Full Disclosure mailing list archives

[PHC] FREE SECURITY BOOKS !!! [PHC]


From: epic () hack3r com (EPiC)
Date: Wed, 2 Oct 2002 19:33:17 -0600

# Taken from hackproofinglinux.tar.gz


Chapter 1

Introduction to Open Source Security

Solutions in this chapter:

·     Using the GNU General Public License

·     Soft Skills: Coping with Open Source Quirks

·     Should I Use an RPM or Tarballs?

·     Obtaining Open Source Software

·     A Brief Encryption Review

·     Public Key and Trust Relationships

·     Auditing Procedures

·     Summary

·     Solutions Fast Track

·     Frequently Asked Questions

Introduction

# What partof this documents is "fake"?

----- Original Message -----
From: <phc () hush com>
To: <full-disclosure () lists netsys com>; <phc () hushmail com>
Sent: Wednesday, October 02, 2002 7:03 PM
Subject: [Full-disclosure] [PHC] FREE SECURITY BOOKS !!! [PHC]



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Books on the PHC site are all fake and designed to promote cyberterrorism.



On Wed, 02 Oct 2002 17:05:56 -0700 phc () hushmail com wrote:
INTRODUCING THE PHC LIBRARY OF ALEXANDRIA KNOWLEDGE HAVEN THINK TANK
<br>REFERENCE COLLECTION OF ADEPTUS HACKERUM GRAND ORACLE OF THE
NINTH ANGLE
<br>OSIRIS RISING SCHOLARLY INFORMATION DISSEMINATION MOUNT OLYMPUS
<br>
<br>***** http://phrack.efnet.ru/books/ *****
<br>***** http://phrack.efnet.ru/books/ *****
<br>***** http://phrack.efnet.ru/books/ *****
<br>***** http://phrack.efnet.ru/books/ *****
<br>***** http://phrack.efnet.ru/books/ *****
<br>
<br>In the time honored traditions of &#39;information wants to be
free,&#39; &#39;hacking
<br>is about knowledge and ethics and charity,&#39; and &#39;br0,
pass the bong,&#39; PHC
<br>has assembled a small library of the most sought after HACKING
and SECURITY
<br>books on the market. Well, almost. We still haven&#39;t added
the literary
<br>masterpiece penned by the hand of Michael Schiffman (route) and
various
<br>other brain child works of the security scene&#39;s most prolific
and
<br>charismatic personalities. However, time will see to it that
little Johnny
<br>&#39;xXx_modem_xXx&#39; Smith in NYC will have a doorway into
the realm of HACKING
<br>INFORMATION that is complete and bursting with life, without
having to pull
<br>out his semi-automatic to cap a priest in cold blood and acquire
the reading
<br>materials with the donation box pillage...
<br>
<br>In the Information Age a nigga gotta be down wit the info superfreezy
<br>highway f0 sheezy yo kno what i&#39;m sayin kickin back wit the
dawgs hackin
<br>they mudderfuckin turf and making a tight get away yo know what
i&#39;m sayin
<br>school iz for foolz gotta break it assimilate it fucking macerate
it and
<br>then be poppin off wit the hackin dolla before they be layin
down the smack
<br>and bussin us throwin us back in juvey so some fuckin white punk
can tear us
<br>a new asshole ya know what i&#39;m sayin.
<br>
<br>Any copyright cries will result in us looking for ways to take
advantage of
<br>loopholes in the international copyright laws... *we dunno* some
way of
<br>representing the material in other forms so that no copyright
violations
<br>have taken place (technically, llololl0l0lol). Email us if you&#39;re
down with
<br>this legal shit.
<br>
<br>
<br>Walking to the library
<br>One thought on my mind
<br>Gotta have that one book
<br>One book of a kind
<br>
<br>They call him route
<br>He has nice glutes
<br>I yearn for his book
<br>Fuck Ach-Pee tutes
<br>
<br>They call him route
<br>He has binary tats
<br>He drives a viper
<br>He has V-shaped lats
<br>
<br>They call him route
<br>He doesn&#39;t hack
<br>But that&#39;s a-ok
<br>&#39;Cuz he wrote phrack
<br>
<br>They call him route
<br>He does understand
<br>Rip ICMP outta the kernel
<br>Ram it in-ta userland
<br>
<br>They call him route
<br>A grant from The Guild
<br>He dives from ego to floor
<br>And then gets killed
<br>
<br>They call him route
<br>Nirva sits on his lap
<br>Libnet gets the ASN.1
<br>Nirva&#39;s ass gets a tap
<br>
<br>They call him route
<br>He brought ya T-P-E
<br>He&#39;ll be nailing yer box
<br>Thru yer vuln gopher-d
<br>
<br>They call him route
<br>He has oily skin
<br>Don&#39;t be mentioning it tho
<br>Or SYN after SYN
<br>
<br>They call him route
<br>Lotsa pics on InfoNexus
<br>Make fun of his height
<br>Headbutt to tha solar plexus
<br>
<br>They call him route
<br>He&#39;s packing six point two
<br>He has big gunz tho
<br>So too da too da loo
<br>
<br>They call him route
<br>He has a duck
<br>Girls like to meet him
<br>To have a discussion about guys
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlQEARECABQFAj2bl2ANHHBoY0BodXNoLmNvbQAKCRCcVkAK1xe2VznJAKCU8nbEFZla
8JNPGmExKYsFD6ScmwCgsORuEswR4IDUoZ870ssh+8Alh7Q=
=a5jG
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Current thread: