Yes, I Would Like To Hack Myself

| | Comments (0)
Step 1: Obtain a wonderfully cool looking "Gmail Hacker" program.

gmlhckrz1.jpg

Step 2: Enter the GMail address of your intended victim, without stopping to wonder why the application is asking for YOUR login details too:

gmlhckrz2.jpg

Step 3: Find yourself dazzled by flashing lights and progress bars after you hit the "Hack Them" button.

gmlhckrz3.jpg

...ooh. Progress bars.

Step 4
: Pull a sad face as your wonderful hacking program informs you that there "was a problem".

gmlhckrz4.jpg

Man, I didn't see that one coming at all.

Step 5: Take up astral projection, float over to the program creators house, wind back time (hey, if you can project yourself in an astral fashion you've probably mastered the art of time travel too) and ask yourself why they're putting their own GMail details into the building tool that creates the GMail hacking program you'll soon be playing with:

gmlhckrz5.jpg

Step 6: Wind time forward a bit then check out the latest EMail he's just been sent. Amazingly enough, it came from the hacking program you tried to run earlier. Not so amazingly, it contains your OWN login details.

gmlhckrz6.jpg

Congratulations, you just hacked yourself.

Don't you feel so much better now?

Leave a comment

About this Entry

This page contains a single entry by Christopher Boyd published on June 16, 2009 9:13 PM.

Pastebin Botnets? was the previous entry in this blog.

Adding Insult To Injury is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.