It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.
▼ Sponsored Links ▼
▲ Sponsored Links ▲
Page 1 of 2

Outdated Computing · Article Entries

A Profile on Vaxs · Vax Systems Are Almost Always Unix Based. There Are Seven Diffent Versions Of Bell's Unix And Commands On Each Of Them Differ. Therefore This File Will Only Go Into Commands Common To Virtually All Unix And Vax'S. Hacking Vax's Are Indeed Very Hard,
Beginners guide to hacking VAX VMS · INTRODUCTION Perhaps the most exciting Operating system to HACK on is VAX/VMS. It offers many challenges for hackers and boasts one of the best security systems ever developed. In comparison to the security on UNIX, VMS is far superior in every resp
Computer Based PBX · TO GET A BETTER UNDERSTANDING OF WHAT A PBX CAN DO, HERE ARE A FEW BASIC FUNDAMENTALS.THE MODERN PBX IS A COMBINED COMPUTER,MASS STORAGE DEVICE, AND OF COURSE A SWITCHING SYSTEM THAT CAN: [1] PRODUCE ITEMIZED,AUTOMATED BILLING PROCEDURES,TO ALLOW THE
DECWRL mail gateway · ==Phrack Inc.== Volume Three, Issue 30, File #5 of 12 ()()()()()()()()()()()()()()()()()()() () () () The DECWRL Mail Gateway () () () () by Dedicated Link () () () () September 20, 1989 () () () ()()()()()()()()()()()()()()()()()()() INTRODUCTION D
Electromagnetic radiation from cables · Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo frm 'the threat of information theft by reception of electromagnetic radiation from rs-232 cables.' computers and security, 9(1990) 53-58 (factors effecting reception are grounding/coupling, data
Hacking VAXS VMS · L L O Lex Luthor O D and D $ The Legion Of Doom/Hackers $ L Present: L O HACKING VAX'S VMS O D D $LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$ L L O This file will list most default O D accounts/passwords, commands for D $ non-privileged accts and commands $
Hacking Vax's & Unix · Unix is a trademark of Att (and you know what that means) -------------------------------------------------------------------------------- In this article, we discuss the unix system that runs on the various vax systems. If you are on another unix-ty
Inside Vax/Vms · Advanced Telecommunications Inc. Note: The following is geared for the more advanvced hacker. Part 1: Using Command Procedures. You can use command procedures to automate sequences of commands that you use quite often. For example, if you always use
Introduction to MIDNET · ==Phrack Inc.== Volume Three, Issue 27, File 3 of 12 <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> Introduction to MIDNET <> <> ~~~~~~~~~~~~~~~~~~~~~~ <> <> Chapter Seven Of The Future Transcendent Saga <> <> <> <> A More
Introduction to telenet · Here are instructions for using TELENET. There are some very basic things, which most people already know, and some other things, which even the most dedicated hackers have probably never even heard of. This includes things such as international acce
Mail and news spoofing · Greetings and Salutations: This is addition to the most excellent: Net Abuse FAQ (posted to news.admin.net-abuse.misc, alt.current- events.net-abuse etc), brought to you by J.D. Falk : http://www.cybernothing.org/faqs/net-ab
Skrewing with VAX VMS · VIII. Screwing with the most secure operating system on the net (VAX/VMS Hacking) WHAT IS VAX/VMS? VAX: Virtual Address eXtension. Computer is desisgned to use memory addresses beyond the actual hardware and can therefore run progs larger than physic
Telenet · It seems that not many of you know that Telenet is connected to about 80 computer-networks in the world. No, I don't mean 80 nodes, but 80 networks with thousands of unprotected computers. When you call your local Telenet- gateway, you can only call
Telenet Directory · C 21365 C 21366 C 21370-XCC-WEST SYSTEM X2 C 21371-XCC-WEST SYSTEM X3 C 21372-XCC-WEST SYSTEM X3 C 21373-XCC-WEST SYSTEM X1 C 21375-XCC-WEST SYSTEM X2 C 21379-INTERACTIVE SYSTEM/ONE C 21384 C 21385 C 21386-IAS PROGRAM DEVELOPMENT SYSTEM C 21388 C 213
Telenet Information · [TELENET INFORMATION] [1]Directory Of System [2]Terminal ID's [3]Dialup Numbers [4]Hacking Telenet [5]Datapac/Telenet [6]Sales Offices [7]Access Via Telex [8]Intl Telenet(X.21) [-]PREVIOUS MENU Command: 2 ==)--- P TO PAUSE S TO STOP ---(== TELENET T
Telenet The Secret Exposed · This really should be in a text file, but. i wish this information to be reserved for the few users on this system. before i start, here are a few basic commands to get famialir with: Execution syntax of command function -----------------------------
Terminal Identifiers · The following tables matches Terminal numerical IDs (telenet parmater 23) Generic and Specific Terminal Identifiers. ID # Generic Term ID Terminal Type (note) ---- ------- ------- --------------------------- 0 Unknown or Synch. Host 1 B1 AJ63 Anderso
The Basics of Hacking II: Vax's Unix · Unix is a trademark of bell labs (and you know what that means) Welcome to the basics of hacking ii: vax's and unix. In this article, we discuss the unix system that runs on the various vax systems. If you are on another unix-type system, some comman
The making of a hacker · The Making Of A Hacker by Framstag of West Germany June 2, 1989 Prologue For None VMS Users DECnet is the network for DEC machines, in most cases you can say VAXes. DECnet allows you to do: - e-mail - file transfer - remote login - remote command - r
VAX Computer Systems · What's Hacking? A series by David Lightman SPECIAL ISSUE VAX COMPUTER SYSTEMS This is a requested discussion from Jolly Bardsman's Pub Tavern at (XXX) XXX-XXXX. If you have any requests, send me mail at any address listed below: USENET: bdunn@attctc
Page 1 of 2
▼ Sponsored Links ▼
▲ Sponsored Links ▲
Donate Today