#hack FAQ Home | Computers | Data Networks | Wireless Networks | Telephony | Mobile Telephony
Radio | Television | Resources | 2600 | Smart Cards and Magnetic Cards | Miscellaneous

Section H -- Resources


H-01. What are some World wide Web (WWW) sites of interest to hackers?

The maintenance of this section simply grew out of control. There is information of interest to hackers all over the World Wide Web.

To find what you are looking for, consult one of these fine search engines:

www.google.com Google
www.privado.com Privado (they don't store searches and seems like a real meta-search engine!)
www.hotbot.com HotBot: The Wired Search Center
www.altavista.com AltaVista Search Network
www.yahoo.com Yahoo!
www.hotbot.lycos.com Lycos
www.webcrawler.com WebCrawler
www.infoseek.go.com InfoSeek
www.excite.com eXcite
http://groups.google.com/ Google Groups


H-02. What are some FTP sites of interest to hackers?

ftp.2600.com   2600 Magazine
aeneas.mit.edu   Kerberos
athena-dist.mit.edu /pub/ATHENA Athena Project
ftp.cert.org   CERT
ciac.llnl.gov   CIAC
coast.cs.purdue.edu /pub Security/COAST
coast.cs.purdue.edu /pub/security Security
ftp.acns.nwu.edu /pub Mac Anti-virus
ftp.acsu.buffalo.edu /pub/security & /pub/irc Security & IRC
ftp.armory.com /pub/user/kmartind H/P
ftp.armory.com /pub/user/swallow H/P
ftp.auscert.org.au /pub Australian CERT
ftp.cert.dfn.de   FIRST
ftp.cs.ruu.nl /pub/SECURITY Security & PGP
ftp.cs.uwm.edu
/pub/comp-privacy Privacy Digest
ftp.csi.forth.gr /pub/security  
ftp.csl.sri.com /pub/nides SRI
ftp.csua.berkeley.edu
/pub/cypherpunks Crypto
ftp.demon.co.uk /pub/misc/0800num.txt 0800/0500 numbers
ftp.denet.dk /pub/security/tools/satan  
ftp.digex.net /pub/access/dunk  
ftp.dsi.unimi.it /pub/security/crypt Crypto
ftp.dstc.edu.au
/pub/security/satan  
ftp.ee.ualberta.ca /pub/cookbook/telecom Telecom electronics
ftp.etext.org   Etext
ftp.funet.fi /pub/doc/CuD  
ftp.gate.net /pub/users/wakko  
ftp.giga.or.at /pub/hacker/ H/P
ftp.greatcircle.com /pub/firewalls Firewalls
ftp.IEunet.ie
/pub/security Security
ftp.info.fundp.ac.be    
ftp.informatik.uni-hamburg.de  
ftp.informatik.uni-kiel.de /pub/sources/security  
ftp.lava.net /users/oracle/ H/P
ftp.lerc.nasa.gov /security  
ftp.llnl.gov /pub CIAC
ftp.luth.se
/pub/unix/security  
ftp.mcs.anl.gov /pub/security  
ftp.near.net
/security/archives/phrack Zines
ftp.net.ohio-state.edu /pub/security/satan  
ftp.netsys.com /pub/zz/zzyzx H/P
ftp.ocs.mq.edu.au /PC/Crypt Cryptology
ftp.ox.ac.uk /pub/comp/security  
ftp.ox.ac.uk /pub/crypto Cryptology
ftp.ox.ac.uk /pub/wordlists Wordlists
ftp.paranoia.com /pub/toneloc/tl110.zip ToneLoc
ftp.pipex.net
/pub/areacode uk areacodes
ftp.primenet.com /users/i/insphrk  
ftp.primenet.com /users/k/kludge H/P
ftp.primenet.com /users/s/scuzzy Copy Protection
ftp.psy.uq.oz.au /pub/DES  
ftp.rahul.net /pub/conquest/DeadelviS/script/vms/
ftp.rahul.net
/pub/lps Home of the FAQ
ftp.smartlink.net /pub/users/mikes/haq  
ftp.std.com /archives/alt.locksmithing Locksmithing
ftp.std.com /obi/Mischief/ MIT Guide to Locks
ftp.std.com /obi/Phracks Zines
ftp.sunet.se /pub/network/monitoring Ethernet sniffers
ftp.sura.net
/pub/security SURAnet
ftp.tisl.ukans.edu /pub/security  
ftp.uni-koeln.de
  Wordlists
ftp.uu.net /doc/literary/obi/Phracks Zines
ftp.warwick.ac.uk /pub/cud Zines
ftp.win.tue.nl /pub/security Security
ftp.winternet.com /users/nitehwk H/P
ftp.wustl.edu
/doc/EFF EFF
garbo.uwasa.fi /pc/crypt Cryptology
gemini.tuc.noao.edu /pub/grandi  
info.mcs.anl.gov   Argonne National Laboratory Mathematics & Computer Science Division
net-dist.mit.edu /pub/pgp MIT's network distribution server
net.tamu.edu /pub/security/TAMU Security
ripem.msu.edu /pub/crypt Ripem
rtfm.mit.edu   Read The Fine Manual
src.doc.ic.ac.uk /usenet/uk.telecom uk.telecom archives
sunsolve1.sun.com   SunSolve
vic.cc.purdue.edu /pub/unix/tools/lsof lsof


H-03. What are some newsgroups of interest to hackers?

news:alt.2600 Do it 'til it hertz
news:alt.2600d  
news:alt.2600hz  
alt.magazine.2600 Spam free discussion of 2600 Magazine. (Moderated)
alt.binaries.comp.virus NG to post virus and antivirus utilities.
alt.binaries.cracks Like alt.binaries.warez.*, only different.
alt.binaries.cracks.d Discussion of issues in alt.binaries.cracks
alt.binaries.satellite-tv Programs and data related to encrypted TV.
alt.cellular Cellular telephone techhnology
alt.cellular-phone-tech Brilliant telephony mind blow netnews naming
alt.comp.virus An unmoderated forum for discussing viruses
alt.comp.virus.binaries Executables of NEW Viruses
alt.comp.virus.source.code The source code to various virii.
alt.cracks Heavy toolbelt wearers of the world, unite
alt.cyberpunk High-tech low-life.
alt.cyberspace Cyberspace and how it should work.
alt.dcom.telecom Discussion of telecommunications technology
alt.engr.explosives
BOOM
alt.hackers
Descriptions of projects currently under development
alt.hackintosh Clever programming on Apple's Macintosh
alt.locksmithing You locked your keys in where?
alt.hackers.malicious The really bad guys - don't take candy from them
alt.ph.uk United Kingdom version of alt.2600
alt.privacy.anon-server Issues surrounding programs that aid anonymity
alt.radio.pirate Hide the gear, here comes the magic station-wagons.
alt.radio.scanner Discussion of scanning radio receivers.
alt.satellite.tv.crypt Satellite signal de-cryption techniques.
alt.security Security issues on computer systems
alt.security.alarms Discussion of Home/Business/Vehicle security alarms.
alt.security.index Pointers to good stuff in alt.security (Moderated)
alt.security.keydist Exchange of keys for public key encryption systems
alt.security.pgp The Pretty Good Privacy package
comp.dcom.telecom.tech Discussion of technical aspects of telephony.
comp.org.cpsr.announce Computer Professionals for Social Responsibility
comp.org.cpsr.talk Issues of computing and social responsibility
comp.org.eff.news News from the Electronic Frontiers Foundation
comp.org.eff.talk Discussion of EFF goals, strategies, etc.
comp.os.netware.security Netware Security issues
comp.protocols.kerberos The Kerberos authentification server
comp.protocols.tcp-ip TCP and IP network protocols
comp.risks Risks to the public from computers & users
comp.security.announce Announcements from the CERT about security
comp.security.firewalls Anything pertaining to network firewall security
comp.security.gss-api Generic Security Service Application Program Interface.
comp.security.misc Security issues of computers and networks
comp.security.ssh SSH secure remote login and tunneling tools.
comp.security.unix Discussion of Unix security
comp.virus Computer viruses & security (Moderated)
news.org.ccc Mitteilungen des CCC e.V.
rec.pyrotechnics Fireworks, rocketry, safety, & other topics
rec.radio.scanner "Utility" broadcasting traffic above 30 MHz.
rec.video.cable-tv Technical and regulatory issues of cable television
sci.crypt Different methods of data en/decryption
sci.crypt.random-numbers Generating cryptographic strength randomness.
sci.crypt.research Cryptography, cryptanalysis, and related issues. (Moderated)


H-04. What are some IRC channels of interest to hackers?

#2600
#cellular
#hack
#phreak
#linux
#root
#unix
#warez



H-05. What are some books of interest to hackers?

General Computer Security

Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4

This is an excellent book. It gives a broad overview of computer security without sacrificing detail. A must read for the beginning security expert.
Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0

 

cover Computer Related Risks
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X

 

Computer Security Management
Author: Karen Forcht
Publisher: boyd & fraser publishing company
Copyright Date: 1994
ISBN: 0-87835-881-1

 

The Stephen Cobb Complete Book of PC and LAN Security
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

 

Security in Computing
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1

 

Building a Secure Computer System
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2

 

Modern Methods for Computer Security
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN: 0-135-95207-7

 

cover Protection and Security on the Information Superhighway
Author: Dr. Frederick B. Cohen
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-11389-1

 

Commonsense Computer Security
Author: Martin Smith
Publisher: McGraw-Hill
Copyright Date: 1993
ISBN: 0-07-707805-5

 

Combatting Computer Crime
Author: Jerry Papke
Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
Copyright Date: 1992
ISBN: 0-8306-7664-3

 

cover Computer Crime: A Crimefighters Handbook
Author: David Icove, Karl Seger and William VonStorch
Publisher: O'Reilly & Associates
Copyright Date: 1995
ISBN: 1-56592-086-4


Unix System Security

Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2

 

Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0

 

Unix Security: A Practical Tutorial
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6

 

Unix System Security: A Guide for Users and Systems Administrators
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4

 

Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3

 

Unix Security for the Organization
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2

 

Unix System Security Essentials
Author: Christopher Braun
Publisher: Addison Wesley
Copyright Date: 1995
ISBN: 0-201-42775-3

 

Firewalls

cover Building Internet Firewalls
Author: D. Brent Chapman and Elizabeth D. Zwicky
Publisher: O'Reilly and Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-124-0

 

If you are going to purchase a book on firewalls, this is the one to buy.
cover Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4

 

cover Internet Firewalls and Network Security
Author: Karanjit S. Siyan and Chris Hare
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-437-6

 

Network Security

Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7

 

Not a total waste of paper, but definitely not worth the $49.95 purchase price. The book is a rehash of previously published information. The only secret we learn from reading the book is that Sylvia Moon is a younger woman madly in love with the older David Stang.
Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7

 

cover Network Security
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4

 

Network Security: How to Plan For It and How to Achieve It
Author: Richard M. Baker
Publisher: McGraw-Hill, Inc.
Copyright Date:
ISBN: 0-07-005141-0

 

cover Network Security: Private Communications in a Public World
Author: Charlie Kaufman, Radia Perlman and Mike Speciner
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-13-061466-1

 

cover Network and Internetwork Security: Principles and Practice
Author: William Stallings
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-02-415483-0

 

cover Implementing Internet Security
Author: William Stallings
Publisher: New Rider Publishing
Copyright Date: 1995
ISBN: 1-56205-471-6

 

cover Actually Useful Internet Security Techniques
Author: Larry J. Hughes, Jr.
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-508-9

 

Cryptography

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2
Bruce Schneier's book replaces all other texts on cryptography. If you are interested in cryptography, this is a must read. This may be the first and last book on cryptography you may ever need to buy.
Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5

 

Protect Your Privacy: A Guide for PGP Users
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4

 

Codebreakers
Author: Kahn
Publisher: Simon and Schuster
Copyright Date:
ISBN:0-02-560460-0

 

cover Codebreakers: The Inside Story of Bletchley Park
Author: Francis Harry Hinsley and Alan Stripp
Publisher: Oxford University Press
Copyright Date: 1993
ISBN:0-19-285304-X

 

Cryptanalysis, a study of ciphers and their solution
Author: Gaines, Helen Fouche
Publisher: Dover Publications
Copyright Date: 1956
ISBN:

 

cover Computer Privacy Handbook
Author: Andre' Bacard
Publisher: Peachpit Press
Copyright Date: 1995
ISBN: 1-56609-171-3

 

cover E-Mail Security with PGP and PEM
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-05318-X

 

cover PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-098-8

 

Programmed Threats

The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0

 

The Giant Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:

 

Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1

 

Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X

 

The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8

 

A Short Course on Computer Viruses
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2

 

Robert Slade's Guide to Computer Viruses
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0

 

Telephony

Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephone Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5

Although hopelessly out of date, this book remains the book on telephony. This book is 100% Bell, and is loved by phreaks the world over.

Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9

 

cover The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8

I find this dictionary to be an excellent reference book on telephony, and I recommend it to anyone with serious intentions in the field.

Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:

 

The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-x

Listing of every cellular ID in the US, plus roaming ports, and info numbers for each carrier.

Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:

 

Hacking History and Culture

cover The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X

Bruce Sterling has recently released the book FREE to the net. The book is much easier to read in print form, and the paperback is only $5.99. Either way you read it, you will be glad you did. Mr. Sterling is an excellent science fiction author and has brought his talent with words to bear on the hacking culture. A very enjoyable reading experience.

Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6

 

Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X

 

cover The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9

 

Masters of Deception
Author: Quittner, John
Publisher: HarperCollins Publishers, Incorporated, New York, NY
ISBN: 0-06-017030-1

 

Unclassified

The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4

 

cover Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5

The Knightmare is no super hacker. There is little or no real information in this book. The Knightmare gives useful advice like telling you not to dress up before going trashing. The Knightmare's best hack is fooling Loompanics into publishing this garbage.

The Day The Phones Stopped
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6

Total garbage. Paranoid delusions of a lunatic. Less factual data that an average issue of the Enquirer.

Information Warfare
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1

 

An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8

 


H-06. What are some videos of interest to hackers?

Unauthorized Access by Annaliza Savage
$25 on VHS format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060

Hacker's '95 A Phon-E & R.F. Burns Production
See the video Emmanuel Goldstein thought would have the Feds knocking at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y fiasco at Summercon. PMF (narc) interviews Emmanuel Goldstein & Eric BloodAxe. Trip to Area 51 and interview with Psychospy. Coverage of the Secret Service briefing on Operation Cyber Snare (recent cell busts) Talks on Crypto, HERF, the Feds, etc.
All information is presented for educational purposes only.
Not for sale to government or law enforcement organizations.
Running time aproximately 90 minutes.
$34.95 ($29.95 if ordered via the web page)
Custom Video Productions
(908)842-6378
videocvp@ix.netcom.com


H-07. What are some mailing lists of interest to hackers?

Academic Firewalls
Registration Address: Send a message to majordomo@greatcircle.com containing the line "subscribe firewalls user@host"

The Alert
Registration Address: Send a message to request-alert@iss.net containing the line "subscribe alert"

Bugtraq
Reflector Address: bugtraq@fc.net
Registration Address: bugtraq-request@fc.net

Cert Tools
Reflector Address: cert-tools@cert.org
Registration Address: cert-tools-request@cert.org

Computers and Society
Reflector Address: Comp-Soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com

Coordinated Feasibility Effort to Unravel State Data
Reflector Address: ldc-sw@cpsr.org
Registration Address:

CPSR Announcement List
Reflector Address: cpsr-announce@cpsr.org
Registration Address:

CPSR - Intellectual Property
Reflector Address: cpsr-int-prop@cpsr.org
Registration Address:

CPSR - Internet Library
Reflector Address:cpsr-library@cpsr.org
Registration Address:

Cypherpunks
Registration Address: Send a message to majordomo@toad.com containing the line "subscribe cypherpunks"

DefCon Announcement List
Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-announce"

DefCon Chat List
Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-stuff"

Discount Long Distance Digest
Registration Address: Send a message to: dld-request@webcom.com containing the line "subscribe"

Electronic Payment
Registration Address: e-payment@cc.bellcore.com

IDS (Intruder Detection Systems)
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au containing the line "subscribe ids"

Information Warfare
Registration Address: E-mail iw@all.net with a request to be added.

Linux-Alert
Registration Address: majordomo@linux.nrao.edu

Linux-Security
Registration Address: majordomo@linux.nrao.edu

Macintosh Security
Reflector Address: mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.com

NetWare Security
Registration Address: Send a message to majordomo@dey-systems.com containing the line "subscribe netware-hack"

NeXT Managers
Registration Address: next-managers-request@stolaf.edu

PGP3 announcement list
Registration Address: Send a message to pgp-announce-request@lsd.com with the subject of "Your Name user@host">

Phiber-Scream
Registration Address: Send a message to listserv@netcom.com containing the line "subscribe phiber-scream user@host"

phruwt-l (Macintosh H/P)
Registration Address: Send a message to filbert@netcom.com with the subject "phruwt-l"

rfc931-users
Reflector Address: rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.edu

RSA Users
Reflector Address: rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.com

WWW Security
Registration Address: www-security@ns2.rutgers.edu


H-08. What are some print magazines of interest to hackers?

2600 - The Hacker Quarterly

E-mail addresses:

info@2600.com To get info on 2600
index@2600.com To get a copy of our index
meetings@2600.com For info on starting your own meeting
subs@2600.com For subscription problems
letters@2600.com To send us a letter
articles@2600.com To send us an article
2600@2600.com To send us a general message

Subscription Address:

2600 Subscription Dept
PO Box 752
Middle Island, NY
11953-0752

Letters and article submission address:

2600 Editorial Department
PO Box 99
Middle Island, NY
11953-0099
Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626

Subscriptions: United States: $21/yr individual, $50 corporate.
Overseas: $30/yr individual, $65 corporate

Gray Areas

Gray Areas examines gray areas of law and morality and subject matter which is illegal, immoral and/or controversial. Gray Areas explores why hackers hack and puts hacking into a sociological framework of deviant behavior.

E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com

U.S. Mail Address:
Gray Areas
PO Box 808
Broomall, PA 19008
Subscriptions:
$26.00 4 issues first class
$34.00 4 issues foreign (shipped air mail)

Privacy Newsletter

Privacy Newsletter is a monthly newsletter devoted to showing consumers how to get privacy and keep it.

E-Mail Address: privacy@interramp.com

Subscription Address:

Privacy Newsletter
P.O. Box 8206
Philadelphia, PA 19101-8206

Subscriptions: $99/yr (US) $149/yr (Overseas)


Wired

Subscription Address: subscriptions@wired.com or

Wired
PO Box 191826
San Francisco, CA 94119-9866

Letters and article submission address: guidelines@wired.com or

Wired
544 Second Street
San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)


Nuts & Volts

T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line) (909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664


Cybertek: The Cyberpunk Technical Journal

P.O. Box 64
Brewster, NY 10509

Frequency: Bimonthly
Domestic Subscription Rate: $15/year (6 issues)

PrivateLine

5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

E-Mail: privateline@delphi.com

Subscriptions: $24 a year for six issues

Text of back issues are at the etext archive at Michigan. Gopher or ftp to: etext.archive.umich.edu/pub/Zines/PrivateLine



H-09. What are some e-zines of interest to hackers?

CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo
Empire Times ftp.etext.org /pub/Zines/Emptimes
Phrack http://www.phrack.org/  


H-10. What are some organizations of interest to hackers?

Computer Professionals for Social Responsibility (CPSR)

CPSR empowers computer professionals and computer users to advocate for the responsible use of information technology and empowers all who use computer technology to participate in the public debate. As technical experts, CPSR members provide the public and policy makers with realistic assessments of the power, promise, and limitations of computer technology. As an organization of concerned citizens, CPSR directs public attention to critical choices concerning the applications of computing and how those choices affect society.

By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy.

Every project we undertake is based on five principles:

CPSR Membership Categories:

  • 75 REGULAR MEMBER
  • 50 Basic member
  • 200 Supporting member
  • 500 Sponsoring member
  • 1000 Lifetime member
  • 20 Student/low income member
  • 50 Foreign subscriber
  • 50 Library/institutional subscriber

  • CPSR National Office
    P.O. Box 717
    Palo Alto, CA 94301
    415-322-3778
    415-322-3798 (FAX)
    E-mail: cpsr@csli.stanford.edu


    Electronic Frontier Foundation (EFF)

    The Electronic Frontier Foundation (EFF) is dedicated to the pursuit of policies and activities that will advance freedom and openness in computer-based communications. It is a member-supported, nonprofit group that grew from the conviction that a new public interest organization was needed in the information age; that this organization would enhance and protect the democratic potential of new computer communications technology. From the beginning, the EFF determined to become an organization that would combine technical, legal, and public policy expertise, and would apply these skills to the myriad issues and concerns that arise whenever a new communications medium is born.

    Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations.

    The Electronic Frontier Foundation, Inc. 1001 G Street, NW
    Suite 950 East
    Washington, D.C. 20001
    (202)544 9237
    (202)547 5481 FAX
    Internet: eff@eff.org


    Free Software Foundation (FSF) and GNU

    The Free Software Foundation is dedicated to eliminating restrictions on people's right to use, copy, modify, and redistribute computer programs. We promote the development and use of free software in all areas using computers. Specifically, we are putting together a complete, integrated software system named "GNU" ("GNU's Not Unix", pronounced "guh-new") that will be upwardly compatible with Unix. Most parts of this system are already being used and distributed.

    The word "free" in our name refers to freedom, not price. You may or may not pay money to get GNU software, but regardless you have two specific freedoms once you get it: first, the freedom to copy a program and give it away to your friends and co-workers; and second, the freedom to change a program as you wish, by having full access to source code. You can study the source and learn how such programs are written. You may then be able to port it, improve it, and share your changes with others. If you redistribute GNU software you may charge a distribution fee or give it away, so long as you include the source code and the GPL (GNU General Public License).

    Free Software Foundation, Inc. Telephone: +1-617-876-3296
    673 Massachusetts Avenue Fax: +1-617-492-9057
    Cambridge, MA 02139-3309 USA Fax (in Japan): 0031-13-2473 (KDD)
    Electronic mail: gnu@prep.ai.mit.edu 0066-3382-0158 (IDC)

    GNU is to be a complete integrated computational environment: everything you need to work with a computer, either as a programmer or as a person in an office or home. The core is an operating system, which consists of a central program called a kernel that runs the other programs on the computer, and a large number of ancillary programs for handling files, etc. The Free Software Foundation is developing an advanced kernel called the Hurd.

    A complete system has tools for programmers, such as compilers and debuggers. It also has editors, sketchpads, calendars, calculators, spreadsheets, databases, electronic mail readers, and Internet navigators. The FSF already distributes most of the programs used in an operating system, all the tools regularly used by programmers, and much more.


    The League for Programming Freedom (LPF)

    The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston.

    "Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation.

    We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices.

    Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome.

    To contact the League, phone (617) 243-4091, send Internet mail to the address league@prep.ai.mit.edu, or write to:

    League for Programming Freedom
    1 Kendall Square #143
    P.O. Box 9171
    Cambridge, MA 02139 USA


    SotMesc

    Founded in 1989, SotMesc is dedicated to preserving the integrity and cohesion of the computing society. By promoting computer education, liberties and efficiency, we believe we can secure freedoms for all computer users while retaining privacy.

    SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter.

    The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media.

    SotMesc memberships are $20 to students and $40 to regular members.

    SotMESC
    P.O. Box 573
    Long Beach, MS 39560


    Computer Emergency Response Team (CERT)

    CERT is the Computer Emergency Response Team that was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems.

    CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (192.88.209.5), where security-related documents, past CERT advisories, and tools are archived.

    CERT contact information:

    U.S. mail address
    CERT Coordination Center
    Software Engineering Institute
    Carnegie Mellon University
    Pittsburgh, PA 15213-3890
    U.S.A.

    Internet E-mail address
    cert@cert.org

    Telephone number
    (412)268-7090 (24-hour hotline)
    CERT Coordination Center personnel answer 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for emergencies during other hours.

    FAX number
    (412)268-6989



    H-11. What are some radio programs of interest to hackers?

    Off The Hook New York 99.5 FM Tue 8pm EST
    Off The Hook Short Wave 7415 kHz Wed 6pm EST
    Full Disclosure Live Short Wave WWCR 5065 kHz Sun 8pm EST
    Full Disclosure Live Oil City, PA WOYL AM-1340 Sun 8pm EST
    Full Disclosure Live Satellite Telstar 302 (T2), Ch 21, 5.8 Sun 8pm EST


    H-12. What are other FAQ's of interest to hackers?

    The Unofficial Netware Hack FAQ
    Author: Simple Nomad <thegnome@nmrc.org>
    http://nmrc.org/faqs/netware/index.html

    The Unofficial NT Hack FAQ
    Author: Simple Nomad <thegnome@nmrc.org>
    http://nmrc.org/faqs/nt/index.html

    The Unofficial Web Hack FAQ
    Author: Simple Nomad <thegnome@nmrc.org>
    http://nmrc.org/faqs/www/index.html

    The PGP Attack FAQ
    Author: Route

    The UK Phone Phreaking F.A.Q.
    Author: Pyro Teknik <pyro-teknik@geocities.com> <pteknik@spasm.redcat.org.uk>
    http://www.crossbar.demon.co.uk/ukphreak.txt

    alt.ph.uk FAQ
    Author: Virtua7 m00jrwd@ecs.ox.ac.uk
    http://alt.ph.uk.com/

    Mac Hack FAQ: Defeating Security
    Author: AX1P (an149689@anon.penet.fi)

    Frequently Asked Questions About Red Boxing
    Author: Mr. Sandman (an132432@anon.penet.fi)

    VMS FAQ (Frequently Ask Questions)
    Author: The Beaver (beaver@upperdck.blkbox.com)

    Anonymous FTP FAQ
    Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
    ftp://ftp.iss.net /pub/faq/anonftp

    Compromise FAQ: What if your Machines are Compromised by an Intruder
    Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
    ftp://ftp.iss.net /pub/faq/compromise

    Security Patches FAQ
    Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
    ftp//:ftp.iss.net /pub/faq/patch

    Sniffer FAQ
    Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
    ftp://ftp.iss.net /pub/faq/sniff

    Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches
    Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
    ftp://ftp.iss.net /pub/faq/vendor

    Cryptography FAQ
    Author: The Crypt Cabal
    ftp://rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

    Firewalls FAQ
    Author: Marcus J. Ranum (mjr@ss1.lightspeed.net)
    ftp://rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/

    Buying a Used Scanner Radio
    Author: parnass@att.com (Bob Parnass, AJ9S)
    ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

    How to Find Scanner Frequencies
    Author: parnass@att.com (Bob Parnass, AJ9S)
    ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

    Introduction to Scanning
    Author: parnass@att.com (Bob Parnass, AJ9S)
    ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

    Low Power Broadcasting FAQ
    Author: Rick Harrison.
    ftp://rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/

    RSA Cryptography Today FAQ
    Author: Paul Fahn
    ftp://rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

    VIRUS-L comp.virus Frequently Asked Questions (FAQ)
    Author: Kenneth R. van Wyk <krvw@cert.org>
    ftp://rtfm.mit.edu /pub/usenet-by-group/comp.virus/

    Where to get the latest PGP (Pretty Good Privacy) FAQ
    Author: mpj@csn.net (Michael Johnson)
    ftp://rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/

    alt.locksmithing answers to Frequently Asked Questions (FAQ)
    Author: spike@indra.com (Joe Ilacqua)
    ftp://rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/

    comp.os.netware.security FAQ
    Author: Fauzan Mirza <F.U.Mirza@sheffield.ac.uk>
    ftp://rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/

    rec.pyrotechnics FAQ
    Author: zoz@cs.adelaide.edu.au (Hans Josef Wagemueller)
    ftp://rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/



    H-13. What are some conferences of interest to hackers?

    Every year a hacker convention disappears and two new ones crop up in it's place.

    CuervoCon every Winter in Texas
    http://www.cuervocon.org

    DefCon every Summer in Las Vegas
    http://www.defcon.org

    For more information, keep your eyes on the web.



    H-14. Where can I purchase a magnetic stripe reader/writer?

    Mag-Tek
    http://www.magtek.com
    20725 S. Annalee Avenue
    Carson, CA 90746
    (310)631-8602 (Voice)
    (310)631-3956 (Fax)

    Track Write Interface Model Price
    2 No Keyboard/RS-232
    1,2 No Keyboard/RS-232
    2,3 No Keyboard/RS-232
    1,2,3 No RS-232
    1,2,3 Yes Standalone/RS-232


    American Microsystems
    http://www.amis.com
    2190 Regal Parkway
    Euless, TX 76040
    (800)648-4452 (Voice)
    (817)685-6232 (Fax)

    Track Write Interface Model Price
    2 No     $250


    CPU Advance
    PO Box 2434
    Harwood Station
    Littleton, MA 01460
    (508)624-4819 (Fax)

    Track Write Interface Model Price
    1,2 Yes   C1523 $389
    2,3 Yes   C1534 $389


    Herback and Rademan
    http://www.herbach.com
    18 Canal Street
    P.O. Box 122
    Bristol, PA 19007-0122
    (215)788-5583 (Voice)
    (215)788-9577 (Fax)

    Track Write Interface Model Price
    2 No   TM92CMP1966 $15


    Neuron Electronics
    http://www.neuron-usa.com
    3848 Del Amo Boulevard
    Suite #301
    Torrance, CA 90503
    (310)793-1300 (Voice)
    (310)793-1304 (Fax)

    Track Write Interface Model Price
    2 Yes   MCR 231-2A  


    Omron Electronics, Inc.
    http://www.omron.com
    One East Commerce Drive
    Schaumburg, IL 60173
    (800)556-6766 (Voice)
    (708)843-7787 (Fax)

    Security Photo Corporation
    1051 Commonwealth Avenue
    Boston, MA 02215
    (800)533-1162 (Voice)
    (617)783-3200 (Voice)
    (617)783-1966 (Voice)

    Timeline Inc,
    http://www.timeline-inc.com/
    23605 Telo Avenue
    Torrence, CA 90505
    (800)872-8878 (Voice)
    (800)223-9977 (Voice)

    Alltronics
    http://www.alltronics.com
    2300 Zanker Road
    San Jose, CA 95131
    (408) 943-9774 Voice
    (408) 943-9776 Fax
    (408) 943-0622 BBS
    Part Number: 92U067

    Atalla Security Products (HP)
    http://atalla.nonstop.compaq.com
    2304 Zanker Road
    San Jose, CA 95131
    (800)523-9981 (Voice)
    (408)435-8850 (Voice)
    (408)435-1116 (Fax)



    H-15. What are the rainbow books and how can I get them?

    Orange Book
    DoD 5200.28-STD
    Department of Defense Trusted Computer System Evaluation Criteria.

    Green Book
    CSC-STD-002-85
    Department of Defense Password Management Guideline.

    Yellow Book
    CSC-STD-003-85
    Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.

    Yellow Book
    CSC-STD-004-85
    Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.

    Tan Book
    NCSC-TG-001
    A Guide to Understanding Audit in Trusted Systems.

    Bright Blue Book
    NCSC-TG-002
    Trusted Product Evaluation - A Guide for Vendors.

    Neon Orange Book
    NCSC-TG-003
    A Guide to Understanding Discretionary Access Control in Trusted Systems.

    Teal Green Book
    NCSC-TG-004
    Glossary of Computer Security Terms.

    Red Book
    NCSC-TG-005
    Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria.

    Orange Book
    NCSC-TG-006
    A Guide to Understanding Configuration Management in Trusted Systems.

    Burgundy Book
    NCSC-TG-007
    A Guide to Understanding Design Documentation in Trusted Systems.

    Dark Lavender Book
    NCSC-TG-008
    A Guide to Understanding Trusted Distribution in Trusted Systems.

    Venice Blue Book
    NCSC-TG-009
    Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria.

    Aqua Book
    NCSC-TG-010
    A Guide to Understanding Security Modeling in Trusted Systems.

    Dark Red Book
    NCSC-TG-011
    Trusted Network Interpretation Environments Guideline -- Guidance for Applying the Trusted Network Interpretation.

    Pink Book
    NCSC-TG-013
    Rating Maintenance Phase -- Program Document.

    Purple Book
    NCSC-TG-014
    Guidelines for Formal Verification Systems.

    Brown Book
    NCSC-TG-015
    A Guide to Understanding Trusted Facility Management.

    Yellow-Green Book
    NCSC-TG-016
    Guidelines for Writing Trusted Facility Manuals.

    Light Blue
    NCSC-TG-017
    A Guide to Understanding Identification and Authentication in Trusted Systems.

    Light Blue Book
    NCSC-TG-018
    A Guide to Understanding Object Reuse in Trusted Systems.

    Blue Book
    NCSC-TG-019
    Trusted Product Evaluation Questionnaire.

    Gray Book
    NCSC-TG-020-A
    Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System.

    Lavender Book
    NCSC-TG-021
    Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria.

    Yellow Book
    NCSC-TG-022
    A Guide to Understanding Trusted Recovery in Trusted Systems.

    Bright Orange Book
    NCSC-TG-023
    A Guide to Understandng Security Testing and Test Documentation in Trusted Systems.

    Purple Book
    NCSC-TG-024 (Volume 1/4)
    A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements.

    Purple Book
    NCSC-TG-024 (Volume 2/4)
    A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators.

    Purple Book
    NCSC-TG-024 (Volume 3/4)
    A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial.

    Purple Book
    NCSC-TG-024 (Volume 4/4)
    A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors.

    Green Book
    NCSC-TG-025
    A Guide to Understanding Data Remanence in Automated Information Systems.

    Hot Peach Book
    NCSC-TG-026
    A Guide to Writing the Security Features User's Guide for Trusted Systems.

    Turquiose Book
    NCSC-TG-027
    A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems.

    Violet Book
    NCSC-TG-028
    Assessing Controlled Access Protection.

    Blue Book
    NCSC-TG-029
    Introduction to Certification and Accreditation.

    Light Pink Book
    NCSC-TG-030
    A Guide to Understanding Covert Channel Analysis of Trusted Systems.

    C1 Technical Report-001
    Computer Viruses: Prevention, Detection, and Treatment.

    C Technical Report 79-91
    Integrity in Automated Information Systems.

    C Technical Report 39-92
    The Design and Evaluation of INFOSEC systems: The Computer Security Contributions to the Composition Discussion.

    C Technical Report 111-91
    Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC, October 1991.

    NCSC Technical Report 002
    Use of the TCSEC for Complex, Evolving, Multipolicy Systems.

    NCSC Technical Report 003
    Turning Multiple Evaluated Products Into Trusted Systems.

    NCSC Technical Report 004
    A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems.

    NCSC Technical Report 005 Volume 1/5
    Inference and Aggregation Issues In Secure Database Management Systems.

    NCSC Technical Report 005 Volume 2/5
    Entity and Referential Integrity Issues In Multilevel Secure Database Management.

    NCSC Technical Report 005 Volume 3/5
    Polyinstantiation Issues In Multilevel Secure Database Management Systems.

    NCSC Technical Report 005 Volume 4/5
    Auditing Issues In Secure Database Management Systems.

    NCSC Technical Report 005 Volume 5/5
    Discretionary Access Control Issues In High Assurance Secure Database Management Systems.

    NTISSAM COMPUSEC/1-87
    Advisory Memorandum on Office Automation Security Guideline.

    You can get your own free copy of any or all of the books in by writing or calling:

    INFOSEC Awareness
    ATTN: V/NISC
    National Security Agency
    9800 Savage Road
    Fort Meade, MD 20755-6755

    NSA/ISSO Service Center (NISC)
    1-800-688-6115 ext 0
    (410)854-7661

    You may request the books in print or you may request a CD-ROM that contains most of the books.

    You can also get most of the Rainbow books in electronic form at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html

    If you ask to be put on the mailing list, you'll get a copy of each new book as it comes out.




    #hack FAQ Home | Computers | Data Networks | Wireless Networks | Telephony | Mobile Telephony
    Radio | Television | Resources | 2600 | Smart Cards and Magnetic Cards | Miscellaneous