Path: senator-bedfellow.mit.edu!bloom-beacon.mit.edu!news2.telebyte.nl!border1.nntp.dca.giganews.com!border2.nntp.dca.giganews.com!nntp.giganews.com!cyclone1.gnilink.net!gnilink.net!wn14feed!worldnet.att.net!attbi_s01.POSTED!53ab2750!not-for-mail
From: [email protected] (The Voyager)
Organization: The alt.2600 / #hack FAQ
Subject: alt.2600 FAQ Revision 2004/06/08 - Part 1/1
User-Agent: Pan/0.14.2 (This is not a psychotic episode. It's a cleansing moment of clarity.)
Message-ID: <[email protected]>
Newsgroups: alt.2600,alt.answers,news.answers
Followup-To: alt.2600
Reply-To: [email protected] (FAQ Comments address)
Approved: [email protected]
Summary: This posting contains a URL pointer to a list of Frequently Asked
Archive-Name: alt-2600/faq
Posting-Frequency: Monthly
Last-Modified: 2004/06/08
Version: 2004/06/08
URL: http://www.tech-faq.com
MIME-Version: 1.0
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 8bit
Lines: 789
NNTP-Posting-Host: 24.9.189.132
X-Complaints-To: [email protected]
X-Trace: attbi_s01 1086691202 24.9.189.132 (Tue, 08 Jun 2004 10:40:02 GMT)
NNTP-Posting-Date: Tue, 08 Jun 2004 10:40:02 GMT
Date: Tue, 08 Jun 2004 10:40:03 GMT
Xref: senator-bedfellow.mit.edu alt.2600:744602 alt.answers:72969 news.answers:271608

From: [email protected] (The Voyager)
Newsgroups: alt.2600,alt.answers,news.answers
Subject: alt.2600 FAQ Revision 2004/06/08 - Part 1/1
Followup-To: alt.2600
Approved: [email protected]
Reply-To: [email protected] (FAQ Comments address)
Summary: This posting contains a URL pointer to a list of Frequently Asked
        Questions (and their answers) about hacking.  It should be read by
        anyone who wishes to post to the alt.2600 newsgroup or use the IRC
        channel #hack.

Archive-Name: alt-2600/faq
Posting-Frequency: Monthly
Last-Modified: 2004/06/08
Version: 2004/06/08
URL: http://www.tech-faq.com


Welcome to the alt.2600/#hack FAQ: Answers to Frequently Asked Questions about
Hacking

The purpose of the alt.2600/#hack FAQ is to give you a general introduction to
the art and science of hacking. No document will make you a hacker.

Please use the information contained in the alt.2600/#hack FAQ wisely.

If you have a question regarding any of the topics covered in the
alt.2600/#hack FAQ, please direct it to the alt.2600 newsgroup. Please do
not e-mail me your questions; I do not have time to respond to each
request personally.

The alt.2600/#hack FAQ started as a FAQ for the IRC channel #hack and was
later adopted by the alt.2600 newsgroup. The alt.2600/#hack FAQ now exists
as a web document for all of the Internet.

The alt.2600 / #hack FAQ is no longer maintained as an ASCII text file.

The only authoritative source for the current alt.2600/#hack FAQ is on the
world wide web at http://www.tech-faq.com

The contents of the alt.2600 / #hack FAQ include:

http://www.tech-faq.com/computers/reset-bios-password.shtml
    How do I reset a BIOS password?

http://www.tech-faq.com/computers/windows-password-file.shtml
    How do I access the Windows NT/2000/XP password file?

http://www.tech-faq.com/computers/audit-windows-nt-passwords.shtml
    How do I audit Windows NT passwords?

http://www.tech-faq.com/computers/recover-windows-nt-administrator-password.shtml
    How can I recover a lost Windows NT Administrator Password?

http://www.tech-faq.com/computers/windows-password-encryption.shtml
    How does the Microsoft Windows 3.1 password encryption work?

http://www.tech-faq.com/computers/strange-directory-file-names.shtml
    How do I change to directories with strange characters in them?

http://www.tech-faq.com/computers/identify-system.shtml
    What is this system?

http://www.tech-faq.com/computers/default-accounts-passwords.shtml
    What are some default accounts?

http://www.tech-faq.com/computers/computer-virus.shtml
    What is a computer virus?

http://www.tech-faq.com/computers/computer-worm-virus.shtml
    What is a computer worm?

http://www.tech-faq.com/computers/trojan-horse-virus.shtml
    What is a trojan horse?

http://www.tech-faq.com/computers/logic-bomb.shtml
    What is a logic bomb?

http://www.tech-faq.com/computers/protect-from-viruses.shtml
    How can I protect myself from viruses?

http://www.tech-faq.com/computers/information-about-viruses.shtml
    Where can I get more information about viruses?

http://www.tech-faq.com/computers/free-spyware-removal.shtml
    How do I remove spyware?

http://www.tech-faq.com/computers/key-logger.shtml
    What is a key logger?

http://www.tech-faq.com/computers/tempest.shtml
    What is TEMPEST?

http://www.tech-faq.com/computers/hex-editor.shtml
    What is a hex editor?

http://www.tech-faq.com/computers/debuggers-disassemblers.shtml
    What are debuggers and disassemblers?

http://www.tech-faq.com/computers/decompiler.shtml
    Is there a decompiler to convert an executable into C/C++ code?

http://www.tech-faq.com/computers/ids-intrusion-detection-system.shtml
    What is an Intrusion Detection System (IDS)?

http://www.tech-faq.com/computers/vulnerability-information.shtml
    Where can I find information about vulnerabilities?

http://www.tech-faq.com/computers/source-code-security-vulnerabilities.shtml
    How can I find security vulnerabilities in my source code?

http://www.tech-faq.com/computers/integer-overflow.shtml
    What is an integer overflow?

http://www.tech-faq.com/computers/race-condition.shtml
    What is a race condition?

http://www.tech-faq.com/computers/format-string-vulnerability.shtml
    What is a format string vulnerability?

http://www.tech-faq.com/computers/random-number.shtml
    What is a random number vulnerability?

http://www.tech-faq.com/computers/sql-injection-attack.shtml
    What is an SQL Injection Attack / Vulnerability?

http://www.tech-faq.com/computers/securely-erase-data.shtml
    How can I securely erase data?

http://www.tech-faq.com/computers/two-factor-authentication.shtml
    What is two factor authentication?

http://www.tech-faq.com/unix/audit-unix-passwords.shtml
    How do I audit Unix passwords?

http://www.tech-faq.com/unix/unix-password-shadowing.shtml
    What is password shadowing?

http://www.tech-faq.com/unix/nis-yp.shtml
    What is NIS (yp)?

http://www.tech-faq.com/unix/weird-characters-password-file.shtml
    What are those weird characters after the comma in my passwd file?

http://www.tech-faq.com/unix/restricted-shell.shtml
    What is a restricted shell?

http://www.tech-faq.com/unix/unix-file-permissions.shtml
    How do Unix file permissions work?

http://www.tech-faq.com/unix/suid-root-script-binary.shtml
    What security problems exist with SUID script and programs?

http://www.tech-faq.com/unix/unix-system-log-files.shtml
    How do Unix system log files work?

http://www.tech-faq.com/unix/rootkit.shtml
    What is a rootkit?

http://www.tech-faq.com/unix/timestamp.shtml
    How do Unix timestamps work?

http://www.tech-faq.com/unix/sudo.shtml
    What is sudo?

http://www.tech-faq.com/unix/bootable-linux-distributions.shtml
    What are some bootable Linux distributions?

http://www.tech-faq.com/data-networks/change-mac-address.shtml
    How do I change a MAC address?

http://www.tech-faq.com/data-networks/cisco-password-recovery.shtml
    How do I recover the password for a Cisco router?

http://www.tech-faq.com/data-networks/cisco-decrypt-password.shtml
    How do I recover Cisco passwords?

http://www.tech-faq.com/data-networks/127.0.0.1.shtml
    What is 127.0.0.1?

http://www.tech-faq.com/data-networks/packet-sniffer.shtml
    What is a packet sniffer?

http://www.tech-faq.com/data-networks/port-scanner.shtml
    What is a port scanner?

http://www.tech-faq.com/data-networks/port-numbers.shtml
    What port number is XXX on?

http://www.tech-faq.com/data-networks/anonymous-surfing.shtml
    What is anonymous surfing?

http://www.tech-faq.com/data-networks/cookies.shtml
    What are cookies?

http://www.tech-faq.com/data-networks/anonymous-remailer.shtml
    What is an anonymous remailer?

http://www.tech-faq.com/data-networks/free-e-mail-encryption.shtml
    What are some free e-mail services with encryption?

http://www.tech-faq.com/data-networks/send-fake-mail.shtml
    How do I send fake mail?

http://www.tech-faq.com/data-networks/fake-post-control-messages-usenet.shtml
    How do I fake posts and control messages to Usenet?

http://www.tech-faq.com/data-networks/post-moderated-usenet.shtml
    How do I post to a moderated newsgroup?

http://www.tech-faq.com/data-networks/post-usenet-mail.shtml
    How do I post to Usenet via e-mail?

http://www.tech-faq.com/data-networks/firewall.shtml
    What is a firewall?

http://www.tech-faq.com/data-networks/vpn-virtual-private-network.shtml
    What is a VPN (Virtual Private Network)?

http://www.tech-faq.com/data-networks/ssh-secure-shell.shtml
    What is SSH (Secure Shell)?

http://www.tech-faq.com/data-networks/osi-model.shtml
    What is the OSI model?

http://www.tech-faq.com/data-networks/hack-irc-client.shtml
    How do I modify the IRC client to hide my real username?

http://www.tech-faq.com/data-networks/internet-outdial.shtml
    What is an Internet outdial?

http://www.tech-faq.com/data-networks/tcp-sequence-prediction.shtml
    What is a TCP sequence prediction attack?

http://www.tech-faq.com/data-networks/packet-fragmentation.shtml
    What is packet fragmentation?

http://www.tech-faq.com/data-networks/dos-denial-of-service-attack.shtml
    What is a Denial of Service (DoS) attack?

http://www.tech-faq.com/data-networks/p2p-peer-to-peer-file-sharing.shtml
    What is peer-to-peer (P2P) file sharing?

http://www.tech-faq.com/data-networks/fibre-channel-security.shtml
    How secure are Fibre Channel networks?

http://www.tech-faq.com/data-networks/scada.shtml
    What is SCADA?

http://www.tech-faq.com/data-networks/ldap-lightweight-directory-access-protocol.shtml
    What is LDAP (Lightweight Directory Access Protocol)?

http://www.tech-faq.com/data-networks/ldap-security.shtml
    What security issues does LDAP (Lightweight Directory Access Protocol) have?

http://www.tech-faq.com/data-networks/radius.shtml
    What is RADIUS?

http://www.tech-faq.com/data-networks/hotmail-password-recovery.shtml
    How does Hotmail password recovery work?

http://www.tech-faq.com/data-networks/aim-password-recovery.shtml
    How does AIM password recovery work?

http://www.tech-faq.com/data-networks/icq-password-recovery.shtml
    How does ICQ password recovery work?

http://www.tech-faq.com/data-networks/internet-explorer-stored-password-recovery.shtml
    How does Internet Explorer password recovery work?

http://www.tech-faq.com/data-networks/netscape-navigator-stored-password-recovery.shtml
    How does Netscape Navigator password recovery work?

http://www.tech-faq.com/wireless-networks/wireless-networks.shtml
    What are the types of wireless networks?

http://www.tech-faq.com/wireless-networks/cdpd-cellular-digital-packet-data.shtml
    What is CDPD (Cellular Digital Packet Data)?

http://www.tech-faq.com/wireless-networks/hscsd-high-speed-circuit-switched-data.shtml
    What is HSCSD (High Speed Circuit Switched Data)?

http://www.tech-faq.com/wireless-networks/pdc-p-packet-data-cellular.shtml
    What is PDC-P (Packet Data Cellular)?

http://www.tech-faq.com/wireless-networks/gprs-general-packet-radio-service.shtml
    What is GPRS (General Packet Radio Service)?

http://www.tech-faq.com/wireless-networks/cdma-2000-1xrtt.shtml
    What is CDMA-2000 1xRTT?

http://www.tech-faq.com/wireless-networks/bluetooth.shtml
    What is Bluetooth?

http://www.tech-faq.com/wireless-networks/irda-infrared.shtml
    What is IrDA?

http://www.tech-faq.com/wireless-networks/lmds-local-multipoint-distribution-service.shtml
    What is LMDS (Local Multipoint Distribution Service)?

http://www.tech-faq.com/wireless-networks/mmds-multichannel-multipoint-distribution-service.shtml
    What is MMDS (Multichannel Multipoint Distribution Service)?

http://www.tech-faq.com/wireless-networks/wi-fi-802.11.shtml
    What is Wi-Fi (802.11)?

http://www.tech-faq.com/wireless-networks/ssid.shtml
    What is a SSID?

http://www.tech-faq.com/wireless-networks/wep-wired-equivalent-privacy.shtml
    What is WEP (Wired Equivalent Privacy)?

http://www.tech-faq.com/wireless-networks/eap-leap-peap-eap-tls-ttls.shtml
    What are EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS?

http://www.tech-faq.com/wireless-networks/wpa-wi-fi-protected-access.shtml
    What is WPA (Wi-Fi Protected Access)?

http://www.tech-faq.com/wireless-networks/802.11i.shtml
    What is 802.11i?

http://www.tech-faq.com/wireless-networks/mic-message-integrity-check.shtml
    What is MIC (Message Integrity Check)?

http://www.tech-faq.com/wireless-networks/rsn-robust-secure-network.shtml
    What is RSN (Robust Secure Network)?

http://www.tech-faq.com/wireless-networks/tkip-temporal-key-integrity-protocol.shtml
    What is TKIP (Temporal Key Integrity Protocol)?

http://www.tech-faq.com/wireless-networks/wrap-wireless-robust-authenticated-protocol.shtml
    What is WRAP (Wireless Robust Authenticated Protocol)?

http://www.tech-faq.com/wireless-networks/ccmp-cipher-block-chaining-message-authentication-code-protocol.shtml
    What is CCMP?

http://www.tech-faq.com/wireless-networks/802.1X.shtml
    What is 802.1X?

http://www.tech-faq.com/wireless-networks/mac-address-filtering.shtml
    What is MAC Address Filtering?

http://www.tech-faq.com/wireless-networks/rogue-access-point.shtml
    What is a rogue wireless access point?

http://www.tech-faq.com/wireless-networks/wireless-antenna.shtml
    What are some better wireless antenna?

http://www.tech-faq.com/wireless-networks/location-directory-wi-fi-hotspot.shtml
    Where can I find a Wi-Fi hotspot?

http://www.tech-faq.com/wireless-networks/wi-fi-software-tools.shtml
    What are some interesting Wi-Fi (802.11) tools?

http://www.tech-faq.com/wireless-networks/sms-short-message-service.shtml
    What is SMS (Short Message Service)?

http://www.tech-faq.com/wireless-networks/wap-wireless-application-protocol.shtml
    What is WAP (Wireless Application Protocol)?

http://www.tech-faq.com/telephony/telephone-tone-frequencies.shtml
    What are the frequencies of the telephone tones?

http://www.tech-faq.com/telephony/dtmf-tone-frequencies.shtml
    What are the DTMF tone frequencies?

http://www.tech-faq.com/telephony/abcd.shtml
    What are the ABCD tones for?

http://www.tech-faq.com/telephony/telephone-voltage.shtml
    What is the voltage used to ring a telephone?

http://www.tech-faq.com/telephony/lass-codes.shtml
    What are all of the * (LASS) codes?

http://www.tech-faq.com/telephony/red-box.shtml
    What is a Red Box?

http://www.tech-faq.com/telephony/blue-box.shtml
    What is a Blue Box?

http://www.tech-faq.com/telephony/blue-boxing.shtml
    Do Blue Boxes still work?

http://www.tech-faq.com/telephony/black-box.shtml
    What is a Black Box?

http://www.tech-faq.com/telephony/colored-telephone-boxes.shtml
    What do all the colored boxes do?

http://www.tech-faq.com/telephony/ani-automatic-number-identification.shtml
    What is ANI (Automatic Number Identification)?

http://www.tech-faq.com/telephony/anac-number.shtml
    What is an ANAC number?

http://www.tech-faq.com/telephony/ringback-number.shtml
    What is a ringback number?

http://www.tech-faq.com/telephony/loop.shtml
    What is a loop?

http://www.tech-faq.com/telephony/cna-number.shtml
    What is a CNA number?

http://www.tech-faq.com/telephony/ring-busy.shtml
    What are some numbers that always ring busy?

http://www.tech-faq.com/telephony/temporary-disconnect.shtml
    What are some numbers that temporarily disconnect phone service?

http://www.tech-faq.com/telephony/war-dialing.shtml
    What is war dialing?

http://www.tech-faq.com/telephony/war-dialing-law.shtml
    Is war dialing illegal?

http://www.tech-faq.com/telephony/make-linemans-handset.shtml
    How can I make a lineman's handset?

http://www.tech-faq.com/telephony/purchase-linemans-handset.shtml
    Where can I purchase a lineman's handset?

http://www.tech-faq.com/telephony/cordless-phone-frequencies.shtml
    What frequencies do cordless phones operate on?

http://www.tech-faq.com/telephony/caller-id.shtml
    What is Caller-ID?

http://www.tech-faq.com/telephony/block-caller-id.shtml
    How do I block Caller-ID?

http://www.tech-faq.com/telephony/defeat-caller-id.shtml
    How do I defeat Caller-ID blocking?

http://www.tech-faq.com/telephony/pbx.shtml
    What is a PBX?

http://www.tech-faq.com/telephony/vmb-voice-mail-box.shtml
    What is a VMB (Voice Mail Box)?

http://www.tech-faq.com/telephony/country-direct-numbers.shtml
    What are the Country Direct Numbers?

http://www.tech-faq.com/telephony/phone-switches.shtml
    What are some phone switches?

http://www.tech-faq.com/telephony/milliwatt-test-line.shtml
    What is a milliwatt test line?

http://www.tech-faq.com/telephony/958-959.shtml
    What are the 958 and 959 NXX's?

http://www.tech-faq.com/telephony/clli-codes.shtml
    What are CLLI codes?

http://www.tech-faq.com/telephony/datu.shtml
    What is DATU?

http://www.tech-faq.com/telephony/proctor-test-set.shtml
    What is a Proctor Test Set?

http://www.tech-faq.com/telephony/call-back-dial-back.shtml
    What is call back security?

http://www.tech-faq.com/mobile-telephony/mobile-telephone-systems.shtml
    How many types of mobile telephone systems are there?

http://www.tech-faq.com/mobile-telephony/advanced-mobile-phone-system.shtml
    What are AMPS (EIA/TIA-553) and NAMPS (IS-91)?

http://www.tech-faq.com/mobile-telephony/mtso-mobile-telephone-switching-office.shtml
    What is a MTSO (Mobile Telephone Switching Office)?

http://www.tech-faq.com/mobile-telephony/nam-number-assignment-module.shtml
    What is a NAM (Number Assignment Module)?

http://www.tech-faq.com/mobile-telephony/esn-electronic-serial-number.shtml
    What is an ESN (Electronic Serial Number)?

http://www.tech-faq.com/mobile-telephony/min-mobile-identification-number.shtml
    What is a MIN (Mobile Identification Number)?

http://www.tech-faq.com/mobile-telephony/scm-station-class-mark.shtml
    What is a SCM (Station Class Mark)?

http://www.tech-faq.com/mobile-telephony/sidh-system-identification-for-home-system.shtml
    What is a SIDH? (System Identification for Home System)

http://www.tech-faq.com/mobile-telephony/forward-reverse-channels.shtml
    What are the forward and reverse channels?

http://www.tech-faq.com/mobile-telephony/tdma.shtml
    What are IS-54 and IS-136 (TDMA)?

http://www.tech-faq.com/mobile-telephony/cdma-is-95.shtml
    What is IS-95 (CDMA)?

http://www.tech-faq.com/mobile-telephony/gsm.shtml
    What is GSM?

http://www.tech-faq.com/mobile-telephony/pcs.shtml
    What is PCS?

http://www.tech-faq.com/mobile-telephony/iden.shtml
    What is iDEN?

http://www.tech-faq.com/mobile-telephony/cell-phone-cloning.shtml
    What is cloning?

http://www.tech-faq.com/mobile-telephony/tumbling.shtml
    What is tumbling?

http://www.tech-faq.com/radio/geek-radios.shtml
    What radios are popular with geeks?

http://www.tech-faq.com/radio/radio-license.shtml
    Do I need a license to use one of these radios?

http://www.tech-faq.com/radio/radio-modification.shtml
    What about modifying (modding) these radios?

http://www.tech-faq.com/radio/scanners.shtml
    What are better radios for scanning?

http://www.tech-faq.com/radio/trunking.shtml
    What is trunking?

http://www.tech-faq.com/radio/pirate-radio.shtml
    What is pirate radio?

http://www.tech-faq.com/radio/radio-frequencies.shtml
    What frequencies are used for what purposes?

http://www.tech-faq.com/radio/cb-citizens-band-radio.shtml
    What is CB (Citizens Band) Radio?

http://www.tech-faq.com/radio/frs-family-radio-service.shtml
    What is FRS (Family Radio Service)?

http://www.tech-faq.com/radio/murs-multi-use-radio-service.shtml
    What is MURS (Multi Use Radio Service)?

http://www.tech-faq.com/radio/gmrs-general-mobile-radio-service.shtml
    What is GMRS (General Mobile Radio Service)?

http://www.tech-faq.com/radio/radio-repeater.shtml
    What is a radio repeater?

http://www.tech-faq.com/radio/internet-repeater.shtml
    What is an Internet repeater?

http://www.tech-faq.com/radio/rfid.shtml
    What is RFID?

http://www.tech-faq.com/television/satellite-television.shtml
    What kinds of satellite television networks are there?

http://www.tech-faq.com/television/videocipher-ii.shtml
    What is VideoCipher II RS (VCII RS)?

http://www.tech-faq.com/television/digicipher-ii.shtml
    What is DigiCipher II (DCII)?

http://www.tech-faq.com/television/directv-access-cards.shtml
    What kinds of DirecTV access cards are there?

http://www.tech-faq.com/television/signal-theft.shtml
    What do DirecTV and Dish Network do to stop signal theft?

http://www.tech-faq.com/television/software-dss-access-cards.shtml
    What software is there to experiment with access cards?

http://www.tech-faq.com/television/access-card-reader-writer.shtml
    What are the different types of access card hardware?

http://www.tech-faq.com/television/where-access-card-reader-writer.shtml
    Where can I purchase hardware to experiment with access cards?

http://www.tech-faq.com/television/directv-extension.shtml
    What is this extension DirecTV is telling me to call?

http://www.tech-faq.com/television/tivo.shtml
    What can I do with a TiVo?

http://www.tech-faq.com/television/content-scrambling-system.shtml
    What is CSS (Content Scrambling System)?

http://www.tech-faq.com/television/regional-playback-control.shtml
    What is RPC (Regional Playback Control)?

http://www.tech-faq.com/television/regional-coding-enhancement.shtml
    What is RCE (Regional Coding Enhancement)?

http://www.tech-faq.com/television/macrovision.shtml
    What is Macrovision?

http://www.tech-faq.com/cryptology/cryptology-cryptography-cryptanalysis.shtml
    What are cryptology, cryptography, and cryptanalysis?

http://www.tech-faq.com/cryptology/plaintext-ciphertext.shtml
    What are plaintext and ciphertext?

http://www.tech-faq.com/cryptology/symmetric-asymmetric.shtml
    What are symmetric and asymmetric ciphers?

http://www.tech-faq.com/cryptology/block-stream-cipher.shtml
    What are block and stream ciphers?

http://www.tech-faq.com/cryptology/substitution-transposition-cipher.shtml
    What are substitution and transposition ciphers?

http://www.tech-faq.com/cryptology/chosen-plaintext-attack.shtml
    What is a chosen plaintext attack?

http://www.tech-faq.com/cryptology/known-plaintext-attack.shtml
    What is a known plaintext attack?

http://www.tech-faq.com/cryptology/known-ciphertext-attack.shtml
    What is a known ciphertext attack?

http://www.tech-faq.com/cryptology/dictionary-attack.shtml
    What is a dictionary attack?

http://www.tech-faq.com/cryptology/brute-force-attack.shtml
    What is a brute force attack?

http://www.tech-faq.com/cryptology/rubber-hose-cryptology.shtml
    What is rubber hose cryptology?

http://www.tech-faq.com/cryptology/message-digest.shtml
    What is a message digest?

http://www.tech-faq.com/cryptology/md5.shtml
    What is MD5?

http://www.tech-faq.com/cryptology/digital-signature.shtml
    What is a digital signature?

http://www.tech-faq.com/cryptology/pgp.shtml
    What is PGP?

http://www.tech-faq.com/cryptology/gpg.shtml
    What is GPG?

http://www.tech-faq.com/cryptology/disk-encrypt.shtml
    How can I encrypt an entire disk?

http://www.tech-faq.com/cryptology/cryptographic-algorithms.shtml
    What are some common cryptographic algorithms?

http://www.tech-faq.com/cryptology/rot-13.shtml
    What is ROT-13?

http://www.tech-faq.com/cryptology/xor-encryption.shtml
    What is XOR encryption?

http://www.tech-faq.com/cryptology/one-time-pad.shtml
    What is a one-time pad?

http://www.tech-faq.com/cryptology/des-data-encryption-standard.shtml
    What is DES?

http://www.tech-faq.com/cryptology/rc4.shtml
    What is RC4?

http://www.tech-faq.com/cryptology/rsa-rivest-shamir-adleman.shtml
    What is RSA?

http://www.tech-faq.com/cryptology/dh-diffie-hellman.shtml
    What is Diffie-Hellman?

http://www.tech-faq.com/cryptology/aes-advanced-encryption-standard-rijndael.shtml
    What is AES (Rijndael)?

http://www.tech-faq.com/cryptology/cryptographic-libraries.shtml
    What are some useful cryptographic libraries?

http://www.tech-faq.com/cryptology/kerberos.shtml
    What is Kerberos?

http://www.tech-faq.com/cryptology/tls-transport-layer-security.shtml
    What is TLS (Transport Layer Security)?

http://www.tech-faq.com/cryptology/steganography.shtml
    What is steganography?

http://www.tech-faq.com/cryptology/recover-zip-password.shtml
    How can I recover a Zip password?

http://www.tech-faq.com/cryptology/rar-password-recovery.shtml
    How does RAR password recovery work?

http://www.tech-faq.com/cryptology/arj-password-recovery.shtml
    How does ARJ password recovery work?

http://www.tech-faq.com/cryptology/word-password-recovery.shtml
    How does Microsoft Word password recovery work?

http://www.tech-faq.com/cryptology/excel-password-recovery.shtml
    How does Microsoft Excel password recovery work?

http://www.tech-faq.com/cryptology/powerpoint-password-recovery.shtml
    How does Microsoft PowerPoint password recovery work?

http://www.tech-faq.com/cryptology/pdf-password-recovery.shtml
    How does PDF password recovery work?

http://www.tech-faq.com/2600/alt-2600.shtml
    What is alt.2600?

http://www.tech-faq.com/2600/meaning-2600.shtml
    What does 2600 mean?

http://www.tech-faq.com/2600/2600-online.shtml
    Are there on-line versions of 2600 available?

http://www.tech-faq.com/2600/2600-bookstores.shtml
    I can't find 2600 at any bookstores.  What can I do?

http://www.tech-faq.com/2600/2600-cost.shtml
    Why does 2600 cost more to subscribe to than to buy at a newsstand?

http://www.tech-faq.com/cards/smart-card.shtml
    What is a Smart Card?

http://www.tech-faq.com/cards/common-smart-card.shtml
    What are some common Smart Cards?

http://www.tech-faq.com/cards/mag-stripe-cards.shtml
    What is the layout of data on magnetic stripe cards?

http://www.tech-faq.com/cards/valid-credit-card-number.shtml
    How do I determine if I have a valid credit card number?

http://www.tech-faq.com/miscellaneous/pick-locks.shtml
    How can I pick locks?

http://www.tech-faq.com/miscellaneous/simplex-lock.shtml
    How do I open a Simplex lock?

http://www.tech-faq.com/miscellaneous/bar-codes.shtml
    How do bar codes work?

http://www.tech-faq.com/miscellaneous/acronyms.shtml
    What does XXX stand for?

http://www.tech-faq.com/miscellaneous/pda.shtml
    What's inside my PDA (Personal Digital Assistant)?

http://www.tech-faq.com/miscellaneous/palm-pilot.shtml
    Can I hack my Palm Pilot?

http://www.tech-faq.com/miscellaneous/xbox.shtml
    Can I hack my XBOX?

http://www.tech-faq.com/miscellaneous/ethics-hacking.shtml
    What are the ethics of hacking?

http://www.tech-faq.com/miscellaneous/0-day.shtml
    What is 0-day?

http://www.tech-faq.com/miscellaneous/traffic-lights.shtml
    How do traffic lights work?

http://www.tech-faq.com/miscellaneous/biometrics.shtml
    What are biometrics?

http://www.tech-faq.com/miscellaneous/social-engineering.shtml
    What is social engineering?

http://www.tech-faq.com/miscellaneous/shoulder-surfing.shtml
    What is shoulder surfing?

http://www.tech-faq.com/miscellaneous/computer-crime-laws.shtml
    What are the computer crime laws?

http://www.tech-faq.com/miscellaneous/wordlist.shtml
    What is a wordlist?

http://www.tech-faq.com/miscellaneous/aaa-authentication-authorization-accounting.shtml
    What is AAA?

http://www.tech-faq.com/miscellaneous/role-based-access-control-rbac.shtml
    What is role based access control?