|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'| | | | S.C.A.M. Incorporated Proudly Presents,.. | | Volume I, Issue I | | of the | | [S]outhern [C]orrupt [A]narchy [M]agazine | | | | The Alternate Mindlink : 713/489-7779 | | The Scarlet Brotherhood: 713/729-6840 | | The Celestial Woodlands: 713/580-8213 | | | |'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'|'| [Volume I, Issue I: August 24, 1987] Welcome to the new Southern Corrupt Anarchy Magazine! SCAM was an idea dreamed up by The Omen around this time last summer. But due to an abhorent lack of creative file writers, like yourself, we were unable to procede with the idea. Time passed, people thought and eventually the idea of SCAM was brought up again.. This time by Whyte Sheik. Together, Omen and Sheik brought about the organization that was needed to publish the first informative, yet original file-magazine to hit Houston in a LONG time. We have done our best to bring you some of the best original files that we've seen in a while. Also, please realize that we are not just another third rate group of users out to get recognition. (If we wanted to do that, we could save a hell of alot of time by slapping a few title pages on new games and uploading them to a few boards..) We will keep writing, compiling and publishing until there is a copy of SCAM on every bbs. (Yeah right, what an imagination!) However, with your support, we believe that we can make the dream our reality.. SCAM is a textmag published by the editors and contributing authors of SCAM Incorporated. The current motherbase of SCAM Incorporated is The Alternate Mindlink (713)489-7779, whose purpose it is to gather and compile the files found herein. As a result, the opinions and files found within SCAM do not necessarily reflect the opinions of the editors. Each author is responsible enough to have his own views on life, the universe and everything, and the opinions and techniques that follow are a direct result of each respective author. Enough with the bs.. If you are interested in learning more about SCAM Inc. or you would like to become a contributing author, you should contact either The Omen of Whyte Sheik on the Alternate Mindlink. Ok, enough with the mindless grovel.. Enjoy & on with SCAM! - The Omen & Whyte Sheik: Editors - [What to expect: Table of Contents] o The Basics of IBM Cracking.................. (By Lord Blix) o Carding: The Inexpensive Alternative....... (By Whyte Sheik) o Deadly Poisons for the Anarchist.......... (By Grim Reaper) o Cracking the UPC Code...................... (By Black Dragon) o The Joys and Techniques of Getting High..... (By The Omen) /----------------------------------------------------------------\ | Cracking IBM Programs, Basically Speaking | | | | Another exclusive of S.C.A.M. Magazine | | by Lord Blix | \----------------------------------------------------------------/ "Cracked by Iggy M0head of the High and Mighty Warmongers of the Planet Xargo". How often have you seen that on the title page of programs and wondered, "Well how hard can it be?". And the answer, of course, was "I wonder what's for dinner." Oh well, this series probably won't be able to answer the latter question and I'll let you figure out the former answer for yourself. For the sake of being brief, let's start by assuming a general knowledge of assembly language programming. If you don't know very much about it, then you might want to steal one or more of the following books: Programmer's Guide to the IBM PC by Peter Norton Advanced MSDOS by Ray Duncan of Microsoft Press Whyte Sheik's Guide to Animal Husbandry by Whyte Sheik To understand simple protection routines, one must first come to terms with the basic method of controlling a floppy disk. This is almost always done using BIOS call 13H. It can be used to read, write, format, verify, etc the disk involved. Here is a simple chart of this function's features. INT 13H Function Chart AH Contains (function) Function Returns Error ------------------------------------------------------------------ 00H Reset Floppy Controller nothing 01H Get Controller Status AH=Status byte * 02H Read Floppy Disk AH=0, AL=sctr read * 03H Write Disk AH=0, AL=sctr writ * 04H Verify Disk Sectors AH=0 * 05H Format Disk Track nothing "*" denotes that this routine may return an error condition. If this is the case, then the CARRY FLAG will be set and you can refer to the next chart for the reason of the error. Status bit of AH If set, ----------------------------------------------------------------- 7 Disk Timed-out 6 Seek failure 5 Controller error 4 Data error on disk read 3 DMA overrun on operation 2 Requested sector not found 1 Disk write-protected 0 Illegal command passed to driver ---------------------------------------------------------------- Alright, most older protection schemes or those by companies that don't have the money to invest in developing a plausible routine, are based on searching for for a non-existant sector or reading a sector that contains a deliberate CRC error. A CRC (which stands for Cyclic Redundancy Check) is merely a checksum that is made of data within a sector. Each sector has its own CRC. A routine that uses this method of protection (such as older games by Windmill software) might look something like this: STARTOVR MOV AX,CS MOV ES,AX ; ENV SEG = CODE SEG MOV BX,0F000H ; ES:BX POINTS TO LOAD ; ADDRESS MOV CH,27H ; TRACK 27H MOV CL,02H ; SECTOR 2H XOR DH,DH ; DH=0=SIDE XOR DL,DL ; DL=0=DRIVE MOV AH,02H ; BIOS READ FUNCTION MOV AL,01H ; READ 1 SECTOR INT 13H ; OK, DO IT JC HADERROR ; ERROR DETECTED LOOP4EVER JP LOOP4EVER ; YOU HAVE AN ILLEGAL ; COPY. THERE IS NO ERROR ; YOU ARE SWINE! HADERROR CMP AH,16 ; WAS IT A CRC ERROR JZ GOODCOPY ; YES, START THE GAME JMP STARTOVR ; NO, A REAL ERROR TRY ; READING SECTOR AGAIN GOODCOPY . . . The company that used this routine had a CRC error written on track 27, sector 2. This section of code attempted to read this track. If the CARRY FLAG (error condition) was returned TRUE, then the routine HADERROR made sure that it was a CRC error, if it was, then control passed to GOODCOPY. If no error was detected (as would be the case on any regularly formatted disk), then control continued to LOOP4EVER and the offending person was left sitting at his computer forever (or until the next power outage which isn't scheduled in your area until 1988). Now, how would we go about removing this protection scheme? Simple, we could simply replace the commands: INT 13H ; CARRY OUT READ JC HADERROR ; IF ERROR COND. GO TO HADERROR with the commands STC ; SET CARRY FLAG MOV AH,16 ; ERROR CODE FOR CRC ERROR JMP HADERROR ; FORCE JUMP TO ERROR ROUTINE Or even more directly, replace the first instruction in the routine with "JMP GOODCOPY". The danger with doing this is that later parts of the routine may check to be sure that the call was actually made. So try to make your crack as specific as possible. You may want to do this by setting the CARRY FLAG, and changing all registers to the value that they would have had if the routine were correctly run. This usually means that you'll have to have a working copy of the program to begin with. On Read functions (AH=2) check the AL register upon return. This will contain the number of sectors actually transferred. If it is not 0 then data WAS transferred to memory at ES:BX. Further parts of the routine may check for this data. Well, I've taken you through your first step of cracking a program. Now, wait until the next issue of SCAM to continue our discussion. We will be discussing: * Demon Programs * Alternative Sector Numbering * Modifying the Diskette Parameter Table 'til then. May the sun shine on your face and the moon shine on Uranus. (t/b):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(T/B) (:^:) (:^:) (:^:) Whyte Sheik & The Brotherhood [:TB:] present... (:^:) (:^:) (:^:) (:^:) [The Mad Arab's] (:^:) (:^:) [Hi-Jacker's Guide to the Galaxy] (:^:) (:^:) [Volume III: CARDING: The Inexpensive Alternative] (:^:) (:^:) -With thanx to Lord Blix- (:^:) (:^:) (:^:) (T/B):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(:^:):(t/b) Disclaimer: The objective of this file is solely to inform the reader. The Author is not responsible for the actions of people reading this file. As in other files in this series, don't come whinning to me if you get busted.. I have no sympathy for losers.. Introduction: The world of carding has become somewhat dangerous as of late. Due to the recent outbreak in the carelessness of carders, many have been caught. This file will inform you how to get away with carding as safely as possible. Finding Credit Card Numbers: The first task needed in carding is to obtain a card #. Finding card numbers can be done in several different ways. Probably the best & safest way is to either work at a store, or have a friend who works at a store, where credit cards are often used. Department Stores, Restaraunts and Mail Order Houses are good examples. This is the best way, as you will always have a fresh supply of card numbers readily available to you. A second way of obtaining fresh cards is trashing. I personally do not prefer doing this, as I am not particularilly fond of other people's trash. To do this, find a department store dumpster after hours and go digging for carbons. Restaraunts are ok also, but department stores usually have "cleaner" garbage. If you enjoy digging through other people's half eaten food, that's alright with me. A third way, although not advisible, is to get the numbers off a BBS. This usually is a bad idea, as you do not know how many people have already tried using the card & if the cardowner's credit rating is destroyed yet. We'll explain about checking out the validity of a card number later.. Checking Credit Ratings: Ok, so it wasn't MUCH later.. The major cards (Visa/Mastercharge/American Express) all have convienent Card Verification Numbers that you can call to check out a card # to see if it is valid.. The problem with this is that you need some hacking skills to find the bank & merchant #'s. (Unless of course you or your friend works at a department store. They usually have the merchant numbers posted.) Mastercharge/Visa Account Verification Number: 1-800/554-2265 To use this system requires the use of a touch tone phone. The system consists of various prompts (which are spoken out to you). To check the rating of a card number, you just answer all of the questions correctly. (easier said then done) First Prompt/ Choose Card Type: Here you just type what card that you are using into your touch tone pad. For using the Mastercharge system type "10#" into your keypad, whereas the "#" signals the system to enter the number typed and to go to the next prompt. The same is true for Visa cards, except that they are "20#".. Second Prompt/ Bank Number: This one will be your first attepmt at hacking. It does not take long to hack out a valid bank number, as they only have four digits. To enter a bank number, type "xxxx#" whereas the "XXXX" is the four digits in the bank code. Third Prompt/ Merchant Number: This one is much more difficult to hack, as there are 10 digits in the merchant number as opposed to the four in the bank number. Patience and a little luck will get you past this one. Also, many department stores have numbers posted by their phones. Look on the list for numbers saying "MERCHANT". There should be a few since there is a different one for MC, VISA & AMEX. Fourth Prompt/ Card Number: The rest is easy after that 3rd step. For the card number, just enter the number of the card that you have in front of you and then hit "#" to enter. Fifth Prompt/ Exp. Date: You must have the expiration date as well as the card number to order anything, so this one makes sense. Just enter the exp date in the form "MMYY#", whereas MM= the number of the month & YY= the last 2 digits of the year. Sixth & Final Prompt/ Amount of Purchase: Here, just enter the amount of money that you intend to spend on your carded item in the form "xxx*xx#", whereas the "*" signals a decimal point and the "#" in once again the enter function. If all goes well, the voice will tell you if there is still money left on the card, etc. It may seem like a lot of trouble, but this is the only TRUE way to make sure if a card is still valid and has money left in it.. American Express Account Verification Number: 1-800/528-2121 This one is shorter to use, but it is harder to hack due to the fact that instead of typing into your keypad, all commands are responsive to voice. (Operator on line) First Step/ Merchant #: Again, this is a ten digit number that you have to read off to the operator. At least you don't have to bother with typing things in.. Second Step/ Card #: Once you've got past the 1st step, this one's a breeze. Just tell the bitch the card number.. Third Step/ Exp. Date: Just read her the expiration date.. Fourth Step/ Amount of Purchase: Tell her how much you spent.. Once you finish this step, you will get the info you were looking for.. Finding A Place To Order From: There are several ways of doing this, the easiest being purchasing a magazine that has ads of the type of equipment that you want to order. This may run you up 2-3$'s but who cares? You've have a large listing of mail order houses. Just search through the ads and find what you are looking for. Also, a good idea is to order from a mail order house featuring an online ordering service as well as a voice order. This is advantageous in the sense that the operator cannot detect stress in your tone of voice and usually you just have to type the info in a form, in most cases you aren't bothered by an operator. The best type of online ordering system is that that offers free membership. (You can login with as many different names as you have CC numbers). I've found a good one that's called Computer Direct (1/312-382-3270) which offers an online catalog, techinical forums, e-mail, online ordering (what you're there for), u/l & d/l public domain stuff (who cares) & multi user conferencing. Best of all, its free.. If you can handle phreaking, this outfit or one like it is a goof idea. Preparing Your Dialogue: This is perhaps the most critical part in carding, so if you're some 12 year old snotty mouth kid whose voice resembles a carrier, give it up.. They'll want to talk to your mommie. When you chose the mail order house before, did it have an 800 number? If it did, it would probably be safest to order from a pay phone or a friend's house. A few of these places have been hit hard by carders & wont mind using a tracer in the