____________________________________________________________________ | ___ __ __ | | | | |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 | | | \ | |__ |__| __) | Underground Society | January, 1993 | |______________________|_______________________|_____________________| ======================================================= RICUS Vol. 2, Iss. 1 Table of Contents ======================================================= 1 .. Opening to RICUS 2.01 2 .. Introduction to the UNIX OS (Part 1) 3 .. Definition of 'Hacker' 4 .. How to By-Pass Callback Verifiers 5 .. Idiotic Submission: What to do w/the Homeless 6 .. Update: List of RI Fido Systems 7 .. PedoFile.Txt - Fake BBS Ad - A Fine Squinky File 8 .. Radio Scanners 9 .. OMNI-Net NodeList/Conference Tags 10 . Closing/Submitting Articles to RICUS ======================================================= --------------------------------------------------------------------- 1: Introduction --------------- Hey there! Welcome to RICUS 2.01! In this issue, we provide you with some interesting information. Information can be good or bad, it is up to the individual user of such information to ensure that it is used properly. Info can also be amusing... use it wisely... Remember, cyberspace can be fun. It can also be dangerous, excercise caution at all times. CyNom/RICUS Editor You may have noticed a change in the editing alias. Alas, we must change the editor alias from time to time, whether the editor changes or not! -------------------------------------------------------------------------- 2: Introduction to UNIX ---------------------- 1.1 What is UNIX? ------------- UNIX is an OS developed by AT&T in the 1970's. It's not really a mainstream OS like MS-DOS, though I'm sure some people will disagree with me on that. It is primarily used in colleges/universities and by businesses with the need for multiuser support. UNIX is multiuser, meaning more than one person can use the same computer at the same time. This is done through terminals hooked to a main CPU. Modems (of course) can also be attached, to allow multiple users to dial-in. Many UNIX systems are also on networks. It is also multitasking. This means each user can run more than one program and switch between them. 1.2 How do I identify a UNIX system? -------------------------------- The easiest way to identify a UNIX system is by its login screen. Upon accessing a UNIX system, either by remote or by local terminal, you will see the following display (assuming you are not already logged on): generic.unix Welcome to the Generic Unix with Computer People who don't have a clue what they're doing! The System will be backed up around 2 pm Monday!!! login: You may also see 'Login:' in place of 'login:' (notice the caps.) The login prompt makes it easy to distinguish a UNIX system. The login: prompt is asking you for a username. There are frequently default logins that come with a UNIX system, and these are sometimes left unpassworded, due to the incompetance of most system administrators. Some common default UNIX login names: backup demo demos guest help lp news tutor bin _ uucpa \ nuucp >--|These will not give you a shell (Unless you're lucky!!) uucp _/ |They will usually give you the uucico program, part |of UUCP which will be covered in future chapters of |RICUS UNIX tutorials. If the account has a password, it will give you a Password: prompt. Otherwise, you will be logged in. There are sometimes also other defaults, like 'games' or something, that the users may have installed for one reason or another. There is also sometimes another way to identify a unix system and/or get more info on that particular UNIX. Login as "sync" (without the quotes.) If it is a valid account, the system will print a message like this: login: sync SunOS Release (386STD) 4.1.3 on node generic [...and then logs you out...] Smart Admins will have gotten rid of this account, since it makes it really easy to make sure that a computer is, indeed, a UNIX! 2.1 The Shell --- --------- After you have somehow logged into a UNIX. You will be at a Shell prompt. The prompt will be something like: % nodename % /usr/user % etc... Whatever it is, you are most likely at a UNIX shell. Type 'pwd' at the shell prompt, and it'll Print your current Working Directory ^ ^ ^ By the way, UNIX is entirely case sensitive. 'pwd' is NOT the same as 'PWD', ' Entering 'pwd' is the same as entering CD on an MS-DOS system, without any options. The 'cd' command allows you to change directories. Some common UNIX commands: Command Description ============== ============================================ ls lists files, UNIX equivelant of MS-DOS 'DIR' cd change dir, UNIX equiv of MS-DOS 'CD' pwd Prints current Working Directory (like MS-DOS 'CD' without any args!) set lists/sets environment vars echo prints text cat views a textfile (like MS-DOS 'TYPE') kermit start kermit front end (for downloading files) -- Not present on all UNIX systems sz send ZModem, sends a file FROM the UNIX (Not on all UNIXes) rz recieve ZModem sends a file TO the UNIX (Not on all UNIXes) man obtain help on a command rm delete/remove file mv move/rename file Note: Certain commands, such as sz, rz, and kermit, may not be found on particular UNIXes. Those are some of the more common/useful commands, which will allow you to obtain text, navigate directories, list them, etc. You can get help on a command (usually) by typing 'man command' without the quotes, where "command" is the command you want help with. Most commands provide a short summary of there arguments. Type "command -?" (without the quotes, of course!) to see this short arg summary. You can redirect the output of commands using the '>','<', and '>>' operators, just like MS-DOS. To write the output of ls /bin to a file, you could use: ls /bin >file To view this output, you could then type cat file To see a list of many other commands type "ls /bin" The directory /bin contains many system binaries/commands. You can also try "ls /usr/bin" which possibly lists additional commands. Try fooling around with commands and experiment. If you're reading this, you probably have some type of intelligence in that brain of yours! However, please remember that if you are 'borrowing' someones account (with their permission, of course), *never* delete (or modify) any files that aren't yours! This is just common courtesy. 2.2 UNIX Directory Structure --- ------------------------ UNIX utilitizes a file system. At the top of this filesystem is the root directory. Under this root dir, there are subdirectories, subdirs within subdirs, files within subdirs, etc. The root dir is represented by a '/' (slash) An example unix directory tree: / (root dir) ____ ____ __|__ ____ ____ | | | | | | usr bin dev etc var tmp (dirs) ____|__ _____ | | | | jon mat guest games (sub-dirs... etc) In the sample directory tree above, the root dir has 3 subdirs under it (usr, bin, and dev.) Within usr, the 'home directories' of users jon, mat, and guest exist. The home directories are the dirs that the user is initially logged into. You can change back to your home dir using cd $HOME. To find out your home dir, type echo $HOME. Both at shell prompts. The current directory can be represented by a . (a single dot), the previous dir can be represented with a .. (double dot), just like MS-DOS! For example, say you were in directory /usr/guest. To move back to /usr, you could type cd /usr OR type cd .. Obviously, cd .. is preferable, since it requires less typing! That's the end of RICUS Intro to Unix, Article 1. In future issues of RICUS, we will continue to provide you with more UNIX information. Article 2 will probably have information on networking, one of the most interesting and fun use of a UNIX. It is important to note that the BEST source of UNIX info is actual experience in use of Unixes! * UNIX is a trademark of Unix Systems Laboratories. (We think.) [Disclaimer: RICUS does not promote the hacking of any type of computer, UNIX or otherwise, for malicious and destructive purposes. Mis-application of the above information is your responsibility, not ours!] ---------------------------------------------------------------------------- 3: Definition of 'Hacker' ----------------------------- [Editor's Note: The "RISA jihad" was in RICUS 1.03. This is a response to that file.] I just noticed that inane RISA jihad against "hackers". I'm a hacker, I do nothing wrong, and this sort of bullshit annoys me. A hacker is basicly a programmer who programs out of love for the machine/environment. Programming for its own sake. Programming as the ends, means, *and* justification. One who leads an e-life instead of an r-life. (Users don't count. Users are morons.) Granted, most people who perpetrate illegal computer-related activities are hackers, merely because few others are qualified. Out of the set of {hackers} there is a sub-set of {criminals}. This is true of any professional or cultural group, even sets like {LA-cops} or {Past-Mayors-of-Providence} or even {Sysops-of-"ligit"-public-BBSs}. The software all you sysops are so worried about being broken into or abused was writen by hackers. (For reference, the following is from "the jargon file", a monster list of hacker slang & culture that circulates the net, and is available in hardcopy as: _The_New_Hacker's_Dictionary_.) hacker: [originally, someone who makes furniture with an axe] n. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively), or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 to 5 are correlated, and people who fit them congregate.) 6. An expert of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. (deprecated) A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. See {cracker}. That's all. Now go back to sleep. -dav ----------------------------------------------------------------------------- 4: Call Back Verifiers ---------------------- By-Passing Those Darn Call Back Verifiers! ========================================== Over the past few years, BBS software has matured and Call Back Verifiers have become common place. Initially, one would think CBVs would put an end to fake accounts. Afterall, they have to disconnect, dial YOUR number, and connect to you, right? And once your number is divulged, it isn't much trouble to find out who you are, right? Wrong. Over the past few months, certain modemers of the demented persuasion have figured out how to avoid these horrid devices. The key is to keep the BBS modem (that's SUPPOSEDLY going to disconnect and call you back) from disconnecting. In order to do this, you need to have an actual phone as an extension on your data line, and relatively close to the modem. If your voice line IS your data line, this shouldn't be much of a problem. Step 1) Create the account, use an alias, whatever. If the Sysop is watchful (in other words: always by the computer), make sure your account appears to have a real name. 2) (Fairly obvious :) Use _fake_ phone numbers. Give it a real prefix (first 3 digits) and area code, however. IE: 401-273-xxxx, location Providence, would satisfy a quick glance by most sysops. 3) The system will say something like. "I am now going to hang up and call you back." Quick! Before the BBS can disconnect, *pick up your phone* and *shut off your modem*, with the phone still off hook, turn the modem back on. Now, listen to the phone. You will either here the BBSes modem trying to disconnect, or dead silence. Wait a few seconds. You will either 1) Hear kind of LOUD clicks. 2) Hear the BBSes modem dialing out. 3) Hear a "That call can not be completed.." "You need more digits.." , etc. In case 3, you have failed. This BBS most likely has a good phone line (or something) and won't allow these tricks to work. Move onto another BBS. In case 1, the BBS is LOOKING for a dialtone. Hold down "1" on the touchtone pad. This usually fools dumb modems into thinking there is a dialtone. You should then hear the BBSes modem dialing "your" number. In case 2, the BBS thinks it has a dialtone, and is trying to dial you. Wait til it finishes. 4) Type ATA, your modem will answer (as if it had been called by the BBS) and the BBS will procede, thinking it has, indeed, "verified" and called you back, when it never really disconnected! Enter your password and all that, you are validated.. with a seemingly legit fake account! Congratulations! It has yet to be determined which systems are vulnerable/which are not. It has been noted that E-Nest BBS is *NOT* vulnerable to such tricks. :( How sad. The key to this trick is keeping the connection. The majority of phone calls can not be hung up on unless the *Caller* hangs up first, or the person being called hangs up for about 90 seconds. This trick works for around 2 out of 3 BBSes. This trick is primarily useful for gaining access to message networks (ie, NE-Net, Fido-323, etc.) that are not tolerant of aliases, and watching them bitch, cry, and moan about how we are all no-brainers and stuff. This trick is also useful, of course, for obtaining more download credits, more game time, etc. Be smart! DON'T log in with your "fake" account after you immediately use