Article from 2600 about Knight Lightning, and his
c3711aaf73c9ab3b1ba425cc42d83bf4cac7ec3765e0d097dc7b3abd6fbff494
A neat way to get superviser access on a novell pirated commercial files found posted for download on BBS systems worldwide. H/P numbers.
4d55bc51e38e4449660b9db53b1ba9e607e833fac211ce09d58afdbc56d7a95f
50 attacks on Netscape with Java installed.
d89b073198c0e97bdb9abfdd49c0c9b66d8dda0fd8c7ced292c1737dfb54ddd3
How to break into your school computer.
26f6ed1b7b5bdfa56b457cb7a3eea8f4236cca3207f71a19e25872f8d17f4add
Alt security FAQ. Good security info.
15700501d5182bf2c36a71bafde3596e5f8394d55cc8bfd6bcdedff40cc722f8
How to send anonymous Email
784ccd2a1408ecf8ac55e44e3707f91bf231c08c4a9c0ed50342f40913e073ec
Argonne National Labs dialup numbers
4df1d9a853f64b6f6c6c2f9c0a24da24a228bfa41134fb0d251b6f66b1be306c
Novell "hidden supervisor" gives a USER nearby conversations with a 46Mhz capable scanner.
2cf89c25d9580d0a72583545b9c74abe18b82be00e421f71f48647b88c731f62
AT$T's 950-1288 info service.
a9b39e521b915ac933d3a6787a8641d6041cb63b2bb39c2bacf09451f55f375c
Common password list
9526f6d31bfe82111879f22f91702dcb4b9e135a53a21b14bc37de874019921b
How to get around sysops that use callback by using a hex editer to make the superuser account unpassworded.
f6fee8fb603937961797fcebc4da50a49015f1271173891aee57460b888dbc45
Hacking call back verification. Systems that call
0f06ba356f56fb4244c6972e5807c6d7ada9be6aede67c7c7fe9f8bb506ebfbe
Pretty complete file on hacking VAX/VMS machines
fded398f666c3ef34df23fef88ba3fa0d9ddc41380098bee0d18a027f0088ee5
A utility to aid in hacking TRW
af48c792e0a5be97b88a4438f5fd0db779b170e87498c1ce8b2469194f6b18eb
COSMOS command listing.
4ab887dc31a07ab49b6938c03ab5cceab52f2c77d8bb992393ede10d8974f0a9
List of common passwords.
758d368e39467251c114a80194a9b324114eca255f809ec84e56881e938bb28c
The Hackers Dictionary - Hacker terms explained.
209a4f9f784d1741be395dc5f197157ca7dfe4e9a83c4b815e1aa499077f6784
Hacking Cordless Phones
39f4f3036ef0b6efbba792be0dd950c33a36946035da542e04bf55238eec0786
COSMOS hacking - 3 files.
929a400df4554e38e4cd255590ce1380beb87070faaab5c6f5f0d673134b0e7b
The Basics of hacking DEC's
e68620764aa62c8376649372bf8a7de7f2d09ae3a6bb655ac4233c539bc7f0e8
Default Passwords for many systems (and thier
f6d18f07d23f1b79fb693e268181c3641883ca54765f7afd398a17be583cc892
DOS ethernet packet sniffer. Puts the interface
77e580bcdf15975c9e46600618031919f895525fda2deca3352818698dfde02f
faq on hacking novell.
1acee137739880177dd7190d11b1d0c6506cc5f145e0c4ac9872a192ec852d4f
3 byte file, which when sent over the modem screws Profiting from shrink wrap machines, wrong numbers, red boxing busts
b1fc9f1279ae34043de18a02e1946a8c90a06660bc07b872a4b3f79c34a40e8a
Free Compu$erve.
a2d228dfc580ed916e16b3092a222e9f9c1aa7eab1c575494544d99cd3dee1c8