User Controls

Hello

  1. #21
    Føx Yung Blood
    Originally posted by infinityshock anyone that stupid shouldnt be online

    i remember asking the same question back in the day and they told me to press alt+f4 to open the menu

    devastation
  2. #22
    infinityshock Black Hole
    Originally posted by Føx i remember asking the same question back in the day and they told me to press alt+f4 to open the menu

    devastation

    better than format C:
  3. #23
    Kingoffrogs Appendage of Stan
    Originally posted by Currently Unknown Hello, I have infiltrated your website through using the most exquisite techniques to become a new member because fuck having real life friends, and if you don't wanna be my friend, fuck you.

    Yeah I said it, what are you gonna do about it pussy? If try to fight me IRL I'll helicopter smack the shit out of you as my torso and can rotate 360 degrees like an owl's head so you'll never see it coming. Bet you're scared now. You know why you are? BECAUSE YOU'RE A PUSSY, PUSSY!

    Anyways, y'all seem cool so I decided to make your life harder because why the fuck not?

    - CU

    'nother alt

    case closed
  4. #24
    Originally posted by infinityshock better than format C:

    clickme.bat
    c:\con\con

    Blue screen of death.
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. #25
    infinityshock Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ clickme.bat
    c:\con\con

    Blue screen of death.

    Almost as good as modern 'killware'
  6. #26
    Originally posted by infinityshock Almost as good as modern 'killware'

    That JPG of Death was genius, too. Simply hover your mouse over the .jpg file (or click it) and the backdoor is instantly installed, executed and ready for full remote access to the system. People shit their pants. Worldwide. It was funny to watch.
  7. #27
    infinityshock Black Hole
    Originally posted by ⠀⠀⠀⠀⠀⠀ That JPG of Death was genius, too. Simply hover your mouse over the .jpg file (or click it) and the backdoor is instantly installed, executed and ready for full remote access to the system. People shit their pants. Worldwide. It was funny to watch.

    there was another one that would fry graphics cards...or at least lock them up for a restart
  8. #28
    🐈 Yung Blood
    oh yea what about the ole "ur cpu doesnt' need system32 2 operate" text that was a real nuisance back in the day
  9. #29
    🐈 Yung Blood
    phishing people on AIM by making an account that said something along the lines of 'password support' or something and getting them to send me their password then changing it immediately on another instance of AIM and then fucking with everyone on their friends list. people *used to be* so dumb online and with online shit it was ridiculous
  10. #30
    Originally posted by infinityshock there was another one that would fry graphics cards…or at least lock them up for a restart

    Yes, I remember that. It could fry a $2,000 video card in a split second and turn it into a paperweight. What it did was overwrite the BIOS with garbage, so you couldn't get back in it to replace the BIOS with a real one. Nasty shit.
  11. #31
    Originally posted by 🐈 phishing people on AIM by making an account that said something along the lines of 'password support' or something and getting them to send me their password then changing it immediately on another instance of AIM and then fucking with everyone on their friends list. people *used to be* so dumb online and with online shit it was ridiculous

    Then there was that ICQ hack that went unaddressed for years, where you had a client-side panel that could capture any message going across the ICQ network and you were able to edit the text itself, the sender, or receiver in transit, before it even reached its destination. The people receiving the messages had no idea the middleman had spoofed the message, so they thought it was a legitimate sender and legitimate text from that sender. You could even edit the messages so you would have one sender sending messages to himself. Good, classic times, where you either sunk or swam. Nothing like today.
  12. #32
    Originally posted by infinityshock post nude selfies of self-identifying as attack helicopter

    attack helicopter

  13. #33
    That should have been a spoiler, benny.
  14. #34
    Originally posted by ⠀⠀⠀⠀⠀⠀ That should have been a spoiler, benny.

    am i spoiling you ?
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. #35
    🐈 Yung Blood
    Originally posted by ⠀⠀⠀⠀⠀⠀ That should have been a spoiler, benny.

    maybe back in 2020. its 2024 now
  16. #36
    Føx Yung Blood
    Originally posted by ⠀⠀⠀⠀⠀⠀ Yes, I remember that. It could fry a $2,000 video card in a split second and turn it into a paperweight. What it did was overwrite the BIOS with garbage, so you couldn't get back in it to replace the BIOS with a real one. Nasty shit.

    I call bullshit. What was this exploit called, when was it around, what lines and gens of GPUs did it work on. You expect me to believe you, Spectral, are capable of such a hack? You’d need highly specialized knowledge of specific hardware architecture of targeted systems, low level programming knowledge, and probably some reverse engineering involved. And how would you deliver the exploit other than physical access and if you have access and the whole point is to brick it why not just pour water on the fucker?

    Explain with specific details, or lying
  17. #37
    Heap overflows allow you to run any kind of code on the target system, which can also be targeted to any piece of hardware on the system..

    https://en.wikipedia.org/wiki/Heap_overflow
  18. #38
    more like hip overflow after getting done by a bunch of well endowed negroes
  19. #39
    https://en.wikipedia.org/wiki/Shellcode
  20. #40
    Modern programs use Unicode strings to allow internationalization of text. Often, these programs will convert incoming ASCII strings to Unicode before processing them. Unicode strings encoded in UTF-16 use two bytes to encode each character (or four bytes for some special characters). When an ASCII (Latin-1 in general) string is transformed into UTF-16, a zero byte is inserted after each byte in the original string. Obscou proved in Phrack 61[13] that it is possible to write shellcode that can run successfully after this transformation. Programs that can automatically encode any shellcode into betanumeric UTF-16-proof shellcode exist, based on the same principle of a small self-modifying decoder that decodes the original shellcode.
Jump to Top