up the time on your real one! It doesn't take a genius to notice that they're _probably_ the same person! Especially since they're calling at the same baud rate! Many 401 systems are vulnerable -- A list of these systems would be released, but it places certain sysops at an unfair advantage. Because of this vulnerability, every local network, that doesn't "want" aliases, is open to alias postings. Have fun guys... CyNom ----------------------------------------------------------------------------- 5:Idiotic Text Files Section: What to do with the Homeless ---------------------------------------------------------- How to move the homeless population out of your comunity. Step (1) Find All the homeless in your community. Step (2) Set half of them on fire.. Step (3) Now employ the other half as Fighters of Homeless person Fires Step (4) Now enjoy your homeless free community. [Editors Note: Yes, that *was* idiotic! I wouldn't normally put that in, but in the intererest of free expression... no matter how tasteless!] ----------------------------------------------------------------------------- 6:RI Fido Systems --------------- Here's a list of all the Fido Systems in RI, their node #'s, and their phones. Have fun, kiddies. All Phone #'s are 401, unless otherwise stated. Node# BBS Name Comment Phone# 1:323/1 - The Bloom Beacon - Echo Coordinator - 751-3831 1:323/2 - AMPR.ORG Gate - packet radio gw? - Unpublished 1:323/105 - Prometheus - Head Fascist ;) - 397-7522 1:323/106 - Horses Head BBS - - 726-8186 1:323/107 - IEEE BBS - - 454-2977 1:323/108 - Data Express - - (508) 336-3868 1:323/109 - Art of the Poss. - Easy fake accts - 421-2218 1:323/110 - Cerebral Babylon - not on FidoNet - 435-3576 1:323/111 - Prime Cut BBS - - 334-3096 1:323/112 - Mise en Place - - 461-2605 1:323/113 - Adv. Voice/Data - - 782-6692 1:323/115 - ImageNet - - 822-3060 1:323/116 - FleetHQ - doesn't xfer often- 823-0176 1:323/118 - Connections - - 658-3465 1:323/119 - Bloom Beacon - see 1:323/1 - 751-3831 1:323/120 - ChowdaNet - easy fakes/no fido- 331-0907 1:323/121 - GAYtway - - 739-1380 1:323/122 - Nite Moves - - 528-5796 1:323/123 - 95th Floor - not on FidoNet - 941-7851 1:323/124 - Signals - - 823-3038 1:323/126 - ENest - - 732-5292 1:323/128 - CommPort USA - - (508) 761-9812 1:323/131 - Behind En. Lines - - 463-6973 1:323/132 - IBM World II - always watching!! - 397-5146 1:323/133 - CyberZone - - 732-1641 1:323/201 - BlackStone Valley- - 769-2055 1:323/202 - Comp Exchange - - 762-4293 1:323/203 - Gambit - - 333-6424 1:323/204 - RI Telecomm - an original name! - 658-2033 1:323/205 - EyeStrain BBS - - 765-6205 1:323/206 - DataLine - another original! - 568-6641 1:323/302 - EarthWorld - - 254-1262 1:323/401 - Razors Edge - - 364-6343 1:323/402 - Studio II - - 539-0627 By "No Fidonet", we mean that the BBS doesn't seem to be actively participating in the FidoNet-323 echoes, and isn't really worth terrorizing. Special thanks to Squinky for abusing FrontDoor and acquiring a new Nodelist for us, at 14,400 bps, no less! Note: What use is this? I thought they passworded most of the Fido links! Well, yes! They did! Hint: Even *with* PWs, FD technology is _still_ not secure. ----------------------------------------------------------------------------- 7: PedoFile.Txt --------------- [Editor's Note: RICUS and the RICUS Editor are not responsible for the abuse represented by the following text. If you have any problems, take them up with the author, it is quite obvious who it is. I wouldn't normally put that in, except (again) in the interest of free expression. ] Call The Beagle's Breast BBS - Home TO PENET(Pedophile Net)!1! Over 900 Megs of Child Porn! Just look at some of the .gifs we have! 5 year old boy with 29 year old fat guy! 5 year old boy with TWO(yes, TWO) 20ish guys! PedoPhile BBS, When you want to fuck and suck little kids, you know where to call. Kids welcome, we always need new people to take pictures of. Also, Available, A list of BBS'ers under 12!1!, yes, you too can make them give head, just like the owner's have in the past, and will do in the future. ------------------------------------------------------------------------------ I know you are saying, "How Do I register? I want access to little kid's bung holes too!". Well, to keep up the candy we have to buy to offer to little kids in exchange for sexual favors/sexual acts, we charge each user the small sum of $50 a year. I know you must be thinking, "50 Dollars? That's a lot just to slam little kids up the ass!", but wait, there's more! Beagle's Breast Staff will PERSONALLY set up Molestation dates between you and your victims, all as part of the service. And if you are ever lonely, we will come over and give you head, just like little "Johny" did! ------------------------------------------------------------------------------ Now, You must be thinking, "Oh dear, what if I get caught?". Well, don't worry, Child Molestation is not a huge crime! Why, our own sysop got a seven year suspended sentance simply for saying he has mental problems! Also, as part of the Beagle's Breast service, we will help find you a good "Pedophile Defense" lawyer! With any luck, he will twist it around into making it sound like the child FORCED you to slam your cock into their anal passage! ------------------------------------------------------------------------------ Yes, the Beagle's Breast, PedoPhile BBS, is the bbs for all of your devient sexual behaviors. We will be happy to help you in your quest for 12 years and under dick. Remember our motto, "The Beagle's Breast BBS, We Care about fuckin small boys!" ------------------------------------------------------------------------------ [ Note: Any similiarity to BBSes, people, things, networks, living, dead, or mythical, are *purely* coincidental. Child Molesters are very sick individuals, and such crimes should not be taken lightly. ] ----------------------------------------------------------------------------- 8: Radio Scanning ----------------- First off: What *is* a scanner? A radio scanner is a radio reciever that allows you to scan a range of frequencies and pick out 'active' ones, and recieve/listen to them. We're not talking about your FM radio here, folks! We are talking about scanners that let you pick up police, fire, medical, taxi cab, amateur radio, cordless phone, and even cellular phone transmissions. According to a Privacy Act (1974? 1986? One of those, anyways.) It is illegal to listen to cellular phones. However, we here at RICUS embrace the policy that any frequency passing through your home and through your *body* (doing who knows WHAT to it! ;) should be allowable to listen to. These laws are unenforcable, however, since unless you go open your window and shout "I listen to cellular..." no ones going to know. Just remember, it IS illegal to listen to cellular frequencies (infact, many scanners do not allow these frequencies to be entered), so if (however unlikely!) you do get caught doing it for some idiotic reason, RICUS and it's editor(s) are not responsible. Well, first off: Get a radio scanner. You can find them in your local electronics store, Rat Shack, etc. or you can go mail order. Take a look in some of the Amateur Radio Magazines like Popular Communications and 73 for some mail order places. There are many different types of scanners to choose from. There are portable/battery powered (most, if not all portables, use rechargable batt. packs.) There are also "base" models, that plug into the wall. There are also mobile models that go permanantely in a car. I recommend the portable/handheld models... since you can carry them with you, put them in your car, etc. Note that in some states it's against the law to have scanners in your car. One could argue that it's unconstitutional, idiotic, moronic, etc. but from one of the Popular Communications mags, this isn't the case in RI... you can have a scanner in your car without any problems. PopComm is a fine magazine, if your interested in HAM radio, shortwave, scanners. Also, try to find a scanner that's able to pick up many different bands (ranges of frequencies), the more frequencies a scanner can pick up, the cooler the stuff you can listen to. Personally, I have a BearCat 200XLT, a handheld scanner. It has 200 memory channels. Most modern scanners have anywhere from 20 to over 1000 memory areas. These memories allow you to store a frequency you like into them, for quick/easy access. Once you store all the active freqs you find in the memories, you can tell the scanner to only scan the channels stored in the memories, which allows you to keep up with all the activity in your area quite easily. If listening to weird things isn't your style, well... what can I say... you must be a normal person or something!! Once you have a scanner, you're going to want to do something with it. You can either read the manual and figure out how to scan ranges of frequencies, or you can enter frequencies from a frequency list right into the memories, avoiding the laborous search process. I do, however, recommend searching for some frequencies yourself, since I defininately don't have a list of ALL the freqs in use in RI, just some of them. You could buy a book with a list of radio frequencies in it and blow 15 or 20 bucks. You'll also get a bunch of frequencies for areas all over the nation, most of which you'll never even use. Instead, we'll give you a list of some of the local RI frequencies. Here you go: ------------------------------------------ Rhode Island Area Frequency List (Partial) ------------------------------------------ [All Frequencies are listed in Mhz] --------------------------- City Police/Law Enforcement --------------------------- Barrington 155.490, 158.970 Burrillville 154.725, 156.090, 158.970 Central Falls 155.430, 158.970, 156.210, 155.655, 155.760 Charlestown 154.710, 154.815, 155.190, 45.100 Chepatchet 156.090 Coventry 154.725, 158.970, 154.695 Cranston 155.250, 155.970, 158.970, 482.4125, 482.4625 482.5825, 485.4125, 485.4625, 485.5625 Cumberland 158.970, 155.430, 156.210, 155.655, 126.210 East Greenwich 154.725, 155.625, 158.970 East Providence 154.770, 155.010 Esmond 156.090 Exeter 154.815 Foster 154.725, 155.190, 155.535 Glocester 156.090 Jamestown 39.040, 158.970 Johnston 154.725, 155.535, 158.970, 155.185 Lincoln 158.970, 156.210, 155.430, 156.060, 155.655 Middletown 155.790, 158.970 Narragansett 154.815, 154.875, 155.190 Newport 155.730 North Kingstown 154.815, 155.190, 155.580, 158.970 North Providence 154.725, 156.090, 156.450, 158.970, 154.800 Pawtucket 154.830, 155.430, 155.655, 158.970 Portsmouth 45.940 , 158.970, 155.850, 154.845 Providence 460.275, 460.100, 460.200, 460.425, 460.325 Scituate 39.140 , 154.725, 155.535, 156.090, 158.970 South Kingstown 154.880, 154.815, 154.875, 158.970, 155.190 Warwick 154.890, 155.130, 155.190, 158.970 West Warwick 154.725, 155.190, 155.625, 156.150, 158.970 Westerly 154.815, 155.190, 156.210 Woonsocket 155.430, 155.655, 156.030, 158.970, 156.330 482.8375 ------------ State Police ------------ RI State Police 155.610, 158.970, 155.505, 154.935, 154.905, 155.190, 155.445, 159.150 Listen to the frequencies in your city and neighboring ones. Obviously, if the city is far away you're not going to be able recieve it very well. ---------------- Fire Departments ---------------- Barrington 153.950, 154.280 Central Falls 154.280, 154.415 Coventry 45.200, 45.480 Cranston 154.010, 154.280 East Greenwich 154.010, 154.310, 154.280 East Providence 154.070, 154.280 Esmond 154.190 Foster 154.190, 154.290 Jamestown 153.950, 154.190, 154.280 Johnston 154.175, 154.190, 154.280 Narragansett 46.420, 46.500, 154.280 North Kingstown 154.235 North Providence 154.250, 154.400, 33.420 Pawtucket 154.445, 154.280 Portsmouth 46.060 Providence 154.370 Scituate 154.190 South Kingstown 46.420 Warwick 154.310 West Greenwich 46.380 West Warwick 154.280, 154.430 Westerly 46.380, 46.360, 46.500 Woonsocket 154.130 ----------------------- Amateur Radio Repeaters ----------------------- Cranston 146.700 (Ocean State Amateur Radio Group) Providence 146.940 Scituate 147.300 The Cranston repeater seems to be the most active. We're not sure of the status of the others, since the reference I'm getting these frequencies from is probably out of date. ----------- Other Stuff ----------- Misc. Taxi Cab Cos 152.420, 152.390, 152.450, 35.120, 152.360 152.330, 152.270, 152.420, 452.300, 142.150 31.200 NOAA Weather 162.400 6 Meter HAM Band 50 - 54 2 Meter HAM Band 144 - 148 1 1/4 Meter HAM Band 220 - 225 3/4 Meter HAM Band 420 - 450 Cordless Phones 46.0 - 49.0 *Cellular Phones 806 - 821 851 - 866 The HAM bands are sometimes fun to listen to. Might be fun to get myself a HAM license one of these days! * Many scanners can't pick up the cellular bands. However, some are able to pick up frequencies above 900 Mhz. Many scanners have electronics that produce "image" frequencies of frequencies below them. For instance, my scanner lets you listen to frequencies in the 851 to 866 Mhz cellular range by listening to frequencies in the 900 to 915.. mhz range. You have to find out the "IF" frequency of your scanner (it has to be a "2 stage scanner" or something, this does NOT work for all scanners) and add 2 x IF to the frequency you want. Say you want freq 864 and your scanner's IF is 27 Mhz you would do 864 + 2x27 = 918. You tune to 918 Mhz, and you will hear a slightly degraded version of the convo on 864. Remember: This ONLY works for certain types of scanners and you have to find out the IF frequency! There you go! And if you can't figure out how to get going with scanning, ask around on the local boards, and some one'll chime in and help you! Make sure you mention RICUS and those cool RICUS dudes... ---------------------------------------------------------------------------- 9: Omni-Net Information ----------------------- OmniNet is a network based on FrontDoor/FidoNet technology, originating from southern RI. Someone though it would be cool to get the nodelist, conference tag names, etc. So, here they are: Node List: ---------- Zone,132,Omni-Net_Central,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,FD,TG,V32B,V42B,MNP Region,200,N.Eastern_USA,NEUS_Control,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP Host,401,Rhode_Island_Host,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP Hub,10,Omega_Concern,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP ,11,Mystic_Illusion,Kingston_RI,Isaac_Rodman,1-401-782-4264,9600,CM,RG,FD,V32B,V42B,MNP Hub,20,Morlock's_Tower,East_Greenwich_RI,Paul_Sharpe,1-401-885-2390,2400,CM,FD,RG ,21,The_95th_Floor,Cranston_RI,Paul_Mallett,1-401-941-7851,9600,CM,FD,LD,V32B,V42B ,22,Soth's_Domain,Cranston_RI,Marshall_Votta,1-401-785-0347,2400,CM,FD,TG Hub,30,Necropolis_BBS,Charlestown_RI,Frank_Faubert,1-401-364-0524,9600,CM,FD,XA,RG,V32B,V42B ,31,The_Razor's_Edge,Richmond_RI,Chris_Arnold,1-401-364-6343,2400,CM,FD,RG Hub,40,Death's_Doorstep,Jamestown_RI,Ed_Beaulieu,1-401-423-2964,9600,WW,V32B,V42B Conference Tag Names: ---------------------- Short Description Echo Tag --------------------------------------------------------------------------- *General Discussion ON_GENERAL *Office ON_OFFICE #Administration ON_ADMIN SysOp Support ON-SYSOP Poetry ON-POETRY Music ON-MUSIC Telecom ON-TELECOM Programming ON-PROGRAM RI Local News ON-RILOCAL Literature ON-LIT Your Ad Here ON-BBSADS ANSI Art ON-ANSI Entertainment ON-ENTRTN Shadowrun ON-SRUN Spelljammer ON-SJAM Robotech ON-ROBO IBM Discussion ON-IBM Amiga Discussion ON-AMIGA For Sale/Want Ads ON-SALE Top Fives ON-FIVE Rhode Island BBS Users Group ON-RIBUG Internet Discussion ON-INTERNET Polical Discussion/Debate ON-DEBATE Firearms ON-ARMS Womens Issues ON-WOMEN --------------------------------------------------------------------------- * - All members MUST carry # - Omni-Net Board Members ONLY --------------------------------------------------------------------------- [ We're not sure if the nodes use passwords or not. I see no reason to do anything with this info, I just put it in here cause I was asked to. However, if you feel the sudden urge to use this info for something, the same frontdoor tricks will work, of course. There will probably be an article on these "tricks" in a future RICUS.] ---------------------------------------------------------------------------- 10:Submissions to RICUS ----------------------- Anyone can submit an article to RICUS. Most likely, it will get distributed with the next issue. We'd also like to see letters to the RICUS editors. Inflammatory messages are always welcome! Leave public mail to "RICUS" in either Fido/323 or NE-Net, since that is where we primarily wait and watch the locals. We are _very_ interested in any info you may have on the CLAN library computer system. That's the one you see in the libraries, that you look books up on, that the librarians check books out on, etc. Also, contact us on one of those "evil subversive user" boards. If you don't know where they are by now, you probably never will. Seeya next issue, CyNom (Naturally, that's just my 'pen' handle ;) Note: The next issue will probably be out around March... Celebrating RICUS' first birthday! ONE full year of RICUS! And _atleast_ one more to come. ____________________________________________________________________ | ___ __ __ | | | | |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 | | | \ | |__ |__| __) | Underground Society | January, 1993 | |______________________|_______________________|_____________________|