k-14-(6)-01 OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=> OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=> OoO=o=oOO=o=O=> : -`- -`- OoO=o=oOO=o=O=> ; _|_--oOO--(_)--OOo--_|_ OoO=o=oOO=o=O=OoO=o=oOO=o=O=> | ¡ K-1ine Zine ! | OoO=o=oOO=o=O=> ! issue 14, volume 6 ¡ OoO=o=oOO=o=O=OoO=o=oOO=o=O=> ---------O^O---- OoO=o=oOO=o=O=OoO=o=oOO=o=O=> ;. |__|__| OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=> || || OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=> ooO Ooo OoO=o=oOO=o=O= OoO=o=oOO=o=O=OoO=o=oOO=o=O=> OoO=o=oOO=o=O=OoO=o=oOO=o=O=LoveO=o=oOO=o=O=OoO=o=> ;`-.> April 2001 <=o=O=o=O=o=O 'The Ultraviolet Catastrophe' "If you think this Prada-sporting, Armani-clad, silicone-augmented, Anime-femme fatale thing is gonna make me lose my head and start singing 'Hackers of the world unite,' then apparently you're not experiencing the same acid shortage as the rest of us." - Swordfish _____________________________________________________________________________ » .- Words from the Editor -. « | *: [-] Introduction .......................................... The Clone :* *: (-) Contact Information ................................... The Clone :* *: (-) Affiliate Web-Links ................................... Nettwerked :* *: (-) News: FTAA Protest - Edmonton ......................... The Clone :* *: (-) Advertisment .......................................... HackerSalvage:* *: (-) Advertisment .......................................... FlipperSmack :* *: (-) Link of the Month ..................................... RT :* *: (-) Miscellaneous Links ................................... H410g3n :* ____________________________________________________________________________ » .- Documents -. « | *: (x) 'K-L1NE COVERUP SCANDAL' .............................. Wizbone :* *: (x) 'Freedom Mythology' ................................... m4chine :* *: (x) 'PROGRAMMABLE BLACK HOLE COMPUTERS' ................... PRL :* *: (x) 'The Robot With the Mind of an Eel' ................... Guy Gugliotta:* *: (x) 'No One' .............................................. soap :* *: (x) 'Mail Server Denial of Service Exploit' ............... Ace905 :* *: (x) 'Quantum Reality' ..................................... Chadder :* *: (x) 'Computing, One Atom at a Time' ....................... George Johnson* _____________________________________________________________________________ » .- Conclusion -. « | *: [-] Credits ............................................... The Clone :* *: [-] Shouts ................................................ The Clone :* _____________________________________________________________________________ -- Introduction K-1ine issue #14, April 2001; Welcome to the newest collective compilation of 'hacking', 'phreaking', '(political) ranting', 'news bytes', and 'advertisments' pieced together from within some tiny dark stuffy room in Edmonton Alberta Canada. We have some great articles for you this month, boys and girls. Can you feeell the K-1ine e-zine love energy bond growing? All these new writers have come out of the woodwork to produce some extraordinary articles for my zine and for that I must thank the contributors. As always, send me your articles and enjoy this months issue! [Connection to l-swift.dnd.ca closed by foreign host]ù 6¹‰†ËÐ%+ÑEoÇ¿?~ë?ÿ?^½Ï}þ¼Ù ç¸^Ü^Ü^\_ÜÞËÚÛÓÓ{ÖÒfà/sáð®®ó¯'=‹xÊUUUEºÕŠWMtÕŠWMtÕŠW]UUUUUUUÓUŠWMtÕŠW½Æ6"CÚ!©WÓ öÝ2öYÙn;˜ § ,6³`Ésv0áO# `]ƒW1ã°×t—PpC0Çh— €CžŽ<Ž s^ëT5áUŠWMtÕŠWMtÕ:Ì8RM 4XëŒD5ÙÊEºÕ]•—Û'•®ÓU¢TyéUŠWMtU`i]':!+!ž OK ATH .eoi p.s. I was too lazy to write a new intro for this month so I used the same one as last. I'm waiting for that exposed_2.txt file, wizbone! :P _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ my lord i'm bored. i have this urge to go and throw timbits at people - Contact Information; =-=-=-=-=-=-==-=-=-= Comments/Questions/Submissions: theclone@hackcanada.com On IRC: irc.h410g3n.com, #altphreakingfaq, #cpu (key required), #hackcanada, #k-1ine Shoot me an ICQ message: (UIN) 79198218 Check out my site: (Nettwerked) http://www.nettwerked.net --> Affiliate Web-Links: =-=-=-=-=-=-==-=-=-= B0G http://www.b0g.org Damage Incorporated http://www.freeyellow.com/members6/damage-inc/index.html Fuck Rogers AT&T http://www.fuckrogersatt.com * Grass Hopper Unit http://www.ghu.ca Hack Canada http://www.hackcanada.com IAMHAPPYBLUE http://www.iamhappyblue.com PyroFreak http://www.multimania.com/pyrozine/index.html TRAPFONE http://www.trapfone.com * * = featured sites of Nettwerked Incorporated --> News: FTAA Protest - Edmonton ----------------------------- (taken from: http://disc.server.com/discussion.cgi?id=150061&article=238) I went to it. The protest marched on from Whyte Ave all the way across the bridge to the other side. We all had a seat on the grass right across from the ledge'. About 200 or so people showed up, we had speakers from various groups in our community, music, and a play. All in all, it was pretty damn successful. Never have I felt such unity from fellow Edmontonians. Well done! Oh, and I spoke with one of the people involved in the P.A.N organization. She was taking down names and number of people who want to be contacted about further protests. I gave her my name and #, as well I explained that Hack Canada has linked to their site, to help bring awareness to the march. I'll of course keep you all posted on further protests in the future. Regards, Clone P O W E R T O T H E P E O P L E useful references: Peoples Action Network Edmonton http://www.pan-edmonton.f2s.com/ Independent Media Center http://www.indymedia.org/ =`=`=`=``=`=`=`=``=`=`=`=``=`=`=`=``=`=`=`=``=`=`=`=``=`=`=`=``=`=`=`=`` -- Advertisment -- +++ WWW.HACKERSALVAGE.COM +++ HackerSalvage.com is a non-profit website dedicated to keeping old hardware in circulation. Many of us have piles of it sitting around but can't just toss it out. Here you can post computer items for sale or post a want ad for items you are looking for. A perfect place to get rid of perfectly good junk.... and get some new stuff to rebuild the pile. +++ +++ - Flippersmack AD - "Flippersmack is a culturemag for a penguin generation. What does this mean? Articles and reviews from your favorite writers. The low-down on what's fresh in tech, comics, movies, and music. Wrapped in a style all its own." "We will strive to release Flippersmack every week; a taste of insanity to inspire, inform, and entertain. From the creators of System Failure and Avalanche, there's a new zine out on the net: FLIPPERSMACK!" You can read the first five issues at: http://www.nettwerked.net/flippersmack001.txt http://www.nettwerked.net/flippersmack002.txt http://www.nettwerked.net/flippersmack003.txt http://www.nettwerked.net/flippersmack004.txt http://www.nettwerked.net/flippersmack005.txt More issue update info will be posted on the Nettwerked Discussion Board 2.0 http://disc.server.com/Indices/150061.html FLIPPERSMACK WEB-SITE: [WWW.FLIPPERSMACK.COM] COMING SOON! - theclone: if you really loved me, you wouldn't of backed down when i wanted to put my pee-pee in your mangina. - --=[ LINK OF THE MONTH ]=-- From now on, I will be posting one really great "link of the month" on future issues of K-1ine magazine. The link can be anything in the technology industry, music scene, rave scene, punk scene, or even a good article you read on a news site. I'll be taking submissions via e-mail, ICQ, or IRC right away; so get your links in and maybe you'll see it in the next issue of K-1ine! For the month of April, the link of the month is: The original trailer for the movie 'TRON'. http://www.fileplanet.com/index.asp?search=tron&file=58740 [submitted by: RT] --- Miscellaneous Links (by: H410g3n; www.h410g3n.com, h410g3n@hackcanada.com) [04.13.01] "Remotely hard crash Xerox connected printers" http://www.hackcanada.com/ice3/misc/zapxerox_1_0_tar.gz [04.14.01] "Simple tool for 'dissolving' Windows NT/2000 services" http://www.hackcanada.com/ice3/misc/dissolve_1_0_tar.gz --- does anyone have any experence with Novell web servers? gn0 what's a web server? is it like warez? oh warez... jeah, i know about that stuff just enter keyword "warez" on AOL :D - news: K-L1NE COVERUP SCANDAL wizbone - 23/03/01 The WNN recieved reports earlier today which point to a scandalous coverup by The Clone, editor in chief of k-l1ne magazine, a 'zine' which covers articles about computer hacking, phone fraud, and security in many areas. The Clone aka Rebecca Fitzgerald is a member of the hacker organization named "HackCanada". The Clone also maintains several security-related websites such as nettwerked.net, and fonetrap.com. Up until the time this report was released, The Clone has always managed to keep himself respectable with a clean record, providing good information to all. Today it was uncovered that in the latest issue of k-l1ne 13, The Clone decided to use the exact ASCII art at the top of the articles which he used in the previous issue #12. Upon further investigation, WNN's own field investigator Wizbone uncovered some startling discoveries. The Clone had neglected to change the "12" to a "13", which wouldn't be so bad if not for the fact that upon notifying The Clone of his error, he immediately changed the ascii to reflect the intended number. "You can't just go changing released documents like this," said chairman of WNN, wizbone, "people have a right to know when a mistake has been made." The Clone declined comment to comment on the issue, though when confronted with the issue, he called WNN news correspondent Wizbone a "funny head" and proceeded to make funny ASCII emoticons. Before communication ended, he did say "happy sad". This leaves many asking, is Clone going off the deep end? At first glance, one would say undoubtedly, "no." However, upon glancing further, and squinting one's eyes, one might change their mind. It seems this isn't the first information coverup The Clone has faced. Back around fall 2000, The Clone posted a text file on his website which claimed to contain the frequencies needed for a device called a "Green Box". This device is alleged to allow one to recieve money from a payphone upon playing the tones into it. As it turns out, the tones contained within the file were no more than a simple tune, played by many popular answering machines while they advance their tapes to record a message. Upon discovering this through the help of HackCanada webmaster cyb0rg/asm, he promptly removed the file and to this day denies all previous existence of it. cyb0rg/asm was not available for comment though his secretary staff released a statement which noted that cyb0rg/asm was not involved with any part of the information coverup, he simply pointed out The Clone's error. So it seems The Clone has had a rather shady past as far as coverups and the hiding of information goes. This reporter would guess there may be other skeletons Clone keeps locked away from the world's eyes. WNN intends, as always, to expose the truth and will continue to do so. Rebecca Fitzgerald, the world is watching you a little closer now, the truth will come out. -- oOo. freedom mythology .oOo Dive in the water and feel the cold rush flow - your skin shivers. "Why are we still here?", she asked. Mellow inner tears inside me. "Can't decide my dream in life, cause an old spirit confused my paths... and they held me 'till I fainted." The streets are dark, field nineteen acre gleam, and some distortion... (like a television set in the middle of a storm) probably the mind playing in leary's liquid lust. You drift away, you drift away, and say: "can't you see your faith, or did the freedom destroyers take that too away from you?" - m4chine [03/27/01] -- PROGRAMMABLE BLACK HOLE COMPUTERS. One usually thinks of a black hole as an omnivorous object swallowing energy and spitting some of it back in the form of Hawking evaporation radiation, consisting of particles created in pairs out of the vacuum near the edge of the black hole. In principle, a tiny black hole can be formed in a way that encodes instructions for performing calculations. Correspondingly, the answers could be read out from the escaping Hawking radiation. Why use a black hole at all? Because of the presumed tremendous density of information and potential processing speed implicit in the extreme black hole environment. Seth Lloyd of MIT has previously addressed himself to calculating the conceivable limits on the computing power of such a black hole computer (Nature, 31 August 2000) and arrives at a maximum processing speed of about 10^51 operations/sec for a 1-kg black hole. Now Jack Ng of the University of North Carolina yjng@physics.unc.edu, 919-962-7208) extends this study by asking whether the very foaminess of spacetime, thought to arise at the level of 10^-35 m, provides an alternative way to limit theoretical computation. Ng not only finds that it does but that the foaminess of spacetime leads to an uncertainty in timekeeping (the more accurate the clock, the shorter its lifetime) which in turn leads to a bound on information processing (speed and memory simultaneously) analogous to the Heisenberg bound on simultaneous measurement of momentum and position. These limits are so generous that they normally pose little problem for ordinary