Computer Security

Discussion in 'Dell' started by akhil.richardson.com.use@gmail.com, Nov 6, 2007.

  1. Guest

    ..:: I Want To Share Computer Security Information To All Internet
    Netter ::.

    A. Computer Security Information:
    1. Firewalls Torn Apart
    2. Guide To Social Engineering
    3. Social Engineering And Email Account Cracking
    4. Network Firewall Security
    5. Hijacking Hotmail Accounts For Newbies
    6. Various Ways To Hack Or Over Ride Foolproof
    7. Configuring ZoneAlarm Securely
    8. IP Masquerading Tutorial
    9. Interesting Things You Didnt Know About Your Computers Hardware
    10. Advanced Number Systems Made Easy
    11. Hacking Dictionary
    12. Hacking The Bios
    13. DNS The What The How And The Why
    14. Exploit Mihirs Guide To Inserting Logo To System Properties
    15. Getting Geographical Information Using An IP Address
    16. Create A Lightweight E Mailer
    17. Telnet Explained
    18. Installing A Webserver For NewbiesI
    19. The IP Address
    20. Being A Hacker On The Meaning Of Being A Hacker
    21. Well Known Port Numbers
    22. Samba How To
    23. Removing Banners
    24. Port Numbers Part 1
    25. Port Numbers Part 2
    26. Port Numbers Part 3
    27. Port Numbers Part 4
    28. Port Numbers Part 5
    29. Port Numbers Part 6
    30. Port Numbers Part 7
    31. Port Numbers Part 8
    32. Port Numbers Part 9
    33. The OSI Model
    34. The Basic Elements Of Cracking
    35. Beginners Step By Step Security Guide
    36. Linking Rules For Hacking And Other Alternative Websites
    37. Installing A Webserver For Newbies
    38. Glossary
    39. Wireless Security And Hacking
    40. Wireless Network
    41. Demystifying Remote Host Part 1
    42. Exploiting Design Flaws In The Win32 API For Privilege Escalation
    43. Wireless LAN Technologies and Windows XP
    44. Understanding NetBIOS
    45. The Complete Guide To Computers
    46. Things You Need
    47. How To Clear The Past Mapped Network Drives List
    48. You Got This File From
    49. Msn Tutorial Ugw Securtiy Information Base
    50. The Basics Of Cryptography
    51. PGP Encryption For Beginners Learn How PGP Works
    52. Cryptography FAQ
    53. Cryptography Split Wide Open
    54. W2K File System
    55. A More Indepth Article About The Basics To Encryption
    56. Protecting Your Scripts
    57. Breaking Script Encoder
    58. Windows 2000 Encrypting File System And Disk Wipe Software
    Vulnerability
    59. Buffer Overflow Basics
    60. Deadly Dos Attack
    61. MS Office XP The More Money I Give To Microsoft The More
    Vulnerable My Windows Computers Are
    62. Dos Attacks Explained
    63. Introduction To Denial Of Service
    64. Miscellaneous Groups Publications
    65. Documents About General Hardening
    66. Documents About Unix Hardening
    67. Basic Steps To Hardening A Standalone Windows 2000 Installation
    68. Setting Up IIS And Securing Streamed Content
    69. Articles On How To Securing Hardening BSD
    70. Step By Step Guide To Secure Win2k
    71. Documents About Windows9x ME Hardening
    72. Documents About General Hardening
    73. Securing Your Web Pages With Apache
    74. Documents About Windows9x ME Hardening
    75. Documents About IIS Hardening Securing
    76. Basic Steps To Hardening A Standalone Windows 2000 Installation
    77. Excellent Analysis Of The ICQ Trojans
    78. The ICQ Security Tutorial
    79. Backing Up Your ICQ Contact List And Settings
    80. Hijacking ICQ Accounts in Spanish
    81. ICQ Password Stealing Tutorial
    82. The ICQ Password Securing Tutorial
    83. Hijacking ICQ Accounts
    84. Back Door Infecting Guide
    85. Security Home
    86. Get ICQ Passwords Using Share Programms
    87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid
    88. Eggdrop Bots Tutorial Written by The Cyber God
    89. Eggdrop Bots Tutorial
    90. Getting Passwords Of Nicks In mIRC
    91. IRC Spoofing
    92. The IRC Warfare Tutorial Written
    93. IRC Trading Security
    94. Getting Passwords Of Nicks In mIRC
    95. IRC Basic Commands
    96. Never Be Banned In IRC
    97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab
    98. A Better Way To Get Hotmail Passwords - A Little Helpful Program
    With A Short Tutorial
    99. Newbie Keyloggers Toturial - How To Disable The Keyloggers
    100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By
    Others Without Using Any Program
    101. A Trick To Get Access To Control Panel As A Restricted Network
    User On Windows XP And 2000
    102. Removing The Folder Having ASCII Character From The Drive
    103. Getting Rid Of The Urls You Visited In The Url Bar Of IE
    104. Exploring Windows
    105. Create Your Own Logon Message
    106. MSN Mesenger Tip
    107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable
    108. Trick on CNN.COM or tricking minds via cnn.com
    109. Access The Blocked Folder In WinNt
    110. Various Methods Of Hacking Hotmail
    111. Writing Bootable CD's With Nero
    112. How To Protect A Folder From Access From Anyone, Even Your
    Administrator
    113. How To Change Product Key In XP With No Re-Install
    114. No More Popups
    115. Tips And Tricks On Burning
    116. The Elite Symbols
    117. Windows Xp Product Key Modifier
    118. Hacking Hotmail
    119. Kazaa As A Annonymous Emailer
    120. Cracking Unix Password Files For Beginners
    121. Exploiting Cisco Systems
    122. Cracking Unix Password Files For Beginners
    123. Poor Security On Default Windows 2000 Server Installation Could
    Lead To Unauthorized Database Access
    124. Remote Control Of IIS Windows
    125. How To Become A Hacker
    126. Features of Postal Nemesis
    127. Gathering Info On A Host - The Essential Ingredient For Getting
    Root Or Admin
    128. What System Administrators Fear
    129. Munga Bunga's HTTP Brute Forcer
    130. Port Scanning: Is it illegal?
    131. Microsoft Internet Information Services Local And Remote Dos
    132. Netbios Based Hacking Tutorial
    133. Languard Network Scanner Basics
    134. IIS Allows Universal Cross Site Scripting
    135. All Versions Of Microsoft Internet Information Services Remote
    Buffer Overflow (SYSTEM Level Access)
    136. Simple Guide For Opening Files Locked
    137. Getting Through An Access Database Password
    138. Shell Accounts For Newbies
    139. Admin Access In A Locked Environment
    140. Info Gathering Tutorial
    141. Introduction To Buffer Overflow
    142. Using Nbstat/Netbios To Your Advantage
    143. Buffer Overflows-Getting Started
    144. Default Password Paths
    145. Tutorial About Netbios
    146. How To Write Format String Exploits
    147. Unchecked Buffer in ISAPI Extension Could Enable Compromise of
    IIS 5.0 Server
    148. Anonymity Tutorial
    149. How The NSA Is Monitoring You
    150. Proxy/WinGate/SOCKS Tutorial
    151. Introduction To Webmin
    152. Exploiting IPC Share
    153. Cryptic Windows Errors
    154. Fun With Debug
    155. What Is The Ntregistry
    156. Untold Secrets
    157. Beginners Guide To Linux - Easy Installation Guide
    158. Another Registry
    159. File And Printsharing
    160. Windows 98 Security Issues
    161. Poledit
    162. Creating Files In Windows That Begin With A Dot
    163. Creating Hidden Folders Without Filenames Made EZ
    164. Remote OS Detection
    165. Hacking A Windows 2000 System Through IPC$
    166. Hacking/Cracking Iis 4/5
    167. How To Hack Windows XP Admin Passwords
    168. Generel Bugs In Iis 4-5-5.01
    169. Installing Apache On Windows
    170. Installing 2K
    171. Foolproof
    172. Fooling Foolproof
    173. How To Make Simple DOS Batchfiles
    174. How To Protect A Folder From Access From Anyone, Even Your
    Administrator
    175. How To Change Product Key In XP With No Re-Install
    176. Defeat Foolproof
    177. Removing Outlook 2002 XP Attachment Security
    178. Running Programs Trough The Run Feature
    179. Why Openbsd Will Never Be As Secure As Linux
    180. Basic Security - Windows ME
    181. A Review Of Lindows
    182. 95-98 Local Hacking
    183. Inside Windows XP Product Activation
    184. What's New For The Windows 98 Startup Disk
    185. Attachment File Types Blocked By MS Office XP Outlook
    186. Advanced DOS Techniques
    187. Windows File/Printer Sharing Explained
    188. Microsoft IIS Unicode Exploit Explained
    189. Useful DOS Commands (Mainly For Newbies)
    190. Hacking The Hash - Hacking Windows 2000 and XP Passwords
    191. Real Desktop Items, Not Shortcuts
    192. Microsoft Explorer html-based folders (Level= Script Kiddie)
    193. Access To Other Restricted Users Folders In Winxp/2K
    194. Common Files Of The /Etc Directory And Their Uses
    195. Writing Your Own Operating System
    196. Hiding Things From Other Windows Users
    197. Changing Startup/Shutdown Logos The Easy Way
    198. Linux Security For Newbies
    199. NetBIOS Vulnerability
    200. WHAT Will Microsoft Think Windows Exposed
    201. Windows Hacking
    202. Windows XP Explained
    203. Unaccessible Dirs/FILES From [Another Method] [ONLY WORKS IN
    WINDOWS Older Than XP]
    204. How To Look At Someones Desktop In XP
    205. Why Linux Will Never Be As Secure As Open bsd
    206. Hack Into Windows Network
    207. Sendmail And Beyond: Kewl Tips And Tricks
    208. What Is The POP3 Protocol
    209. Various Send Mail Holes - Part 1
    210. Various Send Mail Holes - Part 2
    211. TCP\IP: A Mammoth Description
    212. The Sendmail Tutorial
    213. The FTP Tutorial
    214. The FTP Tutorial
    215. Giving the Finger to port 79 / Simple Finger Deamon Tutorial by
    Paris2K
    216. Sendmail Tutorial Version 1.1 - (UGW Securtiy Information Base)
    217. FakeMail - How to Send Fake Mail Using SMTP Servers
    218. TCP Wrappers Disclosed
    219. Register Modfying - A Must Read For Every Cracking Newbie
    220. Cracking "Customizer 2000 for w9x/me ver. 6.5.3"
    221. Cracking "Sweet Little Piano v1.83"
    222. New Tech Hacks Crack
    223. The Crack Tutorial - Part 1
    224. The Crack Tutorial - Part 2
    225. Illegal XP Owners Beware, Microsoft Has Quite A Suprise Planned
    226. Newbies First Class
    227. MS Windows 2000 TCP/IP Implementation Details - Part 1
    228. MS Windows 2000 TCP/IP Implementation Details - Part 2
    229. MS Windows 2000 TCP/IP Implementation Details - Part 3
    230. MS Windows 2000 TCP/IP Implementation Details - Part 4
    231. MS Windows 2000 TCP/IP Implementation Details - Part 5


    B. Windows Security:
    1. Buffer Overflow Vulnerability in IIS 5.0
    2. Superfluous Decoding Vulnerability in IIS
    3. Buffer Overflow in IIS Indexing Service DLL
    4. IIS 5 Remote .printer overflow
    5. IIS CGI Filename Decode Error exploit
    6. Win2000 IIS exploit
    7. AusCERT Alert 2001.02 IIS E-Commerce Vulnerabilities
    8. AusCERT Alert 2001.07 Microsoft IIS 5.0 Remote Administrator
    Compromise Vulnerability
    9. IIS Directory Traversal bugs
    10. IIS Remote Buffer Overflow
    11. IIS IDQ Exploit
    12. IIS - MS update on several patched vulnerabilities
    13. CIAC L-078 - Microsoft IIS unchecked buffer in isapi extension
    14. CIAC L-083 - Microsoft CGI Filename Decode Error Vulnerability in
    IIS
    15. IIS view dir structure, view/delete files, exec arbitrary code,
    DoS
    16. IIS CGI processing weakness
    17. IIS flaw leads to deliberate memory leak
    18. CIAC L-139 Microsoft IIS %25u encoding IDS bypass vulnerability
    19. IIS buffer overflow
    20. IIS ISAPI index server extension query processing flaw
    21. IIS ASP show-source vulnerability
    22. IIS ASP processor will crash if device-files are attempted to be
    opened
    23. Windows 2000 IIS 5.0 buffer overflow
    24. IIS 5.0 remote restart
    25. CIAC L-132 Microsoft Cumulative Patch for.IIS
    26. AusCERT Alert 2001.08 Current widespread intruder activity against
    IIS and sunrpc
    27. Microsoft IIS Hotfix Summary
    28. CIAC L-100 - FrontPage Sub-Component Vulnerability
    29. FrontPage Server Extensions DoS
    30. Microsoft Internet Explorer calls telnet.exe with unsafe command-
    line arguments
    31. Microsoft Internet Explorer-Content Type Falsification
    32. MSIE: Automatic Execution of Embedded MIME Types
    33. IE Bookmark spoof concept
    34. IE6 invalid URL crash
    35. CIAC L-066 - Internet Explorer MIME Header Vulnerability
    36. CIAC L-087 - Microsoft Internet Explorer Flaws in Certificate
    Validation
    37. MSIE crash via malformed link
    38. MSIE 4.x crash with very simple link
    39. MSIE disable certificate validation, fake URL in browser bar
    40. MSIE read textfiles from client's hard disk
    41. MSIE - breaking the authentication mechanism
    42. MSIE / Outlook XP may allow arbitrary commands to be executed from
    a malicious website
    43. Multiple Remote Windows XP/ME/98 Universal Plug and Play
    Vulnerabilities
    44. Window File Wiping Utilities Miss Alternate Data Streams
    45. Microsoft Windows NT/2000 Trust Domain Vulnerability
    46. Microsoft Telnet Server Buffer Overflow Vulnerability
    47. MS Exchange - Incorrectly Sets Remote Registry Permissions
    48. Microsoft Internet Explorer Cumulative Patch
    49. CIAC L-126 Microsoft Remote Procedure Call RPC Server
    Vulnerability
    50. CIAC L-142 RPC Endpoint Mapper Vulnerability
    51. CIAC M-004 Excel and PowerPoint Macro Vulnerability txt
    52. CIAC M-005 office xp error reporting sends sensitive docs txt
    53. Office XP / MSIE - Malicious ActiveX controls lead to arbitrary
    code execution
    54. CIAC L-089 - Microsoft Unchecked Buffer in Media Player ASX
    Processor
    55. WinZIP Computing's WinZIP 8.0, PKWare PkZip 4.0, RARSoft WinRar
    2.80 - directory traversal issues
    56. Windows Media Player - crashing the system
    57. Word for Win32/Mac - macros in templates linked to by RTF
    documents can be caused to run on opening
    58. MS Word crash
    59. MS Word macro security issues
    60. Interbase Server Contains Compiled-In Backdoor Account
    61. CIAC L-073 - MS ISA web proxy DoS
    62. CIAC L-074 - MS webdav runs scripts as user
    63. CIAC L-079 - Microsoft Domain Controller Core Service Memory Leak
    64. CIAC L-081 - Microsoft Index Server Search Function Buffer
    Overflow
    65. CIAC L-091 - Microsoft Exchange Server Outlook Web Access Flaw
    66. CIAC L-092 - Microsoft Predictable Name Pipes In Telnet
    67. CIAC L-095 - Microsoft SQL Query Method Vulnerability
    68. CIAC L-098 - Microsoft Index Server ISAPI Extension Buffer
    Overflow
    69. CIAC L-101 - Microsoft LDAP Over SSL Password Vulnerability
    70. CIAC L-107 - (Win2000) Microsoft Authentication Error in SMTP
    Service
    71. Trend Micro Virus Buster Ver.3.5x read arbitrary files
    72. Spynet Chat 6.5 DoS
    73. Eudora 5.1 execute arbitrary code
    74. Hotmail exploit for Linux
    75. InterAccess DoS
    76. Icecast Remote DoS, Folder Traversal Exploit
    77. Incredimail remote file overwrite
    78. Win2k LDAP Domain Admin compromise
    79. NetProwler disable IDS
    80. NetProwler weak passwords
    81. Netscape Enterprise Server on NT - DoS
    82. Outlook Express spoofarino
    83. Crash Win95/95/ME running Mcafee Remote Desktop 3.0
    84. Windows 2000 SMTP service authentication flaw
    85. Windows 2000 telnet service seven vulnerabilities
    86. VdnsServer 1.0 DoS
    87. Becky! 2.00.05 Buffer Overflow
    88. IBM Windows DB2 services can be crashed remotely
    89. DynFX POPd Buffer Overflow
    90. Electrocomm 2 and prior DoS
    91. HyperTerminal Buffer Overflow
    92. Microsoft Exchange malware scripts allowed
    93. ARP Table handling bug in Windows protocol stacks
    94. CIAC L-113 Microsoft Outlook View Control Exposes Unsafe
    Functionality txt
    95. AusCERT Alert 2001.04 Erroneous VeriSign-Issued Digital
    Certificates Pose Spoofing Hazard
    96. Offline Explorer Advisory
    97. AVTronics InetServer Buffer Overflow
    98. NNTP Win2k/NT Memory Leak
    99. PcAnywhere 9.2 DoS
    100. ISA Server - three security vulnerabilities
    101. Java Plugin 1.4 with JRE 1.3 doesn't handle certificates properly
    102. Microsoft DCE/RPC inadequately validated user inputs
    103. OpenView and NetView execute arbitrary commands
    104. Win 2000 IrDA remote BSoD
    105. WinAMP ShoutCast server crash
    106. Windows 2000 telnet service DoS
    107. Windows RDP memory leak
    108. ZoneAlarm harmful files quarantining failure
    109. Trend Micro Applet Trap 2.0 - attackers can bypass restrictions
    110. Identix Biologon only locks screen zero
    111. CIAC L-109 - VPN-1 Firewall-1 RDP Comm Vulnerability
    112. Windows 2000 Kerberos DoS
    113. TrendMicro InterScan WebManager Version 1.2 RegGo.dll Buffer
    Overflow
    114. TrendMicro InterScan WebManager Version 1.2 Buffer Overflow
    115. SurfControl - bypass with proxy
    116. VirusWall for NT 3.51 - buffer overflow
    117. VirusWall for NT - smtpscan.dll remote execute arbitrary command
    118. VirusWall for NT - HttpSaveC?P.dll remote execute arbitrary
    command
    119. VirusWall for NT - RegGo.dll buffer overflow
    120. VirusWall for NT - remote user can change config
    121. VirusWall for NT - remote user can gain admin functions access
    122. WatchGuard lets blocked-by-extension attachments through anyway
    123. AppletTrap restrictions can be bypassed
    124. Win2k EFS plaintext copies of supposedly-encrypted files
    125. eSafe Gateway - bypass filtering mechanism
    126. Check Point VPN-1(TM) & FireWall-1(R) Version 4.1 - bypass with
    faked RDP packets
    127. VPN-1/FireWall-1 string format errors
    128. SpyAnywhere plaintext password
    129. Checkpoint Firewall-1 Security Issues
    130. MAILsweeper - bypass malicious file blocking
    131. PAV prior to 6.23.00 handles malformed UPX-packed files badly
    132. PWS long filename vulnerability
    133. Check Point RDP Bypass Vulnerability
    134. Netscape Messenger may reveal locations of files for other
    exploits
    135. Netscape exploit
    136. Mozilla prior to 0.9.2 password compromise
    137. iPlanet/Netscape Enterprise Web Publisher Buffer Overflow
    138. Win2K kernel privilege elevation
    139. Win 2000 Hotkey mapping vulnerabilities
    140. Exploiting Windows NT 4.0 Buffer Overflows
    141. Windows NT Deconstruction Techniques
    142. Looking inside your Windows 98 - Finding an hidden incredible
    database inside your computer
    143. Phun with Windoze
    144. Windows 95/98/NT Backdoor
    145. Some Windows NT Junk
    146. Fun with Windoze Networking
    147. Bugs that I am embarassed to admit I found
    148. Win NT, 2000 kernel reboot
    149. Win2000 unauthorized database access
    150. WinNT 4.0 kernel local DoS
    151. Window Maker Buffer Overflow
    152. Windows 2000 SP2 and earlier kernel admin lockout
    153. Windows Media Player 6.4, 7, and 7.1 unchecked buffer
    154. dumpevt.pl
    155. CompaqInsightManager Check & DoS 0.5
    156. dumpevt2.pl for NT
    157. NT Test For Guest Scanner
    158. Rebuttal against Steve Gibson's war on Windows XP Raw Sockets
    159. Proper Use of Open Source Software at Microsoft


    C. Unix And Linux Security:
    1. Understanding the SSH CRC32 Exploit
    2. Common files of the /etc directory and their uses
    3. A Brief programming tutorial in C for Raw Sockets
    4. Introduction to Socket Programming
    5. Coping With The Threat of Computer Security Incidents - A Primer
    from Prevention through Recovery - Part 1
    6. Coping With The Threat of Computer Security Incidents - A Primer
    from Prevention through Recovery - Part 2
    7. Improving The Security of Your Unix System - Part 1
    8. Improving The Security of Your Unix System - Part 2
    9. Delivering Signals for Fun and Profit
    10. A Newbie's Guide to Sockets in Perl
    11. Exploitation of Vulnerability in CDE Subprocess Control Service
    12. Multiple Vulnerabilities in Many Implementations of the Simple
    Network Management Protocol (SNMP) - Part 1
    13. Multiple Vulnerabilities in Many Implementations of the Simple
    Network Management Protocol (SNMP) - Part 2
    14. Snort IDS Denial of Service Vulnerability
    15. Cisco Secure Access Control Server NDS User Authentication
    Vulnerability
    16. Multiple Vulnerabilities in Multiple Implementations of SNMP
    17. OpenSSH UseLogin Privilege Elevation Vulnerability
    18. Buffer Overflow in System V Derived Login
    19. Multiple Vulnerabilities In LPD
    20. Multiple SSH Version 1 Vulnerabilities
    21. Multiple Vendor CDE dtpscd Process Buffer Overflow
    22. SSH 3.0 root exploit
    23. Sendmail input validation error
    24. Services for Unix memory leaks
    25. Telnetd buffer overflows
    26. Xman suid exploit
    27. A Guide to playing with gawk
    28. AOLServer 3.2 exploitable buffer overflow
    29. ARCServeIT Client 6.6x - two or more /tmp races
    30. Adobe Acrobat bad permissions
    31. An automated response system under Unix using TCP Wrappers
    32. Arkeia 4.2 cleartext transmission
    33. Arkeia Backup bad permissions
    34. Avaya Argent Office local vulnerabilities
    35. BIND Inadvertent Local Exposure of HMAC keys
    36. BIND dnskeygen vulnerability
    37. BestCrypt 0.6-0.8 exploitable buffer overflow
    38. BestCrypt 0.7 flaw
    39. Buffer Overflow in QPopper
    40. Buffer Overflow in rsaref2 and SSH
    41. Cfingerd <1.4.3 Remote Root Exploit
    42. Cfingerd Buffer Overflow
    43. Crontab tmp race condition
    44. CylantSecure can be disabled by an attacker
    45. Denicomp REXECD/RSHD DoS
    46. Dqs 3.2.7 Buffer Overflow
    47. Dsh local root exploit
    48. Ethereal 0.8.13 AFS ACL parsing buffer overflow bug
    49. Execve/ptrace race condition exploit
    50. Expect overflow
    51. Exploiting WU-FTPD 2.6
    52. Fpf module kernel panic
    53. Gauntlet Firewall CSMAP and smap smapd Buffer Overflow
    Vulnerability
    54. Ghttpd 1.4 Exploitable Buffer overflow
    55. Glibc/locale format string bug exploit
    56. INFOLEAK and TSIG bug exploit
    57. Iplanet calendar server 5.0p2 plaintext/world-readable password
    58. KAV for sendmail 3.5.135.2 syslog() format string bug
    59. Ktvision prior to 0.1.1-271 trivial symlink attack
    60. Lightweight Directory Access Protocol LDAP Vulnerabilities
    61. Linux/FreeBSD IP Firewalling
    62. Lmail mktemp() race
    63. MDBMS 0.99b9 and below exploitable buffer overflow
    64. MIT Kerberos 5 telnetd Buffer Overflows
    65. Majordomo open() call vulnerability
    66. Multi-Vendor format String Vulnerability in ToolTalk Service
    67. NFS Export Root Exploit
    68. NTPD Exploit
    69. Ncurses 4.2, 5.0 (earlier?) exploitable buffer overflows
    70. Network Time Protocol Vulnerabilities
    71. Ntpd Remote Root Exploit
    72. Ntpd prior to 4.0.99k remote buffer overflow attack
    73. OpenSSH delete cookies
    74. OpenSSL Random Number Problems
    75. OpenView NNM buffer overflow
    76. OpenView execute any program
    77. Oracle Listener - 4 DOS attacks on Unix version
    78. RSA BSAFE SSL-J 3 x Vulnerability
    79. Remote Buffer Overflow in telnetd
    80. SSH Secure Shell Remote Root Exploit Vulnerability
    81. Samba Security Vulnerability
    82. Sendmail - numerous race conditions
    83. Sendmail Debugger Arbitrary Code Execution Vulnerability
    84. Su-wrapper 1.1.1 exploit
    85. Sudo prior tp 1.6.3p6 exploitable bug
    86. TCP/IP packetstorm
    87. Vixie cron exploit
    88. W3m 0.2.1 buffer overflow
    89. XFree xdm trivial cookie computation
    90. White paper on LaBrea and Tarpits
    91. ident-scan
    92. checkXusers
    93. FTP Bounce Port Scanner
    94. qaudit.pl 02
    95. rkscan
    96. log-proxy
    97. CueCat Decoder 1.0.1 in Perl
    98. IDES - Intrusion Detection Evasion System
    99. FreeBSD Local Root Exploit
    100. How I Secured my FreeBSD System
    101. Exploiting Kernel Buffer Overflows FreeBSD Style
    102. CIAC L-075 - Freebsd ipfilter vulnerability
    103. CIAC L-111 - FreeBSD Signal Handling Flaw
    104. The lazy man's "PGPDisk for FreeBSD"
    105. CIAC L-122 FreeBSD tcpdump Remote Buffer Overflow Vulnerability
    106. Mozarela Kernel Trojan for BSD
    107. BSDi 3.0/3.1 kernel kill
    108. OpenBSD 2.8 xhost remote x control
    109. OpenBSD 2.9,2.8, NetBSD kernel race condition, local root
    110. OpenBSD, FreeBSD top format string vulnerability
    111. CIAC L-070a - FTP Filename Expansion Vulnerability
    112. IPFilter - fragment caching lets through any packet
    113. NetBSD node DoS
    114. NetBSD sh3 kernel vulnerability
    115. OpenBSD 2.9,2.8, NetBSD kernel race condition / root compromise
    116. OpenBSD 2.6...2.9 ICMP error fingerprinting issues
    117. BSDish kernel ICMP error fingerprinting issues
    118. OpenBSD VFS numerous bugs
    119. Buffer Overflow in telnetd
    120. Sendmsg(2) insufficient length checking
    121. autoconf-sectest
    122. Gork 2.0b
    123. CIAC L-065 - Solaris Exploitation of snmpXdmid
    124. Solaris 7/8 "at" exploitable vulnerability
    125. Solaris 8 libsldap initialization code buffer overflow
    126. Solaris 2.6, 7, 8 (x86 and Sparc) in.lpd buffer overflow
    127. Solaris 2.5, 2.5.1, 2.6, 7, 8 mailx buffer overrun
    128. Solaris 2.6, 8 mailtool buffer overrun
    129. Solaris 2.6, 7, 8 yppasswd buffer overflow
    130. Solaris in.lpd Buffer Overflow
    131. AusCERT Alert 2000.01 Solaris chkperm buffer overrun
    vulnerability
    132. AusCERT Alert 2000.04 Buffer overrun in lp/lpset/lpstat on
    Solaris
    133. AusCERT Alert 2001.06 Sun Solaris DMI to SNMP mapper daemon
    snmpXdmid contains buffer overflow
    134. Mailx Overflow - Solaris 8
    135. Exploitation of snmpXdmid
    136. Sun ypbind Buffer Overflow
    137. Solaris 2.6, 7 dtmail buffer overflow
    138. Solaris 2.6, 7, 8 xlock local root
    139. CIAC L-127 Sun BIND Vulnerabilities
    140. CIAC L-129 Sun in ftpd Filename Expansion Vulnerability
    141. CIAC L-138 Sun in lpd vulnerability txt.010831131126
    142. CIAC M-008 Sun rpc yppasswdd Security Vulnerability
    143. CIAC L-103 - Sun Microsystems SunOS ypbind Buffer Overflow
    Vulnerability
    144. SunOS 5.8 cb_reset Buffer Overflow
    145. SunOS 5.6, 5.7, 5.8, Digital UNIX mail buffer overflow
    146. SunOS 5.8 /opt/SUNWvts/bin/ptexec possibly exploitable buffer
    overflow
    147. SunOS 5.5.1, 5.7, 5.8 whodo exploitable stack overflow
    148. Cobalt Cube - read local files with webserver permissions
    149. Cobalt RaQ3 poprelayd exploit
    150. FireWall-1 bandwidth utilization report generator
    151. Secure Sun
    152. SGI IRIX shells create temporary files insecurely
    153. IRIX NEdit Vulnerability
    154. SGI Multiple Local SendMail Vulnerability
    155. IRIX /usr/lib/print/netprint -n arbitrary code exec bug
    156. IRIX 6.2...6.5.8 telnetd remote root
    157. CIAC L-080 - SGI IRIX rpc espd Buffer Overflow - remote root
    158. CIAC L-099 - SGI PCP Pmpost Symlink Vulnerability
    159. CIAC L-125 SGI netprint Dynamic Shared Objects DSO Exploit
    160. CIAC L-135 SGI File Globbing Vulnerability in ftpd
    161. IRIX 6.5.5, 6.5.8 Embedded Support Partner Infrastructure Sender
    (rpc.espd) Buffer Overflow
    162. PCP package (IRIX, SuSE Linux) pmpost symlink exploit
    163. HP-UX Security Vulnerability with wu-ftpd 2.6
    164. CIAC L-093 HP-UX kmmodreg Vulnerability
    165. CIAC L-102 HP OpenView Network Node Manager Security
    Vulnerability
    166. CIAC L-110 HP Open View Event Correlation Services Vulnerability
    167. CIAC L-114 Hewlett-Packard login Vulnerability
    168. CIAC L-115 Hewlett-Packard dlkm Vulnerability
    169. CIAC L-118 Hewlett-Packard ftpd and ftp Vulnerability
    170. CIAC L-119 Hewlett-Packard mkacct Program Vulnerability
    171. CIAC L-134 HP Security Vulnerability In rlpdaemon
    172. CIAC L-136 HP Security Vulnerability In PRM
    173. CIAC L-143 HP libsecurity Vulnerability
    174. CIAC M-003 Hewlett-Packard rpcbind Security Vulnerability
    175. CIAC M-006 HP-UX telnetd Security Vulnerability
    176. HP-UX / 800 models cue exploit
    177. HP-UX 11.0 kmmodreg symlink problem
    178. Hewlett-Packard Remote Logic Flaw Vulnerability in rlpdaemon
    179. IBM AIX 4.3.x and 5.1 libi18n Buffer Overflow
    180. AIX diagrpt root exploit
    181. CIAC L-123 AIX libil8n Library Vulnerability
    182. CIAC L-131 IBM AIX telnetd Buffer Overflow
    183. Unixware 7.1.1 rtpm multiple bugs
    184. Unixware 5.x vi predictable /tmp filenames
    185. Unixware 5.x scoadmin predictable /tmp filenames
    186. Compaq Tru64 Unix kdebugd vulnerability
    187. LKM Hacking Made Easy
    188. Yet Another Paper on Trojaning the Linux Kernel
    189. Anti Anti-Sniffer Patch
    190. Red Hat Linux "rsync" Vulnerability
    191. Hewlett-Packard Buffer Overflow in Telnet Server Vulnerability
    192. Multiple Vendor wu-ftpd File Globbing Heap Corruption
    Vulnerability
    193. hplx-sendmail Vulnerability
    194. Red Hat glibc Vulnerability
    195. Netkit 0.17 in.telnetd exploitable overflow
    196. Emacs rcs2log insecure /tmp usage
    197. Fetchmail remotely exploitable memory corruption
    198. IMP prior to 2.2.6 - 3 security issues
    199. Linux 2.0, 2.2, etc kernel IP Masquerading Vulnerability
    200. Linux Kernel 2.2.x execve/ptrace race condition still exists
    201. Linux Slackware 8.0, kernel 2.4.5 world writeable files
    202. Pic (groff) issues
    203. CIAC L-067 - Linux worm Adore
    204. CIAC L-104 - Linux xinetd Buffer Overflow
    205. Analog Buffer Overflow
    206. Multiple archivers - directory traversal issues
    207. InoculateIT for Linux DoS, possible root compromise
    208. SuSE 7.0 dip 3.3.7p security risk
    209. exim format string bug
    210. GazTek HTTP Daemon v1.4 (ghttpd) Exploitable Buffer Overflow
    211. Imp-2.2.4 symlink attack
    212. Linux execve() - read from /proc/$$/mem
    213. Linux Kernel 2.4.x fingerprinting issues
    214. LPRng Exploitable Race Condition
    215. Linux man exploit
    216. ml85p Linux Helper Binary for Samsung ML-85G Printer insecure
    temp file creation
    217. nedit insecure file creation could lead to elevation of
    privileges
    218. scotty (ntping) buffer overflow
    219. OpenSSH - delete cookies file
    220. rxvt buffer overflow
    221. Samba - local users can corrupt local devices
    222. smbd insuffucient parameter validation
    223. Linux Slackware 7.1 /etc/shells poor permissions
    224. TIAtunnel exploitable buffer overflow
    225. Tripwire 2.2.1, tripwire 2.3.0 (and tripwire-ASR-1.3.1) insecure
    temp files
    226. Linux xfs Denial of Service
    227. xinetd-2.1.8.9pre11-1 possible remote root
    228. xloadimage exploitable overflow
    229. eXtremail remotely exploitable format string condition
    230. cfingerd exploit
    231. Screen 3.7.6 local exploit
    232. Slackware /usr/bin/locate trojan
    233. Slackware /usr/bin/man symlinks issues
    234. Qpopper and pam.d account existence brutable
    235. CIAC M-009 Red Hat linux PAM vulnerability
    236. CIAC M-010 Red Hat OpenSSH Vulnerability
    237. A Guide to Securing RedHat Linux 6.0
    238. RedHat 6.0 LILO PAM Filter Workaround
    239. CIAC L-076 - Red Hat ptrace exec race condition
    240. CIAC L-084 - Red Hat Samba Package tmp Race Condition
    241. CIAC L-096 - Red Hat LPRng Vulnerability
    242. RedHat 7.0 with man-1.5h1-10 (default package) and earlier
    exploitable buffer overflow
    243. man 1.5h10 + man 1.5i-4 (RedHat 7.0, 7.1) root elevation
    244. RedHat 7.0 minicom root compromise
    245. Linux Red Hat 6.0 wall format strings exploit
    246. Sendfile 2.1 (Debian Linux 2.2) possible arbitrary code execution
    247. Vixie cron 3.0pl1 (Debian 2.2) can be fooled into not dropping
    privileges
    248. Debian xvt 2.1 Buffer overrun
    249. ipfwadm2ipchains
    250. ppp-in-telnet 1.0
    251. Bogon
    252. Cdgxn-Bsd
    253. Check 1.0
    254. envcheck 1.3 LKM
    255. exec 1.0.4
    256. Neped - Network Promiscuous Ethernet Detector 1.4


