It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.
▼ Sponsored Links ▼
▲ Sponsored Links ▲
Page 1 of 2

Outdated Computing · Article Entries

A Profile on Vaxs
Vax Systems Are Almost Always Unix Based. There Are Seven Diffent Versions Of Bell's Unix And Commands On Each Of Them Differ. Therefore This File Will Only Go Into Commands Common To Virtually All Un
Beginners guide to hacking VAX VMS
INTRODUCTION Perhaps the most exciting Operating system to HACK on is VAX/VMS. It offers many challenges for hackers and boasts one of the best security systems ever developed. In comparison to the s
Computer Based PBX
TO GET A BETTER UNDERSTANDING OF WHAT A PBX CAN DO, HERE ARE A FEW BASIC FUNDAMENTALS.THE MODERN PBX IS A COMBINED COMPUTER,MASS STORAGE DEVICE, AND OF COURSE A SWITCHING SYSTEM THAT CAN: [1] PRODUCE
DECWRL mail gateway
==Phrack Inc.== Volume Three, Issue 30, File #5 of 12 ()()()()()()()()()()()()()()()()()()() () () () The DECWRL Mail Gateway () () () () by Dedicated Link () () () () September 20, 1989 () () () ()()
Electromagnetic radiation from cables
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo frm 'the threat of information theft by reception of electromagnetic radiation from rs-232 cables.' computers and security, 9(1990) 53-58 (factor
Hacking VAXS VMS
L L O Lex Luthor O D and D $ The Legion Of Doom/Hackers $ L Present: L O HACKING VAX'S VMS O D D $LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$ L L O This file will list most default O D accounts/passwords, co
Hacking Vax's & Unix
Unix is a trademark of Att (and you know what that means) -------------------------------------------------------------------------------- In this article, we discuss the unix system that runs on the
Inside Vax/Vms
Advanced Telecommunications Inc. Note: The following is geared for the more advanvced hacker. Part 1: Using Command Procedures. You can use command procedures to automate sequences of commands that yo
Introduction to MIDNET
==Phrack Inc.== Volume Three, Issue 27, File 3 of 12 <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> Introduction to MIDNET <> <> ~~~~~~~~~~~~~~~~~~~~~~ <> <> Chapter Seven O
Introduction to telenet
Here are instructions for using TELENET. There are some very basic things, which most people already know, and some other things, which even the most dedicated hackers have probably never even heard o
Mail and news spoofing
Greetings and Salutations: This is addition to the most excellent: Net Abuse FAQ (posted to news.admin.net-abuse.misc, alt.current- events.net-abuse etc), brought to you by J.D. Falk
Skrewing with VAX VMS
VIII. Screwing with the most secure operating system on the net (VAX/VMS Hacking) WHAT IS VAX/VMS? VAX: Virtual Address eXtension. Computer is desisgned to use memory addresses beyond the actual hardw
Telenet
It seems that not many of you know that Telenet is connected to about 80 computer-networks in the world. No, I don't mean 80 nodes, but 80 networks with thousands of unprotected computers. When you ca
Telenet Directory
C 21365 C 21366 C 21370-XCC-WEST SYSTEM X2 C 21371-XCC-WEST SYSTEM X3 C 21372-XCC-WEST SYSTEM X3 C 21373-XCC-WEST SYSTEM X1 C 21375-XCC-WEST SYSTEM X2 C 21379-INTERACTIVE SYSTEM/ONE C 21384 C 21385 C
Telenet Information
[TELENET INFORMATION] [1]Directory Of System [2]Terminal ID's [3]Dialup Numbers [4]Hacking Telenet [5]Datapac/Telenet [6]Sales Offices [7]Access Via Telex [8]Intl Telenet(X.21) [-]PREVIOUS MENU Comman
Telenet The Secret Exposed
This really should be in a text file, but. i wish this information to be reserved for the few users on this system. before i start, here are a few basic commands to get famialir with: Execution syntax
Terminal Identifiers
The following tables matches Terminal numerical IDs (telenet parmater 23) Generic and Specific Terminal Identifiers. ID # Generic Term ID Terminal Type (note) ---- ------- ------- --------------------
The Basics of Hacking II: Vax's Unix
Unix is a trademark of bell labs (and you know what that means) Welcome to the basics of hacking ii: vax's and unix. In this article, we discuss the unix system that runs on the various vax systems. I
The making of a hacker
The Making Of A Hacker by Framstag of West Germany June 2, 1989 Prologue For None VMS Users DECnet is the network for DEC machines, in most cases you can say VAXes. DECnet allows you to do: - e-mail -
VAX Computer Systems
What's Hacking? A series by David Lightman SPECIAL ISSUE VAX COMPUTER SYSTEMS This is a requested discussion from Jolly Bardsman's Pub Tavern at (XXX) XXX-XXXX. If you have any requests, send me mail
Page 1 of 2
▼ Sponsored Links ▼
▲ Sponsored Links ▲