[for better viewing use Word Wrap]


            001101101         101    110      001101010         0101010101
            01      01        010    010      10      10        101    101
            10       10       101    001      01       10       101    001
             01        01      0110110101      01        01      001    110
              10       10       1001001010      11       10       010    111   
              01      01        101    010      10      10        010    101
              10011011          010    001      10011010          1011011001

+-----------------------------------------------------------------------------------------------+            
                                   
                                     DIGITAL HACK DOT ORG
 
                                           PRESENTS
   
                                  *INTRODUCTION TO HACKING*


                            "knowledge is power, in ze right hands!"

+-----------------------------------------------------------------------------------------------+                                    
                                         DISCLAIMER
                                         ----------
THE INFORMATION PROVIDED HERE-IN IS FOR EDUCATIONAL PURPOSES ONLY.  THE MAIN OBJECTIVE OF THIS TEXT IS TO PROMOTE NET SECURITY AWARENESS.  THE AUTHORS OF THIS TEXT CANNOT BE HELD RESPONSIBLE FOR ILLEGAL ACTIONS ARISING FROM THE MISUSE OF THE MENTIONED TEXT.  IF SHOULD YOU DISAGREE, COMPLETELY OR PARTIALLY, WITH WHAT YOU HAVE JUST READ LEAVE IMMEDIATELY AND STOP READING THIS NOW.


     CONTENTS
     ~~~~~~~~ 
1. --Hacking--
1.1 Introduction
1.2 Explanation
1.3 Ethics
1.4 Procedures
1.5 Tools
1.6 Definitions
1.7 Web links
1.8 Books
1.9 Conclusion
2.0 About Digital Hack Dot Org


   1.1 Introduction
   ****************
During the last 30 years, with the development of more and more sophisticated and faster computers, a new race of computer users has made its presence felt: hackers.  This manifestation of computer superusers is constantly in effervescence and will strive to reach its peak as the technologies move forward.  The 90s will be hence known as the 'silicon generation', referring to the big steps taken by technologies in the IT systems, just as people born in the 80s have been known as the 'baby boom generation'.

   1.2 Explanation
   ***************

By definition, a hacker is a person who uses a computer to gain unauthorized access to data in a system (THE CONCISE OXFORD DICTIONARY).  But it is unanimously agreed among the underground mass that a hacker is someone who infiltrates and explores various operating systems for the sole purpose of expanding his/her knowledge and satisfying his/her insatiable thirst for information.
There are 2 types of hacker: white and black hacker.  A white hacker, upon accessing illegally a remote system, will proceed no further than this feat.  He will simply stop and go back.  Whereas a black hacker upon gaining unauthorized access to a system will cause havoc (that is deleting, moving, modifying files) for the simple fun of it.  It is the black hackers that gives hacking a dirty name.  Learning how to become a hacker is a very slow and long process, depending on your ability to learn.  One does not become a hacker in 3 months, one year.  It is a life-long process as you will always be learning about new technologies in the computer systems.  Hacking involves a great deal of programming, as Thomas Edison once said :"genius is 1% inspiration and 99% perspiration". 'Real' hackers make their own tools, i.e programs.  

It must be noted that email bombing, virii and damaging systems are not considered as hacking.  They are considered mostly as the irresponsible and immature actions of wannabe hackers, that is lamers.
In the hacker jargon, a newbie is an amateur hacker.  A newbie is still learning to be a hacker.
Whereas a lamer is a complete wannabe.  The difference between a newbie and a lamer is that a lamer knows a little bit, decides that's enough and calls himself a hacker, while a newbie also knows a little but is humble enough to know that there is a lot more to be learned.

There is a manisfesto written by a Hacker (with a capital letter 'H') named The Mentor.  The Mentor was busted and wrote this manifesto known as The Hacker Manisfesto, most hackers know it by heart.

/////////////////////////////////////////////////////////////////////////////////////////////////
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering." "Damn kids. They're all alike." But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded 
him? I am a hacker, enter my world. Mine is a world that begins with school. I'm smarter than most of the other kids, this crap they teach us bores me. "Damn underachiever. They're all alike." I'm in junior high or high school.  I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head." "Damn kid. Probably copied it. They're all alike." I made a discovery today. I 
found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me, or feels threatened by me, or thinks I'm a smart ass, or doesn't like teaching and shouldn't be here. Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, 
may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in 
the desert. 
This is our world now... the world of the electron and the 
switch, the beauty of the baud. We make use of a service already existing without paying for 
what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. 
We explore... and you call us criminals. We seek after knowledge... and you call us criminals. 
We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime 
is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto.  You may stop this individual, but you can't stop us all... after all, we're all alike. 

The Hacker Manisfesto originally written by The Mentor.

/////////////////////////////////////////////////////////////////////////////////////////////////
 
   1.3 Ethics
   **********
   
Every hacker must abide by the following commandments:

  > YOU SHALL NOT INTENTIONALLY DAMAGE ANY SYSTEM THAT YOU HACK

  > YOU SHALL NOT ALTER ANY SYSTEM FILES EXCEPT ONLY FOR ENSURING YOUR ESCAPE FROM DETECTION AND     FUTURE ACCESS

  > YOU SHALL NOT LEAVE ANY INTERESTING NAMES AND PHONE NUMBERS IN YOUR ILLEGALLY ACCESSED SYSTEM     AS YOU WILL CERTAINLY BE TRACKED DOWN

  > YOU SHALL NOT HACK GOVERNMENT COMPUTERS AS THE GOVERNMENT HAS MORE TIME AND RESOURCES TO         TRACK YOU DOWN, AND WILL TRACK YOU DOWN

  > YOU SHALL BE PARANOID: TRUST NO ONE, TALK TO NO ONE, LISTEN TO NO ONE AND BELIEVE NO ONE         UNLESS YOU REALLY KNOW THEM

   1.4 Procedure 
   *************

There are many pathways to follow to become a hacker.  Each pathway is totally different from the others and that is why different hackers will tell you different ways to become a hacker.  The procedure given here by is generally agreed upon by most hackers at DHDO:

The procedures are in the forms of these simple steps:

 [*] FIRSTLY, KNOW YOUR OPERATING SYSTEM BY HEART, THAT IS HOW TO USE IT EFFICIENTLY, DISCOVER        ALL ITS FEATURES, WHAT PROGRAMS DO WHAT...

 [*] SECONDLY, KNOW DOS (MS DOS), THAT IS THE BASIC COMMANDS

 [*] THIRDLY, BUY SOME BOOKS CONCERNING IT LIKE MS DOS FOR DUMMIES (3rd EDITION OR AFTER) AND         BOOKS THAT TEACH YOU ADVANCED LEARNING IN WINDOWS

 [*] LEARN SOME TERMINOLOGY (BASIC AND ADVANCED)
  
 [*] LEARN ABOUT TELNET, HOW TO USE IT

 [*] LEARN ABOUT THE INTERNET, THE PROTOCOLS THAT MAKE IT (TCP/IP etc...) AND PORTS AND PORT          OPERATIONS
 
 [*] GO TO HACKING SITES AND GATHER MUCH INFOMATION THAT YOU CAN GET ON HACKING AND READ IT

 [*] LEARN ABOUT LINUX, READ EVERY TUTORIALS THAT YOU FIND ABOUT IT 

 [*] INSTALL LINUX AND GET TO KNOW IT LIKE THE BACK OF YOUR HAND

 [*] LEARN EXACTLY HOW A COMPUTER WORKS 

 [*] LEARN BINARY & HEXADECIMAL 
 
 [*] LEARN ABOUT OTHER OPERATING SYSTEMS

 [*] LEARN TO PROGRAM IN A COMPUTER LANGUAGE (USUALLY ASSEMBLER AND THEN C++)

 [*] MAKE YOUR OWN PROGRAMS

 [*] CONGRADULATIONS, YOU CAN BE CALLED A HACKER, YOU CAN MAKE YOUR OWN TUTORIALS NOW!


NOTE :  All the links that you need can be found at the web links section of this document.

   1.5 Tools
   *********

Hackers use varieties of programs for penetrating remote systems.

Nowadays, many lamers use a type of program called a Trojan to gain access to a system.  A Trojan, also known as Trojan Horse, is a Remote Administrative Tool (RAT).  A Remote Administrative Tool is a program used for supervising networks of computers, preventing access to certain files, certain websites etc... Only system administrators use RATs.  A system administrator (or commonly known as 'sysadm' in hacker jargon) is someone who is responsible for supervising a group of computers on a network.  A sysadm can perform this work hence by using a RAT.  Underground RATs used for hacking are known as Trojans.  Some underground Trojans have become RATs like Netbus, for financial or political reasons maybe.
      
A Trojan consists of 2 parts: the server and the client.  Both the server and client are usually small programs that work together.  The server is the way of infecting a targeted computer.  You infect the computer by simply running the server program on the machine.  Or you can send it through email to the victim as file attachment but then it is the victim that infects himself.  Then, you use the client program to access the infected system.  The client program usually has a friendly user interface and always has a scanner plus numerous devillish options.  With the client you can access to numerous files on the victim's computer etc...  But you will have to contact the infected comoputer by using the scanner.

Trojans are powerful tools if used correctly.  The most famous and powerful till now on the net is Back Orifice 2000 or Bo2k made by a hacker group called the Cult of the Dead Cow (cDc).  Bo2k originates from Back Orifice which is the first version of this Trojan, released also by cDc in 1998.  Bo2k is a more powerful version of the previous Back Orifice.  What makes Bo2k the most powerful Trojan of the moment (and it will be here for a long time believe me!) is its ability to enhance the utilities of the client software by using different plugins developed by online developers.  Cult of the Dead Cow has made the source code public for Bo2k so that anyone can develop plugins for it.  Plus the infected server is difficult to locate and remove.

A list of all the Trojans currently known on the net is listed below together with the default ports the servers listen to:
----------------------------------------------------------------------------------------------
Trojan Name			Port# (TCP/UDP) *Default to TCP

The tHing 			6400 
NetBus 1.x 			12345,12346 
NetBus Pro 			20034 
BackOriffice 			31337	 
SubSeven 			1243 
NetSphere 			30100	 
Deep Throat 1,2,3.x 		6670 
Master Paradise 		31 
Silencer 			1001 
Millenium 			20000 
Devil 1.03 			65000 
NetMonitor 			7306 
Streaming Audio Trojan		1170 
Socket23 			30303 
Gatecrasher/Net Control		6969 
Telecommando 			61466 
Gjamer 				12076 
IcqTrojen 			4950 
Priotrity 			16969 
Vodoo 				1245 
Wincrash 			5742 
Wincrash2 			2583 
Netspy 				1033 
ShockRave 			1981 
Stealth Spy 			555 
Pass Ripper 			2023 
Attack FTP			666
Satans Backdoor 1		666
Satans Backdoor 2Beta 		666 
GirlFriend 			21554 
Fore, Schwindler 		50766 
Tiny Telnet Server		34324 
Kuang				30999 
Senna Spy Trojans		11000 
WhackJob			23456 
Phase0				555 
BladeRunner			5400 
IcqTrojan			4950 
InIkiller			9989 
PortalOfDoom			9872 
ProgenicTrojan			11223 
Prosiak 0.47			22222 
RemoteWindowsShutdown		53001 
RoboHack			5569 
Silencer			1001 
Striker				2565 
TheSpy				40412 
TrojanCow			2001 
UglyFtp				23456 
WebEx				1001 
Backdoor			1999 
Phineas				2801 
Psyber Streaming Server		1509 
Indoctrination			6939 
Hackers Paradise		456 
Doly Trojan			1011 
Solero				14456 
FTP99CMP			1492 
Shiva Burka			1600 
Remote Windows Shutdown		53001 
BigGluck			34324 
NetSpy				31339 
Hack99 KeyLogger		12223 
iNi-Killer			9989 
ICQKiller			7789 
Portal of Doom 			9875 
Firehotcker			5321 
Master Paradise 		40423 
BO jammerkillahV 		121 
AOLTrojan1.1			30029 
Hack'a'tack			31787 
The Invasor			2140 
SpySender			1807 
The Unexplained			29891 
Bla				20331 
FileNail			4567 
ShitHeep			69123 
Coma				10607 
Bla1.1				1042 
HVL Rat5			2283 
BackConstruction1.2		5400 
Kuang2 theVirus			17300 
Xtcp 2.00 + 2.01		5550 
Schwindler 1.82			21554 
Doly trojan v1.35		1010 
Doly trojan v1.5		1015 
Vampire				6669 
DeltaSource			6883 
Trojan Spirit 2001 a 		33911 
Maverick's Matrix 1.2 - 2.0 	1269 TCP, 1025 TCP, 1025 UDP 
Total Eclypse 1.0		3791 
OOTLT + OOTLT Cart 		5011 
Eclipse 2000			12701 
NetMetro 1.0			5031 
Illusion Mailer			5521 
InCommand 1.0 + 1.3 + 1.4	9400 TCP, 1029 TCP, 1029 UDP 
NeTadmin			555 
Logged!				20203 
Shitheep			6912 
Schoolbus 1.6			54321 
Schoolbus 2.0			54321
Chupacabra			20203 
TheThing 1.6			6000 
AimSpy				777 
NetMetropolitan 1.04		5032,5031 
Transcout 1.1 + 1.2		1999 
SoftWar				1207 
Ambush				10666 
Der Spaeher 3			10666 
Insane Network			2000, 2001, 1000, 1001 
The Prayer 1.2 + 1.3		9999, 2716 
Host Control 1.0		6669, 11050 
Yet Another Trojan		37651 
NetRaider 			57341 
TCPShell.c			6666 
PC Crasher			5637, 5638 
Mini Command 1.2		1050 
Mosucker			16484 
Rat 1.2				2989 TCP, 2989 UDP 
FakeFTP				1966 TCP 
Intruse Pack 1.27b		30947 TCP 
Snid X2				3586 TCP, 7609 TCP, 1784 TCP 
Freak 88			7001 TCP 
Asylium 0.1&0.11&0.12&0.13	23432 TCP 
Prosiak				44444 TCP, 23 (telnet option) 
Traitor 2.1 			21 (creates ftp banner of its name)
SSFS 1.0			21 TCP 
Connection			60411 TCP 
Host Control 2.6		10528 TCP, 11051 TCP, 15092 TCP, 7424 TCP, 7424 UDP 
BIONET				12349 TCP 
Rux.PSW				2208 TCP 
CrazyNet			17490 TCP, 17500 TCP 
Rux.Backdoor			9876 TCP, 4245 TCP 
Infector 1.x			146 TCP, 17569 TCP 
NetDemon 1.0			15000 TCP 
Rux.Tick			1700 TCP, 22222 TCP 
NetTrash			23005 TCP, 23005 UDP 
Y3k 1.3				5882 TCP, 5888 TCP, 5889 TCP, 5882 UDP, 5888 UDP 


NOTE: THIS FILE WAS BORROWED FROM www.hackersclub.com FROM kM WHO HIMSELF ORIGINALLY ADAPTED IT       FROM tlsecurity.net.
-------------------------------------------------------------------------------------------------
  
Hackers that use tools other than Torjan Horses consists of a handful of people today.  A true hacker will not reveal himself/herself to anyone.  But again true hackers are rare.  Apart from Trojans hackers need the followings:

 * an ip scanner {e.g is UltraScan}

 * a port scanner {e.g is Porter}

 * an internet browser {e.g is Opera}

 * a telnet client {like in MS DOS}

 * a ping utility {like in MS DOS}

 * a whois and lookup utility {present in telnet}

 * a traceroute utility {like in MS DOS}

 * a password cracker {e.g Cracker Jack}

 * an FTP client {as in MS DOS}

Most of the above are easily obtainable from the net, take a look at the Web Links section  of this document.

   1.6 Definitions
   ***************

Listed below are some definitions that every hacker, and newbie, should get to know in his/her quest for knowledge.

------------------------------------------------------------------------------------------------
abend:  acronym for Abnormal Ending.  An early termination of a program
due to an error condition, such as division by zero or trying to add a
number and a letter.

AC:  abbreviation for Alternation Current, the type of electricity found
in homes, buisnesses, and schools.

AFCET:  acronym for Association Francaise Pour La Cybernetique Economique
Et Technique.  A professional organization whose purpose is to bring
together French scientists, computer users, computer manufacturers, and
engineers interested in computer technology and applied mathematics.

AI:  abbreviation for Artificial Intelligence, the branch of computer
science that works on getting computers to think like human beings.

ALGOL:  acronym for Algorithmic Language, an international high level
programming language used to code mathematical and number problems.  The
language has had a strong impact on programming language design. ALGOL
is essentially a "dead" language that managed to spawn others. most
notably Pascal and Modula 2.

ALU:  abbreviation for Arithmetic Logic Unit, the portion of the central
processing unit (CPU) where arithmetic and logical operations are
performed.  A basic element of the CPU.

ANSI:  acronym for American National Standards Institute.  An organization
that acts as a national clearing house and coordinator for voluntary
standards in the United States.

APL:  abbreviation for A Programming Language, a mathematically
structured programming language, popular for problem solving
applications.

APT:  abbreviation for Automatic Programmed Tool.  A programming
system that is used in numerical control applications for the programmed
control of machine functions.  The APT language allows a user to define
points, lines, circles, planes and geometric surfaces.

ASAP:  acronym for "As Soon As Possible." (no shit)

ASCII:  acronym for American Standard Code For Information Interchange.
Pronounced "asskey."  A 7 bit standard code adopted to facilitate the
interchange of data among various types of data processing and data
communications equipment.

b:  abbreviation for byte or baud.  Use bytes when referring to storage,
and baud rate when referring to communications.  1k = 1024 bytes.

basic:  acronym for Beginners All Purpose Symbolic Instruction Code,
a very easy algebraic programming language with a small repertory of
commands and simple statement formats.  Basic language has been
implemented on most microcomputers, minicomputers, and supercomputers.

BCD:  abbreviation for Binary Coded Decimal.

BCS:  abbreviation for British Computer Society, a professional
computer society in the United Kingdom.

BDOS:  acronym for Basic Disk Operation System.  

BIOS:  acronym for Basic Input/Output System.  

BOT:  acronym for Beginning Of Tape, a mark that shows where to start
recording on a magnetic tape.

bpi:  abbreviation for Bits Per Inch or bytes per inch.

bps:  abbreviation for Bits Per Second or bytes per second.

CADAM:  acronym for Computer Graphics Augmented Design And Manufacturing,
the process of, or methods for using computer systems as tools in design
and manufacturing applications.
  
CAD/CAM:  acronym for Computer Aided Design/Computer Aided Manufacturing.  
A rapidly growing branch of computer graphics.  Used to design auto
parts, buildings, bridges, and intergrated circuits.

CAE:  acronym for Computer Aided Engineering.  Analysis of a design
for basic error checking or to optimize manufacturablitiy performance
and economy.

CAM:  acronyms for Computer Aided Manufacturing and Composition AndMakeup.

CCD:  abbreviation for Charge Coupled Device.  A memory device within
which stored information circulates rather than remains in fixed locations.

CCITT:  abbreviation for Consultative Committee International Telegraph
and Telephone, an organization established by the United Nations to
develop world wide standards for dada communications.

CCP:  abbreviation for Certificate In Computer Programing.

CDC:  abbreviation for Call Directing Code, a two or three characted
code used to route a mesage or command automatically.

CDP:  abbreviation for Certificate In Data Processing.  

CIM:  acronym for Computer Input Microfilm and an acronym for Computer
Integrated Manufacturing.

CMI:  abbreviation for Computer Managed Instruction.

CMS:  abbreviation for Conversational Monitor SYstem, operation system
for IBM mainframe computers.

CMOS:  abbreviation for complementary MOS.  A method of making metallic
oxide semiconductor chips that uses almost no power and works faster
than MOS.

COBOL:  acronym for Common Buisness Oriented Language, a high legel
language developed for buisness data processing applications.

COGO:  acronym for Coordinate Geometry.  A problem oriented programming
language used to solve geometric problems.  Used by civil engineers.

COM:  acronym for Computer Output Microfilm.  A technology that permits
the output information produced by computers to be stored on microfilm.

COMDEX:  acronym for Communications and Data Processing Exposition, a
large computer trade show held in the United States and other locations.

cpi:  abbreviation for Characters Per Inch.

CP/M:  abbreviation for Control Programed For Micro Computers, an
operation system for microcomputers.  Produced by Digital Research
of Pacific Grove, California.

cps:  abbreviation for Characters Per Second.

CPU:  abbreviation for Central Processing Unit.

CR:  abbreviation for Carriage Return.

CROM:  acronym for Control ROM, an interfal part of most central
processing unit (CPU) chips.  The CROM is the storage for the
microinstructions that the CPU assembles into a sequence to form
complex macroistructions, such as Devision or Logical compare that
the computer user normally uses.

CRT:  abbreviation for Cathode Ray Tube, the picture tube of a video
display terminal.

CSP:  abbreviation for Certified Systems Professional.

CT:  abbreviation for Computerized Tomographic.

CTRL:  abbreviation for CONTROL.

DASD:  acronym for Direct Access Storage Device.  A device such as a
magnetic disk storage unit.

DAT:  acronym for Dynamic Address Translation.

DBMS:  abbreviation for Data Base Management System.  A complete
collection of hardware and computer programs that organizes and
provides access to data base.

DC:  abbreviation for Data Conversion, Design Change, Digital Computer,
Direct Current, Display Console, and Direct Cycle.  (God damn!)

DCTL:  abbreviation for Direct Coupled Transistor Logic.

DDD:  abbreviation for Direct Distance Dialing, the facility used for
making long distance telephone calls without the assistance of a
telephone operator.  Also used for Data Communications.

DEC:  acronym for Digital Equipment Corporation, a large manufacturer
of minicomputer systems.

DECUS:  acronym for the Digital Equipment Computer Users Society. By
Digital Equiptment Corporation.

DIF:  acronym for Data Interchange Format, a particular standard for
data files.  It is used by many programs involving forcasting and it
allows files created on one software package to be read by another
software package.  Apple DIF file disk cannot be read directly into an
IBM machine.

DIP:  acronym for Dual In Line Package.  A device on which an integrated
citcuit is mounted.

DMA:  abbreviation for Direct Memory Access.  A method by which data
 can be transferred between peripheral devices and internal memory
 without intervention by the central processing unit.

DML:  abbreviation for Data Manipulation Language.

DNC:  abbreviation for Direct Numerical Conrol.  A method of computer
control of automatic machine tools whereby control is applied at
discrete points in the process rather than applied continuously.

DOA:  abbreviation for Dead On Arrival.  Used to describe a product
that does not work when it is received from the supplier or manufacturer.

DOS:  acronym for Disk Operating System.  A specialized disk oriented
 program that provides an easy to use link between the user and a
 computers disk drive.  (Youll be amazed how many people do not know this!)

DRO:  abbreviation for Destructive Read Out.

DSL:  abbreviation for Dynamic Simulation Language.

DTL:  abbreviation for Diode Transistor Logic.  Micro electronic logic
based on connections between semi conductor diodes and the transistor.

EAROM:  acronym for Electrically Alterable ROM.  ROM memory that can
be selectively altered without erasing all stord data, as is done with
EPROM devices.

EBAM:  acronym for Electron Beam Adressed Memory.  An electric storage
device that uses electrical circuits to control a beam that reads from
or writes on a metal oxide semi conductor surface.

EBCDIC:  acronym for Extended Binary Coded Decimal Interchange Code.
An 8 bit code used to represent data in modern computers.

ECL:  abbreviation for Emitter Coupled Logic, also called Current Mode
Logif.  ECL is faster than TTL, but much less popular.

EDP:  abbreviation for Electronic Data Processing, data processing
performed largely by electronic digital computers.

EDS:  abbreviation for Exchangeable Disk Store.

EFT:  abbreviation for Electronic Funds Transfer.  AN EFT network
transfers funds from one account to another with electronic equipment
rather than with paper and checks.

EIA:  abbreviation for Electronic Industries Association.

E-mail:  abbreviation for Electronic Mail.  

EOB:  abbreviation for End Of Block.  Termination of a block.

EOF:  abbreviation for End Of File.  When all the records in a file
have been processed, the computer is said to have encountered an end
of file condition.

EOJ:  abbrevition for End Of Job.

EOLN:  abbreviation for End Of Line.  A flag indicating the end of a
line of data.  Some times abbreviated EOL.

EOT:  abbreviation for End Of Transmission.

EPO:  abbreviation for Emergency Power Off, Meaning the curcuit and the
buttons activating it that can turn an entire computer off in an emergency.

EPROM:  acronym for Erasable Programming Read Only Memory, a special
PROM that can be erased under high intensity ultraviolet light, then
reprogrammed EPORMs can be reprogrammed repeatedly.

EROM:  acronym for Erasable ROM.  Same as EPROM.

ETX:  acronym for End Of Text.

f:  abreviation for Frequency

FAMOS:  acronym for Floating Fate Avalanche Injection MOS, a fabrication
technology for charge storage devices such as PROMs.

FAX:  acronym for FACSIMILE.  An equiptment configuration that
facilitates the transmission of images over a common carrier network.

FCC:  abbreviation for Fedral Communications Commission, an organization
of the U.S Government responsible for regulation interstate comunications.

FE:  abbreviation for Field Engineer, an individual responsible for field
maintenance of computer hardware and software.

FET: acronym for Field Effect Transistor.  A semi conductor device used
as a storage element.

FF: abbreviation for Form Feed.

FIFO:  acronym for First In First Out.  A method of sotring and retreving
items from a list, table, or stack, such that the first element stored is
the first one retrieved.  Contrast with LIFO.

FILO:  acronym for First In Last Out.  A method of storing and retrieving
items from a list, table, or stack, such that the first element is stored
in the last one retrieved.  Same as LIFO.  Contrast with FIFO.

FLOP:  acronym for Floating Point Operation.

FM:   abbreviation for Frequency Modulation.  The process of changing the
value represented by a signal by varying the frequency of the signal.

FORTRAN:  acronym for Formula Translator.  A high level programming
language used to perform mathematical, scientific, and engineering
computations.  FORTAN has been approved as an American Standard
programming language in two versions (FORTRAN and Basic FORTRAN).
A widely used programming language.

FOSDIC:  acronym for Film Optical Sensing Device For Input To Computers.
An input device used by the Census Bureau to read completed census
questionaire data into a computer.

FPLA:  abbreviation for Field Programmable Logic Array.  An FPLA can
be programmed by the user in the field whereas an ordianry PLA is
programmable only by masking at the semiconductor manufacturers factory.

fs:  abbreviation for FEMTOSECOND.

FSK:  abbreviation for Frequency Shift Keying.

GB:  abbreviation for GIGABYTE.

GEM:  acronym for Graphics Environment Manager, a program that adds
Macintosh/MacPaint like qualities to a variety of microcomputers
including the IBM personal computer and Atari ST.  Developed by
Digital Research, INC.

GERT:  acronym for Graphical Evaluation and Review Technique, a
procedure for the formulation and evaluation of systems using a
network approach.

GIGO:  acronym for Garbage In Garbage Out.  A term used to describe
the data into and out of a computer system.

GP:  abbreviation for General Purpose.

GPSS:  abbreviation for General Purpose Systems Simulation.  A problem
oriented used to develop simulation systems.

GUIDE:  acronym for Guidance Of Users Of Integrated Data Processing
Equipment, an international association of users or large scale IBM
computers.

HIPO:  acronym for Hierarchy Plus Input Process Output.  A technique
that provides a graphical method for designing and documenting program
logic.

HKCS:  abbreviation for Hong Kong Computer Society.

HOL:  acronym for High Order Language, a procedure oriented programming
language such as BASIC, Pascal, or LOGO.

HSP:  acronym for High Speed Printer.

Hz:  abbreviation for Hertz, cycles per second.

IBG:  abbreviation for Interblock Gap.

IBI:  abbreviation for Intergovernmental Bureau Of Informatics.  An
organization consisting of members of the United Nations, UNESCO, or
U.N agencies.

IC:  abbreviation for Integrated Circuit, a complex electronic circuit
fabricated on a simple piece of material, usually a silicon chip.

ICES:  abbreviation for Integrated Civil Engineering System.  A system
developed to aid civil engineers in showing engineering problems.

ICOT:  acronym for Institute For New Generation Computer Technology,
the institute conducting Japans 5th generation research project.

ICS:  abbreviation for Irish Computer Society.

IDP:  abbreviation for Integrated Data Processing.

IEEE:  abbreviation for Institute of Electrical and Electronics Engineers.
A professional enginering organization with a strong interest in computer
systems and their uses.

IFAC:  acronym for International Federation of Automatic Control.  A
multinational organization concerned with advancing the science and
technology of control.

IMACS:  abbreviation for International Association For Mathematics and
Computers In Simulation.

IMS:  abbreviation for Imformation Management System.  A data base
management system software package that provides the facilities for
storing and retrieving information from hierarchically structured
files and data bases.

I/O:  abbreviation for Input/Output.

IOCS:  abbreviation for Input/Output Control System.  A standard set of
input/output routines designed to initiate and control the input and
output process of a computer system.

IPAI:  abbreviation for Information Processing Association of Israel.

IPSJ:  abbreviation for Information Processing Society of Japan.

IRG:  abbreviation for Interrecord Gap.

IRM:  abbreviation for Information Resources Manager.  Person responsible
for operation the companys main computer and keeping an eye on the
employees using it.

ISO:  abbreviation for International Standards Organization, an
international agency that is responsible for developing standards
for information exchange.  Similar to the ANSI in the United States.

ISR:  abbreviation for Information Storage and Retrieval.

JCL:  abbreviation for Job Control Language, a special language used
to give instructions to the operating systems of a computer.

kb:  abbreviation for Kilobyte (1024 bytes).

kc:  abbreviation for Kilocharacter.  One thousand characters per second.

kHz:  abbreviation for Kilohertz.

KWIC:  acronym for Key Word In Context.  A method of indexing information
by preselected words or phrases.

LAN:  acronym for Local Area Network.  

LCD:  abbreviation for Liquid Crystal DIsplay.  A way to make letters and
numbers appear by reflecting light on a special crystalline substance.

LDL:  abbreviation for Language Description Language.  A metalanguage- a
language that describes a language.

LED: abbreviation for Light Emitting Diode, a commonly used alphanumeric
display unit that glows when supplied with a specific voltage.

LF:  abbreviation for Line Feed.

LIFO:  acronym for Last In First Out, the way most microprocessor program
stacks operate.

LILO:  acronym for Last In Last Out.  A method of storing and retrieving
items from a list, table, or stack, such that the last item placed on the
stack is the last to be retrieved.

LIPS:  acronym for List Processing.  A high level programming language
primarily designed to process data consisting of lists.

LP:  abbreviation for Linear Programming and Line Printer.

LPM:  abbreviation for Lines Per Minute.

LSC:  abbreviation for Least Significant Character.

LSI:  abbreviation for Large Scale Integration.

M:  abbreviation for mega, one million.  Used to represent 1,048,576.
Used to label capacity of storage devices.

maser:  acronym for Microwave Amplification by The Stimulated Emission of
Radiation.  A device capable of amplifying or generating radio frequency
radiation.  Maser amplifiers are used in satellite communication ground
stations to amplify the extremely weak signals received from communications
satellites.

mb:  abbreviation for megabyte. 1000kb.

MBASIC:  abbreviation for Microsoft BASIC.

MCC:  abbreviation for Microelectronics and Computer Technology
Corporation.  United Sates consortium of companies formed to conduct
research in advanced computers.

MESFET:  acronym for Metal Semiconductor Rield Effect Transistor, the
main active device used in gallium arsenide integrated circuits to
provide current gain and inversion.

mflops:  acronym for a Million Floating Point Operations Per Second, a
measure of computing power.  Usually associated with large mainframe
computers.  Short for Megaflop.

MFT:  abbreviation for Multiprogramming with A Fixed Number of Tasks. The
tasks being programs.

MICR:  acronym for Magnetic Ink Character Recognition.

mips:  acronym for Million Instructions Per Second.  Refers to the average
number of machine language instructions a computer performs in one second.

MIS:  abbreviation for Management Information System.

ML:  abbreviation for Manipulator Language.  An IBM Corporation
programming language for controlling robots.

modem:  acronym for Modulator/Demodulator, a device that translates
digital pulses from a computer into analog signals for telephone
transmission, and analog signals from the telephone into digital
pulses the computer can understand.

MOS:  abbreviaiton for Metallic Oxide Semiconductor.

MOSFET:  acronym for Metallic Oxide Semicondoctor Field Effect
Transistor, a semiconductor characterized by an extremely high
input impedance, a fairly high active impedance and low switching speeds.

MP/M:  abbreviation for Multiprogramming Control Program for
Microcomputers.  It is a multiuser operating system for smallcomputers.

MPU:  abbreviation for Microprocessing Unit.

MPX:  abbreviation for Multiplexer.

ms:  abbreviation for Millisecond.

MSD:  abbreviation for Most SIgnificant Digit.

MS/DOS:  abbreviation for Microsoft Disk Operating System, the
standard operating sytem used by the IBM personal computer and
compatible computers.  Developed by Bill Gates.

msec:  abbreviation for milisecond. one thousandth of a second.

MSI:  abbreviation for Medium Scale Integration.

MSSG:  abbreviation for message.

MTBF:  abbreviation for Mean Time Between Failure.  The average
length of time in which the system or a component of the system
works without fault.

MTTF:  abbreviation for Mean Time To Failure.  The average length
of time in which the system or component of the system works without
fault.

MTTR:  acronym for Mean Time To Repair.  The average time expected to
be required to detect and correct a fault in a computer system.

MUX:  acronym for Multiprogramming With A Variable Number Of Tasks.

NASA:  acronym for National Aeronautics And Space Administration.

NBS:  abbreviation for National Bureau Of Standards, a governmental
agency that has the responsibility of establishing standards for the
computer industry.

NCC:  abbreviation for National Computer Conference, a computer trade
show held annually.

NCIC:  acronym for the FBIs computerized National Crime Information
Center, the heart of a large law enforcement network.

NMOS:  acronym for N-Channel MOS.  Circuits that use currents made
up of negative charges and produce devices at least twise as fast as PMOS.

NOP:  acronym for No Operation.

NRZ:  abbreviation for Nonreturn To Zero, one of the several methods for
coding digital information on digital tape.

NS:  abbreviation for Nanosecond, one billionth of a second.

NTSC:  abbreviation for National Television System Committee, a color
television standard.

OCR:  abbreviation for Optical Character Recognition.  Characters
printed in a type style that can be read by both machines and people.

OEM:  abbreviation for Original Equipment Manufacturer.  A company or
organization that purchases computers and peripheral equiptment for use
as components in products and equipment that they subsequently sell to
their customers.

OS:  abbreviation for Operating System.

PAL:  acronym for Phase Alternation Line, the color television system
used in most Eurpoean countries.

PAM:  acronym for Pulse Amplitude Modulation, in which the modulation
wave is caused to amplitude modulate a pulse carrier.

PC:  abbreviation for Personal Computer, Pocket Computer, Portable
Computer, Printed Circuit, and Program Counter.

PCB:  abbreviation for Printed Circuit Board, the plastic board into
which a computers various electronic components are soldered.

PCM:  acronym for Plug Compatible Manufacturer.  A buisness that makes
computer equipment that can be plugged into existing computer systems
without requiring additional hardware or software interfaces.

PDM:  abbreviation for Pulse Duration Modulation.  

PERT:  acronym for Program Evaluation and Review Technique, a management
technique for control of large scale, long term projectsm involving
analysis of the time frame required for each step in a process and the
relationships of the completion of each step to activity in succeeding
steps.

PILOT:  acronym for Programmed Inquiry, Learning Or Teaching.

PIN:  acronym for Personal Identification Number.  A security number that
systems often require before a user can access a system.

PLA:  abbreviation for Programmable Logic Array.  An alternate to ROM that
uses a standard logic network programmed to perform specific functions.

PLANIT:  acronym for Programming Language For Interactive Teaching.  Used
with CIA systems.

PLATO:  acronym for Programmed Logic For Automatic Teaching Operations, a
computer based instructional system that uses large computers and plasma
display terminals.

PMOS:  acronym for P-Channel MOS, the oldest type of MOS circuit, in which
the electrical current consists of a flow of positive charges.

POS:  abbreviation for Point Of Sale terminal.

pph:  abbreviation for Pages Per Hour.

PPM:  abbreviation for Pulse Position Modulation.

PROLOG:  acronym for Programming In Logic, a high level logic based
programming language used in the field of articicial intelligence.
Prolog is designed to manipulate knowledge instead of numbers.  It
is composed mainly of common English words an duses these words to
describe facts, relationships, and patterns in a logical, concise fashion.

PROM:  acronym for Programmable Read Only Memory.  A memory that can be
programmed by electical pulses.  Once programmed it is read only.

psec:  acronym for picosecond; one trillionth of a second.

R:  abbreviation for Register, Request, and Reset.

RAM:  acronym for Random Access Memory, a memory into which the user can
enter information and instruction (write) and from which the user can
call up date (read). RAM is the working memory of the computer.

RF:  abbreviation for Radio Frequency, the general term for broad spectrum
of electromagnetic radiation ranging in frequency from 10,000 to 40 billion
cycles per second.

RFP:  abbreviation for Request For Proposal.  A document that describes
ones requirements sent to vendors to elicit their design of a hardware or
software system that meets those requirements.

RI/SME:  abbreviation for Robotics International Of the Society Of
Manufacturing Engineers.

RJE:  abbreviation for Remote Job Entry.  Refers to the programs used to
submit processing jobs from terminals.

RO:  acronym for Reveive Only.  A designation used to indicate the read
only capabilities of equiptment lacking keyboards and other input
facilities.

ROM:  acronym for Read Only Memory. 

RPG:  abbreviation for Report Program Generator.  A popular buisness
oriented programming language highly structured and relatively easy to
learn.

RPROM:  acronym for Reprogrammable PROM.

SAM:  acronym for Sequential Access Method.  A method for storing and
retrieving data on a disk file.  Also known as Surface to Air Missle
commonly Used by Iraq.

SBC:  abbreviation for Small Buisness Computer.

SCM:  abbreviation for Society For Computer Medicine, an organization
which brings together physicians and computer scientists emphasizing
the use of automation for medical applications.

SCR:  acronym for Silicon Controlled Rectifier, a semiconductor device
usefull in controlling large amounts of DC current or voltage.

SCS:  abbreviation for Society for Computer Simulation and Shanghai
Computer Society.  I didnt know you could make computers made of bamboo?

SIG:  abbreviation for Special Interest Group.

SLA:  abbreviation for Special Libraries Association.

SLSI:  abbreviation for Super Large Scale Interrogation.  Refers to
high density chips that contain 1 million or more components per chip.

SMIS:  acronym for Society for Management Information Systems.  Information
exchange professionals.

SNA:  acronym for Systems Network Architecture.

SNOBOL:  acronym for String Oriented Symbolic Language, another high
level programming language.

SO:  acronym for Send Only.

SOP:  acronym for Standard Operating Procedure, the status quo!

SOS:  abbreviation for Silicon On Sapphire, the process of fabricating
integrated chips on layers of silicon and sapphire.  Boats often use
this as "Save Our Ship."

SPA:  abbreviation for Systems and Procedures Association, a professional
organization whose purpose is to promote advanced management systems and
procedures through seminars, professional education, and research.

SSI:  acronym for Small Scale Interrogation.

STRESS:  acronym for Structural Engineering System Solver.  A problem
oriented language used for solving structural engineering problems.

STRUDL:  acronym for Structurial Design Language, a programing language
that is used for the design and analysis of structures.

SYSGEN:  acronym for Systems Generation.  The process of modifying the
generalized operating system received from the vendor into a tailored
system meeting the unique needs of the individual user.

T:  abbreviation for tera, prefix for one trillion.

tb:  abbreviation for Terabyte, one trillion bytes, 1,000gb.

TOS:  abbreviation for Tape Operating System.

TPI:  abbreviation for Tracks Per Inch, a measure of storage density in
magnetic disks.

TRSDOS:  acronym for Tandy-Radio Shack Disk Operating System, the operating
system for Radio Shack TRS-80 minicomputers.

TTL:  acronym for Transistor-Transistor Logic.  Logic circuits based on
bipolar devices.

UART:  acronym for Universal Asynchronous Receiver/Transmitter.  A device
that converts parallel data into serial form for transmission along a
serial interface.

uC:  abbreviation for microcomputer.

uP:  abbreviation for microprocessor.

UPC:  abbreviation for Universal Processor Code. 

VAB:  acronym for Voice Answer Back, an audio response device that can
link a computer system to a telephone network.

VDL:  abbreviation for Vienna Definition Language, a language for defining
the syntax and semantics of programming languages.

VDT:  abbreviation for Video Display Terminal, an input/output device
consisting of a display screen and an input keyboard.

VDU:  abbreviation for Visual Display Unit, a peripheral device on which
data is displayed on some types of screen.

VLDB:  abbreviation for Very Large Data Base.

VLSI:  abbreviation for Virtual Machine/System Product, an operating
system for large IBM mainframe computers.

VS:  abbreviation for Virtual Storage.

WATFIV:  acronym for Waterloo Fortran IV, a Fortran compiler developed
for teaching purposes at the University of Waterloo, Ontario, Canada.

WATFOR:  acronym for Waterloo Fortran, a version of Fortran developed
at the University of Waterloo in Ontario, Canada.

WATS:  acronym for Wide Area Telephone Service.  A service that permits
an unlimited number of calls from one point to any location in the large
area.  The United states is divided into 6 WATS zones.

WPM:  abbreviation for Words Per Minute.

XOR:  abbreviation for Exclusive OR.                    


NOTE: THIS LONG LIST OF DEFINITIONS WAS TAKEN FROM *HELL WE FORGOT WHERE!
      BUT IF IT IS YOUR FAQ PUBLISHED ABOVE THEN WE APOLOGIZE FOR NOT INFORMING YOU EARLIER.
------------------------------------------------------------------------------------------------


   1.7 Web Links
   *************

Don't forget to check out these links below as they are important for the current newbie and hacker.


www.hackersclub.com     - tutorials on hacking, tools and various other useful information
www.cyberarmy.com       - offers various links to useful web sites
www.astalavista.com     - up to date tutorials but limited tools (mostly shareware)
www.hackers.com         - nice graphics on site but limited tutorials

help.unc.edu            - know how to use windows efficiently
www.users.globalnet.uk/~jchap.contents - teaches you how to build your own computer

www.bo2k.com            - Cult of the Dead Cow's site for concerning Back Orifice 2000
subseven.slak.org       - another popular Trojan's site called Sub7

www.borland.com         - very useful tools, such as C++ compiler, free for downloading
www.thefreecountry.com  - free programming tools plus up to date important pc information

www.melissavirus.com    - learn all about the melissa virus
www.pcworld.com/cgi-bin/pcwtoday?ID=10302 - learn about the virii affecting our computers today
www.repsec.com          - Repent Security Incorp. gives you useful data on security issues

www.welcome.to/HWA.hax0r.news - site for the Hackers Without Attitude group 
RHINO9.ML.ORG           - visit RHINO9's site
home.cyberarmy.com/tcu  - The Cyber Underground offers tutorials, texts and tools

www.microsoft.com       - visit Bill and learn all about the future programs that we will hack
www.linux.org           - teaches you all about Linux, how to use it and where to get it

www.altavista.com       - seach engine for hackers in need!
www.google.com          - the best search engine on the net, quick and efficient

www.opera.com           - download Opera, the fastest web browser on the net

   1.8 Books
   *********

The books listed below are of interest to hackers, newbies in particular should also like them:

+ MS DOS for dummies 3rd edition or above

+ Computer Security Basics by Deborah Russell and G.T. Gengemi Sr.

+ The Stephen Cobb Complete Book of PC and LAN Security by Stephen Cobb

+ Building a Secure Computer System by Morrie Gasser

+ Modern Methods for Computer Security by Lance Hoffman

+ Practical Unix Security by Simson Garfinkel and Gene Spafford

+ Complete Lan Security and Control by Peter Davis

+ Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Schneier               
+ The Little Black Book of Computer Viruses by Mark Ludwig

+ Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System by     John McAfee and Colin Haynes

+ The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling
  (this book has been released free on the internet by Bruce Sterling download it at 
    www.mit.edu/hacker)

+ Hackers: Heroes of the Computer Revolution by Steven Levy

   1.9 Conclusion
   **************

This introduction to hacking has been written in view of helping the average newbie where to begin his long journey into the cyberworld.  It must have been noted that some information have been taken from various sources (from 2 sources actually)and this is because we take the best and simplest but do not modify the information, the rest we wrote it.  A brief note to the born newbie: hacking is a life-long process and can also be acheived by huge amount of practice.  Even a hacker is continually learning new tricks.  This tutorial is presented in its very first version.  However, if you feel that we have missed something then should you contact us through our email listed at the end of this tutorial.  Hence, let the journey into the hacker's world begin!

   2.0 About Digital Hack Dot Org
   ******************************

Digital Hack Dot Org is the newly-borned group of computer loving individuals who are trying to earn a modest place in the vast place of the hacker's underground world.  DHDO compromises of only 4 members namely: sid vici0us (commander in chief), zana tas (secretary), deEp coma (caporal) and digital flu (soldier).  Actually, we were here a long time ago but we have decided to make our presence felt just recently.  The obvious reason for this was that we were all newbies and that we were learning (we still are).  Contributors for writing articles for our next document are welcomed and can reach us at out email listed below.
Keep watching as more tutorials are on their way.
Also, do not forget that real hackers drink milk!!!
  
*************************************************************************************************

             D   I   G   I   T   A   L     H   A   C   K     D   O   T     O   R   G

               k n o w l e d g e  i s  p o w e r, i n  z e  r i g h t  h a n d s !
      
            ==========================HACKERS WITH GRAMMAR===========================
          
                             contact us at amateur@fuckMicrosoft.com
                         
       
                             introduction into hacking version 1.0
                                          29/10/2001

       PERMISSION TO DISTRIBUTE & COPY FREELY GIVEN, BUT IT MUST BE SHOWN THAT THE ORIGINAL             
                                AUTHORS ARE DIGITAL HACK DOT ORG
