AOL Prog Passwords
PPN – Concepts of Echelon by Phonetap – November 07, 1999
The Phone Punx Network Presents
–Phone Punx Magazine–
—-Issue three—-
“We are the phony in telephony”
November 07, 1999
Last Updated: November 07, 1999
http://fly.to/ppn
(Mirror: http://worship.to/ppn)
phonepunx@yahoo.com
Contents
~Intro by Mohawk
~Beginners Guide to the DACS, Part One by BitError
~CallerID: Up close and Personal by hatredonalog
~DATUs – The Tool of the New Age Phreak: Part II by MMX
~Frequency Counters by Black Axe
~An Overview of Trunked Radio Systems by Black Axe
~A different newbie guide by Mohawk
~Notes on ANI by Suess
~Voice Over IP Surveillance with the TTC Fireberd 500 DNA.323 by Seuss
~Concepts of Echelon by Phonetap
~Cyberpunk culture by Mohawk
~Letters
MR Tokens
The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don’t), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff.
1 Town Hall
3 Classroom
4 The OGF Commons
5 Writers Workshop
6-8 Classroom
9 Geoworks Chat Room
10 Classroom
11 The Schoolroom
12 Chat Room
13 PC Multimedia
14 The Work Room
15 Educ Technology
16 PC Applications
17 PC Games
18 Questions n Answers
19 PC Graphics
20 The Dungeon
21 Cybersalon
22 Travel Cafe
23 BACKPACKER Chat
Olaf.Punted.Net
The Hackers Handbook [Read Me]
T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall
All rights reserved
First published in Great Britain in 1985 by Century Communications Ltd
Portland House, 12-13 Greek Street, London W1V 5LE.
Exploring Historical & Emerging Phishing Techniques
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23
Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.
You have just entered room pot
Archive from Dennis’s old website: http://ds86.net/
This file was labeled “r0cky.html”
You have just entered room "pot."