[ Pobierz całość w formacie PDF ]
.Youcan download it from http://www.super-highway.net/users/govil/mirc40.html.It includes protection from ICMP ping flood.But this program isn’t enoughto handle all the IRC wars you may encounter.So you may wish to add theprotection of the most user-friendly, powerful Windows 95 war scriptaround: 7th Sphere.You can get it from http://www.localnet.com/~marcraz/. If you surf IRC from a Unix box, you’ll want to try out IRCII.You can download it from ftp.undernet.org , in the directory /pub/irc/clients/unix,or http://www.irchelp.org/, or ftp://cs-ftp.bu.edu/irc/.For added protection,you may download LiCe from ftp://ftp.cibola.net/pub/irc/scripts.Ahem,at this same site you can also download the attack program Tick from /pub/irc/tick.But if you get Tick, just remember our “You can get punched in the nose”warning!*********************************Newbie note: For detailed instructions on how to run these IRC programs,seeAt http://www.irchelp.org/. Or go to Usenet and check out alt.irc.questions******************************************************************Evil genius tip: Want to know every excruciating technical detail aboutIRC? Check out RFC 1459 (The IRC protocol).You can find many copies ofthis ever popular RFC (Request for Comments) by doing a Web search.******************************** Now let’s suppose you are all set up with an industrial strengthIRC client program and war scripts.Does this mean you are ready to goto war on IRC? Us Happy Hacker folks don’t recommend attacking people who takeover OP status by force on IRC. Even if the other guys start it,remember this.If they were able to sneak into the channel and get OPsjust like that, then chances are they are much more experienced and dangerousthan you are. Until you become an IRC master yourself, we suggestyou do no more than ask politely for OPs back. Better yet, "/ignore nick" the l00zer and join another channel. For instance, if #evilhaxorchat is taken over, just create #evilhaxorchat2and "/invite IRCfriend" all your friends there.And remember to use whatyou learned in this Guide about the IRC whois command so that you DON’TOP people unless you know who they are. As Patrick Rutledge says, this might sound like a wimp move, butif you don't have a fighting chance, don't try - it might be more embarrassingfor you in the long run.And if you start IRC warrioring and get K:linedoff the system, just think about that purple nose and black eye you couldget when all the other IRC dudes at your ISP or school find out who wasthe luser who got everyone banned. That’s it for now.Now don’t try any funny stuff, OK? Oh, no,they’re nuking meee.____________________________________________________________Subscribe to our discussion list by emailing to hacker@techbroker.comwith message "subscribe"Want to share some kewl stuph with the Happy Hacker list? Correct mistakes?Send your messages to hacker@techbroker.com. To send me confidentialemail (please, no discussions of illegal activities) use cmeinel@techbroker.comand be sure to state in your message that you want me to keep this confidential.If you wish your message posted anonymously, please say so! Direct flamesto dev/null@techbroker.com.Happy hacking!Copyright 1997 Carolyn P.Meinel.You may forward or post this GUIDETO (mostly) HARMLESS HACKING on your Web site as long as you leave thisnotice at the end.________________________________________________________ ___________________________________________________________GUIDE TO (mostly) HARMLESS HACKINGVol 3 Number 4How to ReadEmail Headers and Find Internet HostsWarning: flamebait enclosed!____________________________________________________________OK, OK, you 31337 haxors win.I’m finally releasing the next in ourseries of Guides oriented toward the intermediate hacker.Now some of you may think that headers are too simple or boring to wastetime on.However, a few weeks ago I asked the 3000+ readers of the HappyHacker list if anyone could tell me exactly what email tricks I was playingin the process of mailing out the Digests.But not one person replied witha complete answer -- or even 75% of the answer -- or even suspected thatfor months almost all Happy Hacker mailings have doubled as protests.Thetargets: ISPs offering download sites for email bomber programs.Conclusion:it is time to talk headers!In this Guide we will learn:· what is a header· why headers are fun· how to see full headers· what all that stuff in your headers means· how to get the names of Internet host computers from yourheaders· the foundation for understanding the forging of email andUsenet posts, catching the people who forge headers, and the theory behindthose email bomber programs that can bring an entire Internet Service Provider(ISP) to its kneesThis is a Guide you can make at least some use of without getting ashell account or installing some form of Unix on your home computer.Allyou need is to be able to send and receive email, and you are in business.However, if you do have a shell account, you can do much more with decipheringheaders.Viva Unix!Headers may sound like a boring topic.Heck, the Eudora email programnamed the button you click to read full headers “blah blah blah.” But allthose guys who tell you headers are boring are either ignorant -- or elseafraid you’ll open a wonderful chest full of hacker insights.Yes, everyemail header you check out has the potential to unearth a treasure hiddenin some back alley of the Internet.Now headers may seem simple enough to be a topic for one of our Beginners’Series Guides.But when I went to look up the topic of headers in my libraryof manuals, I was shocked to find that most of them don’t even cover thetopic.The two I found that did cover headers said almost nothing aboutthem.Even the relevant RFC 822 is pretty vague
[ Pobierz całość w formacie PDF ]