1966 lines
94 KiB
Plaintext
1966 lines
94 KiB
Plaintext
2600 Subject Index Volumes 1 (1984) - 10 (1993)
|
|
David Price
|
|
|
|
Subjects are shown in the first column, citations are listed in the
|
|
second column using the following format:
|
|
V(N):P V = Volume, N = Number, P = Page
|
|
|
|
(L) Indicates a letter
|
|
|
|
|
|
00 4(9):6
|
|
10698 7(1):30(L)
|
|
(201) 6(2):20
|
|
202 bug 3(9):65
|
|
2600 Magazine 1(1):1, 2(8):51, 4(12):3
|
|
2600 meetings 10(2):17, 10(2):16, 10(4):35, 7(1):38,
|
|
10(1):43, 10(3):18, 9(4):4
|
|
2600--voice bbs 9(3):40(L)
|
|
2600--BBS 2(2):9, 2(8):49
|
|
4TEL 6(3):20
|
|
(516) 5(3):14
|
|
540s 8(1):19
|
|
550 blocking 4(11):8
|
|
"606 Emergency" 5(1):24(L)
|
|
6.5536 crystal 7(3):32
|
|
*69 9(2):31
|
|
(707) 7(1):44
|
|
800s 6(1):12, 2(6):37, 6(1):12
|
|
800--DTMF recognition 3(12):92(L)
|
|
800--tariffs 2(1):4(L)
|
|
800--translation table 6(1):12
|
|
8038 chip 4(12):22(L), 4(10):12(L)
|
|
900s 2(11):79
|
|
900 translation table 6(1):12
|
|
911 1(10):57, 7(1):37,
|
|
911--documents 7(2):4
|
|
959 Numbers 4(5):8
|
|
97*s 4(10):4
|
|
976 scam 4(7):8
|
|
976 social interactions 4(12):17
|
|
9999-suffixes 1(1):4
|
|
access 3(11):84(L)
|
|
ACD 9(3):28(L)
|
|
ACM SIGSOFT 4(11):13(L)
|
|
acronym maker 4(1):13(L)
|
|
acronyms 10(1):34, 10(2):20, 2(2):11, 10(3):44,
|
|
8(1):42
|
|
ACTS 6(1):30, 1(11):62
|
|
ADS 1(9):53, 1(5):2, 1(1):2
|
|
ADS--Investigation 1(2):9
|
|
Albania 7(1):23
|
|
Allah Akbar! 3(11):86
|
|
Allnet 5(2):2, 4(6):4
|
|
alliance 2(5):26
|
|
American Express--hacking 3(3):17
|
|
AmiExpress--hacking 9(3):4
|
|
ANAC Guide 7(3):39
|
|
ANI Hunting 4(1):18(L), 3 (11):84
|
|
ANSI Bomb 10(2):44
|
|
answer supervision 3(9):65
|
|
anti-hacker propaganda 2(1):1, 7(2):11
|
|
AOS 5(3):10
|
|
Approaching Zero Book Review 10(3):38
|
|
ARAPANet 1(6):1
|
|
Area Code Expansion 1(3):3
|
|
ARPANet military subnet 1(3):5
|
|
Arpanet 4(9):4
|
|
arrests...see busts
|
|
AT&T Break-up 1(6):4, 2(11):74
|
|
AT&T failure 6(4):4
|
|
AT&T Shutdown 6(4):4
|
|
AT&T Strike 1(4):1
|
|
AT&T Thought Police 2(11):79
|
|
ATM III 4(6):12(L)
|
|
ATMs 1(4):3, 4(7):8
|
|
ATMs, Book Reviews 4(2):21
|
|
atomic bomb 1(3):4
|
|
ATT Addresses 9(4):36
|
|
Australian phone system 9(1):31
|
|
Automatic Call Distributor 9(3):28(L)
|
|
AUTOVON 3(5):37, 4(6):18(L), 3(3):17, 6(1):7, 9(4):19
|
|
baby bells 1(7):3
|
|
back doors 2(1):2
|
|
bank records 1(5):3, 2(7):42
|
|
BASIC 3(1):5
|
|
BASIC dialer program 5(1):20
|
|
basic phreaking Q & A 6(2):29(L)
|
|
BASIC Red Box Tones 5(3):22
|
|
basic terms 4(5):13(L)
|
|
BBS Disclaimers 4(7):12(L), 4(10):16
|
|
BBS--Government 10(2):39
|
|
BBS--Protecting a User Log 3(2):16(L)
|
|
beepers 4(11):12(L)
|
|
Bell computers 9(4):42
|
|
Bell Routing Codes 5(1):42
|
|
Bellco cops 5(1):22
|
|
Bellcore Publications 3(5):36
|
|
Best Boast 5(1):24(L)
|
|
Big Brother 3(12):91, 9(1):42, 8(4):8, 1(12):68, 7(3):16,
|
|
1(8):44
|
|
billing signals 3(9):65
|
|
BIN list 8(2):31
|
|
BITnet 2(1):6, 4(9):4
|
|
black band 4(11):7
|
|
BLV (Busy Line Verification) 5(3):27(L), 8(4):42, 4(12):10
|
|
bogus tap-check number myth 4(2):13(L)
|
|
Box--Beige 5(4):42, 10(1):14, 10(3):9
|
|
Box--Blue 3(2):12 (L), 2(10):69, 9(4):33, 2(2):7,
|
|
3(5):36 (L), 10(3):9, 6(1):25 (L), 3(5):38
|
|
Box--Clear 1(7):4
|
|
Box--Combo 9(3):13
|
|
Box--General info 10(3):9, 5(1):16
|
|
Box--Green 7(1):29 (L), 10(3):9
|
|
Box--Rainbow 10(3):9, 9(2):15
|
|
Box--Red 5(2):13, 10(2):42, 7(3):32, 8(3):43, 10(3):9
|
|
9(3):13
|
|
Box--Silver in U.K. 7(1):19
|
|
Box--Silver 6(4):20, 9(4):19, 9(1):16, 10(3):9, 1(11):64
|
|
(L), 3(3):17
|
|
Box--White 2(4):19, 10(3):9
|
|
Box--yellow 10(3):9
|
|
braille computer 3(12):95
|
|
British Telecom 8(2):35
|
|
British Payphones 4(10):17(L)
|
|
busts 4(3):18, 4(7):18 (L), 6(2):26 (L), 4(7):6,
|
|
2(5):27, 1(7):7, 3(12):91, 2(2):9, 8(4):36,
|
|
1(10):55, 10(4):4, 8(3):4, 7(3):44, 8(2):4,
|
|
4(8):3, 8(4):8, 7(3):10, 7(1):3, 6(1):3,
|
|
8(1):11, 8(2):12, 8(1):11, 6(2):34, 9(2):22
|
|
Busy Line Verification...see BLV
|
|
busy 10(4):9
|
|
busy--"fast busy tones" 5(2):27(L)
|
|
busy--busy verification 3(10):80(L)
|
|
cable descrambling 10(1):16, 3(8):63
|
|
cable vaults 7(4):12
|
|
Call Forwarding, Diverting 2(10):65
|
|
Call-Waiting Phone Tap 6(3):27
|
|
callback verification 9(3):9
|
|
Caller ID 3(12):91, 8(1):19, 9(2):18, 7(3):5, 10(3):12,
|
|
8(2):22, 8(2):35
|
|
Caller ID--and Cell Phones 10(3):42
|
|
calling ards 1(4):3, 1(6):3, 1(1):3, 1(2):9
|
|
call records (ESS) 1(2):8
|
|
call traces (ESS) 1(2):8
|
|
canning 3(10):76(L), 5(4):42
|
|
Captain Crunch 4(3):4
|
|
Captain Midnight 3(9):68(L)
|
|
Captain Zap's sins 5(2):24(L)
|
|
card copiers 8(2):7
|
|
Carrier Access Codes 6(3):42
|
|
CCCP 3(3):23
|
|
CCIS 4(11):12(L), 2(2):7, 4(5):6
|
|
CCITT 9(2):10
|
|
CD-ROM 3(12):95
|
|
cellular biopsy 10(4):6
|
|
cellular fraud bust 4(4):8
|
|
cell frequencies 4(1):10, 10(1):4, 4(7):13(L)
|
|
cellular modem 3(5):35
|
|
cellular phones 2(11):79, 5(3):8, 10(4):6, 4(6):8, 3(12):89,
|
|
4(2):13(L), 4(2):8, 10(3):42, 4(7):4,
|
|
3(11):90, 10(1):4
|
|
cellular phones--history 3(11):90
|
|
Central Offices 2(3):14, 7(4):12
|
|
Central Office IDs 4(10):14
|
|
Chaos Computer Club 5(4):34
|
|
China 3(8):63
|
|
Chinese dial-a-narc 6(2):35
|
|
CIA 1(12):68, 1(8):46(L)
|
|
Carrier Identification Codes 1(11):65
|
|
CIC 7(1):8
|
|
CID... see Caller ID
|
|
ciphers 9(4):6
|
|
CLASS features 8(4):31, 8(2):22, 4(5):6
|
|
CLLI codes 4(10):14
|
|
CN/A 3(9):72(L), 4(8):12, 2(3):18,
|
|
CNA--Lists 4(4):10
|
|
CND 8(2):22
|
|
CO Magazine 4(9):22
|
|
COCOTS 6(4)27(L), 7(2):20, 7(4):27(L), 8(2):28
|
|
(L), 8(3):25(L), 9(3):13, 8(1):19, 4(11):8
|
|
8(2):35
|
|
COCOT--database list 8(4):33
|
|
COCOT--numbers 8(3):22
|
|
COCOT--refund letters 8(4):33
|
|
COCOT--tricks 7(3):27(L)
|
|
codes 9(4):6
|
|
codes--methods 1(3):2
|
|
coin boxes 5(3):10
|
|
coin-test number 4(4):20(L)
|
|
COLTs 6(3):20
|
|
commentary 2(8):50
|
|
Common Language Location Identifer...see CLLI
|
|
Communications Fraud Control
|
|
Association 7(4):43
|
|
competition 6(3):3
|
|
Compuserve 3(10):75
|
|
Computel 2(3):15
|
|
Computel scam 3(2):12(L), 4(4):4, 3(5):34
|
|
computer confiscation 2(8):54
|
|
computer lore 9(2):40
|
|
computer shows 10(4):16
|
|
computer threat 1(6):3
|
|
conferences 10(3):4
|
|
Congress--paranoia 10(3):4
|
|
CONSUS 6(1):7
|
|
cop watching 9(1):7
|
|
cordless phones 1(1):3, 6(2):22, 7(1):19
|
|
Cornwall, Hugo 4(2):4
|
|
corvis hacking 4(11):12(L)
|
|
COSMOS 2(2):8, 6(3):13, 4(2):6, 4(3):10, 2(12):82,
|
|
7(1):8
|
|
COSMOS--abbreviations 4(3):10
|
|
COSMOS--demise 6(3):13
|
|
COSMOS--documentation 4(2):6
|
|
COSMOS--history 4(3):10
|
|
COSNIX Operating System 4(2):6
|
|
Country codes 1(2):10, 3(7):53
|
|
couplers 9(2):4
|
|
court news 3(4):27, 2(4):21, 1(4):3, 1(6):3, 8(4):36,
|
|
1(5):3
|
|
covering tracks 4(7):6
|
|
covert radio broadcasts 4(11):7
|
|
CPA-1000 4(8):12(L)
|
|
credit card algorithms 7(3):42
|
|
credit files 10(1):42
|
|
Cross-Bar--oddities 3(3):20(L)
|
|
crypt preview 8(3):44
|
|
crypt() source code 8(4):11
|
|
current events 3(3):22
|
|
customs 8(2):35
|
|
"Cyberpunk" fictions 8(2):42
