what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hack-faq-f.html

hack-faq-f.html
Posted Aug 17, 1999

hack-faq-f.html

tags | paper
SHA-256 | 4cd6a0a1c047a4a7af99ca6ef3570d85c049415bb61d76cd6b886c66e9310a56

hack-faq-f.html

Change Mirror Download
<!doctype html public "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>The alt.2600/#hack FAQ (Section F: Miscellaneous)</title>
</head>
<body>
<! This document was written by Will Spencer and John Gotts. >
<center> <h1>Section F: Miscellaneous</h1> </center>

<h2>Table of Contents</h2>

<ol> <li> <a href="#f01">What does XXX stand for?</a>
<li> <a href="#f02">How do I determine if I have a valid credit card number?</a>
<li> <a href="#f03"><em>What is the layout of data on magnetic stripe cards?</em></a>
<li> <a href="#f04">What are the ethics of hacking?</a>
<li> <a href="#f05">Where can I get a copy of the #hack FAQ?</a> </ol>
<p>
(<em>Italic</em> indicates updated questions, while <strong>bold</strong>
indicates new questions.)

</p> <p> </p> <hr> <p>

<a name="f01">1. What does XXX stand for?</a>

</p> <pre>
TLA Three Letter Acronym

ACL Access Control List
PIN Personal Identification Number
TCB Trusted Computing Base

ALRU Automatic Line Record Update
AN Associated Number
ARSB Automated Repair Service Bureau
ATH Abbreviated Trouble History
BOC Bell Operating Company
BOR Basic Output Report
BOSS Business Office Servicing System
CA Cable
COE Central Office Equipment
COSMOS Computer System for Main Frame Operations
CMC Construction Maintenance Center
CNID Calling Number IDentification
CO Central Office
COCOT Customer Owned Coin Operated Telephone
CRSAB Centralized Repair Service Answering Bureau
DID Direct Inbound Dialing
DDD Direct Distance Dialing
ECC Enter Cable Change
LD Long Distance
LMOS Loop Maintenance Operations System
MLT Mechanized Loop Testing
NPA Numbering Plan Area
PBX Private Branch Exchange
POTS Plain Old Telephone Service
RBOC Regional Bell Operating Company
RSB Repair Service Bureau
SS Special Service
TAS Telephone Answering Service
TH Trouble History
TREAT Trouble Report Evaluation and Analysis Tool

LOD Legion of Doom
HFC Hell Fire Club
TNO The New Order

ACiD Ansi Creators in Demand
CCi Cybercrime International
FLT Fairlight
iCE Insane Creators Enterprise
iNC International Network of Crackers
NTA The Nocturnal Trading Alliance
PDX Paradox
PE Public Enemy
PSY Psychose
QTX Quartex
RZR Razor (1911)
S!P Supr!se Productions
TDT The Dream Team
THG The Humble Guys
THP The Hill People
TRSI Tristar Red Sector Inc.
UUDW Union of United Death Workers
</pre>

<p> </p> <hr> <p>

<a name="f02">2. How do I determine if I have a valid credit card number?</a>
</p> <p>
Credit cards use the Luhn Check Digit Algorithm. The main purpose of
this algorithm is to catch data entry errors, but it does double duty
here as a weak security tool.
</p> <p>
For a card with an even number of digits, double every odd numbered
digit and subtract 9 if the product is greater than 9. Add up all the
even digits as well as the doubled-odd digits, and the result must be
a multiple of 10 or it's not a valid card. If the card has an odd
number of digits, perform the same addition doubling the even numbered
digits instead.

</p> <p> </p> <hr> <p>

<a name="f03">3. What is the layout of data on magnetic stripe cards?</a>
</p> <p>
A standard card may have any of three tracks, or a combination of these
tracks.
</p> <p>
Track 1 was the first track standardized. It was developed by the
International Air Transportation Association (IATA) and is still
reserved for their use. It is 210 bpi with room for 79 characters. It
includes the primary account number (up to 18 digits) and the name (up
to 26 alphanumeric characters).
</p> <p>
Track 2 was developed by the American Bankers Association (ABA) for
on-line fincancial transactions. It is 75bpi with room for 40 numeric
characters. It includes the account number (up to 19 digits).
</p> <p>
Track 3 is also used for financial transactions. The difference is its
read/write ability. It is 210bpi with room for 107 numeric digits. It
includes an enciphered PIN, country code, currency units, amount
authorized, subsidiary account information and other restrictions.
</p> <p>
For more information, read the ANSI/ISO 7811/1-5 standard. This
document is available from the American Bankers Association.

</p> <p> </p> <hr> <p>

<a name="f04">4. What are the ethics of hacking?</a>
</p> <p>
An excerpt from <em>Hackers: Heroes of the Computer Revolution</em> by Steven Levy:
</p> <pre>
Access to computers -- and anything which might teach you something
about the way the world works -- should be unlimited and total.
Always yield to the Hands-On imperative.

All information should be free.

Mistrust Authority. Promote Decentralization.

Hackers should be judged by their hacking, not bogus criteria such as
degrees, age, race, or position.

You can create art and beauty on a computer.

Computers can change your life for the better.
</pre>

<p> </p> <hr> <p>

<a name="f05">5. Where can I get a copy of the alt.2600/#hack FAQ?</a>
</p> <p>
Get it via FTP:
</p> <pre>
<a href="ftp://ftp.rahul.net/pub/lps/sysadmin">ftp.rahul.net</a> /pub/lps/sysadmin/
<a href="ftp://rtfm.mit.edu/pub/usenet-by-group/alt.2600">rtfm.mit.edu</a> /pub/usenet-by-group/alt.2600/
<a href="ftp://mirrors.aol.com/pub/rtfm/usenet-by-group/alt.2600">mirrors.aol.com</a> /pub/rtfm/usenet-by-group/alt.2600/
</pre> <p>
Get it on the World Wide Web at:
</p> <pre>
<a href="http://www-personal.engin.umich.edu/~jgotts/hack-faq">www-personal.engin.umich.edu/~jgotts/hack-faq</a>
</pre>
</body>
</html>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close