26008586.txt
22884 Excerpts from Various Issues of 2600 Magazine, by The Fixer
2600bust.txt
8003 Hackers Allege Harassment at the mall, by Robert O'Harrow Jr.
2600dcr1.txt
8042 Reports of "Raid" on 2600 Washington Meeting 11/09/92
2600dcr2.txt
4614 Secret Service Role Questioned in "2600 Washington Raid" 11/10/92
2600dcr3.txt
4540 Conflicting Stories in 2600 Raid 11/11/92
ab2.txt 10496 ANSI
Bombs II: Tips and Techniques by
about.top 2366 The
History of Tired of Protection (TOP)
abstract.hac
106187 VERY Large list of Abstracts on Computer Crime in various publications
abstract.txt
106187 Abstracts of Various Computer Security Articles
abusebbsdoc.hac
10883 The Best Ways to Abuse BBSes, by The Joker
abuser.txt 10734
The Best Ways to Abuse A BBS: The BBS Abuse Handbook
acadia 15060 The
A.U.C.C. Acadia Computer Terms of Use Policy
accesblt.hac
20551 Advanced Authentication Technology, 1991
accounts.vax
5772 Accounts to try if you wanna enter into a VAX/VMS
adssys.hac 9954 A
Guide to ADS Systems, by Lord Digital
adssys.txt 10048 A
Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
advanceddoc.hac
9278 Real Credit Card Fraud, by Emergency Interrupt
aicard.hac 7630
Careful Carding, by One-Eyed Willie
aix.fun 778 Warning
to download some AIX Patches
anrky07.txt 5334
JACKPOTTING: What is it? by The Prowler
anrky07doc.hac
5334 Jackpotting: What Is It?
ansibomb.cap
8258 The Ansi Bomb FAQ v0.4 by Jason Livingston, 05/11/1995
apinews1.txt
7208 A.P.I: American Pirate Industries Volume 1, July 1989
apinews2.txt
5724 API: American Pirate Newsletter Issue #2
applenet.ana
3264 How to have Fun with Apple-Net BBSes
aqua.hac 7188
Escaping the Lock-In Trace
arpa1.hac 7040
Hacking Arpanet Part I: By The Source
arpa2.hac 12160
Hacking Arpanet Part II
arpa3.hac 7552
Hacking Arpanet Part III
arpa4.hac 4608
Hacking Arpanet Part IV
arpa5.hac 8064
Hacking Arpanet Part V
arpa6.hac 13824
Hacking Arpanet Part VI
arpanet.hac 4439
Screwing around with Arpanet, by Hackman
arpanet.txt 4736
Attacking Arpanet by the Hackman of Hollow Hills
arpanet1.doc
6975 hacking ARPANET Part 1: By The Source of The Listening Post
arpanet1.txt
14470 Hacking Arpanet: part I, by The Source of The Listening Post
arpanet2.doc
8889 Hacking ARPANET Part II by The Source
arpanet2.txt
11615 Hacking Arpanet Part II by The Source of The Listening Post
arpanet3.txt
7449 Hacking ARPAnet Part 3 by The Source
arpanet4.txt
4957 Hacking Arpanet Volume 4 by The Wyvern
arpanet5.txt
7942 Hacking Arpanet Part V by The Source
arpanet6.txt
6410 Hacking Arpanet Part 6 by The Source
arpanet_.txt
7369 Hacking Arpanet Part III by The Source
arrest.txt 4024
Getting Busted: An Experience and a Warning
as400cmd.hac
27788 IBM AS/400 Command Summary
aspen1.hac 16843 A
Complete Guide To Hacking and Use of ASpEN Voice Mail, by Caveman
aspen2.hac 10902 A
Complete Guide to Hacking and Use of ASpEN Voice Mail Systems: Part II, by Caveman
atlas.txt 4938
Hackers' Atlas, by Ragon/Wynvern/BOF
atm-92.txt 20096
ATMS: The Real File for ATM Theft in 1992, by The Raven
atm-more.txt
20049 Discussions about ATM Passwords
atm.txt 8167 A. T. M.
Fraud Made Easy by Count Zero
atm_92.hac 19991
The High Tech Hood Squad Presents: How to Rip off ATMs
atma.hac 22036 Quick
OVerview of ATM Security (Needs Editing)
atms.txt 20384 Track
Layouts on ATM Cards
atmsdoc.ana 20250
Incomplete file about ATM Cards
austhack.hac
7324 Australian Dialups
autonet1.txt
11411 Hacker Supreme's - Hackers Directory Volume # 34
autotelldoc.ana
5439 Fun with Automatic Tellers
autovon1.hac
2230 Introduction to the Automated Voice Network (Autovon) by Shadowrunner
autovon2.hac
3387 Introduction to the Automated Voice Network (Autovon) Part II
autovon3.hac
1809 Introduction to the Automated Voice Network (Autovon) Part III
avoidcap.doc
2576 Planning Ahead for Phone Phreaks/Hackers
bankhack.txt
12641 The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
basic.net 14775
Basic Networking, by Sk8 the Skinhead
basic1.hac 7491
The Basics of Hacking I: DECs By the Knights of Shadow
basic2.hac 7275
The Basics of Hacking II: VAXes By the Knights of Shadow
basic3.hac 4349
The Basics of Hacking III: Data General By the Knights of Shadow
basicnet.hac
14534 Basic Networking (1989) by Sk8 The SkinHead
basunix.hac 15360
Basic UNIX Use by Lord Lawless
batdis.txt 7871
Computer Terror and Destruction Issue #1: BBS Infiltration
baylor 4530 Computer
Policies at Baylor University
bbsenter.hac
3940 BBS Crashing Techniques, by Mr. Memorex
bbsfiles.txt
38272 The Consumertronics Collection of "A Couple Hacker Files We Downloaded One
Evening"
bctj1_04.txt
7457 Ethernet Firlds
begin.txt 85336
UNIX For Beginners Second Edition, by Brian W. Kernighan
bellhell1.hac
10764 Bell Hell Volume #1 By The Dutchman
bellhell2.hac
16630 Bell Hell Volume #2 By The Dutchman
bellsec.hac 2482
Anecdotal Mention of Bell Telephone's Special Ivestigation Force
berkly42.hac
14105 The Security Side of UNIX, "Patched Together" by The War
bestunix.hac
7476 My Favourite UNIX Commands, By ZeeBee Australia Inc. 1990
betunix.txt 9517
Gaining Better Access On Any Unix System, by Doctor Dissector
bgm_pns.hac 29467
Mish-Mash of Files (Should Probably be split up at some point)
bhacking.hac
5898 A Beginners Guide to Hacking UNIX, by Jester Sluggo
bitnet 2474 Usage
Guidelines for BITNET
blt12 1280 BBSes
Operated by Organizations of the Federal Government
board.des 3072 What
to Do with a Hacked Apple BBS, by Doctor Crunch
boarddes.ana
3072 Incomplete file on destroying Apple BBSs, by Doctor Crunch
boces.txt 6957 The
Slipped Disk takes over the BOCES Computer: A Log
bootl-6.hac
102420 Bootlegger Magazine Excerpts (Apple II Stuff)
bostonu 4891
Conditions of Use and Policy on Computing Ethics at Boston University, September 1, 1988
breakbbs 4425 What
to Do When You Break Into a BBS, by Doctor Crunch
breinhar.txt
37427 White Paper on UNIX Security Issues, by Robert B. Reinhardt, November 11, 1992
bugging.hac 7135
Bugging I: By Brew Associates
bumpbeep.hac
3797 "Bumper Beepers".....by The Mad Phone-man
c101-90.000 3938
Cracking 101: 1990 Edition by Buckaroo Banzai
c101-90.002 31676
Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 2)
c101-90.003 15105
Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 3)
c101-90.004 56228
Cracking 101: 1990 Edition by Buckaroo Banzai (Lesson 4)
c64fun1.txt 2927
Suggestions On What to Do with a Commodore 64, by Nightstalker
cable.ana 1981
Cable Descrambling, by Robin Hood
cable1.hac 1991
Cable Companies Responsible for Cable Theft
cable2.hac 8075
The SSAVI Cable Scrambling System
cable3.hac 4611
Cable TV Scrambling Techniques
cables.hac 21419
Cable TV Pirating, by Logic God
callcard.phk
1734 Hacking Calling Cards, by The Pyromaniac
candyland.faq
4823 The Candyman Explains How He Will Accept Explosives Files
carcodes.txt
3358 Codes Used by Computers in Cars
card90rl.hac
7060 Carding in the 90's, by The Knight
cardchk.hac 922
Credit Check information
carding.txt 4669
The Basics of Carding by the Metallian of Metal Communications
cbi-rl 23705 CBI
General Information Text by Spiritwalker of Renegade Legion
cbi.hac 23689 CBI
General Information Text, by Spiritwalker
cbi.txt 14615 Hacking
CBI Accounts, by The Ghost of the Panther Modernz
cbi4rl.hac 21842
CBI General Information Text #4 by SpiritWalker
cbidoc.hac 3154
How to Logon a CBI System, by L.E. Pirate
cbiman.txt 44915
The Complete CBI Manual of Operations
cbrsp-1.hac 6075
The Cyberspace Chronicle Volume 1 by Phardak
ccbanks.hac 10195
Credit Card Number Prefixes and the Associated Banks
ccc_2.txt 150491
The Beginner's Guide to VAX/VMS Hacking by Corrupt Computing Canada
ccnumberdoc.hac
2067 Bank Card Formats
ccs.hac 8049 Credit
Carding Made Easy by David Lightman
cdugd-101.hac
3197 Computer Down-Under-Ground Digest. Volume 1, Number 1.
cdugd-102.hac
16888 Computer Down-Under-Ground Digest. Volume 1, Number 2.
cdugd-103.hac
56293 Computer Down-Under-Ground Digest. Volume 1, Number 3.
chaos01.txt 1609
The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990
chaos02.txt 2577
The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990
chaos03.txt 4264
The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel
china02doc.hac
23257 China Newsletter #02 (Hacking/Phreaking File Compilation)
chna2-3.hac 9473
CHiNA Educational InfoFile Series II, # 3
church4.ptl 9611
Church Chat Volume 4 by The Spiker
citibank.txt
6226 Hacking into Citibank with Johnny Hindu
cmbkeyrl 8864 The RL
Masterkey File by the Gypsy
cocots40.hac
16875 Renegade Legion Technical Report #2: COCOTS, by Count Zero
codehack 5693 What
to Look for in a Code Hacking Program by Dissident
codehack.hac
5693 What To Look For In A Code Hacking Program, by Dissident
codphone 3842
Coda-Phones by D.T. Legna
colgateu 8632
Colgate University Academic Computer Center Agreement for Use of Computing Facilities
columbia 4963
Columbia University Computer Use Policies
column01.nws
7952 The Sixth Column by Lestat De Lioncourt
com_sec90.hac
54579 United States General Accounting Office Report: Computer Security..Governmentwide
Planning Process had Limited Impact
com_sec91.hac
15590 United States General Accounting Office Report: Computer Security..Hackers Penetrate
DoD Systems
compuser.txt
27008 A Quick Compuserve Index
compusrv 5599
Compuserve Hacking by The Locksmith
contact.txt 5246
How to Contact the HACK SQUAD
coolhand.hac
3301 Coolhand Luke explains what is happening with TNSHB TGR
copier.hac 10206
Magnetic Stripes, by Count Zero
cops-rl 23583 RL
C.O.P.S. File by Brian Oblivion
copyprot.pro
11218 Copy Protection, a History and Overview
copyprot.txt
11735 Cracking on the IBMpc Part I by Buckaroo Banzai/Reset Vector
corrupt.inf 5695
Introduction to the Corrupt Security BBS
corruptinf.hac
5695 Corrupt Security BBS Introduces Itself
cosmos.hac 10942 C
O S M O S, by Doctor Who
cosmos1.txt 7458
Hacking into COSMOS by Wizard of OZ
cosmos2.hac 9608
Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom
cosmos3.hac 8320
The 1986 COSMOS Files Part III by Sir William
courier.txt 6025
You Hack 'Em, We Hump 'Em, or Why YOU should be a Software Courier, by Dixie Flatline
crack.txt 90759 The
Cracking Manual, written by the Cyborg - April 3, 1992
crack1.txt 7850
Buckaroo Banzai Presents Cracking on the IBM PC Part 1
crackam1.txt
63466 Hacking Programs on the Amiga by FunToHack
crackam2.txt
29030 Cracking the Amiga Part II
cracking.txt
6801 Cracking the Universal Product Code, by Count Nibble
crackingdoc.hac
6794 Cracking the Universal Product Code by Count Nibble
crackist.hac
63158 The Amateur Crackist Tutorial by Specular Vision (Version 1.3)
crak1.txt 15364 How
to Crack by Charles Petzold
crak2.txt 22182
Examples of IBM PC Cracks: MEan-18 Golf by Accolade
crak4.txt 11608
Chapter 4: Cracking a Self-Booter
crash.hac 13056
Three different files on crashing FidoNet, Net-Works, and GBBS.
crashae.hac 1495
Crashing AE Lines, by Delta Master
crashc.hac 7629
How to Crash a C-Net BBS Part II, by Ditto
crashcom.hac
4903 How to Crash a Commodore BBS by The Highwayman
crashcom.txt
5949 How to Crash a Commodore BBS, by The Highwayman of Chaotic Computing
crashem.ana 8884
What to Do when you Break into a BBS, by Dr. Crunch
crdtcarddoc.hac
17961 Volume I of The Adventures in Fraud Series by Sneak Thief/Credit Card Fraud Ideas by
L.E. Pirate
credit.hac 4493 CC
Validation Center Information
credit1.hac 10855
David Lightman presents Credit Carding Part 1: The Card
credit2.ana 7514
Credit Cards II: Getting the Cards, by The Administration
credit2.hac 7677
David Lightman presents Credit Carding Part 2: Getting The Cards
credit3.ana 5949
Credit Cards III: The Dropsite, by The Administration
credit3.hac 6035
David Lightman presents Credit Carding Part 3: The Dropsite
creditcadoc.hac
17382 Credit Carding from Dreamscape BBS
crime.doc 26658 The
Grolier Electronic Encyclopedia Definition of Crime
crime.hac 12567 Is
there Computer Crime, and what are the results?
crkibms2.hac
3465 Cracking on the IBM PC Part II
crkibmsw.hac
7479 Cracking on the IBM PC Part I
crshgbbs 3770 How to
Crash GBBS II Boards
crshgbbs.hac
3770 How to Crash GBBS II Boards
crshnw.txt 10752
Crashing Networks, the Causes and Prevention, by the Oracle of Delos
crshrbbs.hac
3712 How to destroy an RBBS System
cs.hac 2815 How to Get
a Free Account on Compuserve
cs.txt 2944 How to Get
a Free Compuserve Account
csl8_93.hac 12359
CSL Bulletin 1993
cusass.hac 3520
CNA by The Master
danwebst 4463 Daniel
Webster University Policy for Computer Usage
dartkiew.hac
20480 Dartmouth Kiewit System by The Lone Ranger
data_gen 1574
Captain Crunch talks about hacking Data General Systems
datakit.hac 14409
How to connect across VCS/ISN boundaries
datapac.hac 15579
A Guide to DataPAC by The Fixer
datapac1.txt
16626 A Guide to DataPAC version 1.1 by The Fixer
datapac2.txt
19480 Datapac 3101 ITI Parameters Description
datapac3.txt
2430 Datapac 3101 Public Outdial Ports
datatapp.txt
4088 Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon
ddn01.hac 2993
Defense Data Network Security Bulletin #1
ddn03.hac 11207
Defense Data Network Security Bulletin #3
ddn04.hac 3143
Defense Data Network Security Bulletin #4
ddn05.hac 4295
Defense Data Network Security Bulletin #5
ddn06.hac 3015
Defense Data Network Security Bulletin #6
dec10.txt 23846
Hacking the DEC-10 System
defaults.txt
6726 Hacking into a Variety of Systems by using their Default Accounts
defdb.hac 77311
Department of Defense Federal Data Bases (List)
defense 10694 Defense
Data Network Blues by Harry Hackalot
defense.hac 10447
Defense Data Network Blues by Harry Hackalot
defensed.txt
10628 Defense Data Network Blues by The Baud Baron and The Federation
denning 59865
Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning
desval.hac 3149
DES Validation List
dialoutslst.hac
29446 (I)nter(N)et->(T)ym(N)et List Version 1.0 - January 1991 -
dialup.hac 18816
List of Dialups. For what? I have no idea.
dirfind.txt 4242
Newbie Tips: (Changing to / Hidden Directories) 1.1
dirty 40215 THE DIRTY
DOZEN -- An Uploaded Program Alert List Issue #6: September 5th, 1986 by Eric Newhouse
disaster.!!!
6975 Extremely Long File About Why they're Not a Pirate BBS
diskopt 6706 My
Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85
dlog-rdt 44883
Complete Guide To The DIALOG Information Network by Brian oblivion
dnicinf.hac 13312
D A T E X - P - International Traffic Relations
dodontae.hum
9385 The Do's and Dont's of ASCII Express by Quasimoto
dowjones.txt
2570 Inside Dow Jones News Service
downrsts.phk
4038 So You've Decided to Down an RSTS System
dtsb.hac 8894 DEC
Terminal Server Basics by Mad Hacker
duran.txt 1392
"The Password" to the tune of "The Reflex" by the Slipped Disk
easyl.hac 3968
Hacking Easy Link I by Professor Falken
eel-bye.hac 7246
The Eel Quits Pirating and Says Goodbye
eel_bye.txt 7680
Is it Worth The Trouble? (The Eel's Farewell Address) (Piracy)
elite.acc 37356 A
somewhat serious attempt by LOD to explain what the phrase "Elite" truly means
and how to achieve it
elite.cmd 5946 The
Commandments of Eliteness
elites.lst 24886
International Elite BBS List
elites.txt 3113
Someone who is VERY Angry about the Eliteness of a BBS
emc.nfo 2953 Applying
to Join the Elite Mafia Against Copyright
ena!.hac 7877 The
ENA Vision: What IS Ena?
encyclop.txt
1502 Someone Makes fun of That Stupid Article
eproms.hac 5566 A
Closer Look at EEPROMS by The Kingpin
ethics.hac 3692
Newsweek: Teaching Hackers Ethics
ethics.txt 5148
The Ethics of Hacking by Dissident
ethicsdoc.hac
5148 The Ethics of Hacking by Dissident
exeguide.hac
23551 Executive Guide to the Protection of Information Resources by NIST
fast.txt 5301
Hacking McDonalds, by Herb the Hacker
fbiaftha.hac
16896 The FBI Fights Computer Crime
fbicompu.hac
5225 Summary of FBI Computer Systems, by Ralph Harvey
fbisys.txt 5281
Conspiracy Theory Conference: Summary of FBI Computer Systems, by Ralph Harvey
fcscvol1.hac
641496 Federal Criteria for Information Technology Security Volume I
fcscvol2.hac
566236 Federal Criteria for Information Technology Security Volume II
fdp1.txt 12668 The
Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta
fdp2.txt 13449 The
Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta
forum.hac 7012
Crashing Forum Boards by Panther Man
freebie3.hac
103246 Compufreebies 3.1 (1992)
freecis.txt 3278
Free Compuserve Access
freemail.hac
5909 Free Mail! From THUMPR
fruquenc.hac
9390 The Idiot's Guide to Freqing.
funwith5.hac
5437 Fun With Automatic Tellers
gcs.hac 8192
Government Computer Security Techniques, by The Line Breaker
gisdoc.hac 5966
Hacking the GIS computer by Doctor Crash
goodbye.ana 1796
The Best of the Station, by The Prowler
goodkids.hac
4548 Computer Hackers are Good People Too!
govthlp.txt 4106
The Help Screen on some Government System
gs1.txt 16195 The
GS/1 User's Guide by Doctor Dissector
gte.hac 19883 Hacking
GTE Telemail by Mister Micro
guide.doc 5437 The
RSTS/E Hacker's Guide by The Flash
guide.txt 42423 A
Novice's Guide to Hacking- 1989 edition by The Mentor
guidedoc.hac
5437 The RSTS User's Guide, by The Flash
hacethic.txt
6161 The Ethics of Hacking by Dissident
hack-pcb.txt
3744 A Simple Way to Hack Around PC-BOARD And Succeed by Sniper
hack.hac 4096
Hacking And Computer Krashing #9, by Gray Wolf
hack.leg 11978 A
Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal
Solution by Fatal Error (1990)
hack1.hac 7960 The
Basics of Hacking, by the Knights of Shadow (Intro)
hack2.hac 7450 The
Basics of Hacking, by The Knights of Shadow (DECs)
hack3.hac 7198 The
Basics of Hacking, by The Knights of Shadow (VAXs/UNIX)
hack4.hac 4421 The
Basics of Hacking, by The Knights of Shadow (Data General)
hack5.hac 5761
Hacking McDonalds, by Herb of Burger King
hack6.hac 5241
Hacking Voice Mail Systems
hack7.hac 5417
Hacking the Compuserve Infomation Service
hack9.hac 10950
Hacking Control Data Corporation's Cyber
hack_cis.txt
13288 The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June
22, 1991
hack_em.hac 26119
The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr
hackacr.hac 59638
The Hackers Acronym Chart, compiled by IIRG
hackcabl.txt
2973 The Hacker's Guide to Cable TV: San Francisco Viacom
hackdict.txt
872346 The Hacker's Dictionary, Older Version, Uncredited!
hacker.tst 21534
The Hacker's Purity Test, June 16, 1989
hacker01.txt
152594 The Social Organization of the Computer Underground: A Thesis
hacker03.txt
4931 The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers
hacker1.txt 19996
Diary of a Hacker
hacker11.txt
2403 Hacking Western Union's Easylink
hackfaq.hac
106724 FAQ to #hack IRC Channel, Beta .007
hackhp2.hac 15991
Hacking the HP 2000 by Bioc Agent 003
hacking 1676
Description of the New, Bad Definition of Hacking
hacking.txt 30670
The 408 Alliance Presents TRW Information File #5, by Type A Maniac
hacking101.hac
3367 HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life
hackinga.txt
5856 Hacking Bank Of America's Home Banking System by Dark Creaper
hackingcdoc.hac
3531 Hacking Credit Card Codes by Omni-Kid
hackinge.txt
2881 Hacking ECONet Systems by Jack Death and Zapper
hackingi.txt 759
Computerworld Asks People to Hack In, 1984
hackingt.txt
1311 Hacking the Lexington Air Force Computer
hackingv.txt
6324 Inside VAX/VMS, by master BLaster
hackmast.hac
4398 HackMaster BBS Listing Summer 1992
hackpcp.hac 8519
The Weenie Warriors present Hacking PC Pursuit Codes
hackprof.txt
2276 Hacker Proof Doors! It IS Possible!
hacksynd.hac
7296 The Hackers Syndrome, by Tad Deriso
hacktalk.txt
10240 A Short Hackerspeak Glossary, by the Hollywood User Group
hacktips.hac
3392 Hacking Tips #2, by Hoe Hopper
hacktips.txt
5625 Tips for Tracking Hackers
hacktrw.hac 2706
An Experienced Hacker's Guide to Hacking TRW, by Minotaur
hackunlm.hu1
144657 Hackers Unlimited Magazine Volume 1 Issue 1
hackunlmhu1.hac
144657 The Mickey Mouse Club Presents Hackers Unlimited Volume 1
hackusa!.hac
7666 Hackin' USA
hackwarn.hac
5735 A Warning to Hackers
hackwwiv.hac
7679 Hacking into WWIV, Second Edition by Vision
hakdic.txt 231108
The Hacker's Dictionary, A Guide to the World of Computer Wizards
haklist.bbs 5172
A Selection of Hacking BBS's, circa 1986
hakmedia.txt
1771 Hackers in the Media, List start: 10/28/92 - Doomsday
hckr_hnd.txt
138752 The Hacker's Handbook, by Hugo Cornwall, 1985
hd01.hac 16446
Hackers Directory Volume #1 by Ninja Squirrel and Logan5
hd01.txt 16446
Hackers Diretory Volume #1 by Ninja Squirrel and Logan5
hd02.hac 13873
Hackers Directory Volume #2 by Ninja Squirrel and Logan5
hd02.txt 13873
Hacker's Directory Volume 2 by Hacker Supreme, The Cartel and NIN Temple
hd03.hac 16634
Hackers Directory Volume #3 by Ninja Squirrel and Logan5
hd03.txt 16634
Hacker's Directory Volume 3
hd04.hac 11329
Hackers Directory Volume #4 by Ninja Squirrel and Logan5
hd04.txt 11329
Hacker's Directory Volume 4
hhackin4 14917
Hacking the Oxgate Public Bulletin Board System by The 0mega & Lord Vision
hhacking.iix
5504 CAT-HACK Volume 1 from The Mystery
hide.hac 4486 UNIX
Abuse Collection, by ZeeBee Australia
hoho93cz.hac
13356 The Exploits at HoHoCon 1993 by Count Zero
homebank.hac
6056 Hacking Bank Of America's Home Banking System by "Dark Creaper"
how2bgod.txt
6079 How to Be God Book II by Rusty Nail, Flat Tire, Jim
how2dotv.txt
4696 A One Minute Course on How to Do TV, by Richard Freeman
howtocp2 3702 IBM
Disk Cracking Made Simple by Phobos
hp20001.hac 12800
HP 2000 Part 1: Commands by Blitzoid and Galactus
hp20002.hac 15744
HP 2000 Part 2: Statements by Blitzoid and Galactus
hp20003.hac 9344
HP 2000 Part 3: Functions by Blitzoid and Galactus
hp20004.hac 5376
HP 2000 Part 4: Files by Blitzoid and Galactus
hp20005.hac 5120
Hp 2000 Part 5: Matracies by Blitzoid and Galactus
hp30.txt 116232 The
Completel Hewlett Packard 3000 Hackers Guide
hp3000.hac 10319
The Complete Hewlett Packard 3000 Hackers Guide
hp3000_t.hac
14354 Hacking the HP 3000 by DE BUG
huv1-21st.hac
76441 The Mickey Mouse Club Presents Hackers Unlimited Volume 2 Part 1
huv1-22nd.hac
6410 The Mickey Mouse Club Presents Hackers Unlimited Volume 2 Part 2
ibm-keys.txt
2435 The IBM PC Special Characters
ibm370.hac 2688
How to Take Control of your Local IBM 370 by Another Hacker
ibmhack.hac 2686
Hacking the I.B.M. By John Doe
ibmrules.hac
1365 There are rules for driving a Computer, Too!
id-biz.txt 2850
How to Have a Profitable ID Business, by Mr. Puff n' Stuff
idiots.txt 4480
What Idiots Do, by The Blade, of the Neon Knights
iirgacr8.txt
79728 The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)
illinet.txt 20430
Dial-Up Access Numbers for ILLINET Online
info0.hac 18432 The
IBM Bust of 612 By Professor Falken
info3.gph 4352 How
to Get Anything on Anybody Part III
infoam.txt 51393
Exploring Information-America by Omega and White Knight
informer.hac
17320 TRI : The Remote Informer, Volume 1, Issue #6
innercir.hac
9856 Hacking Techniques, Typed in by Logan5 from The Inner Circle
insan#4.txt 9285
'Lamer Pirate Magazines, Etc... by the Grim Reaper
intercep.hac
10746 The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)
interlaw.rpt
23809 Term Paper on Internation Relations, and the Extradition of Nazi Crominals
internet.hac
49024 A Hacker's Guide to the Internet, by Gatsby 1991
inttel.hac 1728
European Computers List #1 by Kerrang Khan
ipd.hac 2004
Countries connected to the International Packet Switching Stream by The Force
irchack.hac 14381
Hacking IRC the Definitive Guide
is01npasis.hac
109934 International NPA/City Code Listing w/Zone Info from Aeon Flux
is02cardis.ana
10467 Information Society: Carding in the 90's
issm201.hac 32229
The Information Systems Security Monitor Volume 2 Number 1
issm202.hac 52667
The Information Systems Security Monitor Volume 2 Number 2
issm204.hac 28850
The Information Systems Security Monitor Volume 2 Number 4
issm301.hac 24356
The Information Systems Security Monitor Volume 3 Number 1
issm302.hac 23394
The Information Systems Security Monitor Volume 3 Number 2
issm303.hac 22981
The Information Systems Security Monitor Volume 3 Number 3
issm304.hac 30656
The Information Systems Security Monitor Volume 3 Number 4
itt.hac 5008 A NAPPA
Profile on ITT, written by Blind Justice
jargon211.hac
1147413 The Jargon File, v.2.9.11, by Eric S. Raymond
jmadison 7962 James
Madison University Draft Computer Ethics Statement
justice.txt 6510
Fucked Justice, by Dissident of the Esoteric Society
k00ld00d.txt
5069 The History of Real K-K00l D00Ds by The Edge
kansasst 6483 Kansas
State University Ethical Computer Use Policies
kcah-1.hac 32102
KCAH Volume 1
kcah-2.hac 17440
KCAH Volume 2
kfyi-593.hac
91136 KFYI AM Radio 910 interviews Mind Rape and Merc
killbird2.ana
4096 How to Crash a BBS Part II by Grim Reaper
killtlgd.txt
4805 How To Crash a Telegard BBS by The Crypt Keeper
kooldoo3.txt
3961 K-K00L D00Ds Part III, by Radioactive Snail
kooldoo4.txt
8409 K-K00L D00Ds Volume 4, by The Radioactive Snail
krack.txt 20352
Piracy By Teachers?
lasthack.txt
23637 2084: A Phone Odyssey by Maxwell Smart and The Baron
leechesd.txt
10650 The Leech Dictionary by the Blue Buccaneer
legal.gwn 15420
Some of the Legal aspects of Piracy
legalgwn.hac
15420 Bob MacKenzie talks about legal archiving of your own software
lesbian.dic 20031
The LesBiGay and Transgender Glossary
license.asc 58618
The Guerilla Guide to Licensing Software
lnoise.hac 6020
Modem Noise Destroyer (Alpha Version)
lodcom.hac 51395
Lodcom Sample Messages Set #1, 4/20/93
lodhbasi.hac
42609 The LOD/H Present: A Novice's Guide to Hacking- 1989 edition
lodtj5.hac 203351
The LOD Technical Journal Issue #5
logoncbi.txt
2949 How to Log into a C.B.I System by L.E. Pirate
loops 8483 Loops
Explained, Author Unknown
loops_tx.hac
7723 Iceman's List of Loops and Diverters
lost01.hac 68449
Legion of Schram Today Newsletter #1
lost01.txt 68449
LOST: Legion of Schram oday Issue #1
lost02.hac 20927
Legion of Schram Today Newsletter #2
lost02.txt 20927
LOST: Legion of SCHRAM Today, Issue #2
lozerzon.txt
14016 The Loser Zone, by The Circle Spellbook
mailbox.hac 3368
Mailbox Systems: Your Link to the Underworld
main.fra 6763 Main
Frames by the Pirate Club
makelsd.hac 2056
Making LSD
mcimail.hac 7772
MCI Mail - The Adventure Continues, by Bioc Agent
metaunix.hac
5970 A Beginner's Guide to Hacking Unix
mfraud.txt 37423
Mobile Fraud by the Video Vindicator
michstu 12699 College
of Engineering at Michigan State University Computer Use Policy
mickeyd.txt 5145
Hacking McDonalds by Herb the Hacker
micrrisk.hac
63479 Microcomputer Security Servey (By the Naval Computer and Telecommunications Station
Standards and Security Branch)
milinet.1 5564
Milnet Access Codes
milnet.txt 36799
How to Use the American Military Net
milnet1.hac 7765
Milnet, by Brigadier General Swipe
mism1.hac 11776 How
to Get Anything on Anyone Excerpts
mism10.hac 2944
How to Get Anything on Anyone Excerpts
mism20.hac 3840
Mastering the SCANTRON by Warhead
mism42.hac 1024
Xerox Voice Message Exchange Commands, from The Lineman
mism49.hac 6400
preparation of Nitrous Oxide
mob.hac 8879 Hackers
in the Mob
modemlif.hac
10818 The Modem Life: Is it Really Worth it? By The Nomad
morality.hac
2654 Hacker Morality: A Lesson
morestuf.txt
18930 Collection of Hacking Files (Should Eventually be Split up)
morprime.hac
10579 RVEC Parameters and DMSTK Format
mrsts.hac 5504 So
you've finally decided to down an RSTS System?
mtempist.hac
10752 The Tempest Method of Data Interception (Needs Editing)
muh.hac 6400 A
Beginner's Guide to Hacking UNIX By Jester Sluggo
must.see 1940 Tag
for Rusty and Edie's BBS
mydaywss.txt
15383 My Day with the Secret Service Man, by The Incognito
ncsatelnpw.hac
4683 Eric thinks this new Cryptography scheme sucks
neidorfd.doc
3460 The Craig Neidorf Defense Fund Introduction
net-work.hac
4650 A Tutorial on How to Fuck Up Networks, by The Minuteman
net-work.txt
4825 A Tutorial On how to Fuck Up Net-Works, by The Minuteman, 3/26/1984
networks.phk
5522 2600: How to Send Mail to other Networks
newcastl 4236
University of New Castle Computing Use Policy
newid.hac 6543 New
Identity Method
newmexst 8138 New
Mexico State Univercity Computer Use Policy
newone.txt 34669
All Over the Place Document about Censorship, Hacking, Textfiles, etc.
nextbugs.txt
7878 CERT Advisory on the NeXT computer's Software
nighthak.txt
14774 The Night of the Hackers, by Richard Sandza
note9309.txt
1984 The Hack Report, by Lee Jackson (September 1993)
novell.hac 10516
Collection of security holes in Novell Netware
novhack.txt 9096
Having Phun with Novell by Lord Foul, 1991
novices.txt 43979
A Novice's Guide to Hacking- 1989 edition by the Mentor of Legion of Doom
ocfber.1 1394 Bylaws
of the Open Computing Facility at UC Berkeley
ocfber.2 14491
Constitution for the Open Computing Facility at UC Berkeley
orange 328324
Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15
August 1983
orgs.hac 8464 A
Large List of Computer Security Organizations
outdialsnfo.hac
2652 List of Dialouts
pbust.txt 1280
Semi-Literate Account of the Busting on Two Portuguese Pirates
pbx.hac 6452 PBX's
(Private Branch Exchanges) and WATS By Steve Dahl
pbx2.hac 5427
Understanding PBX's by Terminus
pcpursue.txt
238362 PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz,
1992
pdp11.hac 1920
Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal
phreak1.hac 1636
Time Assignment Speech Interpolation (TASI) by Master Blaster
phreak3 6585 The
Hacker's Handbook
phreak3.hac 6585
The Hacker's Handbook (Well, maybe the Hacker's Pamphlet)
piracy.asc 18560
What is Piracy? By Ron J. Goodman
pirate.ana 3444 A
List of Ripped-Off "Freeware" (1985)
pirate.txt 2304
Some Pirate BBS Numbers
pirate1doc.hac
94272 PIRATE Volume #1 Issue #1
pirates2.txt
6066 The Real Pirates Guide Volume III V.2 Written by the Whip
plagmemb.txt
7449 The Official Plague Member's Handbook by Mad Hacker, 1990
policyasc.hac
20654 A Draft Security Policy by National Computer Security Association
ports.txt 1559 Some
UNIX Ports and What to Do With Them
prime.hac 21725 A
List of PRIME Commands
primecpl.hac
12018 An Introduction to PRIMOS CPL Directives by Necrovore
primos.hac 3968
Hacking Primos Systems By Nanuk of the North
pucc 11185 Statement of
Policy on Use of Computing Center Facilities and Services
purdue 10026 Purdue
University Computing Facilities Policy
qmaster.top 1518
Tired of Protection (TOP)'s Crack for Quest Master
ram1 4045 Hacking
Rampart Systems Part 1
ram2 4058 Hacking
Rampart Systems Part 1 (cont)
ram5 4022 Hacking
Rampart Systems Part 2
ram6 861 Hacking Rampart
Systems Part 2 (cont)
ramcomm.hac
185184 Hacking RAM Communications (Pager)
rampart1.hac
8448 Hacking Rampart Systems by Whackoland
rampart2.hac
4864 Hacking Rampart Systems by Whackoland Part II
rcaglobe.txt
3494 The RCA Network Part I by the Telex Troopers
real-ra.txt 12665
Why the "Fun with RA boards" hacking method is LAME (The REAL way to hack
RemoteAccess) by ByTe RyDeR
realbust.hac
4049 NotSoHumble Babe got busted, and he says goodbye.
realgphi.txt
5892 The Official Guide to G-Phile Authors, by Man Tooth (Needs Formatting)
research.ppr
25263 Computer Hacking: A New Breed of Crime is Born, by Jon Hogg, May 17, 1991 (Research
Paper)
response.txt
7842 A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
revblt.hac 13726
Review of Federal Agency Computer Security and Privacy Plans
riacs 5878 Principles
of Responsible Use of RIACS Computing Facilities
rimeman.hac 52781
RIME User's Guide
risktool.hac
33991 Risk Management Research Library Overview from the National Institute of Standards
and Technology (NIST)
rodapp.txt 1825
Application to Join the Riders of Death
rose_hul 4715
Rose-Hulman Institute of Technology Department of Computer Science Computer Use Policy
rrg-1.hac 5036
Rebel's Riting Guild Volume 001
rspwd.new 23723
Some Downloaded Password File
rsts.hac 5376 So
You've Decided to Down a RSTS System, by Sam Sneed
rsts1.hac 6778
Hacking the RSTS/E System by The White Guardian
rsts2.hac 4516
Hacking the RSTS/E System by The Maurauder
rsts3.hac 8829
Hacking the RSTS/E System by The Maurauder (Volume III)
rsts4.hac 11880
Hacking the RSTS/E System by The Maurauder (Volume IV)
rsts_oz.hac 14028
Making the Most of RSTS/E Systems, by Captain Hack of Melbourne
rsx11.hac 18944
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord
Digital
safepick.hac
4752 Opening Safes via the Sound Method, by Nick Fury
safesci.hac 10123
The Science of Opening Safes, by Eric the Red
safter.hac 18849
Sought After says goodbye to the scene at large
sanatmdoc.hac
6179 Getting into an ATM
saturday.txt
10485 What Leeches and Other Losers Do on Saturday Nights, by The Blue Buccaneer
secdoc.hac 156965
Improving the Security of your UNIX System, by David Curry
secrets1.hac
4840 Big Secrets Volume #1 by The Wyvern: Credit Cards and Lie Detectors
secrets2.hac
7733 Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post
Office
secrets3.hac
4250 Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things
secretsdoc.hac
233082 Young's Demonstrative Translation of Scientific Secrets (1861)
securdev.hac
8616 Technical Hacking: Volume One by The Warelock
securdev.txt
8616 Technical Hacking Volume 1 by the Warelock
security.fy8
259023 Site Security Handbook, 1991
security.txt
6184 Professor Falken's Guide to CODE Hacking Security
sendmail.fun
2313 A Little Sendmail Stuff, using the passwd file
sentence.hac
2057 Three from Legion of Doom Sentenced (Nov. 17)
sflvrs_h.ack
30285 A Beautiful Obsession with the Binary World by Steven Levy
sha.hac 83219 Swedish
Hackers Association Annual Year Protocol #4
shadec.txt 14173
The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association
shahewl.txt 3723
Swedish Hacking Association presents Hacking HP 3000 Part 1
sirsunix.hac
87805 UNIX: A Hacking Tutorial, by Sir Hackalot
sirsunix.txt
87805 UNIX : A Hacking Tutorial by Sir Hackalot
skyhack.hac 26525
The VideoCrypt System: An Overview, Researched and written by Darren Ingram
sn.hac 42692 Sprintnet
U.S. Asynchronous Dial Service
sn.txt 42692 Sprintnet
U.S. Asynchronous Dial Service
snoop.txt 4065 Data
Snooping the Right Way by Lee Day
soda.txt 1635 How to
Rip off a Soda Machine
sonicjam.hac
7821 Ultrasonic Ultra-Jammer Plans, by Xanrek the Conjurer
spoof.txt 960 HI I
AM A NEW USER ON THIS BBS!!!!!!!
ss&fbi.txt
5546 The Secret Service Decides to Watch All of Us
ssan.hac 4738 The
Social Security Number
ssn-stuf.txt
19840 More about why Social Security Numbers are Insecure
ssnum.ana 1791
About Social Security Numbers
stainles.ana
3247 A Cool 3.7 Million, by The Stainless Steal Rat
starcon2.top
2074 The Mad Doctor Bitches about a Particularly Tough Crack
stupid.unx 10046
Yet Even More Stupid Things to Do With Unix! by Shooting Snark
stupidki.hac
4942 Those Stupid Little Bastard Hackers!
sys75.hac 9410 The
Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson
sys75.txt 9410 The
Complete Guide to Definity G Series Systems AKA System 75 - 85 by Scott Simpson
sysadmin.txt
14091 Know your UNIX System Administrator
ta&m.txt
20778 Texas A&M Network Security Package Overview 7/1/1993
tap-1.hac 239001
TAP Magazine Online #1
tbcore001.hac
12743 Taco Bell Core Issue #1, May, 1993
tcsb.04 11790 An
Introduction to PRIMOS CPL Directives by Necrovore
techhack.hac
8368 A Guide to ADS System, by Lord Digital and the Phantom
technicl.txt
9809 Technical Hacking: Volume One by the Warelock
tele5.hac 6492
Hacking Telnet by The Flash
telefard.hac
2137 How to hack into a Telegard board, by Carmon Majere
telenet.hac 10465
Telenet: The Secret Exposed
telenet.txt 2732
Telenet Directory
telenet2.txt
24259 A Good amount of general Telenet Information
teleneti.phk
2720 Instructions for using TELENET.
teltermz.txt
13604 List of Terminal Identifiers
tempest.hac 5122
Excerpt of article on Tempest
termsdoc.hac
22615 Computer Phreaking: A Glossary of Terms
theburli.txt
3712 Peninsula Hackers Busted, by John Curry
thuglan1.hac
16453 Intoduction to Hacking into LANs by Laughing Gas
top10.hac 4272 Top
10 Media Errors about the Steve Jackson Games Raid
transdir.hac
14377 1-800-NNX Translation Directory by The Mentor
transdir.txt
14377 The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory
trash.txt 7025 More
on Trashing by Kid & Co. and the Shadow, from 2600
trash1.rdt 16077
Dumpster Insights: Report #1 (NET/NYNEX) by Count Zero and Brian Oblivion
trashdoc.hac
7025 More on Trashing: What to Look for, How to Act, Where to Go (From 2600 Magazine)
trashing.hac
6845 Better Homes and Trashing, by The Saint
triad187.hac
19927 The Triad: A 3-in-1 Textfile Magazine, Issue #1
triad187.txt
19927 The Triad: A 3-In-1 Text File Magazine Volume 1, Issue 1
troj.hac 4790 Basic
Unix Use, by Lord Lawless
trojan 9131 Rumors of
Worms and Trojan Horses by Mike Guffey
trshdisk.ana
1822 Basics of Trashing, by The Grim Trasher
truth.txt 10545 The
Truth about HumbleBabe
trw.doc 4048 General
TRW Information by Modem Master
trw.hac 1693 Quick
Notes on getting into TRW
trw.txt 3086
Accessing and Using TRW, by Purple Heart
trw1.hac 23129
Infinite Possibilities Society presents: COMPLETE TRW
trw2.hac 38380
Infinite Possibilities Society presents: EVEN MORE COMPLETE TRW
trw2.txt 7728 TRW
Definitions by the Line Breaker
trwdef.hac 7958
TRW Definitions, by the Line Breaker
trwdoc.hac 4278
General TRW Information, by Modem Master
trwguide.hac
13029 Renegade Legions Technical Reports: TRW 1.0
trwinf.hac 5525
Several Textfiles about TRW
trwtech.hac 11392
TRW Terminology: Understanding what you read, by Master Blaster
ttyspoof.hac
7786 TRW Spoofing by SubEthan
ttyspoof.txt
7786 TTY Spoofing, by SubEthan
tymenet.hac 20577
Tymenet Technical and User Information
tymnet.txt 205145
Packet Networks I and other Tymnet Information by Digital Demon, 1990
udel.1 31308
Recommended Guidelines for Responsible Computing at the University of Delaware
udel.2 3612 Policy for
Responsible Computing Use at the University of Delaware
uhacknfo.hac
497325 Security and the UNIX Operating System, 1990
ukguide.hac 13693
The Guide to Online Databases for UK Users
umi1.txt 8410
Collection of Comuter Security Articles
umi2.txt 4688
Collection of Computer Security Articles, Part 2
umi3.txt 2357
Collection of Computer Security Articles, Part 3
umi4.txt 2639
Collection of Computer Security Articles, Part 4
umi5.txt 6413
Collection of Computer Security Articles, Part 5
umich-1 5311 Michigan
University Proper Use of Information Resources, Information Technology and Networks
umich-2 7906 Michigan
Technological University Computing Policy
umissc 7298 University
of Missouri: Columbia Computing Ethics Policy
umissrol 4080
University of Missouri-Rolla Computing Guidelines
unineta.phk 7049
Uninet Information, from The South Pole
unique07.bbs
8744 List of Interesting/Unique BBSes
unix.txt 6016 The
Fundamentals of UNIX Passwords, by Mr. Slippery
unix001.hac
141523 UNIX Use and Security from the Ground Up, by The Prophet
unix1.hac 9992
Hackers Against Law Enforcement Present A Guide to UNIX Systems
unixacct.txt
10995 Creating UNIX Accounts by the Kryptic Night and the Servants of the Mushroom Cloud
unixart.hac 9099
Mitch Wagner of UNIX Today on an interesting Hacking Case
unixcall.txt
2048 Using UNIX to do an Outdial
unixhak1.hac
5498 Tutorial on hacking through a UNIX system
unixhak2.hac
12384 On the Security of UNIX
unixhak3.hac
3971 Things to Know about UNIX by Sir Charles Hansen
unixhck.hac 5260
UNIX Hacking Made Easy by Shadow Lord
unixhell.txt
13528 Raising Hell with UNIX by the Kryptic Night
unixinfo.hac
3072 Unix System Basics by the Terminal Technician
unixmyth.txt
14012 Is UNIX Really That Bad? The Myths of UNIX
unixsec.txt 28235
Unix System Security Issues, from information Age, 1988
unixsir.hac 86374
UNIX: A Hacking Tutorial by Sir Hackalot
unixsysv.hac
11408 Hacking UNIX System V
unixttl1.hac
31322 UNIX Communication Commands, Part I, by The Rebel
uofidaho 1714
University of Idaho Passwords and Computer Security Policy
uofmisso 2509
University of Missouri-Kansas City Computer Ethics Policy
uofnewme 8165
University of New Mexico Ethics Code for Computer Use
uofpitt 2697
University of Pittburgh Policy in Computer Resources
uofwales 3425
University of Wales Misuse of the Vax Statement
upccode.ana 5787
Some rough information on decoding bar codes
valccds.hac 921
How you validate Credit Cards
vax-1.hac 4012
What's Hacking? By David Lightman Vol. 1
vax-2.hac 3181
What's Hacking? By David Lightman Vol. 2
vax-3.hac 3975
What's Hacking? By David Lightman Vol. 3
vax-4.hac 3889
What's Hacking? By David Lightman Vol. 4
vax-5.hac 3645
What's Hacking? By David Lightman Vol. 5
vax-6.hac 3787
What's Hacking? By David Lightman Vol. 6
vax-7.hac 2156
What's Hacking? By David Lightman Vol. 7
vaxc.hac 150296
Beginners Guide to VAX/VMS Hacking by ENTITY of Corrupt Computing Canada
vaxhack.hac 11043
Hacking VAX VMS's by Terry Gilligan
vaxhack.txt 5282
VAX and VMS Hacking by Metal Maniac
vaxhackone.hac
5379 VAX/VMS Hacking by Metal Maniac
vaxinst.hac 12800
Welcome to the World of VAX
vaxlight.hac
24645 What's Hacking? A Series by David Lightman: VAXES
vaxnums.txt 1781
A List of VAX Numbers
vaxvmlod.hac
3968 LOD/H Present Hacking into VAX/VMS Systems
vaxvms.hac 6656
Inside VAX/VMS by Master Blaster
vendors.hac 55184
Large Security Vendors List
verstell.ana
3221 Neat Fun with Versatellers
virus 11269 Attack of
the Computer Virus, by Lee Dembart
visahackdoc.hac
7557 Some Unchangeable Digits in Visa Credit Cards by Stargazer and Borashi
vmbzan.hac 4774
How to have your own VMB by the Exorcist
vms.nap 4192 A
Profile on Vaxes, compiled by Blind Justice and Dr. Insanity
vmsnap.hac 4192 A
Profile on Vax's, compiled by Blind Justice and Dr. Insanity
vthack1.hac 9844
VT Hacking #1 By The Mad Hermit
vthack2.hac 9378
VT Hacking #2 By The Mad Hermit
vthack3.hac 29178
VT Hacking #3 By The Mad Hermit
wanghack.hac
5302 Hacking the Wang OS, by Dark Knight
warez-faq1 13218
The Lamahs-Guide to Pirating Software on the Internet 1994
warezbst.txt
1893 AP Newswrite Story on the Bust of David LaMacchia on Piracy Charges
washlod.txt 13183
The Terminal Men: Crackdown on the `Legion of Doom' Ends an Era for Computer Hackers, by
Willie Schatz (Washington Post)
washu 8624 Washington
University Center for Engineering Computing Unix Instructional Account Policies
wasphq.ans 2911
ANSI BBS Ad for the Trekkers' Tavern
watching 3552
Watching the Watcher Watching You by Sir Knight
watching.hac
3552 Watching the Watcher Wating You, by Sir Knight
wats.txt 9978 WATS:
800 / 900 Company Ownership Reverse Database
wwivcrakdoc.hac
5576 Kill the lamer SysOp's computer! By The Crypt Keeper and The Evil Master of WCCP
zen.hac 52401 Dan
Farmer's Improving the Security of Your Site by Breaking Into It
zencredi.ana
15468 Zen and the Art of Credit Card Fraud
zenixinf.hac
4967 Xenix Command List, by Stingray