de.org.ccc Mitteilungen des CCC e.V.
misc.security Security in general, not just computers (Moderated)
rec.pyrotechnics Fireworks, rocketry, safety, & other topics
rec.radio.scanner [no description available]
rec.video.cable-tv Technical and regulatory issues of cable television
sci.crypt Different methods of data en/decryption


    04. What are some telnet sites of interest to hackers?



anarchy-online.com
ntiabbs.ntia.doc.gov (NTIA)
l0pht.com (The L0pht)
sfpg.gcomm.com (The Floating Pancreas)
telnet lust.isca.uiowa.edu 2600 (underground bbs) (temporarily down)
pcspm2.dar.csiro.au (Virtual Doughnutland BBS)
prince.carleton.ca 31337 (Twilight of The Idols)
N spy.org (Computer Systems Consulting)

    05. What are some gopher sites of interest to hackers?



ba.com (Bell Atlantic)
N cell-relay.indiana.edu (Cell Relay Retreat)
csrc.ncsl.nist.gov (NIST Security Gopher)
gopher.acm.org (SIGSAC (Security, Audit & Control))
gopher.cpsr.org (Computer Professionals for Social Responsibility)
gopher.eff.org (Electonic Frontier Foundation)
N gopher.panix.com (Panix)
gw.PacBell.com (Pacific Bell)
iitf.doc.gov (NITA -- IITF)
N info.itu.ch (International Telegraph Union)
ncjrs.aspensys.com (National Criminal Justice Reference Service)
oss.net (Open Source Solutions)
spy.org (Computer Systems Consulting)
wiretap.spies.com (Wiretap)


    06. What are some World wide Web (WWW) sites of interest to hackers?



N 134.220.198.66:8000 (Peter Strangman's)
U alcuin.plymouth.edu/~jay/underground.html (Underground Links)
U all.net (American Society for Industrial Security Management)
alumni.caltech.edu/~dank/isdn/ (ISDN)
N asearch.mccmedia.com/www-security.html (WWW-security info)
aset.rsoc.rockwell.com (NASA/MOD AIS Security)
aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec)
att.net/dir800 (800 directory)
ausg.dartmouth.edu/security.html (UNIX Security Topics)
N bianca.com/bump/ua (Unauthorized Access Home Page)
N ccnga.uwaterloo.ca/~jscouria/gsm.html (GSM Specification)
N cell-relay.indiana.edu/cell-relay (Cell Relay Retreat)
N ciac.llnl.gov (CIAC Web Site)
N community.net/community/all/home/solano/sbaldwin
N cs.purdue.edu/homes/spaf/coast.html (The COAST Project and Laboratory)
N csbh.mhv.net/dcypher/home.html (Dcypher's Home Page)
N csrc.ncsl.nist.gov (NIST)
N cwix.com/cwplc (Cable and Wireless)
daemon.apana.org.au/~longi/
N dcpu1.cs.york.ac.uk:6666/fisher/telecom (Embryonic Telephone History Page)
N dfw.net/~aleph1 (The Uebercracker's Security Web)
N draco.centerline.com:8080/~franl/crypto.html (Crypto)
N draco.centerline.com:8080/~franl/privacy/bacard-review.html
N enigma.pc.cc.cmu.edu/~caffeine/home.html (Caffeine's Home Page)
N everest.cs.ucdavis.edu/Security.html (UCDavis.edu Security Page)
N everest.cs.ucdavis.edu/slides/slides.html (Security Lab Slides)
ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR)
N fastlane.net/homepages/thegnome (Simple Nomad)
N first.org (FIRST)
N freeside.com/phrack.html (Phrack Magazine)
N frosted.mhv.net/keytrap.html
N ftp.arpa.mil (ARPA home page)
ftp.tamu.edu/~abr8030/security.html (Security)
N grove.ufl.edu/~bytor (Bytor home page)
N hightop.nrl.navy.mil/potpourri.html (MOD Security)
N hightop.nrl.navy.mil/rainbow.html (MOD Rainbow Books)
ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS)
info.bellcore.com/BETSI/betsi.html (Betsi)
N info.gte.com (GTE Labrotories)
N info.mcc.ac.uk/Orange (Orange)
infosec.nosc.mil/infosec.html (SPAWAR INFOSEC)
N infosec.nosc.mil/navcirt.html (NAVCIRT)
N iss.net/iss (Internet Security Systems)
N jumper.mcc.ac.uk/~afs/telecom (UK Telecom Pricing Information)
l0pht.com (The l0pht)
l0pht.com/~oblivion/IIRG.html (Phantasy Magazine)
N l0pht.com/~spacerog/index.html (Whacked Mac Archives)
N lcs.mit.edu/telecom-archives/areacodes/guide (North American Area Codes)
N lcs.mit.edu/telecom-archives/npa.800 (1-800 Info)
N lcs.mit.edu/telecom-archives/npa.900 (1-900 Info)
N lod.com (Legion of Doom)
N lod.com/~gatsby (Gatsby)
N lod.com/~tabas (Mark Tabas -- LOD)
N lod.com/~vampire/emptime7 (Empire Times)
N magicnet.net/xtabi/netscape/links/cypher.html (Cryptology)
N mars.superlink.net/user/esquire (Red box info)
matrix.resnet.upenn.edu/rourke (FakeMail FAQ)
mindlink.jolt.com (The Secrets of LockPicking)
N mindlink.net/A7657 (Stephen H Kawamoto's Home Page)
mls.saic.com (SAIC MLS)
N mnementh.cs.adfa.oz.au/Lawrie_Brown.html (Lawrie Brown's crypto bibliography)
motserv.indirect.com (Motorola)
U naic.nasa.gov/fbi (FBI information)
U nasirc.nasa.gov/NASIRC_home.html (NASIRC)
obscura.com/~loki/ (Cryptology)
ophie.hughes.american.edu/~ophie (Ophie)
oregano.sl.pitt.edu/index.htm
N outpost.callnet.com/outpost.html
pages.ripco.com:8080/~glr/glr.html (Full Disclosure)
U peg.pegasus.oz.au (EFF Australia)
N quetel.qc.ca/qt0000ag.htm (Quebec-Telephone)
N resudox.net/bio/mainpage.html (BioHazard's Home Page)
N ripco.com:8080/~glr/glr.html (Full Disclosure)
N rschp2.anu.edu.au:8080/crypt.html
N scitsc.wlv.ac.uk/~cs6171/hack (UNIX Security)
U seclab.cs.ucdavis.edu/Security.html (Security)
U seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides)
N sfpg.gcomm.com/mitnick/mitnick.htm (3wP Kevin Mitnick WWW HomePage)
N smurfland.cit.buffalo.edu/NetMan/index.html (Network Management)
N sunsite.unc.edu/sun/inform/sun-info.html (Sun Microsystems Sponsor Page)
N support.mayfield.hp.com (Hewlett Packard SupportLine Services)
N tamsun.tamu.edu/~clm3840/hacking.html (Hacking/Phreaking)
the-tech.mit.edu (LaMacchia case info)
N town.hall.org/university/security/stoll/cliff.html (Cliff Stoll)
turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995)
ucs.orst.edu:8001/mintro.html (Micro Power Broadcasting)
underground.org (Eubercrackers)
unixg.ubc.ca:780/~jyee/ (Cell)
w3.gti.net/safety
N web.mit.edu/network/pgp.html (Getting PGP)
N web.nec.com/products/necam/mrd/cellphones/index.html(NEC)
U weber.u.washington.edu/~phantom/cpunk/index.html (Cryptology)
N wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's Underground Links)
wintermute.itd.nrl.navy.mil/5544.html (Network Security)
N www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html
N www-ns.rutgers.edu/www-security/index.html (Rutger's documents on WWW security)
U www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Box info)
U www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html(This document)
N www-swiss.ai.mit.edu/~bal/pks-toplev.html (Findingsomeone's PGP key)
www.2600.com (2600 Magazine)
N www.8lgm.org (8lgm Security Advisories)
www.aads.net (Ameritech)
N www.access.gpo.gov/su_docs/
N www.aloha.com/~seanw/index.html
www.alw.nih.gov/WWW/security.html (Unix Security)
N www.artcom.de/CCC/hotlist.html (Chaos Computer Club Hotlist)
N www.artech-house.com/artech.html (Artech House)
N www.asg.unb.ca (Atlantic Systems Group Mosaic Index)
www.aspentec.com/~frzmtdb/fun/hacker.html
N www.aston.ac.uk/~bromejt/mobile.html (Mobile Phone Service Locator)
N www.att.com (ATT)
N www.auditel.com (Auditel)
N www.auscert.org.au (Australian CERT)
N www.axent.com/axent (Axent Technologies)
www.ba.com (Bell Atlantic)
N www.bctel.com (BC Tel)
www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win)
N www.bell.ca (Bell Canada)
www.bell.com (MFJ Task Force)
www.bellcore.com/SECURITY/security.html (Bellcore Security Products)
N www.border.com (Border Network Technologies)
www.brad.ac.uk/~nasmith/index.html
N www.brad.ac.uk/~nasmith/underground.html (Undergound WWW Sites)
www.bst.bls.com (BellSouth)
N www.bt.co.uk (British Telecom)
N www.business.co.uk/cellnet (Cellnet)
N www.c2.org:80/remail/by-www.html (WWW-based remailing form)
www.c3.lanl.gov/~mcn (Lanl)
www.cam.org/~gagnon (OCP's)
U www.careermosaic.com/cm/uswest (USWest)
N www.castle.net/~kobrien/telecom.html (Telecom)
N www.cco.caltech.edu/~rknop/amiga_pgp26.html
N www.cdt.org/cda.html
N www.cec.wustl.edu/~dmm2/egs/egs.html (En Garde Systems)
www.cert.dfn.de/ (German First Team)
N www.checkpoint.com (Checkpoint)
N www.chem.surrey.ac.uk/~ch11mh/secure.html (Another page on secure WWW server setup)
N www.cis.ksu.edu/~psiber/fortress/phreak/ph2reak.html (Are You Some Kind Of PHREAK!)
www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
N www.cityscape.co.uk/users/ek80/index.html (Inside Cable Cover)
N www.cohesive.com (Cohesive Systems)
www.commerce.net/information/standards/drafts/shttp.txt (HyperText)
www.con.wesleyan.edu/~triemer/network/docservs.html
www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html
N www.cosc.georgetown.edu/~denning/crypto (The Cryptography Project)
N www.cost.se (COST Computer Security Technologies)
www.cpsr.org/home (CPSR)
N www.crimson.com/isdn/telecomacry.txt (Crimson's Telecommunications Acronyms)
N www.crtc.gc.ca (CRTC - Canadian regulator)
N www.cs.berkeley.edu/~raph/remailer-list.html (Anon remailer list)
U www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (CMU Security)
U www.cs.purdue.edu/coast/coast.html (Coast)
N www.cs.purdue.edu/pcert/pcert.html (PCERT)
N www.cs.tu-bs.de (Network management Tools)
www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk)
www.cs.umd.edu/~lgas (Laughing Gas)
N www.cs.umd.edu/~lgas/haquerwerld/haquer-individuals.html(Haquerwerld)
www.csd.harris.com/secure_info.html (Harris)
www.csl.sri.com (SRI Computer Science Lab)
U www.csua.berekeley.edu/pub/cypherpunks/Home.html (Cryptology)
N www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html
N www.cyber.co.uk/~joyrex (Joyrex Cellular)
www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
N www.cygnus.com/~gnu/export.html (Cryptography Export Control Archives)
U www.datafellows.fi (Data Fellows (F-Prot)
N www.datasync.com/~sotmesc/sotmesc.html (SotMESC)
N www.dcs.exeter.ac.uk/~aba (Cypherpunk)
www.dct.ac.uk/~misb3cp/2600/faq.txt
N www.demon.co.uk/mobiles (C.C.Mobiles)
N www.dhp.com (DataHaven Project)
N www.dhp.com/~pluvius (Pluvius' Home Page)
U www.digicash.com/ecash/ecash-home.html (Ecash Home Page)
www.digital.com/info/key-secure-index.html (Digital Secure Systems)
www.dnai.com/~gui/index.html
N www.dtic.dla.mil/defenselink (Office of the U.S. Secretary of Defense (OSD)
N www.dtic.dla.mil/iac (DoD Information Analysis Center (IAC) Hub Page)
N www.eecs.nwu.edu/~jmyers/bugtraq/about.html
N www.eecs.nwu.edu/~jmyers/bugtraq/archives.html
www.eecs.nwu.edu/~jmyers/bugtraq/index.html (Bugtraq)
www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems)
N www.eff.org
N www.eff.org/pub/Alerts
N www.eff.org/pub/Net_info/Tools/Crypto/
www.emap.co.uk/partners/racal-airtech (Racal-Airtech)
www.ensta.fr/internet/unix/sys_admin (System administration)
N www.epic.org
N www.ericsson.nl (Ericsson)
www.etext.org/Zines/ (Zines)
N www.farmstead.com (Farmstead)
U www.fbi.gov/fbi/FBI_homepage.html (FBI Homepage)
www.fc.net/defcon (DefCon)
www.fedworld.gov (Federal Government)
www.first.org/first/ (FIRST)
N www.fonorola.net (Fonorola (a Canadian carrier)
N www.frus.com (Firewalls R Us)
www.gbnet.net/kbridge (KarlBridge)
www.getnet.com/crak (CRAK Software)
N www.getnet.com/~vision
N www.gold.net/users/cw78 (FleXtel)
www.greatcircle.com (Great Circle Associates)
N www.gsu.edu/~socrerx/catalog.html
N www.gta.com/index.html (Global Technology Associates)
N www.gti.net/grayarea (Gray Areas)
U www.hotwired.com (Wired Magazine)
www.hpcc.gov/blue94/section.4.6.html (NSA)
N www.hq2.telecom.ie (Telecom Eireann)
N www.iacr.org/~iacr (International Association of Cryptologic Research (IACR)
N www.ibmpcug.co.uk/~Vidtron (Videotron)
N www.ic.gov (Central Intelligence Agency Home Page)
N www.ifi.uio.no/~staalesc/PGP/home.html
N www.iia.org/~gautier/me.html (Rich Gautier's Home Page)
N www.indirect.com/www/evildawg
www.indirect.com/www/johnk/ (CRAK Software)
N www.ingress.com (Ingress Communications)
N www.interaccess.com/trc/tsa.html
N www.io.org/~djcl/phoneb.html
N www.iquest.net/~oseidler (Oliver Seidler's WWW Page)
N www.itd.nrl.navy.mil/ITD/5540 (NRL Center for High Assurance Computer Systems)
N www.itu.ch/TELECOM (Telecom '95)
N www.jagunet.com/~john/
N www.jedefense.com/jed.html (Journal of Electronic Defense)
N www.l0pht.com/cdc.html (Cult of the Dead Cow)
N www.l0pht.com/radiophone (Radiophone Archive)
N www.l0pht.com/~oblivion/IIRG.html (International Information Retrieval Guild Archive Site)
N www.lat.com (Los Altos Technologies)
www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
N www.lib.iup.edu/~seaman/hack/bone.html (Bone's H/P/C page o' rama)
N www.links.net
N www.louisville.edu/~wrbake01 (The GodZ of CyberSpacE)
www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook)
www.magi.com/~vektor/linenoiz.html
N www.mastercard.com (Secure Electronic Payment Protocol)
www.mcs.com/~candyman/http/radio.html (Radar)
www.mcs.com/~candyman/under.html (Cell)
N www.mcs.net/~candyman (H/P)
www.mgmua.com/hackers/index.html (Hackers, the movie)
N www.milkyway.com (Milkyway Networks Corporation)
N www.mit.edu:8001/people/warlord/pgp-faq.html (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements)
N www.monmouth.com/~jshahom (The Insomniac's Home Page)
N www.mot.com (Motorola)
www.mpr.ca/ (MPR Teltech Ltd)
N www.msen.com/~emv/tubed/spoofing.html (Info on IP spoofing attacks)
N www.mwjournal.com/mwj.html (Microwave Journal)
N www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html(Security in Mosaic)
N www.ncsl.nist.gov (NIST Computer Systems Laboratory)
www.net23.com (Max Headroom)
N www.netpart.com (NetPartners)
www.netresponse.com:80/zldf/
N www.nic.surfnet.nl/surfnet/security/cert-nl.html(CERT-NL)
www.nist.gov (NIST)
N www.nokia.com (Nokia)
N www.nortel.com (Northern Telecom)
www.ntt.jp (Nippon Telephone)
N www.nynex.co.uk/nynex (NYNEX)
U www.odci.gov (The CIA)
N www.one2one.co.uk (Mercury One-2-One)
N www.open.gov.uk/oftel/oftelwww/oftelhm.htm (OFTEL's Home Page)
www.openmarket.com/info/cryptography/applied_cryptography.html
www.pacbell.com (Pacific Bell)
N www.panix.com/vtw
www.paranoia.com/astrostar/fringe.html
N www.paranoia.com/hpa (Paranoia's H/P/A Links)
www.paranoia.com/mthreat (ToneLoc)
N www.paranoia.com/~coldfire (Cold Fire's Web Page)
N www.paranoia.com/~darkfox (Darkfox's Home Page)
N www.paranoia.com/~ice9 (Ice-9's Home Page)
www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP)
N www.phantom.com/~darkcyde (DarkCyde)
N www.phantom.com/~king (Randy King's WWW Page)
N www.phillips.com (Phillips Electronics)
N www.phred.org (The Phred Networking Organization)
N www.pic.net/uniloc/starlink (Starlink)
www.planet.net/onkeld (BlueBeep Home Page)
www.primenet.com/~kludge/haqr.html (Kludge)
www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography)
www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA)
N www.ramp.com/~lcs/winpgp.html (PGP with MS/Win)
N www.raptor.com (Raptor)
www.raptor.com/raptor/raptor.html (Raptor Network Isolator)
www.research.att.com (AT&T)
N www.rocksoft.com/~ross (Rocksoft Pty (Veracity)
N www.rogers.com (Rogers Communications)
www.rsa.com (RSA Data Security)
N www.sasknet.sk.ca/Pages/sktlhome.html (SaskTel)
www.satelnet.org/~ccappuc
N www.sccsi.com/lsli/lsli.homepage.html (PORTUS)
N www.sctc.com (Secure Computing Corporation)
www.seas.upenn.edu/~rourkem (FakeMail FAQ)
N www.seduction.com
N www.sei.cmu.edu/SEI/programs/cert.html (CERT Coordination Center)
N www.service.com/cm/uswest/usw1.html (USWest)
N www.shore.net/~eskwired/hp.html
N www.soci.niu.edu/~cudigest
N www.somar.com (Somar Software)
N www.soscorp.com (Sources of Supply Corp)
www.spatz.com/pecos/index.html (The World of Hacking)
www.spy.org (Computer Systems Consulting)
N www.spy.org (spy.org)
www.sri.com (SRI)
N www.stentor.ca (Stentor (Canadian telcos)
N www.tecc.co.uk/public/uk-telecom/btns.html (BT "star services")
N www.telecoms-mag.com/tcs.html (Telecommunications Magazine)
N www.telkom.co.za (Telkom S.A. Ltd)
www.telstra.com.au/info/security.html (Security Reference Index)
N www.teresa.com
www.tezcat.com/web/security/security_top_level.html
N www.tiac.net/users/triad/philes/jokai.html (Jokai Reservation for the Preservation of the 1st Amendment)
N www.ticllc.net/~scrtnizr
www.tis.com (Trusted Information Systems)
N www.trcone.com/t_crookb.html (CrookBook)
N www.tregistry.com/ttr (Telecomunications Training Courses)
www.tri.sbc.com (Southwestern Bell)
www.tricon.net/Comm/synapse (Synapse Magazine)
www.tufts.edu/~jpagano/
N www.uccs.edu/~abusby/hpawebsites.html
N www.uccs.edu/~abusby/k0p.html (kn0wledge phreak)
www.uci.agh.edu.pl/pub/security (Security)
N www.uknet.net/pnc (The Personal Number Company)
www.umcc.umich.edu/~doug/virus-faq.html (Virus)
N www.underground.org (underground.org)
N www.underground.org/bugs/
www.usfca.edu/crackdown/crack.html (Hacker Crackdown)
N www.vodafone.co.uk (Vodafone)
N www.vptt.ch/natel.html (Natel)
U www.wam.umd.edu/~ankh/public/devil_does_unix
N www.warwick.ac.uk/WWW/search/Phones/nng.html (National Number Group Codes)
N www.well.com/user/abacard
N www.well.com/user/crunch (Captain Crunch)
N www.wfu.edu/~wilsonbd
www.wiltel.com (Wiltel)
N www.wiltel.com/glossary/glossary.html (Telecommunications Glossary)
N www.wired.com (HotWired)
N www2.undernet.org:8080/~cs93jtl/IRC.html (IRC)

In addition to browsing these fine pages, you can often find what you
are looking for by using one of these automated search engines:

www.yahoo.com
www.lycos.com
www.webcrawler.com


    07. What are some IRC channels of interest to hackers?



#2600
#cellular
#hack
#phreak
#linux
#realhack
#root
#unix
#warez


    08. What are some BBS's of interest to hackers?



Rune Stone (203)832-8441 NUP: Cyberdeck
The Truth Sayer's Domain (210)493-9975
Hacker's Haven (303)343-4053
Independent Nation (413)573-1809
Ut0PiA (315)656-5135
underworld_1994.com (514)683-1894
Alliance Communications (612)251-8596
Maas-Neotek (617)855-2923
Apocalypse 2000 (708)676-9855
K0dE Ab0dE (713)579-2276
fARM R0Ad 666 (713)855-0261
kn0wledge Phreak <k0p> BBS (719)578-8288 NUP=NO NUP
N The Edge of Reality (805)496-7460
Static Line (806)747-0802
Area 51 (908)526-4384
N The Drunk Forces +972-3-5733477


    09. What are some books of interest to hackers?



General Computer Security
~~~~~~~~~~~~~~~~~~~~~~~~~
Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4

This is an excellent book. It gives a broad overview of
computer security without sacrificing detail. A must read for
the beginning security expert.

Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0

Computer Related Risks
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X

Computer Security Management
Author: Karen Forcht
Publisher: boyd & fraser publishing company
Copyright Date: 1994
ISBN: 0-87835-881-1

The Stephen Cobb Complete Book of PC and LAN Security
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

Security in Computing
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1.

Building a Secure Computer System
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2

Modern Methods for Computer Security
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN:

Windows NT 3.5 Guidelines for Security, Audit and Control
Author:
Publisher: Microsoft Press
Copyright Date:
ISBN: 1-55615-814-9

Protection and Security on the Information Superhighway
Author: Dr. Frederick B. Cohen)
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-11389-1

N Commonsense Computer Security
Author: Martin Smith
Publisher: McGraw-Hill
Copyright Date: 1993
ISBN: 0-07-707805-5

N Combatting Computer Crime
Author: Jerry Papke
Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
Copyright Date: 1992
ISBN: 0-8306-7664-3

N Computer Crime: a Crimefighters Handbook
Author: David Icove, Karl Seger and William VonStorch
Publisher: O'Reilly & Associates
Copyright Date: 1995
ISBN: 1-56592-086-4


Unix System Security
~~~~~~~~~~~~~~~~~~~~
Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2

Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4

Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0

Unix Security: A Practical Tutorial
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6

Unix System Security: A Guide for Users and Systems Administrators
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4

Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3

Unix Security for the Organization
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2

N Building Internet Firewalls
Author: D. Brent Chapman and Elizabeth D. Zwicky
Publisher: O'Reilly and Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-124-0

N Unix System Security Essentials
Author: Christopher Braun
Publisher: Addison Wesley
Copyright Date: 1995
ISBN: 0-201-42775-3

N Internet Firewalls and Network Security
Author: Karanjit S. Siyan and Chris Hare
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-437-6


Network Security
~~~~~~~~~~~~~~~~
Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7

Not a total waste of paper, but definitely not worth the
$49.95 purchase price. The book is a rehash of previously
published information. The only secret we learn from reading
the book is that Sylvia Moon is a younger woman madly in love
with the older David Stang.

Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7

Network Security
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4

N Network Security: How to Plan For It and How to Achieve It
Author: Richard M. Baker
Publisher: McGraw-Hill, Inc.
Copyright Date:
ISBN: 0-07-005141-0

N Network Security
Author: Steven L. Shaffer and Alan R. Simon
Publisher: Academic Press
Copyright Date: 1994
ISBN: 0-12-638010-4

N Network Security: Private Communications in a Public World
Author: Charlie Kaufman, Radia Perlman and Mike Speciner
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-13-061466-1

N Network and Internetwork Security: Principles and Practice
Author: William Stallings
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-02-415483-0

N Implementing Internet Security
Author: William Stallings
Publisher: New Rider Publishing
Copyright Date: 1995
ISBN: 1-56205-471-6

N Actually Useful Internet Security Techniques
Author: Larry J. Hughes, Jr.
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-508-9


Cryptology
~~~~~~~~~~~~
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2

Bruce Schneier's book replaces all other texts on
cryptography. If you are interested in cryptography, this is
a must read. This may be the first and last book on
cryptography you may ever need to buy.

Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5

Protect Your Privacy: A Guide for PGP Users
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4

Codebreakers
Author: Kahn
Publisher: Simon and Schuster
Copyright Date:
ISBN:0-02-560460-0

Codebreakers: The Inside Story of Bletchley Park
Author: Francis Harry Hinsley and Alan Stripp
Publisher: Oxford University Press,
Copyright Date: 1993
ISBN:0-19-285304-X

Cryptanalysis, a study of ciphers and their solution
Author: Gaines, Helen Fouche
Publisher: Dover Publications
Copyright Date: 1956
ISBN:

N Computer Privacy Handbook
Author: Andre' Bacard
Publisher: Peachpit Press
Copyright Date: 1995
ISBN: 1-56609-171-3

N E-Mail Security with PGP and PEM
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-05318-X

N PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-098-8


Programmed Threats
~~~~~~~~~~~~~~~~~~
The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0

N The Giant Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:

Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1

Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X

The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8

U A Short Course on Computer Viruses
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2

N Robert Slade's Guide to Computer Viruses
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0


Telephony
~~~~~~~~~
Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5

Although hopelessly out of date, this book remains *THE* book
on telephony. This book is 100% Bell, and is loved by phreaks
the world over.

Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9

The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8

I find this dictionary to be an excellent reference book on
telephony, and I recommend it to anyone with serious
intentions in the field.

Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:

The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-x

Listing of every cellular ID in the us, plus roaming ports,
and info numbers for each carrier.

Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:


Hacking History and Culture
~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X

Bruce Sterling has recently released the book FREE to the net.
The book is much easier to read in print form, and the
paperback is only $5.99. Either way you read it, you will be
glad you did. Mr. Sterling is an excellent science fiction
author and has brought his talent with words to bear on the
hacking culture. A very enjoyable reading experience.

Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X

The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9

Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6


Unclassified
~~~~~~~~~~~~
The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4

Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5

The Knightmare is no super hacker. There is little or no real
information in this book. The Knightmare gives useful advice
like telling you not to dress up before going trashing.
The Knightmare's best hack is fooling Loompanics into
publishing this garbage.

The Day The Phones Stopped
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6

Total garbage. Paranoid delusions of a lunatic. Less factual
data that an average issue of the Enquirer.

Information Warfare
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1

An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8


    10. What are some videos of interest to hackers?



'Unauthorized Access' by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060

Hacker's '95 - a Phon-E & R.F. Burns Production
See the video Emmanuel Goldstein thought would have the Feds knocking
at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y
fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric
BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the
Secret Service briefing on Operation Cyber Snare (recent cell busts)
Talks on Crypto, HERF, the Feds, etc. All information is presented
for educational purposes only. Not for sale to government or law
enforcement organizations. Running time aproximately 90 minutes.
$25.00 NTSC VHS
$35.00 PAL/Secam VHS
Custom Video Productions
(908)842-6378
videocvp@ix.netcom.com


    11. What are some mailing lists of interest to hackers?



Academic Firewalls
Registration Address: Send a message to majordomo@greatcircle.com
containing the line "subscribe firewalls user@host"

N The Alert
Registration Address: Send a message to request-alert@iss.net
containing the line "subscribe alert"

Bugtraq
Reflector Address: bugtraq@fc.net
Registration Address: bugtraq-request@fc.net

Cert Tools
Reflector Address: cert-tools@cert.org
Registration Address: cert-tools-request@cert.org

Computers and Society
Reflector Address: Comp-Soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com

Coordinated Feasibility Effort to Unravel State Data
Reflector Address: ldc-sw@cpsr.org
Registration Address:

CPSR Announcement List
Reflector Address: cpsr-announce@cpsr.org
Registration Address:

CPSR - Intellectual Property
Reflector Address: cpsr-int-prop@cpsr.org
Registration Address:

CPSR - Internet Library
Reflector Address: cpsr-library@cpsr.org
Registration Address:

N Cypherpunks
Registration Address: Send a message to majordomo@toad.com
containing the line "subscribe cypherpunks"

DefCon Announcement List
Registration Address: Send a message to majordomo@fc.net containing
the line "subscribe dc-announce"

DefCon Chat List
Registration Address: Send a message to majordomo@fc.net containing
the line "subscribe dc-stuff"

N Discount Long Distance Digest
Registration Address: Send a message to: dld-request@webcom.com
containing the line "subscribe"

Electronic Payment
Registration Address: e-payment@cc.bellcore.com

IDS (Intruder Detection Systems)
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
containing the line "subscribe ids"

N Information Warfare
Registration Address: E-mail iw@all.net with a request to be added.

N Linux-Alert
Registration Address: majordomo@linux.nrao.edu

N Linux-Security
Registration Address: majordomo@linux.nrao.edu

Macintosh Security
Reflector Address: mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.com

NeXT Managers
Registration Address: next-managers-request@stolaf.edu

PGP3 announcement list
Registration Address: pgp-announce-request@lsd.com
Subject: Your Name <user@host>
Body: *ignored*

Phiber-Scream
Registration Address: Send a message to listserv@netcom.com
containing the line "subscribe phiber-scream user@host"

phruwt-l (Macintosh H/P)
Registration Address: Send a message to filbert@netcom.com
with the subject "phruwt-l"

rfc931-users
Reflector Address: rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.edu

RSA Users
Reflector Address: rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.com

WWW Security
Registration Address: www-security@ns2.rutgers.edu


    12. What are some print magazines of interest to hackers?



2600 - The Hacker Quarterly
~~~~~~~~~~~~~~~~~~~~~~~~~~~
E-mail addresses: info@2600.com - to get info on 2600
index@2600.com - to get a copy of our index
meetings@2600.com - for info on starting your own meeting
subs@2600.com -- for subscription problems
letters@2600.com -- to send us a letter
articles@2600.com -- to send us an article
2600@2600.com -- to send us a general message

Subscription Address: 2600 Subscription Dept
PO Box 752
Middle Island, NY 11953-0752

Letters and article submission address: 2600 Editorial Dept
PO Box 99
Middle Island, NY 11953-0099

Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626

Subscriptions: United States: $21/yr individual, $50 corporate.
Overseas: $30/yr individual, $65 corporate.


Gray Areas
~~~~~~~~~~
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/or controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com

U.S. Mail Address: Gray Areas
PO Box 808
Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
$34.00 4 issues foreign (shipped air mail)


Privacy Newsletter
~~~~~~~~~~~~~~~~~~
Privacy Newsletter is a monthly newsletter devoted to showing
consumers how to get privacy and keep it.

E-Mail Address: privacy@interramp.com

Subscription Address: Privacy Newsletter
P.O. Box 8206
Philadelphia, PA 19101-8206


Subscriptions: $99/yr (US) $149/yr (Overseas)


Wired
~~~~~
Subscription Address: subscriptions@wired.com
or: Wired
PO Box 191826
San Francisco, CA 94119-9866

Letters and article submission address: guidelines@wired.com
or: Wired
544 Second Street
San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)


Nuts & Volts
~~~~~~~~~~~~
T& L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664


Cybertek: The Cyberpunk Technical Journal
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
P.O. Box 64
Brewster, NY 10509

Frequency: Bimonthly
Domestic Subscription Rate: $15/year (6 issues)


PrivateLine
~~~~~~~~~~~
5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

E-Mail: privateline@delphi.com

Subscriptions: $24 a year for six issues

Text of back issues are at the etext archive at Michigan. Gopher over
or ftp to: etext.archive.umich.edu/pub/Zines/PrivateLine


    13. What are some e-zines of interest to hackers?



CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo
Empire Times ftp.etext.org /pub/Zines/Emptimes
FEH ftp.fc.net /pub/defcon/FEH
The Infinity Concept infonexus.com
/pub/Philes/Zines/TheInfinityConcept
Phrack ftp.fc.net /pub/phrack


    14. What are some organizations of interest to hackers?



Computer Professionals for Social Responsibility (CPSR)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CPSR empowers computer professionals and computer users to advocate for
the responsible use of information technology and empowers all who use
computer technology to participate in the public debate. As technical
experts, CPSR members provide the public and policy makers with
realistic assessments of the power, promise, and limitations of computer
technology. As an organization of concerned citizens, CPSR directs
public attention to critical choices concerning the applications of
computing and how those choices affect society.

By matching unimpeachable technical information with policy development
savvy, CPSR uses minimum dollars to have maximum impact and encourages
broad public participation in the shaping of technology policy.

Every project we undertake is based on five principles:

* We foster and support public discussion of and public responsibility
for decisions involving the use of computers in systems critical to
society.

* We work to dispel popular myths about the infallibility of
technological systems.

* We challenge the assumption that technology alone can solve political
and social problems.

* We critically examine social and technical issues within the computer
profession, nationally and internationally.

* We encourage the use of computer technology to improve the quality of
life.

CPSR Membership Categories
75 REGULAR MEMBER
50 Basic member
200 Supporting member
500 Sponsoring member
1000 Lifetime member
20 Student/low income member
50 Foreign subscriber
50 Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA 94301
415-322-3778
415-322-3798 (FAX)
E-mail: cpsr@csli.stanford.edu


Electronic Frontier Foundation (EFF)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
of policies and activities that will advance freedom and openness in
computer-based communications. It is a member-supported, nonprofit
group that grew from the conviction that a new public interest
organization was needed in the information age; that this organization