253 lines
9.7 KiB
Plaintext
253 lines
9.7 KiB
Plaintext
TADXF:007
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
%% N.I.A. %%
|
||
%% Network Information Access %%
|
||
%% Index 01-74 %%
|
||
%% Done By OMEGA/AD %%
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
[-]-------------------------------------------------------------------------[-]
|
||
|
||
NIA FILE 1 : Automated Teller Machines - Basic Series - ATM's
|
||
: Written by/Typed In By Guardian Of Time
|
||
: 15DEC89
|
||
|
||
NIA FILE 2 : Automated Teller Machines -- Basic Series -- File #2
|
||
: Written by/Typed In By Guardian Of Time
|
||
: 19JAN90
|
||
|
||
NIA FILE 3 : Computer Crimes/Fraud/Waste part 1
|
||
: Written/Typed/Edited By: Lord Kalkin
|
||
: 02MAR90
|
||
|
||
NIA FILE 4 : Computers: Crime, Fraud, Waste Part 2
|
||
: Written/Typed/Edited By: Lord Kalkin
|
||
: Information Security
|
||
: 03MAR90
|
||
|
||
NIA FILE 5 : Detecting Merchant Fraud
|
||
: Typed In By: Guardian Of Time
|
||
: "A Guide To Monitoring Credit Card Transactions"
|
||
: Written By: Mastercard International
|
||
: 01FEB90
|
||
|
||
NIA FILE 6 : TRW -- Credit Bureau -- How To Read A TRW Credit Report
|
||
: Written/Typed In By: Guardian Of Time
|
||
: December 28, 1989
|
||
|
||
NIA FILE 7 : TRW -- Credit Bureau -- How To Read A TRW Credit Report
|
||
: Written/Typed In By: Guardian Of Time
|
||
: December 28, 1989
|
||
|
||
NIA FILE 8 : ATM Part 3
|
||
: Written/Typed/Edited By: Guardian Of Time
|
||
: ATM Diagnostic Manual
|
||
|
||
NIA FILE 9 : ATM Part 4
|
||
: Typed In By: Guardian Of Time
|
||
: Inside An Atm Machine
|
||
|
||
NIA FILE 10 : HOW TO USE PLEXAR
|
||
|
||
NIA FILE 11 : VMS System Manager's Manual
|
||
: Chapter 2.11
|
||
|
||
NIA FILE 12 : VMS System Manager's Manual
|
||
: Chapter 2.11
|
||
|
||
NIA FILE 13 : VMS System Manager's Manual
|
||
: Chapter 03.11
|
||
|
||
NIA FILE 14 : SPREADING THE DISEASE
|
||
|
||
NIA FILE 15 : ZUC VIRUS
|
||
|
||
NIA FILE 16 : USENET: BASICS
|
||
|
||
NIA FILE 17 : COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES
|
||
: Section I -- Introduction
|
||
|
||
NIA FILE 18 : Computers User's Guide/Protection of Information
|
||
|
||
NIA FILE 19 : Management Guide/Protection Of Information
|
||
|
||
NIA FILE 20 : Executive Guide/Protection Of Information
|
||
|
||
NIA FILE 21 : Digest Message Format
|
||
|
||
NIA FILE 22 : Frequently Asked Questions About UNIX
|
||
|
||
NIA FILE 23 : Overview on Viruses & Threats
|
||
|
||
NIA FILE 24 : Computer Viruses & Threats II
|
||
|
||
NIA FILE 25 : Overview On Viruses & Threats III
|
||
|
||
NIA FILE 26 : Computer Viruses & Threats IV
|
||
|
||
NIA FILE 27 : VMS: System Manager's Manual
|
||
: Chapter 4.11
|
||
|
||
NIA FILE 28 : COMPUTER SECURITY TECHNIQUES
|
||
: Section II - Background
|
||
|
||
NIA FILE 29 : VMS System Manager's Manual
|
||
: Chapter 5.11
|
||
|
||
NIA FILE 30 : NAMBA VIRUS
|
||
|
||
NIA FILE 31 : May '90 Busts I
|
||
|
||
NIA FILE 32 : LOD/H BUST: AS BY 2600 MAG.
|
||
|
||
NIA FILE 33 : UK Telephone System
|
||
|
||
NIA FILE 34 : THE TRW CREDIT PROFILE REPORT
|
||
|
||
NIA FILE 35 : Operation: SunDevil
|
||
|
||
NIA FILE 36 : Credit Bureau Incorportated
|
||
: Otherwise Known As CBI
|
||
|
||
NIA FILE 37 : VMS SYSTEM MANAGER'S MANUAL
|
||
: CHAPTER 6
|
||
|
||
NIA FILE 38 : VMS SYSTEM MANAGER'S MANUAL
|
||
: CHAPTER 7
|
||
|
||
NIA FILE 39 : HACKERS OF THE WORLD, UNITE!
|
||
|
||
NIA FILE 40 : Views Of Golstein: Operation Sundevil
|
||
|
||
NIA FILE 41 : New Area Code 903
|
||
|
||
NIA FILE 42 : MPACT: Ordering Process
|
||
|
||
NIA FILE 43 : Craig Neidorf On Trial
|
||
|
||
NIA FILE 44 : Creating An Account On A VMS System
|
||
|
||
NIA FILE 45 : CERT Advisory: SunView selection_svc Vulnerability
|
||
|
||
NIA FILE 46 : Security Exposures and Controls for MVS
|
||
|
||
NIA FILE 47 : Article Direct From The Wall Street Journal
|
||
: Edition WEDNESDAY AUGUST 22, 1990.
|
||
|
||
NIA FILE 48 : illinois Bell Employee Given Bribe
|
||
|
||
NIA FILE 49 : BRIEF UPDATE ON SOME VMS COMMANDS:
|
||
: SHOW USERS, SHOW SYSTEM, and STOP/ID= COMMANDS
|
||
|
||
NIA FILE 50 : PART 1. Nootropic Drugs [Drugs That Make You Smart]...
|
||
: PART 2. Portrait Of J Random Hacker (time for comparisons!)......
|
||
: PART 3. (censored)...........
|
||
: PART 4. Some Thoughts..
|
||
: PART 5. BBS Software Review As Seen By SysOps.....
|
||
: PART 6. Hellos, Congrats, and Respects To:...
|
||
|
||
NIA FILE 51 : System Security Part 01
|
||
: Introduction: Types Of Computer Security Problems
|
||
|
||
NIA FILE 52 : System Security Part 02
|
||
: Security For The User
|
||
|
||
NIA FILE 53 : PyroTechnics I-IV
|
||
|
||
NIA FILE 54 : City Codes for USSR
|
||
|
||
NIA FILE 55 : Computer Network Gets Overseer
|
||
: Houston Chronicle
|
||
|
||
NIA FILE 56 : CERT Advisory: NeXT System Software
|
||
|
||
NIA FILE 57 : The Network Thought Machine
|
||
|
||
NIA FILE 58 : BILL OF INFORMATION RIGHTS II
|
||
|
||
NIA FILE 59 : Making the NOVA Program by Cliff Stoll
|
||
: Service Outage in N. Illinois
|
||
|
||
NIA FILE 60 : Early Apple Phreaking Days
|
||
|
||
NIA FILE 61 : Len Rose Arrested Again
|
||
|
||
NIA FILE 62 : Buncha News
|
||
|
||
NIA FILE 63 : SECTION III COMPUTER SECURITY CONTROLS AND THE LAW
|
||
|
||
NIA FILE 64 : PTs Experience w/CLASS
|
||
|
||
NIA FILE 65 : PBX Security
|
||
|
||
NIA FILE 66 : CERT: VAX/VMS Break-Ins
|
||
|
||
NIA FILE 67 : Network Thought Machine [3] & SNA Networks [1]
|
||
|
||
NIA FILE 68 : 1. DECnet [01].........................Guardian Of Time
|
||
2. Unix: UUCP Files.........................Judge Dredd
|
||
3. VAX: Tekno DCS HELP [01].................Judge Dredd
|
||
4. HP: DBEDIT Manual....................Malefactor [OC]
|
||
5. *LONG* Surveilance Expo '90 Report.............Thalx
|
||
6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom T.....
|
||
7. Department Of The Army Field Manual [01].Death Jester
|
||
8. Comments From The Editors...................GOT & JD
|
||
|
||
NIA FILE 69 : 1. The Future of the Internet.............Jane M. Fraser
|
||
2. Tekno DCS HELP [02].......................Judge Dredd
|
||
3. Computer Security Techniques [04]....Guardian Of Time
|
||
4. Kermit Manual [01]....................Malefactor [OC]
|
||
5. Department Of The Army Field Manual [02].Death Jester
|
||
6. World News Sept 1990-Jan 1991.Face 2 Face Publications
|
||
7. Comments From Editors........................JD & GOT
|
||
|
||
NIA FILE 70 : 1. The First Conference On Computers, Freedom & Privacy.
|
||
2. DoD Trusted System Evaluation Criteria [01 of 02].
|
||
3. Kermit Protocol Manual [02 of 02].....Malefactor [OC]
|
||
4. Social Engineering: A Way Of Life.....Malefactor [OC]
|
||
5. Unix Kerberos Manual........Doctor Dissector [PHA/P4]
|
||
6. A Basic Guide To Hacking Unix....Sir Hackalot [PHAZE]
|
||
7. Editor's Comments............................JD & GOT
|
||
|
||
NIA FILE 71 : 1. Index ....................................NIA Editors
|
||
2. Analysis of the 4-wire Line - An Explanation ........
|
||
3. Using the UK Academic Network PSS Gateway ...........
|
||
4. DoD Trusted System Evaluation Criteria [02/02] ....JD
|
||
5. List of Texas Internet Sites ............Lord Macduff
|
||
6. Steve Jackson Games vs. Secret Service..EFF Foundation
|
||
7. Editor's Comments ........................NIA Editors.
|
||
|
||
NIA FILE 72 : 1. Index to NIA072 ...........................NIA Editors
|
||
2. The Renaissance of Hacking .............Mark Hittinger
|
||
3. The Hacker Manifesto ....................Erik Bloodaxe
|
||
4. Foiling the Cracker [Dept. of Defense]....Killing Joke
|
||
5. UNIX: JE Documentation ..............Terminal_Erection
|
||
6. Network Miscellany ....................Various Sources
|
||
7. CyberTimes (Vox Populi) [1/4] .............Judge Dredd
|
||
8. CyberTimes (Vox Populi) [2/4] .............Judge Dredd
|
||
9. CyberTimes (Vox Populi) [3/4] .............Judge Dredd
|
||
10. CyberTimes (Vox Populi) [4/4] .............Judge Dredd
|
||
11. Editor's Comments .........................NIA Editors
|
||
|
||
NIA FILE 73 : 1. NIA073 Index .............................NIA Editors
|
||
2. Valley of the Nerds.......................Walter Kirn
|
||
3. Internet to Anywhere................Industrial Phreak
|
||
4. Globally Tymnet.............................Hi Fi Del
|
||
5. Report on Interexchange Carriers..............The FCC
|
||
6. Vox Populi: NIA News......................Judge Dredd
|
||
7. Hacking the HP3000 [Part I]................Malefactor
|
||
8. ** XmasCon '91 Announcement **............Santa Claus
|
||
9. Editor's Comments.........................NIA Editors
|
||
|
||
NIA FILE 74 : 1. Introduction ..................................Editors
|
||
2. Security Probs in TCP/IP Suite [01/02] ..S.M. Bellovin
|
||
3. Security Probs in TCP/IP Suite [02/02] ..S.M. Bellovin
|
||
4. Firewalls: Design of Secure Internet Gateway Cheswick
|
||
5. Notes on Centigram Systems ..................Anonymous
|
||
6. How to Steal Information ...................The Butler
|
||
7. Killer Chips: Physical Virus..Jean-Bernard Condat [CCCF]
|
||
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Remember Where You Saw This Phile First <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[=] ARRESTED DEVELOPMENT +31.77.547477 The Netherlands [=]<5D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|