home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 85.4 KB | 2,129 lines |
-
- ________________________________________________________________________________
-
-
- Trader's Computer Underground Bibliography
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- TUB
- ~~~
-
- Volume 1.0
-
- January 31, 1991
-
- File Size - 2100 Lines, 86 Kb
-
- ________________________________________________________________________________
-
-
- This file is an attempt at a comprehensive listing of known sources of computer
- underground information. I started writing it as a reference source, for
- myself, to aid in my learning Hack/Phreak topics and thought that it might be
- just as useful to others, as well as serving as an archive listing for under-
- ground publishers/publications.
-
- This file is up to date, to the best of my knowledge, as of 12/31/1990. I
- welcome suggestions regarding additions of new or overlooked publications,
- particularly those that are not (currently) electronically distributed (i.e.
- 2600, TAP, etc). I would especially appreciate if you would send the material
- to which you are referring (for those media sources which are electronically
- distributed) to one of the sources listed below (be sure to drop me a note if
- you u/l something, to be sure that I notice). I intend to update this file
- every 3-6 months, as time permits.
-
- However, I maintain the copyright on this file and do not authorize anyone to
- modify it in any way.
-
- One other note needs mentioning. Because my interests were only in H/P topics
- at the time this project was begun, this bibliography is necessarily limited to
- publishers/publications that are generally H/P oriented. However, I recognize
- the fact that the scope of the Computer Underground is much more diverse,
- perhaps infinitely so. Such fine publications as those by Toxic Shock, and
- other (primarily) politically-oriented publications have been left out of this
- issue of Trader's Underground Bibliography. Future issues of TUB may include
- such publications depending on the responses I get from readers and publishers.
-
- Finally, if you are a publisher included on this list who has not been heard
- from in a while, drop a note, either yourself, or through someone else, to let
- the community know whether you are still active, or where floral arrangements
- should be sent.
-
- Later.
-
- ________________________________________________________________________________
-
- Index
- ~~~~~
-
- Publisher/Title Line #
- --------------- ------
-
- CuD - Computer Underground Digest 0079
- cDc - Cult of the Dead Cow 0595
- LOD/H Technical Journal 0758
- LOL - Legions of Lucifer 0830
- NARC - Nuclear hAckers phReakers Carders 0850
- NIA - Network Information Access 0893
- Phantasy 1339
- Phrack Inc/Phrack Classic 1381
- P/HUN - Phreakers Hackers Underground Network 1123
- Academic Papers 2033
- Books That Government Agencies THINK are Hacker Manuals 2051
- Acknowledgements, comments, contacts, etc 2060
-
- ________________________________________________________________________________
-
-
- CuD - Computer underground Digest
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Jim Thomas & Gordon Meyer
- Northern Illinois University
-
- Distribution:
-
- Internet/Bitnet: Inquire at TK0JUT2@NIU.bitnet
- USENET: alt.society.cu-digest
-
-
-
- CuD 1.00 March 28, 1990
- --------
-
- 1.) Moderator's Introduction GM/JT
- 2.) Background of the LOD Debates Various
- 3.) Use of Aliases in the BBS World
- 4.) LOD Indictment
- 5.) Press Release Accompanying LOD Indictment
-
-
- CuD 1.01 March 31, 1990
- --------
-
- 1.) Opening the Kimono too Far Mark Seiden
- 2.) Which Witch Hunt?
- 3.) CuD's First Copyright Squabble-- The Austin
- American Statesman
- 4.) Satirical Article from Phrack 29, phile 7 (reprint)
-
-
- CuD 1.02 April 2, 1990
- --------
-
- 1.) Messages Received
- 2.) Hacking in England (news article)
- 3.) The FBI and BBS Surveillance (PHRACK Reprint)
-
-
- CuD 1.03 April 8, 1990
- --------
-
- 1.) News and Notes (Moderators)
- 2.) The Future of Hacking Christopher
- Seline
- 3.) Hacking into NASA Ellis Dea
- 4.) The FBI sets up Earth First!? Anonymous
- 5.) An Alternative View of Piracy JT/GM
- 6.) Hackers in the News: LOD, Australian Hackers
-
-
- CuD 1.04 April 11, 1990
- --------
-
- Special Issue - Alcor's Suit Against E-Mail Confiscation
-
-
- CuD 1.05 April 22, 1990
- --------
-
- 1.) Moderator's Corner JT/GM
- 2.) From the Mailbag
- 3.) Freedom of Information / FBI Surveillance of BBS's
- 4.) An Awkward Conversation with S.P.A.
- 5.) "Errata"
-
-
- CuD 1.06 April 27, 1990
- --------
-
- 1.) Moderator's Corner JT/GM
- 2.) Lists *CAN* Get You Listed
- 3.) Legion of Doom (Austin/Chicago) Update (27 April)
- 4.) Review of the Cuckoo's Egg
- 5.) SMTP Hints
-
-
- CuD 1.07 May 5, 1990
- --------
-
- 1.) Moderator's Corner JT/GM
- 2.) The CU in the News
- 3.) Response to the Stoll review by Stephen Tihor
- 4.) A Comment on Hacking (reprint)
- 5.) A Computer Game that "Just Says No??!"
- 6.) CU Poem: "Imagine" Roberta Barlow
-
-
- CuD 1.08 May 9, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag (Could it be the Broccoli King?)
- 3.) Report on Morris Sentencing Lawrence
- Kestenbaum
- 4.) Sysops Under Fire (reprint)
- 5.) Bboard Symbols Ruth Hanschka
-
-
- CuD 1.09 May 16, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Richard Duffy
- 3.) Operation Sun Devil: Press Release
- 4.) Operation Sun Devil: Secret Service Statement
- 5.) News Excerpts about Operation Sun Devil
- 6.) Software Publishers Association Update
-
-
- CuD 1.10 May 17, 1990
- --------
-
- Special Issue - 2600 Magazine's Commentary on Emmanuel
- Operation Sun Devil Goldstein
-
-
- CuD 1.11 May 29, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Media and the (witch)hunt for the Computer Underground
- 3.) BBS Stings Anonymous
- 4.) Comment on Sun Devil Press Release and other Various
- related views
-
-
- CuD 1.12 June 10, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Another Cuckoo's Egg Review Charles Stanford
- 4.) Pat Townson's Interview with David Tomkin
- 5.) Where Are They Now? (Tracing CU Magazines)
-
-
- CuD 1.13 June 12, 1990
- --------
-
- 1.) Moderator's Editorial: The Chilling Effect Hits Home
- 2.) A Hacker's Perspective Johnny Yonderboy
- 3.) Len Rose Information and Commentary
- 4.) Response to Telecom Digest's Views Emmanuel
- Goldstein
- 5.) Reprinted Editorial on Steve Jackson Games
-
-
- CuD 1.14 June 14, 1990
- --------
-
- 1.) Moderator's Comments
- 2.) Mail: 1) SS jurisdiction; 2) Busts
- 3.) Craig Neidorf's New Indictment Gordon Meyer
- 4.) Is This Evidence? (response to indictment) Jim Thomas
- 5.) Mike Godwin on Search Warrants, etc.
-
-
- CuD 1.15 June 16, 1990
- --------
-
- Special Issue - June Indictment of Craig Neidorf
-
-
- CuD 1.16 June 19, 1990
- --------
-
- Special Issue - Judge Bua's Opinion on Motion to Dismiss
-
-
- CuD 1.17 June 21, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Info World Article and Response Mike Godwin
- 4.) LOD and the Secret Service Mike Godwin
- 5.) California law Targets Info Possession as Felonious??
- 6.) Hackers in the News (reprint) Adam Gaffin
-
-
- CuD 1.18 June 25, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Title 18 USC (Section) 1343 and Comments Mike Godwin
- 4.) Have Federal Prosecutors Gone too Far? Jim Thomas
- 5.) FBI Response to Rep. Don Edwards query of BBS Spying
-
-
- CuD 1.19 June 26, 1990
- --------
-
- Special Issue - Malice in Wonderland: The E911 Charges (part I)
-
-
- CuD 1.20 June 29, 1990
- --------
-
- Special Issue - Malice in Wonderland: The E911 Charges (part II)
-
-
- CuD 1.21 July 8, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) On the Problem of Evidence in Computer Investigation
- 4.) Response to Mitch Kapor's Critics Emmanuel
- Goldstein
- 5.) The CU in the News: Excerpts from Computerworld article
-
-
- CuD 1.22 July 14, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Response to "Problems of Evidence" Mike Godwin
- 4.) What To Do When the Police Come a'knockin Czar Donic
- 5.) Observations on the Law Mike Godwin
- 6.) Electronic Frontier Foundation (EFF) Press Releases
-
-
- CuD 1.23 July 18, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) FTPing through BITNET: BITFTP Help
- 3.) Phrack as "Evidence"
- 4.) CU in the news
-
-
- CuD 1.24 July 22, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Neidorf Trial: First Day
- 3.) EFF Update John Perry
- Barlow
- 4.) Press Release from Atlanta Prosecutor on LOD Guilty Plea
- 5.) Cu in the News
-
-
- CuD 1.25 July 28, 1990
- --------
-
- 1.) Moderator's Comments
- 2.) Neidorf Trial Over: Charges Dropped
- 3.) Warning About Continued Harassment of BBS's Keith Henson
- 4.) League for Programming Freedom Protests Lotus Litigation
-
-
- CuD 1.26 August 2, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) GURPS: Review of Steve Jackson's Cyberpunk Game Gordon Meyer
- 3.) Cyberspace Subculture in Real Life Mike Godwin
- 4.) Update on RIPCO BBS and Dr. Ripco Jim Thomas
- 5.) The Current TAP TAP Editors
-
-
- CuD 1.27 August 9, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Dr. Ripco Speaks Out
- 4.) SJG GURPS Cyberpunk
-
-
- CuD 1.28 August 12, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) A Conversation With Len Rose Jim Thomas
- 3.) Len Rose's Indictment
-
-
- CuD 1.29 August 19, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Direction of CuD Moderators
- 4.) Password Checking Programs and Trojan Horses
- 5.) What is Cyberspace?
- 6.) CU in the News
-
-
- CuD 2.00 August 25, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) EFF Mailing #3: About the EFF EFF
- 3.) Len Rose's Search Warrant Anonymous
- 4.) What to Read When the SS is at the Door Dark Mage
- 5.) CU in the News
-
-
- CuD 2.01 August 31, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Proposed Changes in Computer Abuse Act (S.2476) Moderators
- 3.) CPSR Seeks FBI Data on Bulletin Board Monitoring CPSR
- 4.) Computers, Social Responsibility, and Political Action Bob Gleason
- 5.) Another Experience with the SS Anonymous
- 6.) CU in the News
-
-
- CuD 2.02 September 9, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Musing over Operation Sun Devil Jim Thomas
- 3.) RIPCO BBS Back On-Line Moderators
- 4.) CuD Index, Volume 1 Moderators
- 5.) CU in the News Various
-
-
- CuD 2.03 September 14, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Len Rose's Experience with the Secret Service Len Rose
- 3.) Tim Wolfson's Address, cite list Tim Wolfson
- 4.) A Comment on Zod's Case Entity
-
-
- CuD 2.04 September 23, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Re: Evidence (was Re: Musing on Constitutionality) Anonymous
- 3.) Why the FBI Should be Concerned about the SS Anonymous
- 4.) California Computer Abuse Law Revisited Moderators
- 5.) Candidate for State Governor Supports Electronic Freedom Jim Warren
- and Privacy
- 6.) Review of Steven Levy's Cloak and Dagger Gordon Meyer
- 7.) CU in the News Various
-
-
- CuD 2.05 September 30, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Re: The CU in the News (Mail Reading)
- 3.) Activist Times, Inc (ATI)-- Background PA and GZ
- 4.) The Status of the Electronic forum (BBS) Brad Templeton
- 5.) Another Experience with the Law Watcher
- 6.) Some views on what to do if Questioned by LE Agents Various
- 7.) CU in the News Various
-
-
- CuD 2.06 October 6, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) MARS BBS Sting a Prank Jim Thomas
- 4.) Another View of Hacking Toxic Shock
- 5.) CU in the News Various
-
-
- CuD 2.07 October 15, 1990
- --------
-
- 1.) Moderator's Corner JT/GM
- 2.) Re: IBM Mainframe Trojan Repost <CHRISTMA EXEC> Wes Morgan
- 3.) CPSR Annual Meeting
- 4.) EFF Hires Staff Counsel Mike Godwin
- 5.) 13th Annual National Computer Security Conference (pt 1) Gordon Meyer
- 6.) 13th Annual National Computer Security Conference (pt 2) Craig Neidorf
- 7.) Summary of Computer Ethics (book) Gordon Meyer
- 8.) Introduction to Toxic Shock Bloody
- Afterbirth
-
-
- CuD 2.08 October 20, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) From the Mailbag Various
- 3.) Prodigy, Problems, and Censorship Karl Lehenbauer
- 4.) Censorship on the Nets Moderators
- 5.) PC's and Political Action Jim Warren
-
-
- CuD 2.09 October 27, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Len Rose Arrest Moderators
- 3.) Mars was not censored Gene Spafford
- 4.) Response to Mars Censoring Dan Hankins
- 5.) SJG Update Steve Jackson
- 6.) The Future of Hacking and the System Security Profession BORGVM
- 7.) The Ultimate Interface: Hackers and the Private Sector The Dark Adept
- 8.) CU in the News
-
-
- CuD 2.10 November 2, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Len Rose Funds--A Humanitarian Necessity
- 3.) EFF Seeks Executive Director (Job Announcement)
- 4.) Massachusettes Computer Crime Bill Mitch Kapor
- 5.) Re: C-u-D 2.09 Censoring of Gif's Alfred Heitink
- 6.) The Piratical Dilemma The Butler
- 7.) Obtaining Identification Cards Anonymous
- 8.) Logisticon vs Revlon Tom Fitzgerald
- 9.) In-House Security Problems The Dark Adept
-
-
- CuD 2.11 November 13, 1990
- --------
-
- Special Issue: Search Affidavit for Steve Jackson Games
-
-
- CuD 2.12 November 17, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) PhD Candidate Seeks Information on the CU P. A. Taylor
- 3.) Riggs, Darden, and Grant Sentenced Moderators
- 4.) Prodigy Saga Continues Adam Gaffin
- 5.) Re: Response to MARS Censoring Laird Heal
- 6.) Response to SJG Affadavit (part 1) David G. Cantor
- 7.) Warrants schmarrants, the SS is Crazy! Anonymous
- 8.) More Guidelines on what to do if Busted The Conflict
- 9.) CU in the News
-
-
- CuD 2.13 November 25, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) EPIC (Effective Performance in Candidates) Jeffery Aldrich
- 3.) The Riggs Sentencing (reprint) J&B McMullen
- 4.) First Conference on Computers, Freedom, and Privacy Jim Warren
- 5.) Hackers Break into DEA Lines Joe Abernathy
-
-
- CuD 2.14 November 30, 1990
- --------
-
- 1.) Moderator's Corner (news and notes) JT/GM
- 2.) Len Rose Indicted Moderators
- 3.) CPSR's FOIA Request from the FBI Marc Rotenberg
- 4.) International Information Retrieval Guild
- 5.) A Note on Censorship Czar Donic
- 6.) Two Comments on Prodigy Alex Gross and
- Steven Grabhorn
- 7.) Don't Talk to Cops Robert W. Zeuner
- 8.) Response to DEA/PBX News Story Various
-
-
- CuD 2.15 December 5, 1990
- --------
-
- 1.) Moderators' Corner JT/GM
- 2.) Len Rose Indictment in Illinois
- 3.) 2600 Magazine Response to Atlanta Sentencing Emmanuel
- Goldstein
- 4.) List of Computer Underground Clippings Bob Krause
- 5.) Computer Crime Laws list Brendan Kehoe
- 6.) Media and the CU Various
- 7.) The Hermetic Underground The Dark Adept
-
-
- CuD 2.16 December 10, 1990
- --------
-
- Special Issue - "Atlanta Three" Sentencing Memorandum
-
-
- CuD 2.17 December 16, 1990
- --------
-
- 1.) Moderators' Corner JT/GM
- 2.) From the Mailbag Various
- 3.) EFF Response to Atlanta Sentencing Memorandum EFF
- 4.) Some Thoughts on the Atlanta Sentencing The Advocate
- 5.) Earning your Stripes Silver Surfer
- 6.) Playgrounds of the Mind: Cyberspace Silicon Surfer
- 7.) The CU in the News Various
-
-
- CuD 2.18 Decemnber 28, 1990
- --------
-
- 1.) Moderators' Corner JT/GM
- 2.) From the Mailbag Various
- 3.) Computers Under Attack (Book Review) Peter Denning
- 4.) CU Resources in Germany Martin Huber
- 5.) Trade Secrets; When are they Bad? Dark Adept
-
-
- CuD 2.19 December 31, 1990
- --------
-
- 1.) Moderators' Corner JT/GM
- 2.) From the Mailbag Various
- 3.) Telecoms Ripping off BBSs? Michael Riddle
- 4.) Michigan Bell vs BBSs Ed Hopper
- 5.) Clarification of Gail Thackeray's Comment
- on Modem Licensing Jim Warren
- 6.) a.k.a. freedom of expression Bob Izenberg
- 7.) Z-modem Virus Alert Bob Mahoney
-
-
- cDc - Cult of the Dead Cow
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Listing shamelessly leeched from the Demon Roach Underground
-
-
- # Title Author
- _________________________________________________ ______________________
- 1. Gerbil Feed Bomb Swamp Rat
- 2. Wizardry Docs Swamp Rat
- 3. Wizardry Spells Swamp Rat
- 4. Rescue Raiders Docs Swamp Rat
- 5. Renegade Cows HAL 9000
- 6. Assembly Fun Sid Vicious
- 7. Slow Death Swamp Rat
- 8. Book of Cow Franken Gibe
- 9. Society Sucks Psychotic Opposition
- 10. P.E.A.C.E. Psychotic Opposition
- 11. Suicidal Tendencies-Join the Army (lyrics) Wasted Pandemonium
- 12. Metallica-Master of Puppets (lyrics) Swamp Rat
- 13. NPA List Franken Gibe
- 14. UNIX Bible Franken Gibe
- 15. Yellow Pages Vol.I Franken Gibe
- 16. A Fucked Life Swamp Rat
- 17. Gnu Christmas Story Franken Gibe
- 18. Bunny Lust Tippy Turtle
- 19. The Cat in the Hat Swamp Rat
- 20. Green Eggs & Ham Swamp Rat
- 21. The Cold Truth 2600/S. Ratte'
- 22. How to Card Shit, When You Live With Your 'rents L.E. Pirate
- 23. How the Grinch Stole Christmas Swamp Rat
- 24. EZ Destruction Dial Tone
- 25. Method of Destruction-USA for MOD (lyrics) Swamp Rat
- 26. The Phone Sex Scandal L.E. Pirate
- 27. Frankie's Fireside Phreak Primer Franken Gibe
- 28. Yellow Pages Vol.II Franken Gibe
- 29. Cow Chronicles #1 Franken Gibe
- 30. The Bovine Epic of Creation Franken Gibe
- 31. A Feature on MONEY - Today's Monster Psychedelic Warlord
- 32. Dirty Rotten Imbeciles-Crossover (lyrics) Swamp Rat
- 33. Fun With Traffic Lights Dial Tone
- 34. Dead Kennedys-Give Me Convenience...(lyrics) Suicidal Amoeba
- 35. Scarfing Suicidal Amoeba
- 36. On BLACK FLAG... Suicidal Amoeba
- 37. A Few Good Songs off of Eat Your Paisley Psychedelic Warlord
- 38. Area Code and Time Zone List Dial Tone
- 39. Fuck The World Swamp Rat
- 40. Sex With Satan (dist.) Psycoe
- 41. The Mentors-Up the Dose (lyrics) Mr. Drunkfux
- 42. Apple Shape Tables The Dark Static
- 43. Metallica-Kill 'Em All (lyrics) Swamp Rat
- 44. Mail Fraud L.E. Pirate
- 45. Beaming Dream: a poem Tequila Willy
- 46. Fun With Small Animals and Other Household Pets Sunspot
- 47. Hacking Into Hell The Raver
- 48. Evil Poetry: Vol. I The Raver
- 49. The Queen is Dead: a poem Sunspot
- 50. The Song of the Cow: a poem Psychedelic Warlord
- 51. The Day My Kid Turned Punk The Dark Static
- 52. Cross Of Iron 1.1 The Raver/editor
- 53. Cross Of Iron 1.2 The Raver/editor
- 54. Cross Of Iron 1.3 The Raver/editor
- 55. About Cross Of Iron #1 The Raver
- 56. The Prophecy of Cow Franken Gibe
- 57. History of the Bovinomicon The Raver
- 58. The Nameless Pasture The Raver
- 59. Interview With Neo-Nazi 'Ausderau' Psychedelic Warlord
- 60. Megadeth-so far, so good... so what! (lyrics) Swamp Rat
- 61. Bovine Death The Raver
- 62. Scotty's Tale of Sex and Death Racer X
- 63. Sesame St. Possession Swamp Rat
- 64. Death Angel-Frolic through the park (lyrics) Swamp Rat
- 65. Agnostic Front-Liberty & Justice For...(lyrics) Racer X
- 66. Dayglo Abortions-here today guano tomorrow(lyrics) Swamp Rat
- 67. Thrasher's Metallica Interview Part 1 Racer X
- 68. Thrasher's Metallica Interview Part 2 Racer X
- 69. Testament-The New Order (lyrics) Swamp Rat
- 70. The cDc compilation: volume one (Apple II/2 sides) Swamp Rat/editor
- 71. The *ONLY* Way To Get Telenet Thingies Tequila Willy
- 72. Toxik-World Circus (lyrics) (dist.) The Omen
- 73. Visions From The Last Crusade Psychedelic Warlord
- 74. The Camping Trip Franken Gibe
- 75. Metallica-...And Justice For All (lyrics) Swamp Rat
- 76. Institutionalized Necrovore
- 77. Held Captive Racer X
- 78. Danzig (lryics) Racer X
- 79. The True Story of Cult of the Dead Cow Psychedelic Warlord
- 80. ...a Slayer kind of day... G.A. Ellsworth
- 81. Trail of Blood Sunspot
- 82. Geek: The Saga Continues The Pusher
- 83. Lyrics to Both Youth Of Today Albums The Pusher
- 84. Big Black Interview G.A. Ellsworth
- 85. cDc core #1 The Pusher
- 86. Screwdriver Flippin' Sunspot
- 87. A Tale of Two Sexes Swamp Rat
- 88. Armageddon's Coming: a poem Sunspot
- 89. The cDc compilation: volume two (Apple II/2 sides) Swamp Rat/editor
- 90. Cow-San Necrovore
- 91. The Reel Way The Pusher
- 92. "Group Revue" The Pusher
- 93. Las Vegas Mutantz From Hell! The Pusher
- 94. Fighting - The Clean Way! The Pusher
- 95. Impresario: Malcom McLaren and the British New... The Pusher
- 96. Dead Kennedys-Plastic Surgery Disasters (lyrics) Necrovore
- 97. Twisted Reality Necrovore
- 98. On The Porch Swing Suzy Rust
- 99. Top Gun Don Howland
- 100. The cDc #100 BamBam File The cDc cultees
- 101. cDc core #2 The Pusher
- 102. FUGAZI lyrics G.A. Ellsworth
- 103. cDc core #2 1/2 The Pusher
- 104. Gun Control The Pusher
- 105. POetRIE Obscure Images
- 106. Dream Tripped Racer X
- 107. cDc core #3 The Pusher
- 108. The End Obscure Images
- 109. A Feeling of Electricity In the Air Jennifer Petkus
- 110. The Flesh Man Richard Avis
- 111. Jack and Jack Obscure Images
- 112. Beautiful Stories for Ugly Children #1 Krass Katt
- 113. The cDc compilation: volume three (Ap2/2 sides) Swamp Rat
- 114. cDc core #4 The Pusher
- 115. Bear Trap of Love Krass Katt
- 116. A Slight Miscalculation Bob Cram
- 117. Lost Love Egyptian Alchemist
- 118. A Moment In Time Obscure Images
- 119. Retrospective Rock The Pusher
- 120. The Bus Driver Scum
- 121. Ultra Trendies Psychedelic Warlord
- 122. David and Goliath: Goliath's Point of View Leper Messiah & Swamp R.
- 123. Beautiful Stories for Ugly Children #2 Dave Louapre
- 124. It Hurts and Won't Make You Better Obscure Images
- 125. Sunday Peter Flechette
- 126. Stud Muffin R0dent Tequila Willy
- 127. Double Feature The Dark Static
- 128. Death and The Bovine Lady Carolin
- 129. Credit Card Fraud Ideas L.E. Pirate
- 130. My Day With The Dentist Psychedelic Warlord
- 131. The Three Cows Lady Carolin
- 132. The Wild One Obscure Images
- 133. White Rodent's Short Story Lump White Rodent
- 134. cDc core #5 The Pusher
- 135. Trickledown Josh Whalen
- 136. The Coming of Angels Obscure Images
- 137. Mourning in America Steve Ross
- 138. Life Sentence The Pusher
- 139. Bert: The Poem Racer X
- 140. The Burn Turns Two Into One - Part 1 Obscure Images
- 141. Smothered Hope Obscure Images
- 142. Fatal Attraction for Real G.A. Ellsworth
- 143. Inject Me Obscure Images
- 144. Whose Morality? Tequila Willy
- 145. Sanctified Obscure Images
- 146. Mudhoney Interview G.A. Ellsworth
- 147. Dance of the Cow Akira
- 148. The Burn Turns Two Into One - Part 2 Obscure Images
-
-
-
- LOD/H TECHNICAL JOURNAL
- ~~~~~~~~~~~~~~~~~~~~~~~
- Legion of Doom/Legion of Hackers
- --------------------------------
-
- Issue 1 January 1, 1987
- -------
-
- 1.) Introduction Staff
- 2.) Custom Local Area Signalling Services (CLASS) The Videosmith
- 3.) Identifying and Defeating Physical Security and Lex Luthor
- Intrusion Detection Systems Part I: The Perimeter
- 4.) The Traffic Service Position System (TSPS) The Marauder
- 5.) Hacking DEC's TOPS-20: Intro Blue Archer
- 6.) Building Your Own Blue Box (Includes Schematic) Jester Sluggo
- 7.) Intelligence and Interrogation Processes Master of Impact
- 8.) The Outside Loop Distribution Plant: Part A Phucked Agent 04
- 9.) The Outside Loop Distribution Plant: Part B Phucked Agent 04
- 10.) LOH Telenet Directory: Update #4 (1-1-87) Part A LOH
- 11.) LOH Telenet Directory: Update #4 (1-1-87) Part B LOH
- 12.) Network News and Notes Staff
-
-
- Issue 2 1987?
- -------
-
- 1.) Introduction Staff
- 2.) The Networked UNIX Solid State
- 3.) Step By Step (SXS) Switching System Notes Phantom Phreaker
- 4.) A Guide to the PRIMOS Operating System Carrier Culprit
- 5.) Identifying and Defeating Physical Security and Lex Luthor
- Intrusion Detection Systems Part I: The Exterior
- 6.) A Discrete UNIX Password Hacker Shooting Shark
- 7.) Hacking DEC's TOPS-20 Part II Blue Archer
- 8.) Hacking IBM's VM/CMS Operating System, Part A Lex Luthor
- 9.) Hacking IBM's VM/CMS Operating System, Part B
- 10.) Network News and Notes
-
-
- Issue 3 October 21, 1988
- -------
-
- 1.) Introduction Staff
- 2.) Understanding Automatic Message Accounting Part A Phantom Phreaker
- 3.) Understanding Automatic Message Accounting Part B
- 4.) Update File: Shooting Shark's UNIX Password Hacker Shooting Shark
- 5.) An Introduction to Teradyne's 4TEL System Doom Prophet
- 6.) A Cellular Automaton Encryption System The Mentor
- 7.) Hacking the IRIS Operating System The Leftist
- 8.) A Guide to Coin Control Systems Phase Jitter
- 9.) A UNIX Password Hacker from USENET -------------
- 10.) Reprint News Article: 'LOD Bust Myth' -------------
- 11.) Network News and Notes The Mentor
-
-
- Issue 4 May 20, 1990
- -------
-
- 1.) Introduction Staff
- 2.) The AT&T BILLDATS Collector System Rogue Fed
- 3.) The RADAR Guidebook Professor Falken
- 4.) Central Office Operations Agent Steal
- 5.) A Hacker's Guide to UUCP The Mentor
- 6.) The History of LOD/H Lex Luthor
- 7.) The Trasher's Handbook to BMOSS Spherical
- Abberation
- 8.) LOH Telenet Directory: Update #4 Part A Erik Bloodaxe
- 9.) LOH Telenet Directory: Update #4 Part B Erik Bloodaxe
- 10.) Network News and Notes Staff
-
-
-
- LOL
- ~~~
- Legions of Lucifer
- ------------------
-
- Issue 11 October 22, 1990
- --------
-
- Hacking Telenet/Primos Volume 2 Count Zero
-
-
-
- Issue 12 October 22, 1990
- --------
-
- Hacking/Scanning Voice Mail Boxes: The Tutorial Wave Runner
-
-
-
-
- NARC
- ~~~~
- Nuclear hAckers phReakers Carders
- ---------------------------------
-
-
- Issue 2 September 14, 1989
- -------
-
- Code Usage for the Beginner Zapper
-
-
- Issue 3 September 14, 1989
- -------
-
- How to Hack Effectively Prometheus
-
-
- Issue 4 October 12, 1989
- -------
-
- ESS Explained Zapper
-
-
- Issue 5 October 13, 1989
- -------
-
- The Columbus Day Virus Optical Illusion
-
-
- Issue 6 October 14, 1989
- -------
-
- Tracing/ANI Explained The Oxidizer
-
-
- Issue 7 1989
- -------
-
- (Untitled) Card Information Htaed
-
-
-
- NIA
- ~~~
- Network Information Access
- --------------------------
-
- Published by Guardian of Time and Judge Dredd
-
- Subscriptions:
-
- elisem@nuchat.sccsi.com
-
- Note: The authors listed for NIA files are the ones listed on the bylines. In
- not all of the cases are they the actual writers of the document. This is
- mentioned only because, while they remain anonymous, the authors deserve credit.
-
- Also, as of issue 68, NIA has developed a new format not unlike Phrack, P/HUN,
- or the LOD/H technical Journals, wherein it is now published more along a
- magazine-type format, rather than a single topic issue.
-
-
- Issue 1 December 15, 1989
- -------
-
- Automatic Teller Machines (ATM's): Part 1 Guardian of Time
-
-
- Issue 2 January 19, 1990
- -------
-
- Automatic Teller Machines (ATM's): Part 2 Guardian of Time
-
-
- Issue 3 March 2, 1990
- -------
-
- Computer Crimes/Fraud/Waste: Part 1 Lord Kalkin
-
-
- Issue 4 March 3, 1990
- -------
-
- Computer Crimes/Fraud/Waste: Part 2 Lord Kalkin
-
-
- Issue 5 February 1, 1990
- -------
-
- Detecting Merchant Fraud Guardian of Time
-
-
- Issue 6 December 28, 1989
- -------
-
- How to Read a TRW Credit Report Guardian of Time
-
-
- Issue 7 March 10, 1990
- -------
-
- Computer Crimes/Fraud/Waste: Part 3 Lord Kalkin
-
-
- Issue 8 February 28, 1990
- -------
-
- Automatic Teller Machines (ATM's): Part 3 Guardian of Time
-
-
- Issue 9 February 28, 1990
- -------
-
- Automatic Teller Machines (ATM's): Part 4 Guardian of Time
-
-
- Issue 10 April 1, 1990
- --------
-
- How to Use PLEXAR Guardian of Time
-
-
- Issue 11 April 2, 1990
- --------
-
- VMS System Manager's Manual - Ch. 1 Guardian of Time
-
-
- Issue 12 April 4, 1990
- --------
-
- VMS System Manager's Manual - Ch. 2 Guardian of Time
-
-
- Issue 13 April 5, 1990
- --------
-
- VMS System Manager's Manual - Ch. 3 Guardian of Time
-
-
- Issue 14 April 7, 1990
- --------
-
- Spreading the Disease Judge Dredd
-
-
- Issue 15 April 15, 1990
- --------
-
- The ZUC Virus Judge Dredd
-
-
- Issue 16 April 16, 1990
- --------
-
- USENET: Basics Judge Dredd
-
-
- Issue 17 April 12, 1990
- --------
-
- Computer Crime: Computer Security Techniques - Section 1 Guardian of Time
-
-
- Issue 18 April 17, 1990
- --------
-
- Computer User's Guide/Protection of Information Judge Dredd
-
-
- Issue 19 April 17, 1990
- --------
-
- Management Guide/Protection of Information Judge Dredd
-
-
- Issue 20 April 17, 1990
- --------
-
- Executive Guide/Protection of Information Judge Dredd
-
-
- Issue 21 April 17, 1990
- --------
-
- Digest Message Format Judge Dredd
-
-
- Issue 22 April 17, 1990
- --------
-
- Frequently Asked Questions About UNIX Judge Dredd
-
-
- Issue 23 April 17, 1990
- --------
-
- Overview on Viruses & Threats Judge Dredd
-
-
- Issue 24 April 17, 1990
- --------
-
- Overview on Viruses & Threats - Part II Judge Dredd
-
-
- Issue 25 April 17, 1990
- --------
-
- Overview on Viruses & Threats - Part III Judge Dredd
-
-
- Issue 26 April 17, 1990
- --------
-
- Overview on Viruses & Threats - Part IV Judge Dredd
-
-
- Issue 27 April 12, 1990
- --------
-
- VMS System Manager's Manual - Ch. 4 Guardian of Time
-
-
- Issue 28 April 17, 1990
- --------
-
- Computer Security Techniques - Section II: Background Guardian of Time
-
-
- Issue 29 April 1, 1990
- --------
-
- VMS System Manager's Manual - Ch. 5 Guardian of Time
-
-
- Issue 30 March 3, 1990
- --------
-
- Namba Virus Judge Dredd
-
-
- Issue 31 May 14, 1990
- --------
-
- May '90 Busts I Judge Dredd
-
-
- Issue 32 June 5, 1990
- --------
-
- LOD/H Bust: As by 2600 Magazine Judge Dredd
-
-
- Issue 33 June 4, 1990
- --------
-
- UK Telephone System Judge Dredd
-
-
- Issue 34 June 4, 1990
- --------
-
- The TRW Credit Profile Report Guardian of Time
-
-
- Issue 35 June 2, 1990
- --------
-
- Operation SunDevil Judge Dredd
-
-
- Issue 36 June 19, 1990
- --------
-
- Credit Bureau Incorporated - Otherwise known as CBI Guardian of Time
-
-
- Issue 37 June 20, 1990
- --------
-
- VMS System Manager's Manual - Ch. 6 Guardian of Time
-
-
- Issue 38 June 20, 1990
- --------
-
- VMS System Manager's Manual - Ch. 7 Guardian of Time
-
-
- Issue 39 June 26, 1990
- --------
-
- Hackers of the World, Unite! Newsweek Magazine reprint Guardian of Time
-
-
- Issue 40 June 6, 1990
- --------
-
- Views of Goldstein: Operation Sundevil Judge Dredd
-
-
- Issue 41 July 6, 1990
- --------
-
- New Area Code 903 Judge Dredd
-
-
- Issue 42 July 23, 1990
- --------
-
- MPACT: Ordering Process Guardian of Time
-
-
- Issue 43 July 27, 1990
- --------
-
- Craig Neidorf on Trial Judge Dredd
-
-
- Issue 44 August 9, 1990
- --------
-
- Creating an Account on a VMS System Guardian of Time
-
-
- Issue 45 August 15, 1990
- --------
-
- CERT Advisory: SunView selection_svc Vulnerability (CA-90:05) Judge Dredd
-
-
- Issue 46 August 19, 1990
- --------
-
- Security Exposures and Control for MVS Judge Dredd
-
-
- Issue 47 August 23, 1990
- --------
-
- Open Sesame - Wall Street Journal reprint Guardian of Time
-
-
- Issue 48 August 28, 1990
- --------
-
- Illinois Bell Employee Given Bribe Judge Dredd
-
-
- Issue 49 September 7, 1990
- --------
-
- Brief Update on some VMS Commands: Guardian of Time
- Show Users, Show System, and Stop/ID= Commands
-
-
- Issue 50 September 12, 1990
- --------
-
- 50th Anniversary Issue JD/GoT
- 1. Nootropic Drugs
- 2. Portrait of J. Random Hacker
- 3. (censored) (sic)
- 4. Some Thoughts
- 5. BBS Software Review as Seen by SysOps
- 6. Hellos, Congrats, and Respects to:
-
-
- Issue 51 September 12, 1990
- --------
-
- System Security part 1 Guardian of Time
- Introduction: Types of Computer Security Problems
-
-
- Issue 52 September 12, 1990
- --------
-
- System Security part 2 Guardian of Time
- Security for the User
-
-
- Issue 53 September 14, 1990
- --------
-
- Pyrotechnics I-IV Judge Dredd
-
-
- Issue 54 September 14, 1990
- --------
-
- City Codes for USSR Judge Dredd
-
-
- Issue 55 September 24, 1990
- --------
-
- Computer Network gets Overseer Judge Dredd
-
-
- Issue 56 October 3, 1990
- --------
-
- CERT Advisory: NeXT System Software Judge Dredd
-
-
- Issue 57 October 9, 1990
- --------
-
- The Network Thought Machine Guardian of Time
-
-
- Issue 58 October 10, 1990
- --------
-
- Bill of Information Rights II Eric Postpischil
-
-
- Issue 59 October 23, 1990
- --------
-
- News articles Judge Dredd
-
-
- Issue 60 October 26, 1990
- --------
-
- The Network Thought Machine [2] Guardian of Time
-
-
- Issue 61 October 28, 1990
- --------
-
- Len Rose Arrested Again Judge Dredd
-
-
- Issue 62 October 28, 1990
- --------
-
- Buncha News Judge Dredd
-
-
- Issue 63 October 31, 1990
- --------
-
- Section III Computer Security Controls and the Law Guardian of Time
-
-
- Issue 64 October 30, 1990
- --------
-
- PT's Experience with CLASS Judge Dredd
-
-
- Issue 65 November 3, 1990
- --------
-
- PBX Security Judge Dredd
-
-
- Issue 66 December 14, 1990
- --------
-
- CERT: VAX/VMS Break-Ins Judge Dredd
-
-
- Issue 67 December 1, 1990
- --------
-
- The Network Thought Machine [3] Guardian of Time
- and SNA Networks [1]
-
-
- Issue 68 December 17, 1990
- --------
-
- 1.) DECnet [01] Guardian of Time
- 2.) Unix: UUCP Files Judge Dredd
- 3.) VAX: Tekno DCS HELP [01] Judge Dredd
- 4.) HP: DBEDIT Manual Malefactor [OC]
- 5.) Surveillance Expo '90 Report Thalx
- 6.) Time-Trip: 1985 MOG-UR CC Charges Against Tom Tcimpidis Count Nibble
- 7.) Department of the Army Field Manual [01] Death Jester
- 8.) Comments from the Editors GOT/JD
-
-
-
- PHANTASY
- ~~~~~~~~
- IIRG - International Information Retrieval Guild
- ------------------------------------------------
-
- Distribution:
-
- Rune Stone BBS
-
-
- Volume 1 Issue 1 October 31, 1990
- ----------------
-
- 1.) The IIRG Meets the FBI (Part 1)
- 2.) What is the IIRG and why Should I Support it?
- 3.) Phantasy News
- 4.) Listing of Phantasy Distribution Sites
-
-
- Volume 1 Issue 2 November 12, 1990
- ----------------
-
- 1.) The IIRG Meets the FBI (Part 2)
- 2.) Hacker Information and Where to Obtain it
- 3.) High-Explosives for Fun and Profit
- 4.) Phantasy News
- 5.) Listing of Phantasy Distribution Sites
-
-
- Volume 1 Issue 3 December 16, 1990
- ----------------
-
- 1.) Phone and Home Security The Mercenary
- 2.) An Insider's View of the Information Game Anonymous
- 3.) Napalm "The Ultimate Home Barbecue Starter" Knight Hack
- 4.) Chlorine Bombs Anonymous
- 5.) Phantasy Tidbits
- 6.) Listing of Distribution Sites
- 7.) End of the Year Comments IIRG
-
-
-
- PHRACK, INC.
- ~~~~~~~~~~~~
-
- Volume 1 Issue 1 November 17, 1985
- ----------------
-
- 1.) Introduction Taran King
- 2.) SAM Security Article Spitfire Hacker
- 3.) Boot Tracing on Apple Cheap Shades
- 4.) The Fone Phreaks Revenge Iron Soldier
- 5.) MCI International Cards Knight Lightning
- 6.) How to Pick Master Locks Gin Fizz &
- Ninja NYC
- 7.) How to Make an Acetylene Bomb The Clashmaster
- 8.) School/College Computer Dial-ups Phantom Phreaker
-
-
- Volume 1 Issue 2
- ----------------
-
- 1.) Introduction Taran King
- 2.) Prevention of the Billing Office Blues Forest Ranger
- 3.) Homemade Guns Man-Tooth
- 4.) Blowguns The Pyro
- 5.) TAC Dialups Phantom Phreaker
- 6.) Universal Information Services via ISDN Taran King
- 7.) MCI Overview Knight Lightning
- 8.) Hacking RSTS Data Line
- 9.) Phreak World News Knight Lightning
-
-
- Volume 1 Issue 3 February 1, 1986
- ----------------
-
- 1.) Introduction Cheap Shades
- 2.) Rolm Systems Monty Python
- 3.) Making Shell Bombs Man-Tooth
- 4.) Signalling Systems Around the World Data Line
- 5.) Private Audience Overlord
- 6.) Fortell Systems Phantom Phreaker
- 7.) Eavesdropping Circle Lord
- 8.) Building a Shock Rod Circle Lord
- 9.) Introduction to PBX's Knight Lightning
- 10.) Phreak World News II Knight Lightning
-
-
- Volume 1 Issue 4 March 13, 1986
- ----------------
-
- 1.) Phrack Pro-Phile 1 - Crimson Death Taran King
- 2.) Ringback Codes for the 314 NPA
- 3.) False Identification Forest Ranger
- 4.) Profile of MAX Long Distance Service Phantom Phreaker
- 5.) Breaching and Clearing Obstacles Taran King
- 6.) Crashing DEC-10's The Mentor
- 7.) Centrex Renaissance- "The Regulations" Jester Sluggo
- 8.) The Tried and True Home Production Method for
- Methamphetamine The Leftist
- 9.) Phrack World News Part 1 Knight Lightning
- 10.) Phrack World News Part 2 Knight Lightning
- 11.) Phrack World News Part 3 Knight Lightning
-
-
- Volume 1 Issue 5 April 18, 1986
- ----------------
-
- 1.) Phrack V Intro Taran King
- 2.) Phrack Pro-Phile of Broadway Hacker Taran King
- 3.) Hacking Dec's Carrier Culprit
- 4.) Hand to Hand Combat Bad Boy in Black
- 5.) DMS-100 Knight Lightning
- 6.) Bolt Bombs The Leftist
- 7.) Wide Area Networks Part 1 Jester Sluggo
- 8.) Radio Hacking The Seker
- 9.) Mobile Telephone Communications Phantom Phreaker
- 10.) Phrack World News IV Knight Lightning
- 11.) Phrack World News IV Knight Lightning
- 12.) Phrack World News IV Knight Lightning
-
-
- Volume 1 Issue 6 Release date unknown
- ----------------
-
- 1.) Index Taran King
- 2.) Pro-Phile on Groups Knight Lightning
- 3.) The Technical Revolution Dr. Crash
- 4.) Fun with Lighters The Leftist
- 5.) Nasty Unix Tricks Shooting Shark
- 6.) Smoke Bombs Alpine Kracker
- 7.) Cellular Telephones High Evolutionary
- 8.) Wide Area Networks Jester Sluggo
- 9.) Phrack World News Knight Lightning
- 10.) Phrack World News Knight Lightning
- 11.) Phrack World News Knight Lightning
- 12.) Phrack World News Knight Lightning
-
-
- Volume 1 Issue 7 September 25, 1987
- ----------------
-
- 1.) Intro/Index Taran King
- 2.) Phrack Pro-Phile of Scan Man Taran King
- 3.) Hacker's Manifesto The Mentor
- 4.) Hacking Chilton's Credimatic Ryche
- 5.) Hacking RSTS Part 1 The Seker
- 6.) How to Make TNT The Radical
- Rocker
- 7.) Trojan Horses in Unix Shooting Shark
- 8.) Phrack World News VI Part 1 Knight Lightning
- 9.) Phrack World News VI Part 2 Knight Lightning
- 10.) Phrack World News VI Part 3 Knight Lightning
-
-
- Volume 1 Issue 8
- ----------------
-
- 1.) Phrack Inc. Index Taran King
- 2.) Phrack Pro-Phile V on Tuc Taran King
- 3.) City-Wide Centrex The Executioner
- 4.) The Integrated Services Digital Network Dr. Doom
- 5.) The Art of Junction Box Modeming Mad Hacker 616
- 6.) Compuserve Info Morgoth & Lotus
- 7.) Fun with Automatic Tellers The Mentor
- 8.) Phrack World News VII Part I Knight Lightning
- 9.) Phrack World News VII Part II Knight Lightning
-
-
- Volume 1 Issue 9
- ----------------
-
- 1.) Introduction to Phrack Inc. Issue Nine Taran King
- 2.) Phrack Pro-Phile on The Nightstalker Taran King
- 3.) Fun With the Centagram VMS Network Oryan Quest
- 4.) Programming RSTS/E File2: Editors Solid State
- 5.) Inside Dialog Ctrl C
- 6.) Plant Measurement The Executioner
- 7.) Multi-User Chat Program for DEC-10's TTY-Man &
- The Mentor
- 8.) Introduction to Videoconferencing Knight Lightning
- 9.) Loop Maintenance Operations System Phantom Phreaker
- & Doom Prophet
- 10.) Phrack World News VIII Knight Lightning
-
-
- Volume 2 Issue 10 January 1, 1987
- -----------------
-
- 1.) Introduction to Phrack 10 Taran King
- 2.) Pro-Phile on Dave Starr Taran King
- 3.) The TMC Primer Cap'n Crax
- 4.) A Beginner's Guide to the IBM VM/370 Elric of Imrryr
- 5.) Circuit Switched Digital Capability The Executioner
- 6.) Hacking Primos Part I Evil Jay
- 7.) Automatic Number Identification Phantom Phreaker
- & Doom Prophet
- 8.) Phrack World News 9 Part I Knight Lightning
- 9.) Phrack World News 9 Part II Knight Lightning
-
-
-
- Volume 2 Issue 11 February 17, 1987
- -----------------
-
- 1.) Index to Phrack Eleven Taran King
- 2.) Phrack Pro-Phile VIII on Wizard of Arpanet Taran King
- 3.) PACT: Prefix Access Code Translator The Executioner
- 4.) Hacking Voice Mail Systems Black Knight
- from 713
- 5.) Simple Data Encryption or Digital Electronics 101 The Leftist
- 6.) AIS - Automatic Intercept System Taran King
- 7.) Hacking Primos I, II, III Evil Jay
- 8.) Telephone Signalling Methods Doom Prophet
- 9.) Cellular Spoofing By Electronic Serial Numbers Amadeus
- 10.) Busy Line Verification Phantom Phreaker
- 11.) Phrack World News X Knight Lightning
- 12.) Phrack World News XI Knight Lightning
-
-
-
- Volume 2 Issue 12 March 29, 1987
- -----------------
-
- 1.) Index of Phrack 12 Taran King
- 2.) Pro-Phile IX on Agrajag The Prolonged Taran King
- 3.) Preview to Phrack 13-The Life & Times of The Executioner
- 4.) Understanding the Digital Multiplexing System (DMS) Control C
- 5.) The Total Network Data System Doom Prophet
- 6.) CSDC II - Hardware Requirements The Executioner
- 7.) Hacking : OSL Systems Evil Jay
- 8.) Busy Line Verification Part II Phantom Phreaker
- 9.) Scan Man's Rebuttal to Phrack World News Scan Man
- 10.) Phrack World News XII Part 1 Knight Lightning
- 11.) Phrack World News XII Part 2 Knight Lightning
-
-
-
- Volume 2 Issue 13 April 1, 1987
- -----------------
-
- 1.) Phrack XIII Index Taran King
- 2.) Real Phreaker's Guide Vol. 2 Taran King
- Knight Lightning
- 3.) How to Fuck Up the World - A Parody Thomas Covenant
- 4.) How to Build a Paisley Box Thomas Covenant
- Double Helix
- 5.) Phreaks In Verse Sir Francis Drake
- 6.) R.A.G. - Rodents Are Gay Evil Jay
- 7.) Are You A Phone Geek? Doom Prophet
- 8.) Computerists Underground News Tabloid - CUNT Crimson Death
- 9.) RAGS - The Best of Sexy Exy Sexy Exy
- 10.) Phrack World News XIII Knight Lightning
-
-
-
- Volume 2 Issue 14 July 28, 1987
- -----------------
-
- 1.) Introduction Knight Lightning
- 2.) Phrack Pro-Phile X; Featuring Terminus Taran King
- 3.) The Conscience of a Hacker {Reprint} The Mentor
- 4.) The Reality of The Myth [REMOBS] Taran King
- 5.) Understanding DMS Part II Control C
- 6.) TRW Business Terminology Control C
- 7.) Phrack World News Special Edition #1 Knight Lightning
- 8.) Phrack World News Issue XIV Part 1 Knight Lightning
- 9.) Phrack World News Issue XIV Part 2 Knight Lightning
-
-
-
- Volume 2 Issue 15 August 7, 1987
- -----------------
-
- 1.) Phrack XV Intro Shooting Shark
- 2.) More Stupid Unix Tricks Shooting Shark
- 3.) Making Free Local Payfone Calls Killer Smurf
- 4.) Advanced Carding XIV The Disk Jockey
- 5.) Gelled Flame Fuels Elric of Imrryr
- 6.) Phrack World News I: The Busts Knight Lightning
- 7.) Phrack World News II: The Scoop on Dan The Operator Knight Lightning
- 8.) Phrack World News III: The Affidavit SFD
-
-
-
- Volume 2 Issue 16
- -----------------
-
- 1.) Phrack 16 Intro Elric of Imrryr
- 2.) BELLCORE Information The Mad Phone-Man
- 3.) A Hacker's Guide to Primos: Part 1 Cosmos Kid
- 4.) Hacking GTN The Kurgan
- 5.) Credit Card Laws Tom Brokow
- 6.) Tapping Telephone Lines Agent Steal
- 7.) Reading Trans-Union Credit Reports The Disk Jockey
- 8.) The Story Of the West German Hackers Shooting Shark
- 9.) The Mad Phone-Man and the Gestapo The Mad Phone-Man
- 10.) Flight of the Mad Phone-Man The Mad Phone-Man
- 11.) Shadow Hack Busted Again Shooting Shark
- 12.) Coin Box Thief Wanted The $muggler
-
-
-
- Volume 2 Issue 17 April 7, 1988
- -----------------
-
- 1.) Phrack XVII Introduction Shooting Shark
- 2.) Dun & Bradstreet Report on AT&T Elric of Imrryr
- 3.) D&B Report on Pacific Telesis Elric of Imrryr
- 4.) Nitrogen-Trioxide Explosive Signal Substain
- 5.) How to Hack Cyber Systems Grey Sorcerer
- 6.) How to Hack HP2000's Grey Sorcerer
- 7.) Accessing Government Computers The Sorceress
- 8.) Dial-Back Modem Security Elric of Imrryr
- 9.) Data Tapping Made Easy Elric of Imrryr
- 10.) Phrack World News 17.1 Bust Update Sir Francis Drake
- 11.) Phrack World News 17.2 'Illegal' Hacker Crackdown The $muggler
- 13.) Phrack World News 17.3 Crackers are Cheating Bell The Sorceress
-
-
-
- Volume 2 Issue 18 June 7, 1988
- -----------------
-
- 1.) Index of Phrack Crimson Death
- 2.) Pro-Phile XI on Ax Murderer Crimson Death
- 3.) An Introduction to Packet Switched Networks Epsilon
- 4.) Primos: Primenet, RJE, DPTX Magic Hasan
- 5.) Hacking CDC's Cyber Phrozen Ghost
- 6.) Unix for the Moderate Urvile
- 7.) Unix System Security Issues Jester Sluggo
- 8.) Loop Maintenance Operating System Control C
- 9.) A Few Things About Networks Prime Suspect
- 10.) Phrack World News XVIII Part 1 Epsilon
- 11.) Phrack World News XVIII Part 2 Epsilon
-
-
-
- Volume 2 Issue 19 July 1988
- -----------------
-
- 1.) Phrack Inc. Index Crimson Death
- 2.) DCL Utilities for VMS Hackers The Mentor
- 3.) Digital Multiplexing Systems (Part 2) Control C
- 4.) Social Security Number Formatting Shooting Shark
- 5.) Facility Assignment & Control Systems Phantom Phreaker
- 6.) Phrack Editorial on Microbashing The Nightstalker
- 7.) Phrack World News XVIV (Part 1) Knight Lightning
- 8.) Phrack World News XVIV (Part 2) Epsilon
-
-
-
- Volume 2 Issue 20 October 12, 1988
- -----------------
-
- 1.) Phrack XX Index TK\KL
- 2.) Phrack Pro-Phile XX on Taran King Taran King
- 3.) Timeline - Featuring TK\KL
- Cheap Shades
- 4.) Welcome To Metal Shop Private TK/KL/CS
- 5.) Metal/General Discussion
- 6.) Phrack Inc./Gossip
- 7.) Phreak/Hack Sub
- 8.) Social Engineering
- 9.) New Users
- 10.) The Royal Court
- 11.) Acronyms
- 12.) Phrack World News XX Featuring SummerCon '88
-
-
-
- Volume 2 Issue 21 November 4, 1988
- -----------------
-
- 1.) Index TK\KL
- 2.) Phrack Pro-Phile on Modem Master Taran King
- 3.) Shadows Of A Future Past (Part 1 of the
- Vicious Circle Trilogy) Knight Lightning
- 4.) The Tele-Pages Jester Sluggo
- 5.) Satellite Communications Scott Holiday
- 6.) Network Management Center KL\TK
- 7.) Non-Published Numbers Patrick Townsend
- 8.) Blocking Of Long Distance Calls Jim Schmickley
- 9.) Phrack World News Special Edition II Knight Lightning
- 10.) Phrack World News Issue XXI Part 1 KL\Epsilon
- 11.) Phrack World News Issue XXI Part 2 KL\Epsilon
-
-
-
- Volume 2 Issue 22 December 23, 1988
- -----------------
-
- 1.) Index TK\KL
- 2.) Phrack Pro-Phile on Karl Marx TK\KL
- 3.) The Judas Contract (Part 2 of the Vicious Circle Trilogy) KL
- 4.) A Novice's Guide To Hacking (1989 Edition) The Mentor
- 5.) An Indepth Guide In Hacking Unix Red Knight
- 6.) Yet Another File On Hacking Unix >Unknown User<
- 7.) Computer Hackers Follow A Guttman-Like Progression Richard C.
- Hollinger
- 8.) A Report On The InterNet Worm Bob Page
- 9.) Phrack World News Issue XXII KL\TK
-
-
-
- Volume 2 Issue 23 January 25, 1989
- -----------------
-
- 1.) Phrack Inc. XXIII Index KL\TK
- 2.) Phrack Prophile XXIII Featuring The Mentor Taran King
- 3.) Subdivisions (Part 3 of The Vicious Circle Trilogy) Knight Lightning
- 4.) Utopia; Chapter One of FTSaga Knight Lightning
- 5.) Foundations On The Horizon; Chapter Two of FTSaga Knight Lightning
- 6.) Future Trancendent Saga Index A Bitnet Services
- Library
- 7.) Future Trancendent Saga Index B BSL
- 8.) Getting Serious About VMS Hacking VAXBusters Int'l
- 9.) Can You Find Out If Your Telephone Is Tapped? Fred P. Graham
- VaxCat
- 10.) Big Brother Online Thumpr
- 11.) Phrack World News XXIII Knight Lightning
-
-
-
- Volume 2 Issue 24 February 25, 1989
- -----------------
-
- 1.) Phrack Inc. XXIV Index TK\KL
- 2.) Phrack Pro-Phile XXIV Featuring Chanda Leir Taran King
- 3.) Limbo To Infinity; Chapter Three of FTSaga Knight Lightning
- 4.) Frontiers; Chapter Four of FTSaga Knight Lightning
- 5.) Control Office Administration Of Enhanced 911 Service The Eavesdropper
- 6.) Glossary Terminology For Enhanced 911 Service The Eavesdropper
- 7.) Advanced Bitnet Procedures VAXBusters Int'l
- 8.) Special Area Codes >Unknown User<
- 9.) Lifting Ma Bell's Cloak Of Secrecy VaxCat
- 10.) Network Progression Dedicated Link
- 11.) Phrack World News XXIV Knight Lightning
-
-
-
- Volume 3 Issue 25 March 29, 1989
- -----------------
-
- 1.) Phrack Inc. XXV Index TK\KL
- 2.) 25th Anniversary Index KL\TK et al
- 3.) Bell Network Switching Systems Taran King
- 4.) SPAN: Space Physics Analysis Network Knight Lightning
- 5.) Unix Cracking Tips Dark OverLord
- 6.) Hiding Out Under Unix Black Tie Affair
- 7.) The Blue Box And Ma Bell The Noid
- 8.) Hacking: What's Legal And What's Not Hatchet Molly
- 9.) Phrack World News XXV/Part 1 Knight Lightning
- 10.) Phrack World News XXV/Part 2 Knight Lightning
- 11.) Phrack World News XXV/Part 3 Knight Lightning
-
-
-
- Volume 3 Issue 26 April 25, 1989
- -----------------
-
- 1.) Phrack Inc. XXVI Index TK\KL
- 2.) Computer-Based Systems for Bell System Operation Taran King
- 3.) Getting Caught: Legal Procedures The Disk Jockey
- 4.) NSFnet: National Science Foundation Network Knight Lightning
- 5.) COSMOS: COmputer System for Mainframe OperationS King Arthur
- 6.) Basic Concepts of Translation The Dead Lord\
- Chief Executive Officers
- 7.) Phone Bugging: Telecom's Underground Industry Split Decision
- 8.) Internet Domains: FTSaga Appendix 3 (Limbo To Infinity) Phrack Inc.
- 9.) Phrack World News XXVI/Part 1 Knight Lightning
- 10.) Phrack World News XXVI/Part 2 Knight Lightning
- 11.) Phrack World News XXVI/Part 3 Knight Lightning
-
-
-
- Volume 3 Issue 27 June 20, 1989
- -----------------
-
- 1.) Phrack Inc. XXVII Index TK\KL
- 2.) Operating The IBM VM/SP CP Taran King
- 3.) Introduction To MIDNET: Chapter Seven Of The FTS Knight Lightning
- 4.) NUA List For Datex-P And X.25 Networks Oberdaemon
- 5.) COSMOS: COmputer System for Mainframe OperationS King Arthur
- 6.) Looking Around In DECnet Deep Thought
- 7.) The Making Of A Hacker Framstag
- 8.) Sending Fakemail In Unix Dark OverLord
- 9.) The Postal Inspection Service Vendetta
- 10.) Phrack World News XXVII/Part 1 Knight Lightning
- 11.) Phrack World News XXVII/Part 2 Knight Lightning
- 12.) Phrack World News XXVII/Part 3 Knight Lightning
-
-
-
- Volume 3 Issue 28 October 7, 1989
- -----------------
-
- 1.) Phrack Inc. XXVIII Index TK\KL
- 2.) Phrack Pro-Phile XXVIII on Erik Bloodaxe Taran King
- 3.) Introduction to the Internet Protocols: Ch. 8 of the FTS Knight Lightning
- 4.) Network Miscellany Taran King
- 5.) A Real Functioning PEARL BOX Schematic Dispater
- 6.) Snarfing Remote Files Dark OverLord
- 7.) Other Common Carriers; A List Equal Axis
- 8.) Phrack World News Special Edition III (SummerCon '89) Knight Lightning
- 9.) Phrack World News XXVIII/Part 1 Knight Lightning
- 10.) Phrack World News XXVIII/Part 2 Knight Lightning
- 11.) Phrack World News XXVIII/Part 3 Knight Lightning
- 12.) Phrack World News XXVIII/Part 4 Knight Lightning
-
-
-
- Volume 3 Issue 29 November 17, 1989
- -----------------
-
- 1.) Phrack Inc. XXIX Index TK\KL
- 2.) Phrack Pro-Phile XXIX on Emmanuel Goldstein Taran King
- 3.) Intro.to the Internet Protocols II: Ch. 9 of the FTS Knight Lightning
- 4.) Network Miscellany II Taran King
- 5.) Covert Paths Cyber Neuron
- Limited\Synthecide
- 6.) Bank Information compiled Legion of Doom!
- 7.) How We Got Rich Through Electronic Fund Transfer Legion of Doom!
- 8.) The Myth and Reality About Eavesdropping Phone Phanatic
- 9.) Blocking of Long-Distance Calls - Revisited Jim Schmickley
- 10.) Phrack World News XXIX/Part 1 Knight Lightning
- 11.) Phrack World News XXIX/Part 2 Knight Lightning
- 12.) Phrack World News XXIX/Part 3 Knight Lightning
-
-
-
- Volume 3 Issue 30 December 24, 1989
- -----------------
-
- 1.) Phrack Inc. XXX Index TK/KL
- 2.) Network Miscellany III Taran King
- 3.) Hacking & Tymnet Synthecide
- 4.) Hacking VM/CMS Goe
- 5.) The DECWRL Mail Gateway Dedicated Link
- 6.) Decnet Hackola : Remote Turist TTY (RTT) *Hobbit*
- 7.) VAX/VMS Fake Mail Jack T. Tab
- 8.) Consensual Realities in Cyberspace Paul Saffo
- 9.) The Truth About Lie Detectors Razor's Edge
- 10.) Western Union Telex, TWX, and Time Service Phone Phanatic
- 11.) Phrack World News XXX Part 1 Knight Lightning
- 12.) Phrack World News XXX Part 2 Knight Lightning
-
-
- Volume 3 Issue 31 May 28, 1990
- -----------------
-
- 1.) Introduction Doc Holliday
- 2.) Phrack Pro-Phile of Markus Hess Pain Hertz
- 3.) Hacking Rolm's CBXII Doc Holliday
- 4.) TAMS and telenet Security Phreak Accident
- 5.) The History of the Legion of Doom LOD
- 6.) The Definitive COSMOS Erik Bloodaxe
- 7.) Tymnet Security Memo Anonymous
- 8.) Phrack World News Part I Phreak Accident
- 9.) Phrack World News Part II Phreak Accident
- 10.) Phrack World News Part III Phreak Accident
-
-
- PHRACK CLASSIC
- ~~~~~~~~~~~~~~
-
- Volume 3 Issue 32 November 17, 1990
- -----------------
-
- 1.) Introduction Crimson Death
- 2.) Phrack Classic Spotlight Featuring Knight Lightning Crimson Death
- 3.) Concerning Hackers Who Break into Computer Systems Dorothy Denning
- 4.) The Art of Investigation Butler
- 5.) UNIX 'Nasties' Sir Hackalot
- 6.) Automatic Teller Machine Cards Jester Sluggo
- 7.) A trip to the NCSC Knight Lightning
- 8.) Inside the SYSUAF.DAT File Pain Hertz
- 9.) RSTS Crimson Death
- 10.) Knight Line I Part 1 Doc Holliday
- 11.) Knight Line I Part 2 Doc Holliday
- 12.) Knight Line I Part 3 Doc Holliday
-
-
-
- P/HUN Magazine
- ~~~~~~~~~~~~~~
- Phreakers Hackers Underground Network
- -------------------------------------
-
- Issue 1 September 30, 1988
- -------
-
- 1.) Introduction Red Knight
- 2.) Fundamentals on UNIX Passwords Mr. Slippery
- 3.) Electronic Funds Transfer Systems (EFTS) The Line Breaker
- 4.) Dialups Cyfer
- 5.) Telenet Access╨s Numbers DareDevil
- 6.) Hacker Menace and Electronic Bulletin Boards Code Cracker
- 7.) Federal Black Pages The Line Breaker
- 8.) Red & Green Boxes revived The Pink Panther
- 9.) A Notice to all Phreakers The Jedi
- 10.) An Introduction to Divertors Larry P.
- 11.) The Mf2 U.K. Signalling System The Key
- 12.) List of Dutch and Belgium BBS's The Key
- 13.) The Paper Clip Method Master Mind
- 14.) The SL-1ST PABX Red Knight
-
-
- Issue 2 December 14, 1988
- -------
-
- 1.) Introduction Red Knight
- 2.) A Report on the Internet Worm Bob Page
- 3.) Defeating Security of Apple's UBBS Evil Mind
- 4.) Hacking in Holland and its Numbering Method Rop & Key
- 5.) Things to do with Third Party Payphones The Jedi
- 6.) An In-Depth Guide in Hacking the UNIX & BNU Red Knight
- 7.) Guide to the PICK Operating System Mr. Slippery
- 8.) A Novice's Guide to Hacking - 1989 Edition The Mentor
- 9.) Telephone-Controlled tape Starter NY Hacker
-
-
- Issue 3 February 11, 1989
- -------
-
- 1.) Introduction Red Knight
- 2.) Viruses: Assembly, Pascal, Basic & Batch Tesla Coil II
- 3.) VAX/VMS System Security Lawrence Xavier
- 4.) AUtomated VOice Network (AUTOVON): An Outline DareDevil
- 5.) The Pan Am Airline Computer Part "A" Red Knight
- 6.) The Pan Am Airline Computer Part "B"
- 7.) Common Channel (I) Signalling (CCIS): An Overview Tubular Phreak
- 8.) Who's Listening Captain Zap
- 9.) An Introduction to BITNET Aristotle
- 10.) Plastic Card Encoding Practices and Standards Hasan Ali
- 11.) Lockpicking: An In-Depth Guide The Locksmith
-
-
- Issue 4 June 27, 1989
- -------
-
- 1.) Introduction Red Knight
- 2.) The Banishment of Phrack, Inc. Knight Lightning
- 3.) A Boot Sector Virus Southern Cross
- 4.) Vital Credit Card Information and Usage The Sparrow
- 5.) An Introduction to House Explosives Franz Liszt
- 6.) TSPS No. 1B - Call Processing and Explanation Phelix the Hack
- 7.) Free Computer Magazines Southern Cross
- 8.) A Guide to Hacking Amos Nightcrawler
- 9.) USDN versus ISDN Lord Micro
- 10.) P/HUN Telecom News/Advancements DareDevil
- 11.) P/HUN Telecom News/Advancements
-
-
-
- Issue 5 May 7, 1990
- -------
-
- 1.) Introduction Red Knight
- 2.) Peering into the Soul of ESS - Jack the Ripper
- The Master Control Center
- 3.) Born to Kill - The Art of Assassination Jack the Ripper
- 4.) SSWC Bell Research Report Volume #1 SSWC
- 5.) SSWC Bell Research Report Volume #2 SSWC
- 6.) Baliord VMS Tricks Volume I: PHONE Baliord
- 7.) Baliord VMS Tricks Volume II: DOOR Baliord
- 8.) A New Operator Service Feature for the 5SS Switch Bandito
- (O)perator (S)ervices (P)osition (S)ystem
- 9.) The Crossbar Switching Guide [Xbar no. 5] Part I Xbar Switchman
- 10.) SSWC Bell Research Report Volume #3 SSWC
- 11.) Carrier 900/700 Services Tone Tec
- 12.) Legion of Doom Indictment [Chicago Members] TELECOM Digest
- 13.) Card Reader Access System (Card Key) The Ring Master
- 14.) S.S.T.C. LMOS Guide Lines Thrasher 005
-
-
-
- Phortune 500
- ~~~~~~~~~~~~
-
- TPH #1 July 3, 1989
- ------
- The Phreaker's Handbook Volume 1, Issue 1 Doctor Dissector
- -----------------------------------------
-
- 1.) Title and Disclaimer
- 2.) TOC and Introduction
- 3.) The Phreak's Vitals
- 4.) The Phreaker's Glossary
- 5.) Other Fone Information
- 6.) References and Suggested Reading
-
-
-
- ACADEMIC PAPERS
- ~~~~~~~~~~~~~~~
-
-
- Denning, Dr. Dorothy E. Concerning Hackers Who Break into Computer
- ----------------------- Systems
- DEC; Systems Research Center 1990
-
-
-
- Meyer, Gordon R. The Social Organization of the Computer
- ---------------- Underground
- Northern Illinois University August 1989
-
-
-
-
-
- Publications That Government Agencies THINK are Hacker Manuals
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- GURPS Cyberpunk Manual Steve Jackson
- Games 1990
-
-
- ________________________________________________________________________________
-
- Well, that's it for now. Now go out and read some of this stuff. This biblio-
- graphy has been somewhat limited to periodical type publications which, as a
- general rule, tend to be of pretty good quality (at least those that last more
- than 6 months).
-
- Success in any endeavor is dependent upon skill, which is directly dependent
- upon knowledge. The H/P trades are becoming increasingly dangerous. But danger
- lies only in ignorance and sloth. It's your choice. And remember, all authors
- provide their works for informational purposes only. If you get nailed, it's
- your fault. Don't try to blame anyone else (authors or sysops) for an act you
- undertook of your own volition.
-
- Where I go with this file from here is pretty much undecided, other than
- maintaining updates. I have thoughts of a database, along with my next project.
-
- My next project will pick up pretty much where this has left off, namely all of
- the text files that were not published as periodicals. Further, this will serve
- also as a suggested file-naming standard. There's nothing that irritates me
- more than downloading three different files, only to discover that they are one
- and the same, but with different names.
-
- Anyone who wishes to assist me with this should contact me at any of the places
- listed below. (Hmmm...this sounds like something that those sociology types at
- NIU might enjoy...or at least find useful... :-)).
-
- ________________________________________________________________________________
-
- Thanks for assistance is extended to the following:
-
- DRU BBS - for enabling me to capture the cDc index
- The Affiliated - for publishing "Phrack Volume Zero Issue Zero - The UnOfficial
- Phrack Index" enabling me to complete this document prior to completing
- my Phrack collection
- All of the Boards that have been most gracious enough to grant me access.
- Magus - for his subtle, yet immensely helpful, assistance
-
- ________________________________________________________________________________
-
- So, last but not least, here's where you can contact me to provide information
- for updates to this list:
-
- Incunabula BBS This is the preferred point to u/l files.
- 215-569-4225 Non-registered users can e-mail me (# 140) and leave me
- files by logging on as "GUEST" with password "ARTICLE"
-
- Ripco ][ I wasn't on this before it was confiscated, but I
- 312-528-5020 understand that it was one of the better boards in the
- country. So, give it a call and return some of the
- stuff you've leeched before. Sysop - Dr. Ripco
-
- Blitzkrieg Home of (yet another :->) rendition of TAP magazine.
- 502-499-8933 Lots of good bases and files. Sysop - Predat0r
-
- Demon Roach Home of the Cult of the Dead Cow. Need I say more?
- Underground NuP required. Sysop - Grandmaster Ratte
- 806-794-4362
-
- Well, these four seem to cover pretty much of the country, so I'll stop here.
- They're also probably the four I call the most, but I also call The Works (The
- World's Largest Text-file BBS (Leech Paradise)), the Rune Stone and some others
- pretty regularly. So look for me. And if I don't answer within a couple of
- weeks, try somewhere else.
-
- No matter what, you can at least contact me anonymously on Incunabula.
-
- later
- ________________________________________________________________________________
-
- (c) 1991 by Trader and
- Trader Communications
- All rights reserved
-
-
-