2600 Subject Index Volumes 1 - 10

 

Indexed by 

David Price

Assoc Professor, Anthropology

St. Martin's College

dprice@stmartin.edu

 

Volume #

1(1):1    AHOY!                      

1(1):2    FBI Goes After ADS Hackers                

1(1):3    1984 Arrives in Hong Kong~             

1(1):3    Wireless Phones Spell Trouble~                        

1(1):3    AT&T Credit Cards Make Debut~                 

1(1):3    GTE Raids Still Have Many Unanswered Questions~                     

1(1):4    The Truth Behind Those 9999 Numbers           

1(1):5    Whitehouse Extension Numbers                        

1(2):10  Country Codes              

1(2):10  Q & A               

1(2):10  Some Thoughts on "Garbage Picking"                         

1(2):7    Hacking on Telenet: It's as Easy as 123456!                         

1(2):8    ESS: Orwell's Prophecy                       

1(2):9    Times Changing For Directory Assistance~                   

1(2):9    No Hacking While Flying, Please~               

1(2):9    ADS Investigation Moved?~                       

1(2):9    Death Star Cards Spell Woe~              

1(2):9    Trick of the Month~                    

1(3):1    The Constitution of a Hacker            

1(3):2    Alternate Long Distance                        

1(3):3    718 Is Coming~                        

1(3):3    The Person Numbers~                      

1(3):3    Students Cause Havoc on Computer~                

1(3):3    Wiretap City~               

1(3):3    Supercomputer Dialups~                        

1(3):4    The First Atomic Bomb              

1(3):5    ARPANet Military Subnets            

1(4):1    Whose Strike Was That Anyway?                       

1(4):2    The Trouble With Telemail                         

1(4):2     Electronics Create Portable Prisons~                        

1(4):3    Bell credit Card Abuse Soars~                

1(4):3    414's Plead Guilty~                 

1(4):3    Teller Machine Crime Coming~                        

1(4):3    A Word on Wiretapping~                 

1(4):3    Free Information in Trouble~                        

1(4):4    A True Saga of Teleconferencing          Moon            Electric

1(4):5    MCI Access Numbers & Mail Numbers                

1(5):1    The Simple Pleasures of a Step Office                    

1(5):2    IBM's Audio Distribution Systems Sure Can Be Fun!                  

1(5):3    Bank Records Aren't So Private~                    

1(5):3    Long Distance Option Timtable~                      

1(5):3    Intelpost an Astronomical Failure~                         

1(5):3    A 414 is Sentenced--Other Indicted~              

1(5):3    Victory for Wiretap Victims~                        

1(5):4   Defense Data Network Listing             

1(5):4    The Woes of Having a Small-Time Rural Phone Company                       

1(6):1    ARPANET Hopping: America's Newest Pastime                         

1(6):2    Electronic Switching Advantages                    

1(6):3    No More Free Info~               

1(6):3    2600 Writer Indicted~                       

1(6):3    E-COM is Going Away~                       

1(6):3    AT&T Limits Use of their Credit Cards~            

1(6):3    FCC Actions~                        

1(6):3   Computer Threat Causes Chaos in Albany~                     

1(6):4    The Dark Side of the Great Break-Up                      

1(6):5    E-COM Number List                   

1(7):1    """Look Out, He's Got A Computer!"""                  

1(7):2    MCI Mail: The Adventure Continues                       

1(7):3    Pay Telephones Deregulated~                                     

1(7):3    An Official Crackdown on Hackers~                       

1(7):3    Bell to AT&T: Get Lost!~             

1(7):3    Look Out For Sidney~                         

1(7):4    Introducing the Clear Box!                

1(7):5    TRW: Big Business is Watching You                

1(7):7    """You Must First Dial a One...""~"                   

1(7):7    Five Arrested in Phone Fraud~                

1(8):43  But How Does it Work?             

1(8):44  Big Brother No longer Watching Miami~            

1(8):44  The Rise of the Computer State by David Burnham Book Review            

1(8):45            Computers Seized as Summer Games Begin~             

1(8):45  Ice Cream Chain Aides Selective Service~                        

1(8):45  800 Directories Now Available~                       

1(8):45  ITT Wiping Out Fee~                

1(8):45            "Federal Express Offers "" E-Mail""~"                         

1(8):45  House: Hacking is Bad~               

1(8):45  More PC Jr's., Less Z-100's for Soviets~                         

1(8):46  Be Nice to Your Telco               

1(8):47  The Hackers Guide to Area Code                 

1(9):49  History of British Phreaking            Luthor            Lex & The LOD

1(9):50  More on Trashing: What to Look for, How to Act, Where to Go.       The Kid & Co. &            The Shadow

1(9):51  Private Directories Soon to be Available~                     

1(9):51  AT&T Faces Serious Money Problems~                     

1(9):51  Another Hacker Story~               

1(9):51  NSA Doesn't Feel Secure~                         

1(9):52                           

1(9):52  A Friend in High Places             

1(9):53  IBM ADS Directory               

1(10):55            Getting Caught: Hacker's View               

1(10):56            Vital Ingredients: Switching Centers and Operators                      

1(10):57            Oh No, Not Again!~                   

1(10):57            NSA Wants Better Phones~                        

1(10):57            Victimized by Crime Computers~                   

1(10):57            Sears Satellite Network~                      

1(10):57            Loopholes Around Wiretrap Laws~             

1(10):57            911 Suspect Hung Up~                 

1(10):59            Security Numbers                        

1(11):61            Exploring Caves in Travelnet                       

1(11):62            Fun With Fortress Fones              

1(11):63            One We Somehow Missed~                         

1(11):63            818 Here to Stay~                

1(11):63            Use of Wiretaps at Record Pace~                

1(11):63            Another FBI Computer File~                

1(11):63            Phones in the Sky~                     

1(11):63            Computer Foul-ups Hurt Social Security~                       

1(11):64                                   

1(11):64                                   

1(11):64                                   

1(11):65            IC and CIC Listing                    

1(12):67            MCI Mail & Western Union EasyLink              

1(12):67            A Time For Reflection                

1(12):68            E-Mail Horror Stories                

1(12):68            The Scariest Number in the World              

1(12):69            Video Telephone Invention~                      

1(12):69            SBS Offers Toll-Free Service~                

1(12):69            Federal Telephone System Upgrade~                      

1(12):69            "First of the ""Superminin""~"                      

1(12):69            Electronic Jail All Screwed UP~                

1(12):69            Penetrating the Pentagon by Phone~            

1(12):69            Computer Makes it Easy for Reagan~                        

1(12):69            Students Bog Down Computer~                     

1(12):71            E-Mail Listings            

 

 

2(1):1    Those Horrible Hackers Strike Again              

2(1):1            Wiretapping and Divestiture: A Lineman Speaks Out            Shadow            The

2(1):2    Getting In The Back Door: A Guide to Some Popular Operating Systems            Salerno            Mike

2(1):3    A Challenge to Hackers~                       

2(1):3    Fascist Computer Network~                      

2(1):3    GTE Hit by Divestiture~                   

2(1):3            GEISCO's New Toy~               

2(1):3    IRS Wants Access to Telco Data~               

2(1):4                             

2(1):4                             

2(1):4                             

2(1):6    BITnet Topology                        

2(10):65            And They Call US Crooks?            Switchman      Silent

2(10):65            An Interesting Diversion            Phreaker         Lord

2(10):66            More Info on VMS            Luthor, Lex      & the Legion of Doom

2(10):67            Navy Phone Phreaks Nabbed~                        

2(10):67            Navy Calls Dial-A-Porn~              

2(10):67            Two Inch Thick Bill~              

2(10):67            Computer Elections Examined~                     

2(10):67            Phone Booth Captures Man~              

2(10):67            Teelco Rats On Government~                 

2(10):69            Blue Box Schematic               

2(10):71            More Divesiture Woes~             

2(10):71            More Use of Phone Computers~                   

2(10):71            Campaign Contributions On-Line~                       

2(10):71            Fiber-Optic Network For Du Pont~                 

2(10):71            Hackers Have Big Business Scared~                         

2(11):73            Here's the Secret!            Switchman      Silent

2(11):73            RSTS: A Trick Or Two            Marauder, The            Phoneline Phantoms

2(11):74            "Equal Access May Not be ""Equal"" to Modems"            Shadow            The

2(11):74            The History of ESS            Luthor            Lex

2(11):75            Dial-it Sex Numbers Argued~                        

2(11):75            No Dial-it Calls For Feds~              

2(11):75            Big Deal for Little Town~             

2(11):75            Colomnist Attacks AT&T~                         

2(11):75            Springsteen Mania~                    

2(11):77            Test Numbers            Shadow            The

2(11):79            Free Kiddie Dial-It Calls~              

2(11):79            AT&T to Read E-Mail~               

2(11):79            Pacific Cable Planned~              

2(11):79            Police Dept. Wants Cellular Phones~                        

2(11):79            Rural Customers Denied Access~                        

2(11):79            Avoid Phones in Storms!~                        

2(11):80            The Early Phreak Days    Wood            Jim

2(12):81            Our Wishes For '86 and Beyond                    

2(12):82            Fun With COSMOS            Luthor, Lex      & The LOD

2(12):83            Inmates Handle Information Calls~              

2(12):83            Fawcett Phone Bill Too Big~                

2(12):83            BB Watching Without Regulation~                    

2(12):83            Cityphone Has the Answer~                       

2(12):83            Telco Service Spawns Racist Banter~               

2(12):83            French Phones Renumbered~                

2(12):83            No More Redialing?~                    

2(12):84            Survey Results            

2(12):85            BBS Listing             

2(12):87            AT&T Offers E-Mail~              

2(12):87            Dreams of GEnie~                      

2(12):87            Phones at High and Low Speeds~                 

2(12):87            Super Pay Phone~                   

2(12):87            Super Crisis Alert System~                        

2(12):87            German Phone System Stagnant~                      

2(2):10                           

2(2):11            Acronym List              

2(2):7    The Theory of 'Blue Boxing': their history, how their used, their future              

2(2):8            Trashing Alaska Style            Guy            The GCI

2(2):8            Surveying the COSMOS            Firemonger      

2(2):9    "AT&T Keeps ""800"" Data To Itself~"                       

2(2):9    Phreak Roundups~                     

2(2):9    TRW Breacheed by Non-Hackers~               

2(2):9    2600 Bulletin Board Online              

2(2):9    This Month's Mischief and Mayhem~                      

2(3):13  Nazi BBS a Challenge to Hackers                         

2(3):13  Are You a Phreak???            Gamma            Bob

2(3):14  How to Get into a C.O.            Kid,            the & Co.

2(3):15  I.R.S. Computers Screw Up~                    

2(3):15  The Next Step in Custom Calling~                         

2(3):15            Industrial Espionage Seminar~                       

2(3):15  Kenya Pay Phones Prove Popular~              

2(3):15  This Month's Troublemakers~                       

2(3):15            Computel Does Exist~                

2(3):15            Redemption for a Hacker~                        

2(3):15  A Mechanical Hacker~                        

2(3):16                           

2(3):16                           

2(3):16                           

2(3):18  CNAs                

2(3):20            Hacking Packard            Agent 003       Boic

2(4):19  A Phone Phreak Scores             

2(4):19  What a White Box Can Do                   

2(4):21  Silver Pages~            

2(4):21  Real Life War Games?~                       

2(4):21            Overseas Pirates~                     

2(4):21  'Santa Fraud'~            

2(4):21            Hackers Go Free~                     

2(4):21  Good Apples for the Soviets~                         

2(4):21  At the Last Stroke...~               

2(4):21  Robot Kills Man~                     

2(4):23  Net Addresses                      

2(5):25  People Express to be Hacked to Pieces  Estev            Paul G.

2(5):26  How to Run a Successful Teleconference            Shadow            The

2(5):27            Mystery Transistor~                  

2(5):27  Police Hacker Cleared~                        

2(5):27  414 Bust~              

2(5):27  Carrier Choosing Time~                       

2(5):27            """Crackers"" Cracked~"                     

2(5):27  Yellow Scam~             

2(5):27  MCI Goes to U.K.~               

2(5):27  Reagan Hangs Up on Kids~              

2(5):27  Dial-a-Directory~                     

2(5):28                           

2(6):33  A Guide to the Israeli Phone System            

2(6):34            Sherwood Forest Shut Down by Secret Service            

2(6):34  Out of the Inner Circle--A Review            

2(6):34  Some Words on Hacker Morality                         

2(6):35  Bell Didn't Invent Phone?~                        

2(6):35  Porno Phone Service Busted~                         

2(6):35  IRS Drives Telco to Drink~             

2(6):35  AT&T Computer Caught Stealing~                        

2(6):35  Jersey Wins Wiretap Race Again~                  

2(6):36                           

2(6):37  800 Prefixes Listed by States                        

2(6):39  Thai Phone Books a Hot Issue~                     

2(6):39  AT&T Contractual Obligations~                   

2(6):39  TINA Message Service~                        

2(6):39            Problems for New Pay Phones~                  

2(6):39  Say Goodbye to Meter Readers~                       

2(6):39  New Tracking Device For Cars~              

2(6):39  """Call Me"" Card~"                  

2(6):40  From Sherwood Forest: Intro to Hacking                         

2(7):41            Interesting Things to do on a DEC-20            Shadow            The Knights of

2(7):42  Banking from your Terminal--A Look at PRONTO            Buggy            Orson

2(7):43  More Phone Fraud~                

2(7):43            Computers Monitor Truckers~                      

2(7):43            Listening In On Cellular Phones~                        

2(7):43  GTE Sprint Cheats Customers~                   

2(7):43  ITT Crackdown~                  

2(7):43  $2 Billion Error~                 

2(7):43  Missing Children's Faces Displayed~                     

2(7):45            MILNET TAC Dialups by Location                    

2(7):47  IBM Gets Bigger/Goodbye SBS~               

2(7):47  GTE Now Bigger than AT&T~                  

2(7):47  AT&T Put On Hold~                 

2(7):47  E-COM Really on the Way~              

2(7):47  The First 100% ESS State~              

2(7):47  MCI Expanding With Optical Fibers~               

2(7):47  NSA Chooses AT&T Computer~                     

2(8):49            SEIZED! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers                         

2(8):50            Commentary: The Threat to Us All                       

2(8):51  New Phone System for Courthouse~                       

2(8):51  2600 A Hacking Victim~                         

2(8):52  Moving Satellites Right Up In the Blue...What Was Really Going On?                     

2(8):54  Why Computers Get Snatched                        

2(8):55  How Can Sysops Protect Themselves?                  

2(9):57  A Guide to VMS            Luthor, Lex      & The L.O.D.

2(9):58  The Infinity Transmitter--An Old Bug that Had Its Time            Howard           

2(9):58            Reaching Out On Your Own     Ranger            Forest

2(9):58  Pursuit For People                     

2(9):59            "Trouble with 800 ""Word Numbers""~"                  

2(9):59  Private Sector Update~              

2(9):59  Pitcairn Island Now On AT&T Net~                  

2(9):59  War Game Addict~                

2(9):59  Phone-in Registration for College~                   

2(9):59  Hacker Extortionist Caught~                         

2(9):60                           

2(9):61  Telenet Directory            Luthor            Lex

2(9):63  Europe Standardizing Telecoms~                     

2(9):63  Bell Propaganda Films~             

2(9):63  Pest Control~                        

2(9):63            Directory Assistance By Computer~               

2(9):63  Dick Tracey Toys Are Closing In~              

3(1):1    Private Sector Returning                       

3(1):1    The Basics: Divestiture: What Happened?                    

3(1):3    Phone Booth Wins Again~            

3(1):3    Five Aliens Hung Up~                 

3(1):3            Technology Nabs Hooky Players~                       

3(1):3    Home Computer Attacks Falwell~                         

3(1):3    Another Astronomical Phone Bill~                    

3(1):3    Dial-A-Porn Update~                

3(1):3    AT&T Does it Again~               

3(1):3    Phone Service Via Radio Shack~                 

3(1):3            Overcharge Hunters Needed            

3(1):4                             

3(1):5            Programs in BASIC                 

3(1):7    New VAX Announced~                  

3(1):7    New Payphones Confuse Callers~                         

3(1):7    Your Own Private Centrex~                       

3(1):7    Security Software~                      

3(10):73            Trashing: America's Source For Information            Dragon            The

3(10):73            Death of a Pay Phone            MAD! 

3(10):75            "Indiana ""Fones"" Are Gone"              

3(10):75            FBI Investigates Coffee Machine~                      

3(10):75            CIS Copyrights Public Software~                      

3(10):75            Navy Software Available~                     

3(10):75            HBO Encryption Broken~                        

3(10):75            Pennant Ties Up Phones              

3(10):75            Security Can Kill Creativity                       

3(10):76                                   

3(10):76                                   

3(10):76                                   

3(10):77            2600 Information Bureau            

3(10):79            NSA Wants a New Chip                

3(10):79            Electronic Tax Returns~                        

3(10):79            ESS Goes To Taiwan            

3(10):79            Rural Ultraphones~                 

3(10):79            Poor Service An Understatement~                     

3(10):79            Software Makers Crash BBS~              

3(10):79            Local Toll-Free Numbers~                      

3(10):80                                   

3(10):80                                   

3(11):81            ICN--More than a Bargain            

3(11):82            Mastering the Networks                       

3(11):83            Voice of Reagan Tortures Patients~                       

3(11):83            FBI Actions Anger Parents            

3(11):83            """Q"" and ""Z"" Controversy Rages~"                         

3(11):84                                   

3(11):84                                   

3(11):84                                   

3(11):85            2600 Information Bureau            

3(11):86            Wrath of God Strikes 2600                

3(11):87            Sprint--Too Many Customers~                   

3(11):87            More Magic Buttons~              

3(11):87            New Payphone Service for Michigan~                      

3(11):87            Nickname Listings In Small Town~                  

3(11):87            Computer College                      

3(11):87            More Banks Link Arms~             

3(11):88                                   

3(11):90            How Cellular Phones Came About and What You Can Expect                    

3(12):89            A Look at the Future Phreaking World: Cellular Telephones--How They Work               

3(12):91            Loophole in Wiretap Law                

3(12):91            "Telco Sasys ""Pay for Tones""~"                      

3(12):91            North Carolina #1 in Hacking                         

3(12):91            Phreaks Tie Up Lines~                

3(12):91            Computers Threaten Privacy~                        

3(12):91            How Not to be Rejected~                      

3(12):91            International Hacking~               

3(12):92                                   

3(12):93            2600 Information Bureau            

3(12):95            Who Wants to be Swept?~                        

3(12):95            Free Directories For Bigwigs~                       

3(12):95            PC Pictures~                       

3(12):95            Fingerprint Identification System~                        

3(12):95            Buy My Wires~            

3(12):95            Navigate With a CD~                

3(12):95            IBM Braille Compatible~                   

3(12):96                                   

3(2):1    A Unique Obscene Caller~            

3(2):10  Dial Back Security                

3(2):10  It Could Happen to You!                       

3(2):11            "Teenagers ""Abuse"" Party Line~"                  

3(2):11  The Scoop on Pen Registers~                     

3(2):11            Reporters Steal Swiss Phones~                        

3(2):11  Pay Phone Causes Panic~             

3(2):12                           

3(2):12                           

3(2):13            Numbers                      

3(2):15  Cellular Phones in England                         

3(2):15            Acoustic Trauma                       

3(2):15  Infrared Beeper Will Find You                        

3(2):15  Bell Atlantic & MCI Collaborate~                  

3(2):15  Write Protect Tabs Wrong~                         

3(2):15  Sprint Unites with US Telcom~                        

3(2):15            Electronic Tax Returns Are Here                       

3(2):16                           

3(2):9    VMS--The Series Continues            Luthor, Lex      & The Legion of Doom/H

3(3):17  An Overview of AUTOVON and Silver Boxes              

3(3):17  An American Express Phone Story    Holmes            Chester

3(3):18  Final Words on VMS            Luthor, Lex      & The L.O.D.

3(3):19            Computer Password Kept Secret                   

3(3):19  New Ways of Stealing Data~               

3(3):19  Who Called the Shuttle?~                       

3(3):19  Soviets Denied Computer Access~                        

3(3):19  Hacker Zaps Computer Marquee~                      

3(3):20                           

3(3):22            22013664431--Call it!                

3(3):22  This Month at 2600                

3(3):23  Dial the Yellow Pages~               

3(3):23            Northern To Destroy COs                

3(3):23  There are More Phones than Ever                

3(3):23  TASS News Service~              

3(3):23  Soviet Computer Update~                        

3(3):23  Satellite Jamers Jammed~                       

3(4):25  RSTS For Beginners            Marauder         The

3(4):26  Mobile Phones--Theory and Construction            Researcher      The

3(4):27  Marcos Phones For Free~              

3(4):27  Car Breathalizers~                

3(4):27  Bad Tenant Database~                     

3(4):27  Phone Phreak Fined~                

3(4):27  Man Worries About Sprint Bill~                     

3(4):27  British Phonebooth Wedding~                      

3(4):28                           

3(4):28                           

3(4):29  A Story of Eavesdropping                

3(4):30  This Month At 2600               

3(4):31  617 Will be Divided~                   

3(4):31            Congress Chooses AT&T~                         

3(4):31  Equal Access 800 Drawbacks~                  

3(4):31            Encryption Provides Signature~                     

3(4):31            Directory Assistance Failure~                         

3(4):31  "Dial ""00"" For Operator~"                     

3(5):33  Exploits in Operator Hell            Phreak, The Alaskan            (TAP)

3(5):34  The Computel Scoop                       

3(5):35            Computer Grammer~                 

3(5):35  Cellular Modem~                        

3(5):35  High Tech Parking Meters~~                       

3(5):35  US and France Link Phones~                        

3(5):35            Congressional Computer~                     

3(5):35  Shower Phone?~                        

3(5):36                           

3(5):36                           

3(5):36            Bellcore Publications Go Public~                     

3(5):37            AUTOVON Numbers              

3(5):38            BOXING ON ITT                     

3(5):39  Sting Boards on the Rise~               

3(5):39  Beware of Hacker Terrorists~                     

3(5):39  Patients May Get to Keep Phones~               

3(5):39  Bogota, Columbia Gets Extra Digit~                   

3(5):39            American Network Fears Hackers~                       

3(5):39            Wrestlemania Pins Bell~               

3(5):39  Free Pay-Phones Plague New Jersey~            

3(6):41            Computer Crime Review            

3(6):42  How to Hack A Pick                  

3(6):42  Book Review Nothing New in Computer Underground by M. Harry            Drake            John

3(6):43  Public Phone Secrecy~                       

3(6):43  Big Computer Crime Pays~                  

3(6):43  Capitol Hill Hacker~                  

3(6):43            Citybank Money Games~                         

3(6):43  New York's Computer Law~              

3(6):43  $6,829 Phone Bill~                    

3(6):44                           

3(6):44                           

3(6):45            Numbers...Long Since Changed                        

3(6):46            Computer Crime Resources Guide               

3(6):47  Hands Acress Telenet~                        

3(6):47  Kiev Calling Clogged~                       

3(6):47  """Ed Quinn Cell Site""~"            

3(6):47  Nynex Bumps Southwestern Bell~               

3(6):47  Stock Market Crash~               

3(6):47  Let's Move to France!~                        

3(6):48                           

3(7):49            Violating A VAX            Baalzebub        

3(7):50  The Free Phones of Philly    Holmes            Chester

3(7):51            Computers Strike Again!~                         

3(7):51            Prisoners Break Law~               

3(7):51  Town on Hold During Strike~             

3(7):51            Hackers Degree?~                    

3(7):51  New Jersey Tops Taps~              

3(7):51  SS Number Returned to Citizens~                        

3(7):51            "Federal Employees ""Tracked""~"                 

3(7):51  Ex-Fed Tapped            

3(7):52                           

3(7):53  Country Codes              

3(7):55  Indiana Telco Threatens AT&T~                         

3(7):55            Automated Operators Coming~                        

3(7):55  Cellular Dial-By-Voice~              

3(7):55  New British Phone Service~                        

3(7):55  No Data Protection for Hong Kong~             

3(7):55  74,000 Calls to Fraud Line~               

3(7):55  Federal Phone Failures~                       

3(7):55  AT&T Selling Pay Phones~                        

3(8):57            Knowing UNIX            Kid, the & Co.  

3(8):58  A Trip to England            Drake            John

3(8):59  LD Companies Strike Back~                  

3(8):59  The Ghost in the Machine~                      

3(8):59  Leave Our Poles Alone!~                         

3(8):59  BB Watching VDT Operators~                    

3(8):59  Phone Fraud in Governor's House~            

3(8):59  Phone Booths Mauled The Stolen~                   

3(8):60                           

3(8):60                           

3(8):61  2600 Information Bureau            

3(8):62  Count of Exchanges per Area Code               

3(8):63            Government Phone Fate?~             

3(8):63  Rural Radio Phones~               

3(8):63  TV Blue Boxes~                  

3(8):63  Cash Machines Are Popular~                        

3(8):63  USSR Computer Hungry~                        

3(8):63  ATM's in China~                       

3(8):63            """Debugging"" Phones~"                       

3(8):63  New Chip Helps Sprint~             

3(9):65  Some Facts on Supervision            Kid, The & Co.       

3(9):65  RCI & DMS-100 Bugs              

3(9):66  Another Stinger Is Stung              

3(9):67  Indian Phones Under Siege~             

3(9):67  Poor Connection Starts Bomb Scare~             

3(9):67            """Signature"" On Video Transmitters~"               

3(9):67            Crosstalk Saves Old Lady~              

3(9):67  BB Traffic Cop~                  

3(9):67            Hackers on Shortwave~                   

3(9):67  NSA Drops DES~                  

3(9):67  FBI Shoping List~                 

3(9):68                           

3(9):68                           

3(9):69  2600 Information Bulletin            

3(9):71  Call Rejection in Natchez~                       

3(9):71  "FCC Gives Away ""Resource"""                 

3(9):71  AT&T Best For Hackers~                       

3(9):71            Portable VAXes!!!                   

3(9):71            Computer Clothing                     

3(9):71            Messages on the Move~             

3(9):71  GTE Sprint Overbills~                      

3(9):72                           

4(1):10  Cell Site Frequencies                   

4(1):12                           

4(1):12                           

4(1):13                           

4(1):18                           

4(1):18                           

4(1):20  Phones              

4(1):4    TAP: The Legend is Dead    Catalyst            Cheshire

4(1):6            Stumbling into Control on a VMS            Mole            The

4(1):8    The Telecom Informer            Foley            Dan

4(10):10            International NUA's            Greek            The

4(10):11            South African BBS's            Greek            The

4(10):12                                   

4(10):14            Those Silly Codes                     

4(10):16                                   

4(10):17                                   

4(10):18            Whoops [errata for 4(9)]              

4(10):4  New York's IMAS            Mac+  

4(10):6  Telco Response                       

4(10):7            Telephone Company Responds to Criticism of Touch-tone Fees            Reisman          Bruce

4(10):8  The Telecom Informer            Goldstein         

4(11):12                                   

4(11):12                                   

4(11):12                                   

4(11):13                                   

4(11):4            Hacking IBM's VM/CMS            Luthor, Lex      & The Legionof Hackers

4(11):6  US Social Security Prefixes            Jockey            Disk

4(11):7  "A Review of ""The 'Top Secret' Registry of US Governemt Radio Frequencies"            Icom            Mr.

4(11):7            Listening In: Catch Me if you Can!            Master            LNA

4(11):8  The Telecom Informer            Staff    

4(12):10            All About BLV: Busy Line Verification                    

4(12):12                                   

4(12):12                                   

4(12):17            Social Interaction with Phones Taylor            Dave

4(12):18            Roman Hackers            Rome            Hal from

4(12):20            More Long Distance Unpleasantries               

4(12):21            Some Numbers                        

4(12):22                                   

4(12):3            Important News                         

4(12):4            Hacking IBM's VM/CMS--Part Two     Luthor, Lex      & The Legionof Hackers

4(12):8  The Telecom Informer                        

4(2):13                           

4(2):13                           

4(2):15  "Book Review: ""The Hacker's Handbook"""            Dutton            Roland

4(2):18  New Developments                

4(2):21  "Book Review: ""Automatic Teller Machines III"""            Phreaker         Lord

4(2):4    An Interview with Hugo Cornwall: British Hacker/Author            Drake            John

4(2):6    Some Cosmos Documentation That May Be Useful  William            Sir

4(2):8    The Telecom Informer            Foley            Dan

4(3):10  Still More on the World of COSMOS            RNOC, Bill From            Legion of Doom

4(3):12                           

4(3):18                           

4(3):2    Reach Out and Touch a Nuclear Weapons Contractor                     

4(3):4    The Ballad of Captain Crunch            Agranoff          Mike

4(3):6    Getting the Most Out of Equal Access            Hobbit            The

4(3):8    The Telecom Informer            Foley            Dan

4(4):10  CNA Numbers                        

4(4):15  Word Numbers                        

4(4):16  Goings On                   

4(4):20                           

4(4):21                           

4(4):4            Computel Put to Sleep                

4(4):6            Hacking PC Pursuit            Catalyst            Cheshire

4(4):8    The Telecom Informer            Foley            Dan

4(5):10  Telenet Addresses            Hackers           Legion of

4(5):12                           

4(5):13                           

4(5):14  FAX: A New Hobby            S.            Bernie

4(5):17                           

4(5):22  A Pen Register For Phreaks?: Product Review--Dialed Number Recorder            Goldstein            Emmanuel

4(5):4    More VAX Tricks            America            Mainstream

4(5):6            CLASS: What It Means To Us            Videosmith      The

4(5):8    The Telecom Informer            Freeman          John

4(5):9    Phoning Home From Europe            Lineman          The

4(6):12                           

4(6):13                           

4(6):18                           

4(6):4    Allnet: A Horror Story            Yuhas            Mike

4(6):5    Paging For Free            S.            Bernie

4(6):6    A HAcker's Guide to the TSPS Console            Marauder, The  & The L.O.D.

4(6):8    The Telecom Informer            Foley            Dan

4(6):9    More Telenet Addresses                      

4(7):12                           

4(7):12                           

4(7):13                           

4(7):13                           

4(7):15  2600 Exposes New York Tel                        

4(7):17  Did You Know?                   

4(7):18                           

4(7):21  Saudi Arabian BBS List       Rocker            The Veteran Cosmic

4(7):4    Cellular Phone Fraud and Where It's Headed S.            Bernie

4(7):6    How Phone Phreaks are Caught            Severence         No

4(7):8    The Telecom Informer            Goldstein         

4(8):10            Capturing Passwords            Toad            Texas

4(8):11  AT&T Sub Maps            S.            Bernie

4(8):12                           

4(8):15  A Hacker Survey               

4(8):16  Telenet Letter              

4(8):20  The Cold Truth                     

4(8):3    The Summer Games of 87                

4(8):4    TRW Credentials Lack Credibility            Valve            Rex

4(8):6            Numbers of Interest            Phreak            Nynex

4(8):8    The Telecom Informer            Goldstein         

4(8):9    "FBI Revealed: Reviews--""The FBI Project Newsletter"" & ""The FBI and Your BBS"""            Goldstein            Emmanuel

4(9):10            England's Mass Announcements            Drake            John

4(9):12                           

4(9):13                           

4(9):14            Decrypting Password Security                         

4(9):22  Review: CO Magazine            Murphy            Dan

4(9):4            Worldnet: Getting Closer Every Day            Hank@Taunivm.Bitnet 

4(9):6            Operating With Difficulty            Wintermute    

4(9):8    The Telecom Informer            Fresco            Al

5(1):15            Weathertrak Codes                    

5(1):16  An Interpretation of Computer Hacking            Zap            Captain

5(1):20            "BASIC ""Wargames Dialer Program"""                     

5(1):22  From the 2600 Files                 

5(1):24 (L)                               

5(1):24 (L)                               

5(1):25                           

5(1):26 (L)                               

5(1):27 (L)                               

5(1):30  ROLM Phone System Creates a Nightmare                      

5(1):37            Happenings                 

5(1):4            Monitoring Phone Calls With A TVRO               

5(1):42            AT&T/BOC Routing Codes              

5(1):8            VM/CMS Corrections            Guru,            VM

5(2):13  Building a Red Box            Dobbs,            "J.R. ""Bob"""

5(2):16  A Reader's Reply to Captain Zap            Grapefruit,        Rancid

5(2):2    Allnet's Legal Problems              

5(2):24 (L)                               

5(2):27 (L)                               

5(2):39                           

5(2):4    A Form of Protection For You and Your Computer            Greenberg       Ross M.

5(2):44  Fun Phone Numbers                       

5(2):8    The Dark Side of Viruses Plague            The

5(3):10  What's Going On With Phones/Computers                   

5(3):14  The 516 Area Code in Detail              

5(3):20  NSA Memo              

5(3):22  BASIC Red Box Tones            Tommy

5(3):23            Ccanadian WATS Phonebook            Tommy

5(3):27 (L)                               

5(3):4    Outside Loop Distribution Plant, or Hands-On Experience            Agent 04,            Phucked

5(3):8    Cellular Update Glitch,            The

5(3):9    Who the Hell was Almon Strowger, Anyway?            Strowger,        Almon, Jr.

5(4):10  MCI: The Phone Company With A Lot of Explaining To DO                  

5(4):12  A Hacker's Guide to UNIX            Knight,            Red

5(4):19  How to Hear Phone Calls                

5(4):30  What it's Like to be a Soviet Operator            Solomenko,      E.

5(4):34  An Interview With the Chaos Computer Club            Drake,            John

5(4):4    A Report on the Internet Worm            Page,            Bob

5(4):42            Hardwiring Your Way In            Williams,          Dr.

5(4):45  Book Review: Tune in on Telephone Calls by Tom Kneitel            Scannon,          Lou

6(1):12  Ever Wonder Who Owns All Those 800 Numbers?            Statton,            Scott

6(1):24 (L)                               

6(1):25 (L)                               

6(1):3            Hackers In Jail            

6(1):30  How Payphones Really Work            Infidel,            The

6(1):36  Ripoffs & Scams~                     

6(1):7    General Information                    

6(2):20            Exchange List: 201 Area Code            Infidel,            The

6(2):22            Scanning For Calls            Upsetter,          Mr.

6(2):24 (L)                               

6(2):26                           

6(2):26 (L)                               

6(2):29 (L)                               

6(2):3            Remember....              

6(2):32  Tips On Trashing            Williams,          Dr.

6(2):34  The Sprint Gestapo Strikes Again!            P.,            Larry

6(2):35  Chinese Snitch Numbers              

6(2):36  Spanish Phones--and what they don't do         Bruce,            Peter

6(2):38  WORM            Gray,            Jeff

6(2):4    A Guide to PRIMOS            Violence         

6(2):42            Reviews: The 1989 Pirate Directory            Estev,            Paul

6(2):43  "The New ""TAP"""            Goldstein,            Emmanuel

6(2):45                           

6(3):10  The Galactic Hacker Party               

6(3):12  British Telecom: Guilty              

6(3):13  The Death of COSMOS?                    

6(3):14  News~              

6(3):20  4TEL                 

6(3):24 (L)                               

6(3):24 (L)                               

6(3):27                           

6(3):28 (L)                               

6(3):3            Competition...It's the next best thing to being there                 

6(3):32            REMOBS        Infidel,            The

6(3):33            Gee...GTE Telcos                      

6(3):36  Voice Mail Hacking...NYNEX Style            Aristotle         

6(3):37            Punching Pay Phones            Micro Surgeon /            West Coast Phreaks

6(3):39  Lair of the INTERNET Worm            Overlord,          Dark

6(3):4    "Grade ""A"" Hacking"            Plague,            The

6(3):42  Carrier Access Codes                

6(4):14  More Hacking on Primos            Violence         

6(4):20  How to Build a Silver Box            Upsetter,          Mr.

6(4):30 (L)                               

6(4):4    The Day the Phone System REALLY Died              

6(4):4    More On Hacking UNIX   Knight,            Red

6(4):43 (L)                               

6(4):44  NPA Countdown                    

6(4):45  UAPC Update Plague,            The

6(4):6    Our Ever-Changing World~            

6(4):9            NYNEX Data Plague,            The

6(4)27 (L)                                

7(1):12  Toll Fraud Detection Techniques            Phreaker, Phantom &            Doom Prophet & LOD!

7(1):14  Building a DTMF Decoder            B/Square          Mr. Upsetter

7(1):19  Silver Box Born in U.K.     Gam,            Tamlyn

7(1):19            Listening In            Upsetter,          Mr.

7(1):23  News Update~                        

7(1):24 (L)                               

7(1):29  (L)                              

7(1):3    For Your Protection              

7(1):30 (L)            The Facts on 10698               

7(1):37  The Scoop on 911            Goldstein,            Emmanuel

7(1):38  Fun and Games at a 2600 Meeting                 

7(1):40  Data Network Identification Codes              

7(1):44  The 707 Area Code            Lurch  

7(1):45  Book Review: The Cuckoo's Egg            Dr. Williams           

7(1):8    The Secrets of Mizar    """Q"","            The

7(2):10  What in the EFF?                        

7(2):11            Negative Feedback                    

7(2):14            PRIMOS: The Final Part            Violence         

7(2):20  An Introduction to COCOTS            Plague,            The

7(2):3    A Bittersweet Victory            

7(2):38  News Update            

7(2):4    The Neidorf/Phrack Trial: Day by Day      Meyer, Gordon &            Jim Thomas

7(2):8    An Interview with Craig Neidorf                 

7(3):10  An Interview with Dorothy Denning            Williams,          Dr.

7(3):16  New Revelations From Bell South            Goldstein,            Emmanuel

7(3):22            Defeating Trap Tracing            Thunder,          Lord

7(3):27 (L)                               

7(3):29 (L)                               

7(3):29 (L)                               

7(3):30 (L)            Wiretap Clarification (L)              

7(3):32            Converting a Tone Dialer into a Red Box            Clayton,            Noah

7(3):36  Building a Telephone Induction Coil                 

7(3):39  The Definitive ANAC Guide                 

7(3):42  An Algorithm for Credit Cards            Crazed Luddite &            Murdering Thug K001/Ra

7(3):44  Facts and Rumors                   

7(3):5    Caller ID: The Facts            """The Snake"","            Jake

7(3):8            Network 2000 Saga Continues                       

7(4):12  Central Office Operations            Steal,            Agent

7(4):16  Leaked Documents                    

7(4):22            Anatomy of a rip-off                  

7(4):25            algorithm for credit cards correction                       

7(4):27 (L)                               

7(4):28 (L)                               

7(4):32  Our Contest Winners            TELEgodzilla  

7(4):36  The Word On the Street~            

7(4):4    A Political Hacking Scandal            

7(4):43  Fraud Alert                

7(4):6    A Hacking Reading List                   

8(1):11  The Terminus of Len Rose            Neidorf,            Craig

8(1):16  Soviet BBS List                        

8(1):17  Phone Numbers Supplied by Readers                         

8(1):19  Whats up~                  

8(1):31  UNIX Password Hacker Infidel,            The

8(1):36  Looking Up IBM Passwords            Mitnick,            Kevin

8(1):4    In Pursuit of Knowledge: An Atari 520ST Virus    Panda,            Paranoid

8(1):40  Internet Outdials            Kevin  

8(1):42  The New LEC Order: Acronym City            City,            New Hack

8(2):11  Death of NYNEX Business Centers            Anonymous   

8(2):12  Hacker News~            

8(2):14  Build A Tone Tracer            Upsetter,          Mr.

8(2):16            Hacking MCIMAX            Mouse,            MCI

8(2):18  Inspect Implementation               

8(2):22  The Class Struggle                

8(2):24                           

8(2):28 (L)                               

8(2):31  BIN List                  

8(2):32  Secret Frequencies            S.,            Bernie

8(2):35  411--News About Phone Companies~                   

8(2):4    Where Have All the Hackers Gone?              

8(2):42  When Hackers Ride Horses: A Review of Cyberpunk            Advocate,         The Devil's

8(2):42  Pure Cyberfiction, Says Mitnick            Mitnick,            Kevin

8(2):44  Outdials            Runner,            Net

8(2):46            Prisoner Update                        

8(2):7            Magnetic Strips Abuse,            Dr.

8(3):14  The Hacker Video                

8(3):18            Protecting Your SSN            Hibbert,            Chris

8(3):22            COCOT Numbers                    

8(3):24  Where One Hacker Went (L)            Luthor,            Lex

8(3):25                           

8(3):26                           

8(3):31  Tidbits~                       

8(3):32  USPS Hacking            Advocate,         The Devil's

8(3):38            Psychology in the Hacker World            Woodstein,       Condor

8(3):4    Why Won't They Listen?            

8(3):43  More Conversion Tricks   DC      

8(3):44  Useful UNIX Programs            Plann,            Marshall

8(3):6    Simplex Locks   Skinner, Scott &            Emmanuel Goldstein

8(4):11  Crypt() Source Code            Dust    

8(4):16  Birth of a Low Technology Hacker Eye            Roving

8(4):18  Mobile Frequencies            Esper   

8(4):21  Simplex Update and Corrections                    

8(4):21  USPS Hacking Corrections                    

8(4):29 (L)                               

8(4):31  Class Features            Kurtz,            Colonel Walter E.

8(4):33            COCOT Corner                        

8(4):36  An Appeal For Help     Neidorf,            Craig

8(4):39            ANALYSIS: Gulf War Printer Virus            Anonymous   

8(4):40 (L)                               

8(4):42  U.S. Phone Companies Face Built-In Privacy Hole                  

8(4):44  FM Wireless Transmitter                    

8(4):45  FM Telephone Transmitter                    

8(4):46  Human Database Centers PW     

8(4):5            Computer Security at the Bureau of Prisons            

8(4):8    Stuff You Should Be Interested In~            Fellpe Rodriquez &            Rop Gonggrijp

9(1):12            Hacking WWIV                       

9(1):16  How to Use Your Silver Box            Scientist,          Mad

9(1):17  Real Important Frequencies                   

9(1):18  UNIX Password Hacker: An Alternative Approach            Jockey,            Keyboard

9(1):20  How to Take Apart A Payphone            Monk,            The

9(1):27                           

9(1):31  The Australian Phone System            Caller,            Midnight

9(1):35  A Way To Catch Peepers            X            Alien

9(1):36  Review: Hacker: The Computer Crime Card Game            Advocate,         the Devil's

9(1):38  Looking for Simplex Locks?            

9(1):4    An MS-DOS Virus            Panda,            Paranoid

9(1):42  The Latest~            

9(1):45            Fascinating fone fun            Frosty of the GCMS   

9(1):7    L.A. Law                

9(1):8    A Batch Virus            Frosty of the GCMS   

9(1):9    Virus Scanners Exposed            Delam,            Dr.

9(2):10            Hitchhiker Guide to the Phone System Phreaking in the Nineties            Billsf    

9(2):15  Product Review: Do It Yourself Demon Dialer Kit (Hack-Tic Technologies)            Advocate         The Devil's

9(2):18            Belcore's Plans for Caller ID                       

9(2):19  Fun Things to Know              

9(2):22  Here We Go Again                 

9(2):24  Here They Are                       

9(2):31  How the Defeat *69            S.            Bernie

9(2):38  The View of A Fed            Fed            The

9(2):4    On The Road Again: Portable Hacking                         

9(2):40  Book Review: The Devouring Fungus (Tales of the Computer Age)            Benedict           W. Ritchie

9(2):42  Voice Mail Hacking            Ranger            Night

9(3):13            Shopper's Guide to COCOTS            Zero,            Count

9(3):17  Review: Sneakers            Goldstein,            Emmanuel

9(3):19  A Simple Virus in C            Infiltrator        

9(3):28 (L)                               

9(3):31            Hacking on the Front Line      Capone,            Al

9(3):36  Using the Telephone                

9(3):4            Hacking AmiExpress            Man            Swinging

9(3):40 (L)                               

9(3):42  Getting Started  Prefect,            Phord

9(3):43  Toll Fraud: What the Big Boys are Nervous About            Zero,            Count

9(3):9            Defeating Callback Verification            Delam,            Dr.

9(3)21   Review: The Hacker Crackdown            Advocate,         the Devil's

9(4):11  Vehicle Identification Numbers                        

9(4):12  U. S. Secret Service Field Offices            MechWariors    GCMS

9(4):13  Letter From Prison                   

9(4):17  Growth of a Low Tech Hacker Eye            Roving

9(4):19  "The Hacker ""Threat"""                     

9(4):19  High Tech Happenings                    

9(4):26            Feedback                    

9(4):33  A Blast From the Past                

9(4):36  Is AT&T Hiding Near You?                     

9(4):4            Hackers in the World of Malls: Secret Service Behind Harassment of 2600 Meetings  

9(4):42  Telco News              

9(4):45  Product Review: Speach Thing            Phreaker         Cray-Z

9(4):6    Cipher Fun       Rabbit            Peter

9(4):8            Beginner's Guide to Minitel            NeurAlien        

10(1):12            Trouble in the White House   Zee            Charlie

10(1):14            Beige Box Construction            Phoenix,           The

10(1):16            Descrambling Cable            Phorester,        Dr. Clayton

10(1):18            Secret Service on Trial            Nathan,            Paco Xander

10(1):23            One Angry Judge            Skinner,            Scott

10(1):34            Acronyms A-G            Echo    

10(1):38            A Study of Hackers            Williams,          Dr.

10(1):4  Cellular Magic   Bootleg

10(1):42            Getting Your File...            Bayonet          

10(1):43            Lawsuit Filed Against Secret Service                

10(1):44            British News   Knight,            The Dark

10(2):12            British Credit Holes                   

10(2):13            High School Hacking            999,            The

10(2):14            Product Review: TDD-8 DTMF Decoder            Inconnu,           Les

10(2):16            Meeting Advice  Check,            Parity

10(2):17            Meeting Advice  Velcro,            Romula

10(2):20            Acronyms H-R            Echo    

10(2):36            Telco Offices            

10(2):39            Government Bulletin Boards             

10(2):4  A Guide to the 5ESS            G.R.A.S.P.,     Crisp

10(2):40            Video Review: Assorted Videos            Goldstein,            Emmanuel

10(2):42            Toll Fraud Device                 

10(2):44            ANSI Bomb   Galaxy,            Mister

10(2):45            News Update            

10(3):12            Caller ID Technologies            Menace            Hyperborean

10(3):18            Meeting Mania              

10(3):19            Never Erase the Past            Goldstein            Emmanuel

10(3):20            How to Hack Honesty            Source,            U. R,

10(3):34            Changing Your Grades on A High School Computer            Drewl/Salivate

10(3):36            An Overview of DSS1    Cruise-CTRL  

10(3):38            Book Review: Approaching Zero     Resz            Stepher J.

10(3):4              Hacking at the End of The Universe                 

10(3):4              Congress Takes a Holiday            

10(3):42            More Cellular Fun            Gerard            Judas

10(3):44            Acronyms s-x (no y or z)         Echo    

10(3):9              True Colors   Billsf    

10(4):10            Know Your Switch            Rebel   

10(4):11            Hacking Smartphone            Rat,            Tech

10(4):15            High School Mac Hack    Bard,            The

10(4):16            Hacking Computer Shows  Jaffee,            Walter S.

10(4):18            Nynex Voice Mail                     

10(4):22            The Magical Tone Box            FyberLyte       

10(4):32            Passageways to the Internet            

10(4):35            More Meeting Advice            Judicator of D.C.          

10(4):37            Book Review: Virtual Reality            Benedict,          W. Ritchie

10(4):38            Digital Locks              

10(4):4            Hackers in Jail, Part Two                

10(4):42            News Roundup                        

10(4):6  Cellular Phone Biopsy            Kingpin            617 & RDT Syndicate

10(4):9            Elementary Switching            910