| Welcome to Corrupt Pures. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| Hacked | |
|---|---|
| Tweet Topic Started: May 25 2007, 08:18 AM (548 Views) | |
| Shexy Fhagex | May 26 2007, 02:16 AM Post #21 |
![]()
Guard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
DO YOU USE THE SAME PASS FOR CP FORAMS AS ROONSCAPE? Spamming is fun! Group: Old School Member Posts: 569 Member No.: 458 Joined: 29-May 06 its called a Brute forcer - Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach. Crackers are sometimes used in an organization to test network security, although their more common use is for malicious attacks. Some variations, such as L0phtcrack from L0pht Heavy Industries, start by making assumptions, based on knowledge of common or organization-centered practices and then apply brute force to crack the rest of the data. L0phtcrack uses brute force to crack Windows NT passwords from a workstation. PC Magazine reported that a system administrator who used the program from a Windows 95 terminal with no administrative privileges, was able to uncover 85 percent of office passwords within twenty minutes. Very illegal, but the koreans, make them...just to hack into accounts, instead of simply wcing, or fishing or rune buying their own stuff, they hack into accounts, they get over 20 accounts a day!...and they use your account...to wc LOL They change the IP every 5 tries, so it doesnt get the "To many incorrect logins" And it guesses over 2000 passwords a minute... You got owned.... I would pay so much for your account if it didnt have def... |
|
weeee.... Im almost back cp, after so many tries. | |
![]() |
|
| Hax0r Luke | May 26 2007, 07:32 AM Post #22 |
|
Unregistered
|
There's a runescape ghost going around, logging onto your accounts while you sleep at night, dreaming about RS. |
|
|
| +hurt me fool|jynx | May 26 2007, 06:35 PM Post #23 |
![]()
|
lol luke ima dl mirc now
|
![]() [SIZE=7] http://img49.imageshack.us/my.php?image=lmaozq7.png http://z3.invisionfree.com/Corrupt_Pures/i...topic=5586&st=0 [SIZE=7]permenatly banned 16/6/2007 hurt me fool / v jynx v | |
![]() |
|
| Scim Of Dead | May 26 2007, 10:11 PM Post #24 |
|
should be honored guest
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Tbh i dont think it is Swift since they havent updated it in a month or so.. and they were safe before.. maybe just some nerd guesing ppls pass's 24 hrs a day My opionion
|
| once upon a time.. | |
![]() |
|
| <>Mighty Irwin | May 26 2007, 11:16 PM Post #25 |
![]()
I Am Mighter.
![]()
|
All these nerd hacking programs are going to fuck me up soon. It's only a matter of time =[ |
![]() ![]() "Try not to become a man of success, but rather a man of value." - A. Einstein ~ Mighty Irwin ~(pure) Str 99-99 - May 27, 2007 Att 61-60 Range 72-75 Mage 82-82 Hp 82- ? Prayer 52-52 Desert Treasure Mith Gloves Whip Pks: 12 | |
![]() |
|
| +Magerz | May 27 2007, 07:45 PM Post #26 |
![]()
|
Dam im korean.. i better ask my cousin for one of them programs |
![]() |
|
| Omni--Fury | May 28 2007, 12:41 AM Post #27 |
|
O rly?
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
racist
|
| retired | |
![]() |
|
| +to0k ur sk1m | May 28 2007, 07:00 PM Post #28 |
|
99 Range Mauler, Ftw.
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
what is it?
|
![]() ![]() 99 range accomplished on: September 6th, 2007. HACKED FOR 22 DEF August 7th, 2007. CP since: 23-January 2007 | |
![]() |
|
| +je5us_k0d_u | May 28 2007, 09:54 PM Post #29 |
![]()
|
i hope the ss thing isnt true, i guess i will find out sooner or later because im not uninstalling. i love the built in calcs etc glad he didnt get you defense
|
![]() | |
![]() |
|
| +Semi™ | May 28 2007, 10:14 PM Post #30 |
![]()
NoStarvAsianLax
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
cracking is dead PassCracking was killed when jagex updated their WEBSITE, not the game itself. You see, passcracking never accessed the game at all, it used the runescape website. From there it would attempt to log into different URLS on the website. For example, when you want to check your messages on runescape.com, you LOG IN. This is where passcracking's place was. In the URL it would fill out the username you were trying to crack and then a password. Then once that web page loaded, it would see if the page said that we were in, or if we had the pass incorrect. We could do this hundreds of times before runescape's server would block us. Runescape.com had 9 different servers. By the time your computer had attempted 200 times at each server, the blocks against your IP address had refreshed, and you could reloop. This was infinite. Then JaGex came along and made it so instead of 200 times per server, it was 5. And instead of a 3 minute ban it changed to 10. This killed passcracking. |
<centeR>![]() ![]()
| |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| Go to Next Page | |
| « Previous Topic · Runescape Discussion · Next Topic » |
| Track Topic · E-mail Topic |
12:18 PM Jul 13
|
