mozhet zagruzit' fajl nastroek Internet Explorer. Kak pravilo, v takoj fajl vklyuchayutsya nekotorye parametry raboty Internet Explorer, kasayushchiesya nachal'noj stranicy i nastroek proksi-servera. Sistema bezopasnosti Microsoft Internet Explorer V dialogovom okne Svojstva obozrevatelya cherez vkladku Bezoposnost' vy mozhete ustanovit' parametry raboty s sistemoj bezopasnosti Microsoft Internet Explorer. V Microsoft Internet Explorer imeetsya, myagko govorya, nebol'shaya lazejka, pozvolyayushchaya perekonfigurirovat' ego brandmauer, tak kak vy eto pozhelaete. Imenno cherez etot preslovutyj brandmauer vy mozhete, naprimer, bez osobogo truda vakcinirovat' sistemu. Kstati, eto mnogimi i ochen' mnogimi delalos'. Prichem, vzlom zashchity Microsoft Internet Explorer mozhet byt' osushchestvlen neskol'kimi sposobami, kazhdyj iz kotoryh sovershenno ne svyazan s predydushchimi. Microsoft Internet Explorer dazhe ne opredelit togo, kto hotel vzlomat' vashu sistemu. V etoj programme nevozmozhno opredelit' tak nazyvaemuyu zonu riska. Poetomu, imenno cherez brandmauery Microsoft Internet Explorer ishchutsya otpravnye tochki zahvata vsej sistemy. Naprimer, prostejshaya ataka programmoj rlogin cherez otdel'nyj komp'yuter bol'shoj seti pozvolyaet perecherknut' dvumya zhirnymi polosami nizhepublikuemoe opisanie opcij sistemy zashchity Microsoft Internet Explorer. Izmenenie imeni pol'zovatelya i kompanii v Windows 98 Esli vy hotite izmenit' imya pol'zovatelya i kompanii, otkrojte redaktor reestra v HKEY_LOCAL_MACHINE/ SOFTWARE/MICROSOFT/WINDOWS. Dvazhdy shchelknite levoj klavishej myshi na klyuche REGISTERED OWNER ili REGISTERED ORGINIZATION i prosto vvedite novoe imya. Ustanovka svyazi po modemu mezhdu dvumya udalennymi komp'yuterami v Windows 98 Esli vy hotite ustanovit' svyaz' po modemu mezhdu dvumya udalennymi komp'yuterami, to prezhde vsego komp'yuter, s kotorym vy pytaetes' naladit' svyaz' dolzhen byt' serverom udalennogo dostupa. (Udalennyj dostup k Soedineniya k Server udalennogo dostupa k Allow caller access). Teper' sozdajte soedinenie udalennogo dostupa i nazhmite knopku Ustanovit' svyaz'. Ustanoviv svyaz', cherez Moj komp'yuter poklyuchite k svoemu komp'yuteru dostupnyj setevoj disk ishodnogo servera udalennogo dostupa, zadav ego tak: \\\ HyperTerminal i dva udalennyh komp'yutera v Windows 98 n otkrojte programmu HyperTerminal n na odnom iz komp'yuterov otmenite zvonok n ustanovite "soedinenie" s udalennym komp'yuterom n naberite ATS0=N (N -- kolichestvo zvonkov pered snyatiem trubki), vash modem pereshel v rezhim ozhidaniya n teper' drugoj komp'yuter dolzhen nabrat' vash telefonnyj nomer Udalenie parolya v Windows 98 Dlya togo, chtoby udalit' parol', najdite fajl s rasshireniem .PWL v papke Windows, unichtozh'te ego i perezapustite sistemu. Izmenenie adresa IP bez perezagruzki sistemy v Windows 98 Esli vy hotite izmenit' adres IP bez perezagruzki sistemy, otkrojte v Redaktore reestra razdel Moj komp'yuter\HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP i sohranite etot razdel kak fajl s rasshireniem .REG. Posle etogo izmenite adres IP, otkrojte Provodnik i zapustite otredaktirovannyj takim obrazom fajl dvojnym shchelchkom klavishej myshi. Esli na ekrane poyavilos' soobshchenie "Zapisi uspeshno vneseny v reestr", to vy izmenili adres IP bez perezagruzki sistemy. Ustanovka dvuh interfejsov IP na odin setevoj adapter v Windows 98 Esli vy hotite ustanovit' dva interfejsa IP na odin setevoj adapter, prosto dobav'te eshche odin protokol TCP/IP i nastrojte ego cherez vkladku Konfiguraciya dialogovogo okna svojstv Set'. Windows 98 i modem na COM4 Pri pravil'noj ustanovke dzhamperov, sistema sposobna proizvesti pravil'nuyu konfiguraciyu vashego modema posredstvom tehnologii avtomaticheskogo raspoznavaniya ustrojstv. No inogda sluchaetsya tak, chto COM-portov ne hvataet, a vam neobhodimo ustanovit' modem. Togda ostaetsya tol'ko odno -- podklyuchit' eto ustrojstvo na tretij ili chetvertyj COM-port. Tut-to vam i nuzhno uchest' odinakovye preryvaniya IRQ. Naprimer, preryvanie chetvertogo COM-porta mozhet byt' zanyato vashim videoadapterom, a pervyj COM-port vsegda imeet v otnoshenii preryvanij bol'shij prioritet po sravneniyu s chetvertym COM-portom. Esli sistema voobshche ne vidit chetvertyj COM-port, prover'te eshche raz vse dzhampera i prosto zastav'te Windows 98 obnovit' apparatnuyu bazu dannyh. Zashchity sistemy v Windows 98 Koncepciya bezopasnosti komp'yutera podrazumevaet zashchitu vseh ego komponentov -- apparatnye sredstva i prilozheniya -- ot nesankcionirovannogo dostupa iz lokal'noj seti ili Internet. V Windows 98 lyuboj pol'zovatel' vashego komp'yutera mozhet zaregistrirovat'sya v sisteme. Pri etom imya pol'zovatelya i parol' mogut byt' takimi zhe, kak i pri vhode v set'. Koncepciya bezopasnosti v Windows 98 ves'ma primitivna. V etoj sisteme vy, kak administrator, ne mozhete sozdat' gruppu pol'zovatelej, zavesti uchetnuyu zapis' pol'zovatelya, izmenit' prava pol'zovatelya. Vmesto ves'ma prodvinutogo Dispetchera pol'zovatelej eta sistema predlagaet dovol'no prosten'koe dialogovoe okno svojstv Paroli. Vse eto, konechno zhe, oznachaet, chto Windows 98 voobshche ne obespechivaet nikakogo urovnya bezopasnosti. Vy, kak vladelec sobstvennogo komp'yutera, ne mozhete upravlyat' sobstvennymi resursam, zavodit' zhurnal sobytij, ogranichivat' dostup k tomu ili inomu resursu. Vy nichego ne mozhete! Identifikator pol'zovotelya ID? Net! |ti veshchi mozhno delat' tol'ko v Windows NT. SID! SID! SID! SID! SID! SID! SID! Zabyt' i vse tut! Nikakih kodov bezopasnosti! Dostup tol'ko v NT! Ne vy, a sama sistema mozhet sozdat' nechto, napominayushchee unikal'nuyu zapis', kotoraya identificiruet togo ili inogo pol'zovatelya vashego komp'yutera. Nikakogo kontrolya, ucheta i otslezhivaniya. Vy, konechno, administrator! No koncepciya bezopasnosti Windows 98 ne podrazumevaet tot fakt, chto vy imeete zakonnoe pravo rasporyazhat'sya resursami sobstvennogo komp'yutera. Rech' idet o tom, chto mehanizm bezaposnosti v Windows 98 realizovan tol'ko na urovne registracii pol'zovatelya. Vam predlagaetsya tak nazyvaemaya unificirovannaya registraciya. |to oznachaet, chto odnazhdy vvedennyj ekkaunt (parol' i imya pol'zovatelya) v okne registracii pri zagruzke sistemy ispol'zuetsya dlya dostupa ko vsem sluzhbam, prilozheniyam i apparatnym resursam vashego komp'yutera. Horosho podobrannyj parol', v principe, sposoben zashchitit' vashu sistemu ot proniknoveniya v nee nezhdannyh gostej. Poetomu: n nikogda ne zapisyvajte svoj parol' na bumage n ne pol'zujtes' ochevidnymi parolyami (imena, nazvaniya gorodov) n nikogda ne otpravlyajte svoj parol' po elektronnoj pochte n ispol'zujte razumnoe kolichestvo simvolov pri sostavlenii parolya, inache vy zabudete ego v odin prekrasnyj moment i ne smozhete izmenit' nikogda S pomoshch'yu vkladki Smena parolej dialogovogo okna svojstv Paroli, k kotoromu vy mozhete obratit'sya iz Paneli upravleniya posredstvom dvojnogo shchelchka klavishej myshi na znachke Paroli, izmenyayutsya parametry unificirovannoj registracii vseh resursov vashego komp'yutera posredstvom zadaniya novogo parolya pol'zovatelya. Zadat' novyj parol' mozhno cherez vkladku Nastrojka pol'zovatelya, obratit'sya k kotoroj vy mozhete posredstvom dvojnogo shchelchka klavishej myshi na piktogramme Pol'zovateli, nahodyashchejsya v Paneli upravleniya. Esli vy hotite ustanovit' zashchitu na tot ili inoj resurs vashego komp'yutera, naprimer, razdelit' dostup k fajlam i printeram, prezhde vsego, sdelajte tak, chtoby etot resurs stal razdelyaemym. Bolee podrobnuyu informaciyu vy mozhete poluchit' u sistemnogo administratora vashej kompanii. Windows 98 pozvolyaet upravlyat' resursami vashego komp'yutera pol'zovatelyam, kotorye imeyut udalennyj dostup k vashej sisteme. Dlya etogo vy dolzhny dobavit' sootvetstvuyushchuyu sluzhbu s pomoshch'yu vkladki Set', obratit'sya k kotoroj vy mozhete iz Paneli upravleniya. Tol'ko posle etogo v dialogovom okne svojstv Paroli poyavitsya novaya vkladka Udalennoe upravlenie. Naezd na web-mastera Puteshestvuya po Internet, vy, navernoe, obratili vnimanie na razlichnyj vid web-stranic. Nekotorye stranicy vyglyadyat ves'ma krasivo i do otkaza zapolneny nuzhnoj vam informaciej. Drugie -- bezobrazny, otvratitel'ny i zapolneny, kak pravilo, vsyakoj erundoj. Razrabotkoj i teh i drugih stranic zanimayutsya pol'zovateli, nazyvayushchie sebya web-dizajnerami ili web-masterami. Ponyatno, chto horoshij web-dizajn napryamuyu zavisit ot togo, kak pol'zovatel' vladeet intellektual'noj disciplinoj, nazyvaemoj web-dizajnom. Esli vy programmist, nikogda ne puskajtes' v avantyury tipa "Razrabotka web-servera". Pover'te, eto ne dlya vas. Web-dizajn -- eto daleko ne kody HTML! Imenno na etih samyh kodah zaciklivayutsya mnogie programmisty, zabyvaya pro glavnoe -- krasivyj dizajn, funkcional'nost' i soderzhanie. Professional'nyj dizajn web-stranichek i serverov WWW ne mozhet byt' vypolnen programmistom. Zachem vam nuzhen Domain Name Server Kazhdoe podrazdelenie Internet imeet dva domena. Osnovnoj DNS obychno raspolagaetsya na setevoj mashine. DNS-servera ispol'zuyut v svoih obrashcheniyah k udalennym uzlam 32-bitnye adresa IP, mnemonicheski zaklyuchennye v chetyrehrazryadnuyu bukvennuyu kombinaciyu. Lyuboj host mozhet poluchit' sootvetstvuyushchij DNS u blizhajshego informacionnogo servera DNS po izvestnoj sisteme Domain Name Server cherez setevoj protokol DNS. Prosto host posylaet zapros na izvestnyj IP-adres DNS-servera svoj IP-adres i imya servera. Server DNS shtudiruet sobstvennuyu bazu dannyh, nahodit IP-adres i otpravlyaet na host sootvetstvuyushchij otvet DNS. Shema ves'ma primitivnaya. Esli zhe server DNS ne nahodit iskomuyu bukvennuyu kombinaciyu, to on otsylaet zapros na tak nazyvaemyj kornevoj server, kotoryj, v svoyu ochered', sveryaet informaciyu s fajlom nastroek root.cache. Tak proishodit do teh por, poka imya hosta ne budet najdeno v Internet. Principy dejstviya BlueBox Upravlenie priborami na ATS (nabor nomera, sostoyanie linii) osushchestvlyaetsya postoyanym tokom. Odnako eto spravedlivo tol'ko dlya abonentskih linij i chastichno -- dlya soedinitel'nyh. V mezhuzlovoj seti, kak i v mezhdugorodnoj, stoit apparatura uplotneniya kanalov, usileniya signalov i t.p., kotoraya ne mozhet peredavat' postoyannyj tok. Odnako stancii kak-to dolzhny signalizirovat' o svoem sostoyanii drug-drugu. Dlya etoj celi primenyayut razlichnye sistemy signalizacii. Dlya dvuhprovodnoj linii naibolee udobnoj okazalas' chastotnaya signalizaciya v polose chastot telefonnogo kanala (300 -- 3500 Hz), kotoruyu propuskaet oborudovanie usileniya i uplotneniya. Uzly soedineny mezhdu soboj nekotorym kolichestvom soedinitel'nyh linij. CHtoby oboznachit', chto uzel ne zanimaet liniyu, on podaet v nee signal chastotoj 2600 Hz. Na svobodnoj linii etot signal idet s obeih storon (ot oboih uzlov). Kogda uzel hochet svyazat'sya s drugim uzlom, on dolzhen vybrat' svobodnuyu liniyu. Dlya etogo oborudovanie prosmatrivaet po ocheredi vse linii na nalichie signala 2600 Hz, postupayushchego s udalennogo uzla. Nalichie signala oznachaet, chto liniya svobodna, i uzel podklyuchaetsya k nej. Pri etom on snimaet signal 2600 Nz so svoej storony, chto oznachaet, chto liniya im zanyata. S udalennogo uzla signal 2600 Hz vse eshche postupaet v liniyu. Vy ne slyshite ego, tak kak na ego puti ustanovlen uzkopolosnyj fil'tr, "vyrezayushchij" etot ton. 2600 budet podavat'sya udalennym uzlom, poka vyzyvaemyj abonent ne snimet trubku. Nash uzel opoznaet propadanie signala s udalennogo uzla, kak priznak togo, chto razgovor nachat, i nachinaet nakruchivat' za nego babki. Po okonchanii razgovora uzel, chej abonent veshaet trubku, opyat' podaet v liniyu signal 2600 Nz, oznachayushchij, chto dannyj uzel prekratil razgovor i osvobodil liniyu. Tak rabotaet eta sistema signalizacii. Teper' predpolozhim, chto vy zvonite drugu v drugoj gorod N. Nabiraete ego nomer. Vash mezhdugorodnij uzel ishchet svobodnuyu svyaznuyu liniyu, na kotoruyu iz N podaetsya 2600 Hz. Najdya takuyu liniyu, on soedinyaet vas s nej i ubiraet so svoej storony signal 2600 Hz. Uzel goroda N ponimaet eto kak zapros nachat' svyaz'. Dalee vash uzel peredaet uzlu goroda N nomer vashego druga, i vy nakonec slyshite gudki vyzova. U druga zvonit telefon. Vse eto vremya 2600 iz goroda N postupaet na vash uzel, poetomu on ne nachislyaet poka den'gi. Teper' predpolozhim, chto my sami podali v liniyu signal 2600 Hz. Uzel goroda N "slyshit" etot ton i dumaet, chto vy u sebya povesili trubku, i vash uzel osvobodil liniyu. Sootvetsvenno on prekrashchaet vyzyvat' vashego druga, sbrasyvaet i gotovit oborudovanie k novym vyzovam (eto zanimaet ne bolee sekundy). Teper' vy perestaete podavat' ton 2600 Hz. Uzel goroda N dumaet, chto s vashego uzla prishel novyj zapros na svyaz', i gotov prinimat' nomer abonenta. Pri etom, blagodarya zvezdoobraznoj strukture seti, uzel goroda N mozhet svyazyvat'sya s drugimi gorodami i stranami, esli nabiraemyj nomer soderzhit kod strany i/ili goroda. Takim obrazom, pozvoniv snachala v sosednij gorod N i perehvativ upravlenie set'yu, vy mozhete zvonit' v lyuboe mesto, kuda smozhet "zvonit'" uzel goroda N. Pri etom vash uzel zaregistriruet tol'ko zvonok v gorod N i nichego ne budet znat' o dal'nejshih vashih dejstviyah. Znachit, po tarifu sosednego gorodka vy mozhete zvonit' prakticheski v lyubuyu stanu mira. Zvonok mozhet byt' i voobshche besplatnym, esli vy snachala nabiraete nomer kakoj-nibud' vserossijskoj besplatnoj sluzhby. S®emshchik parolej Wingrab Ves'ma interesnaya hakerskaya programma WinGrab prednaznachena dlya s®ema vsyakoj raznoj informacii s komp'yuterov, rabotayushchih pod Windows 95 ili Windows NT. |ta programma pozvolyaet otslezhivat' soderzhimoe Windows po goryachim slovam, a takzhe klaviaturnyj vvod. Informaciya sobiraetsya v lokal'nom fajle ili mozhet byt' peredana cherez Internet na ukazannyj FTP-server. Poslednyaya versiya WinGrab podderzhivaet tol'ko odno dobavochnoe slovo, no gramotnoe ego primenenie pomogaet znachitel'no uvelichit' krug snimaemoj informacii (naprimer dobavochnoe slovo "Subject:" skoree vsego pozvolit imet' vsyu perepisku donora bez zaglyadyvaniya na ego pochtovyj server). Analogichnoe primenenie mozhet najti i krakozyabla @. Sposob zapuska WinGrab na komp'yutere-donore -- ustanovka programmy s diskety. Programma principial'no ne sdelana ni v vide troyanyaca, ni v vide virusa, po raznym soobrazheniyam. Odnako ustanovka programmy s diskety optimizirovana takim obrazom, chto zanimaet vsego ot 10 do 35 sekund v zavisimosti ot nalichiya na donore neobhodimyh bibliotek. Buduchi edinozhdy ustanovlena, programma zapuskaetsya kazhdyj raz pri starte operacionnoj sistemy i vyglyadit v spiske zadach kak System. Popytki snyat' zadachu System, estestvenno, bezuspeshny, chto vvodit neopytnogo pol'zovatelya v blagoe zabluzhdenie. Primer fajla ../etc/passwd root:*:0:0:Charlie &:/root:/bin/csh toor:*:0:0:Bourne-again Superuser:/root: daemon:*:1:1:Owner of many system processes:/root:/nonexistent operator:*:2:20:System &:/usr/guest/operator:/bin/csh bin:*:3:7:Binaries Commands and Source,,,:/:/nonexistent games:*:7:13:Games pseudo-user:/usr/games:/nonexistent news:*:8:8:News Subsystem:/:/nonexistent man:*:9:9:Mister Man Pages:/usr/share/man:/nonexistent uucp:*:66:66:UUCP pseudo-user:/var/spool/uucppublic:/usr/libexec/uucp/uucico xten:*:67:67:X-10 daemon:/usr/local/xten:/nonexistent nobody:*:65534:65534:Unprivileged user:/nonexistent:/nonexistent ftp:*:14:14:Anonymous FTP Admin:/usr/ftp:/bin/date Hakerskie konferencii Otmetim, chto istochnik kazhdoj postupayushchej stat'i registriruetsya. Poetomu net nikakogo smysla unichtozhat' stat'i UUnet. |to informaciya dlya nachinayushchih hakerov. A dlya bolee umudrennyh opytom otmetim, chto ne nuzhno zahodit' v sluchajnye gruppy, metit' stat'i i stirat' soobshcheniya. |to nevezhlivo i bessmyslenno. Zachem pol'zovat'sya nesovershennymi metodami raboty Usenet?! alt.2600.hope.tech Hakery planety Zemlya. alt.comp.virus Spory po virusam. alt.cracks ZHarkie spory vzlomshchikov setej. alt.cyberpunk Uzkij krug kiberpankov. alt.cyberspace Kiberprostranstvo i kak v nem rabotat'. alt.dcom.telecom Spory otnositel'no telekommunikacij. alt.fan.lewiz Fen-klub Levisa De Pajna. alt.hackers Opisanie proektov. alt.hackers.malicious Dejstvitel'no merzkie tipy. alt.privacy.anon-server Anonimnye ataki na razlichnye servera. alt.radio.pirate Skrytye mehanizmy. alt.radio.scanner Skanirovanie radiogramm. alt.satellite.tv.europe Vse otnositel'no evropejskogo televideniya. alt.security Bezopasnost' komp'yuternyh setej. alt.security.keydist Obmen klyuchami dlya sistem deshifrovki. alt.security.pgp Pretty Good Privacy. alt.security.ripem Nelegal'naya pochta iz SSHA. comp.org.cpsr.announce Komp'yuternye professionaly. comp.org.cpsr.talk Samizdatovskie komp'yuternye izdaniya. comp.org.eff.news Novosti ot Electronic Frontiers Foundation. comp.protocols.tcp-ip Protokoly TCP i IP. comp.risks Publikacii i risk. comp.security.announce Anonsy ot CERT otnositel'no bezopasnosti. comp.security.misc Bezopasnost' setej i komp'yuterov. comp.security.unix Diskuscii po zashchite velikoj i moguchej UNIX. comp.virus Komp'yuternye virusy i bezopasnost'. rec.video.cable-tv Kabel'noe televidenie. sci.crypt. Razlichnye metody shifrovki/deshifrovki. Hakerskie sajty WWW http://www.outerlimits.net/lordsome/index.html http://web2.airmail.net/km/hfiles/free.htm http://resudox.net/bio/novell.html http://www.louisville.edu/wrbake01/hack2.html http://www.intersurf.com/~materva/files.html http://hightop.nrl.navy.mil/rainbow.html http://www.rit.edu/~jmb8902/hacking.html http://www.spatz.com/pecos/index.html http://pages.prodigy.com/FL/dtgz94a/files2.html http://www.2600.com http://att.net/dir800 http://draco.centerline.com:8080/~franl/crypto.html http://everest.cs.ucdavis.edu/Security.html http://ice-www.larc.nasa.gov/WWW/security.html http://lOpht.com http://lOpht.com/~oblivion/IIRG.html http://underground.org http://www.alw.nih.gov/WWW/security.html http://www.aspentec.com/~frzmtdb/fun/hacker.html http://www.etext.org/Zines http://www.inderect.com/www/johnk/ http://www.mgmua.com/hackers/index.html http://www.paranoia.com/mthreat http://www.paranoia.com/astrostar/fringe.html http://www.umcc.umich.edu/~doug/virus-faq.html http://www.wired.com http://all.net:8080 http://alumni.caltech.edu/~dank/isdn http://aset.rsoc.rockwell.com http://aset.rsoc.rockwell.com/exhibit.html http://att.net/dir800 http://ausg.dartmouth.edu/security.html http://csbh.mhv.net/dcypher/home.html http://cs.purdue.edu/coast/coast.html http://csrc.ncsl.nist.gov http://daemon.apana.org.au/~longi http://dhp.com/~pluvius http://everest.cs.ucdavis.edu/Security.html http://everest.cs.ucdavis.edu/slides/slides.html http://ftp.tamu.edu/~abr8030/security.html http://hightop.nrl.navy.mil/potpourri.html http://hightop.nrl.navy.mil/rainbow.html http://info.bellcore.com/BETSI/betsi.html http://infosec.nosc.mil/infosec.html http://l0pht.com http://l0pht.com/~oblivion/IIRG.html http://matrix.resnet.upenn.edu/rourke http://mindlink.jolt.com http://mls.saic.com http://motserv.indirect.com http://naic.nasa.gov/fbi/FBI_homepage.html http://nasirc.hq.nasa.gov http://obscura.com/~loki/ http://ophie.hughes.american.edu/~ophie http://oregano.sl.pitt.edu/index.htm http://pages.ripco.com:8080/~glr/glr.html http://the-tech.mit.edu http://ucs.orst.edu:8001/mintro.html http://underground.org http://unixg.ubc.ca:780/~jyee http://w3.gti.net/safety http://wintermute.itd.nrl.navy.mil/5544.html http://wiz.plymouth.edu/~jay/underground.html http://www.2600.com http://www.8lgm.org http://www.aads.net http://www.alw.nih.gov/WWW/security.html http://www.aus.xanadu.com:70/1/EFA http://www.ba.com http://www.bell.com http://www.brad.ac.uk/~nasmith/index.html http://www.bst.bls.com http://www.c3.lanl.gov/~mcn http://www.cam.org/~gagnon http://www.cert.dfn.de http://www.cpsr.org/home http://www.cs.umd.edu/~lgas http://www.csd.harris.com/secure_info.html http://www.csl.sri.com http://www.datafellows.fi http://www.dct.ac.uk/~misb3cp/2600/faq.txt http://www.digicash.com/ecash/ecash-home.html http://www.dnai.com/~gui/index.html http://www.eecs.nwu.edu/~jmyers/ids/index.html http://www.eff.org/papers.html http://www.emap.co.uk/partners/racal-airtech http://www.ensta.fr/internet/unix/sys_admin http://www.etext.org/Zines http://www.fc.net/defcon http://www.fedworld.gov http://www.first.org/first http://www.gbnet.net/kbridge http://www.ic.gov http://www.io.org/~excels http://www.indirect.com/www/johnk http://www.magi.com/~vektor/linenoiz.html http://www.mcs.com/~candyman/under.html http://www.mpr.ca http://www.net23.com http://www.netresponse.com:80/zldf http://www.nist.gov http://www.ntt.jp http://www.pacbell.com http://www.paranoia.com/astrostar/fringe.html http://www.paranoia.com/mthreat http://www.planet.net/onkeld http://www.primenet.com/~insphrk http://www.primenet.com/~kludge/haqr.html http://www.qualcomm.com/cdma/wireless.html http://www.raptor.com/raptor/raptor.html http://www.research.att.com http://www.rsa.com http://www.satelnet.org/~ccappuc http://www.seas.upenn.edu/~rourkem http://www.service.com/cm/uswest/usw1.html http://www.shore.net/~oz/welcome.html http://www.spatz.com/pecos/index.html http://www.spy.org http://www.sri.com Hakerskie sajty FTP ftp.3com.com /pub/Orange-Book ftp.acns.nwu.edu /pub ftp.alantec.com /pub/tcpr ftp.armory.com /pub/user/kmartind ftp.armory.com /pub/user/swallow ftp.auscert.org.au /pub ftp.cs.ruu.nl /pub/SECURITY ftp.cs.uwm.edu /pub/comp-privacy ftp.csi.forth.gr /pub/security ftp.csl.sri.com /pub/nides ftp.csn.org /mpj ftp.digex.net /pub/access/dunk ftp.eff.org /pub/Publications/CuD ftp.fc.net /pub/deadkat ftp.fc.net /pub/defcon ftp.fc.net /pub/defcon/BBEEP ftp.fc.net /pub/phrack ftp.funet.fi /pub/doc/CuD ftp.gate.net /pub/users/laura ftp.gate.net /pub/users/wakko ftp.giga.or.at /pub/hacker ftp.greatcircle.com /pub/firewalls ftp.IEunet.ie /pub/security ftp.inoc.dl.nec.com /pub/security ftp.io.org /pub/users/gmouser ftp.lava.net /users/oracle/ ftp.lerc.nasa.gov /security ftp.llnl.gov /pub ftp.luth.se /pub/unix/security ftp.mcs.anl.gov /pub/security ftp.microserve.net /ppp-pop/strata/mac ftp.near.net /security/archives/phrack ftp.netcom.com /pub/br/bradleym ftp.netcom.com /pub/da/daemon9 ftp.netcom.com /pub/fi/filbert ftp.netcom.com /pub/le/lewiz ftp.netcom.com /pub/va/vandal ftp.netcom.com /pub/wt/wtech ftp.netcom.com /pub/zz/zzyzx ftp.ocs.mq.edu.au /PC/Crypt ftp.ox.ac.uk /pub/comp/security ftp.ox.ac.uk /pub/crypto ftp.ox.ac.uk /pub/wordlists ftp.paranoia.com /pub/toneloc ftp.primenet.com /users/i/insphrk ftp.primenet.com /users/k/kludge ftp.primenet.com /users/s/scuzzy Luchshij hakerskij soft CHEAT ENGiNE 2.5 Prostaya programma dlya vzloma igr. Sozdaet klassnye i bystrye patchi. Cheat Machine 2.02 Programma dlya legkogo prohozhdeniya igr. Podderzhka okolo 300 izvestnyh igr. Solyusheny, taktika, kody, patchi, utility. CrackAid 3.39 Snyatie zashchity s igr. Crack Master 2.5 Vzlom zashchit prisoedinitel'nogo tipa s naibolee populyarnyh igr. Neverlock Spring 95 Vzlom zashchity s bolee 400 igr. The PATCHER 6.5 Snyatie zashchity ot kopirovaniya s bolee, chem 100 izvestnyh igrushek. Unlimited Cheats 3.0 Obman luchshih igr mira. Velikolepnyj interfejs. Rabota s mysh'yu. BRUTE 2.0 Instrumentarij dlya vzloma parolej UNIX. Claymore 1.0 Instrumentarij dlya vzloma parolej sistemy Microsoft Windows. Po bol'shomu schetu eta ves'ma udobnaya programma pozvolyaet vzlomat' prakticheski lyuboj parol'. Trebuet nalichiya standartnoj biblioteki VBRUN300.DLL Cracker Jack 1.4 Instrumentarij dlya vzloma parolej sistemy UNIX. Glide Znamenityj soft dlya vzloma PWL-fajlov sistemy Microsoft Windows. GUESS 2.1 Eshche odin instrumentarij dlya vzloma parolej sistemy UNIX. Pozvolyaet podklyuchit' slovar'. Hades 1.0 Skanirovanie i rasshifrovka parolej. Killer Cracker 9.5 Prostoj vzlomshchik parolej dlya MS DOS. NEWHACK 2.0 Soft, pozvolyayushchij obnovlyat' fajl parolej. PCUPC 2.01 Instrumentarij dlya vzloma parolej sistemy UNIX. XIT 2.0 Instrumentarij dlya vzloma parolej sistemy UNIX. CRACKer for ZIP-files 2.0 Vzlomshchik parolej v ZIP-fajlah. Fast ZIP Cracker 1.4 Vzlomshchik parolej v ZIP-fajlah. Ispol'zuet slovar' Brute Force. MS CD-Key Generator 95 Sozdanie registracionnyh klyuchej dlya Microsoft Office i Windows 95. Nagbuster 1.2d Polnost'yu avtomaticheskaya programma, kotoraya udalyaet registracionnyj musor iz mnogih shareware-programm. NONAG2 Izyashchnaya programmka, kotoraya udalyaet registracionnyj musor iz mnogih shareware-programm. Word Password Cracker Vzlom parolej v dokumentah Microsoft Word for Windows. Windows Screen Saver Cracker Vzlomshchik zaparollirovannyh ekrannyh zastavok. ZipCrack 1.0 Prostoj vzlomshchik parolej v ZIP-fajlah. HEdit32 1.2 Redaktor dvoichnyh fajlov. Neogranichennyj razmer fajla, podderzhka mehanizma drag-and-drop, poisk teksta, vyborka shriftov, podderzhka clipboard. Global Security 32-Bit 1.0 Programma, obespechivayushchaya bezopasnost' peredavaemyh dannyh. Bolee krutaya, chem znamenitaya PGP. Hide and Seek 4.1 Skryvaet dannye v fajlah GIF. ParadoX 1.01 Programma dlya shifrovaniya fajlov dannyh. Puffer 2.0 Programma dlya shifrovaniya fajlov dannyh i soobshchenij elektronnoj pochty. KOH Disk Encryption System. Zashchita zhestkogo diska i floppov posredstvom tehnologii shifrovaniya IDEA na osnove 156-bitovogo klyucha. Steganos 1.4 Ochen' udobnaya programma, pozvolyayushchaya spryatat' fajl v drugoj fajl. Podderzhka formatov BMP, VOC, WAV i ASCII, vklyuchaya dlinnye imena fajlov sistemy Windows 95. S-Tools 4.0 Maskirovka dannyh v zvukovyh ili graficheskih fajlah. Private Idaho SHifrovka lyubyh soobshchenij elektronnoj pochty. Speak Freely Soft, pozvolyayushchij zashifrovat' komp'yuter, ispol'zuya chelovecheskij golos. Apex 1.00 Osnovnaya programma, pozvolyayushchaya sozdavat' fiktivnyj dostup cherez prostoj nabor telefonnogo nomera. BlueBEEP! Luchshaya tonovaya zvonilka. CyberPHREAK 1.0 Zvonilka, rabotayushchaya v fonovom rezhime. Podderzhka naibolee populyarnyh zvukovyh kart. Fear's Phreaker Tools 2.3 Frikerskaya utilita dlya tonov Red Box Tones. Rabotaet v Windows. Phone Tag 1.3 Tonovaya zvonilka dlya Windows. PhreakMaster 1.0 Udobnaya zvonilka. ToneLoc 1.10 Udobnyj DOS-terminal, pozvolyayushchij ves'ma effektivno atakovat' komp'yuternye seti. ToneLoc Utilities Utility k ToneLoc. Prostejshij terminal, pozvolyayushchij ves'ma effektivno atakovat' komp'yuternye seti. Z-Hacker 3.21 Velikolepnaya frikerskaya programma. Bomb 2.0 Soft, pozvolyayushchij ves'ma effektivno posylat' v set' fal'shivye soobshcheniya elektronnoj pochty. CreditMaster 4.0 Generaciya fal'shivogo ekkaunta dlya kreditnoj kartochki. FakeCD 1.0 Immitaciya ustrojstva CD ROM posredstvom sozdaniya otdel'noj direktorii na zhestkom diske. IP-Scan 1.02 Ishodnik na C dlya skanirovaniya adresov IP. KeyLogger 95 Programma, pozvolyayushchaya zapisyvat' v otdel'nyj fajl lyubye nazhatiya klaviatury. KeyTrap 3.0 Ochen' effektivnaya programma, pozvolyayushchaya zapisyvat' v otdel'nyj fajl lyubye nazhatiya klaviatury. No Where Utilities 2.0 Trinadcat' hakerskih utilit. News You Can Use 6.0 Odno iz luchshih elektronnyh izdanij hakerskih sovetov i rekomendacij. The Pirates Friend 2.6 Kollekciya serijnyh nomerov. UNP 4.10 Razarhivirovanie fajlov, szhatyh programmami DIET, EXEPACK, LZEXE, PKLITE i TASM.EXE TLINK.EXE Mgnovennoe proizvodstvo virusov. Kit 1.0 Inficirovanie EXE-fajlov, proizvodstvo troyanskih konej, shifrovanie vsego i vsya, sozdanie fiktivnyh oshibok obrabotki, infekciya fajla COMMAND.COM i mnogoe drugoe. Nebol'shoj spisok setevyh "ulybok" :-) Samaya obychnaya hohma. ;-) Hohma s podmigivaniem. :-( Hmuraya fizionomiya. :-I Nikakoe vyrazhenie lica. :-/ Skepticheskoe vyrazhenie. :-X Molchit. :-Q Kurit. :-R Vysovyvaet yayk. :-{ Ucatyj sobesednik. B-) Noshu ochki. %-) Dolgo smotryu na etot ekpan. Spisok rossijskih DNIC 2500 ROSPAC 2501 POSPRINT 2502 IASNET 2503 MMTEL 2504 INFOTEL 2506 ROSNET 2508 TRANSINFORM 2510 SOVAMNET 2511 |DITRANS 2512 T|KOS 2513 PTT-TELEPORT Spisok BBS, rabotayushchih chepez telnet ADDICTED chatline telnet sun1.gwent.ac.uk 6666 AIDS Database telnet debra.dgbt.doc.ca 3000 Air Pollution BBS telnet ttnbbs.rtpnc.epa.gov Amateur Callsign Server telnet cs.buffalo.edu 2000 Archeological Database telnet cast.uark.edu (login:nadb) Archie ftp directory search telnet archie.sura.net (login: qarchie) Aviation Weather telnet duats.gtefsd.com Bible Search telnet quake.think.com (login: WAIS) Book Stacks Unlimited telnet books.com Bridge telnet 140.117.11.33 (login okbridge) CapAccess Network telnet cap.gwu.edu CASS - Space Studies telnet cass.jsc.nasa.gov (login: cass pw: online) CD Connection telnet cdconnection.com Chess telnet 128.111.246.2 5000 CompuServe telnet compuserve.com Connection music store telnet zen.holonet.net (login: cdc) Dictionary telnet 129.79.254.191 2627 Diku-MUD telnet skypoint.com 4000 Employment database telnet career.com Epilepsy Database telnet debra.dgbt.doc.ca 3000 Fedworld BBS telnet fedworld.gov FIFE Satellite dB telnet pldsg3.gsfc.nasa.gov (login: FIFEUSER) Free-Net Buffalo telnet freenet.buffalo.edu Free-Net Cleveland telnet freenet-in-a.cwru.edu Free-Net Dayton telnet 130.108.128.74 Games telnet castor.tat.physik.uni-tuebingen.de Geography Server telnet martini.eecs.umich.edu 3000 Gopher Public server telnet consultant.micro.umn.edu GSA contract info telnet netmark.com (login: netmark) Land Use maps telnet 152.61.192.54 Law Library telnet 137.113.10.35 MLB Schedules telnet culine.colorado.edu 862 NBA Schedules telnet culine.colorado.edu 859 NBS Time Service telnet nessie.cc.wwu.edu (login: LIBS) Netline Flagship BBS telnet fcsbbs.netline.co.za NTIA Information telnet ntiabbs.ntia.doc.gov Periodic Table telnet camms2.caos.kun.nl Periodicals Index/reprints telnet database.carl.org Poetry 17-18C dB telnet bcmsv.leeds.ac.uk (login: bcmsv) Quotes telnet astro.temple.edu 12345 Shakespeare Database telnet library.dartmouth.edu Smiley database telnet twinbrook.cis.uab.edu 3399 Spanish-English Dictionary telnet gopher.sc.ehu.es 4444 Stock Market Reports telnet 192.160.13.1 Stock Market Reports telnet a2i.rahul.net Stock Quotes ($) telnet quote.com Subway Maps telnet metro.jussieu.fr 10000 SVPAL telnet svpal.org Tallahasee Free-Net telnet freenet.fsu.edu Telephone Directories telnet dfw.net TinyTIM MUD telnet yay.tim.org 5440 TrekMOO MUD telnet 192.204.120.2 2499 TrekMOO MUD telnet trekmoo.microserve.com 2499 TrekMOO MUD+ telnet 192.204.120.2 2499 TV & Radio Transcripts telnet pac.carl.org USA Today telnet 129.22.8.51 USGS Land Info System telnet glis.cr.usgs.gov WAIS telnet quake.think.com (login: wais) Spisok vseh knig Rainbow Orange 1 D.O.D. Trusted Computer Systems. Green D.O.D. Password Management. Yellow Computer Security Requirements. Yellow 2 Computer Security Requirements. Tan Understanding Audit In Trusted Systems. Bright Blue Trusted Product Evaluation. Neon Orange Understanding Discretionary Access. Teal Green Glossary Of Computer Terms. Orange 2 Understanding Configurations. Red Interpretation Of Evaluation. Burgundy Understanding Design Documentation. Dark Lavender Understanding Trusted Distrobution. Venice Blue Computer Security Sub-Systems. Aqua Understanding Security Modeling. Dark Red Interpretations Of Environments. Pink Rating Maintenence Phase. Purple Formal Verification Systems. Brown Understanding Trusted Facilities. Yellow-Green Writing Trusted Facility Manuals. Light Blue Understanding Identification And Authentication In Trusted Systems. Blue Product Evaluation Questionaire. Gray Selecting Access Control List. Lavander Data Base Management Interpretation. Yellow 3 Understanding Trusted Recovery. Bright Orange Understanding Security Testing. Purple 1 Guide To System Procurement. Purple 2 Guide To System Procurement. Purple 3 Guide To System Procurement. Purple 4 Guide To System Procurement. Green Understanding Data Remanence Hot Peach Writing Security Features. Turquiose Understanding Information Security. Violet Controlled Access Protection. Light Pink Understanding Covert Channels. Hakerskie akronimy ACL Access Control List AN Associated Number ARSB Automated Repair Service Bureau ATH Abbreviated Trouble History BOC Bell Operating Company BOR Basic Output Report BOSS Business Office Servicing System CA Cable COE Central Office Equipment CMC Construction Maintenance Center CNID Calling Number IDentification CO Central Office DDD Direct Distance Dialing ECC Enter Cable Change LD Long Distance LMOS Loop Maintenance Operations System MLT Mechanized Loop Testing NPA Numbering Plan Area POTS Plain Old Telephone Service RBOC Regional Bell Operating Company RSB Repair Service Bureau SS Special Service TAS Telephone Answering Service TH Trouble History TREAT Trouble Report Evaluation and Analysis Tool LOD Legion of Doom HFC Hell Fire Club TNO The New Order ACiD Ansi Creators in Demand Cci Cybercrime International FLT Fairlight iCE Insane Creators Enterprise iNC International Network of Crackers NTA The Nocturnal Trading Alliance PDX Paradox PE Public Enemy PSY Psychose QTX Quartex RZR Razor (1911) S!P Supr!se Productions TDT The Dream Team THG The Humble Guys THP The Hill People TRSI Tristar Red Sector Inc. UUDW Union of United Death Workers Slovar' yunogo hakera Bit Minimal'naya edinica izmereniya informacii (0 ili 1). Polubajt 4 bita. Bajt Tozhe, chto i bit, tol'ko v 8 raz bol'she. Kilo Tozhe, chto i bajt, tol'ko v 1024 raza bol'she. Meg Tozhe, chto i kilo, tol'ko v 1024 raza bol'she. Gig Tozhe, chto i meg, tol'ko v 1024 raza bol'she. Haker CHelovek, ne myslyashchij sebya bez komp'yutera. Mozgi Operativnaya pamyat' komp'yutera. Izmeryaetsya v kilo/megabajtah. Linejka Nabor mikroshem v kolichestve vos'mi shtuk. Kasha Cach-pamyat'. ZHelezo Hardware. Bebeska Bulleten Board System. Vint Vinchester. ZHestkij disk. Nositel' informacii. Matras Vinchester firmy MAXTOR. Trehdyujmovka i pyatidyujmovka Gibkij magnitnyj disk razmerom v 3 i 5 dyujmov sootvetstvenno. Flopper Ustrojstvo dlya schityvaniya informacii s gibkih diskov. Komp Personal'nyj komp'yuter. Klava Klaviatura. Klacnut' pedal'yu, toptat' knopku, nazhat' na klavishu. Progsy Komp'yuternye programmy. Zakinut' na disk Zapisat' informaciyu na magnitnyj nositel'. Korobok Korpus komp'yutera. Gama Igra. Kreknut', lomanut', haknut', vzorvat' gamu Vskryt' igru i izmenit' v nej dannye po svoemu usmotreniyu. Kryakalka Programma dlya vskrytiya programm. Blaster, Liba, Gus' Tipy muzykal'nyh adapterov. Bima Narodnoe nazvanie komp'yutera firmy IBM. Mak Narodnoe nazvanie komp'yutera firmy Apple Macintosh. Dvojka, trojka, chetverka Pervye cifry modelej personal'nyh komp'yuterov firmy IBM. Hata Komp'yuter firmy IBM klassa XT. Pentyuh Komp'yuter IBM Pentium. Virusyaka Komp'yuternyj virus. CHajnik CHelovek, ne smyslyashchij pochti nichego v komp'yuternyh tehnologiyah. B