Download Untitled - beardyjay
Transcript
method but Novell would rather have you do this than h t t p : / / w w w. eff. o rg/p u b / P u b l i c a t i o n s/ E -j o u r n a I s / admit to having a back door into every Netware server. ) Cu D_and_hacker_zines/Inform/inform-3 . gz Another important thing to note is that not only will and at other archives. ) Netware report failed login attempts to a fi le, but also to I do not now go by, nor have I ever gone by, nor do the System Console (by default) with the Network ID I intend to go by the pseudonym "Dr. No". Furthermore, ( w i re number) and ethernet card address. So be pre to the best of my knowledge, I have never conversed pared to spoof IPX packets with Packet Signatures with anyone calling themselves "Dr. No". ( something I woul d personally l i ke to see ) . My permission was neither sought nor obtained for Trap's article does make o n e point very clear to the publication of this article in 261111. Novell CNAICNE types though ... people do think about [ hereby demand public apologies/retractions/cor how to break into Netware systems, however misin rections from those parties who perpetrated this fraud. [ formed they may be. I woul d hope that before Novell also request that these apologies appear as prominently Hack II comes out, that Trap gets some experience and as the plagiarized article in the next issue of 26110 mag- does his I'eseal'clr! azine. GandoIf Words of Praise E ;n ery W. Lapinski ([email protected]) We contacted the "authol' ' ' of this al'ticle alld got thefiJI/owillg I'espollse: Dear 2600: I just bought my first copy of your mag. Wow. Nice emmanuel and the entire staff of 2600: to know there are people out there who are actively i must admit that i, Dr. No, pitifully embarrassed defending the liberty that this country was founded myself and the magazine 2600 with this plagirized arti upon - liberty that has since become corrupted by cle. Why you might ask? hmm, that is tough. Who power-hungry feds. knows what goes on in a young persons head when such Of course that's not the real reason I picked out your an easy thing can be done. [ guess i wished i were in the mag among the hundreds of glossy "commerciali zed" spotlight . . . Although i did plagirize, i also did do computer selections. It's nice to finally have a publica research on this topic. [ regret what i have done . . . i was tion that isn't totally controlled by industry and political not trying to take anything away from Emery correctn�ss. Lapinski, but just try to spread knowledge ( i n a quite What a thri l l it was to open it up and find aclllal W. interesting way ) . So, i must apologize, officially to W. "paper" white pages fi l led with nothing but clear-cut Emery i n formation. I also appreciate your boldness concerning hacker/information seeker community for this fraudu Lapinski, 2600 Magizine, and the entire "controversial" issues such as phreaking and other so lent act, all i can say is that i was nieve and disrespect called i llegal activities. These laws against us "crimi ful . . . and i have no excuse. That is that. nals" are nothing but the feds' way of protecting indus Regretfully, try giants' profit margins - it is a travesty of free com Dr. No munication and liberty that there must be a group of people who are forced to break laws and be a secretive society all in the pursuit of knowledge. Tt :v IWl'd/",. us to imagine how someone could selld ill an al'ticle wI'itten hy anothel' pel'SOIl and claim it as The Cyber Hitchhiker theil'S. With tells of thol/sands '!f ,.eadel's Q/m/lld the wm'id, Words of Shame the odds of getting away with it al'e pl'etty slim. In mIl' 1 2 yeal's ,!fpuhlishing. this is thefil'st case ofthis that has come to 0/11' attention. Since it :v not possihlefol' We I'ecent(v I'eceived this lettel' fmm a jllSti(iah(v 1/S to know if an al'ticle has heell lif/ed fivm somehody 01' someplace outside upset I'eadel': (Ifthe hackel' 11'01'/£1, we I'e(v on the honesty of au,. wI'ite/'s alld the l'igilance of au,. I'eader:v. Dear 2600: We 'I'e so/'/y this had to happen and we will do eve,.y The most recent I ssue of 261111 contains an article entitled " Understanding Verifone Machines" attributed thing in OUI' powel' to keep this kind of thing out '!f our pages. to "Dr. No" on the Verifone credit card authorization machine. ( Vo l ume 1 2, Number 22-24) 4, Winter 1 995-96, pps Immortalize Yourself Except for the first and last paragraph. this arti cle is a verbatim dupl ication of an article I wrote and Send youI' letters to: published, including A S C I I diagrams, under my own name to alt.hackers i n 1 992 entitled "Credit Card Authorization Machines". My article was later pub l i shed in I ssue 03 of the e-zine Tnf"l'mlltik (available at Page 52 2600 Magazine 2600 Editor;al Dept. P.O. Box 99 Middle Mand, NY 11953-0099 Spring 1996