CyberpunkNet Search

Custom Search

Wednesday, July 23, 2008

Shadow life, First Step In Hacking Anonymously


This article is for informational and educational purposes only. I am not responsible for anything you may choose to do with this information. Remember: identity theft and money laundering are ILLEGAL.

In this article, I will attempt to outline the basic techniques for creating an alias. These are just the basics, but remember that based on these basic principals is the foundation that are made to be built upon. There are two part to an alias, one being the persona you wish to make for your self, and the other is the identity. This article will talk about the identity, you can choose the persona you wish to make.

1) Choose a Name: You need to choose a name that is common. One that is hard to track or investigated. Basically a name that hides it self. Search the web and white pages for common names that are used in your area. Try to choose one that was popular around the year you were born. And last make sure to choose a first and last name combination that is really common. For example, if you live in an area that is heavily populated with white people, choose a white common name, like John Smith. But if it is heavily populated by Mexicans, then choose something like Jose Gonzales, get the idea?

Next Choose a handle, a nick name that you will be Under. Multi Layered Aliases work best to hide ones identity.

2)Next either from a library, school network or free hot spot go online and create an e-mail address. Create an new e-mail address with your new Alias. If you don't want to use your real e-mail to create your new one, try going to www.hushmail.com to create an e-mail address.

3)After creating your Alias and e-mail address you will want to put your alias in the "system", meaning create a paper trail. Go Ahead and join Social network sites with your new alias and e-mail account. Join several not just one, also go ahead and join Message boards and any other site that requires membership.

The second part to getting your alias into the system is to buy prepaid visa and master cards, terrorist buy these in bulk to launder money and purchase items online, once you have the pre-paid cards do all your shopping online and use your alias to do the shopping. Try to send items to multiple locations when purchasing these items, like to friends or neighbors addresses two streets down, then track your order and go pick up your item with the excuse that the carrier accidentally delivered it to their house.

4) Get a pre-paid phone and use your alias for all the info, most times an address is not required but if it is just give a fake one. Do not give this number out to any friends or people that know you, use this number when ordering online or to contact people that know you as your alias.

These are the basic principals for an alias, either for social engineering or to cover up your tracks in case the shit hits the fan.

I am not responsible for any harm that may come from information in this article.Use any info only at your own risk!

Update News

Currently working on an article on a program similar to WASTE. A file sharing program that uses encrypted technology to share files. This software will be releases sometime this fall. In the mean time i will be posting educational articles on hacking/cracking.



Your Ad Here

Monday, July 14, 2008

The Nets No. 1 Punk

His name is Justin Frankel, a computer programmer that is best known for his work on Winamp and the Gnutella network, the Gnutella frame work is responsible for many of the file sharing programs out there today, ranging from bear share to Morpheus to Lime-Wire just to name a few. He was born in 1978 and grew up in Sedona, Arizona. Frankel took control of his education while using his brother’s 8-bit Atari computer, after that experience he was a self thought wiz by the time he enter high school. At a young age he had a high skill for programming and used it to his advantage.

“It's 1995, and the high school sophomore is sprinting through a programming contest at the University of Northern Arizona. Frankel, 16, is so far ahead of his nearest competitor that, just for yucks, he decides to write a little "fork bomb" -- a program that splits itself repeatedly until it swamps a computer system. He uploads it, and one by one the machines around him crash. As administrators scramble, he sits in guilty silence, then finally confesses to a frazzled systems engineer ……Frankel wins anyway. “- Timedigital.com

After dropping out of University after two quarters he went home in and spent his time in a 8ft by 12ft room on the computer and listening to music, he started coding one day trying to make a media player with features that no other player had that he wanted, and in 1997 Winamp 1.0 was born. He released the shareware under the moniker he created in high school, Null soft. (The company's name is a parody of Microsoft, from the fact that null (nothing) is smaller than micro). The media player quickly gained popularity and in a year and a half about 15 million people had downloaded the media player. It was a huge success. He was receiving about $8,000 a month just on advertising alone and a percentage of the people had sent in the $10 shareware optional fee. By this time Frankel was getting in tens of thousands of dollars each month. Despite the success Frankel was no sell out. A deal with a pharmaceutical company interested in using Winamp in presentations fell apart because of the fact that he refused to take out the media player’s tag line “Winamp whips the llama’s ass”.


AOL took notice of the popularity of Winamp and Shoutcast and in June 1999 they acquired Nullsoft for $100 million dollars from Frankel. At the same time he was then hired by AOL to further develop Winamp and Shoutcast and was given full control of the development, but this control would lead to rough times.

Frankel while sitting at his cubicle came across Napster, a file-sharing program that was cleverly created by 19 year old Shawn Fanning. Frankel thought to himself "how the hell are they going to keep from getting sued" as Napster stored all their "data" (mp3's) in a centralized location."When Hail to the Thief leaked on the Internet," Frankel says, "I was like, 'Right on!' But I still bought the CD. I think it's wrong to download music and never give anything to the artist. But if you download something and you're like, 'This sucks,' and you never listen to it again, I don't think there's anything wrong with that." But this ideology and interest gave birth to something revolutionary called Gnutella.

Napster's downfall was that it stored all the music that was being shared in company computers. Napster was capitalizing from copyright infringement and was in the path to legal prosecution by Time Warner. Frankel decided to fix the problem that Napster had made and decided to make a program that let people share all kinds of files not just music, but videos, documents, images all from a decentralized location. He decided to connect peoples computers directly to each other, they could share information and data with out having to go trough a centralized location."I would not be getting any money from it," he says. "I'd be giving power to people, and what can be wrong with that?" So Frankel started to code fast and under the radar at AOL's Nullsoft offices. He worked fast because if AOL found out they would prevent it from happening. On March 2000, Justin Frankel and Tom Pepper uploaded a beta version of Gnutella on the AOL servers with a note: "Justin and Tom work for Nullsoft, makers of Winamp and Shoutcast. See? AOL can bring you good things!" The next day Frankel was with his parents touring Alcatraz, when his cell phone rang. It was Pepper. "Dude," Pepper said, "you better get back to the office." By the time Frankel got back all hell had broken loose. Time Warner and AOL were about to merge and since Time Warner was in the middle of suing Napster for facilitating copyright infringement, the little self freelance project was a bad timing. AOL made him pull down the software but by the end of the day over 10,000 people had downloaded the beta software and hackers had gone to work to reverse-engineer it and throw it into the hands of the open-source community, this laid the foundation for BearShare, Morpheus, LimeWire and other file-trading software. The biggest strength that came from Gnutella was that once it started it could never be shut down, unlike Napster. The only way to stop Gnutella is to shut down all the computers in the world running it and that would be impossible to do.

AOL kept him on "a very short leash," after that. They steered him away from interviewers and encouraging him to focus on Winamp the software they ad paid him for. Not surprisingly, he acted out. In August 2000, he uploaded an MP3 search engine. AOL took it down. The next month, he uploaded program called AIMazing, which would replace the banner ads in AOL's Instant Messenger. Frankel called it nothing more than "a cute innovation." The Wall Street Journal called Frankel "AOL's loose cannon."... "We fought off the AOL bullshit as much as possible," Frankel says. When the company tried to insist that an AOL icon instantly appear on a user's desktop during a Winamp installation, Frankel hit the roof. "I'd be like, 'Look, our users don't want to use AOL!' " he says. " 'They think AOL sucks!'"

While AOL's mediaplyer Winamp lost popularity to that of Windows Media Player and RealPlayer Frankel started coding a new kind of software called Waste: a "private workspace," as he calls it, that allows small groups of friends to trade files without being as conspicuous as those on the larger peer-to-peer networks, they are sometimes called darknets and are hard to get into because you cant get in unless you are invited. The most skilled hackers; or recording-industry rats, would have trouble figuring out when or where a Waste system is running.

This time around, Frankel tried to do it the correct way by trying to pitching Waste to AOL, instead AOL pushed it to the side and left it there. Frankel got fed up and on May 28th, 2003, four years to the date that he was acquired, Frankel rebelled again, uploading Waste as a way to force AOL to deal with it, and him. But once again AOL took the program down.

AOL watched Frankel very closely after that, taking down other projects that he tried to release to the public, including an MP3 search engine and a patch for AIM calle AIMazing to block advertisements in the application. Frankel stayed with AOL in order to complete Winamp version 5.0, a hybrid of the Winamp v2.x series and Winamp v3. On December 2003 AOL shut down Nullsoft's San Francisco offices and laid off 450 employees.

Frankel announced his resignation from AOL on Januarry 2004 on his blog.





Your Ad Here

Sunday, July 13, 2008

Partner Blog P2PNetNews.blogspot.com

Check out our partners blog at www.p2pnetnews.blogspot.com
for links, news, and downloads to great content. A blog that helps the spread of information and data with out restrictions.

And at www.netmesh.blogspot.com
for videos, pictures and stories around the net.

Friday, July 11, 2008

Five Facts About Net Neutrality


  1. Definition: Net neutrality is not a law; it’s actually a principle that’s applied to residential broadband networks. What this means is that big business telecoms choose not to tier or limit internet website access allowing users full accessibility to the World Wide Web.

  2. Internet Packaging: Imagine paying for internet packages similar to the way you pay for cable. You could have access to CBS.com or ABC.com but if you wanted CNN.com or MTV.com you’d have to pay a premium. Not a pretty picture is it? Fortunately, this is far from the truth and the possibility of this happening is slim to nil. This is something often used by social media websites such as Digg.com and Reddit.com to fan the flames for net neutrality.

  3. Networks are “protecting” consumers: Yes, just like the MPAA is protecting movie goers from file sharing viruses and the music industry is trying to protect the artist. Fact is, if networks throttle the internet your protection is the last of their concern.

  4. The 700 MHz wireless spectrum: Google took a large chunk of this spectrum effectively giving them the opportunity to provide free uninhibited access to users nationwide. The spectrum is used for broadband connection speeds and has been rumored for use on their new Android cell phone OS but could eventually be put to use as free WiFi.

  5. Speed Throttling: ISP’s have recently began offering packages of higher speeds to customers who tend to use more bandwidth; namely gamers and downloaders. This allows those who use the internet for casual daily use to pay for a small and cheaper bandwidth package and charging users who use more bandwidth. This has been met with both criticism and praise from tech geeks and gamers alike, some claiming that limiting bandwidth is a bureaucratic solution while others say they would gladly pay for the added speed.

came from - 10gea.org

Friday, July 4, 2008

Who is Anonymous?



Who is Anonymous?
An On-line war is being waged against the Church of Scientology by an organized group of hackers calling themselves Anonymous. Anonymous have launched and all out campaign to systematically dismantle the Church of Scientology and all its followers. The group has tried multiple times to keep down the scientology.org website via a DDoS attacks (distributed denial of service attack) and has posted sensitive Scientology documents around the net. They describe the attacks as punishment for the Church's alleged abuse of copyright laws and alleged brainwashing of its members.

As a response to many of the attacks on The Church of Scientology, the hacker group has
posted videos on youtube to explain their intentions towards the religious cult.

"Over the years, we have been watching you, your campaigns of misinformation, your suppression of dissent, your litigious nature. All of these things have caught our eye....
we are Anonymous, we are legion, we do not forgive, we do not forget, expect us." -Anonymous




The attacks on Scientology started off by the Church's attempt to censor the internet by forcing sites to remove Scientology videos. In response to the take-down of the Scientology videos, the group Anonymous has retaliated against what they consider to be Internet censorship. The group includes computer experts capable of infiltrating private networks. In recent months, sites for the Church of Scientology have been defaced, and in some cases been attacked with denial of service attacks that have prevented users from gaining accessing to the site.

The Church of Scientology has sued Internet Service provider Netcom in 1996 for copyrighted texts posted on the newsgroup alt.religion.Scientology. And in 2003 the Church tried to sue a Dutch woman and her Internet Service Provider on similar issues but got thrown out of court. In 2007 a writer by the name of Keith Henson was arrested for making a comment on the alt.religion.Scientology news group "about sending "Tom Cruise" missile to destroy the Scientology Camp". The Scientology Church went after him under a California Law that criminalizes any threat against someone else's free exercise of religion. "Henson's frequent encounters with Scientology, coupled with his lengthy resume of programming, electrical engineer and futuristic accomplishments, have made him something of a legal cause celebre in technology circles" CnetNews has stated.

Click here to read Henderson's article on Cnet




Blogged with the Flock Browser

Thursday, July 3, 2008

The Internet... Is This The End?

Wikipedia - "Network neutrality (equivalently net neutrality, Internet neutrality or simply NN) is a principle that is applied to residential broadband networks, and potentially to all networks. A neutral broadband network is one that is free of restrictions......"


The Internet as we know it is facing a serious threat that will change the way user’s access and share information. That threat is censorship and control of what people see and do on the Internet. Network neutrality is the principle that let Internet users be in control of what content they view and what applications they use online. It is this basic principal that has let user’s access internet content with no restriction or censorship what so ever. The Internet has operated according to this neutrality principle since the earliest days and has allowed many companies, including YouTube and MySpace, to launch, grow, and change the way users interact online. By allowing the Government and Broadband Carriers to control what people see and do online would damage the free flow of ideas that have made the internet what it is today. Net neutrality is the answer to the success of the internet and should be fought to be preserved.


Today the internet is an entity that serves as an information superhighway that lets anyone in the United States share ideas and information with anyone that can access them. The big issue at hand is that broadband carriers want Congress's permission to determine what content gets to you first, fastest or even at all. They want the power to control the amount of bandwidth given to specific companies, online application and users. Allowing broadband carriers to reserve huge amounts of bandwidth for their own services and others that are willing to pay an additional fee will not give consumers the broadband Internet our country and economy need. If the phone and cable companies get their way, websites and small companies who aren’t able to afford these fees would be put in a slow lane. The broadband carriers should not be allowed to use their power to discriminate against competing content or applications. For example, when you purchase telephone service you do not expect the telephone companies to tell customers who they can call or what they can say, it would be ridiculous. In the same sense, broadband carriers should not be allowed to use their power to control online activity and let the additional fee paying user’s access to higher bandwidth than non-fee paying users.

The government support of internet censorship is justified and focused on a wide range of topics, including negative influential content, pornography, and bomb–making instructions as well as many others. The justification for censorship of this kind of content is that this would protect children and young adults from accessing harmful content. This is believed to be socially beneficial, even if the cost limits users to what they can access on the Internet. But who is to say that the government has the right to protect the children and young adults from harmful internet content? They do not, that is why children have parents, to protect them from harm and harmful material. Even if that is not enough, there is technology out there that filters harmful content from children’s computers as well as computers in public places. Society has taken measures that insure safety while users surf the internet. There is no need for government to help regulate online activities and content, unless they have other agendas in the reasons why they support it.

Many laws have been passed and overturned by congress, one of them being the Child Online Protection Act (COPA). Wikipedia.com states that “it is a law in the United States of America, passed in 1998 with the declared purpose of protecting minors from harmful sexual material on the Internet.” Craig A Depken from firstmonday.org argues that “the Internet is not limited by national borders and therefore attempts to limit what is posted on the Internet may be impractical; limits on what can be posted within the borders of the United States (or any other country) could be easily avoided.” The internet is considered text material just like books and newspapers. This gives people the power to add content of any kind and access it and is granted by the right of freedom of speech. If the government or broadband companies try to censor and destroy equality online, this nation will become similar to that of communist China and North Korea.

Network Neutrality is a major issue facing the United States. It may change the way people access information online and have devastating effects on technological innovations, free flow of ideas and the online economy. If nothing is done to preserve net neutrality it will have a lasting effect that will cause the ever evolving entity of the net to stand still. The effect of government support for internet censorship can lead to other types of information and media censorship. It is not up to the government or broadband providers to decide what content people chose to access, it is up to the people themselves.