#hack FAQ Home | Computers | Data Networks | Wireless Networks | Telephony | Mobile Telephony |
Radio | Television | Resources | 2600 | Smart Cards and Magnetic Cards | Miscellaneous |
The maintenance of this section simply grew out of control. There is information of interest to hackers all over the World Wide Web.
To find what you are looking for, consult one of these fine search engines:
www.google.com www.privado.com Privado (they don't store searches and seems like a real meta-search engine!) www.hotbot.com HotBot: The Wired Search Center www.altavista.com AltaVista Search Network www.yahoo.com Yahoo! www.hotbot.lycos.com Lycos www.webcrawler.com WebCrawler www.infoseek.go.com InfoSeek www.excite.com eXcite http://groups.google.com/ Google Groups
ftp.2600.com 2600 Magazine aeneas.mit.edu Kerberos athena-dist.mit.edu /pub/ATHENA Athena Project ftp.cert.org CERT ciac.llnl.gov CIAC coast.cs.purdue.edu /pub Security/COAST coast.cs.purdue.edu /pub/security Security ftp.acns.nwu.edu /pub Mac Anti-virus ftp.acsu.buffalo.edu /pub/security & /pub/irc Security & IRC ftp.armory.com /pub/user/kmartind H/P ftp.armory.com /pub/user/swallow H/P ftp.auscert.org.au /pub Australian CERT ftp.cert.dfn.de FIRST ftp.cs.ruu.nl /pub/SECURITY Security & PGP ftp.cs.uwm.edu
/pub/comp-privacy Privacy Digest ftp.csi.forth.gr /pub/security ftp.csl.sri.com /pub/nides SRI ftp.csua.berkeley.edu
/pub/cypherpunks Crypto ftp.demon.co.uk /pub/misc/0800num.txt 0800/0500 numbers ftp.denet.dk /pub/security/tools/satan ftp.digex.net /pub/access/dunk ftp.dsi.unimi.it /pub/security/crypt Crypto ftp.dstc.edu.au
/pub/security/satan ftp.ee.ualberta.ca /pub/cookbook/telecom Telecom electronics ftp.etext.org Etext ftp.funet.fi /pub/doc/CuD ftp.gate.net /pub/users/wakko ftp.giga.or.at /pub/hacker/ H/P ftp.greatcircle.com /pub/firewalls Firewalls ftp.IEunet.ie
/pub/security Security ftp.info.fundp.ac.be ftp.informatik.uni-hamburg.de ftp.informatik.uni-kiel.de /pub/sources/security ftp.lava.net /users/oracle/ H/P ftp.lerc.nasa.gov /security ftp.llnl.gov /pub CIAC ftp.luth.se
/pub/unix/security ftp.mcs.anl.gov /pub/security ftp.near.net
/security/archives/phrack Zines ftp.net.ohio-state.edu /pub/security/satan ftp.netsys.com /pub/zz/zzyzx H/P ftp.ocs.mq.edu.au /PC/Crypt Cryptology ftp.ox.ac.uk /pub/comp/security ftp.ox.ac.uk /pub/crypto Cryptology ftp.ox.ac.uk /pub/wordlists Wordlists ftp.paranoia.com /pub/toneloc/tl110.zip ToneLoc ftp.pipex.net
/pub/areacode uk areacodes ftp.primenet.com /users/i/insphrk ftp.primenet.com /users/k/kludge H/P ftp.primenet.com /users/s/scuzzy Copy Protection ftp.psy.uq.oz.au /pub/DES ftp.rahul.net /pub/conquest/DeadelviS/script/vms/ ftp.rahul.net
/pub/lps Home of the FAQ ftp.smartlink.net /pub/users/mikes/haq ftp.std.com /archives/alt.locksmithing Locksmithing ftp.std.com /obi/Mischief/ MIT Guide to Locks ftp.std.com /obi/Phracks Zines ftp.sunet.se /pub/network/monitoring Ethernet sniffers ftp.sura.net
/pub/security SURAnet ftp.tisl.ukans.edu /pub/security ftp.uni-koeln.de
Wordlists ftp.uu.net /doc/literary/obi/Phracks Zines ftp.warwick.ac.uk /pub/cud Zines ftp.win.tue.nl /pub/security Security ftp.winternet.com /users/nitehwk H/P ftp.wustl.edu
/doc/EFF EFF garbo.uwasa.fi /pc/crypt Cryptology gemini.tuc.noao.edu /pub/grandi info.mcs.anl.gov Argonne National Laboratory Mathematics & Computer Science Division net-dist.mit.edu /pub/pgp MIT's network distribution server net.tamu.edu /pub/security/TAMU Security ripem.msu.edu /pub/crypt Ripem rtfm.mit.edu Read The Fine Manual src.doc.ic.ac.uk /usenet/uk.telecom uk.telecom archives sunsolve1.sun.com   SunSolve vic.cc.purdue.edu /pub/unix/tools/lsof lsof
news:alt.2600 Do it 'til it hertz news:alt.2600d   news:alt.2600hz   alt.magazine.2600 Spam free discussion of 2600 Magazine. (Moderated) alt.binaries.comp.virus NG to post virus and antivirus utilities. alt.binaries.cracks Like alt.binaries.warez.*, only different. alt.binaries.cracks.d Discussion of issues in alt.binaries.cracks alt.binaries.satellite-tv Programs and data related to encrypted TV. alt.cellular Cellular telephone techhnology alt.cellular-phone-tech Brilliant telephony mind blow netnews naming alt.comp.virus An unmoderated forum for discussing viruses alt.comp.virus.binaries Executables of NEW Viruses alt.comp.virus.source.code The source code to various virii. alt.cracks Heavy toolbelt wearers of the world, unite alt.cyberpunk High-tech low-life. alt.cyberspace Cyberspace and how it should work. alt.dcom.telecom Discussion of telecommunications technology alt.engr.explosives
BOOM alt.hackers
Descriptions of projects currently under development alt.hackintosh Clever programming on Apple's Macintosh alt.locksmithing You locked your keys in where? alt.hackers.malicious The really bad guys - don't take candy from them alt.ph.uk United Kingdom version of alt.2600 alt.privacy.anon-server Issues surrounding programs that aid anonymity alt.radio.pirate Hide the gear, here comes the magic station-wagons. alt.radio.scanner Discussion of scanning radio receivers. alt.satellite.tv.crypt Satellite signal de-cryption techniques. alt.security Security issues on computer systems alt.security.alarms Discussion of Home/Business/Vehicle security alarms. alt.security.index Pointers to good stuff in alt.security (Moderated) alt.security.keydist Exchange of keys for public key encryption systems alt.security.pgp The Pretty Good Privacy package comp.dcom.telecom.tech Discussion of technical aspects of telephony. comp.org.cpsr.announce Computer Professionals for Social Responsibility comp.org.cpsr.talk Issues of computing and social responsibility comp.org.eff.news News from the Electronic Frontiers Foundation comp.org.eff.talk Discussion of EFF goals, strategies, etc. comp.os.netware.security Netware Security issues comp.protocols.kerberos The Kerberos authentification server comp.protocols.tcp-ip TCP and IP network protocols comp.risks Risks to the public from computers & users comp.security.announce Announcements from the CERT about security comp.security.firewalls Anything pertaining to network firewall security comp.security.gss-api Generic Security Service Application Program Interface. comp.security.misc Security issues of computers and networks comp.security.ssh SSH secure remote login and tunneling tools. comp.security.unix Discussion of Unix security comp.virus Computer viruses & security (Moderated) news.org.ccc Mitteilungen des CCC e.V. rec.pyrotechnics Fireworks, rocketry, safety, & other topics rec.radio.scanner "Utility" broadcasting traffic above 30 MHz. rec.video.cable-tv Technical and regulatory issues of cable television sci.crypt Different methods of data en/decryption sci.crypt.random-numbers Generating cryptographic strength randomness. sci.crypt.research Cryptography, cryptanalysis, and related issues. (Moderated)
#2600
#cellular
#hack
#phreak
#linux
#root
#unix
#warez
Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4
This is an excellent book. It gives a broad overview of computer security without sacrificing detail. A must read for the beginning security expert.
Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0
Computer Related Risks
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X
Computer Security Management
Author: Karen Forcht
Publisher: boyd & fraser publishing company
Copyright Date: 1994
ISBN: 0-87835-881-1
The Stephen Cobb Complete Book of PC and LAN Security
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)
Security in Computing
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1
Building a Secure Computer System
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2
Modern Methods for Computer Security
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN: 0-135-95207-7
Protection and Security on the Information Superhighway
Author: Dr. Frederick B. Cohen
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-11389-1
Commonsense Computer Security
Author: Martin Smith
Publisher: McGraw-Hill
Copyright Date: 1993
ISBN: 0-07-707805-5
Combatting Computer Crime
Author: Jerry Papke
Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
Copyright Date: 1992
ISBN: 0-8306-7664-3
Computer Crime: A Crimefighters Handbook
Author: David Icove, Karl Seger and William VonStorch
Publisher: O'Reilly & Associates
Copyright Date: 1995
ISBN: 1-56592-086-4
Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2
Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0
Unix Security: A Practical Tutorial
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6
Unix System Security: A Guide for Users and Systems Administrators
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4
Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3
Unix Security for the Organization
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2
Unix System Security Essentials
Author: Christopher Braun
Publisher: Addison Wesley
Copyright Date: 1995
ISBN: 0-201-42775-3
Building Internet Firewalls
Author: D. Brent Chapman and Elizabeth D. Zwicky
Publisher: O'Reilly and Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-124-0
If you are going to purchase a book on firewalls, this is the one to buy.
Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4
Internet Firewalls and Network Security
Author: Karanjit S. Siyan and Chris Hare
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-437-6
Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7
Not a total waste of paper, but definitely not worth the $49.95 purchase price. The book is a rehash of previously published information. The only secret we learn from reading the book is that Sylvia Moon is a younger woman madly in love with the older David Stang.
Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7
Network Security
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4
Network Security: How to Plan For It and How to Achieve It
Author: Richard M. Baker
Publisher: McGraw-Hill, Inc.
Copyright Date:
ISBN: 0-07-005141-0
Network Security: Private Communications in a Public World
Author: Charlie Kaufman, Radia Perlman and Mike Speciner
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-13-061466-1
Network and Internetwork Security: Principles and Practice
Author: William Stallings
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-02-415483-0
Implementing Internet Security
Author: William Stallings
Publisher: New Rider Publishing
Copyright Date: 1995
ISBN: 1-56205-471-6
Actually Useful Internet Security Techniques
Author: Larry J. Hughes, Jr.
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-508-9
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2Bruce Schneier's book replaces all other texts on cryptography. If you are interested in cryptography, this is a must read. This may be the first and last book on cryptography you may ever need to buy.
Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5
Protect Your Privacy: A Guide for PGP Users
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4
Codebreakers
Author: Kahn
Publisher: Simon and Schuster
Copyright Date:
ISBN:0-02-560460-0
Codebreakers: The Inside Story of Bletchley Park
Author: Francis Harry Hinsley and Alan Stripp
Publisher: Oxford University Press
Copyright Date: 1993
ISBN:0-19-285304-X
Cryptanalysis, a study of ciphers and their solution
Author: Gaines, Helen Fouche
Publisher: Dover Publications
Copyright Date: 1956
ISBN:
Computer Privacy Handbook
Author: Andre' Bacard
Publisher: Peachpit Press
Copyright Date: 1995
ISBN: 1-56609-171-3
E-Mail Security with PGP and PEM
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-05318-X
PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-098-8
The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0
The Giant Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:
Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1
Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X
The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8
A Short Course on Computer Viruses
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2
Robert Slade's Guide to Computer Viruses
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0
Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephone Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5Although hopelessly out of date, this book remains the book on telephony. This book is 100% Bell, and is loved by phreaks the world over.
Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9
The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8I find this dictionary to be an excellent reference book on telephony, and I recommend it to anyone with serious intentions in the field.
Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:
The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-xListing of every cellular ID in the US, plus roaming ports, and info numbers for each carrier.
Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-XBruce Sterling has recently released the book FREE to the net. The book is much easier to read in print form, and the paperback is only $5.99. Either way you read it, you will be glad you did. Mr. Sterling is an excellent science fiction author and has brought his talent with words to bear on the hacking culture. A very enjoyable reading experience.
Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6
Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X
The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9
Masters of Deception
Author: Quittner, John
Publisher: HarperCollins Publishers, Incorporated, New York, NY
ISBN: 0-06-017030-1
The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4
Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5The Knightmare is no super hacker. There is little or no real information in this book. The Knightmare gives useful advice like telling you not to dress up before going trashing. The Knightmare's best hack is fooling Loompanics into publishing this garbage.
The Day The Phones Stopped
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6Total garbage. Paranoid delusions of a lunatic. Less factual data that an average issue of the Enquirer.
Information Warfare
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1
An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8
Unauthorized Access by Annaliza Savage
Hacker's '95 A Phon-E & R.F. Burns Production
$25 on VHS format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060
See the video Emmanuel Goldstein thought would have the Feds knocking at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y fiasco at Summercon. PMF (narc) interviews Emmanuel Goldstein & Eric BloodAxe. Trip to Area 51 and interview with Psychospy. Coverage of the Secret Service briefing on Operation Cyber Snare (recent cell busts) Talks on Crypto, HERF, the Feds, etc.
All information is presented for educational purposes only.
Not for sale to government or law enforcement organizations.
Running time aproximately 90 minutes.
$34.95 ($29.95 if ordered via the web page)
Custom Video Productions
(908)842-6378
videocvp@ix.netcom.com
Academic Firewalls
Registration Address: Send a message to majordomo@greatcircle.com containing the line "subscribe firewalls user@host"The Alert
Registration Address: Send a message to request-alert@iss.net containing the line "subscribe alert"Bugtraq
Reflector Address: bugtraq@fc.net
Registration Address: bugtraq-request@fc.netCert Tools
Reflector Address: cert-tools@cert.org
Registration Address: cert-tools-request@cert.orgComputers and Society
Reflector Address: Comp-Soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.comCoordinated Feasibility Effort to Unravel State Data
Reflector Address: ldc-sw@cpsr.org
Registration Address:CPSR Announcement List
Reflector Address: cpsr-announce@cpsr.org
Registration Address:CPSR - Intellectual Property
Reflector Address: cpsr-int-prop@cpsr.org
Registration Address:CPSR - Internet Library
Reflector Address:cpsr-library@cpsr.org
Registration Address:Cypherpunks
Registration Address: Send a message to majordomo@toad.com containing the line "subscribe cypherpunks"
DefCon Announcement List
Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-announce"DefCon Chat List
Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-stuff"Discount Long Distance Digest
Registration Address: Send a message to: dld-request@webcom.com containing the line "subscribe"Electronic Payment
Registration Address: e-payment@cc.bellcore.comIDS (Intruder Detection Systems)
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au containing the line "subscribe ids"Information Warfare
Registration Address: E-mail iw@all.net with a request to be added.Linux-Alert
Registration Address: majordomo@linux.nrao.eduLinux-Security
Registration Address: majordomo@linux.nrao.eduMacintosh Security
Reflector Address: mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.comNetWare Security
Registration Address: Send a message to majordomo@dey-systems.com containing the line "subscribe netware-hack"NeXT Managers
Registration Address: next-managers-request@stolaf.eduPGP3 announcement list
Registration Address: Send a message to pgp-announce-request@lsd.com with the subject of "Your Name user@host">Phiber-Scream
Registration Address: Send a message to listserv@netcom.com containing the line "subscribe phiber-scream user@host"phruwt-l (Macintosh H/P)
Registration Address: Send a message to filbert@netcom.com with the subject "phruwt-l"rfc931-users
Reflector Address: rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.eduRSA Users
Reflector Address: rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.comWWW Security
Registration Address: www-security@ns2.rutgers.edu
E-mail addresses:
info@2600.com To get info on 2600 index@2600.com To get a copy of our index meetings@2600.com For info on starting your own meeting subs@2600.com For subscription problems letters@2600.com To send us a letter articles@2600.com To send us an article 2600@2600.com To send us a general message
Subscription Address:
2600 Subscription Dept
PO Box 752
Middle Island, NY
11953-0752
Letters and article submission address:
2600 Editorial DepartmentPhone Number: (516)751-2600
PO Box 99
Middle Island, NY
11953-0099
Gray Areas examines gray areas of law and morality and subject matter which is illegal, immoral and/or controversial. Gray Areas explores why hackers hack and puts hacking into a sociological framework of deviant behavior.
U.S. Mail Address:E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com
Gray Areas
PO Box 808
Broomall, PA 19008
Subscriptions:
$26.00 4 issues first class
$34.00 4 issues foreign (shipped air mail)
Privacy Newsletter is a monthly newsletter devoted to showing consumers how to get privacy and keep it.
E-Mail Address: privacy@interramp.com
Subscription Address:
Privacy Newsletter
P.O. Box 8206
Philadelphia, PA 19101-8206
Subscriptions: $99/yr (US) $149/yr (Overseas)
Subscription Address: subscriptions@wired.com or
Wired
PO Box 191826
San Francisco, CA 94119-9866
Letters and article submission address: guidelines@wired.com or
Wired
544 Second Street
San Francisco, CA 94107-1427
Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664
P.O. Box 64
Brewster, NY 10509
5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA
E-Mail: privateline@delphi.com
Subscriptions: $24 a year for six issues
Text of back issues are at the etext archive at Michigan. Gopher or ftp to: etext.archive.umich.edu/pub/Zines/PrivateLine
CoTNo: Communications of The New Order | ftp.etext.org | /pub/Zines/CoTNo |
Empire Times | ftp.etext.org | /pub/Zines/Emptimes |
Phrack | http://www.phrack.org/ |   |
CPSR empowers computer professionals and computer users to advocate for the responsible use of information technology and empowers all who use computer technology to participate in the public debate. As technical experts, CPSR members provide the public and policy makers with realistic assessments of the power, promise, and limitations of computer technology. As an organization of concerned citizens, CPSR directs public attention to critical choices concerning the applications of computing and how those choices affect society.
By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy.
Every project we undertake is based on five principles:
CPSR Membership Categories:
75 REGULAR MEMBER
50 Basic member
200 Supporting member
500 Sponsoring member
1000 Lifetime member
20 Student/low income member
50 Foreign subscriber
50 Library/institutional subscriber
CPSR National Office
P.O. Box 717
Palo Alto, CA 94301
415-322-3778
415-322-3798 (FAX)
E-mail: cpsr@csli.stanford.edu
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit of policies and activities that will advance freedom and openness in computer-based communications. It is a member-supported, nonprofit group that grew from the conviction that a new public interest organization was needed in the information age; that this organization would enhance and protect the democratic potential of new computer communications technology. From the beginning, the EFF determined to become an organization that would combine technical, legal, and public policy expertise, and would apply these skills to the myriad issues and concerns that arise whenever a new communications medium is born.
Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations.
The Electronic Frontier Foundation, Inc.
1001 G Street, NW
Suite 950 East
Washington, D.C. 20001
(202)544 9237
(202)547 5481 FAX
Internet: eff@eff.org
The Free Software Foundation is dedicated to eliminating restrictions on people's right to use, copy, modify, and redistribute computer programs. We promote the development and use of free software in all areas using computers. Specifically, we are putting together a complete, integrated software system named "GNU" ("GNU's Not Unix", pronounced "guh-new") that will be upwardly compatible with Unix. Most parts of this system are already being used and distributed.
The word "free" in our name refers to freedom, not price. You may or may not pay money to get GNU software, but regardless you have two specific freedoms once you get it: first, the freedom to copy a program and give it away to your friends and co-workers; and second, the freedom to change a program as you wish, by having full access to source code. You can study the source and learn how such programs are written. You may then be able to port it, improve it, and share your changes with others. If you redistribute GNU software you may charge a distribution fee or give it away, so long as you include the source code and the GPL (GNU General Public License).
Free Software Foundation, Inc. | Telephone: +1-617-876-3296 |
673 Massachusetts Avenue | Fax: +1-617-492-9057 |
Cambridge, MA 02139-3309 USA | Fax (in Japan): 0031-13-2473 (KDD) |
Electronic mail: gnu@prep.ai.mit.edu | 0066-3382-0158 (IDC) |
GNU is to be a complete integrated computational environment: everything you need to work with a computer, either as a programmer or as a person in an office or home. The core is an operating system, which consists of a central program called a kernel that runs the other programs on the computer, and a large number of ancillary programs for handling files, etc. The Free Software Foundation is developing an advanced kernel called the Hurd.
A complete system has tools for programmers, such as compilers and debuggers. It also has editors, sketchpads, calendars, calculators, spreadsheets, databases, electronic mail readers, and Internet navigators. The FSF already distributes most of the programs used in an operating system, all the tools regularly used by programmers, and much more.
The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston.
"Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation.
We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices.
Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome.
To contact the League, phone (617) 243-4091, send Internet mail to the address league@prep.ai.mit.edu, or write to:
League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA
Founded in 1989, SotMesc is dedicated to preserving the integrity and cohesion of the computing society. By promoting computer education, liberties and efficiency, we believe we can secure freedoms for all computer users while retaining privacy.
SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter.
The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media.
SotMesc memberships are $20 to students and $40 to regular members.
SotMESC
P.O. Box 573
Long Beach, MS 39560
CERT is the Computer Emergency Response Team that was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems.
CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (192.88.209.5), where security-related documents, past CERT advisories, and tools are archived.
CERT contact information:
U.S. mail address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
U.S.A.
Internet E-mail address
cert@cert.org
Telephone number
(412)268-7090 (24-hour hotline)
CERT Coordination Center personnel answer
7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
emergencies during other hours.
FAX number
(412)268-6989
Off The Hook | New York | 99.5 FM | Tue | 8pm EST |
Off The Hook | Short Wave | 7415 kHz | Wed | 6pm EST |
Full Disclosure Live | Short Wave | WWCR 5065 kHz | Sun | 8pm EST |
Full Disclosure Live | Oil City, PA | WOYL AM-1340 | Sun | 8pm EST |
Full Disclosure Live | Satellite | Telstar 302 (T2), Ch 21, 5.8 | Sun | 8pm EST |
The Unofficial Netware Hack FAQ
Author: Simple Nomad <thegnome@nmrc.org>
http://nmrc.org/faqs/netware/index.html
The Unofficial NT Hack FAQ
Author: Simple Nomad <thegnome@nmrc.org>
http://nmrc.org/faqs/nt/index.html
The Unofficial Web Hack FAQ
Author: Simple Nomad <thegnome@nmrc.org>
http://nmrc.org/faqs/www/index.html
The PGP Attack FAQ
Author: Route
The UK Phone Phreaking F.A.Q.
Author: Pyro Teknik <pyro-teknik@geocities.com> <pteknik@spasm.redcat.org.uk>
http://www.crossbar.demon.co.uk/ukphreak.txt
alt.ph.uk FAQ
Author: Virtua7 m00jrwd@ecs.ox.ac.uk
http://alt.ph.uk.com/
Mac Hack FAQ: Defeating Security
Author: AX1P (an149689@anon.penet.fi)
Frequently Asked Questions About Red Boxing
Author: Mr. Sandman (an132432@anon.penet.fi)
VMS FAQ (Frequently Ask Questions)
Author: The Beaver (beaver@upperdck.blkbox.com)
Anonymous FTP FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp://ftp.iss.net /pub/faq/anonftp
Compromise FAQ: What if your Machines are Compromised by an Intruder
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp://ftp.iss.net /pub/faq/compromise
Security Patches FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp//:ftp.iss.net /pub/faq/patch
Sniffer FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp://ftp.iss.net /pub/faq/sniff
Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp://ftp.iss.net /pub/faq/vendor
Cryptography FAQ
Author: The Crypt Cabal
ftp://rtfm.mit.edu /pub/usenet-by-group/sci.crypt/
Firewalls FAQ
Author: Marcus J. Ranum (mjr@ss1.lightspeed.net)
ftp://rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/
Buying a Used Scanner Radio
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/
How to Find Scanner Frequencies
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/
Introduction to Scanning
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp://rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/
Low Power Broadcasting FAQ
Author: Rick Harrison.
ftp://rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/
RSA Cryptography Today FAQ
Author: Paul Fahn
ftp://rtfm.mit.edu /pub/usenet-by-group/sci.crypt/
VIRUS-L comp.virus Frequently Asked Questions (FAQ)
Author: Kenneth R. van Wyk <krvw@cert.org>
ftp://rtfm.mit.edu /pub/usenet-by-group/comp.virus/
Where to get the latest PGP (Pretty Good Privacy) FAQ
Author: mpj@csn.net (Michael Johnson)
ftp://rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/
alt.locksmithing answers to Frequently Asked Questions (FAQ)
Author: spike@indra.com (Joe Ilacqua)
ftp://rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/
comp.os.netware.security FAQ
Author: Fauzan Mirza <F.U.Mirza@sheffield.ac.uk>
ftp://rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/
rec.pyrotechnics FAQ
Author: zoz@cs.adelaide.edu.au (Hans Josef Wagemueller)
ftp://rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/
Every year a hacker convention disappears and two new ones crop up in it's place.
CuervoCon every Winter in Texas
http://www.cuervocon.org
DefCon every Summer in Las Vegas
http://www.defcon.org
For more information, keep your eyes on the web.
Mag-Tek
http://www.magtek.com
20725 S. Annalee Avenue
Carson, CA 90746
(310)631-8602 (Voice)
(310)631-3956 (Fax)
Track Write Interface Model Price 2 No Keyboard/RS-232 1,2 No Keyboard/RS-232 2,3 No Keyboard/RS-232 1,2,3 No RS-232 1,2,3 Yes Standalone/RS-232
American Microsystems
http://www.amis.com
2190 Regal Parkway
Euless, TX 76040
(800)648-4452 (Voice)
(817)685-6232 (Fax)
Track Write Interface Model Price 2 No $250
CPU Advance
PO Box 2434
Harwood Station
Littleton, MA 01460
(508)624-4819 (Fax)
Track Write Interface Model Price 1,2 Yes C1523 $389 2,3 Yes C1534 $389
Herback and Rademan
http://www.herbach.com
18 Canal Street
P.O. Box 122
Bristol, PA 19007-0122
(215)788-5583 (Voice)
(215)788-9577 (Fax)
Track Write Interface Model Price 2 No TM92CMP1966 $15
Neuron Electronics
http://www.neuron-usa.com
3848 Del Amo Boulevard
Suite #301
Torrance, CA 90503
(310)793-1300 (Voice)
(310)793-1304 (Fax)
Track Write Interface Model Price 2 Yes MCR 231-2A
Omron Electronics, Inc.
http://www.omron.com
One East Commerce Drive
Schaumburg, IL 60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)
Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)
Timeline Inc,
http://www.timeline-inc.com/
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)
Alltronics
http://www.alltronics.com
2300 Zanker Road
San Jose, CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067
Atalla Security Products (HP)
http://atalla.nonstop.compaq.com
2304 Zanker Road
San Jose, CA 95131
(800)523-9981 (Voice)
(408)435-8850 (Voice)
(408)435-1116 (Fax)
Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria.
Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline.
Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments.
Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements. Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.
Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems.
Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation - A Guide for Vendors.
Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems.
Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms.
Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria.
Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems.
Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems.
Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems.
Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria.
Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems.
Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation.
Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document.
Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems.
Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management.
Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals.
Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems.
Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems.
Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire.
Gray Book
NCSC-TG-020-A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System.
Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria.
Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems.
Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems.
Purple Book
NCSC-TG-024 (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements.
Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators.
Purple Book
NCSC-TG-024 (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial.
Purple Book
NCSC-TG-024 (Volume 4/4)
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
Proposal Document - An Aid to Procurement Initiators and Contractors.
Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems.
Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems.
Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems.
Violet Book
NCSC-TG-028
Assessing Controlled Access Protection.
Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation.
Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems.
C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment.
C Technical Report 79-91
Integrity in Automated Information Systems.
C Technical Report 39-92
The Design and Evaluation of INFOSEC systems: The Computer Security
Contributions to the Composition Discussion.
C Technical Report 111-91
Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC,
October 1991.
NCSC Technical Report 002
Use of the TCSEC for Complex, Evolving, Multipolicy Systems.
NCSC Technical Report 003
Turning Multiple Evaluated Products Into Trusted Systems.
NCSC Technical Report 004
A Guide to Procurement of Single Connected Systems - Language for RFP
Specifications and Statements of Work - An Aid to Procurement Initiators
- Includes Complex, Evolving, and Multipolicy Systems.
NCSC Technical Report 005 Volume 1/5
Inference and Aggregation Issues In Secure Database Management Systems.
NCSC Technical Report 005 Volume 2/5
Entity and Referential Integrity Issues In Multilevel Secure Database
Management.
NCSC Technical Report 005 Volume 3/5
Polyinstantiation Issues In Multilevel Secure Database Management
Systems.
NCSC Technical Report 005 Volume 4/5
Auditing Issues In Secure Database Management Systems.
NCSC Technical Report 005 Volume 5/5
Discretionary Access Control Issues In High Assurance Secure Database
Management Systems.
NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline.
You can get your own free copy of any or all of the books in by writing or calling:
INFOSEC Awareness
ATTN: V/NISC
National Security Agency
9800 Savage Road
Fort Meade, MD 20755-6755NSA/ISSO Service Center (NISC)
1-800-688-6115 ext 0
(410)854-7661
You may request the books in print or you may request a CD-ROM that contains most of the books.
You can also get most of the Rainbow books in electronic form at http://www.radium.ncsc.mil/tpep/library/rainbow/index.html
If you ask to be put on the mailing list, you'll get a copy of each new book as it comes out.
#hack FAQ Home | Computers | Data Networks | Wireless Networks | Telephony | Mobile Telephony |
Radio | Television | Resources | 2600 | Smart Cards and Magnetic Cards | Miscellaneous |
© 1994 - 2003 HackFAQ.org
All Rights Reserved |