least. If they don't have an 800 number, don't worry.. They're too poor to afford a tracer. Your best bet would be to call a non 800 number, that is if you can afford/phreak the LD charges for being put on hold for the remainder of your natural life. Once you get your calling situation set, PLAN AHEAD! Know what you are going to say and when to say it. Try your best to locate the address of the guy whos card you are using. (look it up in your phone book) If you can't find it, oh well.. You'll live. Just make one that Sounds good. Most companies will not check up on addresses unless you give them reason to believe that you're lying. The good thing about having the clod's address is that the mail order house can request the real address from the card co. If theirs and yours do not match, don't expect to get what you ordered. Remember that if you call an online service, you won't have to worry about dialogue, but be sure to have the information that you'll need (ie- CC#, guy's name, dropoff, etc) The Drop Off Point: This one is another biggie. There are several places to get things sent to you. My favorite is to find 2-3 houses in a row that are vacant. Make sure that the grass is well kept and the house isn't a disaster. Also make sure it has a basketball goal. Then on the day that the shipment is due to arrive, Start a basketball game at the house. Invite friends, bring cars, make the place look as if someone lives there. As the UPS man walks up to the front door, break up the game & go over to him. He'll ask you if you live here. You lie & say "yes" & He'll ask you to sign for the package. Once you sign & he leaves you can go also. One other thing, be sure to take any for sale signs and throw them around in the backyard where they wont be seen by the UPS guy. Keep in mind that you must be creative like that nowdays.. UPS men are often given instructiond if they think that you're carding, but cant prove it. Vacant Houses that look occupied are the best drop off point. If you want it bad enough, take you're lawn mower over to the drop off point and mow. If any neighbors ask, your from the realty company, if UPS asks.. "Yes, I live here!". The best drop off points are at least 4-5 miles away in a subdivision or the like that doesn't have your zip code. (No, you shouldn't have to drive far) Other possiblities include sending the package to old people. This one involves more scamming as you will have to shell out some bs about "UHH- There was a mess up when ZapCo processed my order for a new modem. They somehow got your address on there by mistake. My name is XXX XXXXXX and would it be possible for you to sign the UPS thing and I'll come pick it up? My Phone Number is XXX-XXXX (lie). Oh thank you SO much!" Just something along those lines, never tell them anything even near the truth about yourself. Tell them something like "Yeah well my dad is in the Air Force Reserves & he's out for the weekend so he told me to come pick it up". Old people are naive and will most likely do what you ask them to do if you ask politely. There are other ways of doing this also, but this should give you some pretty good ideas. Phoning In Your Order: This is where it all comes down to. If possible have as much as the following ready.. o The Card Owner's Name o The Credit Card Number o The CC's Exp Date o The Clod's REAL Address o The Address of YOUR Drop-off Point o A Phone Number that is terminally busy (In case they want to call you) Tell the guy what you want to order & sound like that you don't know much about the product that you are ordering. Ask for advise, but in the end, get what you called to get. After he takes your CC number tell him a story about "This is for my little brother, could you send it to this address?" or "I'm currently seperated from my wife & She's got the house, could you send it to this address?" The operator will take both addresses, the REAL one and the one that you are supposdly living at (THE DROP OFF POINT). The main thing to remember is to remain calm and don't talk fast. The faster you talk, the more mistakes you are libel to make. Then have the product shipped to the drop off point that you choosed earlier. REQUEST from the Operator that he give you an EXACT date for the shipment. If they question you, say something creative like "Well gee, I need it by then.." (cough). They'll usually give you an exact date, because of a law that states that you may cancel your order if it doesn't arrive when promised.. Get it shipped Blue Label, or better yet, 2nd day air if they have it. 2nd day air is about 40% cheaper then Blue Label & it only arrives a day later.. Blue Label arouses suspecion. In a few days you should have your newly carded item at home and enjoying it. I'd like to end the file with a few don'ts about carding.. Don't card something to your house Don't leave your real address, phone number with anyone Don't use a posted card number without Verifying it first Don't act like you know everything there is to know about the product Don't call a LD number unless you are phreaking or don't mind spending $$$ Don't use a CC# owner's name that has a Jr, III, etc unless you tell them that that is also your father's name.. Remember Wilbur, Blixy? Don't talk fast or you may end up ordering "A 30 meg 1/2 height internal modem". Don't card something next door and finally.. Don't blame Whyte Sheik if something goes wrong.. (:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:) (:^:) (:^:) (:^:) Coming Soon: The Mad Arab's "Hi-jacker's Guide" Vol. IV (:^:) (:^:) (:^:) (:^:) The Scarlet Brotherhood 713/729-6840 (:^:) (:^:) (Home of The Brotherhood [:TB:]) (:^:) (:^:) (:^:) (:^:) The Alternate MindLink 713/489-7779 (:^:) (:^:) (Home of the Southern Corrupt Anarchy Magazine) (:^:) (:^:) (:^:) (:^:) -Leave feedback on either board asking how to join.. (:^:) (:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:):+:(:^:) tma [-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-] [-] [-] [-] Deadly Poisons for the Anarchist [-] [-] [Written by Grim Reaper] [-] [-] [-] [-] SCAM Head Office [-] [-] [Alternate Mindlink] [713-489-7779] [-] [-] [-] [-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-]-[-] Summary: In this file I will explain three of the most easily accessible and potent poisons there are out there. Many can be found in your backyard or in a stretch of woods near your house. Many will be easily accessible,so do not worry about a long trek to the mountains at midnight. Well, on with the file. The poisons will be displayed in this format: Common or Occult Name: Scientific Classification: Active toxins: Method of preparation: Period for death to ensue: Lethal Dosage: Okay, let's go... ___________________________________________________________________________ Poison #1 Common or Occult Name: Christmas Rose Scientific Classification: Helleborus Niger Active Toxins: Cevadine, Jervine, Veraltribine, and Veritridine Method of preparation: 1. At midnight or one A.M. go outside and locate a scrub or patch of this plant. It must be around midnight because that is when the poison in the plant begins to circulate more freely with the after-process of photosynthesis. It grows year-round in almost all high woodland area such as the Smoky Mountains, Appalachians,etc. Tear off the leaves being careful to rip off the whole of the leaf. Gather about 15-20 leaves. 2. Go home and heat in water for 45 seconds to a minute..do not let it boil or the poison might leave the plant. The warmth should start the poison going through the roots (or veins). 3. Wrap the leaves in a ball of tin foil, and place in the freezer for about two to three hours, or until brittle. Then grind the leaves into a fine, dust-like powder. 4. Apply the powder to the food of your victim. You may want large doses. Period for death to ensue: Depends on the dosage, death will come later with massive heart failure, lung collapse, and brain damage. Lethal Dosage: 4-7 leaves should kill in two or more applications. Use wisely. Save your extra leaves ina damp box, or go ahead and crush them. ___________________________________________________________________________ Poison #2 Common or Occult name: Deadly Nightshade Scientific Classification: Atropa Belladona Active toxins: Atropine Method of preparation: 1. This plant grows wild all over the woodland and prairie areas. Again, it should be gathered during the late to early morning hours. Go up to the plant and grab a bunch of the berries off the stems. Pack them in a box or cloth, the juices can sink through your skin. 2. There are two effective methods here, number one is to simply boil 1 to 4 berries(depending on the size and endurance of your victim) in a pot and let some of the clear water drain. What you have left is a sticky residue and liquid. Drain out the residue and place it in the victims food, preferably a casserole or cake. The liquid will go into a drink. The other way is to simply mash up the berries and feed them as is in a foodstuff. Period for death to ensue: Immediately..the victim will first feel a state of euphoria and then will begin to have TERRIBLE hallucinations from real-time experiences. Next comes the mental collapse, coma, and death within 5-7 hours. Lethal Dosage: 1-4 berries. [WARNING] This is one of the most terrible poisons and you should exert caution when handling the plant. Only to be used in desperate situations. ___________________________________________________________________________ Poison #3 Common or Occult name: Foxglove Scientific Classification: Digitalis Purpurea Active toxins: Digitoxin, Digitalin, Digitonin Method of preparation: 1. This plant grows in loamy woodlands and is very pretty and fragrant. Do not be decieved. The plant can be gathered at any time. 2. Just take off a few leaves and crunch up or grind to put in a drink. The crushed leaves can be put into a soup or food of the same attributes. Treat with care when putting in a drink, be sure to grind it (the leaf) into a fine powder or it will be easy to detect. Period for death to ensue: The drug digitalis is used in heart attack cases, mostly with controlled doses. The dose in two leaves will be enough to kill within a "building-up-period" of one to two weeks. Each day add a stronger dosage, and on the 10th day insert a dose of a full six leaves. NOTE: Six crushed leaves will make a drink grainy, so put it in a drink that has free-moving particles such as Metamucil and Instant-Breakfast,etc. Lethal Dosage: 2-6 leaves ___________________________________________________________________________ [Prologue] I hoped you enjoyed my file on deadly poisons. Use them wisely at all times. Remember to keep extra supplies and such so you will never have to scramble for that emergency poison. Happy Poisoning! Grim Reaper [8-22-87] The Universal Product Code by Black Dragon Supermarkets know better than to trust us anarchists. It's easy enough to take a magic marker and black out a line or two of the Universal Product Code symbol. Lest anyone try to lower prices or sabotage the system, there is a security device built into the code. The UPC scanner can detect any alteration of a symbol -- or, at least, stands a 90% chance of detecting it. The secret is a "check digit" encoded in 2 extra bars at the end of the UPC symbol. The check digit is derived mathematically from the information contained in the other bars of the symbol. Change the symbol, and the check digit probably no longer jibes. The formula for assigning the check digit was devised by the Uniform Product Code Council, a manufacturers' association based in Dayton, Ohio. It is revealed in "The UPC Guidelines Manual", a technical bulletin provided to corporate members of the council. Every manufacturer using the UPC calculates the check digit in the same way. In its usual form, the code symbol has a number at the left side of the bar pattern and two groups of five digits at the bottom of the bar pattern. A shorter form of the symbol, with only six digits at the bottom, is used on packages too small to take the full symbol. A few products, such as magazines and books, have extra numbers and bars to accomodate large numbers of products from a single manufacturer. The scanners do not read the numerals. The numerals are there only for the convenience of the human checkers. If the scanner is down, the checker may enter the numbers by hand. The bars encode the same set of numbers -- plus the check digit -- in a form that can be read by machine. The check digit is always a whole number from 0 to 9. It is not usually printed in numeral form. (On the few packages where the check digit is printed out, it is smaller than the other digits and appears below the two bars that encode it.) The other digits of the code are assigned simply enough. The lone digit to the left of the bar pattern is the "number system character". A "0" means the item is an ordinary grocery item; "2" is used for variable-weight items, such as meat and produce; "3" is for drugs and health-related items; "5" is for cents-off coupons. The first cluster of five digits at the bottom encodes the manufacturer. For instance, 43000 is for General Foods; 37000 is Procter & Gamble; 11141 is A&P house brand; 51000 is Campbell Soup. The second cluster of five digits specifies the product and size of the package. These five digits are assigned by the manufacturers individually. If 20043 means a ten-ounce can of tomato soup for one manufacturer, it needn't mean tomato soup for another man- ufacturer. Once a product is encoded as a number, the next step is to encode the number in a bar pattern. The bar pattern can vary in size; 0.816 inch by 1.175 inches is the minimum; 2.040 inches by 2.938 inches is the maximum. The dark bars may be almost any dark color (not red). The background may be white or pastel. The first two bars, reading from left to right signify nothing. They are a sort of punctuation to let the scanner know where to start reading. The same is true for the two bars in the middle, which extend down between the two clusters of visible digits, and for the two bars at the extreme right. The first two bars to the right of the first set of punctuation bars encode the number system character, the visible digit at left center. If this digit is a zero, there is a space, then a thick bar, then a narrow space, then a narrow bar : the bar code for zero. Each of the other digits also appears as two bars and two spaces. The portion of UPC code alloted to each digit is composed of seven equal units or "modules", each of which may be either dark or light. The symbol for zero is three light modules (the space), two dark modules (the thick bar), one light module (the narrow space), and one dark module (the narrow bar). This is represented as 0001101, where the 0s are light modules and the 1s are dark modules. A reversed version of this code is used for the part of the UPC symbol to the right of the two thin bars in the center. A zero ap- pearing on the right becomes 1110010 -- that is, a thick bar, a space, a narrow bar, a narrow space. Two different codes are used so that the scanner will be able to recognize which side of the symbol it is reading. In this way, packages do not have to be fed to the scanner in one direction only. The complete code is : Digit Left Side of Symbol Right Side of Symbol 0 0001101 1110010 1 0011001 1100110 2 0010011 1101100 3 0111101 1000010 4 0100011 1011100 5 0110001 1001110 6 0101111 1010000 7 0111011 1000100 8 0110111 1001000 9 0001011 1110100 The check digit, appearing at the far right, is encoded according to the right-side column above. Two narrow bars are separated by a triple-wide space signifies a 7, for instance. Some typical codes, along with their check digits, are as follows : Ann Page Black Pepper, 2 oz. 0 11141 26230 1 Ronzoni Spinach Fettuccine, 12 oz. 0 71300 00137 0 Campbell's Spanish Style Vegetable Soup, 10 1/2 oz. 0 51000 02677 4 The formula? Take the digits of the code (aside from the check digit, of course) and group them according to their sequence in the code. Write the first digit, third digit, fifth digit, etc. -- the odd sequence -- on one line and the second digit, fourth digit, etc. -- the even sequence -- below it : / 0 1 4 2 2 0 0 11141 26230 < \ 1 1 1 6 3 Then add each sequence of digits, 0 + 1 + 4 + 2 + 2 + 0 = 9 1 + 1 + 1 + 6 + 3 = 12 multiply the sum of the odd sequence by 3, 9 * 3 = 27 and add the result to the sum of the even sequence, 27 + 12 = 39 Subtract this result from the next higher multiplt of 10. Here 40 is the next higher multiple of 10 : 40 - 39 = 1 The remainder, 1, is the correct check digit. Changing any single digit of the code will require a different check digit. In no case could a person with a marking pen expect to change a code to that of a lower-priced item; the best one could do would be to change a code randomly. Perhaps the altered code would be a cheaper item; perhaps it would be more expensive; perhaps it would be an unassigned code. The check digit ensures that any simple alteration will be caught, even if the altered code is an assigned one. By Black Dragon, copied from Big Secrets. Completed 11:46 pm, August 11, 1987. {+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+}:{+} {+} {+} {+} The Joys and Techniques of Getting High {+} {+} Written and Tested by: The Omen {+} {+} {+} {+}:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::{+} {+} {+} {+} SCAM Homebase: Alternate Mindlink (713) 489-7779 {+} {+} {+} {+}:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::{+} Introduction ------------ Here we go again with one of those 'Get high its cool...' files, but not this one, nor will you find dozens of mindless recipes. Instead you will find some techniques and fun ways of getting high, Also you will find different things you can make to get the most of you drug (I am mostly dealing with Weed (Pot, Marijuana, Grass etc...) in upcoming files I will have Acid and others) Things such as Homemade pipes, and Bong, What I suggest are cool places to get stoned at. So just sit back and watch the text scroll down the screen, Fire you up a nice sized doobie and enjoy... Pipes & Bongs ----- ----- Pipes and Bongs are really the best way to smoke weed, because you can control the Smoke/Air mixtures (You can control how much smoke and how much air you inhale each time) This is easily done by a 'Carborator' A small hole in the side of the pipe or bong. When the hole is covered you get a straight Smoke hit, But when you release the carborator you let in a bunch of air giving you a BIG smooth hit. You can put a simple Carborator on a 'Tobacco Pipe' by simple covering the bowl when you take a hit, then as your taking the hit release the carborator for a bigger hit. There are many 'Homemade Pipes and Bongs' you can make, I'll describe some of the more general Bong-Like Pipes, but for most straight PIPES, you can make that out of any noncombustible material (Also dont use Brass or Copper, they fuck up your lungs) rather easily by making a bowl and mouthpiece out of anything, then put in a screen unless you want to Inhale the Cherry which doesnt feel to great. Now on to the other types: Coke Can Pipe ==== === ==== This one is easy to make when its late at night and you cant find a decent pipe. 1> Find you a coke can 2> Near the bottom of the can make a small dent (This will be the Bowl so make it as big as you want it) 3> Find something sharp like a nail, Knife etc.. and make a bunch of little holes in the bowl. 4> Somewhere on the side of the can make a carborator (Preferable somewhere where it is easy to put your finger on, It doesnt have to be very big). There you have it one of the simplest to make, Its does the job, but not very well, I can make other pipes (Not from cans) that doesnt let ANY smoke out of the bowl. Toilet Paper Bong ====== ===== ==== This one is also pretty easy to make, It uses the same principle as the coke can but its made from a toilet paper dowel. The construction is as follows: 1> Get your toilet paper dowel and cover one end with tin foil (So that one end is completely blocked 2> Punch a small hole about the size of a nickel into the dowel about 1-1 1/2 inches from the Tin-Foiled end. 3> To make the bowl take and make a small cup out ofa piece of tin foil, then push the tin foil into the hole you make, then take a toothpick and but a holes into the tin-foil bowl 4> Poke a hole in the tin-foil (On the end covering the dowel), This'll be the carborator. Very easy huh? This one is pretty good, You can get some monster hits from the bowl if you work it right. The Homemade Powerhitter === ======== =========== I consider this one my masterpiece. It is based upon the powerhitter you can buy at most head stores, it works bad-ass if you can get it all sealed up where it doesnt leak out smoke. (The reason why this one is so good is that none of the smoke is let out, so it is all retained inside the powerhitter) The only draw back from the powerhitter is that you can smoke a pretty big joint real fast with it but you get fucking bad-assed buzzes with it. Materials Needed --------- ------ Glass Bottle with SCREW on top A BIC Ball point pen (The cheapo 39 cent ones with the clear cover people use to shoot spitwads with) 1> Take the top off the bottle and drill a hole just big enough for the pen to slide through (It has to be a fairly tight fit) 2> In the end that is sticking through the cap drill 2 real small holes in the end. (This step can be omitted) 3> This is the hard part, You have to make a Carborator on the glass bottle, My suggestion is use whatever you can find. Thats about it, Now to work it, Take your gonzo joint and spark it up to where it is burning pretty good, then take it and stick it in the pen cover, (The part that will be screwed into the bottle), Then screw the lid on to the bottle (To where the joint will be inside the bottle). Then just start taking hits to get it going, After a while the bottle will fill up with smoke while your passing it to the next person so when they get a hit the whole bottle of smoke will empty, Also if you just using it by yourself, blow into the bottle before you take a hit, it'll help it fill up faster. There, Thats about the end of that part of the file. Now onto the next one: Growing Weed ======= ==== This part will be sort of incomplete cause I havent got a plant big enough to harvest (Fully harvest all the buds and stuff) but I'll explain as much as I can. Sprouting Seeds --------- ----- This can be done one of two ways: 1> Soak the seeds for a few days in water or -> 1> Take a damp paper towel and roll your seeds up in it. 2> Then put he towel in a plastic baggie and pour a little more water in it. Easy, Seeds usually sprout in 3-4 days... Planting the Seeds -------- --- ----- Take a small container and poke small holes in the bottom (For drainage) then fill it up with some soil, and poke a hole in the soil about 1/2 inch deep and put the sprouted seed in it. cover it up but DONT pack down the soil, then in about 1 week or so it'll break through the soil, Then just watch and water it like any other plant then as soon as the plant gets to about 12 feet high it a nice sized crown on it harvest it however you want. Harvest ------- You can do this however you want, you may choose to just cut down the whole plant and dry it out, but if you want weed year after year, you may just want to strip the plant and dry it out. Do's and Dont's of Drying =-----------------------= DONT dry in the microwave (It works but it takes some of the stuff out of the weed) Do dry in outside somewhere where the sun can hit it all the time, Also you can use artificial heat, like a heat lamp There thats enough of that. Well, Thats about enough of this shit, like I said most people know all this, but if you didnt well now you do. Omen SCAM ------------------------------------------------------------------------------- 'Tis the end of the First issue of SCAM, We hope the you enjoyed it enough to help spread it around. Also we are still (Does this sound redundant?) looking for more Text-File writers, if you feel worthy enough then geet in-touch with either me (The Omen) or Whyte Sheik on The Alternate Mindlink, Where you'll Always find the newest issues of SCAM .. Hope You Enjoyed it .. And Rememeber... Keep Thrashin'