CNN – Feds leave doors open for hackers. – December 22, 1999

CNN – Feds leave doors open for hackers. – December 22, 1999

(IDG) -- After repeated break-ins through the same door, a shaken business owner likely would get the message and buy a sturdy lock, a big dog or a loud alarm. But many agencies have failed to follow such common sense. Repeated intrusions of federal World Wide Web sites reveal that agencies are not adequately training their IT sentries to take advantage of readily available systems.....

HNN – The story of the great Y2K swindle…. – January 07, 2000

HNN – The story of the great Y2K swindle…. – January 07, 2000

The Setup What do billions of dollars, billions of useless books, and billions of prophetic statements have in common? If you guessed the infamous Y2K rollover, you are probably one of the millions of people who were informed of some global catastrophe set to take place the first of this year. There was not a paper in publication these last few years that didn't mention.....

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dec. 29 (The Dallas Morning News/KRTBN)--While Y2K wary Americans ring in the New Year with champagne and flashlights, computer hackers are set to celebrate with what security experts fear will be an unprecedented assault on computer systems across the globe. The potential assault, as described by hackers and federal law enforcement officials, is likely to include cybermischief as elemental as website defacement or the planting.....

Wired – Smells like Mean Spirit – February 09, 2000

Wired – Smells like Mean Spirit – February 09, 2000

10:50 a.m. 9.Feb.2000 PST Hackers, who pride themselves on Web attacks with a purpose, are scornful of the "packet monkeys" responsible for this week's attacks on Yahoo, CNN, and other high-profile sites. The cracker or crackers responsible for the attacks have been contemptuously dubbed "packet monkeys" because their exploits involve flooding a site with packets of information and, detractors say, betray a distinctly simian intelligence......

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend.....

The Gazette – Teen accused of raiding city Web site – May 10, 2000

The Gazette – Teen accused of raiding city Web site – May 10, 2000

A 17-year-old Colorado Springs boy was charged in juvenile court Tuesday with one count each of computer crime and criminal mischief after he broke into the city's Web site in October and replaced it with the message, "i love this city ytcracker 9d9 palmer high." The two felony charges carry a maximum penalty of two years of juvenile detention. The boy, known online as "ytcracker,".....

InternetNews – Hackers Again Strike AOL – June 19, 2000

InternetNews – Hackers Again Strike AOL – June 19, 2000

America Online, Inc. is the latest Net crime victim to have the privacy of some of its 23 million members violated. While the extent of weekend damage is unknown, the knowledge of how to access security holes in America Online's (Quote, Chart) network is spreading quickly through Internet channels. While AOL members are assured at every point of contact that their information is secure from potential maliciousness,.....

ABC News – FAA Computers are Insecure – September 27, 2000

ABC News – FAA Computers are Insecure – September 27, 2000

 The Federal Aviation Administration skips key background checks on workers, leaves open known security holes, doesn’t even use passwords sometimes and has inadequate firewalls, the report says.      The air-traffic control system hasn’t been successfully attacked, but at least one hacker has broken into an FAA e-mail server. And a year after identifying holes in one FAA system, contractors found the agency had not fixed.....

ICQ Visual Basic

ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampiretranslated from the mirabilis documentation and other. the project lastest well over 6 months -------------- everything else included in this zip file was by theirrespective owners. I just thought it might be nice tobe able to get everything you wanted to know from oneplace, as opposed to the months of hunting the net thatI had to do......

Advanced Remote File Explorer v1.20 (Read me)

Advanced Remote File Explorer v1.20 (Read me)

Advanced Remote File Explorer v1.20 (May 30, 2002)

Author: BenWhite@columbus.rr.com

Install:
Simply extract the contents of the zip file into a directory on your web site

Setup:
default.asp
If you plan on viewing this page with ie4 then you need to
change the scroll property in the body tag to “auto”
If using ie5 or above, leave the setting = “no”

dir.asp
strInitDirectory – Set the Home Directory for the explorer
blnDownload – Enable/Disable Downloads (may be slow for large files)
blnHidden – Enable/Disable View of Hidden files/folders
blnIcon – Enable/Disable Dynamic Icon Loading (this sometimes fails due to server connection limitations)
The default connection limit for an unlicensed iis server is 10.
There is no way to defeat that setting,
although you can change this setting to 40 or less and it works,
but that is not widely advertised.

Note:
If you want to avoid possible download abuse.
You should delete the download.asp file.
Remember, blnDownload and blnIcon require this file to work.

AOL Printing in Northern Virginia


PRINTING IN NORTHERN VIRGINA

December 21, 2001

 

ADDING A PRINTER

STEP ONE – Save and close any application you may be running. This way if a problem arises no data    will be lost if you have to shut your pc down and reboot. Know the name of the printer you want to install. All network printers should have a name label on the front.

STEP TWO – Select the print server.

Printer located in:    Your print server is:       Printer located in:                  Your print server is:

CC1 – 1st Floor         \\AOLCC101HP            CC5 – 1st Floor                        \\AOLCC502HP

            2nd Floor       \\AOLCC102HP                        2nd Floor                      \\AOLCC502HP        

CC2 – Basement      \\AOLCC202HP                        3rd Floor                      \\AOLCC504HP