Search:

Type: Posts; User: Inferno_x_2001; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    24
    Views
    11,477

    Hey man I like doing little bombs, and i mean,...

    Hey man
    I like doing little bombs, and i mean, im not gonna make bleach plastic explosive, i do enjoy the use of my fingers ;)

    Just the sugar +pot.nitrate smoke bombs, making black powder (even...
  2. Replies
    24
    Views
    11,477

    Anarchists cookbook...

    Hey if anyone has it, preferably version 2000, gimme a buzz at inferno_x_2001@hotmail.com
    I had it til about a week ago when my comp crashed, and since morpheus ****ed up (when they "updated" it 3...
  3. Replies
    2
    Views
    5,206

    You could try turning the firewall off then on...

    You could try turning the firewall off then on again after you're connected. If that doesnt work, try Terr's advice.

    Ive noticed often many connection attempts and the like time out when a...
  4. Replies
    21
    Views
    14,404

    There are literally thousands of trojans, all do...

    There are literally thousands of trojans, all do different things but follow the same principle of giving a person remote access to ur comp. Sub7 is a very good trojan(bad if ur a victim), it has...
  5. Replies
    8
    Views
    23,378

    Think....

    If you can get the last part of their IP, and you know what ISP they use, simply find what the netblock for that isp is, and you have his whole IP address. A netblock is a block of IPs an isp is...
  6. oh ok, thanks for that. Just needed...

    oh ok, thanks for that. Just needed clarification on the subject
  7. Basic question on hacking servers (clarication)

    For a little while now ive been wondering how big name server hacks go down, such as fbi, nasa stuff, even just corporate sites and stuff. How do they actually break in? I hear "Exploit"...
  8. Replies
    30
    Views
    38,399

    One of the things with scripts and stuff is that...

    One of the things with scripts and stuff is that anything a aprogram can do, can be done manually, in most cases that is. Excluding call functions and what not.
  9. Replies
    3
    Views
    5,492

    Yeah, its good here. Ive had an account for a...

    Yeah, its good here.

    Ive had an account for a while and just haven't used it. That's why this is my 5th post, lol.

    One of the best things is you can ask dumb questions without getting flamed...
  10. Replies
    0
    Views
    4,153

    Open UDP ports

    Should i be worried if explorer, and msn messenger are listening on UDP ports? Can i get hacked through these?
  11. Hey I think i know about as much on this subject...

    Hey
    I think i know about as much on this subject as you...

    However, some points. If it's impossible for someone off this board to access these shares, it's not a security risk, unless someone...
  12. Replies
    4
    Views
    6,917

    Thanks for both of them. However, i dont know...

    Thanks for both of them. However, i dont know what programs are using those ports, ill have a look later and see what the programs i usually have open (eg irc, msn, sometimes icq/aol) are using. As...
  13. Replies
    4
    Views
    6,917

    Closing unwanted open ports?

    Hey
    Ive just been portscanning myself, and found many open ports, of which most i dont want open, including my netbios one. i am scannign all ports 1-65000, and its up to around 15000 now. ...
Results 1 to 13 of 13