physical measurements, but in the case of black hole computer the limits would apply immediately. Ng adds, apropos of detecting gravity waves with LIGO and other interferometric devices, that in addition to accounting for various forms of noise, such as seismic disturbances or thermal noise in the detectors, the faint gurgle of spacetime foam will eventually have to be included as an additional and unavoidable source of noise in the measurement of very short displacements (the movement of mirrors owing to the flexings of spacetime brought about by passing gravity waves). If Ng is right, the noise sensitivity achievable by the prospective advanced phase of LIGO will only need a further hundredfold enhancement in order to detect the quantum foam, which is to say the very fabric of spacetime. Thus the Planck scale, so far only a hypothetical extreme regime, might eventually become a realm that can be approached and measured. (Physical Review Letters, 2 April 2001.) -- if I tell you you have a nice bum bum will it help your self-esteem or will you just seal your back-orifice with super-glue and pop can lids like the others? no. yai - The Robot With the Mind of an Eel By Guy Gugliotta Washington Post Staff Writer Tuesday, April 17, 2001; Page A01 CHICAGO -- The cyborg aims for the light and wheels forward. Another light flashes and the cyborg turns. Again and again, like a bull in a ring, the cyborg charges, sometimes veering right, sometimes left, sometimes moving straight ahead, always looking for the light. The cyborg is no RoboCop, but it is a revolutionary experiment in combining a mechanical device with living tissue. The robot is controlled by an immature lamprey eel brain that was removed, kept alive in a special solution and attached to the hockey-puck-sized robot by wires so it can receive signals from the device's electronic eyes and send commands to move the machine's wheels. "Until the recent past, people were using biological nervous systems to inspire technology," said physiologist Sandro Mussa-Ivaldi of Northwestern University's Rehabilitation Institute of Chicago. "Now we've gone one step beyond, to tap into the nervous system itself." Mussa-Ivaldi's lamprey larvae are one of a large number of creatures whose supple sensory resources are being put to work in a new generation of animal/machine hybrids. Mussa-Ivaldi is testing the lamprey brain's ability to control a robot, but the long-term possibilities could be much more spectacular: learning more about how brains work so electronic microprocessors can be developed to help compensate for damage from strokes and other types of nerve trauma. A wide variety of other similar experiments are unfolding in labs across the country, where rapid advances in electronics and other fields have enabled scientists to integrate animals and microelectronics. These experiments envision a range of applications -- using bacteria attached to computer chips to map pollutants, insects as part of sensors to detect land mines, chemical weapons and narcotics, and rodent brains to help identify new medicines. "There's a couple of things making this happen," said electrical engineer Michael Simpson of the Oak Ridge National Laboratory. "Even before the mapping of the human genome was completed, there was an explosion in our understanding of genomics and neural pathways in other animals. "At the same time, [microelectronic] devices keep getting smaller and denser," Simpson added. "Single chips are beginning to get complex enough so that they can begin to work with biological systems." In Tennessee, Simpson and colleague Gary Sayler have genetically engineered bacteria to glow in the presence of chemical agents and affixed them to microchips. The Rockville, Md.-based company Dynamac is licensing their "critters on a chip" for applications that could include highlighting the boundaries of toxic waste plumes, monitoring air quality or analyzing body fluids to test for signs of disease. In Iowa, entomologist Tom Baker has built a device for finding land mines using tiny moth antennae that emit signals to microprocessors, which transform them into different tones. The signals drop in pitch when the antennae encounter the odor of high explosives used in mines or unexploded ordnance. In Los Angeles, neuroscientist Michel Baudry is using brain slices from mice and rabbits to develop a system for warning soldiers about the presence of chemical or biological weapons. The system creates an electronic blueprint for a normal environment, so that when the balance is upset, an alarm will tell soldiers to don gas masks. Formidable barriers remain before scientists will fully benefit from critter science. Animals must be trained and maintained. Shelf life of natural tissue is a problem. And so is size. University of Montana entomologist Jerry Bromenshenk has trained bees to find explosives, and the Agricultural Research Service's Joe Lewis has done the same in Georgia with parasitic wasps, but there is not yet a practical method for tracking such tiny sentinels when they are flying free. And at Iowa State University in Ames, Baker can read the reactions of his moth antennae on an oscilloscope, but he doesn't yet have the electronics that a soldier needs to discriminate between the signal he wants and other odor sources. Using animals to serve humankind is as old as training falcons to hunt and dogs to fetch. The impulse is always to take advantage of animals' superior qualities, and if scientists couldn't use the animals themselves, they have tried -- and often failed -- to make devices that mimic their expertise. Harold Hawkins, head of the Office of Naval Research's bioacoustics program, notes that a dolphin can map the sea bottom in its mind's eye with "one, or two, or three" pings from its echo-location system, while the world's fanciest side-scan sonar needs dozens of slow passes to build the same picture. Other animals are just as sophisticated, but science is catching up: "We are getting the engineering tools that allow us to plug into living systems," said Alan Rudolph of the federal government's Defense Advanced Research Projects Agency, which has funded a number of critter projects. "We are asking the question, 'Can we make machines with living components and make them work?' " Mussa-Ivaldi's experiments in "biology as technology" brought him and colleague Simon Alford to the lamprey because it is a well-studied creature with very large nerve cells and a brain stem that can survive for several days in an oxygenated and refrigerated salt solution. Using a microscope, Mussa-Ivaldi or his colleagues extract brain stems from the squiggly, pencil-thin, 6-inch-long lamprey larvae under anesthetic. They put the half-inch-long brain stem on a stand, connect electrodes to both sides of it, and run wires to each side of the robot, an off-the-shelf miniature from Switzerland called a Khepera. The robot is placed in the center of a circular arena about 3 1/2 feet in diameter -- like a tiny bull ring. As lights mounted at 45-degree intervals flash on and off around the pit's rim, the robot's light sensors send signals to microprocessors that transform them into impulses the lamprey brain can interpret. The brain sends signals back through another set of microprocessors, which produce the electric impulses that drive the wheels. When the lights don't flash, the robot doesn't move. The lamprey ordinarily uses this mechanism for balance -- to keep itself centered and upright in the water. As a result, the animal's brain will seek equilibrium, and, indeed, in most cases the robot will turn to the light and run toward it. But if assistant Karen Fleming masks one of the eyes, the robot will first travel in circles, since only one side of the brain receives signals -- "but we hope it will compensate," and straighten out. It usually does, after a few practice runs. The effect is eerie, for it is clear that the brain senses the light. In darkness, an oscilloscope picture is stationary, but when a light flashes, the display spikes dramatically and the robot's wheels begin to turn. "As you see it here," said Mussa-Ivaldi, watching the robot scoot across the pit, "the lamprey brain is the only thing that makes it move." While the team appears to have established that the brain can learn, Mussa-Ivaldi said, it has not yet been able to keep brain function stable long enough to test its memory. Mussa-Ivaldi is optimistic that whatever he learns will eventually help researchers develop high-tech prostheses for stroke victims and others who suffer nerve damage. Training unusual animals to serve human ends has proved surprisingly easy, in part because of the extensive research that scientists have done simply to find out why they do what they do. In Tifton, Ga., the Department of Agriculture's Lewis and several colleagues had studied parasitic wasps for 30 years as a way to kill caterpillars in farm crops before Rudolph's DARPA funded him to see if he could transform his charges into sensors. Lewis knew the wasp responded to smells it identified with food and with reproduction. By feeding the wasps sugar water as he exposed them to the odor of di-nitro toluene, an explosive akin to dynamite, he was able to teach the insects to seek di-nitro toluene in the field. In Montana, Bromenshenk has done the same thing with bees, also a DARPA project. But having trained his "miniature bloodhounds," Bromenshenk had to be able to track them electronically. Radio transmitters were too heavy, and although scientists had had some success gluing microchips on the bees, the process took too long. Bromenshenk is waiting for someone to produce a "spray-on" chip. In Georgia, Lewis has patented a hand-held "biosensor," and puts his wasps -- much smaller than the bees -- inside. When the insects smell an odor, they duck their heads to receive the reward, tripping an electric eye. Lewis said such a device could work well searching for explosives at airports, cocaine at the border, or even traces of disease in odors from the human body. Baker's experiment with moth antennae, also funded by DARPA, may offer a solution to the size dilemma, for it uses only tissue from the insect, rather than the whole animal, and mounts the detector in a vehicle. Moths use their antennae to detect different odors. Baker attaches electrodes to the base of the antennae to try to develop an olfactory "signature" for any odor he seeks, including high explosives. The eventual goal is to put the antennae in a mobile cyborg that can both sense a land mine and flag the target. The system now works with a remote-controlled vehicle, Baker said, but a trained researcher has to walk beside it to listen for the tonal patterns that signal "hits," and find their source by assessing the wind direction. In the insect experiments, researchers are trying to pick one odor from a barrage of competing signals, but in Los Angeles, the University of Southern California's Baudry has reversed the approach by modeling hundreds of thousands of signals that describe a normal environment. When something doesn't fit -- a biological agent or a toxic pesticide -- a warning alarm sounds. Baudry does this using slices from the hippocampus of a rabbit or mouse, a section of the brain that forms new, long-term memory -- in humans, for example, it links a face with a name. The sophistication of the mammalian brain, coupled with modern computer capacity, has given this research almost unlimited potential, for once scientists assemble a library of responses, they can screen for practically anything, including testing thousands of chemicals to see if one might produce a novel medicine. One barrier to the practical exploitation of critter devices is the need to increase their life span. Baudry said his team has "almost, but not quite," developed a way to suspend the slice in a gelatinized nutrient that can be activated with heat -- extending the shelf life to several weeks or months. In simpler organisms, this hurdle can be lower. Oak Ridge's Simpson and Sayler, a University of Tennessee microbiologist, were able to freeze-dry and encapsulate bacteria so that they would activate when water was added to the chip. The Simpson-Sayler "critter on a chip," being marketed by Dynamac as an environmental biosensor, grew out of Sayler's ability to transplant a luminescent gene from a marine bacterium into another bacterium that degrades pollutants. When the second bacterium ate the pollutant, it glowed, demonstrating that it was doing its job. If the researchers pasted a bunch of bacteria on a chip, the microcircuitry could detect the luminescence and send a signal to a remote display. By salting a site with bacteria, scientists might map the extent of a toxic plume. Installed sensors could monitor pollutants at water purification plants, check air quality on spacecraft or warn of chemical or biological warfare attacks. "We're turning the bacteria into microelectronic components to detect different substances," said Sayler. "You can engineer the organisms to eat almost anything." -- 'No One' I've never felt this way before ... you're my first I've never cried this much before ... my body's shaking I've never thought you'd be so perfect ... stay forever I never throught i'd be so happy ... you make me feel ecstacy Never thought you'd be my fantasy Never thought you'd be so far away All i want is to be with you I'd sell my soul to be with you -soap [04/17/01] -- a girl got me to do that once to myself.....i'd say it was 50% worth it..... a girl got you to shave your pubic hair off? yup...she didn't like the hair... i didn't even get to fuck her though :( damn did get a semi-decent blow job though cool - Mail Server Denial of Service Exploit by: Ace905 (Also available in HTML format: http://www.myhometechie.com/hackz/dos/smtp-exploit.html) It seems strange to me to have come up with this idea on my own, having never heard of it before. If anyone has any information on this being an outdated exploit, then please write in. Disclaimer: I am not joking when I say, this is really meant as a proof of concept tool. I have no interest in seeing any email server go down. Please do not use this information to cause damage; just remember it next time you configure your network. I am not responsible for anything you choose to do, whether it works or not. The title of the article pretty much speaks for itself, but here's a write-up: Let me start by saying, in theory this method should crash email servers, in practice however; certain network restrictions and basic security will limit the amount of email any one server receives from this method. It is possible to write an application to direct a slew of auto-responding email servers against each other, but I'm not going to code it. Auto responding email servers are running those servers which reply to your message instantaneously, but it is obvious the message has been generated by a computer. A good example of this would be Microsofts support@microsoft.com server. It is intended to both allow a customer to request technical support, and to quell their worries by giving them an immediate response stating their email was received. The response also directs them to other resources on the internet. Their are a lot of email services such as this, and the number is growing as people realize the majority of peoples concerns or questions regarding their product can be answered with a simple product catalogue or contact information. When you write to these email addresses, you get an automatic reply. After receiving an automatically generated message like this, most people generally delete them and forget about them, and wait for tech support, or the person they were trying to contact to get back to them in person. Not very many people have tried to reply to the message they received. Well guess what! Almost every time you reply to one of these auto-generated messages, you are replying to the same email address. When that happens, you are telling the auto-responder to respond again. So what you say? Imagine if two auto-responders were automatically responding to each other. Or, imagine one auto-responder responding to itself; this would cause an infinite loop of cross-talk, filling bandwidth and server space. Ok so here's the concept: After receiving an email sent as SPAM, a perspective exploiter would reply to the message. If the message responds again immediately - from the same email address, then the exploiter would know it is an auto-responding email server and set to respond to all-incoming mail. If it responds from a different email address, then the message should be replied to again. If eventually it is automatically responding from the same email address, then it is still a valid target. Exploiting the service can be done easily from both a UNIX or Windows environment, making the concept open to a very broad range of malicious computer users. The steps taken to cause a denial of service are outlined below. Two methods are listed below for exploiting this, the first is much more interesting but not guaranteed to work, the second is much easier and causes 2 victims. Method 1 This method at first glance would appear to the network administrator as a glitch in their software. The server would be constantly emailing itself and almost every message would be the same message they originally programmed the server to respond with. Under windows, a malicious cracker would save their auto-generated email as a .TXT file and open it in windows notepad. Messages appear in this format: Return-Path: x_vxxxxx@DOMAIN.com Received: from xxxxx03.mail.yahoo.com ([222.222.222.22]) by tomts9-srv.bellnexxia.net (InterMail vM.4.01.03.00 201-229-121) with SMTP id for ; Tue, 6 Feb 2001 12:52:41 -0500 Message-ID: Received: from [222.222.222.22] by xxxxx03.mail.yahoo.com; Tue, 06 Feb 2001 12:52:40 EST Date: Tue, 6 Feb 2001 12:52:40 -0500 (EST) From: That company their_email@theirdomain.com Subject: Auto Reply To: your_email@YOURdomain.com Cc: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii This is an auto generated message for your_email@YOURdomain.com. Remember SMTP is the program / protocol to send mail and POP is the program / protocol to receive mail. A Program like Outlook Express, or any email program is actually using the SMTP and POP protocols to communicate with a mail server. Notice after "Received:" the email was sent using SMTP or ESMTP. A cracker would then connect to the companies own SMTP server and make it look as if the comany is sending an email message as themselves, to themselves. In actuality this is very to perform. SMTP stands for "Simple Mail Transfer Protocol" and since its inception, it was meant to be used by hand. That is, sending email was never meant to require a program such as outlook express, so this standard protocol can be used and manipulated to send a number of messages in a number of ways. It is also possible to hand-specify the originators email address. A very good TCP/IP connections program is called "NetCat". It is good for both Unix environments and Windows. C:\Netcat\> this is the dos command prompt, where Netcat is installed. C:\Netcat\>nc -v -v -o mylogfile.txt smtp1.victimsdomain.com 25 This line says, "run netcat double verbose so I can see what's happening, make a file of all the information I send and receive called mylogfile.txt and connect to the send-mail server of the victim on port 25. Keep in mind, the send-mail server was listed in the email which would have already been received, other common names for the server are smtp2.victimsdomain.com, (smtpX.victimsdomain.com), mail01.victimsdomain.com , mail.victimsdomain.com. But it's listed in the auto-generated email which has already been analyzed. After connecting to the victims mail server, this dialogue appears smtp1.victimsdomain.com [222.222.222.22] 25 (smtp) open 220 tomts5.bellnexxia.net ESMTP server (InterMail vM.4.01.03.16 201 229-121-116- 20010115) ready Fri, 23 Feb 2001 06:32:47 -0500 >>HELO smtp1.victimsdomain.com (This tells the server an email is being sent as a member of their server) 250 tomts5-srv.bellnexxus.net (want help?) >>HELP 214-This SMTP server is a part of the InterMail E-mail system. For 214-information about InterMail, please see http://www.software.com 214- 214- Supported commands: 214- 214- EHLO HELO MAIL RCPT DATA 214- VRFY RSET NOOP QUIT 214- 214- SMTP Extensions supported through EHLO: 214- 214- EXPN HELP SIZE 214- 214-For more information about a listed topic, use "HELP " 214 Please report mail-related problems to Postmaster at this site. To start the message, >> MAIL FROM: victim@victimsdomain.com 250 Sender Ok (it appears the server finds that mailbox to be ok, note how the sender and receiver are the same) >>RCPT TO: victim@victimsdomain.com 250 Recipient Ok (it appears the server finds that mailbox to be ok too!, writing the message) >>DATA 354 Ok Send data ending with [CTRLF].[CTRLF] .>>any random information here will be sent as a message >>^.^ 250 Message received: 20010224143720.DTGY755.tomts2rv.bellnexxia.net@smtp1.VictimsDomain.com At this point, the auto responder should see a message on the server, and use POP to receive it. It will then read that it is from itself and use SMTP to reply to itself. It will then see there is another message on the server for itself... and continue until a number of things go wrong. It may crash after it fills its own hard drive, it may stop after reaching a limit on the number of messages it sends to any email address, or it may keep sending messages and stop all other Anonymous, Chadder, Jim Bell, email services while it is stuck. Method 2 Using free, and anonymous email services such as a Hotmail account, a cracker would use a search engine such as Google.com and search for "mailing list sign up". Then they would check every web site that comes up to see if they have a sign up for a mailing list. If the sign up is an HTML form (ie: you just put in your email address without running an email program such as Outlook Express), then they would submit their new Hotmail account email address. Checking their own email account regularly, and replying to every email received would quickly narrow the list down to auto-responders, and 1-time responders. Eventually, the cracker would find a slew of email addresses which consistantly reply to them. If this is the case, exploiting the error is as simple as going to the website the emails were from and instead of giving out a hotmail account email address, they would simply type the email address of the first auto-responding server they wished to exploit. In theory, these two servers should keep emailing each other back and forth. Variations on this method are also possible, the cracker could try searching through features of various message boards or online services. A lot of them allow users to create an account with no actual identification, and they have auto-reply functions in some of their server's email addresses too. In scenarious where connecting to the original mail server by hand are complicated, it is possible a cracker could connect to other auto-responders using their smtp server, and send an email as the original server. Special Thanks to: www.HackCanada.com All Your Base (http://www.detonate.net/newsitems/01021601/ayb.swf) The Clone [HackCanada], Sean, Snezan Dave "Apache" Kern. -- children in the back seat can cause accidents, accidents in the back seat can cause children - Quantum Reality What is reality? What is truth? What is real, fake? How can we deem others wrong, and ourselves right? First, what is reality, reality is merely what the most people think. If I'm in a room of blind people, colors are not real. If I am in a room of people that say 2+2 is 5, 2+2 is then, 5. The only way we can convince others, or ourselves, is by asking other people, and seeing what they think. Studies have been done, where a person has been stuck in a room given a simple math problem, and been instructed to complete the problem and share answers with 9 others. The 9 others were told to all give false answers, eventually, the one person with the right answer succumbs to the pressure. What does this tell us? That everything in the entire world is based on our perceptions. Therefore, since many people see/smell/taste/touch/think different things, we have no way to tell whether something is 'real', as our perceptions could be corrupted. Thus, nothing is ever truly real, or truly false. Nothing can be proven to be real, or false, as our data has a chance of being wrong, and a chance of being right. All we can do is see what the majority thinks, and come to the conclusion that whatever the most people say they see or think, is what is most likely to be true, and thus will be considered true. Everyone in the world at one point believed the world was flat. This is of course, no longer the popular belief, and is thus not real. 500 yrs. from now, we too could be mocked for our shortsightedness, at how we believed the center of the earth, whatever the hell current belief is. What I am getting to, is that it is egotistical and naïve, though completely natural, to hold ones beliefs above another's. And thus, every decision, every fact, every, everything, is a mere probability, and could be, entirely untrue, or true. Carrying on with the reference to the sciences in the title, true reality, is as impossible to reach as absolute zero. And the next time you see someone hauled away to the sanitarium, have a chuckle, as there is a chance, no matter how unlikely, that whatever he sees, could be that true reality. chadder. -- yea, like my pree teen punk ass - Computing, One Atom at a Time March 27, 2001 By GEORGE JOHNSON OS ALAMOS, N.M. — The only hint that anything extraordinary is happening inside the brown stucco building at Los Alamos National Laboratory is a small metal sign posted in front: "Warning! Magnetic Field in Use. Remain on Sidewalk." Come much closer and you risk having the magnetic stripes on your credit cards erased. The powerful field is emanating from the supercooled superconducting magnets inside a tanklike machine called a nuclear magnetic resonance spectrometer. The device itself is unremarkable. N.M.R. machines are used in chemistry labs across the world to map the architecture of molecules by sensing how their atoms dance to the beat of electromagnetic waves. Hospitals and clinics use the same technology, called magnetic resonance imaging, or M.R.I., to scan the tissues of the human body. The machine at Los Alamos has been enlisted on a recent morning for a grander purpose: to carry out an experiment in quantum computing. By using radio waves to manipulate atoms like so many quantum abacus beads, the Los Alamos scientists will coax a molecule called crotonic acid into executing a simple computer program. Last year they set a record, carrying out a calculation involving seven atoms. This year they are shooting for 10. That may not sound like many. Each atom can be thought of as a little switch, a register that holds a 1 or a 0, and the latest Pentium chip contains 42 million such devices. But the paradoxical laws of quantum mechanics confer a powerful advantage: a single atom can do two calculations at once. Two atoms can do four, three atoms can do eight. By the time you reach 10, doubling and doubling and doubling along the way, you have an invisibly tiny computer that can carry out 1,024 (210) calculations at the same time. If scientists can find ways to leverage this achievement to embrace 20 atoms, they will be able to execute a million simultaneous calculations. Double that again to 40 atoms, and 10 trillion calculations can be done in tandem. The goal, still but a distant glimmer, is to harness thousands of atoms, resulting in a machine so powerful that it would easily break codes now considered impenetrable and solve other problems that are impossible for even the fastest supercomputer. "We are at the border of a new territory," said Dr. Raymond Laflamme, one of the leaders of the Los Alamos project. "All the experiments today are a very small step, but they show that there is not a wall." "The big question," he added, "is whether we can make the transition from theory to practice." The program that he and a colleague, Dr. Emanuel Knill, are now running — a procedure for detecting and correcting the errors that inevitably crop up during the exceedingly delicate quantum calculations — is being watched with interest by other theorists. "Quantum error correction is vitally important for future quantum technologies," said Dr. John Preskill, a physicist at the California Institute of Technology. "Until the idea of quantum error correction was discovered in 1995, there was great skepticism about whether large- scale quantum computers capable of outperforming conventional digital computers would ever be practical." Now Dr. Knill and Dr. Laflamme are demonstrating that what was shown to be true in theory works in practice as well. Their experiment is also a landmark in another way. Researchers have recently used N.M.R. to get molecules to execute rudimentary programs, like searching a database using fewer steps than required by an ordinary computer. (As a sign of how primitive the technology remains, the database consisted of a list of only eight numbers.) Dr. Knill and Dr. Laflamme's error-correcting algorithm is still quite simple, compared with, say, Microsoft Word, but it is one of the most complex pieces of quantum software yet run. Less than a decade ago, quantum computing was just an intellectual parlor game, a way for theorists to test their mettle by imagining absurdly small computers with parts the size of individual atoms. At its root, computation is just a matter of shuffling bits, the 1's and 0's of binary arithmetic. So suppose an atom pointing up means 1 and an atom pointing down means 0. Flip around these bits by zapping the atoms with laser beams or radio waves and the result is an extremely tiny computer. But that would be just the beginning of its power. Quantum mechanics, the rules governing subatomic particles, dictates that these quantum bits, called qubits (pronounced KYEW-bits), can also be in a "superposition," indicating 1 and 0 at the same time. Two atoms can simultaneously be in four states: 00, 01, 10 and 11. Three atoms can say eight things at once: 000, 001, 010, 011, 100, 101, 110 and 111. For each atom added to the chain, the number of possibilities increases exponentially, by a power of 2. Put together a few dozen atoms, it seemed, and they could perform vast numbers of calculations simultaneously. All this was of little more than academic interest until 1994, when Dr. Peter Shor, a researcher at AT&T Laboratories in Florham Park, N.J., proved that a quantum computer could rapidly find the factors of long numbers, a problem that flummoxes human brains and supercomputers. Since the codes that are used to protect military and financial secrets depend on the near impossibility of this task, government money began pouring into places like Los Alamos, allowing theorists like Dr. Laflamme and Dr. Knill to begin turning the thought experiments into reality. "There is no fundamental physical barrier that makes quantum computing impossible," Dr. Knill said. "The technology, as it exists, is a long way from meeting the goal. But we see no reason in principle why the goal cannot be met." For the past few years, laboratories have been using exotic technologies to isolate small numbers of atoms, prodding them into performing simple calculations. Dr. Laflamme and Dr. Knill's group is among those that have been trying a different method: using the off-the- shelf technology of N.M.R., in which molecules — strings of atoms — are trapped in intense magnetic fields and manipulated with radio waves. This approach is possible because the cores of some atoms — the nuclei — are endowed with a quality called spin. They act like little tops, rotating in the presence of a magnetic field. If the nucleus is rotating counterclockwise, its axis of spin points upward. Flip it over and it rotates clockwise, a condition called downward spin. Nudging these nuclei with pulses of high-frequency radio waves causes them to shift between the two positions, up and down. And since the molecules emit feeble electromagnetic signals, the progress of the experiment can be monitored on a computer screen. This technique is a proven tool for chemists, who use N.M.R. to generate charts called spectra that give clues to the structure of chemical compounds. Several years ago, scientists at Stanford, the Massachusetts Institute of Technology, the I.B.M. Almaden Research Center, the University of Oxford and elsewhere realized that N.M.R. could be used for a very different purpose. Call up "1" and down "0" and you have a tiny molecular switch. As Dr. Laflamme put it: "People had been doing quantum computing all along. They just didn't know it." During the recent experiment, he and Dr. Knill sat in front of a computer workstation that was wired and programmed to control the N.M.R. machine. Their goal: to get a string of five nuclei to carry out their error- correcting algorithm. Errors occur when a bit is accidentally flipped so that it says 1 when it really means 0, or vice versa. Ordinary computers can protect against this by using redundancy. In one scheme, data are sent in triplicate, so 101 becomes 111000111. Simple little programs watch out for corrupted triplets like 010 or 110, restoring the errant bits so they match the other two. For quantum computing, error correction is more convoluted. A qubit is protected by using an intricate scheme that effectively spreads its value across a cluster of five qubits that are all "entangled" quantum mechanically. That means that if one of the qubits becomes scrambled, its original value can be retrieved by analyzing the other four. In the experiment, the five qubits will be represented by the nuclei of five atoms in a molecule of crotonic acid. Schematically this can be thought of as a string of five beads, though the arrangement is slightly more complex. Four of the beads are carbon nuclei — or actually isotopes called carbon 13. (Since ordinary carbon 12 is spinless, the physicists called on a Los Alamos chemist, Dr. Rudy Martinez, to synthesize crotonic acid using carbon 13.) The other bead on the string actually consists of a cluster of three hydrogen nuclei, part of a structure called a methyl group, that is treated as a single processor. In the scientists' notebooks, the five-qubit sequence is abbreviated like this: M C1 C2 C3 C4 — a methyl followed by four carbons. These are the tokens that will be used to compute. As the calculation unfolds, the tiny signals emitted by the molecules will be monitored and displayed by the computer as a horizontal zigzag line. First a small flask of crotonic acid containing about 1021 (a billion trillion) of the molecules is placed inside the core of the N.M.R. spectrometer. A bath of liquid nitrogen and liquid helium cools the machine's superconducting coils, allowing electricity to course through them unimpeded, generating the intense magnetic field that the sign outside warns about. Tapping on the keyboard, Dr. Knill "shims" the magnets — straightening out the kinks in the electromagnetic field. The effect is not unlike what happens when a carpenter uses little wooden wedges to shim a window frame so it is perfectly horizontal. After the machine is calibrated the experiment can begin. At first, the nuclei in the molecules are pointing every which way, creating a predominantly random soup. But the strong magnetic field causes a fraction of the molecules, about one in a 100,000,000, to line up so that all their nuclei are pointing up: 11111. This subset of uniformly aligned molecules — about 10 trillion of them — will be used to carry out the computation. This is possible because the five nuclei within the molecules each resonate at a different frequency. Using pulses of radio waves, an operator sitting at the controls of an N.M.R. machine can choose an individual nucleus — carbon number 2, for example — and strike it like a bell. Throughout the flask, trillions of C2 nuclei will chime in synchrony. Apply the pulse for just the right duration and the C2's can be rotated to point down for 0. Another pulse will cause them to point to 1 again. And a pulse of half the duration will cause them to hover in quantum superposition, potentially saying 1 and 0 at the same time. What has been described so far is just the quantum version of a light switch. The reason a molecule can be used to calculate is that its nuclei, like the tiny switches inside a computer chip, interact with one another: a radio pulse will cause a certain nucleus to change from 1 to 0 — but only if the nucleus to its left is 1. In an ordinary computer these kinds of arrangements are called logic gates, the building blocks of computation. String enough of them together and any calculation can be performed. Dr. Knill starts the quantum algorithm by directing the machine to emit a short burst of pulses. This causes the first carbon nucleus, C1, to point down while the other four qubits remain up. Throughout the soup, trillions of molecules now say 10111, a pattern that can be displayed on the computer screen as a horizontal line with a peak — the spectrum. A single qubit of quantum information has been stored. Another series of pulses then protects this information by encoding it among the cluster of qubits, flipping them up or down according to the rules of the correction algorithm. Then an error is deliberately introduced. A radio pulse is used to flip one of the qubits — just as might accidentally happen during a computation. But the original message has not been lost. A final barrage of pulses is unleashed, which analyzes the cluster, ferrets out the error and fixes the mistake. On the computer screen the peak of the spectrum shifts, showing that the experiment has been a success. There are no whoops of joy or uncorking of Champagne. Since last fall, the experiment has been repeated many times. But it is always satisfying for the theorists to see that it really works. Jason Kodish Thirring Institute for Applied Gravitational Research www.edmc.net/thirring ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "Philosophy is written in this great book (by which I mean the universe) which stands always open to our view, but it cannot be understood unless one first learns how to comprehend the language and interperet the symbols in which it is written"-Galileo Galilei -- btw, anyone have, or know where to get barbie makeover warez? i cant shell out the 20$, i spent it on buying a new best friend... - -- Credits Without the following contributions this zine issue would be fairly delayed or not released, so thank you to the following people: Ace905, Chadder, Guy Gugliotta, H410g3n, m4chine, PRL, soap, The Clone, Wizbone -- Shouts: Hack Canada (#HackCanada), #CPU, #k-1ine, #altphreakingfaq k-rad-bob @ b0g, Blackened @ Damage Inc., The Grasshopper Unit, Flippersmack, Pyrofreak, Peoples Action Network Edmonton, N-Sanity (because he whined), Independent Media Centre, soap, and lastly to everyone and anyone who contributes to the Canadian H/P scene. ;. .;.. ; ;. ;.. ;.. .;..; .;.; .;; ;.. .;..;. .;..; .;.;...; ;..;.. .;. A .;. .;. ;.. N E T T W E R K E D ;.. ;..;.. P R O D U C T ;..;.. .;..; ;..;.. ; .;..;.;.. .; . .;. ..;.. .;.. . .; ..;..;..;.. .; ;..;. .;.. . .;.. .;.;. ..;. ..;.. .;. ;.;..;;..;.; ;.;;..;.. ;.;.; .; . ;.;..;. .;. ;.;:.;. ,;....;. .;.;. .;.; .;.;.; .;.; ;..;. .;.;;.; .;. ..; ;. > > > crazy mutha-fucka named ice-cube, from da hood... niggas wiff attitude.