home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
phrk3
/
phrk3.dir
< prev
Wrap
File List
|
1994-05-28
|
8KB
|
186 lines
;
;Phrack Magazine
;_______________
;
;
; Volume Three, Issue 36
;
phrack36.1 phrack36.1 Intro to DIET PHRACK (Issue 13 Revisited)
phrack36.2 phrack36.2 Diet Phrack Loopback
phrack36.3 phrack36.3 The Living Computer
phrack36.4 phrack36.4 The History ah MOD
phrack36.5 phrack36.5 *Elite* Access
phrack36.6 phrack36.6 The LOD & the Occult
phrack36.7 phrack36.7 Searching for Special Access Agents
phrack36.8 phrack36.8 Phreaks in the Verse II
phrack36.9 phrack36.9 Real Cyberpunks
phrack36.10 phrack36.10 Elite World News Part 1
phrack36.11 phrack36.11 Elite World News Part 2
;
; Volume Three, Issue 35
;
phrack35.1 phrack35.1 Intro to Phrack INC 35
phrack35.2 phrack35.2 Phrack Loopback
phrack35.3 phrack35.3 Phrack Prophile of Chris Groggans
phrack35.4 phrack35.4 Telenet/Sprintnet's PCP Outdial Directory
phrack35.5 phrack35.5 Sting Operations
phrack35.6 phrack35.6 Social Security Numbers & Privacy
phrack35.7 phrack35.7 Users Guide to Vax/Vms Part 1 of 3
phrack35.8 phrack35.8 Beginners Guide to Novell Netware 386
phrack35.9 phrack35.9 Auto Answer Itk INC 35
phrack35.10 phrack35.10 PWN Part 1
phrack35.11 phrack35.11 PWN Part 2
phrack35.12 phrack35.12 PWN Part 3
phrack35.13 phrack35.13 PWN Part 4
;
; Volume Three, Issue 34
;
phrack34.1 phrack34.1 Intro to Phrack INC 34
phrack34.2 phrack34.2 Phrack Loopback
phrack34.3 phrack34.3 Phrack Prophile on Disk Jockey
phrack34.4 phrack34.4 The AT&T Mail Gateway
phrack34.5 phrack34.5 The Complete Guide to Hacking WWIV
phrack34.6 phrack34.6 Hacking Voice Mail Systems
phrack34.7 phrack34.7 An Introduction to Milnet
phrack34.8 phrack34.8 TCP/IP Tutorial Part 2
phrack34.9 phrack34.9 Adv. Modem Oriented BBS Security
phrack34.10 phrack34.10 PWN Part 1
phrack34.11 phrack34.11 PWN Part 2
;
; Volume Three, Issue 33 (& 33c Classic)
;
phrack33.1 phrack33.1 Intro to PHRACK INC 33
phrack33.2 phrack33.2 Phrack Prophile on Shooting Shark
phrack33.3 phrack33.3 Hackers Guide to Internet
phrack33.4 phrack33.4 FEDIX Online Info Service
phrack33.5 phrack33.5 Lata Reference List
phrack33.6 phrack33.6 Int'l Toll Free Code List
phrack33.7 phrack33.7 Phreaking in Germany
phrack33.8 phrack33.8 TCP/IP A Tutorial Pt 1 of 2
phrack33.9 phrack33.9 Functioning Red Box Schematics
phrack33.10 phrack33.10 PWN Special Edition IV (Cyberview 91)
phrack33.11 phrack33.11 PWN Part 1
phrack33.12 phrack33.12 PWN Part 2
phrack33.13 phrack33.13 PWN Part 3
;
phrack33.1c phrack33.1c Intro to PHRACK CLASSIC 33
phrack33.2c phrack33.2c Spotlight on Shooting Shark
phrack33.3c phrack33.3c How to Access Bankrupcy Information
phrack33.4c phrack33.4c LOD/H and the Occult
phrack33.5c phrack33.5c A Hackers Guide to the Internet
phrack33.6c phrack33.6c Social Security Numbers
phrack33.7c phrack33.7c FEDIX Online Info Service
phrack33.8c phrack33.8c Toll Fraud
phrack33.9c phrack33.9c Knight Line Part 1
phrack33.10c phrack33.10c Knight Line Part 2NC 33
;
; Volume Three, Issue 32
;
phrack32.1 phrack32.1 Phrack Classic XXXII Index
phrack32.2 phrack32.2 Phrack Classic Spotlight on Knight Lightning
phrack32.3 phrack32.3 Concerning Hackers Who Break Into Systems
phrack32.4 phrack32.4 The Art of Investigation
phrack32.5 phrack32.5 Unix Nasties
phrack32.6 phrack32.6 Automatic Teller Machine Cards
phrack32.7 phrack32.7 A Trip to the NCSC
phrack32.8 phrack32.8 Inside the SYSUAF.DAT File
phrack32.9 phrack32.9 RSTS Systems
phrack32.10 phrack32.10 Knight Line Part 1
phrack32.11 phrack32.11 Knight Line Part 2
phrack32.12 phrack32.11 Knight Line Part 3
;
; Volume Three, Issue 31
phrack31.1 phrack31.1 Phrack Classic XXXI (Index)
phrack31.2 phrack31.2 Phrack Prophile on Markus Hess
phrack31.3 phrack31.3 Hacking Rolm's CBXII
phrack31.4 phrack31.4 Tams and Telenet Security
phrack31.5 phrack31.5 The History of the Legion of Doom
phrack31.6 phrack31.6 Cosmos Overview
phrack31.7 phrack31.7 Tymenet Security Memo
phrack31.8 phrack31.8 PWN Part 1
phrack31.9 phrack31.9 PWN Part 2
phrack31.10 phrack31.10 PWN Part 3
;
; Volume Three, Issue 30
;
ph301.txt ph301.txt Intro to Phrack INC 30 (Index)
ph302.txt ph302.txt Network Miscellany III
ph303.txt ph303.txt Hacking & Tymenet
ph304.txt ph304.txt Hacking VM/CMS
ph305.txt ph305.txt The DECWRL Gateway
ph306.txt ph306.txt Decnet Hackola:Remote Tourist
ph307.txt ph307.txt VAX/VMS Fakemail
ph308.txt ph308.txt Concesual Realities in Cyberspace
ph309.txt ph309.txt The Truth About Lie Detectors
ph3010.txt ph3010.txt Western Union Telex,TWX,Time Ser.
ph3011.txt ph3011.txt Phrack World News XXX Pt.1
ph3012.txt ph3012.txt Phrack World News XXX Pt.2
;
; Volume Three, Issue 29
;
phrack29.1 phrack29.1 Intro to Phrack INC 29 (Index)
phrack29.2 phrack29.2 Prophile XXIX on Emmanuel Goldstein
phrack29.3 phrack29.3 Intro to Internet Protocols Pt.2
phrack29.5 phrack29.4 Covert Routing Paths
phrack29.6 phrack29.6 Banking Information
phrack29.7 phrack29.7 Electronic Fund Transfers
phrack29.8 phrack29.8 Evasdropping Myths & Realities
phrack29.9 phrack29.9 Blocking Long Distance Calls
phrack29.10 phrack29.10 Phrack World News XXIX Pt.1
phrack29.11 phrack29.11 Phrack World News XXIX Pt.2
phrack29.12 phrack29.12 Phrack World News XXIX Pt.3
;
; Volume Three, Issue 28
;
phrack28.1 phrack28.1 Intro to Phrack INC 28 (Index)
phrack28.2 phrack28.2 Profile-Eric Bloodaxe
phrack28.3 phrack28.3 Introduction to Internet Protocols
phrack28.4 phrack28.4 Network Miscellany
phrack28.5 phrack28.5 Functioning Pearl Box Schematics
phrack28.6 phrack28.6 Snarfing Remote Network Files
phrack28.7 phrack28.7 Other Common Carriers Listing
phrack28.8 phrack28.8 The Hackers Behind The Handles
phrack28.9 phrack28.9 Phrack World News XXVII Part 1
phrack28.10 phrack28.10 Phrack World News XXVII Part 2
phrack28.11 phrack28.11 Phrack World News XXVII Part 3
phrack28.12 phrack28.12 Phrack World News XXVII Part 4
;
; Volume Three, Issue 27
;
phrack27.1 phrack27.1 Intro to Phrack INC 27 (Index)
phrack27.2 phrack27.2 Operating the IBM VM/SP CP
phrack27.3 phrack27.3 Introduction To MIDNET
phrack27.4 phrack27.4 Datex-P / X.25 NUA Directory
phrack27.5 phrack27.5 Cosmos Operations Part 2
phrack27.6 phrack27.6 Looking Around In DECnet
phrack27.7 phrack27.7 The Making of a Hacker
phrack27.8 phrack27.8 Sending Fake Mail Via UNIX
phrack27.9 phrack27.9 The U.S. Postal Inspection Ser.
phrack27.10 phrack27.10 Phrack World News Part 1
phrack27.11 phrack27.11 Phrack World News Part 2
phrack27.12 phrack27.12 Phrack World News Part 3
;
; Volume Three, Issue 26
;
phrk26_1.txt phrk26_1.txt Intro to Phrack INC 26 (Index)
phrk26_2.txt phrk26_2.txt Computer Based Sys for Bell Operation
phrk26_3.txt phrk26_3.txt Gettin Caught - Legal Proceedures
phrk26_4.txt phrk26_4.txt NSFnet: National Science Foundation
phrk26_5.txt phrk26_5.txt Cosmos: Part One
phrk26_6.txt phrk26_6.txt Basic Concepts In Translation
phrk26_7.txt phrk26_7.txt Phone Bugging-Telco Underground Business
;
; Volume Three Issue 25
;
phrack25.1 phrack25.1 Intro to Phrack INC 25 (Index)
phrack25.2 phrack25.2 Anniversary Index of Past Issues
phrack25.3 phrack25.3 Bell Network Switching Systems
phrack25.4 phrack25.4 SPAN: Space Physics Analysis Network
phrack25.5 phrack25.5 Unix Hacking Tips
phrack25.6 phrack25.6 Hiding Out Under Unix
phrack25.7 phrack25.7 The Blue Box & Ma Bell
phrack25.8 phrack25.8 Hacking: Whats Legal Whats Not
phrack25.9 phrack25.9 Phrack World News XXV Part 1
phrack25.10 phrack25.10 Phrack World News XXV Part 2
phrack25.11 phrack25.11 Phrack World News XXV Part 3