ZaksRealm.com

ZaksRealm.com

  AOL: Xakism | Xakism@aol.com AIM: ZAKS E-Mail: p0t@hotmail.com About Name: Zak Handle: Xak - Pronounced as "Zak" Age: 15 Grade: 10th Height: 5' 10" Hair: Brown - Dyed Black Eyes: Brown Pictures: 1 | 2 Sibling: Younger Sister Loves: Nicole! Hobbies: Nicole, Music, Computers, Friends, Movies, Learning To Skateboard, Poetry, Fire, and... Trouble! Best Friends: Nicole, Matt, Shauna, Brian, Tina, Matt, Matt. No specific order... Click Here for shouts. Skills: HTML, JavaScript, PHP,.....

MR Tokens


The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don't), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff. 1    Town Hall 3    Classroom 4    The OGF Commons 5    Writers Workshop 6-8  Classroom 9    Geoworks Chat Room 10  .....

Inside Warez Part 1

Inside Warez Part 1

Subj:      Fwd: º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 15:21:53 EDT

From:     SPYER2000

To:          BeAwareX1

 

 


Forwarded Message:

Subj:      º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 14:35:28 EDT

From:     BuBBLe HoP

 

«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»

«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»

«–¥(This Mail took 33.61719 Seconds to send)¥–»

«–¥(There are 69 out of 73 people on the MM)¥–»

«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»

«–¥(This is Mail Number: 6 of  19 Mails)¥–»

 

Old Buddy Lists


a1m fear
accuracy
afextz
africanninjas
aim tempy
aimbionet
aimnymike
airtuh ily
almost tipsy
ambidextrism
atb
azz

Early Phishing

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?

Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....

Comcast.net Hijacker Gets 4 Months

Comcast.net Hijacker Gets 4 Months

A former member of the hacker gang Kryogeniks was sentenced to four months in prison Monday for his role in a 2008 stunt that replaced Comcast’s homepage with a shout-out to other hackers.

James Robert Black Jr., 21,was known as “Defiant” when he and two other hackers hijacked Comcast’s domain name in May of 2008 — a prank that took down the cable giant’s homepage and webmail service for more than five hours, and allegedly cost the company over $128,000.

Visitors to Comcast.net had been redirected to a simple page reading “KRYOGENIKS EBK and DEFIANT RoXed COMCAST sHouTz To VIRUS Warlock elul21 coll1er seven.”

“Mr. Black and his Kryogenicks crew created risks to all of these millions of e-mail customers for the simple sake of boosting their own childish egos,” Assistant United States Attorney Kathryn Warma told the court, according to a press release. “The callous disregard of the dangers posed to others, as well as the arrogance and recklessness displayed by these, and other hackers in committing such crimes should be considered by the Court as a factor that weighs in favor of a significant prison sentence.”

Philly2600.net

Philly2600.net

2014-10-23 23_09_03-Philadelphia 2600_More Information

The Philadelphia 2600 was set up to gather people with a common intrest to represent a stereotyped culture, share knowledge, and have a good time. Everybody at the meetings has something to teach, no matter how new to computers, and everybody has something to learn, no matter how experienced. We ask everyone to keep an open mind at the meetings because even within our group there is diversity. The Philadelphia 2600 was set up for anybody with any electronic and computer intrest, not just “Hackers”. If you’re a graphic artist, come on down. If you’re a cable repair guy, come on down. If you’re a 10 year old midget with a 2X4 for a leg, come on down. If you’re a police officer or government official, you’re welcome too. As for everyone else, you’ll always find someone who’s willing to teach new members and this is the perfect place to do it.

This site was one of Russell Handorf’s old websites from 2001.  He went by satanklawz.

‘Kryogeniks’ hacker sentenced for Comcast hacking


No PII involved in this one, but since many may remember the case, I thought I’d post the follow-up. James Robert Black, Jr., a.k.a. “Defiant,” was sentenced yesterday in U.S. District Court in Tacoma to four months in prison, four months of electronic home monitoring, 150 hours of community service, three years of supervised release and $128,557 in restitution for conspiring to damage a protected.....