AOL Warez Arise Group

http://www.AriseWarez.com
Arise Macro Created by X99
About Arise Warez
A long, long, time ago, hehe, I was in a group called DGG. GaL ran the group and eventually I ran it as well. Unfortunately for me I learned the hard way when a person other then yourself controls the site as well as the bots, well you got problems. GaL decided she wasn’t going to be involed with the group anymore and yanked the site. Well Arise was born that day. I borrowed a botnet and got a T-3 release site. First mistake: using a borrowed botnet. Ok so I got a few bots, Second mistake: Never have anybody but yourself be botmaster. Well eventually I learned bots and the group Arise flourished. One small problem was we were an AOL group but had no AOL presence. Chemical came on board and changed all that. Arise has seen members come and go, usually to see them start there own warez group. Hehe, I see more warez groups that have former Arise members and it amazes me, and I wish them all the BesT. Some say now we’re the best, the only true 0day group left. Well that is a nice complement. Ya know nothing lasts forever, but while its happening I say 0-Day Everyday!!
-Evil, Founder Of Arise
America Online Steps Up Spam Fight By Launching Litigation Offensive Against Spammers
Company Sues Spammers in Series of Lawsuits Spurred by Member-Reported Junk Email
AOL Alleges Defendants Named in Lawsuits Are Responsible for Sending AOL Members One Billion Spam Emails, Resulting in Over 8 Million Member Spam Complaints
Dulles, VA – April 15, 2003 – America Online, Inc. (NYSE: AOL), as part of its ongoing, comprehensive battle against spammers, today announced a sweeping series of lawsuits against individuals and companies that it alleges have repeatedly sent members high volumes of unwanted junk emails using a variety of evasive means to circumvent AOL’s spam filters.
AOL is filing five separate lawsuits against over a dozen companies and individuals, who the Company alleges are together responsible for sending an estimated one billion spam emails to AOL members and generating over 8 million individual spam complaints from members. The latest lawsuits filed by AOL are the first to leverage the complaints received by AOL from its members who are using the popular “Report Spam” button in AOL 8.0.
The defendants named in these lawsuits are alleged to have sent a variety of offensive and unwanted spam emails including: pornography; male organ growth/enlargement products; mortgage and home refinancing offers; college degrees; steroids; cable TV descrambler products; and software products. The kinds of spammers and the type of spamming named in these lawsuits are exactly representative of what AOL members face on a daily basis.
The methods alleged to have been used by the named defendants in these cases to send spam to AOL members include many of the egregious and fraudulent methods used today by spammers, such as: falsification of email addresses; purposefully and systematically evading spam filters set up by AOL and its members; and pursuing other means of spamming members that are prohibited by AOL’s published “Unsolicited Bulk Email Policy” (see www.aol.com).
Because AOL’s proprietary email network is located in Virginia, these lawsuits were filed in the U.S. District Court for the Eastern District of Virginia in Alexandria.
Kids Only Channel Policies [Doc]
The following is a summary of AOL’s “Kids Only Channel Policies.” The AAC is obligated to follow these policies at all times. (from “Document Version 2.32”). All items are direct quotes, commentary is in brackets. The original document is 16 pages long. Grammar and spelling are as found in the original document. This document was prepared bu AAC Coord based on policies in effect in July, 1998.
Introduction
AOL developed The the Kids Only Channel Policies (“Policies”) to ensure a uniform consistent set of standards and practices throughout all programming and advertising areas (Rainman or web-based) targeted to kids children 12 and under on America Online, and particularly including through the Kids Only channel. AOL reserves the right to modify these Policies as necessary. Additionally, AOL expects all Partners to abide by the Children’s Advertising Review Board Unit (“CARU”) guidelines for Interactive Electronic Media (see also http://www.bbb.org/advertising/caruguid.html)
Policy PrincipleObjectivesGoals
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents, addressing primary industry and consumer concerns:
~Providing age appropriate content
~Protecting youth privacy, including protection from online predators
~Creating an age-appropriate marketing environment.
~Create a viable programming and business model for youth-targeted areas and partners on AOL.
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents;
~Create a viable programming and business model for youth targeted channels and partners on AOL.
Program: RA (Remote-Anything)
Program: RA (Remote-Anything)
Editor: TWD Industries
<http://twd-industries.com>
<info@twd-industries.com>
Reference Manual: <http://www.remote-anything.com/archives/ra_manual.pdf>
FAQ: <http://www.remote-anything.com/prod_remote_faq.htm>
PURPOSE
=======
TWD Industries proudly presents Remote-Anything (RA) v3.6.4, the last version of
its Remote-Control Administration Tool which allows to use a distant PC as if
you were there.
ACK Tunneling Trojans
ACK Tunneling Trojans
– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary
Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).
WinShell v5.0
WinShell v5.0 £ A finished telnet server for windows
Author : janker
Homepage: http://www.janker.org
About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:



