💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › 2600_ind captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

2600 Subject Index Volumes 1 (1984) - 10 (1993)
David Price

Subjects are shown in the first column, citations are listed in the
second column using the following format: 
V(N):P  V = Volume, N = Number, P = Page

(L) Indicates a letter


00                              4(9):6
10698                           7(1):30(L)
(201)                           6(2):20
202 bug                         3(9):65
2600 Magazine                   1(1):1, 2(8):51, 4(12):3
2600 meetings                   10(2):17, 10(2):16, 10(4):35, 7(1):38,
                                10(1):43, 10(3):18, 9(4):4 
2600--voice bbs                 9(3):40(L)
2600--BBS                       2(2):9, 2(8):49
4TEL                            6(3):20
(516)                           5(3):14
540s                            8(1):19
550 blocking                    4(11):8
"606 Emergency"                 5(1):24(L)
6.5536 crystal                  7(3):32

(707)                           7(1):44
800s                            6(1):12, 2(6):37, 6(1):12
800--DTMF recognition           3(12):92(L)
800--tariffs                    2(1):4(L)
800--translation table          6(1):12
8038 chip                       4(12):22(L), 4(10):12(L)
900s                            2(11):79
900 translation table           6(1):12
911                             1(10):57, 7(1):37, 
911--documents                  7(2):4
959 Numbers                     4(5):8
97*s                            4(10):4
976 scam                        4(7):8
976 social interactions         4(12):17
9999-suffixes                   1(1):4
access                          3(11):84(L)
ACD                             9(3):28(L)
ACM SIGSOFT                     4(11):13(L)
acronym maker                   4(1):13(L)
acronyms                        10(1):34, 10(2):20, 2(2):11, 10(3):44,
                                8(1):42
ACTS                            6(1):30, 1(11):62
ADS                             1(9):53, 1(5):2, 1(1):2 
ADS--Investigation              1(2):9
Albania                         7(1):23
Allah Akbar!                    3(11):86
Allnet                          5(2):2, 4(6):4
alliance                        2(5):26
American Express--hacking       3(3):17
AmiExpress--hacking             9(3):4
ANAC Guide                      7(3):39
ANI Hunting                     4(1):18(L), 3 (11):84
ANSI Bomb                       10(2):44
answer supervision              3(9):65
anti-hacker propaganda          2(1):1, 7(2):11
AOS                             5(3):10
Approaching Zero Book Review    10(3):38
ARAPANet                        1(6):1
Area Code Expansion             1(3):3
ARPANet military subnet         1(3):5
Arpanet                         4(9):4
arrests...see busts
AT&T Break-up                   1(6):4, 2(11):74
AT&T failure                    6(4):4
AT&T Shutdown                   6(4):4
AT&T Strike                     1(4):1
AT&T Thought Police             2(11):79
ATM III                         4(6):12(L)
ATMs                            1(4):3, 4(7):8
ATMs, Book Reviews              4(2):21
atomic bomb                     1(3):4
ATT Addresses                   9(4):36
Australian phone system         9(1):31
Automatic Call Distributor      9(3):28(L)
AUTOVON                         3(5):37, 4(6):18(L), 3(3):17, 6(1):7, 9(4):19
baby bells                      1(7):3
back doors                      2(1):2
bank records                    1(5):3, 2(7):42
BASIC                           3(1):5
BASIC dialer program            5(1):20
basic phreaking Q & A           6(2):29(L)
BASIC Red Box Tones             5(3):22
basic terms                     4(5):13(L)
BBS Disclaimers                 4(7):12(L), 4(10):16
BBS--Government                 10(2):39
BBS--Protecting a User Log      3(2):16(L)
beepers                         4(11):12(L)
Bell computers                  9(4):42
Bell Routing Codes              5(1):42
Bellco cops                     5(1):22
Bellcore Publications           3(5):36
Best Boast                      5(1):24(L)
Big Brother                     3(12):91, 9(1):42, 8(4):8, 1(12):68, 7(3):16,
                                1(8):44
billing signals                 3(9):65
BIN list                        8(2):31
BITnet                          2(1):6, 4(9):4
black band                      4(11):7
BLV (Busy Line Verification)    5(3):27(L), 8(4):42, 4(12):10
bogus tap-check number myth     4(2):13(L)
Box--Beige                      5(4):42, 10(1):14, 10(3):9
Box--Blue                       3(2):12 (L), 2(10):69, 9(4):33, 2(2):7,
                                3(5):36 (L), 10(3):9, 6(1):25 (L), 3(5):38
Box--Clear                      1(7):4
Box--Combo                      9(3):13
Box--General info               10(3):9, 5(1):16
Box--Green                      7(1):29 (L), 10(3):9
Box--Rainbow                    10(3):9, 9(2):15
Box--Red                        5(2):13, 10(2):42, 7(3):32, 8(3):43, 10(3):9
                                9(3):13
Box--Silver in U.K.             7(1):19
Box--Silver                     6(4):20, 9(4):19, 9(1):16, 10(3):9, 1(11):64
                                (L), 3(3):17
Box--White                      2(4):19, 10(3):9
Box--yellow                     10(3):9
braille computer                3(12):95
British Telecom                 8(2):35
British Payphones               4(10):17(L)
busts                           4(3):18, 4(7):18 (L), 6(2):26 (L), 4(7):6,
                                2(5):27, 1(7):7, 3(12):91, 2(2):9, 8(4):36,
                                1(10):55, 10(4):4, 8(3):4, 7(3):44, 8(2):4,
                                4(8):3, 8(4):8, 7(3):10, 7(1):3, 6(1):3,
                                8(1):11, 8(2):12, 8(1):11, 6(2):34, 9(2):22
Busy Line Verification...see BLV
busy                            10(4):9
busy--"fast busy tones"         5(2):27(L)
busy--busy verification         3(10):80(L)
cable descrambling              10(1):16, 3(8):63
cable vaults                    7(4):12
Call Forwarding, Diverting      2(10):65
Call-Waiting Phone Tap          6(3):27
callback verification           9(3):9
Caller ID                       3(12):91, 8(1):19, 9(2):18, 7(3):5, 10(3):12,
                                8(2):22, 8(2):35
Caller ID--and Cell Phones      10(3):42
calling ards                    1(4):3, 1(6):3, 1(1):3, 1(2):9
call records (ESS)              1(2):8
call traces (ESS)               1(2):8
canning                         3(10):76(L), 5(4):42
Captain Crunch                  4(3):4
Captain Midnight                3(9):68(L)
Captain Zap's sins              5(2):24(L)
card copiers                    8(2):7
Carrier Access Codes            6(3):42
CCCP                            3(3):23
CCIS                            4(11):12(L), 2(2):7, 4(5):6
CCITT                           9(2):10
CD-ROM                          3(12):95
cellular biopsy                 10(4):6
cellular fraud bust             4(4):8
cell frequencies                4(1):10, 10(1):4, 4(7):13(L)
cellular modem                  3(5):35
cellular phones                 2(11):79, 5(3):8, 10(4):6, 4(6):8, 3(12):89,
                                4(2):13(L), 4(2):8, 10(3):42, 4(7):4,
                                3(11):90, 10(1):4
cellular phones--history        3(11):90
Central Offices                 2(3):14, 7(4):12
Central Office IDs              4(10):14
Chaos Computer Club             5(4):34
China                           3(8):63
Chinese dial-a-narc             6(2):35
CIA                             1(12):68, 1(8):46(L)
Carrier Identification  Codes   1(11):65
CIC                             7(1):8
CID... see Caller ID 
ciphers                         9(4):6
CLASS features                  8(4):31, 8(2):22, 4(5):6 
CLLI codes                      4(10):14
CN/A                            3(9):72(L), 4(8):12, 2(3):18, 
CNA--Lists                      4(4):10
CND                             8(2):22
CO Magazine                     4(9):22
COCOTS                          6(4)27(L), 7(2):20, 7(4):27(L), 8(2):28
                                (L), 8(3):25(L), 9(3):13, 8(1):19, 4(11):8
                                8(2):35 
COCOT--database list            8(4):33 
COCOT--numbers                  8(3):22
COCOT--refund letters           8(4):33
COCOT--tricks                   7(3):27(L)
codes                           9(4):6
codes--methods                  1(3):2
coin boxes                      5(3):10
coin-test number                4(4):20(L)
COLTs                           6(3):20
commentary                      2(8):50
Common Language Location Identifer...see CLLI
Communications Fraud Control 
 Association                    7(4):43
competition                     6(3):3
Compuserve                      3(10):75
Computel                        2(3):15
Computel scam                   3(2):12(L), 4(4):4, 3(5):34
computer confiscation           2(8):54
computer lore                   9(2):40
computer shows                  10(4):16
computer threat                 1(6):3
conferences                     10(3):4
Congress--paranoia              10(3):4
CONSUS                          6(1):7
cop watching                    9(1):7
cordless phones                 1(1):3, 6(2):22, 7(1):19 
Cornwall, Hugo                  4(2):4
corvis hacking                  4(11):12(L)
COSMOS                          2(2):8, 6(3):13, 4(2):6, 4(3):10, 2(12):82,
                                7(1):8
COSMOS--abbreviations           4(3):10
COSMOS--demise                  6(3):13
COSMOS--documentation           4(2):6
COSMOS--history                 4(3):10
COSNIX Operating System         4(2):6
Country codes                   1(2):10, 3(7):53
couplers                        9(2):4
court news                      3(4):27, 2(4):21, 1(4):3, 1(6):3, 8(4):36,
                                1(5):3
covering tracks                 4(7):6
covert radio broadcasts         4(11):7
CPA-1000                        4(8):12(L)
credit card algorithms          7(3):42
credit files                    10(1):42
Cross-Bar--oddities             3(3):20(L)
crypt preview                   8(3):44
crypt() source code             8(4):11
current events                  3(3):22
customs                         8(2):35
"Cyberpunk" fictions            8(2):42
DAST                            10(4):22
data transmission--quality      3(9):71
DCS                             3(3):17
DEC-20--hacking                 2(7):41
(DEC)PDP                        3(4):25
Defense Communications Agency   5(1):24(L)
Defense Data Network listing    1(5):4
Denning, Dorthy                 7(3):10
Department of Justice           9(2):22
deregulation                    1(7):3
dial back security              3(2):10
Dialed Number Recorder--see DNR
dialer--demon                   9(2):15
dialer programs                 5(1):20
dialing * on rotary phones      3(12):96
dialup numbers                  4(8):6
Dicicco, Lenny                  8(2):42
digital lock combinations       10(4):38
Direct Analog Storage Technology...see DAST 
direct dialing                  4(3):8
directories                     2(5):27, 3(12):95
Directory Assistance
 --usage fees                   1(2):9
Disney radio frequencies        9(1):17
divestiture                     3(1):1
DMERT                           10(2):4, 8(4):45
DMS 100                         1(7):3(L), 10(4):10
DNIC (Data Network ID Codes)    7(1):40
DNR                             7(3):16
DOCKMASTER break in             5(3):20
DoD                             3(3):19
DSM                             6(4):14
DSS1                            10(3):36
DTMF dialers                    8(3):43
DTMF decoder                    7(1):14, 10(2):14
DTMF overview                   9(2):10
dumpster diving                 1(2):10, 2(2):8, 1(9):50
Duophone CPA-1000               4(5):22
Dutch hackers                   8(3):4
E-Card                          4(5):8
E-COM                           1(6):3, 1(6):5
EASYnet                         8(2):18
Electronic Freedom Foundation   7(2):10
Electronic Privacy Act          4(6):8, 4(4):8
electronic surveillance--NSA    2(12):83
email systems                   1(12):71
Emergency Interrupts            4(12):10
encryption                      3(4):31, 3(10):79, 2(1):3, 9(4):6
equal access                    4(5):17(L), 4(3):6, 4(3):8, 4(12):20
errata for 4(9)                 4(10):18
ESN                             10(4):6, 10(1):4, 10(3):42, 4(7):4 
espionage                       2(3):15
#1ESS                           7(4):12, 10(4):10
#4ESS                           7(4):28(L)
#5ESS switch                    10(2):4, 10(4):10, 8(4):45, 8(4):45
ESS                             3(10):79, 1(2):8, 1(6):2, 6(1):25(L),
                                2(11):74, 1(7):3, 10(4):10
ESS Bust methods                1(7):3(L)
essay                           2(12):81, 1(12):67, 7(4):32
European phone systems          4(5):9
exchanges                       3(8):62
Falwell, Jerry                  5(1):25, 5(2):39, 3(1):3
Farrell's Ice Cream-covered 
 narcs                          1(8):45
fax taps                        9(1):42
FAX                             4(5):14
ftp tricks                      8(3):14
FBI                             3(11):83, 3(10):75, 3(9):67, 1(11):63,
                                9(2):22, 1(1):2, 4(8):9, 1(1):3
FCC                             4(6):8, 3(9):71, 1(6):3

Feds                            9(2):38
feeder groups                   5(3):4
fiber-optics laid 
 along rails                    3(6):48(L)
finger monitor program          9(1):35
fingerprints                    3(12):95
FM wireless transmitter--plans  8(4):44
fortress fones...see pay phones 
Frame Room                      7(4):12
France                          2(12):83
gangs                           7(4):36
GBS                             4(10):4
GEISCO                          2(1):3
general phone rants             4(1):20
Germany                         2(12):87
Gore, Albert                    5(1):26(L)
grade hacking                   10(2):13, 10(4):15, 10(3):34, 6(4):45,
                                6(3):4
GTD#5                           2(11):73
GTE--Telemail                   1(1):3
GTE Telcos                      6(3):33
Gulf War printer virus          8(4):39
"Hacker"                        9(1):36
Hacker Con                      6(3):10
The Hacker Crackdown            9(3)21
hacker morality                 2(6):34
hacker scares                   9(4):4
hacker sourcebooks              1(11):64(L)
hacker study                    10(1):38
hacker video                    8(3):14
Hacker's Handbook               4(2):15, 4(2):4
hackers credo                   1(3):1, 9(4):17
hackers in hiding               8(3):24(L)
hacking beginnings              9(3):42
hacking history                 5(1):16
hacking lore                    8(4):16, 2(8):52, 5(1):24(L), 4(2):13(L)
hacking reading list            7(4):6
hacking recycling machines      1(2):9
hacking statistics              3(6):41
Hack-Tic                        9(2):15
harmonica bug                   2(9):58
HBO                             3(10):75
Hess, Mark                      7(1):45
high school hacking--news       1(3):3
history--phreaking UK           1(9):49
Hoffman, Abbie                  4(1):4
         --Obituary             6(2):3
Holland's hackers               2(4):21
home monitoring                 1(4):2
honesty tests                   10(3):20
HP2000--hacking                 2(3):20
human database centers          8(4):46
humorous defense against 
 telco threats                  2(2):10(L)
IBM                             1(1):2
IBM's Audio Distribution 
 System                         1(5):2
IC                              1(11):65
ICLID                           7(3):5
ICN                             3(11):81
IMAS                            4(10):4
IMTS                            3(4):26, 3(12):89
In-Band Signaling               2(2):7
India                           3(9):67
induction coil--plans           7(3):36
infinity transmitter            2(9):58
information manipulation        9(4):17
INSPECT                         8(2):18
Intelpost                       1(5):3
internet dialups                10(4):32
internet outdials               8(1):40
internet worm                   5(4):4, 6(3):39
Interoffice Signalling          7(4):12
intro to hacking                2(6):40
IRS                             3(2):15, 3(10):79, 2(1):3, 2(3):15, 2(6):35
ISDN                            10(3):36, 8(1):42 
Israel--phone system            2(6):33, 4(4):16
Israeli computer surveillance 
 of West Bank                   4(12):8
Italian hackers                 4(12):18
ITT 2100 switch                 4(7):12(L)
ITT--boxing                     3(5):38
I've fallen and I can't 
 get up                         3(9):67
Jackson, Steve                  10(2):45, 10(1):18
jail                            10(4):4
JANET                           4(9):4
Kenya                           2(3):15
Kiev                            3(6):47
KKK--racist BBS systems         2(1):3
Kranyak, Jack                   3(5):34, 4(4):4
Landreth, Bill                  4(9):12(L)
laptop tone generation          9(4):45
laptops                         1(2):9, 9(2):4
LASS System                     4(5):6
law enforcement--confiscation   2(8):54
LD Carriers                     4(12):20
LD Fees                         1(5):3
LEC                             8(1):42
legalistic banter               2(1):4(L)
Legislative Network             7(4):4
letter sorting machines         8(3):32, 8(4):32
lineman's handset               10(1):14
LODCOM compilation review       10(3):19
loop number patterns            4(1):12(L), 1(9):52(L)
loop testing                    6(3):20
magnetic card tricks            9(1):27, 8(4):40 (L), 8(2):7
mail drops                      7(3):29 (L)
manholes                        5(3):4, 7(4):12
Marcos                          3(4):27
marine radio ch 26              7(1):19
Marquee                         3(3):19
Max Headroom-Chicago style      4(12):8
MCI Mail--hacking               1(12):67, 1(7):2
MCI Numbers                     1(4):5
MCI scam                        5(4):10
MCI                             6(1):36, 1(3):2, 8(2):16
media hype                      8(3):4
merchant ship calls             2(6):36(L)
MF tones                        2(3):16(L)
microwave links                 1(3):2
MicoVAX                         3(9):71
military computers              5(1):24 (L)
MILNet                          2(7):45
MIN                             4(7):4
Minitel                         4(9):8, 9(4):8
missile systems                 2(4):21
Mitnick, Kevin                  7(1):3, 6(1):3, 6(3):14, 8(2):42
MIZAR                           7(1):8
mobile hacking                  9(2):4
mobile telephone freqs          6(3):24 (L), 8(4):18, 3(4):26
monitoring microwave            5(1):4
Morris, Robert                  6(3):14, 6(4):6, 7(1):23
motivation--hackers             1(3):1
MTSO                            3(12):89
MPOW                            4(5):12(L)
narcs                           9(2):38, 1(11):64(L)
National Coordinating Center    5(1):24 (L)
Navy                            3(10):75
Nazi BBS                        2(3):13
NCCCD                           3(6):41
Neidorf, Craig                  7(1):3, 7(2):4, 7(2):3, 7(2):8, 7(3):44,
                                8(4):36
neo-Nazi games                  8(2):12
net addresses                   2(4):23, 3(11):82
Network 2000                    7(3):8
news                            4(10):8, 5(1):37, 9(4):19, 4(11):8
new services                    8(2):35
non-supervised phone lines      3(6):44(L)
Nothing New in 
 Computer Underground           3(6):42
NPA count                       6(4):44
NSA                             2(10):67, 1(9):51, 2(7):47, 1(10):57,
                                3(9):67, 5(3):20, 2(12):83, 3(10):79
NSA's Phone Number              2(3):16(L)
NUAs--international             4(10):10
nuclear free America            4(3):2
numbers                         4(12):21, 5(2):44, 9(1):45
NY Tel                          4(7):15
Nynex exchange addresses        10(4):18
NYNEX                           8(2):11, 6(4):9, 6(3):36
NYNEX--Radio Frequencies        8(2):32
NYNEX--switch guide             6(4):9
obit--David Flory AKA Dan 
 Foley AKA The Shadow           6(2):45
    --Abbey Hoffman             6(2):2
operating systems..see individual entries (e.g. VM/CMS, UNIX...)
operator humor                  7(4):16
operator identification of 
 payphone                       1(2):10(L)
operator service                4(9):6
operators                       1(10):56
operators--social engineering   3(5):33
operators--USSR                 5(4):30
ouch!                           5(2):16
outages                         8(2):35
outdial list                    8(1):40, 8(2):44
"Out of the Inner Circle"       2(6):34
outside local loop 
 distribution plant             5(3):4
pagers--scanning                4(6):5
paranoia                        1(7):3, 2(1):1, 3(5):39, 8(2):4, 2(8):50,
                                1(7):1, 9(4):4
parking summons                 1(7):3
password grabber                3(8):60(L)
passwords                       4(9):14, 8(1):36, 9(3):31, 4(8):10,
                                4(5):4
passwords--common               9(3):31
passwords--hacking IBMs         8(1):36
passwords--UNIX                 8(1):31
pay phones                      6(1):30, 1(11):62, 6(3):37, 1(2):10
pay phone--destruction          3(10):73
pay phone--dissection           3(10):73, 9(1):20
PBX trix                        4(1):12(L)
PC Pursuit                      2(9):58
PC Pursuit--hacking             4(4):6
PC-Pursuit--outdial list        8(2):44
PDP-11                          2(11):73
Pen registers                   3(2):11, 4(9):13, 4(12):12(L), 4(5):22
Pentagon                        1(12):69
People Express                  2(5):25
pet cemeteries                  8(2):35 
Phiber Optik                    10(4):4
phone directories of the World  4(4):16
phone frequencies               5(4):19
phone interception              5(1):4
phone news                      9(2):19
phone numbers                   8(1):17
Phoenix Project                 7(1):3
Phrack                          7(1):3, 7(2):3, 7(2):4, 7(2):8, 8(1):11,
                                8(4):36, 9(2):22 
phreak anticdotes               1(9):52
phreak history                  2(11):80, 5(3):9
phreak typologies               2(3):13
phreaking overview              9(2):10
Pick operating system           3(6):42
pink noise                      2(2):7
PINs                            4(11):8
pirate radio                    6(2):42
Pitcairn Island                 2(9):59
PKZIP BBS hack method           9(1):12
plane phones                    1(11):63
poetry                          4(8):20, 4(3):4
police computers                2(5):27
police setups                   3(4):30
police surveillance             1(8):44
political hacking               7(4):4
porn                            2(6):35
postal paranoia                 4(3):12(L), 1(4):20(L)
POSTNET                         8(4):21, 8(3):32
PRIMOS                          7(2):14, 6(2):4, 6(4):14
prison computers                8(4):5
prison phones                   7(3):29(L), 9(4):13
prison update                   8(2):46
privacy                         1(5):3
Privacy Act of 1974             8(3):18
Private Sector BBS              2(8):49, 2(9):59, 3(1):1, 3(3):22, 3(4):30
Prodigy censorship              6(4):43(L)
Prodigy--STAGE.DAT conspiracy   8(3):26, 8(4):29(L), 8(1):19
product list                    7(4):6
product review: Duophone 
 CPA-1000                       4(5):22
Programs--Hacking IBMs          8(1):36
PRONTO                          2(7):42
proto-phreak                    5(3):9
PSAP                            7(1):37
psychological makeups           8(3):38
psychobabble                    7(3):44
Puerto Rico                     3(10):76(L)
pyramid schemes                 3(10):79, 4(6):4
radio scanners                  6(2):22, 5(4):45
Raids...see busts  
RC channel                      10(2):4, 8(4):45
RCI                             3(9):65
RCMAC                           7(1):8
Reagan, Ron                     2(5):27, 1(12):69, 3(11):83
REMOB (Remote
 Observation)                   5(1):27(L), 2(5):28(L), 6(3):32, 7(1):24(L),
                                2(9):60(L)
resources guide                 3(6):46, 7(4):6
return call                     9(2):31
The Rise of the Computer State  1(8):44
ROLM                            6(3):24(L), 3(11):88(L)
ROLM CBX II 9000                5(1):30
Rose, Len                       8(2):12, 8(1):11
routing codes                   5(1):42
Royko, Mike                     2(11):75
RS CPA-1000                     4(5):22
RSTS                            3(4):25, 2(11):73
Russian phone books             3(5):36(L)
Russian phone numbers           3(5):36(L)
SAC                             5(3):4
Santa scam                      6(1):36
SAT                             10(1):4
satellite phone transmissions   4(11):7
satellite links                 5(1):4
satellite jamming               3(3):23
satellites--hacking myths       2(8):52
Saudi Arabia                    4(7):21, 3(10):80(L)
scams                           7(4):22, 2(4):21
scanners                        7(1):19
SCCs                            7(1):8, 7(1):37
school records                  10(2):13, 10(4):15, 10(3):34
scramblers                      1(8):46(L), 3(4):29
secret frequencies              8(2):32
Secret Service                  2(6):34, 9(4):4, 9(4):12, 9(2):38, 10(1):18,
                                10(1):43, 10(3):18 
Secret Service--radio 
 frequencies                    9(1):17
secured trunks                  6(1):24(L)
sentry security                 8(4):5
security                        8(2):18, 7(3):10
Serving Area Interface          5(3):4
Sherwood Forest--busted         2(6):34
shortwave                       3(9):67
$SHOW PROCESS/PRIV              4(1):6
Simplex corrections             8(4):21
Simplex lock location guide     9(1):38
Simplex locks                   8(3):6
SL-1 Switch                     3(9):68(L)
Smartphone hacking              10(4):11
"Sneakers"                      9(3):17
social engineering              2(3):14, 2(4):19
Social Security Number 
 prefixes                       4(11):6
South Africa                    4(10):11
South African phreaks           6(2):24(L)
SouthWestern Bell               9(4):42
Soviet Union                    8(1):16
Spain                           6(2):36
Speech Thing: product review    9(4):45
spoofing VAX login              4(8):10
Springsteen                     2(11):75
Sprint                          6(2):34
spying on 2600                  7(3):44
SS7                             10(3):12
SSNs                            3(7):51, 8(3):18
SSTs                            7(1):12
Step Offices                    1(5):1
Sterling, Bruce                 9(3)21
Steve Jackson Games             10(1):23
Stasi                           8(1):19
sting BBS's                     3(6):44(L), 3(9):66
stings                          3(5):39
Stoll, Cliff                    7(1):45
Strowger, Almon                 5(3):9
submarine cable maps            4(8):11
surveillance                    3(12):95
survey                          2(12):84, 4(8):15
Sweden's "Person Numbers"(ID)   1(3):3
SWITCH                          8(1):42
switch guide                    1(5):1, 7(4):12, 10(4):9, 10(4):10
switch overloading              3(12):91
switch-hook dialing             4(12):12(L)
switches...see specific switch
switching centers               1(10):56
switching routes                2(3):16(L)
switching systems               2(5):27
Sysops--protective measures     2(8):55
TAP                             4(1):4, 6(2):43
taping payphone tones           7(3):36
telco info-fishing techniques   3(10):76(L)
telco nonsense                  1(5):4, 9(3):36
telco offices                   10(2):36
telco reneging                  2(10):65
telco--fighting back            1(8):46
telco--assisting wiretaps       2(1):1
tele-harassment                 3(2):10
Telecom                         6(3):12, 3(8):58
Telecom debit cards             4(1):8
teleconferencing                2(5):26
teleconferencing--anticdotes    1(4):4
telemail--access                1(4):2
Telenet                         3(6):47, 2(9):61, 4(6):9, 4(5):10, 3(11):84
                                (L), 1(2):7
telephone basics                1(8):43
telephone induction coil        7(3):36
Telstar 301                     4(11):7
TELETEL Networks                9(4):8
"Terac"                         5(1):24(L)
terminal locks                  8(3):44
test channel                    10(2):4, 8(4):45
test equipment--construction    8(2):14
test numbers                    2(11):77
Thailand                        2(6):39
Thought Police                  1(8):44, 8(4):8, 1(12):68, 7(3):16
time service                    2(4):21
TINA                            2(6):39
toll fraud detection            7(1):12, 9(3):43
tone tracer construction        8(2):14
tone catcher                    10(4):22
TOPS-10                         2(1):2
TOPS-20                         2(1):2
touch tones                     3(12):91
touch-tone fees                 4(10):6, 4(10):7, 4(2):18
trace procedures                3(1):4(L), 7(4):12
tracking devices                3(4):28(L)
trade magazines                 4(6):13(L)
transaction codes               2(12):82
Trans-Pacific Cable             2(11):79
trap tracing--defeating         7(3):22
trashing                        2(2):8, 1(2):10, 1(9):50, 3(10):73, 6(2):32
Travelnet                       1(11):61
trojan                          6(4):6, 5(2):4, 3(7):49
TRW                             2(2):9, 4(8):4, 1(7):5, 10(1):42
TSPS                            1(2):10, 2(1):4(L), 6(1):30, 1(11):62
TSPS Console                    4(6):6
TVRO                            5(1):4
UAPC                            6(3):4, 6(4):45
UK Data Protection Act          10(2):12
UK Message List                 4(9):10
UK Operator Numbers             3(8):58
Ultra Forward                   9(2):31
unassigned area codes           5(3):10
UNIX--common accounts           9(3):31
UNIX--hacking                   3(4):28(L), 3(8):57, 5(4):12, 6(3):28 (L),
                                6(4):4, 2(1):2 
UNIX--password hacker           9(1):18, 8(1):31, 8(2):24(L)
USC--Phony Degrees              2(2):9
U.S. Military Telephone 
 Network                        9(4):19
USPS                            8(3):32, 8(4):32
USSR                            2(4):21, 3(8):63, 5(4):30
UUCP                            4(9):4
VAX                             3(8):60(L), 4(5):4, 3(7):49, 2(9):57, 4(1):6
VAX--common accounts            9(3):31
VAX--worm                       6(2):38
VMS                             4(5):4
VDT                             3(3):19
VDT operators                   3(8):59
vehicle tracking monitors       1(1):3
verification                    2(9):58, 4(12):10
VFY                             4(12):10
video reviews                   10(2):40
VINs                            9(4):11
viri                            5(2):4, 5(2):8, 6(3):14, 9(3):19
virus--Atari code               8(1):4
virus--batch virus              9(1):8
virus--Gulf War                 8(4):39
virus--MSDOS (code)             9(1):4
virus "protection"              5(2):4, 9(1):9
virtual reality                 10(4):37
Virtual Memory operating System--see VMS
VM/CMS                          4(11):4, 4(12):4, 5(1):8
VM/CMS--acronyms                4(11):4
VM/CMS--filemodes               4(12:4
VM/CMS--password 
 characteristics                4(12):4
VM/CMS--privileged commands     4(12):4
voice mail hacking              6(3):36, 9(2):42
VMS                             3(3):18, 3(8):60(L), 2(9):57, 3(2):9,
                                2(10):66, 3(7):52, 4(1):6, 2(1):2
VMS--UAF                        2(10):66
VMS--common accounts            9(3):31
VMS--default passwords          3(7):52(L)
VR                              3(9):71
WATS                            5(3):23, 3(11):81, 1(9):52(L)
WATS directory                  4(1):18(L), 4(4):21(L)
Weathertrak codes               5(1):15
Weendland, Mike                 3(9):66
Western Union                   4(7):6
Western Union EasyLink          1(12):67
White House phones              1(1):5 ,10(1):12
wild claims                     6(4):30(L)
Winnipeg                        3(9):69
wire fraud news                 2(3):15
wireless modem                  4(7):13(L)
wiretaps                        1(4):3 2(6):35, 2(1):1, 7(3):30(L),
                                3(12):91, 1(11):63, 1(10):57, 2(9):58,
                                9(2):22
wiretaps--legalities            1(5):3
wiretaps--police                1(3):3
witch hunts                     7(3):10
word numbers                    4(4):15
world's most evil operator      1(7):3(L)
worms                           5(2):4
worm--Ada                       6(2):38
worm--internet                  6(3):39
WWIV BBS--hacking               9(1):12
XY Step switching station       1(5):3(L)
YIPL...see TAP
yellow pages                    3(3):23
yellow pages scam               2(5):27
Zinn, Herbert                   6(1):3, 7(1):3  


Title Index: 2600 Volume 1 - 10  
David Price
 
The Title Index references all articles in 2600 THE HACKER 
QUARTERLY from Volume 1 (1984) through Volume 10 (1993).  
These articles are references using the following format: 
V(N):P  Where V = Volume, N = Number, and P = Page 
 
EXAMPLE: 
Building a Telephone Induction Coil     7(3):36  
 
Thus the article in the above example is found in Volume 7, 
Number Three, on page 36. 
  
~   Denotes a "news" article  
(L) Denotes a letter of note
 
------------2600 Title Index, Vol. 1 - Vol. 10------------- 
  
1984 Arrives in Hong Kong~              1(1):3   
$2 Billion Error~                       2(7):43  
22013664431--Call it!                   3(3):22  
2600 A Hacking Victim~                  2(8):51  
2600 Bulletin Board Online              2(2):9  
2600 Exposes New York Tel               4(7):15  
2600 Information Bulletin               3(9):69  
2600 Information Bureau                 3(10):77  
2600 Information Bureau                 3(8):61  
2600 Information Bureau                 3(11):85  
2600 Information Bureau                 3(12):93  
2600 Writer Indicted~                   1(6):3  
411--News About Phone Companies~        8(2):35  
414 Bust~                               2(5):27  
414's Plead Guilty~                     1(4):3  
4TEL                                    6(3):20  
$6,829 Phone Bill~                      3(6):43  
617 Will be Divided~                    3(4):31  
718 Is Coming~                          1(3):3  
74,000 Calls to Fraud Line~             3(7):55  
800 Directories Now Available~          1(8):45  
800 Prefixes Listed by States           2(6):37  
818 Here to Stay~                       1(11):63  
911 Suspect Hung Up~                    1(10):57  
A 414 is Sentenced--Other Indicted~     1(5):3  
A Batch Virus                           9(1):8  
A Bittersweet Victory                   7(2):3  
A Blast From the Past                   9(4):33  
A Challenge to Hackers~                 2(1):3  
A Form of Protection For You & Your  
  Computer                              5(2):4  
A Friend in High Places                 1(9):52  
A Guide to PRIMOS                       6(2):4  
A Guide to the 5ESS                     10(2):4  
A Guide to the Israeli Phone System     2(6):33  
A Guide to VMS                          2(9):57  
A Hacker Survey                         4(8):15  
A Hacker's Guide to the TSPS Console    4(6):6  
A Hacker's Guide to UNIX                5(4):12  
A Hacking Reading List                  7(4):6  
A Look at the Future Phreaking World:  
  Cellular Telephones--How They Work    3(12):89  
A Mechanical Hacker~                    2(3):15  
A Pen Register For Phreaks?: Product  
Review--Dialed Number Recorder          4(5):22  
A Phone Phreak Scores                   2(4):19  
A Political Hacking Scandal             7(4):4  
A Reader's Reply to Captain Zap         5(2):16  
A Report on the Internet Worm           5(4):4  
A Review of "The 'Top Secret'Registry  
  of US Government Radio Frequencies"        4(11):7  
A Simple Virus in C                     9(3):19  
A Story of Eavesdropping                3(4):29  
A Study of Hackers                      10(1):38  
A Time For Reflection                   1(12):67  
A Trip to England                       3(8):58  
A True Saga of Teleconferencing         1(4):4  
A Unique Obscene Caller~                3(2):1  
A Way To Catch Peepers                  9(1):35  
A Word on Wiretapping~                  1(4):3  
Acoustic Trauma                         3(2):15  
Acronym List                            2(2):11  
Acronyms A-G                            10(1):34  
Acronyms H-R                            10(2):20  
Acronyms s-x (no y or z)                10(3):44  
ADS Investigation Moved?~               1(2):9  
AHOY!                                   1(1):1  
algorithm for credit cards correction   7(4):25  
All About BLV: Busy Line Verification   4(12):10  
Allnet's Legal Problems                 5(2):2  
Allnet: A Horror Story                  4(6):4  
Alternate Long Distance                 1(3):2  
American Network Fears Hackers~         3(5):39  
An Algorithm for Credit Cards           7(3):42  
An American Express Phone Story         3(3):17  
An Appeal For Help                      8(4):36  
An Interesting Diversion                2(10):65  
An Interpretation of Computer Hacking   5(1):16  
An Interview with Craig Neidorf         7(2):8  
An Interview with Dorothy Denning       7(3):10  
An Interview with Hugo Cornwall:  
  British Hacker/Author                 4(2):4  
An Interview With the Chaos Computer  
  Club                                  5(4):34  
An Introduction to COCOTS               7(2):20  
An MS-DOS Virus                         9(1):4  
An Official Crackdown on Hackers~       1(7):3  
An Overview of AUTOVON and Silver Boxes 3(3):17  
An Overview of DSS1                     10(3):36  
ANALYSIS: Gulf War Printer Virus        8(4):39  
Anatomy of a rip-off                    7(4):22  
And They Call US Crooks?                2(10):65  
Another Astronomical Phone Bill~        3(1):3  
Another FBI Computer File~              1(11):63  
Another Hacker Story~                   1(9):51  
Another Stinger Is Stung                3(9):66  
ANSI Bomb                               10(2):44  
Are You a Phreak???                     2(3):13  
ARPANET Hopping: America's Newest  
  Past time                             1(6):1  
ARPANet Military Subnets                1(3):5  
At the Last Stroke...~                  2(4):21  
AT&T Best For Hackers~                  3(9):71  
AT&T Computer Caught Stealing~          2(6):35  
AT&T Contractual Obligations~           2(6):39  
AT&T Credit Cards Make Debut~           1(1):3  
AT&T Does it Again~                     3(1):3  
AT&T Faces Serious Money Problems~      1(9):51  
"AT&T Keeps ""800"" Data To Itself~"    2(2):9  
AT&T Limits Use of their Credit Cards~  1(6):3  
AT&T Offers E-Mail~                     2(12):87  
AT&T Put On Hold~                       2(7):47  
AT&T Selling Pay Phones~                3(7):55  
AT&T Sub Maps                           4(8):11  
AT&T to Read E-Mail~                    2(11):79  
AT&T/BOC Routing Codes                  5(1):42  
ATM's in China~                         3(8):63  
Automated Operators Coming~             3(7):55  
AUTOVON Numbers                         3(5):37  
Avoid Phones in Storms!~                2(11):79  
Bad Tenant Database~                    3(4):27  
Bank Records Aren't So Private~         1(5):3  
Banking from your Terminal--A Look  
  at PRONTO                             2(7):42  
"BASIC ""Wargames Dialer Program"       5(1):20  
BASIC Red Box Tones                     5(3):22  
BB Traffic Cop~                         3(9):67  
BB Watching VDT Operators~              3(8):59  
BB Watching Without Regulation~         2(12):83  
BBS Listing                             2(12):85  
Be Nice to Your Telco                   1(8):46  
Beginner's Guide to Minitel             9(4):8  
Beige Box Construction                  10(1):14  
Belcore's Plans for Caller ID           9(2):18  
Bell Atlantic & MCI Collaborate~        3(2):15  
Bell Credit Card Abuse Soars~           1(4):3  
Bell Didn't Invent Phone?~              2(6):35  
Bell Propaganda Films~                  2(9):63  
Bell to AT&T: Get Lost!~                1(7):3  
Bellcore Publications Go Public~        3(5):36  
Beware of Hacker Terrorists~            3(5):39  
Big Brother No longer Watching Miami~   1(8):44  
Big Computer Crime Pays~                3(6):43  
Big Deal for Little Town~               2(11):75  
BIN List                                8(2):31  
Birth of a Low Technology Hacker        8(4):16  
BITnet Topology                         2(1):6  
Blue Box Schematic                      2(10):69  
Bogota, Columbia Gets Extra Digit~      3(5):39  
Book Review Nothing New in Computer  
  Underground by M. Harry               3(6):42  
Book Review: "Automatic Teller  
  Machines III"                         4(2):21  
Book Review: "The Hacker's Handbook"    4(2):15  
Book Review: Approaching Zero           10(3):38  
Book Review: The Cuckoo's Egg           7(1):45  
Book Review: The Devouring Fungus  
  (Tales of the Computer Age)           9(2):40  
Book Review: Tune in on Telephone Calls  
  by Tom Kneitel                        5(4):45  
Book Review: Virtual Reality            10(4):37  
BOXING ON ITT                           3(5):38  
British Credit Holes                    10(2):12  
British News                            10(1):44  
British Phonebooth Wedding~             3(4):27  
British Telecom: Guilty                 6(3):12  
Build A Tone Tracer                     8(2):14  
Building a DTMF Decoder                 7(1):14  
Building a Red Box                      5(2):13  
Building a Telephone Induction Coil     7(3):36  
But How Does it Work?                   1(8):43  
Buy My Wires~                           3(12):95  
Call Rejection in Natchez~              3(9):71  
Caller ID Technologies                  10(3):12  
Caller ID: The Facts                    7(3):5   
"Call Me" Card~                         2(6):39  
Campaign Contributions On-Line~         2(10):71  
Capitol Hill Hacker~                    3(6):43  
Capturing Passwords                     4(8):10  
Car Breathalizers~                      3(4):27  
Carrier Access Codes                    6(3):42  
Carrier Choosing Time~                  2(5):27  
Cash Machines Are Popular~              3(8):63  
Canadian WATS Phonebook                 5(3):23  
Cell Site Frequencies                   4(1):10  
Cellular Dial-By-Voice~                 3(7):55  
Cellular Magic                          10(1):4  
Cellular Modem~                         3(5):35  
Cellular Phone Biopsy                   10(4):6  
Cellular Phone Fraud and Where It's  
  Headed                                4(7):4  
Cellular Phones in England              3(2):15  
Cellular Update                         5(3):8  
Central Office Operations               7(4):12  
Changing Your Grades on A High  
  School Computer                       10(3):34  
Chinese Snitch Numbers                  6(2):35  
Cipher Fun                              9(4):6  
CIS Copyrights Public Software~         3(10):75  
Citybank Money Games~                   3(6):43  
Cityphone Has the Answer~               2(12):83  
Class Features                          8(4):31  
CLASS: What It Means To Us              4(5):6  
CNA Numbers                             4(4):10  
CNAs                                    2(3):18  
COCOT Corner                            8(4):33  
COCOT Numbers                           8(3):22  
Columnist Attacks AT&T~                 2(11):75  
Commentary: The Threat to Us All        2(8):50  
Competition...It's the next best  
thing to being there                    6(3):3  
Computel Does Exist~                    2(3):15  
Computel Put to Sleep                   4(4):4  
Computer Clothing                       3(9):71  
Computer College                        3(11):87  
Computer Crime Resources Guide          3(6):46  
Computer Crime Review                   3(6):41  
Computer Elections Examined~            2(10):67  
Computer Foul-ups Hurt Social Security~ 1(11):63  
Computer Grammar~                       3(5):35  
Computer Makes it Easy for Reagan~      1(12):69  
Computer Password Kept Secret           3(3):19  
Computer Security at the Bureau of  
  Prisons                               8(4):5  
Computer Threat Causes Chaos in Albany~ 1(6):3  
Computers Monitor Truckers~             2(7):43  
Computers Seized as Summer Games Begin~ 1(8):45  
Computers Strike Again!~                3(7):51  
Computers Threaten Privacy~             3(12):91  
Congress Chooses AT&T~                  3(4):31  
Congress Takes a Holiday                10(3):4  
Congressional Computer~                 3(5):35  
Converting a Tone Dialer into a Red Box 7(3):32  
Count of Exchanges per Area Code        3(8):62  
Country Codes                           1(2):10  
Country Codes                           3(7):53  
"Crackers" Cracked~                     2(5):27  
Crosstalk Saves Old Lady~               3(9):67  
Crypt() Source Code                     8(4):11  
Data Network Identification Codes       7(1):40  
Death of a Pay Phone                    3(10):73  
Death of NYNEX Business Centers         8(2):11  
Death Star Cards Spell Woe~             1(2):9  
"Debugging" Phones~                     3(8):63  
Decrypting Password Security            4(9):14  
Defeating Callback Verification         9(3):9  
Defeating Trap Tracing                  7(3):22  
Defense Data Network Listing            1(5):4  
Descrambling Cable                      10(1):16  
"Dial ""00"" For Operator~"             3(4):31  
Dial Back Security                      3(2):10  
Dial the Yellow Pages~                  3(3):23  
Dial-a-Directory~                       2(5):27  
Dial-A-Porn Update~                     3(1):3  
Dial-it Sex Numbers Argued~             2(11):75  
Dick Tracey Toys Are Closing In~        2(9):63  
Did You Know?                           4(7):17  
Digital Locks                           10(4):38  
Directory Assistance By Computer~       2(9):63  
Directory Assistance Failure~           3(4):31  
Dreams of GEnie~                        2(12):87  
E-COM is Going Away~                    1(6):3  
E-COM Number List                       1(6):5  
E-COM Really on the Way~                2(7):47  
"Ed Quinn Cell Site"~                   3(6):47  
E-Mail Horror Stories                   1(12):68  
E-Mail Listings                         1(12):71  
Electronic Jail All Screwed UP~         1(12):69  
Electronic Switching Advantages         1(6):2  
Electronic Tax Returns Are Here         3(2):15  
Electronic Tax Returns~                 3(10):79  
Electronics Create Portable Prisons~    1(4):2  
Elementary Switching                    10(4):9  
Encryption Provides Signature~          3(4):31  
England's Mass Announcements            4(9):10  
Equal Access 800 Drawbacks~             3(4):31  
Equal Access May Not be "Equal"  
  to Modems                             2(11):74  
ESS Goes To Taiwan                      3(10):79  
ESS: Orwell's Prophecy                  1(2):8  
Europe Standardizing Telecoms~          2(9):63  
Ever Wonder Who Owns All Those  
  800 Numbers?                          6(1):12  
Ex-Fed Tapped                           3(7):51  
Exchange List: 201 Area Code            6(2):20  
Exploits in Operator Hell               3(5):33  
Exploring Caves in Travelnet            1(11):61  
Facts and Rumors                        7(3):44  
Fascinating fone fun                    9(1):45  
Fascist Computer Network~               2(1):3  
Fawcett Phone Bill Too Big~             2(12):83  
FAX: A New Hobby                        4(5):14  
FBI Actions Anger Parents               3(11):83  
FBI Goes After ADS Hackers              1(1):2  
FBI Investigates Coffee Machine~        3(10):75  
FBI Revealed: Reviews--The FBI Project  
  Newsletter & The FBI and Your BBS     4(8):9  
FBI Shopping List~                      3(9):67  
FCC Actions~                            1(6):3  
FCC Gives Away "Resource"               3(9):71  
Federal Employees "Tracked"~            3(7):51  
Federal Express Offers "E-Mail"~        1(8):45  
Federal Phone Failures~                 3(7):55  
Federal Telephone System Upgrade~       1(12):69  
Feedback                                9(4):26  
Fiber-Optic Network For Du Pont~        2(10):71  
Final Words on VMS                      3(3):18  
Fingerprint Identification System~      3(12):95  
First of the "Superminin"~              1(12):69  
Five Aliens Hung Up~                    3(1):3  
Five Arrested in Phone Fraud~           1(7):7  
FM Telephone Transmitter                8(4):45  
FM Wireless Transmitter                 8(4):44  
For Your Protection                     7(1):3  
Fraud Alert                             7(4):43  
Free Directories For Bigwigs~           3(12):95  
Free Information in Trouble~            1(4):3  
Free Kiddie Dial-It Calls~              2(11):79  
Free Pay-Phones Plague New Jersey~      3(5):39  
French Phones Renumbered~               2(12):83  
From Sherwood Forest: Intro to Hacking  2(6):40  
From the 2600 Files                     5(1):22  
Fun and Games at a 2600 Meeting         7(1):38  
Fun Phone Numbers                       5(2):44  
Fun Things to Know                      9(2):19  
Fun With COSMOS                         2(12):82  
Fun With Fortress Fones                 1(11):62  
Gee...GTE Telcos                        6(3):33  
GEISCO's New Toy~                       2(1):3  
General Information                     6(1):7  
German Phone System Stagnant~           2(12):87  
Getting Caught: Hacker's View           1(10):55  
Getting In The Back Door: A Guide to  
  Some Popular Operating Systems        2(1):2  
Getting Started                         9(3):42  
Getting the Most Out of Equal Access    4(3):6  
Getting Your File...                    10(1):42  
Goings On                               4(4):16  
Good Apples for the Soviets~            2(4):21  
Government Bulletin Boards              10(2):39  
Government Phone Fate?~                 3(8):63  
"Grade ""A"" Hacking"                   6(3):4  
Growth of a Low Tech Hacker             9(4):17  
GTE Hit by Divestiture~                 2(1):3  
GTE Now Bigger than AT&T~               2(7):47  
GTE Raids Still Have Many Unanswered  
  Questions~                            1(1):3  
GTE Sprint Cheats Customers~            2(7):43  
GTE Sprint Overbills~                   3(9):71  
Hacker Extortionist Caught~             2(9):59  
Hacker News~                            8(2):12  
Hacker Zaps Computer Marquee~           3(3):19  
Hackers Degree?~                        3(7):51  
Hackers Go Free~                        2(4):21  
Hackers Have Big Business Scared~       2(10):71  
Hackers In Jail                         6(1):3  
Hackers in Jail, Part Two               10(4):4  
Hackers in the World of Malls: Secret  
  Service Behind Harassment of 2600  
  Meetings                              9(4):4  
Hackers on Shortwave~                   3(9):67  
Hacking AmiExpress                      9(3):4  
Hacking at the End of The Universe      10(3):4  
Hacking Computer Shows                  10(4):16  
Hacking IBM's VM/CMS                    4(11):4  
Hacking IBM's VM/CMS--Part Two          4(12):4  
Hacking MCIMAX                          8(2):16  
Hacking on Telenet: It's as Easy  
  as 123456!                            1(2):7  
Hacking on the Front Line               9(3):31  
Hacking Packard                         2(3):20  
Hacking PC Pursuit                      4(4):6  
Hacking Smartphone                      10(4):11  
Hacking WWIV                            9(1):12  
Hands Across Telenet~                   3(6):47  
Happenings                              5(1):37  
Hardwiring Your Way In                  5(4):42  
HBO Encryption Broken~                  3(10):75  
Here They Are                           9(2):24  
Here We Go Again                        9(2):22  
Here's the Secret!                      2(11):73  
High School Hacking                     10(2):13  
High School Mac Hack                    10(4):15  
High Tech Happenings                    9(4):19  
High Tech Parking Meters~~              3(5):35  
History of British Phreaking            1(9):49  
Hitchhiker Guide to the Phone System  
  Phreaking in the Nineties             9(2):10  
Home Computer Attacks Falwell~          3(1):3  
House: Hacking is Bad~                  1(8):45  
How Can Sysops Protect Themselves?      2(8):55  
How Cellular Phones Came About and What  
  You Can Expect                        3(11):90  
How Not to be Rejected~                 3(12):91  
How Payphones Really Work               6(1):30  
How Phone Phreaks are Caught            4(7):6  
How the Defeat *69                      9(2):31  
How to Build a Silver Box               6(4):20  
How to Get into a C.O.                  2(3):14  
How to Hack A Pick                      3(6):42  
How to Hack Honesty                     10(3):20  
How to Hear Phone Calls                 5(4):19  
How to Run a Successful Teleconference  2(5):26  
How to Take Apart A Payphone            9(1):20  
How to Use Your Silver Box              9(1):16  
Human Database Centers                  8(4):46  
I.R.S. Computers Screw Up~              2(3):15  
IBM ADS Directory                       1(9):53  
IBM Braille Compatible~                 3(12):95  
IBM Gets Bigger/Goodbye SBS~            2(7):47  
IBM's Audio Distribution Systems Sure  
  Can Be Fun!                           1(5):2  
IC and CIC Listing                      1(11):65  
Ice Cream Chain Aides Selective Service~1(8):45  
ICN--More than a Bargain                3(11):81  
Important News~                         4(12):3  
In Pursuit of Knowledge: An Atari 520ST  
  Virus                                 8(1):4  
Indian Phones Under Siege~              3(9):67  
"Indiana ""Fones"" Are Gone"            3(10):75  
Indiana Telco Threatens AT&T~           3(7):55  
Industrial Espionage Seminar~           2(3):15  
Infrared Beeper Will Find You           3(2):15  
Inmates Handle Information Calls~       2(12):83  
Inspect Implementation                  8(2):18  
Intelpost an Astronomical Failure~      1(5):3  
Interesting Things to do on a DEC-20    2(7):41  
International Hacking~                  3(12):91  
International NUA's                     4(10):10  
Internet Outdials                       8(1):40  
Introducing the Clear Box!              1(7):4  
IRS Drives Telco to Drink~              2(6):35  
IRS Wants Access to Telco Data~         2(1):3  
Is AT&T Hiding Near You?                9(4):36  
It Could Happen to You!                 3(2):10  
ITT Crackdown~                          2(7):43  
ITT Wiping Out Fee~                     1(8):45  
Jersey Wins Wiretap Race Again~         2(6):35  
Kenya Pay Phones Prove Popular~         2(3):15  
Kiev Calling Clogged~                   3(6):47  
Know Your Switch                        10(4):10  
Knowing UNIX                            3(8):57  
L.A. Law                                9(1):7  
Lair of the INTERNET Worm               6(3):39  
Lawsuit Filed Against Secret Service    10(1):43  
LD Companies Strike Back~               3(8):59  
Leaked Documents                        7(4):16  
Leave Our Poles Alone!~                 3(8):59  
Let's Move to France!~                  3(6):47  
Letter From Prison                      9(4):13  
Listening In                            7(1):19  
Listening In On Cellular Phones~        2(7):43  
Listening In: Catch Me if you Can!      4(11):7  
Local Toll-Free Numbers~                3(10):79  
Long Distance Option Timtable~          1(5):3  
Look Out For Sidney~                    1(7):3  
"Look Out, He's Got A Computer!"        1(7):1  
Looking for Simplex Locks?              9(1):38  
Looking Up IBM Passwords                8(1):36  
Loophole in Wiretap Law                 3(12):91  
Loopholes Around Wiretap Laws~          1(10):57  
Magnetic Strips                         8(2):7  
Man Worries About Sprint Bill~          3(4):27  
Marcos Phones For Free~                 3(4):27  
Mastering the Networks                  3(11):82  
MCI Access Numbers & Mail Numbers       1(4):5  
MCI Expanding With Optical Fibers~      2(7):47  
MCI Goes to U.K.~                       2(5):27  
MCI Mail & Western Union EasyLink       1(12):67  
MCI Mail: The Adventure Continues       1(7):2  
MCI: The Phone Company With A Lot of  
  Explaining To Do                      5(4):10  
Meeting Advice                          10(2):16  
Meeting Advice                          10(2):17  
Meeting Mania                           10(3):18  
Messages on the Move~                   3(9):71  
MILNET TAC Dialups by Location          2(7):45  
Missing Children's Faces Displayed~     2(7):43  
Mobile Frequencies                      8(4):18  
Mobile Phones--Theory and Construction  3(4):26  
Monitoring Phone Calls With A TVRO      5(1):4  
More Banks Link Arms~                   3(11):87  
More Cellular Fun                       10(3):42  
More Conversion Tricks                  8(3):43  
More Divestiture Woes~                  2(10):71  
More Hacking on Primos                  6(4):14  
More Info on VMS                        2(10):66  
More Long Distance Unpleasantries       4(12):20  
More Magic Buttons~                     3(11):87  
More Meeting Advice                     10(4):35  
More On Hacking UNIX                    6(4):4     
More on Trashing: What to Look for,  
  How to Act, Where to Go               1(9):50  
More PC Jr's., Less Z-100's for Soviets~1(8):45  
More Phone Fraud~                       2(7):43  
More Telenet Addresses                  4(6):9  
More Use of Phone Computers~            2(10):71  
More VAX Tricks                         4(5):4  
Moving Satellites Right Up In the Blue 
  ...What Was Really Going On?          2(8):52  
Mystery Transistor~                     2(5):27  
Navigate With a CD~                     3(12):95  
Navy Calls Dial-A-Porn~                 2(10):67  
Navy Phone Phreaks Nabbed~              2(10):67  
Navy Software Available~                3(10):75  
Nazi BBS a Challenge to Hackers         2(3):13  
Negative Feedback                       7(2):11  
Net Addresses                           2(4):23  
Network 2000 Saga Continues             7(3):8  
Never Erase the Past                    10(3):19  
New British Phone Service~              3(7):55  
New Chip Helps Sprint~                  3(8):63  
New Developments                        4(2):18  
New Jersey Tops Taps~                   3(7):51  
New Payphone Service for Michigan~      3(11):87  
New Payphones Confuse Callers~          3(1):7  
New Phone System for Courthouse~        2(8):51  
New Revelations From Bell South         7(3):16  
New Tracking Device For Cars~           2(6):39  
New VAX Announced~                      3(1):7  
New Ways of Stealing Data~              3(3):19  
New York's Computer Law~                3(6):43  
New York's IMAS                         4(10):4  
News Roundup~                           10(4):42  
News Update ~                           10(2):45  
News Update~                            7(2):38  
News Update~                            7(1):23  
News~                                   6(3):14  
Nickname Listings In Small Town~        3(11):87  
No Data Protection for Hong Kong~       3(7):55  
No Dial-it Calls For Feds~              2(11):75  
No Hacking While Flying, Please~        1(2):9  
No More Free Info~                      1(6):3  
No More Redialing?~                     2(12):83  
North Carolina #1 in Hacking            3(12):91  
Northern To Destroy COs                 3(3):23  
NPA Countdown                           6(4):44  
NSA Chooses AT&T Computer~              2(7):47  
NSA Doesn't Feel Secure~                1(9):51  
NSA Drops DES~                          3(9):67  
NSA Memo                                5(3):20  
NSA Wants a New Chip                    3(10):79  
NSA Wants Better Phones~                1(10):57  
Numbers                                 3(2):13  
Numbers of Interest                     4(8):6  
Numbers...Long Since Changed            3(6):45  
Nynex Bumps Southwestern Bell~          3(6):47  
NYNEX Data                              6(4):9  
Nynex Voice Mail                        10(4):18  
Oh No, Not Again!~                      1(10):57  
On The Road Again: Portable Hacking     9(2):4  
One Angry Judge                         10(1):23  
One We Somehow Missed~                  1(11):63  
Operating With Difficulty               4(9):6  
Our Contest Winners                     7(4):32  
Our Ever-Changing World~                6(4):6  
Our Wishes For '86 and Beyond           2(12):81  
Out of the Inner Circle--A Review       2(6):34  
Outdials                                8(2):44  
Outside Loop Distribution Plant, or  
  Hands-On Experience                   5(3):4  
Overcharge Hunters Needed               3(1):3  
Overseas Pirates~                       2(4):21  
Pacific Cable Planned~                  2(11):79  
Paging For Free                         4(6):5  
Passageways to the Internet             10(4):32  
Patients May Get to Keep Phones~        3(5):39  
Pay Phone Causes Panic~                 3(2):11  
Pay Telephones Deregulated~             1(7):3  
PC Pictures~                            3(12):95  
Penetrating the Pentagon by Phone~      1(12):69  
Pennant Ties Up Phones                  3(10):75  
People Express to be Hacked to Pieces   2(5):25  
Pest Control~                           2(9):63  
Phone Booth Captures Man~               2(10):67  
Phone Booth Wins Again~                 3(1):3  
Phone Booths Mauled The Stolen~         3(8):59  
Phone Fraud in Governor's House~        3(8):59  
Phone Numbers Supplied by Readers       8(1):17  
Phone Phreak Fined~                     3(4):27  
Phone Service Via Radio Shack~          3(1):3  
Phone-in Registration for College~      2(9):59  
Phones                                  4(1):20  
Phones at High and Low Speeds~          2(12):87  
Phones in the Sky~                      1(11):63  
Phoning Home From Europe                4(5):9  
Phreak Roundups~                        2(2):9  
Phreaks Tie Up Lines~                   3(12):91  
Pitcairn Island Now On AT&T Net~        2(9):59  
Police Dept. Wants Cellular Phones~     2(11):79  
Police Hacker Cleared~                  2(5):27  
Poor Connection Starts Bomb Scare~      3(9):67  
Poor Service An Understatement~         3(10):79  
Porno Phone Service Busted~             2(6):35  
Portable VAXes!!!                       3(9):71  
PRIMOS: The Final Part                  7(2):14  
Prisoner Update                         8(2):46  
Prisoners Break Law~                    3(7):51  
Private Directories Soon to be  
  Available~                            1(9):51  
Private Sector Returning                3(1):1  
Private Sector Update~                  2(9):59  
Problems for New Pay Phones~            2(6):39  
Product Review: Do It Yourself Demon  
  Dialer Kit (Hack-Tic Technologies)    9(2):15  
Product Review: Speech Thing            9(4):45  
Product Review: TDD-8 DTMF Decoder      10(2):14  
Programs in BASIC                       3(1):5  
Protecting Your SSN                     8(3):18  
Psychology in the Hacker World          8(3):38  
Public Phone Secrecy~                   3(6):43  
Punching Pay Phones                     6(3):37  
Pure Cyberfiction, Says Mitnick         8(2):42  
Pursuit For People                      2(9):58  
Q & A                                   1(2):10  
"Q" and "Z" Controversy Rages~          3(11):83  
RCI & DMS-100 Bugs                      3(9):65  
Reach Out and Touch a Nuclear Weapons  
  Contractor                            4(3):2  
Reaching Out On Your Own                2(9):58  
Reagan Hangs Up on Kids~                2(5):27  
Real Important Frequencies              9(1):17  
Real Life War Games?~                   2(4):21  
Redemption for a Hacker~                2(3):15  
Remember....                            6(2):3  
REMOBS                                  6(3):32  
Reporters Steal Swiss Phones~           3(2):11  
Review: CO Magazine                     4(9):22  
Review: Hacker: The Computer Crime  
  Card Game                             9(1):36  
Review: Sneakers                        9(3):17  
Review: The Hacker Crackdown            9(3)21  
Reviews: The 1989 Pirate Directory      6(2):42  
Ripoffs & Scams~                        6(1):36  
Robot Kills Man~                        2(4):21  
ROLM Phone System Creates a Nightmare   5(1):30  
Roman Hackers                           4(12):18  
RSTS For Beginners                      3(4):25  
RSTS: A Trick Or Two                    2(11):73  
Rural Customers Denied Access~          2(11):79  
Rural Radio Phones~                     3(8):63  
Rural Ultraphones~                      3(10):79  
'Santa Fraud'~                          2(4):21  
Satellite Jamers Jammed~                3(3):23  
Saudi Arabian BBS List                  4(7):21  
Say Goodbye to Meter Readers~           2(6):39  
SBS Offers Toll-Free Service~           1(12):69  
Scanning For Calls                      6(2):22  
Sears Satellite Network~                1(10):57  
Secret Frequencies                      8(2):32  
Secret Service on Trial                 10(1):18  
Security Can Kill Creativity            3(10):75  
Security Numbers                        1(10):59  
Security Software~                      3(1):7  
SEIZED! 2600 Bulletin Board is  
Implicated in Raid on Jersey Hackers    2(8):49  
Sherwood Forest Shut Down by  
  Secret Service                        2(6):34  
Shopper's Guide to COCOTS               9(3):13  
Shower Phone?~                          3(5):35  
"Signature" On Video Transmitters~      3(9):67  
Silver Box Born in U.K.                 7(1):19  
Silver Pages~                           2(4):21  
Simplex Locks                           8(3):6  
Simplex Update and Corrections          8(4):21  
Social Interaction with Phones          4(12):17  
Software Makers Crash BBS~              3(10):79  
Some Cosmos Documentation That May Be  
  Useful                                4(2):6  
Some Facts on Supervision               3(9):65  
Some Numbers                            4(12):21  
Some Thoughts on "Garbage Picking"      1(2):10  
Some Words on Hacker Morality           2(6):34  
South African BBS's                     4(10):11  
Soviet BBS List                         8(1):16  
Soviet Computer Update~                 3(3):23  
Soviets Denied Computer Access~         3(3):19  
Spanish Phones--and what they don't do  6(2):36  
Springsteen Mania~                      2(11):75  
Sprint Unites with US Telcom~           3(2):15  
Sprint--Too Many Customers~             3(11):87  
SS Number Returned to Citizens~         3(7):51  
Still More on the World of COSMOS       4(3):10  
Sting Boards on the Rise~               3(5):39  
Stock Market Crash~                     3(6):47  
Students Bog Down Computer~             1(12):69  
Students Cause Havoc on Computer~       1(3):3  
Stuff You Should Be Interested In~      8(4):8  
Stumbling into Control on a VMS         4(1):6  
Super Crisis Alert System~              2(12):87  
Super Pay Phone~                        2(12):87  
Supercomputer Dialups~                  1(3):3  
Survey Results                          2(12):84  
Surveying the COSMOS                    2(2):8  
TAP: The Legend is Dead                 4(1):4  
TASS News Service~                      3(3):23  
Technology Nabs Hooky Players~          3(1):3  
Teelco Rats On Government~              2(10):67  
Teenagers Abuse "Party Line~"           3(2):11  
Telco News                              9(4):42  
Telco Offices                           10(2):36  
Telco Response                          4(10):6  
Telco Sasys "Pay for Tones"~            3(12):91  
Telco Service Spawns Racist Banter~     2(12):83  
Telenet Addresses                       4(5):10  
Telenet Directory                       2(9):61  
Telenet Letter                          4(8):16  
Telephone Company Responds to Criticism  
  of Touch-tone Fees                    4(10):7  
Teller Machine Crime Coming~            1(4):3  
Test Numbers                            2(11):77  
Thai Phone Books a Hot Issue~           2(6):39  
The 516 Area Code in Detail             5(3):14  
The 707 Area Code                       7(1):44  
The Australian Phone System             9(1):31  
The Ballad of Captain Crunch            4(3):4  
The Basics: Divestiture: What Happened? 3(1):1  
The Class Struggle                      8(2):22  
The Cold Truth                          4(8):20  
The Computel Scoop                      3(5):34  
The Constitution of a Hacker            1(3):1  
The Dark Side of the Great Break-Up     1(6):4  
The Dark Side of Viruses                5(2):8  
The Day the Phone System REALLY Died    6(4):4  
The Death of COSMOS?                    6(3):13  
The Definitive ANAC Guide               7(3):39  
The Early Phreak Days                   2(11):80  
The Facts on 10698                      7(1):30  
The First 100% ESS State~               2(7):47  
The First Atomic Bomb                   1(3):4  
The Free Phones of Philly               3(7):50  
The Galactic Hacker Party               6(3):10  
The Ghost in the Machine~               3(8):59  
The Hacker "Threat"                     9(4):19  
The Hacker Video                        8(3):14  
The Hackers Guide to Area Code          1(8):47  
The History of ESS                      2(11):74  
The Infinity Transmitter--An Old Bug  
  that Had Its Time                     2(9):58  
The Latest~                             9(1):42  
The Magical Tone Box                    10(4):22  
The Neidorf/Phrack Trial: Day by Day    7(2):4  
The New "TAP"                           6(2):43  
The New LEC Order: Acronym City         8(1):42  
The Next Step in Custom Calling~        2(3):15  
The Person Numbers~                     1(3):3  
The Rise of the Computer State by David  
  Burnham Book Review                   1(8):44  
The Scariest Number in the World        1(12):68  
The Scoop on 911                        7(1):37  
The Scoop on Pen Registers~             3(2):11  
The Secrets of Mizar                    7(1):8  
The Simple Pleasures of a Step Office   1(5):1  
The Sprint Gestapo Strikes Again!       6(2):34  
The Summer Games of 87                  4(8):3  
The Telecom Informer                    4(10):8  
The Telecom Informer                    4(8):8  
The Telecom Informer                    4(9):8  
The Telecom Informer                    4(6):8  
The Telecom Informer                    4(5):8  
The Telecom Informer                    4(11):8  
The Telecom Informer                    4(4):8  
The Telecom Informer                    4(1):8  
The Telecom Informer                    4(12):8  
The Telecom Informer                    4(3):8  
The Telecom Informer                    4(2):8  
The Telecom Informer                    4(7):8  
The Terminus of Len Rose                8(1):11  
The Theory of 'Blue Boxing': their  
  history, how their used, their future 2(2):7  
The Trouble With Telemail               1(4):2  
The Truth Behind Those 9999 Numbers     1(1):4  
The View of A Fed                       9(2):38  
The Woes of Having a Small-Time Rural  
  Phone Company                         1(5):4  
The Word On the Street~                 7(4):36  
There are More Phones than Ever         3(3):23  
This Month At 2600                      3(4):30  
This Month at 2600                      3(3):22  
This Month's Mischief and Mayhem~       2(2):9  
This Month's Troublemakers~             2(3):15  
Those Horrible Hackers Strike Again     2(1):1  
Those Silly Codes                       4(10):14  
Tidbits~                                8(3):31  
Times Changing For Directory Assistance~1(2):9  
TINA Message Service~                   2(6):39  
Tips On Trashing                        6(2):32  
Toll Fraud Detection Techniques         7(1):12  
Toll Fraud Device                       10(2):42  
Toll Fraud: What the Big Boys are  
  Nervous About                         9(3):43  
Town on Hold During Strike~             3(7):51  
Trashing Alaska Style                   2(2):8  
Trashing: America's Source For  
  Information                           3(10):73  
Trick of the Month~                     1(2):9  
Trouble in the White House              10(1):12  
Trouble with 800 "Word Numbers"~        2(9):59  
True Colors                             10(3):9  
TRW Breached by Non-Hackers~            2(2):9  
TRW Credentials Lack Credibility        4(8):4  
TRW: Big Business is Watching You       1(7):5  
TV Blue Boxes~                          3(8):63  
Two Inch Thick Bill~                    2(10):67  
U. S. Secret Service Field Offices      9(4):12  
U.S. Phone Companies Face Built-In  
  Privacy Hole                          8(4):42  
UAPC Update                             6(4):45  
UNIX Password Hacker                    8(1):31  
UNIX Password Hacker: An Alternative  
  Approach                              9(1):18  
US and France Link Phones~              3(5):35  
US Social Security Prefixes             4(11):6  
Use of Wiretaps at Record Pace~         1(11):63  
Useful UNIX Programs                    8(3):44  
Using the Telephone                     9(3):36  
USPS Hacking                            8(3):32  
USPS Hacking Corrections                8(4):21  
USSR Computer Hungry~                   3(8):63  
Vehicle Identification Numbers          9(4):11  
Victimized by Crime Computers~          1(10):57  
Victory for Wiretap Victims~            1(5):3  
Video Review: Assorted Videos           10(2):40  
Video Telephone Invention~              1(12):69  
Violating A VAX                         3(7):49  
Virus Scanners Exposed                  9(1):9  
Vital Ingredients: Switching Centers  
  and Operators                         1(10):56  
VM/CMS Corrections                      5(1):8  
VMS--The Series Continues               3(2):9  
Voice Mail Hacking                      9(2):42  
Voice Mail Hacking...NYNEX Style        6(3):36  
Voice of Reagan Tortures Patients~      3(11):83  
War Game Addict~                        2(9):59  
Weathertrak Codes                       5(1):15  
What a White Box Can Do                 2(4):19  
What in the EFF?                        7(2):10  
What it's Like to be a Soviet Operator  5(4):30  
What's Going On With Phones/Computers   5(3):10  
Whats up~                               8(1):19  
When Hackers Ride Horses: A Review of  
  Cyberpunk                             8(2):42  
Where Have All the Hackers Gone?        8(2):4  
Where One Hacker Went (L)               8(3):24  
Whitehouse Extension Numbers            1(1):5  
Who Called the Shuttle?~                3(3):19  
Who the Hell was Almon Strowger, Anyway?5(3):9  
Who Wants to be Swept?~                 3(12):95  
Whoops [errata for 4(9)]                4(10):18  
Whose Strike Was That Anyway?           1(4):1  
Why Computers Get Snatched              2(8):54  
Why Won't They Listen?                  8(3):4  
Wireless Phones Spell Trouble~          1(1):3  
Wiretap City~                           1(3):3  
Wiretap Clarification (L)               7(3):30  
Wiretapping and Divestiture: A Lineman  
  Speaks Out                            2(1):1  
Word Numbers                            4(4):15  
Worldnet: Getting Closer Every Day      4(9):4  
WORM                                    6(2):38  
Wrath of God Strikes 2600               3(11):86  
Wrestlemania Pins Bell~                 3(5):39  
Write Protect Tabs Wrong~               3(2):15  
Yellow Scam~                            2(5):27  
"You Must First Dial a One..."~         1(7):7  
Your Own Private Centrex~               3(1):7 


2600 THE HACKER QUARTERLY 
Author Index: Volume 1 (1984) - Volume 10 (1993)
David Price

Authors are listed in the first column, titles and citations are
listed in the second column using the following format: 
V(N):P  V = Volume, N = Number, P = Page



910                        Elementary Switching  10(4):9
999, The                   High School Hacking  10(2):13
Abuse, Dr.                 Magnetic Strips  8(2):7
Advocate, The Devil's      Product Review: Do It Yourself Demon Dialer           
                            Kit  9(2):15
Advocate, The Devil's      Review: The Hacker Crackdown  9(3)21
Advocate, The Devil's      Review: Hacker: The Computer Crime Card Game          
                            9(1):36
Advocate, The Devil's      When Hackers Ride Horses: A Review of                 
                            Cyberpunk   8(2):42
Advocate, The Devil's      USPS Hacking  8(3):32
Agent 003, Boic            Hacking Packard  2(3):20
Agent 04, Phucked          Outside Loop Distribution Plant, or Hands-On
                            Experience  5(3):4
Agranoff, Mike             The Ballad of Captain Crunch  4(3):4
America, Mainstream        More VAX Tricks  4(5):4
Anonymous                  ANALYSIS: Gulf War Printer Virus  8(4):39
Anonymous                  Death of NYNEX Business Centers  8(2):11
Aristotle                  Voice Mail Hacking...NYNEX Style  6(3):36
B/Square & Mr. Upsetter    Building a DTMF Decoder  7(1):14
Baalzebub                  Violating A VAX  3(7):49
Bard, The                  High School Mac Hack  10(4):15
Bayonet                    Getting Your File...  10(1):42
Benedict, W. Ritchie       Book Review: The Devouring Fungus  9(2):40
Benedict, W. Ritchie       Book Review: Virtual Reality  10(4):37
Billsf                     True Colors  10(3):9
Billsf                     Hitchhiker Guide to the Phone System
                           Phreaking in the Nineties  9(2):10
Bluebox, Mark              The Truth Behind Those 9999 Numbers  1(1):4
Bootleg                    Cellular Magic  10(1):4
Bruce, Peter               Spanish Phones--and what they don't do                
                            6(2):36
Buggy, Orson               Banking from your Terminal--A Look at                 
                            PRONTO  2(7):42
Caller, Midnight           The Australian Phone System  9(1):31
Capone, Al                 Hacking on the Front Line  9(3):31
Catalyst, Cheshire         Hacking PC Pursuit  4(4):6
Catalyst, Cheshire         TAP: The Legend is Dead  4(1):4
Check, Parity              Meeting Advice  10(2):16
City, New Hack             The New LEC Order: Acronym City  8(1):42
Clayton, Noah              Converting a Tone Dialer into a Red Box         
                            7(3):32
Crazed Luddite & 
 Murdering Thug K001/Ra    An Algorithm for Credit Cards  7(3):42
Cruise-CTRL                An Overview of DSS1  10(3):36
DC                         More Conversion Tricks  8(3):43
Delam, Dr.                 Virus Scanners Exposed  9(1):9
Delam, Dr.                 Defeating Callback Verification  9(3):9
Dobbs, J.R. "Bob"          Building a Red Box  5(2):13
Dragon, The                Trashing: America's Source For Information            
                            3(10):73
Drake, John                England's Mass Announcements  4(9):10
Drake, John                A Trip to England  3(8):58
Drake, John                Book Review Nothing New in Computer                   
                            Underground by M. Harry  3(6):42
Drake, John                An Interview with Hugo Cornwall: British              
                            Hacker/Author  4(2):4
Drake, John                An Interview With the Chaos Computer Club
                            5(4):34
Drewl/Salivate             Changing Your Grades on A High School
                            Computer  10(3):34
Dust                       Crypt() Source Code  8(4):11
Dutton, Roland             Book Review: "The Hacker's Handbook"
                            4(2):15
Echo                       Acronyms A-G  10(1):34
Echo                       Acronyms H-R  10(2):20
Echo                       Acronyms S-X (no y or z)  10(3):44
Esper                      Mobile Frequencies  8(4):18
Estev, Paul G.             People Express to be Hacked to Pieces
                            2(5):25
Estev, Paul                Reviews: The 1989 Pirate Directory 6(2):42
Eye, Roving                Birth of a Low Technology Hacker  8(4):16
Eye, Roving                Growth of a Low Tech Hacker  9(4):17
Fed, The                   The View of A Fed  9(2):38
Fellpe Rodriquez &         
Rop, Gonggrijp             Stuff You Should Be Interested In~ 8(4):8
Firemonger                 Surveying the COSMOS  2(2):8
Foley Dan                  The Telecom Informer  4(6):8
Foley Dan                  The Telecom Informer  4(3):8
Foley Dan                  The Telecom Informer  4(4):8
Foley Dan                  The Telecom Informer  4(2):8
Foley Dan                  The Telecom Informer  4(1):8
Freeman, John              The Telecom Informer  4(5):8
Fresco, Al                 The Telecom Informer  4(9):8
Frosty of the GCMS         Fascinating fone fun  9(1):45
Frosty of the GCMS         A Batch Virus  9(1):8
FyberLyte                  The Magical Tone Box  10(4):22
G.R.A.S.P., Crisp          A Guide to the 5ESS  10(2):4
Galaxy, Mister             ANSI Bomb  10(2):44
Gam, Tamlyn                Silver Box Born in U.K.  7(1):19
Gamma, Bob                 Are You a Phreak???  2(3):13
Gerard, Judas              More Cellular Fun  10(3):42
Glitch, The                Cellular Update  5(3):8
Goldstein                  The Telecom Informer  4(7):8
Goldstein, Emmanuel        A Pen Register For Phreaks?: Product
                            Review--Dialed Number Recorder 4(5):22
Goldstein                  The Telecom Informer  4(10):8
Goldstein                  The Telecom Informer  4(8):8
Goldstein, Emmanuel        "FBI Revealed: Reviews--"The FBI Project 
                            Newsletter" & "The FBI and Your BBS" 4(8):9
Goldstein, Emmanuel        Never Erase the Past  10(3):19
Goldstein, Emmanuel        Review: Sneakers  9(3):17
Goldstein, Emmanuel        The Scoop on 911  7(1):37
Goldstein, Emmanuel        The New "TAP"  6(2):43
Goldstein, Emmanuel        Video Review: Assorted Videos  10(2):40
Goldstein, Emmanuel        New Revelations From Bell South  7(3):16
Grapefruit, Rancid         A Reader's Reply to Captain Zap  5(2):16
Gray, Jeff                 WORM  6(2):38
Greek, The                 International NUA's  4(10):10
Greek, The                 South African BBS's  4(10):11
Greenberg, Ross M.         A Form of Protection For You and Your
                            Computer  5(2):4
Guru, VM                   VM/CMS Corrections  5(1):8
Guy, The GCI               Trashing Alaska Style  2(2):8
Hackers, Legion of         Telenet Addresses  4(5):10
Hank@Taunivm.Bitnet        Worldnet: Getting Closer Every Day  4(9):4
Hibbert, Chris             Protecting Your SSN  8(3):18
Hobbit, The                Getting the Most Out of Equal Access  4(3):6
Holmes, Chester            An American Express Phone Story  3(3):17
Holmes, Chester            The Free Phones of Philly  3(7):50
Howard                     The Infinity Transmitter--An Old Bug that
                            Had Its Time  2(9):58
Icom, Mr.                  A Review of "The 'Top Secret' Registry of US
                            Government Radio Frequencies"  4(11):7
Inconnu, Les               Product Review: TDD-8 DTMF Decoder 10(2):14
Infidel, The               How Payphones Really Work  6(1):30
Infidel, The               REMOBS  6(3):32
Infidel, The               UNIX Password Hacker  8(1):31
Infidel, The               Exchange List: 201 Area Code  6(2):20
Infiltrator                A Simple Virus in C  9(3):19
Jaffee, Walter S.          Hacking Computer Shows  10(4):16
Jockey, Disk               US Social Security Prefixes  4(11):6
Jockey, Keyboard           UNIX Password Hacker: An Alternative
                            Approach  9(1):18
Judicator of D.C.          More Meeting Advice  10(4):35
Kevin                      Internet Outdials  8(1):40
Kid, the & Co.             How to Get into a C.O.  2(3):14
Kid, the & Co.             Knowing UNIX  3(8):57
Kid, The & Co.             Some Facts on Supervision  3(9):65
Kingpin, 617 & 
 RDT Syndicate             Cellular Phone Biopsy  10(4):6
Knight, Red                More On Hacking UNIX  6(4):4
Knight, The Dark           British News  10(1):44
Knight, Red                A Hacker's Guide to UNIX  5(4):12
Kurtz, Colonel Walter E.   Class Features  8(4):31
Lineman, The               Phoning Home From Europe  4(5):9
Lurch, The                 707 Area Code  7(1):44
Luthor, Lex                The History of ESS  2(11):74
Luthor, Lex                Telenet Directory  2(9):61
Luthor, Lex & The LOD      History of British Phreaking  1(9):49
Luthor, Lex                Where One Hacker Went (L)  8(3):24
Luthor, Lex  & The LOD     Fun With COSMOS  2(12):82
Luthor, Lex  & the LOD     More Info on VMS  2(10):66
Luthor, Lex  & The Legion 
 of Hackers                Hacking IBM's VM/CMS--Part Two  4(12):4
Luthor, Lex  & The LOD     Final Words on VMS  3(3):18
Luthor, Lex  & The LOD     A Guide to VMS  2(9):57
Luthor, Lex  & The Legion
 of Hackers                Hacking IBM's VM/CMS  4(11):4
Luthor, Lex  & The Legion 
 of Doom/Hackers           VMS--The Series Continues  3(2):9
Mac+                       New York's IMAS  4(10):4
MAD!                       Death of a Pay Phone  3(10):73
Man, Swinging              Hacking AmiExpress  9(3):4
Marauder, The              RSTS For Beginners  3(4):25
Marauder, The              & The L.O.D. A HAcker's Guide to the TSPS
                            Console  4(6):6
Marauder, The &            
Phoneline Phantoms         RSTS: A Trick Or Two  2(11):73
Master, LNA                Listening In: Catch Me if you Can!  4(11):7
MechWariors, GCMS          U. S. Secret Service Field Offices  9(4):12
Menace, Hyperborean        Caller ID Technologies  10(3):12
Meyer, Gordon & Jim Thomas The Neidorf/Phrack Trial: Day by Day                  
                            7(2):4
Micro Surgeon /West Coast 
 Phreaks                   Punching Pay Phones  6(3):37
Mitnick, Kevin             Pure Cyberfiction, Says Mitnick  8(2):42
Mitnick, Kevin             Looking Up IBM Passwords  8(1):36
Mole, The                  Stumbling into Control on a VMS  4(1):6
Monk, The                  How to Take Apart A Payphone  9(1):20
Moon, Electric             A True Saga of Teleconferencing  1(4):4
Mouse, MCI                 Hacking MCIMAX  8(2):16
Murphy, Dan                Review: CO Magazine  4(9):22
Nathan, Paco Xander        Secret Service on Trial  10(1):18
Neidorf, Craig             An Appeal For Help  8(4):36
Neidorf, Craig             The Terminus of Len Rose  8(1):11
NeurAlien                  Beginner's Guide to Minitel  9(4):8
Overlord, Dark             Lair of the INTERNET Worm  6(3):39
P., Larry                  The Sprint Gestapo Strikes Again!  6(2):34
Page, Bob                  A Report on the Internet Worm  5(4):4
Panda, Paranoid            In Pursuit of Knowledge: An Atari 520ST
                            Virus  8(1):4
Panda, Paranoid            An MS-DOS Virus  9(1):4
Phoenix, The               Beige Box Construction  10(1):14
Phorester, Dr. Clayton     Descrambling Cable  10(1):16
Phreak, Nynex              Numbers of Interest  4(8):6
Phreak, The Alaskan        (TAP)  Exploits in Operator Hell  3(5):33
Phreaker, Lord             Book Review: "Automatic Teller Machines III"
                            4(2):21
Phreaker, Cray-Z           Product Review: Speech Thing  9(4):45
Phreaker, Lord             An Interesting Diversion  2(10):65
Phreaker, Phantom &        
Doom Prophet & LOD!        Toll Fraud Detection Techniques  7(1):12
Plague, The                The Dark Side of Viruses  5(2):8
Plague, The                Grade "A" Hacking  6(3):4
Plague, The                NYNEX Data   6(4):9
Plague, The                UAPC Update  6(4):45
Plague, The                An Introduction to COCOTS  7(2):20
Plann, Marshall            Useful UNIX Programs  8(3):44
Prefect, Phord             Getting Started  9(3):42
PW                         Human Database Centers  8(4):46
"Q", The                   The Secrets of Mizar  7(1):8
Rabbit, Peter              Cipher Fun  9(4):6
Ranger, Night              Voice Mail Hacking  9(2):42
Ranger, Forest             Reaching Out On Your Own  2(9):58
Rat, Tech                  Hacking Smartphone  10(4):11
Rebel                      Know Your Switch  10(4):10
Reisman, Bruce             Telephone Company Responds to Criticism of
                            Touch-tone Fees  4(10):7
Researcher, The            Mobile Phones--Theory and Construction
                            3(4):26
Resz, Stepher J.           Book Review: Approaching Zero  10(3):38
RNOC, Bill From Legion 
 of Doom                   Still More on the World of COSMOS 4(3):10
Rocker, The Veteran Cosmic Saudi Arabian BBS List  4(7):21
Rome, Hal from             Roman Hackers  4(12):18
Runner, Net                Outdials  8(2):44
S., Bernie                 How the Defeat *69  9(2):31
S., Bernie                 AT&T Sub Maps  4(8):11
S., Bernie                 FAX: A New Hobby  4(5):14
S., Bernie                 Paging For Free  4(6):5
S., Bernie                 Cellular Phone Fraud and Where It's Headed
                            4(7):4
S., Bernie                 Secret Frequencies  8(2):32
Salerno, Mike              Getting In The Back Door: A Guide to Some
                            Popular Operating Systems  2(1):2
Scannon, Lou               Book Review: Tune in on Telephone Calls by
                            Tom Kneitel  5(4):45
Scientist, Mad             How to Use Your Silver Box  9(1):16
Severence, No              How Phone Phreaks are Caught  4(7):6
Shadow, The Knights of     Interesting Things to do on a DEC-20
                            2(7):41
Shadow, The                Wiretapping and Divestiture: A Lineman
                            Speaks Out  2(1):1
Shadow, The                How to Run a Successful Teleconference
                            2(5):26
Shadow, The                Test Numbers  2(11):77
Shadow, The                "Equal Access May Not be ""Equal"" to Modems"
                            2(11):74
Skinner, Scott             One Angry Judge  10(1):23
Skinner, Scott &    
 Emmanuel Goldstein        Simplex Locks  8(3):6
Solomenko, E.              What it's Like to be a Soviet Operator 5(4):30
Source, U. R,              How to Hack Honesty  10(3):20
Staff                      The Telecom Informer  4(11):8
Statton, Scott             Ever Wonder Who Owns All Those 800 Numbers?
                            6(1):12
Steal, Agent               Central Office Operations  7(4):12
Strowger, Almon, Jr.       Who the Hell was Almon Strowger, Anyway?
                            5(3):9
Switchman, Silent          And They Call US Crooks?  2(10):65
Switchman, Silent          Here's the Secret!  2(11):73
Taylor, Dave               Social Interaction with Phones  4(12):17
TELEgodzilla               Our Contest Winners  7(4):32
The Kid & Co. &     
The Shadow                 More on Trashing: What to Look for, How to
                            Act, Where to Go.  1(9):50
"The Snake", Jake          Caller ID: The Facts  7(3):5
Thunder, Lord              Defeating Trap Tracing  7(3):22
Toad, Texas                Capturing Passwords  4(8):10
Tommy                      BASIC Red Box Tones  5(3):22
Tommy                      Canadian WATS Phonebook  5(3):23
Upsetter, Mr.              Build A Tone Tracer  8(2):14
Upsetter, Mr.              Listening In  7(1):19
Upsetter, Mr.              Scanning For Calls  6(2):22
Upsetter, Mr.              How to Build a Silver Box  6(4):20
Valve, Rex                 TRW Credentials Lack Credibility  4(8):4
Velcro, Romula             Meeting Advice  10(2):17
Videosmith, The            CLASS: What It Means To Us  4(5):6
Violence                   A Guide to PRIMOS  6(2):4
Violence                   PRIMOS: The Final Part  7(2):14
Violence                   More Hacking on Primos  6(4):14
William, Sir               Some Cosmos Documentation That May Be
                            Useful  4(2):6
Williams, Dr.              Tips On Trashing  6(2):32
Williams, Dr.              Hardwiring Your Way In  5(4):42
Williams, Dr.              An Interview with Dorothy Denning  7(3):10
Williams, Dr.              Book Review: The Cuckoo's Egg  7(1):45
Williams, Dr.              A Study of Hackers  10(1):38
Wintermute                 Operating With Difficulty  4(9):6
Wood, Jim                  The Early Phreak Days  2(11):80
Woodstein, Condor          Psychology in the Hacker World  8(3):38
X, Alien                   A Way To Catch Peepers  9(1):35
Yuhas, Mike                Allnet: A Horror Story  4(6):4
Zap, Captain               An Interpretation of Computer Hacking 5(1):16
Zee, Charlie               Trouble in the White House  10(1):12
Zero, Count                Toll Fraud: What the Big Boys are Nervous
                            About  9(3):43
Zero, Count                Shopper's Guide to COCOTS  9(3):13