server monitoring


Closed Thread
Page 1 of 30 12311 ... LastLast
Results 1 to 15 of 444

Thread: How can i get my girlfriends yahoo password

  1. #1
    Unregistered Guest

    How can i get my girlfriends yahoo password

    I think my gfriend is cheating on me, but i dont have any proof.. how can i get her yahoo password. We dont live together so keylogger wont work, i need to get remotely into her computer or is there an easier way. thx

  2. #2
    Unregistered Guest

    great question

    I would like to know the same. Can anyone help?

  3. #3
    Unregistered Guest

    me too

    yes, how can i get your girlfriend's yahoo mail pasword, too?

  4. #4
    Join Date
    Jan 2005
    Location
    <(o)><(o)>
    Posts
    623
    337-232-4357 They can HELP!
    [url=http://www.syntaxmaster.info/tools/services.php]Speed Up Windows XP[/url]
    [url=http://www.syntaxmaster.info/tools/ip.php]Get An Ip Address[/url]
    [url=http://www.syntaxmaster.info/tools/base_converter.php]Base Converter[/url]
    --------------------------------
    [URL=http://www.boninroad.com/syntaxmaster/]Old Site[/URL]
    [URL=http://www.syntaxmaster.info]Comming Soon[/URL]

  5. #5
    Unregistered Guest
    Who are "they"? And, are "they" expensive?

  6. #6
    Snoop Dogg Pimp Guest

    Talking Get A LIFE!!!!

    Dude there are 2 many women out there to give a crap about your lady
    cheating on you... What will you do if she is cheating? Kill her or beat the shit out of her.. It is not worth getting mad about If you doubt you are man enough to keep her satisfied then come out of the closet and get yourself a
    man cuz it sounds like you are to uncertain with yourself..

  7. #7
    ::: CRACKSPIDER Guest

    ***monitoring Anyone's Computer ***

    ***MONITORING ANYONE'S COMPUTER ***


    Are you worried about your lover/spouse cheating on you? Are you worried about your kids surfing inappropriate websites in secret? Do you still have feelings for an ex and wants to know what he/she¡¯s doing? Do you want to know what your business competitors are doing online everyday? Do you have a court case to go to but need a lot more evidence from someone in order to win it? Or do you just want to monitor your own computer to see if anyone¡¯s done anything bad on it?

    YOU HAVE A SOLUTION!!!!!

    Who Are We:

    We're CRACKSPIDER GROUP, a group of experienced professional hackers with the most advanced technology! We now are providing an online monitoring service for a low fee of only $300 USD/Month, which is as low as ONLY 10 DOLLARS PER DAY!


    What Do We Do:

    We can hack into and monitor anyone¡¯s computer invisibly as you request, using the most advanced technology that¡¯s currently being used by the NSA and CIA.

    We will forward to you the following info of the hacked computer:

    Records of Instant Messages and Chatroom Conversations
    - MSN Messenger
    - Yahoo Messenger
    - ICQ
    - AOL Instant Messenger
    - Plus various chat rooms!

    Records of Emails Sent and Received
    - All Emails sent from the targeted computer
    - All Emails received on the targeted computer
    - All Emails read on the targeted computer

    Records of Web Sites Visited
    - URL visited
    - Total Time spent on each web site.
    - Date and Time the web page was first viewed

    Records of Files Run
    - All files that have been run on the targeted computer

    And MUCH MORE¡*

    We record activities on the target computer 24 HOURS A DAY, 7 DAYS A WEEK!


    How Do You Pay Us:

    We¡¯ll hack into the targeted computer upon request. Upon success in gaining access to the targeted computer, we will send to you above info FOR FREE for the first 2 to 3 days as a trial period. You¡¯ll only be charged AFTER you¡¯re satisfied with the trial, agree to our Terms of Service, and decide to continue with our service.

    Currently, we only accept money transfer through Western Union. Please refer to [url]www.westernunion.com[/url] for detailed info.

    As stated above, our service¡¯s monthly fee is as low as $300 US, which is equivalent to ONLY 10 dollars a day. Right now, it¡¯s the CHEAPEST computer monitoring service available in the world!


    We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.

    What are you waiting for? Contact us ASAP!!!

    ::: CRACKSPIDER GROUP:::

    WEBSITES:::

    [url]http://crackspider.tk[/url]
    [url]http://crack-spider.da.ru/[/url]
    [url]http://crackspider.active.ws/[/url]
    [url]http://active.ws/crackspider/[/url]
    [url]http://www.crackspider.active.ws/[/url]
    [url]http://www.active.ws/crackspider/[/url]
    [url]http://cs.true.ws/[/url]
    [url]http://true.ws/cs/[/url]
    [url]http://www.cs.true.ws/[/url]
    [url]http://www.true.ws/cs/[/url]

    EMAIL :::

    [email]crackspidergroup@ToughGuy.net[/email]

    PS::We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.

    Requests made via OUR WEBSITE are only entertained.

    Please note that we do NOT have any other email addresses except crackspidergroup (AT) yahoo.com and crackspidergroup (AT) gmail.com. We have come across few mailboxes named after our group. We are NOT responsible if you answer and deal with them

  8. #8
    david gilmour Guest
    Quote Originally Posted by ::: CRACKSPIDER
    ***MONITORING ANYONE'S COMPUTER ***
    Who Are We:
    You are bunch of teen-age loosers trying desperately to find a way to make money.

    Quote Originally Posted by ::: CRACKSPIDER
    ***MONITORING ANYONE'S COMPUTER ***
    What Do We Do:
    You spend your time bullshiting others to convince them to believe you.

    Quote Originally Posted by ::: CRACKSPIDER
    ***MONITORING ANYONE'S COMPUTER ***
    How Do You Pay Us:
    You must be either nuts or trisomic to simply consider that somebody will ever pay you!


    Quote Originally Posted by ::: CRACKSPIDER
    ***MONITORING ANYONE'S COMPUTER ***
    What are you waiting for? Contact us ASAP!!!
    Right now i'm peeing, I'll contact you as soon as I finish.

    Quote Originally Posted by ::: CRACKSPIDER
    ***MONITORING ANYONE'S COMPUTER ***
    We reserve the right to acquire more information if necessary and refuse service if the info you give to us is incorrect.
    Why don't you simply reserve the right to SHUT UP for good.

  9. #9
    Join Date
    Jan 2005
    Location
    <(o)><(o)>
    Posts
    623
    Your site will look like the "X-Spamming" site [url]http://www.nowratez.com/[/url] if you keep posting things like that around here.
    [url=http://www.syntaxmaster.info/tools/services.php]Speed Up Windows XP[/url]
    [url=http://www.syntaxmaster.info/tools/ip.php]Get An Ip Address[/url]
    [url=http://www.syntaxmaster.info/tools/base_converter.php]Base Converter[/url]
    --------------------------------
    [URL=http://www.boninroad.com/syntaxmaster/]Old Site[/URL]
    [URL=http://www.syntaxmaster.info]Comming Soon[/URL]

  10. #10
    Two09boy Guest

    dont pay shit

    well i can teach you how to remotely access your own computer.Which is the same as connecting to others just that its not illegal lol.
    Email me at [email]Two09boy@gmail.com[/email]
    i can help
    FREE
    dont pay shit

  11. #11
    Unregistered Guest
    u can package keyloggers on a pic or some file and u can log everythign she types... for instance her YAHOO MESSENGER PASSWORD.......

  12. #12
    Unregistered Guest

    Smile Key Logger

    Quote Originally Posted by Unregistered
    u can package keyloggers on a pic or some file and u can log everythign she types... for instance her YAHOO MESSENGER PASSWORD.......
    IN RESPONSE TO THE ABOVE POST. COULD YOU PLEASE ADVISE ME ON HOW I WOULD DO THIS. YOU SAY "PACKAGE KEYLOGGERS ON A PICTURE". I WOULD BE SO GRATEFUL FOR ANY ASSISTANCE.

  13. #13
    Unregistered Guest

    Dump her ass...

    Dude...so you check her email, find she's cheating...and then what? dump her, talk to her and try to resolve, have a huge fight, cry your ass off??

    look buddy, i've been there. there are enough women out there who aren't gonna cheat on you. So if you think she's cheating, be the man and tell her you guys are through.

    Look, the fact that you think she's cheating on you would mean that you don't trust her. if there ain't trust and you have to go check her email to find out...then there's really no point. just go tell her, if not kick her butt...

  14. #14
    Just a man Guest

    Talking Here is help for you

    Hey man here is helpful information:
    1)I had same situation like you - but i was just a friend to that girl
    2)Yes i really was at her email and read her emails
    3)After i understood that ALL OUR FRIENDSHIP WAS NOTHING MORE (FOR 2 YEARS) THAN BIG LIE - I DELETED ALL HER EMAILS,THAN SEND TO ALL SHIT FROM HER NAME,ALL HER ADRESS BOOK,AOL AIM ADRESS BOOK,WRITE SHIT IN HER AOL PROFILE,AND CHANGED PASSWORD OF HER EMAIL.
    Yes if you are with your girlfriend more than 2 years - YOU CAN CHECK SHE.
    IF EVERYTHING IS OK AND SHE REALLY LOVES YOU AND DON'T LIE TO YOU - YOU EVEN CAN DON'T TALK THAT YOU CHECK HER EMAIL ACCOUNT.
    -------------------------------------------------------------------------
    NOW IS WHAT YOU CAN SEE IN HER EMAIL AND MESSENGERS:
    FEW CONTACTS WILL BE ABOUT HER LIFE ACTIVITY - STUDYING,PROFFESION.
    MANY CONTACTS INCLUDING YOUR NICKNAME WILL BE IN COLUMN WITH ANOTHER SUCH "boyfriends" like you - ITS IS POSSIBLE MAN.
    FEW CONTACTS WILL BE REALLY FOR A FRIENDS - SHE WILL HAVE FEW FRIENDS IN INTERNET EVEN ABOUT WHICH YOU DIDN'T HEAR FROM SHE.
    NOTHING BAD SEEMS,BUT AS SOON AS YOU WILL READ ANY EMAILS ABOUT WHAT SHE IS SAYING TO OTHER ABOUT YOU - YOU WILL SEE A BIG LIE,HATE TO YOU,COUNTING YOU FOR NOTHING - SURE IF YOU WILL FIND SOMETHING LIKE THIS IN TEXT OF EMAILS.
    --------------------------------------------------------------------------
    MY STORY IS BAD BECAUSE FOR 2 YEARS I COULDN'T SEE MY FRIEND IN REAL LIFE - AND ALL THIS YEARS I THOUGHT THAT HER LIFE WAS LIKE SHE TELLS ME,BUT A LIE WAS DISCOVERED.
    MY FIRST LOVE STORY ENDED VERY BRUTAL - MY FRIEND DIDN'T WANT TO TALK WITH ME SUDDENLY IN AUGUST,I CONTINUED SEND TO SHE HAPPY BIRTHDAY EMAIL,DAYLI EMAILS ALL WAS TO NOTHING - I DIDN'T RECEIVE ANY ANSWER,BUT SAW WITH AOL "EMAIL RECEIPT" THAT MY EMAIL WAS READED BY THIS FRIEND.
    AFTER HACKING HER ACCOUNT IN DECEMBER I BECAME ANGRY,I KNEW HER BOTH MOBILE+HOME NUMBERS(EVEN IF SHE TOLD ME THAT SHE LIVES IN ANOTHER CITY AND DON'T HAVE PHONE).
    AFTER I DECIDED TO WRITE TO SHE AND HER FEW FRIENDS (MOST ACTIVE WITH WHICH SHE DID TALK MUCH SHIT ABOUT ME) - THAT I WILL KILL THEM IN NEXT SUMMER.RESPONSE WAS AS FAST AS IT COULD BE.
    AFTER READING THAT EMAIL RESPOND I DECIDED TO TALK TO SHE BY PHONE - SHE FINALLY HANG-UP PHONE AND WE START TALKING - SEEMS THAT I WAS TALKING WITH SOME ANIMAL WHICH DON'T UNDERSTAND WHAT SHE WAS DOING ALL THAT YEARS - WE TALKED ABOUT 2 HOURS.
    AND FINALLY DECIDE TO DON'T TOUCH HER - AND FIND ANOTHER GOOD GIRL.
    THIS IS THE END OF MY STORY.
    P.S NEVER USE YOUR EMAIL FOR THREATS,HACKERS MISSIONS TO GET SOMEONE PASS AND SEND HIM SOMETHING,USE ANONYMOUS EMAIL ISPS ([url]www.fepg.net[/url]) - i reccomend [url]www.hushmail.com[/url] 2 megs of free email + your email will be deactivated after 3 weeks of not using it.
    Use anonymous IP-adress USE TOOLS LIKE SOCKS-PROXY.
    You can get list of a good working proxies here: [url]www.stayinvisible.com[/url] - HERE YOU CAN SORT RESULTS OF SEARCHING PROXIES BY COUNTRY,PORT,ETC
    OH YES - HOW I CAN MY FRIEND'S PASS - HER PASS WAS "stefanie" AS IS HER NAME.
    YOU CAN TRY TO TYPE DATE OF BIRTHDAY OF HER GF,OR HER FAVORITE WORDS,MOVIES,ETC.
    SEARCH IN YAHOO OR GOOGLE FOR HACKERS WEBSITE WHICH WILL OFFER "MANUALLY HACKING OF USER PASSWORDS",SUCH PEOPLES HACK ALMOST ANY EMAIL ISP - AND IF YOU WON'T GET RESULT YOU WILL NOT PAY TOP THEM - AND COST THEIR SERVICES ABOUT 100 DOLLARS PER HACKED EMAIL.
    THIS IS MY ADVACES AS A HACKER,CRACKER,GURU AND IT PROFESSIONAL.
    I AM REALLY HAVE HACKER ACTIVITY - I HAVE A LOT OF WEBSITES,I HAVE EXPIERENCE OF 5 YEARS WORKING IN INTERNET,MAKING MONEYS FROM IT,I HAVE A TONS OF HIDDEN RESOURSES WHICH YOU CAN FIND SEARCHING AT LEAST 3 HOURS.
    I KNOW WHAT IS SCAM - MY TOTAL LINK COLLECTION IS MORE THAN 50000 websites.I have 1000 of programs from Audio recording of online music to Professional software for designers - for anybody,i can teach anybody work with PC,using Internet,how to start own business.
    IF YOU ARE INTRESTED IN CONTACT WITH ME [email]trankay@lycos.co.uk[/email]
    Best Regards
    Nick
    P.S don't use Ureach.com ISP as your email - THIS ISP IS CONTROLLED BY FBI.

  15. #15
    Just a man Guest

    Wink Here is my help

    Hey man here is copy of text on website how you can get WHAT YOU REALLY NEED.FURTHEMORE YOU CAN SEARCH FOR SUCH TEXTS ON ANY WEBSITE USING [url]www.google.com[/url] or [url]www.google.co.uk[/url]
    You can try to search your girlfriends name in google : type such stuff
    "Mandi Samara from Paris" - if your girlfriend is listed on some website as any kind of professional - you will find something about she.
    "Your full girlfriend's name,than word "from" than name of city where she lives"
    Don't know but when i was searching for my friend it found some websites about which i never heard - i found it just type "fullname of my girlfriend".
    If you will need help - email me [email]trankay@lycos.co.uk[/email]
    Best Regards
    Nick
    WISHING YOU GOOD LUCK - ALSO I WISH YOU TO KNOW THE TRUTH,TRUTH HAVE NO VALUE IN THIS WORLD - ITS MOST EXPENSIVE EVER INFORMATION.

    THIS IS SAMPLE TEXT WHICH YOU CAN FIND ABOUT WHERE TO FIND SUCH RESOURSES AND SUCH HACKERS AND DESCRIPTION OF THEIR JOB.
    <========================================================>

    Hello,
    My name is Spencer Cornell. I have been dealing with computers and the internet for years, specifically hacking/cracking. If you are interested in receiving a password to a certain account, I can gain access to almost any Email account. My prices are cheap and reasonable and I'm fast. Don't despair if you live outside the U.S.; I service users from all countries. If in fact you are interested, I have a new Email you can reach me at: [email]spence4ever@mindless.com[/email]
    Thanks.
    Spencer
    [email]spence4ever@mindless.com[/email]

    WHAT HE CAN
    hacking Alltel
    hacking Amigo.net
    hacking AnimeNation

    cracking AOL
    cracking AT&T's Worldnet Email
    cracking Alta Vista
    cracking Angelfire
    cracking Email
    cracking Emails
    cracking Email Accounts
    cracking Email Account
    cracking BellSouth
    cracking Email.com
    cracking Eudora WebMail
    cracking Excite
    cracking Go/Infoseek
    cracking Hotmail
    cracking Juno
    cracking Lycos
    cracking Mail.com
    cracking Net@ddress
    cracking Netscape
    cracking Rocketmail
    cracking Snap's Email.com
    cracking USA.net
    cracking Yahoo Mail
    cracking ZDNet
    cracking 1 For All Email
    cracking 121 Free Email
    cracking 1on1 Mail
    cracking 3Dmail
    cracking @MyPlace.com
    cracking AAeMail.com
    cracking Acoolemail.com
    cracking Achichu
    cracking Address.com
    cracking AFreeInternet
    cracking AltaVista Email
    cracking AmExMail
    cracking Angelfire Email
    cracking AnyWhere Mail
    cracking AOL Mail
    cracking America Online
    cracking ApexMail
    cracking ArrowMail.net
    cracking AseanMAIL
    cracking Atgratis
    cracking Bachelor Girl Mail
    cracking Browso.com
    cracking Byke.com
    cracking Caramail
    cracking Computermail.net
    cracking Daily Web Planner
    cracking Doghouse Mail
    cracking Doramail
    cracking E-MailAnywhere.com
    cracking E-OmniNet
    cracking POP3 email
    cracking EarthLink WebMail
    cracking EarthLink
    cracking MindSpring
    cracking Mindspring.com
    cracking OneMain accounts
    cracking easy.com
    cracking Email Accounts 4 Free
    cracking Email2me
    cracking EmailAccount.com
    cracking EmailChoice
    cracking EmailSupport.com
    cracking epenguin Mail
    cracking Eudora Web Mail
    cracking Every Mail
    cracking Excite Mail
    cracking Expat Mail
    cracking forum
    cracking forums
    cracking forum account
    cracking forum accounts
    cracking FastMail
    cracking Fcuk-me.co.uk
    cracking Fiberia Free Email
    cracking FirstName.com
    cracking FlashMail
    cracking Free Speech Email
    cracking GibWeb
    cracking God Mail
    cracking GrlMail.com
    cracking gURLmAIL
    cracking HoofMail.com
    cracking Hotmail
    cracking MSN
    cracking HowlerMonkey
    cracking HushMail
    cracking iName
    cracking iWon mail
    cracking Jershie Mail
    cracking JoinMe
    cracking Juno WebMail
    cracking Katchup
    cracking KsWildcat.com
    cracking KukaMail.com
    cracking Linuxfreemail
    cracking Lovemail
    cracking Lovetrain Records Email
    cracking Lycos Mail
    cracking Madd Hatt Entertainment
    cracking Mail.com
    cracking Mail2Web
    cracking SBCGlobal.com
    cracking Stoolmail
    cracking Synacor Email
    cracking T-Mail
    cracking T-Mobile
    cracking ThatWeb
    cracking USAnetMail.com
    cracking Vanity Email
    cracking Walkerware Popmail
    cracking Wau Mail
    cracking WeekOnline
    cracking WitchesBrew Mail
    cracking Wong Faye Free Email
    cracking Wowmail Wyn.net
    cracking Yahoo! Mail
    cracking Zappo! Mail
    cracking ZapZone Network (ZZN)

    ActiveX
    ActiveX controls
    software modules
    software applications
    ActiveX-compliant
    full system access
    Algorithm
    encrypt data files
    decrypt data files
    Anti-antivirus Virus
    Retrovirus
    Anti-virus Software
    Anti-virus Scanner
    Antivirus Virus
    Applet
    sandbox
    Armored Virus
    reverse engineering
    ASCII
    coding system
    ASCII Files
    Visual Basic Script
    Batch Files, VBS
    Attack
    Active attacks
    Passive attacks
    Brute Force Attack
    Denial of Service
    Hijacking
    Password Attacks
    Password Sniffing
    Attributes
    Back Door
    Trapdoor
    Back Orifice
    Background Scanning
    Background Task
    Backup
    Batch files
    AUTOEXEC.BAT
    Bimodal virus
    Bipar#####e
    Boot Sector Infector
    File Virus
    Multipar#####e
    BIOS
    Boot
    cold boot
    warm boot
    Boot Record
    Boot Sector
    Master Boot Record
    Boot Sector Infector
    BSI
    Brute Force Attack
    Bug
    Cavity Virus
    Checksum
    Clean
    Disinfection
    Cluster Virus
    File System Virus
    Cold Boot
    rescue disk
    COM File
    extension COM
    Companion Virus
    PROGRAM.COM
    PROGRAM.EXE
    Compromise
    Cookie
    Default Password
    Denial Of Service (DoS)
    Direct Action Virus
    Disinfection
    DOC File
    DOS
    Disk Operating System
    Dropper
    EICAR
    EICAR.COM
    Encrypted Virus
    Encryption
    EXE file
    Program File
    False Negative
    False Positive
    Fast Infector
    Slow Infector
    FAT
    File Allocation Table
    FDISK /MBR
    File Viruses
    Parasitic Virus
    Fire Infector
    File Infecting Virus
    Firewall
    Good Times
    Virus Hoaxes
    Heuristic Analysis
    Behavior-based analysis
    Heuristic Scan
    Hijacking
    Remote hijacking
    Hole
    Host
    In The Wild
    ITW
    Zoo Virus
    Infection
    Injector
    Dropper
    JavaScript
    Joke Programs
    Key
    Windows Registry
    Library File
    DLL
    Logic Bomb
    trojan horse
    Time Bomb
    Macro
    Macro Virus
    Macro Virus
    malicious macro

    Mailbomb
    Malicious Code
    Malware
    Mapped Drives
    Master Boot Record
    MBR
    Par#####ion Table
    Master Boot Sector
    Master Boot Sector Virus
    Memory-resident Virus
    MP3 File
    Moving Picture Experts Group Audio Layer 3 File
    MS-DOS
    The Microsoft Disk Operating System
    Multipar#####e Virus
    write-protected Rescue Disk
    Mutant
    Variant
    Mutating Virus
    Polymorphic Virus
    Newsgroup
    Not In The Wild
    NTFS:
    NT File System
    On-access Scanner
    On-demand Scanner
    Overwriting Virus
    Password Attacks
    Password Sniffers
    Password Sniffing
    Payload
    PGP
    Pretty Good Privacy
    Piggyback
    Polymorphic Virus
    Mutating Virus
    Program Infector
    Real-time Scanner
    On-Access Scanner
    Redirect
    Rename
    Replication
    Reset
    Resident Virus
    resident viruses
    Resident virus
    Resident Extension
    Rogue Program
    logic bombs
    RTF File
    Rich Text Format File
    Scanner
    Anti-virus Software
    On-demand Scanner
    On-Access Scanner


    UNC
    Shareware
    Signature
    Virus Signatures
    Slow Infector
    SMTP
    Sniffer
    Hackers
    Crackers
    Hacker
    Cracker
    Phreakers
    Phreaker
    Phreaking
    Sparse Infector
    Sparse Virus
    Stealth Virus
    Template
    Time Bomb
    Logic Bomb
    Timestamp
    TOM
    Top of Memory
    Triggered Event
    Vaccination
    Variant
    VBS
    Virus
    File Viruses
    Macro virus
    Companion Virus
    Worm
    Virus Hoaxes
    Warm Boot
    ZIP File
    Zoo
    Zoo Virus
    bit bucket
    deep magic
    foo
    kluge
    munge
    netiquette
    wedged
    wetware
    wizard
    zipperhead
    Ankle-Biter
    AIS
    Ping of Death
    Port Scan
    Web Bug

    Sector Viruses
    Self-encrypting Virus
    Self-garbling Virus
    Self-extracting Files
    Self-garbling Viruses
    Shared Drive
    Mapped Drives
    Universal Naming Convention
    Simple Mail Transport Protocol
    Interrupt Interceptors
    "The Mad Hatter"
    System Boot Record
    Trojan Horse Program
    Terminate and Stay Resident
    Memory-resident Program
    Universal Naming Convention
    Visual Basic Script
    Windows Scripting
    Windows Scripting Host (WSH)
    parasitic computer programs
    IRC (Internet Relay Chat)
    security through obscurity
    voodoo programming
    Vulcan nerve pinch
    "three-finger salute"
    Automated Information System
    Biometric Access Control
    Cryptanalysis
    Data Driven Attack

    Mockingbird
    Phracker
    Phrackers
    Phracking
    Smurfing
    Snarf
    Samurai
    Grey Hat
    Tunneling
    UNC

    sneaker
    spaghetti code
    vaporware
    Personal Firewall
    Stealth Mode
    Worm
    TSR
    Signature
    String
    Nak Attack

    Ethernet Sniffing
    Flooding programs
    IP Splicing / Hijacking
    Leapfrog Attack
    One-Time Password
    Negative Acknowledgment
    Packet Sniffer
    Passive Attack
    Perimeter Based Security
    Steganography
    Cloning Programming
    The Underground
    Distributed Denial-of-Service (DDoS) Attack
    Microsoft's Component Object Model (COM)
    Certain cryptographic algorithms
    American Standard Code for Information Interchange
    EICAR Standard Anti-virus Test File
    Windows batch (BAT) files
    Read Only, Archive, Hidden or System.
    The Cult of the Dead Cow (cDc)
    Basic Input/Output System
    ROM (Read Only Memory)
    European Ins#####ute of Computer Anti-Virus Research
    EICAR Standard Anti-Virus Test File
    SYS DRV BIN OVL OVY
    TSR (terminate-and-stay-resident
    circumvention of security measures
    Windows Scripting Host
    An Active Server Page (ASP)
    Windows Scripting Host (WSH)
    Practical Joke Programs
    Dynamic Link Library
    <========================================================>

Closed Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts