Hacker Game Documentation

File from:  ‎Tuesday, ‎November ‎21, ‎2000, ‏‎7:27:00 PM

**Turn WordWrap ON**
**Forgive the typos**

Hacker Documentation
o.o – Notes From the Author
1.o – Getting Started
1.1 – Loading Hacker
1.2 – Common Errors………***Read this if there are errors!***
1.3 – Story Line
1.4 – Encryption Statement
2.o – How to play
2.1 – HackerHelp Program
2.2 – Hints
3.o – Miscellaneous
3.1 – Skinning Statement
3.2 – Update History
3.3 – Next Update
3.4 – Additional Help
3.5 – Things to come
4.o – Unreal Visions

->->->->->->->->->->->-<-<-<-<-<-<-<-<-<-<-<-
o.o – Notes From the Author [James Tyrrell] Now listen all. I, in no way, endorse hacking. Hacking is a bad thing. It’s a crime actually, punishable by jail time. I don’t know how to hack. I do however, understand how server’s work, and with that knowledge created a computer game that allows people to connect to fake servers. In the game, they are aloud to try to break into them. That is all.

Next… This game is NOT realistic. It’s fun tho. Understand that please before emailing myself or anybody else at Unreal Visions!

Hacker is Freeware. It can be uploaded and distributed ANYWHERE as long as it contains the original unedited files it came with. This includes skins, sounds, documentation, and everything else. I want people to recognize MY skill, not someone elses.

I would like to thank the people that gave me little help. I created this program entirely by myself with only the aid of a few websites that had sound archives. Even that isn’t considered much. The beta testers tested to see if my creation was good, the didn’t actually test it however. Unfortunatly, I was in a lack of testers so this first release of the game may be bad. Again, I just want EVERYONE TO KNOW that I created this with no help from Unreal Visions, friends, or associates. It was hard. It took 3.5 months, but it’s first release is complete and I’m happy with it 😀

You have just entered room “Observers.”
You have just entered room “Observers.”

You have just entered room "Observers."JTM297: yayJTM297: now where were we :xJTM297: Did you guys see that one site..for Interals?JTM297: Internals*nofear: Your new SERA ID will be "aol", lower case, plusyour 6 digit employee ID, (e.g., aol012345). Youwill be required to login using a Passcode.nofear: ThisPasscode consists of a PIN, which you create, andthe 6 digit display on your SecurID key(PIN + SecurID Display = Passcode).JTM297: yeah i know I read the.....
PPN – Concepts of Echelon by Phonetap – November 07, 1999
PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....
ICQ Visual Basic
ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampiretranslated from the mirabilis documentation and other. the project lastest well over 6 months -------------- everything else included in this zip file was by theirrespective owners. I just thought it might be nice tobe able to get everything you wanted to know from oneplace, as opposed to the months of hunting the net thatI had to do......
The AOL Protocol
The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

FPipe v2.1

——————————————————————————
FPipe v2.1 – Port redirector.
Copyright 2000 (c) by Foundstone, Inc.
http://www.foundstone.com
——————————————————————————

FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream
with a source port of your choice. This is useful for getting past firewalls
that allow traffic with source ports of say 23, to connect with internal
servers.

Soft-ICE [Read Me]

Please read the Soft-ICE for Windows 95 documentation for
the latest product information.
1) To install Soft-ICE for Windows 95, run SETUP.EXE and the install wizards
will guide you to completion. Once this is complete, please consult the
‘Starting Soft-ICE for Windows 95’ section of the documentation. Soft-ICE
cannot be run directly from Windows 95, or from a DOS box within Windows 95.

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Early Phishing
Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

farm9

farm9 README.txt for cryptcat
09-22-2000

Thanks for downloading cryptcat

This is a simple modification to netcat to add twofish encryption.
netcat was origianally written by the l0pht (hobbit and weld pond).

The portion of the code written by farm9 is being released as Open Source.

See the file ‘farm9 Public License Agreement.txt’ for info on Open Source licensing.

CIPE-Win32 v2.0

CIPE-Win32 v2.0-pre14 README

——————————————————————–

This package consists of a binary installation and a development
environment of and for CIPE-Win32 v2.0 beta. This document assumes
a working knowledge of CIPE and it’s installation requirements.

 

CIPE-Win32 is a port of Olaf Titz’s CIPE VPN software from Linux
to Windows NT.

 

This software implements a functional node in a CIPE network on
Windows NT4.0 SP3-SP6 and Windows 2000. I don’t know if any DOS-based
Window OS’S will work or Windows XP, others are welcome to attempt
installation.

 

I know this documentation is not “polished”. When the software is
working perfectly, I’ll do a nice HTML help system (unless someone
is willing to start it for me).

 

128 bit Blowfish encryption is supported at the moment. 128 bit IDEA
support is being worked on.