2021-04-15 13:31:59 -05:00

253 lines
9.7 KiB
Plaintext
Raw Blame History

TADXF:007
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% N.I.A. %%
%% Network Information Access %%
%% Index 01-74 %%
%% Done By OMEGA/AD %%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
[-]-------------------------------------------------------------------------[-]
NIA FILE 1 : Automated Teller Machines - Basic Series - ATM's
: Written by/Typed In By Guardian Of Time
: 15DEC89
NIA FILE 2 : Automated Teller Machines -- Basic Series -- File #2
: Written by/Typed In By Guardian Of Time
: 19JAN90
NIA FILE 3 : Computer Crimes/Fraud/Waste part 1
: Written/Typed/Edited By: Lord Kalkin
: 02MAR90
NIA FILE 4 : Computers: Crime, Fraud, Waste Part 2
: Written/Typed/Edited By: Lord Kalkin
: Information Security
: 03MAR90
NIA FILE 5 : Detecting Merchant Fraud
: Typed In By: Guardian Of Time
: "A Guide To Monitoring Credit Card Transactions"
: Written By: Mastercard International
: 01FEB90
NIA FILE 6 : TRW -- Credit Bureau -- How To Read A TRW Credit Report
: Written/Typed In By: Guardian Of Time
: December 28, 1989
NIA FILE 7 : TRW -- Credit Bureau -- How To Read A TRW Credit Report
: Written/Typed In By: Guardian Of Time
: December 28, 1989
NIA FILE 8 : ATM Part 3
: Written/Typed/Edited By: Guardian Of Time
: ATM Diagnostic Manual
NIA FILE 9 : ATM Part 4
: Typed In By: Guardian Of Time
: Inside An Atm Machine
NIA FILE 10 : HOW TO USE PLEXAR
NIA FILE 11 : VMS System Manager's Manual
: Chapter 2.11
NIA FILE 12 : VMS System Manager's Manual
: Chapter 2.11
NIA FILE 13 : VMS System Manager's Manual
: Chapter 03.11
NIA FILE 14 : SPREADING THE DISEASE
NIA FILE 15 : ZUC VIRUS
NIA FILE 16 : USENET: BASICS
NIA FILE 17 : COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES
: Section I -- Introduction
NIA FILE 18 : Computers User's Guide/Protection of Information
NIA FILE 19 : Management Guide/Protection Of Information
NIA FILE 20 : Executive Guide/Protection Of Information
NIA FILE 21 : Digest Message Format
NIA FILE 22 : Frequently Asked Questions About UNIX
NIA FILE 23 : Overview on Viruses & Threats
NIA FILE 24 : Computer Viruses & Threats II
NIA FILE 25 : Overview On Viruses & Threats III
NIA FILE 26 : Computer Viruses & Threats IV
NIA FILE 27 : VMS: System Manager's Manual
: Chapter 4.11
NIA FILE 28 : COMPUTER SECURITY TECHNIQUES
: Section II - Background
NIA FILE 29 : VMS System Manager's Manual
: Chapter 5.11
NIA FILE 30 : NAMBA VIRUS
NIA FILE 31 : May '90 Busts I
NIA FILE 32 : LOD/H BUST: AS BY 2600 MAG.
NIA FILE 33 : UK Telephone System
NIA FILE 34 : THE TRW CREDIT PROFILE REPORT
NIA FILE 35 : Operation: SunDevil
NIA FILE 36 : Credit Bureau Incorportated
: Otherwise Known As CBI
NIA FILE 37 : VMS SYSTEM MANAGER'S MANUAL
: CHAPTER 6
NIA FILE 38 : VMS SYSTEM MANAGER'S MANUAL
: CHAPTER 7
NIA FILE 39 : HACKERS OF THE WORLD, UNITE!
NIA FILE 40 : Views Of Golstein: Operation Sundevil
NIA FILE 41 : New Area Code 903
NIA FILE 42 : MPACT: Ordering Process
NIA FILE 43 : Craig Neidorf On Trial
NIA FILE 44 : Creating An Account On A VMS System
NIA FILE 45 : CERT Advisory: SunView selection_svc Vulnerability
NIA FILE 46 : Security Exposures and Controls for MVS
NIA FILE 47 : Article Direct From The Wall Street Journal
: Edition WEDNESDAY AUGUST 22, 1990.
NIA FILE 48 : illinois Bell Employee Given Bribe
NIA FILE 49 : BRIEF UPDATE ON SOME VMS COMMANDS:
: SHOW USERS, SHOW SYSTEM, and STOP/ID= COMMANDS
NIA FILE 50 : PART 1. Nootropic Drugs [Drugs That Make You Smart]...
: PART 2. Portrait Of J Random Hacker (time for comparisons!)......
: PART 3. (censored)...........
: PART 4. Some Thoughts..
: PART 5. BBS Software Review As Seen By SysOps.....
: PART 6. Hellos, Congrats, and Respects To:...
NIA FILE 51 : System Security Part 01
: Introduction: Types Of Computer Security Problems
NIA FILE 52 : System Security Part 02
: Security For The User
NIA FILE 53 : PyroTechnics I-IV
NIA FILE 54 : City Codes for USSR
NIA FILE 55 : Computer Network Gets Overseer
: Houston Chronicle
NIA FILE 56 : CERT Advisory: NeXT System Software
NIA FILE 57 : The Network Thought Machine
NIA FILE 58 : BILL OF INFORMATION RIGHTS II
NIA FILE 59 : Making the NOVA Program by Cliff Stoll
: Service Outage in N. Illinois
NIA FILE 60 : Early Apple Phreaking Days
NIA FILE 61 : Len Rose Arrested Again
NIA FILE 62 : Buncha News
NIA FILE 63 : SECTION III COMPUTER SECURITY CONTROLS AND THE LAW
NIA FILE 64 : PTs Experience w/CLASS
NIA FILE 65 : PBX Security
NIA FILE 66 : CERT: VAX/VMS Break-Ins
NIA FILE 67 : Network Thought Machine [3] & SNA Networks [1]
NIA FILE 68 : 1. DECnet [01].........................Guardian Of Time
2. Unix: UUCP Files.........................Judge Dredd
3. VAX: Tekno DCS HELP [01].................Judge Dredd
4. HP: DBEDIT Manual....................Malefactor [OC]
5. *LONG* Surveilance Expo '90 Report.............Thalx
6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom T.....
7. Department Of The Army Field Manual [01].Death Jester
8. Comments From The Editors...................GOT & JD
NIA FILE 69 : 1. The Future of the Internet.............Jane M. Fraser
2. Tekno DCS HELP [02].......................Judge Dredd
3. Computer Security Techniques [04]....Guardian Of Time
4. Kermit Manual [01]....................Malefactor [OC]
5. Department Of The Army Field Manual [02].Death Jester
6. World News Sept 1990-Jan 1991.Face 2 Face Publications
7. Comments From Editors........................JD & GOT
NIA FILE 70 : 1. The First Conference On Computers, Freedom & Privacy.
2. DoD Trusted System Evaluation Criteria [01 of 02].
3. Kermit Protocol Manual [02 of 02].....Malefactor [OC]
4. Social Engineering: A Way Of Life.....Malefactor [OC]
5. Unix Kerberos Manual........Doctor Dissector [PHA/P4]
6. A Basic Guide To Hacking Unix....Sir Hackalot [PHAZE]
7. Editor's Comments............................JD & GOT
NIA FILE 71 : 1. Index ....................................NIA Editors
2. Analysis of the 4-wire Line - An Explanation ........
3. Using the UK Academic Network PSS Gateway ...........
4. DoD Trusted System Evaluation Criteria [02/02] ....JD
5. List of Texas Internet Sites ............Lord Macduff
6. Steve Jackson Games vs. Secret Service..EFF Foundation
7. Editor's Comments ........................NIA Editors.
NIA FILE 72 : 1. Index to NIA072 ...........................NIA Editors
2. The Renaissance of Hacking .............Mark Hittinger
3. The Hacker Manifesto ....................Erik Bloodaxe
4. Foiling the Cracker [Dept. of Defense]....Killing Joke
5. UNIX: JE Documentation ..............Terminal_Erection
6. Network Miscellany ....................Various Sources
7. CyberTimes (Vox Populi) [1/4] .............Judge Dredd
8. CyberTimes (Vox Populi) [2/4] .............Judge Dredd
9. CyberTimes (Vox Populi) [3/4] .............Judge Dredd
10. CyberTimes (Vox Populi) [4/4] .............Judge Dredd
11. Editor's Comments .........................NIA Editors
NIA FILE 73 : 1. NIA073 Index .............................NIA Editors
2. Valley of the Nerds.......................Walter Kirn
3. Internet to Anywhere................Industrial Phreak
4. Globally Tymnet.............................Hi Fi Del
5. Report on Interexchange Carriers..............The FCC
6. Vox Populi: NIA News......................Judge Dredd
7. Hacking the HP3000 [Part I]................Malefactor
8. ** XmasCon '91 Announcement **............Santa Claus
9. Editor's Comments.........................NIA Editors
NIA FILE 74 : 1. Introduction ..................................Editors
2. Security Probs in TCP/IP Suite [01/02] ..S.M. Bellovin
3. Security Probs in TCP/IP Suite [02/02] ..S.M. Bellovin
4. Firewalls: Design of Secure Internet Gateway Cheswick
5. Notes on Centigram Systems ..................Anonymous
6. How to Steal Information ...................The Butler
7. Killer Chips: Physical Virus..Jean-Bernard Condat [CCCF]
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Remember Where You Saw This Phile First <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[=] ARRESTED DEVELOPMENT +31.77.547477 The Netherlands [=]<5D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>