Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TABLE OF CONTENTS
AND
GLOSSARY
License for Use Informaion
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
ll works in the !acker !ighschool pro"ect are provided for non#commercial use with
elementary school students$ "unior high school students$ and high school students whether in a
public institution$ private institution$ or a part of home#schooling% These materials may not be
reproduced for sale in any form% The provision of any class$ course$ training$ or camp with
these materials for which a fee is charged is e&pressly forbidden without a license including
college classes$ university classes$ trade#school classes$ summer or computer camps$ and
similar% To purchase a license$ visit the 'ICE(SE section of the !acker !ighschool web page at
www%hackerhighschool%org)license%
The !!S *ro"ect is a learning tool and as with any learning tool$ the instruction is the influence
of the instructor and not the tool% ISECOM cannot accept responsibility for how any
information herein is applied or abused%
The !!S *ro"ect is an open community effort and if you find value in this pro"ect$ we do ask
you support us through the purchase of a license$ a donation$ or sponsorship%
ll works copyright ISECOM$ +,,-%
!
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Table of Contents
Lesson "# Bein$ a %ac&er
.%, Introduction
.%. /esources
.%.%. 0ooks
.%.%+ Maga1ines and (ewspapers
.%.%2 3ines and 0logs
.%.%- 4orums and Mailing 'ists
.%.%5 (ewsgroups
.%.%6 7ebsites
.%.%8 Chat
.%.%9 *+*
.%+ 4urther 'essons
Lesson !# Basic Comman's in Lin() an' *in'o+s
+%.% Introduction and Ob"ectives
+%+% /e:uirements and Setup
+%+%. /e:uirements
+%+%+ Setup
+%2% System Operation: 7I(;O7S
+%2%. !ow to open an MS#;OS window
+%2%+ Commands and tools <7indows=
+%-% System Operations: 'inu&
+%-%. !ow to open a console window
+%-%+ Commands and tools <'inu&=
Lesson ,# Pors an' Prooco-s
2%. Introduction
2%+ 0asic concepts of networks
2%+%. ;evices
2%+%+ Topologies
2%2 TC*)I* model
2%2%. Introduction
2%2%+ 'ayers
2%2%+%. pplication
2%2%+%+ Transport
2%2%+%2 Internet
2%2%+%- (etwork ccess
2%2%2 *rotocols
2%2%2%. pplication layer protocols
2%2%2%+ Transport layer *rotocols
2%2%2%2 Internet layer *rotocols
2%2%- I* ddresses
2%2%5 *orts
,
COMPLETE TABLE OF CONTENTS AND GLOSSARY
2%2%6 Encapsulation
Lesson .# Ser/ices an' Connecions
-%, Introduction
-%. Services
-%.%. !TT* and The 7eb
-%.%+ E#Mail > *O* and SMT*
-%.%2 I/C
-%.%- 4T*
-%.%5 Telnet and SS!
-%.%6 ;(S
-%.%8 ;!C*
-%+ Connections
-%+%. IS*s
-%+%+ *lain Old Telephone Service
-%+%2 ;S'
-%+%- Cable Modems
Lesson 0# S1sem I'enificaion
5%, Introduction
5%. Identifying a Server
5%.%. Identifying the Owner of a domain
5%.%+ Identifying the I* address of a domain
5%+ Identifying Services
5%+%. *ing and Trace/oute
5%+%+ 0anner ?rabbing
5%+%2 Identifying Services from *orts and *rotocols
5%2 System 4ingerprinting
5%2%. Scanning /emote Computers
Lesson 2# Ma-+are
6%, Introduction
6%. @iruses <@irii=
6%.%. Introduction
6%.%+ ;escription
6%.%+%. 0oot Sector @iruses
6%.%+%+ The E&ecutable 4ile @irus
6%.%+%2 The Terminate and Stay /esident <TS/= @irus
6%.%+%- The *olymorphic @irus
6%.%+%5 The Macro @irus
6%+ 7orms
6%+%. Introduction
6%+%+ ;escription
6%2 Tro"ans and Spyware
6%2%. Introduction
6%2%+ ;escription
6%- /ootkits and 0ackdoors
6%-%. Introduction
.
COMPLETE TABLE OF CONTENTS AND GLOSSARY
6%-%+ ;escription
6%5 'ogicbombs and Timebombs
6%5%. Introduction
6%5%+ ;escription
6%6 Countermeasures
6%6%. Introduction
6%6%+ nti#@irus
6%6%2 (I;S
6%6%- !I;S
6%6%5 4irewalls
6%6%6 Sandbo&es
6%8 ?ood Safety dvice
Lesson 3# Aac& Ana-1sis
8%, Introduction
8%. (etstat and !ost pplication 4irewalls
8%.%. (etstat
8%.%+ 4irewalls
8%+ *acket Sniffers
8%+%. Sniffing
8%+%+ ;ecoding (etwork Traffic
8%+%2 Sniffing Other Computers
8%+%- Intrusion ;etection Systems
8%2 !oneypots and !oneynets
8%2%. Types of !oneypots
8%2%+ 0uilding a !oneypot
Lesson 4# Di$ia- Forensics
9%, Introduction
9%. 4orensic *rincipals
9%.%, Introduction
9%.%. void Contaminiation
9%.%+ ct Methodically
9%.%2 Chain of Evidence
9%.%- Conclusion
9%+ Stand#alone 4orensics
9%+%, Introduction
9%+%. !ard ;rive and Storage Media 0asics
9%+%+ Encryption$ ;ecryption and 4ile 4ormats
9%+%2 4inding a (eedle in a !aystack
9%+%2%. find
9%+%2%+ grep
9%+%2%2 strings
9%+%2%- awk
9%+%2%5 The *ipe ABC
9%+%- Making use of other sources
9%2 (etwork 4orensics
9%2%, Introduction
9%2%. 4irewall 'ogs
0
COMPLETE TABLE OF CONTENTS AND GLOSSARY
9%2%+ Mail !eaders
Lesson 5# Emai- Sec(ri1
D%, Introduction
D%. !ow E#mail 7orks
D%.%. E#mail ccounts
D%.%+ *O* and SMT*
D%.%2 7eb Mail
D%+ Safe E#mail Esage *art .: /eceiving
D%+%. Spam$ *hishing and 4raud
D%+%+ !TM' E#Mail
D%+%2 ttachment Security
D%+%- 4orged headers
D%2 Safe E#mail Esage *art +: Sending
D%2%. ;igital Certificates
D%2%+ ;igital Signatures
D%2%2 ?etting a certificate
D%2%- Encryption
D%2%5 !ow does it workF
D%2%6 ;ecryption
D%2%8 Is Encryption EnbreakableF
D%- Connection Security
Lesson "6# *e7 Sec(ri1
.,%. 4undamentals of 7eb Security
.,%.%. !ow the web really works
.,%.%+ /attling the 'ocks
.,%.%2 'ooking through Tinted 7indows # SS'
.,%.%- !aving someone else do it for you > *ro&ies
.,%+ 7eb @ulnerabilities
.,%+%. Scripting 'anguages
.,%+%+ Top Ten Most Critical 7eb pplication @ulnerabilities
.,%+%2 Security ?uidelines for 0uilding Secure 7eb pplications
.,%2 !TM' 0asics > brief introduction
.,%2%. /eading !TM'
.,%2%+ @iewing !TM' at its Source
.,%2%2 'inks
.,%2%- *ro&y methods for 7eb pplication Manipulation
.,%- *rotecting your server
.,%-%. 4irewall
.,%-%+ Intrusion ;etection System <I;S=
.,%5 Secure Communications
.,%5%. *rivacy and Confidentiality
.,%5%+ Gnowing if you are communicating securely
.,%6 Methods of @erification
.,%6%. OSSTMM
.,%6%+ O7S*
2
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Lesson ""# Pass+or's
..%, Introduction
..%. Types of *asswords
..%.%. Strings of Characters
..%.%+ Strings of Characters plus a token
..%.%2 0iometric *asswords
..%+ !istory of *asswords
..%2 0uild a Strong *assword
..%- *assword Encryption
..%5 *assword Cracking <*assword /ecovery=
..%6 *rotection from *assword Cracking
Lesson "!# Le$a-iies an' E8ics
.+%.% Introduction
.+%+% 4oreign crimes versus local rights
.+%2% Crimes related to the TICs
.+%-% *revention of Crimes and Technologies of double use
.+%-%.% The global systems of monitoring: concept HCOMI(TH
.+%-%+% HEC!E'O(H System
.+%-%2% The HC/(I@O/EH system
.+%5% Ethical !acking
.+%6% The ., most common internet frauds
3
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Glossary
Fin' more com9(er erm 'efiniions a +++:+e7o9e'ia:com; +8ic8 9ro/i'e'
man1 of 8e 'efiniions re9ro'(ce' 8ere:
Anon1mo(s FTP > method by which computer files are made available for downloading by
the general public
a+& > programming language designed for working with strings%
7ac&'oors > n undocumented way of gaining access to a program$ online service or an
entire computer system%
Ba(' > bits per second$ used to describe the rate at which computers e&change information%
BIOS > basic input)output system% The built#in software that determines what a computer can
do without accessing programs from a disk% On *Cs$ the 0IOS contains all the code re:uired
to control the keyboard$ display screen$ disk drives$ serial communications$ and a number of
miscellaneous functions% The 0IOS is typically placed in a /OM chip that comes with the
computer%
7-o$ <weblogs= > 7eb page that serves as a publicly accessible personal "ournal for an
individual%
Boo-ean -o$ic > 0oolean logic is a form of algebra in which all values are reduced to either
T/EE or 4'SE% 0oolean logic is especially important for computer science because it fits nicely
with the binary numbering system$ in which each bit has a value of either . or ,% nother way
of looking at it is that each bit has a value of either T/EE or 4'SE%
Boo secor > The first sector of the hard disk where the master boot records resides$ which is a
small program that is e&ecuted when a computer boots up%
cac8e > *ronounced cash$ a special high#speed storage mechanism% It can be either a
reserved section of main memory or an independent high#speed storage device% Two types
of caching are commonly used in personal computers: memory caching and disk caching%
C-ien > a program on a local computer that is used to e&change data with a remote
computer$ see server%
c-(ser < a--ocaion (ni > group of disk sectors% The operating system assigns a uni:ue
number to each cluster and then keeps track of files according to which clusters they use
coo&ies > message given to a 7eb browser by a 7eb server% The browser stores the
message in a te&t file% The message is then sent back to the server each time the browser
re:uests a page from the server%
CRC > Cyclical redundancy check%
c1c-ica- re'(n'anc1 c8ec& <C/C= > a common techni:ue for detecting data transmission
errors% Transmitted messages are divided into predetermined lengths that are divided by a
fi&ed divisor% ccording to the calculation$ the remainder number is appended onto and sent
with the message% 7hen the message is received$ the computer recalculates the remainder
and compares it to the transmitted remainder% If the numbers do not match$ an error is
detected%
D%CP > ;ynamic !ost Configuration *rotocol%
4
COMPLETE TABLE OF CONTENTS AND GLOSSARY
Di$ia- S(7scri7er Line <;S'= > technology that allows the simultaneous transmission of voice
and high#speed data using traditional telephone lines%
DNS > ;omain (ame Server%
Domain Name Ser/er <;(S= > service that translates domain names into I* addresses%
'omain names > name that identifies one or more I* addresses% 4or e&le$ the domain
name microsoft%com represents about a do1en I* addresses% ;omain names are used in E/'s
to identify particular 7eb pages% 4or e&le$ in the E/'
http:))www%pcwebopedia%com)inde&%html$ the domain name is pcwebopedia%com%
Every domain name has a suffi& that indicates which top level domain <T';= it belongs to%
There are only a limited number of such domains% 4or e&le:
%gov # ?overnment agencies
%edu # Educational institutions
%org # Organi1ations <nonprofit=
%com # Commercial 0usiness
%net # (etwork organi1ations
0ecause the Internet is based on I* addresses$ not domain names$ every 7eb server re:uires
a ;omain (ame System <;(S= server to translate domain names into I* addresses%
DSL > ;igital Subscriber 'ine%
D1namic %os Confi$(raion Prooco- <;!C*= > protocol used to allow for the dynamic
configuration of networks%
E=mai- > service with allows for the transmission of simple messages across networks%
e8erea- > a packet sniffer that records traffic on your computer%
e8erne > local#area network <'(= architecture developed by Iero& Corporation in
cooperation with ;EC and Intel in .D86% It is one of the most widely implemented '(
standards%
fi-e si$na(re > Small 6#byte signature at the start of the file which identifies what kind of file it
is%
fi-e ransfer 9rooco- <4T*= > Esed to allow local computers to download files from remote
computers%
fi-ere' >9ors? > ports for which a firewall e&amines the header of a packet that is directed to
that port and determines whether or not to let it through <see open ports=%
fire+a-- > system designed to prevent unauthori1ed access to or from a private network%
4irewalls can be implemented in both hardware and software$ or a combination of both%
for(ms > n online discussion group% Online services and bulletin board services <00SJs= provide
a variety of forums$ in which participants with common interests can e&change open
messages
FTP > 4ile transfer protocol%
GC%@ > ?overnment Communications !ead:uarters$ is an intelligence and security
organi1ation in the EG%
5
COMPLETE TABLE OF CONTENTS AND GLOSSARY
$re9 > Short for global#regular#e&pression#print$ a E(II utility that allows the user to search one
or more files for a specific string of te&t and outputs all the lines that contain the string% The
user also has the option to replace the string with another%
%IDS > a host based intrusion detection% n intrusion detection system%
8one19o > n Internet#attached server that acts as a decoy$ luring in potential hackers in
order to study their activities and monitor how they are able to break into a system%
89 > hyperte&t transfer protocol
8(7 > common connection point for devices in a network% !ubs are commonly used to
connect segments of a '(%
%19ere) > a method of organi1ing and presenting data that allows the user to easily move
between related items%
819ere) ransfer 9rooco- <http= > The underlying protocol used by the 7orld 7ide 7eb$
!TT* defines how messages are formatted and transmitted$ and what actions 7eb servers
and browsers should take in response to various commands%
IANA > Internet ssigned (umbers uthority%
ICMP > Internet Control Message *rotocol%
IM > Instant messaging%
Insan messa$in$ <IM= > a type of communications service that enables you to create a kind
of private chat room with another individual in order to communicate in real time over the
Internet$ analogous to a telephone conversation but using te&t#based$ not voice#based$
communication%
inerfaces > boundary across which two independent systems meet and act on or
communicate with each other%
Inerne Assi$ne' N(m7ers A(8ori1 <I(= > n organi1ation working under the auspices of
the Internet rchitecture 0oard <I0= that is responsible for assigning new Internet#wide I*
addresses%
Inerne Conro- Messa$e Prooco- <ICM*= > n e&tension to the Internet *rotocol <I*= defined
by /4C 8D+% ICM* supports packets containing error$ control$ and informational messages% The
*I(? command$ for e&le$ uses ICM* to test an Internet connection%
inerne 9rooco- <I*= > I* specifies the format of packets$ also called datagrams$ and the
addressing scheme% Most networks combine I* with a higher#level protocol called
Transmission Control *rotocol <TC*=$ which establishes a virtual connection between a
destination and a source%
Inerne Re-a1 C8a <I/C= > service which allows for real#time$ te&t#based communication
between Internet users%
Inerne Ser/ice Pro/i'er <IS*= > company which provides users with access to the Internet
IP > Internet protocol%
IP a''ress > n identifier for a computer in the internet or on a TC*)I* network% The format of
an I* address is a 2+#bit numeric address written as four numbers separated by periods% Each
number can be 1ero to +55% 4or e&le$ 6.%.6,%.,%+-, could be an I* address%
i9confi$ > Tool to display information on the active interfaces on a computer%
IRC > Internet /elay Chat%
"6
COMPLETE TABLE OF CONTENTS AND GLOSSARY
ISP > Internet Service *rovider$ a company which provides users with access to the Internet
-o$ic7om7s > code designed to e&ecute when a specific activity occurs on a network or
computer%
-oo97ac& > when a computer refers to itself% 'oopback address is a special I* number
<.+8%,%,%.= that is designated for the software loopback interface of a machine% The loopback
interface has no hardware associated with it$ and it is not physically connected to a network%
MAC > Media access control %
MD0 8as8 > n algorithm used to create digital signatures% It is intended for use with 2+ bit
machines and is safer than the M;- algorithm$ which has been broken% M;5 is a one#way
hash function$ meaning that it takes a message and converts it into a fi&ed string of digits$ also
called a message digest%
me'ia access conro- <MC= > hardware address that uni:uely identifies each node of a
network%
Mo'em > Modulator);emodulator$ a device which translates digital signals into analog
signals$ and analog signals back into digital signals$ allowing computers to communicate with
each other through analog telephone lines%
MS=DOS <Microsoft ;isk Operating System= > MS#;OS is an Operating System% Mainly it allows
the communication between users and *C hardware$ and it also manages available
resources$ such as memory and C*E usage%
nesa > command which displays the status of a network%
ne+or& inr(sion 'eecion <(I;S= > Intrusion detection system in which the individual packets
flowing through a network are analy1ed%
ne+s$ro(9s > Same as forum$ an on#line discussion group%
NIDS > (etwork intrusion detection%
nma9 > a program which conducts a probe of your computer for open ports%
NSA > The (ational Security gency is the Enited StatesJ cryptologic organi1ation% It
coordinates$ directs$ and performs highly speciali1ed activities to protect ES information
systems and produce foreign intelligence information%
o9en >9ors? > ports for which all packets that is directed to that port are allowed through <see
filtered ports=%
o9erain$ s1sem > The underlying program that runs on a computer% Every general#purpose
computer must have an operating system to run other programs% Operating systems perform
basic tasks$ such as recogni1ing input from the keyboard$ sending output to the display
screen$ keeping track of files and directories on the disk$ and controlling peripheral devices
such as disk drives and printers% Some Operating Systems are 7indows$ 'inu& and E(II%
P!P > *eer#to#peer%
9ac&e sniffer > program and)or device that monitors data traveling over a network%
9ac&es > piece of a message transmitted over a packet#switching network%
9ass+or' crac&in$ > the process of attempting to determine an unknown password%
9eer=o=9eer <*+*= > a type of network in which each workstation has e:uivalent capabilities
and responsibilities%
""
COMPLETE TABLE OF CONTENTS AND GLOSSARY
9in$ > utility to determine whether a specific I* address is accessible% It works by sending a
packet to the specified address and waiting for a reply%
P-ain O-' Te-e98one Ser/ice <*OTS= > Esed to describe basic$ old#fashioned telephone service%
POP > *ost Office *rotocol$ a protocol used to retrieve e#mail from a mail server% Most e#mail
applications <sometimes called an e#mail client= use the *O* protocol$ although some can
use the newer IM* <Internet Message ccess *rotocol=%
9ors > n interface on a computer to which you can connect a device% *ersonal computers
have various types of ports% Internally$ there are several ports for connecting disk drives$
display screens$ and keyboards% E&ternally$ personal computers have ports for connecting
modems$ printers$ mice$ and other peripheral devices%
POTS > *lain old telephone service%
999 > *oint#to#*oint *rotocol$ a method of connecting a computer to the Internet% *** is
more stable than the older S'I* protocol and provides error checking features%
9ri/i-e$e' access > privilege to use computer information in some manner% 4or e&le$ a
user might be granted read access to a file$ meaning that the user can read the file but
cannot modify or delete it% Most operating systems have several different types of access
privileges that can be granted or denied to specific users or groups of users%
9rooco- > n agreed#upon format for transmitting data between two devices%
RAM </andom ccess Memory= > a type of computer memory that can be accessed
randomlyK that is$ any byte of memory can be accessed without touching the preceding
bytes%
roo&is > malware that creates a method to retain access to a machine%
ro(er > device that forwards data packets along networks% router is connected to at
least two networks$ commonly two '(s or 7(s or a '( and its IS*Ls network% /outers are
located at gateways$ the places where two or more networks connect% /outers use headers
and forwarding tables to determine the best path for forwarding the packets$ and they use
protocols such as ICM* to communicate with each other and configure the best route
between any two hosts%
ro(in$ a7-e > In internet working$ the process of moving a packet of data from source to
destination% /outing is usually performed by a dedicated device called a router%
san'7o) > security measure in the Mava development environment% The sandbo& is a set of
rules that are used when creating an applet that prevents certain functions when the applet
is sent as part of a 7eb page%
scri9 &i''ie > person who runs hacking tools without knowing how or why they work%
secors > The smallest unit that can be accessed on a disk%
Sec(re S8e-- > protocol designed as a more secure replacement for telnet%
Ser/er > program on a remote computer that is used to provide data to a local computer$
see client%
Ser/ices # (etwork services allow local computers to e&change information with remote
computers%
SMTP > Simple Mail Transfer *rotocol$ a protocol for sending e#mail messages between servers%
Most e#mail systems that send mail over the Internet use SMT*
"!
COMPLETE TABLE OF CONTENTS AND GLOSSARY
socia- en$ineerin$ > The act of obtaining or attempting to obtain otherwise secure data by
conning an individual into revealing secure information%
s91+are > ny software that covertly gathers user information through the userJs Internet
connection without his or her knowledge
SS% > Secure Shell$ a program to log into another computer over a network$ to e&ecute
commands in a remote machine$ and to move files from one machine to another%
s+ic8 > In networks$ a device that filters and forwards packets between '( segments%
TCP > Transmission Control *rotocol% 7hereas the I* protocol deals only with packets$ TC*
enables two hosts to establish a connection and e&change streams of data% TC* guarantees
delivery of data and also guarantees that packets will be delivered in the same order in
which they were sent%
TCP<IP > Transmission Control *rotocol)Internet *rotocol% The suite of communications
protocols used to connect hosts on the Internet%
c9'(m9 > a packet sniffer that records traffic on your computer%
Te-ne > a protocol that allows a local user to connect to a remote computer and access its
resources%
ime7om7s > code designed to e&ecute at a specific time on a network or computer$ for
e&le when the e&piration date is reached on a trial software%
o9o-o$ies > The shape of a local#area network <'(= or other communications system%
racer > utility that traces a packet from your computer to an Internet host$ showing how
many hops the packet re:uires to reach the host and how long each hop takes%
rac&s > ring on a disk where data can be written% typical floppy disk has 9, <double#
density= or .6, <high#density= tracks% 4or hard disks$ each platter is divided into tracks$ and a
single track location that cuts through all platters <and both sides of each platter= is called a
cylinder% !ard disks have many thousands of cylinders%
roAans > destructive program that mas:uerades as a benign application% Enlike viruses$
Tro"ans do not replicate themselves but they can be "ust as destructive%
*e7 Bro+ser > a program that allows users to connect to web servers and view the pages
stored on them%
*e7 Ser/er > computer where web pages are kept to be accessed by other computers%
+e7-o$s <blogs= > 7eb page that serves as a publicly accessible personal "ournal for an
individual%
*8ois > n Internet utility that returns information about a domain name or I* address%
*or-' *i'e *e7 <www=> service for the transmission and presentation of hyperte&t%
+orms > program or algorithm that replicates itself over a computer network and usually
performs malicious actions$ such as using up the computerJs resources and possibly shutting
the system down%
Bine > Small$ often free maga1ine$ usually produced by hobbyists and amateur "ournalists%
",
COMPLETE TABLE OF CONTENTS AND GLOSSARY
LESSON 1
BEING A HACKER
License for Use Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
ll works in the !acker !ighschool pro"ect are provided for non#commercial use with
elementary school students$ "unior high school students$ and high school students whether in a
public institution$ private institution$ or a part of home#schooling% These materials may not be
reproduced for sale in any form% The provision of any class$ course$ training$ or camp with
these materials for which a fee is charged is e&pressly forbidden without a license including
college classes$ university classes$ trade#school classes$ summer or computer camps$ and
similar% To purchase a license$ visit the 'ICE(SE section of the !acker !ighschool web page at
www%hackerhighschool%org)license%
The !!S *ro"ect is a learning tool and as with any learning tool$ the instruction is the influence
of the instructor and not the tool% ISECOM cannot accept responsibility for how any
information herein is applied or abused%
The !!S *ro"ect is an open community effort and if you find value in this pro"ect$ we do ask
you support us through the purchase of a license$ a donation$ or sponsorship%
ll works copyright ISECOM$ +,,-%
2
LESSON 1 BEING A HACKER
Table of Contents
.'icense for /se0 Information%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +
Contributors%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -
1%, Introduction%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 2
1%1 3esources%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 4
1%1%1 5ooks%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 4
1%1%+ Maga6ines and (ewspapers%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 7
1%1%8 9ines and 5logs%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 7
1%1%- :orums and Mailing 'ists%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ;
1%1%2 (ewsgroups%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ;
1%1%4 <ebsites%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% =
1%1%7 Chat%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 1,
1%1%; *+*%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 11
1%+ :urther 'essons%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 11