Wired – Cracker launches attack on NASA. – November 23, 1999

Wired – Cracker launches attack on NASA. – November 23, 1999

The Web pages of three US Government agencies, including NASA's Goddard Flight Center, have been defaced by a cracker who is worried that US government security systems are vulnerable to cyberattack. The front pages of the sites for NASA's Goddard Flight Center international page, the Bureau of Land Management's National Training Center, and the Defense Contracts Audit Agency, on Wednesday were replaced with a page showing a cartoon of.....

CNN – Feds leave doors open for hackers. – December 22, 1999

CNN – Feds leave doors open for hackers. – December 22, 1999

(IDG) -- After repeated break-ins through the same door, a shaken business owner likely would get the message and buy a sturdy lock, a big dog or a loud alarm. But many agencies have failed to follow such common sense. Repeated intrusions of federal World Wide Web sites reveal that agencies are not adequately training their IT sentries to take advantage of readily available systems.....

HNN – The story of the great Y2K swindle…. – January 07, 2000

HNN – The story of the great Y2K swindle…. – January 07, 2000

The Setup What do billions of dollars, billions of useless books, and billions of prophetic statements have in common? If you guessed the infamous Y2K rollover, you are probably one of the millions of people who were informed of some global catastrophe set to take place the first of this year. There was not a paper in publication these last few years that didn't mention.....

Wired – Smells like Mean Spirit – February 09, 2000

Wired – Smells like Mean Spirit – February 09, 2000

10:50 a.m. 9.Feb.2000 PST Hackers, who pride themselves on Web attacks with a purpose, are scornful of the "packet monkeys" responsible for this week's attacks on Yahoo, CNN, and other high-profile sites. The cracker or crackers responsible for the attacks have been contemptuously dubbed "packet monkeys" because their exploits involve flooding a site with packets of information and, detractors say, betray a distinctly simian intelligence......

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend.....

Bored

Bored

You ever get sick of the internet anymore? Back in 1998-2003 I could literally just stay online for days. Pulling all nighters was easy. Jolt cola, hackers movie playing on the tube TV behind me. Log into any chat iXa, vb, phishy, cerver, island55, darkside, etc. You never knew what was going to happen that night. Were you getting pws'd? and spending your entire night.....

Updated Invoke Token List

Updated Invoke Token List

There are a TON of duplicates in this….. if you have a shitload of tokens and invokes that arent mixed up and no duplicates then send em to cystic@wirm.net

invokes


32-324       – Brings you to Programmers University

32-301       – Adds another mailbox to your toolz

32-987       – Software upgrade for master aol. (OH)

32-5046     –  chat room stuff

32-2327     – An Easter Egg.  Only 1 of many on AOL

32-2342     – NEA on-line

32-2405     – Test Internet Style Mail

32-2411     – Set your version of AOL

32-25         – DL manager window

32-252       – Create a screen name

32-253       – Create alternate screen name

32-254       – Delete a screen name

Database Hack Takes Gullible By Storm


San Francisco -- Speculations were rampant during the course of the week, as discussion groups, security newsletters and even headlines jumped at what appeared to be another high-profile hack targetting Redmond based software giant, Microsoft. Well, there may have been a hack - but Microsoft wasn't the victim. It began with a trickle of commentary, but by the end of the week, thousands of internet users.....

Exploit Different Screen Name case

Exploit Different Screen Name case

Submitted by Woa "This was an exploit i discovered based off of another exploit, remaking the account in different case over and over, just far enough but not actually activate even though still fully functional online, including sticking the profile. fun times".