1. HACKERS - Learn what Hackers know, how they do it, and what you can do to keep your system safe
1.1 GENERAL - General Hacking Information 1.1.1 General Security Concepts 1.1.2 Antique Systems 1.1.3 Oracle 1.1.4 Tools, Advisories and Exploits affecting multiple platforms 1.1.5 PC Software & BIOS Hacking 1.1.6 Truly Miscellaneous Hacking Info 1.2 PASSWORDS - Password Security 1.2.1 Password Hacking 1.2.2 Password Generators 1.2.3 Password Security Audit Programs 1.2.4 Word Lists 1.3 SCANNING - Scanning, Fingerprinting and similar techniques 1.3.1 Network Scanning 1.3.2 "Wargames" Modem Carrier Scanning 1.3.3 Fingerprinting 1.3.4 Sniffing 1.4 INTERNET - How Hackers Attack Numerous Internet Services 1.4.1 Denial of Service Attacks 1.4.2 Email & News 1.4.3 Proxies & IP Spoofing 1.4.4 DNS and BIND 1.4.5 SPAM 1.4.6 FTP 1.4.7 General Unsorted Information 1.4.8 Indispensible Internet Utilities 1.4.9 Cable & DSL Info & Hacking 1.5 WEB - How Hackers Attack Web Servers, CGIs, PHP, ASP, etc. 1.5.1 Web Site Hacking - General & Miscellaneous 1.5.2 Web Site Hacking - Specific Sites 1.5.3 Web Site Hacking - Servers 1.5.4 Web Site Hacking - CGI, Perl, ASP, PHP etc. 1.5.5 Web BBSes 1.5.6 Web Site Hacking - Audit Tools 1.6 IRC/ICQ/Etc. - How Hackers attack IRC, Instant Messaging, and Multiplayer Games 1.6.1 ICQ Hacking 1.6.2 IRC Hacking, Scripts & Bots 1.6.3 AOL Instant Messenger (AIM) 1.6.4 Miscellaneous Chat/gaming Systems 1.7 MISC. - Vulnerabilities found in Platforms with Smaller Market Share 1.7.1 Macintosh 1.7.2 PalmOS 1.7.3 Printers 1.7.4 Dedicated Network Appliances, Hubs, Routers, etc. 1.7.5 Cisco Equipment 1.7.6 Miscellaneous 1.8 NETWORKS - How Hackers Attack Novell and 802.11b Networks 1.8.1 Novell Networks 1.8.2 Wireless LANs 1.8.3 X.25 Networks 1.8.4 Miscellaneous Networking Information 2. PHREAKS - Phreaking - the black art of telephony - still alive 40 years and billions of dollars later 2.1 GENERAL - General Information About the Phone Company 2.1.1 Hacking Answering Machines & Voice Mail 2.1.2 Phreaking Programs 2.2 BOXES - Coloured "Boxes" - Electronic Toll Fraud & Other Phone Devices 2.2.1 The Fixer's Box Review - Read this before you read the rest of these files! 2.2.2 Blue and Green Boxes 2.2.3 Red Box 2.2.4 Beige & Bridge Boxes 2.2.5 Various new boxes 2.2.6 Programs to generate phreak tones 2.3 PAYPHONES - All about Payphones, COCOTs, BOCOTs, etc. 2.3.1 Payphones 2.3.2 COCOTs 2.3.3 Nortel/Quortech Millennium 2.3.4 Smart Cards/Phone Cards 2.4 CELLULAR - Cellular Telephones & the Hacking Thereof 2.4.1 Cellular Phones by Manufacturer 2.4.2 Miscellaneous Info 2.4.3 Miscellaneous Utilities 2.5 CALLER ID - Caller ID and ANI 2.5.1 Caller ID and CLASS 2.5.2 ANI & ANAC 2.6 NUMBERS - Scans, numbers of interest 2.6.1 Lists of Phone Numbers 2.7 SOUNDS - Sounds from the phone system 2.7.1 SIT Tones are said to thwart predictive dialers used by Telemarketers! 3. PC - PC Hacking - Crypto, Virology, Cracking and Backdoors 3.1 CRYPTO - Cryptography, Cryptanalysis, Steganography 3.1.1 Crypto: PGP & GPG 3.1.2 Crypto: Cryptanalysis 3.1.3 Crypto: Steganography 3.1.4 Crypto: Miscellaneous 3.1.5 Misc. File Encryptors 3.2 VIRUS - About Viruses and Worms 3.2.1 Virus Info Files & Advisories 3.2.2 Worms 3.2.3 Virus/Worm Protection Utilities 3.3 BACKDOOR - Backdoors, Trojans and defenses 3.3.1 Back Orifice and BO2K 3.3.2 SubSeven and Addons 3.3.3 Other Remote Administration Tools 3.3.4 Trojan Detectors / Removers / Retaliators 3.3.5 Information Files 4. UNIX - Unix and Linux Hacking and Security 4.1 WARNINGS - Unix - Vulnerabilities & Advisories 4.1.1 Tutorials & Papers 4.1.2 Specific Exploits and Vulnerabilities 4.2 TOOLS - Unix - Security Tools 4.2.1 Unix Security & Audit Tools (Including IDS and Access Control Tools) 4.2.2 Unix Log Analysis Tools 4.2.3 Unix Proxies, Firewalls & Accessories 4.2.4 Unix Miscellany 4.3 BSD - Unix - BSD, FreeBSD, etc 4.3.1 FreeBSD 4.3.2 BSD & Misc. BSD variants 4.3.3 BSD Security Tools 4.3.4 BSD Micro-distributions (under 2.88 MB) 4.4 SUN - Unix - Solaris, SunOS etc. 4.4.1 Solaris 4.4.2 SunOS 4.4.3 Cobalt Appliances 4.4.4 SunOS and Solaris Security Tools 4.5 ETC. - Unix - Other Flavors (Irix, HPUX, AIX etc) 4.5.1 SGI/Irix 4.5.2 HP-UX 4.5.3 AIX 4.5.4 SCO 4.5.5 Miscellaneous 4.6 LINUX Vulns. - Linux - Vulnerabilities & Advisories 4.6.1 Linux - General Hacking 4.6.2 Linux Application Exploits 4.6.3 Linux - Red Hat Specific 4.6.4 Linux - Debian Specific 4.7 LINUX Tools - Linux - Security Tools 4.7.1 Linux - Intrusion Detection 4.7.2 Linux - Access Control 4.7.3 Linux Log Analysis Tools 4.7.4 Linux Rootkits 4.7.5 Linux Proxies & Firewalls 4.7.6 Linux - General Security & Audit Tools 4.8 LINUX Dist. - Linux - Security-oriented mini- and micro- distributions 4.8.1 DMZS-Biatchux 4.8.2 NSA Security Enhanced Linux 4.8.3 Linux Mini- and Micro-distributions 4.8.4 Applications 5. WINDOWS - Windows Hacking and Security 5.1 WARNINGS - Windows Vulnerabilities, Advisories, and even security flaws introduced by so-called security products!!! 5.1.1 Microsoft IIS Vulnerabilities 5.1.2 Microsoft FrontPage Vulnerabilities 5.1.3 Microsoft Internet Explorer Vulnerabilities 5.1.4 Windows Application Vulnerabilities 5.1.5 Windows Internet/Networking Vulnerabilities 5.1.6 Insecurities introduced by "security" programs! 5.1.7 Netscape Browsers 5.1.8 Windows Hacks - Miscellaneous 5.2 TOOLS - Windows Security & Auditing Tools 5.2.1 Windows Registry Tools 5.2.2 Windows & MSDOS Security & Auditing Tools 5.2.3 Windows Local Security 5.2.4 File/Disk/Log Shredders 5.3 ETC - Windows Miscellany 5.3.1 Raw Sockets & Custom Packet Building 5.3.2 A Few Little Extras for Microsoft "Fans" 6. STANDARDS - The standards that define the Internet 6.1 RFCs - Internet RFCs 3094 to 3195 6.1.1 Internet RFCs 3094 to 3195 6.2 OTHER... - Other Standards & Official Publications 6.2.1 US Department of Energy CIAC-2300 Documents 6.2.2 NIPC CyberNotes 7. MISC - Miscellaneous Information - Law, Privacy, Wetware, Hardware, File Sharing and more 7.1 HARDWARE - Hardware, Electronics, Radio etc. 7.1.1 TEMPEST 7.1.2 Bugs & Listening Devices 7.1.3 Miscellaneous 7.2 LAW - Hackers and the Law 7.2.1 Copyright Law & Cases 7.2.2 Net Censorship 7.2.3 Cases involving 2600 Magazine 7.2.4 The SDMI affair 7.2.5 Brian West 7.2.6 September 11th Backlash Legislation 7.2.7 General Legal Bufu 7.3 NAPST*R - About Napster, Gnutella, and other File Sharing schemes 7.4 PRIVACY - About your dwindling privacy 7.4.1 Privacy Digest 7.4.2 Internet Privacy 7.4.3 Espionage 7.4.4 Privacy Deprivation Tools 7.5 WETWARE - The scariest directory on this CD - Wetware Hacking! 7.5.1 Social Engineering & NLP 7.5.2 Seduction 7.5.3 Miscellaneous Wetware Hacking 7.6 CRIME - Physical Security, Scams etc. 7.6.1 Physical Security and Countersecurity 7.6.2 Financial Crimes Detection and Prevention 7.6.3 Vending Machine Hacking 7.7 PERIODICALS - Hacker Publications 7.7.1 CIAC Notes 7.7.2 CRTC 7.7.3 F0rbidden Knowledge 7.7.4 Keen Veracity 7.7.5 Lexxicor 7.7.6 Midnight Hackers Private Club 7.7.7 Phrack 7.7.8 Risks Forum Digest 7.7.9 Scorpion 7.7.10 ToT - Tricks of the Trade 7.7.11 UP - Underground Periodical 7.8 MISC. - Stuff that just didn't fit anywhere else! 7.8.1 Truly Miscellaneous Stuff 8. UTILITIES - Essential Windows utilities For more information, you can visit our website at : http://www.ilmuhacker.com Best regards, ilmuhacker.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Algorithm Geeks" group. To post to this group, send email to algogeeks@googlegroups.com To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/algogeeks -~----------~----~----~----~------~----~------~--~---