TUCoPS :: Antique Systems :: delphi.txt

Delphi Hacking File


                    D E L P H I   H A C K I N G   F I L E

                                    V1.0


This is a file written for those of us who would like free online service
accounts, Internet access, and other services by using fraudulent accounts
or other illegal means of attaining them.

This file simply tells you the basics on doing this to the online service
DELPHI. With DELPHI, you get immediate access with valid information and
once you're on the system there's a variety of things you can do to get
the maximum use out of your account(s). That's what is in this file,
plain and simple. I focus mostly on the Conference Area, DELPHI's version
of chat-rooms. Enjoy!

This file was written by Jim Morrison in December 1995. Feel free to
distribute.

NOTE that this file is for people who are not accessing DELPHI through
the Beta Software.

CONTENTS
1 - Accounts
  1.1 - Getting ready to set up a fraudulent account
  1.2 - Setting up fraudulent accounts
  1.3 - Access methods
2 - Mail
  2.1 - Mailbombing
  2.2 - Set forward command
  2.3 - Fake forwards
  2.4 - Fakemail and port 25
  2.5 - Fakemail bombs
  2.6 - Getting people kicked off
  2.7 - Phishing
3 - Conference
  3.1 - Keysubs and macros
  3.2 - Intercepting pages
  3.3 - Text manipulation
  3.4 - Fake sends
  3.5 - Annoyance features
  3.6 - Scramble and free areas
  3.7 - Shutting down Conference
  3.8 - Special areas
4 - Miscellaneous
  4.1 - Multiple telnets
  4.2 - Setting up new accounts
  4.3 - Forums
5 - People
  5.1 - Employees
  5.2 - Hackers
  5.3 - Special thanks


                                1 - ACCOUNTS


Accounts are practically the only way to get on the system. If you aren't
planning on paying, and don't already have an account, then I suggest
creating a fraudulent one, unless you're a really good guesser of other
people's passwords :)

1.1  Getting ready to set up a fraudulent account

If you call directly from your modem line to the toll-free number, you're
going to get caught. If you use any of your own information during signup,
you're probably going to get caught. Just use common sense.
You can either set them up by AT&T or by a dialout (see below). The old
method of telnetting to delphi.com to set up an account no longer works. I
suggest using the Internet for now, because I'm still not totally sure you
can't get traced through AT&T.
You'll need the information that you're going to use for the account
ahead of time. If this is your first time, use a local name and address.
The name or address doesn't have to be real, just have a valid city,
state, zip, and phone number. The person can live anywhere in the US
or Canada, but I suggest just using US addresses for now.
Also have a valid credit card number ready to use. Sometimes DELPHI
alternates and won't take certain card types, but don't worry about it..
you don't always get an account set up on your first attempt.

1.2  Setting up fraudulent accounts

There's two ways to call their toll-free signup numbers:
1) AT&T - Dial on one phone 1-800-CALL-ATT. Have a valid credit card ready.
   Choose option 1, then type in either 800-695-4002 or 800-365-4636 when
   they ask for the phone number you'd like to call. Then they'll have you
   type in your credit card number and expiration date. Have the computer
   on the same phone line and have your modem pick up by typing ATDT in
   your communications software the second after you type in your credit
   card number. Hang up the phone you dialed from.. your computer will
   connect you.
2) DIALOUT - Telnet to a dialout (modem.d.umn.edu, for example) and type
   ATZ (if it's working, it'll respond with "OK"). Then type
   ATDT918006954002 or ATDT918003654636 (note that most dialouts use PBX's
   so you have to dial a 9 before the toll-free number). After a few
   seconds, you're in.
Once you get the word CONNECT after using either way to access the signup
lines, wait a few seconds, then press RETURN. It'll prompt you for a
temporary password. "FREE" will get you in every time, but you can also
use passwords like CUSTOM5, CUSTOM7, LAWFORUM, DIXIE, KMA987, IP22, DG87,
etc. It'll then ask for your full name, address, city, state, zip, and
phone number.
After that you get to choose a Username. Usernames can be 3-12 characters
(spaces don't count). I've noticed that anything with the word PUSSY,
FUCK, CUNT, BITCH, etc. no longer works, but you can still get away with
ASS if you're looking to offend people ;)
After choosing a name it'll ask for your billing method. Though it doesn't
list AMEX (American Express) as a valid option, it's still there to choose
from. Type in the card number and expiration date. Then you're prompted
for your mother's maiden name (just make up some surname) and your
temporary password.
Then it processes. If you get an AGREE prompt, you're in. If it wants to
find your local access number, disconnect and try again.. because they're
not going to give you an account for some reason.. chances are it has to
do with the credit card you gave them.
At the AGREE prompt, they ask you to type AGREE in, but you can type something
like AGREENOT!!, or AGRE, etc. and still take it, making it void if you ever
were caught.
Choose local access numbers accordingly. If you call a number other than the
one you specify to them, it's going to look suspicious and if they find out,
you're history.
At the end of the signup procedure, they give you access instructions.
Enjoy.. because now you have an account :)

1.3  Access methods

You can either use the AT&T method of calling long distance access numbers
(or you're own long distance since they can't really trace you from non-ANI
numbers). I'd suggest using *67 as a dialing prefix before calling a local
access number, however.
You can have more than one person on an account, though it usually gets
deleted faster when you do that or if you access from a different access
number than you specified to them. Using real information with a stolen
account helps the account last alot longer as well, compared to generated
and extrapolated credit cards.


                                  2 - MAIL


E-Mail can be quite a powerful tool when you're online. All mail on DELPHI
is sent through the BOS node, that's why you see BOS:: before a username
when that person sends you mail. You can also send faxes and postal mail,
but I wouldn't suggest saying anything personal, since DELPHI has been
known to read certain user's mail.

2.1  Mailbombing

The easiest way to send a mailbomb is to go into the conference area and
program this string into a macro or keysub (see 3.1):

/m USERNAME Message

Replace USERNAME with the person you want to bomb/spam, and Message
with whatever you'd like to tell them. Each time you do this, it sends
one piece of mail to their E-Mail box. The Message line is the subject
line of the message.
You can mailbomb several people at once by typing commas in between
usernames like this:

/m ADAB,CHORH you're both fucking whores.

Don't ever mailbomb from your account if it is a real account, because
your username shows up on every message they get. Mailbombing will get
you suspended from DELPHI, usually about 24 hours after the offense.

2.2  Set forward command

If you are the victim of a mailbomb, there are a few interesting tools
you can use to fight back. If the mailbomb is still taking place while
you're in MAIL (You can enter MAIL in Conference by typing /MAIL),
simply type SET FORWARD at the MAIL> prompt and type in the Username
of the person bombing you (this will forward all your mail to his/her
account, so when he/she tries to send you mail, they'll get it right back
at them) or you can forward all your mail to SERVICE or ROOT or any other
administrative account that you know of. This will get them suspended,
but it's not suggested if you're doing it from your real account. Just
set the forward back to them in that case and forward one mail to SERVICE
telling them you've been mailbombed.
NEVER mail SERVICE, even if you are reporting someone, from your fraudulent
account however, because they will delete you AND the other person then.
You can delete all your messages with ease by typing DEL /ALL at the

MAIL> prompt.

Don't forget to set your forward back to normal by typing SET NOFORWARD.
If you want it to look like you're dead, account is deleted, etc. you
can type ANY word in place of the username you want your mail forwarded
to, so if you set it to DELETED or DEAD, when a person tries to mail you
they get:

No such user DELETED

If you think your account is going to be deleted for real soon, you can
set the forward to another one of your usernames (though DELPHI can see
that you've set your forward and will probably look into all the names
it might be set to) or an Internet address. Once again, don't set your
forward to your own account or real Internet address from a fraudulent
account.

2.3  Fake forwards

If you want to forward a piece of false mail to some user that supposedly
was sent to you by another user, there's a way. It can also be used
to trick SERVICE into thinking somebody mailed you and left you a
death threat, but it's not suggested from your real account nor from
a fake one anymore.
Here's the format for fake forwards. Actual number of spaces shown:

From:   BOS::USERNAME        1-DEC-1995 00:00:00.00
To:     YOUR USERNAME
CC:
Subj:   Test

Test Message Here.

Be sure to use a correct date format, your own username in the To:
prompt, and use the right number of spaces, or it's going to look
suspicious. To send one, just type SEND at the MAIL> prompt (not
FORWARD, because it's not a real forward), type a subject line,
and then type in the above format your forwarded message. Don't include
anything else in the body of your message because it is not possible
to add anything in, except for the subject line.

2.4  Fakemail and port 25

It is possible to send fake Internet mail (it will look like an Internet
message, not a DELPHI message) to anyone FROM anyone on any system.
To do this, find an Internet provider that lets you telnet to Port 25
of certain telnet addresses (DELPHI is not one of them).
Then telnet to DELPHI.COM,25 or NAUTICOM.NET,25, etc. and you should get
a message informing you of the that you have connected and that a certain
language is spoken there. Just ignore this and type HELO delphi.com.
At this point type MAIL FROM: and the username of the person you want the
mail to be from. If you're not connected to Port 25 of DELPHI, then add
a @delphi.com to the end of the username, otherwise the username will
appear to have come from the system you're currently connected to.
Then type RCPT TO: and the username of the person you want the fakemail
to go to. While you could send from any name, even non-existant, you
can only send to an actual username. Once again, if you're on any other
mail port besides DELPHI.COM, then add a @delphi.com qualifier to the
end of their username or the message will never make it to DELPHI.
Once you get OK messages for both of the above, type DATA, press
and it will tell you to go ahead and type your message below. Press
RETURN once at this point so there's a space between the header files
of the message and your fake message.
Once you're done typing, end it with a "." (without the quotes) on a
separate, blank line. Once it says that the message has been received
for delivery, it simply means that that message has been sent.
You can type as many messages as you want to any number of people.
Once you are finished, type QUIT and it will close the connection.

2.5  Fakemail bombs

You can send a person a fakemail bomb from another person by following
the steps above but repeatedly sending the same message over and over
again. I suggest doing this by macros. Keysubs don't work in any place
other than the Conference Area.

2.6  Getting people kicked off

If you don't like a particular user on the system, there's a variety
of ways of getting him kicked off:
1) Manipulate what he says in the Conference Area in hopes that others
   will report him (see 3.3 and 3.4).
2) Send a fake forward to SERVICE allegedly from that user to you
   threatening your life or something.
3) Send fakemail from that user to any other user threatening their
   lives or anything else of an offensive nature.
4) Send fakemail from that user to SERVICE telling them you'd like to
   cancel your account.
5) Send a fakemail bomb from that user to any other user, including
   SERVICE. Despite what they say, ANYONE can send Internet E-Mail
   without having to register for Internet Services by typing the format
   IN%"address@goes.here.com" at the To: prompt.
6) Breaking onto a real account and reporting the user.
If none of these methods work the first time, try another. Don't forget that
many small complaints can add up to a big one get a user kicked off for good.

2.7  Phishing

There are ways that you can scam users for their password with the help
of fakemail and an extra Internet account (that's not registered under
your name). It can involve sending email from SERVICE to a number of
users telling them to change their password to an assigned password
because of maintenance problems, etc., or tell them to mail their
password to another Internet address because they won free time, a
local server went down, etc. Be creative, but remember that you can't
trick all the people all the time.
Trust me, I haven't yet.


                              3 - CONFERENCE


Conference is the life-line of DELPHI. It can either be used to learn about
other people or torment them.
The actual Conference program is called PBATCH, and operates in a hidden
group 0 named " Private Node CO (sysops welcome)." Note that you cannot
name a group name starting with a space, but this group is named in that
fashion. In it resides several nodes operating under the PBATCH Program/
Username with nicknames like *WHO_BOS1A, etc. The group looks like this:

0)   Private Node CO (Sysops welcome)
      *WHO_BOS1E, *WHO_BOS1A, *WHO_BOS1B, *WHO_BOS1C, *WHO_BOS1D, *WHO_BOS1F,
  *WHO_BOS1G

While it is virtually impossible to get inside the group since it is
private, if you were inside it what you'd see would be Login and Logoff
messages being displayed by the several nodes, along with probably New
Mail messages, etc. or anything else to do with specific nodes.
If you would like more information on this, E-Mail PETER, who is the
Conference programmer for DELPHI.
We will deal with a few Conference tricks now in case you end up being the
person tormented, or just want to go out for vengeance upon other users.


3.1  Keysubs and macros

This is a brief summary of how you can use keysubs and macros in Conference.
Please note that keysubs are part of DELPHI, and can only be used in
Conference. Macros stay in your software and are there permanantly or until
you remove them.
The usage parameters for /KEYSUB is as follows:

/KEYSUB $IDENTIFIER$COMMANDS/COMMENTS $

For example:

/KEYSUB $$Fuck $ would echo Fuck everytime you press RETURN.
/KEYSUB $,$Fuck $ would echo Fuck evertime you typed a "," and RETURN.

To turn /KEYSUB off, type /NOKEYSUB. There will be more discussed on
Keysubs later in 3.5
Macros will depend on your specific communications software, but they
are generally more effective than Keysubs because everytime you press
the key or key combination on your keyboard, it produces the same
result, as programmed in by you.
For example, if you programmed the word Fuck as F1, everytime you would
press the F1 key, the word Fuck would appear. It will appear without
pressing RETURN unless you add a ^M after it. ^I is a tab and ^G is a
beep.
Both of these will come in handy, as you will later see in this section.

3.2  Intercepting pages

If a user has been paged but is no longer in the Conference Area, you can
type /NAME and the name of the person getting paged.
You can then answer that page by typing /ANSWER or /ACCEPT. I haven't tried
this before, but I assume it works.

3.3  Text manipulation

You can manipulate what someone says in a chat room or produce a fake
message and get away with it IF the people you want to trick have their
widths set at 80 and have /SHOWRN off. You can still try this if your
width isn't at 80, even though it won't look normal on your computer,
but to others who have their widths at 80 (the default width) there
won't be a difference.
The length of your Username/nickname and what you type DOES make a
difference, but one proven method is to:
1) Change your nickname to a one-character name.
2) Type an 8 character string, such as "whatsup?" or "hmmmmmmm"
3) Tab 9 times or program ^I into a macro 9 times without pressing RETURN
   or using a ^M in the macro.
4) Type the person's name and what you want them to say. Remember to add
   in a period before their nickname and to capitalize their username if
   they aren't using a nickname. You can also type other messages (see
   below).
Some other messages instead of manipulating what somebody says might be:

New mail received on node BOS1C from BOS::USERNAME

or

Conference will be shutting down in 5 minutes.

You may add a beep before your message by pressing CTRL-G and RETURN.
In a macro, you'd type ^G, the message, and then ^M, so the macro would now
look something like this:

^I^I^I^I^I^I^I^I^I^GNew mail received on node BOS1C from BOS::SERVICE^M

Which would look something like this in the chat room if your nickname was
"S" and you typed "Whastup?":

.S> Whatsup?

New mail received on node BOS1C from BOS::SERVICE

If your not sure of how it's going to turn out, just go into a private
group by yourself and start experimenting. It's all in the Tabs.

3.4  Fake sends

You can also send fake /SENDS, one of two ways:
1) Simply use the method above, but substitute a CTRL-G and the SEND
   where you would normally type any other message.
2) Type the fake send when you are /SENDING that individual, that way only
   they will see it, as shown below.
Type /SEND and their name, followed by an 8 character string, and then tab
18 times, press CTRL-G, type out the send, and tab an additional 10 times
to add an extra space between the send and the chat room conversation.
This way it will look like it's double-spaced, which is how DELPHI spaces
each SEND you receive.
A macro would look like this:

^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^GSERVICE>> Fuck you^I^I^I^I^I^I^I^I^I^I^M

And would appear like this to the other individual:

YOURUSERNAME>> Whatsup?

SERVICE>> Fuck you

You can always experiment by /SENDING yourself first. It may sound
complicated at first, but it's a proven method of tricking people.

3.5  Annoyance features

There are many ways to annoy people on DELPHI. A few are:
 1) CTRL-G to cause beeps
 2) Mailbombs/Spamming
 3) Text manipulation
 4) Fake sends
 5) Fake signing off by typing "- signed off -"
 6) Entering a chat room that has two people in it, fake sign off, then
    sit there quietly and listen in on their conversation, and start
    fake sending them from EACH OTHER just to piss them off and watch
    the confusion set in.
 7) Fake forwards
 8) Fakemail and fakemail bombs
 9) Changing your nickname to look similar to their Username. If they have
    an I in their name, replace it with a lowercase L in yours, or vice
    versa.
10) Mass Paging (can be used with both keysubs and macros)
11) Mass Sending (can be used with both keysubs and macros)
12) Paging every user on the system at once, causing an intolerable Idle
    list for many users, since it scrolls several pages down the screen
12) /Sending them while squelching them (with the /SQUELCH command) so they
    can't reply.
I'm sure there are hundreds of others out there as well.. these are the only
that come to mind right now. Forgive me if I left something out :)
Here are some examples of how you would use keysubs to perpetrate the above
instances:

/KEYSUB $$/P USERNAME $ - To page a user each time you press RETURN.

/KEYSUB $$/S or /Z USERNAME Message $ - Can be used for mass sending/zending.

/KEYSUB $$/M USERNAME Message - For mailbombing

/KEYSUB $$/S USERNAME ^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G$ - Will
sometimes effectivly log them off if done in excess as long as they have
beeps turned on and the /BUSY flag isn't set.

3.6  Scramble and free areas

To win at Scramble Word Games more often on DELPHI, you may want to create
a word list in your DOS Edit program and upload it everytime you're playing
a Scramble Game. This will allow you to scroll words down screen and attain
higher scores.
Through this technique, I am the second highest scorer in Scramble history
with 2677 as a score under the username LAMENT.
In a few instances GAMEs may disappear from the Conference area. If this
occurs, simply nickname yourself GAME and create a group called Scramble
Word Game, so once they come back they will be forced to create a different
group name since the traditional one, Scramble Word Game, is already in
use. The pleasure in doing this is minimum, however, as sometimes you may
have to wait hours for the GAMEs to be reset. However, it can be fun if
somebody enters the group and thinks you really are GAME.
There are also Scramble Games in the Free Area under the Using DELPHI menu.
Type GO USING NEW CON at the Main Menu to access it. Note that it's only
open on certain evenings.

3.7  Shutting down Conference

It has been done before, though not by me. It's not too hard to do, either.
Just open multiple telnet sessions (see 4.1), upload a large text file
and /SEND it to yourself by using the keysubs, then squelch yourself right
in the middle of it. It will cause an overflow of data, forcing Conference
to shut down temporarily.
If you want to hear from the expert on this get in touch with me.

3.8  Special areas

As noted in the Introduction to this section there is a group 0 and other
nodes located in Conference, but only hidden. Sometimes, with the help of
system glitches and what not, you are thrown into these areas (while not
actually inside group 0) and see weird occurences. These have mainly
become a thing of the past but if you are ever thrown into these areas
this is what you may experience:

- All the GAMEs have disappeared
- There are a considerably less number of users in Conference than there was
  a second ago
- When you list the Available list, you see Employee accounts and sub-programs
  like NI-CONFAGENT which aren't even usernames.
- Group 0 with DELPHI's nodes operating under the username PBATCH (a program
  much like NI-CONFAGENT)
- JOINDELPHIs (People signing up for an account in North America) and
  GODELPHIs (People signing up for an account under UKDELPHI) in the Available
  List
- Unable to /SEND or /ZEND certain people that are on the system.
- SERVICE logged on occasionally in the Avaiable List

A neat trick is to /ZEND all the JOINDELPHIs and GODELPHIs telling them that
they're being traced and to log off immediately, or that DELPHI is nothing
but a shit service (very true) and that it just ain't worth their time to
sign up. You'll see that over half of them log off by the next time you
/ZEND them :)
Not much else to do here. You can /ZEND SERVICE, etc., but that's not always
wise. To get back into regular conference, simply exit and then come back.
You are usually thrown into areas though glitches that you don't even
notice until you see half the people in Conference are no longer there.


                             4 - MISCELLANEOUS


In this section are just some miscellaneous notes that couldn't really be
fitted in elsewhere. These includes multiple telnet sessions, setting up
more accounts from one that already exists, and an introduction to forums
and Moderator commands.

4.1  Multiple telnets

If you are telnetting to DELPHI on a provider that allows multiple telnet
sessions to be opened up at one time, then you can enter DELPHI several
times on the same or different accounts, which comes in handy for things
like shutting down Conference (see 3.6) or just for annoyance purposes.
You may also telnet into DELPHI from your own account on DELPHI by going
to the Internet SIG, registering for Internet use, then typing DELPHI.COM
in where you want to telnet to. You will only be able to control the
last session you telnetted from, and will either have to hang up (not
recommended) or individually sign off each account to get back to your
main connection.
This is troublesome to DELPHI because it causes system lag and can
ultimately lead to many unfortunate mishaps :)

4.2  Setting up new accounts

You can telnet to a dialout once on your fraudulent account (not suggested
if you own a real account) and set up additional accounts without having
to even leave the system. If they are watching the account you telnet
from to set up the new accounts, however, they will know about all the
accounts you set up and any other activity on your account.

4.3  Forums

Many Custom Forums exist throughout DELPHI with a wide range of topics
that many members may be interested in. Each of these forums have
Conference areas specifically designated for that area. The areas are
similar to the Main Conference Area.
You can check to see a user's real name or when a particular user was
last on by typing this format:

/ENTRY USERNAME

Also, there are many secret commands used by Moderators, Hosts, etc.
in these smaller Conference areas:

/XMOD          Turns the group into a moderated group or switches
/NOXMOD        it back to normal.  Only works for people with
               W, A, or C flags. W and A flags can transfer the
               moderator status to another user by typing
               /XMOD name. Moderator is given usage of all group
               functions regardless of who started the group.

/XPUB          Publishes the groupname in DELPHI MAIN.  Use
/NOXPUB        sparingly, when there is a good reason to make
               the presence of your CO known to people outside
               the SIGs.

/XSPON sched   Cause billing to be shut off for people who are
/NOXSPON       in the conference group.  Requires approval by
               DELPHI for a specific date, time, and duration.

/XGLISTEN      Make the group an Audience group.  Anyone joining
/NOXGLI        the group from that point on will be in listen-only
               mode and will not be able to say anything to the
               rest of the group unless the moderator recognizes
               him with a /NXL.  /GN shows who is talking in an
               Audience group. Anyone who is listen-only and who
               tries to talk will be instructed to use the /QUEUE
               command.

/XLISTEN name  Keep a person from talking in a group, whether it
/NOXL name     is an Audience group or not.  /NOXLISTEN allows a
               person to talk.  The person whose name you use in
               these commands gets told that he is "on stage" or
               "listening in the audience" when the commands are
               issued.

/NXL           (This is the same as /NOXLISTEN).  This is used by the
               moderator to recognize a speaker.  It starts the queued
               message.  After the message is done, you can use /XL
               to put the speaker back in the audience, but you don't
               have to (i.e., a guest can queue a message and remain
               in talk mode after).


                                 5 - PEOPLE


In this section I included some information about several employees,
so-called hackers, and finally my special thanks.

5.1  Employees

Some employees include:
DRSAX - Laurence Sax? Security employee
HAUNTEDHOUSE/CRYAN - Chris Ryan, Security employee
ICEBLINK - Security employee?
SECURITY - The main security account, operated by a number of individuals
SERVICE - Operated by Richard Learoyd (DELPHI Online Support Specialist),
          Tim Wingo (usually security matters), and Kevin Plankey (Domestic
          affairs)
RICHARD - Richard Learoyd
KEVIN/HACKTRACK - Kevin Michael Plankey, Member Servies Manager
CHAIKIN - John Chaikin, old Head of Security
CARYW - Cary Watson, Security employee
JSRIBERG/PHISH - Jonathon Sriberg
SOCRATES - Hosts the New Member Conferences in the free area.
ASKDELPHI - Information about DELPHI, operated by a number of individuals
CHARLEEN - Charleen, sometimes operates the SERVICE account in place of
           Richard Learoyd
KIP/GAME - Kip, operates GAMEs and uses his account to operate certain Games.
RMESARD/GROOVASAURUS/RONM - Ron Mesard, DELPHI employee
MZANGER - Mark Zanger, DELPHI Senior Editor

Other alleged employees include:

NFISH, ANDERSON1160, LUEDTKE, KHAMADA, PIEDMONT, SKLEIN, BTREMP, GOOMP,
WAYNE46, CHETAY, SHEREE, CLYDEFLOWERS, EBRESNER, LEIGHANN, SUGLIO, JBUCHER,
OSBAN, TBROOKS22, WHITEW, CMUISE, COATES132, DECARR, AMYC, BADUBLINSKE,
RLPARSONS, ELI27, DGMANNEL, JKCRAUN, DGEN, OWENTIME, DANIELCROSBY,
DAVIDNASON, CASE, DEAN144, RWBROOKS, JERRYAUTHOR, SS_RAT, CCORN, LPRIBANIC,
JHTAY, ABLEE, VIPERDOG, BENJMN, MOHATMA, MAZMAN, PJORSTAD, RSALIK, CHUCKT,
IANJ, KFRERKER, MAZOUE, KIRKPATRICK, SKYCLAD, DARREN42, KATHYCOBB, MADBRO,
FRANKS, DBOX, CRUISE, RGERBER, JHERBST, WCIESLA, GARY1324, FREDL, SHAWN89,
NAZIMEK34, MICHAELP, STESMI, MAVRACHANG, RODBER, NILSON, MSTEEVES, KINGUANA,
PEAPI, JAMIE_K, CAROLAK, LISA, YAKFNORD, NI-CONFAGENT, DTEN, JULIE, ECAREY,
RGS, MARK2122, JPOLITO, DARREN, TJMARTINEZ, DAVECLEMENTS, RANDYALLMAN,
RCJOHNSON, JOHNPROBERTS, 4990TCW, HANKEL, BRUMIT, CRUISE, SHANNONLA, KRAFTWIZ,
ROCKETMAN666, DENLEWIS, GARYREYNOLDS, DAVEW, LUCAS330, CH567, ARTSIMON,
PHASSETT, JOEBRADY, HEIDI, SARAH, FRANK, JIM, RJOHNSON, and any other
suspicious looking name would qualify. Usually on during regular business
hours as well.

5.2  Hackers

Many "hackers" frequent DELPHI. I use the term hackers loosely due to the
fact that "hacking" DELPHI isn't as much work as hacking into bank accounts
or the Pentagon. But, since it's still hacking in my book, and most everyone
else's, I'll use that term for people who use fraudulent accounts or phish
passwords/credit cards off other people.
I won't give any usernames or aliases of such people but most anyone who
"hacks" into DELPHI by way of fraudulent accounts would qualify as such.

5.3  Special thanks

Special thanks to all those that helped me along my way here, and taught me
the ways of DELPHI. Many have left, but there are a few that stand out in
my mind right now: Blah, Adam, Tisdal, Henley52, Neil, PiL.

And to all my helping hands: Eddie, June, Anj, sillygirly, Michele, and
anyone else I may have failed to mention in this version.


THE END

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH