TADXF:007 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %% N.I.A. %% %% Network Information Access %% %% Index 01-74 %% %% Done By OMEGA/AD %% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% [-]-------------------------------------------------------------------------[-] NIA FILE 1 : Automated Teller Machines - Basic Series - ATM's : Written by/Typed In By Guardian Of Time : 15DEC89 NIA FILE 2 : Automated Teller Machines -- Basic Series -- File #2 : Written by/Typed In By Guardian Of Time : 19JAN90 NIA FILE 3 : Computer Crimes/Fraud/Waste part 1 : Written/Typed/Edited By: Lord Kalkin : 02MAR90 NIA FILE 4 : Computers: Crime, Fraud, Waste Part 2 : Written/Typed/Edited By: Lord Kalkin : Information Security : 03MAR90 NIA FILE 5 : Detecting Merchant Fraud : Typed In By: Guardian Of Time : "A Guide To Monitoring Credit Card Transactions" : Written By: Mastercard International : 01FEB90 NIA FILE 6 : TRW -- Credit Bureau -- How To Read A TRW Credit Report : Written/Typed In By: Guardian Of Time : December 28, 1989 NIA FILE 7 : TRW -- Credit Bureau -- How To Read A TRW Credit Report : Written/Typed In By: Guardian Of Time : December 28, 1989 NIA FILE 8 : ATM Part 3 : Written/Typed/Edited By: Guardian Of Time : ATM Diagnostic Manual NIA FILE 9 : ATM Part 4 : Typed In By: Guardian Of Time : Inside An Atm Machine NIA FILE 10 : HOW TO USE PLEXAR NIA FILE 11 : VMS System Manager's Manual : Chapter 2.11 NIA FILE 12 : VMS System Manager's Manual : Chapter 2.11 NIA FILE 13 : VMS System Manager's Manual : Chapter 03.11 NIA FILE 14 : SPREADING THE DISEASE NIA FILE 15 : ZUC VIRUS NIA FILE 16 : USENET: BASICS NIA FILE 17 : COMPUTER CRIME: COMPUTER SECURITY TECHNIQUES : Section I -- Introduction NIA FILE 18 : Computers User's Guide/Protection of Information NIA FILE 19 : Management Guide/Protection Of Information NIA FILE 20 : Executive Guide/Protection Of Information NIA FILE 21 : Digest Message Format NIA FILE 22 : Frequently Asked Questions About UNIX NIA FILE 23 : Overview on Viruses & Threats NIA FILE 24 : Computer Viruses & Threats II NIA FILE 25 : Overview On Viruses & Threats III NIA FILE 26 : Computer Viruses & Threats IV NIA FILE 27 : VMS: System Manager's Manual : Chapter 4.11 NIA FILE 28 : COMPUTER SECURITY TECHNIQUES : Section II - Background NIA FILE 29 : VMS System Manager's Manual : Chapter 5.11 NIA FILE 30 : NAMBA VIRUS NIA FILE 31 : May '90 Busts I NIA FILE 32 : LOD/H BUST: AS BY 2600 MAG. NIA FILE 33 : UK Telephone System NIA FILE 34 : THE TRW CREDIT PROFILE REPORT NIA FILE 35 : Operation: SunDevil NIA FILE 36 : Credit Bureau Incorportated : Otherwise Known As CBI NIA FILE 37 : VMS SYSTEM MANAGER'S MANUAL : CHAPTER 6 NIA FILE 38 : VMS SYSTEM MANAGER'S MANUAL : CHAPTER 7 NIA FILE 39 : HACKERS OF THE WORLD, UNITE! NIA FILE 40 : Views Of Golstein: Operation Sundevil NIA FILE 41 : New Area Code 903 NIA FILE 42 : MPACT: Ordering Process NIA FILE 43 : Craig Neidorf On Trial NIA FILE 44 : Creating An Account On A VMS System NIA FILE 45 : CERT Advisory: SunView selection_svc Vulnerability NIA FILE 46 : Security Exposures and Controls for MVS NIA FILE 47 : Article Direct From The Wall Street Journal : Edition WEDNESDAY AUGUST 22, 1990. NIA FILE 48 : illinois Bell Employee Given Bribe NIA FILE 49 : BRIEF UPDATE ON SOME VMS COMMANDS: : SHOW USERS, SHOW SYSTEM, and STOP/ID= COMMANDS NIA FILE 50 : PART 1. Nootropic Drugs [Drugs That Make You Smart]... : PART 2. Portrait Of J Random Hacker (time for comparisons!)...... : PART 3. (censored)........... : PART 4. Some Thoughts.. : PART 5. BBS Software Review As Seen By SysOps..... : PART 6. Hellos, Congrats, and Respects To:... NIA FILE 51 : System Security Part 01 : Introduction: Types Of Computer Security Problems NIA FILE 52 : System Security Part 02 : Security For The User NIA FILE 53 : PyroTechnics I-IV NIA FILE 54 : City Codes for USSR NIA FILE 55 : Computer Network Gets Overseer : Houston Chronicle NIA FILE 56 : CERT Advisory: NeXT System Software NIA FILE 57 : The Network Thought Machine NIA FILE 58 : BILL OF INFORMATION RIGHTS II NIA FILE 59 : Making the NOVA Program by Cliff Stoll : Service Outage in N. Illinois NIA FILE 60 : Early Apple Phreaking Days NIA FILE 61 : Len Rose Arrested Again NIA FILE 62 : Buncha News NIA FILE 63 : SECTION III COMPUTER SECURITY CONTROLS AND THE LAW NIA FILE 64 : PTs Experience w/CLASS NIA FILE 65 : PBX Security NIA FILE 66 : CERT: VAX/VMS Break-Ins NIA FILE 67 : Network Thought Machine [3] & SNA Networks [1] NIA FILE 68 : 1. DECnet [01].........................Guardian Of Time 2. Unix: UUCP Files.........................Judge Dredd 3. VAX: Tekno DCS HELP [01].................Judge Dredd 4. HP: DBEDIT Manual....................Malefactor [OC] 5. *LONG* Surveilance Expo '90 Report.............Thalx 6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom T..... 7. Department Of The Army Field Manual [01].Death Jester 8. Comments From The Editors...................GOT & JD NIA FILE 69 : 1. The Future of the Internet.............Jane M. Fraser 2. Tekno DCS HELP [02].......................Judge Dredd 3. Computer Security Techniques [04]....Guardian Of Time 4. Kermit Manual [01]....................Malefactor [OC] 5. Department Of The Army Field Manual [02].Death Jester 6. World News Sept 1990-Jan 1991.Face 2 Face Publications 7. Comments From Editors........................JD & GOT NIA FILE 70 : 1. The First Conference On Computers, Freedom & Privacy. 2. DoD Trusted System Evaluation Criteria [01 of 02]. 3. Kermit Protocol Manual [02 of 02].....Malefactor [OC] 4. Social Engineering: A Way Of Life.....Malefactor [OC] 5. Unix Kerberos Manual........Doctor Dissector [PHA/P4] 6. A Basic Guide To Hacking Unix....Sir Hackalot [PHAZE] 7. Editor's Comments............................JD & GOT NIA FILE 71 : 1. Index ....................................NIA Editors 2. Analysis of the 4-wire Line - An Explanation ........ 3. Using the UK Academic Network PSS Gateway ........... 4. DoD Trusted System Evaluation Criteria [02/02] ....JD 5. List of Texas Internet Sites ............Lord Macduff 6. Steve Jackson Games vs. Secret Service..EFF Foundation 7. Editor's Comments ........................NIA Editors. NIA FILE 72 : 1. Index to NIA072 ...........................NIA Editors 2. The Renaissance of Hacking .............Mark Hittinger 3. The Hacker Manifesto ....................Erik Bloodaxe 4. Foiling the Cracker [Dept. of Defense]....Killing Joke 5. UNIX: JE Documentation ..............Terminal_Erection 6. Network Miscellany ....................Various Sources 7. CyberTimes (Vox Populi) [1/4] .............Judge Dredd 8. CyberTimes (Vox Populi) [2/4] .............Judge Dredd 9. CyberTimes (Vox Populi) [3/4] .............Judge Dredd 10. CyberTimes (Vox Populi) [4/4] .............Judge Dredd 11. Editor's Comments .........................NIA Editors NIA FILE 73 : 1. NIA073 Index .............................NIA Editors 2. Valley of the Nerds.......................Walter Kirn 3. Internet to Anywhere................Industrial Phreak 4. Globally Tymnet.............................Hi Fi Del 5. Report on Interexchange Carriers..............The FCC 6. Vox Populi: NIA News......................Judge Dredd 7. Hacking the HP3000 [Part I]................Malefactor 8. ** XmasCon '91 Announcement **............Santa Claus 9. Editor's Comments.........................NIA Editors NIA FILE 74 : 1. Introduction ..................................Editors 2. Security Probs in TCP/IP Suite [01/02] ..S.M. Bellovin 3. Security Probs in TCP/IP Suite [02/02] ..S.M. Bellovin 4. Firewalls: Design of Secure Internet Gateway Cheswick 5. Notes on Centigram Systems ..................Anonymous 6. How to Steal Information ...................The Butler 7. Killer Chips: Physical Virus..Jean-Bernard Condat [CCCF] ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Remember Where You Saw This Phile First ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄ[=] ARRESTED DEVELOPMENT +31.77.547477 The Netherlands [=]ÄÄÄÄÄÄÄ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