Padillac’s aim bump v1
Remote Aim Away State [Read Me]
Remote Aim Away State: version 0.9.5 By Menace
About:
————-
This program is a Beta version. I made it for myself at college, and found it quite useful.
I don’t really feel like working on it anymore so if anyone wants to add stuff or work
on it I will gladly give you the source code.
Problems, errors, compatability issues, suggestions, help, programming help, and comments:
Email: wacke973@hotmail.com
*** Look for a Final releases as soon as I get some feedback! ***
Requirements:
————-
-Aim 5+
-Tested w/WinXP
-Works w/ DeadAIM!!! (Tabbed and un-tabbed windows)
How to use:
————-
1) Close all open IM windows
2) Have your away message up and do not check “Hide windows while I’m away”
3) Press Start
PPN – Concepts of Echelon by Phonetap – November 07, 1999
The Phone Punx Network Presents
–Phone Punx Magazine–
—-Issue three—-
“We are the phony in telephony”
November 07, 1999
Last Updated: November 07, 1999
http://fly.to/ppn
(Mirror: http://worship.to/ppn)
phonepunx@yahoo.com
Contents
~Intro by Mohawk
~Beginners Guide to the DACS, Part One by BitError
~CallerID: Up close and Personal by hatredonalog
~DATUs – The Tool of the New Age Phreak: Part II by MMX
~Frequency Counters by Black Axe
~An Overview of Trunked Radio Systems by Black Axe
~A different newbie guide by Mohawk
~Notes on ANI by Suess
~Voice Over IP Surveillance with the TTC Fireberd 500 DNA.323 by Seuss
~Concepts of Echelon by Phonetap
~Cyberpunk culture by Mohawk
~Letters
Hackers’ Excellent Adventures
by WILLIAM BASTONE
In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.
But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”
For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.
In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”
One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”
Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.
The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.
MR Tokens
The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don’t), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff.
1 Town Hall
3 Classroom
4 The OGF Commons
5 Writers Workshop
6-8 Classroom
9 Geoworks Chat Room
10 Classroom
11 The Schoolroom
12 Chat Room
13 PC Multimedia
14 The Work Room
15 Educ Technology
16 PC Applications
17 PC Games
18 Questions n Answers
19 PC Graphics
20 The Dungeon
21 Cybersalon
22 Travel Cafe
23 BACKPACKER Chat
1999
Inside Warez Part #2
Subj: Fwd: º^º^( InSide WaReZ Issue #2 (Part 2)^º^º
Date: 97-07-27 15:22:40 EDT
From: SPYER2000
To: BeAwareX1
Forwarded Message:
Subj: º^º^( InSide WaReZ Issue #2 (Part 2)^º^º
Date: 97-07-27 14:36:05 EDT
From: BuBBLe HoP
«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»
«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»
«–¥(This Mail took 17.41797 Seconds to send)¥–»
«–¥(There are 69 out of 73 people on the MM)¥–»
«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»
«–¥(This is Mail Number: 7 of 19 Mails)¥–»
From O0O of AOL-Files
I found this old post from O0O of the old AOL-Files.com site posting this on DigitalGangster.com
Join Date: Apr 2007
Location: NYC
Posts: 1,428
its funny how 12-14 years later people remember things so much differently than what you remember. Many of the names here I haven’t seen since bouncing around the PRs in the late `90s. Many of you remember the “leet” SN jackers/suspenders and the progger types….or guys like Kali that cracked OHs to scroll for hours on end…
I have a very different perspective, I spent most of my time on IRC or in PRs that many in the scene didn’t know about like “leo9” and “atomdrop”.
We had some very smart people in the scene back then, many of them went on to be very successful over the past 12 years….a couple of them I’m glad to still be able to talk to/work with IRL. Some ended up in jail or are dead now. There was a lot of crazy shit going on behind the scenes that kept the scene moving forward, even though there were a couple thousand of us and only some spoke to each other, we were still all tied together through the exploits and programs that a small cadre of really smart dudes figured out and built for others.
TCP\IP: A Mammoth Description
_________________________________________________________________________
TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in
_________________________________________________________________________
TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. A
protocol is basically the commands or instructions using which two computers within a local network or the
Internet can exchange data or information and resources.
Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of the
ARPAnet. It is also known as the Protocol Suite. It consists of various protocols but as the TCP
(Transmission Control Protocol) and the IP (Internet Protocol) are the most, well known of the suite of
protocols, the entire family or suite is called the TCP\IP suite.
The TCP\ IP Suite is a stacked suite with various layers stacked on each other, each layer looking after one
aspect of the data transfer. Data is transferred from one layer to the other. The Entire TCP\ IP suite can be
broken down into the below layers-: