A. Hacking Mainframes
B. Unix Commands
C. DECserver
D. Phreaking
E. Carding
