Bath Township man wanted ex-girlfriend to know that money has no value to him
By Gina Mace
Special to the Beacon Journal
BATH TWP. – In an effort to prove to his ex-girlfriend that money means nothing, a 20-year-old Granger Road man smashed an SUV and sent another luxury vehicle into a creek, township police said.
A 2-month-old Volkswagen Touareg blaring rock music from the sound system sat in the front yard of Ryan Johnson’s home Monday — severely damaged from smashing through the security gate, uprooting a tree, then being assaulted by golf clubs and boulders. A Mercedes SL500 was parked in Yellow Creek, under the driveway bridge leading to Johnson’s mansion.
The two vehicles were worth more than $100,000, police said.
Johnson told police he did it for his ex-girlfriend. Last week, she asked police to accompany her to the home so she could remove some belongings.
Police were called to Johnson’s home around 3 p.m. Monday by neighbors who thought they heard an explosion.
One neighbor, who asked not to be identified, said he went outside after hearing the noise.
People were running around, making sure everyone was OK,'' the man said.A kid was out there with huge boulders, breaking out windows. He was throwing stones at it. Later he came out with a set of golf clubs and was teeing off on it.”
The “kid,” identified by police as Johnson, was still smashing the SUV when police arrived.
a1m fear
accuracy
afextz
africanninjas
aim tempy
aimbionet
aimnymike
airtuh ily
almost tipsy
ambidextrism
atb
azz
WinShell v5.0 £ A finished telnet server for windows
Author : janker
Homepage: http://www.janker.org
About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:
ACK Tunneling Trojans
– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary
Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).
Stealth Proxy for Windows 95/98/NT/2000
—————————————
OK. Neccesity is the mother of invention and this was something I needed a while back and finally got around to making. Basically, it’s a SOCKS 4/5 proxy server that runs in the background with no obvious signs that it’s doing so. The idea is, if you have access to a machine and want do ‘stuff’ anonymously and don’t trust public ‘anonymous’ proxy servers this might be for you.
Turn Word Wrap On!!!
AppName: Mini Oblivion
Versin: 0.1
Coder: Stan
Group: The Ratpack
Website: http://oblivionrat.cjb.net
–=Disclaimer=–
Serve Cmd
This program is based off of netcat(thanks to Hobbit). This program allows multiple connections while netcat only allows one and is a bit easier to use. Run this program on any NT machine to open a remote shell on any port You can start the program hidden (/h) and also assign it what port to listen on(default is 2323). Type “srvcmd.exe /?” for help. Once the program is listening telnet into the computer on that port and you have a shell(cmd) environment waiting for you. The shell will have the same permissions as the user who started the program. If the shell is started with administrator access, you can do things like add users via the net command:


