Picture Picture
Picture

Happy Hacker

We at HDC are not in the business of slandering, but recently, Carolyn Meinel's credibility as someone who should be attempting to disseminate information concerning hacking is somewhat in question. We just advise that you take everything she writes or says with a grain of salt (as with anything). And note, her book she is now selling is barely more than a compilation of the Guides you can find below. Why pay when you can get the information for free? Either way, to each there own, you're free to think for yourself.

Regards,
The HDC Staff

P.S. Good material can be found below, you just have to search a little.

[ Mailing List | GTmHH | Related Links ]

Return to NeoHaven
Picture

The Happy Hacker Mailing List

The Happy Hacker Mailing List is something that was stumbled upon while reading an issue of The Internet Underground Magazine (now out of print). The purpose of the mailing list and associated articles is to help educate the "newbie" in the arena of hacking - naturally the goal is to mold today's generation into understanding and reliable future system administrators...and the articles that Carolyn Meinel (Happy Hacker Moderator) writes do shed some light on basic hacking skills for the ultimate newbie.

Visit the Hacker Forum online chat group (hosted by InfoWar.Com), to partake in discussions concerning hacking, and submit questions about The Guide to (Mostly) Harmless Hacking, also by Carolyn Meinel. Below are the current volumes of the ezine for your perusal...and be sure to visit the above site for further information.

To subscribe to the Happy Hacker mailing list, send an email to
hacker@techbroker.com with the message `subscribe happy-hacker' in the body of the message (minus the quotes of course). That should do it.

Picture

Guide To (mostly) Harmless Hacking

[ Volume 1 ]

GTmHH (Vol.1 #1)

How to finger a user via telnet.

GTmHH (Vol.1 #2)

How to forge email and spot forgeries.

GTmHH (Vol.1 #3)

How finger can be used as one of the most common ways to break into non-public parts of an Internet host.

GTmHH (Vol.1 #4)

How to get Usenet spammers kicked off of there Internet Service Provider's.

GTmHH (Vol.1 #5)

More on dealing with Usenet spammers.

GTmHH (Vol.1 #6)

How to nuke offensive web sites.

GTmHH (Vol.1 #7)

How to forge email using Eudora Pro.

[ Volume 2 ]

GTmHH (Vol.2 #1)

Internet For Dummies.

GTmHH (Vol.2 #2)

Linux for Beginners.

GTmHH (Vol.2 #3)

Intro to TCP/IP - Oversized ping packet and denial-of-service (DoS) exploit explained.

GTmHH (Vol.2 #4)

More on TCP/IP - Port Surfing! Daemons! How to get on almost any computer without logging in or breaking the law.

[ Volume 3  ]

GTmHH (Vol.3 #1)

How to protect yourself from email bombs using procmail filtering.

GTmHH (Vol.3 #2)

Mapping the Internet using Dig, Whois, Traceroute and other utilities.

GTmHH (Vol.3 #3)

How to keep from getting kicked off IRC!

GTmHH (Vol.3 #4)

How to read email headers and find Internet hosts.

GTmHH (Vol.3 #5)

The Dread GTmHH on Cracking.

GTmHH (Vol.3 #6)

How to Be a Hero in Computer Lab

GTmHH (Vol.3 #7)

Introduction to Computer Viruses

GTmHH (Vol.3 #8)

The Magical Mystical Crypto-Primer

GTmHH (Vol.3 #9)

War Tools! Scan, Sniff, Spoof and Hijack

GTmHH (Vol.3 #10)

How to Break into Windows NT

[ Volume 4 ]

GTmHH (Vol.4 #1)

MORE on Hacker Wars on Internet Relay Chat (IRC)  (PDF)

[ Volume 5 ]

GTmHH (Vol.5 #1)

Shell programming.

GTmHH (Vol.5 #2p1)

Shell programming: An Exploit Explained (Part 1)

GTmHH (Vol.5 #2p2)

Shell programming: An Exploit Explained (Part 2)

GTmHH (Vol.5 #3)

More on Advanced Unix Shell Programming

[ Volume 6 ]

GTmHH (Vol.6 #1)

Real Hackers: Eric S. Raymond

[ Volume 7 ]

GTmHH (Vol. 7)

Introduction to Hacker Wargaming

[ Beginner's  Series ]

GTmHH (Begin #1)

So you want to be a harmless hacker?  (PDF)

GTmHH (Begin #2)

Hacking from Windows95.

GTmHH (Begin #3)

How to get a good shell account (Part 1).

GTmHH (Begin #3)

How to get a good shell account (Part 2).

GTmHH (Begin #4)

Using the web to find info on hacking.

GTmHH (Begin #5)

Computer Hacking. Where did it begin, and how?

GTmHH (Begin #6)

PGP for Newbies

GTmHH (Begin #7)

The Exploit Files

[ Computer Crime Law ]

GTmHH (Law #1)

Computer Crime Law

[ Microsoft Only Series ]

GTmHH (MS Vol.1 #1)

Getting serious with Win95

GTmHH (MS Vol.1 #2)

Getting serious with Win95:
Batch File Programming

Picture

Related Websites

High Slander

HappyHacker.Org

Hackerz.Org

Picture
menubar-r
menublip
mi-neo-over
menublip2
1-tabletop
Picture

H A C K E R S . C O M
Feedback: webmasters@hackers.com
Copyright © 1998 HDC - Read the Disclaimer before operating.

 

Return Home