(vee-pee) heavy industries presents... Vicious Propaganda version 4.02 1.0 Fear And Loathing In Orange County =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Boogah187's responsible for this crap... Whattup party people? (vee-pee)'s back for another assault on your intelligence. I'll make this short, sweet and to the point... Next time you see (vee-pee) it very well may be on a newsstand. That's right Petty has kicked me in the ass enough and talked me into making this a print `zine. I hope we don't suck too much this month. We have a nice, well rounded, content list this month. Anyway, this ought to be a short intro. Just enjoy the mag, and send all your complaints to "boogah187@hempseed.com". 2.0 Quote Of The Month =-=-=-=-=-=-=-=-=-=-=- "Do you think you can get away with playing those crappy tones. I mean, Christ almighty... Did you record those on a Fisher Price tape recorder? Just use real quarters kiddo." -Pacific Bell Operator on the quality of Boogah's redbox tones 3.0 Petty Larceny's Big Fun Book Of Death =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Petty Larceny did this in crayon on a Denny's activity mat... Once again from PL's fun lab of death (aka his bedroom) I would like to bring you me. And this months fucked up and just downright screwy shit. That I don't yet know, and since I'm an asshole I'm gonna be making this up as I go along, and if you don't like it you can just shove it up your ass because I'm writing this, and you're just some lamer faggot who would rather be reading the constructive works done by someone who really matters compared to out reading the fucking manual and doing something. OK now that that's over with, on with the crap. This month I am going to be bringing you something that has nothing to do with hacking, phreaking, computers, your life, or basically anything which you have been faced with so far. But it is a subject that is very dear to my heart; EXPLOSIVES. YES KIDS YOU HEARD RIGHT BOMBS! now since this magazine probably doesn't want to get sued because you blew your fucking hand off, and you probably will, because I am really drunk and high on crack. And I don't want death threats from your mom, the PTA, your big gay dad and the rest of the Elks club, don't try this, don't even fucking read this if you're stupid. For those of you who are adventurous enough to continue, here comes the article. *************************************************************************** CAUTION: BLACK POWDER IS AN EXPLOSIVE, IT IS A PRIMITIVE EXPLOSIVE AND HAS BEEN KNOWN TO GO OFF IF IMPROPERLY TREATED. YES THIS MEANS YOU DO NOT SMOKE WHILE DOING THIS (IF YOU ARE STUPID ENOUGH TO). DO NOT USE METAL TOOLS IN THE PREPARATION, USE WOOD, OR EARTHEN WARE. DO NOT USE PLASTIC OR METAL, STATIC DISCHARGE CAN RESULT, AND CAUSE EXPLOSION. *************************************************************************** Ever since I was a wee lad, I wanted to blow stuff up, and set things on fire, and I found outlets for this at school, with my friends, and sometimes when someone really pissed me off. And then I found better ways to do this. And well, now I'm going to share my good ol' recipe for making black powder. First you will need some things, you should be able to find them around either at your house, at the drug store, from the weapons dealer down the street, at cost plus, or at a herbal shit store. the list of things you will be needing is as follows: A good mortar and pestle, about half a pound of saltpeter, about 4 oz. of sulphur, and some charcoal (bar-b-que charcoal works good for this one), water, alcohol, and finally a screen like the kind that goes in your window. Now as you have already attained these materials, you will now need to know how to mix them properly. First take each ingredient, and crush it to the finest powder possible, using the mortar and pestle. I suggest doing this in small batches, maybe 1/2 to 1 oz. at a time, depending on the size of the mortar. Next take and measure out 7 oz. of finely ground saltpeter. add it to about 4 oz. of warm water. Next measure about 1 oz. of sulphur, add it to the water/saltpeter mix, and then add 2 oz. of powdered charcoal. ******************************MIX THAT SHIT WELL!**************************** Next you will need to dry the solution. By this time you have a substance that looks like grey mud. This is good, because what that is wet black powder, and it will provide you with hours and hours of entertainment. This recipe makes just over a half a pound. now, take the mud and spread it on a cookie sheet, thinly, and put it in the sun to dry. Once the mud solidifies into a cake, dump it into another pan of some variety, and break up the large clumps. Now, take this and a large screen from a window, chicken wire, and grade the powder, take and break it up into clumps about 1/8" in size. Now take the fine powder and separate it from the rest using a fine screen, put the two different powders into different jars. now, take one of the batches, and take out about a teaspoon and light it, test the burning rate. If the burning rate is not very good, take the remaining powder and put it in a cup in a jerky maker, or similar device to dry all the water out of it. Do the same with both mixes of powder use the thick powder for making bombs and the like, while using the fine material for ignition, just fucking around with, or making smoke bombs. HAVE A FUCKING BLAST! -PL ==================================================================== |Petty Larceny: patron | "Before me nothing but eternal things were| |saint of Dal.net Mafia| made, and I endure eternally." - Dante | ==================================================================== 4.0 Local News =-=-=-=-=-=-=- Donated for use by unkie noid... [25% Crap and 75% Half-truth. The reporter who did this article interviewed Unkie noid and even hung out with a bunch of us. She didn't even use noid's stuff and the one bit of info we gave her on "Script Kiddies" she mis-quoted. Oh joy. -b] Tools to aid hackers abundant TECHNOLOGY: Damage mounts nationwide as the Internet provides guidance for would-be intruders. March 12, 1998 By DAWN C. CHMIELEWSKI The Orange County Register Computer hackers call them "script kitties" hyperaggressive young teens with a computer and an appetite for mischief. They can infiltrate and topple a computer network with ease, using Betty Crocker-simple recipes gleaned from an estimated 440 hacker bulletin boards, 1,900 Web sites and 30 hacker publications such as "Phrack." And they are among the culprits who have inflicted $136 million in damages and losses from computer security breaches in the past 12 months, a 36 percent increase. "We're seeing so much more of it now, because the tools exist that make it easier for even marginal hackers to actually be pretty effective," said William Boni, head of Coopers & Lybrand Investigations in Los Angeles. Last month federal agents raided the Sonoma County homes of two teen-age boys who are suspected of infiltrating the Pentagon's computers. An unknown hacker or hackers raided computer systems at 48 major universities, including the University of California, Irvine. Last week's attack disrupted UCI's network of 8,500 computers, crashing the Graduate School of Management's computer system, shutting down teaching labs and locking up hundreds of students' computers. Many security experts attribute the rise in hacker attacks to the growth of the Internet. Until this year, the majority of break-ins were believed to be inside jobs, often the work of disgruntled former or current employees. Now, more than half of them come from outside over the Internet, according to a survey released last week by the Computer Security Institute. "The fact that virtually everyone is connected to the Internet now makes it a lot easier to gain an access point, which, if you studied hacking at all, is critical," said Lars Klander, author of "Hacker Proof: The Ultimate Guide to Network Security." But access is only part of the equation. The proliferation of Internet sites devoted to hacking has enabled even those who know little about computers to break into sophisticated networks. And the information is easy to find, with even the legitimate online searching guides providing easy access. For example, Yahoo, one of the largest indexes to Web sites, now holds links to more than 300 sites devoted to hacking, including direct connections to some of the world's most infamous hackers. With a few clicks, any computer neophyte can retrieve programs crafted by the hacking elite, sophisticated break-in tools and step-by-step instructions. "One of the reasons it's growing is there are many more places to go to get this information," said Ira Winkler, a hacker for hire and author of "Corporate Espionage." And the script kitties don't seem deterred by stiff federal penalties if they get caught. Violators face up to five years in prison. But hackers couldn't wreak nearly as much havoc if systems administrators took precautions to plug holes in their computer networks. Such inattentiveness allowed security expert Peter Shipley to break into the network of a major Orange County company, which hired him to test its security. Armed with only a laptop, the Berkeley computer consultant gained access to research material worth billions of dollars to competitors, he said. He declined to identify the company. "We hit every machine in eight hours," Shipley said of the test last fall. "It took 24 hours for the system operator to recognize we were there." Winkler said last week's attack on UCI and more than 40 other universities and military computers exploited well-known flaws in the Windows NT and Windows 95 operating systems. Indeed, the CERT Coordinating Center at Carnegie Mellon University in Pittsburgh the main organization that tracks Internet security problems issued an alert in November that identified the bug and pointed to the fix in advance of last week's attack. Trouble is, many systems administrators ignored the warning or were simply too busy to make the suggested changes. "We probably could be more systematic in continually upgrading our defenses against Internet attacks," Bill Parker, head of UCI's office of academic computing, said last week. "The problem is ... there's a patch coming out every two weeks. If you send out emergency notices every two weeks, pretty soon no one's listening." Hackers who view themselves as purists the ones who crack security codes and probe holes in computer networks for kicks dismiss these pranks as the immature acts of adolescents; the electronic equivalent of a joy-ride. Such high-profile attacks grab headlines coast to coast. But aside from a little inconvenience, they're pretty benign. The most damaging attacks often go unreported. More than six out of 10 corporations, financial institutions and universities suffered security breaches during the past year, according to the survey by the Computer Security Institute in San Francisco. But only 17 percent reported the electronic crime to law enforcement. The rest kept mum, fearing negative publicity. One unnamed company estimated a break-in cost at $25 million. As more business is transacted online, the lure grows ever stronger for cybercrooks to seek trade secrets, confidential information or credit card numbers, experts say. Some security experts don't expect the tide will turn until corporate attitudes change. Coopers & Lybrand's Boni said chief executives are leading the charge to get online, placing a premium on transacting business with customers electronically. "The management priority is to get connected and fix any security problems afterward," said Boni. "They can't see security vulnerabilities until they show up on the front page of the paper." 5.0 Defenstrator's Rant =-=-=-=-=-=-=-=-=-=-=-= This pathetic rant spouted by Defenstrator... Those God-Damned Southerners This could be like a seven-thousand part article, but it's not. This is a one-time incident which I think is example of why we should blow the living fuck out of the South. Even though I live there. A little note, this takes place in Charlotte, North Carolina, when I was at work. I was at work, minding my own damn business, when some lady comes in. I was being all civil to her and stuff, when I was talking to my friend about a 3-on-3 basketball tournament I was in on the previous weekend. We came in 5th out of 100, not that you asked. But she overheard me, and she says, "You know I coach in my church league.". I said, that's great, but I didn't give a flying fuck. So I get back to yakking, the usual "oh I put the shits on that guy", yadda yadda yadda. Then the person speaks up again (notice I am being nice, not calling her a ho or anything), and says to me, "Do you go to church?". I say yes, as I don't want to lie (why the fuck not?) and it's not like I vehemently deny it, or give a damn either way. So I still go back to talking and the bitch won't leave me alone. She says, "What religion are you?". I say, "Catholic", as if anyone really gives a damn, and my tone of voice says I don't either. So this being the South, she wants to press her religion on everyone she meets, so she starts saying how great her church is, and by this time I could start a jihad and blow the fucking thing up I'm so mad at it. So she goes into the details of her church, which seems to be the social life of half the people I meet, which is sad considering we have professional sports (not NASCAR you redneck motherfuckers). Anyway, I'm going to go into the details of it only because it is fresh in my mind. Her: We have a great youth group. Me: (puzzled, doesn't know what the hell that is), That's wonderful (enormous sarcasm) Her: You can play basketball there. Me: I can play basketball anywhere, stupid. Her: Well, at least take this. I thought it was going to be like a tip or something (I get tips sometimes if I'm like real nice to the people because they know I work for crap money), but, NO, it's a damned pamphlet. Like the Jehovah's Witnesses, except I think it's a misdemeanor to shoot preachers here (at least it was in New York). I look at the thing, the front says "If you died today, would you go to HEAVEN (nice font thing) or HELL (font you see like on married with children, stuff dripping off the letters). Then the bitch finally leaves. My friends behind me are dying of laughter, and I throw the pamphlet away and yell at them because they didn't get someone to cart her away or something. Anyway, the whole point of this is that I am sick and FUCKING tired of Southerners pushing their values on stupid people, which are in abundance in Charlotte. It's all in the papers, about how people's moral values are decaying and they need to get back to God or something like that. I mean, GIVE IT THE FUCK UP! If you asked a random Southerner what the largest religion in the world was, money says they would say "Baptist". These people are ones, after hearing all the wack places I've been (a lot, believe me), one person spoke up and said "I've been to Nebraska and the beach!". Damn naive bastards. One person who I know has never been out of his COUNTY. GAH. Who's the stupid one now, motherfucker? They think Singapore (where I used to live, yes the ass whooping country, Michael Fay is a drunken fuck) is a place "down in China somewhere". Then they get in "thair truuuck" and "git awn down" to their church to do whatever the hell it is they do, push Southern Baptism on Northern Brooklynite motherfuckers like me. This person obviously felt the need to "save" me by trying to convert me to another faceless follower, spouting Bible verses and condemning everyone else. I don't fucking think so. So, leave me alone and you'll be alright. I can make decisions for myself, fuckheads. -defenestrator --------------------------- defenestrator@hempseed.com http://piss.home.ml.org 6.0 Exploiting WinGates For Fun And Profit =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Kalony's fr0 is responsible for this...* [*=Used w/out Kalony's permission] Overview WinGate is software that allows multiple users to simultaneously be connected to the internet via nearly type of connection (modem, ISDN, LAN). WinGate runs on any Win95 or NT system. Anybody can share a connection with the WinGate host as long as they are running any type of client computer running TCP/IP. Finding a WinGate Server Finding a WinGate server is incredibly simple. First off, you get a WinGate scanner. Basically all a WinGate scanner does is attempt a connection to port 23 on all the hosts under a certain server (i.e. 1.1.1.*) looking for a WinGate> prompt. When it receives a WinGate> prompt it records the host. That is what you are looking for. You can actually do it manually by telnetting into all 255 hosts. :) But that might be a little time consuming. WWW Proxy To use WinGate as a WWW Proxy server in Netscape 3.x, go to Options in the menubar, then click Network Preferences. Click the Proxies tab then make sure the radio button corresponding with Manual Proxy Configuration is filled, then click View.... In the HTTP Proxy: box input the WinGate server. In the Port: box input 80. Click OK, then OK again. Try to go to a web page. The most common error you'll receive is Socket Error. This doesn't mean that your proxy isn't setup correctly, it just means that something screwed up. You'll get that error every time you attempt to go to that page. I really don't know why. Try a different page, try http://www.wingate.com. That's always worked for me when I got the proxy setup correctly. Now onto FTP proxies. Telnet WinGate can also be used in shell hopping. Telnet to your WinGate host. You will get a WinGate> prompt then type "telnet ". Simple as that. IRC This is one of the most entertaining ways of using WinGate. Start up your IRC client, then follow these steps: 1. type: /server 23 2. type: /raw nick 3. type: /raw user Number 1. and 2. are self explanatory, number 3. may take a little explaining. Your ident is what comes before your server when somebody /whois's you. Such as: ident@host.server.ext Your host can be anything you decide, they expect you to put your host, but in reality, you can put 'shit' if you want to. Your server is the same as the host, they expect the server, but will accept 'shit.' Your real name is fairly self explanatory except for one thing. If it is a single word, such as 'George', then you don't need to read the following. If it is two words, however, you will need to place a colon (:) in front of your real name. Example: /raw user ident host server :George Wilkes Summary That about wraps it up. I didn't discuss it, but WinGate can be used for FTP and a firewall also. Try to figure it out yourself. Anyway, have fun and don't hurt yourself. 7.0 DEF CON 6.0 Announcement v1.0 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Handed over by the one and only Dark Tangent... READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB DEF CON 6.0 Convention Announcement #1.00 (03.27.98) July 31-August 2 @ The Plaza Hotel and Casino in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON 6.0 Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON 6.0 Convention Announcement XXXXXXxxxxxxXXXXXX X X DEF CON 6.0 Convention Announcement XXXXXxxxxxxxxXXXXXXX X DEF CON 6.0 Convention Announcement XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON 6.0 Convention Announcement XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON 6.0 Convention Announcement XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON 6.0 Convention Announcement XXXxxxxxxxxxxxxXXXXXXXX DEF CON 6.0 Convention Announcement XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON 6.0 Convention Announcement XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON 6.0 Convention Announcement XXXXXXxxxxxxXXXXXXXXX X DEF CON 6.0 Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON 6.0 Convention Announcement XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON 6.0 Convention Announcement READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB IN SHORT:-------------------------------------------------------------------- WHAT: Speakers & partying in Vegas for hackers from the world over. WHEN: July 31st - August 2nd WHERE: Las Vegas, Nevada @ The Plaza Hotel and Casino COSTS: $40 at the door MORE INFO: http://www.defcon.org/ or email info@defcon.org IN LONG:--------------------------------------------------------------------- It's time to brave Las Vegas again for DEF CON! This is an initial announcement and invitation to DEF CON V, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired. It seems that books about the culture are becoming more popular, so of course reporters are also welcome. You won't be hurt. I promise. Just bring cash for drinks. So you heard about DEF CON V, and want to hit part 6.0? You heard about the parties, the info discussed, the bizarre atmosphere of Las Vegas and want to check it out in person? You want to do weird shit _away_ from the hotel where you can't get me in trouble? You have intimate knowledge of the SWIFT network, and want to transfer millions of dollars to the DEF CON account? Then you're just the person to attend! What DEF CON is known for is the open discussion of all ideas, the free environment to make new contacts and the lack of ego. More people have made great friends at DEF CON over the years than my brain can conceive of. DEF CON is also known for letting the "Suits" (Government / Corporate) mix with everyone and get an idea of what the scene is all about. The media makes an appearance every year and we try to educate them as to what is really going on. Basically it has turned into the place to be if you are at all interested in the computer underground. SPEAKERS:-------------------------------------------------------------------- Over the years DEF CON has had many notable speakers. This year there will be more of an emphasis on technical talks. There will be a separate smaller room for break-out sessions of more specific topics. While the talks of the past have been great, it always seems some tech people drop out and general talks fill in. I will load it tech heavy so when people do drop out there will still be plenty of meat left for the propeller heads. There will be speaking on all day Saturday and Sunday. About 20 people will speak, plus smaller tech sessions. If you are interested in speaking or demonstrating something please contact me. Current speakers include: [> If you are interested in speaking please contact me at dtangent@defcon.org [> Jennifer Grannick, Attorney at Law. [> Peter Shipley, [> SCHEDULE:-------------------------------------------------------------------- FRIDAY July 31st: Network Setup, Sign in, Informal PGP Keysigning at the "PGP table", Lots of Partying. Capture the Flag Contest Starts earlier this year. 10:00 - Doors open, sign in starts 16:00 - Capture the Flag III starts 22:00 - 23:59 Hacker Jeopardy Starts. SATURDAY August 1st: Speeches, people selling stuff, Capture the Flag, The DEF CON shoot, other special events to be announced. 10:00 - 10:50 11:00 - 11:50 12:00 - 12:50 13:00 - 13:50 14:00 - 14:50 15:00 - 15:50 16:00 - 16:50 17:00 - 17:50 Saturday Breakout Tech Sessions: 22:00 - 23:59 Final rounds of Hacker Jeopardy. SUNDAY August 2nd: Wrapping up Capture the Flag, award giveaways, demonstrations to be announced. 10:00 - 10:50 11:00 - 11:50 12:00 - 12:50 13:00 - 13:50 14:00 - 14:50 15:00 - 15:50 Sunday Breakout Tech Sessions: Breakout Tech Sessions: 16:00 Awards for Capture the Flag End of it all, cleanup, etc. See you all next year! EVENTS:---------------------------------------------------------------------- [> BLACK & WHITE BALL Saturday evening 19:30-20:00 in the speaking hall: New Rule: No one allowed into the Black & White hall with out dressing up one way or the other. You can always hang out in the main hall if you don't like it! I have learned from last year, and have refined the Black & White Ball for this year. For the last two years at DEF CON there has been a sort of unspoken Saturday night dress up event. People have worn everything from party dresses and Tuxedoes to AJ's ultra pimp Swank outfit with tiger print kilt. Wear your cool stuff Saturday night, be it gothic, PVC vinyl, or Yakuza looking black MIBs. No prizes, just your chance to be the uber-bustah pimp. Live DJ action, a cash bar and some cooling out to be had by all. [> THE TCP/IP DRINKING GAME: If you don't know the rules, you'll figure 'em out. [> CAPTURE THE FLAG: [> NET CONNECTION AND TOPOLOGY: [> 6th ANNUAL SPOT THE FED CONTEST: The ever popular paranoia builder. Who IS that person next to you? "Like a paranoid version of pin the tail on the donkey, the favorite sport at this gathering of computer hackers and phone phreaks seems to be hunting down real and imagined telephone security and Federal and local law enforcement authorities who the attendees are certain are tracking their every move.. .. Of course, they may be right." - John Markhoff, NYT Basically the contest goes like this: If you see some shady MIB (Men in Black) earphone penny loafer sunglass wearing Clint Eastwood to live and die in LA type lurking about, point him out. Just get my attention and claim out loud you think you have spotted a fed. The people around at the time will then (I bet) start to discuss the possibility of whether or not a real fed has been spotted. Once enough people have decided that a fed has been spotted, and the Identified Fed (I.F.) has had a say, and informal vote takes place, and if enough people think it's a true fed, or fed wanna-be, or other nefarious style character, you win a "I spotted the fed!" shirt, and the I.F. gets an "I am the fed!" shirt. NOTE TO THE FEDS: This is all in good fun, and if you survive unmolested and undetected, but would still secretly like an "I am the fed!" shirt to wear around the office or when booting in doors, please contact me when no one is looking and I will take your order(s). Just think of all the looks of awe you'll generate at work wearing this shirt while you file away all the paperwork you'll have to produce over this convention. I won't turn in any feds who contact me, they have to be spotted by others. DOUBLE SECRET NOTE TO FEDS: This year I am printing up extra "I am the Fed!" shirts, and will be trading them for coffee mugs, shirts or baseball hats from your favorite TLA. If you want to swap bring along some goodies and we can trade. Be stealth about it if you don't want people to spot you. Agents from foreign governments are welcome to trade too, but I gotta work on my mug collection and this is the fastest way. NEW THIS YEAR: Fashion Tips for Feds (courtesy of Wrangler) It was like shooting fish in a barrel last year, so to make things tougher here are some fashion tips to better hide your presence. number five - Vegas, not Maui; lose the Hawaiian shirt! number nine - clothes should disguise your physically fit body number twelve - leather, guys, leather number nineteen - only smile at chicks, not all the time [> Spot the Screenwriter Contest So basically if you see some very well dressed, Gucci loafer wearing, well tanned, double decaf expresso drinking person packing a laptop beyond the budget of your average hacker, technology journalist, or "I'm not a fed, I'm a hacker, and I try very hard to look like a hacker, Fed" asking lots of questions that could have already answered in 'Secrets of an Uber-Hacker' Then you may have spotted a screenwriter! Again the discussion can start if this person is truly a screenwriter and not a vacationing member of the board of a recently IPO'd Silicon Valley start-up! :) After voting, If the screenwriter fesses up and admits to scouting for information on hackers, That lucky resident living near the corner of Hollywood & Vine will get a... 'I am the screenwriter' shirt, (Design being worked on) Followed up by the lucky person who likely reads Variety as much as Wired, will recive the 'I spotted the screenwriter!' t-shirt (Design also being worked on) Note to screenwriters and journalists thinking about taking up screenwriting, I am really doing this insure that hacking and bleeding egde technology gets reported correctly and not like some sort of the privacy sucking Flash Gordon wizzbang dohicky that most of the technology gets perceive as by Joe Couch-Potato and Joe Senator. I also need more leads for my portfolio at the Hollywood Stock Exchange. :) http://www.hsx.com/ Comments, Complains, and Flames to the usual address, and you wouldn't be reading this if I was already in your killfile. Cheers! William Knowles erehwon@dis.org HOTELS:---------------------------------------------------------------------- [> Book your room NOW!!! We have a block of rooms, but it is first come, [> first served. Rooms get released about one month before the convention. [> Book by June 9th or risk it. The room rates are quite cool this year. Jackie Gaughan's Plaza Hotel Number One Main Street in the Old Downtown Las Vegas Reservations Phone Number: 1-800-634-6575 When reserving a room reference the "Network Security Solutions" conference. There are four room sizes available. On Friday and Saturday night they are $50 for a single/double room, $60 for a 1 king bed room, $100 for a suite with 1 bedroom and 1 king sized bed or 2 queen sized beds and $150 for two bedrooms with 1 king and two queens. STUFF IN VEGAS:-------------------------------------------------------------- URLs Listings of other hotels in Las Vegas, their numbers, WWW pages, etc. http://www.intermind.net/im/hotel.html http://vegasdaily.com/HotelCasinos/HotelAndCasinos/CasinoList.html VENDORS / SPONSORS / RESEARCH:----------------------------------------------- If you are interested in selling something (shirts, books, computers, whatever) and want to get a table contact me for costs. If you have some pet research project and you want to have the participants fill out anonymous questioners please contact me for the best way to do this. If you want to sponsor any event or part of DEF CON 6.0 in return for favorable mentions and media manipulation please contact me. This year Secure Computing Corporation, Index Publishing Group, The London Pirate Radio show InterFace, and Some Caffinated Drink Company are currently sponsoring events and atmosphere. MORE INFO:------------------------------------------------------------------- [> DEF CON Voice Bridge (801) 855-3326 This is a multi-line voice bbs, VMB and voice conference system. There are 5 or so conference areas, with up to eight people on each one. Anyone can create a free VMB, and there are different voice bbs sections for separate topics. This is a good neutral meeting place to hook up with others. [> WWW Site http://www.defcon.org/defcon-6-pre.html Convention updates and archives from previous conventions are housed here. Past speakers, topics, and stuff for sale. Also a growing section of links to other places of interest and current events. This is the main source for all convention updates. Hotel contact information, room rates, updated speakers lists, etc. can be found here. [> MAILING LIST Send email to majordomo@merde.dis.org and in the body of the message include the following on a separate line. subscribe dc-stuff dc-stuff is related to general conversation, planning rides and rooms, etc. Be warned! When the convention time is near the list starts to generate quite a bit of traffic (As if it doesn't now!) [> The DEF CON Shoot Event Catch all the information and links necessary to participate at this years official DEF CON Shoot. http://afropimps.com/dcshoot/ [> The DEF CON 6.0 Car ride sharing pages: Boogah187 has set up an Orange County California Ride share page. http://www.fortunecity.com/skyscraper/lynx/281/index.htm The Colorado 303 Area Code ride sharing page by the alien: http://www.dim.com/~rage/defcon/ BroncBuster is in effect with the First Annual Northern California Ride Sharing page at http://www.showdown.org/def-con-VI.html The 604/250 Area Code (British Columbia, Canada) 2600 chapter welcomes you to share ride, room, and board to DEFCON and back. Hosers Kick Ass. No NT people. http://web.uvic.ca/~fool/defcon.html Email TuxedoMask@Cyberdude.com if you are interested in his ride caravan to Defcon from Phoenix and surrounding cities in the 602. [> EMAIL dtangent@defcon.org Send all email questions / comments to dtangent@defcon.org. It has been said that my email is monitored by various people. If you want to say something private, please do so with my pgp key (At the bottom of this announcement) I usually respond to everything, if not I'm swamped or had a system problem. DO YOU WANT TO HELP?--------------------------------------------------------- Here is what you can do if you want to help out or participate in some way: Donate stuff for the continuous giveaways and the various contests. Got extra ancient stuff, or new cool stuff you don't use anymore? Donate it to a good cause! One person was very happy over winning an osborne "portable" computer. ORGANIZE sharing a room or rides with other people in your area. Join the mailing list and let people know you have floor space or some extra seats in your car. Hey, what's the worst that can happen besides a trashed hotel room or a car-jacking? CREATE questions for hacker jeopardy (you know how the game is played) and email them to winn@infowar.com. No one helped out last year, so this year let's try. Everything from "Famous narks" to "unix bugs" is fair game. BRING a machine with a 10bt interface card, and get on the local network, trade pgp signatures, etc. 8.0 Ask The Magic 8-Ball =-=-=-=-=-=-=-=-=-=-=-=- As interviewed by Boogah187 Boogah - Hello 8-Ball. As of late you've enjoyed a renaissance as a prophet to a whole new generation. Is this renaissance appreciated? 8-Ball - My sources say no B - So, are you trying to say that people are draining your psychic ability to predict future events? 8 - As I see it yes B - Well, you are very aware that you are the last bastion of truth on the Earth. Would you mind answering some questions for us? 8 - Reply hazy try again B - I was simply wondering if you would answer some questions for us. 8 - Yes B - First question - Is Bill Gates the anti-christ? 8 - It is decidedly so B - Do you suggest we use an alternate OS such as LINUX or Free-BSD? 8 - As I see it yes B - Will it save our souls if we all do so immediately? 8 - My reply is no B - So anyone who's used a MS product is doomed? 8 - It is decidedly so B - Bummer. Next topic - Is the world safe from alien invasion? 8 - Better not tell you now B - Can you tell me anything on the topic? 8 - Most likely B - It just matters on the question? 8 - Yes definitely B - Hrm... So should I go max out my credit cards and spend my last days on a remote island? 8 - As I see it yes B - Well, do we have at least 2 months until the pending invasion? 8 - Don't count on it B - Shit, are you yanking my chain 8-Ball? 8 - Yes B - You asshole. *Boogah throws 8-Ball across the room in rage* Are you sorry about that? 8 - Signs point to yes B - Good you pig fucker. Now gimme some straight answers. Okay? 8 - My reply is no B - Dammit! I knew if I threw you I'd hurt your feelings and you'd be upset with me. I'm sorry. Apology accepted? 8 - It is decidedly so B - Okay. Much better. Next question - Did OJ kill his wife? 8 - Yes definitely B - Did Kato assist Mr. Simpson in the murders? 8 - Don't count on it B - Interesting. I have a theory that OJ acted alone. However I also believe that he was set-up and brainwashed by the New World Order to kill Ron Goldman therefore stopping the world from getting a powerful serum that cured AIDS, impotence, genital warts, and nicotine addiction. Does this sound far fetched to you? 8 - My sources say no B - Woah, shit. Deep. You heard it here first folks. Well that's all the time we have for this session. Be sure to come back next time when we ask the 8-Ball more pertinent questions. Good night and God speed. 9.0 Closing Comments =-=-=-=-=-=-=-=-=-=- Put forth by Boogah187 Well, we're at the end of another issue. I'll cut through the bullshit and just hand out the special thanks, fuck you's and the updated staff list. Special Thanks: --------------- Petty Larceny - For kicking me in the ass to get this done Unkie noid - For landing me that DEFCON 6 staff position Dark Tangent - For letting noid talk him into letting me have a DC 6 staff position Enigma - Yeah, Enigma. If it wasn't for him I wouldn't have been inspired to make my car caravan page. Thanks for having enough capacity for allowing me to loathe your page. My Girlfriend - Because I'm whooped. Fuck You's: ----------- RBCP, Logic Box and all their loser friends - No comment. The (vee-pee) Army [Staff]: --------------------------- Active Duty =========== Boogah187 - Publisher, editor, promotional whore Petty Larceny - Co-Editor, contributor Unkie noid - Contributor, mentor Defenstrator - Contributor MIA === DanoZano - Contributor The Captain - Contributor MySTiK - Contributor Xor - Contributor Bobbillama - Contributor That's it... Go away now. [EOF]