AOL Prog Passwords

All Passwords Are Case Sensitive. Prog Name Password Acid Burn PiXY RuLEz You! Adidas toolz poiuyt Afterlife Eraser is GoD Agent Orange I Crap On Lamers America Off Line maxuck or ivan is a fairy Anti Mass Mailer bud is blah AoBliss Tosser Welcome to the wonderful world of Bliss AOExtacy BoW 2 MaTT AOExtacy Phisher Matt is king   AOFuck 1."PiXY RuLEZ!" 2."WaNG DanG"…
PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents
–Phone Punx Magazine–
—-Issue three—-
“We are the phony in telephony”
November 07, 1999
Last Updated: November 07, 1999
http://fly.to/ppn
(Mirror: http://worship.to/ppn)
phonepunx@yahoo.com

Contents

~Intro by Mohawk

~Beginners Guide to the DACS, Part One by BitError

~CallerID: Up close and Personal by hatredonalog

~DATUs – The Tool of the New Age Phreak: Part II by MMX

~Frequency Counters by Black Axe

~An Overview of Trunked Radio Systems by Black Axe

~A different newbie guide by Mohawk

~Notes on ANI by Suess

~Voice Over IP Surveillance with the TTC Fireberd 500 DNA.323 by Seuss

~Concepts of Echelon by Phonetap

~Cyberpunk culture by Mohawk

~Letters

MR Tokens

The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don’t), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff.

1    Town Hall

3    Classroom

4    The OGF Commons

5    Writers Workshop

6-8  Classroom

9    Geoworks Chat Room

10   Classroom

11   The Schoolroom

12   Chat Room

13   PC Multimedia

14   The Work Room

15   Educ Technology

16   PC Applications

17   PC Games

18   Questions n Answers

19   PC Graphics

20   The Dungeon

21   Cybersalon

22   Travel Cafe

23   BACKPACKER Chat

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.