THE LOD/H TECHNICAL JOURNAL ----------------------- INTRODUCTION: This is issue #2, we had originally planned to put out 6 issues a year, but it looks as if this will become a quarterly newsletter instead. This is due to the fact that the articles take months to fully research, write, and edit. By year end, we hope to show that we are not a "fly-by-night" newsletter and will continue to provide you with the same level of information, accuracy, and originality as this issue and the first. We appreciate those who have been downloading, storing, and distributing the newsletter in its entirety, and hope this will continue, as it benefits everyone. Here is the breakdown of this issue: 1 article on Telecommunications, 4 articles on Datacommunications, and one article in the 'other' category. Two authors have written articles for Issue 1, and 5 are new. Obviously this Issue is more hacking related, whereas Issue 1 was more phreaking related. If you have any material which may be of interest, let us know. Our 'sponsor' BBS list has been shortened to one dependable board, as Metal Shop Private, Shadowspawn, Hell Prozen Over, The Private Sector and Atlantis have all gone down, though some may be back online in the future. Left is Digital Logic. The usernumber/usernames for DL follows for those who wish to get in contact with us. We are open to suggestions for more Sponsor Boards. Digital Logic: 305-395-6906 New User Pass=DIGIT LOD/H Technical Journal Staff Account Number is 231. One last note, a slight clarification on articles. Articles labeled with letters, ie: Part A & Part B as in last issue's articles on the Outside Loop Distribution Plant by Phucked Agent 04 and the LOH Telenet Directory along with this issue's article on Hacking CMS by Lex Luthor are intended to be complete articles in themselves and should be merged together. They were broken up for editing and transmission purposes. Articles labeled as Part 1 & Part 2, are separate articles based on the same subject. ------------------------------------------------------------------------------- TABLE OF CONTENTS: 01 Introduction to the LOD/H Technical Journal Staff 04 K and Table Of Contents for Volume 1, Issue 2 02 The Networked Unix Solid State 17 K 03 Step By Step (SXS) Switching System Notes Phantom Phreaker 12 K 04 A Guide to the PRIMOS Operating System Carrier Culprit 25 K 05 Identifying and Defeating Physical Security and Lex Luthor 30 K Intrusion Detection Systems Part II: The Exterior 06 A Discrete Unix Password Hacker Shooting Shark 09 K 07 Hacking DEC's TOPS-20: Part II Blue Archer 25 K 08 Hacking IBM's VM/CMS Operating System, Part A. Lex Luthor 26 K 09 Hacking IBM's VM/CMS Operating System, Part B. Lex Luthor 25 K 10 Network News & Notes Staff 07 K Total: 7 articles, 10 files 180 K -------------------------------------------------------------------------------