A sentimental tour of late 1990s and early 2000s hacking tools

Old-school hacker nostalgia turns into a comment-section food fight over vibes, missing legends, and terrible ads

TLDR: The article revisits the wild early days of remote-control hacking software, when tiny programs on old Windows PCs helped shape modern computer security debates. Commenters mostly stole the show by fighting over missing old favorites, dunking on the article’s polished style, and sharing hilariously awkward memories from the era.

A wistful look back at the late-1990s and early-2000s era of computer break-in tools should have been a simple nostalgia trip. Instead, the crowd turned it into a full-on reunion argument: part history lesson, part authenticity debate, part "why is this website attacking my eyeballs with ads?" The article strolls through the age of tiny remote-control programs like Back Orifice, NetBus, and Sub7—software that let people secretly control Windows computers back when dial-up internet was still screeching in living rooms. It also reminds readers that these tools weren’t just toys: they sparked real panic, legal trouble, and some of the earliest public fights over where "security research" ended and outright abuse began.

But the real fireworks came from the comments. One camp immediately went, "Excuse me, where are the real classics?" and started demanding beloved old reverse-engineering tools like SoftIce, IDA, W32Dasm, and OllyDBG, basically treating the article like it had snubbed half the hall of fame. Another commenter took a sharper swing, saying the piece felt too slick and "magaziney," with a not-so-subtle jab that it sounded like it had been written by a language model rather than a human with actual scars from the era. Then there was the pure comedy lane: one reader fondly recalled looking up Back Orifice in a school library only for a scandalized librarian to assume the logo meant porn. Add in one heart-on-sleeve "Man..." over the old chaos of Internet Relay Chat—basically giant group chats for nerds—and you’ve got the perfect community mood: nostalgic, nitpicky, suspicious, and very, very online.

Key Points

  • The article reviews late-1990s and early-2000s hacking tools, especially remote administration trojans used against Windows systems.
  • Back Orifice was released by Cult of the Dead Cow at DEF CON in 1998, and BO2K followed in 1999 with open-source, plugin, and encrypted-communication features.
  • NetBus, created by Carl-Fredrik Neikter, became associated with a Swedish criminal case in which a law professor was acquitted after child pornography was planted on his computer.
  • The article identifies Sub7, written by mobman and first released in February 1999, as the most widely deployed RAT of that period.
  • It also highlights foundational tools such as Nmap, Netcat, John the Ripper, and Cain & Abel as important parts of the era’s toolkit, with some still in use today.

Hottest takes

"What, no mention of SoftIce or IDA?" — deweywsu
"It reads pretty slick and magaziney" — tptacek
"the librarian being somewhat scandalized by the logo" — pavel_lishin
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.