k-26-(12)-02 .,..,...,.,.,.,................,.,.,.....,..........,...,.,.,.,.............,. i ,;t; .,ijfLLLfti.i i ,jf' ,jLGGGGGGGGGG; i . LL :tLGGGGGGGGGGGGG i .ij' tL' :jLGGGGGGGGGGGGGG i '` .;tftP ;E' :jGGGGGGGGGGGGGGGG i .;:, ,;c ,Li af' fP .LL jGGGGGGGGGGGGGGGGG i :fS"fi ,iLi tf" kP ;f fP ,El;, .iLGGGGGGGGGGGGGGGDD i SGk ,pitp ,iL,y' jf iP ,A ,;AL,LE"' ` tLGGGGGGGGGGGGGGGGEE i fSDk:, ,P"'iG tEe;' jC, ,iEf^tGf"'` iLGGGGGGGGGGGGGGGDEf: i "fSG: dL ,G; Ei ,t^Gic"' ..,,. ,LGGGGGGGGGGGGGGGDEL.: i fSj.M:it" `ift:' .,::iitjfGGGGDL. ,fGGGGGGGGGGGGGGGDD,..; i i; .;j; DP' .,:;;tjffjttfGGGGGGEG.. ;fGGGGGGGGGGGGGGGDD,.. i i `tS;i' G; .,;ttj;;::. :jGGGGGGGDD,. ;LGGGGGGGGGGGGGGDEL... i i iG .,;tt;:. .ifGGGGGGGDEi.. ,fGGGGGGGGGGGGGGDD;.. i i :Pt:,;ii,.. ;fGGGGGGGGGEL.. ,fGGGGGGGGGGGGGDEf:.. i i .;i,i;:. .;jLGGGGGGGGGDE:.. ifGGGGGGGGGGGGGDDt.. i i ::,.: .iLGGGGGGGGGGGDE;.. iLGGGGGGGGGGGGDDi... i i ... :ifGGGGGGGGGGGGDEL.. iLGGGGGGGGGGGDEL,.. i i . .,tLGGGGGGGGGGGGGGEj.. ,tGGGGGGGGGGGDEf:.. i i ;jLGGGGGGGGGGGGGGGDE... ,fGGGGGGGGGGDED;... i i ,ifGGGGGGGGGGGGGGGGGDE;.. .iLGGGGGGGGGDEf,.. i i ,tLGGGGGGGGDGGGGGGGGGGEL.. ,tLGGGGGGGGDEGi... i i :ifGGGGGGGGDEjiiGGGGGGGGDG:. :tLGGGGGGGDDEj,.. i i .ifGGGGGGGGGDEi..:fGGGGGGDEi..:;fGGGGGGGGDDL,... I i :jLGGGGGGGGGGDE;.. iGGGGGGGDG :tLGGGGGGGDELi.... i i .iLGGGGGGGGGGGDEi.. :fGGGGGGDE;:jGGGGGGGDDj;... i i .ifGGGGGGGGGGGGDD:.. :jGGGGGGGDL iLGGGGGGGGEt,.. i i:jGGGGGGGGGGGGGDD;.. .tLGGGGGGDE;:fGGGGGGGGGDEEi... i fjGGGGGGGGGGGGGDE,.. iLGGGGGGGEG..iGGGGGGGGGGGDKf... I DGGGGGGGGGGGGGDD;.. iLGGGGGGGDE;. .iGGGGGGGGGGGDE;.. i EGGGGGGGGGGGGEG:.. .;LGGGGGGGGEi.. :LGGGGGGGGGGGKj... i EGGGGGGGGGGDEj... .tLGGGGGGGGDD:. .fGGGGGGGGGGGKf... i GGGGGGGDDDDj;.. .tLGGGGGGGGGEt.. :fGGGGGGGGGGGKf.. i i.;jjfjji,... :jGGGGGGGGGGDD:.. ,LGGGGGGGGGGDK;.. i i .... ifGGGGGGGGGGDEj.. .tGGGGGGGGGGGDK,.. i i ,jGGGGGGGGGGGGDE.. iLGGGGGGGGGGGDE:.. i i .;LGGGGGGGGGGGGDEj.. .fGGGGGGGGGGGGDE... i i ,fGGGGGGGGGGGGGGDG:. ,LGGGGGGGGGGGGDE.. ,## @@ i i ;fGGGGGGGGGGGGGGDE;.. iLGGGGGGGGGGGGDE.. ## yy kggg, ,nnn, i i :iLGGGGGGGGGGGGGGGEf.. tGGGGGGGGGGGGGDE.. ### #M ## MN NG #ggg# i i :jLGGGGGGGGGGGGGGGDD:.. iGGGGGGGGGGGGGDE.. ## G# #N #N #t i i :jGGGGGGGGGGGGGGGGDE;.. ,LGGGGGGGGGGGGGE;. .G#, MM NG NG 'E##t, i i jGGGGGGGGGGGGGGGGDDj.. :LGGGGGGGGGGGGGDG,. i i ;LGGGGGGGGGGGGGGGDE;.. jGGGGGGGGGGGGGGDG. i i iGGGGGGGGGGGGGGGDEi.. ,LGGGGGGGGGGGGGGGL, i i ;GGGGGGGGGGGGGDED;.. ,GGGGGGGGGGGGGGGGGLLL i i .LGGGGGGGGGGGDDt:.. ;GGGGGGGGGGGGGGGGDEG.. i i .tGGDDDDDEDLi... .iLGGGGGGGGGDDDEfi.. i i ,;tjtti;:... .;tfLLLLLfjti:... i i .... i i i i - K-1ine - 26 -- April 2002 ----- Operation: Mass Destruction -- i i i #,::,:::,:::,;,;,;,::::;:;:::::,;,;,:::::,;::;:::::;,:::,;,;,;,::::::::::,::,# ":;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:cyb0rg/asm:;;:" ":;;;;;;;;;:;;;;;;;;;;;:;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:" `''''''''"'''''''''''""'''''''''''''""""'"''"'''''''''''''''''"'''"' _____________________________________________________________________________ » .- Words from the Editor -. « | *: [-] Introduction .......................................... The Clone :* *: (-) Contact Information ................................... The Clone :* *: (-) Advertisment .......................................... HackerSalvage:* *: (-) Link of the Month ..................................... The Clone :* *: (-) K-1ine Mirrors ........................................ The Clone :* ____________________________________________________________________________ » .- Documents -. « | *: (x) 'An Elcotel Corporation Network Scan' ................. RT :* *: (x) 'The Lawnmower Man Effect' ............................ moontug :* *: (x) 'The History of the Internet' ......................... Trigger :* *: (x) 'Unfair Business Practices by Radio Station K106.3' ... Bill Duke :* *: (x) 'Verizon Teleconferencing'....................... ic0n/k00p$ta/Phr34k :* _____________________________________________________________________________ » .- Conclusion -. « | *: [-] Credits ............................................... The Clone :* *: [-] Shouts ................................................ The Clone :* _____________________________________________________________________________ Introduction - Welcome to the latest issue of K-1ine zine... Operation: Mass Destruction! Thanks to everyone who submitted articles, after I harrassed them on the K-1ine mailing list (200 subscribers). I knew that my pain in the ass tactics would pay off someday. Enjoy this issue of K-1ine zine, and don't forget to send me more articles or I'll.. [insert indictable statement]. --> Contact Information; Comments/Questions/Submissions: theclone@hackcanada.com Check out my site: (Nettwerked) http://www.nettwerked.net --> -- Advertisment -- +++ WWW.HACKERSALVAGE.COM +++ HackerSalvage.com is a non-profit website dedicated to keeping old hardware in circulation. Many of us have piles of it sitting around but can't just toss it out. Here you can post computer items for sale or post a want ad for items you are looking for. A perfect place to get rid of perfectly good junk.... and get some new stuff to rebuild the pile. +++ +++ -- --=[ LINK OF THE MONTH ]=-- Every month I post one really great "link of the month" on every issue of K-1ine magazine. The link can be anything in the technology industry, music scene, rave scene, punk scene, or even a good article you read on a news site. I'll be taking submissions via e-mail or IRC right away; so get your links in and maybe you'll see it in the next issue of K-1ine! For the month of April, the link of the month is: http://www.artbell.com/mediafiles/CellPhoneVideo.mpg It's a cellphone gun in action, super sweet! [submitted by: Me] -- K-1ine Mirrors: http://www.mirrors.wiretapped.net/security/info/textfiles/k1ine/ (Now mirrored in two places, one in Belgium and another in Sydney) "Wiretapped.net is an archive of open source software, informational textfiles and radio/conference broadcasts covering the areas of network and information security, network operations, host integrity, cryptography and privacy, among others. We believe we are now the largest archive of this type of software & information, hosting in excess of 20 gigabytes of information mirrored from around the world." http://jdm.hostingextreme.com/files/k1ine/ Tekk250's mirroring of the K-1ine issues --> 04/11/02 By: RT [*]--- Checking host: 209.84.XXX.XXX [*]--- Obtaining list of remote NetBIOS names [*]--- Remote systems name tables: ECTLWEB ECTLWEB WORKGROUP ECTLWEB WORKGROUP INet~Services IS~ECTLWEB [*]--- Attempting to connect with name: * [*]--- Unable to connect [*]--- Attempting to connect with name: ECTLWEB [*]--- CONNECTED with name: ECTLWEB [*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03 [*]--- Server time is Fri Mar 29 12:21:16 2002 [*]--- Timezone is UTC-5.0 [*]--- Remote server wants us to encrypt, telling it not to [*]--- Attempting to connect with name: ECTLWEB [*]--- CONNECTED with name: ECTLWEB [*]--- Attempting to establish session [*]--- Was not able to establish session with no password [*]--- Attempting to connect with Username: `' Password: `ADMINISTRATOR' [*]--- CONNECTED: Username: `' Password: `ADMINISTRATOR' [*]--- Obtained server information: Server=[ECTLWEB] User=[] Workgroup=[WORKGROUP] Domain=[] [*]--- Obtained listing of shares: Sharename Type Comment --------- ---- ------- ADMIN$ Disk: Remote Admin C$ Disk: Default share d$ Disk: IPC$ IPC: Remote IPC [*]--- This machine has a browse list: Server Comment --------- ------- ECTLWEB ELCOTEL [*]--- Attempting to access share: \\ECTLWEB\ [*]--- Unable to access [*]--- Attempting to access share: \\ECTLWEB\ADMIN$ [*]--- WARNING: Able to access share: \\ECTLWEB\ADMIN$ [*]--- Checking write access in: \\ECTLWEB\ADMIN$ [*]--- WARNING: Directory is writeable: \\ECTLWEB\ADMIN$ [*]--- Attempting to exercise .. bug on: \\ECTLWEB\ADMIN$ [*]--- Attempting to access share: \\ECTLWEB\C$ [*]--- WARNING: Able to access share: \\ECTLWEB\C$ [*]--- Checking write access in: \\ECTLWEB\C$ [*]--- WARNING: Directory is writeable: \\ECTLWEB\C$ [*]--- Attempting to exercise .. bug on: \\ECTLWEB\C$ [*]--- Attempting to access share: \\ECTLWEB\d$ [*]--- WARNING: Able to access share: \\ECTLWEB\d$ [*]--- Checking write access in: \\ECTLWEB\d$ [*]--- Attempting to exercise .. bug on: \\ECTLWEB\d$ [*]--- Attempting to access share: \\ECTLWEB\D$ [*]--- WARNING: Able to access share: \\ECTLWEB\D$ [*]--- Checking write access in: \\ECTLWEB\D$ [*]--- Attempting to exercise .. bug on: \\ECTLWEB\D$ [*]--- Attempting to access share: \\ECTLWEB\ROOT [*]--- Unable to access [*]--- Attempting to access share: \\ECTLWEB\WINNT$ [*]--- Unable to access -- /* The Lawnmower Man Effect moontug, 2002 */ public class Student { private int school, hospital, homework, suffering, legalizedNarcotics; public Student() { /* ---------------------------------------------------------------------- I was a poor student, afraid to death of the teachers and the coffee on their breath. Homework was torture - I got it done, but it never felt good. I never read ahead, I didn't feel any of it was applicable or worthwhile... school felt like a hospital without the legalized narcotics. ---------------------------------------------------------------------- */ hospital = 1; suffering = hospital; legalizedNarcotics = hospital; school = hospital - legalizedNarcotics; homework = school + 1; study(); } public void study() { while (homework == suffering) escape("mathematics"); } private void selfEsteem() { /* ---------------------------------------------------------------------- I started strong each year with that glow you get when you begin something new. But my marks inevitably plummeted, and I began to wonder what was wrong. Was I too stupid, lazy, unmotivated? What started as my strongest subject ended up as my worst. With 38% before the final exam in junior high math, I doomed myself to two consecutive summers of schooling. ---------------------------------------------------------------------- */ System.out.println("what's wrong with me?"); } private void escape(String lesson) { /* ---------------------------------------------------------------------- I took up an art - a dedication - that ultimately pulled me out of the abyss. It did push me deeper at one point, like that huff of breath you need to take before you can blow someone's house down, but its long-term effects were such that I won't be going back. ---------------------------------------------------------------------- */ selfEsteem(); System.out.println(translate(lesson)); } private String translate(String lesson) { /* ---------------------------------------------------------------------- It was the synchrony of electronics, the element of You that persists in an environment that's all your own; it was code, a creative outlet for every lesson they threw at me, however bland. I made my slow recovery over the course of high school. I would translate physics or math lessons into the environment I was comfortable in, and every once in a while I would be better than everyone else. ---------------------------------------------------------------------- */ homework -= 1; return lesson.substring(2,6); } /* ---------------------------------------------------------------------- I've fallen in love with the scientific method, broken away from a fear of theorizing; I'm no longer afraid to be wrong because no-one's defiling my mind with bold red ink. I believe I was the victim of a severe problem with formal education: lessons are presented in such a way that neglects creativity. You are thrown a recipe and told to follow through again and again. Moreover, if you are wrong, you are punished; the lesson and the experience you gain is forgotten for the greater sorrow. No doubt there are people out there in the position I was. My advice to you is to keep strong and embrace your creativity. It will pay off in the long run. ---------------------------------------------------------------------- */ } -- The History of the Internet =========================== By: Trigger 04/12/02 Intro ----- What we now know as the Internet started out as a means for the US Military to communicate in the event of war. The military needed a network that was versatile so that if links were broken information could be rerouted and still make it to its original destination. For the first 10 years, the Internet was only used by scientists and the military. It was only in the 1980's that corporations got involved. In the 1990's ordinary people began to use the Internet for everything from information purposes to buying a new boat. By the year 2000 almost everyone in US and Canada had access to it and so did most other countries. The Conceiving -------------- In 1957, the USSR launched Sputnik, the first artificial satellite. In response to this, the US Department of Defense issued directive 5105.15 [1] thus creating the Advanced Research Projects Agency (ARPA) [5]. In 1959, Dr. Leonard Kleinrock (MIT) submitted a PhD proposal to study data networks. On May 31, 1961, Kleinrock finished his paper, AInformation Flow in Large Communication Nets.@[5] This was the first paper published on packet switching (PS). Packet switching is a process in which packets (small segments of data) do not have a static path in a network. A packet can be routed and redirected as needed. This means that if a route was severed, a new route could be chosen by the software. In 1968, the packet switching process was presented to ARPA. That same year, ARPA gave a Cambridge-based company, Bolt, Beranek, and Newman (BBN) the job to implement and establish the ARPANET. This first switch was named an Interface Message Processor (IMP), and was based upon a newly developed Honeywell minicomputer [5]. In the Beginning ---------------- On labor day weekend, 1969, the IMP switch was delivered to UCLA. Everyone who had any reason to be there was there. The team of forty was responsible for linking the network. This was quite the challenge, seeing as this had never been done. On Monday the team was able to transmit the first bits (a piece datum that is either 1 or 0) to the ARPANET. The team worked around the clock. By the following day they were able to send massages. At that moment the Internet was born. Youth ----- Shortly following the advent of the Internet, in 1970, a new node was being added each month. Bob Metcalf built a high speed (100Kbps) network interface that connected the MIT IMP and a PDP-6 to the ARPANET. This device ran for thirteen years without human intervention [3]. Network Working Group finished the Telnet Protocol and the File Transfer Protocol (FTP). Using Telnet a user can login to a remote system and run commands present on the remote computer. Using FTP a user can connect to a remote computer and transfer files over the Internet. That year the first host-to-host protocol (NCP) was implemented into ARPANET. Also the first packet radio (ALOHAnet) was created in Hawaii. Packet radio is sending data over a wide area network (WAN) using RF (radio frequency) diation. The RF signals are transmitted though the air and are reflected off of the ionosphere back down to earth, thus allowing packet radio to cover vast distances. In 1973 the Unix-to-Unix Protocol (UUCP) was created, allowing dial-up connections to be possible. With all this new development there was an emerging problem. ARPANET, PRNet (packet radio networks), and SATNET (network over a satellite) all had different sizes of packets, transmission rates, labels, and conventions which caused obvious communication problems. [5] In response to this dilemma, in September 1973, INWS published the first paper on TCP (Transmission Control Protocol). On March 23, 1977, ARPA's name was changed to DARPA (Defense Advanced Research Projects Agency). In 1978, TCP split into TCP and IP (Internet Protocol) [5]. The original IMP was only capable of communicating with 64 nodes. IP can route up to a very large number of nodes. Since IP addresses are 32 bit, ideally there should be a capability of having 232 nodes, but because of other reasons beyond the scope of this text, this is not the case. IP also restricts packets to a maximum number of hops (network jumps). This prevents packets from getting into indefinite loops. Fragmenting allows packets to be broken up into smaller pieces if their size is too large for a particular network. TCP allows packets to choose a specific service running on the remote computer (port) and allows a sliding window to keep track of packets. TCP uses a 3-way hand shake method in order to prevent IP spoofing (faking one=s IP address). The 1st of January, 1983, was the day of transition on the ARPANET from NCP to TCP/IP. In the same year ARPANET split into the ARPANET and the MILNET. There was one problem with IP. It was too difficult to remember the 32 bit addresses, especially when there were thousands of them. To solve this problem, in 1984, DNS (domain name sever) was introduced. DNS had a list of domain names, and when queried would return the appropriate IP address. DNS allowed .gov, .mill, .edu, .org, .net, .com, and .int to be used. In 1985 Dan Lunch in cooperation with IAB realized there was a lack of information about the Internet and arranged a 3-day workshop for all of the vendors to learn TCP/IP. The majority of the speakers were from the DARPA community. [6]. This allowed for the commercialization of the Internet. From 1986 to 1988, the amount of networks connected jumped from 2,000 to 30,000 [3]. Loss of Innocence ----------------- On November 2, 1988, the first worm was created by a man named Morris and it infected ~10% of the 60000 hosts. To fight this new threat DARPA created CERT (computer emergency response Team)[5]. (CERT regularly publishes advisories about holes in network programs.) In 1989 Berner-Lee proposed "hypertext" which consequently created the World Wide Web. In 1990, the ARPANET was formally shutdown. The first search engines were created (ARCHIE, Gopher, and WAIS) [4]. By this point there were 300,000 hosts throughout Argentina, Austria, Belgium, Brazil, Canada, Chile, Greece, India, Ireland, South Korea, Spain, US, And Switzerland [3]. In 1995 Microsoft unveiled Windows 95. Although they were not the first to release an object oriented operating system with network capabilities, they were the first to make it easy for people to understand. People no longer needed to be knowledgeable about computers in order to operate them. This was exactly what was needed for people to be attracted to the computer and Internet world, something easy and manageable. With this new craze of people on the Internet, the corporate sector began to pay attention, and quickly learned how to capitalize on it. With all these people and businesses connected, the were once again running out of Internet addresses. To correct this, IPv4 (the one currently used) had been revised to IPv6, which supports 128 bit addresses. With IPv6 there is the possibility to have trillions of networks each having trillions of nodes. In the End ---------- Way back in 700 BC, homing pigeons carried messages in ancient Greece. People of this time could unlikely even fathom the conncept of such exchanges of information that the Internet transfers every day. The Internet was once a means of communication for the us military and has developed into a world of its own. As this world grows, fueled by the imagination and hard work of many people, it is becoming part of our lives. As these two worlds merge, we must ask ourselves, is the Internet a part of us, or are we becoming a part of it? References ---------- [1] Anderberg, A. (2002). The History of the Internet and Web. [HTML page]. URL: http://www.anderbergfamily.net/ant/history [2] Keinrock, L., Ph.D. (1996). Leonard Keinrock=s Personal History/Biography: The birth of the Internet. [HTML page]. URL: http://www.lk.cs.ucla.edu/LK/Inet/birth.html [3] The Computer Museum History Center. Internet History. [JavaScript page]. URL: http://www.computerhistory.org/exhibits/internet_history/ [4] Geek News (2002) World goverments to take over ICANN?. [HTML page]. URL: http://www.geek.com/news/geeknews/2002feb/gee20020227010452.htm [5] Zakon R. (2002). Hobbes= Internet Timeline v5.5. [JavaScript page]. URL: http://www.zakon.org/robert/internet/timeline/ [6] Internet Society. (2000). A Brief History of the Internet, version 3.31. [SHTML page]. URL: http://www.isoc.org/internet/history/brief.shtml -- i have this obsession with wearing diapers -- 'Unfair Business Practices by Radio Station K106.3' Bill Duke bse5150@hotmail.com Wed Apr 3 2002 I need your help... This is going to sound crazy but I assure you it is absolutely true. Some of you may remember me from September of last year (2001), I posted a message to this discussion board about a webpage that I had created to expose the practices of a radio station in Sarnia, Ontario Canada. The radio Station was 106.3fm or K106.3. I don't know if anybody remembers it or not or if anybody here had checked it out or not... There were copies of emails I had received from the program director and other miscellaneous articles. Anyway, none of what was posted on that webpage was illegal or false and they couldn't really do anything to me for having it available... Charter of Rights and things like that. A little bit of background information... In Sarnia, Ontario there are three radio stations, 106.3fm, 99.9fm and 1070 CHOK am. All three radio stations are operated out of the same building and all three are owned and operated by Blackburn Radio Inc. based in London, Ontario. All three radio stations are programmed by Ron Dann (I posted some of the emails I received from him on my website.) On September 24, 2001 Ron Dann called me at my home to speak to me about removing my website. I reluctantly agreed to allow him to remove the site (The URL was http://www.geocities.com/k106slam/) as I had just begun a new job and did not have a whole lot of time available to maintain it. In exchange for the userid and password for the website I required that Ron Dann or Radio Sarnia/Lambton (as the three radio stations are collectively known) to place a link to the CBSC (Canadian Broadcast Standards Council) on their own website and asked that they do nothing to intentionally antagonize me. Pretty good tradeoff if you ask me... Well, Ron Dann removed the website on September 26, 2001 and as agreed, he did place a link to the CBSC on the K106.3 website. This did not last long and it was removed and Ron Dann and his cronies began doing everything in their power to antagonize me and bring me into public ridicule. Here's where it starts to get interesting... On July 27, 2000 an engineer working for Fluor-Daniel out of Calgary, Alberta called the police and accused me of stalking her. Her name is Josee Plante. I have a file floating around elsewhere on the internet with regard to this matter, as well as a website I am setting up... The fact of the matter is that the allegations filed against me were false and no police action was ever taken other than having an officer come to speak with me. Regardless, the complaint does to this day remain on my record even though nothing ever happened with it... Fast forward just over a year and your getting to the time when the K106slam page was set up... Around this time all of the stuff from the stalking allegations resurfaces along with a whole pile of other gossip and falsehoods. I'm stuck as for direction... I've already established a lot of the facts but there are a bunch of things that continue to allude me... For example: I've established that both Josee Plante as well as Ron Dann and others at Radio Sarnia/Lambton are involved. I've established that photos and/or video of me exists and is circulating throughout the internet. I've established that another person, Philip Leval (Laval?) is also involved. It is believed that this person is also an employee of Fluor-Daniel or somehow involved with the Muskeg River Project in Alberta although I haven't yet confirmed this as it is new information. I've also established a definitive link between the above mentioned people and Radio Sarnia/Lambton. If anybody would be interested in helping me crack this case... I would very much appreciate it. Thanks. -- \/ERIZON |ELECONFERENCING || BY: k00p$ta Phr34k and ic0n Before we begin this file I (ic0n&k00p$ta) are not going to give you any info on setting up the conference. For a few reasons but it's not hard at all the setup once since everyone @ verizon is crazy or just dumb minus a selected few (they know who they are). Now on with the file. Verizon now offers a new service, Conference Connections.These Conferences's are reservation-less, which means around the clock availability. The Conference is available 24 hours a day, 7 days a week, and 365 days out of the year. This makes conferencing very easy. Thanks Verizon! There's 2 ways to dial into a verizon conference. 1. Toll Free dial in number (866-441-2942) 2. Direct (972-717-2043) Npa 972 is in Texas There are no setup fees, no cancellation fees, and no monthly charges. Which mean you can setup a teleconference and your victim will not even know he's got a teleconference being billed to him. The minutes your participants used are logged separately logged by differnt ports. There are 20 of these ports but I'm sure there is a way to get more. Anyways the minutes are added together to simplify the subscribers bill, in addition are required taxes. There is a separate bill for toll free service as well. States that need to use the direct number to the conference: 1. Alaska 2. Delaware 3. Maryland 4. New Jersey 5. New Hampshire 6. Virginia 7. Vermont 8. Washinton D.C. 9. West Virginia * Once again the direct number is 972-717-2043 * The reasoning behind the direct numbers is that Verizon provides long distance services for calls originating in most states outside the mid-Atlantic and new England states. Until government approval is obtained, Verizon cannot carry long distance in the states listed above. Verizon is in the works on getting the necess- ary states and federal permissions to offer long distance in every state. Rates Cents per minute per port Until 3/30/02 Normal Toll Free $0.22 $0.31 Direct $0.09 - $0.18 Feature Descriptions Announcements for Entry and Exit At your option, the reservation-less Conference Connections system can sound a tone or have silence when participants enter or exit a conference. Attendant Request The Subscriber or Participants can request attendant assistance for private or group consultation. The person requesting assistance remains in the conference until the attendant handles the request. Conference Continuation This feature allows the subscriber to exit a conference after it begins without disconnection the participants and must be activated for each conference call. Note: The systems automatically defaults to end the conference call when the subscriber disconnects. Conference Lock/Unlock This feature lets subscriber lock a conference once all parties are present to keep the conference private. Attendants cannot enter locked conferences, but can ring the conference requesting that the subscriber unlock for attend entry. Help Menu Help with using conference commands is available to every conference Subcriber and Participant. The system plays a private help message to the requester that list the available features and their associated touch-tone (dtmf) commands. Mute/Un-mute The Subscriber can collectively mute or un-mute all lines in the conference except for the subscriber's line. The participants can mute and un-mute there own lines to help control distractions and interruptions. Participant Count The system automatically tracks the number of participants on a conference. Any Subscriber or Participant can check the number of people in conference at any time. The system announces the count privately to the requester. Quick Start As a rule, conferences do not begin until the subscriber the conference. However your account can be configured to allow the subscriber to use this feature so that begins as soon as the first participant arrives. In this scenario, Participants who arrive before the subscriber may talk to one another before the conference actually begins. Though the quick start features offers less security, it allows unplanned meetings to occur whenever needed or permits conferencing when the subscriber is unavailable to start the conference. Features Subscriber Conference Commands This is how you Begin a conference: 1. Dial into conference system 2. Enter Pass code, then the # (pound) key 3. Then Press the * (star) key 4. Enter Subscriber Pin (4 digits) 5. Press 1 to start the conference or press 2 to change account options. To Change Account Options: Press 1 to chance subscriber pin Press 2 to configure roll call options Press 3 to change quickly start options Press 4 to change auto continuation options Conference Control options (while in conference) Press *0 to speak privately with an operator Press 00 to request an operator to join the conference Press *4 to lock conference Press *5 to unlock the conference Press *6 to mute your line Press *7 to un-mute your line Press *8 to allow the conference to continue after you disconnect Press *9 to privately play a list of participants on conference Press *# to hear the number of participants in the conference Press ## to mute all lines except the subscriber Press 99 to un-mute all lines Press ** to play this list of commands How to end a Conference Say whatever then hang up the phone a short message will be played for them and then disconnects them. - We also need to thank verizon for be so dumb and giving us all this information to write this article. Shout Outs.... Lucky225, Dark_Fairytale, The Borish One,Xenocide, Cuebiz, MaddjimBeam, Whit3rav3n, Reaver, Captain_B, Mr. Poop, RBCP, Everyone Who was on $kytel back in 96-97...well okay only some people from skytel and everyone else we know. ----!@> -- Credits Without the following contributions, this zine issue would be fairly delayed or not released. So thank you to the following people: Bill Duke, ic0n, k00p$ta, Me, moontug, Phr34k, RT, Trigger -- Shouts: Hack Canada (#HackCanada / #hacktel [key required]), HackTel Corporation, The Grasshopper Unit, Flippersmack, *Mandy*, soapie, `enjoy, Kybo_ren, Flopik, and lastly to everyone and anyone who contributes to the Canadian H/P scene. ;. .;.. ; ;. ;.. ;.. .;..; .;.; .;; ;.. .;..;. .;..; .;.;...; ;..;.. .;. A .;. .;. ;.. N E T T W E R K E D ;.. ;..;.. P R O D U C T ;..;.. .;..; ;..;.. ; .;..;.;.. .; . .;. ..;.. .;.. . .; ..;..;..;.. .; ;..;. .;.. . .;.. .;.;. ..;. ..;.. .;. ;.;..;;..;.; ;.;;..;.. ;.;.; .; . ;.;..;. .;. ;.;:.;. ,;....;. .;.;. .;.; .;.;.; .;.; ;..;. .;.;;.; .;. ..; ;. > > > > > > ... I you are attending DeFCoN X. Ill see you there LAMERZ.