NetBus

NetBus

NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor. NetBus was written in Delphi by Carl-Fredrik Neikter, a Swedish programmer in March 1998. It was in wide circulation before Back Orifice was released, in August 1998. The.....

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?

Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....

Inside-AOL.com

Inside-AOL.com

2014-10-24 00_06_19-Welcome To The Insider.

 

Inside-AOL was started in 1998.intro3

If you have already read the disclaimer and agree with it you may enter here.
 
Some artwork, logos, and information are Copyright 1997, America Online, inc. ALL Information on this site is legal in its original content. This site is legal under U.S. fair use copyright law, which states anyone can use copyrighted materials in criticism, review, or parody. Use of AOL artwork and screen shots are used in the content of criticism of America Online’s service and security. This site does not wish to encourage any illegal activity.
 
Inside-AOL is a private operation, My Internet Service Provider is not responsible for ANYTHING found on this site. If you have questions or comments about Inside-AOL, you must contact the webmaster.
If you Agree, Click to enter Inside-AOL

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

10/18/12 Update: 2006 posting at forum - where Russell Handorf still contributes using his "grey hat hacker" handle "satanklawz" - suggests he has been working for FBI three years earlier than his resume claims; Adrian Lamo admits being "friends" with Handorf but still won't answer any real questions; Chet Uber offers to have Lamo "interview" me - Neal Rauhauser, who claims he has nothing to.....

AOL TOS Violations


TOS E-mail 1 Since this letter has been sent to each of the sub-screen names on your account, you may already have read it. If so, please disregard this copy. America Online has a Terms of Service agreement which provides community guidelines for online conduct. This letter is to inform you that we received a report regarding a violation of those guidelines. In keeping with.....

AOL Warez Arise Group

AOL Warez Arise Group

2014-10-22 13_29_16-1264410_10105281608895370_5920015541346424548_o - Windows Photo Viewer

http://www.AriseWarez.com

Arise Macro Created by X99

glassyabout_arise

 

About Arise Warez

A long, long, time ago, hehe, I was in a group called DGG. GaL ran the group and eventually I ran it as well. Unfortunately for me I learned the hard way when a person other then yourself controls the site as well as the bots, well you got problems. GaL decided she wasn’t going to be involed with the group anymore and yanked the site. Well Arise was born that day. I borrowed a botnet and got a T-3 release site. First mistake: using a borrowed botnet. Ok so I got a few bots, Second mistake: Never have anybody but yourself be botmaster. Well eventually I learned bots and the group Arise flourished. One small problem was we were an AOL group but had no AOL presence. Chemical came on board and changed all that. Arise has seen members come and go, usually to see them start there own warez group. Hehe, I see more warez groups that have former Arise members and it amazes me, and I wish them all the BesT. Some say now we’re the best, the only true 0day group left. Well that is a nice complement. Ya know nothing lasts forever, but while its happening I say 0-Day Everyday!!
-Evil, Founder Of Arise

America Online Steps Up Spam Fight By Launching Litigation Offensive Against Spammers


Company Sues Spammers in Series of Lawsuits Spurred by Member-Reported Junk Email
AOL Alleges Defendants Named in Lawsuits Are Responsible for Sending AOL Members One Billion Spam Emails, Resulting in Over 8 Million Member Spam Complaints

Dulles, VA – April 15, 2003 – America Online, Inc. (NYSE: AOL), as part of its ongoing, comprehensive battle against spammers, today announced a sweeping series of lawsuits against individuals and companies that it alleges have repeatedly sent members high volumes of unwanted junk emails using a variety of evasive means to circumvent AOL’s spam filters.

AOL is filing five separate lawsuits against over a dozen companies and individuals, who the Company alleges are together responsible for sending an estimated one billion spam emails to AOL members and generating over 8 million individual spam complaints from members. The latest lawsuits filed by AOL are the first to leverage the complaints received by AOL from its members who are using the popular “Report Spam” button in AOL 8.0.

The defendants named in these lawsuits are alleged to have sent a variety of offensive and unwanted spam emails including: pornography; male organ growth/enlargement products; mortgage and home refinancing offers; college degrees; steroids; cable TV descrambler products; and software products. The kinds of spammers and the type of spamming named in these lawsuits are exactly representative of what AOL members face on a daily basis.

The methods alleged to have been used by the named defendants in these cases to send spam to AOL members include many of the egregious and fraudulent methods used today by spammers, such as: falsification of email addresses; purposefully and systematically evading spam filters set up by AOL and its members; and pursuing other means of spamming members that are prohibited by AOL’s published “Unsolicited Bulk Email Policy” (see www.aol.com).

Because AOL’s proprietary email network is located in Virginia, these lawsuits were filed in the U.S. District Court for the Eastern District of Virginia in Alexandria.

Netcat 1.10


Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....

sdbot 0.5b


sdbot 0.5b (test release) by [sd] =================================== web site: http://sdbot.n3.net/ e-mail: sdbot@mail.ru sonork id: 100.2600 icq: 21381594 irc: irc.lcirc.net, #sdbot how to edit the source file ----------------------------- extract the files from the zip into a folder, and look for a file called 'sdbot05b.c' (LCC/mingw) or 'sdbot05b.cpp' (MSVC++). these are source files for sdbot. the contents of both files are exactly the same, they are seperate.....

Sub 7 How To & Configuration [Doc]


========================

– Sub 7 2.1.5 –
– coded by mobman –
_ ReaDMe/Tutorial _
– by FuX0reD –
[ http://www.sub7.net ]
========================

Intro:
In this tutorial I, FuX0reD, will try to do as much hand-holding and will
try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for
those people who dont know, or dislike to speak in english). As easy as it
is to figure out, some people still end up screwin up somehow, and infecting
their own asses and end up being 0wned by some other llahmas, so try to
understand these features as well as possible If you have anything to add to
this tutorial or you find something I’ve missed, please email me at
{ fux0red@devil.com }
Everyone’s Favorite Llahma and #SubSeven whore,
– FuX0reD