WELCOME TO THE HACKER's WORLD. HERE YOU WILL GET HACKING TIPS & TRICKS,LEARN HOW TO HACK
hackers Search
Saturday, July 2, 2011
HACKING TXT FILES
22.txt
DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
23things.txt
2600-9-3.txt
2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
2600_ind
2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
2600faq.011
Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
386i.txt
CIAC Advisory Notice: Authentication bypass in Sun 386i machines
5600.txt
Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
aahack.txt
Anarchy Anonymous: Hacking your School Network
accesblt.hac
Advanced Authentication Technology, 1991
accessin.txt
A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
acro01.txt
Max Headroom's Hacker Acronym List
acro02.txt
Max Headroom's Second Collection of Acronyms
acrolist.phk
Acronym List, Early 1990s
acroynym.txt
The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)
adssys.txt
A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
aio.box
All in One Box, by Disk Doctor
aio5b.txt
AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
ais.txt
AIS: The Automatic Intercept System by Computer Consoles Incorporated
aix.fun
Warning to download some AIX Patches
allnet01.txt
Hacking Allnet by Shadow Warrior (January 1988)
amhack.txt
Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
ansibomb.txt
ANSI Bombs II: Tips and Techniques, by The Raging Golem
aohell.phk
Why I wrote AOLHell
aoim.txt
The Risks of Using an AOL Client Behind a Firewall
aolhak.txt
How to Hack America on Line by the Hooded Bobs
as400cmd.hac
IBM AS/400 Command Summary
as400cmd.txt
All IBM AS/400 Commands by The Might
aspen.txt
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
aspen1.txt
A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
aspen2.txt
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
assolink.txt
An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
at&arebl.txt
Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
atlas.txt
Hackers' Atlas, by Ragon/Wynvern/BOF
atm-92.txt
ATMS: The Real File for ATM Theft in 1992 by The Raven
atm-more.txt
A Whole Collection of the Risks of ATM Cards (1988)
atm.txt
Hacking ATM's by Blue Thunder
atm1.txt
The Disk Jockey Presents Scamming ATMs
atma.hac
Quick OVerview of ATM Security (Needs Editing)
atmapps.txt
"Gee Whiz" ATM Applications are On the Horizon
atmfile
ATM secret codes, from Fred Gindburg (July 10, 1987)
atmhacking.txt
Hacking ATMs, by Anonymous
atms
An Overview of ATMs and Information on the Encoding System
atms.txt
Track Layouts on ATM Cards
auditool.txt
Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
austhack.hac
Australian Dialups
austpac0.txt
Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
austpac1.txt
Additional AUSTPAC Character Terminal Manual
austpac2.txt
AUSTPAC General Information and Codes
austpac3.txt
The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
autohack.txt
Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
autonet1.txt
Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
autotelldoc.ana
Fun with Automatic Tellers
autovon1.hac
Introduction to the Automated Voice Network (Autovon) by Shadowrunner
autovon2.hac
Introduction to the Automated Voice Network (Autovon) Part II
autovon3.hac
Introduction to the Automated Voice Network (Autovon) Part III
autovoni.nst
Overview of the Automatic Voice Network (Autovon)
avoidcap.txt
Planning Ahead for Phone Phreaks/Hackers
babyna.mes
The Moby Words Database (List of Words) (1989)
backdoor.txt
How to Hold Onto UNIX Root Once You Have It
bankhack.txt
The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
basic.net
Basic Networking, by Sk8 the Skinhead
basic1.hac
The Basics of Hacking I: DECs By the Knights of Shadow
basic3.hac
The Basics of Hacking III: Data General By the Knights of Shadow
basicnet.hac
Basic Networking (1989) by Sk8 The SkinHead
basics
Rambug's Hacking Volume #1 by Rambug
bbsfiles.txt
The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
bd-tv5.txt
Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
bindery.txt
Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)
boahack.txt
Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
boces.txt
The Slipped Disk takes over the BOCES Computer: A Log
bom-hh&p.txt
The History of Hacking and Phreaking by Raven of BOMB Squad
books.txt
Biblography of Computer Security Books (1973 through 1988)
brute.txt
brUTE: A brute force approach to hacking Unix passwords. Version 1.1
btinfo.h-k
BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
c64fun1.txt
Suggestions On What to Do with a Commodore 64, by Nightstalker
callcard.phk
Hacking Calling Cards, by The Pyromaniac
candyland.faq
The Candyman Explains How He Will Accept Explosives Files
carcodes.txt
Codes Used by Computers in Cars
cb1.txt
Citibank Hacking, by Johnny Hundu
cb2.txt
Small Rant about Hacking Citibank
cbiinfo
Using and Abusing CBI by The Ghost
cbrsp-1.hac
The Cyberspace Chronicle Volume 1 by Phardak
cbvhack.pnk
CBV Hacking by PiNK ToRPeDo (June 7, 1994)
cbvhack.txt
CBV Hackin' by Pink Torpedo (June 7, 1994)
chahelp_.txt
Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke
chaos01.txt
The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
chaos02.txt
The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
chaos03.txt
The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
chilton1.txt
Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)
china02doc.hac
China Newsletter #02 (Hacking/Phreaking File Compilation)
church4.ptl
Church Chat Volume 4 by The Spiker
cis.phk
Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord
cisagain.txt
Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord
cisinfo4.txt
Compuserve Information by Morgoth and Lotus
ciss3.txt
List of Access Numbers to the Compuserve Information Service
citibank.txt
Hacking into Citibank with Johnny Hindu
citibank2.txt
Citibank Service Addresses by Dark Helmet of P/H/a (March 21, 1990)
cjack.faq
Cracker Jack FAQ Written by kM (1993)
codphone
Coda-Phones by D.T. Legna
com_sec90.hac
United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact
com_sec91.hac
United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
compserv.txt
Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.
compus.txt
Free Compuserve Passwords, by Devious Xevious
compuser.txt
A Quick Compuserve Index
compusin.txt
Some Compuserve Tips, by Eric Diamond
compusrv
Compuserve Hacking by The Locksmith
concis.txt
Free Compuserve Access
contact.txt
How to Contact the HACK SQUAD
copier.hac
Magnetic Stripes, by Count Zero
cops-rl
RL C.O.P.S. File by Brian Oblivion
cosmos.hac
C O S M O S, by Doctor Who
cosmos1.txt
Hacking into COSMOS by Wizard of OZ
cosmos2.hac
Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
cosmos3.hac
The 1986 COSMOS Files Part III by Sir William
crackam1.txt
Hacking Programs on the Amiga by FunToHack
crackdwn.txt
Crackdown, from 2600 Magazine volume 7, number 1 SPRING
creditfr.txt
The Adventures in Fraud Series Volume I, by Sneak Thief (1985)
credunin.con
Numbers of Credit Unions and protection Agencies
cs.hac
How to Get a Free Account on Compuserve
cs.txt
How to Get a Free Compuserve Account
csl8_93.hac
CSL Bulletin 1993
cuthesis.txt
The Social Organization of the Computer Underground by Gordon R. Meyer
cyber.txt
The Cyberpunk Movement by Pazuzu of DnA May 12, 1993
cyberhac.txt
Hacking Control Data Corporation's Cyber, by The Ghost
data.tap
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS
data_gen
Captain Crunch talks about hacking Data General Systems
database.txt
CIRR Database: A tool for Corporate Research
datakit.hac
How to connect across VCS/ISN boundaries
datanet.doc
The Basics of TELENET
datapac.hac
A Guide to DataPAC by The Fixer
datapac.inf
Technical Guide to DataPac by the New Dark Council (1990)
datapac.txt
A Guide to DataPAC by The Fixer (April 18, 1990)
datapac1.txt
A Guide to DataPAC version 1.1 by The Fixer
datapac2.txt
Datapac 3101 ITI Parameters Description
datapac3.txt
Datapac 3101 Public Outdial Ports
datatap.txt
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop
datatapp.txt
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
ddn01.txt
DDN Security Bulletin #1
ddn03.hac
Defense Data Network Security Bulletin #3
ddn04.hac
Defense Data Network Security Bulletin #4
ddn05.hac
Defense Data Network Security Bulletin #5
ddn06.hac
Defense Data Network Security Bulletin #6
ddnet1.txt
DDN: Information on the Defense Data Network from Unauthorized Access UK
ddnet2.txt
DDN: The Defense Data Network (A Map)
debtcard.txt
Harvard Medical School Installs ISDN-Based Debit Card System
dec10.txt
Hacking the DEC-10 System
dec_200.txt
The Decserver 200 Revealed by Surf Studd (October 23, 1990)
defaults.txt
Hacking into a Variety of Systems by using their Default Accounts
defcon.info
defconadd.hac
defdb.hac
Department of Defense Federal Data Bases (List)
defense.hac
Defense Data Network Blues by Harry Hackalot
defense.txt
Defense Data Network Blues by Harry Hackalot (1984)
defnetbl.txt
Defense Data Network Blues by Harry Hackalot (August 31, 1983)
demystif.txt
Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin
denning.txt
Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)
des.txt
The Data Encruption Standard (DES) Fact Sheet
desblt.txt
The Data Encryption Standard (DES) June 1990
desval.hac
DES Validation List
desval.txt
DES Validation List
dialback.txt
Dial-Back Isn't Always Secure (February 28, 1985)
dialog.txt
Inside Dialog by Control C of Advanced Telecommunications Inc.
dialog01.txt
Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.
dialout1.txt
A Novice Manual on Using Outdial Modems by Blue Adept
dialplus.txt
A Screengrab of Informaiton on PSS DialPlus from British Telecom
dialup.hac
List of Dialups. For what? I have no idea.
disclaim
Da Disclaimer, by Filbert
diskopt
My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
djns.txt
Inside DJNS (Dow Jones News Service)
dlog-rdt
Complete Guide To The DIALOG Information Network by Brian oblivion
dnicinf.hac
D A T E X - P - International Traffic Relations
dowjones.txt
Inside Dow Jones News Service
dpacbas.txt
The Basics of DataPAC by Mister X (February 2, 1991)
dpacintr.rot
Introduction to DataPac from the Right of Terror and Deicide
dpacnuas.txt
The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)
dtsb.hac
DEC Terminal Server Basics by Mad Hacker
easyl.hac
Hacking Easy Link I by Professor Falken
easylink.hck
Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc
easylink.txt
Hacking Easy-Link I by Professor Falken
edit.txt
Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems
ena!.hac
The ENA Vision: What IS Ena?
encyclop.txt
Someone Makes fun of That Stupid Article
eproms.hac
A Closer Look at EEPROMS by The Kingpin
eslf0006.txt
The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)
ess.txt
Electronic Switching System by Black Knight, from 2600, Feb. 1984
ethics.hac
Newsweek: Teaching Hackers Ethics
ethics.txt
The Ethics of Hacking by Dissident
evasiv.txt
The Inspector's Thoughts, by Assailant's Blade and Ford Prefect
exeguide.txt
An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)
fast.txt
Hacking McDonalds, by Herb the Hacker
fbiaftha.hac
The FBI Fights Computer Crime
fbibust
The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)
fbicompu.hac
Summary of FBI Computer Systems, by Ralph Harvey
fbicompu.txt
Summary of FBI Computer Systems By Ralph Harvey (1986)
fbisys.txt
Summary of FBI Computer Systems, by Ralph Harvey
fcisacc.txt
Getting Free Compuserve Access, by The Wanderjahr
fcscvol1.hac
Federal Criteria for Information Technology Security Volume I
fcscvol2.hac
Federal Criteria for Information Technology Security Volume II
fddi.hac
How to FDDA Internals Work? Learning to Appreciate Tokens
fdp1.txt
The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
fdp2.txt
The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
feds
Watching the Watcher Watching You, by Sir Knight of OSUNY BBS
fh.txt
Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)
findhole.txt
Security Holes Manifest Themsleves in Four Ways (November 10, 1993)
findho~1.txt
The Four Ways Security Holes Manifest Themselves (November 10, 1993)
force1.txt
Force Files Volume #1 (December 3, 1987)
force2.txt
Force Files Volume #2 (April 17, 1987)
force3.txt
Force Files Volume #3 (August 6, 1987)
force4.txt
Force Files Volume #4 (August 1, 1987)
force5.txt
Force Files Volume #5 (August 6, 1987)
force6.txt
Force Files Volume #6 (August 6, 1987)
force7.txt
Force Files Volume #7 (August 6, 1987)
force8.txt
Force Files Volume #8 (August 6, 1987)
force9.txt
Force Files Volume #9 (August 6, 1987)
freebie3.hac
Compufreebies 3.1 (1992)
freecis.txt
Free Compuserve Access
funwith5.hac
Fun With Automatic Tellers
g.txt
SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)
garaghak.txt
Garage Door Opener Hacker Plans from Cybertek
gateways
The Inter-Network Mail Guide - Copyright 1990 by John J. Chew
get-vip.txt
DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files
getbust.txt
Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415
getinfo.txt
The Hacker's Guide to Investigations, by Ripper of HALE (1989)
gisdoc.hac
Hacking the GIS computer by Doctor Crash
goodbye.ana
The Best of the Station, by The Prowler
goodkids.hac
Computer Hackers are Good People Too!
govthlp.txt
The Help Screen on some Government System
gs1.txt
Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)
gte.txt
Hacking GTE Telemail by Master Micro
guide.txt
A Novice's Guide to Hacking- 1989 edition by The Mentor
guidedoc.hac
The RSTS User's Guide, by The Flash
guidehak.txt
The Neophyte's Guide to hacking (1993 Edition) by Deicide
gunbelt3.txt
Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)
hacethi.txt
The Ethics of Hacking, by Dissident of TES
hacethic.txt
The Ethics of Hacking by Dissident
hack.faq
Beta .008 of the 2600/#hack FAQ
hack.hac
Hacking And Computer Krashing #9, by Gray Wolf
hack.leg
A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)
hack1.hac
The Basics of Hacking, by the Knights of Shadow (Intro)
hack2.hac
The Basics of Hacking, by The Knights of Shadow (DECs)
hack3
The Basics of Telenet Part I
hack4
Telenet Scanning
hack4.hac
The Basics of Hacking, by The Knights of Shadow (Data General)
hack5.hac
Hacking McDonalds, by Herb of Burger King
hack7
Hacking the Compuserve Information Service
hack7.txt
The Conscience of a Hacker by The Mentor (January 8, 1986)
hack9.hac
Hacking Control Data Corporation's Cyber
hack9301.rpt
The Hack Report Volume 2, Number 1 (January 3, 1993)
hack9302.rpt
The Hack Report Volume 2, Number 2 (February 7, 1993)
hack9303.rpt
The Hack Report Volume 2, Number 3 (March 7, 1993)
hack9304.rpt
The Hack Report Volume 2, Number 4 (April 4, 1993)
hack9305.rpt
The Hack Report Volume 2, Number 5 (May 9, 1993)
hack9306.rpt
The Hack Report Volume 2, Number 6 (June 6, 1993)
hack9307.rpt
The Hack Report Volume 2, Number 7 (July 4, 1993)
hack9309.rpt
The Hack Report Volume 2, Number 9 (September 12, 1993)
hack9401.rpt
The Hack Report Volume 3, Issue 1 (January 29, 1994)
hack_cis.txt
The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
hack_em.hac
The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
hack_s.txt
Harry Hackalot's Official Hacker Address Book for October 1984
hack_ths.txt
The Social Organization of the Computer Underground (Thesis)
hackacr.hac
The Hackers Acronym Chart, compiled by IIRG
hackad.txt
The Famous Hacker's School (Analog Science Fiction Sept. 1990)
hackcos.txt
Hacking COSMOS Part I by Lex Luthor and the Legion of Doom
hackcrak.txt
The Hacker Crackdown, by 2600 Magazine
hackdct1
The Hacker's Jargon File, (November 14, 1982 Version)
hackdict.txt
The Hacker's Dictionary, Older Version, Uncredited!
hacker
The Consience of a Hacker by The Mentor (January 8, 1986)
hacker.tst
The Hacker's Purity Test, June 16, 1989
hacker.txt
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
hacker01.txt
The Social Organization of the Computer Underground: A Thesis
hacker03.txt
The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
hacker1.txt
Diary of a Hacker
hacker11.txt
Hacking Western Union's Easylink
hacker2.txt
The Diary of a Hacker Part II by the Cuisinart Blade
hackerdoc.txt
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)
hackerla
The Hackers' Laws
hackers.par
Advertisement for the Galactic Hacker's Party (August 1989)
hackethic.txt
The Ethics of Hacking by Dissident
hackfaq.10
FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)
hackfaq.txt
The Hack FAQ By Simple Nomad (January 31, 1999)
hackholl.txt
Hacking In Holland by Rop Gonggrijp (October 18, 1988)
hackhp2.hac
Hacking the HP 2000 by Bioc Agent 003
hacking
Description of the New, Bad Definition of Hacking
hacking.dox
Collections of Hacker FIles Downloaded by Consumertronics
hacking.tap
Style Teaches You About How to Be a Proper Hacker
hacking.txt
Hacking Tutorial, by The Jolly Roger
hacking101.hac
HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
hackinga.txt
Hacking Bank Of America's Home Banking System by Dark Creaper
hackingc.txt
Hacking Credit Card Codes by Omni-Kid and The Wyvern
hackinge.txt
Hacking ECONet Systems by Jack Death and Zapper
hackingi.txt
Computerworld Asks People to Hack In, 1984
hackingt.txt
Hacking the Lexington Air Force Computer
hackl1.txt
Hacker's Line #1 by 2TUFF
hacknet.dox
The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC
hacknet.txt
how to Hack Your School's Network, from Dr. Techno of Paradise Lost
hackpcp.hac
The Weenie Warriors present Hacking PC Pursuit Codes
hackprod.txt
How to Hack Prodigy by Desolated Dream
hackprof.txt
Hacker Proof Doors! It IS Possible!
hackquiz.txt
The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas
hackrsts.txt
Hacking RSTS Systems: An Instructional Test
hacksong.txt
The Hacker's Song by Dave Touretzky and Don Libes
hacksynd.hac
The Hackers Syndrome, by Tad Deriso
hacktalk.txt
A Short Hackerspeak Glossary, by the Hollywood User Group
hackterm.txt
Collection of "Hackernyms" by Rad Man version 2.10
hacktest.txt
The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)
hacktips.hac
Hacking Tips #2, by Hoe Hopper
hacktips.txt
Tips for Tracking Hackers
hacktut.txt
Hacking Tutorial, by The Jolly Roger
hackunlm.hu1
Hackers Unlimited Magazine Volume 1 Issue 1
hackusa!.hac
Hackin' USA
hackwarn.hac
A Warning to Hackers
hackwwiv.hac
Hacking into WWIV, Second Edition by Vision
hackwwiv.txt
Hacking into WWIV Software by Vision
haibm370.txt
How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club
hakdec20.txt
An Addendum to A Novice's Guide to Hacking, by The Mentor
hakdic.txt
The Hacker's Dictionary, A Guide to the World of Computer Wizards
hakmedia.txt
Hackers in the Media, List start: 10/28/92 - Doomsday
handbook.txt
Hacking Compuserve: All You Need to Know, by Mr. Perfect
haq1.txt
The HAQ Edition 2.07 (June 11, 1994)
hashish.txt
Hashish: The Exotic Elixir, by EZ Rider
hate.info
Invitation to HATE: Hackers at The End (Summer 1995)
havok1.txt
HAVOK Pack #1: The Return (Collection of Hacking Textfiles)
hckr_hnd.txt
The Hacker's Handbook by Hugo Cornwall (1985)
hckrslg
The Hacker's League, by Lee Felsenstein (March 18, 1992)
hd.hac
Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme
hd01.hac
Hackers Directory Volume #1 by Ninja Squirrel and Logan5
hd02.hac
Hackers Directory Volume #2 by Ninja Squirrel and Logan5
hd03.hac
Hackers Directory Volume #3 by Ninja Squirrel and Logan5
hd04.hac
Hackers Directory Volume #4 by Ninja Squirrel and Logan5
hdigest.txt
The Hacker's Digent by Harry Hackalot (October 1984)
hdindex.txt
Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)
hedrick.txt
An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)
hfnewbies.txt
The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)
hhacking.iix
CAT-HACK Volume 1 from The Mystery
hint.txt
The Czar's Guide to the Young Criminal Accused of Using Computers
his-hp.txt
The History of Hacking and Phreaking by Raven of BOM SQUAD
hk_acces
Draft Chapter of the NIST Computer Security Handbook, from Ed Roback
hk_crypt
Draft Chapter from the NIST Computer Security Handbook, on Cryptography
hk_i&a
Draft of the NIST Computer Security Handbook on Identification and Authentification
hk_polic
Draft of the NIST Computer Security Handbook on Computer and Information Security Policty
hoho93.ad
hoho93cz.hac
hohocon.93
holelist.txt
How Security Holes Manifest Themselves
holes.txt
A List of Holes in Various Operating Systems (April 7, 1993)
homebank.hac
Hacking Bank Of America's Home Banking System by "Dark Creaper"
homebank.txt
Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM
horror_s.tor
Hacking Horror Stories 1982
hp20001.hac
HP 2000 Part 1: Commands by Blitzoid and Galactus
hp20002.hac
HP 2000 Part 2: Statements by Blitzoid and Galactus
hp20003.hac
HP 2000 Part 3: Functions by Blitzoid and Galactus
hp20004.hac
HP 2000 Part 4: Files by Blitzoid and Galactus
hp20005.hac
Hp 2000 Part 5: Matracies by Blitzoid and Galactus
hp30.txt
The Completel Hewlett Packard 3000 Hackers Guide
hp3000.hac
The Complete Hewlett Packard 3000 Hackers Guide
hp3000.txt
The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS
hp3000_t.hac
Hacking the HP 3000 by DE BUG
hp3000g.hac
The Complete Hewlett Packard 3000 Hackers Guide
iah1.txt
The International Hackers' Association Issue #1
ibm-vm70.txt
A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited
ibm370.hac
How to Take Control of your Local IBM 370 by Another Hacker
ibmhack.hac
Hacking the I.B.M. By John Doe
icebook1.txt
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)
icebook2.txt
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus
icon4u.nrg
ICoN Hacking with Loser Access by �����GY�
id-biz.txt
How to Have a Profitable ID Business, by Mr. Puff n' Stuff
identity.txt
How to Create a New Identity by the Walking Glitch
ihg.txt
International Directory of Hacking and Phreaking Organizations, by John Simmons
iirgacr6.txt
The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)
iirgacr7.txt
The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)
iirgacr8.txt
The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
iiu-001.txt
Bust Avoidance for Dipshits by Derision of IIU (1990)
iiu-004.txt
Hacking on the Compuserve Information Service by Darkness (1990)
illinet.txt
Dial-Up Access Numbers for ILLINET Online
info.txt
How to Get Detailed Information on Anybody by DTS
info3.gph
How to Get Anything on Anybody Part III
infoam.txt
Exploring Information-America by Omega and White Knight
informer.hac
TRI : The Remote Informer, Volume 1, Issue #6
innerc.txt
Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth
innercir.hac
Hacking Techniques, Typed in by Logan5 from The Inner Circle
intercep.hac
The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
intercpt.txt
Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods
intruder.dox
SOFTDOCS: Intruder v1.21 by CreaSoft
inttel.hac
European Computers List #1 by Kerrang Khan
issm201.hac
The Information Systems Security Monitor Volume 2 Number 1
issm202.hac
The Information Systems Security Monitor Volume 2 Number 2
issm204.hac
The Information Systems Security Monitor Volume 2 Number 4
issm301.hac
The Information Systems Security Monitor Volume 3 Number 1
issm302.hac
The Information Systems Security Monitor Volume 3 Number 2
issm303.hac
The Information Systems Security Monitor Volume 3 Number 3
issm304.hac
The Information Systems Security Monitor Volume 3 Number 4
jack14.txt
Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)
janet.txt
JANET PAD Listing Revision 1.2 (March 1st, 1990)
jargon211.hac
The Jargon File, v.2.9.11, by Eric S. Raymond
javabugs.txt
JavaScript Problems I've Discovered
keylock.sch
Schematic For an Optoelectronic key Lock by Joe Scharf
keytrap3.txt
SOFTDOCS: Keytrap v3.0 by Dcypher
kfyi-593.hac
KFYI AM Radio 910 interviews Mind Rape and Merc
kill.feds
FEDS: How to Find and Eliminate Them (September 10, 1987)
l0pht.txt
The L0pht... What I saw, by Tfish of RDT
lan.txt
Local Area Networks (LANs) by ANSI-Christ
lca-1.txt
LCA #1: Zen and the Art of Untraceable Hacking, by Flood
lca-2.txt
LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance
lca-3.txt
LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance
lca-4.txt
LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance
lca-5.txt
LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance
lca-6.txt
LCA #6: Beige Boxing, by the Lemon Curry Alliance
ldd.txt
How to Hack into CIS
license.asc
The Guerilla Guide to Licensing Software
list2
Pacific Bell Computer Systems, by Another Hacker
litewave.sch
AM Lightwave Transmitter and Reciever by Joe Scharf
lnoise.hac
Modem Noise Destroyer (Alpha Version)
lodhbasi.hac
The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
logoncbi.hac
How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)
logoncbi.txt
How to Log into a C.B.I System by L.E. Pirate
longpass.txt
Generating Longer Passwords
machack0.5.txt
The Mac Hack FAQ by AX1P (November 22, 1994)
mag_stripes.txt
Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)
magnet.01
Magnetic Stripes on Cards: An Overview
magnet.02
Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)
mailbox.hac
Mailbox Systems: Your Link to the Underworld
main.fra
Main Frames by the Pirate Club
mainfrms.con
A List of Mainframe Dialup Numbers
master.txt
Master Hack Version 1.0 by Master Frodo (January 1, 1991)
mci.txt
MCI Mail Access Numbrs, from The Swamp
mci__acc.txt
List of MCI Access Numbers
mcimail.hac
MCI Mail - The Adventure Continues, by Bioc Agent
mcisprin.t
Hints on Hacking, byt the RAMBUG and Captain Blood
memory.lst
The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)
mgtguide.txt
The NIST Management Guide to the Protection of Information Resources
mickeyd.txt
Hacking McDonalds by Herb the Hacker
micrrisk.hac
Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)
milinet.1
Milnet Access Codes
milnet.txt
How to Use the American Military Net
milnet1.hac
Milnet, by Brigadier General Swipe
mish18.txt
The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)
mism1.hac
How to Get Anything on Anyone Excerpts
mism10.hac
How to Get Anything on Anyone Excerpts
mism20.hac
Mastering the SCANTRON by Warhead
mism42.hac
Xerox Voice Message Exchange Commands, from The Lineman
mob.txt
The Hackers in the MOB
modbook1.txt
The History of MOD: Book One: The Originals
modbook2.txt
The History of MOD: Book Two: Creative Mindz
modbook3.txt
The Book of MOD: Part Three: A Kick in the Groin
modbook4.txt
The Book of MOD: Part Four: End of '90-'1991
modbook5.txt
The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)
morality.hac
Hacker Morality: A Lesson
morestuf.txt
Collection of Hacking Files (Should Eventually be Split up)
morprime.hac
RVEC Parameters and DMSTK Format
mrsts.hac
So you've finally decided to down an RSTS System?
mtempist.hac
The Tempest Method of Data Interception (Needs Editing)
narc3.hac
Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)
ncsc-tg-003.txt
A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
ncsc-tg-016.txt
Guidelines for Writing Trusted Facility Manuals
ncsc-tr-005-2.txt
Introduction to Trusted Computer System Evaluation Criteria
ncsc_oas.txt
A Guideline on Office Automation Security (December 5, 1986)
netbios.txt
Understanding NetBIOS by NeonSurge of Rhino9
netcrack.txt
DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00
networks.phk
2600: How to Send Mail to other Networks
neuroman.pwd
List of DataBases and passwords for the game "Neuromancer"
newid.hac
New Identity Method
newsltr.idx
Index to the Computer Underground Digest Archives (June 13, 1991)
nextbugs.txt
CERT Advisory on the NeXT computer's Software
nfs_trace.txt
NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton
nha-app.txt
Application to Join Network Hackers Alliance (June 1, 1991)
nimbus.txt
Research Machines Nimbus hacking, by The Green Rhino
note9309.txt
The Hack Report, by Lee Jackson (September 1993)
nov-faq.txt
The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad
novell.hac
Collection of security holes in Novell Netware
novell.txt
SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)
novhack.txt
Having Phun With Novell by Lord Foul/Decay (July 13, 1991)
nwhack.faq
Frequently Asked Questions about Hacking Novell Netware by Simple Nomad
obscene.###
TAG FILE: Obscene Phobia BBS (January 1, 1995)
ocfber.1
Bylaws of the Open Computing Facility at UC Berkeley
ocfber.2
Constitution for the Open Computing Facility at UC Berkeley
omron.pin
How to Connect OMRON 3S4YR-HSR4 to your PC
orange
Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
orange.txt
The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)
orgs.hac
A Large List of Computer Security Organizations
orgs.txt
1988 List of Computer Security Organizations
outdial.lst
Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)
outdial.txt
How to Use Outdials: An Introduction by Lorax
outdials.us
Ameican Local Outdials by Sebastian Winchler (March 1991)
outdialsnfo.hac
List of Dialouts
pacbell.lst
Collection of Pacific Bell Computer Systems
packet.txt
Notes on Using Tymenet and Telenet by Michael A. Banks (1989)
pacnet.hac
Hacking into the PACnet System
pactimea.txt
Telephone Numbers for the Pacific Bell Computer System by Another Hacker
passhack.txt
The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press
password.txt
Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)
pcp88.lst
PC Pursuit List Version 1.1 (August 31, 1988)
pcpbas.txt
How to Use PC Pursuit Service
pcphack.phk
Hacking PC Pursuit Codes by The Weenie Warriors
pcphack.txt
The Weenie Warriors Present Hacking PC Pursuit Codes
pcpold.phk
How to Use Telenet's PC Pursuit Service by Z-Man
pcpursue.txt
PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
pcpursui.yes
PC Pursuit and Telenet Local Access Numbers
pdnaxis.txt
The Public Data Network Numbers
pdp11.hac
Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
pentagon.txt
The Milnet File by Brigadier General Swipe/Dispater
ph.txt
Soft Documentation: P-Hack 1.0 by Peter King
phonecom.nfo
Becoming More Informed (Becoming a Hacker)
popper.txt
ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)
prime.hac
A List of PRIME Commands
primecpl.hac
An Introduction to PRIMOS CPL Directives by Necrovore
primer.txt
Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)
primes.txt
Message Base With Discussion of the Watch utlity on PRIME (August, 1988)
primos.hac
Hacking Primos Systems By Nanuk of the North
primos1.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos2.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos3.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos4.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
primos5.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers
psnintro.txt
The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)
psns.txt
An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker
pumpcon.txt
pw-hack.txt
The Art of Password Hacking by HIT
qsd.txt
How to Access Minitel or How to Have FUN on QSD
racintro
Information on RAC: A Host System Used for Access to GEnie and AppleLink
raclog1
An Example of an RAC Login
raclog2
An Example of an RAC Login, Part II
ram1
Hacking Rampart Systems Part 1
ram2
Hacking Rampart Systems Part 1 (cont)
ram5
Hacking Rampart Systems Part 2
ram6
Hacking Rampart Systems Part 2 (cont)
ramcomm.hac
Hacking RAM Communications (Pager)
rampart1.hac
Hacking Rampart Systems by Whackoland
rampart2.hac
Hacking Rampart Systems by Whackoland Part II
rcaglobe.txt
The RCA Network Part I by the Telex Troopers
read.me
A Story About the TSR That Catches Passwords, and a short History
readme.now
SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker
readme.txt
Force Files Explanation
reid.txt
The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)
revblt.hac
Review of Federal Agency Computer Security and Privacy Plans
riacs
Principles of Responsible Use of RIACS Computing Facilities
rimeman.hac
RIME User's Guide
ripco.txt
The Doctor Ripco Seizure by Full Disclosure (1991)
risks.txt
Avoiding the Risks of Hacking: A List of Suggestions by IC
risktool.hac
Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)
rom.txt
Macintosh ROM Secrets by The Cloud (November 23, 1990)
rowdy_dl.man
DocumentationL The Rowdy Dialer (April 1993)
rspwd.new
Some Downloaded Password File
rsts.hac
So You've Decided to Down a RSTS System, by Sam Sneed
rsx11.hac
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
rsx11m.txt
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital
ruhacker.txt
Are You a Hacker? By ReDragon
sanatmdoc.hac
Getting into an ATM
saruman.add
TAG: Saruman BBS Ad
satan~1.txt
A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)
satcon.txt
Satellite Control, by Ninja Squirrel & Logan-5
satelit3.txt
Satellite Scrambling Systems: The Truth, by XL
satelite.txt
Satellite Frequencies, by Sir Francis Drake
scanprg.txt
What To Look For In A Code Hacking Program, by Dissident
school.txt
Screwing with School Computers, by Liquid Bug
secrets2.hac
Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
secrets3.hac
Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
secretsdoc.hac
Young's Demonstrative Translation of Scientific Secrets (1861)
securdev.txt
Technical Hacking Volume 1 by the Warelock
security
Overview of Computer Security by E.A. Bedwell, EDP Specialist
security.fy8
Site Security Handbook, 1991
security.txt
Professor Falken's Guide to CODE Hacking Security
sequence.txt
Sequence Number Attacks, by Rik Farrow
sha.hac
Swedish Hackers Association Annual Year Protocol #4
shadec.txt
The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
shahewl.txt
Swedish Hacking Association presents Hacking HP 3000 Part 1
shaprot3.txt
The 3rd Protocol (1990) by The Swedish Hackers Association
shawn-file-check
The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions
shw0293.asc
Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn
shw0394.asc
Syndicated Hack Watch (March 1994) by John McCormac
shw0494.asc
Syndicated Hack Watch (April 1994)
shw0593.asc
Red Hot Television is Banned
shw0893.asc
The Start of the Skybox Cable War
shw0993.asc
Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"
shw0994.bbs
Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control
shw1093.asc
Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press
skel_key.txt
SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society
skey.txt
Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn
skeyfl.txt
Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries
skyhack.hac
The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)
sniffer.txt
FAQ: The Sniffer FAQ Version 1.7
snoop
Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca
snoop.txt
Data Snooping the Right Way by Lee Day
sourcetelnet.txt
The Source Telnet Directory, and Uninet Directory
ss-info2.txt
The Social Security Number, by Barbara Bennett
ssan.hac
The Social Security Number
ssn-stuf.txt
More about why Social Security Numbers are Insecure
ssnum.ana
About Social Security Numbers
starlink.txt
Information on Galaxy Starlink: A User's Guide
starmast.txt
Hacking the Gandalf Starmaster by Deicide (May 22, 1993)
statemind.txt
So, You Wanna Be a Hacker? It's a State of Mind!
stoll.doc
Writings of Clifford Stoll
storehac
Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)
stupidki.hac
Those Stupid Little Bastard Hackers!
sun413.txt
How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)
sundevil.txt
Operation Sundevil, by the Prodigy
superd.txt
DocumentationL Superdial 1.03 by Evan Anderson
sys75.hac
The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
ta&m.txt
Texas A&M Network Security Package Overview 7/1/1993
tachelp
Captures of Information on TACACS by The Argonaut
tan.txt
List of Telenet Access Numbers by Daredevil of P/HUN
tcp-ip.txt
FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)
tcsb.03
Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)
tcsb.04
An Introduction to PRIMOS CPL Directives by Necrovore
tcsb.05
Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)
tcsb.06
Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)
tcsb.08
Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)
tcsb.11
Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)
tcsb.12
Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988
techhack.hac
A Guide to ADS System, by Lord Digital and the Phantom
techiq.txt
Hacking Techniques, by Logan-5 (Hacker Supreme)
technicl.txt
Technical Hacking: Volume One by the Warelock
tele3.txt
Telenet Scanning by Doc Telecom (July 11, 1988)
tele4.txt
An Overview of Telenet by Man Max
tele5.hac
Hacking Telnet by The Flash
telecode.txt
Telenet Codes, Hacked Out by ZORON (May 1, 1988)
telecomm.txt
An Introductory Guide to Telenet Commands
teleinfo.txt
Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)
telenet.hac
Telenet: The Secret Exposed
telenet.txt
An Introductory Guide to Telenet Commands
telenet2.txt
A Good amount of general Telenet Information
teleneth.txt
An Introductory Guide to Telenet Commands
teleneti
Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)
teleneti.phk
Instructions for using TELENET.
telescan.txt
Information on Telenet Scanning
tellerma.txt
Cracking Auto Bank Teller Machines by the Suspect
teln2.txt
Telenet Terminal Identifiers
teln3.txt
Welcome to the TCO Access Listing (September 15, 1987)
telnetsn.txt
Telenet Scanning by Doc Telecom (July 11, 1988)
telnumbe.txt
Telenet Access Numbers, by the Weenie Warriors
teltermz.txt
List of Terminal Identifiers
tempest.hac
Excerpt of article on Tempest
thc.nfo
NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)
thc2.nfo
The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)
thehaq.txt
The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)
thuglan1.txt
Introduction to Hacking into LANs by THUG
thuglan2.txt
General Information on LANs by THUG (July 31, 1991)
tihack2.txt
Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)
timenet.txt
Hacking Tymnet by Byte Brain
tl-user.txt
ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas
tl.q-a
ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual
tmplefun.txt
Fun with Temple's Computers (A How To)
tnet1.txt
Tymnet File #1 by The Twilight Phone
tnet2.txt
Tymnet File #2 by The Twilight Phone
tnet3.txt
Tymnet File #3 by The Twilight Phone
tnpcpod.txt
TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom
tops20.txt
Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!
transdir.txt
The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
trash.txt
Dumpster Diving: An overview of the legality, by Full Disclosure
trashing.rot
The Art of Trashing by Deicide
traxtool.txt
The Trax Toolbox Volume #001 by Track
triad187.hac
The Triad: A 3-in-1 Textfile Magazine, Issue #1
trojan
Rumors of Worms and Trojan Horses by Mike Guffey
tsrcrack.txt
SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)
ttyspoof.txt
TTY Spoofing, by SubEthan
tym_ods.txt
TymNet OutDials Sorted By Area Code
tyme2.txt
International Packet Switching Services Description
tymenet.hac
Tymenet Technical and User Information
tymnet.ods
Listing of Tymnet ODS Systems
tymnet.txt
Packet Networks I and other Tymnet Information by Digital Demon, 1990
tymnet96.txt
BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)
ueber.txt
A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)
uk.dialups
A List of Modem Dialups in the UK (September 22, 1990)
ukguide.hac
The Guide to Online Databases for UK Users
ulimate.txt
The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)
ultrad3.txt
The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy
unineta.phk
Uninet Information, from The South Pole
unp.txt
SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)
up.txt
SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)
usrguide.txt
The NIST Computer User's Guide to the Protection of Information Resources
vanish.txt
The Hacker Who Vanished: Suicide or Clever Hoax?
vax-7.txt
vendors.hac
Large Security Vendors List
verstell.ana
Neat Fun with Versatellers
virus
Attack of the Computer Virus, by Lee Dembart
vmbhack.txt
Hacking Voice Mail Boxes by Tik Tak
vmsptuto.txt
The IBM VMSSP System, by The Motorhead
vthack1.txt
The VT Hacker, by the Man Hermit
vthack2.txt
The VT Hacker #2, by the Mad Hermit
vthack3.txt
The VT Hacker #3, by The Mad Hermit
vtp.txt
A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)
wal-mart.txt
Hacking the Wal-Mart Armorguard Computer Protection System
wanghack.hac
Hacking the Wang OS, by Dark Knight
wargames
The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)
wargames.hum
Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock
watching
Watching the Watcher Watching You by Sir Knight
wats.txt
WATS Version 1.0 by Professor Falken & The Aptolcater
whca_txtmsg.log
The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!
xerox.hac
Hacking Xerox
xmux.txt
The ROT Guide to Gandalf XMUX's by Deicide
zen.hac
Dan Farmer's Improving the Security of Your Site by Breaking Into It
zippass.txt
The Security of PKZIP Encryption
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment