Who is Smokey?

Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember.....

AOL Instant Messenger RIP 10/6/2017

AOL Instant Messenger RIP  10/6/2017

It's the end of an online era ... AOL is officially ending AIM. "We’ve made the decision that we will be discontinuing AIM effective December 15, 2017," a rep for the company confirmed. So, say goodbye to your buddy list ... kiss that yellow running man goodbye. So, why is AIM being laid to rest? "AIM tapped into new digital technologies and ignited a cultural.....

RIP Olaf Kevin Miller

RIP Olaf Kevin Miller

"Kevin Montgomery Miller, 30, of Benton, born June 16, 1986; the beloved son of Kevin Dermot and Bobbi Jean Miller, father to Lydia Stout, brother to Andrew Thornberry (Vanessa), Amanda Nix (Chad), Christine Farrukh (Farrukh), Jeanine Miller and Shaun Miller; died suddenly on Saturday, July 30, 2016. He also left behind four nieces, Jennavieve, McKenna, Sofia and Violet; two nephews, Vaughn and Bane and numerous.....

From O0O of AOL-Files


I found this old post from O0O of the old AOL-Files.com site posting this on DigitalGangster.com   Join Date:  Apr 2007Location:  NYCPosts:  1,428   its funny how 12-14 years later people remember things so much differently than what you remember. Many of the names here I haven't seen since bouncing around the PRs in the late `90s. Many of you remember the "leet" SN jackers/suspenders.....

Old Buddy Lists


a1m fear
accuracy
afextz
africanninjas
aim tempy
aimbionet
aimnymike
airtuh ily
almost tipsy
ambidextrism
atb
azz

WinShell v5.0


WinShell v5.0 £­ A finished telnet server for windows

Author : janker
Homepage: http://www.janker.org

About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:

The Hackers Handbook [Read Me]


T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Miley Cyrus Hacker Raided by FBI

Miley Cyrus Hacker Raided by FBI

A 19-year-old hacker who published provocative photos of teen queen Miley Cyrus earlier this year was raided by the FBI Monday morning in Murfreesboro, Tennessee.

The hacker, Josh Holly, repeatedly bragged online about breaking into the Disney star’s e-mail account and stealing her photos. He also gave interviews to bloggers and others and boasted that authorities would never find him because he moved so often. [Last month, Holly contacted Threat Level seeking to have an article written about him here.]

But this morning the FBI did find him and, after talking with him for more than an hour about his exploits, served him with a search warrant and a list of items to be seized (which was posted at the hacking site digitalgangster.com after Holly showed it to a friend).

mileycyrus2