;; reported in The Hack Report for January, 1994
;; By Lee Jackson, Moderator, FidoNet International Echos SHAREWRE
;; and WARNINGS (1:124/4007)
;; Please note that there are some files listed in the report
;; that do not have filenames. These are not listed in this file,
;; for obvious reasons. Also, no file extensions are listed, since
;; they tend to change more often than the weather. 🙂
;; Also, all of the files listed in the 1992 issue are carried over
;; here. These files will continue to be listed in the rest of the
;; 1993 .col files.
;; However, beginning with the January, 1994 report, the .col file
;; format will NO LONGER be supported. Instead, the .idx format will
;; be used for both the current year's filenames and for back issue
;; filenames. Current year listings will be in a separate .idx file
;; from the back issue master .idx file.
;; All lines beginning with two semicolons (;;) are comments and should
;; be ignored, as should all blank lines. If anyone comes up with a
;; program that reads this file, I'd appreciate seeing it before you
;; distribute it to the general public, for reasons that are about to
;; be made clearer.
;; UNDER NO CIRCUMSTANCES SHOULD THE FILES LISTED HERE BE AUTOMATICALLY
;; DELETED FROM YOUR SYSTEM! ANY PROGRAM THAT CHECKS THIS LIST AGAINST
;; ANY FILE LISTING SHOULD INSTEAD FLAG ANY MATCHES FOR REVIEW. ABOVE
;; ALL, !!!READ THE HACK REPORT BEFORE DELETING ANY FILES!!!
;; THE AUTHOR OF THE HACK REPORT AND THIS LIST WILL NOT BE HELD
;; RESPONSIBLE FOR ANY DAMAGE AND/OR LOSS OF DATA RESULTING FROM THE
;; USE (OR MISUSE) OF THIS LIST.