Filename | Size | Description of the Textfile |
BIBLIOGRAPHIES | Lists of Articles and Books about Hackers and Hacking | |
CABLE | Textfiles about Cable TV and Cable TV Piracy | |
COLORBOOKS | Purported Department of Defense Computer Security Guidelines | |
CONVENTIONS | Information about different Hacking Conventions | |
INTERNET | Files Dealing With Hacking on the Internet | |
MICROSOFT | Files Dealing with Hacking Windows and DOS | |
POLICIES | Various Ethics and Policies of Computing Facilities Nationwide | |
UNIX | Textfiles About Exploring or Exploiting UNIX | |
VMS | Textfiles About Exploring or Exploiting VMS and VAXes | |
22.txt | 4999 | DDN Management Bulletin 22: Domain Names Transition (March 16, 1984) |
23things.txt | 2342 | |
2600-9-3.txt | 144176 | 2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous) |
2600_ind | 96106 | 2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price |
2600faq.011 | 169226 | Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995) |
386i.txt | 1920 | CIAC Advisory Notice: Authentication bypass in Sun 386i machines |
5600.txt | 84069 | Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990) |
aahack.txt | 3112 | Anarchy Anonymous: Hacking your School Network |
accesblt.hac | 20551 | Advanced Authentication Technology, 1991 |
accessin.txt | 14070 | A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987) |
acro01.txt | 4538 | Max Headroom's Hacker Acronym List |
acro02.txt | 5532 | Max Headroom's Second Collection of Acronyms |
acrolist.phk | 8181 | Acronym List, Early 1990s |
acroynym.txt | 30296 | The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990) |
adssys.txt | 10048 | A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom |
aio.box | 2485 | All in One Box, by Disk Doctor |
aio5b.txt | 6588 | AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder) |
ais.txt | 15248 | AIS: The Automatic Intercept System by Computer Consoles Incorporated |
aix.fun | 778 | Warning to download some AIX Patches |
allnet01.txt | 3939 | Hacking Allnet by Shadow Warrior (January 1988) |
amhack.txt | 12374 | Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS |
ansibomb.txt | 10496 | ANSI Bombs II: Tips and Techniques, by The Raging Golem |
aohell.phk | 1071 | Why I wrote AOLHell |
aoim.txt | 1725 | The Risks of Using an AOL Client Behind a Firewall |
aolhak.txt | 9252 | How to Hack America on Line by the Hooded Bobs |
as400cmd.hac | 27788 | IBM AS/400 Command Summary |
as400cmd.txt | 28178 | All IBM AS/400 Commands by The Might |
aspen.txt | 16772 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992) |
aspen1.txt | 16843 | A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992) |
aspen2.txt | 11053 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992) |
assolink.txt | 11949 | An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990) |
at&arebl.txt | 2965 | Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends |
atlas.txt | 4938 | Hackers' Atlas, by Ragon/Wynvern/BOF |
atm-92.txt | 20096 | ATMS: The Real File for ATM Theft in 1992 by The Raven |
atm-more.txt | 20049 | A Whole Collection of the Risks of ATM Cards (1988) |
atm.txt | 8167 | Hacking ATM's by Blue Thunder |
atm1.txt | 2773 | The Disk Jockey Presents Scamming ATMs |
atma.hac | 22036 | Quick OVerview of ATM Security (Needs Editing) |
atmapps.txt | 1771 | "Gee Whiz" ATM Applications are On the Horizon |
atmfile | 21290 | ATM secret codes, from Fred Gindburg (July 10, 1987) |
atmhacking.txt | 5742 | Hacking ATMs, by Anonymous |
atms | 14827 | An Overview of ATMs and Information on the Encoding System |
atms.txt | 20384 | Track Layouts on ATM Cards |
auditool.txt | 12681 | Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991) |
austhack.hac | 7324 | Australian Dialups |
austpac0.txt | 14674 | Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990 |
austpac1.txt | 11953 | Additional AUSTPAC Character Terminal Manual |
austpac2.txt | 20338 | AUSTPAC General Information and Codes |
austpac3.txt | 15830 | The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989) |
autohack.txt | 5504 | Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986) |
autonet1.txt | 11411 | Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5 |
autotelldoc.ana | 5439 | Fun with Automatic Tellers |
autovon1.hac | 2230 | Introduction to the Automated Voice Network (Autovon) by Shadowrunner |
autovon2.hac | 3387 | Introduction to the Automated Voice Network (Autovon) Part II |
autovon3.hac | 1809 | Introduction to the Automated Voice Network (Autovon) Part III |
autovoni.nst | 19395 | Overview of the Automatic Voice Network (Autovon) |
avoidcap.txt | 2576 | Planning Ahead for Phone Phreaks/Hackers |
babyna.mes | 203893 | The Moby Words Database (List of Words) (1989) |
backdoor.txt | 19156 | How to Hold Onto UNIX Root Once You Have It |
bankhack.txt | 12641 | The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers |
basic.net | 14775 | Basic Networking, by Sk8 the Skinhead |
basic1.hac | 7491 | The Basics of Hacking I: DECs By the Knights of Shadow |
basic3.hac | 4349 | The Basics of Hacking III: Data General By the Knights of Shadow |
basicnet.hac | 14534 | Basic Networking (1989) by Sk8 The SkinHead |
basics | 16646 | Rambug's Hacking Volume #1 by Rambug |
bbsfiles.txt | 38272 | The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening" |
bd-tv5.txt | 7439 | Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993 |
bindery.txt | 4201 | Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995) |
boahack.txt | 6686 | Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM |
boces.txt | 6957 | The Slipped Disk takes over the BOCES Computer: A Log |
bom-hh&p.txt | 9785 | The History of Hacking and Phreaking by Raven of BOMB Squad |
books.txt | 41728 | Biblography of Computer Security Books (1973 through 1988) |
brute.txt | 3462 | BRUTE: A brute force approach to hacking Unix passwords. Version 1.1 |
btinfo.h-k | 14037 | BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994) |
c64fun1.txt | 2927 | Suggestions On What to Do with a Commodore 64, by Nightstalker |
callcard.phk | 1734 | Hacking Calling Cards, by The Pyromaniac |
candyland.faq | 4823 | The Candyman Explains How He Will Accept Explosives Files |
