New World Order's Guide to Datapac
f96205ef9980e3b860673e707a303bd416eca52aabbae4bf2592889ba9d6c3ca
No information is available for this file.
5be0378bc8322ec42fcfdf9fb342d0fbaecf7541f47353a62b1c4ede9b9cf250
No information is available for this file.
e7b8b1ee5d3b691afa252af630b7ac164ba5c4d34a0e9c80a08b093aa704c813
No information is available for this file.
101d021ae8a2c43ab8cb1be88ab96f77f5ab5ba816dc13b1c381d4bf97776fd5
PCBoard Hacker
f9814d51b9f50920ce23f71f63d425b508bb7ff628829c3d983e90badc064b3e
Hacking PCBoard
6c8c6f6661c1ab8ca3affb2b6899595b54ecf252c74dfe7825296e7f32ceefea
Phry Code Pro 3.01 (PCPursuit Hacker)
08f49d1f1764a66611b62b7a6a2845dc944f1c8db5db4123560b0289461ae6cd
No information is available for this file.
65e6bcd0969e12f5f0538073a7db782600be3b06c106323da27355f115bca68b
No information is available for this file.
334e4f0dac6c8bc79d882e0e73b382d45645d28728a7def5f239a71218dfdfa5
The Primos Operating System
2e38639f3703e04a9a243091be10d5eda412b2e523af3e461f9b27b6a9ab6639
Various C Programs to Aid Hacking
66cae72097eb2367196bec1e45fb6c5fb932c805dff63816140cc6c33b957eb9
PASSWORD is a password protection program disguised as a normal looking but phony C> prompt. Has many features to control the appearance and behavior of the program.
7313b910302580786b02cae527a16ca5875b4da392ac595c09365250e0f91e2b
Program to Grab Passwords on RA Boards
1f7c3ba8e864159d1398d7f45038837769f73b4274d03b285be540616990f7f2
RA-'hack'-virus... should hack all RA-bbsses, TSR, corrupts all started executables!
3b2118a23d79570c74ec14410dde6ac5bb24f9fecfc7c38abc8d5dbe3aacd5e1
Hacking RBBS
8448a3139af31877e8cb26b485c63bad16875389656b85541b3c7e2eedd8d5c4
No information is available for this file.
642b9ed76852fdeee064062eb2114f0616442f1fd011ba37e87863ccce28ae09
No information is available for this file.
8833c26d10f9ad8b050bd8328fff2ba1d8b899cd10e2a418039ff015297efb75
ROLM Computers
7b60c32ae4daa06fb57e3400b7c35da11e0ac3bcb4758c9cde378bc6c288abc2
RSTS/E by Crimson Death
32e34caf3f1f7bfbb43bbd6d354729d97546b39c6a5caef94f9c7122679e8516
The Hacker's Guide to RSTS-E 8.0
c3e3184e3028ed5990c6d212448528150fdcd78812273486c1c5c85843991875
SATAN Network Security Tool Version 1.0
4a6cd6f88fe1e09c7bb200af8ee269ccc4f09d32126e4e2d6966e31d3b077ae8
No information is available for this file.
3ec5a5129816b4d2704a2df1175245f8d539a1af59270948039d49f28ad78330
No information is available for this file.
0116c43d136fe0d73ec367ee69cfee8b466102837bdba32c22796d922fa1d07d
No information is available for this file.
91117974616c63090de177ce981a2d3615af7922c759a45fbcfcc036e9dbeb6a
Diary of a Hacker. Part 3 of 3.
4fec90b107d926658d9f8c85fba1bd9699849b1342a26ddf9fe1aea8269f4bfb