969 lines
61 KiB
Plaintext
969 lines
61 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Dec 19 1995 Volume 5 : Issue 95
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copy Editor: Craig Shergold, XIII
|
|||
|
|
|||
|
CONTENTS, #5.95 (Dec 19 1995)
|
|||
|
File 1--CUMMULATIVE SUBJECT/TOPIC INDEX TO CuDS - Vols 1 to 4
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: ftp.funet.fi in pub/doc/cud. (Finland)
|
|||
|
UNITED STATES:
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
KOREA: ftp: cair.kaist.ac.kr in /doc/eff/cud
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sun, 19 Dec 1993 16:14:54 CST
|
|||
|
From: ALAN DUNKIN <tk0jut2@mvs.cso.niu.edu>
|
|||
|
Subject: File 1--CUMMULATIVE SUBJECT/TOPIC INDEX TO CuDS - Vols 1 to 4
|
|||
|
|
|||
|
THE COMPUTER UNDERGROUND DIGEST CUMULATIVE INDEX (VOLS 1-4)
|
|||
|
|
|||
|
((MODERATORS' NOTE: ALAN DUNKIN compiled the following index of
|
|||
|
subjects and names featured in CuD from Volume 1 through Volume 4. It
|
|||
|
was a time-consuming and rather arduous task, and we're certain that
|
|||
|
readers share our enthusiasm and gratitude for his efforts. We've
|
|||
|
found the index invaluable in tracking down subject/issues that we
|
|||
|
occasionally need.
|
|||
|
|
|||
|
Alan recently switched his mail address, and he can be contacted
|
|||
|
through us for the time being. We'll publish his address in the first
|
|||
|
of the year.
|
|||
|
|
|||
|
Alan is also working on Volume 5. Thank gopod for hard-working
|
|||
|
masochists, especially when they share with others. To Alan, a
|
|||
|
magnitudinous THANKS!!
|
|||
|
|
|||
|
+++
|
|||
|
|
|||
|
This is an index of things, people, handles, events, magazines, places,
|
|||
|
events, books, hackers, TV shows, speeches, conventions, search
|
|||
|
warrants, phreakers, secret service agents, news prints, and of
|
|||
|
cyberspace itself. Anything mentioned in an issue of the Digest, with
|
|||
|
significance, is included in the Index. For instance, a paper
|
|||
|
regarding "Knight Lightning" will be in the Index, but the fact that
|
|||
|
he liked UNIX would not go under the UNIX heading.
|
|||
|
|
|||
|
Catagories which consist of different names have "identifiers", like
|
|||
|
BBS, the word "magazine", "convention", or somesuch to aide in
|
|||
|
searches. Books and magazines are surrounded by underscores while
|
|||
|
aliases and hacker handles in double quotes. Where acronyms occur I
|
|||
|
have tried to offer a pointer to what the acronym refers to (or alias,
|
|||
|
if known).
|
|||
|
|
|||
|
The Cumulative Index is numbered so like so:
|
|||
|
|
|||
|
ABBBC/DD
|
|||
|
|
|||
|
A - Volume number
|
|||
|
B - Issue number (taken into account that volume
|
|||
|
five may exceed 100 issues)
|
|||
|
C - Subissue letter (for Alcor issue mainly)
|
|||
|
D - File number
|
|||
|
|
|||
|
I look forward to all comments and suggestions about the Index. In the
|
|||
|
future they may reflect how it is presented, with new issues and re-editing
|
|||
|
can change it at any time. There will probably be things that I have
|
|||
|
missed or have typed in wrongly. I am currently available at
|
|||
|
tk0jut2@mvs.cso.niu.edu ((temporary address until CuD editors
|
|||
|
dig out his new one--eds.)).
|
|||
|
Also, please cite examples if you can, sometimes I may have problems
|
|||
|
in understanding what you are presenting.
|
|||
|
|
|||
|
--- Alan Dunkin
|
|||
|
10/24/93
|
|||
|
|
|||
|
|
|||
|
+-----------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
90 North BBS 343/11
|
|||
|
_2600 Magazine_ 110; 112/5; 215/3;
|
|||
|
307/6; 337/6; 433/1;
|
|||
|
433/3; 433/4; 433/5;
|
|||
|
457/1; 457/2; 457/3;
|
|||
|
457/4; 457/5; 457/6;
|
|||
|
459/2; 464/1
|
|||
|
Abene, Mark 305/3; 306/4; 337/3;
|
|||
|
430/1; 430/2; 430/3;
|
|||
|
431/1; 432/4; 451/2
|
|||
|
"Acid Phreak", see Ladopoulos, Elias
|
|||
|
_Activist Times, Inc._ 112/5; 205/3
|
|||
|
"Adrian Vole" 212/9
|
|||
|
Advanced Network and Services 205/7; 206/5
|
|||
|
Adventure Software Ltd. 465/2
|
|||
|
Air Force Office of Special Investigations 201/6
|
|||
|
AIS, see Automated Information System BBS
|
|||
|
Akron Anomaly BBS 462/8
|
|||
|
Alcor Life Extension Foundation 104a; 104b; 104c;
|
|||
|
104d; 118/2; 125/3;
|
|||
|
325
|
|||
|
Aldrich, Jeffery 213/2
|
|||
|
Alexander, Kent 454/2; 454/3
|
|||
|
Aliases, use of 100/3; 300/2
|
|||
|
Amateur Action BBS 409/8; 410/6
|
|||
|
America On-Line 344/3
|
|||
|
American Telephone & Telegraph Company 117/3; 128/2; 128/3;
|
|||
|
200/3; 201/5; 203/2;
|
|||
|
311/4; 311/5; 312/2;
|
|||
|
322/3; 335/8; 430/6
|
|||
|
Ames Research Center 462/3
|
|||
|
Andrews, Rich 110; 203/2; 211;
|
|||
|
421/3
|
|||
|
ANS, see Advanced Network and Services
|
|||
|
Apple 204/6
|
|||
|
_Art of Technology Digest_ 441/2
|
|||
|
AT&T, see American Telephone and Telegraph company
|
|||
|
Attctc public access UNIX 201/5; 203/2; 421/3
|
|||
|
Automated Information System BBS 437/4
|
|||
|
_Austin-American Statesman_ 101/3
|
|||
|
Barlow, John 121/5; 122/6; 123/4;
|
|||
|
318
|
|||
|
Bauer, David 211
|
|||
|
Bechtold, Alan 108/4; 118/2
|
|||
|
Bell Company Research 200/3; 211; 433/1;
|
|||
|
433/3; 433/4; 433/5;
|
|||
|
434/3; 434/5; 435/3;
|
|||
|
436/2
|
|||
|
Bellcore, see Bell Company Research
|
|||
|
Bell South Telephone Company 100/4; 100/5; 110;
|
|||
|
115; 116; 124/4;
|
|||
|
125/2; 126/3; 211;
|
|||
|
213/3; 215/3; 216;
|
|||
|
217/3; 217/7; 317/2;
|
|||
|
325; 333/3; 341/3;
|
|||
|
407/2; 435/5; 454/3
|
|||
|
Ben-Menashe, Ari 404/3; 451/1
|
|||
|
Berman, Jerry 428/2
|
|||
|
Biliographies - Cu Related 303/4;
|
|||
|
336; 340/5
|
|||
|
422/4
|
|||
|
434/7
|
|||
|
Bibliographies - E-Mail Privacy 344/6
|
|||
|
Bibliographies - Codes/Viruses 465/9
|
|||
|
BITNET 123/2
|
|||
|
BJS, see Bureau of Justice Statistics
|
|||
|
Black Ice BBS 216; 317/3
|
|||
|
Blanchard, Margaret 305/7
|
|||
|
Blankenship, Loyd 106/3; 110; 101/3;
|
|||
|
211; 421/3
|
|||
|
Blumenthal, David 410/7; 421/7
|
|||
|
_Boardwatch_ magazine 331/5
|
|||
|
Book Reviews: 332/2; 425/5
|
|||
|
CLOAK AND DAGGER (Levy) 204/6
|
|||
|
COMPUTER ETHICS (Forrester) 201/7, 308/5
|
|||
|
CUCKOO'S EGG (Stoll) 106/4, 112/3, 444
|
|||
|
CYBERPUNKS (Hafner and Markoff) 332/SI
|
|||
|
GRAY AREAS -- 'Zine Review 465/8
|
|||
|
GURPS (Jackson) 126/2
|
|||
|
HACKER CRACKDOWN (Sterling) 461/SI
|
|||
|
INFORMATION WEB (Gould) 321/5
|
|||
|
INTERTEK MAGAZINE (Newsbytes Reprint) 409/5
|
|||
|
PRACTICAL UNIX SECURITY (Garfinkel and Spafford) 330/1,2
|
|||
|
PROTECTORS OF PRIVILEGE (Donner) 321/4
|
|||
|
REVIEW OF SITE SECURITY HANDBOOK 333/7
|
|||
|
SYSLAW (Rose) 467/4,5
|
|||
|
UNDERCOVER (Marx) 321/3
|
|||
|
WHOLE INTERNET USER'S GUIDE (Krol) 462/5,6,7
|
|||
|
ZEN AND THE ART OF THE INTERNET (Kehoe) 438/7,8
|
|||
|
Bootleggers 103/5
|
|||
|
Boykin, Charles 203/2
|
|||
|
Brazil 449/7
|
|||
|
British Tymnet North America Inc. 430/2; 430/3; 431/1
|
|||
|
Brown, Michael 437/5
|
|||
|
Bua, Nicholas 116; 123/4; 124/2
|
|||
|
Bulletin Board Systems, General 103/5; 108/4; 115;
|
|||
|
202/5; 205/4; 211;
|
|||
|
216; 219/3; 219/4;
|
|||
|
300/2; 305/8; 307/6;
|
|||
|
315/2; 330/3; 334/3;
|
|||
|
334/4; 334/5; 334/6;
|
|||
|
334/7; 334/8; 340/4;
|
|||
|
405/1; 405/2; 415/1;
|
|||
|
422/2; 467/4; 467/5;
|
|||
|
467/6
|
|||
|
Bulletin Board Systems, Monitoring of 102/3; 105/4; 118/5;
|
|||
|
201/5; 306/5; 342/2
|
|||
|
Bulletin Board Systems, Sting operations 111/3; 302; 462/8
|
|||
|
Bureau of Justice Statistics 446/9
|
|||
|
Canada 313/4; 323/1; 343/11;
|
|||
|
423/3; 438/3; 449/8;
|
|||
|
451/3; 452/6; 453/3;
|
|||
|
453/5; 455/3
|
|||
|
Canadian Alliance Against Software Theft 343/11
|
|||
|
"Cap't Crunch", see Draper, John
|
|||
|
Casolaro, Daniel 330/4; 331/7; 333/5;
|
|||
|
404/3; 436/8; 436/9;
|
|||
|
451/1
|
|||
|
CCC, see Chaos Computer Club
|
|||
|
Censorship 208/3; 208/4; 209/3;
|
|||
|
209/4; 210/5; 212/5;
|
|||
|
214/5; 305/6
|
|||
|
Cellular phones 323/4; 324/8; 466/2
|
|||
|
CERT, see Computer Emergency Response Team
|
|||
|
Chaos Computer Club 202/5; 218/4; 305/5;
|
|||
|
327/9; 402/4; 422/4
|
|||
|
Chasin, Scott 322/1; 324/3; 325;
|
|||
|
454/2; 454/3
|
|||
|
_Chicago Tribune_ 435/9
|
|||
|
CitiCorp 101/4; 445/5
|
|||
|
Cisler, Steve 424/4
|
|||
|
Clinton, Bill 421/6; 443/6; 447/5;
|
|||
|
455/2; 459/5; 465/6
|
|||
|
Cloak and Dagger 204/6
|
|||
|
COCOT, see Customer-Owned Coin-Operated Telephone
|
|||
|
Comprehensive Crime Control Act 109/4
|
|||
|
CompuServe Information Service 343/12; 402/8
|
|||
|
_Computer Addiction_ 344/5
|
|||
|
Computer Emergency Response Team 314/4; 333/7; 437/4;
|
|||
|
448/3; 465/1; 466/6
|
|||
|
_Computer Ethics_ 207/7; 308/5; 328/2;
|
|||
|
328/3
|
|||
|
Computer Fraud and Abuse Act of 1984 100/2
|
|||
|
Computer Fraud and Abuse Act of 1986 116
|
|||
|
Computers, Freedom and Privacy Conference 213/4; 306/2; 344/7;
|
|||
|
415/8; 415/9; 418/6;
|
|||
|
427/3
|
|||
|
Computer Misuse Act 205/7; 209/8
|
|||
|
Computer Professionals for Social Responsibility 105/4; 118/5; 122/6;
|
|||
|
201/3; 207/3; 214/3;
|
|||
|
304/4; 313/4; 324/7;
|
|||
|
334/2; 342/2; 342/3;
|
|||
|
411/6; 412/6; 417;
|
|||
|
419/2; 427/4; 427/5;
|
|||
|
432/2; 434/10; 437/8;
|
|||
|
445/4; 449/3; 462/1;
|
|||
|
462/2; 466/1
|
|||
|
_Computer Security Basics_ 335/3
|
|||
|
Computer Sciences Corporation 453/8
|
|||
|
Computer underground 100/1; 111/2; 111/4;
|
|||
|
113/2; 207/5; 215/7;
|
|||
|
300/4; 301; 306/6;
|
|||
|
309/1; 314/3; 435/2
|
|||
|
Comsec Data Security 322/1; 324/3; 324/4;
|
|||
|
325
|
|||
|
Cook, William 106/3; 118/4; 124/2;
|
|||
|
125/2; 128/4; 129/6;
|
|||
|
320/4; 326/3; 333/3;
|
|||
|
341/3; 407/2; 421/3
|
|||
|
COPS 219/2; 300/5
|
|||
|
"Corrupt", see Lee, John
|
|||
|
CPSR, see Computer Professionals for Social Responsibility
|
|||
|
Credit card fraud 109/3; 109/4; 418/8
|
|||
|
Cryptography 219/2; 315/1; 327/6;
|
|||
|
411/6; 418/6; 429/2;
|
|||
|
432/1; 438/9; 449/7;
|
|||
|
465/9
|
|||
|
CSC, see Computer Sciences Corporation
|
|||
|
_Cuckoo's Egg, The_ 106/4; 112/3; 306/6;
|
|||
|
444/1; 444/2; 444/3;
|
|||
|
444/4; 444/5
|
|||
|
Cupps, Robert 324/3; 325
|
|||
|
Customer-Owned Coin-Operated Telephone 420/1; 422/3
|
|||
|
Cyberpunk 129/5; 200/4; 323/1;
|
|||
|
324/1; 447/1
|
|||
|
_Cyberpunk_ 332/1; 332/2; 333/3;
|
|||
|
333/4; 333/5; 335/2;
|
|||
|
425/5
|
|||
|
Cyberview 312/2
|
|||
|
Cyberspace 329/4; 330/3; 335/10;
|
|||
|
423/3; 446/4; 450/6
|
|||
|
Darden, Franklin Jr. 123/4; 124/4; 124/5;
|
|||
|
212/3; 213/3; 215/3;
|
|||
|
216; 217/3; 319/2
|
|||
|
Dark Side BBS 302
|
|||
|
Data Encryption Standard 432/1
|
|||
|
Dateline NBC 454/2; 454/3
|
|||
|
David, Lowell 464/1
|
|||
|
Davy Jones Locker BBS 426/7
|
|||
|
DEA, see Drug Enforcement Agency
|
|||
|
"Dead Lord", see Fancher, Bruce
|
|||
|
Defense Conversion Commission 449/2
|
|||
|
De La Fe, Alfredo 430/2; 430/3
|
|||
|
Delphi information service 465/4
|
|||
|
Denning, Dorothy 207/5; 207/6
|
|||
|
Department of Justice 204/7; 319/4; 411/4;
|
|||
|
436/7; 436/8; 451/1;
|
|||
|
465/1
|
|||
|
DES, see Data Encryption Standard
|
|||
|
DiCiccio, Lenny 332/3; 332/5
|
|||
|
_Difference Engine_ 335/4
|
|||
|
Digital Communications 411/4; 411/5; 412/5;
|
|||
|
417; 429/1
|
|||
|
Digital Signature Standard 432/1; 438/9
|
|||
|
Digital telephony proposal 429/1; 445/4; 449/3
|
|||
|
"Doc Holiday", see Chasin, Scott
|
|||
|
"Doc Savage", see Majette, Baron
|
|||
|
DOJ, see Department of Justice
|
|||
|
Donner, Frank 321/4
|
|||
|
Douchette, Leslie Lynn 129/6
|
|||
|
Download tax 334/3; 334/4; 334/5;
|
|||
|
334/6; 334/7; 334/8;
|
|||
|
335/7
|
|||
|
Draper, John 446/6
|
|||
|
"Dr. Ripco", see Esquibel, Bruce
|
|||
|
Drug Enforcement Agency 213/5; 214/8
|
|||
|
DSS, see Digital Signature Standard
|
|||
|
E911, see Emergency/Enhanced 911
|
|||
|
Earth First! 103/4
|
|||
|
Edwards, Don, 118/5
|
|||
|
EFF, see Electronic Frontier Foundation
|
|||
|
Effective Performance In Candidates project 213/2
|
|||
|
Ek, Brian 212/4
|
|||
|
Electronic Bill of Rights 122/6
|
|||
|
Electronic Communications Privacy Act 102/3; 104c; 104d;
|
|||
|
125/3; 304/3; 305/2;
|
|||
|
330/3
|
|||
|
Electronic Frontier Foundation 122/6; 123/4; 124/3;
|
|||
|
128/4; 200/2; 207/4;
|
|||
|
209/5; 210/3; 210/4;
|
|||
|
217/3; 307/4; 307/4;
|
|||
|
310/4; 310/5; 315/3;
|
|||
|
318; 319/4; 320/6;
|
|||
|
343/2; 414/3; 421/3;
|
|||
|
428/2; 432/3; 437/7;
|
|||
|
443/5; 446/5; 466/4;
|
|||
|
466/5
|
|||
|
Electronic Mail 100/4; 104a; 104b;
|
|||
|
104c; 104d; 115
|
|||
|
204/7; 211; 214/6;
|
|||
|
326/6; 329/5; 333/4;
|
|||
|
344/3
|
|||
|
Elephant public access UNIX 421/3
|
|||
|
ELINT/CE 103/2
|
|||
|
Emergency/Enhanced 911 100/4; 100/5; 103/6;
|
|||
|
107/2; 110; 115;
|
|||
|
116; 119; 120;
|
|||
|
124/2; 125/2; 211;
|
|||
|
216; 217/3; 341/3;
|
|||
|
407/2; 451/3
|
|||
|
Encryption, see Cryptography
|
|||
|
EPIC, see Effective Performance In Candidates project
|
|||
|
"Erik Bloodaxe", see Goggans, Chris
|
|||
|
Esquibel, Bruce 109/1; 126/4; 127/3;
|
|||
|
202/3; 302; 311/1;
|
|||
|
314/3; 434/8; 437/2;
|
|||
|
437/3
|
|||
|
Event Horizons BBS 426/5
|
|||
|
_Exporting the First Amendment_ 305/7
|
|||
|
Fancher, Bruce 451/3
|
|||
|
05/4;
|
|||
|
201/3; 204/3; 204/6;
|
|||
|
214/3; 306/5; 321/4;
|
|||
|
323/2; 344/3; 411/4;
|
|||
|
412/5; 416/3; 416/4;
|
|||
|
429/2; 439/2; 445/4;
|
|||
|
446/5; 449/3; 457/1
|
|||
|
Federal Communications Commission 305/6
|
|||
|
Federal High-Performance Computing Act 205/7
|
|||
|
Federal Whistleblower BBS, The 413/4
|
|||
|
Federal Wiretapping Law of 1968 102/3
|
|||
|
Ferguson, Thomas 432/5
|
|||
|
Fernandez, Julio 430/1; 430/2; 430/3;
|
|||
|
431/1; 432/4; 451/2
|
|||
|
Ferrell, Michael 300/6
|
|||
|
"Ferret" 117/6
|
|||
|
Figallo, Cliff 110; 432/3; 443/5
|
|||
|
File Transfer Protocol 123/2
|
|||
|
Films 307/5
|
|||
|
"Flash", see Kong, Albert
|
|||
|
Foley, Timothy 125/2; 200/3; 201/5;
|
|||
|
203/2; 211; 311/1;
|
|||
|
315/3; 322/3; 326/3;
|
|||
|
339/2; 341/3; 401/2;
|
|||
|
421/3
|
|||
|
_Forbes_ magazine 466/7
|
|||
|
Forrester, Owen 213/3
|
|||
|
Forrester, Tom 328/3; 328/4
|
|||
|
Fox Television 309/1; 321/6
|
|||
|
Freedom of Information Act 105/4; 201/3; 339/3;
|
|||
|
342/2; 402/9; 412/6;
|
|||
|
415/5; 417
|
|||
|
_Freaker's Bureau Incorporated_ 333/6
|
|||
|
Freriks, R. David 467/2
|
|||
|
FTP, see File Transfer Protocol
|
|||
|
_Full Disclosure_ 302
|
|||
|
Gallaway, Jim 204/5
|
|||
|
GAO, see General Accounting Office
|
|||
|
Garbage Dump BBS, The 438/2
|
|||
|
GateKeeper Telecommunications Systems, Inc. 323/4
|
|||
|
Gateway/WINDO 446/7; 446/8; 447/2
|
|||
|
General Accounting Office 103/3; 204/7
|
|||
|
"Genesis" 406/1
|
|||
|
GEnie 318
|
|||
|
Gibson, William 447/1
|
|||
|
Gleason, William 216
|
|||
|
Goggans, Chris 106/3; 110; 211;
|
|||
|
324/3; 325; 421/3
|
|||
|
Golden, Barbara 200/3; 211; 315/3;
|
|||
|
401/2; 421/4
|
|||
|
Goldman, Stuart 307/3; 309/1; 310/2;
|
|||
|
314/3; 321/6
|
|||
|
Goldstein, Emmanuel 110; 307/6; 337/3;
|
|||
|
337/6
|
|||
|
Gould, Carol 321/5
|
|||
|
Grant, Adam 123/4; 124/4; 124/5;
|
|||
|
212/3; 213/3; 215/3;
|
|||
|
216; 217/3; 319/2;
|
|||
|
454/2; 454/3
|
|||
|
_Gray Areas_ 465/8
|
|||
|
GTE 108/4; 420/1
|
|||
|
_GURPS Cyberpunk_ 113/5; 126/2; 127/4;
|
|||
|
202/5; 209/5; 320/4
|
|||
|
_Hacker Crackdown_ 447/1; 461/1; 461/2;
|
|||
|
461/3; 461/4; 461/5
|
|||
|
_Hacker Files, The_ 438/6
|
|||
|
Hackers 100/4; 103/3; 106/4
|
|||
|
112/3; 116; 119;
|
|||
|
121/2; 126/2; 201/4;
|
|||
|
206/4; 207/5; 207/6;
|
|||
|
209/7; 209/8; 210/9;
|
|||
|
211; 212/2; 212/9;
|
|||
|
213/5; 214/4; 214/8;
|
|||
|
215/6; 217/2; 217/6;
|
|||
|
217/7; 218/3; 218/5;
|
|||
|
303/2; 305/5; 306/6;
|
|||
|
311/2; 315/2; 319/4;
|
|||
|
320/5; 323/1; 323/3;
|
|||
|
326/4; 327/10; 328/3;
|
|||
|
328/4; 337/2; 337/3;
|
|||
|
337/5; 343/10; 402/4;
|
|||
|
411/7; 415/9; 417;
|
|||
|
418/1; 418/8; 419/1;
|
|||
|
422/4; 433/6; 438/6;
|
|||
|
447/3; 453/4; 454/2;
|
|||
|
454/3; 466/7
|
|||
|
"HackRat" 457/3
|
|||
|
Hafner, Katie 332/2; 425/5
|
|||
|
Handles, see Aliases
|
|||
|
Haugh, John 421/3
|
|||
|
Hay, Penny 212/4
|
|||
|
Henson, H. Keith 104a; 104b; 104c;
|
|||
|
104d; 311/5; 325
|
|||
|
HoHoCon convention 440/4; 445/1; 445/2;
|
|||
|
456/3; 464/2; 464/4
|
|||
|
"Hollywood Hacker", see Goldman, Stuart
|
|||
|
Hopson, Ron 313/4; 315/2
|
|||
|
HR 1400 324/6
|
|||
|
HR 2772 446/7; 446/8
|
|||
|
HR 3459 442/5
|
|||
|
HR 3515 413/3
|
|||
|
HR 5096 435/5
|
|||
|
HR 5983 447/2
|
|||
|
Huebner, Hans 332/1; 332/2; 332/3;
|
|||
|
332/5
|
|||
|
Illuminati BBS 110; 126/2; 319/4;
|
|||
|
421/3
|
|||
|
Imhoff, James 305/8
|
|||
|
Incident tracking and vulnerability reporting database 448/3
|
|||
|
_Informatik_ 338/6
|
|||
|
_Information Web, The_ 321/5
|
|||
|
Ingraham, Don 337/1; 337/2; 337/3;
|
|||
|
338/3; 338/4
|
|||
|
"Inhuman" 457/3
|
|||
|
Inslaw, Inc. 319/4; 330/4; 331/7;
|
|||
|
333/5; 404/3; 436/7;
|
|||
|
436/8; 436/9; 445/5;
|
|||
|
451/1; 452/2
|
|||
|
Interactive Systems Corporation 209/2
|
|||
|
Internal Revenue Service 437/6
|
|||
|
International Information Retrieval Guild 214/4
|
|||
|
Internet Society 418/2
|
|||
|
Internet worm 107/2; 123/4; 202/5;
|
|||
|
218/3
|
|||
|
_Intertek_ magazine 409/5
|
|||
|
IRS, see Internal Revenue Service
|
|||
|
Izenberg, Bob 421/3
|
|||
|
Johnson, Al 457/1; 457/5; 457/6;
|
|||
|
457/7; 459/2; 464/1
|
|||
|
Jolnet public access UNIX 110; 115; 211;
|
|||
|
421/4
|
|||
|
Kapor, Mitch 113/4; 121/5; 122/6;
|
|||
|
123/4; 204/6; 318
|
|||
|
Kehoe, Brendan 438/7; 438/8
|
|||
|
Kenadek, Richard 426/7
|
|||
|
Kennedy, Bill 421/3
|
|||
|
Kent, Dora 104a; 325
|
|||
|
Kermit 211
|
|||
|
Keystroke monitoring 465/1; 466/6
|
|||
|
Killer, see Attctc
|
|||
|
Kluepfel, Henry 211; 315/3; 421/3;
|
|||
|
421/4; 422/1; 434/5
|
|||
|
"Knight Lightning", see Neidorf, Craig
|
|||
|
Kong, Albert 306/4
|
|||
|
Krol, Ed 439/4; 462/5
|
|||
|
Kroupa, Patrick 451/3
|
|||
|
Kuykendall, Bill 110
|
|||
|
Ladopoulos, Elias 305/3; 306/4; 430/1;
|
|||
|
430/2; 430/3; 431/1;
|
|||
|
432/4; 451/2
|
|||
|
Landsat 419/4
|
|||
|
Lauffenburger, Michael 406/3
|
|||
|
Laws, California 117/5; 204/4; 406/5;
|
|||
|
408/4; 418/4
|
|||
|
Laws, Finland 335/6
|
|||
|
Laws, General 215/5; 330/3
|
|||
|
Laws, United Kingdom 102/2; 128/4; 205/7
|
|||
|
Lawsuits 125/4; 204/7; 304/4
|
|||
|
Lee, John 430/1; 430/2; 430/3;
|
|||
|
431/1; 432/4; 451/2
|
|||
|
Leemah Datacom Security Corporation 205/7; 300/2; 303/2
|
|||
|
Legion of Doom 100/2; 100/4; 100/5;
|
|||
|
101/3; 101/4; 102/1;
|
|||
|
106/3; 110; 113/3;
|
|||
|
115; 116; 117/3;
|
|||
|
117/4; 119; 123/4;
|
|||
|
124/4; 126/2; 128/3;
|
|||
|
129/6; 202/5; 211;
|
|||
|
216; 310/4; 312/3;
|
|||
|
317/4; 322/1; 324/3;
|
|||
|
325; 341/3; 407/2;
|
|||
|
421/4; 451/3; 452/6;
|
|||
|
453/3
|
|||
|
Lehrer, Mark 462/8
|
|||
|
Levy, Steven 204/6
|
|||
|
Lewis, John 203/2
|
|||
|
"Lex Luthor" 452/6
|
|||
|
"Lithium Bandit" 457/3
|
|||
|
_LIttle Black Book of Computer Viruses_ 455/1
|
|||
|
LoD, see Legion of Doom
|
|||
|
"Lord Digital", see Kroupa, Patrick
|
|||
|
Luce, Doug 457/3
|
|||
|
Ludwig, Mark 455/1
|
|||
|
Luke, Ed 206/3
|
|||
|
Majette, Baron 311/3; 326/5
|
|||
|
"Malefactor", see Shulman, Kenyon
|
|||
|
Markoff, John 332/2; 332/5
|
|||
|
Marrou, Andre 315/2
|
|||
|
MARS BBS 206/3; 208/4
|
|||
|
Marx, Gary 321/3
|
|||
|
Masters of Destruction, see Masters of Disasters
|
|||
|
Masters of Disasters 200/5; 430/1; 430/2;
|
|||
|
430/3; 431/1; 431/2
|
|||
|
432/4; 433/7; 433/8;
|
|||
|
451/2
|
|||
|
"Maverick", see Maverick, Scott
|
|||
|
Maverick, Scott 451/3; 452/6; 453/3
|
|||
|
McCarthy, Timothy 311/4
|
|||
|
McDonnell, Patrick 100/5
|
|||
|
McMenamin, Brigid 466/7
|
|||
|
_Media Information Australia_ 429/5
|
|||
|
Meeks, Brock 457/1; 457/6; 457/7
|
|||
|
Meyer, Gordon 339/3
|
|||
|
Michigan Bell Telephone 219/4; 305/8
|
|||
|
Michigan Telecommunications Act 307/6
|
|||
|
Microbec 438/3
|
|||
|
_Microtimes_ 306/2
|
|||
|
Mindvox public access UNIX 441/1
|
|||
|
Minitele 214/6
|
|||
|
Mitnick, Kevin 300/6; 303/4; 332/1;
|
|||
|
332/2; 332/3; 332/5;
|
|||
|
335/2
|
|||
|
MoD, see Masters of Disasters
|
|||
|
Modem User's Association of America 108/4; 118/2; 128/4
|
|||
|
_Mondo 2000_ 314/6
|
|||
|
Morris, Robert 107/2; 108/3; 123/4;
|
|||
|
129/5; 129/6; 202/5;
|
|||
|
216; 217/3; 317/5;
|
|||
|
319/2; 332/1; 332/2;
|
|||
|
332/3; 332/5; 344/4
|
|||
|
MUAA, see Modem User's Association of America
|
|||
|
"Multiplexer" 418/9
|
|||
|
NASA, see National Aeronautics and Space Administration
|
|||
|
National Aeronautics and Space Administration 103/3; 329/5; 333/3;
|
|||
|
343/9; 343/13; 414/9;
|
|||
|
462/3
|
|||
|
National Computer Security Conference 207/5; 207/6
|
|||
|
National Institute of Standards and Technology 118/2; 325; 429/2;
|
|||
|
432/1; 438/9
|
|||
|
National Research and Education Network 329/2; 331/6; 433/10;
|
|||
|
434/10; 448/2
|
|||
|
National Science Foundation 206/3; 208/4; 209/4;
|
|||
|
321/2
|
|||
|
National Security Agency 201/6; 429/2; 432/1;
|
|||
|
433/8; 438/9
|
|||
|
National Security Associates, Inc. 319/4
|
|||
|
"Necron 99", see Grant, Adam
|
|||
|
Neidorf, Craig 100/4; 100/5; 103/6
|
|||
|
110; 114/3; 115;
|
|||
|
116; 118/4; 121/5;
|
|||
|
122/6; 123/1; 124/2;
|
|||
|
124/3; 124/5; 126/3;
|
|||
|
128/1; 128/4; 129/6;
|
|||
|
200/3; 202/5; 211;
|
|||
|
213/3; 217/3; 218/2;
|
|||
|
302; 309/2; 314/3;
|
|||
|
337/1; 337/2; 337/3;
|
|||
|
338/3; 338/4; 340/2;
|
|||
|
341/3; 401/2; 407/2;
|
|||
|
421/3; 421/4; 421/5;
|
|||
|
457/3
|
|||
|
Nemeth, Gary 315/2
|
|||
|
Newlin, Reed 211
|
|||
|
_Network Information Access_ 306/2
|
|||
|
_Neuromancer_ 447/1
|
|||
|
New York Telephone company 427/7; 431/1
|
|||
|
NIA, see Network Information Access
|
|||
|
Norman, Neal 323/4
|
|||
|
"NotSoHumble Babe" 406/1
|
|||
|
_Now it can be Told_ 337/1; 337/2; 337/3;
|
|||
|
337/5; 338/3; 338/4
|
|||
|
NREN, see Nation Research and Education Network
|
|||
|
NSA, see National Security Agency
|
|||
|
NSF, see National Science Foundation
|
|||
|
NuPrometheus League 204/3; 204/6; 205/5
|
|||
|
Ochoa, Enedina 437/6
|
|||
|
Operation Sun Devil 109/3; 109/4; 109/5;
|
|||
|
110; 113/2; 114/2;
|
|||
|
114/5; 117/2; 126/4;
|
|||
|
202/2; 202/5; 204/3;
|
|||
|
204/6; 206/3; 218/2;
|
|||
|
302; 310/4; 310/5;
|
|||
|
311/3; 312/3; 314/3;
|
|||
|
319/4; 320/4; 325;
|
|||
|
334/2; 412/6; 419/2;
|
|||
|
421/3; 437/2;
|
|||
|
453/3
|
|||
|
Orange County Transportation Authority 454/4
|
|||
|
Oregon Public Utility Commission 405/1; 405/2; 406/4;
|
|||
|
408/3
|
|||
|
OSI, see Air Force Office of Special Investigations
|
|||
|
"Outlaw", see Fernandez, Julio
|
|||
|
Pacific Bell telephone company 436/5; 436/6; 437/1;
|
|||
|
437/8
|
|||
|
Packet BBSs 305/6
|
|||
|
Paperwork Reduction Act 404/4; 404/5; 404/6
|
|||
|
Pedophilia 415/7
|
|||
|
"Pengo", see Huebner, Hans
|
|||
|
Pentagon City Mall 457/1; 457/2; 457/3;
|
|||
|
457/4; 457/5; 457/6;
|
|||
|
457/7; 464/1; 465/10;
|
|||
|
_Phantasy_ 214/4
|
|||
|
Phantom Access BBS 451/3
|
|||
|
"Phiber Optik", see Abene, Mark
|
|||
|
Phoenix Project BBS, The 110; 118/4; 211;
|
|||
|
317/5; 407/2; 421/3;
|
|||
|
422/1; 434/5
|
|||
|
_Phrack Inc._ Newsletter 100/4; 100/5; 110;
|
|||
|
112/5; 114/4; 115;
|
|||
|
116; 119; 120;
|
|||
|
123/3; 125/2; 127/3;
|
|||
|
128/4; 202/5; 211;
|
|||
|
212/1; 309/2; 326/3;
|
|||
|
341/3; 407/2; 421/3
|
|||
|
Physician Computer Network Inc. 418/3
|
|||
|
Pilgrim, Mark 421/7
|
|||
|
Pinz, Ronald 455/4
|
|||
|
Pioneer awards 414/3; 466/4
|
|||
|
Piracy, see software piracy
|
|||
|
Playboy Enterprises 426/5
|
|||
|
Pluchino, David 453/3
|
|||
|
Point, The 110
|
|||
|
Pornography 344/3; 401/4; 409/8;
|
|||
|
410/6
|
|||
|
Poulsen, Kevin 320/2
|
|||
|
Povich, Murray 314/5
|
|||
|
PRA, see Paperwork Reduction Act
|
|||
|
_Practical UNIX Security_ 330/1; 330/2; 333/9;
|
|||
|
335/5
|
|||
|
Privacy Protection Act of 1980 401/2
|
|||
|
Prodigy 208/3; 209/4; 212/4;
|
|||
|
214/6; 303/2; 313/4;
|
|||
|
316/2; 316/3; 316/4;
|
|||
|
316/5; 316/6; 319/2;
|
|||
|
320/7; 343/12
|
|||
|
Project Hermes 118/2
|
|||
|
PROMIS 436/8; 451/1
|
|||
|
_Protectors of Privilege_ 321/4
|
|||
|
PumpCon convention 455/4; 460/1
|
|||
|
"Quintin" 454/2; 454/3
|
|||
|
Raphaelson, Ira 100/5
|
|||
|
Rheingold, Howard 423/7
|
|||
|
Riconosciuto, Michael 404/3
|
|||
|
Riggs, Robert 100/4; 100/5; 103/6;
|
|||
|
115; 116; 123/4;
|
|||
|
124/4; 124/5; 125/2;
|
|||
|
128/4; 211; 212/3;
|
|||
|
213/3; 215/3; 216;
|
|||
|
217/3; 317/3; 319/2;
|
|||
|
341/3; 407/2; 421/4
|
|||
|
Ripco BBS 109/1; 111/4; 126/4;
|
|||
|
127/3; 202/3; 302;
|
|||
|
314/3; 437/2; 437/3;
|
|||
|
438/1
|
|||
|
Rivera, Geraldo 337/1; 337/2; 337/3;
|
|||
|
338/3; 338/4
|
|||
|
"Robert Johnson", see Riggs, Robert
|
|||
|
Roberts, Glen 302
|
|||
|
Rose, Leonard 112/4; 113/3; 126/1;
|
|||
|
128/2; 128/3; 200/3;
|
|||
|
202/5; 203/2; 209/2;
|
|||
|
210/2; 214/2; 215/2;
|
|||
|
310/3; 310/4; 310/5;
|
|||
|
311/2; 311/4; 312/2;
|
|||
|
313/2; 313/3; 314/2;
|
|||
|
314/3; 319/2; 321/7;
|
|||
|
322/3; 326/3; 339/2;
|
|||
|
339/4; 340/5; 413/2;
|
|||
|
421/3; 421/4; 434/6;
|
|||
|
466/7
|
|||
|
Rosenfeld, Morton 430/2; 430/3
|
|||
|
Ross Perot for President BBS 420/3
|
|||
|
Rothman, Herb 212/4
|
|||
|
Rpp386 computer system 421/3
|
|||
|
S.266 327/6
|
|||
|
S.516 340/6
|
|||
|
S.893 447/4; 450/2; 450/3;
|
|||
|
453/9
|
|||
|
S.1543 210/4
|
|||
|
S.1929 402/9
|
|||
|
S.1940 402/9; 415/5
|
|||
|
S.2112 413/3
|
|||
|
S.2476 201/2
|
|||
|
S.2813 427/6; 446/7; 446/8
|
|||
|
Salzman, Peter 129/6
|
|||
|
SB.1447 408/4
|
|||
|
"Scarecrow" 117/6
|
|||
|
SCAT, see Special Computereized Attack Team
|
|||
|
Schwartz, John 106/3
|
|||
|
Scott, Jon 454/2; 454/3
|
|||
|
"Scorpion", see Stira, Paul
|
|||
|
Search and seizure 331/4
|
|||
|
Search warrant 104a; 200/3; 211;
|
|||
|
460/1
|
|||
|
Secret Service, see United States Sercret Service
|
|||
|
Security 210/9; 218/5; 219/2;
|
|||
|
300/5; 304/4; 319/4;
|
|||
|
330/1; 330/2; 333/7;
|
|||
|
335/3; 437/4; 442/6;
|
|||
|
448/3; 453/7; 453/8
|
|||
|
Sexism 300/3; 300/4; 301;
|
|||
|
303/2
|
|||
|
Shadur, Milton 129/6
|
|||
|
Shergold, Craig 423/2
|
|||
|
Shif, Zohar 453/3
|
|||
|
Shotton, Margaret 344/5
|
|||
|
Shulman, Kenyon 324/3; 325; 327/5
|
|||
|
Sigman, Randy 455/4
|
|||
|
Simple Mail Transfer Protocol 106/5
|
|||
|
Simplex locks 337/6
|
|||
|
SJG, see Steve Jackson Games
|
|||
|
Sklar, Robert Matthew 107/2
|
|||
|
SMTP, see Simple Mail Transfer Protocol
|
|||
|
Social Engineering 210/9; 314/4; 431/1;
|
|||
|
SNEAKERS (movie review) 446/6
|
|||
|
454/2; 454/3
|
|||
|
Software patents 416/1
|
|||
|
Software piracy 103/5; 105/3; 111/3;
|
|||
|
435/7; 436/10; 436/11;
|
|||
|
436/12; 436/13; 442/7;
|
|||
|
443/2; 443/3; 446/1;
|
|||
|
446/3; 447/4; 449/4;
|
|||
|
450/2; 450/3; 450/4;
|
|||
|
460/6; 460/7; 463/1;
|
|||
|
463/2; 463/3; 467/2
|
|||
|
Software Publishers Association 103/5; 105/3; 109/6;
|
|||
|
117/6; 308/6; 315/2;
|
|||
|
406/2; 426/7; 435/7;
|
|||
|
436/12; 436/13; 442/7;
|
|||
|
443/2; 443/3; 460/7;
|
|||
|
463/1; 463/2; 463/3;
|
|||
|
467/2
|
|||
|
Software Rental 206/5
|
|||
|
South Africa 313/4
|
|||
|
Southwestern Bell Company 200/3; 213/5; 219/4;
|
|||
|
303/2; 307/6; 308/2;
|
|||
|
405/2; 430/2; 430/3;
|
|||
|
431/1
|
|||
|
Soviet Union 201/6
|
|||
|
SPA, see Software Publishers Association
|
|||
|
Space Physics Analysis Network 103/3; 107/3
|
|||
|
SPAN, see Space Physics Analysis Network
|
|||
|
Spafford, Eugene 100/2
|
|||
|
Special Computerized Attack Team 323/2
|
|||
|
Sprint 108/4
|
|||
|
Sterling, Bruce 101/3; 415/8; 461/1;
|
|||
|
461/6
|
|||
|
Steve Jackson Games 100/2; 101/3; 106/3;
|
|||
|
110; 113/5; 122/6;
|
|||
|
123/4; 126/2; 127/4;
|
|||
|
202/5; 209/5; 211;
|
|||
|
213/1; 312/3; 314/3;
|
|||
|
315/3; 318; 319/4;
|
|||
|
320/4; 415/4; 421/3
|
|||
|
Stira, Paul 305/3; 306/4; 430/1;
|
|||
|
430/2; 430/3; 431/1;
|
|||
|
432/4; 451/2
|
|||
|
Stoll, Clifford 106/4; 107/3; 112/3;
|
|||
|
306/6; 332/3; 337/3;
|
|||
|
444/1; 444/2; 444/3;
|
|||
|
444/4; 444/5
|
|||
|
Stone, Robert 324/8
|
|||
|
Stratton, Bob 457/2
|
|||
|
Summercon convention 302; 460/1
|
|||
|
Swinyard, William Jr. 423/6
|
|||
|
_SysLaw_ 449/5; 467/4; 467/5;
|
|||
|
467/6
|
|||
|
Taito Software, Inc. 107/5
|
|||
|
_TAP_ 112/5; 126/5; 303/2
|
|||
|
"Taran King", see Tishler, Randy
|
|||
|
Taxpayer Assets Project 442/5
|
|||
|
Technophiliacs 459/7; 459/8
|
|||
|
_Tel Line, The_ 106/2
|
|||
|
_TELECOM Digest_ 342/3; 410/2
|
|||
|
"Terminus", see Rose, Leonard
|
|||
|
Texas Public Utilities Commission 307/6; 308/2
|
|||
|
Texas Tech University 467/2
|
|||
|
Thackeray, Gail 202/5; 219/5; 306/2;
|
|||
|
311/3; 323/4; 326/5
|
|||
|
"The Dictator" 302; 305/4
|
|||
|
"The Grim Reaper" 406/1
|
|||
|
"The Leftist", see Darden, Franklin Jr.
|
|||
|
"The Mentor", see Blankenship, Loyd
|
|||
|
"The Prophet", see Riggs, Robert
|
|||
|
"The Ur-vile", see Grant, Adam
|
|||
|
Thomas, Bob 409/8; 410/6
|
|||
|
Thrifty-Tel 319/3; 323/3
|
|||
|
Ticer, Scott 454/2; 454/3
|
|||
|
Title 18 USC 1343 118/3; 118/4; 121/2;
|
|||
|
122/5
|
|||
|
Title 18 USC 2314 123/4
|
|||
|
Tisher, Randy 211
|
|||
|
Toxic Shock 207/8;208/2
|
|||
|
Trashing 216; 454/2
|
|||
|
Tripwire integrity-monitor 455/5
|
|||
|
Trojan horse programs 113/3; 203/2
|
|||
|
TRW Information Services 107/2; 430/2; 430/3;
|
|||
|
431/1; 437/2; 437/3
|
|||
|
Townson, Patrick 100/2; 342/3
|
|||
|
_Undercover: Police Surveillance in America_ 321/3
|
|||
|
United Software Alliance 406/1
|
|||
|
United States Long Distance 420/1
|
|||
|
United States Secret Service 100/2; 106/3; 109/3;
|
|||
|
109/4; 109/5; 110;
|
|||
|
111/4; 112/4; 113/3;
|
|||
|
113/5; 114/2; 117/4;
|
|||
|
117/6; 118/5; 119;
|
|||
|
123/4; 124/2; 125/2;
|
|||
|
126/2; 126/4; 127/3;
|
|||
|
129/6; 200/3; 201/5;
|
|||
|
202/5; 203/2; 204/3;
|
|||
|
204/6; 206/2; 206/3;
|
|||
|
207/6; 209/5; 211;
|
|||
|
216; 302; 305/3;
|
|||
|
309/1; 310/1; 313/4;
|
|||
|
315/3; 319/4; 320/4;
|
|||
|
323/2; 325; 326/3;
|
|||
|
339/2; 339/3; 342/2;
|
|||
|
342/3; 342/4; 407/2;
|
|||
|
412/6; 415/4; 419/2;
|
|||
|
421/3; 421/4; 457/1;
|
|||
|
457/3; 457/5; 457/6;
|
|||
|
464/2; 465/10; 467/2
|
|||
|
United States vs. Craig Neidorf 124/2; 124/3; 125/2;
|
|||
|
341/3; 407/2
|
|||
|
Usenet 409/6; 409/7; 410/1;
|
|||
|
410/2; 410/3; 414/4;
|
|||
|
439/5
|
|||
|
User Bill of Rights 404/2
|
|||
|
USLD, see United States Long Distance
|
|||
|
USSR, Soviet Union
|
|||
|
USSS, see United States Secret Service
|
|||
|
US West Communications 405/1; 405/2; 406/4;
|
|||
|
408/3
|
|||
|
Vajk, Bill 302
|
|||
|
Variety and Spice BBS 219/4; 305/8
|
|||
|
Virtual reality 423/7
|
|||
|
Virus, Christmas 206/5; 207/2
|
|||
|
Virus, eastern 201/6; 217/7; 303/4
|
|||
|
Virus, general 218/3; 305/5; 409/9;
|
|||
|
437/4; 447/4; 449/1;
|
|||
|
452/3; 452/5; 453/1;
|
|||
|
453/2; 455/1; 456/1;
|
|||
|
459/3; 459/4; 465/7
|
|||
|
Virus, MBDFA 410/7
|
|||
|
Virus, Michelangelo 409/9; 449/1
|
|||
|
Virus, military 129/6; 331/8; 343/8
|
|||
|
Virus, western 212/9; 219/7; 322/2;
|
|||
|
329/7; 410/7; 465/5
|
|||
|
Voice mail 212/9
|
|||
|
Ward, Grady 204/6
|
|||
|
Well, The 110
|
|||
|
White House Conference Library and Information Services 329/2
|
|||
|
_Whole Internet User's Guide & Catalog, The_ 439/4; 462/5; 462/6;
|
|||
|
462/7
|
|||
|
_Windows_ magazine 456/5
|
|||
|
"Wing" 325
|
|||
|
Wittman, Richard 343/9; 343/13; 414/9
|
|||
|
Woodward, Byron 455/4
|
|||
|
Wozniak, Steve 122/6; 123/4
|
|||
|
Wraith of the Black Manta 107/5
|
|||
|
WWIV bulletin board software 129/2
|
|||
|
Xiox 453/7
|
|||
|
X-PRESS Informations Services, Ltd. 424/4; 425/1
|
|||
|
"Zeke", see Shif, Zohar
|
|||
|
_Zen and the Art of the Internet_ 438/7; 438/8; 439/5
|
|||
|
Zenner, Sheldon 121/5; 123/4; 124/2;
|
|||
|
125/2; 202/5; 207/7;
|
|||
|
215/2; 407/2
|
|||
|
"Zod" 129/6; 200/5; 203/4
|
|||
|
|
|||
|
|
|||
|
|
|||
|
END Index
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.95 / END OF VOLUME 5)
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|