arpanet.hac 4439
| Screwing around with Arpanet, by Hackman
| arpanet.txt 4736
| Attacking Arpanet by the Hackman of Hollow Hills
| arpanet1.con 4505
| Hacking Arpanet, by The Hackman of The Hollow Hills
| arpanet1.txt 7040
| Hacking ARPANET Part I, by The Source of The Listening Post
| arpanet2.txt 12160
| Hacking ARPANET Part II by The Source of The Listening Post
| arpanet3.txt 7552
| Hacking ARPANET Part III by The Source
| arpanet4.txt 4608
| Hacking ARPANET Part IV by The Source
| arpanet5.txt 8064
| Hacking ARPANET Part V by The Source
| arpanet6.txt 13824
| Hacking ARPANET Part VI by The Source
| bctj1_04.txt 7457
| Ethernet Fields
| bomb.txt 8594
| How to Send Fake Mail Using SMTP Servers by Hunter
| bump.txt 8231
| Things that go Bump in the Net, by David Chess of IBM
| denning.txt 58773
| Concerning Hackers who Break into Computer Systems (October 1, 1990)
| dial_5 5766
| Dialout List #5, by Spin-Doc (February 22, 1994)
| dialout.txt 1785
| A Collection of Internet Dial-Outs
| dialout1.txt 68938
| Novice Manual on Using Outdial Modems by Blue Adept
| dialoutslst.hac 29446
| (I)nter(N)et->(T)ym(N)et List Version 1.0 - January 1991 -
| disabled 3072
| Disabled Membership Guidelines and Rules for PC-Pursuit (April 13, 1992)
| dummy22.txt 423772
| Big Dummy's Guide to the Internet, v.2.2 by the Electronic Frontier Foundation (1994)
| emsss.txt 10317
| The Art of E-Mail Forging and Tracing Explained in one Simple Text
| engineer.rpt 19456
| Recommendations Report for File Transfer Via PC Pursuit (January 3, 1989)
| equip 2048
| PC Pursuit: Equipment and Software Requirements
| esnet.txt 58650
| Terminal Servers and Network Security, by C.E. Bemis and Lynn Hyman (December 12, 1990)
| exploits.txt 3714
| A Collection of Exploits from Legions of the Underground
| firewall.txt 5904
| Internet Firewall by Darkstar of NFG
| ftpintro 7861
| Anonymous FTP: Questions, Answers, Etc. by Odin (January 5, 1990)
| fwall.txt 5834
| Internet Firewalls, by DARKSTAR of NFG
| gtmhh-bs1.txt 12168
| The Guide to (Mostly) Harmless Hacking: Beginners' Series #1 by Carolyn Meinel
| gtmhh-cc1.txt 19786
| The Guide to (Mostly) Harmless Hacking: Computer Crime Law Issue #1 by Peter Thiruselvam and Carolyn Meinel
| gtmhh1-1.txt 9089
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 1
| gtmhh1-2.txt 21648
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 2 (How to Forge E-Mail)
| gtmhh1-3.txt 9158
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 3 (How Finger Can Be Used)
| gtmhh1-4.txt 21770
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 4 (How to Get Usenet Spammers Kicked Off)
| gtmhh1-5.txt 12585
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 5 (How to Get Email Spammers Kicked off Their ISPs)
| gtmhh1-6.txt 18850
| The Guide to (Mostly) Harmless Hacking: Volume 1 Number 6 (How to Nuke Offensive Web Sites)
| gtmhh2-2.txt 13662
| The Guide to (Mostly) Harmless Hacking: Volume 2 Number 2 (Linux)
| gtmhh2-4.txt 37561
| The Guide to (Mostly) Harmless Hacking: Volume 2 Number 4 (Port Surfing)
| gtmhh_bs31.txt 24576
| The Guide to (Mostly) Harmless Hacking: Volume 3 Number 1 (How to Get a Shell Account)
| gtmhh_bs32.txt 15961
| The Guide to (Mostly) Harmless Hacking: Volume 3 Number 2 (How to Get a Good Shell Account)
| hackenc.txt 143731
| The Hackers Encyclopedia by Logik Bomb (1995-1996 First Edition)
| hackfaq.hac 106697
| FAQ to #hack IRC Channel, Beta .007
| hackirc.txt 14052
| Hacking IRC: The Definitive Guide by Klider (1996)
| hackpage.txt 10379
| Hacking Webpages: THe Ultimate Guide by Virtual Circuit and Psychotic
| hackwww.txt 2843
| How to Hack the WWWboard Message Board 2.0 by kM of Hackers Club (May 12, 1997)
| haq.01 35596
| The HAQ Frequently Asked Questions by Belisarius (June 11, 1994)
| haq.02 30544
| The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part II)
| haq.03 43250
| The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part III)
| hexedit.txt 3454
| How to Hexedit mIRC - Flood Protection/Nuking by Lord Somer of The Hackers Layer
| hi.txt 6924
| Introduction to Hacking by KwAnTAM_PoZeEtroN
| hotmail.txt 6827
| The Hotmail Hack
| how-to 4096
| How to use the PC-Pursuit Service
| hqm.txt 4040
| Hacking Quickmail for Macintosh by The Brighter Buccaneer (February 28, 1995)
| hwp.txt 12966
| Hacking Web Pages, by Goat
| iad.txt 2157
| How to Advertise by Msging, Inviting, or Noticing Everyone on a Server by Lord Somer
| ib.txt 3046
| The Infinite Mailbomb by OSPbaboon and KwAnTAM_PoZeEtroN
| inet2000.txt 3703
| The iNET 2000 Online Service, by Deicide (April 5, 1993)
| inetsec.txt 8903
| A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers v1.1 by Christopher Klaus (December 5, 1993)
| internet.doc 13018
| The Beginner's Guide to the Internet by Weaons Master
| internet.hac 49024
| A Hacker's Guide to the Internet, by Gatsby 1991
| ipd.hac 2004
| Countries connected to the International Packet Switching Stream by The Force
| iphijack.txt 46396
| A Simple Attack Against TCP, by Laurent Joncheray
| irc.txt 2703
| How Do I Hack ChanOP on IRC by Lord Somer
| ircfaq.txt 16758
| The IRC Frequently Asked Questions (FAQ) (Junary 15, 1996)
| irchack.hac 14381
| Hacking IRC the Definitive Guide
| irk.txt 1739
| Irc Bouncing Around Klines Using a unix Shell by Lord Somer (August 5, 1997)
| jul93blt.txt 16431
| Connecting to the Internet: Security Considerations
| mnemonic.txt 9692
| The PC-Pursuit Service Availability
| na.txt 247107
| Anonymity on the Internet, by L. Detweiler (April 30, 1994)
| netcat.txt 63679
| Netcat Rules the Net Version 1.0
| netware1.txt 5670
| Stuboy's Netware Hacking Tips, Compliments of StuBoy (1997)
| new-user 2048
| PC-Pursuit: New User Information
| pingdumb.txt 5851
| Pinging For Dummies, by ESQ (2000)
| pod.txt 5746
| Large Packet Attacks, A.K.A. the Ping of Death
| proxy.txt 3474
| Using Web Proxies to Disguise your IP Address by Hardcore Pawn
| rates 3072
| PC-Pursuit Rate Schedule (July 1, 1989)
| rvprimer.txt 10979
| The Racal_Vadic Primer v1.0 (For PC-Pursuit)
| smtp.txt 2545
| Mail Spoofing Explained for the Beginner
| sniffer.txt 19746
| FAQ: The Sniffer Frequently Asked Questions Version 1.7
| spoof.txt 13411
| Defending Against Sequence Number Attacks by S. Bellovin of AT&T Research (May 1996)
| spoofing.txt 22066
| Web Spoofing: An Internet Con Game by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach
| tc 10240
| Terms and Conditions of Use for PC-Pursuit Service
| td.txt | 11195 | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |