Thursday, October 8, 2009

IP Address Hack, All About IP

In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.

Well I guess its one of the most important must learn manul for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed .

In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way.




What is IP and how to get the IP of a remote system::



Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer.

Lets take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:



Address Class Dotted Decimal Notation Ranges

Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx

Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx

Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx



The various classes will be clearer after reading the next few lines.



Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.

In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's".



A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as

"24's" and is commonly used by most ISP's.



Due to the growing size of the Internet the Network Administrators faced many problems. The Internet routing tables were beginning to grow and now the administrators had to request another network number from the Internet before a new network could be installed at their site. This is where sub-netting came in.



Now if your ISP is a big one and if it provides you with dynamic IP addresses then you will most probably see that whenever you log on to the net, your IP address will have the same first 24 bits and only the last 8 bits will keep changing. This is due to the fact that when sub-netting comes in then the IP Addresses structure becomes:



xxx.xxx.zzz.yyy



where the first 2 parts are Network Prefix numbers and the zzz is the Subnet number and the yyy is the host number. So you are always connected to the same Subnet within the same Network. As a result the first 3 parts will remain the same and only the last part i.e. yyy is variable.

***********************



For Example, if say an ISP xyz is given the IP: 203.98.12.xx Network address then you can be awarded any IP, whose first three fields are 203.98.12. Get it?



So, basically this means that each ISP has a particular range in which to allocate all its subscribers. Or in other words, all subscribers or all people connected to the internet using the same ISP, will have to be in this range. This in effect would mean that all people using the same ISP are likely to have the same first three fields of their IP Addresses.



This means that if you have done a lot of (By this I really mean a lot) of research, then you could figure out which ISP a person is using by simply looking at his IP. The ISP name could then be used to figure out the city and the country of the person. Right? Let me take an example to stress as to how cumbersome but easy (once the research is done) the above method can be.



In my country, say there are three main ISP’s:



ISP Name Network Address Allotted



ISP I 203.94.47.xx

ISP II 202.92.12.xx

ISP III 203.91.35.xx



Now, if I get to know the IP of an e-pal of mine, and it reads: 203.91.35.12, then I can pretty easily figure out that he uses ISP III to connect to the internet. Right? You might say that any idiot would be able to do this. Well, yes and no. You see, the above method of finding out the ISP of a person was successful only because we already had the ISP and Network Address Allotted list with us. So, what my point is, that the above method can be successful only after a lot of research and experimentation. And, I do think such research can be helpful sometimes.



Also, this would not work, if you take it all on in larger scale. What if the IP that you have belongs to someone living in a remote igloo in the North Pole? You could not possibly get the Network Addresses of all the ISP’s in the world, could you? If yes please send it to me J.



Well now I guess you have pretty good knowledge about what an IP is and what you can do by knowing the IP of a remote system. Now lets come to the point of finding out the IP of remote system.

Well you can easily figure out the IP of a remote system using the netstat utility available in the microsoft’s version of DOS. The netstat command shows the connections in which your system is engaged to and the ports they are using. Suppose you are checking your mail in hotmail and you want to find out the IP of msn. All you need to do is to open a dos window (command.com) and type netstat. You will see all the open connections of your system. There you will see something :



Proto Local Address Foreign Address State

TCP abhisek:1031 64.4.xx.xx:80 ESTABLISHED



Now you got the IP address of hotmail ass 64.4.xx.xx .

Similarly you can figure out the IP address of most http or ftp connections.



To know your own IP type the following command in a dos windows

C:\netstat –n

[this commands converts the IP name into IP addresses]

this is what you will probably see on typing the above command :



Proto Local Address Foreign Address State

TCP 203.xx.251.161:1031 194.1.129.227:21 ESTABLISHED

TCP 203.xx.251.161:1043 207.138.41.181:80 FIN_WAIT_2

TCP 203.xx.251.161:1053 203.94.243.71:110 TIME_WAIT

TCP 203.xx.251.161:1058 194.1.129.227:20 TIME_WAIT

TCP 203.xx.251.161:1069 203.94.243.71:110 TIME_WAIT

TCP 203.xx.251.161:1071 194.98.93.244:80 ESTABLISHED

TCP 203.xx.251.161:1078 203.94.243.71:110 TIME_WAIT



Here 203.xx.251.161 is your IP address.



Now lets clarify the format used by netstat :



Proto : It shows the type of protocol the connection with the remote system is using.

Here TCP (transmission control protocol) is the protocol used by my system to connect to other systems.



Local Address : It shows the local address ie the local IP. When the netstat command is executed without –n switch then the name of the local system is displayed and when the netstat is executed with –n switch then the IP of the local system is displayed. Here you can also find out the port used by the connection.

xxx.yyy.zzz.aaa:1024

in this format you will see the local address. Here 1024 is the port to which the remote system is connected in your system



Foreign Address :: It shows the IP address of the remote system to which your system is connected. In this case also if the netstat command is excuted with –n switch then you directly get the IP of the victim but if the netstat is executed without –n switch then you will get the address of the remote system. Something like



C:\netstat

Proto Local Address Foreign Address State

TCP abhisek:1031 msgr.lw4.gs681.hotmail.com:80 ESTABLISHED



Here msgr.lw4.gs681.hotmail.com is the address of the foreign system . putting this address in any IP lookup program and doing a whois lookup will reveal the IP of the remote system.



Note: The port to which your system is connected can be found from this in the same way as I have shown in the case of local address. The difference is that, this is the port of the remote system to which your computer is connected to.

Below I have produced a list of ports and popular services generally found to be running.

21 :: FTP port

80 :: http port

23 :: Telnet port



Note: If your execute the netstat command and find ports like 12345,27374 are open and are in use then make it sure that your sweat heart computer is infected with her boyfriend.. J J J J I mean your computer is infected with some sort of Trojan.

Below I have produced a list of commonly known Trojans and the ports they use by default. So if you find these ports open then get a good virus buster and get these stupid servers of the Trojans kicked out. Well if you want to play with these Trojan by keeping them in your computer but not letting them ruin your system performance then just disble it from the system registry run and they wont be loaded to memory each time when windows starts up[This trick doesn’t work for all Trojans].



Netbus :: 12345(TCP)

Subseven :: 27374(TCP)

Girl Friend :: 21554(TCP)

Back Oriface :: 31337 (UDP)



Well guys and gals I hope you are now well familiar with the term IP and what is the utility of IP in cyber world and how to get the IP of a remote system to which you are connected. I hope you find my writings very easy to undertstand. I know I lack the capacity of explaining myself but I try my level best to make things very easy and clear for you’ll.




How to get the IP of a remote system while chatting through msn messenger ::



This is a tutorial on how to get IP address from MSN messenger. This is actually
a really easy thing to do. It is not like going through the hard time and reversing
MSN messenger like many people think.

The IP address is only given when you accept or are sending a file through MSN
messenger. When you send IM's, the message is sent through the server thus hiding
your victims IP and your. But when you send a file or recieve a file, it is direct
connection between the two computers.

To obtain the IP accept a file transfer or send a file to the victim, when the file
sending is under way from the dos prompt type "netstat" without the quotation marks.
You should get a table like this:

Proto Local Address Foreign Address State
TCP kick:1033 msgr-ns29.msgr.hotmail.com:1863 ESTABLISHED
TCP kick:1040 msgr-sb36.msgr.hotmail.com:1863 ESTABLISHED
TCP kick: ESTABLISHED

The top name in the list is the server's address for IMing. There could be many of
the second name in the list, as a new connection is made to the server for every
room you are IMing to. You are looking for the address of the remote host in
this table it may be something similar to "host63-7-102-226.ppp.cal.vsnl.com" or “203..64.90.6”.
without the quotation marks.
All you need to do now is to put this address in you IP lookup programe and get the IP of the remote system.


Well 50%of the work is done now. Now you know how to get the IP of a remote system, so its time to trace it down and find some details about the IP.



Tracing an IP is quite simple. You can do it the easy way by using some sweet softwares like Visual Trace 6.0b

[ftp://ftp.visualware.com/pub/vr/vr.exe]

Neotrace

[http://www.neoworx.com/download/NTX325.exe]

or by our way ie. Using MS DOS or any other version of DOS.

Well I suggest you to use DOS and its tracert tool for tracing the IP cause using it will give you a clear conception about the art of tracing an IP and I guarantee that you will feel much satisfied on success than using a silly software. Furthur you will know how things work and how the IP is traced down and the different networks associated in this tracing process.



Let us take a look at tracert tool provided for DOS by Microsoft.

It is a very handy tool for peoples need to trace down an IP.

Just open any DOS windows and type tracert.



C:\windows>tracert



Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name


Options:

-d Do not resolve addresses to hostnames.

-h maximum_hops Maximum number of hops to search for target.

-j host-list Loose source route along host-list.

-w timeout Wait timeout milliseconds for each reply.


You will now see a description of the tracert command and the switches associated with it.

Well these switches doesn’t makes much difference. All you can do is to increase the timeout in milliseconds by using –w switch if you are using a slow connection and the –d switch if you wish not resolve address to hostnames by default.

By default tracert performs a maximum of 30 hops trace. Using the –h switch you can specify the number of hops to perform.

Now its time for execution.

Let us trace down the IP yahoo.com [216.115.108.243]



TIP: If you have done a long research (I mean a lot) then simply looking at the IP you can figure out some info from it. For example the IP 203.90.68.8 indicates that the system is in India. In India IPs generally begin with 203 and 202



C:\WINDOWS>tracert yahoo.com



Tracing route to yahoo.com [216.115.108.243] over a maximum of 30 hops:



1 308 ms 142 ms 127 ms 203.94.246.35

2 140 ms 135 ms * 203.94.246.1

3 213 ms 134 ms 132 ms 203.94.255.33

4 134 ms 130 ms 129 ms 203.200.64.29

5 122 ms 135 ms 131 ms 203.200.87.75

6 141 ms 137 ms 121 ms 203.200.87.15

7 143 ms 170 ms 154 ms vsb-delhi-stm1.Bbone.vsnl.net.in [202.54.2.241]

8 565 ms 589 ms 568 ms if-7-0.bb8.NewYork.Teleglobe.net [207.45.198.65]

9 596 ms 584 ms 600 ms if-3-0.core2.NewYork.teleglobe.net [207.45.221.66]

10 * * * Request timed out.

11 703 ms 701 ms 719 ms if-3-0.core2.PaloAlto.Teleglobe.net [64.86.83.205]

12 694 ms 683 ms 681 ms if-6-1.core1.PaloAlto.Teleglobe.net [207.45.202.33]

13 656 ms 677 ms 700 ms ix-5-0.core1.PaloAlto.Teleglobe.net [207.45.196.90]

14 667 ms 673 ms 673 ms ge-1-3-0.msr1.pao.yahoo.com [216.115.100.150]

15 653 ms 673 ms 673 ms vl20.bas1.snv.yahoo.com [216.115.100.225]

16 666 ms 676 ms 674 ms yahoo.com [216.115.108.243]

Trace complete.



Note: Here I have traced yahoo.com. In place of yahoo.com you can give the IP of yahoo or any other IP you want to trace, the result will be the same.



Now carefully looking at the results you can figure out many information about yahoo’s server [216.115.108.243]

First packets of data leave my ISP which is at 203.94.246.35 .Similarly you can find out the different routers through which the packets of data are send and received to and from the target system. Now take a look at the 13th line you’ll see that the router is in PaloAlto.Teleglobe.net from this you can easily figure out that the router is in Palo Alto. Now finally look at the target system ie. Yahoo’s server vl20.bas1.snv.yahoo.com . Now you got the address of yahoo’s server. Now put this address in any IP lookup programe and perform and reverse DNS lookup and you will get most of the info about this address,like the place where it is in.

Well another thing you can find out using the tracert tool is that the number of hops (routers) the target system is away from you. In case of tracerouting yahoo.com we find that the target system ie yahoo’s server is 16 hops away from my system. This indicates that there are 16 routers between my system and yahoo’s server.



Apart from tracing an IP you can find out many usefull details about the target system using the tracert tool.



Firewall Detection



While tracerouting a target system, if you get * as an output then it indicates timeout error. Now if you peform another tracerout to the same taeget system at some other time with a good connection and in this way few times more and if you always get * as the output then take it for sure that the target system is running a firewall which prevents sending of data packets from the target system.



Example



Some days ago I tried to tracert hotmail’s server in plain and simple way using tracert without any trick.This is what I found out :




c:\windows>tracert 64.4.53.7



Tracing route to lc2.law5.hotmail.com [64.4.53.7]


over a maximum of 30 hops:






1 * * * Request timed out.

2 161 ms 147 ms 85 ms 203.90.69.81

3 126 ms 261 ms 219 ms 203.90.66.9

4 121 ms 115 ms 228 ms delswp2.hclinfinet.com [203.90.66.133]

5 727 ms 725 ms 711 ms 203-195-147-250.now-india.net.in [203.195.147.250]

6 1006 ms 794 ms 952 ms core-fae-0-0.now-india.net.in [203.195.147.3]

7 826 ms 731 ms 819 ms 213.232.106.9

8 885 ms 744 ms 930 ms 213.166.3.209

9 851 ms 1020 ms 1080 ms 213.232.64.54

10 1448 ms 765 ms 1114 ms pos8-0.core2.London1.Level3.net [212.113.0.118]

11 748 ms 789 ms 750 ms ge-4-2-1.mp2.London1.Level3.net [212.187.131.146]

12 719 ms 733 ms 846 ms so-3-0-0.mp1.London2.Level3.net [212.187.128.46]

13 775 ms 890 ms 829 ms so-1-0-0.mp2.Weehawken1.Level3.net [212.187.128.138]

14 853 ms 852 ms 823 ms so-3-0-0.mp1.SanJose1.Level3.net [64.159.1.129]

15 889 ms 816 ms 803 ms so-7-0-0.gar1.SanJose1.Level3.net [64.159.1.74]

16 * * * Request timed out.

17 * * * Request timed out.

18 * * * Request timed out.

19 * * * Request timed out.

20 * * * Request timed out.

21 * * * Request timed out.

22 * * * Request timed out.

23 * * * Request timed out.

24 * * * Request timed out.

25 * * * Request timed out.

26 * * * Request timed out.

27 * * * Request timed out.

28 * * * Request timed out.

29 * * * Request timed out.

30 * * * Request timed out.

Trace complete.


I performed the same tracert many times a day but concluded with the same result. This indicates that the systems after the router SanJose1.Level3.net has firewalls installed which prevents the outgoing of data packets.



Detecting Traceroute Attempts on your System



You can detect that an attacker is performing a traceroute on your system, if you see the following symptoms:



1. If you observe port scans on very high UDP ports. This symptom means that the attacker has performed a traceroute on your system. However, it could also mean a simply port scan. Either way, it signifies the fact that your system is being scanned.



2. If the packet-monitoring tool installed in your network, picks up several outgoing TTL-exceeding messages, then it is yet another sign that someone is doing a traceroute on your system.



3. If in these log files, you also observer an outgoing ICMP port unreachable error message, then it means that since a traceroute was done on your system and as the target system i.e. your system, was reached, it responded with this error message.



You can also find our more information on the attacker (if he performs a traceroute on your system) by simply studying the sniffer log files. If you observer the TTL values, then we can easily figure out the following information on the attacker by making use of OS detection techniques discussed earlier in this white paper:


The Operating System running on the attacker’s target system.
Number of hops away, the attacker is from you.



OKI DOKI that’s all for this article. Hope you will find this article very easy to understand and implement.

Wednesday, October 7, 2009

How to become Hacker???

The Hacker Attitude Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.
But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you -- for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters -- not just intellectually but emotionally as well. So, if you want to be a hacker, repeat the following things until you believe them:
1. The world is full of fascinating problems waiting to be solved.

Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
If you aren't the kind of person that feels this way naturally, you'll need to become one in order to make it as a hacker. Otherwise you'll find your hacking energy is sapped by distractions like sex, money, and social approval. (You also have to develop a kind of faith in your own learning capacity -- a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you'll learn enough to solve the next piece -- and so on, until you're done.)
2. Nobody should ever have to solve a problem twice.

Creative brains are a valuable, limited resource. They shouldn't be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.
To behave like a hacker, you have to believe that the thinking time of other hackers is precious -- so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones. (You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers. It's consistent to use your hacking skills to support a family or even get rich, as long as you don't forget you're a hacker while you're doing it.)
3. Boredom and drudgery are evil.

Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren't doing what only they can do -- solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.
To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers). (There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing excercise, or in order to acquire a skill or have some particular kind of experience you can't have otherwise. But this is by choice -- nobody who can think should ever be forced into boredom.)
4. Freedom is good.

Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by -- and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.
(This isn't the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that's a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.) Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing -- they only like `cooperation' that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.
5. Attitude is no substitute for competence.

To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won't make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work.
Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won't let posers waste their time, but they worship competence -- especially competence at hacking, but competence at anything is good. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best. If you revere competence, you'll enjoy developing it in yourself -- the hard work and dedication will become a kind of intense play rather than drudgery. And that's vital to becoming a hacker. Basic Hacking Skills The hacker attitude is vital, but skills are even more vital. Attitude is no substitute for competence, and there's a certain basic toolkit of skills which you have to have before any hacker will dream of calling you one.
This tookit changes slowly over time as technology creates new skills and makes old ones obsolete. For example, it used to include programming in machine language, and didn't until recently involve HTML. But in late 1996 it pretty clearly includes the following:
1. Learn how to program.

This, of course, is the fundamental hacking skill. In 1997 the one language you absolutely must learn is C (though it's not the one to try learning first thing). But you aren't a hacker or even merely a programmer if you only know one language -- you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to have gotten to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages.
Besides C, you should also learn at least LISP and Perl (and Java is pushing hard for a place on the list). Besides being the most important hacking languages, these each represent very different approaches to programming, and all will educate you in valuable ways. I can't give complete instructions on how to learn to program here -- it's a complex skill. But I can tell you that books and courses won't do it (many, maybe most of the best hackers are self-taught). What will do it is (a) reading code and (b) writing code. Learning to program is like learning to write good natural language. The best way to do it is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more ... and repeat until your writing begins to develop the kind of strength and economy you see in your models. Finding good code to read used to be hard, because there were few large programs available in source for fledgeling hackers to read and tinker with. This has changed dramatically; free software, free programming tools, and free operating systems (all available in source, and all built by hackers) are now widely available. Which brings me neatly to our next topic...
2. Get one of the free UNIXes and learn to use and run it.

I'm assuming you have a personal computer or can get access to one (these kids today have it so easy :-)). The single most important step any newbie can take towards acquiring hacker skills is to get a copy of Linux or one of the free BSD-Unixes, install it on a personal machine, and run it.
Yes, there are other operating systems in the world besides Unix. But they're distributed in binary -- you can't read the code, and you can't modify it. Trying to learn to hack on a DOS or Windows machine or under MacOS is like trying to learn to dance while wearing a body cast. Besides, Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding it. For this reason, the hacker culture today is pretty strongly Unix-centered. (This wasn't always true, and some old-time hackers aren't happy about it, but the symbiosis between Unix and the Internet has become strong enough that even Microsoft's muscle doesn't seem able to seriously dent it.) So, bring up a Unix -- I like Linux myself but there are other ways. Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code. You'll get better programming tools (including C, Lisp, and Perl) than any Microsoft operating system can dream of, you'll have fun, and you'll soak up more knowledge than you realize you're learning until you look back on it as a master hacker.

3. Learn how to use the World Wide Web and write HTML.

Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit is changing the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web.
This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. But just having a home page isn't anywhere near good enough to make you a hacker. The Web is full of home pages. Most of them are pointless, zero-content sludge -- very snazzy-looking sludge, mind you, but sludge all the same .
Status in the Hacker Culture Like most cultures without a money economy, hackerdom runs on reputation. You're trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge.
Accordingly, when you play the hacker game, you learn to keep score primarily by what other hackers think of your skill (this is why you aren't really a hacker until other hackers consistently call you one). This fact is obscured by the image of hacking as solitary work; also by a hacker-cultural taboo (now gradually decaying but still potent) against admitting that ego or external validation are involved in one's motivation at all. Specifically, hackerdom is what anthropologists call a gift culture. You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away. Specifically, by giving away your time, your creativity, and the results of your skill. There are basically five kinds of things you can do to be respected by hackers:
1. Write free software.

The first (the most central and most traditional) is to write programs that other hackers think are fun or useful, and give the program sources to the whole hacker culture to use.
Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
2. Help test and debug free software

They also serve who stand and debug free software. In this imperfect world, we will inevitably spend most of our software development time in the debugging phase. That's why any free-software author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Even one of these can make the difference between a debugging phase that's a protracted, exhausting nightmare and one that's merely a salutory nuisance.
If you're a newbie, try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.
3. Publish useful information.

Another good thing is to collect and filter useful and interesting information into Web pages or documents like FAQs (Frequently Asked Questions lists), and make those generally available.
Maintainers of major technical FAQs get almost as much respect as free-software authors.
4. Help keep the infrastructure working.

The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going -- administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards.
People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not much fun as playing with code. Doing them shows dedication.
Q: What language should I learn first?

HTML, if you don't already know it. There are a lot of glossy, hype-intensive bad HTML books out there, and distressingly few good ones. The one I like best is HTML: The Definitive Guide.
When you're ready to start programming, I would recommend starting with Perl or Python. C is really important, but it's also much harder.
Q: How can I get started? Where can I get a free Unix?

Elsewhere on this page I include pointers to where to get a Linux. To be a hacker you need motivation and initiative and the ability to educate yourself. Start now...

Monday, October 5, 2009

Don't Scan These IP's U Will Be Hacked

IP Ranges:

CODE

RANGE 6
6.* - Army Information Systems Center

RANGE 7
7.*.*.* Defense Information Systems Agency, VA

RANGE 11
11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC

RANGE 21
21. - US Defense Information Systems Agency

RANGE 22
22.* - Defense Information Systems Agency

RANGE 24
24.198.*.*

RANGE 25
25.*.*.* Royal Signals and Radar Establishment, UK

RANGE 26
26.* - Defense Information Systems Agency

RANGE 29
29.* - Defense Information Systems Agency

RANGE 30
30.* - Defense Information Systems Agency

RANGE 49
49.* - Joint Tactical Command

RANGE 50
50.* - Joint Tactical Command

RANGE 55
55.* - Army National Guard Bureau

RANGE 55
55.* - Army National Guard Bureau

RANGE 62
62.0.0.1 - 62.30.255.255 Do not scan!

RANGE 64
64.70.*.* Do not scan
64.224.* Do not Scan
64.225.* Do not scan
64.226.* Do not scan

RANGE 128
128.37.0.0 Army Yuma Proving Ground
128.38.0.0 Naval Surface Warfare Center
128.43.0.0 Defence Research Establishment-Ottawa
128.47.0.0 Army Communications Electronics Command
128.49.0.0 Naval Ocean Systems Center
128.50.0.0 Department of Defense
128.51.0.0 Department of Defense
128.56.0.0 U.S. Naval Academy
128.60.0.0 Naval Research Laboratory
128.63.0.0 Army Ballistics Research Laboratory
128.80.0.0 Army Communications Electronics Command
128.98.0.0 - 128.98.255.255 Defence Evaluation and Research Agency
128.102.0.0 NASA Ames Research Center
128.149.0.0 NASA Headquarters
128.154.0.0 NASA Wallops Flight Facility
128.155.0.0 NASA Langley Research Center
128.156.0.0 NASA Lewis Network Control Center
128.157.0.0 NASA Johnson Space Center
128.158.0.0 NASA Ames Research Center
128.159.0.0 NASA Ames Research Center
128.160.0.0 Naval Research Laboratory
128.161.0.0 NASA Ames Research Center
128.183.0.0 NASA Goddard Space Flight Center
128.190.0.0 Army Belvoir Reasearch and Development Center
128.202.0.0 50th Space Wing
128.216.0.0 MacDill Air Force Base
128.217.0.0 NASA Kennedy Space Center
128.236.0.0 U.S. Air Force Academy

RANGE 129
129.23.0.0 Strategic Defense Initiative Organization
129.29.0.0 United States Military Academy
129.50.0.0 NASA Marshall Space Flight Center
129.51.0.0 Patrick Air Force Base
129.52.0.0 Wright-Patterson Air Force Base
129.53.0.0 - 129.53.255.255 66SPTG-SCB
129.54.0.0 Vandenberg Air Force Base, CA
129.92.0.0 Air Force Institute of Technology
129.99.0.0 NASA Ames Research Center
129.131.0.0 Naval Weapons Center
129.139.0.0 Army Armament Research Development and Engineering Center
129.141.0.0 85 MISSION SUPPORT SQUADRON/SCSN
129.163.0.0 NASA/Johnson Space Center
129.164.0.0 NASA IVV
129.165.0.0 NASA Goddard Space Flight Center
129.166.0.0 NASA - John F. Kennedy Space Center
129.167.0.0 NASA Marshall Space Flight Center
129.168.0.0 NASA Lewis Research Center
129.190.0.0 Naval Underwater Systems Center
129.198.0.0 Air Force Flight Test Center
129.209.0.0 Army Ballistics Research Laboratory
129.229.0.0 U.S. Army Corps of Engineers
129.251.0.0 United States Air Force Academy

RANGE 130
130.40.0.0 NASA Johnson Space Center
130.90.0.0 Mather Air Force Base
130.109.0.0 Naval Coastal Systems Center
130.114.0.0 Army Aberdeen Proving Ground Installation Support Activity
130.124.0.0 Honeywell Defense Systems Group
130.165.0.0 U.S.Army Corps of Engineers
130.167.0.0 NASA Headquarters

RANGE 131
131.3.0.0 - 131.3.255.255 Mather Air Force Base
131.6.0.0 Langley Air Force Base
131.10.0.0 Barksdale Air Force Base
131.17.0.0 Sheppard Air Force Base
131.21.0.0 Hahn Air Base
131.22.0.0 Keesler Air Force Base
131.24.0.0 6 Communications Squadron
131.25.0.0 Patrick Air Force Base
131.27.0.0 75 ABW
131.30.0.0 62 CS/SCSNT
131.32.0.0 37 Communications Squadron
131.35.0.0 Fairchild Air Force Base
131.36.0.0 Yokota Air Base
131.37.0.0 Elmendorf Air Force Base
131.38.0.0 Hickam Air Force Base
131.39.0.0 354CS/SCSN
131.40.0.0 Bergstrom Air Force Base
131.44.0.0 Randolph Air Force Base
131.46.0.0 20 Communications Squadron
131.47.0.0 Andersen Air Force Base
131.50.0.0 Davis-Monthan Air Force Base
131.52.0.0 56 Communications Squadron /SCBB
131.54.0.0 Air Force Concentrator Network
131.56.0.0 Upper Heyford Air Force Base
131.58.0.0 Alconbury Royal Air Force Base
131.59.0.0 7 Communications Squadron
131.61.0.0 McConnell Air Force Base
131.62.0.0 Norton Air Force Base
131.71.0.0 - 131.71.255.255 NAVAL AVIATION DEPOT CHERRY PO
131.74.0.0 Defense MegaCenter Columbus
131.84.0.0 Defense Technical Information Center
131.92.0.0 Army Information Systems Command - Aberdeen (EA)
131.105.0.0 McClellan Air Force Base
131.110.0.0 NASA/Michoud Assembly Facility
131.120.0.0 Naval Postgraduate School
131.121.0.0 United States Naval Academy
131.122.0.0 United States Naval Academy
131.176.0.0 European Space Operations Center
131.182.0.0 NASA Headquarters
131.250.0.0 Office of the Chief of Naval Research

RANGE 132
132.3.0.0 Williams Air Force Base
132.5.0.0 - 132.5.255.255 49th Fighter Wing
132.6.0.0 Ankara Air Station
132.7.0.0 - 132.7.255.255 SSG/SINO
132.9.0.0 28th Bomb Wing
132.10.0.0 319 Comm Sq
132.11.0.0 Hellenikon Air Base
132.12.0.0 Myrtle Beach Air Force Base
132.13.0.0 Bentwaters Royal Air Force Base
132.14.0.0 Air Force Concentrator Network
132.15.0.0 Kadena Air Base
132.16.0.0 Kunsan Air Base
132.17.0.0 Lindsey Air Station
132.18.0.0 McGuire Air Force Base
132.19.0.0 100CS (NET-MILDENHALL)
132.20.0.0 35th Communications Squadron
132.21.0.0 Plattsburgh Air Force Base
132.22.0.0 23Communications Sq
132.24.0.0 Dover Air Force Base
132.25.0.0 786 CS/SCBM
132.27.0.0 - 132.27.255.255 39CS/SCBBN
132.28.0.0 14TH COMMUNICATION SQUADRON
132.30.0.0 Lajes Air Force Base
132.31.0.0 Loring Air Force Base
132.33.0.0 60CS/SCSNM
132.34.0.0 Cannon Air Force Base
132.35.0.0 Altus Air Force Base
132.37.0.0 75 ABW
132.38.0.0 Goodfellow AFB
132.39.0.0 K.I. Sawyer Air Force Base
132.40.0.0 347 COMMUNICATION SQUADRON
132.42.0.0 Spangdahlem Air Force Base
132.43.0.0 Zweibruchen Air Force Base
132.45.0.0 Chanute Air Force Base
132.46.0.0 Columbus Air Force Base
132.48.0.0 Laughlin Air Force Base
132.49.0.0 366CS/SCSN
132.50.0.0 Reese Air Force Base
132.52.0.0 Vance Air Force Base
132.54.0.0 Langley AFB
132.55.0.0 Torrejon Air Force Base
132.56.0.0 - 132.56.255.255 9 CS/SC
132.57.0.0 Castle Air Force Base
132.58.0.0 Nellis Air Force Base
132.59.0.0 24Comm SquadronSCSNA
132.60.0.0 - 132.60.255.255 42ND COMMUNICATION SQUADRON
132.61.0.0 SSG/SIN
132.62.0.0 - 132.62.255.255 377 COMMUNICATION SQUADRON
132.79.0.0 Army National Guard Bureau
132.80.0.0 - 132.80.255.255 NGB-AIS-OS
132.80.0.0 - 132.85.255.255 National Guard Bureau
132.82.0.0 Army National Guard Bureau
132.86.0.0 National Guard Bureau
132.87.0.0 - 132.93.255.255 National Guard Bureau
132.94.0.0 Army National Guard Bureau
132.95.0.0 - 132.103.255.255 National Guard Bureau
132.95.0.0 - 132.108.0.0 DOD Network Information Center
132.104.0.0 - 132.104.255.255 Army National Guard Bureau
132.105.0.0 - 132.108.255.255 Army National Guard Bureau
132.109.0.0 National Guard Bureau
132.110.0.0 - 132.116.255.255 Army National Guard Bureau
132.114.0.0 Army National Guard
132.117.0.0 Army National Guard Bureau
132.118.0.0 - 132.132.0.0 Army National Guard Bureau
132.122.0.0 South Carolina Army National Guard, USPFO
132.133.0.0 National Guard Bureau
132.134.0.0 - 132.143.255.255 National Guard Bureau
132.159.0.0 Army Information Systems Command
132.193.0.0 Army Research Office
132.250.0.0 Naval Research Laboratory

RANGE 134
134.5.0.0 Lockheed Aeronautical Systems Company
134.11.0.0 The Pentagon
134.12.0.0 NASA Ames Research Center
134.51.0.0 Boeing Military Aircraft Facility
134.52.*.* Boeing Corporation
134.78.0.0 Army Information Systems Command-ATCOM
134.80.0.0 Army Information Systems Command
134.118.0.0 NASA/Johnson Space Center
134.131.0.0 Wright-Patterson Air Force Base
134.136.0.0 Wright-Patterson Air Force Base
134.164.0.0 Army Engineer Waterways Experiment Station
134.165.0.0 Headquarters Air Force Space Command
134.194.0.0 U.S. Army Aberdeen Test Center
134.205.0.0 7th Communications Group
134.207.0.0 Naval Research Laboratory
134.229.0.0 Navy Regional Data Automation Center
134.230.0.0 Navy Regional Data Automation Center
134.232.0.0 - 134.232.255.255 U.S. Army, Europe
134.233.0.0 HQ 5th Signal Command
134.234.0.0 - 134.234.255.255 Southern European Task Force
134.235.0.0 HQ 5th Signal Command
134.240.0.0 U.S. Military Academy
136.149.0.0 Air Force Military Personnel Center

RANGE 136
136.178.0.0 NASA Research Network
136.188.0.0 - 136.197.255.255 Defense Intelligence Agency
136.207.0.0 69th Signal Battalion
136.208.0.0 HQ, 5th Signal Command
136.209.0.0 HQ 5th Signal Command
136.210.0.0 HQ 5th Signal Command
136.212.0.0 HQ 5th Signal Command
136.213.0.0 HQ, 5th Signal Command
136.214.0.0 HQ, 5th Signal Command
136.215.0.0 HQ, 5th Signal Command
136.216.0.0 HQ, 5th Signal Command
136.217.0.0 HQ, 5th Signal Command
136.218.0.0 HQ, 5th Signal Command
136.219.0.0 HQ, 5th Signal Command
136.220.0.0 HQ, 5th Signal Command
136.221.0.0 HQ, 5th Signal Command
136.222.0.0 HQ, 5th Signal Command


RANGE 137
137.1.0.0 Whiteman Air Force Base
137.2.0.0 George Air Force Base
137.3.0.0 Little Rock Air Force Base
137.4.0.0 - 137.4.255.255 437 CS/SC
137.5.0.0 Air Force Concentrator Network
137.6.0.0 Air Force Concentrator Network
137.11.0.0 HQ AFSPC/SCNNC
137.12.0.0 Air Force Concentrator Network
137.17.* National Aerospace Laboratory
137.24.0.0 Naval Surface Warfare Center
137.29.0.0 First Special Operations Command
137.67.0.0 Naval Warfare Assessment Center
137.94.* Royal Military College
137.95.* Headquarters, U.S. European Command
137.126.0.0 USAF MARS
137.127.* Army Concepts Analysis Agency
137.128.* U.S. ARMY Tank-Automotive Command
137.130.0.0 Defense Information Systems Agency
137.209.0.0 Defense Information Systems Agency
137.210.0.0 Defense Information Systems Agency
137.211.0.0 Defense Information Systems Agency
137.212.0.0 Defense Information Systems Agency
137.231.0.0 HQ 5th Signal Command
137.232.0.0 Defense Information Systems Agency
137.233.0.0 Defense Information Systems Agency
137.234.0.0 Defense Information Systems Agency
137.235.0.0 Defense Information Systems Agency
137.240.0.0 Air Force Materiel Command
137.241.0.0 75 ABW
137.242.0.0 Air Force Logistics Command
137.243.0.0 77 CS/SCCN
137.244.0.0 78 CS/SCSC
137.245.0.0 Wright Patterson Air Force Base
137.246.0.0 United States Atlantic Command Joint Training

RANGE 138
138.13.0.0 Air Force Systems Command
138.27.0.0 Army Information Systems Command
138.50.0.0 HQ 5th Signal Command
138.65.0.0 HQ, 5th Signal Command
138.76.0.0 NASA Headquarters
138.109.0.0 Naval Surface Warfare Center
138.115.0.0 NASA Information and Electronic Systems Laboratory
138.135.0.0 - 138.135.255.255 DEFENSE PROCESSING CENTERPERAL HARBOR
138.136.0.0 - 138.136.255.255 Navy Computers and Telecommunications Station
138.137.0.0 Navy Regional Data Automation Center (NARDAC)
138.139.0.0 Marine Corps Air Station
138.140.0.0 Navy Regional Data Automation Center
138.141.0.0 Navy Regional Data Automation Center
138.142.0.0 Navy Regional Data Automation Center
138.143.0.0 Navy Regional Data Automation Center
138.144.0.0 NAVCOMTELCOM
138.145.0.0 NCTS WASHINGTON
138.146.0.0 NCTC
138.147.0.0 NCTC
138.148.0.0 NCTC
138.149.0.0 NCTC
138.150.0.0 NCTC
138.151.0.0 NCTC
138.152.0.0 NCTC
138.153.0.0 Yokosuka Naval Base
138.154.0.0 NCTC
138.155.0.0 NCTC
138.156.0.0 Marine Corps Central Design & Prog. Activity
138.157.0.0 - 138.157.255.255 Marine Corps Central Design & Prog. Activity
138.158.0.0 Marine Corps Central Design & Prog. Activity
138.159.0.0 NCTC
138.160.0.0 Naval Air Station
138.161.0.0 NCTC
138.162.0.0 NCTC
138.163.0.0 NCTC
138.164.0.0 NCTC
138.165.0.0 NCTC
138.166.0.0 NCTC
138.167.0.0 NOC, MCTSSA, East
138.168.0.0 Marine Corps Central Design & Prog. Activity
138.169.0.0 NAVAL COMPUTER AND TELECOMM
138.169.12.0 NAVAL COMPUTER AND TELECOMM
138.169.13.0 NAVAL COMPUTER AND TELECOMM
138.170.0.0 NCTC
138.171.0.0 NCTC
138.172.0.0 NCTC
138.173.0.0 NCTC
138.174.0.0 NCTC
138.175.0.0 NCTC
138.176.0.0 NCTC
138.177.0.0 NCTS Pensacola
138.178.0.0 NCTC
138.179.0.0 NCTC
138.180.0.0 NCTC
138.181.0.0 NCTC
138.182.0.0 CNO N60
138.183.0.0 NCTC
138.184.0.0 NCTS
138.193.0.0 NASA/Yellow Creek

RANGE 139
139.31.0.0 20th Tactical Fighter Wing
139.32.0.0 48th Tactical Fighter Wing
139.33.0.0 36th Tactical Fighter Wing
139.34.0.0 52nd Tactical Fighter Wing
139.35.0.0 50th Tactical Fighter Wing
139.36.0.0 66th Electronic Combat Wing
139.37.0.0 26th Tactical Reconnaissance Wing
139.38.0.0 32nd Tactical Fighter Squadron
139.39.0.0 81st Tactical Fighter Wing
139.40.0.0 10th Tactical Fighter Wing
139.41.0.0 39th Tactical Air Control Group
139.42.0.0 40th Tactical Air Control Group
139.43.0.0 401st Tactical Fighter Wing
139.124.* Reseau Infomratique
139.142.*.*

RANGE 140
140.1.0.0 Defense Information Systems Agency
140.3.0.0 Defense Information Systems Agency
140.4.0.0 Defense Information Systems Agency
140.5.0.0 Defense Information Systems Agency
140.6.0.0 Defense Information Systems Agency
140.7.0.0 Defense Information Systems Agency
140.8.0.0 Defense Information Systems Agency
140.9.0.0 Defense Information Systems Agency
140.10.0.0 Defense Information Systems Agency
140.11.0.0 Defense Information Systems Agency
140.12.0.0 Defense Information Systems Agency
140.13.0.0 Defense Information Systems Agency
140.14.0.0 DISA Columbus Level II NOC
140.15.0.0 Defense Information Systems Agency
140.16.0.0 Defense Information Systems Agency
140.17.0.0 Defense Information Systems Agency
140.18.0.0 Defense Information Systems Agency
140.19.0.0 Defense Information Systems Agency
140.20.0.0 Defense Information Systems Agency
140.21.0.0 Defense Information Systems Agency
140.22.0.0 Defense Information Systems Agency
140.23.0.0 Defense Information Systems Agency
140.24.0.0 ASIC ALLIANCE-MARLBORO
140.25.0.0 Defense Information Systems Agency
140.26.0.0 Defense Information Systems Agency
140.27.0.0 Defense Information Systems Agency
140.28.0.0 Defense Information Systems Agency
140.29.0.0 Defense Information Systems Agency
140.30.0.0 Defense Information Systems Agency
140.31.0.0 Defense Information Systems Agency
140.32.0.0 Defense Information Systems Agency
140.33.0.0 Defense Information Systems Agency
140.34.0.0 Defense Information Systems Agency
140.35.0.0 Defense Information Systems Agency
140.36.0.0 Defense Information Systems Agency
140.37.0.0 Defense Information Systems Agency
140.38.0.0 Defense Information Systems Agency
140.39.0.0 Defense Information Systems Agency
140.40.0.0 Defense Information Systems Agency
140.41.0.0 Defense Information Systems Agency
140.42.0.0 Defense Information Systems Agency
140.43.0.0 Defense Information Systems Agency
140.44.0.0 Defense Information Systems Agency
140.45.0.0 Defense Information Systems Agency
140.46.0.0 Defense Information Systems Agency
140.47.0.0 - 140.47.255.255 Defense Information Systems Agency
140.47.0.0 - 140.48.255.255 DOD Network Information Center
140.48.0.0 - 140.48.255.255 Defense Information Systems Agency
140.49.0.0 Defense Information Systems Agency
140.50.0.0 Defense Information Systems Agency
140.51.0.0 Defense Information Systems Agency
140.52.0.0 Defense Information Systems Agency
140.53.0.0 Defense Information Systems Agency
140.54.0.0 Defense Information Systems Agency
140.55.0.0 Defense Information Systems Agency
140.56.0.0 Defense Information Systems Agency
140.57.0.0 Defense Information Systems Agency
140.58.0.0 Defense Information Systems Agency
140.59.0.0 Defense Information Systems Agency
140.60.0.0 Defense Information Systems Agency
140.61.0.0 Defense Information Systems Agency
140.62.0.0 Defense Information Systems Agency
140.63.0.0 Defense Information Systems Agency
140.64.0.0 Defense Information Systems Agency
140.65.0.0 Defense Information Systems Agency
140.66.0.0 Defense Information Systems Agency
140.67.0.0 Defense Information Systems Agency
140.68.0.0 Defense Information Systems Agency
140.69.0.0 Defense Information Systems Agency
140.70.0.0 Defense Information Systems Agency
140.71.0.0 Defense Information Systems Agency
140.72.0.0 Defense Information Systems Agency
140.73.0.0 Defense Information Systems Agency
140.74.0.0 - 140.74.255.255 Defense Information Systems Agency
140.100.0.0 Naval Sea Systems Command
140.139.0.0 HQ US Army Medical Research and Development Command
140.154.0.0 HQ 5th Signal Command
140.155.0.0 HQ, 5th Signal Command
140.156.0.0 HQ, 5th Signal Command
140.175.0.0 Scott Air Force Base
140.178.0.0 Naval Undersea Warfare Center Division, Keyport
140.187.0.0 Fort Bragg
140.194.0.0 US Army Corps of Engineers
140.195.0.0 Naval Sea Systems Command
140.199.0.0 Naval Ocean Systems Center
140.201.0.0 HQ, 5th Signal Command
140.202.0.0 106TH SIGNAL BRIGADE

RANGE 143
143.45.0.0 58th Signal Battalion
143.46.0.0 U.S. Army, 1141st Signal Battalion
143.68.0.0 Headquarters, USAISC
143.69.0.0 Headquarters, USAAISC
143.70.0.0 Headquarters, USAAISC
143.71.0.0 Headquarters, USAAISC
143.72.0.0 Headquarters, USAAISC
143.73.0.0 Headquarters, USAAISC
143.74.0.0 Headquarters, USAAISC
143.75.0.0 Headquarters, USAAISC
143.76.0.0 Headquarters, USAAISC
143.77.0.0 Headquarters, USAAISC
143.78.0.0 Headquarters, USAAISC
143.79.0.0 Headquarters, USAAISC
143.80.0.0 Headquarters, USAAISC
143.81.0.0 Headquarters, USAAISC
143.82.0.0 Headquarters, USAAISC
143.84.0.0 Headquarters, USAAISC
143.85.0.0 Headquarters, USAAISC
143.86.0.0 Headquarters, USAAISC
143.87.0.0 Headquarters, USAAISC
143.232.0.0 NASA Ames Research Center

RANGE 144
144.99.0.0 United States Army Information Systems Command
144.109.0.0 Army Information Systems Command
144.143.0.0 Headquarters, Third United States Army
144.144.0.0 Headquarters, Third United States Army
144.146.0.0 Commander, Army Information Systems Center
144.147.0.0 Commander, Army Information Systems Center
144.170.0.0 HQ, 5th Signal Command
144.192.0.0 United States Army Information Services Command-Campbell
144.233.0.0 Defense Intelligence Agency
144.234.0.0 Defense Intelligence Agency
144.235.0.0 Defense Intelligence Agency
144.236.0.0 Defense Intelligence Agency
144.237.0.0 Defense Intelligence Agency
144.238.0.0 Defense Intelligence Agency
144.239.0.0 Defense Intelligence Agency
144.240.0.0 Defense Intelligence Agency
144.241.0.0 Defense Intelligence Agency
144.242.0.0 Defense Intelligence Agency
144.252.0.0 U.S. Army LABCOM

RANGE 146
146.17.0.0 HQ, 5th Signal Command
146.80.0.0 Defence Research Agency
146.98.0.0 HQ United States European Command
146.154.0.0 NASA/Johnson Space Center
146.165.0.0 NASA Langley Research Center

RANGE 147
147.35.0.0 HQ, 5th Signal Command
147.36.0.0 HQ, 5th Signal Command
147.37.0.0 HQ, 5th Signal Command
147.38.0.0 HQ, 5th Signal Command
147.39.0.0 HQ, 5th Signal Command
147.40.0.0 HQ, 5th Signal Command
147.42.0.0 Army CALS Project
147.103.0.0 Army Information Systems Software Center
147.104.0.0 Army Information Systems Software Center
147.159.0.0 Naval Air Warfare Center, Aircraft Division
147.168.0.0 Naval Surface Warfare Center
147.169.0.0 HQ, 5th Signal Command
147.198.0.0 Army Information Systems Command
147.199.0.0 Army Information Systems Command
147.238.0.0 Army Information Systems Command
147.239.0.0 1112th Signal Battalion
147.240.0.0 US Army Tank-Automotive Command
147.242.0.0 19th Support Command
147.248.0.0 Fort Monroe DOIM
147.254.0.0 7th Communications Group

RANGE 148
148.114.0.0 NASA, Stennis Space Center

RANGE 150
150.113.0.0 1114th Signal Battalion
150.114.0.0 1114th Signal Battalion
150.125.0.0 Space and Naval Warfare Command
150.133.0.0 10th Area Support Group
150.144.0.0 NASA Goodard Space Flight Center
150.149.0.0 Army Information Systems Command
150.157.0.0 USAISC-Fort Lee
150.184.0.0 Fort Monroe DOIM
150.190.0.0 USAISC-Letterkenny
150.196.0.0 USAISC-LABCOM

RANGE 152
152.82.0.0 7th Communications Group of the Air Force
152.151.0.0 U.S. Naval Space & Naval Warfare Systems Command
152.152.0.0 NATO Headquarters
152.154.0.0 Defense Information Systems Agency
152.229.0.0 Defense MegaCenter (DMC) Denver

RANGE 153
153.21.0.0 USCENTAF/SCM
153.22.0.0 USCENTAF/SCM
153.23.0.0 USCENTAF/SCM
153.24.0.0 USCENTAF/SCM
153.25.0.0 USCENTAF/SCM
153.26.0.0 USCENTAF/SCM
153.27.0.0 USCENTAF/SCM
153.28.0.0 USCENTAF/SCM
153.29.0.0 USCENTAF/SCM
153.30.0.0 USCENTAF/SCM
153.31.0.0 Federal Bureau of Investigation

RANGE 155
155.5.0.0 1141st Signal Bn
155.6.0.0 1141st Signal Bn
155.7.0.0 American Forces Information
155.8.0.0 U.S. ArmyFort Gordon
155.9.0.0 - 155.9.255.255 United States Army Information Systems Command
155.74.0.0 PEO STAMIS
155.75.0.0 US Army Corps of Engineers
155.76.0.0 PEO STAMIS
155.77.0.0 PEO STAMIS
155.78.0.0 PEO STAMIS
155.79.0.0 US Army Corps of Engineers
155.80.0.0 PEO STAMIS
155.81.0.0 PEO STAMIS
155.82.0.0 PEO STAMIS
155.83.0.0 US Army Corps of Enginers
155.84.0.0 PEO STAMIS
155.85.0.0 PEO STAMIS
155.86.0.0 US Army Corps of Engineers
155.87.0.0 PEO STAMIS
155.88.0.0 PEO STAMIS
155.96.0.0 Drug Enforcement Administration
155.149.0.0 1112th Signal Battalion
155.155.0.0 HQ, 5th Signal Command
155.178.0.0 Federal Aviation Administration
155.213.0.0 USAISC Fort Benning
155.214.0.0 Director of Information Management
155.215.0.0 USAISC-FT DRUM
155.216.0.0 TCACCIS Project Management Office
155.217.0.0 Directorate of Information Management
155.218.0.0 USAISC
155.219.0.0 DOIM/USAISC Fort Sill
155.220.0.0 USAISC-DOIM
155.221.0.0 USAISC-Ft Ord

RANGE 156
156.9.0.0 U. S. Marshals Service

RANGE 157
157.150.0.0 United Nations
157.153.0.0 COMMANDER NAVAL SURFACE U.S. PACIFIC FLEET
157.202.0.0 US Special Operations Command
157.217.0.0 U. S. Strategic Command

RANGE 158
158.1.0.0 Commander, Tooele Army Depot
158.2.0.0 USAMC Logistics Support Activity
158.3.0.0 U.S. Army TACOM
158.4.0.0 UASISC Ft. Carson
158.5.0.0 1112th Signal Battalion
158.6.0.0 USAISC-Ft. McCoy
158.7.0.0 USAISC-FLW
158.8.0.0 US Army Soldier Support Center
158.9.0.0 USAISC-CECOM
158.10.0.0 GOC
158.11.0.0 UASISC-Vint Hill
158.12.0.0 US Army Harry Diamond Laboratories
158.13.0.0 USAISC DOIM
158.14.0.0 1112th Signal Battalion
158.15.0.0 - 158.15.255.255 Defense Megacenter Huntsville
158.16.0.0 Rocky Mountain Arsenal (PMRMA)
158.17.0.0 Crane Army Ammunition Activity
158.18.0.0 Defense Finance & Accounting Service Center
158.19.0.0 DOIM
158.20.0.0 DOIM
158.235.0.0 Marine Corps Central Design and Programming Activity
158.243.0.0 Marine Corps Central Design and Programming Activity
158.244.0.0 Marine Corps Central Design and Programming Activity
158.245.0.0 Marine Corps Central Design and Programming Activity
158.246.0.0 Marine Corps Central Design and Programming Activity

RANGE 159
159.120.0.0 Naval Air Systems Command (Air 4114)

RANGE 160
160.132.0.0 US Army Recruiting Command
160.135.0.0 36th Signal BN
160.138.0.0 USAISC
160.139.0.0 USAISC
160.140.0.0 HQ, United States Army
160.143.0.0 USAISC
160.145.0.0 1101st Signal Brigade
160.146.0.0 USAISC SATCOMSTA-CAMP ROBERTS
160.150.0.0 Commander, Moncrief Army Hospital

RANGE 161
161.124.0.0 NAVAL WEAPONS STATION

RANGE 162
162.32.0.0 Naval Aviation Depot Pensacola
162.45.0.0 Central Intelligence Agency
162.46.0.0 Central Intelligence Agency

RANGE 163
163.205.0.0 NASA Kennedy Space Center
163.206.0.0 NASA Kennedy Space Center

RANGE 164
164.45.0.0 Naval Ordnance Center, Pacific Division
164.49.0.0 United States Army Space and Strategic Defense
164.158.0.0 Naval Surface Warfare Center
164.217.0.0 Institute for Defense Analyses
164.218.0.0 Bureau of Naval Personnel
164.219.0.0 HQ USAFE WARRIOR PREPARATION CENTER
164.220.0.0 - 164.220.255.255 NIMIP/TIP/NEWNET
164.221.0.0 - 164.221.255.255 Information Technology
164.223.0.0 Naval Undersea Warfare Center
164.224.0.0 Secretary of the Navy
164.225.0.0 U.S. Army Intelligence and Security Command
164.226.0.0 Naval Exchange Service Command
164.227.0.0 Naval Surface Warfare Center, Crane Division
164.228.0.0 USCINCPAC J21T
164.229.0.0 NCTS-NOLA
164.230.0.0 Naval Aviation Depot
164.231.0.0 Military Sealift Command
164.232.0.0 - 164.232.255.255 United States Southern Command

RANGE 167
167.44.0.0 Government Telecommunications Agency

RANGE 168
168.68.0.0 USDA Office of Operations
168.85.0.0 Fort Sanders Alliance
168.102.0.0 Indiana Purdue Fort Wayne

RANGE 169
169.252.0.0 - 169.253.0.0 U.S. Department of State

RANGE 194

RANGE 195
195.10.* Various - Do not scan

RANGE 199
199.121.4.0 - 199.121.253.0 Naval Air Systems Command, VA

RANGE 203
203.59.0.0 - 203.59.255.255 Perth Australia iiNET

RANGE 204
204.34.0.0 - 204.34.15.0 IPC JAPAN
204.34.0.0 - 204.37.255.0 DOD Network Information Center
204.34.16.0 - 204.34.27.0 Bureau of Medicine and Surgery
204.34.32.0 - 204.34.63.0 USACOM
204.34.64.0 - 204.34.115.0 DEFENSE FINANCE AND ACCOUNTING SERVICE
204.34.128.0 DISA-Eucom / BBN-STD, Inc.
204.34.129.0 Defense Technical Information Center
204.34.130.0 GSI
204.34.131.0 NSA NAPLES ITALY
204.34.132.0 NAVSTA ROTA SPAIN
204.34.133.0 NAS SIGONELLA ITALY
204.34.134.0 Naval Air Warfare Center Aircraft Division
204.34.135.0 GSI
204.34.136.0 Naval Undersea Warfare Center USRD - Orlando
204.34.137.0 Joint Spectrum Center
204.34.138.0 GSI
204.34.139.0 HQ, JFMO Korea, Headquarters
204.34.140.0 DISA D75
204.34.141.0 U. S. Naval Air Facility, Atsugi Japan
204.34.142.0 Naval Enlisted Personnel Management Center
204.34.143.0 Afloat Training Group Pacific
204.34.144.0 HQ Special Operations Command - Europe
204.34.145.0 Commander Naval Base Pearl Harbor
204.34.147.0 NAVSEA Information Management Improvement Program
204.34.148.0 Q112
204.34.149.0 Ctr. for Info. Sys.Security,CounterMeasures
204.34.150.0 Resource Consultants, Inc.
204.34.151.0 Personnel Support Activity, San Diego
204.34.152.0 NAVAL AIR FACILITY, ADAK
204.34.153.0 NAVSEA Logistics Command Detachment
204.34.154.0 PEARL HARBOR NAVAL SHIPYARD
204.34.155.0 PEARL HARBOR NAVAL SHIPYARD
204.34.156.0 Defense Photography School
204.34.157.0 - 204.34.160.0 Defense Information School
204.34.161.0 Naval Air Systems Command
204.34.162.0 Puget Sound Naval Shipyard
204.34.163.0 Joint Precision Strike Demonstration
204.34.164.0 Naval Pacific Meteorology and Ocean
204.34.165.0 Joint Precision Strike Demonstration
204.34.167.0 USAF
204.34.168.0 Commander
204.34.169.0 Naval Air Warfare Center
204.34.170.0 Naval Air Systems Command
204.34.171.0 NAVSTA SUPPLY DEPARTMENT
204.34.173.0 SUBMEPP Activity
204.34.174.0 COMMANDER TASK FORCE 74 YOKOSUKA JAPAN
204.34.176.0 DISA-PAC,IPC-GUAM
204.34.177.0 Satellite Production Test Center
204.34.181.0 940 Air Refueling Wing
204.34.182.0 Defense Megacenter Warner Robins
204.34.183.0 GCCS Support Facility
204.34.184.0 Nav Air Tech Serv Facility-Detachment
204.34.185.0 NAVAL SUPPORT FACILITY, DIEGO GARCIA
204.34.186.0 Defense Logistics Agency - Europe
204.34.187.0 NAVMASSO
204.34.188.0 Commander-In-Chief, US Pacific Fleet
204.34.189.0 Defense MegaCenter - St Louis
204.34.190.0 NAVMASSO
204.34.192.0 HQ SOCEUR
204.34.193.0 Second Marine Expeditionary Force
204.34.194.0 Second Marine Expeditionary Force
204.34.195.0 Second Marine Expeditionary Force
204.34.196.0 NAVCOMTELSTAWASHDC
204.34.197.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.198.0 Naval Observatory Detachment, Colorado
204.34.199.0 NAVILCODETMECH
204.34.200.0 Navy Environmental Preventive Medicine
204.34.201.0 Port Hueneme Division, Naval Surf
204.34.202.0 Naval Facilities Engineering Housing
204.34.203.0 NAVSEA Logistics Command Detachment
204.34.204.0 Naval Air Warfare Center
204.34.205.0 Portsmouth Naval Shipyard
204.34.206.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.208.0 - 204.34.210.0 Military Sealift Command Pacific
204.34.211.0 USAF Academy
204.34.212.0 3rd Combat Service Support
204.34.213.0 1st Radio Battalion
204.34.214.0 OASD (Health Affairs)
204.34.215.0 Second Marine Expeditionary Force
204.34.216.0 1st Marine Air Wing
204.34.217.0 SA-ALC/LTE
204.34.218.0 3rd Marine
204.34.219.0 Communications and Electronics
204.34.220.0 G-6 Operations
204.34.221.0 G-6 Operations
204.34.222.0 G-6 Operations
204.34.223.0 G-6 Operations
204.34.224.0 G-6 Operations
204.34.225.0 Joint Interoperability Test Command
204.34.226.0 NAVMASSO
204.34.227.0 NAVMASSO
204.34.228.0 - 204.34.228.255 Field Command Defense Nuclear Agency
204.34.229.0 Naval Space Command
204.34.230.0 Naval Pacific Meteorology and Oceanography
204.34.232.0 Military Family Housing
204.34.233.0 - 204.34.233.255 Navy Material Transportation Office
204.34.234.0 NAVMASSO
204.34.235.0 Defense Finance and Accounting Service
204.34.237.0 European Stars and Stripes
204.34.238.0 Pacific Stars and Stripes
204.34.239.0 PUGET SOUND NAVAL SHIPYARD
204.34.240.0 Nval Station, Guantanamo Bay
204.34.242.0 COMNAVSURFPAC
204.34.243.0 NAVMASSO
204.34.244.0 Amphibious Force, Seventh Fleet, U. S. Navy
204.34.245.0 USAF SpaceCommand
204.34.246.0 USAF
204.34.247.0 U.S. Army Special Operations Command
204.34.248.0 FLEET COMBAT TRAINING CENTER ATLA
204.34.249.0 Naval Aviation Depot North Island
204.34.250.0 NAVMASSO
204.34.251.0 NAVSEA Log Command Detachment Pacific
204.34.252.0 Command Special Boat Squadron One
204.34.253.0 AFPCA/GNNN
204.34.254.0 Navy Environmental Preventive Medicine

RANGE 205
205.0.0.0 - 205.117.255.0 Department of the Navy, Space and Naval Warfare System Command, Washington DC - SPAWAR
205.96.* - 205.103.*

RANGE 207
207.30.* Sprint/United Telephone of Florida

All the below are FBI controlled Linux servers & IPs/IP-Ranges
207.60.0.0 - 207.60.255.0 The Internet Access Company
207.60.2.128 - 207.60.2.255 Abacus Technology
207.60.3.0 - 207.60.3.127 Mass Electric Construction Co.
207.60.3.128 - 207.60.3.255 Peabody Proberties Inc
207.60.4.0 - 207.60.4.127 Northern Electronics
207.60.4.128 - 207.60.4.255 Posternak, Blankstein & Lund
207.60.5.64 - 207.60.5.127 Woodard & Curran
207.60.5.192 - 207.60.5.255 On Line Services
207.60.6.0 - 207.60.6.63 The 400 Group
207.60.6.64 - 207.60.6.127 RD Hunter and Company
207.60.6.128 - 207.60.6.191 Louis Berger and Associates
207.60.6.192 - 207.60.6.255 Ross-Simons
207.60.7.0 - 207.60.7.63 Eastern Cambridge Savings Bank
207.60.7.64 - 207.60.7.127 Greater Lawrence Community Action Committee
207.60.7.128 - 207.60.7.191 Data Electronic Devices, Inc
207.60.8.0 - 207.60.8.255 Sippican
207.60.9.0 - 207.60.9.31 Alps Sportswear Mfg Co
207.60.9.32 - 207.60.9.63 Escher Group Ltd
207.60.9.64 - 207.60.9.95 West Suburban Elder
207.60.9.96 - 207.60.9.127 Central Bank
207.60.9.128 - 207.60.9.159 Danick Systems
207.60.9.160 - 207.60.9.191 Alps Sportswear Mfg CO
207.60.9.192 - 207.60.9.223 BSCC
207.60.13.16 - 207.60.13.23 Patrons Insurance Group
207.60.13.40 - 207.60.13.47 Athera Technologies
207.60.13.48 - 207.60.13.55 Service Edge Partners Inc
207.60.13.56 - 207.60.13.63 Massachusetts Credit Union League
207.60.13.64 - 207.60.13.71 SierraCom
207.60.13.72 - 207.60.13.79 AI/ FOCS
207.60.13.80 - 207.60.13.87 Extreme soft
207.60.13.96 - 207.60.13.103 Eaton Seo Corp
207.60.13.112 - 207.60.13.119 C. White
207.60.13.120 - 207.60.13.127 Athera
207.60.13.128 - 207.60.13.135 Entropic Systems, INC
207.60.13.136 - 207.60.13.143 Wood Product Manufactureds Associates
207.60.13.160 - 207.60.13.167 Jamestown Distribution
207.60.13.168 - 207.60.13.175 C&M Computers
207.60.13.176 - 207.60.13.183 ABC Used Auto Parts
207.60.13.184 - 207.60.13.191 Tomas Weldon
207.60.13.192 - 207.60.13.199 Tage Inns
207.60.13.200 - 207.60.13.207 Control Module Inc
207.60.13.208 - 207.60.13.215 Hyper Crawler Information Systems
207.60.13.216 - 207.60.13.223 Eastern Bearings
207.60.13.224 - 207.60.13.231 North Shore Data Services
207.60.13.232 - 207.60.13.239 Mas New Hampshire
207.60.14.0 - 207.60.14.255 J. A. Webster
207.60.15.0 - 207.60.15.127 Trilogic
207.60.16.0 - 207.60.16.255 Area 54
207.60.18.0 - 207.60.18.63 Vested Development Inc
207.60.18.64 - 207.60.18.127 Conventures
207.60.21.0 - 207.60.21.255 Don Law Company
207.60.22.0 - 207.60.22.255 Advanced Microsensors
207.60.28.0 - 207.60.28.63 Applied Business Center
207.60.28.64 - 207.60.28.127 Color and Design Exchange
207.60.36.8 - 207.60.36.15 Shaun McCusker
207.60.36.16 - 207.60.36.23 Town of Framingham
207.60.36.24 - 207.60.36.31 AB Software
207.60.36.32 - 207.60.36.39 Seabass Dreams Too Much, Inc
207.60.36.40 - 207.60.36.47 Next Ticketing
207.60.36.48 - 207.60.36.55 Dulsi
207.60.36.56 - 207.60.36.63 The Internet Access Company
207.60.36.64 - 207.60.36.71 Maguire Group
207.60.36.72 - 207.60.36.79 Cogenex
207.60.36.88 - 207.60.36.95 AKNDC
207.60.36.96 - 207.60.36.103 McGovern election commitee
207.60.36.104 - 207.60.36.111 Digital Equipment Corp
207.60.36.112 - 207.60.36.119 PTR - Precision Technologies
207.60.36.120 - 207.60.36.127 Extech
207.60.36.128 - 207.60.36.135 Manfreddi Architects
207.60.36.144 - 207.60.36.151 Parent Naffah
207.60.36.152 - 207.60.36.159 Darling Dolls Inc
207.60.36.160 - 207.60.36.167 Wright Communications
207.60.36.168 - 207.60.36.175 Principle Software
207.60.36.176 - 207.60.36.183 Chris Pet Store
207.60.36.184 - 207.60.36.191 Fifteen Lilies
207.60.36.192 - 207.60.36.199 All-Com Technologies
207.60.37.0 - 207.60.37.31 Cardio Thoracic Surgical Associates, P. A.
207.60.37.32 - 207.60.37.63 Preferred Fixtures Inc
207.60.37.64 - 207.60.37.95 Apple and Eve Distributors
207.60.37.96 - 207.60.37.127 Nelson Copy Supply
207.60.37.128 - 207.60.37.159 Boston Optical Fiber
207.60.37.192 - 207.60.37.223 Fantasia&Company
207.60.41.0 - 207.60.41.255 Infoactive
207.60.48.0 - 207.60.48.255 Curry College
207.60.62.32 - 207.60.62.63 Alternate Power Source
207.60.62.64 - 207.60.62.95 Keystone Howley-White
207.60.62.128 - 207.60.62.159 Bridgehead Associates LTD
207.60.62.160 - 207.60.62.191 County Supply
207.60.62.192 - 207.60.62.223 NH Board of Nursing
207.60.64.0 - 207.60.64.63 Diversified Wireless Technologies
207.60.64.64 - 207.60.64.127 Phytera
207.60.66.0 - 207.60.66.15 The Network Connection
207.60.66.16 - 207.60.66.31 Young Refrigeration
207.60.66.32 - 207.60.66.47 Vision Appraisal Technology
207.60.66.48 - 207.60.66.63 EffNet Inc
207.60.66.64 - 207.60.66.79 Entropic Systems Inc
207.60.66.80 - 207.60.66.95 Finley Properties
207.60.66.96 - 207.60.66.111 Nancy Plowman Associates
207.60.66.112 - 207.60.66.127 Northeast Financial Strategies
207.60.66.128 - 207.60.66.143 Textnology Corp
207.60.66.144 - 207.60.66.159 Groton Neochem LLC
207.60.66.160 - 207.60.66.175 Tab Computers
207.60.66.176 - 207.60.66.191 Patrons Insurance
207.60.66.192 - 207.60.66.207 Chair City Web
207.60.66.208 - 207.60.66.223 Radex, Inc.
207.60.66.224 - 207.60.66.239 Robert Austein
207.60.66.240 - 207.60.66.255 Hologic Inc.
207.60.71.64 - 207.60.71.127 K-Tech International Inc.
207.60.71.128 - 207.60.71.191 Pan Communications
207.60.71.192 - 207.60.71.255 New England College of Finance
207.60.75.128 - 207.60.75.255 Absolve Technology
207.60.78.0 - 207.60.78.127 Extech
207.60.78.128 - 207.60.78.255 The Insight Group
207.60.83.0 - 207.60.83.255 JLM Technologies
207.60.84.0 - 207.60.84.255 Strategic Solutions
207.60.94.0 - 207.60.94.15 McWorks
207.60.94.32 - 207.60.94.47 Rooney RealEstate
207.60.94.48 - 207.60.94.63 Joseph Limo Service
207.60.94.64 - 207.60.94.79 The Portico Group
207.60.94.80 - 207.60.94.95 Event Travel Management Inc
207.60.94.96 - 207.60.94.111 Intellitech International
207.60.94.128 - 207.60.94.143 Orion Partners
207.60.94.144 - 207.60.94.159 Rainbow Software Solution
207.60.94.160 - 207.60.94.175 Grason Stadler Inc
207.60.94.192 - 207.60.94.207 Donnegan System
207.60.95.1 - 207.60.95.255 The Iprax Corp
207.60.102.0 - 207.60.102.63 Coporate IT
207.60.102.64 - 207.60.102.127 Putnam Technologies
207.60.102.128 - 207.60.102.191 Sycamore Networks
207.60.102.192 - 207.60.102.255 Bostek
2?7.6?.10?.128 - 207.60.103.255 Louis Berger and Associates
207.60.104.128 - 207.60.104.191 Hanson Data Systems
207.60.106.128 - 207.60.106.255 Giganet Inc.
207.60.107.0 - 207.60.107.255 Roll Systems
207.60.108.8 - 207.60.108.15 InternetQA
207.60.111.0 - 207.60.111.31 Reading Cooperative Bank
207.60.111.32 - 207.60.111.63 Edco collaborative
207.60.111.64 - 207.60.111.95 DTC Communications Inc
207.60.111.96 - 207.60.111.127 Mike Line
207.60.111.128 - 207.60.111.159 The Steppingstone Foundation
207.60.111.160 - 207.60.111.191 Caton Connector
207.60.111.192 - 207.60.111.223 Refron
207.60.111.224 - 207.60.111.255 Dolabany Comm Group
207.60.112.0 - 207.60.112.255 The CCS Companies
207.60.116.0 - 207.60.116.255 Continental PET Technologies
207.60.122.16 - 207.60.122.23 Corey & Company Designers Inc
207.60.122.24 - 207.60.122.31 SAIC
207.60.122.32 - 207.60.122.39 Netserve Entertainment Group
207.60.122.40 - 207.60.122.47 Avici Systems Inc
207.60.122.48 - 207.60.122.55 Webrdwne
207.60.122.56 - 207.60.122.63 Reality and Wonder
207.60.122.64 - 207.60.122.71 Nishan Desilva
207.60.122.72 - 207.60.122.79 NemaSoft Inc
207.60.122.80 - 207.60.122.87 Patrick Murphy
207.60.122.88 - 207.60.122.95 Corey and Company
207.60.122.96 - 207.60.122.103 Ames Textile Corp
207.60.122.104 - 207.60.122.111 Publicom
207.60.127.0 - Northstar Technologies
207.60.128.0 - 207.60.128.255 Northstar Technologies
207.60.129.0 - 207.60.129.255 Sanga Corp
207.60.129.64 - 207.60.129.127 Fired Up Network
207.60.129.128 - 207.60.129.191 Integrated Data Solutions
207.60.129.192 - 207.60.129.255 Metanext
207.61.* WorldLinx Telecommunications, Inc., Canada
207.120.* BBN Planet, MA

RANGE 208
208.240.xxx.xxx

RANGE 209
209.35.* Interland, Inc., GA

RANGE 212
212.56.107.22
212.143 ***
212.149.***
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.33.56
212.159.40.211
212.159.41.173
212.179.***
212.208.0.12.***

RANGE 213
213.8.***.***

RANGE 216
216.25.* 216.94.***.*** 216.247.* 216.248.*.* 217
217.6.* Do not scan

100000 software Free Download

ftp://ftp.freenet.de/pub/filepilot/windows/

Enable right click on websites

Enable right click on websites
Lots websites have disabled the right click function of mouse button..... it's really annoying.This is done so that you don't able to copy the(via right-click:>>save picture) thier photos or images or any goodies.

Unfortunately it disables all right click funtionality .You can enable it by clicking:
Tools>>internet option >>security tab>>custom level
scroll down to scripting section, set active scriting to disable
Click ok a couple of times .

You'll probably want to turn this back to "enable" when your done .

Enjoy....

500 Hacking Tutorials

Dept of Treasury Letter.txt
Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt
Digital Photo Id Cards, Greate Info.txt
Direct Link To Any Page You Want To In Hotmail.txt
Directx Explained.txt
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt
Disable The Send Error Report, to Microsoft.txt
Downloading Files, Using Archives And Images.txt
Downloading Windows Media Streams.txt
Drake's Phreaking Tutorial.txt
Dreamweaver Tut That Teaches U, to search a database with phpmysql.txt
Driverguide.com.txt
Dual Boot After The Fact.txt
Dvd Copying-ripping Definitions.txt
DVD Regions Information.txt
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt
Easily Disconnect-reconnect From Broadband.txt
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt
Ebay Hackcracktip.txt
Electronic Bulliten Boards and 'Public Goods' Explainations o.txt
Electropolos - Communication and Comunity on IRC.txt
Eliminate Ie's Autocomplete Reminder.txt
Email Forge, sends email from anyone.txt
Enable Folder and Icon Refresh, Win XP Tweak.txt
Erasing_Your_Presence_From_System_Logs.txt
Ethload User's Guide.txt
Evolution Of Computer Viruses History Of Viruses.txt
Excellent tricks and techniques of Google Hacks.txt
Exploseek, a simple tool to find music on the net.txt
Find Stuff.txt
Finding Missing Files From A Release.txt
FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE.txt
FlashGet v1.4 - More Download Simultaneously.txt
Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert.txt
Formatting An Hdd, when fdisk won't.txt
Formulating A Company Policy on Access to and Use and Disclos.txt
Free Access To Websites Without Registering.txt
FREE Hosting For WAREZ.txt
FREE Hosting List php, mysql and more.txt
Free Speech in Cyberspace.txt
Free World Dialup.txt
Free X-box Live !.txt
Freebsd Install Guide.txt
Gender Issues in Online Communications.txt
General Keyboard Shortcuts, General Keyboard Shortcuts.txt
Get In Windows 2000 As Administrator.txt
Get the Most Out of Your DVD Recorder.txt
Get The Music You Want To Hear.txt
Get unlimited bandwidth from your host for free.txt
Getting A 1gb Yahoo China Account.txt
Getting Counter-strike Source To Work.txt
getting movies, mp3,games using google.txt
Getting older programs to run on Windows XP.txt
Getting started with Linux for nOObs!.txt
Go to Windows updates anonymously.txt
Google Crack Search.txt
Google secrets.txt
Google Tips & Tricks, (utilizing search engine).txt
Government Computer Security Techniques.txt
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt
Guide For Getting Free Stuff.txt
Guide to Hacking with sub7.doc
Guide to IIS Exploitation.txt
Guide to Slipstreaming Service Pack 2.txt
HACKDICT.TXT
Hacker Test.txt
Hackers A-Z.TXT
Hackers Who Break into Computer Systems.txt
hacking and phreaking.doc
Hacking Bank Of America's Home Banking System.txt
Hacking Compuserve Infomation Service.txt
Hacking Faq.txt
Hacking for Dummies Volume 2.doc
Hacking For Newbies.doc
Hacking GTE Telemail.txt
hacking in telnet http://ftp.rtf
Hacking IRC - The Definitive Guide.txt
hacking on Telnet explained.doc
hacking on XP part 1.doc
hacking on XP part 2.doc
hacking on XP part 3.doc
hacking on XP part 4.doc
hacking on XP part 5.doc
hacking password protected site.doc
Hacking Password Protected Website's.doc
hacking passwords.doc
Hacking PC-Pursuit Codes.txt
Hacking Techniques.txt
Hacking TRW.txt
Hacking TYMNET.txt
Hacking Unix System V's.txt
Hacking VoiceMail Systems.txt
Hacking Wal-Mart Computers.txt
Hacking Webpages.txt
Hard drive Gone Bad.txt
Hardware Firewall.txt
Have Notepad In Send To.txt
have satallite tv for almost free IF not free!!!.txt
Hex, How to turn binary or decimal to hex.txt
Hide Drives and Partitions.txt
How 2 Find EVERYTHING uploaded on Rapidshare.txt
How BT phone cards works.txt
How do I overburn a CD with Nero.txt
How do I remove an extra operating system from by.txt
How do I Test My VirusScan Installation.txt
How Do U See Hidden Files, Using DOS...txt
How Download MP3s from Fanscape.com or other Streaming Audio-Video.txt
How Linux boots.txt
How Long Has Your XP System Been Running.txt
How Phone Phreaks are Caught.txt
How the Traditional Media Clasifications Fail to Protect in t.txt
How To Access Your Folders From Your Taskbar.txt
How To Add A Url Address Bar To The Taskbar.txt
How To Add An Option To Print, the Contents of a Folder!.txt
How To Add Your Own Windows Tips.txt
How to Back Up the Registry.txt
How To Backup Ps2 Games.txt
How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
How To Block Websties Without Software, block websites.txt
How To Boot Xp Faster (updated).txt
How to build a black box.txt
how to burn quicker in windows xp.txt
How to Bypass BIOS Passwords.txt
How To Bypass Web Filters, tutorial.txt
HOW TO CAPTURE STREAMING MEDIA.txt
How To Change A Cmos Battery.txt
How to change the serial number used in Windows XP, Valid for XP Corporate.txt
How To Change Thumbnail Size And Quality.txt
How to clear Bios info 2.txt
How to clear Bios info.txt
How To Convert File System, fat - fat32 to ntfs.txt
How To Copy A Dvd Which Will Play On A X Box.txt
How to copy songs from your iPod to your PC.txt
How to crash AOL.txt
How To Customise Your start Button.txt
How To Delete Those Persistent Nasty Files.txt
How to dial out of a UNIX System.txt
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for hotmail today - http users.txt
How To Disable Picture And Fax Viewer.txt
How to do a high Quality DivX rip.txt
How To Download Bittorrent Files.txt
How To Download Directly From Crackdb.com.txt
How To Download Movies, From IRC.txt
How to Download-Upload Files from email.txt
how to edit right click menu.rtf
how to execute chm files in linux.txt
How to Extend the life of the yousendit download links.txt
How to find a remote IP.txt
How To Find Ftp's The Easy Way'.txt
How to find MP3's real quickly.txt
How to find Security Holes.txt
How To Find Serial Numbers On Google.txt
How to fix corrupted files in XP.txt
How to fix Windows Installer problem.txt
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt
How to get a Shell in 24 hours.txt
HOW TO GET ANY WINDOWS PASSWORD.txt
How to Get someones ISP password, Get free internet.txt
How To Get Top Ranking, Search Engines.txt
How to Hack UNIX System V.txt
How To Hack Windows Xp Admin Passwords.txt
How to hack-change your Windows XP Boot Screen.txt
how To Hide Yourself From Network Users!, And give access to only specific users!.txt
How To Increase Download Speeds By 100-200 Kbsec.txt
How to Install and run Windows CE on your USB Stick.txt
How to learn to hack in easy steps.doc
How to login to a C.B.I. System.txt
How To Make 5cds, 10cds Or 2dvds From Official Dow, These are same as Mandrake PowerPack+.txt
How to make a Free Phone Call.txt
How To Make A Kvcd.txt
how to make a new web site.txt
How To Make A Transparent Background, .fla .swf.txt
how to make a VCD from a DivX.txt
How To Make An Animted Logo.txt
How To Make Free Phone Calls.txt
How to make key generators.txt
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt
How To Make XP Go Faster.txt
How To make your own Radio Station 2.txt
How To Make Your Own Radio Station.txt
How To Make Your Own Radiostation.txt
HOW TO MANUAL - THE END OF DELETERS.txt
How to modify exe files.txt
How To Move Xp Harddrive To New Motherboard.txt
How To optimize DSL-CABLE connection speed.txt
How To Play Movies (divx Etc) With Subs.txt
How to Put an End to Unwanted or Harassing Phone Calls.HAR
How to recover MOST of scratched CD data discs.txt
How to Remove DRM Protection for Video Files.txt
How To Remove Ms Java Vm And Install Sun Java.txt
How To Remove Signin Details Of Msn Passport.txt
How To Remove The Default Admin$ Shares.txt
How to remove the Links folder in IE Favorites.txt
How to Remove WinXP Splash and See Operations.txt
How To Rename Extensions With Ease, with a Renamer.bat file!.txt
How to Rename File Extensions.txt
How To Rename Multiple Files In Winxp.txt
How To Restrict Login Hours Allowed.txt
How to safeguard your files when computer crashes.txt
How to save Windows xp updates.txt
how to search google for RAPIDSHARE links.txt
How To See Hidden Files, Using Dos.txt
How to send ICQ Bombs.txt
How To Set search For All Files In Winxp.txt
How to set up a http server running from you computer.txt
How To Set Up A Proxy In Flashget, As Requested.txt
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt
How To Set Up Direct Connect.txt
HOW TO SET UP FTP SERVER.txt
How To Set Up Proxies In Your Browser.txt
How To Set Zone Alarm Settings!, Fix for ZA ports.txt
How To Setup Your Own Dns (Domain Name Server).txt
How To Speed Up A Slow Computer.txt
How To Speed Up Http Requests On Internet Explorer, as above.txt
How To Stop Spam.txt
How to swear in all languages.txt
How To Unload Cached Dll Files To Free Memory.txt
How to Use and How to Chain Multiple Proxies!.txt
How To Use File Compression In Windows Xp.txt
How To Use Google To Download Mp3's, and applications.....txt
How To Use Newsgroups.txt
How to use the Web to look up information on hacking.doc
How To Use You Gmail With Msn Messenger.txt
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt
HOWTO Change Windows XP Home to Windows XP Pro.txt
Important Faqs For Sp2.txt
Improve Doom 3's Performances!!, simple but efficient trick for every1.txt
Improve your dialup modem preformance.txt
Increase XP Folder Settings.txt
Information of Hacking AngelFire Websites.txt
Insert Your Serial For Office 2k, auto install office.txt
Install A New Hard-disk.txt
Install Xp From Dos.txt
Installing Apache on Windows.txt
Installing Gentoo Linux, Amazing step by step tutoria.txt
Installing IIS On Windows Xp Pro.txt
Installing Slackware Linux.txt
Instructions For Removal Of Advertising In Msn Messenger.txt
Introduction to Denail of Service.txt
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt
IP addressing, and gaining IP's.txt
IP Addressing.txt
IP how to.rtf
Irc How To Downlaod From, How to downlaod from IRC.txt
Irc Servers On nix, For people who want to start own IRC net.txt
ISSN Numbers- An Introduction.txt
Junk Mail- How Did They All Get My Address.txt
Keep Files Private.txt
Keep Folders Hidden.txt
Keyboard Shortcuts Result in Excel 2000 - Movement.txt
Keyboard Shortcuts, Microsoft Word.txt
Keyboard Shortcuts, must read.txt
Kill Microsoft Instant Messenger.txt
Lamination Tips, Its a Fast TUT......txt
Leet Way To Get Your Ip In Windows Xp.txt
LENROS~1.TXT
LENROS~2.TXT
Linking Your Xbox To Your Computer.txt
Linux Howto's.txt
List Of Sites Not To Go To.txt
Little help for anonymous mailer.txt
Lots Of Windows Xp Tips, Take A Look !.txt
Lyrics With Google.txt
Make A Autorun File For Ur Cd.txt
Make A Batch File To Clean UR PC!!, All In One!!.txt
Make A Roughly 16 Hour Video Dvd.txt
Make Acrobat Reader 6 load faster.txt
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt
Make Mp3 Files Smaller Without Losing Quality.txt
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt
Make Your Pc Faster, Guaranteed.txt
MakeXPgoFaster.txt
making a .cue file, in notepad.txt
Making A .txt Executable Server.txt
Making Bootable Floppy Disk to Boot into Windows.txt
Making Cd Version Of Doom3 Into Dvd Version.txt
Making Web Page Fonts Consistent and Uniform.txt
Manage Saved Ie Passwords.txt
Mastering The Windows XP Registry.txt
Maximize Dial-up Modem Settings.txt
MEMETICS.TXT
Microsoft's Really Hidden Files, Reveled Hidden files.txt
MINDVOX.TXT
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt
mIRCcommands.txt
Misc Linux Tips & Tricks.txt
Missing Administrator Account.txt
Mobile Secret Codes.txt
Modify .exe Files And Crack A Program.txt
More Xp Tips and tricks make your computer more faster.txt
MORRIS~1.TXT
Moving and Removing the Start Button.txt
Msn Messenger & Gmail.txt
My Flash Bookmarks, long list of tutorials.txt
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt
NEIDOR~1.TXT
Nero How To Verify The Validity Of The Sn U Use.txt
NetBios explained.doc
New Pc Or New Motherboard.txt
New Way To Relive Some Zinio File.txt
news groups the how to do.txt
NFS Tracing.txt
Nice list of windows shortcuts.txt
Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt
No Text Icons.txt
Ntfs Cluster Size, better harddrive performance.txt
NY_2'S Guide to Obtaining An IP Address. .doc
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt
Open Windows Explorer To A Different Default Direc.txt
Optimize Broadband & Dsl Connections.txt
Optimize Emule Connection.txt
Organizational Analysis in Computer Science.txt
Outpost Rules, Outpost rules for system & app.txt
Outsmarting System File Protection.txt
Overclocking_Tutorial.txt
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt
Part 0 Dc++.txt
Part 1 Bittorrents.txt
Part 2 Irc (mirc).txt
Part 3 http://Ftp.txt
Partitioning Your Harddisk With Fdisk.txt
Pc File Extention Listing.txt
Pc Maintenance Guide.txt
Peer2mail Tutorial.txt
Performance Increase Through My Computer.txt
PGP Startup Guide.htm
Phone Systems Tutorial by The Jolly Roger.txt
Phreakers Handbook.txt
Play Games On PS2 Without ModChip.txt
Play On A Bnet Emulator, and f off cd key check =).txt
Port Numbers.txt
Presumed Guilty.txt
Problem With Internet Navigation, Clean Host File.txt
Proxy how to.rtf
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt
Quick Msc.txt
Quick Phone Modifications.txt
Quick Shutdown for XP, How to create a shutdown shortcut..txt
Quickly Start The Shared Folder Wizard.txt
Raising Hell with Unix.txt
Rapidshare hack!!!!! Free premium acount for all.txt
Rapidshare Hacked, unlimited upload, no countdown.txt
Rapidshare Timelimit.txt
Read This! Av Compare!.txt
Recover A Corrupted System File.txt
Recover a Quick erased CD RW.txt
Reformat&Reinstall.txt
Regedit.exe & Regedt32.exe, Whats the difference.txt
Registry Disassembled a basic tutorial.txt
Reinstall Internet Explorer 6.txt
Release Codes, Read, and Learn....txt
Remarks of the President and Vice President to Silicon Valley.txt
Remote Desktop Through Company Firewall.txt
Remote Shutdown.txt
Remove Linux From Your Pc Safely, ...and restoring your MBR.txt
Remove Msn Messenger From Xp, several ways...txt
Removing Banners From Free Webhosts.txt
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt
Rename 'recycle Bin' To Whatever You Want.txt
Reregister All .dll Files Within Registry.txt
Reset your lost Bios Password.txt
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt
REVERSE CODING.txt
RIGGSB~1.TXT
RIGGS_~1.TXT
RIGHTS~1.TXT
RIVERA.TXT
Routing Basics.pdf
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt
Running A Board forum From Your Own Pc.txt
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis....txt
Safely Editing the Registry....txt
Save Your Desktop Icon Settings.txt
Saving and loading Photoshop actions.txt
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt
ScreenLock Professional v2.0.41.txt
SEARCH eBOOK in FTP SEARCH ENGINE.txt
Search For Ebook Server With Google.com.txt
Search like a real warez d00dz, for warez of course!.txt
Searching For Something To Download, This may help.txt
Secret Backdoor To Many Websites.txt
Secrets Of Lock Picking.txt
Securing WinXP Pro (with what win-xp has to offer.txt
Securing your WINDOWS XP computer.txt
Security holes.txt
Seisure Warrent Documents for Ripco BBS.txt
Set Google as your Default Search in IE.txt
Set Win Explorer to open the folder you want!, Little trick.txt
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt
sidebar fix.txt
Simple Tweaks For Peak Pc Graphics Performance.txt
Single Click Shutdown.txt
Single-click To Open An Item..., IF the Folder Options is grayed out.txt
Site Security Handbook.txt
SJ-DEC~1.TXT
SJ-RESP.TXT
Slow Loggon Time, one fix for problem.txt
Slow Opening Of File Dialogs.txt
SMTP-Simple Mail Transfer Protocol.txt
Some Cool Site For Tutorials.txt
Some Google Tricks, again.txt
Some More Tips To Improve Your Winxp.txt
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt
Sp2 Tweaks.txt
Speed Up Internet.txt
Speed up menu display.txt
Speed up Mozilla FireFox.txt
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt
Speeding up menus in XP.txt
Speeding up your internet connection under Linux and Windows.html
Spoofing emails, via telenet.txt
Standard ASCII Character Set.txt
Steps to Clean Install XP.txt
Stop A Restart Process In 3steps.txt
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt
Summary of FBI Computer Systems.txt
SUNDEVIL.TXT
SUPREM~1.TXT
System Changes To Foil Hackers And Browser Hijacke.txt
System File Checker For Windows Xp.txt
TCP packet fragment attacks against firewalls and filters.txt
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt
Telenet-The Secret Exposed.txt
telnet trick port 25.doc
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt
The ABC's of Payphones part 1.txt
The ABC's of Payphones part 2.txt
The ABC's of Payphones part 3.txt
The ABC's of Payphones part 4.txt
The Antivirus Defense-in-Depth Guide.txt
The Basics of Hacking- Introduction.txt
The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt
ThE Beige BoX .txt
The Constitution in Cyberspace.txt
The Cracking Manual.txt
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt
The Electronic Communication Privacy Act of 1986 - A Laymans .txt
The Greatest Hacker of all time.ASC
The Hacker's League.txt
The History of British Phreaking.htm
The Inner Circle Book's Hacking Techniques.txt
The Lamahs-Guide to Pirating Software on the Internet.txt
The M.M.C. Guide to Hacking, Phreaking, Carding.txt
The Modern Phreakers Guide To Beige Boxing.txt
The Modern Phreakers Guide To Payphones.txt
The Moterola Bible.txt
The Myth of the 2600Hz Detector .txt
The National Information Infrastructure-Agenda for Action.txt
The Newbies Handbook- ' How to beging in the World of Hacking.txt
The Newbies-User's Guide to Hacking.txt
The Official Phreaker's Manual.txt
The Phreakers Handbook-1.txt
The Port Guide, Port number and info.txt
The Pre-History of Cyberspace.txt
The Price of Copyright Violation.txt
The REAL way to hack RemoteAccess.txt
The Secret Service, UUCP,and The Legion of Doom.txt
The Telephone Works.txt
The Ultimate Guide To Installing Windows Xp Sp2.txt
The Ultimate Phreaking Guide .txt
the UNIX operating system (Berkley 4.2).txt
Theft of Computer Software-A National Security Threat.txt
Thoughts on the National Research and Education Network.txt
Three Ways Of Bypass Starforce Cd Protection.txt
Tip for shutdown windows - virus.txt
Tips And Tricks, Windows XP.txt
Tips on Starting Your Own BBS.1
Tired Of Reinstalling Windows.txt
To Get And Show The Ip Via Javascript.txt
Top 5 Myths About Safe Surfing, PC Magazine.txt
Transferring Data.txt
Translating Binary To Text.txt
Translating Binary to Text2.txt
Trojan Ports.txt
Turn MSN Messenger Display Pix into User Pix on XP.txt
Turn Off Unneeded Services, speed up pc.txt
Tutorial Get the serial number you need.txt
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt
Tutorials - blacksun.box.sk
Ultimate Google Way.txt
ULTIMATE GUIDE TO BYPASS BIOS PASSWORDS!.txt
Understanding the Telephone System.txt
undocumented DOS commands.txt
Uninstall Windows Xp And Return To My Old Windows.txt
Uninstalling Norton 2004 Products.txt
UNIX Computer Security Checklist.0
UNIX Use and Security - By the Prophet.txt
UNIX Use and Security From The Ground Up.htm
UNIX- A Hacking Tutorial.SIR
Unlimited Rapidshare Downloads.txt
Untold Window Tips.txt
Untold Windows Secrets.txt
Untold Windows Tips.txt
Unused space on hard drives recovered.txt
Use Hotkeys To Switch Programs.txt
Useful Download Guide, Fix Down, 0daycn Ttdown, Links.txt
WAREZ DEFINITION.txt
Way To Download From Brturbo, FireFox.txt
We Don't Need No Education, Online classes made easy.txt
Welcome to The king's meaning's of how to kick some-one's ASS!.txt
What Files are Legal for Distribution on a BBS.txt
What is the Registry.txt
What Should I Do With Image Files.txt
What To Look For In A Code Hacking Program.htm
What To Look For In A Code Hacking Program.txt
What You Should Know About Computer Viruses.DNA
What You Wanted To Know About Movie Jargon, But Were Afraid To Ask.txt
When Good Discs Go Bad.txt
Where Is Winipcfg In Winxp.txt
Who's Seeding The Net With Spyware.txt
Why wait 35 Seconds at eZshare.txt
Win 2000 Dr. Watsson.txt
Windows 2000 Tips & Tricks.txt
Windows 2003 System Restore, How to activate system restore in W2K3.txt
Windows Scan Count Down Time.txt
Windows Shortcuts.txt
WINDOWS TRUE HIDDEN FILES.txt
Windows Tweak, Hack Your Start Button.txt
Windows Xp - Speed Up Your Network and Internet Access.txt
WINDOWS XP HIDDEN APPS.txt
Windows XP Registry Tweaks.txt
Windows XP Startup and Performance Tweaks.txt
Windows Xp Tips 'n' Tricks.txt
Windows Xp Tweaks, A work in progress.txt
Windows XP Tweaks.txt
WinRar Tutorial - Compression profiles, passwords and more.txt
Winsock 2 Repair.txt
WinXP 3 Tips.txt
Winxp Application Defrag, faster access for used programs.txt
Winxp Applications Startup Time, Decrease your Applications startup time.txt
WinXP Bootable CD.txt
Winxp System Response, reboot whitout rebooting.txt
Winxp Tips And Tricks, Winsock 2 repair.txt
Xp Auto Install.txt
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt
XP REPAIR INSTALL.txt
XP Tweaking.txt
Yahoo + geocities Posts.txt
Yahoo Chat Commands how to.rtf
Yahoo Messeger, no ad's.txt
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt
Your Home Page Nevr Being Changed.txt
Your Own Home Server - Introduction.txt
Zen and the Art of Fone Phreaking `97 .txt


http://rapidshare.com/files/91023876/500_hacking_tutorials.rar

http://www.4shared.com/file/102961869/656728ed/500_hacking_tutorials.html