TABLE OF CONTENTS
AND
GLOSSARY
License for Use Informaion
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
ll works in the !acker !ighschool pro"ect are provided for non#commercial use with
elementary school students$ "unior high school students$ and high school students whether in a
public institution$ private institution$ or a part of home#schooling% These materials may not be
reproduced for sale in any form% The provision of any class$ course$ training$ or camp with
these materials for which a fee is charged is e&pressly forbidden without a license including
college classes$ university classes$ trade#school classes$ summer or computer camps$ and
similar% To purchase a license$ visit the 'ICE(SE section of the !acker !ighschool web page at
www%hackerhighschool%org)license%
The !!S *ro"ect is a learning tool and as with any learning tool$ the instruction is the influence
of the instructor and not the tool% ISECOM cannot accept responsibility for how any
information herein is applied or abused%
The !!S *ro"ect is an open community effort and if you find value in this pro"ect$ we do ask
you support us through the purchase of a license$ a donation$ or sponsorship%
ll works copyright ISECOM$ +,,-%
!
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Table of Contents
Lesson "# Bein$ a %ac&er
.%, Introduction
.%. /esources
.%.%. 0ooks
.%.%+ Maga1ines and (ewspapers
.%.%2 3ines and 0logs
.%.%- 4orums and Mailing 'ists
.%.%5 (ewsgroups
.%.%6 7ebsites
.%.%8 Chat
.%.%9 *+*
.%+ 4urther 'essons
Lesson !# Basic Comman's in Lin() an' *in'o+s
+%.% Introduction and Ob"ectives
+%+% /e:uirements and Setup
+%+%. /e:uirements
+%+%+ Setup
+%2% System Operation: 7I(;O7S
+%2%. !ow to open an MS#;OS window
+%2%+ Commands and tools <7indows=
+%-% System Operations: 'inu&
+%-%. !ow to open a console window
+%-%+ Commands and tools <'inu&=
Lesson ,# Pors an' Prooco-s
2%. Introduction
2%+ 0asic concepts of networks
2%+%. ;evices
2%+%+ Topologies
2%2 TC*)I* model
2%2%. Introduction
2%2%+ 'ayers
2%2%+%. pplication
2%2%+%+ Transport
2%2%+%2 Internet
2%2%+%- (etwork ccess
2%2%2 *rotocols
2%2%2%. pplication layer protocols
2%2%2%+ Transport layer *rotocols
2%2%2%2 Internet layer *rotocols
2%2%- I* ddresses
2%2%5 *orts
,
COMPLETE TABLE OF CONTENTS AND GLOSSARY
2%2%6 Encapsulation
Lesson .# Ser/ices an' Connecions
-%, Introduction
-%. Services
-%.%. !TT* and The 7eb
-%.%+ E#Mail > *O* and SMT*
-%.%2 I/C
-%.%- 4T*
-%.%5 Telnet and SS!
-%.%6 ;(S
-%.%8 ;!C*
-%+ Connections
-%+%. IS*s
-%+%+ *lain Old Telephone Service
-%+%2 ;S'
-%+%- Cable Modems
Lesson 0# S1sem I'enificaion
5%, Introduction
5%. Identifying a Server
5%.%. Identifying the Owner of a domain
5%.%+ Identifying the I* address of a domain
5%+ Identifying Services
5%+%. *ing and Trace/oute
5%+%+ 0anner ?rabbing
5%+%2 Identifying Services from *orts and *rotocols
5%2 System 4ingerprinting
5%2%. Scanning /emote Computers
Lesson 2# Ma-+are
6%, Introduction
6%. @iruses <@irii=
6%.%. Introduction
6%.%+ ;escription
6%.%+%. 0oot Sector @iruses
6%.%+%+ The E&ecutable 4ile @irus
6%.%+%2 The Terminate and Stay /esident <TS/= @irus
6%.%+%- The *olymorphic @irus
6%.%+%5 The Macro @irus
6%+ 7orms
6%+%. Introduction
6%+%+ ;escription
6%2 Tro"ans and Spyware
6%2%. Introduction
6%2%+ ;escription
6%- /ootkits and 0ackdoors
6%-%. Introduction
.
COMPLETE TABLE OF CONTENTS AND GLOSSARY
6%-%+ ;escription
6%5 'ogicbombs and Timebombs
6%5%. Introduction
6%5%+ ;escription
6%6 Countermeasures
6%6%. Introduction
6%6%+ nti#@irus
6%6%2 (I;S
6%6%- !I;S
6%6%5 4irewalls
6%6%6 Sandbo&es
6%8 ?ood Safety dvice
Lesson 3# Aac& Ana-1sis
8%, Introduction
8%. (etstat and !ost pplication 4irewalls
8%.%. (etstat
8%.%+ 4irewalls
8%+ *acket Sniffers
8%+%. Sniffing
8%+%+ ;ecoding (etwork Traffic
8%+%2 Sniffing Other Computers
8%+%- Intrusion ;etection Systems
8%2 !oneypots and !oneynets
8%2%. Types of !oneypots
8%2%+ 0uilding a !oneypot
Lesson 4# Di$ia- Forensics
9%, Introduction
9%. 4orensic *rincipals
9%.%, Introduction
9%.%. void Contaminiation
9%.%+ ct Methodically
9%.%2 Chain of Evidence
9%.%- Conclusion
9%+ Stand#alone 4orensics
9%+%, Introduction
9%+%. !ard ;rive and Storage Media 0asics
9%+%+ Encryption$ ;ecryption and 4ile 4ormats
9%+%2 4inding a (eedle in a !aystack
9%+%2%. find
9%+%2%+ grep
9%+%2%2 strings
9%+%2%- awk
9%+%2%5 The *ipe ABC
9%+%- Making use of other sources
9%2 (etwork 4orensics
9%2%, Introduction
9%2%. 4irewall 'ogs
0
COMPLETE TABLE OF CONTENTS AND GLOSSARY
9%2%+ Mail !eaders
Lesson 5# Emai- Sec(ri1
D%, Introduction
D%. !ow E#mail 7orks
D%.%. E#mail ccounts
D%.%+ *O* and SMT*
D%.%2 7eb Mail
D%+ Safe E#mail Esage *art .: /eceiving
D%+%. Spam$ *hishing and 4raud
D%+%+ !TM' E#Mail
D%+%2 ttachment Security
D%+%- 4orged headers
D%2 Safe E#mail Esage *art +: Sending
D%2%. ;igital Certificates
D%2%+ ;igital Signatures
D%2%2 ?etting a certificate
D%2%- Encryption
D%2%5 !ow does it workF
D%2%6 ;ecryption
D%2%8 Is Encryption EnbreakableF
D%- Connection Security
Lesson "6# *e7 Sec(ri1
.,%. 4undamentals of 7eb Security
.,%.%. !ow the web really works
.,%.%+ /attling the 'ocks
.,%.%2 'ooking through Tinted 7indows # SS'
.,%.%- !aving someone else do it for you > *ro&ies
.,%+ 7eb @ulnerabilities
.,%+%. Scripting 'anguages
.,%+%+ Top Ten Most Critical 7eb pplication @ulnerabilities
.,%+%2 Security ?uidelines for 0uilding Secure 7eb pplications
.,%2 !TM' 0asics > brief introduction
.,%2%. /eading !TM'
.,%2%+ @iewing !TM' at its Source
.,%2%2 'inks
.,%2%- *ro&y methods for 7eb pplication Manipulation
.,%- *rotecting your server
.,%-%. 4irewall
.,%-%+ Intrusion ;etection System <I;S=
.,%5 Secure Communications
.,%5%. *rivacy and Confidentiality
.,%5%+ Gnowing if you are communicating securely
.,%6 Methods of @erification
.,%6%. OSSTMM
.,%6%+ O7S*
2
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Lesson ""# Pass+or's
..%, Introduction
..%. Types of *asswords
..%.%. Strings of Characters
..%.%+ Strings of Characters plus a token
..%.%2 0iometric *asswords
..%+ !istory of *asswords
..%2 0uild a Strong *assword
..%- *assword Encryption
..%5 *assword Cracking <*assword /ecovery=
..%6 *rotection from *assword Cracking
Lesson "!# Le$a-iies an' E8ics
.+%.% Introduction
.+%+% 4oreign crimes versus local rights
.+%2% Crimes related to the TICs
.+%-% *revention of Crimes and Technologies of double use
.+%-%.% The global systems of monitoring: concept HCOMI(TH
.+%-%+% HEC!E'O(H System
.+%-%2% The HC/(I@O/EH system
.+%5% Ethical !acking
.+%6% The ., most common internet frauds
3
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Glossary
Fin' more com9(er erm 'efiniions a +++:+e7o9e'ia:com; +8ic8 9ro/i'e'
man1 of 8e 'efiniions re9ro'(ce' 8ere:
Anon1mo(s FTP > method by which computer files are made available for downloading by
the general public
a+& > programming language designed for working with strings%
7ac&'oors > n undocumented way of gaining access to a program$ online service or an
entire computer system%
Ba(' > bits per second$ used to describe the rate at which computers e&change information%
BIOS > basic input)output system% The built#in software that determines what a computer can
do without accessing programs from a disk% On *Cs$ the 0IOS contains all the code re:uired
to control the keyboard$ display screen$ disk drives$ serial communications$ and a number of
miscellaneous functions% The 0IOS is typically placed in a /OM chip that comes with the
computer%
7-o$ <weblogs= > 7eb page that serves as a publicly accessible personal "ournal for an
individual%
Boo-ean -o$ic > 0oolean logic is a form of algebra in which all values are reduced to either
T/EE or 4'SE% 0oolean logic is especially important for computer science because it fits nicely
with the binary numbering system$ in which each bit has a value of either . or ,% nother way
of looking at it is that each bit has a value of either T/EE or 4'SE%
Boo secor > The first sector of the hard disk where the master boot records resides$ which is a
small program that is e&ecuted when a computer boots up%
cac8e > *ronounced cash$ a special high#speed storage mechanism% It can be either a
reserved section of main memory or an independent high#speed storage device% Two types
of caching are commonly used in personal computers: memory caching and disk caching%
C-ien > a program on a local computer that is used to e&change data with a remote
computer$ see server%
c-(ser < a--ocaion (ni > group of disk sectors% The operating system assigns a uni:ue
number to each cluster and then keeps track of files according to which clusters they use
coo&ies > message given to a 7eb browser by a 7eb server% The browser stores the
message in a te&t file% The message is then sent back to the server each time the browser
re:uests a page from the server%
CRC > Cyclical redundancy check%
c1c-ica- re'(n'anc1 c8ec& <C/C= > a common techni:ue for detecting data transmission
errors% Transmitted messages are divided into predetermined lengths that are divided by a
fi&ed divisor% ccording to the calculation$ the remainder number is appended onto and sent
with the message% 7hen the message is received$ the computer recalculates the remainder
and compares it to the transmitted remainder% If the numbers do not match$ an error is
detected%
D%CP > ;ynamic !ost Configuration *rotocol%
4
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Di$ia- S(7scri7er Line <;S'= > technology that allows the simultaneous transmission of voice
and high#speed data using traditional telephone lines%
DNS > ;omain (ame Server%
Domain Name Ser/er <;(S= > service that translates domain names into I* addresses%
'omain names > name that identifies one or more I* addresses% 4or e&le$ the domain
name microsoft%com represents about a do1en I* addresses% ;omain names are used in E/'s
to identify particular 7eb pages% 4or e&le$ in the E/'
http:))www%pcwebopedia%com)inde&%html$ the domain name is pcwebopedia%com%
Every domain name has a suffi& that indicates which top level domain <T';= it belongs to%
There are only a limited number of such domains% 4or e&le:
%gov # ?overnment agencies
%edu # Educational institutions
%org # Organi1ations <nonprofit=
%com # Commercial 0usiness
%net # (etwork organi1ations
0ecause the Internet is based on I* addresses$ not domain names$ every 7eb server re:uires
a ;omain (ame System <;(S= server to translate domain names into I* addresses%
DSL > ;igital Subscriber 'ine%
D1namic %os Confi$(raion Prooco- <;!C*= > protocol used to allow for the dynamic
configuration of networks%
E=mai- > service with allows for the transmission of simple messages across networks%
e8erea- > a packet sniffer that records traffic on your computer%
e8erne > local#area network <'(= architecture developed by Iero& Corporation in
cooperation with ;EC and Intel in .D86% It is one of the most widely implemented '(
standards%
fi-e si$na(re > Small 6#byte signature at the start of the file which identifies what kind of file it
is%
fi-e ransfer 9rooco- <4T*= > Esed to allow local computers to download files from remote
computers%
fi-ere' >9ors? > ports for which a firewall e&amines the header of a packet that is directed to
that port and determines whether or not to let it through <see open ports=%
fire+a-- > system designed to prevent unauthori1ed access to or from a private network%
4irewalls can be implemented in both hardware and software$ or a combination of both%
for(ms > n online discussion group% Online services and bulletin board services <00SJs= provide
a variety of forums$ in which participants with common interests can e&change open
messages
FTP > 4ile transfer protocol%
GC%@ > ?overnment Communications !ead:uarters$ is an intelligence and security
organi1ation in the EG%
5
COMPLETE TABLE OF CONTENTS AND GLOSSARY
$re9 > Short for global#regular#e&pression#print$ a E(II utility that allows the user to search one
or more files for a specific string of te&t and outputs all the lines that contain the string% The
user also has the option to replace the string with another%
%IDS > a host based intrusion detection% n intrusion detection system%
8one19o > n Internet#attached server that acts as a decoy$ luring in potential hackers in
order to study their activities and monitor how they are able to break into a system%
89 > hyperte&t transfer protocol
8(7 > common connection point for devices in a network% !ubs are commonly used to
connect segments of a '(%
%19ere) > a method of organi1ing and presenting data that allows the user to easily move
between related items%
819ere) ransfer 9rooco- <http= > The underlying protocol used by the 7orld 7ide 7eb$
!TT* defines how messages are formatted and transmitted$ and what actions 7eb servers
and browsers should take in response to various commands%
IANA > Internet ssigned (umbers uthority%
ICMP > Internet Control Message *rotocol%
IM > Instant messaging%
Insan messa$in$ <IM= > a type of communications service that enables you to create a kind
of private chat room with another individual in order to communicate in real time over the
Internet$ analogous to a telephone conversation but using te&t#based$ not voice#based$
communication%
inerfaces > boundary across which two independent systems meet and act on or
communicate with each other%
Inerne Assi$ne' N(m7ers A(8ori1 <I(= > n organi1ation working under the auspices of
the Internet rchitecture 0oard <I0= that is responsible for assigning new Internet#wide I*
addresses%
Inerne Conro- Messa$e Prooco- <ICM*= > n e&tension to the Internet *rotocol <I*= defined
by /4C 8D+% ICM* supports packets containing error$ control$ and informational messages% The
*I(? command$ for e&le$ uses ICM* to test an Internet connection%
inerne 9rooco- <I*= > I* specifies the format of packets$ also called datagrams$ and the
addressing scheme% Most networks combine I* with a higher#level protocol called
Transmission Control *rotocol <TC*=$ which establishes a virtual connection between a
destination and a source%
Inerne Re-a1 C8a <I/C= > service which allows for real#time$ te&t#based communication
between Internet users%
Inerne Ser/ice Pro/i'er <IS*= > company which provides users with access to the Internet
IP > Internet protocol%
IP a''ress > n identifier for a computer in the internet or on a TC*)I* network% The format of
an I* address is a 2+#bit numeric address written as four numbers separated by periods% Each
number can be 1ero to +55% 4or e&le$ 6.%.6,%.,%+-, could be an I* address%
i9confi$ > Tool to display information on the active interfaces on a computer%
IRC > Internet /elay Chat%
"6
COMPLETE TABLE OF CONTENTS AND GLOSSARY
ISP > Internet Service *rovider$ a company which provides users with access to the Internet
-o$ic7om7s > code designed to e&ecute when a specific activity occurs on a network or
computer%
-oo97ac& > when a computer refers to itself% 'oopback address is a special I* number
<.+8%,%,%.= that is designated for the software loopback interface of a machine% The loopback
interface has no hardware associated with it$ and it is not physically connected to a network%
MAC > Media access control %
MD0 8as8 > n algorithm used to create digital signatures% It is intended for use with 2+ bit
machines and is safer than the M;- algorithm$ which has been broken% M;5 is a one#way
hash function$ meaning that it takes a message and converts it into a fi&ed string of digits$ also
called a message digest%
me'ia access conro- <MC= > hardware address that uni:uely identifies each node of a
network%
Mo'em > Modulator);emodulator$ a device which translates digital signals into analog
signals$ and analog signals back into digital signals$ allowing computers to communicate with
each other through analog telephone lines%
MS=DOS <Microsoft ;isk Operating System= > MS#;OS is an Operating System% Mainly it allows
the communication between users and *C hardware$ and it also manages available
resources$ such as memory and C*E usage%
nesa > command which displays the status of a network%
ne+or& inr(sion 'eecion <(I;S= > Intrusion detection system in which the individual packets
flowing through a network are analy1ed%
ne+s$ro(9s > Same as forum$ an on#line discussion group%
NIDS > (etwork intrusion detection%
nma9 > a program which conducts a probe of your computer for open ports%
NSA > The (ational Security gency is the Enited StatesJ cryptologic organi1ation% It
coordinates$ directs$ and performs highly speciali1ed activities to protect ES information
systems and produce foreign intelligence information%
o9en >9ors? > ports for which all packets that is directed to that port are allowed through <see
filtered ports=%
o9erain$ s1sem > The underlying program that runs on a computer% Every general#purpose
computer must have an operating system to run other programs% Operating systems perform
basic tasks$ such as recogni1ing input from the keyboard$ sending output to the display
screen$ keeping track of files and directories on the disk$ and controlling peripheral devices
such as disk drives and printers% Some Operating Systems are 7indows$ 'inu& and E(II%
P!P > *eer#to#peer%
9ac&e sniffer > program and)or device that monitors data traveling over a network%
9ac&es > piece of a message transmitted over a packet#switching network%
9ass+or' crac&in$ > the process of attempting to determine an unknown password%
9eer=o=9eer <*+*= > a type of network in which each workstation has e:uivalent capabilities
and responsibilities%
""
COMPLETE TABLE OF CONTENTS AND GLOSSARY
9in$ > utility to determine whether a specific I* address is accessible% It works by sending a
packet to the specified address and waiting for a reply%
P-ain O-' Te-e98one Ser/ice <*OTS= > Esed to describe basic$ old#fashioned telephone service%
POP > *ost Office *rotocol$ a protocol used to retrieve e#mail from a mail server% Most e#mail
applications <sometimes called an e#mail client= use the *O* protocol$ although some can
use the newer IM* <Internet Message ccess *rotocol=%
9ors > n interface on a computer to which you can connect a device% *ersonal computers
have various types of ports% Internally$ there are several ports for connecting disk drives$
display screens$ and keyboards% E&ternally$ personal computers have ports for connecting
modems$ printers$ mice$ and other peripheral devices%
POTS > *lain old telephone service%
999 > *oint#to#*oint *rotocol$ a method of connecting a computer to the Internet% *** is
more stable than the older S'I* protocol and provides error checking features%
9ri/i-e$e' access > privilege to use computer information in some manner% 4or e&le$ a
user might be granted read access to a file$ meaning that the user can read the file but
cannot modify or delete it% Most operating systems have several different types of access
privileges that can be granted or denied to specific users or groups of users%
9rooco- > n agreed#upon format for transmitting data between two devices%
RAM </andom ccess Memory= > a type of computer memory that can be accessed
randomlyK that is$ any byte of memory can be accessed without touching the preceding
bytes%
roo&is > malware that creates a method to retain access to a machine%
ro(er > device that forwards data packets along networks% router is connected to at
least two networks$ commonly two '(s or 7(s or a '( and its IS*Ls network% /outers are
located at gateways$ the places where two or more networks connect% /outers use headers
and forwarding tables to determine the best path for forwarding the packets$ and they use
protocols such as ICM* to communicate with each other and configure the best route
between any two hosts%
ro(in$ a7-e > In internet working$ the process of moving a packet of data from source to
destination% /outing is usually performed by a dedicated device called a router%
san'7o) > security measure in the Mava development environment% The sandbo& is a set of
rules that are used when creating an applet that prevents certain functions when the applet
is sent as part of a 7eb page%
scri9 &i''ie > person who runs hacking tools without knowing how or why they work%
secors > The smallest unit that can be accessed on a disk%
Sec(re S8e-- > protocol designed as a more secure replacement for telnet%
Ser/er > program on a remote computer that is used to provide data to a local computer$
see client%
Ser/ices # (etwork services allow local computers to e&change information with remote
computers%
SMTP > Simple Mail Transfer *rotocol$ a protocol for sending e#mail messages between servers%
Most e#mail systems that send mail over the Internet use SMT*
"!
COMPLETE TABLE OF CONTENTS AND GLOSSARY
socia- en$ineerin$ > The act of obtaining or attempting to obtain otherwise secure data by
conning an individual into revealing secure information%
s91+are > ny software that covertly gathers user information through the userJs Internet
connection without his or her knowledge
SS% > Secure Shell$ a program to log into another computer over a network$ to e&ecute
commands in a remote machine$ and to move files from one machine to another%
s+ic8 > In networks$ a device that filters and forwards packets between '( segments%
TCP > Transmission Control *rotocol% 7hereas the I* protocol deals only with packets$ TC*
enables two hosts to establish a connection and e&change streams of data% TC* guarantees
delivery of data and also guarantees that packets will be delivered in the same order in
which they were sent%
TCP<IP > Transmission Control *rotocol)Internet *rotocol% The suite of communications
protocols used to connect hosts on the Internet%
c9'(m9 > a packet sniffer that records traffic on your computer%
Te-ne > a protocol that allows a local user to connect to a remote computer and access its
resources%
ime7om7s > code designed to e&ecute at a specific time on a network or computer$ for
e&le when the e&piration date is reached on a trial software%
o9o-o$ies > The shape of a local#area network <'(= or other communications system%
racer > utility that traces a packet from your computer to an Internet host$ showing how
many hops the packet re:uires to reach the host and how long each hop takes%
rac&s > ring on a disk where data can be written% typical floppy disk has 9, <double#
density= or .6, <high#density= tracks% 4or hard disks$ each platter is divided into tracks$ and a
single track location that cuts through all platters <and both sides of each platter= is called a
cylinder% !ard disks have many thousands of cylinders%
roAans > destructive program that mas:uerades as a benign application% Enlike viruses$
Tro"ans do not replicate themselves but they can be "ust as destructive%
*e7 Bro+ser > a program that allows users to connect to web servers and view the pages
stored on them%
*e7 Ser/er > computer where web pages are kept to be accessed by other computers%
+e7-o$s <blogs= > 7eb page that serves as a publicly accessible personal "ournal for an
individual%
*8ois > n Internet utility that returns information about a domain name or I* address%
*or-' *i'e *e7 <www=> service for the transmission and presentation of hyperte&t%
+orms > program or algorithm that replicates itself over a computer network and usually
performs malicious actions$ such as using up the computerJs resources and possibly shutting
the system down%
Bine > Small$ often free maga1ine$ usually produced by hobbyists and amateur "ournalists%
",
COMPLETE TABLE OF CONTENTS AND GLOSSARY
LESSON 1
BEING A HACKER
License for Use Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
ll works in the !acker !ighschool pro"ect are provided for non#commercial use with
elementary school students$ "unior high school students$ and high school students whether in a
public institution$ private institution$ or a part of home#schooling% These materials may not be
reproduced for sale in any form% The provision of any class$ course$ training$ or camp with
these materials for which a fee is charged is e&pressly forbidden without a license including
college classes$ university classes$ trade#school classes$ summer or computer camps$ and
similar% To purchase a license$ visit the 'ICE(SE section of the !acker !ighschool web page at
www%hackerhighschool%org)license%
The !!S *ro"ect is a learning tool and as with any learning tool$ the instruction is the influence
of the instructor and not the tool% ISECOM cannot accept responsibility for how any
information herein is applied or abused%
The !!S *ro"ect is an open community effort and if you find value in this pro"ect$ we do ask
you support us through the purchase of a license$ a donation$ or sponsorship%
ll works copyright ISECOM$ +,,-%
2
LESSON 1 BEING A HACKER
Table of Contents
.'icense for /se0 Information%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +
Contributors%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -
1%, Introduction%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 2
1%1 3esources%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 4
1%1%1 5ooks%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 4
1%1%+ Maga6ines and (ewspapers%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 7
1%1%8 9ines and 5logs%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 7
1%1%- :orums and Mailing 'ists%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ;
1%1%2 (ewsgroups%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ;
1%1%4 <ebsites%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% =
1%1%7 Chat%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 1,
1%1%; *+*%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 11
1%+ :urther 'essons%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 11