# Taken from hackproofinglinux.tar.gz
Chapter 1 Introduction to Open Source Security Solutions in this chapter: � Using the GNU General Public License � Soft Skills: Coping with Open Source Quirks � Should I Use an RPM or Tarballs? � Obtaining Open Source Software � A Brief Encryption Review � Public Key and Trust Relationships � Auditing Procedures � Summary � Solutions Fast Track � Frequently Asked Questions Introduction # What partof this documents is "fake"? ----- Original Message ----- From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, October 02, 2002 7:03 PM Subject: [Full-Disclosure] [PHC] FREE SECURITY BOOKS !!! [PHC] > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Books on the PHC site are all fake and designed to promote cyberterrorism. > > > > On Wed, 02 Oct 2002 17:05:56 -0700 [EMAIL PROTECTED] wrote: > >INTRODUCING THE PHC LIBRARY OF ALEXANDRIA KNOWLEDGE HAVEN THINK TANK > ><br>REFERENCE COLLECTION OF ADEPTUS HACKERUM GRAND ORACLE OF THE > >NINTH ANGLE > ><br>OSIRIS RISING SCHOLARLY INFORMATION DISSEMINATION MOUNT OLYMPUS > ><br> > ><br>***** http://phrack.efnet.ru/books/ ***** > ><br>***** http://phrack.efnet.ru/books/ ***** > ><br>***** http://phrack.efnet.ru/books/ ***** > ><br>***** http://phrack.efnet.ru/books/ ***** > ><br>***** http://phrack.efnet.ru/books/ ***** > ><br> > ><br>In the time honored traditions of 'information wants to be > >free,' 'hacking > ><br>is about knowledge and ethics and charity,' and 'br0, > >pass the bong,' PHC > ><br>has assembled a small library of the most sought after HACKING > >and SECURITY > ><br>books on the market. Well, almost. We still haven't added > >the literary > ><br>masterpiece penned by the hand of Michael Schiffman (route) and > >various > ><br>other brain child works of the security scene's most prolific > >and > ><br>charismatic personalities. However, time will see to it that > >little Johnny > ><br>'xXx_modem_xXx' Smith in NYC will have a doorway into > >the realm of HACKING > ><br>INFORMATION that is complete and bursting with life, without > >having to pull > ><br>out his semi-automatic to cap a priest in cold blood and acquire > >the reading > ><br>materials with the donation box pillage... > ><br> > ><br>In the Information Age a nigga gotta be down wit the info superfreezy > ><br>highway f0 sheezy yo kno what i'm sayin kickin back wit the > >dawgs hackin > ><br>they mudderfuckin turf and making a tight get away yo know what > >i'm sayin > ><br>school iz for foolz gotta break it assimilate it fucking macerate > >it and > ><br>then be poppin off wit the hackin dolla before they be layin > >down the smack > ><br>and bussin us throwin us back in juvey so some fuckin white punk > >can tear us > ><br>a new asshole ya know what i'm sayin. > ><br> > ><br>Any copyright cries will result in us looking for ways to take > >advantage of > ><br>loopholes in the international copyright laws... *we dunno* some > >way of > ><br>representing the material in other forms so that no copyright > >violations > ><br>have taken place (technically, llololl0l0lol). Email us if you're > >down with > ><br>this legal shit. > ><br> > ><br> > ><br>Walking to the library > ><br>One thought on my mind > ><br>Gotta have that one book > ><br>One book of a kind > ><br> > ><br>They call him route > ><br>He has nice glutes > ><br>I yearn for his book > ><br>Fuck Ach-Pee tutes > ><br> > ><br>They call him route > ><br>He has binary tats > ><br>He drives a viper > ><br>He has V-shaped lats > ><br> > ><br>They call him route > ><br>He doesn't hack > ><br>But that's a-ok > ><br>'Cuz he wrote phrack > ><br> > ><br>They call him route > ><br>He does understand > ><br>Rip ICMP outta the kernel > ><br>Ram it in-ta userland > ><br> > ><br>They call him route > ><br>A grant from The Guild > ><br>He dives from ego to floor > ><br>And then gets killed > ><br> > ><br>They call him route > ><br>Nirva sits on his lap > ><br>Libnet gets the ASN.1 > ><br>Nirva's ass gets a tap > ><br> > ><br>They call him route > ><br>He brought ya T-P-E > ><br>He'll be nailing yer box > ><br>Thru yer vuln gopher-d > ><br> > ><br>They call him route > ><br>He has oily skin > ><br>Don't be mentioning it tho > ><br>Or SYN after SYN > ><br> > ><br>They call him route > ><br>Lotsa pics on InfoNexus > ><br>Make fun of his height > ><br>Headbutt to tha solar plexus > ><br> > ><br>They call him route > ><br>He's packing six point two > ><br>He has big gunz tho > ><br>So too da too da loo > ><br> > ><br>They call him route > ><br>He has a duck > ><br>Girls like to meet him > ><br>To have a discussion about guys > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > ><br> > -----BEGIN PGP SIGNATURE----- > Version: Hush 2.2 (Java) > Note: This signature can be verified at https://www.hushtools.com/verify > > wlQEARECABQFAj2bl2ANHHBoY0BodXNoLmNvbQAKCRCcVkAK1xe2VznJAKCU8nbEFZla > 8JNPGmExKYsFD6ScmwCgsORuEswR4IDUoZ870ssh+8Alh7Q= > =a5jG > -----END PGP SIGNATURE----- > > > > > Get your free encrypted email at https://www.hushmail.com > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
