==Phrack Magazine==

                Volume Six, Issue Forty-Seven, File 8 of 22


05. What are some gopher sites of interest to hackers?

 ba.com                  (Bell Atlantic)
 csrc.ncsl.nist.gov      (NIST Security Gopher)
 gopher.acm.org          (SIGSAC (Security, Audit & Control))
 gopher.cpsr.org         (Computer Professionals for Social Responsibility)
 gopher.cs.uwm.edu
 gopher.eff.org          (Electonic Frontier Foundation)
 gw.PacBell.com          (Pacific Bell)
 iitf.doc.gov            (NITA -- IITF)
 oss.net                 (Open Source Solutions)
 spy.org                 (Computer Systems Consulting)
 wiretap.spies.com       (Wiretap)


06. What are some World wide Web (WWW) sites of interest to hackers?

 http://alumni.caltech.edu/~dank/isdn/           (ISDN)
 http://aset.rsoc.rockwell.com                   (NASA/MOD AIS Security)
 http://aset.rsoc.rockwell.com/exhibit.html      (Tech. for Info Sec)
 http://att.net/dir800                           (800 directory)
 http://ausg.dartmouth.edu/security.html         (Security)
 http://cs.purdue.edu/coast/coast.html           (Coast)
 http://csrc.ncsl.nist.gov                       (NIST)
 http://dhp.com/~pluvius
 http://dfw.net/~aleph1                          (Eubercrackers)
 http://draco.centerline.com:8080/~franl/crypto.html (Crypto)
 http://everest.cs.ucdavis.edu/Security.html     (Security)
 http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides)
 http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html  (CSSCR)
 http://first.org                                (FIRST)
 http://ftp.tamu.edu/~abr8030/security.html      (Security)
 http://hightop.nrl.navy.mil/potpourri.html      (Security)
 http://hightop.nrl.navy.mil/rainbow.html        (Rainbow Books)
 http://ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
 http://ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
 http://info.bellcore.com/BETSI/betsi.html       (Betsi)
 http://infosec.nosc.mil/infosec.html            (SPAWAR INFOSEC)
 http://l0pht.com                                (The l0pht)
 http://l0pht.com/~oblivion/IIRG.html            (Phantasy Magazine)
 http://mindlink.jolt.com                        (The Secrets of LockPicking)
 http://mls.saic.com                             (SAIC MLS)
 http://naic.nasa.gov/fbi/FBI_homepage.html      (FBI Homepage)
 http://nasirc.hq.nasa.gov                       (NASA ASIRC)
 http://ophie.hughes.american.edu/~ophie
 http://ripco.com:8080/~glr/glr.html             (Full Disclosure)
 http://spy.org                                  (CSC)
 http://tansu.com.au/Info/security.html          (Comp and Net Security)
 http://the-tech.mit.edu                         (LaMacchia case info)
 http://wintermute.itd.nrl.navy.mil/5544.html    (Network Security)
 http://www.aads.net                             (Ameritech)
 http://www.alw.nih.gov/WWW/security.html        (Unix Security)
 http://www.artcom.de/CCC                        (CCC Homepage)
 http://www.aspentec.com/~frzmtdb/fun/hacker.html
 http://www.aus.xanadu.com:70/1/EFA              (EFF Australia)
 http://www.ba.com                               (Bell Atlantic)
 http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
 http://www.bell.com                             (MFJ Task Force)
 http://www.bellcore.com/SECURITY/security.html  (Bellcore Security Products)
 http://www.brad.ac.uk/~nasmith/index.html
 http://www.bst.bls.com                          (BellSouth)
 http://www.c3.lanl.gov/~mcn                     (Lanl)
 http://www.cert.dfn.de/                         (German First Team)
 http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
 http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
 http://www.cpsr.org/home                        (CPSR)
 http://www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
 http://www.cs.tufts.edu/~mcable/HackerCrackdown (Hacker Crackdown)
 http://www.cs.umd.edu/~lgas
 http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security)
 http://www.csd.harris.com/secure_info.html      (Harris)
 http://www.csl.sri.com                          (SRI Computer Science Lab)
 http://www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
 http://www.datafellows.fi                       (Data Fellows)
 http://www.delmarva.com/raptor/raptor.html      (Raptor Network Isolator)
 http://www.demon.co.uk/kbridge                  (KarlBridge)
 http://www.digicash.com/ecash/ecash-home.html   (Digital Cash)
 http://www.digital.com/info/key-secure-index.html(Digital Secure Systems)
 http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq)
 http://www.eecs.nwu.edu/~jmyers/ids/index.html  (Intrusion Detection Systems)
 http://www.eff.org/papers.html                  (EFF)
 http://www.engin.umich.edu/~jgotts/boxes.html   (Box info)
 http://www.engin.umich.edu/~jgotts/hack-faq.html(This document)
 http://www.engin.umich.edu/~jgotts/underground.html
 http://www.ensta.fr/internet/unix/sys_admin     (System administration)
 http://www.etext.org/Zines/                     (Zines)
 http://www.fc.net/defcon                        (DefCon)
 http://www.fc.net/phrack.html                   (Phrack Magazine)
 http://www.first.org/first/                     (FIRST)
 http://www.greatcircle.com                      (Great Circle Associates)
 http://www.hpcc.gov/blue94/section.4.6.html     (NSA)
 http://www.ic.gov                               (The CIA)
 http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
 http://www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
 http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
 http://www.net23.com                            (Max Headroom)
 http://www.nist.gov                             (NIST)
 http://www.pacbell.com                          (Pacific Bell)
 http://www.paranoia.com/mthreat                 (ToneLoc)
 http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
 http://www.phantom.com/~king                    (Taran King)
 http://www.quadralay.com/www/Crypt/Crypt.html   (Quadralay Cryptography)
 http://www.qualcomm.com/cdma/wireless.html      (Qualcomm CDMA)
 http://www.research.att.com                     (AT&T)
 http://ripco.com:8080/~glr/glr.html             (Full Disclosure)
 http://www.rsa.com                              (RSA Data Security)
 http://www.satelnet.org/~ccappuc
 http://www.service.com/cm/uswest/usw1.html      (USWest)
 http://www.shore.net/~oz/welcome.html           (Hack TV)
 http://www.spy.org                              (Computer Systems Consulting)
 http://www.sri.com                              (SRI)
 http://www.tansu.com.au/Info/security.html      (Security Reference Index)
 http://www.tis.com                              (Trusted Information Systems)
 http://www.tri.sbc.com                          (Southwestern Bell)
 http://www.uci.agh.edu.pl/pub/security          (Security)
 http://www.umcc.umich.edu/~doug/virus-faq.html  (Virus)
 http://www.usfca.edu/crackdown/crack.html       (Hacker Crackdown)
 http://www.wam.umd.edu/~ankh/Public/devil_does_unix
 http://www.wiltel.com                           (Wiltel)
 http://www.winternet.com/~carolann/dreams.html
 http://www.wired.com                            (Wired Magazine)


07. What are some IRC channels of interest to hackers?

 #2600
 #cellular
 #hack
 #phreak
 #linux
 #realhack
 #root
 #unix
 #warez


08. What are some BBS's of interest to hackers?

 Rune Stone              (203)832-8441
 Hacker's Haven          (303)343-4053
 Independent Nation      (315)656-4179
 Ut0PiA                  (315)656-5135
 underworld_1994.com     (514)683-1894
 Digital Fallout         (516)378-6640
 Alliance Communications (612)251-8596
 Maas-Neotek             (617)855-2923
 Apocalypse 2000         (708)676-9855
 K0dE Ab0dE              (713)579-2276
 fARM R0Ad 666           (713)855-0261


09. What are some books of interest to hackers?

General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
 Computer Security Basics
 Author: Deborah Russell and G.T. Gengemi Sr.
 Publisher: O'Reilly & Associates, Inc.
 Copyright Date: 1991
 ISBN: 0-937175-71-4

       This is an excellent book.  It gives a broad overview of
       computer security without sacrificing detail.  A must read for
       the beginning security expert.

 Computer Security Management
 Author: Karen Forcht
 Publisher: Boyd and Fraser
 Copyright Date: 1994
 ISBN: 0-87835-881-1

 Information Systems Security
 Author: Philip Fites and Martin Kratz
 Publisher: Van Nostrad Reinhold
 Copyright Date: 1993
 ISBN: 0-442-00180-0

 Computer Related Risks
 Author: Peter G. Neumann
 Publisher: Addison-Wesley
 Copyright Date: 1995
 ISBN: 0-201-55805-X

 Computer Security Management
 Author: Karen Forcht
 Publisher: boyd & fraser publishing company
 Copyright Date: 1994
 ISBN: 0-87835-881-1

 The Stephen Cobb Complete Book of PC and LAN Security
 Author: Stephen Cobb
 Publisher: Windcrest Books
 Copyright Date: 1992
 ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

 Security in Computing
 Author: Charles P. Pfleeger
 Publisher: Prentice Hall
 Copyright Date: 1989
 ISBN: 0-13-798943-1.

 Building a Secure Computer System
 Author: Morrie Gasser
 Publisher: Van Nostrand Reinhold Co., New York.
 Copyright Date:
 ISBN: 0-442-23022-2

 Modern Methods for Computer Security
 Author: Lance Hoffman
 Publisher: Prentice Hall
 Copyright Date: 1977
 ISBN:

 Windows NT 3.5 Guidelines for Security, Audit and Control
 Author:
 Publisher: Microsoft Press
 Copyright Date:
 ISBN: 1-55615-814-9


Unix System Security
~~~~~~~~~~~~~~~~~~~~
 Practical Unix Security
 Author: Simson Garfinkel and Gene Spafford
 Publisher: O'Reilly & Associates, Inc.
 Copyright Date: 1991
 ISBN: 0-937175-72-2

       Finally someone with a very firm grasp of Unix system security
       gets down to writing a book on the subject.  Buy this book.
       Read this book.

 Firewalls and Internet Security
 Author: William Cheswick and Steven Bellovin
 Publisher: Addison Wesley
 Copyright Date: 1994
 ISBN: 0-201-63357-4

 Unix System Security
 Author: Rik Farrow
 Publisher: Addison Wesley
 Copyright Date: 1991
 ISBN: 0-201-57030-0

 Unix Security: A Practical Tutorial
 Author: N. Derek Arnold
 Publisher: McGraw Hill
 Copyright Date: 1993
 ISBN: 0-07-002560-6

 Unix System Security: A Guide for Users and Systems Administrators
 Author: David A. Curry
 Publisher: Addison-Wesley
 Copyright Date: 1992
 ISBN: 0-201-56327-4

 Unix System Security
 Author: Patrick H. Wood and Stephen G. Kochan
 Publisher: Hayden Books
 Copyright Date: 1985
 ISBN: 0-672-48494-3

 Unix Security for the Organization
 Author: Richard Bryant
 Publisher: Sams
 Copyright Date: 1994
 ISBN: 0-672-30571-2


Network Security
~~~~~~~~~~~~~~~~
 Network Security Secrets
 Author: David J. Stang and Sylvia Moon
 Publisher: IDG Books
 Copyright Date: 1993
 ISBN: 1-56884-021-7

       Not a total waste of paper, but definitely not worth the
       $49.95 purchase price.  The book is a rehash of previously
       published information.  The only secret we learn from reading
       the book is that Sylvia Moon is a younger woman madly in love
       with the older David Stang.

 Complete Lan Security and Control
 Author: Peter Davis
 Publisher: Windcrest / McGraw Hill
 Copyright Date: 1994
 ISBN: 0-8306-4548-9 and 0-8306-4549-7

 Network Security
 Author: Steven Shaffer and Alan Simon
 Publisher: AP Professional
 Copyright Date: 1994
 ISBN: 0-12-638010-4


Cryptography
~~~~~~~~~~~~
 Applied Cryptography: Protocols, Algorithms, and Source Code in C
 Author: Bruce Schneier
 Publisher: John Wiley & Sons
 Copyright Date: 1994
 ISBN: 0-471-59756-2

       Bruce Schneier's book replaces all other texts on
       cryptography.  If you are interested in cryptography, this is
       a must read.  This may be the first and last book on
       cryptography you may ever need to buy.

 Cryptography and Data Security
 Author: Dorothy Denning
 Publisher: Addison-Wesley Publishing Co.
 Copyright Date: 1982
 ISBN: 0-201-10150-5

 Protect Your Privacy: A Guide for PGP Users
 Author: William Stallings
 Publisher: Prentice-Hall
 Copyright Date: 1994
 ISBN: 0-13-185596-4


Programmed Threats
~~~~~~~~~~~~~~~~~~
 The Little Black Book of Computer Viruses
 Author: Mark Ludwig
 Publisher: American Eagle Publications
 Copyright Date: 1990
 ISBN: 0-929408-02-0

       The original, and still the best, book on computer viruses.
       No media hype here, just good clean technical information.

 Computer Viruses, Artificial Life and Evolution
 Author: Mark Ludwig
 Publisher: American Eagle Publications
 Copyright Date: 1993
 ISBN: 0-929408-07-1

 Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
       Threats to Your System
 Author: John McAfee and Colin Haynes
 Publisher: St. Martin's Press
 Copyright Date: 1989
 ISBN: 0-312-03064-9 and 0-312-02889-X

 The Virus Creation Labs: A Journey Into the Underground
 Author: George Smith
 Publisher: American Eagle Publications
 Copyright Date: 1994
 ISBN:


Telephony
~~~~~~~~~
 Engineering and Operations in the Bell System
 Author: R.F. Rey
 Publisher: Bell Telephont Laboratories
 Copyright Date: 1983
 ISBN: 0-932764-04-5

       Although hopelessly out of date, this book remains *THE* book
       on telephony.  This book is 100% Bell, and is loved by phreaks
       the world over.

 Telephony: Today and Tomorrow
 Author: Dimitris N. Chorafas
 Publisher: Prentice-Hall
 Copyright Date: 1984
 ISBN: 0-13-902700-9

 The Telecommunications Fact Book and Illustrated Dictionary
 Author: Ahmed S. Khan
 Publisher: Delmar Publishers, Inc.
 Copyright Date: 1992
 ISBN: 0-8273-4615-8

       I find this dictionary to be an excellent reference book on
       telephony, and I recommend it to anyone with serious
       intentions in the field.

 Tandy/Radio Shack Cellular Hardware
 Author: Judas Gerard and Damien Thorn
 Publisher: Phoenix Rising Communications
 Copyright Date: 1994
 ISBN:

 The Phone Book
 Author: Carl Oppendahl
 Publisher: Consumer Reports
 Copyright Date:
 ISBN: 0-89043-364-x

       Listing of every cellular ID in the us, plus roaming ports,
       and info numbers for each carrier.

 Principles of Caller I.D.
 Author:
 Publisher: International MicroPower Corp.
 Copyright Date:
 ISBN:


Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
 The Hacker Crackdown: Law and Disorder on the Electronic Frontier
 Author: Bruce Sterling
 Publisher: Bantam Books
 Copyright Date: 1982
 ISBN: 0-553-56370-X

       Bruce Sterling has recently released the book FREE to the net.
       The book is much easier to read in print form, and the
       paperback is only $5.99.  Either way you read it, you will be
       glad you did.  Mr. Sterling is an excellent science fiction
       author and has brought his talent with words to bear on the
       hacking culture.  A very enjoyable reading experience.

 Cyberpunk
 Author: Katie Hafner and John Markoff
 Publisher: Simon and Schuster
 Copyright Date: 1991
 ISBN: 0-671-77879-X

 The Cuckoo's Egg
 Author: Cliff Stoll
 Publisher: Simon and Schuster
 Copyright Date: 1989
 ISBN: 0-671-72688-9

 Hackers: Heroes of the Computer Revolution
 Author: Steven Levy
 Publisher: Doubleday
 Copyright Date: 1984
 ISBN: 0-440-13495-6


Unclassified
~~~~~~~~~~~~
 The Hacker's Handbook
 Author: Hugo Cornwall
 Publisher: E. Arthur Brown Company
 Copyright Date:
 ISBN: 0-912579-06-4

 Secrets of a Super Hacker
 Author: The Knightmare
 Publisher: Loompanics
 Copyright Date: 1994
 ISBN: 1-55950-106-5

       The Knightmare is no super hacker.  There is little or no real
       information in this book.  The Knightmare gives useful advice
       like telling you not to dress up before going trashing.
       The Knightmare's best hack is fooling Loompanics into
       publishing this garbage.

 The Day The Phones Stopped
 Author: Leonard Lee
 Publisher: Primus / Donald I Fine, Inc.
 Copyright Date: 1992
 ISBN: 1-55611-286-6

       Total garbage.  Paranoid delusions of a lunatic.  Less factual
       data that an average issue of the Enquirer.

 Information Warfare
 Author: Winn Swartau
 Publisher: Thunder Mountain Press
 Copyright Date: 1994
 ISBN: 1-56025-080-1

 An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
 Author: Doug Richardson
 Publisher: Salamander Press
 Copyright Date:
 ISBN: 0-668-06497-8


10. What are some videos of interest to hackers?

 'Unauthorized Access' by Annaliza Savage
 $25 on VH S format in 38-min
 Savage Productions
 1803 Mission St., #406
 Santa Cruz, CA 95060


11. What are some mailing lists of interest to hackers?

 Academic Firewalls
 Reflector Address:
 Registration Address: Send a message to [email protected]
                       containing the line "subscribe firewalls user@host"

 Bugtraq
 Reflector Address:    [email protected]
 Registration Address: [email protected]

 Cert Tools
 Reflector Address:    [email protected]
 Registration Address: [email protected]

 Computers and Society
 Reflector Address:    [email protected]
 Registration Address: [email protected]

 Coordinated Feasibility Effort to Unravel State Data
 Reflector Address:    [email protected]
 Registration Address:

 CPSR Announcement List
 Reflector Address:    [email protected]
 Registration Address:

 CPSR - Intellectual Property
 Reflector Address:    [email protected]
 Registration Address:

 CPSR - Internet Library
 Reflector Address:    [email protected]
 Registration Address:

 DefCon Announcement List
 Reflector Address:
 Registration Address: Send a message to [email protected] containing
                       the line "subscribe dc-announce"

 DefCon Chat List
 Reflector Address:
 Registration Address: Send a message to [email protected] containing
                       the line "subscribe dc-stuff"

 IDS (Intruder Detection Systems)
 Reflector Address:
 Registration Address: Send a message to [email protected]
                       containing the line "subscribe ids"

 Macintosh Security
 Reflector Address:    [email protected]
 Registration Address: [email protected]

 NeXT Managers
 Reflector Address:
 Registration Address: [email protected]

 Phiber-Scream
 Reflector Address:
 Registration Address: Send a message to [email protected]
                       containing the line "subscribe phiber-scream user@host"

 phruwt-l (Macintosh H/P)
 Reflector Address:
 Registration Address: Send a message to [email protected]
                       with the subject "phruwt-l"

 rfc931-users
 Reflector Address:    [email protected]
 Registration Address: [email protected]

 RSA Users
 Reflector Address:    [email protected]
 Registration Address: [email protected]


12. What are some print magazines of interest to hackers?

2600 - The Hacker Quarterly
~~~~~~~~~~~~~~~~~~~~~~~~~~~
E-mail address: [email protected]

Subscription Address: 2600 Subscription Dept
                     PO Box 752
                     Middle Island, NY  11953-0752

Letters and article submission address: 2600 Editorial Dept
                                       PO Box 99
                                       Middle Island, NY  11953-0099

Subscriptions: United States: $21/yr individual, $50 corporate.
              Overseas: $30/yr individual, $65 corporate.


Gray Areas
~~~~~~~~~~
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/oe controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: [email protected]
E-Mail Address: [email protected]

U.S. Mail Address: Gray Areas
                  PO Box 808
                  Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
              $34.00 4 issues foreign (shipped air mail)


Wired
~~~~~
Subscription Address: [email protected]
                 or: Wired
                     PO Box 191826
                     San Francisco, CA 94119-9866

Letters and article submission address: [email protected]
                                   or: Wired
                                       544 Second Street
                                       San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)


Nuts & Volts
~~~~~~~~~~~~
T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664


13. What are some e-zines of interest to hackers?

CoTNo: Communications of The New Order    ftp.etext.org  /pub/Zines/CoTNo
Empire Times                              ftp.etext.org  /pub/Zines/Emptimes
Phrack                                    ftp.fc.net     /pub/phrack


14. What are some organizations of interest to hackers?

Computer Professionals for Social Responsibility (CPSR)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CPSR empowers computer professionals and computer users to advocate
for the responsible use of information technology and empowers all who
use computer technology to participate in the public debate.   As
technical experts, CPSR members provide the public and policymakers
with realistic assessments of the power, promise, and limitations of
computer technology.  As an organization of concerned citizens, CPSR
directs public attention to critical choices concerning the
applications of computing and how those choices affect society.

By matching unimpeachable technical information with policy
development savvy, CPSR uses minimum dollars to have maximum impact
and encourages broad public participation in the shaping of technology
policy.

Every project we undertake is based on five principles:

*  We foster and support public discussion of and public
  responsibility for decisions involving the use of computers in
  systems critical to society.

*  We work to dispel popular myths about the infallibility of
  technological systems.

*  We challenge the assumption that technology alone can solve
  political and social problems.

*  We critically examine social and technical issues within the
  computer profession, nationally and internationally.

*  We encourage the use of computer technology to improve the quality
  of life.

CPSR Membership Categories
 75  REGULAR MEMBER
 50  Basic member
200  Supporting member
500  Sponsoring member
1000  Lifetime member
 20  Student/low income member
 50  Foreign subscriber
 50  Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA  94301
415-322-3778
415-322-3798 (FAX)
E-mail: [email protected]


Electronic Frontier Foundation (EFF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
of policies and activities that will advance freedom and openness in
computer-based communications. It is a member-supported, nonprofit
group that grew from the conviction that a new public interest
organization was needed in the information age; that this organization
would enhance and protect the democratic potential of new computer
communications technology. From the beginning, the EFF determined to
become an organization that would combine technical, legal, and public
policy expertise, and would apply these skills to the myriad issues
and concerns that arise whenever a new communications medium is born.

Memberships are $20.00 per year for students, $40.00 per year for
regular members, and $100.00 per year for organizations.

The Electronic Frontier Foundation, Inc.
666 Pennsylvania Avenue S.E., Suite 303
Washington, D.C.  20003
+1 202 544 9237
+1 202 547 5481 FAX
Internet: [email protected]


Free Software Foundation (FSF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


GNU
~~~


The League for Programming Freedom (LPF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The League for Programming Freedom is an organization of people who
oppose the attempt to monopolize common user interfaces through "look
and feel" copyright lawsuits.  Some of us are programmers, who worry
that such monopolies will obstruct our work.  Some of us are users,
who want new computer systems to be compatible with the interfaces we
know.  Some are founders of hardware or software companies, such as
Richard P. Gabriel. Some of us are professors or researchers,
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
Boyer and Patrick Winston.

"Look and feel" lawsuits aim to create a new class of government-
enforced monopolies broader in scope than ever before.  Such a system
of user-interface copyright would impose gratuitous incompatibility,
reduce competition, and stifle innovation.

We in the League hope to prevent these problems by preventing
user-interface copyright.  The League is NOT opposed to copyright law
as it was understood until 1986 -- copyright on particular programs.
Our aim is to stop changes in the copyright system which would take
away programmers' traditional freedom to write new programs compatible
with existing programs and practices.

Annual dues for individual members are $42 for employed professionals,
$10.50 for students, and $21 for others.  We appreciate activists, but
members who cannot contribute their time are also welcome.

To contact the League, phone (617) 243-4091, send Internet mail to the
address [email protected], or write to:

League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA


SotMesc
~~~~~~~
Founded in 1989, SotMesc is dedicated to preserving the integrity and
cohesion of the computing society.  By promoting computer education,
liberties and efficiency, we believe we can secure freedoms for all
computer users while retaining privacy.

SotMesc maintains the CSP Internet mailing list, the SotMesc
Scholarship Fund, and the SotMesc Newsletter.

The SotMESC is financed partly by membership fees, and donations, but
mostly by selling hacking, cracking, phreaking, electronics, internet,
and virus information and programs on disk and bound paper media.

SotMesc memberships are $20 to students and $40 to regular members.

SotMESC
P.O. Box 573
Long Beach, MS  39560


Computer Emergency Response Team (CERT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CERT is the Computer Emergency Response Team that was formed by the
Defense Advanced Research Projects Agency (DARPA) in November 1988 in
response to the needs exhibited during the Internet worm incident.
The CERT charter is to work with the Internet community to facilitate
its response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of computer
security issues, and to conduct research targeted at improving the
security of existing systems.

CERT products and services include 24-hour technical assistance for
responding to computer security incidents, product vulnerability
assistance, technical documents, and seminars.  In addition, the team
maintains a number of mailing lists (including one for CERT
advisories) and provides an anonymous FTP server:  cert.org
(192.88.209.5), where security-related documents, past CERT
advisories, and tools are archived.

CERT contact information:

U.S. mail address
 CERT Coordination Center
 Software Engineering Institute
 Carnegie Mellon University
 Pittsburgh, PA 15213-3890
 U.S.A.

Internet E-mail address
 [email protected]

Telephone number
 (412)268-7090 (24-hour hotline)
 CERT Coordination Center personnel answer
 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
 emergencies during other hours.

FAX number
 (412)268-6989


15. Where can I purchase a magnetic stripe encoder/decoder?

CPU Advance
PO Box 2434
Harwood Station
Littleton, MA  01460
(508)624-4819 (Fax)

Omron Electronics, Inc.
One East Commerce Drive
Schaumburg, IL  60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)

Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)

Timeline Inc,
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)

Alltronics
2300 Zanker Road
San Jose CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067

Atalla Corp
San Jose, CA
(408) 435-8850


16. What are the rainbow books and how can I get them?

Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria

Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline

Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments

Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements.  Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.

Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems

Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation - A Guide for Vendors

Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems

Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms

Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria

Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems

Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems

Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems

Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria

Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems

Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation

Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document

Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems

Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management

Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals

Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems

Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems

Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire

Gray Book
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System

Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria

Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems

Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems

Purple Book
NCSC-TG-024  (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements

Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators

Purple Book
NCSC-TG-024  (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial

+Purple Book
+NCSC-TG-024  (Volume 4/4)
+A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
+Proposal Document - An Aid to Procurement Initiators and Contractors

Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems

Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems

Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems

Violet Book
NCSC-TG-028
Assessing Controlled Access Protection

Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation

Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems

C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment

*C Technical Report 79-91
*Integrity in Automated Information Systems

*C Technical Report 39-92
*The Design and Evaluation of INFOSEC systems: The Computer Security
*Contributions to the Composition Discussion

NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline

--

You can get your own free copy of any or all of the books by writing
or calling:

      INFOSEC Awareness Division
      ATTN: X711/IAOC
      Fort George G. Meade, MD  20755-6000

      Barbara Keller
      (410) 766-8729

If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).

[* == I have not personally seen this book]
[+ == I have not personally seen this book, and I believe it may not]
[     be available]




Section D: 2600
~~~~~~~~~~~~~~~

01. What is alt.2600?

Alt.2600 is a Usenet newsgroup for discussion of material relating to
2600 Magazine, the hacker quarterly.   It is NOT for the Atari 2600
game machine.  [email protected] created the group on Emmanuel
Goldstein's recommendation.  Emmanuel is the editor/publisher of 2600
Magazine. Following the barrage of postings about the Atari machine to
alt.2600, an alt.atari.2600 was created to divert all of the atari
traffic from alt.2600.  Atari 2600 people are advised to hie over to
rec.games.video.classic.


02. What does "2600" mean?

       2600Hz was a tone that was used by early phone phreaks (or
phreakers) in the 80's, and some currently.  If the tone was sent down the
line at the proper time, one could get away with all sorts of fun stuff.

A note from Emmanuel Goldstein:

"The Atari 2600 has NOTHING to do with blue boxes or telephones
or the 2600 hertz tone.  The 2600 hertz tone was simply the first
step towards exploring the network.  If you were successful at
getting a toll call to drop, then billing would stop at that
point but there would be billing for the number already dialed
up until the point of seizure.  800 numbers and long distance
information were both free in the past and records of who called
what were either non-existent or very obscure with regards to
these numbers.  This, naturally, made them more popular than
numbers that showed up on a bill, even if it was only for
a minute.  Today, many 800 numbers go overseas, which provides
a quick and free way into another country's phone system
which may be more open for exploration."


03. Are there on-line versions of 2600 available?

       No.


04. I can't find 2600 at any bookstores.  What can I do?

Subscribe.  Or, let 2600 know via the subscription address that you
think 2600 should be in the bookstore.  Be sure to include the
bookstores name and address.


05. Why does 2600 cost more to subscribe to than to buy at a newsstand?

A note from Emmanuel Goldstein:

 We've been selling 2600 at the same newsstand price ($4) since 1988
 and we hope to keep it at that price for as long as we can get away
 with it. At the same time, $21 is about the right price to cover
 subscriber costs, including postage and record keeping, etc. People
 who subscribe don't have to worry about finding an issue someplace,
 they tend to get issues several weeks before the newsstands get
 them, and they can take out free ads in the 2600 Marketplace.

 This is not uncommon in the publishing industry.  The NY Times, for
 example, costs $156.50 at the newsstands, and $234.75 delivered to your
 door.


Section E: Phrack Magazine
~~~~~~~~~~~~~~~~~~~~~~~~~~

01. What Is Phrack Magazine?

   Phrack Magazine is one of the longest running electronic-based publications
   in the world.  Originally founded in 1985 by Knight Lightning and Taran
   King, it has survived several incarnations of editors and still remains
   true to its underground roots.  Since its inception, Phrack has been
   providing the hacker community with information on operating systems,
   networking technologies and telephony, as well as relaying human interest
   features of interest to the international computer underground.

   During its lifetime, Phrack has always been at the center of controversy.
   Since the magazine has always been openly available, it presented law
   enforcement officials with what they percieved to be a direct link into
   the secret society of computer hackers.  Not truly understnding either
   the the spirit of the magazine or the community for which it was written,
    Federal Agents and Prosecutors began to target Phrack Magazine and those
   affiliated with it.

   "The Hacker Crackdown" by Bruce Sterling relays the details surrounding
   some of these events.

   Phrack Magazine is now in its 10th year of publication, and is registered
   with the Library of Congress as ISSN 1068-1035, and is protected by
   US Copyright Law.

02. How can I reach Phrack Magazine?

   You can reach Phrack by email at:  [email protected], [email protected] or
   [email protected].  These addresses are listed in order of
   preference.  Only AOL users should email the [email protected].

   Phrack can be reached by the postal service at:

   Phrack Magazine
   603 W. 13th #1A-278
   Austin, TX 78701

03. Who Publishes Phrack?

  Phrack Magazine is published by Chris Goggans, aka Erik Bloodaxe.  It is
  hobbled together, touched up, spell checked and compressed on an overworked
  486-66.  It is then ftp'ed over to a BSDI UNIX machine where it is sent to
  the masses.

04. How Often Does Phrack Go Out?

   Phrack goes out roughly quarterly.  It is often sent out later than every
   three months due to other more demanding obligations faced by its editor.
   The regularity of Phrack is really based upon the amount of information
   sent in.  Phrack depends solely upon submissions to get published at all.

05. How Do I Subscribe?

   To subscribe to Phrack magazine, merely email [email protected] and ask to
   be placed on the mailing list.

   Any encrypted subscriptions requests will be ignored.

   Phrack will not accept subscription requests from any anonymous remailers or
   from sites in the fidonet domain.  The anonymous remailers consistently
   bounce our mailings causing a big headache, so we won't use them.  The
   fidonet domain administrators have asked us not to mail Phrack to fido users,
   because of the huge load it places on their outgoing spools (costing them a
   lot of money to send).

06. Why Don't I Get Any Response When I E-mail Phrack?

   Because of the high volume of mail sent to the Phrack email address,
   not everyone gets a response.  All subscription requests are saved and
   added to the master list, but there is no automatic reply.  All other
   messages are responded to as they are read, with the exception of PGP'd
   messages.  All PGP'd email is stored for later decryption, and is almost
   never responded to, unless it is incredibly urgent.

07. Does Phrack Cost Money?

   Phrack Magazine charges a registration fee of $100.00 per user for any
   professional use of the magazine and the information contained therein.
   Information regarding this registration fee is contained at the beginning
   of every issue of Phrack.

08. How Can I Submit Articles?

   Articles are both wanted and needed.  Phrack only exists if people write
   for it.  There is no regular writing staff, there is only the editor, who
   cannot write the entire thing himself.

   Articles can be sent to Phrack via email or snailmail (on paper or
   IBM-compatible diskette).  Articles should be in ASCII text format.  Do
   not include any clever graphics or ANSI art.  You can use Phrack's PGP key
   to encrypt articles, but send the files in the ASCII armor format.

   Please try to avoid sending files as MIME-compliant mail attachments.

09. What Is Phrack's PGP Key?

   -----BEGIN PGP PUBLIC KEY BLOCK-----
   Version: 2.6

   mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
   Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
   Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
   tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
   =evjv
   -----END PGP PUBLIC KEY BLOCK-----

10. Where Can I Get Back Issues?

  Back issues of Phrack are found on many bulletin boards around the globe.
  The only OFFICIAL Phrack Magazine distribution site is our ftp archive
  at ftp.fc.net in /pub/phrack.  There are NO official distribution sites
  other than this one, nor will there ever be.  We don't want to play
  favorites and let one particular BBS call itself an "official" site while
  another isn't.  Therefore, there will be no "official" sites except those
  archived by Phrack itself.

  You can also get back issues on the World Wide Web by connecting to:
  http://www.fc.net/phrack.html

  This URL allows users to view issues online, or pull them down for
  later viewing.

  Any users without net access can send diskettes and postage to the
  Phrack Postal Address given above, and request back issues to be
  sent via the postal system.

Section F: Miscellaneous
~~~~~~~~~~~~~~~~~~~~~~~~

01. What does XXX stand for?

TLA     Three Letter Acronym

ACL     Access Control List
PIN     Personal Identification Number
TCB     Trusted Computing Base

ALRU    Automatic Line Record Update
AN      Associated Number
ARSB    Automated Repair Service Bureau
ATH     Abbreviated Trouble History
BOC     Bell Operating Company
BOR     Basic Output Report
BOSS    Business Office Servicing System
CA      Cable
COE     Central Office Equipment
COSMOS  Computer System for Main Frame Operations
CMC     Construction Maintenance Center
CNID    Calling Number IDentification
CO      Central Office
COCOT   Customer Owned Coin Operated Telephone
CRSAB   Centralized Repair Service Answering Bureau
DDD     Direct Distance Dialing
ECC     Enter Cable Change
LD      Long Distance
LMOS    Loop Maintenance Operations System
MLT     Mechanized Loop Testing
NPA     Numbering Plan Area
POTS    Plain Old Telephone Service
RBOC    Regional Bell Operating Company
RSB     Repair Service Bureau
SS      Special Service
TAS     Telephone Answering Service
TH      Trouble History
TREAT   Trouble Report Evaluation and Analysis Tool

LOD     Legion of Doom
HFC     Hell Fire Club
TNO     The New Order

ACiD    Ansi Creators in Demand
CCi     Cybercrime International
FLT     Fairlight
iCE     Insane Creators Enterprise
iNC     International Network of Crackers
NTA     The Nocturnal Trading Alliance
PDX     Paradox
PE      Public Enemy
PSY     Psychose
QTX     Quartex
RZR     Razor (1911)
S!P     Supr!se Productions
TDT     The Dream Team
THG     The Humble Guys
THP     The Hill People
TRSI    Tristar Red Sector Inc.
UUDW    Union of United Death Workers


02. How do I determine if I have a valid credit card number?

Credit cards use the Luhn Check Digit Algorithm.  The main purpose of
this algorithm is to catch data entry errors, but it does double duty
here as a weak security tool.

For a card with an even number of digits, double every odd numbered
digit and subtract 9 if the product is greater than 9.  Add up all the
even digits as well as the doubled-odd digits, and the result must be
a multiple of 10 or it's not a valid card.  If the card has an odd
number of digits, perform the same addition doubling the even numbered
digits instead.


03. What bank issued this credit card?

1033    Manufacturers Hanover Trust
1035    Citibank
1263    Chemical Bank
1665    Chase Manhattan
4024    Bank of America
4128    Citicorp
4209    New Era Bank
4302    HHBC
4310    Imperial Savings
4313    MBNA
4317    California Federal
5282    Wells Fargo
5424    Citibank
5410    Wells Fargo
5432    Bank of New York
6017    MBNA


04. What are the ethics of hacking?

An excerpt from: Hackers: Heroes of the Computer Revolution
                         by Steven Levy

       Access to computers -- and anything which might teach you
       something about the way the world works -- should be unlimited
       and total. Always yield to the Hands-On imperative.

       All information should be free.

       Mistrust Authority.  Promote Decentralization.

       Hackers should be judged by their hacking, not bogus criteria
       such as degrees, age, race, or position.

       You can create art and beauty on a computer.

       Computers can change your life for the better.


04. Where can I get a copy of the alt.2600/#hack FAQ?

Get it on FTP at:
rahul.net      /pub/lps
rtfm.mit.edu   /pub/usenet-by-group/alt.2600
ftp.clark.net  /pub/jcase

Get it on the World Wide Web at:
http://dfw.net/~aleph1
http://www.engin.umich.edu/~jgotts/hack-faq.html
http://www.phantom.com/~king

Get it from these BBS's:
Hacker's Haven (303)343-4053





EOT