home *** CD-ROM | disk | FTP | other *** search
/ ftp.pasteur.org/FAQ/ / ftp-pasteur-org-FAQ.zip / FAQ / alt-2600 / faq next >
Internet Message Format  |  2004-04-11  |  29KB

  1. Path: senator-bedfellow.mit.edu!bloom-beacon.mit.edu!newsfeed.stanford.edu!headwall.stanford.edu!newshub.sdsu.edu!elnk-nf2-pas!newsfeed.earthlink.net!wn51feed!worldnet.att.net!attbi_s54.POSTED!not-for-mail
  2. From: voyager@hackfaq.org (The Voyager)
  3. Organization: The alt.2600 / #hack FAQ
  4. Subject: alt.2600 FAQ Revision 2004/04/11 - Part 1/1
  5. User-Agent: Pan/0.14.2 (This is not a psychotic episode. It's a cleansing moment of clarity.)
  6. Message-ID: <pan.2004.04.11.06.07.21.239000@hackfaq.org>
  7. Newsgroups: alt.2600,alt.answers,news.answers
  8. Followup-To: alt.2600
  9. Reply-To: voyager@hackfaq.org (FAQ Comments address)
  10. Approved: news-answers-request@MIT.EDU
  11. Summary: This posting contains a URL pointer to a list of Frequently Asked
  12. Archive-Name: alt-2600/faq
  13. Posting-Frequency: Monthly
  14. Last-Modified: 2004/04/11
  15. Version: 2004/04/11
  16. URL: http://www.hackfaq.org
  17. MIME-Version: 1.0
  18. Content-Type: text/plain; charset=windows-1252
  19. Content-Transfer-Encoding: 8bit
  20. Lines: 810
  21. NNTP-Posting-Host: 24.9.189.132
  22. X-Complaints-To: abuse@comcast.net
  23. X-Trace: attbi_s54 1081663693 24.9.189.132 (Sun, 11 Apr 2004 06:08:13 GMT)
  24. NNTP-Posting-Date: Sun, 11 Apr 2004 06:08:13 GMT
  25. Date: Sun, 11 Apr 2004 06:08:13 GMT
  26. Xref: senator-bedfellow.mit.edu alt.2600:736372 alt.answers:72381 news.answers:269440
  27.  
  28. From: voyager@hackfaq.org (The Voyager)
  29. Newsgroups: alt.2600,alt.answers,news.answers
  30. Subject: alt.2600 FAQ Revision 2004/04/11 - Part 1/1
  31. Followup-To: alt.2600
  32. Approved: news-answers-request@MIT.EDU
  33. Reply-To: voyager@hackfaq.org (FAQ Comments address)
  34. Summary: This posting contains a URL pointer to a list of Frequently Asked
  35.      Questions (and their answers) about hacking.  It should be read by
  36.      anyone who wishes to post to the alt.2600 newsgroup or use the IRC
  37.      channel #hack.
  38.  
  39. Archive-Name: alt-2600/faq
  40. Posting-Frequency: Monthly
  41. Last-Modified: 2004/04/11
  42. Version: 2004/04/11
  43. URL: http://www.hackfaq.org
  44.  
  45.  
  46. Welcome to the alt.2600/#hack FAQ: Answers to Frequently Asked Questions about
  47. Hacking
  48.  
  49. The purpose of the alt.2600/#hack FAQ is to give you a general introduction to
  50. the art and science of hacking. No document will make you a hacker.
  51.  
  52. Please use the information contained in the alt.2600/#hack FAQ wisely.
  53.  
  54. If you have a question regarding any of the topics covered in the 
  55. alt.2600/#hack FAQ, please direct it to the alt.2600 newsgroup. Please do
  56. not e-mail me your questions; I do not have time to respond to each
  57. request personally.
  58.  
  59.  
  60. The alt.2600/#hack FAQ started as a FAQ for the IRC channel #hack and was
  61. later adopted by the alt.2600 newsgroup. The alt.2600/#hack FAQ now exists
  62. as a web document for all of the Internet.
  63.  
  64. The alt.2600 / #hack FAQ is no longer maintained as an ASCII text file.
  65.  
  66. The only authoritative source for the current alt.2600/#hack FAQ is on the
  67. world wide web at http://www.hackfaq.org
  68.  
  69. The contents of the alt.2600 / #hack FAQ include:
  70.  
  71. http://www.hackfaq.org/computers/reset-bios-password.shtml
  72.      How do I reset a BIOS password?
  73.  
  74. http://www.hackfaq.org/computers/windows-password-file.shtml
  75.      How do I access the password file under Windows NT?
  76.  
  77. http://www.hackfaq.org/computers/crack-windows-nt-passwords.shtml
  78.      How do I crack Windows NT passwords?
  79.  
  80. http://www.hackfaq.org/computers/recover-windows-nt-administrator-password.shtml
  81.      How can I recover a lost Windows NT Administrator Password?
  82.  
  83. http://www.hackfaq.org/computers/windows-password-encryption.shtml
  84.      How does the Microsoft Windows 3.1 password encryption work?
  85.  
  86. http://www.hackfaq.org/computers/strange-directory-file-names.shtml
  87.      How do I change to directories with strange characters in them?
  88.  
  89. http://www.hackfaq.org/computers/identify-system.shtml
  90.      What is this system?
  91.  
  92. http://www.hackfaq.org/computers/default-accounts-passwords.shtml
  93.      What are some default accounts?
  94.  
  95. http://www.hackfaq.org/computers/computer-virus.shtml
  96.      What is a computer virus?
  97.  
  98. http://www.hackfaq.org/computers/computer-worm-virus.shtml
  99.      What is a computer worm?
  100.  
  101. http://www.hackfaq.org/computers/trojan-horse-virus.shtml
  102.      What is a trojan horse?
  103.  
  104. http://www.hackfaq.org/computers/logic-bomb.shtml
  105.      What is a logic bomb?
  106.  
  107. http://www.hackfaq.org/computers/protect-from-viruses.shtml
  108.      How can I protect myself from viruses?
  109.  
  110. http://www.hackfaq.org/computers/information-about-viruses.shtml
  111.      Where can I get more information about viruses?
  112.  
  113. http://www.hackfaq.org/computers/free-spyware-removal.shtml
  114.      How do I remove spyware?
  115.  
  116. http://www.hackfaq.org/computers/key-logger.shtml
  117.      What is a key logger?
  118.  
  119. http://www.hackfaq.org/computers/tempest.shtml
  120.      What is TEMPEST?
  121.  
  122. http://www.hackfaq.org/computers/remove-copy-protection.shtml
  123.      How do I remove copy protection?
  124.  
  125. http://www.hackfaq.org/computers/hex-editor.shtml
  126.      What is a hex editor?
  127.  
  128. http://www.hackfaq.org/computers/debuggers-disassemblers.shtml
  129.      What are debuggers and disassemblers?
  130.  
  131. http://www.hackfaq.org/computers/decompiler.shtml
  132.      Is there any hope of a decompiler that would convert an executable program into C/C++ code?
  133.  
  134. http://www.hackfaq.org/computers/ids-intrusion-detection-system.shtml
  135.      What is an Intrusion Detection System (IDS)?
  136.  
  137. http://www.hackfaq.org/computers/vulnerability-information.shtml
  138.      Where can I find information about vulnerabilities?
  139.  
  140. http://www.hackfaq.org/computers/source-code-security-vulnerabilities.shtml
  141.      How can I find security vulnerabilities in source code?
  142.  
  143. http://www.hackfaq.org/computers/integer-overflow.shtml
  144.      What is an integer overflow?
  145.  
  146. http://www.hackfaq.org/computers/race-condition.shtml
  147.      What is a race condition?
  148.  
  149. http://www.hackfaq.org/computers/format-string-vulnerability.shtml
  150.      What is a format string vulnerability?
  151.  
  152. http://www.hackfaq.org/computers/random-number.shtml
  153.      What is a random number vulnerability?
  154.  
  155. http://www.hackfaq.org/computers/sql-injection-attack.shtml
  156.      What is an SQL Injection Attack / Vulnerability?
  157.  
  158. http://www.hackfaq.org/computers/securely-erase-data.shtml
  159.      How can I securely erase data?
  160.  
  161. http://www.hackfaq.org/computers/two-factor-authentication.shtml
  162.      What is two factor authentication?
  163.  
  164. http://www.hackfaq.org/computers/crack-vms-passwords.shtml
  165.      How do I crack VMS passwords?
  166.  
  167. http://www.hackfaq.org/computers/vms-logging.shtml
  168.      What can be logged on a VMS system?
  169.  
  170. http://www.hackfaq.org/computers/vms-priveleges.shtml
  171.      What privileges are available on a VMS system?
  172.  
  173. http://www.hackfaq.org/unix/crack-unix-passwords.shtml
  174.      How do I crack Unix passwords?
  175.  
  176. http://www.hackfaq.org/unix/unix-password-shadowing.shtml
  177.      What is password shadowing?
  178.  
  179. http://www.hackfaq.org/unix/nis-yp.shtml
  180.      What is NIS (yp)?
  181.  
  182. http://www.hackfaq.org/unix/weird-characters-password-file.shtml
  183.      What are those weird characters after the comma in my passwd file?
  184.  
  185. http://www.hackfaq.org/unix/break-restricted-shell.shtml
  186.      How do I break out of a restricted shell?
  187.  
  188. http://www.hackfaq.org/unix/unix-file-permissions.shtml
  189.      How do Unix file permissions work?
  190.  
  191. http://www.hackfaq.org/unix/suid-root-script-binary.shtml
  192.      How do I gain root from a SUID script or program?
  193.  
  194. http://www.hackfaq.org/unix/erase-unix-system-log-files.shtml
  195.      How do I erase my presence from Unix system logs?
  196.  
  197. http://www.hackfaq.org/unix/rootkit.shtml
  198.      What is a rootkit?
  199.  
  200. http://www.hackfaq.org/unix/timestamp.shtml
  201.      How do I edit Unix timestamps?
  202.  
  203. http://www.hackfaq.org/unix/sudo.shtml
  204.      What is sudo?
  205.  
  206. http://www.hackfaq.org/unix/bootable-linux-distributions.shtml
  207.      What are some bootable Linux distributions?
  208.  
  209. http://www.hackfaq.org/data-networks/change-mac-address.shtml
  210.      How do I change a MAC address?
  211.  
  212. http://www.hackfaq.org/data-networks/cisco-password-recovery.shtml
  213.      How do I recover the password for a Cisco router?
  214.  
  215. http://www.hackfaq.org/data-networks/cisco-decrypt-password.shtml
  216.      How do I decrypt Cisco passwords?
  217.  
  218. http://www.hackfaq.org/data-networks/127.0.0.1.shtml
  219.      What is 127.0.0.1?
  220.  
  221. http://www.hackfaq.org/data-networks/packet-sniffer.shtml
  222.      What is a packet sniffer?
  223.  
  224. http://www.hackfaq.org/data-networks/port-scanner.shtml
  225.      What is a port scanner?
  226.  
  227. http://www.hackfaq.org/data-networks/port-numbers.shtml
  228.      What port number is XXX on?
  229.  
  230. http://www.hackfaq.org/data-networks/anonymous-surfing.shtml
  231.      What is anonymous surfing?
  232.  
  233. http://www.hackfaq.org/data-networks/cookies.shtml
  234.      What are cookies?
  235.  
  236. http://www.hackfaq.org/data-networks/anonymous-remailer.shtml
  237.      What is an anonymous remailer?
  238.  
  239. http://www.hackfaq.org/data-networks/free-e-mail-encryption.shtml
  240.      What are some free e-mail services with encryption?
  241.  
  242. http://www.hackfaq.org/data-networks/send-fake-mail.shtml
  243.      How do I send fake mail?
  244.  
  245. http://www.hackfaq.org/data-networks/fake-post-control-messages-usenet.shtml
  246.      How do I fake posts and control messages to Usenet?
  247.  
  248. http://www.hackfaq.org/data-networks/post-moderated-usenet.shtml
  249.      How do I post to a moderated newsgroup?
  250.  
  251. http://www.hackfaq.org/data-networks/post-usenet-mail.shtml
  252.      How do I post to Usenet via e-mail?
  253.  
  254. http://www.hackfaq.org/data-networks/firewall.shtml
  255.      What is a firewall?
  256.  
  257. http://www.hackfaq.org/data-networks/vpn-virtual-private-network.shtml
  258.      What is a VPN (Virtual Private Network)?
  259.  
  260. http://www.hackfaq.org/data-networks/osi-model.shtml
  261.      What is the OSI model?
  262.  
  263. http://www.hackfaq.org/data-networks/hack-irc-client.shtml
  264.      How do I modify the IRC client to hide my real username?
  265.  
  266. http://www.hackfaq.org/data-networks/internet-outdial.shtml
  267.      What is an Internet outdial?
  268.  
  269. http://www.hackfaq.org/data-networks/attack-internet.shtml
  270.      How do I attack a remote network across the Internet?
  271.  
  272. http://www.hackfaq.org/data-networks/tcp-sequence-prediction.shtml
  273.      What is a TCP sequence prediction attack?
  274.  
  275. http://www.hackfaq.org/data-networks/packet-fragmentation.shtml
  276.      What is packet fragmentation?
  277.  
  278. http://www.hackfaq.org/data-networks/dos-denial-of-service-attack.shtml
  279.      What is a Denial of Service (DoS) attack?
  280.  
  281. http://www.hackfaq.org/data-networks/p2p-peer-to-peer-file-sharing.shtml
  282.      What is peer-to-peer (P2P) file sharing?
  283.  
  284. http://www.hackfaq.org/data-networks/fibre-channel-security.shtml
  285.      How secure are Fibre Channel networks?
  286.  
  287. http://www.hackfaq.org/data-networks/scada.shtml
  288.      What is SCADA?
  289.  
  290. http://www.hackfaq.org/data-networks/ldap-lightweight-directory-access-protocol.shtml
  291.      What is LDAP (Lightweight Directory Access Protocol)?
  292.  
  293. http://www.hackfaq.org/data-networks/hack-ldap.shtml
  294.      How do I hack LDAP (Lightweight Directory Access Protocol)?
  295.  
  296. http://www.hackfaq.org/data-networks/radius.shtml
  297.      What is RADIUS?
  298.  
  299. http://www.hackfaq.org/wireless-networks/wireless-networks.shtml
  300.      What kind of wireless data networks are there?
  301.  
  302. http://www.hackfaq.org/wireless-networks/cdpd-cellular-digital-packet-data.shtml
  303.      What is CDPD (Cellular Digital Packet Data)?
  304.  
  305. http://www.hackfaq.org/wireless-networks/hscsd-high-speed-circuit-switched-data.shtml
  306.      What is HSCSD (High Speed Circuit Switched Data)?
  307.  
  308. http://www.hackfaq.org/wireless-networks/pdc-p-packet-data-cellular.shtml
  309.      What is PDC-P (Packet Data Cellular)?
  310.  
  311. http://www.hackfaq.org/wireless-networks/gprs-general-packet-radio-service.shtml
  312.      What is GPRS (General Packet Radio Service)?
  313.  
  314. http://www.hackfaq.org/wireless-networks/cdma-2000-1xrtt.shtml
  315.      What is CDMA-2000 1xRTT?
  316.  
  317. http://www.hackfaq.org/wireless-networks/bluetooth.shtml
  318.      What is Bluetooth?
  319.  
  320. http://www.hackfaq.org/wireless-networks/irda-infrared.shtml
  321.      What is IrDA?
  322.  
  323. http://www.hackfaq.org/wireless-networks/lmds-local-multipoint-distribution-service.shtml
  324.      What is LMDS (Local Multipoint Distribution Service)?
  325.  
  326. http://www.hackfaq.org/wireless-networks/mmds-multichannel-multipoint-distribution-service.shtml
  327.      What is MMDS (Multichannel Multipoint Distribution Service)?
  328.  
  329. http://www.hackfaq.org/wireless-networks/wi-fi-802.11.shtml
  330.      What is Wi-Fi (802.11)?
  331.  
  332. http://www.hackfaq.org/wireless-networks/ssid.shtml
  333.      What is a SSID?
  334.  
  335. http://www.hackfaq.org/wireless-networks/wep-wired-equivalent-privacy.shtml
  336.      What is WEP (Wired Equivalent Privacy)?
  337.  
  338. http://www.hackfaq.org/wireless-networks/eap-leap-peap-eap-tls-ttls.shtml
  339.      What are EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS?
  340.  
  341. http://www.hackfaq.org/wireless-networks/wpa-wi-fi-protected-access.shtml
  342.      What is WPA (Wi-Fi Protected Access)?
  343.  
  344. http://www.hackfaq.org/wireless-networks/802.11i.shtml
  345.      What is 802.11i?
  346.  
  347. http://www.hackfaq.org/wireless-networks/mic-message-integrity-check.shtml
  348.      What is MIC (Message Integrity Check)?
  349.  
  350. http://www.hackfaq.org/wireless-networks/rsn-robust-secure-network.shtml
  351.      What is RSN (Robust Secure Network)?
  352.  
  353. http://www.hackfaq.org/wireless-networks/tkip-temporal-key-integrity-protocol.shtml
  354.      What is TKIP (Temporal Key Integrity Protocol)?
  355.  
  356. http://www.hackfaq.org/wireless-networks/wrap-wireless-robust-authenticated-protocol.shtml
  357.      What is WRAP (Wireless Robust Authenticated Protocol)?
  358.  
  359. http://www.hackfaq.org/wireless-networks/ccmp-cipher-block-chaining-message-authentication-code-protocol.shtml
  360.      What is CCMP?
  361.  
  362. http://www.hackfaq.org/wireless-networks/802.1X.shtml
  363.      What is 802.1X?
  364.  
  365. http://www.hackfaq.org/wireless-networks/mac-address-filtering.shtml
  366.      What is MAC Address Filtering?
  367.  
  368. http://www.hackfaq.org/wireless-networks/rogue-access-point.shtml
  369.      What is a rogue wireless access point?
  370.  
  371. http://www.hackfaq.org/wireless-networks/wireless-antenna.shtml
  372.      What are some better wireless antenna?
  373.  
  374. http://www.hackfaq.org/wireless-networks/location-directory-wi-fi-hotspot.shtml
  375.      Where can I find a Wi-Fi hotspot?
  376.  
  377. http://www.hackfaq.org/wireless-networks/wi-fi-software-tools.shtml
  378.      What are some interesting Wi-Fi (802.11) tools?
  379.  
  380. http://www.hackfaq.org/wireless-networks/sms-short-message-service.shtml
  381.      What is SMS (Short Message Service)?
  382.  
  383. http://www.hackfaq.org/wireless-networks/wap-wireless-application-protocol.shtml
  384.      What is WAP (Wireless Application Protocol)?
  385.  
  386. http://www.hackfaq.org/telephony/red-box.shtml
  387.      What is a Red Box?
  388.  
  389. http://www.hackfaq.org/telephony/blue-box.shtml
  390.      What is a Blue Box?
  391.  
  392. http://www.hackfaq.org/telephony/blue-boxing.shtml
  393.      Do Blue Boxes still work?
  394.  
  395. http://www.hackfaq.org/telephony/black-box.shtml
  396.      What is a Black Box?
  397.  
  398. http://www.hackfaq.org/telephony/colored-telephone-boxes.shtml
  399.      What do all the colored boxes do?
  400.  
  401. http://www.hackfaq.org/telephony/ani-automatic-number-identification.shtml
  402.      What is ANI (Automatic Number Identification)?
  403.  
  404. http://www.hackfaq.org/telephony/anac-number.shtml
  405.      What is an ANAC number?
  406.  
  407. http://www.hackfaq.org/telephony/ringback-number.shtml
  408.      What is a ringback number?
  409.  
  410. http://www.hackfaq.org/telephony/loop.shtml
  411.      What is a loop?
  412.  
  413. http://www.hackfaq.org/telephony/cna-number.shtml
  414.      What is a CNA number?
  415.  
  416. http://www.hackfaq.org/telephony/ring-busy.shtml
  417.      What are some numbers that always ring busy?
  418.  
  419. http://www.hackfaq.org/telephony/temporary-disconnect.shtml
  420.      What are some numbers that temporarily disconnect phone service?
  421.  
  422. http://www.hackfaq.org/telephony/war-dialing.shtml
  423.      What is war dialing?
  424.  
  425. http://www.hackfaq.org/telephony/war-dialing-law.shtml
  426.      Is war dialing illegal?
  427.  
  428. http://www.hackfaq.org/telephony/make-linemans-handset.shtml
  429.      How can I make a lineman's handset?
  430.  
  431. http://www.hackfaq.org/telephony/purchase-linemans-handset.shtml
  432.      Where can I purchase a lineman's handset?
  433.  
  434. http://www.hackfaq.org/telephony/dtmf-tone-frequencies.shtml
  435.      What are the DTMF tone frequencies?
  436.  
  437. http://www.hackfaq.org/telephony/abcd.shtml
  438.      What are the ABCD tones for?
  439.  
  440. http://www.hackfaq.org/telephony/telephone-tone-frequencies.shtml
  441.      What are the frequencies of the telephone tones?
  442.  
  443. http://www.hackfaq.org/telephony/telephone-voltage.shtml
  444.      What is the voltage used to ring a telephone?
  445.  
  446. http://www.hackfaq.org/telephony/lass-codes.shtml
  447.      What are all of the * (LASS) codes?
  448.  
  449. http://www.hackfaq.org/telephony/cordless-phone-frequency.shtml
  450.      What frequency do cordless phones operate on?
  451.  
  452. http://www.hackfaq.org/telephony/caller-id.shtml
  453.      What is Caller-ID?
  454.  
  455. http://www.hackfaq.org/telephony/block-caller-id.shtml
  456.      How do I block Caller-ID?
  457.  
  458. http://www.hackfaq.org/telephony/defeat-caller-id.shtml
  459.      How do I defeat Caller-ID blocking?
  460.  
  461. http://www.hackfaq.org/telephony/pbx.shtml
  462.      What is a PBX?
  463.  
  464. http://www.hackfaq.org/telephony/vmb-voice-mail-box.shtml
  465.      What is a VMB (Voice Mail Box)?
  466.  
  467. http://www.hackfaq.org/telephony/country-direct-numbers.shtml
  468.      What are the Country Direct Numbers?
  469.  
  470. http://www.hackfaq.org/telephony/phone-switches.shtml
  471.      What are some phone switches?
  472.  
  473. http://www.hackfaq.org/telephony/milliwatt-test-line.shtml
  474.      What is a milliwatt test line?
  475.  
  476. http://www.hackfaq.org/telephony/958-959.shtml
  477.      What are the 958 and 959 NXX's?
  478.  
  479. http://www.hackfaq.org/telephony/clli-codes.shtml
  480.      What are CLLI codes?
  481.  
  482. http://www.hackfaq.org/telephony/datu.shtml
  483.      What is DATU?
  484.  
  485. http://www.hackfaq.org/telephony/proctor-test-set.shtml
  486.      What is a Proctor Test Set?
  487.  
  488. http://www.hackfaq.org/telephony/call-back-dial-back.shtml
  489.      What is call back security?
  490.  
  491. http://www.hackfaq.org/mobile-telephony/mobile-telephone-systems.shtml
  492.      How many types of mobile telephone systems are there?
  493.  
  494. http://www.hackfaq.org/mobile-telephony/advanced-mobile-phone-system.shtml
  495.      What are AMPS (EIA/TIA-553) and NAMPS (IS-91)?
  496.  
  497. http://www.hackfaq.org/mobile-telephony/mtso-mobile-telephone-switching-office.shtml
  498.      What is a MTSO (Mobile Telephone Switching Office)?
  499.  
  500. http://www.hackfaq.org/mobile-telephony/nam-number-assignment-module.shtml
  501.      What is a NAM (Number Assignment Module)?
  502.  
  503. http://www.hackfaq.org/mobile-telephony/esn-electronic-serial-number.shtml
  504.      What is an ESN (Electronic Serial Number)?
  505.  
  506. http://www.hackfaq.org/mobile-telephony/min-mobile-identification-number.shtml
  507.      What is a MIN (Mobile Identification Number)?
  508.  
  509. http://www.hackfaq.org/mobile-telephony/scm-station-class-mark.shtml
  510.      What is a SCM (Station Class Mark)?
  511.  
  512. http://www.hackfaq.org/mobile-telephony/sidh-system-identification-for-home-system.shtml
  513.      What is a SIDH? (System Identification for Home System)
  514.  
  515. http://www.hackfaq.org/mobile-telephony/forward-reverse-channels.shtml
  516.      What are the forward and reverse channels?
  517.  
  518. http://www.hackfaq.org/mobile-telephony/tdma.shtml
  519.      What are IS-54 and IS-136 (TDMA)?
  520.  
  521. http://www.hackfaq.org/mobile-telephony/cdma.shtml
  522.      What is IS-95 (CDMA)?
  523.  
  524. http://www.hackfaq.org/mobile-telephony/gsm.shtml
  525.      What is GSM?
  526.  
  527. http://www.hackfaq.org/mobile-telephony/pcs.shtml
  528.      What is PCS?
  529.  
  530. http://www.hackfaq.org/mobile-telephony/iden.shtml
  531.      What is iDEN?
  532.  
  533. http://www.hackfaq.org/mobile-telephony/cell-phone-cloning.shtml
  534.      What is cloning?
  535.  
  536. http://www.hackfaq.org/mobile-telephony/tumbling.shtml
  537.      What is tumbling?
  538.  
  539. http://www.hackfaq.org/radio/hacker-radios.shtml
  540.      What are these radios I see all of the hacker types carrying around?
  541.  
  542. http://www.hackfaq.org/radio/radio-license.shtml
  543.      Do I need a license to use one of these radios?
  544.  
  545. http://www.hackfaq.org/radio/radio-modification.shtml
  546.      What about modifying (modding) these radios?
  547.  
  548. http://www.hackfaq.org/radio/scanners.shtml
  549.      What are better radios for scanning?
  550.  
  551. http://www.hackfaq.org/radio/trunking.shtml
  552.      What is trunking?
  553.  
  554. http://www.hackfaq.org/radio/pirate-radio.shtml
  555.      What is pirate radio?
  556.  
  557. http://www.hackfaq.org/radio/radio-frequencies.shtml
  558.      What frequencies are used for what purposes?
  559.  
  560. http://www.hackfaq.org/radio/cb-citizens-band-radio.shtml
  561.      What is CB (Citizens Band) Radio?
  562.  
  563. http://www.hackfaq.org/radio/frs-family-radio-service.shtml
  564.      What is FRS (Family Radio Service)?
  565.  
  566. http://www.hackfaq.org/radio/murs-multi-use-radio-service.shtml
  567.      What is MURS (Multi Use Radio Service)?
  568.  
  569. http://www.hackfaq.org/radio/gmrs-general-mobile-radio-service.shtml
  570.      What is GMRS (General Mobile Radio Service)?
  571.  
  572. http://www.hackfaq.org/radio/radio-repeater.shtml
  573.      What is a radio repeater?
  574.  
  575. http://www.hackfaq.org/radio/internet-repeater.shtml
  576.      What is an Internet repeater?
  577.  
  578. http://www.hackfaq.org/television/satellite-television.shtml
  579.      What kinds of satellite television networks are there?
  580.  
  581. http://www.hackfaq.org/television/videocipher-ii.shtml
  582.      What is VideoCipher II RS (VCII RS)?
  583.  
  584. http://www.hackfaq.org/television/digicipher-ii.shtml
  585.      What is DigiCipher II (DCII)?
  586.  
  587. http://www.hackfaq.org/television/free-dss.shtml
  588.      How do I get free DSS programming?
  589.  
  590. http://www.hackfaq.org/television/directv-access-cards.shtml
  591.      What kinds of DirecTV access cards are there?
  592.  
  593. http://www.hackfaq.org/television/signal-theft.shtml
  594.      What do DirecTV and Dish Network do to stop signal theft?
  595.  
  596. http://www.hackfaq.org/television/software-dss-access-cards.shtml
  597.      What software is there to experiment with access cards?
  598.  
  599. http://www.hackfaq.org/television/access-card-reader-writer.shtml
  600.      What are the different types of access card hardware?
  601.  
  602. http://www.hackfaq.org/television/where-access-card-reader-writer.shtml
  603.      Where can I purchase hardware to experiment with access cards?
  604.  
  605. http://www.hackfaq.org/television/directv-extension.shtml
  606.      What is this extension DirecTV is telling me to call?
  607.  
  608. http://www.hackfaq.org/television/tivo.shtml
  609.      What can I do with a TiVo?
  610.  
  611. http://www.hackfaq.org/television/content-scrambling-system.shtml
  612.      What is CSS (Content Scrambling System)?
  613.  
  614. http://www.hackfaq.org/television/regional-playback-control.shtml
  615.      What is RPC (Regional Playback Control)?
  616.  
  617. http://www.hackfaq.org/television/regional-coding-enhancement.shtml
  618.      What is RCE (Regional Coding Enhancement)?
  619.  
  620. http://www.hackfaq.org/television/macrovision.shtml
  621.      What is Macrovision?
  622.  
  623. http://www.hackfaq.org/cryptology/cryptology-cryptography-cryptanalysis.shtml
  624.      What are cryptology, cyptography, and cryptanalysis?
  625.  
  626. http://www.hackfaq.org/cryptology/plaintext-ciphertext.shtml
  627.      What are plaintext and ciphertext?
  628.  
  629. http://www.hackfaq.org/cryptology/symmetric-asymmetric.shtml
  630.      What are symmetric and asymmetric ciphers?
  631.  
  632. http://www.hackfaq.org/cryptology/block-stream-cipher.shtml
  633.      What are block and stream ciphers?
  634.  
  635. http://www.hackfaq.org/cryptology/substitution-transposition-cipher.shtml
  636.      What are substitution and transposition ciphers?
  637.  
  638. http://www.hackfaq.org/cryptology/chosen-plaintext-attack.shtml
  639.      What is a chosen plaintext attack?
  640.  
  641. http://www.hackfaq.org/cryptology/known-plaintext-attack.shtml
  642.      What is a known plaintext attack?
  643.  
  644. http://www.hackfaq.org/cryptology/known-ciphertext-attack.shtml
  645.      What is a known ciphertext attack?
  646.  
  647. http://www.hackfaq.org/cryptology/brute-force-attack.shtml
  648.      What is a brute force attack?
  649.  
  650. http://www.hackfaq.org/cryptology/dictionary-attack.shtml
  651.      What is a dictionary attack?
  652.  
  653. http://www.hackfaq.org/cryptology/rubber-hose-cryptology.shtml
  654.      What is rubber hose cryptology?
  655.  
  656. http://www.hackfaq.org/cryptology/message-digest.shtml
  657.      What is a message digest?
  658.  
  659. http://www.hackfaq.org/cryptology/md5.shtml
  660.      What is MD5?
  661.  
  662. http://www.hackfaq.org/cryptology/digital-signature.shtml
  663.      What is a digital signature?
  664.  
  665. http://www.hackfaq.org/cryptology/pgp.shtml
  666.      What is PGP?
  667.  
  668. http://www.hackfaq.org/cryptology/gpg.shtml
  669.      What is GPG?
  670.  
  671. http://www.hackfaq.org/cryptology/disk-encrypt.shtml
  672.      How can I encrypt an entire disk?
  673.  
  674. http://www.hackfaq.org/cryptology/recover-zip-password.shtml
  675.      How can I recover a Zip password?
  676.  
  677. http://www.hackfaq.org/cryptology/cryptographic-algorithms.shtml
  678.      What are some common cryptographic algorithms?
  679.  
  680. http://www.hackfaq.org/cryptology/rot-13.shtml
  681.      What is ROT-13?
  682.  
  683. http://www.hackfaq.org/cryptology/xor-encryption.shtml
  684.      What is XOR encryption?
  685.  
  686. http://www.hackfaq.org/cryptology/one-time-pad.shtml
  687.      What is a one-time pad?
  688.  
  689. http://www.hackfaq.org/cryptology/des-data-encryption-standard.shtml
  690.      What is DES?
  691.  
  692. http://www.hackfaq.org/cryptology/rc4.shtml
  693.      What is RC4?
  694.  
  695. http://www.hackfaq.org/cryptology/rsa-rivest-shamir-adleman.shtml
  696.      What is RSA?
  697.  
  698. http://www.hackfaq.org/cryptology/dh-diffie-hellman.shtml
  699.      What is Diffie-Hellman?
  700.  
  701. http://www.hackfaq.org/cryptology/aes-advanced-encryption-standard-rijndael.shtml
  702.      What is AES (Rijndael)?
  703.  
  704. http://www.hackfaq.org/cryptology/cryptographic-libraries.shtml
  705.      What are some useful cryptographic libraries?
  706.  
  707. http://www.hackfaq.org/cryptology/kerberos.shtml
  708.      What is Kerberos?
  709.  
  710. http://www.hackfaq.org/cryptology/tls-transport-layer-security.shtml
  711.      What is TLS (Transport Layer Security)?
  712.  
  713. http://www.hackfaq.org/cryptology/steganography.shtml
  714.      What is steganography?
  715.  
  716. http://www.hackfaq.org/resources/hacker-web-sites.shtml
  717.      What are some World Wide Web (WWW) sites of interest to hackers?
  718.  
  719. http://www.hackfaq.org/resources/hacker-ftp-sites.shtml
  720.      What are some FTP sites of interest to hackers?
  721.  
  722. http://www.hackfaq.org/resources/hacker-usenet-newsgroups.shtml
  723.      What are some newsgroups of interest to hackers?
  724.  
  725. http://www.hackfaq.org/resources/hacker-irc-channels.shtml
  726.      What are some IRC channels of interest to hackers?
  727.  
  728. http://www.hackfaq.org/resources/hacker-books.shtml
  729.      What are some books of interest to hackers?
  730.  
  731. http://www.hackfaq.org/resources/hacker-videos.shtml
  732.      What are some videos of interest to hackers?
  733.  
  734. http://www.hackfaq.org/resources/hacker-mailing-lists.shtml
  735.      What are some mailing lists of interest to hackers?
  736.  
  737. http://www.hackfaq.org/resources/hacker-magazines.shtml
  738.      What are some print magazines of interest to hackers?
  739.  
  740. http://www.hackfaq.org/resources/hacker-zines.shtml
  741.      What are some e-zines of interest to hackers?
  742.  
  743. http://www.hackfaq.org/resources/hacker-organizations.shtml
  744.      What are some organizations of interest to hackers?
  745.  
  746. http://www.hackfaq.org/resources/hacker-radio-shows.shtml
  747.      What are some radio shows of interest to hackers?
  748.  
  749. http://www.hackfaq.org/resources/hacker-faq.shtml
  750.      What are other FAQ's of interest to hackers?
  751.  
  752. http://www.hackfaq.org/resources/hacker-conferences.shtml
  753.      What are some conferences of interest to hackers?
  754.  
  755. http://www.hackfaq.org/resources/mag-stripe-reader.shtml
  756.      Where can I purchase a magnetic stripe reader/writer?
  757.  
  758. http://www.hackfaq.org/resources/rainbow-books.shtml
  759.      What are the rainbow books and how can I get them?
  760.  
  761. http://www.hackfaq.org/2600/alt-2600.shtml
  762.      What is alt.2600?
  763.  
  764. http://www.hackfaq.org/2600/meaning-2600.shtml
  765.      What does 2600 mean?
  766.  
  767. http://www.hackfaq.org/2600/2600-online.shtml
  768.      Are there on-line versions of 2600 available?
  769.  
  770. http://www.hackfaq.org/2600/2600-bookstores.shtml
  771.      I can't find 2600 at any bookstores.  What can I do?
  772.  
  773. http://www.hackfaq.org/2600/2600-cost.shtml
  774.      Why does 2600 cost more to subscribe to than to buy at a newsstand?
  775.  
  776. http://www.hackfaq.org/cards/smart-card.shtml
  777.      What is a Smart Card?
  778.  
  779. http://www.hackfaq.org/cards/common-smart-card.shtml
  780.      What are some common Smart Cards?
  781.  
  782. http://www.hackfaq.org/cards/mag-stripe-cards.shtml
  783.      What is the layout of data on magnetic stripe cards?
  784.  
  785. http://www.hackfaq.org/cards/valid-credit-card-number.shtml
  786.      How do I determine if I have a valid credit card number?
  787.  
  788. http://www.hackfaq.org/cards/rfid.shtml
  789.      What is RFID?
  790.  
  791. http://www.hackfaq.org/miscellaneous/acronyms.shtml
  792.      What does XXX stand for?
  793.  
  794. http://www.hackfaq.org/miscellaneous/pda.shtml
  795.      What's inside my PDA (Personal Digital Assistant)?
  796.  
  797. http://www.hackfaq.org/miscellaneous/palm-pilot.shtml
  798.      Can I hack my Palm Pilot?
  799.  
  800. http://www.hackfaq.org/miscellaneous/xbox.shtml
  801.      Can I hack my XBOX?
  802.  
  803. http://www.hackfaq.org/miscellaneous/ethics-hacking.shtml
  804.      What are the ethics of hacking?
  805.  
  806. http://www.hackfaq.org/miscellaneous/warez.shtml
  807.      Where can I find warez?
  808.  
  809. http://www.hackfaq.org/miscellaneous/pick-locks.shtml
  810.      How can I pick locks?
  811.  
  812. http://www.hackfaq.org/miscellaneous/0-day.shtml
  813.      What is 0-day?
  814.  
  815. http://www.hackfaq.org/miscellaneous/hack-traffic-lights.shtml
  816.      How can I hack traffic lights?
  817.  
  818. http://www.hackfaq.org/miscellaneous/biometrics.shtml
  819.      What are biometrics?
  820.  
  821. http://www.hackfaq.org/miscellaneous/bar-codes.shtml
  822.      How do bar codes work?
  823.  
  824. http://www.hackfaq.org/miscellaneous/simplex-lock.shtml
  825.      How do I open a Simplex lock?
  826.  
  827. http://www.hackfaq.org/miscellaneous/social-engineering.shtml
  828.      What is social engineering?
  829.  
  830. http://www.hackfaq.org/miscellaneous/computer-crime-laws.shtml
  831.      What are the computer crime laws?
  832.  
  833. http://www.hackfaq.org/miscellaneous/wordlist.shtml
  834.      What is a wordlist?
  835.  
  836.  
  837.  
  838.