--------------------------------------------------------------------- ######### ############ ######### ########### ############ ########### #### #### #### #### #### #### #### #### #### #### #### #### ######## ########### #### #### ######## ######### #### #### #### #### #### #### #### #### ########### #### #### ######### #### #### DIGITAL FREE PRESS --------------------------------------------------------------------- Volume 1.0 Issue 5.0 --------------------------------------------------------------------- * A Publication of The Underground Computing Foundation (UCF) * * Send Subscription Requests to: dfp-req@underg.ucf.org * * Send Submissions to: hackers@underg.ucf.org * * Editor: Max Cray (max@underg.ucf.org) * Back issues can be found in the CUD archives at ftp.eff.org * Underground Computing Foundation BBS * (512) 339-8221 --------------------------------------------------------------------- Statement of Purpose and Disclaimer The Digital Free Press is an uncensored forum to document the exploration of the world of modern technology. It is published under the premise that it is better to know, rather than not know, so no attempt is made to hide any information. Information is a double edged sword. It is neither good nor bad, and can be used for either. Use any information provided at your own risk. Articles are the opinion of the authors listed, and not of the editor (unless of course the editor wrote it). Information is not always verified for accuracy. --------------------------------------------------------------------- --------------------------------------------------------------------- In this Issue: 1. Mail to Max 2. Excerpt from 'The Hacker Crackdown' by Bruce Sterling 3. Letter from Famous Hacker to Not So Famous Cracker 4. (USL vs. BSDI) & CMU (Mach) by Max Cray 5. Windows NT Info by Max Cray 6. Game Cracking FTP Site 7. New Cypherpunks Mailing List 8. How to get software via Mail by Ram Raider --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- Mail to Max: ----------- From: gator.rn.com!sara (Sara Gordon) Subject: vx bbs in sofia To: underg!max@iuvax (Max Cray) Date: Thu, 21 May 92 0:16:44 EST X-Mailer: ELM [version 2.3 PL11] you have incorrect information. todor's system is down due to loss of hardware at last report. if you dial, you will get only the satellite noise. he has not any new viruses anyway. -- _____________________________________________________________________ well its too late, tonite, to drag the past out into the light. we're one, but we're not the same... ________________________sara@gator.rn.com____________________________ [Editor's comment: Who is Sara really, and how come the dudes at Phrack do not like her? - Max] --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- [Editor's note: I got a book cover from Bruce when I met him at an EFF-Austin CyberDawg Event last month. The following excerpts come from that cover. The book should be released by the time you read this: Bantam Books, 666 Fifth Avenue, New York, New York, 10103.] --------------------------------------------------------------------- THE HACKER CRACKDOWN Law and Disorder on the Electronic Frontier by Bruce Sterling -- The AT&T long distance network crashes, and millions of calls go unanswered. A computer hacker reprograms a switching station, and calls to a Florida probation office are shunted to a New York phone-sex hotline. An underground computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, making it available to anyone who dials up. How did so much illicit power reach the hands of an undisciplined few - and what should be done about it? You are about to descend into a strange netherworld - one that sprang into existence when computers were first connected to telephones. This place has no physical location; it exists only in the networks that bind together its population. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals to those known only by their _noms de net_: denizens like Knight Lightning, Leftist, Compu-Phreak, Major Havoc, and Silver Spy; groups like the Lords of Chaos, Phantom Access Associates, Shadow Brotherhood, and the Coalition of Hi-Tech Prates. This is not normal space, but "cyberspace." And if you use a computer, cyberspace is moving inexorably closer to you with each passing day. -- This is a book about cops, and wild teenage whiz-kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and hippies, and high-tech millionaires, and game hobbyists, and security experts, and Secret Service agents, and grifters, and thieves. This book is about the electronic frontier of the 1990s. It concerns activities that take place inside computer and over tele- phone lines - "Cyberspace." People have worked on this "frontier" for generations now. Some people became rich and famous from their efforts there. Some just played in it, as hobbyists. Others soberly pondered it, and wrote about it, and regulated it, and negotiated over it in international forums, and sued one another about it in gigantic, epic court battles that lasted for years. And since the beginning, some people have committed crimes in this place. This is the story of the people of cyberspace. -- The Computer Fraud and Abuse Task Force, led by federal prosecutor William J. Cook, had started in 1987 and swiftly became one of the most aggressive local "dedicated computer-crime units." Chicago was a natural home for such a group. The world's first computer bulletin- board system had been invented in Illinois. The state of Illinois had some of the nation's first and sternest computer crime laws. Illinois State Police were markedly alert to the possibilities of white-collar crime and electronic fraud. Throughout the 1980s, the federal government had given prosecutors an armory of new, untried legal tools against computer crime. Cook and his colleagues were pioneers in the use of these new statutes in the real-life, cut-and-thrust of the federal courtroom. On October 2, 1986, the U.S.Senate passed the Computer Fraud and Abuse Act unanimously, but there had been pitifully few convictions under this statute. Cook's group took their name from this statute, because they were determined to transform this powerful, but rather theoretical act of Congress into a real-life engine of legal destruction against computer fraudsters and scofflaws. It was not a question of merely discovering crimes, investigating them and then trying to punish their perpetrators. The Chicago unit, like most everyone else in the business, already _knew_ who the bad guys were: the Legion of Doom, and the writers and editors of PHRACK. The task at hand was to find some legal means of putting these characters away. Fry Guy had broken the case wide open and alerted telco security to the scope of the problem. But Fry Guy's crimes would not put the Atlanta Three behind bars - much less the whacko underground journalist of PHRACK. So on July 22, 1989, the same day that Fry Guy was raided in Indiana, the Secret Service descended upon the Atlanta Three. Likely this was inevitable. By the summer of 1989, law enforcement was closing in on the Atlanta Three from at least six directions at once. First, there were the leads from Fry Guy, which had led to the DNR registers being installed on the lines of the Atlanta Three. The DNR evidence alone would have finished them off, sooner or later. But second, the Atlanta lads were already well known to Control-C and his telco security sponsors. LoD's contacts with telco security had made its members overconfident and even more boastful than usual; they felt that they had powerful friends in high places, and that they were being tolerated openly by telco security. But BellSouth's Intrusion Task Force were hot on the trail of LoD and sparing no effort or expense. The Atlanta Three had also been identified by name and listed on the extensive antihacker files maintained, and retailed for pay, by private security operative John Maxfield of Detroit. Maxfield who had extensive ties to telco security and many informants in the under- ground, was a bete noire of the PHRACK crowd, and the dislike was mutual. The Atlanta Three themselves had written articles for PHRACK. This boastful act could not possibly escape telco and law enforcement attention. "Knightmare," a high school-age hacker from Arizona, was a close friend and disciple of Atlanta LoD, but he had been nabbed by the formidable Arizona Organized Crime and Racketeering unit. Knightmare was on some of LoD's favorite boards - "Black Ice" in particular - and was privy to their secrets. And to have Gail Thackeray, the assistant attorney general of Arizona, on one's trail was a dreadful peril for any hacker. And perhaps worst of all, Prophet had committed a major blunder by passing an illicitly copied BellSouth computer file to Knight Lightning, who had published it in PHRACK. This as we will see, was an act of dire consequence for almost everyone concerned. On July 22, 1989, the Secret Service showed up at Leftist's house, where he lived with his parents. A massive squad of some twenty officers surrounded the building: the Secret Service, federal marshals, local police, possibly BellSouth telco security; it was hard to tell, in the crush. Leftist's dad, at work in his basement office, first noticed a muscular stranger in plain clothes crashing through the backyard with a drawn pistol. As more strangers poured into the house, Leftist's dad naturally assumed there was an armed robbery in progress. Like most hacker parents, Leftist's mom and dad only had the vaguest notions of what their son had been up to all this time. Leftist had a day job repairing computer hardware. His obsession with computers seemed a bit odd, but harmless enough, and likely to produce a well paying career. The sudden, overwhelming raid left Leftist's parent traumatized. Leftist himself had been out after work with hos co-workers, surrounding a couple of pitchers of margaritas. As he came trucking on tequila numbed feet up the pavement, toting a bag full of floppy disks, he noticed a large number of unmarked cars parked in his driveway. All the cars sported tiny microwave antennas. The Secret Service had knocked the front door off its hinges, almost flattening his mom. Inside, Leftist was greeted by Special Agent James Cool of the U.S. Secret Service, Atlanta office. Leftist was flabbergasted. He'd never met a Secret Service agent before. He could not imagine that he'd ever done anything worthy of federal attention. He'd always figured that if his activities became intolerable, one of his contacts in telco security would give him a private phone call and tell him to knock it off. But now Leftist was pat-searched for weapons by grim pro- fessionals, and his bag of floppies was quickly seized. He and his parents were all shepherded into separate rooms and grilled at length as a score of officers scoured their home for anything electronic. Leftist was horrified as his treasured IBM AT personal computer, with its forty-meg hard disk, and his recently purchased 80386 IBM clone with a whopping hundred-meg hard disk both went swiftly out the door in Secret Service custody. They also SEIZED all his disks, all his notebooks, and a tremendous booty of dog eared telco documents that leftist snitched from trash Dumpsters. Leftist figured the whole thing for a big misunderstanding. He'd never been into _military_ computers. He wasn't a spy or a Communist_. He was just a good ol'Georgia hacker, and now he just wanted all these people out of the house. But it seemed they wouldn't go until he made some kind of statement. And so, he leveled with them. And that, Leftist said later from his federal prison camp in Talladega, Alabama, was a big mistake. -- Your guide on this journey is bestselling science fiction author and longtime computer user Bruce Sterling, who was galvanized into action following the massive "hacker crackdowns" of 1990, in which law enforcement officers executed search warrants across the country against law breakers - and suspected lawbreakers - in the computer underground. In THE HACKER CRACKDOWN, Sterling - respected by hackers, law officers, and civil libertarians alike - uses his unique reportorial access and his considerable powers as a novelist to weave a startling narrative that informs, compels, and appalls. Sterling has researched all corners of this challenging and contro- versial new world for this book. In it we meet outlaws and cops, bureaucrats and rebels, geniuses and grifters: all denizens of a dazzling electronic land, a vast and fascinating new frontier equally threatened by outlawry and government intervention. THE HACKER CRACKDOWN is a laser-sharp dispatch from the edge of tech- nology - and the edge of freedom. BRUCE STERLING is the bestselling co-author (with William Gibson) of THE DIFFERENCE ENGINE. His solo novels include INVOLUTION OCEAN, THE ARTIFICIAL KID, SCHISMATRIX, and ISLANDS IN THE NET. He edited MIRRORSHADES, the definitive "cyberpunk" anthology. He lives with his family in Austin, Texas. -- "Sterling artfully separates myth from fact and does justice to both in the chaotic world of the electronic frontier. You must read this for the real story about hackers, cops, and the opening of cyber- sapce." Mitch Kapor Founder of Lotus Development Corp President of Electron Frontier Foundation -- "A fascinating evaluation of high-tech crime." Steven R. Purdy Retired U.S. Secret Service (Fraud Division, Electronic Crimes) Former Chairman, Federal Computer Investigation Committee -- "I learned a lot of things I didn't know from this book." "Lex Luthor" Founder "Legion of Doom" -- "Is that really Knight Lighting on the cover?" "Max Cray" Editor Digital Free Press --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- LETTER FROM FAMOUS HACKER TO NOT SO FAMOUS CRACKER The password file on an ordinary UNIX is called /etc/passwd. However, Suns have another separate file which is shared. People have been moving that file around, and I'm not sure under what name it would appear these days except on the server, where (I believe) only root can log in. I don't know the details of how the machines share their passwd file. That software is proprietary, and I don't look inside it because I don't want to be sued someday for writing free software to do such a thing. I can't help you get into MIT. I don't have any connection with MIT. MIT lets me and the other GNU people use their offices and machines because they like the free software that we write. I can make a legitimate account for you, on the AI lab machines at least. However, it seems to me that you may not really understand what to do with an account once you have one. Judging from the files you have, the only thing you have been doing with my account is looking for other accounts whose passwords you can guess. I don't think this is a good sign. Please don't misunderstand. I don't think it is evil to break security. You can see from the way I set my password how much I care about security. However, I think it is bad for your own head to be focused on security breaking. What I'm worried about is whether you can get your head out of there and into a better place to be. The security breaking game is something that you "play" against other people. They try to keep you out, and you try to get in. Playing this game, you can get stuck in thinking in terms of conflict and of who is going to win. This isn't good for your head. It also causes you not to see the interest in all the other things you can do with a computer. Like a master spy sneaking through the Grand Canyon and being too obsessed with spying to notice the beauty of the place. Collecting passwords is also futile. You seem to get someplace--such as, a machine you couldn't get to before--but one machine is much like another, and each place you go is no better than where you were before. Why try hard to get to someplace if it is only a way station to another way station to ..., and there is no destination, no goal? In a way, you are like a person who has one new car but can never drive to visit his friends or to go to work because he is constantly driving around looking for another similar car to buy as a replacement. I might try to break security if I had a constructive reason to, but it has been many years since I had one. So I don't think about breaking security, because I have so much else to do (writing free software). Anyway, I'm willing to make an account for you, but I'd like you to look into something to do with it besides look for other accounts to use. Also, if we are to be users together, then we need to start developing trust. For example, you could tell me how to phone you, so we can talk directly. (No danger in this, since you haven't broken any laws by logging in on my account or Puzo's. We both let you do it.) --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- (USL vs BSDI) & MACH by Max Cray Unix System Laboratories, the spinoff of the phone giant ATT has sued BSDI, a software company that has been creating a commercial version of unix from the free University of California at Berkeley source code. This lawsuit was a big discussion item in comp.org.eff .talk. I am not sure what to think of this lawsuit and I do not think it is clear what ATT is claiming. I do know that even if ATT is way off base with their claims that damage is being done to the computer community. For example Carnegie Mellon University makes a free operating system microkernal called MACH. A microkernal is just the core of an operating system; you also need a file system, etc. CMU also created a server from the free BSD unix code to provide unix services on top of MACH. The Free Software Foundation (FSF) was going to use the BSD server on top of MACH for its project GNU (GNUs Not Unix, recursive acronym, an MIT gimmick) operating system. The server was never officially released to the masses, because it was not easily installed, since there was no boot disk, etc. Anyway this is where the underground scene comes in. Just as it looked like we were all going to have a very sophisticated free operating system CMU decided to not continue the BSD server project for MACH, and to no longer make it available, because of the lawsuit over BSD code. Those that have the code are free to continue to use it. The code itself is difficult to get a hold of, since it was never actually officially released. For a while it was in the /tmp of ftp.uu.net (always interesting stuff to be found there...) in a file called xyzzy.tar.Z where I was able to get a copy of it. I uploaded it to the Unix forum on CompuServe, but it got deleted. You can still get it from the UCF BBS. There does seem to be a small cadre of hackers who want to continue to develop it into a viable operating system. Unfortunately the FSF is no longer going to be involved. Read comp.os.mach for the latest developments. Also when they call to ask you to change your phone service back to ATT be sure to give them a piece of your mind, and tell them Max sent ya. --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- -= Microsoft Windows (New Technology) =- by Max Cray Why not use be the first one on your block to use Windows NT? Where else can you get a high performance 32-bit OS with TCP/IP and development tools for only $69? If you have the hardware, you can't miss this deal! Read on. Here are the facts: -= MINIMUM CONFIGURATION =------------------------------------------- - 80386 or R4000 CPU. (No mention of 386SX, I assume because they would prefer you to use a faster CPU to make the new OS shine, a 33 MHz CPU is recommended for software development). - 8 Meg of RAM (12 Meg recommended for software development). This does not include space for applications. - 55 Meg Hard Drive Space (20 Meg for Swap File, 100 MB recommended for software development). It only comes on CD-ROM, so you will need a CD-ROM device to at least install it. You can get away with borrowing a friend's. You do not need the CD-ROM to run it. -= FEATURES =-------------------------------------------------------- - Portable (at source code level for R4000 CPU now, DEC Alpha CPU promised). - 32 bit flat address space. - Basically the same Application Programming Interface (API) as MS Windows 3.1. - Multi-Threaded - Preemptive Multitasking. - Built-in Network Support (Remote Procedure Calls (RPC), named pipes) - Symmetric multi-processing (If your app uses threads, it will automatically take advantage of multiple CPUs). - Security (Editor's note: Noooooo...) - Memory protection. - Fault tolerance. - Win32 GDI drawing API. - Structured exception handling, memory mapped files, and Unicode (?). - Will run 32 bit win apps, ms-dos apps, win apps, posix, and OS/2 16 bit character based apps. -= SDK =------------------------------------------------------------- - Comes with C/C++ compiler, and same documentation as C/C++ 7.0. - WinDbg (Windows Debugger). - Microsoft Editor. - Macro Assembler for both Intel and R4000 architectures. - Comes with the usual Windows SDK tools (Resource editors and compilers, etc). - SDK docs include: The Windows Interface: An application guide. Win32 Programmer's Reference - Overview Win32 Programmer's REFERENCE - API Part 1 Win32 Programmer's REFERENCE - API Part 2 RPC Programmer's Guide and REFERENCE -= SUPPORT =--------------------------------------------------------- There is a forum on Compuserve for support (GO WINNT). You can down- load the latest list of compatible systems, and devices there. There is also a programming forum called (MSWIN32). Also there a a newsgroup on Usenet: comp.os.ms-windows.programmer.win32 There are some files available at ftp.uu.net: ~ftp/vendor/microsoft/... -= COST =------------------------------------------------------------ - $69 + $20 (freight) + state sales tax CD Rom disk (postscript docs on disk) - $399 + $40 (FREIGHT) + state sales tax CD Rom disk and hardcopy docs Call 1-800-227-4679 to order. I had to tell them that I received a mailing, and that there was a code above my name: QA7FA which means that I am a unix developer. I was told that there would be up to 4 releases before the final production. The advertisement clearly states that I would receive a copy of the final Win NT SDK, and Operating system, but not the compiler. By purchasing the Win32 SDK you will receive preliminary and final versions of the Windows NT operating system and SDK tools in addition to preliminary versions of a C/C++ compiler. The cost of the Win32 SDK with printed documentation is $399. A CD-only version containing the documentation in PostScript format is also available for $69. (If you later decide that you want the hard-copy documentation from Microsoft, there is a coupon in the box for you to order it for $359 plus freight.) To order from within the U.S, please call Microsoft Developer Services at (800) 227-4679. In Canada, call (800) 563-9048. In all other countries, contact your local Microsoft representative. There will be a very broad Beta program in the early fall that is intended for end-users. The beta release will include full support for MS-DOS, 16-bit Windows and POSIX applications. Further informa- tion about the beta program will be posted to the WINNT forum on CompuServe when it becomes available. --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- FTP SITE FOR GAME CRACKS >From the rec.ibm.pc.games FAQ: Okay, I now have an anonymous ftp site for cracks, cheats, etc. Currently, my entire database of cracks is there in one big ugly file. Eventually, I will break it up into individual entries. Also, a fairly recent wanted list is in /pub/incoming/cracks/wanted, so if you have any cracks that are on the want list, please upload them to /pub/incoming/cracks. I will check all of the stuff that I can that comes into incoming, but I make no guarantees. Please read the README file for more details. The name? romulus.mercury.andrew.cmu.edu aka 128.2.35.159 Have fun... P.S. For now, I'll just deal with IBM stuff. Please don't upload non-ibm-related things. Perhaps later, I'll consider it. --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- CYPHERPUNKS MAILING LIST The cypherpunks list is a forum for discussion about technological defenses for privacy in the digital domain. Cypherpunks assume privacy is a good thing and wish there were more of it. Cypherpunks acknowledge that those who want privacy must create it for themselves and not expect governments, corporations, or other large, faceless organizations to grant them privacy out of beneficence. Cypherpunks know that people have been creating their own privacy for centuries with whispers, envelopes, closed doors, and couriers. Cypherpunks do not seek to prevent other people from speaking about their experiences or their opinions. The most important means to the defense of privacy is encryption. To encrypt is to indicate the desire for privacy. But to encrypt with weak cryptography is to indicate not too much desire for privacy. Cypherpunks hope that all people desiring privacy will learn how best to defend it. Cypherpunks are therefore devoted to cryptography. Cypherpunks wish to learn about it, to teach it, to implement it, and to make more of it. Cypherpunks know that cryptographic protocols make social structures. Cypherpunks know how to attack a system and how to defend it. Cypherpunks know just how hard it is to make good cryptosystems. Cypherpunks love to practice. They love to play with public key cryptography. They love to play with anonymous and pseudonymous mail forwarding and delivery. They love to play with DC-nets. They love to play with secure communications of all kinds. Cypherpunks write code. They know that someone has to write code to defend privacy, and since it's their privacy, their going to write it. Cypherpunks publish their code so that their fellow cypherpunks may practice and play with it. Cypherpunks realize that security is not built in a day and are patient with incremental progress. Cypherpunks don't care if you don't like the software they write. Cypherpunks know that software can't be destroyed. Cypherpunks know that a widely dispersed system can't be shut down. Cypherpunks will make the networks safe for privacy. To subscribe send mail to: cypherpunks-request@toad.com --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- SNARFING FILES BY MAIL by Ram Raider (rr@underg.ucf.org) Okay, that great text file on Internet dialouts by mail is only available by ftp from ftp.foobar.org. You can no longer use the MIT Terminus server to get to your account at the Free Software Foundation. Your only remaining alternative is to sneak into the university computer center. This time you will get caught for sure. Wait a minute. Before you leave let me tell you how to do it with your mail account. Actually it is pretty easy to do using a combina- tion of an archie server, and the ftpmail service. Remember: Archie + ftpmail = files OK, now that you have the essential formula down, you may be wondering what archie, and ftpmail are. Before I go on, I must confess: all this info was taken directly from the help files of these services. Also DO NOT stop reading this article just because you do not have an Internet mail account. If you have a mail account almost ANYWHERE you can use this technique. This means from your Compu$erve account, or MCI mail account, or whatever, but not Prodigy. For the complete information on mail gateways send mail to: mail-server@pit-manager.mit.edu with the line: send usenet/comp.mail.misc/Inter-Network_Mail_Guide There. Now, not only can you get files from the Internet, but by mixing and matching mail gateways you can send mail to just about anyone with a computer and modem. For example from your MCI mail account you could send mail to someone on a fidonet node, by routing it through the Internet, etc. Getting back to snarfing files, I would also like to point out that by using the archie + ftpmail combination you can get binary files, too, not just text files. There are A LOT of files out there available on the Internet. Let us hope that you do not pay much for your mail account. ARCHIE Archie is a file locator service. To get a file you must know the exact location and name of your file. An archie server maintains a database of files available by anonymous ftp from Internet sites. To use it send mail to archie@ where site.name is one of the following sites: archie.mcgill.ca (Canada) archie.funet.fi (Finland/Eur.) archie.au (Aussie/NZ) archie.cs.huji.ac.il (Israel) archie.doc.ic.ac.uk (UK/Ireland) archie.sura.net (USA [MD]) archie.unl.edu (USA [NE]) archie.ans.net (USA [NY]) archie.rutgers.edu (USA [NJ]) To use the archie server you list commands in your mail message. Command lines begin in the first column. All lines that do not match a valid commands are ignored. If a message not containing any valid requests or an empty message is received, it will be considered to be a 'help' request. The server recognizes six commands: help Send this command to get a help textfile. Note that the "help" command is exclusive. All other commands in the same message are ignored. path This lets the requester override the address that would normally be extracted from the header. If you do not hear from the archive server within oh, about 2 days, you might consider adding a "path" command to your request. The path describes how to mail a message from the archie server to your address. Archie servers are fully connected to the Internet. BITNET users can use the convention user@site.BITNET UUCP user can use the convention user@site.uucp This is actually quite useful. For example, I have an account that most of my mail goes to and comes from that I pay for, and another account from the local unix user group that I do not pay for. Using this command I can route the mail through the free account. prog [ ...] A search of the "archie" database is performed with each in turn, and any matches found are returned to the REQUESTER. Note that multiple may be placed on one line. stands for "regular expression". Another name for it in the DOS world is wildcard. All it means is that you can search for files without knowing the exact name. '*' matches all occurrences, and '?' matches a single character. For example: prog dfp* would send a listing of all files and directories that begin with the letters 'dfp'. Any regular expression containing spaces must be quoted with single (') or double (") quotes. The searches are CASE SENSITIVE. The ability to change this will hopefully be added soon to the archie software. site | A listing of the given will be returned. The fully qualified domain name or IP address may be used. This command is used to limit your search to one particular site. Unfortunately it can not be used to get a listing of all the files at a site. compress ALL of your files in the current mail message will be "compressed" and "uuencoded". When you receive the reply, remove everything before the "begin" line and run it through "uudecode". This will produce a .Z file. You can then run "uncompress" on this file and get the results of your request. You can use this command to compress your return info. Again, useful if you pay for your mail. If you do not have uncompress, and/or uudecode program, you can get source code files in ascii format, and then compile them. For example, use the command 'prog uncompress.c', and use the ftpmail service to get the file. and then compile the source file to get the binary program. If you are unable to compile the program, see your local guru. Compress files are files that have been run through an algorithm to (you guess it) compress the file. This makes the file into a binary file. That is where the uudecode program comes in. This program converts a binary file into an ascii file so that it can be mailed. As a minimum you must get the uudecode utility to decode binary files if you want to get programs from the Internet, as well as text files. quit Nothing past this point is interpreted. This is provided so that the occasional lost soul whose signature contains a line that looks like a command can still use the server without getting a bogus response. Results are sorted by archive hostname in lexical order. You will get a listing back that looks like this: -- Sorting by hostname Search request for 'Internet-Mail-Dialouts' Host ftp.foobar.org (130.43.2.3) Last updated 01:04 5 Sep 1992 Location: /pub/G-Files/Hacking4$ FILE rw-r--r-- 36466 Jun 30 18:12 Internet-Mail-Dialouts Host tmrc.mit.edu (128.23.2.4) Last updated 01:02 9 Sep 1992 Location: /pub/Mirrors/foobar/G-Files/Hacking4$ FILE rw-r--r-- 36466 Jun 30 18:12 Internet-Mail-Dialouts -- FTPMAIL Anonymous FTP may be performed through the mail by various ftp-mail servers. Send mail to one of the sites listed below: bitftp@pucc.princeton.edu ftpmail@decwrl.dec.com These servers work exactly like the archie servers: you list the commands in the body of your mail message. Commands: reply set reply addr, since headers are usually wrong connect [HOST [USER [PASS]]] You must give a "connect" command, default host is the local ftpmail system, default user is anonymous, default password is your mail address. ascii files grabbed are printable ascii binary files grabbed are compressed, tar, both, or executable binaries, etc. chdir PLACE "get" and "ls" commands are relative to PLACE (only one CHDIR per ftpmail session, and it executes before any LS/DIR/GETs) compress compress binaries using Lempel-Ziv encoding compact compress binaries using Huffman encoding uuencode binary files will be mailed in uuencode format btoa binary files will be mailed in btoa format chunksize SIZE split files into SIZE-byte chunks (def: 64000) ls (or dir) PLACE short (long) directory listing get FILE get a file and have it mailed to you (max 10 GET's per ftpmail session) quit terminate script, ignore rest of mail message (use if you have a .signature or are a VMSMAIL user) Notes: You should send complaints to an ftpmail-request address. The postmaster of the ftpmail site does not handle ftpmail problems and you can save him or her the trouble of forwarding your complaints by just mailing them to the right address. The address for the ftpmail server sponsored by DEC is: ftpmail-request@uucp-gw-2.pa.dec.com The "Subject:" of your request will be contained in the "Subject:" of all of ftpmail's responses to you regarding that request. You can therefore use it to "tag" different requests if you have more than one outstanding at any given time. Binary files will not be compressed unless 'compress' or 'compact' command is given; use this if possible. Note that many files are already compressed. If you use any of the binary-file qualifiers (compress, compact, uuencode, btoa) without setting 'binary' first, your session will abort in error. Binary files will always be formatted into printable ASCII with "btoa" or "uuencode" (default is "btoa"). If you don't use the "binary" command, ftpmail will cheerfully try to mail you the binary data, which will absolutely, positively fail. All retrieved files will be split into chunks and mailed. The size of the chunk is 50000 characters unless you change it with the "chunksize" command. CompuServe users will need to set this to 49000. If you ask for more than 10 files in a session, you will receive an error message and your entire request will be rejected. There is no way to ask for only certain parts of a file to be sent. If you receive output from ftpmail that seems to be missing some parts, it is likely that some mailer between here and there has dropped them. You can try your request again, but chances are fairly good that if it is dropped once it will be dropped every time. There is no way to find out the status of things in the queue. There is no way to delete a request, so be sure that it has failed before you resubmit one or you will receive multiple copies of anything you have requested. There is no way to specify that your request should be tried only during certain hours of the day. If you need a file from a time- restricted FTP server, you probably cannot get it via ftpmail. Note that the "reply" or "answer" command in your mailer will not work for any mail you receive from FTPMAIL. To send requests to FTPMAIL, send an original mail message, not a reply. -- Examples: -> connect to the local ftpmail system and get a root directory listing: connect ls quit -> connect to the local ftpmail system and get the README.ftp file that is located in the root directory: connect get README.ftp quit -> connect to local ftpmail system and get the gnuemacs sources: connect binary uuencode chdir /pub/GNU get emacs-18.58.tar.Z quit (Note: I do not recommend getting file this big using this method, but if its all ya got, its all ya got) -> connect to ftp.uu.net as anonymous and get a root directory list: connect ftp.uu.net dir quit You should expect the results to be mailed to you within a day or so. If all goes well you will get a message back like the one below: -- We processed the following input from your mail message: reply underg.ucf.org!rr connect ftp.foobar.org chdir /pub/G-Files/Hacking4$ get Internet-Mail-Dialouts quit We have entered the following request into our job queue as job number 716623942.5012: reply underg.ucf.org!rr connect ftp.foobar.org anonymous ftpmail/underg.ucf.org!rr chdir /pub/G-Files/Hacking4$ get Internet-Mail-Dialouts uncompressed quit There are 841 jobs ahead of this one in our queue. [Misc notes deleted, or reproduced above...] -- Ftpmail Submission Transcript -- <<< reply underg.ucf.org!rr >>> OK, will reply to <<< connect ftp.foobar.org >>> Connect to ftp.foobar.org as anonymous ftpmail/underg.ucf.org!rr <<< chdir /pub/G-Files/Hacking4$ >>> Will chdir to before I do anything else <<< get Internet-Mail-Dialouts >>> get Internet-Mail-Dialouts uncompressed <<< quit >>> Done - rest of message will be ignored >>> checking security of host `ftp.foobar.org' >>> host `ftp.foobar.org' is ok -- End Of Ftpmail Transcript -- -- And then shortly thereafter you will find the file in your mailbox. Note: Do not attempt this example at home. It will not work, as this example was totally faked. POSTSCRIPT You know what would be great? Multi-user play by e-mail games. A transcript might look like this: -- MailDungeon Submission Transcript -- <<< reply underg.ucf.org!rr >>> OK, will reply to <<< character Dirk-Daring >>> OK, character to be used: Dirk-Daring <<< go north >>> OK, Dirk-Daring went north <<< look around >>> You see a large 30X40 room. It is dark and musty. Boxes are >>> all around. It is damp, and you smell the stench of vermin. >>> Others Present: >>> EVIL WIZARD Haldor <<< fight monsters >>> No monsters present <<< fight enemies >>> You surprise Haldor >>> You swing short sword >>> You kill Haldor >>> Sending mail to Haldor's owner. Subject: Bad News... <<< get treasure >>> OK, get treasure. >>> You find small sack with 20 gold coins <<< quit >>> Done - rest of message will be ignored -- End Of MailDungeon Transcript -- --------------------------------------------------------------------- ##################################################################### --------------------------------------------------------------------- Well that is all for this issue. Please send your contributions. I print just about anything! Especially looking for a C++ tutorial series, and also guided tours of underground bulletin boards. -- -- dfp-req@underg.ucf.org (dfp-req) .