A. A DNIS says which network connect to the telnet you are using.
Q. What is NUA?
A. The NUA is the address of the computer on telnet.
Q. What is a VAX/VMS?
A. A vax/vms is Digital Equipment's major computer line. It's
proprietary operating system is known as vms.
Q. What is telnet?
A. Telnet is a program which lets you log in to other computers on the net.
Q. What is an anonymous remailer?
A. An anonymous remailer is a system on the Internet that allows you to
send e-mail anonymously or post messages to Usenet anonymously. You apply
for an anonymous ID at the remailer site. Then, when you send a message to
the remailer, it sends it out from your anonymous ID at the remailer. No one
reading the post will know your real account name or host name. If someone
sends a message to your anonymous ID, it will be forwarded to your real
account by the remailer.
Q. What is PGP?
A. This FAQ answer is excerpted from:
PGP(tm) User's Guide Volume I: Essential Topics by Philip Zimmermann
PGP(tm) uses public-key encryption to protect E-mail and data files.
Communicate securely with people you've never met, with no secure channels
needed for prior exchange of keys. PGP is well featured and fast, with
sophisticated key management, digital signatures, data compression, and good
ergonomic design.
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a high
security cryptographic software application for MS-DOS, Unix, VAX/VMS, and
other computers. PGP allows people toexchange files or messages with privacy, authentication, and convenience. Privacy means that only those intended to receive a message can read it. Authentication means that messages that appear to be from a particular person can only have originated from that person. Convenience means that privacy and authentication are provided without the hassles of managing keys associated with conventional cryptographic software. No secure channels are needed to exchange keys between users, which makes PGP much easier to use. This is because PGP is based on a powerful new technology called "public key" cryptography. PGP combines the convenience of the Rivest-Shamir-Adleman (RSA) public key cryptosystem with the speed of conventional cryptography, message digests for digital signatures, data compression before encryption, good ergonomicdesign, and sophisticated key management. And PGP performs the public-key
functions faster than most other software implementations. PGP is public
key cryptography for the masses.
Q. What is tcp/ip?
A. Tcp/ip is the system networks use to communicate with each other. It
stands for Transmission Control Protocol/Internet Protocol.
Q. What is a virus?
A. A Virus is a program which reproduces itself. It may attach itself
to other programs, it may create copies of itself. It may damage or corrupt
data, change data, or degrade the performance of your system by utilizing
resources such as memory or disk space. Some Viruse scanners detect some
Viruses. No Virus scanners detect all Viruses. Virus scanners will work
for a while but people are always creating virii that will beat them.
Q. What is a trojan?
A. A trojan is a program which does an unauthorized function, hidden
inside an authorized program. It does something other than it claims to do,
usually something malicious, and it is intended by the author to do whatever
it does. If it is not intentional, it is called a bug.
Q. What is a worm?
A. Worms are programsthat copy themselves over and over using up space
and slowing down the system. They are self contained and use the networks
to spread, in much the same way that Viruses use files to spread. Some
people say the solution to Viruses and worms is to just not have any files
or networks.
Q. What do I need to become a hacker?
A. You should start off with a good scanner, some dialups, a telnet
client, and some knowladge of hacking. Those are the basic things that you
will need. If you are serious about hacking then you should get Unix, or
Linux(smaller, free version of unix).
Q. What are some common accounts for Novell Netware?
A. Below is a list of commonly used accounts for Novell Netware.
EPIC (Electronic Privacy Information Center) at: http:/epic.org/
FIRST (Forum of Incident Reponse and Security Teams) at:
http://first.org/first/
Internet Society at http://www.isoc.org/
Q. What is a "rainbow book?"
A. Rainbow Books are books on security. The current book listing is
listed below. Some of these can be downloaded at www.ncsc.radium.mil.
Orange Book- Department of Defense Trusted Computer System Evaluation Criteria.
Green Book- Department of Defense Password Management Guideline.
Yellow Book- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.
Tan Book- A Guide to Understanding Audit in Trusted Systems.
Bright Blue Book- A Guide for Vendors.
Neon Orange Book- A Guide to Understanding Discretionary Access Control in Trusted Systems.
Teal Green Book- Glossary of Computer Security Terms.
Red Book- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria.
Burgandy Book- A Guide to Understanding Design Documentation in Trusted Systems.
Dark Lavender Book- A Guide to Understanding Trusted Distribution in Trusted Systems.
Venice Blue Book- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria.
Aqua Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Security Modeling in Trusted Systems.
Dark Red Book- Guidance for Applying the Trusted Network Interpretation.
Pink Book- Department of Defense Trusted Computer System Evaluation Criteria Rating Maintenance Phase.
Purple Book- Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Formal Verification Systems.
Brown Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Trusted Facility Management.
Yellow-Green Book- Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Writing Trusted Facility Manuals.
Light Blue Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Identification and Authentication in Trusted Systems.
Blue Book- Department of Defense Trusted Computer System Evaluation Criteria Trusted Product Evaluation Questionnaire.
Grey Book-Department of Defense Trusted Computer System Evaluation Criteria Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System.
Lavender Book- Department of Defense Trusted Computer System Evaluation Criteria Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria.
Bright Orange Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understandng Security Testing and Test Documentation in Trusted Systems.
Hot Peach Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Writing the Security Features User's Guide for Trusted Systems.
Turquoise Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems.
Violet Book- Department of Defense Trusted Computer System Evaluation Criteria Assessing Controlled Access Protection.
Light Pink Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Covert Channel Analysis of Trusted Systems.
C1 Technical Report-001- Department of Defense Trusted Computer System Evaluation Criteria Computer Viruses: Prevention, Detection, and Treatment.
C Technical Report 79-91- Department of Defense Trusted Computer System Evaluation Criteria Integrity in Automated Information Systems.
C Technical Report 39-92- Department of Defense Trusted Computer System Evaluation Criteria The Design and Evaluation of INFOSEC systems: The Computer Security Contributions to the Composition Discussion.
NTISSAM COMPUSEC/1-87- Department of Defense Trusted Computer System Evaluation Criteria Advisory Memorandum on Office Automation Security Guideline.
Q. What is a firewall?
A. A firewall is a system or group of systems that enforces an access control policy between two networks. The
actual means by which this is accomplished varies widely, but in principle,
the firewall can be thought of as a pair of mechanisms: one which exists to
block traffic, and the other which exists to permit traffic. Some firewalls
place a greater emphasis on blocking traffic, while others emphasize
permitting traffic. Probably the most important thing to recognize about a
firewall is that it implements an access control policy. If you don't have
a good idea what kind of access you want to permit or deny, or you simply
permit someone or some product to configure a firewall based on what they
or it think it should do, then they are making policy for your organization
as a whole.
Q. How can I use PGP to benefit me?
A. PGP is easy to use, it does give you enough rope so that you can hang
yourself. You should become thoroughly familiar with the various options in
PGP before using it to send serious messages. For example, giving the
command pgp -sat <filename> will only sign a message, it will not encrypt it.
Even though the output looks like it is encrypted, it really isn't. Anybody
in the world would be able to recover the original text.
Q. What is a sniffer?
A. Taken from the Sniffer FAQ.
Unlike telephone circuits, computer networks are shared communication
channels. It is simply too expensive to dedicate local loops to the switch
(hub) for each pair of communicating computers. Sharing means that
computers can receive information that was intended for other machines.
To capture the information going over the network is called sniffing.
The most popular way of connecting computers is through ethernet.
Ethernet protocol works by sending packet information to all the
hosts on the same circuit. The packet header contains the proper
address of the destination machine. Only the machine with the matching
address is suppose to accept the packet. A machine that is accepting all
packets, no matter what the packet header says, is said to be in
promiscuous mode.
Because, in a normal networking environment, account and password information is passed along
ethernet in clear-text, it is not hard for an intruder once they obtain
root to put a machine into promiscuous mode and by sniffing, compromise all
the machines on the net.
Q. What is Psychotic?
A. I would describe Psychotic as more of a proffessional group rather than
just a hacking clan. We think about money first and hacking second, even
though I'm sure that most of you have seen a few of our hacking projects...
Q. Is psychotic looking for new members?
A. Well as of now we aren't looking for any additions to our staff.
Q. What is Psychosis?
A. Psychosis is a personal project taken up by Virtual Circuit. It's an
award that he gives out to hackers that have done something to stand out
(good webpage, revealed exploits, etc.). If you think that you should
receive the award you can mail him about it. But I can tell you now that
the award isn't easy to get.
Q. Where can I find some good resources on hacking and phreaking?
A. Well we aren't much for links but you should check the Psychosis
page for his webpage award winners. He picks only the best.
Q. Who are all the members in Psychotic?
A. Most of us would like to stay anonymous. But you will see a members
name every now and then.
Q. What is the Psychotic Tech Lab?
A. Since Psychotics break up in April we were short on releasing our
zine so the new and improved Psychotic has added a few issues to the old
zine and now its out in the public. You can find it on many sites.
Q. What are Psychotic's offered services?
A. Psychotic has many different services but as of now we are getting
re-organized and putting our network together. We will discuss our services