T E X T F I L E S

Hacking Textfiles

Around the 1970's, the term "hacking" meant any deep interest in computers

that manifested itself in programming or learning arcane aspects of the

machinery or operating systems. By the early 1980's, this meaning morphed

into a general term of fear to describe anyone who did anything even remotely

evil using computer equipment. The people who considered themselves

non-malicious "Hackers" decried this bastardization of the term they took

with pride, and the new name "cracker" arrived, years after that name

applied to people who removed copy protection from home video games.

By the late 80's to early 90's, no one cared too much, except for the

people who care about everything too much.

In other words, these textfiles are all about hacking.

In accordance with this spirit, anything involving subverting any technology,

for good or evil, is placed here. Unless, of course, you're talking about

telephones, at which point you should go over to

the <A href="/phreak">phreaking</A> section.

If you're looking for electronic hacking magazines, go check out the

<A HREF="/magazines">magazines</A>. Additionally, you might also check the

<A HREF="/groups">groups</A> section if your file was written by someone who

was part of a group.

BIBLIOGRAPHIES

Lists of Articles and Books about Hackers and Hacking

CABLE

Textfiles about Cable TV and Cable TV Piracy

COLORBOOKS

Purported Department of Defense Computer Security Guidelines

CONVENTIONS

Information about different Hacking Conventions

INTERNET

Files Dealing With Hacking on the Internet

MICROSOFT

Files Dealing with Hacking Windows and DOS

POLICIES

Various Ethics and Policies of Computing Facilities Nationwide

UNIX

Textfiles About Exploring or Exploiting UNIX

VMS

Textfiles About Exploring or Exploiting VMS and VAXes

22.txt

DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)

23things.txt

23things.txt

2600-9-3.txt

2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)

2600_ind

2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price

2600faq.011

Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)

386i.txt

CIAC Advisory Notice: Authentication bypass in Sun 386i machines

5600.txt

Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)

aahack.txt

Anarchy Anonymous: Hacking your School Network

accesblt.hac

Advanced Authentication Technology, 1991

accessin.txt

A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)

acro01.txt

Max Headroom's Hacker Acronym List

acro02.txt

Max Headroom's Second Collection of Acronyms

acrolist.phk

Acronym List, Early 1990s

acroynym.txt

The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)

adssys.txt

A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom

aio.box

All in One Box, by Disk Doctor

aio5b.txt

AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)

ais.txt

AIS: The Automatic Intercept System by Computer Consoles Incorporated

aix.fun

Warning to download some AIX Patches

allnet01.txt

Hacking Allnet by Shadow Warrior (January 1988)

amhack.txt

Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS

ansibomb.txt

ANSI Bombs II: Tips and Techniques, by The Raging Golem

aohell.phk

Why I wrote AOLHell

aoim.txt

The Risks of Using an AOL Client Behind a Firewall

aolhak.txt

How to Hack America on Line by the Hooded Bobs

as400cmd.hac

IBM AS/400 Command Summary

as400cmd.txt

All IBM AS/400 Commands by The Might

aspen.txt

A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

aspen1.txt

A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

aspen2.txt

A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)

assolink.txt

An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)

at&arebl.txt

Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends

atlas.txt

Hackers' Atlas, by Ragon/Wynvern/BOF

atm-92.txt

ATMS: The Real File for ATM Theft in 1992 by The Raven

atm-more.txt

A Whole Collection of the Risks of ATM Cards (1988)

atm.txt

Hacking ATM's by Blue Thunder

atm1.txt

The Disk Jockey Presents Scamming ATMs

atma.hac

Quick OVerview of ATM Security (Needs Editing)

atmapps.txt

"Gee Whiz" ATM Applications are On the Horizon

atmfile

ATM secret codes, from Fred Gindburg (July 10, 1987)

atmhacking.txt

Hacking ATMs, by Anonymous

atms

An Overview of ATMs and Information on the Encoding System

atms.txt

Track Layouts on ATM Cards

auditool.txt

Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)

austhack.hac

Australian Dialups

austpac0.txt

Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990

austpac1.txt

Additional AUSTPAC Character Terminal Manual

austpac2.txt

AUSTPAC General Information and Codes

austpac3.txt

The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)

autohack.txt

Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)

autonet1.txt

Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5

autotelldoc.ana

Fun with Automatic Tellers

autovon1.hac

Introduction to the Automated Voice Network (Autovon) by Shadowrunner

autovon2.hac

Introduction to the Automated Voice Network (Autovon) Part II

autovon3.hac

Introduction to the Automated Voice Network (Autovon) Part III

autovoni.nst

Overview of the Automatic Voice Network (Autovon)

avoidcap.txt

Planning Ahead for Phone Phreaks/Hackers

babyna.mes

The Moby Words Database (List of Words) (1989)

backdoor.txt

How to Hold Onto UNIX Root Once You Have It

bankhack.txt

The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers

basic.net

Basic Networking, by Sk8 the Skinhead

basic1.hac

The Basics of Hacking I: DECs By the Knights of Shadow

basic3.hac

The Basics of Hacking III: Data General By the Knights of Shadow

basicnet.hac

Basic Networking (1989) by Sk8 The SkinHead

basics

Rambug's Hacking Volume #1 by Rambug

bbsfiles.txt

The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"

bd-tv5.txt

Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993

bindery.txt

Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)

boahack.txt

Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM

boces.txt

The Slipped Disk takes over the BOCES Computer: A Log

bom-hh&p.txt

The History of Hacking and Phreaking by Raven of BOMB Squad

books.txt

Biblography of Computer Security Books (1973 through 1988)

brute.txt

BRUTE: A brute force approach to hacking Unix passwords. Version 1.1

btinfo.h-k

BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)

c64fun1.txt

Suggestions On What to Do with a Commodore 64, by Nightstalker

callcard.phk

Hacking Calling Cards, by The Pyromaniac

candyland.faq

The Candyman Explains How He Will Accept Explosives Files

carcodes.txt

Codes Used by Computers in Cars

cb1.txt

Citibank Hacking, by Johnny Hundu

cb2.txt

Small Rant about Hacking Citibank

cbiinfo

Using and Abusing CBI by The Ghost

cbrsp-1.hac

The Cyberspace Chronicle Volume 1 by Phardak

cbvhack.pnk

CBV Hacking by PiNK ToRPeDo (June 7, 1994)

cbvhack.txt

CBV Hackin' by Pink Torpedo (June 7, 1994)

chahelp_.txt

Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke

chaos01.txt

The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990

chaos02.txt

The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990

chaos03.txt

The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel

chilton1.txt

Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)

china02doc.hac

China Newsletter #02 (Hacking/Phreaking File Compilation)

church4.ptl

Church Chat Volume 4 by The Spiker

cis.phk

Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord

cisagain.txt

Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord

cisinfo4.txt

Compuserve Information by Morgoth and Lotus

ciss3.txt

List of Access Numbers to the Compuserve Information Service

citibank.txt

Hacking into Citibank with Johnny Hindu

citibank2.txt

Citibank Service Addresses by Dark Helmet of P/H/A (March 21, 1990)

cjack.faq

Cracker Jack FAQ Written by kM (1993)

codphone

Coda-Phones by D.T. Legna

com_sec90.hac

United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact

com_sec91.hac

United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems

compserv.txt

Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.

compus.txt

Free Compuserve Passwords, by Devious Xevious

compuser.txt

A Quick Compuserve Index

compusin.txt

Some Compuserve Tips, by Eric Diamond

compusrv

Compuserve Hacking by The Locksmith

concis.txt

Free Compuserve Access

contact.txt

How to Contact the HACK SQUAD

copier.hac

Magnetic Stripes, by Count Zero

cops-rl

RL C.O.P.S. File by Brian Oblivion

cosmos.hac

C O S M O S, by Doctor Who

cosmos1.txt

Hacking into COSMOS by Wizard of OZ

cosmos2.hac

Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom

cosmos3.hac

The 1986 COSMOS Files Part III by Sir William

crackam1.txt

Hacking Programs on the Amiga by FunToHack

crackdwn.txt

Crackdown, from 2600 Magazine volume 7, number 1 SPRING

creditfr.txt

The Adventures in Fraud Series Volume I, by Sneak Thief (1985)

credunin.con

Numbers of Credit Unions and protection Agencies

cs.hac

How to Get a Free Account on Compuserve

cs.txt

How to Get a Free Compuserve Account

csl8_93.hac

CSL Bulletin 1993

cuthesis.txt

The Social Organization of the Computer Underground by Gordon R. Meyer

cyber.txt

The Cyberpunk Movement by Pazuzu of DnA May 12, 1993

cyberhac.txt

Hacking Control Data Corporation's Cyber, by The Ghost

data.tap

Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS

data_gen

Captain Crunch talks about hacking Data General Systems

database.txt

CIRR Database: A tool for Corporate Research

datakit.hac

How to connect across VCS/ISN boundaries

datanet.doc

The Basics of TELENET

datapac.hac

A Guide to DataPAC by The Fixer

datapac.inf

Technical Guide to DataPac by the New Dark Council (1990)

datapac.txt

A Guide to DataPAC by The Fixer (April 18, 1990)

datapac1.txt

A Guide to DataPAC version 1.1 by The Fixer

datapac2.txt

Datapac 3101 ITI Parameters Description

datapac3.txt

Datapac 3101 Public Outdial Ports

datatap.txt

Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop

datatapp.txt

Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon

ddn01.txt

DDN Security Bulletin #1

ddn03.hac

Defense Data Network Security Bulletin #3

ddn04.hac

Defense Data Network Security Bulletin #4

ddn05.hac

Defense Data Network Security Bulletin #5

ddn06.hac

Defense Data Network Security Bulletin #6

ddnet1.txt

DDN: Information on the Defense Data Network from Unauthorized Access UK

ddnet2.txt

DDN: The Defense Data Network (A Map)

debtcard.txt

Harvard Medical School Installs ISDN-Based Debit Card System

dec10.txt

Hacking the DEC-10 System

dec_200.txt

The Decserver 200 Revealed by Surf Studd (October 23, 1990)

defaults.txt

Hacking into a Variety of Systems by using their Default Accounts

defcon.info

defcon.info

defconadd.hac

defconadd.hac

defdb.hac

Department of Defense Federal Data Bases (List)

defense.hac

Defense Data Network Blues by Harry Hackalot

defense.txt

Defense Data Network Blues by Harry Hackalot (1984)

defnetbl.txt

Defense Data Network Blues by Harry Hackalot (August 31, 1983)

demystif.txt

Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin

denning.txt

Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)

des.txt

The Data Encruption Standard (DES) Fact Sheet

desblt.txt

The Data Encryption Standard (DES) June 1990

desval.hac

DES Validation List

desval.txt

DES Validation List

dialback.txt

Dial-Back Isn't Always Secure (February 28, 1985)

dialog.txt

Inside Dialog by Control C of Advanced Telecommunications Inc.

dialog01.txt

Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.

dialout1.txt

A Novice Manual on Using Outdial Modems by Blue Adept

dialplus.txt

A Screengrab of Informaiton on PSS DialPlus from British Telecom

dialup.hac

List of Dialups. For what? I have no idea.

disclaim

Da Disclaimer, by Filbert

diskopt

My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85

djns.txt

Inside DJNS (Dow Jones News Service)

dlog-rdt

Complete Guide To The DIALOG Information Network by Brian oblivion

dnicinf.hac

D A T E X - P - International Traffic Relations

dowjones.txt

Inside Dow Jones News Service

dpacbas.txt

The Basics of DataPAC by Mister X (February 2, 1991)

dpacintr.rot

Introduction to DataPac from the Right of Terror and Deicide

dpacnuas.txt

The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)

dtsb.hac

DEC Terminal Server Basics by Mad Hacker

easyl.hac

Hacking Easy Link I by Professor Falken

easylink.hck

Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc

easylink.txt

Hacking Easy-Link I by Professor Falken

edit.txt

Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems

ena!.hac

The ENA Vision: What IS Ena?

encyclop.txt

Someone Makes fun of That Stupid Article

eproms.hac

A Closer Look at EEPROMS by The Kingpin

eslf0006.txt

The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)

ess.txt

Electronic Switching System by Black Knight, from 2600, Feb. 1984

ethics.hac

Newsweek: Teaching Hackers Ethics

ethics.txt

The Ethics of Hacking by Dissident

evasiv.txt

The Inspector's Thoughts, by Assailant's Blade and Ford Prefect

exeguide.txt

An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)

fast.txt

Hacking McDonalds, by Herb the Hacker

fbiaftha.hac

The FBI Fights Computer Crime

fbibust

The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)

fbicompu.hac

Summary of FBI Computer Systems, by Ralph Harvey

fbicompu.txt

Summary of FBI Computer Systems By Ralph Harvey (1986)

fbisys.txt

Summary of FBI Computer Systems, by Ralph Harvey

fcisacc.txt

Getting Free Compuserve Access, by The Wanderjahr

fcscvol1.hac

Federal Criteria for Information Technology Security Volume I

fcscvol2.hac

Federal Criteria for Information Technology Security Volume II

fddi.hac

How to FDDA Internals Work? Learning to Appreciate Tokens

fdp1.txt

The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta

fdp2.txt

The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta

feds

Watching the Watcher Watching You, by Sir Knight of OSUNY BBS

fh.txt

Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)

findhole.txt

Security Holes Manifest Themsleves in Four Ways (November 10, 1993)

findho~1.txt

The Four Ways Security Holes Manifest Themselves (November 10, 1993)

force1.txt

Force Files Volume #1 (December 3, 1987)

force2.txt

Force Files Volume #2 (April 17, 1987)

force3.txt

Force Files Volume #3 (August 6, 1987)

force4.txt

Force Files Volume #4 (August 1, 1987)

force5.txt

Force Files Volume #5 (August 6, 1987)

force6.txt

Force Files Volume #6 (August 6, 1987)

force7.txt

Force Files Volume #7 (August 6, 1987)

force8.txt

Force Files Volume #8 (August 6, 1987)

force9.txt

Force Files Volume #9 (August 6, 1987)

freebie3.hac

Compufreebies 3.1 (1992)

freecis.txt

Free Compuserve Access

funwith5.hac

Fun With Automatic Tellers

g.txt

SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)

garaghak.txt

Garage Door Opener Hacker Plans from Cybertek

gateways

The Inter-Network Mail Guide - Copyright 1990 by John J. Chew

get-vip.txt

DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files

getbust.txt

Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415

getinfo.txt

The Hacker's Guide to Investigations, by Ripper of HALE (1989)

gisdoc.hac

Hacking the GIS computer by Doctor Crash

goodbye.ana

The Best of the Station, by The Prowler

goodkids.hac

Computer Hackers are Good People Too!

govthlp.txt

The Help Screen on some Government System

gs1.txt

Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)

gte.txt

Hacking GTE Telemail by Master Micro

guide.txt

A Novice's Guide to Hacking- 1989 edition by The Mentor

guidedoc.hac

The RSTS User's Guide, by The Flash

guidehak.txt

The Neophyte's Guide to hacking (1993 Edition) by Deicide

gunbelt3.txt

Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)

hacethi.txt

The Ethics of Hacking, by Dissident of TES

hacethic.txt

The Ethics of Hacking by Dissident

hack.faq

Beta .008 of the 2600/#hack FAQ

hack.hac

Hacking And Computer Krashing #9, by Gray Wolf

hack.leg

A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)

hack1.hac

The Basics of Hacking, by the Knights of Shadow (Intro)

hack2.hac

The Basics of Hacking, by The Knights of Shadow (DECs)

hack3

The Basics of Telenet Part I

hack4

Telenet Scanning

hack4.hac

The Basics of Hacking, by The Knights of Shadow (Data General)

hack5.hac

Hacking McDonalds, by Herb of Burger King

hack7

Hacking the Compuserve Information Service

hack7.txt

The Conscience of a Hacker by The Mentor (January 8, 1986)

hack9.hac

Hacking Control Data Corporation's Cyber

hack9301.rpt

The Hack Report Volume 2, Number 1 (January 3, 1993)

hack9302.rpt

The Hack Report Volume 2, Number 2 (February 7, 1993)

hack9303.rpt

The Hack Report Volume 2, Number 3 (March 7, 1993)

hack9304.rpt

The Hack Report Volume 2, Number 4 (April 4, 1993)

hack9305.rpt

The Hack Report Volume 2, Number 5 (May 9, 1993)

hack9306.rpt

The Hack Report Volume 2, Number 6 (June 6, 1993)

hack9307.rpt

The Hack Report Volume 2, Number 7 (July 4, 1993)

hack9309.rpt

The Hack Report Volume 2, Number 9 (September 12, 1993)

hack9401.rpt

The Hack Report Volume 3, Issue 1 (January 29, 1994)

hack_cis.txt

The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991

hack_em.hac

The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr

hack_s.txt

Harry Hackalot's Official Hacker Address Book for October 1984

hack_ths.txt

The Social Organization of the Computer Underground (Thesis)

hackacr.hac

The Hackers Acronym Chart, compiled by IIRG

hackad.txt

The Famous Hacker's School (Analog Science Fiction Sept. 1990)

hackcos.txt

Hacking COSMOS Part I by Lex Luthor and the Legion of Doom

hackcrak.txt

The Hacker Crackdown, by 2600 Magazine

hackdct1

The Hacker's Jargon File, (November 14, 1982 Version)

hackdict.txt

The Hacker's Dictionary, Older Version, Uncredited!

hacker

The Consience of a Hacker by The Mentor (January 8, 1986)

hacker.tst

The Hacker's Purity Test, June 16, 1989

hacker.txt

SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

hacker01.txt

The Social Organization of the Computer Underground: A Thesis

hacker03.txt

The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers

hacker1.txt

Diary of a Hacker

hacker11.txt

Hacking Western Union's Easylink

hacker2.txt

The Diary of a Hacker Part II by the Cuisinart Blade

hackerdoc.txt

SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

hackerla

The Hackers' Laws

hackers.par

Advertisement for the Galactic Hacker's Party (August 1989)

hackethic.txt

The Ethics of Hacking by Dissident

hackfaq.10

FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)

hackfaq.txt

The Hack FAQ By Simple Nomad (January 31, 1999)

hackholl.txt

Hacking In Holland by Rop Gonggrijp (October 18, 1988)

hackhp2.hac

Hacking the HP 2000 by Bioc Agent 003

hacking

Description of the New, Bad Definition of Hacking

hacking.dox

Collections of Hacker FIles Downloaded by Consumertronics

hacking.tap

Style Teaches You About How to Be a Proper Hacker

hacking.txt

Hacking Tutorial, by The Jolly Roger

hacking101.hac

HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life

hackinga.txt

Hacking Bank Of America's Home Banking System by Dark Creaper

hackingc.txt

Hacking Credit Card Codes by Omni-Kid and The Wyvern

hackinge.txt

Hacking ECONet Systems by Jack Death and Zapper

hackingi.txt

Computerworld Asks People to Hack In, 1984

hackingt.txt

Hacking the Lexington Air Force Computer

hackl1.txt

Hacker's Line #1 by 2TUFF

hacknet.dox

The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC

hacknet.txt

how to Hack Your School's Network, from Dr. Techno of Paradise Lost

hackpcp.hac

The Weenie Warriors present Hacking PC Pursuit Codes

hackprod.txt

How to Hack Prodigy by Desolated Dream

hackprof.txt

Hacker Proof Doors! It IS Possible!

hackquiz.txt

The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas

hackrsts.txt

Hacking RSTS Systems: An Instructional Test

hacksong.txt

The Hacker's Song by Dave Touretzky and Don Libes

hacksynd.hac

The Hackers Syndrome, by Tad Deriso

hacktalk.txt

A Short Hackerspeak Glossary, by the Hollywood User Group

hackterm.txt

Collection of "Hackernyms" by Rad Man version 2.10

hacktest.txt

The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)

hacktips.hac

Hacking Tips #2, by Hoe Hopper

hacktips.txt

Tips for Tracking Hackers

hacktut.txt

Hacking Tutorial, by The Jolly Roger

hackunlm.hu1

Hackers Unlimited Magazine Volume 1 Issue 1

hackusa!.hac

Hackin' USA

hackwarn.hac

A Warning to Hackers

hackwwiv.hac

Hacking into WWIV, Second Edition by Vision

hackwwiv.txt

Hacking into WWIV Software by Vision

haibm370.txt

How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club

hakdec20.txt

An Addendum to A Novice's Guide to Hacking, by The Mentor

hakdic.txt

The Hacker's Dictionary, A Guide to the World of Computer Wizards

hakmedia.txt

Hackers in the Media, List start: 10/28/92 - Doomsday

handbook.txt

Hacking Compuserve: All You Need to Know, by Mr. Perfect

haq1.txt

The HAQ Edition 2.07 (June 11, 1994)

hashish.txt

Hashish: The Exotic Elixir, by EZ Rider

hate.info

Invitation to HATE: Hackers at The End (Summer 1995)

havok1.txt

HAVOK Pack #1: The Return (Collection of Hacking Textfiles)

hckr_hnd.txt

The Hacker's Handbook by Hugo Cornwall (1985)

hckrslg

The Hacker's League, by Lee Felsenstein (March 18, 1992)

hd.hac

Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme

hd01.hac

Hackers Directory Volume #1 by Ninja Squirrel and Logan5

hd02.hac

Hackers Directory Volume #2 by Ninja Squirrel and Logan5

hd03.hac

Hackers Directory Volume #3 by Ninja Squirrel and Logan5

hd04.hac

Hackers Directory Volume #4 by Ninja Squirrel and Logan5

hdigest.txt

The Hacker's Digent by Harry Hackalot (October 1984)

hdindex.txt

Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)

hedrick.txt

An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)

hfnewbies.txt

The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)

hhacking.iix

CAT-HACK Volume 1 from The Mystery

hint.txt

The Czar's Guide to the Young Criminal Accused of Using Computers

his-hp.txt

The History of Hacking and Phreaking by Raven of BOM SQUAD

hk_acces

Draft Chapter of the NIST Computer Security Handbook, from Ed Roback

hk_crypt

Draft Chapter from the NIST Computer Security Handbook, on Cryptography

hk_i&a

Draft of the NIST Computer Security Handbook on Identification and Authentification

hk_polic

Draft of the NIST Computer Security Handbook on Computer and Information Security Policty

hoho93.ad

hoho93.ad

hoho93cz.hac

hoho93cz.hac

hohocon.93

hohocon.93

holelist.txt

How Security Holes Manifest Themselves

holes.txt

A List of Holes in Various Operating Systems (April 7, 1993)

homebank.hac

Hacking Bank Of America's Home Banking System by "Dark Creaper"

homebank.txt

Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM

horror_s.tor

Hacking Horror Stories 1982

hp20001.hac

HP 2000 Part 1: Commands by Blitzoid and Galactus

hp20002.hac

HP 2000 Part 2: Statements by Blitzoid and Galactus

hp20003.hac

HP 2000 Part 3: Functions by Blitzoid and Galactus

hp20004.hac

HP 2000 Part 4: Files by Blitzoid and Galactus

hp20005.hac

Hp 2000 Part 5: Matracies by Blitzoid and Galactus

hp30.txt

The Completel Hewlett Packard 3000 Hackers Guide

hp3000.hac

The Complete Hewlett Packard 3000 Hackers Guide

hp3000.txt

The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS

hp3000_t.hac

Hacking the HP 3000 by DE BUG

hp3000g.hac

The Complete Hewlett Packard 3000 Hackers Guide

iah1.txt

The International Hackers' Association Issue #1

ibm-vm70.txt

A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited

ibm370.hac

How to Take Control of your Local IBM 370 by Another Hacker

ibmhack.hac

Hacking the I.B.M. By John Doe

icebook1.txt

ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)

icebook2.txt

ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus

icon4u.nrg

ICoN Hacking with Loser Access by GY

id-biz.txt

How to Have a Profitable ID Business, by Mr. Puff n' Stuff

identity.txt

How to Create a New Identity by the Walking Glitch

ihg.txt

International Directory of Hacking and Phreaking Organizations, by John Simmons

iirgacr6.txt

The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)

iirgacr7.txt

The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)

iirgacr8.txt

The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)

iiu-001.txt

Bust Avoidance for Dipshits by Derision of IIU (1990)

iiu-004.txt

Hacking on the Compuserve Information Service by Darkness (1990)

illinet.txt

Dial-Up Access Numbers for ILLINET Online

info.txt

How to Get Detailed Information on Anybody by DTS

info3.gph

How to Get Anything on Anybody Part III

infoam.txt

Exploring Information-America by Omega and White Knight

informer.hac

TRI : The Remote Informer, Volume 1, Issue #6

innerc.txt

Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth

innercir.hac

Hacking Techniques, Typed in by Logan5 from The Inner Circle

intercep.hac

The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)

intercpt.txt

Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods

intruder.dox

SOFTDOCS: Intruder v1.21 by CreaSoft

inttel.hac

European Computers List #1 by Kerrang Khan

issm201.hac

The Information Systems Security Monitor Volume 2 Number 1

issm202.hac

The Information Systems Security Monitor Volume 2 Number 2

issm204.hac

The Information Systems Security Monitor Volume 2 Number 4

issm301.hac

The Information Systems Security Monitor Volume 3 Number 1

issm302.hac

The Information Systems Security Monitor Volume 3 Number 2

issm303.hac

The Information Systems Security Monitor Volume 3 Number 3

issm304.hac

The Information Systems Security Monitor Volume 3 Number 4

jack14.txt

Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)

janet.txt

JANET PAD Listing Revision 1.2 (March 1st, 1990)

jargon211.hac

The Jargon File, v.2.9.11, by Eric S. Raymond

javabugs.txt

JavaScript Problems I've Discovered

keylock.sch

Schematic For an Optoelectronic key Lock by Joe Scharf

keytrap3.txt

SOFTDOCS: Keytrap v3.0 by Dcypher

kfyi-593.hac

KFYI AM Radio 910 interviews Mind Rape and Merc

kill.feds

FEDS: How to Find and Eliminate Them (September 10, 1987)

l0pht.txt

The L0pht... What I saw, by Tfish of RDT

lan.txt

Local Area Networks (LANs) by ANSI-Christ

lca-1.txt

LCA #1: Zen and the Art of Untraceable Hacking, by Flood

lca-2.txt

LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance

lca-3.txt

LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance

lca-4.txt

LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance

lca-5.txt

LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance

lca-6.txt

LCA #6: Beige Boxing, by the Lemon Curry Alliance

ldd.txt

How to Hack into CIS

license.asc

The Guerilla Guide to Licensing Software

list2

Pacific Bell Computer Systems, by Another Hacker

litewave.sch

AM Lightwave Transmitter and Reciever by Joe Scharf

lnoise.hac

Modem Noise Destroyer (Alpha Version)

lodhbasi.hac

The LOD/H Present: A Novice's Guide to Hacking- 1989 edition

logoncbi.hac

How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)

logoncbi.txt

How to Log into a C.B.I System by L.E. Pirate

longpass.txt

Generating Longer Passwords

machack0.5.txt

The Mac Hack FAQ by AX1P (November 22, 1994)

mag_stripes.txt

Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)

magnet.01

Magnetic Stripes on Cards: An Overview

magnet.02

Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)

mailbox.hac

Mailbox Systems: Your Link to the Underworld

main.fra

Main Frames by the Pirate Club

mainfrms.con

A List of Mainframe Dialup Numbers

master.txt

Master Hack Version 1.0 by Master Frodo (January 1, 1991)

mci.txt

MCI Mail Access Numbrs, from The Swamp

mci__acc.txt

List of MCI Access Numbers

mcimail.hac

MCI Mail - The Adventure Continues, by Bioc Agent

mcisprin.t

Hints on Hacking, byt the RAMBUG and Captain Blood

memory.lst

The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)

mgtguide.txt

The NIST Management Guide to the Protection of Information Resources

mickeyd.txt

Hacking McDonalds by Herb the Hacker

micrrisk.hac

Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)

milinet.1

Milnet Access Codes

milnet.txt

How to Use the American Military Net

milnet1.hac

Milnet, by Brigadier General Swipe

mish18.txt

The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)

mism1.hac

How to Get Anything on Anyone Excerpts

mism10.hac

How to Get Anything on Anyone Excerpts

mism20.hac

Mastering the SCANTRON by Warhead

mism42.hac

Xerox Voice Message Exchange Commands, from The Lineman

mob.txt

The Hackers in the MOB

modbook1.txt

The History of MOD: Book One: The Originals

modbook2.txt

The History of MOD: Book Two: Creative Mindz

modbook3.txt

The Book of MOD: Part Three: A Kick in the Groin

modbook4.txt

The Book of MOD: Part Four: End of '90-'1991

modbook5.txt

The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)

morality.hac

Hacker Morality: A Lesson

morestuf.txt

Collection of Hacking Files (Should Eventually be Split up)

morprime.hac

RVEC Parameters and DMSTK Format

mrsts.hac

So you've finally decided to down an RSTS System?

mtempist.hac

The Tempest Method of Data Interception (Needs Editing)

narc3.hac

Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)

ncsc-tg-003.txt

A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

ncsc-tg-016.txt

Guidelines for Writing Trusted Facility Manuals

ncsc-tr-005-2.txt

Introduction to Trusted Computer System Evaluation Criteria

ncsc_oas.txt

A Guideline on Office Automation Security (December 5, 1986)

netbios.txt

Understanding NetBIOS by NeonSurge of Rhino9

netcrack.txt

DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00

networks.phk

2600: How to Send Mail to other Networks

neuroman.pwd

List of DataBases and passwords for the game "Neuromancer"

newid.hac

New Identity Method

newsltr.idx

Index to the Computer Underground Digest Archives (June 13, 1991)

nextbugs.txt

CERT Advisory on the NeXT computer's Software

nfs_trace.txt

NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton

nha-app.txt

Application to Join Network Hackers Alliance (June 1, 1991)

nimbus.txt

Research Machines Nimbus hacking, by The Green Rhino

note9309.txt

The Hack Report, by Lee Jackson (September 1993)

nov-faq.txt

The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad

novell.hac

Collection of security holes in Novell Netware

novell.txt

SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)

novhack.txt

Having Phun With Novell by Lord Foul/Decay (July 13, 1991)

nwhack.faq

Frequently Asked Questions about Hacking Novell Netware by Simple Nomad

obscene.###

TAG FILE: Obscene Phobia BBS (January 1, 1995)

ocfber.1

Bylaws of the Open Computing Facility at UC Berkeley

ocfber.2

Constitution for the Open Computing Facility at UC Berkeley

omron.pin

How to Connect OMRON 3S4YR-HSR4 to your PC

orange

Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983

orange.txt

The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)

orgs.hac

A Large List of Computer Security Organizations

orgs.txt

1988 List of Computer Security Organizations

outdial.lst

Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)

outdial.txt

How to Use Outdials: An Introduction by Lorax

outdials.us

Ameican Local Outdials by Sebastian Winchler (March 1991)

outdialsnfo.hac

List of Dialouts

pacbell.lst

Collection of Pacific Bell Computer Systems

packet.txt

Notes on Using Tymenet and Telenet by Michael A. Banks (1989)

pacnet.hac

Hacking into the PACnet System

pactimea.txt

Telephone Numbers for the Pacific Bell Computer System by Another Hacker

passhack.txt

The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press

password.txt

Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)

pcp88.lst

PC Pursuit List Version 1.1 (August 31, 1988)

pcpbas.txt

How to Use PC Pursuit Service

pcphack.phk

Hacking PC Pursuit Codes by The Weenie Warriors

pcphack.txt

The Weenie Warriors Present Hacking PC Pursuit Codes

pcpold.phk

How to Use Telenet's PC Pursuit Service by Z-Man

pcpursue.txt

PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992

pcpursui.yes

PC Pursuit and Telenet Local Access Numbers

pdnaxis.txt

The Public Data Network Numbers

pdp11.hac

Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal

pentagon.txt

The Milnet File by Brigadier General Swipe/Dispater

ph.txt

Soft Documentation: P-Hack 1.0 by Peter King

phonecom.nfo

Becoming More Informed (Becoming a Hacker)

popper.txt

ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)

prime.hac

A List of PRIME Commands

primecpl.hac

An Introduction to PRIMOS CPL Directives by Necrovore

primer.txt

Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)

primes.txt

Message Base With Discussion of the Watch utlity on PRIME (August, 1988)

primos.hac

Hacking Primos Systems By Nanuk of the North

primos1.txt

Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos2.txt

Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos3.txt

Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos4.txt

Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos5.txt

Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

psnintro.txt

The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)

psns.txt

An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker

pumpcon.txt

pumpcon.txt

pw-hack.txt

The Art of Password Hacking by HIT

qsd.txt

How to Access Minitel or How to Have FUN on QSD

racintro

Information on RAC: A Host System Used for Access to GEnie and AppleLink

raclog1

An Example of an RAC Login

raclog2

An Example of an RAC Login, Part II

ram1

Hacking Rampart Systems Part 1

ram2

Hacking Rampart Systems Part 1 (cont)

ram5

Hacking Rampart Systems Part 2

ram6

Hacking Rampart Systems Part 2 (cont)

ramcomm.hac

Hacking RAM Communications (Pager)

rampart1.hac

Hacking Rampart Systems by Whackoland

rampart2.hac

Hacking Rampart Systems by Whackoland Part II

rcaglobe.txt

The RCA Network Part I by the Telex Troopers

read.me

A Story About the TSR That Catches Passwords, and a short History

readme.now

SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker

readme.txt

Force Files Explanation

reid.txt

The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)

revblt.hac

Review of Federal Agency Computer Security and Privacy Plans

riacs

Principles of Responsible Use of RIACS Computing Facilities

rimeman.hac

RIME User's Guide

ripco.txt

The Doctor Ripco Seizure by Full Disclosure (1991)

risks.txt

Avoiding the Risks of Hacking: A List of Suggestions by IC

risktool.hac

Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)

rom.txt

Macintosh ROM Secrets by The Cloud (November 23, 1990)

rowdy_dl.man

DocumentationL The Rowdy Dialer (April 1993)

rspwd.new

Some Downloaded Password File

rsts.hac

So You've Decided to Down a RSTS System, by Sam Sneed

rsx11.hac

RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital

rsx11m.txt

RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital

ruhacker.txt

Are You a Hacker? By ReDragon

sanatmdoc.hac

Getting into an ATM

saruman.add

TAG: Saruman BBS Ad

satan~1.txt

A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)

satcon.txt

Satellite Control, by Ninja Squirrel & Logan-5

satelit3.txt

Satellite Scrambling Systems: The Truth, by XL

satelite.txt

Satellite Frequencies, by Sir Francis Drake

scanprg.txt

What To Look For In A Code Hacking Program, by Dissident

school.txt

Screwing with School Computers, by Liquid Bug

secrets2.hac

Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office

secrets3.hac

Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things

secretsdoc.hac

Young's Demonstrative Translation of Scientific Secrets (1861)

securdev.txt

Technical Hacking Volume 1 by the Warelock

security

Overview of Computer Security by E.A. Bedwell, EDP Specialist

security.fy8

Site Security Handbook, 1991

security.txt

Professor Falken's Guide to CODE Hacking Security

sequence.txt

Sequence Number Attacks, by Rik Farrow

sha.hac

Swedish Hackers Association Annual Year Protocol #4

shadec.txt

The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association

shahewl.txt

Swedish Hacking Association presents Hacking HP 3000 Part 1

shaprot3.txt

The 3rd Protocol (1990) by The Swedish Hackers Association

shawn-file-check

The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions

shw0293.asc

Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn

shw0394.asc

Syndicated Hack Watch (March 1994) by John McCormac

shw0494.asc

Syndicated Hack Watch (April 1994)

shw0593.asc

Red Hot Television is Banned

shw0893.asc

The Start of the Skybox Cable War

shw0993.asc

Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"

shw0994.bbs

Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control

shw1093.asc

Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press

skel_key.txt

SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society

skey.txt

Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn

skeyfl.txt

Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries

skyhack.hac

The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)

sniffer.txt

FAQ: The Sniffer FAQ Version 1.7

snoop

Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca

snoop.txt

Data Snooping the Right Way by Lee Day

sourcetelnet.txt

The Source Telnet Directory, and Uninet Directory

ss-info2.txt

The Social Security Number, by Barbara Bennett

ssan.hac

The Social Security Number

ssn-stuf.txt

More about why Social Security Numbers are Insecure

ssnum.ana

About Social Security Numbers

starlink.txt

Information on Galaxy Starlink: A User's Guide

starmast.txt

Hacking the Gandalf Starmaster by Deicide (May 22, 1993)

statemind.txt

So, You Wanna Be a Hacker? It's a State of Mind!

stoll.doc

Writings of Clifford Stoll

storehac

Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)

stupidki.hac

Those Stupid Little Bastard Hackers!

sun413.txt

How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)

sundevil.txt

Operation Sundevil, by the Prodigy

superd.txt

DocumentationL Superdial 1.03 by Evan Anderson

sys75.hac

The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson

ta&m.txt

Texas A&M Network Security Package Overview 7/1/1993

tachelp

Captures of Information on TACACS by The Argonaut

tan.txt

List of Telenet Access Numbers by Daredevil of P/HUN

tcp-ip.txt

FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)

tcsb.03

Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)

tcsb.04

An Introduction to PRIMOS CPL Directives by Necrovore

tcsb.05

Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)

tcsb.06

Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)

tcsb.08

Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)

tcsb.11

Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)

tcsb.12

Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988

techhack.hac

A Guide to ADS System, by Lord Digital and the Phantom

techiq.txt

Hacking Techniques, by Logan-5 (Hacker Supreme)

technicl.txt

Technical Hacking: Volume One by the Warelock

tele3.txt

Telenet Scanning by Doc Telecom (July 11, 1988)

tele4.txt

An Overview of Telenet by Man Max

tele5.hac

Hacking Telnet by The Flash

telecode.txt

Telenet Codes, Hacked Out by ZORON (May 1, 1988)

telecomm.txt

An Introductory Guide to Telenet Commands

teleinfo.txt

Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)

telenet.hac

Telenet: The Secret Exposed

telenet.txt

An Introductory Guide to Telenet Commands

telenet2.txt

A Good amount of general Telenet Information

teleneth.txt

An Introductory Guide to Telenet Commands

teleneti

Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)

teleneti.phk

Instructions for using TELENET.

telescan.txt

Information on Telenet Scanning

tellerma.txt

Cracking Auto Bank Teller Machines by the Suspect

teln2.txt

Telenet Terminal Identifiers

teln3.txt

Welcome to the TCO Access Listing (September 15, 1987)

telnetsn.txt

Telenet Scanning by Doc Telecom (July 11, 1988)

telnumbe.txt

Telenet Access Numbers, by the Weenie Warriors

teltermz.txt

List of Terminal Identifiers

tempest.hac

Excerpt of article on Tempest

thc.nfo

NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)

thc2.nfo

The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)

thehaq.txt

The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)

thuglan1.txt

Introduction to Hacking into LANs by THUG

thuglan2.txt

General Information on LANs by THUG (July 31, 1991)

tihack2.txt

Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)

timenet.txt

Hacking Tymnet by Byte Brain

tl-user.txt

ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas

tl.q-a

ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual

tmplefun.txt

Fun with Temple's Computers (A How To)

tnet1.txt

Tymnet File #1 by The Twilight Phone

tnet2.txt

Tymnet File #2 by The Twilight Phone

tnet3.txt

Tymnet File #3 by The Twilight Phone

tnpcpod.txt

TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom

tops20.txt

Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!

transdir.txt

The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory

trash.txt

Dumpster Diving: An overview of the legality, by Full Disclosure

trashing.rot

The Art of Trashing by Deicide

traxtool.txt

The Trax Toolbox Volume #001 by Track

triad187.hac

The Triad: A 3-in-1 Textfile Magazine, Issue #1

trojan

Rumors of Worms and Trojan Horses by Mike Guffey

tsrcrack.txt

SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)

ttyspoof.txt

TTY Spoofing, by SubEthan

tym_ods.txt

TymNet OutDials Sorted By Area Code

tyme2.txt

International Packet Switching Services Description

tymenet.hac

Tymenet Technical and User Information

tymnet.ods

Listing of Tymnet ODS Systems

tymnet.txt

Packet Networks I and other Tymnet Information by Digital Demon, 1990

tymnet96.txt

BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)

ueber.txt

A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)

uk.dialups

A List of Modem Dialups in the UK (September 22, 1990)

ukguide.hac

The Guide to Online Databases for UK Users

ulimate.txt

The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)

ultrad3.txt

The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy

unineta.phk

Uninet Information, from The South Pole

unp.txt

SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)

up.txt

SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)

usrguide.txt

The NIST Computer User's Guide to the Protection of Information Resources

vanish.txt

The Hacker Who Vanished: Suicide or Clever Hoax?

vax-7.txt

vax-7.txt

vendors.hac

Large Security Vendors List

verstell.ana

Neat Fun with Versatellers

virus

Attack of the Computer Virus, by Lee Dembart

vmbhack.txt

Hacking Voice Mail Boxes by Tik Tak

vmsptuto.txt

The IBM VMSSP System, by The Motorhead

vthack1.txt

The VT Hacker, by the Man Hermit

vthack2.txt

The VT Hacker #2, by the Mad Hermit

vthack3.txt

The VT Hacker #3, by The Mad Hermit

vtp.txt

A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)

wal-mart.txt

Hacking the Wal-Mart Armorguard Computer Protection System

wanghack.hac

Hacking the Wang OS, by Dark Knight

wargames

The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)

wargames.hum

Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock

watching

Watching the Watcher Watching You by Sir Knight

wats.txt

WATS Version 1.0 by Professor Falken & The Aptolcater

whca_txtmsg.log

The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!

xerox.hac

Hacking Xerox

xmux.txt

The ROT Guide to Gandalf XMUX's by Deicide

zen.hac

Dan Farmer's Improving the Security of Your Site by Breaking Into It

zippass.txt

The Security of PKZIP Encryption

Proxied content from gemini://gemini.spam.works/mirrors/textfiles/hacking/

Gemini request details:

Original URL
gemini://gemini.spam.works/mirrors/textfiles/hacking/
Status code
Success
Meta
text/gemini
Proxied by
kineto

Be advised that no attempt was made to verify the remote SSL certificate.