samedi 3 décembre 2011

Grosse liste de document sur le hacking

FilenameSizeDescription of the Textfile
BIBLIOGRAPHIESLists of Articles and Books about Hackers and Hacking
CABLETextfiles about Cable TV and Cable TV Piracy
COLORBOOKSPurported Department of Defense Computer Security Guidelines
CONVENTIONSInformation about different Hacking Conventions
INTERNETFiles Dealing With Hacking on the Internet
MICROSOFTFiles Dealing with Hacking Windows and DOS
POLICIESVarious Ethics and Policies of Computing Facilities Nationwide
UNIXTextfiles About Exploring or Exploiting UNIX
VMSTextfiles About Exploring or Exploiting VMS and VAXes
 
22.txt4999DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
23things.txt2342
2600-9-3.txt1441762600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
2600_ind961062600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
2600faq.011169226Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
386i.txt1920CIAC Advisory Notice: Authentication bypass in Sun 386i machines
5600.txt84069Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
aahack.txt3112Anarchy Anonymous: Hacking your School Network
accesblt.hac20551Advanced Authentication Technology, 1991
accessin.txt14070A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
acro01.txt4538Max Headroom's Hacker Acronym List
acro02.txt5532Max Headroom's Second Collection of Acronyms
acrolist.phk8181Acronym List, Early 1990s
acroynym.txt30296The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)
adssys.txt10048A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
aio.box2485All in One Box, by Disk Doctor
aio5b.txt6588AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
ais.txt15248AIS: The Automatic Intercept System by Computer Consoles Incorporated
aix.fun778Warning to download some AIX Patches
allnet01.txt3939Hacking Allnet by Shadow Warrior (January 1988)
amhack.txt12374Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
ansibomb.txt10496ANSI Bombs II: Tips and Techniques, by The Raging Golem
aohell.phk1071Why I wrote AOLHell
aoim.txt1725The Risks of Using an AOL Client Behind a Firewall
aolhak.txt9252How to Hack America on Line by the Hooded Bobs
as400cmd.hac27788IBM AS/400 Command Summary
as400cmd.txt28178All IBM AS/400 Commands by The Might
aspen.txt16772A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
aspen1.txt16843A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
aspen2.txt11053A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
assolink.txt11949An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
at&arebl.txt2965Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
atlas.txt4938Hackers' Atlas, by Ragon/Wynvern/BOF
atm-92.txt20096ATMS: The Real File for ATM Theft in 1992 by The Raven
atm-more.txt20049A Whole Collection of the Risks of ATM Cards (1988)
atm.txt8167Hacking ATM's by Blue Thunder
atm1.txt2773The Disk Jockey Presents Scamming ATMs
atma.hac22036Quick OVerview of ATM Security (Needs Editing)
atmapps.txt1771"Gee Whiz" ATM Applications are On the Horizon
atmfile21290ATM secret codes, from Fred Gindburg (July 10, 1987)
atmhacking.txt5742Hacking ATMs, by Anonymous
atms14827An Overview of ATMs and Information on the Encoding System
atms.txt20384Track Layouts on ATM Cards
auditool.txt12681Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
austhack.hac7324Australian Dialups
austpac0.txt14674Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
austpac1.txt11953Additional AUSTPAC Character Terminal Manual
austpac2.txt20338AUSTPAC General Information and Codes
austpac3.txt15830The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
autohack.txt5504Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
autonet1.txt11411Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
autotelldoc.ana5439Fun with Automatic Tellers
autovon1.hac2230Introduction to the Automated Voice Network (Autovon) by Shadowrunner
autovon2.hac3387Introduction to the Automated Voice Network (Autovon) Part II
autovon3.hac1809Introduction to the Automated Voice Network (Autovon) Part III
autovoni.nst19395Overview of the Automatic Voice Network (Autovon)
avoidcap.txt2576Planning Ahead for Phone Phreaks/Hackers
babyna.mes203893The Moby Words Database (List of Words) (1989)
backdoor.txt19156How to Hold Onto UNIX Root Once You Have It
bankhack.txt12641The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
basic.net14775Basic Networking, by Sk8 the Skinhead
basic1.hac7491The Basics of Hacking I: DECs By the Knights of Shadow
basic3.hac4349The Basics of Hacking III: Data General By the Knights of Shadow
basicnet.hac14534Basic Networking (1989) by Sk8 The SkinHead
basics16646Rambug's Hacking Volume #1 by Rambug
bbsfiles.txt38272The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
bd-tv5.txt7439Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
bindery.txt4201Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)
boahack.txt6686Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
boces.txt6957The Slipped Disk takes over the BOCES Computer: A Log
bom-hh&p.txt9785The History of Hacking and Phreaking by Raven of BOMB Squad
books.txt41728Biblography of Computer Security Books (1973 through 1988)
brute.txt3462BRUTE: A brute force approach to hacking Unix passwords. Version 1.1
btinfo.h-k14037BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
c64fun1.txt2927Suggestions On What to Do with a Commodore 64, by Nightstalker
callcard.phk1734Hacking Calling Cards, by The Pyromaniac
candyland.faq4823The Candyman Explains How He Will Accept Explosives Files
carcodes.txt3358Codes Used by Computers in Cars
cb1.txt3407Citibank Hacking, by Johnny Hundu
cb2.txt2145Small Rant about Hacking Citibank
cbiinfo19013Using and Abusing CBI by The Ghost
cbrsp-1.hac6075The Cyberspace Chronicle Volume 1 by Phardak
cbvhack.pnk6694CBV Hacking by PiNK ToRPeDo (June 7, 1994)
cbvhack.txt5754CBV Hackin' by Pink Torpedo (June 7, 1994)
chahelp_.txt9164Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke
chaos01.txt1609The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
chaos02.txt2577The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
chaos03.txt4264The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
chilton1.txt7970Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)
china02doc.hac23257China Newsletter #02 (Hacking/Phreaking File Compilation)
church4.ptl9611Church Chat Volume 4 by The Spiker
cis.phk6583Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord
cisagain.txt6192Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord
cisinfo4.txt8104Compuserve Information by Morgoth and Lotus
ciss3.txt18816List of Access Numbers to the Compuserve Information Service
citibank.txt6226Hacking into Citibank with Johnny Hindu
citibank2.txt6430Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990)
cjack.faq4837Cracker Jack FAQ Written by kM (1993)
codphone3842Coda-Phones by D.T. Legna
com_sec90.hac54579United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact
com_sec91.hac15590United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
compserv.txt6337Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.
compus.txt3286Free Compuserve Passwords, by Devious Xevious
compuser.txt27008A Quick Compuserve Index
compusin.txt1386Some Compuserve Tips, by Eric Diamond
compusrv5599Compuserve Hacking by The Locksmith
concis.txt3488Free Compuserve Access
contact.txt5246How to Contact the HACK SQUAD
copier.hac10206Magnetic Stripes, by Count Zero
cops-rl23583RL C.O.P.S. File by Brian Oblivion
cosmos.hac10942C O S M O S, by Doctor Who
cosmos1.txt7458Hacking into COSMOS by Wizard of OZ
cosmos2.hac9608Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
cosmos3.hac8320The 1986 COSMOS Files Part III by Sir William
crackam1.txt63466Hacking Programs on the Amiga by FunToHack
crackdwn.txt26230Crackdown, from 2600 Magazine volume 7, number 1 SPRING
creditfr.txt8914The Adventures in Fraud Series Volume I, by Sneak Thief (1985)
credunin.con1314Numbers of Credit Unions and protection Agencies
cs.hac2815How to Get a Free Account on Compuserve
cs.txt2944How to Get a Free Compuserve Account
csl8_93.hac12359CSL Bulletin 1993
cuthesis.txt154635The Social Organization of the Computer Underground by Gordon R. Meyer
cyber.txt11505The Cyberpunk Movement by Pazuzu of DnA May 12, 1993
cyberhac.txt11078Hacking Control Data Corporation's Cyber, by The Ghost
data.tap3604Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS
data_gen1574Captain Crunch talks about hacking Data General Systems
database.txt3142CIRR Database: A tool for Corporate Research
datakit.hac14409How to connect across VCS/ISN boundaries
datanet.doc6670The Basics of TELENET
datapac.hac15579A Guide to DataPAC by The Fixer
datapac.inf12170Technical Guide to DataPac by the New Dark Council (1990)
datapac.txt14413A Guide to DataPAC by The Fixer (April 18, 1990)
datapac1.txt16626A Guide to DataPAC version 1.1 by The Fixer
datapac2.txt19480Datapac 3101 ITI Parameters Description
datapac3.txt2430Datapac 3101 Public Outdial Ports
datatap.txt4109Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop
datatapp.txt4088Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
ddn01.txt2993DDN Security Bulletin #1
ddn03.hac11207Defense Data Network Security Bulletin #3
ddn04.hac3143Defense Data Network Security Bulletin #4
ddn05.hac4295Defense Data Network Security Bulletin #5
ddn06.hac3015Defense Data Network Security Bulletin #6
ddnet1.txt8294DDN: Information on the Defense Data Network from Unauthorized Access UK
ddnet2.txt2421DDN: The Defense Data Network (A Map)
debtcard.txt3730Harvard Medical School Installs ISDN-Based Debit Card System
dec10.txt23846Hacking the DEC-10 System
dec_200.txt3239The Decserver 200 Revealed by Surf Studd (October 23, 1990)
defaults.txt6726Hacking into a Variety of Systems by using their Default Accounts
defcon.info26112
defconadd.hac11951
defdb.hac77311Department of Defense Federal Data Bases (List)
defense.hac10447Defense Data Network Blues by Harry Hackalot
defense.txt10198Defense Data Network Blues by Harry Hackalot (1984)
defnetbl.txt10501Defense Data Network Blues by Harry Hackalot (August 31, 1983)
demystif.txt3871Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin
denning.txt59865Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)
des.txt22528The Data Encruption Standard (DES) Fact Sheet
desblt.txt24448The Data Encryption Standard (DES) June 1990
desval.hac3149DES Validation List
desval.txt3905DES Validation List
dialback.txt10113Dial-Back Isn't Always Secure (February 28, 1985)
dialog.txt8142Inside Dialog by Control C of Advanced Telecommunications Inc.
dialog01.txt8543Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.
dialout1.txt67840A Novice Manual on Using Outdial Modems by Blue Adept
dialplus.txt4830A Screengrab of Informaiton on PSS DialPlus from British Telecom
dialup.hac18816List of Dialups. For what? I have no idea.
disclaim2875Da Disclaimer, by Filbert
diskopt6706My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
djns.txt2377Inside DJNS (Dow Jones News Service)
dlog-rdt44883Complete Guide To The DIALOG Information Network by Brian oblivion
dnicinf.hac13312D A T E X - P - International Traffic Relations
dowjones.txt2570Inside Dow Jones News Service
dpacbas.txt9468The Basics of DataPAC by Mister X (February 2, 1991)
dpacintr.rot37561Introduction to DataPac from the Right of Terror and Deicide
dpacnuas.txt92595The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)
dtsb.hac8894DEC Terminal Server Basics by Mad Hacker
easyl.hac3968Hacking Easy Link I by Professor Falken
easylink.hck2399Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc
easylink.txt4686Hacking Easy-Link I by Professor Falken
edit.txt17792Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems
ena!.hac7877The ENA Vision: What IS Ena?
encyclop.txt1502Someone Makes fun of That Stupid Article
eproms.hac5566A Closer Look at EEPROMS by The Kingpin
eslf0006.txt57267The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)
ess.txt7153Electronic Switching System by Black Knight, from 2600, Feb. 1984
ethics.hac3692Newsweek: Teaching Hackers Ethics
ethics.txt5148The Ethics of Hacking by Dissident
evasiv.txt7297The Inspector's Thoughts, by Assailant's Blade and Ford Prefect
exeguide.txt23552An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)
fast.txt5301Hacking McDonalds, by Herb the Hacker
fbiaftha.hac16896The FBI Fights Computer Crime
fbibust6199The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)
fbicompu.hac5225Summary of FBI Computer Systems, by Ralph Harvey
fbicompu.txt5246Summary of FBI Computer Systems By Ralph Harvey (1986)
fbisys.txt5281Summary of FBI Computer Systems, by Ralph Harvey
fcisacc.txt3550Getting Free Compuserve Access, by The Wanderjahr
fcscvol1.hac641496Federal Criteria for Information Technology Security Volume I
fcscvol2.hac566236Federal Criteria for Information Technology Security Volume II
fddi.hac2156How to FDDA Internals Work? Learning to Appreciate Tokens
fdp1.txt12668The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
fdp2.txt13449The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
feds3702Watching the Watcher Watching You, by Sir Knight of OSUNY BBS
fh.txt49876Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)
findhole.txt16372Security Holes Manifest Themsleves in Four Ways (November 10, 1993)
findho~1.txt16384The Four Ways Security Holes Manifest Themselves (November 10, 1993)
force1.txt27946Force Files Volume #1 (December 3, 1987)
force2.txt30310Force Files Volume #2 (April 17, 1987)
force3.txt29702Force Files Volume #3 (August 6, 1987)
force4.txt28651Force Files Volume #4 (August 1, 1987)
force5.txt32039Force Files Volume #5 (August 6, 1987)
force6.txt7027Force Files Volume #6 (August 6, 1987)
force7.txt31832Force Files Volume #7 (August 6, 1987)
force8.txt31694Force Files Volume #8 (August 6, 1987)
force9.txt11387Force Files Volume #9 (August 6, 1987)
freebie3.hac103246Compufreebies 3.1 (1992)
freecis.txt3278Free Compuserve Access
funwith5.hac5437Fun With Automatic Tellers
g.txt22969SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)
garaghak.txt48489Garage Door Opener Hacker Plans from Cybertek
gateways8598The Inter-Network Mail Guide - Copyright 1990 by John J. Chew
get-vip.txt11547DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files
getbust.txt4631Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415
getinfo.txt5978The Hacker's Guide to Investigations, by Ripper of HALE (1989)
gisdoc.hac5966Hacking the GIS computer by Doctor Crash
goodbye.ana1796The Best of the Station, by The Prowler
goodkids.hac4548Computer Hackers are Good People Too!
govthlp.txt4106The Help Screen on some Government System
gs1.txt16195Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)
gte.txt19883Hacking GTE Telemail by Master Micro
guide.txt42423A Novice's Guide to Hacking- 1989 edition by The Mentor
guidedoc.hac5437The RSTS User's Guide, by The Flash
guidehak.txt176913The Neophyte's Guide to hacking (1993 Edition) by Deicide
gunbelt3.txt8525Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)
hacethi.txt5949The Ethics of Hacking, by Dissident of TES
hacethic.txt6161The Ethics of Hacking by Dissident
hack.faq251055Beta .008 of the 2600/#hack FAQ
hack.hac4096Hacking And Computer Krashing #9, by Gray Wolf
hack.leg11978A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)
hack1.hac7960The Basics of Hacking, by the Knights of Shadow (Intro)
hack2.hac7450The Basics of Hacking, by The Knights of Shadow (DECs)
hack36629The Basics of Telenet Part I
hack47894Telenet Scanning
hack4.hac4421The Basics of Hacking, by The Knights of Shadow (Data General)
hack5.hac5761Hacking McDonalds, by Herb of Burger King
hack75417Hacking the Compuserve Information Service
hack7.txt4034The Conscience of a Hacker by The Mentor (January 8, 1986)
hack9.hac10950Hacking Control Data Corporation's Cyber
hack9301.rpt39068The Hack Report Volume 2, Number 1 (January 3, 1993)
hack9302.rpt59113The Hack Report Volume 2, Number 2 (February 7, 1993)
hack9303.rpt53202The Hack Report Volume 2, Number 3 (March 7, 1993)
hack9304.rpt66762The Hack Report Volume 2, Number 4 (April 4, 1993)
hack9305.rpt91783The Hack Report Volume 2, Number 5 (May 9, 1993)
hack9306.rpt101520The Hack Report Volume 2, Number 6 (June 6, 1993)
hack9307.rpt117584The Hack Report Volume 2, Number 7 (July 4, 1993)
hack9309.rpt137473The Hack Report Volume 2, Number 9 (September 12, 1993)
hack9401.rpt75374The Hack Report Volume 3, Issue 1 (January 29, 1994)
hack_cis.txt13288The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
hack_em.hac26119The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
hack_s.txt13935Harry Hackalot's Official Hacker Address Book for October 1984
hack_ths.txt148109The Social Organization of the Computer Underground (Thesis)
hackacr.hac59638The Hackers Acronym Chart, compiled by IIRG
hackad.txt5248The Famous Hacker's School (Analog Science Fiction Sept. 1990)
hackcos.txt27333Hacking COSMOS Part I by Lex Luthor and the Legion of Doom
hackcrak.txt29696The Hacker Crackdown, by 2600 Magazine
hackdct189766The Hacker's Jargon File, (November 14, 1982 Version)
hackdict.txt872346The Hacker's Dictionary, Older Version, Uncredited!
hacker3415The Consience of a Hacker by The Mentor (January 8, 1986)
hacker.tst21534The Hacker's Purity Test, June 16, 1989
hacker.txt5787SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
hacker01.txt152594The Social Organization of the Computer Underground: A Thesis
hacker03.txt4931The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
hacker1.txt19996Diary of a Hacker
hacker11.txt2403Hacking Western Union's Easylink
hacker2.txt11714The Diary of a Hacker Part II by the Cuisinart Blade
hackerdoc.txt10690SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
hackerla2181The Hackers' Laws
hackers.par2238Advertisement for the Galactic Hacker's Party (August 1989)
hackethic.txt5953The Ethics of Hacking by Dissident
hackfaq.10176079FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)
hackfaq.txt282121The Hack FAQ By Simple Nomad (January 31, 1999)
hackholl.txt4372Hacking In Holland by Rop Gonggrijp (October 18, 1988)
hackhp2.hac15991Hacking the HP 2000 by Bioc Agent 003
hacking1676Description of the New, Bad Definition of Hacking
hacking.dox38174Collections of Hacker FIles Downloaded by Consumertronics
hacking.tap5840Style Teaches You About How to Be a Proper Hacker
hacking.txt30670Hacking Tutorial, by The Jolly Roger
hacking101.hac3367HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
hackinga.txt5856Hacking Bank Of America's Home Banking System by Dark Creaper
hackingc.txt4524Hacking Credit Card Codes by Omni-Kid and The Wyvern
hackinge.txt2881Hacking ECONet Systems by Jack Death and Zapper
hackingi.txt759Computerworld Asks People to Hack In, 1984
hackingt.txt1311Hacking the Lexington Air Force Computer
hackl1.txt4699Hacker's Line #1 by 2TUFF
hacknet.dox9243The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC
hacknet.txt7950how to Hack Your School's Network, from Dr. Techno of Paradise Lost
hackpcp.hac8519The Weenie Warriors present Hacking PC Pursuit Codes
hackprod.txt3110How to Hack Prodigy by Desolated Dream
hackprof.txt2276Hacker Proof Doors! It IS Possible!
hackquiz.txt21324The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas
hackrsts.txt4221Hacking RSTS Systems: An Instructional Test
hacksong.txt5632The Hacker's Song by Dave Touretzky and Don Libes
hacksynd.hac7296The Hackers Syndrome, by Tad Deriso
hacktalk.txt10240A Short Hackerspeak Glossary, by the Hollywood User Group
hackterm.txt4314Collection of "Hackernyms" by Rad Man version 2.10
hacktest.txt8497The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)
hacktips.hac3392Hacking Tips #2, by Hoe Hopper
hacktips.txt5625Tips for Tracking Hackers
hacktut.txt21105Hacking Tutorial, by The Jolly Roger
hackunlm.hu1144657Hackers Unlimited Magazine Volume 1 Issue 1
hackusa!.hac7666Hackin' USA
hackwarn.hac5735A Warning to Hackers
hackwwiv.hac7679Hacking into WWIV, Second Edition by Vision
hackwwiv.txt12294Hacking into WWIV Software by Vision
haibm370.txt2420How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club
hakdec20.txt8786An Addendum to A Novice's Guide to Hacking, by The Mentor
hakdic.txt231108The Hacker's Dictionary, A Guide to the World of Computer Wizards
hakmedia.txt1771Hackers in the Media, List start: 10/28/92 - Doomsday
handbook.txt20162Hacking Compuserve: All You Need to Know, by Mr. Perfect
haq1.txt37136The HAQ Edition 2.07 (June 11, 1994)
hashish.txt6146Hashish: The Exotic Elixir, by EZ Rider
hate.info1152Invitation to HATE: Hackers at The End (Summer 1995)
havok1.txt64006HAVOK Pack #1: The Return (Collection of Hacking Textfiles)
hckr_hnd.txt138752The Hacker's Handbook by Hugo Cornwall (1985)
hckrslg12665The Hacker's League, by Lee Felsenstein (March 18, 1992)
hd.hac5732Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme
hd01.hac16446Hackers Directory Volume #1 by Ninja Squirrel and Logan5
hd02.hac13873Hackers Directory Volume #2 by Ninja Squirrel and Logan5
hd03.hac16634Hackers Directory Volume #3 by Ninja Squirrel and Logan5
hd04.hac11329Hackers Directory Volume #4 by Ninja Squirrel and Logan5
hdigest.txt14413The Hacker's Digent by Harry Hackalot (October 1984)
hdindex.txt4686Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)
hedrick.txt89278An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)
hfnewbies.txt17307The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)
hhacking.iix5504CAT-HACK Volume 1 from The Mystery
hint.txt25439The Czar's Guide to the Young Criminal Accused of Using Computers
his-hp.txt9320The History of Hacking and Phreaking by Raven of BOM SQUAD
hk_acces43859Draft Chapter of the NIST Computer Security Handbook, from Ed Roback
hk_crypt34588Draft Chapter from the NIST Computer Security Handbook, on Cryptography
hk_i&a36722Draft of the NIST Computer Security Handbook on Identification and Authentification
hk_polic28492Draft of the NIST Computer Security Handbook on Computer and Information Security Policty
hoho93.ad13472
hoho93cz.hac13356
hohocon.9314237
holelist.txt16654How Security Holes Manifest Themselves
holes.txt78322A List of Holes in Various Operating Systems (April 7, 1993)
homebank.hac6056Hacking Bank Of America's Home Banking System by "Dark Creaper"
homebank.txt5863Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM
horror_s.tor48939Hacking Horror Stories 1982
hp20001.hac12800HP 2000 Part 1: Commands by Blitzoid and Galactus
hp20002.hac15744HP 2000 Part 2: Statements by Blitzoid and Galactus
hp20003.hac9344HP 2000 Part 3: Functions by Blitzoid and Galactus
hp20004.hac5376HP 2000 Part 4: Files by Blitzoid and Galactus
hp20005.hac5120Hp 2000 Part 5: Matracies by Blitzoid and Galactus
hp30.txt116232The Completel Hewlett Packard 3000 Hackers Guide
hp3000.hac10319The Complete Hewlett Packard 3000 Hackers Guide
hp3000.txt111310The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS
hp3000_t.hac14354Hacking the HP 3000 by DE BUG
hp3000g.hac112566The Complete Hewlett Packard 3000 Hackers Guide
iah1.txt142976The International Hackers' Association Issue #1
ibm-vm70.txt3226A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited
ibm370.hac2688How to Take Control of your Local IBM 370 by Another Hacker
ibmhack.hac2686Hacking the I.B.M. By John Doe
icebook1.txt35623ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)
icebook2.txt54349ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus
icon4u.nrg1810ICoN Hacking with Loser Access by úäïäâGYú
id-biz.txt2850How to Have a Profitable ID Business, by Mr. Puff n' Stuff
identity.txt7309How to Create a New Identity by the Walking Glitch
ihg.txt11913International Directory of Hacking and Phreaking Organizations, by John Simmons
iirgacr6.txt62629The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)
iirgacr7.txt67165The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)
iirgacr8.txt79728The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
iiu-001.txt6073Bust Avoidance for Dipshits by Derision of IIU (1990)
iiu-004.txt9041Hacking on the Compuserve Information Service by Darkness (1990)
illinet.txt20430Dial-Up Access Numbers for ILLINET Online
info.txt7072How to Get Detailed Information on Anybody by DTS
info3.gph4352How to Get Anything on Anybody Part III
infoam.txt51393Exploring Information-America by Omega and White Knight
informer.hac17320TRI : The Remote Informer, Volume 1, Issue #6
innerc.txt15295Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth
innercir.hac9856Hacking Techniques, Typed in by Logan5 from The Inner Circle
intercep.hac10746The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
intercpt.txt23219Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods
intruder.dox8534SOFTDOCS: Intruder v1.21 by CreaSoft
inttel.hac1728European Computers List #1 by Kerrang Khan
issm201.hac32229The Information Systems Security Monitor Volume 2 Number 1
issm202.hac52667The Information Systems Security Monitor Volume 2 Number 2
issm204.hac28850The Information Systems Security Monitor Volume 2 Number 4
issm301.hac24356The Information Systems Security Monitor Volume 3 Number 1
issm302.hac23394The Information Systems Security Monitor Volume 3 Number 2
issm303.hac22981The Information Systems Security Monitor Volume 3 Number 3
issm304.hac30656The Information Systems Security Monitor Volume 3 Number 4
jack14.txt9855Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)
janet.txt4618JANET PAD Listing Revision 1.2 (March 1st, 1990)
jargon211.hac1147413The Jargon File, v.2.9.11, by Eric S. Raymond
javabugs.txt5767JavaScript Problems I've Discovered
keylock.sch6772Schematic For an Optoelectronic key Lock by Joe Scharf
keytrap3.txt2787SOFTDOCS: Keytrap v3.0 by Dcypher
kfyi-593.hac91136KFYI AM Radio 910 interviews Mind Rape and Merc
kill.feds5376FEDS: How to Find and Eliminate Them (September 10, 1987)
l0pht.txt2807The L0pht... What I saw, by Tfish of RDT
lan.txt8247Local Area Networks (LANs) by ANSI-Christ
lca-1.txt4422LCA #1: Zen and the Art of Untraceable Hacking, by Flood
lca-2.txt3918LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance
lca-3.txt3269LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance
lca-4.txt3725LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance
lca-5.txt5082LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance
lca-6.txt4032LCA #6: Beige Boxing, by the Lemon Curry Alliance
ldd.txt12237How to Hack into CIS
license.asc58618The Guerilla Guide to Licensing Software
list22936Pacific Bell Computer Systems, by Another Hacker
litewave.sch7819AM Lightwave Transmitter and Reciever by Joe Scharf
lnoise.hac6020Modem Noise Destroyer (Alpha Version)
lodhbasi.hac42609The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
logoncbi.hac3235How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)
logoncbi.txt2949How to Log into a C.B.I System by L.E. Pirate
longpass.txt14916Generating Longer Passwords
machack0.5.txt13640The Mac Hack FAQ by AX1P (November 22, 1994)
mag_stripes.txt25011Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)
magnet.0124432Magnetic Stripes on Cards: An Overview
magnet.0246174Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)
mailbox.hac3368Mailbox Systems: Your Link to the Underworld
main.fra6763Main Frames by the Pirate Club
mainfrms.con1492A List of Mainframe Dialup Numbers
master.txt4915Master Hack Version 1.0 by Master Frodo (January 1, 1991)
mci.txt2020MCI Mail Access Numbrs, from The Swamp
mci__acc.txt2830List of MCI Access Numbers
mcimail.hac7772MCI Mail - The Adventure Continues, by Bioc Agent
mcisprin.t5278Hints on Hacking, byt the RAMBUG and Captain Blood