carcodes.txt | 3358 | Codes Used by Computers in Cars |
cb1.txt | 3407 | Citibank Hacking, by Johnny Hundu |
cb2.txt | 2145 | Small Rant about Hacking Citibank |
cbiinfo | 19013 | Using and Abusing CBI by The Ghost |
cbrsp-1.hac | 6075 | The Cyberspace Chronicle Volume 1 by Phardak |
cbvhack.pnk | 6694 | CBV Hacking by PiNK ToRPeDo (June 7, 1994) |
cbvhack.txt | 5754 | CBV Hackin' by Pink Torpedo (June 7, 1994) |
chahelp_.txt | 9164 | Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke |
chaos01.txt | 1609 | The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990 |
chaos02.txt | 2577 | The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990 |
chaos03.txt | 4264 | The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel |
chilton1.txt | 7970 | Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986) |
china02doc.hac | 23257 | China Newsletter #02 (Hacking/Phreaking File Compilation) |
church4.ptl | 9611 | Church Chat Volume 4 by The Spiker |
cis.phk | 6583 | Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord |
cisagain.txt | 6192 | Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord |
cisinfo4.txt | 8104 | Compuserve Information by Morgoth and Lotus |
ciss3.txt | 18816 | List of Access Numbers to the Compuserve Information Service |
citibank.txt | 6226 | Hacking into Citibank with Johnny Hindu |
citibank2.txt | 6430 | Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990) |
cjack.faq | 4837 | Cracker Jack FAQ Written by kM (1993) |
codphone | 3842 | Coda-Phones by D.T. Legna |
com_sec90.hac | 54579 | United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact |
com_sec91.hac | 15590 | United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems |
compserv.txt | 6337 | Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq. |
compus.txt | 3286 | Free Compuserve Passwords, by Devious Xevious |
compuser.txt | 27008 | A Quick Compuserve Index |
compusin.txt | 1386 | Some Compuserve Tips, by Eric Diamond |
compusrv | 5599 | Compuserve Hacking by The Locksmith |
concis.txt | 3488 | Free Compuserve Access |
contact.txt | 5246 | How to Contact the HACK SQUAD |
copier.hac | 10206 | Magnetic Stripes, by Count Zero |
cops-rl | 23583 | RL C.O.P.S. File by Brian Oblivion |
cosmos.hac | 10942 | C O S M O S, by Doctor Who |
cosmos1.txt | 7458 | Hacking into COSMOS by Wizard of OZ |
cosmos2.hac | 9608 | Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom |
cosmos3.hac | 8320 | The 1986 COSMOS Files Part III by Sir William |
crackam1.txt | 63466 | Hacking Programs on the Amiga by FunToHack |
crackdwn.txt | 26230 | Crackdown, from 2600 Magazine volume 7, number 1 SPRING |
creditfr.txt | 8914 | The Adventures in Fraud Series Volume I, by Sneak Thief (1985) |
credunin.con | 1314 | Numbers of Credit Unions and protection Agencies |
cs.hac | 2815 | How to Get a Free Account on Compuserve |
cs.txt | 2944 | How to Get a Free Compuserve Account |
csl8_93.hac | 12359 | CSL Bulletin 1993 |
cuthesis.txt | 154635 | The Social Organization of the Computer Underground by Gordon R. Meyer |
cyber.txt | 11505 | The Cyberpunk Movement by Pazuzu of DnA May 12, 1993 |
cyberhac.txt | 11078 | Hacking Control Data Corporation's Cyber, by The Ghost |
data.tap | 3604 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS |
data_gen | 1574 | Captain Crunch talks about hacking Data General Systems |
database.txt | 3142 | CIRR Database: A tool for Corporate Research |
datakit.hac | 14409 | How to connect across VCS/ISN boundaries |
datanet.doc | 6670 | The Basics of TELENET |
datapac.hac | 15579 | A Guide to DataPAC by The Fixer |
datapac.inf | 12170 | Technical Guide to DataPac by the New Dark Council (1990) |
datapac.txt | 14413 | A Guide to DataPAC by The Fixer (April 18, 1990) |
datapac1.txt | 16626 | A Guide to DataPAC version 1.1 by The Fixer |
datapac2.txt | 19480 | Datapac 3101 ITI Parameters Description |
datapac3.txt | 2430 | Datapac 3101 Public Outdial Ports |
datatap.txt | 4109 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop |
datatapp.txt | 4088 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon |
ddn01.txt | 2993 | DDN Security Bulletin #1 |
ddn03.hac | 11207 | Defense Data Network Security Bulletin #3 |
ddn04.hac | 3143 | Defense Data Network Security Bulletin #4 |
ddn05.hac | 4295 | Defense Data Network Security Bulletin #5 |
ddn06.hac | 3015 | Defense Data Network Security Bulletin #6 |
ddnet1.txt | 8294 | DDN: Information on the Defense Data Network from Unauthorized Access UK |
ddnet2.txt | 2421 | DDN: The Defense Data Network (A Map) |
debtcard.txt | 3730 | Harvard Medical School Installs ISDN-Based Debit Card System |
dec10.txt | 23846 | Hacking the DEC-10 System |
dec_200.txt | 3239 | The Decserver 200 Revealed by Surf Studd (October 23, 1990) |
defaults.txt | 6726 | Hacking into a Variety of Systems by using their Default Accounts |
defcon.info | 26112 | |
defconadd.hac | 11951 | |
defdb.hac | 77311 | Department of Defense Federal Data Bases (List) |
defense.hac | 10447 | Defense Data Network Blues by Harry Hackalot |
defense.txt | 10198 | Defense Data Network Blues by Harry Hackalot (1984) |
defnetbl.txt | 10501 | Defense Data Network Blues by Harry Hackalot (August 31, 1983) |
demystif.txt | 3871 | Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin |
denning.txt | 59865 | Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990) |
des.txt | 22528 | The Data Encruption Standard (DES) Fact Sheet |
desblt.txt | 24448 | The Data Encryption Standard (DES) June 1990 |
desval.hac | 3149 | DES Validation List |
desval.txt | 3905 | DES Validation List |
dialback.txt | 10113 | Dial-Back Isn't Always Secure (February 28, 1985) |
dialog.txt | 8142 | Inside Dialog by Control C of Advanced Telecommunications Inc. |
dialog01.txt | 8543 | Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc. |
dialout1.txt | 67840 | A Novice Manual on Using Outdial Modems by Blue Adept |
dialplus.txt | 4830 | A Screengrab of Informaiton on PSS DialPlus from British Telecom |
dialup.hac | 18816 | List of Dialups. For what? I have no idea. |
disclaim | 2875 | Da Disclaimer, by Filbert |
diskopt | 6706 | My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85 |
djns.txt | 2377 | Inside DJNS (Dow Jones News Service) |
dlog-rdt | 44883 | Complete Guide To The DIALOG Information Network by Brian oblivion |
dnicinf.hac | 13312 | D A T E X - P - International Traffic Relations |
dowjones.txt | 2570 | Inside Dow Jones News Service |
dpacbas.txt | 9468 | The Basics of DataPAC by Mister X (February 2, 1991) |
dpacintr.rot | 37561 | Introduction to DataPac from the Right of Terror and Deicide |
dpacnuas.txt | 92595 | The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993) |
dtsb.hac | 8894 | DEC Terminal Server Basics by Mad Hacker |
easyl.hac | 3968 | Hacking Easy Link I by Professor Falken |
easylink.hck | 2399 | Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc |
easylink.txt | 4686 | Hacking Easy-Link I by Professor Falken |
edit.txt | 17792 | Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems |
ena!.hac | 7877 | The ENA Vision: What IS Ena? |
encyclop.txt | 1502 | Someone Makes fun of That Stupid Article |
eproms.hac | 5566 | A Closer Look at EEPROMS by The Kingpin |
eslf0006.txt | 57267 | The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine) |
ess.txt | 7153 | Electronic Switching System by Black Knight, from 2600, Feb. 1984 |
ethics.hac | 3692 | Newsweek: Teaching Hackers Ethics |
ethics.txt | 5148 | The Ethics of Hacking by Dissident |
evasiv.txt | 7297 | The Inspector's Thoughts, by Assailant's Blade and Ford Prefect |
exeguide.txt | 23552 | An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST) |
fast.txt | 5301 | Hacking McDonalds, by Herb the Hacker |
fbiaftha.hac | 16896 | The FBI Fights Computer Crime |
fbibust | 6199 | The FBI Raid of North County in Waltham Massachusetts (December 25, 1985) |
fbicompu.hac | 5225 | Summary of FBI Computer Systems, by Ralph Harvey |
fbicompu.txt | 5246 | Summary of FBI Computer Systems By Ralph Harvey (1986) |
fbisys.txt | 5281 | Summary of FBI Computer Systems, by Ralph Harvey |
fcisacc.txt | 3550 | Getting Free Compuserve Access, by The Wanderjahr |
fcscvol1.hac | 641496 | Federal Criteria for Information Technology Security Volume I |
fcscvol2.hac | 566236 | Federal Criteria for Information Technology Security Volume II |
fddi.hac | 2156 | How to FDDA Internals Work? Learning to Appreciate Tokens |
fdp1.txt | 12668 | The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta |
fdp2.txt | 13449 | The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta |
feds | 3702 | Watching the Watcher Watching You, by Sir Knight of OSUNY BBS |
fh.txt | 49876 | Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987) |
findhole.txt | 16372 | Security Holes Manifest Themsleves in Four Ways (November 10, 1993) |
findho~1.txt | 16384 | The Four Ways Security Holes Manifest Themselves (November 10, 1993) |
force1.txt | 27946 | Force Files Volume #1 (December 3, 1987) |
force2.txt | 30310 | Force Files Volume #2 (April 17, 1987) |
force3.txt | 29702 | Force Files Volume #3 (August 6, 1987) |
force4.txt | 28651 | Force Files Volume #4 (August 1, 1987) |
force5.txt | 32039 | Force Files Volume #5 (August 6, 1987) |
force6.txt | 7027 | Force Files Volume #6 (August 6, 1987) |
force7.txt | 31832 | Force Files Volume #7 (August 6, 1987) |
force8.txt | 31694 | Force Files Volume #8 (August 6, 1987) |
force9.txt | 11387 | Force Files Volume #9 (August 6, 1987) |
freebie3.hac | 103246 | Compufreebies 3.1 (1992) |
freecis.txt | 3278 | Free Compuserve Access |
funwith5.hac | 5437 | Fun With Automatic Tellers |
g.txt | 22969 | SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993) |
garaghak.txt | 48489 | Garage Door Opener Hacker Plans from Cybertek |
gateways | 8598 | The Inter-Network Mail Guide - Copyright 1990 by John J. Chew |
get-vip.txt | 11547 | DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files |
getbust.txt | 4631 | Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415 |
getinfo.txt | 5978 | The Hacker's Guide to Investigations, by Ripper of HALE (1989) |
gisdoc.hac | 5966 | Hacking the GIS computer by Doctor Crash |
goodbye.ana | 1796 | The Best of the Station, by The Prowler |
goodkids.hac | 4548 | Computer Hackers are Good People Too! |
govthlp.txt | 4106 | The Help Screen on some Government System |
gs1.txt | 16195 | Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990) |
gte.txt | 19883 | Hacking GTE Telemail by Master Micro |
guide.txt | 42423 | A Novice's Guide to Hacking- 1989 edition by The Mentor |
guidedoc.hac | 5437 | The RSTS User's Guide, by The Flash |
guidehak.txt | 176913 | The Neophyte's Guide to hacking (1993 Edition) by Deicide |
gunbelt3.txt | 8525 | Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987) |
hacethi.txt | 5949 | The Ethics of Hacking, by Dissident of TES |
hacethic.txt | 6161 | The Ethics of Hacking by Dissident |
hack.faq | 251055 | Beta .008 of the 2600/#hack FAQ |
hack.hac | 4096 | Hacking And Computer Krashing #9, by Gray Wolf |
hack.leg | 11978 | A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990) |
hack1.hac | 7960 | The Basics of Hacking, by the Knights of Shadow (Intro) |
hack2.hac | 7450 | The Basics of Hacking, by The Knights of Shadow (DECs) |
hack3 | 6629 | The Basics of Telenet Part I |
hack4 | 7894 | Telenet Scanning |
hack4.hac | 4421 | The Basics of Hacking, by The Knights of Shadow (Data General) |
hack5.hac | 5761 | Hacking McDonalds, by Herb of Burger King |
hack7 | 5417 | Hacking the Compuserve Information Service |
hack7.txt | 4034 | The Conscience of a Hacker by The Mentor (January 8, 1986) |
hack9.hac | 10950 | Hacking Control Data Corporation's Cyber |
hack9301.rpt | 39068 | The Hack Report Volume 2, Number 1 (January 3, 1993) |
hack9302.rpt | 59113 | The Hack Report Volume 2, Number 2 (February 7, 1993) |
hack9303.rpt | 53202 | The Hack Report Volume 2, Number 3 (March 7, 1993) |
hack9304.rpt | 66762 | The Hack Report Volume 2, Number 4 (April 4, 1993) |
hack9305.rpt | 91783 | The Hack Report Volume 2, Number 5 (May 9, 1993) |
hack9306.rpt | 101520 | The Hack Report Volume 2, Number 6 (June 6, 1993) |
hack9307.rpt | 117584 | The Hack Report Volume 2, Number 7 (July 4, 1993) |
hack9309.rpt | 137473 | The Hack Report Volume 2, Number 9 (September 12, 1993) |
hack9401.rpt | 75374 | The Hack Report Volume 3, Issue 1 (January 29, 1994) |
hack_cis.txt | 13288 | The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991 |
hack_em.hac | 26119 | The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr |
hack_s.txt | 13935 | Harry Hackalot's Official Hacker Address Book for October 1984 |
hack_ths.txt | 148109 | The Social Organization of the Computer Underground (Thesis) |
hackacr.hac | 59638 | The Hackers Acronym Chart, compiled by IIRG |
hackad.txt | 5248 | The Famous Hacker's School (Analog Science Fiction Sept. 1990) |
hackcos.txt | 27333 | Hacking COSMOS Part I by Lex Luthor and the Legion of Doom |
hackcrak.txt | 29696 | The Hacker Crackdown, by 2600 Magazine |
hackdct1 | 89766 | The Hacker's Jargon File, (November 14, 1982 Version) |
hackdict.txt | 872346 | The Hacker's Dictionary, Older Version, Uncredited! |
hacker | 3415 | The Consience of a Hacker by The Mentor (January 8, 1986) |
hacker.tst | 21534 | The Hacker's Purity Test, June 16, 1989 |
hacker.txt | 5787 | SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994) |
hacker01.txt | 152594 | The Social Organization of the Computer Underground: A Thesis |
hacker03.txt | 4931 | The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers |
hacker1.txt | 19996 | Diary of a Hacker |
hacker11.txt | 2403 | Hacking Western Union's Easylink |
hacker2.txt | 11714 | The Diary of a Hacker Part II by the Cuisinart Blade |
hackerdoc.txt | 10690 | SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994) |
hackerla | 2181 | The Hackers' Laws |
hackers.par | 2238 | Advertisement for the Galactic Hacker's Party (August 1989) |
hackethic.txt | 5953 | The Ethics of Hacking by Dissident |
hackfaq.10 | 176079 | FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994) |
hackfaq.txt | 282121 | The Hack FAQ By Simple Nomad (January 31, 1999) |
hackholl.txt | 4372 | Hacking In Holland by Rop Gonggrijp (October 18, 1988) |
hackhp2.hac | 15991 | Hacking the HP 2000 by Bioc Agent 003 |
hacking | 1676 | Description of the New, Bad Definition of Hacking |
hacking.dox | 38174 | Collections of Hacker FIles Downloaded by Consumertronics |
hacking.tap | 5840 | Style Teaches You About How to Be a Proper Hacker |
hacking.txt | 30670 | Hacking Tutorial, by The Jolly Roger |
hacking101.hac | 3367 | HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life |
hackinga.txt | 5856 | Hacking Bank Of America's Home Banking System by Dark Creaper |
hackingc.txt | 4524 | Hacking Credit Card Codes by Omni-Kid and The Wyvern |
hackinge.txt | 2881 | Hacking ECONet Systems by Jack Death and Zapper |
hackingi.txt | 759 | Computerworld Asks People to Hack In, 1984 |
hackingt.txt | 1311 | Hacking the Lexington Air Force Computer |
hackl1.txt | 4699 | Hacker's Line #1 by 2TUFF |
hacknet.dox | 9243 | The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC |
hacknet.txt | 7950 | how to Hack Your School's Network, from Dr. Techno of Paradise Lost |
hackpcp.hac | 8519 | The Weenie Warriors present Hacking PC Pursuit Codes |
hackprod.txt | 3110 | How to Hack Prodigy by Desolated Dream |
hackprof.txt | 2276 | Hacker Proof Doors! It IS Possible! |
hackquiz.txt | 21324 | The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas |
hackrsts.txt | 4221 | Hacking RSTS Systems: An Instructional Test |
hacksong.txt | 5632 | The Hacker's Song by Dave Touretzky and Don Libes |
hacksynd.hac | 7296 | The Hackers Syndrome, by Tad Deriso |
hacktalk.txt | 10240 | A Short Hackerspeak Glossary, by the Hollywood User Group |
hackterm.txt | 4314 | Collection of "Hackernyms" by Rad Man version 2.10 |
hacktest.txt | 8497 | The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992) |
hacktips.hac | 3392 | Hacking Tips #2, by Hoe Hopper |
hacktips.txt | 5625 | Tips for Tracking Hackers |
hacktut.txt | 21105 | Hacking Tutorial, by The Jolly Roger |
hackunlm.hu1 | 144657 | Hackers Unlimited Magazine Volume 1 Issue 1 |
hackusa!.hac | 7666 | Hackin' USA |
hackwarn.hac | 5735 | A Warning to Hackers |
hackwwiv.hac | 7679 | Hacking into WWIV, Second Edition by Vision |
hackwwiv.txt | 12294 | Hacking into WWIV Software by Vision |
haibm370.txt | 2420 | How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club |
hakdec20.txt | 8786 | An Addendum to A Novice's Guide to Hacking, by The Mentor |
hakdic.txt | 231108 | The Hacker's Dictionary, A Guide to the World of Computer Wizards |
hakmedia.txt | 1771 | Hackers in the Media, List start: 10/28/92 - Doomsday |
handbook.txt | 20162 | Hacking Compuserve: All You Need to Know, by Mr. Perfect |
haq1.txt | 37136 | The HAQ Edition 2.07 (June 11, 1994) |
hashish.txt | 6146 | Hashish: The Exotic Elixir, by EZ Rider |
hate.info | 1152 | Invitation to HATE: Hackers at The End (Summer 1995) |
havok1.txt | 64006 | HAVOK Pack #1: The Return (Collection of Hacking Textfiles) |
hckr_hnd.txt | 138752 | The Hacker's Handbook by Hugo Cornwall (1985) |
hckrslg | 12665 | The Hacker's League, by Lee Felsenstein (March 18, 1992) |
hd.hac | 5732 | Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme |
hd01.hac | 16446 | Hackers Directory Volume #1 by Ninja Squirrel and Logan5 |
hd02.hac | 13873 | Hackers Directory Volume #2 by Ninja Squirrel and Logan5 |
hd03.hac | 16634 | Hackers Directory Volume #3 by Ninja Squirrel and Logan5 |
hd04.hac | 11329 | Hackers Directory Volume #4 by Ninja Squirrel and Logan5 |
hdigest.txt | 14413 | The Hacker's Digent by Harry Hackalot (October 1984) |
hdindex.txt | 4686 | Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986) |
hedrick.txt | 89278 | An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987) |
hfnewbies.txt | 17307 | The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993) |
hhacking.iix | 5504 | CAT-HACK Volume 1 from The Mystery |
hint.txt | 25439 | The Czar's Guide to the Young Criminal Accused of Using Computers |
his-hp.txt | 9320 | The History of Hacking and Phreaking by Raven of BOM SQUAD |
hk_acces | 43859 | Draft Chapter of the NIST Computer Security Handbook, from Ed Roback |
hk_crypt | 34588 | Draft Chapter from the NIST Computer Security Handbook, on Cryptography |
hk_i&a | 36722 | Draft of the NIST Computer Security Handbook on Identification and Authentification |
hk_polic | 28492 | Draft of the NIST Computer Security Handbook on Computer and Information Security Policty |
hoho93.ad | 13472 | |
hoho93cz.hac | 13356 | |
hohocon.93 | 14237 | |
holelist.txt | 16654 | How Security Holes Manifest Themselves |
holes.txt | 78322 | A List of Holes in Various Operating Systems (April 7, 1993) |
homebank.hac | 6056 | Hacking Bank Of America's Home Banking System by "Dark Creaper" |
homebank.txt | 5863 | Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM |
horror_s.tor | 48939 | Hacking Horror Stories 1982 |
hp20001.hac | 12800 | HP 2000 Part 1: Commands by Blitzoid and Galactus |
hp20002.hac | 15744 | HP 2000 Part 2: Statements by Blitzoid and Galactus |
hp20003.hac | 9344 | HP 2000 Part 3: Functions by Blitzoid and Galactus |
hp20004.hac | 5376 | HP 2000 Part 4: Files by Blitzoid and Galactus |
hp20005.hac | 5120 | Hp 2000 Part 5: Matracies by Blitzoid and Galactus |
hp30.txt | 116232 | The Completel Hewlett Packard 3000 Hackers Guide |
hp3000.hac | 10319 | The Complete Hewlett Packard 3000 Hackers Guide |
hp3000.txt | 111310 | The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS |
hp3000_t.hac | 14354 | Hacking the HP 3000 by DE BUG |
hp3000g.hac | 112566 | The Complete Hewlett Packard 3000 Hackers Guide |
iah1.txt | 142976 | The International Hackers' Association Issue #1 |
ibm-vm70.txt | 3226 | A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited |
ibm370.hac | 2688 | How to Take Control of your Local IBM 370 by Another Hacker |
ibmhack.hac | 2686 | Hacking the I.B.M. By John Doe |
icebook1.txt | 35623 | ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992) |
icebook2.txt | 54349 | ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus |
icon4u.nrg | 1810 | ICoN Hacking with Loser Access by úäïäâGYú |
id-biz.txt | 2850 | How to Have a Profitable ID Business, by Mr. Puff n' Stuff |
identity.txt | 7309 | How to Create a New Identity by the Walking Glitch |
ihg.txt | 11913 | International Directory of Hacking and Phreaking Organizations, by John Simmons |
iirgacr6.txt | 62629 | The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992) |
iirgacr7.txt | 67165 | The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993) |
iirgacr8.txt | 79728 | The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG) |
iiu-001.txt | 6073 | Bust Avoidance for Dipshits by Derision of IIU (1990) |
iiu-004.txt | 9041 | Hacking on the Compuserve Information Service by Darkness (1990) |
illinet.txt | 20430 | Dial-Up Access Numbers for ILLINET Online |
info.txt | 7072 | How to Get Detailed Information on Anybody by DTS |
info3.gph | 4352 | How to Get Anything on Anybody Part III |
infoam.txt | 51393 | Exploring Information-America by Omega and White Knight |
informer.hac | 17320 | TRI : The Remote Informer, Volume 1, Issue #6 |
innerc.txt | 15295 | Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth |
innercir.hac | 9856 | Hacking Techniques, Typed in by Logan5 from The Inner Circle |
intercep.hac | 10746 | The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing) |
intercpt.txt | 23219 | Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods |
intruder.dox | 8534 | SOFTDOCS: Intruder v1.21 by CreaSoft |
inttel.hac | 1728 | European Computers List #1 by Kerrang Khan |
issm201.hac | 32229 | The Information Systems Security Monitor Volume 2 Number 1 |
issm202.hac | 52667 | The Information Systems Security Monitor Volume 2 Number 2 |
issm204.hac | 28850 | The Information Systems Security Monitor Volume 2 Number 4 |
issm301.hac | 24356 | The Information Systems Security Monitor Volume 3 Number 1 |
issm302.hac | 23394 | The Information Systems Security Monitor Volume 3 Number 2 |
issm303.hac | 22981 | The Information Systems Security Monitor Volume 3 Number 3 |
issm304.hac | 30656 | The Information Systems Security Monitor Volume 3 Number 4 |
jack14.txt | 9855 | Documentation for Cracker Jack, THE Unix Password Cracker (June 1993) |
janet.txt | 4618 | JANET PAD Listing Revision 1.2 (March 1st, 1990) |
jargon211.hac | 1147413 | The Jargon File, v.2.9.11, by Eric S. Raymond |
javabugs.txt | 5767 | JavaScript Problems I've Discovered |
keylock.sch | 6772 | Schematic For an Optoelectronic key Lock by Joe Scharf |
keytrap3.txt | 2787 | SOFTDOCS: Keytrap v3.0 by Dcypher |
kfyi-593.hac | 91136 | KFYI AM Radio 910 interviews Mind Rape and Merc |
kill.feds | 5376 | FEDS: How to Find and Eliminate Them (September 10, 1987) |
l0pht.txt | 2807 | The L0pht... What I saw, by Tfish of RDT |
lan.txt | 8247 | Local Area Networks (LANs) by ANSI-Christ |
lca-1.txt | 4422 | LCA #1: Zen and the Art of Untraceable Hacking, by Flood |
lca-2.txt | 3918 | LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance |
lca-3.txt | 3269 | LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance |
lca-4.txt | 3725 | LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance |
lca-5.txt | 5082 | LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance |
lca-6.txt | 4032 | LCA #6: Beige Boxing, by the Lemon Curry Alliance |
ldd.txt | 12237 | How to Hack into CIS |
license.asc | 58618 | The Guerilla Guide to Licensing Software |
list2 | 2936 | Pacific Bell Computer Systems, by Another Hacker |
litewave.sch | 7819 | AM Lightwave Transmitter and Reciever by Joe Scharf |
lnoise.hac | 6020 | Modem Noise Destroyer (Alpha Version) |
lodhbasi.hac | 42609 | The LOD/H Present: A Novice's Guide to Hacking- 1989 edition |
logoncbi.hac | 3235 | How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation) |
logoncbi.txt | 2949 | How to Log into a C.B.I System by L.E. Pirate |
longpass.txt | 14916 | Generating Longer Passwords |
machack0.5.txt | 13640 | The Mac Hack FAQ by AX1P (November 22, 1994) |
mag_stripes.txt | 25011 | Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994) |
magnet.01 | 24432 | Magnetic Stripes on Cards: An Overview |
magnet.02 | 46174 | Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991) |
mailbox.hac | 3368 | Mailbox Systems: Your Link to the Underworld |
main.fra | 6763 | Main Frames by the Pirate Club |
mainfrms.con | 1492 | A List of Mainframe Dialup Numbers |
master.txt | 4915 | Master Hack Version 1.0 by Master Frodo (January 1, 1991) |
mci.txt | 2020 | MCI Mail Access Numbrs, from The Swamp |
mci__acc.txt | 2830 | List of MCI Access Numbers |
mcimail.hac | 7772 | MCI Mail - The Adventure Continues, by Bioc Agent |
mcisprin.t | 5278 | Hints on Hacking, byt the RAMBUG and Captain Blood |
memory.lst | 32113 | The Format of the BIOS Data Segment at Segment 40h (July 31, 1994) |
mgtguide.txt | 24448 | The NIST Management Guide to the Protection of Information Resources |
mickeyd.txt | 5145 | Hacking McDonalds by Herb the Hacker |
micrrisk.hac | 63479 | Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch) |
milinet.1 | 5564 | Milnet Access Codes |
milnet.txt | 36799 | How to Use the American Military Net |
milnet1.hac | 7765 | Milnet, by Brigadier General Swipe |
mish18.txt | 20480 | The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986) |
mism1.hac | 11776 | How to Get Anything on Anyone Excerpts |
mism10.hac | 2944 | How to Get Anything on Anyone Excerpts |
mism20.hac | 3840 | Mastering the SCANTRON by Warhead |
mism42.hac | 1024 | Xerox Voice Message Exchange Commands, from The Lineman |
mob.txt | 8954 | The Hackers in the MOB |
modbook1.txt | 3585 | The History of MOD: Book One: The Originals |
modbook2.txt | 4182 | The History of MOD: Book Two: Creative Mindz |
modbook3.txt | 4522 | The Book of MOD: Part Three: A Kick in the Groin |
modbook4.txt | 2787 | The Book of MOD: Part Four: End of '90-'1991 |
modbook5.txt | 5199 | The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991) |
morality.hac | 2654 | Hacker Morality: A Lesson |
morestuf.txt | 18930 | Collection of Hacking Files (Should Eventually be Split up) |
morprime.hac | 10579 | RVEC Parameters and DMSTK Format |
mrsts.hac | 5504 | So you've finally decided to down an RSTS System? |
mtempist.hac | 10752 | The Tempest Method of Data Interception (Needs Editing) |
narc3.hac | 8229 | Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989) |
ncsc-tg-003.txt | 86792 | A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987) |
ncsc-tg-016.txt | 88895 | Guidelines for Writing Trusted Facility Manuals |
ncsc-tr-005-2.txt | 90471 | Introduction to Trusted Computer System Evaluation Criteria |
ncsc_oas.txt | 109919 | A Guideline on Office Automation Security (December 5, 1986) |
netbios.txt | 13379 | Understanding NetBIOS by NeonSurge of Rhino9 |
netcrack.txt | 7335 | DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00 |
networks.phk | 5522 | 2600: How to Send Mail to other Networks |
neuroman.pwd | 3225 | List of DataBases and passwords for the game "Neuromancer" |
newid.hac | 6543 | New Identity Method |
newsltr.idx | 3273 | Index to the Computer Underground Digest Archives (June 13, 1991) |
nextbugs.txt | 7878 | CERT Advisory on the NeXT computer's Software |
nfs_trace.txt | 35713 | NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton |
nha-app.txt | 4706 | Application to Join Network Hackers Alliance (June 1, 1991) |
nimbus.txt | 8498 | Research Machines Nimbus hacking, by The Green Rhino |
note9309.txt | 1984 | The Hack Report, by Lee Jackson (September 1993) |
nov-faq.txt | 119598 | The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad |
novell.hac | 10516 | Collection of security holes in Novell Netware |
novell.txt | 7144 | SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991) |
novhack.txt | 9096 | Having Phun With Novell by Lord Foul/Decay (July 13, 1991) |
nwhack.faq | 73974 | Frequently Asked Questions about Hacking Novell Netware by Simple Nomad |
obscene.### | 1838 | TAG FILE: Obscene Phobia BBS (January 1, 1995) |
ocfber.1 | 1394 | Bylaws of the Open Computing Facility at UC Berkeley |
ocfber.2 | 14491 | Constitution for the Open Computing Facility at UC Berkeley |
omron.pin | 1648 | How to Connect OMRON 3S4YR-HSR4 to your PC |
orange | 328324 | Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983 |
orange.txt | 319321 | The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book) |
orgs.hac | 8464 | A Large List of Computer Security Organizations |
orgs.txt | 8320 | 1988 List of Computer Security Organizations |
outdial.lst | 12887 | Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991) |
outdial.txt | 10261 | How to Use Outdials: An Introduction by Lorax |
outdials.us | 3553 | Ameican Local Outdials by Sebastian Winchler (March 1991) |
outdialsnfo.hac | 2652 | List of Dialouts |
pacbell.lst | 3096 | Collection of Pacific Bell Computer Systems |
packet.txt | 5760 | Notes on Using Tymenet and Telenet by Michael A. Banks (1989) |
pacnet.hac | 5300 | Hacking into the PACnet System |
pactimea.txt | 2811 | Telephone Numbers for the Pacific Bell Computer System by Another Hacker |
passhack.txt | 7070 | The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press |
password.txt | 22477 | Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978) |
pcp88.lst | 5450 | PC Pursuit List Version 1.1 (August 31, 1988) |
pcpbas.txt | 3972 | How to Use PC Pursuit Service |
pcphack.phk | 9552 | Hacking PC Pursuit Codes by The Weenie Warriors |
pcphack.txt | 9537 | The Weenie Warriors Present Hacking PC Pursuit Codes |
pcpold.phk | 7814 | How to Use Telenet's PC Pursuit Service by Z-Man |
pcpursue.txt | 238362 | PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992 |
pcpursui.yes | 15104 | PC Pursuit and Telenet Local Access Numbers |
pdnaxis.txt | 16421 | The Public Data Network Numbers |
pdp11.hac | 1920 | Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal |
pentagon.txt | 7534 | The Milnet File by Brigadier General Swipe/Dispater |
ph.txt | 30181 | Soft Documentation: P-Hack 1.0 by Peter King |
phonecom.nfo | 3304 | Becoming More Informed (Becoming a Hacker) |
popper.txt | 2875 | ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994) |
prime.hac | 21725 | A List of PRIME Commands |
primecpl.hac | 12018 | An Introduction to PRIMOS CPL Directives by Necrovore |
primer.txt | 102646 | Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990) |
primes.txt | 12879 | Message Base With Discussion of the Watch utlity on PRIME (August, 1988) |
primos.hac | 3968 | Hacking Primos Systems By Nanuk of the North |
primos1.txt | 26221 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers |
primos2.txt | 39011 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers |
primos3.txt | 41578 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers |
primos4.txt | 25184 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers |
primos5.txt | 34196 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers |
psnintro.txt | 34582 | The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990) |
psns.txt | 3366 | An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker |
pumpcon.txt | 10358 | |
pw-hack.txt | 5432 | The Art of Password Hacking by HIT |
qsd.txt | 4676 | How to Access Minitel or How to Have FUN on QSD |
racintro | 1794 | Information on RAC: A Host System Used for Access to GEnie and AppleLink |
raclog1 | 28632 | An Example of an RAC Login |
raclog2 | 27736 | An Example of an RAC Login, Part II |
ram1 | 4045 | Hacking Rampart Systems Part 1 |
ram2 | 4058 | Hacking Rampart Systems Part 1 (cont) |
ram5 | 4022 | Hacking Rampart Systems Part 2 |
ram6 | 861 | Hacking Rampart Systems Part 2 (cont) |
ramcomm.hac | 185184 | Hacking RAM Communications (Pager) |
rampart1.hac | 8448 | Hacking Rampart Systems by Whackoland |
rampart2.hac | 4864 | Hacking Rampart Systems by Whackoland Part II |
rcaglobe.txt | 3494 | The RCA Network Part I by the Telex Troopers |
read.me | 3649 | A Story About the TSR That Catches Passwords, and a short History |
readme.now | 6000 | SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker |
readme.txt | 131 | Force Files Explanation |
reid.txt | 49665 | The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986) |
revblt.hac | 13726 | Review of Federal Agency Computer Security and Privacy Plans |
riacs | 5878 | Principles of Responsible Use of RIACS Computing Facilities |
rimeman.hac | 52781 | RIME User's Guide |
ripco.txt | 13184 | The Doctor Ripco Seizure by Full Disclosure (1991) |
risks.txt | 6181 | Avoiding the Risks of Hacking: A List of Suggestions by IC |
risktool.hac | 33991 | Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST) |
rom.txt | 3744 | Macintosh ROM Secrets by The Cloud (November 23, 1990) |
rowdy_dl.man | 63720 | DocumentationL The Rowdy Dialer (April 1993) |
rspwd.new | 23723 | Some Downloaded Password File |
rsts.hac | 5376 | So You've Decided to Down a RSTS System, by Sam Sneed |
rsx11.hac | 18944 | RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital |
rsx11m.txt | 18755 | RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital |
ruhacker.txt | 1501 | Are You a Hacker? By ReDragon |
sanatmdoc.hac | 6179 | Getting into an ATM |
saruman.add | 829 | TAG: Saruman BBS Ad |
satan~1.txt | 20843 | A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995) |
satcon.txt | 2841 | Satellite Control, by Ninja Squirrel & Logan-5 |
satelit3.txt | 17718 | Satellite Scrambling Systems: The Truth, by XL |
satelite.txt | 3636 | Satellite Frequencies, by Sir Francis Drake |
scanprg.txt | 5542 | What To Look For In A Code Hacking Program, by Dissident |
school.txt | 9253 | Screwing with School Computers, by Liquid Bug |
secrets2.hac | 7733 | Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office |
secrets3.hac | 4250 | Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things |
secretsdoc.hac | 233082 | Young's Demonstrative Translation of Scientific Secrets (1861) |
securdev.txt | 8616 | Technical Hacking Volume 1 by the Warelock |
security | 66923 | Overview of Computer Security by E.A. Bedwell, EDP Specialist |
security.fy8 | 259023 | Site Security Handbook, 1991 |
security.txt | 6184 | Professor Falken's Guide to CODE Hacking Security |
sequence.txt | 22931 | Sequence Number Attacks, by Rik Farrow |
sha.hac | 83219 | Swedish Hackers Association Annual Year Protocol #4 |
shadec.txt | 14173 | The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association |
shahewl.txt | 3723 | Swedish Hacking Association presents Hacking HP 3000 Part 1 |
shaprot3.txt | 91074 | The 3rd Protocol (1990) by The Swedish Hackers Association |
shawn-file-check | 20977 | The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions |
shw0293.asc | 8632 | Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn |
shw0394.asc | 9472 | Syndicated Hack Watch (March 1994) by John McCormac |
shw0494.asc | 12408 | Syndicated Hack Watch (April 1994) |
shw0593.asc | 6667 | Red Hot Television is Banned |
shw0893.asc | 12544 | The Start of the Skybox Cable War |
shw0993.asc | 8955 | Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback" |
shw0994.bbs | 12097 | Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control |
shw1093.asc | 10974 | Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press |
skel_key.txt | 7361 | SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society |
skey.txt | 11048 | Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn |
skeyfl.txt | 11419 | Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries |
skyhack.hac | 26525 | The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991) |
sniffer.txt | 19288 | FAQ: The Sniffer FAQ Version 1.7 |
snoop | 3075 | Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca |
snoop.txt | 4065 | Data Snooping the Right Way by Lee Day |
sourcetelnet.txt | 4828 | The Source Telnet Directory, and Uninet Directory |
ss-info2.txt | 5120 | The Social Security Number, by Barbara Bennett |
ssan.hac | 4738 | The Social Security Number |
ssn-stuf.txt | 19840 | More about why Social Security Numbers are Insecure |
ssnum.ana | 1791 | About Social Security Numbers |
starlink.txt | 26902 | Information on Galaxy Starlink: A User's Guide |
starmast.txt | 12657 | Hacking the Gandalf Starmaster by Deicide (May 22, 1993) |
statemind.txt | 5863 | So, You Wanna Be a Hacker? It's a State of Mind! |
stoll.doc | 58801 | Writings of Clifford Stoll |
storehac | 4515 | Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991) |
stupidki.hac | 4942 | Those Stupid Little Bastard Hackers! |
sun413.txt | 31595 | How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994) |
sundevil.txt | 3252 | Operation Sundevil, by the Prodigy |
superd.txt | 5112 | DocumentationL Superdial 1.03 by Evan Anderson |
sys75.hac | 9410 | The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson |
ta&m.txt | 20778 | Texas A&M Network Security Package Overview 7/1/1993 |
tachelp | 6285 | Captures of Information on TACACS by The Argonaut |
tan.txt | 37769 | List of Telenet Access Numbers by Daredevil of P/HUN |
tcp-ip.txt | 35765 | FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996) |
tcsb.03 | 29427 | Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988) |
tcsb.04 | 11790 | An Introduction to PRIMOS CPL Directives by Necrovore |
tcsb.05 | 30972 | Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988) |
tcsb.06 | 27636 | Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988) |
tcsb.08 | 4370 | Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988) |
tcsb.11 | 8938 | Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988) |
tcsb.12 | 3370 | Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988 |
techhack.hac | 8368 | A Guide to ADS System, by Lord Digital and the Phantom |
techiq.txt | 9737 | Hacking Techniques, by Logan-5 (Hacker Supreme) |
technicl.txt | 9809 | Technical Hacking: Volume One by the Warelock |
tele3.txt | 8229 | Telenet Scanning by Doc Telecom (July 11, 1988) |
tele4.txt | 2936 | An Overview of Telenet by Man Max |
tele5.hac | 6492 | Hacking Telnet by The Flash |
telecode.txt | 24857 | Telenet Codes, Hacked Out by ZORON (May 1, 1988) |
telecomm.txt | 2271 | An Introductory Guide to Telenet Commands |
teleinfo.txt | 6496 | Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987) |
telenet.hac | 10465 | Telenet: The Secret Exposed |
telenet.txt | 2732 | An Introductory Guide to Telenet Commands |
telenet2.txt | 24259 | A Good amount of general Telenet Information |
teleneth.txt | 2203 | An Introductory Guide to Telenet Commands |
teleneti | 6192 | Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987) |
teleneti.phk | 2720 | Instructions for using TELENET. |
telescan.txt | 7940 | Information on Telenet Scanning |
tellerma.txt | 1982 | Cracking Auto Bank Teller Machines by the Suspect |
teln2.txt | 2703 | Telenet Terminal Identifiers |
teln3.txt | 32422 | Welcome to the TCO Access Listing (September 15, 1987) |
telnetsn.txt | 8803 | Telenet Scanning by Doc Telecom (July 11, 1988) |
telnumbe.txt | 31564 | Telenet Access Numbers, by the Weenie Warriors |
teltermz.txt | 13604 | List of Terminal Identifiers |
tempest.hac | 5122 | Excerpt of article on Tempest |
thc.nfo | 11145 | NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995) |
thc2.nfo | 21205 | The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996) |
thehaq.txt | 109515 | The HAQ (Hack-FAQ Version 2.07) (June 11, 1994) |
thuglan1.txt | 16453 | Introduction to Hacking into LANs by THUG |
thuglan2.txt | 10483 | General Information on LANs by THUG (July 31, 1991) |
tihack2.txt | 31999 | Hacking the TI-85 Calculator, by David Boozer (September 1, 1994) |
timenet.txt | 5434 | Hacking Tymnet by Byte Brain |
tl-user.txt | 37318 | ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas |
tl.q-a | 6240 | ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual |
tmplefun.txt | 3451 | Fun with Temple's Computers (A How To) |
tnet1.txt | 21888 | Tymnet File #1 by The Twilight Phone |
tnet2.txt | 16896 | Tymnet File #2 by The Twilight Phone |
tnet3.txt | 14592 | Tymnet File #3 by The Twilight Phone |
tnpcpod.txt | 26685 | TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom |
tops20.txt | 7075 | Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers! |
transdir.txt | 14377 | The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory |
trash.txt | 5888 | Dumpster Diving: An overview of the legality, by Full Disclosure |
trashing.rot | 18277 | The Art of Trashing by Deicide |
traxtool.txt | 13541 | The Trax Toolbox Volume #001 by Track |
triad187.hac | 19927 | The Triad: A 3-in-1 Textfile Magazine, Issue #1 |
trojan | 9131 | Rumors of Worms and Trojan Horses by Mike Guffey |
tsrcrack.txt | 2822 | SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993) |
ttyspoof.txt | 7786 | TTY Spoofing, by SubEthan |
tym_ods.txt | 20850 | TymNet OutDials Sorted By Area Code |
tyme2.txt | 8055 | International Packet Switching Services Description |
tymenet.hac | 20577 | Tymenet Technical and User Information |
tymnet.ods | 1777 | Listing of Tymnet ODS Systems |
tymnet.txt | 205145 | Packet Networks I and other Tymnet Information by Digital Demon, 1990 |
tymnet96.txt | 17283 | BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994) |
ueber.txt | 8770 | A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993) |
uk.dialups | 28896 | A List of Modem Dialups in the UK (September 22, 1990) |
ukguide.hac | 13693 | The Guide to Online Databases for UK Users |
ulimate.txt | 61683 | The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996) |
ultrad3.txt | 10880 | The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy |
unineta.phk | 7049 | Uninet Information, from The South Pole |
unp.txt | 30663 | SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994) |
up.txt | 1593 | SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993) |
usrguide.txt | 16128 | The NIST Computer User's Guide to the Protection of Information Resources |
vanish.txt | 3901 | The Hacker Who Vanished: Suicide or Clever Hoax? |
vax-7.txt | 2248 | |
vendors.hac | 55184 | Large Security Vendors List |
verstell.ana | 3221 | Neat Fun with Versatellers |
virus | 11269 | Attack of the Computer Virus, by Lee Dembart |
vmbhack.txt | 4662 | Hacking Voice Mail Boxes by Tik Tak |
vmsptuto.txt | 12717 | The IBM VMSSP System, by The Motorhead |
vthack1.txt | 9844 | The VT Hacker, by the Man Hermit |
vthack2.txt | 9378 | The VT Hacker #2, by the Mad Hermit |
vthack3.txt | 29178 | The VT Hacker #3, by The Mad Hermit |
vtp.txt | 17664 | A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989) |
wal-mart.txt | 4175 | Hacking the Wal-Mart Armorguard Computer Protection System |
wanghack.hac | 5302 | Hacking the Wang OS, by Dark Knight |
wargames | 5912 | The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991) |
wargames.hum | 8715 | Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock |
watching | 3552 | Watching the Watcher Watching You by Sir Knight |
wats.txt | 9978 | WATS Version 1.0 by Professor Falken & The Aptolcater |
whca_txtmsg.log | 178486 | The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages! |
xerox.hac | 2321 | Hacking Xerox |
xmux.txt | 12318 | The ROT Guide to Gandalf XMUX's by Deicide |
zen.hac | 52401 | Dan Farmer's Improving the Security of Your Site by Breaking Into It |
zippass.txt | 5637 | The Security of PKZIP Encryption |
samedi 3 décembre 2011
Grosse liste de document sur le hacking
Inscription à :
Publier les commentaires (Atom)
Aucun commentaire:
Enregistrer un commentaire