mozhet zagruzit' fajl nastroek Internet Explorer. Kak pravilo, v takoj
fajl vklyuchayutsya nekotorye parametry raboty Internet Explorer, kasayushchiesya
nachal'noj stranicy i nastroek proksi-servera.
Sistema bezopasnosti Microsoft Internet Explorer
V dialogovom okne Svojstva obozrevatelya cherez vkladku Bezoposnost' vy
mozhete ustanovit' parametry raboty s sistemoj bezopasnosti Microsoft
Internet Explorer.
V Microsoft Internet Explorer imeetsya, myagko govorya, nebol'shaya lazejka,
pozvolyayushchaya perekonfigurirovat' ego brandmauer, tak kak vy eto pozhelaete.
Imenno cherez etot preslovutyj brandmauer vy mozhete, naprimer, bez osobogo
truda vakcinirovat' sistemu. Kstati, eto mnogimi i ochen' mnogimi delalos'.
Prichem, vzlom zashchity Microsoft Internet Explorer mozhet byt' osushchestvlen
neskol'kimi sposobami, kazhdyj iz kotoryh sovershenno ne svyazan s predydushchimi.
Microsoft Internet Explorer dazhe ne opredelit togo, kto hotel vzlomat' vashu
sistemu. V etoj programme nevozmozhno opredelit' tak nazyvaemuyu zonu riska.
Poetomu, imenno cherez brandmauery Microsoft Internet Explorer ishchutsya
otpravnye tochki zahvata vsej sistemy. Naprimer, prostejshaya ataka programmoj
rlogin cherez otdel'nyj komp'yuter bol'shoj seti pozvolyaet perecherknut' dvumya
zhirnymi polosami nizhepublikuemoe opisanie opcij sistemy zashchity Microsoft
Internet Explorer.
Izmenenie imeni pol'zovatelya i kompanii v Windows 98
Esli vy hotite izmenit' imya pol'zovatelya i kompanii, otkrojte redaktor
reestra v HKEY_LOCAL_MACHINE/
SOFTWARE/MICROSOFT/WINDOWS. Dvazhdy shchelknite levoj klavishej myshi na
klyuche REGISTERED OWNER ili
REGISTERED ORGINIZATION i prosto vvedite novoe imya.
Ustanovka svyazi po modemu mezhdu dvumya udalennymi komp'yuterami v Windows
98
Esli vy hotite ustanovit' svyaz' po modemu mezhdu dvumya udalennymi
komp'yuterami, to prezhde vsego komp'yuter, s kotorym vy pytaetes' naladit'
svyaz' dolzhen byt' serverom udalennogo dostupa. (Udalennyj dostup k
Soedineniya k Server udalennogo dostupa k Allow caller access).
Teper' sozdajte soedinenie udalennogo dostupa i nazhmite knopku
Ustanovit' svyaz'.
Ustanoviv svyaz', cherez Moj komp'yuter poklyuchite k svoemu komp'yuteru
dostupnyj setevoj disk ishodnogo servera udalennogo dostupa, zadav ego tak:
\\\
HyperTerminal i dva udalennyh komp'yutera v Windows 98
n otkrojte programmu HyperTerminal
n na odnom iz komp'yuterov otmenite zvonok
n ustanovite "soedinenie" s udalennym komp'yuterom
n naberite ATS0=N (N -- kolichestvo zvonkov pered
snyatiem trubki), vash modem pereshel v rezhim ozhidaniya
n teper' drugoj komp'yuter dolzhen nabrat' vash telefonnyj
nomer
Udalenie parolya v Windows 98
Dlya togo, chtoby udalit' parol', najdite fajl s rasshireniem .PWL v papke
Windows, unichtozh'te ego i perezapustite sistemu.
Izmenenie adresa IP bez perezagruzki sistemy v Windows 98
Esli vy hotite izmenit' adres IP bez perezagruzki sistemy, otkrojte v
Redaktore reestra razdel Moj
komp'yuter\HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP i
sohranite etot razdel kak fajl s rasshireniem .REG. Posle etogo izmenite
adres IP, otkrojte Provodnik i zapustite otredaktirovannyj takim obrazom
fajl dvojnym shchelchkom klavishej myshi. Esli na ekrane poyavilos' soobshchenie
"Zapisi uspeshno vneseny v reestr", to vy izmenili adres IP bez perezagruzki
sistemy.
Ustanovka dvuh interfejsov IP na odin setevoj adapter v Windows 98
Esli vy hotite ustanovit' dva interfejsa IP na odin setevoj adapter,
prosto dobav'te eshche odin protokol TCP/IP i nastrojte ego cherez vkladku
Konfiguraciya dialogovogo okna svojstv Set'.
Windows 98 i modem na COM4
Pri pravil'noj ustanovke dzhamperov, sistema sposobna proizvesti
pravil'nuyu konfiguraciyu vashego modema posredstvom tehnologii avtomaticheskogo
raspoznavaniya ustrojstv. No inogda sluchaetsya tak, chto COM-portov ne hvataet,
a vam neobhodimo ustanovit' modem. Togda ostaetsya tol'ko
odno -- podklyuchit' eto ustrojstvo na tretij ili chetvertyj
COM-port. Tut-to vam i nuzhno uchest' odinakovye preryvaniya IRQ.
Naprimer, preryvanie chetvertogo COM-porta mozhet byt' zanyato vashim
videoadapterom, a pervyj COM-port vsegda imeet v otnoshenii preryvanij
bol'shij prioritet po sravneniyu s chetvertym COM-portom.
Esli sistema voobshche ne vidit chetvertyj COM-port, prover'te eshche raz vse
dzhampera i prosto zastav'te Windows 98 obnovit' apparatnuyu bazu dannyh.
Zashchity sistemy v Windows 98
Koncepciya bezopasnosti komp'yutera podrazumevaet zashchitu vseh ego
komponentov -- apparatnye sredstva i prilozheniya -- ot nesankcionirovannogo
dostupa iz lokal'noj seti ili Internet. V Windows 98 lyuboj pol'zovatel'
vashego komp'yutera mozhet zaregistrirovat'sya v sisteme. Pri etom imya
pol'zovatelya i parol' mogut byt' takimi zhe, kak i pri vhode v set'.
Koncepciya bezopasnosti v Windows 98 ves'ma primitivna. V etoj sisteme
vy, kak administrator, ne mozhete sozdat' gruppu pol'zovatelej, zavesti
uchetnuyu zapis' pol'zovatelya, izmenit' prava pol'zovatelya. Vmesto ves'ma
prodvinutogo Dispetchera pol'zovatelej eta sistema predlagaet dovol'no
prosten'koe dialogovoe okno svojstv Paroli.
Vse eto, konechno zhe, oznachaet, chto Windows 98 voobshche ne obespechivaet
nikakogo urovnya bezopasnosti. Vy, kak vladelec sobstvennogo komp'yutera, ne
mozhete upravlyat' sobstvennymi resursam, zavodit' zhurnal sobytij,
ogranichivat' dostup k tomu ili inomu resursu. Vy nichego ne mozhete!
Identifikator pol'zovotelya ID? Net! |ti veshchi mozhno delat' tol'ko v
Windows NT. SID! SID! SID! SID! SID! SID! SID! Zabyt' i vse tut!
Nikakih kodov bezopasnosti! Dostup tol'ko v NT!
Ne vy, a sama sistema mozhet sozdat' nechto, napominayushchee unikal'nuyu
zapis', kotoraya identificiruet togo ili inogo pol'zovatelya vashego
komp'yutera.
Nikakogo kontrolya, ucheta i otslezhivaniya.
Vy, konechno, administrator! No koncepciya bezopasnosti Windows 98 ne
podrazumevaet tot fakt, chto vy imeete zakonnoe pravo rasporyazhat'sya resursami
sobstvennogo komp'yutera.
Rech' idet o tom, chto mehanizm bezaposnosti v Windows 98 realizovan
tol'ko na urovne registracii pol'zovatelya.
Vam predlagaetsya tak nazyvaemaya unificirovannaya registraciya. |to
oznachaet, chto odnazhdy vvedennyj ekkaunt (parol' i imya pol'zovatelya) v okne
registracii pri zagruzke sistemy ispol'zuetsya dlya dostupa ko vsem sluzhbam,
prilozheniyam i apparatnym resursam vashego komp'yutera.
Horosho podobrannyj parol', v principe, sposoben zashchitit' vashu sistemu
ot proniknoveniya v nee nezhdannyh gostej. Poetomu:
n nikogda ne zapisyvajte svoj parol' na bumage
n ne pol'zujtes' ochevidnymi parolyami
(imena, nazvaniya gorodov)
n nikogda ne otpravlyajte svoj parol' po elektronnoj
pochte
n ispol'zujte razumnoe kolichestvo simvolov pri
sostavlenii parolya, inache vy zabudete ego v odin
prekrasnyj moment i ne smozhete izmenit' nikogda
S pomoshch'yu vkladki Smena parolej dialogovogo okna svojstv Paroli, k
kotoromu vy mozhete obratit'sya iz Paneli upravleniya posredstvom dvojnogo
shchelchka klavishej myshi na znachke Paroli, izmenyayutsya parametry unificirovannoj
registracii vseh resursov vashego komp'yutera posredstvom zadaniya novogo
parolya pol'zovatelya.
Zadat' novyj parol' mozhno cherez vkladku Nastrojka pol'zovatelya,
obratit'sya k kotoroj vy mozhete posredstvom dvojnogo shchelchka klavishej myshi na
piktogramme Pol'zovateli, nahodyashchejsya v Paneli upravleniya.
Esli vy hotite ustanovit' zashchitu na tot ili inoj resurs vashego
komp'yutera, naprimer, razdelit' dostup k fajlam i printeram, prezhde vsego,
sdelajte tak, chtoby etot resurs stal razdelyaemym.
Bolee podrobnuyu informaciyu vy mozhete poluchit' u sistemnogo
administratora vashej kompanii.
Windows 98 pozvolyaet upravlyat' resursami vashego komp'yutera
pol'zovatelyam, kotorye imeyut udalennyj dostup k vashej sisteme. Dlya etogo vy
dolzhny dobavit' sootvetstvuyushchuyu sluzhbu s pomoshch'yu vkladki Set', obratit'sya k
kotoroj vy mozhete iz Paneli upravleniya. Tol'ko posle etogo v dialogovom okne
svojstv Paroli poyavitsya novaya vkladka Udalennoe upravlenie.
Naezd na web-mastera
Puteshestvuya po Internet, vy, navernoe, obratili vnimanie na razlichnyj
vid web-stranic. Nekotorye stranicy vyglyadyat ves'ma krasivo i do otkaza
zapolneny nuzhnoj vam informaciej. Drugie -- bezobrazny, otvratitel'ny i
zapolneny, kak pravilo, vsyakoj erundoj. Razrabotkoj i teh i drugih stranic
zanimayutsya pol'zovateli, nazyvayushchie sebya web-dizajnerami ili web-masterami.
Ponyatno, chto horoshij web-dizajn napryamuyu zavisit ot togo, kak pol'zovatel'
vladeet intellektual'noj disciplinoj, nazyvaemoj web-dizajnom.
Esli vy programmist, nikogda ne puskajtes' v avantyury tipa "Razrabotka
web-servera". Pover'te, eto ne dlya vas. Web-dizajn -- eto daleko ne kody
HTML! Imenno na etih samyh kodah zaciklivayutsya mnogie programmisty, zabyvaya
pro
glavnoe -- krasivyj dizajn, funkcional'nost' i soderzhanie.
Professional'nyj dizajn web-stranichek i serverov WWW ne mozhet byt' vypolnen
programmistom.
Zachem vam nuzhen Domain Name Server
Kazhdoe podrazdelenie Internet imeet dva domena. Osnovnoj DNS obychno
raspolagaetsya na setevoj mashine.
DNS-servera ispol'zuyut v svoih obrashcheniyah k udalennym uzlam 32-bitnye
adresa IP, mnemonicheski zaklyuchennye v chetyrehrazryadnuyu bukvennuyu kombinaciyu.
Lyuboj host mozhet poluchit' sootvetstvuyushchij DNS u blizhajshego informacionnogo
servera DNS po izvestnoj sisteme Domain Name Server cherez setevoj protokol
DNS. Prosto host posylaet zapros na izvestnyj IP-adres DNS-servera svoj
IP-adres i imya servera. Server DNS shtudiruet sobstvennuyu bazu dannyh,
nahodit IP-adres i otpravlyaet na host sootvetstvuyushchij otvet DNS. Shema
ves'ma primitivnaya. Esli zhe server DNS ne nahodit iskomuyu bukvennuyu
kombinaciyu, to on otsylaet zapros na tak nazyvaemyj kornevoj server,
kotoryj, v svoyu ochered', sveryaet informaciyu s fajlom nastroek root.cache.
Tak proishodit do teh por, poka imya hosta ne budet najdeno v Internet.
Principy dejstviya BlueBox
Upravlenie priborami na ATS (nabor nomera, sostoyanie linii)
osushchestvlyaetsya postoyanym tokom. Odnako eto spravedlivo tol'ko dlya
abonentskih linij i chastichno -- dlya soedinitel'nyh. V mezhuzlovoj seti, kak i
v mezhdugorodnoj, stoit apparatura uplotneniya kanalov, usileniya signalov i
t.p., kotoraya ne mozhet peredavat' postoyannyj tok. Odnako stancii kak-to
dolzhny signalizirovat' o svoem sostoyanii drug-drugu. Dlya etoj celi primenyayut
razlichnye sistemy signalizacii. Dlya dvuhprovodnoj linii naibolee udobnoj
okazalas' chastotnaya signalizaciya v polose chastot telefonnogo kanala (300 --
3500 Hz), kotoruyu propuskaet oborudovanie usileniya i uplotneniya.
Uzly soedineny mezhdu soboj nekotorym kolichestvom soedinitel'nyh linij.
CHtoby oboznachit', chto uzel ne zanimaet liniyu, on podaet v nee signal
chastotoj 2600 Hz. Na svobodnoj linii etot signal idet s obeih storon (ot
oboih uzlov). Kogda uzel hochet svyazat'sya s drugim uzlom, on dolzhen vybrat'
svobodnuyu liniyu. Dlya etogo oborudovanie prosmatrivaet po ocheredi vse linii
na nalichie signala 2600 Hz, postupayushchego s udalennogo uzla. Nalichie signala
oznachaet, chto liniya svobodna, i uzel podklyuchaetsya k nej. Pri etom on snimaet
signal 2600 Nz so svoej storony, chto oznachaet, chto liniya im zanyata.
S udalennogo uzla signal 2600 Hz vse eshche postupaet v liniyu. Vy ne
slyshite ego, tak kak na ego puti ustanovlen uzkopolosnyj fil'tr,
"vyrezayushchij" etot ton. 2600 budet podavat'sya udalennym uzlom, poka
vyzyvaemyj abonent ne snimet trubku. Nash uzel opoznaet propadanie signala s
udalennogo uzla, kak priznak togo, chto razgovor nachat, i nachinaet
nakruchivat' za nego babki. Po okonchanii razgovora uzel, chej abonent veshaet
trubku, opyat' podaet v liniyu signal 2600 Nz, oznachayushchij, chto dannyj uzel
prekratil razgovor i osvobodil liniyu. Tak rabotaet eta sistema signalizacii.
Teper' predpolozhim, chto vy zvonite drugu v drugoj gorod N. Nabiraete
ego nomer. Vash mezhdugorodnij uzel ishchet svobodnuyu svyaznuyu liniyu, na kotoruyu
iz N podaetsya 2600 Hz. Najdya takuyu liniyu, on soedinyaet vas s nej i ubiraet
so svoej storony signal 2600 Hz. Uzel goroda N ponimaet eto kak zapros
nachat' svyaz'. Dalee vash uzel peredaet uzlu goroda N nomer vashego druga, i vy
nakonec slyshite gudki vyzova. U druga zvonit telefon. Vse eto vremya 2600 iz
goroda N postupaet na vash uzel, poetomu on ne nachislyaet poka den'gi. Teper'
predpolozhim, chto my sami podali v liniyu signal 2600 Hz. Uzel goroda N
"slyshit" etot ton i dumaet, chto vy u sebya povesili trubku, i vash uzel
osvobodil liniyu. Sootvetsvenno on prekrashchaet vyzyvat' vashego druga,
sbrasyvaet i gotovit oborudovanie k novym vyzovam (eto zanimaet ne bolee
sekundy). Teper' vy perestaete podavat' ton 2600 Hz. Uzel goroda N dumaet,
chto s vashego uzla prishel novyj zapros na svyaz', i gotov prinimat' nomer
abonenta. Pri etom, blagodarya zvezdoobraznoj strukture seti, uzel goroda N
mozhet svyazyvat'sya s drugimi gorodami i stranami, esli nabiraemyj nomer
soderzhit kod strany i/ili goroda.
Takim obrazom, pozvoniv snachala v sosednij gorod N i perehvativ
upravlenie set'yu, vy mozhete zvonit' v lyuboe mesto, kuda smozhet "zvonit'"
uzel goroda N. Pri etom vash uzel zaregistriruet tol'ko zvonok v gorod N i
nichego ne budet znat' o dal'nejshih vashih dejstviyah. Znachit, po tarifu
sosednego gorodka vy mozhete zvonit' prakticheski v lyubuyu stanu mira. Zvonok
mozhet byt' i voobshche besplatnym, esli vy snachala nabiraete nomer kakoj-nibud'
vserossijskoj besplatnoj sluzhby.
S®emshchik parolej Wingrab
Ves'ma interesnaya hakerskaya programma WinGrab prednaznachena dlya s®ema
vsyakoj raznoj informacii s komp'yuterov, rabotayushchih pod Windows 95 ili
Windows NT. |ta programma pozvolyaet otslezhivat' soderzhimoe Windows po
goryachim slovam, a takzhe klaviaturnyj vvod. Informaciya sobiraetsya v lokal'nom
fajle ili mozhet byt' peredana cherez Internet na ukazannyj FTP-server.
Poslednyaya versiya WinGrab podderzhivaet tol'ko odno dobavochnoe slovo, no
gramotnoe ego primenenie pomogaet znachitel'no uvelichit' krug snimaemoj
informacii (naprimer dobavochnoe slovo "Subject:" skoree vsego pozvolit imet'
vsyu perepisku donora bez zaglyadyvaniya na ego pochtovyj server). Analogichnoe
primenenie mozhet najti i krakozyabla @.
Sposob zapuska WinGrab na komp'yutere-donore -- ustanovka programmy s
diskety. Programma principial'no ne sdelana ni v vide troyanyaca, ni v vide
virusa, po raznym soobrazheniyam. Odnako ustanovka programmy s diskety
optimizirovana takim obrazom, chto zanimaet vsego ot 10 do 35 sekund v
zavisimosti ot nalichiya na donore neobhodimyh bibliotek.
Buduchi edinozhdy ustanovlena, programma zapuskaetsya kazhdyj raz pri
starte operacionnoj sistemy i vyglyadit v spiske zadach kak System. Popytki
snyat' zadachu System, estestvenno, bezuspeshny, chto vvodit neopytnogo
pol'zovatelya v blagoe zabluzhdenie.
Primer fajla ../etc/passwd
root:*:0:0:Charlie &:/root:/bin/csh
toor:*:0:0:Bourne-again Superuser:/root:
daemon:*:1:1:Owner of many system processes:/root:/nonexistent
operator:*:2:20:System &:/usr/guest/operator:/bin/csh
bin:*:3:7:Binaries Commands and Source,,,:/:/nonexistent
games:*:7:13:Games pseudo-user:/usr/games:/nonexistent
news:*:8:8:News Subsystem:/:/nonexistent
man:*:9:9:Mister Man Pages:/usr/share/man:/nonexistent
uucp:*:66:66:UUCP
pseudo-user:/var/spool/uucppublic:/usr/libexec/uucp/uucico
xten:*:67:67:X-10 daemon:/usr/local/xten:/nonexistent
nobody:*:65534:65534:Unprivileged user:/nonexistent:/nonexistent
ftp:*:14:14:Anonymous FTP Admin:/usr/ftp:/bin/date
Hakerskie konferencii
Otmetim, chto istochnik kazhdoj postupayushchej stat'i registriruetsya. Poetomu
net nikakogo smysla unichtozhat' stat'i UUnet. |to informaciya dlya nachinayushchih
hakerov. A dlya bolee umudrennyh opytom otmetim, chto ne nuzhno zahodit' v
sluchajnye gruppy, metit' stat'i i stirat' soobshcheniya. |to nevezhlivo i
bessmyslenno. Zachem pol'zovat'sya nesovershennymi metodami raboty Usenet?!
alt.2600.hope.tech
Hakery planety Zemlya.
alt.comp.virus
Spory po virusam.
alt.cracks
ZHarkie spory vzlomshchikov setej.
alt.cyberpunk
Uzkij krug kiberpankov.
alt.cyberspace
Kiberprostranstvo i kak v nem rabotat'.
alt.dcom.telecom
Spory otnositel'no telekommunikacij.
alt.fan.lewiz
Fen-klub Levisa De Pajna.
alt.hackers
Opisanie proektov.
alt.hackers.malicious
Dejstvitel'no merzkie tipy.
alt.privacy.anon-server
Anonimnye ataki na razlichnye servera.
alt.radio.pirate
Skrytye mehanizmy.
alt.radio.scanner
Skanirovanie radiogramm.
alt.satellite.tv.europe
Vse otnositel'no evropejskogo televideniya.
alt.security
Bezopasnost' komp'yuternyh setej.
alt.security.keydist
Obmen klyuchami dlya sistem deshifrovki.
alt.security.pgp
Pretty Good Privacy.
alt.security.ripem
Nelegal'naya pochta iz SSHA.
comp.org.cpsr.announce
Komp'yuternye professionaly.
comp.org.cpsr.talk
Samizdatovskie komp'yuternye izdaniya.
comp.org.eff.news
Novosti ot Electronic Frontiers Foundation.
comp.protocols.tcp-ip
Protokoly TCP i IP.
comp.risks
Publikacii i risk.
comp.security.announce
Anonsy ot CERT otnositel'no bezopasnosti.
comp.security.misc
Bezopasnost' setej i komp'yuterov.
comp.security.unix
Diskuscii po zashchite velikoj i moguchej UNIX.
comp.virus
Komp'yuternye virusy i bezopasnost'.
rec.video.cable-tv
Kabel'noe televidenie.
sci.crypt.
Razlichnye metody shifrovki/deshifrovki.
Hakerskie sajty WWW
http://www.outerlimits.net/lordsome/index.html
http://web2.airmail.net/km/hfiles/free.htm
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com
http://all.net:8080
http://alumni.caltech.edu/~dank/isdn
http://aset.rsoc.rockwell.com
http://aset.rsoc.rockwell.com/exhibit.html
http://att.net/dir800
http://ausg.dartmouth.edu/security.html
http://csbh.mhv.net/dcypher/home.html
http://cs.purdue.edu/coast/coast.html
http://csrc.ncsl.nist.gov
http://daemon.apana.org.au/~longi
http://dhp.com/~pluvius
http://everest.cs.ucdavis.edu/Security.html
http://everest.cs.ucdavis.edu/slides/slides.html
http://ftp.tamu.edu/~abr8030/security.html
http://hightop.nrl.navy.mil/potpourri.html
http://hightop.nrl.navy.mil/rainbow.html
http://info.bellcore.com/BETSI/betsi.html
http://infosec.nosc.mil/infosec.html
http://l0pht.com
http://l0pht.com/~oblivion/IIRG.html
http://matrix.resnet.upenn.edu/rourke
http://mindlink.jolt.com
http://mls.saic.com
http://motserv.indirect.com
http://naic.nasa.gov/fbi/FBI_homepage.html
http://nasirc.hq.nasa.gov
http://obscura.com/~loki/
http://ophie.hughes.american.edu/~ophie
http://oregano.sl.pitt.edu/index.htm
http://pages.ripco.com:8080/~glr/glr.html
http://the-tech.mit.edu
http://ucs.orst.edu:8001/mintro.html
http://underground.org
http://unixg.ubc.ca:780/~jyee
http://w3.gti.net/safety
http://wintermute.itd.nrl.navy.mil/5544.html
http://wiz.plymouth.edu/~jay/underground.html
http://www.2600.com
http://www.8lgm.org
http://www.aads.net
http://www.alw.nih.gov/WWW/security.html
http://www.aus.xanadu.com:70/1/EFA
http://www.ba.com
http://www.bell.com
http://www.brad.ac.uk/~nasmith/index.html
http://www.bst.bls.com
http://www.c3.lanl.gov/~mcn
http://www.cam.org/~gagnon
http://www.cert.dfn.de
http://www.cpsr.org/home
http://www.cs.umd.edu/~lgas
http://www.csd.harris.com/secure_info.html
http://www.csl.sri.com
http://www.datafellows.fi
http://www.dct.ac.uk/~misb3cp/2600/faq.txt
http://www.digicash.com/ecash/ecash-home.html
http://www.dnai.com/~gui/index.html
http://www.eecs.nwu.edu/~jmyers/ids/index.html
http://www.eff.org/papers.html
http://www.emap.co.uk/partners/racal-airtech
http://www.ensta.fr/internet/unix/sys_admin
http://www.etext.org/Zines
http://www.fc.net/defcon
http://www.fedworld.gov
http://www.first.org/first
http://www.gbnet.net/kbridge
http://www.ic.gov
http://www.io.org/~excels
http://www.indirect.com/www/johnk
http://www.magi.com/~vektor/linenoiz.html
http://www.mcs.com/~candyman/under.html
http://www.mpr.ca
http://www.net23.com
http://www.netresponse.com:80/zldf
http://www.nist.gov
http://www.ntt.jp
http://www.pacbell.com
http://www.paranoia.com/astrostar/fringe.html
http://www.paranoia.com/mthreat
http://www.planet.net/onkeld
http://www.primenet.com/~insphrk
http://www.primenet.com/~kludge/haqr.html
http://www.qualcomm.com/cdma/wireless.html
http://www.raptor.com/raptor/raptor.html
http://www.research.att.com
http://www.rsa.com
http://www.satelnet.org/~ccappuc
http://www.seas.upenn.edu/~rourkem
http://www.service.com/cm/uswest/usw1.html
http://www.shore.net/~oz/welcome.html
http://www.spatz.com/pecos/index.html
http://www.spy.org
http://www.sri.com
Hakerskie sajty FTP
ftp.3com.com /pub/Orange-Book
ftp.acns.nwu.edu /pub
ftp.alantec.com /pub/tcpr
ftp.armory.com /pub/user/kmartind
ftp.armory.com /pub/user/swallow
ftp.auscert.org.au /pub
ftp.cs.ruu.nl /pub/SECURITY
ftp.cs.uwm.edu /pub/comp-privacy
ftp.csi.forth.gr /pub/security
ftp.csl.sri.com /pub/nides
ftp.csn.org /mpj
ftp.digex.net /pub/access/dunk
ftp.eff.org /pub/Publications/CuD
ftp.fc.net /pub/deadkat
ftp.fc.net /pub/defcon
ftp.fc.net /pub/defcon/BBEEP
ftp.fc.net /pub/phrack
ftp.funet.fi /pub/doc/CuD
ftp.gate.net /pub/users/laura
ftp.gate.net /pub/users/wakko
ftp.giga.or.at /pub/hacker
ftp.greatcircle.com /pub/firewalls
ftp.IEunet.ie /pub/security
ftp.inoc.dl.nec.com /pub/security
ftp.io.org /pub/users/gmouser
ftp.lava.net /users/oracle/
ftp.lerc.nasa.gov /security
ftp.llnl.gov /pub
ftp.luth.se /pub/unix/security
ftp.mcs.anl.gov /pub/security
ftp.microserve.net /ppp-pop/strata/mac
ftp.near.net /security/archives/phrack
ftp.netcom.com /pub/br/bradleym
ftp.netcom.com /pub/da/daemon9
ftp.netcom.com /pub/fi/filbert
ftp.netcom.com /pub/le/lewiz
ftp.netcom.com /pub/va/vandal
ftp.netcom.com /pub/wt/wtech
ftp.netcom.com /pub/zz/zzyzx
ftp.ocs.mq.edu.au /PC/Crypt
ftp.ox.ac.uk /pub/comp/security
ftp.ox.ac.uk /pub/crypto
ftp.ox.ac.uk /pub/wordlists
ftp.paranoia.com /pub/toneloc
ftp.primenet.com /users/i/insphrk
ftp.primenet.com /users/k/kludge
ftp.primenet.com /users/s/scuzzy
Luchshij hakerskij soft
CHEAT ENGiNE 2.5
Prostaya programma dlya vzloma igr. Sozdaet klassnye i bystrye patchi.
Cheat Machine 2.02
Programma dlya legkogo prohozhdeniya igr. Podderzhka okolo 300 izvestnyh
igr. Solyusheny, taktika, kody, patchi, utility.
CrackAid 3.39
Snyatie zashchity s igr.
Crack Master 2.5
Vzlom zashchit prisoedinitel'nogo tipa s naibolee populyarnyh igr.
Neverlock Spring 95
Vzlom zashchity s bolee 400 igr.
The PATCHER 6.5
Snyatie zashchity ot kopirovaniya s bolee, chem 100 izvestnyh igrushek.
Unlimited Cheats 3.0
Obman luchshih igr mira. Velikolepnyj interfejs. Rabota s mysh'yu.
BRUTE 2.0
Instrumentarij dlya vzloma parolej UNIX.
Claymore 1.0
Instrumentarij dlya vzloma parolej sistemy Microsoft Windows. Po
bol'shomu schetu eta ves'ma udobnaya programma pozvolyaet vzlomat' prakticheski
lyuboj parol'. Trebuet nalichiya standartnoj biblioteki VBRUN300.DLL
Cracker Jack 1.4
Instrumentarij dlya vzloma parolej sistemy UNIX.
Glide
Znamenityj soft dlya vzloma PWL-fajlov sistemy Microsoft Windows.
GUESS 2.1
Eshche odin instrumentarij dlya vzloma parolej sistemy UNIX. Pozvolyaet
podklyuchit' slovar'.
Hades 1.0
Skanirovanie i rasshifrovka parolej.
Killer Cracker 9.5
Prostoj vzlomshchik parolej dlya MS DOS.
NEWHACK 2.0
Soft, pozvolyayushchij obnovlyat' fajl parolej.
PCUPC 2.01
Instrumentarij dlya vzloma parolej sistemy UNIX.
XIT 2.0
Instrumentarij dlya vzloma parolej sistemy UNIX.
CRACKer for ZIP-files 2.0
Vzlomshchik parolej v ZIP-fajlah.
Fast ZIP Cracker 1.4
Vzlomshchik parolej v ZIP-fajlah. Ispol'zuet slovar' Brute Force.
MS CD-Key Generator 95
Sozdanie registracionnyh klyuchej dlya Microsoft Office i Windows 95.
Nagbuster 1.2d
Polnost'yu avtomaticheskaya programma, kotoraya udalyaet registracionnyj
musor iz mnogih shareware-programm.
NONAG2
Izyashchnaya programmka, kotoraya udalyaet registracionnyj musor iz mnogih
shareware-programm.
Word Password Cracker
Vzlom parolej v dokumentah Microsoft Word for Windows.
Windows Screen Saver Cracker
Vzlomshchik zaparollirovannyh ekrannyh zastavok.
ZipCrack 1.0
Prostoj vzlomshchik parolej v ZIP-fajlah.
HEdit32 1.2
Redaktor dvoichnyh fajlov. Neogranichennyj razmer fajla, podderzhka
mehanizma drag-and-drop, poisk teksta, vyborka shriftov, podderzhka clipboard.
Global Security 32-Bit 1.0
Programma, obespechivayushchaya bezopasnost' peredavaemyh dannyh. Bolee
krutaya, chem znamenitaya PGP.
Hide and Seek 4.1
Skryvaet dannye v fajlah GIF.
ParadoX 1.01
Programma dlya shifrovaniya fajlov dannyh.
Puffer 2.0
Programma dlya shifrovaniya fajlov dannyh i soobshchenij elektronnoj pochty.
KOH
Disk Encryption System. Zashchita zhestkogo diska i floppov posredstvom
tehnologii shifrovaniya IDEA na osnove 156-bitovogo klyucha.
Steganos 1.4
Ochen' udobnaya programma, pozvolyayushchaya spryatat' fajl v drugoj fajl.
Podderzhka formatov BMP, VOC, WAV i ASCII, vklyuchaya dlinnye imena fajlov
sistemy Windows 95.
S-Tools 4.0
Maskirovka dannyh v zvukovyh ili graficheskih fajlah.
Private Idaho
SHifrovka lyubyh soobshchenij elektronnoj pochty.
Speak Freely
Soft, pozvolyayushchij zashifrovat' komp'yuter, ispol'zuya chelovecheskij golos.
Apex 1.00
Osnovnaya programma, pozvolyayushchaya sozdavat' fiktivnyj dostup cherez
prostoj nabor telefonnogo nomera.
BlueBEEP!
Luchshaya tonovaya zvonilka.
CyberPHREAK 1.0
Zvonilka, rabotayushchaya v fonovom rezhime. Podderzhka naibolee populyarnyh
zvukovyh kart.
Fear's Phreaker Tools 2.3
Frikerskaya utilita dlya tonov Red Box Tones. Rabotaet v Windows.
Phone Tag 1.3
Tonovaya zvonilka dlya Windows.
PhreakMaster 1.0
Udobnaya zvonilka.
ToneLoc 1.10
Udobnyj DOS-terminal, pozvolyayushchij ves'ma effektivno atakovat'
komp'yuternye seti.
ToneLoc Utilities
Utility k ToneLoc.
Prostejshij terminal, pozvolyayushchij ves'ma effektivno atakovat'
komp'yuternye seti.
Z-Hacker 3.21
Velikolepnaya frikerskaya programma.
Bomb 2.0
Soft, pozvolyayushchij ves'ma effektivno posylat' v set' fal'shivye soobshcheniya
elektronnoj pochty.
CreditMaster 4.0
Generaciya fal'shivogo ekkaunta dlya kreditnoj kartochki.
FakeCD 1.0
Immitaciya ustrojstva CD ROM posredstvom sozdaniya otdel'noj direktorii
na zhestkom diske.
IP-Scan 1.02
Ishodnik na C dlya skanirovaniya adresov IP.
KeyLogger 95
Programma, pozvolyayushchaya zapisyvat' v otdel'nyj fajl lyubye nazhatiya
klaviatury.
KeyTrap 3.0
Ochen' effektivnaya programma, pozvolyayushchaya zapisyvat' v otdel'nyj fajl
lyubye nazhatiya klaviatury.
No Where Utilities 2.0
Trinadcat' hakerskih utilit.
News You Can Use 6.0
Odno iz luchshih elektronnyh izdanij hakerskih sovetov i rekomendacij.
The Pirates Friend 2.6
Kollekciya serijnyh nomerov.
UNP 4.10
Razarhivirovanie fajlov, szhatyh programmami DIET, EXEPACK, LZEXE,
PKLITE i TASM.EXE
TLINK.EXE
Mgnovennoe proizvodstvo virusov.
Kit 1.0
Inficirovanie EXE-fajlov, proizvodstvo troyanskih konej, shifrovanie
vsego i vsya, sozdanie fiktivnyh oshibok obrabotki, infekciya fajla COMMAND.COM
i mnogoe drugoe.
Nebol'shoj spisok setevyh "ulybok"
:-)
Samaya obychnaya hohma.
;-)
Hohma s podmigivaniem.
:-(
Hmuraya fizionomiya.
:-I
Nikakoe vyrazhenie lica.
:-/
Skepticheskoe vyrazhenie.
:-X
Molchit.
:-Q
Kurit.
:-R
Vysovyvaet yayk.
:-{
Ucatyj sobesednik.
B-)
Noshu ochki.
%-)
Dolgo smotryu na etot ekpan.
Spisok rossijskih DNIC
2500 ROSPAC
2501 POSPRINT
2502 IASNET
2503 MMTEL
2504 INFOTEL
2506 ROSNET
2508 TRANSINFORM
2510 SOVAMNET
2511 |DITRANS
2512 T|KOS
2513 PTT-TELEPORT
Spisok BBS, rabotayushchih chepez telnet
ADDICTED chatline
telnet sun1.gwent.ac.uk 6666
AIDS Database
telnet debra.dgbt.doc.ca 3000
Air Pollution BBS
telnet ttnbbs.rtpnc.epa.gov
Amateur Callsign Server
telnet cs.buffalo.edu 2000
Archeological Database
telnet cast.uark.edu (login:nadb)
Archie ftp directory search
telnet archie.sura.net (login: qarchie)
Aviation Weather
telnet duats.gtefsd.com
Bible Search
telnet quake.think.com (login: WAIS)
Book Stacks Unlimited
telnet books.com
Bridge
telnet 140.117.11.33 (login okbridge)
CapAccess Network
telnet cap.gwu.edu
CASS - Space Studies
telnet cass.jsc.nasa.gov (login: cass pw: online)
CD Connection
telnet cdconnection.com
Chess
telnet 128.111.246.2 5000
CompuServe
telnet compuserve.com
Connection music store
telnet zen.holonet.net (login: cdc)
Dictionary
telnet 129.79.254.191 2627
Diku-MUD
telnet skypoint.com 4000
Employment database
telnet career.com
Epilepsy Database
telnet debra.dgbt.doc.ca 3000
Fedworld BBS
telnet fedworld.gov
FIFE Satellite dB
telnet pldsg3.gsfc.nasa.gov (login: FIFEUSER)
Free-Net Buffalo
telnet freenet.buffalo.edu
Free-Net Cleveland
telnet freenet-in-a.cwru.edu
Free-Net Dayton
telnet 130.108.128.74
Games
telnet castor.tat.physik.uni-tuebingen.de
Geography Server
telnet martini.eecs.umich.edu 3000
Gopher Public server
telnet consultant.micro.umn.edu
GSA contract info
telnet netmark.com (login: netmark)
Land Use maps
telnet 152.61.192.54
Law Library
telnet 137.113.10.35
MLB Schedules
telnet culine.colorado.edu 862
NBA Schedules
telnet culine.colorado.edu 859
NBS Time Service
telnet nessie.cc.wwu.edu (login: LIBS)
Netline Flagship BBS
telnet fcsbbs.netline.co.za
NTIA Information
telnet ntiabbs.ntia.doc.gov
Periodic Table
telnet camms2.caos.kun.nl
Periodicals Index/reprints
telnet database.carl.org
Poetry 17-18C dB
telnet bcmsv.leeds.ac.uk (login: bcmsv)
Quotes
telnet astro.temple.edu 12345
Shakespeare Database
telnet library.dartmouth.edu
Smiley database
telnet twinbrook.cis.uab.edu 3399
Spanish-English Dictionary
telnet gopher.sc.ehu.es 4444
Stock Market Reports
telnet 192.160.13.1
Stock Market Reports
telnet a2i.rahul.net
Stock Quotes ($)
telnet quote.com
Subway Maps
telnet metro.jussieu.fr 10000
SVPAL
telnet svpal.org
Tallahasee Free-Net
telnet freenet.fsu.edu
Telephone Directories
telnet dfw.net
TinyTIM MUD
telnet yay.tim.org 5440
TrekMOO MUD
telnet 192.204.120.2 2499
TrekMOO MUD
telnet trekmoo.microserve.com 2499
TrekMOO MUD+
telnet 192.204.120.2 2499
TV & Radio Transcripts
telnet pac.carl.org
USA Today
telnet 129.22.8.51
USGS Land Info System
telnet glis.cr.usgs.gov
WAIS
telnet quake.think.com (login: wais)
Spisok vseh knig Rainbow
Orange 1
D.O.D. Trusted Computer Systems.
Green
D.O.D. Password Management.
Yellow
Computer Security Requirements.
Yellow 2
Computer Security Requirements.
Tan
Understanding Audit In Trusted Systems.
Bright Blue
Trusted Product Evaluation.
Neon Orange
Understanding Discretionary Access.
Teal Green
Glossary Of Computer Terms.
Orange 2
Understanding Configurations.
Red
Interpretation Of Evaluation.
Burgundy
Understanding Design Documentation.
Dark Lavender
Understanding Trusted Distrobution.
Venice Blue
Computer Security Sub-Systems.
Aqua
Understanding Security Modeling.
Dark Red
Interpretations Of Environments.
Pink
Rating Maintenence Phase.
Purple
Formal Verification Systems.
Brown
Understanding Trusted Facilities.
Yellow-Green
Writing Trusted Facility Manuals.
Light Blue
Understanding Identification And Authentication
In Trusted Systems.
Blue
Product Evaluation Questionaire.
Gray
Selecting Access Control List.
Lavander
Data Base Management Interpretation.
Yellow 3
Understanding Trusted Recovery.
Bright Orange
Understanding Security Testing.
Purple 1
Guide To System Procurement.
Purple 2
Guide To System Procurement.
Purple 3
Guide To System Procurement.
Purple 4
Guide To System Procurement.
Green
Understanding Data Remanence
Hot Peach
Writing Security Features.
Turquiose
Understanding Information Security.
Violet
Controlled Access Protection.
Light Pink
Understanding Covert Channels.
Hakerskie akronimy
ACL
Access Control List
AN
Associated Number
ARSB
Automated Repair Service Bureau
ATH
Abbreviated Trouble History
BOC
Bell Operating Company
BOR
Basic Output Report
BOSS
Business Office Servicing System
CA
Cable
COE
Central Office Equipment
CMC
Construction Maintenance Center
CNID
Calling Number IDentification
CO
Central Office
DDD
Direct Distance Dialing
ECC
Enter Cable Change
LD
Long Distance
LMOS
Loop Maintenance Operations System
MLT
Mechanized Loop Testing
NPA
Numbering Plan Area
POTS
Plain Old Telephone Service
RBOC
Regional Bell Operating Company
RSB
Repair Service Bureau
SS
Special Service
TAS
Telephone Answering Service
TH
Trouble History
TREAT
Trouble Report Evaluation and Analysis Tool
LOD
Legion of Doom
HFC
Hell Fire Club
TNO
The New Order
ACiD
Ansi Creators in Demand
Cci
Cybercrime International
FLT
Fairlight
iCE
Insane Creators Enterprise
iNC
International Network of Crackers
NTA
The Nocturnal Trading Alliance
PDX
Paradox
PE
Public Enemy
PSY
Psychose
QTX
Quartex
RZR
Razor (1911)
S!P
Supr!se Productions
TDT
The Dream Team
THG
The Humble Guys
THP
The Hill People
TRSI
Tristar Red Sector Inc.
UUDW
Union of United Death Workers
Slovar' yunogo hakera
Bit
Minimal'naya edinica izmereniya informacii (0 ili 1).
Polubajt
4 bita.
Bajt
Tozhe, chto i bit, tol'ko v 8 raz bol'she.
Kilo
Tozhe, chto i bajt, tol'ko v 1024 raza bol'she.
Meg
Tozhe, chto i kilo, tol'ko v 1024 raza bol'she.
Gig
Tozhe, chto i meg, tol'ko v 1024 raza bol'she.
Haker
CHelovek, ne myslyashchij sebya bez komp'yutera.
Mozgi
Operativnaya pamyat' komp'yutera. Izmeryaetsya v kilo/megabajtah.
Linejka
Nabor mikroshem v kolichestve vos'mi shtuk.
Kasha
Cach-pamyat'.
ZHelezo
Hardware.
Bebeska
Bulleten Board System.
Vint
Vinchester. ZHestkij disk. Nositel' informacii.
Matras
Vinchester firmy MAXTOR.
Trehdyujmovka i pyatidyujmovka
Gibkij magnitnyj disk razmerom v 3 i 5 dyujmov sootvetstvenno.
Flopper
Ustrojstvo dlya schityvaniya informacii s gibkih diskov.
Komp
Personal'nyj komp'yuter.
Klava
Klaviatura. Klacnut' pedal'yu, toptat' knopku, nazhat' na klavishu.
Progsy
Komp'yuternye programmy.
Zakinut' na disk
Zapisat' informaciyu na magnitnyj nositel'.
Korobok
Korpus komp'yutera.
Gama
Igra.
Kreknut', lomanut', haknut', vzorvat' gamu
Vskryt' igru i izmenit' v nej dannye po svoemu usmotreniyu.
Kryakalka
Programma dlya vskrytiya programm.
Blaster, Liba, Gus'
Tipy muzykal'nyh adapterov.
Bima
Narodnoe nazvanie komp'yutera firmy IBM.
Mak
Narodnoe nazvanie komp'yutera firmy Apple Macintosh.
Dvojka, trojka, chetverka
Pervye cifry modelej personal'nyh komp'yuterov firmy IBM.
Hata
Komp'yuter firmy IBM klassa XT.
Pentyuh
Komp'yuter IBM Pentium.
Virusyaka
Komp'yuternyj virus.
CHajnik
CHelovek, ne smyslyashchij pochti nichego v komp'yuternyh tehnologiyah.
B