Get Herbal Natural More Effective Alternatives to Viagra, Valium, Fat Burner, Energizer, Youth Regainer Now

Get Herbal                 Alternatives Now

find love and romance find friends and penpals find frienship and care 

@Absolute Agency Dating Service

Home | Search | Freeware | Tips & Tricks | Anti-Spam
Hardware | Drivers | Hacking & Security | Various | Add URL
 

 

 

 * Related material on this web site

 * Web sites in de Nederlandse taal (Dutch language only)
 


 2600: The Hacker Quarterly
information, meetings, 'just hacked' sites, news, magazine, archive, etc.
 


 Active Matrix's Hideaway: Security and Hacking
hundreds of hacking links, text files on phreaking, Unix, tutorials & FAQ`s, security bugs, privacy information, progamming, Linux, FTP`s, essays, security analysis/consulting & more. Quote from the web site: 'The Hideaway is devoted to educating the masses about computer security and the hacking subculture. If you've come for warez, carding, serial numbers, cracks, or virusus, you are at the wrong site. This site is about knowledge, not robbery or destruction'
 


 advICE
advice security database on hacker prevention, intrusion detection, firewalls, and other countermeasures
 


 ALL THE LATEST NT SECURITY NEWS
as the title says
 


 AnarchyRules.com
quite a few files on security, hacking, phreaking and more
 


 AntiCode - Exploits - Computer Security - Hacking and Hackers
The AntiCode project was designed to become a critical resource for Systems Administrators and Information Security Consultants alike, by providing an archive with up-to-the-minute exploit and cracker tool information to publicly educate 'netizens' of the security problems found in computer networks today
 


 AntiOnline - Computer Security - Hacking and Hackers
AntiOnline's mission is to educate the public about computer security and hacking related issues. They have archives, daily news, a search engine, and more
 


 cDc
'Cult of the Death Cow', authors of Backorifice virus. Click here for a reliable anti-Back Orifice finder/killer
 


 Checksum.org
tools, text-files, links, ftp-sites & more
 


 CERT® Coordination Center
at the CERT Coordination Center, they study Internet security vulnerabilities, provide incident response services to sites that have been the victims of attack, publish a variety of security alerts, research security and survivability in wide-area-networked computing, and develop information to help you to improve security at your site
 


 CERT® Coordination Center - Frequently Asked Questions About Malicious Web Scripts Redirected By Web Sites
a problem has recently been identified that can be found on a wide variety of web sites: what you receive from a web site may not be what that site meant to send. If you click on a specially designed link, the site may unknowingly send you bad data, unwanted pictures, and programs (malicious scripts) to compromise your data. The problem is not with web browsers themselves but with how web pages are constructed and how data entering and leaving web sites is validated. "Validate" means ensuring no "unintended" characters are sent back to the client
 


 Code Reversing for Beginners & Newbies
a step by step guide to cracking. Why search the web for cracks and serial numbers when you can learn to create these yourself, it`s a good way to learn how software works
 


 CRYPT OF THA WIZARD
large amount of information on security, tools for hacking, an interesting library and some links
 


 Cryptonym - Microsoft/NSAKEY FAQ
Microsoft, the NSA, and you: Microsoft installs US Spy Agency with Windows. Research Triangle Park, NC (August 31, 1999). Between Hotmail hacks and browser bugs, Microsoft has a dismal track record in computer security. Most of us accept these minor security flaws and go on with life. But how is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft may have installed a 'back door' for the National Security Agency (NSA - the USA's spy agency) making it orders of magnitude easier for the US government to access their computers?
 


 Directory of /pub/usenet-by-group/alt.2600
a complete set of FAQ`s, very comprehensive
 


 DMS - EvilHaxxoring
tutorials & FAQ`s on hacking, Unix and more, tools etc.
 


 DMS - EvilHaxxoring
tutorials & FAQ`s on hacking, Unix and more, tools etc.
 


 Echelon Watch
Echelon is perhaps the most powerful intelligence gathering organization in the world. Reports suggest that this network is being used to spy on private citizens everywhere, including on the Internet. This site is designed to encourage public discussion of this potential threat to civil liberties, and to urge the governments of the world to protect our rights
 


 Exploit world
Exploit World (everything (Solaris, FreeBSD, OpenBSD, NetBSD, BSDI, Sun Solaris, Linux, Microsoft Windows, SGI IRIX, HP, HP-UX, IBM AIX, SCO, Digital ULTRIX/TRU64, Apple Macintosh, etc.) section). Vulnerabilities for this OS/Application along with description, vulnerability assessment, and exploit. For Hackers wishing to validate their Network Security, Penetration testing, auditing, etc.
 


