lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: epic at hack3r.com (EPiC)
Subject: [PHC] FREE SECURITY BOOKS !!! [PHC]

# Taken from hackproofinglinux.tar.gz


Chapter 1

Introduction to Open Source Security

Solutions in this chapter:

?     Using the GNU General Public License

?     Soft Skills: Coping with Open Source Quirks

?     Should I Use an RPM or Tarballs?

?     Obtaining Open Source Software

?     A Brief Encryption Review

?     Public Key and Trust Relationships

?     Auditing Procedures

?     Summary

?     Solutions Fast Track

?     Frequently Asked Questions

Introduction

# What partof this documents is "fake"?

----- Original Message -----
From: <phc@...h.com>
To: <full-disclosure@...ts.netsys.com>; <phc@...hmail.com>
Sent: Wednesday, October 02, 2002 7:03 PM
Subject: [Full-Disclosure] [PHC] FREE SECURITY BOOKS !!! [PHC]


>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Books on the PHC site are all fake and designed to promote cyberterrorism.
>
>
>
> On Wed, 02 Oct 2002 17:05:56 -0700 phc@...hmail.com wrote:
> >INTRODUCING THE PHC LIBRARY OF ALEXANDRIA KNOWLEDGE HAVEN THINK TANK
> ><br>REFERENCE COLLECTION OF ADEPTUS HACKERUM GRAND ORACLE OF THE
> >NINTH ANGLE
> ><br>OSIRIS RISING SCHOLARLY INFORMATION DISSEMINATION MOUNT OLYMPUS
> ><br>
> ><br>***** http://phrack.efnet.ru/books/ *****
> ><br>***** http://phrack.efnet.ru/books/ *****
> ><br>***** http://phrack.efnet.ru/books/ *****
> ><br>***** http://phrack.efnet.ru/books/ *****
> ><br>***** http://phrack.efnet.ru/books/ *****
> ><br>
> ><br>In the time honored traditions of &#39;information wants to be
> >free,&#39; &#39;hacking
> ><br>is about knowledge and ethics and charity,&#39; and &#39;br0,
> >pass the bong,&#39; PHC
> ><br>has assembled a small library of the most sought after HACKING
> >and SECURITY
> ><br>books on the market. Well, almost. We still haven&#39;t added
> >the literary
> ><br>masterpiece penned by the hand of Michael Schiffman (route) and
> >various
> ><br>other brain child works of the security scene&#39;s most prolific
> >and
> ><br>charismatic personalities. However, time will see to it that
> >little Johnny
> ><br>&#39;xXx_modem_xXx&#39; Smith in NYC will have a doorway into
> >the realm of HACKING
> ><br>INFORMATION that is complete and bursting with life, without
> >having to pull
> ><br>out his semi-automatic to cap a priest in cold blood and acquire
> >the reading
> ><br>materials with the donation box pillage...
> ><br>
> ><br>In the Information Age a nigga gotta be down wit the info superfreezy
> ><br>highway f0 sheezy yo kno what i&#39;m sayin kickin back wit the
> >dawgs hackin
> ><br>they mudderfuckin turf and making a tight get away yo know what
> >i&#39;m sayin
> ><br>school iz for foolz gotta break it assimilate it fucking macerate
> >it and
> ><br>then be poppin off wit the hackin dolla before they be layin
> >down the smack
> ><br>and bussin us throwin us back in juvey so some fuckin white punk
> >can tear us
> ><br>a new asshole ya know what i&#39;m sayin.
> ><br>
> ><br>Any copyright cries will result in us looking for ways to take
> >advantage of
> ><br>loopholes in the international copyright laws... *we dunno* some
> >way of
> ><br>representing the material in other forms so that no copyright
> >violations
> ><br>have taken place (technically, llololl0l0lol). Email us if you&#39;re
> >down with
> ><br>this legal shit.
> ><br>
> ><br>
> ><br>Walking to the library
> ><br>One thought on my mind
> ><br>Gotta have that one book
> ><br>One book of a kind
> ><br>
> ><br>They call him route
> ><br>He has nice glutes
> ><br>I yearn for his book
> ><br>Fuck Ach-Pee tutes
> ><br>
> ><br>They call him route
> ><br>He has binary tats
> ><br>He drives a viper
> ><br>He has V-shaped lats
> ><br>
> ><br>They call him route
> ><br>He doesn&#39;t hack
> ><br>But that&#39;s a-ok
> ><br>&#39;Cuz he wrote phrack
> ><br>
> ><br>They call him route
> ><br>He does understand
> ><br>Rip ICMP outta the kernel
> ><br>Ram it in-ta userland
> ><br>
> ><br>They call him route
> ><br>A grant from The Guild
> ><br>He dives from ego to floor
> ><br>And then gets killed
> ><br>
> ><br>They call him route
> ><br>Nirva sits on his lap
> ><br>Libnet gets the ASN.1
> ><br>Nirva&#39;s ass gets a tap
> ><br>
> ><br>They call him route
> ><br>He brought ya T-P-E
> ><br>He&#39;ll be nailing yer box
> ><br>Thru yer vuln gopher-d
> ><br>
> ><br>They call him route
> ><br>He has oily skin
> ><br>Don&#39;t be mentioning it tho
> ><br>Or SYN after SYN
> ><br>
> ><br>They call him route
> ><br>Lotsa pics on InfoNexus
> ><br>Make fun of his height
> ><br>Headbutt to tha solar plexus
> ><br>
> ><br>They call him route
> ><br>He&#39;s packing six point two
> ><br>He has big gunz tho
> ><br>So too da too da loo
> ><br>
> ><br>They call him route
> ><br>He has a duck
> ><br>Girls like to meet him
> ><br>To have a discussion about guys
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> ><br>
> -----BEGIN PGP SIGNATURE-----
> Version: Hush 2.2 (Java)
> Note: This signature can be verified at https://www.hushtools.com/verify
>
> wlQEARECABQFAj2bl2ANHHBoY0BodXNoLmNvbQAKCRCcVkAK1xe2VznJAKCU8nbEFZla
> 8JNPGmExKYsFD6ScmwCgsORuEswR4IDUoZ870ssh+8Alh7Q=
> =a5jG
> -----END PGP SIGNATURE-----
>
>
>
>
> Get your free encrypted email at https://www.hushmail.com
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists