home *** CD-ROM | disk | FTP | other *** search
File List | 2003-06-11 | 17.8 KB | 323 lines |
- BOOKS.TXT Computer Security Books 73_88
- ACROYNYM.TXT The IIRG Hackers' Acronym Chart
- CAPTAINA.NWS WHo is Captain Zap?
- CIRCLEMS.TXT Inner Circle Messages
- ENA1.HAC Explanation of ENA
- GOODKIDS.HAC Hackers are nice people...
- HACETHIC.TXT The Hacker's Ethics
- HACK9.HAC H.A.C.K. #9
- HACKER01.DOC Masters thesis on hackers
- HACKER16.DOC Hacker's atlas of the world
- HACKERS.CRM Are Computer Hackers criminals?
- LONGPASS.TXT How useful ARE longer passwords?
- MAINFRAM.DOC Numbers for some mainframes
- MENACE.TXT The Hacker Menace
- MORALITY.HAC Hacker Morality
- MORHAKNM.TXT Hack Numbers (more!)
- NASA.HAK The NASA Hackers
- NIGHTHAK.TXT Night of the Hackers
- PHRKTUT.DOC How to be a cautious hacker
- PROLOCK.DOC How to unprotect PROLOCK protections
- REQUEST.GNU Get your own, personal FSF account
- RISKS.DOC Advice on how not to get caught hacking
- SATCON.TXT Controlling the orbital dynamics of satellites!
- SATELLIT.CPR The Satellite Caper
- SCANPRG.TXT What to look for in a scan program
- SNOOP.PHK Data Snooping
- SUNDEVIL.TXT 2600 Magazine's perspective on Sun Devil etc.
- TACDIAL.TXT TAC Dialups
- TEQUILA.003 Wow! MORE Hacking OldMsgs
- WASHLOD.TXT An article on the LOD busts
- WOZBABE.NWS Wozniak is behind hacking
- COMSEC.FAQ Computer Security/Compromise FAQ
- _HACK.FAQ #Hack FAQ Beta .006
- HACKING.101 Hacking 101
- VTHACK1.TXT Virginia Tech Hacking File 1
- VTHACK2.TXT Virginia Tech Hacking File 2
- VTHACK3.TXT Virginia Tech Hacking File 3
- UKGUIDE.TXT Guide to Online Systems in the U.K.
- MOB.TXT Hackers In The Mob?
- FBICOMPU.TXT FBI/Law Enforcment Computer Systems
- BASICHAC.TXT Basics of Hacking
- DOWJONES.CMD Dow Jones Commands
- NHG.TXT LOD/H Novice's Guide to Hacking, Dec.1988
- WELL.MAN Commands & Oper. Manual For THE WELL
- NYT.TXT New York Times Article On Phreak/Hacks
- USRGUIDE.TXT NIST Computer Users Guide - anti-hacking measures for the common user
- PRIMER.TXT Prevention Thru Recovery
- SECURIT1.TXT Computer Emer. Respose Team
- MISCINFO 'PIRATE EASY' Telcom Hacking Info,Proto's,Security
- INCIRCLE.TXT Exerpts From The Inner Circle
- ALT_SECU.FAQ FAQ on Security
- HACK.TXT On Hacking (General)
- STARLINK.TXT Starlink Info/Index
- VAS015.TXT VAS #15: Merit/Michnet Hacking Issue
- MULG3.TXT "Miskatonic University Learning Guides" #3 - advice for beginning hackers
- PKZIP.HAK PKZip Hacking Update from Xenocide
- SCANTRON.HAC Agent Blue's known Scantron hacks
- CARCODES.TXT Hacking GM cars' onboard computer
- SECURITY.TXT Computer Security by E.A. Bedwell
- GREENBK.TXT The Green Book - Security Of Information Systems [European Community]
- HK_ACCES.TXT Logical Access Control
- HK_I_A.TXT Identification and Authentication
- HK_POLIC.TXT Computer and Information Security Policy
- HK_PROGM.TXT Security Program Management
- JUL93BLT.TXT CSL Bulletin - Connecting to the INTERNET: Security Considerations
- NOIDCRYP.TXT Security without Identification - a bibliographic reference
- ORANGE.TXT Department of Defense: Trusted Computer System Evaluation Criteria [The Orange Book]
- PASSCH.TXT How to choose secure passwords
- CIACG17.TXT CIAC G-17 March 12, 1996: Vulnerabilities in sample HTTPD CGIs
- RUHACKER.TXT Are you a Hacker? By ReDragon
- BLUEBOOK.TXT Trusted Computer System Evaluation Criteria - The DoD "Blue Book"
- BRWNBOOK.TXT Guide to Understanding Trusted Facility Management - The DoD "Brown Book"
- DARKLAV.BOK A Guide to Understanding Trusted Distribution in Trusted Systems, the DoD "Dark Lavender Book"
- PURPLE.BOK Guidelines for Formal Verification Systems, the DoD "Purple Book"
- DENIAL.TXT Introduction to Denial of Service
- WANKWORM.TXT The W.A.N.K. worm takes over NASA computers (1989)
- FINDHOLE.TXT Security Holes -- Q and A sheet of Security Holes 93/11/10
- GCS.TXT Government Security -- This file tells about Government
- standards, and information concerning computer security.
- INNERCIR.TXT Hacking Techniques -- Various diffrent ways to take a run
- at a system. Other then the normal expected ones.
- GTMHH1_1.TXT "Guide to Mostly Harmless Hacking"
- Finger using Telnet -- I use this one all the time. It's a
- very usefull tool to learn to use. # 1-1
- GTMHH1_2.TXT "Guide to Mostly Harmless Hacking"
- Sending Fake E-mail -- This is mentioned in another one of
- my files, but this puts it in easy terms for the newbie to understand. Plus
- how to spot forgeries. # 1-2
- GTMHH1_3.TXT "Guide to Mostly Harmless Hacking"
- Finger your way in -- A way to gain entrance to places
- you're not suposed to be using the simple finger command! #1-3
- GTMHH1_4.TXT "Guide to Mostly Harmless Hacking"
- Get Usenet spammers booted -- A way to get Spammers kicked
- for their ISPs. # 1-4
- GTMHH1_5.TXT "Guide to Mostly Harmless Hacking"
- Get E-mail spammers booted -- A way to get people who spam
- with e-mail to get booted off their ISPs. # 1-5
- GTMHH1_6.TXT "Guide to Mostly Harmless Hacking"
- How to deal with Offensive Web Sites -- I think the title
- says it all! # 1-6
- GTMHH2_1.TXT "Guide to Mostly Harmless Hacking"
- Internet hacks for dummies -- Unix gurus can skip this,
- just a few good pointer and tricks for the newbie! # 2-1
- GTMHH2_2.TXT "Guide to Mostly Harmless Hacking"
- Linux hacks -- A good system to get to know. It has a
- little bit of everythign else in it. # 2-2
- GTMHH2_3.TXT "Guide to Mostly Harmless Hacking"
- Intro to TCP/IP -- A good one for the Newbie again. A
- basic introduction to what TCP/IP is all about. # 2-3
- GTMHH2_4.TXT "Guide to Mostly Harmless Hacking"
- TCP/IP continued -- The second part to the last on on TCP/IP.
- Deals with Port Surfing and getting in other peoples systems
- without getting thrown in the clink! # 2-4
- GTMHH3_1.TXT "Guide to Mostly Harmless Hacking"
- E-mail Bombing -- What to do when you get bombed. Don't
- take revenge but get even within the law! # 3-1
- GTMHH3_2.TXT "Guide to Mostly Harmless Hacking"
- Mapping the Net -- Some more Unix commands that can help you
- "map" the net effectivly. Nslookup, Traceroute, Whois, etc.
- #3-2
- GTMHH.TXT "Guide to Mostly Harmless Hacking"
- Know the Law -- This is very good reading for anyone who might
- have some concerns about the law. It covers where to go to
- find out what you need to know, and has a brief overview of
- the federal laws that concern hacking.
- SECURICK.TXT How to Improve your Security -- This is a paper from Sun
- MicroSystems, on how to break into a system, so you'll know
- where your system's holes are. Perfect for use on the "other"
- end........heh heh heh......
- THEHGOD.FAQ The God of H Hacking
- FIREWALL.FAQ Firewalls FAQ
- HIREHACK.TXT Hiring a Hacker
- HANDBOOK.TXT The Hacker's handbook (1985)
- CERT0001.TXT CERT Advisory CA-88:01 ftpd hole
- CERT0002.TXT CERT Advisory CA-89:01 passwd hole
- CERT0003.TXT CERT Advisory CA-89:02 sun restore hole
- CERT0004.TXT CERT Advisory CA-89:03 telnet breakin warning
- CERT0005.TXT CERT Advisory CA-89:04 decnet wank worm
- CERT0006.TXT CERT Advisory CA-89:05 ultrix3 0 hole
- CERT0007.TXT CERT Advisory CA-89:06 ultrix3 0 update
- CERT0008.TXT CERT Advisory CA-89:07 sun rcp vulnerability
- CERT0009.TXT CERT Advisory CA-90:02 intruder warning
- CERT0010.TXT CERT Advisory CA-90:03 unisys warning
- CERT0011.TXT CERT Advisory CA-90:04 apollosuid vulnerability
- CERT0012.TXT CERT Advisory CA-90:05 sunselection vulnerability
- CERT0013.TXT CERT Advisory CA-90:06a NeXT vulnerability
- CERT0014.TXT CERT Advisory CA-90:07 VMS ANALYZE vulnerability
- CERT0015.TXT CERT Advisory CA-90:08 irix mail
- CERT0016.TXT CERT Advisory CA-90:09 vms breakins warning
- CERT0017.TXT CERT Advisory CA-90:10 attack rumour warning
- CERT0018.TXT CERT Advisory CA-90:11 Security Probes
- CERT0019.TXT CERT Advisory CA-90:12 SunOS TIOCCONS vulnerability
- CERT0020.TXT CERT Advisory CA-91:02a SunOS telnetd vulnerability
- CERT0021.TXT CERT Advisory CA-91:03 unauthorized password change request
- CERT0022.TXT CERT Advisory CA-91:04 social engineering
- CERT0023.TXT CERT Advisory CA-91:05 Ultrix chroot vulnerability
- CERT0024.TXT CERT Advisory CA-91:06 NeXTstep vulnerability
- CERT0025.TXT CERT Advisory CA-91:07 SunOS source tape vulnerability
- CERT0026.TXT CERT Advisory CA-91:08 systemV login vulnerability
- CERT0027.TXT CERT Advisory CA-91:10a SunOS lpd vulnerability
- CERT0028.TXT CERT Advisory CA-91:11 Ultrix LAT-Telnet gateway vulnerability
- CERT0029.TXT CERT Advisory CA-91:12 Trusted Hosts Configuration vulnerability
- CERT0030.TXT CERT Advisory CA-91:14 IRIX mail vulnerability
- CERT0031.TXT CERT Advisory CA-91:15 NCSA Telnet vulnerability
- CERT0032.TXT CERT Advisory CA-91:17 DECnet-Internet Gateway vulnerability
- CERT0033.TXT CERT Advisory CA-91:18 Active Internet tftp Attacks
- CERT0034.TXT CERT Advisory CA-91:19 AIX TFTP Daemon vulnerability
- CERT0035.TXT CERT Advisory CA-91:21 SunOS NFS Jumbo and fsirand
- CERT0036.TXT CERT Advisory CA-91:23 Apollo crp vulnerability
- CERT0037.TXT CERT Advisory CA-92:01 NeXTstep configuration vulnerability
- CERT0038.TXT CERT Advisory CA-92:02 Michelangelo PC virus warning
- CERT0039.TXT CERT Advisory CA-92:03 Internet Intruder Activity
- CERT0040.TXT CERT Advisory CA-92:04 ATT rexecd vulnerability
- CERT0041.TXT CERT Advisory CA-92:05 AIX REXD Daemon vulnerability
- CERT0042.TXT CERT Advisory CA-92:06 AIX uucp vulnerability
- CERT0043.TXT CERT Advisory CA-92:07 AIX passwd vulnerability
- CERT0044.TXT CERT Advisory CA-92:08 SGI lp vulnerability
- CERT0045.TXT CERT Advisory CA-92:09 AIX anonymous ftp vulnerability
- CERT0046.TXT CERT Advisory CA-92:10 AIX crontab vulnerability
- CERT0047.TXT CERT Advisory CA-92:11:SunOS Environment vulnerability
- CERT0048.TXT CERT Advisory CA-92:13 SunOS NIS vulnerability
- CERT0049.TXT CERT Advisory CA-92:14 Altered System Binaries Incident
- CERT0050.TXT CERT Advisory CA-92:15 Multiple SunOS vulnerabilities patched
- CERT0051.TXT CERT Advisory CA-92:18 VMS Monitor vulnerability update
- CERT0052.TXT CERT Advisory CA-92:19 Keystroke Logging Banner Notice
- CERT0053.TXT CERT Advisory CA-92:20 Cisco Access List vulnerability
- CERT0054.TXT CERT Advisory CA-92:21 ConvexOS vulnerabilities
- CERT0055.TXT CERT Advisory CA-93:01 REVISED HP NIS ypbind vulnerability
- CERT0056.TXT CERT Advisory CA-93:02a NeXT NetInfo writers vulnerabilities
- CERT0057.TXT CERT Advisory CA-93:03 SunOS Permissions vulnerability
- CERT0058.TXT CERT Advisory CA-93:04a Amiga finger vulnerability
- CERT0059.TXT CERT Advisory CA-93:05 OpenVMS AXP vulnerability
- CERT0060.TXT CERT Advisory CA-93:06 wuarchive ftpd vulnerability
- CERT0061.TXT CERT Advisory CA-93:07 Cisco Router Packet Handling vulnerability
- CERT0062.TXT CERT Advisory CA-93:08 SCO passwd vulnerability
- CERT0063.TXT CERT Advisory CA-93:10 anonymous FTP activity
- CERT0064.TXT CERT Advisory CA-93:11 UMN UNIX gopher vulnerability
- CERT0065.TXT CERT Advisory CA-93:12 Novell-login-exe-vul
- CERT0066.TXT CERT Advisory CA-93:12 Novell LOGIN EXE vulnerability
- CERT0067.TXT CERT Advisory CA-93:13 SCO Home Directory Vulnerability
- CERT0068.TXT CERT Advisory CA-93:14 Internet Security Scanner
- CERT0069.TXT CERT Advisory CA-93:15 SunOS and Solaris vulnerabilities
- CERT0070.TXT CERT Advisory CA-93:17 xterm logging vulnerability
- CERT0071.TXT CERT Advisory CA-93:18 SunOS Solbourne loadmodule modload vulnerability
- CERT0072.TXT CERT Advisory CA-93:19 Solaris Startup vulnerability
- CERT0073.TXT CERT Advisory CA-94:01 network monitoring attacks
- CERT0074.TXT CERT Advisory CA-94:01 ongoing network monitoring attacks
- CERT0075.TXT CERT Advisory CA-94:02 REVISED SunOS rpc mountd vulnerability
- CERT0076.TXT CERT Advisory CA-94:03 AIX performance tools
- CERT0077.TXT CERT Advisory CA-94:05 MD5 checksums
- CERT0078.TXT CERT Advisory CA-94:06 utmp vulnerability
- CERT0079.TXT CERT Advisory CA-94:07 wuarchive ftpd trojan horse
- CERT0080.TXT CERT Advisory CA-94:08 ftpd vulnerabilities
- CERT0081.TXT CERT Advisory CA-94:09 bin-login-vul
- CERT0082.TXT CERT Advisory CA-94:09 bin login vulnerability
- CERT0083.TXT CERT Advisory CA-94:10 IBM AIX bsh vulnerability
- CERT0084.TXT CERT Advisory CA-94:11 majordomo vulnerabilities
- CERT0085.TXT CERT Advisory CA-94:13 SGI IRIX Help Vulnerability
- CERT0086.TXT CERT Advisory CA-94:14 trojan horse in IRC client for UNIX
- CERT0087.TXT CERT Advisory CA-94:15 NFS Vulnerabilities
- CERT0088.TXT CERT Advisory CA-95:01 IP spoofing
- CERT0089.TXT CERT Advisory CA-95:01 IP spoofing attacks and hijacked terminal connections
- CERT0090.TXT CERT Advisory CA-95:02 binmail vulnerabilities
- CERT0091.TXT CERT Advisory CA-95:03a telnet encryption vulnerability
- CERT0092.TXT CERT Advisory CA-95:04 NCSA http daemon for unix vulnerability
- CERT0093.TXT CERT Advisory CA-95:06 satan
- CERT0094.TXT CERT Advisory CA-95:07a REVISED satan vul
- CERT0095.TXT CERT Advisory CA-95:08 sendmail v 5 vulnerability
- CERT0096.TXT CERT Advisory CA-95:09 Solaris-ps vul
- CERT0097.TXT CERT Advisory CA-95:09 Solaris ps vul
- CERT0098.TXT CERT Advisory CA-95:10 ghostscript
- CERT0099.TXT CERT Advisory CA-95:12 sun loadmodule vul
- CERT0100.TXT CERT Advisory CA-95:13 syslog vul
- CERT0101.TXT CERT Advisory CA-95:14 Telnetd Environment Vulnerability
- CERT0102.TXT CERT Advisory CA-95:15 SGI lp vul
- CERT0103.TXT CERT Advisory CA-95:16 wu-ftpd vul
- CERT0104.TXT CERT Advisory CA-95:17 rpc ypupdated vul
- CERT0105.TXT CERT Advisory CA-95:18 widespread attacks
- CERT0106.TXT CERT Advisory CA-96.01 UDP service denial
- CERT0107.TXT CERT Advisory CA-96.02 bind
- CERT0108.TXT CERT Advisory CA-96.03 kerberos 4 key server
- CERT0109.TXT CERT Advisory CA-96.04 corrupt info from servers
- CERT0110.TXT CERT Advisory CA-96.05 java applet security mgr
- CERT0111.TXT CERT Advisory CA-96.06 cgi example code
- CERT0112.TXT CERT Advisory CA-96.07 java bytecode verifier
- CERT0113.TXT CERT Advisory CA-96.08 pcnfsd
- CERT0114.TXT CERT Advisory CA-96.09 rpc statd
- CERT0115.TXT CERT Advisory CA-96.10 nis+ configuration
- CERT0116.TXT CERT Advisory CA-96.11 interpreters in cgi bin dir
- CERT0117.TXT CERT Advisory CA-96.12 suidperl vul
- CERT0118.TXT CERT Advisory CA-96.13 dip vul
- CERT0119.TXT CERT Advisory CA-96.14 rdist vul
- CERT0120.TXT CERT Advisory CA-96.15 Solaris KCMS vul
- CERT0121.TXT CERT Advisory CA-96.16 Solaris admintool vul
- CERT0122.TXT CERT Advisory CA-96.17 Solaris vold vul
- CERT0123.TXT CERT Advisory CA-96.18 fm fls
- CERT0124.TXT CERT Advisory CA-96.19 expreserve
- CERT0125.TXT CERT Advisory CA-96.20 sendmail vul
- CERT0126.TXT CERT Advisory CA-96.21 tcp syn flooding
- CERT0127.TXT CERT Advisory CA-96.22 bash vuls
- CERT0128.TXT CERT Advisory CA-96.23 workman vul
- CERT0129.TXT CERT Advisory CA-96.24 sendmail daemon mode
- CERT0130.TXT CERT Advisory CA-96.25 sendmail groups
- CERT0131.TXT CERT Advisory CA-96.26 ping
- CERT0132.TXT CERT Advisory CA-96.27 hp sw install
- CERT0133.TXT CERT Advisory CA-97.01 flex lm
- CERT0134.TXT CERT Advisory CA-97.02 hp newgrp
- CERT0135.TXT CERT Advisory CA-97.03 csetup
- CERT0136.TXT CERT Advisory CA-97.04 talkd
- CERT0137.TXT CERT Advisory CA-97.05 sendmail
- CERT0138.TXT CERT Advisory CA-97.06 rlogin-term
- CERT0139.TXT CERT Advisory CA-97.07 nph-test-cgi script
- CERT0140.TXT CERT Advisory CA-97.08 innd
- CERT0141.TXT CERT Advisory CA-97.09 imap pop
- CERT0142.TXT CERT Advisory CA-97.10 nls
- CERT0143.TXT CERT Advisory CA-97.11 libXt
- CERT0144.TXT CERT Advisory CA-97.12 webdist
- CERT0145.TXT CERT Advisory CA-97.13 xlock
- CERT0146.TXT CERT Advisory CA-97.14 metamail
- CERT0147.TXT CERT Advisory CA-97.15 sgi login
- CERT0148.TXT CERT Advisory CA-97.16 ftpd
- CERT0149.TXT CERT Advisory CA-97.17 sperl
- CERT0150.TXT CERT Advisory CA-97.18 at
- CERT0151.TXT CERT Advisory CA-97.19 bsdlp
- CERT0152.TXT CERT Advisory CA-97.20 javascript
- REDBOOK.TXT DoD Red Book: Password Management Guideline
- CERT_M_1.TXT ABBREVIATED CERTIFICATION METHODOLOGY FOR SENSITIVE INFORMATION TECHNOLOGY SYSTEMS
- NCSC_OAS.TXT NCSC Guideline on Office Automation Security
- NIST_PRT.TXT NIST Computer User's Guide to the Protection of Information Resources
- AUDITOOL.TXT Intrusion Detection in Computers
- EVALUATS.TXT Trusted Product Evaluation Questionnaire
- HACKSERV.TXT Hacking Servers: a Beginner's Guide by Lord Dredd
- DOWJONES.TXT Inside Dow Jones News Service
- WINHACK.TXT An easy Win hack
- DHCPFAQ.TXT DCHP (Dynamic Host Configuration Protocol) FAQ
- VIXIE96.TXT SNI Security Advisory - Vulnerability in Vixie cron (96/12/16)
- VMADMIN.TXT A Guide to Administration on VMan Systems, by Sire and Psyclone (UK) (1995)
- UEBER.TXT Becoming an Uebercracker, and thus, an ueberadmin to stop crackers
- TROJAN.TXT A trojan in BASIC by Spear
- BACKDOOR.C A backdoor in 3 lines of code! C source
- VAS117.TXT VAS 117: The Death of Hacking
- FORDCRED.9X 9x Presents Ford Credit-Net Issue 0001
- SECURID.9X 9x Presents Info on SecureID Issue 0002
- 9X_HP3.TXT Haqing HP3000's Written by: Onethought
- 9X_STYLE.TXT LocalHacking vs. NetHacking by GrampaElite
- MAGIC_CO.TXT Cracking the MIT-MAGIC-COOKIE-1 Authorization protocol
- MONGEL.MSG Old Hack messages from P-80
- RISCOS_R.EXP Access the shadow passwd file on a Riscos machine
- STARTHAK.TXT The Ultimate Beginners Guide to Hacking and Phreaking by Revelation/LOA (96/08)
- C_LESSON.ZIP C Language Programming Course
- MS_IIS.TXT The Microsoft IIS Bug
- MS_IS.TXT Microsoft Index Server exposes IDs and passwords
- MSACCESS.TXT MS Access Magic 8-Ball Trick
- NEWBIE.TXT Ultimate Step by Step Guide to Become a Hacker
- TOP10.PWD The top 10 passwords...
- MESSCOMP.TXT Messing with someone's computer - by Archangel
- HACKLINK.TXT Links to Hacking Information
- SKEY.TXT Description of the S/KEY One-time password system
- SKEYFLAW.TXT Vulnerabilities in the S/KEY One-time password system
- DIALOUT1.TXT Novice Manual On Using Outdial Modems by Blue Adept
- HACKHOLL.TXT Hacking in Holland
- INNERC.TXT Blindman's Bluff, Hacker Style
-