Showing posts with label the. Show all posts
Showing posts with label the. Show all posts

Saturday, February 11, 2012

The Remote Informer


##########################################################################
#                                                                        #
#                           The Remote Informer                          #
#                                                                        #
#------------------------------------------------------------------------#
#             Reader supported newsletter for the underworld             #
#------------------------------------------------------------------------#
#                                                                        #
#                    Editors: Tracker and Norman Bates                   #
#                                                                        #
#========================================================================#
# September 1987                                               Issue: 01 #
#========================================================================#
#                              The Headlines                             #
#------------------------------------------------------------------------#
#                     1) Introduction                                    #
#                     2) Hacking Sprint: The Easy Way                    #
#                     3) Rumors: Why spread them?                        #
#                     4) The New Sprint FON Calling Cards                #
#                     5) Automatic Number Identifier (ANI)               #
##########################################################################
         
                   Introduction
--------------------------------------------------------------------------
Welcome to the first issue of 'The Remote Informer'!  This newsletter
is reader supported.  If the readers of this newsletter do not help
support it, then it will end.  We are putting this out to help out the
ones that would like to read it.  If you are one of those who thinks they
know everything, then don't bother reading it.  This newsletter is not
anything like the future issues.  The future issues will contain several
sections, as long as reader input is obtained.  Below is an outline
overview of the sections in the future issues.

I/O Board (Input/Output Board)

The I/O Board is for questions you have, that we might be able to
answer or atleast refer you to someone or something.  We will be honest if
we cannot help you.  We will not make up something, or to the effect, just
to make it look like we answered you.  There will be a section in the I/O
Board for questions we cannot answer, and then the readers will have the
opportunity to answer it.  We will print anything that is reasonable in
the newsletter, even complaints if you feel like you are better than
everyone.

NewsCenter

This section will be for news around the underworld.  It will talk of
busts of people in the underworld and anything else that would be
considered news.  If you find articles in the paper, or something happens
in your local area, type it up, and upload it to one of the boards listed
at the end of the newsletter.  Your handle will be placed in the article.
If you do enter a news article, please state the date and from where you
got it.

Feature Section

The Feature Section will be the largest of the sections as it will be
on the topic that is featured in that issue.  This will be largely reader
input which will be sent in between issues.  At the end of the issue at
hand, it will tell the topic of the next issue, therefore, if you have
something to contribute, then you will have ample time to prepare your
article.

Hardware/Software Review
In this section, we will review the good and bad points of hardware
and software related to the underworld.  It will be an extensive review,
rather than just a small paragraph.

The Tops

This section will be the area where the top underworld BBS's, hacking
programs, modem scanners, etc. will be shown.  This will be reader
selected and will not be altered in anyway.  The topics are listed below.
Underworld BBS's (Hack, Phreak, Card, Anarchy, etc.)
Hacking programs for Hayes compatables
Hacking programs for 1030/Xm301 modems
Modem scanners for Hayes compatables
Modem scanners for 1030/Xm301 modems
Other type illegal programs
You may add topics to the list if enough will support it.

Tid Bits

This will contain tips and helpful information sent in by the users.
If you have any information you wish to contribute, then put it in a text
file and upload it to one of the BBS's listed at the end of the
newsletter.
Please, no long distance codes, mainframe passwords, etc.
We may add other sections as time goes by.  This newsletter will not
be put out on a regular basis.  It will be put out when we have enough
articles and information to put in it.  There may be up to 5 a month, but
there will always be at least one a month.  We would like you, the readers,
to send us anything you feel would be of interest to others, like hacking
hints, methods of hacking long distance companies, companies to card from,
etc.  We will maintain the newsletter as long as the readers support it.
That is the end of the introduction, but take a look at this newsletter,
as it does contain information that may be of value to you.
==========================================================================
                      Hacking Sprint: The Easy Way
-------------------------------------------------------------------------
                             By: Tracker

If you hack US Sprint, 950-0777 (by the way it is no longer GTE
Sprint), and you are fustrated at hacking several hours only to find one
or two codes, then follow these tips, and it will increase your results
tremendously.  First, one thing that Mr. Mojo proved is that Sprint will
not store more than one code in every hundred numbers.  (ex: 98765400 to
98765499 may contain only one code).   There may NOT be a code in that
hundred, but there will never be more than one.
Sprint's 9 digit codes are stored from 500000000 through 999999999.
In the beginning of Sprint's 950 port, they only had 8 digit codes.  Then
they started converting to 9 digit codes, storing all 8 digit codes
between 10000000 and 49999999 and all 9 digit codes between 500000000 and
999999999.  Sprint has since cancelled most 8 digit codes, although there
are a few left that have been denoted as test codes.  Occaisionally, I
hear of phreaks saying they have 8 digit codes, but when verifying them,
the codes were invalid.
Now, where do you start?  You have already narrowed the low and high
numbers in half, therefore already increasing your chances of good results
by 50 percent.  The next step is to find a good prefix to hack.  By the
way, a prefix, in hacking terms, is the first digits in a code that can be
any length except the same number of digits the code is.  (ex: 123456789
is a code.  That means 1, 12, 123, 1234, 12345, 123456, 1234567, and
12345678 are prefixes)  The way you find a good prefix to hack is to
manually enter a code prefix.  If when you enter the code prefix and a
valid destination number and you do not hear the ringing of the recording
telling you that the code is invalid until near the end of the number,
then you know the prefix is valid.  Here is a chart to follow when doing
this:
Code      - Destination    Range good codes exist
-------------------------------------------------
123456789 - 6192R           123400000 - 123499999
123456789 - 619267R         123450000 - 123459999
123456789 - 61926702R       123456000 - 123456999
123456789 - 6192670293R     123456700 - 123456799
-------------------------------------------------
( R - Denotes when ring for recording starts)
To prove
this true, I ran a test using OmniHack 1.3p, written by
Jolly Joe.  In this test I found a prefix where the last 3 digits were all
I had to hack.  I tested each hundred of the 6 digit prefix finding that
all but 4 had the ring start after the fourth digit was dialed in the
destination number.  The other four did not ring until I had finished the
entire code.  I set OmniHack to hack the prefix + 00 until prefix + 99.
(ex: xxxxxxy00 to xxxxxxy99: where y is one of the four numbers that the
ring did not start until the dialing was completed.)  Using this method, I
found four codes in a total of 241 attempts using ascending hacking (AKA:
Sequential).  Below you will see a record of my hack:
Range of hack            Codes found     Tries
----------------------------------------------
xxxxxx300 - xxxxxx399     xxxxxx350        50
xxxxxx500 - xxxxxx599     xxxxxx568        68
xxxxxx600 - xxxxxx699     xxxxxx646        46
xxxxxx800 - xxxxxx899     xxxxxx877        77
----------------------------------------------
Totals                     4 codes        241
As you see, these methods work.  Follow these guidlines and tips and
you should have an increase in production of codes in the future hacking
Sprint.  Also, if you have any hints/tips you think others could benefit
from, then type them up and upload them to one of the boards at the end of
the newsletter.
==========================================================================
                         Rumors: Why Spread Them?
--------------------------------------------------------------------------
                              By: Tracker
Do you ever get tired of hearing rumors?  You know, someone gets an
urge to impress others, so they create a rumor that some long distance
company is now using tracing equipment.  Why start rumors?  It only scares
others out of phreaking, and then makes you, the person who started the
rumor, look like Mr. Big.  This article is short, but it should make you
aware of the rumors that people spread for personal gain.  The best thing
to do is to denote them as a rumor starter and then leave it at that.  You
should not rag on them constantly, since if the other users cannot
determine if it is fact or rumor, then they should suffer the
consequences.
==========================================================================
                     The New Sprint FON Calling Cards
--------------------------------------------------------------------------
                               By: Tracker
US Sprint has opened up a new long distance network called the Fiber
Optic Network (FON), in which subscribers are given calling cards.  These
calling cards are 14 digits, and though, seem randomly generated, they are
actually encrypted.  The rumors floating around about people getting
caught using the Sprint FON calling cards are fact, not rumors.  The
reason people are getting caught is that they confuse the FON calling
cards with the local 950 port authorization codes.  If you will remember,
you never use AT&T calling cards from you home phone.  It has ANI
capability, which is not tracing, but rather the originating phone number
is placed on the bill as soon as the call is completed.  They know your
phone number when you call the 800 access port, but they do not record it
until your call is completed.  Also, through several of my hacks, I came
up with some interesting information surrounding the new Sprint network.
They are listed below.
800-877-0000
This number is for information on US Sprint's 800 calling card
service.  I have not played around with it, but I believe it is for
trouble or help with the FON calling cards.  I am not sure if it is for
subscribing to the FON network.
800-877-0002 - You hear a short tone, then nothing.
800-877-0003 - US Sprint Alpha Test Channel #1
800-877-(0004-0999)
When you call these numbers, you get a recording saying: "Welcome to
US Sprint's 1 plus service."  When the recording stops, if you hit the
pound key (#) you will get the calling card dial tone.
Other related Sprint numbers
800-521-4949   This is the number that you subscribe to US Sprint with.
You may also subscribe to the FON network on this number.  It will take 4
to 5 weeks for your calling card to arrive.
10777
This is US Sprint's equal access number.  When you dial this number,
you then dial the number you are calling, and it will be billed through US
Sprint, and you will receive their long distance line for that call.  Note
that you will be billed for calls made through equal access.  Do not
mistake it to be a method of phreaking, unless used from a remote
location.
If you are in US Sprint's 1+ service then call 1+700-555-1414, which
will tell you which long distance company you are using.  When you hear:
"Thank you for choosing US Sprint's 1 plus service," hit the pound key
(#), and then you will get the US Sprint dial tone.  This however is just
the same as if you are calling from your home phone if you dial direct, so
you would be billed for calls made through that, but there are ways to use
this to your advantage as in using equal access through a PBX.
==========================================================================
                   Automatic Number Identification (ANI)
--------------------------------------------------------------------------
                             By: Tracker

The true definition for Automatic Number Identification has not been
widely known to many.  Automatic Number Identification, (AKA: ANI), is the
process of the destination number knowing the originating number, which is
where you are calling from.  The method of achieving this is to send the
phone number that you are calling from in coded form ahead of the
destination number. Below is an example of this.
ANI Method
Dial: 267-0293
Sent: ********2670293
* - Denotes the originating number which is coded and sent before the
    number
As you noticed there are 8 digits in the coded number.  This is
because, at least I believe, it is stored in a binary-like form.
Automatic Number Identification means a limited future in phreaking. ANI
does not threaten phreaking very much yet, but it will in the near future.
A new switching system will soon be installed in most cities that are
covered by ESS, Electronic Switching System, now.
The system will have ANI capabilities which will be supplied to the
owners of phone lines as an›added extra.  The owner's phone will have
an LED read-out that will show the phone number of the people that
call you.  You will be able to block some numbers, so that people
cannot call you.  This system is in the testing stages currently, but will
soon be installed across most of the country.  As you see, this will
end a large part of phreaking, until we, the phreakers, can come up with
an alternative.  As I have been told by several, usually reliable,
people, this system is called ISS, which I am not sure of the meaning of
this, and is being tested currently in Rhode Island.
800 in-watts lines set up by AT&T support ANI.  The equipment to
decode an ANI coded origination number does not costs as much as you would
expect.  950 ports do not offer ANI capability, no matter what you have
been told.  The 950 ports will only give the city in which they are based,
this usually being the largest in the state, sometimes the capitol.
One last thing that I should tell you is that ANI is not related to
tracing.  Tracing can be done on any number whether local, 950, etc.  One
way around this, especially when dialing Alliance TeleConferencing, is to
dial through several extenders or ports.  ANI will only cover the number
that is calling it, and if you call through a number that does not support
ANI, then your number will never be known.
==========================================================================
                              The Disclaimer!
--------------------------------------------------------------------------

We, the editors, take no responsibility for your actions and use of
the information in this newsletter.  This newsletter is for informational
purposes only.  There will never be any long distance codes, passwords,
etc. in this newsletter.  If you are easily offended by telecommunication
discussions, then we suggest that you not read this newsletter.  But for
those who are truely interested in the information in this newsletter,
enjoy it.





The Basics of Hacking II


The Basics of Hacking II            

Basics to know before doing anything, essential to your continuing
career as one of the elite in the country...  This article, "the
introduction to the world of hacking" is meant to help you by telling you
how not to get caught, what not to do on a computer system, what type of
equipment should I know about now, and just a little on the history, past
present future, of the hacker.

Welcome to the world of hacking! We, the people who live outside of the
normal rules, and have been scorned and even arrested by those from the
'civilized world', are becomming scarcer every day.  This is due to the
greater fear of what a good hacker (skill wise, no moral judgements
here)|can do nowadays, thus causing anti- hacker sentiment in the masses.
Also, few hackers seem to actually know about the computer systems they
hack, or what equipment they will run into on the front end, or what they
could do wrong on a system to alert the 'higher' authorities who monitor
the system. This article is intended to tell you about some things not to
do, even before you get on the system.  I will tell you about the new wave
of front end security devices that are beginning to be used on computers.
I will attempt to instill in you a second identity, to be brought up at
time of great need, to pull you out of trouble. And, by the way, I take no, repeat,
no, responcibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs,
you see on the high access board a phone number!  It says it's a great
system to "fuck around with!" This may be true, but how many other people
are going to call the same number?  So:  try to avoid calling a number
given to the public. This is because there are at least every other
user calling, and how many other boards will that number spread to?
If you call a number far, far away, and you plan on going thru an
extender or a re-seller, don't keep calling the same access number
(I.E. As you would if you had a hacker running), this looks very suspicious
and can make life miserable when the phone bill comes in the mail.
Most cities have a variety of access numbers and services,
so use as many as you can. Never trust a change in the system...
The 414's, the assholes, were caught for this reason: when one of them
connected to the system, there was nothing good there.  The next time,
there was a trek game stuck right in their way!  They proceded to play said
game for two, say two and a half hours, while telenet was tracing them!
Nice job, don't you think?  If anything looks suspicious, drop the line
immediately!!  As in, yesterday!! The point we're trying to get accross is:
if you use a little common sence, you won't get busted.  Let the little
kids who aren't smart enough to recognize a trap get busted, it will take
the heat off of the real hackers. Now, let's say you get on a computer
system...  It looks great, checks out, everything seems fine.
Ok, now is when it gets more dangerous.  You have to know the computer
system to know what not to do.
Basically, keep away from any command something, copy a new file into the
account, or whatever!  Always leave the account in the same status you
logged in with.  Change *nothing*... If it isn't an account with priv's,
then don't try any commands that require them! All, yes all, systems are
going to be keeping log files of what users are doing, and that will
show up.  It is just like dropping a trouble-card in an ESS system,
after sending that nice operator a pretty tone.
Spend no excessive amounts of time on the account in one stretch.
Keep your calling to the very late night ifpossible, or during
business hours (believe it or not!).  It so happens
that there are more users on during business hours, and it is very
difficult to read a log file with 60 users doing many commnds every minute.
Try to avoid systems where everyone knows each other, don't try to bluff.
And above all:  never act like you own the system, or are the best there
is. They always grab the people who's heads swell... There is some very
interesting front end equipment around nowadays, but first let's
define terms... By front end, we mean any device that you must
pass thru to get at the real computer. There are devices that are made to
defeat hacker programs, and just plain old multiplexers.
To defeat hacker programs, there are now devices that pick up the phone
and just sit there...  This means that your device gets no carrier,
thus you think there isn't a computer on the other end.  The
only way around it is to detect when it was picked up.  If it pickes up
after the same number ring, then you know it is a hacker-defeater.
These devices take a multi-digit code to let you into the system.
Some are, in fact, quite sophisticated to the point where it
will also limit the user name's down, so only one name or set of names
can be valid logins after they input the code... Other devices input a
number code, and then they dial back a pre-programmed number for that code.
These systems are best to leave alone,
because they know someone is playing with their phone.  You may think "but
i'll just reprogram the dial-back." Think again, how stupid that is...
Then they have your number, or a test loop if you were just a little
smarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loops
are *monitored*. As for multiplexers...  What a plexer is supposed
to do is this:
The system can accept multiple users. We have to time share, so we'll let
the front-end processor do it...  Well, this is what a multiplexer does.
Usually they will ask for something like "enter class" or "line:".  Usually
it is programmed for a double digit number, or a four to five letter word.
There are usually a few sets of numbers it accepts, but those numbers also
set your 300/1200/2400 baud data type.
These multiplexers are inconvenient at best, so not to worry. A little
about the history of hacking: hacking, by my definition, means a great
knowledge of some special area. Doctors and lawyers
are hackers of a sort, by this definition.  But most often, it is
being used in the computer context, and thus we have a definition of
"anyone who has a great amount of computer or telecommunications
knowledge."  You are not a hacker because you have a list of codes...
Hacking, by my definition, has then been around only about 15 years.
It started, where else but, mit and colleges where they had computer
science or electrical engineering departments.
Hackers have created some of the best computer languages, the
most awesome operating systems, and even gone on to make millions.
Hacking used to have a good name, when we could honestly say
"we know what we are doing".  Now it means (in the public eye):
the 414's, ron austin, the nasa hackers, the arpanet hackers...
All the people who have been caught,
have done damage, and are now going to have to face fines and sentences.
Thus we come past the moralistic crap, and to our purpose:  educate the
hacker community, return to the days when people actually knew something...




Friday, February 10, 2012

The Infamous Blotto Box!!


The Infamous Blotto Box!!              
     
        (I bet that NOONE has the balls to build this one!)

Finally, it is here! What was first conceived as a joke to fool the innocent
phreakers around America has finally been conceived!
Well, for you people who are unenlightened about the Blotto Box,
here is a brief summery of a legend.

--*-=> The Blotto Box <=-*--

For years now every pirate has dreamed of the Blotto Box. It was at first
made as a joke to mock more ignorant people into thinking that
the function of it actually was possible. Well, if you are The Voltage
Master, it is possible. Originally conceived by King Blotto of much fame,
the Blotto Box is finally available to the public.
NOTE: Jolly Roger can not be responsible for the information disclosed
in the file! This file is strictly for informational purposes and
should not be actually built and used! Usage of this electronical impulse
machine could have the severe results listed below and could result in
high federal prosecution! Again, I TAKE NO RESPONSIBILITY!
All right, now that that is cleared up, here is the basis of the box
and it's function.
The Blotto Box is every phreaks dream... you could hold AT&T down on its
knee's with this device. Because, quite simply, it can turn off the phone
lines everywhere. Nothing. Blotto. No calls will be allowed out of an area
code, and no calls will be allowed in. No calls can be made inside it for
that matter. As long as the switching system stays the same, this box will
not stop at a mere area code. It will stop at nothing. The electrical
impulses that emit from this box will open every line. Every line will
ring and ring and ring... the voltage will never be cut off until the
box/generator is stopped. This is no 200 volt job, here.
We are talking GENERATOR. Every phone line will continue to ring, and people
close to the box may be electricuted if they pick up the phone.
But, the Blotto Box can be stopped by merely cutting of the line or generator.
If they are cut off then nothing will emit any longer. It will take
a while for the box to calm back down again, but that is merely a
superficial aftereffect. Once again: Construction and use of this box is
not advised! The Blotto Box will continue as long as there is
electricity to continue with.
OK, that is what it does, now, here are some interesting things for you
to do with it...

-*-=>Blotto Functions/Installin'<=-*-

Once you have installed your Blotto, there is no turning back. The
following are the instructions for construction and use of this box.
Please read and heed all warnings in the above section before you attempt
to construct this box.

Materials:
  - A Honda portable generator or a main power outlet like in a
    stadium or some such place.
  - 400 volt rated coupler that splices a female plug into a
    phone line jack.
  - A meter of voltage to attach to the box itself.
  - A green base (i.e. one of the nice boxes about 3' by 4' that
    you see around in your neighborhood. They are the main switch
    boards and would be a more effective line to start with.
    or: A regular phone jack (not your own, and not in your area
    code!
  - A soldering iron and much solder.
  - A remote control or long wooden pole.
Now. You must have guessed the construction from that. If not, here goes,
I will explain in detail. Take the Honda Portable Generator and all of
the other listed equiptment and go out and hunt for a green base. Make
sure it is one on the ground or hanging at head level from a pole,
not the huge ones at the top of telephone poles. Open it up with anything
convienent, if you are two feeble that fuck don't try this.
Take a look inside... you are hunting for color-coordinating lines of
green and red. Now, take out your radio shack cord and rip the meter thing
off. Replace it with the voltage meter about. A good level to set the
voltage to is about 1000 volts. Now, attach the voltage meter to the cord
and set the limit for one thousand. Plug the other end of the cord
into the generator. Take the phone jack and splice the jack part off.
Open it up and match the red and green wires with
the other red and green wires. NOTE: If you just had the generator on
and have done this in the correct order, you will be a crispy critter.
Keep the generator off until you plan to start it up. Now, solder those
lines together carefully. Wrap duck tape or insultation tape around all
of the wires. Now, place the remote control right on to the startup
of the generator. If you have the long pole, make sure it is very long
and stand back as far away as you can get and reach the pole over.
NOTICE: If you are going right along with this without reading the file
first, you still realize now that your area code is about to become
null! Then, getting back, twitch the pole/remote control and run for your
damn life. Anywhere, just get away from it. It will be generating
so much electricity that if you stand to close you will kill yourself.
The generator will smoke, etc. but will not stop. You are now killing your
area code, because all of that energy is spreading through all of the
phone lines around you in every direction.

Have a nice day!

--*-=>The Blotto Box: Aftermath<=-*--
Well, that is the plans for the most devastating and ultimately deadly
box ever created. My hat goes off to: King Blotto (for the original idea).





Thursday, February 9, 2012

crack the bios password in win 95/98

Here is the best way to crack the bios password in win 95/98:

Follow the steps below:

1) Boot up windows.
2) go to dos-prompt or go to command prompt directly from the windows start up menu.

3) type the command at the prompt: "debug" (without quotes ninja.gif )
4) type the following lines now exactly as given.......
o 70 10
o 71 20
quit
exit

4) exit from the dos prompt and restart the machine


password protection gone!!!!!!!!!!!!! biggrin.gif

EnjoYYYYYYYYYY

PS: I tested this in Award Bios........
There seems to be some issue regarding display drivers on some machines if this is used. Just reinstall the drivers, Everything will be fine...........

I have not found any other trouble if the codes are used.

To be on safe side, just back up your data..........


The use of this code is entirely at ur risk.......... It worked fine for me..........

Wednesday, February 8, 2012

High Tech Revenge: The Beigebox rev. 4.14

High Tech Revenge: The Beigebox rev. 4.14
-------------Introduction-------------
Have you ever wanted a lineman's handset? Surely every phreak has at
least once considered the phun that he could have with one. After searching
unlocked phone company trucks for months, we had an idea. We could build
one. We did, and named it the "Beige Box" simply because that is the color
of ours.
The beigebox is simply a consumer lineman's handset, which is a
phone that can be attached to the outside of a person's house. To
fabricate a beigebox, follow along.

---------Construction and Use---------
The construction is very simple. First you must understand the concept of
the device. In a modular jack, there are four wires. These are red, green,
yellow, and black. For a single line telephone, however, only two matter:
the red (ring) and green (tip). The yellow and the black are not neccessary
for this project. A lineman's handset has two clips on it: the ring and
the tip. Take a modular jack and look at the bottom of it's casing. There
should be a grey jack with four wires (red, green, yellow & black)
leading out of it. To the end of the red wire attach a red aligator clip.
To the end of the green wire attatch a green aligator clip. The yellow
and black wires can be removed, although I would only set them aside so
that you can use the modular jack in future projects. Now insert your
telephone's modular plug into the modular jack. That's it. This particular
model is nice because it is can be easily made, is inexpensive, uses
common parts that are readily available, is small, is lightweight,
and does not require the destruction of a phone.

------------Beige Box Uses------------
There are many uses for a Beige Box. However, before you can use it,
you must know how to attach it to the output device. This device can be
of any of Bell switching apparatus that include germinal sets (i.e.
remote switching centers, bridgin heads, cans, etc.). To open most Bell
Telephone switching apparatus, you must have a 7/16 inch hex driver
(or a good pair of needle nose pliers work also).
This piece of equipment can be picked up at your local hardware store.
With your hex driver (or pliers), turn the security bolt(s) approximately
1/8 of an inch counter-clockwise and open. If your output device is locked,
then you must have some knowledge of destroying and/or picking locks.
However, we have never encountered a locked output device. Once you have
opened your output device, you should see a mass of wires connected to
terminals. On most output devices, the terminals should be labeled "T"
(Tip -- if not labeled, it is usually on the left) and "R" (Ring -- if
not labeled, usually on the right).

Remember: Ring - red - right. The "Three R's" -- a simple way to
remember which is which. Now you must attach all the red alligator clip
(Ring) to the "R" (Ring) terminal.
Attach the green alligator clip (Tip) to the "T" (Tip) terminal.

Note: If instead of a dial tone you hear nothing, adjust the alligator
clips so that they are not touching each other terminals. Also make sure
they are firmly attached. By this time you should hear a dial tone.
Dial ANI to find out the number you are using (you wouldn't want to use
your own). Here are some practicle aplications:

> Eavesdropping
> Long distance, static free free fone calls to phriends
> Dialing direct to Alliance Teleconferencing (also no static)
> Phucking people over
> Bothering the operator at little risk to yourself
> Blue Boxing with greatly reduced chance of getting caught
> Anything at all you want, since you are on an extension of that line.

Eavesdropping
-------------
To be most effective, first attach the Beige Box then your phone. This
eliminates the static caused by connecting the box, therefore
reducing the potential suspicion of your victim. When eavesdropping,
it is allways best to be neither seen nor heard. If you hear someone
dialing out, do not panic; but rather hang up, wait, and pick up the
receiver again. The person will either have hung up or tried to complete
their call again. If the latter is true, then listen in, and perhaps you
will find information worthy of blackmail! If you would like to know who
you are listening to, after dialing ANI, pull a CN/A on the number.

Dialing Long Distance
---------------------
This section is self explanitory, but don't forget to dial a "1" before
the NPA.

Dialing Direct to Aliance Teleconferencing
------------------------------------------
Simply dial 0-700-456-1000 and you will get instructions from there.
I prefer this method over PBX's, since PBX's often have poor reception
and are more dificult to come by.

Phucking People Over
--------------------
This is a very large topic of discussion. Just by using the other topics
described, you can create a large phone bill for the person (they will
not have to pay for it, but it will be a big hassle for them). In addition,
since you are an extension of the person's line, you can leave your
phone off the hook, and they will not be able to make or receive calls.
This can be extremely nasty because no one would expect the cause
of the problem.
Bothering the Operator
----------------------
This is also self explanitary and can provide hours of entertainment.
Simply ask her things that are offensive or you would not like traced
to your line. This also corresponds to the previously described section,
Phucking People Over. After all, guess who's line it gets traced to?
He he he...

Blue Boxing
-----------
See a file on Blue Boxing for more details. This is an especially nice
feature if you live in an ESS-equiped prefix, since the calls are, once
again, not traced to your line...

---POTENTIAL RISKS OF BEIGE BOXING----
Overuse of the Beige Box may cause suspicians within the Gestapo,
and result in legal problems. Therefor, I would recomend you:

> Choose a secluded spot to do your Beige Boxing,
> Use more than one output device
> Keep a low profile (i.e., do not post under your real
name on a public BBS concering your occomplishments)
> In order to make sure the enemy has not been inside your output
device, I recomend you place a piece of transparent tape over
the opening of your output device. Therefor, if it is
opened in your abscence, the tapqe will be displaced and
you will be aware of the fact that someone has intruded
on your teritory.

Now, imagine the possibilities: a $2000 dollar phone bill for
that special person, 976 numbers galore, even harassing the
operator at no risk to you! Think of it as walking into an
enemies house, and using their phone to your heart's content.



Exodus


The Arts of Lockpicking II

The Arts of Lockpicking II

So you want to be a criminal. Well, if you want to be like James
Bond and open a lock in fifteen seconds, then go to Hollywood,
because that is the only place you are ever going to do it. Even
experienced locksmiths can spend five to ten minutes on a lock if
they are unlucky. If you are wanting extremely quick access, look
elsewhere. The following instructions will pertain mostly to the
"lock in knob" type lock, since it is the easiest to pick.

First of all, you need a pick set. If you know a locksmith, get
him to make you a set. This will be the best possible set for you
to use. If you find a locksmith unwilling to supply a set, don't
give up hope. It is possible to make your own, if you have access
to a grinder (you can use a file, but it takes forever).

The thing you need is an allen wrench set (very small). These
should be small enough to fit into the keyhole slot. Now, bend
the long end of the allen wrench at a slight angle (not 90
degrees). Now, take your pick to a grinder or a file, and smooth
the end until it is rounded so it won't hang inside the lock.
Test your tool out on doorknobs at your house to see if it will
slide in and out smoothly. Now, this is where the screwdriver
comes in. It must be small enough for it and your pick to be used
in the same lock at the same time, one above the other. In the
coming instructions, please refer to this chart of the interior of
a lock:
______________________________
\ K
| | | | | | / E
| | | | \ Y [|] Upper tumbler pin
^ ^ / H [^] Lower tumbler pin
^ ^ ^ ^ ^ ^ \ O [-] Cylinder wall
/ L (This is a greatly simplified
\ E drawing)
______________________________/

The object is to press the pin up so that the space between the
upper pin and the lower pin is level with the cylinder wall. Now,
if you push a pin up, it's tendency is to fall back down, right?
That is where the screwdriver comes in. Insert the screwdriver
into the slot and turn. This tension will keep the "solved" pins
from falling back down. Now, work from the back of the lock to
the front, and when you are through, there will be a click, the
screwdriver will turn freely, and the door will open.

Do not get discouraged on your first try! It will probably take
you about twenty to thirty minutes your first time. After that,
you will quickly improve with practice.

Add to TACIV, '94.

-= Exodus =-

HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM.

HACKING THE WAL-MART ARMORGUARD
COMPUTER PROTECTION SYSTEM.

***NOTE***
To use this, you must have a system disk (i.e. a disk that has been
formatted using [format a: /s]) in 3.5" format under Windows 95, because that
is what they sell all of their computers with.

***NOTE***
In this file, instructions to be input into the computer are surrounded
by [ and ]. Keys are surrounded by < and >. So if I say "hit [-] I
mean to hold down the control button and hit F1.

The armorguard is a program that prevents you from writing to the
directories, changing the attributes of files, and deleting files. It
basically prevents you from doing anything cool.

The first thing to do is to go into Wal-Mart. Now, go to the
computer section and turn off the screen saver. Shut down as many apps as
you can with the [--] and then choosing a program and
hitting enter. You cannot simply do this to the ArmorGuard program.

The next thing to do is to go to the DOS PROMPT. Most Wal-Marts
take the mouse ball out of all of the display mice to make it harder to
control the system. If you are adept at putting your finger inside the mouse
and controlling it that way, fine. Otherwise, just hit [--].
This activates the start menu. Select "Programs", hit enter, then go down to
near the bottom of the "Programs" menu and select "MS-DOS PROMPT". Hit enter.

Now you are in a DOS window and in the C:\Windows directory. Hit
[cd..] and then hit [fdisk /mbr], which restores the master boot record,
preventing the password prompt from coming up when you reset the computer.

Now just hit [--] twice (once gets you to task manager,
twice reboots) and wait. When you see

Starting Windows 95...
on the screen, hit [] really fast just once, then choose "Verify
each step" (or something to that effect), usually choice number 4. It will
give you an A: prompt and say "Please give the path of your command interpreter,
i.e. C:\WINDOWS\COMMAND.COM". At this point, put the system disk you have
made in the drive and hit [A:\COMMAND.COM]. Say "Yes" to everything except
the following:

Log this bootup? (Bootlog.txt)? (y/n)
C:\armguard.exe? (y/n)
(***OR ANYTHING ELSE STARTING WITH "C:\ARM", LIKE "C:\ARMOR",
for instance.)

If you have done this right, ARMGUARD SHOULDN'T COME UP AT ALL. If
it does, hit "command prompt only" instead of "Verify each step" and then
specify C:\AUTOEXEC.BAT and C:\CONFIG.SYS if it asks for the configuration
and the startup file. (IN THE OPPOSITE ORDER. CONFIG.SYS IS THE CONFIG FILE,
AUTOEXEC.BAT IS THE STARTUP FILE.) Then immediately hit [] and it will
give you step-by-step confirmation for each item. See above for the ones
to say no to. Then you want to hit

[C:\WINDOWS\COMMAND\EDIT.COM C:\WINDOWS\WIN.INI]

and the DOS edit program will come up. Choose "Search" and hit "Find" and
then tell it to find ARM and make sure it's NOT on match whole word only.
Delete any line with ARM in it that looks like a part of ArmorGuard. This
should prevent it from coming up on Windows.

*******IF NONE OF THIS WORKS, YOU HAVE TO TAKE THE READ-ONLY AND ARCHIVE
ATTRIBUTES OFF OF THE WIN.INI, SYSTEM.INI, AUTOEXEC.BAT, AND CONFIG.SYS FILES
BY HITTING [ATTRIB -A -R (c:\WHATEVERFILE.YOUWANTTODOTHISTO)]

*******I'D ALSO RECOMMEND EDITING THE AUTOEXEC.BAT FILE TO PREVENT ARMGUARD
FROM EVER COMING UP AGAIN.

****************THINGS TO DO AFTER HACKING ARMORGUARD***********

Hmmm....
USE YOUR IMAGINATION!

Think of this: Hit "shut down in MS-DOS mode" or start up in MS-DOS mode,
put your boot disk in drive a: and hit the following commands

[A:]
[FORMAT C:]

and then confirm this. You have just started the permanent erasing of
EVERYTHING on the hard drive. You can also do some other cool stuff with
it too, just basically IF YOU WOULD DO IT TO SOMEONE YOU HATE, DO IT TO
WAL-MART. Personally, I'd think that INSTEAD OF ERASING THE HARD DRIVE, I'D
WRITE A VIRUS AND PUT IT ON THE COMPUTER. THAT WOULD REALLY BE MORE FUN.
JUST STORE IT ON A FLOPPY AND COPY IT.

HAVE FUN, DON'T GET CAUGHT.
SINCERELY,
DaRkNeSs

How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!

How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!

verry simple.. get the latest version from h**p://slysoft.com download it , install, restart.

now that it's installed. Click in the "Read to Image" icon.. click next to get to the next screen.. select "Protected PC Game" click next.. and after it makes the image.. exit the program..

Now re-open CloneCD
click on the "Write from image" icon.. clicik next.. select "Protected PC Game" and click next.. NOTE:!! i tested this method with an CD-RW.. so far i wont/cant test with a CD-R (shouldn't make a difference) because i'm down to my last 3 CD-R's.. so you can try a CD-R.. i dont care but sofar i tested with the TDK 80min/700mb CD-RW blanks..

now i had it working without a patch.. after i burnt the disc.. i installed the sims from the burnt copy and tried to load.. IT Worked! i've got the sims in the background as i speak!.. not sure if anyone else knew about this but i got this idea in a dream about Digimon and Dragon Drive.. (DONT EVEN ASK WHY!) but "Guilmon" and "Chibi" said Tom.. to make a Perfect copy of The Sims CD's.. Use Clone CD.. afterwards . i woke up.. and i tried it! henh .. uncanny hunh?

Get the serial number you need ! (For Certain Things)

Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Share it