URI: 
  TEXT 1.txt - Introduction (by TCLH)
  TEXT 2.txt - Phrack Prophile of The UNIX Terrorist (by TCLH)
  TEXT 3.txt - Phrack World News (by TCLH)
  TEXT 4.txt - Stealth Hooking: another way to subvert the Windows kernel (by mxatone & ivanlefou)
  TEXT 5.txt - Clawing holes in NAT with UPnP (by felinemenace)
  TEXT 6.txt - The only laws on Internet are assembly and RFCs (by Julia)
  TEXT 7.txt - Hacking the System Management Mode (by BSDaemon, coideloko, d0nand0n)
  TEXT 8.txt - Mystifying the debugger for ultimate stealthness (by halfdead)
  TEXT 9.txt - Australian Restricted Defense Networks and FISSO (by The Finn)
  TEXT 10.txt - Phook - The PEB Hooker (by shearer & dreg)
  TEXT 11.txt - Hacking the $49 Wifi Finder (by openschemes)
  TEXT 12.txt - The art of exploitation: Samba WINS stack overflow (by max_packetz)
  TEXT 13.txt - The Underground Myth (by anonymous)
  TEXT 14.txt - Hacking your brain: Artificial Conciousness (by -C)
  TEXT 15.txt - International scenes (by various)