Please turn on your JavaScript for this page to function normally.
JAWZ and Emagebox.com Develop Secure Applications for Advertising and Entertainment Industry

FAIRFIELD, N.J. & TORONTO–(BUSINESS WIRE)–May 3, 2001–JAWZ Inc. (Nasdaq:JAWZ), a leading provider of secure information management solutions, and …

Enterasys Networks Products Named Finalists in Multiple Categories for Best of Show Awards At NetWorld+Interop

ROCHESTER, N.H.–(BUSINESS WIRE)–May 3, 2001– Enterasys Networks(TM) today announced that two of its networking products were named by CMP Media’s …

Beat Hackers At Their Own Game

[Johannesburg, 2 May 2001] – Ernst & Young aims to teach corporate South Africa to break into Windows NT, Windows 2K and Unix systems and use Internet-facing …

Ositis Software’s New WinProxy 4.0 Internet Connection Sharing and Firewall Software Adds Customizable Alerts, Enhanced User Access Controls & Outgoing Virus Scanning

PLEASANTON, Calif–(BUSINESS WIRE)–May 1, 2001– Ositis Software, a leading developer of connectivity and Internet access technologies for Windows platforms, …

ISS Expands Information Protection Platform with Advanced Desktop Security and Highly Scalable Management System

Conference Calls and Web Casts to be held 8:30 AM, EDT and 10:30 AM, EDT on Tuesday, May 1, 2001 ATLANTA, Ga. – April 30, 2001 – Internet Security Systems (ISS) …

[ The History of MOD ] – book five

MODmodMODmodMODmodMODmodMODmodMOD ================================= MOD.book.FIVE: Who are they and where did they come from? ————- Well, it’s …

[ The History of MOD ] – book four

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoD ================================= MOD.book.FOUR [End of ’90-1991] Two weeks before his bust, Lord Micro was introduced into the group. …

[ The History of MOD ] – book three

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK THREE: A Kick In The Groin Well, suffice it to say, the fun couldn’t last …

[ The History of MOD ] – book two

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK TWO: Creative Mindz With the addition of The Wing, came a shitload of pranks …

[ The History of MOD ] – book one

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK ONE: The Originals In the early part of 1987, there were numerous amounts of …

HoHoCon 1993

This file will appear in a future cDc publication… December, 1993 ———————— Loosely based on the Exploits of HoHoCon 1993. …

Hacking Voice Mail Systems

Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it works is that somebody …

Don't miss

Cybersecurity news