Abbot AIM V2.0 bas


'abbot aim v2.0 'by abbot 'www.abbot3000.com '1-2-00 ' 'for aim 2 and up 'completely compatible with 'version 2 through 3.5 (i think) 'only versions i had to test with were '2, 3, and 3.5 ' 'I will probably be releasing another version with more stuff 'In a few days, so be looking for that ' 'shout outs: ' 'Very special thanks to Quirk. I've known.....

GUIDANCE FOR OVERHEAD AND STAFF USERS [Doc]


FEDERATION – GUIDANCE FOR OVERHEAD AND STAFF USERS
————————————————–
July 23 1995
Introduction
~~~~~~~~~~~~
Hi! – and welcome to Federation. This document is intended to provide
guidance for overhead and staff account holders on AOL who are playing
Federation (referred to as OHs in this document).

As an OH playing Federation you are in a privileged position, because
we do not get paid for your usage. Because you are in a position of
privilege, you have obligations to AOL and the Federation team that paying
players do not.

At the moment, we allow any OH to play Fed, but bear in mind that if your
presence in Fed starts to cause us problems then you will be locked out of
the game, and if we get too many problems with OHs we will simply stop all
OHs from playing.

Kids Only Channel Policies [Doc]


The following is a summary of AOL’s “Kids Only Channel Policies.” The AAC is obligated to follow these policies at all times. (from “Document Version 2.32”). All items are direct quotes, commentary is in brackets. The original document is 16 pages long. Grammar and spelling are as found in the original document. This document was prepared bu AAC Coord based on policies in effect in July, 1998.

Introduction

AOL developed The the Kids Only Channel Policies (“Policies”) to ensure a uniform consistent set of standards and practices throughout all programming and advertising areas (Rainman or web-based) targeted to kids children 12 and under on America Online, and particularly including through the Kids Only channel. AOL reserves the right to modify these Policies as necessary. Additionally, AOL expects all Partners to abide by the Children’s Advertising Review Board Unit (“CARU”) guidelines for Interactive Electronic Media (see also http://www.bbb.org/advertising/caruguid.html)

Policy PrincipleObjectivesGoals
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents, addressing primary industry and consumer concerns:
~Providing age appropriate content
~Protecting youth privacy, including protection from online predators
~Creating an age-appropriate marketing environment.
~Create a viable programming and business model for youth-targeted areas and partners on AOL.
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents;
~Create a viable programming and business model for youth targeted channels and partners on AOL.

Program: RA (Remote-Anything)


Program: RA (Remote-Anything)

Editor: TWD Industries
<http://twd-industries.com>
<info@twd-industries.com>

Reference Manual: <http://www.remote-anything.com/archives/ra_manual.pdf>
FAQ: <http://www.remote-anything.com/prod_remote_faq.htm>

PURPOSE
=======

TWD Industries proudly presents Remote-Anything (RA) v3.6.4, the last version of
its Remote-Control Administration Tool which allows to use a distant PC as if
you were there.

ACK Tunneling Trojans


ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

WinShell v5.0


WinShell v5.0 £­ A finished telnet server for windows

Author : janker
Homepage: http://www.janker.org

About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:

farm9


farm9 README.txt for cryptcat
09-22-2000

Thanks for downloading cryptcat

This is a simple modification to netcat to add twofish encryption.
netcat was origianally written by the l0pht (hobbit and weld pond).

The portion of the code written by farm9 is being released as Open Source.

See the file ‘farm9 Public License Agreement.txt’ for info on Open Source licensing.

Netcat 1.10


Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....

sdbot 0.5b


sdbot 0.5b (test release) by [sd] =================================== web site: http://sdbot.n3.net/ e-mail: sdbot@mail.ru sonork id: 100.2600 icq: 21381594 irc: irc.lcirc.net, #sdbot how to edit the source file ----------------------------- extract the files from the zip into a folder, and look for a file called 'sdbot05b.c' (LCC/mingw) or 'sdbot05b.cpp' (MSVC++). these are source files for sdbot. the contents of both files are exactly the same, they are seperate.....

Hacker defender v0.7.3


Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....

Sub 7 How To & Configuration [Doc]


========================

– Sub 7 2.1.5 –
– coded by mobman –
_ ReaDMe/Tutorial _
– by FuX0reD –
[ http://www.sub7.net ] ========================

Intro:
In this tutorial I, FuX0reD, will try to do as much hand-holding and will
try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for
those people who dont know, or dislike to speak in english). As easy as it
is to figure out, some people still end up screwin up somehow, and infecting
their own asses and end up being 0wned by some other llahmas, so try to
understand these features as well as possible If you have anything to add to
this tutorial or you find something I’ve missed, please email me at
{ fux0red@devil.com }
Everyone’s Favorite Llahma and #SubSeven whore,
– FuX0reD