Libraries

2: America Online System Software 4: General Promotional Graphic 6: Bryan's File Area 7: Try Again Later 9: Player Utilities 10: AD&D House Rules 11: Other TSR Games 12: Gamer Art 13: Stories, Journals, & Logs 15: Errata and Checklists 16: Upld Subject Count Download 17: RPGA Files 18: TSR Upload Center 19: RPGA Tournaments 20: TSR Images 21: Living Campaign Files 22: TSR Download.....
Olaf.Punted.Net
Olaf.Punted.Net

Found an old website from Olaf through Archive.Org a lot of the data is gone but most of the news stories are still available. Website URL:  http://olaf.punted.net Wednesday/July/18/2001 - - puntme  hi mom.   Wednesday/July/18/2001 - now you die. - puntme i updated the funny section, you go now Monday/July/16/2001 - 16496 25366 - puntme hey, i think i updated something.. but its hard to tell anymore. but really ive been surfing the.....
AOL Instant Messenger is hacked

Three 17-year-olds take credit for inserting pornographic images into America Online’s widely used chat service. Users of the latest version of AOL's Instant Messenger (AIM) software started encountering an unpleasant surprise on Saturday morning: At least three crackers -- malicious hackers -- began inserting pornographic images into "AIM Today" and vandalizing content on at least four screens of the chat software. Since last August, users.....
Who is Smokey?
Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember.....
Rajuabju Warez Page
Rajuabju Warez Page

I want to use this page to talk about my experiences with Warez, and with Arise in specific, as well as saying hello to all my "friends" on IRC! The first warez group I was ever a part of was W.A.Y. back in the days of AOL 2.0 and 9600 baud modems. This is when we would distribute Leisure Suit Larry and Kings Quest and.....
The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

NetBus
NetBus

NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor. NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998. It was in wide circulation before Back Orifice was released, in August 1998. The.....
Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?
Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....
Miley Cyrus Hacker Raided by FBI
Miley Cyrus Hacker Raided by FBI

A 19-year-old hacker who published provocative photos of teen queen Miley Cyrus earlier this year was raided by the FBI Monday morning in Murfreesboro, Tennessee.

The hacker, Josh Holly, repeatedly bragged online about breaking into the Disney star’s e-mail account and stealing her photos. He also gave interviews to bloggers and others and boasted that authorities would never find him because he moved so often. [Last month, Holly contacted Threat Level seeking to have an article written about him here.]

But this morning the FBI did find him and, after talking with him for more than an hour about his exploits, served him with a search warrant and a list of items to be seized (which was posted at the hacking site digitalgangster.com after Holly showed it to a friend).

mileycyrus2

 

Comcast.net Hijacker Gets 4 Months
Comcast.net Hijacker Gets 4 Months

A former member of the hacker gang Kryogeniks was sentenced to four months in prison Monday for his role in a 2008 stunt that replaced Comcast’s homepage with a shout-out to other hackers.

James Robert Black Jr., 21,was known as “Defiant” when he and two other hackers hijacked Comcast’s domain name in May of 2008 — a prank that took down the cable giant’s homepage and webmail service for more than five hours, and allegedly cost the company over $128,000.

Visitors to Comcast.net had been redirected to a simple page reading “KRYOGENIKS EBK and DEFIANT RoXed COMCAST sHouTz To VIRUS Warlock elul21 coll1er seven.”

“Mr. Black and his Kryogenicks crew created risks to all of these millions of e-mail customers for the simple sake of boosting their own childish egos,” Assistant United States Attorney Kathryn Warma told the court, according to a press release. “The callous disregard of the dangers posed to others, as well as the arrogance and recklessness displayed by these, and other hackers in committing such crimes should be considered by the Court as a factor that weighs in favor of a significant prison sentence.”