memory.lst32113The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)
mgtguide.txt24448The NIST Management Guide to the Protection of Information Resources
mickeyd.txt5145Hacking McDonalds by Herb the Hacker
micrrisk.hac63479Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)
milinet.15564Milnet Access Codes
milnet.txt36799How to Use the American Military Net
milnet1.hac7765Milnet, by Brigadier General Swipe
mish18.txt20480The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)
mism1.hac11776How to Get Anything on Anyone Excerpts
mism10.hac2944How to Get Anything on Anyone Excerpts
mism20.hac3840Mastering the SCANTRON by Warhead
mism42.hac1024Xerox Voice Message Exchange Commands, from The Lineman
mob.txt8954The Hackers in the MOB
modbook1.txt3585The History of MOD: Book One: The Originals
modbook2.txt4182The History of MOD: Book Two: Creative Mindz
modbook3.txt4522The Book of MOD: Part Three: A Kick in the Groin
modbook4.txt2787The Book of MOD: Part Four: End of '90-'1991
modbook5.txt5199The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)
morality.hac2654Hacker Morality: A Lesson
morestuf.txt18930Collection of Hacking Files (Should Eventually be Split up)
morprime.hac10579RVEC Parameters and DMSTK Format
mrsts.hac5504So you've finally decided to down an RSTS System?
mtempist.hac10752The Tempest Method of Data Interception (Needs Editing)
narc3.hac8229Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)
ncsc-tg-003.txt86792A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
ncsc-tg-016.txt88895Guidelines for Writing Trusted Facility Manuals
ncsc-tr-005-2.txt90471Introduction to Trusted Computer System Evaluation Criteria
ncsc_oas.txt109919A Guideline on Office Automation Security (December 5, 1986)
netbios.txt13379Understanding NetBIOS by NeonSurge of Rhino9
netcrack.txt7335DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00
networks.phk55222600: How to Send Mail to other Networks
neuroman.pwd3225List of DataBases and passwords for the game "Neuromancer"
newid.hac6543New Identity Method
newsltr.idx3273Index to the Computer Underground Digest Archives (June 13, 1991)
nextbugs.txt7878CERT Advisory on the NeXT computer's Software
nfs_trace.txt35713NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton
nha-app.txt4706Application to Join Network Hackers Alliance (June 1, 1991)
nimbus.txt8498Research Machines Nimbus hacking, by The Green Rhino
note9309.txt1984The Hack Report, by Lee Jackson (September 1993)
nov-faq.txt119598The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad
novell.hac10516Collection of security holes in Novell Netware
novell.txt7144SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)
novhack.txt9096Having Phun With Novell by Lord Foul/Decay (July 13, 1991)
nwhack.faq73974Frequently Asked Questions about Hacking Novell Netware by Simple Nomad
obscene.###1838TAG FILE: Obscene Phobia BBS (January 1, 1995)
ocfber.11394Bylaws of the Open Computing Facility at UC Berkeley
ocfber.214491Constitution for the Open Computing Facility at UC Berkeley
omron.pin1648How to Connect OMRON 3S4YR-HSR4 to your PC
orange328324Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
orange.txt319321The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)
orgs.hac8464A Large List of Computer Security Organizations
orgs.txt83201988 List of Computer Security Organizations
outdial.lst12887Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)
outdial.txt10261How to Use Outdials: An Introduction by Lorax
outdials.us3553Ameican Local Outdials by Sebastian Winchler (March 1991)
outdialsnfo.hac2652List of Dialouts
pacbell.lst3096Collection of Pacific Bell Computer Systems
packet.txt5760Notes on Using Tymenet and Telenet by Michael A. Banks (1989)
pacnet.hac5300Hacking into the PACnet System
pactimea.txt2811Telephone Numbers for the Pacific Bell Computer System by Another Hacker
passhack.txt7070The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press
password.txt22477Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)
pcp88.lst5450PC Pursuit List Version 1.1 (August 31, 1988)
pcpbas.txt3972How to Use PC Pursuit Service
pcphack.phk9552Hacking PC Pursuit Codes by The Weenie Warriors
pcphack.txt9537The Weenie Warriors Present Hacking PC Pursuit Codes
pcpold.phk7814How to Use Telenet's PC Pursuit Service by Z-Man
pcpursue.txt238362PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
pcpursui.yes15104PC Pursuit and Telenet Local Access Numbers
pdnaxis.txt16421The Public Data Network Numbers
pdp11.hac1920Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
pentagon.txt7534The Milnet File by Brigadier General Swipe/Dispater
ph.txt30181Soft Documentation: P-Hack 1.0 by Peter King
phonecom.nfo3304Becoming More Informed (Becoming a Hacker)
popper.txt2875ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)
prime.hac21725A List of PRIME Commands
primecpl.hac12018An Introduction to PRIMOS CPL Directives by Necrovore
primer.txt102646Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)
primes.txt12879Message Base With Discussion of the Watch utlity on PRIME (August, 1988)
primos.hac3968Hacking Primos Systems By Nanuk of the North
primos1.txt26221Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos2.txt39011Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos3.txt41578Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos4.txt25184Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos5.txt34196Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
psnintro.txt34582The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)
psns.txt3366An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker
pumpcon.txt10358
pw-hack.txt5432The Art of Password Hacking by HIT
qsd.txt4676How to Access Minitel or How to Have FUN on QSD
racintro1794Information on RAC: A Host System Used for Access to GEnie and AppleLink
raclog128632An Example of an RAC Login
raclog227736An Example of an RAC Login, Part II
ram14045Hacking Rampart Systems Part 1
ram24058Hacking Rampart Systems Part 1 (cont)
ram54022Hacking Rampart Systems Part 2
ram6861Hacking Rampart Systems Part 2 (cont)
ramcomm.hac185184Hacking RAM Communications (Pager)
rampart1.hac8448Hacking Rampart Systems by Whackoland
rampart2.hac4864Hacking Rampart Systems by Whackoland Part II
rcaglobe.txt3494The RCA Network Part I by the Telex Troopers
read.me3649A Story About the TSR That Catches Passwords, and a short History
readme.now6000SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker
readme.txt131Force Files Explanation
reid.txt49665The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)
revblt.hac13726Review of Federal Agency Computer Security and Privacy Plans
riacs5878Principles of Responsible Use of RIACS Computing Facilities
rimeman.hac52781RIME User's Guide
ripco.txt13184The Doctor Ripco Seizure by Full Disclosure (1991)
risks.txt6181Avoiding the Risks of Hacking: A List of Suggestions by IC
risktool.hac33991Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)
rom.txt3744Macintosh ROM Secrets by The Cloud (November 23, 1990)
rowdy_dl.man63720DocumentationL The Rowdy Dialer (April 1993)
rspwd.new23723Some Downloaded Password File
rsts.hac5376So You've Decided to Down a RSTS System, by Sam Sneed
rsx11.hac18944RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
rsx11m.txt18755RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital
ruhacker.txt1501Are You a Hacker? By ReDragon
sanatmdoc.hac6179Getting into an ATM
saruman.add829TAG: Saruman BBS Ad
satan~1.txt20843A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)
satcon.txt2841Satellite Control, by Ninja Squirrel & Logan-5
satelit3.txt17718Satellite Scrambling Systems: The Truth, by XL
satelite.txt3636Satellite Frequencies, by Sir Francis Drake
scanprg.txt5542What To Look For In A Code Hacking Program, by Dissident
school.txt9253Screwing with School Computers, by Liquid Bug
secrets2.hac7733Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
secrets3.hac4250Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
secretsdoc.hac233082Young's Demonstrative Translation of Scientific Secrets (1861)
securdev.txt8616Technical Hacking Volume 1 by the Warelock
security66923Overview of Computer Security by E.A. Bedwell, EDP Specialist
security.fy8259023Site Security Handbook, 1991
security.txt6184Professor Falken's Guide to CODE Hacking Security
sequence.txt22931Sequence Number Attacks, by Rik Farrow
sha.hac83219Swedish Hackers Association Annual Year Protocol #4
shadec.txt14173The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
shahewl.txt3723Swedish Hacking Association presents Hacking HP 3000 Part 1
shaprot3.txt91074The 3rd Protocol (1990) by The Swedish Hackers Association
shawn-file-check20977The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions
shw0293.asc8632Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn
shw0394.asc9472Syndicated Hack Watch (March 1994) by John McCormac
shw0494.asc12408Syndicated Hack Watch (April 1994)
shw0593.asc6667Red Hot Television is Banned
shw0893.asc12544The Start of the Skybox Cable War
shw0993.asc8955Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"
shw0994.bbs12097Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control
shw1093.asc10974Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press
skel_key.txt7361SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society
skey.txt11048Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn
skeyfl.txt11419Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries
skyhack.hac26525The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)
sniffer.txt19288FAQ: The Sniffer FAQ Version 1.7
snoop3075Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca
snoop.txt4065Data Snooping the Right Way by Lee Day
sourcetelnet.txt4828The Source Telnet Directory, and Uninet Directory
ss-info2.txt5120The Social Security Number, by Barbara Bennett
ssan.hac4738The Social Security Number
ssn-stuf.txt19840More about why Social Security Numbers are Insecure
ssnum.ana1791About Social Security Numbers
starlink.txt26902Information on Galaxy Starlink: A User's Guide
starmast.txt12657Hacking the Gandalf Starmaster by Deicide (May 22, 1993)
statemind.txt5863So, You Wanna Be a Hacker? It's a State of Mind!
stoll.doc58801Writings of Clifford Stoll
storehac4515Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)
stupidki.hac4942Those Stupid Little Bastard Hackers!
sun413.txt31595How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)
sundevil.txt3252Operation Sundevil, by the Prodigy
superd.txt5112DocumentationL Superdial 1.03 by Evan Anderson
sys75.hac9410The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
ta&m.txt20778Texas A&M Network Security Package Overview 7/1/1993
tachelp6285Captures of Information on TACACS by The Argonaut
tan.txt37769List of Telenet Access Numbers by Daredevil of P/HUN
tcp-ip.txt35765FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)
tcsb.0329427Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)
tcsb.0411790An Introduction to PRIMOS CPL Directives by Necrovore
tcsb.0530972Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)
tcsb.0627636Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)
tcsb.084370Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)
tcsb.118938Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)
tcsb.123370Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988
techhack.hac8368A Guide to ADS System, by Lord Digital and the Phantom
techiq.txt9737Hacking Techniques, by Logan-5 (Hacker Supreme)
technicl.txt9809Technical Hacking: Volume One by the Warelock
tele3.txt8229Telenet Scanning by Doc Telecom (July 11, 1988)
tele4.txt2936An Overview of Telenet by Man Max
tele5.hac6492Hacking Telnet by The Flash
telecode.txt24857Telenet Codes, Hacked Out by ZORON (May 1, 1988)
telecomm.txt2271An Introductory Guide to Telenet Commands
teleinfo.txt6496Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)
telenet.hac10465Telenet: The Secret Exposed
telenet.txt2732An Introductory Guide to Telenet Commands
telenet2.txt24259A Good amount of general Telenet Information
teleneth.txt2203An Introductory Guide to Telenet Commands
teleneti6192Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)
teleneti.phk2720Instructions for using TELENET.
telescan.txt7940Information on Telenet Scanning
tellerma.txt1982Cracking Auto Bank Teller Machines by the Suspect
teln2.txt2703Telenet Terminal Identifiers
teln3.txt32422Welcome to the TCO Access Listing (September 15, 1987)
telnetsn.txt8803Telenet Scanning by Doc Telecom (July 11, 1988)
telnumbe.txt31564Telenet Access Numbers, by the Weenie Warriors
teltermz.txt13604List of Terminal Identifiers
tempest.hac5122Excerpt of article on Tempest
thc.nfo11145NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)
thc2.nfo21205The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)
thehaq.txt109515The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)
thuglan1.txt16453Introduction to Hacking into LANs by THUG
thuglan2.txt10483General Information on LANs by THUG (July 31, 1991)
tihack2.txt31999Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)
timenet.txt5434Hacking Tymnet by Byte Brain
tl-user.txt37318ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas
tl.q-a6240ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual
tmplefun.txt3451Fun with Temple's Computers (A How To)
tnet1.txt21888Tymnet File #1 by The Twilight Phone
tnet2.txt16896Tymnet File #2 by The Twilight Phone
tnet3.txt14592Tymnet File #3 by The Twilight Phone
tnpcpod.txt26685TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom
tops20.txt7075Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!
transdir.txt14377The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
trash.txt5888Dumpster Diving: An overview of the legality, by Full Disclosure
trashing.rot18277The Art of Trashing by Deicide
traxtool.txt13541The Trax Toolbox Volume #001 by Track
triad187.hac19927The Triad: A 3-in-1 Textfile Magazine, Issue #1
trojan9131Rumors of Worms and Trojan Horses by Mike Guffey
tsrcrack.txt2822SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)
ttyspoof.txt7786TTY Spoofing, by SubEthan
tym_ods.txt20850TymNet OutDials Sorted By Area Code
tyme2.txt8055International Packet Switching Services Description
tymenet.hac20577Tymenet Technical and User Information
tymnet.ods1777Listing of Tymnet ODS Systems
tymnet.txt205145Packet Networks I and other Tymnet Information by Digital Demon, 1990
tymnet96.txt17283BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)
ueber.txt8770A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)
uk.dialups28896A List of Modem Dialups in the UK (September 22, 1990)
ukguide.hac13693The Guide to Online Databases for UK Users
ulimate.txt61683The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)
ultrad3.txt10880The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy
unineta.phk7049Uninet Information, from The South Pole
unp.txt30663SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)
up.txt1593SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)
usrguide.txt16128The NIST Computer User's Guide to the Protection of Information Resources
vanish.txt3901The Hacker Who Vanished: Suicide or Clever Hoax?
vax-7.txt2248
vendors.hac55184Large Security Vendors List
verstell.ana3221Neat Fun with Versatellers
virus11269Attack of the Computer Virus, by Lee Dembart
vmbhack.txt4662Hacking Voice Mail Boxes by Tik Tak
vmsptuto.txt12717The IBM VMSSP System, by The Motorhead
vthack1.txt9844The VT Hacker, by the Man Hermit
vthack2.txt9378The VT Hacker #2, by the Mad Hermit
vthack3.txt29178The VT Hacker #3, by The Mad Hermit
vtp.txt17664A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)
wal-mart.txt4175Hacking the Wal-Mart Armorguard Computer Protection System
wanghack.hac5302Hacking the Wang OS, by Dark Knight
wargames5912The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)
wargames.hum8715Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock
watching3552Watching the Watcher Watching You by Sir Knight
wats.txt9978WATS Version 1.0 by Professor Falken & The Aptolcater
whca_txtmsg.log178486The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!
xerox.hac2321Hacking Xerox
xmux.txt12318The ROT Guide to Gandalf XMUX's by Deicide
zen.hac52401Dan Farmer's Improving the Security of Your Site by Breaking Into It
zippass.txt5637The Security of PKZIP Encryption

Aucun commentaire:

Enregistrer un commentaire