mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-05 22:37:37 +02:00
740 lines
110 KiB
HTML
740 lines
110 KiB
HTML
<HTML>
|
||
<TITLE>T E X T F I L E S</TITLE>
|
||
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
|
||
<H1>Hacking Textfiles</H1>
|
||
<P>
|
||
Around the 1970's, the term "hacking" meant any deep interest in computers
|
||
that manifested itself in programming or learning arcane aspects of the
|
||
machinery or operating systems. By the early 1980's, this meaning morphed
|
||
into a general term of fear to describe anyone who did anything even remotely
|
||
evil using computer equipment. The people who considered themselves
|
||
non-malicious "Hackers" decried this bastardization of the term they took
|
||
with pride, and the new name "cracker" arrived, years after that name
|
||
applied to people who removed copy protection from home video games.
|
||
By the late 80's to early 90's, no one cared too much, except for the
|
||
people who care about everything too much.
|
||
<P>
|
||
In other words, these textfiles are all about hacking.
|
||
<P>
|
||
In accordance with this spirit, anything involving subverting any technology,
|
||
for good or evil, is placed here. Unless, of course, you're talking about
|
||
telephones, at which point you should go over to
|
||
the <A href="phreak.html">phreaking</A> section.
|
||
<P>
|
||
If you're looking for electronic hacking magazines, go check out the
|
||
<A HREF="magazines.html">magazines</A>. Additionally, you might also check the
|
||
<A HREF="groups.html">groups</A> section if your file was written by someone who
|
||
was part of a group.
|
||
<P>
|
||
<TABLE WIDTH=100%>
|
||
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
|
||
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
|
||
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
|
||
|
||
<tab indent=60 id=T><br>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/BIBLIOGRAPHIES.html">BIBLIOGRAPHIES</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Lists of Articles and Books about Hackers and Hacking</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/CABLE.html">CABLE</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles about Cable TV and Cable TV Piracy</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/COLORBOOKS.html">COLORBOOKS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Purported Department of Defense Computer Security Guidelines</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/CONVENTIONS.html">CONVENTIONS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B> Information about different Hacking Conventions</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/INTERNET.html">INTERNET</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Files Dealing With Hacking on the Internet</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/MICROSOFT.html">MICROSOFT</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Files Dealing with Hacking Windows and DOS</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/POLICIES.html">POLICIES</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Various Ethics and Policies of Computing Facilities Nationwide</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/UNIX.html">UNIX</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles About Exploring or Exploiting UNIX</B></TD></TR>
|
||
<TR VALIGN=TOP><TD VALIGN=TOP><B><A HREF="hacking/VMS.html">VMS</A></B><TAB TO=T><TD WIDTH=20></TD><TD><B>Textfiles About Exploring or Exploiting VMS and VAXes</B></TD></TR>
|
||
<TR><TD> </TD></TR>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/22.txt">22.txt</A> <tab to=T><TD> 4999<BR><TD> DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/23things.txt">23things.txt</A> <tab to=T><TD> 2342<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600-9-3.txt">2600-9-3.txt</A> <tab to=T><TD> 144176<BR><TD> 2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600_ind">2600_ind</A> <tab to=T><TD> 96106<BR><TD> 2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/2600faq.011">2600faq.011</A> <tab to=T><TD> 169226<BR><TD> Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/386i.txt">386i.txt</A> <tab to=T><TD> 1920<BR><TD> CIAC Advisory Notice: Authentication bypass in Sun 386i machines
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/5600.txt">5600.txt</A> <tab to=T><TD> 84069<BR><TD> Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aahack.txt">aahack.txt</A> <tab to=T><TD> 3112<BR><TD> Anarchy Anonymous: Hacking your School Network
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/accesblt.hac">accesblt.hac</A> <tab to=T><TD> 20551<BR><TD> Advanced Authentication Technology, 1991
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/accessin.txt">accessin.txt</A> <tab to=T><TD> 14070<BR><TD> A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acro01.txt">acro01.txt</A> <tab to=T><TD> 4538<BR><TD> Max Headroom's Hacker Acronym List
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acro02.txt">acro02.txt</A> <tab to=T><TD> 5532<BR><TD> Max Headroom's Second Collection of Acronyms
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acrolist.phk">acrolist.phk</A> <tab to=T><TD> 8181<BR><TD> Acronym List, Early 1990s
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/acroynym.txt">acroynym.txt</A> <tab to=T><TD> 30296<BR><TD> The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/adssys.txt">adssys.txt</A> <tab to=T><TD> 10048<BR><TD> A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aio.box">aio.box</A> <tab to=T><TD> 2485<BR><TD> All in One Box, by Disk Doctor
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aio5b.txt">aio5b.txt</A> <tab to=T><TD> 6588<BR><TD> AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ais.txt">ais.txt</A> <tab to=T><TD> 15248<BR><TD> AIS: The Automatic Intercept System by Computer Consoles Incorporated
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aix.fun">aix.fun</A> <tab to=T><TD> 778<BR><TD> Warning to download some AIX Patches
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/allnet01.txt">allnet01.txt</A> <tab to=T><TD> 3939<BR><TD> Hacking Allnet by Shadow Warrior (January 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/amhack.txt">amhack.txt</A> <tab to=T><TD> 12374<BR><TD> Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ansibomb.txt">ansibomb.txt</A> <tab to=T><TD> 10496<BR><TD> ANSI Bombs II: Tips and Techniques, by The Raging Golem
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aohell.phk">aohell.phk</A> <tab to=T><TD> 1071<BR><TD> Why I wrote AOLHell
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aoim.txt">aoim.txt</A> <tab to=T><TD> 1725<BR><TD> The Risks of Using an AOL Client Behind a Firewall
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aolhak.txt">aolhak.txt</A> <tab to=T><TD> 9252<BR><TD> How to Hack America on Line by the Hooded Bobs
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/as400cmd.hac">as400cmd.hac</A> <tab to=T><TD> 27788<BR><TD> IBM AS/400 Command Summary
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/as400cmd.txt">as400cmd.txt</A> <tab to=T><TD> 28178<BR><TD> All IBM AS/400 Commands by The Might
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen.txt">aspen.txt</A> <tab to=T><TD> 16772<BR><TD> A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen1.txt">aspen1.txt</A> <tab to=T><TD> 16843<BR><TD> A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/aspen2.txt">aspen2.txt</A> <tab to=T><TD> 11053<BR><TD> A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/assolink.txt">assolink.txt</A> <tab to=T><TD> 11949<BR><TD> An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/at&arebl.txt">at&arebl.txt</A> <tab to=T><TD> 2965<BR><TD> Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atlas.txt">atlas.txt</A> <tab to=T><TD> 4938<BR><TD> Hackers' Atlas, by Ragon/Wynvern/BOF
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm-92.txt">atm-92.txt</A> <tab to=T><TD> 20096<BR><TD> ATMS: The Real File for ATM Theft in 1992 by The Raven
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm-more.txt">atm-more.txt</A> <tab to=T><TD> 20049<BR><TD> A Whole Collection of the Risks of ATM Cards (1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm.txt">atm.txt</A> <tab to=T><TD> 8167<BR><TD> Hacking ATM's by Blue Thunder
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atm1.txt">atm1.txt</A> <tab to=T><TD> 2773<BR><TD> The Disk Jockey Presents Scamming ATMs
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atma.hac">atma.hac</A> <tab to=T><TD> 22036<BR><TD> Quick OVerview of ATM Security (Needs Editing)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmapps.txt">atmapps.txt</A> <tab to=T><TD> 1771<BR><TD> "Gee Whiz" ATM Applications are On the Horizon
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmfile">atmfile</A> <tab to=T><TD> 21290<BR><TD> ATM secret codes, from Fred Gindburg (July 10, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atmhacking.txt">atmhacking.txt</A> <tab to=T><TD> 5742<BR><TD> Hacking ATMs, by Anonymous
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atms">atms</A> <tab to=T><TD> 14827<BR><TD> An Overview of ATMs and Information on the Encoding System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/atms.txt">atms.txt</A> <tab to=T><TD> 20384<BR><TD> Track Layouts on ATM Cards
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/auditool.txt">auditool.txt</A> <tab to=T><TD> 12681<BR><TD> Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austhack.hac">austhack.hac</A> <tab to=T><TD> 7324<BR><TD> Australian Dialups
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac0.txt">austpac0.txt</A> <tab to=T><TD> 14674<BR><TD> Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac1.txt">austpac1.txt</A> <tab to=T><TD> 11953<BR><TD> Additional AUSTPAC Character Terminal Manual
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac2.txt">austpac2.txt</A> <tab to=T><TD> 20338<BR><TD> AUSTPAC General Information and Codes
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/austpac3.txt">austpac3.txt</A> <tab to=T><TD> 15830<BR><TD> The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autohack.txt">autohack.txt</A> <tab to=T><TD> 5504<BR><TD> Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autonet1.txt">autonet1.txt</A> <tab to=T><TD> 11411<BR><TD> Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autotelldoc.ana">autotelldoc.ana</A> <tab to=T><TD> 5439<BR><TD> Fun with Automatic Tellers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon1.hac">autovon1.hac</A> <tab to=T><TD> 2230<BR><TD> Introduction to the Automated Voice Network (Autovon) by Shadowrunner
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon2.hac">autovon2.hac</A> <tab to=T><TD> 3387<BR><TD> Introduction to the Automated Voice Network (Autovon) Part II
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovon3.hac">autovon3.hac</A> <tab to=T><TD> 1809<BR><TD> Introduction to the Automated Voice Network (Autovon) Part III
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/autovoni.nst">autovoni.nst</A> <tab to=T><TD> 19395<BR><TD> Overview of the Automatic Voice Network (Autovon)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/avoidcap.txt">avoidcap.txt</A> <tab to=T><TD> 2576<BR><TD> Planning Ahead for Phone Phreaks/Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/babyna.mes">babyna.mes</A> <tab to=T><TD> 203893<BR><TD> The Moby Words Database (List of Words) (1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/backdoor.txt">backdoor.txt</A> <tab to=T><TD> 19156<BR><TD> How to Hold Onto UNIX Root Once You Have It
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bankhack.txt">bankhack.txt</A> <tab to=T><TD> 12641<BR><TD> The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic.net">basic.net</A> <tab to=T><TD> 14775<BR><TD> Basic Networking, by Sk8 the Skinhead
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic1.hac">basic1.hac</A> <tab to=T><TD> 7491<BR><TD> The Basics of Hacking I: DECs By the Knights of Shadow
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basic3.hac">basic3.hac</A> <tab to=T><TD> 4349<BR><TD> The Basics of Hacking III: Data General By the Knights of Shadow
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basicnet.hac">basicnet.hac</A> <tab to=T><TD> 14534<BR><TD> Basic Networking (1989) by Sk8 The SkinHead
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/basics">basics</A> <tab to=T><TD> 16646<BR><TD> Rambug's Hacking Volume #1 by Rambug
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bbsfiles.txt">bbsfiles.txt</A> <tab to=T><TD> 38272<BR><TD> The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bd-tv5.txt">bd-tv5.txt</A> <tab to=T><TD> 7439<BR><TD> Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bindery.txt">bindery.txt</A> <tab to=T><TD> 4201<BR><TD> Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/boahack.txt">boahack.txt</A> <tab to=T><TD> 6686<BR><TD> Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/boces.txt">boces.txt</A> <tab to=T><TD> 6957<BR><TD> The Slipped Disk takes over the BOCES Computer: A Log
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/bom-hh&p.txt">bom-hh&p.txt</A> <tab to=T><TD> 9785<BR><TD> The History of Hacking and Phreaking by Raven of BOMB Squad
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/books.txt">books.txt</A> <tab to=T><TD> 41728<BR><TD> Biblography of Computer Security Books (1973 through 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/brute.txt">brute.txt</A> <tab to=T><TD> 3462<BR><TD> BRUTE: A brute force approach to hacking Unix passwords. Version 1.html
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/btinfo.h-k">btinfo.h-k</A> <tab to=T><TD> 14037<BR><TD> BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/c64fun1.txt">c64fun1.txt</A> <tab to=T><TD> 2927<BR><TD> Suggestions On What to Do with a Commodore 64, by Nightstalker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/callcard.phk">callcard.phk</A> <tab to=T><TD> 1734<BR><TD> Hacking Calling Cards, by The Pyromaniac
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/candyland.faq">candyland.faq</A> <tab to=T><TD> 4823<BR><TD> The Candyman Explains How He Will Accept Explosives Files
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/carcodes.txt">carcodes.txt</A> <tab to=T><TD> 3358<BR><TD> Codes Used by Computers in Cars
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cb1.txt">cb1.txt</A> <tab to=T><TD> 3407<BR><TD> Citibank Hacking, by Johnny Hundu
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cb2.txt">cb2.txt</A> <tab to=T><TD> 2145<BR><TD> Small Rant about Hacking Citibank
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbiinfo">cbiinfo</A> <tab to=T><TD> 19013<BR><TD> Using and Abusing CBI by The Ghost
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbrsp-1.hac">cbrsp-1.hac</A> <tab to=T><TD> 6075<BR><TD> The Cyberspace Chronicle Volume 1 by Phardak
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbvhack.pnk">cbvhack.pnk</A> <tab to=T><TD> 6694<BR><TD> CBV Hacking by PiNK ToRPeDo (June 7, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cbvhack.txt">cbvhack.txt</A> <tab to=T><TD> 5754<BR><TD> CBV Hackin' by Pink Torpedo (June 7, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chahelp_.txt">chahelp_.txt</A> <tab to=T><TD> 9164<BR><TD> Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos01.txt">chaos01.txt</A> <tab to=T><TD> 1609<BR><TD> The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos02.txt">chaos02.txt</A> <tab to=T><TD> 2577<BR><TD> The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chaos03.txt">chaos03.txt</A> <tab to=T><TD> 4264<BR><TD> The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/chilton1.txt">chilton1.txt</A> <tab to=T><TD> 7970<BR><TD> Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/china02doc.hac">china02doc.hac</A> <tab to=T><TD> 23257<BR><TD> China Newsletter #02 (Hacking/Phreaking File Compilation)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/church4.ptl">church4.ptl</A> <tab to=T><TD> 9611<BR><TD> Church Chat Volume 4 by The Spiker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cis.phk">cis.phk</A> <tab to=T><TD> 6583<BR><TD> Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cisagain.txt">cisagain.txt</A> <tab to=T><TD> 6192<BR><TD> Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cisinfo4.txt">cisinfo4.txt</A> <tab to=T><TD> 8104<BR><TD> Compuserve Information by Morgoth and Lotus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ciss3.txt">ciss3.txt</A> <tab to=T><TD> 18816<BR><TD> List of Access Numbers to the Compuserve Information Service
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/citibank.txt">citibank.txt</A> <tab to=T><TD> 6226<BR><TD> Hacking into Citibank with Johnny Hindu
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/citibank2.txt">citibank2.txt</A> <tab to=T><TD> 6430<BR><TD> Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cjack.faq">cjack.faq</A> <tab to=T><TD> 4837<BR><TD> Cracker Jack FAQ Written by kM (1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/codphone">codphone</A> <tab to=T><TD> 3842<BR><TD> Coda-Phones by D.T. Legna
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/com_sec90.hac">com_sec90.hac</A> <tab to=T><TD> 54579<BR><TD> United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/com_sec91.hac">com_sec91.hac</A> <tab to=T><TD> 15590<BR><TD> United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compserv.txt">compserv.txt</A> <tab to=T><TD> 6337<BR><TD> Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compus.txt">compus.txt</A> <tab to=T><TD> 3286<BR><TD> Free Compuserve Passwords, by Devious Xevious
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compuser.txt">compuser.txt</A> <tab to=T><TD> 27008<BR><TD> A Quick Compuserve Index
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compusin.txt">compusin.txt</A> <tab to=T><TD> 1386<BR><TD> Some Compuserve Tips, by Eric Diamond
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/compusrv">compusrv</A> <tab to=T><TD> 5599<BR><TD> Compuserve Hacking by The Locksmith
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/concis.txt">concis.txt</A> <tab to=T><TD> 3488<BR><TD> Free Compuserve Access
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/contact.txt">contact.txt</A> <tab to=T><TD> 5246<BR><TD> How to Contact the HACK SQUAD
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/copier.hac">copier.hac</A> <tab to=T><TD> 10206<BR><TD> Magnetic Stripes, by Count Zero
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cops-rl">cops-rl</A> <tab to=T><TD> 23583<BR><TD> RL C.O.P.S. File by Brian Oblivion
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos.hac">cosmos.hac</A> <tab to=T><TD> 10942<BR><TD> C O S M O S, by Doctor Who
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos1.txt">cosmos1.txt</A> <tab to=T><TD> 7458<BR><TD> Hacking into COSMOS by Wizard of OZ
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos2.hac">cosmos2.hac</A> <tab to=T><TD> 9608<BR><TD> Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cosmos3.hac">cosmos3.hac</A> <tab to=T><TD> 8320<BR><TD> The 1986 COSMOS Files Part III by Sir William
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/crackam1.txt">crackam1.txt</A> <tab to=T><TD> 63466<BR><TD> Hacking Programs on the Amiga by FunToHack
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/crackdwn.txt">crackdwn.txt</A> <tab to=T><TD> 26230<BR><TD> Crackdown, from 2600 Magazine volume 7, number 1 SPRING
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/creditfr.txt">creditfr.txt</A> <tab to=T><TD> 8914<BR><TD> The Adventures in Fraud Series Volume I, by Sneak Thief (1985)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/credunin.con">credunin.con</A> <tab to=T><TD> 1314<BR><TD> Numbers of Credit Unions and protection Agencies
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cs.hac">cs.hac</A> <tab to=T><TD> 2815<BR><TD> How to Get a Free Account on Compuserve
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cs.txt">cs.txt</A> <tab to=T><TD> 2944<BR><TD> How to Get a Free Compuserve Account
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/csl8_93.hac">csl8_93.hac</A> <tab to=T><TD> 12359<BR><TD> CSL Bulletin 1993
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cuthesis.txt">cuthesis.txt</A> <tab to=T><TD> 154635<BR><TD> The Social Organization of the Computer Underground by Gordon R. Meyer
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cyber.txt">cyber.txt</A> <tab to=T><TD> 11505<BR><TD> The Cyberpunk Movement by Pazuzu of DnA May 12, 1993
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/cyberhac.txt">cyberhac.txt</A> <tab to=T><TD> 11078<BR><TD> Hacking Control Data Corporation's Cyber, by The Ghost
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/data.tap">data.tap</A> <tab to=T><TD> 3604<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/data_gen">data_gen</A> <tab to=T><TD> 1574<BR><TD> Captain Crunch talks about hacking Data General Systems
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/database.txt">database.txt</A> <tab to=T><TD> 3142<BR><TD> CIRR Database: A tool for Corporate Research
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datakit.hac">datakit.hac</A> <tab to=T><TD> 14409<BR><TD> How to connect across VCS/ISN boundaries
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datanet.doc">datanet.doc</A> <tab to=T><TD> 6670<BR><TD> The Basics of TELENET
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.hac">datapac.hac</A> <tab to=T><TD> 15579<BR><TD> A Guide to DataPAC by The Fixer
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.inf">datapac.inf</A> <tab to=T><TD> 12170<BR><TD> Technical Guide to DataPac by the New Dark Council (1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac.txt">datapac.txt</A> <tab to=T><TD> 14413<BR><TD> A Guide to DataPAC by The Fixer (April 18, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac1.txt">datapac1.txt</A> <tab to=T><TD> 16626<BR><TD> A Guide to DataPAC version 1.html by The Fixer
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac2.txt">datapac2.txt</A> <tab to=T><TD> 19480<BR><TD> Datapac 3101 ITI Parameters Description
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datapac3.txt">datapac3.txt</A> <tab to=T><TD> 2430<BR><TD> Datapac 3101 Public Outdial Ports
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datatap.txt">datatap.txt</A> <tab to=T><TD> 4109<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/datatapp.txt">datatapp.txt</A> <tab to=T><TD> 4088<BR><TD> Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn01.txt">ddn01.txt</A> <tab to=T><TD> 2993<BR><TD> DDN Security Bulletin #1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn03.hac">ddn03.hac</A> <tab to=T><TD> 11207<BR><TD> Defense Data Network Security Bulletin #3
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn04.hac">ddn04.hac</A> <tab to=T><TD> 3143<BR><TD> Defense Data Network Security Bulletin #4
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn05.hac">ddn05.hac</A> <tab to=T><TD> 4295<BR><TD> Defense Data Network Security Bulletin #5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddn06.hac">ddn06.hac</A> <tab to=T><TD> 3015<BR><TD> Defense Data Network Security Bulletin #6
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddnet1.txt">ddnet1.txt</A> <tab to=T><TD> 8294<BR><TD> DDN: Information on the Defense Data Network from Unauthorized Access UK
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ddnet2.txt">ddnet2.txt</A> <tab to=T><TD> 2421<BR><TD> DDN: The Defense Data Network (A Map)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/debtcard.txt">debtcard.txt</A> <tab to=T><TD> 3730<BR><TD> Harvard Medical School Installs ISDN-Based Debit Card System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dec10.txt">dec10.txt</A> <tab to=T><TD> 23846<BR><TD> Hacking the DEC-10 System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dec_200.txt">dec_200.txt</A> <tab to=T><TD> 3239<BR><TD> The Decserver 200 Revealed by Surf Studd (October 23, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defaults.txt">defaults.txt</A> <tab to=T><TD> 6726<BR><TD> Hacking into a Variety of Systems by using their Default Accounts
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defcon.info">defcon.info</A> <tab to=T><TD> 26112<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defconadd.hac">defconadd.hac</A> <tab to=T><TD> 11951<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defdb.hac">defdb.hac</A> <tab to=T><TD> 77311<BR><TD> Department of Defense Federal Data Bases (List)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defense.hac">defense.hac</A> <tab to=T><TD> 10447<BR><TD> Defense Data Network Blues by Harry Hackalot
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defense.txt">defense.txt</A> <tab to=T><TD> 10198<BR><TD> Defense Data Network Blues by Harry Hackalot (1984)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/defnetbl.txt">defnetbl.txt</A> <tab to=T><TD> 10501<BR><TD> Defense Data Network Blues by Harry Hackalot (August 31, 1983)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/demystif.txt">demystif.txt</A> <tab to=T><TD> 3871<BR><TD> Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/denning.txt">denning.txt</A> <tab to=T><TD> 59865<BR><TD> Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/des.txt">des.txt</A> <tab to=T><TD> 22528<BR><TD> The Data Encruption Standard (DES) Fact Sheet
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desblt.txt">desblt.txt</A> <tab to=T><TD> 24448<BR><TD> The Data Encryption Standard (DES) June 1990
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desval.hac">desval.hac</A> <tab to=T><TD> 3149<BR><TD> DES Validation List
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/desval.txt">desval.txt</A> <tab to=T><TD> 3905<BR><TD> DES Validation List
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialback.txt">dialback.txt</A> <tab to=T><TD> 10113<BR><TD> Dial-Back Isn't Always Secure (February 28, 1985)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialog.txt">dialog.txt</A> <tab to=T><TD> 8142<BR><TD> Inside Dialog by Control C of Advanced Telecommunications Inc.
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialog01.txt">dialog01.txt</A> <tab to=T><TD> 8543<BR><TD> Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialout1.txt">dialout1.txt</A> <tab to=T><TD> 67840<BR><TD> A Novice Manual on Using Outdial Modems by Blue Adept
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialplus.txt">dialplus.txt</A> <tab to=T><TD> 4830<BR><TD> A Screengrab of Informaiton on PSS DialPlus from British Telecom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dialup.hac">dialup.hac</A> <tab to=T><TD> 18816<BR><TD> List of Dialups. For what? I have no idea.
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/disclaim">disclaim</A> <tab to=T><TD> 2875<BR><TD> Da Disclaimer, by Filbert
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/diskopt">diskopt</A> <tab to=T><TD> 6706<BR><TD> My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/djns.txt">djns.txt</A> <tab to=T><TD> 2377<BR><TD> Inside DJNS (Dow Jones News Service)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dlog-rdt">dlog-rdt</A> <tab to=T><TD> 44883<BR><TD> Complete Guide To The DIALOG Information Network by Brian oblivion
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dnicinf.hac">dnicinf.hac</A> <tab to=T><TD> 13312<BR><TD> D A T E X - P - International Traffic Relations
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dowjones.txt">dowjones.txt</A> <tab to=T><TD> 2570<BR><TD> Inside Dow Jones News Service
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacbas.txt">dpacbas.txt</A> <tab to=T><TD> 9468<BR><TD> The Basics of DataPAC by Mister X (February 2, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacintr.rot">dpacintr.rot</A> <tab to=T><TD> 37561<BR><TD> Introduction to DataPac from the Right of Terror and Deicide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dpacnuas.txt">dpacnuas.txt</A> <tab to=T><TD> 92595<BR><TD> The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/dtsb.hac">dtsb.hac</A> <tab to=T><TD> 8894<BR><TD> DEC Terminal Server Basics by Mad Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easyl.hac">easyl.hac</A> <tab to=T><TD> 3968<BR><TD> Hacking Easy Link I by Professor Falken
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easylink.hck">easylink.hck</A> <tab to=T><TD> 2399<BR><TD> Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/easylink.txt">easylink.txt</A> <tab to=T><TD> 4686<BR><TD> Hacking Easy-Link I by Professor Falken
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/edit.txt">edit.txt</A> <tab to=T><TD> 17792<BR><TD> Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ena!.hac">ena!.hac</A> <tab to=T><TD> 7877<BR><TD> The ENA Vision: What IS Ena?
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/encyclop.txt">encyclop.txt</A> <tab to=T><TD> 1502<BR><TD> Someone Makes fun of That Stupid Article
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/eproms.hac">eproms.hac</A> <tab to=T><TD> 5566<BR><TD> A Closer Look at EEPROMS by The Kingpin
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/eslf0006.txt">eslf0006.txt</A> <tab to=T><TD> 57267<BR><TD> The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ess.txt">ess.txt</A> <tab to=T><TD> 7153<BR><TD> Electronic Switching System by Black Knight, from 2600, Feb. 1984
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ethics.hac">ethics.hac</A> <tab to=T><TD> 3692<BR><TD> Newsweek: Teaching Hackers Ethics
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ethics.txt">ethics.txt</A> <tab to=T><TD> 5148<BR><TD> The Ethics of Hacking by Dissident
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/evasiv.txt">evasiv.txt</A> <tab to=T><TD> 7297<BR><TD> The Inspector's Thoughts, by Assailant's Blade and Ford Prefect
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/exeguide.txt">exeguide.txt</A> <tab to=T><TD> 23552<BR><TD> An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fast.txt">fast.txt</A> <tab to=T><TD> 5301<BR><TD> Hacking McDonalds, by Herb the Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbiaftha.hac">fbiaftha.hac</A> <tab to=T><TD> 16896<BR><TD> The FBI Fights Computer Crime
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbibust">fbibust</A> <tab to=T><TD> 6199<BR><TD> The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbicompu.hac">fbicompu.hac</A> <tab to=T><TD> 5225<BR><TD> Summary of FBI Computer Systems, by Ralph Harvey
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbicompu.txt">fbicompu.txt</A> <tab to=T><TD> 5246<BR><TD> Summary of FBI Computer Systems By Ralph Harvey (1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fbisys.txt">fbisys.txt</A> <tab to=T><TD> 5281<BR><TD> Summary of FBI Computer Systems, by Ralph Harvey
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcisacc.txt">fcisacc.txt</A> <tab to=T><TD> 3550<BR><TD> Getting Free Compuserve Access, by The Wanderjahr
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcscvol1.hac">fcscvol1.hac</A> <tab to=T><TD> 641496<BR><TD> Federal Criteria for Information Technology Security Volume I
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fcscvol2.hac">fcscvol2.hac</A> <tab to=T><TD> 566236<BR><TD> Federal Criteria for Information Technology Security Volume II
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fddi.hac">fddi.hac</A> <tab to=T><TD> 2156<BR><TD> How to FDDA Internals Work? Learning to Appreciate Tokens
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fdp1.txt">fdp1.txt</A> <tab to=T><TD> 12668<BR><TD> The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fdp2.txt">fdp2.txt</A> <tab to=T><TD> 13449<BR><TD> The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/feds">feds</A> <tab to=T><TD> 3702<BR><TD> Watching the Watcher Watching You, by Sir Knight of OSUNY BBS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/fh.txt">fh.txt</A> <tab to=T><TD> 49876<BR><TD> Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/findhole.txt">findhole.txt</A> <tab to=T><TD> 16372<BR><TD> Security Holes Manifest Themsleves in Four Ways (November 10, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/findho~1.txt">findho~1.txt</A> <tab to=T><TD> 16384<BR><TD> The Four Ways Security Holes Manifest Themselves (November 10, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force1.txt">force1.txt</A> <tab to=T><TD> 27946<BR><TD> Force Files Volume #1 (December 3, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force2.txt">force2.txt</A> <tab to=T><TD> 30310<BR><TD> Force Files Volume #2 (April 17, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force3.txt">force3.txt</A> <tab to=T><TD> 29702<BR><TD> Force Files Volume #3 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force4.txt">force4.txt</A> <tab to=T><TD> 28651<BR><TD> Force Files Volume #4 (August 1, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force5.txt">force5.txt</A> <tab to=T><TD> 32039<BR><TD> Force Files Volume #5 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force6.txt">force6.txt</A> <tab to=T><TD> 7027<BR><TD> Force Files Volume #6 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force7.txt">force7.txt</A> <tab to=T><TD> 31832<BR><TD> Force Files Volume #7 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force8.txt">force8.txt</A> <tab to=T><TD> 31694<BR><TD> Force Files Volume #8 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/force9.txt">force9.txt</A> <tab to=T><TD> 11387<BR><TD> Force Files Volume #9 (August 6, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/freebie3.hac">freebie3.hac</A> <tab to=T><TD> 103246<BR><TD> Compufreebies 3.html (1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/freecis.txt">freecis.txt</A> <tab to=T><TD> 3278<BR><TD> Free Compuserve Access
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/funwith5.hac">funwith5.hac</A> <tab to=T><TD> 5437<BR><TD> Fun With Automatic Tellers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/g.txt">g.txt</A> <tab to=T><TD> 22969<BR><TD> SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/garaghak.txt">garaghak.txt</A> <tab to=T><TD> 48489<BR><TD> Garage Door Opener Hacker Plans from Cybertek
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gateways">gateways</A> <tab to=T><TD> 8598<BR><TD> The Inter-Network Mail Guide - Copyright 1990 by John J. Chew
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/get-vip.txt">get-vip.txt</A> <tab to=T><TD> 11547<BR><TD> DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/getbust.txt">getbust.txt</A> <tab to=T><TD> 4631<BR><TD> Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/getinfo.txt">getinfo.txt</A> <tab to=T><TD> 5978<BR><TD> The Hacker's Guide to Investigations, by Ripper of HALE (1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gisdoc.hac">gisdoc.hac</A> <tab to=T><TD> 5966<BR><TD> Hacking the GIS computer by Doctor Crash
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/goodbye.ana">goodbye.ana</A> <tab to=T><TD> 1796<BR><TD> The Best of the Station, by The Prowler
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/goodkids.hac">goodkids.hac</A> <tab to=T><TD> 4548<BR><TD> Computer Hackers are Good People Too!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/govthlp.txt">govthlp.txt</A> <tab to=T><TD> 4106<BR><TD> The Help Screen on some Government System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gs1.txt">gs1.txt</A> <tab to=T><TD> 16195<BR><TD> Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gte.txt">gte.txt</A> <tab to=T><TD> 19883<BR><TD> Hacking GTE Telemail by Master Micro
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guide.txt">guide.txt</A> <tab to=T><TD> 42423<BR><TD> A Novice's Guide to Hacking- 1989 edition by The Mentor
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guidedoc.hac">guidedoc.hac</A> <tab to=T><TD> 5437<BR><TD> The RSTS User's Guide, by The Flash
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/guidehak.txt">guidehak.txt</A> <tab to=T><TD> 176913<BR><TD> The Neophyte's Guide to hacking (1993 Edition) by Deicide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/gunbelt3.txt">gunbelt3.txt</A> <tab to=T><TD> 8525<BR><TD> Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacethi.txt">hacethi.txt</A> <tab to=T><TD> 5949<BR><TD> The Ethics of Hacking, by Dissident of TES
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacethic.txt">hacethic.txt</A> <tab to=T><TD> 6161<BR><TD> The Ethics of Hacking by Dissident
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.faq">hack.faq</A> <tab to=T><TD> 251055<BR><TD> Beta .008 of the 2600/#hack FAQ
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.hac">hack.hac</A> <tab to=T><TD> 4096<BR><TD> Hacking And Computer Krashing #9, by Gray Wolf
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack.leg">hack.leg</A> <tab to=T><TD> 11978<BR><TD> A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack1.hac">hack1.hac</A> <tab to=T><TD> 7960<BR><TD> The Basics of Hacking, by the Knights of Shadow (Intro)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack2.hac">hack2.hac</A> <tab to=T><TD> 7450<BR><TD> The Basics of Hacking, by The Knights of Shadow (DECs)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack3">hack3</A> <tab to=T><TD> 6629<BR><TD> The Basics of Telenet Part I
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack4">hack4</A> <tab to=T><TD> 7894<BR><TD> Telenet Scanning
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack4.hac">hack4.hac</A> <tab to=T><TD> 4421<BR><TD> The Basics of Hacking, by The Knights of Shadow (Data General)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack5.hac">hack5.hac</A> <tab to=T><TD> 5761<BR><TD> Hacking McDonalds, by Herb of Burger King
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack7">hack7</A> <tab to=T><TD> 5417<BR><TD> Hacking the Compuserve Information Service
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack7.txt">hack7.txt</A> <tab to=T><TD> 4034<BR><TD> The Conscience of a Hacker by The Mentor (January 8, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9.hac">hack9.hac</A> <tab to=T><TD> 10950<BR><TD> Hacking Control Data Corporation's Cyber
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9301.rpt">hack9301.rpt</A> <tab to=T><TD> 39068<BR><TD> The Hack Report Volume 2, Number 1 (January 3, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9302.rpt">hack9302.rpt</A> <tab to=T><TD> 59113<BR><TD> The Hack Report Volume 2, Number 2 (February 7, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9303.rpt">hack9303.rpt</A> <tab to=T><TD> 53202<BR><TD> The Hack Report Volume 2, Number 3 (March 7, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9304.rpt">hack9304.rpt</A> <tab to=T><TD> 66762<BR><TD> The Hack Report Volume 2, Number 4 (April 4, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9305.rpt">hack9305.rpt</A> <tab to=T><TD> 91783<BR><TD> The Hack Report Volume 2, Number 5 (May 9, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9306.rpt">hack9306.rpt</A> <tab to=T><TD> 101520<BR><TD> The Hack Report Volume 2, Number 6 (June 6, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9307.rpt">hack9307.rpt</A> <tab to=T><TD> 117584<BR><TD> The Hack Report Volume 2, Number 7 (July 4, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9309.rpt">hack9309.rpt</A> <tab to=T><TD> 137473<BR><TD> The Hack Report Volume 2, Number 9 (September 12, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack9401.rpt">hack9401.rpt</A> <tab to=T><TD> 75374<BR><TD> The Hack Report Volume 3, Issue 1 (January 29, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_cis.txt">hack_cis.txt</A> <tab to=T><TD> 13288<BR><TD> The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_em.hac">hack_em.hac</A> <tab to=T><TD> 26119<BR><TD> The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_s.txt">hack_s.txt</A> <tab to=T><TD> 13935<BR><TD> Harry Hackalot's Official Hacker Address Book for October 1984
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hack_ths.txt">hack_ths.txt</A> <tab to=T><TD> 148109<BR><TD> The Social Organization of the Computer Underground (Thesis)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackacr.hac">hackacr.hac</A> <tab to=T><TD> 59638<BR><TD> The Hackers Acronym Chart, compiled by IIRG
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackad.txt">hackad.txt</A> <tab to=T><TD> 5248<BR><TD> The Famous Hacker's School (Analog Science Fiction Sept. 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackcos.txt">hackcos.txt</A> <tab to=T><TD> 27333<BR><TD> Hacking COSMOS Part I by Lex Luthor and the Legion of Doom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackcrak.txt">hackcrak.txt</A> <tab to=T><TD> 29696<BR><TD> The Hacker Crackdown, by 2600 Magazine
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackdct1">hackdct1</A> <tab to=T><TD> 89766<BR><TD> The Hacker's Jargon File, (November 14, 1982 Version)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackdict.txt">hackdict.txt</A> <tab to=T><TD> 872346<BR><TD> The Hacker's Dictionary, Older Version, Uncredited!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker">hacker</A> <tab to=T><TD> 3415<BR><TD> The Consience of a Hacker by The Mentor (January 8, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker.tst">hacker.tst</A> <tab to=T><TD> 21534<BR><TD> The Hacker's Purity Test, June 16, 1989
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker.txt">hacker.txt</A> <tab to=T><TD> 5787<BR><TD> SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker01.txt">hacker01.txt</A> <tab to=T><TD> 152594<BR><TD> The Social Organization of the Computer Underground: A Thesis
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker03.txt">hacker03.txt</A> <tab to=T><TD> 4931<BR><TD> The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker1.txt">hacker1.txt</A> <tab to=T><TD> 19996<BR><TD> Diary of a Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker11.txt">hacker11.txt</A> <tab to=T><TD> 2403<BR><TD> Hacking Western Union's Easylink
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacker2.txt">hacker2.txt</A> <tab to=T><TD> 11714<BR><TD> The Diary of a Hacker Part II by the Cuisinart Blade
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackerdoc.txt">hackerdoc.txt</A> <tab to=T><TD> 10690<BR><TD> SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackerla">hackerla</A> <tab to=T><TD> 2181<BR><TD> The Hackers' Laws
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackers.par">hackers.par</A> <tab to=T><TD> 2238<BR><TD> Advertisement for the Galactic Hacker's Party (August 1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackethic.txt">hackethic.txt</A> <tab to=T><TD> 5953<BR><TD> The Ethics of Hacking by Dissident
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackfaq.html0">hackfaq.html0</A> <tab to=T><TD> 176079<BR><TD> FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackfaq.txt">hackfaq.txt</A> <tab to=T><TD> 282121<BR><TD> The Hack FAQ By Simple Nomad (January 31, 1999)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackholl.txt">hackholl.txt</A> <tab to=T><TD> 4372<BR><TD> Hacking In Holland by Rop Gonggrijp (October 18, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackhp2.hac">hackhp2.hac</A> <tab to=T><TD> 15991<BR><TD> Hacking the HP 2000 by Bioc Agent 003
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking">hacking</A> <tab to=T><TD> 1676<BR><TD> Description of the New, Bad Definition of Hacking
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.dox">hacking.dox</A> <tab to=T><TD> 38174<BR><TD> Collections of Hacker FIles Downloaded by Consumertronics
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.tap">hacking.tap</A> <tab to=T><TD> 5840<BR><TD> Style Teaches You About How to Be a Proper Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking.txt">hacking.txt</A> <tab to=T><TD> 30670<BR><TD> Hacking Tutorial, by The Jolly Roger
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacking101.hac">hacking101.hac</A> <tab to=T><TD> 3367<BR><TD> HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackinga.txt">hackinga.txt</A> <tab to=T><TD> 5856<BR><TD> Hacking Bank Of America's Home Banking System by Dark Creaper
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingc.txt">hackingc.txt</A> <tab to=T><TD> 4524<BR><TD> Hacking Credit Card Codes by Omni-Kid and The Wyvern
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackinge.txt">hackinge.txt</A> <tab to=T><TD> 2881<BR><TD> Hacking ECONet Systems by Jack Death and Zapper
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingi.txt">hackingi.txt</A> <tab to=T><TD> 759<BR><TD> Computerworld Asks People to Hack In, 1984
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackingt.txt">hackingt.txt</A> <tab to=T><TD> 1311<BR><TD> Hacking the Lexington Air Force Computer
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackl1.txt">hackl1.txt</A> <tab to=T><TD> 4699<BR><TD> Hacker's Line #1 by 2TUFF
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacknet.dox">hacknet.dox</A> <tab to=T><TD> 9243<BR><TD> The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacknet.txt">hacknet.txt</A> <tab to=T><TD> 7950<BR><TD> how to Hack Your School's Network, from Dr. Techno of Paradise Lost
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackpcp.hac">hackpcp.hac</A> <tab to=T><TD> 8519<BR><TD> The Weenie Warriors present Hacking PC Pursuit Codes
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackprod.txt">hackprod.txt</A> <tab to=T><TD> 3110<BR><TD> How to Hack Prodigy by Desolated Dream
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackprof.txt">hackprof.txt</A> <tab to=T><TD> 2276<BR><TD> Hacker Proof Doors! It IS Possible!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackquiz.txt">hackquiz.txt</A> <tab to=T><TD> 21324<BR><TD> The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackrsts.txt">hackrsts.txt</A> <tab to=T><TD> 4221<BR><TD> Hacking RSTS Systems: An Instructional Test
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacksong.txt">hacksong.txt</A> <tab to=T><TD> 5632<BR><TD> The Hacker's Song by Dave Touretzky and Don Libes
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacksynd.hac">hacksynd.hac</A> <tab to=T><TD> 7296<BR><TD> The Hackers Syndrome, by Tad Deriso
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktalk.txt">hacktalk.txt</A> <tab to=T><TD> 10240<BR><TD> A Short Hackerspeak Glossary, by the Hollywood User Group
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackterm.txt">hackterm.txt</A> <tab to=T><TD> 4314<BR><TD> Collection of "Hackernyms" by Rad Man version 2.html0
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktest.txt">hacktest.txt</A> <tab to=T><TD> 8497<BR><TD> The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktips.hac">hacktips.hac</A> <tab to=T><TD> 3392<BR><TD> Hacking Tips #2, by Hoe Hopper
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktips.txt">hacktips.txt</A> <tab to=T><TD> 5625<BR><TD> Tips for Tracking Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hacktut.txt">hacktut.txt</A> <tab to=T><TD> 21105<BR><TD> Hacking Tutorial, by The Jolly Roger
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackunlm.hu1">hackunlm.hu1</A> <tab to=T><TD> 144657<BR><TD> Hackers Unlimited Magazine Volume 1 Issue 1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackusa!.hac">hackusa!.hac</A> <tab to=T><TD> 7666<BR><TD> Hackin' USA
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwarn.hac">hackwarn.hac</A> <tab to=T><TD> 5735<BR><TD> A Warning to Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwwiv.hac">hackwwiv.hac</A> <tab to=T><TD> 7679<BR><TD> Hacking into WWIV, Second Edition by Vision
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hackwwiv.txt">hackwwiv.txt</A> <tab to=T><TD> 12294<BR><TD> Hacking into WWIV Software by Vision
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/haibm370.txt">haibm370.txt</A> <tab to=T><TD> 2420<BR><TD> How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakdec20.txt">hakdec20.txt</A> <tab to=T><TD> 8786<BR><TD> An Addendum to A Novice's Guide to Hacking, by The Mentor
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakdic.txt">hakdic.txt</A> <tab to=T><TD> 231108<BR><TD> The Hacker's Dictionary, A Guide to the World of Computer Wizards
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hakmedia.txt">hakmedia.txt</A> <tab to=T><TD> 1771<BR><TD> Hackers in the Media, List start: 10/28/92 - Doomsday
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/handbook.txt">handbook.txt</A> <tab to=T><TD> 20162<BR><TD> Hacking Compuserve: All You Need to Know, by Mr. Perfect
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/haq1.txt">haq1.txt</A> <tab to=T><TD> 37136<BR><TD> The HAQ Edition 2.07 (June 11, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hashish.txt">hashish.txt</A> <tab to=T><TD> 6146<BR><TD> Hashish: The Exotic Elixir, by EZ Rider
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hate.info">hate.info</A> <tab to=T><TD> 1152<BR><TD> Invitation to HATE: Hackers at The End (Summer 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/havok1.txt">havok1.txt</A> <tab to=T><TD> 64006<BR><TD> HAVOK Pack #1: The Return (Collection of Hacking Textfiles)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hckr_hnd.txt">hckr_hnd.txt</A> <tab to=T><TD> 138752<BR><TD> The Hacker's Handbook by Hugo Cornwall (1985)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hckrslg">hckrslg</A> <tab to=T><TD> 12665<BR><TD> The Hacker's League, by Lee Felsenstein (March 18, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd.hac">hd.hac</A> <tab to=T><TD> 5732<BR><TD> Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd01.hac">hd01.hac</A> <tab to=T><TD> 16446<BR><TD> Hackers Directory Volume #1 by Ninja Squirrel and Logan5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd02.hac">hd02.hac</A> <tab to=T><TD> 13873<BR><TD> Hackers Directory Volume #2 by Ninja Squirrel and Logan5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd03.hac">hd03.hac</A> <tab to=T><TD> 16634<BR><TD> Hackers Directory Volume #3 by Ninja Squirrel and Logan5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hd04.hac">hd04.hac</A> <tab to=T><TD> 11329<BR><TD> Hackers Directory Volume #4 by Ninja Squirrel and Logan5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hdigest.txt">hdigest.txt</A> <tab to=T><TD> 14413<BR><TD> The Hacker's Digent by Harry Hackalot (October 1984)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hdindex.txt">hdindex.txt</A> <tab to=T><TD> 4686<BR><TD> Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hedrick.txt">hedrick.txt</A> <tab to=T><TD> 89278<BR><TD> An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hfnewbies.txt">hfnewbies.txt</A> <tab to=T><TD> 17307<BR><TD> The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hhacking.iix">hhacking.iix</A> <tab to=T><TD> 5504<BR><TD> CAT-HACK Volume 1 from The Mystery
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hint.txt">hint.txt</A> <tab to=T><TD> 25439<BR><TD> The Czar's Guide to the Young Criminal Accused of Using Computers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/his-hp.txt">his-hp.txt</A> <tab to=T><TD> 9320<BR><TD> The History of Hacking and Phreaking by Raven of BOM SQUAD
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_acces">hk_acces</A> <tab to=T><TD> 43859<BR><TD> Draft Chapter of the NIST Computer Security Handbook, from Ed Roback
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_crypt">hk_crypt</A> <tab to=T><TD> 34588<BR><TD> Draft Chapter from the NIST Computer Security Handbook, on Cryptography
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_i&a">hk_i&a</A> <tab to=T><TD> 36722<BR><TD> Draft of the NIST Computer Security Handbook on Identification and Authentification
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hk_polic">hk_polic</A> <tab to=T><TD> 28492<BR><TD> Draft of the NIST Computer Security Handbook on Computer and Information Security Policty
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hoho93.ad">hoho93.ad</A> <tab to=T><TD> 13472<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hoho93cz.hac">hoho93cz.hac</A> <tab to=T><TD> 13356<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hohocon.93">hohocon.93</A> <tab to=T><TD> 14237<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/holelist.txt">holelist.txt</A> <tab to=T><TD> 16654<BR><TD> How Security Holes Manifest Themselves
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/holes.txt">holes.txt</A> <tab to=T><TD> 78322<BR><TD> A List of Holes in Various Operating Systems (April 7, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/homebank.hac">homebank.hac</A> <tab to=T><TD> 6056<BR><TD> Hacking Bank Of America's Home Banking System by "Dark Creaper"
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/homebank.txt">homebank.txt</A> <tab to=T><TD> 5863<BR><TD> Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/horror_s.tor">horror_s.tor</A> <tab to=T><TD> 48939<BR><TD> Hacking Horror Stories 1982
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20001.hac">hp20001.hac</A> <tab to=T><TD> 12800<BR><TD> HP 2000 Part 1: Commands by Blitzoid and Galactus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20002.hac">hp20002.hac</A> <tab to=T><TD> 15744<BR><TD> HP 2000 Part 2: Statements by Blitzoid and Galactus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20003.hac">hp20003.hac</A> <tab to=T><TD> 9344<BR><TD> HP 2000 Part 3: Functions by Blitzoid and Galactus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20004.hac">hp20004.hac</A> <tab to=T><TD> 5376<BR><TD> HP 2000 Part 4: Files by Blitzoid and Galactus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp20005.hac">hp20005.hac</A> <tab to=T><TD> 5120<BR><TD> Hp 2000 Part 5: Matracies by Blitzoid and Galactus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp30.txt">hp30.txt</A> <tab to=T><TD> 116232<BR><TD> The Completel Hewlett Packard 3000 Hackers Guide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000.hac">hp3000.hac</A> <tab to=T><TD> 10319<BR><TD> The Complete Hewlett Packard 3000 Hackers Guide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000.txt">hp3000.txt</A> <tab to=T><TD> 111310<BR><TD> The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000_t.hac">hp3000_t.hac</A> <tab to=T><TD> 14354<BR><TD> Hacking the HP 3000 by DE BUG
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/hp3000g.hac">hp3000g.hac</A> <tab to=T><TD> 112566<BR><TD> The Complete Hewlett Packard 3000 Hackers Guide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iah1.txt">iah1.txt</A> <tab to=T><TD> 142976<BR><TD> The International Hackers' Association Issue #1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibm-vm70.txt">ibm-vm70.txt</A> <tab to=T><TD> 3226<BR><TD> A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibm370.hac">ibm370.hac</A> <tab to=T><TD> 2688<BR><TD> How to Take Control of your Local IBM 370 by Another Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ibmhack.hac">ibmhack.hac</A> <tab to=T><TD> 2686<BR><TD> Hacking the I.B.M. By John Doe
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icebook1.txt">icebook1.txt</A> <tab to=T><TD> 35623<BR><TD> ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icebook2.txt">icebook2.txt</A> <tab to=T><TD> 54349<BR><TD> ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/icon4u.nrg">icon4u.nrg</A> <tab to=T><TD> 1810<BR><TD> ICoN Hacking with Loser Access by <20><><EFBFBD><EFBFBD><EFBFBD>GY<47>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/id-biz.txt">id-biz.txt</A> <tab to=T><TD> 2850<BR><TD> How to Have a Profitable ID Business, by Mr. Puff n' Stuff
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/identity.txt">identity.txt</A> <tab to=T><TD> 7309<BR><TD> How to Create a New Identity by the Walking Glitch
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ihg.txt">ihg.txt</A> <tab to=T><TD> 11913<BR><TD> International Directory of Hacking and Phreaking Organizations, by John Simmons
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr6.txt">iirgacr6.txt</A> <tab to=T><TD> 62629<BR><TD> The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr7.txt">iirgacr7.txt</A> <tab to=T><TD> 67165<BR><TD> The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iirgacr8.txt">iirgacr8.txt</A> <tab to=T><TD> 79728<BR><TD> The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iiu-001.txt">iiu-001.txt</A> <tab to=T><TD> 6073<BR><TD> Bust Avoidance for Dipshits by Derision of IIU (1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/iiu-004.txt">iiu-004.txt</A> <tab to=T><TD> 9041<BR><TD> Hacking on the Compuserve Information Service by Darkness (1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/illinet.txt">illinet.txt</A> <tab to=T><TD> 20430<BR><TD> Dial-Up Access Numbers for ILLINET Online
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/info.txt">info.txt</A> <tab to=T><TD> 7072<BR><TD> How to Get Detailed Information on Anybody by DTS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/info3.gph">info3.gph</A> <tab to=T><TD> 4352<BR><TD> How to Get Anything on Anybody Part III
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/infoam.txt">infoam.txt</A> <tab to=T><TD> 51393<BR><TD> Exploring Information-America by Omega and White Knight
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/informer.hac">informer.hac</A> <tab to=T><TD> 17320<BR><TD> TRI : The Remote Informer, Volume 1, Issue #6
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/innerc.txt">innerc.txt</A> <tab to=T><TD> 15295<BR><TD> Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/innercir.hac">innercir.hac</A> <tab to=T><TD> 9856<BR><TD> Hacking Techniques, Typed in by Logan5 from The Inner Circle
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intercep.hac">intercep.hac</A> <tab to=T><TD> 10746<BR><TD> The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intercpt.txt">intercpt.txt</A> <tab to=T><TD> 23219<BR><TD> Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/intruder.dox">intruder.dox</A> <tab to=T><TD> 8534<BR><TD> SOFTDOCS: Intruder v1.21 by CreaSoft
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/inttel.hac">inttel.hac</A> <tab to=T><TD> 1728<BR><TD> European Computers List #1 by Kerrang Khan
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm201.hac">issm201.hac</A> <tab to=T><TD> 32229<BR><TD> The Information Systems Security Monitor Volume 2 Number 1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm202.hac">issm202.hac</A> <tab to=T><TD> 52667<BR><TD> The Information Systems Security Monitor Volume 2 Number 2
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm204.hac">issm204.hac</A> <tab to=T><TD> 28850<BR><TD> The Information Systems Security Monitor Volume 2 Number 4
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm301.hac">issm301.hac</A> <tab to=T><TD> 24356<BR><TD> The Information Systems Security Monitor Volume 3 Number 1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm302.hac">issm302.hac</A> <tab to=T><TD> 23394<BR><TD> The Information Systems Security Monitor Volume 3 Number 2
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm303.hac">issm303.hac</A> <tab to=T><TD> 22981<BR><TD> The Information Systems Security Monitor Volume 3 Number 3
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/issm304.hac">issm304.hac</A> <tab to=T><TD> 30656<BR><TD> The Information Systems Security Monitor Volume 3 Number 4
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/jack14.txt">jack14.txt</A> <tab to=T><TD> 9855<BR><TD> Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/janet.txt">janet.txt</A> <tab to=T><TD> 4618<BR><TD> JANET PAD Listing Revision 1.2 (March 1st, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/jargon211.hac">jargon211.hac</A> <tab to=T><TD> 1147413<BR><TD> The Jargon File, v.2.9.html1, by Eric S. Raymond
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/javabugs.txt">javabugs.txt</A> <tab to=T><TD> 5767<BR><TD> JavaScript Problems I've Discovered
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/keylock.sch">keylock.sch</A> <tab to=T><TD> 6772<BR><TD> Schematic For an Optoelectronic key Lock by Joe Scharf
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/keytrap3.txt">keytrap3.txt</A> <tab to=T><TD> 2787<BR><TD> SOFTDOCS: Keytrap v3.0 by Dcypher
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/kfyi-593.hac">kfyi-593.hac</A> <tab to=T><TD> 91136<BR><TD> KFYI AM Radio 910 interviews Mind Rape and Merc
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/kill.feds">kill.feds</A> <tab to=T><TD> 5376<BR><TD> FEDS: How to Find and Eliminate Them (September 10, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/l0pht.txt">l0pht.txt</A> <tab to=T><TD> 2807<BR><TD> The L0pht... What I saw, by Tfish of RDT
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lan.txt">lan.txt</A> <tab to=T><TD> 8247<BR><TD> Local Area Networks (LANs) by ANSI-Christ
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-1.txt">lca-1.txt</A> <tab to=T><TD> 4422<BR><TD> LCA #1: Zen and the Art of Untraceable Hacking, by Flood
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-2.txt">lca-2.txt</A> <tab to=T><TD> 3918<BR><TD> LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-3.txt">lca-3.txt</A> <tab to=T><TD> 3269<BR><TD> LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-4.txt">lca-4.txt</A> <tab to=T><TD> 3725<BR><TD> LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-5.txt">lca-5.txt</A> <tab to=T><TD> 5082<BR><TD> LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lca-6.txt">lca-6.txt</A> <tab to=T><TD> 4032<BR><TD> LCA #6: Beige Boxing, by the Lemon Curry Alliance
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ldd.txt">ldd.txt</A> <tab to=T><TD> 12237<BR><TD> How to Hack into CIS
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/license.asc">license.asc</A> <tab to=T><TD> 58618<BR><TD> The Guerilla Guide to Licensing Software
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/list2">list2</A> <tab to=T><TD> 2936<BR><TD> Pacific Bell Computer Systems, by Another Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/litewave.sch">litewave.sch</A> <tab to=T><TD> 7819<BR><TD> AM Lightwave Transmitter and Reciever by Joe Scharf
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lnoise.hac">lnoise.hac</A> <tab to=T><TD> 6020<BR><TD> Modem Noise Destroyer (Alpha Version)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/lodhbasi.hac">lodhbasi.hac</A> <tab to=T><TD> 42609<BR><TD> The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/logoncbi.hac">logoncbi.hac</A> <tab to=T><TD> 3235<BR><TD> How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/logoncbi.txt">logoncbi.txt</A> <tab to=T><TD> 2949<BR><TD> How to Log into a C.B.I System by L.E. Pirate
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/longpass.txt">longpass.txt</A> <tab to=T><TD> 14916<BR><TD> Generating Longer Passwords
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/machack0.5.txt">machack0.5.txt</A> <tab to=T><TD> 13640<BR><TD> The Mac Hack FAQ by AX1P (November 22, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mag_stripes.txt">mag_stripes.txt</A> <tab to=T><TD> 25011<BR><TD> Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/magnet.01">magnet.01</A> <tab to=T><TD> 24432<BR><TD> Magnetic Stripes on Cards: An Overview
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/magnet.02">magnet.02</A> <tab to=T><TD> 46174<BR><TD> Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mailbox.hac">mailbox.hac</A> <tab to=T><TD> 3368<BR><TD> Mailbox Systems: Your Link to the Underworld
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/main.fra">main.fra</A> <tab to=T><TD> 6763<BR><TD> Main Frames by the Pirate Club
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mainfrms.con">mainfrms.con</A> <tab to=T><TD> 1492<BR><TD> A List of Mainframe Dialup Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/master.txt">master.txt</A> <tab to=T><TD> 4915<BR><TD> Master Hack Version 1.0 by Master Frodo (January 1, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mci.txt">mci.txt</A> <tab to=T><TD> 2020<BR><TD> MCI Mail Access Numbrs, from The Swamp
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mci__acc.txt">mci__acc.txt</A> <tab to=T><TD> 2830<BR><TD> List of MCI Access Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mcimail.hac">mcimail.hac</A> <tab to=T><TD> 7772<BR><TD> MCI Mail - The Adventure Continues, by Bioc Agent
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mcisprin.t">mcisprin.t</A> <tab to=T><TD> 5278<BR><TD> Hints on Hacking, byt the RAMBUG and Captain Blood
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/memory.lst">memory.lst</A> <tab to=T><TD> 32113<BR><TD> The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mgtguide.txt">mgtguide.txt</A> <tab to=T><TD> 24448<BR><TD> The NIST Management Guide to the Protection of Information Resources
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mickeyd.txt">mickeyd.txt</A> <tab to=T><TD> 5145<BR><TD> Hacking McDonalds by Herb the Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/micrrisk.hac">micrrisk.hac</A> <tab to=T><TD> 63479<BR><TD> Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milinet.html">milinet.html</A> <tab to=T><TD> 5564<BR><TD> Milnet Access Codes
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milnet.txt">milnet.txt</A> <tab to=T><TD> 36799<BR><TD> How to Use the American Military Net
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/milnet1.hac">milnet1.hac</A> <tab to=T><TD> 7765<BR><TD> Milnet, by Brigadier General Swipe
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mish18.txt">mish18.txt</A> <tab to=T><TD> 20480<BR><TD> The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism1.hac">mism1.hac</A> <tab to=T><TD> 11776<BR><TD> How to Get Anything on Anyone Excerpts
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism10.hac">mism10.hac</A> <tab to=T><TD> 2944<BR><TD> How to Get Anything on Anyone Excerpts
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism20.hac">mism20.hac</A> <tab to=T><TD> 3840<BR><TD> Mastering the SCANTRON by Warhead
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mism42.hac">mism42.hac</A> <tab to=T><TD> 1024<BR><TD> Xerox Voice Message Exchange Commands, from The Lineman
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mob.txt">mob.txt</A> <tab to=T><TD> 8954<BR><TD> The Hackers in the MOB
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook1.txt">modbook1.txt</A> <tab to=T><TD> 3585<BR><TD> The History of MOD: Book One: The Originals
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook2.txt">modbook2.txt</A> <tab to=T><TD> 4182<BR><TD> The History of MOD: Book Two: Creative Mindz
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook3.txt">modbook3.txt</A> <tab to=T><TD> 4522<BR><TD> The Book of MOD: Part Three: A Kick in the Groin
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook4.txt">modbook4.txt</A> <tab to=T><TD> 2787<BR><TD> The Book of MOD: Part Four: End of '90-'1991
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/modbook5.txt">modbook5.txt</A> <tab to=T><TD> 5199<BR><TD> The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morality.hac">morality.hac</A> <tab to=T><TD> 2654<BR><TD> Hacker Morality: A Lesson
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morestuf.txt">morestuf.txt</A> <tab to=T><TD> 18930<BR><TD> Collection of Hacking Files (Should Eventually be Split up)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/morprime.hac">morprime.hac</A> <tab to=T><TD> 10579<BR><TD> RVEC Parameters and DMSTK Format
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mrsts.hac">mrsts.hac</A> <tab to=T><TD> 5504<BR><TD> So you've finally decided to down an RSTS System?
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/mtempist.hac">mtempist.hac</A> <tab to=T><TD> 10752<BR><TD> The Tempest Method of Data Interception (Needs Editing)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/narc3.hac">narc3.hac</A> <tab to=T><TD> 8229<BR><TD> Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tg-003.txt">ncsc-tg-003.txt</A> <tab to=T><TD> 86792<BR><TD> A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tg-016.txt">ncsc-tg-016.txt</A> <tab to=T><TD> 88895<BR><TD> Guidelines for Writing Trusted Facility Manuals
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc-tr-005-2.txt">ncsc-tr-005-2.txt</A> <tab to=T><TD> 90471<BR><TD> Introduction to Trusted Computer System Evaluation Criteria
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ncsc_oas.txt">ncsc_oas.txt</A> <tab to=T><TD> 109919<BR><TD> A Guideline on Office Automation Security (December 5, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/netbios.txt">netbios.txt</A> <tab to=T><TD> 13379<BR><TD> Understanding NetBIOS by NeonSurge of Rhino9
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/netcrack.txt">netcrack.txt</A> <tab to=T><TD> 7335<BR><TD> DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/networks.phk">networks.phk</A> <tab to=T><TD> 5522<BR><TD> 2600: How to Send Mail to other Networks
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/neuroman.pwd">neuroman.pwd</A> <tab to=T><TD> 3225<BR><TD> List of DataBases and passwords for the game "Neuromancer"
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/newid.hac">newid.hac</A> <tab to=T><TD> 6543<BR><TD> New Identity Method
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/newsltr.idx">newsltr.idx</A> <tab to=T><TD> 3273<BR><TD> Index to the Computer Underground Digest Archives (June 13, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nextbugs.txt">nextbugs.txt</A> <tab to=T><TD> 7878<BR><TD> CERT Advisory on the NeXT computer's Software
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nfs_trace.txt">nfs_trace.txt</A> <tab to=T><TD> 35713<BR><TD> NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nha-app.txt">nha-app.txt</A> <tab to=T><TD> 4706<BR><TD> Application to Join Network Hackers Alliance (June 1, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nimbus.txt">nimbus.txt</A> <tab to=T><TD> 8498<BR><TD> Research Machines Nimbus hacking, by The Green Rhino
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/note9309.txt">note9309.txt</A> <tab to=T><TD> 1984<BR><TD> The Hack Report, by Lee Jackson (September 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nov-faq.txt">nov-faq.txt</A> <tab to=T><TD> 119598<BR><TD> The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novell.hac">novell.hac</A> <tab to=T><TD> 10516<BR><TD> Collection of security holes in Novell Netware
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novell.txt">novell.txt</A> <tab to=T><TD> 7144<BR><TD> SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/novhack.txt">novhack.txt</A> <tab to=T><TD> 9096<BR><TD> Having Phun With Novell by Lord Foul/Decay (July 13, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/nwhack.faq">nwhack.faq</A> <tab to=T><TD> 73974<BR><TD> Frequently Asked Questions about Hacking Novell Netware by Simple Nomad
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="http://textfiles.com/hacking/obscene.###">obscene.###</A> <tab to=T><TD> 1838<BR><TD> TAG FILE: Obscene Phobia BBS (January 1, 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ocfber.html">ocfber.html</A> <tab to=T><TD> 1394<BR><TD> Bylaws of the Open Computing Facility at UC Berkeley
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ocfber.2">ocfber.2</A> <tab to=T><TD> 14491<BR><TD> Constitution for the Open Computing Facility at UC Berkeley
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/omron.pin">omron.pin</A> <tab to=T><TD> 1648<BR><TD> How to Connect OMRON 3S4YR-HSR4 to your PC
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orange">orange</A> <tab to=T><TD> 328324<BR><TD> Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orange.txt">orange.txt</A> <tab to=T><TD> 319321<BR><TD> The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orgs.hac">orgs.hac</A> <tab to=T><TD> 8464<BR><TD> A Large List of Computer Security Organizations
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/orgs.txt">orgs.txt</A> <tab to=T><TD> 8320<BR><TD> 1988 List of Computer Security Organizations
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdial.lst">outdial.lst</A> <tab to=T><TD> 12887<BR><TD> Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdial.txt">outdial.txt</A> <tab to=T><TD> 10261<BR><TD> How to Use Outdials: An Introduction by Lorax
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdials.us">outdials.us</A> <tab to=T><TD> 3553<BR><TD> Ameican Local Outdials by Sebastian Winchler (March 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/outdialsnfo.hac">outdialsnfo.hac</A> <tab to=T><TD> 2652<BR><TD> List of Dialouts
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pacbell.lst">pacbell.lst</A> <tab to=T><TD> 3096<BR><TD> Collection of Pacific Bell Computer Systems
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/packet.txt">packet.txt</A> <tab to=T><TD> 5760<BR><TD> Notes on Using Tymenet and Telenet by Michael A. Banks (1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pacnet.hac">pacnet.hac</A> <tab to=T><TD> 5300<BR><TD> Hacking into the PACnet System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pactimea.txt">pactimea.txt</A> <tab to=T><TD> 2811<BR><TD> Telephone Numbers for the Pacific Bell Computer System by Another Hacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/passhack.txt">passhack.txt</A> <tab to=T><TD> 7070<BR><TD> The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/password.txt">password.txt</A> <tab to=T><TD> 22477<BR><TD> Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcp88.lst">pcp88.lst</A> <tab to=T><TD> 5450<BR><TD> PC Pursuit List Version 1.html (August 31, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpbas.txt">pcpbas.txt</A> <tab to=T><TD> 3972<BR><TD> How to Use PC Pursuit Service
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcphack.phk">pcphack.phk</A> <tab to=T><TD> 9552<BR><TD> Hacking PC Pursuit Codes by The Weenie Warriors
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcphack.txt">pcphack.txt</A> <tab to=T><TD> 9537<BR><TD> The Weenie Warriors Present Hacking PC Pursuit Codes
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpold.phk">pcpold.phk</A> <tab to=T><TD> 7814<BR><TD> How to Use Telenet's PC Pursuit Service by Z-Man
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpursue.txt">pcpursue.txt</A> <tab to=T><TD> 238362<BR><TD> PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pcpursui.yes">pcpursui.yes</A> <tab to=T><TD> 15104<BR><TD> PC Pursuit and Telenet Local Access Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pdnaxis.txt">pdnaxis.txt</A> <tab to=T><TD> 16421<BR><TD> The Public Data Network Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pdp11.hac">pdp11.hac</A> <tab to=T><TD> 1920<BR><TD> Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pentagon.txt">pentagon.txt</A> <tab to=T><TD> 7534<BR><TD> The Milnet File by Brigadier General Swipe/Dispater
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ph.txt">ph.txt</A> <tab to=T><TD> 30181<BR><TD> Soft Documentation: P-Hack 1.0 by Peter King
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/phonecom.nfo">phonecom.nfo</A> <tab to=T><TD> 3304<BR><TD> Becoming More Informed (Becoming a Hacker)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/popper.txt">popper.txt</A> <tab to=T><TD> 2875<BR><TD> ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/prime.hac">prime.hac</A> <tab to=T><TD> 21725<BR><TD> A List of PRIME Commands
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primecpl.hac">primecpl.hac</A> <tab to=T><TD> 12018<BR><TD> An Introduction to PRIMOS CPL Directives by Necrovore
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primer.txt">primer.txt</A> <tab to=T><TD> 102646<BR><TD> Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primes.txt">primes.txt</A> <tab to=T><TD> 12879<BR><TD> Message Base With Discussion of the Watch utlity on PRIME (August, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos.hac">primos.hac</A> <tab to=T><TD> 3968<BR><TD> Hacking Primos Systems By Nanuk of the North
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos1.txt">primos1.txt</A> <tab to=T><TD> 26221<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos2.txt">primos2.txt</A> <tab to=T><TD> 39011<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos3.txt">primos3.txt</A> <tab to=T><TD> 41578<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos4.txt">primos4.txt</A> <tab to=T><TD> 25184<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/primos5.txt">primos5.txt</A> <tab to=T><TD> 34196<BR><TD> Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/psnintro.txt">psnintro.txt</A> <tab to=T><TD> 34582<BR><TD> The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/psns.txt">psns.txt</A> <tab to=T><TD> 3366<BR><TD> An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pumpcon.txt">pumpcon.txt</A> <tab to=T><TD> 10358<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/pw-hack.txt">pw-hack.txt</A> <tab to=T><TD> 5432<BR><TD> The Art of Password Hacking by HIT
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/qsd.txt">qsd.txt</A> <tab to=T><TD> 4676<BR><TD> How to Access Minitel or How to Have FUN on QSD
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/racintro">racintro</A> <tab to=T><TD> 1794<BR><TD> Information on RAC: A Host System Used for Access to GEnie and AppleLink
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/raclog1">raclog1</A> <tab to=T><TD> 28632<BR><TD> An Example of an RAC Login
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/raclog2">raclog2</A> <tab to=T><TD> 27736<BR><TD> An Example of an RAC Login, Part II
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram1">ram1</A> <tab to=T><TD> 4045<BR><TD> Hacking Rampart Systems Part 1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram2">ram2</A> <tab to=T><TD> 4058<BR><TD> Hacking Rampart Systems Part 1 (cont)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram5">ram5</A> <tab to=T><TD> 4022<BR><TD> Hacking Rampart Systems Part 2
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ram6">ram6</A> <tab to=T><TD> 861<BR><TD> Hacking Rampart Systems Part 2 (cont)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ramcomm.hac">ramcomm.hac</A> <tab to=T><TD> 185184<BR><TD> Hacking RAM Communications (Pager)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rampart1.hac">rampart1.hac</A> <tab to=T><TD> 8448<BR><TD> Hacking Rampart Systems by Whackoland
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rampart2.hac">rampart2.hac</A> <tab to=T><TD> 4864<BR><TD> Hacking Rampart Systems by Whackoland Part II
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rcaglobe.txt">rcaglobe.txt</A> <tab to=T><TD> 3494<BR><TD> The RCA Network Part I by the Telex Troopers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/read.me">read.me</A> <tab to=T><TD> 3649<BR><TD> A Story About the TSR That Catches Passwords, and a short History
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/readme.now">readme.now</A> <tab to=T><TD> 6000<BR><TD> SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/readme.txt">readme.txt</A> <tab to=T><TD> 131<BR><TD> Force Files Explanation
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/reid.txt">reid.txt</A> <tab to=T><TD> 49665<BR><TD> The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/revblt.hac">revblt.hac</A> <tab to=T><TD> 13726<BR><TD> Review of Federal Agency Computer Security and Privacy Plans
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/riacs">riacs</A> <tab to=T><TD> 5878<BR><TD> Principles of Responsible Use of RIACS Computing Facilities
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rimeman.hac">rimeman.hac</A> <tab to=T><TD> 52781<BR><TD> RIME User's Guide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ripco.txt">ripco.txt</A> <tab to=T><TD> 13184<BR><TD> The Doctor Ripco Seizure by Full Disclosure (1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/risks.txt">risks.txt</A> <tab to=T><TD> 6181<BR><TD> Avoiding the Risks of Hacking: A List of Suggestions by IC
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/risktool.hac">risktool.hac</A> <tab to=T><TD> 33991<BR><TD> Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rom.txt">rom.txt</A> <tab to=T><TD> 3744<BR><TD> Macintosh ROM Secrets by The Cloud (November 23, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rowdy_dl.man">rowdy_dl.man</A> <tab to=T><TD> 63720<BR><TD> DocumentationL The Rowdy Dialer (April 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rspwd.new">rspwd.new</A> <tab to=T><TD> 23723<BR><TD> Some Downloaded Password File
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsts.hac">rsts.hac</A> <tab to=T><TD> 5376<BR><TD> So You've Decided to Down a RSTS System, by Sam Sneed
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsx11.hac">rsx11.hac</A> <tab to=T><TD> 18944<BR><TD> RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/rsx11m.txt">rsx11m.txt</A> <tab to=T><TD> 18755<BR><TD> RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ruhacker.txt">ruhacker.txt</A> <tab to=T><TD> 1501<BR><TD> Are You a Hacker? By ReDragon
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sanatmdoc.hac">sanatmdoc.hac</A> <tab to=T><TD> 6179<BR><TD> Getting into an ATM
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/saruman.add">saruman.add</A> <tab to=T><TD> 829<BR><TD> TAG: Saruman BBS Ad
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satan~1.txt">satan~1.txt</A> <tab to=T><TD> 20843<BR><TD> A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satcon.txt">satcon.txt</A> <tab to=T><TD> 2841<BR><TD> Satellite Control, by Ninja Squirrel & Logan-5
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satelit3.txt">satelit3.txt</A> <tab to=T><TD> 17718<BR><TD> Satellite Scrambling Systems: The Truth, by XL
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/satelite.txt">satelite.txt</A> <tab to=T><TD> 3636<BR><TD> Satellite Frequencies, by Sir Francis Drake
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/scanprg.txt">scanprg.txt</A> <tab to=T><TD> 5542<BR><TD> What To Look For In A Code Hacking Program, by Dissident
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/school.txt">school.txt</A> <tab to=T><TD> 9253<BR><TD> Screwing with School Computers, by Liquid Bug
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secrets2.hac">secrets2.hac</A> <tab to=T><TD> 7733<BR><TD> Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secrets3.hac">secrets3.hac</A> <tab to=T><TD> 4250<BR><TD> Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/secretsdoc.hac">secretsdoc.hac</A> <tab to=T><TD> 233082<BR><TD> Young's Demonstrative Translation of Scientific Secrets (1861)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/securdev.txt">securdev.txt</A> <tab to=T><TD> 8616<BR><TD> Technical Hacking Volume 1 by the Warelock
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security">security</A> <tab to=T><TD> 66923<BR><TD> Overview of Computer Security by E.A. Bedwell, EDP Specialist
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security.fy8">security.fy8</A> <tab to=T><TD> 259023<BR><TD> Site Security Handbook, 1991
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/security.txt">security.txt</A> <tab to=T><TD> 6184<BR><TD> Professor Falken's Guide to CODE Hacking Security
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sequence.txt">sequence.txt</A> <tab to=T><TD> 22931<BR><TD> Sequence Number Attacks, by Rik Farrow
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sha.hac">sha.hac</A> <tab to=T><TD> 83219<BR><TD> Swedish Hackers Association Annual Year Protocol #4
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shadec.txt">shadec.txt</A> <tab to=T><TD> 14173<BR><TD> The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shahewl.txt">shahewl.txt</A> <tab to=T><TD> 3723<BR><TD> Swedish Hacking Association presents Hacking HP 3000 Part 1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shaprot3.txt">shaprot3.txt</A> <tab to=T><TD> 91074<BR><TD> The 3rd Protocol (1990) by The Swedish Hackers Association
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shawn-file-check">shawn-file-check</A> <tab to=T><TD> 20977<BR><TD> The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0293.asc">shw0293.asc</A> <tab to=T><TD> 8632<BR><TD> Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0394.asc">shw0394.asc</A> <tab to=T><TD> 9472<BR><TD> Syndicated Hack Watch (March 1994) by John McCormac
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0494.asc">shw0494.asc</A> <tab to=T><TD> 12408<BR><TD> Syndicated Hack Watch (April 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0593.asc">shw0593.asc</A> <tab to=T><TD> 6667<BR><TD> Red Hot Television is Banned
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0893.asc">shw0893.asc</A> <tab to=T><TD> 12544<BR><TD> The Start of the Skybox Cable War
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0993.asc">shw0993.asc</A> <tab to=T><TD> 8955<BR><TD> Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw0994.bbs">shw0994.bbs</A> <tab to=T><TD> 12097<BR><TD> Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/shw1093.asc">shw1093.asc</A> <tab to=T><TD> 10974<BR><TD> Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skel_key.txt">skel_key.txt</A> <tab to=T><TD> 7361<BR><TD> SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skey.txt">skey.txt</A> <tab to=T><TD> 11048<BR><TD> Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skeyfl.txt">skeyfl.txt</A> <tab to=T><TD> 11419<BR><TD> Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/skyhack.hac">skyhack.hac</A> <tab to=T><TD> 26525<BR><TD> The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sniffer.txt">sniffer.txt</A> <tab to=T><TD> 19288<BR><TD> FAQ: The Sniffer FAQ Version 1.7
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/snoop">snoop</A> <tab to=T><TD> 3075<BR><TD> Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/snoop.txt">snoop.txt</A> <tab to=T><TD> 4065<BR><TD> Data Snooping the Right Way by Lee Day
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sourcetelnet.txt">sourcetelnet.txt</A> <tab to=T><TD> 4828<BR><TD> The Source Telnet Directory, and Uninet Directory
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ss-info2.txt">ss-info2.txt</A> <tab to=T><TD> 5120<BR><TD> The Social Security Number, by Barbara Bennett
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssan.hac">ssan.hac</A> <tab to=T><TD> 4738<BR><TD> The Social Security Number
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssn-stuf.txt">ssn-stuf.txt</A> <tab to=T><TD> 19840<BR><TD> More about why Social Security Numbers are Insecure
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ssnum.ana">ssnum.ana</A> <tab to=T><TD> 1791<BR><TD> About Social Security Numbers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/starlink.txt">starlink.txt</A> <tab to=T><TD> 26902<BR><TD> Information on Galaxy Starlink: A User's Guide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/starmast.txt">starmast.txt</A> <tab to=T><TD> 12657<BR><TD> Hacking the Gandalf Starmaster by Deicide (May 22, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/statemind.txt">statemind.txt</A> <tab to=T><TD> 5863<BR><TD> So, You Wanna Be a Hacker? It's a State of Mind!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/stoll.doc">stoll.doc</A> <tab to=T><TD> 58801<BR><TD> Writings of Clifford Stoll
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/storehac">storehac</A> <tab to=T><TD> 4515<BR><TD> Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/stupidki.hac">stupidki.hac</A> <tab to=T><TD> 4942<BR><TD> Those Stupid Little Bastard Hackers!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sun413.txt">sun413.txt</A> <tab to=T><TD> 31595<BR><TD> How to improve security on a newly installed SunOS 4.html.3 system. by Thomas M. Kroeger (July 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sundevil.txt">sundevil.txt</A> <tab to=T><TD> 3252<BR><TD> Operation Sundevil, by the Prodigy
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/superd.txt">superd.txt</A> <tab to=T><TD> 5112<BR><TD> DocumentationL Superdial 1.03 by Evan Anderson
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/sys75.hac">sys75.hac</A> <tab to=T><TD> 9410<BR><TD> The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ta&m.txt">ta&m.txt</A> <tab to=T><TD> 20778<BR><TD> Texas A&M Network Security Package Overview 7/1/1993
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tachelp">tachelp</A> <tab to=T><TD> 6285<BR><TD> Captures of Information on TACACS by The Argonaut
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tan.txt">tan.txt</A> <tab to=T><TD> 37769<BR><TD> List of Telenet Access Numbers by Daredevil of P/HUN
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcp-ip.txt">tcp-ip.txt</A> <tab to=T><TD> 35765<BR><TD> FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.03">tcsb.03</A> <tab to=T><TD> 29427<BR><TD> Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.04">tcsb.04</A> <tab to=T><TD> 11790<BR><TD> An Introduction to PRIMOS CPL Directives by Necrovore
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.05">tcsb.05</A> <tab to=T><TD> 30972<BR><TD> Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.06">tcsb.06</A> <tab to=T><TD> 27636<BR><TD> Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.08">tcsb.08</A> <tab to=T><TD> 4370<BR><TD> Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.html1">tcsb.html1</A> <tab to=T><TD> 8938<BR><TD> Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tcsb.html2">tcsb.html2</A> <tab to=T><TD> 3370<BR><TD> Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/techhack.hac">techhack.hac</A> <tab to=T><TD> 8368<BR><TD> A Guide to ADS System, by Lord Digital and the Phantom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/techiq.txt">techiq.txt</A> <tab to=T><TD> 9737<BR><TD> Hacking Techniques, by Logan-5 (Hacker Supreme)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/technicl.txt">technicl.txt</A> <tab to=T><TD> 9809<BR><TD> Technical Hacking: Volume One by the Warelock
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele3.txt">tele3.txt</A> <tab to=T><TD> 8229<BR><TD> Telenet Scanning by Doc Telecom (July 11, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele4.txt">tele4.txt</A> <tab to=T><TD> 2936<BR><TD> An Overview of Telenet by Man Max
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tele5.hac">tele5.hac</A> <tab to=T><TD> 6492<BR><TD> Hacking Telnet by The Flash
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telecode.txt">telecode.txt</A> <tab to=T><TD> 24857<BR><TD> Telenet Codes, Hacked Out by ZORON (May 1, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telecomm.txt">telecomm.txt</A> <tab to=T><TD> 2271<BR><TD> An Introductory Guide to Telenet Commands
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleinfo.txt">teleinfo.txt</A> <tab to=T><TD> 6496<BR><TD> Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet.hac">telenet.hac</A> <tab to=T><TD> 10465<BR><TD> Telenet: The Secret Exposed
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet.txt">telenet.txt</A> <tab to=T><TD> 2732<BR><TD> An Introductory Guide to Telenet Commands
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telenet2.txt">telenet2.txt</A> <tab to=T><TD> 24259<BR><TD> A Good amount of general Telenet Information
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneth.txt">teleneth.txt</A> <tab to=T><TD> 2203<BR><TD> An Introductory Guide to Telenet Commands
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneti">teleneti</A> <tab to=T><TD> 6192<BR><TD> Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teleneti.phk">teleneti.phk</A> <tab to=T><TD> 2720<BR><TD> Instructions for using TELENET.
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telescan.txt">telescan.txt</A> <tab to=T><TD> 7940<BR><TD> Information on Telenet Scanning
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tellerma.txt">tellerma.txt</A> <tab to=T><TD> 1982<BR><TD> Cracking Auto Bank Teller Machines by the Suspect
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teln2.txt">teln2.txt</A> <tab to=T><TD> 2703<BR><TD> Telenet Terminal Identifiers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teln3.txt">teln3.txt</A> <tab to=T><TD> 32422<BR><TD> Welcome to the TCO Access Listing (September 15, 1987)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telnetsn.txt">telnetsn.txt</A> <tab to=T><TD> 8803<BR><TD> Telenet Scanning by Doc Telecom (July 11, 1988)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/telnumbe.txt">telnumbe.txt</A> <tab to=T><TD> 31564<BR><TD> Telenet Access Numbers, by the Weenie Warriors
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/teltermz.txt">teltermz.txt</A> <tab to=T><TD> 13604<BR><TD> List of Terminal Identifiers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tempest.hac">tempest.hac</A> <tab to=T><TD> 5122<BR><TD> Excerpt of article on Tempest
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thc.nfo">thc.nfo</A> <tab to=T><TD> 11145<BR><TD> NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thc2.nfo">thc2.nfo</A> <tab to=T><TD> 21205<BR><TD> The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thehaq.txt">thehaq.txt</A> <tab to=T><TD> 109515<BR><TD> The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thuglan1.txt">thuglan1.txt</A> <tab to=T><TD> 16453<BR><TD> Introduction to Hacking into LANs by THUG
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/thuglan2.txt">thuglan2.txt</A> <tab to=T><TD> 10483<BR><TD> General Information on LANs by THUG (July 31, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tihack2.txt">tihack2.txt</A> <tab to=T><TD> 31999<BR><TD> Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/timenet.txt">timenet.txt</A> <tab to=T><TD> 5434<BR><TD> Hacking Tymnet by Byte Brain
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tl-user.txt">tl-user.txt</A> <tab to=T><TD> 37318<BR><TD> ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tl.q-a">tl.q-a</A> <tab to=T><TD> 6240<BR><TD> ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tmplefun.txt">tmplefun.txt</A> <tab to=T><TD> 3451<BR><TD> Fun with Temple's Computers (A How To)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet1.txt">tnet1.txt</A> <tab to=T><TD> 21888<BR><TD> Tymnet File #1 by The Twilight Phone
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet2.txt">tnet2.txt</A> <tab to=T><TD> 16896<BR><TD> Tymnet File #2 by The Twilight Phone
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnet3.txt">tnet3.txt</A> <tab to=T><TD> 14592<BR><TD> Tymnet File #3 by The Twilight Phone
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tnpcpod.txt">tnpcpod.txt</A> <tab to=T><TD> 26685<BR><TD> TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tops20.txt">tops20.txt</A> <tab to=T><TD> 7075<BR><TD> Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/transdir.txt">transdir.txt</A> <tab to=T><TD> 14377<BR><TD> The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trash.txt">trash.txt</A> <tab to=T><TD> 5888<BR><TD> Dumpster Diving: An overview of the legality, by Full Disclosure
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trashing.rot">trashing.rot</A> <tab to=T><TD> 18277<BR><TD> The Art of Trashing by Deicide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/traxtool.txt">traxtool.txt</A> <tab to=T><TD> 13541<BR><TD> The Trax Toolbox Volume #001 by Track
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/triad187.hac">triad187.hac</A> <tab to=T><TD> 19927<BR><TD> The Triad: A 3-in-1 Textfile Magazine, Issue #1
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/trojan">trojan</A> <tab to=T><TD> 9131<BR><TD> Rumors of Worms and Trojan Horses by Mike Guffey
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tsrcrack.txt">tsrcrack.txt</A> <tab to=T><TD> 2822<BR><TD> SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ttyspoof.txt">ttyspoof.txt</A> <tab to=T><TD> 7786<BR><TD> TTY Spoofing, by SubEthan
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tym_ods.txt">tym_ods.txt</A> <tab to=T><TD> 20850<BR><TD> TymNet OutDials Sorted By Area Code
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tyme2.txt">tyme2.txt</A> <tab to=T><TD> 8055<BR><TD> International Packet Switching Services Description
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymenet.hac">tymenet.hac</A> <tab to=T><TD> 20577<BR><TD> Tymenet Technical and User Information
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet.ods">tymnet.ods</A> <tab to=T><TD> 1777<BR><TD> Listing of Tymnet ODS Systems
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet.txt">tymnet.txt</A> <tab to=T><TD> 205145<BR><TD> Packet Networks I and other Tymnet Information by Digital Demon, 1990
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/tymnet96.txt">tymnet96.txt</A> <tab to=T><TD> 17283<BR><TD> BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ueber.txt">ueber.txt</A> <tab to=T><TD> 8770<BR><TD> A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/uk.dialups">uk.dialups</A> <tab to=T><TD> 28896<BR><TD> A List of Modem Dialups in the UK (September 22, 1990)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ukguide.hac">ukguide.hac</A> <tab to=T><TD> 13693<BR><TD> The Guide to Online Databases for UK Users
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ulimate.txt">ulimate.txt</A> <tab to=T><TD> 61683<BR><TD> The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/ultrad3.txt">ultrad3.txt</A> <tab to=T><TD> 10880<BR><TD> The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/unineta.phk">unineta.phk</A> <tab to=T><TD> 7049<BR><TD> Uninet Information, from The South Pole
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/unp.txt">unp.txt</A> <tab to=T><TD> 30663<BR><TD> SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/up.txt">up.txt</A> <tab to=T><TD> 1593<BR><TD> SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/usrguide.txt">usrguide.txt</A> <tab to=T><TD> 16128<BR><TD> The NIST Computer User's Guide to the Protection of Information Resources
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vanish.txt">vanish.txt</A> <tab to=T><TD> 3901<BR><TD> The Hacker Who Vanished: Suicide or Clever Hoax?
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vax-7.txt">vax-7.txt</A> <tab to=T><TD> 2248<BR><TD>
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vendors.hac">vendors.hac</A> <tab to=T><TD> 55184<BR><TD> Large Security Vendors List
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/verstell.ana">verstell.ana</A> <tab to=T><TD> 3221<BR><TD> Neat Fun with Versatellers
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/virus">virus</A> <tab to=T><TD> 11269<BR><TD> Attack of the Computer Virus, by Lee Dembart
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 4662<BR><TD> Hacking Voice Mail Boxes by Tik Tak
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vmsptuto.txt">vmsptuto.txt</A> <tab to=T><TD> 12717<BR><TD> The IBM VMSSP System, by The Motorhead
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack1.txt">vthack1.txt</A> <tab to=T><TD> 9844<BR><TD> The VT Hacker, by the Man Hermit
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack2.txt">vthack2.txt</A> <tab to=T><TD> 9378<BR><TD> The VT Hacker #2, by the Mad Hermit
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vthack3.txt">vthack3.txt</A> <tab to=T><TD> 29178<BR><TD> The VT Hacker #3, by The Mad Hermit
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/vtp.txt">vtp.txt</A> <tab to=T><TD> 17664<BR><TD> A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wal-mart.txt">wal-mart.txt</A> <tab to=T><TD> 4175<BR><TD> Hacking the Wal-Mart Armorguard Computer Protection System
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wanghack.hac">wanghack.hac</A> <tab to=T><TD> 5302<BR><TD> Hacking the Wang OS, by Dark Knight
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wargames">wargames</A> <tab to=T><TD> 5912<BR><TD> The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wargames.hum">wargames.hum</A> <tab to=T><TD> 8715<BR><TD> Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/watching">watching</A> <tab to=T><TD> 3552<BR><TD> Watching the Watcher Watching You by Sir Knight
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/wats.txt">wats.txt</A> <tab to=T><TD> 9978<BR><TD> WATS Version 1.0 by Professor Falken & The Aptolcater
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/whca_txtmsg.log">whca_txtmsg.log</A> <tab to=T><TD> 178486<BR><TD> The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/xerox.hac">xerox.hac</A> <tab to=T><TD> 2321<BR><TD> Hacking Xerox
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/xmux.txt">xmux.txt</A> <tab to=T><TD> 12318<BR><TD> The ROT Guide to Gandalf XMUX's by Deicide
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/zen.hac">zen.hac</A> <tab to=T><TD> 52401<BR><TD> Dan Farmer's Improving the Security of Your Site by Breaking Into It
|
||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hacking/zippass.txt">zippass.txt</A> <tab to=T><TD> 5637<BR><TD> The Security of PKZIP Encryption
|
||
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 691 files for a total of 18,779,213 bytes.</SMALL><TR><TD ALIGN=RIGHT><SMALL>There are 9 directories.</SMALL></TABLE></BODY>
|
||
</HTML>
|
||
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
|
||
either <A HREF="http://archives.textfiles.com/hacking.tar.gz"><B>hacking.tar.gz</B></A> (10075176 bytes) or <A HREF="http://archives.textfiles.com/hacking.zip"><B>hacking.zip</B></A> (10676848 bytes) instead of all the files separately. <P>
|