2600 Subject Index Volumes 1 - 10

 

Indexed by 

David Price

Assoc Professor, Anthropology

St. Martin's College

dprice@stmartin.edu

 

10698                                       7(1):30 (L)

(201)                                        6(2):20

202 bug,                                    3(9):65

2600 Magazine                          2(8):51, 4(12):3

2600 meetings                           10(2):17, 10(2):16, 10(4):35, 7(1):38, 10(3):18

2600 voice bbs                          9(3):40 (L)

2600--BBS                                2(2):9

2600--BBS Bust                        2(8):49

2600--purpose of magazine        1(1):1

4ESS                                        7(4):28 (L)

4TEL, loop testing, COLTs        6(3):20

5ESS switch, DMERT, RC Channel, Test Channel         10(2):4, 8(4):45  8(4):45, 

#5 crossbar                               6(2):26, 

(516)                                          5(3):14

*69, Return Call, Call Trace, Ultra Forward        9(2):31,  

(707)                                        7(1):44

800 DTMF recognition (L)         3(12):92

800 tariffs (L)                            2(1):4

800s                                         2(6):37

800s, 800 carriers, 800 translation table, 900 translation table, Glossary      6(1):12

8038 chip (L)                            4(12):22

8038 chip (L)                            4(10):12

900s                                         2(11):79

911                                           1(10):57

911,  PSAP, SCC                       7(1):37

976 scam, ATMs                        4(7):8

976 social interactions                 4(12):17

9999-suffixes                              1(1):4

Abbie Hoffman Obit                   6(2):3

access (L)                                  3(11):84

ACD, Automatic Call Distributor  9(3):28 (L)

ACM SIGSOFT (L)                    4(11):13

Acronym Maker (L)                   4(1):13

Acronyms                                 10(1):34

Acronyms                                 10(2):20

acronyms                                   2(2):11

Acronyms                                10(3):44

ADS                                         1(9):53

ADS (IBM's Audio Distribution System),            1(5):2

ADS--Investigation                    1(2):9

Allah Akbar!                             3(11):86

Allnet   5(2):2

Allnet, pyramid scheme  4(6):4

American Express--hacking,      3(3):17

AmiExpress--hacking    9(3):4

ANAC Guide    7(3):39

ANI Hunting (L)           4(1):18

ANI patterns (L)           3(11):84

ANSI Bomb      10(2):44

Answer supervision, billing signals          3(9):65

anti-hacking views         7(2):11

Approaching Zero Book Review            10(3):38

ARAPANet      1(6):1

Area Code Expansion    1(3):3

ARPANet military subnet,         1(3):5

Arpanet, Bitnet, UUCP, JANET            4(9):4

AT&T Break-up           1(6):4

AT&T Breakup,            2(11):74

AT&T failure, AT&T Shutdown            6(4):4

AT&T Strike    1(4):1

AT&T Thought Police   2(11):79

ATM III (L)     4(6):12

ATMs  1(4):3

ATMs, Book Reviews   4(2):21

Atomic Bomb    1(3):4

ATT Adresses for CT,DL,DC,MN,MD,NH,NJ,  9(4):36

Australian phone system            9(1):31

AUTOVON     3(5):37

Autovon (L)      4(6):18

AUTOVON, Boxes--Silver, DCS           3(3):17

AUTOVON, CONSUS 6(1):7

AUTOVON, U.S. Military Telephone Network,  9(4):19

Baby Bells        1(7):3

Back doors, TOPS-10, TOPS-20, UNIX, VMS   2(1):2

BASIC 3(1):5

BASIC dialer program, dialers    5(1):20

basic phreaking Q & A  6(2):29 (L)

BASIC Red Box Tones 5(3):22

basic terms (L)  4(5):13

BBS Disclaimers (L)     4(7):12

BBS Disclaimers (L)     4(10):16

bbs list  2(12):85

BBS--Government         10(2):39

BBS--Protecting a User Log (L)            3(2):16

beepers (L)       4(11):12

Bellco cops       5(1):22

Bellcore Publications     3(5):36

"Best Boast, ""Terac"", Military Computers"        5(1):24 (L)

Big Brother       3(12):91

big brother, fax taps       9(1):42

BIN list 8(2):31

BITnet  2(1):6

BLV (Busy Line Verification     5(3):27 (L)

BLV (Busy Line Verification)    8(4):42

BLV (Busy Live Verification), Verification, Emergency Interupts, VFY   4(12):10

Bogus Tap-Check Number Myth (L)      4(2):13

Book Review, Computure Lore  9(2):40

Book Review, Covert Radio Broadcasts, Black Band      4(11):7

Book Review, radio spectrum scanning   5(4):45

Book Review--Cyberpunk          8(2):42

Book Review--Nothing New in Computer Underground   3(6):42

Book Review--Out of the Inner Circle    2(6):34

Book Review--The Rise of the Computer State, Big Brother        1(8):44

Box--Beige, lineman's handset    10(1):14

Box--Blue (notes) (L)    3(2):12

Box--Clear Box 1(7):4

Box--green       7(1):29  (L)

box--red box     10(2):42

Box--red, 6.5536           7(3):32

Box--Red, DTMF dialers           8(3):43

Box--Silver in U.K.       7(1):19

Box--Silver, 16--tones,   6(4):20

Box--Silver, Box--silver box key guide    9(1):16

Boxes, General Info, Beige, Nlue, Green, Rainbow, Red, Silver, White, Yellow      10(3):9

Boxes--Blue      2(10):69

Boxes--Blue      9(4):33

Boxes--Blue, CCIS, In-Band Signaling, Pink Noise          2(2):7

Boxes--Blue--non-standard numbers (L) 3(5):36

Boxes--Red      5(2):13

Boxes--Silver(L)           1(11):64

Boxes--White, keypads  2(4):19

braille computer 3(12):95

British Payphones (L)    4(10):17

bust      4(3):18

busted (L)         4(7):18

busted--tale 'o woe        6(2):26 (L)

Busting Phreaks, Covering tracks, Smart Phreaking, MCI 800 exchanges, US Sprint 800 exchanges, 800 Western Unio      4(7):6

busts     2(5):27,  1(7):7,  3(12):91, 2(2):9

busts & court hassles, Neidorf, Phrack   8(4):36

Busts,   1(10):55

Busts, jail, Phiber Optik  10(4):4

busts, media hype, Dutch hackers           8(3):4

busts, Neidorf, spying on 2600, psychobabble       7(3):44

busts, paranoia  8(2):4

Busts, Raids...see busts 4(8):3

busts, thought police       8(4):8

Busy--”fast busy tones" 5(2):27 (L)

      --busy verification (L) 3(10):80

Cable descrambling       10(1):16

Cable TV          3(8):63

Call Forwarding, Diverting         2(10):65

Call-Waiting Phone Tap 6(3):27

Callback Verification     9(3):9

Calling Cards    1(4):3

Calling Cards    1(6):3

Calling Cards, Credit Card Phones          1(1):3

Calling Cards--AT&T    1(2):9

Can-jumping (L)            3(10):76

Canning, boxes--beige    5(4):42

"Captain Crunch, ""poetry"","      4(3):4

Captain Midnight (L)     3(9):68

Captain Zap's Sins         5(2):24 (L)

Carrier Access Codes   6(3):42

CCCP  3(3):23

CCIS (L)          4(11):12

CCITT, Phreaking Overview, DTMF Overview  9(2):10

CD-ROM         3(12):95

Cell Frequencies            4(1):10

cell phones        2(11):79

cell phones        5(3):8

Cellular biopsy, ESN      10(4):6

Cellular Fraud Bust, Electronic Communications Privacy Act       4(4):8

cellular hacking, ESN, SAT, cellular frequencies  10(1):4

Cellular Modem 3(5):35

Cellular monitoring (L)   4(7):13

Cellular Phone Fraud, ESN, MIN           4(7):4

Cellular phones, MTSO, IMTS   3(12):89

Cellular Phones--History            3(11):90

cellular phreaking (L)     4(2):13

Cellular Phreaking,        4(2):8

Cellular Phreaking, ESN's on Cell Phones, CID--and Cell Phones 10(3):42

Central Offices, Switches, Cable Vaults, Frame Room, 1ESS, Interoffice Signalling, call tracing, traces      7(4):12

Chaos Computer Club, German Hackers 5(4):34

China    3(8):63

Chinese dial-a-narc        6(2):35

CIA, Thought Police      1(12):68

CID      3(12):91

CID, 540s, COCOTS, Stasi, Prodigy's STAGE.DAT       8(1):19

CID, Caller ID  9(2):18

CID, Caller ID, ICLID  7(3):5

CID, Caller ID, SS7,      10(3):12

Class Features, *features           8(4):31

CLASS, CND, CID       8(2):22

Cliff Stoll, Mark Hess,   7(1):45

CLLI Codes (Common Language Location Identifer), Central Office IDs 4(10):14

CN/A (L)         3(9):72

CNA (L), CPA-1000 (L)           4(8):12

CNA--Lists       4(4):10

CNAs   2(3):18

CO Magazine, Reviews,            4(9):22

CO, Social Engineering  2(3):14

COCOT numbers          8(3):22

COCOT tricks (L)         7(3):27 (L)

COCOTS         6(4)27 (L)

COCOTS         7(2):20

COCOTs          7(4):27 (L)

COCOTs (L)    8(2):28 (L)

COCOTS (L)    8(3):25

COCOTS, Box--combo box, Box--red box          9(3):13

COCOTs--database list, COCOT--refund letters 8(4):33

Codes, Ciphers, Encription, Cryptography            9(4):6

coin boxes, unassigned area codes, AOS 5(3):10

coin-test number (L)      4(4):20

commentary, paranoia at large    2(8):50

Communications Fraud Control Assoc    7(4):43

competition       6(3):3

Compuserve      3(10):75

Computel          2(3):15

Computel scam (L)        3(2):12

Computel scam, Kranyak,Jack   4(4):4

Computel, Kranyak,Jack            3(5):34

Computer confiscation, law enforcement--confiscation     2(8):54

computer shows            10(4):16

Computer threat            1(6):3

Conferences,     10(3):4

Congress--Paranoia,      10(3):4

cop watching     9(1):7

Cordless Phones            1(1):3

Cornwall,Hugo  ,  Hacker's Handbook, British Hacking    4(2):4

corrections        7(4):25

Corvis hacking (L)         4(11):12

COSMOS,        2(2):8

COSMOS, COSMOS demise     6(3):13

COSMOS, COSMOS--Documentation, COSNIX Operating System        4(2):6

COSMOS, COSMOS--History, COSMOS--abbreviations            4(3):10

COSMOS, Transaction Codes    2(12):82

Country Codes  1(2):10

country codes    3(7):53

Court News      3(4):27

Court News      2(4):21

Court News      1(4):3

Court News      1(6):3

Court News, Wiretaps--Legalities           1(5):3

Court Report     1(5):3

Credit Card Alogrithms  7(3):42

Credit files, TRW          10(1):42

Cross-Bar Oddities (L)  3(3):20

Crypt() Source Code, Crypt       8(4):11

current events   3(3):22

DAST, Direct Analog Storage Technology, tone catcher  10(4):22

Data transmission--quality          3(9):71

DEC-20--hacking          2(7):41

Defense Data Network Listing   1(5):4

Denning--Dorthy, busts, security, witch hunts      7(3):10

Department of Justice, FBI, Busts, Phrack, Wire Taps     9(2):22

Deregulation     1(7):3

Dial Back Security,        3(2):10

Dialed Number Recorder--see DNR, DNR, thought police           7(3):16

Dialer--Demon, Hack-Tic, Box--Rainbow           9(2):15

dialing * on rotary phones           3(12):96

dialup numbers  4(8):6

digital lock combinations 10(4):38

Directories        2(5):27

directories         3(12):95

Directory Assistance--Usage Fees         1(2):9

Divestiture        3(1):1

DMS 100(L), ESS Bust methods(L), World's Most Evil Operator(L)        1(7):3

DNIC, Data Network ID Codes 7(1):40

DoD     3(3):19

DSS1, ISDN,    10(3):36

DTMF Decoder            7(1):14

DTMF Decoder            10(2):14

Dumpster Diving, Garbage Picking         1(2):10

dumpster diving, trashing            2(2):8

Dumpster Diving, Trashing         1(9):50

E-Card, 959 Numbers    4(5):8

E-COM            1(6):5

E-COM (USPS Mail System)    1(6):3

E-Mail, 1(12):68

EASYnet, INSPECT, security    8(2):18

Electronic Freedom Foundation  7(2):10

Electronic Privacy At, FCC, Cell Phones            4(6):8

email systems    1(12):71

encryption         3(4):31

encryption         2(1):3

equal access (L)            4(5):17

equal access, carrier hopping      4(3):6

Equal Access, Direct Dialing      4(3):8

errata for 4(9)   4(10):18

espionage          2(3):15

ESS      3(10):79

ESS, Electronic  Switching System, Call Records (ESS), Call Traces (ESS)          1(2):8

ESS, Switches   1(6):2

ESS--Blue boxes           6(1):25 (L)

ESS--History, TSPS      2(11):74

essay    2(12):81

Essay   1(12):67

essays  7(4):32

European Phone Systems           4(5):9

Exchanges        3(8):62

Falwell  5(2):39

Falwell, Jerry    5(1):25

Falwell, Jerry    3(1):3

Farrell's Ice Cream Covered Narcs        1(8):45

FAX     4(5):14

FBI      3(11):83

FBI      3(10):75

FBI      3(9):67

FBI      1(11):63

FBI, ADS, IBM            1(1):2

FBI, Reviews    4(8):9

FBI--Raids, GTE--Telemail        1(1):3

FCC     3(9):71

FCC     1(6):3

Feds, Secret Service, Narcs       9(2):38

fiber-optics laid along rails (L)    3(6):48

finger monitor program  9(1):35

Fingerprints       3(12):95

FM Wireless Transmitter           8(4):44

fortress fones, payphones--punching       6(3):37

France  2(12):83

gangs,   7(4):36

GEISCO           2(1):3

general phone rants       4(1):20

Germany           2(12):87

Gore, Albert      5(1):26 (L)

Grades, Hacking School Records            10(3):34

GTD#5,            2(11):73

GTE Telcos      6(3):33

Gulf War Printer Virus, Virus--Gulf War            8(4):39

Hacker Con      6(3):10

Hacker Morality            2(6):34

Hacker Sourcebooks (L)            1(11):64

hacker study     10(1):38

hacker video, ftp tricks   8(3):14

Hacker's Handbook       4(2):15

Hackers Creedo, Information Manipulation         9(4):17

hackers in hiding (L)      8(3):24

hacking beginnings         9(3):42

Hacking credos, motivation--hackers      1(3):1

Hacking grades, UAPC 6(4):45

hacking hints, passwords--common, VMS--common accounts, VAX--common accounts, UNIX--common accounts,           9(3):31

hacking history, boxes    5(1):16

hacking lore      8(4):16

Hacking Paranoia          1(7):1

hacking reading list, product list, resource list       7(4):6

Hacking Recycling Machines     1(2):9

HBO    3(10):75

High School hacking--news        1(3):3

History--Phreaking UK  1(9):49

Holland's hackers          2(4):21

Home Monitoring          1(4):2

Honesty Tests   10(3):20

HP2000--Hacking         2(3):20

Human database centers            8(4):46

Humerous Defense against telco threats (L)       2(2):10

I've fallen and I can't get up       3(9):67

IC, CIC (Carrier Identification Codes)    1(11):65

ICN, WATS,     3(11):81

IMAS, 97*s, GBS          4(10):4

India     3(9):67

Infinity Transmitter, harmonica bug, wiretap        2(9):58

Intelpost            1(5):3

Internet Dialups 10(4):32

Internet Worm  5(4):4

INTERNET Worm, worm         6(3):39

Intro to hacking 2(6):40

IRS      3(2):15

IRS      3(10):79

IRS      2(1):3

IRS      2(3):15

IRS      2(6):35

Israel, Phone Directies of the world        4(4):16

Israel--phone system     2(6):33

Italian hackers,  4(12):18

ITT 2100 switch (L)      4(7):12

ITT--Boxing, Boxes--Blue         3(5):38

Jackson--Steve  10(2):45

Kenya  2(3):15

Kevin Mitnick, Herbert Zinn, busts, PHRACK, Craig Neidorf, Phoenix Project,    7(1):3

Kevin Mitnick, Herbert Zinn, hacker busts          6(1):3

Kevin Mitnick, Robert Morris, viri, privacy          6(3):14

Kiev     3(6):47

KKK, Racist BBS systems        2(1):3

Landreth,Bill (L)            4(9):12

Laptop Tone Generation, Speach Thing: Product Review 9(4):45

Laptops            1(2):9

Laptops, Mobile Hacking, Couplers         9(2):4

LASS System, CLASS System, CCIS,    4(5):6

LD Carriers, equal access          4(12):20

LD Fees           1(5):3

LEC, ISDN, SWITCH, acronyms           8(1):42

Legalistic Bantor (L)     2(1):4

Letters  9(2):24

Letters  9(4):26

LODCOM compilation review,   10(3):19

Loop number patterns (L)          4(1):12

magnetic card tricks      9(1):27

magnetic strip tricks (L) 8(4):40 (L)

magnetic strips, magnetic cards structure, card copiers    8(2):7

mail drops         7(3):29 (L)

Marcos 3(4):27

Marquee, hacking          3(3):19

MCi Mail, Western Union EasyLink       1(12):67

MCI Mail--Hacking,      1(7):2

MCI Numbers   1(4):5

MCI scam        5(4):10

MCI, dial a santa           6(1):36

MCI--guide, Codes--Methods, Microwave Links 1(3):2

MCIMAX, MCI Database         8(2):16

Merchant Ship Calls (L) 2(6):36

MF tones (L)    2(3):16

MicoVAX         3(9):71

MILNet            2(7):45

Minitel  4(9):8

Minitel terminal, TELETEL Networks    9(4):8

Missle systems  2(4):21

Mitnick, Cyberpunk fictions, Dicicco--Lenny       8(2):42

MIZAR,  RCMAC, CIC, SCCs, COSMOS         7(1):8

mobile frequencies, Cellular phreaking    8(4):18

mobile Telephone freqs  6(3):24 (L)

Moble Phone, IMTS,     3(4):26

monitoring microwave, TVRO, phone interception, satellite links   5(1):4

MPOW (L)       4(5):12

Narcing (L)       1(11):64

"National Coordinating Center, Defense Communications Agency, ""606 Emergency"","    5(1):24 (L)

Navy    3(10):75

Nazi BBS         2(3):13

NCCCD, Hacking statistics        3(6):41

Neidorf, Phrack, 911 documents 7(2):4

Neidorf--trial, Phrack     7(2):8

Net Addresses  2(4):23

nets, networks   3(11):82

Network 2000   7(3):8

news    4(10):8

news    5(1):37

News Briefs     9(4):19

news, 550 blocking, COCOTs, PINs       4(11):8

news, Max Headroom-Chicago style, Israeli computer survelence of West Bank,  4(12):8

non-supervised phone lines (L)   3(6):44

NPA count       6(4):44

NSA     2(10):67

NSA     1(9):51

NSA     2(7):47

NSA     1(10):57

NSA     3(9):67

NSA's Phone Number (L)         2(3):16

NSA, DOCKMASTER break in            5(3):20

NSA, electronic survailance       2(12):83

NSA, encryption            3(10):79

NUAs, international NUAs        4(10):10

Nuclear Free America   4(3):2

numbers            4(12):21

Numbers           5(2):44

numbers            9(1):45

NY Tel, Touch Tone Fees,         4(7):15

Nynex exchange addresses        10(4):18

NYNEX,          8(2):11

NYNEX, NYNEX--switch guide, CLLI, Central Offices--NY     6(4):9

Obit--David Flory AKA Dan Foley AKA The Shadow    6(2):45

Operator humor 7(4):16

Operator Service, 00      4(9):6

Operators, social engineering      3(5):33

ouch!    5(2):16

Outdial list, PC-Pursuit Outdial list          8(2):44

Outdials, Internet Outdials          8(1):40

outside local loop distribution plant, SAC, Feeder Groups, manholes, Serving Area Interface           5(3):4

Pagers, Pagers--scanning           4(6):5

Paranoia           1(7):3

paranoia            3(5):39

Paranoia, anti-hacker propoganda           2(1):1

Parking Summons          1(7):3

password grabber (L)    3(8):60

Passwords        4(9):14

Passwords, Spoofing VAX login 4(8):10

Passwords--hacking IBMs, Programs--Hacking IBMs,    8(1):36

Pay Phone--destruction, Pay Phone--anatomy     3(10):73

Payphone disection,       9(1):20

payphones, ACTS, TSPS, fortress phones           6(1):30

payphones, Fortress Fones         1(11):62

PBX trix (L)     4(1):12

PC Pursuit        2(9):58

PC Pursuit--hacking, telenet       4(4):6

Pen Registers    3(2):11

Pen Registers    4(9):13

Pen registers (L)           4(12):12

Pentagon          1(12):69

People Express, Airlines            2(5):25

phone frequencies         5(4):19

Phone Loops (L), Wats Extenders (L)    1(9):52

Phone News     9(2):19

phone numbers  8(1):17

Phone scramblers (L), CIA (L)  1(8):46

Phrack, busts, legal battles, Rose--Len    8(1):11

Phrack, Neidorf 7(2):3

Phreak Anticdotes         1(9):52

Phreak History  2(11):80

Phreak typologies          2(3):13

Pick Operating System  3(6):42

pirate radio        6(2):42

Pitcairn Island   2(9):59

Plane phones     1(11):63

Poetry  4(8):20

police computers           2(5):27

Police setups     3(4):30

Police Survaillance        1(8):44

Political Hacking, Legislative Network    7(4):4

Porn     2(6):35

postal paranoia (L)        4(3):12

postal paranoia (L)        1(4):20

POSTNET Corrections  8(4):21

POSTNET, USPS, Letter Sorting Machines        8(3):32

PRIMOS          7(2):14

PRIMOS          6(2):4

PRIMOS, DSM, PRIMOS--hacking       6(4):14

Prison Phones                           7(3):29 (L), 9(4):13

Prison update    8(2):46

Privacy, Bank Records  1(5):3

Private Sector BBS                   2(8):49, 2(9):59, 3(1):1, 3(3):22, 3(4):30

 

Prodigy censorship~      6(4):43 (L)

Prodigy--STAGE.DAT conspirosy         8(3):26

Prodigy--STAGE.DAT conspirosy theory (L)     8(4):29 (L)

PRONTO, Banks          2(7):42

proto-phreak, phreak history, Almon Strowger     5(3):9

psychological makeups   8(3):38

Puerto Rico (L) 3(10):76

pyramid schemes           3(10):79

radio scanners, cordless phone evesdropping       6(2):22

RCI      3(9):65

Reagan 2(5):27

Reagan 1(12):69

Reagan 3(11):83

Regulation, British Telecom, new services, COCOTs, hacking pet cemetaries, customs, outages, CID        8(2):35

REMOB           5(1):27 (L)

REMOB (Remote Observation) (L)       2(5):28

REMOBS         6(3):32

REMOBS         7(1):24 (L)

REMOBS (L)   2(9):60

Resources Guide           3(6):46

"review--""Sneakers"""   9(3):17

review--The Hacker Crackdown, Sterling--Bruce            9(3)21

"reviews--""Hacker"""    9(1):36

Robert Morris, Albania,  7(1):23

Robert Morris, trojan, automation            6(4):6

ROLM 6(3):24 (L)

ROLM CBX II 9000     5(1):30

Rolm systems (L)          3(11):88

Rose-Len, busts, neo-Nazi games,          8(2):12

Routing Codes, Bell Routing Codes         5(1):42

Royko, Mike     2(11):75

RS CPA-1000, Pen Register, Product Review: Duophone CPA-1000       4(5):22

RSTS, (DEC)PDP        3(4):25

RSTS, PDP-11  2(11):73

Russian Phone Books (L), Russian Phone Numbers (L)   3(5):36

Satellite Jamming           3(3):23

Satellites--hacking myths, Hacking myths            2(8):52

Saudi Arabia     4(7):21

Saudi Arabia (L)           3(10):80

scams   7(4):22

scams   2(4):21

scanners, cordless phone monitoring,marine radio ch 26,   7(1):19

school computers, grade hacking            10(4):15

school records, grades--school    10(2):13

scramblers, outwitting eavesdroppers      3(4):29

Secret Frequencies, NYNEX Radio Frequencies 8(2):32

Secret Service   9(4):12

Secret Service radio frequencies, Disney radio frequencies          9(1):17

Secret Service, 2600 meetings    10(1):43, 10(3):18, 9(4):4

Secret Service, Hacker Scares, Government Paranoia     9(4):4

Secret Service, Jackson--Steve  10(1):18

Secret Service, Sherwood Forest--busted            2(6):34

secured trunks   6(1):24 (L)

sentry security, prison computers            8(4):5

shortwave         3(9):67

Simplex Corrections       8(4):21

Simplex lock location guide         9(1):38

Simplex locks, lock picking         8(3):6

SL-1 Switch (L), Switches...see specific switch  3(9):68

Smarrtphone hacking     10(4):11

social engeneering         2(4):19

Social Security Number Prefixes            4(11):6

South Africa     4(10):11

South African Phreaks   6(2):24 (L)

SouthWestern Bell, Hacking Bell Computers       9(4):42

Soviet Union     8(1):16

Spain    6(2):36

Springsteen       2(11):75

Sprint, busts      6(2):34

SSN, SSN--protection, Privacy Act of 1974        8(3):18

SSNs    3(7):51

Step Offices, Switches   1(5):1

Steve Jackson Games    10(1):23

sting BBS's (L) 3(6):44

Stings   3(5):39

Sting BBS, Weendland,Mike"     3(9):66

Submarine Cable Maps  4(8):11

surveillance       3(12):95

Survey  2(12):84, 4(8):15

Sweden's "Person Numbers" (ID)          1(3):3

Switch guide, ESS, DMS100, #5ESS, #1ESS       10(4):10

Switch overloading        3(12):91

switch-hook dialing (L)  4(12):12

Switching Centers, Operators     1(10):56

Switching Routes (L)     2(3):16

switching systems          2(5):27

switching, busy signal     10(4):9

Sysops--protective measures, BBS liabilities        2(8):55

TAP     6(2):43

TAP,  Hoffman, Abbie  4(1):4

telco doc           9(3):36

telco info-fishing techniques (L)  3(10):76

telco nonsense   1(5):4

telco offices      10(2):36

Telco renegging 2(10):65

Telco--fighting back       1(8):46

telco--assisting wiretaps 2(1):1

tele-harrassment            3(2):10

Telecom           6(3):12

Telecom debit cards      4(1):8

Telecom, Phone Cards--British, UK Operator Numbers   3(8):58

teleconferencing, alliance           2(5):26

Teleconferencing--anticdotes     1(4):4

Telemail--access,          1(4):2

Telenet 3(6):47

Telenet 2(9):61

Telenet Addresses         4(6):9, 4(5):10

telenet hacking             3(11):84 (L), 1(2):7

Telephone Basics          1(8):43

Telephone Induction Coil, Induction Coil, taping payphone tones   7(3):36

Telstar 301, Satellite Phone Transmissions          4(11):7

Terminal locks, crypt preview     8(3):44

Test Numbers   2(11):77

Thailand            2(6):39

Time service     2(4):21

TINA   2(6):39

toll fraud           9(3):43

Toll Fraud Detection, SSTs        7(1):12

Tone Tracer Construction, Test Equipment, Schematics   8(2):14

touch tones       3(12):91

Touch-tone fees            4(10):6, 4(10):7

Touch-tone Service       4(2):18

Trace procedures (L)    3(1):4

Tracking Devices (L)    3(4):28

Trade Magazines (L)     4(6):13

Trans-Pacific Cable       2(11):79

Trap Tracing--defeating,            7(3):22

trashing, dumpster diving            3(10):73

trashing, dumpster diving            6(2):32

Travelnet,         1(11):61

Trojans, Viri, Worms, Virus Protection    5(2):4

TRW    2(2):9

TRW    4(8):4

TRW    1(7):5

TSPS (L)          2(1):4

TSPS (Traffic Service Position Service), Payphones        1(2):10

TSPS Console   4(6):6

TSPS(L), Operator Identification of Payphone(L)            1(2):10

UAPC Hacking, Hacking Grades           6(3):4

UK Data Protection Act            10(2):12

UK Message List          4(9):10

UNIX hacking   6(3):28 (L)

UNIX password hacker 9(1):18

UNIX Password Hacker Complaints (L)            8(2):24

UNIX Trix (L)  3(4):28

UNIX, UNIX basics      6(4):4

UNIX--hacking 5(4):12

UNIX--hacking, UNIX--identification     3(8):57

UNIX--password hacker, passwords--UNIX      8(1):31

USC--Phony Degrees    2(2):9

USSR   2(4):21

USSR   3(8):63

USSR--operators, Soviet phone systems 5(4):30

VAX (L), VMS (L)       3(8):60

VAX Worm, Ada Worm            6(2):38

VAX, VMS, Passwords 4(5):4

VAX--Hacking, Trojan Horses   3(7):49

VDT    3(3):19

VDT Operators 3(8):59

Vehicle Tracking Monitors         1(1):3

Verification       2(9):58

Video Reviews  10(2):40

VIN (Vehicle Indentification Numbers)  9(4):11

Viri, Atari Virus program           8(1):4

virtual reality     10(4):37

Virtual Memory oporating System--see VMS

virus     9(3):19

Virus--Batch virus         9(1):8

Virus--MSDOS (code)  9(1):4

virus--scanners  9(1):9

viruses, 5(2):8

VM/CMS, corrections   5(1):8

VM/CMS, VM/CMS--Privileged Commands, VM/CMS--Filemodes, VM/CMS--password characteristics 4(12):4

VM/CMS--Acronmyms, VM/CMS--hacking, Operating systems..see individual entries (e.g. VM/CMS, UNIX...)   4(11):4

VMB, Voice Mail Hacking        9(2):42

VMS,   3(3):18

VMS,  VAX     2(9):57

VMS, VMS--Security & Hacking           3(2):9

VMS, VMS--UAF (User Authorization File)       2(10):66

VMS--default passwords (L)     3(7):52

VMS--hacking, VAX, $SHOW PROCESS/PRIV           4(1):6

Voice Mail Hacking, NYNEX    6(3):36

VR       3(9):71

WATS  5(3):23

WATS directory            4(1):18 (L), 4(4):21 (L)

Weathertrak Codes       5(1):15

White House phones      10(1):12

Whitehouse Extension Numbers circa 1984         1(1):5

wild claims                                6(4):30 (L)

Winnipeg                                  3(9):69

wire fraud news                                    2(3):15

Wireless Modem                       4(7):13 (L)

wiretaps                                    1(4):3 2(6):35, 2(1):1, 7(3):30 (L), 3(12):91, 1(11):63, 1(10):57

wiretaps--police                         1(3):3

Word Numbers 4(4):15

WWIV BBS--Hacking, PKZIP hack method      9(1):12

XY Step Switching Station(L)    1(5):3

YIPL...see TAP

Yellow Pages                            3(3):23

Yellow Pages scam                   2(5):27