RIP Nh2 aka Dave
CNN – Feds leave doors open for hackers. – December 22, 1999
Who is Smokey?
Prog Password List
Acid Burn: (one of these) PiXY RuLEz You! or upsidedown or03/17/96
Agent Orange Tosser: I Crap On Lamers ivan is a fairymaxuck
Anti-mass mailer: bud is blah
AoAbortion Tos: Fuck TeRRoR, FAC: KK
AoAbortion FAC: KK
AoAkira: GrEEn DaY
AoAsting: BuBBa , Ugh(AsTiGMaX), John(Prez), AsTiG RuLeZ(member)
AoBliss Tosser: Welcome to the wonderful world of Bliss
AoBomer v1 b1 bot scare: YoUsUck
Aobomer v1 b1 tos: Only TOS LamerZ
AoBomer v1 b2: TOS ALL LAMERZ
AoBomer v1 b3: ALL LAMERZ DIE!
Old Buddy Lists
a1m fear
accuracy
afextz
africanninjas
aim tempy
aimbionet
aimnymike
airtuh ily
almost tipsy
ambidextrism
atb
azz
Early Phishing
Koceilah Rekouche krekouche@pushstart.info
The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.
Netcat 1.10
Netcat 1.10
===========
Netcat is a simple Unix utility which reads and writes data
across network connections, using TCP or UDP protocol.
It is designed to be a reliable “back-end” tool that can
be used directly or easily driven by other programs and
scripts. At the same time, it is a feature-rich network
debugging and exploration tool, since it can create almost
any kind of connection you would need and has several
interesting built-in capabilities. Netcat, or “nc” as the
actual program is named, should have been supplied long ago
as another one of those cryptic but standard Unix tools.