Hacking Textfiles: The Internet


Filename
Size
Description of the Textfile
anon-mail.txt 3260
Hackerdevil's Guide to Sending Anonymous E-mails to Someone Without a Program
arpa.man 86379
Arpanet Information Brochure (December 1985)
arpanet.hac 4439
Screwing around with Arpanet, by Hackman
arpanet.txt 4736
Attacking Arpanet by the Hackman of Hollow Hills
arpanet1.con 4505
Hacking Arpanet, by The Hackman of The Hollow Hills
arpanet1.txt 7040
Hacking ARPANET Part I, by The Source of The Listening Post
arpanet2.txt 12160
Hacking ARPANET Part II by The Source of The Listening Post
arpanet3.txt 7552
Hacking ARPANET Part III by The Source
arpanet4.txt 4608
Hacking ARPANET Part IV by The Source
arpanet5.txt 8064
Hacking ARPANET Part V by The Source
arpanet6.txt 13824
Hacking ARPANET Part VI by The Source
bctj1_04.txt 7457
Ethernet Fields
bomb.txt 8594
How to Send Fake Mail Using SMTP Servers by Hunter
bump.txt 8231
Things that go Bump in the Net, by David Chess of IBM
denning.txt 58773
Concerning Hackers who Break into Computer Systems (October 1, 1990)
dial_5 5766
Dialout List #5, by Spin-Doc (February 22, 1994)
dialout.txt 1785
A Collection of Internet Dial-Outs
dialout1.txt 68938
Novice Manual on Using Outdial Modems by Blue Adept
dialoutslst.hac 29446
(I)nter(N)et->(T)ym(N)et List Version 1.0 - January 1991 -
disabled 3072
Disabled Membership Guidelines and Rules for PC-Pursuit (April 13, 1992)
dummy22.txt 423772
Big Dummy's Guide to the Internet, v.2.2 by the Electronic Frontier Foundation (1994)
emsss.txt 10317
The Art of E-Mail Forging and Tracing Explained in one Simple Text
engineer.rpt 19456
Recommendations Report for File Transfer Via PC Pursuit (January 3, 1989)
equip 2048
PC Pursuit: Equipment and Software Requirements
esnet.txt 58650
Terminal Servers and Network Security, by C.E. Bemis and Lynn Hyman (December 12, 1990)
exploits.txt 3714
A Collection of Exploits from Legions of the Underground
firewall.txt 5904
Internet Firewall by Darkstar of NFG
ftpintro 7861
Anonymous FTP: Questions, Answers, Etc. by Odin (January 5, 1990)
fwall.txt 5834
Internet Firewalls, by DARKSTAR of NFG
gtmhh-bs1.txt 12168
The Guide to (Mostly) Harmless Hacking: Beginners' Series #1 by Carolyn Meinel
gtmhh-cc1.txt 19786
The Guide to (Mostly) Harmless Hacking: Computer Crime Law Issue #1 by Peter Thiruselvam and Carolyn Meinel
gtmhh1-1.txt 9089
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 1
gtmhh1-2.txt 21648
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 2 (How to Forge E-Mail)
gtmhh1-3.txt 9158
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 3 (How Finger Can Be Used)
gtmhh1-4.txt 21770
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 4 (How to Get Usenet Spammers Kicked Off)
gtmhh1-5.txt 12585
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 5 (How to Get Email Spammers Kicked off Their ISPs)
gtmhh1-6.txt 18850
The Guide to (Mostly) Harmless Hacking: Volume 1 Number 6 (How to Nuke Offensive Web Sites)
gtmhh2-2.txt 13662
The Guide to (Mostly) Harmless Hacking: Volume 2 Number 2 (Linux)
gtmhh2-4.txt 37561
The Guide to (Mostly) Harmless Hacking: Volume 2 Number 4 (Port Surfing)
gtmhh_bs31.txt 24576
The Guide to (Mostly) Harmless Hacking: Volume 3 Number 1 (How to Get a Shell Account)
gtmhh_bs32.txt 15961
The Guide to (Mostly) Harmless Hacking: Volume 3 Number 2 (How to Get a Good Shell Account)
hackenc.txt 143731
The Hackers Encyclopedia by Logik Bomb (1995-1996 First Edition)
hackfaq.hac 106697
FAQ to #hack IRC Channel, Beta .007
hackirc.txt 14052
Hacking IRC: The Definitive Guide by Klider (1996)
hackpage.txt 10379
Hacking Webpages: THe Ultimate Guide by Virtual Circuit and Psychotic
hackwww.txt 2843
How to Hack the WWWboard Message Board 2.0 by kM of Hackers Club (May 12, 1997)
haq.01 35596
The HAQ Frequently Asked Questions by Belisarius (June 11, 1994)
haq.02 30544
The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part II)
haq.03 43250
The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part III)
hexedit.txt 3454
How to Hexedit mIRC - Flood Protection/Nuking by Lord Somer of The Hackers Layer
hi.txt 6924
Introduction to Hacking by KwAnTAM_PoZeEtroN
hotmail.txt 6827
The Hotmail Hack
how-to 4096
How to use the PC-Pursuit Service
hqm.txt 4040
Hacking Quickmail for Macintosh by The Brighter Buccaneer (February 28, 1995)
hwp.txt 12966
Hacking Web Pages, by Goat
iad.txt 2157
How to Advertise by Msging, Inviting, or Noticing Everyone on a Server by Lord Somer
ib.txt 3046
The Infinite Mailbomb by OSPbaboon and KwAnTAM_PoZeEtroN
inet2000.txt 3703
The iNET 2000 Online Service, by Deicide (April 5, 1993)
inetsec.txt 8903
A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers v1.1 by Christopher Klaus (December 5, 1993)
internet.doc 13018
The Beginner's Guide to the Internet by Weaons Master
internet.hac 49024
A Hacker's Guide to the Internet, by Gatsby 1991
ipd.hac 2004
Countries connected to the International Packet Switching Stream by The Force
iphijack.txt 46396
A Simple Attack Against TCP, by Laurent Joncheray
irc.txt 2703
How Do I Hack ChanOP on IRC by Lord Somer
ircfaq.txt 16758
The IRC Frequently Asked Questions (FAQ) (Junary 15, 1996)
irchack.hac 14381
Hacking IRC the Definitive Guide
irk.txt 1739
Irc Bouncing Around Klines Using a unix Shell by Lord Somer (August 5, 1997)
jul93blt.txt 16431
Connecting to the Internet: Security Considerations
mnemonic.txt 9692
The PC-Pursuit Service Availability
na.txt 247107
Anonymity on the Internet, by L. Detweiler (April 30, 1994)
netcat.txt 63679
Netcat Rules the Net Version 1.0
netware1.txt 5670
Stuboy's Netware Hacking Tips, Compliments of StuBoy (1997)
new-user 2048
PC-Pursuit: New User Information
pingdumb.txt 5851
Pinging For Dummies, by ESQ (2000)
pod.txt 5746
Large Packet Attacks, A.K.A. the Ping of Death
proxy.txt 3474
Using Web Proxies to Disguise your IP Address by Hardcore Pawn
rates 3072
PC-Pursuit Rate Schedule (July 1, 1989)
rvprimer.txt 10979
The Racal_Vadic Primer v1.0 (For PC-Pursuit)
smtp.txt 2545
Mail Spoofing Explained for the Beginner
sniffer.txt 19746
FAQ: The Sniffer Frequently Asked Questions Version 1.7
spoof.txt 13411
Defending Against Sequence Number Attacks by S. Bellovin of AT&T Research (May 1996)
spoofing.txt 22066
Web Spoofing: An Internet Con Game by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach
tc 10240
Terms and Conditions of Use for PC-Pursuit Service
td.txt 11195
Telenet dialups for the US by HackerZ Hideout
tele_iti.txt 31420
Telenet ITI Parameters for PC-Pursuit
terminal.txt 13342
Terminal Identifiers List
tips.txt 17685
Troubleshooting PC Pursuit Calls (January 18, 1997)
unixwrap.txt 25638
TCP Wrapper: Network Monitoring, Access Control, and Booby Traps, by Wietse Venema
usa.asc 138303
List of Dial-In Numbers for PC Pursuit
usenethi.txt 4277
Some Advanced Usenet Hi-Jynx
waninfo.txt 9788
Jester Sluggo Presents an Insight on Wide Area Networks
world.asc 171453
Worldwide Phone Numbers of Dial-In to PC-Pursuit
yanoff.txt 44889
Special Internet Collections: Last Update 5/16/1994 by Scott Yanoff

There are 93 files for a total of 2,601,977 bytes.