Skip to main content

Fighting back against AOL


Definition: Today I'm going to show you how to make a system crusher that should kill any computer without a surgeprotecter on their phone lines, and some that do.

Materials: model rocket launching detonator (you know what I mean), spare copper wire, electric tape, a power outlet , and some wire cutters.

First step: Look at your detonator, it should have a status light, a launch button, and two wires coming out the fron with metallic clips on the end. Now open up the back and take your batteries out.

Second step: Take some wire and wire one strand of copper to the positive detector in the detonator. Wire the other end of this to the positive side of a car battery. Wrap electric tape around it so it shock you later. Now take another wire and wire it around the negative receptor in the detonator.

**DO NOT CONNECT THIS WIRE TO THE BATTERY**

Third step: You should now have two wires coming out the back of your detonator, one connected to the battery (positive). Now shred the insulation off the phone line your modem is connected to (no, not the one going toward your computer). Attach the metal clips on the front of your detonator to the phone line. It will take a bit of experimenting to get them in the right
place.

Fourth step: Dial up an access, and when you connect, turn off your modem, or unplug the phone line from your computer (not from the wall) unless you want to blow up your own computer. Now carefully check all connections in your detonator-battery hookup. With a plastic-lined pair of tweezers, take the negative wire end and wrap it aroung the receptor on the battery.
Then you probably know what to do:

PRESS THE LAUNCH BUTTON!!!

Targets
Try to kill AOLNet. Sprintnet is better (cause of no tracing, and we are not fighting Sprint (okay, so we are)). A little advice. Get a laptop, bud box, and an extension cord, and set this thing up away from where you live.

Other ways
Make some homemade C-4, a detonator, and find when that number is. Call that operator and say you have a phone number and no address. Sound confused. If that doesn't work them use Jolly Rogers method of getting unlistend numbers. Then bomb there lines, or just there building.

Uses
You could take out that new 28.8 number, or you could take out that 2400 and force them to make a new number. Chances are they will not make a 2400 bps line. Instead they might make another 28.8 line foe ya.

Mail bombs
Mail bomb Guides, TOSAdvisor, Steve Case, TOS Email1, CJs, and HOSTs and of course that phag name MajorTom (Tom Lichty tha guy who writes those lame AOL books), CliffStoll (he caught 5 Russian spies and wrote a book), I hate him. You will lose an account, but then people can't report you to TOS. Also mail bomb EVERYONE you can. Make an account named like JDoe232978, walk into a public room (or even better, one of those damn faggot rooms like M4M4Heat). Just pick a person at random or see which one is tha most phagish and set your mail bomber at 550. Make tha subject like NEVER ASK FOR MY PASSWORD!!! Something to make it look like they did something wrong. This
also helps to keep them from reporting you to TOS, and if they do, their mail box is full. Then let it go. This is not to cause trouble with that person (okay, so it is) it is to stresses out AOLs mail system. That is why there are Ghosts, people with tha name Error, or when you are in a PR and 24+ people are there. That is why chain letters is a "Violation of the Terms of Service." Oh, bite me.

Aqua boxs
AOL is trying to develop a type of Lock and Trace traps like tha F.B.I. uses. It would be a good ideal to make an aqua box. When I make aqua boxes I hook it up to another computer or to a Sega, Nintendo, etc. Just to have tha knowledge that I am playing games with tha Feds.

TOSing
Get a GOOD TOSer. One that works and you canc change what it says. Menace II AOL is my choice. Tha PW is OL' Dirty Bastard. I also use AOF (America Off-Line) IM manipulation (it still works) and IM myself anything. Then I manip. someone who I dislike. Copy it by hitting CRTL+C and then IM a
Guide that is on. Ask him if whoever is on that if XXXXXXX is with tha billing department. Lead them on. They will ask if he asked foe your PW. Say yes and hit CRTL+V to paste it there after he explains how to copy and paste. Make it look like you are lame and new to AOL. Send him tha
manipulated text and he will TOS him/her. Make SuRe that tha person you are TOSing is on. Have a FrankD8981 kinda name.

That is it. Do this to bring AOL to their knees. DON'T GIVE THIS TO AOL STAFF!!!


Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren