Toxic Toolz III
Toxic Toolz III

ttintro ToxicToolz III Intro by jj ToM CaT ---------------------------------- Na, wie findet ihr mein erstes (richtiges) intro? <ggg> Hardwarevorraussetzungen (getestet, möglich dasses auch auf langsameren Kisten läuft...) Pentium 200, 16MB RAM, Direct3D-Kompatible Grafikkarte (ACHTUNG: keine 3dfx oder PowerVR...). 600k Festplattenspeicher ...<ggg> Und nochwas: die musik ertönt noch genau 2s bevor es mit dem intro losgeht, das ist wegen Soundkarten, die beim Laden der MIDI-Wavesets Splashscreens.....
MR Tokens

The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don't), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff. 1    Town Hall 3    Classroom 4    The OGF Commons 5    Writers Workshop 6-8  Classroom 9    Geoworks Chat Room 10  .....
Prog Password List

Acid Burn: (one of these) PiXY RuLEz You! or upsidedown or03/17/96

Agent Orange Tosser: I Crap On Lamers ivan is a fairymaxuck

Anti-mass mailer: bud is blah

AoAbortion Tos: Fuck TeRRoR, FAC: KK

AoAbortion FAC: KK

AoAkira: GrEEn DaY

AoAsting: BuBBa , Ugh(AsTiGMaX), John(Prez), AsTiG RuLeZ(member)

AoBliss Tosser: Welcome to the wonderful world of Bliss

AoBomer v1 b1 bot scare: YoUsUck

Aobomer v1 b1 tos: Only TOS LamerZ

AoBomer v1 b2: TOS ALL LAMERZ

AoBomer v1 b3: ALL LAMERZ DIE!

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Apologetic New Bedford hacker gets 4-year jail sentence cam0

He goes by the online monikers “cam0,” “Freak,” and “leetjones.” But you might know him as the guy who hacked Burger King’s Twitter account, to claim the fast-food chain was bought by its rival McDonald’s. He is also known as the guy who hacked Paris Hilton’s phone and publicly posted racy photos of the socialite.

On Monday, 25-year-old Cameron Lacroix apologized for his crimes, telling a federal judge that he recognized the seriousness of what he thought was innocuous computer hacking. Lacroix pleaded for mercy as he was about to be sentenced for computer fraud.

“My actions let a lot of people down,” Lacroix told US District Court Senior Judge Mark L. Wolf.

Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?
Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....
Miley Cyrus Hacker Raided by FBI
Miley Cyrus Hacker Raided by FBI

A 19-year-old hacker who published provocative photos of teen queen Miley Cyrus earlier this year was raided by the FBI Monday morning in Murfreesboro, Tennessee.

The hacker, Josh Holly, repeatedly bragged online about breaking into the Disney star’s e-mail account and stealing her photos. He also gave interviews to bloggers and others and boasted that authorities would never find him because he moved so often. [Last month, Holly contacted Threat Level seeking to have an article written about him here.]

But this morning the FBI did find him and, after talking with him for more than an hour about his exploits, served him with a search warrant and a list of items to be seized (which was posted at the hacking site digitalgangster.com after Holly showed it to a friend).

mileycyrus2

 

AOL Prog Passwords

All Passwords Are Case Sensitive. Prog Name Password Acid Burn PiXY RuLEz You! Adidas toolz poiuyt Afterlife Eraser is GoD Agent Orange I Crap On Lamers America Off Line maxuck or ivan is a fairy Anti Mass Mailer bud is blah AoBliss Tosser Welcome to the wonderful world of Bliss AOExtacy BoW 2 MaTT AOExtacy Phisher Matt is king   AOFuck 1."PiXY RuLEZ!" 2."WaNG DanG".....
GUIDANCE FOR OVERHEAD AND STAFF USERS [Doc]

FEDERATION – GUIDANCE FOR OVERHEAD AND STAFF USERS
————————————————–
July 23 1995
Introduction
~~~~~~~~~~~~
Hi! – and welcome to Federation. This document is intended to provide
guidance for overhead and staff account holders on AOL who are playing
Federation (referred to as OHs in this document).

As an OH playing Federation you are in a privileged position, because
we do not get paid for your usage. Because you are in a position of
privilege, you have obligations to AOL and the Federation team that paying
players do not.

At the moment, we allow any OH to play Fed, but bear in mind that if your
presence in Fed starts to cause us problems then you will be locked out of
the game, and if we get too many problems with OHs we will simply stop all
OHs from playing.

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....