This document discusses hacking Windows NT systems and provides methods for circumventing NT security. It describes using a Linux boot disk to access files on an NT system by loading NTFS support and mounting the NT partitions. This allows viewing and copying files normally protected by NT permissions. The document acknowledges this could enable illegal access but provides the information for educational purposes. It aims to inform hackers that as NT usage grows, understanding how to hack NT is important. The key is that NT is a client/server OS, so commands run on the local computer rather than remotely, and shares must be mapped to access resources on NT servers.