January 30th, 2006 08:20 PM
Has anybody heard of this site (http://web.tickle.com) and why they blatantly ask for email addresses and PASSWORDS of there users?
http://web.tickle.com/dog/ I took a screen shot from this...
December 31st, 2005 08:37 AM
Depositions can be intimidating for grown individuals let alone a young teenager. Lawyers can use this factor to lead people into answering questions falsely (aka lead questioning).
I would like...
December 27th, 2005 06:14 AM
Propitiatory SAP/ADAP modules (Zeus) on IBM crypto drives. That is all I can say since different companies use different schemes relating to security.
December 17th, 2005 10:59 PM
Not true, although some companies will deny any data breaches until faced with the legalities of the situation, most companies will not when faced with media and public relations. This changes when...
December 16th, 2005 10:17 PM
One thing I always love is the deniability from companies when there might have been a data breach.
December 7th, 2005 02:37 AM
In my experience they work in teams with exploited or preconfigured servers.
Well 5 a day, not bad but at least you didn't win the MICROSOFT MEGA JACKPOT 18 times today :D
November 27th, 2005 05:42 PM
I just received 7 emails with W32.Sober.X@mm!zip today.
The content of the message,
November 24th, 2005 10:49 AM
I just tested this on Yahoo web mail and it does work. Then I took it a step further and tried to use a button. I attached a screen shot with the button. I don't have time to mess with the scripting...
November 21st, 2005 07:20 PM
Don't mess with Texas
November 4th, 2005 10:49 PM
I forgot about this one
Free DVDs on all types of fraud and SE related subjects from the USPS.
November 3rd, 2005 05:56 PM
You got a good start but here are some more,
SE kiddie Forum
More Tech side of SE
November 1st, 2005 05:13 PM
This one is interesting, It is an example of an email that scammers use to entice people to help withdraw the money that they have collected from there targets then wire transfer the funds to the...
October 4th, 2005 08:27 PM
Thank you all for your replies.
I am going to investigate this further. So far it looks like the program calls a process, which then calls a service, and when explorer has a hiccup it starts an...
October 3rd, 2005 11:45 AM
System operating system is a win xp pro with dos add-on utilities.
Everything that I have found under internal DOS commands including Windows add-on utilities for XP...
October 3rd, 2005 11:00 AM
Here is my ?
I have a machine that wonít allow me to start a prog becuz a process is running. When I look at the process it comes up as PD*** PID 3854 PRI 8 THD 11 HND 229 PRIV 4444.
October 3rd, 2005 10:24 AM
As nihil said you use sample or scale models. The only problem we ever came across when testing was a hardware hack of the crypto drives (ATMís) then it was only local to that drive and machine. ...