The Anonymity Tutorial

The Anonymity Tutorial

The Anonymity Tutorial / written by yours truly, R a v e N (blacksun.box.sk)<=============================================================================> version 1.5, 22/3/00 Note: whenever you see something like this: blah(1) it means that if you don't understand the meaning of the word blah there's an explanation for it just for you, located on the newbies corner on section 1.Note 2: if you're having a hard time reading this page because.....

Seaker version 1.23.5

Seaker version 1.23.5

Seaker version 1.23.5written by Corruption http://www.dinc.nu/oonix Corruption@digitchat.net ICQ: 12447053 program in vc++ Requirements: OS: you must be running under, Windows95/98if you are running under a fravor of unix with X-Windows, and would liketo try this software under that system, please contact me and ill compileit under that or if alot of people start asking me for it ill upload itmy site.Ram: 8bit or higherCPU Speed:.....

You have just entered room “Observers.”

You have just entered room “Observers.”

You have just entered room "Observers."JTM297: yayJTM297: now where were we :xJTM297: Did you guys see that one site..for Interals?JTM297: Internals*nofear: Your new SERA ID will be "aol", lower case, plusyour 6 digit employee ID, (e.g., aol012345). Youwill be required to login using a Passcode.nofear: ThisPasscode consists of a PIN, which you create, andthe 6 digit display on your SecurID key(PIN + SecurID Display = Passcode).JTM297: yeah i know I read the.....

The AOL Privacy Policy

The AOL Privacy Policy

The AOL Privacy Policy Here at AOL, we regard our members' privacy as one of our most important values.  We want our members to know how we protect their information and what choices they have about its use.  We believe AOL's Privacy Policy should give members confidence whenever they use AOL -- 24 hours a day, seven days a week, 365 days of the year. .....

Well it’s been awhile

Well it’s been awhile

Wow, it's been awhile since my last rant, 6 years to be exact.  The amount of feedback and submissions I receive from everyone is amazing.  Honestly though I've never thought I'd be writing or having a site dedicated to the old scene I thought it would go on forever.  But yeah 6 years since my last rant god damn.  I remember when you were lucky.....

Warez Group Envy

Warez Group Envy

Huge thanks to Nugem for submitting all these images and documents on the Warez Group Envy. EnvyISO Members Nugem . HaCkZ . PhEaRu . Keegin Butt . BUSTED . Mazin . DrangonZ . Blo0Ba11z . Nut GameZ . Wolfbane . 007 . PCMike . Next . DC . Scooby plantholt . aehbon . Nihilist Envy Greets DeFt0nEz . Eins . GameZ . WoW . Surge.....

[.nfo] Accession

[.nfo] Accession

Carved From Flesh and Blood THE BOOZEN BUDS!! FROM ACC ARE BACK WITH ANOTHER FIRSTIE! +--------------------------------------------------------------------------+ | TITLE : CHUCHU ROCKET . |---------------.----------------------------------------------------------. | PUBLISHER : SEGA | SPEECH : N/A . | BACKUP FORMAT : BIN/CUE | GAME SYSTEM : Sega Dreamcast . | CDS : 1 | SPECIAL : Covers . | SUPPLIER : Team Accession | RELEASE DATE : 10-07-2000 . +----------------------------------^--------------------.....

PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

HNN – The story of the great Y2K swindle…. – January 07, 2000

HNN – The story of the great Y2K swindle…. – January 07, 2000

The Setup What do billions of dollars, billions of useless books, and billions of prophetic statements have in common? If you guessed the infamous Y2K rollover, you are probably one of the millions of people who were informed of some global catastrophe set to take place the first of this year. There was not a paper in publication these last few years that didn't mention.....

Hider.bas

Hider.bas

'This is my first bas for AOL It is for 'AOL 40 it took me a while to make it 'So if you use it put me in the greetz 'of your prog this is the best bas out 'all the functions work any questions 'e-mail hider@hider.com or post on the board at my site 'at http://www.hider.com 'With the additions I added this is like.....

Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.