Sounds of America Online
Sounds of America Online

https://youtu.be/iXlcJZXlssE
Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?
Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....
10 Hour Dialup Sound
10 Hour Dialup Sound

https://www.youtube.com/watch?v=MXZx_RiilVI
ICQ Message Sound
ICQ Message Sound

https://www.youtube.com/watch?v=X2UXIaAo12w
Pwned.nl
Pwned.nl

https://youtu.be/-duqMuRLcIE
Flyman2k.bas
Flyman2k.bas

'Maker: FLYMAN 'Programed In: Visual Basic 6.0 Pro 'Compatable For: Visual Basic5,Visual Basic 6 32bit 'AIM Version(s): 2.5-4.0 'My Site: FLYMAN 2000 'Url:http://www.flyman2000.com 'Relase Date: I don't remember,but I have had it for 'a while on my desktop for finnishing 'Api Spy Used: Pat Or Jk 4.0,Mav Spy 4.0. 'Can I Use a sub?: Yes but please give me credit. 'Why a AIM Bas? Well.....
WinShell v5.0

WinShell v5.0 £­ A finished telnet server for windows

Author : janker
Homepage: http://www.janker.org

About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....
Hacker defender v0.7.3

Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....
AOL PPP Information [Doc]

AOL PPP Information PPP Overview Outside the AOL customer base, more than 99% of dial-up users connect to the Internet via PPP. Even though, AOL considers itself a leader in network services, it still rides in the wake of hardware trends set by the ISPs. AOL must adopt its service to synchronous PPP, the greatest common factor of ISDN connection methods. Without this connection facility,.....