Icon  Name                        Size  Description
[DIR] Parent Directory - [DIR] 2020Hacker/ - [DIR] 3d13/ - [DIR] 912hd/ - [DIR] Rafale/ - [DIR] akt/ - [DIR] alcibiade/ - [DIR] alternative/ - [DIR] anathema/ - [DIR] apocalypse/ - [DIR] asm/ - [DIR] bama/ - [DIR] bfz/ - [DIR] bhz/ - [DIR] blacklotus/ - [DIR] busted/ - [DIR] casio/ - [DIR] cee/ - [DIR] cgi_hole/ - [DIR] chg/ - [DIR] cleozine/ - [DIR] coredump/ - [DIR] counterstrike/ - [DIR] cours/ - [DIR] cryptel/ - [DIR] cybz/ - [DIR] deadend/ - [DIR] deathlyby/ - [DIR] dhmag/ - [DIR] drapeaunoir/ - [DIR] dsk/ - [DIR] fantom/ - [DIR] firewall/ - Comprendre les FireWall, par Trom [DIR] frhack/ - [DIR] gogo/ - [DIR] gsm_codes/ - [DIR] h=edm2/ - [DIR] hack25/ - [DIR] hackerstorm/ - [DIR] hackoff/ - [DIR] hackview/ - [DIR] hackzine/ - [DIR] haqch/ - [DIR] hcb/ - [DIR] hccc/ - [DIR] hohs/ - [DIR] hvu/ - [DIR] iga/ - [DIR] immortal/ - [DIR] insecuremag/ - [DIR] intrusion/ - Ed: Ramouz - Texte en .DOC, Made in Microsoft Word 97.. [DIR] ioc/ - [DIR] jambon/ - [DIR] jci/ - [DIR] jokers/ - [DIR] kiing/ - [DIR] kye/ - [DIR] larsen/ - [DIR] lddm/ - [DIR] le_reporter/ - [DIR] liberte/ - [DIR] lotfree/ - [DIR] lutin/ - [DIR] macmillam/ - [DIR] magattack/ - [DIR] malicia/ - [DIR] mcours/ - [DIR] memento/ - [DIR] mindkind/ - [DIR] mj13/ - [DIR] n0name/ - [DIR] nightz04/ - [DIR] nofutur/ - [DIR] nopasswd/ - [DIR] nopast/ - [DIR] nopeace/ - [DIR] noroute/ - [DIR] nowall/ - [DIR] noway/ - [DIR] nowhere/ - [DIR] npc/ - [DIR] organiks/ - textes de bon niveau au veritable arome de C.. arf ca c'est du mag! ;) [DIR] pgk/ - [DIR] phrack/ - [DIR] phreakaz/ - [DIR] pirage/ - [DIR] polio/ - [DIR] prograzine/ - [DIR] pyrofreak/ - [DIR] qha/ - [DIR] rcn/ - [DIR] revolution/ - [DIR] row/ - [DIR] rtcmag/ - [DIR] secuinfo/ - [DIR] securimag/ - [DIR] silmarillon/ - [DIR] sleazywind/ - [DIR] snap/ - [DIR] t-s63/ - [DIR] tcdiaries/ - [DIR] tdcmag/ - [DIR] thelastclik/ - [DIR] theultimate/ - [DIR] totalctrl/ - [DIR] tradefr/ - [DIR] tsa/ - [DIR] tua/ - [DIR] uha/ - [DIR] underdark/ - [DIR] underhack/ - [DIR] underwayy/ - Ed: Psyko/Underwayy - Philo Excellente (n0.2), Niveau : Mouvant [DIR] xgj/ - [DIR] xiii/ - [DIR] xtc/ - [DIR] zone51/ - [Compressed] 2d3dfx.zip 1.0M Demomaking : Effets 2D/3D en C++ [Compressed] 3644.zip 2.7K France Telecom : Numeros en 3644 [   ] HackTeamLzine1.rar 1.3M [Compressed] M.I.B Mag #1(2).zip 446K [Compressed] allianx.zip 62K Beige boxing, VMB File Transfert, Open source, Secu Linux, IRC Scripting, Prog Shell, TCP/IP, TPascal, CoreWar [07/00] [Compressed] an020995.zip 31K [Compressed] an101495.zip 43K [Compressed] aohmag1.zip 13K Misc newbies tutorials - 1: Coditel, Hacking basics, GSM [Compressed] asf_tuto.zip 121K Ed: SeMPai - Scene ASF Warez : Release de Movies - Passer du Camescope au CD avec le soft Wmodp [Compressed] bases12.zip 3.7K Base du hacking (newbies) [Compressed] beef13.zip 56K Beef13 Corp : hackers amateurs - 1: Virus, Anonymail, Boxing [Compressed] blast.zip 17K 1: Warez, BIOS pass, Phf, wwwboards [Compressed] bsc01.zip 47K Brain Storm Crew : Scene, H/P et delires - SE, Backdoor IRC, Web engineering, Hack Tripod, Passwd, Wingates, protocole IP, (T)FTP, PABC/VMB, Prog Batch [09/00] [Compressed] cybpunk.zip 64K [   ] deadend_1.rar 671K [Compressed] dns-1034.zip 51K [Compressed] efs.zip 5.4K Chiffrement de donnees EFS dans Windows NT [Compressed] golio.zip 13K Le hpc pour les golios ! 1: panorama hacking fr [Compressed] guide.zip 18K Le guide satirique pour devenir un vrai hacker... [Compressed] icztrad.zip 229K [Compressed] improving1.zip 10K Ed: The Cripple - Ameliorer la Securite de Votre System en le Piratant [Compressed] kaotix-01.zip 34K Ed: iXtlan - Parano et Sympa comme il faut ! 1: .htaccess, hack SMTP, Tribe, Nukers, Virus... [Compressed] kdbzine1.zip 38K [Compressed] lamah1.zip 78K [Compressed] memento.zip 236K Ed: Shmeit Corp. - [.HTML] Cours de crack illustres et progressifs 1: 5 Cours Crack, Creer un patch en TP [Compressed] morbidedark1.zip 3.1K Win95 registry [Compressed] mvm1.zip 54K BeigeBox, AOL, VMB, Cracking, SE [   ] nc0.tgz 73K [Compressed] norb-wrz.zip 9.9K Werez: Presentation, Tests, Distro [Compressed] nozep.zip 8.3K Netbios, Mailbox, Icq [Compressed] p62.tar.gz 131K [Compressed] penelope.zip 137K [TXT] ph34r-mag.txt 101K [Compressed] phrack60-fr.tar.gz 519K [Compressed] phrack61.tar.gz 344K [Compressed] phylof.zip 1.5K Ed: 'Vincent' [[ADM]] - Texte realiste sur l'underground [Compressed] pksd001.zip 7.7K [Compressed] pksd002.zip 10K [Compressed] pksd003.zip 14K [Compressed] putois.zip 2.5K Special IExplorer 4/5 [Compressed] sevensynkopmag-opus1.tar.gz 187K Failles PHP, WSH, Cracking [Compressed] shogun.zip 29K Fun & trash 1: No I.N.S.E.E (Secu), Crash Car, Hack machines a monnaie> [Compressed] t-s63-4.zip 26K Mil. Telecom [Compressed] tc-s63.zip 26K Infos sur certains autocoms [Compressed] tcp.zip 63K TCP/IP en langage C [Compressed] tdc.zip 352K [Compressed] textes.zip 238K Compil de txt interessants [Compressed] usn.zip 126K Compil. textes & exploits (Anglais), Excellent niveau [Compressed] vmb_admin.zip 18K Manuel-expert VMB Alcatel 42xx [Compressed] wargames.zip 6.2K [TXT] wickedcity.htm 55K [Compressed] wwa.zip 67K White-Wolf Army : Securite, drugs et Demomaking - 1: Fire Effect (Asm), Legislation Francaise, SoftIce, ICQ Spy, Cryptage (1), GHB, Crypteur Telephone [04/00] [Compressed] xhmag.zip 28K Linux, SE, NFS, Delires
Merci a tous les Uploaders anonymes, pour toutes demandes/remarques : Contact

TESTIMONY BY GEOFFREY S. GOODFELLOW Before the Subcommittee on Transportation, Aviation and Materials on the subject of Telecommunications Security and Privacy.

26 September 1983

Table of Contents 1. Introduction 2. The Nature of Computer Hackers and Hacking. 3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem? 4. Let Us Not Lull Ourselves into a False Sense of Security. 5. Recommendations 6. Biography (The Making of a Hacker)


My name is Geoffrey S. Goodfellow. I am primarily employed by the Computer Science Laboratory at SRI International, Menlo Park, California. For the past 10 years at SRI, I have been involved in research efforts related with packet switched computer network communication systems, protocols and security technologies. I have also been involved in various operating and sub-system development projects. Currently, my responsibilities include a position as Principle Investigator of SRI's involvement in a Department of Defense program aimed at developing and proving secure computer systems, that operate at different security levels and communicate via networks. A detailed biography of my career from 7th grade school where I discovered computers (which eventually lead to my permanent abandonment of the formal educational system during high school) to how I got to where I am today with no degrees or any type of equivalency to my name is included at the end of my testimony. I am a coauthor of the Hacker's Dictionary -- A Guide to the World of Computer Wizards, a new book being published this fall. THE STATEMENTS INCLUDED HEREIN ARE MY OWN AND DO NOT NECESSARILY REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.

2. The Nature of Computer Hackers and Hacking.

The primary nature of a computer hacker can be defined as follows: - A person who enjoys learning or knowing the details of computer systems and how to stretch their capabilities, as opposed to most users of computers, who prefer to learn or know only the minimum amount necessary in order to get their job done. - One who programs computers enthusiastically, for the sheer fun of it, and gets a non professional amount of enjoyment out of using them. - A person capable of appreciating the irony and beauty (i.e.`hack value') of a program. - A person who is good at programming quickly or is an expert on aparticular program. (This definition and the proceeding ones are correlated, and people who fit them congregate). Unfortunately, though, hacking has an unsavory faction to it: - A malicious or inquisitive meddler (i.e. `poacher') who tries to discover information by poking around.For example, a "password hacker" is one who tries, possibly by deceptive or illegal means, to discover other people's computer passwords. - A "network hacker" is one who tries to learn about the computer network (possibly because he wants to interfere--one can tell the difference only by context, tone of voice and manner of approach).