Page 5 of 6 FirstFirst ... 3456 LastLast
Results 41 to 50 of 52

Thread: how to hack using ip

  1. #41
    In my time of IBM jr's, apple 2's, and c-64, learning assembly language and producing small code was number 1. In fact, tons of computer magazines taught basic and assembly to help kick off the Computer revolution that was to come. I used to get snobby with program size when I could write a 128byte assembly program compared to 12KB the c language produced just to output "hello World". In my time, multi-tasking was writing a Terminate-but-stay-resident prgram setoff by a "hot-key".
    Last edited by Linen0ise; December 23rd, 2008 at 03:19 PM.

  2. #42
    AO's Filibustier Cheap Scotch Ron's Avatar
    Join Date
    Nov 2008
    Location
    Swamps of Jersey
    Posts
    378
    L-zero is right!

    Where would we be without spam, trojans, firewall appliances, AV software and all the other things that make sys admin such a joy.

    L-zero, please post ur email address (and static ip) so we can all show you our appreciation for you straightening us out.

    Merry F.....' Christmas from the Swamps of Jersey

    CSR
    In God We Trust....Everything else we backup.

  3. #43
    Quote Originally Posted by Cheap Scotch Ron View Post
    L-zero, please post ur email address (and static ip) so we can all show you our appreciation for you straightening us out.
    CSR
    here ya go..... http://www.dialinfree.net/

    ps: Check it out. Later I'll match ur MAC address to see what the botnet learned

  4. #44
    Senior Member t34b4g5's Avatar
    Join Date
    Sep 2003
    Location
    Australia.
    Posts
    2,391
    There is no waaay i'm gonna even consider clickin that link..

  5. #45
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    TSR Now that brings back memories.

    My first program was a screen saver in basic. With a few lines of assembly.

    Ctrl+Shift+L turned the screen blue and little white dots would fall down the screen and it would play "let it snow" on the system speaker.
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  6. #46
    AO's Filibustier Cheap Scotch Ron's Avatar
    Join Date
    Nov 2008
    Location
    Swamps of Jersey
    Posts
    378
    OK Rodney, I checked it out. Not too interesting... but then again, I didnt graduate from Burgard Vocational. Pretty lame if u ask me. Guess there aint too much to do for fun in Columbus, but I suppose it's better than growin up in Buffalo.

    Oh and I changed my mac address so your bot can easily find me. 00:11:00:11:00:11:00:11 Enter @ ur own peril.

    CSR

    P.S. Did u know u share birthdays with Pavlov? That might explain your Folding score.
    In God We Trust....Everything else we backup.

  7. #47
    Banned
    Join Date
    Jan 2008
    Posts
    605
    Quote Originally Posted by Linen0ise View Post
    You should thank hackers....without them you wouldn't have giant corporations like apple, microsoft, and Red Hat. Without hackers you would forever wonder how to copy an encrypted 6GB DVD onto a 4.3GB without loosing an ounce of quality. Without hackers, you would still be writing your programs in assembly language. Be careful what you ask for. Hackers get paid if they do it right. Bet you want to unlock your 3G Iphone.
    I've never seen a single person call themself a l337 h4x0r then accomplish anything notable. The truth is BILLIONS of people are doing neat things with computers as we speak... the majority of them will agree that the H-word accomplishes nothing except making people look extremely retarded.
    Last edited by The-Spec; December 24th, 2008 at 08:57 PM.

  8. #48
    0_o Mastermind keezel's Avatar
    Join Date
    Jun 2003
    Posts
    1,024
    Quote Originally Posted by Linen0ise View Post
    here ya go..... http://www.dialinfree.net/

    ps: Check it out. Later I'll match ur MAC address to see what the botnet learned
    Hey...there's the target practice I've been hunting for.

    I'll be interested to see how far you get with a spoofed mac address and somebody else's IP. I'll be highly entertained when you end up hacking a DoD box.

  9. #49
    Quote Originally Posted by keezel View Post
    I'll be highly entertained when you end up hacking a DoD box.
    Electronic Data Processing, division of combat systems. Can read military email headers faster than you can send encrypted mail through pop. Seen it, done it, shipped Unix (Aegis) tapes to DoD. You queers are off topic anyways.

    http://counterterrorismblog.org/
    Last edited by Linen0ise; December 26th, 2008 at 12:46 PM.

  10. #50
    @ÞΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    Location
    St. Petersburg, FL
    Posts
    1,705
    I blame Gore for this thread.
    Real security doesn't come with an installer.

Similar Threads

  1. TTL and traceroute: The forgotten hack.
    By Tiger Shark in forum The Security Tutorials Forum
    Replies: 19
    Last Post: May 29th, 2004, 04:55 PM
  2. prevent from being hack?
    By free-fall in forum Newbie Security Questions
    Replies: 9
    Last Post: November 29th, 2003, 06:12 PM
  3. A Professional Hack
    By Lone1337 in forum AntiOnline's General Chit Chat
    Replies: 7
    Last Post: August 23rd, 2002, 04:16 PM
  4. hehe...for those who hate AO newbies...
    By zigar in forum AntiOnline's General Chit Chat
    Replies: 10
    Last Post: February 22nd, 2002, 02:24 PM
  5. how to hack cisco a router... wow
    By NUKEM6 in forum Non-Security Archives
    Replies: 1
    Last Post: February 3rd, 2002, 11:28 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •