        ĳ
                                +-+-+-+-+-+-+-+-+
         ۲|O|u|t|b|r|e|a|k|𰰰
                                +-+-+-+-+-+-+-+-+
                             Issue #3 - Page 1 of 12 
        ĳ                            
 			             The KEY
          	      ----------Trojans  unribbed----------
		              by `das<<<`amatier>>>

	
Ok, most hacking channels all across the world claim they despise the word
trojan. To start things off, a trojan is a brand name for a condom, this is not
the trojan I am referring to. The trojan I am speaking about is also not an
ancient Greek warrior.  Trojan Horses are not viruses, though they are often
thought of as such. A Trojan Horse is a program that appears to serve some
useful purpose (which encourages you to run it), but hidden within it is a
destructive program, which may damage files or allow a intruder access to your
computer via TCP/IP port. I'm not going into the long boring text on what
trojans are, what they do, or tell you which ones I like to use. But if you do
some research there is some really fucking cool-ass-high-speed trojans floating
around I'm also not going to explain the best types of trojans to use or what a
port is. I'm going to defend hackers' rights to use such a thing as a tool. Yes
trojans can be very useful to a hacker.  I'm not talking about those cheesy
malicious Trojans were you make the hosts CD-ROM tray open or close, even Del
command.com on his computer because that's just lame shit. Some trojans are
very useful. Ones that can infect a computer and the trojan will even message
you when the host is online. But that's not too great. The ultimate I used one
day.  Me and a buddy of mine wanted to get some kind of revenge on this guy. He
was a major asshole. We knew it was just too hard to say, "Ya I'm going to hack
his box." because it isn't that easy. Some of you might snicker to yourselves
and think hacking is easy hehehehe, but we all no it's not all point and click
and you're in.

Ok. So we wanted to get back at this guy, we went down on a checklist on how we
could get at this guy. We started off by thinking where his life can go wrong.
The first thing that came to mine is making it look like a suicide attempt.. naw
that wouldn't do, too easy. My friend said ya he is screwing this other chick
that we worked in the same building as us. That's it we can fuck his life over.
My buddy was getting real excited saying, "You fucker, what are you going to
do." I told him wait till tomorrow. Well it was tomorrow; my buddy was dying to
know what scheme I come up with. I gave him a floppy disk; he was like this is
it. I'm like fuck yak this is it. I wrote on the diskette, "Card Games" I knew
he liked to play games during his lunch break off a floppy disk. I told my buddy
<AKA> TDC=TheDarkCRow. Drop this one on his desk. TDC said, "No way too risky.
What the fuck is it."  I said, "This is the Key." After an explanation, he
agreed. Well, what is on the disk is a trojan that I myself did not write but
know the author of the trojan. We call the trojan, "The Key." Anyway, after TDC
put the disk on his desk we waited for like a week. Nothing happened. TDC said
to me, "Your plan sucks it's not working." We totally forgot about it. A week
later TDC was at my house drinking and we always hang out near my LAN. I checked
my mail and in my mailbox was exactly what I was waiting for. A few passwords
from this fucker that we wanted to get an even score with. Now we have his e-
mail address and his wifes e-mail, AOL accounts, passwords is ISP passwords. We
did a high 5 and a cheers. We started off by e-mailing his wife love letters
from this chick that her husband was screwing. Acting like it was his e-mail
address. We also stole his address book for the fact we had a key into his box.
We started e-mailing to all his e-mail addresses saying he was leaving his wife
because he had found something better. We also were dialing from his ISP account
checking his E-mail as we sent them, left the e-mails on the server so he could
check his mail from home to, So he did not suspect anything happening to him. We
also e-mailed his girlfriend saying that they had to break off the fling they
were having. But we e-mailed it from his wife's account hoping that she would
reply to it. Well she did since our little venture. This dickhead has no more
life, no wife, and no girlfriend. But he still works in our building. Only
because we allow him to. Now when TDC and me see him in the hall or pass near
his office we high 5 it. Chuckle and lol. Now I really didn't wipe out the guys
computer or give him a fucking virus I used a key and yes if you can use a key
to get in. Why in the fuck would you go around the back of the house and break
down a door so the dog inside can eat you, hehehe. Lamers.

TDC and me have had many more adventures like this one, but even better. This
was just the first one so I thought I would share it with you. There is even
more useful ways to enjoy keys; this one is more or less mild, as a hacker would
say. What TDC and I did was illegal, inhuman and as a hacker would say, "That's
lame." or  "That's lame man." hehe. ',)

The Moral to this story is "What a fucking blast trojans can be." I wish I had
more patience to write more ... I would go into detail on how TDC and I uploaded
child porn onto this lamers box and made shortcuts from the desktop to them.

Another thing, if you find a floppy disk and don't know were the fuck it came
from don't be stupid and put it into your box.

							Enjoy `,) 
						            `amatier

 ---------------------------------------------------------------------
I have seen the future, and have seen the past, and yes, our master is thier.<<<`das`amatier>>> hacking into the realm...................................................
 --------------------------------------------------------------------- 
