home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
miscpub1
/
intro.tj2
< prev
next >
Wrap
Text File
|
1992-09-26
|
4KB
|
95 lines
The LOD/H Technical Journal: File #1 of 10
Volume 1, Issue 2 Released: SEP. 07, 1987
THE
LOD/H TECHNICAL JOURNAL
-----------------------
INTRODUCTION:
This is issue #2, we had originally planned to put out 6 issues a year,
but it looks as if this will become a quarterly newsletter instead. This is
due
to the fact that the articles take months to fully research, write, and edit.
By year end, we hope to show that we are not a "fly-by-night" newsletter and
will continue to provide you with the same level of information, accuracy,
and
originality as this issue and the first. We appreciate those who have been
downloading, storing, and distributing the newsletter in its entirety, and
hope
this will continue, as it benefits everyone.
Here is the breakdown of this issue: 1 article on Telecommunications,
4 articles on Datacommunications, and one article in the 'other' category.
Two
authors have written articles for Issue 1, and 5 are new. Obviously this
Issue
is more hacking related, whereas Issue 1 was more phreaking related. If you
have any material which may be of interest, let us know.
Our 'sponsor' BBS list has been shortened to one dependable board, as
Metal Shop Private, Shadowspawn, Hell Prozen Over, The Private Sector and
Atlantis have all gone down, though some may be back online in the future.
Left
is Digital Logic. The usernumber/usernames for DL follows for those who wish
to
get in contact with us. We are open to suggestions for more Sponsor Boards.
Digital Logic: 305-395-6906 New User Pass=DIGIT
LOD/H Technical Journal Staff Account Number is 231.
One last note, a slight clarification on articles. Articles labeled with
letters, ie: Part A & Part B as in last issue's articles on the Outside Loop
Distribution Plant by Phucked Agent 04 and the LOH Telenet Directory along
with
this issue's article on Hacking CMS by Lex Luthor are intended to be complete
articles in themselves and should be merged together. They were broken up for
editing and transmission purposes. Articles labeled as Part 1 & Part 2, are
separate articles based on the same subject.
-------------------------------------------------------------------------------
TABLE OF CONTENTS:
01 Introduction to the LOD/H Technical Journal Staff 04 K
and Table Of Contents for Volume 1, Issue 2
02 The Networked Unix Solid State 17 K
03 Step By Step (SXS) Switching System Notes Phantom Phreaker 12 K
04 A Guide to the PRIMOS Operating System Carrier Culprit 25 K
05 Identifying and Defeating Physical Security and Lex Luthor 30 K
Intrusion Detection Systems Part II: The Exterior
06 A Discrete Unix Password Hacker Shooting Shark 09 K
07 The Networked Unix Shooting Shark 25 K
08 Hacking IBM's VM/CMS Operating System, Part A. Lex Luthor 26 K
09 Hacking IBM's VM/CMS Operating System, Part B. Lex Luthor 25 K
10 Network News & Notes Staff 07 K
Total: 7 articles, 10 files 180 K
-----------------------------------------------------------------------------
DOWNLOADED FROM P-80 SYSTEMS.....
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+