Computer Underground
See how you can be a elite hacker back in the mid 1980s with this old gem. At the time it was written, some of the things may have worked. But now it is of great historical interest to hacker historians, and serves little other purpose.