| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 8 of 22 |
|
|
|
|
| 05. What are some gopher sites of interest to hackers? |
|
|
| ba.com (Bell Atlantic) |
| csrc.ncsl.nist.gov (NIST Security Gopher) |
| gopher.acm.org (SIGSAC (Security, Audit & Control)) |
| gopher.cpsr.org (Computer Professionals for Social Responsibility) |
| gopher.cs.uwm.edu |
| gopher.eff.org (Electonic Frontier Foundation) |
| gw.PacBell.com (Pacific Bell) |
| iitf.doc.gov (NITA -- IITF) |
| oss.net (Open Source Solutions) |
| spy.org (Computer Systems Consulting) |
| wiretap.spies.com (Wiretap) |
|
|
|
|
| 06. What are some World wide Web (WWW) sites of interest to hackers? |
|
|
| http://alumni.caltech.edu/~dank/isdn/ (ISDN) |
| http://aset.rsoc.rockwell.com (NASA/MOD AIS Security) |
| http://aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec) |
| http://att.net/dir800 (800 directory) |
| http://ausg.dartmouth.edu/security.html (Security) |
| http://cs.purdue.edu/coast/coast.html (Coast) |
| http://csrc.ncsl.nist.gov (NIST) |
| http://dhp.com/~pluvius |
| http://dfw.net/~aleph1 (Eubercrackers) |
| http://draco.centerline.com:8080/~franl/crypto.html (Crypto) |
| http://everest.cs.ucdavis.edu/Security.html (Security) |
| http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides) |
| http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR) |
| http://first.org (FIRST) |
| http://ftp.tamu.edu/~abr8030/security.html (Security) |
| http://hightop.nrl.navy.mil/potpourri.html (Security) |
| http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books) |
| http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling) |
| http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS) |
| http://info.bellcore.com/BETSI/betsi.html (Betsi) |
| http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) |
| http://l0pht.com (The l0pht) |
| http://l0pht.com/~oblivion/IIRG.html (Phantasy Magazine) |
| http://mindlink.jolt.com (The Secrets of LockPicking) |
| http://mls.saic.com (SAIC MLS) |
| http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage) |
| http://nasirc.hq.nasa.gov (NASA ASIRC) |
| http://ophie.hughes.american.edu/~ophie |
| http://ripco.com:8080/~glr/glr.html (Full Disclosure) |
| http://spy.org (CSC) |
| http://tansu.com.au/Info/security.html (Comp and Net Security) |
| http://the-tech.mit.edu (LaMacchia case info) |
| http://wintermute.itd.nrl.navy.mil/5544.html (Network Security) |
| http://www.aads.net (Ameritech) |
| http://www.alw.nih.gov/WWW/security.html (Unix Security) |
| http://www.artcom.de/CCC (CCC Homepage) |
| http://www.aspentec.com/~frzmtdb/fun/hacker.html |
| http://www.aus.xanadu.com:70/1/EFA (EFF Australia) |
| http://www.ba.com (Bell Atlantic) |
| http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win) |
| http://www.bell.com (MFJ Task Force) |
| http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products) |
| http://www.brad.ac.uk/~nasmith/index.html |
| http://www.bst.bls.com (BellSouth) |
| http://www.c3.lanl.gov/~mcn (Lanl) |
| http://www.cert.dfn.de/ (German First Team) |
| http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText) |
| http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html |
| http://www.cpsr.org/home (CPSR) |
| http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk) |
| http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown) |
| http://www.cs.umd.edu/~lgas |
| http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security) |
| http://www.csd.harris.com/secure_info.html (Harris) |
| http://www.csl.sri.com (SRI Computer Science Lab) |
| http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe) |
| http://www.datafellows.fi (Data Fellows) |
| http://www.delmarva.com/raptor/raptor.html (Raptor Network Isolator) |
| http://www.demon.co.uk/kbridge (KarlBridge) |
| http://www.digicash.com/ecash/ecash-home.html (Digital Cash) |
| http://www.digital.com/info/key-secure-index.html(Digital Secure Systems) |
| http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq) |
| http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems) |
| http://www.eff.org/papers.html (EFF) |
| http://www.engin.umich.edu/~jgotts/boxes.html (Box info) |
| http://www.engin.umich.edu/~jgotts/hack-faq.html(This document) |
| http://www.engin.umich.edu/~jgotts/underground.html |
| http://www.ensta.fr/internet/unix/sys_admin (System administration) |
| http://www.etext.org/Zines/ (Zines) |
| http://www.fc.net/defcon (DefCon) |
| http://www.fc.net/phrack.html (Phrack Magazine) |
| http://www.first.org/first/ (FIRST) |
| http://www.greatcircle.com (Great Circle Associates) |
| http://www.hpcc.gov/blue94/section.4.6.html (NSA) |
| http://www.ic.gov (The CIA) |
| http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) |
| http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook) |
| http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide) |
| http://www.net23.com (Max Headroom) |
| http://www.nist.gov (NIST) |
| http://www.pacbell.com (Pacific Bell) |
| http://www.paranoia.com/mthreat (ToneLoc) |
| http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP) |
| http://www.phantom.com/~king (Taran King) |
| http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography) |
| http://www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA) |
| http://www.research.att.com (AT&T) |
| http://ripco.com:8080/~glr/glr.html (Full Disclosure) |
| http://www.rsa.com (RSA Data Security) |
| http://www.satelnet.org/~ccappuc |
| http://www.service.com/cm/uswest/usw1.html (USWest) |
| http://www.shore.net/~oz/welcome.html (Hack TV) |
| http://www.spy.org (Computer Systems Consulting) |
| http://www.sri.com (SRI) |
| http://www.tansu.com.au/Info/security.html (Security Reference Index) |
| http://www.tis.com (Trusted Information Systems) |
| http://www.tri.sbc.com (Southwestern Bell) |
| http://www.uci.agh.edu.pl/pub/security (Security) |
| http://www.umcc.umich.edu/~doug/virus-faq.html (Virus) |
| http://www.usfca.edu/crackdown/crack.html (Hacker Crackdown) |
| http://www.wam.umd.edu/~ankh/Public/devil_does_unix |
| http://www.wiltel.com (Wiltel) |
| http://www.winternet.com/~carolann/dreams.html |
| http://www.wired.com (Wired Magazine) |
|
|
|
|
| 07. What are some IRC channels of interest to hackers? |
|
|
| #2600 |
| #cellular |
| #hack |
| #phreak |
| #linux |
| #realhack |
| #root |
| #unix |
| #warez |
|
|
|
|
| 08. What are some BBS's of interest to hackers? |
|
|
| Rune Stone (203)832-8441 |
| Hacker's Haven (303)343-4053 |
| Independent Nation (315)656-4179 |
| Ut0PiA (315)656-5135 |
| underworld_1994.com (514)683-1894 |
| Digital Fallout (516)378-6640 |
| Alliance Communications (612)251-8596 |
| Maas-Neotek (617)855-2923 |
| Apocalypse 2000 (708)676-9855 |
| K0dE Ab0dE (713)579-2276 |
| fARM R0Ad 666 (713)855-0261 |
| |
|
|
| 09. What are some books of interest to hackers? |
|
|
| General Computer Security |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Computer Security Basics |
| Author: Deborah Russell and G.T. Gengemi Sr. |
| Publisher: O'Reilly & Associates, Inc. |
| Copyright Date: 1991 |
| ISBN: 0-937175-71-4 |
|
|
| This is an excellent book. It gives a broad overview of |
| computer security without sacrificing detail. A must read for |
| the beginning security expert. |
|
|
| Computer Security Management |
| Author: Karen Forcht |
| Publisher: Boyd and Fraser |
| Copyright Date: 1994 |
| ISBN: 0-87835-881-1 |
|
|
| Information Systems Security |
| Author: Philip Fites and Martin Kratz |
| Publisher: Van Nostrad Reinhold |
| Copyright Date: 1993 |
| ISBN: 0-442-00180-0 |
|
|
| Computer Related Risks |
| Author: Peter G. Neumann |
| Publisher: Addison-Wesley |
| Copyright Date: 1995 |
| ISBN: 0-201-55805-X |
|
|
| Computer Security Management |
| Author: Karen Forcht |
| Publisher: boyd & fraser publishing company |
| Copyright Date: 1994 |
| ISBN: 0-87835-881-1 |
|
|
| The Stephen Cobb Complete Book of PC and LAN Security |
| Author: Stephen Cobb |
| Publisher: Windcrest Books |
| Copyright Date: 1992 |
| ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback) |
|
|
| Security in Computing |
| Author: Charles P. Pfleeger |
| Publisher: Prentice Hall |
| Copyright Date: 1989 |
| ISBN: 0-13-798943-1. |
|
|
| Building a Secure Computer System |
| Author: Morrie Gasser |
| Publisher: Van Nostrand Reinhold Co., New York. |
| Copyright Date: |
| ISBN: 0-442-23022-2 |
|
|
| Modern Methods for Computer Security |
| Author: Lance Hoffman |
| Publisher: Prentice Hall |
| Copyright Date: 1977 |
| ISBN: |
|
|
| Windows NT 3.5 Guidelines for Security, Audit and Control |
| Author: |
| Publisher: Microsoft Press |
| Copyright Date: |
| ISBN: 1-55615-814-9 |
|
|
|
|
| Unix System Security |
| ~~~~~~~~~~~~~~~~~~~~ |
| Practical Unix Security |
| Author: Simson Garfinkel and Gene Spafford |
| Publisher: O'Reilly & Associates, Inc. |
| Copyright Date: 1991 |
| ISBN: 0-937175-72-2 |
|
|
| Finally someone with a very firm grasp of Unix system security |
| gets down to writing a book on the subject. Buy this book. |
| Read this book. |
|
|
| Firewalls and Internet Security |
| Author: William Cheswick and Steven Bellovin |
| Publisher: Addison Wesley |
| Copyright Date: 1994 |
| ISBN: 0-201-63357-4 |
|
|
| Unix System Security |
| Author: Rik Farrow |
| Publisher: Addison Wesley |
| Copyright Date: 1991 |
| ISBN: 0-201-57030-0 |
|
|
| Unix Security: A Practical Tutorial |
| Author: N. Derek Arnold |
| Publisher: McGraw Hill |
| Copyright Date: 1993 |
| ISBN: 0-07-002560-6 |
|
|
| Unix System Security: A Guide for Users and Systems Administrators |
| Author: David A. Curry |
| Publisher: Addison-Wesley |
| Copyright Date: 1992 |
| ISBN: 0-201-56327-4 |
|
|
| Unix System Security |
| Author: Patrick H. Wood and Stephen G. Kochan |
| Publisher: Hayden Books |
| Copyright Date: 1985 |
| ISBN: 0-672-48494-3 |
|
|
| Unix Security for the Organization |
| Author: Richard Bryant |
| Publisher: Sams |
| Copyright Date: 1994 |
| ISBN: 0-672-30571-2 |
|
|
|
|
| Network Security |
| ~~~~~~~~~~~~~~~~ |
| Network Security Secrets |
| Author: David J. Stang and Sylvia Moon |
| Publisher: IDG Books |
| Copyright Date: 1993 |
| ISBN: 1-56884-021-7 |
|
|
| Not a total waste of paper, but definitely not worth the |
| $49.95 purchase price. The book is a rehash of previously |
| published information. The only secret we learn from reading |
| the book is that Sylvia Moon is a younger woman madly in love |
| with the older David Stang. |
|
|
| Complete Lan Security and Control |
| Author: Peter Davis |
| Publisher: Windcrest / McGraw Hill |
| Copyright Date: 1994 |
| ISBN: 0-8306-4548-9 and 0-8306-4549-7 |
|
|
| Network Security |
| Author: Steven Shaffer and Alan Simon |
| Publisher: AP Professional |
| Copyright Date: 1994 |
| ISBN: 0-12-638010-4 |
|
|
|
|
| Cryptography |
| ~~~~~~~~~~~~ |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C |
| Author: Bruce Schneier |
| Publisher: John Wiley & Sons |
| Copyright Date: 1994 |
| ISBN: 0-471-59756-2 |
|
|
| Bruce Schneier's book replaces all other texts on |
| cryptography. If you are interested in cryptography, this is |
| a must read. This may be the first and last book on |
| cryptography you may ever need to buy. |
|
|
| Cryptography and Data Security |
| Author: Dorothy Denning |
| Publisher: Addison-Wesley Publishing Co. |
| Copyright Date: 1982 |
| ISBN: 0-201-10150-5 |
|
|
| Protect Your Privacy: A Guide for PGP Users |
| Author: William Stallings |
| Publisher: Prentice-Hall |
| Copyright Date: 1994 |
| ISBN: 0-13-185596-4 |
|
|
|
|
| Programmed Threats |
| ~~~~~~~~~~~~~~~~~~ |
| The Little Black Book of Computer Viruses |
| Author: Mark Ludwig |
| Publisher: American Eagle Publications |
| Copyright Date: 1990 |
| ISBN: 0-929408-02-0 |
|
|
| The original, and still the best, book on computer viruses. |
| No media hype here, just good clean technical information. |
|
|
| Computer Viruses, Artificial Life and Evolution |
| Author: Mark Ludwig |
| Publisher: American Eagle Publications |
| Copyright Date: 1993 |
| ISBN: 0-929408-07-1 |
|
|
| Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other |
| Threats to Your System |
| Author: John McAfee and Colin Haynes |
| Publisher: St. Martin's Press |
| Copyright Date: 1989 |
| ISBN: 0-312-03064-9 and 0-312-02889-X |
|
|
| The Virus Creation Labs: A Journey Into the Underground |
| Author: George Smith |
| Publisher: American Eagle Publications |
| Copyright Date: 1994 |
| ISBN: |
|
|
|
|
| Telephony |
| ~~~~~~~~~ |
| Engineering and Operations in the Bell System |
| Author: R.F. Rey |
| Publisher: Bell Telephont Laboratories |
| Copyright Date: 1983 |
| ISBN: 0-932764-04-5 |
|
|
| Although hopelessly out of date, this book remains *THE* book |
| on telephony. This book is 100% Bell, and is loved by phreaks |
| the world over. |
|
|
| Telephony: Today and Tomorrow |
| Author: Dimitris N. Chorafas |
| Publisher: Prentice-Hall |
| Copyright Date: 1984 |
| ISBN: 0-13-902700-9 |
|
|
| The Telecommunications Fact Book and Illustrated Dictionary |
| Author: Ahmed S. Khan |
| Publisher: Delmar Publishers, Inc. |
| Copyright Date: 1992 |
| ISBN: 0-8273-4615-8 |
|
|
| I find this dictionary to be an excellent reference book on |
| telephony, and I recommend it to anyone with serious |
| intentions in the field. |
|
|
| Tandy/Radio Shack Cellular Hardware |
| Author: Judas Gerard and Damien Thorn |
| Publisher: Phoenix Rising Communications |
| Copyright Date: 1994 |
| ISBN: |
|
|
| The Phone Book |
| Author: Carl Oppendahl |
| Publisher: Consumer Reports |
| Copyright Date: |
| ISBN: 0-89043-364-x |
|
|
| Listing of every cellular ID in the us, plus roaming ports, |
| and info numbers for each carrier. |
|
|
| Principles of Caller I.D. |
| Author: |
| Publisher: International MicroPower Corp. |
| Copyright Date: |
| ISBN: |
|
|
|
|
| Hacking History and Culture |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The Hacker Crackdown: Law and Disorder on the Electronic Frontier |
| Author: Bruce Sterling |
| Publisher: Bantam Books |
| Copyright Date: 1982 |
| ISBN: 0-553-56370-X |
|
|
| Bruce Sterling has recently released the book FREE to the net. |
| The book is much easier to read in print form, and the |
| paperback is only $5.99. Either way you read it, you will be |
| glad you did. Mr. Sterling is an excellent science fiction |
| author and has brought his talent with words to bear on the |
| hacking culture. A very enjoyable reading experience. |
|
|
| Cyberpunk |
| Author: Katie Hafner and John Markoff |
| Publisher: Simon and Schuster |
| Copyright Date: 1991 |
| ISBN: 0-671-77879-X |
|
|
| The Cuckoo's Egg |
| Author: Cliff Stoll |
| Publisher: Simon and Schuster |
| Copyright Date: 1989 |
| ISBN: 0-671-72688-9 |
|
|
| Hackers: Heroes of the Computer Revolution |
| Author: Steven Levy |
| Publisher: Doubleday |
| Copyright Date: 1984 |
| ISBN: 0-440-13495-6 |
|
|
|
|
| Unclassified |
| ~~~~~~~~~~~~ |
| The Hacker's Handbook |
| Author: Hugo Cornwall |
| Publisher: E. Arthur Brown Company |
| Copyright Date: |
| ISBN: 0-912579-06-4 |
|
|
| Secrets of a Super Hacker |
| Author: The Knightmare |
| Publisher: Loompanics |
| Copyright Date: 1994 |
| ISBN: 1-55950-106-5 |
|
|
| The Knightmare is no super hacker. There is little or no real |
| information in this book. The Knightmare gives useful advice |
| like telling you not to dress up before going trashing. |
| The Knightmare's best hack is fooling Loompanics into |
| publishing this garbage. |
|
|
| The Day The Phones Stopped |
| Author: Leonard Lee |
| Publisher: Primus / Donald I Fine, Inc. |
| Copyright Date: 1992 |
| ISBN: 1-55611-286-6 |
|
|
| Total garbage. Paranoid delusions of a lunatic. Less factual |
| data that an average issue of the Enquirer. |
|
|
| Information Warfare |
| Author: Winn Swartau |
| Publisher: Thunder Mountain Press |
| Copyright Date: 1994 |
| ISBN: 1-56025-080-1 |
|
|
| An Illustrated Guide to the Techniques and Equipment of Electronic Warfare |
| Author: Doug Richardson |
| Publisher: Salamander Press |
| Copyright Date: |
| ISBN: 0-668-06497-8 |
|
|
|
|
| 10. What are some videos of interest to hackers? |
|
|
| 'Unauthorized Access' by Annaliza Savage |
| $25 on VH S format in 38-min |
| Savage Productions |
| 1803 Mission St., #406 |
| Santa Cruz, CA 95060 |
|
|
|
|
| 11. What are some mailing lists of interest to hackers? |
|
|
| Academic Firewalls |
| Reflector Address: |
| Registration Address: Send a message to majordomo@greatcircle.com |
| containing the line "subscribe firewalls user@host" |
|
|
| Bugtraq |
| Reflector Address: bugtraq@fc.net |
| Registration Address: bugtraq-request@fc.net |
|
|
| Cert Tools |
| Reflector Address: cert-tools@cert.org |
| Registration Address: cert-tools-request@cert.org |
|
|
| Computers and Society |
| Reflector Address: Comp-Soc@limbo.intuitive.com |
| Registration Address: taylor@limbo.intuitive.com |
|
|
| Coordinated Feasibility Effort to Unravel State Data |
| Reflector Address: ldc-sw@cpsr.org |
| Registration Address: |
|
|
| CPSR Announcement List |
| Reflector Address: cpsr-announce@cpsr.org |
| Registration Address: |
|
|
| CPSR - Intellectual Property |
| Reflector Address: cpsr-int-prop@cpsr.org |
| Registration Address: |
|
|
| CPSR - Internet Library |
| Reflector Address: cpsr-library@cpsr.org |
| Registration Address: |
|
|
| DefCon Announcement List |
| Reflector Address: |
| Registration Address: Send a message to majordomo@fc.net containing |
| the line "subscribe dc-announce" |
|
|
| DefCon Chat List |
| Reflector Address: |
| Registration Address: Send a message to majordomo@fc.net containing |
| the line "subscribe dc-stuff" |
|
|
| IDS (Intruder Detection Systems) |
| Reflector Address: |
| Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au |
| containing the line "subscribe ids" |
|
|
| Macintosh Security |
| Reflector Address: mac-security@eclectic.com |
| Registration Address: mac-security-request@eclectic.com |
|
|
| NeXT Managers |
| Reflector Address: |
| Registration Address: next-managers-request@stolaf.edu |
|
|
| Phiber-Scream |
| Reflector Address: |
| Registration Address: Send a message to listserv@netcom.com |
| containing the line "subscribe phiber-scream user@host" |
|
|
| phruwt-l (Macintosh H/P) |
| Reflector Address: |
| Registration Address: Send a message to filbert@netcom.com |
| with the subject "phruwt-l" |
|
|
| rfc931-users |
| Reflector Address: rfc931-users@kramden.acf.nyu.edu |
| Registration Address: brnstnd@nyu.edu |
|
|
| RSA Users |
| Reflector Address: rsaref-users@rsa.com |
| Registration Address: rsaref-users-request@rsa.com |
|
|
|
|
| 12. What are some print magazines of interest to hackers? |
|
|
| 2600 - The Hacker Quarterly |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| E-mail address: 2600@well.sf.ca.us |
|
|
| Subscription Address: 2600 Subscription Dept |
| PO Box 752 |
| Middle Island, NY 11953-0752 |
|
|
| Letters and article submission address: 2600 Editorial Dept |
| PO Box 99 |
| Middle Island, NY 11953-0099 |
|
|
| Subscriptions: United States: $21/yr individual, $50 corporate. |
| Overseas: $30/yr individual, $65 corporate. |
|
|
|
|
| Gray Areas |
| ~~~~~~~~~~ |
| Gray Areas examines gray areas of law and morality and subject matter |
| which is illegal, immoral and/oe controversial. Gray Areas explores |
| why hackers hack and puts hacking into a sociological framework of |
| deviant behavior. |
|
|
| E-Mail Address: grayarea@well.sf.ca.us |
| E-Mail Address: grayarea@netaxs.com |
|
|
| U.S. Mail Address: Gray Areas |
| PO Box 808 |
| Broomall, PA 19008 |
|
|
| Subscriptions: $26.00 4 issues first class |
| $34.00 4 issues foreign (shipped air mail) |
|
|
|
|
| Wired |
| ~~~~~ |
| Subscription Address: subscriptions@wired.com |
| or: Wired |
| PO Box 191826 |
| San Francisco, CA 94119-9866 |
|
|
| Letters and article submission address: guidelines@wired.com |
| or: Wired |
| 544 Second Street |
| San Francisco, CA 94107-1427 |
|
|
| Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas) |
|
|
|
|
| Nuts & Volts |
| ~~~~~~~~~~~~ |
| T& L Publications |
| 430 Princeland Court |
| Corona, CA 91719 |
| (800)783-4624 (Voice) (Subscription Only Order Line) |
| (909)371-8497 (Voice) |
| (909)371-3052 (Fax) |
| CIS: 74262,3664 |
|
|
|
|
| 13. What are some e-zines of interest to hackers? |
|
|
| CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo |
| Empire Times ftp.etext.org /pub/Zines/Emptimes |
| Phrack ftp.fc.net /pub/phrack |
|
|
|
|
| 14. What are some organizations of interest to hackers? |
|
|
| Computer Professionals for Social Responsibility (CPSR) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| CPSR empowers computer professionals and computer users to advocate |
| for the responsible use of information technology and empowers all who |
| use computer technology to participate in the public debate. As |
| technical experts, CPSR members provide the public and policymakers |
| with realistic assessments of the power, promise, and limitations of |
| computer technology. As an organization of concerned citizens, CPSR |
| directs public attention to critical choices concerning the |
| applications of computing and how those choices affect society. |
|
|
| By matching unimpeachable technical information with policy |
| development savvy, CPSR uses minimum dollars to have maximum impact |
| and encourages broad public participation in the shaping of technology |
| policy. |
|
|
| Every project we undertake is based on five principles: |
|
|
| * We foster and support public discussion of and public |
| responsibility for decisions involving the use of computers in |
| systems critical to society. |
|
|
| * We work to dispel popular myths about the infallibility of |
| technological systems. |
|
|
| * We challenge the assumption that technology alone can solve |
| political and social problems. |
|
|
| * We critically examine social and technical issues within the |
| computer profession, nationally and internationally. |
|
|
| * We encourage the use of computer technology to improve the quality |
| of life. |
|
|
| CPSR Membership Categories |
| 75 REGULAR MEMBER |
| 50 Basic member |
| 200 Supporting member |
| 500 Sponsoring member |
| 1000 Lifetime member |
| 20 Student/low income member |
| 50 Foreign subscriber |
| 50 Library/institutional subscriber |
|
|
| CPSR National Office |
| P.O. Box 717 |
| Palo Alto, CA 94301 |
| 415-322-3778 |
| 415-322-3798 (FAX) |
| E-mail: cpsr@csli.stanford.edu |
|
|
|
|
| Electronic Frontier Foundation (EFF) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The Electronic Frontier Foundation (EFF) is dedicated to the pursuit |
| of policies and activities that will advance freedom and openness in |
| computer-based communications. It is a member-supported, nonprofit |
| group that grew from the conviction that a new public interest |
| organization was needed in the information age; that this organization |
| would enhance and protect the democratic potential of new computer |
| communications technology. From the beginning, the EFF determined to |
| become an organization that would combine technical, legal, and public |
| policy expertise, and would apply these skills to the myriad issues |
| and concerns that arise whenever a new communications medium is born. |
|
|
| Memberships are $20.00 per year for students, $40.00 per year for |
| regular members, and $100.00 per year for organizations. |
|
|
| The Electronic Frontier Foundation, Inc. |
| 666 Pennsylvania Avenue S.E., Suite 303 |
| Washington, D.C. 20003 |
| +1 202 544 9237 |
| +1 202 547 5481 FAX |
| Internet: eff@eff.org |
|
|
|
|
| Free Software Foundation (FSF) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
|
|
| GNU |
| ~~~ |
|
|
|
|
| The League for Programming Freedom (LPF) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The League for Programming Freedom is an organization of people who |
| oppose the attempt to monopolize common user interfaces through "look |
| and feel" copyright lawsuits. Some of us are programmers, who worry |
| that such monopolies will obstruct our work. Some of us are users, |
| who want new computer systems to be compatible with the interfaces we |
| know. Some are founders of hardware or software companies, such as |
| Richard P. Gabriel. Some of us are professors or researchers, |
| including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. |
| Boyer and Patrick Winston. |
|
|
| "Look and feel" lawsuits aim to create a new class of government- |
| enforced monopolies broader in scope than ever before. Such a system |
| of user-interface copyright would impose gratuitous incompatibility, |
| reduce competition, and stifle innovation. |
|
|
| We in the League hope to prevent these problems by preventing |
| user-interface copyright. The League is NOT opposed to copyright law |
| as it was understood until 1986 -- copyright on particular programs. |
| Our aim is to stop changes in the copyright system which would take |
| away programmers' traditional freedom to write new programs compatible |
| with existing programs and practices. |
|
|
| Annual dues for individual members are $42 for employed professionals, |
| $10.50 for students, and $21 for others. We appreciate activists, but |
| members who cannot contribute their time are also welcome. |
|
|
| To contact the League, phone (617) 243-4091, send Internet mail to the |
| address league@prep.ai.mit.edu, or write to: |
|
|
| League for Programming Freedom |
| 1 Kendall Square #143 |
| P.O. Box 9171 |
| Cambridge, MA 02139 USA |
|
|
|
|
| SotMesc |
| ~~~~~~~ |
| Founded in 1989, SotMesc is dedicated to preserving the integrity and |
| cohesion of the computing society. By promoting computer education, |
| liberties and efficiency, we believe we can secure freedoms for all |
| computer users while retaining privacy. |
|
|
| SotMesc maintains the CSP Internet mailing list, the SotMesc |
| Scholarship Fund, and the SotMesc Newsletter. |
|
|
| The SotMESC is financed partly by membership fees, and donations, but |
| mostly by selling hacking, cracking, phreaking, electronics, internet, |
| and virus information and programs on disk and bound paper media. |
|
|
| SotMesc memberships are $20 to students and $40 to regular members. |
|
|
| SotMESC |
| P.O. Box 573 |
| Long Beach, MS 39560 |
|
|
|
|
| Computer Emergency Response Team (CERT |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| CERT is the Computer Emergency Response Team that was formed by the |
| Defense Advanced Research Projects Agency (DARPA) in November 1988 in |
| response to the needs exhibited during the Internet worm incident. |
| The CERT charter is to work with the Internet community to facilitate |
| its response to computer security events involving Internet hosts, to |
| take proactive steps to raise the community's awareness of computer |
| security issues, and to conduct research targeted at improving the |
| security of existing systems. |
|
|
| CERT products and services include 24-hour technical assistance for |
| responding to computer security incidents, product vulnerability |
| assistance, technical documents, and seminars. In addition, the team |
| maintains a number of mailing lists (including one for CERT |
| advisories) and provides an anonymous FTP server: cert.org |
| (192.88.209.5), where security-related documents, past CERT |
| advisories, and tools are archived. |
|
|
| CERT contact information: |
|
|
| U.S. mail address |
| CERT Coordination Center |
| Software Engineering Institute |
| Carnegie Mellon University |
| Pittsburgh, PA 15213-3890 |
| U.S.A. |
|
|
| Internet E-mail address |
| cert@cert.org |
|
|
| Telephone number |
| (412)268-7090 (24-hour hotline) |
| CERT Coordination Center personnel answer |
| 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for |
| emergencies during other hours. |
|
|
| FAX number |
| (412)268-6989 |
|
|
|
|
| 15. Where can I purchase a magnetic stripe encoder/decoder? |
|
|
| CPU Advance |
| PO Box 2434 |
| Harwood Station |
| Littleton, MA 01460 |
| (508)624-4819 (Fax) |
|
|
| Omron Electronics, Inc. |
| One East Commerce Drive |
| Schaumburg, IL 60173 |
| (800)556-6766 (Voice) |
| (708)843-7787 (Fax) |
|
|
| Security Photo Corporation |
| 1051 Commonwealth Avenue |
| Boston, MA 02215 |
| (800)533-1162 (Voice) |
| (617)783-3200 (Voice) |
| (617)783-1966 (Voice) |
|
|
| Timeline Inc, |
| 23605 Telo Avenue |
| Torrence, CA 90505 |
| (800)872-8878 (Voice) |
| (800)223-9977 (Voice) |
|
|
| Alltronics |
| 2300 Zanker Road |
| San Jose CA 95131 |
| (408) 943-9774 Voice |
| (408) 943-9776 Fax |
| (408) 943-0622 BBS |
| Part Number: 92U067 |
|
|
| Atalla Corp |
| San Jose, CA |
| (408) 435-8850 |
|
|
|
|
| 16. What are the rainbow books and how can I get them? |
|
|
| Orange Book |
| DoD 5200.28-STD |
| Department of Defense Trusted Computer System Evaluation Criteria |
|
|
| Green Book |
| CSC-STD-002-85 |
| Department of Defense Password Management Guideline |
|
|
| Yellow Book |
| CSC-STD-003-85 |
| Computer Security Requirements -- Guidance for Applying the Department |
| of Defense Trusted Computer System Evaluation Criteria in Specific |
| Environments |
|
|
| Yellow Book |
| CSC-STD-004-85 |
| Technical Rationale Behind CSC-STD-003-85: Computer Security |
| Requirements. Guidance for Applying the Department of Defense Trusted |
| Computer System Evaluation Criteria in Specific Environments. |
|
|
| Tan Book |
| NCSC-TG-001 |
| A Guide to Understanding Audit in Trusted Systems |
|
|
| Bright Blue Book |
| NCSC-TG-002 |
| Trusted Product Evaluation - A Guide for Vendors |
|
|
| Neon Orange Book |
| NCSC-TG-003 |
| A Guide to Understanding Discretionary Access Control in Trusted |
| Systems |
|
|
| Teal Green Book |
| NCSC-TG-004 |
| Glossary of Computer Security Terms |
|
|
| Red Book |
| NCSC-TG-005 |
| Trusted Network Interpretation of the Trusted Computer System |
| Evaluation Criteria |
|
|
| Orange Book |
| NCSC-TG-006 |
| A Guide to Understanding Configuration Management in Trusted Systems |
|
|
| Burgundy Book |
| NCSC-TG-007 |
| A Guide to Understanding Design Documentation in Trusted Systems |
|
|
| Dark Lavender Book |
| NCSC-TG-008 |
| A Guide to Understanding Trusted Distribution in Trusted Systems |
|
|
| Venice Blue Book |
| NCSC-TG-009 |
| Computer Security Subsystem Interpretation of the Trusted Computer |
| System Evaluation Criteria |
|
|
| Aqua Book |
| NCSC-TG-010 |
| A Guide to Understanding Security Modeling in Trusted Systems |
|
|
| Dark Red Book |
| NCSC-TG-011 |
| Trusted Network Interpretation Environments Guideline -- Guidance for |
| Applying the Trusted Network Interpretation |
|
|
| Pink Book |
| NCSC-TG-013 |
| Rating Maintenance Phase -- Program Document |
|
|
| Purple Book |
| NCSC-TG-014 |
| Guidelines for Formal Verification Systems |
|
|
| Brown Book |
| NCSC-TG-015 |
| A Guide to Understanding Trusted Facility Management |
|
|
| Yellow-Green Book |
| NCSC-TG-016 |
| Guidelines for Writing Trusted Facility Manuals |
|
|
| Light Blue |
| NCSC-TG-017 |
| A Guide to Understanding Identification and Authentication in Trusted |
| Systems |
|
|
| Light Blue Book |
| NCSC-TG-018 |
| A Guide to Understanding Object Reuse in Trusted Systems |
|
|
| Blue Book |
| NCSC-TG-019 |
| Trusted Product Evaluation Questionnaire |
|
|
| Gray Book |
| NCSC-TG-020A |
| Trusted Unix Working Group (TRUSIX) Rationale for Selecting |
| Access Control List Features for the Unix System |
|
|
| Lavender Book |
| NCSC-TG-021 |
| Trusted Data Base Management System Interpretation of the Trusted |
| Computer System Evaluation Criteria |
|
|
| Yellow Book |
| NCSC-TG-022 |
| A Guide to Understanding Trusted Recovery in Trusted Systems |
|
|
| Bright Orange Book |
| NCSC-TG-023 |
| A Guide to Understandng Security Testing and Test Documentation in |
| Trusted Systems |
|
|
| Purple Book |
| NCSC-TG-024 (Volume 1/4) |
| A Guide to Procurement of Trusted Systems: An Introduction to |
| Procurement Initiators on Computer Security Requirements |
|
|
| Purple Book |
| NCSC-TG-024 (Volume 2/4) |
| A Guide to Procurement of Trusted Systems: Language for RFP |
| Specifications and Statements of Work - An Aid to Procurement |
| Initiators |
|
|
| Purple Book |
| NCSC-TG-024 (Volume 3/4) |
| A Guide to Procurement of Trusted Systems: Computer Security Contract |
| Data Requirements List and Data Item Description Tutorial |
|
|
| +Purple Book |
| +NCSC-TG-024 (Volume 4/4) |
| +A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's |
| +Proposal Document - An Aid to Procurement Initiators and Contractors |
|
|
| Green Book |
| NCSC-TG-025 |
| A Guide to Understanding Data Remanence in Automated Information |
| Systems |
|
|
| Hot Peach Book |
| NCSC-TG-026 |
| A Guide to Writing the Security Features User's Guide for Trusted Systems |
|
|
| Turquiose Book |
| NCSC-TG-027 |
| A Guide to Understanding Information System Security Officer |
| Responsibilities for Automated Information Systems |
|
|
| Violet Book |
| NCSC-TG-028 |
| Assessing Controlled Access Protection |
|
|
| Blue Book |
| NCSC-TG-029 |
| Introduction to Certification and Accreditation |
|
|
| Light Pink Book |
| NCSC-TG-030 |
| A Guide to Understanding Covert Channel Analysis of Trusted Systems |
|
|
| C1 Technical Report-001 |
| Computer Viruses: Prevention, Detection, and Treatment |
|
|
| *C Technical Report 79-91 |
| *Integrity in Automated Information Systems |
|
|
| *C Technical Report 39-92 |
| *The Design and Evaluation of INFOSEC systems: The Computer Security |
| *Contributions to the Composition Discussion |
|
|
| NTISSAM COMPUSEC/1-87 |
| Advisory Memorandum on Office Automation Security Guideline |
|
|
| -- |
|
|
| You can get your own free copy of any or all of the books by writing |
| or calling: |
|
|
| INFOSEC Awareness Division |
| ATTN: X711/IAOC |
| Fort George G. Meade, MD 20755-6000 |
|
|
| Barbara Keller |
| (410) 766-8729 |
|
|
| If you ask to be put on the mailing list, you'll get a copy of each new |
| book as it comes out (typically a couple a year). |
|
|
| [* == I have not personally seen this book] |
| [+ == I have not personally seen this book, and I believe it may not] |
| [ be available] |
|
|
|
|
|
|
|
|
| Section D: 2600 |
| ~~~~~~~~~~~~~~~ |
|
|
| 01. What is alt.2600? |
|
|
| Alt.2600 is a Usenet newsgroup for discussion of material relating to |
| 2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600 |
| game machine. Len@netsys.com created the group on Emmanuel |
| Goldstein's recommendation. Emmanuel is the editor/publisher of 2600 |
| Magazine. Following the barrage of postings about the Atari machine to |
| alt.2600, an alt.atari.2600 was created to divert all of the atari |
| traffic from alt.2600. Atari 2600 people are advised to hie over to |
| rec.games.video.classic. |
|
|
|
|
| 02. What does "2600" mean? |
|
|
| 2600Hz was a tone that was used by early phone phreaks (or |
| phreakers) in the 80's, and some currently. If the tone was sent down the |
| line at the proper time, one could get away with all sorts of fun stuff. |
|
|
| A note from Emmanuel Goldstein: |
| |
| "The Atari 2600 has NOTHING to do with blue boxes or telephones |
| or the 2600 hertz tone. The 2600 hertz tone was simply the first |
| step towards exploring the network. If you were successful at |
| getting a toll call to drop, then billing would stop at that |
| point but there would be billing for the number already dialed |
| up until the point of seizure. 800 numbers and long distance |
| information were both free in the past and records of who called |
| what were either non-existent or very obscure with regards to |
| these numbers. This, naturally, made them more popular than |
| numbers that showed up on a bill, even if it was only for |
| a minute. Today, many 800 numbers go overseas, which provides |
| a quick and free way into another country's phone system |
| which may be more open for exploration." |
|
|
|
|
| 03. Are there on-line versions of 2600 available? |
|
|
| No. |
|
|
|
|
| 04. I can't find 2600 at any bookstores. What can I do? |
|
|
| Subscribe. Or, let 2600 know via the subscription address that you |
| think 2600 should be in the bookstore. Be sure to include the |
| bookstores name and address. |
|
|
|
|
| 05. Why does 2600 cost more to subscribe to than to buy at a newsstand? |
|
|
| A note from Emmanuel Goldstein: |
|
|
| We've been selling 2600 at the same newsstand price ($4) since 1988 |
| and we hope to keep it at that price for as long as we can get away |
| with it. At the same time, $21 is about the right price to cover |
| subscriber costs, including postage and record keeping, etc. People |
| who subscribe don't have to worry about finding an issue someplace, |
| they tend to get issues several weeks before the newsstands get |
| them, and they can take out free ads in the 2600 Marketplace. |
|
|
| This is not uncommon in the publishing industry. The NY Times, for |
| example, costs $156.50 at the newsstands, and $234.75 delivered to your |
| door. |
|
|
|
|
| Section E: Phrack Magazine |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| 01. What Is Phrack Magazine? |
|
|
| Phrack Magazine is one of the longest running electronic-based publications |
| in the world. Originally founded in 1985 by Knight Lightning and Taran |
| King, it has survived several incarnations of editors and still remains |
| true to its underground roots. Since its inception, Phrack has been |
| providing the hacker community with information on operating systems, |
| networking technologies and telephony, as well as relaying human interest |
| features of interest to the international computer underground. |
|
|
| During its lifetime, Phrack has always been at the center of controversy. |
| Since the magazine has always been openly available, it presented law |
| enforcement officials with what they percieved to be a direct link into |
| the secret society of computer hackers. Not truly understnding either |
| the the spirit of the magazine or the community for which it was written, |
| Federal Agents and Prosecutors began to target Phrack Magazine and those |
| affiliated with it. |
|
|
| "The Hacker Crackdown" by Bruce Sterling relays the details surrounding |
| some of these events. |
|
|
| Phrack Magazine is now in its 10th year of publication, and is registered |
| with the Library of Congress as ISSN 1068-1035, and is protected by |
| US Copyright Law. |
|
|
| 02. How can I reach Phrack Magazine? |
|
|
| You can reach Phrack by email at: phrack@well.com, phrack@fc.net or |
| phrackmag@aol.com. These addresses are listed in order of |
| preference. Only AOL users should email the phrackmag@aol.com. |
|
|
| Phrack can be reached by the postal service at: |
|
|
| Phrack Magazine |
| 603 W. 13th #1A-278 |
| Austin, TX 78701 |
|
|
| 03. Who Publishes Phrack? |
|
|
| Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe. It is |
| hobbled together, touched up, spell checked and compressed on an overworked |
| 486-66. It is then ftp'ed over to a BSDI UNIX machine where it is sent to |
| the masses. |
|
|
| 04. How Often Does Phrack Go Out? |
|
|
| Phrack goes out roughly quarterly. It is often sent out later than every |
| three months due to other more demanding obligations faced by its editor. |
| The regularity of Phrack is really based upon the amount of information |
| sent in. Phrack depends solely upon submissions to get published at all. |
|
|
| 05. How Do I Subscribe? |
|
|
| To subscribe to Phrack magazine, merely email phrack@well.com and ask to |
| be placed on the mailing list. |
|
|
| Any encrypted subscriptions requests will be ignored. |
|
|
| Phrack will not accept subscription requests from any anonymous remailers or |
| from sites in the fidonet domain. The anonymous remailers consistently |
| bounce our mailings causing a big headache, so we won't use them. The |
| fidonet domain administrators have asked us not to mail Phrack to fido users, |
| because of the huge load it places on their outgoing spools (costing them a |
| lot of money to send). |
|
|
| 06. Why Don't I Get Any Response When I E-mail Phrack? |
|
|
| Because of the high volume of mail sent to the Phrack email address, |
| not everyone gets a response. All subscription requests are saved and |
| added to the master list, but there is no automatic reply. All other |
| messages are responded to as they are read, with the exception of PGP'd |
| messages. All PGP'd email is stored for later decryption, and is almost |
| never responded to, unless it is incredibly urgent. |
|
|
| 07. Does Phrack Cost Money? |
|
|
| Phrack Magazine charges a registration fee of $100.00 per user for any |
| professional use of the magazine and the information contained therein. |
| Information regarding this registration fee is contained at the beginning |
| of every issue of Phrack. |
|
|
| 08. How Can I Submit Articles? |
|
|
| Articles are both wanted and needed. Phrack only exists if people write |
| for it. There is no regular writing staff, there is only the editor, who |
| cannot write the entire thing himself. |
|
|
| Articles can be sent to Phrack via email or snailmail (on paper or |
| IBM-compatible diskette). Articles should be in ASCII text format. Do |
| not include any clever graphics or ANSI art. You can use Phrack's PGP key |
| to encrypt articles, but send the files in the ASCII armor format. |
|
|
| Please try to avoid sending files as MIME-compliant mail attachments. |
|
|
| 09. What Is Phrack's PGP Key? |
|
|
| -----BEGIN PGP PUBLIC KEY BLOCK----- |
| Version: 2.6 |
|
|
| mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP |
| Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk |
| Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR |
| tBRwaHJhY2tAd2VsbC5zZi5jYS51cw== |
| =evjv |
| -----END PGP PUBLIC KEY BLOCK----- |
|
|
| 10. Where Can I Get Back Issues? |
|
|
| Back issues of Phrack are found on many bulletin boards around the globe. |
| The only OFFICIAL Phrack Magazine distribution site is our ftp archive |
| at ftp.fc.net in /pub/phrack. There are NO official distribution sites |
| other than this one, nor will there ever be. We don't want to play |
| favorites and let one particular BBS call itself an "official" site while |
| another isn't. Therefore, there will be no "official" sites except those |
| archived by Phrack itself. |
|
|
| You can also get back issues on the World Wide Web by connecting to: |
| http://www.fc.net/phrack.html |
|
|
| This URL allows users to view issues online, or pull them down for |
| later viewing. |
|
|
| Any users without net access can send diskettes and postage to the |
| Phrack Postal Address given above, and request back issues to be |
| sent via the postal system. |
|
|
| Section F: Miscellaneous |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| 01. What does XXX stand for? |
|
|
| TLA Three Letter Acronym |
|
|
| ACL Access Control List |
| PIN Personal Identification Number |
| TCB Trusted Computing Base |
|
|
| ALRU Automatic Line Record Update |
| AN Associated Number |
| ARSB Automated Repair Service Bureau |
| ATH Abbreviated Trouble History |
| BOC Bell Operating Company |
| BOR Basic Output Report |
| BOSS Business Office Servicing System |
| CA Cable |
| COE Central Office Equipment |
| COSMOS Computer System for Main Frame Operations |
| CMC Construction Maintenance Center |
| CNID Calling Number IDentification |
| CO Central Office |
| COCOT Customer Owned Coin Operated Telephone |
| CRSAB Centralized Repair Service Answering Bureau |
| DDD Direct Distance Dialing |
| ECC Enter Cable Change |
| LD Long Distance |
| LMOS Loop Maintenance Operations System |
| MLT Mechanized Loop Testing |
| NPA Numbering Plan Area |
| POTS Plain Old Telephone Service |
| RBOC Regional Bell Operating Company |
| RSB Repair Service Bureau |
| SS Special Service |
| TAS Telephone Answering Service |
| TH Trouble History |
| TREAT Trouble Report Evaluation and Analysis Tool |
|
|
| LOD Legion of Doom |
| HFC Hell Fire Club |
| TNO The New Order |
|
|
| ACiD Ansi Creators in Demand |
| CCi Cybercrime International |
| FLT Fairlight |
| iCE Insane Creators Enterprise |
| iNC International Network of Crackers |
| NTA The Nocturnal Trading Alliance |
| PDX Paradox |
| PE Public Enemy |
| PSY Psychose |
| QTX Quartex |
| RZR Razor (1911) |
| S!P Supr!se Productions |
| TDT The Dream Team |
| THG The Humble Guys |
| THP The Hill People |
| TRSI Tristar Red Sector Inc. |
| UUDW Union of United Death Workers |
|
|
|
|
| 02. How do I determine if I have a valid credit card number? |
|
|
| Credit cards use the Luhn Check Digit Algorithm. The main purpose of |
| this algorithm is to catch data entry errors, but it does double duty |
| here as a weak security tool. |
|
|
| For a card with an even number of digits, double every odd numbered |
| digit and subtract 9 if the product is greater than 9. Add up all the |
| even digits as well as the doubled-odd digits, and the result must be |
| a multiple of 10 or it's not a valid card. If the card has an odd |
| number of digits, perform the same addition doubling the even numbered |
| digits instead. |
|
|
|
|
| 03. What bank issued this credit card? |
|
|
| 1033 Manufacturers Hanover Trust |
| 1035 Citibank |
| 1263 Chemical Bank |
| 1665 Chase Manhattan |
| 4024 Bank of America |
| 4128 Citicorp |
| 4209 New Era Bank |
| 4302 HHBC |
| 4310 Imperial Savings |
| 4313 MBNA |
| 4317 California Federal |
| 5282 Wells Fargo |
| 5424 Citibank |
| 5410 Wells Fargo |
| 5432 Bank of New York |
| 6017 MBNA |
|
|
|
|
| 04. What are the ethics of hacking? |
|
|
| An excerpt from: Hackers: Heroes of the Computer Revolution |
| by Steven Levy |
|
|
| Access to computers -- and anything which might teach you |
| something about the way the world works -- should be unlimited |
| and total. Always yield to the Hands-On imperative. |
|
|
| All information should be free. |
|
|
| Mistrust Authority. Promote Decentralization. |
|
|
| Hackers should be judged by their hacking, not bogus criteria |
| such as degrees, age, race, or position. |
|
|
| You can create art and beauty on a computer. |
|
|
| Computers can change your life for the better. |
|
|
|
|
| 04. Where can I get a copy of the alt.2600/#hack FAQ? |
|
|
| Get it on FTP at: |
| rahul.net /pub/lps |
| rtfm.mit.edu /pub/usenet-by-group/alt.2600 |
| ftp.clark.net /pub/jcase |
|
|
| Get it on the World Wide Web at: |
| http://dfw.net/~aleph1 |
| http://www.engin.umich.edu/~jgotts/hack-faq.html |
| http://www.phantom.com/~king |
|
|
| Get it from these BBS's: |
| Hacker's Haven (303)343-4053 |
|
|
|
|
|
|
|
|
|
|
| EOT |
|
|