About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Virus- L Digest, Vol 1, Issue 57


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From: Kenneth R. van Wyk (The Moderator) <[email protected]>
Errors-To: [email protected]
To: [email protected]
BCC: [email protected]
Subject: VIRUS-L Digest V1 #57
Reply-to: [email protected]
--text follows this line--

VIRUS-L Digest Thursday, 22 Dec 1988 Volume 1 : Issue 57

Today's Topics:
Dirty Dozen
Boot Sectors on IBM disks (PC)
Leisure Suit Larry 'virus' (PC)
BRAIN in the USSR (PC)
Re: Write Protect Gritch & You can't fool the... (PC)
Call for papers - 12th National Computer Security Conference
Amiga virus could survive warm boot

---------------------------------------------------------------------------

Date: Wed, 21 Dec 88 14:30:42 -0800
From: Steve Clancy <[email protected]>
Subject: Dirty Dozen

Re: J.D. Abolins comment about beggining another Dirty Dozen list:

I was also quite a fan of the list, and have lost track of Eric
Newhouse. Apparently he has dropped out of sight?? I would be most
willing to help work on such a list. I have been collecting some
"badware" which mostly fall into the category of pirated software,
hacked software, or a very few legitamate trojan horses. No viruses,
though. I agreee that a more comprehensive, and perhaps broader
scoped list is needed. And something that carries some authority with
it(???). The Dirty Dozen tended to be circulated mostly around BBSes,
and microcomputer users, rather than in the corporate environment.

If anyone else, is interested in making efforts in this direction,
speak up, and perhaps we can put something together.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
| Steve Clancy | WELLSPRING RBBS |
| Biomedical Library | 714-856-7996 24 HRS |
| P.O. Box 19556 | 300-9600 N,8,1 |
| University of California, Irvine | 714-856-5087 nites/wkends |
| Irvine, CA 92713 | 300-1200 N,8,1 |
| | |
| SLCLANCY@UCI | "Are we having fun yet?" |
| [email protected] | |
| | |
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

------------------------------

Date: Wed, 21 Dec 88 18:19:21 EST
From: Steve <[email protected]>
Subject: Boot Sectors on IBM disks (PC)

Regarding BOOT sectors and some of Homer Smith's questions:

As Joe Simpson points out, all disks have a boot sector on them.
It is important to understand the functionality of the boot sector.
When you power up the computer, it immediately loads some instructions
from ROM and runs them. Among other things (like doing some
self-checks), these instructions for example tell the computer to try
to read disk drive A: (depending upon your configuration of course).
If there is a formatted diskette present, then it loads the boot
sector and does *whatever* the boot sector tells it to, even if it's a
non-system diskette.

All MSDOS-formatted disks have a boot sector containing
instructions, regardless of whether or not the diskette was formatted
with the system option (doubters, go look at the boot sector on a
non-bootable disk). In fact, the boot sectors of system and
non-system diskettes are identical. The difference between system and
non-system disks *for* *the* *IBM* *PC* is not in the boot sector, but
in the presence or absence of system files on the disk (that's easy to
check: just format a disk *without* the system option and then copy
the system files onto the disk and see if it works [Assuming that
you're running MSDOS, these files are ibmbio.com, ibmdos.com, and
command.com, the first two of which are *hidden*.]. It does. Either
that or examine the boot sector bit for bit). All the system option
does is tell the machine to copy these three files after formatting.
The directory, FAT, and sectoring get setup during the format (with
erasure of anything that may have been on the disk before formatting).

The instructions found on the boot sector normally tell the
computer to go find certain system files on the disk, load them into
memory, and run them. This is how DOS gets going. If the system
files are not found, then an error message like "Non-system disk or
disk error Replace and strike any key when ready" is displayed and the
computer waits for you to respond.

It should be clear that it would be very easy for a virus to put
instructions in the boot sector (regardless of what option was used
when formatting the disk) telling the computer (when booted) to go
find some virus file on the disk, load it into memory, and then go
back and excute the real boot sector (which was moved by the virus to
some other part of the disk), leaving many users none the wiser. Even
if it's a non-system diskette, the computer doesn't know that (upon
booting) until it loads the boot sector and executes it and doesn't
find any system files (but if there is a boot virus present, the virus
gets run first before the "Non-system disk ..." message gets
displayed). This is true regardless of whether the disk even has any
files on it. A large virus may not be able to fit entirely in the
boot sector, but that's no problem; it can store instructions in good
sectors which it labels as "bad" (so that DOS won't overwrite them),
or in hidden files (which could be discovered).

It should also be pointed out (as I'm sure it has been many times
on this list) that utilities such as DIR or FORMAT are programs and
can be infected with a virus (so just doing a DIR can infect any disks
you happen to have in any of your drives at that time).

It would be a good idea to think about all this in the context of
real, known viruses, so I'm hoping somebody will be able to put
together a compilation of discriptions of all known viruses, variants,
and their characteristics.

Something about write tabs: We have a genuine 6MHz IBM PC AT which I
have discovered can write to the disk *if* the write tab is
transparent.

Steven C. Woronick | Disclaimer: These are my own opinions/ideas.
Physics Dept. | Always check things out for yourself...
SUNY at Stony Brook, NY |
Acknowledge-To: <XRAYSROK@SBCCVM>

------------------------------

Date: Wed, 21-Dec-88 19:26:29 PST
From: [email protected]
Subject: Leisure Suit Larry 'virus' (PC)

There was some discussion of this on the network where I work.
The consensus was that it is a Trojan, not a virus; it gets loaded
into memory when LSL is run, then remains and destroys things, but
does not copy itself to other programs, not even other copies of LSL.

Dan Hankins

------------------------------

Date: Wed, 21 Dec 88 21:53:34 PST
From: Robert Slade <[email protected]>
Subject: BRAIN in the USSR (PC)

No one has cross posted it yet, but RISKS 7.96 has an article
about virus infection in the USSR. They have, of course, developed
the ultimate anti virus program, the details of which remain a state
secret ...

Also, 7.97 reports on an article which implies that virus
infections are one-in-a-million.

------------------------------

Date: Wed, 21 Dec 88 17:47:57 EST
From: "Christian J. Haller" <[email protected]>
Subject: Re: Write Protect Gritch & You can't fool the... (PC)

>Date: Wed, 21 Dec 88 09:43:09 EST
>From: Don Alvarez <boomer@space.mit.edu>
>Subject: Write Protect Gritch
> ...
> I know Ken doesn't like people flaming on the list, so maybe I'll
> get booted for saying this, but PLEASE, if somebody asks a question
> which has a simple, yes or no answer, and you want to respond with
> an nth generation rumor of unknown origin, keep it short...

I did my homework before I wrote my opinion. I already knew about the
documented BIOS interrupt limitations. There are undocumented BIOS
calls, and there are non-BIOS hardware calls.

When the PC was a baby, one or two software vendors (obscure ones) had
a copy protection scheme that involved writing something to their own
diskettes, whether write protected or not, on the user's machine.
Sorry, I don't remember the package. Somebody noticed this and asked
IBM about it. Of course it wasn't documented. It wasn't DOS or BIOS.
The answer was no, it couldn't be done, but the fact remained that it
was being done, and eventually, informally, not for attribution, quietly,
those who were asking got word that it could be done, in software.
The technique was not part of the answer. I have no proof. It may
have been an undocumented feature of the early diskette drives, long
ago de-featured. I don't know. But the facts of the case seemed clear
at the time, and that was the basis for my position that write protect
tabs are not certain protection on a PC.

>Date: Wed, 21 Dec 88 11:40 EST
>From: X-=*REB*=-X <[email protected]>
>Subject: You can't fool the write protect line w/software (PC)
>
>According to the circut diagram from IBM for IBM 5.25" diskette
>drives...
> . . . Thus, all the talk recently of this
>being controlled by software is incorrect.
>
>Richard Baum & John Hunt
>[Ed. Thanks guys! The only possible weak link then would be a
>malfunctioning write-protect sensor (normally an optic sensor, I
>believe).

Nope, it's mechanical in IBM PC's.
Yes, thanks guys. I do appreciate the research. I am almost but not
quite convinced that the unattributable IBM source I mentioned above
was wrong, or that newer drives are indeed absolutely hardware protected.
The only remaining loopholes are in Len Levine's not-yet-conclusive
research (see his V1 #54 contribution) that disk controller ROM is loaded
into RAM at boot time. You could tweak it as you liked, then! You could
prevent it from being reloaded, you could change the logic states.
In short, you could lie to the disk controller about the write protect
status. It is possible that the hardware protection is absolute, but
I agree with Len Levine that the question is still open, and I for one
would never trust an IBM Tech Ref manual to tell the whole story. I've
been living with those suckers for about seven years, and they get less
informative every year.

- -Chris Haller
Acknowledge-To: <CJH@CORNELLA>

------------------------------

Date: Wed, 21 Dec 88 23:15 EST
From: Jack Holleran <[email protected]>
Subject: Call for papers - 12th National Computer Security Conference

************************************************************************
* CALL FOR PAPERS *
************************************************************************

12th
NATIONAL COMPUTER SECURITY CONFERENCE
Sponsored by the National Computer Security Center and
the National Institute of Standards and Technology

Information Systems Security:
Solutions for Today - Concepts for Tomorrow

10-13 OCTOBER 1989
BALTIMORE CONVENTION CENTER
BALTIMORE, MARYLAND

This conference provides a forum for the Government and the private sector
to share information on technologies, present and future, that are designed
to meet the ever-growing challenge of telecommunications and automated
information systems security . The conference will offer multiple tracks
for the needs of users, vendors, and the research and development
communities. The focus of the conference will be on: Systems Application
Guidance, Security Education and Training, Evaluation and Certification,
Innovations and New Products, Management and Administration, and Disaster
Prevention and Recovery. We encourage submission of papers on the following
topics of high interest:

Systems Application Guidance Innovations and New Products
- Access Control Strategies - Approved/Endorsed Products
- Achieving Network Security - Audit Reduction Tools and Techniques
- Building on Trusted Computing - Biometric Authentication
Bases - Data Base Security
- Integrating INFOSEC into Systems - Personal Identification and
- Securing Heterogeneous Networks Authentication
- Secure Architectures - Smart Card Applications
- Small Systems Security - Tools and Technology

Disaster Prevention and Recovery Management and Administration
- Assurance of Service - Accrediting Information Systems
- Computer Viruses and Networks
- Contingency Planning - Defining and Specifying Computer
- Disaster Recovery Security Requirements
- Malicious Code - Ethics and Social Issues
- Survivability - Life Cycle Management
- Managing Risk - Role of Standards

Evaluation and Certification Security Education and Training
- - Assurance and Analytic Techniques - Building Security Awareness
- - Covert Channel Analysis - Keeping Security In Step With
- - Conducting Security Evaluations Technology
- - Experiences in Applying - Policies, Standards, and Guidelines
Verification Techniques - Preparing Security Plans
- - Formal Policy Models
- - Understanding the Threat

BY FEBRUARY 17, 1989: Send five copies of your draft paper* to one of the
following addresses. Include the topical category of
your paper, author('s) name, address, and telephone
number on the cover sheet only.

1. FOR PAPERS SENT VIA Computer Security Conference
U.S. MAIL ONLY: ATTN: Carolyn Copsey, C2
National Computer Security Center
Fort George G. Meade, MD 20755-6000

2. FOR PAPERS SENT VIA Computer Security Conference
COURIER SERVICES c/o Carolyn Copsey, A]TN: C2
(FEDERAL EXPRESS, National Computer Security Center
OVERNIGHT EXPRESS, 911 Elkridge Landing Road
EMERY, UPS, etc.): Linthicum, MD 21090

3. VIA E-MAIL: [email protected] (1 copy only)

BY MAY 12, 1989: Speakers selected to participate in the conference will be
notified.

BY JUNE 30, 1989: Final, camera-ready papers are due.

* Government employees or those under Government sponsorship must so
identify their papers.

For additional information, please call Carolyn Copsey at (301) 859-4466.
Queries may also be sent to [email protected] via e-mail.

------------------------------

Date: Wed, 21 Dec 88 14:15:38 -0800
From: Steve Clancy <[email protected]>
Subject: Amiga virus could survive warm boot

After reading the discussions regarding viruses that can support a
warm boot, I remembered some material I had seen a few months ago
regarding Amiga microcomputer viruses that did the same thing. Here
are some of the messages from back then that were gleaned from
compuserve and Amiga BBSes.

Article 10437 of 10516, Fri 11:32.
Subject: Amiga VIRUS
From: [email protected] (Bill Koester CATS)
Date: 13 Nov 87 19:32:05 GMT

THE AMIGA VIRUS - Bill Koester (CATS)

When I first got a copy of the Amiga VIRUS I was interested to
see how such a program worked. I dissassembled the code to a disk
file and hand commented it. This article will try to pass on some
of the things I have learned through my efforts.

1) Definition.
2) Dangers.
3) Mechanics
4) Prevention

1. - Definition.
- ----------------

The Amiga VIRUS is simply a modification of the boot block of an
existing DOS boot disk. Any disk that can be used to boot the
Amiga (ie workbench) has a reserved area called the boot block.
On an Amiga floppy the bootblock consists of the first two
sectors on the disk. Each sector is 512 bytes long so the boot
block contains 1024 bytes. When KickStart is bringing up the
system the disk in drive 0 is checked to see if it is a valid DOS
boot disk. If it is, the first two sectors on the disk are loaded
into memory and executed. The boot block normally contains a
small bit of code that loads and initializes the DOS. If not for
this BOOT CODE you would never see the initial CLI. The normal
BOOT CODE is very small and does nothing but call the DOS
initialization. Therefore, on a normal DOS boot disk there is
plenty of room left unused in the BOOT BLOCK.

The VIRUS is a replacement for the normal DOS BOOT CODE. In
addition to performing the normal DOS startup the VIRUS contains
code for displaying the VIRUS message and infecting other disks.
Once the machine is booted from an infected disk the VIRUS
remains in memory even after a warm start. Once the VIRUS is
memory resident the warm start routine is affected, instead of
going through the normal startup the VIRUS checks the boot disk
in drive 0 for itself. If the VIRUS in memory sees that the boot
block is not infected it copies itself into the boot block
overwriting any code that was there before. It is in this manner
that the VIRUS propagates from one disk to another. After a
certain number of disks have been infected the VIRUS will print a
message telling you that Something wonderful has happened.

2. - Dangers.
- -------------

When the VIRUS infects a disk the existing boot block is
overwritten. Since some commercial software packages and
especially games store special information in the boot block the
VIRUS could damage these disks. When the boot block is written
with the VIRUS, any special information is lost forever. If it
was your only copy of the game then you are out of luck and
probably quite angry!!

3. - Mechanics.
- ---------------

Here is a more detailed description of what the virus does. This
is intended to be used for learning and understanding ONLY!! It
is not the authors intention that this description be used to
create any new strains of the VIRUS. What may have once been an
innocent hack has turned into a destructive pain in the #$@ for
many people. Lets not make it any worse!!

a.) Infiltration.

This is the first stage of viral infection. The machine is
brought up normally by reading the boot block into memory. When
control is transferred to the boot block code, the virus code
immediately copies the entire boot block to $7EC00, it then JSR's
to the copied code to wedge into the CoolCapture vector. Once
wedged in, control returns to the loaded boot block which
performs the normal dos initialization. Control is then
returned to the system.

b.) Hiding Out.

At this point the system CoolCapture vector has been replaced and
points to code within the virus. When control is routed through
the CoolCapture vector the virus first checks for the left mouse
button, if it is down the virus clears the CoolCapture wedge and
returns to the system. If the left mouse button is not pressed
the virus replaces the DoIO code with its own version of DoIO and
returns to the system.

c.) Spreading.

The code so far has been concerned only with making sure that at
any given time the DoIO vector points to virus code. This is
where the real action takes place. On every call to DoIO the
virus checks the io_Length field of the IOB if this length is
equal to 1024 bytes then it could possibly be a request to read
the boot block. If the io_Data field and A4 point to the same
address then we know we are in the strap code and this is a boot
block read request. If this is not a boot block read the normal
DoIO vector is executed as if the virus was not installed. If we
are reading the boot block we JSR to the old DoIO code to read
the boot block and then control returns to us. After reading, the
checksum for the virus boot block is compared to the check- sum
for the block just read in. If they are equal this disk is
already infected so just return. If they are not equal a counter
is incremented and the copy of the virus at $7EC00 is written to
the boot block on the disk. If the counter ANDed with $F is equal
to 0 then a rastport and bitmap are constructed and the message
is displayed.

d.) Ha Ha.

< Something wonderful has happened >
< Your AMIGA is alive!!! >
<and even better >
< Some of your disks are infected by a VIRUS >
< Another masterpiece of the Mega-Mighty SCA >

4. - Prevention.
- ----------------

How do you protect yourself from the virus?

1) Never warm start the machine, always power down first. (works
but not to practical!)

2) Always hold down the left mouse button when rebooting. (Also
works, but only because the VIRUS code checks for this special
case. Future VIRUS's may not!)

3) Obtain a copy of VCheck1.1 and check all disks before use. If
any new virus's appear this program will be updated and released
into the public domain. VCheck1.1 was posted to usnet and will
also be posted to BIX. ( Just like the real thing the best course
of action is education and prevention!)

- ----
AMIGA ZONE Sec: 2
Theme: WARNING!! AMIGA VIRUS ON THE
To: BEARDLOVER By: BEARDLOVER
Date: 10/09/87 3:42 Num: 16,622
Title: R#16606 HERE'S THE INFO!
- ----

Received: by MAINE (Mailer X1.24) id 3371; Tue, 06 Oct 87 10:42:39 EDT
Subject: Important: News on amiga virus
From: "Steve E. Goldsmith" <SLCLANCY@UCI>
Sender: "AMIGA discussion" <CSNEWS@MAINE>
Reply-To: "AMIGA discussion" <CSNEWS@MAINE>
To: 7GMADISO@POMONA
Date: Tue, 6 Oct 1987 10:42 EDT

From: SLCLANCY@UCI
Newsgroups: comp.sys.amiga
Subject: IMPORTANT WARNING ... Amiga Virus Loose ... PLEASE READ
Message-ID: <[email protected]>
Date: 4 Oct 87 13:24:48 GMT
Organization: Amdahl Corporation, Sunnyvale, CA 94086
Lines: 190
Keywords: virus trojan worm program infected disk

[ Some days you eat the line ... some days the line eat's you ... ]

The following was downloaded from the FAUG (First Amiga Users Group) BBS.

Seems like we've been spared such crap until now, but this highly disturbing
notice shows we are not immune to attacks on our machines by the "Dark Side
of the Force"!

Any further information on this (or other such nastiness) would be greatly
appreciated!

Doc, if you are reading this, *please* post the Sectorama program that I
emailed you several weeks ago ASAP!

/kim

vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv

The following is a thread from Compuserve:

=========================================================================

#: 87294 S3/Hot News & Rumors
02-Oct-87 02:41:08
Sb: #WARNING! Virus loose!
Fm: Larry Phillips/SYSOP 76703,4322
To: All

Well, it had to happen sooner or later. There are a variety of programs
that are variously known as Trojan Horses, Bombs, and Viruses. While Bombs
are generally destructive (as evidenced by their name), and Trojan Horses
are either destructive or for the purpose of theft of data, Viruses have
been known to be benign or malignant both. A Virus has shown up on the
Amiga, arriving from Europe, and coming from a group calling themselves
SCA. Since it is uncertain yet what its purpose is, that is, how
destructive it may or may not be, it will pay to check any disks you boot
from and kill the virus if found.

The method of propogation is as follows. An Amiga is booted with an
infected disk. All works normally, with no sign that anything is amiss. If
you then reboot the machine with the CTRL-Amiga-Amiga key using an
uninfected disk, the virus is transferred to the boot disk, and it too
becomes a "carrier", ready to pass it on, and so on.

The presence of the virus can be detected by looking at block 1 on a disk.
Normally, this will have random data or a pattern of data in it, but you
will be able to see the virus quite easily if it is there. Using Sectorama
(SEC.ARC in DL 9... DiskZap will not show it), look at block 1 (Cyl 0, Hd
0, Sector 1). If the virus is present, run INSTALL on the disk. INSTALL
will rewrite sectors 0 and 1, killing the virus. Then, AND MOST
IMPORTANTLY, TURN OFF the Amiga's power. If you have booted from an
infected disk, and have used INSTALL to kill the virus, rebooting without
powering off/on will only reinfect the disk.

There have been a couple of reports of a message showing up on the screen,
and one was followed by the disk being uniusable afterward, but I can't
confirm that it was trashed by the virus. The message was:
"Something wonderful has happened. Your AMIGA is alive !!! and, even
better,,,
Some of your disks are infected by a VIRUS !!!"
This is the same message that appears in block 1 of an infected disk.

Watch for it... stomp it out.

Regards, Larry.

#: 87306 S3/Hot News & Rumors
02-Oct-87 04:43:21
Sb: #87294-#WARNING! Virus loose!
Fm: Barry Massoni 73260,1413
To: Larry Phillips/SYSOP 76703,4322 (X)

Larry,

I`m not a programer or an expert, but I thought that re-booting the
system was supposed to clear the machines memory-how can the virus be
transmited?

Also, should someone without the ability to look at a disk in the way
you suggested run across this message will a cold reboot solve the problem
(so long as the "infected" disk is not used again)? Will initalizing an
"infected" disk (after a cold boot) remove the infection? (along with anything
else on the disk).

One more thing, don`t you think that this message is important enough
to go at the head of the forum-so that you see it when you enter the forum?

Barry

#: 87327 S3/Hot News & Rumors
02-Oct-87 16:17:58
Sb: #87306-WARNING! Virus loose!
Fm: Larry Phillips/SYSOP 76703,4322
To: Barry Massoni 73260,1413 (X)

Barry,

The memory is not only not cleared upon rebooting, but there is a way to
allow a program to survive a warm boot (CTRL-Amiga-Amiga). The virus
itself is contained in the "boot block", and when you boot from an
infected disk, installs itself in this manner. When you reboot with an
uninfected disk, the virus writes itself out to the boot block of that
disk, infecting it as well.

A cold reboot (power off, power on) will indeed remove it from the
memory. The problem is, you must know in advance that the disk you are
currently booted from is infected before you would think to go through
this procedure.

As for looking at the disk to determine if the virus is there, the
program to use is "Sectorama", which is in DL 9 as SEC.ARC. Perhaps
someone will come up with a program that will detect and kill the virus,
giving you a warning at the same time.

I do think it's important, and we will probably put it into one of the
Data Libraries and mention it in the short bulletin which everyone will
see upon entry to the forum.

Regards, Larry.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
| Steve Clancy | WELLSPRING RBBS |
| Biomedical Library | 714-856-7996 24 HRS |
| P.O. Box 19556 | 300-9600 N,8,1 |
| University of California, Irvine | 714-856-5087 nites/wkends |
| Irvine, CA 92713 | 300-1200 N,8,1 |
| | |
| SLCLANCY@UCI | "Are we having fun yet?" |
| [email protected] | |
| | |
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
------------------------------

End of VIRUS-L Digest
*********************


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS