Showing posts with label Of. Show all posts
Showing posts with label Of. Show all posts

Saturday, February 11, 2012

The Basics of Hacking II


The Basics of Hacking II            

Basics to know before doing anything, essential to your continuing
career as one of the elite in the country...  This article, "the
introduction to the world of hacking" is meant to help you by telling you
how not to get caught, what not to do on a computer system, what type of
equipment should I know about now, and just a little on the history, past
present future, of the hacker.

Welcome to the world of hacking! We, the people who live outside of the
normal rules, and have been scorned and even arrested by those from the
'civilized world', are becomming scarcer every day.  This is due to the
greater fear of what a good hacker (skill wise, no moral judgements
here)|can do nowadays, thus causing anti- hacker sentiment in the masses.
Also, few hackers seem to actually know about the computer systems they
hack, or what equipment they will run into on the front end, or what they
could do wrong on a system to alert the 'higher' authorities who monitor
the system. This article is intended to tell you about some things not to
do, even before you get on the system.  I will tell you about the new wave
of front end security devices that are beginning to be used on computers.
I will attempt to instill in you a second identity, to be brought up at
time of great need, to pull you out of trouble. And, by the way, I take no, repeat,
no, responcibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs,
you see on the high access board a phone number!  It says it's a great
system to "fuck around with!" This may be true, but how many other people
are going to call the same number?  So:  try to avoid calling a number
given to the public. This is because there are at least every other
user calling, and how many other boards will that number spread to?
If you call a number far, far away, and you plan on going thru an
extender or a re-seller, don't keep calling the same access number
(I.E. As you would if you had a hacker running), this looks very suspicious
and can make life miserable when the phone bill comes in the mail.
Most cities have a variety of access numbers and services,
so use as many as you can. Never trust a change in the system...
The 414's, the assholes, were caught for this reason: when one of them
connected to the system, there was nothing good there.  The next time,
there was a trek game stuck right in their way!  They proceded to play said
game for two, say two and a half hours, while telenet was tracing them!
Nice job, don't you think?  If anything looks suspicious, drop the line
immediately!!  As in, yesterday!! The point we're trying to get accross is:
if you use a little common sence, you won't get busted.  Let the little
kids who aren't smart enough to recognize a trap get busted, it will take
the heat off of the real hackers. Now, let's say you get on a computer
system...  It looks great, checks out, everything seems fine.
Ok, now is when it gets more dangerous.  You have to know the computer
system to know what not to do.
Basically, keep away from any command something, copy a new file into the
account, or whatever!  Always leave the account in the same status you
logged in with.  Change *nothing*... If it isn't an account with priv's,
then don't try any commands that require them! All, yes all, systems are
going to be keeping log files of what users are doing, and that will
show up.  It is just like dropping a trouble-card in an ESS system,
after sending that nice operator a pretty tone.
Spend no excessive amounts of time on the account in one stretch.
Keep your calling to the very late night ifpossible, or during
business hours (believe it or not!).  It so happens
that there are more users on during business hours, and it is very
difficult to read a log file with 60 users doing many commnds every minute.
Try to avoid systems where everyone knows each other, don't try to bluff.
And above all:  never act like you own the system, or are the best there
is. They always grab the people who's heads swell... There is some very
interesting front end equipment around nowadays, but first let's
define terms... By front end, we mean any device that you must
pass thru to get at the real computer. There are devices that are made to
defeat hacker programs, and just plain old multiplexers.
To defeat hacker programs, there are now devices that pick up the phone
and just sit there...  This means that your device gets no carrier,
thus you think there isn't a computer on the other end.  The
only way around it is to detect when it was picked up.  If it pickes up
after the same number ring, then you know it is a hacker-defeater.
These devices take a multi-digit code to let you into the system.
Some are, in fact, quite sophisticated to the point where it
will also limit the user name's down, so only one name or set of names
can be valid logins after they input the code... Other devices input a
number code, and then they dial back a pre-programmed number for that code.
These systems are best to leave alone,
because they know someone is playing with their phone.  You may think "but
i'll just reprogram the dial-back." Think again, how stupid that is...
Then they have your number, or a test loop if you were just a little
smarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loops
are *monitored*. As for multiplexers...  What a plexer is supposed
to do is this:
The system can accept multiple users. We have to time share, so we'll let
the front-end processor do it...  Well, this is what a multiplexer does.
Usually they will ask for something like "enter class" or "line:".  Usually
it is programmed for a double digit number, or a four to five letter word.
There are usually a few sets of numbers it accepts, but those numbers also
set your 300/1200/2400 baud data type.
These multiplexers are inconvenient at best, so not to worry. A little
about the history of hacking: hacking, by my definition, means a great
knowledge of some special area. Doctors and lawyers
are hackers of a sort, by this definition.  But most often, it is
being used in the computer context, and thus we have a definition of
"anyone who has a great amount of computer or telecommunications
knowledge."  You are not a hacker because you have a list of codes...
Hacking, by my definition, has then been around only about 15 years.
It started, where else but, mit and colleges where they had computer
science or electrical engineering departments.
Hackers have created some of the best computer languages, the
most awesome operating systems, and even gone on to make millions.
Hacking used to have a good name, when we could honestly say
"we know what we are doing".  Now it means (in the public eye):
the 414's, ron austin, the nasa hackers, the arpanet hackers...
All the people who have been caught,
have done damage, and are now going to have to face fines and sentences.
Thus we come past the moralistic crap, and to our purpose:  educate the
hacker community, return to the days when people actually knew something...




Friday, February 10, 2012

A different kind of Molitoff Cocktail


A different kind of Molitoff Cocktail            

Here is how you do it:

 - Get a coke bottle & fill it with gasoline about half full

 - Cram a piece of cloth into the neck of it nice and tight

 - Get a chlorine tablet and stuff it in there. You are going to have
to force it because the tablets are bigger than the opening of the
bottle.

 - Now find a suitable victim and wing it in their direction. When it
hits the pavement or any surface hard enough to break it, and the chlorine
and gasoline mix..... BOOM!!!!!!
Have fun!                                


Thursday, February 9, 2012

List Of Sites Not To Go To

List Of Sites Not To Go To

Misspellings or misrepresentation Tactics
----------------------------------------------

http://www.aresgalaxy.com

http://www.edonkey-software.com

http://www.edonkey-mp3.com

http://www.emule-software.com

http://www.poilet.com

http://www.kaaza.com

http://www.kazza.com

http://www.kaza.com

http://www.kazaalite.com

http://www.kazaa-lite.tk

http://www.k-lite.tk

http://www.kazaalite.nl

http://www.kazaa-download.de

http://www.kazaagold.com

http://k-litetk.com

http://www.kazaalite.de - Beware, links on the page prompt for download of star dialer.

http://www.kazaa.de - Same as kazaalite.de. Again, beware of star dialer.

http://www328.ws1.internetservice.com - Same as kazaa.de and kazaalite.de.

http://www.kazaa-file-sharing-downloads.com - Fishy executable present here.

http://www.klitesite.com

http://www.klite.tk

http://freewebhosting.hostdepartment.com/k/kazaalitetk - Redirects to klitesite.com.

http://kazaa.freakin.nl

http://www.kazaa-gold.com - I discovered this site while reading Sharmans copyright infringment complaint to google.com.

http://www.kazaamedia.com

http://www.kazaaplatinum.com

http://www.kazaa-plus.net

http://www.kl-kpp.net

http://www.kazaa.co.kr

http://www.ikazaa.net

http://www.supernova.org

http://www.suprnova.com

http://www.slsk.org - Old soulseek domain, that now links to a mainpeen dialer (scumware).

http://www.sharaza.com

http://www.winmx-download-winmx.com - WinMX based scam.

http://www.musicdonkey.net/

----------------------------------

Regular P2P scam type sites

----------------------------------

http://www.fileminer.com

http://www2.music-download-network.com

http://filmgimp.org

http://www.filesharingfriends.com

http://www.mp3ebook.com

http://www.symynet.com/educational_software/kazaa_light.htm - Looks to me to be just a cheap plug for an amazon.com product (an MP3 CD player).

http://www.bolton-heaton.freeserve.co.uk/kazaa.htm - Not only do they link to yet another scam site, they also link to many forms of adware and spyware including
gator and aluriaaffiliates.

http://www.emp3downloadhq.com

http://www.unlimitedshock.com

http://www.songs4free.com

http://www.mp3u.com

http://download-central.mp3u.com

http://www.americamp3network.com

http://www.mp3university.com

http://www.downloads-unlimited.com

http://www.download-mp3-now.com

http://www.imusicshare.com

http://www.musicdownloadcentral.com

http://www.downloadsociety.com

http://www.mp3musiczone.com

http://www.mp3rocks.net

http://www.247downloads.com

http://www.mymusicinc.com

http://www.mp3advance.com

http://www.songfly.com

http://www.mp3musicworld.com

http://www.charliespiano.com/downloadable_music.php - Links to an existing scam site.

http://www.freeality.com/emusic.htm

http://www.free-mp3-music-player-downloads.com

http://www.mp3yes.com

http://www.mp3.abandonware.nu

http://www.mp3high.com

http://www.mp3shock.net

http://www.mp3advance.com - This one was being displayed on BeatKing through the Google ads

http://www.my-free-music.com

http://www.findanymusic.com - Claims it's legal; obviously a scam.

http://www.xvidmovies.com/ - The main culprit is (http://www.xvidmovies.com/movies/)

http://www.moviedownloadcity.com

http://www.hqmovies.net

http://www.gettingmovies.com/Movies.html

http://www.compareshopsave.com/moviesites

http://k-lite-legal.com - Another claim of legality.

http://www.imovieshare.com

http://www.easymusicdownload.com

http://www.flicksunlimited.com

http://www.completemovies.com/index2.html

http://www.download-mp3-music.com

http://www.freemovieserver.com

http://www.mp3perfect.com

http://www.mp3downloadcity.com

http://www.downloadshield.com

http://www.legacymp3.net

http://www.crazymp3s.org

http://www.21-century-mp3.nu

http://www.greekmusicmp3s.com

http://www.filesharingcenter.com

http://www.unlimitedshock.com

http://www.mp333.com

http://www.mp3madeeasy.com

http://www.mp3grandcentral.net

http://www.mp3-network.com

http://www.morpheusultra.com

http://www.flixs.net

http://www.charliespiano.com/downloadable_music.php

http://www.compareshopsave.com/moviesites

http://www.completemovies.com/index2.html

http://www.ondemandmp3.com

Wednesday, February 8, 2012

The Arts of Lockpicking II

The Arts of Lockpicking II

So you want to be a criminal. Well, if you want to be like James
Bond and open a lock in fifteen seconds, then go to Hollywood,
because that is the only place you are ever going to do it. Even
experienced locksmiths can spend five to ten minutes on a lock if
they are unlucky. If you are wanting extremely quick access, look
elsewhere. The following instructions will pertain mostly to the
"lock in knob" type lock, since it is the easiest to pick.

First of all, you need a pick set. If you know a locksmith, get
him to make you a set. This will be the best possible set for you
to use. If you find a locksmith unwilling to supply a set, don't
give up hope. It is possible to make your own, if you have access
to a grinder (you can use a file, but it takes forever).

The thing you need is an allen wrench set (very small). These
should be small enough to fit into the keyhole slot. Now, bend
the long end of the allen wrench at a slight angle (not 90
degrees). Now, take your pick to a grinder or a file, and smooth
the end until it is rounded so it won't hang inside the lock.
Test your tool out on doorknobs at your house to see if it will
slide in and out smoothly. Now, this is where the screwdriver
comes in. It must be small enough for it and your pick to be used
in the same lock at the same time, one above the other. In the
coming instructions, please refer to this chart of the interior of
a lock:
______________________________
\ K
| | | | | | / E
| | | | \ Y [|] Upper tumbler pin
^ ^ / H [^] Lower tumbler pin
^ ^ ^ ^ ^ ^ \ O [-] Cylinder wall
/ L (This is a greatly simplified
\ E drawing)
______________________________/

The object is to press the pin up so that the space between the
upper pin and the lower pin is level with the cylinder wall. Now,
if you push a pin up, it's tendency is to fall back down, right?
That is where the screwdriver comes in. Insert the screwdriver
into the slot and turn. This tension will keep the "solved" pins
from falling back down. Now, work from the back of the lock to
the front, and when you are through, there will be a click, the
screwdriver will turn freely, and the door will open.

Do not get discouraged on your first try! It will probably take
you about twenty to thirty minutes your first time. After that,
you will quickly improve with practice.

Add to TACIV, '94.

-= Exodus =-

good way of finding MP3s

Another good way of finding MP3s (or other formats) is using Google and typing the following:

parent + directory + mp3 + OR + wma+ #dido#

Replace #dido# by whatever artist you wish to find, for example:

parent + directory + mp3 + OR + wma+ #Lamb#

You should get plenty of dirs with MP3s or WMA files (you could add OGG, etc, to the query). Cheers.

How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!

How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!

verry simple.. get the latest version from h**p://slysoft.com download it , install, restart.

now that it's installed. Click in the "Read to Image" icon.. click next to get to the next screen.. select "Protected PC Game" click next.. and after it makes the image.. exit the program..

Now re-open CloneCD
click on the "Write from image" icon.. clicik next.. select "Protected PC Game" and click next.. NOTE:!! i tested this method with an CD-RW.. so far i wont/cant test with a CD-R (shouldn't make a difference) because i'm down to my last 3 CD-R's.. so you can try a CD-R.. i dont care but sofar i tested with the TDK 80min/700mb CD-RW blanks..

now i had it working without a patch.. after i burnt the disc.. i installed the sims from the burnt copy and tried to load.. IT Worked! i've got the sims in the background as i speak!.. not sure if anyone else knew about this but i got this idea in a dream about Digimon and Dragon Drive.. (DONT EVEN ASK WHY!) but "Guilmon" and "Chibi" said Tom.. to make a Perfect copy of The Sims CD's.. Use Clone CD.. afterwards . i woke up.. and i tried it! henh .. uncanny hunh?

Share it