Around the 1970's, the term "hacking" meant any deep interest in computers that manifested itself in programming or learning arcane aspects of the machinery or operating systems. By the early 1980's, this meaning morphed into a general term of fear to describe anyone who did anything even remotely evil using computer equipment. The people who considered themselves non-malicious "Hackers" decried this bastardization of the term they took with pride, and the new name "cracker" arrived, years after that name applied to people who removed copy protection from home video games. By the late 80's to early 90's, no one cared too much, except for the people who care about everything too much.
In other words, these textfiles are all about hacking.
In accordance with this spirit, anything involving subverting any technology, for good or evil, is placed here. Unless, of course, you're talking about telephones, at which point you should go over to the phreaking section.
If you're looking for electronic hacking magazines, go check out the magazines. Additionally, you might also check the groups section if your file was written by someone who was part of a group.
Filename |
Size |
Description of the Textfile |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BIBLIOGRAPHIESLists of Articles and Books about Hackers and Hacking | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CABLETextfiles about Cable TV and Cable TV Piracy | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
COLORBOOKSPurported Department of Defense Computer Security Guidelines | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CONVENTIONS Information about different Hacking Conventions | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
INTERNETFiles Dealing With Hacking on the Internet | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
MICROSOFTFiles Dealing with Hacking Windows and DOS | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POLICIESVarious Ethics and Policies of Computing Facilities Nationwide | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
UNIXTextfiles About Exploring or Exploiting UNIX | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
VMSTextfiles About Exploring or Exploiting VMS and VAXes | | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
22.txt 4999 | DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)
| 23things.txt | 2342 |
| 2600-9-3.txt | 144176 | 2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)
| 2600_ind | 96106 | 2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price
| 2600faq.011 | 169226 | Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)
| 386i.txt | 1920 | CIAC Advisory Notice: Authentication bypass in Sun 386i machines
| 5600.txt | 84069 | Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)
| aahack.txt | 3112 | Anarchy Anonymous: Hacking your School Network
| accesblt.hac | 20551 | Advanced Authentication Technology, 1991
| accessin.txt | 14070 | A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)
| acro01.txt | 4538 | Max Headroom's Hacker Acronym List
| acro02.txt | 5532 | Max Headroom's Second Collection of Acronyms
| acrolist.phk | 8181 | Acronym List, Early 1990s
| acroynym.txt | 30296 | The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)
| adssys.txt | 10048 | A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom
| aio.box | 2485 | All in One Box, by Disk Doctor
| aio5b.txt | 6588 | AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)
| ais.txt | 15248 | AIS: The Automatic Intercept System by Computer Consoles Incorporated
| aix.fun | 778 | Warning to download some AIX Patches
| allnet01.txt | 3939 | Hacking Allnet by Shadow Warrior (January 1988)
| amhack.txt | 12374 | Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS
| ansibomb.txt | 10496 | ANSI Bombs II: Tips and Techniques, by The Raging Golem
| aohell.phk | 1071 | Why I wrote AOLHell
| aoim.txt | 1725 | The Risks of Using an AOL Client Behind a Firewall
| aolhak.txt | 9252 | How to Hack America on Line by the Hooded Bobs
| as400cmd.hac | 27788 | IBM AS/400 Command Summary
| as400cmd.txt | 28178 | All IBM AS/400 Commands by The Might
| aspen.txt | 16772 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
| aspen1.txt | 16843 | A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)
| aspen2.txt | 11053 | A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)
| assolink.txt | 11949 | An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)
| at&arebl.txt | 2965 | Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends
| atlas.txt | 4938 | Hackers' Atlas, by Ragon/Wynvern/BOF
| atm-92.txt | 20096 | ATMS: The Real File for ATM Theft in 1992 by The Raven
| atm-more.txt | 20049 | A Whole Collection of the Risks of ATM Cards (1988)
| atm.txt | 8167 | Hacking ATM's by Blue Thunder
| atm1.txt | 2773 | The Disk Jockey Presents Scamming ATMs
| atma.hac | 22036 | Quick OVerview of ATM Security (Needs Editing)
| atmapps.txt | 1771 | "Gee Whiz" ATM Applications are On the Horizon
| atmfile | 21290 | ATM secret codes, from Fred Gindburg (July 10, 1987)
| atmhacking.txt | 5742 | Hacking ATMs, by Anonymous
| atms | 14827 | An Overview of ATMs and Information on the Encoding System
| atms.txt | 20384 | Track Layouts on ATM Cards
| auditool.txt | 12681 | Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)
| austhack.hac | 7324 | Australian Dialups
| austpac0.txt | 14674 | Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990
| austpac1.txt | 11953 | Additional AUSTPAC Character Terminal Manual
| austpac2.txt | 20338 | AUSTPAC General Information and Codes
| austpac3.txt | 15830 | The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)
| autohack.txt | 5504 | Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)
| autonet1.txt | 11411 | Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5
| autotelldoc.ana | 5439 | Fun with Automatic Tellers
| autovon1.hac | 2230 | Introduction to the Automated Voice Network (Autovon) by Shadowrunner
| autovon2.hac | 3387 | Introduction to the Automated Voice Network (Autovon) Part II
| autovon3.hac | 1809 | Introduction to the Automated Voice Network (Autovon) Part III
| autovoni.nst | 19395 | Overview of the Automatic Voice Network (Autovon)
| avoidcap.txt | 2576 | Planning Ahead for Phone Phreaks/Hackers
| babyna.mes | 203893 | The Moby Words Database (List of Words) (1989)
| backdoor.txt | 19156 | How to Hold Onto UNIX Root Once You Have It
| bankhack.txt | 12641 | The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers
| basic.net | 14775 | Basic Networking, by Sk8 the Skinhead
| basic1.hac | 7491 | The Basics of Hacking I: DECs By the Knights of Shadow
| basic3.hac | 4349 | The Basics of Hacking III: Data General By the Knights of Shadow
| basicnet.hac | 14534 | Basic Networking (1989) by Sk8 The SkinHead
| basics | 16646 | Rambug's Hacking Volume #1 by Rambug
| bbsfiles.txt | 38272 | The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"
| bd-tv5.txt | 7439 | Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993
| bindery.txt | 4201 | Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)
| boahack.txt | 6686 | Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM
| boces.txt | 6957 | The Slipped Disk takes over the BOCES Computer: A Log
| bom-hh&p.txt | 9785 | The History of Hacking and Phreaking by Raven of BOMB Squad
| books.txt | 41728 | Biblography of Computer Security Books (1973 through 1988)
| brute.txt | 3462 | BRUTE: A brute force approach to hacking Unix passwords. Version 1.1
| btinfo.h-k | 14037 | BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)
| c64fun1.txt | 2927 | Suggestions On What to Do with a Commodore 64, by Nightstalker
| callcard.phk | 1734 | Hacking Calling Cards, by The Pyromaniac
| candyland.faq | 4823 | The Candyman Explains How He Will Accept Explosives Files
| carcodes.txt | 3358 | Codes Used by Computers in Cars
| cb1.txt | 3407 | Citibank Hacking, by Johnny Hundu
| cb2.txt | 2145 | Small Rant about Hacking Citibank
| cbiinfo | 19013 | Using and Abusing CBI by The Ghost
| cbrsp-1.hac | 6075 | The Cyberspace Chronicle Volume 1 by Phardak
| cbvhack.pnk | 6694 | CBV Hacking by PiNK ToRPeDo (June 7, 1994)
| cbvhack.txt | 5754 | |