Hacking. Most of this is either totally obsolete or is totally
childish and in any event unworkable. As a historic look into the
past when hacking was a sport, these files could be useful. Hell,
most of this nonsense didn't work anyway.
Return to The Skeptic Tank's main Index page.
23THINGS.TXT
Top 23(!) things learned at DEF CON 1 By The White Ninja 'Jesus Hacks! Why don't YOU?' This text file idea blatantly leeched from: SummerCon! 1.
386I.TXT
THE COMPUTER INCIDENT ADVISORY CAPABILITY CIAC ADVISORY NOTICE
5600.TXT
[F] Self Test . Exit Application: Application: RING Invalid Menu Entry Application: Application: CONNECT Station Message Detail Accounting (SMDA) [A] Automatic SMDA Reports [B] On-Lin
ACCESBLT.HAC
Computer Systems Laboratory Bulletin November 1991 ADVANCED AUTHENTICATION TECHNOLOGY Introduction Computer systems and the information they store and process are valuable resources w
ACCESSIN.TXT
TIC INC. Presents. Vol:1/Issue:1.0 Accessing GEnie Free A Brief Tutorial on How to Beat the High Cost of Genie =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ This is Tic Inc's
ACRO01.TXT
A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling out the
ACRO02.TXT
It's amazing that my first Acronym's text file went over so well! So, here's the second and much larger companion to it.Acro 2. Yeah, I know 2 days is a long, long wait for a file. G
ACROLIST.PHK
VERSION the library version number: 1.30 containing 250 acronyms CREDITS the people who have helped by sending acronyms. ANI Automatic Number Identification MCM Miami Cracking Machine
ADSSYS.TXT
A Guide To: A.D.S. Systems.
AIO.BOX
All In One Box BY: Disk Doctor Basicly, this should be common sense All You have to do is by a small box (Preferable a rated box that will keep it from interfering with that nice Raid
AIS.TXT
AIS - Automatic Intercept System The DAIS II System by Computer Consoles Incorporated INTRODUCTION. ~ Computer Consoles Incorporated (CCI) manufactures various hardware appliances to
AIX.FUN
the CERT Advisories. You'd better get rid of the glaring AIX rlogin hole, if you haven't done so already (CERT CA-94:09). Check also CA-91:19, CA-92:05, CA-92:06, CA-92:07, CA-92:
ALLNET01.TXT
== Hacking Allnet = = 01/xx/88
AMHACK.TXT
Hacking Answering Machines 1990 by: Predat0r of Blitzkrieg Bbs 502/499-8933 ATT reports that in the year 1990, 11 million p
ANSIBOMB.TXT
ANSI Bombs II: Tips and Techniques By The Raging Golem I. Introduction After writing the last file, a lot of people let me know about the mistakes I had made. I guess this file is to
AOHELL.PHK
Why I Wrote AOHell The reason I wanted to make this program is because I hate just about everyone on AOL. Yes, that probably means YOU. I'm sick of all the faggots, and I'm sick of al
AOLHAK.TXT
How To Hack America On Line By: The Hooded Bobs The hooded bobs are currently. ThE cRowE, IckleMe and Ersatz First of all, this file will be of the most help to the beggining hacker o
ARPA.MAN
NIC 50003 ARPANET INFORMATION BROCHURE DECEMBER 1985 ARPANET INFORMATION BROCHURE DECEMBER 1985 Editor: Stephen C. Dennett Elizabeth J. Feinler Francine Perillo Additional copies of t
ARPA1.HAC
Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
ARPA2.HAC
Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
ARPA3.HAC
Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
ARPA4.HAC
_ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
ARPA5.HAC
Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
ARPA6.HAC
Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
ARPANET.HAC
[CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
ARPANET.TXT
[CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
ARPANET1.CON
/ ARPANET / FIRST OF ALL PART 4 WILL DEAL WITH: 1(AND ONLY ONE):OPERATING SYSTEMS AND THEIR TAC ADDRESSES ACTUALLY BEFORE I BEGIN YOU MUST NEED TO KNOW: TO ATTACH TO S
ARPANET1.TXT
Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
ARPANET2.TXT
Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
ARPANET3.TXT
Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
ARPANET4.TXT
_ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
ARPANET5.TXT
Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
ARPANET6.TXT
Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
AS400CMD.HAC
IBM AS/400 Command Summary Command Description - - ADDACC Add Access Code ADDAJE Add Autostart Job Entry ADDAUTLE Add Authorization List Entry ADDBKP
AS400CMD.TXT
@BEGIN_FILE_ID.DIZAll IBM AS/400 Commands Shell and scripting commands included . @END_FILE_ID.DIZTHe MiGHT HaS ReBoRN /\ Demon
ASPEN.TXT
[R.A.W Productions] [01.13.92] [A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems] [Written by: Caveman] [Introduction] ASpEN, or 'Automated Speech Exchange Network,' is
ASPEN2.TXT
[R.a.W][Caveman] [03.27.92] [A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems: Part II] [Written by: Caveman] [I
ATLAS.TXT
% % Hacker's Atlas % % % Ragon/Wyv/Bof % Ltd % Presentation! %
ATM.TXT
A. T. M. Fraud Made Easy | | | | summary and research by | | Count Zero | |
ATM-92.TXT
===- THE HIGH TECH HOOD SQUAD PRESENTS. AAAAAAA TTTTTTTTT MMM MMM ' A A TT MMM
ATM-MORE.TXT
To: unix-wizards@sem.brl.mil Subj: [1070] Re: Here's a BRILLIANT password idea! But, in the UK at least, if you abort the 'login' attempt after the 2nd attempt (there is a button to d
ATM1.TXT
- The Disk Jockey - - presents: - - - - Scam
ATMA.HAC
(View: automatic teller machines From ames!amdahl!nsc!voder!wlbr!gins Mon Jul 13 12:41:23 PDT Article 479 of sci.crypt: From: gins@wlbr.UUCP (Fred Ginsburg) Subject: Re: ATM secret co
ATMAPPS.TXT
'GEE WHIZ' ATM APPLICAITONS ON THE HORIZON Nathan Felde, executive director of multimedia communications at the NYNEX Science Technology laboratory in Cambridge, Mass., waxes evangeli
ATMHAC~1.TXT
+ HACKING ATM'S + Welcome everybody to my first article dealing with the manipulation of the Bank's Automated Teller Machines for the gain of money In this article I will show you ma
ATMS.TXT
Track Layouts This is off the top of my head, but is 99% there. Also I'll ignore some obsolete stuff. The physical layout of the cards are standard. The LOGICA
AUSTHACK.HAC
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo Australian Dialups = ISSUE: 1 =
AUSTPAC0.TXT
=== Compiled by Soft Beard 1990 === Accessing Telecom Australia`s AUSTPAC service. AUSTPAC is a great way to connect to major companies. This is how it works: You call AUSTPAC for 20c
AUSTPAC1.TXT
The following information is from the AUSTPAC character terminal manual. Austpac is available all the time except (currently) 11pm Thu - 7am Fri. This is their maintainance window. (M
AUSTPAC2.TXT
TYPE AUSTPAC.DOC TYPE Ver 5.3 - Multiple file lister CTL-S pauses, CTL-X skips to next file, CTL-C aborts === LISTING FILE: AUSTPAC .DOC AUSTPAC 1 . Austpac General Information 2 . Au
AUSTPAC3.TXT
The September 1989 - Apple Odessa - September 1989 Presents AUSTPAC Price List. A file bought to you by Negative Energy. Introduction The AUSTPAC data service which uses packet swi
AUTOHACK.TXT
Documentation for [ A U T O - H A C K ] version 1.0 Written by: Grimalkin, 08/12/86 NOTICE: This program was written to further the education of the IBM PC computer users out there, a
AUTONET1.TXT
[ Hacker Supreme's - Hackers Directory Volume # 34 ] [ Compiled by: Ninja Squirrel and Logan - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] [ AUTONET SERIES (Section 1) ] HOW TO CONNEC
AUTOTE~1.ANA
Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a pri
AUTOVON1.HAC
Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part I AUTOVON is the Military Voice Communications System. Each Mi
AUTOVON2.HAC
Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part II 'Silver Boxes' Warning: This modification could permanently
AUTOVON3.HAC
Uploaded By: Dark Creaper Brought to to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part III 'Operating Procedures' Now, you're at the part that you
AUTOVONI.NST
From DLEIBOLD@vm1.yorku.ca Fri Jun 19 20:35:22 1992 Received: from vm1.yorku.ca by gaak.LCS.MIT.EDU via TCP with SMTP id AA08522; Fri, 19 Jun 92 20:35:15 EDT Received: from VM1.YorkU.
AVOIDCAP.TXT
'Planning Ahead' Every self respecting hacker or phone phreak should plan ahead. In this phile I hope to show you how and what to take when you have to make a break for it. I. Know Th
BACKDO~1.TXT
Backdoors By Christopher Klaus 8/4/97 Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into th
BANKHACK.TXT
The Legion of Doom! EFT Division Presents HOW WE GOT RICH THROUGH ELECTRONIC FUND TRANSFERS (OR: GEE! NO, GTE!) A certain number of financial institutions that reside within the packe
BASIC.NET
11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outd
BASIC1.HAC
Basics of Hacking I: Decs's Welcome to basics of hacking i: dec's in this article you will learn how to log
BASIC3.HAC
The basics of hacking iii: data
BASICNET.HAC
11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outdi
BBSFILES.TXT
Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILAB
BCTJ1_04.TXT
Ethernet Fields
BEGING~1.TXT
User's guide Well, howdi folks. I guess you are all wondering who's this guy (me) that's trying to show you a bit of everything. ? Well, I ain't telling you any
BOAHACK.TXT
Hacking Bank Of America's Home Ban
BOCES.TXT
SYSTEM 1 OR SYSTEM 2? ?SYS2 HEL-S560, BOCES INSTRUCTIONAL NETWORK - SYSTEM 2 READY ON PORT# 20 LIB NAME LENGTH NAME LENGTH NAME LENGTH NAME LENGTH -ASCII 846 ADDRES 1056 AL
BOOKS.TXT
BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS (1973 through 1988) Note: A bibliography is now being developed to encompass 1989. ABUSE/MISUSE/CRIME AUTHOR: Fennelly, Lawrence J. TITLE: H
BTINFO.H-K
No description yet
BUFFEROW.TXT
How to write Buffer Overflows This is really rough, and some of it is not needed. I wrote this as a reminder note to myself as I really didn't want to look at any more ATT assembly ag
BUMP.TXT
[Image] Things that Go Bump in the Net This is a brief look at some of the more colorful characters in the menagerie of network security threats, with an emphasis on how they relate t
C64FUN1.TXT
Number :/15 Subject :/C64 Fun!!!! From :/THE NIGHTSTALKER Date :/10/08/86 00:08:53 ET I suppose that one of the more interesting things one can do with a computer in a store like Sear
CALLCARD.PHK
Pyromania Publishing Article #0006 Title| Hacking Calling Cards By | THE PYROMANIAC Date | September 23, 1987 Call | the Pyromania BBS! 3o1-xxx-xxxx Note | Sorry about 40 columns but
CANDYL~1.FAQ
## ## ## The CandyLand FAQ ## ## ## ## http:www.mcs.net/~candyman/ ## ## ## ## Answers to the most
CARCODES.TXT
CODES USED BY COMPUTERS IN GM CARS New cars use computers to store and remember malfunctions that occur. These are displayed in the flashing sequences in the instrument cluster. A typ
CB1.TXT
CITIBANK HACKING by Johnny Hindu Hello Hackers, this month I am going to show you excerpts from my hacking log. This excerpt is about my excursion with Citibank and how I got into it.
CB2.TXT
I figured out that the numbers at the end are the social security number. (not that long though). Nice now that I am in Johns account, what should I do.I tried a few bum keys. Here ar
CBRSP-1.HAC
We, the People proudly Present
CBVHACK.PNK
CBV Hackin By PiNK ToRPeDo Original File Date: June 7, 1994 You might be saying to yourself. now PiNK - How do I get through those CHeeZY CBV's that everyone uses. There are at least
CHAOS01.TXT
Pyro's Anonymous 'Chaos Chronicles' Issue #1 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
CHAOS02.TXT
Pyro's Anonymous 'Chaos Chronicles' Issue #2 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
CHAOS03.TXT
Pyro's Anonymous 'Chaos Chronicles' Issue #3 Author: Inphiniti Co-Author: Decibel Title: Credit Card Fraud Tutorial All Rights
CHINA0~1.HAC
CHiNA Newsletter #2 +-+ | | | A. T. M. Fraud Made Easy | | | | summary and research by | | Count
CHURCH4.PTL
The PTL Club Proudly Presents Church Chat Volume 4 Written by: The Spiker Gee, this might look unprofessional but oh well. A newsletter is just to inform people about special thin
CITIBANK.TXT
by Johnny Hindu Hello Hackers, this month I am going to show you excerpt from my hacking log. This excerpt is about my excursion with Citibank and how I got into it. Alright lets get
COMPUS.TXT
FREE COMPUSERVE PASSWORDS BY DEVIOUS XEVIOUS There are several ways you can go about getting cis passwords. The ones with unlimited access are quite a bit harder but, first of all, th
COMPUSER.TXT
189 9 THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216, UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TO OSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! The index whi
COM_SE~1.HAC
United States General Accounting Office _ GAO Report to the Chairman, Committee on Science, Space, and Technology
COM_SE~2.HAC
United States General Accounting Office _ GAO Testimony Before the Subcommittee on Government Information an
CONCIS.TXT
FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
CONTACT.TXT
===== HOW TO CONTACT THE HACK SQUAD ===== If you have a report or comment, I can be reached through any of the following systems and/or networks: FidoNet: Backbone Echos SHAREWRE, PDR
COPIER.HAC
Magnetic Stripes Translated from Hack-Tik, #8, #9/10, available at PO Bos 22953,1100 DL Amsterdam, The Netherlands Translation by Dr. Abuse Text/Schematics _copied_ from 2600 Magazine
COSMOS.HAC
C O S M O S C O P Y R I G H T 1 9 8 4 D O
COSMOS1.TXT
uploaded by: the wizard of oz es saying it's changed. but they probably throw away those papers and you will be able to find alot of interesting inpho by trashing. also, most or all c
COSMOS2.HAC
The SYSOP of OSUNY wishes to thank Pirate-80 (304)-744-2253 for the contribution of this file $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ LEX LUTHOR $ $
COSMOS3.HAC
The 1986 COSMOS FILES ART III: Service Orde
CRACKAM1.TXT
Hacking Programs on the Amiga By FunToHack of K1W1 Christchurch New Zealand (all spelling mistakes are free) Version 1
CRACKDWN.TXT
From 2600 magazine volume 7, number 1 SPRING To Subscribe: 2600, PO BOX 752, Middle Island, NY 11953-0752 $18 individual, $45 corporate yearly subscription rates FOR YOUR PROTECTION A
CRACKER.TXT
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. By the consultants of the Network Security Solutions Ltd. Front-line Inf
CREDITFR.TXT
\=/ | Volume I of The Adventures in Fraud Series | | The Bible of Fraud | | By: | |
CREDUNIN.CON
CREDIT UNIONS AND PROTECTION - - AGENCIES
CS.HAC
How to get a free account on CompuServe CompuServe: Bastards who charge a
CS.TXT
How to get a free account on CompuServe CompuServe: Bastards who charge a
CSL8_93.HAC
CSL BULLETIN August 1993 SECURITY PROGRAM MANAGEMENT This bulletin discusses the establishment and operation of a security program as a management function and describes some of the f
CUSASS.HAC
by THE MASTER The Master on out-of-state boards. A CN/A is a section of ATT ket up to supply it's offices' with Names and addresses of people who own a certain number. CN/A stands for
CYBER.TXT
The CyberPunk Movement º º Written by Pazuzu for DnA º º May 12, 1993 º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ There's been a lot of talk lately about the CyberPunk M
DARTKIEW.HAC
Dartmouth Kiewit System by the lone ranger Released:01-05-86 This might be some sort of on-going set of files but I doubt it. The only way I can see that it would be is that someone e
DATA.TAP
FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Elric of Imrryr Lunatic Labs UnLtd FOR SEVER
DATABASE.TXT
CIRR DATABASE A tool for corporate research For more info, contact: Kerry Dressler through EnviroNet mail CIRR actually stands for the Company and Industrial Research Reports Datebase
DATAKIT.HAC
- isn: How to connect across VCS/ISN boundaries. - Holmdel, Crawford Hill, and Short Hills locations have mostly ISN nodes. Other locations have primarily VCS (Datakit) nodes. In ge
DATAPAC.HAC
A Guide to Dat
DATAPAC.TXT
A Guide to DataPAC A Technical Information File for the Canad
DATAPAC1.TXT
A Guide to Dat
DATAPAC2.TXT
DATAPAC 3101 ITI PARAMETERS DESCRIPTION THE FOLLOWING WILL PROVIDE IN MORE DETAIL A DESCRIPTION OF ITI (84) PARAMETERS FOR DATAPAC 3101. DESCRIPTION - INTERNATIONAL PAD PARAMETERS 1)A
DATAPAC3.TXT
If you've scammed a Datapac based account, here's a list of places within Canada that you can reach.gratuis! Datapac 3101 Public Outdial Ports Last updated April 3, 1989. The Datapac
DATATAPP.TXT
Dec 27 21:24 1985 data.tap Page 1 FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Lunatic La
DC3-2.TXT
DEF CON III Convention Update #1.80 (06.20.95) August 4-6th 1995 @ the Tropicana in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXX
DDN01.HAC
DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
DDN01.TXT
DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
DDN03.HAC
DDN Security Bulletin 03 DCA DDN Defense Communications System 18 Oct 89 Published by: DDN Security Coordinat
DDN04.HAC
DDN Security Bulletin 04 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordinat
DDN05.HAC
DDN Security Bulletin 05 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordina
DDN06.HAC
DDN Security Bulletin 06 DCA DDN Defense Communications System 1 Nov 89 Published by: DDN Security Coordinat
DDNET1.TXT
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network The Department of Defense started the major networking scene in the US in the late '70s and early
DDNET2.TXT
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network \|/ By Star - - Fire [a member of Mysterion Grp] /|\ Diagram of DDN: _
DEBTCARD.TXT
ISDN HARVARD MEDICAL SCHOOL INSTALLS ISDN-BASED DEBIT CARD SYSTEM Students pay up front, then monitor accounts during the school year Harvard University Medical School in Boston is li
DEC10.TXT
(info Uploaded to The Cartel AE line.) - Hacking the Dec-10 system Part I: Logging In, and simple cmds. Note:Sysop's may download this file but please keep the appropriate credits. We
DEC_200.TXT
r64 Msg#: 1 of 7 Subject: Decserver 200 revealed! Posted By: Surf Studd [Classified] Sent To: All Posted On: 10/23/90 at 09:05:54 PM
DEFAULTS.TXT
Updated - 4/1/92 to include XENIX systems The Hollow's Alliance 415-236-2371 MONDO h/ph/c g-files and discussion Here's our seventh, and like I promised a few issues back, a large lis
DEFCON~1.HAC
D E F C O N I C O N V E N T I O N D E F C O N I C O N V E N T I O N DEF CON I CONVENTION D E F C O N I C O N V E N T I O N READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DIS
DEFDB.HAC
Department of Defense Federal Data Bases Ada Information Bulletin Board Ada Information Clearinghouse The Pentagon Data: (202) 694-0215 US Department of Defe
DEFENSE.HAC
HARRY HACKALOT PRESENTS %% %% 'Defense Data Network B
DENIAL.TXT
=INTRODUCTION TO DENIAL OF SERVICE= Hans Husman t95hhu@student.tdb.uu.se Last updated: Mon Oct 28 14:56:31 MET 1996 .0. FOREWORD .A. INTRODUCTION .A.1. WHAT IS A DENIAL OF SERVICE ATT
DENNING.TXT
To be presented at the 13th National Computer Security Conference, Washington, D.C., Oct. 1-4, 1990. Concerning Hackers Who Break into Computer Systems Dorothy E. Denning Digital Equi
DES.TXT
DATA ENCRYPTION STANDARD FACT SHEET Introduction The National Institute of Standards and Technology (NIST) of the Department of Commerce has recently received many inquiries regarding
DESBLT.TXT
This NCSL Bulletin initiates a new publication series at the National Computer Systems Laboratory (NCSL). Each bulletin will present an in-depth discussion of a single topic of signif
DESVAL.HAC
DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
DESVAL.TXT
DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
DIALBACK.TXT
Date: Thu, 28-Feb-85 Subject: Dial Back isn't always secure An increasingly popular technique for protecting dial-in ports from the ravages of hackers and other more sinister system p
DIALOG.TXT
DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information availabl
DIALOG01.TXT
DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information availabl
DIALOUT1.TXT
Novice Mannual On Using Out Dial Modems by blue adept - - - - - - - - - - - - - - - - Contents: - What is an OutDial? - Where to find OutDials - How to use an OutDial - PCP NU
DIALOU~1.HAC
From t891368@otto.bf.rmit.OZ.AU Fri May 17 15:07:43 1991 Received: from munnari.OZ.AU by milton.u.washington.edu (5.61/UW-NDC Revision: 2.1 ) id AA05809; Fri, 17 May 91 15:07:20 -0700
DIALUP.HAC
Arlington VA 703 841-9834C 703 841-9834CAthens OH 614 594-8364C 614 594-8364CAtlanta GA 404 237-8113C Atlant GA
DNICINF.HAC
Qmodem Scroll Back Dump File INFO RELATIONS-P Date: 1990.08.02/W/T D A T E X - P - International Traffic Relations Explanatory notes: DNIC Data network identification
DOWJONES.TXT
==)- P TO PAUSE S TO STOP -(== Inside DJNS major commands prompts: 'enter query' main prompt 'database help' displays info about the database you specify 'database' moves directly t
DPACINTR.ROT
Reign of Terror [ R o T ] Presents - INTRODUCTION TO DATAPAC - (and PSN's in general) Written by: Deicide A B
DPACNUAS.TXT
Reign of Terror =- |= - =| . Proudly Presents . |=
DTSB.HAC
_ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
EASYL.HAC
PROFESSOR FALKEN [][] K][] IN ASSOCIATION WITH [][] []
EASYLINK.HCK
HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cab
EASYLINK.TXT
PROFESSOR FALKEN [] [] K] [] IN ASSOCIATION WITH [] []
EDIT.TXT
E.D.I.T - Electronic Deception, Interception Terrorism : The Radio Shack Reality! presented by Ian A. Murphy, President CEO IAM / Secure Data Systems Inc. 1225 North Second Street Phi
ENA!.HAC
Numb. 5 Title What is the ENA? From RICK Left 28-DEC-85 11:33 PM THE ENA VISION: What IS ENA? Edited by Stefanie Kott ENA is an organization that grew out of the First Inte
ENCYCLOP.TXT
Message 1150 DATE/TIME: 03/20/89 20:18 From : GAZ HOWLAND To : ALL Subject: I need a mars bar, to help me, help me, Folder : E, 'Encyclopedia Hacktanica' Did you se
EPROMS.HAC
Kingpin [RDT Syn.] presents: === A CLOSER LOOK AT EPROMS ====- A brief introduction to EPROMS, what they are used for, and how they work (Stolen from an undisclosed source) Whassup to
ESLF0006.TXT
16 START DOKS | | | An ESLF Republication of | Original Publication: || Whole Earth Magazine Issue: =-
ESS.TXT
r72 TO PAUSE S TO STOP Electronic Switching System $ $ From 2600 mag. Feb '84 $ $+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$ (Courtesy of Black Knigh
ETHICS.HAC
File: NEWSWEEK - TEACHING HACKERS ETHICS Read 6 times = Teaching Hackers Ethics = Newsweek/January 14, 1985 by Dennis A. Williams = = with Richard Sandza = [Word Processed by BIOC Age
ETHICS.TXT
þ']%%+f! ! )19AIQYai ÿ TES Presents - The Ethics of Hacking - written by Dissident I went up to a college this summer to look around, see if it was where I wanted
EVASIV.TXT
Distributed by: Assailant's Blade and Ford Prefect The Inspectors Thoughts How many times have you had the need to be able to sneak up on somebody, enter a building unnoticed, or simp
EXEGUIDE.TXT
Executive Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible for
FAST.TXT
= = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = = = =
FBIAFTHA.HAC
The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the 'hack
FBICOMPU.HAC
Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright (c) 1986 Capitol Information Association. All rights reserved. Permission is
FBISYS.TXT
From the Illumi-Net BBS Decatur, GA Conspiracy Theory Conference 404-377-1141 Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright
FCSCVOL1.HAC
FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME I Protection Profile Development Version 1.0 December 1992 This document is undergoing review and is subject to modificatio
FCSCVOL2.HAC
FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME II Registry of Protection Profiles Version 1.0 December 1992 This document is undergoing review and is subject to modificat
FDDI.HAC
Learning to Appreciate Tokens: How do FDDI internals work? FDDI Networks feature a counter-rotating, dual fiber optic ring. The primary ring circulates in one direction; the secondary
FDP1.TXT
. The Griffin . Presents:
FDP2.TXT
Uploaded By: THE GRIFFIN . The Griffin . Presents:
FH.TXT
Fuckin' Hacker 2.0 ~ A 2AF Presentation Written by: Hypnocosm Released: June 10, 1987 'It's just a fuckin' hacker!' AN OVERVIEW Fuckin' Hacker is a code-hacking piece of software. Anyone who
FINDHOLE.TXT
Subject: Security holes manifest themselves in (broadly) four ways. Date: 11.10.93 ( Please contribute by sending E-Mail to scott@santafe.edu . ) [quoting from the comp.security.unix
FIREWALL.TXT
@BEGIN_FILE_ID.DIZA text abou‚]t Internet f˜–irewalls. @END_FILE_ID.DIZ ++ |
FREEBIE3.HAC
INFOLIST - 90 CHURCH STREET - BOX 2517 - NY, NY 10008 Version 3.1 Version 3.1 CompuFreebies
FREECIS.TXT
FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
FTP-PA~1.TXT
Some problems with the File Transfer Protocol, a failure of common implementations, and suggestions for repair. By David Sacerdote (davids@secnet.com April, 1996) FTP servers can oper
FTPBOUNC.TXT
Subject: The FTP Bounce Attack Date: 12 Jul 1995 03:50:50 EDT This discusses one of many possible uses of the 'FTP server bounce attack'. The mechanism used is probably well-known, bu
FUNWITH5.HAC
Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a pri
GARAGHAK.TXT
Article 329 of alt.cyberpunk.tech: Xref: grayhawk alt.cyberpunk:2269 alt.cyberpunk.tech:329 Subject: Finally, Garage Door Opener Hacker Plans!!! (Long) Date: 3 Apr 92 06:08:07 GMT Sen
GETINFO.TXT
-The Hackers' Guide To Investigations - - Presented by HALE, Originators - - of -
GISDOC.HAC
Hacking the GIS computer Compliments of the Realm of the UNHOLY (xxx) xxx-xxxx This is about the GIS computer. This computer is actually a time sharing system designed to give High Sc
GOODBYE.ANA
The Best of The Station By: The Prowler - Mace Substitute - 3 PARTS: Alchohol 1/2 PARTS: Iodine 1/2 PARTS: Salt Or: 3 PARTS: Alchohol 1 PARTS: Iodized Salt (Mortons) It's not actual
GOODKIDS.HAC
Computer Hackers are Good People Too! I am writing this artical in hopes of dispelling the general idea that all Hackers are terrible teenagers that dwell on Electronic Mischief! Most
GOVTHLP.TXT
00:02:47 TO SEE: ENTER: INFORMATION SERVICES LEGIS, FLOOR, GRANTS-CONTRACTS, GPRO, ECON, or BUDGET ADMINISTRATIVE SERVICES SCHEDULE, MAIL, TELEDEX, KASEWORK, USED
GS1.TXT
THE GS/1 USER'S
GTE.HAC
No description yet
GTE.TXT
No description yet
GUIDE.DOC
The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess
GUIDE.TXT
The LOD/H Presents
GUIDEDOC.HAC
The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess
GUIDEHAK.TXT
THE NEOPHYTE'S GUIDE TO HACKING
HACETHIC.TXT
TES Presents | The Ethics of Hacking | written by Dissident I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about
HACK.FAQ
#hack FAQ #HACK FAQ EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ! THE FAQ SUFFERED FROM A FLOPPY DISK CRASH. I BELIEVE I HAVE CORRECTED ALL ERRORS RESULTING FROM THE C
HACK.HAC
H.ACKING A.ND C.OMPUTER K.RASHING VOLUME NO. 9 BY GREY WOLF
HACK.LEG
NOVEMBER 7, 1990 C:\TEXT\NETWORK1.TXT A PROPOSAL TO JOIN THE CORPORATE WORLD AND THE COMPUTER UNDERGROUND WITH A PEACEFUL, LEGAL SOLUTION by FATAL ERROR I have conceived a
HACK1.HAC
THE BASICS OF HACKING: INTRO THE FIRST OF A SET OF ARTICLES: AN INTRODUCTION TO THE WORLD OF THE HACKER. BASIC
HACK2.HAC
BASICS OF HACKING I: DECS'S WELCOME TO BASICS OF HACKING I: DEC'S. IN THIS ARTICLE YOU WILL LEARN HOW TO L OG IN
HACK4.HAC
THE BASICS OF HACKING III: DATA WELC
HACK5.HAC
==)P to Pause, S to Stop (== = = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = =
HACK6.HAC
Hacking Voice Mail Systems Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it work
HACK7.TXT
was writen shortly after my arrest. I am currently groupless, having resigned from the Racketeers, so ignore the signoff. The Conscience of a Hacker. by The Mentor . 1/8/86 Another on
HACK9.HAC
Hacking Control Data Corporation's Cyber This article will cover getting into and using NOS (Networking Operating System) version 2.5.2 running on a Cyber 730 computer. Cybers general
HACK9301.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 1 for January, 1993 || Report Date:
HACK9302.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 2 for February,1993 || Report Date:
HACK9303.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 3 for March, 1993 || Report Date: M
HACK9304.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 4 for April, 1993 || Report Date: A
HACK9305.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 5 for May, 1993 || Report Date:
HACK9306.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 6 for June 1993 || Report Date:
HACK9307.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 7 for July 1993 || Report Date:
HACK9309.RPT
|| From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 9 for September, 1993 || Report Da
HACK9401.RPT
|| From the files of The Hack Squad: || Compiled by W.H. (Bill) Lambdin || Volume 3, Issue 1 The Hack Report || Report Date: January 29. 1994 for Jan/Feb, 1994 || || Welcome to the fi
HACKACR.HAC
The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by:MERCENARY Version Five [Sep/02/1992] In n
HACKAD.TXT
(A brief bit of humor from the September, 1990, issue of ANALOG SCIENCE FICTION/SCIENCE FACT MAGAZINE) Are You Bored? In a Rut? Looking for a New Career? If so, we have the answer to
HACKCOS.TXT
LEX LUTHOR $ $ AND $ $ THE LEGION OF DOOM! $ $
HACKCRAK.TXT
THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-RELEASED SPRING EDITION OF 2600 MAGAZINE, THE HACKER QUARTERLY. ARTICLE ONE: AN OVERVIEW A year ago, we told t
HACKDICT.TXT
= A = abbrev: -breev'/, -brev'/ n. Common abbreviation for `abbreviation'. ABEND: [ABnormal END] /ah'bend/, -bend'/ n. Abnormal termination (of software); {crash}; {lossage}. Derives
HACKER.TST
Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. It has gone through many revisions prior to t
HACKER01.TXT
NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MA
HACKER03.TXT
The Hacker's Guide to the Galaxy: A collection phone numbers Compiled by Atari Pirates, Inc. Voice lines 213-372-6244/Dial-A-Joke 818-765-2000/Dial-A-Joke 213-765-2000/Jokes 818-882-9
HACKER1.TXT
Diary of a Hacker Part 1 What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. Th
HACKER11.TXT
HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cab
HACKERS.PAR
From rop@neabbs.UUCP Sun Apr 2 09:28:48 1989 To: RISKS@KL.SRI.COM Date: Thu Mar 30 02:00:20 1989 Subject: Galactic Hacker Party GALACTIC HACKER PARTY 2nd, 3rd, 4th of August 1989 PARA
HACKFAQ.HAC
Summary: This posting contains a list of Frequently Asked Questions (and their answers) about hacking. It should be read by anyone who wishes to post to the alt.2600 newsgroup or use
HACKGUID.TXT
- Little Hackers Guide - by Szpaq - version minus 1.00 - Add to this file whatever you know interesting about hacking and post it Contents 1. Disassembling Windows .HLP files 2
HACKHOLL.TXT
TITEL : HACKING IN HOLLAND AUTEUR : ROP GONGGRIJP DATUM : 18/10/88 UPLOAD DOOR: ROP GONGGRIJP UPLOADDATUM: 18/10/88 TREFWOORDEN: HACKING, ENGELS, PHREAK BEWERKT : 18/10/88 ROP IN 'T K
HACKHP2.HAC
bioc agent 003's tutorial in ===============
HACKING.DOX
Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILAB
HACKING.TAP
Ok I'm back up at 3 o'clock in the morning to bring you another article Many of us out there think of ourselves as hackers but what is a REAL hackerWell for those of you out there tha
HACKING.TXT
Ctrl-S to Stop/Start Ctrl-C to Cancel Alliance Presents: 'TRW Information' File #5 By: Type A' Maniac Thanx: The Hacker Bonker
HACKINGA.TXT
Hacking Bank Of America's
HACKINGC.TXT
WELL LETS SEE HERE, MOST THINGS I HAVE SEEN HAVE 6-10 DIGITS RIGHT? YET CREDIT CARDS HAVE AROUND 20 DIGITS, WHY? WELL ITS NOT NECESSARY OF COURSE FOR A CREDIT CARD TO HAVE THAT MANY,
HACKINGE.TXT
HACKING ECONET SYSTEMS / SJ. FILESERVERS LEVEL 3 AND ABOVE 1987 - AGC Written by: Jack Death Concept: Zapper Greets to: WDG, Leck, Pay, HJR, JAS, Mr 'WooD', ZZKJ, SPODS Things to try
HACKINGI.TXT
About :COMPUTERWORLD AD. From :MARK HAMILL To :ALL Date :10/15/84 (NOTE, THIS IS A REAL AD. TRY IT!) FROM A COMPUTERWORLD AD: DEAR HACKERS: .WE AT MICROFRAME HAVE DEVELOPED A DEVICE T
HACKINGT.TXT
HACKING THE LEXINGTON :- -: AIR FORCE COMPUTER I don't know much about it
HACKIN~1.HAC
HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life Since I have always felt that Baton Rouge was at a loss for GOOD hackers, I have taken it upon myself to educate th
HACKIRC.TXT
Hacking IRC - The Definitive Guide Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide
HACKNET.DOX
The Novell Network Hacking Guide By PeRSeUs/LoRd psYChobeTa of EmC Hey what'z up ?!? When my computer science teacher put up his new toy in our class, novell network 3.x, i knew that
HACKNET.TXT
Subj:How to Hack your school's network To:All interested hackers Keywords:Hacking, Novell, Network, Dumb Sysop Bitch Well, here it is. Information on how to hack your schools network.
HACKPCP.HAC
The Weenie Warriors Weenie Warrior # 1 - The Pa
HACKPROD.TXT
þáGâþ þárotherhood of Gíds and âetardsþ 'How to Hack Prodigy' By Desolated Dream áGâúBL/´DEúNULLúTLHSúTLPSIIúKRONiCKúHcH Prodigy is one of the easiest things in the world to hack. all
HACKPROF.TXT
HACKER PROOF DOORS! It is possible. There is a basic flaw in doors that RBBS doesn't cover. The RBBS program doesn't keep users from uploading '.BAT' files. Consider this: RBBS has th
HACKQUIZ.TXT
TITLE: THE HACKER TEST - Version 1.0 (LONG) Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. I
HACKSONG.TXT
The Hacker's Song By Dave Touretzky and Don Libes (with no apologies whatever to Monty Python) I'm a hacker and I'm OK I work all night and I sleep all day. I wrote some hacks in APL,
HACKSYND.HAC
++ ! ! ! The Hacker Syndrome ! ! =================== ! ! By Tad Deriso ! !
HACKTALK.TXT
This article is being presented through the StarBoard Journal of the FlagShip/StarShip SIGs (Special Interest Groups) on De
HACKTERM.TXT
[ HEaT ] [ HackroNyms V.2.10 ] [Page 1] [ By Rad Man ] A.A.A. - Aces of ANSi Art AMEX - AMerican EXpress ANI - Automatic Number Identification [security type ph. c
HACKTIPS.HAC
Space aborts, ^S pauses ======= ======= ======= HACKING TIPS #2 ======= ======= ======= ======= by Hoe Hopper ======= ======= REBEL ALLIA
HACKTIPS.TXT
From Lan Times, 08 Feb 1993 TIPS FOR TRACKING HACKERS Hackers will make mistakes or leave traces in four areas: 1. Inbound- While attempting to break into a network through a private
HACKTUT.TXT
Hacking Tutorial Courtesy of the Jolly Roger What is hacking? According to popular belief the term hacker and hacking was founded at mit it comes from the root of a hack writer,some
HACKUNLM.HU1
The Mickey Mouse Club Presents. _ _ _
HACKUSA!.HAC
Filename: Hacking USA Hackin' USA I was in the 'fast lane' of computer hacking for about 3 or 4 years (more than enough) and am now semi-retired. It is now time to pass the torch to t
HACKWARN.HAC
]=]=] A warning to hackers [=[=[ Recently, here in Cherry Hill, NJ, a BBS system by the name 'Hackers Heaven' was closed down by police. The sysop(s) and users of this system were tra
HACKWWIV.HAC
( Hacking into WWIV, Second Edition by Vision (updated by Weasel) WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. However, goo
HACKWWIV.TXT
Hacking into WWIV, Second Edition by Vision WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. How
HACK_CIS.TXT
The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGyver 6-22-91 OUR
HACK_EM.HAC
_ _ THE BASICS OF HACKING: INTRO _
HACK_S.TXT
r112 (View: hackalot.dir 20 UPLOADED BY: U/L BY:LORD CALADON [CTRL-S PAUSES/SPACE=QUIT] %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % HARRY HACKALO
HACK_THS.TXT
NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MA
HAIBM370.TXT
How to take control of your local IBM VM/370 system Writt
HAKDIC.TXT
The Hacker's Dictionary A Guide to the World of Computer Wizards Guy L. Steele Jr. Donald R. Woods Raphael A. Finkel Mark R. Crisp Richard M. Stallman Geoffrey S. Goodfellow The Menu
HAKMEDIA.TXT
Hackers in the Media, List start: 10/28/92 - Doomsday. Sneakers, Fall '92 'mysterious crypto black box that deciphers anything' WarGames, Spring 1984(5?) Computer Whiz breaks into Nor
HANDBOOK.TXT
\ Hacking CompuServe: / \ All you need to know / \ By: / \
HASHISH.TXT
HASHISH The Exotic Elixir By: Ezrider Welcome, Allow me to usher you into the den of tranquility. We shall utilize Hashish as our guide to exotic places. as the aroma fills your head,
HCKR_HND.TXT
Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because
HD.HAC
Summary of Hacker Supreme's Hacki
HD01.HAC
[ HACKERS DIRECTORY VOLUME #1 ] [ COMPLIED FOR YOU BY: HACKER SUPREME MEMBERS, ] [ NINJA SQUIRREL /+\, and LOGAN - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] Chapter
HD02.HAC
[ Hackers Directory volume 2 ] [ Complied for you by: ] [ Hacker Supreme, The Cartel ] [ and The 'NIN TEMPLE'. ] [ Ninja Squirrel /+\ . ] [ Logan - 5 . ] [
HD03.HAC
[ HACKERS DIRECTORY VOLUME 3 ] [ COMPILED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL ] [ And THE 'NIN TEMPLE'. ] [ Master - NINJA SQUIRREL /+\ ] [ Hack Copyright: Hacker Supreme 19
HD04.HAC
[ HACKERS DIRECTORY VOLUME 4 ] [ COMPLIED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL, ] [ And THE 'NIN TEMPLE'. (Elite) ] [ MASTER - NINJA SQUIRREL /+\ ] [ Hack Copyrigh
HHACKING.IIX
- CAT-HACK - - VOL I - - FROM : - -/\/\/\/\/\- THE /\/\YSTERY %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WELCOME TO CAT-HACK VOL I PREFACE: THIS IS THE OFFICIAL NEWS LETTER OF CAT HACKERS TH
HIS-HP.TXT
A BOM SQUAD RELEASE / / The History Of \ \ Hacking Phreaking / \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ By Raven - Okay boys and
HOHO93CZ.HAC
This file will appear in a future cDc publication. December, 1993 Loosely based on the Exploits of HoHoCon 1993. All experiences are relativ
HOMEBANK.HAC
Hacking Bank Of America's
HOMEBANK.TXT
Hacking Bank Of America's
HORROR_S.TOR
HACKING HORROR STORIES These are the responses to my ARPANET post of 27 October 82. If reading any of the stories below inspires you to send your own, please do! I will continue to up
HP20001.HAC
== BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20002.HAC
== BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20003.HAC
== BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20004.HAC
== BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20005.HAC
== BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP30.TXT
This file was downloaded from: _ _ _ / /_/ _/ / _/\ \ /
HP3000.HAC
% Ctrl-S Pauses/Space Quits % Uploaded By: [GALACTUS]=- }======================================= = = = hacking the hp 3000 =
HP3000.TXT
[0;35m [0;35mTHE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE
HP3000G.HAC
THE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE! (aka Flatl
HP3000_T.HAC
No description yet
IBM370.HAC
How to take control of your local IBM VM/370 system Writt
IBMHACK.HAC
File: HACKING THE IBM - PART 1 Hacking the I.B.M. By John Doe Part I Preface: Yes, that's right. This series of articles will deal with how to hack the I.B.M. We're not talking abo
ICON4U.NRG
++ | ICoN HaCKiNG | Written By úäïäâGYú | | | WiTH LoSER ACCESS! | ++ Here is a way to hack school ICoN systems with a gene
ID-BIZ.TXT
How to have a profitable ID business By: MR. Puff N' Stuff Original Inspiration by : The Walking Glitch WARNING THIS DOCUMENT IS FOR INFORMATIONAL AND EDUCATIONAL PURPOSES ONLY. THE A
IDENTITY.TXT
How To Create A New Indentity By The Walking Glitch Courtesy of the Jolly Roger! You might be saying, 'Hey Glitch, what do I need a new identity for?' The answer is simple. You might
IIRGACR8.TXT
The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by: MERCENARY Version Eight [05/16/1993] Mer
IIU-004.TXT
phile #4 - IIU 1990 Hacking on the compuserve information service typed by darkness Ever wonder what the hell compuserve is? Ever wonder how to get into it? Ever wonder why the russia
ILLINET.TXT
Dial Access to ILLINET Online Terminal Settings Up to 9600 Baud (auto-adjusts to caller's modem speed 300-9600 baud Parity EVEN Word length of 7 bits 1 stop bit Full Duplex (Echo On
INET2000.TXT
The [RoT]=- Introduction to Hacking The iNET 2000 Online Service )()()()()()()()()()()()() Written by Deicide on 04/05/93 INTRODUCTION iNet 2000, or as marketing people like to call i
INFO3.GPH
++ ! HOW TO GET ANYTHING ON ANYBODY ! ! PART III ! ! ! ! MORE INFO-GATHERING. ! +-
INFOAM.TXT
Exploring Information-Ameri
INFORMER.HAC
TRI : The Remote Info
INNERC.TXT
BLINDMAN'S BLUFF, HACKER STYLE From, Out of the Inner Circle, by Bill Landreth. THE SCENE: The control room in the computer center of one of the largest corporations in the world - an
INNERCIR.HAC
HACKING TECHNIQUES Typed By: LOGAN-5 (Hacker Supreme) From the Inner Circle Book ) C
INTERCEP.HAC
THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US A
INTERCPT.TXT
The High Tech Hoods Presents. PAGER, FAX, AND DATA INTERCEPT TECHNIQUES
INTERNET.HAC
No description yet
INTTEL.HAC
European Computers % % % % list #1 as compiled by % % % % Kerrang Khan % % % %%%%%%%%%%%%%%%%%%%%%%%
IPD.HAC
Countries connected to the International Packet Switching Stream ++ ++
IPHIJACK.TXT
Simple Active Attack Against TCP Laurent Joncheray Merit Network, Inc. 4251 Plymouth Road, Suite C Ann Arbor, MI 48105, USA Phone: +1 (313) 936 2065 Fax: +1 (313) 747 3185 E-mail: lpj
IRCHACK.HAC
Submitted by: Weasel Here is a something about hacking irc. If you like it put it if not then don't. I think you'll like it though.Good page by the way. Very nice. Nice layout and eve
ISSM201.HAC
The Information Systems Security Monitor
ISSM202.HAC
The Information Systems Security Monitor
ISSM204.HAC
Information Systems
ISSM301.HAC
Information Systems
ISSM302.HAC
Story #1 Volume 3 Number 2 April 1993 Story #2 In This Issue NLM Anti-Virus Review Team Virus Alert Retrac
ISSM303.HAC
Information Systems
ISSM304.HAC
Information Systems
JARGON~1.HAC
#========= THIS IS THE JARGON FILE, VERSION 2.9.11, 01 JAN 1993 =========# This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tra
JAVABUGS.TXT
JAVASCRIPT PROBLEMS I'VE DISCOVERED These have all been reported back to Netscape. The press had a spotty record of reporting correctly on this. I've prepared a small report on the st
JAVAINSE.TXT
X-Digest: RISKS DIGEST 17.77 Subject: Java security problems Date: Sun, 18 Feb 1996 23:57:02 -0500 We have discovered a serious security problem with Netscape Navigator's 2.0 Java imp
JUL93BLT.TXT
CSL BULLETIN July 1993 CONNECTING TO THE INTERNET: SECURITY CONSIDERATIONS This bulletin focuses on security considerations for organizations considering Internet connections. Spurred
KFYI-593.HAC
kfyi-593.pt Kim Kommando Show 5-22-93 Segment One Cast of Speakers: KK: Kim Kommando MR: Mind Rape MY: Mercury B : Bruce : Any caller A : Announcer Intro Music. A : And now another ho
KNOW.TXT
HOW I KNEW WHEN I WAS HA
LDD.TXT
How to Hack into CIS 3 = Amex 4 = Visa 5 = Mastercharge For How to Make CC#'s For a VISA: Make the First 4#'s 4019 or 4128 and the last number 0012 like: 4019 0190 1450 0012 4128 0190
LICENSE.ASC
Guerilla Guide to Licensing Software DRAFT VERSION 0.1 Abstract This short article discusses the weaknesses of various licensing schemes to control the use and distribution of Unix so
LNOISE.HAC
Modem Noise Killer (alpha version) With this circuit diagram, some basic tools including a soldering iron, and four or five components from Radio Shack, you should be able to cut the
LODHBASI.HAC
The LOD/H Presents
LOGONCBI.HAC
.hac N I Z A T I O N P R E S E N T S XXXXXXXXXXXX XXXXXXXXXXXX XX XXXX XX XX XXXX XX XXX XX XXX XXX XX XXX XXXX XXXX XXXX XXXX XXX XX XXX XXX XX XXX XX XX
LOGONCBI.TXT
T H E X O R G A N I Z A T I O N P R E S E N T S 'HOW TO LOGIN TO A C.B.I. SYSTEM' WRITTEN BY: L.E. PIRATE THANKS TO: ZANGIN The following is the login procedure to login to a C.B.I. s
LONGPASS.TXT
Longer Passwords On Password Security Dr. (Bob) Wallis, recently commented on having faster implementations of DES available and suggested using a site dependant number of iterations
MAILBOX.HAC
Mailbox Systems Mailbox systems are the link between information and the underworld. If you have ever called one, then you will know the advantages of having one, especially the ones
MAIN.FRA
= =- MAIN FRAMES =- =- THE PIRATE CLUB/1200 = AMERI
MCI.TXT
25 - - - MCI Mail Access Numbers - - - - Courtesy Of - - The Swamp - - (414)-353-8369
MCIMAIL.HAC
File: HACKING MCI MAIL Read 25 times - = = - MCI MAIL: The Adventure Continues - = [2600 Ju
MCISPRIN.T
HINTS ON HACKING- : : : : SPRINT,MCI,TELENET NUMBERS : :
MGTGUIDE.TXT
Management Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible fo
MICKEYD.TXT
P TO PAUSE S TO STOP
MICRRISK.HAC
No description yet
MILINET.1
3. (0) NOSC-CC, (2) LOGICON, (3) NPRDC 8. (0) NRL, (1) NRL-AIC, (3) NRL-TOPS10, (6) NRL-ARCTAN, (7) NRL-CSS 13. (1) GUNTER-ADAM, (2) GUNTER-TAC 14. (0) CMU-CS-B 16. (0) AMES-TSS, (1)
MILNET.TXT
@BEGIN_FILE_ID.DIZ /\ _ / U \/ _ / / ? \ \\ / \/ How to use the American Military Net @END_FILE_ID.DIZ FEATURES OF THE TAC ACCESS CONTROL SYSTEM (TACACS) To log in to the
MILNET1.HAC
Finally it's here
MISM1.HAC
How to get anything on anyone Part 1By Toxic Tunic
MISM10.HAC
(taken from the book How To Get ANYTHING ON ANYBODY) By Lee Lapinrewritten by Woman Watcher for P-80- )
MISM20.HAC
MASTERING THE
MISM42.HAC
Atlantis BBS 215/844-8836 (Private)
MOB.TXT
The THC Hack/Phreak Archives: MOB.TXT (176 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong
MODBOOK1.TXT
No description yet
MODBOOK2.TXT
No description yet
MODBOOK3.TXT
No description yet
MODBOOK4.TXT
No description yet
MODBOOK5.TXT
No description yet
MORALITY.HAC
File: HACKER MORALITY Read 33 times A lesson in phreaking and hacking morality: I find it truly discouraging when people, intelligent people seeking intellectual challenges, must reve
MORESTUF.TXT
Feature Sections - Menu : : [1].Krakowicz's Kracking Korner [2].Software Documentation [3].Software Documentation Vol.2 [4].Telecommunications Info [5].
MORPRIME.HAC
RVEC Parameters and DMSTK Format A Telecom Computer Security Bulletin File _
MRSTS.HAC
THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided th
MTEMPIST.HAC
THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US A
NETWORKS.PHK
File: Inter-Net Mail Help ANOTHER TELECOMMUNICATIONS PHILE FROM THE ARCHIVES OF THE PRIVATE SECTOR BBS (201) 366-4431, OFFICIAL B
NEUROMAN.PWD
courtesy of diachun@autarch.acsu.buffalo.edu Here is a list of DataBases and passwords for NEUROMANCER. Password notation: 1) = level one passwd 2) = level two passwd [coded passwd]-d
NEWID.HAC
New Identity Method 'A': A How-to ManualBrought to you by SSB G-files, Inc. 1) Go to a cemetary, the baby section. Find a baby who has lived for less than 1 day (his birthdate and dea
NEXTBUGS.TXT
CA-90:06 CERT Advisory October 2, 1990 NeXT's System Software This message is to alert administrators of NeXT Computers of four potentially serious security problems. The information
NFS_TR~1.TXT
NFS Tracing By Passive Network Monitoring Matt Blaze Department of Computer Science Princeton University mab@cs.princeton.edu ABSTRACT Traces of filesystem activity have proven to be
NOTE9309.TXT
|| The Hack Report || Notes on the for September, 1993 || September 1993 Issue || As most of you will realize, this month's issue was late again. It seems that every time
NOVELL.HAC
Date and Time: 09-26-1992 at 03:21:58 Originated By: Brett Warthen (BRETT @ INFINIE) There have been some discussions on various mailing lists over the past couple of weeks regarding
NOVHACK.TXT
Having Phun With Novell Brought 2 U by: Lord Foul/Decay 13th July
OCFBER.1
[Note: OCF is the Open Computing Facility at UC Berkeley.] Bylaws of the OCF. 1. The General Manager and the Site Managers cannot appoint directors except when the OCF is not in sessi
OCFBER.2
[Note: OCF is the Open Computing Facility at UC Berkeley.] The OCF Constitution As ratified or amended by votes of the OCF membership: 3 February 1989 Preamble We, the computer using
ORANGE.TXT
orange-boot.txt: No such file or directory % cat orange.boo orange.boo: No such file or directory % cat orange-book.txt CSC-STD-001-83 Library No. S225,711 DEPARTMENT OF DEFENSE TRUST
ORGS.HAC
COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a me
ORGS.TXT
COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a me
OUTDIAL.LST
Eastern Western Net Runner Overdose The Knight .
OUTDIA~1.HAC
npa ip address instructions 218 aa28.d.umn.edu~ type 'cli' then 'rlogin modem' then 'modem 129.72.1.59~
PACBELL.LST
Pacific Bell Computer Systems Telephone Numbers For Pactime-A Computers (Logon instructions are at the end) AREA TERMINAL TEL NUMBER TEL NUMBER Los Angeles 300 BPS
PACNET.HAC
PACNET AND KEEPING IN TOUCHInformation on connectionTo help with phreaking into the Pacnet system, the following information is offered for your use.Pacnet is a network that lets you
PACTIMEA.TXT
Pacific Bell Computer Systems Brought to you by Another Hacker (^) The Elite Phreaker's Group (^) Telephone Numbers For Pactime-A Computer (Logon instructions are at the end) AREA TER
PASSHACK.TXT
The THC Hack/Phreak Archives: PASSHACK.FXR (157 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights b
PCHACK.TXT
==== The PC Hacking FAQ ==== Version 2.0 7/10/96 Written By Olcay Cirit, olcay@libtech.com DISCLAIMER: The author of this text disclaims all liability whatsoever
PCPHACK.PHK
The Weenie Warriors Weenie Warrior # 1 - The Pa
PCPHACK.TXT
The THC Hack/Phreak Archives: PCPHACK.TXT (245 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights be
PCPOLD.PHK
How to Use Telenet's PC Pursuit Service |_ |_ _ (View: pc pursuit phreakin/f/ove
PCPURSUE.TXT
PcPursuit Outdia
PCPURSUI.YES
PC PURSUIT AND TELENET LOCAL ACCESS NUMBERS FOR THE MOST UP-TO-DATE LISTING OF THE PC PURSUIT U.S. ACCESS TELEPHONE NUMBERS, DO THE FOLLOWING: 1. USE A MODEM TO DIAL 1-800-424-9494 WI
PDP11.HAC
Pdp-11 Basic plus pr
PENTAGON.TXT
Finally it's here
PH.TXT
P-Hack Documentation Page 1 | P-Hack 1.0 Documentation. | Hello everyone, and thanks for trying P-Hack. I think that all you SERIOUS phreaks out there will find this as usefull and gr
PHONECOM.NFO
Becoming More Informed. It was Sunday, January 19th, 1992. I was sorting through the local News Journal Paper and I discovered an article of interest in the local section. 'Hackers do
PRIME.HAC
help HELP command-name to get information on that command $$ Stores batch job submittal options inside command file Command file comment lines ABB
PRIMECPL.HAC
_ An Introduction to PRIMOS CPL Directives Written by Necrovore A Telecom Computer Security Bulletin File _
PRIMOS.HAC
FULL INFORMATION ON THIS TYPE OF SYSTEM. THE FOLLOWING NOTATION WILL BE USED CR CARRIAGE RETURN, RETURN OR ENTER (CHR$(13)) ^ A CONTROL CHARACTER LIKE ^C (BREAK, RUN STOP, OR CHR$(3))
PW-HACK.TXT
HIT Inc. Presents ® The Art of Password Hacking! ¯ PASSWORD HACKING: A FOREWORD Password hacking is one of the major parts of hacking. At one time or another, you will have to g
RAMCOMM.HAC
This number was posted on The V0iD (482-6356) by Redline, and I figured it was worth a try to mess around with it. RAM Communications is a paging system run off a side channel of WZOU
RAMPART1.HAC
!!WHACKOLAND!WHACKOLAND!! W W H - HACKING RAMPART - H A SYSTEMS PT. I A C C K INTRODUCTION K O
RAMPART2.HAC
!WHACKOLAND!WHACKOLAND! W HACKING RAMPART W H SYSTEMS H A A C PART II. C K K O IN DE
RCAGLOBE.TXT
13 (CTRL-S STOP/START SPACE TO EXIT) THE WASTELANDS (216)-442-5432 THE RCA NETWORK:PART I BY THE TELEX TROOPERS THE RCA NETWORK IS A SERVICE PROVIDED TO MANY COMPANIES FOR THEIR@TELEX
REVBLT.HAC
NCSL BULLETIN OCTOBER, 1990 REVIEW OF FEDERAL AGENCY COMPUTER SECURITY AND PRIVACY PLANS (CSPP): A SUMMARY REPORT Sensitive information and information resources have become increasin
RIMEMAN.HAC
RIME USERS GUIDE INTRODUCTION This manual deals with how you, as a user, can realize the most from the RIME network. It was written in response to your requests and will hopefully ans
RIPCO.TXT
DR. RIPCO SEIZURE COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. On May 8, 1990, Agents of the United States Secret Service, along with police and telephone company secur
RISKS.TXT
The text comes from a data file written by and for IC members. HACK YOUR OWN CODES. Don't leech from someone else. Having codes is like having sex, if you don't protect yourself you'l
RISKTOOL.HAC
RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW The National Institute of Standards and Technology (NIST) and the National Computer Security Center (NCSC) have cooperatively established
ROWDY_DL.MAN
MANUAL TO VERSION 1.1 OF THE ROWDY DIALER (By RowdyB) 1st Release: April '93 Please don't hesitate to bother me at either: at073@cleveland.freenet.edu or: RowdyB@utopia.hacktic.nl for
RSPWD.NEW
root: password = H0iJKNsCCsiuk lastupdate = 726979743 flags = daemon: password = bin: password = sys: password = adm: password = uucp: password = guest: password = nobody: password =
RSTS.HAC
THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided th
RSTS1.HAC
ShadowSpawn BBS Presents. HACKING THE RSTS/E SYSTEM \\\ \\\ \\\ \\\ VOLUME I
RSTS2.HAC
ShadowSpawn BBS Presents. INSIDE RSTS/E VOL. II INSIDE RSTS/E by: THE MARAUDER THE COUNCIL OF THE FEDERATION In this volume, i will discuss some of the basic bugs in RSTS/E that can b
RSTS3.HAC
ShadowSpawn BBS Presents. INSIDE RSTS/E VOLUME III BY: THE MARAUDER THE COUNCIL OF THE FEDERATION The information in this document is intended for informational purposes only COPYRIGH
RSTS4.HAC
ShadowSpawn BBS Presents INSIDE RSTS/E VOLUME IV By: The Marauder The Legion of Hackers ! The information in this document is intended for informational purposes only Written - Decemb
RSTS_OZ.HAC
:-: : : : M A K I N G T H E M O S T O F : :
RSX11.HAC
)_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
RSX11M.TXT
)_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
RUHACKER.TXT
Are You a Hacker? by ReDragon Take a little quiz for me today. Tell me if you fit this description. You got your net account several months ago. You have been surfing the net, and you
SANATM~1.HAC
12/25/90 | | | = Town Criers Posting Board ==- | |
SATELIT3.TXT
SATELLITE SCRAMBLING SYSTEMS THE TRUTH FILMNET VIDEO: Satpac - AUDIO: Digital By XL This is a very simple system to hack video wise. All that Filmnet do is to remove the s
SATELITE.TXT
:Satelite Frequencies:=- Edited and Compiled by: Sir Francis Drake The 135-138 MHz rang is know as the satelite band as most satelites broadcast here. However there are exceptions. Fr
SCA-AAA.TXT
AAA - ACCESS ALL AREAS Computer Security Hacking Conference 1st - 2nd July, 1995 (Saturday Sunday) King's College, London, UK Written by Scavenger sca@advantage.co.za In march 1995 I
SCANPRG.TXT
TES Presents | What To Look For In A Code Hacking Program | written by Dissident Phreaking's getting tricky these days, ain't it? Ok, there are two groups of things a code hacker shou
SECRETS2.HAC
Big Secrets.Volume #2 % %_% % % % By - The
SECRETS3.HAC
- Big Secrets No. 3 - By The Wyvern = Preface = You, volume 3 is here!!! Guess what we'll be talking about in volume 3? Well he
SECRET~1.HAC
I N T R O D U C T I O N January 1990 One day, while raiding my parents attic, I came across some old books we had enjoyed as children. 'YOUNG'S DEMONSTRATIVE TRANSLATION OF SCIENTIFIC
SECURDEV.TXT
Technical Hacking
SECURITY.FY8
Network Working Group P. Holbrook Request for Comments: 1244 CICNet FYI: 8
SECURITY.TXT
/ \ P R O F E S S O R F A L K E N ' S / /
SEQUENCE.TXT
Sequence Number Attacks By Rik Farrow Kevin Mitnick's alleged attack on Tsutomu Shimomura's Computers used a vulnerability in TCP/IP and mistaken trust. Questions regarding this artic
SHA.HAC
No description yet
SHADEC.TXT
THE USE OF A DECSERVER DOCUMENTATION BY THE CHIEF FOR SWEDISH HACKERS ASSOCIATION S.H.A. AND I.H.A. FILE #7 FEBRUARY 1990 x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/ LOGGING INTO TH
SHAHEWL.TXT
Swedish Hacking Association presents Hacking Hewlett Packard series 3000 computers Part one Written by Mr Big Copyright (c) 1990 by Swedish Hacking Association This file will help you
SHAPROT3.TXT
SWEDISH HACKERS ASSOCIATION PRESENTS 1990 THE 3rd PROTOCOL 1990 EDITORS : LIXOM BAH : MR BIG : PHEARLESS : THE CHIEF
SHW0293.ASC
Syndicated Hack Watch Column 02-93 (March 93) Title: Red Hot Dutch To Be Banned? This royal throne of kings, this scepter'd isle, This earth of majesty, this seat of Mars, This other
SHW0394.ASC
Syndicated Hack Watch - 03:1994 - -
SHW0494.ASC
Syndicated Hack Watch - 04:1994 - -
SHW0593.ASC
Red Hot Television Is Banned In a debacle that mirrors the 'Spycatcher' case of a few years ago, Red Hot Television's attempt at stopping the UK Heritage Secretary's proscription orde
SHW0893.ASC
Syndicated Hack Watch 08:93 The Start Of The War Sky had suffered its most devastating hack to date. Its security was demolished and the MultiChannels package was about to be introduc
SHW0993.ASC
Syndicated Hack Watch - 09:1993 - -
SHW0994.BBS
Syndicated Hack Watch - 09:1994 - -
SHW1093.ASC
Syndicated Hack Watch - 10:1993 - -
SKEY.TXT
Description of The S/KEY One-Time Password System Neil M. Haller nmh@thumper.bellcore.com Philip R. Karn karn@chicago.qualcomm.com ABSTRACT The S/KEY one-time password system provides
SKEYFL.TXT
VULNERABILITIES IN THE S/KEY ONE TIME PASSWORD SYSTEM Author: Mudge _ This may be redistributed as long as proper credit is maintained. In o
SNOOP.TXT
Abstruse Authors of Merca Presents Data Snooping : the Right Way
SSAN.HAC
SUBJECT: The Social Security Number SSA has continually emphasized the fact that the SSN identifies a particular record only and the Social Security Card indicates the person whose re
SSN-STUF.TXT
From ucdavis!ucbvax!RED.RUTGERS.EDU!AWalker Fri Nov 13 18:33:17 PST 1987 Article 136 of misc.security: From: AWalker@RED.RUTGERS.EDU ( Hobbit ) Subject: Yet more about SS numbers Date
SSNUM.ANA
File: ABOUT SS NUMBERS Read 13 times OFTEN MANY OF YOU MAY BE IN A POSITION OF NEEDING TO DO AN INFORMATION SEARCH ON AN INDIVIDUAL. IT IS SOMTIME A BIG HELP TO KNOW WHERE SOMEONE ORI
STARMAST.TXT
The Reign of Terror RoT guide to HACKING THE GANDALF STARMASTER (also known as PACX or Access Server) written by Deicide 05/22/93 INTRODUCTION This entire tphile is based on my knowle
STUPIDKI.HAC
DURING THE PAST EIGHT YEARS, I HAVE BEEN HEAVILY INVOLVED WITH 'BULLETIN BOARD' SYSTEMS RUNNING ON MICROS AND MAINFRAMES. I'D LIKE TO GIVE A FEW EXAMPLES OF THE DESTRUCTIVENESS OF MAN
SUN413.TXT
From tmk@uhunix.uhcc.Hawaii.Edu Thu Jun 30 08:54:17 EDT 1994 Subject: How to improve security on a newly installed SunOS 4.1.3 system. Summary: How to improve security on a newly inst
SUPERD.TXT
No description yet
SYS75.HAC
The Complete Guide to Definity G Series Systems AKA System 75 - 85 Written by: Scott Simpson June 18, 1992 Greets to: Invalid Media, The Missing Link, Randy Hacker, Dark Druid, Nickod
TCSB.03
_ ItaPac - A Brief Introduction Written by Blade Runner on 08/11/88 A Telecom Computer Security Bulletin File
TCSB.04
_ An Introduction to PRIMOS CPL Directives Written by Necrovore on 09/02/88 (Revised on 09/10/88) A Telecom Computer Security
TCSB.05
_ An Introduction to Packet Switched Networks Part I Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulletin
TCSB.06
_ An Introduction to Packet Switched Networks Part II Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulleti
TCSB.08
_ Your Personal Phone Security Written By King Lucifer (Alias Byteman) on 8/10/88 A Telecom Computer Security Bulletin File
TCSB.11
_ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
TCSB.12
_ Expansion of the Z80 CPU Chip Written by King Lucifer (Alias Byteman) on 9/10/88 A Telecom Computer Security Bulletin File V
TECHHACK.HAC
A Guide To: Systems.
TECHNICL.TXT
No description yet
TELE3.TXT
TELENET SCANNING
TELE5.HAC
[ ==-HACKING TELENET=] by:- The Flash Uploaded by Elric of Imrryr For Those Who Like Living Dangerously: These are Telenet access codes. Telenet is a system by which one can access al
TELECODE.TXT
TELENET CODES 5/01/88 HACKED OUT BY !ZORON! ABBREVIATION LIST ^ = CNTRL UNK = UNKNOWN C.B. = CITIBANK C/C/M = CITICORP MANAGER REF = REFUSED COLLECT CALL @ CONNECTION | CONNEC
TELECOMM.TXT
An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Som
TELEINFO.TXT
r74 Display what file? pr_ _ \/ Tommy's Holiday Camp +1 604 598-4259 \/ Tommy's You're in System Hacking Philes [-Files-][?][Q][ t Display what file? teleneth.t
TELENET.HAC
Telenet The Secret Exposed. For years, people and myself, have offtend tried to'work telenet unto a coma' With no success, for the past few years, i have gathered data, and finally kn
TELENET.TXT
File: TELENET DIRECTORY ( TELENET DIRECTORY ) C 20120-VM 370 ONLINE C 20124 C 20125-NJIT EIES C 20130 C 20133 C 20138 C 20148 C 20154 C 20165
TELENET2.TXT
TELENET INFORMATION Command: 2 ==)- P TO PAUSE S TO STOP -(== 'TELENET TERMINAL IDENTIFIERS' THIS IS A LIST OF THE TERMINAL IDENTIFIERS FOR TELENET AND THE SYSTEM TYPES THEY REPRESE
TELENETH.TXT
An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Som
TELENETI.PHK
Here are instructions for using TELENET. There are some very basic things, which most people already know, and some other things, which even the most dedicated hackers have probably n
TELLERMA.TXT
CRACKINGAUTOBANKTELLER MACHINES Downloaded by the Suspect Most auto teller machines require an ID card to retrieve money. The circuit ry inside the machines has been made mo re sophis
TELNETSN.TXT
TELENET SCANNING
TELTERMZ.TXT
Terminal Identifiers The following tables matches Terminal numerical IDs (telenet parmater 23) Generic and Specific Terminal Identifiers. ID # Generic Term ID Terminal Type (note) -
TEMPEST.HAC
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo frm 'the threat of information theft by reception of electromagnetic radiation from rs-232 cables.' computers and security, 9(199
THUGLAN1.HAC
Introduction to Hacking into LANs
THUGLAN1.TXT
Introduction to Hacking into LANs
THUGLAN2.TXT
General Information on LANs (Topologies, Etc.)
TIMENET.TXT
The THC Hack/Phreak Archives: TIMENET.TXT (170 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights be
TNET1.TXT
Tymnet File #1 Courtesy of -:The Twilight Phone:- TYMNET INFORMATION SERVICE Welcome to TYMNET's Information Service! TYMNET is the world's largest Public Data Network, w
TNET2.TXT
Tymnet File #2 Courtesy of -:The Twilight Phone:- TYPE THE NUMBER OF THE DESIRED MENU ITEN FOLLOWED BY A CARRIAGE RETURN:1 COMPANIES PROVIDING DATA BASE OR TIMESHAR
TNET3.TXT
Tymnet File #3 Courtesy of the -:Twilight Phone:- COMMUNICATION PRODUCTS VERIFIED BY TYMNET TYMNET is the 'PC Friendly Network.' To make it easier for you to use
TOPS20.TXT
Notes On Tops-20 Systems by The Blue Archer and The Legion of Hackers! Notes in brackets require the brackets.(2) This is just a basic overlay of the tops-20(Dec-20) And it's commands
TRANSDIR.TXT
The Legion of Doom/Legion
TRASH.TXT
DUMPSTER DIVING COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. In light of the recent debates regarding the various activities of the ``hacking community and it various m
TRASHING.ROT
Reign of Terror [ R o T ] presents. the art of TRASHING a how to guide for one of the most useful tools in hacking today Written by: Deicide /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
TRIAD187.HAC
The Triad A 3-In-1 Text File Magazine .'Concepts to Educate the Educated'. Volume 1, Issue 1 November Issue, 1987 Chapter 1: Introduction to The Triad (Its purpose and Goals) Chapter
TTYSPOOF.TXT
TTY SPOOFING by SubEthan I know what you are going to say. 'THAT WAS ALREADY COVERED BY VAXBUSTER IN PHRACK-41!' Yeah, I know, but if you would shut your mouth for long enough and pay
TYMENET.HAC
TYMNET TECHNICAL AND USER DOCUMENTATION Tymnet provides for our customer use technical and user documentation. This directory lists the documentation available along with a brief desc
TYMNET.TXT
PACKET NETWORKS I written and compiled BY THE DIGITAL-DEMON (C) DEC. 29, 1990 Wel
TYMNET96.TXT
March 11, 1994 BT-GNS TYMDIAL 9.6 WORLDWIDE ACCESS DIALUP ACCESS M PROV 100'S BPS N NODE CITY ST CNTRY DENS 3 12 24 96 ACCESS NO. P COMMENTS -
TYM_ODS.TXT
+-TymNet OutDials Sorted By Area Code+-Page 1-+ :NPA ST OUTDIAL CITY :NPA ST OUTDIAL CITY : ++
UKGUIDE.HAC
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo The Guide to Online Databases For U.K. Users ( ) denotes UK Users have special benefits Prestel. Time charge 7p/min 0800-1800 Mon
UNINETA.PHK
THE SOUTH POLE[312] 677-7140 - U N I N E T - THIS IS THE 5TH OPTION - ALONG WITH TELENET, TYMNET, SOURCENET, AND STC'S WATS LINES - IN TYING YOUR PERSONAL
UNIXWRAP.TXT
TCP WRAPPER Network monitoring, access control, and booby traps. Wietse Venema Mathematics and Computing Science Eindhoven University of Technology The Netherlands wietse@wzv.win.tue.
USENETHI.TXT
Advanced Usenet Hi-jinks - To specifically cancel someone else's article, you need its message-ID. Your message headers, in addition to what's already there, should also contai
USRGUIDE.TXT
Computer User's Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is responsibl
VENDORS.HAC
Security Vendors This list was prepared by the National Computer Security Association. It lists 480 vendors of security products and services. Vendors are listed alphabetically by com
VERSTELL.ANA
Here's some neat fun to have on versatellers in your city. Call the versateller network center and tell them the machine is dammaged. Tell them you have a problem with the machine.if
VMBHACK.TXT
Disclaimer: By continuing to read past this point you are hereby agreeing that this information is for interest value onl
VTHACK1.TXT
The VT Hacker by The Mad Hermit Welcome to the first installment of the hackers' corner. In this 'electronic magazine', I will be speaking out on various issues relating to computers,
VTHACK2.TXT
VT Hacker #2 courtesy of The Mad Hermit Well, there's some old news, so let's get it out of the way. The Novice menu stuff has changed slightly. Options 8-12 are no longer active. in
VTHACK3.TXT
Well, it's time for yet another installment in Virginia Tech hacking. Yes, it's VTHACK #3!!!! Brought to you by the Mad Hermit and crew. This time, we're going to focus on the OTHER b
WANGHACK.HAC
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo %+ %+
WANINFO.TXT
Unauthorised Access UK 0636-708063 Jester Sluggo presents an insight on Wide-Area Networks Part 1 Part 1 contains information on ARPANET and CSNET. Part 2 contains information on BITN
XEROX.HAC
Hacking: X E R O X
XMUX.TXT
The =RoT= Guide To GANDALF XMUX'S Written by: Deicide NOTE: While writing this file i assumed that the reader has a working knowledge of Packet-Switching Networks(Such as Sprintnet, T
YANOFF.TXT
SPECIAL INTERNET CONNECTIONS: LAST UPDATE 5/16/94 Compiled by: Scott Yanoff - yanoff@csd4.csd.uwm.edu Copyright 1994 Scott Yanoff. No changes are to be made to this document without t
ZEN.HAC
From annaliza@netcom.com Ukn Dec 1 23:30:29 1993 Received: from mail.netcom.com (netcom3.netcom.com [192.100.81.103]) by kaiwan.kaiwan.com (8.6.4/8.6.4) with ESMTP id XAA29728 for bud
ZEROKNOW.TXT
From gregmi@galileo.mis.net Sat Oct 12 23:31:23 1996 Date: Sat, 03 Aug 1996 22:39:21 -0400 To: netware-hack@dey-systems.com Subject: Draft of 'A Few Attacks on the Zero Knowledge Stat
ZIPPASS.TXT
Article 357 of sci.crypt: Xref: vpnet comp.compression:174 sci.crypt:357 Subject: Re: Security of PKZIP's encryption Date: 2 Apr 91 07:08:10 GMT References: 1991Mar26.150049.20882@ath
The views and opinions stated within this web page are those of the
author or authors which wrote them and may not reflect the views and
opinions of the ISP or account user which hosts the web page. The
opinions may or may not be those of the Chairman of The Skeptic Tank.