About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Phreak
Broadcast Technology
Computer Technology
Cryptography
Science & Technology
Space, Astronomy, NASA
Telecommunications
The Internet: Technology of Freedom
Viruses
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Cryptography References

David Kahn's book "The Code Breakers" is a classic. It covers the history of code breaking, emphasizing many of the breakthroughs made during World War II. It discusses the National Security Agency, our nation's main agency for doing such things, but the info is limited to 20 years ago. Times have changed!

James Bamford wrote "The Puzzle Palace," in the mid-80's about NSA. It includes comments from former employees and managers adding some sense of authenticity.

Those who'd like to hack with their computers should check out George Sassoon's "The Radio Hacker's Code Book." It's an excellent source of information about cipher types and their use on the radio. He gives lots of examples and some basic algorithms for analysis. This book is hard to come by, but it was last available from the Longwood Publishing Group, 27 S. Main Street, Wolfesboro, NH 03894. ISBN is 0-7156-2068-1.

------------

"The Radio Hacker's Code Book" used to be available through Gilfer Associates. I don't know if it still is, as they failed to send me a catalog this year.

------------

I seem to recall several books and even a play about Alan Turing's work during WWII. Turing was a particularly brilliant mind with an unfortunately twisted and tortured psyche. Perhaps he was the perfect paranoid type to work in codes and ciphers. No titles come to mind at the moment.

------------

Q: Where can I get a copy of The Puzzle Palace and a book called The Codebreakers? I understand they are very good crypto books and I have all of a sudden developed an interest in coding.

A: I think both books are still in print in paperback form. Take a look under history or current affairs sections in your local Waldenbooks or similar. And the library might be able to help you, too. Those of you who, like me, live in the boonies should ask the librarian about inter-library loans, too.

------------

Perhaps this doesn't belong here since it has nothing to do with Radio and only a little to do with Cryptography, but the book I am reading now is

The Cuckoo's Egg -- by Clifford Stoll

What an INTERESTING BOOK! Do yourself a favor and read it!!!

------------

AHA ! I finished The Cuckoo's Egg and realized why it should be here. Part of it deals with password decryption and NSA standards, and the bibliography recommends:

The Puzzle Palace by James Bamford

The Codebreakers by David Kahn

Deep Black by William E. Burrows (spy satellites)

Cryptography and Data Security by Dorothy Denning

Unix System Security by Wood and Kochan

Defending Secrets, Sharing Data, U.S. Congress Office of Technology Assessment, OTA-CIT-310.

------------

Did you see the guy who wrote Cuckoo's Egg when he was on whatever news show Connie Chung has??? This is one strange guy, left over from Woodstock or something. It's no wonder hat nobody believed him. BTW, I too loved the book.

------------

This material has been posted previously - but is a good basic introduction to "The Numbers" - so...

In response to recent questions about the "Numbers" Stations, their origin and purpose, the following summary captures the high points.

"Spy Numbers Transmissions" are a shortwave oddity which have been around for the last 25 years. They are commonly heard in English, German, Spanish and the Slavic languages and take the form of four and five digit groups of numbers which are preceded by a three digit "identifier" and a "group count" which corresponds to the number of number groups transmitted in the crypt. They are generally broadcast by a mechanical-sounding YL, although Morse code (CW) "cut number" transmissions are also frequently reported, as are phonetic alphabet transmissions. Several distinctly different formats have been noted.

The "who" and "why" aspects of these transmissions are, for the most part, unknown. Their mysterious nature has resulted in their common characterization as 'spy' transmissions. Information on the "where" aspects below.

The spy theory has been enhanced over the years by the FCC's inconsistent position in response to numerous inquiries by the Shortwave Listening community.

If you've never heard a numbers transmission, tune your radio to 11468 kHz any Saturday at 4pm EST (2100 UTC). You'll almost certainly hear a 'classic' numbers transmission which will run from 15-30 minutes. The signal from this Saturday transmission is very powerful and can be heard across the United States.

In regards the "where" - a number of sites have been identified in recent years, notably in Warrenton and Remington, VA and Miami, FL. In addition, with the aid of sophisticated RDF (radio direction finding) equipment and the invaluable assistance of highly authoritative and professional resources, several new transmission sites have been positively identified over the past several months, including sites in Nicaragua, Honduras, El Salvador, Cuba and Cozumel.

One particularly dangerous station has been interfering with air to ground traffic on 6577 kHz, a frequency allocated to international aeronautical communications in the busy Caribbean sector.

On at least one monitored transmission, the air traffic controller at ARINC moved the pilot to an alternate frequency as the numbers transmission was totally blocking the frequency from effective use. This regular transmission can be heard on Mondays at 0200 UTC (Sunday night local US time) across most of the US.

A recently identified Cuban site (Guineo) is believed to ba a major transmitter site used by DGI (Cuban Intelligence).

There has been some suggestion that the numbers are a form of 'one-time-pad' - a crude but unbreakable form of encryption (unless you've got the key, that is) - if that's the case, it's very curious to note that the same five-digit groups are often seen to repeat over and over again in the very same crypt - and that the same transmissions are seen to repeat from week to week, and from month to month - so often, in fact, that tape breaks are sometimes noted. When spliced back together, the sloppy handling sometimes results in truncated 5-digit groups - the end result being amixture of 4 and 5 digit groups in the very same transmission!

These facts would tend to point one away from the one-time-pad concept and support a couple of other theories - suggesting that the numbers are NOT a cipher, but rather a code unto themselves, and that much of this traffic is 'dummy' in nature - broadcast simply to keep a frequency open over a long period of time.

In addition, most five-digit Spanish numbers transmissions are very badly over-modulated, resulting in numerous spurs up and down frequency. When broadcast under such conditions, the numbers (6) seis and (7) siete are almost indistinguishable, making it impossible to copy a crypt without numerous errors.

It is worth noting that the four-digit Spanish and English transmissions do not reflect this same technical ineptitude.

There are a number of reference materials available which provide detailed information about cryptography and cryptanalysis, in general, and numbers crypts, specifically. I'd be happy to provide anyone interested with a list of books.

Only two publications I know of are currently available which provide regular coverage of numbers, clandestine, pirate and other interesting transmissions. The ACE Bulletin (monthly newsletter of the Association of Clandestine Enthusiasts - PO Box 11201, Department KK, Shawnee Mission, KS 66207 $16/yr) and the Umbra et Lux Newsletter (a newsletter devoted to SIGINT, covert radio and related topics - 10606-8 Camino Ruiz, Department KK, Suite 174, San Diego, CA 92126 $18/yr).

------------

For mathematically sophisticated readers, I can recommend "An Introduction to Cryptology," by Henk C.A. van Tilborg. (1988 ISBN 0-89838-271-8 GR.) It covers the following subjects:

Classical systems

Shift register sequences

Shannon theory

Huffman codes

Data Encryption Standard

Public Key Cryptography

Discrete Logarithm Problem

RSA

McEliece System

Knapsack problem

Threshold schemes

At $45.95 it isn't for everyone, but you order it from Kluwer Academic Publishers, 101 Philip Drice, Norwell MA 02061. (Tel 617- 871-6600)

------------

Codes, ciphers, one-time-pads, numbers transmissions, spy communications - they all conjure up intrigue and shadows. There's lots of information out there on this topic, and while much of it is behind tightly closed doors, passwords and layers of armed guards, much can be learned from books that aren't devoted entirely to the technicalities of the subject.

The following bibliography will provide anyone with an interest in this topic with an unusual mix of material. Some of the reference sources are technical and deal exclusively with cryptographic/cryptanalytic technique, while others provide insight into real-world situations/ applications of these techniques, and/or a historical perspective. While some of the titles referenced may seem to be off the topic, the careful reader will gain valuable insight from even those books which contain very little pure cryptographic material (marked with asterisks).

I have attempted to select books that can be read easily by the beginner, although many of them may be extremely difficult to locate. Inter-library loan might be of valuable assistance in this regard.

A word about my background - I spent several years in the military and US Intelligence community with specialties in telecommunications, traffic analysis, cryptography, cryptanalysis and counterintelligence. I've written a couple of books and hundreds of magazine articles using the pseudonym 'Havana Moon', which have dealt primarily with covert radio and 'spy' numbers transmissions. I prefer to maintain my anonymity for obvious reasons, and write on other subjects using another name.

------------

And ye shall know the truth, and the truth shall make you free. John, VIII: 32

Inscription on the main lobby wall of the CIA

------------

SELECTED READING LIST

A HISTORY OF CODES, William Friedman (Aegean Park Press)

ALAN TURING: THE ENIGMA, Andrew Hodges (Burnett Books)

AN INTRODUCTION TO CRYPTOLOGY, van Tilborg

*A WORLD OF SECRETS. THE USES AND LIMITS OF INTELLIGENCE, by Walter Laqueur (Basic Books)

*AGENCY OF FEAR, Edward Jay Epstein (McGraw-Hill)

AND I WAS THERE: PEARL HARBOR AND MIDWAY - BREAKING THE SECRETS, by Rear Admiral Edwin T. Layton, USN (Ret.) (William Morrow)

*ANTI-MATTER, by C. M. Stanbury (Dust Books) [This book borders on the lunatic fringe, but the careful reader will gain an interesting perspective].

BEYOND CLOAK AND DAGGER: INSIDE THE CIA, by Miles Copeland (Pinnacle Books)

BROKEN SEAL, by Ladislas Farago (Random House)

BURN AFTER READING, by Ladislas Farago (Pinnacle Books)

*CIA: THE INSIDE STORY, by Andrew Tully (Fawcett)

CLOAK AND CIPHER, by Dan Moore & Martha Waller (Bobbs-Merrill)

CODES AND CRYPTOGRAPHY, Dominic Welsh (Oxford Science Publishers)

CODES, CIPHERS AND COMPUTERS, by Bruce Bosworth (Hayden Books)

COMPUTER SIMULATION OF CLASSICAL SUBSTITUTION SYSTEMS, by Rudolph Lauer (Aegean Park Press)

CRYPTANALYSIS, by Helen Fouche Gaines (Dover Paperbacks)

CRYPTANALYSIS FOR MICRO COMPUTERS, by Caxton Foster (Hayden Books)

CRYPTOGRAPHY, by Laurence Smith (Dover Paperbacks)

CRYPTOGRAPHY AND DATA SECURITY, by Dorothy Denning (Addison-Wesley) [This is a highly technical book, included here with a word of caution to the novice].

CRYPTOGRAPHY: A PRIMER, by Alan G. Konheim (John Wiley)

CRYPTOLOGY: YESTERDAY, TODAY AND TOMORROW, C. Deavours, et. al (Reprints from Cryptologia, Volume I)

CRYPTOLOGY: MACHINES, HISTORY & METHODS, C. Deavours, et. al (Reprints from Cryptologia, Volume II)

DEADLY MAGIC, by Edward Van Der Rhoer (Scribners)

DEFENDING SECRETS, SHARING DATA, US Office of Technology Assessment

DEEP BLACK, William Burrows

DOUBLE-EDGED SECRETS, by W.J. Holmes (Naval Institute Press)

ELEMENTARY CRYPTANALYSIS, Math Association of America

ELEMENTS OF CRYPTANALYSIS, by William F. Friedman (Aegean Park Press)

EMBASSY RADIO COMMUNICATIONS HANDBOOK, by Michael Schaay (Universal Electronics)

ENIGMA, W. Kozaczuk, University Publications of America

*GERMAN MILITARY INTELLIGENCE, by Paul Leverkuehn (Weidenfeld & Nicol- son)

GREAT MYTHS OF WORLD WAR II, by Karl Roebling (Paragon Press/Dyna Press)

GUIDE TO EMBASSY AND ESPIONAGE COMMUNICATIONS, by Tom Kneitel (CRB Research)

*HITLER'S SPIES, by David Kahbn, Ph.D. (Macmillan)

*HOW TO TUNE THE SECRET SHORTWAVE SPECTRUM, by Harry Helms (TAB Books)

INSIDE THE AQUARIUM, by Viktor Suvorov (Macmillan)

KAHN ON CODES, David Kahn, Ph.D., (Macmillan)

LANGUAGE IDENTIFICATION TABLE, by N. Ingle (Technical Translation International)

MACHINE CRYPTOGRAPHY AND MODERN CRYPTANALYSIS, by C.A. Deavours and Louis Kruh (Artech House)

MILITARY CRYPTANALYTICS, Callimahos & Friedman (Aegean Park Press)

NORMAL AND REVERSE ENGLISH WORD LIST, by US Department of Commerce, National Technical Information Service)

PRINCIPLES OF MILITARY COMMUNICATIONS, by Don J. Torrieri (Artech House Books)

*SPYCATCHER, by Peter Wright (Dell Paperbacks)

STATISTICAL METHODS IN CRYPTANALYSIS, by Solomon Kullback, Ph.D. (Aegean Park Press)

*THE ANATOMY OF TWO TRAITORS, by Wayne Barker and Rodney Coffman (Aegean Park Press)

THE AMERICAN BLACK CHAMBER, Herbert O. Yardley, Bobbs-Merrill, 1931

*THE BIG SECRET, by William Poundstone (William Morrow)

*THE CIA AND THE US INTELLIGENCE SYSTEM, by Scott Breckinridge (Westview Press)

THE CODE BOOK, by Michael Marotta (Loompanics Unlimited)

THE CODEBREAKERS, by David Kahn, Ph.D. (Macmilllan)

*THE CRAFT OF INTELLIGENCE, by Allen Dulles (Harper & Rowe)

*THE CUBAN STORY, by Herbert Matthews (Braziller)

*THE CUCKOO'S EGG, Clifford Stoll (Doubleday)

*THE DOUBLE-CROSS SYSTEM, by J.C. Masterman (Yale University Press)

*THE GAME OF THE FOXES, by Ladislas Farago (McKay)

THE HUT SIX STORY, Gordon Welchman (McGraw-Hill)

THE NIGHT WATCH, by David Atlee Phillips (Atheneum)

THE PUZZLE PALACE, by James Bamford (2nd edition, Penguin Paperbacks)

THE RADIO HACKER'S CODE BOOK, George Sassoon (Longwood Publishing Group)

*THE SECRET WAR REPORT OF THE OSS, by Anthony Cave Brown (Berkley Medallion Press)

*THE TOP SECRET REGISTRY OF US GOVERNMENT RADIO FREQUENCIES, by Tom Kneitel (CRB Research)

*THE ULTRA AMERICAN: THE US ROLE IN BREAKING NAZI CODES" by Thomas Parrish (Stein & Day)

*THE ULTRA SECRET, by F.W. Winterbotham (Dell Paperbacks)

*THE ZIMMERMAN TELEGRAM, by Barbara Tuchman (Viking)

WAR SECRETS IN THE ETHER, by William Flicke (Aegean Park Press)

------------

The following organizations frequently publish material on cryptography/cryptanalysis, some of it quite expensive. I believe they all have catalogs available, so I've provided their addresses. A word of caution, many of the titles in the Loompanics Catalog are offbeat enough to cause one to rethink the right to freedom of expression and freedom of the press.

Loompanics Unlimited
PO Box 1197
Port Townsend, WA 98368

Aegean Park Press
PO Box 2387
Laguna Hills, CA 92654

American Cryptogram Association
18789 W. Hickory Street
Mundelein, IL 60060

For an excellent real world perspective on the use of cryptographic techniques, don't forget your shortwave radio.

------------

Footnote

The following publications provide fairly regular coverage of similar topics. Their inclusion in a comprehensive listing of reference material is important, but I wish to indicate clearly that I have an interest - and/or publish regularly - in many of these books/magazines/newsletters, and would hope that their inclusion here not be misconstrued as an attempt at solicitation.

. The Umbra et Lux Newsletter, published by DX/SWL Press, edited by Harry Helms - 10606-8 Camino Ruiz, Suite 174, San Diego, CA 92126 $18/year - $2.00/sample copy.

. The Numbers Factsheet, published quarterly by MoonBeam Press, compiled and edited by Havana Moon. PO Box 149, Briarcliff, NY 10510 $16/year domestic, $25/year international. $5.00/sample copy

. Popular Communications Magazine, 76 North Broadway, Hicksville, NY 11801

. The A*C*E Digest, PO Box 11201, Shawnee Mission, KS 66207 $16/year - $2.00/sample copy.

. UNO, DOS, CUATRO: A GUIDE TO THE SPY NUMBERS STATIONS, by Havana Moon, (Tiare Publications)

. LOS NUMEROS: THE NUMBERS STATIONS GUIDE, by Havana Moon, (Tiare Publications)

. LOS NUMEROS ON-LINE, a full-featured electronic shortwave magazine, with a dedicated "Crypto Vault"

------------

The ENIGMA cipher machine was used by the German armed forces during WWII. The history of its interception, and the breaking of the code have become legend, and a synopsis of that history will be found in the accompanying .DOC file. In July 1981, an article authored by Marian Rejewski appeared in "Annals of the History of Computing", a quarterly publication of AFIPS (American Federation of Information Publishing Societies, Inc.). Published with that article was a simulation program in BASIC language which illust- rated the operation of the ENIGMA. The program was authored by C.Deavours of the Math Dept., Kean College of NJ. Of course, that issue (vol 3, # 3) was copyrighted by AFIPS. The original program was modified, and was later translated to IBM/PC BASIC, by J.E.Eller, Va.Beach, VA. ENIGMA.EXE is the result of that history. All rights are reserved. Permission to use the original source material was granted by AFIPS, on condition that credit be given to the source, and that copying and distribution would not be used for direct commercial advantage. Therefore, this library of files, includ- ing ENIGMA.EXE, ENIGMA.DOC, and READ_ME.1st, may be distributed ONLY AS-IS without alteration or deletion, and may not be used in any commercial manner.

Enigma, Ultra, cyclometer, bombas, bombes, Bletchley, Banbury, Turing, .., .., . The list of names associated with the solution of the code is endless. There is certainly no intent to slight here the effort of any nation(s) or individual(s) by omitting them from this list. Indeed, there is equally no intention of extending this paper into the area, where angels fear to tread, of the several controversies which have arisen, as they always do around legends. Rather, the intent of this paper, and indeed this library of files, will be to present, on a very small scale, the Enigma as a device, and the technical factors involved in interceptions.

A few of those points WILL be simply mentioned now, to put the entire issue in perspective, by associating the legends.

1) The question of which nation took what part, at which stage, and under what constraints, in the monumental effort.

2) The relative impact of the project on the conduct or outcome of World War II, from "winning the war" to "incidental".

3) The often repeated, but unsubstantiated, questions surrounding the bombing of Coventry in 1940.

Actually, one controversy may be of interest in computer terms. It has been reported that Great Britain, which in 1943 developed the "world's first electronic computer" (referring, of course, to COLOSSUS, though even that title is disputable), did so as an outgrowth of the earlier (electromechanical) bombas and bombes, and applied it to the solution of Enigma traffic. This report has been questioned, on the grounds that the COLOSSI were used to attack the German Geheimschreibers (secret writers), more complex than the Enigma.

The origin during the 1920's, of the Engima as we know it was as a commercial device, sold to German industrial and business users, and indeed in the 1930's to other nationalities as well. Poland first became aware of the device about 1927, through a weekend incident in Polish Customs involving a shipment made in error to a German firm in Poland. Later, Poland openly purchased one from the German manufacturer. The effort more often attributed to the Poles was the capturing of a military version by the underground early in the war. In any event, several European nations, including Great Britain, Poland, and France were involved during the 1930's in deciphering messages using the Engima, with little cooperation, yet with considerable success. Indeed, an early, non-plugboard version was used in the Spanish Civil War. Of course, the military version differed in some respects, notably that the reflecting drum was immovable in it, but the point here is that the Enigma concept had been studied by the Allies long before 1939, the war's opening.

Physically, the external case of the original device resembled a portable typewriter, though the ratio of the length of its sides differed, being long and narrow. It contained a 26-letter keyboard with (flashlight-like) lamps in place of the typebars, a plug-type switchboard (which actually exchanged letter pairs), a battery for power, and, finally, its most important part, a shaft holding three drums (rotors), together with a fourth "reflecting" drum. On each drum was a ring, on which were engraved the 26 letters of the alphabet, and which could be rotated with respect to the rest of the drum. The center of each drum was an insulating disk, with 26 stationary contacts on one side connected irregularly to 26 spring contacts on the other side. The drums had toothed gears, to allow relative turning of one by the next one.

When a key was pressed, the rightmost drum rotated 1/26th of its circumference, and current flowed through the key, through the three drums to the reflecting drum, then back again through the three drums, through the plugboard, to light the proper lamp for the enciphered letter. As encipherment continued, each successive drum in turn rotated according to a plan much like an odometer. Actually, in certain positions, the second drum might rotate two positions for one complete rotation of the previous one, unlike an odometer.

As this description indicates, a number of factors influenced encipherment :

1) the connections of the drums, a factor of manufacture,

2) the daily key, including the setting of the rings, the order of the drums on the shaft, the plugboard settings, and others,

3) the message key, the name applied to the initial setting of the drums, with which the current message began.

It should be noted that, in early usage, the daily key was changed on a somewhat extended schedule (perhaps once each month for some). As the war progressed, they were changed with increasing frequency, until finally, it became apparent that the Germans suspected their traffic was being handled with some degree of success. As the war ended, a new cipher machine was being introduced on the line.

Clearly, the intent of such a device relies less on the device itself than on the management of its several factors. The Germans decided that each military message originator would randomly set his own message key, transmitting it in three enciphered characters at the beginning of each message. Because of the unreliability of military communications at that stage, they were transmitted twice in succession. Thus, the first six characters of each message were the message key, i.e. the initial settings of the drums.

To illustrate the complexity of the problem, the number of possible unique interconnection sets of enciphering drums is 26!, or 403,291,461,126,605,635,584,000,000 , and the number of unique reflecting drum connections is 7,905,853,580,025. However, from a practical point of view, all military machines would have the same set of connections, to insure universal military communications. This, then, is the importance of capturing a military unit, without the enemy's certain knowledge. Clearly, the replacement of ALL military units (estimated at 100,000 to 200,000) during the war, would be a monumental logistic task, to be avoided unless totally necessary.

Yet, even the keys presented no small problem. Each enciphering drum can be set 26 different ways. Even with only three drums, this means 17,576 possibilities. And, since their order on the shaft can be changed, the combination of the two yields 105,456 possibilities. Add to this the plugboard variations (the original 6 pairs of letters was later increased to 10 pairs, leaving only 6 self-steckers of the 26 letters), and the problem increases. Then, note that, as early as 1939, some parts of the German military used a selection of eight drums from which to draw their three, and the U-boats later used a 4-drum device. Each of these geometrically increased complexity.

The task at hand was statistically a gigantic one, but one which could be solved with sufficient resources, both mechanical and human. These were applied during the war in a number of locations, mostly in England ... from Alan Turing's organisation, with its statisticians and other specialists to "the girls" of Banbury, as they were known, the scores of young women who daily prepared the "Banbury sheets". These were laboriously punched forms of daily message traffic, from which repeat patterns were derived, using "weights of evidence". And, as history knows, it WAS solved, to the great benefit of the Allied war effort.

I sincerely hope that this writing, though perhaps too simple for those with an interest in cryptoanalysis, has provided you with some knowledge of the nature of the Engima, and the project which the British called Ultra.

The program included in this library illustrates the techniques described here. There are a number of papers and books on the subject for those who wish to pursue it, including the one from which part of this material was drawn. That article, which itself contains some bibliography, appeared in the Annals of the History of Computing, Vol 3, # 3, copyright July 1981, AFIPS (American Federation of Information Processing Societies).

------------

On page 110 of the Fall 19?? issue of Whole Earth Review, there is an article called "Clandestine Access" by Robert Horvitz. Numerous publications are reviewed including "The Ace", "Umbra et Lux", "The Numbers Factsheet" (all of which have published articles by Havana Moon) as well as "Pirate Pages", "Clandestine Radio Broadcasting", etc. etc.!! Interesting reading!

If you can't find Whole Earth Review, write to Box 38, Sausalito CA 94966.

------------

The Winter 1987 issue of the Whole Earth Review was known as the "Signal" issue and had a couple of articles of interest. Bob Horvitz wrote "An Intelligent Guide to Intelligence" which had a definitie radio bent, with sidebars on Foreign News Monitors and News via Radioteletype.

There was also an article called "H-Bomb Truck Watch: Citizen Intelligence Activism" about efforts to track DOE truck convoys between US Nuclear facilities. These convoys CAN be monitored on the HF bands.

This issue of WER was rereleased as a full-scale book in late 1988 or early 1989 and should still be available at your local bookstore.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Split Hard Drive???
computer crashed
Intel's Q6600
Unlock My Phone
opening a .iso file without writing it?
Closed Captioning Decoders
sharing broadband
where is most of my disk space being taken up?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS