The Phantom Access disks that were leaked, contained one full
Apple II disk side of software and an additional disk of documentation written about the programs. There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s. The programs come on a disk formatted with ZDOS (Zilog DOS), a common operating system used with a
Z80 co-processor add-on to the Apple II. Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account
Festering Hate, it is certainly possible. Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a
blue box, and exports the results into a series of files which can be manipulated using all the other programs in the series. A quote from the Phantom Access Documentation: :'''''Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider's and Rotation system are activated.''''' It uses
EXEC files as a form of primitive scripting for the Apple II. Reading through the messages of the era, the scripts are doing direct writes to various
registers and parts of
memory using the
POKE command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer. == Final Evolution ==