This site is based on the book
Written by Dirk Lemmons
Some said he lived it others say the canyon never existed.
You be the judge.
Hackers Canyon is the gathering place for all Hackers that
want to come and set up camp. It is known for its rough and rowdy internet
outlaw gangs. The nerds turned computer Hackers. The gangsters turned computer
nerds. The old men finding youth in their computers. Women who will CGI
any man to death!
Come on into our canyon if you dare. Bounty hunters will
be torn bit by bit, chip by chip, bite by bite!
We offer our Canyon as a refuge to all. Stay clear of
strangers in here. Take your time to set up camp. Stake out your plot.
Remember time is required for trust.
All we ask is that all Hackers remember our "Code of Hackers".
If you don't know it then you will learn.
One last thing, there is an old old man that lurks the
Canyon. Honor him when you meet him. He was the first one here. You will
know him when you meet him. Remember you can mess with many a person in
this canyon but if you mess with him more of us will come running to his
aid than you will ever dreamed.
Click them computers to enter
If you enjoy this site read the book.
It has currently been presented to several publishers and is due out
If you would like a copy of the book
I am the the Grim Reaper
You Reap what you sow
I reap you for all eternity
You determine your own destiny
No Fate but what you make
What destiny will you make yourself for all eternity?
Hacked by Chinese
Code Red, worm, virus, hacker,
hackers, hacking, Internet worm, NIPC, Infrastructure Protection Center
Ronald Dick, Code Red,SANS Institute, July 19, Hacked by Chinese,
Carnegie Mellon University's Computer Emergency Response Team
CERT. Roman Danyliw,
Melissa and I LoveYou viruses, Russ Cooper of security services company
Q300972i.exe , q300972_w2k_sp3_x86_en.exe,
Computer Emergency Response Team Coordination Center (CERT/CC)
Dave McCurdy, executive director of the Internet
Microsoft's IIS 4.0 and 5.0 Web server software
Hello! Welcome to http://www.worm.com! Hacked By Chinese
the NIPC, the Federal Computer Incident Response Center,
Information Technology Association of America, CERT/CC,
SANS Institute, Internet Security Systems and Internet Security Alliance
Infrastructure Protection Center, The NIPC and FedCIRC, W32-Leaves.worm,
SubSeven Trojan, Trojan Horse, Internet Relay Chat (IRC) channels for communications,
16959/tcp and 27374/tcp, (202) 323-3204/3205/3206, 1-888-282-0870,
DDoS Disruption, packet flooding denial of service attacks,
Access to these systems has been accomplished primarily through
compromises exploiting the bind vulnerabilities
in versions 8.2, 8.2-P1, 8.2.1, 8.2.2-Px, as well as the 8.2.3 betas,
Lion worm, The worm also contacts coollion.51.net (184.108.40.206) and downloads
a copy of
along with several hacking tools, including the "t0rn" rootkit, and Tribe
Flood Network client
(tfn2k). Additionally, a compromised system will have its /etc/hosts.deny
file deleted thereby
eliminating the host-based perimeter protection afforded by tcp wrappers,
Ida Code Red Worm, Microsoft IIS versions 4.0 or 5.0, Buffer Overflow,
Ida Code Red Worm is at
0:00 hours, Greenwich Mean Time (GMT ) on July 20, 2001. This is 8:00 pm
Time (EDT), eEye Digital Security, Microsoft IIS Internet Server Application
(ISAPI) service, Idq.dll, National Infrastructure
Protection Center (NIPC)
National Infrastructure Protection Center (NIPC)
Federal Computer Incident Response Center (FedCIRC)
Information Technology Association of America (ITAA)
CERT Coordination Center (CERT/CC)
SANS Institute Internet Security Systems (ISS)
Internet Security Alliance (ISA)
Win32/BleBla, Win32/Hybris, Win32/MTX, Win32/BadTrans, Kak, Laroux,
Homepage, Divi, Win32/Navidad,
Win32/QAZ, LoveLetter, Tam, Marker, Win32/Msinit, Win32/Funlove
VCX, Haptime, Ethan, Win32/Ska, Tristate, Melissa, Stealth_Boot, tell me
why stop here.
Bet U can't catch us!