26008586.txt 22884 Excerpts from Various Issues of 2600 Magazine, by The Fixer
2600bust.txt 8003 Hackers Allege Harassment at the mall, by Robert O'Harrow Jr.
2600dcr1.txt 8042 Reports of "Raid" on 2600 Washington Meeting 11/09/92
2600dcr2.txt 4614 Secret Service Role Questioned in "2600 Washington Raid" 11/10/92
2600dcr3.txt 4540 Conflicting Stories in 2600 Raid 11/11/92
ab2.txt 10496 ANSI Bombs II: Tips and Techniques by
about.top 2366 The History of Tired of Protection (TOP)
abstract.hac 106187 VERY Large list of Abstracts on Computer Crime in various publications
abstract.txt 106187 Abstracts of Various Computer Security Articles
abusebbsdoc.hac 10883 The Best Ways to Abuse BBSes, by The Joker
abuser.txt 10734 The Best Ways to Abuse A BBS: The BBS Abuse Handbook
acadia 15060 The A.U.C.C. Acadia Computer Terms of Use Policy
accesblt.hac 20551 Advanced Authentication Technology, 1991
accounts.vax 5772 Accounts to try if you wanna enter into a VAX/VMS
adssys.hac 9954 A Guide to ADS Systems, by Lord Digital
adssys.txt 10048 A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
advanceddoc.hac 9278 Real Credit Card Fraud, by Emergency Interrupt
aicard.hac 7630 Careful Carding, by One-Eyed Willie
aix.fun 778 Warning to download some AIX Patches
anrky07.txt 5334 JACKPOTTING: What is it? by The Prowler
anrky07doc.hac 5334 Jackpotting: What Is It?
ansibomb.cap 8258 The Ansi Bomb FAQ v0.4 by Jason Livingston, 05/11/1995
apinews1.txt 7208 A.P.I: American Pirate Industries Volume 1, July 1989
apinews2.txt 5724 API: American Pirate Newsletter Issue #2
applenet.ana 3264 How to have Fun with Apple-Net BBSes
aqua.hac 7188 Escaping the Lock-In Trace
arpa1.hac 7040 Hacking Arpanet Part I: By The Source
arpa2.hac 12160 Hacking Arpanet Part II
arpa3.hac 7552 Hacking Arpanet Part III
arpa4.hac 4608 Hacking Arpanet Part IV
arpa5.hac 8064 Hacking Arpanet Part V
arpa6.hac 13824 Hacking Arpanet Part VI
arpanet.hac 4439 Screwing around with Arpanet, by Hackman
arpanet.txt 4736 Attacking Arpanet by the Hackman of Hollow Hills
arpanet1.doc 6975 hacking ARPANET Part 1: By The Source of The Listening Post
arpanet1.txt 14470 Hacking Arpanet: part I, by The Source of The Listening Post
arpanet2.doc 8889 Hacking ARPANET Part II by The Source
arpanet2.txt 11615 Hacking Arpanet Part II by The Source of The Listening Post
arpanet3.txt 7449 Hacking ARPAnet Part 3 by The Source
arpanet4.txt 4957 Hacking Arpanet Volume 4 by The Wyvern
arpanet5.txt 7942 Hacking Arpanet Part V by The Source
arpanet6.txt 6410 Hacking Arpanet Part 6 by The Source
arpanet_.txt 7369 Hacking Arpanet Part III by The Source
arrest.txt 4024 Getting Busted: An Experience and a Warning
as400cmd.hac 27788 IBM AS/400 Command Summary
aspen1.hac 16843 A Complete Guide To Hacking and Use of ASpEN Voice Mail, by Caveman
aspen2.hac 10902 A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems: Part II, by Caveman
atlas.txt 4938 Hackers' Atlas, by Ragon/Wynvern/BOF
atm-92.txt 20096 ATMS: The Real File for ATM Theft in 1992, by The Raven
atm-more.txt 20049 Discussions about ATM Passwords
atm.txt 8167 A. T. M. Fraud Made Easy by Count Zero
atm_92.hac 19991 The High Tech Hood Squad Presents: How to Rip off ATMs
atma.hac 22036 Quick OVerview of ATM Security (Needs Editing)
atms.txt 20384 Track Layouts on ATM Cards
atmsdoc.ana 20250 Incomplete file about ATM Cards
austhack.hac 7324 Australian Dialups
autonet1.txt 11411 Hacker Supreme's - Hackers Directory Volume # 34
autotelldoc.ana 5439 Fun with Automatic Tellers
autovon1.hac 2230 Introduction to the Automated Voice Network (Autovon) by Shadowrunner
autovon2.hac 3387 Introduction to the Automated Voice Network (Autovon) Part II
autovon3.hac 1809 Introduction to the Automated Voice Network (Autovon) Part III
avoidcap.doc 2576 Planning Ahead for Phone Phreaks/Hackers
bankhack.txt 12641 The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
basic.net 14775 Basic Networking, by Sk8 the Skinhead
basic1.hac 7491 The Basics of Hacking I: DECs By the Knights of Shadow
basic2.hac 7275 The Basics of Hacking II: VAXes By the Knights of Shadow
basic3.hac 4349 The Basics of Hacking III: Data General By the Knights of Shadow
basicnet.hac 14534 Basic Networking (1989) by Sk8 The SkinHead
basunix.hac 15360 Basic UNIX Use by Lord Lawless
batdis.txt 7871 Computer Terror and Destruction Issue #1: BBS Infiltration
baylor 4530 Computer Policies at Baylor University
bbsenter.hac 3940 BBS Crashing Techniques, by Mr. Memorex
bbsfiles.txt 38272 The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
bctj1_04.txt 7457 Ethernet Firlds
begin.txt 85336 UNIX For Beginners Second Edition, by Brian W. Kernighan
bellhell1.hac 10764 Bell Hell Volume #1 By The Dutchman
bellhell2.hac 16630 Bell Hell Volume #2 By The Dutchman
bellsec.hac 2482 Anecdotal Mention of Bell Telephone's Special Ivestigation Force
berkly42.hac 14105 The Security Side of UNIX, "Patched Together" by The War
bestunix.hac 7476 My Favourite UNIX Commands, By ZeeBee Australia Inc. 1990
betunix.txt 9517 Gaining Better Access On Any Unix System, by Doctor Dissector
bgm_pns.hac 29467 Mish-Mash of Files (Should Probably be split up at some point)
bhacking.hac 5898 A Beginners Guide to Hacking UNIX, by Jester Sluggo
bitnet 2474 Usage Guidelines for BITNET
blt12 1280 BBSes Operated by Organizations of the Federal Government
board.des 3072 What to Do with a Hacked Apple BBS, by Doctor Crunch
boarddes.ana 3072 Incomplete file on destroying Apple BBSs, by Doctor Crunch
boces.txt 6957 The Slipped Disk takes over the BOCES Computer: A Log
bootl-6.hac 102420 Bootlegger Magazine Excerpts (Apple II Stuff)
bostonu 4891 Conditions of Use and Policy on Computing Ethics at Boston University, September 1, 1988
breakbbs 4425 What to Do When You Break Into a BBS, by Doctor Crunch
breinhar.txt 37427 White Paper on UNIX Security Issues, by Robert B. Reinhardt, November 11, 1992
bugging.hac 7135 Bugging I: By Brew Associates
bumpbeep.hac 3797 "Bumper Beepers".....by The Mad Phone-man
c101-90.000 3938 Cracking 101: 1990 Edition by Buckaroo Banzai
c101-90.002 31676 Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 2)
c101-90.003 15105 Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 3)
c101-90.004 56228 Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 4)
c64fun1.txt 2927 Suggestions On What to Do with a Commodore 64, by Nightstalker
cable.ana 1981 Cable Descrambling, by Robin Hood
cable1.hac 1991 Cable Companies Responsible for Cable Theft
cable2.hac 8075 The SSAVI Cable Scrambling System
cable3.hac 4611 Cable TV Scrambling Techniques
cables.hac 21419 Cable TV Pirating, by Logic God
callcard.phk 1734 Hacking Calling Cards, by The Pyromaniac
candyland.faq 4823 The Candyman Explains How He Will Accept Explosives Files
carcodes.txt 3358 Codes Used by Computers in Cars
card90rl.hac 7060 Carding in the 90's, by The Knight
cardchk.hac 922 Credit Check information
carding.txt 4669 The Basics of Carding by the Metallian of Metal Communications
cbi-rl 23705 CBI General Information Text by Spiritwalker of Renegade Legion
cbi.hac 23689 CBI General Information Text, by Spiritwalker
cbi.txt 14615 Hacking CBI Accounts, by The Ghost of the Panther Modernz
cbi4rl.hac 21842 CBI General Information Text #4 by SpiritWalker
cbidoc.hac 3154 How to Logon a CBI System, by L.E. Pirate
cbiman.txt 44915 The Complete CBI Manual of Operations
cbrsp-1.hac 6075 The Cyberspace Chronicle Volume 1 by Phardak
ccbanks.hac 10195 Credit Card Number Prefixes and the Associated Banks
ccc_2.txt 150491 The Beginner's Guide to VAX/VMS Hacking by Corrupt Computing Canada
ccnumberdoc.hac 2067 Bank Card Formats
ccs.hac 8049 Credit Carding Made Easy by David Lightman
cdugd-101.hac 3197 Computer Down-Under-Ground Digest. Volume 1, Number 1.
cdugd-102.hac 16888 Computer Down-Under-Ground Digest. Volume 1, Number 2.
cdugd-103.hac 56293 Computer Down-Under-Ground Digest. Volume 1, Number 3.
chaos01.txt 1609 The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
chaos02.txt 2577 The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
chaos03.txt 4264 The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
china02doc.hac 23257 China Newsletter #02 (Hacking/Phreaking File Compilation)
chna2-3.hac 9473 CHiNA Educational InfoFile Series II, # 3
church4.ptl 9611 Church Chat Volume 4 by The Spiker
citibank.txt 6226 Hacking into Citibank with Johnny Hindu
cmbkeyrl 8864 The RL Masterkey File by the Gypsy
cocots40.hac 16875 Renegade Legion Technical Report #2: COCOTS, by Count Zero
codehack 5693 What to Look for in a Code Hacking Program by Dissident
codehack.hac 5693 What To Look For In A Code Hacking Program, by Dissident
codphone 3842 Coda-Phones by D.T. Legna
colgateu 8632 Colgate University Academic Computer Center Agreement for Use of Computing Facilities
columbia 4963 Columbia University Computer Use Policies
column01.nws 7952 The Sixth Column by Lestat De Lioncourt
com_sec90.hac 54579 United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact
com_sec91.hac 15590 United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems
compuser.txt 27008 A Quick Compuserve Index
compusrv 5599 Compuserve Hacking by The Locksmith
contact.txt 5246 How to Contact the HACK SQUAD
coolhand.hac 3301 Coolhand Luke explains what is happening with TNSHB TGR
copier.hac 10206 Magnetic Stripes, by Count Zero
cops-rl 23583 RL C.O.P.S. File by Brian Oblivion
copyprot.pro 11218 Copy Protection, a History and Overview
copyprot.txt 11735 Cracking on the IBMpc Part I by Buckaroo Banzai/Reset Vector
corrupt.inf 5695 Introduction to the Corrupt Security BBS
corruptinf.hac 5695 Corrupt Security BBS Introduces Itself
cosmos.hac 10942 C O S M O S, by Doctor Who
cosmos1.txt 7458 Hacking into COSMOS by Wizard of OZ
cosmos2.hac 9608 Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
cosmos3.hac 8320 The 1986 COSMOS Files Part III by Sir William
courier.txt 6025 You Hack 'Em, We Hump 'Em, or Why YOU should be a Software Courier, by Dixie Flatline
crack.txt 90759 The Cracking Manual, written by the Cyborg - April 3, 1992
crack1.txt 7850 Buckaroo Banzai Presents Cracking on the IBM PC Part 1
crackam1.txt 63466 Hacking Programs on the Amiga by FunToHack
crackam2.txt 29030 Cracking the Amiga Part II
cracking.txt 6801 Cracking the Universal Product Code, by Count Nibble
crackingdoc.hac 6794 Cracking the Universal Product Code by Count Nibble
crackist.hac 63158 The Amateur Crackist Tutorial by Specular Vision (Version 1.3)
crak1.txt 15364 How to Crack by Charles Petzold
crak2.txt 22182 Examples of IBM PC Cracks: MEan-18 Golf by Accolade
crak4.txt 11608 Chapter 4: Cracking a Self-Booter
crash.hac 13056 Three different files on crashing FidoNet, Net-Works, and GBBS.
crashae.hac 1495 Crashing AE Lines, by Delta Master
crashc.hac 7629 How to Crash a C-Net BBS Part II, by Ditto
crashcom.hac 4903 How to Crash a Commodore BBS by The Highwayman
crashcom.txt 5949 How to Crash a Commodore BBS, by The Highwayman of Chaotic Computing
crashem.ana 8884 What to Do when you Break into a BBS, by Dr. Crunch
crdtcarddoc.hac 17961 Volume I of The Adventures in Fraud Series by Sneak Thief/Credit Card Fraud Ideas by L.E. Pirate
credit.hac 4493 CC Validation Center Information
credit1.hac 10855 David Lightman presents Credit Carding Part 1: The Card
credit2.ana 7514 Credit Cards II: Getting the Cards, by The Administration
credit2.hac 7677 David Lightman presents Credit Carding Part 2: Getting The Cards
credit3.ana 5949 Credit Cards III: The Dropsite, by The Administration
credit3.hac 6035 David Lightman presents Credit Carding Part 3: The Dropsite
creditcadoc.hac 17382 Credit Carding from Dreamscape BBS
crime.doc 26658 The Grolier Electronic Encyclopedia Definition of Crime
crime.hac 12567 Is there Computer Crime, and what are the results?
crkibms2.hac 3465 Cracking on the IBM PC Part II
crkibmsw.hac 7479 Cracking on the IBM PC Part I
crshgbbs 3770 How to Crash GBBS II Boards
crshgbbs.hac 3770 How to Crash GBBS II Boards
crshnw.txt 10752 Crashing Networks, the Causes and Prevention, by the Oracle of Delos
crshrbbs.hac 3712 How to destroy an RBBS System
cs.hac 2815 How to Get a Free Account on Compuserve
cs.txt 2944 How to Get a Free Compuserve Account
csl8_93.hac 12359 CSL Bulletin 1993
cusass.hac 3520 CNA by The Master
danwebst 4463 Daniel Webster University Policy for Computer Usage
dartkiew.hac 20480 Dartmouth Kiewit System by The Lone Ranger
data_gen 1574 Captain Crunch talks about hacking Data General Systems
datakit.hac 14409 How to connect across VCS/ISN boundaries
datapac.hac 15579 A Guide to DataPAC by The Fixer
datapac1.txt 16626 A Guide to DataPAC version 1.1 by The Fixer
datapac2.txt 19480 Datapac 3101 ITI Parameters Description
datapac3.txt 2430 Datapac 3101 Public Outdial Ports
datatapp.txt 4088 Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
ddn01.hac 2993 Defense Data Network Security Bulletin #1
ddn03.hac 11207 Defense Data Network Security Bulletin #3
ddn04.hac 3143 Defense Data Network Security Bulletin #4
ddn05.hac 4295 Defense Data Network Security Bulletin #5
ddn06.hac 3015 Defense Data Network Security Bulletin #6
dec10.txt 23846 Hacking the DEC-10 System
defaults.txt 6726 Hacking into a Variety of Systems by using their Default Accounts
defdb.hac 77311 Department of Defense Federal Data Bases (List)
defense 10694 Defense Data Network Blues by Harry Hackalot
defense.hac 10447 Defense Data Network Blues by Harry Hackalot
defensed.txt 10628 Defense Data Network Blues by The Baud Baron and The Federation
denning 59865 Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning
desval.hac 3149 DES Validation List
dialoutslst.hac 29446 (I)nter(N)et->(T)ym(N)et List Version 1.0 - January 1991 -
dialup.hac 18816 List of Dialups. For what? I have no idea.
dirfind.txt 4242 Newbie Tips: (Changing to / Hidden Directories) 1.1
dirty 40215 THE DIRTY DOZEN -- An Uploaded Program Alert List Issue #6: September 5th, 1986 by Eric Newhouse
disaster.!!! 6975 Extremely Long File About Why they're Not a Pirate BBS
diskopt 6706 My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
dlog-rdt 44883 Complete Guide To The DIALOG Information Network by Brian oblivion
dnicinf.hac 13312 D A T E X - P - International Traffic Relations
dodontae.hum 9385 The Do's and Dont's of ASCII Express by Quasimoto
dowjones.txt 2570 Inside Dow Jones News Service
downrsts.phk 4038 So You've Decided to Down an RSTS System
dtsb.hac 8894 DEC Terminal Server Basics by Mad Hacker
duran.txt 1392 "The Password" to the tune of "The Reflex" by the Slipped Disk
easyl.hac 3968 Hacking Easy Link I by Professor Falken
eel-bye.hac 7246 The Eel Quits Pirating and Says Goodbye
eel_bye.txt 7680 Is it Worth The Trouble? (The Eel's Farewell Address) (Piracy)
elite.acc 37356 A somewhat serious attempt by LOD to explain what the phrase "Elite" truly means and how to achieve it
elite.cmd 5946 The Commandments of Eliteness
elites.lst 24886 International Elite BBS List
elites.txt 3113 Someone who is VERY Angry about the Eliteness of a BBS
emc.nfo 2953 Applying to Join the Elite Mafia Against Copyright
ena!.hac 7877 The ENA Vision: What IS Ena?
encyclop.txt 1502 Someone Makes fun of That Stupid Article
eproms.hac 5566 A Closer Look at EEPROMS by The Kingpin
ethics.hac 3692 Newsweek: Teaching Hackers Ethics
ethics.txt 5148 The Ethics of Hacking by Dissident
ethicsdoc.hac 5148 The Ethics of Hacking by Dissident
exeguide.hac 23551 Executive Guide to the Protection of Information Resources by NIST
fast.txt 5301 Hacking McDonalds, by Herb the Hacker
fbiaftha.hac 16896 The FBI Fights Computer Crime
fbicompu.hac 5225 Summary of FBI Computer Systems, by Ralph Harvey
fbisys.txt 5281 Conspiracy Theory Conference: Summary of FBI Computer Systems, by Ralph Harvey
fcscvol1.hac 641496 Federal Criteria for Information Technology Security Volume I
fcscvol2.hac 566236 Federal Criteria for Information Technology Security Volume II
fdp1.txt 12668 The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
fdp2.txt 13449 The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
forum.hac 7012 Crashing Forum Boards by Panther Man
freebie3.hac 103246 Compufreebies 3.1 (1992)
freecis.txt 3278 Free Compuserve Access
freemail.hac 5909 Free Mail! From THUMPR
fruquenc.hac 9390 The Idiot's Guide to Freqing.
funwith5.hac 5437 Fun With Automatic Tellers
gcs.hac 8192 Government Computer Security Techniques, by The Line Breaker
gisdoc.hac 5966 Hacking the GIS computer by Doctor Crash
goodbye.ana 1796 The Best of the Station, by The Prowler
goodkids.hac 4548 Computer Hackers are Good People Too!
govthlp.txt 4106 The Help Screen on some Government System
gs1.txt 16195 The GS/1 User's Guide by Doctor Dissector
gte.hac 19883 Hacking GTE Telemail by Mister Micro
guide.doc 5437 The RSTS/E Hacker's Guide by The Flash
guide.txt 42423 A Novice's Guide to Hacking- 1989 edition by The Mentor
guidedoc.hac 5437 The RSTS User's Guide, by The Flash
hacethic.txt 6161 The Ethics of Hacking by Dissident
hack-pcb.txt 3744 A Simple Way to Hack Around PC-BOARD And Succeed by Sniper
hack.hac 4096 Hacking And Computer Krashing #9, by Gray Wolf
hack.leg 11978 A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)
hack1.hac 7960 The Basics of Hacking, by the Knights of Shadow (Intro)
hack2.hac 7450 The Basics of Hacking, by The Knights of Shadow (DECs)
hack3.hac 7198 The Basics of Hacking, by The Knights of Shadow (VAXs/UNIX)
hack4.hac 4421 The Basics of Hacking, by The Knights of Shadow (Data General)
hack5.hac 5761 Hacking McDonalds, by Herb of Burger King
hack6.hac 5241 Hacking Voice Mail Systems
hack7.hac 5417 Hacking the Compuserve Infomation Service
hack9.hac 10950 Hacking Control Data Corporation's Cyber
hack_cis.txt 13288 The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991
hack_em.hac 26119 The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
hackacr.hac 59638 The Hackers Acronym Chart, compiled by IIRG
hackcabl.txt 2973 The Hacker's Guide to Cable TV: San Francisco Viacom
hackdict.txt 872346 The Hacker's Dictionary, Older Version, Uncredited!
hacker.tst 21534 The Hacker's Purity Test, June 16, 1989
hacker01.txt 152594 The Social Organization of the Computer Underground: A Thesis
hacker03.txt 4931 The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
hacker1.txt 19996 Diary of a Hacker
hacker11.txt 2403 Hacking Western Union's Easylink
hackfaq.hac 106724 FAQ to #hack IRC Channel, Beta .007
hackhp2.hac 15991 Hacking the HP 2000 by Bioc Agent 003
hacking 1676 Description of the New, Bad Definition of Hacking
hacking.txt 30670 The 408 Alliance Presents TRW Information File #5, by Type A Maniac
hacking101.hac 3367 HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
hackinga.txt 5856 Hacking Bank Of America's Home Banking System by Dark Creaper
hackingcdoc.hac 3531 Hacking Credit Card Codes by Omni-Kid
hackinge.txt 2881 Hacking ECONet Systems by Jack Death and Zapper
hackingi.txt 759 Computerworld Asks People to Hack In, 1984
hackingt.txt 1311 Hacking the Lexington Air Force Computer
hackingv.txt 6324 Inside VAX/VMS, by master BLaster
hackmast.hac 4398 HackMaster BBS Listing Summer 1992
hackpcp.hac 8519 The Weenie Warriors present Hacking PC Pursuit Codes
hackprof.txt 2276 Hacker Proof Doors! It IS Possible!
hacksynd.hac 7296 The Hackers Syndrome, by Tad Deriso
hacktalk.txt 10240 A Short Hackerspeak Glossary, by the Hollywood User Group
hacktips.hac 3392 Hacking Tips #2, by Hoe Hopper
hacktips.txt 5625 Tips for Tracking Hackers
hacktrw.hac 2706 An Experienced Hacker's Guide to Hacking TRW, by Minotaur
hackunlm.hu1 144657 Hackers Unlimited Magazine Volume 1 Issue 1
hackunlmhu1.hac 144657 The Mickey Mouse Club Presents Hackers Unlimited Volume 1
hackusa!.hac 7666 Hackin' USA
hackwarn.hac 5735 A Warning to Hackers
hackwwiv.hac 7679 Hacking into WWIV, Second Edition by Vision
hakdic.txt 231108 The Hacker's Dictionary, A Guide to the World of Computer Wizards
haklist.bbs 5172 A Selection of Hacking BBS's, circa 1986
hakmedia.txt 1771 Hackers in the Media, List start: 10/28/92 - Doomsday
hckr_hnd.txt 138752 The Hacker's Handbook, by Hugo Cornwall, 1985
hd01.hac 16446 Hackers Directory Volume #1 by Ninja Squirrel and Logan5
hd01.txt 16446 Hackers Diretory Volume #1 by Ninja Squirrel and Logan5
hd02.hac 13873 Hackers Directory Volume #2 by Ninja Squirrel and Logan5
hd02.txt 13873 Hacker's Directory Volume 2 by Hacker Supreme, The Cartel and NIN Temple
hd03.hac 16634 Hackers Directory Volume #3 by Ninja Squirrel and Logan5
hd03.txt 16634 Hacker's Directory Volume 3
hd04.hac 11329 Hackers Directory Volume #4 by Ninja Squirrel and Logan5
hd04.txt 11329 Hacker's Directory Volume 4
hhackin4 14917 Hacking the Oxgate Public Bulletin Board System by The 0mega & Lord Vision
hhacking.iix 5504 CAT-HACK Volume 1 from The Mystery
hide.hac 4486 UNIX Abuse Collection, by ZeeBee Australia
hoho93cz.hac 13356 The Exploits at HoHoCon 1993 by Count Zero
homebank.hac 6056 Hacking Bank Of America's Home Banking System by "Dark Creaper"
how2bgod.txt 6079 How to Be God Book II by Rusty Nail, Flat Tire, Jim
how2dotv.txt 4696 A One Minute Course on How to Do TV, by Richard Freeman
howtocp2 3702 IBM Disk Cracking Made Simple by Phobos
hp20001.hac 12800 HP 2000 Part 1: Commands by Blitzoid and Galactus
hp20002.hac 15744 HP 2000 Part 2: Statements by Blitzoid and Galactus
hp20003.hac 9344 HP 2000 Part 3: Functions by Blitzoid and Galactus
hp20004.hac 5376 HP 2000 Part 4: Files by Blitzoid and Galactus
hp20005.hac 5120 Hp 2000 Part 5: Matracies by Blitzoid and Galactus
hp30.txt 116232 The Completel Hewlett Packard 3000 Hackers Guide
hp3000.hac 10319 The Complete Hewlett Packard 3000 Hackers Guide
hp3000_t.hac 14354 Hacking the HP 3000 by DE BUG
huv1-21st.hac 76441 The Mickey Mouse Club Presents Hackers Unlimited Volume 2 Part 1
huv1-22nd.hac 6410 The Mickey Mouse Club Presents Hackers Unlimited Volume 2 Part 2
ibm-keys.txt 2435 The IBM PC Special Characters
ibm370.hac 2688 How to Take Control of your Local IBM 370 by Another Hacker
ibmhack.hac 2686 Hacking the I.B.M. By John Doe
ibmrules.hac 1365 There are rules for driving a Computer, Too!
id-biz.txt 2850 How to Have a Profitable ID Business, by Mr. Puff n' Stuff
idiots.txt 4480 What Idiots Do, by The Blade, of the Neon Knights
iirgacr8.txt 79728 The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
illinet.txt 20430 Dial-Up Access Numbers for ILLINET Online
info0.hac 18432 The IBM Bust of 612 By Professor Falken
info3.gph 4352 How to Get Anything on Anybody Part III
infoam.txt 51393 Exploring Information-America by Omega and White Knight
informer.hac 17320 TRI : The Remote Informer, Volume 1, Issue #6
innercir.hac 9856 Hacking Techniques, Typed in by Logan5 from The Inner Circle
insan#4.txt 9285 'Lamer Pirate Magazines, Etc... by the Grim Reaper
intercep.hac 10746 The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
interlaw.rpt 23809 Term Paper on Internation Relations, and the Extradition of Nazi Crominals
internet.hac 49024 A Hacker's Guide to the Internet, by Gatsby 1991
inttel.hac 1728 European Computers List #1 by Kerrang Khan
ipd.hac 2004 Countries connected to the International Packet Switching Stream by The Force
irchack.hac 14381 Hacking IRC the Definitive Guide
is01npasis.hac 109934 International NPA/City Code Listing w/Zone Info from Aeon Flux
is02cardis.ana 10467 Information Society: Carding in the 90's
issm201.hac 32229 The Information Systems Security Monitor Volume 2 Number 1
issm202.hac 52667 The Information Systems Security Monitor Volume 2 Number 2
issm204.hac 28850 The Information Systems Security Monitor Volume 2 Number 4
issm301.hac 24356 The Information Systems Security Monitor Volume 3 Number 1
issm302.hac 23394 The Information Systems Security Monitor Volume 3 Number 2
issm303.hac 22981 The Information Systems Security Monitor Volume 3 Number 3
issm304.hac 30656 The Information Systems Security Monitor Volume 3 Number 4
itt.hac 5008 A NAPPA Profile on ITT, written by Blind Justice
jargon211.hac 1147413 The Jargon File, v.2.9.11, by Eric S. Raymond
jmadison 7962 James Madison University Draft Computer Ethics Statement
justice.txt 6510 Fucked Justice, by Dissident of the Esoteric Society
k00ld00d.txt 5069 The History of Real K-K00l D00Ds by The Edge
kansasst 6483 Kansas State University Ethical Computer Use Policies
kcah-1.hac 32102 KCAH Volume 1
kcah-2.hac 17440 KCAH Volume 2
kfyi-593.hac 91136 KFYI AM Radio 910 interviews Mind Rape and Merc
killbird2.ana 4096 How to Crash a BBS Part II by Grim Reaper
killtlgd.txt 4805 How To Crash a Telegard BBS by The Crypt Keeper
kooldoo3.txt 3961 K-K00L D00Ds Part III, by Radioactive Snail
kooldoo4.txt 8409 K-K00L D00Ds Volume 4, by The Radioactive Snail
krack.txt 20352 Piracy By Teachers?
lasthack.txt 23637 2084: A Phone Odyssey by Maxwell Smart and The Baron
leechesd.txt 10650 The Leech Dictionary by the Blue Buccaneer
legal.gwn 15420 Some of the Legal aspects of Piracy
legalgwn.hac 15420 Bob MacKenzie talks about legal archiving of your own software
lesbian.dic 20031 The LesBiGay and Transgender Glossary
license.asc 58618 The Guerilla Guide to Licensing Software
lnoise.hac 6020 Modem Noise Destroyer (Alpha Version)
lodcom.hac 51395 Lodcom Sample Messages Set #1, 4/20/93
lodhbasi.hac 42609 The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
lodtj5.hac 203351 The LOD Technical Journal Issue #5
logoncbi.txt 2949 How to Log into a C.B.I System by L.E. Pirate
loops 8483 Loops Explained, Author Unknown
loops_tx.hac 7723 Iceman's List of Loops and Diverters
lost01.hac 68449 Legion of Schram Today Newsletter #1
lost01.txt 68449 LOST: Legion of Schram oday Issue #1
lost02.hac 20927 Legion of Schram Today Newsletter #2
lost02.txt 20927 LOST: Legion of SCHRAM Today, Issue #2
lozerzon.txt 14016 The Loser Zone, by The Circle Spellbook
mailbox.hac 3368 Mailbox Systems: Your Link to the Underworld
main.fra 6763 Main Frames by the Pirate Club
makelsd.hac 2056 Making LSD
mcimail.hac 7772 MCI Mail - The Adventure Continues, by Bioc Agent
metaunix.hac 5970 A Beginner's Guide to Hacking Unix
mfraud.txt 37423 Mobile Fraud by the Video Vindicator
michstu 12699 College of Engineering at Michigan State University Computer Use Policy
mickeyd.txt 5145 Hacking McDonalds by Herb the Hacker
micrrisk.hac 63479 Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)
milinet.1 5564 Milnet Access Codes
milnet.txt 36799 How to Use the American Military Net
milnet1.hac 7765 Milnet, by Brigadier General Swipe
mism1.hac 11776 How to Get Anything on Anyone Excerpts
mism10.hac 2944 How to Get Anything on Anyone Excerpts
mism20.hac 3840 Mastering the SCANTRON by Warhead
mism42.hac 1024 Xerox Voice Message Exchange Commands, from The Lineman
mism49.hac 6400 preparation of Nitrous Oxide
mob.hac 8879 Hackers in the Mob
modemlif.hac 10818 The Modem Life: Is it Really Worth it? By The Nomad
morality.hac 2654 Hacker Morality: A Lesson
morestuf.txt 18930 Collection of Hacking Files (Should Eventually be Split up)
morprime.hac 10579 RVEC Parameters and DMSTK Format
mrsts.hac 5504 So you've finally decided to down an RSTS System?
mtempist.hac 10752 The Tempest Method of Data Interception (Needs Editing)
muh.hac 6400 A Beginner's Guide to Hacking UNIX By Jester Sluggo
must.see 1940 Tag for Rusty and Edie's BBS
mydaywss.txt 15383 My Day with the Secret Service Man, by The Incognito
ncsatelnpw.hac 4683 Eric thinks this new Cryptography scheme sucks
neidorfd.doc 3460 The Craig Neidorf Defense Fund Introduction
net-work.hac 4650 A Tutorial on How to Fuck Up Networks, by The Minuteman
net-work.txt 4825 A Tutorial On how to Fuck Up Net-Works, by The Minuteman, 3/26/1984
networks.phk 5522 2600: How to Send Mail to other Networks
newcastl 4236 University of New Castle Computing Use Policy
newid.hac 6543 New Identity Method
newmexst 8138 New Mexico State Univercity Computer Use Policy
newone.txt 34669 All Over the Place Document about Censorship, Hacking, Textfiles, etc.
nextbugs.txt 7878 CERT Advisory on the NeXT computer's Software
nighthak.txt 14774 The Night of the Hackers, by Richard Sandza
note9309.txt 1984 The Hack Report, by Lee Jackson (September 1993)
novell.hac 10516 Collection of security holes in Novell Netware
novhack.txt 9096 Having Phun with Novell by Lord Foul, 1991
novices.txt 43979 A Novice's Guide to Hacking- 1989 edition by the Mentor of Legion of Doom
ocfber.1 1394 Bylaws of the Open Computing Facility at UC Berkeley
ocfber.2 14491 Constitution for the Open Computing Facility at UC Berkeley
orange 328324 Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983
orgs.hac 8464 A Large List of Computer Security Organizations
outdialsnfo.hac 2652 List of Dialouts
pbust.txt 1280 Semi-Literate Account of the Busting on Two Portuguese Pirates
pbx.hac 6452 PBX's (Private Branch Exchanges) and WATS By Steve Dahl
pbx2.hac 5427 Understanding PBX's by Terminus
pcpursue.txt 238362 PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992
pdp11.hac 1920 Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
phreak1.hac 1636 Time Assignment Speech Interpolation (TASI) by Master Blaster
phreak3 6585 The Hacker's Handbook
phreak3.hac 6585 The Hacker's Handbook (Well, maybe the Hacker's Pamphlet)
piracy.asc 18560 What is Piracy? By Ron J. Goodman
pirate.ana 3444 A List of Ripped-Off "Freeware" (1985)
pirate.txt 2304 Some Pirate BBS Numbers
pirate1doc.hac 94272 PIRATE Volume #1 Issue #1
pirates2.txt 6066 The Real Pirates Guide Volume III V.2 Written by the Whip
plagmemb.txt 7449 The Official Plague Member's Handbook by Mad Hacker, 1990
policyasc.hac 20654 A Draft Security Policy by National Computer Security Association
ports.txt 1559 Some UNIX Ports and What to Do With Them
prime.hac 21725 A List of PRIME Commands
primecpl.hac 12018 An Introduction to PRIMOS CPL Directives by Necrovore
primos.hac 3968 Hacking Primos Systems By Nanuk of the North
pucc 11185 Statement of Policy on Use of Computing Center Facilities and Services
purdue 10026 Purdue University Computing Facilities Policy
qmaster.top 1518 Tired of Protection (TOP)'s Crack for Quest Master
ram1 4045 Hacking Rampart Systems Part 1
ram2 4058 Hacking Rampart Systems Part 1 (cont)
ram5 4022 Hacking Rampart Systems Part 2
ram6 861 Hacking Rampart Systems Part 2 (cont)
ramcomm.hac 185184 Hacking RAM Communications (Pager)
rampart1.hac 8448 Hacking Rampart Systems by Whackoland
rampart2.hac 4864 Hacking Rampart Systems by Whackoland Part II
rcaglobe.txt 3494 The RCA Network Part I by the Telex Troopers
real-ra.txt 12665 Why the "Fun with RA boards" hacking method is LAME (The REAL way to hack RemoteAccess) by ByTe RyDeR
realbust.hac 4049 NotSoHumble Babe got busted, and he says goodbye.
realgphi.txt 5892 The Official Guide to G-Phile Authors, by Man Tooth (Needs Formatting)
research.ppr 25263 Computer Hacking: A New Breed of Crime is Born, by Jon Hogg, May 17, 1991 (Research Paper)
response.txt 7842 A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
revblt.hac 13726 Review of Federal Agency Computer Security and Privacy Plans
riacs 5878 Principles of Responsible Use of RIACS Computing Facilities
rimeman.hac 52781 RIME User's Guide
risktool.hac 33991 Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)
rodapp.txt 1825 Application to Join the Riders of Death
rose_hul 4715 Rose-Hulman Institute of Technology Department of Computer Science Computer Use Policy
rrg-1.hac 5036 Rebel's Riting Guild Volume 001
rspwd.new 23723 Some Downloaded Password File
rsts.hac 5376 So You've Decided to Down a RSTS System, by Sam Sneed
rsts1.hac 6778 Hacking the RSTS/E System by The White Guardian
rsts2.hac 4516 Hacking the RSTS/E System by The Maurauder
rsts3.hac 8829 Hacking the RSTS/E System by The Maurauder (Volume III)
rsts4.hac 11880 Hacking the RSTS/E System by The Maurauder (Volume IV)
rsts_oz.hac 14028 Making the Most of RSTS/E Systems, by Captain Hack of Melbourne
rsx11.hac 18944 RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital
safepick.hac 4752 Opening Safes via the Sound Method, by Nick Fury
safesci.hac 10123 The Science of Opening Safes, by Eric the Red
safter.hac 18849 Sought After says goodbye to the scene at large
sanatmdoc.hac 6179 Getting into an ATM
saturday.txt 10485 What Leeches and Other Losers Do on Saturday Nights, by The Blue Buccaneer
secdoc.hac 156965 Improving the Security of your UNIX System, by David Curry
secrets1.hac 4840 Big Secrets Volume #1 by The Wyvern: Credit Cards and Lie Detectors
secrets2.hac 7733 Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office
secrets3.hac 4250 Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
secretsdoc.hac 233082 Young's Demonstrative Translation of Scientific Secrets (1861)
securdev.hac 8616 Technical Hacking: Volume One by The Warelock
securdev.txt 8616 Technical Hacking Volume 1 by the Warelock
security.fy8 259023 Site Security Handbook, 1991
security.txt 6184 Professor Falken's Guide to CODE Hacking Security
sendmail.fun 2313 A Little Sendmail Stuff, using the passwd file
sentence.hac 2057 Three from Legion of Doom Sentenced (Nov. 17)
sflvrs_h.ack 30285 A Beautiful Obsession with the Binary World by Steven Levy
sha.hac 83219 Swedish Hackers Association Annual Year Protocol #4
shadec.txt 14173 The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
shahewl.txt 3723 Swedish Hacking Association presents Hacking HP 3000 Part 1
sirsunix.hac 87805 UNIX: A Hacking Tutorial, by Sir Hackalot
sirsunix.txt 87805 UNIX : A Hacking Tutorial by Sir Hackalot
skyhack.hac 26525 The VideoCrypt System: An Overview, Researched and written by Darren Ingram
sn.hac 42692 Sprintnet U.S. Asynchronous Dial Service
sn.txt 42692 Sprintnet U.S. Asynchronous Dial Service
snoop.txt 4065 Data Snooping the Right Way by Lee Day
soda.txt 1635 How to Rip off a Soda Machine
sonicjam.hac 7821 Ultrasonic Ultra-Jammer Plans, by Xanrek the Conjurer
spoof.txt 960 HI I AM A NEW USER ON THIS BBS!!!!!!!
ss&fbi.txt 5546 The Secret Service Decides to Watch All of Us
ssan.hac 4738 The Social Security Number
ssn-stuf.txt 19840 More about why Social Security Numbers are Insecure
ssnum.ana 1791 About Social Security Numbers
stainles.ana 3247 A Cool 3.7 Million, by The Stainless Steal Rat
starcon2.top 2074 The Mad Doctor Bitches about a Particularly Tough Crack
stupid.unx 10046 Yet Even More Stupid Things to Do With Unix! by Shooting Snark
stupidki.hac 4942 Those Stupid Little Bastard Hackers!
sys75.hac 9410 The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
sys75.txt 9410 The Complete Guide to Definity G Series Systems AKA System 75 - 85 by Scott Simpson
sysadmin.txt 14091 Know your UNIX System Administrator
ta&m.txt 20778 Texas A&M Network Security Package Overview 7/1/1993
tap-1.hac 239001 TAP Magazine Online #1
tbcore001.hac 12743 Taco Bell Core Issue #1, May, 1993
tcsb.04 11790 An Introduction to PRIMOS CPL Directives by Necrovore
techhack.hac 8368 A Guide to ADS System, by Lord Digital and the Phantom
technicl.txt 9809 Technical Hacking: Volume One by the Warelock
tele5.hac 6492 Hacking Telnet by The Flash
telefard.hac 2137 How to hack into a Telegard board, by Carmon Majere
telenet.hac 10465 Telenet: The Secret Exposed
telenet.txt 2732 Telenet Directory
telenet2.txt 24259 A Good amount of general Telenet Information
teleneti.phk 2720 Instructions for using TELENET.
teltermz.txt 13604 List of Terminal Identifiers
tempest.hac 5122 Excerpt of article on Tempest
termsdoc.hac 22615 Computer Phreaking: A Glossary of Terms
theburli.txt 3712 Peninsula Hackers Busted, by John Curry
thuglan1.hac 16453 Intoduction to Hacking into LANs by Laughing Gas
top10.hac 4272 Top 10 Media Errors about the Steve Jackson Games Raid
transdir.hac 14377 1-800-NNX Translation Directory by The Mentor
transdir.txt 14377 The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
trash.txt 7025 More on Trashing by Kid & Co. and the Shadow, from 2600
trash1.rdt 16077 Dumpster Insights: Report #1 (NET/NYNEX) by Count Zero and Brian Oblivion
trashdoc.hac 7025 More on Trashing: What to Look for, How to Act, Where to Go (From 2600 Magazine)
trashing.hac 6845 Better Homes and Trashing, by The Saint
triad187.hac 19927 The Triad: A 3-in-1 Textfile Magazine, Issue #1
triad187.txt 19927 The Triad: A 3-In-1 Text File Magazine Volume 1, Issue 1
troj.hac 4790 Basic Unix Use, by Lord Lawless
trojan 9131 Rumors of Worms and Trojan Horses by Mike Guffey
trshdisk.ana 1822 Basics of Trashing, by The Grim Trasher
truth.txt 10545 The Truth about HumbleBabe
trw.doc 4048 General TRW Information by Modem Master
trw.hac 1693 Quick Notes on getting into TRW
trw.txt 3086 Accessing and Using TRW, by Purple Heart
trw1.hac 23129 Infinite Possibilities Society presents: COMPLETE TRW
trw2.hac 38380 Infinite Possibilities Society presents: EVEN MORE COMPLETE TRW
trw2.txt 7728 TRW Definitions by the Line Breaker
trwdef.hac 7958 TRW Definitions, by the Line Breaker
trwdoc.hac 4278 General TRW Information, by Modem Master
trwguide.hac 13029 Renegade Legions Technical Reports: TRW 1.0
trwinf.hac 5525 Several Textfiles about TRW
trwtech.hac 11392 TRW Terminology: Understanding what you read, by Master Blaster
ttyspoof.hac 7786 TRW Spoofing by SubEthan
ttyspoof.txt 7786 TTY Spoofing, by SubEthan
tymenet.hac 20577 Tymenet Technical and User Information
tymnet.txt 205145 Packet Networks I and other Tymnet Information by Digital Demon, 1990
udel.1 31308 Recommended Guidelines for Responsible Computing at the University of Delaware
udel.2 3612 Policy for Responsible Computing Use at the University of Delaware
uhacknfo.hac 497325 Security and the UNIX Operating System, 1990
ukguide.hac 13693 The Guide to Online Databases for UK Users
umi1.txt 8410 Collection of Comuter Security Articles
umi2.txt 4688 Collection of Computer Security Articles, Part 2
umi3.txt 2357 Collection of Computer Security Articles, Part 3
umi4.txt 2639 Collection of Computer Security Articles, Part 4
umi5.txt 6413 Collection of Computer Security Articles, Part 5
umich-1 5311 Michigan University Proper Use of Information Resources, Information Technology and Networks
umich-2 7906 Michigan Technological University Computing Policy
umissc 7298 University of Missouri: Columbia Computing Ethics Policy
umissrol 4080 University of Missouri-Rolla Computing Guidelines
unineta.phk 7049 Uninet Information, from The South Pole
unique07.bbs 8744 List of Interesting/Unique BBSes
unix.txt 6016 The Fundamentals of UNIX Passwords, by Mr. Slippery
unix001.hac 141523 UNIX Use and Security from the Ground Up, by The Prophet
unix1.hac 9992 Hackers Against Law Enforcement Present A Guide to UNIX Systems
unixacct.txt 10995 Creating UNIX Accounts by the Kryptic Night and the Servants of the Mushroom Cloud
unixart.hac 9099 Mitch Wagner of UNIX Today on an interesting Hacking Case
unixcall.txt 2048 Using UNIX to do an Outdial
unixhak1.hac 5498 Tutorial on hacking through a UNIX system
unixhak2.hac 12384 On the Security of UNIX
unixhak3.hac 3971 Things to Know about UNIX by Sir Charles Hansen
unixhck.hac 5260 UNIX Hacking Made Easy by Shadow Lord
unixhell.txt 13528 Raising Hell with UNIX by the Kryptic Night
unixinfo.hac 3072 Unix System Basics by the Terminal Technician
unixmyth.txt 14012 Is UNIX Really That Bad? The Myths of UNIX
unixsec.txt 28235 Unix System Security Issues, from information Age, 1988
unixsir.hac 86374 UNIX: A Hacking Tutorial by Sir Hackalot
unixsysv.hac 11408 Hacking UNIX System V
unixttl1.hac 31322 UNIX Communication Commands, Part I, by The Rebel
uofidaho 1714 University of Idaho Passwords and Computer Security Policy
uofmisso 2509 University of Missouri-Kansas City Computer Ethics Policy
uofnewme 8165 University of New Mexico Ethics Code for Computer Use
uofpitt 2697 University of Pittburgh Policy in Computer Resources
uofwales 3425 University of Wales Misuse of the Vax Statement
upccode.ana 5787 Some rough information on decoding bar codes
valccds.hac 921 How you validate Credit Cards
vax-1.hac 4012 What's Hacking? By David Lightman Vol. 1
vax-2.hac 3181 What's Hacking? By David Lightman Vol. 2
vax-3.hac 3975 What's Hacking? By David Lightman Vol. 3
vax-4.hac 3889 What's Hacking? By David Lightman Vol. 4
vax-5.hac 3645 What's Hacking? By David Lightman Vol. 5
vax-6.hac 3787 What's Hacking? By David Lightman Vol. 6
vax-7.hac 2156 What's Hacking? By David Lightman Vol. 7
vaxc.hac 150296 Beginners Guide to VAX/VMS Hacking by ENTITY of Corrupt Computing Canada
vaxhack.hac 11043 Hacking VAX VMS's by Terry Gilligan
vaxhack.txt 5282 VAX and VMS Hacking by Metal Maniac
vaxhackone.hac 5379 VAX/VMS Hacking by Metal Maniac
vaxinst.hac 12800 Welcome to the World of VAX
vaxlight.hac 24645 What's Hacking? A Series by David Lightman: VAXES
vaxnums.txt 1781 A List of VAX Numbers
vaxvmlod.hac 3968 LOD/H Present Hacking into VAX/VMS Systems
vaxvms.hac 6656 Inside VAX/VMS by Master Blaster
vendors.hac 55184 Large Security Vendors List
verstell.ana 3221 Neat Fun with Versatellers
virus 11269 Attack of the Computer Virus, by Lee Dembart
visahackdoc.hac 7557 Some Unchangeable Digits in Visa Credit Cards by Stargazer and Borashi
vmbzan.hac 4774 How to have your own VMB by the Exorcist
vms.nap 4192 A Profile on Vaxes, compiled by Blind Justice and Dr. Insanity
vmsnap.hac 4192 A Profile on Vax's, compiled by Blind Justice and Dr. Insanity
vthack1.hac 9844 VT Hacking #1 By The Mad Hermit
vthack2.hac 9378 VT Hacking #2 By The Mad Hermit
vthack3.hac 29178 VT Hacking #3 By The Mad Hermit
wanghack.hac 5302 Hacking the Wang OS, by Dark Knight
warez-faq1 13218 The Lamahs-Guide to Pirating Software on the Internet 1994
warezbst.txt 1893 AP Newswrite Story on the Bust of David LaMacchia on Piracy Charges
washlod.txt 13183 The Terminal Men: Crackdown on the `Legion of Doom' Ends an Era for Computer Hackers, by Willie Schatz (Washington Post)
washu 8624 Washington University Center for Engineering Computing Unix Instructional Account Policies
wasphq.ans 2911 ANSI BBS Ad for the Trekkers' Tavern
watching 3552 Watching the Watcher Watching You by Sir Knight
watching.hac 3552 Watching the Watcher Wating You, by Sir Knight
wats.txt 9978 WATS: 800 / 900 Company Ownership Reverse Database
wwivcrakdoc.hac 5576 Kill the lamer SysOp's computer! By The Crypt Keeper and The Evil Master of WCCP
zen.hac 52401 Dan Farmer's Improving the Security of Your Site by Breaking Into It
zencredi.ana 15468 Zen and the Art of Credit Card Fraud
zenixinf.hac 4967 Xenix Command List, by Stingray



Main page
Passwords
Miscellaneous
Links
Hacking Tools
Virii
Phreaking textfiles
Tags textfiles


E-mail Me