual deviance. Inhabiting an unworked    
farm in rural Wisconsin, Gein impressed neighbors as a mildly retarded        
simpleton who hung out with kids and was good for handyman chores and helping 
road crews chop weeds along the highway. Yet Gein's peaceable manner concealed
the soul of a freinzied deviant: by night he engaged in murder, graverobbing  
and necrophilia, as well as the manufacture of human lampshades, chair seats, 
nipple belts and skull caos. All of Gein's crimes were traced back to a desire
to revive his dead mother from her grave and driven out of control by a       
twisted sexual urge. Perhaps the ongoing celebration of Ed Gein is a reaction 
to the sterile sexual teases of Pop icons such as Doris Day and Annete        
Funicello who purveyed a dehumanized aura of sex that Gein actually came to   
practice.
  Charles Manson is certainly well enough known, both by the myth and reality 
(if in fact they can be seperated). Yet while Manson dabbled in Satanism and  
admired the Nazis, he was a different phenomenon than either medieval castle- 
dwelling de Rais or farmboy idiot/introvert Gein. Manson became the great     
                                                                      (CONT'D)

 THE NECCESITY OF DEVIANCE, By Jack Stevenson                           PAGE 4
                                                                              
hollywood killer and his ledgend has been enshrined by media circus parole    
hearings and annual televising of Helter Skelter that are as eagerly awaited  
as The Wizard of Oz. ~I live in my world,~ said Manson in prison in 1970, ~and
I am the king of my world, wether it be in a garbage dump or if it be in the  
desert or wherever it be, I am my own human being. You may restrain my body   
and you may tear my guts out, do anything you wish, but I am still me and you 
can't take that.~ Is it any wonder Manson strikes a chord with teenagers,     
deviants and outcasts constantly bucking the norm?
  Finally there is John Gacy. If mass-murderers are considered the ultimate   
deviants then John Gacy is an ironic contradiction. While Gacy was a killer,  
a more average, normal, successful and respected member of the community you  
could not find. He was the quintessential suburban ~well respected man.~ His  
taste in everything from houses to cars to backyard barbeques was middle class
suburban. None of this cult-worship commune jazz for him, his world revolved  
around the gravity core of middle class respectable. Because of this, he could
never admit, and in fact to this day denies, that he is gay. He has been      
called by some ~The Ultimate closet Queen~ and the results of his reppresion  
and self-loathing became national headlines in 1979.
  While Gacy is a pretty poor role model for any self-respecting deviant, he  
is the current mass-murder record holder and hence earns the respect of the   
pure-mided death cultists who despise any hint of insanity or cultism. Manson 
and Gein on the other hand were more flamboyant and colourful characters and  
have enjoyed popularity on a wider scale, inspiring movies and songs and even 
bleeding a little bit into pop culture. Gilles de Rais, though, remains almost
unknown to the population, with their fast-food slaughters and shopping-centre
massacres while in history-concious France, he is known to every schoolboy.   
  Other mass killers have made the jump from police reports into pop ledgend. 
Jim Jones was the ultimate cult leader and fake Mohammed. Charles Starkweather
                                                                      (CONT'D)

 THE NECCESITY OF DEVIANCE, By Jack Stevenson                           PAGE 5
was the 1950's own white-trash James Dean/Rebel without a cause, and Lizzi    
Borden slaughtered her parents - What red-blooded Teenager hasn't thought     
about it? Today there are endless Hillside Stranglers, Highway killers,       
Nightstalkers, mad Slashers, berserk snipers holed up in schoolhouses, and    
walking time bombs exploding in post offices and fast-food restaurants.       
  And so, much to the horror of their parents, our young people find heroes   
aplenty in today's ~world~. Or perhaps I should say anti-heros. To today's    
youth, getting stabbed to death or getting blown apart in an explosion dosn't 
seem much worse than dying of boredom, and certainly it's quicker, you might  
even get on TV.
  Modern society seems a faceless, homogenized, sterile place... predictable, 
circumcised, pre-conditioned. The impulsive, the violent, the anti-social is  
admired and at times emulated. The deviant is our new hero.

NASA SPACELINK BACKGROUND                                               PAGE 1
NASA Spacelink runs on a Data General ECLIPSE MV-7800 minicomputer located at 
the George C. Marshall Space Flight Center in Huntsville, Alabama. 
NASA Spacelink software was developed and donated to NASA by the Data
General Corporation of Westboro, Massachusetts.  The system has a main
memory of 14 megabytes (14 million characters), disk storage space for 708
megabytes, and can communicate with eight callers simultaneously at 300,
1200, or 2400 baud.  NASA Spacelink is a dynamic system that will change and  
expand daily.  It was made available to the public in February, 1988.

Initial funding for NASA Spacelink was provided by the Educational Affairs
Division at NASA Headquarters.The NASA Spacelink data base is maintained
by the Public Services and Education Branch of the Marshall Space Flight
Center Public Affairs Office.  Operational support is provided by the 
Information Systems Office at the Marshall Center.  Information on NASA
scientific projects and educational programs is provided to NASA Spacelink
by education specialists at NASA Headquarters and the NASA field centers.

While NASA understands that people from a wide variety of backgrounds will
use NASA Spacelink, the system is specifically designed for teachers.  The
data base is arranged to provide easy access to current and historical
information on NASA aeronautics and space research.  Also included are
suggested classroom activities that incorporate information on NASA
projects to teach a number of scientific principles.  Unlike bulletin board   
systems, NASA Spacelink does not provide for interaction between callers.
However it does allow teachers and other callers to leave questions and
comments for NASA which may be answered by regular mail. 

                                                                      (CONT'D)

NASA SPACELINK BACKGROUND                                               PAGE 2
HOW TO USE NASA SPACELINK:

The communications parameters for accessing NASA Spacelink are:
300, 1200, or 2400 baud
8 data bits
1 stop bit
No parity bits

The telephone number for NASA Spacelink is USA 205-895-0028.

To use NASA Spacelink, type the number of the menu item most likely to        
contain information of interest, and hit your computer's return, carriage     
return (CR), new line, or enter key.   You will find one or more sub-menus    
under each item in the main menu.  Continue choosing menu items until the     
desired information appears.

For example, if you are a sixth grade teacher and you want to plan a lesson   
around food for astronauts, choose item 9 from the Main Menu (Materials for   
Classroom Use).  From the next menu choose item 2 (Living in Space
Activities, Grades 1-6).  From the next menu choose item 2 (Food Lesson
Plans).  Your final menu choice will be item 9 (Grade 6), which will
provide suggested activities for sixth grade students.

Every Spacelink menu offers the options of returning to the previous menu     
(item 0) or returning to the Main Menu (item 1).

When you first logged on to NASA Spacelink, you indicated the number of       
lines your computer monitor will display at one time.  NASA Spacelink will    
                                                                      (CONT'D)

NASA SPACELINK BACKGROUND                                               PAGE 3
pause accordingly to allow time to read information that has appeared on      
screen.  You may press RETURN whenever you are ready for NASA Spacelink to    
continue.

If you wish to override the pause feature to allow continuous scrolling,      
type the letter ~C~ (for Continuous) when text begins to appear.  You must    
type the letter ~C~ every time you want text to scroll continuously. This     
feature will be helpful when you are not reading text, but are saving it to   
disk. 

If you wish to stop viewing text while it is scrolling, you may type the      
letter ~S~ (for STOP) and the previous menu will reappear.

If you want text to pause on demand, type the letter ~S~ while depressing     
your computer's ~Control~ key.  To resume scrolling, type the letter ~Q~      
while depressing your computer's ~Control~ key.

If you want to erase a typing mistake, depress your computer's ~Control~      
key and type the letter ~H~ as many times as necessary to remove the error.   
(The ~DELETE~ key or the left arrow key on many computers will generate       
Ctrl/H.)  Please note that your mistake will not disappear from the screen.   
Instead, an underscore character (_) will appear for each character you       
delete.  Example:  If you type ~Appple,~ you should enter Ctrl/H three        
times to erase the last three letters of the word and then you should type    
~le~ again.  The corrected word will appear as ~Appple___le~ on your screen,  
but it will appear as ~Apple~ in NASA Spacelink's memory.
                                                                      (CONT'D)
NASA SPACELINK BACKGROUND                                               PAGE 4
In brief, here are the keys you can use to control operation of NASA          
Spacelink:

Key       Effect
----------------------------------------------------------
RETURN    Causes text that has paused to resume scrolling
C         Causes text to scroll continuously to end
S         Causes text to stop scrolling and returns
          user to previous menu
Ctrl/S    Causes text to pause
Ctrl/Q    Causes text to resume scrolling after being
          stopped by Ctrl/S
Ctrl/H    Deletes typing mistakes (Your computer's Delete
          key or left arrow key may generate Ctrl/H.)


10 THINGS TO DO WITH YOUR AMIGA....                                     Page 1
                    10 Things to do with your Amiga!!  
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
                              By Count Zero 
                             ~~~~~~~~~~~~~~~

1. Paint it luminous,psychadellic pink,yellow and green.This prevents you     
from losing your Amiga in the dark during those ~up to 3 AM in the morning~   
copying sessions. 
Also comes in especially usefull when your bedroom is more like a gargbage    
dump because of hundreds of used jiffy bags,with sellotaped stamps and big    
red marks to the effect of ~if you dont stop this we`ll write you a nasty     
letter!~ put there by that nice man at the Post Office. 

2. Alternatively you can paint it mat black,this is very good camouflage for  
when it is lying in the garden in the early hours of saturday morning,becoz   
you`ve just thrown it out the window,as a man from FAST is knocking at your   
front door,and your Mum has told him to come straight in.The only thing you   
have to worry about now is what to do with those few thousand luminous green  
disks you got cheap from Taiwan.

3.Melt it down on the gas stove and sell it to the Tate Gallery for huge am-  
ounts of cash,and buy yourself a Cray III instead. 

4.Pour a pint of particulary strong Export Lager all over it,whilst still     
plugged in,switched on,and try to type ~Jackdaws love my big quartz sphinx~,  
and to make it really funny drink several pints of afore mentioned lager bef- 
ore hand.
                                                                      (Cont'd)

10 THINGS TO DO WITH YOUR AMIGA....                                     Page 2
5.Use it to bash your non-Amiga owning friends around the head,next time they 
~come to see you~ but what they really mean is ~come to play on your computer 
for the next 3 hours while you feed us food and drink,and you can sit there   
extremly bored becoz we insist on playing Pacmania~

6.Take it apart with a sledge hammer just to see how many of those funny      
black thing are inside it,then wonder if this invalidates the warranty,and    
how much will it cost to have it repaired.

7.Blow it and your DF1 up,by using wrongly connected Cyclone copier leads.    
8.Seek out strange new Guru messages by dunking your disks into hot cups of   
coffee then trying to boot them up.

9.Decide that you just can`t take the Amiga`s amazing GFX and cool sound,so   
buy an inferior machine with less colours and worse sound,called an Atari ST. 
10.Read this really intresting,informative,amusing article the best Amiga     
disk magazine,written by this dude called COUNT ZERO, and then 
decide to take out a life time subscription,and send the author lots of money!
More USA Toll Fruad Devices In Detail.                                  Page 1
              *BLACK BOX* 
              ------ ---- 

   THIS ETF DEVICE IS SO-NAMED BECAUSE OF THE COLOR OF THE FIRST ONE FOUND. IT
VARIES IN SIZE AND USUALLY HAS ONE OR TWO SWITCHES OR BUTTONS.

   ATTACHED TO THE TELEPHONE LINE OF A CALLED PARTY, THE BLACK BOX PROVIDES   
TOLL-FREE CALLING *TO* THAT PARTY'S LINE. A BLACK BOX USER INFORMS OTHER      
PERSONS BEFOREHAND THAT THEY WILL NOT BE CHARGED FOR ANY CALL PLACED TO HIM.  
THE USER THEN OPERATES THE DEVICE CAUSING A ~NON-CHARGE~ CONDITION (~NO       
ANSWER~ OR ~DISCONNECT~) TO BE RECORDED ON THE TELPHONE COMPANYS BILLING EQUIP
MENT. A BLACK BOX IS RELATIVELY SIMPLE TO CONSTRUCT AND IS MUCH LESS SOPHISTI-
CATED THAN A BLUE BOX.

              *CHEESE BOX* 
              ------- ---- 

   THIS DEVICE IS SO-NAMED FOR THE CONTAINER IN WHICH THE FIRST ONE WAS       
FOUND. ITS DESIGN MAY BE CRUDE OR VERY SOPHISTICATED. ITS SIZE VARIES; ONE WAS
FOUND THE SIZE OF A HALF-DOLLAR. 

   A CHEESE BOX IS USED MOST OFTEN BY BOOKMAKERS OR BETTERS TO PLACE WAGERS   
WITHOUT DETECTION FROM A REMOTE LOCATION. THE DEVICE INTER-CONNECTS 2         
PHONE LINES, EACH HAVING DIFFERENT #'S BUT EACH TERMINATING AT THE SAME       
LOCATION. IN EFFECT, THERE ARE 2 PHONES AT THE SAME LOCATION WHICH ARE LINKED 
TOGETHER THROUGH A CHEESE BOX. IT IS USUALLY FOUNDN IN AN UNOCCUPIED          
APARTMENT CONNECTED TO A PHONE JACK OR CONNECTING BLOCK. THE BOOKMAKER, AT    
                                                                      (CONT'D)
More USA Toll Fruad Devices In Detail.                                  Page 2
SOME REMOTE LOCATION, DIALS ONE OF THE NUMBERS AND STAYS ON THE LINE. VARIOUS 
BETTORS DIAL THE OTHER NUMBER BUT ARE AUTOMATICALLY CONNECTED WITH THE BOOK   
MAKER BY MEANS OF THE CHEESE BOX INTER CONNECTION. IF, IN ADDITION TO A CHEESE
BOX, A BLACK BOX IS INCLUDED IN THE ARRANGEMENT, THE COMBINED EQUIPMENT       
WOULD PERMIT TOLL-FREE CALLING ON EITHER LINE TO THE OTHER LINE. IF A         
POLICE RAID WERE CONDUCTED AT THE TERMINATING POINT OF THE CONVERSATIONS      
-THE LOCATION OF THE CHEESE BOX- THERE WOULD BE NO EVIDENCE OF GAMBLING       
ACTIVITY. THIS DEVICE IS SOMETIMES DIFFICULT TO IDENTIFY. LAW ENFORCEMENT     
OFFICIALS HAVE BEEN ADVISED THAT WHEN UNUSUAL DEVICES ARE FOUND ASSOCIATED    
WITH TELEPHONE CONNECTIONS THE PHONE COMPANY SECURITY REPRESENTITIVES SHOULD  
BE CONTACTED TO ASSIST IN INDENTIFICATION.
(THIS PROBABLY WOULD BE GOOD FOR A BBS, ESPECIALLY WITH THE BLACK BOX SET UP. 
AND IF YOU EVER DECIDED TO TAKE THE BOARD DOWN, YOU WOULDN'T HAVE TO CHANGE   
YOUR PHONE #. IT ALSO MAKES IT SO YOU YOURSELF CANNOT BE TRACED. I AM NOT     
SURE ABOUT CALLING OUT FROM ONE THOUGH)                                       
              *RED BOX*
              ---- ----

   THIS DEVICE IT COUPLED ACOUSTICALLY TO THE HANDSET TRANSMITTER OF A SINGLE-
SLOT COIN TELEPHONE. THE DEVICE EMITS SIGNALS IDENTICAL TO THOSE TONES        
EMITTED WHEN COINS ARE DEPOSITED. THUS, LOCAL OR TOLL CALLS MAY BE PLACED     
WITHOUT THE ACTUAL DEPOSIT OF COINS.

- Some Info Was Taken From An Official BELL Report On Fraud Devices, And Any  
  Info Here Is Meant Only For Informational/Interest Purposes Only...         

Sprite Tips! 
~~~~~~~~~~~~~

 Sprites can be used to implement many interesting effects,including
the starfield which you can see now (which was coded by me!, Count
Zero ).However they do present some problems,one of which is to display
sprites below $FF (line 256) on the screen,this is easily solved by
modifying the second control word of the sprite.
The format of the control words of a sprite is $xxyy,$zz00, where xx
is the vertical start position,and zz is the vertical stop position,
whilst yy is the horizontal position.For example, $A050,$A100 displays
a sprite at vertical line 100,and 1 line down ($A1-$A0),with Horizontal
position of $50.However this is pretty straight forward stuff,which you
get by looking at the Systems Guide,or the Hardware Reference Manual  
To display below $FF,simply put a $6 into the control word,for example
 $1050,$1106,display a sprite at line 272,which is 1 line high,easy huh?

 Now on to Spurious Sprite Video Data,(SSVD),these are those annoying
lines that appear down the screen occasionally,it is a simple matter to
prevent these,some coders load the sprite data registers with zero,but
the methods I use is even simpler,before swithing of sprite DMA,wait for
a position on screen,for example 300 (on PAL machines),where the CLI
sprite pointer is not being displayed.The SSVD is because when switching
of sprite DMA any sprite that is being displayed at the point on the
screen where you switch it off,will continue being displayed,resulting
in a line down the screen.


CLASSIFIED ADVERTS!   (They're Free!!!!!!!!)

å----------------------------------------------------------------------------°
|                                                                            |
| Contact Count Zero to swap cource code,help needed on blitter line draw etc|
| also help given.                                                           |
|                                                                            |
| Count Zero,40 Vine Road,Backford Cross,South Wirral,L66 2XX.               |
|                                                                            |
| Greets To : Zigor(The Culprits),Vector(Armada),Kreator(Anarchy)            |
| Parrell-Axe,Lamo Barry (Crack UK).                                         |
|                                                                            |
æ----------------------------------------------------------------------------ß
å----------------------------------------------------------------------------°
|                                                                            |
|Bored? Wasting Hours Upon End Sitting In Front Of Your Amiga For No Reason??|
|Have Something Vaugely Interesting To Say?  Yes?  Well, Why Not Spend Your  |
|Time Writing Articles & Classified Ads For This Mag????   Write Them To The |
|Addresses Shown On ~About The Mag~......                                    |
|                                                                            |
æ----------------------------------------------------------------------------ß


These Adverts Are Free!  You Can Advertise ANYTHING Here At All (Human Lamp-  
shades etc...)  Just Send Them To The Editor/Co-Editor.....