Saturday, August 8, 2009

8 People Can Use The Same Msn Dial Up Account

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off HEHEHE

i'm on broadband now so i dont care if i tell you my little secret. anyone else knew of this?

How to rip Dynamic Flash Template

-[ How to rip Dynamic Flash Template ]-

How to Rip TM Dynamic Flash Templates
by: Baisan

What you need:

Sample dynamic flash template from TM website
Sothink SWF Decompiler
Macromedia Flash
Yourself


1. browse or search your favorite dynamic flash template in TM website. If you got one... click the "view" link and new window will open with dynamic flash.. loading...

2. If the movie fully loaded, click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.
http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.

3. copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif NOTE: dont close the browser we may need that later on.

4. open your Sothink SWF decompiler... click "Quick Open" then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif

5. Open your Macromedia FLash and open the saved FLA file. press Control+Enter or publish the file... then wallah! the output window will come up with "Error opening URL blah blah blah..." dont panic, that error will help you where to get the remaining files.

6. Copy the first error, example: "7045_main.html" then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you'll see a lot of text... nonsense text icon_lol.gif that text are your contents...

NOTE: when you save the remaining files dont forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files.

Friday, August 7, 2009

Using Rapid Share, How to use them and skip the BS

Using Rapid Share, How to use them and skip the BS

After you put up your download - or someone else along

go to the download page, click Free - on this next page where the timer comes one - view source


Go down the view source to the end - grab the gobbly gook looking text (I cant get to it right now cause I am locked out for an hour otherwise I would show an example - its obvious - near the bottom)

go to

CODE

http://sportsforum.ws/encode



paste it on the third line down (bottom line)

hit submit - second line down will now have an actuall link



You have requested the file phpscripts_01.rar (18627251 Bytes). This file has been downloaded 450 times already.
IMPORTANT: Download-accelerators
are only supported with a PREMIUM-Account!

ERROR: Please enable JavaScript.






%3C%68%32%3E%3C%66%6F%6E%74%20%63%6F%6C%6F%72%3D%22%23%43%43%30%30%30%30%22%3E%20%44%6F%77%6E%6C%6F%61%64%3A%3C%2F%66%6F%6E%74%3E%20%3C%61%20%68%72%65%66%3D%22%68%74%74%70%3A%2F%2F%64%6C%31%2E%72%61%70%69%64%73%68%61%72%65%2E%64%65%2F%66%69%6C%65%73%2F%33%36%34%33%33%32%2F%31%39%39%2F%70%68%70%73%63%72%69%70%74%73%5F%30%31%2E%72%61%72%22%3E%70%68%70%73%63%72%69%70%74%73%5F%30%31%2E%72%61%72%3C%2F%61%3E%3C%2F%68%32%3E'


You want just that part



------

It's quite simple, when you want to download something that's on rapidshare, do the following:

1. go to the rapidshare link and click 'free' (so not the premium thing)
2. on this page, there's a counter that counts down from a specific amount of time before it displays the download link, view the source of this page
3. at the end of the source, there's a line with lots of numbers and % symbols, copy this line
4. go to sportsforum.ws/encode and paste the line you copied, onto the line
5. click encode now
6. direct link is shown

Unlimited Rapidshare Downloads

Unlimited Rapidshare Downloads

Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape cookie( In this case the one that belong to rapidshare website)
On Command prompt
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download as many files as you want from their server.

And there is this cool link: paste it in the browser and see
CODE
http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de

Untold Window Tips

As found in the internet, written by Ankit Fadia
Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system

****************

Exiting Windows the Cool and Quick Way

Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)

'C:windowsrundll.exe user.exe,exitwindowsexec'

This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:

'c:windowsrundll.exe user.exe,exitwindows'

This Shortcut on clicking will shut down Windows immediately without any Warning.

Ban Shutdowns : A trick to Play on Lamers

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to :

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.

Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:

This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.

You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.

Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.

REGEDIT4

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer]

"NoClose"="1"

Disabling Display of Drives in My Computer

This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to :

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It's .reg file is as follows:

REGEDIT4

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer]

"NoDrives"=dword:03ffffff

Take Over the Screen Saver

To activate and deactivate the screen saver whenever you want, goto the following registry key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionScreenSavers

Now add a new string value and name it Mouse Corners. Edit this new value to -Y-N. Press F5 to refresh the registry. Voila! Now you can activate your screensaver by simply placing the mouse cursor at the top right corner of the screen and if you take the mouse to the bottom left corner of the screen, the screensaver will deactivate.

Pop a banner each time Windows Boots

To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWinLogon

Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's .reg file would be:

REGEDIT4

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWinlogon]

"LegalNoticeCaption"="Caption here."

Delete the Tips of the Day to save 5KB

Windows 95 had these tips of the day which appeared on a system running a newly installed Windows OS. These tips of the day are stored in the Windows Registry and consume 5K of space. For those of you who are really concerned about how much free space your hard disk has, I have the perfect trick.

To save 5K go to the following key in Regedit:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerTips

Now simply delete these tricks by selecting and pressing the DEL key.

Change the Default Locations

To change the default drive or path where Windows will look for it's installation files, go to the key:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionSetupSourcePath

Now you can edit as you wish.

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor go to:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved.

CLSID Folders Explained

Don't you just hate those stubborn stupid icons that refuse to leave the desktop, like the Network Neighborhood icon. I am sure you want to know how you can delete them. You may say, that is really simple, simply right click on the concerned icon and select Delete. Well not exactly, you see when you right click on these special folders( see entire list below)neither the rename nor the delete option does not appear. To delete these folders, there are two methods, the first one is using the System Policy Editor(Poledit in the Windows installation CD)and the second is using the Registry.

Before we go on, you need to understand what CLSID values are. These folders, like the Control Panel, Inbox, The Microsoft Network, Dial Up Networking etc are system folders. Each system folder has a unique CLSID key or the Class ID which is a 16-byte value which identifies an individual object that points to a corresponding key in the registry.

To delete these system Folders from the desktop simply go to the following registry key:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionExplorerDesktopNamespace
{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}

To delete an icon simply delete the 16 byte CLSID value within "NameSpace". The following are the CLSID values of the most commonly used icons:

My Briefcase:{85BBD920-42AO-1069-A2E4-08002B30309D}

Desktop: {00021400-0000-0000-C000-0000000000046}

Control Panel:{21EC2020-3AEA-1069-A2DD-08002B30309D}

Dial-Up-Networking:{992CFFA0-F557-101A-88EC-00DD01CCC48}

Fonts: {BD84B380-8CA2-1069-AB1D-08000948534}

Inbox :{00020D76-0000-0000-C000-000000000046}

My Computer :{20D04FE0-3AEA-1069-A2D8-08002B30309D}

Network Neighborhood:{208D2C60-3AEA-1069-A2D7-O8002B30309D}

Printers :{2227A280-3AEA-1069-A2DE-O8002B30309D}

Recycle Bin :{645FF040-5081-101B-9F08-00AA002F954E}

The Microsoft Network:{00028B00-0000-0000-C000-000000000046}

History: {FF393560-C2A7-11CF-BFF4-444553540000}

Winzip :{E0D79300-84BE-11CE-9641-444553540000}

For example, to delete the Recycle Bin, first note down it's CLSID value, which is: 645FF040-5081-101B-9F08-00AA002F954E. Now go to the Namespace key in the registry and delete the corresponding key.

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionexplorerDesktopNameSpace
{645FF040-5081-101B-9F08-00AA002F954E}

Similarly to delete the History folder, delete the following key:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionexplorerDesktopNameSpace
{FBF23B42-E3F0-101B-8488-00AA003E56F8}

Sometimes, you may need to play a trick on your brother or friend, well this one teaches you how to hide all icons from the Desktop. Go to the following registry key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

In the right pane create a new DWORD value by the name: NoDesktop and set its value to: 1. Reboot and you will find no icons on the desktop.

Till now you simply learnt how to delete the special system folders by deleting a registry key, but the hack would have been better if there was a way of adding the DELETE and RENAME option to the right click context menus of these special folders. You can actually change the right click context menu of any system folder and add any of the following options: RENAME, DELETE, CUT, COPY, PASTE and lots more.

This hack too requires you to know the CLSID value of the system folder whose menu you want to customize. In this section, I have taken up Recycle Bin as the folder whose context menu I am going to edit.

Firstly launch the registry editor and open the following registry key:

HKEY_CLASSES_ROOTCLSID{645FF040-5081-101B-9F08-00AA002F954E}ShellFolder.

In Case you want to edit some other folder like say the FONTS folder, then you will open the following key:

HKEY_CLASSES_ROOTCLSID{CLSID VALUE HERE}ShellFolder.

In the right pane there will be a DWORD value names attributes. Now consider the following options:
To add the Rename option to the menu, change the value of Attributes to

50 01 00 20
To add the Delete option to the menu, change the value of Attributes to

60 01 00 20

3. To add both the Rename & Delete options to the menu, change the value of Attributes to 70,01,00,20

4. Add Copy to the menu, change Attributes to 41 01 00 20

5. Add Cut to the menu, change Attributes to 42 01 00 20

6. Add Copy & Cut to the menu, change Attributes to 43 01 00 20

7. Add Paste to the menu, change Attributes to 44 01 00 20

8. Add Copy & Paste to the menu, change Attributes to 45 01 00 20

9. Add Cut & Paste to the menu, change Attributes to 46 01 00 20

10.Add all Cut, Copy & Paste to the menu, change Attributes to 47 01 00 20

We want to add only the Rename option to the right click context menu of the Recycle Bin, so change the value of attributes to: 50 01 00 20. Press F5 to refresh and then after rebooting you will find that when you right click on the Recycle Bin a RENAME option pops up too.

To reset the default Windows options change the value of Attributes back to

40 01 00 20

The Registry File which one can create for the above process would be something like the below:

REGEDIT4

[HKEY_CLASSES_ROOTCLSID{645FF040-5081-101B-9F08-00AA002F954E}Shell-Folder]

"Attributes"=hex:50,01,00,20

To access say the Modem Properties in the Control Panel Folder, the normal procedure is: Click on Start, Click on Settings> Control Panel and then wait for the Control Panel window to pop up and then ultimately click on the Modems icon.

Wouldn't it be lovely if you could shorten the process to: Click on Start> Control Panel>Modems. Yes you can add the Control Panel and also all other Special System Folders directly to the first level Start Menu. Firstly collect the CLSID value of the folder you want to add to the start menu. I want to add Control Panel hence the CLSID value is: 21EC2020-3AEA-1069-A2DD-08002B30309D

Now right click on the Start Button and select Open. Now create a new folder and name it: Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}

NOTE: Do not forget the period after the 'l' in Panel. Similarly all system folders can be added to the Start Menu.(accept My Briefcase, I think)

Deleting System Options from the Start menu

You can actually remove the Find and Run options from the start menu by performing a simple registry hack. Again like always Launch the registry editor and scroll down to the below key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

Right-click on the right pane and select New, DWORD Value. Name it NoFind.(To remove the RUN option name it NoRun). Double-click the newly create DWORD to edit it's value and enter 1 as its value. This will disable the FIND option of the Start Menu and will also disable the default Shortcut key(F3 for Find.)

To restore the Run or find command modify the value of the DWORD to 0 or simply Delete the DWORD value.

Fed Up of the boring Old Yellow Folder Icons?[Drive Icons Included]

NOTE: This trick hasn't been tried on Win98.

You can easily change the boring yellow folder icons to your own personalized icons. Simply create a text file and copy the following lines into it:

[.ShellClassInfo]

ICONFILE=Drive:PathIcon_name.extension

Save this text file by the name, desktop.ini in the folder, whose icon you want to change. Now to prevent this file from getting deleted change it's attributes to Hidden and Read Only by using the ATTRIB command.

To change the icon of a drive, create a text file containing the following lines:

[Autorun]

ICON=Drive:PathIcon_name.extension

Save this file in the root of the drive whose icon you want to change and name it autorun.inf For Example, if you want to change the icon of a floppy, SAVE THE icon in a:icon_name.ico One can also create a kewl icon for the Hard Disk and create a text file [autorun.inf] and store it in "c:".

Securing NT

By default, NT 4.0 displays the last person who logged onto the system. This can be considered to be a security threat, especially in the case of those who choose their password to be same as their Username. To disable this bug which actually is a feature, go to the following key in the registry editor:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWinlogon

Click and select the ReportBookOK item and create a new string value called DontDisplayLastUserName. Modify it and set it's value to 1.

As a system administrator, you can ensure that the passwords chosen by the users are not too lame or too easy to guess. NT has this lovely utility called the User Manager which allows the administrator to set the age limit of the password which forces the users to change the password after a certain number of days. You can also set the minimum length of passwords and prevent users to use passwords which already have been used earlier and also enable account lockouts which will deactivate an account after a specified number of failed login attempts.

When you log on to Win NT, you should disable Password Caching, this ensures Single NT Domain login and also prevents secondary Windows Logon screen.

Simply copy the following lines to a plain text ASCII editor like: Notepad and save it with an extension, .reg

----------------DISABLE.reg-----------------

REGEDIT4

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesNetwork]

"DisablePwdCaching"=dword:00000001

----------------DISABLE.reg-----------------

To Enable Password Caching use the following .reg file:

--------------Enable.reg-----------------

REGEDIT4

[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesNetwork]

"DisablePwdCaching"=dword:00000000

--------------Enable.reg-----------------



Cleaning Recent Docs Menu and the RUN MRU

The Recent Docs menu can be easily disabled by editing the Registry. To do this go to the following Key:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

Now in the right pane, create a new DWORD value by the name: NoRecentDocsMenu and set it's value to 1. Restart Explorer to save the changes.

You can also clear the RUN MRU history. All the listings are stored in the key:

HKEY_USERS.DefaultSoftwareMicrosoftWindowsCurrentVersionExplorerRunMRU

You can delete individual listings or the entire listing. To delete History of Find listings go to:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerDoc Find Spec MRU

and delete.

Customizing the Right Click Context Menu of the Start Menu

When you right click on the start menu, only 3 options pop up: Open, Explore, and Find. You can add your own programs to this pop up menu( which comes up when we right click on it.) Open Regedit and go to the following registry key:

HKEY_CLASSES_ROOTDirectoryShell

Right click on the shell and create a new Sub Key (You can create a new SubKey by right clicking on the Shell Key and selecting New > Key.). Type in the name of the application you want to add to the start menu. I want to add Notepad to the Start Menu and hence I name this new sub key, Notepad. Now right click on the new registry key that you just created and create yet another new key named Command. Enter the full path of the application, in this case Notepad in the default value of Command in the right

pane. So I Modify the value of the default string value and enter the full pathname of Notepad:

c:wndowsnotepad.exe.

Now press F5 to refresh. Now if you right click on the Start Button you will find a new addition to the Pop Up Menu called Notepad. Clicking on it will launch Notepad.

We can not only add but also remove the existing options in this pop up box.

To delete the Find option, go to the following registry key:

HKEY_CLASSES_ROOTDirectoryShellFind

Delete Find. DO NOT delete Open else you will not be able to open any folders in the Start Menu like Programs, Accessories etc.

BMP Thumbnail As Icon

You can actually change the default BMP icon to a thumbnail version of the actual BMP file. To do this simply go to HKCUPaint.PictureDefault. In the right pane change the value of default to %1. Please note however that this will slow down the display rate in explorer if there are too many BMP thumbnails to display. You can use other icons too, simply enter the pathname.To restore back to the normal change the vale of default back to: C:Progra~1Access~1MSPAINT.EXE,1.

Customizing The Shortcut Arrow

All shortcuts have a tiny black arrow attached to it's icon to distinguish from normal files. This arrow can sometimes be pretty annoying and as a Hacker should know how to change each and everything, here goes another trick. Launch the Registry Editor and go to:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionexplorerShell Icons.

Now, on the right pane is a list of icons ( we found out that on some systems, Windows 98 especially, the right pane is blank. Don't worry, just add the value as required ). Find the value 29. If it isn't there, just add it. The value of this string should be C:Windowssystemshell32.dll, 29 ( which means the 30th icon in shell32.dll - the first one begins with 0 ). Now, we need blank icon to do this. Just create one with white as the whole icon. Go here to learn how to create an icon. Once done just change the value to C:xxx.ico, 0 where "xxx" is the full path of the icon file and "0" is the icon in it.

Now for some fun. If the blank icon is a bit boring, change it again. You will find that under shell32.dll there is a gear icon, a shared folder ( the hand ) and much more. Experiment for yourself!

Use Perl to Get List or Services Running on your NT box

Use the following Perl Script to get a list of Services running on your NT system

--------------script.pl-----------------

#!c:perbinperl.exe

use Win32::Service;

my ($key, %service, %status, $part);

Win32::Service::GetServices(' ',%services);

foreach $key (sort keys %services) {

print "Print Namet: $key, $services{$key}n";

Win32::Service::GetStatus( ' ',$services{$key};

%status);

foreach $part (keys %status) {

print "t$part : $status{$part}n" if($part eq "CurrentState");

}

}

-------------script.pl-------------------

Internet Explorer Tricks and Tips

Resizable Full Screen Toolbar

The Full Screen option increases the viewable area and makes surfing more enjoyable but sometimes we need the Toolbar but also need to have extra viewing area. Now this hack teaches you how to change the size of the Internet Explorer toolbar. This registry hack is a bit complicated as it involves Binary values, so to make it simple, I have included the following registry file which will enable the resizable option of the Internet Explorer toolbar which was present in the beta version of IE.

REGEDIT4

[HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerToolbar]

"Theater"=hex:0c,00,00,00,4c,00,00,00,74,00,00,00,18,00,00,00,1b,00,00,00,5c,

00,00,00,01,00,00,00,e0,00,00,00,a0,0f,00,00,05,00,00,00,22,00,00,00,26,00,

00,00,02,00,00,00,21,00,00,00,a0,0f,00,00,04,00,00,00,01,00,00,00,a0,0f,00,

00,03,00,00,00,08,00,00,00,00,00,00,00

*******************

HACKING TRUTH: Internet Explorer 5 displays the friendly version of HTTP errors like NOT FOUND etc . They are aimed at making things easier for newbies. If you would rather prefer to see the proper error pages for the web server you're using, go to Tools, Internet Options and select the Advanced tab. Then scroll down and uncheck the Show friendly http errors box.

*******************

Making the Internet Explorer & the Explorer Toolbars Fancy

The Internet Explorer toolbar looks pretty simple. Want to make it fancy and kewl? Why not add a background image to it. To do this kewl hack launch the Windows Registry Editor and go to the following key: HKEY_CURRENT_USERSOFTWAREMicrosoft Internet ExplorerToolbar.

Now in the right pane create a new String Value and name it BackBitmap and modify it's value to the path of the Bitmap you want to dress it up with by rightclicking on it and choosing Modify. When you reboot the Internet Explorer and the Windows Explorer toolbars will have a new look.

Change Internet Explorer's Caption

Don't like the caption of Internet Explorer caption? Want to change it? Open the registry editor and go to

HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain.

In the right pane create a new String Value names Window Title (Note the space between Window and Title). Right click on this newly created String Value and select Modify. Type in the new caption you want to be displayed. Restart for the settings to take place.

Now let's move on to some Outlook Express Tricks.

Colorful Background

Don't like the boring background colors of Outlook Express? To change it launch the Windows Registry Editor and scroll down to the

HKEY_CURRENT_USERSoftwareMicrosoftInternet Mail And News key.

On the left pane, click on ColorCycle or select Edit and Modify in the menu. Now change the value to 1. Close and restart. Now, launch Outlook Express and whenever you open up a New Message, hold down ctrl-shift and tap the z key to scroll to change the background color. Repeat the keystroke to cycle through the colors.

Internet Explorer 5 Hidden Features


Microsoft Internet Explorer 5 has several hidden features which can be controlled using the Windows Registry. Open your registry and scroll down to the following key:

HKEY_CURRENT_USERSoftwarePoliciesMicrosoftInternet ExplorerRestrictions

Create a new DWORD value named x(See complete list of values of x below) and modify it's value to 1 to enable it and to 0 to disable it.

NoBrowserClose : Disable the option of closing Internet Explorer.

NoBrowserContextMenu : Disable right-click context menu.

NoBrowserOptions : Disable the Tools / Internet Options menu.

NoBrowserSaveAs : Disable the ability to Save As.

NoFavorites : Disable the Favorites.

NoFileNew : Disable the File / New command.

NoFileOpen : Disable the File / Open command.

NoFindFiles : Disable the Find Files command.

NoSelectDownloadDir : Disable the option of selecting a download directory.

NoTheaterMode : Disable the Full Screen view option.

Hacking Secrets

Almost all system administrators make certain changes and make the system restricted. System Administrators can hide the RUN option, the FIND command, the entire Control Panel, drives in My Computer like D: A: etc. They can even restrict activities of a hacker my disabling or hiding, even the tiniest options or tools.

Most commonly these restrictions are imposed locally and are controlled by the Windows Registry. But sometimes the smart system administrators control the activities of the hacker by imposing restrictions remotely through the main server.

Poledit or Policy Editor is a small kewl tool which is being commonly used by system administrators to alter the settings of a system. This utility is not installed by default by Windows. You need to install in manually from the Windows 98 Installation Kit from the Resource Kit folder. user.dat file that we saw earlier.

The Policy Editor tool imposes restrictions on the user's system by editing the user.dat file which in turn means that it edits the Windows Registry to change the settings. It can be used to control or restrict access to each and every folder and option you could ever think of. It has the power to even restrict access to individual folders, files, the Control Panel, MS DOS, the drives available etc. Sometimes this software does make life really hard for a Hacker. So how can we remove the restrictions imposed by the Policy Editor? Well read ahead to learn more.

You see the Policy Editor is not the only way to restrict a user's activities. As we already know that the Policy Editor edits the Windows Registry(user.dat) file to impose such restrictions. So this in turn would mean that we can directly make changes to the Windows Registry using a .reg file or directly to remove or add restrictions.

Launch Regedit and go to the following Registry Key:

HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies

Under this key, there will definitely be a key named explorer. Now under this explorer key we can create new DWORD values and modify it's value to 1 in order to impose the restriction. If you want to remove the Restriction, then you can simply delete the respective DWORD values or instead change their values to 0. The following is a list of DWORD values that can be created under the Explorer Key-:

NoDeletePrinter: Disables Deletion of already installed Printers

NoAddPrinter: Disables Addition of new Printers

NoRun : Disables or hides the Run Command

NoSetFolders: Removes Folders from the Settings option on Start Menu (Control Panel, Printers, Taskbar)

NoSetTaskbar: Removes Taskbar system folder from the Settings option on Start Menu

NoFind: Removes the Find Tool (Start >Find)

NoDrives: Hides and does not display any Drives in My Computer

NoNetHood: Hides or removes the Network Neighborhood icon from the desktop

NoDesktop: Hides all items including, file, folders and system folders from the Desktop

NoClose: Disables Shutdown and prevents the user from normally shutting down Windows.

NoSaveSettings: Means to say, 'Don't save settings on exit'

DisableRegistryTools: Disable Registry Editing Tools (If you disable this option, the Windows Registry Editor(regedit.exe) too

will not work.)

NoRecentDocsHistory: Removes Recent Document system folder from the Start Menu (IE 4 and above)

ClearRecentDocsOnExit: Clears the Recent Documents system folder on Exit.

Nolnternetlcon: Removes the Internet (system folder) icon from the Desktop

Under the same key: HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies you can create new subkeys other than the already existing Explorer key. Now create a new key and name it System. Under this new key, system we can create the following new DWORD values(1 for enabling the particular option and 0 for disabling the particular option):

NODispCPL: Hides Control Panel

NoDispBackgroundPage: Hides Background page.

NoDispScrsavPage: Hides Screen Saver Page

NoDispAppearancePage: Hides Appearance Page

NoDispSettingsPage: Hides Settings Page

NoSecCPL: Disables Password Control Panel

NoPwdPage: Hides Password Change Page

NoAdminPaqe: Hides Remote Administration Page

NoProfilePage: Hides User Profiles Page

NoDevMgrPage: Hides Device Manager Page

NoConfigPage: Hides Hardware Profiles Page

NoFileSysPage: Hides File System Button

NoVirtMemPage: Hides Virtual Memory Button

Similarly, if we create a new subkey named Network, we can add the following DWORD values under it(1 for enabling the particular option and 0 for disabling the particular option):

NoNetSetupSecurityPage: Hides Network Security Page

NoNelSetup: Hides or disables the Network option in the Control Panel

NoNetSetupIDPage: Hides the Identification Page

NoNetSetupSecurityPage: Hides the Access Control Page

NoFileSharingControl: Disables File Sharing Controls

NoPrintSharing: Disables Print Sharing Controls

Similarly, if we create a new subkey named WinOldApp, we can add the following DWORD values under it(1 for enabling the particular option and 0 for disabling the particular option):

Disabled: Disable MS-DOS Prompt

NoRealMode: Disable Single-Mode MS-DOS.

So you see if you have access to the Windows Registry, then you can easily create new DWORD values and set heir value to 1 for enabling the particular option and 0 for disabling the particular option. But Sometimes, access to the Windows Registry is blocked. So what do you do? Go to the Windows Directory and delete either user.dat or system.dat (These 2 files constitute the Windows Registry.) and reboot. As soon as Windows logs in, it will display a Warning Message informing you about an error in the Windows Registry. Simply ignore this Warning Message and Press CTRL+DEL+ALT to get out of this warning message.(Do not press OK) You will find that all restrictions have been removed.

The most kind of restriction found quite commonly is the Specific Folder Restriction, in which users are not allowed access to specific folders, the most common being the Windows folder, or sometimes even access to My Computer is blocked. In effect, you simply cannot seem to access the important kewl files which are needed by you to do remove restrictions. What do you? Well use the RUN command. (START >RUN). But unfortunately a system administrator who is intelligent enough to block access to specific folder, would definitely have blocked access to the RUN command. Again we are stuck.

Windows is supposed to be the most User Friendly Operating System on earth. (At least Microsoft Says so.)

It gives the User an option to do the same thing in various ways. You see the RUN command is only the most convenient option of launching applications, but not the only way. In Windows you can create shortcuts to almost anything from a file, folder to a Web URL. So say your system administrator has blocked access to the c:windowssystem folder and you need to access it. What do you do? Simply create a Shortcut to it. To do this right click anywhere on the desktop and select New > Shortcut. A new window titled Create Shortcut pops up. Type in the path of the restricted folder you wish to access, in this case c:windowssystem. Click Next, Enter the friendly name of the Shortcut and then click Finish. Now you can access the restricted folder by simply double clicking on the shortcut icon. Well that shows how protected and secure *ahem Windows *ahem is.

****************

HACKING TRUTH: Sometimes when you try to delete a file or a folder, Windows displays an error message saying that the file is protected. This simply means that the file is write protected, or in other words the R option is +. Get it? Anyway, you can stop Windows from displaying this error message and straightaway delete this file by changing its attributes to Non Read Only. This can be done by Right Clicking on the file, selecting Properties and then

unselecting the Read Only Option.

***************

There is yet another way of accessing restricted folders. Use see, DOS has a lovely command known as START. Its general syntax is:

START application_path

It does do what it seems to do, start applications. So in you have access to DOS then you can type in the START command to get access to the restricted folder. Now mostly access to DOS too would be blocked. So again you can use the shortcut trick to launch, c:command.com or c:windowscommand.com. (Command.com is the file which launches MS DOS).

Accessing Restricted Drives.

The problem with most system administrators is that they think that the users or Hackers too are stupid. Almost all system administrators use the Registry Trick (Explained Earlier) to hide all drives in My Computer. So in order to unhide or display all drives, simply delete that particular key.(Refer to beginning of Untold Secrets Section.)

Some systems have the floppy disk disabled through the BIOS. On those systems if the BIOS is protected, you may need to crack the BIOS password. (For that Refer to the Windows Hacking Chapter). Sometimes making drives readable (Removing R +) and then creating Shortcuts to them also helps us to get access to them.

Further Changing your Operating System's Looks by editing .htt files

If you have installed Windows Desktop Update and have the view as Web Page option enabled, you can customise the way the folder looks by selecting View > Customise this folder. Here you can change the background and other things about that particular folder. Well that is pretty lame, right? We hackers already know things as lame as that. Read on for some kewl stuff.

Well, you could also change the default that is stored in a Hidden HTML Template file (I think so..) which is nothing but a HTML document with a .htt extension. This .htt file is found at: %systemroot%webfolder.htt.

The %systemroot% stands for the drive in which Windows is Installed, which is normally C:

You can edit these .htt files almost just like you edit normal .HTM or .HTML files. Simply open them in an ASCII editor like Notepad. The following is a list of .htt files on your system which control various folders and which can be edited to customise the way various folders look.

controlp.htt Control Panel

printers.htt Printers

mycomp.htt My Computer

safemode.htt Safe Mode

All these files are found in the web folder in %systemfolder%. The folder.htt file has a line:

'Here's a good place to add a few lines of your own"

which is the place where you can add your own A HREF links. These links would then appear in the folder whose folder.htt file you edited. All this might sound really easy and simple, but you see these .htt files do not contain normal HTML code, instead they contain a mixture of HTML and web bots. Hence they can be difficult for newbies to understand.

Wow long txt, and yes it has been copied from other sites, you think I have time to write all this myself, I wish enjoy
User is offlineProfile CardPM

Report PostGo to the top of the page
+Quote Post

Uninstall Windows Xp And Return To My Old Windows

How can I uninstall Windows XP and return to my old Windows 98?

If you've upgraded to XP from Windows Me or Windows 98, go to the Add/Remove Programs Control Panel applet and click Uninstall Windows XP.

If you want, you can also uninstall XP from the command prompt by performing the following steps:

* Start the computer in Safe Mode with Command Prompt support (press F8 during start up).
* Navigate to %systemroot%\system32.
* Type osuninst.exe and press Enter.
* Follow the onscreen instructions.


If XP was installed as a dual-boot system along with Win98 or W2K then you can simply format the partition on which it is installed. That is one of the reasons I always recommend to install separate operating systems on separate partitions!

Note: Windows XP Professional provides an uninstall tool when upgrading from Windows 98 on a drive formatted as FAT or FAT32. Therefore, when upgrading this type of drive, you will not have the option to upgrade to NTFS, as this would negate the uninstall option. However, you can convert the drive to NTFS after installation if you choose.

Ultimate Google Way

Ultimate Google Way

Look for Appz in Parent Directory

intext:"parent directory" intext:"[EXE]"


intext:"parent directory" index of:"[EXE]"


intext:"parent directory" index of:"[RAR]"

This will look for any exe or optionaly for zip, rar, ace, iso, bin and etc.

Look for Moviez in Parent Directory

intext:"parent directory" intext:"[VID]"


intext:"parent directory" index of:"[VID]"

This will look for any video filetype in parent directory. You can optionaly add index:"xvid" or intext:"divx" for specific codec movie.

Look for Muzik in Parent Directory

intext:"parent directory" intext:"[MP3]"


intext:"parent directory" index of:"[MP3]"

This will look for any music files.

Look for Gamez in Parent Directory

intext:"parent directory" index of:"[Gamez]"

Tutorial How to create a bootable Windows XP SP1 CD (Nero)

Tutorial : How to create a bootable Windows XP SP1 CD (Nero)

How to create a bootable Windows XP SP1 CD (Nero):
Step 1

Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2

Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3

You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4

Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1

Click OK

Folder C:\WINXPSP1 contains: Windows XP SP1



How to Create a Windows XP SP1 CD Bootable

Step 1

Download xpboot.zip
http://thro.port5.com/xpboot.zip

( no download manager !! )

Extract xpboot.zip file (xpboot.bin) in to the folder C:\XPBOOT

Step 2

Start Nero - Burning Rom.
Select File > New... from the menu.
1.) Select CD-ROM (Boot)
2.) Select Image file from Source of boot image data
3.) Set Kind of emulation: to No Emulation
4.) Set Load segment of sectors (hex!): to 07C0
5.) Set Number of loaded sectors: to 4
6.) Press the Browse... button



Step 3

Select All Files (*.*) from File of type:
Locate boot.bin in the folder C:\XPBOOT

Step 4

Click ISO tab
Set File-/Directory length to ISO Level 1 (Max. of 11 = 8 + 3 chars)
Set Format to Mode 1
Set Character Set to ISO 9660
Check all Relax ISO Restrictions




Step 5

Click Label Tab
Select ISO9660 from the drop down box.
Enter the Volume Label as WB2PFRE_EN
Enter the System Identifier as WB2PFRE_EN
Enter the Volume Set as WB2PFRE_EN
Enter the Publisher as MICROSOFT CORPORATION
Enter the Data Preparer as MICROSOFT CORPORATION
Enter the Application as WB2PFRE_EN

* For Windows XP Professional OEM substitute WB2PFRE_EN with WXPOEM_EN
* For Windows XP Home OEM substitute WB2PFRE_EN with WXHOEM_EN

Step 6

Click Burn tab
Check Write
Check Finalize CD (No further writing possible!)
Set Write Method to Disk-At-Once

Press New button

Step 7

Locate the folder C:\WINXPSP1
Select everything in the folder and drag it to the ISO compilation panel.
Click the Write CD Dialog button.

Press Write

You're done.

Tutorial Get the serial number you need

Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Turn Off Unneeded Services, speed up pc

here is a list of services that can be turned off
this will speed up your pc a bit

right click my computer
manage
services and applications
services

set these to disabled you will need to reboot for them to take effect if you have a problem with any just reenable them again ie if you have a smart card and you disable it wont work

alerter
application layer gateway service
application management
ati hotkey poller
automatic updates
background intelligent transfer service
clipbook
com+ event system
com+ system application
distributed transaction coordinator
error reporting service
fast user switching compatibility
help and support
human interface device access
imapi cd burning com service
indexing service
internet connection firewall(icf)/internet connecton sharing(ics)
ipsec services
logical disk manager
logical disk manager administrative service
messenger
ms software shadow copy provider
net logon
netmeeting remote desktop sharing
network dde
network dde dsdm
nt lm securtiy support provider
performance logs and alerts
portable media serial number service
qos rsvp
remote desktop help sesson manager
remote registry
removable storage
secondary logon
security accounts manager
server
smart card
smart card helper
ssdp discovery service
system restore service
task scheduler
tcp/ip netbios helper
telnet
terminal services
uninterruptible power supply
universal plug and play device host
upload manager
video proes
volume shadow copy
webclient
windows time
wireless zone configuration
wmi performance adapter
workstation

Using Rapid Share, How to use them and skip the BS

Using Rapid Share, How to use them and skip the BS

After you put up your download - or someone else along

go to the download page, click Free - on this next page where the timer comes one - view source


Go down the view source to the end - grab the gobbly gook looking text (I cant get to it right now cause I am locked out for an hour otherwise I would show an example - its obvious - near the bottom)

go to

CODE

http://sportsforum.ws/encode



paste it on the third line down (bottom line)

hit submit - second line down will now have an actuall link



You have requested the file phpscripts_01.rar (18627251 Bytes). This file has been downloaded 450 times already.
IMPORTANT: Download-accelerators
are only supported with a PREMIUM-Account!

ERROR: Please enable JavaScript.






%3C%68%32%3E%3C%66%6F%6E%74%20%63%6F%6C%6F%72%3D%22%23%43%43%30%30%30%30%22%3E%20%44%6F%77%6E%6C%6F%61%64%3A%3C%2F%66%6F%6E%74%3E%20%3C%61%20%68%72%65%66%3D%22%68%74%74%70%3A%2F%2F%64%6C%31%2E%72%61%70%69%64%73%68%61%72%65%2E%64%65%2F%66%69%6C%65%73%2F%33%36%34%33%33%32%2F%31%39%39%2F%70%68%70%73%63%72%69%70%74%73%5F%30%31%2E%72%61%72%22%3E%70%68%70%73%63%72%69%70%74%73%5F%30%31%2E%72%61%72%3C%2F%61%3E%3C%2F%68%32%3E'


You want just that part



------

It's quite simple, when you want to download something that's on rapidshare, do the following:

1. go to the rapidshare link and click 'free' (so not the premium thing)
2. on this page, there's a counter that counts down from a specific amount of time before it displays the download link, view the source of this page
3. at the end of the source, there's a line with lots of numbers and % symbols, copy this line
4. go to sportsforum.ws/encode and paste the line you copied, onto the line
5. click encode now
6. direct link is shown

Unlimited Rapidshare Downloads

Unlimited Rapidshare Downloads

Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape cookie( In this case the one that belong to rapidshare website)
On Command prompt
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server.Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download as many files as you want from their server.

And there is this cool link: paste it in the browser and see
CODE
http://www.google.com/search?lr=&as_qdr=all&q=+.rar+OR+.zip+OR+.pdf+OR+.exe+site%3Arapidshare.de

ULTIMATE GUIDE TO BYPASS BIOS PASSWORDS!

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

The Basics of Hacking- Introduction

_______________________________________
_______________________________________
__ __
__ THE BASICS OF HACKING: INTRO __
__ __
_______________________________________
__ Uploaded by Elric of Imrryr __
_______________________________________
_ _
_ THE FIRST OF A SET OF ARTICLES: _
_ AN INTRODUCTION TO THE WORLD OF THE _
_ HACKER. BASICS TO KNOW BEFORE DOING_
_ ANYTHING, ESSENTIAL TO YOUR CONTIN- _
_ UING CAREER AS ONE OF THE ELITE IN _
_ THE COUNTRY... _
_______________________________________
_______________________________________
THIS ARTICLE, "THE INTRODUCTION TO THE
WORLD OF HACKING" IS MEANT TO HELP YOU
BY TELLING YOU HOW NOT TO GET CAUGHT,
WHAT NOT TO DO ON A COMPUTER SYSTEM,
WHAT TYPE OF EQUIPMENT SHOULD I KNOW
ABOUT NOW, AND JUST A LITTLE ON THE
HISTORY, PAST PRESENT FUTURE, OF THE
HACKER.
_______________________________________
WELCOME TO THE WORLD OF HACKING!
WE, THE PEOPLE WHO LIVE OUTSIDE OF
THE NORMAL RULES, AND HAVE BEEN SCORNED
AND EVEN ARRESTED BY THOSE FROM THE
'CIVILIZED WORLD', ARE BECOMMING
SCARCER EVERY DAY. THIS IS DUE TO THE
GREATER FEAR OF WHAT A GOOD HACKER
(SKILL WISE, NO MORAL JUDGEMENTS HERE)
CAN DO NOWADAYS, THUS CAUSING ANTI-
HACKER SENTIMENT IN THE MASSES.
ALSO, FEW HACKERS SEEM TO ACTUALLY KNOW
ABOUT THE COMPUTER SYSTEMS THEY HACK,
OR WHAT EQUIPMENT THEY WILL RUN INTO
ON THE FRONT END, OR WHAT THEY COULD
DO WRONG ON A SYSTEM TO ALERT THE
'HIGHER' AUTHORITIES WHO MONITOR THE
SYSTEM.
THIS ARTICLE IS INTENDED TO TELL YOU
ABOUT SOME THINGS NOT TO DO, EVEN
BEFORE YOU GET ON THE SYSTEM. WE
WILL TELL YOU ABOUT THE NEW WAVE OF
FRONT END SECURITY DEVICES THAT ARE
BEGINNING TO BE USED ON COMPUTERS.
WE WILL ATTEMPT TO INSTILL IN YOU A
SECOND IDENTITY, TO BE BROUGHT UP AT
TIME OF GREAT NEED, TO PULL YOU OUT
OF TROUBLE.
AND, BY THE WAY, WE TAKE NO, REPEAT,
NO, RESPONCIBILITY FOR WHAT WE SAY IN
THIS AND THE FORTHCOMING ARTICLES.
ENOUGH OF THE BULLSHIT, ON TO THE FUN:
_______________________________________
AFTER LOGGING ON YOUR FAVORITE BBS,
YOU SEE ON THE HIGH ACCESS BOARD A
PHONE NUMBER! IT SAYS IT'S A GREAT
SYSTEM TO "FUCK AROUND WITH!"
THIS MAY BE TRUE, BUT HOW MANY OTHER
PEOPLE ARE GOING TO CALL THE SAME
NUMBER? SO: TRY TO AVOID CALLING A
NUMBER GIVEN TO THE PUBLIC. THIS IS
BECAUSE THERE ARE AT LEAST EVERY OTHER
USER CALLING, AND HOW MANY OTHER BOARDS
WILL THAT NUMBER SPREAD TO?
IF YOU CALL A NUMBER FAR, FAR AWAY, AND
YOU PLAN ON GOING THRU AN EXTENDER OR
A RE-SELLER, DON'T KEEP CALLING THE
SAME ACCESS NUMBER (I.E. AS YOU WOULD
IF YOU HAD A HACKER RUNNING), THIS
LOOKS VERY SUSPICIOUS AND CAN MAKE
LIFE MISERABLE WHEN THE PHONE BILL
COMES IN THE MAIL. MOST CITIES HAVE
A VARIETY OF ACCESS NUMBERS AND
SERVICES, SO USE AS MANY AS YOU CAN.
NEVER TRUST A CHANGE IN THE SYSTEM...
THE 414'S, THE ASSHOLES, WERE CAUGHT
FOR THIS REASON: WHEN ONE OF THEM
CONNECTED TO THE SYSTEM, THERE WAS
NOTHING GOOD THERE. THE NEXT TIME,
THERE WAS A TREK GAME STUCK RIGHT IN
THEIR WAY! THEY PROCEDED TO PLAY SAID
GAME FOR TWO, SAY TWO AND A HALF HOURS,
WHILE TELENET WAS TRACING THEM! NICE
JOB, DON'T YOU THINK? IF ANYTHING
LOOKS SUSPICIOUS, DROP THE LINE
IMMEDIATELY!! AS IN, YESTERDAY!!
THE POINT WE'RE TRYING TO GET ACCROSS
IS: IF YOU USE A LITTLE COMMON SENCE,
YOU WON'T GET BUSTED. LET THE LITTLE
KIDS WHO AREN'T SMART ENOUGH TO
RECOGNIZE A TRAP GET BUSTED, IT WILL
TAKE THE HEAT OFF OF THE REAL HACKERS.
NOW, LET'S SAY YOU GET ON A COMPUTER
SYSTEM... IT LOOKS GREAT, CHECKS
OUT, EVERYTHING SEEMS FINE. OK, NOW
IS WHEN IT GETS MORE DANGEROUS. YOU
HAVE TO KNOW THE COMPUTER SYSTEM (SEE
FUTURE ISSUES OF THIS ARTICLE FOR INFO
ON SPECIFIC SYSTEMS) TO KNOW WHAT NOT
TO DO. BASICALLY, KEEP AWAY FROM ANY
COMMAND WHICH LOOKS LIKE IT MIGHT
DELETE SOMETHING, COPY A NEW FILE INTO
THE ACCOUNT, OR WHATEVER! ALWAYS LEAVE
THE ACCOUNT IN THE SAME STATUS YOU
LOGGED IN WITH. CHANGE _NOTHING_...
IF IT ISN'T AN ACCOUNT WITH PRIV'S,
THEN DON'T TRY ANY COMMANDS THAT
REQUIRE THEM! ALL, YES ALL, SYSTEMS
ARE GOING TO BE KEEPING LOG FILES
OF WHAT USERS ARE DOING, AND THAT WILL
SHOW UP. IT IS JUST LIKE DROPPING A
TROUBLE-CARD IN AN ESS SYSTEM, AFTER
SENDING THAT NICE OPERATOR A PRETTY
TONE. SPEND NO EXCESSIVE AMOUNTS OF
TIME ON THE ACCOUNT IN ONE STRETCH.
KEEP YOUR CALLING TO THE VERY LATE
NIGHT IF POSSIBLE, OR DURING BUSINESS
HOURS (BELIEVE IT OR NOT!). IT SO
HAPPENS THAT THERE ARE MORE USERS ON
DURING BUSINESS HOURS, AND IT IS VERY
DIFFICULT TO READ A LOG FILE WITH
60 USERS DOING MANY COMMNDS EVERY
MINUTE. TRY TO AVOID SYSTEMS WHERE
EVERYONE KNOWS EACH OTHER, DON'T TRY
TO BLUFF. AND ABOVE ALL: NEVER ACT
LIKE YOU OWN THE SYSTEM, OR ARE THE
BEST THERE IS. THEY ALWAYS GRAB THE
PEOPLE WHO'S HEADS SWELL...
THERE IS SOME VERY INTERESTING FRONT
END EQUIPMENT AROUND NOWADAYS, BUT
FIRST LET'S DEFINE TERMS...
BY FRONT END, WE MEAN ANY DEVICE THAT
YOU MUST PASS THRU TO GET AT THE REAL
COMPUTER. THERE ARE DEVICES THAT ARE
MADE TO DEFEAT HACKER PROGRAMS, AND
JUST PLAIN OLD MULTIPLEXERS.
TO DEFEAT HACKER PROGRAMS, THERE ARE
NOW DEVICES THAT PICK UP THE PHONE
AND JUST SIT THERE... THIS MEANS
THAT YOUR DEVICE GETS NO CARRIER, THUS
YOU THINK THERE ISN'T A COMPUTER ON
THE OTHER END. THE ONLY WAY AROUND IT
IS TO DETECT WHEN IT WAS PICKED UP. IF
IT PICKES UP AFTER THE SAME NUMBER
RING, THEN YOU KNOW IT IS A HACKER-
DEFEATER. THESE DEVICES TAKE A MULTI-
DIGIT CODE TO LET YOU INTO THE SYSTEM.
SOME ARE, IN FACT, QUITE SOPHISTICATED
TO THE POINT WHERE IT WILL ALSO LIMIT
THE USER NAME'S DOWN, SO ONLY ONE NAME
OR SET OF NAMES CAN BE VALID LOGINS
AFTER THEY INPUT THE CODE...
OTHER DEVICES INPUT A NUMBER CODE, AND
THEN THEY DIAL BACK A PRE-PROGRAMMED
NUMBER FOR THAT CODE. THESE SYSTEMS
ARE BEST TO LEAVE ALONE, BECAUSE THEY
KNOW SOMEONE IS PLAYING WITH THEIR
PHONE. YOU MAY THINK "BUT I'LL JUST
REPROGRAM THE DIAL-BACK." THINK
AGAIN, HOW STUPID THAT IS... THEN
THEY HAVE YOUR NUMBER, OR A TEST LOOP
IF YOU WERE JUST A LITTLE SMARTER.
IF IT'S YOUR NUMBER, THEY HAVE YOUR
BALLS (IF MALE...), IF ITS A LOOP,
THEN YOU ARE SCREWED AGAIN, SINCE THOSE
LOOPS ARE _MONITORED_.
AS FOR MULTIPLEXERS... WHAT A PLEXER
IS SUPPOSED TO DO IS THIS: THE SYSTEM
CAN ACCEPT MULTIPLE USERS. WE HAVE
TO TIME SHARE, SO WE'LL LET THE FRONT-
END PROCESSOR DO IT... WELL, THIS IS
WHAT A MULTIPLEXER DOES. USUALLY THEY
WILL ASK FOR SOMETHING LIKE "ENTER
CLASS" OR "LINE:". USUALLY IT IS
PROGRAMMED FOR A DOUBLE DIGIT NUMBER,
OR A FOUR TO FIVE LETTER WORD. THERE
ARE USUALLY A FEW SETS OF NUMBERS IT
ACCEPTS, BUT THOSE NUMBERS ALSO SET
YOUR 300/1200 BAUD DATA TYPE. THESE
MULTIPLEXERS ARE INCONVENIENT AT BEST,
SO NOT TO WORRY.
A LITTLE ABOUT THE HISTORY OF HACKING:
HACKING, BY OUR DEFINITION, MEANS A
GREAT KNOWLEDGE OF SOME SPECIAL AREA.
DOCTORS AND LAWYERS ARE HACKERS OF A
SORT, BY THIS DEFINITION. BUT MOST
OFTEN, IT IS BEING USED IN THE COMPUTER
CONTEXT, AND THUS WE HAVE A DEFINITION
OF "ANYONE WHO HAS A GREAT AMOUNT OF
COMPUTER OR TELECOMMUNICATIONS
KNOWLEDGE." YOU ARE NOT A HACKER
BECAUSE YOU HAVE A LIST OF CODES...
HACKING, BY OUR DEFINITION, HAS THEN
BEEN AROUND ONLY ABOUT 15 YEARS. IT
STARTED, WHERE ELSE BUT, MIT AND
COLLEGES WHERE THEY HAD COMPUTER
SCIENCE OR ELECTRICAL ENGINEERING
DEPARTMENTS. HACKERS HAVE CREATED
SOME OF THE BEST COMPUTER LANGUAGES,
THE MOST AWESOME OPERATING SYSTEMS, AND
EVEN GONE ON TO MAKE MILLIONS. HACKING
USED TO HAVE A GOOD NAME, WHEN WE COULD
HONESTLY SAY "WE KNOW WHAT WE ARE
DOING". NOW IT MEANS (IN THE PUBLIC
EYE): THE 414'S, RON AUSTIN, THE NASA
HACKERS, THE ARPANET HACKERS... ALL
THE PEOPLE WHO HAVE BEEN CAUGHT, HAVE
DONE DAMAGE, AND ARE NOW GOING TO HAVE
TO FACE FINES AND SENTANCES.
THUS WE COME PAST THE MORALISTIC CRAP,
AND TO OUR PURPOSE: EDUCATE THE HACKER
COMMUNITY, RETURN TO THE DAYS WHEN
PEOPLE ACTUALLY KNEW SOMETHING...
_______________________________________
A PROGRAM GUIDE:
THREE MORE ARTICLES WILL BE WRITTEN IN
THIS SERIES, AT THE PRESENT TIME.
BASICS OF HACKING I: DEC'S
BASICS OF HACKING II: VAX'S (UNIX)
BASICS OF HACKING III: DATA GENERAL
IT IS IMPOSSIBLE TO WRITE AN ARTICLE
ON IBM, SINCE THERE ARE SO MANY SYSTEMS
AND WE ONLY HAVE INFO ON A FEW...
_______________________________________
THIS ARTICLE HAS BEEN WRITTEN BY:
THE KNIGHTS OF SHADOW
_______________________________________





THE BASICS OF HACKING II: VAX'S
UNIX
UNIX IS A TRADEMARK OF AT&T

(AND YOU KNOW WHAT _THAT_ MEANS)

Uploaded by Elric of Imrryr
_______________________________________
WELCOME TO THE BASICS OF HACKING II:
VAX'S AND UNIX. IN THIS ARTICLE, WE
DISCUSS THE UNIX SYSTEM THAT RUNS ON
THE VARIOUS VAX SYSTEMS. IF YOU ARE
ON ANOTHER UNIX-TYPE SYSTEM, SOME
COMMANDS MAY DIFFER, BUT SINCE IT IS
LICENCED TO BELL, THEY CAN'T MAKE MANY
CHANGES.
_______________________________________
HACKING ONTO A UNIX SYSTEM IS VERY
DIFFICULT, AND IN THIS CASE, WE ADVISE
HAVING AN INSIDE SOURCE, IF POSSIBLE.
THE REASON IT IS DIFFICULT TO HACK A
VAX IS THIS: MANY VAX, AFTER YOU GET
A CARRIER FROM THEM, RESPOND=>
LOGIN:
THEY GIVE YOU NO CHANCE TO SEE WHAT THE
LOGIN NAME FORMAT IS. MOST COMMONLY
USED ARE SINGLE WORDS, UNDER 8 DIGITS,
USUALLY THE PERSON'S NAME. THERE IS
A WAY AROUND THIS: MOST VAX HAVE AN
ACCT. CALLED 'SUGGEST' FOR PEOPLE TO
USE TO MAKE A SUGGESTION TO THE SYSTEM
ROOT TERMINAL. THIS IS USUALLY WATCHED
BY THE SYSTEM OPERATOR, BUT AT LATE
HE IS PROBABLY AT HOME SLEEPING OR
SCREWING SOMEONE'S BRAINS OUT. SO WE
CAN WRITE A PROGRAM TO SEND AT THE
VAX THIS TYPE OF A MESSAGE:
A SCREEN FREEZE (CNTRL-S), SCREEN
CLEAR (SYSTEM DEPENDANT), ABOUT 255
GARBAGE CHARACTERS, AND THEN A COMMAND
TO CREATE A LOGIN ACCT., AFTER WHICH
YOU CLEAR THE SCREEN AGAIN, THEN UN-
FREEZE THE TERMINAL. WHAT THIS DOES:
WHEN THE TERMINAL IS FROZEN, IT KEEPS
A BUFFER OF WHAT IS SENT. WELL, THE
BUFFER IS ABOUT 127 CHARACTERS LONG.
SO YOU OVERFLOW IT WITH TRASH, AND THEN
YOU SEND A COMMAND LINE TO CREATE AN
ACCT. (SYSTEM DEPENDANT). AFTER THIS
YOU CLEAR THE BUFFER AND SCREEN AGAIN,
THEN UNFREEZE THE TERMINAL. THIS IS
A BAD WAY TO DO IT, AND IT IS MUCH
NICER IF YOU JUST SEND A COMMAND TO
THE TERMINAL TO SHUT THE SYSTEM DOWN,
OR WHATEVER YOU ARE AFTER...
THERE IS ALWAYS, *ALWAYS* AN ACCT.
CALLED ROOT, THE MOST POWERFUL ACCT.
TO BE ON, SINCE IT HAS ALL OF THE
SYSTEM FILES ON IT. IF YOU HACK YOUR
WAY ONTO THIS ONE, THEN EVERYTHING IS
EASY FROM HERE ON...
ON THE UNIX SYSTEM, THE ABORT KEY IS
THE CNTRL-D KEY. WATCH HOW MANY TIMES
YOU HIT THIS, SINCE IT IS ALSO A WAY TO
LOG OFF THE SYSTEM!
A LITTLE ABOUT UNIX ARCHITECHTURE:
THE ROOT DIRECTORY, CALLED ROOT, IS
WHERE THE SYSTEM RESIDES. AFTER THIS
COME A FEW 'SUB' ROOT DIRECTORIES,
USUALLY TO GROUP THINGS (STATS HERE,
PRIV STUFF HERE, THE USER LOG HERE...).
UNDER THIS COMES THE SUPERUSER (THE
OPERATOR OF THE SYSTEM), AND THEN
FINALLY THE NORMAL USERS. IN THE UNIX
'SHELL' EVERYTHING IS TREATED THE SAME.
BY THIS WE MEAN: YOU CAN ACCESS A
PROGRAM THE SAME WAY YOU ACCESS A USER
DIRECTORY, AND SO ON. THE WAY THE UNIX
SYSTEM WAS WRITTEN, EVERYTHING, USERS
INCLUDED, ARE JUST PROGRAMS BELONGING
TO THE ROOT DIRECTORY. THOSE OF YOU
WHO HACKED ONTO THE ROOT, SMILE, SINCE
YOU CAN SCREW EVERYTHING...
THE MAIN LEVEL (EXEC LEVEL) PROMPT ON
THE UNIX SYSTEM IS THE $, AND IF YOU
ARE ON THE ROOT, YOU HAVE A # (SUPER-
USER PROMPT).
OK, A FEW BASICS FOR THE SYSTEM...
TO SEE WHERE YOU ARE, AND WHAT PATHS
ARE ACTIVE IN REGUARDS TO YOUR USER
ACCOUNT, THEN TYPE => PWD
THIS SHOWS YOUR ACCT. SEPERATED BY
A SLASH WITH ANOTHER PATHNAME (ACCT.),
POSSIBLY MANY TIMES.
TO CONNECT THROUGH TO ANOTHER PATH,
OR MANY PATHS, YOU WOULD TYPE:
YOU=> PATH1/PATH2/PATH3
AND THEN YOU ARE CONNECTED ALL THE
WAY FROM PATH1 TO PATH3. YOU CAN
RUN THE PROGRAMS ON ALL THE PATHS
YOU ARE CONNECTED TO. IF IT DOES
NOT ALLOW YOU TO CONNECT TO A PATH,
THEN YOU HAVE INSUFFICIENT PRIVS, OR
THE PATH IS CLOSED AND ARCHIVED ONTO
TAPE. YOU CAN RUN PROGRAMS THIS WAY
ALSO:
YOU=> PATH1/PATH2/PATH3/PROGRAM-NAME
UNIX TREATS EVERYTHING AS A PROGRAM,
AND THUS THERE A FEW COMMANDS TO
LEARN...
TO SEE WHAT YOU HAVE ACCESS TO IN THE
END PATH, TYPE=> LS
FOR LIST. THIS SHOW THE PROGRAMS
YOU CAN RUN. YOU CAN CONNECT TO
THE ROOT DIRECTORY AND RUN IT'S
PROGRAMS WITH=>
/ROOT
BY THE WAY, MOST UNIX SYSTEMS HAVE
THEIR LOG FILE ON THE ROOT, SO YOU
CAN SET UP A WATCH ON THE FILE, WAITING
FOR PEOPLE TO LOG IN AND SNATCH THEIR
PASSWORD AS IT PASSES THRU THE FILE.
TO CONNECT TO A DIRECTORY, USE THE
COMMAND: => CD PATHNAME
THIS ALLOWS YOU TO DO WHAT YOU WANT
WITH THAT DIRECTORY. YOU MAY BE ASKED
FOR A PASSWORD, BUT THIS IS A GOOD
WAY OF FINDING OTHER USER NAMES TO
HACK ONTO.
THE WILDCARD CHARACTER IN UNIX, IF
YOU WANT TO SEARCH DOWN A PATH FOR
A GAME OR SUCH, IS THE *.
=> LS /*
SHOULD SHOW YOU WHAT YOU CAN ACCESS.
THE FILE TYPES ARE THE SAME AS THEY
ARE ON A DEC, SO REFER TO THAT SECTION
WHEN EXAMINING FILE. TO SEE WHAT IS
IN A FILE, USE THE => PR FILENAME
COMMAND, FOR PRINT FILE.
WE ADVISE PLAYING WITH PATHNAMES TO
GET THE HANG OF THE CONCEPT. THERE
IS ON-LINE HELP AVAILABLE ON MOST
SYSTEMS WITH A 'HELP' OR A '?'.
WE ADVISE YOU LOOK THRU THE HELP
FILES AND PAY ATTENTION TO ANYTHING
THEY GIVE YOU ON PATHNAMES, OR THE
COMMANDS FOR THE SYSTEM.
YOU CAN, AS A USER, CREATE OR DESTROY
DIRECTORIES ON THE TREE BENEATH YOU.
THIS MEANS THAT ROOT CAN KILL EVERY-
THING BUT ROOT, AND YOU CAN KILL ANY
THAT ARE BELOW YOU. THESE ARE THE
=> MKDIR PATHNAME
=> RMDIR PATHNAME
COMMANDS.
ONCE AGAIN, YOU ARE NOT ALONE ON THE
SYSTEM... TYPE=> WHO
TO SEE WHAT OTHER USERS ARE LOGGED IN
TO THE SYSTEM AT THE TIME. IF YOU
WANT TO TALK TO THEM=> WRITE USERNAME
WILL ALLOW YOU TO CHAT AT THE SAME
TIME, WITHOUT HAVING TO WORRY ABOUT THE
PARSER. TO SEND MAIL TO A USER, SAY
=> MAIL
AND ENTER THE MAIL SUB-SYSTEM.
TO SEND A MESSAGE TO ALL THE USERS
ON THE SYSTEM, SAY => WALL
WHICH STANDS FOR 'WRITE ALL'
BY THE WAY, ON A FEW SYSTEMS, ALL YOU
HAVE TO DO IS HIT THE KEY
TO END THE MESSAGE, BUT ON OTHERS YOU
MUST HIT THE CNTRL-D KEY.
TO SEND A SINGLE MESSAGE TO A USER,
SAY => WRITE USERNAME
THIS IS VERY HANDY AGAIN! IF YOU SEND
THE SEQUENCE OF CHARACTERS DISCUSSED
AT THE VERY BEGINNING OF THIS ARTICLE,
YOU CAN HAVE THE SUPER-USER TERMINAL DO
TRICKS FOR YOU AGAIN.
PRIVS:
IF YOU WANT SUPER-USER PRIVS, YOU CAN
EITHER LOG IN AS ROOT, OR EDIT YOUR
ACCT. SO IT CAN SAY => SU
THIS NOW GIVES YOU THE # PROMPT, AND
ALLOWS YOU TO COMPLETELY BY-PASS THE
PROTECTION. THE WONDERFUL SECURITY
CONSCIOUS DEVELOPERS AT BELL MADE IT
VERY DIFFICULT TO DO MUCH WITHOUT
PRIVS, BUT ONCE YOU HAVE THEM, THERE
IS ABSOLUTELY NOTHING STOPPING YOU
FROM DOING ANYTHING YOU WANT TO.
TO BRING DOWN A UNIX SYSTEM:
=> CHDIR /BIN
=> RM *
THIS WIPES OUT THE PATHNAME BIN, WHERE
ALL THE SYSTEM MAINTENANCE FILES ARE.
OR TRY:
=> R -R
THIS RECURSIVELY REMOVES EVERYTHING
FROM THE SYSTEM EXCEPT THE REMOVE
COMMAND ITSELF.
OR TRY:
=> KILL -1,1
=> SYNC
THIS WIPES OUT THE SYSTEM DEVICES FROM
OPERATION.
WHEN YOU ARE FINALLY SICK AND TIRED
FROM HACKING ON THE VAX SYSTEMS, JUST
HIT YOUR CNTRL-D AND REPEAT KEY, AND
YOU WILL EVENTUALLY BE LOGGED OUT.
_______________________________________
THE REASON THIS FILE SEEMS TO BE VERY
SKETCHY IS THE FACT THAT BELL HAS 7
LICENCED VERSIONS OF UNIX OUT IN THE
PUBLIC DOMAIN, AND THESE COMMANDS ARE
THOSE COMMON TO ALL OF THEM. WE
RECOMMEND YOU HACK ONTO THE ROOT OR
BIN DIRECTORY, SINCE THEY HAVE THE
HIGHEST LEVELS OF PRIVS, AND THERE
IS REALLY NOT MUCH YOU CAN DO (EXCEPT
DEVELOPE SOFTWARE) WITHOUT THEM.
_______________________________________
THIS ARTICLE WRITTEN BY:
THE KNIGHTS OF SHADOW
_______________________________________



Description: Hacking DEC's (Knights of Shadow II)
File Date: 6-21-87
File Time: 6:31 am


***************************************
***************************************
** **
** Hacking : DEC's **
** **
***************************************
***************************************

Welcome to Basics of Hacking I: DEC's In this article you will learn how
to log in to DEC's, logging out, and all the fun stuff to do in-between.
All of this information is based on a standard DEC system. Since there
are DEC systems 10 and 20, and we favor, the DEC 20, there will be more
info on them in this article. It is also the more common of the two,
and is used by much more interesting people (if you know what we mean...)
Ok, the first thing you want to do when you are receiving carrier from
a DEC system is to find out the format of login names. You can do this
by looking at who is on the system.

DEC=> @ (the 'exec' level prompt)
YOU=> SY

SY is short for SY(STAT) and shows you the system status. You should see
|he format of login names... A SYSTAT usually comes up in this form:

Job Line Program User

Job: The JOB number (Not important unless you want to log them off later)
Line: What line they are on (used to talk to them...)
These are both two or three digit numbers.
Program: What program are they running under? If it says 'EXEC' they aren't
doing anything at all...
User: ahhhAHHHH! This is the user name they are logged in under...

Copy the format, and hack yourself out a working code...
Login format is as such:

DEC=> @
YOU=> login username password

Username is the username in the format you saw above in the SYSTAT. After you
hit the space after your username, it will stop echoing characters back to
your screen. This is the password you are typing in... Remember, people
usually use their name, their dog's name, the name of a favorite character
in a book, or something like this. A few clever people have it set to a key
cluster (qwerty or asdfg). PW's can be from 1 to 8 characters long, anything
after that is ignored.
It would be nice to have a little help, wouldn't it? Just type a ?
or the word HELP, and it will give you a whole list of topics...
Some handy characters for you to know would be the control keys, wouldn't it?
Backspace on a DEC 20 is rub which is 255 on your ASCII chart. On the DEC 10
it is Ctrl-H. To abort a long listing or a program, Ctrl-C works fine. Use
Ctrl-O to stop long output to the terminal. This is handy when playing
a game, but you don't want to Ctrl-C out. Ctrl-T for the time. Ctrl-U
will kill the whole line you are typing at the moment. You may accidently
run a program where the only way out is a Ctrl-X, so keep that in reserve.
Ctrl-S to stop listing, Ctrl-Q to continue on both systems. Is your
terminal having trouble?? Like, it pauses for no reason, or it doesn't
backspace right? This is because both systems support many terminals,
and you haven't told it what yours is yet... You are using a VT05 (Isn't
that funny? I thought i had an apple) so you need to tell it you are one.

DEC=> @
YOU=> information terminal
or...
YOU=> info ter

This shows you what your terminal is set up as...

DEC=> all sorts of shit, then the @
YOU=> set ter vt05

This sets your terminal type to VT05. Now let's see what is in the account
(here after abbreviated acct.) that you have hacked onto...

SAY => DIR

short for directory, it shows you what the user of the code has save to the
disk. There should be a format like this: xxxxx.ooo xxxxx is the file
name, from 1 to 20 characters long. ooo is the file type, one of:
exe, txt, dat, bas, cmd and a few others that are system dependant.
Exe is a compiled program that can be run (just by typing its name at the @).
Txt is a text file, which you can see by typing=> type xxxxx.txt
Do not try to=> type xxxxx.exe This is very bad for your terminal and
will tell you absolutly nothing. Dat is data they have saved.
Bas is a basic program, you can have it typed out for you.
Cmd is a command type file, a little too complicated to go into here.

TRY => take xxxxx.cmd

By the way, there are other usersout there who may have files you can
use (Gee, why else am i here?).

TYPE => DIR <*.*> (DEC 20)
=> DIR [*,*] (DEC 10)
* is a wildcard, and will allow you

to access the files on other accounts if the user has it set for public
access. If it isn't set for public access, then you won't see it.
to run that program:

DEC=> @
YOU=> username program-name

Username is the directory you saw the file listed under, and file name was
what else but the file name?

** YOU ARE NOT ALONE **
Remember, you said (at the very start) SY short for SYSTAT, and how we said
this showed the other users on the system? Well, you can talk to them,
or at least send a message to anyone you see listed in a SYSTAT. You can
do this by:

DEC=> the user list (from your systat)
YOU=> talk username (DEC 20)
send username (DEC 10)

Talk allows you and them immediate conferencing.









Description: Hackign Data General (Knights of Shadow IV)
File Date: 6-21-87
File Time: 6:36 am


***************************************
***************************************
** **
** Hacking III: Data **
** General **
** **
***************************************
***************************************

Welcome to the basics of hacking III: Data General computers.
Data General is favored by large corporations who need to have a lot of
data on-line. The Data General AOS, which stands for Advance on of
bastardized UNIX. All the commands which were in the UNIX article, will
work on a Data General. Once again, we have the problem of not knowing
the format for the login name on the Data General you want to hack. As
seems to be standard, try names from one to 8 digits long. Data General
designed the computer to be for businessmen, and is thus very simplistic,
and basically fool proof (but not damn fool proof). It follows the same
login format as the unix system:

DG=> login:
DG=> password:
YOU=> password

Passwords can be a maximum of 8 characters, and they are almost always
set to a default of 'AOS' or 'DG'. (any you know about businessmen...)

A word about control characters:
Ctrl-O stops massive print-outs to the screen, but leaves you in whatever
mode you were. (A technical word on what this actually does: It tells the
CPU to ignore the terminal, and prints everything out to the CPU! This is
about 19200 baud, and so it seems like it just cancels.) Ctrl-U kills the
line you are typing at the time. Now for the weird one: Ctrl-C tells the
CPU to stop, and wait for another ctrl character. To stop a program,
you actually need to type Ctrl-C and then a Ctrl-B.

Once you get on, type 'HELP'. Many DG (Data General) computers are sold
in a package deal, which also gets the company free customizing. So you never
know what commands there might be. So we will follow what is known as the
'ECLIPSE STANDARD', or''ctory like. To find out the files on the directory
you are using, type

=> DIR

To run a program, just like on a DEC, just type its name. Other than this,
and running other people's programs, there really isn't a standard...

*** HARK, yon other system users ***

To see who is on, type => WHO remember?). This shows the other users,
what they are doing, and what paths they are connected across. This
is handy, so try a few of those paths yourself. To send a message, say

=> send username

This is a one time message, just like send on the DEC 10. From here on, try
commands from the other previous files and from the 'HELP' listing.

superuser:
If you can get privs, just say:

=> superuser on

and you turn those privs on!
By the way, you remember that computers keep a log of what people do? type:

=> syslog /stop

and it no longer records anything you do on the system, or any of the other
users. It screams to high heaven that it was you who turned it off, but it
keeps no track of any accounts created or whatever else you may do. You can

say=> syslog /start

to turn it back on (now why would you want to do something like that?????)
To exit from the system, type=> BYE and the system will hang up on you.

Most of the systems around, including DECs, VAX's, and DG's, have games.
These are usually located in a path or directory of the name games or
or games: Try looking in them, and you might find adventure, zork, wumpus
(with bent arrows in hand) or a multitude of others. There may also be
games called 'CB' or 'FORUM'. These are a sort of computer conference call.
Use them on weekends, and you can meet all sorts of interesting people.

If you would like to see more articles on hacking (this time far more than
just the basics), or maybe articles on networks and such, then leave us mail
if we are on the system, or have the sysop search us down. We call a lot
of places, and you may just find us.

Searching For Something To Download, This may help

If ure searching for something to download in google u can use this little trick. Mostly it works. Try typing this:

parent + directory + anything u wanna download

but if u wanna download anything special u can specify.

IE:

parent + directory + games + whatever

dunno if it will work for you all but for me it works quite good sometimes

Removing Banners From Free Webhosts

Removing Banners From Free Webhosts

Today,there r number of wesites,which offer you webspace and areasonable good URL,for free.This service has become most popularas it is the easiest and fastest way of puting up ur site on net,getting an identity for ur self and becoming a part of huge web.
But The problem is they put Huge banners In that free sevice .

How To remove that?
its easy
follow the steps down
The banners Which r embedded r just about the only source of income for these websites,so if u r caught carrying out any of the below 'No Banner'
tricks,then u would possible lose ur account. So BEWARE!!!


For Geocities,,angel fire,freeservers,50 megs,fortune city,netscape

place the below code after the end HTML tag:

Anglefire/FreeServers/50Megs/FortuneCity/Netscape/tripod
Place the below code any where on the page:


the above snippet will give an error and normally no other Java script code would be executed,so no banner would be displayed.however ,it doesn't work in all cases ,so there is yet another Hack for angelfire:Surround the BODY tag with the below code



If in case any thing doesn't work I am not responsible

if u want for any other free webhost i will give req here

----------------------------------------------------


Here are some more for you guys, good luck and have fun


Banner Kills

Tripod Insert between the tag




Angelfire Insert anywhere in the tag (for pop-up option)



BizLand Insert anywhere in the tag