URI: 
  TEXT 1.txt - Introduction (by Phrack Staff)
  TEXT 2.txt - Loopback (by Phrack Staff)
  TEXT 3.txt - Linenoise (by Phrack Staff)
  TEXT 4.txt - Handling the Interrupt Descriptor Table (kad)
  TEXT 5.txt - Advances in kernel hacking II (by palmers)
  TEXT 6.txt - Defeating Forensic Analysis on Unix (by the grugq)
  TEXT 7.txt - Advances in format string exploiting (by gera & riq)
  TEXT 8.txt - Runtime process infection (by anonymous author)
  TEXT 9.txt - Bypassing PaX ASLR protection (by anonymous author)
  TEXT 10.txt - Execution path analysis: finding kernel rk's (by J.K.Rutkowski)
  TEXT 11.txt - Cuts like a knife, SSHarp (by stealth)
  TEXT 12.txt - Building ptrace injecting shellcodes (by anonymous author)
  TEXT 13.txt - Linux/390 shellcode development (by johnny cyberpunk)
  TEXT 14.txt - Writing linux kernel keylogger (rd)
  TEXT 15.txt - Cryptographic random number generators (DrMungkee)
  TEXT 16.txt - Playing with windows /dev/(k)mem (crazylord)
  TEXT 17.txt - Phrack World News (by Phrack Staff)
  TEXT 18.txt - Phrack magazine extraction utility (by Phrack Staff)