💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › NIA › nia.idx captured on 2022-06-12 at 13:39:19.

View Raw

More Information

-=-=-=-=-=-=-

TADXF:007
                 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
                 %%               N.I.A.                %%
                 %%     Network Information Access      %%
                 %%            Index 01-74              %%
                 %%          Done By OMEGA/AD           %%
                 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
[-]-------------------------------------------------------------------------[-]                 

NIA FILE 1  : Automated Teller Machines - Basic Series - ATM's
            : Written by/Typed In By Guardian Of Time
            : 15DEC89

NIA FILE 2  : Automated Teller Machines -- Basic Series -- File #2
            : Written by/Typed In By Guardian Of Time
            : 19JAN90

NIA FILE 3  : Computer Crimes/Fraud/Waste part 1
            : Written/Typed/Edited By: Lord Kalkin
            : 02MAR90

NIA FILE 4  : Computers: Crime, Fraud, Waste Part 2
            : Written/Typed/Edited By: Lord Kalkin
            : Information Security
            : 03MAR90      

NIA FILE 5  : Detecting Merchant Fraud
            : Typed In By: Guardian Of Time
            : "A Guide To Monitoring Credit Card Transactions"
            : Written By: Mastercard International
            : 01FEB90

NIA FILE 6  : TRW -- Credit Bureau -- How To Read A TRW Credit Report
            : Written/Typed In By: Guardian Of Time
            : December 28, 1989

NIA FILE 7  : TRW -- Credit Bureau -- How To Read A TRW Credit Report
            : Written/Typed In By: Guardian Of Time
            : December 28, 1989

NIA FILE 8  : ATM Part 3
            : Written/Typed/Edited By: Guardian Of Time
            : ATM Diagnostic Manual

NIA FILE 9  : ATM Part 4
            : Typed In By: Guardian Of Time
            : Inside An Atm Machine

NIA FILE 10 : HOW TO USE PLEXAR

NIA FILE 11 : VMS System Manager's Manual
            :         Chapter 2.11

NIA FILE 12 : VMS System Manager's Manual
            :         Chapter 2.11

NIA FILE 13 : VMS System Manager's Manual 
            :         Chapter 03.11

NIA FILE 14 : SPREADING THE DISEASE

NIA FILE 15 : ZUC VIRUS

NIA FILE 16 : USENET: BASICS

NIA FILE 17 : COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES  
            :           Section I -- Introduction

NIA FILE 18 : Computers User's Guide/Protection of Information

NIA FILE 19 : Management Guide/Protection Of Information

NIA FILE 20 : Executive Guide/Protection Of Information

NIA FILE 21 : Digest Message Format

NIA FILE 22 : Frequently Asked Questions About UNIX

NIA FILE 23 : Overview on Viruses & Threats

NIA FILE 24 : Computer Viruses & Threats II

NIA FILE 25 : Overview On Viruses & Threats III

NIA FILE 26 : Computer Viruses & Threats IV

NIA FILE 27 : VMS: System Manager's Manual  
            :         Chapter 4.11

NIA FILE 28 : COMPUTER SECURITY TECHNIQUES    
            :   Section II - Background  

NIA FILE 29 : VMS System Manager's Manual 
            :        Chapter 5.11

NIA FILE 30 : NAMBA VIRUS

NIA FILE 31 : May '90 Busts I

NIA FILE 32 : LOD/H BUST: AS BY 2600 MAG.

NIA FILE 33 : UK Telephone System

NIA FILE 34 : THE TRW CREDIT PROFILE REPORT

NIA FILE 35 : Operation: SunDevil

NIA FILE 36 : Credit Bureau Incorportated 
            :    Otherwise Known As CBI

NIA FILE 37 : VMS SYSTEM MANAGER'S MANUAL 
            :          CHAPTER 6

NIA FILE 38 : VMS SYSTEM MANAGER'S MANUAL
            :         CHAPTER 7       

NIA FILE 39 : HACKERS OF THE WORLD, UNITE!

NIA FILE 40 : Views Of Golstein: Operation Sundevil

NIA FILE 41 :  New Area Code 903

NIA FILE 42 : MPACT: Ordering Process

NIA FILE 43 : Craig Neidorf On Trial

NIA FILE 44 : Creating An Account On A VMS System

NIA FILE 45 : CERT Advisory: SunView selection_svc Vulnerability

NIA FILE 46 : Security Exposures and Controls for MVS

NIA FILE 47 : Article Direct From The Wall Street Journal
            : Edition WEDNESDAY AUGUST 22, 1990.

NIA FILE 48 : illinois Bell Employee Given Bribe

NIA FILE 49 : BRIEF UPDATE ON SOME VMS COMMANDS:        
            : SHOW USERS, SHOW SYSTEM, and STOP/ID= COMMANDS 

NIA FILE 50 : PART 1.  Nootropic Drugs [Drugs That Make You Smart]...
            : PART 2.  Portrait Of J Random Hacker (time for comparisons!)......
            : PART 3.  (censored)...........
            : PART 4.  Some Thoughts..
            : PART 5.  BBS Software Review As Seen By SysOps.....
            : PART 6.  Hellos, Congrats, and Respects To:...
 
NIA FILE 51 : System Security Part 01            
            : Introduction: Types Of Computer Security Problems

NIA FILE 52 : System Security Part 02
            : Security For The User

NIA FILE 53 : PyroTechnics I-IV

NIA FILE 54 : City Codes for USSR

NIA FILE 55 : Computer Network Gets Overseer
            :       Houston Chronicle

NIA FILE 56 : CERT Advisory: NeXT System Software

NIA FILE 57 : The Network Thought Machine

NIA FILE 58 : BILL OF INFORMATION RIGHTS II

NIA FILE 59 : Making the NOVA Program by Cliff Stoll   
            :         Service Outage in N. Illinois

NIA FILE 60 : Early Apple Phreaking Days

NIA FILE 61 : Len Rose Arrested Again

NIA FILE 62 : Buncha News

NIA FILE 63 : SECTION III COMPUTER SECURITY CONTROLS AND THE LAW

NIA FILE 64 : PTs Experience w/CLASS
 
NIA FILE 65 : PBX Security

NIA FILE 66 : CERT: VAX/VMS Break-Ins

NIA FILE 67 : Network Thought Machine [3] & SNA Networks [1]

NIA FILE 68 : 1. DECnet [01].........................Guardian Of Time
              2. Unix: UUCP Files.........................Judge Dredd
              3. VAX: Tekno DCS HELP [01].................Judge Dredd
              4. HP: DBEDIT Manual....................Malefactor [OC]
              5. *LONG* Surveilance Expo '90 Report.............Thalx
              6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom T..... 
              7. Department Of The Army Field Manual [01].Death Jester
              8. Comments From The Editors...................GOT & JD

NIA FILE 69 : 1. The Future of the Internet.............Jane M. Fraser
              2. Tekno DCS HELP [02].......................Judge Dredd
              3. Computer Security Techniques [04]....Guardian Of Time
              4. Kermit Manual [01]....................Malefactor [OC]
              5. Department Of The Army Field Manual [02].Death Jester
              6. World News Sept 1990-Jan 1991.Face 2 Face Publications
              7. Comments From Editors........................JD & GOT

NIA FILE 70 : 1.  The First Conference On Computers, Freedom & Privacy.
              2.  DoD Trusted System Evaluation Criteria [01 of 02].
              3.  Kermit Protocol Manual [02 of 02].....Malefactor [OC]
              4.  Social Engineering: A Way Of Life.....Malefactor [OC]
              5.  Unix Kerberos Manual........Doctor Dissector [PHA/P4]
              6.  A Basic Guide To Hacking Unix....Sir Hackalot [PHAZE]
              7.  Editor's Comments............................JD & GOT

NIA FILE 71 : 1.  Index ....................................NIA Editors
              2.  Analysis of the 4-wire Line - An Explanation ........
              3.  Using the UK Academic Network PSS Gateway ...........
              4.  DoD Trusted System Evaluation Criteria [02/02] ....JD
              5.  List of Texas Internet Sites ............Lord Macduff
              6.  Steve Jackson Games vs. Secret Service..EFF Foundation
              7.  Editor's Comments ........................NIA Editors.

NIA FILE 72 : 1. Index to NIA072 ...........................NIA Editors
              2. The Renaissance of Hacking .............Mark Hittinger
              3. The Hacker Manifesto ....................Erik Bloodaxe
              4. Foiling the Cracker [Dept. of Defense]....Killing Joke
              5. UNIX: JE Documentation ..............Terminal_Erection
              6. Network Miscellany ....................Various Sources
              7. CyberTimes (Vox Populi) [1/4] .............Judge Dredd
              8. CyberTimes (Vox Populi) [2/4] .............Judge Dredd
              9. CyberTimes (Vox Populi) [3/4] .............Judge Dredd
             10. CyberTimes (Vox Populi) [4/4] .............Judge Dredd
             11. Editor's Comments .........................NIA Editors

NIA FILE 73 : 1.  NIA073 Index .............................NIA Editors
              2.  Valley of the Nerds.......................Walter Kirn
              3.  Internet to Anywhere................Industrial Phreak
              4.  Globally Tymnet.............................Hi Fi Del
              5.  Report on Interexchange Carriers..............The FCC
              6.  Vox Populi: NIA News......................Judge Dredd
              7.  Hacking the HP3000 [Part I]................Malefactor
              8.  ** XmasCon '91 Announcement **............Santa Claus
              9.  Editor's Comments.........................NIA Editors

NIA FILE 74 : 1. Introduction ..................................Editors
              2. Security Probs in TCP/IP Suite [01/02] ..S.M. Bellovin
              3. Security Probs in TCP/IP Suite [02/02] ..S.M. Bellovin
              4. Firewalls: Design of Secure Internet Gateway  Cheswick
              5. Notes on Centigram Systems ..................Anonymous
              6. How to Steal Information ...................The Butler
              7. Killer Chips: Physical Virus..Jean-Bernard Condat [CCCF]

  ?????????????????????????????????????????????????????????????????????????
  ???????????????? Remember Where You Saw This Phile First ????????????????
  ????????[=] ARRESTED DEVELOPMENT +31.77.547477 The Netherlands [=]???????
  ?????????????????????????????????????????????????????????????????????????