[Phile 1.1] *================================* [# #] [# THE PHREAKER'S HANDBOOK #1 #] [# #] *================================* **** An Official Phortune 500 Product **** ---------------------------------------------- a useful source for the phreaker covering both the basics and advances of phreaking ---------------------------------------------- GENERAL NOTE ------------ The purpose of this newsletter is purely educational. It has been released in order to … Continue reading THE PHREAKER’S HANDBOOK
Category: TECH
Zen and the Art of Fone Phreaking `97
Zen and the Art of Fone Phreaking `97 bi: C拊eRpHreAk and DTMF of 4matt producti0nz b4 i get started, just remember i did not rite this phile so you people can learn preform telecommunications fraud! contrary to popular beleafs phreaking is still an art form. phreaking is a form of intelectual advancement. is just like … Continue reading Zen and the Art of Fone Phreaking `97
UNDERSTANDING THE TELEPHONE SYSTEM
-------------------------------------------------------------------------------- UNDERSTANDING THE TELEPHONE SYSTEM FROM "UNDERSTANDING COMMUNICATIONS SYSTEMS" CHAPTER 6 BY DON L. CANNON AND GERARD LUECKE TEXAS INSTRUMENTS PUBLISHING, 1984 -------------------------------------------------------------------------------- IN THE TELEPHONE SYSTEM, THE TWO-YWA COMMUNICATION IS CARRIED BY EITHER A TWO-WIRE OR A FOUR-WIRE SYSTEM. IN THE FOUR-WIRE SYSTEM ON PAIR OF WIRES IS CONNECTED FROM THE TRANSMITTER AT TELEPHONE … Continue reading UNDERSTANDING THE TELEPHONE SYSTEM
Maximize Dial-up Modem Settings
Maximize Dial-up Modem Settings Did you know that by changing a few settings you can make your dial-up modem run better? That's right—you might have a fast modem and a good connection, but you're not getting the best performance. With a few adjustments, you can get faster connection speeds. NOTE: Since every PC configuration is … Continue reading Maximize Dial-up Modem Settings
ANTI LEECH HACKING TUTORIAL
I was just asking to know if there is some audiance before here is my methode for hacking anti leech we gona use a soft calde proxo mitron proxomitron is an anti bull script web proxy it' works buy applying some rules to elliuminte pop up and many other thing but for our cas we … Continue reading ANTI LEECH HACKING TUTORIAL
ANSI Bombs II: Tips and Techniques
ANSI Bombs II: Tips and Techniques By The Raging Golem I. Introduction After writing the last file, a lot of people let me know about the mistakes I had made. I guess this file is to clear up those miscon ceptions and to let people know about some of the little tricks behind ANSI bombing. … Continue reading ANSI Bombs II: Tips and Techniques
HOW TO SEND ANONYMOUS EMAILS
Welcome to Hackerdevil's guide on how to send ANONYMOUS e-mails to someone without a prog. I am Hackerdevil and i am going to explain ya a way to send home-made e-mails. I mean its a way to send Annonimous e-mails without a program, it doesn't take to much time and its cool and you can … Continue reading HOW TO SEND ANONYMOUS EMAILS
INTRODUCTION TO DENIAL OF SERVICE
=================================== =INTRODUCTION TO DENIAL OF SERVICE= =================================== Hans Husman t95hhu@student.tdb.uu.se Last updated: Mon Oct 28 14:56:31 MET 1996 .0. FOREWORD .A. INTRODUCTION .A.1. WHAT IS A DENIAL OF SERVICE ATTACK? .A.2. WHY WOULD SOMEONE CRASH A SYSTEM? .A.2.1. INTRODUCTION .A.2.2. SUB-CULTURAL STATUS .A.2.3. TO GAIN ACCESS .A.2.4. REVENGE .A.2.5. POLITICAL REASONS .A.2.6. ECONOMICAL REASONS .A.2.7. … Continue reading INTRODUCTION TO DENIAL OF SERVICE
Advanced Shellcoding Techniques
*********************************************** * * * Advanced Shellcoding Techniques - by Darawk * * * *********************************************** Introduction This paper assumes a working knowledge of basic shellcoding techniques, and x86 assembly, I will not rehash these in this paper. I hope to teach you some of the lesser known shellcoding techniques that I have picked up, which will … Continue reading Advanced Shellcoding Techniques
A UNIX Hacking Tutorial
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + UNIX : A Hacking Tutorial + + By: Sir Hackalot + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------- o Intent of this file: ---------------------- This phile is geared as an UNIX tutorial at first, to let you get more familiar with the operating system. UNIX is just an operating system, as is MS-DOS, AppleDOS, AmigaDOS, and others. UNIX … Continue reading A UNIX Hacking Tutorial
