The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]

[Phrack] alt.2600/#hack FAQ 4/4


<< Предыдущая ИНДЕКС Поиск в статьях src Установить закладку Перейти на закладку Следующая >>
Subject: [Phrack] alt.2600/#hack FAQ 4/4

                              ==Phrack Magazine==

                 Volume Six, Issue Forty-Seven, File 8 of 22


05. What are some gopher sites of interest to hackers?

  ba.com                  (Bell Atlantic)
  csrc.ncsl.nist.gov      (NIST Security Gopher)
  gopher.acm.org          (SIGSAC (Security, Audit & Control))
  gopher.cpsr.org         (Computer Professionals for Social Responsibility)
  gopher.cs.uwm.edu
  gopher.eff.org          (Electonic Frontier Foundation)
  gw.PacBell.com          (Pacific Bell)
  iitf.doc.gov            (NITA -- IITF)
  oss.net                 (Open Source Solutions)
  spy.org                 (Computer Systems Consulting)
  wiretap.spies.com       (Wiretap)


06. What are some World wide Web (WWW) sites of interest to hackers?

  http://alumni.caltech.edu/~dank/isdn/           (ISDN)
  http://aset.rsoc.rockwell.com                   (NASA/MOD AIS Security)
  http://aset.rsoc.rockwell.com/exhibit.html      (Tech. for Info Sec)
  http://att.net/dir800                           (800 directory)
  http://ausg.dartmouth.edu/security.html         (Security)
  http://cs.purdue.edu/coast/coast.html           (Coast)
  http://csrc.ncsl.nist.gov                       (NIST)
  http://dhp.com/~pluvius
  http://dfw.net/~aleph1                          (Eubercrackers)
  http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
  http://everest.cs.ucdavis.edu/Security.html     (Security)
  http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
  http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html  (CSSCR)
  http://first.org                                (FIRST)
  http://ftp.tamu.edu/~abr8030/security.html      (Security)
  http://hightop.nrl.navy.mil/potpourri.html      (Security)
  http://hightop.nrl.navy.mil/rainbow.html        (Rainbow Books)
  http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
  http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
  http://info.bellcore.com/BETSI/betsi.html       (Betsi)
  http://infosec.nosc.mil/infosec.html            (SPAWAR INFOSEC)
  http://l0pht.com                                (The l0pht)
  http://l0pht.com/~oblivion/IIRG.html            (Phantasy Magazine)
  http://mindlink.jolt.com                        (The Secrets of LockPicking)
  http://mls.saic.com                             (SAIC MLS)
  http://naic.nasa.gov/fbi/FBI_homepage.html      (FBI Homepage)
  http://nasirc.hq.nasa.gov                       (NASA ASIRC)
  http://ophie.hughes.american.edu/~ophie
  http://ripco.com:8080/~glr/glr.html             (Full Disclosure)
  http://spy.org                                  (CSC)
  http://tansu.com.au/Info/security.html          (Comp and Net Security)
  http://the-tech.mit.edu                         (LaMacchia case info)
  http://wintermute.itd.nrl.navy.mil/5544.html    (Network Security)
  http://www.aads.net                             (Ameritech)
  http://www.alw.nih.gov/WWW/security.html        (Unix Security)
  http://www.artcom.de/CCC                        (CCC Homepage)
  http://www.aspentec.com/~frzmtdb/fun/hacker.html
  http://www.aus.xanadu.com:70/1/EFA              (EFF Australia)
  http://www.ba.com                               (Bell Atlantic)
  http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
  http://www.bell.com                             (MFJ Task Force)
  http://www.bellcore.com/SECURITY/security.html  (Bellcore Security Products)
  http://www.brad.ac.uk/~nasmith/index.html
  http://www.bst.bls.com                          (BellSouth)
  http://www.c3.lanl.gov/~mcn                     (Lanl)
  http://www.cert.dfn.de/                         (German First Team)
  http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
  http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
  http://www.cpsr.org/home                        (CPSR)
  http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
  http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
  http://www.cs.umd.edu/~lgas
  http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
  http://www.csd.harris.com/secure_info.html      (Harris)
  http://www.csl.sri.com                          (SRI Computer Science Lab)
  http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
  http://www.datafellows.fi                       (Data Fellows)
  http://www.delmarva.com/raptor/raptor.html      (Raptor Network Isolator)
  http://www.demon.co.uk/kbridge                  (KarlBridge)
  http://www.digicash.com/ecash/ecash-home.html   (Digital Cash)
  http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
  http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
  http://www.eecs.nwu.edu/~jmyers/ids/index.html  (Intrusion Detection Systems)
  http://www.eff.org/papers.html                  (EFF)
  http://www.engin.umich.edu/~jgotts/boxes.html   (Box info)
  http://www.engin.umich.edu/~jgotts/hack-faq.html(This document)
  http://www.engin.umich.edu/~jgotts/underground.html
  http://www.ensta.fr/internet/unix/sys_admin     (System administration)
  http://www.etext.org/Zines/                     (Zines)
  http://www.fc.net/defcon                        (DefCon)
  http://www.fc.net/phrack.html                   (Phrack Magazine)
  http://www.first.org/first/                     (FIRST)
  http://www.greatcircle.com                      (Great Circle Associates)
  http://www.hpcc.gov/blue94/section.4.6.html     (NSA)
  http://www.ic.gov                               (The CIA)
  http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
  http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
  http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
  http://www.net23.com                            (Max Headroom)
  http://www.nist.gov                             (NIST)
  http://www.pacbell.com                          (Pacific Bell)
  http://www.paranoia.com/mthreat                 (ToneLoc)
  http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
  http://www.phantom.com/~king                    (Taran King)
  http://www.quadralay.com/www/Crypt/Crypt.html   (Quadralay Cryptography)
  http://www.qualcomm.com/cdma/wireless.html      (Qualcomm CDMA)
  http://www.research.att.com                     (AT&T)
  http://ripco.com:8080/~glr/glr.html             (Full Disclosure)
  http://www.rsa.com                              (RSA Data Security)
  http://www.satelnet.org/~ccappuc
  http://www.service.com/cm/uswest/usw1.html      (USWest)
  http://www.shore.net/~oz/welcome.html           (Hack TV)
  http://www.spy.org                              (Computer Systems Consulting)
  http://www.sri.com                              (SRI)
  http://www.tansu.com.au/Info/security.html      (Security Reference Index)
  http://www.tis.com                              (Trusted Information Systems)
  http://www.tri.sbc.com                          (Southwestern Bell)
  http://www.uci.agh.edu.pl/pub/security          (Security)
  http://www.umcc.umich.edu/~doug/virus-faq.html  (Virus)
  http://www.usfca.edu/crackdown/crack.html       (Hacker Crackdown)
  http://www.wam.umd.edu/~ankh/Public/devil_does_unix
  http://www.wiltel.com                           (Wiltel)
  http://www.winternet.com/~carolann/dreams.html
  http://www.wired.com                            (Wired Magazine)


07. What are some IRC channels of interest to hackers?

  #2600
  #cellular
  #hack
  #phreak
  #linux
  #realhack
  #root
  #unix
  #warez


08. What are some BBS's of interest to hackers?

  Rune Stone              (203)832-8441
  Hacker's Haven          (303)343-4053
  Independent Nation      (315)656-4179
  Ut0PiA                  (315)656-5135
  underworld_1994.com     (514)683-1894
  Digital Fallout         (516)378-6640
  Alliance Communications (612)251-8596
  Maas-Neotek             (617)855-2923
  Apocalypse 2000         (708)676-9855
  K0dE Ab0dE              (713)579-2276
  fARM R0Ad 666           (713)855-0261
  

09. What are some books of interest to hackers?

General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
  Computer Security Basics
  Author: Deborah Russell and G.T. Gengemi Sr.
  Publisher: O'Reilly & Associates, Inc.
  Copyright Date: 1991
  ISBN: 0-937175-71-4

        This is an excellent book.  It gives a broad overview of
        computer security without sacrificing detail.  A must read for
        the beginning security expert.

  Computer Security Management
  Author: Karen Forcht
  Publisher: Boyd and Fraser
  Copyright Date: 1994
  ISBN: 0-87835-881-1

  Information Systems Security
  Author: Philip Fites and Martin Kratz
  Publisher: Van Nostrad Reinhold
  Copyright Date: 1993
  ISBN: 0-442-00180-0

  Computer Related Risks
  Author: Peter G. Neumann
  Publisher: Addison-Wesley
  Copyright Date: 1995
  ISBN: 0-201-55805-X

  Computer Security Management
  Author: Karen Forcht
  Publisher: boyd & fraser publishing company
  Copyright Date: 1994
  ISBN: 0-87835-881-1

  The Stephen Cobb Complete Book of PC and LAN Security
  Author: Stephen Cobb
  Publisher: Windcrest Books
  Copyright Date: 1992
  ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

  Security in Computing
  Author: Charles P. Pfleeger
  Publisher: Prentice Hall
  Copyright Date: 1989
  ISBN: 0-13-798943-1.

  Building a Secure Computer System
  Author: Morrie Gasser
  Publisher: Van Nostrand Reinhold Co., New York.
  Copyright Date:
  ISBN: 0-442-23022-2

  Modern Methods for Computer Security
  Author: Lance Hoffman
  Publisher: Prentice Hall
  Copyright Date: 1977
  ISBN:

  Windows NT 3.5 Guidelines for Security, Audit and Control
  Author:
  Publisher: Microsoft Press
  Copyright Date:
  ISBN: 1-55615-814-9


Unix System Security
~~~~~~~~~~~~~~~~~~~~
  Practical Unix Security
  Author: Simson Garfinkel and Gene Spafford
  Publisher: O'Reilly & Associates, Inc.
  Copyright Date: 1991
  ISBN: 0-937175-72-2

        Finally someone with a very firm grasp of Unix system security
        gets down to writing a book on the subject.  Buy this book.
        Read this book.

  Firewalls and Internet Security
  Author: William Cheswick and Steven Bellovin
  Publisher: Addison Wesley
  Copyright Date: 1994
  ISBN: 0-201-63357-4

  Unix System Security
  Author: Rik Farrow
  Publisher: Addison Wesley
  Copyright Date: 1991
  ISBN: 0-201-57030-0

  Unix Security: A Practical Tutorial
  Author: N. Derek Arnold
  Publisher: McGraw Hill
  Copyright Date: 1993
  ISBN: 0-07-002560-6

  Unix System Security: A Guide for Users and Systems Administrators
  Author: David A. Curry
  Publisher: Addison-Wesley
  Copyright Date: 1992
  ISBN: 0-201-56327-4

  Unix System Security
  Author: Patrick H. Wood and Stephen G. Kochan
  Publisher: Hayden Books
  Copyright Date: 1985
  ISBN: 0-672-48494-3

  Unix Security for the Organization
  Author: Richard Bryant
  Publisher: Sams
  Copyright Date: 1994
  ISBN: 0-672-30571-2


Network Security
~~~~~~~~~~~~~~~~
  Network Security Secrets
  Author: David J. Stang and Sylvia Moon
  Publisher: IDG Books
  Copyright Date: 1993
  ISBN: 1-56884-021-7

        Not a total waste of paper, but definitely not worth the
        $49.95 purchase price.  The book is a rehash of previously
        published information.  The only secret we learn from reading
        the book is that Sylvia Moon is a younger woman madly in love
        with the older David Stang.

  Complete Lan Security and Control
  Author: Peter Davis
  Publisher: Windcrest / McGraw Hill
  Copyright Date: 1994
  ISBN: 0-8306-4548-9 and 0-8306-4549-7

  Network Security
  Author: Steven Shaffer and Alan Simon
  Publisher: AP Professional
  Copyright Date: 1994
  ISBN: 0-12-638010-4


Cryptography
~~~~~~~~~~~~
  Applied Cryptography: Protocols, Algorithms, and Source Code in C
  Author: Bruce Schneier
  Publisher: John Wiley & Sons
  Copyright Date: 1994
  ISBN: 0-471-59756-2

        Bruce Schneier's book replaces all other texts on
        cryptography.  If you are interested in cryptography, this is
        a must read.  This may be the first and last book on
        cryptography you may ever need to buy.

  Cryptography and Data Security
  Author: Dorothy Denning
  Publisher: Addison-Wesley Publishing Co.
  Copyright Date: 1982
  ISBN: 0-201-10150-5

  Protect Your Privacy: A Guide for PGP Users
  Author: William Stallings
  Publisher: Prentice-Hall
  Copyright Date: 1994
  ISBN: 0-13-185596-4


Programmed Threats
~~~~~~~~~~~~~~~~~~
  The Little Black Book of Computer Viruses
  Author: Mark Ludwig
  Publisher: American Eagle Publications
  Copyright Date: 1990
  ISBN: 0-929408-02-0

        The original, and still the best, book on computer viruses.
        No media hype here, just good clean technical information.

  Computer Viruses, Artificial Life and Evolution
  Author: Mark Ludwig
  Publisher: American Eagle Publications
  Copyright Date: 1993
  ISBN: 0-929408-07-1

  Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
        Threats to Your System
  Author: John McAfee and Colin Haynes
  Publisher: St. Martin's Press
  Copyright Date: 1989
  ISBN: 0-312-03064-9 and 0-312-02889-X

  The Virus Creation Labs: A Journey Into the Underground
  Author: George Smith
  Publisher: American Eagle Publications
  Copyright Date: 1994
  ISBN:


Telephony
~~~~~~~~~
  Engineering and Operations in the Bell System
  Author: R.F. Rey
  Publisher: Bell Telephont Laboratories
  Copyright Date: 1983
  ISBN: 0-932764-04-5

        Although hopelessly out of date, this book remains *THE* book
        on telephony.  This book is 100% Bell, and is loved by phreaks
        the world over.

  Telephony: Today and Tomorrow
  Author: Dimitris N. Chorafas
  Publisher: Prentice-Hall
  Copyright Date: 1984
  ISBN: 0-13-902700-9

  The Telecommunications Fact Book and Illustrated Dictionary
  Author: Ahmed S. Khan
  Publisher: Delmar Publishers, Inc.
  Copyright Date: 1992
  ISBN: 0-8273-4615-8

        I find this dictionary to be an excellent reference book on
        telephony, and I recommend it to anyone with serious
        intentions in the field.

  Tandy/Radio Shack Cellular Hardware
  Author: Judas Gerard and Damien Thorn
  Publisher: Phoenix Rising Communications
  Copyright Date: 1994
  ISBN:

  The Phone Book
  Author: Carl Oppendahl
  Publisher: Consumer Reports
  Copyright Date:
  ISBN: 0-89043-364-x

        Listing of every cellular ID in the us, plus roaming ports,
        and info numbers for each carrier.

  Principles of Caller I.D.
  Author:
  Publisher: International MicroPower Corp.
  Copyright Date:
  ISBN:


Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
  The Hacker Crackdown: Law and Disorder on the Electronic Frontier
  Author: Bruce Sterling
  Publisher: Bantam Books
  Copyright Date: 1982
  ISBN: 0-553-56370-X

        Bruce Sterling has recently released the book FREE to the net.
        The book is much easier to read in print form, and the
        paperback is only $5.99.  Either way you read it, you will be
        glad you did.  Mr. Sterling is an excellent science fiction
        author and has brought his talent with words to bear on the
        hacking culture.  A very enjoyable reading experience.

  Cyberpunk
  Author: Katie Hafner and John Markoff
  Publisher: Simon and Schuster
  Copyright Date: 1991
  ISBN: 0-671-77879-X

  The Cuckoo's Egg
  Author: Cliff Stoll
  Publisher: Simon and Schuster
  Copyright Date: 1989
  ISBN: 0-671-72688-9

  Hackers: Heroes of the Computer Revolution
  Author: Steven Levy
  Publisher: Doubleday
  Copyright Date: 1984
  ISBN: 0-440-13495-6


Unclassified
~~~~~~~~~~~~
  The Hacker's Handbook
  Author: Hugo Cornwall
  Publisher: E. Arthur Brown Company
  Copyright Date:
  ISBN: 0-912579-06-4

  Secrets of a Super Hacker
  Author: The Knightmare
  Publisher: Loompanics
  Copyright Date: 1994
  ISBN: 1-55950-106-5

        The Knightmare is no super hacker.  There is little or no real
        information in this book.  The Knightmare gives useful advice
        like telling you not to dress up before going trashing.
        The Knightmare's best hack is fooling Loompanics into
        publishing this garbage.

  The Day The Phones Stopped
  Author: Leonard Lee
  Publisher: Primus / Donald I Fine, Inc.
  Copyright Date: 1992
  ISBN: 1-55611-286-6

        Total garbage.  Paranoid delusions of a lunatic.  Less factual
        data that an average issue of the Enquirer.

  Information Warfare
  Author: Winn Swartau
  Publisher: Thunder Mountain Press
  Copyright Date: 1994
  ISBN: 1-56025-080-1

  An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
  Author: Doug Richardson
  Publisher: Salamander Press
  Copyright Date:
  ISBN: 0-668-06497-8


10. What are some videos of interest to hackers?

  'Unauthorized Access' by Annaliza Savage
  $25 on VH S format in 38-min
  Savage Productions
  1803 Mission St., #406
  Santa Cruz, CA 95060


11. What are some mailing lists of interest to hackers?

  Academic Firewalls
  Reflector Address:
  Registration Address: Send a message to majordomo@greatcircle.com
                        containing the line "subscribe firewalls user@host"

  Bugtraq
  Reflector Address:    bugtraq@fc.net
  Registration Address: bugtraq-request@fc.net

  Cert Tools
  Reflector Address:    cert-tools@cert.org
  Registration Address: cert-tools-request@cert.org

  Computers and Society
  Reflector Address:    Comp-Soc@limbo.intuitive.com
  Registration Address: taylor@limbo.intuitive.com

  Coordinated Feasibility Effort to Unravel State Data
  Reflector Address:    ldc-sw@cpsr.org
  Registration Address:

  CPSR Announcement List
  Reflector Address:    cpsr-announce@cpsr.org
  Registration Address:

  CPSR - Intellectual Property
  Reflector Address:    cpsr-int-prop@cpsr.org
  Registration Address:

  CPSR - Internet Library
  Reflector Address:    cpsr-library@cpsr.org
  Registration Address:

  DefCon Announcement List
  Reflector Address:
  Registration Address: Send a message to majordomo@fc.net containing
                        the line "subscribe dc-announce"

  DefCon Chat List
  Reflector Address:
  Registration Address: Send a message to majordomo@fc.net containing
                        the line "subscribe dc-stuff"

  IDS (Intruder Detection Systems)
  Reflector Address:
  Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
                        containing the line "subscribe ids"

  Macintosh Security
  Reflector Address:    mac-security@eclectic.com
  Registration Address: mac-security-request@eclectic.com

  NeXT Managers
  Reflector Address:
  Registration Address: next-managers-request@stolaf.edu

  Phiber-Scream
  Reflector Address:
  Registration Address: Send a message to listserv@netcom.com
                        containing the line "subscribe phiber-scream user@host"

  phruwt-l (Macintosh H/P)
  Reflector Address:
  Registration Address: Send a message to filbert@netcom.com
                        with the subject "phruwt-l"

  rfc931-users
  Reflector Address:    rfc931-users@kramden.acf.nyu.edu
  Registration Address: brnstnd@nyu.edu

  RSA Users
  Reflector Address:    rsaref-users@rsa.com
  Registration Address: rsaref-users-request@rsa.com


12. What are some print magazines of interest to hackers?

2600 - The Hacker Quarterly
~~~~~~~~~~~~~~~~~~~~~~~~~~~
E-mail address: 2600@well.sf.ca.us

Subscription Address: 2600 Subscription Dept
                      PO Box 752
                      Middle Island, NY  11953-0752

Letters and article submission address: 2600 Editorial Dept
                                        PO Box 99
                                        Middle Island, NY  11953-0099

Subscriptions: United States: $21/yr individual, $50 corporate.
               Overseas: $30/yr individual, $65 corporate.


Gray Areas
~~~~~~~~~~
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/oe controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com

U.S. Mail Address: Gray Areas
                   PO Box 808
                   Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
               $34.00 4 issues foreign (shipped air mail)


Wired
~~~~~
Subscription Address: subscriptions@wired.com
                  or: Wired
                      PO Box 191826
                      San Francisco, CA 94119-9866

Letters and article submission address: guidelines@wired.com
                                    or: Wired
                                        544 Second Street
                                        San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)


Nuts & Volts
~~~~~~~~~~~~
T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664


13. What are some e-zines of interest to hackers?

CoTNo: Communications of The New Order    ftp.etext.org  /pub/Zines/CoTNo
Empire Times                              ftp.etext.org  /pub/Zines/Emptimes
Phrack                                    ftp.fc.net     /pub/phrack


14. What are some organizations of interest to hackers?

Computer Professionals for Social Responsibility (CPSR)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CPSR empowers computer professionals and computer users to advocate
for the responsible use of information technology and empowers all who
use computer technology to participate in the public debate.   As
technical experts, CPSR members provide the public and policymakers
with realistic assessments of the power, promise, and limitations of
computer technology.  As an organization of concerned citizens, CPSR
directs public attention to critical choices concerning the
applications of computing and how those choices affect society.

By matching unimpeachable technical information with policy
development savvy, CPSR uses minimum dollars to have maximum impact
and encourages broad public participation in the shaping of technology
policy.

Every project we undertake is based on five principles:

*  We foster and support public discussion of and public
   responsibility for decisions involving the use of computers in
   systems critical to society.

*  We work to dispel popular myths about the infallibility of
   technological systems.

*  We challenge the assumption that technology alone can solve
   political and social problems.

*  We critically examine social and technical issues within the
   computer profession, nationally and internationally.

*  We encourage the use of computer technology to improve the quality
   of life.

CPSR Membership Categories
  75  REGULAR MEMBER
  50  Basic member
 200  Supporting member
 500  Sponsoring member
1000  Lifetime member
  20  Student/low income member
  50  Foreign subscriber
  50  Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA  94301
415-322-3778
415-322-3798 (FAX)
E-mail: cpsr@csli.stanford.edu


Electronic Frontier Foundation (EFF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
of policies and activities that will advance freedom and openness in
computer-based communications. It is a member-supported, nonprofit
group that grew from the conviction that a new public interest
organization was needed in the information age; that this organization
would enhance and protect the democratic potential of new computer
communications technology. From the beginning, the EFF determined to
become an organization that would combine technical, legal, and public
policy expertise, and would apply these skills to the myriad issues
and concerns that arise whenever a new communications medium is born.

Memberships are $20.00 per year for students, $40.00 per year for
regular members, and $100.00 per year for organizations.

The Electronic Frontier Foundation, Inc.
666 Pennsylvania Avenue S.E., Suite 303
Washington, D.C.  20003
+1 202 544 9237
+1 202 547 5481 FAX
Internet: eff@eff.org


Free Software Foundation (FSF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


GNU
~~~


The League for Programming Freedom (LPF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The League for Programming Freedom is an organization of people who
oppose the attempt to monopolize common user interfaces through "look
and feel" copyright lawsuits.  Some of us are programmers, who worry
that such monopolies will obstruct our work.  Some of us are users,
who want new computer systems to be compatible with the interfaces we
know.  Some are founders of hardware or software companies, such as
Richard P. Gabriel. Some of us are professors or researchers,
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
Boyer and Patrick Winston.

"Look and feel" lawsuits aim to create a new class of government-
enforced monopolies broader in scope than ever before.  Such a system
of user-interface copyright would impose gratuitous incompatibility,
reduce competition, and stifle innovation.

We in the League hope to prevent these problems by preventing
user-interface copyright.  The League is NOT opposed to copyright law
as it was understood until 1986 -- copyright on particular programs.
Our aim is to stop changes in the copyright system which would take
away programmers' traditional freedom to write new programs compatible
with existing programs and practices.

Annual dues for individual members are $42 for employed professionals,
$10.50 for students, and $21 for others.  We appreciate activists, but
members who cannot contribute their time are also welcome.

To contact the League, phone (617) 243-4091, send Internet mail to the
address league@prep.ai.mit.edu, or write to:

League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA


SotMesc
~~~~~~~
Founded in 1989, SotMesc is dedicated to preserving the integrity and
cohesion of the computing society.  By promoting computer education,
liberties and efficiency, we believe we can secure freedoms for all
computer users while retaining privacy.

SotMesc maintains the CSP Internet mailing list, the SotMesc
Scholarship Fund, and the SotMesc Newsletter.

The SotMESC is financed partly by membership fees, and donations, but
mostly by selling hacking, cracking, phreaking, electronics, internet,
and virus information and programs on disk and bound paper media.

SotMesc memberships are $20 to students and $40 to regular members.

SotMESC
P.O. Box 573
Long Beach, MS  39560


Computer Emergency Response Team (CERT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CERT is the Computer Emergency Response Team that was formed by the
Defense Advanced Research Projects Agency (DARPA) in November 1988 in
response to the needs exhibited during the Internet worm incident.
The CERT charter is to work with the Internet community to facilitate
its response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of computer
security issues, and to conduct research targeted at improving the
security of existing systems.

CERT products and services include 24-hour technical assistance for
responding to computer security incidents, product vulnerability
assistance, technical documents, and seminars.  In addition, the team
maintains a number of mailing lists (including one for CERT
advisories) and provides an anonymous FTP server:  cert.org
(192.88.209.5), where security-related documents, past CERT
advisories, and tools are archived.

CERT contact information:

U.S. mail address
  CERT Coordination Center
  Software Engineering Institute
  Carnegie Mellon University
  Pittsburgh, PA 15213-3890
  U.S.A.

Internet E-mail address
  cert@cert.org

Telephone number
  (412)268-7090 (24-hour hotline)
  CERT Coordination Center personnel answer
  7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
  emergencies during other hours.

FAX number
  (412)268-6989


15. Where can I purchase a magnetic stripe encoder/decoder?

CPU Advance
PO Box 2434
Harwood Station
Littleton, MA  01460
(508)624-4819 (Fax)

Omron Electronics, Inc.
One East Commerce Drive
Schaumburg, IL  60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)

Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)

Timeline Inc,
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)

Alltronics
2300 Zanker Road
San Jose CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067

Atalla Corp
San Jose, CA
(408) 435-8850


16. What are the rainbow books and how can I get them?

Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria

Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline

Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments

Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements.  Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.

Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems

Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation - A Guide for Vendors

Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems

Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms

Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria

Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems

Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems

Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems

Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria

Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems

Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation

Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document

Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems

Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management

Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals

Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems

Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems

Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire

Gray Book
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System

Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria

Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems

Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems

Purple Book
NCSC-TG-024  (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements

Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators

Purple Book
NCSC-TG-024  (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial

+Purple Book
+NCSC-TG-024  (Volume 4/4)
+A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
+Proposal Document - An Aid to Procurement Initiators and Contractors

Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems

Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems

Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems

Violet Book
NCSC-TG-028
Assessing Controlled Access Protection

Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation

Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems

C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment

*C Technical Report 79-91
*Integrity in Automated Information Systems

*C Technical Report 39-92
*The Design and Evaluation of INFOSEC systems: The Computer Security
*Contributions to the Composition Discussion

NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline

--

You can get your own free copy of any or all of the books by writing
or calling:

       INFOSEC Awareness Division
       ATTN: X711/IAOC
       Fort George G. Meade, MD  20755-6000

       Barbara Keller
       (410) 766-8729

If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).

[* == I have not personally seen this book]
[+ == I have not personally seen this book, and I believe it may not]
[     be available]




Section D: 2600
~~~~~~~~~~~~~~~

01. What is alt.2600?

Alt.2600 is a Usenet newsgroup for discussion of material relating to
2600 Magazine, the hacker quarterly.   It is NOT for the Atari 2600
game machine.  Len@netsys.com created the group on Emmanuel
Goldstein's recommendation.  Emmanuel is the editor/publisher of 2600
Magazine. Following the barrage of postings about the Atari machine to
alt.2600, an alt.atari.2600 was created to divert all of the atari
traffic from alt.2600.  Atari 2600 people are advised to hie over to
rec.games.video.classic.


02. What does "2600" mean?

	2600Hz was a tone that was used by early phone phreaks (or
phreakers) in the 80's, and some currently.  If the tone was sent down the
line at the proper time, one could get away with all sorts of fun stuff.  

A note from Emmanuel Goldstein:
	
"The Atari 2600 has NOTHING to do with blue boxes or telephones
or the 2600 hertz tone.  The 2600 hertz tone was simply the first
step towards exploring the network.  If you were successful at 
getting a toll call to drop, then billing would stop at that
point but there would be billing for the number already dialed
up until the point of seizure.  800 numbers and long distance
information were both free in the past and records of who called
what were either non-existent or very obscure with regards to
these numbers.  This, naturally, made them more popular than
numbers that showed up on a bill, even if it was only for
a minute.  Today, many 800 numbers go overseas, which provides
a quick and free way into another country's phone system
which may be more open for exploration."


03. Are there on-line versions of 2600 available?

	No.


04. I can't find 2600 at any bookstores.  What can I do?

Subscribe.  Or, let 2600 know via the subscription address that you
think 2600 should be in the bookstore.  Be sure to include the
bookstores name and address.


05. Why does 2600 cost more to subscribe to than to buy at a newsstand?

A note from Emmanuel Goldstein:

  We've been selling 2600 at the same newsstand price ($4) since 1988
  and we hope to keep it at that price for as long as we can get away
  with it. At the same time, $21 is about the right price to cover
  subscriber costs, including postage and record keeping, etc. People
  who subscribe don't have to worry about finding an issue someplace,
  they tend to get issues several weeks before the newsstands get
  them, and they can take out free ads in the 2600 Marketplace.

  This is not uncommon in the publishing industry.  The NY Times, for
  example, costs $156.50 at the newsstands, and $234.75 delivered to your
  door.


Section E: Phrack Magazine
~~~~~~~~~~~~~~~~~~~~~~~~~~

01. What Is Phrack Magazine?

    Phrack Magazine is one of the longest running electronic-based publications
    in the world.  Originally founded in 1985 by Knight Lightning and Taran
    King, it has survived several incarnations of editors and still remains
    true to its underground roots.  Since its inception, Phrack has been
    providing the hacker community with information on operating systems,
    networking technologies and telephony, as well as relaying human interest
    features of interest to the international computer underground.

    During its lifetime, Phrack has always been at the center of controversy.
    Since the magazine has always been openly available, it presented law
    enforcement officials with what they percieved to be a direct link into
    the secret society of computer hackers.  Not truly understnding either
    the the spirit of the magazine or the community for which it was written,
     Federal Agents and Prosecutors began to target Phrack Magazine and those
    affiliated with it.

    "The Hacker Crackdown" by Bruce Sterling relays the details surrounding
    some of these events.

    Phrack Magazine is now in its 10th year of publication, and is registered
    with the Library of Congress as ISSN 1068-1035, and is protected by
    US Copyright Law.

02. How can I reach Phrack Magazine?

    You can reach Phrack by email at:  phrack@well.com, phrack@fc.net or
    phrackmag@aol.com.  These addresses are listed in order of
    preference.  Only AOL users should email the phrackmag@aol.com.

    Phrack can be reached by the postal service at:

    Phrack Magazine
    603 W. 13th #1A-278
    Austin, TX 78701

03. Who Publishes Phrack?

   Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe.  It is
   hobbled together, touched up, spell checked and compressed on an overworked
   486-66.  It is then ftp'ed over to a BSDI UNIX machine where it is sent to
   the masses.

04. How Often Does Phrack Go Out?

    Phrack goes out roughly quarterly.  It is often sent out later than every
    three months due to other more demanding obligations faced by its editor.
    The regularity of Phrack is really based upon the amount of information
    sent in.  Phrack depends solely upon submissions to get published at all.

05. How Do I Subscribe?

    To subscribe to Phrack magazine, merely email phrack@well.com and ask to
    be placed on the mailing list.

    Any encrypted subscriptions requests will be ignored.

    Phrack will not accept subscription requests from any anonymous remailers or
    from sites in the fidonet domain.  The anonymous remailers consistently
    bounce our mailings causing a big headache, so we won't use them.  The
    fidonet domain administrators have asked us not to mail Phrack to fido users,
    because of the huge load it places on their outgoing spools (costing them a
    lot of money to send).

06. Why Don't I Get Any Response When I E-mail Phrack?

    Because of the high volume of mail sent to the Phrack email address,
    not everyone gets a response.  All subscription requests are saved and
    added to the master list, but there is no automatic reply.  All other
    messages are responded to as they are read, with the exception of PGP'd
    messages.  All PGP'd email is stored for later decryption, and is almost
    never responded to, unless it is incredibly urgent.

07. Does Phrack Cost Money?

    Phrack Magazine charges a registration fee of $100.00 per user for any
    professional use of the magazine and the information contained therein.
    Information regarding this registration fee is contained at the beginning
    of every issue of Phrack.

08. How Can I Submit Articles?

    Articles are both wanted and needed.  Phrack only exists if people write
    for it.  There is no regular writing staff, there is only the editor, who
    cannot write the entire thing himself.

    Articles can be sent to Phrack via email or snailmail (on paper or
    IBM-compatible diskette).  Articles should be in ASCII text format.  Do
    not include any clever graphics or ANSI art.  You can use Phrack's PGP key
    to encrypt articles, but send the files in the ASCII armor format.

    Please try to avoid sending files as MIME-compliant mail attachments.

09. What Is Phrack's PGP Key?

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: 2.6

    mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
    Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
    Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
    tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
    =evjv
    -----END PGP PUBLIC KEY BLOCK-----

10. Where Can I Get Back Issues?

   Back issues of Phrack are found on many bulletin boards around the globe.
   The only OFFICIAL Phrack Magazine distribution site is our ftp archive
   at ftp.fc.net in /pub/phrack.  There are NO official distribution sites
   other than this one, nor will there ever be.  We don't want to play
   favorites and let one particular BBS call itself an "official" site while
   another isn't.  Therefore, there will be no "official" sites except those
   archived by Phrack itself.

   You can also get back issues on the World Wide Web by connecting to:
   http://www.fc.net/phrack.html

   This URL allows users to view issues online, or pull them down for
   later viewing.

   Any users without net access can send diskettes and postage to the
   Phrack Postal Address given above, and request back issues to be
   sent via the postal system.

Section F: Miscellaneous
~~~~~~~~~~~~~~~~~~~~~~~~

01. What does XXX stand for?

TLA     Three Letter Acronym

ACL     Access Control List
PIN     Personal Identification Number
TCB     Trusted Computing Base

ALRU    Automatic Line Record Update
AN      Associated Number
ARSB    Automated Repair Service Bureau
ATH     Abbreviated Trouble History
BOC     Bell Operating Company
BOR     Basic Output Report
BOSS    Business Office Servicing System
CA      Cable
COE     Central Office Equipment
COSMOS  Computer System for Main Frame Operations
CMC     Construction Maintenance Center
CNID    Calling Number IDentification
CO      Central Office
COCOT   Customer Owned Coin Operated Telephone
CRSAB   Centralized Repair Service Answering Bureau
DDD     Direct Distance Dialing
ECC     Enter Cable Change
LD      Long Distance
LMOS    Loop Maintenance Operations System
MLT     Mechanized Loop Testing
NPA     Numbering Plan Area
POTS    Plain Old Telephone Service
RBOC    Regional Bell Operating Company
RSB     Repair Service Bureau
SS      Special Service
TAS     Telephone Answering Service
TH      Trouble History
TREAT   Trouble Report Evaluation and Analysis Tool

LOD     Legion of Doom
HFC     Hell Fire Club
TNO     The New Order

ACiD    Ansi Creators in Demand
CCi     Cybercrime International
FLT     Fairlight
iCE     Insane Creators Enterprise
iNC     International Network of Crackers
NTA     The Nocturnal Trading Alliance
PDX     Paradox
PE      Public Enemy
PSY     Psychose
QTX     Quartex
RZR     Razor (1911)
S!P     Supr!se Productions
TDT     The Dream Team
THG     The Humble Guys
THP     The Hill People
TRSI    Tristar Red Sector Inc.
UUDW    Union of United Death Workers


02. How do I determine if I have a valid credit card number?

Credit cards use the Luhn Check Digit Algorithm.  The main purpose of
this algorithm is to catch data entry errors, but it does double duty
here as a weak security tool.

For a card with an even number of digits, double every odd numbered
digit and subtract 9 if the product is greater than 9.  Add up all the
even digits as well as the doubled-odd digits, and the result must be
a multiple of 10 or it's not a valid card.  If the card has an odd
number of digits, perform the same addition doubling the even numbered
digits instead.


03. What bank issued this credit card?

1033    Manufacturers Hanover Trust
1035    Citibank
1263    Chemical Bank
1665    Chase Manhattan
4024    Bank of America
4128    Citicorp
4209    New Era Bank
4302    HHBC
4310    Imperial Savings
4313    MBNA
4317    California Federal
5282    Wells Fargo
5424    Citibank
5410    Wells Fargo
5432    Bank of New York
6017    MBNA


04. What are the ethics of hacking?

An excerpt from: Hackers: Heroes of the Computer Revolution
                          by Steven Levy

        Access to computers -- and anything which might teach you
        something about the way the world works -- should be unlimited
        and total. Always yield to the Hands-On imperative.

        All information should be free.

        Mistrust Authority.  Promote Decentralization.

        Hackers should be judged by their hacking, not bogus criteria
        such as degrees, age, race, or position.

        You can create art and beauty on a computer.

        Computers can change your life for the better.


04. Where can I get a copy of the alt.2600/#hack FAQ?

Get it on FTP at:
rahul.net      /pub/lps
rtfm.mit.edu   /pub/usenet-by-group/alt.2600
ftp.clark.net  /pub/jcase

Get it on the World Wide Web at:
http://dfw.net/~aleph1
http://www.engin.umich.edu/~jgotts/hack-faq.html
http://www.phantom.com/~king

Get it from these BBS's:
Hacker's Haven (303)343-4053





EOT

<< Предыдущая ИНДЕКС Поиск в статьях src Установить закладку Перейти на закладку Следующая >>

 Добавить комментарий
Имя:
E-Mail:
Заголовок:
Текст:




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру