PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

Wired – Cracker launches attack on NASA. – November 23, 1999

Wired – Cracker launches attack on NASA. – November 23, 1999

The Web pages of three US Government agencies, including NASA's Goddard Flight Center, have been defaced by a cracker who is worried that US government security systems are vulnerable to cyberattack. The front pages of the sites for NASA's Goddard Flight Center international page, the Bureau of Land Management's National Training Center, and the Defense Contracts Audit Agency, on Wednesday were replaced with a page showing a cartoon of.....

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dallas Morning News – Hackers Expected to Test Computer Security. – December 29, 1999

Dec. 29 (The Dallas Morning News/KRTBN)--While Y2K wary Americans ring in the New Year with champagne and flashlights, computer hackers are set to celebrate with what security experts fear will be an unprecedented assault on computer systems across the globe. The potential assault, as described by hackers and federal law enforcement officials, is likely to include cybermischief as elemental as website defacement or the planting.....

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend.....

InternetNews – Hackers Again Strike AOL – June 19, 2000

InternetNews – Hackers Again Strike AOL – June 19, 2000

America Online, Inc. is the latest Net crime victim to have the privacy of some of its 23 million members violated. While the extent of weekend damage is unknown, the knowledge of how to access security holes in America Online's (Quote, Chart) network is spreading quickly through Internet channels. While AOL members are assured at every point of contact that their information is secure from potential maliciousness,.....

MasterAOL for AOL 7.0


MasterAOL for AOL 7.0 US GM

sup[z] to: adam, artem, atm, dime, infamous, nec, plex, syg, xom and countless others.

Here it is, the first masteraol (star tool) for aol7. To install just double click on the .exe file (you will need to input the path to your aol7), then copy over the master.tol file into your \america online 7.0\tool\ folder.

Once you sign on you’ll get the master menu, however it’s a really crappy one. To fix this delete 32-487 in the main.idx file using dbview (available at aol-files.com). If you can’t find dbview you could hex the main.idx and rename 32-487 to something else. Once deleted, when you load aol the master menu will be 32-2543, which is also the aol4/5/6 masteraol menu.

Credit goes to Artem for hexing the main install file and the tool file. I should mention that aol added extra security to the aol7 tools (masteraol and vpd), so be careful. I am not aware of any security issues with this, however be careful. In general aol7 is a big pile of spyware so i would stick to aol5 if possible 🙂

All files were scanned with newest version of norton antivirus updated.

-d4rk h4rk3r

Key Logger Visual Basic

Key Logger Visual Basic

This keylogger program logs almost all your keystrokes while running in your background. You won't see its interface. It's useful to monitor what your little brother/sister is doing when you're not here. You can also apply in in your school computers to help monitor malicious activities. The invisible keylogger will create a isp8311.txt file or upload it in C: drive every 20 seconds. As a.....

ICQ Visual Basic

ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampiretranslated from the mirabilis documentation and other. the project lastest well over 6 months -------------- everything else included in this zip file was by theirrespective owners. I just thought it might be nice tobe able to get everything you wanted to know from oneplace, as opposed to the months of hunting the net thatI had to do......

AOL Printing in Northern Virginia


PRINTING IN NORTHERN VIRGINA

December 21, 2001

 

ADDING A PRINTER

STEP ONE – Save and close any application you may be running. This way if a problem arises no data    will be lost if you have to shut your pc down and reboot. Know the name of the printer you want to install. All network printers should have a name label on the front.

STEP TWO – Select the print server.

Printer located in:    Your print server is:       Printer located in:                  Your print server is:

CC1 – 1st Floor         \\AOLCC101HP            CC5 – 1st Floor                        \\AOLCC502HP

            2nd Floor       \\AOLCC102HP                        2nd Floor                      \\AOLCC502HP        

CC2 – Basement      \\AOLCC202HP                        3rd Floor                      \\AOLCC504HP       

Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.