| Filename | Size | Description of the Textfile | 
| BIBLIOGRAPHIES | Lists of Articles and Books about Hackers and Hacking | |
| CABLE | Textfiles about Cable TV and Cable TV Piracy | |
| COLORBOOKS | Purported Department of Defense Computer Security Guidelines | |
| CONVENTIONS | Information about different Hacking Conventions | |
| INTERNET | Files Dealing With Hacking on the Internet | |
| MICROSOFT | Files Dealing with Hacking Windows and DOS | |
| POLICIES | Various Ethics and Policies of Computing Facilities Nationwide | |
| UNIX | Textfiles About Exploring or Exploiting UNIX | |
| VMS | Textfiles About Exploring or Exploiting VMS and VAXes | |
| 22.txt | 4999 | DDN Management Bulletin 22: Domain Names Transition (March 16, 1984) | 
| 23things.txt | 2342 | |
| 2600-9-3.txt | 144176 | 2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous) | 
| 2600_ind | 96106 | 2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price | 
| 2600faq.011 | 169226 | Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995) | 
| 386i.txt | 1920 | CIAC Advisory Notice: Authentication bypass in Sun 386i machines | 
| 5600.txt | 84069 | Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990) | 
| aahack.txt | 3112 | Anarchy Anonymous: Hacking your School Network | 
| accesblt.hac | 20551 | Advanced Authentication Technology, 1991 | 
| accessin.txt | 14070 | A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987) | 
| acro01.txt | 4538 | Max Headroom's Hacker Acronym List | 
| acro02.txt | 5532 | Max Headroom's Second Collection of Acronyms | 
| acrolist.phk | 8181 | Acronym List, Early 1990s | 
| acroynym.txt | 30296 | The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990) | 
| adssys.txt | 10048 | A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom | 
| aio.box | 2485 | All in One Box, by Disk Doctor | 
| aio5b.txt | 6588 | AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder) | 
| ais.txt | 15248 | AIS: The Automatic Intercept System by Computer Consoles Incorporated | 
| aix.fun | 778 | Warning to download some AIX Patches | 
| allnet01.txt | 3939 | Hacking Allnet by Shadow Warrior (January 1988) | 
| amhack.txt | 12374 | Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS | 
| ansibomb.txt | 10496 | ANSI Bombs II: Tips and Techniques, by The Raging Golem | 
| aohell.phk | 1071 | Why I wrote AOLHell | 
| aoim.txt | 1725 | The Risks of Using an AOL Client Behind a Firewall | 
| aolhak.txt | 9252 | How to Hack America on Line by the Hooded Bobs | 
| as400cmd.hac | 27788 | IBM AS/400 Command Summary | 
| as400cmd.txt | 28178 | All IBM AS/400 Commands by The Might | 
| aspen.txt | 16772 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992) | 
| aspen1.txt | 16843 | A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992) | 
| aspen2.txt | 11053 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992) | 
| assolink.txt | 11949 | An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990) | 
| at&arebl.txt | 2965 | Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends | 
| atlas.txt | 4938 | Hackers' Atlas, by Ragon/Wynvern/BOF | 
| atm-92.txt | 20096 | ATMS: The Real File for ATM Theft in 1992 by The Raven | 
| atm-more.txt | 20049 | A Whole Collection of the Risks of ATM Cards (1988) | 
| atm.txt | 8167 | Hacking ATM's by Blue Thunder | 
| atm1.txt | 2773 | The Disk Jockey Presents Scamming ATMs | 
| atma.hac | 22036 | Quick OVerview of ATM Security (Needs Editing) | 
| atmapps.txt | 1771 | "Gee Whiz" ATM Applications are On the Horizon | 
| atmfile | 21290 | ATM secret codes, from Fred Gindburg (July 10, 1987) | 
| atmhacking.txt | 5742 | Hacking ATMs, by Anonymous | 
| atms | 14827 | An Overview of ATMs and Information on the Encoding System | 
| atms.txt | 20384 | Track Layouts on ATM Cards | 
| auditool.txt | 12681 | Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991) | 
| austhack.hac | 7324 | Australian Dialups | 
| austpac0.txt | 14674 | Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990 | 
| austpac1.txt | 11953 | Additional AUSTPAC Character Terminal Manual | 
| austpac2.txt | 20338 | AUSTPAC General Information and Codes | 
| austpac3.txt | 15830 | The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989) | 
| autohack.txt | 5504 | Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986) | 
| autonet1.txt | 11411 | Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5 | 
| autotelldoc.ana | 5439 | Fun with Automatic Tellers | 
| autovon1.hac | 2230 | Introduction to the Automated Voice Network (Autovon) by Shadowrunner | 
| autovon2.hac | 3387 | Introduction to the Automated Voice Network (Autovon) Part II | 
| autovon3.hac | 1809 | Introduction to the Automated Voice Network (Autovon) Part III | 
| autovoni.nst | 19395 | Overview of the Automatic Voice Network (Autovon) | 
| avoidcap.txt | 2576 | Planning Ahead for Phone Phreaks/Hackers | 
| babyna.mes | 203893 | The Moby Words Database (List of Words) (1989) | 
| backdoor.txt | 19156 | How to Hold Onto UNIX Root Once You Have It | 
| bankhack.txt | 12641 | The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers | 
| basic.net | 14775 | Basic Networking, by Sk8 the Skinhead | 
| basic1.hac | 7491 | The Basics of Hacking I: DECs By the Knights of Shadow | 
| basic3.hac | 4349 | The Basics of Hacking III: Data General By the Knights of Shadow | 
| basicnet.hac | 14534 | Basic Networking (1989) by Sk8 The SkinHead | 
| basics | 16646 | Rambug's Hacking Volume #1 by Rambug | 
| bbsfiles.txt | 38272 | The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening" | 
| bd-tv5.txt | 7439 | Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993 | 
| bindery.txt | 4201 | Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995) | 
| boahack.txt | 6686 | Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM | 
| boces.txt | 6957 | The Slipped Disk takes over the BOCES Computer: A Log | 
| bom-hh&p.txt | 9785 | The History of Hacking and Phreaking by Raven of BOMB Squad | 
| books.txt | 41728 | Biblography of Computer Security Books (1973 through 1988) | 
| brute.txt | 3462 | BRUTE: A brute force approach to hacking Unix passwords. Version 1.1 | 
| btinfo.h-k | 14037 | BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994) | 
| c64fun1.txt | 2927 | Suggestions On What to Do with a Commodore 64, by Nightstalker | 
| callcard.phk | 1734 | Hacking Calling Cards, by The Pyromaniac | 
| candyland.faq | 4823 | The Candyman Explains How He Will Accept Explosives Files | 
| carcodes.txt | 3358 | Codes Used by Computers in Cars | 
| cb1.txt | 3407 | Citibank Hacking, by Johnny Hundu | 
| cb2.txt | 2145 | Small Rant about Hacking Citibank | 
| cbiinfo | 19013 | Using and Abusing CBI by The Ghost | 
| cbrsp-1.hac | 6075 | The Cyberspace Chronicle Volume 1 by Phardak | 
| cbvhack.pnk | 6694 | CBV Hacking by PiNK ToRPeDo (June 7, 1994) | 
| cbvhack.txt | 5754 | CBV Hackin' by Pink Torpedo (June 7, 1994) | 
| chahelp_.txt | 9164 | Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke | 
| chaos01.txt | 1609 | The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990 | 
| chaos02.txt | 2577 | The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990 | 
| chaos03.txt | 4264 | The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel | 
| chilton1.txt | 7970 | Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986) | 
| china02doc.hac | 23257 | China Newsletter #02 (Hacking/Phreaking File Compilation) | 
| church4.ptl | 9611 | Church Chat Volume 4 by The Spiker | 
| cis.phk | 6583 | Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord | 
| cisagain.txt | 6192 | Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord | 
| cisinfo4.txt | 8104 | Compuserve Information by Morgoth and Lotus | 
| ciss3.txt | 18816 | List of Access Numbers to the Compuserve Information Service | 
| citibank.txt | 6226 | Hacking into Citibank with Johnny Hindu | 
| citibank2.txt | 6430 | Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990) | 
| cjack.faq | 4837 | Cracker Jack FAQ Written by kM (1993) | 
| codphone | 3842 | Coda-Phones by D.T. Legna | 
| com_sec90.hac | 54579 | United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact | 
| com_sec91.hac | 15590 | United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems | 
| compserv.txt | 6337 | Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq. | 
| compus.txt | 3286 | Free Compuserve Passwords, by Devious Xevious | 
| compuser.txt | 27008 | A Quick Compuserve Index | 
| compusin.txt | 1386 | Some Compuserve Tips, by Eric Diamond | 
| compusrv | 5599 | Compuserve Hacking by The Locksmith | 
| concis.txt | 3488 | Free Compuserve Access | 
| contact.txt | 5246 | How to Contact the HACK SQUAD | 
| copier.hac | 10206 | Magnetic Stripes, by Count Zero | 
| cops-rl | 23583 | RL C.O.P.S. File by Brian Oblivion | 
| cosmos.hac | 10942 | C O S M O S, by Doctor Who | 
| cosmos1.txt | 7458 | Hacking into COSMOS by Wizard of OZ | 
| cosmos2.hac | 9608 | Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom | 
| cosmos3.hac | 8320 | The 1986 COSMOS Files Part III by Sir William | 
| crackam1.txt | 63466 | Hacking Programs on the Amiga by FunToHack | 
| crackdwn.txt | 26230 | Crackdown, from 2600 Magazine volume 7, number 1 SPRING | 
| creditfr.txt | 8914 | The Adventures in Fraud Series Volume I, by Sneak Thief (1985) | 
| credunin.con | 1314 | Numbers of Credit Unions and protection Agencies | 
| cs.hac | 2815 | How to Get a Free Account on Compuserve | 
| cs.txt | 2944 | How to Get a Free Compuserve Account | 
| csl8_93.hac | 12359 | CSL Bulletin 1993 | 
| cuthesis.txt | 154635 | The Social Organization of the Computer Underground by Gordon R. Meyer | 
| cyber.txt | 11505 | The Cyberpunk Movement by Pazuzu of DnA May 12, 1993 | 
| cyberhac.txt | 11078 | Hacking Control Data Corporation's Cyber, by The Ghost | 
| data.tap | 3604 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS | 
| data_gen | 1574 | Captain Crunch talks about hacking Data General Systems | 
| database.txt | 3142 | CIRR Database: A tool for Corporate Research | 
| datakit.hac | 14409 | How to connect across VCS/ISN boundaries | 
| datanet.doc | 6670 | The Basics of TELENET | 
| datapac.hac | 15579 | A Guide to DataPAC by The Fixer | 
| datapac.inf | 12170 | Technical Guide to DataPac by the New Dark Council (1990) | 
| datapac.txt | 14413 | A Guide to DataPAC by The Fixer (April 18, 1990) | 
| datapac1.txt | 16626 | A Guide to DataPAC version 1.1 by The Fixer | 
| datapac2.txt | 19480 | Datapac 3101 ITI Parameters Description | 
| datapac3.txt | 2430 | Datapac 3101 Public Outdial Ports | 
| datatap.txt | 4109 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop | 
| datatapp.txt | 4088 | Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon | 
| ddn01.txt | 2993 | DDN Security Bulletin #1 | 
| ddn03.hac | 11207 | Defense Data Network Security Bulletin #3 | 
| ddn04.hac | 3143 | Defense Data Network Security Bulletin #4 | 
| ddn05.hac | 4295 | Defense Data Network Security Bulletin #5 | 
| ddn06.hac | 3015 | Defense Data Network Security Bulletin #6 | 
| ddnet1.txt | 8294 | DDN: Information on the Defense Data Network from Unauthorized Access UK | 
| ddnet2.txt | 2421 | DDN: The Defense Data Network (A Map) | 
| debtcard.txt | 3730 | Harvard Medical School Installs ISDN-Based Debit Card System | 
| dec10.txt | 23846 | Hacking the DEC-10 System | 
| dec_200.txt | 3239 | The Decserver 200 Revealed by Surf Studd (October 23, 1990) | 
| defaults.txt | 6726 | Hacking into a Variety of Systems by using their Default Accounts | 
| defcon.info | 26112 | |
| defconadd.hac | 11951 | |
| defdb.hac | 77311 | Department of Defense Federal Data Bases (List) | 
| defense.hac | 10447 | Defense Data Network Blues by Harry Hackalot | 
| defense.txt | 10198 | Defense Data Network Blues by Harry Hackalot (1984) | 
| defnetbl.txt | 10501 | Defense Data Network Blues by Harry Hackalot (August 31, 1983) | 
| demystif.txt | 3871 | Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin | 
| denning.txt | 59865 | Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990) | 
| des.txt | 22528 | The Data Encruption Standard (DES) Fact Sheet | 
| desblt.txt | 24448 | The Data Encryption Standard (DES) June 1990 | 
| desval.hac | 3149 | DES Validation List | 
| desval.txt | 3905 | DES Validation List | 
| dialback.txt | 10113 | Dial-Back Isn't Always Secure (February 28, 1985) | 
| dialog.txt | 8142 | Inside Dialog by Control C of Advanced Telecommunications Inc. | 
| dialog01.txt | 8543 | Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc. | 
| dialout1.txt | 67840 | A Novice Manual on Using Outdial Modems by Blue Adept | 
| dialplus.txt | 4830 | A Screengrab of Informaiton on PSS DialPlus from British Telecom | 
| dialup.hac | 18816 | List of Dialups. For what? I have no idea. | 
| disclaim | 2875 | Da Disclaimer, by Filbert | 
| diskopt | 6706 | My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85 | 
| djns.txt | 2377 | Inside DJNS (Dow Jones News Service) | 
| dlog-rdt | 44883 | Complete Guide To The DIALOG Information Network by Brian oblivion | 
| dnicinf.hac | 13312 | D A T E X - P - International Traffic Relations | 
| dowjones.txt | 2570 | Inside Dow Jones News Service | 
| dpacbas.txt | 9468 | The Basics of DataPAC by Mister X (February 2, 1991) | 
| dpacintr.rot | 37561 | Introduction to DataPac from the Right of Terror and Deicide | 
| dpacnuas.txt | 92595 | The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993) | 
| dtsb.hac | 8894 | DEC Terminal Server Basics by Mad Hacker | 
| easyl.hac | 3968 | Hacking Easy Link I by Professor Falken | 
| easylink.hck | 2399 | Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc | 
| easylink.txt | 4686 | Hacking Easy-Link I by Professor Falken | 
| edit.txt | 17792 | Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems | 
| ena!.hac | 7877 | The ENA Vision: What IS Ena? | 
| encyclop.txt | 1502 | Someone Makes fun of That Stupid Article | 
| eproms.hac | 5566 | A Closer Look at EEPROMS by The Kingpin | 
| eslf0006.txt | 57267 | The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine) | 
| ess.txt | 7153 | Electronic Switching System by Black Knight, from 2600, Feb. 1984 | 
| ethics.hac | 3692 | Newsweek: Teaching Hackers Ethics | 
| ethics.txt | 5148 | The Ethics of Hacking by Dissident | 
| evasiv.txt | 7297 | The Inspector's Thoughts, by Assailant's Blade and Ford Prefect | 
| exeguide.txt | 23552 | An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST) | 
| fast.txt | 5301 | Hacking McDonalds, by Herb the Hacker | 
| fbiaftha.hac | 16896 | The FBI Fights Computer Crime | 
| fbibust | 6199 | The FBI Raid of North County in Waltham Massachusetts (December 25, 1985) | 
| fbicompu.hac | 5225 | Summary of FBI Computer Systems, by Ralph Harvey | 
| fbicompu.txt | 5246 | Summary of FBI Computer Systems By Ralph Harvey (1986) | 
| fbisys.txt | 5281 | Summary of FBI Computer Systems, by Ralph Harvey | 
| fcisacc.txt | 3550 | Getting Free Compuserve Access, by The Wanderjahr | 
| fcscvol1.hac | 641496 | Federal Criteria for Information Technology Security Volume I | 
| fcscvol2.hac | 566236 | Federal Criteria for Information Technology Security Volume II | 
| fddi.hac | 2156 | How to FDDA Internals Work? Learning to Appreciate Tokens | 
| fdp1.txt | 12668 | The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta | 
| fdp2.txt | 13449 | The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta | 
| feds | 3702 | Watching the Watcher Watching You, by Sir Knight of OSUNY BBS | 
| fh.txt | 49876 | Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987) | 
| findhole.txt | 16372 | Security Holes Manifest Themsleves in Four Ways (November 10, 1993) | 
| findho~1.txt | 16384 | The Four Ways Security Holes Manifest Themselves (November 10, 1993) | 
| force1.txt | 27946 | Force Files Volume #1 (December 3, 1987) | 
| force2.txt | 30310 | Force Files Volume #2 (April 17, 1987) | 
| force3.txt | 29702 | Force Files Volume #3 (August 6, 1987) | 
| force4.txt | 28651 | Force Files Volume #4 (August 1, 1987) | 
| force5.txt | 32039 | Force Files Volume #5 (August 6, 1987) | 
| force6.txt | 7027 | Force Files Volume #6 (August 6, 1987) | 
| force7.txt | 31832 | Force Files Volume #7 (August 6, 1987) | 
| force8.txt | 31694 | Force Files Volume #8 (August 6, 1987) | 
| force9.txt | 11387 | Force Files Volume #9 (August 6, 1987) | 
| freebie3.hac | 103246 | Compufreebies 3.1 (1992) | 
| freecis.txt | 3278 | Free Compuserve Access | 
| funwith5.hac | 5437 | Fun With Automatic Tellers | 
| g.txt | 22969 | SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993) | 
| garaghak.txt | 48489 | Garage Door Opener Hacker Plans from Cybertek | 
| gateways | 8598 | The Inter-Network Mail Guide - Copyright 1990 by John J. Chew | 
| get-vip.txt | 11547 | DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files | 
| getbust.txt | 4631 | Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415 | 
| getinfo.txt | 5978 | The Hacker's Guide to Investigations, by Ripper of HALE (1989) | 
| gisdoc.hac | 5966 | Hacking the GIS computer by Doctor Crash | 
| goodbye.ana | 1796 | The Best of the Station, by The Prowler | 
| goodkids.hac | 4548 | Computer Hackers are Good People Too! | 
| govthlp.txt | 4106 | The Help Screen on some Government System | 
| gs1.txt | 16195 | Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990) | 
| gte.txt | 19883 | Hacking GTE Telemail by Master Micro | 
| guide.txt | 42423 | A Novice's Guide to Hacking- 1989 edition by The Mentor | 
| guidedoc.hac | 5437 | The RSTS User's Guide, by The Flash | 
| guidehak.txt | 176913 | The Neophyte's Guide to hacking (1993 Edition) by Deicide | 
| gunbelt3.txt | 8525 | Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987) | 
| hacethi.txt | 5949 | The Ethics of Hacking, by Dissident of TES | 
| hacethic.txt | 6161 | The Ethics of Hacking by Dissident | 
| hack.faq | 251055 | Beta .008 of the 2600/#hack FAQ | 
| hack.hac | 4096 | Hacking And Computer Krashing #9, by Gray Wolf | 
| hack.leg | 11978 | A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990) | 
| hack1.hac | 7960 | The Basics of Hacking, by the Knights of Shadow (Intro) | 
| hack2.hac | 7450 | The Basics of Hacking, by The Knights of Shadow (DECs) | 
| hack3 | 6629 | The Basics of Telenet Part I | 
| hack4 | 7894 | Telenet Scanning | 
| hack4.hac | 4421 | The Basics of Hacking, by The Knights of Shadow (Data General) | 
| hack5.hac | 5761 | Hacking McDonalds, by Herb of Burger King | 
| hack7 | 5417 | Hacking the Compuserve Information Service | 
| hack7.txt | 4034 | The Conscience of a Hacker by The Mentor (January 8, 1986) | 
| hack9.hac | 10950 | Hacking Control Data Corporation's Cyber | 
| hack9301.rpt | 39068 | The Hack Report Volume 2, Number 1 (January 3, 1993) | 
| hack9302.rpt | 59113 | The Hack Report Volume 2, Number 2 (February 7, 1993) | 
| hack9303.rpt | 53202 | The Hack Report Volume 2, Number 3 (March 7, 1993) | 
| hack9304.rpt | 66762 | The Hack Report Volume 2, Number 4 (April 4, 1993) | 
| hack9305.rpt | 91783 | The Hack Report Volume 2, Number 5 (May 9, 1993) | 
| hack9306.rpt | 101520 | The Hack Report Volume 2, Number 6 (June 6, 1993) | 
| hack9307.rpt | 117584 | The Hack Report Volume 2, Number 7 (July 4, 1993) | 
| hack9309.rpt | 137473 | The Hack Report Volume 2, Number 9 (September 12, 1993) | 
| hack9401.rpt | 75374 | The Hack Report Volume 3, Issue 1 (January 29, 1994) | 
| hack_cis.txt | 13288 | The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991 | 
| hack_em.hac | 26119 | The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr | 
| hack_s.txt | 13935 | Harry Hackalot's Official Hacker Address Book for October 1984 | 
| hack_ths.txt | 148109 | The Social Organization of the Computer Underground (Thesis) | 
| hackacr.hac | 59638 | The Hackers Acronym Chart, compiled by IIRG | 
| hackad.txt | 5248 | The Famous Hacker's School (Analog Science Fiction Sept. 1990) | 
| hackcos.txt | 27333 | Hacking COSMOS Part I by Lex Luthor and the Legion of Doom | 
| hackcrak.txt | 29696 | The Hacker Crackdown, by 2600 Magazine | 
| hackdct1 | 89766 | The Hacker's Jargon File, (November 14, 1982 Version) | 
| hackdict.txt | 872346 | The Hacker's Dictionary, Older Version, Uncredited! | 
| hacker | 3415 | The Consience of a Hacker by The Mentor (January 8, 1986) | 
| hacker.tst | 21534 | The Hacker's Purity Test, June 16, 1989 | 
| hacker.txt | 5787 | SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994) | 
| hacker01.txt | 152594 | The Social Organization of the Computer Underground: A Thesis | 
| hacker03.txt | 4931 | The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers | 
| hacker1.txt | 19996 | Diary of a Hacker | 
| hacker11.txt | 2403 | Hacking Western Union's Easylink | 
| hacker2.txt | 11714 | The Diary of a Hacker Part II by the Cuisinart Blade | 
| hackerdoc.txt | 10690 | SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994) | 
| hackerla | 2181 | The Hackers' Laws | 
| hackers.par | 2238 | Advertisement for the Galactic Hacker's Party (August 1989) | 
| hackethic.txt | 5953 | The Ethics of Hacking by Dissident | 
| hackfaq.10 | 176079 | FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994) | 
| hackfaq.txt | 282121 | The Hack FAQ By Simple Nomad (January 31, 1999) | 
| hackholl.txt | 4372 | Hacking In Holland by Rop Gonggrijp (October 18, 1988) | 
| hackhp2.hac | 15991 | Hacking the HP 2000 by Bioc Agent 003 | 
| hacking | 1676 | Description of the New, Bad Definition of Hacking | 
| hacking.dox | 38174 | Collections of Hacker FIles Downloaded by Consumertronics | 
| hacking.tap | 5840 | Style Teaches You About How to Be a Proper Hacker | 
| hacking.txt | 30670 | Hacking Tutorial, by The Jolly Roger | 
| hacking101.hac | 3367 | HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life | 
| hackinga.txt | 5856 | Hacking Bank Of America's Home Banking System by Dark Creaper | 
| hackingc.txt | 4524 | Hacking Credit Card Codes by Omni-Kid and The Wyvern | 
| hackinge.txt | 2881 | Hacking ECONet Systems by Jack Death and Zapper | 
| hackingi.txt | 759 | Computerworld Asks People to Hack In, 1984 | 
| hackingt.txt | 1311 | Hacking the Lexington Air Force Computer | 
| hackl1.txt | 4699 | Hacker's Line #1 by 2TUFF | 
| hacknet.dox | 9243 | The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC | 
| hacknet.txt | 7950 | how to Hack Your School's Network, from Dr. Techno of Paradise Lost | 
| hackpcp.hac | 8519 | The Weenie Warriors present Hacking PC Pursuit Codes | 
| hackprod.txt | 3110 | How to Hack Prodigy by Desolated Dream | 
| hackprof.txt | 2276 | Hacker Proof Doors! It IS Possible! | 
| hackquiz.txt | 21324 | The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas | 
| hackrsts.txt | 4221 | Hacking RSTS Systems: An Instructional Test | 
| hacksong.txt | 5632 | The Hacker's Song by Dave Touretzky and Don Libes | 
| hacksynd.hac | 7296 | The Hackers Syndrome, by Tad Deriso | 
| hacktalk.txt | 10240 | A Short Hackerspeak Glossary, by the Hollywood User Group | 
| hackterm.txt | 4314 | Collection of "Hackernyms" by Rad Man version 2.10 | 
| hacktest.txt | 8497 | The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992) | 
| hacktips.hac | 3392 | Hacking Tips #2, by Hoe Hopper | 
| hacktips.txt | 5625 | Tips for Tracking Hackers | 
| hacktut.txt | 21105 | Hacking Tutorial, by The Jolly Roger | 
| hackunlm.hu1 | 144657 | Hackers Unlimited Magazine Volume 1 Issue 1 | 
| hackusa!.hac | 7666 | Hackin' USA | 
| hackwarn.hac | 5735 | A Warning to Hackers | 
| hackwwiv.hac | 7679 | Hacking into WWIV, Second Edition by Vision | 
| hackwwiv.txt | 12294 | Hacking into WWIV Software by Vision | 
| haibm370.txt | 2420 | How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club | 
| hakdec20.txt | 8786 | An Addendum to A Novice's Guide to Hacking, by The Mentor | 
| hakdic.txt | 231108 | The Hacker's Dictionary, A Guide to the World of Computer Wizards | 
| hakmedia.txt | 1771 | Hackers in the Media, List start: 10/28/92 - Doomsday | 
| handbook.txt | 20162 | Hacking Compuserve: All You Need to Know, by Mr. Perfect | 
| haq1.txt | 37136 | The HAQ Edition 2.07 (June 11, 1994) | 
| hashish.txt | 6146 | Hashish: The Exotic Elixir, by EZ Rider | 
| hate.info | 1152 | Invitation to HATE: Hackers at The End (Summer 1995) | 
| havok1.txt | 64006 | HAVOK Pack #1: The Return (Collection of Hacking Textfiles) | 
| hckr_hnd.txt | 138752 | The Hacker's Handbook by Hugo Cornwall (1985) | 
| hckrslg | 12665 | The Hacker's League, by Lee Felsenstein (March 18, 1992) | 
| hd.hac | 5732 | Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme | 
| hd01.hac | 16446 | Hackers Directory Volume #1 by Ninja Squirrel and Logan5 | 
| hd02.hac | 13873 | Hackers Directory Volume #2 by Ninja Squirrel and Logan5 | 
| hd03.hac | 16634 | Hackers Directory Volume #3 by Ninja Squirrel and Logan5 | 
| hd04.hac | 11329 | Hackers Directory Volume #4 by Ninja Squirrel and Logan5 | 
| hdigest.txt | 14413 | The Hacker's Digent by Harry Hackalot (October 1984) | 
| hdindex.txt | 4686 | Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986) | 
| hedrick.txt | 89278 | An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987) | 
| hfnewbies.txt | 17307 | The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993) | 
| hhacking.iix | 5504 | CAT-HACK Volume 1 from The Mystery | 
| hint.txt | 25439 | The Czar's Guide to the Young Criminal Accused of Using Computers | 
| his-hp.txt | 9320 | The History of Hacking and Phreaking by Raven of BOM SQUAD | 
| hk_acces | 43859 | Draft Chapter of the NIST Computer Security Handbook, from Ed Roback | 
| hk_crypt | 34588 | Draft Chapter from the NIST Computer Security Handbook, on Cryptography | 
| hk_i&a | 36722 | Draft of the NIST Computer Security Handbook on Identification and Authentification | 
| hk_polic | 28492 | Draft of the NIST Computer Security Handbook on Computer and Information Security Policty | 
| hoho93.ad | 13472 | |
| hoho93cz.hac | 13356 | |
| hohocon.93 | 14237 | |
| holelist.txt | 16654 | How Security Holes Manifest Themselves | 
| holes.txt | 78322 | A List of Holes in Various Operating Systems (April 7, 1993) | 
| homebank.hac | 6056 | Hacking Bank Of America's Home Banking System by "Dark Creaper" | 
| homebank.txt | 5863 | Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM | 
| horror_s.tor | 48939 | Hacking Horror Stories 1982 | 
| hp20001.hac | 12800 | HP 2000 Part 1: Commands by Blitzoid and Galactus | 
| hp20002.hac | 15744 | HP 2000 Part 2: Statements by Blitzoid and Galactus | 
| hp20003.hac | 9344 | HP 2000 Part 3: Functions by Blitzoid and Galactus | 
| hp20004.hac | 5376 | HP 2000 Part 4: Files by Blitzoid and Galactus | 
| hp20005.hac | 5120 | Hp 2000 Part 5: Matracies by Blitzoid and Galactus | 
| hp30.txt | 116232 | The Completel Hewlett Packard 3000 Hackers Guide | 
| hp3000.hac | 10319 | The Complete Hewlett Packard 3000 Hackers Guide | 
| hp3000.txt | 111310 | The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS | 
| hp3000_t.hac | 14354 | Hacking the HP 3000 by DE BUG | 
| hp3000g.hac | 112566 | The Complete Hewlett Packard 3000 Hackers Guide | 
| iah1.txt | 142976 | The International Hackers' Association Issue #1 | 
| ibm-vm70.txt | 3226 | A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited | 
| ibm370.hac | 2688 | How to Take Control of your Local IBM 370 by Another Hacker | 
| ibmhack.hac | 2686 | Hacking the I.B.M. By John Doe | 
| icebook1.txt | 35623 | ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992) | 
| icebook2.txt | 54349 | ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus | 
| icon4u.nrg | 1810 | ICoN Hacking with Loser Access by úäïäâGYú | 
| id-biz.txt | 2850 | How to Have a Profitable ID Business, by Mr. Puff n' Stuff | 
| identity.txt | 7309 | How to Create a New Identity by the Walking Glitch | 
| ihg.txt | 11913 | International Directory of Hacking and Phreaking Organizations, by John Simmons | 
| iirgacr6.txt | 62629 | The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992) | 
| iirgacr7.txt | 67165 | The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993) | 
| iirgacr8.txt | 79728 | The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG) | 
| iiu-001.txt | 6073 | Bust Avoidance for Dipshits by Derision of IIU (1990) | 
| iiu-004.txt | 9041 | Hacking on the Compuserve Information Service by Darkness (1990) | 
| illinet.txt | 20430 | Dial-Up Access Numbers for ILLINET Online | 
| info.txt | 7072 | How to Get Detailed Information on Anybody by DTS | 
| info3.gph | 4352 | How to Get Anything on Anybody Part III | 
| infoam.txt | 51393 | Exploring Information-America by Omega and White Knight | 
| informer.hac | 17320 | TRI : The Remote Informer, Volume 1, Issue #6 | 
| innerc.txt | 15295 | Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth | 
| innercir.hac | 9856 | Hacking Techniques, Typed in by Logan5 from The Inner Circle | 
| intercep.hac | 10746 | The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing) | 
| intercpt.txt | 23219 | Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods | 
| intruder.dox | 8534 | SOFTDOCS: Intruder v1.21 by CreaSoft | 
| inttel.hac | 1728 | European Computers List #1 by Kerrang Khan | 
| issm201.hac | 32229 | The Information Systems Security Monitor Volume 2 Number 1 | 
| issm202.hac | 52667 | The Information Systems Security Monitor Volume 2 Number 2 | 
| issm204.hac | 28850 | The Information Systems Security Monitor Volume 2 Number 4 | 
| issm301.hac | 24356 | The Information Systems Security Monitor Volume 3 Number 1 | 
| issm302.hac | 23394 | The Information Systems Security Monitor Volume 3 Number 2 | 
| issm303.hac | 22981 | The Information Systems Security Monitor Volume 3 Number 3 | 
| issm304.hac | 30656 | The Information Systems Security Monitor Volume 3 Number 4 | 
| jack14.txt | 9855 | Documentation for Cracker Jack, THE Unix Password Cracker (June 1993) | 
| janet.txt | 4618 | JANET PAD Listing Revision 1.2 (March 1st, 1990) | 
| jargon211.hac | 1147413 | The Jargon File, v.2.9.11, by Eric S. Raymond | 
| javabugs.txt | 5767 | JavaScript Problems I've Discovered | 
| keylock.sch | 6772 | Schematic For an Optoelectronic key Lock by Joe Scharf | 
| keytrap3.txt | 2787 | SOFTDOCS: Keytrap v3.0 by Dcypher | 
| kfyi-593.hac | 91136 | KFYI AM Radio 910 interviews Mind Rape and Merc | 
| kill.feds | 5376 | FEDS: How to Find and Eliminate Them (September 10, 1987) | 
| l0pht.txt | 2807 | The L0pht... What I saw, by Tfish of RDT | 
| lan.txt | 8247 | Local Area Networks (LANs) by ANSI-Christ | 
| lca-1.txt | 4422 | LCA #1: Zen and the Art of Untraceable Hacking, by Flood | 
| lca-2.txt | 3918 | LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance | 
| lca-3.txt | 3269 | LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance | 
| lca-4.txt | 3725 | LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance | 
| lca-5.txt | 5082 | LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance | 
| lca-6.txt | 4032 | LCA #6: Beige Boxing, by the Lemon Curry Alliance | 
| ldd.txt | 12237 | How to Hack into CIS | 
| license.asc | 58618 | The Guerilla Guide to Licensing Software | 
| list2 | 2936 | Pacific Bell Computer Systems, by Another Hacker | 
| litewave.sch | 7819 | AM Lightwave Transmitter and Reciever by Joe Scharf | 
| lnoise.hac | 6020 | Modem Noise Destroyer (Alpha Version) | 
| lodhbasi.hac | 42609 | The LOD/H Present: A Novice's Guide to Hacking- 1989 edition | 
| logoncbi.hac | 3235 | How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation) | 
| logoncbi.txt | 2949 | How to Log into a C.B.I System by L.E. Pirate | 
| longpass.txt | 14916 | Generating Longer Passwords | 
| machack0.5.txt | 13640 | The Mac Hack FAQ by AX1P (November 22, 1994) | 
| mag_stripes.txt | 25011 | Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994) | 
| magnet.01 | 24432 | Magnetic Stripes on Cards: An Overview | 
| magnet.02 | 46174 | Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991) | 
| mailbox.hac | 3368 | Mailbox Systems: Your Link to the Underworld | 
| main.fra | 6763 | Main Frames by the Pirate Club | 
| mainfrms.con | 1492 | A List of Mainframe Dialup Numbers | 
| master.txt | 4915 | Master Hack Version 1.0 by Master Frodo (January 1, 1991) | 
| mci.txt | 2020 | MCI Mail Access Numbrs, from The Swamp | 
| mci__acc.txt | 2830 | List of MCI Access Numbers | 
| mcimail.hac | 7772 | MCI Mail - The Adventure Continues, by Bioc Agent | 
| mcisprin.t | 5278 | Hints on Hacking, byt the RAMBUG and Captain Blood | 
| memory.lst | 32113 | The Format of the BIOS Data Segment at Segment 40h (July 31, 1994) | 
| mgtguide.txt | 24448 | The NIST Management Guide to the Protection of Information Resources | 
| mickeyd.txt | 5145 | Hacking McDonalds by Herb the Hacker | 
| micrrisk.hac | 63479 | Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch) | 
| milinet.1 | 5564 | Milnet Access Codes | 
| milnet.txt | 36799 | How to Use the American Military Net | 
| milnet1.hac | 7765 | Milnet, by Brigadier General Swipe | 
| mish18.txt | 20480 | The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986) | 
| mism1.hac | 11776 | How to Get Anything on Anyone Excerpts | 
| mism10.hac | 2944 | How to Get Anything on Anyone Excerpts | 
| mism20.hac | 3840 | Mastering the SCANTRON by Warhead | 
| mism42.hac | 1024 | Xerox Voice Message Exchange Commands, from The Lineman | 
| mob.txt | 8954 | The Hackers in the MOB | 
| modbook1.txt | 3585 | The History of MOD: Book One: The Originals | 
| modbook2.txt | 4182 | The History of MOD: Book Two: Creative Mindz | 
| modbook3.txt | 4522 | The Book of MOD: Part Three: A Kick in the Groin | 
| modbook4.txt | 2787 | The Book of MOD: Part Four: End of '90-'1991 | 
| modbook5.txt | 5199 | The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991) | 
| morality.hac | 2654 | Hacker Morality: A Lesson | 
| morestuf.txt | 18930 | Collection of Hacking Files (Should Eventually be Split up) | 
| morprime.hac | 10579 | RVEC Parameters and DMSTK Format | 
| mrsts.hac | 5504 | So you've finally decided to down an RSTS System? | 
| mtempist.hac | 10752 | The Tempest Method of Data Interception (Needs Editing) | 
| narc3.hac | 8229 | Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989) | 
| ncsc-tg-003.txt | 86792 | A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987) | 
| ncsc-tg-016.txt | 88895 | Guidelines for Writing Trusted Facility Manuals | 
| ncsc-tr-005-2.txt | 90471 | Introduction to Trusted Computer System Evaluation Criteria | 
| ncsc_oas.txt | 109919 | A Guideline on Office Automation Security (December 5, 1986) | 
| netbios.txt | 13379 | Understanding NetBIOS by NeonSurge of Rhino9 | 
| netcrack.txt | 7335 | DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00 | 
| networks.phk | 5522 | 2600: How to Send Mail to other Networks | 
| neuroman.pwd | 3225 | List of DataBases and passwords for the game "Neuromancer" | 
| newid.hac | 6543 | New Identity Method | 
| newsltr.idx | 3273 | Index to the Computer Underground Digest Archives (June 13, 1991) | 
| nextbugs.txt | 7878 | CERT Advisory on the NeXT computer's Software | 
| nfs_trace.txt | 35713 | NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton | 
| nha-app.txt | 4706 | Application to Join Network Hackers Alliance (June 1, 1991) | 
| nimbus.txt | 8498 | Research Machines Nimbus hacking, by The Green Rhino | 
| note9309.txt | 1984 | The Hack Report, by Lee Jackson (September 1993) | 
| nov-faq.txt | 119598 | The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad | 
| novell.hac | 10516 | Collection of security holes in Novell Netware | 
| novell.txt | 7144 | SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991) | 
| novhack.txt | 9096 | Having Phun With Novell by Lord Foul/Decay (July 13, 1991) | 
| nwhack.faq | 73974 | Frequently Asked Questions about Hacking Novell Netware by Simple Nomad | 
| obscene.### | 1838 | TAG FILE: Obscene Phobia BBS (January 1, 1995) | 
| ocfber.1 | 1394 | Bylaws of the Open Computing Facility at UC Berkeley | 
| ocfber.2 | 14491 | Constitution for the Open Computing Facility at UC Berkeley | 
| omron.pin | 1648 | How to Connect OMRON 3S4YR-HSR4 to your PC | 
| orange | 328324 | Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983 | 
| orange.txt | 319321 | The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book) | 
| orgs.hac | 8464 | A Large List of Computer Security Organizations | 
| orgs.txt | 8320 | 1988 List of Computer Security Organizations | 
| outdial.lst | 12887 | Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991) | 
| outdial.txt | 10261 | How to Use Outdials: An Introduction by Lorax | 
| outdials.us | 3553 | Ameican Local Outdials by Sebastian Winchler (March 1991) | 
| outdialsnfo.hac | 2652 | List of Dialouts | 
| pacbell.lst | 3096 | Collection of Pacific Bell Computer Systems | 
| packet.txt | 5760 | Notes on Using Tymenet and Telenet by Michael A. Banks (1989) | 
| pacnet.hac | 5300 | Hacking into the PACnet System | 
| pactimea.txt | 2811 | Telephone Numbers for the Pacific Bell Computer System by Another Hacker | 
| passhack.txt | 7070 | The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press | 
| password.txt | 22477 | Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978) | 
| pcp88.lst | 5450 | PC Pursuit List Version 1.1 (August 31, 1988) | 
| pcpbas.txt | 3972 | How to Use PC Pursuit Service | 
| pcphack.phk | 9552 | Hacking PC Pursuit Codes by The Weenie Warriors | 
| pcphack.txt | 9537 | The Weenie Warriors Present Hacking PC Pursuit Codes | 
| pcpold.phk | 7814 | How to Use Telenet's PC Pursuit Service by Z-Man | 
| pcpursue.txt | 238362 | PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992 | 
| pcpursui.yes | 15104 | PC Pursuit and Telenet Local Access Numbers | 
| pdnaxis.txt | 16421 | The Public Data Network Numbers | 
| pdp11.hac | 1920 | Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal | 
| pentagon.txt | 7534 | The Milnet File by Brigadier General Swipe/Dispater | 
| ph.txt | 30181 | Soft Documentation: P-Hack 1.0 by Peter King | 
| phonecom.nfo | 3304 | Becoming More Informed (Becoming a Hacker) | 
| popper.txt | 2875 | ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994) | 
| prime.hac | 21725 | A List of PRIME Commands | 
| primecpl.hac | 12018 | An Introduction to PRIMOS CPL Directives by Necrovore | 
| primer.txt | 102646 | Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990) | 
| primes.txt | 12879 | Message Base With Discussion of the Watch utlity on PRIME (August, 1988) | 
| primos.hac | 3968 | Hacking Primos Systems By Nanuk of the North | 
| primos1.txt | 26221 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers | 
| primos2.txt | 39011 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers | 
| primos3.txt | 41578 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers | 
| primos4.txt | 25184 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers | 
| primos5.txt | 34196 | Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers | 
| psnintro.txt | 34582 | The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990) | 
| psns.txt | 3366 | An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker | 
| pumpcon.txt | 10358 | |
| pw-hack.txt | 5432 | The Art of Password Hacking by HIT | 
| qsd.txt | 4676 | How to Access Minitel or How to Have FUN on QSD | 
| racintro | 1794 | Information on RAC: A Host System Used for Access to GEnie and AppleLink | 
| raclog1 | 28632 | An Example of an RAC Login | 
| raclog2 | 27736 | An Example of an RAC Login, Part II | 
| ram1 | 4045 | Hacking Rampart Systems Part 1 | 
| ram2 | 4058 | Hacking Rampart Systems Part 1 (cont) | 
| ram5 | 4022 | Hacking Rampart Systems Part 2 | 
| ram6 | 861 | Hacking Rampart Systems Part 2 (cont) | 
| ramcomm.hac | 185184 | Hacking RAM Communications (Pager) | 
| rampart1.hac | 8448 | Hacking Rampart Systems by Whackoland | 
| rampart2.hac | 4864 | Hacking Rampart Systems by Whackoland Part II | 
| rcaglobe.txt | 3494 | The RCA Network Part I by the Telex Troopers | 
| read.me | 3649 | A Story About the TSR That Catches Passwords, and a short History | 
| readme.now | 6000 | SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker | 
| readme.txt | 131 | Force Files Explanation | 
| reid.txt | 49665 | The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986) | 
| revblt.hac | 13726 | Review of Federal Agency Computer Security and Privacy Plans | 
| riacs | 5878 | Principles of Responsible Use of RIACS Computing Facilities | 
| rimeman.hac | 52781 | RIME User's Guide | 
| ripco.txt | 13184 | The Doctor Ripco Seizure by Full Disclosure (1991) | 
| risks.txt | 6181 | Avoiding the Risks of Hacking: A List of Suggestions by IC | 
| risktool.hac | 33991 | Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST) | 
| rom.txt | 3744 | Macintosh ROM Secrets by The Cloud (November 23, 1990) | 
| rowdy_dl.man | 63720 | DocumentationL The Rowdy Dialer (April 1993) | 
| rspwd.new | 23723 | Some Downloaded Password File | 
| rsts.hac | 5376 | So You've Decided to Down a RSTS System, by Sam Sneed | 
| rsx11.hac | 18944 | RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital | 
| rsx11m.txt | 18755 | RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital | 
| ruhacker.txt | 1501 | Are You a Hacker? By ReDragon | 
| sanatmdoc.hac | 6179 | Getting into an ATM | 
| saruman.add | 829 | TAG: Saruman BBS Ad | 
| satan~1.txt | 20843 | A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995) | 
| satcon.txt | 2841 | Satellite Control, by Ninja Squirrel & Logan-5 | 
| satelit3.txt | 17718 | Satellite Scrambling Systems: The Truth, by XL | 
| satelite.txt | 3636 | Satellite Frequencies, by Sir Francis Drake | 
| scanprg.txt | 5542 | What To Look For In A Code Hacking Program, by Dissident | 
| school.txt | 9253 | Screwing with School Computers, by Liquid Bug | 
| secrets2.hac | 7733 | Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office | 
| secrets3.hac | 4250 | Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things | 
| secretsdoc.hac | 233082 | Young's Demonstrative Translation of Scientific Secrets (1861) | 
| securdev.txt | 8616 | Technical Hacking Volume 1 by the Warelock | 
| security | 66923 | Overview of Computer Security by E.A. Bedwell, EDP Specialist | 
| security.fy8 | 259023 | Site Security Handbook, 1991 | 
| security.txt | 6184 | Professor Falken's Guide to CODE Hacking Security | 
| sequence.txt | 22931 | Sequence Number Attacks, by Rik Farrow | 
| sha.hac | 83219 | Swedish Hackers Association Annual Year Protocol #4 | 
| shadec.txt | 14173 | The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association | 
| shahewl.txt | 3723 | Swedish Hacking Association presents Hacking HP 3000 Part 1 | 
| shaprot3.txt | 91074 | The 3rd Protocol (1990) by The Swedish Hackers Association | 
| shawn-file-check | 20977 | The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions | 
| shw0293.asc | 8632 | Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn | 
| shw0394.asc | 9472 | Syndicated Hack Watch (March 1994) by John McCormac | 
| shw0494.asc | 12408 | Syndicated Hack Watch (April 1994) | 
| shw0593.asc | 6667 | Red Hot Television is Banned | 
| shw0893.asc | 12544 | The Start of the Skybox Cable War | 
| shw0993.asc | 8955 | Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback" | 
| shw0994.bbs | 12097 | Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control | 
| shw1093.asc | 10974 | Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press | 
| skel_key.txt | 7361 | SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society | 
| skey.txt | 11048 | Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn | 
| skeyfl.txt | 11419 | Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries | 
| skyhack.hac | 26525 | The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991) | 
| sniffer.txt | 19288 | FAQ: The Sniffer FAQ Version 1.7 | 
| snoop | 3075 | Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca | 
| snoop.txt | 4065 | Data Snooping the Right Way by Lee Day | 
| sourcetelnet.txt | 4828 | The Source Telnet Directory, and Uninet Directory | 
| ss-info2.txt | 5120 | The Social Security Number, by Barbara Bennett | 
| ssan.hac | 4738 | The Social Security Number | 
| ssn-stuf.txt | 19840 | More about why Social Security Numbers are Insecure | 
| ssnum.ana | 1791 | About Social Security Numbers | 
| starlink.txt | 26902 | Information on Galaxy Starlink: A User's Guide | 
| starmast.txt | 12657 | Hacking the Gandalf Starmaster by Deicide (May 22, 1993) | 
| statemind.txt | 5863 | So, You Wanna Be a Hacker? It's a State of Mind! | 
| stoll.doc | 58801 | Writings of Clifford Stoll | 
| storehac | 4515 | Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991) | 
| stupidki.hac | 4942 | Those Stupid Little Bastard Hackers! | 
| sun413.txt | 31595 | How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994) | 
| sundevil.txt | 3252 | Operation Sundevil, by the Prodigy | 
| superd.txt | 5112 | DocumentationL Superdial 1.03 by Evan Anderson | 
| sys75.hac | 9410 | The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson | 
| ta&m.txt | 20778 | Texas A&M Network Security Package Overview 7/1/1993 | 
| tachelp | 6285 | Captures of Information on TACACS by The Argonaut | 
| tan.txt | 37769 | List of Telenet Access Numbers by Daredevil of P/HUN | 
| tcp-ip.txt | 35765 | FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996) | 
| tcsb.03 | 29427 | Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988) | 
| tcsb.04 | 11790 | An Introduction to PRIMOS CPL Directives by Necrovore | 
| tcsb.05 | 30972 | Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988) | 
| tcsb.06 | 27636 | Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988) | 
| tcsb.08 | 4370 | Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988) | 
| tcsb.11 | 8938 | Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988) | 
| tcsb.12 | 3370 | Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988 | 
| techhack.hac | 8368 | A Guide to ADS System, by Lord Digital and the Phantom | 
| techiq.txt | 9737 | Hacking Techniques, by Logan-5 (Hacker Supreme) | 
| technicl.txt | 9809 | Technical Hacking: Volume One by the Warelock | 
| tele3.txt | 8229 | Telenet Scanning by Doc Telecom (July 11, 1988) | 
| tele4.txt | 2936 | An Overview of Telenet by Man Max | 
| tele5.hac | 6492 | Hacking Telnet by The Flash | 
| telecode.txt | 24857 | Telenet Codes, Hacked Out by ZORON (May 1, 1988) | 
| telecomm.txt | 2271 | An Introductory Guide to Telenet Commands | 
| teleinfo.txt | 6496 | Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987) | 
| telenet.hac | 10465 | Telenet: The Secret Exposed | 
| telenet.txt | 2732 | An Introductory Guide to Telenet Commands | 
| telenet2.txt | 24259 | A Good amount of general Telenet Information | 
| teleneth.txt | 2203 | An Introductory Guide to Telenet Commands | 
| teleneti | 6192 | Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987) | 
| teleneti.phk | 2720 | Instructions for using TELENET. | 
| telescan.txt | 7940 | Information on Telenet Scanning | 
| tellerma.txt | 1982 | Cracking Auto Bank Teller Machines by the Suspect | 
| teln2.txt | 2703 | Telenet Terminal Identifiers | 
| teln3.txt | 32422 | Welcome to the TCO Access Listing (September 15, 1987) | 
| telnetsn.txt | 8803 | Telenet Scanning by Doc Telecom (July 11, 1988) | 
| telnumbe.txt | 31564 | Telenet Access Numbers, by the Weenie Warriors | 
| teltermz.txt | 13604 | List of Terminal Identifiers | 
| tempest.hac | 5122 | Excerpt of article on Tempest | 
| thc.nfo | 11145 | NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995) | 
| thc2.nfo | 21205 | The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996) | 
| thehaq.txt | 109515 | The HAQ (Hack-FAQ Version 2.07) (June 11, 1994) | 
| thuglan1.txt | 16453 | Introduction to Hacking into LANs by THUG | 
| thuglan2.txt | 10483 | General Information on LANs by THUG (July 31, 1991) | 
| tihack2.txt | 31999 | Hacking the TI-85 Calculator, by David Boozer (September 1, 1994) | 
| timenet.txt | 5434 | Hacking Tymnet by Byte Brain | 
| tl-user.txt | 37318 | ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas | 
| tl.q-a | 6240 | ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual | 
| tmplefun.txt | 3451 | Fun with Temple's Computers (A How To) | 
| tnet1.txt | 21888 | Tymnet File #1 by The Twilight Phone | 
| tnet2.txt | 16896 | Tymnet File #2 by The Twilight Phone | 
| tnet3.txt | 14592 | Tymnet File #3 by The Twilight Phone | 
| tnpcpod.txt | 26685 | TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom | 
| tops20.txt | 7075 | Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers! | 
| transdir.txt | 14377 | The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory | 
| trash.txt | 5888 | Dumpster Diving: An overview of the legality, by Full Disclosure | 
| trashing.rot | 18277 | The Art of Trashing by Deicide | 
| traxtool.txt | 13541 | The Trax Toolbox Volume #001 by Track | 
| triad187.hac | 19927 | The Triad: A 3-in-1 Textfile Magazine, Issue #1 | 
| trojan | 9131 | Rumors of Worms and Trojan Horses by Mike Guffey | 
| tsrcrack.txt | 2822 | SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993) | 
| ttyspoof.txt | 7786 | TTY Spoofing, by SubEthan | 
| tym_ods.txt | 20850 | TymNet OutDials Sorted By Area Code | 
| tyme2.txt | 8055 | International Packet Switching Services Description | 
| tymenet.hac | 20577 | Tymenet Technical and User Information | 
| tymnet.ods | 1777 | Listing of Tymnet ODS Systems | 
| tymnet.txt | 205145 | Packet Networks I and other Tymnet Information by Digital Demon, 1990 | 
| tymnet96.txt | 17283 | BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994) | 
| ueber.txt | 8770 | A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993) | 
| uk.dialups | 28896 | A List of Modem Dialups in the UK (September 22, 1990) | 
| ukguide.hac | 13693 | The Guide to Online Databases for UK Users | 
| ulimate.txt | 61683 | The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996) | 
| ultrad3.txt | 10880 | The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy | 
| unineta.phk | 7049 | Uninet Information, from The South Pole | 
| unp.txt | 30663 | SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994) | 
| up.txt | 1593 | SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993) | 
| usrguide.txt | 16128 | The NIST Computer User's Guide to the Protection of Information Resources | 
| vanish.txt | 3901 | The Hacker Who Vanished: Suicide or Clever Hoax? | 
| vax-7.txt | 2248 | |
| vendors.hac | 55184 | Large Security Vendors List | 
| verstell.ana | 3221 | Neat Fun with Versatellers | 
| virus | 11269 | Attack of the Computer Virus, by Lee Dembart | 
| vmbhack.txt | 4662 | Hacking Voice Mail Boxes by Tik Tak | 
| vmsptuto.txt | 12717 | The IBM VMSSP System, by The Motorhead | 
| vthack1.txt | 9844 | The VT Hacker, by the Man Hermit | 
| vthack2.txt | 9378 | The VT Hacker #2, by the Mad Hermit | 
| vthack3.txt | 29178 | The VT Hacker #3, by The Mad Hermit | 
| vtp.txt | 17664 | A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989) | 
| wal-mart.txt | 4175 | Hacking the Wal-Mart Armorguard Computer Protection System | 
| wanghack.hac | 5302 | Hacking the Wang OS, by Dark Knight | 
| wargames | 5912 | The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991) | 
| wargames.hum | 8715 | Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock | 
| watching | 3552 | Watching the Watcher Watching You by Sir Knight | 
| wats.txt | 9978 | WATS Version 1.0 by Professor Falken & The Aptolcater | 
| whca_txtmsg.log | 178486 | The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages! | 
| xerox.hac | 2321 | Hacking Xerox | 
| xmux.txt | 12318 | The ROT Guide to Gandalf XMUX's by Deicide | 
| zen.hac | 52401 | Dan Farmer's Improving the Security of Your Site by Breaking Into It | 
| zippass.txt | 5637 | The Security of PKZIP Encryption | 
samedi 3 décembre 2011
Grosse liste de document sur le hacking
Inscription à :
Publier les commentaires (Atom)
 
Aucun commentaire:
Enregistrer un commentaire