Section D: Resources

Table of Contents

  1. What are some FTP sites of interest to hackers?
  2. What are some FSP sites of interest to hackers?
  3. What are some newsgroups of interest to hackers?
  4. What are some telnet sites of interest to hackers?
  5. What are some gopher sites of interest to hackers?
  6. What are some World Wide Web (WWW) sites of interest to hackers?
  7. What are some IRC channels of interest to hackers?
  8. What are some BBS's of interest to hackers?
  9. What books are available on this subject?
  10. What are some videos of interest to hackers?
  11. What are some mailing lists of interest to hackers?
  12. What are some print magazines of interest to hackers?
  13. What are some e-zines of interest to hackers?
  14. What are some organizations of interest to hackers?
  15. What are some radio programs of interest to hackers?
  16. What are other FAQ's of interest to hackers?
  17. Where can I purchase a magnetic stripe encoder/decoder?
  18. What are the rainbow books and how can I get them?

(Italic indicates updated questions, while bold indicates new questions.)


1. What are some FTP sites of interest to hackers?

204.215.84.2            /pub/users-www/dmackey
aeneas.mit.edu                                          (Kerberos)
alex.sp.cs.cmu.edu      /links/security                 (Misc)
asylum.sf.ca.us                                    (CyberWarriors of Xanadu)
atari.archive.umich.edu /pub/atari/Utilities/pgp261st.zip (Atari PGP)
athena-dist.mit.edu     /pub/ATHENA                     (Athena Project)
atlantis.utmb.edu                                       (Anti-virus)
cert.org                                                (CERT)
ciac.llnl.gov                                           (CIAC)
cnit.nsk.su             /pub/security                   (Security)
coast.cs.purdue.edu     /pub                            (Security/COAST)
coombs.anu.edu.au       /pub/security                   (Security)
csrc.ncsl.nist.gov                                      (NIST Security)
ds.internic.net                                         (Internet documents)
ftp.2600.com                                            (2600 Magazine)
ftp.acns.nwu.edu        /pub                            (Mac Anti-virus)
ftp.acsu.buffalo.edu    /pub/security & /pub/irc        (Security & IRC)
ftp.alantec.com         /pub/tcpr                       (Tcpr)
ftp.armory.com          /pub/user/kmartind              (H/P)
ftp.auscert.org.au      /pub                            (Australian CERT)
ftp.bellcore.com                                        (Bellcore)
ftp.cerf.net            /pub/software/unix/security     (CERFnet)
ftp.cert.dfn.de                                         (FIRST)
ftp.cisco.com                                           (Cisco)
ftp.cs.colorado.edu
ftp.cs.ruu.nl           /pub/SECURITY                   (Security & PGP)
ftp.cs.uwm.edu          /pub/comp-privacy               (Privacy Digest)
ftp.cs.vu.nl
ftp.cs.yale.edu
ftp.csi.forth.gr        /pub/security
ftp.csl.sri.com         /pub/nides                      (SRI)
ftp.csn.org             /mpj                            (Cryptology)
ftp.cso.uiuc.edu        /security
ftp.csua.berkeley.edu   /pub/cypherpunks                (Crypto)
ftp.dartmouth.edu       /pub/security                   (Security)
ftp.delmarva.com
ftp.demon.co.uk         /pub/misc/general/0800num.txt   (0800/0500 numbers)
ftp.denet.dk            /pub/security/tools/satan
ftp.digex.net           /pub/access/dunk
ftp.dimensional.com     /users/jericho                  (H/P)
ftp.dimensional.com     /users/srain                    (H/P+Virus)
ftp.ee.lbl.gov
ftp.eff.org             /pub/Publications/CuD           (EFF)
ftp.elelab.nsc.co.jp    /pub/security                   (Security)
ftp.etext.org                                           (Etext)
ftp.etext.org           /pub/Zines/PrivateLine          (PrivateLine)
ftp.fastlane.net        /pub/nomad
ftp.fc.net              /pub/defcon                     (DefCon)
ftp.fc.net              /pub/defcon/BBEEP               (BlueBeep)
ftp.fc.net              /pub/phrack                     (Phrack)
ftp.foobar.com
ftp.funet.fi            /pub/doc/CuD
ftp.giga.or.at          /pub/hacker/                    (H/P)
ftp.greatcircle.com     /pub/firewalls                  (Firewalls)
ftp.ieunet.ie           /pub/security                   (Security)
ftp.ifi.uio.no
ftp.indirect.com        /www/evildawg/public_access
ftp.info.fundp.ac.be
ftp.infonexus.com                                       (The Guild)
ftp.informatik.uni-hamburg.de
ftp.informatik.uni-kiel.de /pub/sources/security
ftp.inoc.dl.nec.com     /pub/security                   (Security)
ftp.isi.edu
ftp.leo.org             /pub/comp/os/os2/crypt
ftp.lerc.nasa.gov       /security
ftp.llnl.gov            /pub                            (CIAC)
ftp.luth.se             /pub/unix/security
ftp.lysator.liu.se
ftp.mathematik.uni-ulm.de /pub/security             (Security)
ftp.mcs.anl.gov         /pub/security
ftp.nec.com
ftp.net.ohio-state.edu  /pub/security/satan
ftp.netcom.com          /pub/va/vandal                  (DnA)
ftp.netcom.com          /pub/zz/zzyzx                   (H/P)
ftp.netsys.com
ftp.nmt.edu             /pub/misc                       (Terrorist Handbook)
ftp.ocs.mq.edu.au       /PC/Crypt                       (Cryptology)
ftp.ox.ac.uk            /pub/comp/security
ftp.ox.ac.uk            /pub/crypto                     (Cryptology)
ftp.ox.ac.uk            /pub/wordlists                  (Wordlists)
ftp.paranoia.com        /pub/toneloc/tl110.zip          (ToneLoc)
ftp.pipex.net           /pub/areacode                   (uk areacodes)
ftp.pop.psu.edu
ftp.rahul.net           /pub/lps                        (Home of the FAQ)
ftp.sert.edu.au
ftp.sgi.com
ftp.smartlink.net       /pub/users/mikes/haq
ftp.stanford.edu        /general/security-tools/swatch  (SWATCH)
ftp.sunet.se            /pub/network/monitoring         (Ethernet sniffers)
ftp.technet.sg
ftp.technion.ac.il
ftp.tis.com             /pub                            (TIS)
ftp.tisl.ukans.edu      /pub/security
ftp.uni-koeln.de                                        (Wordlists)
ftp.uspto.gov
ftp.uu.net              /doc/literary/obi/Phracks       (Zines)
ftp.uwp.edu             /pub/dos/romulus/cracks         (Copy Protection)
ftp.vis.colostate.edu
ftp.vix.com
ftp.vortex.com
ftp.warwick.ac.uk       /pub/cud                        (Zines)
ftp.wi.leidenuniv.nl    /pub/security
ftp.win.tue.nl          /pub/security                   (Security)
ftp.wustl.edu           /doc/EFF                        (EFF)
ftp.wustl.edu           /pub/aminet/util/crypt
ftp.zoom.com
garbo.uwasa.fi          /pc/crypt                       (Cryptology)
gemini.tuc.noao.edu     /pub/grandi
gti.net                 /pub/safetynet
gumby.dsd.trw.com
hplyot.obspm.fr
idea.sec.dsi.unimi.it   /pub/crypt                      (Crypto)
info.mcs.anl.gov
jerico.usc.edu
l0pht.com                                               (The L0pht)
lod.com                                                 (Legion of Doom)
mac.archive.umich.edu
mirror.lcs.mit.edu      /telecom-archives               (Telecom archives)
monet.ccs.itd.umich.edu
net-dist.mit.edu        /pub/pgp
net.tamu.edu            /pub/security/TAMU              (Security)
nic.ddn.mil             /scc                            (DDN Security)
oak.oakland.edu         /pub/hamradio                   (Ham Radio)
oak.oakland.edu         /pub/simtelnet/msdos/sound      (DTMF decoders)
oak.oakland.edu         /pub/simtelnet/msdos/sysutl     (BIOS attackers)
parcftp.xerox.com
relay.cs.toronto.edu    /doc/telecom-archives           (Telecom)
research.att.com        /dist/internet_security         (AT&T)
ripem.msu.edu           /pub/crypt                      (Ripem)
rtfm.mit.edu                                            (Etext)
rtfm.mit.edu            /pub/usenet-by-group            (Usenet FAQ's)
scss3.cl.msu.edu        /pub/crypt                      (Cryptology)
sgigate.sgi.com         /Security                       (SGI Security)
src.doc.ic.ac.uk        /usenet/uk.telecom              (uk.telecom archives)
sunsolve1.sun.com
theta.iis.u-tokyo.ac.jp /security                       (Security)
ugle.unit.no
vic.cc.purdue.edu
whacked.l0pht.com                                       (Mac + H/P)

(Italic indicates updated sites, while bold indicates new sites.)


2. What are some fsp sites of interest to hackers?

None at this time.


3. What are some newsgroups of interest to hackers?

alt.2600                 Do it 'til it Hertz
alt.2600hz
alt.2600.codez
alt.2600.debate
alt.2600.moderated
alt.cellular
alt.cellular-phone-tech  Brilliant telephony mind blow netnews naming
alt.comp.virus           An unmoderated forum for discussing viruses
alt.comp.virus.source.code
alt.cracks               Heavy toolbelt wearers of the world, unite
alt.cyberpunk            High-tech low-life.
alt.cyberspace           Cyberspace and how it should work.
alt.dcom.telecom         Discussion of telecommunications technology
alt.engr.explosives      [no description available]
alt.fan.kevin-mitnick
alt.fan.lewiz            Lewis De Payne fan club
alt.hackers              Descriptions of projects currently under development
alt.hackintosh
alt.locksmithing         You locked your keys in *where*?
alt.hackers.malicious    The really bad guys - don't take candy from them
alt.ph.uk                United Kingdom version of alt.2600
alt.privacy.anon-server  Tech. & policy matters of anonymous contact servers
alt.radio.pirate         Hide the gear, here comes the magic station-wagons.
alt.radio.scanner        Discussion of scanning radio receivers.
alt.satellite.tv.europe  All about European satellite tv
alt.security             Security issues on computer systems
alt.security.index       Pointers to good stuff in misc.security (Moderated)
alt.security.keydist     Exchange of keys for public key encryption systems
alt.security.pgp         The Pretty Good Privacy package
alt.security.ripem       A secure email system illegal to export from the US
comp.dcom.cellular       [no description available]
comp.dcom.telecom        Telecommunications digest (Moderated)
comp.dcom.telecom.tech   [no description available]
comp.org.cpsr.announce   Computer Professionals for Social Responsibility
comp.org.cpsr.talk       Issues of computing and social responsibility
comp.org.eff.news        News from the Electronic Frontier Foundation
comp.org.eff.talk        Discussion of EFF goals, strategies, etc.
comp.os.netware.security Netware Security issues
comp.protocols.kerberos  The Kerberos authentification server
comp.protocols.tcp-ip    TCP and IP network protocols
comp.risks               Risks to the public from computers & users
comp.security.announce   Announcements from CERT about security
comp.security.firewalls   Anything pertaining to network firewall security
comp.security.misc       Security issues of computers and networks
comp.security.unix       Discussion of Unix security
comp.virus               Computer viruses & security (Moderated)
de.org.ccc               Mitteilungen des CCC e.V.
misc.security            Security in general, not just computers (Moderated)
rec.pyrotechnics         Fireworks, rocketry, safety, & other topics
rec.radio.scanner        [no description available]
rec.video.cable-tv       Technical and regulatory issues of cable television.
sci.crypt                Different methods of data en/decryption
(Italic indicates updated groups, while bold indicates new groups.)


4. What are some telnet sites of interest to hackers?

anarchy-online.com
ntiabbs.ntia.doc.gov                  (NTIA)
lust.isca.uiowa.edu 2600              (underground bbs) (temporarily down)
spy.org                               (Computer Systems Consulting)
(Italic indicates updated sites, while bold indicates new sites.)


5. What are some gopher sites of interest to hackers?

csrc.ncsl.nist.gov      (NIST Security Gopher)
gopher.cpsr.org         (Computer Professionals for Social Responsibility)
gopher.eff.org          (Electonic Frontier Foundation)
gopher.panix.com        (Panix)
iitf.doc.gov            (NITA -- IITF)
info.itu.ch             (International Telegraph Union)
ncjrs.aspensys.com      (National Criminal Justice Reference Service)
oss.net                 (Open Source Solutions)
wiretap.spies.com       (Wiretap)


6. What are some World wide Web (WWW) sites of interest to hackers?

alumni.caltech.edu/~dank/isdn                 (ISDN)
att.net/dir800                                (800 directory)
ausg.dartmouth.edu/security.html              (UNIX Security Topics)
ccnga.uwaterloo.ca/~jscouria/GSM              (GSM Specification)
cell-relay.indiana.edu/cell-relay             (Cell Relay Retreat)
ciac.llnl.gov                                 (CIAC Web Site)
csrc.ncsl.nist.gov                            (NIST)
daemon.apana.org.au/~longi
dcpu1.cs.york.ac.uk:6666/fisher/telecom       (Embryonic Telephone History Page)
freeside.com/phrack.html                      (Phrack Magazine)
ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling)
info.gte.com                                  (GTE Labrotories)
info.mcc.ac.uk/Orange/                        (Orange)
infosec.nosc.mil/infosec.html                 (SPAWAR INFOSEC)
iss.net/iss                                   (Internet Security Systems)
jumper.mcc.ac.uk/~afs/telecom                 (UK Telecom Pricing Information)
l0pht.com                                     (The l0pht)
l0pht.com/~spacerog/index.html                (Whacked Mac Archives)
lod.com                                       (Legion of Doom)
meridian.jammin.net/underground               (Underground Links)
mnementh.cs.adfa.oz.au/Lawrie_Brown.html      (Lawrie Brown's crypto bibliography)
motserv.indirect.com                          (Motorola)
nasirc.nasa.gov/NASIRC_home.html              (NASIRC)
pages.ripco.com:8080/~glr/glr.html            (Full Disclosure)
rschp2.anu.edu.au:8080/crypt.html
seclab.cs.ucdavis.edu/Security.html           (Security)
seclab.cs.ucdavis.edu/Security.html           (UCDavis.edu Security Page)
seclab.cs.ucdavis.edu/slides/slides.html      (Security Lab Slides)
seclab.cs.ucdavis.edu/slides/slides.html      (Security Lab Slides)
smurfland.cit.buffalo.edu/NetMan/index.html   (Network Management)
sunsite.unc.edu/sun/inform/sun-info.html      (Sun Microsystems Sponsor Page)
support.mayfield.hp.com                       (Hewlett Packard SupportLine Services)
the-tech.mit.edu                              (LaMacchia case info)
town.hall.org/university/security/stoll/cliff.html (Cliff Stoll)
turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995)
web.mit.edu/network/pgp.html                  (Getting PGP)
weber.u.washington.edu/~phantom/cpunk/index.html (Cryptology)
wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's Underground Links)
www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html
www-ns.rutgers.edu/www-security/index.html    (Rutger's documents on WWW security)
www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Box info)
www-swiss.ai.mit.edu/~bal/pks-toplev.html     (Findingsomeone's PGP key)
www.2600.com                                  (2600 Magazine)
www.8lgm.org                                  (8lgm Security Advisories)
www.aads.net                                  (Ameritech)
www.access.gpo.gov/su_docs
www.alw.nih.gov/WWW/security.html             (Unix Security)
www.artech-house.com                          (Artech House)
www.asg.unb.ca                                (Atlantic Systems Group Mosaic Index)
www.aston.ac.uk/~bromejt/mobile.html          (Mobile Phone Service Locator)
www.att.com                                   (ATT)
www.auditel.com                               (Auditel)
www.auscert.org.au                            (Australian CERT)
www.axent.com                                 (Axent Technologies)
www.bctel.com                                 (BC Tel)
www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html (X-Win)
www.bell.ca                                   (Bell Canada)
www.bellatlantic.com                          (Bell Atlantic)
www.bellcore.com/BETSI/betsi.html             (Betsi)
www.bellcore.com/SECURITY                     (Bellcore Security Products)
www.bellsouth.com                             (BellSouth)
www.bianca.com/bump/ua                        (Unauthorized Access Home Page)
www.border.com                                (Border Network Technologies)
www.bt.co.uk                                  (British Telecom)
www.careermosaic.com/cm/uswest                (USWest)
www.castle.net/~kobrien/telecom.html          (Telecom)
www.cco.caltech.edu/~rknop/amiga_pgp26.html
www.cdt.org/cda.html
www.cec.wustl.edu/~dmm2/egs/egs.html          (En Garde Systems)
www.cert.dfn.de                               (German First Team)
www.checkpoint.com                            (Checkpoint)
www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
www.cityscape.co.uk/users/ek80/index.html     (Inside Cable Cover)
www.cohesive.com                              (Cohesive Systems)
www.con.wesleyan.edu/~triemer/network/docservs.html
www.cosc.georgetown.edu/~denning/crypto       (The Cryptography Project)
www.cost.se                                   (COST Computer Security Technologies)
www.cpsr.org/home                             (CPSR)
www.crimson.com/isdn/telecomacry.txt          (Crimson's Telecommunications Acronyms)
www.crtc.gc.ca                                (CRTC - Canadian regulator)
www.cs.berkeley.edu/~raph/remailer-list.html  (Anon remailer list)
www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/sec.html (CMU Security)
www.cs.purdue.edu/coast/coast.html            (Coast)
www.cs.purdue.edu/pcert/pcert.html            (PCERT)
www.cs.tu-bs.de                               (Network management Tools)
www.csl.sri.com                               (SRI Computer Science Lab)
www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html
www.cwplc.com                                 (Cable and Wireless)
www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe)
www.cygnus.com/~gnu/export.html               (Cryptography Export Control Archives)
www.datafellows.fi                            (Data Fellows (F-Prot))
www.datasync.com/~sotmesc/sotmesc.html        (SotMESC)
www.dcs.exeter.ac.uk/~aba                     (Cypherpunk)
www.demon.co.uk/mobiles                       (C.C.Mobiles)
www.dhp.com                                   (DataHaven Project)
www.dhp.com/~pluvius                          (Pluvius' Home Page)
www.digicash.com/ecash/ecash-home.html        (Ecash Home Page)
www.digital.com/info/key-secure-index.html    (Digital Secure Systems)
www.dnai.com/~gui
www.dtic.dla.mil/defenselink                  (Office of the U.S. Secretary of Defense (OSD)
www.dtic.dla.mil/iac                          (DoD Information Analysis Center (IAC) Hub Page)
www.eecs.nwu.edu/~jmyers/bugtraq/about.html
www.eecs.nwu.edu/~jmyers/bugtraq/archives.html
www.eff.org
www.eff.org/pub/Alerts
www.eff.org/pub/Net_info/Tools/Crypto
www.engarde.com/~mcn
www.ensta.fr/internet/unix/sys_admin          (System administration)
www.ericsson.nl                               (Ericsson)
www.etext.org/Zines                           (Zines)
www.farmstead.com                             (Farmstead)
www.fastlane.net/homepages/thegnome           (Simple Nomad)
www.fbi.gov                                   (FBI Homepage)
www.fedworld.gov                              (Federal Government)
www.first.org                                 (FIRST)
www.flextel.com                               (FleXtel)
www.fonorola.net                              (Fonorola (a Canadian carrier)
www.frus.com                                  (Firewalls R Us)
www.fsk.ethz.ch/fsk                           (CSSCR)
www.gbnet.net/kbridge                         (KarlBridge)
www.ginch.org/~vixen                          (Empire Times)
www.greatcircle.com                           (Great Circle Associates)
www.gta.com                                   (Global Technology Associates)
www.gti.net/grayarea                          (Gray Areas)
www.hotwired.com                              (Wired Magazine)
www.hpcc.gov/blue94/section.4.6.html          (NSA)
www.iacr.org/~iacr                            (International Association of Cryptologic Research (IACR)
www.ic.gov                                    (Central Intelligence Agency Home Page)
www.ifi.uio.no/pgp
www.iminet.com/starlink                       (Starlink)
www.indirect.com/www/evildawg
www.ingress.com                               (Ingress Communications)
www.io.org/~djcl/phoneb.html
www.iquest.net/~oseidler                      (Oliver Seidler's WWW Page)
www.itd.nrl.navy.mil/ITD/5540                 (NRL Center for High Assurance Computer Systems)
www.itu.ch/TELECOM                            (Telecom '95)
www.jedefense.com/jed.html                    (Journal of Electronic Defense)
www.l0pht.com/cdc.html                        (Cult of the Dead Cow)
www.l0pht.com/radiophone                      (Radiophone Archive)
www.l0pht.com/~oblivion/IIRG.html             (International Information Retrieval Guild Archive Site)
www.lat.com                                   (Los Altos Technologies)
www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security)
www.links.net
www.louisville.edu/~wrbake01                  (The GodZ of CyberSpacE)
www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide)
www.mastercard.com                            (Secure Electronic Payment Protocol)
www.mgmua.com/hackers/index.html              (Hackers, the movie)
www.mhv.net/dcypher/keytrap.html              (Key Trap Home Page)
www.milkyway.com                              (Milkyway Networks Corporation)
www.mit.edu:8001/people/warlord/pgp-faq.html  (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements)
www.mot.com                                   (Motorola)
www.mwjournal.com/mwj.html                    (Microwave Journal)
www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html (Security in Mosaic)
www.ncsl.nist.gov                             (NIST Computer Systems Laboratory)
www.netpart.com                               (NetPartners)
www.nic.surfnet.nl/surfnet/security/cert-nl.html (CERT-NL)
www.nist.gov                                  (NIST)
www.nokia.com                                 (Nokia)
www.nortel.com                                (Northern Telecom)
www.ntt.jp                                    (Nippon Telephone)
www.nynex.co.uk/nynex                         (NYNEX)
www.odci.gov                                  (The CIA)
www.one2one.co.uk                             (Mercury One-2-One)
www.open.gov.uk/oftel/oftelwww/oftelhm.htm    (OFTEL's Home Page)
www.openmarket.com/info/cryptography/applied_cryptography.html
www.pacbell.com                               (Pacific Bell)
www.paranoia.com/hpa                          (Paranoia's H/P/A Links)
www.paranoia.com/~darkfox                     (Darkfox's Home Page)
www.paranoia.com/~ice9                        (Ice-9's Home Page)
www.paranoia.com/~mthreat                     (ToneLoc)
www.pegasus.esprit.ec.org/people/arne/pgp.html(PGP)
www.phantom.com/~darkcyde                     (DarkCyde)
www.phred.org                                 (The Phred Networking Organization)
www.primenet.com/~kludge/haqr.html            (Kludge)
www.quadralay.com/www/Crypt/Crypt.html        (Quadralay Cryptography)
www.raptor.com                                (Raptor)
www.research.att.com                          (AT&T)
www.rocksoft.com/rocksoft/integrity_links.html(Security and Integrity Links)
www.rogers.com                                (Rogers Communications)
www.rourkem.com                               (FakeMail FAQ)
www.rsa.com                                   (RSA Data Security)
www.safe.net
www.sctc.com                                  (Secure Computing Corporation)
www.service.com/cm/uswest/usw1.html           (USWest)
www.soci.niu.edu/~cudigest
www.somarsoft.com                             (Somarsoft)
www.soscorp.com                               (Sources of Supply Corp)
www.spy.org                                   (Computer Systems Consulting)
www.sri.com                                   (SRI)
www.stentor.ca                                (Stentor (Canadian telcos))
www.tecc.co.uk/public/uk-telecom/btns.html    (BT "star services")
www.telecom.ie                                (Telecom Eireann)
www.telecoms-mag.com/tcs.html                 (Telecommunications Magazine)
www.telkom.co.za                              (Telkom S.A. Ltd)
www.telstra.com.au/info/security.html         (Security Reference Index)
www.tezcat.com/web/security/security_top_level.html
www.tis.com                                   (Trusted Information Systems)
www.tregistry.com/ttr                         (Telecomunications Training Courses)
www.tri.sbc.com                               (Southwestern Bell)
www.tricon.net/Comm/synapse                   (Synapse Magazine)
www.uci.agh.edu.pl/pub/security               (Security)
www.uknet.net/pnc                             (The Personal Number Company)
www.umcc.umich.edu/~doug/virus-faq.html       (Virus)
www.usfca.edu/crackdown/crack.html            (Hacker Crackdown)
www.videotron.co.uk                           (Videotron)
www.vodafone.co.uk                            (Vodafone)
www.vptt.ch/natel.html                        (Natel)
www.vtw.org
www.well.com/user/abacard
www.well.com/user/crunch                      (Captain Crunch)
www2.undernet.org:8080/~cs93jtl/IRC.html      (IRC)

(Italic indicates updated sites, while bold indicates new sites.)


7. What are some IRC channels of interest to hackers?

#2600
#cellular
#hack
#phreak
#linux
#realhack
#root
#unix
#warez


8. What are some BBS's of interest to hackers?

Rune Stone                    (203)832-8441   NUP: Cyberek
The Truth Sayer's Domain      (210)493-9975
Hacker's Haven                (303)343-4053
Independent Nation            (413)573-1809
Ut0PiA                        (315)656-5135
underworld_1994.com           (514)683-1894
Alliance Communications       (612)251-8596
Maas-Neotek                   (617)855-2923
Apocalypse 2000               (708)676-9855
K0dE Ab0dE                    (713)579-2276
fARM R0Ad 666                 (713)855-0261
kn0wledge Phreak <k0p> BBS    (719)578-8288   NUP=NO NUP
The Edge of Reality           (805)496-7460
Static Line                   (806)747-0802
Area 51                       (908)526-4384
The Drunk Forces              +972-3-5733477
(Italic indicates updated sites, while bold indicates new sites.)


9. What books are available on this subject?

General Computer Security

Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4

	This is an excellent book.  It gives a broad overview of
	computer security without sacrificing detail.  A must read for
	the beginning security expert.

Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0

Computer Related Risks
Author: Peter G. Neumann
Publisher: Addison-Wesley
Copyright Date: 1995
ISBN: 0-201-55805-X

Computer Security Management
Author: Karen Forcht
Publisher: Boyd and Fraser
Copyright Date: 1994
ISBN: 0-87835-881-1

The Stephen Cobb Complete Book of PC and LAN Security
Author: Stephen Cobb
Publisher: Windcrest Books
Copyright Date: 1992
ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback)

Security in Computing
Author: Charles P. Pfleeger
Publisher: Prentice Hall
Copyright Date: 1989
ISBN: 0-13-798943-1

Building a Secure Computer System
Author: Morrie Gasser
Publisher: Van Nostrand Reinhold Co., New York.
Copyright Date:
ISBN: 0-442-23022-2

Modern Methods for Computer Security
Author: Lance Hoffman
Publisher: Prentice Hall
Copyright Date: 1977
ISBN:

Windows NT 3.5 Guidelines for Security, Audit and Control
Author:
Publisher: Microsoft Press
Copyright Date:
ISBN: 1-55615-814-9

Protection and Security on the Information Superhighway
Author: Dr. Frederick B. Cohen)
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-11389-1

Commonsense Computer Security
Author: Martin Smith
Publisher: McGraw-Hill
Copyright Date: 1993
ISBN: 0-07-707805-5

Combatting Computer Crime
Author: Jerry Papke
Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc.
Copyright Date: 1992
ISBN: 0-8306-7664-3

Computer Crime: a Crimefighters Handbook
Author: David Icove, Karl Seger and William VonStorch
Publisher: O'Reilly & Associates
Copyright Date: 1995
ISBN: 1-56592-086-4

Unix System Security

Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2

	Finally someone with a very firm grasp of Unix system security
	gets down to writing a book on the subject.  Buy this book.
	Read this book.

Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4

Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Copyright Date: 1991
ISBN: 0-201-57030-0

Unix Security: A Practical Tutorial
Author: N. Derek Arnold
Publisher: McGraw Hill
Copyright Date: 1993
ISBN: 0-07-002560-6

Unix System Security: A Guide for Users and Systems Administrators
Author: David A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4

Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3

Unix Security for the Organization
Author: Richard Bryant
Publisher: Sams
Copyright Date: 1994
ISBN: 0-672-30571-2

Building Internet Firewalls
Author: D. Brent Chapman and Elizabeth D. Zwicky
Publisher: O'Reilly and Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-124-0

Unix System Security Essentials
Author: Christopher Braun
Publisher: Addison Wesley
Copyright Date: 1995
ISBN: 0-201-42775-3

Internet Firewalls and Network Security
Author: Karanjit S. Siyan and Chris Hare
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-437-6

Network Security

Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7

	Not a total waste of paper, but definitely not worth the
	$49.95 purchase price.  The book is a rehash of previously
	published information.  The only secret we learn from reading
	the book is that Sylvia Moon is a younger woman madly in love
	with the older David Stang.

Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Date: 1994
ISBN: 0-8306-4548-9 and 0-8306-4549-7

Network Security
Author: Steven Shaffer and Alan Simon
Publisher: AP Professional
Copyright Date: 1994
ISBN: 0-12-638010-4

Network Security: How to Plan For It and How to Achieve It
Author: Richard M. Baker
Publisher: McGraw-Hill, Inc.
Copyright Date:
ISBN: 0-07-005141-0

Network Security
Author: Steven L. Shaffer and Alan R. Simon
Publisher: Academic Press
Copyright Date: 1994
ISBN: 0-12-638010-4

Network Security: Private Communications in a Public World
Author: Charlie Kaufman, Radia Perlman and Mike Speciner
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-13-061466-1

Network and Internetwork Security: Principles and Practice
Author: William Stallings
Publisher: Prentice Hall
Copyright Date: 1995
ISBN: 0-02-415483-0

Implementing Internet Security
Author: William Stallings
Publisher: New Rider Publishing
Copyright Date: 1995
ISBN: 1-56205-471-6

Actually Useful Internet Security Techniques
Author: Larry J. Hughes, Jr.
Publisher: New Riders Publishing
Copyright Date: 1995
ISBN: 1-56205-508-9

Cryptography

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-59756-2

	Bruce Schneier's book replaces all other texts on
	cryptography.  If you are interested in cryptography, this is
	a must read.  This may be the first and last book on
	cryptography you may ever need to buy.

Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5

Protect Your Privacy: A Guide for PGP Users
Author: William Stallings
Publisher: Prentice-Hall
Copyright Date: 1994
ISBN: 0-13-185596-4

Codebreakers
Author: Kahn
Publisher: Simon and Schuster
Copyright Date:
ISBN:0-02-560460-0

Codebreakers: The Inside Story of Bletchley Park
Author: Francis Harry Hinsley and Alan Stripp
Publisher: Oxford University Press,
Copyright Date: 1993
ISBN:0-19-285304-X

Cryptanalysis, a study of ciphers and their solution
Author: Gaines, Helen Fouche
Publisher: Dover Publications
Copyright Date: 1956
ISBN:

Computer Privacy Handbook
Author: Andre' Bacard
Publisher: Peachpit Press
Copyright Date: 1995
ISBN: 1-56609-171-3

E-Mail Security with PGP and PEM
Author: Bruce Schneier
Publisher: John Wiley & Sons
Copyright Date: 1995
ISBN: 0-471-05318-X

PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1995
ISBN: 1-56592-098-8

Programmed Threats

The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0

	The original, and still the best, book on computer viruses.
	No media hype here, just good clean technical information.

The Giant Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1995
ISBN:

Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1

Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
        Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X

The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN:

The Virus Creation Labs: A Journey Into the Underground
Author: George Smith
Publisher: American Eagle Publications
Copyright Date: 1994
ISBN: 0-929408-09-8

A Short Course on Computer Viruses
Author: Dr. Fred Cohen
Publisher: John Wiley & Sons
Copyright Date: 1994
ISBN: 0-471-00769-2

Robert Slade's Guide to Computer Viruses
Author: Robert Slade
Publisher: Springer-Verlag
Copyright Date: 1994
ISBN: 0-387-94311-0 / 3-540-94311-0

Telephony

Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5

        Although hopelessly out of date, this book remains *THE* book
        on telephony.  This book is 100% Bell, and is loved by phreaks
        the world over.

Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9

The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8

        I find this dictionary to be an excellent reference book on
        telephony, and I recommend it to anyone with serious
        intentions in the field.

Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:

The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-X

      Listing of every cellular ID in the us, plus roaming ports,
      and info numbers for each carrier.

Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:

Hacking History and Culture

The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X

	Bruce Sterling has recently released the book FREE to the net.
	The book is much easier to read in print form, and the
	paperback is only $5.99.  Either way you read it, you will be
	glad you did.  Mr. Sterling is an excellent science fiction
	author and has brought his talent with words to bear on the
	hacking culture.  A very enjoyable reading experience.

Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X

The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9

Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6

Unclassified

The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4

Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5

	The Knightmare is no super hacker.  There is little or no real
	information in this book.  The Knightmare gives useful advice
	like telling you not to dress up before going trashing.
	The Knightmare's best hack is fooling Loompanics into
	publishing this garbage.

The Day The Phones Stopped
Author: Leonard Lee
Publisher: Primus / Donald I Fine, Inc.
Copyright Date: 1992
ISBN: 1-55611-286-6

	Total garbage.  Paranoid delusions of a lunatic.  Less factual
	data that an average issue of the Enquirer.

Information Warfare
Author: Winn Swartau
Publisher: Thunder Mountain Press
Copyright Date: 1994
ISBN: 1-56025-080-1

An Illustrated Guide to the Techniques and Equipment of Electronic Warfare
Author: Doug Richardson
Publisher: Salamander Press
Copyright Date:
ISBN: 0-668-06497-8
(Bold indicates new books.)


10. What are some videos of interest to hackers?

Unauthorized Access by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060

Hacker's '95 - a Phon-E & R.F. Burns Production
See the video Emmanuel Goldstein thought would have the Feds knocking
at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y
fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric
BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the
Secret Service briefing on Operation Cyber Snare (recent cell busts)
Talks on Crypto, HERF, the Feds, etc.  All information is presented
for educational purposes only.  Not for sale to government or law
enforcement organizations.  Running time aproximately 90 minutes.
$25.00   NTSC VHS
$35.00   PAL/Secam VHS
Custom Video Productions
(908)842-6378
videocvp@ix.netcom.com


11. What are some mailing lists of interest to hackers?

Academic Firewalls
Reflector Address:
Registration Address: Send a message to majordomo@greatcircle.com
                      containing the line "subscribe firewalls user@host"

The Alert
Registration Address: Send a message to request-alert@iss.net
                      containing the line "subscribe alert"

Bugtraq
Reflector Address:    bugtraq@fc.net
Registration Address: bugtraq-request@fc.net

Cert Tools
Reflector Address:    cert-tools@cert.org
Registration Address: cert-tools-request@cert.org

Computers and Society
Reflector Address:    comp-soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com

Coordinated Feasibility Effort to Unravel State Data
Reflector Address:    ldc-sw@cpsr.org
Registration Address:

CPSR Announcement List
Reflector Address:    cpsr-announce@cpsr.org
Registration Address:

CPSR - Intellectual Property
Reflector Address:    cpsr-int-prop@cpsr.org
Registration Address:

CPSR - Internet Library
Reflector Address:    cpsr-library@cpsr.org
Registration Address:

Cypherpunks
Registration Address: Send a message to majordomo@toad.com
                      containing the line "subscribe cypherpunks"

DefCon Announcement List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
                      the line "subscribe dc-announce"

DefCon Chat List
Reflector Address:
Registration Address: Send a message to majordomo@fc.net containing
                      the line "subscribe dc-stuff"

Discount Long Distance Digest
Registration Address: Send a message to: dld-request@webcom.com
                      containing the line "subscribe"

Electronic Payment
Reflector Address:
Registration Address: e-payment@cc.bellcore.com

IDS (Intruder Detection Systems)
Reflector Address:
Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au
                      containing the line "subscribe ids"

Information Warfare
Registration Address: E-mail iw@all.net with a request to be added.

Linux-Alert
Registration Address: majordomo@linux.nrao.edu

Linux-Security
Registration Address: majordomo@linux.nrao.edu

Macintosh Security
Reflector Address:    mac-security@eclectic.com
Registration Address: mac-security-request@eclectic.com

NeXT Managers
Reflector Address:
Registration Address: next-managers-request@stolaf.edu

PGP3 announcement list
Reflector Address:
Registration Address: pgp-announce-request@lsd.com
                      Subject: Your Name 
                      Body: *ignored*

Phiber-Seream
Reflector Address:
Registration Address: Send a message to listserv@netcom.com
                      containing the line "subscribe phiber-scream user@host"

phruwt-l (Macintosh H/P)
Reflector Address:
Registration Address: Send a message to filbert@netcom.com
                      with the subject "phruwt-l"

rfc931-users
Reflector Address:    rfc931-users@kramden.acf.nyu.edu
Registration Address: brnstnd@nyu.edu

RSA Users
Reflector Address:    rsaref-users@rsa.com
Registration Address: rsaref-users-request@rsa.com

Surveillance/Security
Reflector Address:
Registration Address: Send a message to
                      surv-sec-request@sleepless.acm.uiuc.edu with
                      "subscribe" in the subject.

WWW Security
Reflector Address:
Registration Address: www-security@ns2.rutgers.edu
(Italic indicates updated lists, while bold indicates new lists.)


12. What are some print magazines of interest to hackers?

2600 - The Hacker Quarterly

E-mail addresses: info@2600.com - to get info on 2600
                  index@2600.com - to get a copy of our index
                  meetings@2600.com - for info on starting your own meeting
                  subs@2600.com - for subscription problems
                  letters@2600.com - to send us a letter
                  articles@2600.com - to send us an article
                  2600@2600.com - to send us a general message

Subscription Address: 2600 Subscription Dept
                      PO Box 752
                      Middle Island, NY  11953-0752

Letters and article submission address: 2600 Editorial Dept
                                        PO Box 99
                                        Middle Island, NY  11953-0099

Phone Number: (516)751-2600
Fax Number: (516)474-2677
Voice BBS: (516)473-2626

Subscriptions: United States: $21/yr individual, $50 corporate.
               Overseas: $30/yr individual, $65 corporate.

Gray Areas

Gray Areas examines gray areas of law and morality and subject matter
which is illegal, immoral and/or controversial. Gray Areas explores
why hackers hack and puts hacking into a sociological framework of
deviant behavior.

E-Mail Address: grayarea@well.sf.ca.us
E-Mail Address: grayarea@netaxs.com

U.S. Mail Address: Gray Areas
                   PO Box 808
                   Broomall, PA 19008

Subscriptions: $26.00 4 issues first class
               $34.00 4 issues foreign (shipped air mail)

Privacy Newsletter

Privacy Newsletter is a monthly newsletter devoted to showing
consumers how to get privacy and keep it.

E-Mail Address: privacy@interramp.com

Subscription Address: Privacy Newsletter
                      P.O. Box 8206
                      Philadelphia, PA 19101-8206


Subscriptions: $99/yr (US)  $149/yr (Overseas)

Wired

Subscription Address: subscriptions@wired.com
                  or: Wired
                      PO Box 191826
                      San Francisco, CA 94119-9866

Letters and article submission address: guidelines@wired.com
                                    or: Wired
                                        544 Second Street
                                        San Francisco, CA 94107-1427

Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)

Nuts & Volts

T & L Publications
430 Princeland Court
Corona, CA 91719
(800)783-4624 (Voice) (Subscription Only Order Line)
(909)371-8497 (Voice)
(909)371-3052 (Fax)
CIS: 74262,3664

Cybertek: The Cyberpunk Technical Journal

P.O. Box 64
Brewster, NY 10509

Frequency: Bimonthly
Domestic Subscription Rate: $15/year (6 issues)

PrivateLine

5150 Fair Oaks Blvd. #101-348
Carmichael, CA 95608 USA

E-Mail: privateline@delphi.com

Subscriptions: $24 a year for six issues

Text of back issues are at the etext archive at Michigan.  Gopher over
or ftp to: ftp.etext.org/pub/Zines/PrivateLine


13. What are some e-zines of interest to hackers?

CoTNo: Communications of The New Order    ftp.etext.org  /pub/Zines/CoTNo
Empire Times                              ftp.etext.org  /pub/Zines/Emptimes
FEH                                       ftp.fc.net     /pub/defcon/FEH
The Infinity Concept                      infonexus.com
                                          /pub/Philes/Zines/TheInfinityConcept
Phrack                                    ftp.fc.net     /pub/phrack


14. What are some organizations of interest to hackers?

Computer Professionals for Social Responsibility (CPSR)

CPSR empowers computer professionals and computer users to advocate for the responsible use of information technology and empowers all who use computer technology to participate in the public debate. As technical experts, CPSR members provide the public and policymakers with realistic assessments of the power, promise, and limitations of computer technology. As an organization of concerned citizens, CPSR directs public attention to critical choices concerning the applications of computing and how those choices affect society.

By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy.

Every project we undertake is based on five principles:

CPSR Membership Categories
  75  REGULAR MEMBER
  50  Basic member
 200  Supporting member
 500  Sponsoring member
1000  Lifetime member
  20  Student/low income member
  50  Foreign subscriber
  50  Library/institutional subscriber

CPSR National Office
P.O. Box 717
Palo Alto, CA  94301
415-322-3778
415-322-3798 (FAX)
E-mail: cpsr@csli.stanford.edu

Electronic Frontier Foundation (EFF)

The Electronic Frontier Foundation (EFF) is dedicated to the pursuit of policies and activities that will advance freedom and openness in computer-based communications. It is a member-supported, nonprofit group that grew from the conviction that a new public interest organization was needed in the information age; that this organization would enhance and protect the democratic potential of new computer communications technology. From the beginning, the EFF determined to become an organization that would combine technical, legal, and public policy expertise, and would apply these skills to the myriad issues and concerns that arise whenever a new communications medium is born.

Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations.

The Electronic Frontier Foundation, Inc.
666 Pennsylvania Avenue S.E., Suite 303
Washington, D.C.  20003
+1 202 544 9237
+1 202 547 5481 FAX
Internet: eff@eff.org

Free Software Foundation (FSF)

The Free Software Foundation is dedicated to eliminating restrictions on people's right to use, copy, modify, and redistribute computer programs. We promote the development and use of free software in all areas using computers. Specifically, we are putting together a complete, integrated software system named "GNU" ("GNU's Not Unix", pronounced "guh-new") that will be upwardly compatible with Unix. Most parts of this system are already being used and distributed.

The word "free" in our name refers to freedom, not price. You may or may not pay money to get GNU software, but regardless you have two specific freedoms once you get it: first, the freedom to copy a program and give it away to your friends and co-workers; and second, the freedom to change a program as you wish, by having full access to source code. You can study the source and learn how such programs are written. You may then be able to port it, improve it, and share your changes with others. If you redistribute GNU software you may charge a distribution fee or give it away, so long as you include the source code and the GPL (GNU General Public License).

Free Software Foundation, Inc.        Telephone: +1-617-876-3296
673 Massachusetts Avenue              Fax: +1-617-492-9057
Cambridge, MA 02139-3309 USA          Fax (in Japan): 0031-13-2473 (KDD)
Electronic mail: gnu@prep.ai.mit.edu                  0066-3382-0158 (IDC)

GNU is to be a complete integrated computational environment: everything you need to work with a computer, either as a programmer or as a person in an office or home. The core is an operating system, which consists of a central program called a kernel that runs the other programs on the computer, and a large number of ancillary programs for handling files, etc. The Free Software Foundation is developing an advanced kernel called the Hurd.

A complete system has tools for programmers, such as compilers and debuggers. It also has editors, sketchpads, calendars, calculators, spreadsheets, databases, electronic mail readers, and Internet navigators. The FSF already distributes most of the programs used in an operating system, all the tools regularly used by programmers, and much more.

The League for Programming Freedom (LPF)

The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston.

"Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation.

We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices.

Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome.

To contact the League, phone (617) 243-4091, send Internet mail to the address league@prep.ai.mit.edu, or write to:

League for Programming Freedom
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA

SotMesc

Founded in 1989, SotMesc is dedicated to preserving the integrity and cohesion of the computing society. By promoting computer education, liberties and efficiency, we believe we can secure freedoms for all computer users while retaining privacy.

SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter.

The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media.

SotMesc memberships are $20 to students and $40 to regular members.

SotMESC
P.O. Box 573
Long Beach, MS  39560

Computer Emergency Response Team (CERT)

CERT is the Computer Emergency Response Team that was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems.

CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (192.88.209.5), where security-related documents, past CERT advisories, and tools are archived.

CERT contact information:

U.S. mail address
  CERT Coordination Center
  Software Engineering Institute
  Carnegie Mellon University
  Pittsburgh, PA 15213-3890
  U.S.A.

Internet E-mail address
  cert@cert.org

Telephone number
  +1 412-268-7090 (24-hour hotline)
    CERT Coordination Center personnel answer
    7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for
    emergencies during other hours.

FAX number
  +1 412-268-6989


15. What are some radio programs of interest to hackers?

Off The Hook          New York      99.5 FM                       Wed 10pm EST
Full Disclosure Live  Short Wave    WWCR 5065 kHz                 Sun  8pm EST
Full Disclosure Live  Oil City, PA  WOYL AM-1340                  Sun  8pm EST
Full Disclosure Live  Satellite     Telstar 302 (T2), Ch 21, 5.8  Sun  8pm EST


16. What are other FAQ's of interest to hackers?

Frequently Asked Questions "Hacking Novell Netware"
Author: Simple Nomad 
ftp: ftp.fastlane.net    /pub/nomad/nw/faq.zip
ftp: ftp.best.com        /pub/almcepud/hacks/faq.zip
http://www.nmrc.org/faqs/netware

The PGP Attack FAQ
Author: Route [daemon9@netcom.com / route@infonexus.com]
ftp: infonexus.com /pub/Philes/Cryptography/PGPattackFAQ.txt.gz

Mac Hack FAQ: Defeating Security
Author: AX1P (an149689@anon.penet.fi)

Frequently Asked Questions About Red Boxing
Author: Mr. Sandman (an132432@anon.penet.fi)

VMS FAQ (Frequently Ask Questions)
Author: The Beaver (beaver@upperdck.blkbox.com)

Anonymous FTP FAQ
Author: Christopher Klaus  of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/anonftp

Compromise FAQ: What if your Machines are Compromised by an Intruder
Author: Christopher Klaus  of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/compromise

Security Patches FAQ
Author: Christopher Klaus  of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/patch

Sniffer FAQ
Author: Christopher Klaus  of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/sniff

Vendor Security Contacts: Reporting Vulnerabilities and Obtaining New Patches
Author: Christopher Klaus  of Internet Security Systems, Inc.
ftp: ftp.iss.net    /pub/faq/vendor

Cryptography FAQ
Author: The Crypt Cabal
ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

Firewalls FAQ
Author: Marcus J. Ranum (mjr@ss1.lightspeed.net)
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.security.misc/

Buying a Used Scanner Radio
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

How to Find Scanner Frequencies
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

Introduction to Scanning
Author: parnass@att.com (Bob Parnass, AJ9S)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.radio.scanner/

Low Power Broadcasting FAQ
Author: Rick Harrison.
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.radio.pirate/

RSA Cryptography Today FAQ
Author: Paul Fahn
ftp: rtfm.mit.edu /pub/usenet-by-group/sci.crypt/

VIRUS-L comp.virus Frequently Asked Questions (FAQ)
Author: Kenneth R. van Wyk <krvw@cert.org>
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.virus/

Where to get the latest PGP (Pretty Good Privacy) FAQ
Author: mpj@csn.net (Michael Johnson)
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.security.pgp/

alt.locksmithing answers to Frequently Asked Questions (FAQ)
Author: spike@indra.com (Joe Ilacqua)
ftp: rtfm.mit.edu /pub/usenet-by-group/alt.locksmithing/

comp.os.netware.security FAQ
Author: Fauzan Mirza <f.u.mirza@sheffield.ac.uk>
ftp: rtfm.mit.edu /pub/usenet-by-group/comp.os.netware.security/

rec.pyrotechnics FAQ
Author: zoz@cs.adelaide.edu.au (Hans Josef Wagemueller)
ftp: rtfm.mit.edu /pub/usenet-by-group/rec.pyrotechnics/


17. Where can I purchase a magnetic stripe encoder/decoder?

CPU Advance
PO Box 2434
Harwood Station
Littleton, MA  01460
(508)624-4819 (Fax)

Omron Electronics, Inc.
One East Commerce Drive
Schaumburg, IL  60173
(800)556-6766 (Voice)
(708)843-7787 (Fax)

Security Photo Corporation
1051 Commonwealth Avenue
Boston, MA 02215
(800)533-1162 (Voice)
(617)783-3200 (Voice)
(617)783-1966 (Voice)

Timeline Inc,
23605 Telo Avenue
Torrence, CA 90505
(800)872-8878 (Voice)
(800)223-9977 (Voice)

Alltronics
2300 Zanker Road
San Jose CA 95131
(408) 943-9774 Voice
(408) 943-9776 Fax
(408) 943-0622 BBS
Part Number: 92U067

Atalla Corp
San Jose, CA
(408) 435-8850


18. What are the rainbow books and how can I get them?

Orange Book
DoD 5200.28-STD
Department of Defense Trusted Computer System Evaluation Criteria

Green Book
CSC-STD-002-85
Department of Defense Password Management Guideline

Yellow Book
CSC-STD-003-85
Computer Security Requirements -- Guidance for Applying the Department
of Defense Trusted Computer System Evaluation Criteria in Specific
Environments

Yellow Book
CSC-STD-004-85
Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements.  Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments.

Tan Book
NCSC-TG-001
A Guide to Understanding Audit in Trusted Systems

Bright Blue Book
NCSC-TG-002
Trusted Product Evaluation -- A Guide for Vendors

Neon Orange Book
NCSC-TG-003
A Guide to Understanding Discretionary Access Control in Trusted
Systems

Teal Green Book
NCSC-TG-004
Glossary of Computer Security Terms

Red Book
NCSC-TG-005
Trusted Network Interpretation of the Trusted Computer System
Evaluation Criteria

Orange Book
NCSC-TG-006
A Guide to Understanding Configuration Management in Trusted Systems

Burgundy Book
NCSC-TG-007
A Guide to Understanding Design Documentation in Trusted Systems

Dark Lavender Book
NCSC-TG-008
A Guide to Understanding Trusted Distribution in Trusted Systems

Venice Blue Book
NCSC-TG-009
Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria

Aqua Book
NCSC-TG-010
A Guide to Understanding Security Modeling in Trusted Systems

Dark Red Book
NCSC-TG-011
Trusted Network Interpretation Environments Guideline -- Guidance for
Applying the Trusted Network Interpretation

Pink Book
NCSC-TG-013
Rating Maintenance Phase -- Program Document

Purple Book
NCSC-TG-014
Guidelines for Formal Verification Systems

Brown Book
NCSC-TG-015
A Guide to Understanding Trusted Facility Management

Yellow-Green Book
NCSC-TG-016
Guidelines for Writing Trusted Facility Manuals

Light Blue
NCSC-TG-017
A Guide to Understanding Identification and Authentication in Trusted
Systems

Light Blue Book
NCSC-TG-018
A Guide to Understanding Object Reuse in Trusted Systems

Blue Book
NCSC-TG-019
Trusted Product Evaluation Questionnaire

Gray Book
NCSC-TG-020A
Trusted Unix Working Group (TRUSIX) Rationale for Selecting
Access Control List Features for the Unix System

Lavender Book
NCSC-TG-021
Trusted Data Base Management System Interpretation of the Trusted
Computer System Evaluation Criteria

Yellow Book
NCSC-TG-022
A Guide to Understanding Trusted Recovery in Trusted Systems

Bright Orange Book
NCSC-TG-023
A Guide to Understandng Security Testing and Test Documentation in
Trusted Systems

Purple Book
NCSC-TG-024  (Volume 1/4)
A Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements

Purple Book
NCSC-TG-024 (Volume 2/4)
A Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to Procurement
Initiators

Purple Book
NCSC-TG-024  (Volume 3/4)
A Guide to Procurement of Trusted Systems: Computer Security Contract
Data Requirements List and Data Item Description Tutorial

Purple Book
NCSC-TG-024  (Volume 4/4)
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's
Proposal Document - An Aid to Procurement Initiators and Contractors

Green Book
NCSC-TG-025
A Guide to Understanding Data Remanence in Automated Information
Systems

Hot Peach Book
NCSC-TG-026
A Guide to Writing the Security Features User's Guide for Trusted Systems

Turquiose Book
NCSC-TG-027
A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems

Violet Book
NCSC-TG-028
Assessing Controlled Access Protection

Blue Book
NCSC-TG-029
Introduction to Certification and Accreditation

Light Pink Book
NCSC-TG-030
A Guide to Understanding Covert Channel Analysis of Trusted Systems

C1 Technical Report-001
Computer Viruses: Prevention, Detection, and Treatment

C Technical Report 79-91
Integrity in Automated Information Systems

C Technical Report 39-92
The Design and Evaluation of INFOSEC systems: The Computer Security
Contributions to the Composition Discussion

NTISSAM COMPUSEC/1-87
Advisory Memorandum on Office Automation Security Guideline

You can get your own free copy of any or all of the books by writing
or calling:

       INFOSEC Awareness Division
       ATTN: X711/IAOC
       Fort George G. Meade, MD  20755-6000

       Barbara Keller
       (410) 766-8729

If you ask to be put on the mailing list, you'll get a copy of each new
book as it comes out (typically a couple a year).
(Bold indicates I have not personally seen this book and/or I believe it may not be available.)