Well…..

Go to Start, then Run…
You have to Telnet (Xserver) on port 25
Well, (In this Xserver) you have to put the name of a server without the ( ) of course…
Put in iname.com in (Xserver) because it always work it is a server with many bugs in it.
(25) mail port.
So now we are like this.
telnet iname.com 25
and then you hit enter
Then When you have telnet open put the following like it is written
helo

and the machine will reply with smth.
Notice for newbies: If you do not see what you are writing go to Terminal’s menu (in telnet) then to Preferences and in the Terminal Options you tick all options available and in the emulation menu that’s the following one you have to tick the second option.
Now you will see what you are writing.
then you put:

mail from:<[email protected]> and so on…
If you make an error start all over again

Example:
mail from:<[email protected]>
You hit enter and then you put:
rcpt to:<lamer@lamer’sworld.com>
This one has to be an existance address as you are mailing anonymously to him.
Then you hit enter
And you type
Data
and hit enter once more
Then you write
Subject: whatever
And you hit enter
you write your mail
hit enter again (boring)
you put a simple:
Yes you don’t see it it’s the little F**king point!
and hit enter
Finally you write
quit
hit enter one more time
and it’s done

look: Try first do it with yourself I mean mail anonymously yourself so you can test it!
Don’t be asshole and write f**king e-mails to big corps. Because its symbol of stupidity and childhood and it has very much effect on Hackers they will treat you as a Lamer!

Anonymous

Explore More

Double Your Defense with a Double Firewall

If you have a home network router, your computer and other computers on the network (such as your spouse’s laptop and your children’s computer) are protected from the outside world.

LDAP Injection Vulnerabilities

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

What are the steps for security evaluation?

The ethical hacking project comprises three phases, summarized as follows: 1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to