Hackers Canyon

This site is based on the book
Hackers Canyon
Written by Dirk Lemmons
Some said he lived it others say the canyon never existed.
You be the judge.

Hackers Canyon is the gathering place for all Hackers that want to come and set up camp. It is known for its rough and rowdy internet outlaw gangs. The nerds turned computer Hackers. The gangsters turned computer nerds. The old men finding youth in their computers. Women who will CGI any man to death!

Come on into our canyon if you dare. Bounty hunters will be torn bit by bit, chip by chip, bite by bite!

We offer our Canyon as a refuge to all. Stay clear of strangers in here. Take your time to set up camp. Stake out your plot. Remember time is required for trust.

All we ask is that all Hackers remember our "Code of Hackers". If you don't know it then you will learn.

One last thing, there is an old old man that lurks the Canyon. Honor him when you meet him. He was the first one here. You will know him when you meet him. Remember you can mess with many a person in this canyon but if you mess with him more of us will come running to his aid than you ever dreamed.

Click them computers to enter

If you enjoy this site read the book.


I am the the Grim Reaper
You Reap what you sow
I reap you for all eternity
You determine your own destiny
No Fate but what you make
What destiny will you make yourself for all eternity?
Hacked by Chinese
Code Red, worm, virus, hacker, hackers, hacking, Internet worm, NIPC, Infrastructure Protection Center
Ronald Dick, Code Red,SANS Institute, July 19, Hacked by Chinese,
Carnegie Mellon University's Computer Emergency Response Team CERT. Roman Danyliw,
Melissa and I LoveYou viruses, Russ Cooper of security services company TruSecure Corp,
Q300972i.exe , q300972_w2k_sp3_x86_en.exe,
Computer Emergency Response Team Coordination Center (CERT/CC)
Dave McCurdy, executive director of the Internet Security Alliance
Microsoft's IIS 4.0 and 5.0 Web server software
Hello! Welcome to http://www.worm.com! Hacked By Chinese
the NIPC, the Federal Computer Incident Response Center, Information Technology Association of America, CERT/CC,
SANS Institute, Internet Security Systems and Internet Security Alliance
Pentagon, National Infrastructure Protection Center, The NIPC and FedCIRC, W32-Leaves.worm,
SubSeven Trojan, Trojan Horse, Internet Relay Chat (IRC) channels for communications,
16959/tcp and 27374/tcp, (202) 323-3204/3205/3206, 1-888-282-0870,
DDoS Disruption, packet flooding denial of service attacks, Access to these systems has been accomplished primarily through
compromises exploiting the bind vulnerabilities in versions 8.2, 8.2-P1, 8.2.1, 8.2.2-Px, as well as the 8.2.3 betas,
Lion worm, The worm also contacts coollion.51.net ( and downloads a copy of
the worm along with several hacking tools, including the "t0rn" rootkit, and Tribe Flood Network client
(tfn2k). Additionally, a compromised system will have its /etc/hosts.deny file deleted thereby
eliminating the host-based perimeter protection afforded by tcp wrappers,
password sniffer,
Ida Code Red Worm, Microsoft IIS versions 4.0 or 5.0, Buffer Overflow,
Ida Code Red Worm is at
0:00 hours, Greenwich Mean Time (GMT ) on July 20, 2001. This is 8:00 pm Eastern Daylight
Time (EDT), eEye Digital Security, Microsoft IIS Internet Server Application Program Interface
(ISAPI) service, Idq.dll, National Infrastructure
Protection Center (NIPC)
Information Warfare,
Microsoft Corporation
National Infrastructure Protection Center (NIPC)
Federal Computer Incident Response Center (FedCIRC)
Information Technology Association of America (ITAA)
CERT Coordination Center (CERT/CC)
SANS Institute Internet Security Systems (ISS)
Internet Security Alliance (ISA)
VBSWG, Win32/Magistr, Win32/BleBla, Win32/Hybris, Win32/MTX, Win32/BadTrans, Kak, Laroux,
Homepage, Divi, Win32/Navidad, Win32/QAZ, LoveLetter, Tam, Marker, Win32/Msinit, Win32/Funlove
VCX, Haptime, Ethan, Win32/Ska, Tristate, Melissa, Stealth_Boot, tell me why stop here.
Bet U can't catch us!