💾 Archived View for spam.works › mirrors › textfiles › hacking captured on 2023-06-14 at 14:24:14. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
Around the 1970's, the term "hacking" meant any deep interest in computers
that manifested itself in programming or learning arcane aspects of the
machinery or operating systems. By the early 1980's, this meaning morphed
into a general term of fear to describe anyone who did anything even remotely
evil using computer equipment. The people who considered themselves
non-malicious "Hackers" decried this bastardization of the term they took
with pride, and the new name "cracker" arrived, years after that name
applied to people who removed copy protection from home video games.
By the late 80's to early 90's, no one cared too much, except for the
people who care about everything too much.
In other words, these textfiles are all about hacking.
In accordance with this spirit, anything involving subverting any technology,
for good or evil, is placed here. Unless, of course, you're talking about
telephones, at which point you should go over to
the <A href="/phreak">phreaking</A> section.
If you're looking for electronic hacking magazines, go check out the
<A HREF="/magazines">magazines</A>. Additionally, you might also check the
<A HREF="/groups">groups</A> section if your file was written by someone who
was part of a group.
Lists of Articles and Books about Hackers and Hacking
Textfiles about Cable TV and Cable TV Piracy
Purported Department of Defense Computer Security Guidelines
Information about different Hacking Conventions
Files Dealing With Hacking on the Internet
Files Dealing with Hacking Windows and DOS
Various Ethics and Policies of Computing Facilities Nationwide
Textfiles About Exploring or Exploiting UNIX
Textfiles About Exploring or Exploiting VMS and VAXes
DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
CIAC Advisory Notice: Authentication bypass in Sun 386i machines
Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
Anarchy Anonymous: Hacking your School Network
Advanced Authentication Technology, 1991
A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
Max Headroom's Hacker Acronym List
Max Headroom's Second Collection of Acronyms
A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
All in One Box, by Disk Doctor
AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
AIS: The Automatic Intercept System by Computer Consoles Incorporated
Warning to download some AIX Patches
Hacking Allnet by Shadow Warrior (January 1988)
Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
ANSI Bombs II: Tips and Techniques, by The Raging Golem
The Risks of Using an AOL Client Behind a Firewall
How to Hack America on Line by the Hooded Bobs
All IBM AS/400 Commands by The Might
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
Hackers' Atlas, by Ragon/Wynvern/BOF
ATMS: The Real File for ATM Theft in 1992 by The Raven
A Whole Collection of the Risks of ATM Cards (1988)
The Disk Jockey Presents Scamming ATMs
Quick OVerview of ATM Security (Needs Editing)
"Gee Whiz" ATM Applications are On the Horizon
ATM secret codes, from Fred Gindburg (July 10, 1987)
An Overview of ATMs and Information on the Encoding System
Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
Additional AUSTPAC Character Terminal Manual
AUSTPAC General Information and Codes
The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
Introduction to the Automated Voice Network (Autovon) by Shadowrunner
Introduction to the Automated Voice Network (Autovon) Part II
Introduction to the Automated Voice Network (Autovon) Part III
Overview of the Automatic Voice Network (Autovon)
Planning Ahead for Phone Phreaks/Hackers
The Moby Words Database (List of Words) (1989)
How to Hold Onto UNIX Root Once You Have It
The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
Basic Networking, by Sk8 the Skinhead
The Basics of Hacking I: DECs By the Knights of Shadow
The Basics of Hacking III: Data General By the Knights of Shadow
Basic Networking (1989) by Sk8 The SkinHead
Rambug's Hacking Volume #1 by Rambug
The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
The Slipped Disk takes over the BOCES Computer: A Log
The History of Hacking and Phreaking by Raven of BOMB Squad
Biblography of Computer Security Books (1973 through 1988)
BRUTE: A brute force approach to hacking Unix passwords. Version 1.1
BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
Suggestions On What to Do with a Commodore 64, by Nightstalker
Hacking Calling Cards, by The Pyromaniac
The Candyman Explains How He Will Accept Explosives Files
Codes Used by Computers in Cars
Citibank Hacking, by Johnny Hundu
Small Rant about Hacking Citibank
Using and Abusing CBI by The Ghost
The Cyberspace Chronicle Volume 1 by Phardak
CBV Hacking by PiNK ToRPeDo (June 7, 1994)
CBV Hackin' by Pink Torpedo (June 7, 1994)
Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke
The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)
China Newsletter #02 (Hacking/Phreaking File Compilation)
Church Chat Volume 4 by The Spiker
Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord
Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord
Compuserve Information by Morgoth and Lotus
List of Access Numbers to the Compuserve Information Service
Hacking into Citibank with Johnny Hindu
Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990)
Cracker Jack FAQ Written by kM (1993)
United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.
Free Compuserve Passwords, by Devious Xevious
Some Compuserve Tips, by Eric Diamond
Compuserve Hacking by The Locksmith
Magnetic Stripes, by Count Zero
RL C.O.P.S. File by Brian Oblivion
Hacking into COSMOS by Wizard of OZ
Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
The 1986 COSMOS Files Part III by Sir William
Hacking Programs on the Amiga by FunToHack
Crackdown, from 2600 Magazine volume 7, number 1 SPRING
The Adventures in Fraud Series Volume I, by Sneak Thief (1985)
Numbers of Credit Unions and protection Agencies
How to Get a Free Account on Compuserve
How to Get a Free Compuserve Account
The Social Organization of the Computer Underground by Gordon R. Meyer
The Cyberpunk Movement by Pazuzu of DnA May 12, 1993
Hacking Control Data Corporation's Cyber, by The Ghost
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS
Captain Crunch talks about hacking Data General Systems
CIRR Database: A tool for Corporate Research
How to connect across VCS/ISN boundaries
A Guide to DataPAC by The Fixer
Technical Guide to DataPac by the New Dark Council (1990)
A Guide to DataPAC by The Fixer (April 18, 1990)
A Guide to DataPAC version 1.1 by The Fixer
Datapac 3101 ITI Parameters Description
Datapac 3101 Public Outdial Ports
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
Defense Data Network Security Bulletin #3
Defense Data Network Security Bulletin #4
Defense Data Network Security Bulletin #5
Defense Data Network Security Bulletin #6
DDN: Information on the Defense Data Network from Unauthorized Access UK
DDN: The Defense Data Network (A Map)
Harvard Medical School Installs ISDN-Based Debit Card System
The Decserver 200 Revealed by Surf Studd (October 23, 1990)
Hacking into a Variety of Systems by using their Default Accounts
Department of Defense Federal Data Bases (List)
Defense Data Network Blues by Harry Hackalot
Defense Data Network Blues by Harry Hackalot (1984)
Defense Data Network Blues by Harry Hackalot (August 31, 1983)
Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin
The Data Encruption Standard (DES) Fact Sheet
The Data Encryption Standard (DES) June 1990
Dial-Back Isn't Always Secure (February 28, 1985)
Inside Dialog by Control C of Advanced Telecommunications Inc.
Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.
A Novice Manual on Using Outdial Modems by Blue Adept
A Screengrab of Informaiton on PSS DialPlus from British Telecom
List of Dialups. For what? I have no idea.
My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
Inside DJNS (Dow Jones News Service)
Complete Guide To The DIALOG Information Network by Brian oblivion
D A T E X - P - International Traffic Relations
The Basics of DataPAC by Mister X (February 2, 1991)
Introduction to DataPac from the Right of Terror and Deicide
The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)
DEC Terminal Server Basics by Mad Hacker
Hacking Easy Link I by Professor Falken
Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc
Hacking Easy-Link I by Professor Falken
Someone Makes fun of That Stupid Article
A Closer Look at EEPROMS by The Kingpin
The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)
Electronic Switching System by Black Knight, from 2600, Feb. 1984
Newsweek: Teaching Hackers Ethics
The Ethics of Hacking by Dissident
The Inspector's Thoughts, by Assailant's Blade and Ford Prefect
Hacking McDonalds, by Herb the Hacker
The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)
Summary of FBI Computer Systems, by Ralph Harvey
Summary of FBI Computer Systems By Ralph Harvey (1986)
Summary of FBI Computer Systems, by Ralph Harvey
Getting Free Compuserve Access, by The Wanderjahr
Federal Criteria for Information Technology Security Volume I
Federal Criteria for Information Technology Security Volume II
How to FDDA Internals Work? Learning to Appreciate Tokens
The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
Watching the Watcher Watching You, by Sir Knight of OSUNY BBS
Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)
Security Holes Manifest Themsleves in Four Ways (November 10, 1993)
The Four Ways Security Holes Manifest Themselves (November 10, 1993)
Force Files Volume #1 (December 3, 1987)
Force Files Volume #2 (April 17, 1987)
Force Files Volume #3 (August 6, 1987)
Force Files Volume #4 (August 1, 1987)
Force Files Volume #5 (August 6, 1987)
Force Files Volume #6 (August 6, 1987)
Force Files Volume #7 (August 6, 1987)
Force Files Volume #8 (August 6, 1987)
Force Files Volume #9 (August 6, 1987)
SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)
Garage Door Opener Hacker Plans from Cybertek
The Inter-Network Mail Guide - Copyright 1990 by John J. Chew
DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files
Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415
The Hacker's Guide to Investigations, by Ripper of HALE (1989)
Hacking the GIS computer by Doctor Crash
The Best of the Station, by The Prowler
Computer Hackers are Good People Too!
The Help Screen on some Government System
Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)
Hacking GTE Telemail by Master Micro
A Novice's Guide to Hacking- 1989 edition by The Mentor
The RSTS User's Guide, by The Flash
The Neophyte's Guide to hacking (1993 Edition) by Deicide
Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)
The Ethics of Hacking, by Dissident of TES
The Ethics of Hacking by Dissident
Beta .008 of the 2600/#hack FAQ
Hacking And Computer Krashing #9, by Gray Wolf
The Basics of Hacking, by the Knights of Shadow (Intro)
The Basics of Hacking, by The Knights of Shadow (DECs)
The Basics of Hacking, by The Knights of Shadow (Data General)
Hacking McDonalds, by Herb of Burger King
Hacking the Compuserve Information Service
The Conscience of a Hacker by The Mentor (January 8, 1986)
Hacking Control Data Corporation's Cyber
The Hack Report Volume 2, Number 1 (January 3, 1993)
The Hack Report Volume 2, Number 2 (February 7, 1993)
The Hack Report Volume 2, Number 3 (March 7, 1993)
The Hack Report Volume 2, Number 4 (April 4, 1993)
The Hack Report Volume 2, Number 5 (May 9, 1993)
The Hack Report Volume 2, Number 6 (June 6, 1993)
The Hack Report Volume 2, Number 7 (July 4, 1993)
The Hack Report Volume 2, Number 9 (September 12, 1993)
The Hack Report Volume 3, Issue 1 (January 29, 1994)
The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
Harry Hackalot's Official Hacker Address Book for October 1984
The Social Organization of the Computer Underground (Thesis)
The Hackers Acronym Chart, compiled by IIRG
The Famous Hacker's School (Analog Science Fiction Sept. 1990)
Hacking COSMOS Part I by Lex Luthor and the Legion of Doom
The Hacker Crackdown, by 2600 Magazine
The Hacker's Jargon File, (November 14, 1982 Version)
The Hacker's Dictionary, Older Version, Uncredited!
The Consience of a Hacker by The Mentor (January 8, 1986)
The Hacker's Purity Test, June 16, 1989
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
The Social Organization of the Computer Underground: A Thesis
The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
Hacking Western Union's Easylink
The Diary of a Hacker Part II by the Cuisinart Blade
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
Advertisement for the Galactic Hacker's Party (August 1989)
The Ethics of Hacking by Dissident
FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)
The Hack FAQ By Simple Nomad (January 31, 1999)
Hacking In Holland by Rop Gonggrijp (October 18, 1988)
Hacking the HP 2000 by Bioc Agent 003
Description of the New, Bad Definition of Hacking
Collections of Hacker FIles Downloaded by Consumertronics
Style Teaches You About How to Be a Proper Hacker
Hacking Tutorial, by The Jolly Roger
HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
Hacking Bank Of America's Home Banking System by Dark Creaper
Hacking Credit Card Codes by Omni-Kid and The Wyvern
Hacking ECONet Systems by Jack Death and Zapper
Computerworld Asks People to Hack In, 1984
Hacking the Lexington Air Force Computer
The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC
how to Hack Your School's Network, from Dr. Techno of Paradise Lost
The Weenie Warriors present Hacking PC Pursuit Codes
How to Hack Prodigy by Desolated Dream
Hacker Proof Doors! It IS Possible!
The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas
Hacking RSTS Systems: An Instructional Test
The Hacker's Song by Dave Touretzky and Don Libes
The Hackers Syndrome, by Tad Deriso
A Short Hackerspeak Glossary, by the Hollywood User Group
Collection of "Hackernyms" by Rad Man version 2.10
The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)
Hacking Tips #2, by Hoe Hopper
Hacking Tutorial, by The Jolly Roger
Hackers Unlimited Magazine Volume 1 Issue 1
Hacking into WWIV, Second Edition by Vision
Hacking into WWIV Software by Vision
How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club
An Addendum to A Novice's Guide to Hacking, by The Mentor
The Hacker's Dictionary, A Guide to the World of Computer Wizards
Hackers in the Media, List start: 10/28/92 - Doomsday
Hacking Compuserve: All You Need to Know, by Mr. Perfect
The HAQ Edition 2.07 (June 11, 1994)
Hashish: The Exotic Elixir, by EZ Rider
Invitation to HATE: Hackers at The End (Summer 1995)
HAVOK Pack #1: The Return (Collection of Hacking Textfiles)
The Hacker's Handbook by Hugo Cornwall (1985)
The Hacker's League, by Lee Felsenstein (March 18, 1992)
Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme
Hackers Directory Volume #1 by Ninja Squirrel and Logan5
Hackers Directory Volume #2 by Ninja Squirrel and Logan5
Hackers Directory Volume #3 by Ninja Squirrel and Logan5
Hackers Directory Volume #4 by Ninja Squirrel and Logan5
The Hacker's Digent by Harry Hackalot (October 1984)
Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)
The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)
CAT-HACK Volume 1 from The Mystery
The Czar's Guide to the Young Criminal Accused of Using Computers
The History of Hacking and Phreaking by Raven of BOM SQUAD
Draft Chapter of the NIST Computer Security Handbook, from Ed Roback
Draft Chapter from the NIST Computer Security Handbook, on Cryptography
Draft of the NIST Computer Security Handbook on Identification and Authentification
Draft of the NIST Computer Security Handbook on Computer and Information Security Policty
How Security Holes Manifest Themselves
A List of Holes in Various Operating Systems (April 7, 1993)
Hacking Bank Of America's Home Banking System by "Dark Creaper"
Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM
HP 2000 Part 1: Commands by Blitzoid and Galactus
HP 2000 Part 2: Statements by Blitzoid and Galactus
HP 2000 Part 3: Functions by Blitzoid and Galactus
HP 2000 Part 4: Files by Blitzoid and Galactus
Hp 2000 Part 5: Matracies by Blitzoid and Galactus
The Completel Hewlett Packard 3000 Hackers Guide
The Complete Hewlett Packard 3000 Hackers Guide
The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS
The Complete Hewlett Packard 3000 Hackers Guide
The International Hackers' Association Issue #1
How to Take Control of your Local IBM 370 by Another Hacker
Hacking the I.B.M. By John Doe
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus
ICoN Hacking with Loser Access by �����GY�
How to Have a Profitable ID Business, by Mr. Puff n' Stuff
How to Create a New Identity by the Walking Glitch
International Directory of Hacking and Phreaking Organizations, by John Simmons
The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
Bust Avoidance for Dipshits by Derision of IIU (1990)
Hacking on the Compuserve Information Service by Darkness (1990)
Dial-Up Access Numbers for ILLINET Online
How to Get Detailed Information on Anybody by DTS
How to Get Anything on Anybody Part III
Exploring Information-America by Omega and White Knight
TRI : The Remote Informer, Volume 1, Issue #6
Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth
Hacking Techniques, Typed in by Logan5 from The Inner Circle
The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods
SOFTDOCS: Intruder v1.21 by CreaSoft
European Computers List #1 by Kerrang Khan
The Information Systems Security Monitor Volume 2 Number 1
The Information Systems Security Monitor Volume 2 Number 2
The Information Systems Security Monitor Volume 2 Number 4
The Information Systems Security Monitor Volume 3 Number 1
The Information Systems Security Monitor Volume 3 Number 2
The Information Systems Security Monitor Volume 3 Number 3
The Information Systems Security Monitor Volume 3 Number 4
Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)
JANET PAD Listing Revision 1.2 (March 1st, 1990)
The Jargon File, v.2.9.11, by Eric S. Raymond
JavaScript Problems I've Discovered
Schematic For an Optoelectronic key Lock by Joe Scharf
SOFTDOCS: Keytrap v3.0 by Dcypher
KFYI AM Radio 910 interviews Mind Rape and Merc
FEDS: How to Find and Eliminate Them (September 10, 1987)
The L0pht... What I saw, by Tfish of RDT
Local Area Networks (LANs) by ANSI-Christ
LCA #1: Zen and the Art of Untraceable Hacking, by Flood
LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance
LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance
LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance
LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance
LCA #6: Beige Boxing, by the Lemon Curry Alliance
The Guerilla Guide to Licensing Software
Pacific Bell Computer Systems, by Another Hacker
AM Lightwave Transmitter and Reciever by Joe Scharf
Modem Noise Destroyer (Alpha Version)
The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)
How to Log into a C.B.I System by L.E. Pirate
The Mac Hack FAQ by AX1P (November 22, 1994)
Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)
Magnetic Stripes on Cards: An Overview
Mailbox Systems: Your Link to the Underworld
Main Frames by the Pirate Club
A List of Mainframe Dialup Numbers
Master Hack Version 1.0 by Master Frodo (January 1, 1991)
MCI Mail Access Numbrs, from The Swamp
MCI Mail - The Adventure Continues, by Bioc Agent
Hints on Hacking, byt the RAMBUG and Captain Blood
The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)
The NIST Management Guide to the Protection of Information Resources
Hacking McDonalds by Herb the Hacker
How to Use the American Military Net
Milnet, by Brigadier General Swipe
The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)
How to Get Anything on Anyone Excerpts
How to Get Anything on Anyone Excerpts
Mastering the SCANTRON by Warhead
Xerox Voice Message Exchange Commands, from The Lineman
The History of MOD: Book One: The Originals
The History of MOD: Book Two: Creative Mindz
The Book of MOD: Part Three: A Kick in the Groin
The Book of MOD: Part Four: End of '90-'1991
The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)
Collection of Hacking Files (Should Eventually be Split up)
RVEC Parameters and DMSTK Format
So you've finally decided to down an RSTS System?
The Tempest Method of Data Interception (Needs Editing)
A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
Guidelines for Writing Trusted Facility Manuals
Introduction to Trusted Computer System Evaluation Criteria
A Guideline on Office Automation Security (December 5, 1986)
Understanding NetBIOS by NeonSurge of Rhino9
DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00
2600: How to Send Mail to other Networks
List of DataBases and passwords for the game "Neuromancer"
Index to the Computer Underground Digest Archives (June 13, 1991)
CERT Advisory on the NeXT computer's Software
Application to Join Network Hackers Alliance (June 1, 1991)
Research Machines Nimbus hacking, by The Green Rhino
The Hack Report, by Lee Jackson (September 1993)
The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad
Collection of security holes in Novell Netware
SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)
Having Phun With Novell by Lord Foul/Decay (July 13, 1991)
Frequently Asked Questions about Hacking Novell Netware by Simple Nomad
TAG FILE: Obscene Phobia BBS (January 1, 1995)
Bylaws of the Open Computing Facility at UC Berkeley
Constitution for the Open Computing Facility at UC Berkeley
How to Connect OMRON 3S4YR-HSR4 to your PC
Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
A Large List of Computer Security Organizations
1988 List of Computer Security Organizations
Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)
How to Use Outdials: An Introduction by Lorax
Ameican Local Outdials by Sebastian Winchler (March 1991)
Collection of Pacific Bell Computer Systems
Notes on Using Tymenet and Telenet by Michael A. Banks (1989)
Hacking into the PACnet System
Telephone Numbers for the Pacific Bell Computer System by Another Hacker
The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press
PC Pursuit List Version 1.1 (August 31, 1988)
Hacking PC Pursuit Codes by The Weenie Warriors
The Weenie Warriors Present Hacking PC Pursuit Codes
How to Use Telenet's PC Pursuit Service by Z-Man
PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
PC Pursuit and Telenet Local Access Numbers
The Public Data Network Numbers
Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
The Milnet File by Brigadier General Swipe/Dispater
Soft Documentation: P-Hack 1.0 by Peter King
Becoming More Informed (Becoming a Hacker)
ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)
An Introduction to PRIMOS CPL Directives by Necrovore
Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)
Message Base With Discussion of the Watch utlity on PRIME (August, 1988)
Hacking Primos Systems By Nanuk of the North
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker
The Art of Password Hacking by HIT
How to Access Minitel or How to Have FUN on QSD
Information on RAC: A Host System Used for Access to GEnie and AppleLink
An Example of an RAC Login, Part II
Hacking Rampart Systems Part 1
Hacking Rampart Systems Part 1 (cont)
Hacking Rampart Systems Part 2
Hacking Rampart Systems Part 2 (cont)
Hacking RAM Communications (Pager)
Hacking Rampart Systems by Whackoland
Hacking Rampart Systems by Whackoland Part II
The RCA Network Part I by the Telex Troopers
A Story About the TSR That Catches Passwords, and a short History
SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker
The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)
Review of Federal Agency Computer Security and Privacy Plans
Principles of Responsible Use of RIACS Computing Facilities
The Doctor Ripco Seizure by Full Disclosure (1991)
Avoiding the Risks of Hacking: A List of Suggestions by IC
Macintosh ROM Secrets by The Cloud (November 23, 1990)
DocumentationL The Rowdy Dialer (April 1993)
So You've Decided to Down a RSTS System, by Sam Sneed
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital
A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)
Satellite Control, by Ninja Squirrel & Logan-5
Satellite Scrambling Systems: The Truth, by XL
Satellite Frequencies, by Sir Francis Drake
What To Look For In A Code Hacking Program, by Dissident
Screwing with School Computers, by Liquid Bug
Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
Young's Demonstrative Translation of Scientific Secrets (1861)
Technical Hacking Volume 1 by the Warelock
Overview of Computer Security by E.A. Bedwell, EDP Specialist
Professor Falken's Guide to CODE Hacking Security
Sequence Number Attacks, by Rik Farrow
Swedish Hackers Association Annual Year Protocol #4
The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
Swedish Hacking Association presents Hacking HP 3000 Part 1
The 3rd Protocol (1990) by The Swedish Hackers Association
The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions
Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn
Syndicated Hack Watch (March 1994) by John McCormac
Syndicated Hack Watch (April 1994)
The Start of the Skybox Cable War
Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"
Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control
Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press
SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society
Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn
Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries
The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)
FAQ: The Sniffer FAQ Version 1.7
Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca
Data Snooping the Right Way by Lee Day
The Source Telnet Directory, and Uninet Directory
The Social Security Number, by Barbara Bennett
More about why Social Security Numbers are Insecure
Information on Galaxy Starlink: A User's Guide
Hacking the Gandalf Starmaster by Deicide (May 22, 1993)
So, You Wanna Be a Hacker? It's a State of Mind!
Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)
Those Stupid Little Bastard Hackers!
How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)
Operation Sundevil, by the Prodigy
DocumentationL Superdial 1.03 by Evan Anderson
The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
Texas A&M Network Security Package Overview 7/1/1993
Captures of Information on TACACS by The Argonaut
List of Telenet Access Numbers by Daredevil of P/HUN
FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)
Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)
An Introduction to PRIMOS CPL Directives by Necrovore
Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)
Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)
A Guide to ADS System, by Lord Digital and the Phantom
Hacking Techniques, by Logan-5 (Hacker Supreme)
Technical Hacking: Volume One by the Warelock
Telenet Scanning by Doc Telecom (July 11, 1988)
An Overview of Telenet by Man Max
Telenet Codes, Hacked Out by ZORON (May 1, 1988)
An Introductory Guide to Telenet Commands
Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)
An Introductory Guide to Telenet Commands
A Good amount of general Telenet Information
An Introductory Guide to Telenet Commands
Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)
Instructions for using TELENET.
Information on Telenet Scanning
Cracking Auto Bank Teller Machines by the Suspect
Welcome to the TCO Access Listing (September 15, 1987)
Telenet Scanning by Doc Telecom (July 11, 1988)
Telenet Access Numbers, by the Weenie Warriors
NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)
The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)
The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)
Introduction to Hacking into LANs by THUG
General Information on LANs by THUG (July 31, 1991)
Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)
ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas
ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual
Fun with Temple's Computers (A How To)
Tymnet File #1 by The Twilight Phone
Tymnet File #2 by The Twilight Phone
Tymnet File #3 by The Twilight Phone
TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom
Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!
The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
Dumpster Diving: An overview of the legality, by Full Disclosure
The Art of Trashing by Deicide
The Trax Toolbox Volume #001 by Track
The Triad: A 3-in-1 Textfile Magazine, Issue #1
Rumors of Worms and Trojan Horses by Mike Guffey
SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)
TymNet OutDials Sorted By Area Code
International Packet Switching Services Description
Tymenet Technical and User Information
Packet Networks I and other Tymnet Information by Digital Demon, 1990
BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)
A List of Modem Dialups in the UK (September 22, 1990)
The Guide to Online Databases for UK Users
The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)
The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy
Uninet Information, from The South Pole
SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)
SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)
The NIST Computer User's Guide to the Protection of Information Resources
The Hacker Who Vanished: Suicide or Clever Hoax?
Attack of the Computer Virus, by Lee Dembart
Hacking Voice Mail Boxes by Tik Tak
The IBM VMSSP System, by The Motorhead
The VT Hacker, by the Man Hermit
The VT Hacker #2, by the Mad Hermit
The VT Hacker #3, by The Mad Hermit
A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)
Hacking the Wal-Mart Armorguard Computer Protection System
Hacking the Wang OS, by Dark Knight
The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)
Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock
Watching the Watcher Watching You by Sir Knight
WATS Version 1.0 by Professor Falken & The Aptolcater
The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!
The ROT Guide to Gandalf XMUX's by Deicide
Dan Farmer's Improving the Security of Your Site by Breaking Into It