荔园在线

荔园之美,在春之萌芽,在夏之绽放,在秋之收获,在冬之沉淀

[回到开始] [上一篇][下一篇]


发信人: hbo (奥妙), 信区: Hacker
标  题: Hacker入门手册(2600)(网络Hack资料来源)
发信站: 深大荔园晨风站 (Fri Jan 16 01:12:15 1998), 转信

这是2600hack入门中关于网络上Hack资料来源的部分如ftp,http等。

Section D: Resources
~~~~~~~~~~~~~~~~~~~~

01. What are some ftp sites of interest to hackers?

N 204.215.84.2            /pub/dmackey
  2600.com                                                (2600 Magazine)
  aeneas.mit.edu                                          (Kerberos)
  alex.sp.cs.cmu.edu      /links/security                 (Misc)
  asylum.sf.ca.us                                    (CyberWarriors of Xanadu)
N atari.archive.umich.edu /pub/atari/Utilities/pgp261st.zip (Atari PGP)
  athena-dist.mit.edu     /pub/ATHENA                     (Athena Project)
  atlantis.utmb.edu                                       (Anti-virus)
  bellcore.com                                            (Bellcore)
  cert.org                                                (CERT)
  ciac.llnl.gov                                           (CIAC)
  clark.net               /pub/jcase                      (H/P)
  cnit.nsk.su             /pub/security                   (Security)
  coast.cs.purdue.edu     /pub                            (Security/COAST)
  coombs.anu.edu.au       /pub/security                   (Security)
  csrc.ncsl.nist.gov                                      (NIST Security)
  dartmouth.edu           /pub/security                   (Security)
  ds.internic.net                                         (Internet documents)
N dutiws.twi.tudelft.nl   /pub/novell
  etext.archive.umich.edu /pub/Zines/PrivateLine          (PrivateLine)
N fastlane.net            /pub/nomad
  ftp.3com.com            /pub/Orange-Book                (Orange Book)
  ftp.acns.nwu.edu        /pub                            (Mac Anti-virus)
  ftp.acsu.buffalo.edu    /pub/security & /pub/irc        (Security & IRC)
  ftp.alantec.com         /pub/tcpr                       (Tcpr)
  ftp.armory.com          /pub/user/kmartind              (H/P)
  ftp.armory.com          /pub/user/swallow               (H/P)
  ftp.auscert.org.au      /pub                            (Australian CERT)
  ftp.cerf.net            /pub/software/unix/security     (CERFnet)
  ftp.cert.dfn.de                                         (FIRST)
  ftp.cisco.com                                           (Cisco)
  ftp.commerce.net        /pub/standards/drafts/shttp.txt (Secure HyperText)
  ftp.cs.colorado.edu
  ftp.cs.ruu.nl           /pub/SECURITY                   (Security & PGP)
  ftp.cs.uwm.edu          /pub/comp-privacy               (Privacy Digest)
  ftp.cs.vu.nl
  ftp.cs.yale.edu
  ftp.csi.forth.gr        /pub/security
  ftp.csl.sri.com         /pub/nides                      (SRI)
  ftp.csn.org /mpj                                        (Cryptology)
  ftp.csua.berkeley.edu   /pub/cypherpunks                (Crypto)
  ftp.delmarva.com
N ftp.demon.co.uk         /pub/misc/0800num.txt           (0800/0500 numbers)
  ftp.denet.dk            /pub/security/tools/satan
  ftp.digex.net           /pub/access/dunk
  ftp.dsi.unimi.it        /pub/security/crypt             (Crypto)
  ftp.dstc.edu.au         /pub/security/satan
  ftp.ee.lbl.gov
  ftp.eff.org             /pub/Publications/CuD           (EFF)
  ftp.elelab.nsc.co.jp    /pub/security                   (Security)
  ftp.etext.org                                           (Etext)
  ftp.fc.net              /pub/deadkat                    (TNO)
  ftp.fc.net              /pub/defcon                     (DefCon)
  ftp.fc.net              /pub/defcon/BBEEP               (BlueBeep)
  ftp.fc.net              /pub/phrack                     (Phrack)
  ftp.foobar.com
  ftp.funet.fi            /pub/doc/CuD
  ftp.gate.net            /pub/users/laura
  ftp.gate.net            /pub/users/wakko
  ftp.giga.or.at          /pub/hacker/                    (H/P)
  ftp.greatcircle.com     /pub/firewalls                  (Firewalls)
  ftp.IEunet.ie           /pub/security                   (Security)
  ftp.ifi.uio.no
  ftp.indirect.com        /www/evildawg/public_access/C&N/
  ftp.info.fundp.ac.be
  ftp.informatik.uni-hamburg.de
  ftp.informatik.uni-kiel.de /pub/sources/security
  ftp.inoc.dl.nec.com     /pub/security                   (Security)
  ftp.isi.edu
  ftp.lava.net            /users/oracle/                  (H/P
N ftp.leo.org/pub/com/os/os2/crypt
  ftp.lerc.nasa.gov       /security
  ftp.llnl.gov            /pub                            (CIAC)
  ftp.luth.se             /pub/unix/security
  ftp.lysator.liu.se
  ftp.mcs.anl.gov         /pub/security
  ftp.microserve.net      /ppp-pop/strata/mac             (Mac)
  ftp.near.net            /security/archives/phrack       (Zines)
  ftp.nec.com
  ftp.net.ohio-state.edu  /pub/security/satan
  ftp.netcom.com          /pub/br/bradleym                (Virii)
  ftp.netcom.com          /pub/da/daemon9                 (H/P)
  ftp.netcom.com          /pub/fi/filbert
N ftp.netcom.com          /pub/gr/grady
N ftp.netcom.com          /pub/il/illusion                (H/P+Virus)
N ftp.netcom.com          /pub/je/jericho                 (H/P)
  ftp.netcom.com          /pub/le/lewiz                   (Social Engineering)
N ftp.netcom.com          /pub/ty/tym                     (TYM)
  ftp.netcom.com          /pub/va/vandal                  (DnA)
  ftp.netcom.com          /pub/wt/wtech/
N ftp.netcom.com          /pub/zi/zigweed                 (H/P)
  ftp.netcom.com          /pub/zz/zzyzx                   (H/P)
  ftp.netsys.com
  ftp.ocs.mq.edu.au       /PC/Crypt                       (Cryptology)
  ftp.ox.ac.uk            /pub/comp/security
  ftp.ox.ac.uk            /pub/crypto                     (Cryptology)
  ftp.ox.ac.uk            /pub/wordlists                  (Wordlists)
  ftp.paranoia.com        /pub/toneloc/tl110.zip          (ToneLoc)
N ftp.pipex.net           /pub/areacode                   (uk areacodes)
  ftp.pop.psu.edu
  ftp.primenet.com        /users/i/insphrk
  ftp.primenet.com        /users/k/kludge                 (H/P)
  ftp.primenet.com        /users/s/scuzzy                 (Copy Protection)
  ftp.primus.com          /pub/security                   (Security)
  ftp.psy.uq.oz.au
  ftp.psy.uq.oz.au        /pub/DES
  ftp.rahul.net           /pub/conquest/DeadelviS/script/vms/
  ftp.rahul.net           /pub/lps                        (Home of the FAQ)
  ftp.sert.edu.au
  ftp.sgi.com
N ftp.smartlink.net       /pub/users/mikes/haq
  ftp.std.com             /archives/alt.locksmithing      (Locksmithing)
  ftp.std.com             /obi/Mischief/                  (MIT Guide to Locks)
  ftp.std.com             /obi/Phracks                    (Zines)
  ftp.sunet.se            /pub/network/monitoring         (Ethernet sniffers)
  ftp.sura.net            /pub/security                   (SURAnet)
  ftp.technet.sg
U ftp.technion.ac.il
  ftp.tis.com             /pub                            (TIS)
  ftp.tisl.ukans.edu      /pub/security
  ftp.uni-koeln.de                                        (Wordlists)
  ftp.uspto.gov
  ftp.uu.net              /doc/literary/obi/Phracks       (Zines)
  ftp.uwp.edu             /pub/dos/romulus/cracks         (Copy Protection)
  ftp.vis.colostate.edu
  ftp.vix.com
  ftp.vortex.com
  ftp.warwick.ac.uk       /pub/cud                        (Zines)
  ftp.wi.leidenuniv.nl    /pub/security
  ftp.win.tue.nl          /pub/security                   (Security)
  ftp.winternet.com       /users/nitehwk                  (H/P)
  ftp.wustl.edu           /doc/EFF                        (EFF)
  ftp.zoom.com
  ftp.zrz.tu-berlin.de/pub/security/virus/texts/crypto    (Cryptology)
  garbo.uwasa.fi          /pc/crypt                       (Cryptology)
N gemini.tuc.noao.edu     /pub/grandi
  gti.net                 /pub/safetynet
  gumby.dsd.trw.com
  hack-this.pc.cc.cmu.edu                                 (Down for Summer)
  heffer.lab.csuchico.edu                        (Third Stone From The Sun)
  hplyot.obspm.fr
  info.mcs.anl.gov
N infonexus.com           /pub                            (The Guild)
  jerico.usc.edu
  l0pht.com                                               (The L0pht)
  lcs.mit.edu             /telecom-archives               (Telecom archives)
  lod.com                                                 (Legion of Doom)
  mac.archive.umich.edu
  mary.iia.org            /pub/users/patriot              (Misc)
  monet.ccs.itd.umich.edu
N net-dist.mit.edu        /pub/pgp
  net.tamu.edu            /pub/security/TAMU              (Security)
  net23.com               /pub                            (Max Headroom)
  nic.ddn.mil             /scc                            (DDN Security)
  nic.sura.net            /pub/security
  oak.oakland.edu         /pub/hamradio                   (Ham Radio)
  oak.oakland.edu         /SimTel/msdos/sound             (DTMF decoders)
  oak.oakland.edu         /SimTel/msdos/sysutil           (BIOS attackers)
  parcftp.xerox.com
  prism.nmt.edu           /pub/misc                       (Terrorist Handbook)
  pyrite.rutgers.edu      /pub/security                   (Security)
  relay.cs.toronto.edu    /doc/telecom-archives           (Telecom)
  rena.dit.co.jp          /pub/security                   (Security)
  research.att.com        /dist/internet_security         (AT&T)
  ripem.msu.edu           /pub/crypt                      (Ripem)
N rmii.com                /pub2/KRaD                      (KRaD Magazine)
  rtfm.mit.edu                                            (Etext)
  rtfm.mit.edu            /pub/usenet-by-group            (Usenet FAQ's)
  scss3.cl.msu.edu        /pub/crypt                      (Cryptology)
N sgigate.sgi.com         /Security                       (SGI Security)
  sierra.stanford.edu
  spy.org                                                 (CSC)
N src.doc.ic.ac.uk        /usenet/uk.telecom              (uk.telecom archives)
  suburbia.apana.org.au   /pub/unix/security              (Security)
  sunsolve1.sun.com
  theta.iis.u-tokyo.ac.jp /pub1/security                  (Security)
  titania.mathematik.uni-ulm.de /pub/security             (Security)
  toxicwaste.mit.edu      /pub/rsa129/README              (Breaking RSA)
  ugle.unit.no
  unipc20.unimed.sintef.no
  vic.cc.purdue.edu
  vixen.cso.uiuc.edu      /security
N web.mit.edu
  whacked.l0pht.com                                       (Mac + H/P)
  wimsey.bc.ca            /pub/crypto                     (Cryptology)
N wuarchive.wustl.edu     /pub/aminet/util/crypt


02. What are some fsp sites of interest to hackers?

  None at this time.


03. What are some newsgroups of interest to hackers?

  alt.2600                 Do it 'til it hertz
N alt.2600hz
N alt.2600.codez
N alt.2600.debate
N alt.2600.moderated
  alt.cellular
  alt.cellular-phone-tech  Brilliant telephony mind blow netnews naming
  alt.comp.virus           An unmoderated forum for discussing viruses
  alt.comp.virus.source.code
  alt.cracks               Heavy toolbelt wearers of the world, unite
  alt.cyberpunk            High-tech low-life.
  alt.cyberspace           Cyberspace and how it should work.
  alt.dcom.telecom         Discussion of telecommunications technology
  alt.engr.explosives      [no description available]
  alt.fan.kevin-mitnick
  alt.fan.lewiz            Lewis De Payne fan club
  alt.hackers              Descriptions of projects currently under development
  alt.hackintosh
  alt.locksmithing         You locked your keys in *where*?
  alt.hackers.malicious    The really bad guys - don't take candy from them
  alt.ph.uk                United Kingdom version of alt.2600
  alt.privacy.anon-server  Tech. & policy matters of anonymous contact servers
  alt.radio.pirate         Hide the gear, here comes the magic station-wagons.
  alt.radio.scanner        Discussion of scanning radio receivers.
  alt.satellite.tv.europe  All about European satellite tv
  alt.security             Security issues on computer systems
  alt.security.index       Pointers to good stuff in misc.security (Moderated)
  alt.security.keydist     Exchange of keys for public key encryption systems
  alt.security.pgp         The Pretty Good Privacy package
  alt.security.ripem       A secure email system illegal to export from the US
  comp.dcom.cellular       [no description available]
  comp.dcom.telecom        Telecommunications digest (Moderated)
  comp.dcom.telecom.tech   [no description available]
  comp.org.cpsr.announce   Computer Professionals for Social Responsibility
  comp.org.cpsr.talk       Issues of computing and social responsibility
  comp.org.eff.news        News from the Electronic Frontiers Foundation
  comp.org.eff.talk        Discussion of EFF goals, strategies, etc.
N comp.os.netware.security Netware Security issues
  comp.protocols.kerberos  The Kerberos authentification server
  comp.protocols.tcp-ip    TCP and IP network protocols
  comp.risks               Risks to the public from computers & users
  comp.security.announce   Announcements from the CERT about security
N comp.security.firewalls  Anything pertaining to network firewall security
  comp.security.misc       Security issues of computers and networks
  comp.security.unix       Discussion of Unix security
  comp.virus               Computer viruses & security (Moderated)
  de.org.ccc               Mitteilungen des CCC e.V.
  misc.security            Security in general, not just computers (Moderated)
  rec.pyrotechnics         Fireworks, rocketry, safety, & other topics
  rec.radio.scanner        [no description available]
  rec.video.cable-tv       Technical and regulatory issues of cable television
  sci.crypt                Different methods of data en/decryption


04. What are some telnet sites of interest to hackers?

  anarchy-online.com
  ntiabbs.ntia.doc.gov                  (NTIA)
  l0pht.com                             (The L0pht)
  sfpg.gcomm.com                        (The Floating Pancreas)
  telnet lust.isca.uiowa.edu 2600       (underground bbs) (temporarily down)
  pcspm2.dar.csiro.au                   (Virtual Doughnutland BBS)
  prince.carleton.ca 31337              (Twilight of The Idols)
N spy.org                               (Computer Systems Consulting)

05. What are some gopher sites of interest to hackers?

  ba.com                  (Bell Atlantic)
N cell-relay.indiana.edu  (Cell Relay Retreat)
  csrc.ncsl.nist.gov      (NIST Security Gopher)
  gopher.acm.org          (SIGSAC (Security, Audit & Control))
  gopher.cpsr.org         (Computer Professionals for Social Responsibility)
  gopher.eff.org          (Electonic Frontier Foundation)
N gopher.panix.com        (Panix)
  gw.PacBell.com          (Pacific Bell)
  iitf.doc.gov            (NITA -- IITF)
N info.itu.ch             (International Telegraph Union)
  ncjrs.aspensys.com      (National Criminal Justice Reference Service)
  oss.net                 (Open Source Solutions)
  spy.org                 (Computer Systems Consulting)
  wiretap.spies.com       (Wiretap)


06. What are some World wide Web (WWW) sites of interest to hackers?

N 134.220.198.66:8000                           (Peter Strangman's)
U alcuin.plymouth.edu/~jay/underground.html     (Underground Links)
U all.net                 (American Society for Industrial Security Management)
  alumni.caltech.edu/~dank/isdn/                (ISDN)
N asearch.mccmedia.com/www-security.html        (WWW-security info)
  aset.rsoc.rockwell.com                        (NASA/MOD AIS Security)
  aset.rsoc.rockwell.com/exhibit.html           (Tech. for Info Sec)
  att.net/dir800                                (800 directory)
  ausg.dartmouth.edu/security.html              (UNIX Security Topics)
N bianca.com/bump/ua                            (Unauthorized Access Home Page)
N ccnga.uwaterloo.ca/~jscouria/gsm.html         (GSM Specification)
N cell-relay.indiana.edu/cell-relay             (Cell Relay Retreat)
N ciac.llnl.gov                                 (CIAC Web Site)
N community.net/community/all/home/solano/sbaldwin
N cs.purdue.edu/homes/spaf/coast.html           (The COAST Project and
Laboratory)
N csbh.mhv.net/dcypher/home.html                (Dcypher's Home Page)
N csrc.ncsl.nist.gov                            (NIST)
N cwix.com/cwplc                                (Cable and Wireless)
  daemon.apana.org.au/~longi/
N dcpu1.cs.york.ac.uk:6666/fisher/telecom       (Embryonic Telephone History
Page)
N dfw.net/~aleph1                               (The Uebercracker's Security
Web)
N draco.centerline.com:8080/~franl/crypto.html  (Crypto)
N draco.centerline.com:8080/~franl/privacy/bacard-review.html
N enigma.pc.cc.cmu.edu/~caffeine/home.html      (Caffeine's Home Page)
N everest.cs.ucdavis.edu/Security.html          (UCDavis.edu Security Page)
N everest.cs.ucdavis.edu/slides/slides.html     (Security Lab Slides)
  ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR)
N fastlane.net/homepages/thegnome               (Simple Nomad)
N first.org                                     (FIRST)
N freeside.com/phrack.html                      (Phrack Magazine)
N frosted.mhv.net/keytrap.html
N ftp.arpa.mil                                  (ARPA home page)
  ftp.tamu.edu/~abr8030/security.html           (Security)
N grove.ufl.edu/~bytor                          (Bytor home page)
N hightop.nrl.navy.mil/potpourri.html           (MOD Security)
N hightop.nrl.navy.mil/rainbow.html             (MOD Rainbow Books)
  ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
  ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
  info.bellcore.com/BETSI/betsi.html            (Betsi)
N info.gte.com                                  (GTE Labrotories)
N info.mcc.ac.uk/Orange                         (Orange)
  infosec.nosc.mil/infosec.html                 (SPAWAR INFOSEC)
N infosec.nosc.mil/navcirt.html                 (NAVCIRT)
N iss.net/iss                                   (Internet Security Systems)
N jumper.mcc.ac.uk/~afs/telecom                 (UK Telecom Pricing Information)

  l0pht.com                                     (The l0pht)
  l0pht.com/~oblivion/IIRG.html                 (Phantasy Magazine)
N l0pht.com/~spacerog/index.html                (Whacked Mac Archives)
N lcs.mit.edu/telecom-archives/areacodes/guide  (North American Area Codes)
N lcs.mit.edu/telecom-archives/npa.800          (1-800 Info)
N lcs.mit.edu/telecom-archives/npa.900          (1-900 Info)
N lod.com                                       (Legion of Doom)
N lod.com/~gatsby                               (Gatsby)
N lod.com/~tabas                                (Mark Tabas -- LOD)
N lod.com/~vampire/emptime7                     (Empire Times)
N magicnet.net/xtabi/netscape/links/cypher.html (Cryptology)
N mars.superlink.net/user/esquire               (Red box info)
  matrix.resnet.upenn.edu/rourke                (FakeMail FAQ)
  mindlink.jolt.com                             (The Secrets of LockPicking)
N mindlink.net/A7657                            (Stephen H Kawamoto's Home Page)

  mls.saic.com                                  (SAIC MLS)
N mnementh.cs.adfa.oz.au/Lawrie_Brown.html      (Lawrie Brown's crypto
bibliography)
  motserv.indirect.com                          (Motorola)
U naic.nasa.gov/fbi                             (FBI information)
U nasirc.nasa.gov/NASIRC_home.html              (NASIRC)
  obscura.com/~loki/                            (Cryptology)
  ophie.hughes.american.edu/~ophie              (Ophie)
  oregano.sl.pitt.edu/index.htm
N outpost.callnet.com/outpost.html
  pages.ripco.com:8080/~glr/glr.html            (Full Disclosure)
U peg.pegasus.oz.au                             (EFF Australia)
N quetel.qc.ca/qt0000ag.htm                     (Quebec-Telephone)
N resudox.net/bio/mainpage.html                 (BioHazard's Home Page)
N ripco.com:8080/~glr/glr.html                  (Full Disclosure)
N rschp2.anu.edu.au:8080/crypt.html
N scitsc.wlv.ac.uk/~cs6171/hack                 (UNIX Security)
U seclab.cs.ucdavis.edu/Security.html           (Security)
U seclab.cs.ucdavis.edu/slides/slides.html      (Security Lab Slides)
N sfpg.gcomm.com/mitnick/mitnick.htm            (3wP Kevin Mitnick WWW HomePage)

N smurfland.cit.buffalo.edu/NetMan/index.html   (Network Management)
N sunsite.unc.edu/sun/inform/sun-info.html      (Sun Microsystems Sponsor Page)
N support.mayfield.hp.com                       (Hewlett Packard SupportLine
Services)
N tamsun.tamu.edu/~clm3840/hacking.html         (Hacking/Phreaking)
  the-tech.mit.edu                              (LaMacchia case info)
N town.hall.org/university/security/stoll/cliff.html (Cliff Stoll)
  turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995)
  ucs.orst.edu:8001/mintro.html                 (Micro Power Broadcasting)
  underground.org                               (Eubercrackers)
  unixg.ubc.ca:780/~jyee/                       (Cell)
  w3.gti.net/safety
N web.mit.edu/network/pgp.html                  (Getting PGP)
N web.nec.com/products/necam/mrd/cellphones/index.html(NEC)
U weber.u.washington.edu/~phantom/cpunk/index.html  (Cryptology)
N wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's
Underground Links)
  wintermute.itd.nrl.navy.mil/5544.html         (Network Security)
N www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html
N www-ns.rutgers.edu/www-security/index.html    (Rutger's documents on WWW
security)
U www-personal.engin.umich.edu/~jgotts/underground/boxes.html   (Box info)
U www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html(This document)
N www-swiss.ai.mit.edu/~bal/pks-toplev.html     (Findingsomeone's PGP key)
  www.2600.com                                  (2600 Magazine)
N www.8lgm.org                                  (8lgm Security Advisories)
  www.aads.net                                  (Ameritech)
N www.access.gpo.gov/su_docs/
N www.aloha.com/~seanw/index.html
  www.alw.nih.gov/WWW/security.html             (Unix Security)
N www.artcom.de/CCC/hotlist.html                (Chaos Computer Club Hotlist)
N www.artech-house.com/artech.html              (Artech House)
N www.asg.unb.ca                                (Atlantic Systems Group Mosaic
Index)
  www.aspentec.com/~frzmtdb/fun/hacker.html
N www.aston.ac.uk/~bromejt/mobile.html          (Mobile Phone Service Locator)
N www.att.com                                   (ATT)
N www.auditel.com                               (Auditel)
N www.auscert.org.au                            (Australian CERT)
N www.axent.com/axent                           (Axent Technologies)
  www.ba.com                                    (Bell Atlantic)
N www.bctel.com                                 (BC Tel)
  www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
N www.bell.ca                                   (Bell Canada)
  www.bell.com                                  (MFJ Task Force)
  www.bellcore.com/SECURITY/security.html       (Bellcore Security Products)
N www.border.com                                (Border Network Technologies)
  www.brad.ac.uk/~nasmith/index.html
N www.brad.ac.uk/~nasmith/underground.html      (Undergound WWW Sites)
  www.bst.bls.com                               (BellSouth)
N www.bt.co.uk                                  (British Telecom)
N www.business.co.uk/cellnet                    (Cellnet)
N www.c2.org:80/remail/by-www.html              (WWW-based remailing form)
  www.c3.lanl.gov/~mcn                          (Lanl)
  www.cam.org/~gagnon                           (OCP's)
U www.careermosaic.com/cm/uswest                (USWest)
N www.castle.net/~kobrien/telecom.html          (Telecom)
N www.cco.caltech.edu/~rknop/amiga_pgp26.html
N www.cdt.org/cda.html
N www.cec.wustl.edu/~dmm2/egs/egs.html          (En Garde Systems)
  www.cert.dfn.de/                              (German First Team)
N www.checkpoint.com                            (Checkpoint)
N www.chem.surrey.ac.uk/~ch11mh/secure.html     (Another page on secure WWW
server setup)
N www.cis.ksu.edu/~psiber/fortress/phreak/ph2reak.html (Are You Some Kind Of
PHREAK!)
  www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
N www.cityscape.co.uk/users/ek80/index.html     (Inside Cable Cover)
N www.cohesive.com                              (Cohesive Systems)
  www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
  www.con.wesleyan.edu/~triemer/network/docservs.html
  www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
N www.cosc.georgetown.edu/~denning/crypto       (The Cryptography Project)
N www.cost.se                                   (COST Computer Security
Technologies)
  www.cpsr.org/home                             (CPSR)
N www.crimson.com/isdn/telecomacry.txt          (Crimson's Telecommunications
Acronyms)
N www.crtc.gc.ca                                (CRTC - Canadian regulator)
N www.cs.berkeley.edu/~raph/remailer-list.html  (Anon remailer list)
U www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html  (CMU Security)
U www.cs.purdue.edu/coast/coast.html            (Coast)
N www.cs.purdue.edu/pcert/pcert.html            (PCERT)
N www.cs.tu-bs.de                               (Network management Tools)
  www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
  www.cs.umd.edu/~lgas                          (Laughing Gas)
N www.cs.umd.edu/~lgas/haquerwerld/haquer-individuals.html(Haquerwerld)
  www.csd.harris.com/secure_info.html           (Harris)
  www.csl.sri.com                               (SRI Computer Science Lab)
U www.csua.berekeley.edu/pub/cypherpunks/Home.html  (Cryptology)
N www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html
N www.cyber.co.uk/~joyrex                       (Joyrex Cellular)
  www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
N www.cygnus.com/~gnu/export.html               (Cryptography Export Control
Archives)
U www.datafellows.fi                            (Data Fellows (F-Prot)
N www.datasync.com/~sotmesc/sotmesc.html        (SotMESC)
N www.dcs.exeter.ac.uk/~aba                     (Cypherpunk)
  www.dct.ac.uk/~misb3cp/2600/faq.txt
N www.demon.co.uk/mobiles                       (C.C.Mobiles)
N www.dhp.com                                   (DataHaven Project)
N www.dhp.com/~pluvius                          (Pluvius' Home Page)
U www.digicash.com/ecash/ecash-home.html        (Ecash Home Page)
  www.digital.com/info/key-secure-index.html    (Digital Secure Systems)
  www.dnai.com/~gui/index.html
N www.dtic.dla.mil/defenselink                  (Office of the U.S. Secretary
of Defense (OSD)
N www.dtic.dla.mil/iac                          (DoD Information Analysis
Center (IAC) Hub Page)
N www.eecs.nwu.edu/~jmyers/bugtraq/about.html
N www.eecs.nwu.edu/~jmyers/bugtraq/archives.html
  www.eecs.nwu.edu/~jmyers/bugtraq/index.html   (Bugtraq)
  www.eecs.nwu.edu/~jmyers/ids/index.html       (Intrusion Detection Systems)
N www.eff.org
N www.eff.org/pub/Alerts
N www.eff.org/pub/Net_info/Tools/Crypto/
  www.emap.co.uk/partners/racal-airtech         (Racal-Airtech)
  www.ensta.fr/internet/unix/sys_admin          (System administration)
N www.epic.org
N www.ericsson.nl                               (Ericsson)
  www.etext.org/Zines/                          (Zines)
N www.farmstead.com                             (Farmstead)
U www.fbi.gov/fbi/FBI_homepage.html             (FBI Homepage)
  www.fc.net/defcon                             (DefCon)
  www.fedworld.gov                              (Federal Government)
  www.first.org/first/                          (FIRST)
N www.fonorola.net                              (Fonorola (a Canadian carrier)
N www.frus.com                                  (Firewalls R Us)
  www.gbnet.net/kbridge                         (KarlBridge)
  www.getnet.com/crak                           (CRAK Software)
N www.getnet.com/~vision
N www.gold.net/users/cw78                       (FleXtel)
  www.greatcircle.com                           (Great Circle Associates)
N www.gsu.edu/~socrerx/catalog.html
N www.gta.com/index.html                        (Global Technology Associates)
N www.gti.net/grayarea                          (Gray Areas)
U www.hotwired.com                              (Wired Magazine)
  www.hpcc.gov/blue94/section.4.6.html          (NSA)
N www.hq2.telecom.ie                            (Telecom Eireann)
N www.iacr.org/~iacr                            (International Association of
Cryptologic Research (IACR)
N www.ibmpcug.co.uk/~Vidtron                    (Videotron)
N www.ic.gov                                    (Central Intelligence Agency
Home Page)
N www.ifi.uio.no/~staalesc/PGP/home.html
N www.iia.org/~gautier/me.html                  (Rich Gautier's Home Page)
N www.indirect.com/www/evildawg
  www.indirect.com/www/johnk/                   (CRAK Software)
N www.ingress.com                               (Ingress Communications)
N www.interaccess.com/trc/tsa.html
N www.io.org/~djcl/phoneb.html
N www.iquest.net/~oseidler                      (Oliver Seidler's WWW Page)
N www.itd.nrl.navy.mil/ITD/5540                 (NRL Center for High Assurance
Computer Systems)
N www.itu.ch/TELECOM                            (Telecom '95)
N www.jagunet.com/~john/
N www.jedefense.com/jed.html                    (Journal of Electronic Defense)
N www.l0pht.com/cdc.html                        (Cult of the Dead Cow)
N www.l0pht.com/radiophone                      (Radiophone Archive)
N www.l0pht.com/~oblivion/IIRG.html             (International Information
Retrieval Guild Archive Site)
N www.lat.com                                   (Los Altos Technologies)
  www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
N www.lib.iup.edu/~seaman/hack/bone.html        (Bone's H/P/C page o' rama)
N www.links.net
N www.louisville.edu/~wrbake01                  (The GodZ of CyberSpacE)
  www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
  www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
  www.magi.com/~vektor/linenoiz.html
N www.mastercard.com                       (Secure Electronic Payment Protocol)
  www.mcs.com/~candyman/http/radio.html         (Radar)
  www.mcs.com/~candyman/under.html              (Cell)
N www.mcs.net/~candyman                         (H/P)
  www.mgmua.com/hackers/index.html              (Hackers, the movie)
N www.milkyway.com                              (Milkyway Networks Corporation)
N www.mit.edu:8001/people/warlord/pgp-faq.html  (PGP 2.6.2 FAQ, Buglist, Fixes,
and Improvements)
N www.monmouth.com/~jshahom                     (The Insomniac's Home Page)
N www.mot.com                                   (Motorola)
  www.mpr.ca/                                   (MPR Teltech Ltd)
N www.msen.com/~emv/tubed/spoofing.html         (Info on IP spoofing attacks)
N www.mwjournal.com/mwj.html                    (Microwave Journal)
N www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html(Security in Mosaic)
N www.ncsl.nist.gov                             (NIST Computer Systems
Laboratory)
  www.net23.com                                 (Max Headroom)
N www.netpart.com                               (NetPartners)
  www.netresponse.com:80/zldf/
N www.nic.surfnet.nl/surfnet/security/cert-nl.html(CERT-NL)
  www.nist.gov                                  (NIST)
N www.nokia.com                                 (Nokia)
N www.nortel.com                                (Northern Telecom)
  www.ntt.jp                                    (Nippon Telephone)
N www.nynex.co.uk/nynex                         (NYNEX)
U www.odci.gov                                  (The CIA)
N www.one2one.co.uk                             (Mercury One-2-One)
N www.open.gov.uk/oftel/oftelwww/oftelhm.htm    (OFTEL's Home Page)
  www.openmarket.com/info/cryptography/applied_cryptography.html
  www.pacbell.com                               (Pacific Bell)
N www.panix.com/vtw
  www.paranoia.com/astrostar/fringe.html
N www.paranoia.com/hpa                          (Paranoia's H/P/A Links)
  www.paranoia.com/mthreat                      (ToneLoc)
N www.paranoia.com/~coldfire                    (Cold Fire's Web Page)
N www.paranoia.com/~darkfox                     (Darkfox's Home Page)
N www.paranoia.com/~ice9                        (Ice-9's Home Page)
  www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
N www.phantom.com/~darkcyde                     (DarkCyde)
N www.phantom.com/~king                         (Randy King's WWW Page)
N www.phillips.com                              (Phillips Electronics)
N www.phred.org                                 (The Phred Networking
Organization)
N www.pic.net/uniloc/starlink                   (Starlink)
  www.planet.net/onkeld                         (BlueBeep Home Page)
  www.primenet.com/~kludge/haqr.html            (Kludge)
  www.quadralay.com/www/Crypt/Crypt.html        (Quadralay Cryptography)
  www.qualcomm.com/cdma/wireless.html           (Qualcomm CDMA)
N www.ramp.com/~lcs/winpgp.html                 (PGP with MS/Win)
N www.raptor.com                                (Raptor)
  www.raptor.com/raptor/raptor.html             (Raptor Network Isolator)
  www.research.att.com                          (AT&T)
N www.rocksoft.com/~ross                        (Rocksoft Pty (Veracity)
N www.rogers.com                                (Rogers Communications)
  www.rsa.com                                   (RSA Data Security)
N www.sasknet.sk.ca/Pages/sktlhome.html         (SaskTel)
  www.satelnet.org/~ccappuc
N www.sccsi.com/lsli/lsli.homepage.html         (PORTUS)
N www.sctc.com                                  (Secure Computing Corporation)
  www.seas.upenn.edu/~rourkem                   (FakeMail FAQ)
N www.seduction.com
N www.sei.cmu.edu/SEI/programs/cert.html        (CERT Coordination Center)
N www.service.com/cm/uswest/usw1.html           (USWest)
N www.shore.net/~eskwired/hp.html
N www.soci.niu.edu/~cudigest
N www.somar.com                                 (Somar Software)
N www.soscorp.com                               (Sources of Supply Corp)
  www.spatz.com/pecos/index.html                (The World of Hacking)
  www.spy.org                                   (Computer Systems Consulting)
N www.spy.org                                   (spy.org)
  www.sri.com                                   (SRI)
N www.stentor.ca                                (Stentor (Canadian telcos)
N www.tecc.co.uk/public/uk-telecom/btns.html    (BT "star services")
N www.telecoms-mag.com/tcs.html                 (Telecommunications Magazine)
N www.telkom.co.za                              (Telkom S.A. Ltd)
  www.telstra.com.au/info/security.html         (Security Reference Index)
N www.teresa.com
  www.tezcat.com/web/security/security_top_level.html
N www.tiac.net/users/triad/philes/jokai.html    (Jokai Reservation for the
Preservation of the 1st Amendment)
N www.ticllc.net/~scrtnizr
  www.tis.com                                   (Trusted Information Systems)
N www.trcone.com/t_crookb.html                  (CrookBook)
N www.tregistry.com/ttr                         (Telecomunications Training
Courses)
  www.tri.sbc.com                               (Southwestern Bell)
  www.tricon.net/Comm/synapse                   (Synapse Magazine)
  www.tufts.edu/~jpagano/
N www.uccs.edu/~abusby/hpawebsites.html
N www.uccs.edu/~abusby/k0p.html                 (kn0wledge phreak)
  www.uci.agh.edu.pl/pub/security               (Security)
N www.uknet.net/pnc                             (The Personal Number Company)
  www.umcc.umich.edu/~doug/virus-faq.html       (Virus)
N www.underground.org                           (underground.org)
N www.underground.org/bugs/
  www.usfca.edu/crackdown/crack.html            (Hacker Crackdown)
N www.vodafone.co.uk                            (Vodafone)
N www.vptt.ch/natel.html                        (Natel)
U www.wam.umd.edu/~ankh/public/devil_does_unix
N www.warwick.ac.uk/WWW/search/Phones/nng.html  (National Number Group Codes)
N www.well.com/user/abacard
N www.well.com/user/crunch                      (Captain Crunch)
N www.wfu.edu/~wilsonbd
  www.wiltel.com                                (Wiltel)
N www.wiltel.com/glossary/glossary.html         (Telecommunications Glossary)
N www.wired.com                                 (HotWired)
N www2.undernet.org:8080/~cs93jtl/IRC.html      (IRC)

In addition to browsing these fine pages, you can often find what you
are looking for by using one of these automated search engines:

  www.yahoo.com
  www.lycos.com
  www.webcrawler.com


07. What are some IRC channels of interest to hackers?

  #2600
  #cellular
  #hack
  #phreak
  #linux
  #realhack
  #root
  #unix
  #warez


08. What are some BBS's of interest to hackers?

  Rune Stone                    (203)832-8441   NUP: Cyberdeck
  The Truth Sayer's Domain      (210)493-9975
  Hacker's Haven                (303)343-4053
  Independent Nation            (413)573-1809
  Ut0PiA                        (315)656-5135
  underworld_1994.com           (514)683-1894
  Alliance Communications       (612)251-8596
  Maas-Neotek                   (617)855-2923
  Apocalypse 2000               (708)676-9855
  K0dE Ab0dE                    (713)579-2276
  fARM R0Ad 666                 (713)855-0261
  kn0wledge Phreak <k0p> BBS    (719)578-8288   NUP=NO NUP
N The Edge of Reality           (805)496-7460
  Static Line                   (806)747-0802
  Area 51                       (908)526-4384
N The Drunk Forces              +972-3-5733477


09. What are some books of interest to hackers?

General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
  Computer Security Basics
  Author: Deborah Russell and G.T. Gengemi Sr.
  Publisher: O'Reilly & Associates, Inc.
  Copyright Date: 1991
  ISBN: 0-937175-71-4

        This is an excellent book.  It gives a broad overview of
        computer security without sacrificing detail.  A must read for
        the beginning security expert.

  Information Systems Security
  Author: Philip Fites and Martin Kratz
  Publisher: Van Nostrad Reinhold
  Copyright Date: 1993
  ISBN: 0-442-00180-0

  Computer Related Risks
  Author: Peter G. Neumann
  Publisher: Addison-Wesley
  Copyright Date: 1995
  ISBN: 0-201-55805-X

  Computer Security Management
  Author: Karen Forcht
  Publisher: boyd & fraser publishing company
  Copyright Date: 1994
  ISBN: 0-87835-881-1

  The Stephen Cobb Complete Book of PC and LAN Security
  Author: Stephen Cobb
  Publisher: Windcrest Books
  Copyright Date: 1992
  ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

  Security in Computing
  Author: Charles P. Pfleeger
  Publisher: Prentice Hall
  Copyright Date: 1989
  ISBN: 0-13-798943-1.

  Building a Secure Computer System
  Author: Morrie Gasser
  Publisher: Van Nostrand Reinhold Co., New York.
  Copyright Date:
  ISBN: 0-442-23022-2

  Modern Methods for Computer Security
  Author: Lance Hoffman
  Publisher: Prentice Hall
  Copyright Date: 1977
  ISBN:

  Windows NT 3.5 Guidelines for Security, Audit and Control
  Author:
  Publisher: Microsoft Press
  Copyright Date:
  ISBN: 1-55615-814-9

  Protection and Security on the Information Superhighway
  Author: Dr. Frederick B. Cohen)
  Publisher: John Wiley & Sons
  Copyright Date: 1995
  ISBN: 0-471-11389-1

N Commonsense Computer Security
  Author: Martin Smith
  Publisher: McGraw-Hill
  Copyright Date: 1993
  ISBN: 0-07-707805-5

N Combatting Computer Crime
  Author: Jerry Papke
  Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
  Copyright Date: 1992
  ISBN: 0-8306-7664-3

N Computer Crime: a Crimefighters Handbook
  Author: David Icove, Karl Seger and William VonStorch
  Publisher: O'Reilly & Associates
  Copyright Date: 1995
  ISBN: 1-56592-086-4


Unix System Security
~~~~~~~~~~~~~~~~~~~~
  Practical Unix Security
  Author: Simson Garfinkel and Gene Spafford
  Publisher: O'Reilly & Associates, Inc.
  Copyright Date: 1991
  ISBN: 0-937175-72-2

  Firewalls and Internet Security
  Author: William Cheswick and Steven Bellovin
  Publisher: Addison Wesley
  Copyright Date: 1994
  ISBN: 0-201-63357-4

  Unix System Security
  Author: Rik Farrow
  Publisher: Addison Wesley
  Copyright Date: 1991
  ISBN: 0-201-57030-0

  Unix Security: A Practical Tutorial
  Author: N. Derek Arnold
  Publisher: McGraw Hill
  Copyright Date: 1993
  ISBN: 0-07-002560-6

  Unix System Security: A Guide for Users and Systems Administrators
  Author: David A. Curry
  Publisher: Addison-Wesley
  Copyright Date: 1992
  ISBN: 0-201-56327-4

  Unix System Security
  Author: Patrick H. Wood and Stephen G. Kochan
  Publisher: Hayden Books
  Copyright Date: 1985
  ISBN: 0-672-48494-3

  Unix Security for the Organization
  Author: Richard Bryant
  Publisher: Sams
  Copyright Date: 1994
  ISBN: 0-672-30571-2

N Building Internet Firewalls
  Author: D. Brent Chapman and Elizabeth D. Zwicky
  Publisher: O'Reilly and Associates, Inc.
  Copyright Date: 1995
  ISBN: 1-56592-124-0

N Unix System Security Essentials
  Author: Christopher Braun
  Publisher: Addison Wesley
  Copyright Date: 1995
  ISBN: 0-201-42775-3

N Internet Firewalls and Network Security
  Author: Karanjit S. Siyan and Chris Hare
  Publisher: New Riders Publishing
  Copyright Date: 1995
  ISBN: 1-56205-437-6


Network Security
~~~~~~~~~~~~~~~~
  Network Security Secrets
  Author: David J. Stang and Sylvia Moon
  Publisher: IDG Books
  Copyright Date: 1993
  ISBN: 1-56884-021-7

        Not a total waste of paper, but definitely not worth the
        $49.95 purchase price.  The book is a rehash of previously
        published information.  The only secret we learn from reading
        the book is that Sylvia Moon is a younger woman madly in love
        with the older David Stang.

  Complete Lan Security and Control
  Author: Peter Davis
  Publisher: Windcrest / McGraw Hill
  Copyright Date: 1994
  ISBN: 0-8306-4548-9 and 0-8306-4549-7

  Network Security
  Author: Steven Shaffer and Alan Simon
  Publisher: AP Professional
  Copyright Date: 1994
  ISBN: 0-12-638010-4

N Network Security: How to Plan For It and How to Achieve It
  Author: Richard M. Baker
  Publisher: McGraw-Hill, Inc.
  Copyright Date:
  ISBN: 0-07-005141-0

N Network Security
  Author: Steven L. Shaffer and Alan R. Simon
  Publisher: Academic Press
  Copyright Date: 1994
  ISBN: 0-12-638010-4

N Network Security: Private Communications in a Public World
  Author: Charlie Kaufman, Radia Perlman and Mike Speciner
  Publisher: Prentice Hall
  Copyright Date: 1995
  ISBN: 0-13-061466-1

N Network and Internetwork Security: Principles and Practice
  Author: William Stallings
  Publisher: Prentice Hall
  Copyright Date: 1995
  ISBN: 0-02-415483-0

N Implementing Internet Security
  Author: William Stallings
  Publisher: New Rider Publishing
  Copyright Date: 1995
  ISBN: 1-56205-471-6

N Actually Useful Internet Security Techniques
  Author: Larry J. Hughes, Jr.
  Publisher: New Riders Publishing
  Copyright Date: 1995
  ISBN: 1-56205-508-9


Cryptology
~~~~~~~~~~~~
  Applied Cryptography: Protocols, Algorithms, and Source Code in C
  Author: Bruce Schneier
  Publisher: John Wiley & Sons
  Copyright Date: 1994
  ISBN: 0-471-59756-2

        Bruce Schneier's book replaces all other texts on
        cryptography.  If you are interested in cryptography, this is
        a must read.  This may be the first and last book on
        cryptography you may ever need to buy.

  Cryptography and Data Security
  Author: Dorothy Denning
  Publisher: Addison-Wesley Publishing Co.
  Copyright Date: 1982
  ISBN: 0-201-10150-5

  Protect Your Privacy: A Guide for PGP Users
  Author: William Stallings
  Publisher: Prentice-Hall
  Copyright Date: 1994
  ISBN: 0-13-185596-4

  Codebreakers
  Author: Kahn
  Publisher: Simon and Schuster
  Copyright Date:
  ISBN:0-02-560460-0

  Codebreakers: The Inside Story of Bletchley Park
  Author: Francis Harry Hinsley and Alan Stripp
  Publisher: Oxford University Press,
  Copyright Date: 1993
  ISBN:0-19-285304-X

  Cryptanalysis, a study of ciphers and their solution
  Author: Gaines, Helen Fouche
  Publisher: Dover Publications
  Copyright Date: 1956
  ISBN:

N Computer Privacy Handbook
  Author: Andre' Bacard
  Publisher: Peachpit Press
  Copyright Date: 1995
  ISBN: 1-56609-171-3

N E-Mail Security with PGP and PEM
  Author: Bruce Schneier
  Publisher: John Wiley & Sons
  Copyright Date: 1995
  ISBN: 0-471-05318-X

N PGP: Pretty Good Privacy
  Author: Simson Garfinkel
  Publisher: O'Reilly & Associates, Inc.
  Copyright Date: 1995
  ISBN: 1-56592-098-8


Programmed Threats
~~~~~~~~~~~~~~~~~~
  The Little Black Book of Computer Viruses
  Author: Mark Ludwig
  Publisher: American Eagle Publications
  Copyright Date: 1990
  ISBN: 0-929408-02-0

N The Giant Black Book of Computer Viruses
  Author: Mark Ludwig
  Publisher: American Eagle Publications
  Copyright Date: 1995
  ISBN:

  Computer Viruses, Artificial Life and Evolution
  Author: Mark Ludwig
  Publisher: American Eagle Publications
  Copyright Date: 1993
  ISBN: 0-929408-07-1

  Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
        Threats to Your System
  Author: John McAfee and Colin Haynes
  Publisher: St. Martin's Press
  Copyright Date: 1989
  ISBN: 0-312-03064-9 and 0-312-02889-X

  The Virus Creation Labs: A Journey Into the Underground
  Author: George Smith
  Publisher: American Eagle Publications
  Copyright Date: 1994
  ISBN: 0-929408-09-8

U A Short Course on Computer Viruses
  Author: Dr. Fred Cohen
  Publisher: John Wiley & Sons
  Copyright Date: 1994
  ISBN: 0-471-00769-2

N Robert Slade's Guide to Computer Viruses
  Author: Robert Slade
  Publisher: Springer-Verlag
  Copyright Date: 1994
  ISBN: 0-387-94311-0 / 3-540-94311-0


Telephony
~~~~~~~~~
  Engineering and Operations in the Bell System
  Author: R.F. Rey
  Publisher: Bell Telephont Laboratories
  Copyright Date: 1983
  ISBN: 0-932764-04-5

        Although hopelessly out of date, this book remains *THE* book
        on telephony.  This book is 100% Bell, and is loved by phreaks
        the world over.

  Telephony: Today and Tomorrow
  Author: Dimitris N. Chorafas
  Publisher: Prentice-Hall
  Copyright Date: 1984
  ISBN: 0-13-902700-9

  The Telecommunications Fact Book and Illustrated Dictionary
  Author: Ahmed S. Khan
  Publisher: Delmar Publishers, Inc.
  Copyright Date: 1992
  ISBN: 0-8273-4615-8

        I find this dictionary to be an excellent reference book on
        telephony, and I recommend it to anyone with serious
        intentions in the field.

  Tandy/Radio Shack Cellular Hardware
  Author: Judas Gerard and Damien Thorn
  Publisher: Phoenix Rising Communications
  Copyright Date: 1994
  ISBN:

  The Phone Book
  Author: Carl Oppendahl
  Publisher: Consumer Reports
  Copyright Date:
  ISBN: 0-89043-364-x

        Listing of every cellular ID in the us, plus roaming ports,
        and info numbers for each carrier.

  Principles of Caller I.D.
  Author:
  Publisher: International MicroPower Corp.
  Copyright Date:
  ISBN:


Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
  The Hacker Crackdown: Law and Disorder on the Electronic Frontier
  Author: Bruce Sterling
  Publisher: Bantam Books
  Copyright Date: 1982
  ISBN: 0-553-56370-X

        Bruce Sterling has recently released the book FREE to the net.
        The book is much easier to read in print form, and the
        paperback is only $5.99.  Either way you read it, you will be
        glad you did.  Mr. Sterling is an excellent science fiction
        author and has brought his talent with words to bear on the
        hacking culture.  A very enjoyable reading experience.

  Cyberpunk
  Author: Katie Hafner and John Markoff
  Publisher: Simon and Schuster
  Copyright Date: 1991
  ISBN: 0-671-77879-X

  The Cuckoo's Egg
  Author: Cliff Stoll
  Publisher: Simon and Schuster
  Copyright Date: 1989
  ISBN: 0-671-72688-9

  Hackers: Heroes of the Computer Revolution
  Author: Steven Levy
  Publisher: Doubleday
  Copyright Date: 1984
  ISBN: 0-440-13495-6


Unclassified
~~~~~~~~~~~~
  The Hacker's Handbook
  Author: Hugo Cornwall
  Publisher: E. Arthur Brown Company
  Copyright Date:
  ISBN: 0-912579-06-4

  Secrets of a Super Hacker
  Author: The Knightmare
  Publisher: Loompanics
  Copyright Date: 1994
  ISBN: 1-55950-106-5

        The Knightmare is no super hacker.  There is little or no real
        information in this book.  The Knightmare gives useful advice
        like telling you not to dress up before going trashing.
        The Knightmare's best hack is fooling Loompanics into
        publishing this garbage.

  The Day The Phones Stopped
  Author: Leonard Lee
  Publisher: Primus / Donald I Fine, Inc.
  Copyright Date: 1992
  ISBN: 1-55611-286-6

        Total garbage.  Paranoid delusions of a lunatic.  Less factual
        data that an average issue of the Enquirer.

  Information Warfare
  Author: Winn Swartau
  Publisher: Thunder Mountain Press
  Copyright Date: 1994
  ISBN: 1-56025-080-1

  An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
  Author: Doug Richardson
  Publisher: Salamander Press
  Copyright Date:
  ISBN: 0-668-06497-8


10. What are some videos of interest to hackers?

  'Unauthorized Access' by Annaliza Savage
  $25 on VH S format in 38-min
  Savage Productions
  1803 Mission St., #406
  Santa Cruz, CA 95060

  Hacker's '95 - a Phon-E & R.F. Burns Production
  See the video Emmanuel Goldstein thought would have the Feds knocking
  at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y
  fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric
  BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the
  Secret Service briefing on Operation Cyber Snare (recent cell busts)
  Talks on Crypto, HERF, the Feds, etc.  All information is presented
  for educational purposes only.  Not for sale to government or law
  enforcement organizations.  Running time aproximately 90 minutes.
  $25.00   NTSC VHS
  $35.00   PAL/Secam VHS
  Custom Video Productions
  (908)842-6378
  videocvp@ix.netcom.com


11. What are some mailing lists of interest to hackers?

  Academic Firewalls
  Registration Address: Send a message to majordomo@greatcircle.com
                        containing the line "subscribe firewalls user@host"

N The Alert
  Registration Address: Send a message to request-alert@iss.net
                        containing the line "subscribe alert"

  Bugtraq
  Reflector Address:    bugtraq@fc.net
  Registration Address: bugtraq-request@fc.net

  Cert Tools
  Reflector Address:    cert-tools@cert.org
  Registration Address: cert-tools-request@cert.org

  Computers and Society
  Reflector Address:    Comp-Soc@limbo.intuitive.com
  Registration Address: taylor@limbo.intuitive.com

  Coordinated Feasibility Effort to Unravel State Data
  Reflector Address:    ldc-sw@cpsr.org
  Registration Address:

  CPSR Announcement List
  Reflector Address:    cpsr-announce@cpsr.org
  Registration Address:

  CPSR - Intellectual Property
  Reflector Address:    cpsr-int-prop@cpsr.org
  Registration Address:

  CPSR - Internet Library
  Reflector Address:    cpsr-library@cpsr.org
  Registration Address:

N Cypherpunks
  Registration Address: Send a message to majordomo@toad.com
                        containing the line "subscribe cypherpunks"

  DefCon Announcement List
  Registration Address: Send a message to majordomo@fc.net containing
                        the line "subscribe dc-announce"

  DefCon Chat List
  Registration Address: Send a message to majordomo@fc.net containing
                        the line "subscribe dc-stuff"

N Discount Long Distance Digest
  Registration Address: Send a message to: dld-request@webcom.com
                        containing the line "subscribe"

  Electronic Payment
  Registration Address: e-payment@cc.bellcore.com

  IDS (Intruder Detection Systems)
  Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
                        containing the line "subscribe ids"

N Information Warfare
  Registration Address: E-mail iw@all.net with a request to be added.

N Linux-Alert
  Registration Address: majordomo@linux.nrao.edu

N Linux-Security
  Registration Address: majordomo@linux.nrao.edu

  Macintosh Security
  Reflector Address:    mac-security@eclectic.com
  Registration Address: mac-security-request@eclectic.com

  NeXT Managers
  Registration Address: next-managers-request@stolaf.edu

  PGP3 announcement list
  Registration Address: pgp-announce-request@lsd.com
                        Subject: Your Name <user@host>
                        Body: *ignored*

  Phiber-Scream
  Registration Address: Send a message to listserv@netcom.com
                        containing the line "subscribe phiber-scream user@host"

  phruwt-l (Macintosh H/P)
  Registration Address: Send a message to filbert@netcom.com
                        with the subject "phruwt-l"

  rfc931-users
  Reflector Address:    rfc931-users@kramden.acf.nyu.edu
  Registration Address: brnstnd@nyu.edu

  RSA Users
  Reflector Address:    rsaref-users@rsa.com
  Registration Address: rsaref-users-request@rsa.com

  WWW Security
  Registration Address: www-security@ns2.rutgers.edu


12. What are some print magazines of interest to hackers?

2600 - The Hacker Quarterly
~~~~~~~~~~~~~~~~~~~~~~~~~~~
E-mail addresses: info@2600.com - to get info on 2600
                  index@2600.com - to get a copy of our index
                  meetings@2600.com - for info on starting your own meeting
                  subs@2600.com -- for subscription problems
                  letters@2600.com -- to send us a letter
                  articles@2600.com -- to send us an article
                  2600@2600.com -- to send us a general message

Subscription Address: 2600 Subscription Dept
                      PO Box 752
                      Middle Island, NY  11953-0752

Letters and article submission address: 2600 Editorial Dept
                                        PO Box 99
                                        Middle Island, NY  11953-0099

Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626

Subscriptions: United States: $21/yr individual, $50 corporate.
               Overseas: $30/yr individual, $65 corporate.


Gray Areas
~~~~~~~~~~
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/or controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com

U.S. Mail Address: Gray Areas
                   PO Box 808
                   Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
               $34.00 4 issues foreign (shipped air mail)


Privacy Newsletter
~~~~~~~~~~~~~~~~~~
Privacy Newsletter is a monthly newsletter devoted to showing
consumers how to get privacy and keep it.

E-Mail Address: privacy@interramp.com

Subscription Address: Privacy Newsletter
                      P.O. Box 8206
                      Philadelphia, PA 19101-8206


Subscriptions: $99/yr (US)  $149/yr (Overseas)


Wired
~~~~~
Subscription Address: subscriptions@wired.com
                  or: Wired
                      PO Box 191826
                      San Francisco, CA 94119-9866

Letters and article submission address: guidelines@wired.com
                                    or: Wired
                                        544 Second Street
                                        San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)


Nuts & Volts
~~~~~~~~~~~~
T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664


Cybertek: The Cyberpunk Technical Journal
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
P.O. Box 64
Brewster, NY 10509

Frequency: Bimonthly
Domestic Subscription Rate: $15/year (6 issues)


PrivateLine
~~~~~~~~~~~
5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

E-Mail: privateline@delphi.com

Subscriptions: $24 a year for six issues

Text of back issues are at the etext archive at Michigan.  Gopher over
or ftp to: etext.archive.umich.edu/pub/Zines/PrivateLine


13. What are some e-zines of interest to hackers?

CoTNo: Communications of The New Order    ftp.etext.org  /pub/Zines/CoTNo
Empire Times                              ftp.etext.org  /pub/Zines/Emptimes
FEH                                       ftp.fc.net     /pub/defcon/FEH
The Infinity Concept                      infonexus.com
                                          /pub/Philes/Zines/TheInfinityConcept
Phrack                                    ftp.fc.net     /pub/phrack


14. What are some organizations of interest to hackers?

Computer Professionals for Social Responsibility (CPSR)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CPSR empowers computer professionals and computer users to advocate for
the responsible use of information technology and empowers all who use
computer technology to participate in the public debate.   As technical
experts, CPSR members provide the public and policy makers with
realistic assessments of the power, promise, and limitations of computer
technology.  As an organization of concerned citizens, CPSR directs
public attention to critical choices concerning the applications of
computing and how those choices affect society.

By matching unimpeachable technical information with policy development
savvy, CPSR uses minimum dollars to have maximum impact and encourages
broad public participation in the shaping of technology policy.

Every project we undertake is based on five principles:

*  We foster and support public discussion of and public responsibility
   for decisions involving the use of computers in systems critical to
   society.

*  We work to dispel popular myths about the infallibility of
   technological systems.

*  We challenge the assumption that technology alone can solve political
   and social problems.

*  We critically examine social and technical issues within the computer
   profession, nationally and internationally.

*  We encourage the use of computer technology to improve the quality of
   life.

CPSR Membership Categories
  75  REGULAR MEMBER
  50  Basic member
 200  Supporting member
 500  Sponsoring member
1000  Lifetime member
  20  Student/low income member
  50  Foreign subscriber
  50  Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA  94301
415-322-3778
415-322-3798 (FAX)
E-mail: cpsr@csli.stanford.edu


Electronic Frontier Foundation (EFF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
of policies and activities that will advance freedom and openness in
computer-based communications. It is a member-supported, nonprofit
group that grew from the conviction that a new public interest
organization was needed in the information age; that this organization
would enhance and protect the democratic potential of new computer
communications technology. From the beginning, the EFF determined to
become an organization that would combine technical, legal, and public
policy expertise, and would apply these skills to the myriad issues
and concerns that arise whenever a new communications medium is born.

Memberships are $20.00 per year for students, $40.00 per year for
regular members, and $100.00 per year for organizations.

The Electronic Frontier Foundation, Inc.
1001 G Street, NW
Suite 950 East
Washington, D.C. 20001
(202)544 9237
(202)547 5481 FAX
Internet: eff@eff.org


Free Software Foundation (FSF) and GNU
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The Free Software Foundation is dedicated to eliminating restrictions
on people's right to use, copy, modify, and redistribute computer
programs. We promote the development and use of free software in all
areas using computers.  Specifically, we are putting together a
complete, integrated software system named "GNU" ("GNU's Not Unix",
pronounced "guh-new") that will be upwardly compatible with Unix.
Most parts of this system are already being used and distributed.

The word "free" in our name refers to freedom, not price.  You may or
may not pay money to get GNU software, but regardless you have two
specific freedoms once you get it: first, the freedom to copy a
program and give it away to your friends and co-workers; and second,
the freedom to change a program as you wish, by having full access to
source code. You can study the source and learn how such programs are
written.  You may then be able to port it, improve it, and share your
changes with others.  If you redistribute GNU software you may charge
a distribution fee or give it away, so long as you include the source
code and the GPL (GNU General Public License).

Free Software Foundation, Inc.        Telephone: +1-617-876-3296
673 Massachusetts Avenue              Fax: +1-617-492-9057
Cambridge, MA 02139-3309 USA          Fax (in Japan): 0031-13-2473 (KDD)
Electronic mail: gnu@prep.ai.mit.edu                  0066-3382-0158 (IDC)

GNU is to be a complete integrated computational environment:
everything you need to work with a computer, either as a programmer or
as a person in an office or home.  The core is an operating system,
which consists of a central program called a kernel that runs the
other programs on the computer, and a large number of ancillary
programs for handling files, etc.  The Free Software Foundation is
developing an advanced kernel called the Hurd.

A complete system has tools for programmers, such as compilers and
debuggers.  It also has editors, sketchpads, calendars, calculators,
spreadsheets, databases, electronic mail readers, and Internet
navigators.  The FSF already distributes most of the programs used in
an operating system, all the tools regularly used by programmers, and
much more.


The League for Programming Freedom (LPF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The League for Programming Freedom is an organization of people who
oppose the attempt to monopolize common user interfaces through "look
and feel" copyright lawsuits.  Some of us are programmers, who worry
that such monopolies will obstruct our work.  Some of us are users,
who want new computer systems to be compatible with the interfaces we
know.  Some are founders of hardware or software companies, such as
Richard P. Gabriel. Some of us are professors or researchers,
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
Boyer and Patrick Winston.

"Look and feel" lawsuits aim to create a new class of government-
enforced monopolies broader in scope than ever before.  Such a system
of user-interface copyright would impose gratuitous incompatibility,
reduce competition, and stifle innovation.

We in the League hope to prevent these problems by preventing
user-interface copyright.  The League is NOT opposed to copyright law
as it was understood until 1986 -- copyright on particular programs.
Our aim is to stop changes in the copyright system which would take
away programmers' traditional freedom to write new programs compatible
with existing programs and practices.

Annual dues for individual members are $42 for employed professionals,
$10.50 for students, and $21 for others.  We appreciate activists, but
members who cannot contribute their time are also welcome.

To contact the League, phone (617) 243-4091, send Internet mail to the
address league@prep.ai.mit.edu, or write to:

League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA


SotMesc
~~~~~~~
Founded in 1989, SotMesc is dedicated to preserving the integrity and
cohesion of the computing society.  By promoting computer education,
liberties and efficiency, we believe we can secure freedoms for all
computer users while retaining privacy.

SotMesc maintains the CSP Internet mailing list, the SotMesc
Scholarship Fund, and the SotMesc Newsletter.

The SotMESC is financed partly by membership fees, and donations, but
mostly by selling hacking, cracking, phreaking, electronics, internet,
and virus information and programs on disk and bound paper media.

SotMesc memberships are $20 to students and $40 to regular members.

SotMESC
P.O. Box 573
Long Beach, MS  39560


Computer Emergency Response Team (CERT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CERT is the Computer Emergency Response Team that was formed by the
Defense Advanced Research Projects Agency (DARPA) in November 1988 in
response to the needs exhibited during the Internet worm incident.
The CERT charter is to work with the Internet community to facilitate
its response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of computer
security issues, and to conduct research targeted at improving the
security of existing systems.

CERT products and services include 24-hour technical assistance for
responding to computer security incidents, product vulnerability
assistance, technical documents, and seminars.  In addition, the team
maintains a number of mailing lists (including one for CERT
advisories) and provides an anonymous FTP server:  cert.org
(192.88.209.5), where security-related documents, past CERT
advisories, and tools are archived.

CERT contact information:

U.S. mail address
  CERT Coordination Center
  Software Engineering Institute
  Carnegie Mellon University
  Pittsburgh, PA 15213-3890
  U.S.A.

Internet E-mail address
  cert@cert.org

Telephone number
  (412)268-7090 (24-hour hotline)
  CERT Coordination Center personnel answer
  7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
  emergencies during other hours.

FAX number
  (412)268-6989


15. What are some radio programs of interest to hackers?


Off The Hook          New York      99.5 FM                       Tue  8pm EST
Full Disclosure Live  Short Wave    WWCR 5065 khz                 Sun  8pm EST
Full Disclosure Live  Oil City, PA  WOYL AM-1340                  Sun  8pm EST
Full Disclosure Live  Satellite     Telstar 302 (T2), Ch 21, 5.8  Sun  8pm EST


16. What are other FAQ's of interest to hackers?

Frequently Asked Questions "Hacking Novell Netware"
Author: Simple Nomad <sn@spyder.org>
ftp: jumper.mcc.ac.uk    /pub/security/netware/faq.zip
ftp: ftp.fastlane.net    /pub/nomad/nw/faq.zip
ftp: ftp.best.com        /pub/almcepud/hacks/faq.zip
http://resudox.net/bio/mainpage.html
http://www.hookup.net/~apayne/nwhack.html

The PGP Attack FAQ
Author: Route [daemon9@netcom.com / route@infonexus.com]
ftp: infonexus.com /pub/Philes/Cryptography/PGPattackFAQ.txt.gz

Mac Hack FAQ: Defeating Security
Author: AX1P (an149689@anon.penet.fi)

Frequently Asked Questions About Red Boxing
Author: Mr. Sandman (an132432@anon.penet.fi)

VMS FAQ (Frequently Ask Questions)
Author: The Beaver (beaver@upperdck.blkbox.com)

Anonymous FTP FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/anonftp

Compromise FAQ: What if your Machines are Compromised by an Intruder
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/compromise

Security Patches FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/patch

Sniffer FAQ
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/sniff

Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches
Author: Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/vendor

Cryptography FAQ
Author: The Crypt Cabal
ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

Firewalls FAQ
Author: Marcus J. Ranum (mjr@ss1.lightspeed.net)
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/

Buying a Used Scanner Radio
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

How to Find Scanner Frequencies
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

Introduction to Scanning
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

Low Power Broadcasting FAQ
Author: Rick Harrison.
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/

RSA Cryptography Today FAQ
Author: Paul Fahn
ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

VIRUS-L comp.virus Frequently Asked Questions (FAQ)
Author: Kenneth R. van Wyk <krvw@cert.org>
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.virus/

Where to get the latest PGP (Pretty Good Privacy) FAQ
Author: mpj@csn.net (Michael Johnson)
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/

alt.locksmithing answers to Frequently Asked Questions (FAQ)
Author: spike@indra.com (Joe Ilacqua)
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/

comp.os.netware.security FAQ
Author: Fauzan Mirza <F.U.Mirza@sheffield.ac.uk>
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/

rec.pyrotechnics FAQ
Author: zoz@cs.adelaide.edu.au (Hans Josef Wagemueller)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/


17. Where can I purchase a magnetic stripe encoder/decoder?

CPU Advance
PO Box 2434
Harwood Station
Littleton, MA  01460
(508)624-4819 (Fax)

Omron Electronics, Inc.
One East Commerce Drive
Schaumburg, IL  60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)

Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)

Timeline Inc,
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)

Alltronics
2300 Zanker Road
San Jose CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067

Atalla Corp
San Jose, CA
(408) 435-8850


18. What are the rainbow books and how can I get them?

Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria

Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline

Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments

Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements.  Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.

Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems

Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation - A Guide for Vendors

Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems

Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms

Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria

Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems

Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems

Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems

Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria

Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems

Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation

Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document

Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems

Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management

Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals

Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems

Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems

Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire

Gray Book
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System

Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria

Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems

Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems

Purple Book
NCSC-TG-024  (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements

Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators

Purple Book
NCSC-TG-024  (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial

+Purple Book
+NCSC-TG-024  (Volume 4/4)
+A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
+Proposal Document - An Aid to Procurement Initiators and Contractors

Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems

Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems

Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems

Violet Book
NCSC-TG-028
Assessing Controlled Access Protection

Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation

Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems

C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment

*C Technical Report 79-91
*Integrity in Automated Information Systems

*C Technical Report 39-92
*The Design and Evaluation of INFOSEC systems: The Computer Security
*Contributions to the Composition Discussion

NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline

--

You can get your own free copy of any or all of the books by writing
or calling:

       INFOSEC Awareness Division
       ATTN: X711/IAOC
       Fort George G. Meade, MD  20755-6000

       Barbara Keller
       (410) 766-8729

If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).

[* == I have not personally seen this book]
[+ == I have not personally seen this book, and I believe it may not]
[     be available]


--




--
※ 来源:.深大荔园晨风站 bbs.szu.edu.cn.[FROM: 202.192.140.143]


[回到开始] [上一篇][下一篇]

荔园在线首页 友情链接:深圳大学 深大招生 荔园晨风BBS S-Term软件 网络书店