Help Net Security
[ The History of MOD ] – book one
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK ONE: The Originals In the early part of 1987, there were numerous amounts of …
HoHoCon 1993
This file will appear in a future cDc publication… December, 1993 ———————— Loosely based on the Exploits of HoHoCon 1993. …
Hacking Voice Mail Systems
Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it works is that somebody …
Bell Trashing
The Police Station 612-934-4880 The Phone Co. will go to extreams on occasions. In fact, unless you really know what to expect from them, they will suprise the heck out of you …
Data General
38 Date: Feb 03/87 Time: 4:23 Pm Subject: Fuck! From: CAPT. CRUNCH Did you know that Data General systems always start off with “Logon:”. These systems are really …
Planning Ahead
Every self respecting hacker or phone phreak should plan ahead. In this phile I hope to show you how and what to take when you have to make a break for it. I. Know Thy …
The Phrack E911 Affair
I had not planned to post this as a special issue, and had put itdirect in the TELECOM Archives. However, the demand for copies (basedon the mail I received Saturday alone) …
Pumpcon
10/31/92 written by someone who was there who wishes to remain anonymous NOTICE: The word “Hacker” is used frequently throughout this file – it is to be …
The History of Hacking and Phreaking
-=-=-=-=-=- Okay boys and girls, children of all ages…Here’s a revolutionary idear….The announcements foist! -=-=-=-=-=- The file we released on smashing up …
The Hacker’s Song
— I’m a hacker and I’m OK I work all night and I sleep all day. — I wrote some hacks in APL, each on a single line. They’re mutually recursive, …
Diary of a Hacker
What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. This story is all …
The FBI fights computer crime
The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the “hacker” community. Hampered by …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments