Expert analysis
[ The History of MOD ] – book five
MODmodMODmodMODmodMODmodMODmodMOD ================================= MOD.book.FIVE: Who are they and where did they come from? ————- Well, it’s …
[ The History of MOD ] – book four
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoD ================================= MOD.book.FOUR [End of ’90-1991] Two weeks before his bust, Lord Micro was introduced into the group. …
[ The History of MOD ] – book three
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK THREE: A Kick In The Groin Well, suffice it to say, the fun couldn’t last …
[ The History of MOD ] – book two
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK TWO: Creative Mindz With the addition of The Wing, came a shitload of pranks …
[ The History of MOD ] – book one
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK ONE: The Originals In the early part of 1987, there were numerous amounts of …
HoHoCon 1993
This file will appear in a future cDc publication… December, 1993 ———————— Loosely based on the Exploits of HoHoCon 1993. …
Hacking Voice Mail Systems
Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it works is that somebody …
Bell Trashing
The Police Station 612-934-4880 The Phone Co. will go to extreams on occasions. In fact, unless you really know what to expect from them, they will suprise the heck out of you …
Data General
38 Date: Feb 03/87 Time: 4:23 Pm Subject: Fuck! From: CAPT. CRUNCH Did you know that Data General systems always start off with “Logon:”. These systems are really …
Planning Ahead
Every self respecting hacker or phone phreak should plan ahead. In this phile I hope to show you how and what to take when you have to make a break for it. I. Know Thy …
The Phrack E911 Affair
I had not planned to post this as a special issue, and had put itdirect in the TELECOM Archives. However, the demand for copies (basedon the mail I received Saturday alone) …
Pumpcon
10/31/92 written by someone who was there who wishes to remain anonymous NOTICE: The word “Hacker” is used frequently throughout this file – it is to be …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd