Actually, I'm lying about the fun. The profit is probably not true, either :-)
Most of the files used by Poser are in text format; this makes them more enormous than they would be in some other format, but on the positive side they can be hacked if you know what you're doing.
This tutorial will serve as an introduction to the general concepts and methods. We won't try to explain everything that goes on within these files, for the simple reason that I can't explain things that I don't understand myself. :-) We'll deal with some simple procedures that will nevertheless be useful in a lot of different situations:
Altering the object file called up by a CR2. This is what to do if you want to make a small change to the .OBJ file to create a new figure; you can make use of the original CR2, which saves having to generate a new one.
Editing the material specification in a CR2. If you have altered the material assignments in your .OBJ file, this will remove the old materials from the CR2 and stop them clogging up the materials list.
Stripping out unwanted information from a pose file, e.g. to make a pose that only affects one body part.
Making a master .CR2 file. This is an easy way to get a basis for starting with your own models, or for fixing rogue items such as clothing which crashes Poser 3.
Fixing material names in an imported 3DS file.
• What you need
There is a handy program you can buy which will do all this and more, without the possibility of wrecking your files. CR2 Edit by Daniel Wilmes can be obtained from Zenware Online. If you've got CR2 Edit, you probably won't need the rest of this tutorial.
If you prefer to get your hands dirty, you'll need a text editor capable of handling enormous files. Notepad won't do! I use Programmer's File Editor which, although it isn't being developed any more, is more than adequate and is free. Get it from any of the usual download sites, or visit the author's page at http://www.lancs.ac.uk/people/cpaap/pfe/.
• Dire warnings
If you mess up editing one of these files, the object it controls almost certainly won't work properly, and Poser might crash. So take heed of these basic precautions:
Always back up the file you're going to work on before you do anything to it. Just take a copy and keep it safe.
Don't use your newly edited file on any important piece of work until you're sure it's behaving properly. If you save a Poser document with dodgy information in it, you might not be able to open it again.
Take care that you're looking at the right part of the file. Some items recur in different places.
Make sure that your brackets are balanced. If you delete something with a left bracket in it, the corresponding right bracket must also go. (If you don't know a bracket from a shelf, you'll see what I mean later on.)
This is what to do if you want to put your .obj file somewhere else, or if you've created a new version by editing it.
First find your .CR2 file (or it may be .HR2 or .PP2) - for guidance, see the File Disposition Guide. Then open it up in your chosen text editor. Here it is in Programmer's File Editor:
The first line you want is this one:
figureResFile :Runtime:Geometries:dir:mesh.obj
Notice how the backslash character [\] used in Windows path names is replaced by a colon [:] which is the Macintosh convention.
The dir:mesh bit is the important bit, and this is the part you need to edit to suit your new path and/or name.
Hang on! Not finished yet! This figureResFile line is repeated further down in the file, and both must be identical or Poser will do weird stuff. Copy the line you just edited, search for the other figureResFile, and paste your copy over the top of it. That way, if you've made a mistake at least it will be consistent :-)
That's it. If you're making a new item, don't forget to "Save As" and give your file a different name.
This is what to do if you want to alter your materials list. When Poser loads a new file, any materials which are not defined are given random settings. This behaviour can be used to re-make your character file if you've altered the material assignments in the .OBJ file for instance.
First find your .CR2 file (or it may be .HR2 or .PP2) - for guidance, see the File Disposition Guide. Then open it up in your chosen text editor. Now you want to navigate waaay down, almost to the bottom, until you find the first instance of the word "material". It will look like this excerpt from the nude woman .CR2, except that the material names may be different of course.
When selecting a material, be sure to include the material line along with everything between the brackets, like this:
This is what I meant about balancing the brackets. Having an opening bracket without its corresponding closing bracket, or vice versa, is A Bad Thing and will cause Poser to do nasty stuff.
Now you can delete one, none, many or all of the materials as you see fit. When you get down to the bottom of the materials list, if the item is an old one from the days of Poser3, there will be an equal number of lines starting with presetMaterial. If you're using the item in Poser 3, only delete the lines which correspond to material lines that you've deleted. For Poser 4, they can all go since they're no longer used.
Now you can save your file, under a different name if in any doubt. When you open it in Poser, it will come up with a weird selection of colours of its own making, hardly any of which will be what you wanted. No matter. Go through the material properties editor, set colours and highlights and anything else to your liking, and save the character back into the library. All done!
This is what to do to make a pose file that affects only a limited part(s) of the body and leaves the rest alone. Think of face files, which affect only the figure's head: you can do the same trick with any body part or parts.
First make your pose, of course, and save it into the library. Make the view as good as possible, to get a good thumbnail, because you can't re-save these poses back into the library later. If you do, all your good work will be undone.
Now find your .PZ2 file - for guidance, see the File Disposition Guide. Then open it up in your chosen text editor.
You'll see that there are a series of "actor" lines, one for each body part, each followed by a section in brackets. To exclude that body part from your pose file, highlight the actor line and everything including the opening and closing brackets. Having an opening bracket without its corresponding closing bracket, or vice versa, is A Bad Thing and will cause Poser to do nasty stuff.
I've missed out a lot of stuff in between (that's what the foggy bit is) so you can see the two ends together. Notice that there are a lot of brackets nested together, so you really need to take care to match them up. Poser makes it easier by stacking the matching brackets above one another as you can see here.
Now delete that actor section. In this case, that means that the hip's pose will now be unaffected by this pose file.
Repeat the above for all the body actors you want to remove, and save the file. Just remember what I said about not overwriting the library while you're in Poser, because it will automatically put all the body parts back in.
The .CR2 file is what Poser uses to control how posable figures work - it holds information on body parts, their relationships, morphs and materials. So if you want to make your own figures or clothes, or modify other people's, one of the things you'll need to do is generate a .CR2 file. An easy way to do this is to use a so-called Master CR2, which is basically a stripped-down version of one of the standard figure .CR2s.
All you need to do then is to make this file point to the .OBJ you've prepared, as described here.
This technique can also be used to fix Poser 4 clothes which won't work in Poser 3. It isn't always successful, but it's worth a try.
There are two steps involved - removing the materials list so that a new one can be generated; and removing the morph targets. In fact neither of these is strictly necessary, you could just use the figure .CR2 as it was, but stripping it out first is tidier.
If you don't remake the materials list, there will be unwanted materials in there which will confuse you later. If you leave inappropriate morphs intact, nothing bad will happen, but your file will be larger than it needs to be and there will be non-working dials cluttering up your workspace.
You might think that it would be necessary for your .CR2 to have the right body parts in it, but in fact one with everything is good enough. That's why we choose a file from one of the nude figures as a starting point - you can use anything as long as it has at least the same body parts as the figure you want to make or fix. Any parts referenced in the .CR2 but not present in the .OBJ will just be ignored by Poser - it's quite tolerant that way.
First remove all the materials from the file, as described in Editing the materials list.
Make sure to save your file under a different name: don't overwrite the original figure file!
Next, use Morph Manager to delete all the morphs from each body part. If you're making a Vicki or Mike master, this could take a while; but if you miss one or two it won't matter too much. You can now save the result and keep it safe as your master .CR2 for that figure. If you're doing this to "fix" a piece of Poser 4 clothing, you may want to transfer any morphs from the clothing .CR2 while you have Morph Manager open. You will also want to make it point to the correct .OBJ using your text editor.
Now open it in Poser, it will come up with a weird selection of colours of its own making, hardly any of which will be what you wanted. No matter. Go through the material properties editor, set colours and highlights and anything else to your liking, and save the character back into the library. All done!
Here's a fairly full description of how to import models in .3DS format into Poser and use them as props. 3DS is one of the most common 3D mesh formats around, and there are a whole host of models at places like 3D Cafe that can be used.
On the face of it, it's easy; Poser has the facility to import 3DS right there in the file menu. But if you've tried it for yourself, you may have found that saved Poser documents didn't load right when you came back to them; perhaps the colours had all changed, maybe everything had changed to one material where before there were several.
