Word for Windows Password Cracker [Read Me]

Word for Windows Password Cracker (R8)
Copyright by Fauzan Mirza, 1995

This program attempts to recover the password for Word for Windows encrypted
documents.

Usage: WFWCD <DocumentPath>

Soft-ICE [Read Me]

Please read the Soft-ICE for Windows 95 documentation for
the latest product information.
1) To install Soft-ICE for Windows 95, run SETUP.EXE and the install wizards
will guide you to completion. Once this is complete, please consult the
‘Starting Soft-ICE for Windows 95’ section of the documentation. Soft-ICE
cannot be run directly from Windows 95, or from a DOS box within Windows 95.

Mercy [Read Me]

This fine proggy was programmed by JuiCeLeSS…To get it to work you have to
put everything in c:\mercy.

This is only a version 1 beta 2..The program will get much better with later releases.
Remember to check out http://pages.prodigy.com/MI/juiceless/juiceless.html

Put the VBX’s and DL’s in your window system directory. I am pretty sure you guys know how to add a icon to your program group so i won’t even tell yah how.

KeyLog95 [Read Me]

KEYLOG95.EXE is a WINDOWS95 version of keylogwn.exe. It is virtually Identical except

that it records the strokes into a file called c:\win\logx. It is perfect for hacking especially

in newer computers with windows 95 that do not contain a C:\dos directory. The only thing that

one would have to do is create a directory called c:\win.

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

CrackAid V3.39 [Read Me]

May 1993

 

 

CrackAid V3.39

by

Rawhide

of

The Humble Guys – UK’s finest

 

Apologetic New Bedford hacker gets 4-year jail sentence cam0

He goes by the online monikers “cam0,” “Freak,” and “leetjones.” But you might know him as the guy who hacked Burger King’s Twitter account, to claim the fast-food chain was bought by its rival McDonald’s. He is also known as the guy who hacked Paris Hilton’s phone and publicly posted racy photos of the socialite.

On Monday, 25-year-old Cameron Lacroix apologized for his crimes, telling a federal judge that he recognized the seriousness of what he thought was innocuous computer hacking. Lacroix pleaded for mercy as he was about to be sentenced for computer fraud.

“My actions let a lot of people down,” Lacroix told US District Court Senior Judge Mark L. Wolf.

Cracker Jack, THE Unix Password Cracker [Read Me]
Cracker Jack, THE Unix Password Cracker [Read Me]

2014-11-03 22_53_49-JACK14 [Compatibility Mode] - Word (Product Activation Failed)

June 1993        Doc’s for Cracker Jack v 1.4

AoALf [Read Me]

-=-=-=-=-=-=-=-=-=–=-=-=-=–=AoALf 96-=-=-=–=-=-=-=-=–=-=-=-=-=-=-=-=-
Beta 4
blah blah blah blah blah blah blah blah blah blah blah(Breath) blah blah
blah blah blah blah blah blah blah blah blah blah blah blah(Breath) blah blah

Early Phishing
Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.