View Single Post
Old 02.12.2009, 03:52 PM   #23
█████████
expwy. to yr skull
 
█████████'s Avatar
 
Join Date: Nov 2007
Posts: 1,736
█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses█████████ kicks all y'all's asses
right now, i'm connected to a public wi-fi hotspot, if i was a cowardspamcocksucker, i could have turned on a mac adress spoofing tool and got connected to something like tor in order to encrypt and prevent my traffic from being monitored locally.
that would've made my machine relativly anonymous.
then all i would need to do is to determine the mx records of the receiver's email adress and use telnet to connect to the servers and send the mail (preferably using an address known by the receiver)
and that would be it.
would i be untraceable? obviously not, though probably by the time (if) i got tracked down it would be useless.
█████████ is offline   |QUOTE AND REPLY|