| ==Phrack Magazine== | |
| Volume Six, Issue Forty-Seven, File 8 of 22 | |
| 05. What are some gopher sites of interest to hackers? | |
| ba.com (Bell Atlantic) | |
| csrc.ncsl.nist.gov (NIST Security Gopher) | |
| gopher.acm.org (SIGSAC (Security, Audit & Control)) | |
| gopher.cpsr.org (Computer Professionals for Social Responsibility) | |
| gopher.cs.uwm.edu | |
| gopher.eff.org (Electonic Frontier Foundation) | |
| gw.PacBell.com (Pacific Bell) | |
| iitf.doc.gov (NITA -- IITF) | |
| oss.net (Open Source Solutions) | |
| spy.org (Computer Systems Consulting) | |
| wiretap.spies.com (Wiretap) | |
| 06. What are some World wide Web (WWW) sites of interest to hackers? | |
| http://alumni.caltech.edu/~dank/isdn/ (ISDN) | |
| http://aset.rsoc.rockwell.com (NASA/MOD AIS Security) | |
| http://aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec) | |
| http://att.net/dir800 (800 directory) | |
| http://ausg.dartmouth.edu/security.html (Security) | |
| http://cs.purdue.edu/coast/coast.html (Coast) | |
| http://csrc.ncsl.nist.gov (NIST) | |
| http://dhp.com/~pluvius | |
| http://dfw.net/~aleph1 (Eubercrackers) | |
| http://draco.centerline.com:8080/~franl/crypto.html (Crypto) | |
| http://everest.cs.ucdavis.edu/Security.html (Security) | |
| http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides) | |
| http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR) | |
| http://first.org (FIRST) | |
| http://ftp.tamu.edu/~abr8030/security.html (Security) | |
| http://hightop.nrl.navy.mil/potpourri.html (Security) | |
| http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books) | |
| http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling) | |
| http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS) | |
| http://info.bellcore.com/BETSI/betsi.html (Betsi) | |
| http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) | |
| http://l0pht.com (The l0pht) | |
| http://l0pht.com/~oblivion/IIRG.html (Phantasy Magazine) | |
| http://mindlink.jolt.com (The Secrets of LockPicking) | |
| http://mls.saic.com (SAIC MLS) | |
| http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage) | |
| http://nasirc.hq.nasa.gov (NASA ASIRC) | |
| http://ophie.hughes.american.edu/~ophie | |
| http://ripco.com:8080/~glr/glr.html (Full Disclosure) | |
| http://spy.org (CSC) | |
| http://tansu.com.au/Info/security.html (Comp and Net Security) | |
| http://the-tech.mit.edu (LaMacchia case info) | |
| http://wintermute.itd.nrl.navy.mil/5544.html (Network Security) | |
| http://www.aads.net (Ameritech) | |
| http://www.alw.nih.gov/WWW/security.html (Unix Security) | |
| http://www.artcom.de/CCC (CCC Homepage) | |
| http://www.aspentec.com/~frzmtdb/fun/hacker.html | |
| http://www.aus.xanadu.com:70/1/EFA (EFF Australia) | |
| http://www.ba.com (Bell Atlantic) | |
| http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win) | |
| http://www.bell.com (MFJ Task Force) | |
| http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products) | |
| http://www.brad.ac.uk/~nasmith/index.html | |
| http://www.bst.bls.com (BellSouth) | |
| http://www.c3.lanl.gov/~mcn (Lanl) | |
| http://www.cert.dfn.de/ (German First Team) | |
| http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText) | |
| http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html | |
| http://www.cpsr.org/home (CPSR) | |
| http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk) | |
| http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown) | |
| http://www.cs.umd.edu/~lgas | |
| http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security) | |
| http://www.csd.harris.com/secure_info.html (Harris) | |
| http://www.csl.sri.com (SRI Computer Science Lab) | |
| http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe) | |
| http://www.datafellows.fi (Data Fellows) | |
| http://www.delmarva.com/raptor/raptor.html (Raptor Network Isolator) | |
| http://www.demon.co.uk/kbridge (KarlBridge) | |
| http://www.digicash.com/ecash/ecash-home.html (Digital Cash) | |
| http://www.digital.com/info/key-secure-index.html(Digital Secure Systems) | |
| http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq) | |
| http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems) | |
| http://www.eff.org/papers.html (EFF) | |
| http://www.engin.umich.edu/~jgotts/boxes.html (Box info) | |
| http://www.engin.umich.edu/~jgotts/hack-faq.html(This document) | |
| http://www.engin.umich.edu/~jgotts/underground.html | |
| http://www.ensta.fr/internet/unix/sys_admin (System administration) | |
| http://www.etext.org/Zines/ (Zines) | |
| http://www.fc.net/defcon (DefCon) | |
| http://www.fc.net/phrack.html (Phrack Magazine) | |
| http://www.first.org/first/ (FIRST) | |
| http://www.greatcircle.com (Great Circle Associates) | |
| http://www.hpcc.gov/blue94/section.4.6.html (NSA) | |
| http://www.ic.gov (The CIA) | |
| http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) | |
| http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook) | |
| http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide) | |
| http://www.net23.com (Max Headroom) | |
| http://www.nist.gov (NIST) | |
| http://www.pacbell.com (Pacific Bell) | |
| http://www.paranoia.com/mthreat (ToneLoc) | |
| http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP) | |
| http://www.phantom.com/~king (Taran King) | |
| http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography) | |
| http://www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA) | |
| http://www.research.att.com (AT&T) | |
| http://ripco.com:8080/~glr/glr.html (Full Disclosure) | |
| http://www.rsa.com (RSA Data Security) | |
| http://www.satelnet.org/~ccappuc | |
| http://www.service.com/cm/uswest/usw1.html (USWest) | |
| http://www.shore.net/~oz/welcome.html (Hack TV) | |
| http://www.spy.org (Computer Systems Consulting) | |
| http://www.sri.com (SRI) | |
| http://www.tansu.com.au/Info/security.html (Security Reference Index) | |
| http://www.tis.com (Trusted Information Systems) | |
| http://www.tri.sbc.com (Southwestern Bell) | |
| http://www.uci.agh.edu.pl/pub/security (Security) | |
| http://www.umcc.umich.edu/~doug/virus-faq.html (Virus) | |
| http://www.usfca.edu/crackdown/crack.html (Hacker Crackdown) | |
| http://www.wam.umd.edu/~ankh/Public/devil_does_unix | |
| http://www.wiltel.com (Wiltel) | |
| http://www.winternet.com/~carolann/dreams.html | |
| http://www.wired.com (Wired Magazine) | |
| 07. What are some IRC channels of interest to hackers? | |
| #2600 | |
| #cellular | |
| #hack | |
| #phreak | |
| #linux | |
| #realhack | |
| #root | |
| #unix | |
| #warez | |
| 08. What are some BBS's of interest to hackers? | |
| Rune Stone (203)832-8441 | |
| Hacker's Haven (303)343-4053 | |
| Independent Nation (315)656-4179 | |
| Ut0PiA (315)656-5135 | |
| underworld_1994.com (514)683-1894 | |
| Digital Fallout (516)378-6640 | |
| Alliance Communications (612)251-8596 | |
| Maas-Neotek (617)855-2923 | |
| Apocalypse 2000 (708)676-9855 | |
| K0dE Ab0dE (713)579-2276 | |
| fARM R0Ad 666 (713)855-0261 | |
| 09. What are some books of interest to hackers? | |
| General Computer Security | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Computer Security Basics | |
| Author: Deborah Russell and G.T. Gengemi Sr. | |
| Publisher: O'Reilly & Associates, Inc. | |
| Copyright Date: 1991 | |
| ISBN: 0-937175-71-4 | |
| This is an excellent book. It gives a broad overview of | |
| computer security without sacrificing detail. A must read for | |
| the beginning security expert. | |
| Computer Security Management | |
| Author: Karen Forcht | |
| Publisher: Boyd and Fraser | |
| Copyright Date: 1994 | |
| ISBN: 0-87835-881-1 | |
| Information Systems Security | |
| Author: Philip Fites and Martin Kratz | |
| Publisher: Van Nostrad Reinhold | |
| Copyright Date: 1993 | |
| ISBN: 0-442-00180-0 | |
| Computer Related Risks | |
| Author: Peter G. Neumann | |
| Publisher: Addison-Wesley | |
| Copyright Date: 1995 | |
| ISBN: 0-201-55805-X | |
| Computer Security Management | |
| Author: Karen Forcht | |
| Publisher: boyd & fraser publishing company | |
| Copyright Date: 1994 | |
| ISBN: 0-87835-881-1 | |
| The Stephen Cobb Complete Book of PC and LAN Security | |
| Author: Stephen Cobb | |
| Publisher: Windcrest Books | |
| Copyright Date: 1992 | |
| ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback) | |
| Security in Computing | |
| Author: Charles P. Pfleeger | |
| Publisher: Prentice Hall | |
| Copyright Date: 1989 | |
| ISBN: 0-13-798943-1. | |
| Building a Secure Computer System | |
| Author: Morrie Gasser | |
| Publisher: Van Nostrand Reinhold Co., New York. | |
| Copyright Date: | |
| ISBN: 0-442-23022-2 | |
| Modern Methods for Computer Security | |
| Author: Lance Hoffman | |
| Publisher: Prentice Hall | |
| Copyright Date: 1977 | |
| ISBN: | |
| Windows NT 3.5 Guidelines for Security, Audit and Control | |
| Author: | |
| Publisher: Microsoft Press | |
| Copyright Date: | |
| ISBN: 1-55615-814-9 | |
| Unix System Security | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| Practical Unix Security | |
| Author: Simson Garfinkel and Gene Spafford | |
| Publisher: O'Reilly & Associates, Inc. | |
| Copyright Date: 1991 | |
| ISBN: 0-937175-72-2 | |
| Finally someone with a very firm grasp of Unix system security | |
| gets down to writing a book on the subject. Buy this book. | |
| Read this book. | |
| Firewalls and Internet Security | |
| Author: William Cheswick and Steven Bellovin | |
| Publisher: Addison Wesley | |
| Copyright Date: 1994 | |
| ISBN: 0-201-63357-4 | |
| Unix System Security | |
| Author: Rik Farrow | |
| Publisher: Addison Wesley | |
| Copyright Date: 1991 | |
| ISBN: 0-201-57030-0 | |
| Unix Security: A Practical Tutorial | |
| Author: N. Derek Arnold | |
| Publisher: McGraw Hill | |
| Copyright Date: 1993 | |
| ISBN: 0-07-002560-6 | |
| Unix System Security: A Guide for Users and Systems Administrators | |
| Author: David A. Curry | |
| Publisher: Addison-Wesley | |
| Copyright Date: 1992 | |
| ISBN: 0-201-56327-4 | |
| Unix System Security | |
| Author: Patrick H. Wood and Stephen G. Kochan | |
| Publisher: Hayden Books | |
| Copyright Date: 1985 | |
| ISBN: 0-672-48494-3 | |
| Unix Security for the Organization | |
| Author: Richard Bryant | |
| Publisher: Sams | |
| Copyright Date: 1994 | |
| ISBN: 0-672-30571-2 | |
| Network Security | |
| ~~~~~~~~~~~~~~~~ | |
| Network Security Secrets | |
| Author: David J. Stang and Sylvia Moon | |
| Publisher: IDG Books | |
| Copyright Date: 1993 | |
| ISBN: 1-56884-021-7 | |
| Not a total waste of paper, but definitely not worth the | |
| $49.95 purchase price. The book is a rehash of previously | |
| published information. The only secret we learn from reading | |
| the book is that Sylvia Moon is a younger woman madly in love | |
| with the older David Stang. | |
| Complete Lan Security and Control | |
| Author: Peter Davis | |
| Publisher: Windcrest / McGraw Hill | |
| Copyright Date: 1994 | |
| ISBN: 0-8306-4548-9 and 0-8306-4549-7 | |
| Network Security | |
| Author: Steven Shaffer and Alan Simon | |
| Publisher: AP Professional | |
| Copyright Date: 1994 | |
| ISBN: 0-12-638010-4 | |
| Cryptography | |
| ~~~~~~~~~~~~ | |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C | |
| Author: Bruce Schneier | |
| Publisher: John Wiley & Sons | |
| Copyright Date: 1994 | |
| ISBN: 0-471-59756-2 | |
| Bruce Schneier's book replaces all other texts on | |
| cryptography. If you are interested in cryptography, this is | |
| a must read. This may be the first and last book on | |
| cryptography you may ever need to buy. | |
| Cryptography and Data Security | |
| Author: Dorothy Denning | |
| Publisher: Addison-Wesley Publishing Co. | |
| Copyright Date: 1982 | |
| ISBN: 0-201-10150-5 | |
| Protect Your Privacy: A Guide for PGP Users | |
| Author: William Stallings | |
| Publisher: Prentice-Hall | |
| Copyright Date: 1994 | |
| ISBN: 0-13-185596-4 | |
| Programmed Threats | |
| ~~~~~~~~~~~~~~~~~~ | |
| The Little Black Book of Computer Viruses | |
| Author: Mark Ludwig | |
| Publisher: American Eagle Publications | |
| Copyright Date: 1990 | |
| ISBN: 0-929408-02-0 | |
| The original, and still the best, book on computer viruses. | |
| No media hype here, just good clean technical information. | |
| Computer Viruses, Artificial Life and Evolution | |
| Author: Mark Ludwig | |
| Publisher: American Eagle Publications | |
| Copyright Date: 1993 | |
| ISBN: 0-929408-07-1 | |
| Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other | |
| Threats to Your System | |
| Author: John McAfee and Colin Haynes | |
| Publisher: St. Martin's Press | |
| Copyright Date: 1989 | |
| ISBN: 0-312-03064-9 and 0-312-02889-X | |
| The Virus Creation Labs: A Journey Into the Underground | |
| Author: George Smith | |
| Publisher: American Eagle Publications | |
| Copyright Date: 1994 | |
| ISBN: | |
| Telephony | |
| ~~~~~~~~~ | |
| Engineering and Operations in the Bell System | |
| Author: R.F. Rey | |
| Publisher: Bell Telephont Laboratories | |
| Copyright Date: 1983 | |
| ISBN: 0-932764-04-5 | |
| Although hopelessly out of date, this book remains *THE* book | |
| on telephony. This book is 100% Bell, and is loved by phreaks | |
| the world over. | |
| Telephony: Today and Tomorrow | |
| Author: Dimitris N. Chorafas | |
| Publisher: Prentice-Hall | |
| Copyright Date: 1984 | |
| ISBN: 0-13-902700-9 | |
| The Telecommunications Fact Book and Illustrated Dictionary | |
| Author: Ahmed S. Khan | |
| Publisher: Delmar Publishers, Inc. | |
| Copyright Date: 1992 | |
| ISBN: 0-8273-4615-8 | |
| I find this dictionary to be an excellent reference book on | |
| telephony, and I recommend it to anyone with serious | |
| intentions in the field. | |
| Tandy/Radio Shack Cellular Hardware | |
| Author: Judas Gerard and Damien Thorn | |
| Publisher: Phoenix Rising Communications | |
| Copyright Date: 1994 | |
| ISBN: | |
| The Phone Book | |
| Author: Carl Oppendahl | |
| Publisher: Consumer Reports | |
| Copyright Date: | |
| ISBN: 0-89043-364-x | |
| Listing of every cellular ID in the us, plus roaming ports, | |
| and info numbers for each carrier. | |
| Principles of Caller I.D. | |
| Author: | |
| Publisher: International MicroPower Corp. | |
| Copyright Date: | |
| ISBN: | |
| Hacking History and Culture | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The Hacker Crackdown: Law and Disorder on the Electronic Frontier | |
| Author: Bruce Sterling | |
| Publisher: Bantam Books | |
| Copyright Date: 1982 | |
| ISBN: 0-553-56370-X | |
| Bruce Sterling has recently released the book FREE to the net. | |
| The book is much easier to read in print form, and the | |
| paperback is only $5.99. Either way you read it, you will be | |
| glad you did. Mr. Sterling is an excellent science fiction | |
| author and has brought his talent with words to bear on the | |
| hacking culture. A very enjoyable reading experience. | |
| Cyberpunk | |
| Author: Katie Hafner and John Markoff | |
| Publisher: Simon and Schuster | |
| Copyright Date: 1991 | |
| ISBN: 0-671-77879-X | |
| The Cuckoo's Egg | |
| Author: Cliff Stoll | |
| Publisher: Simon and Schuster | |
| Copyright Date: 1989 | |
| ISBN: 0-671-72688-9 | |
| Hackers: Heroes of the Computer Revolution | |
| Author: Steven Levy | |
| Publisher: Doubleday | |
| Copyright Date: 1984 | |
| ISBN: 0-440-13495-6 | |
| Unclassified | |
| ~~~~~~~~~~~~ | |
| The Hacker's Handbook | |
| Author: Hugo Cornwall | |
| Publisher: E. Arthur Brown Company | |
| Copyright Date: | |
| ISBN: 0-912579-06-4 | |
| Secrets of a Super Hacker | |
| Author: The Knightmare | |
| Publisher: Loompanics | |
| Copyright Date: 1994 | |
| ISBN: 1-55950-106-5 | |
| The Knightmare is no super hacker. There is little or no real | |
| information in this book. The Knightmare gives useful advice | |
| like telling you not to dress up before going trashing. | |
| The Knightmare's best hack is fooling Loompanics into | |
| publishing this garbage. | |
| The Day The Phones Stopped | |
| Author: Leonard Lee | |
| Publisher: Primus / Donald I Fine, Inc. | |
| Copyright Date: 1992 | |
| ISBN: 1-55611-286-6 | |
| Total garbage. Paranoid delusions of a lunatic. Less factual | |
| data that an average issue of the Enquirer. | |
| Information Warfare | |
| Author: Winn Swartau | |
| Publisher: Thunder Mountain Press | |
| Copyright Date: 1994 | |
| ISBN: 1-56025-080-1 | |
| An Illustrated Guide to the Techniques and Equipment of Electronic Warfare | |
| Author: Doug Richardson | |
| Publisher: Salamander Press | |
| Copyright Date: | |
| ISBN: 0-668-06497-8 | |
| 10. What are some videos of interest to hackers? | |
| 'Unauthorized Access' by Annaliza Savage | |
| $25 on VH S format in 38-min | |
| Savage Productions | |
| 1803 Mission St., #406 | |
| Santa Cruz, CA 95060 | |
| 11. What are some mailing lists of interest to hackers? | |
| Academic Firewalls | |
| Reflector Address: | |
| Registration Address: Send a message to majordomo@greatcircle.com | |
| containing the line "subscribe firewalls user@host" | |
| Bugtraq | |
| Reflector Address: bugtraq@fc.net | |
| Registration Address: bugtraq-request@fc.net | |
| Cert Tools | |
| Reflector Address: cert-tools@cert.org | |
| Registration Address: cert-tools-request@cert.org | |
| Computers and Society | |
| Reflector Address: Comp-Soc@limbo.intuitive.com | |
| Registration Address: taylor@limbo.intuitive.com | |
| Coordinated Feasibility Effort to Unravel State Data | |
| Reflector Address: ldc-sw@cpsr.org | |
| Registration Address: | |
| CPSR Announcement List | |
| Reflector Address: cpsr-announce@cpsr.org | |
| Registration Address: | |
| CPSR - Intellectual Property | |
| Reflector Address: cpsr-int-prop@cpsr.org | |
| Registration Address: | |
| CPSR - Internet Library | |
| Reflector Address: cpsr-library@cpsr.org | |
| Registration Address: | |
| DefCon Announcement List | |
| Reflector Address: | |
| Registration Address: Send a message to majordomo@fc.net containing | |
| the line "subscribe dc-announce" | |
| DefCon Chat List | |
| Reflector Address: | |
| Registration Address: Send a message to majordomo@fc.net containing | |
| the line "subscribe dc-stuff" | |
| IDS (Intruder Detection Systems) | |
| Reflector Address: | |
| Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au | |
| containing the line "subscribe ids" | |
| Macintosh Security | |
| Reflector Address: mac-security@eclectic.com | |
| Registration Address: mac-security-request@eclectic.com | |
| NeXT Managers | |
| Reflector Address: | |
| Registration Address: next-managers-request@stolaf.edu | |
| Phiber-Scream | |
| Reflector Address: | |
| Registration Address: Send a message to listserv@netcom.com | |
| containing the line "subscribe phiber-scream user@host" | |
| phruwt-l (Macintosh H/P) | |
| Reflector Address: | |
| Registration Address: Send a message to filbert@netcom.com | |
| with the subject "phruwt-l" | |
| rfc931-users | |
| Reflector Address: rfc931-users@kramden.acf.nyu.edu | |
| Registration Address: brnstnd@nyu.edu | |
| RSA Users | |
| Reflector Address: rsaref-users@rsa.com | |
| Registration Address: rsaref-users-request@rsa.com | |
| 12. What are some print magazines of interest to hackers? | |
| 2600 - The Hacker Quarterly | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| E-mail address: 2600@well.sf.ca.us | |
| Subscription Address: 2600 Subscription Dept | |
| PO Box 752 | |
| Middle Island, NY 11953-0752 | |
| Letters and article submission address: 2600 Editorial Dept | |
| PO Box 99 | |
| Middle Island, NY 11953-0099 | |
| Subscriptions: United States: $21/yr individual, $50 corporate. | |
| Overseas: $30/yr individual, $65 corporate. | |
| Gray Areas | |
| ~~~~~~~~~~ | |
| Gray Areas examines gray areas of law and morality and subject matter | |
| which is illegal, immoral and/oe controversial. Gray Areas explores | |
| why hackers hack and puts hacking into a sociological framework of | |
| deviant behavior. | |
| E-Mail Address: grayarea@well.sf.ca.us | |
| E-Mail Address: grayarea@netaxs.com | |
| U.S. Mail Address: Gray Areas | |
| PO Box 808 | |
| Broomall, PA 19008 | |
| Subscriptions: $26.00 4 issues first class | |
| $34.00 4 issues foreign (shipped air mail) | |
| Wired | |
| ~~~~~ | |
| Subscription Address: subscriptions@wired.com | |
| or: Wired | |
| PO Box 191826 | |
| San Francisco, CA 94119-9866 | |
| Letters and article submission address: guidelines@wired.com | |
| or: Wired | |
| 544 Second Street | |
| San Francisco, CA 94107-1427 | |
| Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas) | |
| Nuts & Volts | |
| ~~~~~~~~~~~~ | |
| T& L Publications | |
| 430 Princeland Court | |
| Corona, CA 91719 | |
| (800)783-4624 (Voice) (Subscription Only Order Line) | |
| (909)371-8497 (Voice) | |
| (909)371-3052 (Fax) | |
| CIS: 74262,3664 | |
| 13. What are some e-zines of interest to hackers? | |
| CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo | |
| Empire Times ftp.etext.org /pub/Zines/Emptimes | |
| Phrack ftp.fc.net /pub/phrack | |
| 14. What are some organizations of interest to hackers? | |
| Computer Professionals for Social Responsibility (CPSR) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| CPSR empowers computer professionals and computer users to advocate | |
| for the responsible use of information technology and empowers all who | |
| use computer technology to participate in the public debate. As | |
| technical experts, CPSR members provide the public and policymakers | |
| with realistic assessments of the power, promise, and limitations of | |
| computer technology. As an organization of concerned citizens, CPSR | |
| directs public attention to critical choices concerning the | |
| applications of computing and how those choices affect society. | |
| By matching unimpeachable technical information with policy | |
| development savvy, CPSR uses minimum dollars to have maximum impact | |
| and encourages broad public participation in the shaping of technology | |
| policy. | |
| Every project we undertake is based on five principles: | |
| * We foster and support public discussion of and public | |
| responsibility for decisions involving the use of computers in | |
| systems critical to society. | |
| * We work to dispel popular myths about the infallibility of | |
| technological systems. | |
| * We challenge the assumption that technology alone can solve | |
| political and social problems. | |
| * We critically examine social and technical issues within the | |
| computer profession, nationally and internationally. | |
| * We encourage the use of computer technology to improve the quality | |
| of life. | |
| CPSR Membership Categories | |
| 75 REGULAR MEMBER | |
| 50 Basic member | |
| 200 Supporting member | |
| 500 Sponsoring member | |
| 1000 Lifetime member | |
| 20 Student/low income member | |
| 50 Foreign subscriber | |
| 50 Library/institutional subscriber | |
| CPSR National Office | |
| P.O. Box 717 | |
| Palo Alto, CA 94301 | |
| 415-322-3778 | |
| 415-322-3798 (FAX) | |
| E-mail: cpsr@csli.stanford.edu | |
| Electronic Frontier Foundation (EFF) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The Electronic Frontier Foundation (EFF) is dedicated to the pursuit | |
| of policies and activities that will advance freedom and openness in | |
| computer-based communications. It is a member-supported, nonprofit | |
| group that grew from the conviction that a new public interest | |
| organization was needed in the information age; that this organization | |
| would enhance and protect the democratic potential of new computer | |
| communications technology. From the beginning, the EFF determined to | |
| become an organization that would combine technical, legal, and public | |
| policy expertise, and would apply these skills to the myriad issues | |
| and concerns that arise whenever a new communications medium is born. | |
| Memberships are $20.00 per year for students, $40.00 per year for | |
| regular members, and $100.00 per year for organizations. | |
| The Electronic Frontier Foundation, Inc. | |
| 666 Pennsylvania Avenue S.E., Suite 303 | |
| Washington, D.C. 20003 | |
| +1 202 544 9237 | |
| +1 202 547 5481 FAX | |
| Internet: eff@eff.org | |
| Free Software Foundation (FSF) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| GNU | |
| ~~~ | |
| The League for Programming Freedom (LPF) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The League for Programming Freedom is an organization of people who | |
| oppose the attempt to monopolize common user interfaces through "look | |
| and feel" copyright lawsuits. Some of us are programmers, who worry | |
| that such monopolies will obstruct our work. Some of us are users, | |
| who want new computer systems to be compatible with the interfaces we | |
| know. Some are founders of hardware or software companies, such as | |
| Richard P. Gabriel. Some of us are professors or researchers, | |
| including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. | |
| Boyer and Patrick Winston. | |
| "Look and feel" lawsuits aim to create a new class of government- | |
| enforced monopolies broader in scope than ever before. Such a system | |
| of user-interface copyright would impose gratuitous incompatibility, | |
| reduce competition, and stifle innovation. | |
| We in the League hope to prevent these problems by preventing | |
| user-interface copyright. The League is NOT opposed to copyright law | |
| as it was understood until 1986 -- copyright on particular programs. | |
| Our aim is to stop changes in the copyright system which would take | |
| away programmers' traditional freedom to write new programs compatible | |
| with existing programs and practices. | |
| Annual dues for individual members are $42 for employed professionals, | |
| $10.50 for students, and $21 for others. We appreciate activists, but | |
| members who cannot contribute their time are also welcome. | |
| To contact the League, phone (617) 243-4091, send Internet mail to the | |
| address league@prep.ai.mit.edu, or write to: | |
| League for Programming Freedom | |
| 1 Kendall Square #143 | |
| P.O. Box 9171 | |
| Cambridge, MA 02139 USA | |
| SotMesc | |
| ~~~~~~~ | |
| Founded in 1989, SotMesc is dedicated to preserving the integrity and | |
| cohesion of the computing society. By promoting computer education, | |
| liberties and efficiency, we believe we can secure freedoms for all | |
| computer users while retaining privacy. | |
| SotMesc maintains the CSP Internet mailing list, the SotMesc | |
| Scholarship Fund, and the SotMesc Newsletter. | |
| The SotMESC is financed partly by membership fees, and donations, but | |
| mostly by selling hacking, cracking, phreaking, electronics, internet, | |
| and virus information and programs on disk and bound paper media. | |
| SotMesc memberships are $20 to students and $40 to regular members. | |
| SotMESC | |
| P.O. Box 573 | |
| Long Beach, MS 39560 | |
| Computer Emergency Response Team (CERT | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| CERT is the Computer Emergency Response Team that was formed by the | |
| Defense Advanced Research Projects Agency (DARPA) in November 1988 in | |
| response to the needs exhibited during the Internet worm incident. | |
| The CERT charter is to work with the Internet community to facilitate | |
| its response to computer security events involving Internet hosts, to | |
| take proactive steps to raise the community's awareness of computer | |
| security issues, and to conduct research targeted at improving the | |
| security of existing systems. | |
| CERT products and services include 24-hour technical assistance for | |
| responding to computer security incidents, product vulnerability | |
| assistance, technical documents, and seminars. In addition, the team | |
| maintains a number of mailing lists (including one for CERT | |
| advisories) and provides an anonymous FTP server: cert.org | |
| (192.88.209.5), where security-related documents, past CERT | |
| advisories, and tools are archived. | |
| CERT contact information: | |
| U.S. mail address | |
| CERT Coordination Center | |
| Software Engineering Institute | |
| Carnegie Mellon University | |
| Pittsburgh, PA 15213-3890 | |
| U.S.A. | |
| Internet E-mail address | |
| cert@cert.org | |
| Telephone number | |
| (412)268-7090 (24-hour hotline) | |
| CERT Coordination Center personnel answer | |
| 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for | |
| emergencies during other hours. | |
| FAX number | |
| (412)268-6989 | |
| 15. Where can I purchase a magnetic stripe encoder/decoder? | |
| CPU Advance | |
| PO Box 2434 | |
| Harwood Station | |
| Littleton, MA 01460 | |
| (508)624-4819 (Fax) | |
| Omron Electronics, Inc. | |
| One East Commerce Drive | |
| Schaumburg, IL 60173 | |
| (800)556-6766 (Voice) | |
| (708)843-7787 (Fax) | |
| Security Photo Corporation | |
| 1051 Commonwealth Avenue | |
| Boston, MA 02215 | |
| (800)533-1162 (Voice) | |
| (617)783-3200 (Voice) | |
| (617)783-1966 (Voice) | |
| Timeline Inc, | |
| 23605 Telo Avenue | |
| Torrence, CA 90505 | |
| (800)872-8878 (Voice) | |
| (800)223-9977 (Voice) | |
| Alltronics | |
| 2300 Zanker Road | |
| San Jose CA 95131 | |
| (408) 943-9774 Voice | |
| (408) 943-9776 Fax | |
| (408) 943-0622 BBS | |
| Part Number: 92U067 | |
| Atalla Corp | |
| San Jose, CA | |
| (408) 435-8850 | |
| 16. What are the rainbow books and how can I get them? | |
| Orange Book | |
| DoD 5200.28-STD | |
| Department of Defense Trusted Computer System Evaluation Criteria | |
| Green Book | |
| CSC-STD-002-85 | |
| Department of Defense Password Management Guideline | |
| Yellow Book | |
| CSC-STD-003-85 | |
| Computer Security Requirements -- Guidance for Applying the Department | |
| of Defense Trusted Computer System Evaluation Criteria in Specific | |
| Environments | |
| Yellow Book | |
| CSC-STD-004-85 | |
| Technical Rationale Behind CSC-STD-003-85: Computer Security | |
| Requirements. Guidance for Applying the Department of Defense Trusted | |
| Computer System Evaluation Criteria in Specific Environments. | |
| Tan Book | |
| NCSC-TG-001 | |
| A Guide to Understanding Audit in Trusted Systems | |
| Bright Blue Book | |
| NCSC-TG-002 | |
| Trusted Product Evaluation - A Guide for Vendors | |
| Neon Orange Book | |
| NCSC-TG-003 | |
| A Guide to Understanding Discretionary Access Control in Trusted | |
| Systems | |
| Teal Green Book | |
| NCSC-TG-004 | |
| Glossary of Computer Security Terms | |
| Red Book | |
| NCSC-TG-005 | |
| Trusted Network Interpretation of the Trusted Computer System | |
| Evaluation Criteria | |
| Orange Book | |
| NCSC-TG-006 | |
| A Guide to Understanding Configuration Management in Trusted Systems | |
| Burgundy Book | |
| NCSC-TG-007 | |
| A Guide to Understanding Design Documentation in Trusted Systems | |
| Dark Lavender Book | |
| NCSC-TG-008 | |
| A Guide to Understanding Trusted Distribution in Trusted Systems | |
| Venice Blue Book | |
| NCSC-TG-009 | |
| Computer Security Subsystem Interpretation of the Trusted Computer | |
| System Evaluation Criteria | |
| Aqua Book | |
| NCSC-TG-010 | |
| A Guide to Understanding Security Modeling in Trusted Systems | |
| Dark Red Book | |
| NCSC-TG-011 | |
| Trusted Network Interpretation Environments Guideline -- Guidance for | |
| Applying the Trusted Network Interpretation | |
| Pink Book | |
| NCSC-TG-013 | |
| Rating Maintenance Phase -- Program Document | |
| Purple Book | |
| NCSC-TG-014 | |
| Guidelines for Formal Verification Systems | |
| Brown Book | |
| NCSC-TG-015 | |
| A Guide to Understanding Trusted Facility Management | |
| Yellow-Green Book | |
| NCSC-TG-016 | |
| Guidelines for Writing Trusted Facility Manuals | |
| Light Blue | |
| NCSC-TG-017 | |
| A Guide to Understanding Identification and Authentication in Trusted | |
| Systems | |
| Light Blue Book | |
| NCSC-TG-018 | |
| A Guide to Understanding Object Reuse in Trusted Systems | |
| Blue Book | |
| NCSC-TG-019 | |
| Trusted Product Evaluation Questionnaire | |
| Gray Book | |
| NCSC-TG-020A | |
| Trusted Unix Working Group (TRUSIX) Rationale for Selecting | |
| Access Control List Features for the Unix System | |
| Lavender Book | |
| NCSC-TG-021 | |
| Trusted Data Base Management System Interpretation of the Trusted | |
| Computer System Evaluation Criteria | |
| Yellow Book | |
| NCSC-TG-022 | |
| A Guide to Understanding Trusted Recovery in Trusted Systems | |
| Bright Orange Book | |
| NCSC-TG-023 | |
| A Guide to Understandng Security Testing and Test Documentation in | |
| Trusted Systems | |
| Purple Book | |
| NCSC-TG-024 (Volume 1/4) | |
| A Guide to Procurement of Trusted Systems: An Introduction to | |
| Procurement Initiators on Computer Security Requirements | |
| Purple Book | |
| NCSC-TG-024 (Volume 2/4) | |
| A Guide to Procurement of Trusted Systems: Language for RFP | |
| Specifications and Statements of Work - An Aid to Procurement | |
| Initiators | |
| Purple Book | |
| NCSC-TG-024 (Volume 3/4) | |
| A Guide to Procurement of Trusted Systems: Computer Security Contract | |
| Data Requirements List and Data Item Description Tutorial | |
| +Purple Book | |
| +NCSC-TG-024 (Volume 4/4) | |
| +A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's | |
| +Proposal Document - An Aid to Procurement Initiators and Contractors | |
| Green Book | |
| NCSC-TG-025 | |
| A Guide to Understanding Data Remanence in Automated Information | |
| Systems | |
| Hot Peach Book | |
| NCSC-TG-026 | |
| A Guide to Writing the Security Features User's Guide for Trusted Systems | |
| Turquiose Book | |
| NCSC-TG-027 | |
| A Guide to Understanding Information System Security Officer | |
| Responsibilities for Automated Information Systems | |
| Violet Book | |
| NCSC-TG-028 | |
| Assessing Controlled Access Protection | |
| Blue Book | |
| NCSC-TG-029 | |
| Introduction to Certification and Accreditation | |
| Light Pink Book | |
| NCSC-TG-030 | |
| A Guide to Understanding Covert Channel Analysis of Trusted Systems | |
| C1 Technical Report-001 | |
| Computer Viruses: Prevention, Detection, and Treatment | |
| *C Technical Report 79-91 | |
| *Integrity in Automated Information Systems | |
| *C Technical Report 39-92 | |
| *The Design and Evaluation of INFOSEC systems: The Computer Security | |
| *Contributions to the Composition Discussion | |
| NTISSAM COMPUSEC/1-87 | |
| Advisory Memorandum on Office Automation Security Guideline | |
| -- | |
| You can get your own free copy of any or all of the books by writing | |
| or calling: | |
| INFOSEC Awareness Division | |
| ATTN: X711/IAOC | |
| Fort George G. Meade, MD 20755-6000 | |
| Barbara Keller | |
| (410) 766-8729 | |
| If you ask to be put on the mailing list, you'll get a copy of each new | |
| book as it comes out (typically a couple a year). | |
| [* == I have not personally seen this book] | |
| [+ == I have not personally seen this book, and I believe it may not] | |
| [ be available] | |
| Section D: 2600 | |
| ~~~~~~~~~~~~~~~ | |
| 01. What is alt.2600? | |
| Alt.2600 is a Usenet newsgroup for discussion of material relating to | |
| 2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600 | |
| game machine. Len@netsys.com created the group on Emmanuel | |
| Goldstein's recommendation. Emmanuel is the editor/publisher of 2600 | |
| Magazine. Following the barrage of postings about the Atari machine to | |
| alt.2600, an alt.atari.2600 was created to divert all of the atari | |
| traffic from alt.2600. Atari 2600 people are advised to hie over to | |
| rec.games.video.classic. | |
| 02. What does "2600" mean? | |
| 2600Hz was a tone that was used by early phone phreaks (or | |
| phreakers) in the 80's, and some currently. If the tone was sent down the | |
| line at the proper time, one could get away with all sorts of fun stuff. | |
| A note from Emmanuel Goldstein: | |
| "The Atari 2600 has NOTHING to do with blue boxes or telephones | |
| or the 2600 hertz tone. The 2600 hertz tone was simply the first | |
| step towards exploring the network. If you were successful at | |
| getting a toll call to drop, then billing would stop at that | |
| point but there would be billing for the number already dialed | |
| up until the point of seizure. 800 numbers and long distance | |
| information were both free in the past and records of who called | |
| what were either non-existent or very obscure with regards to | |
| these numbers. This, naturally, made them more popular than | |
| numbers that showed up on a bill, even if it was only for | |
| a minute. Today, many 800 numbers go overseas, which provides | |
| a quick and free way into another country's phone system | |
| which may be more open for exploration." | |
| 03. Are there on-line versions of 2600 available? | |
| No. | |
| 04. I can't find 2600 at any bookstores. What can I do? | |
| Subscribe. Or, let 2600 know via the subscription address that you | |
| think 2600 should be in the bookstore. Be sure to include the | |
| bookstores name and address. | |
| 05. Why does 2600 cost more to subscribe to than to buy at a newsstand? | |
| A note from Emmanuel Goldstein: | |
| We've been selling 2600 at the same newsstand price ($4) since 1988 | |
| and we hope to keep it at that price for as long as we can get away | |
| with it. At the same time, $21 is about the right price to cover | |
| subscriber costs, including postage and record keeping, etc. People | |
| who subscribe don't have to worry about finding an issue someplace, | |
| they tend to get issues several weeks before the newsstands get | |
| them, and they can take out free ads in the 2600 Marketplace. | |
| This is not uncommon in the publishing industry. The NY Times, for | |
| example, costs $156.50 at the newsstands, and $234.75 delivered to your | |
| door. | |
| Section E: Phrack Magazine | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| 01. What Is Phrack Magazine? | |
| Phrack Magazine is one of the longest running electronic-based publications | |
| in the world. Originally founded in 1985 by Knight Lightning and Taran | |
| King, it has survived several incarnations of editors and still remains | |
| true to its underground roots. Since its inception, Phrack has been | |
| providing the hacker community with information on operating systems, | |
| networking technologies and telephony, as well as relaying human interest | |
| features of interest to the international computer underground. | |
| During its lifetime, Phrack has always been at the center of controversy. | |
| Since the magazine has always been openly available, it presented law | |
| enforcement officials with what they percieved to be a direct link into | |
| the secret society of computer hackers. Not truly understnding either | |
| the the spirit of the magazine or the community for which it was written, | |
| Federal Agents and Prosecutors began to target Phrack Magazine and those | |
| affiliated with it. | |
| "The Hacker Crackdown" by Bruce Sterling relays the details surrounding | |
| some of these events. | |
| Phrack Magazine is now in its 10th year of publication, and is registered | |
| with the Library of Congress as ISSN 1068-1035, and is protected by | |
| US Copyright Law. | |
| 02. How can I reach Phrack Magazine? | |
| You can reach Phrack by email at: phrack@well.com, phrack@fc.net or | |
| phrackmag@aol.com. These addresses are listed in order of | |
| preference. Only AOL users should email the phrackmag@aol.com. | |
| Phrack can be reached by the postal service at: | |
| Phrack Magazine | |
| 603 W. 13th #1A-278 | |
| Austin, TX 78701 | |
| 03. Who Publishes Phrack? | |
| Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe. It is | |
| hobbled together, touched up, spell checked and compressed on an overworked | |
| 486-66. It is then ftp'ed over to a BSDI UNIX machine where it is sent to | |
| the masses. | |
| 04. How Often Does Phrack Go Out? | |
| Phrack goes out roughly quarterly. It is often sent out later than every | |
| three months due to other more demanding obligations faced by its editor. | |
| The regularity of Phrack is really based upon the amount of information | |
| sent in. Phrack depends solely upon submissions to get published at all. | |
| 05. How Do I Subscribe? | |
| To subscribe to Phrack magazine, merely email phrack@well.com and ask to | |
| be placed on the mailing list. | |
| Any encrypted subscriptions requests will be ignored. | |
| Phrack will not accept subscription requests from any anonymous remailers or | |
| from sites in the fidonet domain. The anonymous remailers consistently | |
| bounce our mailings causing a big headache, so we won't use them. The | |
| fidonet domain administrators have asked us not to mail Phrack to fido users, | |
| because of the huge load it places on their outgoing spools (costing them a | |
| lot of money to send). | |
| 06. Why Don't I Get Any Response When I E-mail Phrack? | |
| Because of the high volume of mail sent to the Phrack email address, | |
| not everyone gets a response. All subscription requests are saved and | |
| added to the master list, but there is no automatic reply. All other | |
| messages are responded to as they are read, with the exception of PGP'd | |
| messages. All PGP'd email is stored for later decryption, and is almost | |
| never responded to, unless it is incredibly urgent. | |
| 07. Does Phrack Cost Money? | |
| Phrack Magazine charges a registration fee of $100.00 per user for any | |
| professional use of the magazine and the information contained therein. | |
| Information regarding this registration fee is contained at the beginning | |
| of every issue of Phrack. | |
| 08. How Can I Submit Articles? | |
| Articles are both wanted and needed. Phrack only exists if people write | |
| for it. There is no regular writing staff, there is only the editor, who | |
| cannot write the entire thing himself. | |
| Articles can be sent to Phrack via email or snailmail (on paper or | |
| IBM-compatible diskette). Articles should be in ASCII text format. Do | |
| not include any clever graphics or ANSI art. You can use Phrack's PGP key | |
| to encrypt articles, but send the files in the ASCII armor format. | |
| Please try to avoid sending files as MIME-compliant mail attachments. | |
| 09. What Is Phrack's PGP Key? | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.6 | |
| mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP | |
| Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk | |
| Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR | |
| tBRwaHJhY2tAd2VsbC5zZi5jYS51cw== | |
| =evjv | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| 10. Where Can I Get Back Issues? | |
| Back issues of Phrack are found on many bulletin boards around the globe. | |
| The only OFFICIAL Phrack Magazine distribution site is our ftp archive | |
| at ftp.fc.net in /pub/phrack. There are NO official distribution sites | |
| other than this one, nor will there ever be. We don't want to play | |
| favorites and let one particular BBS call itself an "official" site while | |
| another isn't. Therefore, there will be no "official" sites except those | |
| archived by Phrack itself. | |
| You can also get back issues on the World Wide Web by connecting to: | |
| http://www.fc.net/phrack.html | |
| This URL allows users to view issues online, or pull them down for | |
| later viewing. | |
| Any users without net access can send diskettes and postage to the | |
| Phrack Postal Address given above, and request back issues to be | |
| sent via the postal system. | |
| Section F: Miscellaneous | |
| ~~~~~~~~~~~~~~~~~~~~~~~~ | |
| 01. What does XXX stand for? | |
| TLA Three Letter Acronym | |
| ACL Access Control List | |
| PIN Personal Identification Number | |
| TCB Trusted Computing Base | |
| ALRU Automatic Line Record Update | |
| AN Associated Number | |
| ARSB Automated Repair Service Bureau | |
| ATH Abbreviated Trouble History | |
| BOC Bell Operating Company | |
| BOR Basic Output Report | |
| BOSS Business Office Servicing System | |
| CA Cable | |
| COE Central Office Equipment | |
| COSMOS Computer System for Main Frame Operations | |
| CMC Construction Maintenance Center | |
| CNID Calling Number IDentification | |
| CO Central Office | |
| COCOT Customer Owned Coin Operated Telephone | |
| CRSAB Centralized Repair Service Answering Bureau | |
| DDD Direct Distance Dialing | |
| ECC Enter Cable Change | |
| LD Long Distance | |
| LMOS Loop Maintenance Operations System | |
| MLT Mechanized Loop Testing | |
| NPA Numbering Plan Area | |
| POTS Plain Old Telephone Service | |
| RBOC Regional Bell Operating Company | |
| RSB Repair Service Bureau | |
| SS Special Service | |
| TAS Telephone Answering Service | |
| TH Trouble History | |
| TREAT Trouble Report Evaluation and Analysis Tool | |
| LOD Legion of Doom | |
| HFC Hell Fire Club | |
| TNO The New Order | |
| ACiD Ansi Creators in Demand | |
| CCi Cybercrime International | |
| FLT Fairlight | |
| iCE Insane Creators Enterprise | |
| iNC International Network of Crackers | |
| NTA The Nocturnal Trading Alliance | |
| PDX Paradox | |
| PE Public Enemy | |
| PSY Psychose | |
| QTX Quartex | |
| RZR Razor (1911) | |
| S!P Supr!se Productions | |
| TDT The Dream Team | |
| THG The Humble Guys | |
| THP The Hill People | |
| TRSI Tristar Red Sector Inc. | |
| UUDW Union of United Death Workers | |
| 02. How do I determine if I have a valid credit card number? | |
| Credit cards use the Luhn Check Digit Algorithm. The main purpose of | |
| this algorithm is to catch data entry errors, but it does double duty | |
| here as a weak security tool. | |
| For a card with an even number of digits, double every odd numbered | |
| digit and subtract 9 if the product is greater than 9. Add up all the | |
| even digits as well as the doubled-odd digits, and the result must be | |
| a multiple of 10 or it's not a valid card. If the card has an odd | |
| number of digits, perform the same addition doubling the even numbered | |
| digits instead. | |
| 03. What bank issued this credit card? | |
| 1033 Manufacturers Hanover Trust | |
| 1035 Citibank | |
| 1263 Chemical Bank | |
| 1665 Chase Manhattan | |
| 4024 Bank of America | |
| 4128 Citicorp | |
| 4209 New Era Bank | |
| 4302 HHBC | |
| 4310 Imperial Savings | |
| 4313 MBNA | |
| 4317 California Federal | |
| 5282 Wells Fargo | |
| 5424 Citibank | |
| 5410 Wells Fargo | |
| 5432 Bank of New York | |
| 6017 MBNA | |
| 04. What are the ethics of hacking? | |
| An excerpt from: Hackers: Heroes of the Computer Revolution | |
| by Steven Levy | |
| Access to computers -- and anything which might teach you | |
| something about the way the world works -- should be unlimited | |
| and total. Always yield to the Hands-On imperative. | |
| All information should be free. | |
| Mistrust Authority. Promote Decentralization. | |
| Hackers should be judged by their hacking, not bogus criteria | |
| such as degrees, age, race, or position. | |
| You can create art and beauty on a computer. | |
| Computers can change your life for the better. | |
| 04. Where can I get a copy of the alt.2600/#hack FAQ? | |
| Get it on FTP at: | |
| rahul.net /pub/lps | |
| rtfm.mit.edu /pub/usenet-by-group/alt.2600 | |
| ftp.clark.net /pub/jcase | |
| Get it on the World Wide Web at: | |
| http://dfw.net/~aleph1 | |
| http://www.engin.umich.edu/~jgotts/hack-faq.html | |
| http://www.phantom.com/~king | |
| Get it from these BBS's: | |
| Hacker's Haven (303)343-4053 | |
| EOT | |