(vee-pee) heavy industries presents...
Vicious Propaganda version 4.02
1.0 Fear And Loathing In Orange County
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Boogah187's responsible for this crap...
Whattup party people? (vee-pee)'s back for another assault on your intelligence.
I'll make this short, sweet and to the point... Next time you see (vee-pee)
it very well may be on a newsstand. That's right Petty has kicked me in the
ass enough and talked me into making this a print `zine. I hope we don't suck
too much this month. We have a nice, well rounded, content list this month.
Anyway, this ought to be a short intro. Just enjoy the mag, and send all
your complaints to "
[email protected]".
2.0 Quote Of The Month
=-=-=-=-=-=-=-=-=-=-=-
"Do you think you can get away with playing those crappy tones. I mean, Christ
almighty... Did you record those on a Fisher Price tape recorder? Just use
real quarters kiddo."
-Pacific Bell Operator on the quality of Boogah's redbox tones
3.0 Petty Larceny's Big Fun Book Of Death
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Petty Larceny did this in crayon on a Denny's activity mat...
Once again from PL's fun lab of death (aka his bedroom) I would
like to bring you me. And this months fucked up and just downright screwy
shit. That I don't yet know, and since I'm an asshole I'm gonna be making
this up as I go along, and if you don't like it you can just shove it up
your ass because I'm writing this, and you're just some lamer faggot who
would rather be reading the constructive works done by someone who really
matters compared to out reading the fucking manual and doing something. OK
now that that's over with, on with the crap.
This month I am going to be bringing you something that has
nothing to do with hacking, phreaking, computers, your life, or basically
anything which you have been faced with so far. But it is a subject that
is very dear to my heart; EXPLOSIVES. YES KIDS YOU HEARD RIGHT BOMBS! now
since this magazine probably doesn't want to get sued because you blew your
fucking hand off, and you probably will, because I am really drunk and high
on crack. And I don't want death threats from your mom, the PTA, your
big gay dad and the rest of the Elks club, don't try this, don't even
fucking read this if you're stupid. For those of you who are adventurous
enough to continue, here comes the article.
***************************************************************************
CAUTION: BLACK POWDER IS AN EXPLOSIVE, IT IS A PRIMITIVE EXPLOSIVE
AND HAS BEEN KNOWN TO GO OFF IF IMPROPERLY TREATED. YES THIS MEANS YOU
DO NOT SMOKE WHILE DOING THIS (IF YOU ARE STUPID ENOUGH TO). DO NOT USE
METAL TOOLS IN THE PREPARATION, USE WOOD, OR EARTHEN WARE. DO NOT USE
PLASTIC OR METAL, STATIC DISCHARGE CAN RESULT, AND CAUSE EXPLOSION.
***************************************************************************
Ever since I was a wee lad, I wanted to blow stuff up, and set
things on fire, and I found outlets for this at school, with my friends, and
sometimes when someone really pissed me off. And then I found better ways to
do this. And well, now I'm going to share my good ol' recipe for making black
powder.
First you will need some things, you should be able to find them
around either at your house, at the drug store, from the weapons dealer
down the street, at cost plus, or at a herbal shit store. the list of things
you will be needing is as follows: A good mortar and pestle, about half a
pound of saltpeter, about 4 oz. of sulphur, and some charcoal (bar-b-que
charcoal works good for this one), water, alcohol, and finally a screen
like the kind that goes in your window.
Now as you have already attained these materials, you will now
need to know how to mix them properly. First take each ingredient, and crush
it to the finest powder possible, using the mortar and pestle. I suggest
doing this in small batches, maybe 1/2 to 1 oz. at a time, depending on the
size of the mortar. Next take and measure out 7 oz. of finely ground saltpeter.
add it to about 4 oz. of warm water. Next measure about 1 oz. of sulphur, add
it to the water/saltpeter mix, and then add 2 oz. of powdered charcoal.
******************************MIX THAT SHIT WELL!****************************
Next you will need to dry the solution. By this time you have a
substance that looks like grey mud. This is good, because what that is
wet black powder, and it will provide you with hours and hours of
entertainment. This recipe makes just over a half a pound. now, take the
mud and spread it on a cookie sheet, thinly, and put it in the sun to dry.
Once the mud solidifies into a cake, dump it into another pan of
some variety, and break up the large clumps. Now, take this and a large
screen from a window, chicken wire, and grade the powder, take and break
it up into clumps about 1/8" in size. Now take the fine powder and separate
it from the rest using a fine screen, put the two different powders into
different jars. now, take one of the batches, and take out about a
teaspoon and light it, test the burning rate. If the burning rate is not very
good, take the remaining powder and put it in a cup in a jerky maker, or
similar device to dry all the water out of it. Do the same with both mixes of
powder use the thick powder for making bombs and the like, while using the
fine material for ignition, just fucking around with, or making smoke bombs.
HAVE A FUCKING BLAST! -PL
====================================================================
|Petty Larceny: patron | "Before me nothing but eternal things were|
|saint of Dal.net Mafia| made, and I endure eternally." - Dante |
====================================================================
4.0 Local News
=-=-=-=-=-=-=-
Donated for use by unkie noid...
[25% Crap and 75% Half-truth. The reporter who did this article interviewed
Unkie noid and even hung out with a bunch of us. She didn't even use noid's
stuff and the one bit of info we gave her on "Script Kiddies" she mis-quoted.
Oh joy. -b]
Tools to aid hackers abundant
TECHNOLOGY: Damage mounts
nationwide as the Internet provides
guidance for would-be intruders.
March 12, 1998
By DAWN C. CHMIELEWSKI
The Orange County Register
Computer hackers call them "script kitties"
hyperaggressive young teens with a computer and an
appetite for mischief.
They can infiltrate and topple a computer network
with ease, using Betty Crocker-simple recipes gleaned
from an estimated 440 hacker bulletin boards, 1,900
Web sites and 30 hacker publications such as
"Phrack."
And they are among the culprits who have inflicted
$136 million in damages and losses from computer
security breaches in the past 12 months, a 36 percent
increase.
"We're seeing so much more of it now, because the
tools exist that make it easier for even marginal
hackers to actually be pretty effective," said William
Boni, head of Coopers & Lybrand Investigations in
Los Angeles.
Last month federal agents raided the Sonoma County
homes of two teen-age boys who are suspected of
infiltrating the Pentagon's computers.
An unknown hacker or hackers raided computer
systems at 48 major universities, including the
University of California, Irvine. Last week's attack
disrupted UCI's network of 8,500 computers,
crashing the Graduate School of Management's
computer system, shutting down teaching labs and
locking up hundreds of students' computers.
Many security experts attribute the rise in hacker
attacks to the growth of the Internet.
Until this year, the majority of break-ins were
believed to be inside jobs, often the work of
disgruntled former or current employees. Now, more
than half of them come from outside over the
Internet, according to a survey released last week by
the Computer Security Institute.
"The fact that virtually everyone is connected to the
Internet now makes it a lot easier to gain an access
point, which, if you studied hacking at all, is critical,"
said Lars Klander, author of "Hacker Proof: The
Ultimate Guide to Network Security."
But access is only part of the equation.
The proliferation of Internet sites devoted to hacking
has enabled even those who know little about
computers to break into sophisticated networks. And
the information is easy to find, with even the
legitimate online searching guides providing easy
access.
For example, Yahoo, one of the largest indexes to
Web sites, now holds links to more than 300 sites
devoted to hacking, including direct connections to
some of the world's most infamous hackers.
With a few clicks, any computer neophyte can
retrieve programs crafted by the hacking elite,
sophisticated break-in tools and step-by-step
instructions.
"One of the reasons it's growing is there are many
more places to go to get this information," said Ira
Winkler, a hacker for hire and author of "Corporate
Espionage."
And the script kitties don't seem deterred by stiff
federal penalties if they get caught. Violators face up
to five years in prison.
But hackers couldn't wreak nearly as much havoc if
systems administrators took precautions to plug holes
in their computer networks.
Such inattentiveness allowed security expert Peter
Shipley to break into the network of a major Orange
County company, which hired him to test its security.
Armed with only a laptop, the Berkeley computer
consultant gained access to research material worth
billions of dollars to competitors, he said. He declined
to identify the company.
"We hit every machine in eight hours," Shipley said of
the test last fall. "It took 24 hours for the system
operator to recognize we were there."
Winkler said last week's attack on UCI and more than
40 other universities and military computers exploited
well-known flaws in the Windows NT and Windows
95 operating systems.
Indeed, the CERT Coordinating Center at Carnegie
Mellon University in Pittsburgh the main
organization that tracks Internet security problems
issued an alert in November that identified the bug
and pointed to the fix in advance of last week's
attack.
Trouble is, many systems administrators ignored the
warning or were simply too busy to make the
suggested changes.
"We probably could be more systematic in continually
upgrading our defenses against Internet attacks," Bill
Parker, head of UCI's office of academic computing,
said last week. "The problem is ... there's a patch
coming out every two weeks. If you send out
emergency notices every two weeks, pretty soon no
one's listening."
Hackers who view themselves as purists the ones
who crack security codes and probe holes in
computer networks for kicks dismiss these pranks
as the immature acts of adolescents; the electronic
equivalent of a joy-ride.
Such high-profile attacks grab headlines coast to
coast. But aside from a little inconvenience, they're
pretty benign.
The most damaging attacks often go unreported.
More than six out of 10 corporations, financial
institutions and universities suffered security breaches
during the past year, according to the survey by the
Computer Security Institute in San Francisco.
But only 17 percent reported the electronic crime to
law enforcement. The rest kept mum, fearing
negative publicity. One unnamed company estimated
a break-in cost at $25 million.
As more business is transacted online, the lure grows
ever stronger for cybercrooks to seek trade secrets,
confidential information or credit card numbers,
experts say.
Some security experts don't expect the tide will turn
until corporate attitudes change. Coopers & Lybrand's
Boni said chief executives are leading the charge to
get online, placing a premium on transacting business
with customers electronically.
"The management priority is to get connected and fix
any security problems afterward," said Boni. "They
can't see security vulnerabilities until they show up on
the front page of the paper."
5.0 Defenstrator's Rant
=-=-=-=-=-=-=-=-=-=-=-=
This pathetic rant spouted by Defenstrator...
Those God-Damned Southerners
This could be like a seven-thousand part article, but it's not. This is
a one-time incident which I think is example of why we should blow the
living fuck out of the South. Even though I live there. A little note,
this takes place in Charlotte, North Carolina, when I was at work.
I was at work, minding my own damn business, when some lady comes in. I
was being all civil to her and stuff, when I was talking to my friend
about a 3-on-3 basketball tournament I was in on the previous weekend.
We came in 5th out of 100, not that you asked. But she overheard me,
and she says, "You know I coach in my church league.". I said, that's
great, but I didn't give a flying fuck. So I get back to yakking, the
usual "oh I put the shits on that guy", yadda yadda yadda. Then the
person speaks up again (notice I am being nice, not calling her a ho or
anything), and says to me, "Do you go to church?". I say yes, as I don't
want to lie (why the fuck not?) and it's not like I vehemently deny it,
or give a damn either way. So I still go back to talking and the bitch
won't leave me alone. She says, "What religion are you?". I say,
"Catholic", as if anyone really gives a damn, and my tone of voice says
I don't either.
So this being the South, she wants to press her religion on everyone she
meets, so she starts saying how great her church is, and by this time I
could start a jihad and blow the fucking thing up I'm so mad at it. So
she goes into the details of her church, which seems to be the social
life of half the people I meet, which is sad considering we have
professional sports (not NASCAR you redneck motherfuckers). Anyway,
I'm going to go into the details of it only because it is fresh in my
mind.
Her: We have a great youth group.
Me: (puzzled, doesn't know what the hell that is), That's wonderful
(enormous sarcasm)
Her: You can play basketball there.
Me: I can play basketball anywhere, stupid.
Her: Well, at least take this.
I thought it was going to be like a tip or something (I get tips
sometimes if I'm like real nice to the people because they know I work
for crap money), but, NO, it's a damned pamphlet. Like the Jehovah's
Witnesses, except I think it's a misdemeanor to shoot preachers here (at
least it was in New York). I look at the thing, the front says "If you
died today, would you go to HEAVEN (nice font thing) or HELL (font you
see like on married with children, stuff dripping off the letters).
Then the bitch finally leaves. My friends behind me are dying of
laughter, and I throw the pamphlet away and yell at them because they
didn't get someone to cart her away or something.
Anyway, the whole point of this is that I am sick and FUCKING tired of
Southerners pushing their values on stupid people, which are in
abundance in Charlotte. It's all in the papers, about how people's
moral values are decaying and they need to get back to God or something
like that. I mean, GIVE IT THE FUCK UP! If you asked a random
Southerner what the largest religion in the world was, money says they
would say "Baptist". These people are ones, after hearing all the wack
places I've been (a lot, believe me), one person spoke up and said "I've
been to Nebraska and the beach!". Damn naive bastards. One person who
I know has never been out of his COUNTY. GAH. Who's the stupid one
now, motherfucker? They think Singapore (where I used to live, yes the
ass whooping country, Michael Fay is a drunken fuck) is a place "down in
China somewhere". Then they get in "thair truuuck" and "git awn down"
to their church to do whatever the hell it is they do, push Southern
Baptism on Northern Brooklynite motherfuckers like me.
This person obviously felt the need to "save" me by trying to convert me
to another faceless follower, spouting Bible verses and condemning
everyone else. I don't fucking think so. So, leave me alone and you'll
be alright. I can make decisions for myself, fuckheads.
-defenestrator
---------------------------
[email protected]
http://piss.home.ml.org
6.0 Exploiting WinGates For Fun And Profit
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Kalony's fr0 is responsible for this...*
[*=Used w/out Kalony's permission]
Overview
WinGate is software that allows multiple users to simultaneously be
connected to the internet via nearly type of connection (modem, ISDN, LAN).
WinGate runs on any Win95 or NT system. Anybody can share a connection with
the WinGate host as long as they are running any type of client computer
running TCP/IP.
Finding a WinGate Server
Finding a WinGate server is incredibly simple. First off, you get a
WinGate scanner. Basically all a WinGate scanner does is attempt a connection
to port 23 on all the hosts under a certain server (i.e. 1.1.1.*) looking for
a WinGate> prompt. When it receives a WinGate> prompt it records the host.
That is what you are looking for. You can actually do it manually by
telnetting into all 255 hosts. :) But that might be a little time consuming.
WWW Proxy
To use WinGate as a WWW Proxy server in Netscape 3.x, go to Options in
the menubar, then click Network Preferences. Click the Proxies tab then make
sure the radio button corresponding with Manual Proxy Configuration is filled,
then click View.... In the HTTP Proxy: box input the WinGate server. In
the Port: box input 80. Click OK, then OK again. Try to go to a web page.
The most common error you'll receive is Socket Error. This doesn't mean that
your proxy isn't setup correctly, it just means that something screwed up.
You'll get that error every time you attempt to go to that page. I really
don't know why. Try a different page, try
http://www.wingate.com. That's
always worked for me when I got the proxy setup correctly. Now onto FTP
proxies.
Telnet
WinGate can also be used in shell hopping. Telnet to your WinGate
host. You will get a WinGate> prompt then type "telnet <IP>". Simple as
that.
IRC
This is one of the most entertaining ways of using WinGate. Start up
your IRC client, then follow these steps:
1. type: /server <WinGate host> 23
2. type: /raw nick <nickname>
3. type: /raw user <ident> <host> <server> <Real Name>
Number 1. and 2. are self explanatory, number 3. may take a little explaining.
Your ident is what comes before your server when somebody /whois's you. Such
as:
[email protected]
Your host can be anything you decide, they expect you to put your host, but in
reality, you can put 'shit' if you want to.
Your server is the same as the host, they expect the server, but will accept
'shit.'
Your real name is fairly self explanatory except for one thing. If it is a
single word, such as 'George', then you don't need to read the following. If
it is two words, however, you will need to place a colon (:) in front of your
real name.
Example: /raw user ident host server :George Wilkes
Summary
That about wraps it up. I didn't discuss it, but WinGate can be used
for FTP and a firewall also. Try to figure it out yourself. Anyway, have fun
and don't hurt yourself.
7.0 DEF CON 6.0 Announcement v1.0
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Handed over by the one and only Dark Tangent...
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
DEF CON 6.0 Convention Announcement #1.00 (03.27.98)
July 31-August 2 @ The Plaza Hotel and Casino in Las Vegas
XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON 6.0 Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON 6.0 Convention Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON 6.0 Convention Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON 6.0 Convention Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON 6.0 Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON 6.0 Convention Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON 6.0 Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON 6.0 Convention Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON 6.0 Convention Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON 6.0 Convention Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON 6.0 Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON 6.0 Convention Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON 6.0 Convention Announcement
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
IN SHORT:--------------------------------------------------------------------
WHAT: Speakers & partying in Vegas for hackers from the world over.
WHEN: July 31st - August 2nd
WHERE: Las Vegas, Nevada @ The Plaza Hotel and Casino
COSTS: $40 at the door
MORE INFO:
http://www.defcon.org/ or email
[email protected]
IN LONG:---------------------------------------------------------------------
It's time to brave Las Vegas again for DEF CON! This is an initial
announcement and invitation to DEF CON V, a convention for the "underground"
elements of the computer culture. We try to target the (Fill in your
favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers,
Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks,
Futurists, Artists, Criminally Insane, Hearing Impaired. It seems that
books about the culture are becoming more popular, so of course reporters
are also welcome. You won't be hurt. I promise. Just bring cash for
drinks.
So you heard about DEF CON V, and want to hit part 6.0? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? You want to do weird shit _away_ from the hotel
where you can't get me in trouble? You have intimate knowledge of the SWIFT
network, and want to transfer millions of dollars to the DEF CON account?
Then you're just the person to attend!
What DEF CON is known for is the open discussion of all ideas, the free
environment to make new contacts and the lack of ego. More people have made
great friends at DEF CON over the years than my brain can conceive of. DEF
CON is also known for letting the "Suits" (Government / Corporate) mix with
everyone and get an idea of what the scene is all about. The media makes an
appearance every year and we try to educate them as to what is really going
on. Basically it has turned into the place to be if you are at all
interested in the computer underground.
SPEAKERS:--------------------------------------------------------------------
Over the years DEF CON has had many notable speakers. This year there will
be more of an emphasis on technical talks. There will be a separate smaller
room for break-out sessions of more specific topics. While the talks of the
past have been great, it always seems some tech people drop out and general
talks fill in. I will load it tech heavy so when people do drop out there
will still be plenty of meat left for the propeller heads.
There will be speaking on all day Saturday and Sunday. About 20 people will
speak, plus smaller tech sessions. If you are interested in speaking or
demonstrating something please contact me.
Current speakers include:
[> If you are interested in speaking please contact me at
[email protected]
[> Jennifer Grannick, Attorney at Law.
[> Peter Shipley,
[>
SCHEDULE:--------------------------------------------------------------------
FRIDAY July 31st:
Network Setup, Sign in, Informal PGP Keysigning at the "PGP table",
Lots of Partying. Capture the Flag Contest Starts earlier this year.
10:00 - Doors open, sign in starts
16:00 - Capture the Flag III starts
22:00 - 23:59 Hacker Jeopardy Starts.
SATURDAY August 1st:
Speeches, people selling stuff, Capture the Flag, The DEF CON shoot, other
special events to be announced.
10:00 - 10:50
11:00 - 11:50
12:00 - 12:50
13:00 - 13:50
14:00 - 14:50
15:00 - 15:50
16:00 - 16:50
17:00 - 17:50
Saturday Breakout Tech Sessions:
22:00 - 23:59 Final rounds of Hacker Jeopardy.
SUNDAY August 2nd:
Wrapping up Capture the Flag, award giveaways, demonstrations to be
announced.
10:00 - 10:50
11:00 - 11:50
12:00 - 12:50
13:00 - 13:50
14:00 - 14:50
15:00 - 15:50
Sunday Breakout Tech Sessions:
Breakout Tech Sessions:
16:00 Awards for Capture the Flag
End of it all, cleanup, etc. See you all next year!
EVENTS:----------------------------------------------------------------------
[> BLACK & WHITE BALL
Saturday evening 19:30-20:00 in the speaking hall:
New Rule: No one allowed into the Black & White hall with out
dressing up one way or the other. You can always hang out in the
main hall if you don't like it!
I have learned from last year, and have refined the Black & White
Ball for this year. For the last two years at DEF CON there has
been a sort of unspoken Saturday night dress up event. People have
worn everything from party dresses and Tuxedoes to AJ's ultra pimp
Swank outfit with tiger print kilt. Wear your cool stuff
Saturday night, be it gothic, PVC vinyl, or Yakuza looking black MIBs.
No prizes, just your chance to be the uber-bustah pimp.
Live DJ action, a cash bar and some cooling out to be had by all.
[> THE TCP/IP DRINKING GAME:
If you don't know the rules, you'll figure 'em out.
[> CAPTURE THE FLAG:
[> NET CONNECTION AND TOPOLOGY:
[> 6th ANNUAL SPOT THE FED CONTEST:
The ever popular paranoia builder. Who IS that person next to you?
"Like a paranoid version of pin the tail on the donkey, the
favorite sport at this gathering of computer hackers and phone
phreaks seems to be hunting down real and imagined telephone
security and Federal and local law enforcement authorities who the
attendees are certain are tracking their every move.. .. Of course,
they may be right."
- John Markhoff, NYT
Basically the contest goes like this: If you see some shady MIB
(Men in Black) earphone penny loafer sunglass wearing Clint Eastwood
to live and die in LA type lurking about, point him out. Just get
my attention and claim out loud you think you have spotted a fed.
The people around at the time will then (I bet) start to discuss the
possibility of whether or not a real fed has been spotted. Once
enough people have decided that a fed has been spotted, and the
Identified Fed (I.F.) has had a say, and informal vote takes place,
and if enough people think it's a true fed, or fed wanna-be, or
other nefarious style character, you win a "I spotted the fed!"
shirt, and the I.F. gets an "I am the fed!" shirt.
NOTE TO THE FEDS: This is all in good fun, and if you survive
unmolested and undetected, but would still secretly like an "I am
the fed!" shirt to wear around the office or when booting in doors,
please contact me when no one is looking and I will take your
order(s). Just think of all the looks of awe you'll generate at
work wearing this shirt while you file away all the paperwork
you'll have to produce over this convention. I won't turn in any
feds who contact me, they have to be spotted by others.
DOUBLE SECRET NOTE TO FEDS: This year I am printing up extra "I
am the Fed!" shirts, and will be trading them for coffee mugs,
shirts or baseball hats from your favorite TLA. If you want to
swap bring along some goodies and we can trade. Be stealth about
it if you don't want people to spot you. Agents from foreign
governments are welcome to trade too, but I gotta work on my mug
collection and this is the fastest way.
NEW THIS YEAR: Fashion Tips for Feds (courtesy of Wrangler)
It was like shooting fish in a barrel last year, so to make things
tougher here are some fashion tips to better hide your presence.
number five - Vegas, not Maui; lose the Hawaiian shirt!
number nine - clothes should disguise your physically fit body
number twelve - leather, guys, leather
number nineteen - only smile at chicks, not all the time
[> Spot the Screenwriter Contest
So basically if you see some very well dressed, Gucci loafer
wearing, well tanned, double decaf expresso drinking person
packing a laptop beyond the budget of your average hacker,
technology journalist, or "I'm not a fed, I'm a hacker, and
I try very hard to look like a hacker, Fed" asking lots of
questions that could have already answered in 'Secrets of
an Uber-Hacker' Then you may have spotted a screenwriter!
Again the discussion can start if this person is truly a
screenwriter and not a vacationing member of the board of
a recently IPO'd Silicon Valley start-up! :)
After voting, If the screenwriter fesses up and admits to
scouting for information on hackers, That lucky resident
living near the corner of Hollywood & Vine will get a...
'I am the screenwriter' shirt, (Design being worked on)
Followed up by the lucky person who likely reads Variety
as much as Wired, will recive the 'I spotted the screenwriter!'
t-shirt (Design also being worked on)
Note to screenwriters and journalists thinking about taking
up screenwriting, I am really doing this insure that hacking
and bleeding egde technology gets reported correctly and not
like some sort of the privacy sucking Flash Gordon wizzbang
dohicky that most of the technology gets perceive as by
Joe Couch-Potato and Joe Senator. I also need more leads
for my portfolio at the Hollywood Stock Exchange. :)
http://www.hsx.com/
Comments, Complains, and Flames to the usual address,
and you wouldn't be reading this if I was already in
your killfile. Cheers! William Knowles
[email protected]
HOTELS:----------------------------------------------------------------------
[> Book your room NOW!!! We have a block of rooms, but it is first come,
[> first served. Rooms get released about one month before the convention.
[> Book by June 9th or risk it. The room rates are quite cool this year.
Jackie Gaughan's Plaza Hotel
Number One Main Street in the Old Downtown Las Vegas Reservations
Phone Number: 1-800-634-6575
When reserving a room reference the "Network Security Solutions"
conference.
There are four room sizes available. On Friday and Saturday
night they are $50 for a single/double room, $60 for a 1 king bed
room, $100 for a suite with 1 bedroom and 1 king sized bed or 2
queen sized beds and $150 for two bedrooms with 1 king and two
queens.
STUFF IN VEGAS:--------------------------------------------------------------
URLs
Listings of other hotels in Las Vegas, their numbers, WWW pages, etc.
http://www.intermind.net/im/hotel.html
http://vegasdaily.com/HotelCasinos/HotelAndCasinos/CasinoList.html
VENDORS / SPONSORS / RESEARCH:-----------------------------------------------
If you are interested in selling something (shirts, books,
computers, whatever) and want to get a table contact me for costs.
If you have some pet research project and you want to have the
participants fill out anonymous questioners please contact me for
the best way to do this.
If you want to sponsor any event or part of DEF CON 6.0 in return
for favorable mentions and media manipulation please contact me.
This year Secure Computing Corporation, Index Publishing Group, The
London Pirate Radio show InterFace, and Some Caffinated Drink
Company are currently sponsoring events and atmosphere.
MORE INFO:-------------------------------------------------------------------
[> DEF CON Voice Bridge (801) 855-3326
This is a multi-line voice bbs, VMB and voice conference system.
There are 5 or so conference areas, with up to eight people on each
one. Anyone can create a free VMB, and there are different voice
bbs sections for separate topics. This is a good neutral meeting
place to hook up with others.
[> WWW Site
http://www.defcon.org/defcon-6-pre.html
Convention updates and archives from previous conventions are housed
here. Past speakers, topics, and stuff for sale. Also a growing
section of links to other places of interest and current events.
This is the main source for all convention updates. Hotel contact
information, room rates, updated speakers lists, etc. can be found
here.
[> MAILING LIST
Send email to
[email protected] and in the body of the message
include the following on a separate line.
subscribe dc-stuff
dc-stuff is related to general conversation, planning rides and
rooms, etc. Be warned! When the convention time is near the list
starts to generate quite a bit of traffic (As if it doesn't now!)
[> The DEF CON Shoot Event
Catch all the information and links necessary to participate at this
years official DEF CON Shoot.
http://afropimps.com/dcshoot/
[> The DEF CON 6.0 Car ride sharing pages:
Boogah187 has set up an Orange County California Ride share page.
http://www.fortunecity.com/skyscraper/lynx/281/index.htm
The Colorado 303 Area Code ride sharing page by the alien:
http://www.dim.com/~rage/defcon/
BroncBuster is in effect with the First Annual Northern California
Ride Sharing page at
http://www.showdown.org/def-con-VI.html
The 604/250 Area Code (British Columbia, Canada) 2600 chapter
welcomes you to share ride, room, and board to DEFCON and back.
Hosers Kick Ass. No NT people.
http://web.uvic.ca/~fool/defcon.html
Email
[email protected] if you are interested in his ride
caravan to Defcon from Phoenix and surrounding cities in the 602.
[> EMAIL
[email protected]
Send all email questions / comments to
[email protected]. It has
been said that my email is monitored by various people. If you want
to say something private, please do so with my pgp key (At the
bottom of this announcement) I usually respond to everything, if
not I'm swamped or had a system problem.
DO YOU WANT TO HELP?---------------------------------------------------------
Here is what you can do if you want to help out or participate in
some way:
Donate stuff for the continuous giveaways and the various contests.
Got extra ancient stuff, or new cool stuff you don't use anymore?
