Well, after hanging around this forum for a few months and reading all this interesting stuff posted by people infintely smarter than i am, i've decided to humbly come forward and ask a question. (to make it as short as possible) An older friend of mine was laid off by some company where he was their IT guy, he thought it was unfair, so now he wants to be malicious and recruited me to assist him. *in theory* he told me that we were going to use a VPN to connect to them, use a company username/pw, map a network drive, and then delete some necessary file(s) for their company to run and maybe drop mydoom or something as well. now i'm not going to pretend like i have this stuff wired, but from what i have so far, i think i understand it. My question is, if an IP cloak is used, how efficient would it be from having us traced? Would it depend on how good of a cloak it is? Because he told me he was making one himself. Any information would be appreciated, sincere apologies if this question is useless/i'm an idiot for asking/i've bothered you by seeking help or anything related. Oh yea, and if insults/criticism comes, please don't hurt me, i'm just a child :) delete/lock this post if it isn't worth anyone's effort. Thank you for your time.
Announcement
Collapse
No announcement yet.
VPN's and such
Collapse
This topic is closed.
X
X
-
I hope you get caught and go to jail. Its people like you that give the rest of us a bad name. I cant believe you would even pose this question if you really had been lurking here for a while.
I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me
-
Originally posted by counter-strikeWell, after hanging around this forum for a few months and reading all this interesting stuff posted by people infintely smarter than i am, i've decided to humbly come forward and ask a question. (to make it as short as possible) An older friend of mine was laid off by some company where he was their IT guy, he thought it was unfair, so now he wants to be malicious and recruited me to assist him. *in theory* he told me that we were going to use a VPN to connect to them, use a company username/pw, map a network drive, and then delete some necessary file(s) for their company to run and maybe drop mydoom or something as well. now i'm not going to pretend like i have this stuff wired, but from what i have so far, i think i understand it. My question is, if an IP cloak is used, how efficient would it be from having us traced? Would it depend on how good of a cloak it is? Because he told me he was making one himself. Any information would be appreciated, sincere apologies if this question is useless/i'm an idiot for asking/i've bothered you by seeking help or anything related. Oh yea, and if insults/criticism comes, please don't hurt me, i'm just a child :) delete/lock this post if it isn't worth anyone's effort. Thank you for your time.
You have GOT to be kidding me.
Eat hot death short bus.
The IP Address is: 64.175.37.154. The host name is: adsl-64-175-37-154.dsl.pltn13.pacbell.net.
Gr8sk8r21@yahoo.com
FYI. I have sent a copy of this post to abuse@pacbell.net
Moron.perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'
Comment
Comment