 FAQs Index - UNIX
a large, searchable data base
 


 Flashback Underground Library
a very large archive containing almost everything related to underground (in the broadest sense of the word) one would want to know
 


 Hackers.Com
Hackers.Com was started in 1994 by HackingWiz as a home on the world wide web for his popular dial-up underground BBS, The Hackers' Haven, which has been in operation since 1983. Hackers.Com represented not only a BBS that freely distributed information, but a place for freedom of speech and freedom of the mind that allowed knowledge to pass through it unfiltered: archives, information, services and more
 


 HackerZ Hideout
contains an extensive library of all kind of files, and more. For both the newbie and the advanced computer user
 


 HACKERS HOME PAGE
phone phreaking, spying, cracking/lock picking, cable hacking, miscellaneous, computer hacking, financial hacking, information hacking
 


 HackerzLair
tutorials, info, Linux, exploits, files, cryptography, tools, WWWboard (post your burning question here) and more
 


 Hacking file archive
a large amount of hacking texts, tutorials on phreaking, cracking, BBS hacking, Internet Hacking. BOX schemes, archive crackers, keystroke recorders, Nukers/Sniffers/Spoofers/Flooders/Port Scanners/ICQ-related, mail bombers, password crackers/dictionary files, security/encryption
 


 Hacking Unix Systems
an indepth guide to hacking UNIX and the concept of basic networking
 


 HNN - H a c k e r N e w s N e t w o r k
daily hacker and computer security news
 


 Happy Hacker
guides to (mostly) harmless hacking
 


 HIGHER LEARNING
this page is meant for all the real hackers who still believe in the old hacker code. Here you'll mostly find texts concerning the arts of hacking, phreaking and demo coding
 


 Hollands Hacken
unfrequently updated news, links, tips, and other info of the dutch hackersscene
 


 Index of /web/r/ramiz
useful files
 


 ITRIS
quote from the web site: "Hacking is not about answers. Hacking is about the path you take to find the answers. If you want help, don't ask for answers, ask for a pointer to the path you need to take to find out those answers for yourself. Because it is not the people with the answers that are the hackers, it is the people that are travelling along the path"
 


 L0pht Heavy Industries
L0pht is a group of hackers who got together and started working on projects together. There are remnants of different groups that make up L0pht such as RDT, cDc, RL, etc. They didn't start this thing off to make money, but out of a love for technology and making it do things that it might not have originally been meant to. There`re two groups that make up L0pht: a hardware and a software group. The hardware group works with wireless communications, packet radio, microwave links, and various telephony projects. The software group deals a lot with computer security of various operating systems
 


 Links to the Net's security, hack, crack, crypto, information etc.
a large amount of links to computer security related sites, covering almost any possible subject
 


 Linux Administrators Security Guide
a 150+ (on June 12, 1999) page document on Linux security
 


 Little Panda's Mailer (no login)
completely anonymous (no receiving - sending only) webmail without any nagging 'signatures' like "Do You Yahoo!? Talk to your friends online with Yahoo! Messenger" inserted at the bottom of your message. This is a 100% non-commercial web site, no login needed, no banners. The kind of site I like
 


 MAPS Transport Security Initiative
Do you manage an Internet mail server? Is your server secure? Or is it vulnerable to third-party relay? If so, then it's only a matter of time before spammers hijack your mail server. The threat is real, and the problem is happening now. Most modern mailers have the capability to fight these intruders. Act now to secure your mail server
 


 Mart`s hack page
some FAQs and other docs
 


 NEWORDER
link/files database of hacking texts, utilities, various interesting informations, exploits, security & more
 


 News groups (hacking, computer-security & related)
alt.2600 // alt.2600.414 // alt.2600.AOL // alt.2600.cardz // alt.2600.codez // alt.2600.crackz // alt.2600.debate // alt.2600.crypteia // alt.2600.hackerz // alt.2600.hope.announce // alt.2600.hope.tech // alt.2600.is.sooo.lame // alt.2600.moderated // alt.2600.programz // alt.2600.phreakz // alt.2600.programz // alt.binaries.hacking.beginner // alt.binaries.hacking.computers // alt.binaries.hacking.utilities // alt.binaries.hacking.websites // alt.bio.hackers // alt.cellular // alt.cellular-phone-tech // alt.cellular.oki.900 // alt.crackers // alt.cracks // alt.dcom.telecom // alt.hack // alt.hack.nl // alt.hacker // alt.hackers // alt.hackers.discuss // alt.hackers.groups // alt.hackers.malicious // alt.hackers.hackintosh // alt.phreaking // alt.privacy // alt.privacy.anon-server // alt.privacy.clipper // alt.private.investigator // alt.put // alt.security // alt.security.index // alt.security.keydist // alt.security.ripem // alt.wired // comp.privacy // comp.protocols.tcp-ip // comp.risks // comp.security.announce // comp.security.firewalls // comp.security.misc // comp.security.unix // comp.society.privacy // sci.crypt
 


 Nomad Mobile Research Centre - mirror
large amount of FAQ`s (hacking in general, Netware hacking, web hacking, ICQ hacking, NT hacking, Mac hacking etc.), information, news, files, and more. Site is searchable
 


 No title
how to break into BBS systems, basic hacking tutorials, hacking DEC's, hacking TRW, hacking VAX & UNIX
 


 PC Hacking Tips
this FAQ describes how to break-in to a PC (IBM-Compatible) and how to bypass most software-based security measures. The last section details how to secure your PC against such attacks
 


 Proxys - 4 - All : Helping Secure Your Privacy & Anonymity on the Internet
the largest, most up to date list of accessible tested free public proxys for web, http, ftp, socks, telnet, wais, gopher, and more. Reasons that one may want to use a proxy server: 1/ Privacy & Anonymity: you may not like visiting web sites that gather information about your self, your buying patterns, etc. You may want to visit a site without leaving any traces that it was you. For instance you want to check what's going on at your competitor's site. Your visit will leave a record in their log file. Frequent visits will leave many records. 2/ Speed: if the Internet sevice provider you normally use is (very) slow, connecting to a large proxy may speed up your connection times considerably
 


 Psychotic's Unix Bible
an excellent Unix resource to have. The Unix Bible contains and illustrates many Unix commands and their syntaxes - zipped file
 


 Resetting/Disabling CMOS Setup Password
not being able to gain access to the BIOS Setup because of the password security is very frustrating. Not to fear, whether you forgot your password, or someone came along and entered one in just to be a moron, it is possible to reset the password and/or disable it. This page lists a number of 'hidden' universal passwords that will work on many systems; and it recaps other ways of clearing passwords. Also, some essential tools regarding BIOS & related can be found at this page
 


 root.shell
news for, and about hackers and hacking
 


 Secure index / Free the information
hacking & related: files from 1982-20xx, text-files, search, links, IRC, Unix
 


 s e c u r i t y f o c u s
securityfocus.com is designed to facilitate discussion on security related topics, create security awareness, and to provide the Internet's largest and most comprehensive database of security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list
 


 Shields UP! -- Internet Connection Security Analysis
without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer's data to the entire world at this very moment. Shields UP quickly checks the security of your computer's connection to the Internet, and tells you what to do if your connection is found insecure
 


 Sir Hackalot. UNIX: A Hacking Tutorial - miror
as the title says
 


 So you wanna be a Hacker?
tutorials for newbies and information on security
 


 The A.R.G.O.N.
this site has almost anything: defense/protection, privacy, security, encryption, proxys, source code, firewalls info, IP-spoofing, wingates, anon-remailer page, web-based remailers, crypto-breaking tools, library (text-files), download page, required files, about IRC, special topics, links to other sites, and there`s more
 


 The Electronic Frontier Foundation
top 12 ways to protect your online privacy
 


 The New Hacker's Dictionary
hackers jargon dictionary
 


 Threats to your Security on the Internet
the trojan horse applications discussed within this web site are remote administration hacker utilities that will allow a user to control another user's computer across the Internet. Trojan horse applications can provide equal, if not more control of a remote PC system than the person sitting at its keyboard
 


 Unix commands reference card
This how-to guide lists some of the most common Unix commands
 


 Unix Guru Universe
page for Unix system administrators - catalogized links of Unix flavors, system administration, networking, security, software, conferences, shows, events and vendors. They say, quote: 'Largest UNIX system administration resource site, for beginners and gurus that are looking for UNIX sites on the internet'
 


 UNIXhelp for users - mirror
Helpful information for users of the UNIX operating system, developed at the University of Edinburgh from work funded by the ITTI. Searchable index
 


 UNIX Manual
A basic UNIX manual
 


 unix / net / hack page
documents on Unix and security
 


 UNIX Reference Desk
This document contains references to material culled from a number of different sources on computing in the UNIX environment. The resources in this document are divided into the following classes: general, texinfo pages, applications, programming, IBM AIX systems, HP-UX systems, Unix for PC`s, Sun systems, X Window system, networking, security and humor
 


 Unix System Administration Independent Learning
A reference resource for system administrators
 

 
This is a mirror site. Please check for updates at http://www.mato.demon.nl/
Please visit http://come.to/bigwig - Search and Find Even Hidden Stuff, Promote Site, Free Downloads