Zen & the Art of Internet"> Zen & the Art of Internet">
 
About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Understanding the Internet


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

"The largest problem people face when first using a network is grasping all that's available. Even seasoned users find themselves surprised when they discover a new service or feature that they'd never known even existed. Once acquainted with the terminology and sufficiently comfortable with making occasional mistakes, the learning process will drastically speed up."

-- Brendan P. Kehoe, Zen & the Art of Internet

An Introduction to Internet Protocols by Charles L. Hedrick
 An introduction to TCP/IP
An introduction to denial of service attacks
Anonymous FTP FAQ by Perry Rovers
 This document gives answers to some Frequently Asked Questions about Anonymous FTP.
BellSouth Security Issue #1 by protonigger
 Corporate ignorance on a dangerous scale, to put it simply.
Blocking Unwanted Ads From Websites by White Taipan
 Are you tired of going to your favorite websites only to see banners at the top, and boxes on the sides? Tired of seeing those ads flashing their bright colors and moving objects? This is most likely the easiest way to rid yourself of these nuisances. The best part is you don't need to download anything.
Country Codes for the Internet
 Here are the official country codes.
Cracking XXX Sites by protonigger
 ...and never again have to pay to masturbate
Disabling Filters and Firewalls by TbPlayer
 How to turn off filtering for internet.
Economic FAQ about the Internet from 1994 by Jeffrey K. MacKie-Mason and Hal Varian
 This is a set of Frequently Asked Questions (and answers) about the economic, institutional, and technological structure of the Internet. We describe the current state of the Internet, discuss some of the pressing economic and regulatory problems, and speculate about future developments.
Email Spoofing by Spl1t
 How to use email servers to send fake messages to other people.
Gazing at Computer Security with 2020 Vision by Dan Farmer
 Many people think of computer security as something arcane and complex, that has little or nothing to do with their own lives. That could be argued as true in today's society; over the next twenty years however, there will be significant differences in how we interact with and depend on computers. These changes will transform both our reliance on as well as our understanding of computer security; even those who don't directly use computers (a vanishing minority in the United States) will be profoundly affected.
Government Owned Proxies List by White Taipan
 When using a proxy server, many people will simply go to a website that has a database, pick out one that works, and then go about their business. What they don't know is that there are thousands of proxies out there which are run by the United States government. Using these proxies will reveal your true IP to “big brother.” All of the proxies listed are being constantly monitored by the government. This list is not meant to scare, but to inform.
Hacking Flash Games by AllStar
 Ever wanted to be #1 on sites such as miniclip.com?
Hacking Hotmail by -@OsiriS@-
 Hacking Hotmail using a cookie attack.
Hacking U.S. Government Computers from Overseas
 Foreign-based hacker groups working via the Internet have had substantial success breaking into U.S. Government and defense contractor computer systems holding sensitive but not classified information. There is one publicly known case in which computer break-ins from overseas were sponsored by a foreign intelligence service.
Hiding Crimes in Cyberspace by Dorothy E. Denning and William E. Baugh, Jr.
 We address here the use of encryption and other information technologies to hide criminal activities. We first examine encryption and the options available to law enforcement for dealing with it. Next we discuss a variety of other tools for concealing information: passwords, digital compression, steganography, remote storage, and audit disabling. Finally we discuss tools for hiding crimes through anonymity: anonymous remailers, anonymous digital cash, computer penetration and looping, cellular phone cloning, and cellular phone cards.
How to Bypass Censorware by ssokolow
 For those who are new to this, a standard proxy server works only because all of the filtered browsers are told to connect through it. This is a relatively easy setup to evade.
How to Evade Blacklists at School (and Work!) by Codeboy105
 Here is how to evade your stupid school blacklist. Get on any site you want - and they wont know anything about it.
How to Get a Hotmail Password by Encrypted_Error
 A file covering A LOT of methods of GETTING a hotmail password! (Not all are hacking). Covers all the methods I can think of (21, but some are ridiculous)and has other random misc. info that might help.
ICML Common Object Element Types by IC Sub-Working Group
 The column headings of this table have the following meanings: Name: The identifier of a specific element type. Must be unique within the class of documents defined by a DTD or schema. It is the tag name.
ICML Technical Addendum by IC Metadata Sub-Working Group
 This Technical Addendum is provided to supplement the evaluators of ICML v0.5 during their evaluation. It covers some background material and documents some of the research and perspectives that affected key decisions made in the ICML development. This addendum along with the release notes will be expanded in the future to become formal ICML documentation.
Information about a TCP wrapper
Intelligence Community Markup Language (ICML) Release Notes by IC Metadata Sub-Working Group
 The first focus of ICML is to aid finished intelligence production. Since a majority of the intelligence content being produced within the IC takes the form of documents, it was felt by the MSWG that limiting the scope of the initial ICML release to this type of intelligence content would yield the most benefits in the shortest period of time. The ICML standard as written is incorporates key writing styles, metadata, and structure requirements of typical IC products.
Internet Host Table (large)
On Distributed Communications: Security, Secrecy, and Tamper-Free Considerations by Paul Baran
 Discussions of the problems of security and secrecy with regard to military electronics equipment are more often found only in highly classified documents. Without the freedom to expose the system proposal to widespread scrutiny' by clever minds of diverse interests, is to increase the risk that significant points of potential weakness have been overlooked. A frank and open discussion here is to our advantage.
Online History... How to Retrieve it When it's Not There! by SomeEverydayNobody
 This is a good way to prove someone a shit bag for whatever reasons you may have!
Setting Up An Anonymous Proxy For Your Browser by White Taipan
 How do I setup a proxy to browse the internet anoynmously? This depends on your browser. I will explain how to setup proxies with the two most common browsers.
TAKEDOWN: Targets, Tools, & Technocracy by Robert David Steele
 Everything we are doing today, from the PCCIP to the Information Operations activity at Fort Meade, to the billions of dollars being spent on the current and planned force structure, is out of touch with the reality that pioneers--Alvin Toffler, Martin Libicki, Winn Schwartau--have been trying to articulate. It is out of touch with the reality that Eric Bloodaxe, Emmanuel, Phiber Optic, Dark Angel, Andy Mueller-Maguhn and many, many others have been actively demonstrating.
The "stacheldraht" Distributed Denial of Service Attack Tool by David Dittrich
 Stacheldraht (German for "barbed wire") combines features of the "trinoo" distributed denial of service tool, with those of the original TFN, and adds encryption of communication between the attacker and stacheldraht masters and automated update of the agents.
The Total N00bs Guide to IRC by Naterd00d
 This is a guide to using IRC for people who have never ever used it... to download that is... so i wrote an article on how to do it.
Understanding NetBIOS by NeonSurge
 NetBIOS (Network Basic Input/Output System) was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. Since its creation, NetBIOS has become the basis for many other networking applications. In its strictest sense, NetBIOS is an interface specification for acessing networking services.
Unfiltered Internet Through a Filter by system_glitch
 How to get Internet access from behind a filter, such as Novell BorderManager.
WebCracking
 A short document explaining webcracking and showing you how to hack and web based account whether it be E-mail or a Website.
Why Am I Getting All This Spam? by Center for Democracy and Technology
 Every day, millions of people receive dozens of unsolicited commercial e-mails (UCE), known popularly as "spam." This has led many Internet users to wonder: How did these people get my e-mail address?
Zen & the Art of Internet by Brendan P. Kehoe
 We are truly in an information society. Now more than ever, moving vast amounts of information quickly across great distances is one of our most pressing needs.
 
This page Copyright © 1997-2006 totse.com.
 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
What am I doing wrong?
Compaq laptop goes blank on boot? Ubuntu 7.04
Debian Wireless
Torrents on linux?
Another noob can't connect to the net....
So tell me again...why use a *NIX?
Making my backspace key work...
ubuntu problem switching resolution
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS