BLOG ARCHIVE


Hacker Beginner Guide 3

Hacker Beginner Guide 3
http://linuxbroadcast.blogspot.com/

How to Forge Email with Windows XP Telnet

Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 Service ready
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250 host ready
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with .
Newbie note: just means hit return. In case you can't see that little period between the s, what you do to end composing your email is to hit enter, type a period, then hit enter again.
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.

Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:

Status: R
X-status: N

This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:

220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.

The message then looks like:

from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.

Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.

Next, you can read the email you forge on techbroker.com via telnet:

C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready

Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP

Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).

Hacker Beginner Guide 2

Hacker Beginner Guide 2
http://linuxbroadcast.blogspot.com/

How to Telnet with Windows XP

The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:

C:\>telnet /?

Here's what you will get:

telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.

****************
Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************

The simplest use of telnet is to log into a remote computer. Give the
command:

C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:

login:

Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.

Or you might see:

C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.

If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:

C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1

That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
<http://freeshell.org/> . You can get a free SSH client program from
<http://winfiles.com/> .
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!

***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************

Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:

C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.

However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:

Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1...

[Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]

Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix

The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.

***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.
****************

Hacker Beginner Guide 1

Hacker Beginner Guide 1
http://linuxbroadcast.blogspot.com/

Part I: The Magic of DOS


So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?

****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************

The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com

****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************

DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.

****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************

You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************

So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>

Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.

Performance Increase Through My Computer

Performance Increase Through My Computer
http://linuxbroadcast.blogspot.com/

1: Start > Right Click on My Computer and select properties.
2: Click on the "Advanced" tab
3: See the "Perfomance" section? Click "Settings"
4: Disable all or some of the following:

Fade or slide menus into view
Fade or slide ToolTips into view
Fade out menu items after clicking
Show Shadows under menus
Slide open combo boxes
Slide taskbar buttons
Use a background image for each folder type
Use common tasks in folders

There, now Windows will still look nice and perform faster

Quick Fix For Spyware, Try This Before Doing Surgery on Your OS

Quick Fix For Spyware, Try This Before Doing Surgery on Your OS
http://linuxbroadcast.blogspot.com/

Before you go headlong into deleting suspected files or editing the registry, try this simple disabling technique.

First, see if you can determine what the offending files are. You can do this by running "msinfo32" if you're using Win98. I only have experience with Win98, so I don't know the corresponding run command for this "Microsoft System Information" utility in WinXP. Go to the "Software Enviroment" section and poke around to see if you can locate an offensive or out-of-place file that looks like it doesn't belong. Make a note of the filename and location.

Then fire up Windows Explorer and navigate to the "no-goodnick" file. Now, and this is important, rename the file to something you can remember later. I like to use the same filename, but tack on the letters (in caps) "OLDXXX", where "XXX" are my initials. So, for example:

twaintec.dll

is renamed to

twaintecOLDXXX.dll

This effectively disables the offensive file, so that whatever piece of spyware junk is looking for it, it can't find it, and thus can't glop up you system. If you've made a mistake and the file is essential to your system, you can easily correct it by reversing the renaming procedure. This is much easier than restoring a deleted file, especially if you have emptied your recycle bin in the meantime!

Some bogus files can't be renamed while Windows is running, so then you have to use brute force and reboot in DOS-only mode, and use DOS commands to locate and rename the file. You may have to dig out your old DOS reference books for this like I did.

I have used this technique several times to disable offending junk until I can find a permanent way of getting rid of it.

It's a great trouble-shooting technique.

Quick Shutdown for XP, How to create a shutdown shortcut

Quicker Way to Shutdown XP
http://linuxbroadcast.blogspot.com/

Ever want a quicker way to shutdown XP without navigating through the start menu, or using a third party shutdown utility Here is a script that will do just that.

Right click the desktop and choose New Shortcut. Copy and paste this script or type it in.

%windir%System32shutdown.exe -s -t 0

Choose Next and name it whatever you like. I name mine OFF. Click Finished. Right click and choose properties and pick a Icon for it if you'd like. I use a wall light switch Icon. I drag mine into my QuickLaunch toolbar for one click shutdown.

Search Tags-------
Quick and painless shutdown , cold shutdown, windows shutdown dos command ,windows xp , shutdownQuick Shutdown for XP, How to create a shutdown shortcut..

Rapidshare hack!!!!! Free premium acount for all

Rapidshare hack!!!!! Free premium account for all

i got the encrypted message if you decode that message you get a link to register premium acount on rappit share but i dont have a decomipler for PKCS7 help me decode this message and we have all free premium acounts.

Code:




[ How To] Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload

Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
http://linuxbroadcast.blogspot.com/

Rapidshare Hacked, unlimited upload, no countdown

UNLIMITED download/upload
Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)
On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

Note:
If you are on a LAN and behind a router (using NAT, for example)---this will not work.
If you use a fixed proxy--- this will not work.
If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work

NO waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
java script: for (i=0; i<30; i++) { c(); }

Search Tags ----------------------------------------------
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload
Rapidshare Hack, unlimited upload, no countdown, UNLIMITED download/upload

-----------------------------------------------------------

How To Hack Rapidshare.com

How To Hack Rapidshare.com
http://linuxbroadcast.blogspot.com/
Directions
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server, a different IP address. You can do this one of multiple ways.

Requesting a new IP address from your ISP server.

Here's how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.


ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit


5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

How To "recover data from a quick-erased CD-RW disc"

Procedure used to recover data from a quick-erased CD-RW disc
http://linuxbroadcast.blogspot.com/

1. Make a file of exactly the size of the cdrw disc's capacity (650MB in my case).
(this step may not be needed)

2. With Nero I created a new project and added the file to it so that I have the disc filled. I gues you can also fill up the disc with other files.
The reason why I fill the disc is because I want Nero to make a session that uses the entire disc. Like I wrote earlier in this thread I experienced that my CD-Drive refuses to read off the disc beyond the session's boundaries. When you quick-erase a disc there is no session anymore so the drive will not read at all. Burning a new session will overwrite the data and burning only a small session will NOT make the drive read the other data that is still on the disc.
The reason why I used the one big file is so that I could later on recognize which part of the disc was overwritten by this file because this file contained all zeros (0x00).

3. I pressed burn and selected disc-at-once. Then while Nero was burning the leadin I pressed cancel. My CD-Drive finished writing the lead-in and Nero reported an error.
This is what was accomplished however: Now the disc contains a session that says that the used disc size is the complete disc. Nero did not get to writing file because I cancelled it. Good thing because I don't want Nero to write any files because my old data will get overwritten!
I gues it works the same with different writing software. Another method that I used during a test was simply press the reset button of the computer when the burning software was done with writing the lead-in and started with the files.

4. I had to restart the computer after cancelling burning.
With the cdrw disc inserted I saw in "my computer" that windows recognized that the disc was 650MB, clicking on it gave an error. Good so far!

Now with IsoBuster you can extract the sectors from a disc to a file. This is what I did.
I gues that if you have data-recovery software at this point it will be usefull because now (if all went well;)) the CD-Drive WILL read data from the entire disc. Anyway, I used ISO-Buster because the files that I needed to recover where a bit odd for nowadays (.XM, .S3M, .MP3):
In IsoBuster I had to do several steps:

Step 1: Find out from and to which sector the drive will read
By choosing "Sector View" you can look at any given sector.
Here I found out what the first and the last sectors where that are readable. (Hint I used the method for the old game: "Gues a number below 100, I'll tell if it is higher or lower than what you gues")
Step 2: Extract the actual sectors
By choosing "Extract From-To" you can extract any given range of sectors to a file. My disc was a data-disc so I choose the first extraction type "User data, 2048 bytes/block...".

In the end I got a .tao file which was about 650MB. I ran several programs on it to look for files inside a file by searching for file-header-paterns:
1. Multi Ripper 2.80 (for DOS, for the .XM files. It does many other file formats as well (jpg,png, bmp,wav,etc,etc +100). Try google with this query: Multi Ripper 2.80. I still had the file from good old days but I saw several good search results)

2. Winamp for mp3.
Winamp will scan any file when you give it the extension .mp3 and play it as one big song (so I renamed the .tao file to .mp3). I used the discwriter to get a .wav and the Adobe Audition to manually cut and save my songs. I looked at the MP3 file format and it is hard to find an mp3 file in a big file because it has no clear header just a bunch of mpeg-frames in most cases for me . A lot of my files had no ID3v2 or ID3v1 tags... But after a couple of hours I recovered everything.

Finally a list of used stuff:

Software:
- IsoBuster v1.5
- Nero 6.3.0.3
- Multi Ripper 2.80
- WinAmp v5.02
- Windows XP Pro NL (patched up)

Hardware:
- NEC DVDRW ND1300A 1.06

Disc:
- some old 4 speed cdrw

Remote Desktop Through Company Firewall

Remote Desktop Through Company Firewall
http://linuxbroadcast.blogspot.com/

Dont wanna take any credit for this as i got this from another forum thought of it as quite informative so pastin it here

Note this tutorial is collection of tips I gathered from searching the internet and some credit is due to the original authors. None of which I know.

A lot of people I know love using the Windows Remote Desktop feature at work, however are prevented from connecting to their home computer because of the company firewall. This is because most corporate firewalls block port 3389 which Remote Desktop uses. Most just switch to VNC, however most find it slower than Remote Desktop.

This quick tutorial shows how (from a fire walled network that blocks port 3389) you can access your home computer using MS Remote Desktop.

*This tutorial assumes you have or know how to setup and dynamic DNS client if you need one

*Assumes you know how to setup port forwarding if you need to.

Because Remote Desktop is using port 3389 by default, it is not possible to go through a firewall. So you can use port 443. Because this port is always open on your companies firewall to allow https. (One would assume )

At your home PC:

1) Configure Your pc to allow Remote Connections in your System Properties (windows - Break) tab Remote. Check 'Allow users to connect remote to this computer.

2) (add users if needed)

3) According to
CODE
http://support.microsoft.com/default.aspx?scid=kb;en-us;306759]

In the registry change
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber to 443 (click Decimal radio button first)

*Configure your firewall to allow traffic through port 443 (If you need to)

*Configure your route to forward port 443 to your computer (If you need to)

If you have IIS running you have to change the port number of https. because it is already listening on this port.
C:\WINDOWS\system32\cscript.exe c:\inetpub\adminscripts\adsutil.vbs SET w3svc/1/
SecureBindings ":444:"

Or just disable IIS Service


For your PC at work:

According to
CODE
http://support.microsoft.com/default.aspx?scid=kb;en-us;304304

you can just type the port after the IP-Address of your home PC.

*Or if you have a Dynamic DNS Client such as No-IP or DynDNS you can type in that address.

Alternatively
You can add the following to the rdp file. (which you can get to click on Save As on the tab General of Remote Desktop Connection)
server port:i:443

Extra tip: to have access to your clients hard disk on your remote desktop, check Disk Drives on the tab Local Resources of Remote Desktop Connection

Official Unattended Xp Cd Guide Xp Sp2 @ Msfn

Official Unattended Xp Cd Guide Xp Sp2 @ Msfn
http://linuxbroadcast.blogspot.com/

Have you ever wanted a Windows XP CD that would install Windows XP by automatically putting in your name, product key, timezone and regional settings? Followed by silently installing all your favourite applications along with DirectX 9, .Net Framework and then all the Pre-SP2 hotfixes, updated drivers, registry tweaks, and a readily patched UXTheme.dll without any user interaction whatsoever? Then this guide will show you how you can do just that!



What's New:
Changes in Windows XP SP2 Unattended
http://unattended.msfn.org/xp/sp2changes.htm


This page details the changes you may want to add to your Unattended XP CD if you have your copy of XPSP2 Final from WindowsBeta. The guide will be updated globally to SP2 status once XP SP2 is officially released to the public on Microsoft's download servers in the next coming days.

View: MSFN's Official Unattended XP CD Guide
http://unattended.msfn.org/

Open Windows Explorer to a Different Default Directory

Open Windows Explorer to a Different Default Directory
http://linuxbroadcast.blogspot.com/

When you open Windows Explorer (by choosing the Window key and "E" simultaneously or by choosing Start, all Programs, Accessories, Windows Explorer), you can change the directory that appears by default. If you choose Start, all Programs, Accessories, and then right-click on Windows Explorer and choose Properties, you can modify the "Target" directory. To go to your C: drive, type simply C:\ in the Target box and choose OK. You can also enter a shortcut key on this screen, telling Windows the character or combination of characters you want to type to automatically open Windows Explorer. You can even change the icon or specify that you always want Explorer to open up in full-screen mode.

HOW TO HACK HOTMAIL

HOW TO HACK HOTMAIL
http://linuxbroadcast.blogspot.com/

HOTMAIL HACKING

I_2_I - The Best way
a. Get the username of the victim (It usually stands in the adress-field
)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. U´re in!
!. This hack only work if U are on the same network or computer as the
victim and if he don´t log out.
____
I_3_I - The old way
a. Go to http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see it´s a long procedure and the victim have
plenty of time to log out.
____
I_4_I - Another...
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. Look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you know the password.
(If he exits the browser U can see the password in the History folder!)

READ!
Hotmail´s sysops have changed the "system" so that the victim may log
out even
if U are inside his/her account. So don´t waste U´r time!

---

So you want to get some hotmail passwords?
This is pretty easy to do once you have got the hang of it.
If you are a beginner, I wouldn't make this your first attempt at
hacking. When you need to do is use a port surfer and surf over to
port 80. While there, you have to try and mail the user that you
want the password from. It is best to mail them using the words
"We" and "Here at Hotmail..." Most suckers fall for this and end
up giving out their password. There is another way to also, you can
get an anon mailer, and forge the addres as staff@hotmail.com. But
you have to change the reply address to go to a different addres
like user@host.com. The person that you are trying to get the pass
from MUST respond to that letter for the mail to be forwarded to you.
Have text like "Please reply to this letter with the subject "PASSWORD"
and underneath please include your user name and password.
If you have trouble Loging in withing the next few days, this is
only because we are updating our mail servers but no need to worry,
your mail will still be there. Even though the server may be down
for an hour. From the staff at Hotmail, Thank You."

Windows Folder Hack !

Windows Folder Hack !
http://linuxbroadcast.blogspot.com/


Windows remembers 400 folder settings. When that number is reached some settings aren't retained any longer. You can change this to 8000 by adding this edit to the registry.

1. Copy the following (everything in the box) into notepad.

QUOTE
Windows Registry Editor Version 5.00

[-HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\BagMRU]
[-HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\Bags]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell]
"BagMRU Size"=dword:00001f40

[HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam]
"BagMRU Size"=dword:00001f40

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoSaveSettings"=dword:00000000

2. Save the file as folder8000.reg
3. Double click the file to import into your registry.

How To Get A FREE iPod!

How To Get A FREE iPod!
http://linuxbroadcast.blogspot.com/

First Off - Need To Know Facts
First off, I have to say that NO! This is not a scam of any type. The company offering this deal (Gratis Internet) is registered with the BBB (Better Business Bureau) and has been for quite some time. Gratis is also affiliated with big-name companies such as AOL, General Motors, Ebay, Columbia House, and many others. These companies would never affiate them selves with a fraudulent web site/company. Aside from all this, there is proof that this works. Many people have received their ipods already and many more will. I wrote this document to help spread the word to you and ofcouse to help my self get an iPod.



How it works..
The way FreeiPods work is actually very simple. You sign up at their site, then you get others to signup and complete a offer (usually free). An offer can be anything from buying something on a web site to signing up for a free trial for a ISP. When this happens FreeiPods makes money from the offer you sign up from (even if you didn't spend a dime). With this money they make, they are able to offer FREE iPods, Simple huh?

To get a free ipod, you must sign up at their site, then complete 1 (One) offer. After that, you have to get 5 (Five) people do the same thing, and since it usually doesn't cost anything to complete an offer, a friend should be more then willing to help you out. After you have completed 1 (One) offer and gotten 5 (Five) people to signup and complete a offer, you will be sent the ipod of you choice.



The steps to follow..

Step #1 (Signup)
The first step is to go to the web site and signup. You will be asked witch ipod you would like and for an e-mail address and to create a password on the first screen. Then you will be asked for your shipping info so they know where to send the ipod. The address to go to to signup is: How To Get A FREE iPod!

First Off - Need To Know Facts
First off, I have to say that NO! This is not a scam of any type. The company offering this deal (Gratis Internet) is registered with the BBB (Better Business Bureau) and has been for quite some time. Gratis is also affiliated with big-name companies such as AOL, General Motors, Ebay, Columbia House, and many others. These companies would never affiate them selves with a fraudulent web site/company. Aside from all this, there is proof that this works. Many people have received their ipods already and many more will. I wrote this document to help spread the word to you and ofcouse to help my self get an iPod.



How it works..
The way FreeiPods work is actually very simple. You sign up at their site, then you get others to signup and complete a offer (usually free). An offer can be anything from buying something on a web site to signing up for a free trial for a ISP. When this happens FreeiPods makes money from the offer you sign up from (even if you didn't spend a dime). With this money they make, they are able to offer FREE iPods, Simple huh?

To get a free ipod, you must sign up at their site, then complete 1 (One) offer. After that, you have to get 5 (Five) people do the same thing, and since it usually doesn't cost anything to complete an offer, a friend should be more then willing to help you out. After you have completed 1 (One) offer and gotten 5 (Five) people to signup and complete a offer, you will be sent the ipod of you choice.



The steps to follow..

Step #1 (Signup)
The first step is to go to the web site and signup. You will be asked witch ipod you would like and for an e-mail address and to create a password on the first screen. Then you will be asked for your shipping info so they know where to send the ipod. The address to go to to signup is:
CODE
http://www.freeiPods.com/default.aspx?referer=7498598



Step #2 (Referrals)
The second step is a little more tricky. This is the part where you have to get people to signup for ipods using you referral link. There are many ways to do this, ask some friends to do it, send out e-mails, post on forums, get on some conga lines, write a how-to like i did, I'm sure you will think of away to do it.


Step #3 (Offers)
An offer is when you signup for one of freeipod's affiliates, there are quite a few to choose from. This part is what stops most people from completing their freeipod offer. The reason being is that it sounds to good to be true, for example, you can signup for a completely free trial of AOL and get an ipod in return.. At first i didn't think this was legit, but after talking to a few people who have done it and had proof that it actually worked for them, i decided to give it a try and it worked.
I used the AOL offer, you actually don't need a credit card (however i did use one). If you signup and hit cancel when it asks for your credit card info, it should still work and give you credit, many people i know have tried this and it has worked. If you DO you a credit card, all you have to do is call AOL and cancel the trial after your offer has been approved by freeipods. This usually takes a day or so.


Step #4 (Wait)
Wait for freeipods to e-mail you, they will give you instructions on what to do from there.. It will just have you follow a link and then fill out your shipping info and then it will ship.




Step #2 (Referrals)
The second step is a little more tricky. This is the part where you have to get people to signup for ipods using you referral link. There are many ways to do this, ask some friends to do it, send out e-mails, post on forums, get on some conga lines, write a how-to like i did, I'm sure you will think of away to do it.


Step #3 (Offers)
An offer is when you signup for one of freeipod's affiliates, there are quite a few to choose from. This part is what stops most people from completing their freeipod offer. The reason being is that it sounds to good to be true, for example, you can signup for a completely free trial of AOL and get an ipod in return.. At first i didn't think this was legit, but after talking to a few people who have done it and had proof that it actually worked for them, i decided to give it a try and it worked.
I used the AOL offer, you actually don't need a credit card (however i did use one). If you signup and hit cancel when it asks for your credit card info, it should still work and give you credit, many people i know have tried this and it has worked. If you DO you a credit card, all you have to do is call AOL and cancel the trial after your offer has been approved by freeipods. This usually takes a day or so.


Step #4 (Wait)
Wait for freeipods to e-mail you, they will give you instructions on what to do from there.. It will just have you follow a link and then fill out your shipping info and then it will ship.


How To Add A URL Address Bar To The Taskbar

How To Add A URL Address Bar To The Taskbar
http://linuxbroadcast.blogspot.com/

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:


1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

How To Overburn A CD With Nero?

How To Overburn A CD With Nero?
http://linuxbroadcast.blogspot.com/

Start Nero
From the action-bar select File and select Preferences.
In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).

Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here


From the action-bar select File and select Write CD.

A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

How do I Test My Virus Scan Installation? (Eicar)


Description

After installing VirusScan, you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations.

Solution

To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.

If VirusScan is running and configured correctly, when you try to save the file, VirusScan will detect the virus. If VirusScan is not running, start it and scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file.

Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting
users.

The eicar test virus is available for download from the following website:
http://www.eicar.org/download/eicar.com

Creating Eicar.com

1. Click on Start.
2. Select Run.
3. In the Open box type: notepad
4. Maximize the window.
5. Highlight the following on the following line of text:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
6. Right click on the highlighted text and choose 'copy'.
7. Switch back to Notepad.
8. Right click anywhere inside of Notepad and select 'paste'.
9. Click the File menu and select 'save as'.
10. Change the 'Save as Type' to 'all files'.
11. Name the file eicar.com.

Link to eicar.com |Click here|