|
*
Web sites in de Nederlandse taal
(Dutch language only)
2600:
The Hacker Quarterly
information,
meetings, 'just hacked' sites, news, magazine, archive, etc.
Active
Matrix's Hideaway: Security and Hacking
hundreds
of hacking links, text files on phreaking, Unix, tutorials & FAQ`s,
security bugs, privacy information, progamming, Linux, FTP`s, essays, security
analysis/consulting & more. Quote from the web site: 'The Hideaway
is devoted to educating the masses about computer security and the hacking
subculture. If you've come for warez, carding, serial numbers, cracks,
or virusus, you are at the wrong site. This site is about knowledge, not
robbery or destruction'
advICE
advice
security database on hacker prevention, intrusion detection, firewalls,
and other countermeasures
ALL
THE LATEST NT SECURITY NEWS
as
the title says
AnarchyRules.com
quite
a few files on security, hacking, phreaking and more
AntiCode
- Exploits - Computer Security - Hacking and Hackers
The
AntiCode project was designed to become a critical resource for Systems
Administrators and Information Security Consultants alike, by providing
an archive with up-to-the-minute exploit and cracker tool information to
publicly educate 'netizens' of the security problems found in computer
networks today
AntiOnline
- Computer Security - Hacking and Hackers
AntiOnline's
mission is to educate the public about computer security and hacking related
issues. They have archives, daily news, a search engine, and more
cDc
'Cult
of the Death Cow', authors of Backorifice virus. Click here
for a reliable anti-Back Orifice finder/killer
Checksum.org
tools,
text-files, links, ftp-sites & more
CERT®
Coordination Center
at
the CERT Coordination Center, they study Internet security vulnerabilities,
provide incident response services to sites that have been the victims
of attack, publish a variety of security alerts, research security and
survivability in wide-area-networked computing, and develop information
to help you to improve security at your site
CERT®
Coordination Center - Frequently Asked Questions About Malicious Web Scripts
Redirected By Web Sites
a
problem has recently been identified that can be found on a wide variety
of web sites: what you receive from a web site may not be what that site
meant to send. If you click on a specially designed link, the site may
unknowingly send you bad data, unwanted pictures, and programs (malicious
scripts) to compromise your data. The problem is not with web browsers
themselves but with how web pages are constructed and how data entering
and leaving web sites is validated. "Validate" means ensuring no "unintended"
characters are sent back to the client
Code
Reversing for Beginners & Newbies
a
step by step guide to cracking. Why search the web for cracks and serial
numbers when you can learn to create these yourself, it`s a good way to
learn how software works
CRYPT
OF THA WIZARD
large
amount of information on security, tools for hacking, an interesting library
and some links
Cryptonym
- Microsoft/NSAKEY FAQ
Microsoft,
the NSA, and you: Microsoft installs US Spy Agency with Windows. Research
Triangle Park, NC (August 31, 1999). Between Hotmail hacks and browser
bugs, Microsoft has a dismal track record in computer security. Most of
us accept these minor security flaws and go on with life. But how is an
IT manager to feel when they learn that in every copy of Windows sold,
Microsoft may have installed a 'back door' for the National Security Agency
(NSA - the USA's spy agency) making it orders of magnitude easier for the
US government to access their computers?
Directory
of /pub/usenet-by-group/alt.2600
a
complete set of FAQ`s, very comprehensive
DMS
- EvilHaxxoring
tutorials
& FAQ`s on hacking, Unix and more, tools etc.
DMS
- EvilHaxxoring
tutorials
& FAQ`s on hacking, Unix and more, tools etc.
Echelon
Watch
Echelon
is perhaps the most powerful intelligence gathering organization in the
world. Reports suggest that this network is being used to spy on private
citizens everywhere, including on the Internet. This site is designed to
encourage public discussion of this potential threat to civil liberties,
and to urge the governments of the world to protect our rights
Exploit
world
Exploit
World (everything (Solaris, FreeBSD, OpenBSD, NetBSD, BSDI, Sun Solaris,
Linux, Microsoft Windows, SGI IRIX, HP, HP-UX, IBM AIX, SCO, Digital ULTRIX/TRU64,
Apple Macintosh, etc.) section). Vulnerabilities for this OS/Application
along with description, vulnerability assessment, and exploit. For Hackers
wishing to validate their Network Security, Penetration testing, auditing,
etc.
FAQs
Index - UNIX
a
large, searchable data base
Flashback
Underground Library
a
very large archive containing almost everything related to underground
(in the broadest sense of the word) one would want to know
Hackers.Com
Hackers.Com
was started in 1994 by HackingWiz as a home on the world wide web for his
popular dial-up underground BBS, The Hackers' Haven, which has been in
operation since 1983. Hackers.Com represented not only a BBS that freely
distributed information, but a place for freedom of speech and freedom
of the mind that allowed knowledge to pass through it unfiltered: archives,
information, services and more
HackerZ
Hideout
contains
an extensive library of all kind of files, and more. For both the newbie
and the advanced computer user
HACKERS
HOME PAGE
phone
phreaking, spying, cracking/lock picking, cable hacking, miscellaneous,
computer hacking, financial hacking, information hacking
HackerzLair
tutorials,
info, Linux, exploits, files, cryptography, tools, WWWboard (post your
burning question here) and more
Hacking
file archive
a
large amount of hacking texts, tutorials on phreaking, cracking, BBS hacking,
Internet Hacking. BOX schemes, archive crackers, keystroke recorders, Nukers/Sniffers/Spoofers/Flooders/Port
Scanners/ICQ-related, mail bombers, password crackers/dictionary files,
security/encryption
Hacking
Unix Systems
an
indepth guide to hacking UNIX and the concept of basic networking
HNN
- H a c k e r N e w s N e t w o r k
daily
hacker and computer security news
Happy
Hacker
guides
to (mostly) harmless hacking
HIGHER
LEARNING
this
page is meant for all the real hackers who still believe in the old hacker
code. Here you'll mostly find texts concerning the arts of hacking, phreaking
and demo coding
Hollands
Hacken
unfrequently
updated news, links, tips, and other info of the dutch hackersscene
Index
of /web/r/ramiz
useful
files
ITRIS
quote
from the web site: "Hacking is not about answers. Hacking is about the
path you take to find the answers. If you want help, don't ask for answers,
ask for a pointer to the path you need to take to find out those answers
for yourself. Because it is not the people with the answers that are the
hackers, it is the people that are travelling along the path"
L0pht
Heavy Industries
L0pht
is a group of hackers who got together and started working on projects
together. There are remnants of different groups that make up L0pht such
as RDT, cDc, RL, etc. They didn't start this thing off to make money, but
out of a love for technology and making it do things that it might not
have originally been meant to. There`re two groups that make up L0pht:
a hardware and a software group. The hardware group works with wireless
communications, packet radio, microwave links, and various telephony projects.
The software group deals a lot with computer security of various operating
systems
Links
to the Net's security, hack, crack, crypto, information etc.
a
large amount of links to computer security related sites, covering almost
any possible subject
Linux
Administrators Security Guide
a
150+ (on June 12, 1999) page document on Linux security
Little
Panda's Mailer (no login)
completely
anonymous (no receiving - sending only) webmail without any nagging 'signatures'
like "Do You Yahoo!? Talk to your friends online with Yahoo! Messenger"
inserted at the bottom of your message. This is a 100% non-commercial web
site, no login needed, no banners. The kind of site I like
MAPS
Transport Security Initiative
Do
you manage an Internet mail server? Is your server secure? Or is it vulnerable
to third-party relay? If so, then it's only a matter of time before spammers
hijack your mail server. The threat is real, and the problem is happening
now. Most modern mailers have the capability to fight these intruders.
Act now to secure your mail server
Mart`s
hack page
some
FAQs and other docs
NEWORDER
link/files
database of hacking texts, utilities, various interesting informations,
exploits, security & more
News
groups (hacking, computer-security & related)
alt.2600
// alt.2600.414 // alt.2600.AOL
// alt.2600.cardz // alt.2600.codez
// alt.2600.crackz // alt.2600.debate
// alt.2600.crypteia // alt.2600.hackerz
// alt.2600.hope.announce //
alt.2600.hope.tech // alt.2600.is.sooo.lame
// alt.2600.moderated // alt.2600.programz
// alt.2600.phreakz // alt.2600.programz
// alt.binaries.hacking.beginner
// alt.binaries.hacking.computers
// alt.binaries.hacking.utilities
// alt.binaries.hacking.websites
// alt.bio.hackers // alt.cellular
// alt.cellular-phone-tech //
alt.cellular.oki.900 // alt.crackers
// alt.cracks // alt.dcom.telecom
// alt.hack // alt.hack.nl
// alt.hacker // alt.hackers
// alt.hackers.discuss // alt.hackers.groups
// alt.hackers.malicious // alt.hackers.hackintosh
// alt.phreaking // alt.privacy
// alt.privacy.anon-server //
alt.privacy.clipper // alt.private.investigator
// alt.put // alt.security
// alt.security.index // alt.security.keydist
// alt.security.ripem // alt.wired
// comp.privacy // comp.protocols.tcp-ip
// comp.risks // comp.security.announce
// comp.security.firewalls //
comp.security.misc // comp.security.unix
// comp.society.privacy // sci.crypt
Nomad
Mobile Research Centre - mirror
large
amount of FAQ`s (hacking in general, Netware hacking, web hacking, ICQ
hacking, NT hacking, Mac hacking etc.), information, news, files, and more.
Site is searchable
No
title
how
to break into BBS systems, basic hacking tutorials, hacking DEC's, hacking
TRW, hacking VAX & UNIX
PC
Hacking Tips
this
FAQ describes how to break-in to a PC (IBM-Compatible) and how to bypass
most software-based security measures. The last section details how to
secure your PC against such attacks
Proxys
- 4 - All : Helping Secure Your Privacy & Anonymity on the Internet
the
largest, most up to date list of accessible tested free public proxys for
web, http, ftp, socks, telnet, wais, gopher, and more. Reasons that one
may want to use a proxy server: 1/ Privacy & Anonymity: you may not
like visiting web sites that gather information about your self, your buying
patterns, etc. You may want to visit a site without leaving any traces
that it was you. For instance you want to check what's going on at your
competitor's site. Your visit will leave a record in their log file. Frequent
visits will leave many records. 2/ Speed: if the Internet sevice provider
you normally use is (very) slow, connecting to a large proxy may speed
up your connection times considerably
Psychotic's
Unix Bible
an
excellent Unix resource to have. The Unix Bible contains and illustrates
many Unix commands and their syntaxes - zipped file
Resetting/Disabling
CMOS Setup Password
not
being able to gain access to the BIOS Setup because of the password security
is very frustrating. Not to fear, whether you forgot your password, or
someone came along and entered one in just to be a moron, it is possible
to reset the password and/or disable it. This page lists a number of 'hidden'
universal passwords that will work on many systems; and it recaps other
ways of clearing passwords. Also, some essential tools regarding BIOS &
related can be found at this page
root.shell
news
for, and about hackers and hacking
Secure
index / Free the information
hacking
& related: files from 1982-20xx, text-files, search, links, IRC, Unix
s
e c u r i t y f o c u s
securityfocus.com
is designed to facilitate discussion on security related topics, create
security awareness, and to provide the Internet's largest and most comprehensive
database of security knowledge and resources to the public. It also hosts
the BUGTRAQ mailing list
Shields
UP! -- Internet Connection Security Analysis
without
your knowledge or explicit permission, the Windows networking technology
which connects your computer to the Internet may be offering some or all
of your computer's data to the entire world at this very moment. Shields
UP quickly checks the security of your computer's connection to the Internet,
and tells you what to do if your connection is found insecure
Sir
Hackalot. UNIX: A Hacking Tutorial - miror
as
the title says
So
you wanna be a Hacker?
tutorials
for newbies and information on security
The
A.R.G.O.N.
this
site has almost anything: defense/protection, privacy, security, encryption,
proxys, source code, firewalls info, IP-spoofing, wingates, anon-remailer
page, web-based remailers, crypto-breaking tools, library (text-files),
download page, required files, about IRC, special topics, links to other
sites, and there`s more
The
Electronic Frontier Foundation
top
12 ways to protect your online privacy
The
New Hacker's Dictionary
hackers
jargon dictionary
Threats
to your Security on the Internet
the
trojan horse applications discussed within this web site are remote administration
hacker utilities that will allow a user to control another user's computer
across the Internet. Trojan horse applications can provide equal, if not
more control of a remote PC system than the person sitting at its keyboard
Unix
commands reference card
This
how-to guide lists some of the most common Unix commands
Unix
Guru Universe
page
for Unix system administrators - catalogized links of Unix flavors, system
administration, networking, security, software, conferences, shows, events
and vendors. They say, quote: 'Largest UNIX system administration resource
site, for beginners and gurus that are looking for UNIX sites on the internet'
UNIXhelp
for users - mirror
Helpful
information for users of the UNIX operating system, developed at the University
of Edinburgh from work funded by the ITTI. Searchable index
UNIX
Manual
A
basic UNIX manual
unix
/ net / hack page
documents
on Unix and security
UNIX
Reference Desk
This
document contains references to material culled from a number of different
sources on computing in the UNIX environment. The resources in this document
are divided into the following classes: general, texinfo pages, applications,
programming, IBM AIX systems, HP-UX systems, Unix for PC`s, Sun systems,
X Window system, networking, security and humor
Unix
System Administration Independent Learning
A
reference resource for system administrators
This is a mirror site. Please check for updates at http://www.mato.demon.nl/ |
Please visit http://come.to/bigwig - Search and Find Even Hidden Stuff, Promote Site, Free Downloads |