* How can I crash a person's ICQ client using flaws in the ICQ homepage feature? * Protecting yourself against DB corruptions. * Using spoofing to corrupt a person's DB. * Using spoofing to play pranks on people * How do they work, and why are such things possible? Version 1.2: added the "what's new" thing. (Send comments or questions to or post them on our message board at ) Use this information in order to protect yourself.If you want to impress someone, the best way is to protect him, not to attack him. Also, I am not responsible for anything you do, but I do recommend that you won't start stealing everyone's passwords and flooding people etc'. Oh, by the way, I just want you to understand that I am writing this tutorial in order to teach people how to protect themselves. Well, I'm kinda tired of doing so, and I'd rather spend my precious time on writing the actual content, so please read my previous tutorials first. ![]() * Until recently, I had to repeat concepts and terminology that I already explained about in previous tutorials so people who are just reading my first tutorial won't have any difficulties understanding it. ![]() Otherwise, you might not understand some of the terminology. Change Mirror Download The ICQ Security Tutorial / Written by R a v e N ()Īuthor's notes: I'm getting tired of repeating myself*, so please read my previous tutorials (located at ).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |