From tws@15250.com Sun May 03 10:09:43 1998
Return-Path: <tws@15250.com>
Delivered-To: bguenter@hal.qcc.sk.ca
Received: (qmail 27049 invoked by alias); 3 May 1998 10:09:43 -0000
Received: (qmail 27042 invoked from network); 3 May 1998 10:09:42 -0000
Received: from linus.vsource.com (root@198.169.201.2)
  by hal.qcc.sk.ca with SMTP; 3 May 1998 10:09:42 -0000
Received: from sirius.univ-mulhouse.fr (sirius.univ-mulhouse.fr [192.93.19.10]) by linus.vsource.com (8.8.7/8.6.9) with ESMTP id EAA19375 for <bguenter@gemprint.com>; Sun, 3 May 1998 04:09:19 -0600
From: tws@15250.com
Received: from sirius.univ-mulhouse.fr by sirius.univ-mulhouse.fr
	  (8.8.7/urec-1.0.2) with SMTP; Sun, 3 May 1998 11:16:22 +0200
Date: Sun, 03 May 98 02:04:02 EST
To: Friend@public.com
Subject: Ever wanted to be a hacker?
Message-ID: <>

Have you ever wandered how people called hackers keep on annoying government agencies and major corporations? Most secure government information is not a secret to these people, no protection guarantees safety against their breaking in. Some people may think that in order to be a hacker one must be extraordinary smart, use expensive equipment and have contacts with the underground world. This is not true.
Recent studies show that a computer user is at least ten percent smarter than an average person. If you are reading this you are smart enough. All the equipment you need is your computer and modem. And try to avoid contacts with the underground world - they are trouble. All you really need is information. For the first time information kept secret both by government and hackers is available to public. Our informational report contains everything you need to know about hacking including: 
*"Hackers 101" - the ultimate and comprehensive step by step guide to how it's done. This incredible guide written by an accomplished hacker especially for beginners will answer following questions: 
-What should you know about hacking and where to start?
-Programs needed.
-List of access numbers.
-How keep yourself safe.
-Cracking programs, what they do and how they work.
-UNIX, an easy approach.
-Password shadowing.
-Dialouts.
-Scanners.
-Brute force hacking.
..and much more.
*Hacker resources on the Internet: The most complete collection of real life hackers websites where you can find:
-programs 
-tools 
-scripts
-most recent know-how and techniques
-news from the world of hacking
-tones of other useful information.
You can receive our report on a floppy in *.txt format (only $7), as a printed material (only $9), or by email in *.txt format/ZIP file (only $7). For domestic orders S&H is free. For orders from Alaska, Hawaii and foreign countries please add $5 for S&H.   
Order now and as a free bonus you will receive a guide to Internet sites with thousands of totally free software titles (limited time only). Send cash, check or money order to TWS, PO Box 1357 Rancho Cordova, CA 95741. For check orders please allow one week for clearance.  
Disclaimer:
Please keep in mind that any information we provide is for educational purposes only. TWS is not responsible for any actions of its clients. 

