Search:

Type: Posts; User: J4NK; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    8
    Views
    10,009

    how rude to ask for a password

    Has anybody heard of this site (http://web.tickle.com) and why they blatantly ask for email addresses and PASSWORDS of there users?



    http://web.tickle.com/dog/ I took a screen shot from this...
  2. Replies
    2
    Views
    2,060

    Depositions can be intimidating for grown...

    Depositions can be intimidating for grown individuals let alone a young teenager. Lawyers can use this factor to lead people into answering questions falsely (aka lead questioning).

    I would like...
  3. Replies
    5
    Views
    6,771

    Propitiatory SAP/ADAP modules (Zeus) on IBM...

    Propitiatory SAP/ADAP modules (Zeus) on IBM crypto drives. That is all I can say since different companies use different schemes relating to security.
  4. Replies
    14
    Views
    9,240

    Not true, although some companies will deny any...

    Not true, although some companies will deny any data breaches until faced with the legalities of the situation, most companies will not when faced with media and public relations. This changes when...
  5. Replies
    14
    Views
    9,240

    Great read, One thing I always love is the...

    Great read,

    One thing I always love is the deniability from companies when there might have been a data breach.
  6. Thread: uk bank phish

    by J4NK
    Replies
    3
    Views
    6,100

    In my experience they work in teams with...

    In my experience they work in teams with exploited or preconfigured servers.
    Well 5 a day, not bad but at least you didn't win the MICROSOFT MEGA JACKPOT 18 times today :D




    The name...
  7. Thread: W32/Sober@MM!M681

    by J4NK
    Replies
    21
    Views
    15,832

    I just received 7 emails with W32.Sober.X@mm!zip...

    I just received 7 emails with W32.Sober.X@mm!zip today.

    The content of the message,
  8. Replies
    2
    Views
    5,328

    I just tested this on Yahoo web mail and it does...

    I just tested this on Yahoo web mail and it does work. Then I took it a step further and tried to use a button. I attached a screen shot with the button. I don't have time to mess with the scripting...
  9. Replies
    27
    Views
    8,618

    Don't mess with Texas ...

    Don't mess with Texas

    http://news.yahoo.com/s/ap/20051121/ap_on_hi_te/sony_copy_protection
  10. Replies
    6
    Views
    6,006

    I forgot about this one ...

    I forgot about this one

    http://www.usps.com/postalinspectors/dvdorder.htm

    Free DVDs on all types of fraud and SE related subjects from the USPS.
  11. Replies
    6
    Views
    6,006

    You got a good start but here are some more, ...

    You got a good start but here are some more,

    SE kiddie Forum
    http://www.socialengineering101.com/

    More Tech side of SE
    http://www.isoc.org/isoc/conferences/inet/99/proceedings/3g/3g_2.htm
    ...
  12. Thread: Scam Examples

    by J4NK
    Replies
    62
    Views
    256,004

    This one is interesting, It is an example of an...

    This one is interesting, It is an example of an email that scammers use to entice people to help withdraw the money that they have collected from there targets then wire transfer the funds to the...
  13. Replies
    10
    Views
    11,764

    Thank you all for your replies. I am going to...

    Thank you all for your replies.

    I am going to investigate this further. So far it looks like the program calls a process, which then calls a service, and when explorer has a hiccup it starts an...
  14. Replies
    10
    Views
    11,764

    the_JinX Hi, No problem, System operating...

    the_JinX Hi,

    No problem,

    System operating system is a win xp pro with dos add-on utilities.

    Everything that I have found under internal DOS commands including Windows add-on utilities for XP...
  15. Replies
    10
    Views
    11,764

    Is there any way to kill an unwanted process

    Here is my ?

    I have a machine that won’t allow me to start a prog becuz a process is running. When I look at the process it comes up as PD*** PID 3854 PRI 8 THD 11 HND 229 PRIV 4444.

    I have...
  16. Replies
    8
    Views
    10,055

    As nihil said you use sample or scale models. ...

    As nihil said you use sample or scale models. The only problem we ever came across when testing was a hardware hack of the crypto drives (ATM’s) then it was only local to that drive and machine. ...
Results 1 to 16 of 16