Hackers Canyon

This site is based on the book
Hackers Canyon
Written by Dirk Lemmons
Some said he lived it others say the canyon never existed.
You be the judge.

Hackers Canyon is the gathering place for all Hackers that want to come and set up camp. It is known for its rough and rowdy internet outlaw gangs. The nerds turned computer Hackers. The gangsters turned computer nerds. The old men finding youth in their computers. Women who will CGI any man to death!

Come on into our canyon if you dare. Bounty hunters will be torn bit by bit, chip by chip, bite by bite!

We offer our Canyon as a refuge to all. Stay clear of strangers in here. Take your time to set up camp. Stake out your plot. Remember time is required for trust.

All we ask is that all Hackers remember our "Code of Hackers". If you don't know it then you will learn.

One last thing, there is an old old man that lurks the Canyon. Honor him when you meet him. He was the first one here. You will know him when you meet him. Remember you can mess with many a person in this canyon but if you mess with him more of us will come running to his aid than you will ever dreamed.

Click them computers to enter



If you enjoy this site read the book.
It has currently been presented to several publishers and is due out soon
If you would like a copy of the book
e-mail
books@Dirkster.com

 

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

I am the  the Grim Reaper
                                       You Reap what you sow
                                       I reap you for all eternity
                                    You determine your own destiny
                                     No Fate but what you make
                            What destiny will you make  yourself for all eternity?
                                        Hacked by Chinese
        Code Red, worm, virus, hacker, hackers, hacking, Internet worm, NIPC, Infrastructure Protection Center
                     Ronald Dick, Code Red,SANS Institute, July 19, Hacked by Chinese,
            Carnegie   Mellon University's Computer Emergency Response Team CERT. Roman Danyliw,
              Melissa and I LoveYou viruses, Russ Cooper of security services company TruSecure Corp,
                             Q300972i.exe , q300972_w2k_sp3_x86_en.exe,
                    Computer Emergency Response Team   Coordination Center (CERT/CC)
                      Dave   McCurdy, executive director of the   Internet Security Alliance
                             Microsoft's IIS 4.0 and 5.0 Web server software
                                            c:notworm
                        Hello! Welcome to http://www.worm.com! Hacked By Chinese
  the NIPC, the Federal  Computer Incident Response Center, Information Technology Association of America, CERT/CC,
                                    SANS Institute, Internet Security Systems and Internet Security Alliance
          Pentagon, National Infrastructure Protection Center, The NIPC and FedCIRC, W32-Leaves.worm,
              SubSeven Trojan, Trojan Horse, Internet Relay Chat (IRC) channels for communications,
                    16959/tcp and 27374/tcp, (202) 323-3204/3205/3206, 1-888-282-0870,
  DDoS Disruption, packet flooding denial of service attacks, Access to these systems has been accomplished primarily through
     compromises exploiting the  bind vulnerabilities in versions 8.2, 8.2-P1, 8.2.1, 8.2.2-Px, as well as the 8.2.3 betas,
            Lion worm, The worm also contacts coollion.51.net (211.100.18.56) and downloads a copy of
           the worm along with several hacking tools, including the "t0rn" rootkit, and Tribe Flood Network client
               (tfn2k). Additionally, a compromised system will have its /etc/hosts.deny file deleted thereby
                      eliminating the host-based perimeter protection afforded by tcp wrappers,
                                         password sniffer,
                    Ida Code Red Worm, Microsoft IIS versions 4.0 or 5.0, Buffer  Overflow,
                                      Ida Code Red Worm is at
              0:00 hours, Greenwich Mean Time (GMT ) on July 20, 2001. This is 8:00 pm Eastern Daylight
             Time (EDT), eEye Digital Security, Microsoft IIS Internet Server Application Program Interface
                               (ISAPI) service,  Idq.dll, National Infrastructure
                                                    Protection Center (NIPC)
                                        Information Warfare,
                                       Microsoft Corporation
                               National Infrastructure Protection Center (NIPC)
                            Federal Computer Incident Response Center (FedCIRC)
                            Information Technology Association of America (ITAA)
                                  CERT Coordination Center (CERT/CC)
                                SANS Institute Internet Security Systems (ISS)
                                      Internet Security Alliance (ISA)
         VBSWG, Win32/Magistr, Win32/BleBla, Win32/Hybris, Win32/MTX, Win32/BadTrans, Kak, Laroux,
        Homepage, Divi, Win32/Navidad, Win32/QAZ, LoveLetter, Tam, Marker, Win32/Msinit, Win32/Funlove
              VCX, Haptime, Ethan, Win32/Ska, Tristate, Melissa, Stealth_Boot, tell me why stop here.
                        smok3, wtf is this site about? im confused. Sammo, 80s Hacker site, smok3,so this is old school hardcore? _DeeChan_ ,HACK THE PLANET, boshi, OMG they got teh gibson!
http://www.genmay.com/showthread.php?t=417101, What brings such hits to our site? Must be bored, Nothing here but a bunch of bored old folk.05/26/09 the change was made to show the way so start your count down and follow the script. Only group Puppy are aproved to proceed. Delta Beta Tony Very Spotted. Bet U can't catch us!