The Anonymity Tutorial

The Anonymity Tutorial

The Anonymity Tutorial / written by yours truly, R a v e N (blacksun.box.sk)<=============================================================================> version 1.5, 22/3/00 Note: whenever you see something like this: blah(1) it means that if you don't understand the meaning of the word blah there's an explanation for it just for you, located on the newbies corner on section 1.Note 2: if you're having a hard time reading this page because.....

How to hack AOL in 21 minutes

How to hack AOL in 21 minutes

Created by pizza this tutorial this made for informational purposes only. any misuse of it is the readers full responsibility. by reading this disclaimer you certify that you have no legs, weigh under 500 pounds, and do not own a computer. if you do not agree to these terms your penis will be removed and a large gorilla will rape you within 3 [working] days......

[.nfo] AirWolf

[.nfo] AirWolf

*----------------------------------------------------------------* | | | Type : Game | | Date : 23.09.2001 | | Company : THQ | | Area : USA/NTSC | | Language : English | | Platform : Dreamcast | | Format : DiscJuggler 3.5xx | | Genre : Fun Sports | | Size : xx * 20 MB | | Supplier : Niwtod | | | *----------------------------------------------------------------* | ---=====<<< Release Notes:.....

PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

HNN – The story of the great Y2K swindle…. – January 07, 2000

HNN – The story of the great Y2K swindle…. – January 07, 2000

The Setup What do billions of dollars, billions of useless books, and billions of prophetic statements have in common? If you guessed the infamous Y2K rollover, you are probably one of the millions of people who were informed of some global catastrophe set to take place the first of this year. There was not a paper in publication these last few years that didn't mention.....

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dec. 29 (The Dallas Morning News/KRTBN)--While Y2K wary Americans ring in the New Year with champagne and flashlights, computer hackers are set to celebrate with what security experts fear will be an unprecedented assault on computer systems across the globe. The potential assault, as described by hackers and federal law enforcement officials, is likely to include cybermischief as elemental as website defacement or the planting.....

Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

Xide.com

Xide.com

  About name: mikehandle: xidebirthdate: 08.30.79age: 21location: columbus, ohiocar: 1992 acura integra click here to view itnationality: greekfavorite color: blue and graydating status: single and accepting applications! so email me!computers: i have a total of 3 right now...1) Sony Vaio 866 mhz pentium III, 40 gig hard drive, 390mb ram, CD-RW, DVD, Voodoo 5 graphics card, NIC. Operating system: litestep2) Sony Vaio 333 mhz pentium.....

MR Tokens


The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don't), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff. 1    Town Hall 3    Classroom 4    The OGF Commons 5    Writers Workshop 6-8  Classroom 9    Geoworks Chat Room 10  .....

TCP\IP: A Mammoth Description


_________________________________________________________________________ TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in_________________________________________________________________________ TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. Aprotocol is basically the commands or instructions using which two computers within a local network or theInternet can exchange data or information and resources. Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of theARPAnet......