Punt Toolz v1.0 [Read Me]
Har0 bas
Morphing
Website: 3char.org
3char was an idea concocted by Kenton and Pacman a few weeks ago while on a phone conference with Mage and some others. Everyone on the conference was saying “3CHAR!” and “I WILL PUNT JOO” in funny voices. I wish I had it recorded. I talked with Pacman about buying the domain and he did. None of the stuff here is real, it’s just funny. It’s meant to be a spoof of “real” AOL news sites like Observers.net, Inside-AOL.com, OpenAOL.com, etc. Enjoy. We should be moving webhosters in the next week or so, so don’t freak out when you get a DNS error.
Comments are welcome:
Pacman – paul@kraproom.com
AIM: pacman
Kenton – kent@kenton.org
AIM: kenton
Viowatch – viowatch@gosh.net
Mage – Mage@all-evil.net
1998
AoMess Read Me
AOMess v3.0 FiNaL! Sept 1995
I now present you with a non-beta, complete MeSS!
Featuring:
– Mass Mail
– Bust In
– Three-line scroller
– Find Mail
– The LynX CD Player
– Mail Bomb
– BombFixer
– Punter
– DriveHell
– AOMESSage
– Da UsuaLs
– Options Saver
– Load AOL
– a clock…… so you can see how long ago you should have
gone to sleep.
Early Phishing
Koceilah Rekouche krekouche@pushstart.info
The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.