Wired – Cracker launches attack on NASA. – November 23, 1999

Wired – Cracker launches attack on NASA. – November 23, 1999

The Web pages of three US Government agencies, including NASA's Goddard Flight Center, have been defaced by a cracker who is worried that US government security systems are vulnerable to cyberattack. The front pages of the sites for NASA's Goddard Flight Center international page, the Bureau of Land Management's National Training Center, and the Defense Contracts Audit Agency, on Wednesday were replaced with a page showing a cartoon of.....

CNN – Feds leave doors open for hackers. – December 22, 1999

CNN – Feds leave doors open for hackers. – December 22, 1999

(IDG) -- After repeated break-ins through the same door, a shaken business owner likely would get the message and buy a sturdy lock, a big dog or a loud alarm. But many agencies have failed to follow such common sense. Repeated intrusions of federal World Wide Web sites reveal that agencies are not adequately training their IT sentries to take advantage of readily available systems.....

HNN – The story of the great Y2K swindle…. – January 07, 2000

HNN – The story of the great Y2K swindle…. – January 07, 2000

The Setup What do billions of dollars, billions of useless books, and billions of prophetic statements have in common? If you guessed the infamous Y2K rollover, you are probably one of the millions of people who were informed of some global catastrophe set to take place the first of this year. There was not a paper in publication these last few years that didn't mention.....

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dec. 29 (The Dallas Morning News/KRTBN)--While Y2K wary Americans ring in the New Year with champagne and flashlights, computer hackers are set to celebrate with what security experts fear will be an unprecedented assault on computer systems across the globe. The potential assault, as described by hackers and federal law enforcement officials, is likely to include cybermischief as elemental as website defacement or the planting.....

Wired – Smells like Mean Spirit – February 09, 2000

Wired – Smells like Mean Spirit – February 09, 2000

10:50 a.m. 9.Feb.2000 PST Hackers, who pride themselves on Web attacks with a purpose, are scornful of the "packet monkeys" responsible for this week's attacks on Yahoo, CNN, and other high-profile sites. The cracker or crackers responsible for the attacks have been contemptuously dubbed "packet monkeys" because their exploits involve flooding a site with packets of information and, detractors say, betray a distinctly simian intelligence......

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend.....

ICQ Visual Basic

ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampiretranslated from the mirabilis documentation and other. the project lastest well over 6 months -------------- everything else included in this zip file was by theirrespective owners. I just thought it might be nice tobe able to get everything you wanted to know from oneplace, as opposed to the months of hunting the net thatI had to do......

VK_Stealth.bas

VK_Stealth.bas

  'Name: Voltron Kru Stealth Bas 'File: VK_Stealth.bas 'Released: 11-19-99 'Authors: The Voltron Kru 'Originaly Coded: 2-26-99 ' 'Purpose: To hide a program from the alt-ctrl-del menu ' hiding it from the average user while it is ' running. ' 'Disclamer: This is a bas file that I never wanted to ' release. The power of the next few lines has the ' power to.....

Advanced Remote File Explorer v1.20 (Read me)

Advanced Remote File Explorer v1.20 (Read me)

Advanced Remote File Explorer v1.20 (May 30, 2002)

Author: BenWhite@columbus.rr.com

Install:
Simply extract the contents of the zip file into a directory on your web site

Setup:
default.asp
If you plan on viewing this page with ie4 then you need to
change the scroll property in the body tag to “auto”
If using ie5 or above, leave the setting = “no”

dir.asp
strInitDirectory – Set the Home Directory for the explorer
blnDownload – Enable/Disable Downloads (may be slow for large files)
blnHidden – Enable/Disable View of Hidden files/folders
blnIcon – Enable/Disable Dynamic Icon Loading (this sometimes fails due to server connection limitations)
The default connection limit for an unlicensed iis server is 10.
There is no way to defeat that setting,
although you can change this setting to 40 or less and it works,
but that is not widely advertised.

Note:
If you want to avoid possible download abuse.
You should delete the download.asp file.
Remember, blnDownload and blnIcon require this file to work.

Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.