hack-faq-f.html
4cd6a0a1c047a4a7af99ca6ef3570d85c049415bb61d76cd6b886c66e9310a56
<!doctype html public "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>The alt.2600/#hack FAQ (Section F: Miscellaneous)</title>
</head>
<body>
<! This document was written by Will Spencer and John Gotts. >
<center> <h1>Section F: Miscellaneous</h1> </center>
<h2>Table of Contents</h2>
<ol> <li> <a href="#f01">What does XXX stand for?</a>
<li> <a href="#f02">How do I determine if I have a valid credit card number?</a>
<li> <a href="#f03"><em>What is the layout of data on magnetic stripe cards?</em></a>
<li> <a href="#f04">What are the ethics of hacking?</a>
<li> <a href="#f05">Where can I get a copy of the #hack FAQ?</a> </ol>
<p>
(<em>Italic</em> indicates updated questions, while <strong>bold</strong>
indicates new questions.)
</p> <p> </p> <hr> <p>
<a name="f01">1. What does XXX stand for?</a>
</p> <pre>
TLA Three Letter Acronym
ACL Access Control List
PIN Personal Identification Number
TCB Trusted Computing Base
ALRU Automatic Line Record Update
AN Associated Number
ARSB Automated Repair Service Bureau
ATH Abbreviated Trouble History
BOC Bell Operating Company
BOR Basic Output Report
BOSS Business Office Servicing System
CA Cable
COE Central Office Equipment
COSMOS Computer System for Main Frame Operations
CMC Construction Maintenance Center
CNID Calling Number IDentification
CO Central Office
COCOT Customer Owned Coin Operated Telephone
CRSAB Centralized Repair Service Answering Bureau
DID Direct Inbound Dialing
DDD Direct Distance Dialing
ECC Enter Cable Change
LD Long Distance
LMOS Loop Maintenance Operations System
MLT Mechanized Loop Testing
NPA Numbering Plan Area
PBX Private Branch Exchange
POTS Plain Old Telephone Service
RBOC Regional Bell Operating Company
RSB Repair Service Bureau
SS Special Service
TAS Telephone Answering Service
TH Trouble History
TREAT Trouble Report Evaluation and Analysis Tool
LOD Legion of Doom
HFC Hell Fire Club
TNO The New Order
ACiD Ansi Creators in Demand
CCi Cybercrime International
FLT Fairlight
iCE Insane Creators Enterprise
iNC International Network of Crackers
NTA The Nocturnal Trading Alliance
PDX Paradox
PE Public Enemy
PSY Psychose
QTX Quartex
RZR Razor (1911)
S!P Supr!se Productions
TDT The Dream Team
THG The Humble Guys
THP The Hill People
TRSI Tristar Red Sector Inc.
UUDW Union of United Death Workers
</pre>
<p> </p> <hr> <p>
<a name="f02">2. How do I determine if I have a valid credit card number?</a>
</p> <p>
Credit cards use the Luhn Check Digit Algorithm. The main purpose of
this algorithm is to catch data entry errors, but it does double duty
here as a weak security tool.
</p> <p>
For a card with an even number of digits, double every odd numbered
digit and subtract 9 if the product is greater than 9. Add up all the
even digits as well as the doubled-odd digits, and the result must be
a multiple of 10 or it's not a valid card. If the card has an odd
number of digits, perform the same addition doubling the even numbered
digits instead.
</p> <p> </p> <hr> <p>
<a name="f03">3. What is the layout of data on magnetic stripe cards?</a>
</p> <p>
A standard card may have any of three tracks, or a combination of these
tracks.
</p> <p>
Track 1 was the first track standardized. It was developed by the
International Air Transportation Association (IATA) and is still
reserved for their use. It is 210 bpi with room for 79 characters. It
includes the primary account number (up to 18 digits) and the name (up
to 26 alphanumeric characters).
</p> <p>
Track 2 was developed by the American Bankers Association (ABA) for
on-line fincancial transactions. It is 75bpi with room for 40 numeric
characters. It includes the account number (up to 19 digits).
</p> <p>
Track 3 is also used for financial transactions. The difference is its
read/write ability. It is 210bpi with room for 107 numeric digits. It
includes an enciphered PIN, country code, currency units, amount
authorized, subsidiary account information and other restrictions.
</p> <p>
For more information, read the ANSI/ISO 7811/1-5 standard. This
document is available from the American Bankers Association.
</p> <p> </p> <hr> <p>
<a name="f04">4. What are the ethics of hacking?</a>
</p> <p>
An excerpt from <em>Hackers: Heroes of the Computer Revolution</em> by Steven Levy:
</p> <pre>
Access to computers -- and anything which might teach you something
about the way the world works -- should be unlimited and total.
Always yield to the Hands-On imperative.
All information should be free.
Mistrust Authority. Promote Decentralization.
Hackers should be judged by their hacking, not bogus criteria such as
degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
</pre>
<p> </p> <hr> <p>
<a name="f05">5. Where can I get a copy of the alt.2600/#hack FAQ?</a>
</p> <p>
Get it via FTP:
</p> <pre>
<a href="ftp://ftp.rahul.net/pub/lps/sysadmin">ftp.rahul.net</a> /pub/lps/sysadmin/
<a href="ftp://rtfm.mit.edu/pub/usenet-by-group/alt.2600">rtfm.mit.edu</a> /pub/usenet-by-group/alt.2600/
<a href="ftp://mirrors.aol.com/pub/rtfm/usenet-by-group/alt.2600">mirrors.aol.com</a> /pub/rtfm/usenet-by-group/alt.2600/
</pre> <p>
Get it on the World Wide Web at:
</p> <pre>
<a href="http://www-personal.engin.umich.edu/~jgotts/hack-faq">www-personal.engin.umich.edu/~jgotts/hack-faq</a>
</pre>
</body>
</html>