Netcat 1.10


Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....

Hacker defender v0.7.3


Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....

Sub 7 How To & Configuration [Doc]


========================

– Sub 7 2.1.5 –
– coded by mobman –
_ ReaDMe/Tutorial _
– by FuX0reD –
[ http://www.sub7.net ] ========================

Intro:
In this tutorial I, FuX0reD, will try to do as much hand-holding and will
try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for
those people who dont know, or dislike to speak in english). As easy as it
is to figure out, some people still end up screwin up somehow, and infecting
their own asses and end up being 0wned by some other llahmas, so try to
understand these features as well as possible If you have anything to add to
this tutorial or you find something I’ve missed, please email me at
{ fux0red@devil.com }
Everyone’s Favorite Llahma and #SubSeven whore,
– FuX0reD

AOL PPP Information [Doc]


AOL PPP Information PPP Overview Outside the AOL customer base, more than 99% of dial-up users connect to the Internet via PPP. Even though, AOL considers itself a leader in network services, it still rides in the wake of hardware trends set by the ISPs. AOL must adopt its service to synchronous PPP, the greatest common factor of ISDN connection methods. Without this connection facility,.....

Swift Idler [Read Me]


,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,., | Swíft Idlér | '`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`' --------------------------------------------------------------------- ...........+ About +................................................. Swíft Idlér is an Idler (Something that you leave in a chat room- And it sends a line to the chat every minute) Coded By: Swift in- Microsoft Visual Basic 6.0, Enterprise Edition. It uses DOS32 Bas This is also my very First real Chat Idler. I hope you like this. ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' --------------------------------------------------------------------- ...........+ Greetz.....

Momos AOL Anti Idle [Read Me]


Software Information ********************************** name: Momo's AOL Anti-idle version: 2.6 date: February 27, 2001 platform: Windows 95/98/ME/NT/2000 publisher: Cosmic Cat Creations license: Freeware Automatically clicks AOL's idle/timer popup windows so you don't get signed off. It sits in your System Tray and "sleeps" when you aren't using AOL. In version 2.6, I am using a new "keep-alive" technique instead of the old "ping" technique which caused.....

Momentum Idle [Read Me]


momentum idle tools by enertia Programming & Art Design: enertia --------------------- The number 1 person who helped me this most with this prog is cowboy. My first shot out goes to him --------------------- Other shot outs go to: Dynamo Sect knk dos syber TFish Magnus Cripple Delta --------------------------- End of Greets

chronic idle² [Read Me]

chronic idle² [Read Me]

  chronic idle² [ by: xer ] [ chat commands ] .x & sn: ignore's someone .unx & sn: un-ignore's someone .imson: turns ims off .imsoff: turns ims on .adv: advertises the program .adv1: advertises the program .adv2: advertises the program .jk: tells chat you're just kidding .lol: tells chat you're laughing out loud .brb: tells chat you will be right back .kill45: kill's all.....

Integration Fader [Read Me]


integration fader by nokq - readme ok im going to make this as short as possible, just a few hints, err exuse the bad grammer and spelling, this fader was designed to work with aol 4.0, just load and chat, no extra windows to mess with like most other faders. right click on the window to bring up options like disabling the fading ect. keep.....

PAT or JK’s CFader 4.0 [Read Me]


====================================================================== PAT or JK's CFader 4.0 (a html color fader) ====================================================================== Hi, welcome 2 CFader 4.0 (one of the best color faders that there is 2 date - good for designing web pages, e-mails, posts, and talking in AOL4 chat rooms - a LEGAL add-on feature as told from aol's add-on rules txt) This program was made in VB5 (which means your computer has 2.....

Teen Pleads Guilty to Hacking Paris Hilton’s Phone


A Massachusetts teenager has pleaded guilty to hacking into the cell-phone account of hotel heiress and Hollywood celebrity Paris Hilton, a high-profile stunt by the youngest member of the same hacking group federal investigators say was responsible for a series of electronic break-ins at data giant LexisNexis.

The 17-year-old boy was sentenced to 11 months’ detention at a juvenile facility for a string of crimes that include the online posting of revealing photos and celebrity contact numbers from Hilton’s phone. As an adult, he will then undergo two years of supervised release in which he will be barred from possessing or using any computer, cell phone or other electronic equipment capable of accessing the Internet.

The U.S. Attorney’s Office for Massachusetts and the state district court declined to identify the teen, noting that federal juvenile proceedings and the identity of juvenile defendants are under seal. But a law enforcement official close to the case confirmed that the crimes admitted to by the teen included the hacking of Hilton’s account.

The teen also pleaded guilty to making bomb threats at two high schools and for breaking into a telephone company’s computer system to set up free wireless-phone accounts for friends. He also participated in an attack on data-collection firm LexisNexis Group that exposed personal records of more than 300,000 consumers. Prosecutors said victims of the teen’s actions have suffered about $1 million in damages.

In a series of telephone and online communications between March and June with a washingtonpost.com reporter, the teen acknowledged responsibility for all of the crimes for which he was sentenced.

Washingtonpost.com is not revealing his name because he communicated with the reporter on the condition that he not be identified either directly or through his online alias.

Investigators began focusing on the teen in March 2004 when he sent an expletive-laced e-mail to a high school in Florida threatening to blow it up, according to a statement from prosecutors. The school was closed for two days while a bomb squad, a canine team, the fire department and other emergency officials examined the building.

In August 2004, the teen broke into the internal computer systems of “a major internet service provider” by tricking an employee into opening a virus-infected file he sent as an e-mail attachment. The virus — known as a “Trojan horse” program — allowed the juvenile to use the employee’s computer remotely to access other computers on the ISP’s internal network and gain access to portions of the company’s operational information, prosecutors said.

The teen told washingtonpost.com earlier this year that around that time he broke into the network of Dulles, Va.-based America Online. AOL did not return calls seeking comment.

In January, the teen hacked into the telephone records system of T-Mobile International. He used a security flaw in the company’s Web site that allowed him to reset the password of anyone using a Sidekick, a pricey phone-organizer-camera device that stores videos, photos and other data on T-Mobile’s central computer servers. A month later, the teen would use that flaw to gain access to Hilton’s Sidekick files, according to corroborating information and screen shots he shared with washingtonpost.com.

Later that month, according to prosecutors, an associate of the teen “set up accounts for the juvenile at a company which stores identity information concerning millions of individuals.”

Again, prosecutors declined to name the company targeted in that attack. But according to screen shots provided by the teen — supported by other information from the teen that was verified by a senior federal law enforcement official investigating the case who spoke on condition on anonymity — the company was LexisNexis, which reported in March that hackers had gained access to the personal records of more than 310,000 Americans.