TITLE INDEX: 2600 VOLUME 1 - 10 David Price The Title Index references all articles in 2600 THE HACKER QUARTERLY from Volume 1 (1984) through Volume 10 (1993). These articles are references using the following format: V(N):P Where V = Volume, N = Number, and P = Page EXAMPLE: Building a Telephone Induction Coil 7(3):36 Thus the article in the above example is found in Volume 7, Number Three, on page 36. ~ Denotes a "news" article (L) Denotes a letter of note ------------2600 Title Index, Vol. 1 - Vol. 10------------- 1984 Arrives in Hong Kong~ 1(1):3 $2 Billion Error~ 2(7):43 22013664431--Call it! 3(3):22 2600 A Hacking Victim~ 2(8):51 2600 Bulletin Board Online 2(2):9 2600 Exposes New York Tel 4(7):15 2600 Information Bulletin 3(9):69 2600 Information Bureau 3(10):77 2600 Information Bureau 3(8):61 2600 Information Bureau 3(11):85 2600 Information Bureau 3(12):93 2600 Writer Indicted~ 1(6):3 411--News About Phone Companies~ 8(2):35 414 Bust~ 2(5):27 414's Plead Guilty~ 1(4):3 4TEL 6(3):20 $6,829 Phone Bill~ 3(6):43 617 Will be Divided~ 3(4):31 718 Is Coming~ 1(3):3 74,000 Calls to Fraud Line~ 3(7):55 800 Directories Now Available~ 1(8):45 800 Prefixes Listed by States 2(6):37 818 Here to Stay~ 1(11):63 911 Suspect Hung Up~ 1(10):57 A 414 is Sentenced--Other Indicted~ 1(5):3 A Batch Virus 9(1):8 A Bittersweet Victory 7(2):3 A Blast From the Past 9(4):33 A Challenge to Hackers~ 2(1):3 A Form of Protection For You & Your Computer 5(2):4 A Friend in High Places 1(9):52 A Guide to PRIMOS 6(2):4 A Guide to the 5ESS 10(2):4 A Guide to the Israeli Phone System 2(6):33 A Guide to VMS 2(9):57 A Hacker Survey 4(8):15 A Hacker's Guide to the TSPS Console 4(6):6 A Hacker's Guide to UNIX 5(4):12 A Hacking Reading List 7(4):6 A Look at the Future Phreaking World: Cellular Telephones--How They Work 3(12):89 A Mechanical Hacker~ 2(3):15 A Pen Register For Phreaks?: Product Review--Dialed Number Recorder 4(5):22 A Phone Phreak Scores 2(4):19 A Political Hacking Scandal 7(4):4 A Reader's Reply to Captain Zap 5(2):16 A Report on the Internet Worm 5(4):4 A Review of "The 'Top Secret'Registry of US Government Radio Frequencies" 4(11):7 A Simple Virus in C 9(3):19 A Story of Eavesdropping 3(4):29 A Study of Hackers 10(1):38 A Time For Reflection 1(12):67 A Trip to England 3(8):58 A True Saga of Teleconferencing 1(4):4 A Unique Obscene Caller~ 3(2):1 A Way To Catch Peepers 9(1):35 A Word on Wiretapping~ 1(4):3 Acoustic Trauma 3(2):15 Acronym List 2(2):11 Acronyms A-G 10(1):34 Acronyms H-R 10(2):20 Acronyms s-x (no y or z) 10(3):44 ADS Investigation Moved?~ 1(2):9 AHOY! 1(1):1 algorithm for credit cards correction 7(4):25 All About BLV: Busy Line Verification 4(12):10 Allnet's Legal Problems 5(2):2 Allnet: A Horror Story 4(6):4 Alternate Long Distance 1(3):2 American Network Fears Hackers~ 3(5):39 An Algorithm for Credit Cards 7(3):42 An American Express Phone Story 3(3):17 An Appeal For Help 8(4):36 An Interesting Diversion 2(10):65 An Interpretation of Computer Hacking 5(1):16 An Interview with Craig Neidorf 7(2):8 An Interview with Dorothy Denning 7(3):10 An Interview with Hugo Cornwall: British Hacker/Author 4(2):4 An Interview With the Chaos Computer Club 5(4):34 An Introduction to COCOTS 7(2):20 An MS-DOS Virus 9(1):4 An Official Crackdown on Hackers~ 1(7):3 An Overview of AUTOVON and Silver Boxes 3(3):17 An Overview of DSS1 10(3):36 ANALYSIS: Gulf War Printer Virus 8(4):39 Anatomy of a rip-off 7(4):22 And They Call US Crooks? 2(10):65 Another Astronomical Phone Bill~ 3(1):3 Another FBI Computer File~ 1(11):63 Another Hacker Story~ 1(9):51 Another Stinger Is Stung 3(9):66 ANSI Bomb 10(2):44 Are You a Phreak??? 2(3):13 ARPANET Hopping: America's Newest Past time 1(6):1 ARPANet Military Subnets 1(3):5 At the Last Stroke...~ 2(4):21 AT&T Best For Hackers~ 3(9):71 AT&T Computer Caught Stealing~ 2(6):35 AT&T Contractual Obligations~ 2(6):39 AT&T Credit Cards Make Debut~ 1(1):3 AT&T Does it Again~ 3(1):3 AT&T Faces Serious Money Problems~ 1(9):51 "AT&T Keeps ""800"" Data To Itself~" 2(2):9 AT&T Limits Use of their Credit Cards~ 1(6):3 AT&T Offers E-Mail~ 2(12):87 AT&T Put On Hold~ 2(7):47 AT&T Selling Pay Phones~ 3(7):55 AT&T Sub Maps 4(8):11 AT&T to Read E-Mail~ 2(11):79 AT&T/BOC Routing Codes 5(1):42 ATM's in China~ 3(8):63 Automated Operators Coming~ 3(7):55 AUTOVON Numbers 3(5):37 Avoid Phones in Storms!~ 2(11):79 Bad Tenant Database~ 3(4):27 Bank Records Aren't So Private~ 1(5):3 Banking from your Terminal--A Look at PRONTO 2(7):42 "BASIC ""Wargames Dialer Program" 5(1):20 BASIC Red Box Tones 5(3):22 BB Traffic Cop~ 3(9):67 BB Watching VDT Operators~ 3(8):59 BB Watching Without Regulation~ 2(12):83 BBS Listing 2(12):85 Be Nice to Your Telco 1(8):46 Beginner's Guide to Minitel 9(4):8 Beige Box Construction 10(1):14 Belcore's Plans for Caller ID 9(2):18 Bell Atlantic & MCI Collaborate~ 3(2):15 Bell Credit Card Abuse Soars~ 1(4):3 Bell Didn't Invent Phone?~ 2(6):35 Bell Propaganda Films~ 2(9):63 Bell to AT&T: Get Lost!~ 1(7):3 Bellcore Publications Go Public~ 3(5):36 Beware of Hacker Terrorists~ 3(5):39 Big Brother No longer Watching Miami~ 1(8):44 Big Computer Crime Pays~ 3(6):43 Big Deal for Little Town~ 2(11):75 BIN List 8(2):31 Birth of a Low Technology Hacker 8(4):16 BITnet Topology 2(1):6 Blue Box Schematic 2(10):69 Bogota, Columbia Gets Extra Digit~ 3(5):39 Book Review Nothing New in Computer Underground by M. Harry 3(6):42 Book Review: "Automatic Teller Machines III" 4(2):21 Book Review: "The Hacker's Handbook" 4(2):15 Book Review: Approaching Zero 10(3):38 Book Review: The Cuckoo's Egg 7(1):45 Book Review: The Devouring Fungus (Tales of the Computer Age) 9(2):40 Book Review: Tune in on Telephone Calls by Tom Kneitel 5(4):45 Book Review: Virtual Reality 10(4):37 BOXING ON ITT 3(5):38 British Credit Holes 10(2):12 British News 10(1):44 British Phonebooth Wedding~ 3(4):27 British Telecom: Guilty 6(3):12 Build A Tone Tracer 8(2):14 Building a DTMF Decoder 7(1):14 Building a Red Box 5(2):13 Building a Telephone Induction Coil 7(3):36 But How Does it Work? 1(8):43 Buy My Wires~ 3(12):95 Call Rejection in Natchez~ 3(9):71 Caller ID Technologies 10(3):12 Caller ID: The Facts 7(3):5 "Call Me" Card~ 2(6):39 Campaign Contributions On-Line~ 2(10):71 Capitol Hill Hacker~ 3(6):43 Capturing Passwords 4(8):10 Car Breathalizers~ 3(4):27 Carrier Access Codes 6(3):42 Carrier Choosing Time~ 2(5):27 Cash Machines Are Popular~ 3(8):63 Canadian WATS Phonebook 5(3):23 Cell Site Frequencies 4(1):10 Cellular Dial-By-Voice~ 3(7):55 Cellular Magic 10(1):4 Cellular Modem~ 3(5):35 Cellular Phone Biopsy 10(4):6 Cellular Phone Fraud and Where It's Headed 4(7):4 Cellular Phones in England 3(2):15 Cellular Update 5(3):8 Central Office Operations 7(4):12 Changing Your Grades on A High School Computer 10(3):34 Chinese Snitch Numbers 6(2):35 Cipher Fun 9(4):6 CIS Copyrights Public Software~ 3(10):75 Citybank Money Games~ 3(6):43 Cityphone Has the Answer~ 2(12):83 Class Features 8(4):31 CLASS: What It Means To Us 4(5):6 CNA Numbers 4(4):10 CNAs 2(3):18 COCOT Corner 8(4):33 COCOT Numbers 8(3):22 Columnist Attacks AT&T~ 2(11):75 Commentary: The Threat to Us All 2(8):50 Competition...It's the next best thing to being there 6(3):3 Computel Does Exist~ 2(3):15 Computel Put to Sleep 4(4):4 Computer Clothing 3(9):71 Computer College 3(11):87 Computer Crime Resources Guide 3(6):46 Computer Crime Review 3(6):41 Computer Elections Examined~ 2(10):67 Computer Foul-ups Hurt Social Security~ 1(11):63 Computer Grammar~ 3(5):35 Computer Makes it Easy for Reagan~ 1(12):69 Computer Password Kept Secret 3(3):19 Computer Security at the Bureau of Prisons 8(4):5 Computer Threat Causes Chaos in Albany~ 1(6):3 Computers Monitor Truckers~ 2(7):43 Computers Seized as Summer Games Begin~ 1(8):45 Computers Strike Again!~ 3(7):51 Computers Threaten Privacy~ 3(12):91 Congress Chooses AT&T~ 3(4):31 Congress Takes a Holiday 10(3):4 Congressional Computer~ 3(5):35 Converting a Tone Dialer into a Red Box 7(3):32 Count of Exchanges per Area Code 3(8):62 Country Codes 1(2):10 Country Codes 3(7):53 "Crackers" Cracked~ 2(5):27 Crosstalk Saves Old Lady~ 3(9):67 Crypt() Source Code 8(4):11 Data Network Identification Codes 7(1):40 Death of a Pay Phone 3(10):73 Death of NYNEX Business Centers 8(2):11 Death Star Cards Spell Woe~ 1(2):9 "Debugging" Phones~ 3(8):63 Decrypting Password Security 4(9):14 Defeating Callback Verification 9(3):9 Defeating Trap Tracing 7(3):22 Defense Data Network Listing 1(5):4 Descrambling Cable 10(1):16 "Dial ""00"" For Operator~" 3(4):31 Dial Back Security 3(2):10 Dial the Yellow Pages~ 3(3):23 Dial-a-Directory~ 2(5):27 Dial-A-Porn Update~ 3(1):3 Dial-it Sex Numbers Argued~ 2(11):75 Dick Tracey Toys Are Closing In~ 2(9):63 Did You Know? 4(7):17 Digital Locks 10(4):38 Directory Assistance By Computer~ 2(9):63 Directory Assistance Failure~ 3(4):31 Dreams of GEnie~ 2(12):87 E-COM is Going Away~ 1(6):3 E-COM Number List 1(6):5 E-COM Really on the Way~ 2(7):47 "Ed Quinn Cell Site"~ 3(6):47 E-Mail Horror Stories 1(12):68 E-Mail Listings 1(12):71 Electronic Jail All Screwed UP~ 1(12):69 Electronic Switching Advantages 1(6):2 Electronic Tax Returns Are Here 3(2):15 Electronic Tax Returns~ 3(10):79 Electronics Create Portable Prisons~ 1(4):2 Elementary Switching 10(4):9 Encryption Provides Signature~ 3(4):31 England's Mass Announcements 4(9):10 Equal Access 800 Drawbacks~ 3(4):31 Equal Access May Not be "Equal" to Modems 2(11):74 ESS Goes To Taiwan 3(10):79 ESS: Orwell's Prophecy 1(2):8 Europe Standardizing Telecoms~ 2(9):63 Ever Wonder Who Owns All Those 800 Numbers? 6(1):12 Ex-Fed Tapped 3(7):51 Exchange List: 201 Area Code 6(2):20 Exploits in Operator Hell 3(5):33 Exploring Caves in Travelnet 1(11):61 Facts and Rumors 7(3):44 Fascinating fone fun 9(1):45 Fascist Computer Network~ 2(1):3 Fawcett Phone Bill Too Big~ 2(12):83 FAX: A New Hobby 4(5):14 FBI Actions Anger Parents 3(11):83 FBI Goes After ADS Hackers 1(1):2 FBI Investigates Coffee Machine~ 3(10):75 FBI Revealed: Reviews--The FBI Project Newsletter & The FBI and Your BBS 4(8):9 FBI Shopping List~ 3(9):67 FCC Actions~ 1(6):3 FCC Gives Away "Resource" 3(9):71 Federal Employees "Tracked"~ 3(7):51 Federal Express Offers "E-Mail"~ 1(8):45 Federal Phone Failures~ 3(7):55 Federal Telephone System Upgrade~ 1(12):69 Feedback 9(4):26 Fiber-Optic Network For Du Pont~ 2(10):71 Final Words on VMS 3(3):18 Fingerprint Identification System~ 3(12):95 First of the "Superminin"~ 1(12):69 Five Aliens Hung Up~ 3(1):3 Five Arrested in Phone Fraud~ 1(7):7 FM Telephone Transmitter 8(4):45 FM Wireless Transmitter 8(4):44 For Your Protection 7(1):3 Fraud Alert 7(4):43 Free Directories For Bigwigs~ 3(12):95 Free Information in Trouble~ 1(4):3 Free Kiddie Dial-It Calls~ 2(11):79 Free Pay-Phones Plague New Jersey~ 3(5):39 French Phones Renumbered~ 2(12):83 >From Sherwood Forest: Intro to Hacking 2(6):40 >From the 2600 Files 5(1):22 Fun and Games at a 2600 Meeting 7(1):38 Fun Phone Numbers 5(2):44 Fun Things to Know 9(2):19 Fun With COSMOS 2(12):82 Fun With Fortress Fones 1(11):62 Gee...GTE Telcos 6(3):33 GEISCO's New Toy~ 2(1):3 General Information 6(1):7 German Phone System Stagnant~ 2(12):87 Getting Caught: Hacker's View 1(10):55 Getting In The Back Door: A Guide to Some Popular Operating Systems 2(1):2 Getting Started 9(3):42 Getting the Most Out of Equal Access 4(3):6 Getting Your File... 10(1):42 Goings On 4(4):16 Good Apples for the Soviets~ 2(4):21 Government Bulletin Boards 10(2):39 Government Phone Fate?~ 3(8):63 "Grade ""A"" Hacking" 6(3):4 Growth of a Low Tech Hacker 9(4):17 GTE Hit by Divestiture~ 2(1):3 GTE Now Bigger than AT&T~ 2(7):47 GTE Raids Still Have Many Unanswered Questions~ 1(1):3 GTE Sprint Cheats Customers~ 2(7):43 GTE Sprint Overbills~ 3(9):71 Hacker Extortionist Caught~ 2(9):59 Hacker News~ 8(2):12 Hacker Zaps Computer Marquee~ 3(3):19 Hackers Degree?~ 3(7):51 Hackers Go Free~ 2(4):21 Hackers Have Big Business Scared~ 2(10):71 Hackers In Jail 6(1):3 Hackers in Jail, Part Two 10(4):4 Hackers in the World of Malls: Secret Service Behind Harassment of 2600 Meetings 9(4):4 Hackers on Shortwave~ 3(9):67 Hacking AmiExpress 9(3):4 Hacking at the End of The Universe 10(3):4 Hacking Computer Shows 10(4):16 Hacking IBM's VM/CMS 4(11):4 Hacking IBM's VM/CMS--Part Two 4(12):4 Hacking MCIMAX 8(2):16 Hacking on Telenet: It's as Easy as 123456! 1(2):7 Hacking on the Front Line 9(3):31 Hacking Packard 2(3):20 Hacking PC Pursuit 4(4):6 Hacking Smartphone 10(4):11 Hacking WWIV 9(1):12 Hands Across Telenet~ 3(6):47 Happenings 5(1):37 Hardwiring Your Way In 5(4):42 HBO Encryption Broken~ 3(10):75 Here They Are 9(2):24 Here We Go Again 9(2):22 Here's the Secret! 2(11):73 High School Hacking 10(2):13 High School Mac Hack 10(4):15 High Tech Happenings 9(4):19 High Tech Parking Meters~~ 3(5):35 History of British Phreaking 1(9):49 Hitchhiker Guide to the Phone System Phreaking in the Nineties 9(2):10 Home Computer Attacks Falwell~ 3(1):3 House: Hacking is Bad~ 1(8):45 How Can Sysops Protect Themselves? 2(8):55 How Cellular Phones Came About and What You Can Expect 3(11):90 How Not to be Rejected~ 3(12):91 How Payphones Really Work 6(1):30 How Phone Phreaks are Caught 4(7):6 How the Defeat *69 9(2):31 How to Build a Silver Box 6(4):20 How to Get into a C.O. 2(3):14 How to Hack A Pick 3(6):42 How to Hack Honesty 10(3):20 How to Hear Phone Calls 5(4):19 How to Run a Successful Teleconference 2(5):26 How to Take Apart A Payphone 9(1):20 How to Use Your Silver Box 9(1):16 Human Database Centers 8(4):46 I.R.S. Computers Screw Up~ 2(3):15 IBM ADS Directory 1(9):53 IBM Braille Compatible~ 3(12):95 IBM Gets Bigger/Goodbye SBS~ 2(7):47 IBM's Audio Distribution Systems Sure Can Be Fun! 1(5):2 IC and CIC Listing 1(11):65 Ice Cream Chain Aides Selective Service~1(8):45 ICN--More than a Bargain 3(11):81 Important News~ 4(12):3 In Pursuit of Knowledge: An Atari 520ST Virus 8(1):4 Indian Phones Under Siege~ 3(9):67 "Indiana ""Fones"" Are Gone" 3(10):75 Indiana Telco Threatens AT&T~ 3(7):55 Industrial Espionage Seminar~ 2(3):15 Infrared Beeper Will Find You 3(2):15 Inmates Handle Information Calls~ 2(12):83 Inspect Implementation 8(2):18 Intelpost an Astronomical Failure~ 1(5):3 Interesting Things to do on a DEC-20 2(7):41 International Hacking~ 3(12):91 International NUA's 4(10):10 Internet Outdials 8(1):40 Introducing the Clear Box! 1(7):4 IRS Drives Telco to Drink~ 2(6):35 IRS Wants Access to Telco Data~ 2(1):3 Is AT&T Hiding Near You? 9(4):36 It Could Happen to You! 3(2):10 ITT Crackdown~ 2(7):43 ITT Wiping Out Fee~ 1(8):45 Jersey Wins Wiretap Race Again~ 2(6):35 Kenya Pay Phones Prove Popular~ 2(3):15 Kiev Calling Clogged~ 3(6):47 Know Your Switch 10(4):10 Knowing UNIX 3(8):57 L.A. Law 9(1):7 Lair of the INTERNET Worm 6(3):39 Lawsuit Filed Against Secret Service 10(1):43 LD Companies Strike Back~ 3(8):59 Leaked Documents 7(4):16 Leave Our Poles Alone!~ 3(8):59 Let's Move to France!~ 3(6):47 Letter From Prison 9(4):13 Listening In 7(1):19 Listening In On Cellular Phones~ 2(7):43 Listening In: Catch Me if you Can! 4(11):7 Local Toll-Free Numbers~ 3(10):79 Long Distance Option Timtable~ 1(5):3 Look Out For Sidney~ 1(7):3 "Look Out, He's Got A Computer!" 1(7):1 Looking for Simplex Locks? 9(1):38 Looking Up IBM Passwords 8(1):36 Loophole in Wiretap Law 3(12):91 Loopholes Around Wiretap Laws~ 1(10):57 Magnetic Strips 8(2):7 Man Worries About Sprint Bill~ 3(4):27 Marcos Phones For Free~ 3(4):27 Mastering the Networks 3(11):82 MCI Access Numbers & Mail Numbers 1(4):5 MCI Expanding With Optical Fibers~ 2(7):47 MCI Goes to U.K.~ 2(5):27 MCI Mail & Western Union EasyLink 1(12):67 MCI Mail: The Adventure Continues 1(7):2 MCI: The Phone Company With A Lot of Explaining To Do 5(4):10 Meeting Advice 10(2):16 Meeting Advice 10(2):17 Meeting Mania 10(3):18 Messages on the Move~ 3(9):71 MILNET TAC Dialups by Location 2(7):45 Missing Children's Faces Displayed~ 2(7):43 Mobile Frequencies 8(4):18 Mobile Phones--Theory and Construction 3(4):26 Monitoring Phone Calls With A TVRO 5(1):4 More Banks Link Arms~ 3(11):87 More Cellular Fun 10(3):42 More Conversion Tricks 8(3):43 More Divestiture Woes~ 2(10):71 More Hacking on Primos 6(4):14 More Info on VMS 2(10):66 More Long Distance Unpleasantries 4(12):20 More Magic Buttons~ 3(11):87 More Meeting Advice 10(4):35 More On Hacking UNIX 6(4):4 More on Trashing: What to Look for, How to Act, Where to Go 1(9):50 More PC Jr's., Less Z-100's for Soviets~1(8):45 More Phone Fraud~ 2(7):43 More Telenet Addresses 4(6):9 More Use of Phone Computers~ 2(10):71 More VAX Tricks 4(5):4 Moving Satellites Right Up In the Blue ...What Was Really Going On? 2(8):52 Mystery Transistor~ 2(5):27 Navigate With a CD~ 3(12):95 Navy Calls Dial-A-Porn~ 2(10):67 Navy Phone Phreaks Nabbed~ 2(10):67 Navy Software Available~ 3(10):75 Nazi BBS a Challenge to Hackers 2(3):13 Negative Feedback 7(2):11 Net Addresses 2(4):23 Network 2000 Saga Continues 7(3):8 Never Erase the Past 10(3):19 New British Phone Service~ 3(7):55 New Chip Helps Sprint~ 3(8):63 New Developments 4(2):18 New Jersey Tops Taps~ 3(7):51 New Payphone Service for Michigan~ 3(11):87 New Payphones Confuse Callers~ 3(1):7 New Phone System for Courthouse~ 2(8):51 New Revelations From Bell South 7(3):16 New Tracking Device For Cars~ 2(6):39 New VAX Announced~ 3(1):7 New Ways of Stealing Data~ 3(3):19 New York's Computer Law~ 3(6):43 New York's IMAS 4(10):4 News Roundup~ 10(4):42 News Update ~ 10(2):45 News Update~ 7(2):38 News Update~ 7(1):23 News~ 6(3):14 Nickname Listings In Small Town~ 3(11):87 No Data Protection for Hong Kong~ 3(7):55 No Dial-it Calls For Feds~ 2(11):75 No Hacking While Flying, Please~ 1(2):9 No More Free Info~ 1(6):3 No More Redialing?~ 2(12):83 North Carolina #1 in Hacking 3(12):91 Northern To Destroy COs 3(3):23 NPA Countdown 6(4):44 NSA Chooses AT&T Computer~ 2(7):47 NSA Doesn't Feel Secure~ 1(9):51 NSA Drops DES~ 3(9):67 NSA Memo 5(3):20 NSA Wants a New Chip 3(10):79 NSA Wants Better Phones~ 1(10):57 Numbers 3(2):13 Numbers of Interest 4(8):6 Numbers...Long Since Changed 3(6):45 Nynex Bumps Southwestern Bell~ 3(6):47 NYNEX Data 6(4):9 Nynex Voice Mail 10(4):18 Oh No, Not Again!~ 1(10):57 On The Road Again: Portable Hacking 9(2):4 One Angry Judge 10(1):23 One We Somehow Missed~ 1(11):63 Operating With Difficulty 4(9):6 Our Contest Winners 7(4):32 Our Ever-Changing World~ 6(4):6 Our Wishes For '86 and Beyond 2(12):81 Out of the Inner Circle--A Review 2(6):34 Outdials 8(2):44 Outside Loop Distribution Plant, or Hands-On Experience 5(3):4 Overcharge Hunters Needed 3(1):3 Overseas Pirates~ 2(4):21 Pacific Cable Planned~ 2(11):79 Paging For Free 4(6):5 Passageways to the Internet 10(4):32 Patients May Get to Keep Phones~ 3(5):39 Pay Phone Causes Panic~ 3(2):11 Pay Telephones Deregulated~ 1(7):3 PC Pictures~ 3(12):95 Penetrating the Pentagon by Phone~ 1(12):69 Pennant Ties Up Phones 3(10):75 People Express to be Hacked to Pieces 2(5):25 Pest Control~ 2(9):63 Phone Booth Captures Man~ 2(10):67 Phone Booth Wins Again~ 3(1):3 Phone Booths Mauled The Stolen~ 3(8):59 Phone Fraud in Governor's House~ 3(8):59 Phone Numbers Supplied by Readers 8(1):17 Phone Phreak Fined~ 3(4):27 Phone Service Via Radio Shack~ 3(1):3 Phone-in Registration for College~ 2(9):59 Phones 4(1):20 Phones at High and Low Speeds~ 2(12):87 Phones in the Sky~ 1(11):63 Phoning Home From Europe 4(5):9 Phreak Roundups~ 2(2):9 Phreaks Tie Up Lines~ 3(12):91 Pitcairn Island Now On AT&T Net~ 2(9):59 Police Dept. Wants Cellular Phones~ 2(11):79 Police Hacker Cleared~ 2(5):27 Poor Connection Starts Bomb Scare~ 3(9):67 Poor Service An Understatement~ 3(10):79 Porno Phone Service Busted~ 2(6):35 Portable VAXes!!! 3(9):71 PRIMOS: The Final Part 7(2):14 Prisoner Update 8(2):46 Prisoners Break Law~ 3(7):51 Private Directories Soon to be Available~ 1(9):51 Private Sector Returning 3(1):1 Private Sector Update~ 2(9):59 Problems for New Pay Phones~ 2(6):39 Product Review: Do It Yourself Demon Dialer Kit (Hack-Tic Technologies) 9(2):15 Product Review: Speech Thing 9(4):45 Product Review: TDD-8 DTMF Decoder 10(2):14 Programs in BASIC 3(1):5 Protecting Your SSN 8(3):18 Psychology in the Hacker World 8(3):38 Public Phone Secrecy~ 3(6):43 Punching Pay Phones 6(3):37 Pure Cyberfiction, Says Mitnick 8(2):42 Pursuit For People 2(9):58 Q & A 1(2):10 "Q" and "Z" Controversy Rages~ 3(11):83 RCI & DMS-100 Bugs 3(9):65 Reach Out and Touch a Nuclear Weapons Contractor 4(3):2 Reaching Out On Your Own 2(9):58 Reagan Hangs Up on Kids~ 2(5):27 Real Important Frequencies 9(1):17 Real Life War Games?~ 2(4):21 Redemption for a Hacker~ 2(3):15 Remember.... 6(2):3 REMOBS 6(3):32 Reporters Steal Swiss Phones~ 3(2):11 Review: CO Magazine 4(9):22 Review: Hacker: The Computer Crime Card Game 9(1):36 Review: Sneakers 9(3):17 Review: The Hacker Crackdown 9(3)21 Reviews: The 1989 Pirate Directory 6(2):42 Ripoffs & Scams~ 6(1):36 Robot Kills Man~ 2(4):21 ROLM Phone System Creates a Nightmare 5(1):30 Roman Hackers 4(12):18 RSTS For Beginners 3(4):25 RSTS: A Trick Or Two 2(11):73 Rural Customers Denied Access~ 2(11):79 Rural Radio Phones~ 3(8):63 Rural Ultraphones~ 3(10):79 'Santa Fraud'~ 2(4):21 Satellite Jamers Jammed~ 3(3):23 Saudi Arabian BBS List 4(7):21 Say Goodbye to Meter Readers~ 2(6):39 SBS Offers Toll-Free Service~ 1(12):69 Scanning For Calls 6(2):22 Sears Satellite Network~ 1(10):57 Secret Frequencies 8(2):32 Secret Service on Trial 10(1):18 Security Can Kill Creativity 3(10):75 Security Numbers 1(10):59 Security Software~ 3(1):7 SEIZED! 2600 Bulletin Board is Implicated in Raid on Jersey Hackers 2(8):49 Sherwood Forest Shut Down by Secret Service 2(6):34 Shopper's Guide to COCOTS 9(3):13 Shower Phone?~ 3(5):35 "Signature" On Video Transmitters~ 3(9):67 Silver Box Born in U.K. 7(1):19 Silver Pages~ 2(4):21 Simplex Locks 8(3):6 Simplex Update and Corrections 8(4):21 Social Interaction with Phones 4(12):17 Software Makers Crash BBS~ 3(10):79 Some Cosmos Documentation That May Be Useful 4(2):6 Some Facts on Supervision 3(9):65 Some Numbers 4(12):21 Some Thoughts on "Garbage Picking" 1(2):10 Some Words on Hacker Morality 2(6):34 South African BBS's 4(10):11 Soviet BBS List 8(1):16 Soviet Computer Update~ 3(3):23 Soviets Denied Computer Access~ 3(3):19 Spanish Phones--and what they don't do 6(2):36 Springsteen Mania~ 2(11):75 Sprint Unites with US Telcom~ 3(2):15 Sprint--Too Many Customers~ 3(11):87 SS Number Returned to Citizens~ 3(7):51 Still More on the World of COSMOS 4(3):10 Sting Boards on the Rise~ 3(5):39 Stock Market Crash~ 3(6):47 Students Bog Down Computer~ 1(12):69 Students Cause Havoc on Computer~ 1(3):3 Stuff You Should Be Interested In~ 8(4):8 Stumbling into Control on a VMS 4(1):6 Super Crisis Alert System~ 2(12):87 Super Pay Phone~ 2(12):87 Supercomputer Dialups~ 1(3):3 Survey Results 2(12):84 Surveying the COSMOS 2(2):8 TAP: The Legend is Dead 4(1):4 TASS News Service~ 3(3):23 Technology Nabs Hooky Players~ 3(1):3 Teelco Rats On Government~ 2(10):67 Teenagers Abuse "Party Line~" 3(2):11 Telco News 9(4):42 Telco Offices 10(2):36 Telco Response 4(10):6 Telco Sasys "Pay for Tones"~ 3(12):91 Telco Service Spawns Racist Banter~ 2(12):83 Telenet Addresses 4(5):10 Telenet Directory 2(9):61 Telenet Letter 4(8):16 Telephone Company Responds to Criticism of Touch-tone Fees 4(10):7 Teller Machine Crime Coming~ 1(4):3 Test Numbers 2(11):77 Thai Phone Books a Hot Issue~ 2(6):39 The 516 Area Code in Detail 5(3):14 The 707 Area Code 7(1):44 The Australian Phone System 9(1):31 The Ballad of Captain Crunch 4(3):4 The Basics: Divestiture: What Happened? 3(1):1 The Class Struggle 8(2):22 The Cold Truth 4(8):20 The Computel Scoop 3(5):34 The Constitution of a Hacker 1(3):1 The Dark Side of the Great Break-Up 1(6):4 The Dark Side of Viruses 5(2):8 The Day the Phone System REALLY Died 6(4):4 The Death of COSMOS? 6(3):13 The Definitive ANAC Guide 7(3):39 The Early Phreak Days 2(11):80 The Facts on 10698 7(1):30 The First 100% ESS State~ 2(7):47 The First Atomic Bomb 1(3):4 The Free Phones of Philly 3(7):50 The Galactic Hacker Party 6(3):10 The Ghost in the Machine~ 3(8):59 The Hacker "Threat" 9(4):19 The Hacker Video 8(3):14 The Hackers Guide to Area Code 1(8):47 The History of ESS 2(11):74 The Infinity Transmitter--An Old Bug that Had Its Time 2(9):58 The Latest~ 9(1):42 The Magical Tone Box 10(4):22 The Neidorf/Phrack Trial: Day by Day 7(2):4 The New "TAP" 6(2):43 The New LEC Order: Acronym City 8(1):42 The Next Step in Custom Calling~ 2(3):15 The Person Numbers~ 1(3):3 The Rise of the Computer State by David Burnham Book Review 1(8):44 The Scariest Number in the World 1(12):68 The Scoop on 911 7(1):37 The Scoop on Pen Registers~ 3(2):11 The Secrets of Mizar 7(1):8 The Simple Pleasures of a Step Office 1(5):1 The Sprint Gestapo Strikes Again! 6(2):34 The Summer Games of 87 4(8):3 The Telecom Informer 4(10):8 The Telecom Informer 4(8):8 The Telecom Informer 4(9):8 The Telecom Informer 4(6):8 The Telecom Informer 4(5):8 The Telecom Informer 4(11):8 The Telecom Informer 4(4):8 The Telecom Informer 4(1):8 The Telecom Informer 4(12):8 The Telecom Informer 4(3):8 The Telecom Informer 4(2):8 The Telecom Informer 4(7):8 The Terminus of Len Rose 8(1):11 The Theory of 'Blue Boxing': their history, how their used, their future 2(2):7 The Trouble With Telemail 1(4):2 The Truth Behind Those 9999 Numbers 1(1):4 The View of A Fed 9(2):38 The Woes of Having a Small-Time Rural Phone Company 1(5):4 The Word On the Street~ 7(4):36 There are More Phones than Ever 3(3):23 This Month At 2600 3(4):30 This Month at 2600 3(3):22 This Month's Mischief and Mayhem~ 2(2):9 This Month's Troublemakers~ 2(3):15 Those Horrible Hackers Strike Again 2(1):1 Those Silly Codes 4(10):14 Tidbits~ 8(3):31 Times Changing For Directory Assistance~1(2):9 TINA Message Service~ 2(6):39 Tips On Trashing 6(2):32 Toll Fraud Detection Techniques 7(1):12 Toll Fraud Device 10(2):42 Toll Fraud: What the Big Boys are Nervous About 9(3):43 Town on Hold During Strike~ 3(7):51 Trashing Alaska Style 2(2):8 Trashing: America's Source For Information 3(10):73 Trick of the Month~ 1(2):9 Trouble in the White House 10(1):12 Trouble with 800 "Word Numbers"~ 2(9):59 True Colors 10(3):9 TRW Breached by Non-Hackers~ 2(2):9 TRW Credentials Lack Credibility 4(8):4 TRW: Big Business is Watching You 1(7):5 TV Blue Boxes~ 3(8):63 Two Inch Thick Bill~ 2(10):67 U. S. Secret Service Field Offices 9(4):12 U.S. Phone Companies Face Built-In Privacy Hole 8(4):42 UAPC Update 6(4):45 UNIX Password Hacker 8(1):31 UNIX Password Hacker: An Alternative Approach 9(1):18 US and France Link Phones~ 3(5):35 US Social Security Prefixes 4(11):6 Use of Wiretaps at Record Pace~ 1(11):63 Useful UNIX Programs 8(3):44 Using the Telephone 9(3):36 USPS Hacking 8(3):32 USPS Hacking Corrections 8(4):21 USSR Computer Hungry~ 3(8):63 Vehicle Identification Numbers 9(4):11 Victimized by Crime Computers~ 1(10):57 Victory for Wiretap Victims~ 1(5):3 Video Review: Assorted Videos 10(2):40 Video Telephone Invention~ 1(12):69 Violating A VAX 3(7):49 Virus Scanners Exposed 9(1):9 Vital Ingredients: Switching Centers and Operators 1(10):56 VM/CMS Corrections 5(1):8 VMS--The Series Continues 3(2):9 Voice Mail Hacking 9(2):42 Voice Mail Hacking...NYNEX Style 6(3):36 Voice of Reagan Tortures Patients~ 3(11):83 War Game Addict~ 2(9):59 Weathertrak Codes 5(1):15 What a White Box Can Do 2(4):19 What in the EFF? 7(2):10 What it's Like to be a Soviet Operator 5(4):30 What's Going On With Phones/Computers 5(3):10 Whats up~ 8(1):19 When Hackers Ride Horses: A Review of Cyberpunk 8(2):42 Where Have All the Hackers Gone? 8(2):4 Where One Hacker Went (L) 8(3):24 Whitehouse Extension Numbers 1(1):5 Who Called the Shuttle?~ 3(3):19 Who the Hell was Almon Strowger, Anyway?5(3):9 Who Wants to be Swept?~ 3(12):95 Whoops [errata for 4(9)] 4(10):18 Whose Strike Was That Anyway? 1(4):1 Why Computers Get Snatched 2(8):54 Why Won't They Listen? 8(3):4 Wireless Phones Spell Trouble~ 1(1):3 Wiretap City~ 1(3):3 Wiretap Clarification (L) 7(3):30 Wiretapping and Divestiture: A Lineman Speaks Out 2(1):1 Word Numbers 4(4):15 Worldnet: Getting Closer Every Day 4(9):4 WORM 6(2):38 Wrath of God Strikes 2600 3(11):86 Wrestlemania Pins Bell~ 3(5):39 Write Protect Tabs Wrong~ 3(2):15 Yellow Scam~ 2(5):27 "You Must First Dial a One..."~ 1(7):7 Your Own Private Centrex~ 3(1):7 Go back to Main Page