exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hack-faq-d.html

hack-faq-d.html
Posted Aug 17, 1999

hack-faq-d.html

tags | paper
SHA-256 | 630e06417480ca1fb80b479808adca89b89302ff0f070ea40f5b582fc92c9e52

hack-faq-d.html

Change Mirror Download
<!doctype html public "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>The alt.2600/#hack FAQ (Section D: Resources)</title>
</head>
<body>
<! This document was written by Will Spencer and John Gotts. >
<center> <h1>Section D: Resources</h1> </center>

<h2>Table of Contents</h2>

<ol> <li> <a href="#d01">What are some FTP sites of interest to hackers?</a>
<li> <a href="#d02">What are some FSP sites of interest to hackers?</a>
<li> <a href="#d03"><em>What are some newsgroups of interest to hackers?</em></a>
<li> <a href="#d04"><em>What are some telnet sites of interest to hackers?</em></a>
<li> <a href="#d05"><em>What are some gopher sites of interest to hackers?</em></a>
<li> <a href="#d06"><em>What are some World Wide Web (WWW) sites of interest to hackers?</em></a>
<li> <a href="#d07">What are some IRC channels of interest to hackers?</a>
<li> <a href="#d08"><em>What are some BBS's of interest to hackers?</em></a>
<li> <a href="#d09"><em>What books are available on this subject?</em></a>
<li> <a href="#d10"><em>What are some videos of interest to hackers?</em></a>
<li> <a href="#d11"><em>What are some mailing lists of interest to hackers?</em></a>
<li> <a href="#d12"><em>What are some print magazines of interest to hackers?</em></a>
<li> <a href="#d13"><em>What are some e-zines of interest to hackers?</em></a>
<li> <a href="#d14"><em>What are some organizations of interest to hackers?</em></a>
<li> <a href="#d15"><em>What are some radio programs of interest to hackers?</em></a>
<li> <a href="#d16"><strong>What are other FAQ's of interest to hackers?</strong></a>
<li> <a href="#d17">Where can I purchase a magnetic stripe encoder/decoder?</a>
<li> <a href="#d18">What are the rainbow books and how can I get them?</a> </ol>
<p>
(<em>Italic</em> indicates updated questions, while <strong>bold</strong>
indicates new questions.)

</p> <p> </p> <hr> <p>

<a name="d01">1. What are some FTP sites of interest to hackers?</a>
</p> <pre>
<a href="ftp://204.215.84.2/pub/users-www/dmackey"><strong>204.215.84.2</strong></a> /pub/users-www/dmackey
<a href="ftp://aeneas.mit.edu">aeneas.mit.edu</a> (Kerberos)
<a href="ftp://alex.sp.cs.cmu.edu/links/security">alex.sp.cs.cmu.edu</a> /links/security (Misc)
<a href="ftp://asylum.sf.ca.us">asylum.sf.ca.us</a> (CyberWarriors of Xanadu)
<a href="ftp://atari.archive.umich.edu/pub/atari/Utilities/pgp261st.zip"><strong>atari.archive.umich.edu</strong></a> /pub/atari/Utilities/pgp261st.zip (Atari PGP)
<a href="ftp://athena-dist.mit.edu/pub/ATHENA">athena-dist.mit.edu</a> /pub/ATHENA (Athena Project)
<a href="ftp://atlantis.utmb.edu">atlantis.utmb.edu</a> (Anti-virus)
<a href="ftp://cert.org">cert.org</a> (CERT)
<a href="ftp://ciac.llnl.gov">ciac.llnl.gov</a> (CIAC)
<a href="ftp://cnit.nsk.su/pub/security">cnit.nsk.su</a> /pub/security (Security)
<a href="ftp://coast.cs.purdue.edu/pub">coast.cs.purdue.edu</a> /pub (Security/COAST)
<a href="ftp://coombs.anu.edu.au/pub/security">coombs.anu.edu.au</a> /pub/security (Security)
<a href="ftp://csrc.ncsl.nist.gov">csrc.ncsl.nist.gov</a> (NIST Security)
<a href="ftp://ds.internic.net">ds.internic.net</a> (Internet documents)
<a href="ftp://ftp.2600.com">ftp.2600.com</a> (2600 Magazine)
<a href="ftp://ftp.acns.nwu.edu/pub">ftp.acns.nwu.edu</a> /pub (Mac Anti-virus)
<a href="ftp://ftp.acsu.buffalo.edu/pub/security">ftp.acsu.buffalo.edu</a> /pub/security & /pub/irc (Security & IRC)
<a href="ftp://ftp.alantec.com/pub/tcpr">ftp.alantec.com</a> /pub/tcpr (Tcpr)
<a href="ftp://ftp.armory.com/pub/user/kmartind">ftp.armory.com</a> /pub/user/kmartind (H/P)
<a href="ftp://ftp.auscert.org.au/pub">ftp.auscert.org.au</a> /pub (Australian CERT)
<a href="ftp://ftp.bellcore.com">ftp.bellcore.com</a> (Bellcore)
<a href="ftp://ftp.cerf.net/pub/software/unix/security">ftp.cerf.net</a> /pub/software/unix/security (CERFnet)
<a href="ftp://ftp.cert.dfn.de">ftp.cert.dfn.de</a> (FIRST)
<a href="ftp://ftp.cisco.com">ftp.cisco.com</a> (Cisco)
<a href="ftp://ftp.cs.colorado.edu">ftp.cs.colorado.edu</a>
<a href="ftp://ftp.cs.ruu.nl/pub/SECURITY">ftp.cs.ruu.nl</a> /pub/SECURITY (Security & PGP)
<a href="ftp://ftp.cs.uwm.edu/pub/comp-privacy">ftp.cs.uwm.edu</a> /pub/comp-privacy (Privacy Digest)
<a href="ftp://ftp.cs.vu.nl">ftp.cs.vu.nl</a>
<a href="ftp://ftp.cs.yale.edu">ftp.cs.yale.edu</a>
<a href="ftp://ftp.csi.forth.gr/pub/security">ftp.csi.forth.gr</a> /pub/security
<a href="ftp://ftp.csl.sri.com/pub/nides">ftp.csl.sri.com</a> /pub/nides (SRI)
<a href="ftp://ftp.csn.org/mpj">ftp.csn.org</a> /mpj (Cryptology)
<a href="ftp://ftp.cso.uiuc.edu/security">ftp.cso.uiuc.edu</a> /security
<a href="ftp://ftp.csua.berkeley.edu/pub/cypherpunks">ftp.csua.berkeley.edu</a> /pub/cypherpunks (Crypto)
<a href="ftp://ftp.dartmouth.edu/pub/security">ftp.dartmouth.edu</a> /pub/security (Security)
<a href="ftp://ftp.delmarva.com">ftp.delmarva.com</a>
<a href="ftp://ftp.demon.co.uk/pub/misc/general/0800num.txt"><strong>ftp.demon.co.uk</strong></a> /pub/misc/general/0800num.txt (0800/0500 numbers)
<a href="ftp://ftp.denet.dk/pub/security/tools/satan">ftp.denet.dk</a> /pub/security/tools/satan
<a href="ftp://ftp.digex.net/pub/access/dunk">ftp.digex.net</a> /pub/access/dunk
<a href="ftp://ftp.dimensional.com/users/jericho"><strong>ftp.dimensional.com</strong></a> /users/jericho (H/P)
<a href="ftp://ftp.dimensional.com/users/srain"><strong>ftp.dimensional.com</strong></a> /users/srain (H/P+Virus)
<a href="ftp://ftp.ee.lbl.gov">ftp.ee.lbl.gov</a>
<a href="ftp://ftp.eff.org/pub/Publications/CuD">ftp.eff.org</a> /pub/Publications/CuD (EFF)
<a href="ftp://ftp.elelab.nsc.co.jp/pub/security">ftp.elelab.nsc.co.jp</a> /pub/security (Security)
<a href="ftp://ftp.etext.org">ftp.etext.org</a> (Etext)
<a href="ftp://ftp.etext.org/pub/Zines/PrivateLine">ftp.etext.org</a> /pub/Zines/PrivateLine (PrivateLine)
<a href="ftp://ftp.fastlane.net/pub/nomad"><strong>ftp.fastlane.net</strong></a> /pub/nomad
<a href="ftp://ftp.fc.net/pub/defcon">ftp.fc.net</a> /pub/defcon (DefCon)
<a href="ftp://ftp.fc.net/pub/defcon/BBEEP">ftp.fc.net</a> /pub/defcon/BBEEP (BlueBeep)
<a href="ftp://ftp.fc.net/pub/phrack">ftp.fc.net</a> /pub/phrack (Phrack)
<a href="ftp://ftp.foobar.com">ftp.foobar.com</a>
<a href="ftp://ftp.funet.fi/pub/doc/CuD">ftp.funet.fi</a> /pub/doc/CuD
<a href="ftp://ftp.giga.or.at/pub/hacker/">ftp.giga.or.at</a> /pub/hacker/ (H/P)
<a href="ftp://ftp.greatcircle.com/pub/firewalls">ftp.greatcircle.com</a> /pub/firewalls (Firewalls)
<a href="ftp://ftp.ieunet.ie/pub/security">ftp.ieunet.ie</a> /pub/security (Security)
<a href="ftp://ftp.ifi.uio.no">ftp.ifi.uio.no</a>
<a href="ftp://ftp.indirect.com/www/evildawg/public_access">ftp.indirect.com</a> /www/evildawg/public_access
<a href="ftp://ftp.info.fundp.ac.be">ftp.info.fundp.ac.be</a>
<a href="ftp://ftp.infonexus.com">ftp.infonexus.com</a> (The Guild)
<a href="ftp://ftp.informatik.uni-hamburg.de">ftp.informatik.uni-hamburg.de</a>
<a href="ftp://ftp.informatik.uni-kiel.de/pub/sources/security">ftp.informatik.uni-kiel.de</a> /pub/sources/security
<a href="ftp://ftp.inoc.dl.nec.com/pub/security">ftp.inoc.dl.nec.com</a> /pub/security (Security)
<a href="ftp://ftp.isi.edu">ftp.isi.edu</a>
<a href="ftp://ftp.leo.org/pub/comp/os/os2/crypt"><strong>ftp.leo.org</strong></a> /pub/comp/os/os2/crypt
<a href="ftp://ftp.lerc.nasa.gov/security">ftp.lerc.nasa.gov</a> /security
<a href="ftp://ftp.llnl.gov/pub">ftp.llnl.gov</a> /pub (CIAC)
<a href="ftp://ftp.luth.se/pub/unix/security">ftp.luth.se</a> /pub/unix/security
<a href="ftp://ftp.lysator.liu.se">ftp.lysator.liu.se</a>
<a href="ftp://ftp.mathematik.uni-ulm.de/pub/security">ftp.mathematik.uni-ulm.de</a> /pub/security (Security)
<a href="ftp://ftp.mcs.anl.gov/pub/security">ftp.mcs.anl.gov</a> /pub/security
<a href="ftp://ftp.nec.com">ftp.nec.com</a>
<a href="ftp://ftp.net.ohio-state.edu/pub/security/satan">ftp.net.ohio-state.edu</a> /pub/security/satan
<a href="ftp://ftp.netcom.com/pub/va/vandal">ftp.netcom.com</a> /pub/va/vandal (DnA)
<a href="ftp://ftp.netcom.com/pub/zz/zzyzx">ftp.netcom.com</a> /pub/zz/zzyzx (H/P)
<a href="ftp://ftp.netsys.com">ftp.netsys.com</a>
<a href="ftp://ftp.nmt.edu/pub/misc">ftp.nmt.edu</a> /pub/misc (Terrorist Handbook)
<a href="ftp://ftp.ocs.mq.edu.au/PC/Crypt">ftp.ocs.mq.edu.au</a> /PC/Crypt (Cryptology)
<a href="ftp://ftp.ox.ac.uk/pub/comp/security">ftp.ox.ac.uk</a> /pub/comp/security
<a href="ftp://ftp.ox.ac.uk/pub/crypto">ftp.ox.ac.uk</a> /pub/crypto (Cryptology)
<a href="ftp://ftp.ox.ac.uk/pub/wordlists">ftp.ox.ac.uk</a> /pub/wordlists (Wordlists)
<a href="ftp://ftp.paranoia.com/pub/toneloc/tl110.zip">ftp.paranoia.com</a> /pub/toneloc/tl110.zip (ToneLoc)
<a href="ftp://ftp.pipex.net/pub/areacode"><strong>ftp.pipex.net</strong></a> /pub/areacode (uk areacodes)
<a href="ftp://ftp.pop.psu.edu">ftp.pop.psu.edu</a>
<a href="ftp://ftp.rahul.net/pub/lps">ftp.rahul.net</a> /pub/lps (Home of the FAQ)
<a href="ftp://ftp.sert.edu.au">ftp.sert.edu.au</a>
<a href="ftp://ftp.sgi.com">ftp.sgi.com</a>
<a href="ftp://ftp.smartlink.net/pub/users/mikes/haq"><strong>ftp.smartlink.net</strong></a> /pub/users/mikes/haq
<a href="ftp://ftp.stanford.edu/general/security-tools/swatch">ftp.stanford.edu</a> /general/security-tools/swatch (SWATCH)
<a href="ftp://ftp.sunet.se/pub/network/monitoring">ftp.sunet.se</a> /pub/network/monitoring (Ethernet sniffers)
<a href="ftp://ftp.technet.sg">ftp.technet.sg</a>
<a href="ftp://ftp.technion.ac.il"><em>ftp.technion.ac.il</em></a>
<a href="ftp://ftp.tis.com/pub">ftp.tis.com</a> /pub (TIS)
<a href="ftp://ftp.tisl.ukans.edu/pub/security">ftp.tisl.ukans.edu</a> /pub/security
<a href="ftp://ftp.uni-koeln.de">ftp.uni-koeln.de</a> (Wordlists)
<a href="ftp://ftp.uspto.gov">ftp.uspto.gov</a>
<a href="ftp://ftp.uu.net/doc/literary/obi/Phracks">ftp.uu.net</a> /doc/literary/obi/Phracks (Zines)
<a href="ftp://ftp.uwp.edu/pub/dos/romulus/cracks">ftp.uwp.edu</a> /pub/dos/romulus/cracks (Copy Protection)
<a href="ftp://ftp.vis.colostate.edu">ftp.vis.colostate.edu</a>
<a href="ftp://ftp.vix.com">ftp.vix.com</a>
<a href="ftp://ftp.vortex.com">ftp.vortex.com</a>
<a href="ftp://ftp.warwick.ac.uk/pub/cud">ftp.warwick.ac.uk</a> /pub/cud (Zines)
<a href="ftp://ftp.wi.leidenuniv.nl/pub/security">ftp.wi.leidenuniv.nl</a> /pub/security
<a href="ftp://ftp.win.tue.nl/pub/security">ftp.win.tue.nl</a> /pub/security (Security)
<a href="ftp://ftp.wustl.edu/doc/EFF">ftp.wustl.edu</a> /doc/EFF (EFF)
<a href="ftp://ftp.wustl.edu/pub/aminet/util/crypt"><strong>ftp.wustl.edu</strong></a> /pub/aminet/util/crypt
<a href="ftp://ftp.zoom.com">ftp.zoom.com</a>
<a href="ftp://garbo.uwasa.fi/pc/crypt">garbo.uwasa.fi</a> /pc/crypt (Cryptology)
<a href="ftp://gemini.tuc.noao.edu/pub/grandi"><strong>gemini.tuc.noao.edu</strong></a> /pub/grandi
<a href="ftp://gti.net/pub/safetynet">gti.net</a> /pub/safetynet
<a href="ftp://gumby.dsd.trw.com">gumby.dsd.trw.com</a>
<a href="ftp://hplyot.obspm.fr">hplyot.obspm.fr</a>
<a href="ftp://idea.sec.dsi.unimi.it/pub/crypt/">idea.sec.dsi.unimi.it</a> /pub/crypt (Crypto)
<a href="ftp://info.mcs.anl.gov">info.mcs.anl.gov</a>
<a href="ftp://jerico.usc.edu">jerico.usc.edu</a>
<a href="ftp://l0pht.com">l0pht.com</a> (The L0pht)
<a href="ftp://lod.com">lod.com</a> (Legion of Doom)
<a href="ftp://mac.archive.umich.edu">mac.archive.umich.edu</a>
<a href="ftp://mirror.lcs.mit.edu/telecom-archives">mirror.lcs.mit.edu</a> /telecom-archives (Telecom archives)
<a href="ftp://monet.ccs.itd.umich.edu">monet.ccs.itd.umich.edu</a>
<a href="ftp://net-dist.mit.edu/pub/pgp"><strong>net-dist.mit.edu</strong></a> /pub/pgp
<a href="ftp://net.tamu.edu/pub/security/TAMU">net.tamu.edu</a> /pub/security/TAMU (Security)
<a href="ftp://nic.ddn.mil/scc">nic.ddn.mil</a> /scc (DDN Security)
<a href="ftp://oak.oakland.edu/pub/hamradio">oak.oakland.edu</a> /pub/hamradio (Ham Radio)
<a href="ftp://oak.oakland.edu/pub/simtelnet/msdos/sound">oak.oakland.edu</a> /pub/simtelnet/msdos/sound (DTMF decoders)
<a href="ftp://oak.oakland.edu/pub/simtelnet/msdos/sysutl">oak.oakland.edu</a> /pub/simtelnet/msdos/sysutl (BIOS attackers)
<a href="ftp://parcftp.xerox.com">parcftp.xerox.com</a>
<a href="ftp://relay.cs.toronto.edu/doc/telecom-archives">relay.cs.toronto.edu</a> /doc/telecom-archives (Telecom)
<a href="ftp://research.att.com/dist/internet_security">research.att.com</a> /dist/internet_security (AT&T)
<a href="ftp://ripem.msu.edu/pub/crypt">ripem.msu.edu</a> /pub/crypt (Ripem)
<a href="ftp://rtfm.mit.edu">rtfm.mit.edu</a> (Etext)
<a href="ftp://rtfm.mit.edu/pub/usenet-by-group">rtfm.mit.edu</a> /pub/usenet-by-group (Usenet FAQ's)
<a href="ftp://scss3.cl.msu.edu/pub/crypt">scss3.cl.msu.edu</a> /pub/crypt (Cryptology)
<a href="ftp://sgigate.sgi.com/Security"><strong>sgigate.sgi.com</strong></a> /Security (SGI Security)
<a href="ftp://src.doc.ic.ac.uk/usenet/uk.telecom"><strong>src.doc.ic.ac.uk</strong></a> /usenet/uk.telecom (uk.telecom archives)
<a href="ftp://sunsolve1.sun.com">sunsolve1.sun.com</a>
<a href="ftp://theta.iis.u-tokyo.ac.jp/security">theta.iis.u-tokyo.ac.jp</a> /security (Security)
<a href="ftp://ugle.unit.no">ugle.unit.no</a>
<a href="ftp://vic.cc.purdue.edu">vic.cc.purdue.edu</a>
<a href="ftp://whacked.l0pht.com">whacked.l0pht.com</a> (Mac + H/P)
</pre> <p>
(<em>Italic</em> indicates updated sites, while <strong>bold</strong>
indicates new sites.)

</p> <p> </p> <hr> <p>

<a name="d02">2. What are some fsp sites of interest to hackers?</a>

</p> <p>
None at this time.

</p> <p> </p> <hr> <p>

<a name="d03">3. What are some newsgroups of interest to hackers?</a>

</p> <pre>
<a href="news:alt.2600">alt.2600</a> Do it 'til it Hertz
<a href="news:alt.2600hz"><strong>alt.2600hz</strong></a>
<a href="news:alt.2600.codez"><strong>alt.2600.codez</strong></a>
<a href="news:alt.2600.debate"><strong>alt.2600.debate</strong></a>
<a href="news:alt.2600.moderated"><strong>alt.2600.moderated</strong></a>
<a href="news:alt.cellular">alt.cellular</a>
<a href="news:alt.cellular-phone-tech">alt.cellular-phone-tech</a> Brilliant telephony mind blow netnews naming
<a href="news:alt.comp.virus">alt.comp.virus</a> An unmoderated forum for discussing viruses
<a href="news:alt.comp.virus.source.code">alt.comp.virus.source.code</a>
<a href="news:alt.cracks">alt.cracks</a> Heavy toolbelt wearers of the world, unite
<a href="news:alt.cyberpunk">alt.cyberpunk</a> High-tech low-life.
<a href="news:alt.cyberspace">alt.cyberspace</a> Cyberspace and how it should work.
<a href="news:alt.dcom.telecom">alt.dcom.telecom</a> Discussion of telecommunications technology
<a href="news:alt.engr.explosives">alt.engr.explosives</a> [no description available]
<a href="news:alt.fan.kevin-mitnick">alt.fan.kevin-mitnick</a>
<a href="news:alt.fan.lewiz">alt.fan.lewiz</a> Lewis De Payne fan club
<a href="news:alt.hackers">alt.hackers</a> Descriptions of projects currently under development
<a href="news:alt.hackintosh">alt.hackintosh</a>
<a href="news:alt.locksmithing">alt.locksmithing</a> You locked your keys in *where*?
<a href="news:alt.hackers.malicious">alt.hackers.malicious</a> The really bad guys - don't take candy from them
<a href="news:alt.ph.uk">alt.ph.uk</a> United Kingdom version of alt.2600
<a href="news:alt.privacy.anon-server">alt.privacy.anon-server</a> Tech. & policy matters of anonymous contact servers
<a href="news:alt.radio.pirate">alt.radio.pirate</a> Hide the gear, here comes the magic station-wagons.
<a href="news:alt.radio.scanner">alt.radio.scanner</a> Discussion of scanning radio receivers.
<a href="news:alt.satellite.tv.europe">alt.satellite.tv.europe</a> All about European satellite tv
<a href="news:alt.security">alt.security</a> Security issues on computer systems
<a href="news:alt.security.index">alt.security.index</a> Pointers to good stuff in misc.security (Moderated)
<a href="news:alt.security.keydist">alt.security.keydist</a> Exchange of keys for public key encryption systems
<a href="news:alt.security.pgp">alt.security.pgp</a> The Pretty Good Privacy package
<a href="news:alt.security.ripem">alt.security.ripem</a> A secure email system illegal to export from the US
<a href="news:comp.dcom.cellular">comp.dcom.cellular</a> [no description available]
<a href="news:comp.dcom.telecom">comp.dcom.telecom</a> Telecommunications digest (Moderated)
<a href="news:comp.dcom.telecom.tech">comp.dcom.telecom.tech</a> [no description available]
<a href="news:comp.org.cpsr.announce">comp.org.cpsr.announce</a> Computer Professionals for Social Responsibility
<a href="news:comp.org.cpsr.talk">comp.org.cpsr.talk</a> Issues of computing and social responsibility
<a href="news:comp.org.eff.news">comp.org.eff.news</a> News from the Electronic Frontier Foundation
<a href="news:comp.org.eff.talk">comp.org.eff.talk</a> Discussion of EFF goals, strategies, etc.
<a href="news:comp.os.netware.security"><strong>comp.os.netware.security</strong></a> Netware Security issues
<a href="news:comp.protocols.kerberos">comp.protocols.kerberos</a> The Kerberos authentification server
<a href="news:comp.protocols.tcp-ip">comp.protocols.tcp-ip</a> TCP and IP network protocols
<a href="news:comp.risks">comp.risks</a> Risks to the public from computers & users
<a href="news:comp.security.announce">comp.security.announce</a> Announcements from CERT about security
<a href="news:comp.security.firewalls"><strong>comp.security.firewalls</strong></a> Anything pertaining to network firewall security
<a href="news:comp.security.misc">comp.security.misc</a> Security issues of computers and networks
<a href="news:comp.security.unix">comp.security.unix</a> Discussion of Unix security
<a href="news:comp.virus">comp.virus</a> Computer viruses & security (Moderated)
<a href="news:de.org.ccc">de.org.ccc</a> Mitteilungen des CCC e.V.
<a href="news:misc.security">misc.security</a> Security in general, not just computers (Moderated)
<a href="news:rec.pyrotechnics">rec.pyrotechnics</a> Fireworks, rocketry, safety, & other topics
<a href="news:rec.radio.scanner">rec.radio.scanner</a> [no description available]
<a href="news:rec.video.cable-tv">rec.video.cable-tv</a> Technical and regulatory issues of cable television.
<a href="news:sci.crypt">sci.crypt</a> Different methods of data en/decryption
</pre>
(<em>Italic</em> indicates updated groups, while <strong>bold</strong>
indicates new groups.)

<p> </p> <hr> <p>

<a name="d04">4. What are some telnet sites of interest to hackers?</a>
</p> <pre>
<a href="telnet://anarchy-online.com">anarchy-online.com</a>
<a href="telnet://ntiabbs.ntia.doc.gov">ntiabbs.ntia.doc.gov</a> (NTIA)
<a href="telnet://lust.isca.uiowa.edu:2600">lust.isca.uiowa.edu 2600</a> (underground bbs) (temporarily down)
<a href="telnet://spy.org"><strong>spy.org</strong></a> (Computer Systems Consulting)
</pre>
(<em>Italic</em> indicates updated sites, while <strong>bold</strong>
indicates new sites.)

<p> </p> <hr> <p>

<a name="d05">5. What are some gopher sites of interest to hackers?</a>
</p> <pre>
<a href="gopher://csrc.ncsl.nist.gov">csrc.ncsl.nist.gov</a> (NIST Security Gopher)
<a href="gopher://gopher.cpsr.org">gopher.cpsr.org</a> (Computer Professionals for Social Responsibility)
<a href="gopher://gopher.eff.org">gopher.eff.org</a> (Electonic Frontier Foundation)
<a href="gopher://gopher.panix.com"><strong>gopher.panix.com</strong></a> (Panix)
<a href="gopher://iitf.doc.gov">iitf.doc.gov</a> (NITA -- IITF)
<a href="gopher://info.itu.ch"><strong>info.itu.ch</strong></a> (International Telegraph Union)
<a href="gopher://ncjrs.aspensys.com">ncjrs.aspensys.com</a> (National Criminal Justice Reference Service)
<a href="gopher://oss.net">oss.net</a> (Open Source Solutions)
<a href="gopher://wiretap.spies.com">wiretap.spies.com</a> (Wiretap)
</pre>

<p> </p> <hr> <p>
<a name="d06">6. What are some World wide Web (WWW) sites of interest to hackers?</a>
</p> <pre>
<a href="http://alumni.caltech.edu/~dank/isdn">alumni.caltech.edu/~dank/isdn</a> (ISDN)
<a href="http://att.net/dir800">att.net/dir800</a> (800 directory)
<a href="http://ausg.dartmouth.edu/security.html">ausg.dartmouth.edu/security.html</a> (UNIX Security Topics)
<a href="http://ccnga.uwaterloo.ca/~jscouria/GSM"><strong>ccnga.uwaterloo.ca/~jscouria/GSM</strong></a> (GSM Specification)
<a href="http://cell-relay.indiana.edu/cell-relay"><strong>cell-relay.indiana.edu/cell-relay</strong></a> (Cell Relay Retreat)
<a href="http://ciac.llnl.gov"><strong>ciac.llnl.gov</strong></a> (CIAC Web Site)
<a href="http://csrc.ncsl.nist.gov"><strong>csrc.ncsl.nist.gov</strong></a> (NIST)
<a href="http://daemon.apana.org.au/~longi">daemon.apana.org.au/~longi</a>
<a href="http://dcpu1.cs.york.ac.uk:6666/fisher/telecom"><strong>dcpu1.cs.york.ac.uk:6666/fisher/telecom</strong></a> (Embryonic Telephone History Page)
<a href="http://freeside.com/phrack.html"><strong>freeside.com/phrack.html</strong></a> (Phrack Magazine)
<a href="http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html">ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html</a> (Sterling)
<a href="http://info.gte.com"><strong>info.gte.com</strong></a> (GTE Labrotories)
<a href="http://info.mcc.ac.uk/Orange/"><strong>info.mcc.ac.uk/Orange/</strong></a> (Orange)
<a href="http://infosec.nosc.mil/infosec.html">infosec.nosc.mil/infosec.html</a> (SPAWAR INFOSEC)
<a href="http://iss.net/iss"><strong>iss.net/iss</strong></a> (Internet Security Systems)
<a href="http://jumper.mcc.ac.uk/~afs/telecom"><strong>jumper.mcc.ac.uk/~afs/telecom</strong></a> (UK Telecom Pricing Information)
<a href="http://l0pht.com">l0pht.com</a> (The l0pht)
<a href="http://l0pht.com/~spacerog/index.html"><strong>l0pht.com/~spacerog/index.html</strong></a> (Whacked Mac Archives)
<a href="http://lod.com"><strong>lod.com</strong></a> (Legion of Doom)
<a href="http://meridian.jammin.net/underground"><em>meridian.jammin.net/underground</em></a> (Underground Links)
<a href="http://mnementh.cs.adfa.oz.au/Lawrie_Brown.html"><strong>mnementh.cs.adfa.oz.au/Lawrie_Brown.html</strong></a> (Lawrie Brown's crypto bibliography)
<a href="http://motserv.indirect.com">motserv.indirect.com</a> (Motorola)
<a href="http://nasirc.nasa.gov/NASIRC_home.html"><em>nasirc.nasa.gov/NASIRC_home.html</em></a> (NASIRC)
<a href="http://pages.ripco.com:8080/~glr/glr.html">pages.ripco.com:8080/~glr/glr.html</a> (Full Disclosure)
<a href="http://rschp2.anu.edu.au:8080/crypt.html"><strong>rschp2.anu.edu.au:8080/crypt.html</strong></a>
<a href="http://seclab.cs.ucdavis.edu/Security.html"><em>seclab.cs.ucdavis.edu/Security.html</em></a> (Security)
<a href="http://seclab.cs.ucdavis.edu/Security.html"><strong>seclab.cs.ucdavis.edu/Security.html</strong></a> (UCDavis.edu Security Page)
<a href="http://seclab.cs.ucdavis.edu/slides/slides.html"><em>seclab.cs.ucdavis.edu/slides/slides.html</em></a> (Security Lab Slides)
<a href="http://seclab.cs.ucdavis.edu/slides/slides.html"><strong>seclab.cs.ucdavis.edu/slides/slides.html</strong></a> (Security Lab Slides)
<a href="http://smurfland.cit.buffalo.edu/NetMan/index.html"><strong>smurfland.cit.buffalo.edu/NetMan/index.html</strong></a> (Network Management)
<a href="http://sunsite.unc.edu/sun/inform/sun-info.html"><strong>sunsite.unc.edu/sun/inform/sun-info.html</strong></a> (Sun Microsystems Sponsor Page)
<a href="http://support.mayfield.hp.com"><strong>support.mayfield.hp.com</strong></a> (Hewlett Packard SupportLine Services)
<a href="http://the-tech.mit.edu">the-tech.mit.edu</a> (LaMacchia case info)
<a href="http://town.hall.org/university/security/stoll/cliff.html"><strong>town.hall.org/university/security/stoll/cliff.html</strong></a> (Cliff Stoll)
<a href="http://turnpike.net/emporium/C/celestial/celest.html">turnpike.net/emporium/C/celestial/celest.html</a> (Detective Databases 1995)
<a href="http://web.mit.edu/network/pgp.html"><strong>web.mit.edu/network/pgp.html</strong></a> (Getting PGP)
<a href="http://weber.u.washington.edu/~phantom/cpunk/index.html"><em>weber.u.washington.edu/~phantom/cpunk/index.html</em></a> (Cryptology)
<a href="http://wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html"><strong>wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html</strong></a> (Klon's Underground Links)
<a href="http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html"><strong>www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html</strong></a>
<a href="http://www-ns.rutgers.edu/www-security/index.html"><strong>www-ns.rutgers.edu/www-security/index.html</strong></a> (Rutger's documents on WWW security)
<a href="http://www-personal.engin.umich.edu/~jgotts/underground/boxes.html"><em>www-personal.engin.umich.edu/~jgotts/underground/boxes.html</em></a> (Box info)
<a href="http://www-swiss.ai.mit.edu/~bal/pks-toplev.html"><strong>www-swiss.ai.mit.edu/~bal/pks-toplev.html</strong></a> (Findingsomeone's PGP key)
<a href="http://www.2600.com">www.2600.com</a> (2600 Magazine)
<a href="http://www.8lgm.org"><strong>www.8lgm.org</strong></a> (8lgm Security Advisories)
<a href="http://www.aads.net">www.aads.net</a> (Ameritech)
<a href="http://www.access.gpo.gov/su_docs"><strong>www.access.gpo.gov/su_docs</strong></a>
<a href="http://www.alw.nih.gov/WWW/security.html">www.alw.nih.gov/WWW/security.html</a> (Unix Security)
<a href="http://www.artech-house.com"><strong>www.artech-house.com</strong></a> (Artech House)
<a href="http://www.asg.unb.ca"><strong>www.asg.unb.ca</strong></a> (Atlantic Systems Group Mosaic Index)
<a href="http://www.aston.ac.uk/~bromejt/mobile.html"><strong>www.aston.ac.uk/~bromejt/mobile.html</strong></a> (Mobile Phone Service Locator)
<a href="http://www.att.com"><strong>www.att.com</strong></a> (ATT)
<a href="http://www.auditel.com"><strong>www.auditel.com</strong></a> (Auditel)
<a href="http://www.auscert.org.au"><strong>www.auscert.org.au</strong></a> (Australian CERT)
<a href="http://www.axent.com"><strong>www.axent.com</strong></a> (Axent Technologies)
<a href="http://www.bctel.com"><strong>www.bctel.com</strong></a> (BC Tel)
<a href="http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html">www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html</a> (X-Win)
<a href="http://www.bell.ca"><strong>www.bell.ca</strong></a> (Bell Canada)
<a href="http://www.bellatlantic.com/">www.bellatlantic.com</a> (Bell Atlantic)
<a href="http://www.bellcore.com/BETSI/betsi.html">www.bellcore.com/BETSI/betsi.html</a> (Betsi)
<a href="http://www.bellcore.com/SECURITY">www.bellcore.com/SECURITY</a> (Bellcore Security Products)
<a href="http://www.bellsouth.com">www.bellsouth.com</a> (BellSouth)
<a href="http://www.bianca.com/bump/ua"><strong>www.bianca.com/bump/ua</strong></a> (Unauthorized Access Home Page)
<a href="http://www.border.com"><strong>www.border.com</strong></a> (Border Network Technologies)
<a href="http://www.bt.co.uk"><strong>www.bt.co.uk</strong></a> (British Telecom)
<a href="http://www.careermosaic.com/cm/uswest"><em>www.careermosaic.com/cm/uswest</em></a> (USWest)
<a href="http://www.castle.net/~kobrien/telecom.html"><strong>www.castle.net/~kobrien/telecom.html</strong></a> (Telecom)
<a href="http://www.cco.caltech.edu/~rknop/amiga_pgp26.html"><strong>www.cco.caltech.edu/~rknop/amiga_pgp26.html</strong></a>
<a href="http://www.cdt.org/cda.html"><strong>www.cdt.org/cda.html</strong></a>
<a href="http://www.cec.wustl.edu/~dmm2/egs/egs.html"><strong>www.cec.wustl.edu/~dmm2/egs/egs.html</strong></a> (En Garde Systems)
<a href="http://www.cert.dfn.de">www.cert.dfn.de</a> (German First Team)
<a href="http://www.checkpoint.com"><strong>www.checkpoint.com</strong></a> (Checkpoint)
<a href="http://www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html">www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html</a>
<a href="http://www.cityscape.co.uk/users/ek80/index.html"><strong>www.cityscape.co.uk/users/ek80/index.html</strong></a> (Inside Cable Cover)
<a href="http://www.cohesive.com"><strong>www.cohesive.com</strong></a> (Cohesive Systems)
<a href="http://www.con.wesleyan.edu/~triemer/network/docservs.html">www.con.wesleyan.edu/~triemer/network/docservs.html</a>
<a href="http://www.cosc.georgetown.edu/~denning/crypto"><strong>www.cosc.georgetown.edu/~denning/crypto</strong></a> (The Cryptography Project)
<a href="http://www.cost.se"><strong>www.cost.se</strong></a> (COST Computer Security Technologies)
<a href="http://www.cpsr.org/home">www.cpsr.org/home</a> (CPSR)
<a href="http://www.crimson.com/isdn/telecomacry.txt"><strong>www.crimson.com/isdn/telecomacry.txt</strong></a> (Crimson's Telecommunications Acronyms)
<a href="http://www.crtc.gc.ca"><strong>www.crtc.gc.ca</strong></a> (CRTC - Canadian regulator)
<a href="http://www.cs.berkeley.edu/~raph/remailer-list.html"><strong>www.cs.berkeley.edu/~raph/remailer-list.html</strong></a> (Anon remailer list)
<a href="http://www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/sec.html"><em>www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/sec.html</em></a> (CMU Security)
<a href="http://www.cs.purdue.edu/coast/coast.html"><em>www.cs.purdue.edu/coast/coast.html</em></a> (Coast)
<a href="http://www.cs.purdue.edu/pcert/pcert.html"><strong>www.cs.purdue.edu/pcert/pcert.html</strong></a> (PCERT)
<a href="http://www.cs.tu-bs.de"><strong>www.cs.tu-bs.de</strong></a> (Network management Tools)
<a href="http://www.csl.sri.com">www.csl.sri.com</a> (SRI Computer Science Lab)
<a href="http://www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html"><strong>www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html</strong></a>
<a href="http://www.cwplc.com"><strong>www.cwplc.com</strong></a> (Cable and Wireless)
<a href="http://www.cybercafe.org/cybercafe/pubtel/pubdir.html">www.cybercafe.org/cybercafe/pubtel/pubdir.html</a> (CyberCafe)
<a href="http://www.cygnus.com/~gnu/export.html"><strong>www.cygnus.com/~gnu/export.html</strong></a> (Cryptography Export Control Archives)
<a href="http://www.datafellows.fi"><em>www.datafellows.fi</em></a> (Data Fellows (F-Prot))
<a href="http://www.datasync.com/~sotmesc/sotmesc.html"><strong>www.datasync.com/~sotmesc/sotmesc.html</strong></a> (SotMESC)
<a href="http://www.dcs.exeter.ac.uk/~aba"><strong>www.dcs.exeter.ac.uk/~aba</strong></a> (Cypherpunk)
<a href="http://www.demon.co.uk/mobiles"><strong>www.demon.co.uk/mobiles</strong></a> (C.C.Mobiles)
<a href="http://www.dhp.com"><strong>www.dhp.com</strong></a> (DataHaven Project)
<a href="http://www.dhp.com/~pluvius"><strong>www.dhp.com/~pluvius</strong></a> (Pluvius' Home Page)
<a href="http://www.digicash.com/ecash/ecash-home.html"><em>www.digicash.com/ecash/ecash-home.html</em></a> (Ecash Home Page)
<a href="http://www.digital.com/info/key-secure-index.html">www.digital.com/info/key-secure-index.html</a> (Digital Secure Systems)
<a href="http://www.dnai.com/~gui/index.html">www.dnai.com/~gui</a>
<a href="http://www.dtic.dla.mil/defenselink"><strong>www.dtic.dla.mil/defenselink</strong></a> (Office of the U.S. Secretary of Defense (OSD)
<a href="http://www.dtic.dla.mil/iac"><strong>www.dtic.dla.mil/iac</strong></a> (DoD Information Analysis Center (IAC) Hub Page)
<a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/about.html"><strong>www.eecs.nwu.edu/~jmyers/bugtraq/about.html</strong></a>
<a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/archives.html"><strong>www.eecs.nwu.edu/~jmyers/bugtraq/archives.html</strong></a>
<a href="http://www.eff.org"><strong>www.eff.org</strong></a>
<a href="http://www.eff.org/pub/Alerts"><strong>www.eff.org/pub/Alerts</strong></a>
<a href="http://www.eff.org/pub/Net_info/Tools/Crypto"><strong>www.eff.org/pub/Net_info/Tools/Crypto</strong></a>
<a href="http://www.engarde.com/~mcn">www.engarde.com/~mcn</a>
<a href="http://www.ensta.fr/internet/unix/sys_admin">www.ensta.fr/internet/unix/sys_admin</a> (System administration)
<a href="http://www.ericsson.nl"><strong>www.ericsson.nl</strong></a> (Ericsson)
<a href="http://www.etext.org/Zines">www.etext.org/Zines</a> (Zines)
<a href="http://www.farmstead.com"><strong>www.farmstead.com</strong></a> (Farmstead)
<a href="http://www.fastlane.net/homepages/thegnome"><strong>www.fastlane.net/homepages/thegnome</strong></a> (Simple Nomad)
<a href="http://www.fbi.gov"><em>www.fbi.gov</em></a> (FBI Homepage)
<a href="http://www.fedworld.gov">www.fedworld.gov</a> (Federal Government)
<a href="http://www.first.org">www.first.org</a> (FIRST)
<a href="http://www.flextel.com"><strong>www.flextel.com</strong></a> (FleXtel)
<a href="http://www.fonorola.net"><strong>www.fonorola.net</strong></a> (Fonorola (a Canadian carrier)
<a href="http://www.frus.com"><strong>www.frus.com</strong></a> (Firewalls R Us)
<a href="http://www.fsk.ethz.ch/fsk">www.fsk.ethz.ch/fsk</a> (CSSCR)
<a href="http://www.gbnet.net/kbridge">www.gbnet.net/kbridge</a> (KarlBridge)
<a href="http://www.ginch.org/~vixen"><strong>www.ginch.org/~vixen</strong></a> (Empire Times)
<a href="http://www.greatcircle.com">www.greatcircle.com</a> (Great Circle Associates)
<a href="http://www.gta.com"><strong>www.gta.com</strong></a> (Global Technology Associates)
<a href="http://www.gti.net/grayarea"><strong>www.gti.net/grayarea</strong></a> (Gray Areas)
<a href="http://www.hotwired.com"><em>www.hotwired.com</em></a> (Wired Magazine)
<a href="http://www.hpcc.gov/blue94/section.4.6.html">www.hpcc.gov/blue94/section.4.6.html</a> (NSA)
<a href="http://www.iacr.org/~iacr"><strong>www.iacr.org/~iacr</strong></a> (International Association of Cryptologic Research (IACR)
<a href="http://www.ic.gov"><strong>www.ic.gov</strong></a> (Central Intelligence Agency Home Page)
<a href="http://www.ifi.uio.no/pgp"><strong>www.ifi.uio.no/pgp</strong></a>
<a href="http://www.iminet.com/starlink"><strong>www.iminet.com/starlink</strong></a> (Starlink)
<a href="http://www.indirect.com/www/evildawg"><strong>www.indirect.com/www/evildawg</strong></a>
<a href="http://www.ingress.com"><strong>www.ingress.com</strong></a> (Ingress Communications)
<a href="http://www.io.org/~djcl/phoneb.html"><strong>www.io.org/~djcl/phoneb.html</strong></a>
<a href="http://www.iquest.net/~oseidler"><strong>www.iquest.net/~oseidler</strong></a> (Oliver Seidler's WWW Page)
<a href="http://www.itd.nrl.navy.mil/ITD/5540"><strong>www.itd.nrl.navy.mil/ITD/5540</strong></a> (NRL Center for High Assurance Computer Systems)
<a href="http://www.itu.ch/TELECOM"><strong>www.itu.ch/TELECOM</strong></a> (Telecom '95)
<a href="http://www.jedefense.com/jed.html"><strong>www.jedefense.com/jed.html</strong></a> (Journal of Electronic Defense)
<a href="http://www.l0pht.com/cdc.html"><strong>www.l0pht.com/cdc.html</strong></a> (Cult of the Dead Cow)
<a href="http://www.l0pht.com/radiophone"><strong>www.l0pht.com/radiophone</strong></a> (Radiophone Archive)
<a href="http://www.l0pht.com/~oblivion/IIRG.html"><strong>www.l0pht.com/~oblivion/IIRG.html</strong></a> (International Information Retrieval Guild Archive Site)
<a href="http://www.lat.com"><strong>www.lat.com</strong></a> (Los Altos Technologies)
<a href="http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html">www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html</a> (Security)
<a href="http://www.links.net"><strong>www.links.net</strong></a>
<a href="http://www.louisville.edu/~wrbake01"><strong>www.louisville.edu/~wrbake01</strong></a> (The GodZ of CyberSpacE)
<a href="http://www.lysator.liu.se:7500/mit-guide/mit-guide.html">www.lysator.liu.se:7500/mit-guide/mit-guide.html</a> (Lockpicking Guide)
<a href="http://www.mastercard.com"><strong>www.mastercard.com</strong></a> (Secure Electronic Payment Protocol)
<a href="http://www.mgmua.com/hackers/index.html">www.mgmua.com/hackers/index.html</a> (Hackers, the movie)
<a href="http://www.mhv.net/dcypher/keytrap.html"><strong>www.mhv.net/dcypher/keytrap.html</strong></a> (Key Trap Home Page)
<a href="http://www.milkyway.com"><strong>www.milkyway.com</strong></a> (Milkyway Networks Corporation)
<a href="http://www.mit.edu:8001/people/warlord/pgp-faq.html"><strong>www.mit.edu:8001/people/warlord/pgp-faq.html</strong></a> (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements)
<a href="http://www.mot.com"><strong>www.mot.com</strong></a> (Motorola)
<a href="http://www.mwjournal.com/mwj.html"><strong>www.mwjournal.com/mwj.html</strong></a> (Microwave Journal)
<a href="http://www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html"><strong>www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html</strong></a> (Security in Mosaic)
<a href="http://www.ncsl.nist.gov"><strong>www.ncsl.nist.gov</strong></a> (NIST Computer Systems Laboratory)
<a href="http://www.netpart.com"><strong>www.netpart.com</strong></a> (NetPartners)
<a href="http://www.nic.surfnet.nl/surfnet/security/cert-nl.html"><strong>www.nic.surfnet.nl/surfnet/security/cert-nl.html</strong></a> (CERT-NL)
<a href="http://www.nist.gov">www.nist.gov</a> (NIST)
<a href="http://www.nokia.com"><strong>www.nokia.com</strong></a> (Nokia)
<a href="http://www.nortel.com"><strong>www.nortel.com</strong></a> (Northern Telecom)
<a href="http://www.ntt.jp">www.ntt.jp</a> (Nippon Telephone)
<a href="http://www.nynex.co.uk/nynex"><strong>www.nynex.co.uk/nynex</strong></a> (NYNEX)
<a href="http://www.odci.gov"><em>www.odci.gov</em></a> (The CIA)
<a href="http://www.one2one.co.uk"><strong>www.one2one.co.uk</strong></a> (Mercury One-2-One)
<a href="http://www.open.gov.uk/oftel/oftelwww/oftelhm.htm"><strong>www.open.gov.uk/oftel/oftelwww/oftelhm.htm</strong></a> (OFTEL's Home Page)
<a href="http://www.openmarket.com/info/cryptography/applied_cryptography.html">www.openmarket.com/info/cryptography/applied_cryptography.html</a>
<a href="http://www.pacbell.com">www.pacbell.com</a> (Pacific Bell)
<a href="http://www.paranoia.com/hpa"><strong>www.paranoia.com/hpa</strong></a> (Paranoia's H/P/A Links)
<a href="http://www.paranoia.com/~darkfox"><strong>www.paranoia.com/~darkfox</strong></a> (Darkfox's Home Page)
<a href="http://www.paranoia.com/~ice9"><strong>www.paranoia.com/~ice9</strong></a> (Ice-9's Home Page)
<a href="http://www.paranoia.com/~mthreat">www.paranoia.com/~mthreat</a> (ToneLoc)
<a href="http://www.pegasus.esprit.ec.org/people/arne/pgp.html">www.pegasus.esprit.ec.org/people/arne/pgp.html</a>(PGP)
<a href="http://www.phantom.com/~darkcyde"><strong>www.phantom.com/~darkcyde</strong></a> (DarkCyde)
<a href="http://www.phred.org"><strong>www.phred.org</strong></a> (The Phred Networking Organization)
<a href="http://www.primenet.com/~kludge/haqr.html">www.primenet.com/~kludge/haqr.html</a> (Kludge)
<a href="http://www.quadralay.com/www/Crypt/Crypt.html">www.quadralay.com/www/Crypt/Crypt.html</a> (Quadralay Cryptography)
<a href="http://www.raptor.com"><strong>www.raptor.com</strong></a> (Raptor)
<a href="http://www.research.att.com">www.research.att.com</a> (AT&T)
<a href="http://www.rocksoft.com/rocksoft/integrity_links.html"><strong>www.rocksoft.com/rocksoft/integrity_links.html</strong></a>(Security and Integrity Links)
<a href="http://www.rogers.com"><strong>www.rogers.com</strong></a> (Rogers Communications)
<a href="http://www.rourkem.com">www.rourkem.com</a> (FakeMail FAQ)
<a href="http://www.rsa.com">www.rsa.com</a> (RSA Data Security)
<a href="http://www.safe.net">www.safe.net</a>
<a href="http://www.sctc.com"><strong>www.sctc.com</strong></a> (Secure Computing Corporation)
<a href="http://www.service.com/cm/uswest/usw1.html"><strong>www.service.com/cm/uswest/usw1.html</strong></a> (USWest)
<a href="http://www.soci.niu.edu/~cudigest"><strong>www.soci.niu.edu/~cudigest</strong></a>
<a href="http://www.somarsoft.com"><strong>www.somarsoft.com</strong></a> (Somarsoft)
<a href="http://www.soscorp.com"><strong>www.soscorp.com</strong></a> (Sources of Supply Corp)
<a href="http://www.spy.org">www.spy.org</a> (Computer Systems Consulting)
<a href="http://www.sri.com">www.sri.com</a> (SRI)
<a href="http://www.stentor.ca"><strong>www.stentor.ca</strong></a> (Stentor (Canadian telcos))
<a href="http://www.tecc.co.uk/public/uk-telecom/btns.html"><strong>www.tecc.co.uk/public/uk-telecom/btns.html</strong></a> (BT "star services")
<a href="http://www.telecom.ie"><strong>www.telecom.ie</strong></a> (Telecom Eireann)
<a href="http://www.telecoms-mag.com/tcs.html"><strong>www.telecoms-mag.com/tcs.html</strong></a> (Telecommunications Magazine)
<a href="http://www.telkom.co.za"><strong>www.telkom.co.za</strong></a> (Telkom S.A. Ltd)
<a href="http://www.telstra.com.au/info/security.html">www.telstra.com.au/info/security.html</a> (Security Reference Index)
<a href="http://www.tezcat.com/web/security/security_top_level.html">www.tezcat.com/web/security/security_top_level.html</a>
<a href="http://www.tis.com">www.tis.com</a> (Trusted Information Systems)
<a href="http://www.tregistry.com/ttr"><strong>www.tregistry.com/ttr</strong></a> (Telecomunications Training Courses)
<a href="http://www.tri.sbc.com">www.tri.sbc.com</a> (Southwestern Bell)
<a href="http://www.tricon.net/Comm/synapse">www.tricon.net/Comm/synapse</a> (Synapse Magazine)
<a href="http://www.uci.agh.edu.pl/pub/security">www.uci.agh.edu.pl/pub/security</a> (Security)
<a href="http://www.uknet.net/pnc"><strong>www.uknet.net/pnc</strong></a> (The Personal Number Company)
<a href="http://www.umcc.umich.edu/~doug/virus-faq.html">www.umcc.umich.edu/~doug/virus-faq.html</a> (Virus)
<a href="http://www.usfca.edu/crackdown/crack.html">www.usfca.edu/crackdown/crack.html</a> (Hacker Crackdown)
<a href="http://www.videotron.co.uk"><strong>www.videotron.co.uk</strong></a> (Videotron)
<a href="http://www.vodafone.co.uk"><strong>www.vodafone.co.uk</strong></a> (Vodafone)
<a href="http://www.vptt.ch/natel.html"><strong>www.vptt.ch/natel.html</strong></a> (Natel)
<a href="http://www.vtw.org"><strong>www.vtw.org</strong></a>
<a href="http://www.well.com/user/abacard"><strong>www.well.com/user/abacard</strong></a>
<a href="http://www.well.com/user/crunch"><strong>www.well.com/user/crunch</strong></a> (Captain Crunch)
<a href="http://www2.undernet.org:8080/~cs93jtl/IRC.html"><strong>www2.undernet.org:8080/~cs93jtl/IRC.html</strong></a> (IRC)
</pre> <p>
(<em>Italic</em> indicates updated sites, while <strong>bold</strong>
indicates new sites.)

</p> <p> </p> <hr> <p>

<a name="d07">7. What are some IRC channels of interest to hackers?</a>
</p> <pre>
#2600
#cellular
#hack
#phreak
#linux
#realhack
#root
#unix
#warez
</pre>

<p> </p> <hr> <p>

<a name="d08">8. What are some BBS's of interest to hackers?</a>
</p> <pre>
Rune Stone (203)832-8441 NUP: Cyberek
The Truth Sayer's Domain (210)493-9975
Hacker's Haven (303)343-4053
Independent Nation (413)573-1809
Ut0PiA (315)656-5135
underworld_1994.com (514)683-1894
Alliance Communications (612)251-8596
Maas-Neotek (617)855-2923
Apocalypse 2000 (708)676-9855
K0dE Ab0dE (713)579-2276
fARM R0Ad 666 (713)855-0261
kn0wledge Phreak &ltk0p&gt BBS (719)578-8288 NUP=NO NUP
<strong>The Edge of Reality</strong> (805)496-7460
Static Line (806)747-0802
Area 51 (908)526-4384
<strong>The Drunk Forces</strong> +972-3-5733477
</pre>
(<em>Italic</em> indicates updated sites, while <strong>bold</strong>
indicates new sites.)

<p> </p> <hr> <p>

<a name="d09">9. What books are available on this subject?</a>

</p> <h2>General Computer Security</h2>

<pre>
<em>Computer Security Basics</em>
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4

This is an excellent book. It gives a broad overview of
computer security without sacrificing detail. A must read for
the beginning security expert.

<em>Information Systems Security</em>
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0

<em>Computer Related Risks</em>
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X

<em>Computer Security Management</em>
Author: Karen Forcht
Publisher: Boyd and Fraser
Copyright Date: 1994
ISBN: 0-87835-881-1

<em>The Stephen Cobb Complete Book of PC and LAN Security</em>
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

<em>Security in Computing</em>
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1

<em>Building a Secure Computer System</em>
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2

<em>Modern Methods for Computer Security</em>
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN:

<em>Windows NT 3.5 Guidelines for Security, Audit and Control</em>
Author:
Publisher: Microsoft Press
Copyright Date:
ISBN: 1-55615-814-9

<em>Protection and Security on the Information Superhighway</em>
Author: Dr. Frederick B. Cohen)
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-11389-1

<em><strong>Commonsense Computer Security</strong></em>
Author: Martin Smith
Publisher: McGraw-Hill
Copyright Date: 1993
ISBN: 0-07-707805-5

<em><strong>Combatting Computer Crime</strong></em>
Author: Jerry Papke
Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
Copyright Date: 1992
ISBN: 0-8306-7664-3

<em><strong>Computer Crime: a Crimefighters Handbook</strong></em>
Author: David Icove, Karl Seger and William VonStorch
Publisher: O'Reilly & Associates
Copyright Date: 1995
ISBN: 1-56592-086-4
</pre>

<h2>Unix System Security</h2>

<pre>
<em>Practical Unix Security</em>
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2

Finally someone with a very firm grasp of Unix system security
gets down to writing a book on the subject. Buy this book.
Read this book.

<em>Firewalls and Internet Security</em>
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4

<em>Unix System Security</em>
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0

<em>Unix Security: A Practical Tutorial</em>
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6

<em>Unix System Security: A Guide for Users and Systems Administrators</em>
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4

<em>Unix System Security</em>
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3

<em>Unix Security for the Organization</em>
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2

<em><strong>Building Internet Firewalls</strong></em>
Author: D. Brent Chapman and Elizabeth D. Zwicky
Publisher: O'Reilly and Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-124-0

<em><strong>Unix System Security Essentials</strong></em>
Author: Christopher Braun
Publisher: Addison Wesley
Copyright Date: 1995
ISBN: 0-201-42775-3

<em><strong>Internet Firewalls and Network Security</strong></em>
Author: Karanjit S. Siyan and Chris Hare
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-437-6
</pre>

<h2>Network Security</h2>

<pre>
<em>Network Security Secrets</em>
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7

Not a total waste of paper, but definitely not worth the
$49.95 purchase price. The book is a rehash of previously
published information. The only secret we learn from reading
the book is that Sylvia Moon is a younger woman madly in love
with the older David Stang.

<em>Complete Lan Security and Control</em>
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7

<em>Network Security</em>
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4

<em><strong>Network Security: How to Plan For It and How to Achieve It</strong></em>
Author: Richard M. Baker
Publisher: McGraw-Hill, Inc.
Copyright Date:
ISBN: 0-07-005141-0

<em><strong>Network Security</strong></em>
Author: Steven L. Shaffer and Alan R. Simon
Publisher: Academic Press
Copyright Date: 1994
ISBN: 0-12-638010-4

<em><strong>Network Security: Private Communications in a Public World</strong></em>
Author: Charlie Kaufman, Radia Perlman and Mike Speciner
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-13-061466-1

<em><strong>Network and Internetwork Security: Principles and Practice</strong></em>
Author: William Stallings
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-02-415483-0

<em><strong>Implementing Internet Security</strong></em>
Author: William Stallings
Publisher: New Rider Publishing
Copyright Date: 1995
ISBN: 1-56205-471-6

<em><strong>Actually Useful Internet Security Techniques</strong></em>
Author: Larry J. Hughes, Jr.
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-508-9
</pre>

<h2>Cryptography</h2>

<pre>
<em>Applied Cryptography: Protocols, Algorithms, and Source Code in C</em>
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2

Bruce Schneier's book replaces all other texts on
cryptography. If you are interested in cryptography, this is
a must read. This may be the first and last book on
cryptography you may ever need to buy.

<em>Cryptography and Data Security</em>
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5

<em>Protect Your Privacy: A Guide for PGP Users</em>
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4

<em>Codebreakers</em>
Author: Kahn
Publisher: Simon and Schuster
Copyright Date:
ISBN:0-02-560460-0

<em>Codebreakers: The Inside Story of Bletchley Park</em>
Author: Francis Harry Hinsley and Alan Stripp
Publisher: Oxford University Press,
Copyright Date: 1993
ISBN:0-19-285304-X

<em>Cryptanalysis, a study of ciphers and their solution</em>
Author: Gaines, Helen Fouche
Publisher: Dover Publications
Copyright Date: 1956
ISBN:

<em><strong>Computer Privacy Handbook</strong></em>
Author: Andre' Bacard
Publisher: Peachpit Press
Copyright Date: 1995
ISBN: 1-56609-171-3

<em><strong>E-Mail Security with PGP and PEM</strong></em>
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-05318-X

<em><strong>PGP: Pretty Good Privacy</strong></em>
Author: Simson Garfinkel
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-098-8
</pre>

<h2>Programmed Threats</h2>

<pre>
<em>The Little Black Book of Computer Viruses</em>
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0

The original, and still the best, book on computer viruses.
No media hype here, just good clean technical information.

<em><strong>The Giant Black Book of Computer Viruses</strong></em>
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:

<em>Computer Viruses, Artificial Life and Evolution</em>
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1

<em>Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
Threats to Your System</em>
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X

<em>The Virus Creation Labs: A Journey Into the Underground</em>
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN:

<em>The Virus Creation Labs: A Journey Into the Underground</em>
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8

<em>A Short Course on Computer Viruses</em>
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2

<em><strong>Robert Slade's Guide to Computer Viruses</strong></em>
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0
</pre>

<h2>Telephony</h2>

<pre>
<em>Engineering and Operations in the Bell System</em>
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5

Although hopelessly out of date, this book remains *THE* book
on telephony. This book is 100% Bell, and is loved by phreaks
the world over.

<em>Telephony: Today and Tomorrow</em>
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9

<em>The Telecommunications Fact Book and Illustrated Dictionary</em>
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8

I find this dictionary to be an excellent reference book on
telephony, and I recommend it to anyone with serious
intentions in the field.

<em>Tandy/Radio Shack Cellular Hardware</em>
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:

<em>The Phone Book</em>
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-X

Listing of every cellular ID in the us, plus roaming ports,
and info numbers for each carrier.

<em>Principles of Caller I.D.</em>
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:
</pre>

<h2>Hacking History and Culture</h2>

<pre>
<em>The Hacker Crackdown: Law and Disorder on the Electronic Frontier</em>
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X

Bruce Sterling has recently released the book FREE to the net.
The book is much easier to read in print form, and the
paperback is only $5.99. Either way you read it, you will be
glad you did. Mr. Sterling is an excellent science fiction
author and has brought his talent with words to bear on the
hacking culture. A very enjoyable reading experience.

<em>Cyberpunk</em>
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X

<em>The Cuckoo's Egg</em>
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9

<em>Hackers: Heroes of the Computer Revolution</em>
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6
</pre>

<h2>Unclassified</h2>

<pre>
<em>The Hacker's Handbook</em>
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4

<em>Secrets of a Super Hacker</em>
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5

The Knightmare is no super hacker. There is little or no real
information in this book. The Knightmare gives useful advice
like telling you not to dress up before going trashing.
The Knightmare's best hack is fooling Loompanics into
publishing this garbage.

<em>The Day The Phones Stopped</em>
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6

Total garbage. Paranoid delusions of a lunatic. Less factual
data that an average issue of the Enquirer.

<em>Information Warfare</em>
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1

<em>An Illustrated Guide to the Techniques and Equipment of Electronic Warfare</em>
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8
</pre>
(<strong>Bold</strong> indicates new books.)

<p> </p> <hr> <p>

<a name="d10">10. What are some videos of interest to hackers?</a>
</p> <pre>
<em>Unauthorized Access</em> by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060

<em>Hacker's '95</em> - a Phon-E & R.F. Burns Production
See the video Emmanuel Goldstein thought would have the Feds knocking
at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y
fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric
BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the
Secret Service briefing on Operation Cyber Snare (recent cell busts)
Talks on Crypto, HERF, the Feds, etc. All information is presented
for educational purposes only. Not for sale to government or law
enforcement organizations. Running time aproximately 90 minutes.
$25.00 NTSC VHS
$35.00 PAL/Secam VHS
Custom Video Productions
(908)842-6378
<a href="mailto:videocvp@ix.netcom.com">videocvp@ix.netcom.com</a>
</pre>

<p> </p> <hr> <p>

<a name="d11">11. What are some mailing lists of interest to hackers?</a>

</p> <pre>
Academic Firewalls
Reflector Address:
Registration Address: Send a message to <a href="mailto:majordomo@greatcircle.com">majordomo@greatcircle.com</a>
containing the line "subscribe firewalls user@host"

<strong>The Alert</strong>
Registration Address: Send a message to <a href="mailto:request-alert@iss.net">request-alert@iss.net</a>
containing the line "subscribe alert"

Bugtraq
Reflector Address: <a href="mailto:bugtraq@fc.net">bugtraq@fc.net</a>
Registration Address: <a href="mailto:bugtraq-request@fc.net">bugtraq-request@fc.net</a>

Cert Tools
Reflector Address: <a href="mailto:cert-tools@cert.org">cert-tools@cert.org</a>
Registration Address: <a href="mailto:cert-tools-request@cert.org">cert-tools-request@cert.org</a>

Computers and Society
Reflector Address: <a href="mailto:comp-soc@limbo.intuitive.com">comp-soc@limbo.intuitive.com</a>
Registration Address: <a href="mailto:taylor@limbo.intuitive.com">taylor@limbo.intuitive.com</a>

Coordinated Feasibility Effort to Unravel State Data
Reflector Address: <a href="mailto:ldc-sw@cpsr.org">ldc-sw@cpsr.org</a>
Registration Address:

CPSR Announcement List
Reflector Address: <a href="mailto:cpsr-announce@cpsr.org">cpsr-announce@cpsr.org</a>
Registration Address:

CPSR - Intellectual Property
Reflector Address: <a href="mailto:cpsr-int-prop@cpsr.org">cpsr-int-prop@cpsr.org</a>
Registration Address:

CPSR - Internet Library
Reflector Address: <a href="mailto:cpsr-library@cpsr.org">cpsr-library@cpsr.org</a>
Registration Address:

<strong>Cypherpunks</strong>
Registration Address: Send a message to <a href="mailto:majordomo@toad.com">majordomo@toad.com</a>
containing the line "subscribe cypherpunks"

DefCon Announcement List
Reflector Address:
Registration Address: Send a message to <a href="mailto:majordomo@fc.net">majordomo@fc.net</a> containing
the line "subscribe dc-announce"

DefCon Chat List
Reflector Address:
Registration Address: Send a message to <a href="mailto:majordomo@fc.net">majordomo@fc.net</a> containing
the line "subscribe dc-stuff"

<strong>Discount Long Distance Digest</strong>
Registration Address: Send a message to: <a href="mailto:dld-request@webcom.com">dld-request@webcom.com</a>
containing the line "subscribe"

Electronic Payment
Reflector Address:
Registration Address: <a href="mailto:e-payment@cc.bellcore.com">e-payment@cc.bellcore.com</a>

IDS (Intruder Detection Systems)
Reflector Address:
Registration Address: Send a message to <a href="mailto:majordomo@wyrm.cc.uow.edu.au">majordomo@wyrm.cc.uow.edu.au</a>
containing the line "subscribe ids"

<strong>Information Warfare</strong>
Registration Address: E-mail <a href="mailto:iw@all.net">iw@all.net</a> with a request to be added.

<strong>Linux-Alert</strong>
Registration Address: <a href="mailto:majordomo@linux.nrao.edu">majordomo@linux.nrao.edu</a>

<strong>Linux-Security</strong>
Registration Address: <a href="mailto:majordomo@linux.nrao.edu">majordomo@linux.nrao.edu</a>

Macintosh Security
Reflector Address: <a href="mailto:mac-security@eclectic.com">mac-security@eclectic.com</a>
Registration Address: <a href="mailto:mac-security-request@eclectic.com">mac-security-request@eclectic.com</a>

NeXT Managers
Reflector Address:
Registration Address: <a href="mailto:next-managers-request@stolaf.edu">next-managers-request@stolaf.edu</a>

PGP3 announcement list
Reflector Address:
Registration Address: <a href="mailto:pgp-announce-request@lsd.com">pgp-announce-request@lsd.com</a>
Subject: Your Name <user@host>
Body: *ignored*

Phiber-Seream
Reflector Address:
Registration Address: Send a message to <a href="mailto:listserv@netcom.com">listserv@netcom.com</a>
containing the line "subscribe phiber-scream user@host"

phruwt-l (Macintosh H/P)
Reflector Address:
Registration Address: Send a message to <a href="mailto:filbert@netcom.com">filbert@netcom.com</a>
with the subject "phruwt-l"

rfc931-users
Reflector Address: <a href="mailto:rfc931-users@kramden.acf.nyu.edu">rfc931-users@kramden.acf.nyu.edu</a>
Registration Address: <a href="mailto:brnstnd@nyu.edu">brnstnd@nyu.edu</a>

RSA Users
Reflector Address: <a href="mailto:rsaref-users@rsa.com">rsaref-users@rsa.com</a>
Registration Address: <a href="mailto:rsaref-users-request@rsa.com">rsaref-users-request@rsa.com</a>

Surveillance/Security
Reflector Address:
Registration Address: Send a message to
<a href="mailto:surv-sec-request@sleepless.acm.uiuc.edu">surv-sec-request@sleepless.acm.uiuc.edu</a> with
"subscribe" in the subject.

WWW Security
Reflector Address:
Registration Address: <a href="mailto:www-security@ns2.rutgers.edu">www-security@ns2.rutgers.edu</a>
</pre>
(<em>Italic</em> indicates updated lists, while <strong>bold</strong>
indicates new lists.)

<p> </p> <hr> <p>

<a name="d12">12. What are some print magazines of interest to hackers?</a>

</p> <h2>2600 - The Hacker Quarterly</h2>

<pre>
E-mail addresses: <a href="mailto:info@2600.com">info@2600.com</a> - to get info on 2600
<a href="mailto:index@2600.com">index@2600.com</a> - to get a copy of our index
<a href="mailto:meetings@2600.com">meetings@2600.com</a> - for info on starting your own meeting
<a href="mailto:subs@2600.com">subs@2600.com</a> - for subscription problems
<a href="mailto:letters@2600.com">letters@2600.com</a> - to send us a letter
<a href="mailto:articles@2600.com">articles@2600.com</a> - to send us an article
<a href="mailto:2600@2600.com">2600@2600.com</a> - to send us a general message

Subscription Address: 2600 Subscription Dept
PO Box 752
Middle Island, NY 11953-0752

Letters and article submission address: 2600 Editorial Dept
PO Box 99
Middle Island, NY 11953-0099

Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626

Subscriptions: United States: $21/yr individual, $50 corporate.
Overseas: $30/yr individual, $65 corporate.
</pre>

<h2>Gray Areas</h2>

<pre>
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/or controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: <a href="mailto:grayarea@well.sf.ca.us">grayarea@well.sf.ca.us</a>
E-Mail Address: <a href="mailto:grayarea@netaxs.com">grayarea@netaxs.com</a>

U.S. Mail Address: Gray Areas
PO Box 808
Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
$34.00 4 issues foreign (shipped air mail)
</pre>

<h2>Privacy Newsletter</h2>

<pre>
Privacy Newsletter is a monthly newsletter devoted to showing
consumers how to get privacy and keep it.

E-Mail Address: <a href="mailto:privacy@interramp.com">privacy@interramp.com</a>

Subscription Address: Privacy Newsletter
P.O. Box 8206
Philadelphia, PA 19101-8206


Subscriptions: $99/yr (US) $149/yr (Overseas)
</pre>

<h2>Wired</h2>

<pre>
Subscription Address: <a href="mailto:subscriptions@wired.com">subscriptions@wired.com</a>
or: Wired
PO Box 191826
San Francisco, CA 94119-9866

Letters and article submission address: <a href="mailto:guidelines@wired.com">guidelines@wired.com</a>
or: Wired
544 Second Street
San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
</pre>

<h2>Nuts & Volts</h2>

<pre>
T & L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664
</pre>

<h2>Cybertek: The Cyberpunk Technical Journal</h2>

<pre>
P.O. Box 64
Brewster, NY 10509

Frequency: Bimonthly
Domestic Subscription Rate: $15/year (6 issues)
</pre>

<h2>PrivateLine</h2>

<pre>
5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

E-Mail: <a href="mailto:privateline@delphi.com">privateline@delphi.com</a>

Subscriptions: $24 a year for six issues

Text of back issues are at the etext archive at Michigan. Gopher over
or ftp to: <a href="ftp://ftp.etext.org/pub/Zines/PrivateLine">ftp.etext.org/pub/Zines/PrivateLine</a>
</pre>

<p> </p> <hr> <p>

<a name="d13">13. What are some e-zines of interest to hackers?</a>
</p> <pre>
<a href="ftp://ftp.etext.org/pub/Zines/CoTNo">CoTNo: Communications of The New Order</a> ftp.etext.org /pub/Zines/CoTNo
<a href="ftp://ftp.etext.org/pub/Zines/Emptimes">Empire Times</a> ftp.etext.org /pub/Zines/Emptimes
<a href="ftp://ftp.fc.net/pub/defcon/FEH">FEH</a> ftp.fc.net /pub/defcon/FEH
<a href="ftp://infonexus.com/pub/Philes/Zines/TheInfinityConcept">The Infinity Concept</a> infonexus.com
/pub/Philes/Zines/TheInfinityConcept
<a href="ftp://ftp.fc.net/pub/phrack">Phrack</a> ftp.fc.net /pub/phrack
</pre>

<p> </p> <hr> <p>

<a name="d14">14. What are some organizations of interest to hackers?</a>

<h2>Computer Professionals for Social Responsibility (CPSR)</h2>

CPSR empowers computer professionals and computer users to advocate
for the responsible use of information technology and empowers all who
use computer technology to participate in the public debate. As
technical experts, CPSR members provide the public and policymakers
with realistic assessments of the power, promise, and limitations of
computer technology. As an organization of concerned citizens, CPSR
directs public attention to critical choices concerning the
applications of computing and how those choices affect society.
</p> <p>
By matching unimpeachable technical information with policy
development savvy, CPSR uses minimum dollars to have maximum impact
and encourages broad public participation in the shaping of technology
policy.
</p> <p>
Every project we undertake is based on five principles:
</p>
<ul>
<li> We foster and support public discussion of and public
responsibility for decisions involving the use of computers in
systems critical to society.
<li> We work to dispel popular myths about the infallibility of
technological systems.
<li> We challenge the assumption that technology alone can solve
political and social problems.
<li> We critically examine social and technical issues within the
computer profession, nationally and internationally.
<li> We encourage the use of computer technology to improve the quality
of life.
</ul>
<pre>
CPSR Membership Categories
75 REGULAR MEMBER
50 Basic member
200 Supporting member
500 Sponsoring member
1000 Lifetime member
20 Student/low income member
50 Foreign subscriber
50 Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA 94301
415-322-3778
415-322-3798 (FAX)
E-mail: <a href="mailto:cpsr@csli.stanford.edu">cpsr@csli.stanford.edu</a>
</pre>

<h2>Electronic Frontier Foundation (EFF)</h2>

The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
of policies and activities that will advance freedom and openness in
computer-based communications. It is a member-supported, nonprofit
group that grew from the conviction that a new public interest
organization was needed in the information age; that this organization
would enhance and protect the democratic potential of new computer
communications technology. From the beginning, the EFF determined to
become an organization that would combine technical, legal, and public
policy expertise, and would apply these skills to the myriad issues
and concerns that arise whenever a new communications medium is born.
</p> <p>
Memberships are $20.00 per year for students, $40.00 per year for
regular members, and $100.00 per year for organizations.
</p> <pre>
The Electronic Frontier Foundation, Inc.
666 Pennsylvania Avenue S.E., Suite 303
Washington, D.C. 20003
+1 202 544 9237
+1 202 547 5481 FAX
Internet: <a href="mailto:eff@eff.org">eff@eff.org</a>
</pre>

<h2>Free Software Foundation (FSF)</h2>

<p>
The Free Software Foundation is dedicated to eliminating restrictions
on people's right to use, copy, modify, and redistribute computer
programs. We promote the development and use of free software in all
areas using computers. Specifically, we are putting together a
complete, integrated software system named "GNU" ("GNU's Not Unix",
pronounced "guh-new") that will be upwardly compatible with Unix.
Most parts of this system are already being used and distributed.
</p> <p>
The word "free" in our name refers to freedom, not price. You may or
may not pay money to get GNU software, but regardless you have two
specific freedoms once you get it: first, the freedom to copy a
program and give it away to your friends and co-workers; and second,
the freedom to change a program as you wish, by having full access to
source code. You can study the source and learn how such programs are
written. You may then be able to port it, improve it, and share your
changes with others. If you redistribute GNU software you may charge
a distribution fee or give it away, so long as you include the source
code and the GPL (GNU General Public License).
</p> <pre>
Free Software Foundation, Inc. Telephone: +1-617-876-3296
673 Massachusetts Avenue Fax: +1-617-492-9057
Cambridge, MA 02139-3309 USA Fax (in Japan): 0031-13-2473 (KDD)
Electronic mail: <a href="mailto:gnu@prep.ai.mit.edu">gnu@prep.ai.mit.edu</a> 0066-3382-0158 (IDC)
</pre> <p>
GNU is to be a complete integrated computational environment:
everything you need to work with a computer, either as a programmer or
as a person in an office or home. The core is an operating system,
which consists of a central program called a kernel that runs the
other programs on the computer, and a large number of ancillary
programs for handling files, etc. The Free Software Foundation is
developing an advanced kernel called the Hurd.
</p> <p>
A complete system has tools for programmers, such as compilers and
debuggers. It also has editors, sketchpads, calendars, calculators,
spreadsheets, databases, electronic mail readers, and Internet
navigators. The FSF already distributes most of the programs used in
an operating system, all the tools regularly used by programmers, and
much more.
</p>

<h2>The League for Programming Freedom (LPF)</h2>
<p>
The League for Programming Freedom is an organization of people who
oppose the attempt to monopolize common user interfaces through "look
and feel" copyright lawsuits. Some of us are programmers, who worry
that such monopolies will obstruct our work. Some of us are users,
who want new computer systems to be compatible with the interfaces we
know. Some are founders of hardware or software companies, such as
Richard P. Gabriel. Some of us are professors or researchers,
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
Boyer and Patrick Winston.
</p> <p>
"Look and feel" lawsuits aim to create a new class of government-
enforced monopolies broader in scope than ever before. Such a system
of user-interface copyright would impose gratuitous incompatibility,
reduce competition, and stifle innovation.
</p> <p>
We in the League hope to prevent these problems by preventing
user-interface copyright. The League is NOT opposed to copyright law
as it was understood until 1986 -- copyright on particular programs.
Our aim is to stop changes in the copyright system which would take
away programmers' traditional freedom to write new programs compatible
with existing programs and practices.
</p> <p>
Annual dues for individual members are $42 for employed professionals,
$10.50 for students, and $21 for others. We appreciate activists, but
members who cannot contribute their time are also welcome.
</p> <p>
To contact the League, phone (617) 243-4091, send Internet mail to the
address <a href="mailto:league@prep.ai.mit.edu">league@prep.ai.mit.edu</a>, or write to:
</p> <pre>
League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA
</pre>

<h2>SotMesc</h2>

Founded in 1989, SotMesc is dedicated to preserving the integrity and
cohesion of the computing society. By promoting computer education,
liberties and efficiency, we believe we can secure freedoms for all
computer users while retaining privacy.
<p>
SotMesc maintains the CSP Internet mailing list, the SotMesc
Scholarship Fund, and the SotMesc Newsletter.
</p> <p>
The SotMESC is financed partly by membership fees, and donations, but
mostly by selling hacking, cracking, phreaking, electronics, internet,
and virus information and programs on disk and bound paper media.
</p> <p>
SotMesc memberships are $20 to students and $40 to regular members.
</p> <pre>
SotMESC
P.O. Box 573
Long Beach, MS 39560
</pre>

<h2>Computer Emergency Response Team (CERT)</h2>

CERT is the Computer Emergency Response Team that was formed by the
Defense Advanced Research Projects Agency (DARPA) in November 1988 in
response to the needs exhibited during the Internet worm incident.
The CERT charter is to work with the Internet community to facilitate
its response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of computer
security issues, and to conduct research targeted at improving the
security of existing systems.
<p>
CERT products and services include 24-hour technical assistance for
responding to computer security incidents, product vulnerability
assistance, technical documents, and seminars. In addition, the team
maintains a number of mailing lists (including one for CERT
advisories) and provides an anonymous FTP server: cert.org
(192.88.209.5), where security-related documents, past CERT
advisories, and tools are archived.
</p> <pre>
CERT contact information:

U.S. mail address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
U.S.A.

Internet E-mail address
<a href="mailto:cert@cert.org">cert@cert.org</a>

Telephone number
+1 412-268-7090 (24-hour hotline)
CERT Coordination Center personnel answer
7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
emergencies during other hours.

FAX number
+1 412-268-6989
</pre>

<p> </p> <hr> <p>

<a name="d15">15. What are some radio programs of interest to hackers?</a>
</p> <pre>
Off The Hook New York 99.5 FM Wed 10pm EST
Full Disclosure Live Short Wave WWCR 5065 kHz Sun 8pm EST
Full Disclosure Live Oil City, PA WOYL AM-1340 Sun 8pm EST
Full Disclosure Live Satellite Telstar 302 (T2), Ch 21, 5.8 Sun 8pm EST
</pre>

<p> </p> <hr> <p>

<a name="d16">16. What are other FAQ's of interest to hackers?</a>
</p> <pre>
Frequently Asked Questions "Hacking Novell Netware"
Author: Simple Nomad <sn@spyder.org>
ftp: <a href="ftp://ftp.fastlane.net/pub/nomad/nw/faq.zip">ftp.fastlane.net</a> /pub/nomad/nw/faq.zip
ftp: <a href="ftp://ftp.best.com/pub/almcepud/hacks/faq.zip">ftp.best.com</a> /pub/almcepud/hacks/faq.zip
<a href="http://www.nmrc.org/faqs/netware">http://www.nmrc.org/faqs/netware</a>

The PGP Attack FAQ
Author: Route [daemon9@netcom.com / route@infonexus.com]
ftp: <a href="ftp://infonexus.com/pub/Philes/Cryptography/PGPattackFAQ.txt.gz">infonexus.com</a> /pub/Philes/Cryptography/PGPattackFAQ.txt.gz

Mac Hack FAQ: Defeating Security
Author: AX1P (<a href="mailto:an149689@anon.penet.fi">an149689@anon.penet.fi</a>)

Frequently Asked Questions About Red Boxing
Author: Mr. Sandman (<a href="mailto:an132432@anon.penet.fi">an132432@anon.penet.fi</a>)

VMS FAQ (Frequently Ask Questions)
Author: The Beaver (<a href="mailto:beaver@upperdck.blkbox.com">beaver@upperdck.blkbox.com</a>)

Anonymous FTP FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: <a href="ftp://ftp.iss.net/pub/faq/anonftp">ftp.iss.net</a> /pub/faq/anonftp

Compromise FAQ: What if your Machines are Compromised by an Intruder
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: <a href="ftp://ftp.iss.net/pub/faq/compromise">ftp.iss.net</a> /pub/faq/compromise

Security Patches FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: <a href="ftp://ftp.iss.net/pub/faq/patch">ftp.iss.net</a> /pub/faq/patch

Sniffer FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: <a href="ftp://ftp.iss.net/pub/faq/sniff">ftp.iss.net</a> /pub/faq/sniff

Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: <a href="ftp://ftp.iss.net/pub/faq/vendor">ftp.iss.net</a> /pub/faq/vendor

Cryptography FAQ
Author: The Crypt Cabal
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/sci.crypt">rtfm.mit.edu</a> /pub/usenet-by-group/sci.crypt/

Firewalls FAQ
Author: Marcus J. Ranum (<a href="mailto:mjr@ss1.lightspeed.net">mjr@ss1.lightspeed.net</a>)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/comp.security.misc">rtfm.mit.edu</a> /pub/usenet-by-group/comp.security.misc/

Buying a Used Scanner Radio
Author: <a href="mailto:parnass@att.com">parnass@att.com</a> (Bob Parnass, AJ9S)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/rec.radio.scaner">rtfm.mit.edu</a> /pub/usenet-by-group/rec.radio.scanner/

How to Find Scanner Frequencies
Author: <a href="mailto:parnass@att.com">parnass@att.com</a> (Bob Parnass, AJ9S)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/rec.radio.scanner">rtfm.mit.edu</a> /pub/usenet-by-group/rec.radio.scanner/

Introduction to Scanning
Author: <a href="mailto:parnass@att.com">parnass@att.com</a> (Bob Parnass, AJ9S)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/rec.radio.scanner">rtfm.mit.edu</a> /pub/usenet-by-group/rec.radio.scanner/

Low Power Broadcasting FAQ
Author: Rick Harrison.
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/alt.radio.pirate">rtfm.mit.edu</a> /pub/usenet-by-group/alt.radio.pirate/

RSA Cryptography Today FAQ
Author: Paul Fahn
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/sci.crypt">rtfm.mit.edu</a> /pub/usenet-by-group/sci.crypt/

VIRUS-L comp.virus Frequently Asked Questions (FAQ)
Author: Kenneth R. van Wyk &lt<a href="mailto:krvw@cert.org">krvw@cert.org</a>&gt
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/comp.virus">rtfm.mit.edu</a> /pub/usenet-by-group/comp.virus/

Where to get the latest PGP (Pretty Good Privacy) FAQ
Author: <a href="mailto:mpj@csn.net">mpj@csn.net</a> (Michael Johnson)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/alt.security.pgp">rtfm.mit.edu</a> /pub/usenet-by-group/alt.security.pgp/

alt.locksmithing answers to Frequently Asked Questions (FAQ)
Author: <a href="mailto:spike@indra.com">spike@indra.com</a> (Joe Ilacqua)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/alt.locksmithing">rtfm.mit.edu</a> /pub/usenet-by-group/alt.locksmithing/

comp.os.netware.security FAQ
Author: Fauzan Mirza &lt<a href="mailto:f.u.mirza@sheffield.ac.uk">f.u.mirza@sheffield.ac.uk</a>&gt
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/comp.os.netware.security">rtfm.mit.edu</a> /pub/usenet-by-group/comp.os.netware.security/

rec.pyrotechnics FAQ
Author: <a href="mailto:zoz@cs.adelaide.edu.au">zoz@cs.adelaide.edu.au</a> (Hans Josef Wagemueller)
ftp: <a href="ftp://rtfm.mit.edu/pub/usenet-by-group/rec.pyrotechnics">rtfm.mit.edu</a> /pub/usenet-by-group/rec.pyrotechnics/
</pre>

<p> </p> <hr> <p>

<a name="d17">17. Where can I purchase a magnetic stripe encoder/decoder?</a>

</p> <pre>
CPU Advance
PO Box 2434
Harwood Station
Littleton, MA 01460
(508)624-4819 (Fax)

Omron Electronics, Inc.
One East Commerce Drive
Schaumburg, IL 60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)

Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)

Timeline Inc,
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)

Alltronics
2300 Zanker Road
San Jose CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067

Atalla Corp
San Jose, CA
(408) 435-8850
</pre>

<p> </p> <hr> <p>

<a name="d18">18. What are the rainbow books and how can I get them?</a>

</p> <pre>
<em>Orange Book</em>
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria

<em>Green Book</em>
CSC-STD-002-85
Department of Defense Password Management Guideline

<em>Yellow Book</em>
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments

<em>Yellow Book</em>
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements. Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.

<em>Tan Book</em>
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems

<em>Bright Blue Book</em>
NCSC-TG-002
Trusted Product Evaluation -- A Guide for Vendors

<em>Neon Orange Book</em>
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems

<em>Teal Green Book</em>
NCSC-TG-004
Glossary of Computer Security Terms

<em>Red Book</em>
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria

<em>Orange Book</em>
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems

<em>Burgundy Book</em>
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems

<em>Dark Lavender Book</em>
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems

<em>Venice Blue Book</em>
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria

<em>Aqua Book</em>
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems

<em>Dark Red Book</em>
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation

<em>Pink Book</em>
NCSC-TG-013
Rating Maintenance Phase -- Program Document

<em>Purple Book</em>
NCSC-TG-014
Guidelines for Formal Verification Systems

<em>Brown Book</em>
NCSC-TG-015
A Guide to Understanding Trusted Facility Management

<em>Yellow-Green Book</em>
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals

<em>Light Blue</em>
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems

<em>Light Blue Book</em>
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems

<em>Blue Book</em>
NCSC-TG-019
Trusted Product Evaluation Questionnaire

<em>Gray Book</em>
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System

<em>Lavender Book</em>
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria

<em>Yellow Book</em>
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems

<em>Bright Orange Book</em>
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems

<em>Purple Book</em>
NCSC-TG-024 (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements

<em>Purple Book</em>
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators

<em>Purple Book</em>
NCSC-TG-024 (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial

<em><strong>Purple Book</strong></em>
NCSC-TG-024 (Volume 4/4)
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
Proposal Document - An Aid to Procurement Initiators and Contractors

<em>Green Book</em>
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems

<em>Hot Peach Book</em>
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems

<em>Turquiose Book</em>
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems

<em>Violet Book</em>
NCSC-TG-028
Assessing Controlled Access Protection

<em>Blue Book</em>
NCSC-TG-029
Introduction to Certification and Accreditation

<em>Light Pink Book</em>
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems

<em>C1 Technical Report-001</em>
Computer Viruses: Prevention, Detection, and Treatment

<em><strong>C Technical Report 79-91</strong></em>
Integrity in Automated Information Systems

<em><strong>C Technical Report 39-92</strong></em>
The Design and Evaluation of INFOSEC systems: The Computer Security
Contributions to the Composition Discussion

<em>NTISSAM COMPUSEC/1-87</em>
Advisory Memorandum on Office Automation Security Guideline

You can get your own free copy of any or all of the books by writing
or calling:

INFOSEC Awareness Division
ATTN: X711/IAOC
Fort George G. Meade, MD 20755-6000

Barbara Keller
(410) 766-8729

If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).
</pre>
(<strong>Bold</strong> indicates I have not personally seen this book and/or I
believe it may not be available.)
</body>
</html>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close