2600 Subject Index Volumes 1 (1984) - 10 (1993) David Price Subjects are shown in the first column, citations are listed in the second column using the following format: V(N):P V = Volume, N = Number, P = Page (L) Indicates a letter 00 4(9):6 10698 7(1):30(L) (201) 6(2):20 202 bug 3(9):65 2600 Magazine 1(1):1, 2(8):51, 4(12):3 2600 meetings 10(2):17, 10(2):16, 10(4):35, 7(1):38, 10(1):43, 10(3):18, 9(4):4 2600--voice bbs 9(3):40(L) 2600--BBS 2(2):9, 2(8):49 4TEL 6(3):20 (516) 5(3):14 540s 8(1):19 550 blocking 4(11):8 "606 Emergency" 5(1):24(L) 6.5536 crystal 7(3):32 *69 9(2):31 (707) 7(1):44 800s 6(1):12, 2(6):37, 6(1):12 800--DTMF recognition 3(12):92(L) 800--tariffs 2(1):4(L) 800--translation table 6(1):12 8038 chip 4(12):22(L), 4(10):12(L) 900s 2(11):79 900 translation table 6(1):12 911 1(10):57, 7(1):37, 911--documents 7(2):4 959 Numbers 4(5):8 97*s 4(10):4 976 scam 4(7):8 976 social interactions 4(12):17 9999-suffixes 1(1):4 access 3(11):84(L) ACD 9(3):28(L) ACM SIGSOFT 4(11):13(L) acronym maker 4(1):13(L) acronyms 10(1):34, 10(2):20, 2(2):11, 10(3):44, 8(1):42 ACTS 6(1):30, 1(11):62 ADS 1(9):53, 1(5):2, 1(1):2 ADS--Investigation 1(2):9 Albania 7(1):23 Allah Akbar! 3(11):86 Allnet 5(2):2, 4(6):4 alliance 2(5):26 American Express--hacking 3(3):17 AmiExpress--hacking 9(3):4 ANAC Guide 7(3):39 ANI Hunting 4(1):18(L), 3 (11):84 ANSI Bomb 10(2):44 answer supervision 3(9):65 anti-hacker propaganda 2(1):1, 7(2):11 AOS 5(3):10 Approaching Zero Book Review 10(3):38 ARAPANet 1(6):1 Area Code Expansion 1(3):3 ARPANet military subnet 1(3):5 Arpanet 4(9):4 arrests...see busts AT&T Break-up 1(6):4, 2(11):74 AT&T failure 6(4):4 AT&T Shutdown 6(4):4 AT&T Strike 1(4):1 AT&T Thought Police 2(11):79 ATM III 4(6):12(L) ATMs 1(4):3, 4(7):8 ATMs, Book Reviews 4(2):21 atomic bomb 1(3):4 ATT Addresses 9(4):36 Australian phone system 9(1):31 Automatic Call Distributor 9(3):28(L) AUTOVON 3(5):37, 4(6):18(L), 3(3):17, 6(1):7, 9(4):19 baby bells 1(7):3 back doors 2(1):2 bank records 1(5):3, 2(7):42 BASIC 3(1):5 BASIC dialer program 5(1):20 basic phreaking Q & A 6(2):29(L) BASIC Red Box Tones 5(3):22 basic terms 4(5):13(L) BBS Disclaimers 4(7):12(L), 4(10):16 BBS--Government 10(2):39 BBS--Protecting a User Log 3(2):16(L) beepers 4(11):12(L) Bell computers 9(4):42 Bell Routing Codes 5(1):42 Bellco cops 5(1):22 Bellcore Publications 3(5):36 Best Boast 5(1):24(L) Big Brother 3(12):91, 9(1):42, 8(4):8, 1(12):68, 7(3):16, 1(8):44 billing signals 3(9):65 BIN list 8(2):31 BITnet 2(1):6, 4(9):4 black band 4(11):7 BLV (Busy Line Verification) 5(3):27(L), 8(4):42, 4(12):10 bogus tap-check number myth 4(2):13(L) Box--Beige 5(4):42, 10(1):14, 10(3):9 Box--Blue 3(2):12 (L), 2(10):69, 9(4):33, 2(2):7, 3(5):36 (L), 10(3):9, 6(1):25 (L), 3(5):38 Box--Clear 1(7):4 Box--Combo 9(3):13 Box--General info 10(3):9, 5(1):16 Box--Green 7(1):29 (L), 10(3):9 Box--Rainbow 10(3):9, 9(2):15 Box--Red 5(2):13, 10(2):42, 7(3):32, 8(3):43, 10(3):9 9(3):13 Box--Silver in U.K. 7(1):19 Box--Silver 6(4):20, 9(4):19, 9(1):16, 10(3):9, 1(11):64 (L), 3(3):17 Box--White 2(4):19, 10(3):9 Box--yellow 10(3):9 braille computer 3(12):95 British Telecom 8(2):35 British Payphones 4(10):17(L) busts 4(3):18, 4(7):18 (L), 6(2):26 (L), 4(7):6, 2(5):27, 1(7):7, 3(12):91, 2(2):9, 8(4):36, 1(10):55, 10(4):4, 8(3):4, 7(3):44, 8(2):4, 4(8):3, 8(4):8, 7(3):10, 7(1):3, 6(1):3, 8(1):11, 8(2):12, 8(1):11, 6(2):34, 9(2):22 Busy Line Verification...see BLV busy 10(4):9 busy--"fast busy tones" 5(2):27(L) busy--busy verification 3(10):80(L) cable descrambling 10(1):16, 3(8):63 cable vaults 7(4):12 Call Forwarding, Diverting 2(10):65 Call-Waiting Phone Tap 6(3):27 callback verification 9(3):9 Caller ID 3(12):91, 8(1):19, 9(2):18, 7(3):5, 10(3):12, 8(2):22, 8(2):35 Caller ID--and Cell Phones 10(3):42 calling ards 1(4):3, 1(6):3, 1(1):3, 1(2):9 call records (ESS) 1(2):8 call traces (ESS) 1(2):8 canning 3(10):76(L), 5(4):42 Captain Crunch 4(3):4 Captain Midnight 3(9):68(L) Captain Zap's sins 5(2):24(L) card copiers 8(2):7 Carrier Access Codes 6(3):42 CCCP 3(3):23 CCIS 4(11):12(L), 2(2):7, 4(5):6 CCITT 9(2):10 CD-ROM 3(12):95 cellular biopsy 10(4):6 cellular fraud bust 4(4):8 cell frequencies 4(1):10, 10(1):4, 4(7):13(L) cellular modem 3(5):35 cellular phones 2(11):79, 5(3):8, 10(4):6, 4(6):8, 3(12):89, 4(2):13(L), 4(2):8, 10(3):42, 4(7):4, 3(11):90, 10(1):4 cellular phones--history 3(11):90 Central Offices 2(3):14, 7(4):12 Central Office IDs 4(10):14 Chaos Computer Club 5(4):34 China 3(8):63 Chinese dial-a-narc 6(2):35 CIA 1(12):68, 1(8):46(L) Carrier Identification Codes 1(11):65 CIC 7(1):8 CID... see Caller ID ciphers 9(4):6 CLASS features 8(4):31, 8(2):22, 4(5):6 CLLI codes 4(10):14 CN/A 3(9):72(L), 4(8):12, 2(3):18, CNA--Lists 4(4):10 CND 8(2):22 CO Magazine 4(9):22 COCOTS 6(4)27(L), 7(2):20, 7(4):27(L), 8(2):28 (L), 8(3):25(L), 9(3):13, 8(1):19, 4(11):8 8(2):35 COCOT--database list 8(4):33 COCOT--numbers 8(3):22 COCOT--refund letters 8(4):33 COCOT--tricks 7(3):27(L) codes 9(4):6 codes--methods 1(3):2 coin boxes 5(3):10 coin-test number 4(4):20(L) COLTs 6(3):20 commentary 2(8):50 Common Language Location Identifer...see CLLI Communications Fraud Control Association 7(4):43 competition 6(3):3 Compuserve 3(10):75 Computel 2(3):15 Computel scam 3(2):12(L), 4(4):4, 3(5):34 computer confiscation 2(8):54 computer lore 9(2):40 computer shows 10(4):16 computer threat 1(6):3 conferences 10(3):4 Congress--paranoia 10(3):4 CONSUS 6(1):7 cop watching 9(1):7 cordless phones 1(1):3, 6(2):22, 7(1):19 Cornwall, Hugo 4(2):4 corvis hacking 4(11):12(L) COSMOS 2(2):8, 6(3):13, 4(2):6, 4(3):10, 2(12):82, 7(1):8 COSMOS--abbreviations 4(3):10 COSMOS--demise 6(3):13 COSMOS--documentation 4(2):6 COSMOS--history 4(3):10 COSNIX Operating System 4(2):6 Country codes 1(2):10, 3(7):53 couplers 9(2):4 court news 3(4):27, 2(4):21, 1(4):3, 1(6):3, 8(4):36, 1(5):3 covering tracks 4(7):6 covert radio broadcasts 4(11):7 CPA-1000 4(8):12(L) credit card algorithms 7(3):42 credit files 10(1):42 Cross-Bar--oddities 3(3):20(L) crypt preview 8(3):44 crypt() source code 8(4):11 current events 3(3):22 customs 8(2):35 "Cyberpunk" fictions 8(2):42 DAST 10(4):22 data transmission--quality 3(9):71 DCS 3(3):17 DEC-20--hacking 2(7):41 (DEC)PDP 3(4):25 Defense Communications Agency 5(1):24(L) Defense Data Network listing 1(5):4 Denning, Dorthy 7(3):10 Department of Justice 9(2):22 deregulation 1(7):3 dial back security 3(2):10 Dialed Number Recorder--see DNR dialer--demon 9(2):15 dialer programs 5(1):20 dialing * on rotary phones 3(12):96 dialup numbers 4(8):6 Dicicco, Lenny 8(2):42 digital lock combinations 10(4):38 Direct Analog Storage Technology...see DAST direct dialing 4(3):8 directories 2(5):27, 3(12):95 Directory Assistance --usage fees 1(2):9 Disney radio frequencies 9(1):17 divestiture 3(1):1 DMERT 10(2):4, 8(4):45 DMS 100 1(7):3(L), 10(4):10 DNIC (Data Network ID Codes) 7(1):40 DNR 7(3):16 DOCKMASTER break in 5(3):20 DoD 3(3):19 DSM 6(4):14 DSS1 10(3):36 DTMF dialers 8(3):43 DTMF decoder 7(1):14, 10(2):14 DTMF overview 9(2):10 dumpster diving 1(2):10, 2(2):8, 1(9):50 Duophone CPA-1000 4(5):22 Dutch hackers 8(3):4 E-Card 4(5):8 E-COM 1(6):3, 1(6):5 EASYnet 8(2):18 Electronic Freedom Foundation 7(2):10 Electronic Privacy Act 4(6):8, 4(4):8 electronic surveillance--NSA 2(12):83 email systems 1(12):71 Emergency Interrupts 4(12):10 encryption 3(4):31, 3(10):79, 2(1):3, 9(4):6 equal access 4(5):17(L), 4(3):6, 4(3):8, 4(12):20 errata for 4(9) 4(10):18 ESN 10(4):6, 10(1):4, 10(3):42, 4(7):4 espionage 2(3):15 #1ESS 7(4):12, 10(4):10 #4ESS 7(4):28(L) #5ESS switch 10(2):4, 10(4):10, 8(4):45, 8(4):45 ESS 3(10):79, 1(2):8, 1(6):2, 6(1):25(L), 2(11):74, 1(7):3, 10(4):10 ESS Bust methods 1(7):3(L) essay 2(12):81, 1(12):67, 7(4):32 European phone systems 4(5):9 exchanges 3(8):62 Falwell, Jerry 5(1):25, 5(2):39, 3(1):3 Farrell's Ice Cream-covered narcs 1(8):45 fax taps 9(1):42 FAX 4(5):14 ftp tricks 8(3):14 FBI 3(11):83, 3(10):75, 3(9):67, 1(11):63, 9(2):22, 1(1):2, 4(8):9, 1(1):3 FCC 4(6):8, 3(9):71, 1(6):3 *features 8(4):31 Feds 9(2):38 feeder groups 5(3):4 fiber-optics laid along rails 3(6):48(L) finger monitor program 9(1):35 fingerprints 3(12):95 FM wireless transmitter--plans 8(4):44 fortress fones...see pay phones Frame Room 7(4):12 France 2(12):83 gangs 7(4):36 GBS 4(10):4 GEISCO 2(1):3 general phone rants 4(1):20 Germany 2(12):87 Gore, Albert 5(1):26(L) grade hacking 10(2):13, 10(4):15, 10(3):34, 6(4):45, 6(3):4 GTD#5 2(11):73 GTE--Telemail 1(1):3 GTE Telcos 6(3):33 Gulf War printer virus 8(4):39 "Hacker" 9(1):36 Hacker Con 6(3):10 The Hacker Crackdown 9(3)21 hacker morality 2(6):34 hacker scares 9(4):4 hacker sourcebooks 1(11):64(L) hacker study 10(1):38 hacker video 8(3):14 Hacker's Handbook 4(2):15, 4(2):4 hackers credo 1(3):1, 9(4):17 hackers in hiding 8(3):24(L) hacking beginnings 9(3):42 hacking history 5(1):16 hacking lore 8(4):16, 2(8):52, 5(1):24(L), 4(2):13(L) hacking reading list 7(4):6 hacking recycling machines 1(2):9 hacking statistics 3(6):41 Hack-Tic 9(2):15 harmonica bug 2(9):58 HBO 3(10):75 Hess, Mark 7(1):45 high school hacking--news 1(3):3 history--phreaking UK 1(9):49 Hoffman, Abbie 4(1):4 --Obituary 6(2):3 Holland's hackers 2(4):21 home monitoring 1(4):2 honesty tests 10(3):20 HP2000--hacking 2(3):20 human database centers 8(4):46 humorous defense against telco threats 2(2):10(L) IBM 1(1):2 IBM's Audio Distribution System 1(5):2 IC 1(11):65 ICLID 7(3):5 ICN 3(11):81 IMAS 4(10):4 IMTS 3(4):26, 3(12):89 In-Band Signaling 2(2):7 India 3(9):67 induction coil--plans 7(3):36 infinity transmitter 2(9):58 information manipulation 9(4):17 INSPECT 8(2):18 Intelpost 1(5):3 internet dialups 10(4):32 internet outdials 8(1):40 internet worm 5(4):4, 6(3):39 Interoffice Signalling 7(4):12 intro to hacking 2(6):40 IRS 3(2):15, 3(10):79, 2(1):3, 2(3):15, 2(6):35 ISDN 10(3):36, 8(1):42 Israel--phone system 2(6):33, 4(4):16 Israeli computer surveillance of West Bank 4(12):8 Italian hackers 4(12):18 ITT 2100 switch 4(7):12(L) ITT--boxing 3(5):38 I've fallen and I can't get up 3(9):67 Jackson, Steve 10(2):45, 10(1):18 jail 10(4):4 JANET 4(9):4 Kenya 2(3):15 Kiev 3(6):47 KKK--racist BBS systems 2(1):3 Kranyak, Jack 3(5):34, 4(4):4 Landreth, Bill 4(9):12(L) laptop tone generation 9(4):45 laptops 1(2):9, 9(2):4 LASS System 4(5):6 law enforcement--confiscation 2(8):54 LD Carriers 4(12):20 LD Fees 1(5):3 LEC 8(1):42 legalistic banter 2(1):4(L) Legislative Network 7(4):4 letter sorting machines 8(3):32, 8(4):32 lineman's handset 10(1):14 LODCOM compilation review 10(3):19 loop number patterns 4(1):12(L), 1(9):52(L) loop testing 6(3):20 magnetic card tricks 9(1):27, 8(4):40 (L), 8(2):7 mail drops 7(3):29 (L) manholes 5(3):4, 7(4):12 Marcos 3(4):27 marine radio ch 26 7(1):19 Marquee 3(3):19 Max Headroom-Chicago style 4(12):8 MCI Mail--hacking 1(12):67, 1(7):2 MCI Numbers 1(4):5 MCI scam 5(4):10 MCI 6(1):36, 1(3):2, 8(2):16 media hype 8(3):4 merchant ship calls 2(6):36(L) MF tones 2(3):16(L) microwave links 1(3):2 MicoVAX 3(9):71 military computers 5(1):24 (L) MILNet 2(7):45 MIN 4(7):4 Minitel 4(9):8, 9(4):8 missile systems 2(4):21 Mitnick, Kevin 7(1):3, 6(1):3, 6(3):14, 8(2):42 MIZAR 7(1):8 mobile hacking 9(2):4 mobile telephone freqs 6(3):24 (L), 8(4):18, 3(4):26 monitoring microwave 5(1):4 Morris, Robert 6(3):14, 6(4):6, 7(1):23 motivation--hackers 1(3):1 MTSO 3(12):89 MPOW 4(5):12(L) narcs 9(2):38, 1(11):64(L) National Coordinating Center 5(1):24 (L) Navy 3(10):75 Nazi BBS 2(3):13 NCCCD 3(6):41 Neidorf, Craig 7(1):3, 7(2):4, 7(2):3, 7(2):8, 7(3):44, 8(4):36 neo-Nazi games 8(2):12 net addresses 2(4):23, 3(11):82 Network 2000 7(3):8 news 4(10):8, 5(1):37, 9(4):19, 4(11):8 new services 8(2):35 non-supervised phone lines 3(6):44(L) Nothing New in Computer Underground 3(6):42 NPA count 6(4):44 NSA 2(10):67, 1(9):51, 2(7):47, 1(10):57, 3(9):67, 5(3):20, 2(12):83, 3(10):79 NSA's Phone Number 2(3):16(L) NUAs--international 4(10):10 nuclear free America 4(3):2 numbers 4(12):21, 5(2):44, 9(1):45 NY Tel 4(7):15 Nynex exchange addresses 10(4):18 NYNEX 8(2):11, 6(4):9, 6(3):36 NYNEX--Radio Frequencies 8(2):32 NYNEX--switch guide 6(4):9 obit--David Flory AKA Dan Foley AKA The Shadow 6(2):45 --Abbey Hoffman 6(2):2 operating systems..see individual entries (e.g. VM/CMS, UNIX...) operator humor 7(4):16 operator identification of payphone 1(2):10(L) operator service 4(9):6 operators 1(10):56 operators--social engineering 3(5):33 operators--USSR 5(4):30 ouch! 5(2):16 outages 8(2):35 outdial list 8(1):40, 8(2):44 "Out of the Inner Circle" 2(6):34 outside local loop distribution plant 5(3):4 pagers--scanning 4(6):5 paranoia 1(7):3, 2(1):1, 3(5):39, 8(2):4, 2(8):50, 1(7):1, 9(4):4 parking summons 1(7):3 password grabber 3(8):60(L) passwords 4(9):14, 8(1):36, 9(3):31, 4(8):10, 4(5):4 passwords--common 9(3):31 passwords--hacking IBMs 8(1):36 passwords--UNIX 8(1):31 pay phones 6(1):30, 1(11):62, 6(3):37, 1(2):10 pay phone--destruction 3(10):73 pay phone--dissection 3(10):73, 9(1):20 PBX trix 4(1):12(L) PC Pursuit 2(9):58 PC Pursuit--hacking 4(4):6 PC-Pursuit--outdial list 8(2):44 PDP-11 2(11):73 Pen registers 3(2):11, 4(9):13, 4(12):12(L), 4(5):22 Pentagon 1(12):69 People Express 2(5):25 pet cemeteries 8(2):35 Phiber Optik 10(4):4 phone directories of the World 4(4):16 phone frequencies 5(4):19 phone interception 5(1):4 phone news 9(2):19 phone numbers 8(1):17 Phoenix Project 7(1):3 Phrack 7(1):3, 7(2):3, 7(2):4, 7(2):8, 8(1):11, 8(4):36, 9(2):22 phreak anticdotes 1(9):52 phreak history 2(11):80, 5(3):9 phreak typologies 2(3):13 phreaking overview 9(2):10 Pick operating system 3(6):42 pink noise 2(2):7 PINs 4(11):8 pirate radio 6(2):42 Pitcairn Island 2(9):59 PKZIP BBS hack method 9(1):12 plane phones 1(11):63 poetry 4(8):20, 4(3):4 police computers 2(5):27 police setups 3(4):30 police surveillance 1(8):44 political hacking 7(4):4 porn 2(6):35 postal paranoia 4(3):12(L), 1(4):20(L) POSTNET 8(4):21, 8(3):32 PRIMOS 7(2):14, 6(2):4, 6(4):14 prison computers 8(4):5 prison phones 7(3):29(L), 9(4):13 prison update 8(2):46 privacy 1(5):3 Privacy Act of 1974 8(3):18 Private Sector BBS 2(8):49, 2(9):59, 3(1):1, 3(3):22, 3(4):30 Prodigy censorship 6(4):43(L) Prodigy--STAGE.DAT conspiracy 8(3):26, 8(4):29(L), 8(1):19 product list 7(4):6 product review: Duophone CPA-1000 4(5):22 Programs--Hacking IBMs 8(1):36 PRONTO 2(7):42 proto-phreak 5(3):9 PSAP 7(1):37 psychological makeups 8(3):38 psychobabble 7(3):44 Puerto Rico 3(10):76(L) pyramid schemes 3(10):79, 4(6):4 radio scanners 6(2):22, 5(4):45 Raids...see busts RC channel 10(2):4, 8(4):45 RCI 3(9):65 RCMAC 7(1):8 Reagan, Ron 2(5):27, 1(12):69, 3(11):83 REMOB (Remote Observation) 5(1):27(L), 2(5):28(L), 6(3):32, 7(1):24(L), 2(9):60(L) resources guide 3(6):46, 7(4):6 return call 9(2):31 The Rise of the Computer State 1(8):44 ROLM 6(3):24(L), 3(11):88(L) ROLM CBX II 9000 5(1):30 Rose, Len 8(2):12, 8(1):11 routing codes 5(1):42 Royko, Mike 2(11):75 RS CPA-1000 4(5):22 RSTS 3(4):25, 2(11):73 Russian phone books 3(5):36(L) Russian phone numbers 3(5):36(L) SAC 5(3):4 Santa scam 6(1):36 SAT 10(1):4 satellite phone transmissions 4(11):7 satellite links 5(1):4 satellite jamming 3(3):23 satellites--hacking myths 2(8):52 Saudi Arabia 4(7):21, 3(10):80(L) scams 7(4):22, 2(4):21 scanners 7(1):19 SCCs 7(1):8, 7(1):37 school records 10(2):13, 10(4):15, 10(3):34 scramblers 1(8):46(L), 3(4):29 secret frequencies 8(2):32 Secret Service 2(6):34, 9(4):4, 9(4):12, 9(2):38, 10(1):18, 10(1):43, 10(3):18 Secret Service--radio frequencies 9(1):17 secured trunks 6(1):24(L) sentry security 8(4):5 security 8(2):18, 7(3):10 Serving Area Interface 5(3):4 Sherwood Forest--busted 2(6):34 shortwave 3(9):67 $SHOW PROCESS/PRIV 4(1):6 Simplex corrections 8(4):21 Simplex lock location guide 9(1):38 Simplex locks 8(3):6 SL-1 Switch 3(9):68(L) Smartphone hacking 10(4):11 "Sneakers" 9(3):17 social engineering 2(3):14, 2(4):19 Social Security Number prefixes 4(11):6 South Africa 4(10):11 South African phreaks 6(2):24(L) SouthWestern Bell 9(4):42 Soviet Union 8(1):16 Spain 6(2):36 Speech Thing: product review 9(4):45 spoofing VAX login 4(8):10 Springsteen 2(11):75 Sprint 6(2):34 spying on 2600 7(3):44 SS7 10(3):12 SSNs 3(7):51, 8(3):18 SSTs 7(1):12 Step Offices 1(5):1 Sterling, Bruce 9(3)21 Steve Jackson Games 10(1):23 Stasi 8(1):19 sting BBS's 3(6):44(L), 3(9):66 stings 3(5):39 Stoll, Cliff 7(1):45 Strowger, Almon 5(3):9 submarine cable maps 4(8):11 surveillance 3(12):95 survey 2(12):84, 4(8):15 Sweden's "Person Numbers"(ID) 1(3):3 SWITCH 8(1):42 switch guide 1(5):1, 7(4):12, 10(4):9, 10(4):10 switch overloading 3(12):91 switch-hook dialing 4(12):12(L) switches...see specific switch switching centers 1(10):56 switching routes 2(3):16(L) switching systems 2(5):27 Sysops--protective measures 2(8):55 TAP 4(1):4, 6(2):43 taping payphone tones 7(3):36 telco info-fishing techniques 3(10):76(L) telco nonsense 1(5):4, 9(3):36 telco offices 10(2):36 telco reneging 2(10):65 telco--fighting back 1(8):46 telco--assisting wiretaps 2(1):1 tele-harassment 3(2):10 Telecom 6(3):12, 3(8):58 Telecom debit cards 4(1):8 teleconferencing 2(5):26 teleconferencing--anticdotes 1(4):4 telemail--access 1(4):2 Telenet 3(6):47, 2(9):61, 4(6):9, 4(5):10, 3(11):84 (L), 1(2):7 telephone basics 1(8):43 telephone induction coil 7(3):36 Telstar 301 4(11):7 TELETEL Networks 9(4):8 "Terac" 5(1):24(L) terminal locks 8(3):44 test channel 10(2):4, 8(4):45 test equipment--construction 8(2):14 test numbers 2(11):77 Thailand 2(6):39 Thought Police 1(8):44, 8(4):8, 1(12):68, 7(3):16 time service 2(4):21 TINA 2(6):39 toll fraud detection 7(1):12, 9(3):43 tone tracer construction 8(2):14 tone catcher 10(4):22 TOPS-10 2(1):2 TOPS-20 2(1):2 touch tones 3(12):91 touch-tone fees 4(10):6, 4(10):7, 4(2):18 trace procedures 3(1):4(L), 7(4):12 tracking devices 3(4):28(L) trade magazines 4(6):13(L) transaction codes 2(12):82 Trans-Pacific Cable 2(11):79 trap tracing--defeating 7(3):22 trashing 2(2):8, 1(2):10, 1(9):50, 3(10):73, 6(2):32 Travelnet 1(11):61 trojan 6(4):6, 5(2):4, 3(7):49 TRW 2(2):9, 4(8):4, 1(7):5, 10(1):42 TSPS 1(2):10, 2(1):4(L), 6(1):30, 1(11):62 TSPS Console 4(6):6 TVRO 5(1):4 UAPC 6(3):4, 6(4):45 UK Data Protection Act 10(2):12 UK Message List 4(9):10 UK Operator Numbers 3(8):58 Ultra Forward 9(2):31 unassigned area codes 5(3):10 UNIX--common accounts 9(3):31 UNIX--hacking 3(4):28(L), 3(8):57, 5(4):12, 6(3):28 (L), 6(4):4, 2(1):2 UNIX--password hacker 9(1):18, 8(1):31, 8(2):24(L) USC--Phony Degrees 2(2):9 U.S. Military Telephone Network 9(4):19 USPS 8(3):32, 8(4):32 USSR 2(4):21, 3(8):63, 5(4):30 UUCP 4(9):4 VAX 3(8):60(L), 4(5):4, 3(7):49, 2(9):57, 4(1):6 VAX--common accounts 9(3):31 VAX--worm 6(2):38 VMS 4(5):4 VDT 3(3):19 VDT operators 3(8):59 vehicle tracking monitors 1(1):3 verification 2(9):58, 4(12):10 VFY 4(12):10 video reviews 10(2):40 VINs 9(4):11 viri 5(2):4, 5(2):8, 6(3):14, 9(3):19 virus--Atari code 8(1):4 virus--batch virus 9(1):8 virus--Gulf War 8(4):39 virus--MSDOS (code) 9(1):4 virus "protection" 5(2):4, 9(1):9 virtual reality 10(4):37 Virtual Memory operating System--see VMS VM/CMS 4(11):4, 4(12):4, 5(1):8 VM/CMS--acronyms 4(11):4 VM/CMS--filemodes 4(12:4 VM/CMS--password characteristics 4(12):4 VM/CMS--privileged commands 4(12):4 voice mail hacking 6(3):36, 9(2):42 VMS 3(3):18, 3(8):60(L), 2(9):57, 3(2):9, 2(10):66, 3(7):52, 4(1):6, 2(1):2 VMS--UAF 2(10):66 VMS--common accounts 9(3):31 VMS--default passwords 3(7):52(L) VR 3(9):71 WATS 5(3):23, 3(11):81, 1(9):52(L) WATS directory 4(1):18(L), 4(4):21(L) Weathertrak codes 5(1):15 Weendland, Mike 3(9):66 Western Union 4(7):6 Western Union EasyLink 1(12):67 White House phones 1(1):5 ,10(1):12 wild claims 6(4):30(L) Winnipeg 3(9):69 wire fraud news 2(3):15 wireless modem 4(7):13(L) wiretaps 1(4):3 2(6):35, 2(1):1, 7(3):30(L), 3(12):91, 1(11):63, 1(10):57, 2(9):58, 9(2):22 wiretaps--legalities 1(5):3 wiretaps--police 1(3):3 witch hunts 7(3):10 word numbers 4(4):15 world's most evil operator 1(7):3(L) worms 5(2):4 worm--Ada 6(2):38 worm--internet 6(3):39 WWIV BBS--hacking 9(1):12 XY Step switching station 1(5):3(L) YIPL...see TAP yellow pages 3(3):23 yellow pages scam 2(5):27 Zinn, Herbert 6(1):3, 7(1):3 Title Index: 2600 Volume 1 - 10 David Price The Title Index references all articles in 2600 THE HACKER QUARTERLY from Volume 1 (1984) through Volume 10 (1993). These articles are references using the following format: V(N):P Where V = Volume, N = Number, and P = Page EXAMPLE: Building a Telephone Induction Coil 7(3):36 Thus the article in the above example is found in Volume 7, Number Three, on page 36. ~ Denotes a "news" article (L) Denotes a letter of note ------------2600 Title Index, Vol. 1 - Vol. 10------------- 1984 Arrives in Hong Kong~ 1(1):3 $2 Billion Error~ 2(7):43 22013664431--Call it! 3(3):22 2600 A Hacking Victim~ 2(8):51 2600 Bulletin Board Online 2(2):9 2600 Exposes New York Tel 4(7):15 2600 Information Bulletin 3(9):69 2600 Information Bureau 3(10):77 2600 Information Bureau 3(8):61 2600 Information Bureau 3(11):85 2600 Information Bureau 3(12):93 2600 Writer Indicted~ 1(6):3 411--News About Phone Companies~ 8(2):35 414 Bust~ 2(5):27 414's Plead Guilty~ 1(4):3 4TEL 6(3):20 $6,829 Phone Bill~ 3(6):43 617 Will be Divided~ 3(4):31 718 Is Coming~ 1(3):3 74,000 Calls to Fraud Line~ 3(7):55 800 Directories Now Available~ 1(8):45 800 Prefixes Listed by States 2(6):37 818 Here to Stay~ 1(11):63 911 Suspect Hung Up~ 1(10):57 A 414 is Sentenced--Other Indicted~ 1(5):3 A Batch Virus 9(1):8 A Bittersweet Victory 7(2):3 A Blast From the Past 9(4):33 A Challenge to Hackers~ 2(1):3 A Form of Protection For You & Your Computer 5(2):4 A Friend in High Places 1(9):52 A Guide to PRIMOS 6(2):4 A Guide to the 5ESS 10(2):4 A Guide to the Israeli Phone System 2(6):33 A Guide to VMS 2(9):57 A Hacker Survey 4(8):15 A Hacker's Guide to the TSPS Console 4(6):6 A Hacker's Guide to UNIX 5(4):12 A Hacking Reading List 7(4):6 A Look at the Future Phreaking World: Cellular Telephones--How They Work 3(12):89 A Mechanical Hacker~ 2(3):15 A Pen Register For Phreaks?: Product Review--Dialed Number Recorder 4(5):22 A Phone Phreak Scores 2(4):19 A Political Hacking Scandal 7(4):4 A Reader's Reply to Captain Zap 5(2):16 A Report on the Internet Worm 5(4):4 A Review of "The 'Top Secret'Registry of US Government Radio Frequencies" 4(11):7 A Simple Virus in C 9(3):19 A Story of Eavesdropping 3(4):29 A Study of Hackers 10(1):38 A Time For Reflection 1(12):67 A Trip to England 3(8):58 A True Saga of Teleconferencing 1(4):4 A Unique Obscene Caller~ 3(2):1 A Way To Catch Peepers 9(1):35 A Word on Wiretapping~ 1(4):3 Acoustic Trauma 3(2):15 Acronym List 2(2):11 Acronyms A-G 10(1):34 Acronyms H-R 10(2):20 Acronyms s-x (no y or z) 10(3):44 ADS Investigation Moved?~ 1(2):9 AHOY! 1(1):1 algorithm for credit cards correction 7(4):25 All About BLV: Busy Line Verification 4(12):10 Allnet's Legal Problems 5(2):2 Allnet: A Horror Story 4(6):4 Alternate Long Distance 1(3):2 American Network Fears Hackers~ 3(5):39 An Algorithm for Credit Cards 7(3):42 An American Express Phone Story 3(3):17 An Appeal For Help 8(4):36 An Interesting Diversion 2(10):65 An Interpretation of Computer Hacking 5(1):16 An Interview with Craig Neidorf 7(2):8 An Interview with Dorothy Denning 7(3):10 An Interview with Hugo Cornwall: British Hacker/Author 4(2):4 An Interview With the Chaos Computer Club 5(4):34 An Introduction to COCOTS 7(2):20 An MS-DOS Virus 9(1):4 An Official Crackdown on Hackers~ 1(7):3 An Overview of AUTOVON and Silver Boxes 3(3):17 An Overview of DSS1 10(3):36 ANALYSIS: Gulf War Printer Virus 8(4):39 Anatomy of a rip-off 7(4):22 And They Call US Crooks? 2(10):65 Another Astronomical Phone Bill~ 3(1):3 Another FBI Computer File~ 1(11):63 Another Hacker Story~ 1(9):51 Another Stinger Is Stung 3(9):66 ANSI Bomb 10(2):44 Are You a Phreak??? 2(3):13 ARPANET Hopping: America's Newest Past time 1(6):1 ARPANet Military Subnets 1(3):5 At the Last Stroke...~ 2(4):21 AT&T Best For Hackers~ 3(9):71 AT&T Computer Caught Stealing~ 2(6):35 AT&T Contractual Obligations~ 2(6):39 AT&T Credit Cards Make Debut~ 1(1):3 AT&T Does it Again~ 3(1):3 AT&T Faces Serious Money Problems~ 1(9):51 "AT&T Keeps ""800"" Data To Itself~" 2(2):9 AT&T Limits Use of their Credit Cards~ 1(6):3 AT&T Offers E-Mail~ 2(12):87 AT&T Put On Hold~ 2(7):47 AT&T Selling Pay Phones~ 3(7):55 AT&T Sub Maps 4(8):11 AT&T to Read E-Mail~ 2(11):79 AT&T/BOC Routing Codes 5(1):42 ATM's in China~ 3(8):63 Automated Operators Coming~ 3(7):55 AUTOVON Numbers 3(5):37 Avoid Phones in Storms!~ 2(11):79 Bad Tenant Database~ 3(4):27 Bank Records Aren't So Private~ 1(5):3 Banking from your Terminal--A Look at PRONTO 2(7):42 "BASIC ""Wargames Dialer Program" 5(1):20 BASIC Red Box Tones 5(3):22 BB Traffic Cop~ 3(9):67 BB Watching VDT Operators~ 3(8):59 BB Watching Without Regulation~ 2(12):83 BBS Listing 2(12):85 Be Nice to Your Telco 1(8):46 Beginner's Guide to Minitel 9(4):8 Beige Box Construction 10(1):14 Belcore's Plans for Caller ID 9(2):18 Bell Atlantic & MCI Collaborate~ 3(2):15 Bell Credit Card Abuse Soars~ 1(4):3 Bell Didn't Invent Phone?~ 2(6):35 Bell Propaganda Films~ 2(9):63 Bell to AT&T: Get Lost!~ 1(7):3 Bellcore Publications Go Public~ 3(5):36 Beware of Hacker Terrorists~ 3(5):39 Big Brother No longer Watching Miami~ 1(8):44 Big Computer Crime Pays~ 3(6):43 Big Deal for Little Town~ 2(11):75 BIN List 8(2):31 Birth of a Low Technology Hacker 8(4):16 BITnet Topology 2(1):6 Blue Box Schematic 2(10):69 Bogota, Columbia Gets Extra Digit~ 3(5):39 Book Review Nothing New in Computer Underground by M. Harry 3(6):42 Book Review: "Automatic Teller Machines III" 4(2):21 Book Review: "The Hacker's Handbook" 4(2):15 Book Review: Approaching Zero 10(3):38 Book Review: The Cuckoo's Egg 7(1):45 Book Review: The Devouring Fungus (Tales of the Computer Age) 9(2):40 Book Review: Tune in on Telephone Calls by Tom Kneitel 5(4):45 Book Review: Virtual Reality 10(4):37 BOXING ON ITT 3(5):38 British Credit Holes 10(2):12 British News 10(1):44 British Phonebooth Wedding~ 3(4):27 British Telecom: Guilty 6(3):12 Build A Tone Tracer 8(2):14 Building a DTMF Decoder 7(1):14 Building a Red Box 5(2):13 Building a Telephone Induction Coil 7(3):36 But How Does it Work? 1(8):43 Buy My Wires~ 3(12):95 Call Rejection in Natchez~ 3(9):71 Caller ID Technologies 10(3):12 Caller ID: The Facts 7(3):5 "Call Me" Card~ 2(6):39 Campaign Contributions On-Line~ 2(10):71 Capitol Hill Hacker~ 3(6):43 Capturing Passwords 4(8):10 Car Breathalizers~ 3(4):27 Carrier Access Codes 6(3):42 Carrier Choosing Time~ 2(5):27 Cash Machines Are Popular~ 3(8):63 Canadian WATS Phonebook 5(3):23 Cell Site Frequencies 4(1):10 Cellular Dial-By-Voice~ 3(7):55 Cellular Magic 10(1):4 Cellular Modem~ 3(5):35 Cellular Phone Biopsy 10(4):6 Cellular Phone Fraud and Where It's Headed 4(7):4 Cellular Phones in England 3(2):15 Cellular Update 5(3):8 Central Office Operations 7(4):12 Changing Your Grades on A High School Computer 10(3):34 Chinese Snitch Numbers 6(2):35 Cipher Fun 9(4):6 CIS Copyrights Public Software~ 3(10):75 Citybank Money Games~ 3(6):43 Cityphone Has the Answer~ 2(12):83 Class Features 8(4):31 CLASS: What It Means To Us 4(5):6 CNA Numbers 4(4):10 CNAs 2(3):18 COCOT Corner 8(4):33 COCOT Numbers 8(3):22 Columnist Attacks AT&T~ 2(11):75 Commentary: The Threat to Us All 2(8):50 Competition...It's the next best thing to being there 6(3):3 Computel Does Exist~ 2(3):15 Computel Put to Sleep 4(4):4 Computer Clothing 3(9):71 Computer College 3(11):87 Computer Crime Resources Guide 3(6):46 Computer Crime Review 3(6):41 Computer Elections Examined~ 2(10):67 Computer Foul-ups Hurt Social Security~ 1(11):63 Computer Grammar~ 3(5):35 Computer Makes it Easy for Reagan~ 1(12):69 Computer Password Kept Secret 3(3):19 Computer Security at the Bureau of Prisons 8(4):5 Computer Threat Causes Chaos in Albany~ 1(6):3 Computers Monitor Truckers~ 2(7):43 Computers Seized as Summer Games Begin~ 1(8):45 Computers Strike Again!~ 3(7):51 Computers Threaten Privacy~ 3(12):91 Congress Chooses AT&T~ 3(4):31 Congress Takes a Holiday 10(3):4 Congressional Computer~ 3(5):35 Converting a Tone Dialer into a Red Box 7(3):32 Count of Exchanges per Area Code 3(8):62 Country Codes 1(2):10 Country Codes 3(7):53 "Crackers" Cracked~ 2(5):27 Crosstalk Saves Old Lady~ 3(9):67 Crypt() Source Code 8(4):11 Data Network Identification Codes 7(1):40 Death of a Pay Phone 3(10):73 Death of NYNEX Business Centers 8(2):11 Death Star Cards Spell Woe~ 1(2):9 "Debugging" Phones~ 3(8):63 Decrypting Password Security 4(9):14 Defeating Callback Verification 9(3):9 Defeating Trap Tracing 7(3):22 Defense Data Network Listing 1(5):4 Descrambling Cable 10(1):16 "Dial ""00"" For Operator~" 3(4):31 Dial Back Security 3(2):10 Dial the Yellow Pages~ 3(3):23 Dial-a-Directory~ 2(5):27 Dial-A-Porn Update~ 3(1):3 Dial-it Sex Numbers Argued~ 2(11):75 Dick Tracey Toys Are Closing In~ 2(9):63 Did You Know? 4(7):17 Digital Locks 10(4):38 Directory Assistance By Computer~ 2(9):63 Directory Assistance Failure~ 3(4):31 Dreams of GEnie~ 2(12):87 E-COM is Going Away~ 1(6):3 E-COM Number List 1(6):5 E-COM Really on the Way~ 2(7):47 "Ed Quinn Cell Site"~ 3(6):47 E-Mail Horror Stories 1(12):68 E-Mail Listings 1(12):71 Electronic Jail All Screwed UP~ 1(12):69 Electronic Switching Advantages 1(6):2 Electronic Tax Returns Are Here 3(2):15 Electronic Tax Returns~ 3(10):79 Electronics Create Portable Prisons~ 1(4):2 Elementary Switching 10(4):9 Encryption Provides Signature~ 3(4):31 England's Mass Announcements 4(9):10 Equal Access 800 Drawbacks~ 3(4):31 Equal Access May Not be "Equal" to Modems 2(11):74 ESS Goes To Taiwan 3(10):79 ESS: Orwell's Prophecy 1(2):8 Europe Standardizing Telecoms~ 2(9):63 Ever Wonder Who Owns All Those 800 Numbers? 