Path: senator-bedfellow.mit.edu!bloom-beacon.mit.edu!newsfeed.stanford.edu!newsfeed.news.ucla.edu!news-hog.berkeley.edu!newsfeed.berkeley.edu!ucberkeley!cyclone-sf.pbi.net!216.196.106.144!border2.nntp.sjc.giganews.com!nntp.giganews.com!feed2.news.rcn.net!feed1.news.rcn.net!rcn!wn14feed!worldnet.att.net!attbi_s01.POSTED!53ab2750!not-for-mail From: voyager@hackfaq.org (The Voyager) Organization: The alt.2600 / #hack FAQ Subject: alt.2600 FAQ Revision 2004/06/23 - Part 1/1 User-Agent: Pan/0.14.2 (This is not a psychotic episode. It's a cleansing moment of clarity.) Message-ID: Newsgroups: alt.2600,alt.answers,news.answers Followup-To: alt.2600 Reply-To: voyager@hackfaq.org (FAQ Comments address) Approved: news-answers-request@MIT.EDU Summary: This posting contains a URL pointer to a list of Frequently Asked Archive-Name: alt-2600/faq Posting-Frequency: Monthly Last-Modified: 2004/06/23 Version: 2004/06/23 URL: http://www.tech-faq.com MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit Lines: 793 NNTP-Posting-Host: 24.9.189.132 X-Complaints-To: abuse@comcast.net X-Trace: attbi_s01 1087969561 24.9.189.132 (Wed, 23 Jun 2004 05:46:01 GMT) NNTP-Posting-Date: Wed, 23 Jun 2004 05:46:01 GMT Date: Wed, 23 Jun 2004 05:46:01 GMT Xref: senator-bedfellow.mit.edu alt.2600:746527 alt.answers:73004 news.answers:271777 From: voyager@hackfaq.org (The Voyager) Newsgroups: alt.2600,alt.answers,news.answers Subject: alt.2600 FAQ Revision 2004/06/23 - Part 1/1 Followup-To: alt.2600 Approved: news-answers-request@MIT.EDU Reply-To: voyager@hackfaq.org (FAQ Comments address) Summary: This posting contains a URL pointer to a list of Frequently Asked Questions (and their answers) about hacking. It should be read by anyone who wishes to post to the alt.2600 newsgroup or use the IRC channel #hack. Archive-Name: alt-2600/faq Posting-Frequency: Monthly Last-Modified: 2004/06/23 Version: 2004/06/23 URL: http://www.tech-faq.com Welcome to the alt.2600/#hack FAQ: Answers to Frequently Asked Questions about Hacking The purpose of the alt.2600/#hack FAQ is to give you a general introduction to the art and science of hacking. No document will make you a hacker. Please use the information contained in the alt.2600/#hack FAQ wisely. If you have a question regarding any of the topics covered in the alt.2600/#hack FAQ, please direct it to the alt.2600 newsgroup. Please do not e-mail me your questions; I do not have time to respond to each request personally. The alt.2600/#hack FAQ started as a FAQ for the IRC channel #hack and was later adopted by the alt.2600 newsgroup. The alt.2600/#hack FAQ now exists as a web document for all of the Internet. The alt.2600 / #hack FAQ is no longer maintained as an ASCII text file. The only authoritative source for the current alt.2600/#hack FAQ is on the world wide web at http://www.tech-faq.com The contents of the alt.2600 / #hack FAQ include: http://www.tech-faq.com/computers/reset-bios-password.shtml How do I reset a BIOS password? http://www.tech-faq.com/computers/windows-password-file.shtml How do I access the Windows NT/2000/XP password file? http://www.tech-faq.com/computers/audit-windows-nt-passwords.shtml How do I audit Windows NT passwords? http://www.tech-faq.com/computers/recover-windows-nt-administrator-password.shtml How can I recover a lost Windows NT Administrator Password? http://www.tech-faq.com/computers/windows-password-encryption.shtml How does the Microsoft Windows 3.1 password encryption work? http://www.tech-faq.com/computers/strange-directory-file-names.shtml How do I change to directories with strange characters in them? http://www.tech-faq.com/computers/identify-system.shtml What is this system? http://www.tech-faq.com/computers/default-accounts-passwords.shtml What are some default accounts? http://www.tech-faq.com/computers/computer-virus.shtml What is a computer virus? http://www.tech-faq.com/computers/computer-worm-virus.shtml What is a computer worm? http://www.tech-faq.com/computers/trojan-horse-virus.shtml What is a trojan horse? http://www.tech-faq.com/computers/logic-bomb.shtml What is a logic bomb? http://www.tech-faq.com/computers/protect-from-viruses.shtml How can I protect myself from viruses? http://www.tech-faq.com/computers/information-about-viruses.shtml Where can I get more information about viruses? http://www.tech-faq.com/computers/free-spyware-removal.shtml How do I remove spyware? http://www.tech-faq.com/computers/key-logger.shtml What is a key logger? http://www.tech-faq.com/computers/tempest.shtml What is TEMPEST? http://www.tech-faq.com/computers/hex-editor.shtml What is a hex editor? http://www.tech-faq.com/computers/debuggers-disassemblers.shtml What are debuggers and disassemblers? http://www.tech-faq.com/computers/decompiler.shtml Is there a decompiler to convert an executable into C/C++ code? http://www.tech-faq.com/computers/ids-intrusion-detection-system.shtml What is an Intrusion Detection System (IDS)? http://www.tech-faq.com/computers/vulnerability-information.shtml Where can I find information about vulnerabilities? http://www.tech-faq.com/computers/source-code-security-vulnerabilities.shtml How can I find security vulnerabilities in my source code? http://www.tech-faq.com/computers/integer-overflow.shtml What is an integer overflow? http://www.tech-faq.com/computers/race-condition.shtml What is a race condition? http://www.tech-faq.com/computers/format-string-vulnerability.shtml What is a format string vulnerability? http://www.tech-faq.com/computers/random-number.shtml What is a random number vulnerability? http://www.tech-faq.com/computers/sql-injection-attack.shtml What is an SQL Injection Attack / Vulnerability? http://www.tech-faq.com/computers/securely-erase-data.shtml How can I securely erase data? http://www.tech-faq.com/computers/two-factor-authentication.shtml What is two factor authentication? http://www.tech-faq.com/unix/audit-unix-passwords.shtml How do I audit Unix passwords? http://www.tech-faq.com/unix/unix-password-shadowing.shtml What is password shadowing? http://www.tech-faq.com/unix/nis-yp.shtml What is NIS (yp)? http://www.tech-faq.com/unix/weird-characters-password-file.shtml What are those weird characters after the comma in my passwd file? http://www.tech-faq.com/unix/restricted-shell.shtml What is a restricted shell? http://www.tech-faq.com/unix/unix-file-permissions.shtml How do Unix file permissions work? http://www.tech-faq.com/unix/suid-root-script-binary.shtml What security problems exist with SUID script and programs? http://www.tech-faq.com/unix/unix-system-log-files.shtml How do Unix system log files work? http://www.tech-faq.com/unix/rootkit.shtml What is a rootkit? http://www.tech-faq.com/unix/timestamp.shtml How do Unix timestamps work? http://www.tech-faq.com/unix/sudo.shtml What is sudo? http://www.tech-faq.com/unix/bootable-linux-distributions.shtml What are some bootable Linux distributions? http://www.tech-faq.com/data-networks/change-mac-address.shtml How do I change a MAC address? http://www.tech-faq.com/data-networks/cisco-password-recovery.shtml How do I recover the password for a Cisco router? http://www.tech-faq.com/data-networks/cisco-decrypt-password.shtml How do I recover Cisco passwords? http://www.tech-faq.com/data-networks/127.0.0.1.shtml What is 127.0.0.1? http://www.tech-faq.com/data-networks/packet-sniffer.shtml What is a packet sniffer? http://www.tech-faq.com/data-networks/port-scanner.shtml What is a port scanner? http://www.tech-faq.com/data-networks/port-numbers.shtml What port number is XXX on? http://www.tech-faq.com/data-networks/anonymous-surfing.shtml What is anonymous surfing? http://www.tech-faq.com/data-networks/cookies.shtml What are cookies? http://www.tech-faq.com/data-networks/anonymous-remailer.shtml What is an anonymous remailer? http://www.tech-faq.com/data-networks/free-e-mail-encryption.shtml What are some free e-mail services with encryption? http://www.tech-faq.com/data-networks/send-fake-mail.shtml How do I send fake mail? http://www.tech-faq.com/data-networks/fake-post-control-messages-usenet.shtml How do I fake posts and control messages to Usenet? http://www.tech-faq.com/data-networks/post-moderated-usenet.shtml How do I post to a moderated newsgroup? http://www.tech-faq.com/data-networks/post-usenet-mail.shtml How do I post to Usenet via e-mail? http://www.tech-faq.com/data-networks/firewall.shtml What is a firewall? http://www.tech-faq.com/data-networks/vpn-virtual-private-network.shtml What is a VPN (Virtual Private Network)? http://www.tech-faq.com/data-networks/ssh-secure-shell.shtml What is SSH (Secure Shell)? http://www.tech-faq.com/data-networks/osi-model.shtml What is the OSI model? http://www.tech-faq.com/data-networks/hack-irc-client.shtml How do I modify the IRC client to hide my real username? http://www.tech-faq.com/data-networks/internet-outdial.shtml What is an Internet outdial? http://www.tech-faq.com/data-networks/tcp-sequence-prediction.shtml What is a TCP sequence prediction attack? http://www.tech-faq.com/data-networks/packet-fragmentation.shtml What is packet fragmentation? http://www.tech-faq.com/data-networks/dos-denial-of-service-attack.shtml What is a Denial of Service (DoS) attack? http://www.tech-faq.com/data-networks/p2p-peer-to-peer-file-sharing.shtml What is peer-to-peer (P2P) file sharing? http://www.tech-faq.com/data-networks/fibre-channel-security.shtml How secure are Fibre Channel networks? http://www.tech-faq.com/data-networks/scada.shtml What is SCADA? http://www.tech-faq.com/data-networks/ldap-lightweight-directory-access-protocol.shtml What is LDAP (Lightweight Directory Access Protocol)? http://www.tech-faq.com/data-networks/ldap-security.shtml What security issues does LDAP (Lightweight Directory Access Protocol) have? http://www.tech-faq.com/data-networks/radius.shtml What is RADIUS? http://www.tech-faq.com/data-networks/hotmail-password-recovery.shtml How does Hotmail password recovery work? http://www.tech-faq.com/data-networks/aim-password-recovery.shtml How does AIM password recovery work? http://www.tech-faq.com/data-networks/icq-password-recovery.shtml How does ICQ password recovery work? http://www.tech-faq.com/data-networks/internet-explorer-stored-password-recovery.shtml How does Internet Explorer password recovery work? http://www.tech-faq.com/data-networks/netscape-navigator-stored-password-recovery.shtml How does Netscape Navigator password recovery work? http://www.tech-faq.com/wireless-networks/wireless-networks.shtml What are the types of wireless networks? http://www.tech-faq.com/wireless-networks/cdpd-cellular-digital-packet-data.shtml What is CDPD (Cellular Digital Packet Data)? http://www.tech-faq.com/wireless-networks/hscsd-high-speed-circuit-switched-data.shtml What is HSCSD (High Speed Circuit Switched Data)? http://www.tech-faq.com/wireless-networks/pdc-p-packet-data-cellular.shtml What is PDC-P (Packet Data Cellular)? http://www.tech-faq.com/wireless-networks/gprs-general-packet-radio-service.shtml What is GPRS (General Packet Radio Service)? http://www.tech-faq.com/wireless-networks/cdma-2000-1xrtt.shtml What is CDMA-2000 1xRTT? http://www.tech-faq.com/wireless-networks/bluetooth.shtml What is Bluetooth? http://www.tech-faq.com/wireless-networks/irda-infrared.shtml What is IrDA? http://www.tech-faq.com/wireless-networks/lmds-local-multipoint-distribution-service.shtml What is LMDS (Local Multipoint Distribution Service)? http://www.tech-faq.com/wireless-networks/mmds-multichannel-multipoint-distribution-service.shtml What is MMDS (Multichannel Multipoint Distribution Service)? http://www.tech-faq.com/wireless-networks/wi-fi-802.11.shtml What is Wi-Fi (802.11)? http://www.tech-faq.com/wireless-networks/ssid.shtml What is a SSID? http://www.tech-faq.com/wireless-networks/wep-wired-equivalent-privacy.shtml What is WEP (Wired Equivalent Privacy)? http://www.tech-faq.com/wireless-networks/eap-leap-peap-eap-tls-ttls.shtml What are EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS? http://www.tech-faq.com/wireless-networks/wpa-wi-fi-protected-access.shtml What is WPA (Wi-Fi Protected Access)? http://www.tech-faq.com/wireless-networks/802.11i.shtml What is 802.11i? http://www.tech-faq.com/wireless-networks/mic-message-integrity-check.shtml What is MIC (Message Integrity Check)? http://www.tech-faq.com/wireless-networks/rsn-robust-secure-network.shtml What is RSN (Robust Secure Network)? http://www.tech-faq.com/wireless-networks/tkip-temporal-key-integrity-protocol.shtml What is TKIP (Temporal Key Integrity Protocol)? http://www.tech-faq.com/wireless-networks/wrap-wireless-robust-authenticated-protocol.shtml What is WRAP (Wireless Robust Authenticated Protocol)? http://www.tech-faq.com/wireless-networks/ccmp-cipher-block-chaining-message-authentication-code-protocol.shtml What is CCMP? http://www.tech-faq.com/wireless-networks/802.1X.shtml What is 802.1X? http://www.tech-faq.com/wireless-networks/mac-address-filtering.shtml What is MAC Address Filtering? http://www.tech-faq.com/wireless-networks/rogue-access-point.shtml What is a rogue wireless access point? http://www.tech-faq.com/wireless-networks/wireless-antenna.shtml What are some better wireless antenna? http://www.tech-faq.com/wireless-networks/location-directory-wi-fi-hotspot.shtml Where can I find a Wi-Fi hotspot? http://www.tech-faq.com/wireless-networks/wi-fi-software-tools.shtml What are some interesting Wi-Fi (802.11) tools? http://www.tech-faq.com/wireless-networks/sms-short-message-service.shtml What is SMS (Short Message Service)? http://www.tech-faq.com/wireless-networks/wap-wireless-application-protocol.shtml What is WAP (Wireless Application Protocol)? http://www.tech-faq.com/telephony/telephone-tone-frequencies.shtml What are the frequencies of the telephone tones? http://www.tech-faq.com/telephony/dtmf-tone-frequencies.shtml What are the DTMF tone frequencies? http://www.tech-faq.com/telephony/abcd.shtml What are the ABCD tones for? http://www.tech-faq.com/telephony/telephone-voltage.shtml What is the voltage used to ring a telephone? http://www.tech-faq.com/telephony/lass-codes.shtml What are all of the * (LASS) codes? http://www.tech-faq.com/telephony/red-box.shtml What is a Red Box? http://www.tech-faq.com/telephony/blue-box.shtml What is a Blue Box? http://www.tech-faq.com/telephony/blue-boxing.shtml Do Blue Boxes still work? http://www.tech-faq.com/telephony/black-box.shtml What is a Black Box? http://www.tech-faq.com/telephony/colored-telephone-boxes.shtml What do all the colored boxes do? http://www.tech-faq.com/telephony/ani-automatic-number-identification.shtml What is ANI (Automatic Number Identification)? http://www.tech-faq.com/telephony/anac-number.shtml What is an ANAC number? http://www.tech-faq.com/telephony/ringback-number.shtml What is a ringback number? http://www.tech-faq.com/telephony/loop.shtml What is a loop? http://www.tech-faq.com/telephony/cna-number.shtml What is a CNA number? http://www.tech-faq.com/telephony/ring-busy.shtml What are some numbers that always ring busy? http://www.tech-faq.com/telephony/temporary-disconnect.shtml What are some numbers that temporarily disconnect phone service? http://www.tech-faq.com/telephony/war-dialing.shtml What is war dialing? http://www.tech-faq.com/telephony/war-dialing-law.shtml Is war dialing illegal? http://www.tech-faq.com/telephony/make-linemans-handset.shtml How can I make a lineman's handset? http://www.tech-faq.com/telephony/purchase-linemans-handset.shtml Where can I purchase a lineman's handset? http://www.tech-faq.com/telephony/cordless-phone-frequencies.shtml What frequencies do cordless phones operate on? http://www.tech-faq.com/telephony/caller-id.shtml What is Caller-ID? http://www.tech-faq.com/telephony/block-caller-id.shtml How do I block Caller-ID? http://www.tech-faq.com/telephony/defeat-caller-id.shtml How do I defeat Caller-ID blocking? http://www.tech-faq.com/telephony/pbx.shtml What is a PBX? http://www.tech-faq.com/telephony/vmb-voice-mail-box.shtml What is a VMB (Voice Mail Box)? http://www.tech-faq.com/telephony/country-direct-numbers.shtml What are the Country Direct Numbers? http://www.tech-faq.com/telephony/phone-switches.shtml What are some phone switches? http://www.tech-faq.com/telephony/milliwatt-test-line.shtml What is a milliwatt test line? http://www.tech-faq.com/telephony/958-959.shtml What are the 958 and 959 NXX's? http://www.tech-faq.com/telephony/clli-codes.shtml What are CLLI codes? http://www.tech-faq.com/telephony/datu.shtml What is DATU? http://www.tech-faq.com/telephony/proctor-test-set.shtml What is a Proctor Test Set? http://www.tech-faq.com/telephony/call-back-dial-back.shtml What is call back security? http://www.tech-faq.com/mobile-telephony/mobile-telephone-systems.shtml How many types of mobile telephone systems are there? http://www.tech-faq.com/mobile-telephony/advanced-mobile-phone-system.shtml What are AMPS (EIA/TIA-553) and NAMPS (IS-91)? http://www.tech-faq.com/mobile-telephony/mtso-mobile-telephone-switching-office.shtml What is a MTSO (Mobile Telephone Switching Office)? http://www.tech-faq.com/mobile-telephony/nam-number-assignment-module.shtml What is a NAM (Number Assignment Module)? http://www.tech-faq.com/mobile-telephony/esn-electronic-serial-number.shtml What is an ESN (Electronic Serial Number)? http://www.tech-faq.com/mobile-telephony/min-mobile-identification-number.shtml What is a MIN (Mobile Identification Number)? http://www.tech-faq.com/mobile-telephony/scm-station-class-mark.shtml What is a SCM (Station Class Mark)? http://www.tech-faq.com/mobile-telephony/sidh-system-identification-for-home-system.shtml What is a SIDH? (System Identification for Home System) http://www.tech-faq.com/mobile-telephony/forward-reverse-channels.shtml What are the forward and reverse channels? http://www.tech-faq.com/mobile-telephony/tdma.shtml What are IS-54 and IS-136 (TDMA)? http://www.tech-faq.com/mobile-telephony/cdma-is-95.shtml What is IS-95 (CDMA)? http://www.tech-faq.com/mobile-telephony/gsm.shtml What is GSM? http://www.tech-faq.com/mobile-telephony/pcs.shtml What is PCS? http://www.tech-faq.com/mobile-telephony/iden.shtml What is iDEN? http://www.tech-faq.com/mobile-telephony/cell-phone-cloning.shtml What is cloning? http://www.tech-faq.com/mobile-telephony/tumbling.shtml What is tumbling? http://www.tech-faq.com/radio/geek-radios.shtml What radios are popular with geeks? http://www.tech-faq.com/radio/radio-license.shtml Do I need a license to use one of these radios? http://www.tech-faq.com/radio/radio-modification.shtml What about modifying (modding) these radios? http://www.tech-faq.com/radio/scanners.shtml What are better radios for scanning? http://www.tech-faq.com/radio/trunking.shtml What is trunking? http://www.tech-faq.com/radio/pirate-radio.shtml What is pirate radio? http://www.tech-faq.com/radio/radio-frequencies.shtml What frequencies are used for what purposes? http://www.tech-faq.com/radio/cb-citizens-band-radio.shtml What is CB (Citizens Band) Radio? http://www.tech-faq.com/radio/frs-family-radio-service.shtml What is FRS (Family Radio Service)? http://www.tech-faq.com/radio/murs-multi-use-radio-service.shtml What is MURS (Multi Use Radio Service)? http://www.tech-faq.com/radio/gmrs-general-mobile-radio-service.shtml What is GMRS (General Mobile Radio Service)? http://www.tech-faq.com/radio/radio-repeater.shtml What is a radio repeater? http://www.tech-faq.com/radio/internet-repeater.shtml What is an Internet repeater? http://www.tech-faq.com/radio/rfid.shtml What is RFID? http://www.tech-faq.com/television/satellite-television.shtml What kinds of satellite television networks are there? http://www.tech-faq.com/television/videocipher-ii.shtml What is VideoCipher II RS (VCII RS)? http://www.tech-faq.com/television/digicipher-ii.shtml What is DigiCipher II (DCII)? http://www.tech-faq.com/television/directv-access-cards.shtml What kinds of DirecTV access cards are there? http://www.tech-faq.com/television/signal-theft.shtml What do DirecTV and Dish Network do to stop signal theft? http://www.tech-faq.com/television/software-dss-access-cards.shtml What software is there to experiment with access cards? http://www.tech-faq.com/television/access-card-reader-writer.shtml What are the different types of access card hardware? http://www.tech-faq.com/television/where-access-card-reader-writer.shtml Where can I purchase hardware to experiment with access cards? http://www.tech-faq.com/television/directv-extension.shtml What is this extension DirecTV is telling me to call? http://www.tech-faq.com/television/tivo.shtml What can I do with a TiVo? http://www.tech-faq.com/television/content-scrambling-system.shtml What is CSS (Content Scrambling System)? http://www.tech-faq.com/television/regional-playback-control.shtml What is RPC (Regional Playback Control)? http://www.tech-faq.com/television/regional-coding-enhancement.shtml What is RCE (Regional Coding Enhancement)? http://www.tech-faq.com/television/macrovision.shtml What is Macrovision? http://www.tech-faq.com/cryptology/cryptology-cryptography-cryptanalysis.shtml What are cryptology, cryptography, and cryptanalysis? http://www.tech-faq.com/cryptology/plaintext-ciphertext.shtml What are plaintext and ciphertext? http://www.tech-faq.com/cryptology/symmetric-asymmetric.shtml What are symmetric and asymmetric ciphers? http://www.tech-faq.com/cryptology/block-stream-cipher.shtml What are block and stream ciphers? http://www.tech-faq.com/cryptology/substitution-transposition-cipher.shtml What are substitution and transposition ciphers? http://www.tech-faq.com/cryptology/chosen-plaintext-attack.shtml What is a chosen plaintext attack? http://www.tech-faq.com/cryptology/known-plaintext-attack.shtml What is a known plaintext attack? http://www.tech-faq.com/cryptology/known-ciphertext-attack.shtml What is a known ciphertext attack? http://www.tech-faq.com/cryptology/dictionary-attack.shtml What is a dictionary attack? http://www.tech-faq.com/cryptology/brute-force-attack.shtml What is a brute force attack? http://www.tech-faq.com/cryptology/rubber-hose-cryptology.shtml What is rubber hose cryptology? http://www.tech-faq.com/cryptology/message-digest.shtml What is a message digest? http://www.tech-faq.com/cryptology/md5.shtml What is MD5? http://www.tech-faq.com/cryptology/digital-signature.shtml What is a digital signature? http://www.tech-faq.com/cryptology/pgp.shtml What is PGP? http://www.tech-faq.com/cryptology/gpg.shtml What is GPG? http://www.tech-faq.com/cryptology/disk-encrypt.shtml How can I encrypt an entire disk? http://www.tech-faq.com/cryptology/cryptographic-algorithms.shtml What are some common cryptographic algorithms? http://www.tech-faq.com/cryptology/rot-13.shtml What is ROT-13? http://www.tech-faq.com/cryptology/xor-encryption.shtml What is XOR encryption? http://www.tech-faq.com/cryptology/one-time-pad.shtml What is a one-time pad? http://www.tech-faq.com/cryptology/des-data-encryption-standard.shtml What is DES? http://www.tech-faq.com/cryptology/rc4.shtml What is RC4? http://www.tech-faq.com/cryptology/rsa-rivest-shamir-adleman.shtml What is RSA? http://www.tech-faq.com/cryptology/dh-diffie-hellman.shtml What is Diffie-Hellman? http://www.tech-faq.com/cryptology/aes-advanced-encryption-standard-rijndael.shtml What is AES (Rijndael)? http://www.tech-faq.com/cryptology/cryptographic-libraries.shtml What are some useful cryptographic libraries? http://www.tech-faq.com/cryptology/kerberos.shtml What is Kerberos? http://www.tech-faq.com/cryptology/tls-transport-layer-security.shtml What is TLS (Transport Layer Security)? http://www.tech-faq.com/cryptology/steganography.shtml What is steganography? http://www.tech-faq.com/cryptology/recover-zip-password.shtml How can I recover a Zip password? http://www.tech-faq.com/cryptology/rar-password-recovery.shtml How does RAR password recovery work? http://www.tech-faq.com/cryptology/arj-password-recovery.shtml How does ARJ password recovery work? http://www.tech-faq.com/cryptology/word-password-recovery.shtml How does Microsoft Word password recovery work? http://www.tech-faq.com/cryptology/excel-password-recovery.shtml How does Microsoft Excel password recovery work? http://www.tech-faq.com/cryptology/powerpoint-password-recovery.shtml How does Microsoft PowerPoint password recovery work? http://www.tech-faq.com/cryptology/pdf-password-recovery.shtml How does PDF password recovery work? http://www.tech-faq.com/2600/alt-2600.shtml What is alt.2600? http://www.tech-faq.com/2600/meaning-2600.shtml What does 2600 mean? http://www.tech-faq.com/2600/2600-online.shtml Are there on-line versions of 2600 available? http://www.tech-faq.com/2600/2600-bookstores.shtml I can't find 2600 at any bookstores. What can I do? http://www.tech-faq.com/2600/2600-cost.shtml Why does 2600 cost more to subscribe to than to buy at a newsstand? http://www.tech-faq.com/cards/smart-card.shtml What is a Smart Card? http://www.tech-faq.com/cards/common-smart-card.shtml What are some common Smart Cards? http://www.tech-faq.com/cards/mag-stripe-cards.shtml What is the layout of data on magnetic stripe cards? http://www.tech-faq.com/cards/valid-credit-card-number.shtml How do I determine if I have a valid credit card number? http://www.tech-faq.com/miscellaneous/pick-locks.shtml How can I pick locks? http://www.tech-faq.com/miscellaneous/simplex-lock.shtml How do I open a Simplex lock? http://www.tech-faq.com/miscellaneous/bar-codes.shtml How do bar codes work? http://www.tech-faq.com/miscellaneous/acronyms.shtml What does XXX stand for? http://www.tech-faq.com/miscellaneous/pda.shtml What's inside my PDA (Personal Digital Assistant)? http://www.tech-faq.com/miscellaneous/palm-pilot.shtml Can I hack my Palm Pilot? http://www.tech-faq.com/miscellaneous/xbox.shtml Can I hack my XBOX? http://www.tech-faq.com/miscellaneous/ethics-hacking.shtml What are the ethics of hacking? http://www.tech-faq.com/miscellaneous/0-day.shtml What is 0-day? http://www.tech-faq.com/miscellaneous/traffic-lights.shtml How do traffic lights work? http://www.tech-faq.com/miscellaneous/biometrics.shtml What are biometrics? http://www.tech-faq.com/miscellaneous/social-engineering.shtml What is social engineering? http://www.tech-faq.com/miscellaneous/shoulder-surfing.shtml What is shoulder surfing? http://www.tech-faq.com/miscellaneous/computer-crime-laws.shtml What are the computer crime laws? http://www.tech-faq.com/miscellaneous/wordlist.shtml What is a wordlist? http://www.tech-faq.com/miscellaneous/aaa-authentication-authorization-accounting.shtml What is AAA? http://www.tech-faq.com/miscellaneous/role-based-access-control-rbac.shtml What is role based access control? -- Voyager Webmaster: http://www.hackfaq.org .