|
|
DAST 10(4):22
|
|
data transmission--quality 3(9):71
|
|
DCS 3(3):17
|
|
DEC-20--hacking 2(7):41
|
|
(DEC)PDP 3(4):25
|
|
Defense Communications Agency 5(1):24(L)
|
|
Defense Data Network listing 1(5):4
|
|
Denning, Dorthy 7(3):10
|
|
Department of Justice 9(2):22
|
|
deregulation 1(7):3
|
|
dial back security 3(2):10
|
|
Dialed Number Recorder--see DNR
|
|
dialer--demon 9(2):15
|
|
dialer programs 5(1):20
|
|
dialing * on rotary phones 3(12):96
|
|
dialup numbers 4(8):6
|
|
Dicicco, Lenny 8(2):42
|
|
digital lock combinations 10(4):38
|
|
Direct Analog Storage Technology...see DAST
|
|
direct dialing 4(3):8
|
|
directories 2(5):27, 3(12):95
|
|
Directory Assistance
|
|
--usage fees 1(2):9
|
|
Disney radio frequencies 9(1):17
|
|
divestiture 3(1):1
|
|
DMERT 10(2):4, 8(4):45
|
|
DMS 100 1(7):3(L), 10(4):10
|
|
DNIC (Data Network ID Codes) 7(1):40
|
|
DNR 7(3):16
|
|
DOCKMASTER break in 5(3):20
|
|
DoD 3(3):19
|
|
DSM 6(4):14
|
|
DSS1 10(3):36
|
|
DTMF dialers 8(3):43
|
|
DTMF decoder 7(1):14, 10(2):14
|
|
DTMF overview 9(2):10
|
|
dumpster diving 1(2):10, 2(2):8, 1(9):50
|
|
Duophone CPA-1000 4(5):22
|
|
Dutch hackers 8(3):4
|
|
E-Card 4(5):8
|
|
E-COM 1(6):3, 1(6):5
|
|
EASYnet 8(2):18
|
|
Electronic Freedom Foundation 7(2):10
|
|
Electronic Privacy Act 4(6):8, 4(4):8
|
|
electronic surveillance--NSA 2(12):83
|
|
email systems 1(12):71
|
|
Emergency Interrupts 4(12):10
|
|
encryption 3(4):31, 3(10):79, 2(1):3, 9(4):6
|
|
equal access 4(5):17(L), 4(3):6, 4(3):8, 4(12):20
|
|
errata for 4(9) 4(10):18
|
|
ESN 10(4):6, 10(1):4, 10(3):42, 4(7):4
|
|
espionage 2(3):15
|
|
#1ESS 7(4):12, 10(4):10
|
|
#4ESS 7(4):28(L)
|
|
#5ESS switch 10(2):4, 10(4):10, 8(4):45, 8(4):45
|
|
ESS 3(10):79, 1(2):8, 1(6):2, 6(1):25(L),
|
|
2(11):74, 1(7):3, 10(4):10
|
|
ESS Bust methods 1(7):3(L)
|
|
essay 2(12):81, 1(12):67, 7(4):32
|
|
European phone systems 4(5):9
|
|
exchanges 3(8):62
|
|
Falwell, Jerry 5(1):25, 5(2):39, 3(1):3
|
|
Farrell's Ice Cream-covered
|
|
narcs 1(8):45
|
|
fax taps 9(1):42
|
|
FAX 4(5):14
|
|
ftp tricks 8(3):14
|
|
FBI 3(11):83, 3(10):75, 3(9):67, 1(11):63,
|
|
9(2):22, 1(1):2, 4(8):9, 1(1):3
|
|
FCC 4(6):8, 3(9):71, 1(6):3
|
|
*features 8(4):31
|
|
Feds 9(2):38
|
|
feeder groups 5(3):4
|
|
fiber-optics laid
|
|
along rails 3(6):48(L)
|
|
finger monitor program 9(1):35
|
|
fingerprints 3(12):95
|
|
FM wireless transmitter--plans 8(4):44
|
|
fortress fones...see pay phones
|
|
Frame Room 7(4):12
|
|
France 2(12):83
|
|
gangs 7(4):36
|
|
GBS 4(10):4
|
|
GEISCO 2(1):3
|
|
general phone rants 4(1):20
|
|
Germany 2(12):87
|
|
Gore, Albert 5(1):26(L)
|
|
grade hacking 10(2):13, 10(4):15, 10(3):34, 6(4):45,
|
|
6(3):4
|
|
GTD#5 2(11):73
|
|
GTE--Telemail 1(1):3
|
|
GTE Telcos 6(3):33
|
|
Gulf War printer virus 8(4):39
|
|
"Hacker" 9(1):36
|
|
Hacker Con 6(3):10
|
|
The Hacker Crackdown 9(3)21
|
|
hacker morality 2(6):34
|
|
hacker scares 9(4):4
|
|
hacker sourcebooks 1(11):64(L)
|
|
hacker study 10(1):38
|
|
hacker video 8(3):14
|
|
Hacker's Handbook 4(2):15, 4(2):4
|
|
hackers credo 1(3):1, 9(4):17
|
|
hackers in hiding 8(3):24(L)
|
|
hacking beginnings 9(3):42
|
|
hacking history 5(1):16
|
|
hacking lore 8(4):16, 2(8):52, 5(1):24(L), 4(2):13(L)
|
|
hacking reading list 7(4):6
|
|
hacking recycling machines 1(2):9
|
|
hacking statistics 3(6):41
|
|
Hack-Tic 9(2):15
|
|
harmonica bug 2(9):58
|
|
HBO 3(10):75
|
|
Hess, Mark 7(1):45
|
|
high school hacking--news 1(3):3
|
|
history--phreaking UK 1(9):49
|
|
Hoffman, Abbie 4(1):4
|
|
--Obituary 6(2):3
|
|
Holland's hackers 2(4):21
|
|
home monitoring 1(4):2
|
|
honesty tests 10(3):20
|
|
HP2000--hacking 2(3):20
|
|
human database centers 8(4):46
|
|
humorous defense against
|
|
telco threats 2(2):10(L)
|
|
IBM 1(1):2
|
|
IBM's Audio Distribution
|
|
System 1(5):2
|
|
IC 1(11):65
|
|
ICLID 7(3):5
|
|
ICN 3(11):81
|
|
IMAS 4(10):4
|
|
IMTS 3(4):26, 3(12):89
|
|
In-Band Signaling 2(2):7
|
|
India 3(9):67
|
|
induction coil--plans 7(3):36
|
|
infinity transmitter 2(9):58
|
|
information manipulation 9(4):17
|
|
INSPECT 8(2):18
|
|
Intelpost 1(5):3
|
|
internet dialups 10(4):32
|
|
internet outdials 8(1):40
|
|
internet worm 5(4):4, 6(3):39
|
|
Interoffice Signalling 7(4):12
|
|
intro to hacking 2(6):40
|
|
IRS 3(2):15, 3(10):79, 2(1):3, 2(3):15, 2(6):35
|
|
ISDN 10(3):36, 8(1):42
|
|
Israel--phone system 2(6):33, 4(4):16
|
|
Israeli computer surveillance
|
|
of West Bank 4(12):8
|
|
Italian hackers 4(12):18
|
|
ITT 2100 switch 4(7):12(L)
|
|
ITT--boxing 3(5):38
|
|
I've fallen and I can't
|
|
get up 3(9):67
|
|
Jackson, Steve 10(2):45, 10(1):18
|
|
jail 10(4):4
|
|
JANET 4(9):4
|
|
Kenya 2(3):15
|
|
Kiev 3(6):47
|
|
KKK--racist BBS systems 2(1):3
|
|
Kranyak, Jack 3(5):34, 4(4):4
|
|
Landreth, Bill 4(9):12(L)
|
|
laptop tone generation 9(4):45
|
|
laptops 1(2):9, 9(2):4
|
|
LASS System 4(5):6
|
|
law enforcement--confiscation 2(8):54
|
|
LD Carriers 4(12):20
|
|
LD Fees 1(5):3
|
|
LEC 8(1):42
|
|
legalistic banter 2(1):4(L)
|
|
Legislative Network 7(4):4
|
|
letter sorting machines 8(3):32, 8(4):32
|
|
lineman's handset 10(1):14
|
|
LODCOM compilation review 10(3):19
|
|
loop number patterns 4(1):12(L), 1(9):52(L)
|
|
loop testing 6(3):20
|
|
magnetic card tricks 9(1):27, 8(4):40 (L), 8(2):7
|
|
mail drops 7(3):29 (L)
|
|
manholes 5(3):4, 7(4):12
|
|
Marcos 3(4):27
|
|
marine radio ch 26 7(1):19
|
|
Marquee 3(3):19
|
|
Max Headroom-Chicago style 4(12):8
|
|
MCI Mail--hacking 1(12):67, 1(7):2
|
|
MCI Numbers 1(4):5
|
|
MCI scam 5(4):10
|
|
MCI 6(1):36, 1(3):2, 8(2):16
|
|
media hype 8(3):4
|
|
merchant ship calls 2(6):36(L)
|
|
MF tones 2(3):16(L)
|
|
microwave links 1(3):2
|
|
MicoVAX 3(9):71
|
|
military computers 5(1):24 (L)
|
|
MILNet 2(7):45
|
|
MIN 4(7):4
|
|
Minitel 4(9):8, 9(4):8
|
|
missile systems 2(4):21
|
|
Mitnick, Kevin 7(1):3, 6(1):3, 6(3):14, 8(2):42
|
|
MIZAR 7(1):8
|
|
mobile hacking 9(2):4
|
|
mobile telephone freqs 6(3):24 (L), 8(4):18, 3(4):26
|
|
monitoring microwave 5(1):4
|
|
Morris, Robert 6(3):14, 6(4):6, 7(1):23
|
|
motivation--hackers 1(3):1
|
|
MTSO 3(12):89
|
|
MPOW 4(5):12(L)
|
|
narcs 9(2):38, 1(11):64(L)
|
|
National Coordinating Center 5(1):24 (L)
|
|
Navy 3(10):75
|
|
Nazi BBS 2(3):13
|
|
NCCCD 3(6):41
|
|
Neidorf, Craig 7(1):3, 7(2):4, 7(2):3, 7(2):8, 7(3):44,
|
|
8(4):36
|
|
neo-Nazi games 8(2):12
|
|
net addresses 2(4):23, 3(11):82
|
|
Network 2000 7(3):8
|
|
news 4(10):8, 5(1):37, 9(4):19, 4(11):8
|
|
new services 8(2):35
|
|
non-supervised phone lines 3(6):44(L)
|
|
Nothing New in
|
|
Computer Underground 3(6):42
|
|
NPA count 6(4):44
|
|
NSA 2(10):67, 1(9):51, 2(7):47, 1(10):57,
|
|
3(9):67, 5(3):20, 2(12):83, 3(10):79
|
|
NSA's Phone Number 2(3):16(L)
|
|
NUAs--international 4(10):10
|
|
nuclear free America 4(3):2
|
|
numbers 4(12):21, 5(2):44, 9(1):45
|
|
NY Tel 4(7):15
|
|
Nynex exchange addresses 10(4):18
|
|
NYNEX 8(2):11, 6(4):9, 6(3):36
|
|
NYNEX--Radio Frequencies 8(2):32
|
|
NYNEX--switch guide 6(4):9
|
|
obit--David Flory AKA Dan
|
|
Foley AKA The Shadow 6(2):45
|
|
--Abbey Hoffman 6(2):2
|
|
operating systems..see individual entries (e.g. VM/CMS, UNIX...)
|
|
operator humor 7(4):16
|
|
operator identification of
|
|
payphone 1(2):10(L)
|
|
operator service 4(9):6
|
|
operators 1(10):56
|
|
operators--social engineering 3(5):33
|
|
operators--USSR 5(4):30
|
|
ouch! 5(2):16
|
|
outages 8(2):35
|
|
outdial list 8(1):40, 8(2):44
|
|
"Out of the Inner Circle" 2(6):34
|
|
outside local loop
|
|
distribution plant 5(3):4
|
|
pagers--scanning 4(6):5
|
|
paranoia 1(7):3, 2(1):1, 3(5):39, 8(2):4, 2(8):50,
|
|
1(7):1, 9(4):4
|
|
parking summons 1(7):3
|
|
password grabber 3(8):60(L)
|
|
passwords 4(9):14, 8(1):36, 9(3):31, 4(8):10,
|
|
4(5):4
|
|
passwords--common 9(3):31
|
|
passwords--hacking IBMs 8(1):36
|
|
passwords--UNIX 8(1):31
|
|
pay phones 6(1):30, 1(11):62, 6(3):37, 1(2):10
|
|
pay phone--destruction 3(10):73
|
|
pay phone--dissection 3(10):73, 9(1):20
|
|
PBX trix 4(1):12(L)
|
|
PC Pursuit 2(9):58
|
|
PC Pursuit--hacking 4(4):6
|
|
PC-Pursuit--outdial list 8(2):44
|
|
PDP-11 2(11):73
|
|
Pen registers 3(2):11, 4(9):13, 4(12):12(L), 4(5):22
|
|
Pentagon 1(12):69
|
|
People Express 2(5):25
|
|
pet cemeteries 8(2):35
|
|
Phiber Optik 10(4):4
|
|
phone directories of the World 4(4):16
|
|
phone frequencies 5(4):19
|
|
phone interception 5(1):4
|
|
phone news 9(2):19
|
|
phone numbers 8(1):17
|
|
Phoenix Project 7(1):3
|
|
Phrack 7(1):3, 7(2):3, 7(2):4, 7(2):8, 8(1):11,
|
|
8(4):36, 9(2):22
|
|
phreak anticdotes 1(9):52
|
|
phreak history 2(11):80, 5(3):9
|
|
phreak typologies 2(3):13
|
|
phreaking overview 9(2):10
|
|
Pick operating system 3(6):42
|
|
pink noise 2(2):7
|
|
PINs 4(11):8
|
|
pirate radio 6(2):42
|
|
Pitcairn Island 2(9):59
|
|
PKZIP BBS hack method 9(1):12
|
|
plane phones 1(11):63
|
|
poetry 4(8):20, 4(3):4
|
|
police computers 2(5):27
|
|
police setups 3(4):30
|
|
police surveillance 1(8):44
|
|
political hacking 7(4):4
|
|
porn 2(6):35
|
|
postal paranoia 4(3):12(L), 1(4):20(L)
|
|
POSTNET 8(4):21, 8(3):32
|
|
PRIMOS 7(2):14, 6(2):4, 6(4):14
|
|
prison computers 8(4):5
|
|
prison phones 7(3):29(L), 9(4):13
|
|
prison update 8(2):46
|
|
privacy 1(5):3
|
|
Privacy Act of 1974 8(3):18
|
|
Private Sector BBS 2(8):49, 2(9):59, 3(1):1, 3(3):22, 3(4):30
|
|
Prodigy censorship 6(4):43(L)
|
|
Prodigy--STAGE.DAT conspiracy 8(3):26, 8(4):29(L), 8(1):19
|
|
product list 7(4):6
|
|
product review: Duophone
|
|
CPA-1000 4(5):22
|
|
Programs--Hacking IBMs 8(1):36
|
|
PRONTO 2(7):42
|
|
proto-phreak 5(3):9
|
|
PSAP 7(1):37
|
|
psychological makeups 8(3):38
|
|
psychobabble 7(3):44
|
|
Puerto Rico 3(10):76(L)
|
|
pyramid schemes 3(10):79, 4(6):4
|
|
radio scanners 6(2):22, 5(4):45
|
|
Raids...see busts
|
|
RC channel 10(2):4, 8(4):45
|
|
RCI 3(9):65
|
|
RCMAC 7(1):8
|
|
Reagan, Ron 2(5):27, 1(12):69, 3(11):83
|
|
REMOB (Remote
|
|
Observation) 5(1):27(L), 2(5):28(L), 6(3):32, 7(1):24(L),
|
|
2(9):60(L)
|
|
resources guide 3(6):46, 7(4):6
|
|
return call 9(2):31
|
|
The Rise of the Computer State 1(8):44
|
|
ROLM 6(3):24(L), 3(11):88(L)
|
|
ROLM CBX II 9000 5(1):30
|
|
Rose, Len 8(2):12, 8(1):11
|
|
routing codes 5(1):42
|
|
Royko, Mike 2(11):75
|
|
RS CPA-1000 4(5):22
|
|
RSTS 3(4):25, 2(11):73
|
|
Russian phone books 3(5):36(L)
|
|
Russian phone numbers 3(5):36(L)
|
|
SAC 5(3):4
|
|
Santa scam 6(1):36
|
|
SAT 10(1):4
|
|
satellite phone transmissions 4(11):7
|
|
satellite links 5(1):4
|
|
satellite jamming 3(3):23
|
|
satellites--hacking myths 2(8):52
|
|
Saudi Arabia 4(7):21, 3(10):80(L)
|
|
scams 7(4):22, 2(4):21
|
|
scanners 7(1):19
|
|
SCCs 7(1):8, 7(1):37
|
|
school records 10(2):13, 10(4):15, 10(3):34
|
|
scramblers 1(8):46(L), 3(4):29
|
|
secret frequencies 8(2):32
|
|
Secret Service 2(6):34, 9(4):4, 9(4):12, 9(2):38, 10(1):18,
|
|
10(1):43, 10(3):18
|
|
Secret Service--radio
|
|
frequencies 9(1):17
|
|
secured trunks 6(1):24(L)
|
|
sentry security 8(4):5
|
|
security 8(2):18, 7(3):10
|
|
Serving Area Interface 5(3):4
|
|
Sherwood Forest--busted 2(6):34
|
|
shortwave 3(9):67
|
|
$SHOW PROCESS/PRIV 4(1):6
|
|
Simplex corrections 8(4):21
|
|
Simplex lock location guide 9(1):38
|
|
Simplex locks 8(3):6
|
|
SL-1 Switch 3(9):68(L)
|
|
Smartphone hacking 10(4):11
|
|
"Sneakers" 9(3):17
|
|
social engineering 2(3):14, 2(4):19
|
|
Social Security Number
|
|
prefixes 4(11):6
|
|
South Africa 4(10):11
|
|
South African phreaks 6(2):24(L)
|
|
SouthWestern Bell 9(4):42
|
|
Soviet Union 8(1):16
|
|
Spain 6(2):36
|
|
Speech Thing: product review 9(4):45
|
|
spoofing VAX login 4(8):10
|
|
Springsteen 2(11):75
|
|
Sprint 6(2):34
|
|
spying on 2600 7(3):44
|
|
SS7 10(3):12
|
|
SSNs 3(7):51, 8(3):18
|
|
SSTs 7(1):12
|
|
Step Offices 1(5):1
|
|
Sterling, Bruce 9(3)21
|
|
Steve Jackson Games 10(1):23
|
|
Stasi 8(1):19
|
|
sting BBS's 3(6):44(L), 3(9):66
|
|
stings 3(5):39
|
|
Stoll, Cliff 7(1):45
|
|
Strowger, Almon 5(3):9
|
|
submarine cable maps 4(8):11
|
|
surveillance 3(12):95
|
|
survey 2(12):84, 4(8):15
|
|
Sweden's "Person Numbers"(ID) 1(3):3
|
|
SWITCH 8(1):42
|
|
switch guide 1(5):1, 7(4):12, 10(4):9, 10(4):10
|
|
switch overloading 3(12):91
|
|
switch-hook dialing 4(12):12(L)
|
|
switches...see specific switch
|
|
switching centers 1(10):56
|
|
switching routes 2(3):16(L)
|
|
switching systems 2(5):27
|
|
Sysops--protective measures 2(8):55
|
|
TAP 4(1):4, 6(2):43
|
|
taping payphone tones 7(3):36
|
|
telco info-fishing techniques 3(10):76(L)
|
|
telco nonsense 1(5):4, 9(3):36
|
|
telco offices 10(2):36
|
|
telco reneging 2(10):65
|
|
telco--fighting back 1(8):46
|
|
telco--assisting wiretaps 2(1):1
|
|
tele-harassment 3(2):10
|
|
Telecom 6(3):12, 3(8):58
|
|
Telecom debit cards 4(1):8
|
|
teleconferencing 2(5):26
|
|
teleconferencing--anticdotes 1(4):4
|
|
telemail--access 1(4):2
|
|
Telenet 3(6):47, 2(9):61, 4(6):9, 4(5):10, 3(11):84
|
|
(L), 1(2):7
|
|
telephone basics 1(8):43
|
|
telephone induction coil 7(3):36
|
|
Telstar 301 4(11):7
|
|
TELETEL Networks 9(4):8
|
|
"Terac" 5(1):24(L)
|
|
terminal locks 8(3):44
|
|
test channel 10(2):4, 8(4):45
|
|
test equipment--construction 8(2):14
|
|
test numbers 2(11):77
|
|
Thailand 2(6):39
|
|
Thought Police 1(8):44, 8(4):8, 1(12):68, 7(3):16
|
|
time service 2(4):21
|
|
TINA 2(6):39
|
|
toll fraud detection 7(1):12, 9(3):43
|
|
tone tracer construction 8(2):14
|
|
tone catcher 10(4):22
|
|
TOPS-10 2(1):2
|
|
TOPS-20 2(1):2
|
|
touch tones 3(12):91
|
|
touch-tone fees 4(10):6, 4(10):7, 4(2):18
|
|
trace procedures 3(1):4(L), 7(4):12
|
|
tracking devices 3(4):28(L)
|
|
trade magazines 4(6):13(L)
|
|
transaction codes 2(12):82
|
|
Trans-Pacific Cable 2(11):79
|
|
trap tracing--defeating 7(3):22
|
|
trashing 2(2):8, 1(2):10, 1(9):50, 3(10):73, 6(2):32
|
|
Travelnet 1(11):61
|
|
trojan 6(4):6, 5(2):4, 3(7):49
|
|
TRW 2(2):9, 4(8):4, 1(7):5, 10(1):42
|
|
TSPS 1(2):10, 2(1):4(L), 6(1):30, 1(11):62
|
|
TSPS Console 4(6):6
|
|
TVRO 5(1):4
|
|
UAPC 6(3):4, 6(4):45
|
|
UK Data Protection Act 10(2):12
|
|
UK Message List 4(9):10
|
|
UK Operator Numbers 3(8):58
|
|
Ultra Forward 9(2):31
|
|
unassigned area codes 5(3):10
|
|
UNIX--common accounts 9(3):31
|
|
UNIX--hacking 3(4):28(L), 3(8):57, 5(4):12, 6(3):28 (L),
|
|
6(4):4, 2(1):2
|
|
UNIX--password hacker 9(1):18, 8(1):31, 8(2):24(L)
|
|
USC--Phony Degrees 2(2):9
|
|
U.S. Military Telephone
|
|
Network 9(4):19
|
|
USPS 8(3):32, 8(4):32
|
|
USSR 2(4):21, 3(8):63, 5(4):30
|
|
UUCP 4(9):4
|
|
VAX 3(8):60(L), 4(5):4, 3(7):49, 2(9):57, 4(1):6
|
|
VAX--common accounts 9(3):31
|
|
VAX--worm 6(2):38
|
|
VMS 4(5):4
|
|
VDT 3(3):19
|
|
VDT operators 3(8):59
|
|
vehicle tracking monitors 1(1):3
|
|
verification 2(9):58, 4(12):10
|
|
VFY 4(12):10
|
|
video reviews 10(2):40
|
|
VINs 9(4):11
|
|
viri 5(2):4, 5(2):8, 6(3):14, 9(3):19
|
|
virus--Atari code 8(1):4
|
|
virus--batch virus 9(1):8
|
|
virus--Gulf War 8(4):39
|
|
virus--MSDOS (code) 9(1):4
|
|
virus "protection" 5(2):4, 9(1):9
|
|
virtual reality 10(4):37
|
|
Virtual Memory operating System--see VMS
|
|
VM/CMS 4(11):4, 4(12):4, 5(1):8
|
|
VM/CMS--acronyms 4(11):4
|
|
VM/CMS--filemodes 4(12:4
|
|
VM/CMS--password
|
|
characteristics 4(12):4
|
|
VM/CMS--privileged commands 4(12):4
|
|
voice mail hacking 6(3):36, 9(2):42
|
|
VMS 3(3):18, 3(8):60(L), 2(9):57, 3(2):9,
|
|
2(10):66, 3(7):52, 4(1):6, 2(1):2
|
|
VMS--UAF 2(10):66
|
|
VMS--common accounts 9(3):31
|
|
VMS--default passwords 3(7):52(L)
|
|
VR 3(9):71
|
|
WATS 5(3):23, 3(11):81, 1(9):52(L)
|
|
WATS directory 4(1):18(L), 4(4):21(L)
|
|
Weathertrak codes 5(1):15
|
|
Weendland, Mike 3(9):66
|
|
Western Union 4(7):6
|
|
Western Union EasyLink 1(12):67
|
|
White House phones 1(1):5 ,10(1):12
|
|
wild claims 6(4):30(L)
|
|
Winnipeg 3(9):69
|
|
wire fraud news 2(3):15
|
|
wireless modem 4(7):13(L)
|
|
wiretaps 1(4):3 2(6):35, 2(1):1, 7(3):30(L),
|
|
3(12):91, 1(11):63, 1(10):57, 2(9):58,
|
|
9(2):22
|
|
wiretaps--legalities 1(5):3
|
|
wiretaps--police 1(3):3
|
|
witch hunts 7(3):10
|
|
word numbers 4(4):15
|
|
world's most evil operator 1(7):3(L)
|
|
worms 5(2):4
|
|
worm--Ada 6(2):38
|
|
worm--internet 6(3):39
|
|
WWIV BBS--hacking 9(1):12
|
|
XY Step switching station 1(5):3(L)
|
|
YIPL...see TAP
|
|
yellow pages 3(3):23
|
|
yellow pages scam 2(5):27
|
|
Zinn, Herbert 6(1):3, 7(1):3
|
|
|
|
|
|
Title Index: 2600 Volume 1 - 10
|
|
David Price
|
|
|
|
The Title Index references all articles in 2600 THE HACKER
|
|
QUARTERLY from Volume 1 (1984) through Volume 10 (1993).
|
|
These articles are references using the following format:
|
|
V(N):P Where V = Volume, N = Number, and P = Page
|
|
|
|
EXAMPLE:
|
|
Building a Telephone Induction Coil 7(3):36
|
|
|
|
Thus the article in the above example is found in Volume 7,
|
|
Number Three, on page 36.
|
|
|
|
~ Denotes a "news" article
|
|
(L) Denotes a letter of note
|
|
|
|
------------2600 Title Index, Vol. 1 - Vol. 10-------------
|
|
|
|
1984 Arrives in Hong Kong~ 1(1):3
|
|
$2 Billion Error~ 2(7):43
|
|
22013664431--Call it! 3(3):22
|
|
2600 A Hacking Victim~ 2(8):51
|
|
2600 Bulletin Board Online 2(2):9
|
|
2600 Exposes New York Tel 4(7):15
|
|
2600 Information Bulletin 3(9):69
|
|
2600 Information Bureau 3(10):77
|
|
2600 Information Bureau 3(8):61
|
|
2600 Information Bureau 3(11):85
|
|
2600 Information Bureau 3(12):93
|
|
2600 Writer Indicted~ 1(6):3
|
|
411--News About Phone Companies~ 8(2):35
|
|
414 Bust~ 2(5):27
|
|
414's Plead Guilty~ 1(4):3
|
|
4TEL 6(3):20
|
|
$6,829 Phone Bill~ 3(6):43
|
|
617 Will be Divided~ 3(4):31
|
|
718 Is Coming~ 1(3):3
|
|
74,000 Calls to Fraud Line~ 3(7):55
|
|
800 Directories Now Available~ 1(8):45
|
|
800 Prefixes Listed by States 2(6):37
|
|
818 Here to Stay~ 1(11):63
|
|
911 Suspect Hung Up~ 1(10):57
|
|
A 414 is Sentenced--Other Indicted~ 1(5):3
|
|
A Batch Virus 9(1):8
|
|
A Bittersweet Victory 7(2):3
|
|
A Blast From the Past 9(4):33
|
|
A Challenge to Hackers~ 2(1):3
|
|
A Form of Protection For You & Your
|
|
Computer 5(2):4
|
|
A Friend in High Places 1(9):52
|
|
A Guide to PRIMOS 6(2):4
|
|
A Guide to the 5ESS 10(2):4
|
|
A Guide to the Israeli Phone System 2(6):33
|
|
A Guide to VMS 2(9):57
|
|
A Hacker Survey 4(8):15
|
|
A Hacker's Guide to the TSPS Console 4(6):6
|
|
A Hacker's Guide to UNIX 5(4):12
|
|
A Hacking Reading List 7(4):6
|
|
A Look at the Future Phreaking World:
|
|
Cellular Telephones--How They Work 3(12):89
|
|
A Mechanical Hacker~ 2(3):15
|
|
A Pen Register For Phreaks?: Product
|
|
Review--Dialed Number Recorder 4(5):22
|
|
A Phone Phreak Scores 2(4):19
|
|
A Political Hacking Scandal 7(4):4
|
|
A Reader's Reply to Captain Zap 5(2):16
|
|
A Report on the Internet Worm 5(4):4
|
|
A Review of "The 'Top Secret'Registry
|
|
of US Government Radio Frequencies" 4(11):7
|
|
A Simple Virus in C 9(3):19
|
|
A Story of Eavesdropping 3(4):29
|
|
A Study of Hackers 10(1):38
|
|
A Time For Reflection 1(12):67
|
|
A Trip to England 3(8):58
|
|
A True Saga of Teleconferencing 1(4):4
|
|
A Unique Obscene Caller~ 3(2):1
|
|
A Way To Catch Peepers 9(1):35
|
|
A Word on Wiretapping~ 1(4):3
|
|
Acoustic Trauma 3(2):15
|
|
Acronym List 2(2):11
|
|
Acronyms A-G 10(1):34
|
|
Acronyms H-R 10(2):20
|
|
Acronyms s-x (no y or z) 10(3):44
|
|
ADS Investigation Moved?~ 1(2):9
|
|
AHOY! 1(1):1
|
|
algorithm for credit cards correction 7(4):25
|
|
All About BLV: Busy Line Verification 4(12):10
|
|
Allnet's Legal Problems 5(2):2
|
|
Allnet: A Horror Story 4(6):4
|
|
Alternate Long Distance 1(3):2
|
|
American Network Fears Hackers~ 3(5):39
|
|
An Algorithm for Credit Cards 7(3):42
|
|
An American Express Phone Story 3(3):17
|
|
An Appeal For Help 8(4):36
|
|
An Interesting Diversion 2(10):65
|
|
An Interpretation of Computer Hacking 5(1):16
|
|
An Interview with Craig Neidorf 7(2):8
|
|
An Interview with Dorothy Denning 7(3):10
|
|
An Interview with Hugo Cornwall:
|
|
British Hacker/Author 4(2):4
|
|
An Interview With the Chaos Computer
|
|
Club 5(4):34
|
|
An Introduction to COCOTS 7(2):20
|
|
An MS-DOS Virus 9(1):4
|
|
An Official Crackdown on Hackers~ 1(7):3
|
|
An Overview of AUTOVON and Silver Boxes 3(3):17
|
|
An Overview of DSS1 10(3):36
|
|
ANALYSIS: Gulf War Printer Virus 8(4):39
|
|
Anatomy of a rip-off 7(4):22
|
|
And They Call US Crooks? 2(10):65
|
|
Another Astronomical Phone Bill~ 3(1):3
|
|
Another FBI Computer File~ 1(11):63
|
|
Another Hacker Story~ 1(9):51
|
|
Another Stinger Is Stung 3(9):66
|
|
ANSI Bomb 10(2):44
|
|
Are You a Phreak??? 2(3):13
|
|
ARPANET Hopping: America's Newest
|
|
Past time 1(6):1
|
|
ARPANet Military Subnets 1(3):5
|
|
At the Last Stroke...~ 2(4):21
|
|
AT&T Best For Hackers~ 3(9):71
|
|
AT&T Computer Caught Stealing~ 2(6):35
|
|
AT&T Contractual Obligations~ 2(6):39
|
|
AT&T Credit Cards Make Debut~ 1(1):3
|
|
AT&T Does it Again~ 3(1):3
|
|
AT&T Faces Serious Money Problems~ 1(9):51
|
|
"AT&T Keeps ""800"" Data To Itself~" 2(2):9
|
|
AT&T Limits Use of their Credit Cards~ 1(6):3
|
|
AT&T Offers E-Mail~ 2(12):87
|
|
AT&T Put On Hold~ 2(7):47
|
|
AT&T Selling Pay Phones~ 3(7):55
|
|
AT&T Sub Maps 4(8):11
|
|
AT&T to Read E-Mail~ 2(11):79
|
|
AT&T/BOC Routing Codes 5(1):42
|
|
ATM's in China~ 3(8):63
|
|
Automated Operators Coming~ 3(7):55
|
|
AUTOVON Numbers 3(5):37
|
|
Avoid Phones in Storms!~ 2(11):79
|
|
Bad Tenant Database~ 3(4):27
|
|
Bank Records Aren't So Private~ 1(5):3
|
|
Banking from your Terminal--A Look
|
|
at PRONTO 2(7):42
|
|
"BASIC ""Wargames Dialer Program" 5(1):20
|
|
BASIC Red Box Tones 5(3):22
|
|
BB Traffic Cop~ 3(9):67
|
|
BB Watching VDT Operators~ 3(8):59
|
|
BB Watching Without Regulation~ 2(12):83
|
|
BBS Listing 2(12):85
|
|
Be Nice to Your Telco 1(8):46
|
|
Beginner's Guide to Minitel 9(4):8
|
|
Beige Box Construction 10(1):14
|
|
Belcore's Plans for Caller ID 9(2):18
|
|
Bell Atlantic & MCI Collaborate~ 3(2):15
|
|
Bell Credit Card Abuse Soars~ 1(4):3
|
|
Bell Didn't Invent Phone?~ 2(6):35
|
|
Bell Propaganda Films~ 2(9):63
|
|
Bell to AT&T: Get Lost!~ 1(7):3
|
|
Bellcore Publications Go Public~ 3(5):36
|
|
Beware of Hacker Terrorists~ 3(5):39
|
|
Big Brother No longer Watching Miami~ 1(8):44
|
|
Big Computer Crime Pays~ 3(6):43
|
|
Big Deal for Little Town~ 2(11):75
|
|
BIN List 8(2):31
|
|
Birth of a Low Technology Hacker 8(4):16
|
|
BITnet Topology 2(1):6
|
|
Blue Box Schematic 2(10):69
|
|
Bogota, Columbia Gets Extra Digit~ 3(5):39
|
|
Book Review Nothing New in Computer
|
|
Underground by M. Harry 3(6):42
|
|
Book Review: "Automatic Teller
|
|
Machines III" 4(2):21
|
|
Book Review: "The Hacker's Handbook" 4(2):15
|
|
Book Review: Approaching Zero 10(3):38
|
|
Book Review: The Cuckoo's Egg 7(1):45
|
|
Book Review: The Devouring Fungus
|
|
(Tales of the Computer Age) 9(2):40
|
|
Book Review: Tune in on Telephone Calls
|
|
by Tom Kneitel 5(4):45
|
|
Book Review: Virtual Reality 10(4):37
|
|
BOXING ON ITT 3(5):38
|
|
British Credit Holes 10(2):12
|
|
British News 10(1):44
|
|
British Phonebooth Wedding~ 3(4):27
|
|
British Telecom: Guilty 6(3):12
|
|
Build A Tone Tracer 8(2):14
|
|
Building a DTMF Decoder 7(1):14
|
|
Building a Red Box 5(2):13
|
|
Building a Telephone Induction Coil 7(3):36
|
|
But How Does it Work? 1(8):43
|
|
Buy My Wires~ 3(12):95
|
|
Call Rejection in Natchez~ 3(9):71
|
|
Caller ID Technologies 10(3):12
|
|
Caller ID: The Facts 7(3):5
|
|
"Call Me" Card~ 2(6):39
|
|
Campaign Contributions On-Line~ 2(10):71
|
|
Capitol Hill Hacker~ 3(6):43
|
|
Capturing Passwords 4(8):10
|
|
Car Breathalizers~ 3(4):27
|
|
Carrier Access Codes 6(3):42
|
|
Carrier Choosing Time~ 2(5):27
|
|
Cash Machines Are Popular~ 3(8):63
|
|
Canadian WATS Phonebook 5(3):23
|
|
Cell Site Frequencies 4(1):10
|
|
Cellular Dial-By-Voice~ 3(7):55
|
|
Cellular Magic 10(1):4
|
|
Cellular Modem~ 3(5):35
|
|
Cellular Phone Biopsy 10(4):6
|
|
Cellular Phone Fraud and Where It's
|
|
Headed 4(7):4
|
|
Cellular Phones in England 3(2):15
|
|
Cellular Update 5(3):8
|
|
Central Office Operations 7(4):12
|
|
Changing Your Grades on A High
|
|
School Computer 10(3):34
|
|
Chinese Snitch Numbers 6(2):35
|
|
Cipher Fun 9(4):6
|
|
CIS Copyrights Public Software~ 3(10):75
|
|
Citybank Money Games~ 3(6):43
|
|
Cityphone Has the Answer~ 2(12):83
|
|
Class Features 8(4):31
|
|
CLASS: What It Means To Us 4(5):6
|
|
CNA Numbers 4(4):10
|
|
CNAs 2(3):18
|
|
COCOT Corner 8(4):33
|
|
COCOT Numbers 8(3):22
|
|
Columnist Attacks AT&T~ 2(11):75
|
|
Commentary: The Threat to Us All 2(8):50
|
|
Competition...It's the next best
|
|
thing to being there 6(3):3
|
|
Computel Does Exist~ 2(3):15
|
|
Computel Put to Sleep 4(4):4
|
|
Computer Clothing 3(9):71
|
|
Computer College 3(11):87
|
|
Computer Crime Resources Guide 3(6):46
|
|
Computer Crime Review 3(6):41
|
|
Computer Elections Examined~ 2(10):67
|
|
Computer Foul-ups Hurt Social Security~ 1(11):63
|
|
Computer Grammar~ 3(5):35
|
|
Computer Makes it Easy for Reagan~ 1(12):69
|
|
Computer Password Kept Secret 3(3):19
|
|
Computer Security at the Bureau of
|
|
Prisons 8(4):5
|
|
Computer Threat Causes Chaos in Albany~ 1(6):3
|
|
Computers Monitor Truckers~ 2(7):43
|
|
Computers Seized as Summer Games Begin~ 1(8):45
|
|
Computers Strike Again!~ 3(7):51
|
|
Computers Threaten Privacy~ 3(12):91
|
|
Congress Chooses AT&T~ 3(4):31
|
|
Congress Takes a Holiday 10(3):4
|
|
Congressional Computer~ 3(5):35
|
|
Converting a Tone Dialer into a Red Box 7(3):32
|
|
Count of Exchanges per Area Code 3(8):62
|
|
Country Codes 1(2):10
|
|
Country Codes 3(7):53
|
|
"Crackers" Cracked~ 2(5):27
|
|
Crosstalk Saves Old Lady~ 3(9):67
|
|
Crypt() Source Code 8(4):11
|
|
Data Network Identification Codes 7(1):40
|
|
Death of a Pay Phone 3(10):73
|
|
Death of NYNEX Business Centers 8(2):11
|
|
Death Star Cards Spell Woe~ 1(2):9
|
|
"Debugging" Phones~ 3(8):63
|
|
Decrypting Password Security 4(9):14
|
|
Defeating Callback Verification 9(3):9
|
|
Defeating Trap Tracing 7(3):22
|
|
Defense Data Network Listing 1(5):4
|
|
Descrambling Cable 10(1):16
|
|
"Dial ""00"" For Operator~" 3(4):31
|
|
Dial Back Security 3(2):10
|
|
Dial the Yellow Pages~ 3(3):23
|
|
Dial-a-Directory~ 2(5):27
|
|
Dial-A-Porn Update~ 3(1):3
|
|
Dial-it Sex Numbers Argued~ 2(11):75
|
|
Dick Tracey Toys Are Closing In~ 2(9):63
|
|
Did You Know? 4(7):17
|
|
Digital Locks 10(4):38
|
|
Directory Assistance By Computer~ 2(9):63
|
|
Directory Assistance Failure~ 3(4):31
|
|
Dreams of GEnie~ 2(12):87
|
|
E-COM is Going Away~ 1(6):3
|
|
E-COM Number List 1(6):5
|
|
E-COM Really on the Way~ 2(7):47
|
|
"Ed Quinn Cell Site"~ 3(6):47
|
|
E-Mail Horror Stories 1(12):68
|
|
E-Mail Listings 1(12):71
|
|
Electronic Jail All Screwed UP~ 1(12):69
|
|
Electronic Switching Advantages 1(6):2
|
|
Electronic Tax Returns Are Here 3(2):15
|
|
Electronic Tax Returns~ 3(10):79
|
|
Electronics Create Portable Prisons~ 1(4):2
|
|
Elementary Switching 10(4):9
|
|
Encryption Provides Signature~ 3(4):31
|
|
England's Mass Announcements 4(9):10
|
|
Equal Access 800 Drawbacks~ 3(4):31
|
|
Equal Access May Not be "Equal"
|
|
to Modems 2(11):74
|
|
ESS Goes To Taiwan 3(10):79
|
|
ESS: Orwell's Prophecy 1(2):8
|
|
Europe Standardizing Telecoms~ 2(9):63
|
|
Ever Wonder Who Owns All Those
|
|
800 Numbers? 6(1):12
|
|
Ex-Fed Tapped 3(7):51
|
|
Exchange List: 201 Area Code 6(2):20
|
|
Exploits in Operator Hell 3(5):33
|
|
Exploring Caves in Travelnet 1(11):61
|
|
Facts and Rumors 7(3):44
|
|
Fascinating fone fun 9(1):45
|
|
Fascist Computer Network~ 2(1):3
|
|
Fawcett Phone Bill Too Big~ 2(12):83
|
|
FAX: A New Hobby 4(5):14
|
|
FBI Actions Anger Parents 3(11):83
|
|
FBI Goes After ADS Hackers 1(1):2
|
|
FBI Investigates Coffee Machine~ 3(10):75
|
|
FBI Revealed: Reviews--The FBI Project
|
|
Newsletter & The FBI and Your BBS 4(8):9
|
|
FBI Shopping List~ 3(9):67
|
|
FCC Actions~ 1(6):3
|
|
FCC Gives Away "Resource" 3(9):71
|
|
Federal Employees "Tracked"~ 3(7):51
|
|
Federal Express Offers "E-Mail"~ 1(8):45
|
|
Federal Phone Failures~ 3(7):55
|
|
Federal Telephone System Upgrade~ 1(12):69
|
|
Feedback 9(4):26
|
|
Fiber-Optic Network For Du Pont~ 2(10):71
|
|
Final Words on VMS 3(3):18
|
|
Fingerprint Identification System~ 3(12):95
|
|
First of the "Superminin"~ 1(12):69
|
|
Five Aliens Hung Up~ 3(1):3
|
|
Five Arrested in Phone Fraud~ 1(7):7
|
|
FM Telephone Transmitter 8(4):45
|
|
FM Wireless Transmitter 8(4):44
|
|
For Your Protection 7(1):3
|
|
Fraud Alert 7(4):43
|
|
Free Directories For Bigwigs~ 3(12):95
|
|
Free Information in Trouble~ 1(4):3
|
|
Free Kiddie Dial-It Calls~ 2(11):79
|
|
Free Pay-Phones Plague New Jersey~ 3(5):39
|
|
French Phones Renumbered~ 2(12):83
|
|
From Sherwood Forest: Intro to Hacking 2(6):40
|
|
From the 2600 Files 5(1):22
|
|
Fun and Games at a 2600 Meeting 7(1):38
|
|
Fun Phone Numbers 5(2):44
|
|
Fun Things to Know 9(2):19
|
|
Fun With COSMOS 2(12):82
|
|
Fun With Fortress Fones 1(11):62
|
|
Gee...GTE Telcos 6(3):33
|
|
GEISCO's New Toy~ 2(1):3
|
|
General Information 6(1):7
|
|
German Phone System Stagnant~ 2(12):87
|
|
Getting Caught: Hacker's View 1(10):55
|
|
Getting In The Back Door: A Guide to
|
|
Some Popular Operating Systems 2(1):2
|
|
Getting Started 9(3):42
|
|
Getting the Most Out of Equal Access 4(3):6
|
|
Getting Your File... 10(1):42
|
|
Goings On 4(4):16
|
|
Good Apples for the Soviets~ 2(4):21
|
|
Government Bulletin Boards 10(2):39
|
|
Government Phone Fate?~ 3(8):63
|
|
"Grade ""A"" Hacking" 6(3):4
|
|
Growth of a Low Tech Hacker 9(4):17
|
|
GTE Hit by Divestiture~ 2(1):3
|
|
GTE Now Bigger than AT&T~ 2(7):47
|
|
GTE Raids Still Have Many Unanswered
|
|
Questions~ 1(1):3
|
|
GTE Sprint Cheats Customers~ 2(7):43
|
|
GTE Sprint Overbills~ 3(9):71
|
|
Hacker Extortionist Caught~ 2(9):59
|
|
Hacker News~ 8(2):12
|
|
Hacker Zaps Computer Marquee~ 3(3):19
|
|
Hackers Degree?~ 3(7):51
|
|
Hackers Go Free~ 2(4):21
|
|
Hackers Have Big Business Scared~ 2(10):71
|
|
Hackers In Jail 6(1):3
|
|
Hackers in Jail, Part Two 10(4):4
|
|
Hackers in the World of Malls: Secret
|
|
Service Behind Harassment of 2600
|
|
Meetings 9(4):4
|
|
Hackers on Shortwave~ 3(9):67
|
|
Hacking AmiExpress 9(3):4
|
|
Hacking at the End of The Universe 10(3):4
|
|
Hacking Computer Shows 10(4):16
|
|
Hacking IBM's VM/CMS 4(11):4
|
|
Hacking IBM's VM/CMS--Part Two 4(12):4
|
|
Hacking MCIMAX 8(2):16
|
|
Hacking on Telenet: It's as Easy
|
|
as 123456! 1(2):7
|
|
Hacking on the Front Line 9(3):31
|
|
Hacking Packard 2(3):20
|
|
Hacking PC Pursuit 4(4):6
|
|
Hacking Smartphone 10(4):11
|
|
Hacking WWIV 9(1):12
|
|
Hands Across Telenet~ 3(6):47
|
|
Happenings 5(1):37
|
|
Hardwiring Your Way In 5(4):42
|
|
HBO Encryption Broken~ 3(10):75
|
|
Here They Are 9(2):24
|
|
Here We Go Again 9(2):22
|
|
Here's the Secret! 2(11):73
|
|
High School Hacking 10(2):13
|
|
High School Mac Hack 10(4):15
|
|
High Tech Happenings 9(4):19
|
|
High Tech Parking Meters~~ 3(5):35
|
|
History of British Phreaking 1(9):49
|
|
Hitchhiker Guide to the Phone System
|
|
Phreaking in the Nineties 9(2):10
|
|
Home Computer Attacks Falwell~ 3(1):3
|
|
House: Hacking is Bad~ 1(8):45
|
|
How Can Sysops Protect Themselves? 2(8):55
|
|
How Cellular Phones Came About and What
|
|
You Can Expect 3(11):90
|
|
How Not to be Rejected~ 3(12):91
|
|
How Payphones Really Work 6(1):30
|
|
How Phone Phreaks are Caught 4(7):6
|
|
How the Defeat *69 9(2):31
|
|
How to Build a Silver Box 6(4):20
|
|
How to Get into a C.O. 2(3):14
|
|
How to Hack A Pick 3(6):42
|
|
How to Hack Honesty 10(3):20
|
|
How to Hear Phone Calls 5(4):19
|
|
How to Run a Successful Teleconference 2(5):26
|
|
How to Take Apart A Payphone 9(1):20
|
|
How to Use Your Silver Box 9(1):16
|
|
Human Database Centers 8(4):46
|
|
I.R.S. Computers Screw Up~ 2(3):15
|
|
IBM ADS Directory 1(9):53
|
|
IBM Braille Compatible~ 3(12):95
|
|
IBM Gets Bigger/Goodbye SBS~ 2(7):47
|
|
IBM's Audio Distribution Systems Sure
|
|
Can Be Fun! 1(5):2
|
|
IC and CIC Listing 1(11):65
|
|
Ice Cream Chain Aides Selective Service~1(8):45
|
|
ICN--More than a Bargain 3(11):81
|
|
Important News~ 4(12):3
|
|
In Pursuit of Knowledge: An Atari 520ST
|
|
Virus 8(1):4
|
|
Indian Phones Under Siege~ 3(9):67
|
|
"Indiana ""Fones"" Are Gone" 3(10):75
|
|
Indiana Telco Threatens AT&T~ 3(7):55
|
|
Industrial Espionage Seminar~ 2(3):15
|
|
Infrared Beeper Will Find You 3(2):15
|
|
Inmates Handle Information Calls~ 2(12):83
|
|
Inspect Implementation 8(2):18
|
|
Intelpost an Astronomical Failure~ 1(5):3
|
|
Interesting Things to do on a DEC-20 2(7):41
|
|
International Hacking~ 3(12):91
|
|
International NUA's 4(10):10
|
|
Internet Outdials 8(1):40
|
|
Introducing the Clear Box! 1(7):4
|
|
IRS Drives Telco to Drink~ 2(6):35
|
|
IRS Wants Access to Telco Data~ 2(1):3
|
|
Is AT&T Hiding Near You? 9(4):36
|
|
It Could Happen to You! 3(2):10
|
|
ITT Crackdown~ 2(7):43
|
|
ITT Wiping Out Fee~ 1(8):45
|
|
Jersey Wins Wiretap Race Again~ 2(6):35
|
|
Kenya Pay Phones Prove Popular~ 2(3):15
|
|
Kiev Calling Clogged~ 3(6):47
|
|
Know Your Switch 10(4):10
|
|
Knowing UNIX 3(8):57
|
|
L.A. Law 9(1):7
|
|
Lair of the INTERNET Worm 6(3):39
|
|
Lawsuit Filed Against Secret Service 10(1):43
|
|
LD Companies Strike Back~ 3(8):59
|
|
Leaked Documents 7(4):16
|
|
Leave Our Poles Alone!~ 3(8):59
|
|
Let's Move to France!~ 3(6):47
|
|
Letter From Prison 9(4):13
|
|
Listening In 7(1):19
|
|
Listening In On Cellular Phones~ 2(7):43
|
|
Listening In: Catch Me if you Can! 4(11):7
|
|
Local Toll-Free Numbers~ 3(10):79
|
|
Long Distance Option Timtable~ 1(5):3
|
|
Look Out For Sidney~ 1(7):3
|
|
"Look Out, He's Got A Computer!" 1(7):1
|
|
Looking for Simplex Locks? 9(1):38
|
|
Looking Up IBM Passwords 8(1):36
|
|
Loophole in Wiretap Law 3(12):91
|
|
Loopholes Around Wiretap Laws~ 1(10):57
|
|
Magnetic Strips 8(2):7
|
|
Man Worries About Sprint Bill~ 3(4):27
|
|
Marcos Phones For Free~ 3(4):27
|
|
Mastering the Networks 3(11):82
|
|
MCI Access Numbers & Mail Numbers 1(4):5
|
|
MCI Expanding With Optical Fibers~ 2(7):47
|
|
MCI Goes to U.K.~ 2(5):27
|
|
MCI Mail & Western Union EasyLink 1(12):67
|
|
MCI Mail: The Adventure Continues 1(7):2
|
|
MCI: The Phone Company With A Lot of
|
|
Explaining To Do 5(4):10
|
|
Meeting Advice 10(2):16
|
|
Meeting Advice 10(2):17
|
|
Meeting Mania 10(3):18
|
|
Messages on the Move~ 3(9):71
|
|
MILNET TAC Dialups by Location 2(7):45
|
|
Missing Children's Faces Displayed~ 2(7):43
|
|
Mobile Frequencies 8(4):18
|
|
Mobile Phones--Theory and Construction 3(4):26
|
|
Monitoring Phone Calls With A TVRO 5(1):4
|
|
More Banks Link Arms~ 3(11):87
|
|
More Cellular Fun 10(3):42
|
|
More Conversion Tricks 8(3):43
|
|
More Divestiture Woes~ 2(10):71
|
|
More Hacking on Primos 6(4):14
|
|
More Info on VMS 2(10):66
|
|
More Long Distance Unpleasantries 4(12):20
|
|
More Magic Buttons~ 3(11):87
|
|
More Meeting Advice 10(4):35
|
|
More On Hacking UNIX 6(4):4
|
|
More on Trashing: What to Look for,
|
|
How to Act, Where to Go 1(9):50
|
|
More PC Jr's., Less Z-100's for Soviets~1(8):45
|
|
More Phone Fraud~ 2(7):43
