Follow us on Twitter!
Understanding is the answer, hatred is the problem, and hackers are the slaves abused and destroyed in the process of peace online - Deshouleres
Friday, December 09, 2016
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 50
Guests Online: 39
Members Online: 11

Registered Members: 96868
Newest Member: khemically
Latest Articles
View Thread

HellBound Hackers | HellBound Hackers | Questions

Page 2 of 2 < 1 2
Author

RE: Safe scenario?

korg
Member



Posts: 2803
Location: ENDING YOUR ONLINE EXPERIENCE!
Joined: 01.01.06
Rank:
God
Posted on 08-02-09 03:57
It's spy's word. Submit it to wiki or merriam webster.


i57.photobucket.com/albums/g215/korg1269/shodan13.jpg

I deal in pain, All life I drain, I dominate, I seal your fate.
O R
Author

RE: Safe scenario?

shadowls
You Like this!



Posts: 842
Location:
Joined: 07.12.06
Rank:
God
Posted on 08-02-09 03:59
Ahh i see.


If you think my post are useful to you, please vote for them. Thank You


knowledge is powerful itself - SHADOWLS


i41.tinypic.com/mjwz7t.jpg

Made by:agentmax69, but remastered by: KvK


Coffee
None None
Author

RE: Safe scenario?


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 08-02-09 15:42
korg wrote:
Fuck it I'm gonna start using it.


Haha me too. Sounds insanely awesome. Nice word.

But, yes I was not speaking of a challenge. Feel free to make it though. I was just getting a vague idea. I would like to learn much, much more on tunneling and algorithms though tunneling. How exactly would that work? All the information being transferred would be encrypted with the algorithm chosen by the rooter via the tunnel?
If anyone would maybe like to talk 1 on 1 to give me a greater understanding on tunneling or have a bangin' article on it would be much appreciated.
Author

RE: Safe scenario?

shadowls
You Like this!



Posts: 842
Location:
Joined: 07.12.06
Rank:
God
Posted on 08-02-09 17:40
chronicburst wrote:
korg wrote:
Fuck it I'm gonna start using it.


Haha me too. Sounds insanely awesome. Nice word.

But, yes I was not speaking of a challenge. Feel free to make it though. I was just getting a vague idea. I would like to learn much, much more on tunneling and algorithms though tunneling. How exactly would that work? All the information being transferred would be encrypted with the algorithm chosen by the rooter via the tunnel?
If anyone would maybe like to talk 1 on 1 to give me a greater understanding on tunneling or have a bangin' article on it would be much appreciated.



Ahh, at first i thought it was a challenge. But i guess i was wrong.


If you think my post are useful to you, please vote for them. Thank You


knowledge is powerful itself - SHADOWLS


i41.tinypic.com/mjwz7t.jpg

Made by:agentmax69, but remastered by: KvK


Coffee
None None
Page 2 of 2 < 1 2