1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-05 22:37:37 +02:00
Files
mirror-textfiles.com/hacking.html

740 lines
110 KiB
HTML
Raw Permalink Blame History

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Hacking Textfiles</H1>
<P>
Around the 1970's, the term "hacking" meant any deep interest in computers
that manifested itself in programming or learning arcane aspects of the
machinery or operating systems. By the early 1980's, this meaning morphed
into a general term of fear to describe anyone who did anything even remotely
evil using computer equipment. The people who considered themselves
non-malicious "Hackers" decried this bastardization of the term they took
with pride, and the new name "cracker" arrived, years after that name
applied to people who removed copy protection from home video games.
By the late 80's to early 90's, no one cared too much, except for the
people who care about everything too much.
<P>
In other words, these textfiles are all about hacking.
<P>
In accordance with this spirit, anything involving subverting any technology,
for good or evil, is placed here. Unless, of course, you're talking about
telephones, at which point you should go over to
the <A href="phreak.html">phreaking</A> section.
<P>
If you're looking for electronic hacking magazines, go check out the
<A HREF="magazines.html">magazines</A>. Additionally, you might also check the
<A HREF="groups.html">groups</A> section if your file was written by someone who
was part of a group.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/BIBLIOGRAPHIES.html">BIBLIOGRAPHIES</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Lists of Articles and Books about Hackers and Hacking</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/CABLE.html">CABLE</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles about Cable TV and Cable TV Piracy</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/COLORBOOKS.html">COLORBOOKS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Purported Department of Defense Computer Security Guidelines</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/CONVENTIONS.html">CONVENTIONS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B> Information about different Hacking Conventions</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/INTERNET.html">INTERNET</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Files Dealing With Hacking on the Internet</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/MICROSOFT.html">MICROSOFT</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Files Dealing with Hacking Windows and DOS</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/POLICIES.html">POLICIES</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Various Ethics and Policies of Computing Facilities Nationwide</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/UNIX.html">UNIX</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles About Exploring or Exploiting UNIX</B></TD></TR>
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/VMS.html">VMS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles About Exploring or Exploiting VMS and VAXes</B></TD></TR>
<TR><TD>&nbsp;</TD></TR>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/22.txt">22.txt</A> <tab to=T><TD> 4999<BR><TD> DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/23things.txt">23things.txt</A> <tab to=T><TD> 2342<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600-9-3.txt">2600-9-3.txt</A> <tab to=T><TD> 144176<BR><TD> 2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600_ind">2600_ind</A> <tab to=T><TD> 96106<BR><TD> 2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600faq.011">2600faq.011</A> <tab to=T><TD> 169226<BR><TD> Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/386i.txt">386i.txt</A> <tab to=T><TD> 1920<BR><TD> CIAC Advisory Notice: Authentication bypass in Sun 386i machines
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/5600.txt">5600.txt</A> <tab to=T><TD> 84069<BR><TD> Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aahack.txt">aahack.txt</A> <tab to=T><TD> 3112<BR><TD> Anarchy Anonymous: Hacking your School Network
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/accesblt.hac">accesblt.hac</A> <tab to=T><TD> 20551<BR><TD> Advanced Authentication Technology, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/accessin.txt">accessin.txt</A> <tab to=T><TD> 14070<BR><TD> A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acro01.txt">acro01.txt</A> <tab to=T><TD> 4538<BR><TD> Max Headroom's Hacker Acronym List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acro02.txt">acro02.txt</A> <tab to=T><TD> 5532<BR><TD> Max Headroom's Second Collection of Acronyms
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acrolist.phk">acrolist.phk</A> <tab to=T><TD> 8181<BR><TD> Acronym List, Early 1990s
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acroynym.txt">acroynym.txt</A> <tab to=T><TD> 30296<BR><TD> The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/adssys.txt">adssys.txt</A> <tab to=T><TD> 10048<BR><TD> A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aio.box">aio.box</A> <tab to=T><TD> 2485<BR><TD> All in One Box, by Disk Doctor
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aio5b.txt">aio5b.txt</A> <tab to=T><TD> 6588<BR><TD> AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ais.txt">ais.txt</A> <tab to=T><TD> 15248<BR><TD> AIS: The Automatic Intercept System by Computer Consoles Incorporated
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aix.fun">aix.fun</A> <tab to=T><TD> 778<BR><TD> Warning to download some AIX Patches
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/allnet01.txt">allnet01.txt</A> <tab to=T><TD> 3939<BR><TD> Hacking Allnet by Shadow Warrior (January 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/amhack.txt">amhack.txt</A> <tab to=T><TD> 12374<BR><TD> Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ansibomb.txt">ansibomb.txt</A> <tab to=T><TD> 10496<BR><TD> ANSI Bombs II: Tips and Techniques, by The Raging Golem
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aohell.phk">aohell.phk</A> <tab to=T><TD> 1071<BR><TD> Why I wrote AOLHell
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aoim.txt">aoim.txt</A> <tab to=T><TD> 1725<BR><TD> The Risks of Using an AOL Client Behind a Firewall
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aolhak.txt">aolhak.txt</A> <tab to=T><TD> 9252<BR><TD> How to Hack America on Line by the Hooded Bobs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/as400cmd.hac">as400cmd.hac</A> <tab to=T><TD> 27788<BR><TD> IBM AS/400 Command Summary
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/as400cmd.txt">as400cmd.txt</A> <tab to=T><TD> 28178<BR><TD> All IBM AS/400 Commands by The Might
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen.txt">aspen.txt</A> <tab to=T><TD> 16772<BR><TD> A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen1.txt">aspen1.txt</A> <tab to=T><TD> 16843<BR><TD> A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen2.txt">aspen2.txt</A> <tab to=T><TD> 11053<BR><TD> A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/assolink.txt">assolink.txt</A> <tab to=T><TD> 11949<BR><TD> An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/at&amp;arebl.txt">at&arebl.txt</A> <tab to=T><TD> 2965<BR><TD> Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atlas.txt">atlas.txt</A> <tab to=T><TD> 4938<BR><TD> Hackers' Atlas, by Ragon/Wynvern/BOF
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm-92.txt">atm-92.txt</A> <tab to=T><TD> 20096<BR><TD> ATMS: The Real File for ATM Theft in 1992 by The Raven
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm-more.txt">atm-more.txt</A> <tab to=T><TD> 20049<BR><TD> A Whole Collection of the Risks of ATM Cards (1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm.txt">atm.txt</A> <tab to=T><TD> 8167<BR><TD> Hacking ATM's by Blue Thunder
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm1.txt">atm1.txt</A> <tab to=T><TD> 2773<BR><TD> The Disk Jockey Presents Scamming ATMs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atma.hac">atma.hac</A> <tab to=T><TD> 22036<BR><TD> Quick OVerview of ATM Security (Needs Editing)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmapps.txt">atmapps.txt</A> <tab to=T><TD> 1771<BR><TD> "Gee Whiz" ATM Applications are On the Horizon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmfile">atmfile</A> <tab to=T><TD> 21290<BR><TD> ATM secret codes, from Fred Gindburg (July 10, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmhacking.txt">atmhacking.txt</A> <tab to=T><TD> 5742<BR><TD> Hacking ATMs, by Anonymous
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atms">atms</A> <tab to=T><TD> 14827<BR><TD> An Overview of ATMs and Information on the Encoding System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atms.txt">atms.txt</A> <tab to=T><TD> 20384<BR><TD> Track Layouts on ATM Cards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/auditool.txt">auditool.txt</A> <tab to=T><TD> 12681<BR><TD> Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austhack.hac">austhack.hac</A> <tab to=T><TD> 7324<BR><TD> Australian Dialups
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac0.txt">austpac0.txt</A> <tab to=T><TD> 14674<BR><TD> Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac1.txt">austpac1.txt</A> <tab to=T><TD> 11953<BR><TD> Additional AUSTPAC Character Terminal Manual
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac2.txt">austpac2.txt</A> <tab to=T><TD> 20338<BR><TD> AUSTPAC General Information and Codes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac3.txt">austpac3.txt</A> <tab to=T><TD> 15830<BR><TD> The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autohack.txt">autohack.txt</A> <tab to=T><TD> 5504<BR><TD> Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autonet1.txt">autonet1.txt</A> <tab to=T><TD> 11411<BR><TD> Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autotelldoc.ana">autotelldoc.ana</A> <tab to=T><TD> 5439<BR><TD> Fun with Automatic Tellers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon1.hac">autovon1.hac</A> <tab to=T><TD> 2230<BR><TD> Introduction to the Automated Voice Network (Autovon) by Shadowrunner
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon2.hac">autovon2.hac</A> <tab to=T><TD> 3387<BR><TD> Introduction to the Automated Voice Network (Autovon) Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon3.hac">autovon3.hac</A> <tab to=T><TD> 1809<BR><TD> Introduction to the Automated Voice Network (Autovon) Part III
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovoni.nst">autovoni.nst</A> <tab to=T><TD> 19395<BR><TD> Overview of the Automatic Voice Network (Autovon)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/avoidcap.txt">avoidcap.txt</A> <tab to=T><TD> 2576<BR><TD> Planning Ahead for Phone Phreaks/Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/babyna.mes">babyna.mes</A> <tab to=T><TD> 203893<BR><TD> The Moby Words Database (List of Words) (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/backdoor.txt">backdoor.txt</A> <tab to=T><TD> 19156<BR><TD> How to Hold Onto UNIX Root Once You Have It
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bankhack.txt">bankhack.txt</A> <tab to=T><TD> 12641<BR><TD> The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic.net">basic.net</A> <tab to=T><TD> 14775<BR><TD> Basic Networking, by Sk8 the Skinhead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic1.hac">basic1.hac</A> <tab to=T><TD> 7491<BR><TD> The Basics of Hacking I: DECs By the Knights of Shadow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic3.hac">basic3.hac</A> <tab to=T><TD> 4349<BR><TD> The Basics of Hacking III: Data General By the Knights of Shadow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basicnet.hac">basicnet.hac</A> <tab to=T><TD> 14534<BR><TD> Basic Networking (1989) by Sk8 The SkinHead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basics">basics</A> <tab to=T><TD> 16646<BR><TD> Rambug's Hacking Volume #1 by Rambug
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bbsfiles.txt">bbsfiles.txt</A> <tab to=T><TD> 38272<BR><TD> The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bd-tv5.txt">bd-tv5.txt</A> <tab to=T><TD> 7439<BR><TD> Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bindery.txt">bindery.txt</A> <tab to=T><TD> 4201<BR><TD> Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/boahack.txt">boahack.txt</A> <tab to=T><TD> 6686<BR><TD> Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/boces.txt">boces.txt</A> <tab to=T><TD> 6957<BR><TD> The Slipped Disk takes over the BOCES Computer: A Log
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bom-hh&amp;p.txt">bom-hh&p.txt</A> <tab to=T><TD> 9785<BR><TD> The History of Hacking and Phreaking by Raven of BOMB Squad
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/books.txt">books.txt</A> <tab to=T><TD> 41728<BR><TD> Biblography of Computer Security Books (1973 through 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/brute.txt">brute.txt</A> <tab to=T><TD> 3462<BR><TD> BRUTE: A brute force approach to hacking Unix passwords. Version 1.html
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/btinfo.h-k">btinfo.h-k</A> <tab to=T><TD> 14037<BR><TD> BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/c64fun1.txt">c64fun1.txt</A> <tab to=T><TD> 2927<BR><TD> Suggestions On What to Do with a Commodore 64, by Nightstalker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/callcard.phk">callcard.phk</A> <tab to=T><TD> 1734<BR><TD> Hacking Calling Cards, by The Pyromaniac
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/candyland.faq">candyland.faq</A> <tab to=T><TD> 4823<BR><TD> The Candyman Explains How He Will Accept Explosives Files
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/carcodes.txt">carcodes.txt</A> <tab to=T><TD> 3358<BR><TD> Codes Used by Computers in Cars
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cb1.txt">cb1.txt</A> <tab to=T><TD> 3407<BR><TD> Citibank Hacking, by Johnny Hundu
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cb2.txt">cb2.txt</A> <tab to=T><TD> 2145<BR><TD> Small Rant about Hacking Citibank
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbiinfo">cbiinfo</A> <tab to=T><TD> 19013<BR><TD> Using and Abusing CBI by The Ghost
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbrsp-1.hac">cbrsp-1.hac</A> <tab to=T><TD> 6075<BR><TD> The Cyberspace Chronicle Volume 1 by Phardak
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbvhack.pnk">cbvhack.pnk</A> <tab to=T><TD> 6694<BR><TD> CBV Hacking by PiNK ToRPeDo (June 7, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbvhack.txt">cbvhack.txt</A> <tab to=T><TD> 5754<BR><TD> CBV Hackin' by Pink Torpedo (June 7, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chahelp_.txt">chahelp_.txt</A> <tab to=T><TD> 9164<BR><TD> Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos01.txt">chaos01.txt</A> <tab to=T><TD> 1609<BR><TD> The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos02.txt">chaos02.txt</A> <tab to=T><TD> 2577<BR><TD> The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos03.txt">chaos03.txt</A> <tab to=T><TD> 4264<BR><TD> The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chilton1.txt">chilton1.txt</A> <tab to=T><TD> 7970<BR><TD> Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/china02doc.hac">china02doc.hac</A> <tab to=T><TD> 23257<BR><TD> China Newsletter #02 (Hacking/Phreaking File Compilation)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/church4.ptl">church4.ptl</A> <tab to=T><TD> 9611<BR><TD> Church Chat Volume 4 by The Spiker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cis.phk">cis.phk</A> <tab to=T><TD> 6583<BR><TD> Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cisagain.txt">cisagain.txt</A> <tab to=T><TD> 6192<BR><TD> Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cisinfo4.txt">cisinfo4.txt</A> <tab to=T><TD> 8104<BR><TD> Compuserve Information by Morgoth and Lotus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ciss3.txt">ciss3.txt</A> <tab to=T><TD> 18816<BR><TD> List of Access Numbers to the Compuserve Information Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/citibank.txt">citibank.txt</A> <tab to=T><TD> 6226<BR><TD> Hacking into Citibank with Johnny Hindu
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/citibank2.txt">citibank2.txt</A> <tab to=T><TD> 6430<BR><TD> Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cjack.faq">cjack.faq</A> <tab to=T><TD> 4837<BR><TD> Cracker Jack FAQ Written by kM (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/codphone">codphone</A> <tab to=T><TD> 3842<BR><TD> Coda-Phones by D.T. Legna
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/com_sec90.hac">com_sec90.hac</A> <tab to=T><TD> 54579<BR><TD> United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/com_sec91.hac">com_sec91.hac</A> <tab to=T><TD> 15590<BR><TD> United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compserv.txt">compserv.txt</A> <tab to=T><TD> 6337<BR><TD> Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compus.txt">compus.txt</A> <tab to=T><TD> 3286<BR><TD> Free Compuserve Passwords, by Devious Xevious
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compuser.txt">compuser.txt</A> <tab to=T><TD> 27008<BR><TD> A Quick Compuserve Index
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compusin.txt">compusin.txt</A> <tab to=T><TD> 1386<BR><TD> Some Compuserve Tips, by Eric Diamond
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compusrv">compusrv</A> <tab to=T><TD> 5599<BR><TD> Compuserve Hacking by The Locksmith
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/concis.txt">concis.txt</A> <tab to=T><TD> 3488<BR><TD> Free Compuserve Access
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/contact.txt">contact.txt</A> <tab to=T><TD> 5246<BR><TD> How to Contact the HACK SQUAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/copier.hac">copier.hac</A> <tab to=T><TD> 10206<BR><TD> Magnetic Stripes, by Count Zero
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cops-rl">cops-rl</A> <tab to=T><TD> 23583<BR><TD> RL C.O.P.S. File by Brian Oblivion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos.hac">cosmos.hac</A> <tab to=T><TD> 10942<BR><TD> C O S M O S, by Doctor Who
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos1.txt">cosmos1.txt</A> <tab to=T><TD> 7458<BR><TD> Hacking into COSMOS by Wizard of OZ
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos2.hac">cosmos2.hac</A> <tab to=T><TD> 9608<BR><TD> Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos3.hac">cosmos3.hac</A> <tab to=T><TD> 8320<BR><TD> The 1986 COSMOS Files Part III by Sir William
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/crackam1.txt">crackam1.txt</A> <tab to=T><TD> 63466<BR><TD> Hacking Programs on the Amiga by FunToHack
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/crackdwn.txt">crackdwn.txt</A> <tab to=T><TD> 26230<BR><TD> Crackdown, from 2600 Magazine volume 7, number 1 SPRING
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/creditfr.txt">creditfr.txt</A> <tab to=T><TD> 8914<BR><TD> The Adventures in Fraud Series Volume I, by Sneak Thief (1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/credunin.con">credunin.con</A> <tab to=T><TD> 1314<BR><TD> Numbers of Credit Unions and protection Agencies
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cs.hac">cs.hac</A> <tab to=T><TD> 2815<BR><TD> How to Get a Free Account on Compuserve
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cs.txt">cs.txt</A> <tab to=T><TD> 2944<BR><TD> How to Get a Free Compuserve Account
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/csl8_93.hac">csl8_93.hac</A> <tab to=T><TD> 12359<BR><TD> CSL Bulletin 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cuthesis.txt">cuthesis.txt</A> <tab to=T><TD> 154635<BR><TD> The Social Organization of the Computer Underground by Gordon R. Meyer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cyber.txt">cyber.txt</A> <tab to=T><TD> 11505<BR><TD> The Cyberpunk Movement by Pazuzu of DnA May 12, 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cyberhac.txt">cyberhac.txt</A> <tab to=T><TD> 11078<BR><TD> Hacking Control Data Corporation's Cyber, by The Ghost
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/data.tap">data.tap</A> <tab to=T><TD> 3604<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/data_gen">data_gen</A> <tab to=T><TD> 1574<BR><TD> Captain Crunch talks about hacking Data General Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/database.txt">database.txt</A> <tab to=T><TD> 3142<BR><TD> CIRR Database: A tool for Corporate Research
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datakit.hac">datakit.hac</A> <tab to=T><TD> 14409<BR><TD> How to connect across VCS/ISN boundaries
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datanet.doc">datanet.doc</A> <tab to=T><TD> 6670<BR><TD> The Basics of TELENET
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.hac">datapac.hac</A> <tab to=T><TD> 15579<BR><TD> A Guide to DataPAC by The Fixer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.inf">datapac.inf</A> <tab to=T><TD> 12170<BR><TD> Technical Guide to DataPac by the New Dark Council (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.txt">datapac.txt</A> <tab to=T><TD> 14413<BR><TD> A Guide to DataPAC by The Fixer (April 18, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac1.txt">datapac1.txt</A> <tab to=T><TD> 16626<BR><TD> A Guide to DataPAC version 1.html by The Fixer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac2.txt">datapac2.txt</A> <tab to=T><TD> 19480<BR><TD> Datapac 3101 ITI Parameters Description
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac3.txt">datapac3.txt</A> <tab to=T><TD> 2430<BR><TD> Datapac 3101 Public Outdial Ports
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datatap.txt">datatap.txt</A> <tab to=T><TD> 4109<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datatapp.txt">datatapp.txt</A> <tab to=T><TD> 4088<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn01.txt">ddn01.txt</A> <tab to=T><TD> 2993<BR><TD> DDN Security Bulletin #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn03.hac">ddn03.hac</A> <tab to=T><TD> 11207<BR><TD> Defense Data Network Security Bulletin #3
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn04.hac">ddn04.hac</A> <tab to=T><TD> 3143<BR><TD> Defense Data Network Security Bulletin #4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn05.hac">ddn05.hac</A> <tab to=T><TD> 4295<BR><TD> Defense Data Network Security Bulletin #5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn06.hac">ddn06.hac</A> <tab to=T><TD> 3015<BR><TD> Defense Data Network Security Bulletin #6
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddnet1.txt">ddnet1.txt</A> <tab to=T><TD> 8294<BR><TD> DDN: Information on the Defense Data Network from Unauthorized Access UK
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddnet2.txt">ddnet2.txt</A> <tab to=T><TD> 2421<BR><TD> DDN: The Defense Data Network (A Map)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/debtcard.txt">debtcard.txt</A> <tab to=T><TD> 3730<BR><TD> Harvard Medical School Installs ISDN-Based Debit Card System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dec10.txt">dec10.txt</A> <tab to=T><TD> 23846<BR><TD> Hacking the DEC-10 System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dec_200.txt">dec_200.txt</A> <tab to=T><TD> 3239<BR><TD> The Decserver 200 Revealed by Surf Studd (October 23, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defaults.txt">defaults.txt</A> <tab to=T><TD> 6726<BR><TD> Hacking into a Variety of Systems by using their Default Accounts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defcon.info">defcon.info</A> <tab to=T><TD> 26112<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defconadd.hac">defconadd.hac</A> <tab to=T><TD> 11951<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defdb.hac">defdb.hac</A> <tab to=T><TD> 77311<BR><TD> Department of Defense Federal Data Bases (List)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defense.hac">defense.hac</A> <tab to=T><TD> 10447<BR><TD> Defense Data Network Blues by Harry Hackalot
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defense.txt">defense.txt</A> <tab to=T><TD> 10198<BR><TD> Defense Data Network Blues by Harry Hackalot (1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defnetbl.txt">defnetbl.txt</A> <tab to=T><TD> 10501<BR><TD> Defense Data Network Blues by Harry Hackalot (August 31, 1983)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/demystif.txt">demystif.txt</A> <tab to=T><TD> 3871<BR><TD> Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/denning.txt">denning.txt</A> <tab to=T><TD> 59865<BR><TD> Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/des.txt">des.txt</A> <tab to=T><TD> 22528<BR><TD> The Data Encruption Standard (DES) Fact Sheet
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desblt.txt">desblt.txt</A> <tab to=T><TD> 24448<BR><TD> The Data Encryption Standard (DES) June 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desval.hac">desval.hac</A> <tab to=T><TD> 3149<BR><TD> DES Validation List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desval.txt">desval.txt</A> <tab to=T><TD> 3905<BR><TD> DES Validation List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialback.txt">dialback.txt</A> <tab to=T><TD> 10113<BR><TD> Dial-Back Isn't Always Secure (February 28, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialog.txt">dialog.txt</A> <tab to=T><TD> 8142<BR><TD> Inside Dialog by Control C of Advanced Telecommunications Inc.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialog01.txt">dialog01.txt</A> <tab to=T><TD> 8543<BR><TD> Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialout1.txt">dialout1.txt</A> <tab to=T><TD> 67840<BR><TD> A Novice Manual on Using Outdial Modems by Blue Adept
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialplus.txt">dialplus.txt</A> <tab to=T><TD> 4830<BR><TD> A Screengrab of Informaiton on PSS DialPlus from British Telecom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialup.hac">dialup.hac</A> <tab to=T><TD> 18816<BR><TD> List of Dialups. For what? I have no idea.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/disclaim">disclaim</A> <tab to=T><TD> 2875<BR><TD> Da Disclaimer, by Filbert
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/diskopt">diskopt</A> <tab to=T><TD> 6706<BR><TD> My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/djns.txt">djns.txt</A> <tab to=T><TD> 2377<BR><TD> Inside DJNS (Dow Jones News Service)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dlog-rdt">dlog-rdt</A> <tab to=T><TD> 44883<BR><TD> Complete Guide To The DIALOG Information Network by Brian oblivion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dnicinf.hac">dnicinf.hac</A> <tab to=T><TD> 13312<BR><TD> D A T E X - P - International Traffic Relations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dowjones.txt">dowjones.txt</A> <tab to=T><TD> 2570<BR><TD> Inside Dow Jones News Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacbas.txt">dpacbas.txt</A> <tab to=T><TD> 9468<BR><TD> The Basics of DataPAC by Mister X (February 2, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacintr.rot">dpacintr.rot</A> <tab to=T><TD> 37561<BR><TD> Introduction to DataPac from the Right of Terror and Deicide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacnuas.txt">dpacnuas.txt</A> <tab to=T><TD> 92595<BR><TD> The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dtsb.hac">dtsb.hac</A> <tab to=T><TD> 8894<BR><TD> DEC Terminal Server Basics by Mad Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easyl.hac">easyl.hac</A> <tab to=T><TD> 3968<BR><TD> Hacking Easy Link I by Professor Falken
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easylink.hck">easylink.hck</A> <tab to=T><TD> 2399<BR><TD> Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easylink.txt">easylink.txt</A> <tab to=T><TD> 4686<BR><TD> Hacking Easy-Link I by Professor Falken
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/edit.txt">edit.txt</A> <tab to=T><TD> 17792<BR><TD> Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ena!.hac">ena!.hac</A> <tab to=T><TD> 7877<BR><TD> The ENA Vision: What IS Ena?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/encyclop.txt">encyclop.txt</A> <tab to=T><TD> 1502<BR><TD> Someone Makes fun of That Stupid Article
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/eproms.hac">eproms.hac</A> <tab to=T><TD> 5566<BR><TD> A Closer Look at EEPROMS by The Kingpin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/eslf0006.txt">eslf0006.txt</A> <tab to=T><TD> 57267<BR><TD> The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ess.txt">ess.txt</A> <tab to=T><TD> 7153<BR><TD> Electronic Switching System by Black Knight, from 2600, Feb. 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ethics.hac">ethics.hac</A> <tab to=T><TD> 3692<BR><TD> Newsweek: Teaching Hackers Ethics
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ethics.txt">ethics.txt</A> <tab to=T><TD> 5148<BR><TD> The Ethics of Hacking by Dissident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/evasiv.txt">evasiv.txt</A> <tab to=T><TD> 7297<BR><TD> The Inspector's Thoughts, by Assailant's Blade and Ford Prefect
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/exeguide.txt">exeguide.txt</A> <tab to=T><TD> 23552<BR><TD> An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fast.txt">fast.txt</A> <tab to=T><TD> 5301<BR><TD> Hacking McDonalds, by Herb the Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbiaftha.hac">fbiaftha.hac</A> <tab to=T><TD> 16896<BR><TD> The FBI Fights Computer Crime
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbibust">fbibust</A> <tab to=T><TD> 6199<BR><TD> The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbicompu.hac">fbicompu.hac</A> <tab to=T><TD> 5225<BR><TD> Summary of FBI Computer Systems, by Ralph Harvey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbicompu.txt">fbicompu.txt</A> <tab to=T><TD> 5246<BR><TD> Summary of FBI Computer Systems By Ralph Harvey (1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbisys.txt">fbisys.txt</A> <tab to=T><TD> 5281<BR><TD> Summary of FBI Computer Systems, by Ralph Harvey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcisacc.txt">fcisacc.txt</A> <tab to=T><TD> 3550<BR><TD> Getting Free Compuserve Access, by The Wanderjahr
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcscvol1.hac">fcscvol1.hac</A> <tab to=T><TD> 641496<BR><TD> Federal Criteria for Information Technology Security Volume I
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcscvol2.hac">fcscvol2.hac</A> <tab to=T><TD> 566236<BR><TD> Federal Criteria for Information Technology Security Volume II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fddi.hac">fddi.hac</A> <tab to=T><TD> 2156<BR><TD> How to FDDA Internals Work? Learning to Appreciate Tokens
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fdp1.txt">fdp1.txt</A> <tab to=T><TD> 12668<BR><TD> The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fdp2.txt">fdp2.txt</A> <tab to=T><TD> 13449<BR><TD> The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/feds">feds</A> <tab to=T><TD> 3702<BR><TD> Watching the Watcher Watching You, by Sir Knight of OSUNY BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fh.txt">fh.txt</A> <tab to=T><TD> 49876<BR><TD> Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/findhole.txt">findhole.txt</A> <tab to=T><TD> 16372<BR><TD> Security Holes Manifest Themsleves in Four Ways (November 10, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/findho~1.txt">findho~1.txt</A> <tab to=T><TD> 16384<BR><TD> The Four Ways Security Holes Manifest Themselves (November 10, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force1.txt">force1.txt</A> <tab to=T><TD> 27946<BR><TD> Force Files Volume #1 (December 3, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force2.txt">force2.txt</A> <tab to=T><TD> 30310<BR><TD> Force Files Volume #2 (April 17, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force3.txt">force3.txt</A> <tab to=T><TD> 29702<BR><TD> Force Files Volume #3 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force4.txt">force4.txt</A> <tab to=T><TD> 28651<BR><TD> Force Files Volume #4 (August 1, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force5.txt">force5.txt</A> <tab to=T><TD> 32039<BR><TD> Force Files Volume #5 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force6.txt">force6.txt</A> <tab to=T><TD> 7027<BR><TD> Force Files Volume #6 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force7.txt">force7.txt</A> <tab to=T><TD> 31832<BR><TD> Force Files Volume #7 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force8.txt">force8.txt</A> <tab to=T><TD> 31694<BR><TD> Force Files Volume #8 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force9.txt">force9.txt</A> <tab to=T><TD> 11387<BR><TD> Force Files Volume #9 (August 6, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/freebie3.hac">freebie3.hac</A> <tab to=T><TD> 103246<BR><TD> Compufreebies 3.html (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/freecis.txt">freecis.txt</A> <tab to=T><TD> 3278<BR><TD> Free Compuserve Access
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/funwith5.hac">funwith5.hac</A> <tab to=T><TD> 5437<BR><TD> Fun With Automatic Tellers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/g.txt">g.txt</A> <tab to=T><TD> 22969<BR><TD> SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/garaghak.txt">garaghak.txt</A> <tab to=T><TD> 48489<BR><TD> Garage Door Opener Hacker Plans from Cybertek
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gateways">gateways</A> <tab to=T><TD> 8598<BR><TD> The Inter-Network Mail Guide - Copyright 1990 by John J. Chew
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/get-vip.txt">get-vip.txt</A> <tab to=T><TD> 11547<BR><TD> DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/getbust.txt">getbust.txt</A> <tab to=T><TD> 4631<BR><TD> Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/getinfo.txt">getinfo.txt</A> <tab to=T><TD> 5978<BR><TD> The Hacker's Guide to Investigations, by Ripper of HALE (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gisdoc.hac">gisdoc.hac</A> <tab to=T><TD> 5966<BR><TD> Hacking the GIS computer by Doctor Crash
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/goodbye.ana">goodbye.ana</A> <tab to=T><TD> 1796<BR><TD> The Best of the Station, by The Prowler
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/goodkids.hac">goodkids.hac</A> <tab to=T><TD> 4548<BR><TD> Computer Hackers are Good People Too!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/govthlp.txt">govthlp.txt</A> <tab to=T><TD> 4106<BR><TD> The Help Screen on some Government System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gs1.txt">gs1.txt</A> <tab to=T><TD> 16195<BR><TD> Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gte.txt">gte.txt</A> <tab to=T><TD> 19883<BR><TD> Hacking GTE Telemail by Master Micro
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guide.txt">guide.txt</A> <tab to=T><TD> 42423<BR><TD> A Novice's Guide to Hacking- 1989 edition by The Mentor
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guidedoc.hac">guidedoc.hac</A> <tab to=T><TD> 5437<BR><TD> The RSTS User's Guide, by The Flash
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guidehak.txt">guidehak.txt</A> <tab to=T><TD> 176913<BR><TD> The Neophyte's Guide to hacking (1993 Edition) by Deicide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gunbelt3.txt">gunbelt3.txt</A> <tab to=T><TD> 8525<BR><TD> Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacethi.txt">hacethi.txt</A> <tab to=T><TD> 5949<BR><TD> The Ethics of Hacking, by Dissident of TES
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacethic.txt">hacethic.txt</A> <tab to=T><TD> 6161<BR><TD> The Ethics of Hacking by Dissident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.faq">hack.faq</A> <tab to=T><TD> 251055<BR><TD> Beta .008 of the 2600/#hack FAQ
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.hac">hack.hac</A> <tab to=T><TD> 4096<BR><TD> Hacking And Computer Krashing #9, by Gray Wolf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.leg">hack.leg</A> <tab to=T><TD> 11978<BR><TD> A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack1.hac">hack1.hac</A> <tab to=T><TD> 7960<BR><TD> The Basics of Hacking, by the Knights of Shadow (Intro)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack2.hac">hack2.hac</A> <tab to=T><TD> 7450<BR><TD> The Basics of Hacking, by The Knights of Shadow (DECs)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack3">hack3</A> <tab to=T><TD> 6629<BR><TD> The Basics of Telenet Part I
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack4">hack4</A> <tab to=T><TD> 7894<BR><TD> Telenet Scanning
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack4.hac">hack4.hac</A> <tab to=T><TD> 4421<BR><TD> The Basics of Hacking, by The Knights of Shadow (Data General)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack5.hac">hack5.hac</A> <tab to=T><TD> 5761<BR><TD> Hacking McDonalds, by Herb of Burger King
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack7">hack7</A> <tab to=T><TD> 5417<BR><TD> Hacking the Compuserve Information Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack7.txt">hack7.txt</A> <tab to=T><TD> 4034<BR><TD> The Conscience of a Hacker by The Mentor (January 8, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9.hac">hack9.hac</A> <tab to=T><TD> 10950<BR><TD> Hacking Control Data Corporation's Cyber
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9301.rpt">hack9301.rpt</A> <tab to=T><TD> 39068<BR><TD> The Hack Report Volume 2, Number 1 (January 3, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9302.rpt">hack9302.rpt</A> <tab to=T><TD> 59113<BR><TD> The Hack Report Volume 2, Number 2 (February 7, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9303.rpt">hack9303.rpt</A> <tab to=T><TD> 53202<BR><TD> The Hack Report Volume 2, Number 3 (March 7, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9304.rpt">hack9304.rpt</A> <tab to=T><TD> 66762<BR><TD> The Hack Report Volume 2, Number 4 (April 4, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9305.rpt">hack9305.rpt</A> <tab to=T><TD> 91783<BR><TD> The Hack Report Volume 2, Number 5 (May 9, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9306.rpt">hack9306.rpt</A> <tab to=T><TD> 101520<BR><TD> The Hack Report Volume 2, Number 6 (June 6, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9307.rpt">hack9307.rpt</A> <tab to=T><TD> 117584<BR><TD> The Hack Report Volume 2, Number 7 (July 4, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9309.rpt">hack9309.rpt</A> <tab to=T><TD> 137473<BR><TD> The Hack Report Volume 2, Number 9 (September 12, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9401.rpt">hack9401.rpt</A> <tab to=T><TD> 75374<BR><TD> The Hack Report Volume 3, Issue 1 (January 29, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_cis.txt">hack_cis.txt</A> <tab to=T><TD> 13288<BR><TD> The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_em.hac">hack_em.hac</A> <tab to=T><TD> 26119<BR><TD> The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_s.txt">hack_s.txt</A> <tab to=T><TD> 13935<BR><TD> Harry Hackalot's Official Hacker Address Book for October 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_ths.txt">hack_ths.txt</A> <tab to=T><TD> 148109<BR><TD> The Social Organization of the Computer Underground (Thesis)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackacr.hac">hackacr.hac</A> <tab to=T><TD> 59638<BR><TD> The Hackers Acronym Chart, compiled by IIRG
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackad.txt">hackad.txt</A> <tab to=T><TD> 5248<BR><TD> The Famous Hacker's School (Analog Science Fiction Sept. 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackcos.txt">hackcos.txt</A> <tab to=T><TD> 27333<BR><TD> Hacking COSMOS Part I by Lex Luthor and the Legion of Doom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackcrak.txt">hackcrak.txt</A> <tab to=T><TD> 29696<BR><TD> The Hacker Crackdown, by 2600 Magazine
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackdct1">hackdct1</A> <tab to=T><TD> 89766<BR><TD> The Hacker's Jargon File, (November 14, 1982 Version)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackdict.txt">hackdict.txt</A> <tab to=T><TD> 872346<BR><TD> The Hacker's Dictionary, Older Version, Uncredited!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker">hacker</A> <tab to=T><TD> 3415<BR><TD> The Consience of a Hacker by The Mentor (January 8, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker.tst">hacker.tst</A> <tab to=T><TD> 21534<BR><TD> The Hacker's Purity Test, June 16, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker.txt">hacker.txt</A> <tab to=T><TD> 5787<BR><TD> SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker01.txt">hacker01.txt</A> <tab to=T><TD> 152594<BR><TD> The Social Organization of the Computer Underground: A Thesis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker03.txt">hacker03.txt</A> <tab to=T><TD> 4931<BR><TD> The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker1.txt">hacker1.txt</A> <tab to=T><TD> 19996<BR><TD> Diary of a Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker11.txt">hacker11.txt</A> <tab to=T><TD> 2403<BR><TD> Hacking Western Union's Easylink
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker2.txt">hacker2.txt</A> <tab to=T><TD> 11714<BR><TD> The Diary of a Hacker Part II by the Cuisinart Blade
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackerdoc.txt">hackerdoc.txt</A> <tab to=T><TD> 10690<BR><TD> SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackerla">hackerla</A> <tab to=T><TD> 2181<BR><TD> The Hackers' Laws
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackers.par">hackers.par</A> <tab to=T><TD> 2238<BR><TD> Advertisement for the Galactic Hacker's Party (August 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackethic.txt">hackethic.txt</A> <tab to=T><TD> 5953<BR><TD> The Ethics of Hacking by Dissident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackfaq.html0">hackfaq.html0</A> <tab to=T><TD> 176079<BR><TD> FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackfaq.txt">hackfaq.txt</A> <tab to=T><TD> 282121<BR><TD> The Hack FAQ By Simple Nomad (January 31, 1999)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackholl.txt">hackholl.txt</A> <tab to=T><TD> 4372<BR><TD> Hacking In Holland by Rop Gonggrijp (October 18, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackhp2.hac">hackhp2.hac</A> <tab to=T><TD> 15991<BR><TD> Hacking the HP 2000 by Bioc Agent 003
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking">hacking</A> <tab to=T><TD> 1676<BR><TD> Description of the New, Bad Definition of Hacking
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.dox">hacking.dox</A> <tab to=T><TD> 38174<BR><TD> Collections of Hacker FIles Downloaded by Consumertronics
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.tap">hacking.tap</A> <tab to=T><TD> 5840<BR><TD> Style Teaches You About How to Be a Proper Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.txt">hacking.txt</A> <tab to=T><TD> 30670<BR><TD> Hacking Tutorial, by The Jolly Roger
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking101.hac">hacking101.hac</A> <tab to=T><TD> 3367<BR><TD> HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackinga.txt">hackinga.txt</A> <tab to=T><TD> 5856<BR><TD> Hacking Bank Of America's Home Banking System by Dark Creaper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingc.txt">hackingc.txt</A> <tab to=T><TD> 4524<BR><TD> Hacking Credit Card Codes by Omni-Kid and The Wyvern
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackinge.txt">hackinge.txt</A> <tab to=T><TD> 2881<BR><TD> Hacking ECONet Systems by Jack Death and Zapper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingi.txt">hackingi.txt</A> <tab to=T><TD> 759<BR><TD> Computerworld Asks People to Hack In, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingt.txt">hackingt.txt</A> <tab to=T><TD> 1311<BR><TD> Hacking the Lexington Air Force Computer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackl1.txt">hackl1.txt</A> <tab to=T><TD> 4699<BR><TD> Hacker's Line #1 by 2TUFF
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacknet.dox">hacknet.dox</A> <tab to=T><TD> 9243<BR><TD> The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacknet.txt">hacknet.txt</A> <tab to=T><TD> 7950<BR><TD> how to Hack Your School's Network, from Dr. Techno of Paradise Lost
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackpcp.hac">hackpcp.hac</A> <tab to=T><TD> 8519<BR><TD> The Weenie Warriors present Hacking PC Pursuit Codes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackprod.txt">hackprod.txt</A> <tab to=T><TD> 3110<BR><TD> How to Hack Prodigy by Desolated Dream
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackprof.txt">hackprof.txt</A> <tab to=T><TD> 2276<BR><TD> Hacker Proof Doors! It IS Possible!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackquiz.txt">hackquiz.txt</A> <tab to=T><TD> 21324<BR><TD> The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackrsts.txt">hackrsts.txt</A> <tab to=T><TD> 4221<BR><TD> Hacking RSTS Systems: An Instructional Test
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacksong.txt">hacksong.txt</A> <tab to=T><TD> 5632<BR><TD> The Hacker's Song by Dave Touretzky and Don Libes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacksynd.hac">hacksynd.hac</A> <tab to=T><TD> 7296<BR><TD> The Hackers Syndrome, by Tad Deriso
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktalk.txt">hacktalk.txt</A> <tab to=T><TD> 10240<BR><TD> A Short Hackerspeak Glossary, by the Hollywood User Group
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackterm.txt">hackterm.txt</A> <tab to=T><TD> 4314<BR><TD> Collection of "Hackernyms" by Rad Man version 2.html0
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktest.txt">hacktest.txt</A> <tab to=T><TD> 8497<BR><TD> The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktips.hac">hacktips.hac</A> <tab to=T><TD> 3392<BR><TD> Hacking Tips #2, by Hoe Hopper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktips.txt">hacktips.txt</A> <tab to=T><TD> 5625<BR><TD> Tips for Tracking Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktut.txt">hacktut.txt</A> <tab to=T><TD> 21105<BR><TD> Hacking Tutorial, by The Jolly Roger
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackunlm.hu1">hackunlm.hu1</A> <tab to=T><TD> 144657<BR><TD> Hackers Unlimited Magazine Volume 1 Issue 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackusa!.hac">hackusa!.hac</A> <tab to=T><TD> 7666<BR><TD> Hackin' USA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwarn.hac">hackwarn.hac</A> <tab to=T><TD> 5735<BR><TD> A Warning to Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwwiv.hac">hackwwiv.hac</A> <tab to=T><TD> 7679<BR><TD> Hacking into WWIV, Second Edition by Vision
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwwiv.txt">hackwwiv.txt</A> <tab to=T><TD> 12294<BR><TD> Hacking into WWIV Software by Vision
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/haibm370.txt">haibm370.txt</A> <tab to=T><TD> 2420<BR><TD> How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakdec20.txt">hakdec20.txt</A> <tab to=T><TD> 8786<BR><TD> An Addendum to A Novice's Guide to Hacking, by The Mentor
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakdic.txt">hakdic.txt</A> <tab to=T><TD> 231108<BR><TD> The Hacker's Dictionary, A Guide to the World of Computer Wizards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakmedia.txt">hakmedia.txt</A> <tab to=T><TD> 1771<BR><TD> Hackers in the Media, List start: 10/28/92 - Doomsday
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/handbook.txt">handbook.txt</A> <tab to=T><TD> 20162<BR><TD> Hacking Compuserve: All You Need to Know, by Mr. Perfect
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/haq1.txt">haq1.txt</A> <tab to=T><TD> 37136<BR><TD> The HAQ Edition 2.07 (June 11, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hashish.txt">hashish.txt</A> <tab to=T><TD> 6146<BR><TD> Hashish: The Exotic Elixir, by EZ Rider
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hate.info">hate.info</A> <tab to=T><TD> 1152<BR><TD> Invitation to HATE: Hackers at The End (Summer 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/havok1.txt">havok1.txt</A> <tab to=T><TD> 64006<BR><TD> HAVOK Pack #1: The Return (Collection of Hacking Textfiles)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hckr_hnd.txt">hckr_hnd.txt</A> <tab to=T><TD> 138752<BR><TD> The Hacker's Handbook by Hugo Cornwall (1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hckrslg">hckrslg</A> <tab to=T><TD> 12665<BR><TD> The Hacker's League, by Lee Felsenstein (March 18, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd.hac">hd.hac</A> <tab to=T><TD> 5732<BR><TD> Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd01.hac">hd01.hac</A> <tab to=T><TD> 16446<BR><TD> Hackers Directory Volume #1 by Ninja Squirrel and Logan5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd02.hac">hd02.hac</A> <tab to=T><TD> 13873<BR><TD> Hackers Directory Volume #2 by Ninja Squirrel and Logan5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd03.hac">hd03.hac</A> <tab to=T><TD> 16634<BR><TD> Hackers Directory Volume #3 by Ninja Squirrel and Logan5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd04.hac">hd04.hac</A> <tab to=T><TD> 11329<BR><TD> Hackers Directory Volume #4 by Ninja Squirrel and Logan5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hdigest.txt">hdigest.txt</A> <tab to=T><TD> 14413<BR><TD> The Hacker's Digent by Harry Hackalot (October 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hdindex.txt">hdindex.txt</A> <tab to=T><TD> 4686<BR><TD> Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hedrick.txt">hedrick.txt</A> <tab to=T><TD> 89278<BR><TD> An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hfnewbies.txt">hfnewbies.txt</A> <tab to=T><TD> 17307<BR><TD> The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hhacking.iix">hhacking.iix</A> <tab to=T><TD> 5504<BR><TD> CAT-HACK Volume 1 from The Mystery
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hint.txt">hint.txt</A> <tab to=T><TD> 25439<BR><TD> The Czar's Guide to the Young Criminal Accused of Using Computers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/his-hp.txt">his-hp.txt</A> <tab to=T><TD> 9320<BR><TD> The History of Hacking and Phreaking by Raven of BOM SQUAD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_acces">hk_acces</A> <tab to=T><TD> 43859<BR><TD> Draft Chapter of the NIST Computer Security Handbook, from Ed Roback
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_crypt">hk_crypt</A> <tab to=T><TD> 34588<BR><TD> Draft Chapter from the NIST Computer Security Handbook, on Cryptography
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_i&amp;a">hk_i&a</A> <tab to=T><TD> 36722<BR><TD> Draft of the NIST Computer Security Handbook on Identification and Authentification
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_polic">hk_polic</A> <tab to=T><TD> 28492<BR><TD> Draft of the NIST Computer Security Handbook on Computer and Information Security Policty
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hoho93.ad">hoho93.ad</A> <tab to=T><TD> 13472<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hoho93cz.hac">hoho93cz.hac</A> <tab to=T><TD> 13356<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hohocon.93">hohocon.93</A> <tab to=T><TD> 14237<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/holelist.txt">holelist.txt</A> <tab to=T><TD> 16654<BR><TD> How Security Holes Manifest Themselves
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/holes.txt">holes.txt</A> <tab to=T><TD> 78322<BR><TD> A List of Holes in Various Operating Systems (April 7, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/homebank.hac">homebank.hac</A> <tab to=T><TD> 6056<BR><TD> Hacking Bank Of America's Home Banking System by "Dark Creaper"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/homebank.txt">homebank.txt</A> <tab to=T><TD> 5863<BR><TD> Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/horror_s.tor">horror_s.tor</A> <tab to=T><TD> 48939<BR><TD> Hacking Horror Stories 1982
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20001.hac">hp20001.hac</A> <tab to=T><TD> 12800<BR><TD> HP 2000 Part 1: Commands by Blitzoid and Galactus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20002.hac">hp20002.hac</A> <tab to=T><TD> 15744<BR><TD> HP 2000 Part 2: Statements by Blitzoid and Galactus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20003.hac">hp20003.hac</A> <tab to=T><TD> 9344<BR><TD> HP 2000 Part 3: Functions by Blitzoid and Galactus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20004.hac">hp20004.hac</A> <tab to=T><TD> 5376<BR><TD> HP 2000 Part 4: Files by Blitzoid and Galactus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20005.hac">hp20005.hac</A> <tab to=T><TD> 5120<BR><TD> Hp 2000 Part 5: Matracies by Blitzoid and Galactus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp30.txt">hp30.txt</A> <tab to=T><TD> 116232<BR><TD> The Completel Hewlett Packard 3000 Hackers Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000.hac">hp3000.hac</A> <tab to=T><TD> 10319<BR><TD> The Complete Hewlett Packard 3000 Hackers Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000.txt">hp3000.txt</A> <tab to=T><TD> 111310<BR><TD> The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000_t.hac">hp3000_t.hac</A> <tab to=T><TD> 14354<BR><TD> Hacking the HP 3000 by DE BUG
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000g.hac">hp3000g.hac</A> <tab to=T><TD> 112566<BR><TD> The Complete Hewlett Packard 3000 Hackers Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iah1.txt">iah1.txt</A> <tab to=T><TD> 142976<BR><TD> The International Hackers' Association Issue #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibm-vm70.txt">ibm-vm70.txt</A> <tab to=T><TD> 3226<BR><TD> A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibm370.hac">ibm370.hac</A> <tab to=T><TD> 2688<BR><TD> How to Take Control of your Local IBM 370 by Another Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibmhack.hac">ibmhack.hac</A> <tab to=T><TD> 2686<BR><TD> Hacking the I.B.M. By John Doe
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icebook1.txt">icebook1.txt</A> <tab to=T><TD> 35623<BR><TD> ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icebook2.txt">icebook2.txt</A> <tab to=T><TD> 54349<BR><TD> ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icon4u.nrg">icon4u.nrg</A> <tab to=T><TD> 1810<BR><TD> ICoN Hacking with Loser Access by <20><><EFBFBD><EFBFBD><EFBFBD>GY<47>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/id-biz.txt">id-biz.txt</A> <tab to=T><TD> 2850<BR><TD> How to Have a Profitable ID Business, by Mr. Puff n' Stuff
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/identity.txt">identity.txt</A> <tab to=T><TD> 7309<BR><TD> How to Create a New Identity by the Walking Glitch
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ihg.txt">ihg.txt</A> <tab to=T><TD> 11913<BR><TD> International Directory of Hacking and Phreaking Organizations, by John Simmons
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr6.txt">iirgacr6.txt</A> <tab to=T><TD> 62629<BR><TD> The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr7.txt">iirgacr7.txt</A> <tab to=T><TD> 67165<BR><TD> The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr8.txt">iirgacr8.txt</A> <tab to=T><TD> 79728<BR><TD> The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iiu-001.txt">iiu-001.txt</A> <tab to=T><TD> 6073<BR><TD> Bust Avoidance for Dipshits by Derision of IIU (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iiu-004.txt">iiu-004.txt</A> <tab to=T><TD> 9041<BR><TD> Hacking on the Compuserve Information Service by Darkness (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/illinet.txt">illinet.txt</A> <tab to=T><TD> 20430<BR><TD> Dial-Up Access Numbers for ILLINET Online
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/info.txt">info.txt</A> <tab to=T><TD> 7072<BR><TD> How to Get Detailed Information on Anybody by DTS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/info3.gph">info3.gph</A> <tab to=T><TD> 4352<BR><TD> How to Get Anything on Anybody Part III
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/infoam.txt">infoam.txt</A> <tab to=T><TD> 51393<BR><TD> Exploring Information-America by Omega and White Knight
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/informer.hac">informer.hac</A> <tab to=T><TD> 17320<BR><TD> TRI : The Remote Informer, Volume 1, Issue #6
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/innerc.txt">innerc.txt</A> <tab to=T><TD> 15295<BR><TD> Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/innercir.hac">innercir.hac</A> <tab to=T><TD> 9856<BR><TD> Hacking Techniques, Typed in by Logan5 from The Inner Circle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intercep.hac">intercep.hac</A> <tab to=T><TD> 10746<BR><TD> The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intercpt.txt">intercpt.txt</A> <tab to=T><TD> 23219<BR><TD> Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intruder.dox">intruder.dox</A> <tab to=T><TD> 8534<BR><TD> SOFTDOCS: Intruder v1.21 by CreaSoft
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/inttel.hac">inttel.hac</A> <tab to=T><TD> 1728<BR><TD> European Computers List #1 by Kerrang Khan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm201.hac">issm201.hac</A> <tab to=T><TD> 32229<BR><TD> The Information Systems Security Monitor Volume 2 Number 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm202.hac">issm202.hac</A> <tab to=T><TD> 52667<BR><TD> The Information Systems Security Monitor Volume 2 Number 2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm204.hac">issm204.hac</A> <tab to=T><TD> 28850<BR><TD> The Information Systems Security Monitor Volume 2 Number 4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm301.hac">issm301.hac</A> <tab to=T><TD> 24356<BR><TD> The Information Systems Security Monitor Volume 3 Number 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm302.hac">issm302.hac</A> <tab to=T><TD> 23394<BR><TD> The Information Systems Security Monitor Volume 3 Number 2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm303.hac">issm303.hac</A> <tab to=T><TD> 22981<BR><TD> The Information Systems Security Monitor Volume 3 Number 3
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm304.hac">issm304.hac</A> <tab to=T><TD> 30656<BR><TD> The Information Systems Security Monitor Volume 3 Number 4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/jack14.txt">jack14.txt</A> <tab to=T><TD> 9855<BR><TD> Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/janet.txt">janet.txt</A> <tab to=T><TD> 4618<BR><TD> JANET PAD Listing Revision 1.2 (March 1st, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/jargon211.hac">jargon211.hac</A> <tab to=T><TD> 1147413<BR><TD> The Jargon File, v.2.9.html1, by Eric S. Raymond
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/javabugs.txt">javabugs.txt</A> <tab to=T><TD> 5767<BR><TD> JavaScript Problems I've Discovered
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/keylock.sch">keylock.sch</A> <tab to=T><TD> 6772<BR><TD> Schematic For an Optoelectronic key Lock by Joe Scharf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/keytrap3.txt">keytrap3.txt</A> <tab to=T><TD> 2787<BR><TD> SOFTDOCS: Keytrap v3.0 by Dcypher
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/kfyi-593.hac">kfyi-593.hac</A> <tab to=T><TD> 91136<BR><TD> KFYI AM Radio 910 interviews Mind Rape and Merc
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/kill.feds">kill.feds</A> <tab to=T><TD> 5376<BR><TD> FEDS: How to Find and Eliminate Them (September 10, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/l0pht.txt">l0pht.txt</A> <tab to=T><TD> 2807<BR><TD> The L0pht... What I saw, by Tfish of RDT
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lan.txt">lan.txt</A> <tab to=T><TD> 8247<BR><TD> Local Area Networks (LANs) by ANSI-Christ
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-1.txt">lca-1.txt</A> <tab to=T><TD> 4422<BR><TD> LCA #1: Zen and the Art of Untraceable Hacking, by Flood
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-2.txt">lca-2.txt</A> <tab to=T><TD> 3918<BR><TD> LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-3.txt">lca-3.txt</A> <tab to=T><TD> 3269<BR><TD> LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-4.txt">lca-4.txt</A> <tab to=T><TD> 3725<BR><TD> LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-5.txt">lca-5.txt</A> <tab to=T><TD> 5082<BR><TD> LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-6.txt">lca-6.txt</A> <tab to=T><TD> 4032<BR><TD> LCA #6: Beige Boxing, by the Lemon Curry Alliance
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ldd.txt">ldd.txt</A> <tab to=T><TD> 12237<BR><TD> How to Hack into CIS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/license.asc">license.asc</A> <tab to=T><TD> 58618<BR><TD> The Guerilla Guide to Licensing Software
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/list2">list2</A> <tab to=T><TD> 2936<BR><TD> Pacific Bell Computer Systems, by Another Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/litewave.sch">litewave.sch</A> <tab to=T><TD> 7819<BR><TD> AM Lightwave Transmitter and Reciever by Joe Scharf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lnoise.hac">lnoise.hac</A> <tab to=T><TD> 6020<BR><TD> Modem Noise Destroyer (Alpha Version)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lodhbasi.hac">lodhbasi.hac</A> <tab to=T><TD> 42609<BR><TD> The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/logoncbi.hac">logoncbi.hac</A> <tab to=T><TD> 3235<BR><TD> How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/logoncbi.txt">logoncbi.txt</A> <tab to=T><TD> 2949<BR><TD> How to Log into a C.B.I System by L.E. Pirate
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/longpass.txt">longpass.txt</A> <tab to=T><TD> 14916<BR><TD> Generating Longer Passwords
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/machack0.5.txt">machack0.5.txt</A> <tab to=T><TD> 13640<BR><TD> The Mac Hack FAQ by AX1P (November 22, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mag_stripes.txt">mag_stripes.txt</A> <tab to=T><TD> 25011<BR><TD> Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/magnet.01">magnet.01</A> <tab to=T><TD> 24432<BR><TD> Magnetic Stripes on Cards: An Overview
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/magnet.02">magnet.02</A> <tab to=T><TD> 46174<BR><TD> Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mailbox.hac">mailbox.hac</A> <tab to=T><TD> 3368<BR><TD> Mailbox Systems: Your Link to the Underworld
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/main.fra">main.fra</A> <tab to=T><TD> 6763<BR><TD> Main Frames by the Pirate Club
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mainfrms.con">mainfrms.con</A> <tab to=T><TD> 1492<BR><TD> A List of Mainframe Dialup Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/master.txt">master.txt</A> <tab to=T><TD> 4915<BR><TD> Master Hack Version 1.0 by Master Frodo (January 1, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mci.txt">mci.txt</A> <tab to=T><TD> 2020<BR><TD> MCI Mail Access Numbrs, from The Swamp
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mci__acc.txt">mci__acc.txt</A> <tab to=T><TD> 2830<BR><TD> List of MCI Access Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mcimail.hac">mcimail.hac</A> <tab to=T><TD> 7772<BR><TD> MCI Mail - The Adventure Continues, by Bioc Agent
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mcisprin.t">mcisprin.t</A> <tab to=T><TD> 5278<BR><TD> Hints on Hacking, byt the RAMBUG and Captain Blood
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/memory.lst">memory.lst</A> <tab to=T><TD> 32113<BR><TD> The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mgtguide.txt">mgtguide.txt</A> <tab to=T><TD> 24448<BR><TD> The NIST Management Guide to the Protection of Information Resources
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mickeyd.txt">mickeyd.txt</A> <tab to=T><TD> 5145<BR><TD> Hacking McDonalds by Herb the Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/micrrisk.hac">micrrisk.hac</A> <tab to=T><TD> 63479<BR><TD> Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milinet.html">milinet.html</A> <tab to=T><TD> 5564<BR><TD> Milnet Access Codes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milnet.txt">milnet.txt</A> <tab to=T><TD> 36799<BR><TD> How to Use the American Military Net
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milnet1.hac">milnet1.hac</A> <tab to=T><TD> 7765<BR><TD> Milnet, by Brigadier General Swipe
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mish18.txt">mish18.txt</A> <tab to=T><TD> 20480<BR><TD> The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism1.hac">mism1.hac</A> <tab to=T><TD> 11776<BR><TD> How to Get Anything on Anyone Excerpts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism10.hac">mism10.hac</A> <tab to=T><TD> 2944<BR><TD> How to Get Anything on Anyone Excerpts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism20.hac">mism20.hac</A> <tab to=T><TD> 3840<BR><TD> Mastering the SCANTRON by Warhead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism42.hac">mism42.hac</A> <tab to=T><TD> 1024<BR><TD> Xerox Voice Message Exchange Commands, from The Lineman
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mob.txt">mob.txt</A> <tab to=T><TD> 8954<BR><TD> The Hackers in the MOB
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook1.txt">modbook1.txt</A> <tab to=T><TD> 3585<BR><TD> The History of MOD: Book One: The Originals
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook2.txt">modbook2.txt</A> <tab to=T><TD> 4182<BR><TD> The History of MOD: Book Two: Creative Mindz
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook3.txt">modbook3.txt</A> <tab to=T><TD> 4522<BR><TD> The Book of MOD: Part Three: A Kick in the Groin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook4.txt">modbook4.txt</A> <tab to=T><TD> 2787<BR><TD> The Book of MOD: Part Four: End of '90-'1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook5.txt">modbook5.txt</A> <tab to=T><TD> 5199<BR><TD> The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morality.hac">morality.hac</A> <tab to=T><TD> 2654<BR><TD> Hacker Morality: A Lesson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morestuf.txt">morestuf.txt</A> <tab to=T><TD> 18930<BR><TD> Collection of Hacking Files (Should Eventually be Split up)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morprime.hac">morprime.hac</A> <tab to=T><TD> 10579<BR><TD> RVEC Parameters and DMSTK Format
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mrsts.hac">mrsts.hac</A> <tab to=T><TD> 5504<BR><TD> So you've finally decided to down an RSTS System?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mtempist.hac">mtempist.hac</A> <tab to=T><TD> 10752<BR><TD> The Tempest Method of Data Interception (Needs Editing)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/narc3.hac">narc3.hac</A> <tab to=T><TD> 8229<BR><TD> Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tg-003.txt">ncsc-tg-003.txt</A> <tab to=T><TD> 86792<BR><TD> A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tg-016.txt">ncsc-tg-016.txt</A> <tab to=T><TD> 88895<BR><TD> Guidelines for Writing Trusted Facility Manuals
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tr-005-2.txt">ncsc-tr-005-2.txt</A> <tab to=T><TD> 90471<BR><TD> Introduction to Trusted Computer System Evaluation Criteria
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc_oas.txt">ncsc_oas.txt</A> <tab to=T><TD> 109919<BR><TD> A Guideline on Office Automation Security (December 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/netbios.txt">netbios.txt</A> <tab to=T><TD> 13379<BR><TD> Understanding NetBIOS by NeonSurge of Rhino9
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/netcrack.txt">netcrack.txt</A> <tab to=T><TD> 7335<BR><TD> DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/networks.phk">networks.phk</A> <tab to=T><TD> 5522<BR><TD> 2600: How to Send Mail to other Networks
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/neuroman.pwd">neuroman.pwd</A> <tab to=T><TD> 3225<BR><TD> List of DataBases and passwords for the game "Neuromancer"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/newid.hac">newid.hac</A> <tab to=T><TD> 6543<BR><TD> New Identity Method
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/newsltr.idx">newsltr.idx</A> <tab to=T><TD> 3273<BR><TD> Index to the Computer Underground Digest Archives (June 13, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nextbugs.txt">nextbugs.txt</A> <tab to=T><TD> 7878<BR><TD> CERT Advisory on the NeXT computer's Software
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nfs_trace.txt">nfs_trace.txt</A> <tab to=T><TD> 35713<BR><TD> NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nha-app.txt">nha-app.txt</A> <tab to=T><TD> 4706<BR><TD> Application to Join Network Hackers Alliance (June 1, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nimbus.txt">nimbus.txt</A> <tab to=T><TD> 8498<BR><TD> Research Machines Nimbus hacking, by The Green Rhino
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/note9309.txt">note9309.txt</A> <tab to=T><TD> 1984<BR><TD> The Hack Report, by Lee Jackson (September 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nov-faq.txt">nov-faq.txt</A> <tab to=T><TD> 119598<BR><TD> The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novell.hac">novell.hac</A> <tab to=T><TD> 10516<BR><TD> Collection of security holes in Novell Netware
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novell.txt">novell.txt</A> <tab to=T><TD> 7144<BR><TD> SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novhack.txt">novhack.txt</A> <tab to=T><TD> 9096<BR><TD> Having Phun With Novell by Lord Foul/Decay (July 13, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nwhack.faq">nwhack.faq</A> <tab to=T><TD> 73974<BR><TD> Frequently Asked Questions about Hacking Novell Netware by Simple Nomad
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="http://textfiles.com/hacking/obscene.###">obscene.###</A> <tab to=T><TD> 1838<BR><TD> TAG FILE: Obscene Phobia BBS (January 1, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ocfber.html">ocfber.html</A> <tab to=T><TD> 1394<BR><TD> Bylaws of the Open Computing Facility at UC Berkeley
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ocfber.2">ocfber.2</A> <tab to=T><TD> 14491<BR><TD> Constitution for the Open Computing Facility at UC Berkeley
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/omron.pin">omron.pin</A> <tab to=T><TD> 1648<BR><TD> How to Connect OMRON 3S4YR-HSR4 to your PC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orange">orange</A> <tab to=T><TD> 328324<BR><TD> Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orange.txt">orange.txt</A> <tab to=T><TD> 319321<BR><TD> The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orgs.hac">orgs.hac</A> <tab to=T><TD> 8464<BR><TD> A Large List of Computer Security Organizations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orgs.txt">orgs.txt</A> <tab to=T><TD> 8320<BR><TD> 1988 List of Computer Security Organizations
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdial.lst">outdial.lst</A> <tab to=T><TD> 12887<BR><TD> Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdial.txt">outdial.txt</A> <tab to=T><TD> 10261<BR><TD> How to Use Outdials: An Introduction by Lorax
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdials.us">outdials.us</A> <tab to=T><TD> 3553<BR><TD> Ameican Local Outdials by Sebastian Winchler (March 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdialsnfo.hac">outdialsnfo.hac</A> <tab to=T><TD> 2652<BR><TD> List of Dialouts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pacbell.lst">pacbell.lst</A> <tab to=T><TD> 3096<BR><TD> Collection of Pacific Bell Computer Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/packet.txt">packet.txt</A> <tab to=T><TD> 5760<BR><TD> Notes on Using Tymenet and Telenet by Michael A. Banks (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pacnet.hac">pacnet.hac</A> <tab to=T><TD> 5300<BR><TD> Hacking into the PACnet System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pactimea.txt">pactimea.txt</A> <tab to=T><TD> 2811<BR><TD> Telephone Numbers for the Pacific Bell Computer System by Another Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/passhack.txt">passhack.txt</A> <tab to=T><TD> 7070<BR><TD> The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/password.txt">password.txt</A> <tab to=T><TD> 22477<BR><TD> Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcp88.lst">pcp88.lst</A> <tab to=T><TD> 5450<BR><TD> PC Pursuit List Version 1.html (August 31, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpbas.txt">pcpbas.txt</A> <tab to=T><TD> 3972<BR><TD> How to Use PC Pursuit Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcphack.phk">pcphack.phk</A> <tab to=T><TD> 9552<BR><TD> Hacking PC Pursuit Codes by The Weenie Warriors
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcphack.txt">pcphack.txt</A> <tab to=T><TD> 9537<BR><TD> The Weenie Warriors Present Hacking PC Pursuit Codes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpold.phk">pcpold.phk</A> <tab to=T><TD> 7814<BR><TD> How to Use Telenet's PC Pursuit Service by Z-Man
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpursue.txt">pcpursue.txt</A> <tab to=T><TD> 238362<BR><TD> PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpursui.yes">pcpursui.yes</A> <tab to=T><TD> 15104<BR><TD> PC Pursuit and Telenet Local Access Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pdnaxis.txt">pdnaxis.txt</A> <tab to=T><TD> 16421<BR><TD> The Public Data Network Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pdp11.hac">pdp11.hac</A> <tab to=T><TD> 1920<BR><TD> Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pentagon.txt">pentagon.txt</A> <tab to=T><TD> 7534<BR><TD> The Milnet File by Brigadier General Swipe/Dispater
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ph.txt">ph.txt</A> <tab to=T><TD> 30181<BR><TD> Soft Documentation: P-Hack 1.0 by Peter King
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/phonecom.nfo">phonecom.nfo</A> <tab to=T><TD> 3304<BR><TD> Becoming More Informed (Becoming a Hacker)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/popper.txt">popper.txt</A> <tab to=T><TD> 2875<BR><TD> ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/prime.hac">prime.hac</A> <tab to=T><TD> 21725<BR><TD> A List of PRIME Commands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primecpl.hac">primecpl.hac</A> <tab to=T><TD> 12018<BR><TD> An Introduction to PRIMOS CPL Directives by Necrovore
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primer.txt">primer.txt</A> <tab to=T><TD> 102646<BR><TD> Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primes.txt">primes.txt</A> <tab to=T><TD> 12879<BR><TD> Message Base With Discussion of the Watch utlity on PRIME (August, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos.hac">primos.hac</A> <tab to=T><TD> 3968<BR><TD> Hacking Primos Systems By Nanuk of the North
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos1.txt">primos1.txt</A> <tab to=T><TD> 26221<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos2.txt">primos2.txt</A> <tab to=T><TD> 39011<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos3.txt">primos3.txt</A> <tab to=T><TD> 41578<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos4.txt">primos4.txt</A> <tab to=T><TD> 25184<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos5.txt">primos5.txt</A> <tab to=T><TD> 34196<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/psnintro.txt">psnintro.txt</A> <tab to=T><TD> 34582<BR><TD> The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/psns.txt">psns.txt</A> <tab to=T><TD> 3366<BR><TD> An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pumpcon.txt">pumpcon.txt</A> <tab to=T><TD> 10358<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pw-hack.txt">pw-hack.txt</A> <tab to=T><TD> 5432<BR><TD> The Art of Password Hacking by HIT
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/qsd.txt">qsd.txt</A> <tab to=T><TD> 4676<BR><TD> How to Access Minitel or How to Have FUN on QSD
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/racintro">racintro</A> <tab to=T><TD> 1794<BR><TD> Information on RAC: A Host System Used for Access to GEnie and AppleLink
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/raclog1">raclog1</A> <tab to=T><TD> 28632<BR><TD> An Example of an RAC Login
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/raclog2">raclog2</A> <tab to=T><TD> 27736<BR><TD> An Example of an RAC Login, Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram1">ram1</A> <tab to=T><TD> 4045<BR><TD> Hacking Rampart Systems Part 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram2">ram2</A> <tab to=T><TD> 4058<BR><TD> Hacking Rampart Systems Part 1 (cont)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram5">ram5</A> <tab to=T><TD> 4022<BR><TD> Hacking Rampart Systems Part 2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram6">ram6</A> <tab to=T><TD> 861<BR><TD> Hacking Rampart Systems Part 2 (cont)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ramcomm.hac">ramcomm.hac</A> <tab to=T><TD> 185184<BR><TD> Hacking RAM Communications (Pager)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rampart1.hac">rampart1.hac</A> <tab to=T><TD> 8448<BR><TD> Hacking Rampart Systems by Whackoland
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rampart2.hac">rampart2.hac</A> <tab to=T><TD> 4864<BR><TD> Hacking Rampart Systems by Whackoland Part II
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rcaglobe.txt">rcaglobe.txt</A> <tab to=T><TD> 3494<BR><TD> The RCA Network Part I by the Telex Troopers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/read.me">read.me</A> <tab to=T><TD> 3649<BR><TD> A Story About the TSR That Catches Passwords, and a short History
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/readme.now">readme.now</A> <tab to=T><TD> 6000<BR><TD> SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/readme.txt">readme.txt</A> <tab to=T><TD> 131<BR><TD> Force Files Explanation
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/reid.txt">reid.txt</A> <tab to=T><TD> 49665<BR><TD> The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/revblt.hac">revblt.hac</A> <tab to=T><TD> 13726<BR><TD> Review of Federal Agency Computer Security and Privacy Plans
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/riacs">riacs</A> <tab to=T><TD> 5878<BR><TD> Principles of Responsible Use of RIACS Computing Facilities
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rimeman.hac">rimeman.hac</A> <tab to=T><TD> 52781<BR><TD> RIME User's Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ripco.txt">ripco.txt</A> <tab to=T><TD> 13184<BR><TD> The Doctor Ripco Seizure by Full Disclosure (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/risks.txt">risks.txt</A> <tab to=T><TD> 6181<BR><TD> Avoiding the Risks of Hacking: A List of Suggestions by IC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/risktool.hac">risktool.hac</A> <tab to=T><TD> 33991<BR><TD> Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rom.txt">rom.txt</A> <tab to=T><TD> 3744<BR><TD> Macintosh ROM Secrets by The Cloud (November 23, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rowdy_dl.man">rowdy_dl.man</A> <tab to=T><TD> 63720<BR><TD> DocumentationL The Rowdy Dialer (April 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rspwd.new">rspwd.new</A> <tab to=T><TD> 23723<BR><TD> Some Downloaded Password File
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsts.hac">rsts.hac</A> <tab to=T><TD> 5376<BR><TD> So You've Decided to Down a RSTS System, by Sam Sneed
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsx11.hac">rsx11.hac</A> <tab to=T><TD> 18944<BR><TD> RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsx11m.txt">rsx11m.txt</A> <tab to=T><TD> 18755<BR><TD> RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ruhacker.txt">ruhacker.txt</A> <tab to=T><TD> 1501<BR><TD> Are You a Hacker? By ReDragon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sanatmdoc.hac">sanatmdoc.hac</A> <tab to=T><TD> 6179<BR><TD> Getting into an ATM
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/saruman.add">saruman.add</A> <tab to=T><TD> 829<BR><TD> TAG: Saruman BBS Ad
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satan~1.txt">satan~1.txt</A> <tab to=T><TD> 20843<BR><TD> A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satcon.txt">satcon.txt</A> <tab to=T><TD> 2841<BR><TD> Satellite Control, by Ninja Squirrel & Logan-5
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satelit3.txt">satelit3.txt</A> <tab to=T><TD> 17718<BR><TD> Satellite Scrambling Systems: The Truth, by XL
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satelite.txt">satelite.txt</A> <tab to=T><TD> 3636<BR><TD> Satellite Frequencies, by Sir Francis Drake
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/scanprg.txt">scanprg.txt</A> <tab to=T><TD> 5542<BR><TD> What To Look For In A Code Hacking Program, by Dissident
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/school.txt">school.txt</A> <tab to=T><TD> 9253<BR><TD> Screwing with School Computers, by Liquid Bug
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secrets2.hac">secrets2.hac</A> <tab to=T><TD> 7733<BR><TD> Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secrets3.hac">secrets3.hac</A> <tab to=T><TD> 4250<BR><TD> Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secretsdoc.hac">secretsdoc.hac</A> <tab to=T><TD> 233082<BR><TD> Young's Demonstrative Translation of Scientific Secrets (1861)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/securdev.txt">securdev.txt</A> <tab to=T><TD> 8616<BR><TD> Technical Hacking Volume 1 by the Warelock
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security">security</A> <tab to=T><TD> 66923<BR><TD> Overview of Computer Security by E.A. Bedwell, EDP Specialist
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security.fy8">security.fy8</A> <tab to=T><TD> 259023<BR><TD> Site Security Handbook, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security.txt">security.txt</A> <tab to=T><TD> 6184<BR><TD> Professor Falken's Guide to CODE Hacking Security
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sequence.txt">sequence.txt</A> <tab to=T><TD> 22931<BR><TD> Sequence Number Attacks, by Rik Farrow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sha.hac">sha.hac</A> <tab to=T><TD> 83219<BR><TD> Swedish Hackers Association Annual Year Protocol #4
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shadec.txt">shadec.txt</A> <tab to=T><TD> 14173<BR><TD> The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shahewl.txt">shahewl.txt</A> <tab to=T><TD> 3723<BR><TD> Swedish Hacking Association presents Hacking HP 3000 Part 1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shaprot3.txt">shaprot3.txt</A> <tab to=T><TD> 91074<BR><TD> The 3rd Protocol (1990) by The Swedish Hackers Association
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shawn-file-check">shawn-file-check</A> <tab to=T><TD> 20977<BR><TD> The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0293.asc">shw0293.asc</A> <tab to=T><TD> 8632<BR><TD> Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0394.asc">shw0394.asc</A> <tab to=T><TD> 9472<BR><TD> Syndicated Hack Watch (March 1994) by John McCormac
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0494.asc">shw0494.asc</A> <tab to=T><TD> 12408<BR><TD> Syndicated Hack Watch (April 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0593.asc">shw0593.asc</A> <tab to=T><TD> 6667<BR><TD> Red Hot Television is Banned
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0893.asc">shw0893.asc</A> <tab to=T><TD> 12544<BR><TD> The Start of the Skybox Cable War
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0993.asc">shw0993.asc</A> <tab to=T><TD> 8955<BR><TD> Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0994.bbs">shw0994.bbs</A> <tab to=T><TD> 12097<BR><TD> Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw1093.asc">shw1093.asc</A> <tab to=T><TD> 10974<BR><TD> Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skel_key.txt">skel_key.txt</A> <tab to=T><TD> 7361<BR><TD> SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skey.txt">skey.txt</A> <tab to=T><TD> 11048<BR><TD> Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skeyfl.txt">skeyfl.txt</A> <tab to=T><TD> 11419<BR><TD> Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skyhack.hac">skyhack.hac</A> <tab to=T><TD> 26525<BR><TD> The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sniffer.txt">sniffer.txt</A> <tab to=T><TD> 19288<BR><TD> FAQ: The Sniffer FAQ Version 1.7
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/snoop">snoop</A> <tab to=T><TD> 3075<BR><TD> Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/snoop.txt">snoop.txt</A> <tab to=T><TD> 4065<BR><TD> Data Snooping the Right Way by Lee Day
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sourcetelnet.txt">sourcetelnet.txt</A> <tab to=T><TD> 4828<BR><TD> The Source Telnet Directory, and Uninet Directory
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ss-info2.txt">ss-info2.txt</A> <tab to=T><TD> 5120<BR><TD> The Social Security Number, by Barbara Bennett
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssan.hac">ssan.hac</A> <tab to=T><TD> 4738<BR><TD> The Social Security Number
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssn-stuf.txt">ssn-stuf.txt</A> <tab to=T><TD> 19840<BR><TD> More about why Social Security Numbers are Insecure
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssnum.ana">ssnum.ana</A> <tab to=T><TD> 1791<BR><TD> About Social Security Numbers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/starlink.txt">starlink.txt</A> <tab to=T><TD> 26902<BR><TD> Information on Galaxy Starlink: A User's Guide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/starmast.txt">starmast.txt</A> <tab to=T><TD> 12657<BR><TD> Hacking the Gandalf Starmaster by Deicide (May 22, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/statemind.txt">statemind.txt</A> <tab to=T><TD> 5863<BR><TD> So, You Wanna Be a Hacker? It's a State of Mind!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/stoll.doc">stoll.doc</A> <tab to=T><TD> 58801<BR><TD> Writings of Clifford Stoll
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/storehac">storehac</A> <tab to=T><TD> 4515<BR><TD> Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/stupidki.hac">stupidki.hac</A> <tab to=T><TD> 4942<BR><TD> Those Stupid Little Bastard Hackers!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sun413.txt">sun413.txt</A> <tab to=T><TD> 31595<BR><TD> How to improve security on a newly installed SunOS 4.html.3 system. by Thomas M. Kroeger (July 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sundevil.txt">sundevil.txt</A> <tab to=T><TD> 3252<BR><TD> Operation Sundevil, by the Prodigy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/superd.txt">superd.txt</A> <tab to=T><TD> 5112<BR><TD> DocumentationL Superdial 1.03 by Evan Anderson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sys75.hac">sys75.hac</A> <tab to=T><TD> 9410<BR><TD> The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ta&amp;m.txt">ta&m.txt</A> <tab to=T><TD> 20778<BR><TD> Texas A&M Network Security Package Overview 7/1/1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tachelp">tachelp</A> <tab to=T><TD> 6285<BR><TD> Captures of Information on TACACS by The Argonaut
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tan.txt">tan.txt</A> <tab to=T><TD> 37769<BR><TD> List of Telenet Access Numbers by Daredevil of P/HUN
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcp-ip.txt">tcp-ip.txt</A> <tab to=T><TD> 35765<BR><TD> FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.03">tcsb.03</A> <tab to=T><TD> 29427<BR><TD> Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.04">tcsb.04</A> <tab to=T><TD> 11790<BR><TD> An Introduction to PRIMOS CPL Directives by Necrovore
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.05">tcsb.05</A> <tab to=T><TD> 30972<BR><TD> Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.06">tcsb.06</A> <tab to=T><TD> 27636<BR><TD> Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.08">tcsb.08</A> <tab to=T><TD> 4370<BR><TD> Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.html1">tcsb.html1</A> <tab to=T><TD> 8938<BR><TD> Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.html2">tcsb.html2</A> <tab to=T><TD> 3370<BR><TD> Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/techhack.hac">techhack.hac</A> <tab to=T><TD> 8368<BR><TD> A Guide to ADS System, by Lord Digital and the Phantom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/techiq.txt">techiq.txt</A> <tab to=T><TD> 9737<BR><TD> Hacking Techniques, by Logan-5 (Hacker Supreme)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/technicl.txt">technicl.txt</A> <tab to=T><TD> 9809<BR><TD> Technical Hacking: Volume One by the Warelock
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele3.txt">tele3.txt</A> <tab to=T><TD> 8229<BR><TD> Telenet Scanning by Doc Telecom (July 11, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele4.txt">tele4.txt</A> <tab to=T><TD> 2936<BR><TD> An Overview of Telenet by Man Max
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele5.hac">tele5.hac</A> <tab to=T><TD> 6492<BR><TD> Hacking Telnet by The Flash
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telecode.txt">telecode.txt</A> <tab to=T><TD> 24857<BR><TD> Telenet Codes, Hacked Out by ZORON (May 1, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telecomm.txt">telecomm.txt</A> <tab to=T><TD> 2271<BR><TD> An Introductory Guide to Telenet Commands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleinfo.txt">teleinfo.txt</A> <tab to=T><TD> 6496<BR><TD> Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet.hac">telenet.hac</A> <tab to=T><TD> 10465<BR><TD> Telenet: The Secret Exposed
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet.txt">telenet.txt</A> <tab to=T><TD> 2732<BR><TD> An Introductory Guide to Telenet Commands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet2.txt">telenet2.txt</A> <tab to=T><TD> 24259<BR><TD> A Good amount of general Telenet Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneth.txt">teleneth.txt</A> <tab to=T><TD> 2203<BR><TD> An Introductory Guide to Telenet Commands
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneti">teleneti</A> <tab to=T><TD> 6192<BR><TD> Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneti.phk">teleneti.phk</A> <tab to=T><TD> 2720<BR><TD> Instructions for using TELENET.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telescan.txt">telescan.txt</A> <tab to=T><TD> 7940<BR><TD> Information on Telenet Scanning
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tellerma.txt">tellerma.txt</A> <tab to=T><TD> 1982<BR><TD> Cracking Auto Bank Teller Machines by the Suspect
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teln2.txt">teln2.txt</A> <tab to=T><TD> 2703<BR><TD> Telenet Terminal Identifiers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teln3.txt">teln3.txt</A> <tab to=T><TD> 32422<BR><TD> Welcome to the TCO Access Listing (September 15, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telnetsn.txt">telnetsn.txt</A> <tab to=T><TD> 8803<BR><TD> Telenet Scanning by Doc Telecom (July 11, 1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telnumbe.txt">telnumbe.txt</A> <tab to=T><TD> 31564<BR><TD> Telenet Access Numbers, by the Weenie Warriors
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teltermz.txt">teltermz.txt</A> <tab to=T><TD> 13604<BR><TD> List of Terminal Identifiers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tempest.hac">tempest.hac</A> <tab to=T><TD> 5122<BR><TD> Excerpt of article on Tempest
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thc.nfo">thc.nfo</A> <tab to=T><TD> 11145<BR><TD> NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thc2.nfo">thc2.nfo</A> <tab to=T><TD> 21205<BR><TD> The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thehaq.txt">thehaq.txt</A> <tab to=T><TD> 109515<BR><TD> The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thuglan1.txt">thuglan1.txt</A> <tab to=T><TD> 16453<BR><TD> Introduction to Hacking into LANs by THUG
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thuglan2.txt">thuglan2.txt</A> <tab to=T><TD> 10483<BR><TD> General Information on LANs by THUG (July 31, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tihack2.txt">tihack2.txt</A> <tab to=T><TD> 31999<BR><TD> Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/timenet.txt">timenet.txt</A> <tab to=T><TD> 5434<BR><TD> Hacking Tymnet by Byte Brain
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tl-user.txt">tl-user.txt</A> <tab to=T><TD> 37318<BR><TD> ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tl.q-a">tl.q-a</A> <tab to=T><TD> 6240<BR><TD> ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tmplefun.txt">tmplefun.txt</A> <tab to=T><TD> 3451<BR><TD> Fun with Temple's Computers (A How To)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet1.txt">tnet1.txt</A> <tab to=T><TD> 21888<BR><TD> Tymnet File #1 by The Twilight Phone
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet2.txt">tnet2.txt</A> <tab to=T><TD> 16896<BR><TD> Tymnet File #2 by The Twilight Phone
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet3.txt">tnet3.txt</A> <tab to=T><TD> 14592<BR><TD> Tymnet File #3 by The Twilight Phone
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnpcpod.txt">tnpcpod.txt</A> <tab to=T><TD> 26685<BR><TD> TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tops20.txt">tops20.txt</A> <tab to=T><TD> 7075<BR><TD> Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/transdir.txt">transdir.txt</A> <tab to=T><TD> 14377<BR><TD> The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trash.txt">trash.txt</A> <tab to=T><TD> 5888<BR><TD> Dumpster Diving: An overview of the legality, by Full Disclosure
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trashing.rot">trashing.rot</A> <tab to=T><TD> 18277<BR><TD> The Art of Trashing by Deicide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/traxtool.txt">traxtool.txt</A> <tab to=T><TD> 13541<BR><TD> The Trax Toolbox Volume #001 by Track
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/triad187.hac">triad187.hac</A> <tab to=T><TD> 19927<BR><TD> The Triad: A 3-in-1 Textfile Magazine, Issue #1
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trojan">trojan</A> <tab to=T><TD> 9131<BR><TD> Rumors of Worms and Trojan Horses by Mike Guffey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tsrcrack.txt">tsrcrack.txt</A> <tab to=T><TD> 2822<BR><TD> SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ttyspoof.txt">ttyspoof.txt</A> <tab to=T><TD> 7786<BR><TD> TTY Spoofing, by SubEthan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tym_ods.txt">tym_ods.txt</A> <tab to=T><TD> 20850<BR><TD> TymNet OutDials Sorted By Area Code
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tyme2.txt">tyme2.txt</A> <tab to=T><TD> 8055<BR><TD> International Packet Switching Services Description
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymenet.hac">tymenet.hac</A> <tab to=T><TD> 20577<BR><TD> Tymenet Technical and User Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet.ods">tymnet.ods</A> <tab to=T><TD> 1777<BR><TD> Listing of Tymnet ODS Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet.txt">tymnet.txt</A> <tab to=T><TD> 205145<BR><TD> Packet Networks I and other Tymnet Information by Digital Demon, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet96.txt">tymnet96.txt</A> <tab to=T><TD> 17283<BR><TD> BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ueber.txt">ueber.txt</A> <tab to=T><TD> 8770<BR><TD> A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/uk.dialups">uk.dialups</A> <tab to=T><TD> 28896<BR><TD> A List of Modem Dialups in the UK (September 22, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ukguide.hac">ukguide.hac</A> <tab to=T><TD> 13693<BR><TD> The Guide to Online Databases for UK Users
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ulimate.txt">ulimate.txt</A> <tab to=T><TD> 61683<BR><TD> The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ultrad3.txt">ultrad3.txt</A> <tab to=T><TD> 10880<BR><TD> The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/unineta.phk">unineta.phk</A> <tab to=T><TD> 7049<BR><TD> Uninet Information, from The South Pole
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/unp.txt">unp.txt</A> <tab to=T><TD> 30663<BR><TD> SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/up.txt">up.txt</A> <tab to=T><TD> 1593<BR><TD> SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/usrguide.txt">usrguide.txt</A> <tab to=T><TD> 16128<BR><TD> The NIST Computer User's Guide to the Protection of Information Resources
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vanish.txt">vanish.txt</A> <tab to=T><TD> 3901<BR><TD> The Hacker Who Vanished: Suicide or Clever Hoax?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vax-7.txt">vax-7.txt</A> <tab to=T><TD> 2248<BR><TD>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vendors.hac">vendors.hac</A> <tab to=T><TD> 55184<BR><TD> Large Security Vendors List
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/verstell.ana">verstell.ana</A> <tab to=T><TD> 3221<BR><TD> Neat Fun with Versatellers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/virus">virus</A> <tab to=T><TD> 11269<BR><TD> Attack of the Computer Virus, by Lee Dembart
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 4662<BR><TD> Hacking Voice Mail Boxes by Tik Tak
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vmsptuto.txt">vmsptuto.txt</A> <tab to=T><TD> 12717<BR><TD> The IBM VMSSP System, by The Motorhead
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack1.txt">vthack1.txt</A> <tab to=T><TD> 9844<BR><TD> The VT Hacker, by the Man Hermit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack2.txt">vthack2.txt</A> <tab to=T><TD> 9378<BR><TD> The VT Hacker #2, by the Mad Hermit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack3.txt">vthack3.txt</A> <tab to=T><TD> 29178<BR><TD> The VT Hacker #3, by The Mad Hermit
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vtp.txt">vtp.txt</A> <tab to=T><TD> 17664<BR><TD> A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wal-mart.txt">wal-mart.txt</A> <tab to=T><TD> 4175<BR><TD> Hacking the Wal-Mart Armorguard Computer Protection System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wanghack.hac">wanghack.hac</A> <tab to=T><TD> 5302<BR><TD> Hacking the Wang OS, by Dark Knight
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wargames">wargames</A> <tab to=T><TD> 5912<BR><TD> The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wargames.hum">wargames.hum</A> <tab to=T><TD> 8715<BR><TD> Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/watching">watching</A> <tab to=T><TD> 3552<BR><TD> Watching the Watcher Watching You by Sir Knight
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wats.txt">wats.txt</A> <tab to=T><TD> 9978<BR><TD> WATS Version 1.0 by Professor Falken & The Aptolcater
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/whca_txtmsg.log">whca_txtmsg.log</A> <tab to=T><TD> 178486<BR><TD> The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/xerox.hac">xerox.hac</A> <tab to=T><TD> 2321<BR><TD> Hacking Xerox
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/xmux.txt">xmux.txt</A> <tab to=T><TD> 12318<BR><TD> The ROT Guide to Gandalf XMUX's by Deicide
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/zen.hac">zen.hac</A> <tab to=T><TD> 52401<BR><TD> Dan Farmer's Improving the Security of Your Site by Breaking Into It
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/zippass.txt">zippass.txt</A> <tab to=T><TD> 5637<BR><TD> The Security of PKZIP Encryption
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 691 files for a total of 18,779,213 bytes.</SMALL><TR><TD ALIGN=RIGHT><SMALL>There are 9 directories.</SMALL></TABLE></BODY>
</HTML>
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
either <A HREF="http://archives.textfiles.com/hacking.tar.gz"><B>hacking.tar.gz</B></A> (10075176 bytes) or <A HREF="http://archives.textfiles.com/hacking.zip"><B>hacking.zip</B></A> (10676848 bytes) instead of all the files separately. <P>