6(1):12 Ex-Fed Tapped 3(7):51 Exchange List: 201 Area Code 6(2):20 Exploits in Operator Hell 3(5):33 Exploring Caves in Travelnet 1(11):61 Facts and Rumors 7(3):44 Fascinating fone fun 9(1):45 Fascist Computer Network~ 2(1):3 Fawcett Phone Bill Too Big~ 2(12):83 FAX: A New Hobby 4(5):14 FBI Actions Anger Parents 3(11):83 FBI Goes After ADS Hackers 1(1):2 FBI Investigates Coffee Machine~ 3(10):75 FBI Revealed: Reviews--The FBI Project Newsletter & The FBI and Your BBS 4(8):9 FBI Shopping List~ 3(9):67 FCC Actions~ 1(6):3 FCC Gives Away "Resource" 3(9):71 Federal Employees "Tracked"~ 3(7):51 Federal Express Offers "E-Mail"~ 1(8):45 Federal Phone Failures~ 3(7):55 Federal Telephone System Upgrade~ 1(12):69 Feedback 9(4):26 Fiber-Optic Network For Du Pont~ 2(10):71 Final Words on VMS 3(3):18 Fingerprint Identification System~ 3(12):95 First of the "Superminin"~ 1(12):69 Five Aliens Hung Up~ 3(1):3 Five Arrested in Phone Fraud~ 1(7):7 FM Telephone Transmitter 8(4):45 FM Wireless Transmitter 8(4):44 For Your Protection 7(1):3 Fraud Alert 7(4):43 Free Directories For Bigwigs~ 3(12):95 Free Information in Trouble~ 1(4):3 Free Kiddie Dial-It Calls~ 2(11):79 Free Pay-Phones Plague New Jersey~ 3(5):39 French Phones Renumbered~ 2(12):83 From Sherwood Forest: Intro to Hacking 2(6):40 From the 2600 Files 5(1):22 Fun and Games at a 2600 Meeting 7(1):38 Fun Phone Numbers 5(2):44 Fun Things to Know 9(2):19 Fun With COSMOS 2(12):82 Fun With Fortress Fones 1(11):62 Gee...GTE Telcos 6(3):33 GEISCO's New Toy~ 2(1):3 General Information 6(1):7 German Phone System Stagnant~ 2(12):87 Getting Caught: Hacker's View 1(10):55 Getting In The Back Door: A Guide to Some Popular Operating Systems 2(1):2 Getting Started 9(3):42 Getting the Most Out of Equal Access 4(3):6 Getting Your File... 10(1):42 Goings On 4(4):16 Good Apples for the Soviets~ 2(4):21 Government Bulletin Boards 10(2):39 Government Phone Fate?~ 3(8):63 "Grade ""A"" Hacking" 6(3):4 Growth of a Low Tech Hacker 9(4):17 GTE Hit by Divestiture~ 2(1):3 GTE Now Bigger than AT&T~ 2(7):47 GTE Raids Still Have Many Unanswered Questions~ 1(1):3 GTE Sprint Cheats Customers~ 2(7):43 GTE Sprint Overbills~ 3(9):71 Hacker Extortionist Caught~ 2(9):59 Hacker News~ 8(2):12 Hacker Zaps Computer Marquee~ 3(3):19 Hackers Degree?~ 3(7):51 Hackers Go Free~ 2(4):21 Hackers Have Big Business Scared~ 2(10):71 Hackers In Jail 6(1):3 Hackers in Jail, Part Two 10(4):4 Hackers in the World of Malls: Secret Service Behind Harassment of 2600 Meetings 9(4):4 Hackers on Shortwave~ 3(9):67 Hacking AmiExpress 9(3):4 Hacking at the End of The Universe 10(3):4 Hacking Computer Shows 10(4):16 Hacking IBM's VM/CMS 4(11):4 Hacking IBM's VM/CMS--Part Two 4(12):4 Hacking MCIMAX 8(2):16 Hacking on Telenet: It's as Easy as 123456! 1(2):7 Hacking on the Front Line 9(3):31 Hacking Packard 2(3):20 Hacking PC Pursuit 4(4):6 Hacking Smartphone 10(4):11 Hacking WWIV 9(1):12 Hands Across Telenet~ 3(6):47 Happenings 5(1):37 Hardwiring Your Way In 5(4):42 HBO Encryption Broken~ 3(10):75 Here They Are 9(2):24 Here We Go Again 9(2):22 Here's the Secret! 2(11):73 High School Hacking 10(2):13 High School Mac Hack 10(4):15 High Tech Happenings 9(4):19 High Tech Parking Meters~~ 3(5):35 History of British Phreaking 1(9):49 Hitchhiker Guide to the Phone System Phreaking in the Nineties 9(2):10 Home Computer Attacks Falwell~ 3(1):3 House: Hacking is Bad~ 1(8):45 How Can Sysops Protect Themselves? 2(8):55 How Cellular Phones Came About and What You Can Expect 3(11):90 How Not to be Rejected~ 3(12):91 How Payphones Really Work 6(1):30 How Phone Phreaks are Caught 4(7):6 How the Defeat *69 9(2):31 How to Build a Silver Box 6(4):20 How to Get into a C.O. 2(3):14 How to Hack A Pick 3(6):42 How to Hack Honesty 10(3):20 How to Hear Phone Calls 5(4):19 How to Run a Successful Teleconference 2(5):26 How to Take Apart A Payphone 9(1):20 How to Use Your Silver Box 9(1):16 Human Database Centers 8(4):46 I.R.S. Computers Screw Up~ 2(3):15 IBM ADS Directory 1(9):53 IBM Braille Compatible~ 3(12):95 IBM Gets Bigger/Goodbye SBS~ 2(7):47 IBM's Audio Distribution Systems Sure Can Be Fun! 1(5):2 IC and CIC Listing 1(11):65 Ice Cream Chain Aides Selective Service~1(8):45 ICN--More than a Bargain 3(11):81 Important News~ 4(12):3 In Pursuit of Knowledge: An Atari 520ST Virus 8(1):4 Indian Phones Under Siege~ 3(9):67 "Indiana ""Fones"" Are Gone" 3(10):75 Indiana Telco Threatens AT&T~ 3(7):55 Industrial Espionage Seminar~ 2(3):15 Infrared Beeper Will Find You 3(2):15 Inmates Handle Information Calls~ 2(12):83 Inspect Implementation 8(2):18 Intelpost an Astronomical Failure~ 1(5):3 Interesting Things to do on a DEC-20 2(7):41 International Hacking~ 3(12):91 International NUA's 4(10):10 Internet Outdials 8(1):40 Introducing the Clear Box! 1(7):4 IRS Drives Telco to Drink~ 2(6):35 IRS Wants Access to Telco Data~ 2(1):3 Is AT&T Hiding Near You? 9(4):36 It Could Happen to You! 3(2):10 ITT Crackdown~ 2(7):43 ITT Wiping Out Fee~ 1(8):45 Jersey Wins Wiretap Race Again~ 2(6):35 Kenya Pay Phones Prove Popular~ 2(3):15 Kiev Calling Clogged~ 3(6):47 Know Your Switch 10(4):10 Knowing UNIX 3(8):57 L.A. Law 9(1):7 Lair of the INTERNET Worm 6(3):39 Lawsuit Filed Against Secret Service 10(1):43 LD Companies Strike Back~ 3(8):59 Leaked Documents 7(4):16 Leave Our Poles Alone!~ 3(8):59 Let's Move to France!~ 3(6):47 Letter From Prison 9(4):13 Listening In 7(1):19 Listening In On Cellular Phones~ 2(7):43 Listening In: Catch Me if you Can! 4(11):7 Local Toll-Free Numbers~ 3(10):79 Long Distance Option Timtable~ 1(5):3 Look Out For Sidney~ 1(7):3 "Look Out, He's Got A Computer!" 1(7):1 Looking for Simplex Locks? 9(1):38 Looking Up IBM Passwords 8(1):36 Loophole in Wiretap Law 3(12):91 Loopholes Around Wiretap Laws~ 1(10):57 Magnetic Strips 8(2):7 Man Worries About Sprint Bill~ 3(4):27 Marcos Phones For Free~ 3(4):27 Mastering the Networks 3(11):82 MCI Access Numbers & Mail Numbers 1(4):5 MCI Expanding With Optical Fibers~ 2(7):47 MCI Goes to U.K.~ 2(5):27 MCI Mail & Western Union EasyLink 1(12):67 MCI Mail: The Adventure Continues 1(7):2 MCI: The Phone Company With A Lot of Explaining To Do 5(4):10 Meeting Advice 10(2):16 Meeting Advice 10(2):17 Meeting Mania 10(3):18 Messages on the Move~ 3(9):71 MILNET TAC Dialups by Location 2(7):45 Missing Children's Faces Displayed~ 2(7):43 Mobile Frequencies 8(4):18 Mobile Phones--Theory and Construction 3(4):26 Monitoring Phone Calls With A TVRO 5(1):4 More Banks Link Arms~ 3(11):87 More Cellular Fun 10(3):42 More Conversion Tricks 8(3):43 More Divestiture Woes~ 2(10):71 More Hacking on Primos 6(4):14 More Info on VMS 2(10):66 More Long Distance Unpleasantries 4(12):20 More Magic Buttons~ 3(11):87 More Meeting Advice 10(4):35 More On Hacking UNIX 6(4):4 More on Trashing: What to Look for, How to Act, Where to Go 1(9):50 More PC Jr's., Less Z-100's for Soviets~1(8):45 More Phone Fraud~ 2(7):43 More Telenet Addresses 4(6):9 More Use of Phone Computers~ 2(10):71 More VAX Tricks 4(5):4 Moving Satellites Right Up In the Blue ...What Was Really Going On? 2(8):52 Mystery Transistor~ 2(5):27 Navigate With a CD~ 3(12):95 Navy Calls Dial-A-Porn~ 2(10):67 Navy Phone Phreaks Nabbed~ 2(10):67 Navy Software Available~ 3(10):75 Nazi BBS a Challenge to Hackers 2(3):13 Negative Feedback 7(2):11 Net Addresses 2(4):23 Network 2000 Saga Continues 7(3):8 Never Erase the Past 10(3):19 New British Phone Service~ 3(7):55 New Chip Helps Sprint~ 3(8):63 New Developments 4(2):18 New Jersey Tops Taps~ 3(7):51 New Payphone Service for Michigan~ 3(11):87 New Payphones Confuse Callers~ 3(1):7 New Phone System for Courthouse~ 2(8):51 New Revelations From Bell South 7(3):16 New Tracking Device For Cars~ 2(6):39 New VAX Announced~ 3(1):7 New Ways of Stealing Data~ 3(3):19 New York's Computer Law~ 3(6):43 New York's IMAS 4(10):4 News Roundup~ 10(4):42 News Update ~ 10(2):45 News Update~ 7(2):38 News Update~ 7(1):23 News~ 6(3):14 Nickname Listings In Small Town~ 3(11):87 No Data Protection for Hong Kong~ 3(7):55 No Dial-it Calls For Feds~ 2(11):75 No Hacking While Flying, Please~ 1(2):9 No More Free Info~ 1(6):3 No More Redialing?~ 2(12):83 North Carolina #1 in Hacking 3(12):91 Northern To Destroy COs 3(3):23 NPA Countdown 6(4):44 NSA Chooses AT&T Computer~ 2(7):47 NSA Doesn't Feel Secure~ 1(9):51 NSA Drops DES~ 3(9):67 NSA Memo 5(3):20 NSA Wants a New Chip 3(10):79 NSA Wants Better Phones~ 1(10):57 Numbers 3(2):13 Numbers of Interest 4(8):6 Numbers...Long Since Changed 3(6):45 Nynex Bumps Southwestern Bell~ 3(6):47 NYNEX Data 6(4):9 Nynex Voice Mail 10(4):18 Oh No, Not Again!~ 1(10):57 On The Road Again: Portable Hacking 9(2):4 One Angry Judge 10(1):23 One We Somehow Missed~ 1(11):63 Operating With Difficulty 4(9):6 Our Contest Winners 7(4):32 Our Ever-Changing World~ 6(4):6 Our Wishes For '86 and Beyond 2(12):81 Out of the Inner Circle--A Review 2(6):34 Outdials 8(2):44 Outside Loop Distribution Plant, or Hands-On Experience 5(3):4 Overcharge Hunters Needed 3(1):3 Overseas Pirates~ 2(4):21 Pacific Cable Planned~ 2(11):79 Paging For Free 4(6):5 Passageways to the Internet 10(4):32 Patients May Get to Keep Phones~ 3(5):39 Pay Phone Causes Panic~ 3(2):11 Pay Telephones Deregulated~ 1(7):3 PC Pictures~ 3(12):95 Penetrating the Pentagon by Phone~ 1(12):69 Pennant Ties Up Phones 3(10):75 People Express to be Hacked to Pieces 2(5):25 Pest Control~ 2(9):63 Phone Booth Captures Man~ 2(10):67 Phone Booth Wins Again~ 3(1):3 Phone Booths Mauled The Stolen~ 3(8):59 Phone Fraud in Governor's House~ 3(8):59 Phone Numbers Supplied by Readers 8(1):17 Phone Phreak Fined~ 3(4):27 Phone Service Via Radio Shack~ 3(1):3 Phone-in Registration for College~ 2(9):59 Phones 4(1):20 Phones at High and Low Speeds~ 2(12):87 Phones in the Sky~ 1(11):63 Phoning Home From Europe 4(5):9 Phreak Roundups~ 2(2):9 Phreaks Tie Up Lines~ 3(12):91 Pitcairn Island Now On AT&T Net~ 2(9):59 Police Dept. Wants Cellular Phones~ 2(11):79 Police Hacker Cleared~ 2(5):27 Poor Connection Starts Bomb Scare~ 3(9):67 Poor Service An Understatement~ 3(10):79 Porno Phone Service Busted~ 2(6):35 Portable VAXes!!! 3(9):71 PRIMOS: The Final Part 7(2):14 Prisoner Update 8(2):46 Prisoners Break Law~ 3(7):51 Private Directories Soon to be Available~ 1(9):51 Private Sector Returning 3(1):1 Private Sector Update~ 2(9):59 Problems for New Pay Phones~ 2(6):39 Product Review: Do It Yourself Demon Dialer Kit (Hack-Tic Technologies) 9(2):15 Product Review: Speech Thing 9(4):45 Product Review: TDD-8 DTMF Decoder 10(2):14 Programs in BASIC 3(1):5 Protecting Your SSN 8(3):18 Psychology in the Hacker World 8(3):38 Public Phone Secrecy~ 3(6):43 Punching Pay Phones 6(3):37 Pure Cyberfiction, Says Mitnick 8(2):42 Pursuit For People 2(9):58 Q & A 1(2):10 "Q" and "Z" Controversy Rages~ 3(11):83 RCI & DMS-100 Bugs 3(9):65 Reach Out and Touch a Nuclear Weapons Contractor 4(3):2 Reaching Out On Your Own 2(9):58 Reagan Hangs Up on Kids~ 2(5):27 Real Important Frequencies 9(1):17 Real Life War Games?~ 2(4):21 Redemption for a Hacker~ 2(3):15 Remember.... 6(2):3 REMOBS 6(3):32 Reporters Steal Swiss Phones~ 3(2):11 Review: CO Magazine 4(9):22 Review: Hacker: The Computer Crime Card Game 9(1):36 Review: Sneakers 9(3):17 Review: The Hacker Crackdown 9(3)21 Reviews: The 1989 Pirate Directory 6(2):42 Ripoffs & Scams~ 6(1):36 Robot Kills Man~ 2(4):21 ROLM Phone System Creates a Nightmare 5(1):30 Roman Hackers 4(12):18 RSTS For Beginners 3(4):25 RSTS: A Trick Or Two 2(11):73 Rural Customers Denied Access~ 2(11):79 Rural Radio Phones~ 3(8):63 Rural Ultraphones~ 3(10):79 'Santa Fraud'~ 2(4):21 Satellite Jamers Jammed~ 3(3):23 Saudi Arabian BBS List 4(7):21 Say Goodbye to Meter Readers~ 2(6):39 SBS Offers Toll-Free Service~ 1(12):69 Scanning For Calls 6(2):22 Sears Satellite Network~ 1(10):57 Secret Frequencies 8(2):32 Secret Service on Trial 10(1):18 Security Can Kill Creativity 3(10):75 Security Numbers 1(10):59 Security Software~ 3(1):7 SEIZED! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers 2(8):49 Sherwood Forest Shut Down by Secret Service 2(6):34 Shopper's Guide to COCOTS 9(3):13 Shower Phone?~ 3(5):35 "Signature" On Video Transmitters~ 3(9):67 Silver Box Born in U.K. 7(1):19 Silver Pages~ 2(4):21 Simplex Locks 8(3):6 Simplex Update and Corrections 8(4):21 Social Interaction with Phones 4(12):17 Software Makers Crash BBS~ 3(10):79 Some Cosmos Documentation That May Be Useful 4(2):6 Some Facts on Supervision 3(9):65 Some Numbers 4(12):21 Some Thoughts on "Garbage Picking" 1(2):10 Some Words on Hacker Morality 2(6):34 South African BBS's 4(10):11 Soviet BBS List 8(1):16 Soviet Computer Update~ 3(3):23 Soviets Denied Computer Access~ 3(3):19 Spanish Phones--and what they don't do 6(2):36 Springsteen Mania~ 2(11):75 Sprint Unites with US Telcom~ 3(2):15 Sprint--Too Many Customers~ 3(11):87 SS Number Returned to Citizens~ 3(7):51 Still More on the World of COSMOS 4(3):10 Sting Boards on the Rise~ 3(5):39 Stock Market Crash~ 3(6):47 Students Bog Down Computer~ 1(12):69 Students Cause Havoc on Computer~ 1(3):3 Stuff You Should Be Interested In~ 8(4):8 Stumbling into Control on a VMS 4(1):6 Super Crisis Alert System~ 2(12):87 Super Pay Phone~ 2(12):87 Supercomputer Dialups~ 1(3):3 Survey Results 2(12):84 Surveying the COSMOS 2(2):8 TAP: The Legend is Dead 4(1):4 TASS News Service~ 3(3):23 Technology Nabs Hooky Players~ 3(1):3 Teelco Rats On Government~ 2(10):67 Teenagers Abuse "Party Line~" 3(2):11 Telco News 9(4):42 Telco Offices 10(2):36 Telco Response 4(10):6 Telco Sasys "Pay for Tones"~ 3(12):91 Telco Service Spawns Racist Banter~ 2(12):83 Telenet Addresses 4(5):10 Telenet Directory 2(9):61 Telenet Letter 4(8):16 Telephone Company Responds to Criticism of Touch-tone Fees 4(10):7 Teller Machine Crime Coming~ 1(4):3 Test Numbers 2(11):77 Thai Phone Books a Hot Issue~ 2(6):39 The 516 Area Code in Detail 5(3):14 The 707 Area Code 7(1):44 The Australian Phone System 9(1):31 The Ballad of Captain Crunch 4(3):4 The Basics: Divestiture: What Happened? 3(1):1 The Class Struggle 8(2):22 The Cold Truth 4(8):20 The Computel Scoop 3(5):34 The Constitution of a Hacker 1(3):1 The Dark Side of the Great Break-Up 1(6):4 The Dark Side of Viruses 5(2):8 The Day the Phone System REALLY Died 6(4):4 The Death of COSMOS? 6(3):13 The Definitive ANAC Guide 7(3):39 The Early Phreak Days 2(11):80 The Facts on 10698 7(1):30 The First 100% ESS State~ 2(7):47 The First Atomic Bomb 1(3):4 The Free Phones of Philly 3(7):50 The Galactic Hacker Party 6(3):10 The Ghost in the Machine~ 3(8):59 The Hacker "Threat" 9(4):19 The Hacker Video 8(3):14 The Hackers Guide to Area Code 1(8):47 The History of ESS 2(11):74 The Infinity Transmitter--An Old Bug that Had Its Time 2(9):58 The Latest~ 9(1):42 The Magical Tone Box 10(4):22 The Neidorf/Phrack Trial: Day by Day 7(2):4 The New "TAP" 6(2):43 The New LEC Order: Acronym City 8(1):42 The Next Step in Custom Calling~ 2(3):15 The Person Numbers~ 1(3):3 The Rise of the Computer State by David Burnham Book Review 1(8):44 The Scariest Number in the World 1(12):68 The Scoop on 911 7(1):37 The Scoop on Pen Registers~ 3(2):11 The Secrets of Mizar 7(1):8 The Simple Pleasures of a Step Office 1(5):1 The Sprint Gestapo Strikes Again! 6(2):34 The Summer Games of 87 4(8):3 The Telecom Informer 4(10):8 The Telecom Informer 4(8):8 The Telecom Informer 4(9):8 The Telecom Informer 4(6):8 The Telecom Informer 4(5):8 The Telecom Informer 4(11):8 The Telecom Informer 4(4):8 The Telecom Informer 4(1):8 The Telecom Informer 4(12):8 The Telecom Informer 4(3):8 The Telecom Informer 4(2):8 The Telecom Informer 4(7):8 The Terminus of Len Rose 8(1):11 The Theory of 'Blue Boxing': their history, how their used, their future 2(2):7 The Trouble With Telemail 1(4):2 The Truth Behind Those 9999 Numbers 1(1):4 The View of A Fed 9(2):38 The Woes of Having a Small-Time Rural Phone Company 1(5):4 The Word On the Street~ 7(4):36 There are More Phones than Ever 3(3):23 This Month At 2600 3(4):30 This Month at 2600 3(3):22 This Month's Mischief and Mayhem~ 2(2):9 This Month's Troublemakers~ 2(3):15 Those Horrible Hackers Strike Again 2(1):1 Those Silly Codes 4(10):14 Tidbits~ 8(3):31 Times Changing For Directory Assistance~1(2):9 TINA Message Service~ 2(6):39 Tips On Trashing 6(2):32 Toll Fraud Detection Techniques 7(1):12 Toll Fraud Device 10(2):42 Toll Fraud: What the Big Boys are Nervous About 9(3):43 Town on Hold During Strike~ 3(7):51 Trashing Alaska Style 2(2):8 Trashing: America's Source For Information 3(10):73 Trick of the Month~ 1(2):9 Trouble in the White House 10(1):12 Trouble with 800 "Word Numbers"~ 2(9):59 True Colors 10(3):9 TRW Breached by Non-Hackers~ 2(2):9 TRW Credentials Lack Credibility 4(8):4 TRW: Big Business is Watching You 1(7):5 TV Blue Boxes~ 3(8):63 Two Inch Thick Bill~ 2(10):67 U. S. Secret Service Field Offices 9(4):12 U.S. Phone Companies Face Built-In Privacy Hole 8(4):42 UAPC Update 6(4):45 UNIX Password Hacker 8(1):31 UNIX Password Hacker: An Alternative Approach 9(1):18 US and France Link Phones~ 3(5):35 US Social Security Prefixes 4(11):6 Use of Wiretaps at Record Pace~ 1(11):63 Useful UNIX Programs 8(3):44 Using the Telephone 9(3):36 USPS Hacking 8(3):32 USPS Hacking Corrections 8(4):21 USSR Computer Hungry~ 3(8):63 Vehicle Identification Numbers 9(4):11 Victimized by Crime Computers~ 1(10):57 Victory for Wiretap Victims~ 1(5):3 Video Review: Assorted Videos 10(2):40 Video Telephone Invention~ 1(12):69 Violating A VAX 3(7):49 Virus Scanners Exposed 9(1):9 Vital Ingredients: Switching Centers and Operators 1(10):56 VM/CMS Corrections 5(1):8 VMS--The Series Continues 3(2):9 Voice Mail Hacking 9(2):42 Voice Mail Hacking...NYNEX Style 6(3):36 Voice of Reagan Tortures Patients~ 3(11):83 War Game Addict~ 2(9):59 Weathertrak Codes 5(1):15 What a White Box Can Do 2(4):19 What in the EFF? 7(2):10 What it's Like to be a Soviet Operator 5(4):30 What's Going On With Phones/Computers 5(3):10 Whats up~ 8(1):19 When Hackers Ride Horses: A Review of Cyberpunk 8(2):42 Where Have All the Hackers Gone? 8(2):4 Where One Hacker Went (L) 8(3):24 Whitehouse Extension Numbers 1(1):5 Who Called the Shuttle?~ 3(3):19 Who the Hell was Almon Strowger, Anyway?5(3):9 Who Wants to be Swept?~ 3(12):95 Whoops [errata for 4(9)] 4(10):18 Whose Strike Was That Anyway? 1(4):1 Why Computers Get Snatched 2(8):54 Why Won't They Listen? 8(3):4 Wireless Phones Spell Trouble~ 1(1):3 Wiretap City~ 1(3):3 Wiretap Clarification (L) 7(3):30 Wiretapping and Divestiture: A Lineman Speaks Out 2(1):1 Word Numbers 4(4):15 Worldnet: Getting Closer Every Day 4(9):4 WORM 6(2):38 Wrath of God Strikes 2600 3(11):86 Wrestlemania Pins Bell~ 3(5):39 Write Protect Tabs Wrong~ 3(2):15 Yellow Scam~ 2(5):27 "You Must First Dial a One..."~ 1(7):7 Your Own Private Centrex~ 3(1):7 2600 THE HACKER QUARTERLY Author Index: Volume 1 (1984) - Volume 10 (1993) David Price Authors are listed in the first column, titles and citations are listed in the second column using the following format: V(N):P V = Volume, N = Number, P = Page 910 Elementary Switching 10(4):9 999, The High School Hacking 10(2):13 Abuse, Dr. Magnetic Strips 8(2):7 Advocate, The Devil's Product Review: Do It Yourself Demon Dialer Kit 9(2):15 Advocate, The Devil's Review: The Hacker Crackdown 9(3)21 Advocate, The Devil's Review: Hacker: The Computer Crime Card Game 9(1):36 Advocate, The Devil's When Hackers Ride Horses: A Review of Cyberpunk 8(2):42 Advocate, The Devil's USPS Hacking 8(3):32 Agent 003, Boic Hacking Packard 2(3):20 Agent 04, Phucked Outside Loop Distribution Plant, or Hands-On Experience 5(3):4 Agranoff, Mike The Ballad of Captain Crunch 4(3):4 America, Mainstream More VAX Tricks 4(5):4 Anonymous ANALYSIS: Gulf War Printer Virus 8(4):39 Anonymous Death of NYNEX Business Centers 8(2):11 Aristotle Voice Mail Hacking...NYNEX Style 6(3):36 B/Square & Mr. Upsetter Building a DTMF Decoder 7(1):14 Baalzebub Violating A VAX 3(7):49 Bard, The High School Mac Hack 10(4):15 Bayonet Getting Your File... 10(1):42 Benedict, W. Ritchie Book Review: The Devouring Fungus 9(2):40 Benedict, W. Ritchie Book Review: Virtual Reality 10(4):37 Billsf True Colors 10(3):9 Billsf Hitchhiker Guide to the Phone System Phreaking in the Nineties 9(2):10 Bluebox, Mark The Truth Behind Those 9999 Numbers 1(1):4 Bootleg Cellular Magic 10(1):4 Bruce, Peter Spanish Phones--and what they don't do 6(2):36 Buggy, Orson Banking from your Terminal--A Look at PRONTO 2(7):42 Caller, Midnight The Australian Phone System 9(1):31 Capone, Al Hacking on the Front Line 9(3):31 Catalyst, Cheshire Hacking PC Pursuit 4(4):6 Catalyst, Cheshire TAP: The Legend is Dead 4(1):4 Check, Parity Meeting Advice 10(2):16 City, New Hack The New LEC Order: Acronym City 8(1):42 Clayton, Noah Converting a Tone Dialer into a Red Box 7(3):32 Crazed Luddite & Murdering Thug K001/Ra An Algorithm for Credit Cards 7(3):42 Cruise-CTRL An Overview of DSS1 10(3):36 DC More Conversion Tricks 8(3):43 Delam, Dr. Virus Scanners Exposed 9(1):9 Delam, Dr. Defeating Callback Verification 9(3):9 Dobbs, J.R. "Bob" Building a Red Box 5(2):13 Dragon, The Trashing: America's Source For Information 3(10):73 Drake, John England's Mass Announcements 4(9):10 Drake, John A Trip to England 3(8):58 Drake, John Book Review Nothing New in Computer Underground by M. Harry 3(6):42 Drake, John An Interview with Hugo Cornwall: British Hacker/Author 4(2):4 Drake, John An Interview With the Chaos Computer Club 5(4):34 Drewl/Salivate Changing Your Grades on A High School Computer 10(3):34 Dust Crypt() Source Code 8(4):11 Dutton, Roland Book Review: "The Hacker's Handbook" 4(2):15 Echo Acronyms A-G 10(1):34 Echo Acronyms H-R 10(2):20 Echo Acronyms S-X (no y or z) 10(3):44 Esper Mobile Frequencies 8(4):18 Estev, Paul G. People Express to be Hacked to Pieces 2(5):25 Estev, Paul Reviews: The 1989 Pirate Directory 6(2):42 Eye, Roving Birth of a Low Technology Hacker 8(4):16 Eye, Roving Growth of a Low Tech Hacker 9(4):17 Fed, The The View of A Fed 9(2):38 Fellpe Rodriquez & Rop, Gonggrijp Stuff You Should Be Interested In~ 8(4):8 Firemonger Surveying the COSMOS 2(2):8 Foley Dan The Telecom Informer 4(6):8 Foley Dan The Telecom Informer 4(3):8 Foley Dan The Telecom Informer 4(4):8 Foley Dan The Telecom Informer 4(2):8 Foley Dan The Telecom Informer 4(1):8 Freeman, John The Telecom Informer 4(5):8 Fresco, Al The Telecom Informer 4(9):8 Frosty of the GCMS Fascinating fone fun 9(1):45 Frosty of the GCMS A Batch Virus 9(1):8 FyberLyte The Magical Tone Box 10(4):22 G.R.A.S.P., Crisp A Guide to the 5ESS 10(2):4 Galaxy, Mister ANSI Bomb 10(2):44 Gam, Tamlyn Silver Box Born in U.K. 7(1):19 Gamma, Bob Are You a Phreak??? 2(3):13 Gerard, Judas More Cellular Fun 10(3):42 Glitch, The Cellular Update 5(3):8 Goldstein The Telecom Informer 4(7):8 Goldstein, Emmanuel A Pen Register For Phreaks?: Product Review--Dialed Number Recorder 4(5):22 Goldstein The Telecom Informer 4(10):8 Goldstein The Telecom Informer 4(8):8 Goldstein, Emmanuel "FBI Revealed: Reviews--"The FBI Project Newsletter" & "The FBI and Your BBS" 4(8):9 Goldstein, Emmanuel Never Erase the Past 10(3):19 Goldstein, Emmanuel Review: Sneakers 9(3):17 Goldstein, Emmanuel The Scoop on 911 7(1):37 Goldstein, Emmanuel The New "TAP" 6(2):43 Goldstein, Emmanuel Video Review: Assorted Videos 10(2):40 Goldstein, Emmanuel New Revelations From Bell South 7(3):16 Grapefruit, Rancid A Reader's Reply to Captain Zap 5(2):16 Gray, Jeff WORM 6(2):38 Greek, The International NUA's 4(10):10 Greek, The South African BBS's 4(10):11 Greenberg, Ross M. A Form of Protection For You and Your Computer 5(2):4 Guru, VM VM/CMS Corrections 5(1):8 Guy, The GCI Trashing Alaska Style 2(2):8 Hackers, Legion of Telenet Addresses 4(5):10 Hank@Taunivm.Bitnet Worldnet: Getting Closer Every Day 4(9):4 Hibbert, Chris Protecting Your SSN 8(3):18 Hobbit, The Getting the Most Out of Equal Access 4(3):6 Holmes, Chester An American Express Phone Story 3(3):17 Holmes, Chester The Free Phones of Philly 3(7):50 Howard The Infinity Transmitter--An Old Bug that Had Its Time 2(9):58 Icom, Mr. A Review of "The 'Top Secret' Registry of US Government Radio Frequencies" 4(11):7 Inconnu, Les Product Review: TDD-8 DTMF Decoder 10(2):14 Infidel, The How Payphones Really Work 6(1):30 Infidel, The REMOBS 6(3):32 Infidel, The UNIX Password Hacker 8(1):31 Infidel, The Exchange List: 201 Area Code 6(2):20 Infiltrator A Simple Virus in C 9(3):19 Jaffee, Walter S. Hacking Computer Shows 10(4):16 Jockey, Disk US Social Security Prefixes 4(11):6 Jockey, Keyboard UNIX Password Hacker: An Alternative Approach 9(1):18 Judicator of D.C. More Meeting Advice 10(4):35 Kevin Internet Outdials 8(1):40 Kid, the & Co. How to Get into a C.O. 2(3):14 Kid, the & Co. Knowing UNIX 3(8):57 Kid, The & Co. Some Facts on Supervision 3(9):65 Kingpin, 617 & RDT Syndicate Cellular Phone Biopsy 10(4):6 Knight, Red More On Hacking UNIX 6(4):4 Knight, The Dark British News 10(1):44 Knight, Red A Hacker's Guide to UNIX 5(4):12 Kurtz, Colonel Walter E. Class Features 8(4):31 Lineman, The Phoning Home From Europe 4(5):9 Lurch, The 707 Area Code 7(1):44 Luthor, Lex The History of ESS 2(11):74 Luthor, Lex Telenet Directory 2(9):61 Luthor, Lex & The LOD History of British Phreaking 1(9):49 Luthor, Lex Where One Hacker Went (L) 8(3):24 Luthor, Lex & The LOD Fun With COSMOS 2(12):82 Luthor, Lex & the LOD More Info on VMS 2(10):66 Luthor, Lex & The Legion of Hackers Hacking IBM's VM/CMS--Part Two 4(12):4 Luthor, Lex & The LOD Final Words on VMS 3(3):18 Luthor, Lex & The LOD A Guide to VMS 2(9):57 Luthor, Lex & The Legion of Hackers Hacking IBM's VM/CMS 4(11):4 Luthor, Lex & The Legion of Doom/Hackers VMS--The Series Continues 3(2):9 Mac+ New York's IMAS 4(10):4 MAD! Death of a Pay Phone 3(10):73 Man, Swinging Hacking AmiExpress 9(3):4 Marauder, The RSTS For Beginners 3(4):25 Marauder, The & The L.O.D. A HAcker's Guide to the TSPS Console 4(6):6 Marauder, The & Phoneline Phantoms RSTS: A Trick Or Two 2(11):73 Master, LNA Listening In: Catch Me if you Can! 4(11):7 MechWariors, GCMS U. S. Secret Service Field Offices 9(4):12 Menace, Hyperborean Caller ID Technologies 10(3):12 Meyer, Gordon & Jim Thomas The Neidorf/Phrack Trial: Day by Day 7(2):4 Micro Surgeon /West Coast Phreaks Punching Pay Phones 6(3):37 Mitnick, Kevin Pure Cyberfiction, Says Mitnick 8(2):42 Mitnick, Kevin Looking Up IBM Passwords 8(1):36 Mole, The Stumbling into Control on a VMS 4(1):6 Monk, The How to Take Apart A Payphone 9(1):20 Moon, Electric A True Saga of Teleconferencing 1(4):4 Mouse, MCI Hacking MCIMAX 8(2):16 Murphy, Dan Review: CO Magazine 4(9):22 Nathan, Paco Xander Secret Service on Trial 10(1):18 Neidorf, Craig An Appeal For Help 8(4):36 Neidorf, Craig The Terminus of Len Rose 8(1):11 NeurAlien Beginner's Guide to Minitel 9(4):8 Overlord, Dark Lair of the INTERNET Worm 6(3):39 P., Larry The Sprint Gestapo Strikes Again! 6(2):34 Page, Bob A Report on the Internet Worm 5(4):4 Panda, Paranoid In Pursuit of Knowledge: An Atari 520ST Virus 8(1):4 Panda, Paranoid An MS-DOS Virus 9(1):4 Phoenix, The Beige Box Construction 10(1):14 Phorester, Dr. Clayton Descrambling Cable 10(1):16 Phreak, Nynex Numbers of Interest 4(8):6 Phreak, The Alaskan (TAP) Exploits in Operator Hell 3(5):33 Phreaker, Lord Book Review: "Automatic Teller Machines III" 4(2):21 Phreaker, Cray-Z Product Review: Speech Thing 9(4):45 Phreaker, Lord An Interesting Diversion 2(10):65 Phreaker, Phantom & Doom Prophet & LOD! Toll Fraud Detection Techniques 7(1):12 Plague, The The Dark Side of Viruses 5(2):8 Plague, The Grade "A" Hacking 6(3):4 Plague, The NYNEX Data 6(4):9 Plague, The UAPC Update 6(4):45 Plague, The An Introduction to COCOTS 7(2):20 Plann, Marshall Useful UNIX Programs 8(3):44 Prefect, Phord Getting Started 9(3):42 PW Human Database Centers 8(4):46 "Q", The The Secrets of Mizar 7(1):8 Rabbit, Peter Cipher Fun 9(4):6 Ranger, Night Voice Mail Hacking 9(2):42 Ranger, Forest Reaching Out On Your Own 2(9):58 Rat, Tech Hacking Smartphone 10(4):11 Rebel Know Your Switch 10(4):10 Reisman, Bruce Telephone Company Responds to Criticism of Touch-tone Fees 4(10):7 Researcher, The Mobile Phones--Theory and Construction 3(4):26 Resz, Stepher J. Book Review: Approaching Zero 10(3):38 RNOC, Bill From Legion of Doom Still More on the World of COSMOS 4(3):10 Rocker, The Veteran Cosmic Saudi Arabian BBS List 4(7):21 Rome, Hal from Roman Hackers 4(12):18 Runner, Net Outdials 8(2):44 S., Bernie How the Defeat *69 9(2):31 S., Bernie AT&T Sub Maps 4(8):11 S., Bernie FAX: A New Hobby 4(5):14 S., Bernie Paging For Free 4(6):5 S., Bernie Cellular Phone Fraud and Where It's Headed 4(7):4 S., Bernie Secret Frequencies 8(2):32 Salerno, Mike Getting In The Back Door: A Guide to Some Popular Operating Systems 2(1):2 Scannon, Lou Book Review: Tune in on Telephone Calls by Tom Kneitel 5(4):45 Scientist, Mad How to Use Your Silver Box 9(1):16 Severence, No How Phone Phreaks are Caught 4(7):6 Shadow, The Knights of Interesting Things to do on a DEC-20 2(7):41 Shadow, The Wiretapping and Divestiture: A Lineman Speaks Out 2(1):1 Shadow, The How to Run a Successful Teleconference 2(5):26 Shadow, The Test Numbers 2(11):77 Shadow, The "Equal Access May Not be ""Equal"" to Modems" 2(11):74 Skinner, Scott One Angry Judge 10(1):23 Skinner, Scott & Emmanuel Goldstein Simplex Locks 8(3):6 Solomenko, E. What it's Like to be a Soviet Operator 5(4):30 Source, U. R, How to Hack Honesty 10(3):20 Staff The Telecom Informer 4(11):8 Statton, Scott Ever Wonder Who Owns All Those 800 Numbers? 6(1):12 Steal, Agent Central Office Operations 7(4):12 Strowger, Almon, Jr. Who the Hell was Almon Strowger, Anyway? 5(3):9 Switchman, Silent And They Call US Crooks? 2(10):65 Switchman, Silent Here's the Secret! 2(11):73 Taylor, Dave Social Interaction with Phones 4(12):17 TELEgodzilla Our Contest Winners 7(4):32 The Kid & Co. & The Shadow More on Trashing: What to Look for, How to Act, Where to Go. 1(9):50 "The Snake", Jake Caller ID: The Facts 7(3):5 Thunder, Lord Defeating Trap Tracing 7(3):22 Toad, Texas Capturing Passwords 4(8):10 Tommy BASIC Red Box Tones 5(3):22 Tommy Canadian WATS Phonebook 5(3):23 Upsetter, Mr. Build A Tone Tracer 8(2):14 Upsetter, Mr. Listening In 7(1):19 Upsetter, Mr. Scanning For Calls 6(2):22 Upsetter, Mr. How to Build a Silver Box 6(4):20 Valve, Rex TRW Credentials Lack Credibility 4(8):4 Velcro, Romula Meeting Advice 10(2):17 Videosmith, The CLASS: What It Means To Us 4(5):6 Violence A Guide to PRIMOS 6(2):4 Violence PRIMOS: The Final Part 7(2):14 Violence More Hacking on Primos 6(4):14 William, Sir Some Cosmos Documentation That May Be Useful 4(2):6 Williams, Dr. Tips On Trashing 6(2):32 Williams, Dr. Hardwiring Your Way In 5(4):42 Williams, Dr. An Interview with Dorothy Denning 7(3):10 Williams, Dr. Book Review: The Cuckoo's Egg 7(1):45 Williams, Dr. A Study of Hackers 10(1):38 Wintermute Operating With Difficulty 4(9):6 Wood, Jim The Early Phreak Days 2(11):80 Woodstein, Condor Psychology in the Hacker World 8(3):38 X, Alien A Way To Catch Peepers 9(1):35 Yuhas, Mike Allnet: A Horror Story 4(6):4 Zap, Captain An Interpretation of Computer Hacking 5(1):16 Zee, Charlie Trouble in the White House 10(1):12 Zero, Count Toll Fraud: What the Big Boys are Nervous About 9(3):43 Zero, Count Shopper's Guide to COCOTS 9(3):13