Donate it to a good cause! One person was very happy over winning
an osborne "portable" computer.
ORGANIZE sharing a room or rides with other people in your area.
Join the mailing list and let people know you have floor space or
some extra seats in your car. Hey, what's the worst that can
happen besides a trashed hotel room or a car-jacking?
CREATE questions for hacker jeopardy (you know how the game is
played) and email them to
[email protected]. No one helped out last
year, so this year let's try. Everything from "Famous narks" to
"unix bugs" is fair game.
BRING a machine with a 10bt interface card, and get on the local
network, trade pgp signatures, etc.
8.0 Ask The Magic 8-Ball
=-=-=-=-=-=-=-=-=-=-=-=-
As interviewed by Boogah187
Boogah - Hello 8-Ball. As of late you've enjoyed a renaissance as a prophet to
a whole new generation. Is this renaissance appreciated?
8-Ball - My sources say no
B - So, are you trying to say that people are draining your psychic
ability to predict future events?
8 - As I see it yes
B - Well, you are very aware that you are the last bastion of truth on
the Earth. Would you mind answering some questions for us?
8 - Reply hazy try again
B - I was simply wondering if you would answer some questions for us.
8 - Yes
B - First question - Is Bill Gates the anti-christ?
8 - It is decidedly so
B - Do you suggest we use an alternate OS such as LINUX or Free-BSD?
8 - As I see it yes
B - Will it save our souls if we all do so immediately?
8 - My reply is no
B - So anyone who's used a MS product is doomed?
8 - It is decidedly so
B - Bummer. Next topic - Is the world safe from alien invasion?
8 - Better not tell you now
B - Can you tell me anything on the topic?
8 - Most likely
B - It just matters on the question?
8 - Yes definitely
B - Hrm... So should I go max out my credit cards and spend my last days
on a remote island?
8 - As I see it yes
B - Well, do we have at least 2 months until the pending invasion?
8 - Don't count on it
B - Shit, are you yanking my chain 8-Ball?
8 - Yes
B - You asshole. *Boogah throws 8-Ball across the room in rage* Are you
sorry about that?
8 - Signs point to yes
B - Good you pig fucker. Now gimme some straight answers. Okay?
8 - My reply is no
B - Dammit! I knew if I threw you I'd hurt your feelings and you'd be
upset with me. I'm sorry. Apology accepted?
8 - It is decidedly so
B - Okay. Much better. Next question - Did OJ kill his wife?
8 - Yes definitely
B - Did Kato assist Mr. Simpson in the murders?
8 - Don't count on it
B - Interesting. I have a theory that OJ acted alone. However I also
believe that he was set-up and brainwashed by the New World Order
to kill Ron Goldman therefore stopping the world from getting a
powerful serum that cured AIDS, impotence, genital warts, and nicotine
addiction. Does this sound far fetched to you?
8 - My sources say no
B - Woah, shit. Deep. You heard it here first folks. Well that's all the
time we have for this session. Be sure to come back next time when we
ask the 8-Ball more pertinent questions. Good night and God speed.
9.0 Closing Comments
=-=-=-=-=-=-=-=-=-=-
Put forth by Boogah187
Well, we're at the end of another issue. I'll cut through the bullshit and just
hand out the special thanks, fuck you's and the updated staff list.
Special Thanks:
---------------
Petty Larceny - For kicking me in the ass to get this done
Unkie noid - For landing me that DEFCON 6 staff position
Dark Tangent - For letting noid talk him into letting me have a DC 6 staff
position
Enigma - Yeah, Enigma. If it wasn't for him I wouldn't have been inspired
to make my car caravan page. Thanks for having enough capacity for
allowing me to loathe your page.
My Girlfriend - Because I'm whooped.
Fuck You's:
-----------
RBCP, Logic Box and all their loser friends - No comment.
The (vee-pee) Army [Staff]:
---------------------------
Active Duty
===========
Boogah187 - Publisher, editor, promotional whore
Petty Larceny - Co-Editor, contributor
Unkie noid - Contributor, mentor
Defenstrator - Contributor
MIA
===
DanoZano - Contributor
The Captain - Contributor
MySTiK - Contributor
Xor - Contributor
Bobbillama - Contributor
That's it... Go away now.
[EOF]