arpanet.hac   4439
  |  Screwing around with Arpanet, by Hackman
 | arpanet.txt   4736
  |  Attacking Arpanet by the Hackman of Hollow Hills
 | arpanet1.con   4505
  |  Hacking Arpanet, by The Hackman of The Hollow Hills
 | arpanet1.txt   7040
  |  Hacking ARPANET Part I, by The Source of The Listening Post
 | arpanet2.txt   12160
  |  Hacking ARPANET Part II by The Source of The Listening Post
 | arpanet3.txt   7552
  |  Hacking ARPANET Part III by The Source
 | arpanet4.txt   4608
  |  Hacking ARPANET Part IV by The Source
 | arpanet5.txt   8064
  |  Hacking ARPANET Part V by The Source
 | arpanet6.txt   13824
  |  Hacking ARPANET Part VI by The Source
 | bctj1_04.txt   7457
  |  Ethernet Fields
 | bomb.txt   8594
  |  How to Send Fake Mail Using SMTP Servers by Hunter
 | bump.txt   8231
  |  Things that go Bump in the Net, by David Chess of IBM
 | denning.txt   58773
  |  Concerning Hackers who Break into Computer Systems (October 1, 1990)
 | dial_5   5766
  |  Dialout List #5, by Spin-Doc (February 22, 1994)
 | dialout.txt   1785
  |  A Collection of Internet Dial-Outs
 | dialout1.txt   68938
  |  Novice Manual on Using Outdial Modems by Blue Adept
 | dialoutslst.hac   29446
  |  (I)nter(N)et->(T)ym(N)et List Version 1.0 - January 1991 -
 | disabled   3072
  |  Disabled Membership Guidelines and Rules for PC-Pursuit (April 13, 1992)
 | dummy22.txt   423772
  |  Big Dummy's Guide to the Internet, v.2.2 by the Electronic Frontier Foundation (1994)
 | emsss.txt   10317
  |  The Art of E-Mail Forging and Tracing Explained in one Simple Text
 | engineer.rpt   19456
  |  Recommendations Report for File Transfer Via PC Pursuit (January 3, 1989)
 | equip   2048
  |  PC Pursuit: Equipment and Software Requirements
 | esnet.txt   58650
  |  Terminal Servers and Network Security, by C.E. Bemis and Lynn Hyman (December 12, 1990)
 | exploits.txt   3714
  |  A Collection of Exploits from Legions of the Underground
 | firewall.txt   5904
  |  Internet Firewall by Darkstar of NFG
 | ftpintro   7861
  |  Anonymous FTP: Questions, Answers, Etc. by Odin (January 5, 1990)
 | fwall.txt   5834
  |  Internet Firewalls, by DARKSTAR of NFG
 | gtmhh-bs1.txt   12168
  |  The Guide to (Mostly) Harmless Hacking: Beginners' Series #1 by Carolyn Meinel
 | gtmhh-cc1.txt   19786
  |  The Guide to (Mostly) Harmless Hacking: Computer Crime Law Issue #1 by Peter Thiruselvam and Carolyn Meinel
 | gtmhh1-1.txt   9089
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 1
 | gtmhh1-2.txt   21648
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 2 (How to Forge E-Mail)
 | gtmhh1-3.txt   9158
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 3 (How Finger Can Be Used)
 | gtmhh1-4.txt   21770
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 4 (How to Get Usenet Spammers Kicked Off)
 | gtmhh1-5.txt   12585
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 5 (How to Get Email Spammers Kicked off Their ISPs)
 | gtmhh1-6.txt   18850
  |  The Guide to (Mostly) Harmless Hacking: Volume 1 Number 6 (How to Nuke Offensive Web Sites)
 | gtmhh2-2.txt   13662
  |  The Guide to (Mostly) Harmless Hacking: Volume 2 Number 2 (Linux)
 | gtmhh2-4.txt   37561
  |  The Guide to (Mostly) Harmless Hacking: Volume 2 Number 4 (Port Surfing)
 | gtmhh_bs31.txt   24576
  |  The Guide to (Mostly) Harmless Hacking: Volume 3 Number 1 (How to Get a Shell Account)
 | gtmhh_bs32.txt   15961
  |  The Guide to (Mostly) Harmless Hacking: Volume 3 Number 2 (How to Get a Good Shell Account)
 | hackenc.txt   143731
  |  The Hackers Encyclopedia by Logik Bomb (1995-1996 First Edition)
 | hackfaq.hac   106697
  |  FAQ to #hack IRC Channel, Beta .007
 | hackirc.txt   14052
  |  Hacking IRC: The Definitive Guide by Klider (1996)
 | hackpage.txt   10379
  |  Hacking Webpages: THe Ultimate Guide by Virtual Circuit and Psychotic
 | hackwww.txt   2843
  |  How to Hack the WWWboard Message Board 2.0 by kM of Hackers Club (May 12, 1997)
 | haq.01   35596
  |  The HAQ Frequently Asked Questions by Belisarius (June 11, 1994)
 | haq.02   30544
  |  The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part II)
 | haq.03   43250
  |  The HAQ Frequently Asked Questions by Belisarius (June 11, 1994) (Part III)
 | hexedit.txt   3454
  |  How to Hexedit mIRC - Flood Protection/Nuking by Lord Somer of The Hackers Layer
 | hi.txt   6924
  |  Introduction to Hacking by KwAnTAM_PoZeEtroN
 | hotmail.txt   6827
  |  The Hotmail Hack
 | how-to   4096
  |  How to use the PC-Pursuit Service
 | hqm.txt   4040
  |  Hacking Quickmail for Macintosh by The Brighter Buccaneer (February 28, 1995)
 | hwp.txt   12966
  |  Hacking Web Pages, by Goat
 | iad.txt   2157
  |  How to Advertise by Msging, Inviting, or Noticing Everyone on a Server by Lord Somer
 | ib.txt   3046
  |  The Infinite Mailbomb by OSPbaboon and KwAnTAM_PoZeEtroN
 | inet2000.txt   3703
  |  The iNET 2000 Online Service, by Deicide (April 5, 1993)
 | inetsec.txt   8903
  |  A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers v1.1 by Christopher Klaus (December 5, 1993)
 | internet.doc   13018
  |  The Beginner's Guide to the Internet by Weaons Master
 | internet.hac   49024
  |  A Hacker's Guide to the Internet, by Gatsby 1991
 | ipd.hac   2004
  |  Countries connected to the International Packet Switching Stream by The Force
 | iphijack.txt   46396
  |  A Simple Attack Against TCP, by Laurent Joncheray
 | irc.txt   2703
  |  How Do I Hack ChanOP on IRC by Lord Somer
 | ircfaq.txt   16758
  |  The IRC Frequently Asked Questions (FAQ) (Junary 15, 1996)
 | irchack.hac   14381
  |  Hacking IRC the Definitive Guide
 | irk.txt   1739
  |  Irc Bouncing Around Klines Using a unix Shell by Lord Somer (August 5, 1997)
 | jul93blt.txt   16431
  |  Connecting to the Internet: Security Considerations
 | mnemonic.txt   9692
  |  The PC-Pursuit Service Availability
 | na.txt   247107
  |  Anonymity on the Internet, by L. Detweiler (April 30, 1994)
 | netcat.txt   63679
  |  Netcat Rules the Net Version 1.0
 | netware1.txt   5670
  |  Stuboy's Netware Hacking Tips, Compliments of StuBoy (1997)
 | new-user   2048
  |  PC-Pursuit: New User Information
 | pingdumb.txt   5851
  |  Pinging For Dummies, by ESQ (2000)
 | pod.txt   5746
  |  Large Packet Attacks, A.K.A. the Ping of Death
 | proxy.txt   3474
  |  Using Web Proxies to Disguise your IP Address by Hardcore Pawn
 | rates   3072
  |  PC-Pursuit Rate Schedule (July 1, 1989)
 | rvprimer.txt   10979
  |  The Racal_Vadic Primer v1.0 (For PC-Pursuit)
 | smtp.txt   2545
  |  Mail Spoofing Explained for the Beginner
 | sniffer.txt   19746
  |  FAQ: The Sniffer Frequently Asked Questions Version 1.7
 | spoof.txt   13411
  |  Defending Against Sequence Number Attacks by S. Bellovin of AT&T Research (May 1996)
 | spoofing.txt   22066
  |  Web Spoofing: An Internet Con Game by Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach
 | tc   10240
  |  Terms and Conditions of Use for PC-Pursuit Service
 | td.txt  |  11195 |  |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |