(Italic indicates updated questions, while bold indicates new questions.)
1. What are some FTP sites of interest to hackers?
204.215.84.2 /pub/users-www/dmackey aeneas.mit.edu (Kerberos) alex.sp.cs.cmu.edu /links/security (Misc) asylum.sf.ca.us (CyberWarriors of Xanadu) atari.archive.umich.edu /pub/atari/Utilities/pgp261st.zip (Atari PGP) athena-dist.mit.edu /pub/ATHENA (Athena Project) atlantis.utmb.edu (Anti-virus) cert.org (CERT) ciac.llnl.gov (CIAC) cnit.nsk.su /pub/security (Security) coast.cs.purdue.edu /pub (Security/COAST) coombs.anu.edu.au /pub/security (Security) csrc.ncsl.nist.gov (NIST Security) ds.internic.net (Internet documents) ftp.2600.com (2600 Magazine) ftp.acns.nwu.edu /pub (Mac Anti-virus) ftp.acsu.buffalo.edu /pub/security & /pub/irc (Security & IRC) ftp.alantec.com /pub/tcpr (Tcpr) ftp.armory.com /pub/user/kmartind (H/P) ftp.auscert.org.au /pub (Australian CERT) ftp.bellcore.com (Bellcore) ftp.cerf.net /pub/software/unix/security (CERFnet) ftp.cert.dfn.de (FIRST) ftp.cisco.com (Cisco) ftp.cs.colorado.edu ftp.cs.ruu.nl /pub/SECURITY (Security & PGP) ftp.cs.uwm.edu /pub/comp-privacy (Privacy Digest) ftp.cs.vu.nl ftp.cs.yale.edu ftp.csi.forth.gr /pub/security ftp.csl.sri.com /pub/nides (SRI) ftp.csn.org /mpj (Cryptology) ftp.cso.uiuc.edu /security ftp.csua.berkeley.edu /pub/cypherpunks (Crypto) ftp.dartmouth.edu /pub/security (Security) ftp.delmarva.com ftp.demon.co.uk /pub/misc/general/0800num.txt (0800/0500 numbers) ftp.denet.dk /pub/security/tools/satan ftp.digex.net /pub/access/dunk ftp.dimensional.com /users/jericho (H/P) ftp.dimensional.com /users/srain (H/P+Virus) ftp.ee.lbl.gov ftp.eff.org /pub/Publications/CuD (EFF) ftp.elelab.nsc.co.jp /pub/security (Security) ftp.etext.org (Etext) ftp.etext.org /pub/Zines/PrivateLine (PrivateLine) ftp.fastlane.net /pub/nomad ftp.fc.net /pub/defcon (DefCon) ftp.fc.net /pub/defcon/BBEEP (BlueBeep) ftp.fc.net /pub/phrack (Phrack) ftp.foobar.com ftp.funet.fi /pub/doc/CuD ftp.giga.or.at /pub/hacker/ (H/P) ftp.greatcircle.com /pub/firewalls (Firewalls) ftp.ieunet.ie /pub/security (Security) ftp.ifi.uio.no ftp.indirect.com /www/evildawg/public_access ftp.info.fundp.ac.be ftp.infonexus.com (The Guild) ftp.informatik.uni-hamburg.de ftp.informatik.uni-kiel.de /pub/sources/security ftp.inoc.dl.nec.com /pub/security (Security) ftp.isi.edu ftp.leo.org /pub/comp/os/os2/crypt ftp.lerc.nasa.gov /security ftp.llnl.gov /pub (CIAC) ftp.luth.se /pub/unix/security ftp.lysator.liu.se ftp.mathematik.uni-ulm.de /pub/security (Security) ftp.mcs.anl.gov /pub/security ftp.nec.com ftp.net.ohio-state.edu /pub/security/satan ftp.netcom.com /pub/va/vandal (DnA) ftp.netcom.com /pub/zz/zzyzx (H/P) ftp.netsys.com ftp.nmt.edu /pub/misc (Terrorist Handbook) ftp.ocs.mq.edu.au /PC/Crypt (Cryptology) ftp.ox.ac.uk /pub/comp/security ftp.ox.ac.uk /pub/crypto (Cryptology) ftp.ox.ac.uk /pub/wordlists (Wordlists) ftp.paranoia.com /pub/toneloc/tl110.zip (ToneLoc) ftp.pipex.net /pub/areacode (uk areacodes) ftp.pop.psu.edu ftp.rahul.net /pub/lps (Home of the FAQ) ftp.sert.edu.au ftp.sgi.com ftp.smartlink.net /pub/users/mikes/haq ftp.stanford.edu /general/security-tools/swatch (SWATCH) ftp.sunet.se /pub/network/monitoring (Ethernet sniffers) ftp.technet.sg ftp.technion.ac.il ftp.tis.com /pub (TIS) ftp.tisl.ukans.edu /pub/security ftp.uni-koeln.de (Wordlists) ftp.uspto.gov ftp.uu.net /doc/literary/obi/Phracks (Zines) ftp.uwp.edu /pub/dos/romulus/cracks (Copy Protection) ftp.vis.colostate.edu ftp.vix.com ftp.vortex.com ftp.warwick.ac.uk /pub/cud (Zines) ftp.wi.leidenuniv.nl /pub/security ftp.win.tue.nl /pub/security (Security) ftp.wustl.edu /doc/EFF (EFF) ftp.wustl.edu /pub/aminet/util/crypt ftp.zoom.com garbo.uwasa.fi /pc/crypt (Cryptology) gemini.tuc.noao.edu /pub/grandi gti.net /pub/safetynet gumby.dsd.trw.com hplyot.obspm.fr idea.sec.dsi.unimi.it /pub/crypt (Crypto) info.mcs.anl.gov jerico.usc.edu l0pht.com (The L0pht) lod.com (Legion of Doom) mac.archive.umich.edu mirror.lcs.mit.edu /telecom-archives (Telecom archives) monet.ccs.itd.umich.edu net-dist.mit.edu /pub/pgp net.tamu.edu /pub/security/TAMU (Security) nic.ddn.mil /scc (DDN Security) oak.oakland.edu /pub/hamradio (Ham Radio) oak.oakland.edu /pub/simtelnet/msdos/sound (DTMF decoders) oak.oakland.edu /pub/simtelnet/msdos/sysutl (BIOS attackers) parcftp.xerox.com relay.cs.toronto.edu /doc/telecom-archives (Telecom) research.att.com /dist/internet_security (AT&T) ripem.msu.edu /pub/crypt (Ripem) rtfm.mit.edu (Etext) rtfm.mit.edu /pub/usenet-by-group (Usenet FAQ's) scss3.cl.msu.edu /pub/crypt (Cryptology) sgigate.sgi.com /Security (SGI Security) src.doc.ic.ac.uk /usenet/uk.telecom (uk.telecom archives) sunsolve1.sun.com theta.iis.u-tokyo.ac.jp /security (Security) ugle.unit.no vic.cc.purdue.edu whacked.l0pht.com (Mac + H/P)
(Italic indicates updated sites, while bold indicates new sites.)
2. What are some fsp sites of interest to hackers?
None at this time.
3. What are some newsgroups of interest to hackers?
alt.2600 Do it 'til it Hertz alt.2600hz alt.2600.codez alt.2600.debate alt.2600.moderated alt.cellular alt.cellular-phone-tech Brilliant telephony mind blow netnews naming alt.comp.virus An unmoderated forum for discussing viruses alt.comp.virus.source.code alt.cracks Heavy toolbelt wearers of the world, unite alt.cyberpunk High-tech low-life. alt.cyberspace Cyberspace and how it should work. alt.dcom.telecom Discussion of telecommunications technology alt.engr.explosives [no description available] alt.fan.kevin-mitnick alt.fan.lewiz Lewis De Payne fan club alt.hackers Descriptions of projects currently under development alt.hackintosh alt.locksmithing You locked your keys in *where*? alt.hackers.malicious The really bad guys - don't take candy from them alt.ph.uk United Kingdom version of alt.2600 alt.privacy.anon-server Tech. & policy matters of anonymous contact servers alt.radio.pirate Hide the gear, here comes the magic station-wagons. alt.radio.scanner Discussion of scanning radio receivers. alt.satellite.tv.europe All about European satellite tv alt.security Security issues on computer systems alt.security.index Pointers to good stuff in misc.security (Moderated) alt.security.keydist Exchange of keys for public key encryption systems alt.security.pgp The Pretty Good Privacy package alt.security.ripem A secure email system illegal to export from the US comp.dcom.cellular [no description available] comp.dcom.telecom Telecommunications digest (Moderated) comp.dcom.telecom.tech [no description available] comp.org.cpsr.announce Computer Professionals for Social Responsibility comp.org.cpsr.talk Issues of computing and social responsibility comp.org.eff.news News from the Electronic Frontier Foundation comp.org.eff.talk Discussion of EFF goals, strategies, etc. comp.os.netware.security Netware Security issues comp.protocols.kerberos The Kerberos authentification server comp.protocols.tcp-ip TCP and IP network protocols comp.risks Risks to the public from computers & users comp.security.announce Announcements from CERT about security comp.security.firewalls Anything pertaining to network firewall security comp.security.misc Security issues of computers and networks comp.security.unix Discussion of Unix security comp.virus Computer viruses & security (Moderated) de.org.ccc Mitteilungen des CCC e.V. misc.security Security in general, not just computers (Moderated) rec.pyrotechnics Fireworks, rocketry, safety, & other topics rec.radio.scanner [no description available] rec.video.cable-tv Technical and regulatory issues of cable television. sci.crypt Different methods of data en/decryption(Italic indicates updated groups, while bold indicates new groups.)
4. What are some telnet sites of interest to hackers?
anarchy-online.com ntiabbs.ntia.doc.gov (NTIA) lust.isca.uiowa.edu 2600 (underground bbs) (temporarily down) spy.org (Computer Systems Consulting)(Italic indicates updated sites, while bold indicates new sites.)
5. What are some gopher sites of interest to hackers?
csrc.ncsl.nist.gov (NIST Security Gopher) gopher.cpsr.org (Computer Professionals for Social Responsibility) gopher.eff.org (Electonic Frontier Foundation) gopher.panix.com (Panix) iitf.doc.gov (NITA -- IITF) info.itu.ch (International Telegraph Union) ncjrs.aspensys.com (National Criminal Justice Reference Service) oss.net (Open Source Solutions) wiretap.spies.com (Wiretap)
6. What are some World wide Web (WWW) sites of interest to hackers?
alumni.caltech.edu/~dank/isdn (ISDN) att.net/dir800 (800 directory) ausg.dartmouth.edu/security.html (UNIX Security Topics) ccnga.uwaterloo.ca/~jscouria/GSM (GSM Specification) cell-relay.indiana.edu/cell-relay (Cell Relay Retreat) ciac.llnl.gov (CIAC Web Site) csrc.ncsl.nist.gov (NIST) daemon.apana.org.au/~longi dcpu1.cs.york.ac.uk:6666/fisher/telecom (Embryonic Telephone History Page) freeside.com/phrack.html (Phrack Magazine) ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling) info.gte.com (GTE Labrotories) info.mcc.ac.uk/Orange/ (Orange) infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) iss.net/iss (Internet Security Systems) jumper.mcc.ac.uk/~afs/telecom (UK Telecom Pricing Information) l0pht.com (The l0pht) l0pht.com/~spacerog/index.html (Whacked Mac Archives) lod.com (Legion of Doom) meridian.jammin.net/underground (Underground Links) mnementh.cs.adfa.oz.au/Lawrie_Brown.html (Lawrie Brown's crypto bibliography) motserv.indirect.com (Motorola) nasirc.nasa.gov/NASIRC_home.html (NASIRC) pages.ripco.com:8080/~glr/glr.html (Full Disclosure) rschp2.anu.edu.au:8080/crypt.html seclab.cs.ucdavis.edu/Security.html (Security) seclab.cs.ucdavis.edu/Security.html (UCDavis.edu Security Page) seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) smurfland.cit.buffalo.edu/NetMan/index.html (Network Management) sunsite.unc.edu/sun/inform/sun-info.html (Sun Microsystems Sponsor Page) support.mayfield.hp.com (Hewlett Packard SupportLine Services) the-tech.mit.edu (LaMacchia case info) town.hall.org/university/security/stoll/cliff.html (Cliff Stoll) turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995) web.mit.edu/network/pgp.html (Getting PGP) weber.u.washington.edu/~phantom/cpunk/index.html (Cryptology) wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's Underground Links) www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html www-ns.rutgers.edu/www-security/index.html (Rutger's documents on WWW security) www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Box info) www-swiss.ai.mit.edu/~bal/pks-toplev.html (Findingsomeone's PGP key) www.2600.com (2600 Magazine) www.8lgm.org (8lgm Security Advisories) www.aads.net (Ameritech) www.access.gpo.gov/su_docs www.alw.nih.gov/WWW/security.html (Unix Security) www.artech-house.com (Artech House) www.asg.unb.ca (Atlantic Systems Group Mosaic Index) www.aston.ac.uk/~bromejt/mobile.html (Mobile Phone Service Locator) www.att.com (ATT) www.auditel.com (Auditel) www.auscert.org.au (Australian CERT) www.axent.com (Axent Technologies) www.bctel.com (BC Tel) www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html (X-Win) www.bell.ca (Bell Canada) www.bellatlantic.com (Bell Atlantic) www.bellcore.com/BETSI/betsi.html (Betsi) www.bellcore.com/SECURITY (Bellcore Security Products) www.bellsouth.com (BellSouth) www.bianca.com/bump/ua (Unauthorized Access Home Page) www.border.com (Border Network Technologies) www.bt.co.uk (British Telecom) www.careermosaic.com/cm/uswest (USWest) www.castle.net/~kobrien/telecom.html (Telecom) www.cco.caltech.edu/~rknop/amiga_pgp26.html www.cdt.org/cda.html www.cec.wustl.edu/~dmm2/egs/egs.html (En Garde Systems) www.cert.dfn.de (German First Team) www.checkpoint.com (Checkpoint) www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html www.cityscape.co.uk/users/ek80/index.html (Inside Cable Cover) www.cohesive.com (Cohesive Systems) www.con.wesleyan.edu/~triemer/network/docservs.html www.cosc.georgetown.edu/~denning/crypto (The Cryptography Project) www.cost.se (COST Computer Security Technologies) www.cpsr.org/home (CPSR) www.crimson.com/isdn/telecomacry.txt (Crimson's Telecommunications Acronyms) www.crtc.gc.ca (CRTC - Canadian regulator) www.cs.berkeley.edu/~raph/remailer-list.html (Anon remailer list) www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/sec.html (CMU Security) www.cs.purdue.edu/coast/coast.html (Coast) www.cs.purdue.edu/pcert/pcert.html (PCERT) www.cs.tu-bs.de (Network management Tools) www.csl.sri.com (SRI Computer Science Lab) www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html www.cwplc.com (Cable and Wireless) www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe) www.cygnus.com/~gnu/export.html (Cryptography Export Control Archives) www.datafellows.fi (Data Fellows (F-Prot)) www.datasync.com/~sotmesc/sotmesc.html (SotMESC) www.dcs.exeter.ac.uk/~aba (Cypherpunk) www.demon.co.uk/mobiles (C.C.Mobiles) www.dhp.com (DataHaven Project) www.dhp.com/~pluvius (Pluvius' Home Page) www.digicash.com/ecash/ecash-home.html (Ecash Home Page) www.digital.com/info/key-secure-index.html (Digital Secure Systems) www.dnai.com/~gui www.dtic.dla.mil/defenselink (Office of the U.S. Secretary of Defense (OSD) www.dtic.dla.mil/iac (DoD Information Analysis Center (IAC) Hub Page) www.eecs.nwu.edu/~jmyers/bugtraq/about.html www.eecs.nwu.edu/~jmyers/bugtraq/archives.html www.eff.org www.eff.org/pub/Alerts www.eff.org/pub/Net_info/Tools/Crypto www.engarde.com/~mcn www.ensta.fr/internet/unix/sys_admin (System administration) www.ericsson.nl (Ericsson) www.etext.org/Zines (Zines) www.farmstead.com (Farmstead) www.fastlane.net/homepages/thegnome (Simple Nomad) www.fbi.gov (FBI Homepage) www.fedworld.gov (Federal Government) www.first.org (FIRST) www.flextel.com (FleXtel) www.fonorola.net (Fonorola (a Canadian carrier) www.frus.com (Firewalls R Us) www.fsk.ethz.ch/fsk (CSSCR) www.gbnet.net/kbridge (KarlBridge) www.ginch.org/~vixen (Empire Times) www.greatcircle.com (Great Circle Associates) www.gta.com (Global Technology Associates) www.gti.net/grayarea (Gray Areas) www.hotwired.com (Wired Magazine) www.hpcc.gov/blue94/section.4.6.html (NSA) www.iacr.org/~iacr (International Association of Cryptologic Research (IACR) www.ic.gov (Central Intelligence Agency Home Page) www.ifi.uio.no/pgp www.iminet.com/starlink (Starlink) www.indirect.com/www/evildawg www.ingress.com (Ingress Communications) www.io.org/~djcl/phoneb.html www.iquest.net/~oseidler (Oliver Seidler's WWW Page) www.itd.nrl.navy.mil/ITD/5540 (NRL Center for High Assurance Computer Systems) www.itu.ch/TELECOM (Telecom '95) www.jedefense.com/jed.html (Journal of Electronic Defense) www.l0pht.com/cdc.html (Cult of the Dead Cow) www.l0pht.com/radiophone (Radiophone Archive) www.l0pht.com/~oblivion/IIRG.html (International Information Retrieval Guild Archive Site) www.lat.com (Los Altos Technologies) www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) www.links.net www.louisville.edu/~wrbake01 (The GodZ of CyberSpacE) www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide) www.mastercard.com (Secure Electronic Payment Protocol) www.mgmua.com/hackers/index.html (Hackers, the movie) www.mhv.net/dcypher/keytrap.html (Key Trap Home Page) www.milkyway.com (Milkyway Networks Corporation) www.mit.edu:8001/people/warlord/pgp-faq.html (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements) www.mot.com (Motorola) www.mwjournal.com/mwj.html (Microwave Journal) www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html (Security in Mosaic) www.ncsl.nist.gov (NIST Computer Systems Laboratory) www.netpart.com (NetPartners) www.nic.surfnet.nl/surfnet/security/cert-nl.html (CERT-NL) www.nist.gov (NIST) www.nokia.com (Nokia) www.nortel.com (Northern Telecom) www.ntt.jp (Nippon Telephone) www.nynex.co.uk/nynex (NYNEX) www.odci.gov (The CIA) www.one2one.co.uk (Mercury One-2-One) www.open.gov.uk/oftel/oftelwww/oftelhm.htm (OFTEL's Home Page) www.openmarket.com/info/cryptography/applied_cryptography.html www.pacbell.com (Pacific Bell) www.paranoia.com/hpa (Paranoia's H/P/A Links) www.paranoia.com/~darkfox (Darkfox's Home Page) www.paranoia.com/~ice9 (Ice-9's Home Page) www.paranoia.com/~mthreat (ToneLoc) www.pegasus.esprit.ec.org/people/arne/pgp.html(PGP) www.phantom.com/~darkcyde (DarkCyde) www.phred.org (The Phred Networking Organization) www.primenet.com/~kludge/haqr.html (Kludge) www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography) www.raptor.com (Raptor) www.research.att.com (AT&T) www.rocksoft.com/rocksoft/integrity_links.html(Security and Integrity Links) www.rogers.com (Rogers Communications) www.rourkem.com (FakeMail FAQ) www.rsa.com (RSA Data Security) www.safe.net www.sctc.com (Secure Computing Corporation) www.service.com/cm/uswest/usw1.html (USWest) www.soci.niu.edu/~cudigest www.somarsoft.com (Somarsoft) www.soscorp.com (Sources of Supply Corp) www.spy.org (Computer Systems Consulting) www.sri.com (SRI) www.stentor.ca (Stentor (Canadian telcos)) www.tecc.co.uk/public/uk-telecom/btns.html (BT "star services") www.telecom.ie (Telecom Eireann) www.telecoms-mag.com/tcs.html (Telecommunications Magazine) www.telkom.co.za (Telkom S.A. Ltd) www.telstra.com.au/info/security.html (Security Reference Index) www.tezcat.com/web/security/security_top_level.html www.tis.com (Trusted Information Systems) www.tregistry.com/ttr (Telecomunications Training Courses) www.tri.sbc.com (Southwestern Bell) www.tricon.net/Comm/synapse (Synapse Magazine) www.uci.agh.edu.pl/pub/security (Security) www.uknet.net/pnc (The Personal Number Company) www.umcc.umich.edu/~doug/virus-faq.html (Virus) www.usfca.edu/crackdown/crack.html (Hacker Crackdown) www.videotron.co.uk (Videotron) www.vodafone.co.uk (Vodafone) www.vptt.ch/natel.html (Natel) www.vtw.org www.well.com/user/abacard www.well.com/user/crunch (Captain Crunch) www2.undernet.org:8080/~cs93jtl/IRC.html (IRC)
(Italic indicates updated sites, while bold indicates new sites.)
7. What are some IRC channels of interest to hackers?
#2600 #cellular #hack #phreak #linux #realhack #root #unix #warez
8. What are some BBS's of interest to hackers?
Rune Stone (203)832-8441 NUP: Cyberek The Truth Sayer's Domain (210)493-9975 Hacker's Haven (303)343-4053 Independent Nation (413)573-1809 Ut0PiA (315)656-5135 underworld_1994.com (514)683-1894 Alliance Communications (612)251-8596 Maas-Neotek (617)855-2923 Apocalypse 2000 (708)676-9855 K0dE Ab0dE (713)579-2276 fARM R0Ad 666 (713)855-0261 kn0wledge Phreak <k0p> BBS (719)578-8288 NUP=NO NUP The Edge of Reality (805)496-7460 Static Line (806)747-0802 Area 51 (908)526-4384 The Drunk Forces +972-3-5733477(Italic indicates updated sites, while bold indicates new sites.)
9. What books are available on this subject?
Computer Security Basics Author: Deborah Russell and G.T. Gengemi Sr. Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-71-4 This is an excellent book. It gives a broad overview of computer security without sacrificing detail. A must read for the beginning security expert. Information Systems Security Author: Philip Fites and Martin Kratz Publisher: Van Nostrad Reinhold Copyright Date: 1993 ISBN: 0-442-00180-0 Computer Related Risks Author: Peter G. Neumann Publisher: Addison-Wesley Copyright Date: 1995 ISBN: 0-201-55805-X Computer Security Management Author: Karen Forcht Publisher: Boyd and Fraser Copyright Date: 1994 ISBN: 0-87835-881-1 The Stephen Cobb Complete Book of PC and LAN Security Author: Stephen Cobb Publisher: Windcrest Books Copyright Date: 1992 ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback) Security in Computing Author: Charles P. Pfleeger Publisher: Prentice Hall Copyright Date: 1989 ISBN: 0-13-798943-1 Building a Secure Computer System Author: Morrie Gasser Publisher: Van Nostrand Reinhold Co., New York. Copyright Date: ISBN: 0-442-23022-2 Modern Methods for Computer Security Author: Lance Hoffman Publisher: Prentice Hall Copyright Date: 1977 ISBN: Windows NT 3.5 Guidelines for Security, Audit and Control Author: Publisher: Microsoft Press Copyright Date: ISBN: 1-55615-814-9 Protection and Security on the Information Superhighway Author: Dr. Frederick B. Cohen) Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-11389-1 Commonsense Computer Security Author: Martin Smith Publisher: McGraw-Hill Copyright Date: 1993 ISBN: 0-07-707805-5 Combatting Computer Crime Author: Jerry Papke Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc. Copyright Date: 1992 ISBN: 0-8306-7664-3 Computer Crime: a Crimefighters Handbook Author: David Icove, Karl Seger and William VonStorch Publisher: O'Reilly & Associates Copyright Date: 1995 ISBN: 1-56592-086-4
Practical Unix Security Author: Simson Garfinkel and Gene Spafford Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-72-2 Finally someone with a very firm grasp of Unix system security gets down to writing a book on the subject. Buy this book. Read this book. Firewalls and Internet Security Author: William Cheswick and Steven Bellovin Publisher: Addison Wesley Copyright Date: 1994 ISBN: 0-201-63357-4 Unix System Security Author: Rik Farrow Publisher: Addison Wesley Copyright Date: 1991 ISBN: 0-201-57030-0 Unix Security: A Practical Tutorial Author: N. Derek Arnold Publisher: McGraw Hill Copyright Date: 1993 ISBN: 0-07-002560-6 Unix System Security: A Guide for Users and Systems Administrators Author: David A. Curry Publisher: Addison-Wesley Copyright Date: 1992 ISBN: 0-201-56327-4 Unix System Security Author: Patrick H. Wood and Stephen G. Kochan Publisher: Hayden Books Copyright Date: 1985 ISBN: 0-672-48494-3 Unix Security for the Organization Author: Richard Bryant Publisher: Sams Copyright Date: 1994 ISBN: 0-672-30571-2 Building Internet Firewalls Author: D. Brent Chapman and Elizabeth D. Zwicky Publisher: O'Reilly and Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-124-0 Unix System Security Essentials Author: Christopher Braun Publisher: Addison Wesley Copyright Date: 1995 ISBN: 0-201-42775-3 Internet Firewalls and Network Security Author: Karanjit S. Siyan and Chris Hare Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-437-6
Network Security Secrets Author: David J. Stang and Sylvia Moon Publisher: IDG Books Copyright Date: 1993 ISBN: 1-56884-021-7 Not a total waste of paper, but definitely not worth the $49.95 purchase price. The book is a rehash of previously published information. The only secret we learn from reading the book is that Sylvia Moon is a younger woman madly in love with the older David Stang. Complete Lan Security and Control Author: Peter Davis Publisher: Windcrest / McGraw Hill Copyright Date: 1994 ISBN: 0-8306-4548-9 and 0-8306-4549-7 Network Security Author: Steven Shaffer and Alan Simon Publisher: AP Professional Copyright Date: 1994 ISBN: 0-12-638010-4 Network Security: How to Plan For It and How to Achieve It Author: Richard M. Baker Publisher: McGraw-Hill, Inc. Copyright Date: ISBN: 0-07-005141-0 Network Security Author: Steven L. Shaffer and Alan R. Simon Publisher: Academic Press Copyright Date: 1994 ISBN: 0-12-638010-4 Network Security: Private Communications in a Public World Author: Charlie Kaufman, Radia Perlman and Mike Speciner Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-13-061466-1 Network and Internetwork Security: Principles and Practice Author: William Stallings Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-02-415483-0 Implementing Internet Security Author: William Stallings Publisher: New Rider Publishing Copyright Date: 1995 ISBN: 1-56205-471-6 Actually Useful Internet Security Techniques Author: Larry J. Hughes, Jr. Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-508-9
Applied Cryptography: Protocols, Algorithms, and Source Code in C Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-59756-2 Bruce Schneier's book replaces all other texts on cryptography. If you are interested in cryptography, this is a must read. This may be the first and last book on cryptography you may ever need to buy. Cryptography and Data Security Author: Dorothy Denning Publisher: Addison-Wesley Publishing Co. Copyright Date: 1982 ISBN: 0-201-10150-5 Protect Your Privacy: A Guide for PGP Users Author: William Stallings Publisher: Prentice-Hall Copyright Date: 1994 ISBN: 0-13-185596-4 Codebreakers Author: Kahn Publisher: Simon and Schuster Copyright Date: ISBN:0-02-560460-0 Codebreakers: The Inside Story of Bletchley Park Author: Francis Harry Hinsley and Alan Stripp Publisher: Oxford University Press, Copyright Date: 1993 ISBN:0-19-285304-X Cryptanalysis, a study of ciphers and their solution Author: Gaines, Helen Fouche Publisher: Dover Publications Copyright Date: 1956 ISBN: Computer Privacy Handbook Author: Andre' Bacard Publisher: Peachpit Press Copyright Date: 1995 ISBN: 1-56609-171-3 E-Mail Security with PGP and PEM Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-05318-X PGP: Pretty Good Privacy Author: Simson Garfinkel Publisher: O'Reilly & Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-098-8
The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0
	The original, and still the best, book on computer viruses.
	No media hype here, just good clean technical information.
The Giant Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:
Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1
Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
        Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X
The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN:
The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8
A Short Course on Computer Viruses
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2
Robert Slade's Guide to Computer Viruses
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0
Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5
        Although hopelessly out of date, this book remains *THE* book
        on telephony.  This book is 100% Bell, and is loved by phreaks
        the world over.
Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9
The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8
        I find this dictionary to be an excellent reference book on
        telephony, and I recommend it to anyone with serious
        intentions in the field.
Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:
The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-X
      Listing of every cellular ID in the us, plus roaming ports,
      and info numbers for each carrier.
Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Author: Bruce Sterling Publisher: Bantam Books Copyright Date: 1982 ISBN: 0-553-56370-X Bruce Sterling has recently released the book FREE to the net. The book is much easier to read in print form, and the paperback is only $5.99. Either way you read it, you will be glad you did. Mr. Sterling is an excellent science fiction author and has brought his talent with words to bear on the hacking culture. A very enjoyable reading experience. Cyberpunk Author: Katie Hafner and John Markoff Publisher: Simon and Schuster Copyright Date: 1991 ISBN: 0-671-77879-X The Cuckoo's Egg Author: Cliff Stoll Publisher: Simon and Schuster Copyright Date: 1989 ISBN: 0-671-72688-9 Hackers: Heroes of the Computer Revolution Author: Steven Levy Publisher: Doubleday Copyright Date: 1984 ISBN: 0-440-13495-6
The Hacker's Handbook Author: Hugo Cornwall Publisher: E. Arthur Brown Company Copyright Date: ISBN: 0-912579-06-4 Secrets of a Super Hacker Author: The Knightmare Publisher: Loompanics Copyright Date: 1994 ISBN: 1-55950-106-5 The Knightmare is no super hacker. There is little or no real information in this book. The Knightmare gives useful advice like telling you not to dress up before going trashing. The Knightmare's best hack is fooling Loompanics into publishing this garbage. The Day The Phones Stopped Author: Leonard Lee Publisher: Primus / Donald I Fine, Inc. Copyright Date: 1992 ISBN: 1-55611-286-6 Total garbage. Paranoid delusions of a lunatic. Less factual data that an average issue of the Enquirer. Information Warfare Author: Winn Swartau Publisher: Thunder Mountain Press Copyright Date: 1994 ISBN: 1-56025-080-1 An Illustrated Guide to the Techniques and Equipment of Electronic Warfare Author: Doug Richardson Publisher: Salamander Press Copyright Date: ISBN: 0-668-06497-8(Bold indicates new books.)
10. What are some videos of interest to hackers?
Unauthorized Access by Annaliza Savage $25 on VH S format in 38-min Savage Productions 1803 Mission St., #406 Santa Cruz, CA 95060 Hacker's '95 - a Phon-E & R.F. Burns Production See the video Emmanuel Goldstein thought would have the Feds knocking at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the Secret Service briefing on Operation Cyber Snare (recent cell busts) Talks on Crypto, HERF, the Feds, etc. All information is presented for educational purposes only. Not for sale to government or law enforcement organizations. Running time aproximately 90 minutes. $25.00 NTSC VHS $35.00 PAL/Secam VHS Custom Video Productions (908)842-6378 videocvp@ix.netcom.com
11. What are some mailing lists of interest to hackers?
Academic Firewalls
Reflector Address:
Registration Address: Send a message to majordomo@greatcircle.com
                      containing the line "subscribe firewalls user@host"
The Alert
Registration Address: Send a message to request-alert@iss.net
                      containing the line "subscribe alert"
Bugtraq
Reflector Address:    bugtraq@fc.net
Registration Address: bugtraq-request@fc.net
Cert Tools
Reflector Address:    cert-tools@cert.org
Registration Address: cert-tools-request@cert.org
Computers and Society
Reflector Address:    comp-soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com
Coordinated Feasibility Effort to Unravel State Data
Reflector Address:    ldc-sw@cpsr.org
Registration Address:
CPSR Announcement List
Reflector Address:    cpsr-announce@cpsr.org
Registration Address:
CPSR - Intellectual Property
Reflector Address:    cpsr-int-prop@cpsr.org
Registration Address:
CPSR - Internet Library
Reflector Address:    cpsr-library@cpsr.org
Registration Address:
Cypherpunks
Registration Address: Send a message to majordomo@toad.com
                      containing the line "subscribe cypherpunks"
DefCon Announcement List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
                      the line "subscribe dc-announce"
DefCon Chat List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
                      the line "subscribe dc-stuff"
Discount Long Distance Digest
Registration Address: Send a message to: dld-request@webcom.com
                      containing the line "subscribe"
Electronic Payment
Reflector Address:
Registration Address: e-payment@cc.bellcore.com
IDS (Intruder Detection Systems)
Reflector Address:
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
                      containing the line "subscribe ids"
Information Warfare
Registration Address: E-mail iw@all.net with a request to be added.
Linux-Alert
Registration Address: majordomo@linux.nrao.edu
Linux-Security
Registration Address: majordomo@linux.nrao.edu
Macintosh Security
Reflector Address:    mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.com
NeXT Managers
Reflector Address:
Registration Address: next-managers-request@stolaf.edu
PGP3 announcement list
Reflector Address:
Registration Address: pgp-announce-request@lsd.com
                      Subject: Your Name 
                      Body: *ignored*
Phiber-Seream
Reflector Address:
Registration Address: Send a message to listserv@netcom.com
                      containing the line "subscribe phiber-scream user@host"
phruwt-l (Macintosh H/P)
Reflector Address:
Registration Address: Send a message to filbert@netcom.com
                      with the subject "phruwt-l"
rfc931-users
Reflector Address:    rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.edu
RSA Users
Reflector Address:    rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.com
Surveillance/Security
Reflector Address:
Registration Address: Send a message to
                      surv-sec-request@sleepless.acm.uiuc.edu with
                      "subscribe" in the subject.
WWW Security
Reflector Address:
Registration Address: www-security@ns2.rutgers.edu
 
(Italic indicates updated lists, while bold
indicates new lists.)
12. What are some print magazines of interest to hackers?
E-mail addresses: info@2600.com - to get info on 2600
                  index@2600.com - to get a copy of our index
                  meetings@2600.com - for info on starting your own meeting
                  subs@2600.com - for subscription problems
                  letters@2600.com - to send us a letter
                  articles@2600.com - to send us an article
                  2600@2600.com - to send us a general message
Subscription Address: 2600 Subscription Dept
                      PO Box 752
                      Middle Island, NY  11953-0752
Letters and article submission address: 2600 Editorial Dept
                                        PO Box 99
                                        Middle Island, NY  11953-0099
Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626
Subscriptions: United States: $21/yr individual, $50 corporate.
               Overseas: $30/yr individual, $65 corporate.
Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/or controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.
E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com
U.S. Mail Address: Gray Areas
                   PO Box 808
                   Broomall, PA 19008
Subscriptions: $26.00 4 issues first class
               $34.00 4 issues foreign (shipped air mail)
Privacy Newsletter is a monthly newsletter devoted to showing
consumers how to get privacy and keep it.
E-Mail Address: privacy@interramp.com
Subscription Address: Privacy Newsletter
                      P.O. Box 8206
                      Philadelphia, PA 19101-8206
Subscriptions: $99/yr (US)  $149/yr (Overseas)
Subscription Address: subscriptions@wired.com
                  or: Wired
                      PO Box 191826
                      San Francisco, CA 94119-9866
Letters and article submission address: guidelines@wired.com
                                    or: Wired
                                        544 Second Street
                                        San Francisco, CA 94107-1427
Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
T & L Publications 430 Princeland Court Corona, CA 91719 (800)783-4624 (Voice) (Subscription Only Order Line) (909)371-8497 (Voice) (909)371-3052 (Fax) CIS: 74262,3664
P.O. Box 64 Brewster, NY 10509 Frequency: Bimonthly Domestic Subscription Rate: $15/year (6 issues)
5150 Fair Oaks Blvd. #101-348 Carmichael, CA 95608 USA E-Mail: privateline@delphi.com Subscriptions: $24 a year for six issues Text of back issues are at the etext archive at Michigan. Gopher over or ftp to: ftp.etext.org/pub/Zines/PrivateLine
13. What are some e-zines of interest to hackers?
CoTNo: Communications of The New Order    ftp.etext.org  /pub/Zines/CoTNo
Empire Times                              ftp.etext.org  /pub/Zines/Emptimes
FEH                                       ftp.fc.net     /pub/defcon/FEH
The Infinity Concept                      infonexus.com
                                          /pub/Philes/Zines/TheInfinityConcept
Phrack                                    ftp.fc.net     /pub/phrack
14. What are some organizations of interest to hackers?
By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy.
Every project we undertake is based on five principles:
CPSR Membership Categories 75 REGULAR MEMBER 50 Basic member 200 Supporting member 500 Sponsoring member 1000 Lifetime member 20 Student/low income member 50 Foreign subscriber 50 Library/institutional subscriber CPSR National Office P.O. Box 717 Palo Alto, CA 94301 415-322-3778 415-322-3798 (FAX) E-mail: cpsr@csli.stanford.edu
Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations.
The Electronic Frontier Foundation, Inc. 666 Pennsylvania Avenue S.E., Suite 303 Washington, D.C. 20003 +1 202 544 9237 +1 202 547 5481 FAX Internet: eff@eff.org
The Free Software Foundation is dedicated to eliminating restrictions on people's right to use, copy, modify, and redistribute computer programs. We promote the development and use of free software in all areas using computers. Specifically, we are putting together a complete, integrated software system named "GNU" ("GNU's Not Unix", pronounced "guh-new") that will be upwardly compatible with Unix. Most parts of this system are already being used and distributed.
The word "free" in our name refers to freedom, not price. You may or may not pay money to get GNU software, but regardless you have two specific freedoms once you get it: first, the freedom to copy a program and give it away to your friends and co-workers; and second, the freedom to change a program as you wish, by having full access to source code. You can study the source and learn how such programs are written. You may then be able to port it, improve it, and share your changes with others. If you redistribute GNU software you may charge a distribution fee or give it away, so long as you include the source code and the GPL (GNU General Public License).
Free Software Foundation, Inc. Telephone: +1-617-876-3296 673 Massachusetts Avenue Fax: +1-617-492-9057 Cambridge, MA 02139-3309 USA Fax (in Japan): 0031-13-2473 (KDD) Electronic mail: gnu@prep.ai.mit.edu 0066-3382-0158 (IDC)
GNU is to be a complete integrated computational environment: everything you need to work with a computer, either as a programmer or as a person in an office or home. The core is an operating system, which consists of a central program called a kernel that runs the other programs on the computer, and a large number of ancillary programs for handling files, etc. The Free Software Foundation is developing an advanced kernel called the Hurd.
A complete system has tools for programmers, such as compilers and debuggers. It also has editors, sketchpads, calendars, calculators, spreadsheets, databases, electronic mail readers, and Internet navigators. The FSF already distributes most of the programs used in an operating system, all the tools regularly used by programmers, and much more.
The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston.
"Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation.
We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices.
Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome.
To contact the League, phone (617) 243-4091, send Internet mail to the address league@prep.ai.mit.edu, or write to:
League for Programming Freedom 1 Kendall Square #143 P.O. Box 9171 Cambridge, MA 02139 USA
SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter.
The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media.
SotMesc memberships are $20 to students and $40 to regular members.
SotMESC P.O. Box 573 Long Beach, MS 39560
CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (192.88.209.5), where security-related documents, past CERT advisories, and tools are archived.
CERT contact information:
U.S. mail address
  CERT Coordination Center
  Software Engineering Institute
  Carnegie Mellon University
  Pittsburgh, PA 15213-3890
  U.S.A.
Internet E-mail address
  cert@cert.org
Telephone number
  +1 412-268-7090 (24-hour hotline)
    CERT Coordination Center personnel answer
    7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
    emergencies during other hours.
FAX number
  +1 412-268-6989
15. What are some radio programs of interest to hackers?
Off The Hook New York 99.5 FM Wed 10pm EST Full Disclosure Live Short Wave WWCR 5065 kHz Sun 8pm EST Full Disclosure Live Oil City, PA WOYL AM-1340 Sun 8pm EST Full Disclosure Live Satellite Telstar 302 (T2), Ch 21, 5.8 Sun 8pm EST
16. What are other FAQ's of interest to hackers?
Frequently Asked Questions "Hacking Novell Netware" Author: Simple Nomadftp: ftp.fastlane.net /pub/nomad/nw/faq.zip ftp: ftp.best.com /pub/almcepud/hacks/faq.zip http://www.nmrc.org/faqs/netware The PGP Attack FAQ Author: Route [daemon9@netcom.com / route@infonexus.com] ftp: infonexus.com /pub/Philes/Cryptography/PGPattackFAQ.txt.gz Mac Hack FAQ: Defeating Security Author: AX1P (an149689@anon.penet.fi) Frequently Asked Questions About Red Boxing Author: Mr. Sandman (an132432@anon.penet.fi) VMS FAQ (Frequently Ask Questions) Author: The Beaver (beaver@upperdck.blkbox.com) Anonymous FTP FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/anonftp Compromise FAQ: What if your Machines are Compromised by an Intruder Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/compromise Security Patches FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/patch Sniffer FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/sniff Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/vendor Cryptography FAQ Author: The Crypt Cabal ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/ Firewalls FAQ Author: Marcus J. Ranum (mjr@ss1.lightspeed.net) ftp: rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/ Buying a Used Scanner Radio Author: parnass@att.com (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ How to Find Scanner Frequencies Author: parnass@att.com (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ Introduction to Scanning Author: parnass@att.com (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ Low Power Broadcasting FAQ Author: Rick Harrison. ftp: rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/ RSA Cryptography Today FAQ Author: Paul Fahn ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/ VIRUS-L comp.virus Frequently Asked Questions (FAQ) Author: Kenneth R. van Wyk <krvw@cert.org> ftp: rtfm.mit.edu /pub/usenet-by-group/comp.virus/ Where to get the latest PGP (Pretty Good Privacy) FAQ Author: mpj@csn.net (Michael Johnson) ftp: rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/ alt.locksmithing answers to Frequently Asked Questions (FAQ) Author: spike@indra.com (Joe Ilacqua) ftp: rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/ comp.os.netware.security FAQ Author: Fauzan Mirza <f.u.mirza@sheffield.ac.uk> ftp: rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/ rec.pyrotechnics FAQ Author: zoz@cs.adelaide.edu.au (Hans Josef Wagemueller) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/ 
17. Where can I purchase a magnetic stripe encoder/decoder?
CPU Advance PO Box 2434 Harwood Station Littleton, MA 01460 (508)624-4819 (Fax) Omron Electronics, Inc. One East Commerce Drive Schaumburg, IL 60173 (800)556-6766 (Voice) (708)843-7787 (Fax) Security Photo Corporation 1051 Commonwealth Avenue Boston, MA 02215 (800)533-1162 (Voice) (617)783-3200 (Voice) (617)783-1966 (Voice) Timeline Inc, 23605 Telo Avenue Torrence, CA 90505 (800)872-8878 (Voice) (800)223-9977 (Voice) Alltronics 2300 Zanker Road San Jose CA 95131 (408) 943-9774 Voice (408) 943-9776 Fax (408) 943-0622 BBS Part Number: 92U067 Atalla Corp San Jose, CA (408) 435-8850
18. What are the rainbow books and how can I get them?
Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria
Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline
Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments
Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements.  Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.
Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems
Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation -- A Guide for Vendors
Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems
Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms
Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria
Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems
Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems
Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems
Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria
Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems
Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation
Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document
Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems
Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management
Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals
Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems
Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems
Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire
Gray Book
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System
Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria
Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems
Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems
Purple Book
NCSC-TG-024  (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements
Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators
Purple Book
NCSC-TG-024  (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial
Purple Book
NCSC-TG-024  (Volume 4/4)
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
Proposal Document - An Aid to Procurement Initiators and Contractors
Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems
Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems
Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems
Violet Book
NCSC-TG-028
Assessing Controlled Access Protection
Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation
Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems
C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment
C Technical Report 79-91
Integrity in Automated Information Systems
C Technical Report 39-92
The Design and Evaluation of INFOSEC systems: The Computer Security
Contributions to the Composition Discussion
NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline
You can get your own free copy of any or all of the books by writing
or calling:
       INFOSEC Awareness Division
       ATTN: X711/IAOC
       Fort George G. Meade, MD  20755-6000
       Barbara Keller
       (410) 766-8729
If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).
(Bold indicates I have not personally seen this book and/or I
believe it may not be available.)