 PHRACK articles.A Many of the articles contained here from various issues of PHRACK A magazine off the net contain information on system internals, how > to add intercepts, how to detect them, and so on. Some of them? present this material in a context of "how to break in and hide ? your actions", but it is vital to understand where such attacks ? can be and what their technical level is. Some of the detection ? technology is also useful directly in defeating such intrusion.  Files:= AAAREADME.TXT;1     ARREST.TXT;1        BYPASS-HOST-IDS.TXT;2 O CCS7.TXT;1          CGI-HOLES.TXT;1     CRIM.TXT;1          DCERT.TXT;1         O DEFEAT-IDS.TXT;1    DEFEATSNIFFERS.TXT;1                    DTMF.TXT;1          @ EARLY-OS-DESIGN.TXT;1                   ETERNITY-DATASTORE.TXT;1O EXTRACT.C;2         FILE-DESC-HIJ.TXT;1 FILEDES-HIJ.TXT;1   FORTH-HACK.TXT;1    O FWTUNNEL.TXT;2      HARD-BSD.TXT;1      HIDE-PROMISC.TXT;1  IP-ROUTE.TXT;1      O IP-SPOOF.TXT;1      JUGGERNAUT-12-PATCH.TXT;2               JUGGERNAUT10.TXT;2  O KEYTRAP.TXT;1       LINUXDVR.TXT;1      LINUXHARD.TXT;1     LNX-TT-HIJ.TXT;2    @ LOKI1.TXT;1         LOKI2.TXT;2         MERIDIAN-VOICEMAIL.TXT;1< MONOALPHABET-CRYPTANALY.TXT;1           NT-INTER-PROBE.TXT;2O NT-NETMON.TXT;1     NT-PWD-CRK.TXT;1    NTWEBVUL.TXT;1      P51NEWS.TXT;1       O P52NEWS.TXT;1       P53NEWS.TXT;1       P54N4.PHTML;1       P54N5.TXT;1         P P54NEWS.TXT;1       PC-APP-SEC.TXT;1    PHN-DIVERTER.TXT;1  PHRACKV2-INDEX.TXT;1O PHREAKM.TXT;1       PINGD.TXT;1         PPTP-VUL.TXT;2      PPV-NOT.TXT;1       O REM-OS-DET.TXT;1    RPCSCAN.TXT;2       SCANDET.TXT;2       SCANNING.TXT;1      O SCAVCONN.TXT;2      SHARED-LIB-REDIRECTION.TXT;1            SHR-LIB-RED.TXT;1   O SKYTEL.TXT;1        SLC.TXT;1           SMASHSTACK.TXT;1    SNMP-VUL.TXT;1      O STEG.TXT;1          STEGO-SIGNS.TXT;1   SYNFLOOD.TXT;1      T-TCP-VUL.TXT;1     O TCP-WEAKNESS.TXT;1  TRUSTED-PATH-EXEC-REDUX.TXT;1           VRU.TXT;1           < WATCHER-NID.TXT;2   WEAKLINUX.TXT;1     WIN-KEYLOG.TXT;2    