|
|
More Telenet Addresses 4(6):9
|
|
More Use of Phone Computers~ 2(10):71
|
|
More VAX Tricks 4(5):4
|
|
Moving Satellites Right Up In the Blue
|
|
...What Was Really Going On? 2(8):52
|
|
Mystery Transistor~ 2(5):27
|
|
Navigate With a CD~ 3(12):95
|
|
Navy Calls Dial-A-Porn~ 2(10):67
|
|
Navy Phone Phreaks Nabbed~ 2(10):67
|
|
Navy Software Available~ 3(10):75
|
|
Nazi BBS a Challenge to Hackers 2(3):13
|
|
Negative Feedback 7(2):11
|
|
Net Addresses 2(4):23
|
|
Network 2000 Saga Continues 7(3):8
|
|
Never Erase the Past 10(3):19
|
|
New British Phone Service~ 3(7):55
|
|
New Chip Helps Sprint~ 3(8):63
|
|
New Developments 4(2):18
|
|
New Jersey Tops Taps~ 3(7):51
|
|
New Payphone Service for Michigan~ 3(11):87
|
|
New Payphones Confuse Callers~ 3(1):7
|
|
New Phone System for Courthouse~ 2(8):51
|
|
New Revelations From Bell South 7(3):16
|
|
New Tracking Device For Cars~ 2(6):39
|
|
New VAX Announced~ 3(1):7
|
|
New Ways of Stealing Data~ 3(3):19
|
|
New York's Computer Law~ 3(6):43
|
|
New York's IMAS 4(10):4
|
|
News Roundup~ 10(4):42
|
|
News Update ~ 10(2):45
|
|
News Update~ 7(2):38
|
|
News Update~ 7(1):23
|
|
News~ 6(3):14
|
|
Nickname Listings In Small Town~ 3(11):87
|
|
No Data Protection for Hong Kong~ 3(7):55
|
|
No Dial-it Calls For Feds~ 2(11):75
|
|
No Hacking While Flying, Please~ 1(2):9
|
|
No More Free Info~ 1(6):3
|
|
No More Redialing?~ 2(12):83
|
|
North Carolina #1 in Hacking 3(12):91
|
|
Northern To Destroy COs 3(3):23
|
|
NPA Countdown 6(4):44
|
|
NSA Chooses AT&T Computer~ 2(7):47
|
|
NSA Doesn't Feel Secure~ 1(9):51
|
|
NSA Drops DES~ 3(9):67
|
|
NSA Memo 5(3):20
|
|
NSA Wants a New Chip 3(10):79
|
|
NSA Wants Better Phones~ 1(10):57
|
|
Numbers 3(2):13
|
|
Numbers of Interest 4(8):6
|
|
Numbers...Long Since Changed 3(6):45
|
|
Nynex Bumps Southwestern Bell~ 3(6):47
|
|
NYNEX Data 6(4):9
|
|
Nynex Voice Mail 10(4):18
|
|
Oh No, Not Again!~ 1(10):57
|
|
On The Road Again: Portable Hacking 9(2):4
|
|
One Angry Judge 10(1):23
|
|
One We Somehow Missed~ 1(11):63
|
|
Operating With Difficulty 4(9):6
|
|
Our Contest Winners 7(4):32
|
|
Our Ever-Changing World~ 6(4):6
|
|
Our Wishes For '86 and Beyond 2(12):81
|
|
Out of the Inner Circle--A Review 2(6):34
|
|
Outdials 8(2):44
|
|
Outside Loop Distribution Plant, or
|
|
Hands-On Experience 5(3):4
|
|
Overcharge Hunters Needed 3(1):3
|
|
Overseas Pirates~ 2(4):21
|
|
Pacific Cable Planned~ 2(11):79
|
|
Paging For Free 4(6):5
|
|
Passageways to the Internet 10(4):32
|
|
Patients May Get to Keep Phones~ 3(5):39
|
|
Pay Phone Causes Panic~ 3(2):11
|
|
Pay Telephones Deregulated~ 1(7):3
|
|
PC Pictures~ 3(12):95
|
|
Penetrating the Pentagon by Phone~ 1(12):69
|
|
Pennant Ties Up Phones 3(10):75
|
|
People Express to be Hacked to Pieces 2(5):25
|
|
Pest Control~ 2(9):63
|
|
Phone Booth Captures Man~ 2(10):67
|
|
Phone Booth Wins Again~ 3(1):3
|
|
Phone Booths Mauled The Stolen~ 3(8):59
|
|
Phone Fraud in Governor's House~ 3(8):59
|
|
Phone Numbers Supplied by Readers 8(1):17
|
|
Phone Phreak Fined~ 3(4):27
|
|
Phone Service Via Radio Shack~ 3(1):3
|
|
Phone-in Registration for College~ 2(9):59
|
|
Phones 4(1):20
|
|
Phones at High and Low Speeds~ 2(12):87
|
|
Phones in the Sky~ 1(11):63
|
|
Phoning Home From Europe 4(5):9
|
|
Phreak Roundups~ 2(2):9
|
|
Phreaks Tie Up Lines~ 3(12):91
|
|
Pitcairn Island Now On AT&T Net~ 2(9):59
|
|
Police Dept. Wants Cellular Phones~ 2(11):79
|
|
Police Hacker Cleared~ 2(5):27
|
|
Poor Connection Starts Bomb Scare~ 3(9):67
|
|
Poor Service An Understatement~ 3(10):79
|
|
Porno Phone Service Busted~ 2(6):35
|
|
Portable VAXes!!! 3(9):71
|
|
PRIMOS: The Final Part 7(2):14
|
|
Prisoner Update 8(2):46
|
|
Prisoners Break Law~ 3(7):51
|
|
Private Directories Soon to be
|
|
Available~ 1(9):51
|
|
Private Sector Returning 3(1):1
|
|
Private Sector Update~ 2(9):59
|
|
Problems for New Pay Phones~ 2(6):39
|
|
Product Review: Do It Yourself Demon
|
|
Dialer Kit (Hack-Tic Technologies) 9(2):15
|
|
Product Review: Speech Thing 9(4):45
|
|
Product Review: TDD-8 DTMF Decoder 10(2):14
|
|
Programs in BASIC 3(1):5
|
|
Protecting Your SSN 8(3):18
|
|
Psychology in the Hacker World 8(3):38
|
|
Public Phone Secrecy~ 3(6):43
|
|
Punching Pay Phones 6(3):37
|
|
Pure Cyberfiction, Says Mitnick 8(2):42
|
|
Pursuit For People 2(9):58
|
|
Q & A 1(2):10
|
|
"Q" and "Z" Controversy Rages~ 3(11):83
|
|
RCI & DMS-100 Bugs 3(9):65
|
|
Reach Out and Touch a Nuclear Weapons
|
|
Contractor 4(3):2
|
|
Reaching Out On Your Own 2(9):58
|
|
Reagan Hangs Up on Kids~ 2(5):27
|
|
Real Important Frequencies 9(1):17
|
|
Real Life War Games?~ 2(4):21
|
|
Redemption for a Hacker~ 2(3):15
|
|
Remember.... 6(2):3
|
|
REMOBS 6(3):32
|
|
Reporters Steal Swiss Phones~ 3(2):11
|
|
Review: CO Magazine 4(9):22
|
|
Review: Hacker: The Computer Crime
|
|
Card Game 9(1):36
|
|
Review: Sneakers 9(3):17
|
|
Review: The Hacker Crackdown 9(3)21
|
|
Reviews: The 1989 Pirate Directory 6(2):42
|
|
Ripoffs & Scams~ 6(1):36
|
|
Robot Kills Man~ 2(4):21
|
|
ROLM Phone System Creates a Nightmare 5(1):30
|
|
Roman Hackers 4(12):18
|
|
RSTS For Beginners 3(4):25
|
|
RSTS: A Trick Or Two 2(11):73
|
|
Rural Customers Denied Access~ 2(11):79
|
|
Rural Radio Phones~ 3(8):63
|
|
Rural Ultraphones~ 3(10):79
|
|
'Santa Fraud'~ 2(4):21
|
|
Satellite Jamers Jammed~ 3(3):23
|
|
Saudi Arabian BBS List 4(7):21
|
|
Say Goodbye to Meter Readers~ 2(6):39
|
|
SBS Offers Toll-Free Service~ 1(12):69
|
|
Scanning For Calls 6(2):22
|
|
Sears Satellite Network~ 1(10):57
|
|
Secret Frequencies 8(2):32
|
|
Secret Service on Trial 10(1):18
|
|
Security Can Kill Creativity 3(10):75
|
|
Security Numbers 1(10):59
|
|
Security Software~ 3(1):7
|
|
SEIZED! 2600 Bulletin Board is
|
|
Implicated in Raid on Jersey Hackers 2(8):49
|
|
Sherwood Forest Shut Down by
|
|
Secret Service 2(6):34
|
|
Shopper's Guide to COCOTS 9(3):13
|
|
Shower Phone?~ 3(5):35
|
|
"Signature" On Video Transmitters~ 3(9):67
|
|
Silver Box Born in U.K. 7(1):19
|
|
Silver Pages~ 2(4):21
|
|
Simplex Locks 8(3):6
|
|
Simplex Update and Corrections 8(4):21
|
|
Social Interaction with Phones 4(12):17
|
|
Software Makers Crash BBS~ 3(10):79
|
|
Some Cosmos Documentation That May Be
|
|
Useful 4(2):6
|
|
Some Facts on Supervision 3(9):65
|
|
Some Numbers 4(12):21
|
|
Some Thoughts on "Garbage Picking" 1(2):10
|
|
Some Words on Hacker Morality 2(6):34
|
|
South African BBS's 4(10):11
|
|
Soviet BBS List 8(1):16
|
|
Soviet Computer Update~ 3(3):23
|
|
Soviets Denied Computer Access~ 3(3):19
|
|
Spanish Phones--and what they don't do 6(2):36
|
|
Springsteen Mania~ 2(11):75
|
|
Sprint Unites with US Telcom~ 3(2):15
|
|
Sprint--Too Many Customers~ 3(11):87
|
|
SS Number Returned to Citizens~ 3(7):51
|
|
Still More on the World of COSMOS 4(3):10
|
|
Sting Boards on the Rise~ 3(5):39
|
|
Stock Market Crash~ 3(6):47
|
|
Students Bog Down Computer~ 1(12):69
|
|
Students Cause Havoc on Computer~ 1(3):3
|
|
Stuff You Should Be Interested In~ 8(4):8
|
|
Stumbling into Control on a VMS 4(1):6
|
|
Super Crisis Alert System~ 2(12):87
|
|
Super Pay Phone~ 2(12):87
|
|
Supercomputer Dialups~ 1(3):3
|
|
Survey Results 2(12):84
|
|
Surveying the COSMOS 2(2):8
|
|
TAP: The Legend is Dead 4(1):4
|
|
TASS News Service~ 3(3):23
|
|
Technology Nabs Hooky Players~ 3(1):3
|
|
Teelco Rats On Government~ 2(10):67
|
|
Teenagers Abuse "Party Line~" 3(2):11
|
|
Telco News 9(4):42
|
|
Telco Offices 10(2):36
|
|
Telco Response 4(10):6
|
|
Telco Sasys "Pay for Tones"~ 3(12):91
|
|
Telco Service Spawns Racist Banter~ 2(12):83
|
|
Telenet Addresses 4(5):10
|
|
Telenet Directory 2(9):61
|
|
Telenet Letter 4(8):16
|
|
Telephone Company Responds to Criticism
|
|
of Touch-tone Fees 4(10):7
|
|
Teller Machine Crime Coming~ 1(4):3
|
|
Test Numbers 2(11):77
|
|
Thai Phone Books a Hot Issue~ 2(6):39
|
|
The 516 Area Code in Detail 5(3):14
|
|
The 707 Area Code 7(1):44
|
|
The Australian Phone System 9(1):31
|
|
The Ballad of Captain Crunch 4(3):4
|
|
The Basics: Divestiture: What Happened? 3(1):1
|
|
The Class Struggle 8(2):22
|
|
The Cold Truth 4(8):20
|
|
The Computel Scoop 3(5):34
|
|
The Constitution of a Hacker 1(3):1
|
|
The Dark Side of the Great Break-Up 1(6):4
|
|
The Dark Side of Viruses 5(2):8
|
|
The Day the Phone System REALLY Died 6(4):4
|
|
The Death of COSMOS? 6(3):13
|
|
The Definitive ANAC Guide 7(3):39
|
|
The Early Phreak Days 2(11):80
|
|
The Facts on 10698 7(1):30
|
|
The First 100% ESS State~ 2(7):47
|
|
The First Atomic Bomb 1(3):4
|
|
The Free Phones of Philly 3(7):50
|
|
The Galactic Hacker Party 6(3):10
|
|
The Ghost in the Machine~ 3(8):59
|
|
The Hacker "Threat" 9(4):19
|
|
The Hacker Video 8(3):14
|
|
The Hackers Guide to Area Code 1(8):47
|
|
The History of ESS 2(11):74
|
|
The Infinity Transmitter--An Old Bug
|
|
that Had Its Time 2(9):58
|
|
The Latest~ 9(1):42
|
|
The Magical Tone Box 10(4):22
|
|
The Neidorf/Phrack Trial: Day by Day 7(2):4
|
|
The New "TAP" 6(2):43
|
|
The New LEC Order: Acronym City 8(1):42
|
|
The Next Step in Custom Calling~ 2(3):15
|
|
The Person Numbers~ 1(3):3
|
|
The Rise of the Computer State by David
|
|
Burnham Book Review 1(8):44
|
|
The Scariest Number in the World 1(12):68
|
|
The Scoop on 911 7(1):37
|
|
The Scoop on Pen Registers~ 3(2):11
|
|
The Secrets of Mizar 7(1):8
|
|
The Simple Pleasures of a Step Office 1(5):1
|
|
The Sprint Gestapo Strikes Again! 6(2):34
|
|
The Summer Games of 87 4(8):3
|
|
The Telecom Informer 4(10):8
|
|
The Telecom Informer 4(8):8
|
|
The Telecom Informer 4(9):8
|
|
The Telecom Informer 4(6):8
|
|
The Telecom Informer 4(5):8
|
|
The Telecom Informer 4(11):8
|
|
The Telecom Informer 4(4):8
|
|
The Telecom Informer 4(1):8
|
|
The Telecom Informer 4(12):8
|
|
The Telecom Informer 4(3):8
|
|
The Telecom Informer 4(2):8
|
|
The Telecom Informer 4(7):8
|
|
The Terminus of Len Rose 8(1):11
|
|
The Theory of 'Blue Boxing': their
|
|
history, how their used, their future 2(2):7
|
|
The Trouble With Telemail 1(4):2
|
|
The Truth Behind Those 9999 Numbers 1(1):4
|
|
The View of A Fed 9(2):38
|
|
The Woes of Having a Small-Time Rural
|
|
Phone Company 1(5):4
|
|
The Word On the Street~ 7(4):36
|
|
There are More Phones than Ever 3(3):23
|
|
This Month At 2600 3(4):30
|
|
This Month at 2600 3(3):22
|
|
This Month's Mischief and Mayhem~ 2(2):9
|
|
This Month's Troublemakers~ 2(3):15
|
|
Those Horrible Hackers Strike Again 2(1):1
|
|
Those Silly Codes 4(10):14
|
|
Tidbits~ 8(3):31
|
|
Times Changing For Directory Assistance~1(2):9
|
|
TINA Message Service~ 2(6):39
|
|
Tips On Trashing 6(2):32
|
|
Toll Fraud Detection Techniques 7(1):12
|
|
Toll Fraud Device 10(2):42
|
|
Toll Fraud: What the Big Boys are
|
|
Nervous About 9(3):43
|
|
Town on Hold During Strike~ 3(7):51
|
|
Trashing Alaska Style 2(2):8
|
|
Trashing: America's Source For
|
|
Information 3(10):73
|
|
Trick of the Month~ 1(2):9
|
|
Trouble in the White House 10(1):12
|
|
Trouble with 800 "Word Numbers"~ 2(9):59
|
|
True Colors 10(3):9
|
|
TRW Breached by Non-Hackers~ 2(2):9
|
|
TRW Credentials Lack Credibility 4(8):4
|
|
TRW: Big Business is Watching You 1(7):5
|
|
TV Blue Boxes~ 3(8):63
|
|
Two Inch Thick Bill~ 2(10):67
|
|
U. S. Secret Service Field Offices 9(4):12
|
|
U.S. Phone Companies Face Built-In
|
|
Privacy Hole 8(4):42
|
|
UAPC Update 6(4):45
|
|
UNIX Password Hacker 8(1):31
|
|
UNIX Password Hacker: An Alternative
|
|
Approach 9(1):18
|
|
US and France Link Phones~ 3(5):35
|
|
US Social Security Prefixes 4(11):6
|
|
Use of Wiretaps at Record Pace~ 1(11):63
|
|
Useful UNIX Programs 8(3):44
|
|
Using the Telephone 9(3):36
|
|
USPS Hacking 8(3):32
|
|
USPS Hacking Corrections 8(4):21
|
|
USSR Computer Hungry~ 3(8):63
|
|
Vehicle Identification Numbers 9(4):11
|
|
Victimized by Crime Computers~ 1(10):57
|
|
Victory for Wiretap Victims~ 1(5):3
|
|
Video Review: Assorted Videos 10(2):40
|
|
Video Telephone Invention~ 1(12):69
|
|
Violating A VAX 3(7):49
|
|
Virus Scanners Exposed 9(1):9
|
|
Vital Ingredients: Switching Centers
|
|
and Operators 1(10):56
|
|
VM/CMS Corrections 5(1):8
|
|
VMS--The Series Continues 3(2):9
|
|
Voice Mail Hacking 9(2):42
|
|
Voice Mail Hacking...NYNEX Style 6(3):36
|
|
Voice of Reagan Tortures Patients~ 3(11):83
|
|
War Game Addict~ 2(9):59
|
|
Weathertrak Codes 5(1):15
|
|
What a White Box Can Do 2(4):19
|
|
What in the EFF? 7(2):10
|
|
What it's Like to be a Soviet Operator 5(4):30
|
|
What's Going On With Phones/Computers 5(3):10
|
|
Whats up~ 8(1):19
|
|
When Hackers Ride Horses: A Review of
|
|
Cyberpunk 8(2):42
|
|
Where Have All the Hackers Gone? 8(2):4
|
|
Where One Hacker Went (L) 8(3):24
|
|
Whitehouse Extension Numbers 1(1):5
|
|
Who Called the Shuttle?~ 3(3):19
|
|
Who the Hell was Almon Strowger, Anyway?5(3):9
|
|
Who Wants to be Swept?~ 3(12):95
|
|
Whoops [errata for 4(9)] 4(10):18
|
|
Whose Strike Was That Anyway? 1(4):1
|
|
Why Computers Get Snatched 2(8):54
|
|
Why Won't They Listen? 8(3):4
|
|
Wireless Phones Spell Trouble~ 1(1):3
|
|
Wiretap City~ 1(3):3
|
|
Wiretap Clarification (L) 7(3):30
|
|
Wiretapping and Divestiture: A Lineman
|
|
Speaks Out 2(1):1
|
|
Word Numbers 4(4):15
|
|
Worldnet: Getting Closer Every Day 4(9):4
|
|
WORM 6(2):38
|
|
Wrath of God Strikes 2600 3(11):86
|
|
Wrestlemania Pins Bell~ 3(5):39
|
|
Write Protect Tabs Wrong~ 3(2):15
|
|
Yellow Scam~ 2(5):27
|
|
"You Must First Dial a One..."~ 1(7):7
|
|
Your Own Private Centrex~ 3(1):7
|
|
|
|
|
|
2600 THE HACKER QUARTERLY
|
|
Author Index: Volume 1 (1984) - Volume 10 (1993)
|
|
David Price
|
|
|
|
Authors are listed in the first column, titles and citations are
|
|
listed in the second column using the following format:
|
|
V(N):P V = Volume, N = Number, P = Page
|
|
|
|
|
|
|
|
910 Elementary Switching 10(4):9
|
|
999, The High School Hacking 10(2):13
|
|
Abuse, Dr. Magnetic Strips 8(2):7
|
|
Advocate, The Devil's Product Review: Do It Yourself Demon Dialer
|
|
Kit 9(2):15
|
|
Advocate, The Devil's Review: The Hacker Crackdown 9(3)21
|
|
Advocate, The Devil's Review: Hacker: The Computer Crime Card Game
|
|
9(1):36
|
|
Advocate, The Devil's When Hackers Ride Horses: A Review of
|
|
Cyberpunk 8(2):42
|
|
Advocate, The Devil's USPS Hacking 8(3):32
|
|
Agent 003, Boic Hacking Packard 2(3):20
|
|
Agent 04, Phucked Outside Loop Distribution Plant, or Hands-On
|
|
Experience 5(3):4
|
|
Agranoff, Mike The Ballad of Captain Crunch 4(3):4
|
|
America, Mainstream More VAX Tricks 4(5):4
|
|
Anonymous ANALYSIS: Gulf War Printer Virus 8(4):39
|
|
Anonymous Death of NYNEX Business Centers 8(2):11
|
|
Aristotle Voice Mail Hacking...NYNEX Style 6(3):36
|
|
B/Square & Mr. Upsetter Building a DTMF Decoder 7(1):14
|
|
Baalzebub Violating A VAX 3(7):49
|
|
Bard, The High School Mac Hack 10(4):15
|
|
Bayonet Getting Your File... 10(1):42
|
|
Benedict, W. Ritchie Book Review: The Devouring Fungus 9(2):40
|
|
Benedict, W. Ritchie Book Review: Virtual Reality 10(4):37
|
|
Billsf True Colors 10(3):9
|
|
Billsf Hitchhiker Guide to the Phone System
|
|
Phreaking in the Nineties 9(2):10
|
|
Bluebox, Mark The Truth Behind Those 9999 Numbers 1(1):4
|
|
Bootleg Cellular Magic 10(1):4
|
|
Bruce, Peter Spanish Phones--and what they don't do
|
|
6(2):36
|
|
Buggy, Orson Banking from your Terminal--A Look at
|
|
PRONTO 2(7):42
|
|
Caller, Midnight The Australian Phone System 9(1):31
|
|
Capone, Al Hacking on the Front Line 9(3):31
|
|
Catalyst, Cheshire Hacking PC Pursuit 4(4):6
|
|
Catalyst, Cheshire TAP: The Legend is Dead 4(1):4
|
|
Check, Parity Meeting Advice 10(2):16
|
|
City, New Hack The New LEC Order: Acronym City 8(1):42
|
|
Clayton, Noah Converting a Tone Dialer into a Red Box
|
|
7(3):32
|
|
Crazed Luddite &
|
|
Murdering Thug K001/Ra An Algorithm for Credit Cards 7(3):42
|
|
Cruise-CTRL An Overview of DSS1 10(3):36
|
|
DC More Conversion Tricks 8(3):43
|
|
Delam, Dr. Virus Scanners Exposed 9(1):9
|
|
Delam, Dr. Defeating Callback Verification 9(3):9
|
|
Dobbs, J.R. "Bob" Building a Red Box 5(2):13
|
|
Dragon, The Trashing: America's Source For Information
|
|
3(10):73
|
|
Drake, John England's Mass Announcements 4(9):10
|
|
Drake, John A Trip to England 3(8):58
|
|
Drake, John Book Review Nothing New in Computer
|
|
Underground by M. Harry 3(6):42
|
|
Drake, John An Interview with Hugo Cornwall: British
|
|
Hacker/Author 4(2):4
|
|
Drake, John An Interview With the Chaos Computer Club
|
|
5(4):34
|
|
Drewl/Salivate Changing Your Grades on A High School
|
|
Computer 10(3):34
|
|
Dust Crypt() Source Code 8(4):11
|
|
Dutton, Roland Book Review: "The Hacker's Handbook"
|
|
4(2):15
|
|
Echo Acronyms A-G 10(1):34
|
|
Echo Acronyms H-R 10(2):20
|
|
Echo Acronyms S-X (no y or z) 10(3):44
|
|
Esper Mobile Frequencies 8(4):18
|
|
Estev, Paul G. People Express to be Hacked to Pieces
|
|
2(5):25
|
|
Estev, Paul Reviews: The 1989 Pirate Directory 6(2):42
|
|
Eye, Roving Birth of a Low Technology Hacker 8(4):16
|
|
Eye, Roving Growth of a Low Tech Hacker 9(4):17
|
|
Fed, The The View of A Fed 9(2):38
|
|
Fellpe Rodriquez &
|
|
Rop, Gonggrijp Stuff You Should Be Interested In~ 8(4):8
|
|
Firemonger Surveying the COSMOS 2(2):8
|
|
Foley Dan The Telecom Informer 4(6):8
|
|
Foley Dan The Telecom Informer 4(3):8
|
|
Foley Dan The Telecom Informer 4(4):8
|
|
Foley Dan The Telecom Informer 4(2):8
|
|
Foley Dan The Telecom Informer 4(1):8
|
|
Freeman, John The Telecom Informer 4(5):8
|
|
Fresco, Al The Telecom Informer 4(9):8
|
|
Frosty of the GCMS Fascinating fone fun 9(1):45
|
|
Frosty of the GCMS A Batch Virus 9(1):8
|
|
FyberLyte The Magical Tone Box 10(4):22
|
|
G.R.A.S.P., Crisp A Guide to the 5ESS 10(2):4
|
|
Galaxy, Mister ANSI Bomb 10(2):44
|
|
Gam, Tamlyn Silver Box Born in U.K. 7(1):19
|
|
Gamma, Bob Are You a Phreak??? 2(3):13
|
|
Gerard, Judas More Cellular Fun 10(3):42
|
|
Glitch, The Cellular Update 5(3):8
|
|
Goldstein The Telecom Informer 4(7):8
|
|
Goldstein, Emmanuel A Pen Register For Phreaks?: Product
|
|
Review--Dialed Number Recorder 4(5):22
|
|
Goldstein The Telecom Informer 4(10):8
|
|
Goldstein The Telecom Informer 4(8):8
|
|
Goldstein, Emmanuel "FBI Revealed: Reviews--"The FBI Project
|
|
Newsletter" & "The FBI and Your BBS" 4(8):9
|
|
Goldstein, Emmanuel Never Erase the Past 10(3):19
|
|
Goldstein, Emmanuel Review: Sneakers 9(3):17
|
|
Goldstein, Emmanuel The Scoop on 911 7(1):37
|
|
Goldstein, Emmanuel The New "TAP" 6(2):43
|
|
Goldstein, Emmanuel Video Review: Assorted Videos 10(2):40
|
|
Goldstein, Emmanuel New Revelations From Bell South 7(3):16
|
|
Grapefruit, Rancid A Reader's Reply to Captain Zap 5(2):16
|
|
Gray, Jeff WORM 6(2):38
|
|
Greek, The International NUA's 4(10):10
|
|
Greek, The South African BBS's 4(10):11
|
|
Greenberg, Ross M. A Form of Protection For You and Your
|
|
Computer 5(2):4
|
|
Guru, VM VM/CMS Corrections 5(1):8
|
|
Guy, The GCI Trashing Alaska Style 2(2):8
|
|
Hackers, Legion of Telenet Addresses 4(5):10
|
|
Hank@Taunivm.Bitnet Worldnet: Getting Closer Every Day 4(9):4
|
|
Hibbert, Chris Protecting Your SSN 8(3):18
|
|
Hobbit, The Getting the Most Out of Equal Access 4(3):6
|
|
Holmes, Chester An American Express Phone Story 3(3):17
|
|
Holmes, Chester The Free Phones of Philly 3(7):50
|
|
Howard The Infinity Transmitter--An Old Bug that
|
|
Had Its Time 2(9):58
|
|
Icom, Mr. A Review of "The 'Top Secret' Registry of US
|
|
Government Radio Frequencies" 4(11):7
|
|
Inconnu, Les Product Review: TDD-8 DTMF Decoder 10(2):14
|
|
Infidel, The How Payphones Really Work 6(1):30
|
|
Infidel, The REMOBS 6(3):32
|
|
Infidel, The UNIX Password Hacker 8(1):31
|
|
Infidel, The Exchange List: 201 Area Code 6(2):20
|
|
Infiltrator A Simple Virus in C 9(3):19
|
|
Jaffee, Walter S. Hacking Computer Shows 10(4):16
|
|
Jockey, Disk US Social Security Prefixes 4(11):6
|
|
Jockey, Keyboard UNIX Password Hacker: An Alternative
|
|
Approach 9(1):18
|
|
Judicator of D.C. More Meeting Advice 10(4):35
|
|
Kevin Internet Outdials 8(1):40
|
|
Kid, the & Co. How to Get into a C.O. 2(3):14
|
|
Kid, the & Co. Knowing UNIX 3(8):57
|
|
Kid, The & Co. Some Facts on Supervision 3(9):65
|
|
Kingpin, 617 &
|
|
RDT Syndicate Cellular Phone Biopsy 10(4):6
|
|
Knight, Red More On Hacking UNIX 6(4):4
|
|
Knight, The Dark British News 10(1):44
|
|
Knight, Red A Hacker's Guide to UNIX 5(4):12
|
|
Kurtz, Colonel Walter E. Class Features 8(4):31
|
|
Lineman, The Phoning Home From Europe 4(5):9
|
|
Lurch, The 707 Area Code 7(1):44
|
|
Luthor, Lex The History of ESS 2(11):74
|
|
Luthor, Lex Telenet Directory 2(9):61
|
|
Luthor, Lex & The LOD History of British Phreaking 1(9):49
|
|
Luthor, Lex Where One Hacker Went (L) 8(3):24
|
|
Luthor, Lex & The LOD Fun With COSMOS 2(12):82
|
|
Luthor, Lex & the LOD More Info on VMS 2(10):66
|
|
Luthor, Lex & The Legion
|
|
of Hackers Hacking IBM's VM/CMS--Part Two 4(12):4
|
|
Luthor, Lex & The LOD Final Words on VMS 3(3):18
|
|
Luthor, Lex & The LOD A Guide to VMS 2(9):57
|
|
Luthor, Lex & The Legion
|
|
of Hackers Hacking IBM's VM/CMS 4(11):4
|
|
Luthor, Lex & The Legion
|
|
of Doom/Hackers VMS--The Series Continues 3(2):9
|
|
Mac+ New York's IMAS 4(10):4
|
|
MAD! Death of a Pay Phone 3(10):73
|
|
Man, Swinging Hacking AmiExpress 9(3):4
|
|
Marauder, The RSTS For Beginners 3(4):25
|
|
Marauder, The & The L.O.D. A HAcker's Guide to the TSPS
|
|
Console 4(6):6
|
|
Marauder, The &
|
|
Phoneline Phantoms RSTS: A Trick Or Two 2(11):73
|
|
Master, LNA Listening In: Catch Me if you Can! 4(11):7
|
|
MechWariors, GCMS U. S. Secret Service Field Offices 9(4):12
|
|
Menace, Hyperborean Caller ID Technologies 10(3):12
|
|
Meyer, Gordon & Jim Thomas The Neidorf/Phrack Trial: Day by Day
|
|
7(2):4
|
|
Micro Surgeon /West Coast
|
|
Phreaks Punching Pay Phones 6(3):37
|
|
Mitnick, Kevin Pure Cyberfiction, Says Mitnick 8(2):42
|
|
Mitnick, Kevin Looking Up IBM Passwords 8(1):36
|
|
Mole, The Stumbling into Control on a VMS 4(1):6
|
|
Monk, The How to Take Apart A Payphone 9(1):20
|
|
Moon, Electric A True Saga of Teleconferencing 1(4):4
|
|
Mouse, MCI Hacking MCIMAX 8(2):16
|
|
Murphy, Dan Review: CO Magazine 4(9):22
|
|
Nathan, Paco Xander Secret Service on Trial 10(1):18
|
|
Neidorf, Craig An Appeal For Help 8(4):36
|
|
Neidorf, Craig The Terminus of Len Rose 8(1):11
|
|
NeurAlien Beginner's Guide to Minitel 9(4):8
|
|
Overlord, Dark Lair of the INTERNET Worm 6(3):39
|
|
P., Larry The Sprint Gestapo Strikes Again! 6(2):34
|
|
Page, Bob A Report on the Internet Worm 5(4):4
|
|
Panda, Paranoid In Pursuit of Knowledge: An Atari 520ST
|
|
Virus 8(1):4
|
|
Panda, Paranoid An MS-DOS Virus 9(1):4
|
|
Phoenix, The Beige Box Construction 10(1):14
|
|
Phorester, Dr. Clayton Descrambling Cable 10(1):16
|
|
Phreak, Nynex Numbers of Interest 4(8):6
|
|
Phreak, The Alaskan (TAP) Exploits in Operator Hell 3(5):33
|
|
Phreaker, Lord Book Review: "Automatic Teller Machines III"
|
|
4(2):21
|
|
Phreaker, Cray-Z Product Review: Speech Thing 9(4):45
|
|
Phreaker, Lord An Interesting Diversion 2(10):65
|
|
Phreaker, Phantom &
|
|
Doom Prophet & LOD! Toll Fraud Detection Techniques 7(1):12
|
|
Plague, The The Dark Side of Viruses 5(2):8
|
|
Plague, The Grade "A" Hacking 6(3):4
|
|
Plague, The NYNEX Data 6(4):9
|
|
Plague, The UAPC Update 6(4):45
|
|
Plague, The An Introduction to COCOTS 7(2):20
|
|
Plann, Marshall Useful UNIX Programs 8(3):44
|
|
Prefect, Phord Getting Started 9(3):42
|
|
PW Human Database Centers 8(4):46
|
|
"Q", The The Secrets of Mizar 7(1):8
|
|
Rabbit, Peter Cipher Fun 9(4):6
|
|
Ranger, Night Voice Mail Hacking 9(2):42
|
|
Ranger, Forest Reaching Out On Your Own 2(9):58
|
|
Rat, Tech Hacking Smartphone 10(4):11
|
|
Rebel Know Your Switch 10(4):10
|
|
Reisman, Bruce Telephone Company Responds to Criticism of
|
|
Touch-tone Fees 4(10):7
|
|
Researcher, The Mobile Phones--Theory and Construction
|
|
3(4):26
|
|
Resz, Stepher J. Book Review: Approaching Zero 10(3):38
|
|
RNOC, Bill From Legion
|
|
of Doom Still More on the World of COSMOS 4(3):10
|
|
Rocker, The Veteran Cosmic Saudi Arabian BBS List 4(7):21
|
|
Rome, Hal from Roman Hackers 4(12):18
|
|
Runner, Net Outdials 8(2):44
|
|
S., Bernie How the Defeat *69 9(2):31
|
|
S., Bernie AT&T Sub Maps 4(8):11
|
|
S., Bernie FAX: A New Hobby 4(5):14
|
|
S., Bernie Paging For Free 4(6):5
|
|
S., Bernie Cellular Phone Fraud and Where It's Headed
|
|
4(7):4
|
|
S., Bernie Secret Frequencies 8(2):32
|
|
Salerno, Mike Getting In The Back Door: A Guide to Some
|
|
Popular Operating Systems 2(1):2
|
|
Scannon, Lou Book Review: Tune in on Telephone Calls by
|
|
Tom Kneitel 5(4):45
|
|
Scientist, Mad How to Use Your Silver Box 9(1):16
|
|
Severence, No How Phone Phreaks are Caught 4(7):6
|
|
Shadow, The Knights of Interesting Things to do on a DEC-20
|
|
2(7):41
|
|
Shadow, The Wiretapping and Divestiture: A Lineman
|
|
Speaks Out 2(1):1
|
|
Shadow, The How to Run a Successful Teleconference
|
|
2(5):26
|
|
Shadow, The Test Numbers 2(11):77
|
|
Shadow, The "Equal Access May Not be ""Equal"" to Modems"
|
|
2(11):74
|
|
Skinner, Scott One Angry Judge 10(1):23
|
|
Skinner, Scott &
|
|
Emmanuel Goldstein Simplex Locks 8(3):6
|
|
Solomenko, E. What it's Like to be a Soviet Operator 5(4):30
|
|
Source, U. R, How to Hack Honesty 10(3):20
|
|
Staff The Telecom Informer 4(11):8
|
|
Statton, Scott Ever Wonder Who Owns All Those 800 Numbers?
|
|
6(1):12
|
|
Steal, Agent Central Office Operations 7(4):12
|
|
Strowger, Almon, Jr. Who the Hell was Almon Strowger, Anyway?
|
|
5(3):9
|
|
Switchman, Silent And They Call US Crooks? 2(10):65
|
|
Switchman, Silent Here's the Secret! 2(11):73
|
|
Taylor, Dave Social Interaction with Phones 4(12):17
|
|
TELEgodzilla Our Contest Winners 7(4):32
|
|
The Kid & Co. &
|
|
The Shadow More on Trashing: What to Look for, How to
|
|
Act, Where to Go. 1(9):50
|
|
"The Snake", Jake Caller ID: The Facts 7(3):5
|
|
Thunder, Lord Defeating Trap Tracing 7(3):22
|
|
Toad, Texas Capturing Passwords 4(8):10
|
|
Tommy BASIC Red Box Tones 5(3):22
|
|
Tommy Canadian WATS Phonebook 5(3):23
|
|
Upsetter, Mr. Build A Tone Tracer 8(2):14
|
|
Upsetter, Mr. Listening In 7(1):19
|
|
Upsetter, Mr. Scanning For Calls 6(2):22
|
|
Upsetter, Mr. How to Build a Silver Box 6(4):20
|
|
Valve, Rex TRW Credentials Lack Credibility 4(8):4
|
|
Velcro, Romula Meeting Advice 10(2):17
|
|
Videosmith, The CLASS: What It Means To Us 4(5):6
|
|
Violence A Guide to PRIMOS 6(2):4
|
|
Violence PRIMOS: The Final Part 7(2):14
|
|
Violence More Hacking on Primos 6(4):14
|
|
William, Sir Some Cosmos Documentation That May Be
|
|
Useful 4(2):6
|
|
Williams, Dr. Tips On Trashing 6(2):32
|
|
Williams, Dr. Hardwiring Your Way In 5(4):42
|
|
Williams, Dr. An Interview with Dorothy Denning 7(3):10
|
|
Williams, Dr. Book Review: The Cuckoo's Egg 7(1):45
|
|
Williams, Dr. A Study of Hackers 10(1):38
|
|
Wintermute Operating With Difficulty 4(9):6
|
|
Wood, Jim The Early Phreak Days 2(11):80
|
|
Woodstein, Condor Psychology in the Hacker World 8(3):38
|
|
X, Alien A Way To Catch Peepers 9(1):35
|
|
Yuhas, Mike Allnet: A Horror Story 4(6):4
|
|
Zap, Captain An Interpretation of Computer Hacking 5(1):16
|
|
Zee, Charlie Trouble in the White House 10(1):12
|
|
Zero, Count Toll Fraud: What the Big Boys are Nervous
|
|
About 9(3):43
|
|
Zero, Count Shopper's Guide to COCOTS 9(3):13
|
|
|