WarezReview -  Really the best search engine dedicated to software crakks, network security, vcd, dvd, mp3 links.
Anti-Hak -  Technical White Papers on preventing cracking / hacking / tampering with the security and copy integrity of commercial software programs.
ProSpy -  Official Espion site! Download top rated software that meets your needs. Computer and remote monitoring software, covert spy software, detective databases, geneology searches and more!
Crakks AM -  Offers crakk codes, password crakkers and serial number generator.
Astalavista -  Daily-updated search engine is designed for computer security-related material. See instructions on how to link to it and search by keyword.
SpyCop -  Crap and out of date.  Doesn't detect most of the spywarez I recommend on this page.  If you're desperate to know if your spouse, boss or employees spying on you, load Back Orifice on their hard drive and turn the tables on them.
The DVD Hack
  
DVD's security system was supposed to be hacker-proof. Turns out it wasn't idiot-proof. Thanks to a gaffe by one of the decryption software's licensees, a band of Norwegian programmers made it possible to make a perfect copy of a DVD film with none of that pesky encryption. It all happened because DVD playback software for Linux doesn't exist. There are numerous DVD playback utilities for Windows --WinDVD, ATI DVD, Compaq DVD, XingDVD -- but nothing, nada, zip for Linux players.

The Norwegians began trying to reverse-engineer Windows players to figure out how to handle playback. But all of the players had an encrypted decryption key ... except one: XingDVD, from RealNetworks' subsidiary Xing Technologies, had failed to encrypt its key because of an oversight.

Some people just wanted a DVD player, but others took it a step further. They used the decryption key to create a tiny utility to remove the encryption in a DVD movie, allowing for movies to be illegally copied.

It shouldn't be surprising that an awful lot of people are upset at this week's Wired News reports about a utility to remove DVD security. But it's out there and people are using it. So what's the movie industry to do?

Increasing security is definitely a start, along with changing the security system. That would mean every DVD console on the marketplace would need a firmware upgrade. But DVD vendors may just have to bite the bullet if they want to protect the format.

The next issue is what to do with DVD-ROM drives, since there is now a way for pirates to easily get at the movies. This is the second time that PC accessibility has enabled content piracy. Pirating music from CDs using MP3 is easy for just about anybody, thanks to commercial ripping software like MusicMatch's Jukebox.

With DeCSS, people can make illegal copies of DVD movies. Rendering CD/DVD drives for computers incapable of reading music CDs or DVD movies might be another way to go. Maybe the industry won't stop the pros but it can stop the average Joes.

Then there's recordable DVD. Right now, recordable DVD drives can only store 2.6GB per side, and DVD movies are either 4.7GB or 9.4GB. People copying movies with DeCSS are turning their DVDs into low-quality VCD. Even Jon Johansen, who was involved in the development of DeCSS, can't understand why people bother. But high-capacity recordable DVD is coming. In the first quarter of 2000, there will be 4.7GB recordable DVD drives, and DVD copying will be much easier. It may not be a bad idea to hold off on releasing the drives until the copy protection issue is sorted out.
Legal Help 4 Hakkerz -  Free immediate consultation with one of our criminal defense lawyers with over 30 years of experience covering crimes and legal charges regarding computer offenses.
Hacker How to Guide...1
The Unabridged Hakker Dictionary -  The bible of hakking terms, definitions and usage.  If you don't understand a hakking term, then here's where you'll find it.  The finest lexicon available.
In the computer underworld "Hades" there are two distinctions.  As in zen, there are two sides, two forces...hackers and crackers.  Do not confuse one for the other.  In a sense, hackers create; they find the weak, in code, in security and they point it out.  The cracker however is out to destroy, like Shiva.  The cracker scans for open ports, bypasses security measures and infiltrates and destroys the existing system for pleasure.  There is excitement to be gained by both methods, however society frowns upon the cracker and condemns him to exile.  I do not advocate hacking or cracking, but it is important that you learn what threats are out there and how you may defend yourself.  Ask yourself, do I want to explore weaknesses?  Do I want to destroy?  Do I want to protect?  Sides must be chosen, the choice is yours.  I advocate you choosing the path to enlightenment, whichever way it leads.

- Dr. Vad Gratesen
Stockholm  (1998).
BO2K - aka - BACK ORIFICE 2.0 - Yes, it's here.  Click here to download the shareware and plugins.  Are you using this as a remote network admin tool?  Are you watching your neighbours keystrokes?  The choice is yours. 
Grandmaster Ratte'
cDc Warrior-Priest-King
"We're into telecom for the groupies and money. Bling bling."


           __//////\ -cDc- CULT OF THE DEAD COW -cDc- /\\\\\\__
Est. 1984 \\\\\\/ NINJA STRIKE FORCE * HACKTIVISMO \////// Est. 1984
FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE

Press Contact:
The Deth Vegetable
cDc Minister of Propaganda
veggie@cultdeadcow.com


BACK ORIFICE 2000, THE ONLY WAY TO CONTROL A MICROSOFT NETWORK
[July 2nd, San Francisco] The CULT OF THE DEAD COW (cDc) will debut its latest remote network administration tool called Back Orifice 2000 on July 10th at Defcon VII in Las Vegas. This program is the most powerful application of its kind and puts the administrator solidly in control of any Microsoft network.

Back Orifice 2000 is a best-of-breed network administration tool, granting sysadmins access to every Windows machine on their network. Using Back Orifice 2000, network administrators can perform typical desktop support duties without ever leaving their desk.

Some notable features include:


Windows NT support (as well as Windows 95 and 98)
an open plugin architecture to allow for 3rd party add-ons
strong cryptography to ensure secure network administration
open source, available under the GNU Public License
"It's a totally professional tool. Essentially it sews together Microsoft networks in ways that were never possible before," says Mike Bloom, Chief Technical Officer for Gomi Media, Toronto. "BO2K is a control freak's dream and the strong crypto feature gives the legitimate administrator a level of confidence that just didn't exist before. It's one kickass app".
Back Orifice 2000 evolved from Back Orifice (the name itself a pun on the "Back Office" server suite from Microsoft), released by the cDc at last year's Defcon.

Back Orifice 2000 was written by cDc code monster Dildog with input from Sir Dystic, the originator of Back Orifice.

According to Dildog, "When it comes to administering Windows networks, the most problematic thing has always been the lack of powerful remote control. Unix administrators have enjoyed remote logins for decades, and with the dawn of tools like Secure Shell (SSH), Unix systems can be securely administered from anywhere in the world. Windows needed it too."

"Now that we've enhanced the Windows administration experience, we hope that Microsoft will do its best to ensure that its operating systems are robust enough to handle the control we've given to them," added Dildog.

If last year's release of Back Orifice is any indicator, Back Orifice 2000 will be a huge success. The first generation app caused quite a stir with the hacking community and the press. The Cult of the Dead Cow's webmaster reported a whopping 300,000 downloads from the primary and mirror sites, and predicts that Back Orifice 2000 will move briskly into the Microsoft networking environment.

That's good news for network administrators but not the best news for Microsoft. Sysadmins will have at their disposal a professional open-source application, free of charge. Unfortunately for Microsoft, Back Orifice 2000 could bring pressure on the software leviathan to finally implement a security model in their Windows operating system. Failure to do so would leave customers vulnerable to malicious attacks from crackers using tools that exploit Windows' breezy defenses.

Back Orifice 2000 will be available for download free of charge from http://www.bo2k.com/ after July 10th, 1999.


............................................................................
The CULT OF THE DEAD COW (cDc) is the most influential group of hackers in the world. Formed in 1984, the cDc has published the longest running e-zine on the Internet, traded opinions with large software companies, and entered numerous dance competitions. We could go on, but who's got the time?

For more background information, journalists are invited to check out our Medialist at http://www.cultdeadcow.com/news/medialist.htm.

"Microsoft", "Windows", "Back Office", "Sysadmin", "Desk", and "Leviathan" are all trademarks of the Microsoft Corporation. Blah blah blah, give it a rest already.

                                                    SECURITY ALERT  

____________________________www.cultdeadcow.com_____________________________


    RUNNING A MICROSOFT OPERATING SYSTEM ON A NETWORK?
                                         OUR CONDOLENCES!

[July 21, San Francisco] The CULT OF THE DEAD COW (cDc) will release Back
Orifice, a remote MS Windows Administration tool at Defcon VI in Las Vegas
(www.defcon.org) on August 1. Programmed by Sir Dystic [cDc], Back Orifice
is a self-contained, self-installing utility which allows the user to
control and monitor computers running the Windows operating system over a
network.

Sir Dystic sounded like an overworked sysadmin when he said, "The two main
legitimate purposes for BO are, remote tech support aid and employee
monitoring and administering [of a Windows network]."

Back Orifice is going to be made available to anyone who takes the time to
download it. So what does that mean for anyone who's bought into
Microsoft's Swiss cheese approach to security? Plenty according to
Mike Bloom, Chief Technical Officer for Gomi Media in Toronto.

"The current path of learning I see around me is to learn what you have to
to cover your ass, go home and watch Jerry. Microsoft has capitalized on
this at the cost of production value which translates down to security. A
move like releasing [Back Orifice] means that the lowest common
denominator of user will have to come to understand the threat, and that
it is not from [Sir Dystic] writing an app that [potentially] turns Win32
security on its ear, but that Microsoft has leveraged itself into a
position where anyone who wants to can download an app [or write their
own!] and learn a few tricks and make serious shit happen."

None of this is lost on Microsoft. But then again, they don't care.
Security is way down on their list of priorities according to security
expert Russ Cooper of NT BUGTRAQ (www.ntbugtraq.com). "Microsoft doesn't
care about security because I don't believe they think it affects their
profit. And honestly, it probably doesn't." Nice. But regardless of which
side of the firewall you sit on, you can't afford not to have a copy of
Back Orifice. Here are the specs:


Back Orifice (BO) allows the user to remotely control almost all parts of
the operating system, including: 

     File system
     Registry
     System
     Passwords
     Network
     Processes

* BO contains extensive multimedia control, allowing images to be captured
from the server machine's screen, or from any video input device attached
to the machine.

* BO has an integrated HTTP server, allowing uploads and downloads of
files to and from a machine on any port using any http client.

* BO has an integrated packet sniffer, allowing easy monitoring of network
traffic.

* BO has an integrated keyboard monitor, allowing the easy logging of
keystrokes to a log file.

* BO allows connection redirection, allowing connections to be bounced off
a machine to any other machine on the Internet.

* BO allows application redirection, allowing text based applications
running on the server machine to be controlled via a simple telnet
session.  Even open a remote shell.

* BO has a simple plugin interface, allowing additional modules to be
written by third parties, and executed in Back Orifice's hidden system
process.

* BO is EASY TO INSTALL!  Simply run the server, and it installs itself,
and removes the executable it was originally run from, or it can be
attached to any other Windows executable, which will run normally after
installing the Back Orifice server.

* BO is TRANSPARENT!  Back Orifice does not show up in the task list, or
even the Close Programs dialog, it is automatically restarted each time
the computer boots, and does not affect the operation of any other
applications.

* BO is CONFIGURABLE!  The filename that Back Orifice installs itself as,
the port Back Orifice communicates on, and the encryption key are all
configurable before the server is installed.

* BO is ENCRYPTED!  Communication packets used by Back Orifice are
encrypted with a user definable key, so only the intended client can
control the server.

* BO is FREE!  All the functionality mentioned above AND MORE is available
in the 120k server, along with an easy to use text based or GUI client,
Back Orifice comes with everything you need to distribute and control any
number of machines.

* BO is GROWING!  New features, increased efficiency, new plugins, and
more support are being added to Back Orifice every day.


After August 3, Back Orifice will be available from www.cultdeadcow.com
free of charge.

For further details or lucrative film offers, please contact:

The Deth Vegetable
Minister of Propaganda
CULT OF THE DEAD COW
veggie@cultdeadcow.com

............................................................................

The CULT OF THE DEAD COW (cDc) is the most influential group of hackers in
the world. Formed in 1984, the cDc has done everything from publish the
longest running e-zine on the Internet to diddling military networks
around the globe. We could go on, but who's got the time. Journalists can
check out the Medialist link on our Web site for more background
information. 
Untitled












Hacker Groups

[HaRM]'s Little Hell Hole
2600 Homepage
2600 Magazine
Access All Areas
Active Matrix's Hideaway
ADM CreW (ftp)
Aleph One
AlpineWorld's Hackers Links
AntiOnline
CHOOSE
Columbia 2032
Cult of the Dead Cow
Cult Of The Dead Cow ("Back Orifice")
Cypherpunks FTP Archive at Berkeley
Dark Secrets of the Underground
DEF CON
Digicrime
DilDog
dISEr
Elite Hackers
EliteHackers
FTH98
Fyodor's Playhouse
Genocide 2600's Hack Hacking NonHacked Warez Page
hack.co.za
Hacker News Network
Hacker World
Hacker's Layer
Hacker's Supply
Hacks & Cracks
Hacks'R Us...
Hobbit
HP BUG of the Week
Instigators Lair
Intercore
Jabukie
KloN Underground Page
Mac Hacks
Mnemonix
New Order
NT Security
Phrack Magazine Homepage
r00t Sir Dystic
Rhino9
Rootshell
Rootshell
route|daemon9
Sativa - The Valley of Knowledge
Security and Hackerscene
Security Bugware
Security Focus (Bugtraq)
SexPistol's Hack Archive
Showdown.org
Sinnerz
Teknopia
THC - The Hacker's Choice
The Genocide 2600 Group
The greatest link page for cracks, serial numbers and "security"
The World of Hacking
The World's Greatest Hacking Links
United Federation of Hackers
unix / net / hack page united states mirror
Welcome To Microcrap
X-treme
Yahoo!- Computers and Internet:Security and Encryption:Hacking
Back
THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING
Hacking Ethics?
Hacking/Tools/Programs/Appz/Warez
Hacker How to Guide...2
2600