Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999
Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dec. 29 (The Dallas Morning News/KRTBN)--While Y2K wary Americans ring in the New Year with champagne and flashlights, computer hackers are set to celebrate with what security experts fear will be an unprecedented assault on computer systems across the globe. The potential assault, as described by hackers and federal law enforcement officials, is likely to include cybermischief as elemental as website defacement or the planting.....
Wired – Smells like Mean Spirit – February 09, 2000
Wired – Smells like Mean Spirit – February 09, 2000

10:50 a.m. 9.Feb.2000 PST Hackers, who pride themselves on Web attacks with a purpose, are scornful of the "packet monkeys" responsible for this week's attacks on Yahoo, CNN, and other high-profile sites. The cracker or crackers responsible for the attacks have been contemptuously dubbed "packet monkeys" because their exploits involve flooding a site with packets of information and, detractors say, betray a distinctly simian intelligence......
InternetNews – Hackers Again Strike AOL – June 19, 2000
InternetNews – Hackers Again Strike AOL – June 19, 2000

America Online, Inc. is the latest Net crime victim to have the privacy of some of its 23 million members violated. While the extent of weekend damage is unknown, the knowledge of how to access security holes in America Online's (Quote, Chart) network is spreading quickly through Internet channels. While AOL members are assured at every point of contact that their information is secure from potential maliciousness,.....
Key Logger Visual Basic
Key Logger Visual Basic

This keylogger program logs almost all your keystrokes while running in your background. You won't see its interface. It's useful to monitor what your little brother/sister is doing when you're not here. You can also apply in in your school computers to help monitor malicious activities. The invisible keylogger will create a isp8311.txt file or upload it in C: drive every 20 seconds. As a.....
VK_Stealth.bas
VK_Stealth.bas

  'Name: Voltron Kru Stealth Bas 'File: VK_Stealth.bas 'Released: 11-19-99 'Authors: The Voltron Kru 'Originaly Coded: 2-26-99 ' 'Purpose: To hide a program from the alt-ctrl-del menu ' hiding it from the average user while it is ' running. ' 'Disclamer: This is a bas file that I never wanted to ' release. The power of the next few lines has the ' power to.....
The Pothead Idle
The Pothead Idle

Created by o07 Iface by:  midget
Hackers’ Excellent Adventures

by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

Forced Entry
Forced Entry

Created by hotrod. a very nice room buster for aol9.0. Definitly the better of the room busters on this site. the interface is absolutely magnificant. this well coded buster (coded in delphi) has 3 option boxs for public/member/ and private room. and on the right has a list of the categories for the room yuo want to bust. Really nice and organized buster.
Bored
Bored

You ever get sick of the internet anymore? Back in 1998-2003 I could literally just stay online for days. Pulling all nighters was easy. Jolt cola, hackers movie playing on the tube TV behind me. Log into any chat iXa, vb, phishy, cerver, island55, darkside, etc. You never knew what was going to happen that night. Were you getting pws'd? and spending your entire night.....