2600 Title Index Volumes 1 - 10

 

Indexed by

David Price

Assoc Professor, Anthropology

St. Martin's College

dprice@stmartin.edu

 

 

~ Denotes a “news” article

  

Title

1984 Arrives in Hong Kong~                              1(1):3

$2 Billion Error~            2(7):43

22013664431--Call it!                                         3(3):22

2600 A Hacking Victim~                                   2(8):51

2600 Bulletin Board Online                                 2(2):9

2600 Exposes New York Tel                             4(7):15

2600 Information Bulletin                                   3(9):69

2600 Information Bureau                                   3(10):77

2600 Information Bureau                                   3(8):61

2600 Information Bureau                                   3(11):85

2600 Information Bureau                                   3(12):93

2600 Writer Indicted~                                        1(6):3

411--News About Phone Companies~                8(2):35

414 Bust~                                                         2(5):27

414's Plead Guilty~                                            1(4):3

4TEL                                                                6(3):20

$6,829 Phone Bill~                                             3(6):43

617 Will be Divided~                                         3(4):31

718 Is Coming~                                                 1(3):3

74,000 Calls to Fraud Line~                                3(7):55

800 Directories Now Available~                         1(8):45

800 Prefixes Listed by States                             2(6):37

818 Here to Stay~                                             1(11):63

911 Suspect Hung Up~                                      1(10):57

A 414 is Sentenced--Other Indicted~                  1(5):3

A Batch Virus                                                   9(1):8

A Bittersweet Victory                                       7(2):3

A Blast From the Past                                       9(4):33

A Challenge to Hackers~                                   2(1):3

A Form of Protection For You & Your Computer5(2):4

A Friend in High Places                                     1(9):52

A Guide to PRIMOS                                         6(2):4

A Guide to the 5ESS                                          10(2):4

A Guide to the Israeli Phone System                   2(6):33

A Guide to VMS                                               2(9):57

A Hacker Survey                                              4(8):15

A Hacker's Guide to the TSPS Console              4(6):6

A Hacker's Guide to UNIX                                5(4):12

A Hacking Reading List                                     7(4):6

A Look at the Future Phreaking World: Cellular Telephones--How They Work     3(12):89

A Mechanical Hacker~                                     2(3):15

A Pen Register For Phreaks?: Product Review--Dialed Number Recorder           4(5):22

A Phone Phreak Scores                                     2(4):19

A Political Hacking Scandal                               7(4):4

A Reader's Reply to Captain Zap                                   5(2):16

A Report on the Internet Worm                          5(4):4

"A Review of ""The 'Top Secret' Registry of US Governemt Radio Frequencies"  4(11):7

A Simple Virus in C                                           9(3):19

A Story of Eavesdropping                                  3(4):29

A Study of Hackers                                           10(1):38

A Time For Reflection                                       1(12):67

A Trip to England                                              3(8):58

A True Saga of Teleconferencing                       1(4):4

A Unique Obscene Caller~                                3(2):1

A Way To Catch Peepers                                  9(1):35

A Word on Wiretapping~                                   1(4):3

Acoustic Trauma                                               3(2):15

Acronym List                                                    2(2):11

Acronyms A-G                                                 10(1):34

Acronyms H-R                                                 10(2):20

Acronyms s-x (no y or z)                                   10(3):44

ADS Investigation Moved?~                              1(2):9

AHOY!                                                                        1(1):1

algorithm for credit cards correction                   7(4):25

All About BLV: Busy Line Verification              4(12):10

Allnet's Legal Problems                                     5(2):2

Allnet: A Horror Story                                       4(6):4

Alternate Long Distance                                                1(3):2

American Network Fears Hackers~                   3(5):39

An Algorithm for Credit Cards                           7(3):42

An American Express Phone Story                    3(3):17

An Appeal For Help                                          8(4):36

An Interesting Diversion                                                2(10):65

An Interpretation of Computer Hacking              5(1):16

An Interview with Craig Neidorf                                    7(2):8

An Interview with Dorothy Denning                   7(3):10

An Interview with Hugo Cornwall: British Hacker/Author            4(2):4

An Interview With the Chaos Computer Club      5(4):34

An Introduction to COCOTS                              7(2):20

An MS-DOS Virus                                            9(1):4

An Official Crackdown on Hackers~                  1(7):3

An Overview of AUTOVON and Silver Boxes   3(3):17

An Overview of DSS1                                       10(3):36

ANALYSIS: Gulf War Printer Virus                  8(4):39

Anatomy of a rip-off                                          7(4):22

And They Call US Crooks?                                2(10):65

Another Astronomical Phone Bill~                      3(1):3

Another FBI Computer File~                              1(11):63

Another Hacker Story~                                     1(9):51

Another Stinger Is Stung                                                3(9):66

ANSI Bomb                                                      10(2):44

Are You a Phreak???                                        2(3):13

ARPANET Hopping: America's Newest Pastime           1(6):1

ARPANet Military Subnets                                1(3):5

At the Last Stroke...~                                        2(4):21

AT&T Best For Hackers~                                 3(9):71

AT&T Computer Caught Stealing~                    2(6):35

AT&T Contractual Obligations~                         2(6):39

AT&T Credit Cards Make Debut~                     1(1):3

AT&T Does it Again~                                       3(1):3

AT&T Faces Serious Money Problems~                        1(9):51

"AT&T Keeps ""800"" Data To Itself~"              2(2):9

AT&T Limits Use of their Credit Cards~                        1(6):3

AT&T Offers E-Mail~                                      2(12):87

AT&T Put On Hold~                                        2(7):47

AT&T Selling Pay Phones~                               3(7):55

AT&T Sub Maps                                              4(8):11

AT&T to Read E-Mail~                                                2(11):79

AT&T/BOC Routing Codes                               5(1):42

ATM's in China~                                               3(8):63

Automated Operators Coming~                          3(7):55

AUTOVON Numbers                                       3(5):37

Avoid Phones in Storms!~                                  2(11):79

Bad Tenant Database~                                      3(4):27

Bank Records Aren't So Private~                       1(5):3

Banking from your Terminal--A Look at PRONTO         2(7):42

"BASIC ""Wargames Dialer Program"               5(1):20

BASIC Red Box Tones                                     5(3):22

BB Traffic Cop~                                               3(9):67

BB Watching VDT Operators~                          3(8):59

BB Watching Without Regulation~                     2(12):83

BBS Listing                                                      2(12):85

Be Nice to Your Telco                                      1(8):46

Beginner's Guide to Minitel                                9(4):8

Beige Box Construction                                     10(1):14

Belcore's Plans for Caller ID                             9(2):18

Bell Atlantic & MCI Collaborate~                      3(2):15

Bell Credit Card Abuse Soars~                          1(4):3

Bell Didn't Invent Phone?~                                2(6):35

Bell Propaganda Films~                                     2(9):63

Bell to AT&T: Get Lost!~                                  1(7):3

Bellcore Publications Go Public~                                    3(5):36

 

 

 

 

Beware of Hacker Terrorists~                           3(5):39

Big Brother No longer Watching Miami~                       1(8):44

Big Computer Crime Pays~                               3(6):43

Big Deal for Little Town~                                  2(11):75

BIN List                                                           8(2):31

Birth of a Low Technology Hacker                    8(4):16

BITnet Topology                                               2(1):6

Blue Box Schematic                                          2(10):69

Bogota, Columbia Gets Extra Digit~                   3(5):39

Book Review Nothing New in Computer Underground by M. Harry         3(6):42

Book Review: "Automatic Teller Machines III"   4(2):21

Book Review: "The Hacker's Handbook"                        4(2):15

Book Review: Approaching Zero                                    10(3):38

Book Review: The Cuckoo's Egg                       7(1):45

Book Review: The Devouring Fungus (Tales of the Computer Age) 9(2):40

Book Review: Tune in on Telephone Calls by Tom Kneitel           5(4):45

Book Review: Virtual Reality                             10(4):37

BOXING ON ITT                                             3(5):38

British Credit Holes                                           10(2):12

British News                                                     10(1):44

British Phonebooth Wedding~                            3(4):27

British Telecom: Guilty                                       6(3):12

Build A Tone Tracer                                         8(2):14

Building a DTMF Decoder                                 7(1):14

Building a Red Box                                            5(2):13

Building a Telephone Induction Coil                    7(3):36

But How Does it Work?                                   1(8):43

Buy My Wires~                                                3(12):95

"Call Me" Card~                                                2(6):39

Call Rejection in Natchez~                                 3(9):71

Caller ID Technologies                                      10(3):12

Caller ID: The Facts                                          7(3):5

Campaign Contributions On-Line~                      2(10):71

Capitol Hill Hacker~                                          3(6):43

Capturing Passwords                                         4(8):10

Car Breathalizers~                                            3(4):27

Carrier Access Codes                                       6(3):42

Carrier Choosing Time~                                     2(5):27

Cash Machines Are Popular~                            3(8):63

Ccanadian WATS Phonebook                            5(3):23

Cell Site Frequencies                                         4(1):10

Cellular Dial-By-Voice~                                                3(7):55

Cellular Magic                                                   10(1):4

Cellular Modem~                                               3(5):35

Cellular Phone Biopsy                                        10(4):6

Cellular Phone Fraud and Where It's Headed      4(7):4

Cellular Phones in England                                 3(2):15

Cellular Update                                                 5(3):8

Central Office Operations                                  7(4):12

Changing Your Grades on A High School Computer        10(3):34

Chinese Snitch Numbers                                                6(2):35

Cipher Fun                                                        9(4):6

CIS Copyrights Public Software~                       3(10):75

Citybank Money Games~                                   3(6):43

Cityphone Has the Answer~                              2(12):83

Class Features                                                  8(4):31

CLASS: What It Means To Us                          4(5):6

CNA Numbers                                                  4(4):10

CNAs                                                               2(3):18

COCOT Corner                                                            8(4):33

COCOT Numbers                                             8(3):22

Colomnist Attacks AT&T~                                2(11):75

Commentary: The Threat to Us All                     2(8):50

Competition...It's the next best thing to being there          6(3):3

Computel Does Exist~                                       2(3):15

Computel Put to Sleep                                       4(4):4

Computer Clothing                                             3(9):71

Computer College                                              3(11):87

Computer Crime Resources Guide          3(6):46

Computer Crime Review           3(6):41

Computer Elections Examined~  2(10):67

Computer Foul-ups Hurt Social Security~            1(11):63

Computer Grammer~     3(5):35

Computer Makes it Easy for Reagan~    1(12):69

Computer Password Kept Secret           3(3):19

Computer Security at the Bureau of Prisons        8(4):5

Computer Threat Causes Chaos in Albany~        1(6):3

Computers Monitor Truckers~   2(7):43

Computers Seized as Summer Games Begin~     1(8):45

Computers Strike Again!~          3(7):51

Computers Threaten Privacy~    3(12):91

Congress Chooses AT&T~        3(4):31

Congress Takes a Holiday         10(3):4

Congressional Computer~          3(5):35

Converting a Tone Dialer into a Red Box            7(3):32

Count of Exchanges per Area Code       3(8):62

Country Codes  1(2):10

Country Codes  3(7):53

"Crackers" Cracked~                             2(5):27

Crosstalk Saves Old Lady~        3(9):67

Crypt() Source Code     8(4):11

Data Network Identification Codes         7(1):40

Death of a Pay Phone   3(10):73

Death of NYNEX Business Centers       8(2):11

Death Star Cards Spell Woe~    1(2):9

"Debugging"" Phones~"           3(8):63

Decrypting Password Security   4(9):14

Defeating Callback Verification  9(3):9

Defeating Trap Tracing 7(3):22

Defense Data Network Listing   1(5):4

Descrambling Cable      10(1):16

"Dial ""00"" For Operator~"        3(4):31

Dial Back Security        3(2):10

Dial the Yellow Pages~ 3(3):23

Dial-a-Directory~          2(5):27

Dial-A-Porn Update~    3(1):3

Dial-it Sex Numbers Argued~    2(11):75

Dick Tracey Toys Are Closing In~         2(9):63

Did You Know?            4(7):17

Digital Locks     10(4):38

Directory Assistance By Computer~      2(9):63

Directory Assistance Failure~    3(4):31

Dreams of GEnie~        2(12):87

E-COM is Going Away~           1(6):3

E-COM Number List     1(6):5

E-COM Really on the Way~      2(7):47

"Ed Quinn Cell Site""~"            3(6):47

E-Mail Horror Stories    1(12):68

E-Mail Listings  1(12):71

Electronic Jail All Screwed UP~            1(12):69

Electronic Switching Advantages            1(6):2

Electronic Tax Returns Are Here           3(2):15

Electronic Tax Returns~            3(10):79

Electronics Create Portable Prisons~      1(4):2

Elementary Switching    10(4):9

Encryption Provides Signature~  3(4):31

England's Mass Announcements            4(9):10

Equal Access 800 Drawbacks~  3(4):31

"Equal Access May Not be ""Equal"" to Modems"           2(11):74

ESS Goes To Taiwan    3(10):79

ESS: Orwell's Prophecy 1(2):8

Europe Standardizing Telecoms~            2(9):63

Ever Wonder Who Owns All Those 800 Numbers?         6(1):12

Ex-Fed Tapped 3(7):51

Exchange List: 201 Area Code   6(2):20

Exploits in Operator Hell            3(5):33

Exploring Caves in Travelnet      1(11):61

Facts and Rumors         7(3):44

Fascinating fone fun      9(1):45

Fascist Computer Network~      2(1):3

Fawcett Phone Bill Too Big~     2(12):83

FAX: A New Hobby     4(5):14

FBI Actions Anger Parents        3(11):83

FBI Goes After ADS Hackers   1(1):2

FBI Investigates Coffee Machine~         3(10):75

"FBI Revealed: Reviews--""The FBI Project Newsletter"" & ""The FBI and Your BBS""" 4(8):9

FBI Shoping List~         3(9):67

FCC Actions~   1(6):3

"FCC Gives Away ""Resource"""           3(9):71

"Federal Employees ""Tracked""~"         3(7):51

"Federal Express Offers "" E-Mail""~"    1(8):45

Federal Phone Failures~            3(7):55

Federal Telephone System Upgrade~     1(12):69

Feedback          9(4):26

Fiber-Optic Network For Du Pont~        2(10):71

Final Words on VMS     3(3):18

Fingerprint Identification System~           3(12):95

"First of the ""Superminin""~"     1(12):69

Five Aliens Hung Up~   3(1):3

Five Arrested in Phone Fraud~   1(7):7

FM Telephone Transmitter         8(4):45

FM Wireless Transmitter           8(4):44

For Your Protection       7(1):3

Fraud Alert       7(4):43

Free Directories For Bigwigs~   3(12):95

Free Information in Trouble~      1(4):3

Free Kiddie Dial-It Calls~          2(11):79

Free Pay-Phones Plague New Jersey~   3(5):39

French Phones Renumbered~    2(12):83

From Sherwood Forest: Intro to Hacking 2(6):40

From the 2600 Files       5(1):22

Fun and Games at a 2600 Meeting          7(1):38

Fun Phone Numbers      5(2):44

Fun Things to Know      9(2):19

Fun With COSMOS      2(12):82

Fun With Fortress Fones            1(11):62

Gee...GTE Telcos         6(3):33

GEISCO's New Toy~    2(1):3

General Information       6(1):7

German Phone System Stagnant~           2(12):87

Getting Caught: Hacker's View  1(10):55

Getting In The Back Door: A Guide to Some Popular Operating Systems  2(1):2

Getting Started  9(3):42

Getting the Most Out of Equal Access    4(3):6

Getting Your File...        10(1):42

Goings On         4(4):16

Good Apples for the Soviets~     2(4):21

Government Bulletin Boards       10(2):39

Government Phone Fate?~         3(8):63

"Grade ""A"" Hacking"   6(3):4

Growth of a Low Tech Hacker  9(4):17

GTE Hit by Divestiture~            2(1):3

GTE Now Bigger than AT&T~  2(7):47

GTE Raids Still Have Many Unanswered Questions~      1(1):3

GTE Sprint Cheats Customers~  2(7):43

GTE Sprint Overbills~    3(9):71

Hacker Extortionist Caught~      2(9):59

Hacker News~ 8(2):12

Hacker Zaps Computer Marquee~         3(3):19

Hackers Degree?~        3(7):51

Hackers Go Free~         2(4):21

Hackers Have Big Business Scared~     2(10):71

Hackers In Jail  6(1):3

Hackers in Jail, Part Two           10(4):4

Hackers in the World of Malls: Secret Service Behind Harassment of 2600 Meetings        9(4):4

Hackers on Shortwave~            3(9):67

Hacking AmiExpress     9(3):4

Hacking at the End of The Universe       10(3):4

Hacking Computer Shows          10(4):16

Hacking IBM's VM/CMS          4(11):4

Hacking IBM's VM/CMS--Part Two     4(12):4

Hacking MCIMAX       8(2):16

Hacking on Telenet: It's as Easy as 123456!        1(2):7

Hacking on the Front Line          9(3):31

Hacking Packard           2(3):20

Hacking PC Pursuit       4(4):6

Hacking Smartphone     10(4):11

Hacking WWIV            9(1):12

Hands Acress Telenet~ 3(6):47

Happenings       5(1):37

Hardwiring Your Way In           5(4):42

HBO Encryption Broken~          3(10):75

Here They Are 9(2):24

Here We Go Again       9(2):22

Here's the Secret!         2(11):73

High School Hacking     10(2):13

High School Mac Hack  10(4):15

High Tech Happenings  9(4):19

High Tech Parking Meters~~     3(5):35

History of British Phreaking       1(9):49

Hitchhiker Guide to the Phone System Phreaking in the Nineties  9(2):10

Home Computer Attacks Falwell~          3(1):3

House: Hacking is Bad~            1(8):45

How Can Sysops Protect Themselves?   2(8):55

How Cellular Phones Came About and What You Can Expect    3(11):90

How Not to be Rejected~          3(12):91

How Payphones Really Work    6(1):30

How Phone Phreaks are Caught            4(7):6

How the Defeat *69      9(2):31

How to Build a Silver Box          6(4):20

How to Get into a C.O.  2(3):14

How to Hack A Pick     3(6):42

How to Hack Honesty   10(3):20

How to Hear Phone Calls          5(4):19

How to Run a Successful Teleconference           2(5):26

How to Take Apart A Payphone            9(1):20

How to Use Your Silver Box     9(1):16

Human Database Centers          8(4):46

I.R.S. Computers Screw Up~    2(3):15

IBM ADS Directory      1(9):53

IBM Braille Compatible~           3(12):95

IBM Gets Bigger/Goodbye SBS~           2(7):47

IBM's Audio Distribution Systems Sure Can Be Fun!      1(5):2

IC and CIC Listing        1(11):65

Ice Cream Chain Aides Selective Service~         1(8):45

ICN--More than a Bargain         3(11):81

Important News            4(12):3

In Pursuit of Knowledge: An Atari 520ST Virus  8(1):4

Indian Phones Under Siege~      3(9):67

"Indiana ""Fones"" Are Gone"     3(10):75

Indiana Telco Threatens AT&T~           3(7):55

Industrial Espionage Seminar~    2(3):15

Infrared Beeper Will Find You   3(2):15

Inmates Handle Information Calls~         2(12):83

Inspect Implementation  8(2):18

Intelpost an Astronomical Failure~          1(5):3

Interesting Things to do on a DEC-20     2(7):41

International Hacking~   3(12):91

International NUA's      4(10):10

Internet Outdials            8(1):40

Introducing the Clear Box!         1(7):4

IRS Drives Telco to Drink~       2(6):35

IRS Wants Access to Telco Data~         2(1):3

Is AT&T Hiding Near You?      9(4):36

It Could Happen to You!            3(2):10

ITT Crackdown~          2(7):43

ITT Wiping Out Fee~    1(8):45

Jersey Wins Wiretap Race Again~         2(6):35

Kenya Pay Phones Prove Popular~        2(3):15

Kiev Calling Clogged~   3(6):47

Know Your Switch        10(4):10

Knowing UNIX 3(8):57

L.A. Law         9(1):7

Lair of the INTERNET Worm   6(3):39

Lawsuit Filed Against Secret Service      10(1):43

LD Companies Strike Back~      3(8):59

Leaked Documents       7(4):16

Leave Our Poles Alone!~          3(8):59

Let's Move to France!~ 3(6):47

Letter From Prison        9(4):13

Listening In       7(1):19

Listening In On Cellular Phones~           2(7):43

Listening In: Catch Me if you Can!         4(11):7

Local Toll-Free Numbers~         3(10):79

Long Distance Option Timtable~            1(5):3

"Look Out, He's Got A Computer!"   1(7):1

Look Out For Sidney~   1(7):3

Looking for Simplex Locks?       9(1):38

Looking Up IBM Passwords      8(1):36

Loophole in Wiretap Law           3(12):91

Loopholes Around Wiretrap Laws~        1(10):57

Magnetic Strips 8(2):7

Man Worries About Sprint Bill~ 3(4):27

Marcos Phones For Free~         3(4):27

Mastering the Networks            3(11):82

MCI Access Numbers & Mail Numbers 1(4):5

MCI Expanding With Optical Fibers~     2(7):47

MCI Goes to U.K.~      2(5):27

MCI Mail & Western Union EasyLink    1(12):67

MCI Mail: The Adventure Continues      1(7):2

MCI: The Phone Company With A Lot of Explaining To DO       5(4):10

Meeting Advice 10(2):16

Meeting Advice 10(2):17

Meeting Mania  10(3):18

Messages on the Move~            3(9):71

MILNET TAC Dialups by Location       2(7):45

Missing Children's Faces Displayed~      2(7):43

Mobile Frequencies       8(4):18

Mobile Phones--Theory and Construction            3(4):26

Monitoring Phone Calls With A TVRO   5(1):4

More Banks Link Arms~           3(11):87

More Cellular Fun         10(3):42

More Conversion Tricks            8(3):43

More Divesiture Woes~ 2(10):71

More Hacking on Primos           6(4):14

More Info on VMS        2(10):66

More Long Distance Unpleasantries       4(12):20

More Magic Buttons~    3(11):87

More Meeting Advice    10(4):35

More On Hacking UNIX           6(4):4

More on Trashing: What to Look for, How to Act, Where to Go.  1(9):50

More PC Jr's., Less Z-100's for Soviets~            1(8):45

More Phone Fraud~      2(7):43

More Telenet Addresses            4(6):9

More Use of Phone Computers~            2(10):71

More VAX Tricks         4(5):4

Moving Satellites Right Up In the Blue...What Was Really Going On?      2(8):52

Mystery Transistor~      2(5):27

Navigate With a CD~    3(12):95

Navy Calls Dial-A-Porn~           2(10):67

Navy Phone Phreaks Nabbed~  2(10):67

Navy Software Available~         3(10):75

Nazi BBS a Challenge to Hackers          2(3):13

Negative Feedback        7(2):11

Net Addresses  2(4):23

Network 2000 Saga Continues   7(3):8

Never Erase the Past    10(3):19

New British Phone Service~      3(7):55

New Chip Helps Sprint~            3(8):63

New Developments       4(2):18

New Jersey Tops Taps~            3(7):51

New Payphone Service for Michigan~    3(11):87

New Payphones Confuse Callers~         3(1):7

New Phone System for Courthouse~      2(8):51

New Revelations From Bell South          7(3):16

New Tracking Device For Cars~           2(6):39

New VAX Announced~            3(1):7

New Ways of Stealing Data~     3(3):19

New York's Computer Law~     3(6):43

New York's IMAS        4(10):4

News Roundup 10(4):42

News Update    10(2):45

News Update    7(2):38

News Update~  7(1):23

News~ 6(3):14

Nickname Listings In Small Town~        3(11):87

No Data Protection for Hong Kong~      3(7):55

No Dial-it Calls For Feds~         2(11):75

No Hacking While Flying, Please~          1(2):9

No More Free Info~      1(6):3

No More Redialing?~    2(12):83

North Carolina #1 in Hacking     3(12):91

Northern To Destroy COs         3(3):23

NPA Countdown           6(4):44

NSA Chooses AT&T Computer~          2(7):47

NSA Doesn't Feel Secure~        1(9):51

NSA Drops DES~         3(9):67

NSA Memo      5(3):20

NSA Wants a New Chip           3(10):79

NSA Wants Better Phones~      1(10):57

Numbers           3(2):13

Numbers of Interest      4(8):6

Numbers...Long Since Changed 3(6):45

Nynex Bumps Southwestern Bell~         3(6):47

NYNEX Data   6(4):9

Nynex Voice Mail         10(4):18

Oh No, Not Again!~      1(10):57

On The Road Again: Portable Hacking   9(2):4

One Angry Judge          10(1):23

One We Somehow Missed~       1(11):63

Operating With Difficulty           4(9):6

Our Contest Winners     7(4):32

Our Ever-Changing World~       6(4):6

Our Wishes For '86 and Beyond 2(12):81

Out of the Inner Circle--A Review         2(6):34

Outdials            8(2):44

Outside Loop Distribution Plant, or Hands-On Experience            5(3):4

Overcharge Hunters Needed     3(1):3

Overseas Pirates~         2(4):21

Pacific Cable Planned~  2(11):79

Paging For Free            4(6):5

Passageways to the Internet      10(4):32

Patients May Get to Keep Phones~        3(5):39

Pay Phone Causes Panic~         3(2):11

Pay Telephones Deregulated~    1(7):3

PC Pictures~    3(12):95

Penetrating the Pentagon by Phone~      1(12):69

Pennant Ties Up Phones            3(10):75

People Express to be Hacked to Pieces  2(5):25

Pest Control~    2(9):63

Phone Booth Captures Man~     2(10):67

Phone Booth Wins Again~         3(1):3

Phone Booths Mauled The Stolen~         3(8):59

Phone Fraud in Governor's House~        3(8):59

Phone Numbers Supplied by Readers     8(1):17

Phone Phreak Fined~    3(4):27

Phone Service Via Radio Shack~           3(1):3

Phone-in Registration for College~         2(9):59

Phones 4(1):20

Phones at High and Low Speeds~          2(12):87

Phones in the Sky~        1(11):63

Phoning Home From Europe      4(5):9

Phreak Roundups~        2(2):9

Phreaks Tie Up Lines~  3(12):91

Pitcairn Island Now On AT&T Net~      2(9):59

Police Dept. Wants Cellular Phones~     2(11):79

Police Hacker Cleared~ 2(5):27

Poor Connection Starts Bomb Scare~     3(9):67

Poor Service An Understatement~         3(10):79

Porno Phone Service Busted~    2(6):35

Portable VAXes!!!        3(9):71

PRIMOS: The Final Part           7(2):14

Prisoner Update            8(2):46

Prisoners Break Law~   3(7):51

Private Directories Soon to be Available~           1(9):51

Private Sector Returning            3(1):1

Private Sector Update~ 2(9):59

Problems for New Pay Phones~            2(6):39

Product Review: Do It Yourself Demon Dialer Kit (Hack-Tic Technologies)        9(2):15

Product Review: Speach Thing   9(4):45

Product Review: TDD-8 DTMF Decoder           10(2):14

Programs in BASIC      3(1):5

Protecting Your SSN     8(3):18

Psychology in the Hacker World            8(3):38

Public Phone Secrecy~  3(6):43

Punching Pay Phones    6(3):37

Pure Cyberfiction, Says Mitnick 8(2):42

Pursuit For People         2(9):58

Q & A  1(2):10

"Q"" and ""Z"" Controversy Rages~"    3(11):83

RCI & DMS-100 Bugs  3(9):65

Reach Out and Touch a Nuclear Weapons Contractor     4(3):2

Reaching Out On Your Own      2(9):58

Reagan Hangs Up on Kids~       2(5):27

Real Important Frequencies       9(1):17

Real Life War Games?~            2(4):21

Redemption for a Hacker~         2(3):15

Remember....    6(2):3

REMOBS         6(3):32

Reporters Steal Swiss Phones~  3(2):11

Review: CO Magazine   4(9):22

Review: Hacker: The Computer Crime Card Game         9(1):36

Review: Sneakers          9(3):17

Review: The Hacker Crackdown           9(3)21

Reviews: The 1989 Pirate Directory       6(2):42

Ripoffs & Scams~         6(1):36

Robot Kills Man~          2(4):21

ROLM Phone System Creates a Nightmare        5(1):30

Roman Hackers            4(12):18

RSTS For Beginners      3(4):25

RSTS: A Trick Or Two 2(11):73

Rural Customers Denied Access~          2(11):79

Rural Radio Phones~     3(8):63

Rural Ultraphones~       3(10):79

'Santa Fraud'~   2(4):21

Satellite Jamers Jammed~          3(3):23

Saudi Arabian BBS List 4(7):21

Say Goodbye to Meter Readers~            2(6):39

SBS Offers Toll-Free Service~  1(12):69

Scanning For Calls         6(2):22

Sears Satellite Network~           1(10):57

Secret Frequencies        8(2):32

Secret Service on Trial  10(1):18

Security Can Kill Creativity        3(10):75

Security Numbers          1(10):59

Security Software~        3(1):7

SEIZED! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers     2(8):49

Sherwood Forest Shut Down by Secret Service   2(6):34

Shopper's Guide to COCOTS     9(3):13

Shower Phone?~           3(5):35

"Signature" On Video Transmitters~"  3(9):67

Silver Box Born in U.K. 7(1):19

Silver Pages~    2(4):21

Simplex Locks   8(3):6

Simplex Update and Corrections 8(4):21

Social Interaction with Phones    4(12):17

Software Makers Crash BBS~   3(10):79

Some Cosmos Documentation That May Be Useful        4(2):6

Some Facts on Supervision         3(9):65

Some Numbers 4(12):21

"Some Thoughts on ""Garbage Picking"""            1(2):10

Some Words on Hacker Morality           2(6):34

South African BBS's     4(10):11

Soviet BBS List 8(1):16

Soviet Computer Update~          3(3):23

Soviets Denied Computer Access~         3(3):19

Spanish Phones--and what they don't do 6(2):36

Springsteen Mania~       2(11):75

Sprint Unites with US Telcom~  3(2):15

Sprint--Too Many Customers~   3(11):87

SS Number Returned to Citizens~          3(7):51

Still More on the World of COSMOS      4(3):10

Sting Boards on the Rise~          3(5):39

Stock Market Crash~    3(6):47

Students Bog Down Computer~ 1(12):69

Students Cause Havoc on Computer~     1(3):3

Stuff You Should Be Interested In~        8(4):8

Stumbling into Control on a VMS            4(1):6

Super Crisis Alert System~        2(12):87

Super Pay Phone~         2(12):87

Supercomputer Dialups~            1(3):3

Survey Results  2(12):84

Surveying the COSMOS            2(2):8

TAP: The Legend is Dead         4(1):4

TASS News Service~   3(3):23

Technology Nabs Hooky Players~          3(1):3

Teelco Rats On Government~    2(10):67

"Teenagers ""Abuse"" Party Line~"        3(2):11

Telco News      9(4):42

Telco Offices    10(2):36

Telco Response 4(10):6

"Telco Sasys ""Pay for Tones""~"           3(12):91

Telco Service Spawns Racist Banter~    2(12):83

Telenet Addresses         4(5):10

Telenet Directory          2(9):61

Telenet Letter   4(8):16

Telephone Company Responds to Criticism of Touch-tone Fees   4(10):7

Teller Machine Crime Coming~  1(4):3

Test Numbers   2(11):77

Thai Phone Books a Hot Issue~ 2(6):39

The 516 Area Code in Detail      5(3):14

The 707 Area Code       7(1):44

The Australian Phone System    9(1):31

The Ballad of Captain Crunch    4(3):4

The Basics: Divestiture: What Happened?          3(1):1

The Class Struggle        8(2):22

The Cold Truth  4(8):20

The Computel Scoop     3(5):34

The Constitution of a Hacker     1(3):1

The Dark Side of the Great Break-Up    1(6):4

The Dark Side of Viruses          5(2):8

The Day the Phone System REALLY Died        6(4):4

The Death of COSMOS?          6(3):13

The Definitive ANAC Guide      7(3):39

The Early Phreak Days 2(11):80

The Facts on 10698       7(1):30 (L)

The First 100% ESS State~        2(7):47

The First Atomic Bomb 1(3):4

The Free Phones of Philly          3(7):50

The Galactic Hacker Party        6(3):10

The Ghost in the Machine~        3(8):59

"The Hacker ""Threat"""            9(4):19

The Hacker Video         8(3):14

The Hackers Guide to Area Code          1(8):47

The History of ESS       2(11):74

The Infinity Transmitter--An Old Bug that Had Its Time  2(9):58

The Latest~      9(1):42

The Magical Tone Box  10(4):22

The Neidorf/Phrack Trial: Day by Day   7(2):4

"The New ""TAP"""      6(2):43

The New LEC Order: Acronym City      8(1):42

The Next Step in Custom Calling~          2(3):15

The Person Numbers~   1(3):3

The Rise of the Computer State by David Burnham Book Review            1(8):44

The Scariest Number in the World          1(12):68

The Scoop on 911          7(1):37

The Scoop on Pen Registers~    3(2):11

The Secrets of Mizar     7(1):8

The Simple Pleasures of a Step Office    1(5):1

The Sprint Gestapo Strikes Again!          6(2):34

The Summer Games of 87         4(8):3

The Telecom Informer   4(10):8

The Telecom Informer   4(8):8

The Telecom Informer   4(9):8

The Telecom Informer   4(6):8

The Telecom Informer   4(5):8

The Telecom Informer   4(11):8

The Telecom Informer   4(4):8

The Telecom Informer   4(1):8

The Telecom Informer   4(12):8

The Telecom Informer   4(3):8

The Telecom Informer   4(2):8

The Telecom Informer   4(7):8

The Terminus of Len Rose        8(1):11

The Theory of 'Blue Boxing': their history, how their used, their future      2(2):7

The Trouble With Telemail         1(4):2

The Truth Behind Those 9999 Numbers  1(1):4

The View of A Fed       9(2):38

The Woes of Having a Small-Time Rural Phone Company           1(5):4

The Word On the Street~          7(4):36

There are More Phones than Ever          3(3):23

This Month At 2600       3(4):30

This Month at 2600        3(3):22

This Month's Mischief and Mayhem~     2(2):9

This Month's Troublemakers~    2(3):15

Those Horrible Hackers Strike Again     2(1):1

Those Silly Codes          4(10):14

Tidbits~            8(3):31

Times Changing For Directory Assistance~        1(2):9

TINA Message Service~           2(6):39

Tips On Trashing           6(2):32

Toll Fraud Detection Techniques            7(1):12

Toll Fraud Device          10(2):42

Toll Fraud: What the Big Boys are Nervous About          9(3):43

Town on Hold During Strike~     3(7):51

Trashing Alaska Style    2(2):8

Trashing: America's Source For Information       3(10):73

Trick of the Month~      1(2):9

Trouble in the White House        10(1):12

"Trouble with 800 ""Word Numbers""~"  2(9):59

True Colors       10(3):9

TRW Breacheed by Non-Hackers~       2(2):9

TRW Credentials Lack Credibility          4(8):4

TRW: Big Business is Watching You      1(7):5

TV Blue Boxes~           3(8):63

Two Inch Thick Bill~     2(10):67

U. S. Secret Service Field Offices          9(4):12

U.S. Phone Companies Face Built-In Privacy Hole         8(4):42

UAPC Update  6(4):45

UNIX Password Hacker           8(1):31

UNIX Password Hacker: An Alternative Approach        9(1):18

US and France Link Phones~     3(5):35

US Social Security Prefixes       4(11):6

Use of Wiretaps at Record Pace~          1(11):63

Useful UNIX Programs 8(3):44

Using the Telephone      9(3):36

USPS Hacking  8(3):32

USPS Hacking Corrections        8(4):21

USSR Computer Hungry~         3(8):63

Vehicle Identification Numbers  9(4):11

Victimized by Crime Computers~           1(10):57

Victory for Wiretap Victims~     1(5):3

Video Review: Assorted Videos 10(2):40

Video Telephone Invention~       1(12):69

Violating A VAX          3(7):49

Virus Scanners Exposed            9(1):9

Vital Ingredients: Switching Centers and Operators         1(10):56

VM/CMS Corrections   5(1):8

VMS--The Series Continues      3(2):9

Voice Mail Hacking       9(2):42

Voice Mail Hacking...NYNEX Style      6(3):36

Voice of Reagan Tortures Patients~       3(11):83

War Game Addict~       2(9):59

Weathertrak Codes       5(1):15

What a White Box Can Do        2(4):19

What in the EFF?          7(2):10

What it's Like to be a Soviet Operator    5(4):30

What's Going On With Phones/Computers          5(3):10

Whats up~        8(1):19

When Hackers Ride Horses: A Review of Cyberpunk     8(2):42

Where Have All the Hackers Gone?      8(2):4

Where One Hacker Went (L)    8(3):24

Whitehouse Extension Numbers 1(1):5

Who Called the Shuttle?~           3(3):19

Who the Hell was Almon Strowger, Anyway?    5(3):9

Who Wants to be Swept?~        3(12):95

Whoops [errata for 4(9)]            4(10):18

Whose Strike Was That Anyway?          1(4):1

Why Computers Get Snatched   2(8):54

Why Won't They Listen?           8(3):4

Wireless Phones Spell Trouble~ 1(1):3

Wiretap City~   1(3):3

Wiretap Clarification (L)            7(3):30 (L)

Wiretapping and Divestiture: A Lineman Speaks Out       2(1):1

Word Numbers 4(4):15

Worldnet: Getting Closer Every Day       4(9):4

WORM            6(2):38

Wrath of God Strikes 2600         3(11):86

Wrestlemania Pins Bell~            3(5):39

Write Protect Tabs Wrong~       3(2):15

Yellow Scam~  2(5):27

"You Must First Dial a One..." ~        1(7):7

Your Own Private Centrex~      3(1):7