Type: Posts; User: J4NK; Keyword(s):
Search took 0.01 seconds.
January 30th, 2006, 08:20 PM
Has anybody heard of this site (http://web.tickle.com) and why they blatantly ask for email addresses and PASSWORDS of there users?
http://web.tickle.com/dog/ I took a screen shot from this...
December 31st, 2005, 08:37 AM
Depositions can be intimidating for grown individuals let alone a young teenager. Lawyers can use this factor to lead people into answering questions falsely (aka lead questioning).
I would like...
December 27th, 2005, 06:14 AM
Propitiatory SAP/ADAP modules (Zeus) on IBM crypto drives. That is all I can say since different companies use different schemes relating to security.
December 17th, 2005, 10:59 PM
Not true, although some companies will deny any data breaches until faced with the legalities of the situation, most companies will not when faced with media and public relations. This changes when...
December 16th, 2005, 10:17 PM
One thing I always love is the deniability from companies when there might have been a data breach.
December 7th, 2005, 02:37 AM
In my experience they work in teams with exploited or preconfigured servers.
Well 5 a day, not bad but at least you didn't win the MICROSOFT MEGA JACKPOT 18 times today :D
November 27th, 2005, 05:42 PM
I just received 7 emails with W32.Sober.X@mm!zip today.
The content of the message,
November 24th, 2005, 10:49 AM
I just tested this on Yahoo web mail and it does work. Then I took it a step further and tried to use a button. I attached a screen shot with the button. I don't have time to mess with the scripting...
November 21st, 2005, 07:20 PM
Don't mess with Texas
November 4th, 2005, 10:49 PM
I forgot about this one
Free DVDs on all types of fraud and SE related subjects from the USPS.
November 3rd, 2005, 05:56 PM
You got a good start but here are some more,
SE kiddie Forum
More Tech side of SE
November 1st, 2005, 05:13 PM
This one is interesting, It is an example of an email that scammers use to entice people to help withdraw the money that they have collected from there targets then wire transfer the funds to the...
October 4th, 2005, 08:27 PM
Thank you all for your replies.
I am going to investigate this further. So far it looks like the program calls a process, which then calls a service, and when explorer has a hiccup it starts an...
October 3rd, 2005, 11:45 AM
System operating system is a win xp pro with dos add-on utilities.
Everything that I have found under internal DOS commands including Windows add-on utilities for XP...
October 3rd, 2005, 11:00 AM
Here is my ?
I have a machine that wonít allow me to start a prog becuz a process is running. When I look at the process it comes up as PD*** PID 3854 PRI 8 THD 11 HND 229 PRIV 4444.
October 3rd, 2005, 10:24 AM
As nihil said you use sample or scale models. The only problem we ever came across when testing was a hardware hack of the crypto drives (ATMís) then it was only local to that drive and machine. ...