mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1399 lines
45 KiB
Text
1399 lines
45 KiB
Text
==Phrack Magazine==
|
|
|
|
Volume Six, Issue Forty-Seven, File 8 of 22
|
|
|
|
|
|
05. What are some gopher sites of interest to hackers?
|
|
|
|
ba.com (Bell Atlantic)
|
|
csrc.ncsl.nist.gov (NIST Security Gopher)
|
|
gopher.acm.org (SIGSAC (Security, Audit & Control))
|
|
gopher.cpsr.org (Computer Professionals for Social Responsibility)
|
|
gopher.cs.uwm.edu
|
|
gopher.eff.org (Electonic Frontier Foundation)
|
|
gw.PacBell.com (Pacific Bell)
|
|
iitf.doc.gov (NITA -- IITF)
|
|
oss.net (Open Source Solutions)
|
|
spy.org (Computer Systems Consulting)
|
|
wiretap.spies.com (Wiretap)
|
|
|
|
|
|
06. What are some World wide Web (WWW) sites of interest to hackers?
|
|
|
|
http://alumni.caltech.edu/~dank/isdn/ (ISDN)
|
|
http://aset.rsoc.rockwell.com (NASA/MOD AIS Security)
|
|
http://aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec)
|
|
http://att.net/dir800 (800 directory)
|
|
http://ausg.dartmouth.edu/security.html (Security)
|
|
http://cs.purdue.edu/coast/coast.html (Coast)
|
|
http://csrc.ncsl.nist.gov (NIST)
|
|
http://dhp.com/~pluvius
|
|
http://dfw.net/~aleph1 (Eubercrackers)
|
|
http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
|
|
http://everest.cs.ucdavis.edu/Security.html (Security)
|
|
http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
|
|
http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR)
|
|
http://first.org (FIRST)
|
|
http://ftp.tamu.edu/~abr8030/security.html (Security)
|
|
http://hightop.nrl.navy.mil/potpourri.html (Security)
|
|
http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books)
|
|
http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
|
|
http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
|
|
http://info.bellcore.com/BETSI/betsi.html (Betsi)
|
|
http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC)
|
|
http://l0pht.com (The l0pht)
|
|
http://l0pht.com/~oblivion/IIRG.html (Phantasy Magazine)
|
|
http://mindlink.jolt.com (The Secrets of LockPicking)
|
|
http://mls.saic.com (SAIC MLS)
|
|
http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage)
|
|
http://nasirc.hq.nasa.gov (NASA ASIRC)
|
|
http://ophie.hughes.american.edu/~ophie
|
|
http://ripco.com:8080/~glr/glr.html (Full Disclosure)
|
|
http://spy.org (CSC)
|
|
http://tansu.com.au/Info/security.html (Comp and Net Security)
|
|
http://the-tech.mit.edu (LaMacchia case info)
|
|
http://wintermute.itd.nrl.navy.mil/5544.html (Network Security)
|
|
http://www.aads.net (Ameritech)
|
|
http://www.alw.nih.gov/WWW/security.html (Unix Security)
|
|
http://www.artcom.de/CCC (CCC Homepage)
|
|
http://www.aspentec.com/~frzmtdb/fun/hacker.html
|
|
http://www.aus.xanadu.com:70/1/EFA (EFF Australia)
|
|
http://www.ba.com (Bell Atlantic)
|
|
http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
|
|
http://www.bell.com (MFJ Task Force)
|
|
http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products)
|
|
http://www.brad.ac.uk/~nasmith/index.html
|
|
http://www.bst.bls.com (BellSouth)
|
|
http://www.c3.lanl.gov/~mcn (Lanl)
|
|
http://www.cert.dfn.de/ (German First Team)
|
|
http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
|
|
http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
|
|
http://www.cpsr.org/home (CPSR)
|
|
http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
|
|
http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
|
|
http://www.cs.umd.edu/~lgas
|
|
http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
|
|
http://www.csd.harris.com/secure_info.html (Harris)
|
|
http://www.csl.sri.com (SRI Computer Science Lab)
|
|
http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
|
|
http://www.datafellows.fi (Data Fellows)
|
|
http://www.delmarva.com/raptor/raptor.html (Raptor Network Isolator)
|
|
http://www.demon.co.uk/kbridge (KarlBridge)
|
|
http://www.digicash.com/ecash/ecash-home.html (Digital Cash)
|
|
http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
|
|
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
|
|
http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems)
|
|
http://www.eff.org/papers.html (EFF)
|
|
http://www.engin.umich.edu/~jgotts/boxes.html (Box info)
|
|
http://www.engin.umich.edu/~jgotts/hack-faq.html(This document)
|
|
http://www.engin.umich.edu/~jgotts/underground.html
|
|
http://www.ensta.fr/internet/unix/sys_admin (System administration)
|
|
http://www.etext.org/Zines/ (Zines)
|
|
http://www.fc.net/defcon (DefCon)
|
|
http://www.fc.net/phrack.html (Phrack Magazine)
|
|
http://www.first.org/first/ (FIRST)
|
|
http://www.greatcircle.com (Great Circle Associates)
|
|
http://www.hpcc.gov/blue94/section.4.6.html (NSA)
|
|
http://www.ic.gov (The CIA)
|
|
http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
|
|
http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
|
|
http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
|
|
http://www.net23.com (Max Headroom)
|
|
http://www.nist.gov (NIST)
|
|
http://www.pacbell.com (Pacific Bell)
|
|
http://www.paranoia.com/mthreat (ToneLoc)
|
|
http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
|
|
http://www.phantom.com/~king (Taran King)
|
|
http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography)
|
|
http://www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA)
|
|
http://www.research.att.com (AT&T)
|
|
http://ripco.com:8080/~glr/glr.html (Full Disclosure)
|
|
http://www.rsa.com (RSA Data Security)
|
|
http://www.satelnet.org/~ccappuc
|
|
http://www.service.com/cm/uswest/usw1.html (USWest)
|
|
http://www.shore.net/~oz/welcome.html (Hack TV)
|
|
http://www.spy.org (Computer Systems Consulting)
|
|
http://www.sri.com (SRI)
|
|
http://www.tansu.com.au/Info/security.html (Security Reference Index)
|
|
http://www.tis.com (Trusted Information Systems)
|
|
http://www.tri.sbc.com (Southwestern Bell)
|
|
http://www.uci.agh.edu.pl/pub/security (Security)
|
|
http://www.umcc.umich.edu/~doug/virus-faq.html (Virus)
|
|
http://www.usfca.edu/crackdown/crack.html (Hacker Crackdown)
|
|
http://www.wam.umd.edu/~ankh/Public/devil_does_unix
|
|
http://www.wiltel.com (Wiltel)
|
|
http://www.winternet.com/~carolann/dreams.html
|
|
http://www.wired.com (Wired Magazine)
|
|
|
|
|
|
07. What are some IRC channels of interest to hackers?
|
|
|
|
#2600
|
|
#cellular
|
|
#hack
|
|
#phreak
|
|
#linux
|
|
#realhack
|
|
#root
|
|
#unix
|
|
#warez
|
|
|
|
|
|
08. What are some BBS's of interest to hackers?
|
|
|
|
Rune Stone (203)832-8441
|
|
Hacker's Haven (303)343-4053
|
|
Independent Nation (315)656-4179
|
|
Ut0PiA (315)656-5135
|
|
underworld_1994.com (514)683-1894
|
|
Digital Fallout (516)378-6640
|
|
Alliance Communications (612)251-8596
|
|
Maas-Neotek (617)855-2923
|
|
Apocalypse 2000 (708)676-9855
|
|
K0dE Ab0dE (713)579-2276
|
|
fARM R0Ad 666 (713)855-0261
|
|
|
|
|
|
09. What are some books of interest to hackers?
|
|
|
|
General Computer Security
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Computer Security Basics
|
|
Author: Deborah Russell and G.T. Gengemi Sr.
|
|
Publisher: O'Reilly & Associates, Inc.
|
|
Copyright Date: 1991
|
|
ISBN: 0-937175-71-4
|
|
|
|
This is an excellent book. It gives a broad overview of
|
|
computer security without sacrificing detail. A must read for
|
|
the beginning security expert.
|
|
|
|
Computer Security Management
|
|
Author: Karen Forcht
|
|
Publisher: Boyd and Fraser
|
|
Copyright Date: 1994
|
|
ISBN: 0-87835-881-1
|
|
|
|
Information Systems Security
|
|
Author: Philip Fites and Martin Kratz
|
|
Publisher: Van Nostrad Reinhold
|
|
Copyright Date: 1993
|
|
ISBN: 0-442-00180-0
|
|
|
|
Computer Related Risks
|
|
Author: Peter G. Neumann
|
|
Publisher: Addison-Wesley
|
|
Copyright Date: 1995
|
|
ISBN: 0-201-55805-X
|
|
|
|
Computer Security Management
|
|
Author: Karen Forcht
|
|
Publisher: boyd & fraser publishing company
|
|
Copyright Date: 1994
|
|
ISBN: 0-87835-881-1
|
|
|
|
The Stephen Cobb Complete Book of PC and LAN Security
|
|
Author: Stephen Cobb
|
|
Publisher: Windcrest Books
|
|
Copyright Date: 1992
|
|
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)
|
|
|
|
Security in Computing
|
|
Author: Charles P. Pfleeger
|
|
Publisher: Prentice Hall
|
|
Copyright Date: 1989
|
|
ISBN: 0-13-798943-1.
|
|
|
|
Building a Secure Computer System
|
|
Author: Morrie Gasser
|
|
Publisher: Van Nostrand Reinhold Co., New York.
|
|
Copyright Date:
|
|
ISBN: 0-442-23022-2
|
|
|
|
Modern Methods for Computer Security
|
|
Author: Lance Hoffman
|
|
Publisher: Prentice Hall
|
|
Copyright Date: 1977
|
|
ISBN:
|
|
|
|
Windows NT 3.5 Guidelines for Security, Audit and Control
|
|
Author:
|
|
Publisher: Microsoft Press
|
|
Copyright Date:
|
|
ISBN: 1-55615-814-9
|
|
|
|
|
|
Unix System Security
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
Practical Unix Security
|
|
Author: Simson Garfinkel and Gene Spafford
|
|
Publisher: O'Reilly & Associates, Inc.
|
|
Copyright Date: 1991
|
|
ISBN: 0-937175-72-2
|
|
|
|
Finally someone with a very firm grasp of Unix system security
|
|
gets down to writing a book on the subject. Buy this book.
|
|
Read this book.
|
|
|
|
Firewalls and Internet Security
|
|
Author: William Cheswick and Steven Bellovin
|
|
Publisher: Addison Wesley
|
|
Copyright Date: 1994
|
|
ISBN: 0-201-63357-4
|
|
|
|
Unix System Security
|
|
Author: Rik Farrow
|
|
Publisher: Addison Wesley
|
|
Copyright Date: 1991
|
|
ISBN: 0-201-57030-0
|
|
|
|
Unix Security: A Practical Tutorial
|
|
Author: N. Derek Arnold
|
|
Publisher: McGraw Hill
|
|
Copyright Date: 1993
|
|
ISBN: 0-07-002560-6
|
|
|
|
Unix System Security: A Guide for Users and Systems Administrators
|
|
Author: David A. Curry
|
|
Publisher: Addison-Wesley
|
|
Copyright Date: 1992
|
|
ISBN: 0-201-56327-4
|
|
|
|
Unix System Security
|
|
Author: Patrick H. Wood and Stephen G. Kochan
|
|
Publisher: Hayden Books
|
|
Copyright Date: 1985
|
|
ISBN: 0-672-48494-3
|
|
|
|
Unix Security for the Organization
|
|
Author: Richard Bryant
|
|
Publisher: Sams
|
|
Copyright Date: 1994
|
|
ISBN: 0-672-30571-2
|
|
|
|
|
|
Network Security
|
|
~~~~~~~~~~~~~~~~
|
|
Network Security Secrets
|
|
Author: David J. Stang and Sylvia Moon
|
|
Publisher: IDG Books
|
|
Copyright Date: 1993
|
|
ISBN: 1-56884-021-7
|
|
|
|
Not a total waste of paper, but definitely not worth the
|
|
$49.95 purchase price. The book is a rehash of previously
|
|
published information. The only secret we learn from reading
|
|
the book is that Sylvia Moon is a younger woman madly in love
|
|
with the older David Stang.
|
|
|
|
Complete Lan Security and Control
|
|
Author: Peter Davis
|
|
Publisher: Windcrest / McGraw Hill
|
|
Copyright Date: 1994
|
|
ISBN: 0-8306-4548-9 and 0-8306-4549-7
|
|
|
|
Network Security
|
|
Author: Steven Shaffer and Alan Simon
|
|
Publisher: AP Professional
|
|
Copyright Date: 1994
|
|
ISBN: 0-12-638010-4
|
|
|
|
|
|
Cryptography
|
|
~~~~~~~~~~~~
|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
|
|
Author: Bruce Schneier
|
|
Publisher: John Wiley & Sons
|
|
Copyright Date: 1994
|
|
ISBN: 0-471-59756-2
|
|
|
|
Bruce Schneier's book replaces all other texts on
|
|
cryptography. If you are interested in cryptography, this is
|
|
a must read. This may be the first and last book on
|
|
cryptography you may ever need to buy.
|
|
|
|
Cryptography and Data Security
|
|
Author: Dorothy Denning
|
|
Publisher: Addison-Wesley Publishing Co.
|
|
Copyright Date: 1982
|
|
ISBN: 0-201-10150-5
|
|
|
|
Protect Your Privacy: A Guide for PGP Users
|
|
Author: William Stallings
|
|
Publisher: Prentice-Hall
|
|
Copyright Date: 1994
|
|
ISBN: 0-13-185596-4
|
|
|
|
|
|
Programmed Threats
|
|
~~~~~~~~~~~~~~~~~~
|
|
The Little Black Book of Computer Viruses
|
|
Author: Mark Ludwig
|
|
Publisher: American Eagle Publications
|
|
Copyright Date: 1990
|
|
ISBN: 0-929408-02-0
|
|
|
|
The original, and still the best, book on computer viruses.
|
|
No media hype here, just good clean technical information.
|
|
|
|
Computer Viruses, Artificial Life and Evolution
|
|
Author: Mark Ludwig
|
|
Publisher: American Eagle Publications
|
|
Copyright Date: 1993
|
|
ISBN: 0-929408-07-1
|
|
|
|
Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
|
|
Threats to Your System
|
|
Author: John McAfee and Colin Haynes
|
|
Publisher: St. Martin's Press
|
|
Copyright Date: 1989
|
|
ISBN: 0-312-03064-9 and 0-312-02889-X
|
|
|
|
The Virus Creation Labs: A Journey Into the Underground
|
|
Author: George Smith
|
|
Publisher: American Eagle Publications
|
|
Copyright Date: 1994
|
|
ISBN:
|
|
|
|
|
|
Telephony
|
|
~~~~~~~~~
|
|
Engineering and Operations in the Bell System
|
|
Author: R.F. Rey
|
|
Publisher: Bell Telephont Laboratories
|
|
Copyright Date: 1983
|
|
ISBN: 0-932764-04-5
|
|
|
|
Although hopelessly out of date, this book remains *THE* book
|
|
on telephony. This book is 100% Bell, and is loved by phreaks
|
|
the world over.
|
|
|
|
Telephony: Today and Tomorrow
|
|
Author: Dimitris N. Chorafas
|
|
Publisher: Prentice-Hall
|
|
Copyright Date: 1984
|
|
ISBN: 0-13-902700-9
|
|
|
|
The Telecommunications Fact Book and Illustrated Dictionary
|
|
Author: Ahmed S. Khan
|
|
Publisher: Delmar Publishers, Inc.
|
|
Copyright Date: 1992
|
|
ISBN: 0-8273-4615-8
|
|
|
|
I find this dictionary to be an excellent reference book on
|
|
telephony, and I recommend it to anyone with serious
|
|
intentions in the field.
|
|
|
|
Tandy/Radio Shack Cellular Hardware
|
|
Author: Judas Gerard and Damien Thorn
|
|
Publisher: Phoenix Rising Communications
|
|
Copyright Date: 1994
|
|
ISBN:
|
|
|
|
The Phone Book
|
|
Author: Carl Oppendahl
|
|
Publisher: Consumer Reports
|
|
Copyright Date:
|
|
ISBN: 0-89043-364-x
|
|
|
|
Listing of every cellular ID in the us, plus roaming ports,
|
|
and info numbers for each carrier.
|
|
|
|
Principles of Caller I.D.
|
|
Author:
|
|
Publisher: International MicroPower Corp.
|
|
Copyright Date:
|
|
ISBN:
|
|
|
|
|
|
Hacking History and Culture
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
|
|
Author: Bruce Sterling
|
|
Publisher: Bantam Books
|
|
Copyright Date: 1982
|
|
ISBN: 0-553-56370-X
|
|
|
|
Bruce Sterling has recently released the book FREE to the net.
|
|
The book is much easier to read in print form, and the
|
|
paperback is only $5.99. Either way you read it, you will be
|
|
glad you did. Mr. Sterling is an excellent science fiction
|
|
author and has brought his talent with words to bear on the
|
|
hacking culture. A very enjoyable reading experience.
|
|
|
|
Cyberpunk
|
|
Author: Katie Hafner and John Markoff
|
|
Publisher: Simon and Schuster
|
|
Copyright Date: 1991
|
|
ISBN: 0-671-77879-X
|
|
|
|
The Cuckoo's Egg
|
|
Author: Cliff Stoll
|
|
Publisher: Simon and Schuster
|
|
Copyright Date: 1989
|
|
ISBN: 0-671-72688-9
|
|
|
|
Hackers: Heroes of the Computer Revolution
|
|
Author: Steven Levy
|
|
Publisher: Doubleday
|
|
Copyright Date: 1984
|
|
ISBN: 0-440-13495-6
|
|
|
|
|
|
Unclassified
|
|
~~~~~~~~~~~~
|
|
The Hacker's Handbook
|
|
Author: Hugo Cornwall
|
|
Publisher: E. Arthur Brown Company
|
|
Copyright Date:
|
|
ISBN: 0-912579-06-4
|
|
|
|
Secrets of a Super Hacker
|
|
Author: The Knightmare
|
|
Publisher: Loompanics
|
|
Copyright Date: 1994
|
|
ISBN: 1-55950-106-5
|
|
|
|
The Knightmare is no super hacker. There is little or no real
|
|
information in this book. The Knightmare gives useful advice
|
|
like telling you not to dress up before going trashing.
|
|
The Knightmare's best hack is fooling Loompanics into
|
|
publishing this garbage.
|
|
|
|
The Day The Phones Stopped
|
|
Author: Leonard Lee
|
|
Publisher: Primus / Donald I Fine, Inc.
|
|
Copyright Date: 1992
|
|
ISBN: 1-55611-286-6
|
|
|
|
Total garbage. Paranoid delusions of a lunatic. Less factual
|
|
data that an average issue of the Enquirer.
|
|
|
|
Information Warfare
|
|
Author: Winn Swartau
|
|
Publisher: Thunder Mountain Press
|
|
Copyright Date: 1994
|
|
ISBN: 1-56025-080-1
|
|
|
|
An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
|
|
Author: Doug Richardson
|
|
Publisher: Salamander Press
|
|
Copyright Date:
|
|
ISBN: 0-668-06497-8
|
|
|
|
|
|
10. What are some videos of interest to hackers?
|
|
|
|
'Unauthorized Access' by Annaliza Savage
|
|
$25 on VH S format in 38-min
|
|
Savage Productions
|
|
1803 Mission St., #406
|
|
Santa Cruz, CA 95060
|
|
|
|
|
|
11. What are some mailing lists of interest to hackers?
|
|
|
|
Academic Firewalls
|
|
Reflector Address:
|
|
Registration Address: Send a message to majordomo@greatcircle.com
|
|
containing the line "subscribe firewalls user@host"
|
|
|
|
Bugtraq
|
|
Reflector Address: bugtraq@fc.net
|
|
Registration Address: bugtraq-request@fc.net
|
|
|
|
Cert Tools
|
|
Reflector Address: cert-tools@cert.org
|
|
Registration Address: cert-tools-request@cert.org
|
|
|
|
Computers and Society
|
|
Reflector Address: Comp-Soc@limbo.intuitive.com
|
|
Registration Address: taylor@limbo.intuitive.com
|
|
|
|
Coordinated Feasibility Effort to Unravel State Data
|
|
Reflector Address: ldc-sw@cpsr.org
|
|
Registration Address:
|
|
|
|
CPSR Announcement List
|
|
Reflector Address: cpsr-announce@cpsr.org
|
|
Registration Address:
|
|
|
|
CPSR - Intellectual Property
|
|
Reflector Address: cpsr-int-prop@cpsr.org
|
|
Registration Address:
|
|
|
|
CPSR - Internet Library
|
|
Reflector Address: cpsr-library@cpsr.org
|
|
Registration Address:
|
|
|
|
DefCon Announcement List
|
|
Reflector Address:
|
|
Registration Address: Send a message to majordomo@fc.net containing
|
|
the line "subscribe dc-announce"
|
|
|
|
DefCon Chat List
|
|
Reflector Address:
|
|
Registration Address: Send a message to majordomo@fc.net containing
|
|
the line "subscribe dc-stuff"
|
|
|
|
IDS (Intruder Detection Systems)
|
|
Reflector Address:
|
|
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
|
|
containing the line "subscribe ids"
|
|
|
|
Macintosh Security
|
|
Reflector Address: mac-security@eclectic.com
|
|
Registration Address: mac-security-request@eclectic.com
|
|
|
|
NeXT Managers
|
|
Reflector Address:
|
|
Registration Address: next-managers-request@stolaf.edu
|
|
|
|
Phiber-Scream
|
|
Reflector Address:
|
|
Registration Address: Send a message to listserv@netcom.com
|
|
containing the line "subscribe phiber-scream user@host"
|
|
|
|
phruwt-l (Macintosh H/P)
|
|
Reflector Address:
|
|
Registration Address: Send a message to filbert@netcom.com
|
|
with the subject "phruwt-l"
|
|
|
|
rfc931-users
|
|
Reflector Address: rfc931-users@kramden.acf.nyu.edu
|
|
Registration Address: brnstnd@nyu.edu
|
|
|
|
RSA Users
|
|
Reflector Address: rsaref-users@rsa.com
|
|
Registration Address: rsaref-users-request@rsa.com
|
|
|
|
|
|
12. What are some print magazines of interest to hackers?
|
|
|
|
2600 - The Hacker Quarterly
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
E-mail address: 2600@well.sf.ca.us
|
|
|
|
Subscription Address: 2600 Subscription Dept
|
|
PO Box 752
|
|
Middle Island, NY 11953-0752
|
|
|
|
Letters and article submission address: 2600 Editorial Dept
|
|
PO Box 99
|
|
Middle Island, NY 11953-0099
|
|
|
|
Subscriptions: United States: $21/yr individual, $50 corporate.
|
|
Overseas: $30/yr individual, $65 corporate.
|
|
|
|
|
|
Gray Areas
|
|
~~~~~~~~~~
|
|
Gray Areas examines gray areas of law and morality and subject matter
|
|
which is illegal, immoral and/oe controversial. Gray Areas explores
|
|
why hackers hack and puts hacking into a sociological framework of
|
|
deviant behavior.
|
|
|
|
E-Mail Address: grayarea@well.sf.ca.us
|
|
E-Mail Address: grayarea@netaxs.com
|
|
|
|
U.S. Mail Address: Gray Areas
|
|
PO Box 808
|
|
Broomall, PA 19008
|
|
|
|
Subscriptions: $26.00 4 issues first class
|
|
$34.00 4 issues foreign (shipped air mail)
|
|
|
|
|
|
Wired
|
|
~~~~~
|
|
Subscription Address: subscriptions@wired.com
|
|
or: Wired
|
|
PO Box 191826
|
|
San Francisco, CA 94119-9866
|
|
|
|
Letters and article submission address: guidelines@wired.com
|
|
or: Wired
|
|
544 Second Street
|
|
San Francisco, CA 94107-1427
|
|
|
|
Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
|
|
|
|
|
|
Nuts & Volts
|
|
~~~~~~~~~~~~
|
|
T& L Publications
|
|
430 Princeland Court
|
|
Corona, CA 91719
|
|
(800)783-4624 (Voice) (Subscription Only Order Line)
|
|
(909)371-8497 (Voice)
|
|
(909)371-3052 (Fax)
|
|
CIS: 74262,3664
|
|
|
|
|
|
13. What are some e-zines of interest to hackers?
|
|
|
|
CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo
|
|
Empire Times ftp.etext.org /pub/Zines/Emptimes
|
|
Phrack ftp.fc.net /pub/phrack
|
|
|
|
|
|
14. What are some organizations of interest to hackers?
|
|
|
|
Computer Professionals for Social Responsibility (CPSR)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
CPSR empowers computer professionals and computer users to advocate
|
|
for the responsible use of information technology and empowers all who
|
|
use computer technology to participate in the public debate. As
|
|
technical experts, CPSR members provide the public and policymakers
|
|
with realistic assessments of the power, promise, and limitations of
|
|
computer technology. As an organization of concerned citizens, CPSR
|
|
directs public attention to critical choices concerning the
|
|
applications of computing and how those choices affect society.
|
|
|
|
By matching unimpeachable technical information with policy
|
|
development savvy, CPSR uses minimum dollars to have maximum impact
|
|
and encourages broad public participation in the shaping of technology
|
|
policy.
|
|
|
|
Every project we undertake is based on five principles:
|
|
|
|
* We foster and support public discussion of and public
|
|
responsibility for decisions involving the use of computers in
|
|
systems critical to society.
|
|
|
|
* We work to dispel popular myths about the infallibility of
|
|
technological systems.
|
|
|
|
* We challenge the assumption that technology alone can solve
|
|
political and social problems.
|
|
|
|
* We critically examine social and technical issues within the
|
|
computer profession, nationally and internationally.
|
|
|
|
* We encourage the use of computer technology to improve the quality
|
|
of life.
|
|
|
|
CPSR Membership Categories
|
|
75 REGULAR MEMBER
|
|
50 Basic member
|
|
200 Supporting member
|
|
500 Sponsoring member
|
|
1000 Lifetime member
|
|
20 Student/low income member
|
|
50 Foreign subscriber
|
|
50 Library/institutional subscriber
|
|
|
|
CPSR National Office
|
|
P.O. Box 717
|
|
Palo Alto, CA 94301
|
|
415-322-3778
|
|
415-322-3798 (FAX)
|
|
E-mail: cpsr@csli.stanford.edu
|
|
|
|
|
|
Electronic Frontier Foundation (EFF)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
|
|
of policies and activities that will advance freedom and openness in
|
|
computer-based communications. It is a member-supported, nonprofit
|
|
group that grew from the conviction that a new public interest
|
|
organization was needed in the information age; that this organization
|
|
would enhance and protect the democratic potential of new computer
|
|
communications technology. From the beginning, the EFF determined to
|
|
become an organization that would combine technical, legal, and public
|
|
policy expertise, and would apply these skills to the myriad issues
|
|
and concerns that arise whenever a new communications medium is born.
|
|
|
|
Memberships are $20.00 per year for students, $40.00 per year for
|
|
regular members, and $100.00 per year for organizations.
|
|
|
|
The Electronic Frontier Foundation, Inc.
|
|
666 Pennsylvania Avenue S.E., Suite 303
|
|
Washington, D.C. 20003
|
|
+1 202 544 9237
|
|
+1 202 547 5481 FAX
|
|
Internet: eff@eff.org
|
|
|
|
|
|
Free Software Foundation (FSF)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
GNU
|
|
~~~
|
|
|
|
|
|
The League for Programming Freedom (LPF)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The League for Programming Freedom is an organization of people who
|
|
oppose the attempt to monopolize common user interfaces through "look
|
|
and feel" copyright lawsuits. Some of us are programmers, who worry
|
|
that such monopolies will obstruct our work. Some of us are users,
|
|
who want new computer systems to be compatible with the interfaces we
|
|
know. Some are founders of hardware or software companies, such as
|
|
Richard P. Gabriel. Some of us are professors or researchers,
|
|
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
|
|
Boyer and Patrick Winston.
|
|
|
|
"Look and feel" lawsuits aim to create a new class of government-
|
|
enforced monopolies broader in scope than ever before. Such a system
|
|
of user-interface copyright would impose gratuitous incompatibility,
|
|
reduce competition, and stifle innovation.
|
|
|
|
We in the League hope to prevent these problems by preventing
|
|
user-interface copyright. The League is NOT opposed to copyright law
|
|
as it was understood until 1986 -- copyright on particular programs.
|
|
Our aim is to stop changes in the copyright system which would take
|
|
away programmers' traditional freedom to write new programs compatible
|
|
with existing programs and practices.
|
|
|
|
Annual dues for individual members are $42 for employed professionals,
|
|
$10.50 for students, and $21 for others. We appreciate activists, but
|
|
members who cannot contribute their time are also welcome.
|
|
|
|
To contact the League, phone (617) 243-4091, send Internet mail to the
|
|
address league@prep.ai.mit.edu, or write to:
|
|
|
|
League for Programming Freedom
|
|
1 Kendall Square #143
|
|
P.O. Box 9171
|
|
Cambridge, MA 02139 USA
|
|
|
|
|
|
SotMesc
|
|
~~~~~~~
|
|
Founded in 1989, SotMesc is dedicated to preserving the integrity and
|
|
cohesion of the computing society. By promoting computer education,
|
|
liberties and efficiency, we believe we can secure freedoms for all
|
|
computer users while retaining privacy.
|
|
|
|
SotMesc maintains the CSP Internet mailing list, the SotMesc
|
|
Scholarship Fund, and the SotMesc Newsletter.
|
|
|
|
The SotMESC is financed partly by membership fees, and donations, but
|
|
mostly by selling hacking, cracking, phreaking, electronics, internet,
|
|
and virus information and programs on disk and bound paper media.
|
|
|
|
SotMesc memberships are $20 to students and $40 to regular members.
|
|
|
|
SotMESC
|
|
P.O. Box 573
|
|
Long Beach, MS 39560
|
|
|
|
|
|
Computer Emergency Response Team (CERT
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
CERT is the Computer Emergency Response Team that was formed by the
|
|
Defense Advanced Research Projects Agency (DARPA) in November 1988 in
|
|
response to the needs exhibited during the Internet worm incident.
|
|
The CERT charter is to work with the Internet community to facilitate
|
|
its response to computer security events involving Internet hosts, to
|
|
take proactive steps to raise the community's awareness of computer
|
|
security issues, and to conduct research targeted at improving the
|
|
security of existing systems.
|
|
|
|
CERT products and services include 24-hour technical assistance for
|
|
responding to computer security incidents, product vulnerability
|
|
assistance, technical documents, and seminars. In addition, the team
|
|
maintains a number of mailing lists (including one for CERT
|
|
advisories) and provides an anonymous FTP server: cert.org
|
|
(192.88.209.5), where security-related documents, past CERT
|
|
advisories, and tools are archived.
|
|
|
|
CERT contact information:
|
|
|
|
U.S. mail address
|
|
CERT Coordination Center
|
|
Software Engineering Institute
|
|
Carnegie Mellon University
|
|
Pittsburgh, PA 15213-3890
|
|
U.S.A.
|
|
|
|
Internet E-mail address
|
|
cert@cert.org
|
|
|
|
Telephone number
|
|
(412)268-7090 (24-hour hotline)
|
|
CERT Coordination Center personnel answer
|
|
7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
|
|
emergencies during other hours.
|
|
|
|
FAX number
|
|
(412)268-6989
|
|
|
|
|
|
15. Where can I purchase a magnetic stripe encoder/decoder?
|
|
|
|
CPU Advance
|
|
PO Box 2434
|
|
Harwood Station
|
|
Littleton, MA 01460
|
|
(508)624-4819 (Fax)
|
|
|
|
Omron Electronics, Inc.
|
|
One East Commerce Drive
|
|
Schaumburg, IL 60173
|
|
(800)556-6766 (Voice)
|
|
(708)843-7787 (Fax)
|
|
|
|
Security Photo Corporation
|
|
1051 Commonwealth Avenue
|
|
Boston, MA 02215
|
|
(800)533-1162 (Voice)
|
|
(617)783-3200 (Voice)
|
|
(617)783-1966 (Voice)
|
|
|
|
Timeline Inc,
|
|
23605 Telo Avenue
|
|
Torrence, CA 90505
|
|
(800)872-8878 (Voice)
|
|
(800)223-9977 (Voice)
|
|
|
|
Alltronics
|
|
2300 Zanker Road
|
|
San Jose CA 95131
|
|
(408) 943-9774 Voice
|
|
(408) 943-9776 Fax
|
|
(408) 943-0622 BBS
|
|
Part Number: 92U067
|
|
|
|
Atalla Corp
|
|
San Jose, CA
|
|
(408) 435-8850
|
|
|
|
|
|
16. What are the rainbow books and how can I get them?
|
|
|
|
Orange Book
|
|
DoD 5200.28-STD
|
|
Department of Defense Trusted Computer System Evaluation Criteria
|
|
|
|
Green Book
|
|
CSC-STD-002-85
|
|
Department of Defense Password Management Guideline
|
|
|
|
Yellow Book
|
|
CSC-STD-003-85
|
|
Computer Security Requirements -- Guidance for Applying the Department
|
|
of Defense Trusted Computer System Evaluation Criteria in Specific
|
|
Environments
|
|
|
|
Yellow Book
|
|
CSC-STD-004-85
|
|
Technical Rationale Behind CSC-STD-003-85: Computer Security
|
|
Requirements. Guidance for Applying the Department of Defense Trusted
|
|
Computer System Evaluation Criteria in Specific Environments.
|
|
|
|
Tan Book
|
|
NCSC-TG-001
|
|
A Guide to Understanding Audit in Trusted Systems
|
|
|
|
Bright Blue Book
|
|
NCSC-TG-002
|
|
Trusted Product Evaluation - A Guide for Vendors
|
|
|
|
Neon Orange Book
|
|
NCSC-TG-003
|
|
A Guide to Understanding Discretionary Access Control in Trusted
|
|
Systems
|
|
|
|
Teal Green Book
|
|
NCSC-TG-004
|
|
Glossary of Computer Security Terms
|
|
|
|
Red Book
|
|
NCSC-TG-005
|
|
Trusted Network Interpretation of the Trusted Computer System
|
|
Evaluation Criteria
|
|
|
|
Orange Book
|
|
NCSC-TG-006
|
|
A Guide to Understanding Configuration Management in Trusted Systems
|
|
|
|
Burgundy Book
|
|
NCSC-TG-007
|
|
A Guide to Understanding Design Documentation in Trusted Systems
|
|
|
|
Dark Lavender Book
|
|
NCSC-TG-008
|
|
A Guide to Understanding Trusted Distribution in Trusted Systems
|
|
|
|
Venice Blue Book
|
|
NCSC-TG-009
|
|
Computer Security Subsystem Interpretation of the Trusted Computer
|
|
System Evaluation Criteria
|
|
|
|
Aqua Book
|
|
NCSC-TG-010
|
|
A Guide to Understanding Security Modeling in Trusted Systems
|
|
|
|
Dark Red Book
|
|
NCSC-TG-011
|
|
Trusted Network Interpretation Environments Guideline -- Guidance for
|
|
Applying the Trusted Network Interpretation
|
|
|
|
Pink Book
|
|
NCSC-TG-013
|
|
Rating Maintenance Phase -- Program Document
|
|
|
|
Purple Book
|
|
NCSC-TG-014
|
|
Guidelines for Formal Verification Systems
|
|
|
|
Brown Book
|
|
NCSC-TG-015
|
|
A Guide to Understanding Trusted Facility Management
|
|
|
|
Yellow-Green Book
|
|
NCSC-TG-016
|
|
Guidelines for Writing Trusted Facility Manuals
|
|
|
|
Light Blue
|
|
NCSC-TG-017
|
|
A Guide to Understanding Identification and Authentication in Trusted
|
|
Systems
|
|
|
|
Light Blue Book
|
|
NCSC-TG-018
|
|
A Guide to Understanding Object Reuse in Trusted Systems
|
|
|
|
Blue Book
|
|
NCSC-TG-019
|
|
Trusted Product Evaluation Questionnaire
|
|
|
|
Gray Book
|
|
NCSC-TG-020A
|
|
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
|
|
Access Control List Features for the Unix System
|
|
|
|
Lavender Book
|
|
NCSC-TG-021
|
|
Trusted Data Base Management System Interpretation of the Trusted
|
|
Computer System Evaluation Criteria
|
|
|
|
Yellow Book
|
|
NCSC-TG-022
|
|
A Guide to Understanding Trusted Recovery in Trusted Systems
|
|
|
|
Bright Orange Book
|
|
NCSC-TG-023
|
|
A Guide to Understandng Security Testing and Test Documentation in
|
|
Trusted Systems
|
|
|
|
Purple Book
|
|
NCSC-TG-024 (Volume 1/4)
|
|
A Guide to Procurement of Trusted Systems: An Introduction to
|
|
Procurement Initiators on Computer Security Requirements
|
|
|
|
Purple Book
|
|
NCSC-TG-024 (Volume 2/4)
|
|
A Guide to Procurement of Trusted Systems: Language for RFP
|
|
Specifications and Statements of Work - An Aid to Procurement
|
|
Initiators
|
|
|
|
Purple Book
|
|
NCSC-TG-024 (Volume 3/4)
|
|
A Guide to Procurement of Trusted Systems: Computer Security Contract
|
|
Data Requirements List and Data Item Description Tutorial
|
|
|
|
+Purple Book
|
|
+NCSC-TG-024 (Volume 4/4)
|
|
+A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
|
|
+Proposal Document - An Aid to Procurement Initiators and Contractors
|
|
|
|
Green Book
|
|
NCSC-TG-025
|
|
A Guide to Understanding Data Remanence in Automated Information
|
|
Systems
|
|
|
|
Hot Peach Book
|
|
NCSC-TG-026
|
|
A Guide to Writing the Security Features User's Guide for Trusted Systems
|
|
|
|
Turquiose Book
|
|
NCSC-TG-027
|
|
A Guide to Understanding Information System Security Officer
|
|
Responsibilities for Automated Information Systems
|
|
|
|
Violet Book
|
|
NCSC-TG-028
|
|
Assessing Controlled Access Protection
|
|
|
|
Blue Book
|
|
NCSC-TG-029
|
|
Introduction to Certification and Accreditation
|
|
|
|
Light Pink Book
|
|
NCSC-TG-030
|
|
A Guide to Understanding Covert Channel Analysis of Trusted Systems
|
|
|
|
C1 Technical Report-001
|
|
Computer Viruses: Prevention, Detection, and Treatment
|
|
|
|
*C Technical Report 79-91
|
|
*Integrity in Automated Information Systems
|
|
|
|
*C Technical Report 39-92
|
|
*The Design and Evaluation of INFOSEC systems: The Computer Security
|
|
*Contributions to the Composition Discussion
|
|
|
|
NTISSAM COMPUSEC/1-87
|
|
Advisory Memorandum on Office Automation Security Guideline
|
|
|
|
--
|
|
|
|
You can get your own free copy of any or all of the books by writing
|
|
or calling:
|
|
|
|
INFOSEC Awareness Division
|
|
ATTN: X711/IAOC
|
|
Fort George G. Meade, MD 20755-6000
|
|
|
|
Barbara Keller
|
|
(410) 766-8729
|
|
|
|
If you ask to be put on the mailing list, you'll get a copy of each new
|
|
book as it comes out (typically a couple a year).
|
|
|
|
[* == I have not personally seen this book]
|
|
[+ == I have not personally seen this book, and I believe it may not]
|
|
[ be available]
|
|
|
|
|
|
|
|
|
|
Section D: 2600
|
|
~~~~~~~~~~~~~~~
|
|
|
|
01. What is alt.2600?
|
|
|
|
Alt.2600 is a Usenet newsgroup for discussion of material relating to
|
|
2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600
|
|
game machine. Len@netsys.com created the group on Emmanuel
|
|
Goldstein's recommendation. Emmanuel is the editor/publisher of 2600
|
|
Magazine. Following the barrage of postings about the Atari machine to
|
|
alt.2600, an alt.atari.2600 was created to divert all of the atari
|
|
traffic from alt.2600. Atari 2600 people are advised to hie over to
|
|
rec.games.video.classic.
|
|
|
|
|
|
02. What does "2600" mean?
|
|
|
|
2600Hz was a tone that was used by early phone phreaks (or
|
|
phreakers) in the 80's, and some currently. If the tone was sent down the
|
|
line at the proper time, one could get away with all sorts of fun stuff.
|
|
|
|
A note from Emmanuel Goldstein:
|
|
|
|
"The Atari 2600 has NOTHING to do with blue boxes or telephones
|
|
or the 2600 hertz tone. The 2600 hertz tone was simply the first
|
|
step towards exploring the network. If you were successful at
|
|
getting a toll call to drop, then billing would stop at that
|
|
point but there would be billing for the number already dialed
|
|
up until the point of seizure. 800 numbers and long distance
|
|
information were both free in the past and records of who called
|
|
what were either non-existent or very obscure with regards to
|
|
these numbers. This, naturally, made them more popular than
|
|
numbers that showed up on a bill, even if it was only for
|
|
a minute. Today, many 800 numbers go overseas, which provides
|
|
a quick and free way into another country's phone system
|
|
which may be more open for exploration."
|
|
|
|
|
|
03. Are there on-line versions of 2600 available?
|
|
|
|
No.
|
|
|
|
|
|
04. I can't find 2600 at any bookstores. What can I do?
|
|
|
|
Subscribe. Or, let 2600 know via the subscription address that you
|
|
think 2600 should be in the bookstore. Be sure to include the
|
|
bookstores name and address.
|
|
|
|
|
|
05. Why does 2600 cost more to subscribe to than to buy at a newsstand?
|
|
|
|
A note from Emmanuel Goldstein:
|
|
|
|
We've been selling 2600 at the same newsstand price ($4) since 1988
|
|
and we hope to keep it at that price for as long as we can get away
|
|
with it. At the same time, $21 is about the right price to cover
|
|
subscriber costs, including postage and record keeping, etc. People
|
|
who subscribe don't have to worry about finding an issue someplace,
|
|
they tend to get issues several weeks before the newsstands get
|
|
them, and they can take out free ads in the 2600 Marketplace.
|
|
|
|
This is not uncommon in the publishing industry. The NY Times, for
|
|
example, costs $156.50 at the newsstands, and $234.75 delivered to your
|
|
door.
|
|
|
|
|
|
Section E: Phrack Magazine
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. What Is Phrack Magazine?
|
|
|
|
Phrack Magazine is one of the longest running electronic-based publications
|
|
in the world. Originally founded in 1985 by Knight Lightning and Taran
|
|
King, it has survived several incarnations of editors and still remains
|
|
true to its underground roots. Since its inception, Phrack has been
|
|
providing the hacker community with information on operating systems,
|
|
networking technologies and telephony, as well as relaying human interest
|
|
features of interest to the international computer underground.
|
|
|
|
During its lifetime, Phrack has always been at the center of controversy.
|
|
Since the magazine has always been openly available, it presented law
|
|
enforcement officials with what they percieved to be a direct link into
|
|
the secret society of computer hackers. Not truly understnding either
|
|
the the spirit of the magazine or the community for which it was written,
|
|
Federal Agents and Prosecutors began to target Phrack Magazine and those
|
|
affiliated with it.
|
|
|
|
"The Hacker Crackdown" by Bruce Sterling relays the details surrounding
|
|
some of these events.
|
|
|
|
Phrack Magazine is now in its 10th year of publication, and is registered
|
|
with the Library of Congress as ISSN 1068-1035, and is protected by
|
|
US Copyright Law.
|
|
|
|
02. How can I reach Phrack Magazine?
|
|
|
|
You can reach Phrack by email at: phrack@well.com, phrack@fc.net or
|
|
phrackmag@aol.com. These addresses are listed in order of
|
|
preference. Only AOL users should email the phrackmag@aol.com.
|
|
|
|
Phrack can be reached by the postal service at:
|
|
|
|
Phrack Magazine
|
|
603 W. 13th #1A-278
|
|
Austin, TX 78701
|
|
|
|
03. Who Publishes Phrack?
|
|
|
|
Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe. It is
|
|
hobbled together, touched up, spell checked and compressed on an overworked
|
|
486-66. It is then ftp'ed over to a BSDI UNIX machine where it is sent to
|
|
the masses.
|
|
|
|
04. How Often Does Phrack Go Out?
|
|
|
|
Phrack goes out roughly quarterly. It is often sent out later than every
|
|
three months due to other more demanding obligations faced by its editor.
|
|
The regularity of Phrack is really based upon the amount of information
|
|
sent in. Phrack depends solely upon submissions to get published at all.
|
|
|
|
05. How Do I Subscribe?
|
|
|
|
To subscribe to Phrack magazine, merely email phrack@well.com and ask to
|
|
be placed on the mailing list.
|
|
|
|
Any encrypted subscriptions requests will be ignored.
|
|
|
|
Phrack will not accept subscription requests from any anonymous remailers or
|
|
from sites in the fidonet domain. The anonymous remailers consistently
|
|
bounce our mailings causing a big headache, so we won't use them. The
|
|
fidonet domain administrators have asked us not to mail Phrack to fido users,
|
|
because of the huge load it places on their outgoing spools (costing them a
|
|
lot of money to send).
|
|
|
|
06. Why Don't I Get Any Response When I E-mail Phrack?
|
|
|
|
Because of the high volume of mail sent to the Phrack email address,
|
|
not everyone gets a response. All subscription requests are saved and
|
|
added to the master list, but there is no automatic reply. All other
|
|
messages are responded to as they are read, with the exception of PGP'd
|
|
messages. All PGP'd email is stored for later decryption, and is almost
|
|
never responded to, unless it is incredibly urgent.
|
|
|
|
07. Does Phrack Cost Money?
|
|
|
|
Phrack Magazine charges a registration fee of $100.00 per user for any
|
|
professional use of the magazine and the information contained therein.
|
|
Information regarding this registration fee is contained at the beginning
|
|
of every issue of Phrack.
|
|
|
|
08. How Can I Submit Articles?
|
|
|
|
Articles are both wanted and needed. Phrack only exists if people write
|
|
for it. There is no regular writing staff, there is only the editor, who
|
|
cannot write the entire thing himself.
|
|
|
|
Articles can be sent to Phrack via email or snailmail (on paper or
|
|
IBM-compatible diskette). Articles should be in ASCII text format. Do
|
|
not include any clever graphics or ANSI art. You can use Phrack's PGP key
|
|
to encrypt articles, but send the files in the ASCII armor format.
|
|
|
|
Please try to avoid sending files as MIME-compliant mail attachments.
|
|
|
|
09. What Is Phrack's PGP Key?
|
|
|
|
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
Version: 2.6
|
|
|
|
mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
|
|
Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
|
|
Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
|
|
tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
|
|
=evjv
|
|
-----END PGP PUBLIC KEY BLOCK-----
|
|
|
|
10. Where Can I Get Back Issues?
|
|
|
|
Back issues of Phrack are found on many bulletin boards around the globe.
|
|
The only OFFICIAL Phrack Magazine distribution site is our ftp archive
|
|
at ftp.fc.net in /pub/phrack. There are NO official distribution sites
|
|
other than this one, nor will there ever be. We don't want to play
|
|
favorites and let one particular BBS call itself an "official" site while
|
|
another isn't. Therefore, there will be no "official" sites except those
|
|
archived by Phrack itself.
|
|
|
|
You can also get back issues on the World Wide Web by connecting to:
|
|
http://www.fc.net/phrack.html
|
|
|
|
This URL allows users to view issues online, or pull them down for
|
|
later viewing.
|
|
|
|
Any users without net access can send diskettes and postage to the
|
|
Phrack Postal Address given above, and request back issues to be
|
|
sent via the postal system.
|
|
|
|
Section F: Miscellaneous
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. What does XXX stand for?
|
|
|
|
TLA Three Letter Acronym
|
|
|
|
ACL Access Control List
|
|
PIN Personal Identification Number
|
|
TCB Trusted Computing Base
|
|
|
|
ALRU Automatic Line Record Update
|
|
AN Associated Number
|
|
ARSB Automated Repair Service Bureau
|
|
ATH Abbreviated Trouble History
|
|
BOC Bell Operating Company
|
|
BOR Basic Output Report
|
|
BOSS Business Office Servicing System
|
|
CA Cable
|
|
COE Central Office Equipment
|
|
COSMOS Computer System for Main Frame Operations
|
|
CMC Construction Maintenance Center
|
|
CNID Calling Number IDentification
|
|
CO Central Office
|
|
COCOT Customer Owned Coin Operated Telephone
|
|
CRSAB Centralized Repair Service Answering Bureau
|
|
DDD Direct Distance Dialing
|
|
ECC Enter Cable Change
|
|
LD Long Distance
|
|
LMOS Loop Maintenance Operations System
|
|
MLT Mechanized Loop Testing
|
|
NPA Numbering Plan Area
|
|
POTS Plain Old Telephone Service
|
|
RBOC Regional Bell Operating Company
|
|
RSB Repair Service Bureau
|
|
SS Special Service
|
|
TAS Telephone Answering Service
|
|
TH Trouble History
|
|
TREAT Trouble Report Evaluation and Analysis Tool
|
|
|
|
LOD Legion of Doom
|
|
HFC Hell Fire Club
|
|
TNO The New Order
|
|
|
|
ACiD Ansi Creators in Demand
|
|
CCi Cybercrime International
|
|
FLT Fairlight
|
|
iCE Insane Creators Enterprise
|
|
iNC International Network of Crackers
|
|
NTA The Nocturnal Trading Alliance
|
|
PDX Paradox
|
|
PE Public Enemy
|
|
PSY Psychose
|
|
QTX Quartex
|
|
RZR Razor (1911)
|
|
S!P Supr!se Productions
|
|
TDT The Dream Team
|
|
THG The Humble Guys
|
|
THP The Hill People
|
|
TRSI Tristar Red Sector Inc.
|
|
UUDW Union of United Death Workers
|
|
|
|
|
|
02. How do I determine if I have a valid credit card number?
|
|
|
|
Credit cards use the Luhn Check Digit Algorithm. The main purpose of
|
|
this algorithm is to catch data entry errors, but it does double duty
|
|
here as a weak security tool.
|
|
|
|
For a card with an even number of digits, double every odd numbered
|
|
digit and subtract 9 if the product is greater than 9. Add up all the
|
|
even digits as well as the doubled-odd digits, and the result must be
|
|
a multiple of 10 or it's not a valid card. If the card has an odd
|
|
number of digits, perform the same addition doubling the even numbered
|
|
digits instead.
|
|
|
|
|
|
03. What bank issued this credit card?
|
|
|
|
1033 Manufacturers Hanover Trust
|
|
1035 Citibank
|
|
1263 Chemical Bank
|
|
1665 Chase Manhattan
|
|
4024 Bank of America
|
|
4128 Citicorp
|
|
4209 New Era Bank
|
|
4302 HHBC
|
|
4310 Imperial Savings
|
|
4313 MBNA
|
|
4317 California Federal
|
|
5282 Wells Fargo
|
|
5424 Citibank
|
|
5410 Wells Fargo
|
|
5432 Bank of New York
|
|
6017 MBNA
|
|
|
|
|
|
04. What are the ethics of hacking?
|
|
|
|
An excerpt from: Hackers: Heroes of the Computer Revolution
|
|
by Steven Levy
|
|
|
|
Access to computers -- and anything which might teach you
|
|
something about the way the world works -- should be unlimited
|
|
and total. Always yield to the Hands-On imperative.
|
|
|
|
All information should be free.
|
|
|
|
Mistrust Authority. Promote Decentralization.
|
|
|
|
Hackers should be judged by their hacking, not bogus criteria
|
|
such as degrees, age, race, or position.
|
|
|
|
You can create art and beauty on a computer.
|
|
|
|
Computers can change your life for the better.
|
|
|
|
|
|
04. Where can I get a copy of the alt.2600/#hack FAQ?
|
|
|
|
Get it on FTP at:
|
|
rahul.net /pub/lps
|
|
rtfm.mit.edu /pub/usenet-by-group/alt.2600
|
|
ftp.clark.net /pub/jcase
|
|
|
|
Get it on the World Wide Web at:
|
|
http://dfw.net/~aleph1
|
|
http://www.engin.umich.edu/~jgotts/hack-faq.html
|
|
http://www.phantom.com/~king
|
|
|
|
Get it from these BBS's:
|
|
Hacker's Haven (303)343-4053
|
|
|
|
|
|
|
|
|
|
|
|
EOT
|