This section is not encouraging hacking, cracking and spreading malicious codes:
it is about subjects worth knowing for serious computer users.

The Code of the Geeks
Tips & tricks [ Help file ]
Windows 95 help [ Help file ]
UnixDos help [ Help file ]
A Brief History of Character Codes
Character Encoding
ASCII Character Table
Good ole' ASCII
Braille ASCII Chart
Decimal -Hexadecimal Chart
File Types
Common Terms
Net Glossary
Hacking Lexicon
Telnet Manual
Hytelnet: 1st Directory of Internet Resources
Using Telnet
Hitchhikers guide to the phone system
The Sendmail Tutorial
Using POP3 By Hand
Dial-Up Networking Errors
Detecting Backdoors
IP Denial-of-Service Attacks
Remailer Vulnerabilities
Trojan - Backdoor port numbers
BSRF - Black Sun Research Facility
BSRF Tutorials
MS-DOS 5.00 - 8.00 Undocumented + Hidden Secrets
Computer Boot Sequence
Harddrive Related Terms and Tricks
The Boot Sector
The REAL Multi-boot
PC Hardware
Clues to find a motherboard's manufacturer
Five tips to fix a screen flicker
Unlock the secrets of scanner technology
User desktop to administer Windows from Linux
Register Modfying
Hacker's wisdom
Google: A Hacker's Best Friend
Cracking Tutorial - Part 1
Cracking Tutorial - Part 2
How servers are cracked
The IRC Warfare Tutorial

The Millenium Bug

How to discover, find and use "anonymous" mailservers
Computer Dictionary for Absolute Beginners [ Help file ]
The Hardware Book v0.1 [ Help file ]
The Hardware Book ( WinHelp32 ) [ Help file ]
Glossary [ PFD file - PC Advisor's ]
Windows clustering glossary [ PDF file ]
ASCII chart and other resources
ASCII code and the keyboard
Avoid hacker probing by blocking bad ICMP messages
Netstat made easy
Net Tools
Port scanning unscanned
Sniffers torn apart
Subnet addressing torn apart
Untold Windows tips and secrets
Hacking Windows 9x Part 1
Advanced Windows Hacking
Password cracking decrypted
TCP\IP: a mammoth description
Tracing the traceroute
Defacing Websites Part I : A Step By Step Process
IP Addresses Torn Apart
Routing Principles Torn Apart
IP Spoofing: A Mammoth Description
DoS (Denial of Service) Attacked!!!
SYN flooding torn apart
The Evolution of Cross-Site Scripting Attacks [ PDF file ]
Host discovery with NMAP [ PFD file ]
Hacking from your Web Browser
Google hacks [ PDF file ]
XHTML 1.0 The Extensible HyperText Markup Language
XHTML The Extensible HyperText Markup Language [PDF file]
The C Programming Language Torn Apart
PHP cookbook [ PFD file ]
JavaScript Programming, Objects in JavaScript, an Overview
JavaScript Programming, Objects and Properties
JavaScript Programming, Creating New Objects
Modeling Interaction in Virtual Environments [ PDF file ]
The GNU privacy Handbook [ PFD file ]
Batch File Programming
Multi-booting Solaris and other operating systems [ PDF file ]
Dreamweaver Tutorial [ PDF file ]
Dreamweaver 4 - quick reference for Windows [ PDF file ]
Flash 5 user manual - Part 1 [ PDF file ]
Flash 5 user manual - Part 2 [ PDF file ]
Eudora Email 5.1 - User manual for Windows [ PDF file ]
Photoshop 7 Keyboard Shortcuts [ PDF file ]
Project Management modeling techniques
Optimize Active Directory replication
Worst Nightmares Come Alive