Hacking °ü·Ã °Ô½ÃÆÇ |
---|
2000/09/13(20:10) from 203.254.154.69 | |
ÀÛ¼ºÀÚ : °ÁÙ±â (jkkang65@hanmail.net) | Á¶È¸¼ö : 5984 , ÁÙ¼ö : 2455 |
ÇØÄ¿¸¦ À§ÇÑ À¥»çÀÌÆ® ¸ðÀ½ |
---|
ÇØÄ¿¿¡°Ô °ü½É°¡´Â fsp »çÀÌÆ®´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â ´º½º±×·ìÀº ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â telnet »çÀÌÆ®´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â gopher »çÀÌÆ®´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â WWW »çÀÌÆ®´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â IRC ä³ÎÀº ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â BBS´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â Ã¥Àº ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â ºñµð¿À´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â ¸ÞÀϸµ ¸®½ºÆ®´Â ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â ÃâÆǹ°Àº ¹«¾ùÀΰ¡? ÇØÄ¿¿¡°Ô °ü½É°¡´Â ftp »çÀÌÆ®´Â ¹«¾ùÀΰ¡? N 204.215.84.2 /pub/dmackey 2600.com (2600 Magazine) aeneas.mit.edu (Kerberos) alex.sp.cs.cmu.edu /links/security (Misc) asylum.sf.ca.us (CyberWarriors of Xanadu) N atari.archive.umich.edu /pub/atari/Utilities/pgp261st.zip (Atari PGP) athena-dist.mit.edu /pub/ATHENA (Athena Project) atlantis.utmb.edu (Anti-virus) bellcore.com (Bellcore) cert.org (CERT) ciac.llnl.gov (CIAC) clark.net /pub/jcase (H/P) cnit.nsk.su /pub/security (Security) coast.cs.purdue.edu /pub (Security/COAST) coombs.anu.edu.au /pub/security (Security) csrc.ncsl.nist.gov (NIST Security) dartmouth.edu /pub/security (Security) ds.internic.net (Internet documents) N dutiws.twi.tudelft.nl /pub/novell etext.archive.umich.edu /pub/Zines/PrivateLine (PrivateLine) N fastlane.net /pub/nomad ftp.3com.com /pub/Orange-Book (Orange Book) ftp.acns.nwu.edu /pub (Mac Anti-virus) ftp.acsu.buffalo.edu /pub/security & /pub/irc (Security & IRC) ftp.alantec.com /pub/tcpr (Tcpr) ftp.armory.com /pub/user/kmartind (H/P) ftp.armory.com /pub/user/swallow (H/P) ftp.auscert.org.au /pub (Australian CERT) ftp.cerf.net /pub/software/unix/security (CERFnet) ftp.cert.dfn.de (FIRST) ftp.cisco.com (Cisco) ftp.commerce.net /pub/standards/drafts/shttp.txt (Secure HyperText) ftp.cs.colorado.edu ftp.cs.ruu.nl /pub/SECURITY (Security & PGP) ftp.cs.uwm.edu /pub/comp-privacy (Privacy Digest) ftp.cs.vu.nl ftp.cs.yale.edu ftp.csi.forth.gr /pub/security ftp.csl.sri.com /pub/nides (SRI) ftp.csn.org /mpj (Cryptology) ftp.csua.berkeley.edu /pub/cypherpunks (Crypto) ftp.delmarva.com N ftp.demon.co.uk /pub/misc/0800num.txt (0800/0500 numbers) ftp.denet.dk /pub/security/tools/satan ftp.digex.net /pub/access/dunk ftp.dsi.unimi.it /pub/security/crypt (Crypto) ftp.dstc.edu.au /pub/security/satan ftp.ee.lbl.gov ftp.eff.org /pub/Publications/CuD (EFF) ftp.elelab.nsc.co.jp /pub/security (Security) ftp.etext.org (Etext) ftp.fc.net /pub/deadkat (TNO) ftp.fc.net /pub/defcon (DefCon) ftp.fc.net /pub/defcon/BBEEP (BlueBeep) ftp.fc.net /pub/phrack (Phrack) ftp.foobar.com ftp.funet.fi /pub/doc/CuD ftp.gate.net /pub/users/laura ftp.gate.net /pub/users/wakko ftp.giga.or.at /pub/hacker/ (H/P) ftp.greatcircle.com /pub/firewalls (Firewalls) ftp.IEunet.ie /pub/security (Security) ftp.ifi.uio.no ftp.indirect.com /www/evildawg/public_access/C&N/ ftp.info.fundp.ac.be ftp.informatik.uni-hamburg.de ftp.informatik.uni-kiel.de /pub/sources/security ftp.inoc.dl.nec.com /pub/security (Security) ftp.isi.edu ftp.lava.net /users/oracle/ (H/P N ftp.leo.org/pub/com/os/os2/crypt ftp.lerc.nasa.gov /security ftp.llnl.gov /pub (CIAC) ftp.luth.se /pub/unix/security ftp.lysator.liu.se ftp.mcs.anl.gov /pub/security ftp.microserve.net /ppp-pop/strata/mac (Mac) ftp.near.net /security/archives/phrack (Zines) ftp.nec.com ftp.net.ohio-state.edu /pub/security/satan ftp.netcom.com /pub/br/bradleym (Virii) ftp.netcom.com /pub/da/daemon9 (H/P) ftp.netcom.com /pub/fi/filbert N ftp.netcom.com /pub/gr/grady N ftp.netcom.com /pub/il/illusion (H/P+Virus) N ftp.netcom.com /pub/je/jericho (H/P) ftp.netcom.com /pub/le/lewiz (Social Engineering) N ftp.netcom.com /pub/ty/tym (TYM) ftp.netcom.com /pub/va/vandal (DnA) ftp.netcom.com /pub/wt/wtech/ N ftp.netcom.com /pub/zi/zigweed (H/P) ftp.netcom.com /pub/zz/zzyzx (H/P) ftp.netsys.com ftp.ocs.mq.edu.au /PC/Crypt (Cryptology) ftp.ox.ac.uk /pub/comp/security ftp.ox.ac.uk /pub/crypto (Cryptology) ftp.ox.ac.uk /pub/wordlists (Wordlists) ftp.paranoia.com /pub/toneloc/tl110.zip (ToneLoc) N ftp.pipex.net /pub/areacode (uk areacodes) ftp.pop.psu.edu ftp.primenet.com /users/i/insphrk ftp.primenet.com /users/k/kludge (H/P) ftp.primenet.com /users/s/scuzzy (Copy Protection) ftp.primus.com /pub/security (Security) ftp.psy.uq.oz.au ftp.psy.uq.oz.au /pub/DES ftp.rahul.net /pub/conquest/DeadelviS/script/vms/ ftp.rahul.net /pub/lps (Home of the FAQ) ftp.sert.edu.au ftp.sgi.com N ftp.smartlink.net /pub/users/mikes/haq ftp.std.com /archives/alt.locksmithing (Locksmithing) ftp.std.com /obi/Mischief/ (MIT Guide to Locks) ftp.std.com /obi/Phracks (Zines) ftp.sunet.se /pub/network/monitoring (Ethernet sniffers) ftp.sura.net /pub/security (SURAnet) ftp.technet.sg U ftp.technion.ac.il ftp.tis.com /pub (TIS) ftp.tisl.ukans.edu /pub/security ftp.uni-koeln.de (Wordlists) ftp.uspto.gov ftp.uu.net /doc/literary/obi/Phracks (Zines) ftp.uwp.edu /pub/dos/romulus/cracks (Copy Protection) ftp.vis.colostate.edu ftp.vix.com ftp.vortex.com ftp.warwick.ac.uk /pub/cud (Zines) ftp.wi.leidenuniv.nl /pub/security ftp.win.tue.nl /pub/security (Security) ftp.winternet.com /users/nitehwk (H/P) ftp.wustl.edu /doc/EFF (EFF) ftp.zoom.com ftp.zrz.tu-berlin.de/pub/security/virus/texts/crypto (Cryptology) garbo.uwasa.fi /pc/crypt (Cryptology) N gemini.tuc.noao.edu /pub/grandi gti.net /pub/safetynet gumby.dsd.trw.com hack-this.pc.cc.cmu.edu (Down for Summer) heffer.lab.csuchico.edu (Third Stone From The Sun) hplyot.obspm.fr info.mcs.anl.gov N infonexus.com /pub (The Guild) jerico.usc.edu l0pht.com (The L0pht) lcs.mit.edu /telecom-archives (Telecom archives) lod.com (Legion of Doom) mac.archive.umich.edu mary.iia.org /pub/users/patriot (Misc) monet.ccs.itd.umich.edu N net-dist.mit.edu /pub/pgp net.tamu.edu /pub/security/TAMU (Security) net23.com /pub (Max Headroom) nic.ddn.mil /scc (DDN Security) nic.sura.net /pub/security oak.oakland.edu /pub/hamradio (Ham Radio) oak.oakland.edu /SimTel/msdos/sound (DTMF decoders) oak.oakland.edu /SimTel/msdos/sysutil (BIOS attackers) parcftp.xerox.com prism.nmt.edu /pub/misc (Terrorist Handbook) pyrite.rutgers.edu /pub/security (Security) relay.cs.toronto.edu /doc/telecom-archives (Telecom) rena.dit.co.jp /pub/security (Security) research.att.com /dist/internet_security (AT&T) ripem.msu.edu /pub/crypt (Ripem) N rmii.com /pub2/KRaD (KRaD Magazine) rtfm.mit.edu (Etext) rtfm.mit.edu /pub/usenet-by-group (Usenet FAQ's) scss3.cl.msu.edu /pub/crypt (Cryptology) N sgigate.sgi.com /Security (SGI Security) sierra.stanford.edu spy.org (CSC) N src.doc.ic.ac.uk /usenet/uk.telecom (uk.telecom archives) suburbia.apana.org.au /pub/unix/security (Security) sunsolve1.sun.com theta.iis.u-tokyo.ac.jp /pub1/security (Security) titania.mathematik.uni-ulm.de /pub/security (Security) toxicwaste.mit.edu /pub/rsa129/README (Breaking RSA) ugle.unit.no unipc20.unimed.sintef.no vic.cc.purdue.edu vixen.cso.uiuc.edu /security N web.mit.edu whacked.l0pht.com (Mac + H/P) wimsey.bc.ca /pub/crypto (Cryptology) N wuarchive.wustl.edu /pub/aminet/util/crypt ÇØÄ¿¿¡°Ô °ü½É°¡´Â fsp »çÀÌÆ®´Â ¹«¾ùÀΰ¡? None at this time. ÇØÄ¿¿¡°Ô °ü½É°¡´Â ´º½º±×·ìÀº ¹«¾ùÀΰ¡? alt.2600 Do it 'til it hertz N alt.2600hz N alt.2600.codez N alt.2600.debate N alt.2600.moderated alt.cellular alt.cellular-phone-tech Brilliant telephony mind blow netnews naming alt.comp.virus An unmoderated forum for discussing viruses alt.comp.virus.source.code alt.cracks Heavy toolbelt wearers of the world, unite alt.cyberpunk High-tech low-life. alt.cyberspace Cyberspace and how it should work. alt.dcom.telecom Discussion of telecommunications technology alt.engr.explosives [no description available] alt.fan.kevin-mitnick alt.fan.lewiz Lewis De Payne fan club alt.hackers Descriptions of projects currently under development alt.hackintosh alt.locksmithing You locked your keys in *where*? alt.hackers.malicious The really bad guys - don't take candy from them alt.ph.uk United Kingdom version of alt.2600 alt.privacy.anon-server Tech. & policy matters of anonymous contact servers alt.radio.pirate Hide the gear, here comes the magic station-wagons. alt.radio.scanner Discussion of scanning radio receivers. alt.satellite.tv.europe All about European satellite tv alt.security Security issues on computer systems alt.security.index Pointers to good stuff in misc.security (Moderated) alt.security.keydist Exchange of keys for public key encryption systems alt.security.pgp The Pretty Good Privacy package alt.security.ripem A secure email system illegal to export from the US comp.dcom.cellular [no description available] comp.dcom.telecom Telecommunications digest (Moderated) comp.dcom.telecom.tech [no description available] comp.org.cpsr.announce Computer Professionals for Social Responsibility comp.org.cpsr.talk Issues of computing and social responsibility comp.org.eff.news News from the Electronic Frontiers Foundation comp.org.eff.talk Discussion of EFF goals, strategies, etc. N comp.os.netware.security Netware Security issues comp.protocols.kerberos The Kerberos authentification server comp.protocols.tcp-ip TCP and IP network protocols comp.risks Risks to the public from computers & users comp.security.announce Announcements from the CERT about security N comp.security.firewalls Anything pertaining to network firewall security comp.security.misc Security issues of computers and networks comp.security.unix Discussion of Unix security comp.virus Computer viruses & security (Moderated) de.org.ccc Mitteilungen des CCC e.V. misc.security Security in general, not just computers (Moderated) rec.pyrotechnics Fireworks, rocketry, safety, & other topics rec.radio.scanner [no description available] rec.video.cable-tv Technical and regulatory issues of cable television sci.crypt Different methods of data en/decryption ÇØ Ä¿¿¡°Ô °ü½É°¡´Â telnet »çÀÌÆ®´Â ¹«¾ùÀΰ¡? anarchy-online.com ntiabbs.ntia.doc.gov (NTIA) l0pht.com (The L0pht) sfpg.gcomm.com (The Floating Pancreas) telnet lust.isca.uiowa.edu 2600 (underground bbs) (temporarily down) pcspm2.dar.csiro.au (Virtual Doughnutland BBS) prince.carleton.ca 31337 (Twilight of The Idols) N spy.org (Computer Systems Consulting) ÇØÄ¿¿¡°Ô °ü½É°¡´Â gopher »çÀÌÆ®´Â ¹«¾ùÀΰ¡? ba.com (Bell Atlantic) N cell-relay.indiana.edu (Cell Relay Retreat) csrc.ncsl.nist.gov (NIST Security Gopher) gopher.acm.org (SIGSAC (Security, Audit & Control)) gopher.cpsr.org (Computer Professionals for Social Responsibility) gopher.eff.org (Electonic Frontier Foundation) N gopher.panix.com (Panix) gw.PacBell.com (Pacific Bell) iitf.doc.gov (NITA -- IITF) N info.itu.ch (International Telegraph Union) ncjrs.aspensys.com (National Criminal Justice Reference Service) oss.net (Open Source Solutions) spy.org (Computer Systems Consulting) wiretap.spies.com (Wiretap) ÇØÄ¿¿¡°Ô °ü½É°¡´Â WWW »çÀÌÆ®´Â ¹«¾ùÀΰ¡? N 134.220.198.66:8000 (Peter Strangman's) U alcuin.plymouth.edu/~jay/underground.html (Underground Links) U all.net (American Society for Industrial Security Management) alumni.caltech.edu/~dank/isdn/ (ISDN) N asearch.mccmedia.com/www-security.html (WWW-security info) aset.rsoc.rockwell.com (NASA/MOD AIS Security) aset.rsoc.rockwell.com/exhibit.html (Tech. for Info Sec) att.net/dir800 (800 directory) ausg.dartmouth.edu/security.html (UNIX Security Topics) N bianca.com/bump/ua (Unauthorized Access Home Page) N ccnga.uwaterloo.ca/~jscouria/gsm.html (GSM Specification) N cell-relay.indiana.edu/cell-relay (Cell Relay Retreat) N ciac.llnl.gov (CIAC Web Site) N community.net/community/all/home/solano/sbaldwin N cs.purdue.edu/homes/spaf/coast.html (The COAST Project and Laboratory) N csbh.mhv.net/dcypher/home.html (Dcypher's Home Page) N csrc.ncsl.nist.gov (NIST) N cwix.com/cwplc (Cable and Wireless) daemon.apana.org.au/~longi/ N dcpu1.cs.york.ac.uk:6666/fisher/telecom (Embryonic Telephone History Page) N dfw.net/~aleph1 (The Uebercracker's Security Web) N draco.centerline.com:8080/~franl/crypto.html (Crypto) N draco.centerline.com:8080/~franl/privacy/bacard-review.html N enigma.pc.cc.cmu.edu/~caffeine/home.html (Caffeine's Home Page) N everest.cs.ucdavis.edu/Security.html (UCDavis.edu Security Page) N everest.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR) N fastlane.net/homepages/thegnome (Simple Nomad) N first.org (FIRST) N freeside.com/phrack.html (Phrack Magazine) N frosted.mhv.net/keytrap.html N ftp.arpa.mil (ARPA home page) ftp.tamu.edu/~abr8030/security.html (Security) N grove.ufl.edu/~bytor (Bytor home page) N hightop.nrl.navy.mil/potpourri.html (MOD Security) N hightop.nrl.navy.mil/rainbow.html (MOD Rainbow Books) ice-www.larc.nasa.gov/ICE/papers/hacker-crackdown.html (Sterling) ice-www.larc.nasa.gov/ICE/papers/nis-requirements.html (ICE NIS) info.bellcore.com/BETSI/betsi.html (Betsi) N info.gte.com (GTE Labrotories) N info.mcc.ac.uk/Orange (Orange) infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) N infosec.nosc.mil/navcirt.html (NAVCIRT) N iss.net/iss (Internet Security Systems) N jumper.mcc.ac.uk/~afs/telecom (UK Telecom Pricing Information) l0pht.com (The l0pht) l0pht.com/~oblivion/IIRG.html (Phantasy Magazine) N l0pht.com/~spacerog/index.html (Whacked Mac Archives) N lcs.mit.edu/telecom-archives/areacodes/guide (North American Area Codes) N lcs.mit.edu/telecom-archives/npa.800 (1-800 Info) N lcs.mit.edu/telecom-archives/npa.900 (1-900 Info) N lod.com (Legion of Doom) N lod.com/~gatsby (Gatsby) N lod.com/~tabas (Mark Tabas -- LOD) N lod.com/~vampire/emptime7 (Empire Times) N magicnet.net/xtabi/netscape/links/cypher.html (Cryptology) N mars.superlink.net/user/esquire (Red box info) matrix.resnet.upenn.edu/rourke (FakeMail FAQ) mindlink.jolt.com (The Secrets of LockPicking) N mindlink.net/A7657 (Stephen H Kawamoto's Home Page) mls.saic.com (SAIC MLS) N mnementh.cs.adfa.oz.au/Lawrie_Brown.html (Lawrie Brown's crypto bibliography) motserv.indirect.com (Motorola) U naic.nasa.gov/fbi (FBI information) U nasirc.nasa.gov/NASIRC_home.html (NASIRC) obscura.com/~loki/ (Cryptology) ophie.hughes.american.edu/~ophie (Ophie) oregano.sl.pitt.edu/index.htm N outpost.callnet.com/outpost.html pages.ripco.com:8080/~glr/glr.html (Full Disclosure) U peg.pegasus.oz.au (EFF Australia) N quetel.qc.ca/qt0000ag.htm (Quebec-Telephone) N resudox.net/bio/mainpage.html (BioHazard's Home Page) N ripco.com:8080/~glr/glr.html (Full Disclosure) N rschp2.anu.edu.au:8080/crypt.html N scitsc.wlv.ac.uk/~cs6171/hack (UNIX Security) U seclab.cs.ucdavis.edu/Security.html (Security) U seclab.cs.ucdavis.edu/slides/slides.html (Security Lab Slides) N sfpg.gcomm.com/mitnick/mitnick.htm (3wP Kevin Mitnick WWW HomePage) N smurfland.cit.buffalo.edu/NetMan/index.html (Network Management) N sunsite.unc.edu/sun/inform/sun-info.html (Sun Microsystems Sponsor Page) N support.mayfield.hp.com (Hewlett Packard SupportLine Services) N tamsun.tamu.edu/~clm3840/hacking.html (Hacking/Phreaking) the-tech.mit.edu (LaMacchia case info) N town.hall.org/university/security/stoll/cliff.html (Cliff Stoll) turnpike.net/emporium/C/celestial/celest.html (Detective Databases 1995) ucs.orst.edu:8001/mintro.html (Micro Power Broadcasting) underground.org (Eubercrackers) unixg.ubc.ca:780/~jyee/ (Cell) w3.gti.net/safety N web.mit.edu/network/pgp.html (Getting PGP) N web.nec.com/products/necam/mrd/cellphones/index.html(NEC) U weber.u.washington.edu/~phantom/cpunk/index.html (Cryptology) N wildsau.idv.uni-linz.ac.at/~klon/underground/underground.html (Klon's Underground Links) wintermute.itd.nrl.navy.mil/5544.html (Network Security) N www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html N www-ns.rutgers.edu/www-security/index.html (Rutger's documents on WWW security) U www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Box info) U www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html(This document) N www-swiss.ai.mit.edu/~bal/pks-toplev.html (Findingsomeone's PGP key) www.2600.com (2600 Magazine) N www.8lgm.org (8lgm Security Advisories) www.aads.net (Ameritech) N www.access.gpo.gov/su_docs/ N www.aloha.com/~seanw/index.html www.alw.nih.gov/WWW/security.html (Unix Security) N www.artcom.de/CCC/hotlist.html (Chaos Computer Club Hotlist) N www.artech-house.com/artech.html (Artech House) N www.asg.unb.ca (Atlantic Systems Group Mosaic Index) www.aspentec.com/~frzmtdb/fun/hacker.html N www.aston.ac.uk/~bromejt/mobile.html (Mobile Phone Service Locator) N www.att.com (ATT) N www.auditel.com (Auditel) N www.auscert.org.au (Australian CERT) N www.axent.com/axent (Axent Technologies) www.ba.com (Bell Atlantic) N www.bctel.com (BC Tel) www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win) N www.bell.ca (Bell Canada) www.bell.com (MFJ Task Force) www.bellcore.com/SECURITY/security.html (Bellcore Security Products) N www.border.com (Border Network Technologies) www.brad.ac.uk/~nasmith/index.html N www.brad.ac.uk/~nasmith/underground.html (Undergound WWW Sites) www.bst.bls.com (BellSouth) N www.bt.co.uk (British Telecom) N www.business.co.uk/cellnet (Cellnet) N www.c2.org:80/remail/by-www.html (WWW-based remailing form) www.c3.lanl.gov/~mcn (Lanl) www.cam.org/~gagnon (OCP's) U www.careermosaic.com/cm/uswest (USWest) N www.castle.net/~kobrien/telecom.html (Telecom) N www.cco.caltech.edu/~rknop/amiga_pgp26.html N www.cdt.org/cda.html N www.cec.wustl.edu/~dmm2/egs/egs.html (En Garde Systems) www.cert.dfn.de/ (German First Team) N www.checkpoint.com (Checkpoint) N www.chem.surrey.ac.uk/~ch11mh/secure.html (Another page on secure WWW server setup) N www.cis.ksu.edu/~psiber/fortress/phreak/ph2reak.html (Are You Some Kind Of PHREAK!) www.cis.ohio-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html N www.cityscape.co.uk/users/ek80/index.html (Inside Cable Cover) N www.cohesive.com (Cohesive Systems) www.commerce.net/information/standards/drafts/shttp.txt (HyperText) www.con.wesleyan.edu/~triemer/network/docservs.html www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html N www.cosc.georgetown.edu/~denning/crypto (The Cryptography Project) N www.cost.se (COST Computer Security Technologies) www.cpsr.org/home (CPSR) N www.crimson.com/isdn/telecomacry.txt (Crimson's Telecommunications Acronyms) N www.crtc.gc.ca (CRTC - Canadian regulator) N www.cs.berkeley.edu/~raph/remailer-list.html (Anon remailer list) U www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (CMU Security) U www.cs.purdue.edu/coast/coast.html (Coast) N www.cs.purdue.edu/pcert/pcert.html (PCERT) N www.cs.tu-bs.de (Network management Tools) www.cs.tufts.edu/~mcable/cypher/alerts/alerts.html (Cypherpunk) www.cs.umd.edu/~lgas (Laughing Gas) N www.cs.umd.edu/~lgas/haquerwerld/haquer-individuals.html(Haquerwerld) www.csd.harris.com/secure_info.html (Harris) www.csl.sri.com (SRI Computer Science Lab) U www.csua.berekeley.edu/pub/cypherpunks/Home.html (Cryptology) N www.cwi.nl/cwi/people/Jack.Jansen/spunk/cookbook.html N www.cyber.co.uk/~joyrex (Joyrex Cellular) www.cybercafe.org/cybercafe/pubtel/pubdir.html (CyberCafe) N www.cygnus.com/~gnu/export.html (Cryptography Export Control Archives) U www.datafellows.fi (Data Fellows (F-Prot) N www.datasync.com/~sotmesc/sotmesc.html (SotMESC) N www.dcs.exeter.ac.uk/~aba (Cypherpunk) www.dct.ac.uk/~misb3cp/2600/faq.txt N www.demon.co.uk/mobiles (C.C.Mobiles) N www.dhp.com (DataHaven Project) N www.dhp.com/~pluvius (Pluvius' Home Page) U www.digicash.com/ecash/ecash-home.html (Ecash Home Page) www.digital.com/info/key-secure-index.html (Digital Secure Systems) www.dnai.com/~gui/index.html N www.dtic.dla.mil/defenselink (Office of the U.S. Secretary of Defense (OSD) N www.dtic.dla.mil/iac (DoD Information Analysis Center (IAC) Hub Page) N www.eecs.nwu.edu/~jmyers/bugtraq/about.html N www.eecs.nwu.edu/~jmyers/bugtraq/archives.html www.eecs.nwu.edu/~jmyers/bugtraq/index.html (Bugtraq) www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems) N www.eff.org N www.eff.org/pub/Alerts N www.eff.org/pub/Net_info/Tools/Crypto/ www.emap.co.uk/partners/racal-airtech (Racal-Airtech) www.ensta.fr/internet/unix/sys_admin (System administration) N www.epic.org N www.ericsson.nl (Ericsson) www.etext.org/Zines/ (Zines) N www.farmstead.com (Farmstead) U www.fbi.gov/fbi/FBI_homepage.html (FBI Homepage) www.fc.net/defcon (DefCon) www.fedworld.gov (Federal Government) www.first.org/first/ (FIRST) N www.fonorola.net (Fonorola (a Canadian carrier) N www.frus.com (Firewalls R Us) www.gbnet.net/kbridge (KarlBridge) www.getnet.com/crak (CRAK Software) N www.getnet.com/~vision N www.gold.net/users/cw78 (FleXtel) www.greatcircle.com (Great Circle Associates) N www.gsu.edu/~socrerx/catalog.html N www.gta.com/index.html (Global Technology Associates) N www.gti.net/grayarea (Gray Areas) U www.hotwired.com (Wired Magazine) www.hpcc.gov/blue94/section.4.6.html (NSA) N www.hq2.telecom.ie (Telecom Eireann) N www.iacr.org/~iacr (International Association of Cryptologic Research (IACR) N www.ibmpcug.co.uk/~Vidtron (Videotron) N www.ic.gov (Central Intelligence Agency Home Page) N www.ifi.uio.no/~staalesc/PGP/home.html N www.iia.org/~gautier/me.html (Rich Gautier's Home Page) N www.indirect.com/www/evildawg www.indirect.com/www/johnk/ (CRAK Software) N www.ingress.com (Ingress Communications) N www.interaccess.com/trc/tsa.html N www.io.org/~djcl/phoneb.html N www.iquest.net/~oseidler (Oliver Seidler's WWW Page) N www.itd.nrl.navy.mil/ITD/5540 (NRL Center for High Assurance Computer Systems) N www.itu.ch/TELECOM (Telecom '95) N www.jagunet.com/~john/ N www.jedefense.com/jed.html (Journal of Electronic Defense) N www.l0pht.com/cdc.html (Cult of the Dead Cow) N www.l0pht.com/radiophone (Radiophone Archive) N www.l0pht.com/~oblivion/IIRG.html (International Information Retrieval Guild Archive Site) N www.lat.com (Los Altos Technologies) www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) N www.lib.iup.edu/~seaman/hack/bone.html (Bone's H/P/C page o' rama) N www.links.net N www.louisville.edu/~wrbake01 (The GodZ of CyberSpacE) www.lysator.liu.se:7500/mit-guide/mit-guide.html (Lockpicking Guide) www.lysator.liu.se:7500/terror/thb_title.html (Terrorists Handbook) www.magi.com/~vektor/linenoiz.html N www.mastercard.com (Secure Electronic Payment Protocol) www.mcs.com/~candyman/http/radio.html (Radar) www.mcs.com/~candyman/under.html (Cell) N www.mcs.net/~candyman (H/P) www.mgmua.com/hackers/index.html (Hackers, the movie) N www.milkyway.com (Milkyway Networks Corporation) N www.mit.edu:8001/people/warlord/pgp-faq.html (PGP 2.6.2 FAQ, Buglist, Fixes, and Improvements) N www.monmouth.com/~jshahom (The Insomniac's Home Page) N www.mot.com (Motorola) www.mpr.ca/ (MPR Teltech Ltd) N www.msen.com/~emv/tubed/spoofing.html (Info on IP spoofing attacks) N www.mwjournal.com/mwj.html (Microwave Journal) N www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/security.html(Security in Mosaic) N www.ncsl.nist.gov (NIST Computer Systems Laboratory) www.net23.com (Max Headroom) N www.netpart.com (NetPartners) www.netresponse.com:80/zldf/ N www.nic.surfnet.nl/surfnet/security/cert-nl.html(CERT-NL) www.nist.gov (NIST) N www.nokia.com (Nokia) N www.nortel.com (Northern Telecom) www.ntt.jp (Nippon Telephone) N www.nynex.co.uk/nynex (NYNEX) U www.odci.gov (The CIA) N www.one2one.co.uk (Mercury One-2-One) N www.open.gov.uk/oftel/oftelwww/oftelhm.htm (OFTEL's Home Page) www.openmarket.com/info/cryptography/applied_cryptography.html www.pacbell.com (Pacific Bell) N www.panix.com/vtw www.paranoia.com/astrostar/fringe.html N www.paranoia.com/hpa (Paranoia's H/P/A Links) www.paranoia.com/mthreat (ToneLoc) N www.paranoia.com/~coldfire (Cold Fire's Web Page) N www.paranoia.com/~darkfox (Darkfox's Home Page) N www.paranoia.com/~ice9 (Ice-9's Home Page) www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP) N www.phantom.com/~darkcyde (DarkCyde) N www.phantom.com/~king (Randy King's WWW Page) N www.phillips.com (Phillips Electronics) N www.phred.org (The Phred Networking Organization) N www.pic.net/uniloc/starlink (Starlink) www.planet.net/onkeld (BlueBeep Home Page) www.primenet.com/~kludge/haqr.html (Kludge) www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography) www.qualcomm.com/cdma/wireless.html (Qualcomm CDMA) N www.ramp.com/~lcs/winpgp.html (PGP with MS/Win) N www.raptor.com (Raptor) www.raptor.com/raptor/raptor.html (Raptor Network Isolator) www.research.att.com (AT&T) N www.rocksoft.com/~ross (Rocksoft Pty (Veracity) N www.rogers.com (Rogers Communications) www.rsa.com (RSA Data Security) N www.sasknet.sk.ca/Pages/sktlhome.html (SaskTel) www.satelnet.org/~ccappuc N www.sccsi.com/lsli/lsli.homepage.html (PORTUS) N www.sctc.com (Secure Computing Corporation) www.seas.upenn.edu/~rourkem (FakeMail FAQ) N www.seduction.com N www.sei.cmu.edu/SEI/programs/cert.html (CERT Coordination Center) N www.service.com/cm/uswest/usw1.html (USWest) N www.shore.net/~eskwired/hp.html N www.soci.niu.edu/~cudigest N www.somar.com (Somar Software) N www.soscorp.com (Sources of Supply Corp) www.spatz.com/pecos/index.html (The World of Hacking) www.spy.org (Computer Systems Consulting) N www.spy.org (spy.org) www.sri.com (SRI) N www.stentor.ca (Stentor (Canadian telcos) N www.tecc.co.uk/public/uk-telecom/btns.html (BT "star services") N www.telecoms-mag.com/tcs.html (Telecommunications Magazine) N www.telkom.co.za (Telkom S.A. Ltd) www.telstra.com.au/info/security.html (Security Reference Index) N www.teresa.com www.tezcat.com/web/security/security_top_level.html N www.tiac.net/users/triad/philes/jokai.html (Jokai Reservation for the Preservation of the 1st Amendment) N www.ticllc.net/~scrtnizr www.tis.com (Trusted Information Systems) N www.trcone.com/t_crookb.html (CrookBook) N www.tregistry.com/ttr (Telecomunications Training Courses) www.tri.sbc.com (Southwestern Bell) www.tricon.net/Comm/synapse (Synapse Magazine) www.tufts.edu/~jpagano/ N www.uccs.edu/~abusby/hpawebsites.html N www.uccs.edu/~abusby/k0p.html (kn0wledge phreak) www.uci.agh.edu.pl/pub/security (Security) N www.uknet.net/pnc (The Personal Number Company) www.umcc.umich.edu/~doug/virus-faq.html (Virus) N www.underground.org (underground.org) N www.underground.org/bugs/ www.usfca.edu/crackdown/crack.html (Hacker Crackdown) N www.vodafone.co.uk (Vodafone) N www.vptt.ch/natel.html (Natel) U www.wam.umd.edu/~ankh/public/devil_does_unix N www.warwick.ac.uk/WWW/search/Phones/nng.html (National Number Group Codes) N www.well.com/user/abacard N www.well.com/user/crunch (Captain Crunch) N www.wfu.edu/~wilsonbd www.wiltel.com (Wiltel) N www.wiltel.com/glossary/glossary.html (Telecommunications Glossary) N www.wired.com (HotWired) N www2.undernet.org:8080/~cs93jtl/IRC.html (IRC) In addition to browsing these fine pages, you can often find what you are looking for by using one of these automated search engines: www.yahoo.com www.lycos.com www.webcrawler.com ÇØÄ¿¿¡°Ô °ü½É°¡´Â IRC ä³ÎÀº ¹«¾ùÀΰ¡? #2600 #cellular #hack #phreak #linux #realhack #root #unix #warez ÇØÄ¿¿¡°Ô °ü½É°¡´Â BBS´Â ¹«¾ùÀΰ¡? Rune Stone (203)832-8441 NUP: Cyberdeck The Truth Sayer's Domain (210)493-9975 Hacker's Haven (303)343-4053 Independent Nation (413)573-1809 Ut0PiA (315)656-5135 underworld_1994.com (514)683-1894 Alliance Communications (612)251-8596 Maas-Neotek (617)855-2923 Apocalypse 2000 (708)676-9855 K0dE Ab0dE (713)579-2276 fARM R0Ad 666 (713)855-0261 kn0wledge Phreak N The Edge of Reality (805)496-7460 Static Line (806)747-0802 Area 51 (908)526-4384 N The Drunk Forces +972-3-5733477 ÇØÄ¿¿¡°Ô °ü½É°¡´Â Ã¥Àº ¹«¾ùÀΰ¡? General Computer Security ~~~~~~~~~~~~~~~~~~~~~~~~~ Computer Security Basics Author: Deborah Russell and G.T. Gengemi Sr. Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-71-4 ¶Ù¾î³ Ã¥ÀÌ´Ù. ¼¼¼¼ÇÑ ºÎºÐÀÌ ºüÁöÁö ¾Ê°í ÀüüÀûÀÎ ÄÄÇ»ÅÍ º¸¾È¿¡ ´ëÇÑ Á¶°¨À» ÇÒ ¼ö ÀÖ°Ô ÇÑ´Ù. Ãʺ¸ º¸¾È Àü¹®°¡¿¡°Ô Çʵ¶¼ÀÌ´Ù. Information Systems Security Author: Philip Fites and Martin Kratz Publisher: Van Nostrad Reinhold Copyright Date: 1993 ISBN: 0-442-00180-0 Computer Related Risks Author: Peter G. Neumann Publisher: Addison-Wesley Copyright Date: 1995 ISBN: 0-201-55805-X Computer Security Management Author: Karen Forcht Publisher: boyd & fraser publishing company Copyright Date: 1994 ISBN: 0-87835-881-1 The Stephen Cobb Complete Book of PC and LAN Security Author: Stephen Cobb Publisher: Windcrest Books Copyright Date: 1992 ISBN: 0-8306-9280-0 (hardback) 0-8306-3280-8 (paperback) Security in Computing Author: Charles P. Pfleeger Publisher: Prentice Hall Copyright Date: 1989 ISBN: 0-13-798943-1. Building a Secure Computer System Author: Morrie Gasser Publisher: Van Nostrand Reinhold Co., New York. Copyright Date: ISBN: 0-442-23022-2 Modern Methods for Computer Security Author: Lance Hoffman Publisher: Prentice Hall Copyright Date: 1977 ISBN: Windows NT 3.5 Guidelines for Security, Audit and Control Author: Publisher: Microsoft Press Copyright Date: ISBN: 1-55615-814-9 Protection and Security on the Information Superhighway Author: Dr. Frederick B. Cohen) Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-11389-1 N Commonsense Computer Security Author: Martin Smith Publisher: McGraw-Hill Copyright Date: 1993 ISBN: 0-07-707805-5 N Combatting Computer Crime Author: Jerry Papke Publisher: McGraw-Hill, Inc. / Chantico Publishing Company, Inc. Copyright Date: 1992 ISBN: 0-8306-7664-3 N Computer Crime: a Crimefighters Handbook Author: David Icove, Karl Seger and William VonStorch Publisher: O'Reilly & Associates Copyright Date: 1995 ISBN: 1-56592-086-4 Unix System Security ~~~~~~~~~~~~~~~~~~~~ Practical Unix Security Author: Simson Garfinkel and Gene Spafford Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-72-2 Firewalls and Internet Security Author: William Cheswick and Steven Bellovin Publisher: Addison Wesley Copyright Date: 1994 ISBN: 0-201-63357-4 Unix System Security Author: Rik Farrow Publisher: Addison Wesley Copyright Date: 1991 ISBN: 0-201-57030-0 Unix Security: A Practical Tutorial Author: N. Derek Arnold Publisher: McGraw Hill Copyright Date: 1993 ISBN: 0-07-002560-6 Unix System Security: A Guide for Users and Systems Administrators Author: David A. Curry Publisher: Addison-Wesley Copyright Date: 1992 ISBN: 0-201-56327-4 Unix System Security Author: Patrick H. Wood and Stephen G. Kochan Publisher: Hayden Books Copyright Date: 1985 ISBN: 0-672-48494-3 Unix Security for the Organization Author: Richard Bryant Publisher: Sams Copyright Date: 1994 ISBN: 0-672-30571-2 N Building Internet Firewalls Author: D. Brent Chapman and Elizabeth D. Zwicky Publisher: O'Reilly and Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-124-0 N Unix System Security Essentials Author: Christopher Braun Publisher: Addison Wesley Copyright Date: 1995 ISBN: 0-201-42775-3 N Internet Firewalls and Network Security Author: Karanjit S. Siyan and Chris Hare Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-437-6 Network Security ~~~~~~~~~~~~~~~~ Network Security Secrets Author: David J. Stang and Sylvia Moon Publisher: IDG Books Copyright Date: 1993 ISBN: 1-56884-021-7 ¿ÏÀü Á¾ÀÌ ³¶ºñ´Â ¾Æ´ÏÁö¸¸, $49.95ÀÇ ±¸ÀÔ°¡°ÝÀº ³Ê¹« ºñ½Î´Ù. ÀÌ Ã¥Àº ÀÌ¹Ì ÃâÆÇµÈ Á¤º¸¸¦ Àç ¹è¿ÇÑ °ÍÀÌ´Ù. ÀÌ Ã¥À» ÀÐ¾î¼ ¾Ë ¼ö ÀÖ´Â À¯ÀÏÇÑ ºñ¹ÐÀº ÀþÀº ¿©ÀÚÀÎ Sylvia MoonÀÌ David StangÀ̶õ ³ªÀÌµç »ç¶÷À» ¹ÌÄ£ µíÀÌ »ç¶ûÇÑ´Ù´Â °ÍÀÌ´Ù. Complete Lan Security and Control Author: Peter Davis Publisher: Windcrest / McGraw Hill Copyright Date: 1994 ISBN: 0-8306-4548-9 and 0-8306-4549-7 Network Security Author: Steven Shaffer and Alan Simon Publisher: AP Professional Copyright Date: 1994 ISBN: 0-12-638010-4 N Network Security: How to Plan For It and How to Achieve It Author: Richard M. Baker Publisher: McGraw-Hill, Inc. Copyright Date: ISBN: 0-07-005141-0 N Network Security Author: Steven L. Shaffer and Alan R. Simon Publisher: Academic Press Copyright Date: 1994 ISBN: 0-12-638010-4 N Network Security: Private Communications in a Public World Author: Charlie Kaufman, Radia Perlman and Mike Speciner Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-13-061466-1 N Network and Internetwork Security: Principles and Practice Author: William Stallings Publisher: Prentice Hall Copyright Date: 1995 ISBN: 0-02-415483-0 N Implementing Internet Security Author: William Stallings Publisher: New Rider Publishing Copyright Date: 1995 ISBN: 1-56205-471-6 N Actually Useful Internet Security Techniques Author: Larry J. Hughes, Jr. Publisher: New Riders Publishing Copyright Date: 1995 ISBN: 1-56205-508-9 Cryptology ~~~~~~~~~~~~ Applied Cryptography: Protocols, Algorithms, and Source Code in C Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-59756-2 Bruce SchneierÀÇ Ã¥ÀÌ ´Ù¸¥ ¸ðÀº ¾ÏÈ£Çп¡ °üÇÑ Ã¥À» ´ëüÇØ ¹ö·È´Ù. ¾ÏÈ£Çп¡ °ü½ÉÀÌ ÀÖ´Ù¸é Çʵ¶¼ÀÌ´Ù. ¾ÏÈ£Çп¡ °ü·ÃÇؼ »ç¾ßÇÒ Ã³À½ÀÌÀÚ ¸¶Áö¸· Ã¥ÀÌ´Ù. Cryptography and Data Security Author: Dorothy Denning Publisher: Addison-Wesley Publishing Co. Copyright Date: 1982 ISBN: 0-201-10150-5 Protect Your Privacy: A Guide for PGP Users Author: William Stallings Publisher: Prentice-Hall Copyright Date: 1994 ISBN: 0-13-185596-4 Codebreakers Author: Kahn Publisher: Simon and Schuster Copyright Date: ISBN:0-02-560460-0 Codebreakers: The Inside Story of Bletchley Park Author: Francis Harry Hinsley and Alan Stripp Publisher: Oxford University Press, Copyright Date: 1993 ISBN:0-19-285304-X Cryptanalysis, a study of ciphers and their solution Author: Gaines, Helen Fouche Publisher: Dover Publications Copyright Date: 1956 ISBN: N Computer Privacy Handbook Author: Andre' Bacard Publisher: Peachpit Press Copyright Date: 1995 ISBN: 1-56609-171-3 N E-Mail Security with PGP and PEM Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1995 ISBN: 0-471-05318-X N PGP: Pretty Good Privacy Author: Simson Garfinkel Publisher: O'Reilly & Associates, Inc. Copyright Date: 1995 ISBN: 1-56592-098-8 Programmed Threats ~~~~~~~~~~~~~~~~~~ The Little Black Book of Computer Viruses Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1990 ISBN: 0-929408-02-0 N The Giant Black Book of Computer Viruses Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1995 ISBN: Computer Viruses, Artificial Life and Evolution Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1993 ISBN: 0-929408-07-1 Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System Author: John McAfee and Colin Haynes Publisher: St. Martin's Press Copyright Date: 1989 ISBN: 0-312-03064-9 and 0-312-02889-X The Virus Creation Labs: A Journey Into the Underground Author: George Smith Publisher: American Eagle Publications Copyright Date: 1994 ISBN: 0-929408-09-8 U A Short Course on Computer Viruses Author: Dr. Fred Cohen Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-00769-2 N Robert Slade's Guide to Computer Viruses Author: Robert Slade Publisher: Springer-Verlag Copyright Date: 1994 ISBN: 0-387-94311-0 / 3-540-94311-0 Telephony ~~~~~~~~~ Engineering and Operations in the Bell System Author: R.F. Rey Publisher: Bell Telephont Laboratories Copyright Date: 1983 ISBN: 0-932764-04-5 ¾ÆÁÖ ¿À·¡µÈ Ã¥ÀÌÁö¸¸, ÀÌ Ã¥Àº ¾ÆÁ÷µµ telephony¿¡ ´ëÇÑ ±ÇÀ§¼ÀÌ´Ù. ÀÌ Ã¥Àº 100% Bell¿¡ °üÇÑ °ÍÀÌ´Ù. ±×¸®°í Àü¼¼°è phreaker¿¡°Ô »ç¶û¹Þ´Â´Ù. Telephony: Today and Tomorrow Author: Dimitris N. Chorafas Publisher: Prentice-Hall Copyright Date: 1984 ISBN: 0-13-902700-9 The Telecommunications Fact Book and Illustrated Dictionary Author: Ahmed S. Khan Publisher: Delmar Publishers, Inc. Copyright Date: 1992 ISBN: 0-8273-4615-8 ÀÌ »çÀüÀº telephony¿¡ °üÇؼ ¶Ù¾î³ °ÍÀÌ´Ù. ±×¸®°í ÀÌ ºÐ¾ßÀÇ ±íÀº °ü½ÉÀÌ ÀÖ´Â »ç¶÷¿¡°Ô ±ÇÇÏ°í ½Í´Ù. Tandy/Radio Shack Cellular Hardware Author: Judas Gerard and Damien Thorn Publisher: Phoenix Rising Communications Copyright Date: 1994 ISBN: The Phone Book Author: Carl Oppendahl Publisher: Consumer Reports Copyright Date: ISBN: 0-89043-364-x Listing of every cellular ID in the us, plus roaming ports, and info numbers for each carrier. Principles of Caller I.D. Author: Publisher: International MicroPower Corp. Copyright Date: ISBN: Hacking History and Culture ~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Hacker Crackdown: Law and Disorder on the Electronic Frontier Author: Bruce Sterling Publisher: Bantam Books Copyright Date: 1982 ISBN: 0-553-56370-X Bruce SterlingÀÌ ÃÖ±Ù ÀÌ Ã¥À» ³×Æ®¿öÅ©¿¡ ¹«·á·Î ¹èÆ÷Çß´Ù. ÀÌ Ã¥Àº ÀμâµÈ ÇüÅ·ΠÀбⰡ ´õ ½±°í, ÆÛÀÌÆÛ¹éÀÌ °Ü¿ì $5.99ÀÌ´Ù. ¾î¶»°Ô Àеç Àоú´Ù´Â °Í¿¡ ´ëÇØ ¸¸Á·ÇÒ °ÍÀÌ´Ù. Sterling¾¾´Â ¶Ù¾î³ °ø»ó°úÇмҼ³ ÀÛ°¡À̸ç, ÇØÅ· ¹®È¿¡¼ »ç¿ëÇÏ´Â ´Ü¾î¿¡ Àç´ÉÀ» º¸¿´´Ù. ¸Å¿ì Áñ°Å¿î µ¶¼ °æÇèÀÌ´Ù. Cyberpunk Author: Katie Hafner and John Markoff Publisher: Simon and Schuster Copyright Date: 1991 ISBN: 0-671-77879-X The Cuckoo's Egg Author: Cliff Stoll Publisher: Simon and Schuster Copyright Date: 1989 ISBN: 0-671-72688-9 Hackers: Heroes of the Computer Revolution Author: Steven Levy Publisher: Doubleday Copyright Date: 1984 ISBN: 0-440-13495-6 Unclassified ~~~~~~~~~~~~ The Hacker's Handbook Author: Hugo Cornwall Publisher: E. Arthur Brown Company Copyright Date: ISBN: 0-912579-06-4 Secrets of a Super Hacker Author: The Knightmare Publisher: Loompanics Copyright Date: 1994 ISBN: 1-55950-106-5 The Knightmare´Â ¼öÆÛ ÇØÄ¿°¡ ¾Æ´Ï´Ù. ÀÌ Ã¥¿¡´Â Å©°Ô µµ¿òÀÌ µÉ ³»¿ëÀÌ ¾ø´Ù. he Knightmare´Â ¾²·¹±â ¹ö¸®·¯ °¥ ¶§´Â ¿ÊÀ» Â÷·ÁÀÔÀ» ÇÊ¿ä°¡ ¾ø´Ù´Â À¯¿ëÇÑ Ãæ°í¸¦ ÇÏ°í ÀÖ´Ù. The KnightmareÀÇ °¡Àå ¶Ù¾î³ ÇØÅ·Àº Loompanics¿¡¼ ÀÌÃ¥À» ÃâÆÇÇϵµ·Ï ÇÑ °ÍÀÌ´Ù. The Day The Phones Stopped Author: Leonard Lee Publisher: Primus / Donald I Fine, Inc. Copyright Date: 1992 ISBN: 1-55611-286-6 ¿ÏÀü ¾²·¹±âÀÌ´Ù. ¹ÌÄ¡±¤ÀÌÀÇ Á¤½Å¹ßÀÛÀÌ´Ù. Enquirer ÀâÁöÀÇ µ¥ÀÌÅͺ¸´Ù ´õ ºñ»ç½ÇÀûÀÌ´Ù. Information Warfare Author: Winn Swartau Publisher: Thunder Mountain Press Copyright Date: 1994 ISBN: 1-56025-080-1 ÀüÀÚ Á¤º¸ÀüÀÇ ±â¼ú°ú Àåºñ¿¡ ´ëÇÑ Àß ¼³¸íµÈ Çؼ³¼ Author: Doug Richardson Publisher: Salamander Press Copyright Date: ISBN: 0-668-06497-8 ÇØÄ¿¿¡°Ô °ü½É°¡´Â ºñµð¿À´Â ¹«¾ùÀΰ¡? 'Unauthorized Access' by Annaliza Savage $25 on VH S format in 38-min Savage Productions 1803 Mission St., #406 Santa Cruz, CA 95060 Hacker's '95 - a Phon-E & R.F. Burns Production See the video Emmanuel Goldstein thought would have the Feds knocking at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the Secret Service briefing on Operation Cyber Snare (recent cell busts) Talks on Crypto, HERF, the Feds, etc. All information is presented for educational purposes only. Not for sale to government or law enforcement organizations. Running time aproximately 90 minutes. $25.00 NTSC VHS $35.00 PAL/Secam VHS Custom Video Productions (908)842-6378 videocvp@ix.netcom.com ÇØÄ¿¿¡°Ô °ü½É°¡´Â ¸ÞÀϸµ ¸®½ºÆ®´Â ¹«¾ùÀΰ¡? Academic Firewalls Registration Address: Send a message to majordomo@greatcircle.com containing the line "subscribe firewalls user@host" N The Alert Registration Address: Send a message to request-alert@iss.net containing the line "subscribe alert" Bugtraq Reflector Address: bugtraq@fc.net Registration Address: bugtraq-request@fc.net Cert Tools Reflector Address: cert-tools@cert.org Registration Address: cert-tools-request@cert.org Computers and Society Reflector Address: Comp-Soc@limbo.intuitive.com Registration Address: taylor@limbo.intuitive.com Coordinated Feasibility Effort to Unravel State Data Reflector Address: ldc-sw@cpsr.org Registration Address: CPSR Announcement List Reflector Address: cpsr-announce@cpsr.org Registration Address: CPSR - Intellectual Property Reflector Address: cpsr-int-prop@cpsr.org Registration Address: CPSR - Internet Library Reflector Address: cpsr-library@cpsr.org Registration Address: N Cypherpunks Registration Address: Send a message to majordomo@toad.com containing the line "subscribe cypherpunks" DefCon Announcement List Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-announce" DefCon Chat List Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-stuff" N Discount Long Distance Digest Registration Address: Send a message to: dld-request@webcom.com containing the line "subscribe" Electronic Payment Registration Address: e-payment@cc.bellcore.com IDS (Intruder Detection Systems) Registration Address: Send a message to majordomo@wyrm.cc.uow.edu.au containing the line "subscribe ids" N Information Warfare Registration Address: E-mail iw@all.net with a request to be added. N Linux-Alert Registration Address: majordomo@linux.nrao.edu N Linux-Security Registration Address: majordomo@linux.nrao.edu Macintosh Security Reflector Address: mac-security@eclectic.com Registration Address: mac-security-request@eclectic.com NeXT Managers Registration Address: next-managers-request@stolaf.edu PGP3 announcement list Registration Address: pgp-announce-request@lsd.com Subject: Your Name Body: *ignored* Phiber-Scream Registration Address: Send a message to listserv@netcom.com containing the line "subscribe phiber-scream user@host" phruwt-l (Macintosh H/P) Registration Address: Send a message to filbert@netcom.com with the subject "phruwt-l" rfc931-users Reflector Address: rfc931-users@kramden.acf.nyu.edu Registration Address: brnstnd@nyu.edu RSA Users Reflector Address: rsaref-users@rsa.com Registration Address: rsaref-users-request@rsa.com WWW Security Registration Address: www-security@ns2.rutgers.edu ÇØÄ¿¿¡°Ô °ü½É°¡´Â ÃâÆǹ°Àº ¹«¾ùÀΰ¡? 2600 - The Hacker Quarterly ~~~~~~~~~~~~~~~~~~~~~~~~~~~ E-mail addresses: info@2600.com - to get info on 2600 index@2600.com - to get a copy of our index meetings@2600.com - for info on starting your own meeting subs@2600.com -- for subscription problems letters@2600.com -- to send us a letter articles@2600.com -- to send us an article 2600@2600.com -- to send us a general message Subscription Address: 2600 Subscription Dept PO Box 752 Middle Island, NY 11953-0752 Letters and article submission address: 2600 Editorial Dept PO Box 99 Middle Island, NY 11953-0099 Phone Number: (516)751-2600 Fax Number: (516)474-2677 Voice BBS: (516)473-2626 Subscriptions: United States: $21/yr individual, $50 corporate. Overseas: $30/yr individual, $65 corporate. Gray Areas ~~~~~~~~~~ Gray Area´Â ¹ý°ú µµ´ö¼ºÀÇ È¸»ö Àç´ë¸¦ Á¶»çÇÏ°í ³íÀïÀÇ ¼ÒÁö°¡ Àְųª, ºñÀ±¸®Àû ºÒ¹ýÀûÀÎ ÁÖ Á¦¸¦ ´Ù·é´Ù. Gray Areas´Â ¿Ö ÇØÄ¿°¡ ÇØÅ·À» ÇÏ´ÂÁö Á¶»çÇÏ°í ÀÏÅ»Àû ÇàÀ§ÀÇ »çȸÀû Ʋ·Î¼ ÇØ Å·À» ±ÔÁ¤ÇÑ´Ù. E-Mail Address: grayarea@well.sf.ca.us E-Mail Address: grayarea@netaxs.com U.S. Mail Address: Gray Areas PO Box 808 Broomall, PA 19008 Subscriptions: $26.00 4 issues first class $34.00 4 issues foreign (shipped air mail) Privacy Newsletter ~~~~~~~~~~~~~~~~~~ Privacy Newsletter ´Â ¿ù°£ ´º½º·¹Æ®·Î µ¶ÀÚµé·Î ÇÏ¿©±Ý ¾î¶»°Ô ÇÁ¶óÀ̹ö½Ã¸¦ ¾ò°í À¯ÁöÇÏ´ÂÁö ¿¡ ´ëÇØ ¾Ë·ÁÁÖ´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù. E-Mail Address: privacy@interramp.com Subscription Address: Privacy Newsletter P.O. Box 8206 Philadelphia, PA 19101-8206 Subscriptions: $99/yr (US) $149/yr (Overseas) Wired ~~~~~ Subscription Address: subscriptions@wired.com or: Wired PO Box 191826 San Francisco, CA 94119-9866 Letters and article submission address: guidelines@wired.com or: Wired 544 Second Street San Francisco, CA 94107-1427 Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas) Nuts & Volts ~~~~~~~~~~~~ T& L Publications 430 Princeland Court Corona, CA 91719 (800)783-4624 (Voice) (Subscription Only Order Line) (909)371-8497 (Voice) (909)371-3052 (Fax) CIS: 74262,3664 Cybertek: The Cyberpunk Technical Journal ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ P.O. Box 64 Brewster, NY 10509 Frequency: Bimonthly Domestic Subscription Rate: $15/year (6 issues) PrivateLine ~~~~~~~~~~~ 5150 Fair Oaks Blvd. #101-348 Carmichael, CA 95608 USA E-Mail: privateline@delphi.com Subscriptions: $24 a year for six issues Text of back issues are at the etext archive at Michigan. Gopher over or ftp to: etext.archive.umich.edu/pub/Zines/PrivateLine |