(Italic indicates updated questions, while bold indicates new questions.)
1. What are some FTP sites of interest to hackers?
188.8.131.52 /pub/users-www/dmackey aeneas.mit.edu (Kerberos) alex.sp.cs.cmu.edu /links/security (Misc) asylum.sf.ca.us (CyberWarriors of Xanadu) atari.archive.umich.edu /pub/atari/Utilities/pgp261st.zip (Atari PGP) athena-dist.mit.edu /pub/ATHENA (Athena Project) atlantis.utmb.edu (Anti-virus) cert.org (CERT) ciac.llnl.gov (CIAC) cnit.nsk.su /pub/security (Security) coast.cs.purdue.edu /pub (Security/COAST) coombs.anu.edu.au /pub/security (Security) csrc.ncsl.nist.gov (NIST Security) ds.internic.net (Internet documents) ftp.2600.com (2600 Magazine) ftp.acns.nwu.edu /pub (Mac Anti-virus) ftp.acsu.buffalo.edu /pub/security & /pub/irc (Security & IRC) ftp.alantec.com /pub/tcpr (Tcpr) ftp.armory.com /pub/user/kmartind (H/P) ftp.auscert.org.au /pub (Australian CERT) ftp.bellcore.com (Bellcore) ftp.cerf.net /pub/software/unix/security (CERFnet) ftp.cert.dfn.de (FIRST) ftp.cisco.com (Cisco) ftp.cs.colorado.edu ftp.cs.ruu.nl /pub/SECURITY (Security & PGP) ftp.cs.uwm.edu /pub/comp-privacy (Privacy Digest) ftp.cs.vu.nl ftp.cs.yale.edu ftp.csi.forth.gr /pub/security ftp.csl.sri.com /pub/nides (SRI) ftp.csn.org /mpj (Cryptology) ftp.cso.uiuc.edu /security ftp.csua.berkeley.edu /pub/cypherpunks (Crypto) ftp.dartmouth.edu /pub/security (Security) ftp.delmarva.com ftp.demon.co.uk /pub/misc/general/0800num.txt (0800/0500 numbers) ftp.denet.dk /pub/security/tools/satan ftp.digex.net /pub/access/dunk ftp.dimensional.com /users/jericho (H/P) ftp.dimensional.com /users/srain (H/P+Virus) ftp.ee.lbl.gov ftp.eff.org /pub/Publications/CuD (EFF) ftp.elelab.nsc.co.jp /pub/security (Security) ftp.etext.org (Etext) ftp.etext.org /pub/Zines/PrivateLine (PrivateLine) ftp.fastlane.net /pub/nomad ftp.fc.net /pub/defcon (DefCon) ftp.fc.net /pub/defcon/BBEEP (BlueBeep) ftp.fc.net /pub/phrack (Phrack) ftp.foobar.com ftp.funet.fi /pub/doc/CuD ftp.giga.or.at /pub/hacker/ (H/P) ftp.greatcircle.com /pub/firewalls (Firewalls) ftp.ieunet.ie /pub/security (Security) ftp.ifi.uio.no ftp.indirect.com /www/evildawg/public_access ftp.info.fundp.ac.be ftp.infonexus.com (The Guild) ftp.informatik.uni-hamburg.de ftp.informatik.uni-kiel.de /pub/sources/security ftp.inoc.dl.nec.com /pub/security (Security) ftp.isi.edu ftp.leo.org /pub/comp/os/os2/crypt ftp.lerc.nasa.gov /security ftp.llnl.gov /pub (CIAC) ftp.luth.se /pub/unix/security ftp.lysator.liu.se ftp.mathematik.uni-ulm.de /pub/security (Security) ftp.mcs.anl.gov /pub/security ftp.nec.com ftp.net.ohio-state.edu /pub/security/satan ftp.netcom.com /pub/va/vandal (DnA) ftp.netcom.com /pub/zz/zzyzx (H/P) ftp.netsys.com ftp.nmt.edu /pub/misc (Terrorist Handbook) ftp.ocs.mq.edu.au /PC/Crypt (Cryptology) ftp.ox.ac.uk /pub/comp/security ftp.ox.ac.uk /pub/crypto (Cryptology) ftp.ox.ac.uk /pub/wordlists (Wordlists) ftp.paranoia.com /pub/toneloc/tl110.zip (ToneLoc) ftp.pipex.net /pub/areacode (uk areacodes) ftp.pop.psu.edu ftp.rahul.net /pub/lps (Home of the FAQ) ftp.sert.edu.au ftp.sgi.com ftp.smartlink.net /pub/users/mikes/haq ftp.stanford.edu /general/security-tools/swatch (SWATCH) ftp.sunet.se /pub/network/monitoring (Ethernet sniffers) ftp.technet.sg ftp.technion.ac.il ftp.tis.com /pub (TIS) ftp.tisl.ukans.edu /pub/security ftp.uni-koeln.de (Wordlists) ftp.uspto.gov ftp.uu.net /doc/literary/obi/Phracks (Zines) ftp.uwp.edu /pub/dos/romulus/cracks (Copy Protection) ftp.vis.colostate.edu ftp.vix.com ftp.vortex.com ftp.warwick.ac.uk /pub/cud (Zines) ftp.wi.leidenuniv.nl /pub/security ftp.win.tue.nl /pub/security (Security) ftp.wustl.edu /doc/EFF (EFF) ftp.wustl.edu /pub/aminet/util/crypt ftp.zoom.com garbo.uwasa.fi /pc/crypt (Cryptology) gemini.tuc.noao.edu /pub/grandi gti.net /pub/safetynet gumby.dsd.trw.com hplyot.obspm.fr idea.sec.dsi.unimi.it /pub/crypt (Crypto) info.mcs.anl.gov jerico.usc.edu l0pht.com (The L0pht) lod.com (Legion of Doom) mac.archive.umich.edu mirror.lcs.mit.edu /telecom-archives (Telecom archives) monet.ccs.itd.umich.edu net-dist.mit.edu /pub/pgp net.tamu.edu /pub/security/TAMU (Security) nic.ddn.mil /scc (DDN Security) oak.oakland.edu /pub/hamradio (Ham Radio) oak.oakland.edu /pub/simtelnet/msdos/sound (DTMF decoders) oak.oakland.edu /pub/simtelnet/msdos/sysutl (BIOS attackers) parcftp.xerox.com relay.cs.toronto.edu /doc/telecom-archives (Telecom) research.att.com /dist/internet_security (AT&T) ripem.msu.edu /pub/crypt (Ripem) rtfm.mit.edu (Etext) rtfm.mit.edu /pub/usenet-by-group (Usenet FAQ's) scss3.cl.msu.edu /pub/crypt (Cryptology) sgigate.sgi.com /Security (SGI Security) src.doc.ic.ac.uk /usenet/uk.telecom (uk.telecom archives) sunsolve1.sun.com theta.iis.u-tokyo.ac.jp /security (Security) ugle.unit.no vic.cc.purdue.edu whacked.l0pht.com (Mac + H/P)
(Italic indicates updated sites, while bold indicates new sites.)
2. What are some fsp sites of interest to hackers?
None at this time.
3. What are some newsgroups of interest to hackers?
alt.2600 Do it 'til it Hertz alt.2600hz alt.2600.codez alt.2600.debate alt.2600.moderated alt.cellular alt.cellular-phone-tech Brilliant telephony mind blow netnews naming alt.comp.virus An unmoderated forum for discussing viruses alt.comp.virus.source.code alt.cracks Heavy toolbelt wearers of the world, unite alt.cyberpunk High-tech low-life. alt.cyberspace Cyberspace and how it should work. alt.dcom.telecom Discussion of telecommunications technology alt.engr.explosives [no description available] alt.fan.kevin-mitnick alt.fan.lewiz Lewis De Payne fan club alt.hackers Descriptions of projects currently under development alt.hackintosh alt.locksmithing You locked your keys in *where*? alt.hackers.malicious The really bad guys - don't take candy from them alt.ph.uk United Kingdom version of alt.2600 alt.privacy.anon-server Tech. & policy matters of anonymous contact servers alt.radio.pirate Hide the gear, here comes the magic station-wagons. alt.radio.scanner Discussion of scanning radio receivers. alt.satellite.tv.europe All about European satellite tv alt.security Security issues on computer systems alt.security.index Pointers to good stuff in misc.security (Moderated) alt.security.keydist Exchange of keys for public key encryption systems alt.security.pgp The Pretty Good Privacy package alt.security.ripem A secure email system illegal to export from the US comp.dcom.cellular [no description available] comp.dcom.telecom Telecommunications digest (Moderated) comp.dcom.telecom.tech [no description available] comp.org.cpsr.announce Computer Professionals for Social Responsibility comp.org.cpsr.talk Issues of computing and social responsibility comp.org.eff.news News from the Electronic Frontier Foundation comp.org.eff.talk Discussion of EFF goals, strategies, etc. comp.os.netware.security Netware Security issues comp.protocols.kerberos The Kerberos authentification server comp.protocols.tcp-ip TCP and IP network protocols comp.risks Risks to the public from computers & users comp.security.announce Announcements from CERT about security comp.security.firewalls Anything pertaining to network firewall security comp.security.misc Security issues of computers and networks comp.security.unix Discussion of Unix security comp.virus Computer viruses & security (Moderated) de.org.ccc Mitteilungen des CCC e.V. misc.security Security in general, not just computers (Moderated) rec.pyrotechnics Fireworks, rocketry, safety, & other topics rec.radio.scanner [no description available] rec.video.cable-tv Technical and regulatory issues of cable television. sci.crypt Different methods of data en/decryption(Italic indicates updated groups, while bold indicates new groups.)
4. What are some telnet sites of interest to hackers?
anarchy-online.com ntiabbs.ntia.doc.gov (NTIA) lust.isca.uiowa.edu 2600 (underground bbs) (temporarily down) spy.org (Computer Systems Consulting)(Italic indicates updated sites, while bold indicates new sites.)
5. What are some gopher sites of interest to hackers?
csrc.ncsl.nist.gov (NIST Security Gopher) gopher.cpsr.org (Computer Professionals for Social Responsibility) gopher.eff.org (Electonic Frontier Foundation) gopher.panix.com (Panix) iitf.doc.gov (NITA -- IITF) info.itu.ch (International Telegraph Union) ncjrs.aspensys.com (National Criminal Justice Reference Service) oss.net (Open Source Solutions) wiretap.spies.com (Wiretap)
6. What are some World wide Web (WWW) sites of interest to hackers?
alumni.caltech.edu/~dank/isdn (ISDN) att.net/dir800 (800 directory) ausg.dartmouth.edu/security.html (UNIX Security Topics) ccnga.uwaterloo.ca/~jscouria/GSM (GSM Specification) cell-relay.indiana.edu/cell-relay (Cell Relay Retreat) ciac.llnl.gov (CIAC Web Site) csrc.ncsl.nist.gov (NIST) daemon.apana.org.au/~longi dcpu1.cs.york.ac.uk:6666/fisher/telecom (Embryonic Telephone History Page) freeside.com/phrack.html (Phrack Magazine) ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling) info.gte.com (GTE Labrotories) info.mcc.ac.uk/Orange/ (Orange) infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) iss.net/iss (Internet Security Systems) jumper.mcc.ac.uk/~afs/telecom (UK Telecom Pricing Information) l0pht.com (The l0pht) l0pht.com/~spacerog/index.html (Whacked Mac Archives) lod.com (Legion of Doom) meridian.jammin.net/underground (Underground Links) mnementh.cs.adfa.oz.au/Lawrie_Brown.html (Lawrie Brown's crypto bibliography) motserv.indirect.com (Motorola) nasirc.nasa.gov/NASIRC_home.html (NASIRC) pages.ripco.com:8080/~glr/glr.html (Full Disclosure) rschp2.anu.edu.au:8080/crypt.html seclab.cs.ucdavis.edu/Security.html (Security) seclab.cs.ucdavis.edu/Security.html (UCDavis.edu Security Page) seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) smurfland.cit.buffalo.edu/NetMan/index.html (Network Management) sunsite.unc.edu/sun/inform/sun-info.html (Sun Microsystems Sponsor Page) support.mayfield.hp.com (Hewlett Packard SupportLine Services) the-tech.mit.edu (LaMacchia case info) town.hall.org/university/security/stoll/cliff.html (Cliff Stoll) turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995) web.mit.edu/network/pgp.html (Getting PGP) weber.u.washington.edu/~phantom/cpunk/index.html (Cryptology) wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's Underground Links) www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html www-ns.rutgers.edu/www-security/index.html (Rutger's documents on WWW security) www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Box info) www-swiss.ai.mit.edu/~bal/pks-toplev.html (Findingsomeone's PGP key) www.2600.com (2600 Magazine) www.8lgm.org (8lgm Security Advisories) www.aads.net (Ameritech) www.access.gpo.gov/su_docs www.alw.nih.gov/WWW/security.html (Unix Security) www.artech-house.com (Artech House) www.asg.unb.ca (Atlantic Systems Group Mosaic Index) www.aston.ac.uk/~bromejt/mobile.html (Mobile Phone Service Locator) www.att.com (ATT) www.auditel.com (Auditel) www.auscert.org.au (Australian CERT) www.axent.com (Axent Technologies) www.bctel.com (BC Tel) www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html (X-Win) www.bell.ca (Bell Canada) www.bellatlantic.com (Bell Atlantic) www.bellcore.com/BETSI/betsi.html (Betsi) www.bellcore.com/SECURITY (Bellcore Security Products) www.bellsouth.com (BellSouth) www.bianca.com/bump/ua (Unauthorized Access Home Page) www.border.com (Border Network Technologies) www.bt.co.uk (British Telecom) www.careermosaic.com/cm/uswest (USWest) www.castle.net/~kobrien/telecom.html (Telecom) www.cco.caltech.edu/~rknop/amiga_pgp26.html www.cdt.org/cda.html www.cec.wustl.edu/~dmm2/egs/egs.html (En Garde Systems) www.cert.dfn.de (German First Team) www.checkpoint.com (Checkpoint) www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html www.cityscape.co.uk/users/ek80/index.html (Inside Cable Cover) www.cohesive.com (Cohesive Systems) www.con.wesleyan.edu/~triemer/network/docservs.html www.cosc.georgetown.edu/~denning/crypto (The Cryptography Project) www.cost.se (COST Computer Security Technologies) www.cpsr.org/home (CPSR) www.crimson.com/isdn/telecomacry.txt (Crimson's Telecommunications Acronyms) www.crtc.gc.ca (CRTC - Canadian regulator) www.cs.berkeley.edu/~raph/remailer-list.html (Anon remailer list) www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/sec.html (CMU Security) www.cs.purdue.edu/coast/coast.html (Coast) www.cs.purdue.edu/pcert/pcert.html (PCERT) www.cs.tu-bs.de (Network management Tools) www.csl.sri.com (SRI Computer Science Lab) www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html www.cwplc.com (Cable and Wireless) www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe) www.cygnus.com/~gnu/export.html (Cryptography Export Control Archives) www.datafellows.fi (Data Fellows (F-Prot)) www.datasync.com/~sotmesc/sotmesc.html (SotMESC) www.dcs.exeter.ac.uk/~aba (Cypherpunk) www.demon.co.uk/mobiles (C.C.Mobiles) www.dhp.com (DataHaven Project) www.dhp.com/~pluvius (Pluvius' Home Page) www.digicash.com/ecash/ecash-home.html (Ecash Home Page) www.digital.com/info/key-secure-index.html (Digital Secure Systems) www.dnai.com/~gui www.dtic.dla.mil/defenselink (Office of the U.S. Secretary of Defense (OSD) www.dtic.dla.mil/iac (DoD Information Analysis Center (IAC) Hub Page) www.eecs.nwu.edu/~jmyers/bugtraq/about.html www.eecs.nwu.edu/~jmyers/bugtraq/archives.html www.eff.org www.eff.org/pub/Alerts www.eff.org/pub/Net_info/Tools/Crypto www.engarde.com/~mcn www.ensta.fr/internet/unix/sys_admin (System administration) www.ericsson.nl (Ericsson) www.etext.org/Zines (Zines) www.farmstead.com (Farmstead) www.fastlane.net/homepages/thegnome (Simple Nomad) www.fbi.gov (FBI Homepage) www.fedworld.gov (Federal Government) www.first.org (FIRST) www.flextel.com (FleXtel) www.fonorola.net (Fonorola (a Canadian carrier) www.frus.com (Firewalls R Us) www.fsk.ethz.ch/fsk (CSSCR) www.gbnet.net/kbridge (KarlBridge) www.ginch.org/~vixen (Empire Times) www.greatcircle.com (Great Circle Associates) www.gta.com (Global Technology Associates) www.gti.net/grayarea (Gray Areas) www.hotwired.com (Wired Magazine) www.hpcc.gov/blue94/section.4.6.html (NSA) www.iacr.org/~iacr (International Association of Cryptologic Research (IACR) www.ic.gov (Central Intelligence Agency Home Page) www.ifi.uio.no/pgp www.iminet.com/starlink (Starlink) www.indirect.com/www/evildawg www.ingress.com (Ingress Communications) www.io.org/~djcl/phoneb.html www.iquest.net/~oseidler (Oliver Seidler's WWW Page) www.itd.nrl.navy.mil/ITD/5540 (NRL Center for High Assurance Computer Systems) www.itu.ch/TELECOM (Telecom '95) www.jedefense.com/jed.html (Journal of Electronic Defense) www.l0pht.com/cdc.html (Cult of the Dead Cow) www.l0pht.com/radiophone (Radiophone Archive) www.l0pht.com/~oblivion/IIRG.html (International Information Retrieval Guild Archive Site) www.lat.com (Los Altos Technologies) www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) www.links.net www.louisville.edu/~wrbake01 (The GodZ of CyberSpacE) www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide) www.mastercard.com (Secure Electronic Payment Protocol) www.mgmua.com/hackers/index.html (Hackers, the movie) www.mhv.net/dcypher/keytrap.html (Key Trap Home Page) www.milkyway.com (Milkyway Networks Corporation) www.mit.edu:8001/people/warlord/pgp-faq.html (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements) www.mot.com (Motorola) www.mwjournal.com/mwj.html (Microwave Journal) www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html (Security in Mosaic) www.ncsl.nist.gov (NIST Computer Systems Laboratory) www.netpart.com (NetPartners) www.nic.surfnet.nl/surfnet/security/cert-nl.html (CERT-NL) www.nist.gov (NIST) www.nokia.com (Nokia) www.nortel.com (Northern Telecom) www.ntt.jp (Nippon Telephone) www.nynex.co.uk/nynex (NYNEX) www.odci.gov (The CIA) www.one2one.co.uk (Mercury One-2-One) www.open.gov.uk/oftel/oftelwww/oftelhm.htm (OFTEL's Home Page) www.openmarket.com/info/cryptography/applied_cryptography.html www.pacbell.com (Pacific Bell) www.paranoia.com/hpa (Paranoia's H/P/A Links) www.paranoia.com/~darkfox (Darkfox's Home Page) www.paranoia.com/~ice9 (Ice-9's Home Page) www.paranoia.com/~mthreat (ToneLoc) www.pegasus.esprit.ec.org/people/arne/pgp.html(PGP) www.phantom.com/~darkcyde (DarkCyde) www.phred.org (The Phred Networking Organization) www.primenet.com/~kludge/haqr.html (Kludge) www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography) www.raptor.com (Raptor) www.research.att.com (AT&T) www.rocksoft.com/rocksoft/integrity_links.html(Security and Integrity Links) www.rogers.com (Rogers Communications) www.rourkem.com (FakeMail FAQ) www.rsa.com (RSA Data Security) www.safe.net www.sctc.com (Secure Computing Corporation) www.service.com/cm/uswest/usw1.html (USWest) www.soci.niu.edu/~cudigest www.somarsoft.com (Somarsoft) www.soscorp.com (Sources of Supply Corp) www.spy.org (Computer Systems Consulting) www.sri.com (SRI) www.stentor.ca (Stentor (Canadian telcos)) www.tecc.co.uk/public/uk-telecom/btns.html (BT "star services") www.telecom.ie (Telecom Eireann) www.telecoms-mag.com/tcs.html (Telecommunications Magazine) www.telkom.co.za (Telkom S.A. Ltd) www.telstra.com.au/info/security.html (Security Reference Index) www.tezcat.com/web/security/security_top_level.html www.tis.com (Trusted Information Systems) www.tregistry.com/ttr (Telecomunications Training Courses) www.tri.sbc.com (Southwestern Bell) www.tricon.net/Comm/synapse (Synapse Magazine) www.uci.agh.edu.pl/pub/security (Security) www.uknet.net/pnc (The Personal Number Company) www.umcc.umich.edu/~doug/virus-faq.html (Virus) www.usfca.edu/crackdown/crack.html (Hacker Crackdown) www.videotron.co.uk (Videotron) www.vodafone.co.uk (Vodafone) www.vptt.ch/natel.html (Natel) www.vtw.org www.well.com/user/abacard www.well.com/user/crunch (Captain Crunch) www2.undernet.org:8080/~cs93jtl/IRC.html (IRC)
(Italic indicates updated sites, while bold indicates new sites.)
7. What are some IRC channels of interest to hackers?
#2600 #cellular #hack #phreak #linux #realhack #root #unix #warez
8. What are some BBS's of interest to hackers?
Rune Stone (203)832-8441 NUP: Cyberek The Truth Sayer's Domain (210)493-9975 Hacker's Haven (303)343-4053 Independent Nation (413)573-1809 Ut0PiA (315)656-5135 underworld_1994.com (514)683-1894 Alliance Communications (612)251-8596 Maas-Neotek (617)855-2923 Apocalypse 2000 (708)676-9855 K0dE Ab0dE (713)579-2276 fARM R0Ad 666 (713)855-0261 kn0wledge Phreak <k0p> BBS (719)578-8288 NUP=NO NUP The Edge of Reality (805)496-7460 Static Line (806)747-0802 Area 51 (908)526-4384 The Drunk Forces +972-3-5733477(Italic indicates updated sites, while bold indicates new sites.)
9. What books are available on this subject?
Computer Security Basics Author: Deborah Russell and G.T. Gengemi Sr. Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-71-4 This is an excellent book. It gives a broad overview of computer security without sacrificing detail. A must read for the beginning security expert. Information Systems Security Author: Philip Fites and Martin Kratz Publisher: Van Nostrad Reinhold Copyright Date: 1993 ISBN: 0-442-00180-0 Computer Related Risks Author: Peter G. Neumann Publisher: Addison-Wesley Copyright Date: 1995 ISBN: 0-201-55805-X Computer Security Management Author: Karen Forcht Publisher: Boyd and Fraser Copyright Date: 1994 ISBN: 0-87835-881-1 The Stephen Cobb Complete Book of PC and LAN Security Author: Stephen Cobb Publisher: Windcrest Books Copyright Date: 1992 ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback) Security in Computing Author: Charles P. Pfleeger Publisher: Prentice Hall Copyright Date: 1989 ISBN: 0-13-798943-1 Building a Secure Computer System Author: Morrie Gasser Publisher: Van Nostrand Reinhold Co., New York. Copyright Date: ISBN: 0-442-23022-2 Modern Methods for Computer Security Author: Lance Hoffman Publisher: Prentice Hall Copyright Date: 1977 ISBN: Windows NT 3.5 Guidelines for Security, Audit and Control Author: Publisher: Microsoft Press Copyright Date: ISBN: 1-55615-814-9 Protection and Security on the Information Superhighway Author: Dr. Frederick B. Cohen) Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-11389-1 Commonsense Computer Security Author: Martin Smith Publisher: McGraw-Hill Copyright Date: 1993 ISBN: 0-07-707805-5 Combatting Computer Crime Author: Jerry Papke Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc. Copyright Date: 1992 ISBN: 0-8306-7664-3 Computer Crime: a Crimefighters Handbook Author: David Icove, Karl Seger and William VonStorch Publisher: O'Reilly & Associates Copyright Date: 1995 ISBN: 1-56592-086-4
Practical Unix Security Author: Simson Garfinkel and Gene Spafford Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-72-2 Finally someone with a very firm grasp of Unix system security gets down to writing a book on the subject. Buy this book. Read this book. Firewalls and Internet Security Author: William Cheswick and Steven Bellovin Publisher: Addison Wesley Copyright Date: 1994 ISBN: 0-201-63357-4 Unix System Security Author: Rik Farrow Publisher: Addison Wesley Copyright Date: 1991 ISBN: 0-201-57030-0 Unix Security: A Practical Tutorial Author: N. Derek Arnold Publisher: McGraw Hill Copyright Date: 1993 ISBN: 0-07-002560-6 Unix System Security: A Guide for Users and Systems Administrators Author: David A. Curry Publisher: Addison-Wesley Copyright Date: 1992 ISBN: 0-201-56327-4 Unix System Security Author: Patrick H. Wood and Stephen G. Kochan Publisher: Hayden Books Copyright Date: 1985 ISBN: 0-672-48494-3 Unix Security for the Organization Author: Richard Bryant Publisher: Sams Copyright Date: 1994 ISBN: 0-672-30571-2 Building Internet Firewalls Author: D. Brent Chapman and Elizabeth D. Zwicky Publisher: O'Reilly and Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-124-0 Unix System Security Essentials Author: Christopher Braun Publisher: Addison Wesley Copyright Date: 1995 ISBN: 0-201-42775-3 Internet Firewalls and Network Security Author: Karanjit S. Siyan and Chris Hare Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-437-6
Network Security Secrets Author: David J. Stang and Sylvia Moon Publisher: IDG Books Copyright Date: 1993 ISBN: 1-56884-021-7 Not a total waste of paper, but definitely not worth the $49.95 purchase price. The book is a rehash of previously published information. The only secret we learn from reading the book is that Sylvia Moon is a younger woman madly in love with the older David Stang. Complete Lan Security and Control Author: Peter Davis Publisher: Windcrest / McGraw Hill Copyright Date: 1994 ISBN: 0-8306-4548-9 and 0-8306-4549-7 Network Security Author: Steven Shaffer and Alan Simon Publisher: AP Professional Copyright Date: 1994 ISBN: 0-12-638010-4 Network Security: How to Plan For It and How to Achieve It Author: Richard M. Baker Publisher: McGraw-Hill, Inc. Copyright Date: ISBN: 0-07-005141-0 Network Security Author: Steven L. Shaffer and Alan R. Simon Publisher: Academic Press Copyright Date: 1994 ISBN: 0-12-638010-4 Network Security: Private Communications in a Public World Author: Charlie Kaufman, Radia Perlman and Mike Speciner Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-13-061466-1 Network and Internetwork Security: Principles and Practice Author: William Stallings Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-02-415483-0 Implementing Internet Security Author: William Stallings Publisher: New Rider Publishing Copyright Date: 1995 ISBN: 1-56205-471-6 Actually Useful Internet Security Techniques Author: Larry J. Hughes, Jr. Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-508-9
Applied Cryptography: Protocols, Algorithms, and Source Code in C Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-59756-2 Bruce Schneier's book replaces all other texts on cryptography. If you are interested in cryptography, this is a must read. This may be the first and last book on cryptography you may ever need to buy. Cryptography and Data Security Author: Dorothy Denning Publisher: Addison-Wesley Publishing Co. Copyright Date: 1982 ISBN: 0-201-10150-5 Protect Your Privacy: A Guide for PGP Users Author: William Stallings Publisher: Prentice-Hall Copyright Date: 1994 ISBN: 0-13-185596-4 Codebreakers Author: Kahn Publisher: Simon and Schuster Copyright Date: ISBN:0-02-560460-0 Codebreakers: The Inside Story of Bletchley Park Author: Francis Harry Hinsley and Alan Stripp Publisher: Oxford University Press, Copyright Date: 1993 ISBN:0-19-285304-X Cryptanalysis, a study of ciphers and their solution Author: Gaines, Helen Fouche Publisher: Dover Publications Copyright Date: 1956 ISBN: Computer Privacy Handbook Author: Andre' Bacard Publisher: Peachpit Press Copyright Date: 1995 ISBN: 1-56609-171-3 E-Mail Security with PGP and PEM Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-05318-X PGP: Pretty Good Privacy Author: Simson Garfinkel Publisher: O'Reilly & Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-098-8
The Little Black Book of Computer Viruses Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1990 ISBN: 0-929408-02-0 The original, and still the best, book on computer viruses. No media hype here, just good clean technical information. The Giant Black Book of Computer Viruses Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1995 ISBN: Computer Viruses, Artificial Life and Evolution Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1993 ISBN: 0-929408-07-1 Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System Author: John McAfee and Colin Haynes Publisher: St. Martin's Press Copyright Date: 1989 ISBN: 0-312-03064-9 and 0-312-02889-X The Virus Creation Labs: A Journey Into the Underground Author: George Smith Publisher: American Eagle Publications Copyright Date: 1994 ISBN: The Virus Creation Labs: A Journey Into the Underground Author: George Smith Publisher: American Eagle Publications Copyright Date: 1994 ISBN: 0-929408-09-8 A Short Course on Computer Viruses Author: Dr. Fred Cohen Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-00769-2 Robert Slade's Guide to Computer Viruses Author: Robert Slade Publisher: Springer-Verlag Copyright Date: 1994 ISBN: 0-387-94311-0 / 3-540-94311-0
Engineering and Operations in the Bell System Author: R.F. Rey Publisher: Bell Telephont Laboratories Copyright Date: 1983 ISBN: 0-932764-04-5 Although hopelessly out of date, this book remains *THE* book on telephony. This book is 100% Bell, and is loved by phreaks the world over. Telephony: Today and Tomorrow Author: Dimitris N. Chorafas Publisher: Prentice-Hall Copyright Date: 1984 ISBN: 0-13-902700-9 The Telecommunications Fact Book and Illustrated Dictionary Author: Ahmed S. Khan Publisher: Delmar Publishers, Inc. Copyright Date: 1992 ISBN: 0-8273-4615-8 I find this dictionary to be an excellent reference book on telephony, and I recommend it to anyone with serious intentions in the field. Tandy/Radio Shack Cellular Hardware Author: Judas Gerard and Damien Thorn Publisher: Phoenix Rising Communications Copyright Date: 1994 ISBN: The Phone Book Author: Carl Oppendahl Publisher: Consumer Reports Copyright Date: ISBN: 0-89043-364-X Listing of every cellular ID in the us, plus roaming ports, and info numbers for each carrier. Principles of Caller I.D. Author: Publisher: International MicroPower Corp. Copyright Date: ISBN:
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Author: Bruce Sterling Publisher: Bantam Books Copyright Date: 1982 ISBN: 0-553-56370-X Bruce Sterling has recently released the book FREE to the net. The book is much easier to read in print form, and the paperback is only $5.99. Either way you read it, you will be glad you did. Mr. Sterling is an excellent science fiction author and has brought his talent with words to bear on the hacking culture. A very enjoyable reading experience. Cyberpunk Author: Katie Hafner and John Markoff Publisher: Simon and Schuster Copyright Date: 1991 ISBN: 0-671-77879-X The Cuckoo's Egg Author: Cliff Stoll Publisher: Simon and Schuster Copyright Date: 1989 ISBN: 0-671-72688-9 Hackers: Heroes of the Computer Revolution Author: Steven Levy Publisher: Doubleday Copyright Date: 1984 ISBN: 0-440-13495-6
The Hacker's Handbook Author: Hugo Cornwall Publisher: E. Arthur Brown Company Copyright Date: ISBN: 0-912579-06-4 Secrets of a Super Hacker Author: The Knightmare Publisher: Loompanics Copyright Date: 1994 ISBN: 1-55950-106-5 The Knightmare is no super hacker. There is little or no real information in this book. The Knightmare gives useful advice like telling you not to dress up before going trashing. The Knightmare's best hack is fooling Loompanics into publishing this garbage. The Day The Phones Stopped Author: Leonard Lee Publisher: Primus / Donald I Fine, Inc. Copyright Date: 1992 ISBN: 1-55611-286-6 Total garbage. Paranoid delusions of a lunatic. Less factual data that an average issue of the Enquirer. Information Warfare Author: Winn Swartau Publisher: Thunder Mountain Press Copyright Date: 1994 ISBN: 1-56025-080-1 An Illustrated Guide to the Techniques and Equipment of Electronic Warfare Author: Doug Richardson Publisher: Salamander Press Copyright Date: ISBN: 0-668-06497-8(Bold indicates new books.)
10. What are some videos of interest to hackers?
Unauthorized Access by Annaliza Savage $25 on VH S format in 38-min Savage Productions 1803 Mission St., #406 Santa Cruz, CA 95060 Hacker's '95 - a Phon-E & R.F. Burns Production See the video Emmanuel Goldstein thought would have the Feds knocking at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the Secret Service briefing on Operation Cyber Snare (recent cell busts) Talks on Crypto, HERF, the Feds, etc. All information is presented for educational purposes only. Not for sale to government or law enforcement organizations. Running time aproximately 90 minutes. $25.00 NTSC VHS $35.00 PAL/Secam VHS Custom Video Productions (908)842-6378 email@example.com
11. What are some mailing lists of interest to hackers?
Academic Firewalls Reflector Address: Registration Address: Send a message to firstname.lastname@example.org containing the line "subscribe firewalls user@host" The Alert Registration Address: Send a message to email@example.com containing the line "subscribe alert" Bugtraq Reflector Address: firstname.lastname@example.org Registration Address: email@example.com Cert Tools Reflector Address: firstname.lastname@example.org Registration Address: email@example.com Computers and Society Reflector Address: firstname.lastname@example.org Registration Address: email@example.com Coordinated Feasibility Effort to Unravel State Data Reflector Address: firstname.lastname@example.org Registration Address: CPSR Announcement List Reflector Address: email@example.com Registration Address: CPSR - Intellectual Property Reflector Address: firstname.lastname@example.org Registration Address: CPSR - Internet Library Reflector Address: email@example.com Registration Address: Cypherpunks Registration Address: Send a message to firstname.lastname@example.org containing the line "subscribe cypherpunks" DefCon Announcement List Reflector Address: Registration Address: Send a message to email@example.com containing the line "subscribe dc-announce" DefCon Chat List Reflector Address: Registration Address: Send a message to firstname.lastname@example.org containing the line "subscribe dc-stuff" Discount Long Distance Digest Registration Address: Send a message to: email@example.com containing the line "subscribe" Electronic Payment Reflector Address: Registration Address: firstname.lastname@example.org IDS (Intruder Detection Systems) Reflector Address: Registration Address: Send a message to email@example.com containing the line "subscribe ids" Information Warfare Registration Address: E-mail firstname.lastname@example.org with a request to be added. Linux-Alert Registration Address: email@example.com Linux-Security Registration Address: firstname.lastname@example.org Macintosh Security Reflector Address: email@example.com Registration Address: firstname.lastname@example.org NeXT Managers Reflector Address: Registration Address: email@example.com PGP3 announcement list Reflector Address: Registration Address: firstname.lastname@example.org Subject: Your Name(Italic indicates updated lists, while bold indicates new lists.)
Body: *ignored* Phiber-Seream Reflector Address: Registration Address: Send a message to email@example.com containing the line "subscribe phiber-scream user@host" phruwt-l (Macintosh H/P) Reflector Address: Registration Address: Send a message to firstname.lastname@example.org with the subject "phruwt-l" rfc931-users Reflector Address: email@example.com Registration Address: firstname.lastname@example.org RSA Users Reflector Address: email@example.com Registration Address: firstname.lastname@example.org Surveillance/Security Reflector Address: Registration Address: Send a message to email@example.com with "subscribe" in the subject. WWW Security Reflector Address: Registration Address: firstname.lastname@example.org
12. What are some print magazines of interest to hackers?
E-mail addresses: email@example.com - to get info on 2600 firstname.lastname@example.org - to get a copy of our index email@example.com - for info on starting your own meeting firstname.lastname@example.org - for subscription problems email@example.com - to send us a letter firstname.lastname@example.org - to send us an article email@example.com - to send us a general message Subscription Address: 2600 Subscription Dept PO Box 752 Middle Island, NY 11953-0752 Letters and article submission address: 2600 Editorial Dept PO Box 99 Middle Island, NY 11953-0099 Phone Number: (516)751-2600 Fax Number: (516)474-2677 Voice BBS: (516)473-2626 Subscriptions: United States: $21/yr individual, $50 corporate. Overseas: $30/yr individual, $65 corporate.
Gray Areas examines gray areas of law and morality and subject matter which is illegal, immoral and/or controversial. Gray Areas explores why hackers hack and puts hacking into a sociological framework of deviant behavior. E-Mail Address: firstname.lastname@example.org E-Mail Address: email@example.com U.S. Mail Address: Gray Areas PO Box 808 Broomall, PA 19008 Subscriptions: $26.00 4 issues first class $34.00 4 issues foreign (shipped air mail)
Privacy Newsletter is a monthly newsletter devoted to showing consumers how to get privacy and keep it. E-Mail Address: firstname.lastname@example.org Subscription Address: Privacy Newsletter P.O. Box 8206 Philadelphia, PA 19101-8206 Subscriptions: $99/yr (US) $149/yr (Overseas)
Subscription Address: email@example.com or: Wired PO Box 191826 San Francisco, CA 94119-9866 Letters and article submission address: firstname.lastname@example.org or: Wired 544 Second Street San Francisco, CA 94107-1427 Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
T & L Publications 430 Princeland Court Corona, CA 91719 (800)783-4624 (Voice) (Subscription Only Order Line) (909)371-8497 (Voice) (909)371-3052 (Fax) CIS: 74262,3664
P.O. Box 64 Brewster, NY 10509 Frequency: Bimonthly Domestic Subscription Rate: $15/year (6 issues)
5150 Fair Oaks Blvd. #101-348 Carmichael, CA 95608 USA E-Mail: email@example.com Subscriptions: $24 a year for six issues Text of back issues are at the etext archive at Michigan. Gopher over or ftp to: ftp.etext.org/pub/Zines/PrivateLine
13. What are some e-zines of interest to hackers?
CoTNo: Communications of The New Order ftp.etext.org /pub/Zines/CoTNo Empire Times ftp.etext.org /pub/Zines/Emptimes FEH ftp.fc.net /pub/defcon/FEH The Infinity Concept infonexus.com /pub/Philes/Zines/TheInfinityConcept Phrack ftp.fc.net /pub/phrack
14. What are some organizations of interest to hackers?
By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy.
Every project we undertake is based on five principles:
CPSR Membership Categories 75 REGULAR MEMBER 50 Basic member 200 Supporting member 500 Sponsoring member 1000 Lifetime member 20 Student/low income member 50 Foreign subscriber 50 Library/institutional subscriber CPSR National Office P.O. Box 717 Palo Alto, CA 94301 415-322-3778 415-322-3798 (FAX) E-mail: firstname.lastname@example.org
Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations.
The Electronic Frontier Foundation, Inc. 666 Pennsylvania Avenue S.E., Suite 303 Washington, D.C. 20003 +1 202 544 9237 +1 202 547 5481 FAX Internet: email@example.com
The Free Software Foundation is dedicated to eliminating restrictions on people's right to use, copy, modify, and redistribute computer programs. We promote the development and use of free software in all areas using computers. Specifically, we are putting together a complete, integrated software system named "GNU" ("GNU's Not Unix", pronounced "guh-new") that will be upwardly compatible with Unix. Most parts of this system are already being used and distributed.
The word "free" in our name refers to freedom, not price. You may or may not pay money to get GNU software, but regardless you have two specific freedoms once you get it: first, the freedom to copy a program and give it away to your friends and co-workers; and second, the freedom to change a program as you wish, by having full access to source code. You can study the source and learn how such programs are written. You may then be able to port it, improve it, and share your changes with others. If you redistribute GNU software you may charge a distribution fee or give it away, so long as you include the source code and the GPL (GNU General Public License).
Free Software Foundation, Inc. Telephone: +1-617-876-3296 673 Massachusetts Avenue Fax: +1-617-492-9057 Cambridge, MA 02139-3309 USA Fax (in Japan): 0031-13-2473 (KDD) Electronic mail: firstname.lastname@example.org 0066-3382-0158 (IDC)
GNU is to be a complete integrated computational environment: everything you need to work with a computer, either as a programmer or as a person in an office or home. The core is an operating system, which consists of a central program called a kernel that runs the other programs on the computer, and a large number of ancillary programs for handling files, etc. The Free Software Foundation is developing an advanced kernel called the Hurd.
A complete system has tools for programmers, such as compilers and debuggers. It also has editors, sketchpads, calendars, calculators, spreadsheets, databases, electronic mail readers, and Internet navigators. The FSF already distributes most of the programs used in an operating system, all the tools regularly used by programmers, and much more.
The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston.
"Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation.
We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices.
Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome.
To contact the League, phone (617) 243-4091, send Internet mail to the address email@example.com, or write to:
League for Programming Freedom 1 Kendall Square #143 P.O. Box 9171 Cambridge, MA 02139 USA
SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter.
The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media.
SotMesc memberships are $20 to students and $40 to regular members.
SotMESC P.O. Box 573 Long Beach, MS 39560
CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (184.108.40.206), where security-related documents, past CERT advisories, and tools are archived.
CERT contact information: U.S. mail address CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 U.S.A. Internet E-mail address firstname.lastname@example.org Telephone number +1 412-268-7090 (24-hour hotline) CERT Coordination Center personnel answer 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for emergencies during other hours. FAX number +1 412-268-6989
15. What are some radio programs of interest to hackers?
Off The Hook New York 99.5 FM Wed 10pm EST Full Disclosure Live Short Wave WWCR 5065 kHz Sun 8pm EST Full Disclosure Live Oil City, PA WOYL AM-1340 Sun 8pm EST Full Disclosure Live Satellite Telstar 302 (T2), Ch 21, 5.8 Sun 8pm EST
16. What are other FAQ's of interest to hackers?
Frequently Asked Questions "Hacking Novell Netware" Author: Simple Nomad
ftp: ftp.fastlane.net /pub/nomad/nw/faq.zip ftp: ftp.best.com /pub/almcepud/hacks/faq.zip http://www.nmrc.org/faqs/netware The PGP Attack FAQ Author: Route [email@example.com / firstname.lastname@example.org] ftp: infonexus.com /pub/Philes/Cryptography/PGPattackFAQ.txt.gz Mac Hack FAQ: Defeating Security Author: AX1P (email@example.com) Frequently Asked Questions About Red Boxing Author: Mr. Sandman (firstname.lastname@example.org) VMS FAQ (Frequently Ask Questions) Author: The Beaver (email@example.com) Anonymous FTP FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/anonftp Compromise FAQ: What if your Machines are Compromised by an Intruder Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/compromise Security Patches FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/patch Sniffer FAQ Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/sniff Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches Author: Christopher Klaus of Internet Security Systems, Inc. ftp: ftp.iss.net /pub/faq/vendor Cryptography FAQ Author: The Crypt Cabal ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/ Firewalls FAQ Author: Marcus J. Ranum (firstname.lastname@example.org) ftp: rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/ Buying a Used Scanner Radio Author: email@example.com (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ How to Find Scanner Frequencies Author: firstname.lastname@example.org (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ Introduction to Scanning Author: email@example.com (Bob Parnass, AJ9S) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/ Low Power Broadcasting FAQ Author: Rick Harrison. ftp: rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/ RSA Cryptography Today FAQ Author: Paul Fahn ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/ VIRUS-L comp.virus Frequently Asked Questions (FAQ) Author: Kenneth R. van Wyk <firstname.lastname@example.org> ftp: rtfm.mit.edu /pub/usenet-by-group/comp.virus/ Where to get the latest PGP (Pretty Good Privacy) FAQ Author: email@example.com (Michael Johnson) ftp: rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/ alt.locksmithing answers to Frequently Asked Questions (FAQ) Author: firstname.lastname@example.org (Joe Ilacqua) ftp: rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/ comp.os.netware.security FAQ Author: Fauzan Mirza <email@example.com> ftp: rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/ rec.pyrotechnics FAQ Author: firstname.lastname@example.org (Hans Josef Wagemueller) ftp: rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/
17. Where can I purchase a magnetic stripe encoder/decoder?
CPU Advance PO Box 2434 Harwood Station Littleton, MA 01460 (508)624-4819 (Fax) Omron Electronics, Inc. One East Commerce Drive Schaumburg, IL 60173 (800)556-6766 (Voice) (708)843-7787 (Fax) Security Photo Corporation 1051 Commonwealth Avenue Boston, MA 02215 (800)533-1162 (Voice) (617)783-3200 (Voice) (617)783-1966 (Voice) Timeline Inc, 23605 Telo Avenue Torrence, CA 90505 (800)872-8878 (Voice) (800)223-9977 (Voice) Alltronics 2300 Zanker Road San Jose CA 95131 (408) 943-9774 Voice (408) 943-9776 Fax (408) 943-0622 BBS Part Number: 92U067 Atalla Corp San Jose, CA (408) 435-8850
18. What are the rainbow books and how can I get them?
Orange Book DoD 5200.28-STD Department of Defense Trusted Computer System Evaluation Criteria Green Book CSC-STD-002-85 Department of Defense Password Management Guideline Yellow Book CSC-STD-003-85 Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments Yellow Book CSC-STD-004-85 Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. Tan Book NCSC-TG-001 A Guide to Understanding Audit in Trusted Systems Bright Blue Book NCSC-TG-002 Trusted Product Evaluation -- A Guide for Vendors Neon Orange Book NCSC-TG-003 A Guide to Understanding Discretionary Access Control in Trusted Systems Teal Green Book NCSC-TG-004 Glossary of Computer Security Terms Red Book NCSC-TG-005 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Orange Book NCSC-TG-006 A Guide to Understanding Configuration Management in Trusted Systems Burgundy Book NCSC-TG-007 A Guide to Understanding Design Documentation in Trusted Systems Dark Lavender Book NCSC-TG-008 A Guide to Understanding Trusted Distribution in Trusted Systems Venice Blue Book NCSC-TG-009 Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria Aqua Book NCSC-TG-010 A Guide to Understanding Security Modeling in Trusted Systems Dark Red Book NCSC-TG-011 Trusted Network Interpretation Environments Guideline -- Guidance for Applying the Trusted Network Interpretation Pink Book NCSC-TG-013 Rating Maintenance Phase -- Program Document Purple Book NCSC-TG-014 Guidelines for Formal Verification Systems Brown Book NCSC-TG-015 A Guide to Understanding Trusted Facility Management Yellow-Green Book NCSC-TG-016 Guidelines for Writing Trusted Facility Manuals Light Blue NCSC-TG-017 A Guide to Understanding Identification and Authentication in Trusted Systems Light Blue Book NCSC-TG-018 A Guide to Understanding Object Reuse in Trusted Systems Blue Book NCSC-TG-019 Trusted Product Evaluation Questionnaire Gray Book NCSC-TG-020A Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System Lavender Book NCSC-TG-021 Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria Yellow Book NCSC-TG-022 A Guide to Understanding Trusted Recovery in Trusted Systems Bright Orange Book NCSC-TG-023 A Guide to Understandng Security Testing and Test Documentation in Trusted Systems Purple Book NCSC-TG-024 (Volume 1/4) A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements Purple Book NCSC-TG-024 (Volume 2/4) A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators Purple Book NCSC-TG-024 (Volume 3/4) A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial Purple Book NCSC-TG-024 (Volume 4/4) A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors Green Book NCSC-TG-025 A Guide to Understanding Data Remanence in Automated Information Systems Hot Peach Book NCSC-TG-026 A Guide to Writing the Security Features User's Guide for Trusted Systems Turquiose Book NCSC-TG-027 A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems Violet Book NCSC-TG-028 Assessing Controlled Access Protection Blue Book NCSC-TG-029 Introduction to Certification and Accreditation Light Pink Book NCSC-TG-030 A Guide to Understanding Covert Channel Analysis of Trusted Systems C1 Technical Report-001 Computer Viruses: Prevention, Detection, and Treatment C Technical Report 79-91 Integrity in Automated Information Systems C Technical Report 39-92 The Design and Evaluation of INFOSEC systems: The Computer Security Contributions to the Composition Discussion NTISSAM COMPUSEC/1-87 Advisory Memorandum on Office Automation Security Guideline You can get your own free copy of any or all of the books by writing or calling: INFOSEC Awareness Division ATTN: X711/IAOC Fort George G. Meade, MD 20755-6000 Barbara Keller (410) 766-8729 If you ask to be put on the mailing list, you'll get a copy of each new book as it comes out (typically a couple a year).(Bold indicates I have not personally seen this book and/or I believe it may not be available.)