home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 46.0 KB | 1,401 lines |
-
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 8 of 22
-
-
- 05. What are some gopher sites of interest to hackers?
-
- ba.com (Bell Atlantic)
- csrc.ncsl.nist.gov (NIST Security Gopher)
- gopher.acm.org (SIGSAC (Security, Audit & Control))
- gopher.cpsr.org (Computer Professionals for Social Responsibility)
- gopher.cs.uwm.edu
- gopher.eff.org (Electonic Frontier Foundation)
- gw.PacBell.com (Pacific Bell)
- iitf.doc.gov (NITA -- IITF)
- oss.net (Open Source Solutions)
- spy.org (Computer Systems Consulting)
- wiretap.spies.com (Wiretap)
-
-
- 06. What are some World wide Web (WWW) sites of interest to hackers?
-
- http://alumni.caltech.edu/~dank/isdn/ (ISDN)
- http://aset.rsoc.rockwell.com (NASA/MOD AIS Security)
- http://aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec)
- http://att.net/dir800 (800 directory)
- http://ausg.dartmouth.edu/security.html (Security)
- http://cs.purdue.edu/coast/coast.html (Coast)
- http://csrc.ncsl.nist.gov (NIST)
- http://dhp.com/~pluvius
- http://dfw.net/~aleph1 (Eubercrackers)
- http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
- http://everest.cs.ucdavis.edu/Security.html (Security)
- http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
- http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR)
- http://first.org (FIRST)
- http://ftp.tamu.edu/~abr8030/security.html (Security)
- http://hightop.nrl.navy.mil/potpourri.html (Security)
- http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books)
- http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
- http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
- http://info.bellcore.com/BETSI/betsi.html (Betsi)
- http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC)
- http://l0pht.com (The l0pht)
- http://l0pht.com/~oblivion/IIRG.html (Phantasy Magazine)
- http://mindlink.jolt.com (The Secrets of LockPicking)
- http://mls.saic.com (SAIC MLS)
- http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage)
- http://nasirc.hq.nasa.gov (NASA ASIRC)
- http://ophie.hughes.american.edu/~ophie
- http://ripco.com:8080/~glr/glr.html (Full Disclosure)
- http://spy.org (CSC)
- http://tansu.com.au/Info/security.html (Comp and Net Security)
- http://the-tech.mit.edu (LaMacchia case info)
- http://wintermute.itd.nrl.navy.mil/5544.html (Network Security)
- http://www.aads.net (Ameritech)
- http://www.alw.nih.gov/WWW/security.html (Unix Security)
- http://www.artcom.de/CCC (CCC Homepage)
- http://www.aspentec.com/~frzmtdb/fun/hacker.html
- http://www.aus.xanadu.com:70/1/EFA (EFF Australia)
- http://www.ba.com (Bell Atlantic)
- http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
- http://www.bell.com (MFJ Task Force)
- http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products)
- http://www.brad.ac.uk/~nasmith/index.html
- http://www.bst.bls.com (BellSouth)
- http://www.c3.lanl.gov/~mcn (Lanl)
- http://www.cert.dfn.de/ (German First Team)
- http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
- http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
- http://www.cpsr.org/home (CPSR)
- http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
- http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
- http://www.cs.umd.edu/~lgas
- http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
- http://www.csd.harris.com/secure_info.html (Harris)
- http://www.csl.sri.com (SRI Computer Science Lab)
- http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
- http://www.datafellows.fi (Data Fellows)
- http://www.delmarva.com/raptor/raptor.html (Raptor Network Isolator)
- http://www.demon.co.uk/kbridge (KarlBridge)
- http://www.digicash.com/ecash/ecash-home.html (Digital Cash)
- http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
- http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
- http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems)
- http://www.eff.org/papers.html (EFF)
- http://www.engin.umich.edu/~jgotts/boxes.html (Box info)
- http://www.engin.umich.edu/~jgotts/hack-faq.html(This document)
- http://www.engin.umich.edu/~jgotts/underground.html
- http://www.ensta.fr/internet/unix/sys_admin (System administration)
- http://www.etext.org/Zines/ (Zines)
- http://www.fc.net/defcon (DefCon)
- http://www.fc.net/phrack.html (Phrack Magazine)
- http://www.first.org/first/ (FIRST)
- http://www.greatcircle.com (Great Circle Associates)
- http://www.hpcc.gov/blue94/section.4.6.html (NSA)
- http://www.ic.gov (The CIA)
- http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
- http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
- http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
- http://www.net23.com (Max Headroom)
- http://www.nist.gov (NIST)
- http://www.pacbell.com (Pacific Bell)
- http://www.paranoia.com/mthreat (ToneLoc)
- http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
- http://www.phantom.com/~king (Taran King)
- http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography)
- http://www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA)
- http://www.research.att.com (AT&T)
- http://ripco.com:8080/~glr/glr.html (Full Disclosure)
- http://www.rsa.com (RSA Data Security)
- http://www.satelnet.org/~ccappuc
- http://www.service.com/cm/uswest/usw1.html (USWest)
- http://www.shore.net/~oz/welcome.html (Hack TV)
- http://www.spy.org (Computer Systems Consulting)
- http://www.sri.com (SRI)
- http://www.tansu.com.au/Info/security.html (Security Reference Index)
- http://www.tis.com (Trusted Information Systems)
- http://www.tri.sbc.com (Southwestern Bell)
- http://www.uci.agh.edu.pl/pub/security (Security)
- http://www.umcc.umich.edu/~doug/virus-faq.html (Virus)
- http://www.usfca.edu/crackdown/crack.html (Hacker Crackdown)
- http://www.wam.umd.edu/~ankh/Public/devil_does_unix
- http://www.wiltel.com (Wiltel)
- http://www.winternet.com/~carolann/dreams.html
- http://www.wired.com (Wired Magazine)
-
-
- 07. What are some IRC channels of interest to hackers?
-
- #2600
- #cellular
- #hack
- #phreak
- #linux
- #realhack
- #root
- #unix
- #warez
-
-
- 08. What are some BBS's of interest to hackers?
-
- Rune Stone (203)832-8441
- Hacker's Haven (303)343-4053
- Independent Nation (315)656-4179
- Ut0PiA (315)656-5135
- underworld_1994.com (514)683-1894
- Digital Fallout (516)378-6640
- Alliance Communications (612)251-8596
- Maas-Neotek (617)855-2923
- Apocalypse 2000 (708)676-9855
- K0dE Ab0dE (713)579-2276
- fARM R0Ad 666 (713)855-0261
-
-
- 09. What are some books of interest to hackers?
-
- General Computer Security
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Computer Security Basics
- Author: Deborah Russell and G.T. Gengemi Sr.
- Publisher: O'Reilly & Associates, Inc.
- Copyright Date: 1991
- ISBN: 0-937175-71-4
-
- This is an excellent book. It gives a broad overview of
- computer security without sacrificing detail. A must read for
- the beginning security expert.
-
- Computer Security Management
- Author: Karen Forcht
- Publisher: Boyd and Fraser
- Copyright Date: 1994
- ISBN: 0-87835-881-1
-
- Information Systems Security
- Author: Philip Fites and Martin Kratz
- Publisher: Van Nostrad Reinhold
- Copyright Date: 1993
- ISBN: 0-442-00180-0
-
- Computer Related Risks
- Author: Peter G. Neumann
- Publisher: Addison-Wesley
- Copyright Date: 1995
- ISBN: 0-201-55805-X
-
- Computer Security Management
- Author: Karen Forcht
- Publisher: boyd & fraser publishing company
- Copyright Date: 1994
- ISBN: 0-87835-881-1
-
- The Stephen Cobb Complete Book of PC and LAN Security
- Author: Stephen Cobb
- Publisher: Windcrest Books
- Copyright Date: 1992
- ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)
-
- Security in Computing
- Author: Charles P. Pfleeger
- Publisher: Prentice Hall
- Copyright Date: 1989
- ISBN: 0-13-798943-1.
-
- Building a Secure Computer System
- Author: Morrie Gasser
- Publisher: Van Nostrand Reinhold Co., New York.
- Copyright Date:
- ISBN: 0-442-23022-2
-
- Modern Methods for Computer Security
- Author: Lance Hoffman
- Publisher: Prentice Hall
- Copyright Date: 1977
- ISBN:
-
- Windows NT 3.5 Guidelines for Security, Audit and Control
- Author:
- Publisher: Microsoft Press
- Copyright Date:
- ISBN: 1-55615-814-9
-
-
- Unix System Security
- ~~~~~~~~~~~~~~~~~~~~
- Practical Unix Security
- Author: Simson Garfinkel and Gene Spafford
- Publisher: O'Reilly & Associates, Inc.
- Copyright Date: 1991
- ISBN: 0-937175-72-2
-
- Finally someone with a very firm grasp of Unix system security
- gets down to writing a book on the subject. Buy this book.
- Read this book.
-
- Firewalls and Internet Security
- Author: William Cheswick and Steven Bellovin
- Publisher: Addison Wesley
- Copyright Date: 1994
- ISBN: 0-201-63357-4
-
- Unix System Security
- Author: Rik Farrow
- Publisher: Addison Wesley
- Copyright Date: 1991
- ISBN: 0-201-57030-0
-
- Unix Security: A Practical Tutorial
- Author: N. Derek Arnold
- Publisher: McGraw Hill
- Copyright Date: 1993
- ISBN: 0-07-002560-6
-
- Unix System Security: A Guide for Users and Systems Administrators
- Author: David A. Curry
- Publisher: Addison-Wesley
- Copyright Date: 1992
- ISBN: 0-201-56327-4
-
- Unix System Security
- Author: Patrick H. Wood and Stephen G. Kochan
- Publisher: Hayden Books
- Copyright Date: 1985
- ISBN: 0-672-48494-3
-
- Unix Security for the Organization
- Author: Richard Bryant
- Publisher: Sams
- Copyright Date: 1994
- ISBN: 0-672-30571-2
-
-
- Network Security
- ~~~~~~~~~~~~~~~~
- Network Security Secrets
- Author: David J. Stang and Sylvia Moon
- Publisher: IDG Books
- Copyright Date: 1993
- ISBN: 1-56884-021-7
-
- Not a total waste of paper, but definitely not worth the
- $49.95 purchase price. The book is a rehash of previously
- published information. The only secret we learn from reading
- the book is that Sylvia Moon is a younger woman madly in love
- with the older David Stang.
-
- Complete Lan Security and Control
- Author: Peter Davis
- Publisher: Windcrest / McGraw Hill
- Copyright Date: 1994
- ISBN: 0-8306-4548-9 and 0-8306-4549-7
-
- Network Security
- Author: Steven Shaffer and Alan Simon
- Publisher: AP Professional
- Copyright Date: 1994
- ISBN: 0-12-638010-4
-
-
- Cryptography
- ~~~~~~~~~~~~
- Applied Cryptography: Protocols, Algorithms, and Source Code in C
- Author: Bruce Schneier
- Publisher: John Wiley & Sons
- Copyright Date: 1994
- ISBN: 0-471-59756-2
-
- Bruce Schneier's book replaces all other texts on
- cryptography. If you are interested in cryptography, this is
- a must read. This may be the first and last book on
- cryptography you may ever need to buy.
-
- Cryptography and Data Security
- Author: Dorothy Denning
- Publisher: Addison-Wesley Publishing Co.
- Copyright Date: 1982
- ISBN: 0-201-10150-5
-
- Protect Your Privacy: A Guide for PGP Users
- Author: William Stallings
- Publisher: Prentice-Hall
- Copyright Date: 1994
- ISBN: 0-13-185596-4
-
-
- Programmed Threats
- ~~~~~~~~~~~~~~~~~~
- The Little Black Book of Computer Viruses
- Author: Mark Ludwig
- Publisher: American Eagle Publications
- Copyright Date: 1990
- ISBN: 0-929408-02-0
-
- The original, and still the best, book on computer viruses.
- No media hype here, just good clean technical information.
-
- Computer Viruses, Artificial Life and Evolution
- Author: Mark Ludwig
- Publisher: American Eagle Publications
- Copyright Date: 1993
- ISBN: 0-929408-07-1
-
- Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
- Threats to Your System
- Author: John McAfee and Colin Haynes
- Publisher: St. Martin's Press
- Copyright Date: 1989
- ISBN: 0-312-03064-9 and 0-312-02889-X
-
- The Virus Creation Labs: A Journey Into the Underground
- Author: George Smith
- Publisher: American Eagle Publications
- Copyright Date: 1994
- ISBN:
-
-
- Telephony
- ~~~~~~~~~
- Engineering and Operations in the Bell System
- Author: R.F. Rey
- Publisher: Bell Telephont Laboratories
- Copyright Date: 1983
- ISBN: 0-932764-04-5
-
- Although hopelessly out of date, this book remains *THE* book
- on telephony. This book is 100% Bell, and is loved by phreaks
- the world over.
-
- Telephony: Today and Tomorrow
- Author: Dimitris N. Chorafas
- Publisher: Prentice-Hall
- Copyright Date: 1984
- ISBN: 0-13-902700-9
-
- The Telecommunications Fact Book and Illustrated Dictionary
- Author: Ahmed S. Khan
- Publisher: Delmar Publishers, Inc.
- Copyright Date: 1992
- ISBN: 0-8273-4615-8
-
- I find this dictionary to be an excellent reference book on
- telephony, and I recommend it to anyone with serious
- intentions in the field.
-
- Tandy/Radio Shack Cellular Hardware
- Author: Judas Gerard and Damien Thorn
- Publisher: Phoenix Rising Communications
- Copyright Date: 1994
- ISBN:
-
- The Phone Book
- Author: Carl Oppendahl
- Publisher: Consumer Reports
- Copyright Date:
- ISBN: 0-89043-364-x
-
- Listing of every cellular ID in the us, plus roaming ports,
- and info numbers for each carrier.
-
- Principles of Caller I.D.
- Author:
- Publisher: International MicroPower Corp.
- Copyright Date:
- ISBN:
-
-
- Hacking History and Culture
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The Hacker Crackdown: Law and Disorder on the Electronic Frontier
- Author: Bruce Sterling
- Publisher: Bantam Books
- Copyright Date: 1982
- ISBN: 0-553-56370-X
-
- Bruce Sterling has recently released the book FREE to the net.
- The book is much easier to read in print form, and the
- paperback is only $5.99. Either way you read it, you will be
- glad you did. Mr. Sterling is an excellent science fiction
- author and has brought his talent with words to bear on the
- hacking culture. A very enjoyable reading experience.
-
- Cyberpunk
- Author: Katie Hafner and John Markoff
- Publisher: Simon and Schuster
- Copyright Date: 1991
- ISBN: 0-671-77879-X
-
- The Cuckoo's Egg
- Author: Cliff Stoll
- Publisher: Simon and Schuster
- Copyright Date: 1989
- ISBN: 0-671-72688-9
-
- Hackers: Heroes of the Computer Revolution
- Author: Steven Levy
- Publisher: Doubleday
- Copyright Date: 1984
- ISBN: 0-440-13495-6
-
-
- Unclassified
- ~~~~~~~~~~~~
- The Hacker's Handbook
- Author: Hugo Cornwall
- Publisher: E. Arthur Brown Company
- Copyright Date:
- ISBN: 0-912579-06-4
-
- Secrets of a Super Hacker
- Author: The Knightmare
- Publisher: Loompanics
- Copyright Date: 1994
- ISBN: 1-55950-106-5
-
- The Knightmare is no super hacker. There is little or no real
- information in this book. The Knightmare gives useful advice
- like telling you not to dress up before going trashing.
- The Knightmare's best hack is fooling Loompanics into
- publishing this garbage.
-
- The Day The Phones Stopped
- Author: Leonard Lee
- Publisher: Primus / Donald I Fine, Inc.
- Copyright Date: 1992
- ISBN: 1-55611-286-6
-
- Total garbage. Paranoid delusions of a lunatic. Less factual
- data that an average issue of the Enquirer.
-
- Information Warfare
- Author: Winn Swartau
- Publisher: Thunder Mountain Press
- Copyright Date: 1994
- ISBN: 1-56025-080-1
-
- An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
- Author: Doug Richardson
- Publisher: Salamander Press
- Copyright Date:
- ISBN: 0-668-06497-8
-
-
- 10. What are some videos of interest to hackers?
-
- 'Unauthorized Access' by Annaliza Savage
- $25 on VH S format in 38-min
- Savage Productions
- 1803 Mission St., #406
- Santa Cruz, CA 95060
-
-
- 11. What are some mailing lists of interest to hackers?
-
- Academic Firewalls
- Reflector Address:
- Registration Address: Send a message to majordomo@greatcircle.com
- containing the line "subscribe firewalls user@host"
-
- Bugtraq
- Reflector Address: bugtraq@fc.net
- Registration Address: bugtraq-request@fc.net
-
- Cert Tools
- Reflector Address: cert-tools@cert.org
- Registration Address: cert-tools-request@cert.org
-
- Computers and Society
- Reflector Address: Comp-Soc@limbo.intuitive.com
- Registration Address: taylor@limbo.intuitive.com
-
- Coordinated Feasibility Effort to Unravel State Data
- Reflector Address: ldc-sw@cpsr.org
- Registration Address:
-
- CPSR Announcement List
- Reflector Address: cpsr-announce@cpsr.org
- Registration Address:
-
- CPSR - Intellectual Property
- Reflector Address: cpsr-int-prop@cpsr.org
- Registration Address:
-
- CPSR - Internet Library
- Reflector Address: cpsr-library@cpsr.org
- Registration Address:
-
- DefCon Announcement List
- Reflector Address:
- Registration Address: Send a message to majordomo@fc.net containing
- the line "subscribe dc-announce"
-
- DefCon Chat List
- Reflector Address:
- Registration Address: Send a message to majordomo@fc.net containing
- the line "subscribe dc-stuff"
-
- IDS (Intruder Detection Systems)
- Reflector Address:
- Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
- containing the line "subscribe ids"
-
- Macintosh Security
- Reflector Address: mac-security@eclectic.com
- Registration Address: mac-security-request@eclectic.com
-
- NeXT Managers
- Reflector Address:
- Registration Address: next-managers-request@stolaf.edu
-
- Phiber-Scream
- Reflector Address:
- Registration Address: Send a message to listserv@netcom.com
- containing the line "subscribe phiber-scream user@host"
-
- phruwt-l (Macintosh H/P)
- Reflector Address:
- Registration Address: Send a message to filbert@netcom.com
- with the subject "phruwt-l"
-
- rfc931-users
- Reflector Address: rfc931-users@kramden.acf.nyu.edu
- Registration Address: brnstnd@nyu.edu
-
- RSA Users
- Reflector Address: rsaref-users@rsa.com
- Registration Address: rsaref-users-request@rsa.com
-
-
- 12. What are some print magazines of interest to hackers?
-
- 2600 - The Hacker Quarterly
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- E-mail address: 2600@well.sf.ca.us
-
- Subscription Address: 2600 Subscription Dept
- PO Box 752
- Middle Island, NY 11953-0752
-
- Letters and article submission address: 2600 Editorial Dept
- PO Box 99
- Middle Island, NY 11953-0099
-
- Subscriptions: United States: $21/yr individual, $50 corporate.
- Overseas: $30/yr individual, $65 corporate.
-
-
- Gray Areas
- ~~~~~~~~~~
- Gray Areas examines gray areas of law and morality and subject matter
- which is illegal, immoral and/oe controversial. Gray Areas explores
- why hackers hack and puts hacking into a sociological framework of
- deviant behavior.
-
- E-Mail Address: grayarea@well.sf.ca.us
- E-Mail Address: grayarea@netaxs.com
-
- U.S. Mail Address: Gray Areas
- PO Box 808
- Broomall, PA 19008
-
- Subscriptions: $26.00 4 issues first class
- $34.00 4 issues foreign (shipped air mail)
-
-
- Wired
- ~~~~~
- Subscription Address: subscriptions@wired.com
- or: Wired
- PO Box 191826
- San Francisco, CA 94119-9866
-
- Letters and article submission address: guidelines@wired.com
- or: Wired
- 544 Second Street
- San Francisco, CA 94107-1427
-
- Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
-
-
- Nuts & Volts
- ~~~~~~~~~~~~
- T& L Publications
- 430 Princeland Court
- Corona, CA 91719
- (800)783-4624 (Voice) (Subscription Only Order Line)
- (909)371-8497 (Voice)
- (909)371-3052 (Fax)
- CIS: 74262,3664
-
-
- 13. What are some e-zines of interest to hackers?
-
- CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo
- Empire Times ftp.etext.org /pub/Zines/Emptimes
- Phrack ftp.fc.net /pub/phrack
-
-
- 14. What are some organizations of interest to hackers?
-
- Computer Professionals for Social Responsibility (CPSR)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- CPSR empowers computer professionals and computer users to advocate
- for the responsible use of information technology and empowers all who
- use computer technology to participate in the public debate. As
- technical experts, CPSR members provide the public and policymakers
- with realistic assessments of the power, promise, and limitations of
- computer technology. As an organization of concerned citizens, CPSR
- directs public attention to critical choices concerning the
- applications of computing and how those choices affect society.
-
- By matching unimpeachable technical information with policy
- development savvy, CPSR uses minimum dollars to have maximum impact
- and encourages broad public participation in the shaping of technology
- policy.
-
- Every project we undertake is based on five principles:
-
- * We foster and support public discussion of and public
- responsibility for decisions involving the use of computers in
- systems critical to society.
-
- * We work to dispel popular myths about the infallibility of
- technological systems.
-
- * We challenge the assumption that technology alone can solve
- political and social problems.
-
- * We critically examine social and technical issues within the
- computer profession, nationally and internationally.
-
- * We encourage the use of computer technology to improve the quality
- of life.
-
- CPSR Membership Categories
- 75 REGULAR MEMBER
- 50 Basic member
- 200 Supporting member
- 500 Sponsoring member
- 1000 Lifetime member
- 20 Student/low income member
- 50 Foreign subscriber
- 50 Library/institutional subscriber
-
- CPSR National Office
- P.O. Box 717
- Palo Alto, CA 94301
- 415-322-3778
- 415-322-3798 (FAX)
- E-mail: cpsr@csli.stanford.edu
-
-
- Electronic Frontier Foundation (EFF)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
- of policies and activities that will advance freedom and openness in
- computer-based communications. It is a member-supported, nonprofit
- group that grew from the conviction that a new public interest
- organization was needed in the information age; that this organization
- would enhance and protect the democratic potential of new computer
- communications technology. From the beginning, the EFF determined to
- become an organization that would combine technical, legal, and public
- policy expertise, and would apply these skills to the myriad issues
- and concerns that arise whenever a new communications medium is born.
-
- Memberships are $20.00 per year for students, $40.00 per year for
- regular members, and $100.00 per year for organizations.
-
- The Electronic Frontier Foundation, Inc.
- 666 Pennsylvania Avenue S.E., Suite 303
- Washington, D.C. 20003
- +1 202 544 9237
- +1 202 547 5481 FAX
- Internet: eff@eff.org
-
-
- Free Software Foundation (FSF)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
- GNU
- ~~~
-
-
- The League for Programming Freedom (LPF)
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The League for Programming Freedom is an organization of people who
- oppose the attempt to monopolize common user interfaces through "look
- and feel" copyright lawsuits. Some of us are programmers, who worry
- that such monopolies will obstruct our work. Some of us are users,
- who want new computer systems to be compatible with the interfaces we
- know. Some are founders of hardware or software companies, such as
- Richard P. Gabriel. Some of us are professors or researchers,
- including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
- Boyer and Patrick Winston.
-
- "Look and feel" lawsuits aim to create a new class of government-
- enforced monopolies broader in scope than ever before. Such a system
- of user-interface copyright would impose gratuitous incompatibility,
- reduce competition, and stifle innovation.
-
- We in the League hope to prevent these problems by preventing
- user-interface copyright. The League is NOT opposed to copyright law
- as it was understood until 1986 -- copyright on particular programs.
- Our aim is to stop changes in the copyright system which would take
- away programmers' traditional freedom to write new programs compatible
- with existing programs and practices.
-
- Annual dues for individual members are $42 for employed professionals,
- $10.50 for students, and $21 for others. We appreciate activists, but
- members who cannot contribute their time are also welcome.
-
- To contact the League, phone (617) 243-4091, send Internet mail to the
- address league@prep.ai.mit.edu, or write to:
-
- League for Programming Freedom
- 1 Kendall Square #143
- P.O. Box 9171
- Cambridge, MA 02139 USA
-
-
- SotMesc
- ~~~~~~~
- Founded in 1989, SotMesc is dedicated to preserving the integrity and
- cohesion of the computing society. By promoting computer education,
- liberties and efficiency, we believe we can secure freedoms for all
- computer users while retaining privacy.
-
- SotMesc maintains the CSP Internet mailing list, the SotMesc
- Scholarship Fund, and the SotMesc Newsletter.
-
- The SotMESC is financed partly by membership fees, and donations, but
- mostly by selling hacking, cracking, phreaking, electronics, internet,
- and virus information and programs on disk and bound paper media.
-
- SotMesc memberships are $20 to students and $40 to regular members.
-
- SotMESC
- P.O. Box 573
- Long Beach, MS 39560
-
-
- Computer Emergency Response Team (CERT
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- CERT is the Computer Emergency Response Team that was formed by the
- Defense Advanced Research Projects Agency (DARPA) in November 1988 in
- response to the needs exhibited during the Internet worm incident.
- The CERT charter is to work with the Internet community to facilitate
- its response to computer security events involving Internet hosts, to
- take proactive steps to raise the community's awareness of computer
- security issues, and to conduct research targeted at improving the
- security of existing systems.
-
- CERT products and services include 24-hour technical assistance for
- responding to computer security incidents, product vulnerability
- assistance, technical documents, and seminars. In addition, the team
- maintains a number of mailing lists (including one for CERT
- advisories) and provides an anonymous FTP server: cert.org
- (192.88.209.5), where security-related documents, past CERT
- advisories, and tools are archived.
-
- CERT contact information:
-
- U.S. mail address
- CERT Coordination Center
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213-3890
- U.S.A.
-
- Internet E-mail address
- cert@cert.org
-
- Telephone number
- (412)268-7090 (24-hour hotline)
- CERT Coordination Center personnel answer
- 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
- emergencies during other hours.
-
- FAX number
- (412)268-6989
-
-
- 15. Where can I purchase a magnetic stripe encoder/decoder?
-
- CPU Advance
- PO Box 2434
- Harwood Station
- Littleton, MA 01460
- (508)624-4819 (Fax)
-
- Omron Electronics, Inc.
- One East Commerce Drive
- Schaumburg, IL 60173
- (800)556-6766 (Voice)
- (708)843-7787 (Fax)
-
- Security Photo Corporation
- 1051 Commonwealth Avenue
- Boston, MA 02215
- (800)533-1162 (Voice)
- (617)783-3200 (Voice)
- (617)783-1966 (Voice)
-
- Timeline Inc,
- 23605 Telo Avenue
- Torrence, CA 90505
- (800)872-8878 (Voice)
- (800)223-9977 (Voice)
-
- Alltronics
- 2300 Zanker Road
- San Jose CA 95131
- (408) 943-9774 Voice
- (408) 943-9776 Fax
- (408) 943-0622 BBS
- Part Number: 92U067
-
- Atalla Corp
- San Jose, CA
- (408) 435-8850
-
-
- 16. What are the rainbow books and how can I get them?
-
- Orange Book
- DoD 5200.28-STD
- Department of Defense Trusted Computer System Evaluation Criteria
-
- Green Book
- CSC-STD-002-85
- Department of Defense Password Management Guideline
-
- Yellow Book
- CSC-STD-003-85
- Computer Security Requirements -- Guidance for Applying the Department
- of Defense Trusted Computer System Evaluation Criteria in Specific
- Environments
-
- Yellow Book
- CSC-STD-004-85
- Technical Rationale Behind CSC-STD-003-85: Computer Security
- Requirements. Guidance for Applying the Department of Defense Trusted
- Computer System Evaluation Criteria in Specific Environments.
-
- Tan Book
- NCSC-TG-001
- A Guide to Understanding Audit in Trusted Systems
-
- Bright Blue Book
- NCSC-TG-002
- Trusted Product Evaluation - A Guide for Vendors
-
- Neon Orange Book
- NCSC-TG-003
- A Guide to Understanding Discretionary Access Control in Trusted
- Systems
-
- Teal Green Book
- NCSC-TG-004
- Glossary of Computer Security Terms
-
- Red Book
- NCSC-TG-005
- Trusted Network Interpretation of the Trusted Computer System
- Evaluation Criteria
-
- Orange Book
- NCSC-TG-006
- A Guide to Understanding Configuration Management in Trusted Systems
-
- Burgundy Book
- NCSC-TG-007
- A Guide to Understanding Design Documentation in Trusted Systems
-
- Dark Lavender Book
- NCSC-TG-008
- A Guide to Understanding Trusted Distribution in Trusted Systems
-
- Venice Blue Book
- NCSC-TG-009
- Computer Security Subsystem Interpretation of the Trusted Computer
- System Evaluation Criteria
-
- Aqua Book
- NCSC-TG-010
- A Guide to Understanding Security Modeling in Trusted Systems
-
- Dark Red Book
- NCSC-TG-011
- Trusted Network Interpretation Environments Guideline -- Guidance for
- Applying the Trusted Network Interpretation
-
- Pink Book
- NCSC-TG-013
- Rating Maintenance Phase -- Program Document
-
- Purple Book
- NCSC-TG-014
- Guidelines for Formal Verification Systems
-
- Brown Book
- NCSC-TG-015
- A Guide to Understanding Trusted Facility Management
-
- Yellow-Green Book
- NCSC-TG-016
- Guidelines for Writing Trusted Facility Manuals
-
- Light Blue
- NCSC-TG-017
- A Guide to Understanding Identification and Authentication in Trusted
- Systems
-
- Light Blue Book
- NCSC-TG-018
- A Guide to Understanding Object Reuse in Trusted Systems
-
- Blue Book
- NCSC-TG-019
- Trusted Product Evaluation Questionnaire
-
- Gray Book
- NCSC-TG-020A
- Trusted Unix Working Group (TRUSIX) Rationale for Selecting
- Access Control List Features for the Unix System
-
- Lavender Book
- NCSC-TG-021
- Trusted Data Base Management System Interpretation of the Trusted
- Computer System Evaluation Criteria
-
- Yellow Book
- NCSC-TG-022
- A Guide to Understanding Trusted Recovery in Trusted Systems
-
- Bright Orange Book
- NCSC-TG-023
- A Guide to Understandng Security Testing and Test Documentation in
- Trusted Systems
-
- Purple Book
- NCSC-TG-024 (Volume 1/4)
- A Guide to Procurement of Trusted Systems: An Introduction to
- Procurement Initiators on Computer Security Requirements
-
- Purple Book
- NCSC-TG-024 (Volume 2/4)
- A Guide to Procurement of Trusted Systems: Language for RFP
- Specifications and Statements of Work - An Aid to Procurement
- Initiators
-
- Purple Book
- NCSC-TG-024 (Volume 3/4)
- A Guide to Procurement of Trusted Systems: Computer Security Contract
- Data Requirements List and Data Item Description Tutorial
-
- +Purple Book
- +NCSC-TG-024 (Volume 4/4)
- +A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
- +Proposal Document - An Aid to Procurement Initiators and Contractors
-
- Green Book
- NCSC-TG-025
- A Guide to Understanding Data Remanence in Automated Information
- Systems
-
- Hot Peach Book
- NCSC-TG-026
- A Guide to Writing the Security Features User's Guide for Trusted Systems
-
- Turquiose Book
- NCSC-TG-027
- A Guide to Understanding Information System Security Officer
- Responsibilities for Automated Information Systems
-
- Violet Book
- NCSC-TG-028
- Assessing Controlled Access Protection
-
- Blue Book
- NCSC-TG-029
- Introduction to Certification and Accreditation
-
- Light Pink Book
- NCSC-TG-030
- A Guide to Understanding Covert Channel Analysis of Trusted Systems
-
- C1 Technical Report-001
- Computer Viruses: Prevention, Detection, and Treatment
-
- *C Technical Report 79-91
- *Integrity in Automated Information Systems
-
- *C Technical Report 39-92
- *The Design and Evaluation of INFOSEC systems: The Computer Security
- *Contributions to the Composition Discussion
-
- NTISSAM COMPUSEC/1-87
- Advisory Memorandum on Office Automation Security Guideline
-
- --
-
- You can get your own free copy of any or all of the books by writing
- or calling:
-
- INFOSEC Awareness Division
- ATTN: X711/IAOC
- Fort George G. Meade, MD 20755-6000
-
- Barbara Keller
- (410) 766-8729
-
- If you ask to be put on the mailing list, you'll get a copy of each new
- book as it comes out (typically a couple a year).
-
- [* == I have not personally seen this book]
- [+ == I have not personally seen this book, and I believe it may not]
- [ be available]
-
-
-
-
- Section D: 2600
- ~~~~~~~~~~~~~~~
-
- 01. What is alt.2600?
-
- Alt.2600 is a Usenet newsgroup for discussion of material relating to
- 2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600
- game machine. Len@netsys.com created the group on Emmanuel
- Goldstein's recommendation. Emmanuel is the editor/publisher of 2600
- Magazine. Following the barrage of postings about the Atari machine to
- alt.2600, an alt.atari.2600 was created to divert all of the atari
- traffic from alt.2600. Atari 2600 people are advised to hie over to
- rec.games.video.classic.
-
-
- 02. What does "2600" mean?
-
- 2600Hz was a tone that was used by early phone phreaks (or
- phreakers) in the 80's, and some currently. If the tone was sent down the
- line at the proper time, one could get away with all sorts of fun stuff.
-
- A note from Emmanuel Goldstein:
-
- "The Atari 2600 has NOTHING to do with blue boxes or telephones
- or the 2600 hertz tone. The 2600 hertz tone was simply the first
- step towards exploring the network. If you were successful at
- getting a toll call to drop, then billing would stop at that
- point but there would be billing for the number already dialed
- up until the point of seizure. 800 numbers and long distance
- information were both free in the past and records of who called
- what were either non-existent or very obscure with regards to
- these numbers. This, naturally, made them more popular than
- numbers that showed up on a bill, even if it was only for
- a minute. Today, many 800 numbers go overseas, which provides
- a quick and free way into another country's phone system
- which may be more open for exploration."
-
-
- 03. Are there on-line versions of 2600 available?
-
- No.
-
-
- 04. I can't find 2600 at any bookstores. What can I do?
-
- Subscribe. Or, let 2600 know via the subscription address that you
- think 2600 should be in the bookstore. Be sure to include the
- bookstores name and address.
-
-
- 05. Why does 2600 cost more to subscribe to than to buy at a newsstand?
-
- A note from Emmanuel Goldstein:
-
- We've been selling 2600 at the same newsstand price ($4) since 1988
- and we hope to keep it at that price for as long as we can get away
- with it. At the same time, $21 is about the right price to cover
- subscriber costs, including postage and record keeping, etc. People
- who subscribe don't have to worry about finding an issue someplace,
- they tend to get issues several weeks before the newsstands get
- them, and they can take out free ads in the 2600 Marketplace.
-
- This is not uncommon in the publishing industry. The NY Times, for
- example, costs $156.50 at the newsstands, and $234.75 delivered to your
- door.
-
-
- Section E: Phrack Magazine
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- 01. What Is Phrack Magazine?
-
- Phrack Magazine is one of the longest running electronic-based publications
- in the world. Originally founded in 1985 by Knight Lightning and Taran
- King, it has survived several incarnations of editors and still remains
- true to its underground roots. Since its inception, Phrack has been
- providing the hacker community with information on operating systems,
- networking technologies and telephony, as well as relaying human interest
- features of interest to the international computer underground.
-
- During its lifetime, Phrack has always been at the center of controversy.
- Since the magazine has always been openly available, it presented law
- enforcement officials with what they percieved to be a direct link into
- the secret society of computer hackers. Not truly understnding either
- the the spirit of the magazine or the community for which it was written,
- Federal Agents and Prosecutors began to target Phrack Magazine and those
- affiliated with it.
-
- "The Hacker Crackdown" by Bruce Sterling relays the details surrounding
- some of these events.
-
- Phrack Magazine is now in its 10th year of publication, and is registered
- with the Library of Congress as ISSN 1068-1035, and is protected by
- US Copyright Law.
-
- 02. How can I reach Phrack Magazine?
-
- You can reach Phrack by email at: phrack@well.com, phrack@fc.net or
- phrackmag@aol.com. These addresses are listed in order of
- preference. Only AOL users should email the phrackmag@aol.com.
-
- Phrack can be reached by the postal service at:
-
- Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- 03. Who Publishes Phrack?
-
- Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe. It is
- hobbled together, touched up, spell checked and compressed on an overworked
- 486-66. It is then ftp'ed over to a BSDI UNIX machine where it is sent to
- the masses.
-
- 04. How Often Does Phrack Go Out?
-
- Phrack goes out roughly quarterly. It is often sent out later than every
- three months due to other more demanding obligations faced by its editor.
- The regularity of Phrack is really based upon the amount of information
- sent in. Phrack depends solely upon submissions to get published at all.
-
- 05. How Do I Subscribe?
-
- To subscribe to Phrack magazine, merely email phrack@well.com and ask to
- be placed on the mailing list.
-
- Any encrypted subscriptions requests will be ignored.
-
- Phrack will not accept subscription requests from any anonymous remailers or
- from sites in the fidonet domain. The anonymous remailers consistently
- bounce our mailings causing a big headache, so we won't use them. The
- fidonet domain administrators have asked us not to mail Phrack to fido users,
- because of the huge load it places on their outgoing spools (costing them a
- lot of money to send).
-
- 06. Why Don't I Get Any Response When I E-mail Phrack?
-
- Because of the high volume of mail sent to the Phrack email address,
- not everyone gets a response. All subscription requests are saved and
- added to the master list, but there is no automatic reply. All other
- messages are responded to as they are read, with the exception of PGP'd
- messages. All PGP'd email is stored for later decryption, and is almost
- never responded to, unless it is incredibly urgent.
-
- 07. Does Phrack Cost Money?
-
- Phrack Magazine charges a registration fee of $100.00 per user for any
- professional use of the magazine and the information contained therein.
- Information regarding this registration fee is contained at the beginning
- of every issue of Phrack.
-
- 08. How Can I Submit Articles?
-
- Articles are both wanted and needed. Phrack only exists if people write
- for it. There is no regular writing staff, there is only the editor, who
- cannot write the entire thing himself.
-
- Articles can be sent to Phrack via email or snailmail (on paper or
- IBM-compatible diskette). Articles should be in ASCII text format. Do
- not include any clever graphics or ANSI art. You can use Phrack's PGP key
- to encrypt articles, but send the files in the ASCII armor format.
-
- Please try to avoid sending files as MIME-compliant mail attachments.
-
- 09. What Is Phrack's PGP Key?
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.6
-
- mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
- Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
- Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
- tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
- =evjv
- -----END PGP PUBLIC KEY BLOCK-----
-
- 10. Where Can I Get Back Issues?
-
- Back issues of Phrack are found on many bulletin boards around the globe.
- The only OFFICIAL Phrack Magazine distribution site is our ftp archive
- at ftp.fc.net in /pub/phrack. There are NO official distribution sites
- other than this one, nor will there ever be. We don't want to play
- favorites and let one particular BBS call itself an "official" site while
- another isn't. Therefore, there will be no "official" sites except those
- archived by Phrack itself.
-
- You can also get back issues on the World Wide Web by connecting to:
- http://www.fc.net/phrack.html
-
- This URL allows users to view issues online, or pull them down for
- later viewing.
-
- Any users without net access can send diskettes and postage to the
- Phrack Postal Address given above, and request back issues to be
- sent via the postal system.
-
- Section F: Miscellaneous
- ~~~~~~~~~~~~~~~~~~~~~~~~
-
- 01. What does XXX stand for?
-
- TLA Three Letter Acronym
-
- ACL Access Control List
- PIN Personal Identification Number
- TCB Trusted Computing Base
-
- ALRU Automatic Line Record Update
- AN Associated Number
- ARSB Automated Repair Service Bureau
- ATH Abbreviated Trouble History
- BOC Bell Operating Company
- BOR Basic Output Report
- BOSS Business Office Servicing System
- CA Cable
- COE Central Office Equipment
- COSMOS Computer System for Main Frame Operations
- CMC Construction Maintenance Center
- CNID Calling Number IDentification
- CO Central Office
- COCOT Customer Owned Coin Operated Telephone
- CRSAB Centralized Repair Service Answering Bureau
- DDD Direct Distance Dialing
- ECC Enter Cable Change
- LD Long Distance
- LMOS Loop Maintenance Operations System
- MLT Mechanized Loop Testing
- NPA Numbering Plan Area
- POTS Plain Old Telephone Service
- RBOC Regional Bell Operating Company
- RSB Repair Service Bureau
- SS Special Service
- TAS Telephone Answering Service
- TH Trouble History
- TREAT Trouble Report Evaluation and Analysis Tool
-
- LOD Legion of Doom
- HFC Hell Fire Club
- TNO The New Order
-
- ACiD Ansi Creators in Demand
- CCi Cybercrime International
- FLT Fairlight
- iCE Insane Creators Enterprise
- iNC International Network of Crackers
- NTA The Nocturnal Trading Alliance
- PDX Paradox
- PE Public Enemy
- PSY Psychose
- QTX Quartex
- RZR Razor (1911)
- S!P Supr!se Productions
- TDT The Dream Team
- THG The Humble Guys
- THP The Hill People
- TRSI Tristar Red Sector Inc.
- UUDW Union of United Death Workers
-
-
- 02. How do I determine if I have a valid credit card number?
-
- Credit cards use the Luhn Check Digit Algorithm. The main purpose of
- this algorithm is to catch data entry errors, but it does double duty
- here as a weak security tool.
-
- For a card with an even number of digits, double every odd numbered
- digit and subtract 9 if the product is greater than 9. Add up all the
- even digits as well as the doubled-odd digits, and the result must be
- a multiple of 10 or it's not a valid card. If the card has an odd
- number of digits, perform the same addition doubling the even numbered
- digits instead.
-
-
- 03. What bank issued this credit card?
-
- 1033 Manufacturers Hanover Trust
- 1035 Citibank
- 1263 Chemical Bank
- 1665 Chase Manhattan
- 4024 Bank of America
- 4128 Citicorp
- 4209 New Era Bank
- 4302 HHBC
- 4310 Imperial Savings
- 4313 MBNA
- 4317 California Federal
- 5282 Wells Fargo
- 5424 Citibank
- 5410 Wells Fargo
- 5432 Bank of New York
- 6017 MBNA
-
-
- 04. What are the ethics of hacking?
-
- An excerpt from: Hackers: Heroes of the Computer Revolution
- by Steven Levy
-
- Access to computers -- and anything which might teach you
- something about the way the world works -- should be unlimited
- and total. Always yield to the Hands-On imperative.
-
- All information should be free.
-
- Mistrust Authority. Promote Decentralization.
-
- Hackers should be judged by their hacking, not bogus criteria
- such as degrees, age, race, or position.
-
- You can create art and beauty on a computer.
-
- Computers can change your life for the better.
-
-
- 04. Where can I get a copy of the alt.2600/#hack FAQ?
-
- Get it on FTP at:
- rahul.net /pub/lps
- rtfm.mit.edu /pub/usenet-by-group/alt.2600
- ftp.clark.net /pub/jcase
-
- Get it on the World Wide Web at:
- http://dfw.net/~aleph1
- http://www.engin.umich.edu/~jgotts/hack-faq.html
- http://www.phantom.com/~king
-
- Get it from these BBS's:
- Hacker's Haven (303)343-4053
-
-
-
-
-
- EOT
-