---

Hacking. Most of this is either totally obsolete or is totally childish and in any event unworkable. As a historic look into the past when hacking was a sport, these files could be useful. Hell, most of this nonsense didn't work anyway.


* 23THINGS.TXT Top 23(!) things learned at DEF CON 1 By The White Ninja 'Jesus Hacks! Why don't YOU?' This text file idea blatantly leeched from: SummerCon! 1.
* 386I.TXT THE COMPUTER INCIDENT ADVISORY CAPABILITY CIAC ADVISORY NOTICE
* 5600.TXT [F] Self Test . Exit Application: Application: RING Invalid Menu Entry Application: Application: CONNECT Station Message Detail Accounting (SMDA) [A] Automatic SMDA Reports [B] On-Lin
* ACCESBLT.HAC Computer Systems Laboratory Bulletin November 1991 ADVANCED AUTHENTICATION TECHNOLOGY Introduction Computer systems and the information they store and process are valuable resources w
* ACCESSIN.TXT TIC INC. Presents. Vol:1/Issue:1.0 Accessing GEnie Free A Brief Tutorial on How to Beat the High Cost of Genie =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ This is Tic Inc's
* ACRO01.TXT A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling out the
* ACRO02.TXT It's amazing that my first Acronym's text file went over so well! So, here's the second and much larger companion to it.Acro 2. Yeah, I know 2 days is a long, long wait for a file. G
* ACROLIST.PHK VERSION the library version number: 1.30 containing 250 acronyms CREDITS the people who have helped by sending acronyms. ANI Automatic Number Identification MCM Miami Cracking Machine
* ADSSYS.TXT A Guide To: A.D.S. Systems.
* AIO.BOX All In One Box BY: Disk Doctor Basicly, this should be common sense All You have to do is by a small box (Preferable a rated box that will keep it from interfering with that nice Raid
* AIS.TXT AIS - Automatic Intercept System The DAIS II System by Computer Consoles Incorporated INTRODUCTION. ~ Computer Consoles Incorporated (CCI) manufactures various hardware appliances to
* AIX.FUN the CERT Advisories. You'd better get rid of the glaring AIX rlogin hole, if you haven't done so already (CERT CA-94:09). Check also CA-91:19, CA-92:05, CA-92:06, CA-92:07, CA-92:
* ALLNET01.TXT == Hacking Allnet = = 01/xx/88
* AMHACK.TXT Hacking Answering Machines 1990 by: Predat0r of Blitzkrieg Bbs 502/499-8933 ATT reports that in the year 1990, 11 million p
* ANSIBOMB.TXT ANSI Bombs II: Tips and Techniques By The Raging Golem I. Introduction After writing the last file, a lot of people let me know about the mistakes I had made. I guess this file is to
* AOHELL.PHK Why I Wrote AOHell The reason I wanted to make this program is because I hate just about everyone on AOL. Yes, that probably means YOU. I'm sick of all the faggots, and I'm sick of al
* AOLHAK.TXT How To Hack America On Line By: The Hooded Bobs The hooded bobs are currently. ThE cRowE, IckleMe and Ersatz First of all, this file will be of the most help to the beggining hacker o
* ARPA.MAN NIC 50003 ARPANET INFORMATION BROCHURE DECEMBER 1985 ARPANET INFORMATION BROCHURE DECEMBER 1985 Editor: Stephen C. Dennett Elizabeth J. Feinler Francine Perillo Additional copies of t
* ARPA1.HAC Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
* ARPA2.HAC Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
* ARPA3.HAC Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
* ARPA4.HAC _ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
* ARPA5.HAC Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
* ARPA6.HAC Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
* ARPANET.HAC [CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
* ARPANET.TXT [CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
* ARPANET1.CON / ARPANET / FIRST OF ALL PART 4 WILL DEAL WITH: 1(AND ONLY ONE):OPERATING SYSTEMS AND THEIR TAC ADDRESSES ACTUALLY BEFORE I BEGIN YOU MUST NEED TO KNOW: TO ATTACH TO S
* ARPANET1.TXT Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
* ARPANET2.TXT Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
* ARPANET3.TXT Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
* ARPANET4.TXT _ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
* ARPANET5.TXT Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
* ARPANET6.TXT Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
* AS400CMD.HAC IBM AS/400 Command Summary Command Description - - ADDACC Add Access Code ADDAJE Add Autostart Job Entry ADDAUTLE Add Authorization List Entry ADDBKP
* AS400CMD.TXT @BEGIN_FILE_ID.DIZAll IBM AS/400 Commands Shell and scripting commands included . @END_FILE_ID.DIZTHe MiGHT HaS ReBoRN /\ Demon
* ASPEN.TXT [R.A.W Productions] [01.13.92] [A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems] [Written by: Caveman] [Introduction] ASpEN, or 'Automated Speech Exchange Network,' is
* ASPEN2.TXT [R.a.W][Caveman] [03.27.92] [A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems: Part II] [Written by: Caveman] [I
* ATLAS.TXT % % Hacker's Atlas % % % Ragon/Wyv/Bof % Ltd % Presentation! %
* ATM.TXT A. T. M. Fraud Made Easy | | | | summary and research by | | Count Zero | |
* ATM-92.TXT ===- THE HIGH TECH HOOD SQUAD PRESENTS. AAAAAAA TTTTTTTTT MMM MMM ' A A TT MMM
* ATM-MORE.TXT To: unix-wizards@sem.brl.mil Subj: [1070] Re: Here's a BRILLIANT password idea! But, in the UK at least, if you abort the 'login' attempt after the 2nd attempt (there is a button to d
* ATM1.TXT - The Disk Jockey - - presents: - - - - Scam
* ATMA.HAC (View: automatic teller machines From ames!amdahl!nsc!voder!wlbr!gins Mon Jul 13 12:41:23 PDT Article 479 of sci.crypt: From: gins@wlbr.UUCP (Fred Ginsburg) Subject: Re: ATM secret co
* ATMAPPS.TXT 'GEE WHIZ' ATM APPLICAITONS ON THE HORIZON Nathan Felde, executive director of multimedia communications at the NYNEX Science Technology laboratory in Cambridge, Mass., waxes evangeli
* ATMHAC~1.TXT + HACKING ATM'S + Welcome everybody to my first article dealing with the manipulation of the Bank's Automated Teller Machines for the gain of money In this article I will show you ma
* ATMS.TXT Track Layouts This is off the top of my head, but is 99% there. Also I'll ignore some obsolete stuff. The physical layout of the cards are standard. The LOGICA
* AUSTHACK.HAC Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo Australian Dialups = ISSUE: 1 =
* AUSTPAC0.TXT === Compiled by Soft Beard 1990 === Accessing Telecom Australia`s AUSTPAC service. AUSTPAC is a great way to connect to major companies. This is how it works: You call AUSTPAC for 20c
* AUSTPAC1.TXT The following information is from the AUSTPAC character terminal manual. Austpac is available all the time except (currently) 11pm Thu - 7am Fri. This is their maintainance window. (M
* AUSTPAC2.TXT TYPE AUSTPAC.DOC TYPE Ver 5.3 - Multiple file lister CTL-S pauses, CTL-X skips to next file, CTL-C aborts === LISTING FILE: AUSTPAC .DOC AUSTPAC 1 . Austpac General Information 2 . Au
* AUSTPAC3.TXT The September 1989 - Apple Odessa - September 1989 Presents AUSTPAC Price List. A file bought to you by Negative Energy. Introduction The AUSTPAC data service which uses packet swi
* AUTOHACK.TXT Documentation for [ A U T O - H A C K ] version 1.0 Written by: Grimalkin, 08/12/86 NOTICE: This program was written to further the education of the IBM PC computer users out there, a
* AUTONET1.TXT [ Hacker Supreme's - Hackers Directory Volume # 34 ] [ Compiled by: Ninja Squirrel and Logan - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] [ AUTONET SERIES (Section 1) ] HOW TO CONNEC
* AUTOTE~1.ANA Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a pri
* AUTOVON1.HAC Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part I AUTOVON is the Military Voice Communications System. Each Mi
* AUTOVON2.HAC Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part II 'Silver Boxes' Warning: This modification could permanently
* AUTOVON3.HAC Uploaded By: Dark Creaper Brought to to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part III 'Operating Procedures' Now, you're at the part that you
* AUTOVONI.NST From DLEIBOLD@vm1.yorku.ca Fri Jun 19 20:35:22 1992 Received: from vm1.yorku.ca by gaak.LCS.MIT.EDU via TCP with SMTP id AA08522; Fri, 19 Jun 92 20:35:15 EDT Received: from VM1.YorkU.
* AVOIDCAP.TXT 'Planning Ahead' Every self respecting hacker or phone phreak should plan ahead. In this phile I hope to show you how and what to take when you have to make a break for it. I. Know Th
* BACKDO~1.TXT Backdoors By Christopher Klaus 8/4/97 Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into th
* BANKHACK.TXT The Legion of Doom! EFT Division Presents HOW WE GOT RICH THROUGH ELECTRONIC FUND TRANSFERS (OR: GEE! NO, GTE!) A certain number of financial institutions that reside within the packe
* BASIC.NET 11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outd
* BASIC1.HAC Basics of Hacking I: Decs's Welcome to basics of hacking i: dec's in this article you will learn how to log
* BASIC3.HAC The basics of hacking iii: data
* BASICNET.HAC 11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outdi
* BBSFILES.TXT Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILAB
* BCTJ1_04.TXT Ethernet Fields
* BEGING~1.TXT User's guide Well, howdi folks. I guess you are all wondering who's this guy (me) that's trying to show you a bit of everything. ? Well, I ain't telling you any
* BOAHACK.TXT Hacking Bank Of America's Home Ban
* BOCES.TXT SYSTEM 1 OR SYSTEM 2? ?SYS2 HEL-S560, BOCES INSTRUCTIONAL NETWORK - SYSTEM 2 READY ON PORT# 20 LIB NAME LENGTH NAME LENGTH NAME LENGTH NAME LENGTH -ASCII 846 ADDRES 1056 AL
* BOOKS.TXT BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS (1973 through 1988) Note: A bibliography is now being developed to encompass 1989. ABUSE/MISUSE/CRIME AUTHOR: Fennelly, Lawrence J. TITLE: H
* BTINFO.H-K No description yet
* BUFFEROW.TXT How to write Buffer Overflows This is really rough, and some of it is not needed. I wrote this as a reminder note to myself as I really didn't want to look at any more ATT assembly ag
* BUMP.TXT [Image] Things that Go Bump in the Net This is a brief look at some of the more colorful characters in the menagerie of network security threats, with an emphasis on how they relate t
* C64FUN1.TXT Number :/15 Subject :/C64 Fun!!!! From :/THE NIGHTSTALKER Date :/10/08/86 00:08:53 ET I suppose that one of the more interesting things one can do with a computer in a store like Sear
* CALLCARD.PHK Pyromania Publishing Article #0006 Title| Hacking Calling Cards By | THE PYROMANIAC Date | September 23, 1987 Call | the Pyromania BBS! 3o1-xxx-xxxx Note | Sorry about 40 columns but
* CANDYL~1.FAQ ## ## ## The CandyLand FAQ ## ## ## ## http:www.mcs.net/~candyman/ ## ## ## ## Answers to the most
* CARCODES.TXT CODES USED BY COMPUTERS IN GM CARS New cars use computers to store and remember malfunctions that occur. These are displayed in the flashing sequences in the instrument cluster. A typ
* CB1.TXT CITIBANK HACKING by Johnny Hindu Hello Hackers, this month I am going to show you excerpts from my hacking log. This excerpt is about my excursion with Citibank and how I got into it.
* CB2.TXT I figured out that the numbers at the end are the social security number. (not that long though). Nice now that I am in Johns account, what should I do.I tried a few bum keys. Here ar
* CBRSP-1.HAC We, the People proudly Present
* CBVHACK.PNK CBV Hackin By PiNK ToRPeDo Original File Date: June 7, 1994 You might be saying to yourself. now PiNK - How do I get through those CHeeZY CBV's that everyone uses. There are at least
* CHAOS01.TXT Pyro's Anonymous 'Chaos Chronicles' Issue #1 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
* CHAOS02.TXT Pyro's Anonymous 'Chaos Chronicles' Issue #2 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
* CHAOS03.TXT Pyro's Anonymous 'Chaos Chronicles' Issue #3 Author: Inphiniti Co-Author: Decibel Title: Credit Card Fraud Tutorial All Rights
* CHINA0~1.HAC CHiNA Newsletter #2 +-+ | | | A. T. M. Fraud Made Easy | | | | summary and research by | | Count
* CHURCH4.PTL The PTL Club Proudly Presents Church Chat Volume 4 Written by: The Spiker Gee, this might look unprofessional but oh well. A newsletter is just to inform people about special thin
* CITIBANK.TXT by Johnny Hindu Hello Hackers, this month I am going to show you excerpt from my hacking log. This excerpt is about my excursion with Citibank and how I got into it. Alright lets get
* COMPUS.TXT FREE COMPUSERVE PASSWORDS BY DEVIOUS XEVIOUS There are several ways you can go about getting cis passwords. The ones with unlimited access are quite a bit harder but, first of all, th
* COMPUSER.TXT 189 9 THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216, UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TO OSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! The index whi
* COM_SE~1.HAC United States General Accounting Office _ GAO Report to the Chairman, Committee on Science, Space, and Technology
* COM_SE~2.HAC United States General Accounting Office _ GAO Testimony Before the Subcommittee on Government Information an
* CONCIS.TXT FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
* CONTACT.TXT ===== HOW TO CONTACT THE HACK SQUAD ===== If you have a report or comment, I can be reached through any of the following systems and/or networks: FidoNet: Backbone Echos SHAREWRE, PDR
* COPIER.HAC Magnetic Stripes Translated from Hack-Tik, #8, #9/10, available at PO Bos 22953,1100 DL Amsterdam, The Netherlands Translation by Dr. Abuse Text/Schematics _copied_ from 2600 Magazine
* COSMOS.HAC C O S M O S C O P Y R I G H T 1 9 8 4 D O
* COSMOS1.TXT uploaded by: the wizard of oz es saying it's changed. but they probably throw away those papers and you will be able to find alot of interesting inpho by trashing. also, most or all c
* COSMOS2.HAC The SYSOP of OSUNY wishes to thank Pirate-80 (304)-744-2253 for the contribution of this file $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ LEX LUTHOR $ $
* COSMOS3.HAC The 1986 COSMOS FILES ART III: Service Orde
* CRACKAM1.TXT Hacking Programs on the Amiga By FunToHack of K1W1 Christchurch New Zealand (all spelling mistakes are free) Version 1
* CRACKDWN.TXT From 2600 magazine volume 7, number 1 SPRING To Subscribe: 2600, PO BOX 752, Middle Island, NY 11953-0752 $18 individual, $45 corporate yearly subscription rates FOR YOUR PROTECTION A
* CRACKER.TXT Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. By the consultants of the Network Security Solutions Ltd. Front-line Inf
* CREDITFR.TXT \=/ | Volume I of The Adventures in Fraud Series | | The Bible of Fraud | | By: | |
* CREDUNIN.CON CREDIT UNIONS AND PROTECTION - - AGENCIES
* CS.HAC How to get a free account on CompuServe CompuServe: Bastards who charge a
* CS.TXT How to get a free account on CompuServe CompuServe: Bastards who charge a
* CSL8_93.HAC CSL BULLETIN August 1993 SECURITY PROGRAM MANAGEMENT This bulletin discusses the establishment and operation of a security program as a management function and describes some of the f
* CUSASS.HAC by THE MASTER The Master on out-of-state boards. A CN/A is a section of ATT ket up to supply it's offices' with Names and addresses of people who own a certain number. CN/A stands for
* CYBER.TXT The CyberPunk Movement Written by Pazuzu for DnA May 12, 1993 ͼ There's been a lot of talk lately about the CyberPunk M
* DARTKIEW.HAC Dartmouth Kiewit System by the lone ranger Released:01-05-86 This might be some sort of on-going set of files but I doubt it. The only way I can see that it would be is that someone e
* DATA.TAP FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Elric of Imrryr Lunatic Labs UnLtd FOR SEVER
* DATABASE.TXT CIRR DATABASE A tool for corporate research For more info, contact: Kerry Dressler through EnviroNet mail CIRR actually stands for the Company and Industrial Research Reports Datebase
* DATAKIT.HAC - isn: How to connect across VCS/ISN boundaries. - Holmdel, Crawford Hill, and Short Hills locations have mostly ISN nodes. Other locations have primarily VCS (Datakit) nodes. In ge
* DATAPAC.HAC A Guide to Dat
* DATAPAC.TXT A Guide to DataPAC A Technical Information File for the Canad
* DATAPAC1.TXT A Guide to Dat
* DATAPAC2.TXT DATAPAC 3101 ITI PARAMETERS DESCRIPTION THE FOLLOWING WILL PROVIDE IN MORE DETAIL A DESCRIPTION OF ITI (84) PARAMETERS FOR DATAPAC 3101. DESCRIPTION - INTERNATIONAL PAD PARAMETERS 1)A
* DATAPAC3.TXT If you've scammed a Datapac based account, here's a list of places within Canada that you can reach.gratuis! Datapac 3101 Public Outdial Ports Last updated April 3, 1989. The Datapac
* DATATAPP.TXT Dec 27 21:24 1985 data.tap Page 1 FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Lunatic La
* DC3-2.TXT DEF CON III Convention Update #1.80 (06.20.95) August 4-6th 1995 @ the Tropicana in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXX
* DDN01.HAC DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
* DDN01.TXT DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
* DDN03.HAC DDN Security Bulletin 03 DCA DDN Defense Communications System 18 Oct 89 Published by: DDN Security Coordinat
* DDN04.HAC DDN Security Bulletin 04 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordinat
* DDN05.HAC DDN Security Bulletin 05 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordina
* DDN06.HAC DDN Security Bulletin 06 DCA DDN Defense Communications System 1 Nov 89 Published by: DDN Security Coordinat
* DDNET1.TXT Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network The Department of Defense started the major networking scene in the US in the late '70s and early
* DDNET2.TXT Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network \|/ By Star - - Fire [a member of Mysterion Grp] /|\ Diagram of DDN: _
* DEBTCARD.TXT ISDN HARVARD MEDICAL SCHOOL INSTALLS ISDN-BASED DEBIT CARD SYSTEM Students pay up front, then monitor accounts during the school year Harvard University Medical School in Boston is li
* DEC10.TXT (info Uploaded to The Cartel AE line.) - Hacking the Dec-10 system Part I: Logging In, and simple cmds. Note:Sysop's may download this file but please keep the appropriate credits. We
* DEC_200.TXT r64 Msg#: 1 of 7 Subject: Decserver 200 revealed! Posted By: Surf Studd [Classified] Sent To: All Posted On: 10/23/90 at 09:05:54 PM
* DEFAULTS.TXT Updated - 4/1/92 to include XENIX systems The Hollow's Alliance 415-236-2371 MONDO h/ph/c g-files and discussion Here's our seventh, and like I promised a few issues back, a large lis
* DEFCON~1.HAC D E F C O N I C O N V E N T I O N D E F C O N I C O N V E N T I O N DEF CON I CONVENTION D E F C O N I C O N V E N T I O N READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DIS
* DEFDB.HAC Department of Defense Federal Data Bases Ada Information Bulletin Board Ada Information Clearinghouse The Pentagon Data: (202) 694-0215 US Department of Defe
* DEFENSE.HAC HARRY HACKALOT PRESENTS %% %% 'Defense Data Network B
* DENIAL.TXT =INTRODUCTION TO DENIAL OF SERVICE= Hans Husman t95hhu@student.tdb.uu.se Last updated: Mon Oct 28 14:56:31 MET 1996 .0. FOREWORD .A. INTRODUCTION .A.1. WHAT IS A DENIAL OF SERVICE ATT
* DENNING.TXT To be presented at the 13th National Computer Security Conference, Washington, D.C., Oct. 1-4, 1990. Concerning Hackers Who Break into Computer Systems Dorothy E. Denning Digital Equi
* DES.TXT DATA ENCRYPTION STANDARD FACT SHEET Introduction The National Institute of Standards and Technology (NIST) of the Department of Commerce has recently received many inquiries regarding
* DESBLT.TXT This NCSL Bulletin initiates a new publication series at the National Computer Systems Laboratory (NCSL). Each bulletin will present an in-depth discussion of a single topic of signif
* DESVAL.HAC DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
* DESVAL.TXT DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
* DIALBACK.TXT Date: Thu, 28-Feb-85 Subject: Dial Back isn't always secure An increasingly popular technique for protecting dial-in ports from the ravages of hackers and other more sinister system p
* DIALOG.TXT DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information availabl
* DIALOG01.TXT DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information availabl
* DIALOUT1.TXT Novice Mannual On Using Out Dial Modems by blue adept - - - - - - - - - - - - - - - - Contents: - What is an OutDial? - Where to find OutDials - How to use an OutDial - PCP NU
* DIALOU~1.HAC From t891368@otto.bf.rmit.OZ.AU Fri May 17 15:07:43 1991 Received: from munnari.OZ.AU by milton.u.washington.edu (5.61/UW-NDC Revision: 2.1 ) id AA05809; Fri, 17 May 91 15:07:20 -0700
* DIALUP.HAC Arlington VA 703 841-9834C 703 841-9834CAthens OH 614 594-8364C 614 594-8364CAtlanta GA 404 237-8113C Atlant GA
* DNICINF.HAC Qmodem Scroll Back Dump File INFO RELATIONS-P Date: 1990.08.02/W/T D A T E X - P - International Traffic Relations Explanatory notes: DNIC Data network identification
* DOWJONES.TXT ==)- P TO PAUSE S TO STOP -(== Inside DJNS major commands prompts: 'enter query' main prompt 'database help' displays info about the database you specify 'database' moves directly t
* DPACINTR.ROT Reign of Terror [ R o T ] Presents - INTRODUCTION TO DATAPAC - (and PSN's in general) Written by: Deicide A B
* DPACNUAS.TXT Reign of Terror =- |= - =| . Proudly Presents . |=
* DTSB.HAC _ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
* EASYL.HAC PROFESSOR FALKEN [][] K][] IN ASSOCIATION WITH [][] []
* EASYLINK.HCK HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cab
* EASYLINK.TXT PROFESSOR FALKEN [] [] K] [] IN ASSOCIATION WITH [] []
* EDIT.TXT E.D.I.T - Electronic Deception, Interception Terrorism : The Radio Shack Reality! presented by Ian A. Murphy, President CEO IAM / Secure Data Systems Inc. 1225 North Second Street Phi
* ENA!.HAC Numb. 5 Title What is the ENA? From RICK Left 28-DEC-85 11:33 PM THE ENA VISION: What IS ENA? Edited by Stefanie Kott ENA is an organization that grew out of the First Inte
* ENCYCLOP.TXT Message 1150 DATE/TIME: 03/20/89 20:18 From : GAZ HOWLAND To : ALL Subject: I need a mars bar, to help me, help me, Folder : E, 'Encyclopedia Hacktanica' Did you se
* EPROMS.HAC Kingpin [RDT Syn.] presents: === A CLOSER LOOK AT EPROMS ====- A brief introduction to EPROMS, what they are used for, and how they work (Stolen from an undisclosed source) Whassup to
* ESLF0006.TXT 16 START DOKS | | | An ESLF Republication of | Original Publication: || Whole Earth Magazine Issue: =-
* ESS.TXT r72 TO PAUSE S TO STOP Electronic Switching System $ $ From 2600 mag. Feb '84 $ $+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$ (Courtesy of Black Knigh
* ETHICS.HAC File: NEWSWEEK - TEACHING HACKERS ETHICS Read 6 times = Teaching Hackers Ethics = Newsweek/January 14, 1985 by Dennis A. Williams = = with Richard Sandza = [Word Processed by BIOC Age
* ETHICS.TXT ']%%+f! ! )19AIQYai TES Presents - The Ethics of Hacking - written by Dissident I went up to a college this summer to look around, see if it was where I wanted
* EVASIV.TXT Distributed by: Assailant's Blade and Ford Prefect The Inspectors Thoughts How many times have you had the need to be able to sneak up on somebody, enter a building unnoticed, or simp
* EXEGUIDE.TXT Executive Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible for
* FAST.TXT = = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = = = =
* FBIAFTHA.HAC The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the 'hack
* FBICOMPU.HAC Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright (c) 1986 Capitol Information Association. All rights reserved. Permission is
* FBISYS.TXT From the Illumi-Net BBS Decatur, GA Conspiracy Theory Conference 404-377-1141 Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright
* FCSCVOL1.HAC FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME I Protection Profile Development Version 1.0 December 1992 This document is undergoing review and is subject to modificatio
* FCSCVOL2.HAC FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME II Registry of Protection Profiles Version 1.0 December 1992 This document is undergoing review and is subject to modificat
* FDDI.HAC Learning to Appreciate Tokens: How do FDDI internals work? FDDI Networks feature a counter-rotating, dual fiber optic ring. The primary ring circulates in one direction; the secondary
* FDP1.TXT . The Griffin . Presents:
* FDP2.TXT Uploaded By: THE GRIFFIN . The Griffin . Presents:
* FH.TXT Fuckin' Hacker 2.0 ~ A 2AF Presentation Written by: Hypnocosm Released: June 10, 1987 'It's just a fuckin' hacker!' AN OVERVIEW Fuckin' Hacker is a code-hacking piece of software. Anyone who
* FINDHOLE.TXT Subject: Security holes manifest themselves in (broadly) four ways. Date: 11.10.93 ( Please contribute by sending E-Mail to scott@santafe.edu . ) [quoting from the comp.security.unix
* FIREWALL.TXT @BEGIN_FILE_ID.DIZA text abou]t Internet firewalls. @END_FILE_ID.DIZ ++ |
* FREEBIE3.HAC INFOLIST - 90 CHURCH STREET - BOX 2517 - NY, NY 10008 Version 3.1 Version 3.1 CompuFreebies
* FREECIS.TXT FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
* FTP-PA~1.TXT Some problems with the File Transfer Protocol, a failure of common implementations, and suggestions for repair. By David Sacerdote (davids@secnet.com April, 1996) FTP servers can oper
* FTPBOUNC.TXT Subject: The FTP Bounce Attack Date: 12 Jul 1995 03:50:50 EDT This discusses one of many possible uses of the 'FTP server bounce attack'. The mechanism used is probably well-known, bu
* FUNWITH5.HAC Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a pri
* GARAGHAK.TXT Article 329 of alt.cyberpunk.tech: Xref: grayhawk alt.cyberpunk:2269 alt.cyberpunk.tech:329 Subject: Finally, Garage Door Opener Hacker Plans!!! (Long) Date: 3 Apr 92 06:08:07 GMT Sen
* GETINFO.TXT -The Hackers' Guide To Investigations - - Presented by HALE, Originators - - of -
* GISDOC.HAC Hacking the GIS computer Compliments of the Realm of the UNHOLY (xxx) xxx-xxxx This is about the GIS computer. This computer is actually a time sharing system designed to give High Sc
* GOODBYE.ANA The Best of The Station By: The Prowler - Mace Substitute - 3 PARTS: Alchohol 1/2 PARTS: Iodine 1/2 PARTS: Salt Or: 3 PARTS: Alchohol 1 PARTS: Iodized Salt (Mortons) It's not actual
* GOODKIDS.HAC Computer Hackers are Good People Too! I am writing this artical in hopes of dispelling the general idea that all Hackers are terrible teenagers that dwell on Electronic Mischief! Most
* GOVTHLP.TXT 00:02:47 TO SEE: ENTER: INFORMATION SERVICES LEGIS, FLOOR, GRANTS-CONTRACTS, GPRO, ECON, or BUDGET ADMINISTRATIVE SERVICES SCHEDULE, MAIL, TELEDEX, KASEWORK, USED
* GS1.TXT THE GS/1 USER'S
* GTE.HAC No description yet
* GTE.TXT No description yet
* GUIDE.DOC The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess
* GUIDE.TXT The LOD/H Presents
* GUIDEDOC.HAC The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess
* GUIDEHAK.TXT THE NEOPHYTE'S GUIDE TO HACKING
* HACETHIC.TXT TES Presents | The Ethics of Hacking | written by Dissident I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about
* HACK.FAQ #hack FAQ #HACK FAQ EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ! THE FAQ SUFFERED FROM A FLOPPY DISK CRASH. I BELIEVE I HAVE CORRECTED ALL ERRORS RESULTING FROM THE C
* HACK.HAC H.ACKING A.ND C.OMPUTER K.RASHING VOLUME NO. 9 BY GREY WOLF
* HACK.LEG NOVEMBER 7, 1990 C:\TEXT\NETWORK1.TXT A PROPOSAL TO JOIN THE CORPORATE WORLD AND THE COMPUTER UNDERGROUND WITH A PEACEFUL, LEGAL SOLUTION by FATAL ERROR I have conceived a
* HACK1.HAC THE BASICS OF HACKING: INTRO THE FIRST OF A SET OF ARTICLES: AN INTRODUCTION TO THE WORLD OF THE HACKER. BASIC
* HACK2.HAC BASICS OF HACKING I: DECS'S WELCOME TO BASICS OF HACKING I: DEC'S. IN THIS ARTICLE YOU WILL LEARN HOW TO L OG IN
* HACK4.HAC THE BASICS OF HACKING III: DATA WELC
* HACK5.HAC ==)P to Pause, S to Stop (== = = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = =
* HACK6.HAC Hacking Voice Mail Systems Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it work
* HACK7.TXT was writen shortly after my arrest. I am currently groupless, having resigned from the Racketeers, so ignore the signoff. The Conscience of a Hacker. by The Mentor . 1/8/86 Another on
* HACK9.HAC Hacking Control Data Corporation's Cyber This article will cover getting into and using NOS (Networking Operating System) version 2.5.2 running on a Cyber 730 computer. Cybers general
* HACK9301.RPT || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 1 for January, 1993 || Report Date:
* HACK9302.RPT || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 2 for February,1993 || Report Date:
* HACK9303.RPT || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 3 for March, 1993 || Report Date: M
* HACK9304.RPT || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 4 for April, 1993 || Report Date: A
* HACK9305.RPT || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 5 for May, 1993 || Report Date:
* HACK9306.RPT || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 6 for June 1993 || Report Date:
* HACK9307.RPT || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 7 for July 1993 || Report Date:
* HACK9309.RPT || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 9 for September, 1993 || Report Da
* HACK9401.RPT || From the files of The Hack Squad: || Compiled by W.H. (Bill) Lambdin || Volume 3, Issue 1 The Hack Report || Report Date: January 29. 1994 for Jan/Feb, 1994 || || Welcome to the fi
* HACKACR.HAC The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by:MERCENARY Version Five [Sep/02/1992] In n
* HACKAD.TXT (A brief bit of humor from the September, 1990, issue of ANALOG SCIENCE FICTION/SCIENCE FACT MAGAZINE) Are You Bored? In a Rut? Looking for a New Career? If so, we have the answer to
* HACKCOS.TXT LEX LUTHOR $ $ AND $ $ THE LEGION OF DOOM! $ $
* HACKCRAK.TXT THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-RELEASED SPRING EDITION OF 2600 MAGAZINE, THE HACKER QUARTERLY. ARTICLE ONE: AN OVERVIEW A year ago, we told t
* HACKDICT.TXT = A = abbrev: -breev'/, -brev'/ n. Common abbreviation for `abbreviation'. ABEND: [ABnormal END] /ah'bend/, -bend'/ n. Abnormal termination (of software); {crash}; {lossage}. Derives
* HACKER.TST Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. It has gone through many revisions prior to t
* HACKER01.TXT NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MA
* HACKER03.TXT The Hacker's Guide to the Galaxy: A collection phone numbers Compiled by Atari Pirates, Inc. Voice lines 213-372-6244/Dial-A-Joke 818-765-2000/Dial-A-Joke 213-765-2000/Jokes 818-882-9
* HACKER1.TXT Diary of a Hacker Part 1 What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. Th
* HACKER11.TXT HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cab
* HACKERS.PAR From rop@neabbs.UUCP Sun Apr 2 09:28:48 1989 To: RISKS@KL.SRI.COM Date: Thu Mar 30 02:00:20 1989 Subject: Galactic Hacker Party GALACTIC HACKER PARTY 2nd, 3rd, 4th of August 1989 PARA
* HACKFAQ.HAC Summary: This posting contains a list of Frequently Asked Questions (and their answers) about hacking. It should be read by anyone who wishes to post to the alt.2600 newsgroup or use
* HACKGUID.TXT - Little Hackers Guide - by Szpaq - version minus 1.00 - Add to this file whatever you know interesting about hacking and post it Contents 1. Disassembling Windows .HLP files 2
* HACKHOLL.TXT TITEL : HACKING IN HOLLAND AUTEUR : ROP GONGGRIJP DATUM : 18/10/88 UPLOAD DOOR: ROP GONGGRIJP UPLOADDATUM: 18/10/88 TREFWOORDEN: HACKING, ENGELS, PHREAK BEWERKT : 18/10/88 ROP IN 'T K
* HACKHP2.HAC bioc agent 003's tutorial in ===============
* HACKING.DOX Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILAB
* HACKING.TAP Ok I'm back up at 3 o'clock in the morning to bring you another article Many of us out there think of ourselves as hackers but what is a REAL hackerWell for those of you out there tha
* HACKING.TXT Ctrl-S to Stop/Start Ctrl-C to Cancel Alliance Presents: 'TRW Information' File #5 By: Type A' Maniac Thanx: The Hacker Bonker
* HACKINGA.TXT Hacking Bank Of America's
* HACKINGC.TXT WELL LETS SEE HERE, MOST THINGS I HAVE SEEN HAVE 6-10 DIGITS RIGHT? YET CREDIT CARDS HAVE AROUND 20 DIGITS, WHY? WELL ITS NOT NECESSARY OF COURSE FOR A CREDIT CARD TO HAVE THAT MANY,
* HACKINGE.TXT HACKING ECONET SYSTEMS / SJ. FILESERVERS LEVEL 3 AND ABOVE 1987 - AGC Written by: Jack Death Concept: Zapper Greets to: WDG, Leck, Pay, HJR, JAS, Mr 'WooD', ZZKJ, SPODS Things to try
* HACKINGI.TXT About :COMPUTERWORLD AD. From :MARK HAMILL To :ALL Date :10/15/84 (NOTE, THIS IS A REAL AD. TRY IT!) FROM A COMPUTERWORLD AD: DEAR HACKERS: .WE AT MICROFRAME HAVE DEVELOPED A DEVICE T
* HACKINGT.TXT HACKING THE LEXINGTON :- -: AIR FORCE COMPUTER I don't know much about it
* HACKIN~1.HAC HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life Since I have always felt that Baton Rouge was at a loss for GOOD hackers, I have taken it upon myself to educate th
* HACKIRC.TXT Hacking IRC - The Definitive Guide Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide
* HACKNET.DOX The Novell Network Hacking Guide By PeRSeUs/LoRd psYChobeTa of EmC Hey what'z up ?!? When my computer science teacher put up his new toy in our class, novell network 3.x, i knew that
* HACKNET.TXT Subj:How to Hack your school's network To:All interested hackers Keywords:Hacking, Novell, Network, Dumb Sysop Bitch Well, here it is. Information on how to hack your schools network.
* HACKPCP.HAC The Weenie Warriors Weenie Warrior # 1 - The Pa
* HACKPROD.TXT G rotherhood of Gds and etards 'How to Hack Prodigy' By Desolated Dream GBL/DENULLTLHSTLPSIIKRONiCKHcH Prodigy is one of the easiest things in the world to hack. all
* HACKPROF.TXT HACKER PROOF DOORS! It is possible. There is a basic flaw in doors that RBBS doesn't cover. The RBBS program doesn't keep users from uploading '.BAT' files. Consider this: RBBS has th
* HACKQUIZ.TXT TITLE: THE HACKER TEST - Version 1.0 (LONG) Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. I
* HACKSONG.TXT The Hacker's Song By Dave Touretzky and Don Libes (with no apologies whatever to Monty Python) I'm a hacker and I'm OK I work all night and I sleep all day. I wrote some hacks in APL,
* HACKSYND.HAC ++ ! ! ! The Hacker Syndrome ! ! =================== ! ! By Tad Deriso ! !
* HACKTALK.TXT This article is being presented through the StarBoard Journal of the FlagShip/StarShip SIGs (Special Interest Groups) on De
* HACKTERM.TXT [ HEaT ] [ HackroNyms V.2.10 ] [Page 1] [ By Rad Man ] A.A.A. - Aces of ANSi Art AMEX - AMerican EXpress ANI - Automatic Number Identification [security type ph. c
* HACKTIPS.HAC Space aborts, ^S pauses ======= ======= ======= HACKING TIPS #2 ======= ======= ======= ======= by Hoe Hopper ======= ======= REBEL ALLIA
* HACKTIPS.TXT From Lan Times, 08 Feb 1993 TIPS FOR TRACKING HACKERS Hackers will make mistakes or leave traces in four areas: 1. Inbound- While attempting to break into a network through a private
* HACKTUT.TXT Hacking Tutorial Courtesy of the Jolly Roger What is hacking? According to popular belief the term hacker and hacking was founded at mit it comes from the root of a hack writer,some
* HACKUNLM.HU1 The Mickey Mouse Club Presents. _ _ _
* HACKUSA!.HAC Filename: Hacking USA Hackin' USA I was in the 'fast lane' of computer hacking for about 3 or 4 years (more than enough) and am now semi-retired. It is now time to pass the torch to t
* HACKWARN.HAC ]=]=] A warning to hackers [=[=[ Recently, here in Cherry Hill, NJ, a BBS system by the name 'Hackers Heaven' was closed down by police. The sysop(s) and users of this system were tra
* HACKWWIV.HAC ( Hacking into WWIV, Second Edition by Vision (updated by Weasel) WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. However, goo
* HACKWWIV.TXT Hacking into WWIV, Second Edition by Vision WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. How
* HACK_CIS.TXT The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGyver 6-22-91 OUR
* HACK_EM.HAC _ _ THE BASICS OF HACKING: INTRO _
* HACK_S.TXT r112 (View: hackalot.dir 20 UPLOADED BY: U/L BY:LORD CALADON [CTRL-S PAUSES/SPACE=QUIT] %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % HARRY HACKALO
* HACK_THS.TXT NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MA
* HAIBM370.TXT How to take control of your local IBM VM/370 system Writt
* HAKDIC.TXT The Hacker's Dictionary A Guide to the World of Computer Wizards Guy L. Steele Jr. Donald R. Woods Raphael A. Finkel Mark R. Crisp Richard M. Stallman Geoffrey S. Goodfellow The Menu
* HAKMEDIA.TXT Hackers in the Media, List start: 10/28/92 - Doomsday. Sneakers, Fall '92 'mysterious crypto black box that deciphers anything' WarGames, Spring 1984(5?) Computer Whiz breaks into Nor
* HANDBOOK.TXT \ Hacking CompuServe: / \ All you need to know / \ By: / \
* HASHISH.TXT HASHISH The Exotic Elixir By: Ezrider Welcome, Allow me to usher you into the den of tranquility. We shall utilize Hashish as our guide to exotic places. as the aroma fills your head,
* HCKR_HND.TXT Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because
* HD.HAC Summary of Hacker Supreme's Hacki
* HD01.HAC [ HACKERS DIRECTORY VOLUME #1 ] [ COMPLIED FOR YOU BY: HACKER SUPREME MEMBERS, ] [ NINJA SQUIRREL /+\, and LOGAN - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] Chapter
* HD02.HAC [ Hackers Directory volume 2 ] [ Complied for you by: ] [ Hacker Supreme, The Cartel ] [ and The 'NIN TEMPLE'. ] [ Ninja Squirrel /+\ . ] [ Logan - 5 . ] [
* HD03.HAC [ HACKERS DIRECTORY VOLUME 3 ] [ COMPILED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL ] [ And THE 'NIN TEMPLE'. ] [ Master - NINJA SQUIRREL /+\ ] [ Hack Copyright: Hacker Supreme 19
* HD04.HAC [ HACKERS DIRECTORY VOLUME 4 ] [ COMPLIED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL, ] [ And THE 'NIN TEMPLE'. (Elite) ] [ MASTER - NINJA SQUIRREL /+\ ] [ Hack Copyrigh
* HHACKING.IIX - CAT-HACK - - VOL I - - FROM : - -/\/\/\/\/\- THE /\/\YSTERY %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WELCOME TO CAT-HACK VOL I PREFACE: THIS IS THE OFFICIAL NEWS LETTER OF CAT HACKERS TH
* HIS-HP.TXT A BOM SQUAD RELEASE / / The History Of \ \ Hacking Phreaking / \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ By Raven - Okay boys and
* HOHO93CZ.HAC This file will appear in a future cDc publication. December, 1993 Loosely based on the Exploits of HoHoCon 1993. All experiences are relativ
* HOMEBANK.HAC Hacking Bank Of America's
* HOMEBANK.TXT Hacking Bank Of America's
* HORROR_S.TOR HACKING HORROR STORIES These are the responses to my ARPANET post of 27 October 82. If reading any of the stories below inspires you to send your own, please do! I will continue to up
* HP20001.HAC == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
* HP20002.HAC == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
* HP20003.HAC == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
* HP20004.HAC == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
* HP20005.HAC == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
* HP30.TXT This file was downloaded from: _ _ _ / /_/ _/ / _/\ \ /
* HP3000.HAC % Ctrl-S Pauses/Space Quits % Uploaded By: [GALACTUS]=- }======================================= = = = hacking the hp 3000 =
* HP3000.TXT  THE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE
* HP3000G.HAC THE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE! (aka Flatl
* HP3000_T.HAC No description yet
* IBM370.HAC How to take control of your local IBM VM/370 system Writt
* IBMHACK.HAC File: HACKING THE IBM - PART 1 Hacking the I.B.M. By John Doe Part I Preface: Yes, that's right. This series of articles will deal with how to hack the I.B.M. We're not talking abo
* ICON4U.NRG ++ | ICoN HaCKiNG | Written By GY | | | WiTH LoSER ACCESS! | ++ Here is a way to hack school ICoN systems with a gene
* ID-BIZ.TXT How to have a profitable ID business By: MR. Puff N' Stuff Original Inspiration by : The Walking Glitch WARNING THIS DOCUMENT IS FOR INFORMATIONAL AND EDUCATIONAL PURPOSES ONLY. THE A
* IDENTITY.TXT How To Create A New Indentity By The Walking Glitch Courtesy of the Jolly Roger! You might be saying, 'Hey Glitch, what do I need a new identity for?' The answer is simple. You might
* IIRGACR8.TXT The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by: MERCENARY Version Eight [05/16/1993] Mer
* IIU-004.TXT phile #4 - IIU 1990 Hacking on the compuserve information service typed by darkness Ever wonder what the hell compuserve is? Ever wonder how to get into it? Ever wonder why the russia
* ILLINET.TXT Dial Access to ILLINET Online Terminal Settings Up to 9600 Baud (auto-adjusts to caller's modem speed 300-9600 baud Parity EVEN Word length of 7 bits 1 stop bit Full Duplex (Echo On
* INET2000.TXT The [RoT]=- Introduction to Hacking The iNET 2000 Online Service )()()()()()()()()()()()() Written by Deicide on 04/05/93 INTRODUCTION iNet 2000, or as marketing people like to call i
* INFO3.GPH ++ ! HOW TO GET ANYTHING ON ANYBODY ! ! PART III ! ! ! ! MORE INFO-GATHERING. ! +-
* INFOAM.TXT Exploring Information-Ameri
* INFORMER.HAC TRI : The Remote Info
* INNERC.TXT BLINDMAN'S BLUFF, HACKER STYLE From, Out of the Inner Circle, by Bill Landreth. THE SCENE: The control room in the computer center of one of the largest corporations in the world - an
* INNERCIR.HAC HACKING TECHNIQUES Typed By: LOGAN-5 (Hacker Supreme) From the Inner Circle Book ) C
* INTERCEP.HAC THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US A
* INTERCPT.TXT The High Tech Hoods Presents. PAGER, FAX, AND DATA INTERCEPT TECHNIQUES
* INTERNET.HAC No description yet
* INTTEL.HAC European Computers % % % % list #1 as compiled by % % % % Kerrang Khan % % % %%%%%%%%%%%%%%%%%%%%%%%
* IPD.HAC Countries connected to the International Packet Switching Stream ++ ++
* IPHIJACK.TXT Simple Active Attack Against TCP Laurent Joncheray Merit Network, Inc. 4251 Plymouth Road, Suite C Ann Arbor, MI 48105, USA Phone: +1 (313) 936 2065 Fax: +1 (313) 747 3185 E-mail: lpj
* IRCHACK.HAC Submitted by: Weasel Here is a something about hacking irc. If you like it put it if not then don't. I think you'll like it though.Good page by the way. Very nice. Nice layout and eve
* ISSM201.HAC The Information Systems Security Monitor
* ISSM202.HAC The Information Systems Security Monitor
* ISSM204.HAC Information Systems
* ISSM301.HAC Information Systems
* ISSM302.HAC Story #1 Volume 3 Number 2 April 1993 Story #2 In This Issue NLM Anti-Virus Review Team Virus Alert Retrac
* ISSM303.HAC Information Systems
* ISSM304.HAC Information Systems
* JARGON~1.HAC #========= THIS IS THE JARGON FILE, VERSION 2.9.11, 01 JAN 1993 =========# This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tra
* JAVABUGS.TXT JAVASCRIPT PROBLEMS I'VE DISCOVERED These have all been reported back to Netscape. The press had a spotty record of reporting correctly on this. I've prepared a small report on the st
* JAVAINSE.TXT X-Digest: RISKS DIGEST 17.77 Subject: Java security problems Date: Sun, 18 Feb 1996 23:57:02 -0500 We have discovered a serious security problem with Netscape Navigator's 2.0 Java imp
* JUL93BLT.TXT CSL BULLETIN July 1993 CONNECTING TO THE INTERNET: SECURITY CONSIDERATIONS This bulletin focuses on security considerations for organizations considering Internet connections. Spurred
* KFYI-593.HAC kfyi-593.pt Kim Kommando Show 5-22-93 Segment One Cast of Speakers: KK: Kim Kommando MR: Mind Rape MY: Mercury B : Bruce : Any caller A : Announcer Intro Music. A : And now another ho
* KNOW.TXT HOW I KNEW WHEN I WAS HA
* LDD.TXT How to Hack into CIS 3 = Amex 4 = Visa 5 = Mastercharge For How to Make CC#'s For a VISA: Make the First 4#'s 4019 or 4128 and the last number 0012 like: 4019 0190 1450 0012 4128 0190
* LICENSE.ASC Guerilla Guide to Licensing Software DRAFT VERSION 0.1 Abstract This short article discusses the weaknesses of various licensing schemes to control the use and distribution of Unix so
* LNOISE.HAC Modem Noise Killer (alpha version) With this circuit diagram, some basic tools including a soldering iron, and four or five components from Radio Shack, you should be able to cut the
* LODHBASI.HAC The LOD/H Presents
* LOGONCBI.HAC .hac N I Z A T I O N P R E S E N T S XXXXXXXXXXXX XXXXXXXXXXXX XX XXXX XX XX XXXX XX XXX XX XXX XXX XX XXX XXXX XXXX XXXX XXXX XXX XX XXX XXX XX XXX XX XX
* LOGONCBI.TXT T H E X O R G A N I Z A T I O N P R E S E N T S 'HOW TO LOGIN TO A C.B.I. SYSTEM' WRITTEN BY: L.E. PIRATE THANKS TO: ZANGIN The following is the login procedure to login to a C.B.I. s
* LONGPASS.TXT Longer Passwords On Password Security Dr. (Bob) Wallis, recently commented on having faster implementations of DES available and suggested using a site dependant number of iterations
* MAILBOX.HAC Mailbox Systems Mailbox systems are the link between information and the underworld. If you have ever called one, then you will know the advantages of having one, especially the ones
* MAIN.FRA = =- MAIN FRAMES =- =- THE PIRATE CLUB/1200 = AMERI
* MCI.TXT 25 - - - MCI Mail Access Numbers - - - - Courtesy Of - - The Swamp - - (414)-353-8369
* MCIMAIL.HAC File: HACKING MCI MAIL Read 25 times - = = - MCI MAIL: The Adventure Continues - = [2600 Ju
* MCISPRIN.T HINTS ON HACKING- : : : : SPRINT,MCI,TELENET NUMBERS : :
* MGTGUIDE.TXT Management Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible fo
* MICKEYD.TXT P TO PAUSE S TO STOP
* MICRRISK.HAC No description yet
* MILINET.1 3. (0) NOSC-CC, (2) LOGICON, (3) NPRDC 8. (0) NRL, (1) NRL-AIC, (3) NRL-TOPS10, (6) NRL-ARCTAN, (7) NRL-CSS 13. (1) GUNTER-ADAM, (2) GUNTER-TAC 14. (0) CMU-CS-B 16. (0) AMES-TSS, (1)
* MILNET.TXT @BEGIN_FILE_ID.DIZ /\ _ / U \/ _ / / ? \ \\ / \/ How to use the American Military Net @END_FILE_ID.DIZ FEATURES OF THE TAC ACCESS CONTROL SYSTEM (TACACS) To log in to the
* MILNET1.HAC Finally it's here
* MISM1.HAC How to get anything on anyone Part 1By Toxic Tunic
* MISM10.HAC (taken from the book How To Get ANYTHING ON ANYBODY) By Lee Lapinrewritten by Woman Watcher for P-80- )
* MISM20.HAC MASTERING THE
* MISM42.HAC Atlantis BBS 215/844-8836 (Private)
* MOB.TXT The THC Hack/Phreak Archives: MOB.TXT (176 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong
* MODBOOK1.TXT No description yet
* MODBOOK2.TXT No description yet
* MODBOOK3.TXT No description yet
* MODBOOK4.TXT No description yet
* MODBOOK5.TXT No description yet
* MORALITY.HAC File: HACKER MORALITY Read 33 times A lesson in phreaking and hacking morality: I find it truly discouraging when people, intelligent people seeking intellectual challenges, must reve
* MORESTUF.TXT Feature Sections - Menu : : [1].Krakowicz's Kracking Korner [2].Software Documentation [3].Software Documentation Vol.2 [4].Telecommunications Info [5].
* MORPRIME.HAC RVEC Parameters and DMSTK Format A Telecom Computer Security Bulletin File _
* MRSTS.HAC THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided th
* MTEMPIST.HAC THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US A
* NETWORKS.PHK File: Inter-Net Mail Help ANOTHER TELECOMMUNICATIONS PHILE FROM THE ARCHIVES OF THE PRIVATE SECTOR BBS (201) 366-4431, OFFICIAL B
* NEUROMAN.PWD courtesy of diachun@autarch.acsu.buffalo.edu Here is a list of DataBases and passwords for NEUROMANCER. Password notation: 1) = level one passwd 2) = level two passwd [coded passwd]-d
* NEWID.HAC New Identity Method 'A': A How-to ManualBrought to you by SSB G-files, Inc. 1) Go to a cemetary, the baby section. Find a baby who has lived for less than 1 day (his birthdate and dea
* NEXTBUGS.TXT CA-90:06 CERT Advisory October 2, 1990 NeXT's System Software This message is to alert administrators of NeXT Computers of four potentially serious security problems. The information
* NFS_TR~1.TXT NFS Tracing By Passive Network Monitoring Matt Blaze Department of Computer Science Princeton University mab@cs.princeton.edu ABSTRACT Traces of filesystem activity have proven to be
* NOTE9309.TXT || The Hack Report || Notes on the for September, 1993 || September 1993 Issue || As most of you will realize, this month's issue was late again. It seems that every time
* NOVELL.HAC Date and Time: 09-26-1992 at 03:21:58 Originated By: Brett Warthen (BRETT @ INFINIE) There have been some discussions on various mailing lists over the past couple of weeks regarding
* NOVHACK.TXT Having Phun With Novell Brought 2 U by: Lord Foul/Decay 13th July
* OCFBER.1 [Note: OCF is the Open Computing Facility at UC Berkeley.] Bylaws of the OCF. 1. The General Manager and the Site Managers cannot appoint directors except when the OCF is not in sessi
* OCFBER.2 [Note: OCF is the Open Computing Facility at UC Berkeley.] The OCF Constitution As ratified or amended by votes of the OCF membership: 3 February 1989 Preamble We, the computer using
* ORANGE.TXT orange-boot.txt: No such file or directory % cat orange.boo orange.boo: No such file or directory % cat orange-book.txt CSC-STD-001-83 Library No. S225,711 DEPARTMENT OF DEFENSE TRUST
* ORGS.HAC COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a me
* ORGS.TXT COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a me
* OUTDIAL.LST Eastern Western Net Runner Overdose The Knight .
* OUTDIA~1.HAC npa ip address instructions 218 aa28.d.umn.edu~ type 'cli' then 'rlogin modem' then 'modem 129.72.1.59~
* PACBELL.LST Pacific Bell Computer Systems Telephone Numbers For Pactime-A Computers (Logon instructions are at the end) AREA TERMINAL TEL NUMBER TEL NUMBER Los Angeles 300 BPS
* PACNET.HAC PACNET AND KEEPING IN TOUCHInformation on connectionTo help with phreaking into the Pacnet system, the following information is offered for your use.Pacnet is a network that lets you
* PACTIMEA.TXT Pacific Bell Computer Systems Brought to you by Another Hacker (^) The Elite Phreaker's Group (^) Telephone Numbers For Pactime-A Computer (Logon instructions are at the end) AREA TER
* PASSHACK.TXT The THC Hack/Phreak Archives: PASSHACK.FXR (157 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights b
* PCHACK.TXT ==== The PC Hacking FAQ ==== Version 2.0 7/10/96 Written By Olcay Cirit, olcay@libtech.com DISCLAIMER: The author of this text disclaims all liability whatsoever
* PCPHACK.PHK The Weenie Warriors Weenie Warrior # 1 - The Pa
* PCPHACK.TXT The THC Hack/Phreak Archives: PCPHACK.TXT (245 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights be
* PCPOLD.PHK How to Use Telenet's PC Pursuit Service |_ |_ _ (View: pc pursuit phreakin/f/ove
* PCPURSUE.TXT PcPursuit Outdia
* PCPURSUI.YES PC PURSUIT AND TELENET LOCAL ACCESS NUMBERS FOR THE MOST UP-TO-DATE LISTING OF THE PC PURSUIT U.S. ACCESS TELEPHONE NUMBERS, DO THE FOLLOWING: 1. USE A MODEM TO DIAL 1-800-424-9494 WI
* PDP11.HAC Pdp-11 Basic plus pr
* PENTAGON.TXT Finally it's here
* PH.TXT P-Hack Documentation Page 1 | P-Hack 1.0 Documentation. | Hello everyone, and thanks for trying P-Hack. I think that all you SERIOUS phreaks out there will find this as usefull and gr
* PHONECOM.NFO Becoming More Informed. It was Sunday, January 19th, 1992. I was sorting through the local News Journal Paper and I discovered an article of interest in the local section. 'Hackers do
* PRIME.HAC help HELP command-name to get information on that command $$ Stores batch job submittal options inside command file Command file comment lines ABB
* PRIMECPL.HAC _ An Introduction to PRIMOS CPL Directives Written by Necrovore A Telecom Computer Security Bulletin File _
* PRIMOS.HAC FULL INFORMATION ON THIS TYPE OF SYSTEM. THE FOLLOWING NOTATION WILL BE USED CR CARRIAGE RETURN, RETURN OR ENTER (CHR$(13)) ^ A CONTROL CHARACTER LIKE ^C (BREAK, RUN STOP, OR CHR$(3))
* PW-HACK.TXT HIT Inc. Presents The Art of Password Hacking! PASSWORD HACKING: A FOREWORD Password hacking is one of the major parts of hacking. At one time or another, you will have to g
* RAMCOMM.HAC This number was posted on The V0iD (482-6356) by Redline, and I figured it was worth a try to mess around with it. RAM Communications is a paging system run off a side channel of WZOU
* RAMPART1.HAC !!WHACKOLAND!WHACKOLAND!! W W H - HACKING RAMPART - H A SYSTEMS PT. I A C C K INTRODUCTION K O
* RAMPART2.HAC !WHACKOLAND!WHACKOLAND! W HACKING RAMPART W H SYSTEMS H A A C PART II. C K K O IN DE
* RCAGLOBE.TXT 13 (CTRL-S STOP/START SPACE TO EXIT) THE WASTELANDS (216)-442-5432 THE RCA NETWORK:PART I BY THE TELEX TROOPERS THE RCA NETWORK IS A SERVICE PROVIDED TO MANY COMPANIES FOR THEIR@TELEX
* REVBLT.HAC NCSL BULLETIN OCTOBER, 1990 REVIEW OF FEDERAL AGENCY COMPUTER SECURITY AND PRIVACY PLANS (CSPP): A SUMMARY REPORT Sensitive information and information resources have become increasin
* RIMEMAN.HAC RIME USERS GUIDE INTRODUCTION This manual deals with how you, as a user, can realize the most from the RIME network. It was written in response to your requests and will hopefully ans
* RIPCO.TXT DR. RIPCO SEIZURE COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. On May 8, 1990, Agents of the United States Secret Service, along with police and telephone company secur
* RISKS.TXT The text comes from a data file written by and for IC members. HACK YOUR OWN CODES. Don't leech from someone else. Having codes is like having sex, if you don't protect yourself you'l
* RISKTOOL.HAC RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW The National Institute of Standards and Technology (NIST) and the National Computer Security Center (NCSC) have cooperatively established
* ROWDY_DL.MAN MANUAL TO VERSION 1.1 OF THE ROWDY DIALER (By RowdyB) 1st Release: April '93 Please don't hesitate to bother me at either: at073@cleveland.freenet.edu or: RowdyB@utopia.hacktic.nl for
* RSPWD.NEW root: password = H0iJKNsCCsiuk lastupdate = 726979743 flags = daemon: password = bin: password = sys: password = adm: password = uucp: password = guest: password = nobody: password =
* RSTS.HAC THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided th
* RSTS1.HAC ShadowSpawn BBS Presents. HACKING THE RSTS/E SYSTEM \\\ \\\ \\\ \\\ VOLUME I
* RSTS2.HAC ShadowSpawn BBS Presents. INSIDE RSTS/E VOL. II INSIDE RSTS/E by: THE MARAUDER THE COUNCIL OF THE FEDERATION In this volume, i will discuss some of the basic bugs in RSTS/E that can b
* RSTS3.HAC ShadowSpawn BBS Presents. INSIDE RSTS/E VOLUME III BY: THE MARAUDER THE COUNCIL OF THE FEDERATION The information in this document is intended for informational purposes only COPYRIGH
* RSTS4.HAC ShadowSpawn BBS Presents INSIDE RSTS/E VOLUME IV By: The Marauder The Legion of Hackers ! The information in this document is intended for informational purposes only Written - Decemb
* RSTS_OZ.HAC :-: : : : M A K I N G T H E M O S T O F : :
* RSX11.HAC )_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
* RSX11M.TXT )_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
* RUHACKER.TXT Are You a Hacker? by ReDragon Take a little quiz for me today. Tell me if you fit this description. You got your net account several months ago. You have been surfing the net, and you
* SANATM~1.HAC 12/25/90 | | | = Town Criers Posting Board ==- | |
* SATELIT3.TXT SATELLITE SCRAMBLING SYSTEMS THE TRUTH FILMNET VIDEO: Satpac - AUDIO: Digital By XL This is a very simple system to hack video wise. All that Filmnet do is to remove the s
* SATELITE.TXT :Satelite Frequencies:=- Edited and Compiled by: Sir Francis Drake The 135-138 MHz rang is know as the satelite band as most satelites broadcast here. However there are exceptions. Fr
* SCA-AAA.TXT AAA - ACCESS ALL AREAS Computer Security Hacking Conference 1st - 2nd July, 1995 (Saturday Sunday) King's College, London, UK Written by Scavenger sca@advantage.co.za In march 1995 I
* SCANPRG.TXT TES Presents | What To Look For In A Code Hacking Program | written by Dissident Phreaking's getting tricky these days, ain't it? Ok, there are two groups of things a code hacker shou
* SECRETS2.HAC Big Secrets.Volume #2 % %_% % % % By - The
* SECRETS3.HAC - Big Secrets No. 3 - By The Wyvern = Preface = You, volume 3 is here!!! Guess what we'll be talking about in volume 3? Well he
* SECRET~1.HAC I N T R O D U C T I O N January 1990 One day, while raiding my parents attic, I came across some old books we had enjoyed as children. 'YOUNG'S DEMONSTRATIVE TRANSLATION OF SCIENTIFIC
* SECURDEV.TXT Technical Hacking
* SECURITY.FY8 Network Working Group P. Holbrook Request for Comments: 1244 CICNet FYI: 8
* SECURITY.TXT / \ P R O F E S S O R F A L K E N ' S / /
* SEQUENCE.TXT Sequence Number Attacks By Rik Farrow Kevin Mitnick's alleged attack on Tsutomu Shimomura's Computers used a vulnerability in TCP/IP and mistaken trust. Questions regarding this artic
* SHA.HAC No description yet
* SHADEC.TXT THE USE OF A DECSERVER DOCUMENTATION BY THE CHIEF FOR SWEDISH HACKERS ASSOCIATION S.H.A. AND I.H.A. FILE #7 FEBRUARY 1990 x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/ LOGGING INTO TH
* SHAHEWL.TXT Swedish Hacking Association presents Hacking Hewlett Packard series 3000 computers Part one Written by Mr Big Copyright (c) 1990 by Swedish Hacking Association This file will help you
* SHAPROT3.TXT SWEDISH HACKERS ASSOCIATION PRESENTS 1990 THE 3rd PROTOCOL 1990 EDITORS : LIXOM BAH : MR BIG : PHEARLESS : THE CHIEF
* SHW0293.ASC Syndicated Hack Watch Column 02-93 (March 93) Title: Red Hot Dutch To Be Banned? This royal throne of kings, this scepter'd isle, This earth of majesty, this seat of Mars, This other
* SHW0394.ASC Syndicated Hack Watch - 03:1994 - -
* SHW0494.ASC Syndicated Hack Watch - 04:1994 - -
* SHW0593.ASC Red Hot Television Is Banned In a debacle that mirrors the 'Spycatcher' case of a few years ago, Red Hot Television's attempt at stopping the UK Heritage Secretary's proscription orde
* SHW0893.ASC Syndicated Hack Watch 08:93 The Start Of The War Sky had suffered its most devastating hack to date. Its security was demolished and the MultiChannels package was about to be introduc
* SHW0993.ASC Syndicated Hack Watch - 09:1993 - -
* SHW0994.BBS Syndicated Hack Watch - 09:1994 - -
* SHW1093.ASC Syndicated Hack Watch - 10:1993 - -
* SKEY.TXT Description of The S/KEY One-Time Password System Neil M. Haller nmh@thumper.bellcore.com Philip R. Karn karn@chicago.qualcomm.com ABSTRACT The S/KEY one-time password system provides
* SKEYFL.TXT VULNERABILITIES IN THE S/KEY ONE TIME PASSWORD SYSTEM Author: Mudge _ This may be redistributed as long as proper credit is maintained. In o
* SNOOP.TXT Abstruse Authors of Merca Presents Data Snooping : the Right Way
* SSAN.HAC SUBJECT: The Social Security Number SSA has continually emphasized the fact that the SSN identifies a particular record only and the Social Security Card indicates the person whose re
* SSN-STUF.TXT From ucdavis!ucbvax!RED.RUTGERS.EDU!AWalker Fri Nov 13 18:33:17 PST 1987 Article 136 of misc.security: From: AWalker@RED.RUTGERS.EDU ( Hobbit ) Subject: Yet more about SS numbers Date
* SSNUM.ANA File: ABOUT SS NUMBERS Read 13 times OFTEN MANY OF YOU MAY BE IN A POSITION OF NEEDING TO DO AN INFORMATION SEARCH ON AN INDIVIDUAL. IT IS SOMTIME A BIG HELP TO KNOW WHERE SOMEONE ORI
* STARMAST.TXT The Reign of Terror RoT guide to HACKING THE GANDALF STARMASTER (also known as PACX or Access Server) written by Deicide 05/22/93 INTRODUCTION This entire tphile is based on my knowle
* STUPIDKI.HAC DURING THE PAST EIGHT YEARS, I HAVE BEEN HEAVILY INVOLVED WITH 'BULLETIN BOARD' SYSTEMS RUNNING ON MICROS AND MAINFRAMES. I'D LIKE TO GIVE A FEW EXAMPLES OF THE DESTRUCTIVENESS OF MAN
* SUN413.TXT From tmk@uhunix.uhcc.Hawaii.Edu Thu Jun 30 08:54:17 EDT 1994 Subject: How to improve security on a newly installed SunOS 4.1.3 system. Summary: How to improve security on a newly inst
* SUPERD.TXT No description yet
* SYS75.HAC The Complete Guide to Definity G Series Systems AKA System 75 - 85 Written by: Scott Simpson June 18, 1992 Greets to: Invalid Media, The Missing Link, Randy Hacker, Dark Druid, Nickod
* TCSB.03 _ ItaPac - A Brief Introduction Written by Blade Runner on 08/11/88 A Telecom Computer Security Bulletin File
* TCSB.04 _ An Introduction to PRIMOS CPL Directives Written by Necrovore on 09/02/88 (Revised on 09/10/88) A Telecom Computer Security
* TCSB.05 _ An Introduction to Packet Switched Networks Part I Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulletin
* TCSB.06 _ An Introduction to Packet Switched Networks Part II Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulleti
* TCSB.08 _ Your Personal Phone Security Written By King Lucifer (Alias Byteman) on 8/10/88 A Telecom Computer Security Bulletin File
* TCSB.11 _ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
* TCSB.12 _ Expansion of the Z80 CPU Chip Written by King Lucifer (Alias Byteman) on 9/10/88 A Telecom Computer Security Bulletin File V
* TECHHACK.HAC A Guide To: Systems.
* TECHNICL.TXT No description yet
* TELE3.TXT TELENET SCANNING
* TELE5.HAC [ ==-HACKING TELENET=] by:- The Flash Uploaded by Elric of Imrryr For Those Who Like Living Dangerously: These are Telenet access codes. Telenet is a system by which one can access al
* TELECODE.TXT TELENET CODES 5/01/88 HACKED OUT BY !ZORON! ABBREVIATION LIST ^ = CNTRL UNK = UNKNOWN C.B. = CITIBANK C/C/M = CITICORP MANAGER REF = REFUSED COLLECT CALL @ CONNECTION | CONNEC
* TELECOMM.TXT An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Som
* TELEINFO.TXT r74 Display what file? pr_ _ \/ Tommy's Holiday Camp +1 604 598-4259 \/ Tommy's You're in System Hacking Philes [-Files-][?][Q][ t Display what file? teleneth.t
* TELENET.HAC Telenet The Secret Exposed. For years, people and myself, have offtend tried to'work telenet unto a coma' With no success, for the past few years, i have gathered data, and finally kn
* TELENET.TXT File: TELENET DIRECTORY ( TELENET DIRECTORY ) C 20120-VM 370 ONLINE C 20124 C 20125-NJIT EIES C 20130 C 20133 C 20138 C 20148 C 20154 C 20165
* TELENET2.TXT TELENET INFORMATION Command: 2 ==)- P TO PAUSE S TO STOP -(== 'TELENET TERMINAL IDENTIFIERS' THIS IS A LIST OF THE TERMINAL IDENTIFIERS FOR TELENET AND THE SYSTEM TYPES THEY REPRESE
* TELENETH.TXT An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Som
* TELENETI.PHK Here are instructions for using TELENET. There are some very basic things, which most people already know, and some other things, which even the most dedicated hackers have probably n
* TELLERMA.TXT CRACKINGAUTOBANKTELLER MACHINES Downloaded by the Suspect Most auto teller machines require an ID card to retrieve money. The circuit ry inside the machines has been made mo re sophis
* TELNETSN.TXT TELENET SCANNING
* TELTERMZ.TXT Terminal Identifiers The following tables matches Terminal numerical IDs (telenet parmater 23) Generic and Specific Terminal Identifiers. ID # Generic Term ID Terminal Type (note) -
* TEMPEST.HAC Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo frm 'the threat of information theft by reception of electromagnetic radiation from rs-232 cables.' computers and security, 9(199
* THUGLAN1.HAC Introduction to Hacking into LANs
* THUGLAN1.TXT Introduction to Hacking into LANs
* THUGLAN2.TXT General Information on LANs (Topologies, Etc.)
* TIMENET.TXT The THC Hack/Phreak Archives: TIMENET.TXT (170 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights be
* TNET1.TXT Tymnet File #1 Courtesy of -:The Twilight Phone:- TYMNET INFORMATION SERVICE Welcome to TYMNET's Information Service! TYMNET is the world's largest Public Data Network, w
* TNET2.TXT Tymnet File #2 Courtesy of -:The Twilight Phone:- TYPE THE NUMBER OF THE DESIRED MENU ITEN FOLLOWED BY A CARRIAGE RETURN:1 COMPANIES PROVIDING DATA BASE OR TIMESHAR
* TNET3.TXT Tymnet File #3 Courtesy of the -:Twilight Phone:- COMMUNICATION PRODUCTS VERIFIED BY TYMNET TYMNET is the 'PC Friendly Network.' To make it easier for you to use
* TOPS20.TXT Notes On Tops-20 Systems by The Blue Archer and The Legion of Hackers! Notes in brackets require the brackets.(2) This is just a basic overlay of the tops-20(Dec-20) And it's commands
* TRANSDIR.TXT The Legion of Doom/Legion
* TRASH.TXT DUMPSTER DIVING COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. In light of the recent debates regarding the various activities of the ``hacking community and it various m
* TRASHING.ROT Reign of Terror [ R o T ] presents. the art of TRASHING a how to guide for one of the most useful tools in hacking today Written by: Deicide /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
* TRIAD187.HAC The Triad A 3-In-1 Text File Magazine .'Concepts to Educate the Educated'. Volume 1, Issue 1 November Issue, 1987 Chapter 1: Introduction to The Triad (Its purpose and Goals) Chapter
* TTYSPOOF.TXT TTY SPOOFING by SubEthan I know what you are going to say. 'THAT WAS ALREADY COVERED BY VAXBUSTER IN PHRACK-41!' Yeah, I know, but if you would shut your mouth for long enough and pay
* TYMENET.HAC TYMNET TECHNICAL AND USER DOCUMENTATION Tymnet provides for our customer use technical and user documentation. This directory lists the documentation available along with a brief desc
* TYMNET.TXT PACKET NETWORKS I written and compiled BY THE DIGITAL-DEMON (C) DEC. 29, 1990 Wel
* TYMNET96.TXT March 11, 1994 BT-GNS TYMDIAL 9.6 WORLDWIDE ACCESS DIALUP ACCESS M PROV 100'S BPS N NODE CITY ST CNTRY DENS 3 12 24 96 ACCESS NO. P COMMENTS -
* TYM_ODS.TXT +-TymNet OutDials Sorted By Area Code+-Page 1-+ :NPA ST OUTDIAL CITY :NPA ST OUTDIAL CITY : ++
* UKGUIDE.HAC Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo The Guide to Online Databases For U.K. Users ( ) denotes UK Users have special benefits Prestel. Time charge 7p/min 0800-1800 Mon
* UNINETA.PHK THE SOUTH POLE[312] 677-7140 - U N I N E T - THIS IS THE 5TH OPTION - ALONG WITH TELENET, TYMNET, SOURCENET, AND STC'S WATS LINES - IN TYING YOUR PERSONAL
* UNIXWRAP.TXT TCP WRAPPER Network monitoring, access control, and booby traps. Wietse Venema Mathematics and Computing Science Eindhoven University of Technology The Netherlands wietse@wzv.win.tue.
* USENETHI.TXT Advanced Usenet Hi-jinks - To specifically cancel someone else's article, you need its message-ID. Your message headers, in addition to what's already there, should also contai
* USRGUIDE.TXT Computer User's Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is responsibl
* VENDORS.HAC Security Vendors This list was prepared by the National Computer Security Association. It lists 480 vendors of security products and services. Vendors are listed alphabetically by com
* VERSTELL.ANA Here's some neat fun to have on versatellers in your city. Call the versateller network center and tell them the machine is dammaged. Tell them you have a problem with the machine.if
* VMBHACK.TXT Disclaimer: By continuing to read past this point you are hereby agreeing that this information is for interest value onl
* VTHACK1.TXT The VT Hacker by The Mad Hermit Welcome to the first installment of the hackers' corner. In this 'electronic magazine', I will be speaking out on various issues relating to computers,
* VTHACK2.TXT VT Hacker #2 courtesy of The Mad Hermit Well, there's some old news, so let's get it out of the way. The Novice menu stuff has changed slightly. Options 8-12 are no longer active. in
* VTHACK3.TXT Well, it's time for yet another installment in Virginia Tech hacking. Yes, it's VTHACK #3!!!! Brought to you by the Mad Hermit and crew. This time, we're going to focus on the OTHER b
* WANGHACK.HAC Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo %+ %+
* WANINFO.TXT Unauthorised Access UK 0636-708063 Jester Sluggo presents an insight on Wide-Area Networks Part 1 Part 1 contains information on ARPANET and CSNET. Part 2 contains information on BITN
* XEROX.HAC Hacking: X E R O X
* XMUX.TXT The =RoT= Guide To GANDALF XMUX'S Written by: Deicide NOTE: While writing this file i assumed that the reader has a working knowledge of Packet-Switching Networks(Such as Sprintnet, T
* YANOFF.TXT SPECIAL INTERNET CONNECTIONS: LAST UPDATE 5/16/94 Compiled by: Scott Yanoff - yanoff@csd4.csd.uwm.edu Copyright 1994 Scott Yanoff. No changes are to be made to this document without t
* ZEN.HAC From annaliza@netcom.com Ukn Dec 1 23:30:29 1993 Received: from mail.netcom.com (netcom3.netcom.com [192.100.81.103]) by kaiwan.kaiwan.com (8.6.4/8.6.4) with ESMTP id XAA29728 for bud
* ZEROKNOW.TXT From gregmi@galileo.mis.net Sat Oct 12 23:31:23 1996 Date: Sat, 03 Aug 1996 22:39:21 -0400 To: netware-hack@dey-systems.com Subject: Draft of 'A Few Attacks on the Zero Knowledge Stat
* ZIPPASS.TXT Article 357 of sci.crypt: Xref: vpnet comp.compression:174 sci.crypt:357 Subject: Re: Security of PKZIP's encryption Date: 2 Apr 91 07:08:10 GMT References: 1991Mar26.150049.20882@ath

---

The views and opinions stated within this web page are those of the author or authors which wrote them and may not reflect the views and opinions of the ISP or account user which hosts the web page. The opinions may or may not be those of the Chairman of The Skeptic Tank.

Return to The Skeptic Tank's main Index page.

E-Mail Fredric L. Rice / The Skeptic Tank