Well…..

Go to Start, then Run…
You have to Telnet (Xserver) on port 25
Well, (In this Xserver) you have to put the name of a server without the ( ) of course…
Put in iname.com in (Xserver) because it always work it is a server with many bugs in it.
(25) mail port.
So now we are like this.
telnet iname.com 25
and then you hit enter
Then When you have telnet open put the following like it is written
helo

and the machine will reply with smth.
Notice for newbies: If you do not see what you are writing go to Terminal’s menu (in telnet) then to Preferences and in the Terminal Options you tick all options available and in the emulation menu that’s the following one you have to tick the second option.
Now you will see what you are writing.
then you put:

mail from:<[email protected]> and so on…
If you make an error start all over again

Example:
mail from:<[email protected]>
You hit enter and then you put:
rcpt to:<lamer@lamer’sworld.com>
This one has to be an existance address as you are mailing anonymously to him.
Then you hit enter
And you type
Data
and hit enter once more
Then you write
Subject: whatever
And you hit enter
you write your mail
hit enter again (boring)
you put a simple:
Yes you don’t see it it’s the little F**king point!
and hit enter
Finally you write
quit
hit enter one more time
and it’s done

look: Try first do it with yourself I mean mail anonymously yourself so you can test it!
Don’t be asshole and write f**king e-mails to big corps. Because its symbol of stupidity and childhood and it has very much effect on Hackers they will treat you as a Lamer!

Anonymous

Explore More

Several avast sites were defaces

Last month, eight sites at once well-known anti-virus solutions avast!  Were defaces: http://www.avast.co.za/ (mirror; date: 2010-01-22 15:06:28) http://awast.org/ (mirror; date: 2010-02-18 18:57:27) http://www.avast.de/ (mirror; date: 2010-02-18 18:58:01) http://shop.avast.de/ (mirror; date:

Hacked Information and Proof of Concept @ PlanetCreator.net

“Hacking” In this category, We’re going to post Hacker’s proof-of-concept. Unless you know how to hack, you can not defend yourself from hackers. We’ll know how hack hacks and how

What are the components of a security evaluation?

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure