The Brand New Coder's Scene Magazine! Issue #1 (Pilot) Aug 1990
Hello, and welcome to this, the only disk magazine dedicated to Amiga 68000
Coders. Well, click the Mouse over page one, and read on for more details.
Main - Menu.
| About The Magazine || Interesting Tel Nos.. || U.S.A Blue Boxes 1 |
| Christmas Virus 1 || Random Numbers 1 || ~ ~ Boxes 2 |
| ~ ~ Virus 2 || ~ ~ Numbers 2 || ~ ~ Boxes 3 |
| ~ ~ Virus 3 || How To Make L.S.D! || ~ ~ Boxes 4 |
| Neccesity Deviance 1 || N.A.S.A. SpaceLink 1 || U.S.A More Boxes.. 1 |
| ~ ~ 2 || ~ ~ 2 || ~ ~ ~ 2 |
| ~ ~ 3 || ~ ~ 3 || |
| ~ ~ 4 || ~ ~ 4 || |
| ~ ~ 5 || Classified Adverts.. || |
| Ten Things..... 1 || || |
| ~ ~ 2 || || |
| Sprite Tips.... || || ** EXIT MAGAZINE ** |
To contribute, write to the addresses shown in the pages above.
Instructions: Select Desired Item Using Mouse to Highlight Bar, Then Click
LEFT Mouse To Read Page, and Press RIGHT Mouse To Progress A Page. Press
LEFT mouse Button to return to Main-Menu. Eg: To Read The N.A.S.A Article,
Click on it's 1st Page, then read each page by pressing RIGHT mouse, then
Press LEFT mouse to return to the Main-Menu.
Joystick=Colour Change: Up=Blue+, Left=Green+, Right=Red+, Fire=Default.
Coded By/Editor: THE SNOWMAN. Co-Editor: COUNT ZERO. Material: VARIOUS.
About The Coder's Scene Magazine.
Hello & Welcome. This is a pilot for the ~real thing~ magazine, when I get
things off the ground. This magazine will take a standard format (much like
this pilot........), and will be one executable file that can be
put on compacts etc..
Issues will be put out every time I have enough material to put one together
and will cater really for Coders on the Amiga (but will also contain much,
other interesting material, such as all the ~hacking~ info in this pilot
This issue has over 60k of text alone, the next will have a little more.
Well, this is the best part, if you want to offer any advice, or contribute
in any way (ie. writing things in ASCII format 80 columns wide...), then you
should do so soon, and send it to The Editor/Co-Editor:
The Snowman, Magazine Stuff, 18 Palm Grove, Whitby, Ellesmere Port, L66 2PU.
Count Zero, Magazine Stuff, 40 Vine Road, Backford Cross, S.Wirral, L66 2XX.
The kind of stuff I'm looking for are the following:
A> Articles about something interesting... B> Letters (Got Coding Problems?)
C> Coding Articles... D> Circuit Diagrams?
E> Hacking Information... F> Anything....
G> Classified Ads (Contacts Etc..) H> Anything....
( All Disks Returned With The Latest Issue On Them If Postage Is Included....)
NOTE: All information in this mag CANNOT be verified, and all hacking info is
for Informational/Interest purposes ONLY (as is ALL the text in the mag....)
laws CAN be broken if various instructions in texts were carried out, and I
can accept NO responsability for ANY STUPID actions taken !
Some Interesting Phone Numbers.......
Falkland Is. Governors Office : 010 500 2202
Falkland Is. Secretarys Office : 010 500 2201
Cable and Wireless Port Stanley : 010 500 2405
Le Figaro, Paris : 0800 898058
Access Credit Card Validation : 0702 352222
Checkpoint Cheque Validation Scheme: 0800 424949
Barclaycard Validation : 0345 555555
KGB : 010 7 095 222 70762
NSA : 0101 381 688 6311
DTI Space SVCS : 01 215 2138
DTI Cordless Telephones : 01 215 2208
Scramble Facts : 0101 712 343 0130
New Dialtones : 061 246 8011/0203 8011
System X Demo : 061 246 8011
Downing Street : 01 270 3000
Buck. House : 01 930 4832
Space Shuttle Comm. : 0101 900 410 6272
Watergate : 0101 202 965 2900
Pentagon : 0101 202 545 6706
The Presidents Office : 0101 202 456 2858
Vice Presidents Office : 0101 202 456 7123
Prestel Operational Computer Centre: 01 248 0480
(SOME NUMBERS MAY HAVE CHANGED!)
HACKING PAGES #1 *BLUE BOX*
THE ~BLUE BOX~ WAS SO NAMED BECAUSE OF THE COLOR OF THE FIRST ONE FOUND.
THE DESIGN AND HARDWARE USED IN THE BLUE BOX IS FAIRLY SOPHISTICATED, AND
ITS SIZE VARIES FROM A LARGE PIECE OF APPARATUS TO A MINIATURIZED UNIT THAT
IS APPROXIMATELY THE SIZE OF A ~KING SIZE~ PACKAGE OF CIGARETTES.
THE BLUE BOX CONTAINS 12 OR 13 BUTTONS OR SWITCHES THAT EMIT MULTI-
FREQUENCY TONES CHARACTERISTIC OF THE TONES USED IN THE NORMAL OPERATION OF
THE TELEPHONE TOLL (LONG DISTANCE) SWITCHING NETWORK. THE BLUE BOX ENABLES
ITS USER TO ORIGINATE FRAUDULENT (~FREE~) TOLL CALLS BY CIRCUMVENTING
TOLL BILLING EQUIPMENT. THE BLUE BOX MAY BE DIRECTLY CONNECTED TO A PHONE
LINE, OR IT MAY BE ACOUSTICALLY COUPLED TO A TELEPHONE HANDSET BY PLACING THE
BLUE BOX'S SPEAKER NEXT TO THE TRANS MITTER OR THE TELEPHONE HANDSET. THE
OPERATION OF A BLUE BOX WILL BE DISCUSSED IN MORE DETAIL BELOW.
TO UNDERSTAND THE NATURE OF A FRAUDULENT BLUE BOX CALL, IT IS
NECESSARY TO UNDERSTAND THE BASIC OPERATION OF THE DIRECT DISTANCE
DIALING (DDD) TELEPHONE NETWORK. WHEN A DDD CALL IS PROPERLY ORIGINATED, THE
CALLING NUMBER IS IDENTIFIED AS AN INTEGRAL PART OF ESTABLISHING THE
CONNECTION. THIS MAY BE DONE EITHER AUTOMATICALLY OR, IN SOME CASES, BY AN
OPERATOR ASKING THE CALLING PARTY FOR HIS TELEPHONE NUMBER. THIS INFORMATION
IS ENTERED ON A TAPE IN THE AUTOMATIC MESSAGE ACCOUNTING (AMA) OFFICE. THIS
TAPE ALSO CONTAINS THE NUMBER ASSIGNED TO THE TRUNK LINE OVER WHICH THE CALL
IS TO BE SENT. THE INFORMATION RELATING TO THE CALL CONTAINED ON THE TAPE
INCLUDES: CALLED NUMBER INDENTIFICATION, TIME OF ORIGINATION OF CALL, AND INFO
THAT THE CALLED NUMBER ANSWERED THE CALL. THE TIME OF DISCONNECT AT THE END
OF THE CALL IS ALSO REFORDED. (CONT'D)
HISTORY OF THE CHRISTMAS VIRUS
It all began as a joke for Christmas. A student in West Germany wrote
a little program called ~Christma~ and sent it to all his friends on
the network of Claustahal Technical University, south of Hanover.
Sending it through the network was simple: the program handled that by
reading a couple of files containing lists of all regular corres-
pondents and all recently sent and received mail: Names and Netlog.
When the program was run the recipients saw a festive Christmas tree
appear on their screens. Very nice too. However Christma also secretly
read the recipients Names and Netlog files, moved forward on its
merry way and, rather ungratefully, then deleted itself from the host.
The next, rather larger, batch of recipients (who were of course all
used to unknown programs appearing through the network) ran Christma
as well and saw the pretty graphics come and go. Of course they all had
Names and Netlog files too...
That was December 9th 1987.
No Hard discs scrambled, no system lockups, no discs infected with
AIDS... no harm done surely? Just a seasonal greeting transmitted by
good ol' Info Tech. Well that's what the writer of Christma thought
too and he was very mistaken.
The problem lay in the speed of communication and the increased
linking of computer networks in many fields. And continents.
The virus program spread with accelerating speed throughout Europe
via its link into EARN: the European Academic Research Network.
EARN is also linked to universities in the US via Bitnet...hundreds of
automatic mailers busily consulted Netlogs and the volume of traffic
TAKING THE ~RANDOM~ OUT OF RANDOM PAGE 1
One of the most notable factors in so-called tables of
computerized ~random~ numbers is that there are two basic ways of
creating them. The first method is to create a table that will
provide what can statistically be said to be a random list - that
is no number or letter would theoretically occur more frequently
than any other number or letter. Most systems, however, simply
rely on an electronic component that creates alledgedly ~random~
numbers. These hardware random number generators are usually
biased in their number selections.
One simple test of a random number generator is called the
~coin toss test.~ A program is written to simulate the results of
a thousand or so coin tosses. Were the random number generator
truly random, heads would appear about as frequently as tails. In
an actual test, however, heads appeared 421 times, and tails
appeared 579 times - a significant bias. A test such as this could
be performed over the entire alphanumeric character list and the
component's bias chartered. Once this information was known, the
cracking computer could be programmed to insert this selection bias
into it's own attempts to generate passwords. This is yet another
step that evens the odds between the hacker and the so-called
~uncrackable~ password. This testing scheme, requiring either a
component or a computer like the target computer, would be a lengthy
process, but some people might regard the product as worth the time
involved in preparing such an analysis. (Cont'd)
HACKING PAGES #2 *BLUE BOX CONTD*
ALTHOUGH THE TAPE CONTAINS INFO WITH RESPECT TO MANY DIFFERENT CALLS, THE
VARIOUS DATA ENTRIES WITH RESPECT TO A SINGLE CALL ARE EVENTUALLY CORRELATED
TO PROVIDE BILLING INFO FOR USE BY YOUR BELL'S ACCOUNTING DEPARTMENT.
THE TYPICAL BLUE BOX USER USUALLY DIALS A NUMBER THAT WILL ROUTE THE CALL
INTO THE TELEPHONE NETWORK WITHOUT CHARGE. FOR EXAMPLE, THE USER WILL VERY
OFTEN CALL A WELL-KNOWN INWATS (TOLL-FREE) CUSTOMER'S NUMBER. THE BLUE BOX
USER, AFTER GAINING THIS ACCESS TO THE NETWORK AND, IN EFFECT, ~SEIZING~
CONTROL AND COMPLETE DOMINION OVER THE LINE, OPERATES A KEY ON THE BLUE BOX
WHICH EMITS A 2600 HERTZ (CYCLES PER SECOND) TONE. THIS TONE CAUSES THE
SWITCHING EQUIPMENT TO RELEASE THE CONNECTION TO THE INWATS CUSTOMER'S LINE.
THE 2600HZ TONE IS A SIGNAL THAT THE CALLING PARTY HAS HUNG UP. THE BLUE BOX
SIMULATES THIS CONDITION. HOWEVER, IN FACT THE LOCAL TRUNK ON THE CALLING
PARTY'S END IS STILL CONNECTED TO THE TOLL NETWORK. THE BLUE BOX USER NOW
OPERATES THE ~KP~ (KEY PULSE) KEY ON THE BLUE BOX TO NOTIFY THE TOLL SWITCH-
ING EQUIPMENT THAT SWITCHING SIGNALS ARE ABOUT TO BE EMITTED. THE USER THEN
PUSHES THE ~NUMBER~ BUTTONS ON THE BLUE BOX CORRESPONDING TO THE TELEPHONE #
BEING CALLED. AFTER DOING SO HE/SHE OPERATES THE ~ST~ (START) KEY TO
INDICATE TO THE SWITCHING EQUIPMENT THAT SIGNALLING IS COMPLETE. IF THE
CALL IS COMPLETED, ONLY THE PORTION OF THE ORIGINAL CALL PRIOR TO THE EMISSION
OF 2600HZ TONE IS RECORDED ON THE AMA TAPE. THE TONES EMITTED BY THE BLUE BOX
ARE NOT RECORDED ON THE AMA TAPE. THEREFOREF, BECAUSE THE ORIGINAL CALL TO THE
INWATS # IS TOLL-FREE, NO BILLING IS RENDERED IN CONNECTION WITH THE CALL.
ALTHOUGH THE ABOVE IS A DESCRIPTION OF A TYPICAL BLUE BOX OPERATION USING
A COMMON METHOD OF ENTRY INTO THE NETWORK,THE OPERATION OF A BLUE BOX (CONTD)
HISTORY OF THE CHRISTMAS VIRUS Page2
Within TWO DAYS networks were seriously overloaded on both continents.
By the 11th December the jamming was so serious that system
programmers from EARN and Bitnet came together to try to track and kill
Christma. For the first time in the history of Virus hunting a Seeker
program was developed (by Eric Thomas of the Ecole Centrale de Paris)
which traced the flow of Christma by reading Netlog files, chasing and
then erasing it. Meanwhile systems on which Christma had appeared
were taken off the network while discs were checked.
By the 14th December the academic networks were free.
But Christma was not yet dead, although the author probably wished
that he was. IBM has a private network VNET, which is linked to
Bitnet...VNET corporate users tend to hold very large Names files.
The entire IBM corporate E-mail system was closed down for 72 hours
until the infection was eradicated!
Horrifying or amusing, depending on your point of view, Christma
really happened and very recently. The implications for users and
manufacturers are profound. We have all heard of Trojan files on
Bulletin Boards, the Amiga Virus and others not so widely publicised.
Hardware designers and manufacturers have viewed the issues as
unimportant to their business. In other words it's the users problem.
IBM for one may well be rethinking this strategy!
Technically, it has been possible for many years to design safer
systems. A program should not be able to run in a system that is
TAKING THE ~RANDOM~ OUT OF RANDOM... PAGE 2
A strategy of cracking Dow Jones system, given the rules listed
above, would be to create a program with an algorithm that provided
combinations of passwords meeting the criteria above. As each
creation was tested, a pattern might be found in the successful
creations that would make the algorithm even more selective. One
would expect, for example, that simular to the MILNET and ARPANET
passwords, certain confusing characters would be eliminated from
passwords. The number, ~0~ is often eliminated, for example, because
it is easily confused with the letter ~O~.
Taken From A BBS Hacking Section.
HACKING PAGES #3 *BLUE BOX CONTD*
MAY VARY IN ANY ONE OR ALL OF THE FOLLOWING RESPECTS:
(A) THE BLUE BOX MAY INCLUDE A ROTARY DIAL TO APPLY THE 2600HZ TONE
AND THE SWITCHING SIGNALS. THIS TYPE OF BLUE BOX IS CALLED A ~DIAL PULSER~ OR
~ROTARY SF~ BLUE BOX.
(B) ENTRANCE INTO THE DDD TOLL NETWORK MAY BE EFFECTED BY A PRETEXT
CALL TO ANY OTHER TOLL-FREE # SUCH AS UNIVERSAL DIRECTORY ASSISTANCE
(555-1212) OR ANY # IN THE INWATS NETWORK, EITHER INTER-STATE OR INTRA-
STATE, WORKING OR NON-WORKING.
(C) ENTRANCE INTO THE DDD TOLL NETWORK MAY ALSO BE IN THE FORM OF
~SHORT HAUL~ CALLING. A ~SHORT HAUL~ CALL IS A CALL TO ANY # WHICH WILL
RESULT IN A LESSER AMOUNT OF TOLL CHARGES THAN THE CHARGES FOR THE CALL
TO BE COMPLETED BY THE BLUE BOX. FOR EXAMPLE, A CALL TO BIRMINGHAM FROM
ATLANTA MAY COST $.80 FOR THE FIRST 3 MINUTES WHILE A CALL FROM ATLANTA TO
LOS ANGELES IS $1.85 FOR 3 MINUTES. THUS, A SHORT HAUL, 3-MINUTE CALL TO
BIRMINGHAM FROM ATLANTA, SWITCHED BY USE OF A BLUE BOX TO LOS ANGELES, WOULD
RESULT IN A NET FRAUD OF $1.05 FOR A 3 MINUTE CALL.
(D) A BLUE BOX MAY BE WIRED INTO THE TELEPHONE LINE OR ACOUSTICALLY
COUPLED BY PLACING THE SPEAKER OF THE BLUE BOX NEAR THE TRANSMITTER OF THE
PHONE HANDSET. THE BLUE BOX MAY EVEN BE BUILT INSIDE A REGULAR TOUCH-TONE
PHONE, USING THE PHONE'S PUSHBUTTONS FOR THE BLUE BOX'S SIGNALLING TONES.
(E) A MAGNETIC TAPE RECORDING MAY BE USED TO RECORD THE BLUE BOX
TONES REPRESENTATIVE OF SPECIFIC PHONE #'S. SUCH A TAPE RECORDING COULD BE
USED IN LIEU OF A BLUE BOX TO FRAUDULENTLY PLACE CALLS TO THE PHONE #'S
RECORDED ON THE MAGNETIC TAPE. (CONT'D)
HISTORY OF THE CHRISTMAS VIRUS Page3
completely unprotected. It should operate in isolation until tested
and known. There should be no way that a program can read files without
the users knowledge and express permission. Equally, users should be
more careful about running programs on systems which are vital to us.
Easier said than done.
At present it seems there are no simple solutions except never to down
How To Make ~L.S.D~ By Anon.
Note: The following was posted to me by an unknown person, and I do not in any
way condone LSD or any type of drugs, and recommend that you don't attempt to
make any ~L.S.D~.
How to make LSD : by Dr. D-Code & The Pimp brought to CAL by CC.
1. Grind up 150 grams of baby Hawaiian wood rose seeds
2. In 130cc of petroleum ether, soak seeds for 2 days
3. Filter solution thru a tight screen
4. Throw away liquid and allow the seed mush to dry
5. For 2 days allow the mush to soak in 110cc of wood alcohol
6. Filter the solution again saving the liquid and labelling it #1
7. Re-soak the mush in 110cc of wood alcohol for 2 days
8. Filter and throw away the mush
9. Add the liquid from the second soak to the solution labeled #1
10. Pour the liquid into a cookie tray and let it evaporate
11. When the liquid has evaporated, a yellow gum remains
12. Scrape the yellow stuff into capsules.
Order the seeds from a wholesaler >only<!!!! Cuz other seeds may have toxic
chemicals in 'em. You can get the seeds used in the solution from:
(Address Of Supplier Removed....)
HACKING PAGES #4 *BLUE BOX CONTD*
ALL BLUE BOXES, EXCEPT ~DIAL PULSE~ OR ~ROTARY SF~ BLUE BOXES, MUST HAVE
THE FOLLOWING 4 COMMON OPERATING CAPABILITIES:
(A) IT MUST HAVE SIGNALLING CAPABILITY IN THE FORM OF A 2600HZ
TONE. THIS TONE IS USED BY THE TOLL NETWORK TO INDICATE, EITHER BY ITS
PRESENCE OR ITS ABSENCE, AN ~ON HOOK~ (IDLE) OR ~OFF HOOK~ (BUSY) CONDITION
OF THE TRUNK.
(B) THE BLUE BOX MUST HAVE A ~KP~ TONES THAT UNLOCKS OR READIES THE
MULTI-FREQUENCY RECIEVER AT THE CALLED END TO RECEIVE THE TONES CORRESPONDING
TO THE CALLED PHONE #.
(C)THE TYPICAL BLUE BOX MUST BE ABLE TO EMIT MF TONES WHICH ARE USED TO
TRANSMIT PHONE #'S OVER THE TOLL NETWORK. EACH DIGIT OF A PHONE # IS
REPRESENTED BY A COMBINATION OF 2 TONES. FOR EXAMPLE, THE DIGIT 2 IS X-MITTED
BY A COMBINATION OF 700HZ AND 1100HZ.
(D) THE BLUE BOX MUST HAVE AN ~ST~ KEY WHICH CONSISTS OF A COMBINA-
TION OF 2 TONES THAT TELL THE EQUIPMENT AT THE CALLED END THAT ALL DIGITS HAVE
BEEN SENT AND THAT THE EQUIPMENT SHOULD START SWITCHING THE CALL TO THE CALLED
THE ~DIAL PULSER~ OR ~ROTARY SF~ BLUE BOX REQUIRES ONLY A DIAL WITH A
SIGNALLING CAPABILITY TO PRODUCE A 2600HZ TONE.
Information Taken From A BBS Hacking Section, Only Relevant In The U.S.A.
THE NECCESITY OF DEVIANCE, By Jack Stevenson PAGE 1
In the Ideal utopia, individual freedomflourishes. In such a state of
existence there would be no deviants since there would be nothing to deviate
from. Everyone would bloom like a beautiful flower according to their own
precaurioyus individual natures. There would be no stifling society codes, no
predjudice, no repression, no crime.
Unfortunately, or rather fortunately, Utopia is unobtainable. Deviation is
the only thing that's kept the human race from dying off from bad ideas, lack
of style or just plain boredom, not to mention tyranny, incompetence or
As it is, within every religion, within every country, within every city and
small town, deviance springs up unwanted like some ugly evil mushroom, much to
the horror of civil and moral ~authorities.~ It is the one irrepressible,
ineludable constant of human existence. Thank God.
It is the deviant, at first persecuted, then martyred and worshipped, who
changes society, starts all the new religions and philosophies. It is the
deviant virus buzzing around in the rotted innards of established countrys and
belief systems that keeps the decaying carcass on it's feet until something
paramutates off, and it crashes to the ground a stinking corpse... although
sometimes it actually takes a few centuries to fall over.
On a less grandoise scale, deviation worms it's way into fashion, art, and
every other form of human conduct, often while the guise of perfect
respectability is maintained. Deviance is a neccesity of life, on a par with
food, shelter and clothing. And like any other activity, it can be pursued in
a cowardly, or courageous fashion.
Society seeks to maintain the status quo out of pure bloated inertia.
Industrialization gave rise to the middle class in all developed countries,
and soon the middle class had began it's own culture: a culture of cowardice,
conformity and sterility whose holy ground became the suburbs. Conformity was
THE NECCESITY OF DEVIANCE, By Jack Stevenson PAGE 2
required, the Status quo worshipped.
Yet the stricter the status-quo is enforced by social codes, the more
widespread the deviant urge becomes: today the suburbs are hot-beds of
deviance and depravity, while inner cities - admittedly more violent - are
staid in comparison.
Look through any window in suburbia to see men dressed in leotards or neo-
nazis in full regelia drowning kittens in bath tubs while through ghetto
windows, you see earnest young dope dealers and pimps chasing the standard
capitalist dream. Sexual and other deviations are shunned in the ghettos while
the suburbs provide the privacy, leisure time and money to engage in such
It is the pointlessness and boredom of middle class life more than anything
that spurs and motivates people into a life of deviance. Poor people are too
busy trying to ~make it~, chasing commercial images of success, and rich
people hide all their glorious deviance behind the impenetrable wall of
discretion propriety. It is out of the belly of the middle class that pulls a
virtual army of ~deviance~ as they are quick to be called. Punk rockers are
drop-outs from suburbia, with their anti-beauty esthetics. Before them the
Hippies were the drop-outs with their drugs and anti-materialism. Many Gays in
New York, San Fransisco and other big cities are escapees from middle class
conformity. A thousand bizarre cults worldwide are gourged on the children of
the middle class. It is the greatest contribution of the middle class to
Deviance in it's most spectacular, sensational and violent forms has become
a new religion, merging Punk rock with Satanism, Nazism and modern death
technology. Mark Pauline, a San Fransisco artist, builds engine powered
contraptions, that animate the corpses of chickens and rabbits in a grotesque
fandango. Autopsy videos are all the latest rage, and a small mouvement of
THE NECCESITY OF DEVIANCE, By Jack Stevenson PAGE 3
Xeroxed fanzines that idolize mass-murderers is cropping up, reflecfting wider
interest in this new industrial death culture that has in fact been well
recieved in the art world.
Mass murderers are replacing football players as focal points of youthful
fascination. Gilles de Rais emerges from the muck of his history as the John
The Baptist of this new order. The richest noble and bravest knight of early
15th century France, de Rais won a prominent place in French history books for
his battlefield heroism in the cause of Joan Of Arc, personally rescuing her
from the English at least twice. His later career as a lunatic, devil
worshipper and sex murderer of hundreds of young peasant children won him a
place in the wax museums.
Ed Gein, killer and cannibal of the American 1950s, exploded as a blinding
supernova in the holy firmament of sexual deviance. Inhabiting an unworked
farm in rural Wisconsin, Gein impressed neighbors as a mildly retarded
simpleton who hung out with kids and was good for handyman chores and helping
road crews chop weeds along the highway. Yet Gein's peaceable manner concealed
the soul of a freinzied deviant: by night he engaged in murder, graverobbing
and necrophilia, as well as the manufacture of human lampshades, chair seats,
nipple belts and skull caos. All of Gein's crimes were traced back to a desire
to revive his dead mother from her grave and driven out of control by a
twisted sexual urge. Perhaps the ongoing celebration of Ed Gein is a reaction
to the sterile sexual teases of Pop icons such as Doris Day and Annete
Funicello who purveyed a dehumanized aura of sex that Gein actually came to
Charles Manson is certainly well enough known, both by the myth and reality
(if in fact they can be seperated). Yet while Manson dabbled in Satanism and
admired the Nazis, he was a different phenomenon than either medieval castle-
dwelling de Rais or farmboy idiot/introvert Gein. Manson became the great
THE NECCESITY OF DEVIANCE, By Jack Stevenson PAGE 4
hollywood killer and his ledgend has been enshrined by media circus parole
hearings and annual televising of Helter Skelter that are as eagerly awaited
as The Wizard of Oz. ~I live in my world,~ said Manson in prison in 1970, ~and
I am the king of my world, wether it be in a garbage dump or if it be in the
desert or wherever it be, I am my own human being. You may restrain my body
and you may tear my guts out, do anything you wish, but I am still me and you
can't take that.~ Is it any wonder Manson strikes a chord with teenagers,
deviants and outcasts constantly bucking the norm?
Finally there is John Gacy. If mass-murderers are considered the ultimate
deviants then John Gacy is an ironic contradiction. While Gacy was a killer,
a more average, normal, successful and respected member of the community you
could not find. He was the quintessential suburban ~well respected man.~ His
taste in everything from houses to cars to backyard barbeques was middle class
suburban. None of this cult-worship commune jazz for him, his world revolved
around the gravity core of middle class respectable. Because of this, he could
never admit, and in fact to this day denies, that he is gay. He has been
called by some ~The Ultimate closet Queen~ and the results of his reppresion
and self-loathing became national headlines in 1979.
While Gacy is a pretty poor role model for any self-respecting deviant, he
is the current mass-murder record holder and hence earns the respect of the
pure-mided death cultists who despise any hint of insanity or cultism. Manson
and Gein on the other hand were more flamboyant and colourful characters and
have enjoyed popularity on a wider scale, inspiring movies and songs and even
bleeding a little bit into pop culture. Gilles de Rais, though, remains almost
unknown to the population, with their fast-food slaughters and shopping-centre
massacres while in history-concious France, he is known to every schoolboy.
Other mass killers have made the jump from police reports into pop ledgend.
Jim Jones was the ultimate cult leader and fake Mohammed. Charles Starkweather
THE NECCESITY OF DEVIANCE, By Jack Stevenson PAGE 5
was the 1950's own white-trash James Dean/Rebel without a cause, and Lizzi
Borden slaughtered her parents - What red-blooded Teenager hasn't thought
about it? Today there are endless Hillside Stranglers, Highway killers,
Nightstalkers, mad Slashers, berserk snipers holed up in schoolhouses, and
walking time bombs exploding in post offices and fast-food restaurants.
And so, much to the horror of their parents, our young people find heroes
aplenty in today's ~world~. Or perhaps I should say anti-heros. To today's
youth, getting stabbed to death or getting blown apart in an explosion dosn't
seem much worse than dying of boredom, and certainly it's quicker, you might
even get on TV.
Modern society seems a faceless, homogenized, sterile place... predictable,
circumcised, pre-conditioned. The impulsive, the violent, the anti-social is
admired and at times emulated. The deviant is our new hero.
NASA SPACELINK BACKGROUND PAGE 1
NASA Spacelink runs on a Data General ECLIPSE MV-7800 minicomputer located at
the George C. Marshall Space Flight Center in Huntsville, Alabama.
NASA Spacelink software was developed and donated to NASA by the Data
General Corporation of Westboro, Massachusetts. The system has a main
memory of 14 megabytes (14 million characters), disk storage space for 708
megabytes, and can communicate with eight callers simultaneously at 300,
1200, or 2400 baud. NASA Spacelink is a dynamic system that will change and
expand daily. It was made available to the public in February, 1988.
Initial funding for NASA Spacelink was provided by the Educational Affairs
Division at NASA Headquarters.The NASA Spacelink data base is maintained
by the Public Services and Education Branch of the Marshall Space Flight
Center Public Affairs Office. Operational support is provided by the
Information Systems Office at the Marshall Center. Information on NASA
scientific projects and educational programs is provided to NASA Spacelink
by education specialists at NASA Headquarters and the NASA field centers.
While NASA understands that people from a wide variety of backgrounds will
use NASA Spacelink, the system is specifically designed for teachers. The
data base is arranged to provide easy access to current and historical
information on NASA aeronautics and space research. Also included are
suggested classroom activities that incorporate information on NASA
projects to teach a number of scientific principles. Unlike bulletin board
systems, NASA Spacelink does not provide for interaction between callers.
However it does allow teachers and other callers to leave questions and
comments for NASA which may be answered by regular mail.
NASA SPACELINK BACKGROUND PAGE 2
HOW TO USE NASA SPACELINK:
The communications parameters for accessing NASA Spacelink are:
300, 1200, or 2400 baud
8 data bits
1 stop bit
No parity bits
The telephone number for NASA Spacelink is USA 205-895-0028.
To use NASA Spacelink, type the number of the menu item most likely to
contain information of interest, and hit your computer's return, carriage
return (CR), new line, or enter key. You will find one or more sub-menus
under each item in the main menu. Continue choosing menu items until the
desired information appears.
For example, if you are a sixth grade teacher and you want to plan a lesson
around food for astronauts, choose item 9 from the Main Menu (Materials for
Classroom Use). From the next menu choose item 2 (Living in Space
Activities, Grades 1-6). From the next menu choose item 2 (Food Lesson
Plans). Your final menu choice will be item 9 (Grade 6), which will
provide suggested activities for sixth grade students.
Every Spacelink menu offers the options of returning to the previous menu
(item 0) or returning to the Main Menu (item 1).
When you first logged on to NASA Spacelink, you indicated the number of
lines your computer monitor will display at one time. NASA Spacelink will
NASA SPACELINK BACKGROUND PAGE 3
pause accordingly to allow time to read information that has appeared on
screen. You may press RETURN whenever you are ready for NASA Spacelink to
If you wish to override the pause feature to allow continuous scrolling,
type the letter ~C~ (for Continuous) when text begins to appear. You must
type the letter ~C~ every time you want text to scroll continuously. This
feature will be helpful when you are not reading text, but are saving it to
If you wish to stop viewing text while it is scrolling, you may type the
letter ~S~ (for STOP) and the previous menu will reappear.
If you want text to pause on demand, type the letter ~S~ while depressing
your computer's ~Control~ key. To resume scrolling, type the letter ~Q~
while depressing your computer's ~Control~ key.
If you want to erase a typing mistake, depress your computer's ~Control~
key and type the letter ~H~ as many times as necessary to remove the error.
(The ~DELETE~ key or the left arrow key on many computers will generate
Ctrl/H.) Please note that your mistake will not disappear from the screen.
Instead, an underscore character (_) will appear for each character you
delete. Example: If you type ~Appple,~ you should enter Ctrl/H three
times to erase the last three letters of the word and then you should type
~le~ again. The corrected word will appear as ~Appple___le~ on your screen,
but it will appear as ~Apple~ in NASA Spacelink's memory.
NASA SPACELINK BACKGROUND PAGE 4
In brief, here are the keys you can use to control operation of NASA
RETURN Causes text that has paused to resume scrolling
C Causes text to scroll continuously to end
S Causes text to stop scrolling and returns
user to previous menu
Ctrl/S Causes text to pause
Ctrl/Q Causes text to resume scrolling after being
stopped by Ctrl/S
Ctrl/H Deletes typing mistakes (Your computer's Delete
key or left arrow key may generate Ctrl/H.)
10 THINGS TO DO WITH YOUR AMIGA.... Page 1
10 Things to do with your Amiga!!
By Count Zero
1. Paint it luminous,psychadellic pink,yellow and green.This prevents you
from losing your Amiga in the dark during those ~up to 3 AM in the morning~
Also comes in especially usefull when your bedroom is more like a gargbage
dump because of hundreds of used jiffy bags,with sellotaped stamps and big
red marks to the effect of ~if you dont stop this we`ll write you a nasty
letter!~ put there by that nice man at the Post Office.
2. Alternatively you can paint it mat black,this is very good camouflage for
when it is lying in the garden in the early hours of saturday morning,becoz
you`ve just thrown it out the window,as a man from FAST is knocking at your
front door,and your Mum has told him to come straight in.The only thing you
have to worry about now is what to do with those few thousand luminous green
disks you got cheap from Taiwan.
3.Melt it down on the gas stove and sell it to the Tate Gallery for huge am-
ounts of cash,and buy yourself a Cray III instead.
4.Pour a pint of particulary strong Export Lager all over it,whilst still
plugged in,switched on,and try to type ~Jackdaws love my big quartz sphinx~,
and to make it really funny drink several pints of afore mentioned lager bef-
10 THINGS TO DO WITH YOUR AMIGA.... Page 2
5.Use it to bash your non-Amiga owning friends around the head,next time they
~come to see you~ but what they really mean is ~come to play on your computer
for the next 3 hours while you feed us food and drink,and you can sit there
extremly bored becoz we insist on playing Pacmania~
6.Take it apart with a sledge hammer just to see how many of those funny
black thing are inside it,then wonder if this invalidates the warranty,and
how much will it cost to have it repaired.
7.Blow it and your DF1 up,by using wrongly connected Cyclone copier leads.
8.Seek out strange new Guru messages by dunking your disks into hot cups of
coffee then trying to boot them up.
9.Decide that you just can`t take the Amiga`s amazing GFX and cool sound,so
buy an inferior machine with less colours and worse sound,called an Atari ST.
10.Read this really intresting,informative,amusing article the best Amiga
disk magazine,written by this dude called COUNT ZERO, and then
decide to take out a life time subscription,and send the author lots of money!
More USA Toll Fruad Devices In Detail. Page 1
THIS ETF DEVICE IS SO-NAMED BECAUSE OF THE COLOR OF THE FIRST ONE FOUND. IT
VARIES IN SIZE AND USUALLY HAS ONE OR TWO SWITCHES OR BUTTONS.
ATTACHED TO THE TELEPHONE LINE OF A CALLED PARTY, THE BLACK BOX PROVIDES
TOLL-FREE CALLING *TO* THAT PARTY'S LINE. A BLACK BOX USER INFORMS OTHER
PERSONS BEFOREHAND THAT THEY WILL NOT BE CHARGED FOR ANY CALL PLACED TO HIM.
THE USER THEN OPERATES THE DEVICE CAUSING A ~NON-CHARGE~ CONDITION (~NO
ANSWER~ OR ~DISCONNECT~) TO BE RECORDED ON THE TELPHONE COMPANYS BILLING EQUIP
MENT. A BLACK BOX IS RELATIVELY SIMPLE TO CONSTRUCT AND IS MUCH LESS SOPHISTI-
CATED THAN A BLUE BOX.
THIS DEVICE IS SO-NAMED FOR THE CONTAINER IN WHICH THE FIRST ONE WAS
FOUND. ITS DESIGN MAY BE CRUDE OR VERY SOPHISTICATED. ITS SIZE VARIES; ONE WAS
FOUND THE SIZE OF A HALF-DOLLAR.
A CHEESE BOX IS USED MOST OFTEN BY BOOKMAKERS OR BETTERS TO PLACE WAGERS
WITHOUT DETECTION FROM A REMOTE LOCATION. THE DEVICE INTER-CONNECTS 2
PHONE LINES, EACH HAVING DIFFERENT #'S BUT EACH TERMINATING AT THE SAME
LOCATION. IN EFFECT, THERE ARE 2 PHONES AT THE SAME LOCATION WHICH ARE LINKED
TOGETHER THROUGH A CHEESE BOX. IT IS USUALLY FOUNDN IN AN UNOCCUPIED
APARTMENT CONNECTED TO A PHONE JACK OR CONNECTING BLOCK. THE BOOKMAKER, AT
More USA Toll Fruad Devices In Detail. Page 2
SOME REMOTE LOCATION, DIALS ONE OF THE NUMBERS AND STAYS ON THE LINE. VARIOUS
BETTORS DIAL THE OTHER NUMBER BUT ARE AUTOMATICALLY CONNECTED WITH THE BOOK
MAKER BY MEANS OF THE CHEESE BOX INTER CONNECTION. IF, IN ADDITION TO A CHEESE
BOX, A BLACK BOX IS INCLUDED IN THE ARRANGEMENT, THE COMBINED EQUIPMENT
WOULD PERMIT TOLL-FREE CALLING ON EITHER LINE TO THE OTHER LINE. IF A
POLICE RAID WERE CONDUCTED AT THE TERMINATING POINT OF THE CONVERSATIONS
-THE LOCATION OF THE CHEESE BOX- THERE WOULD BE NO EVIDENCE OF GAMBLING
ACTIVITY. THIS DEVICE IS SOMETIMES DIFFICULT TO IDENTIFY. LAW ENFORCEMENT
OFFICIALS HAVE BEEN ADVISED THAT WHEN UNUSUAL DEVICES ARE FOUND ASSOCIATED
WITH TELEPHONE CONNECTIONS THE PHONE COMPANY SECURITY REPRESENTITIVES SHOULD
BE CONTACTED TO ASSIST IN INDENTIFICATION.
(THIS PROBABLY WOULD BE GOOD FOR A BBS, ESPECIALLY WITH THE BLACK BOX SET UP.
AND IF YOU EVER DECIDED TO TAKE THE BOARD DOWN, YOU WOULDN'T HAVE TO CHANGE
YOUR PHONE #. IT ALSO MAKES IT SO YOU YOURSELF CANNOT BE TRACED. I AM NOT
SURE ABOUT CALLING OUT FROM ONE THOUGH)
THIS DEVICE IT COUPLED ACOUSTICALLY TO THE HANDSET TRANSMITTER OF A SINGLE-
SLOT COIN TELEPHONE. THE DEVICE EMITS SIGNALS IDENTICAL TO THOSE TONES
EMITTED WHEN COINS ARE DEPOSITED. THUS, LOCAL OR TOLL CALLS MAY BE PLACED
WITHOUT THE ACTUAL DEPOSIT OF COINS.
- Some Info Was Taken From An Official BELL Report On Fraud Devices, And Any
Info Here Is Meant Only For Informational/Interest Purposes Only...
Sprites can be used to implement many interesting effects,including
the starfield which you can see now (which was coded by me!, Count
Zero ).However they do present some problems,one of which is to display
sprites below $FF (line 256) on the screen,this is easily solved by
modifying the second control word of the sprite.
The format of the control words of a sprite is $xxyy,$zz00, where xx
is the vertical start position,and zz is the vertical stop position,
whilst yy is the horizontal position.For example, $A050,$A100 displays
a sprite at vertical line 100,and 1 line down ($A1-$A0),with Horizontal
position of $50.However this is pretty straight forward stuff,which you
get by looking at the Systems Guide,or the Hardware Reference Manual
To display below $FF,simply put a $6 into the control word,for example
$1050,$1106,display a sprite at line 272,which is 1 line high,easy huh?
Now on to Spurious Sprite Video Data,(SSVD),these are those annoying
lines that appear down the screen occasionally,it is a simple matter to
prevent these,some coders load the sprite data registers with zero,but
the methods I use is even simpler,before swithing of sprite DMA,wait for
a position on screen,for example 300 (on PAL machines),where the CLI
sprite pointer is not being displayed.The SSVD is because when switching
of sprite DMA any sprite that is being displayed at the point on the
screen where you switch it off,will continue being displayed,resulting
in a line down the screen.
CLASSIFIED ADVERTS! (They're Free!!!!!!!!)
| Contact Count Zero to swap cource code,help needed on blitter line draw etc|
| also help given. |
| Count Zero,40 Vine Road,Backford Cross,South Wirral,L66 2XX. |
| Greets To : Zigor(The Culprits),Vector(Armada),Kreator(Anarchy) |
| Parrell-Axe,Lamo Barry (Crack UK). |
|Bored? Wasting Hours Upon End Sitting In Front Of Your Amiga For No Reason??|
|Have Something Vaugely Interesting To Say? Yes? Well, Why Not Spend Your |
|Time Writing Articles & Classified Ads For This Mag???? Write Them To The |
|Addresses Shown On ~About The Mag~...... |
These Adverts Are Free! You Can Advertise ANYTHING Here At All (Human Lamp-
shades etc...) Just Send Them To The Editor/Co-Editor.....