💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › 2600_ind captured on 2021-12-03 at 14:04:38.
View Raw
More Information
-=-=-=-=-=-=-
2600 Subject Index Volumes 1 (1984) - 10 (1993)
David Price
Subjects are shown in the first column, citations are listed in the
second column using the following format:
V(N):P V = Volume, N = Number, P = Page
(L) Indicates a letter
00 4(9):6
10698 7(1):30(L)
(201) 6(2):20
202 bug 3(9):65
2600 Magazine 1(1):1, 2(8):51, 4(12):3
2600 meetings 10(2):17, 10(2):16, 10(4):35, 7(1):38,
10(1):43, 10(3):18, 9(4):4
2600--voice bbs 9(3):40(L)
2600--BBS 2(2):9, 2(8):49
4TEL 6(3):20
(516) 5(3):14
540s 8(1):19
550 blocking 4(11):8
"606 Emergency" 5(1):24(L)
6.5536 crystal 7(3):32
(707) 7(1):44
800s 6(1):12, 2(6):37, 6(1):12
800--DTMF recognition 3(12):92(L)
800--tariffs 2(1):4(L)
800--translation table 6(1):12
8038 chip 4(12):22(L), 4(10):12(L)
900s 2(11):79
900 translation table 6(1):12
911 1(10):57, 7(1):37,
911--documents 7(2):4
959 Numbers 4(5):8
97*s 4(10):4
976 scam 4(7):8
976 social interactions 4(12):17
9999-suffixes 1(1):4
access 3(11):84(L)
ACD 9(3):28(L)
ACM SIGSOFT 4(11):13(L)
acronym maker 4(1):13(L)
acronyms 10(1):34, 10(2):20, 2(2):11, 10(3):44,
8(1):42
ACTS 6(1):30, 1(11):62
ADS 1(9):53, 1(5):2, 1(1):2
ADS--Investigation 1(2):9
Albania 7(1):23
Allah Akbar! 3(11):86
Allnet 5(2):2, 4(6):4
alliance 2(5):26
American Express--hacking 3(3):17
AmiExpress--hacking 9(3):4
ANAC Guide 7(3):39
ANI Hunting 4(1):18(L), 3 (11):84
ANSI Bomb 10(2):44
answer supervision 3(9):65
anti-hacker propaganda 2(1):1, 7(2):11
AOS 5(3):10
Approaching Zero Book Review 10(3):38
ARAPANet 1(6):1
Area Code Expansion 1(3):3
ARPANet military subnet 1(3):5
Arpanet 4(9):4
arrests...see busts
AT&T Break-up 1(6):4, 2(11):74
AT&T failure 6(4):4
AT&T Shutdown 6(4):4
AT&T Strike 1(4):1
AT&T Thought Police 2(11):79
ATM III 4(6):12(L)
ATMs 1(4):3, 4(7):8
ATMs, Book Reviews 4(2):21
atomic bomb 1(3):4
ATT Addresses 9(4):36
Australian phone system 9(1):31
Automatic Call Distributor 9(3):28(L)
AUTOVON 3(5):37, 4(6):18(L), 3(3):17, 6(1):7, 9(4):19
baby bells 1(7):3
back doors 2(1):2
bank records 1(5):3, 2(7):42
BASIC 3(1):5
BASIC dialer program 5(1):20
basic phreaking Q & A 6(2):29(L)
BASIC Red Box Tones 5(3):22
basic terms 4(5):13(L)
BBS Disclaimers 4(7):12(L), 4(10):16
BBS--Government 10(2):39
BBS--Protecting a User Log 3(2):16(L)
beepers 4(11):12(L)
Bell computers 9(4):42
Bell Routing Codes 5(1):42
Bellco cops 5(1):22
Bellcore Publications 3(5):36
Best Boast 5(1):24(L)
Big Brother 3(12):91, 9(1):42, 8(4):8, 1(12):68, 7(3):16,
1(8):44
billing signals 3(9):65
BIN list 8(2):31
BITnet 2(1):6, 4(9):4
black band 4(11):7
BLV (Busy Line Verification) 5(3):27(L), 8(4):42, 4(12):10
bogus tap-check number myth 4(2):13(L)
Box--Beige 5(4):42, 10(1):14, 10(3):9
Box--Blue 3(2):12 (L), 2(10):69, 9(4):33, 2(2):7,
3(5):36 (L), 10(3):9, 6(1):25 (L), 3(5):38
Box--Clear 1(7):4
Box--Combo 9(3):13
Box--General info 10(3):9, 5(1):16
Box--Green 7(1):29 (L), 10(3):9
Box--Rainbow 10(3):9, 9(2):15
Box--Red 5(2):13, 10(2):42, 7(3):32, 8(3):43, 10(3):9
9(3):13
Box--Silver in U.K. 7(1):19
Box--Silver 6(4):20, 9(4):19, 9(1):16, 10(3):9, 1(11):64
(L), 3(3):17
Box--White 2(4):19, 10(3):9
Box--yellow 10(3):9
braille computer 3(12):95
British Telecom 8(2):35
British Payphones 4(10):17(L)
busts 4(3):18, 4(7):18 (L), 6(2):26 (L), 4(7):6,
2(5):27, 1(7):7, 3(12):91, 2(2):9, 8(4):36,
1(10):55, 10(4):4, 8(3):4, 7(3):44, 8(2):4,
4(8):3, 8(4):8, 7(3):10, 7(1):3, 6(1):3,
8(1):11, 8(2):12, 8(1):11, 6(2):34, 9(2):22
Busy Line Verification...see BLV
busy 10(4):9
busy--"fast busy tones" 5(2):27(L)
busy--busy verification 3(10):80(L)
cable descrambling 10(1):16, 3(8):63
cable vaults 7(4):12
Call Forwarding, Diverting 2(10):65
Call-Waiting Phone Tap 6(3):27
callback verification 9(3):9
Caller ID 3(12):91, 8(1):19, 9(2):18, 7(3):5, 10(3):12,
8(2):22, 8(2):35
Caller ID--and Cell Phones 10(3):42
calling ards 1(4):3, 1(6):3, 1(1):3, 1(2):9
call records (ESS) 1(2):8
call traces (ESS) 1(2):8
canning 3(10):76(L), 5(4):42
Captain Crunch 4(3):4
Captain Midnight 3(9):68(L)
Captain Zap's sins 5(2):24(L)
card copiers 8(2):7
Carrier Access Codes 6(3):42
CCCP 3(3):23
CCIS 4(11):12(L), 2(2):7, 4(5):6
CCITT 9(2):10
CD-ROM 3(12):95
cellular biopsy 10(4):6
cellular fraud bust 4(4):8
cell frequencies 4(1):10, 10(1):4, 4(7):13(L)
cellular modem 3(5):35
cellular phones 2(11):79, 5(3):8, 10(4):6, 4(6):8, 3(12):89,
4(2):13(L), 4(2):8, 10(3):42, 4(7):4,
3(11):90, 10(1):4
cellular phones--history 3(11):90
Central Offices 2(3):14, 7(4):12
Central Office IDs 4(10):14
Chaos Computer Club 5(4):34
China 3(8):63
Chinese dial-a-narc 6(2):35
CIA 1(12):68, 1(8):46(L)
Carrier Identification Codes 1(11):65
CIC 7(1):8
CID... see Caller ID
ciphers 9(4):6
CLASS features 8(4):31, 8(2):22, 4(5):6
CLLI codes 4(10):14
CN/A 3(9):72(L), 4(8):12, 2(3):18,
CNA--Lists 4(4):10
CND 8(2):22
CO Magazine 4(9):22
COCOTS 6(4)27(L), 7(2):20, 7(4):27(L), 8(2):28
(L), 8(3):25(L), 9(3):13, 8(1):19, 4(11):8
8(2):35
COCOT--database list 8(4):33
COCOT--numbers 8(3):22
COCOT--refund letters 8(4):33
COCOT--tricks 7(3):27(L)
codes 9(4):6
codes--methods 1(3):2
coin boxes 5(3):10
coin-test number 4(4):20(L)
COLTs 6(3):20
commentary 2(8):50
Common Language Location Identifer...see CLLI
Communications Fraud Control
Association 7(4):43
competition 6(3):3
Compuserve 3(10):75
Computel 2(3):15
Computel scam 3(2):12(L), 4(4):4, 3(5):34
computer confiscation 2(8):54
computer lore 9(2):40
computer shows 10(4):16
computer threat 1(6):3
conferences 10(3):4
Congress--paranoia 10(3):4
CONSUS 6(1):7
cop watching 9(1):7
cordless phones 1(1):3, 6(2):22, 7(1):19
Cornwall, Hugo 4(2):4
corvis hacking 4(11):12(L)
COSMOS 2(2):8, 6(3):13, 4(2):6, 4(3):10, 2(12):82,
7(1):8
COSMOS--abbreviations 4(3):10
COSMOS--demise 6(3):13
COSMOS--documentation 4(2):6
COSMOS--history 4(3):10
COSNIX Operating System 4(2):6
Country codes 1(2):10, 3(7):53
couplers 9(2):4
court news 3(4):27, 2(4):21, 1(4):3, 1(6):3, 8(4):36,
1(5):3
covering tracks 4(7):6
covert radio broadcasts 4(11):7
CPA-1000 4(8):12(L)
credit card algorithms 7(3):42
credit files 10(1):42
Cross-Bar--oddities 3(3):20(L)
crypt preview 8(3):44
crypt() source code 8(4):11
current events 3(3):22
customs 8(2):35
"Cyberpunk" fictions 8(2):42
DAST 10(4):22
data transmission--quality 3(9):71
DCS 3(3):17
DEC-20--hacking 2(7):41
(DEC)PDP 3(4):25
Defense Communications Agency 5(1):24(L)
Defense Data Network listing 1(5):4
Denning, Dorthy 7(3):10
Department of Justice 9(2):22
deregulation 1(7):3
dial back security 3(2):10
Dialed Number Recorder--see DNR
dialer--demon 9(2):15
dialer programs 5(1):20
dialing * on rotary phones 3(12):96
dialup numbers 4(8):6
Dicicco, Lenny 8(2):42
digital lock combinations 10(4):38
Direct Analog Storage Technology...see DAST
direct dialing 4(3):8
directories 2(5):27, 3(12):95
Directory Assistance
--usage fees 1(2):9
Disney radio frequencies 9(1):17
divestiture 3(1):1
DMERT 10(2):4, 8(4):45
DMS 100 1(7):3(L), 10(4):10
DNIC (Data Network ID Codes) 7(1):40
DNR 7(3):16
DOCKMASTER break in 5(3):20
DoD 3(3):19
DSM 6(4):14
DSS1 10(3):36
DTMF dialers 8(3):43
DTMF decoder 7(1):14, 10(2):14
DTMF overview 9(2):10
dumpster diving 1(2):10, 2(2):8, 1(9):50
Duophone CPA-1000 4(5):22
Dutch hackers 8(3):4
E-Card 4(5):8
E-COM 1(6):3, 1(6):5
EASYnet 8(2):18
Electronic Freedom Foundation 7(2):10
Electronic Privacy Act 4(6):8, 4(4):8
electronic surveillance--NSA 2(12):83
email systems 1(12):71
Emergency Interrupts 4(12):10
encryption 3(4):31, 3(10):79, 2(1):3, 9(4):6
equal access 4(5):17(L), 4(3):6, 4(3):8, 4(12):20
errata for 4(9) 4(10):18
ESN 10(4):6, 10(1):4, 10(3):42, 4(7):4
espionage 2(3):15
#1ESS 7(4):12, 10(4):10
#4ESS 7(4):28(L)
#5ESS switch 10(2):4, 10(4):10, 8(4):45, 8(4):45
ESS 3(10):79, 1(2):8, 1(6):2, 6(1):25(L),
2(11):74, 1(7):3, 10(4):10
ESS Bust methods 1(7):3(L)
essay 2(12):81, 1(12):67, 7(4):32
European phone systems 4(5):9
exchanges 3(8):62
Falwell, Jerry 5(1):25, 5(2):39, 3(1):3
Farrell's Ice Cream-covered
narcs 1(8):45
fax taps 9(1):42
FAX 4(5):14
ftp tricks 8(3):14
FBI 3(11):83, 3(10):75, 3(9):67, 1(11):63,
9(2):22, 1(1):2, 4(8):9, 1(1):3
FCC 4(6):8, 3(9):71, 1(6):3
Feds 9(2):38
feeder groups 5(3):4
fiber-optics laid
along rails 3(6):48(L)
finger monitor program 9(1):35
fingerprints 3(12):95
FM wireless transmitter--plans 8(4):44
fortress fones...see pay phones
Frame Room 7(4):12
France 2(12):83
gangs 7(4):36
GBS 4(10):4
GEISCO 2(1):3
general phone rants 4(1):20
Germany 2(12):87
Gore, Albert 5(1):26(L)
grade hacking 10(2):13, 10(4):15, 10(3):34, 6(4):45,
6(3):4
GTD#5 2(11):73
GTE--Telemail 1(1):3
GTE Telcos 6(3):33
Gulf War printer virus 8(4):39
"Hacker" 9(1):36
Hacker Con 6(3):10
The Hacker Crackdown 9(3)21
hacker morality 2(6):34
hacker scares 9(4):4
hacker sourcebooks 1(11):64(L)
hacker study 10(1):38
hacker video 8(3):14
Hacker's Handbook 4(2):15, 4(2):4
hackers credo 1(3):1, 9(4):17
hackers in hiding 8(3):24(L)
hacking beginnings 9(3):42
hacking history 5(1):16
hacking lore 8(4):16, 2(8):52, 5(1):24(L), 4(2):13(L)
hacking reading list 7(4):6
hacking recycling machines 1(2):9
hacking statistics 3(6):41
Hack-Tic 9(2):15
harmonica bug 2(9):58
HBO 3(10):75
Hess, Mark 7(1):45
high school hacking--news 1(3):3
history--phreaking UK 1(9):49
Hoffman, Abbie 4(1):4
--Obituary 6(2):3
Holland's hackers 2(4):21
home monitoring 1(4):2
honesty tests 10(3):20
HP2000--hacking 2(3):20
human database centers 8(4):46
humorous defense against
telco threats 2(2):10(L)
IBM 1(1):2
IBM's Audio Distribution
System 1(5):2
IC 1(11):65
ICLID 7(3):5
ICN 3(11):81
IMAS 4(10):4
IMTS 3(4):26, 3(12):89
In-Band Signaling 2(2):7
India 3(9):67
induction coil--plans 7(3):36
infinity transmitter 2(9):58
information manipulation 9(4):17
INSPECT 8(2):18
Intelpost 1(5):3
internet dialups 10(4):32
internet outdials 8(1):40
internet worm 5(4):4, 6(3):39
Interoffice Signalling 7(4):12
intro to hacking 2(6):40
IRS 3(2):15, 3(10):79, 2(1):3, 2(3):15, 2(6):35
ISDN 10(3):36, 8(1):42
Israel--phone system 2(6):33, 4(4):16
Israeli computer surveillance
of West Bank 4(12):8
Italian hackers 4(12):18
ITT 2100 switch 4(7):12(L)
ITT--boxing 3(5):38
I've fallen and I can't
get up 3(9):67
Jackson, Steve 10(2):45, 10(1):18
jail 10(4):4
JANET 4(9):4
Kenya 2(3):15
Kiev 3(6):47
KKK--racist BBS systems 2(1):3
Kranyak, Jack 3(5):34, 4(4):4
Landreth, Bill 4(9):12(L)
laptop tone generation 9(4):45
laptops 1(2):9, 9(2):4
LASS System 4(5):6
law enforcement--confiscation 2(8):54
LD Carriers 4(12):20
LD Fees 1(5):3
LEC 8(1):42
legalistic banter 2(1):4(L)
Legislative Network 7(4):4
letter sorting machines 8(3):32, 8(4):32
lineman's handset 10(1):14
LODCOM compilation review 10(3):19
loop number patterns 4(1):12(L), 1(9):52(L)
loop testing 6(3):20
magnetic card tricks 9(1):27, 8(4):40 (L), 8(2):7
mail drops 7(3):29 (L)
manholes 5(3):4, 7(4):12
Marcos 3(4):27
marine radio ch 26 7(1):19
Marquee 3(3):19
Max Headroom-Chicago style 4(12):8
MCI Mail--hacking 1(12):67, 1(7):2
MCI Numbers 1(4):5
MCI scam 5(4):10
MCI 6(1):36, 1(3):2, 8(2):16
media hype 8(3):4
merchant ship calls 2(6):36(L)
MF tones 2(3):16(L)
microwave links 1(3):2
MicoVAX 3(9):71
military computers 5(1):24 (L)
MILNet 2(7):45
MIN 4(7):4
Minitel 4(9):8, 9(4):8
missile systems 2(4):21
Mitnick, Kevin 7(1):3, 6(1):3, 6(3):14, 8(2):42
MIZAR 7(1):8
mobile hacking 9(2):4
mobile telephone freqs 6(3):24 (L), 8(4):18, 3(4):26
monitoring microwave 5(1):4
Morris, Robert 6(3):14, 6(4):6, 7(1):23
motivation--hackers 1(3):1
MTSO 3(12):89
MPOW 4(5):12(L)
narcs 9(2):38, 1(11):64(L)
National Coordinating Center 5(1):24 (L)
Navy 3(10):75
Nazi BBS 2(3):13
NCCCD 3(6):41
Neidorf, Craig 7(1):3, 7(2):4, 7(2):3, 7(2):8, 7(3):44,
8(4):36
neo-Nazi games 8(2):12
net addresses 2(4):23, 3(11):82
Network 2000 7(3):8
news 4(10):8, 5(1):37, 9(4):19, 4(11):8
new services 8(2):35
non-supervised phone lines 3(6):44(L)
Nothing New in
Computer Underground 3(6):42
NPA count 6(4):44
NSA 2(10):67, 1(9):51, 2(7):47, 1(10):57,
3(9):67, 5(3):20, 2(12):83, 3(10):79
NSA's Phone Number 2(3):16(L)
NUAs--international 4(10):10
nuclear free America 4(3):2
numbers 4(12):21, 5(2):44, 9(1):45
NY Tel 4(7):15
Nynex exchange addresses 10(4):18
NYNEX 8(2):11, 6(4):9, 6(3):36
NYNEX--Radio Frequencies 8(2):32
NYNEX--switch guide 6(4):9
obit--David Flory AKA Dan
Foley AKA The Shadow 6(2):45
--Abbey Hoffman 6(2):2
operating systems..see individual entries (e.g. VM/CMS, UNIX...)
operator humor 7(4):16
operator identification of
payphone 1(2):10(L)
operator service 4(9):6
operators 1(10):56
operators--social engineering 3(5):33
operators--USSR 5(4):30
ouch! 5(2):16
outages 8(2):35
outdial list 8(1):40, 8(2):44
"Out of the Inner Circle" 2(6):34
outside local loop
distribution plant 5(3):4
pagers--scanning 4(6):5
paranoia 1(7):3, 2(1):1, 3(5):39, 8(2):4, 2(8):50,
1(7):1, 9(4):4
parking summons 1(7):3
password grabber 3(8):60(L)
passwords 4(9):14, 8(1):36, 9(3):31, 4(8):10,
4(5):4
passwords--common 9(3):31
passwords--hacking IBMs 8(1):36
passwords--UNIX 8(1):31
pay phones 6(1):30, 1(11):62, 6(3):37, 1(2):10
pay phone--destruction 3(10):73
pay phone--dissection 3(10):73, 9(1):20
PBX trix 4(1):12(L)
PC Pursuit 2(9):58
PC Pursuit--hacking 4(4):6
PC-Pursuit--outdial list 8(2):44
PDP-11 2(11):73
Pen registers 3(2):11, 4(9):13, 4(12):12(L), 4(5):22
Pentagon 1(12):69
People Express 2(5):25
pet cemeteries 8(2):35
Phiber Optik 10(4):4
phone directories of the World 4(4):16
phone frequencies 5(4):19
phone interception 5(1):4
phone news 9(2):19
phone numbers 8(1):17
Phoenix Project 7(1):3
Phrack 7(1):3, 7(2):3, 7(2):4, 7(2):8, 8(1):11,
8(4):36, 9(2):22
phreak anticdotes 1(9):52
phreak history 2(11):80, 5(3):9
phreak typologies 2(3):13
phreaking overview 9(2):10
Pick operating system 3(6):42
pink noise 2(2):7
PINs 4(11):8
pirate radio 6(2):42
Pitcairn Island 2(9):59
PKZIP BBS hack method 9(1):12
plane phones 1(11):63
poetry 4(8):20, 4(3):4
police computers 2(5):27
police setups 3(4):30
police surveillance 1(8):44
political hacking 7(4):4
porn 2(6):35
postal paranoia 4(3):12(L), 1(4):20(L)
POSTNET 8(4):21, 8(3):32
PRIMOS 7(2):14, 6(2):4, 6(4):14
prison computers 8(4):5
prison phones 7(3):29(L), 9(4):13
prison update 8(2):46
privacy 1(5):3
Privacy Act of 1974 8(3):18
Private Sector BBS 2(8):49, 2(9):59, 3(1):1, 3(3):22, 3(4):30
Prodigy censorship 6(4):43(L)
Prodigy--STAGE.DAT conspiracy 8(3):26, 8(4):29(L), 8(1):19
product list 7(4):6
product review: Duophone
CPA-1000 4(5):22
Programs--Hacking IBMs 8(1):36
PRONTO 2(7):42
proto-phreak 5(3):9
PSAP 7(1):37
psychological makeups 8(3):38
psychobabble 7(3):44
Puerto Rico 3(10):76(L)
pyramid schemes 3(10):79, 4(6):4
radio scanners 6(2):22, 5(4):45
Raids...see busts
RC channel 10(2):4, 8(4):45
RCI 3(9):65
RCMAC 7(1):8
Reagan, Ron 2(5):27, 1(12):69, 3(11):83
REMOB (Remote
Observation) 5(1):27(L), 2(5):28(L), 6(3):32, 7(1):24(L),
2(9):60(L)
resources guide 3(6):46, 7(4):6
return call 9(2):31
The Rise of the Computer State 1(8):44
ROLM 6(3):24(L), 3(11):88(L)
ROLM CBX II 9000 5(1):30
Rose, Len 8(2):12, 8(1):11
routing codes 5(1):42
Royko, Mike 2(11):75
RS CPA-1000 4(5):22
RSTS 3(4):25, 2(11):73
Russian phone books 3(5):36(L)
Russian phone numbers 3(5):36(L)
SAC 5(3):4
Santa scam 6(1):36
SAT 10(1):4
satellite phone transmissions 4(11):7
satellite links 5(1):4
satellite jamming 3(3):23
satellites--hacking myths 2(8):52
Saudi Arabia 4(7):21, 3(10):80(L)
scams 7(4):22, 2(4):21
scanners 7(1):19
SCCs 7(1):8, 7(1):37
school records 10(2):13, 10(4):15, 10(3):34
scramblers 1(8):46(L), 3(4):29
secret frequencies 8(2):32
Secret Service 2(6):34, 9(4):4, 9(4):12, 9(2):38, 10(1):18,
10(1):43, 10(3):18
Secret Service--radio
frequencies 9(1):17
secured trunks 6(1):24(L)
sentry security 8(4):5
security 8(2):18, 7(3):10
Serving Area Interface 5(3):4
Sherwood Forest--busted 2(6):34
shortwave 3(9):67
$SHOW PROCESS/PRIV 4(1):6
Simplex corrections 8(4):21
Simplex lock location guide 9(1):38
Simplex locks 8(3):6
SL-1 Switch 3(9):68(L)
Smartphone hacking 10(4):11
"Sneakers" 9(3):17
social engineering 2(3):14, 2(4):19
Social Security Number
prefixes 4(11):6
South Africa 4(10):11
South African phreaks 6(2):24(L)
SouthWestern Bell 9(4):42
Soviet Union 8(1):16
Spain 6(2):36
Speech Thing: product review 9(4):45
spoofing VAX login 4(8):10
Springsteen 2(11):75
Sprint 6(2):34
spying on 2600 7(3):44
SS7 10(3):12
SSNs 3(7):51, 8(3):18
SSTs 7(1):12
Step Offices 1(5):1
Sterling, Bruce 9(3)21
Steve Jackson Games 10(1):23
Stasi 8(1):19
sting BBS's 3(6):44(L), 3(9):66
stings 3(5):39
Stoll, Cliff 7(1):45
Strowger, Almon 5(3):9
submarine cable maps 4(8):11
surveillance 3(12):95
survey 2(12):84, 4(8):15
Sweden's "Person Numbers"(ID) 1(3):3
SWITCH 8(1):42
switch guide 1(5):1, 7(4):12, 10(4):9, 10(4):10
switch overloading 3(12):91
switch-hook dialing 4(12):12(L)
switches...see specific switch
switching centers 1(10):56
switching routes 2(3):16(L)
switching systems 2(5):27
Sysops--protective measures 2(8):55
TAP 4(1):4, 6(2):43
taping payphone tones 7(3):36
telco info-fishing techniques 3(10):76(L)
telco nonsense 1(5):4, 9(3):36
telco offices 10(2):36
telco reneging 2(10):65
telco--fighting back 1(8):46
telco--assisting wiretaps 2(1):1
tele-harassment 3(2):10
Telecom 6(3):12, 3(8):58
Telecom debit cards 4(1):8
teleconferencing 2(5):26
teleconferencing--anticdotes 1(4):4
telemail--access 1(4):2
Telenet 3(6):47, 2(9):61, 4(6):9, 4(5):10, 3(11):84
(L), 1(2):7
telephone basics 1(8):43
telephone induction coil 7(3):36
Telstar 301 4(11):7
TELETEL Networks 9(4):8
"Terac" 5(1):24(L)
terminal locks 8(3):44
test channel 10(2):4, 8(4):45
test equipment--construction 8(2):14
test numbers 2(11):77
Thailand 2(6):39
Thought Police 1(8):44, 8(4):8, 1(12):68, 7(3):16
time service 2(4):21
TINA 2(6):39
toll fraud detection 7(1):12, 9(3):43
tone tracer construction 8(2):14
tone catcher 10(4):22
TOPS-10 2(1):2
TOPS-20 2(1):2
touch tones 3(12):91
touch-tone fees 4(10):6, 4(10):7, 4(2):18
trace procedures 3(1):4(L), 7(4):12
tracking devices 3(4):28(L)
trade magazines 4(6):13(L)
transaction codes 2(12):82
Trans-Pacific Cable 2(11):79
trap tracing--defeating 7(3):22
trashing 2(2):8, 1(2):10, 1(9):50, 3(10):73, 6(2):32
Travelnet 1(11):61
trojan 6(4):6, 5(2):4, 3(7):49
TRW 2(2):9, 4(8):4, 1(7):5, 10(1):42
TSPS 1(2):10, 2(1):4(L), 6(1):30, 1(11):62
TSPS Console 4(6):6
TVRO 5(1):4
UAPC 6(3):4, 6(4):45
UK Data Protection Act 10(2):12
UK Message List 4(9):10
UK Operator Numbers 3(8):58
Ultra Forward 9(2):31
unassigned area codes 5(3):10
UNIX--common accounts 9(3):31
UNIX--hacking 3(4):28(L), 3(8):57, 5(4):12, 6(3):28 (L),
6(4):4, 2(1):2
UNIX--password hacker 9(1):18, 8(1):31, 8(2):24(L)
USC--Phony Degrees 2(2):9
U.S. Military Telephone
Network 9(4):19
USPS 8(3):32, 8(4):32
USSR 2(4):21, 3(8):63, 5(4):30
UUCP 4(9):4
VAX 3(8):60(L), 4(5):4, 3(7):49, 2(9):57, 4(1):6
VAX--common accounts 9(3):31
VAX--worm 6(2):38
VMS 4(5):4
VDT 3(3):19
VDT operators 3(8):59
vehicle tracking monitors 1(1):3
verification 2(9):58, 4(12):10
VFY 4(12):10
video reviews 10(2):40
VINs 9(4):11
viri 5(2):4, 5(2):8, 6(3):14, 9(3):19
virus--Atari code 8(1):4
virus--batch virus 9(1):8
virus--Gulf War 8(4):39
virus--MSDOS (code) 9(1):4
virus "protection" 5(2):4, 9(1):9
virtual reality 10(4):37
Virtual Memory operating System--see VMS
VM/CMS 4(11):4, 4(12):4, 5(1):8
VM/CMS--acronyms 4(11):4
VM/CMS--filemodes 4(12:4
VM/CMS--password
characteristics 4(12):4
VM/CMS--privileged commands 4(12):4
voice mail hacking 6(3):36, 9(2):42
VMS 3(3):18, 3(8):60(L), 2(9):57, 3(2):9,
2(10):66, 3(7):52, 4(1):6, 2(1):2
VMS--UAF 2(10):66
VMS--common accounts 9(3):31
VMS--default passwords 3(7):52(L)
VR 3(9):71
WATS 5(3):23, 3(11):81, 1(9):52(L)
WATS directory 4(1):18(L), 4(4):21(L)
Weathertrak codes 5(1):15
Weendland, Mike 3(9):66
Western Union 4(7):6
Western Union EasyLink 1(12):67
White House phones 1(1):5 ,10(1):12
wild claims 6(4):30(L)
Winnipeg 3(9):69
wire fraud news 2(3):15
wireless modem 4(7):13(L)
wiretaps 1(4):3 2(6):35, 2(1):1, 7(3):30(L),
3(12):91, 1(11):63, 1(10):57, 2(9):58,
9(2):22
wiretaps--legalities 1(5):3
wiretaps--police 1(3):3
witch hunts 7(3):10
word numbers 4(4):15
world's most evil operator 1(7):3(L)
worms 5(2):4
worm--Ada 6(2):38
worm--internet 6(3):39
WWIV BBS--hacking 9(1):12
XY Step switching station 1(5):3(L)
YIPL...see TAP
yellow pages 3(3):23
yellow pages scam 2(5):27
Zinn, Herbert 6(1):3, 7(1):3
Title Index: 2600 Volume 1 - 10
David Price
The Title Index references all articles in 2600 THE HACKER
QUARTERLY from Volume 1 (1984) through Volume 10 (1993).
These articles are references using the following format:
V(N):P Where V = Volume, N = Number, and P = Page
EXAMPLE:
Building a Telephone Induction Coil 7(3):36
Thus the article in the above example is found in Volume 7,
Number Three, on page 36.
~ Denotes a "news" article
(L) Denotes a letter of note
------------2600 Title Index, Vol. 1 - Vol. 10-------------
1984 Arrives in Hong Kong~ 1(1):3
$2 Billion Error~ 2(7):43
22013664431--Call it! 3(3):22
2600 A Hacking Victim~ 2(8):51
2600 Bulletin Board Online 2(2):9
2600 Exposes New York Tel 4(7):15
2600 Information Bulletin 3(9):69
2600 Information Bureau 3(10):77
2600 Information Bureau 3(8):61
2600 Information Bureau 3(11):85
2600 Information Bureau 3(12):93
2600 Writer Indicted~ 1(6):3
411--News About Phone Companies~ 8(2):35
414 Bust~ 2(5):27
414's Plead Guilty~ 1(4):3
4TEL 6(3):20
$6,829 Phone Bill~ 3(6):43
617 Will be Divided~ 3(4):31
718 Is Coming~ 1(3):3
74,000 Calls to Fraud Line~ 3(7):55
800 Directories Now Available~ 1(8):45
800 Prefixes Listed by States 2(6):37
818 Here to Stay~ 1(11):63
911 Suspect Hung Up~ 1(10):57
A 414 is Sentenced--Other Indicted~ 1(5):3
A Batch Virus 9(1):8
A Bittersweet Victory 7(2):3
A Blast From the Past 9(4):33
A Challenge to Hackers~ 2(1):3
A Form of Protection For You & Your
Computer 5(2):4
A Friend in High Places 1(9):52
A Guide to PRIMOS 6(2):4
A Guide to the 5ESS 10(2):4
A Guide to the Israeli Phone System 2(6):33
A Guide to VMS 2(9):57
A Hacker Survey 4(8):15
A Hacker's Guide to the TSPS Console 4(6):6
A Hacker's Guide to UNIX 5(4):12
A Hacking Reading List 7(4):6
A Look at the Future Phreaking World:
Cellular Telephones--How They Work 3(12):89
A Mechanical Hacker~ 2(3):15
A Pen Register For Phreaks?: Product
Review--Dialed Number Recorder 4(5):22
A Phone Phreak Scores 2(4):19
A Political Hacking Scandal 7(4):4
A Reader's Reply to Captain Zap 5(2):16
A Report on the Internet Worm 5(4):4
A Review of "The 'Top Secret'Registry
of US Government Radio Frequencies" 4(11):7
A Simple Virus in C 9(3):19
A Story of Eavesdropping 3(4):29
A Study of Hackers 10(1):38
A Time For Reflection 1(12):67
A Trip to England 3(8):58
A True Saga of Teleconferencing 1(4):4
A Unique Obscene Caller~ 3(2):1
A Way To Catch Peepers 9(1):35
A Word on Wiretapping~ 1(4):3
Acoustic Trauma 3(2):15
Acronym List 2(2):11
Acronyms A-G 10(1):34
Acronyms H-R 10(2):20
Acronyms s-x (no y or z) 10(3):44
ADS Investigation Moved?~ 1(2):9
AHOY! 1(1):1
algorithm for credit cards correction 7(4):25
All About BLV: Busy Line Verification 4(12):10
Allnet's Legal Problems 5(2):2
Allnet: A Horror Story 4(6):4
Alternate Long Distance 1(3):2
American Network Fears Hackers~ 3(5):39
An Algorithm for Credit Cards 7(3):42
An American Express Phone Story 3(3):17
An Appeal For Help 8(4):36
An Interesting Diversion 2(10):65
An Interpretation of Computer Hacking 5(1):16
An Interview with Craig Neidorf 7(2):8
An Interview with Dorothy Denning 7(3):10
An Interview with Hugo Cornwall:
British Hacker/Author 4(2):4
An Interview With the Chaos Computer
Club 5(4):34
An Introduction to COCOTS 7(2):20
An MS-DOS Virus 9(1):4
An Official Crackdown on Hackers~ 1(7):3
An Overview of AUTOVON and Silver Boxes 3(3):17
An Overview of DSS1 10(3):36
ANALYSIS: Gulf War Printer Virus 8(4):39
Anatomy of a rip-off 7(4):22
And They Call US Crooks? 2(10):65
Another Astronomical Phone Bill~ 3(1):3
Another FBI Computer File~ 1(11):63
Another Hacker Story~ 1(9):51
Another Stinger Is Stung 3(9):66
ANSI Bomb 10(2):44
Are You a Phreak??? 2(3):13
ARPANET Hopping: America's Newest
Past time 1(6):1
ARPANet Military Subnets 1(3):5
At the Last Stroke...~ 2(4):21
AT&T Best For Hackers~ 3(9):71
AT&T Computer Caught Stealing~ 2(6):35
AT&T Contractual Obligations~ 2(6):39
AT&T Credit Cards Make Debut~ 1(1):3
AT&T Does it Again~ 3(1):3
AT&T Faces Serious Money Problems~ 1(9):51
"AT&T Keeps ""800"" Data To Itself~" 2(2):9
AT&T Limits Use of their Credit Cards~ 1(6):3
AT&T Offers E-Mail~ 2(12):87
AT&T Put On Hold~ 2(7):47
AT&T Selling Pay Phones~ 3(7):55
AT&T Sub Maps 4(8):11
AT&T to Read E-Mail~ 2(11):79
AT&T/BOC Routing Codes 5(1):42
ATM's in China~ 3(8):63
Automated Operators Coming~ 3(7):55
AUTOVON Numbers 3(5):37
Avoid Phones in Storms!~ 2(11):79
Bad Tenant Database~ 3(4):27
Bank Records Aren't So Private~ 1(5):3
Banking from your Terminal--A Look
at PRONTO 2(7):42
"BASIC ""Wargames Dialer Program" 5(1):20
BASIC Red Box Tones 5(3):22
BB Traffic Cop~ 3(9):67
BB Watching VDT Operators~ 3(8):59
BB Watching Without Regulation~ 2(12):83
BBS Listing 2(12):85
Be Nice to Your Telco 1(8):46
Beginner's Guide to Minitel 9(4):8
Beige Box Construction 10(1):14
Belcore's Plans for Caller ID 9(2):18
Bell Atlantic & MCI Collaborate~ 3(2):15
Bell Credit Card Abuse Soars~ 1(4):3
Bell Didn't Invent Phone?~ 2(6):35
Bell Propaganda Films~ 2(9):63
Bell to AT&T: Get Lost!~ 1(7):3
Bellcore Publications Go Public~ 3(5):36
Beware of Hacker Terrorists~ 3(5):39
Big Brother No longer Watching Miami~ 1(8):44
Big Computer Crime Pays~ 3(6):43
Big Deal for Little Town~ 2(11):75
BIN List 8(2):31
Birth of a Low Technology Hacker 8(4):16
BITnet Topology 2(1):6
Blue Box Schematic 2(10):69
Bogota, Columbia Gets Extra Digit~ 3(5):39
Book Review Nothing New in Computer
Underground by M. Harry 3(6):42
Book Review: "Automatic Teller
Machines III" 4(2):21
Book Review: "The Hacker's Handbook" 4(2):15
Book Review: Approaching Zero 10(3):38
Book Review: The Cuckoo's Egg 7(1):45
Book Review: The Devouring Fungus
(Tales of the Computer Age) 9(2):40
Book Review: Tune in on Telephone Calls
by Tom Kneitel 5(4):45
Book Review: Virtual Reality 10(4):37
BOXING ON ITT 3(5):38
British Credit Holes 10(2):12
British News 10(1):44
British Phonebooth Wedding~ 3(4):27
British Telecom: Guilty 6(3):12
Build A Tone Tracer 8(2):14
Building a DTMF Decoder 7(1):14
Building a Red Box 5(2):13
Building a Telephone Induction Coil 7(3):36
But How Does it Work? 1(8):43
Buy My Wires~ 3(12):95
Call Rejection in Natchez~ 3(9):71
Caller ID Technologies 10(3):12
Caller ID: The Facts 7(3):5
"Call Me" Card~ 2(6):39
Campaign Contributions On-Line~ 2(10):71
Capitol Hill Hacker~ 3(6):43
Capturing Passwords 4(8):10
Car Breathalizers~ 3(4):27
Carrier Access Codes 6(3):42
Carrier Choosing Time~ 2(5):27
Cash Machines Are Popular~ 3(8):63
Canadian WATS Phonebook 5(3):23
Cell Site Frequencies 4(1):10
Cellular Dial-By-Voice~ 3(7):55
Cellular Magic 10(1):4
Cellular Modem~ 3(5):35
Cellular Phone Biopsy 10(4):6
Cellular Phone Fraud and Where It's
Headed 4(7):4
Cellular Phones in England 3(2):15
Cellular Update 5(3):8
Central Office Operations 7(4):12
Changing Your Grades on A High
School Computer 10(3):34
Chinese Snitch Numbers 6(2):35
Cipher Fun 9(4):6
CIS Copyrights Public Software~ 3(10):75
Citybank Money Games~ 3(6):43
Cityphone Has the Answer~ 2(12):83
Class Features 8(4):31
CLASS: What It Means To Us 4(5):6
CNA Numbers 4(4):10
CNAs 2(3):18
COCOT Corner 8(4):33
COCOT Numbers 8(3):22
Columnist Attacks AT&T~ 2(11):75
Commentary: The Threat to Us All 2(8):50
Competition...It's the next best
thing to being there 6(3):3
Computel Does Exist~ 2(3):15
Computel Put to Sleep 4(4):4
Computer Clothing 3(9):71
Computer College 3(11):87
Computer Crime Resources Guide 3(6):46
Computer Crime Review 3(6):41
Computer Elections Examined~ 2(10):67
Computer Foul-ups Hurt Social Security~ 1(11):63
Computer Grammar~ 3(5):35
Computer Makes it Easy for Reagan~ 1(12):69
Computer Password Kept Secret 3(3):19
Computer Security at the Bureau of
Prisons 8(4):5
Computer Threat Causes Chaos in Albany~ 1(6):3
Computers Monitor Truckers~ 2(7):43
Computers Seized as Summer Games Begin~ 1(8):45
Computers Strike Again!~ 3(7):51
Computers Threaten Privacy~ 3(12):91
Congress Chooses AT&T~ 3(4):31
Congress Takes a Holiday 10(3):4
Congressional Computer~ 3(5):35
Converting a Tone Dialer into a Red Box 7(3):32
Count of Exchanges per Area Code 3(8):62
Country Codes 1(2):10
Country Codes 3(7):53
"Crackers" Cracked~ 2(5):27
Crosstalk Saves Old Lady~ 3(9):67
Crypt() Source Code 8(4):11
Data Network Identification Codes 7(1):40
Death of a Pay Phone 3(10):73
Death of NYNEX Business Centers 8(2):11
Death Star Cards Spell Woe~ 1(2):9
"Debugging" Phones~ 3(8):63
Decrypting Password Security 4(9):14
Defeating Callback Verification 9(3):9
Defeating Trap Tracing 7(3):22
Defense Data Network Listing 1(5):4
Descrambling Cable 10(1):16
"Dial ""00"" For Operator~" 3(4):31
Dial Back Security 3(2):10
Dial the Yellow Pages~ 3(3):23
Dial-a-Directory~ 2(5):27
Dial-A-Porn Update~ 3(1):3
Dial-it Sex Numbers Argued~ 2(11):75
Dick Tracey Toys Are Closing In~ 2(9):63
Did You Know? 4(7):17
Digital Locks 10(4):38
Directory Assistance By Computer~ 2(9):63
Directory Assistance Failure~ 3(4):31
Dreams of GEnie~ 2(12):87
E-COM is Going Away~ 1(6):3
E-COM Number List 1(6):5
E-COM Really on the Way~ 2(7):47
"Ed Quinn Cell Site"~ 3(6):47
E-Mail Horror Stories 1(12):68
E-Mail Listings 1(12):71
Electronic Jail All Screwed UP~ 1(12):69
Electronic Switching Advantages 1(6):2
Electronic Tax Returns Are Here 3(2):15
Electronic Tax Returns~ 3(10):79
Electronics Create Portable Prisons~ 1(4):2
Elementary Switching 10(4):9
Encryption Provides Signature~ 3(4):31
England's Mass Announcements 4(9):10
Equal Access 800 Drawbacks~ 3(4):31
Equal Access May Not be "Equal"
to Modems 2(11):74
ESS Goes To Taiwan 3(10):79
ESS: Orwell's Prophecy 1(2):8
Europe Standardizing Telecoms~ 2(9):63
Ever Wonder Who Owns All Those
800 Numbers? 6(1):12
Ex-Fed Tapped 3(7):51
Exchange List: 201 Area Code 6(2):20
Exploits in Operator Hell 3(5):33
Exploring Caves in Travelnet 1(11):61
Facts and Rumors 7(3):44
Fascinating fone fun 9(1):45
Fascist Computer Network~ 2(1):3
Fawcett Phone Bill Too Big~ 2(12):83
FAX: A New Hobby 4(5):14
FBI Actions Anger Parents 3(11):83
FBI Goes After ADS Hackers 1(1):2
FBI Investigates Coffee Machine~ 3(10):75
FBI Revealed: Reviews--The FBI Project
Newsletter & The FBI and Your BBS 4(8):9
FBI Shopping List~ 3(9):67
FCC Actions~ 1(6):3
FCC Gives Away "Resource" 3(9):71
Federal Employees "Tracked"~ 3(7):51
Federal Express Offers "E-Mail"~ 1(8):45
Federal Phone Failures~ 3(7):55
Federal Telephone System Upgrade~ 1(12):69
Feedback 9(4):26
Fiber-Optic Network For Du Pont~ 2(10):71
Final Words on VMS 3(3):18
Fingerprint Identification System~ 3(12):95
First of the "Superminin"~ 1(12):69
Five Aliens Hung Up~ 3(1):3
Five Arrested in Phone Fraud~ 1(7):7
FM Telephone Transmitter 8(4):45
FM Wireless Transmitter 8(4):44
For Your Protection 7(1):3
Fraud Alert 7(4):43
Free Directories For Bigwigs~ 3(12):95
Free Information in Trouble~ 1(4):3
Free Kiddie Dial-It Calls~ 2(11):79
Free Pay-Phones Plague New Jersey~ 3(5):39
French Phones Renumbered~ 2(12):83
From Sherwood Forest: Intro to Hacking 2(6):40
From the 2600 Files 5(1):22
Fun and Games at a 2600 Meeting 7(1):38
Fun Phone Numbers 5(2):44
Fun Things to Know 9(2):19
Fun With COSMOS 2(12):82
Fun With Fortress Fones 1(11):62
Gee...GTE Telcos 6(3):33
GEISCO's New Toy~ 2(1):3
General Information 6(1):7
German Phone System Stagnant~ 2(12):87
Getting Caught: Hacker's View 1(10):55
Getting In The Back Door: A Guide to
Some Popular Operating Systems 2(1):2
Getting Started 9(3):42
Getting the Most Out of Equal Access 4(3):6
Getting Your File... 10(1):42
Goings On 4(4):16
Good Apples for the Soviets~ 2(4):21
Government Bulletin Boards 10(2):39
Government Phone Fate?~ 3(8):63
"Grade ""A"" Hacking" 6(3):4
Growth of a Low Tech Hacker 9(4):17
GTE Hit by Divestiture~ 2(1):3
GTE Now Bigger than AT&T~ 2(7):47
GTE Raids Still Have Many Unanswered
Questions~ 1(1):3
GTE Sprint Cheats Customers~ 2(7):43
GTE Sprint Overbills~ 3(9):71
Hacker Extortionist Caught~ 2(9):59
Hacker News~ 8(2):12
Hacker Zaps Computer Marquee~ 3(3):19
Hackers Degree?~ 3(7):51
Hackers Go Free~ 2(4):21
Hackers Have Big Business Scared~ 2(10):71
Hackers In Jail 6(1):3
Hackers in Jail, Part Two 10(4):4
Hackers in the World of Malls: Secret
Service Behind Harassment of 2600
Meetings 9(4):4
Hackers on Shortwave~ 3(9):67
Hacking AmiExpress 9(3):4
Hacking at the End of The Universe 10(3):4
Hacking Computer Shows 10(4):16
Hacking IBM's VM/CMS 4(11):4
Hacking IBM's VM/CMS--Part Two 4(12):4
Hacking MCIMAX 8(2):16
Hacking on Telenet: It's as Easy
as 123456! 1(2):7
Hacking on the Front Line 9(3):31
Hacking Packard 2(3):20
Hacking PC Pursuit 4(4):6
Hacking Smartphone 10(4):11
Hacking WWIV 9(1):12
Hands Across Telenet~ 3(6):47
Happenings 5(1):37
Hardwiring Your Way In 5(4):42
HBO Encryption Broken~ 3(10):75
Here They Are 9(2):24
Here We Go Again 9(2):22
Here's the Secret! 2(11):73
High School Hacking 10(2):13
High School Mac Hack 10(4):15
High Tech Happenings 9(4):19
High Tech Parking Meters~~ 3(5):35
History of British Phreaking 1(9):49
Hitchhiker Guide to the Phone System
Phreaking in the Nineties 9(2):10
Home Computer Attacks Falwell~ 3(1):3
House: Hacking is Bad~ 1(8):45
How Can Sysops Protect Themselves? 2(8):55
How Cellular Phones Came About and What
You Can Expect 3(11):90
How Not to be Rejected~ 3(12):91
How Payphones Really Work 6(1):30
How Phone Phreaks are Caught 4(7):6
How the Defeat *69 9(2):31
How to Build a Silver Box 6(4):20
How to Get into a C.O. 2(3):14
How to Hack A Pick 3(6):42
How to Hack Honesty 10(3):20
How to Hear Phone Calls 5(4):19
How to Run a Successful Teleconference 2(5):26
How to Take Apart A Payphone 9(1):20
How to Use Your Silver Box 9(1):16
Human Database Centers 8(4):46
I.R.S. Computers Screw Up~ 2(3):15
IBM ADS Directory 1(9):53
IBM Braille Compatible~ 3(12):95
IBM Gets Bigger/Goodbye SBS~ 2(7):47
IBM's Audio Distribution Systems Sure
Can Be Fun! 1(5):2
IC and CIC Listing 1(11):65
Ice Cream Chain Aides Selective Service~1(8):45
ICN--More than a Bargain 3(11):81
Important News~ 4(12):3
In Pursuit of Knowledge: An Atari 520ST
Virus 8(1):4
Indian Phones Under Siege~ 3(9):67
"Indiana ""Fones"" Are Gone" 3(10):75
Indiana Telco Threatens AT&T~ 3(7):55
Industrial Espionage Seminar~ 2(3):15
Infrared Beeper Will Find You 3(2):15
Inmates Handle Information Calls~ 2(12):83
Inspect Implementation 8(2):18
Intelpost an Astronomical Failure~ 1(5):3
Interesting Things to do on a DEC-20 2(7):41
International Hacking~ 3(12):91
International NUA's 4(10):10
Internet Outdials 8(1):40
Introducing the Clear Box! 1(7):4
IRS Drives Telco to Drink~ 2(6):35
IRS Wants Access to Telco Data~ 2(1):3
Is AT&T Hiding Near You? 9(4):36
It Could Happen to You! 3(2):10
ITT Crackdown~ 2(7):43
ITT Wiping Out Fee~ 1(8):45
Jersey Wins Wiretap Race Again~ 2(6):35
Kenya Pay Phones Prove Popular~ 2(3):15
Kiev Calling Clogged~ 3(6):47
Know Your Switch 10(4):10
Knowing UNIX 3(8):57
L.A. Law 9(1):7
Lair of the INTERNET Worm 6(3):39
Lawsuit Filed Against Secret Service 10(1):43
LD Companies Strike Back~ 3(8):59
Leaked Documents 7(4):16
Leave Our Poles Alone!~ 3(8):59
Let's Move to France!~ 3(6):47
Letter From Prison 9(4):13
Listening In 7(1):19
Listening In On Cellular Phones~ 2(7):43
Listening In: Catch Me if you Can! 4(11):7
Local Toll-Free Numbers~ 3(10):79
Long Distance Option Timtable~ 1(5):3
Look Out For Sidney~ 1(7):3
"Look Out, He's Got A Computer!" 1(7):1
Looking for Simplex Locks? 9(1):38
Looking Up IBM Passwords 8(1):36
Loophole in Wiretap Law 3(12):91
Loopholes Around Wiretap Laws~ 1(10):57
Magnetic Strips 8(2):7
Man Worries About Sprint Bill~ 3(4):27
Marcos Phones For Free~ 3(4):27
Mastering the Networks 3(11):82
MCI Access Numbers & Mail Numbers 1(4):5
MCI Expanding With Optical Fibers~ 2(7):47
MCI Goes to U.K.~ 2(5):27
MCI Mail & Western Union EasyLink 1(12):67
MCI Mail: The Adventure Continues 1(7):2
MCI: The Phone Company With A Lot of
Explaining To Do 5(4):10
Meeting Advice 10(2):16
Meeting Advice 10(2):17
Meeting Mania 10(3):18
Messages on the Move~ 3(9):71
MILNET TAC Dialups by Location 2(7):45
Missing Children's Faces Displayed~ 2(7):43
Mobile Frequencies 8(4):18
Mobile Phones--Theory and Construction 3(4):26
Monitoring Phone Calls With A TVRO 5(1):4
More Banks Link Arms~ 3(11):87
More Cellular Fun 10(3):42
More Conversion Tricks 8(3):43
More Divestiture Woes~ 2(10):71
More Hacking on Primos 6(4):14
More Info on VMS 2(10):66
More Long Distance Unpleasantries 4(12):20
More Magic Buttons~ 3(11):87
More Meeting Advice 10(4):35
More On Hacking UNIX 6(4):4
More on Trashing: What to Look for,
How to Act, Where to Go 1(9):50
More PC Jr's., Less Z-100's for Soviets~1(8):45
More Phone Fraud~ 2(7):43
More Telenet Addresses 4(6):9
More Use of Phone Computers~ 2(10):71
More VAX Tricks 4(5):4
Moving Satellites Right Up In the Blue
...What Was Really Going On? 2(8):52
Mystery Transistor~ 2(5):27
Navigate With a CD~ 3(12):95
Navy Calls Dial-A-Porn~ 2(10):67
Navy Phone Phreaks Nabbed~ 2(10):67
Navy Software Available~ 3(10):75
Nazi BBS a Challenge to Hackers 2(3):13
Negative Feedback 7(2):11
Net Addresses 2(4):23
Network 2000 Saga Continues 7(3):8
Never Erase the Past 10(3):19
New British Phone Service~ 3(7):55
New Chip Helps Sprint~ 3(8):63
New Developments 4(2):18
New Jersey Tops Taps~ 3(7):51
New Payphone Service for Michigan~ 3(11):87
New Payphones Confuse Callers~ 3(1):7
New Phone System for Courthouse~ 2(8):51
New Revelations From Bell South 7(3):16
New Tracking Device For Cars~ 2(6):39
New VAX Announced~ 3(1):7
New Ways of Stealing Data~ 3(3):19
New York's Computer Law~ 3(6):43
New York's IMAS 4(10):4
News Roundup~ 10(4):42
News Update ~ 10(2):45
News Update~ 7(2):38
News Update~ 7(1):23
News~ 6(3):14
Nickname Listings In Small Town~ 3(11):87
No Data Protection for Hong Kong~ 3(7):55
No Dial-it Calls For Feds~ 2(11):75
No Hacking While Flying, Please~ 1(2):9
No More Free Info~ 1(6):3
No More Redialing?~ 2(12):83
North Carolina #1 in Hacking 3(12):91
Northern To Destroy COs 3(3):23
NPA Countdown 6(4):44
NSA Chooses AT&T Computer~ 2(7):47
NSA Doesn't Feel Secure~ 1(9):51
NSA Drops DES~ 3(9):67
NSA Memo 5(3):20
NSA Wants a New Chip 3(10):79
NSA Wants Better Phones~ 1(10):57
Numbers 3(2):13
Numbers of Interest 4(8):6
Numbers...Long Since Changed 3(6):45
Nynex Bumps Southwestern Bell~ 3(6):47
NYNEX Data 6(4):9
Nynex Voice Mail 10(4):18
Oh No, Not Again!~ 1(10):57
On The Road Again: Portable Hacking 9(2):4
One Angry Judge 10(1):23
One We Somehow Missed~ 1(11):63
Operating With Difficulty 4(9):6
Our Contest Winners 7(4):32
Our Ever-Changing World~ 6(4):6
Our Wishes For '86 and Beyond 2(12):81
Out of the Inner Circle--A Review 2(6):34
Outdials 8(2):44
Outside Loop Distribution Plant, or
Hands-On Experience 5(3):4
Overcharge Hunters Needed 3(1):3
Overseas Pirates~ 2(4):21
Pacific Cable Planned~ 2(11):79
Paging For Free 4(6):5
Passageways to the Internet 10(4):32
Patients May Get to Keep Phones~ 3(5):39
Pay Phone Causes Panic~ 3(2):11
Pay Telephones Deregulated~ 1(7):3
PC Pictures~ 3(12):95
Penetrating the Pentagon by Phone~ 1(12):69
Pennant Ties Up Phones 3(10):75
People Express to be Hacked to Pieces 2(5):25
Pest Control~ 2(9):63
Phone Booth Captures Man~ 2(10):67
Phone Booth Wins Again~ 3(1):3
Phone Booths Mauled The Stolen~ 3(8):59
Phone Fraud in Governor's House~ 3(8):59
Phone Numbers Supplied by Readers 8(1):17
Phone Phreak Fined~ 3(4):27
Phone Service Via Radio Shack~ 3(1):3
Phone-in Registration for College~ 2(9):59
Phones 4(1):20
Phones at High and Low Speeds~ 2(12):87
Phones in the Sky~ 1(11):63
Phoning Home From Europe 4(5):9
Phreak Roundups~ 2(2):9
Phreaks Tie Up Lines~ 3(12):91
Pitcairn Island Now On AT&T Net~ 2(9):59
Police Dept. Wants Cellular Phones~ 2(11):79
Police Hacker Cleared~ 2(5):27
Poor Connection Starts Bomb Scare~ 3(9):67
Poor Service An Understatement~ 3(10):79
Porno Phone Service Busted~ 2(6):35
Portable VAXes!!! 3(9):71
PRIMOS: The Final Part 7(2):14
Prisoner Update 8(2):46
Prisoners Break Law~ 3(7):51
Private Directories Soon to be
Available~ 1(9):51
Private Sector Returning 3(1):1
Private Sector Update~ 2(9):59
Problems for New Pay Phones~ 2(6):39
Product Review: Do It Yourself Demon
Dialer Kit (Hack-Tic Technologies) 9(2):15
Product Review: Speech Thing 9(4):45
Product Review: TDD-8 DTMF Decoder 10(2):14
Programs in BASIC 3(1):5
Protecting Your SSN 8(3):18
Psychology in the Hacker World 8(3):38
Public Phone Secrecy~ 3(6):43
Punching Pay Phones 6(3):37
Pure Cyberfiction, Says Mitnick 8(2):42
Pursuit For People 2(9):58
Q & A 1(2):10
"Q" and "Z" Controversy Rages~ 3(11):83
RCI & DMS-100 Bugs 3(9):65
Reach Out and Touch a Nuclear Weapons
Contractor 4(3):2
Reaching Out On Your Own 2(9):58
Reagan Hangs Up on Kids~ 2(5):27
Real Important Frequencies 9(1):17
Real Life War Games?~ 2(4):21
Redemption for a Hacker~ 2(3):15
Remember.... 6(2):3
REMOBS 6(3):32
Reporters Steal Swiss Phones~ 3(2):11
Review: CO Magazine 4(9):22
Review: Hacker: The Computer Crime
Card Game 9(1):36
Review: Sneakers 9(3):17
Review: The Hacker Crackdown 9(3)21
Reviews: The 1989 Pirate Directory 6(2):42
Ripoffs & Scams~ 6(1):36
Robot Kills Man~ 2(4):21
ROLM Phone System Creates a Nightmare 5(1):30
Roman Hackers 4(12):18
RSTS For Beginners 3(4):25
RSTS: A Trick Or Two 2(11):73
Rural Customers Denied Access~ 2(11):79
Rural Radio Phones~ 3(8):63
Rural Ultraphones~ 3(10):79
'Santa Fraud'~ 2(4):21
Satellite Jamers Jammed~ 3(3):23
Saudi Arabian BBS List 4(7):21
Say Goodbye to Meter Readers~ 2(6):39
SBS Offers Toll-Free Service~ 1(12):69
Scanning For Calls 6(2):22
Sears Satellite Network~ 1(10):57
Secret Frequencies 8(2):32
Secret Service on Trial 10(1):18
Security Can Kill Creativity 3(10):75
Security Numbers 1(10):59
Security Software~ 3(1):7
SEIZED! 2600 Bulletin Board is
Implicated in Raid on Jersey Hackers 2(8):49
Sherwood Forest Shut Down by
Secret Service 2(6):34
Shopper's Guide to COCOTS 9(3):13
Shower Phone?~ 3(5):35
"Signature" On Video Transmitters~ 3(9):67
Silver Box Born in U.K. 7(1):19
Silver Pages~ 2(4):21
Simplex Locks 8(3):6
Simplex Update and Corrections 8(4):21
Social Interaction with Phones 4(12):17
Software Makers Crash BBS~ 3(10):79
Some Cosmos Documentation That May Be
Useful 4(2):6
Some Facts on Supervision 3(9):65
Some Numbers 4(12):21
Some Thoughts on "Garbage Picking" 1(2):10
Some Words on Hacker Morality 2(6):34
South African BBS's 4(10):11
Soviet BBS List 8(1):16
Soviet Computer Update~ 3(3):23
Soviets Denied Computer Access~ 3(3):19
Spanish Phones--and what they don't do 6(2):36
Springsteen Mania~ 2(11):75
Sprint Unites with US Telcom~ 3(2):15
Sprint--Too Many Customers~ 3(11):87
SS Number Returned to Citizens~ 3(7):51
Still More on the World of COSMOS 4(3):10
Sting Boards on the Rise~ 3(5):39
Stock Market Crash~ 3(6):47
Students Bog Down Computer~ 1(12):69
Students Cause Havoc on Computer~ 1(3):3
Stuff You Should Be Interested In~ 8(4):8
Stumbling into Control on a VMS 4(1):6
Super Crisis Alert System~ 2(12):87
Super Pay Phone~ 2(12):87
Supercomputer Dialups~ 1(3):3
Survey Results 2(12):84
Surveying the COSMOS 2(2):8
TAP: The Legend is Dead 4(1):4
TASS News Service~ 3(3):23
Technology Nabs Hooky Players~ 3(1):3
Teelco Rats On Government~ 2(10):67
Teenagers Abuse "Party Line~" 3(2):11
Telco News 9(4):42
Telco Offices 10(2):36
Telco Response 4(10):6
Telco Sasys "Pay for Tones"~ 3(12):91
Telco Service Spawns Racist Banter~ 2(12):83
Telenet Addresses 4(5):10
Telenet Directory 2(9):61
Telenet Letter 4(8):16
Telephone Company Responds to Criticism
of Touch-tone Fees 4(10):7
Teller Machine Crime Coming~ 1(4):3
Test Numbers 2(11):77
Thai Phone Books a Hot Issue~ 2(6):39
The 516 Area Code in Detail 5(3):14
The 707 Area Code 7(1):44
The Australian Phone System 9(1):31
The Ballad of Captain Crunch 4(3):4
The Basics: Divestiture: What Happened? 3(1):1
The Class Struggle 8(2):22
The Cold Truth 4(8):20
The Computel Scoop 3(5):34
The Constitution of a Hacker 1(3):1
The Dark Side of the Great Break-Up 1(6):4
The Dark Side of Viruses 5(2):8
The Day the Phone System REALLY Died 6(4):4
The Death of COSMOS? 6(3):13
The Definitive ANAC Guide 7(3):39
The Early Phreak Days 2(11):80
The Facts on 10698 7(1):30
The First 100% ESS State~ 2(7):47
The First Atomic Bomb 1(3):4
The Free Phones of Philly 3(7):50
The Galactic Hacker Party 6(3):10
The Ghost in the Machine~ 3(8):59
The Hacker "Threat" 9(4):19
The Hacker Video 8(3):14
The Hackers Guide to Area Code 1(8):47
The History of ESS 2(11):74
The Infinity Transmitter--An Old Bug
that Had Its Time 2(9):58
The Latest~ 9(1):42
The Magical Tone Box 10(4):22
The Neidorf/Phrack Trial: Day by Day 7(2):4
The New "TAP" 6(2):43
The New LEC Order: Acronym City 8(1):42
The Next Step in Custom Calling~ 2(3):15
The Person Numbers~ 1(3):3
The Rise of the Computer State by David
Burnham Book Review 1(8):44
The Scariest Number in the World 1(12):68
The Scoop on 911 7(1):37
The Scoop on Pen Registers~ 3(2):11
The Secrets of Mizar 7(1):8
The Simple Pleasures of a Step Office 1(5):1
The Sprint Gestapo Strikes Again! 6(2):34
The Summer Games of 87 4(8):3
The Telecom Informer 4(10):8
The Telecom Informer 4(8):8
The Telecom Informer 4(9):8
The Telecom Informer 4(6):8
The Telecom Informer 4(5):8
The Telecom Informer 4(11):8
The Telecom Informer 4(4):8
The Telecom Informer 4(1):8
The Telecom Informer 4(12):8
The Telecom Informer 4(3):8
The Telecom Informer 4(2):8
The Telecom Informer 4(7):8
The Terminus of Len Rose 8(1):11
The Theory of 'Blue Boxing': their
history, how their used, their future 2(2):7
The Trouble With Telemail 1(4):2
The Truth Behind Those 9999 Numbers 1(1):4
The View of A Fed 9(2):38
The Woes of Having a Small-Time Rural
Phone Company 1(5):4
The Word On the Street~ 7(4):36
There are More Phones than Ever 3(3):23
This Month At 2600 3(4):30
This Month at 2600 3(3):22
This Month's Mischief and Mayhem~ 2(2):9
This Month's Troublemakers~ 2(3):15
Those Horrible Hackers Strike Again 2(1):1
Those Silly Codes 4(10):14
Tidbits~ 8(3):31
Times Changing For Directory Assistance~1(2):9
TINA Message Service~ 2(6):39
Tips On Trashing 6(2):32
Toll Fraud Detection Techniques 7(1):12
Toll Fraud Device 10(2):42
Toll Fraud: What the Big Boys are
Nervous About 9(3):43
Town on Hold During Strike~ 3(7):51
Trashing Alaska Style 2(2):8
Trashing: America's Source For
Information 3(10):73
Trick of the Month~ 1(2):9
Trouble in the White House 10(1):12
Trouble with 800 "Word Numbers"~ 2(9):59
True Colors 10(3):9
TRW Breached by Non-Hackers~ 2(2):9
TRW Credentials Lack Credibility 4(8):4
TRW: Big Business is Watching You 1(7):5
TV Blue Boxes~ 3(8):63
Two Inch Thick Bill~ 2(10):67
U. S. Secret Service Field Offices 9(4):12
U.S. Phone Companies Face Built-In
Privacy Hole 8(4):42
UAPC Update 6(4):45
UNIX Password Hacker 8(1):31
UNIX Password Hacker: An Alternative
Approach 9(1):18
US and France Link Phones~ 3(5):35
US Social Security Prefixes 4(11):6
Use of Wiretaps at Record Pace~ 1(11):63
Useful UNIX Programs 8(3):44
Using the Telephone 9(3):36
USPS Hacking 8(3):32
USPS Hacking Corrections 8(4):21
USSR Computer Hungry~ 3(8):63
Vehicle Identification Numbers 9(4):11
Victimized by Crime Computers~ 1(10):57
Victory for Wiretap Victims~ 1(5):3
Video Review: Assorted Videos 10(2):40
Video Telephone Invention~ 1(12):69
Violating A VAX 3(7):49
Virus Scanners Exposed 9(1):9
Vital Ingredients: Switching Centers
and Operators 1(10):56
VM/CMS Corrections 5(1):8
VMS--The Series Continues 3(2):9
Voice Mail Hacking 9(2):42
Voice Mail Hacking...NYNEX Style 6(3):36
Voice of Reagan Tortures Patients~ 3(11):83
War Game Addict~ 2(9):59
Weathertrak Codes 5(1):15
What a White Box Can Do 2(4):19
What in the EFF? 7(2):10
What it's Like to be a Soviet Operator 5(4):30
What's Going On With Phones/Computers 5(3):10
Whats up~ 8(1):19
When Hackers Ride Horses: A Review of
Cyberpunk 8(2):42
Where Have All the Hackers Gone? 8(2):4
Where One Hacker Went (L) 8(3):24
Whitehouse Extension Numbers 1(1):5
Who Called the Shuttle?~ 3(3):19
Who the Hell was Almon Strowger, Anyway?5(3):9
Who Wants to be Swept?~ 3(12):95
Whoops [errata for 4(9)] 4(10):18
Whose Strike Was That Anyway? 1(4):1
Why Computers Get Snatched 2(8):54
Why Won't They Listen? 8(3):4
Wireless Phones Spell Trouble~ 1(1):3
Wiretap City~ 1(3):3
Wiretap Clarification (L) 7(3):30
Wiretapping and Divestiture: A Lineman
Speaks Out 2(1):1
Word Numbers 4(4):15
Worldnet: Getting Closer Every Day 4(9):4
WORM 6(2):38
Wrath of God Strikes 2600 3(11):86
Wrestlemania Pins Bell~ 3(5):39
Write Protect Tabs Wrong~ 3(2):15
Yellow Scam~ 2(5):27
"You Must First Dial a One..."~ 1(7):7
Your Own Private Centrex~ 3(1):7
2600 THE HACKER QUARTERLY
Author Index: Volume 1 (1984) - Volume 10 (1993)
David Price
Authors are listed in the first column, titles and citations are
listed in the second column using the following format:
V(N):P V = Volume, N = Number, P = Page
910 Elementary Switching 10(4):9
999, The High School Hacking 10(2):13
Abuse, Dr. Magnetic Strips 8(2):7
Advocate, The Devil's Product Review: Do It Yourself Demon Dialer
Kit 9(2):15
Advocate, The Devil's Review: The Hacker Crackdown 9(3)21
Advocate, The Devil's Review: Hacker: The Computer Crime Card Game
9(1):36
Advocate, The Devil's When Hackers Ride Horses: A Review of
Cyberpunk 8(2):42
Advocate, The Devil's USPS Hacking 8(3):32
Agent 003, Boic Hacking Packard 2(3):20
Agent 04, Phucked Outside Loop Distribution Plant, or Hands-On
Experience 5(3):4
Agranoff, Mike The Ballad of Captain Crunch 4(3):4
America, Mainstream More VAX Tricks 4(5):4
Anonymous ANALYSIS: Gulf War Printer Virus 8(4):39
Anonymous Death of NYNEX Business Centers 8(2):11
Aristotle Voice Mail Hacking...NYNEX Style 6(3):36
B/Square & Mr. Upsetter Building a DTMF Decoder 7(1):14
Baalzebub Violating A VAX 3(7):49
Bard, The High School Mac Hack 10(4):15
Bayonet Getting Your File... 10(1):42
Benedict, W. Ritchie Book Review: The Devouring Fungus 9(2):40
Benedict, W. Ritchie Book Review: Virtual Reality 10(4):37
Billsf True Colors 10(3):9
Billsf Hitchhiker Guide to the Phone System
Phreaking in the Nineties 9(2):10
Bluebox, Mark The Truth Behind Those 9999 Numbers 1(1):4
Bootleg Cellular Magic 10(1):4
Bruce, Peter Spanish Phones--and what they don't do
6(2):36
Buggy, Orson Banking from your Terminal--A Look at
PRONTO 2(7):42
Caller, Midnight The Australian Phone System 9(1):31
Capone, Al Hacking on the Front Line 9(3):31
Catalyst, Cheshire Hacking PC Pursuit 4(4):6
Catalyst, Cheshire TAP: The Legend is Dead 4(1):4
Check, Parity Meeting Advice 10(2):16
City, New Hack The New LEC Order: Acronym City 8(1):42
Clayton, Noah Converting a Tone Dialer into a Red Box
7(3):32
Crazed Luddite &
Murdering Thug K001/Ra An Algorithm for Credit Cards 7(3):42
Cruise-CTRL An Overview of DSS1 10(3):36
DC More Conversion Tricks 8(3):43
Delam, Dr. Virus Scanners Exposed 9(1):9
Delam, Dr. Defeating Callback Verification 9(3):9
Dobbs, J.R. "Bob" Building a Red Box 5(2):13
Dragon, The Trashing: America's Source For Information
3(10):73
Drake, John England's Mass Announcements 4(9):10
Drake, John A Trip to England 3(8):58
Drake, John Book Review Nothing New in Computer
Underground by M. Harry 3(6):42
Drake, John An Interview with Hugo Cornwall: British
Hacker/Author 4(2):4
Drake, John An Interview With the Chaos Computer Club
5(4):34
Drewl/Salivate Changing Your Grades on A High School
Computer 10(3):34
Dust Crypt() Source Code 8(4):11
Dutton, Roland Book Review: "The Hacker's Handbook"
4(2):15
Echo Acronyms A-G 10(1):34
Echo Acronyms H-R 10(2):20
Echo Acronyms S-X (no y or z) 10(3):44
Esper Mobile Frequencies 8(4):18
Estev, Paul G. People Express to be Hacked to Pieces
2(5):25
Estev, Paul Reviews: The 1989 Pirate Directory 6(2):42
Eye, Roving Birth of a Low Technology Hacker 8(4):16
Eye, Roving Growth of a Low Tech Hacker 9(4):17
Fed, The The View of A Fed 9(2):38
Fellpe Rodriquez &
Rop, Gonggrijp Stuff You Should Be Interested In~ 8(4):8
Firemonger Surveying the COSMOS 2(2):8
Foley Dan The Telecom Informer 4(6):8
Foley Dan The Telecom Informer 4(3):8
Foley Dan The Telecom Informer 4(4):8
Foley Dan The Telecom Informer 4(2):8
Foley Dan The Telecom Informer 4(1):8
Freeman, John The Telecom Informer 4(5):8
Fresco, Al The Telecom Informer 4(9):8
Frosty of the GCMS Fascinating fone fun 9(1):45
Frosty of the GCMS A Batch Virus 9(1):8
FyberLyte The Magical Tone Box 10(4):22
G.R.A.S.P., Crisp A Guide to the 5ESS 10(2):4
Galaxy, Mister ANSI Bomb 10(2):44
Gam, Tamlyn Silver Box Born in U.K. 7(1):19
Gamma, Bob Are You a Phreak??? 2(3):13
Gerard, Judas More Cellular Fun 10(3):42
Glitch, The Cellular Update 5(3):8
Goldstein The Telecom Informer 4(7):8
Goldstein, Emmanuel A Pen Register For Phreaks?: Product
Review--Dialed Number Recorder 4(5):22
Goldstein The Telecom Informer 4(10):8
Goldstein The Telecom Informer 4(8):8
Goldstein, Emmanuel "FBI Revealed: Reviews--"The FBI Project
Newsletter" & "The FBI and Your BBS" 4(8):9
Goldstein, Emmanuel Never Erase the Past 10(3):19
Goldstein, Emmanuel Review: Sneakers 9(3):17
Goldstein, Emmanuel The Scoop on 911 7(1):37
Goldstein, Emmanuel The New "TAP" 6(2):43
Goldstein, Emmanuel Video Review: Assorted Videos 10(2):40
Goldstein, Emmanuel New Revelations From Bell South 7(3):16
Grapefruit, Rancid A Reader's Reply to Captain Zap 5(2):16
Gray, Jeff WORM 6(2):38
Greek, The International NUA's 4(10):10
Greek, The South African BBS's 4(10):11
Greenberg, Ross M. A Form of Protection For You and Your
Computer 5(2):4
Guru, VM VM/CMS Corrections 5(1):8
Guy, The GCI Trashing Alaska Style 2(2):8
Hackers, Legion of Telenet Addresses 4(5):10
Hank@Taunivm.Bitnet Worldnet: Getting Closer Every Day 4(9):4
Hibbert, Chris Protecting Your SSN 8(3):18
Hobbit, The Getting the Most Out of Equal Access 4(3):6
Holmes, Chester An American Express Phone Story 3(3):17
Holmes, Chester The Free Phones of Philly 3(7):50
Howard The Infinity Transmitter--An Old Bug that
Had Its Time 2(9):58
Icom, Mr. A Review of "The 'Top Secret' Registry of US
Government Radio Frequencies" 4(11):7
Inconnu, Les Product Review: TDD-8 DTMF Decoder 10(2):14
Infidel, The How Payphones Really Work 6(1):30
Infidel, The REMOBS 6(3):32
Infidel, The UNIX Password Hacker 8(1):31
Infidel, The Exchange List: 201 Area Code 6(2):20
Infiltrator A Simple Virus in C 9(3):19
Jaffee, Walter S. Hacking Computer Shows 10(4):16
Jockey, Disk US Social Security Prefixes 4(11):6
Jockey, Keyboard UNIX Password Hacker: An Alternative
Approach 9(1):18
Judicator of D.C. More Meeting Advice 10(4):35
Kevin Internet Outdials 8(1):40
Kid, the & Co. How to Get into a C.O. 2(3):14
Kid, the & Co. Knowing UNIX 3(8):57
Kid, The & Co. Some Facts on Supervision 3(9):65
Kingpin, 617 &
RDT Syndicate Cellular Phone Biopsy 10(4):6
Knight, Red More On Hacking UNIX 6(4):4
Knight, The Dark British News 10(1):44
Knight, Red A Hacker's Guide to UNIX 5(4):12
Kurtz, Colonel Walter E. Class Features 8(4):31
Lineman, The Phoning Home From Europe 4(5):9
Lurch, The 707 Area Code 7(1):44
Luthor, Lex The History of ESS 2(11):74
Luthor, Lex Telenet Directory 2(9):61
Luthor, Lex & The LOD History of British Phreaking 1(9):49
Luthor, Lex Where One Hacker Went (L) 8(3):24
Luthor, Lex & The LOD Fun With COSMOS 2(12):82
Luthor, Lex & the LOD More Info on VMS 2(10):66
Luthor, Lex & The Legion
of Hackers Hacking IBM's VM/CMS--Part Two 4(12):4
Luthor, Lex & The LOD Final Words on VMS 3(3):18
Luthor, Lex & The LOD A Guide to VMS 2(9):57
Luthor, Lex & The Legion
of Hackers Hacking IBM's VM/CMS 4(11):4
Luthor, Lex & The Legion
of Doom/Hackers VMS--The Series Continues 3(2):9
Mac+ New York's IMAS 4(10):4
MAD! Death of a Pay Phone 3(10):73
Man, Swinging Hacking AmiExpress 9(3):4
Marauder, The RSTS For Beginners 3(4):25
Marauder, The & The L.O.D. A HAcker's Guide to the TSPS
Console 4(6):6
Marauder, The &
Phoneline Phantoms RSTS: A Trick Or Two 2(11):73
Master, LNA Listening In: Catch Me if you Can! 4(11):7
MechWariors, GCMS U. S. Secret Service Field Offices 9(4):12
Menace, Hyperborean Caller ID Technologies 10(3):12
Meyer, Gordon & Jim Thomas The Neidorf/Phrack Trial: Day by Day
7(2):4
Micro Surgeon /West Coast
Phreaks Punching Pay Phones 6(3):37
Mitnick, Kevin Pure Cyberfiction, Says Mitnick 8(2):42
Mitnick, Kevin Looking Up IBM Passwords 8(1):36
Mole, The Stumbling into Control on a VMS 4(1):6
Monk, The How to Take Apart A Payphone 9(1):20
Moon, Electric A True Saga of Teleconferencing 1(4):4
Mouse, MCI Hacking MCIMAX 8(2):16
Murphy, Dan Review: CO Magazine 4(9):22
Nathan, Paco Xander Secret Service on Trial 10(1):18
Neidorf, Craig An Appeal For Help 8(4):36
Neidorf, Craig The Terminus of Len Rose 8(1):11
NeurAlien Beginner's Guide to Minitel 9(4):8
Overlord, Dark Lair of the INTERNET Worm 6(3):39
P., Larry The Sprint Gestapo Strikes Again! 6(2):34
Page, Bob A Report on the Internet Worm 5(4):4
Panda, Paranoid In Pursuit of Knowledge: An Atari 520ST
Virus 8(1):4
Panda, Paranoid An MS-DOS Virus 9(1):4
Phoenix, The Beige Box Construction 10(1):14
Phorester, Dr. Clayton Descrambling Cable 10(1):16
Phreak, Nynex Numbers of Interest 4(8):6
Phreak, The Alaskan (TAP) Exploits in Operator Hell 3(5):33
Phreaker, Lord Book Review: "Automatic Teller Machines III"
4(2):21
Phreaker, Cray-Z Product Review: Speech Thing 9(4):45
Phreaker, Lord An Interesting Diversion 2(10):65
Phreaker, Phantom &
Doom Prophet & LOD! Toll Fraud Detection Techniques 7(1):12
Plague, The The Dark Side of Viruses 5(2):8
Plague, The Grade "A" Hacking 6(3):4
Plague, The NYNEX Data 6(4):9
Plague, The UAPC Update 6(4):45
Plague, The An Introduction to COCOTS 7(2):20
Plann, Marshall Useful UNIX Programs 8(3):44
Prefect, Phord Getting Started 9(3):42
PW Human Database Centers 8(4):46
"Q", The The Secrets of Mizar 7(1):8
Rabbit, Peter Cipher Fun 9(4):6
Ranger, Night Voice Mail Hacking 9(2):42
Ranger, Forest Reaching Out On Your Own 2(9):58
Rat, Tech Hacking Smartphone 10(4):11
Rebel Know Your Switch 10(4):10
Reisman, Bruce Telephone Company Responds to Criticism of
Touch-tone Fees 4(10):7
Researcher, The Mobile Phones--Theory and Construction
3(4):26
Resz, Stepher J. Book Review: Approaching Zero 10(3):38
RNOC, Bill From Legion
of Doom Still More on the World of COSMOS 4(3):10
Rocker, The Veteran Cosmic Saudi Arabian BBS List 4(7):21
Rome, Hal from Roman Hackers 4(12):18
Runner, Net Outdials 8(2):44
S., Bernie How the Defeat *69 9(2):31
S., Bernie AT&T Sub Maps 4(8):11
S., Bernie FAX: A New Hobby 4(5):14
S., Bernie Paging For Free 4(6):5
S., Bernie Cellular Phone Fraud and Where It's Headed
4(7):4
S., Bernie Secret Frequencies 8(2):32
Salerno, Mike Getting In The Back Door: A Guide to Some
Popular Operating Systems 2(1):2
Scannon, Lou Book Review: Tune in on Telephone Calls by
Tom Kneitel 5(4):45
Scientist, Mad How to Use Your Silver Box 9(1):16
Severence, No How Phone Phreaks are Caught 4(7):6
Shadow, The Knights of Interesting Things to do on a DEC-20
2(7):41
Shadow, The Wiretapping and Divestiture: A Lineman
Speaks Out 2(1):1
Shadow, The How to Run a Successful Teleconference
2(5):26
Shadow, The Test Numbers 2(11):77
Shadow, The "Equal Access May Not be ""Equal"" to Modems"
2(11):74
Skinner, Scott One Angry Judge 10(1):23
Skinner, Scott &
Emmanuel Goldstein Simplex Locks 8(3):6
Solomenko, E. What it's Like to be a Soviet Operator 5(4):30
Source, U. R, How to Hack Honesty 10(3):20
Staff The Telecom Informer 4(11):8
Statton, Scott Ever Wonder Who Owns All Those 800 Numbers?
6(1):12
Steal, Agent Central Office Operations 7(4):12
Strowger, Almon, Jr. Who the Hell was Almon Strowger, Anyway?
5(3):9
Switchman, Silent And They Call US Crooks? 2(10):65
Switchman, Silent Here's the Secret! 2(11):73
Taylor, Dave Social Interaction with Phones 4(12):17
TELEgodzilla Our Contest Winners 7(4):32
The Kid & Co. &
The Shadow More on Trashing: What to Look for, How to
Act, Where to Go. 1(9):50
"The Snake", Jake Caller ID: The Facts 7(3):5
Thunder, Lord Defeating Trap Tracing 7(3):22
Toad, Texas Capturing Passwords 4(8):10
Tommy BASIC Red Box Tones 5(3):22
Tommy Canadian WATS Phonebook 5(3):23
Upsetter, Mr. Build A Tone Tracer 8(2):14
Upsetter, Mr. Listening In 7(1):19
Upsetter, Mr. Scanning For Calls 6(2):22
Upsetter, Mr. How to Build a Silver Box 6(4):20
Valve, Rex TRW Credentials Lack Credibility 4(8):4
Velcro, Romula Meeting Advice 10(2):17
Videosmith, The CLASS: What It Means To Us 4(5):6
Violence A Guide to PRIMOS 6(2):4
Violence PRIMOS: The Final Part 7(2):14
Violence More Hacking on Primos 6(4):14
William, Sir Some Cosmos Documentation That May Be
Useful 4(2):6
Williams, Dr. Tips On Trashing 6(2):32
Williams, Dr. Hardwiring Your Way In 5(4):42
Williams, Dr. An Interview with Dorothy Denning 7(3):10
Williams, Dr. Book Review: The Cuckoo's Egg 7(1):45
Williams, Dr. A Study of Hackers 10(1):38
Wintermute Operating With Difficulty 4(9):6
Wood, Jim The Early Phreak Days 2(11):80
Woodstein, Condor Psychology in the Hacker World 8(3):38
X, Alien A Way To Catch Peepers 9(1):35
Yuhas, Mike Allnet: A Horror Story 4(6):4
Zap, Captain An Interpretation of Computer Hacking 5(1):16
Zee, Charlie Trouble in the White House 10(1):12
Zero, Count Toll Fraud: What the Big Boys are Nervous
About 9(3):43
Zero, Count Shopper's Guide to COCOTS 9(3):13