The Elite Hackers Site
rotating skulls and crossbones are awesome
  • Navigation
  • /root
  • Intro/Disclaimer
  • Hacking News
  • Getting Started
  • Hacking Tools
  • MySpace Hacking
  • Hacking Text Files
  • Elite Wallpapers
  • code2600
  • Viruses
  • Hacking Links
  • Link This Site
  • About
  • FAQ
  • Contact
  • Vote!
  • Administration
  • Stats
  • System Info
  • You: 99.198.205.114
  • Affiliates
  • Add Me On Facebook!

    Follow me on Twitter!

    I am a hacker

    This site made entirely in Notepad

    Click here to Vote for The Elite Hackers Site!

    SoldierX

    Valid CSS!

    Hacking Text files

    Welcome to the text files section. Here you can find a wealth of knowledge from hundreds of different authors around the globe. These text files cover everything from UNIX exploits and viruses to hacking ATM machines. As stated in the disclaimer, these files are for educational purposes only. I will not be held responsible for your actions.

    These hacking text files are extremely rare, and the hacking methods described within them should not be practiced newcomers. For your benefit, make sure you read the Getting Started page, as well as the Hacking Tools section. If you have time, learning how to hack myspace accounts wouldn't be a bad idea either. Mastering the techniques in my writings will better prepare you for these hacking text files.

    22.txt
    DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)

    23things.txt

    2600-9-3.txt
    2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)

    2600_ind
    2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price

    2600faq.011
    Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)

    386i.txt
    CIAC Advisory Notice: Authentication bypass in Sun 386i machines

    5600.txt
    Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)

    aahack.txt
    Anarchy Anonymous: Hacking your School Network

    accesblt.hac
    Advanced Authentication Technology, 1991

    accessin.txt
    A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)

    acro01.txt
    Max Headroom's Hacker Acronym List

    acro02.txt
    Max Headroom's Second Collection of Acronyms

    acrolist.phk
    Acronym List, Early 1990s

    acroynym.txt
    The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)

    adssys.txt
    A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom

    aio.box
    All in One Box, by Disk Doctor

    aio5b.txt
    AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)

    ais.txt
    AIS: The Automatic Intercept System by Computer Consoles Incorporated

    aix.fun
    Warning to download some AIX Patches

    allnet01.txt
    Hacking Allnet by Shadow Warrior (January 1988)

    amhack.txt
    Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS

    ansibomb.txt
    ANSI Bombs II: Tips and Techniques, by The Raging Golem

    aohell.phk
    Why I wrote AOLHell

    aoim.txt
    The Risks of Using an AOL Client Behind a Firewall

    aolhak.txt
    How to Hack America on Line by the Hooded Bobs

    as400cmd.hac
    IBM AS/400 Command Summary

    as400cmd.txt
    All IBM AS/400 Commands by The Might

    aspen.txt
    A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

    aspen1.txt
    A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

    aspen2.txt
    A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)

    assolink.txt
    An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)

    at&arebl.txt
    Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends

    atlas.txt
    Hackers' Atlas, by Ragon/Wynvern/BOF

    atm-92.txt
    ATMS: The Real File for ATM Theft in 1992 by The Raven

    atm-more.txt
    A Whole Collection of the Risks of ATM Cards (1988)

    atm.txt
    Hacking ATM's by Blue Thunder

    atm1.txt
    The Disk Jockey Presents Scamming ATMs

    atma.hac
    Quick OVerview of ATM Security (Needs Editing)

    atmapps.txt
    "Gee Whiz" ATM Applications are On the Horizon

    atmfile
    ATM secret codes, from Fred Gindburg (July 10, 1987)

    atmhacking.txt
    Hacking ATMs, by Anonymous

    atms
    An Overview of ATMs and Information on the Encoding System

    atms.txt
    Track Layouts on ATM Cards

    auditool.txt
    Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)

    austhack.hac
    Australian Dialups

    austpac0.txt
    Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990

    austpac1.txt
    Additional AUSTPAC Character Terminal Manual

    austpac2.txt
    AUSTPAC General Information and Codes

    austpac3.txt
    The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)

    autohack.txt
    Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)

    autonet1.txt
    Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5

    autotelldoc.ana
    Fun with Automatic Tellers

    autovon1.hac
    Introduction to the Automated Voice Network (Autovon) by Shadowrunner

    autovon2.hac
    Introduction to the Automated Voice Network (Autovon) Part II

    autovon3.hac
    Introduction to the Automated Voice Network (Autovon) Part III

    autovoni.nst
    Overview of the Automatic Voice Network (Autovon)

    avoidcap.txt
    Planning Ahead for Phone Phreaks/Hackers

    babyna.mes
    The Moby Words Database (List of Words) (1989)

    backdoor.txt
    How to Hold Onto UNIX Root Once You Have It

    bankhack.txt
    The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers

    basic.net
    Basic Networking, by Sk8 the Skinhead

    basic1.hac
    The Basics of Hacking I: DECs By the Knights of Shadow

    basic3.hac
    The Basics of Hacking III: Data General By the Knights of Shadow

    basicnet.hac
    Basic Networking (1989) by Sk8 The SkinHead

    basics
    Rambug's Hacking Volume #1 by Rambug

    bbsfiles.txt
    The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"

    bd-tv5.txt
    Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993

    bindery.txt
    Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)

    boahack.txt
    Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM

    boces.txt
    The Slipped Disk takes over the BOCES Computer: A Log

    bom-hh&p.txt
    The History of Hacking and Phreaking by Raven of BOMB Squad

    books.txt
    Biblography of Computer Security Books (1973 through 1988)

    brute.txt
    brUTE: A brute force approach to hacking Unix passwords. Version 1.1

    btinfo.h-k
    BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)

    c64fun1.txt
    Suggestions On What to Do with a Commodore 64, by Nightstalker

    callcard.phk
    Hacking Calling Cards, by The Pyromaniac

    candyland.faq
    The Candyman Explains How He Will Accept Explosives Files

    carcodes.txt
    Codes Used by Computers in Cars

    cb1.txt
    Citibank Hacking, by Johnny Hundu

    cb2.txt
    Small Rant about Hacking Citibank

    cbiinfo
    Using and Abusing CBI by The Ghost

    cbrsp-1.hac
    The Cyberspace Chronicle Volume 1 by Phardak

    cbvhack.pnk
    CBV Hacking by PiNK ToRPeDo (June 7, 1994)

    cbvhack.txt
    CBV Hackin' by Pink Torpedo (June 7, 1994)

    chahelp_.txt
    Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke

    chaos01.txt
    The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990

    chaos02.txt
    The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990

    chaos03.txt
    The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel

    chilton1.txt
    Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)

    china02doc.hac
    China Newsletter #02 (Hacking/Phreaking File Compilation)

    church4.ptl
    Church Chat Volume 4 by The Spiker

    cis.phk
    Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord

    cisagain.txt
    Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord

    cisinfo4.txt
    Compuserve Information by Morgoth and Lotus

    ciss3.txt
    List of Access Numbers to the Compuserve Information Service

    citibank.txt
    Hacking into Citibank with Johnny Hindu

    citibank2.txt
    Citibank Service Addresses by Dark Helmet of P/H/a (March 21, 1990)

    cjack.faq
    Cracker Jack FAQ Written by kM (1993)

    codphone
    Coda-Phones by D.T. Legna

    com_sec90.hac
    United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact

    com_sec91.hac
    United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems

    compserv.txt
    Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.

    compus.txt
    Free Compuserve Passwords, by Devious Xevious

    compuser.txt
    A Quick Compuserve Index

    compusin.txt
    Some Compuserve Tips, by Eric Diamond

    compusrv
    Compuserve Hacking by The Locksmith

    concis.txt
    Free Compuserve Access

    contact.txt
    How to Contact the HACK SQUAD

    copier.hac
    Magnetic Stripes, by Count Zero

    cops-rl
    RL C.O.P.S. File by Brian Oblivion

    cosmos.hac
    C O S M O S, by Doctor Who

    cosmos1.txt
    Hacking into COSMOS by Wizard of OZ

    cosmos2.hac
    Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom

    cosmos3.hac
    The 1986 COSMOS Files Part III by Sir William

    crackam1.txt
    Hacking Programs on the Amiga by FunToHack

    crackdwn.txt
    Crackdown, from 2600 Magazine volume 7, number 1 SPRING

    creditfr.txt
    The Adventures in Fraud Series Volume I, by Sneak Thief (1985)

    credunin.con
    Numbers of Credit Unions and protection Agencies

    cs.hac
    How to Get a Free Account on Compuserve

    cs.txt
    How to Get a Free Compuserve Account

    csl8_93.hac
    CSL Bulletin 1993

    cuthesis.txt
    The Social Organization of the Computer Underground by Gordon R. Meyer

    cyber.txt
    The Cyberpunk Movement by Pazuzu of DnA May 12, 1993

    cyberhac.txt
    Hacking Control Data Corporation's Cyber, by The Ghost

    data.tap
    Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS

    data_gen
    Captain Crunch talks about hacking Data General Systems

    database.txt
    CIRR Database: A tool for Corporate Research

    datakit.hac
    How to connect across VCS/ISN boundaries

    datanet.doc
    The Basics of TELENET

    datapac.hac
    A Guide to DataPAC by The Fixer

    datapac.inf
    Technical Guide to DataPac by the New Dark Council (1990)

    datapac.txt
    A Guide to DataPAC by The Fixer (April 18, 1990)

    datapac1.txt
    A Guide to DataPAC version 1.1 by The Fixer

    datapac2.txt
    Datapac 3101 ITI Parameters Description

    datapac3.txt
    Datapac 3101 Public Outdial Ports

    datatap.txt
    Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop

    datatapp.txt
    Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon

    ddn01.txt
    DDN Security Bulletin #1

    ddn03.hac
    Defense Data Network Security Bulletin #3

    ddn04.hac
    Defense Data Network Security Bulletin #4

    ddn05.hac
    Defense Data Network Security Bulletin #5

    ddn06.hac
    Defense Data Network Security Bulletin #6

    ddnet1.txt
    DDN: Information on the Defense Data Network from Unauthorized Access UK

    ddnet2.txt
    DDN: The Defense Data Network (A Map)

    debtcard.txt
    Harvard Medical School Installs ISDN-Based Debit Card System

    dec10.txt
    Hacking the DEC-10 System

    dec_200.txt
    The Decserver 200 Revealed by Surf Studd (October 23, 1990)

    defaults.txt
    Hacking into a Variety of Systems by using their Default Accounts

    defcon.info

    defconadd.hac

    defdb.hac
    Department of Defense Federal Data Bases (List)

    defense.hac
    Defense Data Network Blues by Harry Hackalot

    defense.txt
    Defense Data Network Blues by Harry Hackalot (1984)

    defnetbl.txt
    Defense Data Network Blues by Harry Hackalot (August 31, 1983)

    demystif.txt
    Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin

    denning.txt
    Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)

    des.txt
    The Data Encruption Standard (DES) Fact Sheet

    desblt.txt
    The Data Encryption Standard (DES) June 1990

    desval.hac
    DES Validation List

    desval.txt
    DES Validation List

    dialback.txt
    Dial-Back Isn't Always Secure (February 28, 1985)

    dialog.txt
    Inside Dialog by Control C of Advanced Telecommunications Inc.

    dialog01.txt
    Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.

    dialout1.txt
    A Novice Manual on Using Outdial Modems by Blue Adept

    dialplus.txt
    A Screengrab of Informaiton on PSS DialPlus from British Telecom

    dialup.hac
    List of Dialups. For what? I have no idea.

    disclaim
    Da Disclaimer, by Filbert

    diskopt
    My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85

    djns.txt
    Inside DJNS (Dow Jones News Service)

    dlog-rdt
    Complete Guide To The DIALOG Information Network by Brian oblivion

    dnicinf.hac
    D A T E X - P - International Traffic Relations

    dowjones.txt
    Inside Dow Jones News Service

    dpacbas.txt
    The Basics of DataPAC by Mister X (February 2, 1991)

    dpacintr.rot
    Introduction to DataPac from the Right of Terror and Deicide

    dpacnuas.txt
    The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)

    dtsb.hac
    DEC Terminal Server Basics by Mad Hacker

    easyl.hac
    Hacking Easy Link I by Professor Falken

    easylink.hck
    Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc

    easylink.txt
    Hacking Easy-Link I by Professor Falken

    edit.txt
    Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems

    ena!.hac
    The ENA Vision: What IS Ena?

    encyclop.txt
    Someone Makes fun of That Stupid Article

    eproms.hac
    A Closer Look at EEPROMS by The Kingpin

    eslf0006.txt
    The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)

    ess.txt
    Electronic Switching System by Black Knight, from 2600, Feb. 1984

    ethics.hac
    Newsweek: Teaching Hackers Ethics

    ethics.txt
    The Ethics of Hacking by Dissident

    evasiv.txt
    The Inspector's Thoughts, by Assailant's Blade and Ford Prefect

    exeguide.txt
    An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)

    fast.txt
    Hacking McDonalds, by Herb the Hacker

    fbiaftha.hac
    The FBI Fights Computer Crime

    fbibust
    The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)

    fbicompu.hac
    Summary of FBI Computer Systems, by Ralph Harvey

    fbicompu.txt
    Summary of FBI Computer Systems By Ralph Harvey (1986)

    fbisys.txt
    Summary of FBI Computer Systems, by Ralph Harvey

    fcisacc.txt
    Getting Free Compuserve Access, by The Wanderjahr

    fcscvol1.hac
    Federal Criteria for Information Technology Security Volume I

    fcscvol2.hac
    Federal Criteria for Information Technology Security Volume II

    fddi.hac
    How to FDDA Internals Work? Learning to Appreciate Tokens

    fdp1.txt
    The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta

    fdp2.txt
    The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta

    feds
    Watching the Watcher Watching You, by Sir Knight of OSUNY BBS

    fh.txt
    Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)

    findhole.txt
    Security Holes Manifest Themsleves in Four Ways (November 10, 1993)

    findho~1.txt
    The Four Ways Security Holes Manifest Themselves (November 10, 1993)

    force1.txt
    Force Files Volume #1 (December 3, 1987)

    force2.txt
    Force Files Volume #2 (April 17, 1987)

    force3.txt
    Force Files Volume #3 (August 6, 1987)

    force4.txt
    Force Files Volume #4 (August 1, 1987)

    force5.txt
    Force Files Volume #5 (August 6, 1987)

    force6.txt
    Force Files Volume #6 (August 6, 1987)

    force7.txt
    Force Files Volume #7 (August 6, 1987)

    force8.txt
    Force Files Volume #8 (August 6, 1987)

    force9.txt
    Force Files Volume #9 (August 6, 1987)

    freebie3.hac
    Compufreebies 3.1 (1992)

    freecis.txt
    Free Compuserve Access

    funwith5.hac
    Fun With Automatic Tellers

    g.txt
    SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)

    garaghak.txt
    Garage Door Opener Hacker Plans from Cybertek

    gateways
    The Inter-Network Mail Guide - Copyright 1990 by John J. Chew

    get-vip.txt
    DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files

    getbust.txt
    Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415

    getinfo.txt
    The Hacker's Guide to Investigations, by Ripper of HALE (1989)

    gisdoc.hac
    Hacking the GIS computer by Doctor Crash

    goodbye.ana
    The Best of the Station, by The Prowler

    goodkids.hac
    Computer Hackers are Good People Too!

    govthlp.txt
    The Help Screen on some Government System

    gs1.txt
    Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)

    gte.txt
    Hacking GTE Telemail by Master Micro

    guide.txt
    A Novice's Guide to Hacking- 1989 edition by The Mentor

    guidedoc.hac
    The RSTS User's Guide, by The Flash

    guidehak.txt
    The Neophyte's Guide to hacking (1993 Edition) by Deicide

    gunbelt3.txt
    Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)

    hacethi.txt
    The Ethics of Hacking, by Dissident of TES

    hacethic.txt
    The Ethics of Hacking by Dissident

    hack.faq
    Beta .008 of the 2600/#hack FAQ

    hack.hac
    Hacking And Computer Krashing #9, by Gray Wolf

    hack.leg
    A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)

    hack1.hac
    The Basics of Hacking, by the Knights of Shadow (Intro)

    hack2.hac
    The Basics of Hacking, by The Knights of Shadow (DECs)

    hack3
    The Basics of Telenet Part I

    hack4
    Telenet Scanning

    hack4.hac
    The Basics of Hacking, by The Knights of Shadow (Data General)

    hack5.hac
    Hacking McDonalds, by Herb of Burger King

    hack7
    Hacking the Compuserve Information Service

    hack7.txt
    The Conscience of a Hacker by The Mentor (January 8, 1986)

    hack9.hac
    Hacking Control Data Corporation's Cyber

    hack9301.rpt
    The Hack Report Volume 2, Number 1 (January 3, 1993)

    hack9302.rpt
    The Hack Report Volume 2, Number 2 (February 7, 1993)

    hack9303.rpt
    The Hack Report Volume 2, Number 3 (March 7, 1993)

    hack9304.rpt
    The Hack Report Volume 2, Number 4 (April 4, 1993)

    hack9305.rpt
    The Hack Report Volume 2, Number 5 (May 9, 1993)

    hack9306.rpt
    The Hack Report Volume 2, Number 6 (June 6, 1993)

    hack9307.rpt
    The Hack Report Volume 2, Number 7 (July 4, 1993)

    hack9309.rpt
    The Hack Report Volume 2, Number 9 (September 12, 1993)

    hack9401.rpt
    The Hack Report Volume 3, Issue 1 (January 29, 1994)

    hack_cis.txt
    The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991

    hack_em.hac
    The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr

    hack_s.txt
    Harry Hackalot's Official Hacker Address Book for October 1984

    hack_ths.txt
    The Social Organization of the Computer Underground (Thesis)

    hackacr.hac
    The Hackers Acronym Chart, compiled by IIRG

    hackad.txt
    The Famous Hacker's School (Analog Science Fiction Sept. 1990)

    hackcos.txt
    Hacking COSMOS Part I by Lex Luthor and the Legion of Doom

    hackcrak.txt
    The Hacker Crackdown, by 2600 Magazine

    hackdct1
    The Hacker's Jargon File, (November 14, 1982 Version)

    hackdict.txt
    The Hacker's Dictionary, Older Version, Uncredited!

    hacker
    The Consience of a Hacker by The Mentor (January 8, 1986)

    hacker.tst
    The Hacker's Purity Test, June 16, 1989

    hacker.txt
    SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

    hacker01.txt
    The Social Organization of the Computer Underground: A Thesis

    hacker03.txt
    The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers

    hacker1.txt
    Diary of a Hacker

    hacker11.txt
    Hacking Western Union's Easylink

    hacker2.txt
    The Diary of a Hacker Part II by the Cuisinart Blade

    hackerdoc.txt
    SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

    hackerla
    The Hackers' Laws

    hackers.par
    Advertisement for the Galactic Hacker's Party (August 1989)

    hackethic.txt
    The Ethics of Hacking by Dissident

    hackfaq.10
    FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)

    hackfaq.txt
    The Hack FAQ By Simple Nomad (January 31, 1999)

    hackholl.txt
    Hacking In Holland by Rop Gonggrijp (October 18, 1988)

    hackhp2.hac
    Hacking the HP 2000 by Bioc Agent 003

    hacking
    Description of the New, Bad Definition of Hacking

    hacking.dox
    Collections of Hacker FIles Downloaded by Consumertronics

    hacking.tap
    Style Teaches You About How to Be a Proper Hacker

    hacking.txt
    Hacking Tutorial, by The Jolly Roger

    hacking101.hac
    HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life

    hackinga.txt
    Hacking Bank Of America's Home Banking System by Dark Creaper

    hackingc.txt
    Hacking Credit Card Codes by Omni-Kid and The Wyvern

    hackinge.txt
    Hacking ECONet Systems by Jack Death and Zapper

    hackingi.txt
    Computerworld Asks People to Hack In, 1984

    hackingt.txt
    Hacking the Lexington Air Force Computer

    hackl1.txt
    Hacker's Line #1 by 2TUFF

    hacknet.dox
    The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC

    hacknet.txt
    how to Hack Your School's Network, from Dr. Techno of Paradise Lost

    hackpcp.hac
    The Weenie Warriors present Hacking PC Pursuit Codes

    hackprod.txt
    How to Hack Prodigy by Desolated Dream

    hackprof.txt
    Hacker Proof Doors! It IS Possible!

    hackquiz.txt
    The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas

    hackrsts.txt
    Hacking RSTS Systems: An Instructional Test

    hacksong.txt
    The Hacker's Song by Dave Touretzky and Don Libes

    hacksynd.hac
    The Hackers Syndrome, by Tad Deriso

    hacktalk.txt
    A Short Hackerspeak Glossary, by the Hollywood User Group

    hackterm.txt
    Collection of "Hackernyms" by Rad Man version 2.10

    hacktest.txt
    The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)

    hacktips.hac
    Hacking Tips #2, by Hoe Hopper

    hacktips.txt
    Tips for Tracking Hackers

    hacktut.txt
    Hacking Tutorial, by The Jolly Roger

    hackunlm.hu1
    Hackers Unlimited Magazine Volume 1 Issue 1

    hackusa!.hac
    Hackin' USA

    hackwarn.hac
    A Warning to Hackers

    hackwwiv.hac
    Hacking into WWIV, Second Edition by Vision

    hackwwiv.txt
    Hacking into WWIV Software by Vision

    haibm370.txt
    How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club

    hakdec20.txt
    An Addendum to A Novice's Guide to Hacking, by The Mentor

    hakdic.txt
    The Hacker's Dictionary, A Guide to the World of Computer Wizards

    hakmedia.txt
    Hackers in the Media, List start: 10/28/92 - Doomsday

    handbook.txt
    Hacking Compuserve: All You Need to Know, by Mr. Perfect

    haq1.txt
    The HAQ Edition 2.07 (June 11, 1994)

    hashish.txt
    Hashish: The Exotic Elixir, by EZ Rider

    hate.info
    Invitation to HATE: Hackers at The End (Summer 1995)

    havok1.txt
    HAVOK Pack #1: The Return (Collection of Hacking Textfiles)

    hckr_hnd.txt
    The Hacker's Handbook by Hugo Cornwall (1985)

    hckrslg
    The Hacker's League, by Lee Felsenstein (March 18, 1992)

    hd.hac
    Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme

    hd01.hac
    Hackers Directory Volume #1 by Ninja Squirrel and Logan5

    hd02.hac
    Hackers Directory Volume #2 by Ninja Squirrel and Logan5

    hd03.hac
    Hackers Directory Volume #3 by Ninja Squirrel and Logan5

    hd04.hac
    Hackers Directory Volume #4 by Ninja Squirrel and Logan5

    hdigest.txt
    The Hacker's Digent by Harry Hackalot (October 1984)

    hdindex.txt
    Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)

    hedrick.txt
    An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)

    hfnewbies.txt
    The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)

    hhacking.iix
    CAT-HACK Volume 1 from The Mystery

    hint.txt
    The Czar's Guide to the Young Criminal Accused of Using Computers

    his-hp.txt
    The History of Hacking and Phreaking by Raven of BOM SQUAD

    hk_acces
    Draft Chapter of the NIST Computer Security Handbook, from Ed Roback

    hk_crypt
    Draft Chapter from the NIST Computer Security Handbook, on Cryptography

    hk_i&a
    Draft of the NIST Computer Security Handbook on Identification and Authentification

    hk_polic
    Draft of the NIST Computer Security Handbook on Computer and Information Security Policty

    hoho93.ad

    hoho93cz.hac

    hohocon.93

    holelist.txt
    How Security Holes Manifest Themselves

    holes.txt
    A List of Holes in Various Operating Systems (April 7, 1993)

    homebank.hac
    Hacking Bank Of America's Home Banking System by "Dark Creaper"

    homebank.txt
    Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM

    horror_s.tor
    Hacking Horror Stories 1982

    hp20001.hac
    HP 2000 Part 1: Commands by Blitzoid and Galactus

    hp20002.hac
    HP 2000 Part 2: Statements by Blitzoid and Galactus

    hp20003.hac
    HP 2000 Part 3: Functions by Blitzoid and Galactus

    hp20004.hac
    HP 2000 Part 4: Files by Blitzoid and Galactus

    hp20005.hac
    Hp 2000 Part 5: Matracies by Blitzoid and Galactus

    hp30.txt
    The Completel Hewlett Packard 3000 Hackers Guide

    hp3000.hac
    The Complete Hewlett Packard 3000 Hackers Guide

    hp3000.txt
    The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS

    hp3000_t.hac
    Hacking the HP 3000 by DE BUG

    hp3000g.hac
    The Complete Hewlett Packard 3000 Hackers Guide

    iah1.txt
    The International Hackers' Association Issue #1

    ibm-vm70.txt
    A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited

    ibm370.hac
    How to Take Control of your Local IBM 370 by Another Hacker

    ibmhack.hac
    Hacking the I.B.M. By John Doe

    icebook1.txt
    ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)

    icebook2.txt
    ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus

    icon4u.nrg
    ICoN Hacking with Loser Access by GY

    id-biz.txt
    How to Have a Profitable ID Business, by Mr. Puff n' Stuff

    identity.txt
    How to Create a New Identity by the Walking Glitch

    ihg.txt
    International Directory of Hacking and Phreaking Organizations, by John Simmons

    iirgacr6.txt
    The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)

    iirgacr7.txt
    The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)

    iirgacr8.txt
    The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)

    iiu-001.txt
    Bust Avoidance for Dipshits by Derision of IIU (1990)

    iiu-004.txt
    Hacking on the Compuserve Information Service by Darkness (1990)

    illinet.txt
    Dial-Up Access Numbers for ILLINET Online

    info.txt
    How to Get Detailed Information on Anybody by DTS

    info3.gph
    How to Get Anything on Anybody Part III

    infoam.txt
    Exploring Information-America by Omega and White Knight

    informer.hac
    TRI : The Remote Informer, Volume 1, Issue #6

    innerc.txt
    Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth

    innercir.hac
    Hacking Techniques, Typed in by Logan5 from The Inner Circle

    intercep.hac
    The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)

    intercpt.txt
    Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods

    intruder.dox
    SOFTDOCS: Intruder v1.21 by CreaSoft

    inttel.hac
    European Computers List #1 by Kerrang Khan

    issm201.hac
    The Information Systems Security Monitor Volume 2 Number 1

    issm202.hac
    The Information Systems Security Monitor Volume 2 Number 2

    issm204.hac
    The Information Systems Security Monitor Volume 2 Number 4

    issm301.hac
    The Information Systems Security Monitor Volume 3 Number 1

    issm302.hac
    The Information Systems Security Monitor Volume 3 Number 2

    issm303.hac
    The Information Systems Security Monitor Volume 3 Number 3

    issm304.hac
    The Information Systems Security Monitor Volume 3 Number 4

    jack14.txt
    Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)

    janet.txt
    JANET PAD Listing Revision 1.2 (March 1st, 1990)

    jargon211.hac
    The Jargon File, v.2.9.11, by Eric S. Raymond

    javabugs.txt
    JavaScript Problems I've Discovered

    keylock.sch
    Schematic For an Optoelectronic key Lock by Joe Scharf

    keytrap3.txt
    SOFTDOCS: Keytrap v3.0 by Dcypher

    kfyi-593.hac
    KFYI AM Radio 910 interviews Mind Rape and Merc

    kill.feds
    FEDS: How to Find and Eliminate Them (September 10, 1987)

    l0pht.txt
    The L0pht... What I saw, by Tfish of RDT

    lan.txt
    Local Area Networks (LANs) by ANSI-Christ

    lca-1.txt
    LCA #1: Zen and the Art of Untraceable Hacking, by Flood

    lca-2.txt
    LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance

    lca-3.txt
    LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance

    lca-4.txt
    LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance

    lca-5.txt
    LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance

    lca-6.txt
    LCA #6: Beige Boxing, by the Lemon Curry Alliance

    ldd.txt
    How to Hack into CIS

    license.asc
    The Guerilla Guide to Licensing Software

    list2
    Pacific Bell Computer Systems, by Another Hacker

    litewave.sch
    AM Lightwave Transmitter and Reciever by Joe Scharf

    lnoise.hac
    Modem Noise Destroyer (Alpha Version)

    lodhbasi.hac
    The LOD/H Present: A Novice's Guide to Hacking- 1989 edition

    logoncbi.hac
    How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)

    logoncbi.txt
    How to Log into a C.B.I System by L.E. Pirate

    longpass.txt
    Generating Longer Passwords

    machack0.5.txt
    The Mac Hack FAQ by AX1P (November 22, 1994)

    mag_stripes.txt
    Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)

    magnet.01
    Magnetic Stripes on Cards: An Overview

    magnet.02
    Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)

    mailbox.hac
    Mailbox Systems: Your Link to the Underworld

    main.fra
    Main Frames by the Pirate Club

    mainfrms.con
    A List of Mainframe Dialup Numbers

    master.txt
    Master Hack Version 1.0 by Master Frodo (January 1, 1991)

    mci.txt
    MCI Mail Access Numbrs, from The Swamp

    mci__acc.txt
    List of MCI Access Numbers

    mcimail.hac
    MCI Mail - The Adventure Continues, by Bioc Agent

    mcisprin.t
    Hints on Hacking, byt the RAMBUG and Captain Blood

    memory.lst
    The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)

    mgtguide.txt
    The NIST Management Guide to the Protection of Information Resources

    mickeyd.txt
    Hacking McDonalds by Herb the Hacker

    micrrisk.hac
    Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)

    milinet.1
    Milnet Access Codes

    milnet.txt
    How to Use the American Military Net

    milnet1.hac
    Milnet, by Brigadier General Swipe

    mish18.txt
    The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)

    mism1.hac
    How to Get Anything on Anyone Excerpts

    mism10.hac
    How to Get Anything on Anyone Excerpts

    mism20.hac
    Mastering the SCANTRON by Warhead

    mism42.hac
    Xerox Voice Message Exchange Commands, from The Lineman

    mob.txt
    The Hackers in the MOB

    modbook1.txt
    The History of MOD: Book One: The Originals

    modbook2.txt
    The History of MOD: Book Two: Creative Mindz

    modbook3.txt
    The Book of MOD: Part Three: A Kick in the Groin

    modbook4.txt
    The Book of MOD: Part Four: End of '90-'1991

    modbook5.txt
    The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)

    morality.hac
    Hacker Morality: A Lesson

    morestuf.txt
    Collection of Hacking Files (Should Eventually be Split up)

    morprime.hac
    RVEC Parameters and DMSTK Format

    mrsts.hac
    So you've finally decided to down an RSTS System?

    mtempist.hac
    The Tempest Method of Data Interception (Needs Editing)

    narc3.hac
    Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)

    ncsc-tg-003.txt
    A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

    ncsc-tg-016.txt
    Guidelines for Writing Trusted Facility Manuals

    ncsc-tr-005-2.txt
    Introduction to Trusted Computer System Evaluation Criteria

    ncsc_oas.txt
    A Guideline on Office Automation Security (December 5, 1986)

    netbios.txt
    Understanding NetBIOS by NeonSurge of Rhino9

    netcrack.txt
    DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00

    networks.phk
    2600: How to Send Mail to other Networks

    neuroman.pwd
    List of DataBases and passwords for the game "Neuromancer"

    newid.hac
    New Identity Method

    newsltr.idx
    Index to the Computer Underground Digest Archives (June 13, 1991)

    nextbugs.txt
    CERT Advisory on the NeXT computer's Software

    nfs_trace.txt
    NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton

    nha-app.txt
    Application to Join Network Hackers Alliance (June 1, 1991)

    nimbus.txt
    Research Machines Nimbus hacking, by The Green Rhino

    note9309.txt
    The Hack Report, by Lee Jackson (September 1993)

    nov-faq.txt
    The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad

    novell.hac
    Collection of security holes in Novell Netware

    novell.txt
    SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)

    novhack.txt
    Having Phun With Novell by Lord Foul/Decay (July 13, 1991)

    nwhack.faq
    Frequently Asked Questions about Hacking Novell Netware by Simple Nomad

    obscene.###
    TAG FILE: Obscene Phobia BBS (January 1, 1995)

    ocfber.1
    Bylaws of the Open Computing Facility at UC Berkeley

    ocfber.2
    Constitution for the Open Computing Facility at UC Berkeley

    omron.pin
    How to Connect OMRON 3S4YR-HSR4 to your PC

    orange
    Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983

    orange.txt
    The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)

    orgs.hac
    A Large List of Computer Security Organizations

    orgs.txt
    1988 List of Computer Security Organizations

    outdial.lst
    Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)

    outdial.txt
    How to Use Outdials: An Introduction by Lorax

    outdials.us
    Ameican Local Outdials by Sebastian Winchler (March 1991)

    outdialsnfo.hac
    List of Dialouts

    pacbell.lst
    Collection of Pacific Bell Computer Systems

    packet.txt
    Notes on Using Tymenet and Telenet by Michael A. Banks (1989)

    pacnet.hac
    Hacking into the PACnet System

    pactimea.txt
    Telephone Numbers for the Pacific Bell Computer System by Another Hacker

    passhack.txt
    The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press

    password.txt
    Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)

    pcp88.lst
    PC Pursuit List Version 1.1 (August 31, 1988)

    pcpbas.txt
    How to Use PC Pursuit Service

    pcphack.phk
    Hacking PC Pursuit Codes by The Weenie Warriors

    pcphack.txt
    The Weenie Warriors Present Hacking PC Pursuit Codes

    pcpold.phk
    How to Use Telenet's PC Pursuit Service by Z-Man

    pcpursue.txt
    PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992

    pcpursui.yes
    PC Pursuit and Telenet Local Access Numbers

    pdnaxis.txt
    The Public Data Network Numbers

    pdp11.hac
    Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal

    pentagon.txt
    The Milnet File by Brigadier General Swipe/Dispater

    ph.txt
    Soft Documentation: P-Hack 1.0 by Peter King

    phonecom.nfo
    Becoming More Informed (Becoming a Hacker)

    popper.txt
    ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)

    prime.hac
    A List of PRIME Commands

    primecpl.hac
    An Introduction to PRIMOS CPL Directives by Necrovore

    primer.txt
    Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)

    primes.txt
    Message Base With Discussion of the Watch utlity on PRIME (August, 1988)

    primos.hac
    Hacking Primos Systems By Nanuk of the North

    primos1.txt
    Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

    primos2.txt
    Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

    primos3.txt
    Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

    primos4.txt
    Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

    primos5.txt
    Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

    psnintro.txt
    The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)

    psns.txt
    An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker

    pumpcon.txt

    pw-hack.txt
    The Art of Password Hacking by HIT

    qsd.txt
    How to Access Minitel or How to Have FUN on QSD

    racintro
    Information on RAC: A Host System Used for Access to GEnie and AppleLink

    raclog1
    An Example of an RAC Login

    raclog2
    An Example of an RAC Login, Part II

    ram1
    Hacking Rampart Systems Part 1

    ram2
    Hacking Rampart Systems Part 1 (cont)

    ram5
    Hacking Rampart Systems Part 2

    ram6
    Hacking Rampart Systems Part 2 (cont)

    ramcomm.hac
    Hacking RAM Communications (Pager)

    rampart1.hac
    Hacking Rampart Systems by Whackoland

    rampart2.hac
    Hacking Rampart Systems by Whackoland Part II

    rcaglobe.txt
    The RCA Network Part I by the Telex Troopers

    read.me
    A Story About the TSR That Catches Passwords, and a short History

    readme.now
    SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker

    readme.txt
    Force Files Explanation

    reid.txt
    The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)

    revblt.hac
    Review of Federal Agency Computer Security and Privacy Plans

    riacs
    Principles of Responsible Use of RIACS Computing Facilities

    rimeman.hac
    RIME User's Guide

    ripco.txt
    The Doctor Ripco Seizure by Full Disclosure (1991)

    risks.txt
    Avoiding the Risks of Hacking: A List of Suggestions by IC

    risktool.hac
    Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)

    rom.txt
    Macintosh ROM Secrets by The Cloud (November 23, 1990)

    rowdy_dl.man
    DocumentationL The Rowdy Dialer (April 1993)

    rspwd.new
    Some Downloaded Password File

    rsts.hac
    So You've Decided to Down a RSTS System, by Sam Sneed

    rsx11.hac
    RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital

    rsx11m.txt
    RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital

    ruhacker.txt
    Are You a Hacker? By ReDragon

    sanatmdoc.hac
    Getting into an ATM

    saruman.add
    TAG: Saruman BBS Ad

    satan~1.txt
    A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)

    satcon.txt
    Satellite Control, by Ninja Squirrel & Logan-5

    satelit3.txt
    Satellite Scrambling Systems: The Truth, by XL

    satelite.txt
    Satellite Frequencies, by Sir Francis Drake

    scanprg.txt
    What To Look For In A Code Hacking Program, by Dissident

    school.txt
    Screwing with School Computers, by Liquid Bug

    secrets2.hac
    Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office

    secrets3.hac
    Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things

    secretsdoc.hac
    Young's Demonstrative Translation of Scientific Secrets (1861)

    securdev.txt
    Technical Hacking Volume 1 by the Warelock

    security
    Overview of Computer Security by E.A. Bedwell, EDP Specialist

    security.fy8
    Site Security Handbook, 1991

    security.txt
    Professor Falken's Guide to CODE Hacking Security

    sequence.txt
    Sequence Number Attacks, by Rik Farrow

    sha.hac
    Swedish Hackers Association Annual Year Protocol #4

    shadec.txt
    The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association

    shahewl.txt
    Swedish Hacking Association presents Hacking HP 3000 Part 1

    shaprot3.txt
    The 3rd Protocol (1990) by The Swedish Hackers Association

    shawn-file-check
    The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions

    shw0293.asc
    Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn

    shw0394.asc
    Syndicated Hack Watch (March 1994) by John McCormac

    shw0494.asc
    Syndicated Hack Watch (April 1994)

    shw0593.asc
    Red Hot Television is Banned

    shw0893.asc
    The Start of the Skybox Cable War

    shw0993.asc
    Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"

    shw0994.bbs
    Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control

    shw1093.asc
    Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press

    skel_key.txt
    SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society

    skey.txt
    Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn

    skeyfl.txt
    Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries

    skyhack.hac
    The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)

    sniffer.txt
    FAQ: The Sniffer FAQ Version 1.7

    snoop
    Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca

    snoop.txt
    Data Snooping the Right Way by Lee Day

    sourcetelnet.txt
    The Source Telnet Directory, and Uninet Directory

    ss-info2.txt
    The Social Security Number, by Barbara Bennett

    ssan.hac
    The Social Security Number

    ssn-stuf.txt
    More about why Social Security Numbers are Insecure

    ssnum.ana
    About Social Security Numbers

    starlink.txt
    Information on Galaxy Starlink: A User's Guide

    starmast.txt
    Hacking the Gandalf Starmaster by Deicide (May 22, 1993)

    statemind.txt
    So, You Wanna Be a Hacker? It's a State of Mind!

    stoll.doc
    Writings of Clifford Stoll

    storehac
    Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)

    stupidki.hac
    Those Stupid Little Bastard Hackers!

    sun413.txt
    How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)

    sundevil.txt
    Operation Sundevil, by the Prodigy

    superd.txt
    DocumentationL Superdial 1.03 by Evan Anderson

    sys75.hac
    The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson

    ta&m.txt
    Texas A&M Network Security Package Overview 7/1/1993

    tachelp
    Captures of Information on TACACS by The Argonaut

    tan.txt
    List of Telenet Access Numbers by Daredevil of P/HUN

    tcp-ip.txt
    FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)

    tcsb.03
    Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)

    tcsb.04
    An Introduction to PRIMOS CPL Directives by Necrovore

    tcsb.05
    Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)

    tcsb.06
    Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)

    tcsb.08
    Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)

    tcsb.11
    Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)

    tcsb.12
    Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988

    techhack.hac
    A Guide to ADS System, by Lord Digital and the Phantom

    techiq.txt
    Hacking Techniques, by Logan-5 (Hacker Supreme)

    technicl.txt
    Technical Hacking: Volume One by the Warelock

    tele3.txt
    Telenet Scanning by Doc Telecom (July 11, 1988)

    tele4.txt
    An Overview of Telenet by Man Max

    tele5.hac
    Hacking Telnet by The Flash

    telecode.txt
    Telenet Codes, Hacked Out by ZORON (May 1, 1988)

    telecomm.txt
    An Introductory Guide to Telenet Commands

    teleinfo.txt
    Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)

    telenet.hac
    Telenet: The Secret Exposed

    telenet.txt
    An Introductory Guide to Telenet Commands

    telenet2.txt
    A Good amount of general Telenet Information

    teleneth.txt
    An Introductory Guide to Telenet Commands

    teleneti
    Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)

    teleneti.phk
    Instructions for using TELENET.

    telescan.txt
    Information on Telenet Scanning

    tellerma.txt
    Cracking Auto Bank Teller Machines by the Suspect

    teln2.txt
    Telenet Terminal Identifiers

    teln3.txt
    Welcome to the TCO Access Listing (September 15, 1987)

    telnetsn.txt
    Telenet Scanning by Doc Telecom (July 11, 1988)

    telnumbe.txt
    Telenet Access Numbers, by the Weenie Warriors

    teltermz.txt
    List of Terminal Identifiers

    tempest.hac
    Excerpt of article on Tempest

    thc.nfo
    NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)

    thc2.nfo
    The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)

    thehaq.txt
    The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)

    thuglan1.txt
    Introduction to Hacking into LANs by THUG

    thuglan2.txt
    General Information on LANs by THUG (July 31, 1991)

    tihack2.txt
    Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)

    timenet.txt
    Hacking Tymnet by Byte Brain

    tl-user.txt
    ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas

    tl.q-a
    ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual

    tmplefun.txt
    Fun with Temple's Computers (A How To)

    tnet1.txt
    Tymnet File #1 by The Twilight Phone

    tnet2.txt
    Tymnet File #2 by The Twilight Phone

    tnet3.txt
    Tymnet File #3 by The Twilight Phone

    tnpcpod.txt
    TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom

    tops20.txt
    Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!

    transdir.txt
    The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory

    trash.txt
    Dumpster Diving: An overview of the legality, by Full Disclosure

    trashing.rot
    The Art of Trashing by Deicide

    traxtool.txt
    The Trax Toolbox Volume #001 by Track

    triad187.hac
    The Triad: A 3-in-1 Textfile Magazine, Issue #1

    trojan
    Rumors of Worms and Trojan Horses by Mike Guffey

    tsrcrack.txt
    SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)

    ttyspoof.txt
    TTY Spoofing, by SubEthan

    tym_ods.txt
    TymNet OutDials Sorted By Area Code

    tyme2.txt
    International Packet Switching Services Description

    tymenet.hac
    Tymenet Technical and User Information

    tymnet.ods
    Listing of Tymnet ODS Systems

    tymnet.txt
    Packet Networks I and other Tymnet Information by Digital Demon, 1990

    tymnet96.txt
    BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)

    ueber.txt
    A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)

    uk.dialups
    A List of Modem Dialups in the UK (September 22, 1990)

    ukguide.hac
    The Guide to Online Databases for UK Users

    ulimate.txt
    The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)

    ultrad3.txt
    The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy

    unineta.phk
    Uninet Information, from The South Pole

    unp.txt
    SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)

    up.txt
    SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)

    usrguide.txt
    The NIST Computer User's Guide to the Protection of Information Resources

    vanish.txt
    The Hacker Who Vanished: Suicide or Clever Hoax?

    vax-7.txt

    vendors.hac
    Large Security Vendors List

    verstell.ana
    Neat Fun with Versatellers

    virus
    Attack of the Computer Virus, by Lee Dembart

    vmbhack.txt
    Hacking Voice Mail Boxes by Tik Tak

    vmsptuto.txt
    The IBM VMSSP System, by The Motorhead

    vthack1.txt
    The VT Hacker, by the Man Hermit

    vthack2.txt
    The VT Hacker #2, by the Mad Hermit

    vthack3.txt
    The VT Hacker #3, by The Mad Hermit

    vtp.txt
    A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)

    wal-mart.txt
    Hacking the Wal-Mart Armorguard Computer Protection System

    wanghack.hac
    Hacking the Wang OS, by Dark Knight

    wargames
    The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)

    wargames.hum
    Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock

    watching
    Watching the Watcher Watching You by Sir Knight

    wats.txt
    WATS Version 1.0 by Professor Falken & The Aptolcater

    whca_txtmsg.log
    The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!

    xerox.hac
    Hacking Xerox

    xmux.txt
    The ROT Guide to Gandalf XMUX's by Deicide

    zen.hac
    Dan Farmer's Improving the Security of Your Site by Breaking Into It

    zippass.txt
    The Security of PKZIP Encryption