[36;40m


[0;36;40;1mListing [37mPHANEWS1.TXT[0;36;40m


                       Phreakers/Hackers/Anarchists
                -----  ============================  -----
               (P/H/A)    NEWSLETTER - ISSUE ONE    (P/H/A)
                -----  ============================  -----
                       Phreakers/Hackers/Anarchists

                          Volume One, Issue One
                        Release Date: May 14, 1990


[Part 1]: Introduction
======================

    Welcome to the first group and informational newsletter published by
Phreakers/Hackers/Anarchists 1990. In this issue, we hope to offer a general
overview of our group and several other topics of interest. Since this is
a group sponsored newsletter, the primary authors of the articles offered
in this and any other future newsletters will be group members.
    Anyway, enjoy the magazine and any comments or suggestions can be
submitted to any bulletin board representing P/H/A or any P/H/A member.

                                                Doctor Dissector
                                                ---Editor


[Part 2]: Table Of Contents
===========================

    Part    Subject                                 Author
    ----    ------------------------------------    ----------------------
    1.1     Introduction                            Doctor Dissector
    1.2     Table Of Contents                       Doctor Dissector
    1.3     How To Have Phun At Radio Shack         Black Death
    1.4     Fake Mail                               Razor
    1.5     NUA Scanning By NUAA                    Doctor Dissector
    1.6     P/H/A Member List                       Doctor Dissector
    1.7     P/H/A Product/File List/Descriptions    Doctor Dissector
    1.8     Conclusion & Closing Notes              Doctor Dissector


[Part 3]: How To Have Phun At Radio Shack
=========================================

                       Black Death Proudly Presents A

               /////////    **      //     //     **      //
              //     //    **      //     //     **      ////
             //     //    **      //     //     **      //  //
            /////////    **      /////////     **      //    //
           //           **      //     //     **      //////////
          //           **      //     //     **      //        //
         //           **      //     //     **      //          //

                  Phreakers/Hackers/Anarchists Production

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

                      "How to Have Phun at Radio Shack"

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Disclaimer: This file is for Entertainment Purposes only. Radio Shack is a fine
Americain Establishment and should be treated with Honor and Respect. Neither
the Author or his companions endorse violence, anarchy, or any related
subjects.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

        Allright, so you're wandering through your local mall, and you're
thinking, "Why the Hell am I here?" You're surrounded by Flat-Chested Pre-Teens
with high-squeking voices and you're really starting to get annoyed.
        But Wait, Up Ahead in the Distance, you see a Shimering Light... Could
be? By George, it is.
                              RADIO SHACK

        The Possibilities are endless. An Entire Store, Filled with Idiots who
haven't the slightest Idea what they're doing. Once I was shopping there for
some Capacitors, POTs, etc.. and I asked the guy if I could substitute one part
for another (I was attempting a Red Box), so the guy says, "Nobody here knows
what this Shit is. We had a guy here a few years ago who did, But I fired him.
Didn't like him.."

        This should give you a picture of the Mentality of the Basic Radio
Shack employee. Anyways on with the story. These stores have lots of
potentially phun products. Let's take a step-by-step look at some of the better
ones.

        First lets look around for those Nifty Remote Control Cars they usually
have sitting around. Found 'em? Great. Now if you're EXTREMELY lucky they'll
have batteries in them. Most, however, will not. So you're going to have to
supply the batteries yourself. Not Carrying them with you? Go buy em from Radio
Shack. OK Now that you have you batteries put them in the car of your choice.

        Place the Car in a choice posistion in which you think it will startle
them the most. (ie: on top of the boxes of other cars, &c).

        Now you have two choices, either do it yourself, or have someone else
do it for you. I highly suggest the latter. So what you do is, turn the car on,
hopefully, the engine doesn't make too much noise. Now you have to get someone
to use the damn thing. A couple methods I find effective are

A) Go up to the guy working at the counter and say, "Excuse me, but could you
explain the little joystick in the middle of this thing to me?" He'll think
you're pretty stupid, but hey, we're dealing with Radio Shack Employees here.
Most Likely, his Explanation will involve moving the joystick, sending th car
flying off the boxes.

B) (Kinda week, But some people are really, really dumb) Place the controller
by one of their computers. Put a sign (hand written or typed) saying "Try our
NEW Wireless Joystick" Next to it. Some kid will eventually come along, and
Boom.. There goes the car.

        But there are other things to do here too! Yes that's right! More!
Go to the back (or wherever they have all their Electronic parts) and switchj
around all the labels for the CAPs, POTs, Etc... This will take the average
worker quite a while to get back in order..

        Also, most Radio Shacks are kind Enough to provide us with ready to use
computers. How Sweet. Most of them will have a nice text editor with them.
You can do pretty much anything from here. If you want to be direct about it,
just delete their hard disc. But I think we can have more fun with them than
that. You can screw around with their config.sys a bit, add a bunch of weird
shit in there and see what happens. Have phun with it. Then there's the
autoexec.bat file. You can fuck around a bit in there, make it...

:echo off
:echo Fatal Error 1012
:prompt -Please Reboot-
:echo on

        That wil keep the average worker wondering for a while. Yeah, like I
ssaid, they aren't too smart.

        Now if you're Really Phortunate, you may find a Basic Compiler (Or
Pascal, C, etc..) Lying around their disc somewhere. If you're familiar with
the language you can type up a nice virus and put it in their autoexec file.
What the hell, Bring your own virus to radio shack and stick it in there.

        I'm sure you get the general idea. Do whatever you want, it's not as
if you're the one who's gonna have to pay for it. Just make sure you pick up
one of their catolouges (which brings up another interesting radio shack
quote...

Me: Do you Have a Catolouge?
Worker Guy: Yup, Sure do!
<Pause>
Me: Well, You think maybe you can give it to me?
Worker dude: Oh! OK yeah sure!

... Anyways pick up one so you can look up all the parts for your, uhh.. ,
science project! Yeah that's it! Gotta do a science project on, uhhh,
Telecommunications in the 1990s. That's the ticket.
Have Phun.


[Part 4]: Fake Mail
===================

PHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHA
PHA                                                                        PHA
PHA                       Phreakers/Hackers/Anarchists                     PHA
PHA                       ----------------------------                     PHA
PHA                            F A K E    M A I L                          PHA
PHA                                                                        PHA
PHA                             Written By Razor                           PHA
PHA------------------------------------------------------------------------PHA
PHA Edited By Doctor Dissector           Completed On Sunday May 6th, 1990 PHA
PHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHA

1.Disclaimer
------------
        All lamers and narcs be aware that this textfile is purely for
informational and educational purposes.  Razor and his sponsor group will
P/H/A take no responsibility for the accuracy or reliability of any of the
information in this file and how any of this file is used. So, "Fuck Tha
Police!"

2.Question
----------
        Are any you one or more of the below? If so, then this textfile is
for you!

            1. A r0dent who likes to send anonymous hate mail.
            2. A hacker interested in the complex and enourmous innards of
               the mail system "available" for your use.
            3. Just some d00d who is interested in mail.
            4. A lamer who doesn't fit any of the above descriptions.

3.Nitty Gritty
--------------
        If you have a a gateway allowing access to the Internet and allows
the specification of a port to be applied as a suffix to the Internet address
of any system, you, whether you know it or not, have a very useful hacking
tool at your finger tips.
        This hacking tool allows you to both send fakemail from ANY system
accessible in the Internet and other network domains with an Internet address
and allows you to determine if a used on ANY system accessible from the
Internet exists.
        You should be able to realize the power of such a tool.  Think of
it this way, you can send anyone on the Internet fake mail for phun or
whatever, and you can verify the existance of ANY user accessible by mail;
something which will allow you to find an existing user and proceed to hack
that user's account on that user's particular host system.
        This tool is called "Sendmail" (easy enough), and is installed as
port 25, which can be accessed via Telnet (NOT TELENET) or Rlogin protocols.
Now we will go into getting to the port 25 and what to do once there.

4.How To
--------
        When you use a the Telnet or Rlogin protocol to connect to a
different computer system, you can specify an additional port of the host
system in question.  The port we are concerned with in this textfile is
port number 25, the Sendmail utility.  If you are wondering how to specify
an additional port to connect to, just add a " 25" to the end of the
Internet address you are attempting to access.

    ie...

    You want to make the fakemail appear as if sent from a system
    connected to 128.113.40.157:

    d00dnet>telnet 128.113.40.157 25

    You can also utilize the rlogin protocol or use a name such as
    "phavax.ucla.edu 25" if you don't want to type in the numbers.

    When you are connected you will get a message such as the
    following:

    220 phavax.ucla.edu Sendmail 5.59/1.13 ready at Sat,5 May 90 05:29:31 PDT

         |                        |                      |                |
         |                        |                      |                |
         |                        |                      |                |
   Host System             Version Of Utility     Date Information   Time Zone


5.Sending Fake Mail
-------------------
        If you are interested in sending fake mail from this host system, you
should first verify the existance of the receiver you want to send the mail
to. BTW, this can also be used to send valid mail if you really, really,
really, want to (duh...). The verify user command can be done by the
following:

    VRFY <USER NAME>

Where <USER NAME> is the person you want to send mail to.  This <USER NAME>
should be a full network/mail path the that user or your search may turn up
emptyhanded.  If the entered name is valid, it will it will tell you so and
if not it will tell you so.

    The next step is to tell the Sendmail facility who is to receive the
mail.  You do this like the following:

    RCPT TO:<USER NAME>

Where <USER NAME> is the recipient.  Then you tell the host who is sending
the mail. Do this like the following:

    MAIL FROM:<YOUR USER NAME>

Remeber that <YOUR USER NAME> does not have to be valid and that is most
adventageous use of this system.

    Now, if you really want to get dirty or messy, you can even fake which
host you are mailing from. This is done with the following command:

    HELO <HOSTNAME>

Again, the <HOSTNAME> does not have to be valid, but you probably want it
to look realistic; something like "D00DLAND.PHAVAX.EDU" would be cool.

    Ok, when you are done playing with changing names, recipients, systems
and whatever, you will find the time to actually SEND the message you want
to send to your victim (well, if the recipient isn't a victim by now, I don't
know what he/she is!). This is done by issuing the DATA command like the
following:

    DATA

Sendmail will respond and will tell you to type your message, ending it with
a "." on a line by itself.


6.Verifing Names
----------------
        The following command is useful for verifying the existance of account
names on the host system.  This can come in as handy in finding default
accounts on certain systems you might want to hack later or just to make sure
your victim exists:

    VRFY <USER NAME>

The <USER NAME> must be the full network path the the user's mailbox on
whatever system is host to him/her (such as "PRICK@PHAVAX.UCLA.EDU"). The
Sendmail utility will state whether or not the name is valid.


7.Misc...
---------
        Well that is about it. I hope that this information is useful to you.
In appendix A I have included a sample session which has been captured into
my buffer. Remember that you can get help at any time by typing HELP.


8.Greets and Et Cetera
----------------------
        P/H/A Rules!
        Fuck You To R.A. >> R0dents Anonymous!

Later
     Later
          Later
               Razor P/H/A

PHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHAPHA

Appendix A:
-----------
(This is a sample session which has been preserved as a demo for you d00dz who
 still don't understand this.)

---Beginning Of Capture---

D00dznet>rlogin dewd.phavax.edu 25
Trying...
Connected to wind.
Escape character is '^]'.
220 dewd.phavax.edu Sendmail 5.59/1.13 ready at Sat,5 May 90 03:22:32 PDT

HELO POPEYE.UCSD.EDU
VRFY ROOT
404 System <root>
RCPT TO: ROOT
ROOT OK
MAIL FROM: POPEYE
POPEYE OK
DATA
Hey you big fat lamer! I'm entering my message to ROOT on this system!
I'm Popeye the sailor man.... toot toot!
.
Message Ok
QUIT
Session Ended By Foreign Host
D00dznet>

---End Of Capture---

That piece of mail would have the following stats:

FROM: POPEYE@POPEYE.UCSD.EDU
TO: ROOT
DATE: Sun 6, May 90
TIME: 08:29:31 PDT

Note that the ROOT is the ROOT on the current system, since a full network
path was not specified.

Well that is about it, Latrooo!


[Part 5]: NUA Scanning By NUAA
==============================

    The following is a large list of NUAs in domesic (SprintNet Domestic,
DNIC 3110) which accept collect calls and are working as of this release
date. Thanks to NUAA (Network User Address Attacker), this large scale
scanning was done in a minimal amount of time. Enjoy...

                                                Doctor Dissector

Address          Description/Capture
---------------  ---------------------------------------------------------
201521           BANKERS TRUST
201522           *** BTR *** NYBTRP - BTrics System
201586
201587
201589
201604
201605
201702
201722
201730
201751
201752
201770
201792
201799
201830
201841
201850

202001
202002
202010
202012
202031           NewsMachine 2.9 - 42 03
202042           Please enter your terminal id; '?' for MENU; 'L' to LOGOFF
202049
202132           VMS
202133
202134
202141           User name?
202142           User name?
202150           VAXUPI>
202161           pac/login:
202201           User ID:
202202           User ID:
202203           User ID:
202214           PRIMENET 21.0.6.R22 SPA
202217
202235           PRIMENET 22.0.0 AMSB
202239           PRIMENET 22.0.0 AMSA
202245           AOS/VS Rev 7.62.00.00
202308           User name?
202309           User name?
202312           User name?
202336           VMS
202337           VMS
202356           PRIMENET 22.0.1v SYSA
202361
202365
202366
202367
202369
202430
202435           PRIMENET 22.0.2 UK-DPO
202437           User name?
202439
202440
202441
202442           You are now connected to the computer. (16)
202444
202456
202457
202458
202459
202466
202467
202469
202470
202472
202477
202550
202693
202810           TELENET ASYNC TO 3270 SERVICE
2021180          INVALID-SW-CHARS/TYPE IN ONE OF THE FOLLOWING:
2021181          ENTER TERMINAL TYPE:
2021182
2021325          VMS
2021355          PRIMENET 22.0.1 GEC
2021380
2021384          PRIMENET 22.1.1.R11 CGYARD

203022           VM/370 ONLINE--MID
203028           VM/370 ONLINE--MID
203066           Login Please :
203072
203073
203136           PRIMENET 20.2.7 SYSA
203165           TELEKURS

206065           PRIMENET 21.0.4 OAD
206174

208070           Welcome to the NET

217026           SET13:4/UofI CSO Pyramid 98x (osiris.cso.uiuc.edu)/OSx 4.0

219003           PRIMENET 22.1.0vA2 NODE.0
219004           PRIMENET 21.0.5vB NODE.1
219005           PRIMENET 22.1.1.R11vA NODE.2
219006           PRIMENET 21.0.5vB NODE.4
219007           PRIMENET 21.0.5vC NODE.5
219008           PRIMENET 22.1.1.R11vA NODE.8
219009
219010           ENTER TERMINAL TYPE:
219031           ======IBM 3708===EC   A58809======RID 3708-001 88-0017596===

2120031          VM/370 ONLINE--VM/3084
2120039          PRIMENET 19.4.5native IDDD
2120040          PLEASE ENTER /LOGIN
2120041          MHP201A UPK05167  * VERSION 5.5.4 *
2120079          MMMMMM/WWWWWW
2120100          **** Invalid sign-on, please try again ****
2120101          **** Invalid sign-on, please try again ****
2120102          **** Invalid sign-on, please try again ****
2120103          **** Invalid sign-on, please try again ****
2120104          **** Invalid sign-on, please try again ****
2120130
2120137          PRIMENET 22.1.1.r17.ptc.7 NY60
2120141          User name?
2120142          User name?
2120145          ENTER ACCESS ID:
2120146          ENTER ACCESS ID:
2120152
2120170          INFORMATION SERVICES NETWORK
2120172          INFORMATION SERVICES NETWORK
2120174          INFORMATION SERVICES NETWORK
2120200
2120216          PLEASE TYPE YOUR TERMINAL IDENTIFIER:
2120226          USER ID
2120231          VM/370 ONLINE--VM/3084
2120246          UNITRAC 5.1 VMS
2120248          PRIMENET 20.2.4 RYE
2120258          ENTER ACCESS ID:
2120259
2120260          BANKERS TRUST
2120266          Pyramid Technology dualPort OSx (py100)
2120267          Pyramid Technology dualPort OSx (py100)
2120269          USER ID
2120275          BANKERS TRUST
2120277
2120320          Logon in progress.  Please stand by...
2120321          Logon in progress.  Please stand by...
2120339          VMS
2120340          login:
2120341          login:
2120345          PRIMENET 22.0.0 NMSG
2120359
2120369          USER ID
2120370          USER ID
2120371          USER ID
2120376          BANKERS TRUST
2120377          BANKERS TRUST
2120378          BANKERS TRUST
2120379          BANKERS TRUST
2120444          PRIMENET 21.0.6 EMCO
2120449          VM/370 ONLINE--VM/3084
2120466
2120468
2120479          Invalid login attempt
2120488          Invalid login attempt
2120496          login:
2120500
2120501
2120502
2120503
2120504
2120505
2120506
2120507
2120539
2120556          Enter Host access code:
2120561          Fiduciary and Securities Services HBFIND System
2120580
2120615          SHEARSON LEHMAN HUTTONNPSI VTAM
2120631
2120649
2120693
2120702          Logon in progress.  Please stand by...
2120703          Invalid login attempt
2120704          Invalid login attempt
2120713          PRIMENET 22.1.1.r17.ptc.7 NY60
2120734          login:
2120935
2120938

215040
215049
215066           NewsNet
215121           TOWERS PERRIN ONLINE--VM
215135
215136
215137
215140
215146           #6
215154
215235
215261           DATAMAIL Service node ATLAS
215262           DATA MAIL - V8.35 P26
215263           DATAMAIL Service node ATLAS
215264
215265
215266
215267
215268
215269
215341           Lender's Service, Inc. Computer System
215451
215453
215454
215455
215456
215457
215458           VU/TEXT
215460
215461
215462
215463
215464
215465
215466
215467
215468
215469
215470
215478           ETM VAX

217026           SET13:4/UofI CSO Pyramid 98x (osiris.cso.uiuc.edu)/OSx 4.0

224001           ENTER TYPE NUMBER OR RETURN
224002
224004
224005           LATPRIME
224006           ENTER TYPE NUMBER OR RETURN
224007           ENTER TYPE NUMBER OR RETURN -4->
224009
224010           INDIQUE O TIPO DE TERMINAL
224011
224014
224015
224017           ENTER TYPE NUMBER OR RETURN

301020
301026           DNAMD1 Online
301031           PRIMENET 20.2.4 NUSA
301033           System/32 VOS
301035
301044           DNAMD2 Online
301045           RNN/NGW
301054           VAX/VMS V5.2
301056           RNN/NGW
301057           RNN/NGW
301058           CDA Online Services
301065           PRIMENET 22.1.1.R11 APHISB
301074           (I)nternational (D)atapac (T)elenet (M)emotec?
301100           System/32 VOS
301101
301102
301103
301104
301105
301106
301107
301108
301109
301110
301111
301112
301113
301114
301115
301116
301125           VMS
301132
301170           United Communications Computer Services Group/System/32 VOS
301178
301233
301253           Primecom Network 19.4Q.90 System 35
301254           Primecom Network 19.4Q.98 System 59
301276
301301           Primecom Network 19.4Q.90 System 03
301302           Primecom Network 19.4Q.90 System 02
301303           Primecom Network 19.4Q.90 System 03
301307
301330           Primecom Network 19.4Q.90 System 30
301331           Primecom Network 19.4Q.90 System 31
301332           Primecom Network 19.4Q.90 System 32
301333           Primecom Network 19.4Q.90 System 33
301334           Primecom Network 19.4Q.90 System 34
301335           Primecom Network 19.4Q.90 System 35
301341           Primecom Network 19.4Q.90 System 41
301342           Primecom Network 19.4Q.90 System 42
301343           Primecom Network 19.4Q.90 System 43
301344           Primecom Network 19.4Q.90 System 44
301345           Primecom Network 19.4Q.90 System 45
301346           Primecom Network 19.4Q.90 System 46
301350           Primecom Network 19.4Q.90 System 50
301351           Primecom Network 19.4Q.90 System 51
301352           Primecom Network 19.4Q.90 System 52
301353           Primecom Network 19.4Q.90 System 53
301354           Primecom Network 18.4Y System 54
301356           Primecom Network 18.4Y System 56
301357           Primecom Network 19.4Q.90 System 57
301358           Primecom Network 19.4Q.98 System 58
301361           Primecom Network 19.4Q.90 System 61
301363           Primecom Network 19.4Q.90 System 63
301364           Primecom Network 19.4Q.90 System 64
301390           Primecom Network 19.4Q.101 System 90
301391           Primecom Network 19.4Q.90 System 91
301392           Primecom Network 19.4Q.103 System 92
301393           Primecom Network 19.4Q.101 System 93
301394           Primecom Network 19.4Q.101 System 94
301396           Primecom Network 19.4Q.90 System 96
301398           Primecom Network 19.4Q.98 System 98
301399           Primecom Network 19.4Q.98 System 99

305004           **************************************************
305020
305022
305034           Renex RTD, SN-33227, V3.10-SP1 (V3)
305035           ENTER SWITCH CHARACTERS
305063
305073
305129
305136
305137
305138
305140
305141
305142
305148           VMS
305149
305159           VU/TEXT
305175           ALL-IN-1 System
305178
305179
305239           Virtual Machine System Product
305248           VMS
_RK3ˏĖJ`'$?5F
's?( 1`e!ѝ]q_*DL
BH̪Ok,ہhB_il6@+=3D[jP"h+ t5Bbp'ϱ,EC$cKgiyI8X:iE	P8gE%:]4Nl1~Kc]ER$LU!`qhQq^]Sd|Xw 8sH`ȃFfaҤavjFbԘ`i1&8*D^ic2J\Z'$>MtǥG \lDP)^Q-n/
R;,3焀;AOvi
ბ2Aa˒&&2gO`8d^ek)(4K A*VTCaL&a3GKJf2L@~.R-2i++3"z})B,B4@Hb:YYf/ƣ&gЌʹ ֬
]p*`boY·q	ѡ


}mA^P^P A!4/s
?(@\.~NA
"p
]R15= BYu#E#lȭ!Ca,xV%%4ĝxb\sd
z6ݤ&QLUU:c:	6h3p
r pZ +d]
U4UxЅ*S[ނл ̈:	6!Xf`:|x!M.8X{f- 2pvXxO
p*4(vCS}(ա
QNvw⋁/],?-%E4B.A_ lu.&8X :g
B4`pr00+S.~mf4T&aāOJ?;F]oB8+<Vhhi|a*qK P:Wjx!V[GFyYpCD5h{3=H
K&ZDFDz(g"t B}tʙqʧ"R^}?;!Ja?rU~v"V4
ƈ郍LFFs. !uuE8D"C+9'n+~&E
qGydȍ@&[aDibN+/V.	On|a/I4@3ΤˑelxS|+	PW]	ʇ(K?iRq,)#%dqd$)>˕j5Qe
`H&$M*$DgF'4A&-='Za*.FEv9Ey9P0<G4IԆU%K`$XCI&gkd"'teuKB咩0]dOsȭ-2Eʲ "qeB2:_[LbMi.=EiҝKϐ&llrZK<Nqǥvz aMu{ B,(33&GХq<K%$9,&.ܪ U+ͺ`fe
,]XhXԕ]%oQ⎢qtChzw:C*TYQLG/E(-:5ҀMDk4[JK('UǴgꑬ)(KiKq|P"3f<,LHzF33s+e!kMtd!v\i6O&L\i^G,,UeL
'Ǳю "t2`?hXZ2Hr.LA(DHY,b(Gmp'p9P;lY$chl7(^uC-Kܽw:bis*RH
iQ8$FJԘֱ_DX[ĩAVc4SZy0NDа]vX]Gl*ĪO73Udۢ9VR$ -D슏,M72*%t/f:˾{ůbqTSb#	jՊQEi) GJN'lAű%+Ѹ#y֢T,+@Fm)pU]=
&D|mN MFhFѴ*+ %a̸Җ@8FZ\ݒXn	8hD'	Jab:	+b+AtjХj;ȷTEp$qZ2{3$} `w^b/[tcӿDgx%2	 BCCt4ћ\BvNU@DK;_haq\AQemΰpkꥮ,\8iA4aW# NNpHxv/b3
l֯bO,Q/|:Da
Eq:[haaFLiծO!S_v!c*Kp<HI6#8Y1d 8Kw2$U$>eLP1\RbBzm,\0 $ŗ%^G	EXvv96ͱu% $]!gR@<j<;E@da?Cޚm Q15bLn
\
k^'eCkoe^>OZqC7~2-^P6usRhdVOhIH WiCsFG3ƭp}^L\@6 /=ja\b@EJOY,TaLPsGbBܐN㿞  !	t:T jʾ'08X[G,
f+C|	wkueKZ\?¡<JFvyxJć_sGLpֺ_7eL{. 740⛷NMrWR	fم&Z!3	
c3gfP@`7@z%:@@n@,;`a
>R@hoE
i
e`l:uSܯ4 wHr :e i4 p9\xtt7pa
t
<-mwf1и#~pNx_r`yÁM~V @L]& k]"%JhZ6<CV"%BߍgP .Y7
/tρ?V19pJԁm  U?ܡ[:7	u2@~f
~.pXxs`
Mwe`6H'7t ,j`k.|y7o=@!{o=TpS঻onԓJ\|7n;A+a~AxHGn<и@byf^w 	%ݦEh܁uh |p}G{sn ݷxU5P۩	= ̡.;xwȍ{`⃽un@m:#ރ	n/RBOp`n7ʆ.) \S:xg}	;6}$nBwUy*mS@0ܭfA e@{NA@[ M@g 1@@ v@vݺgw]9]v29  rjz/.I g/]܍7#Of 
<l/}ސ{?n퟽<p/˗~f[zU7{񐢡pZ#QnSװpi]P8ix=*
(A-k;e
irOa8`
PK
    pn    
   DELUXE.DOC
Hx"@"CF:DXDHy;3c@3G" Ì-*(@(BǢ +AT:J@%&|B"$IdRJ)Ib+L`)mڶT$aN\X$*td!l;ݼ{]0l1)l@WʰK:7qIDw<.ːIC'76̀K*hҔ1b?ih^ARNxĿ])'7gҌ	D8g䄱`S;02ܠ#i9>,&FD:@@#;\NB㫫pC&7H	8θɰ7hd	(c:PQ'lǆC.'	麴oB𶁨x"1&"2`:2'͈jp'2
X%DL
TT6FoHތK*8B ,Ήb	1"J3(B
<BT02XC2h΍3|r}m>}X;IN㨃9Pf]d0C;j9׾0,
ӂz|ܙȲc4	o˸q%-0cנ4ߕ&9jcwX\Aɠ'7>̘7ش4~7渰5q;Cŀ_{cxhzA`
Aj6Ʃ<kg䕣LTP0V	#E6~4,u|fǓnǫULe&wЌEACb!*& 6x'hB]TdXaOF8uNY (p:T08h7ܻ!'ހpm(Mucyq|2lG6q:0hj **}K9pI'xY}<#Tgkh0dis	V2M@🟠l@)GĢ	ؐ)O̓Ƨex쳮}H 1!VK[Ú
º RR1C1	?Oƾ׮K{KC d6īOzb-@aõPhXORՑ8aɀ'[\pP]X2C+|sI
f?(Vdb$uTbŋY{c0?.N1H9\fFgC%4N@2c.aN2XkRfC`F'YBI)!CNU|HS(TaB"PP<NΣlP㉷hIgyDҟC:hʊ^;VZ43".BQ,eBX*C%Oq
X>0:c,#P@ aάe3Lv~" <$;cx70tJA`\a8\L62]V/4ԏdPMBġ;L3LeuRd"O@ɭp3 VAAB>EI0xfc+ae02[V)P'*qpX5:lB)uL:L,x0.G ؂

OmvG!`,~(cv:Uې"f0j8w٧FsW~X2lh΂ß$/˒ܛ2Zp2A22dk
-ۀn1h`Q
nd)dE3lWF2l0gQ[Ri%k?C'%ن6{o#2'6UΞ	ܟcu{<P'^4'yo̡
uN%
]7eZe0q#G
".UB9O	cmc76xvM)ݻ;+pЂ#^9QLq*SNuOiةZ&_\m7i	8x5GIb$ %(5y(5m^3GhjYfʖ8mt<}r3Ƈ	@}RA$ >8(.IarɆTCvJm8A-l&s$Qu(y7X$:HPy
8QޢGC|z|M2pZx')el~DMG)w*x%#|󢟠 |N
)e>L٢+ᵟ
nO|UN}3o 	tٛuS1s\H2-	}ST``_ٗ0LG`YHGgyKDе)\	1sLX@?0\r̤`xV`HA1ImYAaI<Ga|!MG
@^ _1\K̤Ktp f0DH?E pJXLA0Lxbo$}
)}ԛXfw``Ydf	<ȵkLMX#և0O!@0*r,K\HY	#MeeɯP?ʎuc8sT̔mMwuȁ{P GpG
l#鬜hʑ@+J=LUTDuQY<A>"cy~$!v
8MԇJBDSO ZQb:fMXΔeNXHLXT"YZeA"(6FHR<APZ4ơ\.R^L,_yZYpd16VMe%Ģ,Hxrϔp2J%^s0eU=fϵQax[
"uA&LG[%qΔ6_I2nD|Y8
MxH<8u%AJ]o` 
^pnȺx!J	sV#7	MkN9YI,Sa

Շe`
)
˳P	=UM4}xc}@OѰ(
t
lPEh4̨wawE+P2ꀨ֨-FLX̔$:2˔L͍
)Ҕ7`IM<my1PlE]\JYDxXx? }X"Hc М? ɉD]x4c>XfE+,Kr=෵2V&rLȱJGP
U˾t68
(d>dk.
FTNGVpMX͹sdlcOǸp?a|zAF՟XD"mX[DЗ"jxm0mTE4}auh϶b

D
HHc|HE \th`
M`;--JXA^6O4hNցul%aMzLlH$FLAdY)Q(*#SLTɕ jg!QN3Af햸Z;͝_V^R-_˨aS$H`Ǎ2TK0桇yսw 5L^mMYZmf,]=hAGB[AXAe]|mL4. ߒLlMǼ0ѲҒGJM0ݖUaL.ʈR-깄d^ͳHJGoz\)TMQl"ΟLBYe6Acց7=|( -rݎw|ܐrisǁM?M܋B/9⑼qc{mTH_AP`Ⱥ2 J;I?$܂yr̝snLs4~1A<hEF `Fri^ŘAWbІ^HAP{؉dL$A)jЮ[ӌ20.Ϙ̇m PK
 
    ;.k?  I                   CONVERT.COMPK
 
    
Y5}  0              ?  CONVERT.DOCPK
 
    Tii{  ~               :W  EXTENDER.DATPK
 
    h
Ԙ
  p  	            ]Z  MTARG.DATPK
 
    
+"-x   q              e  TELENET.LSTPK
 
    $i<YSL   n  	               THIEF.000PK
 
    5i  ū  	               THIEF.COMPK
 
    <o}6  {              [ THIEF35.DOCPK
 
    1ʀ\3,  !0  
              TYMFIX.COMPK
 
    X
q  Q 
            	 TYMNET.LSTPK
 
    pn    
            0 DELUXE.DOCPK      k  oA l

ͻ
                   THE FILE WAS BROUGHT TO YOU BY                  
͹
۲                                                           ۲
۲                      ۲
۲                                    ۲
۲                                   ۲
۲                                   ۲
۲                                ۲
ͼ
           (714)993-5311 RUNNING    1200/2400  TELEGARD 2.5    
      ͼ
      
 TYMFIX.COMPK
 
    X
q  Q 
            	 TYMNET.LSTPK
 
    pn    
            0 DELUXE.DOCPK      k  oA  Telegard BBS  00nRO J8C <`#*:'1BZˆhV2::~2QJDL4CNY,]AJ,Z
xC%%Wз7[BbJ`1m?4m+&|l
gb'RLh.17$.`QD9L ˩騔t
,AQ	 4KBae(}@h f.P7N ѥs,eG[a<jJ$GItdd1'PJ? %/j%aCFhH
	qRXHs8>eQd8iֵCʳ)
JaeHE!I.R0"ٜAxa߄=\ހ	{q4p c߰@B#ޠG
cD/E2Ƕ6!-CL0wLC2ܓ
=(P
 .I(`X?(BӡR
04q73>
8<i
<!YєD2(,0,AS<^ǒel3!aD)-jopIhS@U/XXM*.(GJYFK_7	 qpń"xop
+<`x*V`(xrV8J.$sYhg-$D9Ɲ;D
,\lˎ`8ѲgX=pP衳gO[Qc,lh@0[9b0K2
q;%GS.@7>ʌ%m-V&@Y5(0_^!7J@1vc^a!h 9a hs
48X:"e-֌X1Vq`@%f
pMs 8U*(*3TĊu(nS$c%XJdKK
%RƆK'