 |
Wednesday, June 12, 2002 |
What happens when you float a counterfeit IIS hole in a carder chatroom on IRC, tantalizing its young denizens with a quick, easy score? Do they proxy up, patiently enumerate the site, grab banners, analyze what they're up against and carefully plot an attack? Or do they rush into the trap like so many elite lemmings?
17:40
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|