Line cracker is a program used to bomb and upload viruses to phones, phone lines, anwering machines, pagers, networks, pay phones, fax machines etc... This is not a program you simply just want to kick back and play with. This program can get you in very big shit. Enough charges can be put against you to have you put in jail. So DO NOT USE THIS PROGRAM UNLESS YOU KNOW WHAT YOUR DOING. I prefer that you do not use your home computer when working with this program. Okay.. Enough with the legal crap. Now I think I should tell you the real damage this program can cause. Let's start with pagers....
(please disregard any spelling errors, as I was too tired to go over everything I had wrote)
• PAGERS
There are many pager bombers you can download on-line but none of them do half of what this program does. When attacking a pager, you not only bomb the pager and upload a virus to the device, but your also creating an overload in the pager network, as well as destroying the pager. Sending about 100 pager bombs and viruses will create so much network bandwith that pagers currently recieving data from the network will not be able to recieve any pages because of the overload caused by your attack. This means the pager will not recieve each bomb/virus second by second. When bombing the pager, you are then uploading a virus to the pager... But... Before the pager recieves anything, everything goes through the pager network first. Doing this so many times may cause a huge overload in the system causing a huge crash. Pretty cool, huh? That's nothin... Check this out... Since pagers recieve all transmitted data from the network by their reciever, this means that everything you send out to the network when dialing the pager number, is sent to the pager using frequency codes. The pager network can take dial tones, and send them out to certiain signals in which the pager picks up, then pagers reconozing the data within the signal can display it on the tiny LCD screen. Now, as well as bombing, Line Cracker also uploads viruses while this automatic process is taking place. This means that the virus is sent out into a signal, then picked up by the pager. This means the virus it's self is being carried by the signal into the pager. Some times part of the signal will dose off and just be out there, in the middle of nowhere waiting to be recieved. Since the virus is within the signal, it can be picked up by anything such as a telephone, any kind of communication device, walkie talkie, anything that is remotely controlled, radio, remote controled cars, TV's etc... The chances of this happening can be small at times. But as population increases day by day, more and more signals are traveling through air waves. This proccess can be used as turning your modem into a part time transmitter while sending data through a pager network.
I hope you understood what I was talking about. I am trying to explain this in ENGLISH. Enough with pagers... Your about to find out where all the real fun starts....
• Phones / Phone lines
Ahhh.. Yesssss.... There's nothing better than taking over and destroying phone lines. You can easly use this program to take over someones phone. Or phone line rather... Or even better, you can use this program to take over a huge line, such as the information line - 411 or some kind of organization which has a whole grip of operators standing by, waiting for your call. Say you wanted to take over the information line, 411. No problem! Just punch those digits in, and your on a roll. Each time Line Cracker executes a hangs up after uploading the virus, it will then automaticly loop again executing another dial command with the modem. This means each time Line Cracker would automaticly bomb the 411 information network, a different opperator would pick up each time. Now, if you could imagine what chaos that would cause. Could you imagine what that would actualy look like? Now, your probibly thinking... Can't they trace my number? Well, according to test's I have ran on the program, it's just about impossible. It takes around a minute or so to trace a call to an exact location. Line Cracker terminates each connection every 3 seconds before looping again..... But, you still should not try it from your home computer unless your willing to take a risk. In order to not get caught, you have to be smart.... Before doing that, I suggest you get the fealing of what it's like to take someones phone over, and build up a strategy.
• Phucking up Answering Machines
This really depends on the answering machine. I have not really tested this program on answering machines much. Answering machines may only be bombed ONCE. By pressing the 'NOW' when you hear the answering machine come on, which will then start the automatic loop. It may, or may not take 3 seconds for the answering machine to come on while on the next attack. While bombing an answering machine, you, of course, are also uploading a virus to it as well... This can sqrew anything up... Anything from the LCD, to the tape... Why don't you try it out sometime!
• Taking over/Destroying Payphones
This is really fun. This gets people all wacked up. This will make you wanna shout "HAHAA POWER!!". Now, we all know there is nothing more fun than taking over a public utility simply by sitting on your ass all day punching keys. Just go up to a payphone, and write down it's number. Then bomb it. While you bomb it, it of course, uploads a virus as well. I never really tried a payphone, but im sure it's ALOT of fun. Don't get caught tho. You have to take risks on things like this!
Well, there was a breif overlook at one of my programs. The U.C.A does not publicly distribute all of it's software, beacause most of it, is not ment for public use. Your not even suppose to know what most of it is. I think I should tell you a LITTLE about the U.C.A. The U.C.A is short for U.C.A.U.N. UCAUN is an underground confidential assosation / underground network. We invent, prevent and torment. There are three types of people in the world... Those who don't know what happen, those who wanna know what happen, and people like us who MAKE THINGS HAPPEN. This software is not the whole U.C.A. This software is just showing you the TIP of the ice burg when it comes to this TOP SECRETE assosation. The U.C.A is soon to become the most fearfull, most powerfull hacker assosation in the world. The group only consists of what I would like to call "Profesionals" at what we do. I, the {{{ Nightmare }}} is the founder of the assosation. {{{ Nightmare }}} is soon to be the worlds generations best hacker ever. The only inside information I will give you on myself is that I am 14 years old. The date is currently 3-20-98.
• MORE PUBLIC SOFTWARE COMMING YOUR WAY!!!
New publicly licenced sofware is comming your way. Stay tuned for "Global Hacker", a program ( just like AOL ) which lets you connect to a secrete server and access files like serial numbers, passwords plus.. chat and more... You access everything off a local ISP by logging on with a guest account with the software.
Everything programed. Everything created. Everything is done by 14 year old {{{ Nightmare}}}
--------------------
{{{ Nightmare }}}
I am not here, you don't know me, you never knew me, i was never here, I am simply a figment of your imagination.
There's 3 types of people in the world.... Those who don't know what happen... those who wanna know what happen and people like us WHO MAKE THINGS HAPPEN.