    D. Security Publications:
    1. Computer Incident Advisory Capability - 01
    2. Computer Incident Advisory Capability - 02E
    3. Computer Incident Advisory Capability - 94-03A
    4. Computer Incident Advisory Capability - 94-04C
    5. Computer Incident Advisory Capability - 94-05D
    6. Computer Incident Advisory Capability - 95-06
    7. Computer Incident Advisory Capability - 95-07
    8. Computer Incident Advisory Capability - 95-07B
    9. Computer Incident Advisory Capability - 95-08
    10. Computer Incident Advisory Capability - 95-09
    11. Computer Incident Advisory Capability - 95-10
    12. Computer Incident Advisory Capability - 95-11
    13. Computer Incident Advisory Capability - 95-12
    14. Computer Incident Advisory Capability - 96-01
    15. Call and Response Telephone Compilations
    16. Forbidden Knowledge - The Final Chapter
    17. Forbidden Knowledge #1
    18. Forbidden Knowledge #10
    19. Forbidden Knowledge #13
    20. Forbidden Knowledge #14
    21. Forbidden Knowledge #2
    22. Forbidden Knowledge #3
    23. Forbidden Knowledge #4
    24. Forbidden Knowledge #5
    25. Forbidden Knowledge #6
    26. Forbidden Knowledge #7
    27. Forbidden Knowledge #8
    28. Forbidden Knowledge #9
    29. Keen Veracity 11 - Part 1
    30. Keen Veracity 11 - Part 2
    31. Keen Veracity 11 - Part 3
    32. Keen Veracity 11 - Part 4
    33. Keen Veracity 11 - Part 5
    34. Lexxicor IRC Abuse ezine #1
    35. Lexxicor IRC Abuse ezine #2
    36. Lexxicor IRC Abuse ezine #3
    37. A Cracking Guide For Beginners
    38. A Cracking Guide For Advanced Amateurs Part I
    39. A Cracking Guide For Advanced Amateurs Part II
    40. Phrack 57 File 0x01 Introduction
    41. Phrack 57 File 0x02 Loopback
    42. Phrack 57 File 0x03 Linenoise
    43. Phrack 57 File 0x04 Editorial policy
    44. Phrack 57 File 0x05 IA64 shellcode
    45. Phrack 57 File 0x06 Taranis read your e-mail
    46. Phrack 57 File 0x07 ICMP based OS fingerprinting
    47. Phrack 57 File 0x08 Vudo malloc tricks - Part 1
    48. Phrack 57 File 0x08 Vudo malloc tricks - Part 2
    49. Phrack 57 File 0x09 Once upon a free()
    50. Phrack 57 File 0x0a Against the System: Rise of the Robots
    51. Phrack 57 File 0x0b Holistic approaches to attack detection
    52. Phrack 57 File 0x0c NIDS on mass parallel processing architecture
    53. Phrack 57 File 0x0d Hang on snoopy
    54. Phrack 57 File 0x0e Architecture spanning shellcode
    55. Phrack 57 File 0x0f Writing ia32 alphanumeric shellcodes - Part 1
    56. Phrack 57 File 0x0f Writing ia32 alphanumeric shellcodes - Part 2
    57. Phrack 57 File 0x10 Cupass and the net user change password
    problem
    58. Phrack 57 File 0x11 Phrack World News
    59. Phrack 57 File 0x12 Phrack magazine extraction utility
    60. Risks Forum Digest - Part 1
    61. Risks Forum Digest - Part 2
    62. Risks Forum Digest - Part 3
    63. Risks Forum Digest - Part 4
    64. Risks Forum Digest - Part 5
    65. Risks Forum Digest - Part 6
    66. Risks Forum Digest - Part 7
    67. Risks Forum Digest - Part 8
    68. Risks Forum Digest - Part 9
    69. Risks Forum Digest - Part 10
    70. Risks Forum Digest - Part 11
    71. Risks Forum Digest - Part 12
    72. Risks Forum Digest - Part 13
    73. Risks Forum Digest - Part 14
    74. Risks Forum Digest - Part 15
    75. Risks Forum Digest - Part 16
    76. Risks Forum Digest - Part 17
    77. Risks Forum Digest - Part 18
    78. Risks Forum Digest - Part 19
    79. Risks Forum Digest - Part 20
    80. Risks Forum Digest - Part 21
    81. Risks Forum Digest - Part 22
    82. Risks Forum Digest - Part 23
    83. Risks Forum Digest - Part 24
    84. Risks Forum Digest - Part 25
    85. Risks Forum Digest - Part 26
    86. Risks Forum Digest - Part 27
    87. Risks Forum Digest - Part 28
    88. Risks Forum Digest - Part 29
    89. Risks Forum Digest - Part 30
    90. Risks Forum Digest - Part 31
    91. Tricks of the Trade #1
    92. Tricks of the Trade #2
    93. Tricks of the Trade #3 - Part 1
    94. Tricks of the Trade #3 - Part 2
    95. Tricks of the Trade #4 - Part 1
    96. Tricks of the Trade #4 - Part 2
    97. Tricks of the Trade #6 - Part 1
    98. Tricks of the Trade #6 - Part 2
    99. Tricks of the Trade #6 - Part 3
    100. Tricks of the Trade #6 - Part 4
    101. Tricks of the Trade #6 - Part 5
    102. Tricks of the Trade #6 - Part 6
    103. Underground Periodical #1
    104. Underground Periodical #2 - Part 1
    105. Underground Periodical #2 - Part 2
    106. Underground Periodical #3 - Part 1
    107. Underground Periodical #3 - Part 2
    108. Underground Periodical #4 - Part 1
    109. Underground Periodical #4 - Part 2
    110. Underground Periodical #4 - Part 3
    111. Underground Periodical #5 - Part 1
    112. Underground Periodical #5 - Part 2
    113. Underground Periodical #6 - Part 1
    114. Underground Periodical #6 - Part 2
    115. Underground Periodical #6 - Part 3
    116. Underground Periodical #6 - Part 4
    117. Underground Periodical #7 - Part 1
    118. Underground Periodical #7 - Part 2


    E. Crypto, Virology, Cracking And Backdoors:
    1. Phil Zimmermann: "No regrets" about developing PGP
    2. This is the signature for the GnuPG 1.06 Tarball
    3. Cracking the EAN Barcode System
    4. Replacing PGP 2.x with GPG
    5. GnuPG format string weakness
    6. Cryptanalysis of Microsoft's PPTP Authentication Extensions
    7. Tools Information :: Crypto :: Cryptanalysis
    8. Detecting Steganographic Content on the Internet
    9. Tools Information :: Crypto :: Steganography
    10. Gnu Privacy Handbook - Part 1
    11. Gnu Privacy Handbook - Part 2
    12. High-bandwidth Digital Content Protection system cracked
    13. Unauthentic "Microsoft Corporation" certificates
    14. A Primer on Mobile Application Security
    15. Sapphire Stream Cipher
    16. The Sapphire II Stream Cipher
    17. American Vietnam P.O.W. Code
    18. The CueCat UPC-A Cipher
    19. Network Solutions Crypt-PW Weak Encryption
    20. Messenger/Hotmail bug inpassword encryption
    21. OpenSSL up to 0.9.6a pseudorandom number generator design error
    22. PassWD2000 v2.x weak encryption
    23. ArGoSoft FTP Server 1.2.2.2 password decryption
    24. CesarFTP v0.98b Directory Traversal, Weak Password Encryption
    25. Cryptography and Data Security Tutorial Part 1
    26. Cryptography and Data Security Tutorial Part 2
    27. Cryptography and Data Security Tutorial Part 3
    28. Cryptography and Data Security Tutorial Part 4
    29. Cryptography and Data Security Tutorial Part 5
    30. Cryptography and Data Security Tutorial Part 6
    31. Cryptography and Data Security Tutorial Part 7
    32. Cryptography and Data Security Tutorial Part 8
    33. Microsoft's Digital Rights management Scheme
    34. Tools Information :: File Encryptors
    35. W32/Myparty Malicious Code
    36. SirCam virus passes right through VirusWall 3.51 Build 1321 for NT
    37. Adobe Acrobat PDF Files can be used to deploy viruses!
    38. Is McAfee going to deliberately not detect the "Magic Lantern"
    virus???
    39. McAfee's response to the allegation that they will turn a blind
    eye to "Magic Lantern"
    40. The FBI wants to use the BadTrans worm's stolen data
    41. A little source code to parse the BadTrans worm's pilfered data
    42. AusCERT Alert 2000.05 Love Letter Worm Virus
    43. AusCERT Alert 2000.06 Newlove Virus
    44. AusCERT Alert 2000.07 Resume Macro Worm
    45. AusCERT Alert 2000.08 Stages VBS Worm
    46. AusCERT Alert 2000.11 Hybris Worm
    47. AusCERT Alert 2001.01 AnnaKournikova.jpg.vbs (Onthefly) Worm
    48. AusCERT Alert 2001.03 W32/Magistr Virus/Worm
    49. AusCERT Alert 2001.05 New Bind worm: 1i0n
    50. AusCERT Alert 2001.09 Homepage.HTML.vbs (Homepage) Virus
    51. AusCERT Alert 2001.10 New Word Macro Virus
    52. AusCERT Alert 2001.11 W32/Leave.B Worm
    53. AusCERT Alert 2001.12 W32.Sircam.Worm@mm Virus
    54. AusCERT Alert 2001.13 Potential Increase in "Code Red" Worm
    Activity
    55. AusCERT Alert 2001.14 New Worm - "CodeRedII"
    56. AusCERT Alert 2001.15 W32/Nimda.A@mm worm
    57. VBS/OnTheFly (Anna Kournikova) Malicious Code
    58. Sadmind/IIS Worm
    59. Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service
    DLL
    60. SirCam FAQ
    61. W32/Sircam Malicious Code
    62. Continued Threat of the "Code Red" Worm
    63. Nimda Worm VIR
    64. CIAC L-117 Code Red Worm
    65. CIAC L-120 Cisco Code Red Worm Impact
    66. CIAC L-144 the W32 nimda Worm txt.010921171330
    67. The Code Red Worm
    68. The Code Red II worm
    69. CIAC L-064 - The Lion Internet Worm DDoS Risk
    70. Tools Information :: Virus/Worm Protection Utilities
    71. Tools Information :: Back Orifice and BO2K
    72. Tools Information :: SubSeven and Addons
    73. Tools Information :: Remote Administration Tools
    74. Tools Information :: Trojan Detectors/Removers/Retaliators
    75. The possibility of hiding trojans in Shell Scraps - files with
    extensions that Windowz tries very hard to hide HAK
    76. Backdoors
    77. CIAC L-077 - Glacier Backdoor
    78. Creating Trojan PGPDisks
    79. Fun with "Trojan" Wingates


    F. Phreaking Information:
    1. Updates for the alt.phreaking FAQ
    2. The New AT&T Network
    3. Rebuttal of "The Scariest Number In The World"
    4. FCC Part 68 FAQs
    5. Sniper's Guide to Telstra LPR Traces
    6. Hacking K-Mart's Phone System
    7. 1-400 Phone Numbers
    8. Usenet thread on DATU passes
    9. Phone-Computer on Playing Around
    10. Free 976 Number Hack
    11. The Guide to Mostly Chirpy Phreaking Part 1
    12. The Guide to Mostly Chirpy Phreaking Part 2
    13. The Guide to Mostly Chirpy Phreaking Part 3
    14. New School Phreaking
    15. PBX's and WATS
    16. Madrox's guide to... Extender and PBX hacking
    17. Telephone Frequency and Crystal Tutorial
    18. Technician Ring Back Numbers
    19. Trucking/Trashing
    20. DATUs Explained
    21. Teletech (Itron) Telco truck terminal system
    22. Anoy-O-Phone
    23. Oncore Communications Exploit Type Thingy
    24. Trashing locations in Manchester
    25. BT Lineboxes
    26. UK Phone Phreaking FAQ
    27. BT's Exchange Test Numbers
    28. BT Dial Codes
    29. Call Logging FAQ
    30. BT Basics
    31. MED Guide to UK Telephonics 1
    32. MED Guide to UK Telephonics 2
    33. The analogue T.X.E. Switch
    34. Free Calls from a Taxi Fone
    35. BT Wiring Cabinets
    36. DATU
    37. Agilent/AT&T Extender Manipulation
    38. Updated LASS Codes
    39. Dealing with PBX/CPE Fraud
    40. Telephone Systems Security Guidance Notes
    41. Swiss Telecom Info
    42. Gold Phoning
    43. Phreaker's Phun House
    44. Setting up an Alliance Meet-Me Conference
    45. Cosmos 1
    46. Cosmos 2
    47. The 1986 COSMOS Philes Part 3: Service Order Input
    48. Rules of Phreaking : plus several dozen k of interesting stuff
    from 1986
    49. The IKZ-50 System
    50. South African Phreaking technique
    51. ANAC in South Africa
    52. Various Phone Warez
    53. Just how stupid Diana PABX's are
    54. Vulnerabilities and Security Limitations of Current IP Telephony
    Systems
    55. Compromsing Voice Messaging Systems
    56. Hacking Voice Mailboxes (largely stolen from Cyber Thief)
    57. How To Phreak Answering Machines
    58. Vodacom VMB Hacking
    59. MTN Voicemail Hacking
    60. More Vodacom VMB Hacking Nonsense
    61. The Index-By-Color of The Fixer's 2K1 Box Review!
    62. The Fixer's 2K1 Box Review - Part 1
    63. The Fixer's 2K1 Box Review - Part 2
    64. Blue Box Interest: "A Phreindly Phile" - early boxing text
    65. What Can I Do With a Blue Box?
    66. Blue Boxing Numbers : Yes, toll free numbers that can still be
    boxed from!
    67. Can Blue Boxing Be Achived in the UK?
    68. Blue Boxing, po-russki
    69. Blue Box Interest : C5 Worldwide Results List (from Switzerland)
    70. Criticism of the Red Box FAQ
    71. Updates for the alt.phreaking FAQ
    72. Revised Red Box
    73. It's Too Fucking Cold To Beige Box Box
    74. Emergency "Box"
    75. Beige Boxing Techniques
    76. The Complete Lamer's Guide to Pillboxin'
    77. The Sonik Box : Use headphones instead of a phone when beige
    boxing
    78. Beige Box Plans
    79. Introduction to Phone Taps
    80. Beige Boxing in South Africa
    81. More Beigeboxing Methods
    82. The Privacy Box
    83. Telezapper Box - Disable telemarketing predictive dialers
    84. Invisible Box : Prevent In-Use Lights from Lighting
    85. The Crimson Box Explained : (Hold Button)
    86. Advanced Click Box : Frees busy lines
    87. Click Box - Frees busy lines
    88. Idiotic Box
    89. Toast Box
    90. Poor Man's Electro-Bastard Box
    91. Click Box - Frees busy lines
    92. Cheaply Made Phone Tap
    93. The Tone Box : Create static on target line
    94. The Mirror Box, a correction
    95. 9V Busy Box
    96. Blue Boxing Australia
    97. Beige and Buzy Box
    98. Blue Box in the USA
    99. Raven Box
    100. NeonRock Box
    101. The end of ACTS
    102. Slugging
    103. How to get Free Local Calls on New Payphones
    104. Payphone Calls are Free
    105. New Jersey Payphones
    106. Free Calling from Payphones - it's easier than you think!
    107. Everything you really never wanted to know about coin services
    108. Oxford Payphones 1.0
    109. Payphones - Cash and Free Calls
    110. COCOTs: What the hell are they anyway?
    111. COCOTs which were untouchable are no more!


    G. What You Can Do To Keep Your System Safe:
    1. Official Alt.Hackers.Malicious Faq - Part 1
    2. Official Alt.Hackers.Malicious Faq - Part 2
    3. Official Alt.Hackers.Malicious Faq - Part 3
    4. Information Overload for Newbies
    5. Dealing with External Computer Security Incidents
    6. AusCERT Alert 2000.03 Current Widespread Intruder Activity
    7. Continuing threats to home users
    8. Statistical Weaknesses in TCP/IP Initial Sequence Numbers
    9. Coordinated Attacks and Probes
    10. Stealth Coordinated Attacks
    11. Format Bugs
    12. What you need to: Spoof/Hijack/Predict
    13. Paranoia vs. Transparency and their effects on Internet Security
    14. Compromised Buffer Overflows, from Intel to Sparc version 8
    15. Advanced Buffer Overflow Exploit
    16. Writing Buffer Overflow Exploits - A Tutorial for beginners
    17. Digital Voodoo - The Craft of Hacking on the Internet - Part 1
    18. Digital Voodoo - The Craft of Hacking on the Internet - Part 2
    19. Digital Voodoo - The Craft of Hacking on the Internet - Part 3
    20. Digital Voodoo - The Craft of Hacking on the Internet - Part 4
    21. Digital Voodoo - The Craft of Hacking on the Internet - Part 5
    22. w00w00 on Heap Overflows
    23. CIAC Incident Handling Guidelines - Part 1
    24. CIAC Incident Handling Guidelines - Part 2
    25. CIAC Incident Handling Guidelines - Part 3
    26. ESNet/Decnet Security Policy
    27. Principles of Buffer Overflow explained
    28. Protecting Memory and Addressing - Part 1
    29. Memory and Addressing Protection - Part 2
    30. How to Hack a School Network
    31. Beginners Guide to VAX/VMS Hacking - Part 1
    32. Beginners Guide to VAX/VMS Hacking - Part 2
    33. Hacking Direct Access 5.0
    34. Oracle 9iAS Multiple Buffer Overflows in the PL/SQL Module
    35. Oracle's ADI 7.1.1.10.1 plaintext passwords
    36. Oracle (all versions of Oracle on Windows NT) DoS
    37. Oracle 8i
    38. Oracle 8i TNS Listener Exploitable Buffer Overflow
    39. Oracle 8, 9i dbsnmp Buffer Overflow
    40. Oracle 8.1.5 dbsnmp root
    41. Oracle 8i TNS Listener Buffer Overflow
    42. CIAC M-011 Oracle Trace Collection Security Vulnerability
    43. CIAC M-012 Oracle File Overwrite Security Vulnerability
    44. Oracle oratclsh vulnerability
    45. CIAC L-108 - Oracle 8i TNS Listener Vulnerability
    46. Multiple LDAP vulnerabilities
    47. Vulnerability in OpenView and NetView
    48. Mathematica 4.0, 4.1 licence manager bugs
    49. Introduction to Assembly Programming
    50. WinZip, PKZip, WinRAR - all have problems with device filenames
    51. Booby Trapped Shareware
    52. Latitude C800 BIOS Suspend to Disk problems
    53. Terminal Servers and Network Security
    54. Hacking an Access Database
    55. How to Hack Nedbank
    56. How to get a root shell on NedBank
    57. Hacking Standard Bank
    58. Hacking the CyberXpress Internet Kiosk
    59. Hacking in Switched Environments
    60. More fun with CyberXpress Internet Kiosks
    61. More fun with Nedbank's Nedassist Terminals
    62. Better Password Practices
    63. Hacking T-Online Passwords
    64. Handler and Cracking Passwd Files
    65. Tools Information :: Password Generators
    66. Tools Information :: Password Security Audit Programs
    67. sscan scanning tool
    68. Defeating Portscan Detection
    69. portchk.c
    70. pscan
    71. findomains.c
    72. Propecia Port Scanner
    73. Soup Port Scanner
    74. PScan Port Scanner
    75. Simple Ping Sweep 1.0b
    76. Simple Stealth 1.10
    77. Sl0scan
    78. Statd Overflow Scanner
    79. Web proxy port scanner Beta 1.1
    80. Tools Information :: Network Scanning
    81. Wardialing Brief
    82. Local Area Detection of Incoming War Dial Activity
    83. Tools Information :: Fingerprinting
    84. Reconstructing Serialized Java Objects from Sniffer logs
    85. krnsniff 0.1a
    86. Tools Information :: Sniffing
    87. Sage Software's MAS 200 - easy remote disable
    88. Tomcat DoS
    89. MiM simultaneous CLOSE attack
    90. Raytheon SilentRunner 2.0, 2.0.1 DoS
    91. Mirror DoS
    92. DoS Attacks using the Domain Name System
    93. June 18 DoS Threat
    94. AusCERT Alert 2000.02 Recent Denial of Service attacks
    95. NIPC Advisory 01-26 Increased Potential for Distributed Denial of
    Service (DDoS) Attacks
    96. How DDoS attacks work (in German)
    97. Babel, DDoS of Biblical Proportions
    98. Trinoo Killer
    99. Tools Information :: Denial of Service Attacks
    100. Revealing Email Headers
    101. MDaemon SMTP server 4.0.5 unauthorized relaying
    102. COTSE Pseudo-Anonymous Usenet Version 2.02
    103. Posting through closed news servers using open proxies
    104. Cookie Leak Security Hole in HTML Email Messages
    105. Email Pseudonym Server
    106. Proxomitron Naoko-4 BetaFour arbitrary Javascript execution
    107. Squid - abuse as portscanner
    108. Multiple Vulnerabilities in BIND
    109. ISC BIND Vulnerability
    110. Patch for DNS DoS
    111. Coding with the DNS Protocol
    112. BIND Vulnerabilities and Solutions
    113. DNS ID Hacking - Part 1
    114. DNS ID Hacking - Part 2
    115. Spam FAQ - Part 1
    116. Spam FAQ - Part 2
    117. Spam FAQ - Part 3
    118. Tools Information :: SPAM
    119. SurgeFTP weak hash to store admin password
    120. TrollFTPD-1.26 exploitable buffer overflow
    121. WS_FTP server 2.0.2 buffer overflow
    122. Win98 kernel bug
    123. wu-ftpd/BeroFTPD MAPPING_CHDIR Vulnerability
    124. Multiple Vulnerabilities in Wu-FTPD based daemons
    125. File Globbing Vulnerabilities in various FTP Servers
    126. wu-ftpd "site exec" vulnerability
    127. GlFTPD CPU Hog
    128. IBM TFTP Server for Java directory traversal
    129. NetWin Authentication Module 3.0b password hash issues
    130. Proftpd DoS
    131. Argosoft FTP Server Advisory
    132. AusCERT Alert 2000.09 Current widespread intruder activity
    against ftpd
    133. A-FTP Denial of Service
    134. ArGoSoft 1.2.2.2 FTP Server Directory Traversal vulnerability
    135. Broker FTP Server 5.9.5.0 Buffer Overflow/DoS, Directory
    Traversal
    136. Bison FTP Server v4r1 directory traversal
    137. Broker FTP Server 5.9.5.0 link upload vulnerability
    138. Bison FTP Server v4r1 link upload vulnerability
    139. Cerberus FTP Server 1.x Buffer Overflow
    140. CesarFTP v0.98b Buffer Overflow
    141. CesarFTP Stack Overflow
    142. CrushFTP Server 2.1.4 Multiple Vulnerabilities
    143. Win2000 ftp - any file on system can be deleted
    144. Multiple FTP Daemons Buffer Overflow - Part 1
    145. Multiple FTP Daemons Buffer Overflow - Part 2
    146. Serv-U FTP Server, G6 FTP Server, WarFTPd Server,... DoS with
    Perl exploit
    147. G6 FTP Server up to version 2.0 get path vulnerability
    148. gftp prior to 2.0.8pre1 segfault
    149. gftpd segfault
    150. Ghetto FTP Server version 1.0 beta 1 directory traversal
    151. GuildFTPD v0.97 Directory traversal
    152. GuildFTPD v0.97 buffer overrun, memory leak
    153. MIT Kerberos 5, all releases. FTP daemon buffer overflow
    154. Rumpus FTP Server 1.3.5 lockout
    155. Rumpus FTP lockup
    156. Surge FTP Server directory traversal
    157. SpoonFTP incorrect boundary checks
    158. TYPsoft FTP server break out of FTP root
    159. WFTPD 32-bit (X86) 3.00 R5 directory traversal
    160. WFTPD *.lnk problems
    161. WFTPD A: drive DoS
    162. The FTP Tutorial
    163. Free Dialup Internet
    164. ICMP Stands for Trouble
    165. Identifying ICMP Hackery Tools
    166. Virtual LAN Technology Report
    167. SSH protocol weaknesses
    168. Hacking Dockside Temporary Internet Accounts
    169. (Ab)using Offline HTTP/FTP services
    170. Coding simple Sockets in Perl
    171. Blackhole TCP/UDP behaviour and its effect on nmap
    172. Routing Information Protocol spec
    173. @Home network - taking over someone's IP address
    174. DSL Security Whitepaper
    175. Linksys DSL Router
    176. Linksys EtherFast 4-Port Cable/DSL Router cleartext passwords
    177. Multiple Vulnerabilities in Alcatel ADSL Modems
    178. Multiple DoS Vulnerabilities in Cisco Broadband Operating System
    CBOS
    179. ZyXEL Prestige 100, 202, 642R and 642R-I 2.50 ADSL Routers
    password default
    180. Surfing the Web Backwards - Backlink Navigation
    181. HTTP Basic Authentication explained
    182. HTML Form Protocol - send arbitrary data to any port
    183. Netaddress.com mailing service login form exploit
    184. How to fake a Hotmail email
    185. How we defaced www.apache.org
    186. Hacking Tripod Accounts
    187. Anonymizer, SafeWeb comments out Javascript instead of cutting it
    out completely
    188. Yahoo/Hotmail susceptible to worms
    189. gmx.net javascript filtering weakness
    190. How to Hack a Geocities-type Web Page
    191. Hotmail - view someone else's email!
    192. Roxen arbitrary file retrieval
    193. Sambar Web Server directory traversal
    194. Sambar static Blowfish key
    195. Sambar DoS
    196. NetWare Enterprise Web Server - two issues
    197. Mambo Site Server version 3.0.X admin privileges
    198. Java Personal Webserver 0.9 Denial of Service
    199. ACI 4D Webserver directory traversal
    200. McAfee ASaP VirusScan lightweight web server - break out of its
    root
    201. OmniHTTPd DoS, Show-source
    202. Mac OS X 10.0.3 / Darwin 1.3.3, Apache 1.3.14
    203. Apache 1.3.17 get directory exploit
    204. OmniHTTPd Pro DoS
    205. Jana Webserver v1.45, 1.46, 2.0Beta1 hex-encoded dot-dot
    directory traversal
    206. Lotus Domino Server 5.0.6 force Javascript to run
    207. Lotus Domino 4.x, 5.x routing loop
    208. Savant WWW url-encoded characters filtering problem
    209. vWebServer show-code vulnerability
    210. Webtrends HTTP Server show-source
    211. Personal Web sharing v1.5.5 input overflow
    212. SITEWare cleartext passwords, read arbitrary files
    213. SITEWare 2.5, 3.0 arbitrary viewing of world-readable files
    anywhere on system
    214. Trend Micro Virus Control System(VCS) unauthorized admin access
    215. WAP gateways
    216. Acme.Server 1.7 root exploit
    217. Air Messenger LAN Server HTTP Interface Directory Traversal
    Attack
    218. McAfee Agent ASaP VirusScan Software HTTP server directory
    traversal
    219. Freestyle Chat server Directory traversal vulnerability
    220. LiteServe MS-DOS filename show source vulnerability
    221. SnapStream PVS builtin web server - 3 vulnerabilities
    222. Lotus Notes/Domino Security Vulnerabilities AusCERT Alert 2000.10
    DefCon 8.0
    223. Uncgi directory traversal
    224. WinWrapper Professional 2.0 read arbitrary files
    225. Respondus v1.1.2 weak encryption
    226. SuSE 6.x, 7.x sdbsearch.cgi misplaced environment variable trust
    227. Tivoli Management Framework problem
    228. Tivoli SecureWay Policy Director incorrect URL-Encoding handling
    229. HTTProtect 1.1 - change protected files
    230. MyPhpAdmin remote command execution
    231. NetCode NC Book 0.2b remote command execution
    232. PHPLib prior to 7.2 prepend.php3 - non-local code injection
    233. PHProjekt security hold
    234. PHP 4.0.x mail() does not check for shell escape codes
    235. PHPnuke 5.x improper variable checking
    236. BSCW Symlinks vulnerability
    237. Cold Fusion on Linux cfrethrow tag crash
    238. Cold Fusion multiple remote vulnerabilities
    239. Cold Fusion multiple remote vulnerabilities
    240. ttawebtop.cgi read arbitrary files
    241. udirectory.pl remote command execution
    242. viewsrc.cgi - view any file on server
    243. webmin 0.84 leaves its login/password in a MIME encoded
    environment variable
    244. web_store.cgi read arbitrary files
    245. CGI/Perl Hacking
    246. Safe CGI Programming
    247. A1Stats CGI view files, overwrite files bug
    248. Active Classifieds Free Edition 1.0 CGI fails to authenticate
    administrators
    249. AdCycle up to 1.15 does not properly validate user input
    250. 1C:Arcadia Tradecli.dll Show Path, Read Arbitrary Files, DoS
    251. Basilix Webmail System - read any file, run PHP programs
    252. Carello E-Commerce for NT 1.2.1 - Execute arbitrary code with Web
    Server privileges
    253. DCShop can be made to give out customer credit cards in plain
    text
    254. ePerl can be made to process untrusted files
    255. FormMail.pl - spam anonymously
    256. Gnatsweb.pl unchecked user input
    257. Interactive Story 1.3 read arbitrary file
    258. MP3Mystic dot-dot directory traversal
    259. Paper: PHP common vulnerabilities
    260. phpMyAdmin and phpPgAdmin insecure include() calls
    261. phpSecurePages remote command execution vulnerability
    262. PHPSlash - url scheme integrity not checked
    263. PHProjekt directory traversal
    264. SquirrelMail webmail Insecure include() calls
    265. Twig 2.6.2 free webmail system Unquoted SQL Query String problem
    266. BadBlue 1.0 Beta retrieve PHP source
    267. CFDecrypt - Decrypt Cold Fusion templates encrypted with CFCRYPT
    268. Baltimore Technologies WEBSweeper 4.02 bypass malicious tags
    269. DCShop - retrieve cleartext credit cards
    270. E-smith - insert accounts that are invisible to admin
    271. Entrust execute arbitrary code
    272. Surf-net ASP forum really weak "security"
    273. SIX-webboard .. and / not processed
    274. phpBB 1.4.0 backslash problem
    275. phpBB 1.4.0 run arbitrary code
    276. phpBB 1.4.0 input validation attack BBS
    277. DCForum - attacker can create admin account!
    278. O'Reilly WebBoard 4.10.30 execute arbitrary javascript on remote
    machine
    279. A More Stealthy way to Hack a Wildcat BBS
    280. CGI-Exploit Scanner
    281. cgicheck99 0.4
    282. Cgichk
    283. cgiscan.c
    284. Guile 3.1 CGI Scanner
    285. Malice
    286. Perl CGI Checker
    287. Tools Information :: Web Site Hacking :: Audit Tools
    288. Buffer Overflow in AOL ICQ
    289. webmasters can force themselves into Contact list
    290. ICQ Protocol Version 5 - Part 1
    291. ICQ Protocol Version 5 - Part 2
    292. Hacking Techniques and Methods ICQ
    293. ICQ Protocol
    294. Excryption and Checkcode of the ICQ Protocol V3 and V4
    295. ICQ Protocol Decoder
    296. Unofficial ICQ V3 Specification
    297. ICQ V4 protocol early analysis notes - Part 1
    298. ICQ V4 protocol early analysis notes - Part 2
    299. ICQ V4 protocol early analysis notes - Part 3
    300. ICQ V4 protocol early analysis notes - Part 4
    301. Updated description of the ICQ V4 Protocol
    302. ICQ V4 protocol analysis notes - Part 1
    303. ICQ V4 protocol analysis notes - Part 2
    304. mIRC 5.41 DoS
    305. AntiBot TCL Script for channel protection
    306. AIM Secrets
    307. NetQuake Server DoS
    308. Quake 3 Arena 1.29f/g segfault exploit
    309. CIAC M-007 Macintosh OS-X App Mgr Vulnerability
    310. CIAC M-013 Mac OS X Downloading Applications Vulnerability
    311. MacAdministrator hidden files problems
    312. MacOS X permissions corruption
    313. PWS 1.5.5 password field input overflow
    314. Security Analysis of the Palm Operating System
    315. Tektronix (Xerox) PhaserLink Webserver security through obscurity
    316. Code Red can crash HP JetDirect printers
    317. 3Com Netbuilder II SNMP ILMI undocumented Community
    318. 3COM hardware - inadequate brute force attack protection
    319. 3Com Officenet DSL Router crash
    320. Allied Telesyn AT-AR220e DSL/Cable Router virtual server
    insecurity
    321. Cayman-DSL nmap scan crash
    322. NetApp NetCaches tunneling vulnerability
    323. NetGap - bypassing filter engine
    324. Multiple RADIUS Implementations - buffer overflows
    325. Cisco vpn3000 concentrator vulnerability
    326. Cisco content services switch user account
    327. Cisco catalyst 5000 series vulnerability
    328. Cisco IOS BGP Attribute Corruption Vulnerability
    329. Cisco Content Services Switch ftp Vulnerability
    330. Cisco Multiple Vulnerabilities in CBOS
    331. Cisco IOS Reload After Scanning Vulnerability
    332. Cisco 11000 Series Switch Web Management Vulnerability
    333. Cisco IOS HTTP Authorization Vulnerability
    334. Cisco IOS HTTP Authorization Vulnerability
    335. Cisco SN 5420 Storage Router Vulnerabilities
    336. Cisco Catalyst 2900XL - crash with an empty UDP packet
    337. Cisco HSRP DoS
    338. Cisco Content Service Switch 11000 Series FTP Privilege error
    339. Cisco CBOS 2.x Multiple Vulnerabilities
    340. Cisco IOS 12.1(2)T, 12.1(3)T memory error can cause reload
    341. Cisco Content Service Switch 11000 Series failure to enforce
    restrictions for accessing web management URL
    342. Cisco 6400 NRP2 Telnet telnet access with no password set
    343. Cisco IOS 11.3 and later - execute arbitrary code
    344. Cisco SN 5420 Storage Routers DoS, unrestricted low level access
    345. Cisco PPTP vulnerability
    346. Anti-Spoofing rules generator for Cisco boxes
    347. Cisco Catalyst 5000 switch compatibility crash
    348. Cisco Local Director Denial of Service
    349. Cisco SN 5420 Storage Routers Denial of Service
    350. Cisco IOS HTTP Server Authentication Vulnerability
    351. Cisco Secure IDS Signature Obfuscation Vulnerability
    352. Cisco - Multiple Vulnerabilities in ACL Implementations
    353. Starfish Truesync Desktop + REX 5000 Pro two vulnerabilities
    354. 802.11b Access Point Devices - WEP Encryption Key divulged
    355. 802.11b Access Point Devices (many vendors) authentication
    mechanism flaw
    356. Wireless LAN sniffing
    357. 802.11b (WiFi) Security Update
    358. Wireless LAN Security
    359. Ultra-Mini Gay HOWTO - Dialout/PPP on Shiva LANRovers


    H. The Standards That Define The Internet:
    1. Tekelec's Transport Adapter Layer Interface - Part 1
    2. Tekelec's Transport Adapter Layer Interface - Part 2
    3. Tekelec's Transport Adapter Layer Interface - Part 3
    4. Tekelec's Transport Adapter Layer Interface - Part 4
    5. RObust Header Compression (ROHC): Framework and four profiles: RTP,
    UDP, ESP, and uncompressed - Part 1
    6. RObust Header Compression (ROHC): Framework and four profiles: RTP,
    UDP, ESP, and uncompressed - Part 2
    7. RObust Header Compression (ROHC): Framework and four profiles: RTP,
    UDP, ESP, and uncompressed - Part 3
    8. RObust Header Compression (ROHC): Framework and four profiles: RTP,
    UDP, ESP, and uncompressed - Part 4
    9. RObust Header Compression (ROHC): Framework and four profiles: RTP,
    UDP, ESP, and uncompressed - Part 5
    10. RObust Header Compression (ROHC): Framework and four profiles:
    RTP, UDP, ESP, and uncompressed - Part 6
    11. RObust Header Compression (ROHC): Framework and four profiles:
    RTP, UDP, ESP, and uncompressed - Part 7
    12. Requirements for robust IP/UDP/RTP header compression
    13. RSVP Cryptographic Authentication -- Updated Message Type Value
    14. How to Advertise Responsibly Using E-Mail and Newsgroups or - how
    NOT to $$$$$ MAKE ENEMIES FAST!
    15. Realm Specific IP: Framework
    16. Realm Specific IP: Protocol Specification - Part 1
    17. Realm Specific IP: Protocol Specification - Part 2
    18. RSIP Support for End-to-end IPsec
    19. Finding an RSIP Server with SLP
    20. ECML v1.1: Field Specifications for E-Commerce
    21. Carrying Label Information in BGP-4
    22. Conventions for the use of the Session Description Protocol (SDP)
    for ATM Bearer Connections - Part 1
    23. Conventions for the use of the Session Description Protocol (SDP)
    for ATM Bearer Connections - Part 2
    24. Conventions for the use of the Session Description Protocol (SDP)
    for ATM Bearer Connections - Part 3
    25. Conventions for the use of the Session Description Protocol (SDP)
    for ATM Bearer Connections - Part 4
    26. Conventions for the use of the Session Description Protocol (SDP)
    for ATM Bearer Connections - Part 5
    27. Request to Move STD 39 to Historic Status
    28. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)
    29. Service Location Protocol Modifications for IPv6
    30. LDAP Authentication Password Schema
    31. 3GPP-IETF Standardization Collaboration
    32. Mobile IP Vendor/Organization-Specific Extensions
    33. Methodology for ATM Benchmarking - Part 1
    34. Methodology for ATM Benchmarking - Part 2
    35. Methodology for ATM Benchmarking - Part 3
    36. Methodology for ATM Benchmarking - Part 4
    37. Methodology for ATM Benchmarking - Part 5
    38. On the Design of Application Protocols
    39. Authentication for DHCP Messages
    40. A More Loss-Tolerant RTP Payload Format for MP3 Audio
    41. A URN Namespace for XML.org
    42. A URN Namespace for OASIS
    43. Extensions to IPv6 Neighbor Discovery for Inverse Discovery
    Specification
    44. A DNS RR Type for Lists of Address Prefixes (APL RR)
    45. The Congestion Manager
    46. Electronic Signature Policies - Part 1
    47. Electronic Signature Policies - Part 2
    48. Electronic Signature Formats for long term electronic signatures -
    Part 1
    49. Electronic Signature Formats for long term electronic signatures -
    Part 2
    50. Electronic Signature Formats for long term electronic signatures -
    Part 3
    51. Electronic Signature Formats for long term electronic signatures -
    Part 4
    52. Authentication, Authorization, and Accounting: Protocol Evaluation
    - Part 1
    53. Authentication, Authorization, and Accounting: Protocol Evaluation
    - Part 2
    54. Authentication, Authorization, and Accounting: Protocol Evaluation
    - Part 3
    55. Protection Against a Variant of the Tiny Fragment Attack
    56. Requirements for Kerberized Internet Negotiation of Keys
    57. Notes from the State-Of-The-Technology: DNSSEC
    58. Dormant Mode Host Alerting ("IP Paging") Problem Statement
    59. Terminology for Frame Relay Benchmarking
    60. Terminology for ATM ABR Benchmarking
    61. Performance Enhancing Proxies Intended to Mitigate Link-Related
    Degradations - Part 1
    62. Performance Enhancing Proxies Intended to Mitigate Link-Related
    Degradations - Part 2
    63. The SPIRITS Architecture
    64. OSPF Stub Router Advertisement
    65. Extended Assignments in 233/8
    66. Requirements for Configuration Management of IP-based Networks
    67. Per Hop Behavior Identification Codes
    68. CDMA2000 Wireless Data Requirements for AAA
    69. An IPv6-to-IPv4 Transport Relay Translator
    70. Known HTTP Proxy/Caching Problems
    71. Remote Monitoring MIB Extensions for Interface Parameters
    Monitoring
    72. L2TP Disconnect Cause Information
    73. Transmission of IPv6 Packets over IEEE 1394 Networks
    74. Generic Routing Encapsulation over CLNS Networks
    75. A Framework for Defining Empirical Bulk Transfer Capacity Metrics
    76. MGCP Business Phone Packages - Part 1
    77. MGCP Business Phone Packages - Part 2
    78. End-to-end Performance Implications of Slow Links
    79. A URN Namespace for Public Identifiers
    80. Delegation of IP6.ARPA
    81. PPP Multiplexing
    82. Requirements and Functional Architecture for an IP Host Alerting
    Protocol
    83. End-to-end Performance Implications of Links with Errors


    I. Law, Privacy, Wetware, Hardware, File Sharing:
    1. Making a listening device out of a plunger
    2. The Millibug
    3. The Down-Low on Trunking
    4. Logitech wireless desktop (mouse, keyboard, receiver) RF
    interception
    5. Model 170 Card Reader Reverse Engineering
    6. Easy-To-Make Anti-Tampering Circuits
    7. A Close Look at Speed Traps
    8. Mousetrap SmartCard Reader!
    9. Poor Man's Boards
    10. EFF Alert on the proposed Security Systems Standards and
    Certification Act
    11. USACM letter to Sen. Hollings criticizing draft SSSCA bill
    12. Leaked documents allegedly reveal RIAA assault on peer-to-peer
    13. Mad As hell about the DMCA
    14. City of Tampa fails to shut down Voyeur Dorm adult site
    15. San Francisco bans filters in libraries -- nevermind the Feds
    16. IETF Internet Draft: Why .xxx domain is a very bad idea
    17. The RIAA's threatening letter to Professer Felten who helped crack
    SDMI and was to publish his findings
    18. A letter from the US Department of Justice to consultant accused
    of hacking Brian K. West
    19. Peter Swire on ATA bill, computer hacking, and life in prison
    20. The ACLU on the serious civil rights impact of the new compromise
    anti-terrorism legislation
    21. Attorney General John Ashcroft opposes any sunset clause for anti-
    terrorism legislation
    22. News article: PATRIOT act goes ahead
    23. How a major industry organization tried to legalize hacking
    24. Fallout from the RIAA's attempt to legalize hacking
    25. Various college policies on anonymous/pseudonymous mail and news
    posting
    26. Canada's justice minister preparing bill to limit encryption
    27. The newest cyber-crime: Politically Incorrect Speech
    28. Sen. Ron Wyden calls for Emergency Technology Corps
    29. Forwarding email without permission illegal in Australia
    30. Make Money Fast! By suing spammers?
    31. KaZaA 1.3.1 + Morpheus 1.3 Sharing problems
    32. Nudester 1.10 shares whole hard disk
    33. Obtaining and understanding your FBI File
    34. Canada's privacy commish: Video surveillance a "threat" to privacy
    35. More on national ID card and use in western Europe
    36. Visionics facecam firm says tech is perfect for airports
    37. The South African Identity Document Number System
    38. Social Insurance Number Checksums
    39. Privacy Digest 10.04 Jun.09/01
    40. Privacy Digest 10.05 Jun.23/01
    41. Privacy Digest 10.06 Aug.22/01
    42. Privacy Digest 10.07 Aug.28/01
    43. Privacy Digest 10.08 Sep.06/01
    44. Privacy Digest 10.09 Sep.23/01
    45. Privacy Digest 10.10 Oct.22/01
    46. HumanClick Exposed!
    47. HTML WebBugs
    48. Robert Hanssen's last letter to his Russian handlers
    49. ESP of Espionage - Have the Russians and CIA been working on the
    ultimate Wetware hack?
    50. Social Engineering Fundamentals - Part I
    51. Social Engineering Fundamentals - Part II
    52. Social Engineering
    53. Fooling people on IRC into running Programs
    54. Getting free hard drives!
    55. Alpha (personalities) are the best liars?
    56. Internet Mind Games
    57. How to Outfox PBX Fraud
    58. What is Body Language?
    59. How to win Arguments or make everyone see your side
    60. Social Engineering Sears
    61. Tips on finding chicks to pick up
    62. FAQ on the "Mystery Method" of picking up women
    63. Being Sociable
    64. Psychological Profile of the Troubled Female Teen
    65. A guy's seduction efforts on an Alpha bitch
    66. The SMS Callback Scam
    67. Programming ADT Alarms
    68. Fundamentals of Electronic Lockpicking
    69. The Amtel 2000 Tele-Entry System
    70. How to get Credit Card Numbers the Easy Way!
    71. Arcade Machines
    72. Ripping off your local Arcade
    73. Soda Machines
    74. Vending Machine Hacking for the New Millennium: Soda Machines
    75. Vending Machine Picking
    76. How unsavory kids "Get Shit For Free"
    77. Free Cola!
    78. An email to reply spammers with
    79. Script Kiddies: How to be one, and be loathed by your peers
    80. SKip Diving
    81. Hacktivismo
    82. Dr. Seuss Explains why Computers Sometimes Crash
    83. Who is 2600? A quick lookup
    84. The Linux Cult
    85. Hacking: A Way to Live
    86. A brief history of the Usenet Meowers
    87. Imitation Operator from Hell
    88. Pranks at Microsoft
    89. Breaking AOL's Grip
    90. Xanadu publishing system
    91. How to be K-Rad on alt.phreaking
    92. How to make your own Internet Radio Show
    93. The l33t ph1l3z
    94. Hackers and the Media

    --- Thank You ---

    Source:
    http://www.fx-vista.com
    , Nov 6, 2007
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Ilgaz Ocal
    Replies:
    71
    Views:
    1,121
    Michelle Steiner
    Feb 14, 2006
  2. Derek Currie
    Replies:
    2
    Views:
    282
    Derek Currie
    Apr 20, 2006
  3. Derek Currie
    Replies:
    0
    Views:
    376
    Derek Currie
    Jun 29, 2006
  4. Derek Currie
    Replies:
    0
    Views:
    235
    Derek Currie
    Jul 2, 2006
  5. Derek Currie
    Replies:
    7
    Views:
    330
    Barry Margolin
    Dec 2, 2006
Loading...

Share This Page