• What You Need
Poser (of course!)
a text editor that can handle large files, preferably with a search and replace facility
See the Utilities page for a link to a suitable editor.
• What To Do
Import 3DS file into Poser. Use the default settings.
Rotate and scale as required. Many 3DS props need an xRotate of -90° unless they were specifically designed with Poser in mind.
You can add a figure to judge your scaling against, and if you want to make the model into a smart prop.
Change the colours to your preference, and add texture maps if wanted.
Rename the object if wanted.
Uncheck "display origin" (in the properties dialogue) if not wanted.
Add the prop to your library as usual.
Call up the materials dialogue and inspect the list of material names. If there are none which contain spaces, there is no need to do anything more.
If there are spaces in any material names, you need to get rid of them since Poser will ignore the part after the first space when the file is re-opened. Some 3DS models have materials named
MATERIAL #1
MATERIAL #2
and so on. The object then ends up with everything assigned to MATERIAL since the #1, #2 parts were lost. Even worse, since MATERIAL didn't originally exist, its properties will have been made up at random and will probably be puce with pink highlights, or something equally revolting.
The easiest way to fix this, I now believe, is with a simple text editor. Make a note of the offending material names, then open up the PP2 file in your text editor. This may appear daunting, but the way we're going to do it is quite straightforward. You don't need to type anything directly into the file at all.
Select your editor's search and replace - some just call it "replace". You will have two boxes to enter things into. Type the first "spaced out" material name into the Search box. Then type in a new name in the Replace box, or whatever it's called. Use underscores, or just run everything together, as long as there are no spaces; and of course each material must have a unique name.
The material you're editing will occur more than once within the file. First, in the form:
usemtl MATERIAL #1
which will be there at least once. Secondly, in the form:
material MATERIAL #1
which will be there once in a Poser 4 prop, twice if you used Poser 3. Whatever, the text editor should find all these for you and obediently present them for your approval. Replace all instances preceded by usemtl or material; if there are any which aren't, they're probably a coincidence and nothing to do with the job at hand.
Repeat as necessary for the rest of the materials, and save the file, to a different name if you aren't confident.
That's all, folks!
You can download a PDF version of this tutorial here to print out or read off-line. Thanks to Heidi for the conversion. You'll need Acrobat Reader to view this.
"How do I make clothes for Poser?"
That question is asked a lot by newcomers to the world of Poser. The program itself is so easy to use, it is not difficult to imagine that there must be a simple method for generating add-ons to it. No matter how many downloadable goodies there may be, there comes a time when the exact garment you are looking for does not exist. How nice it would be if you could install the Acme Clothing Generator, click on a few options and have your every wish fulfilled. Unfortunately, it isn't so.
But let's not be negative. You will need some determination, and some skill in visualising 3D objects; and you won't become a virtual haute couturier overnight. But you can create your own clothing.
Up until Poser 5, which introduced dynamic clothing and the Cloth Room, Poser clothing was almost always in the form of a conforming figure - that's why it lives in the Figures library palette. It's built in the same way as a posable character, but designed to match the joints of the unclothed figure that it is meant to fit. Every conforming figure comes in two main parts.
A 3D mesh in Wavefront OBJ format. This is modelled to fit the OBJ mesh for the base figure, and has the same groups (body parts).
A CR2 file which tells Poser how to deform the mesh when it is posed or comformed. This also has information on material specifications, and any morph targets.
Maybe you don't have a 3D modeller, and maybe you don't have the foggiest notion about what goes on inside a CR2 file. Never mind - we can fix you up.
You can get some results without even having a 3D modeller of any sort - try my Modelling Props Page. You can do a limited amount of modelling within Poser itself using nothing more than these props with Poser's grouping tool and magnets. But since Anim8or is free, there's no real reason not to have a basic modeller at hand.
Nor do you need to know much or anything about CR2s. There are utilities available that will do the hard work for you; and if you like hard work, you can usually "borrow" a CR2 from another similar clothing item and hack it with a text editor. Not exactly hard after all.
Note: I am NOT the maintainer of Infinity Explorer. I cannot answer questions regarding the Infinity Explorer software. Infinity Explorer is written by and maintained by Dmitry Jemerov. To learn more about Infinity Explorer, infexp.sourceforge.net is a good place to start looking. I do NOT maintain any tools for download regarding the Infinity Engine games. TeamBG is probably a good place to look for tools. I will not respond to emails asking for information on the Infinity Explorer or editing tools. This web site is only about information on the file formats.
--------------------------------------------------------------------------------
Site news
2002-06-19 Fixed error relating to WMAP files, and erroneous links in todo list. (Thanks to Lloyd Parkes).
2002-06-13 Fixed error relating to MOS files. (Thanks to Tristan Dopler).
2002-01-17 Started adding "raw" notes that have never been transcribed to html. I'm starting off with a reasonably complete listing of effect types as of BG1.
2000-10-11 Minor updates.
2000-10-10 Some updates from Dmitry Jemerov to the WMAP and ITM and SPL files. I've also corrected my heinous oversight in the CRE files section, which gave an incorrect item slot ordering. I will fill in the correct info tomorrow, for BG/BG2, and ASAP for Torment/IWD. For now, I have simply removed the incorrect information. Additionally, tomorrow, I will have all of the BG2 formats and format type codes listed here.
2000-10-09 Sorry for taking so long to update, gang; life has been busy. Anyway, given that the wait for this update has been so long, it will be a big one. Additionally, I hope to be making several updates over the next couple of weeks, as I uncover details in the areas I'm currently working on -- mostly details on how the BG2 CRE format crams so much more into the old BG1 format. See my notes in the CRE file docs for a hint. The contributors this time around are numerous and varied: Dmitry Jemerov (the usual torrential downfall of random formats and fixes, particulary to the AREA and WMAP formats), Brian Frappier (info on the GAME V2.0 familiars structure, which I am still working on), Aaron O'Neil (BAMC format), Michael Kay (various tidbits and clarifications in the AREA file format), and Paul Victorey (updates to WMAP file format). Included in this update are many BG2 updates, corrections, and info on the new BG2 compressed formats, the BIFC and BAMC and MOSC formats, as well as bits of C code for decompressing them.
2000-08-26 Thanks again to Eddy L O Jansson for his continuing work on improving the HTML and stylesheets for this project. By his suggestion, I've created a to do list for the project, which lists things people can be working on if they have the time and inclination to help out. Another recent improvement, by Brian Frappier's suggestion, is the highlighting of changed entries in a different color. Updated entries should appear in green, except for entirely new formats. (This doesn't appear to always work with Netscape... Netscape's support of CSS is actually rather lamentable. Ahh, well...) Finally, I will be out roaming the countryside for a while, since I'm moving back to the USA, and will be busy. I won't be entirely incommunicado, so if you email me with updates, I'll probably find time to merge them in.
2000-08-25 Thanks to Dmitry Jemerov for the (EFF format, and to Joost Mans for continuing work on the item categories table.
2000-08-22 Thanks to Dmitry Jemerov for updates to several formats (CRE, ITM, and GAME), and to Joost Mans for updates to the item categories table.
2000-08-19 Thanks to Grazzt for filling in the new "weapons proficiency" fields in the CRE V9.0 (Icewind Dale creature) files.
2000-08-18 First off, there are some gaps filled in by Banelord, most of which I'm still sifting through, which should be added sometime soon. Still working on processing information from Icewind Dale, so expect updates regarding Icewind Dale in the next few days, I hope.
2000-08-14 Finally back from apartment hunting. A few updates from Joost Mans, who pointed out that I'd made an error in the palette entry formats. (They are RGBQUADs instead of PALETTEENTRYs). Also a minor update to the SPL format from Joost Mans. Also from Joost Mans, updates to the table of item categories -- specifically, Icewind Dale categories have been added (great sword, etc).
2000-07-23 I finished Icewind Dale a few days ago, and so I'm back to work on the project. Dmitry Jemerov has been hacking away like a madman, and has sent in several significant updates to the AREA file format, as well as a few other minor updates. He's also released Infinity Explorer 0.5 with support for Icewind Dale files. Go check it out!
2000-07-05 Major bugfixes to several sections sent in by Dmitry Jemerov. Also, Eddy L O Jansson has made a first pass over the documentation to make it validate strict and use CSS. Working on collating this information.
2000-07-02 Yumm! Icewind Dale! I haven't got the game just yet, but thanks to Brian Frappier, I've got a sampling of the small data files, so I'm working on the new formats already. Specifically, the format for the new compressed BIFF files (.cbf) files is understood, and others are being examined. On the 5th of July, I should have a copy myself, though, admittedly, I'll probably spend some time playing it, which may preclude productive work on this project for a few days. :)
2000-06-26 Since this site covers Planescape: Torment file formats in addition to the Baldur's Gate file formats, it has been renamed to the "Infinity Engine File Format Hacking Project", from its old name, the "Baldur's Gate File Format Hacking Project".
2000-06-20 A majority of the structs are here. ITM and SPL info will be posted soon. There are several fields which are still unknown. Thanks to Thom Zakariassen for clarifications regarding the GAME structure.
2000-06-07 This page is now being maintained by me (Jed Wing). Not all of the information is posted yet, but within the next 3 or 4 days, I'll put up more and more information. If you have information to contribute, email me at jedwin@ugcs.caltech.edu.
2000-06-03 This page is now extremely outdated. Jed Wing is about to take over as maintainer. For the latest on BG-hacking check out Infinity Explorer.
2000-01-12 Small additions.
1999-09-10 First pass of table optimization. Contact info changed. New tools linked.
1999-09-02 Petr updated the page in the sections AREA, BAM and ITM.
[ document conventions ] [ file formats ] [ credits & contact info ] [ raw notes ] [ how can I help? ]
Introduction
This document is focused on the technical aspects of the game. This is not the place to learn about cheating. If you want to use this information to create tools for cheating, go right ahead, but that is not the purpose of this project.
I (Jed Wing) have now assumed control of and responsibility for this page. I've been working on something similar since Baldur's Gate came out, and only recently became aware of this project. Since this page was no longer being maintained, I offered to take it over and supplant it's findings with my own. I hope that any of you who have relevant information would be willing to help this document become more accurate, as well.
Much credit goes to Eddy L O Jansson, Robert Risberg, and Petr Zahradnik, who compiled much of this information.
Much credit also goes to Dmitry Jemerov, who has been an incredibly prolific source of information.
Finally, a note about what Eddy Jansson described as a "proprietary" attitude towards information people have uncovered on their own. I, too, believe this is a shame, for a number of reasons. Largely, it seems like a tremendous waste. Duplicated effort, many people making the same mistakes, as well as a sort of latent hostility. The only motivation I can see for this is a sort of pre-pubescent braggadocio. Well, whatever. Information wants to be free.
Document Conventions
Each file format will have its own section. It will be represented in a tabular form, as follows:
Offset Size (datatype) Description
0x0000 4 (char array) Signature ('FOO ')
0x0004 4 (char array) Version ('V1 ')
0x0008 4 (dword) Unknown (Grue count?)
Obviously, many of the fields are derived from guesswork. Beneath each table will be a discussion of the fields which I am not certain about. Fields specified in white are fairly certain to be correct. Fields which are red have not been verified. Fields which are blue are unknown.
The data types which will be referenced in this paper are:
Data type Description
char array An array of ASCII characters, fixed in length
ASCIIZ string An array of ASCII characters, terminated by a NUL character. Typically, char arrays in this can be NUL-terminated -- i.e. part of the array may be filled with garbage, and this will cause no problem, as long as at least one byte earlier in the array is a NUL character (ASCII 00).
word A little-endian "word" of 16-bits
dword A little-endian "double-word" of 32-bits
point A point within some reference frame, composed of two 16-bit words; the first is the x-coordinate and the second is the y-coordinate.
rect A rectangle within some reference frame, composed of 4 16-bit words; the order of the coordinates is: left, top, right, bottom. Typically this is used to store bounding boxes of various objects.
strref A reference into the 'TLK ' resource -- a 32-bit number which can be mapped to a string via a lookup into the TLK table.
resref A reference to a specific resource -- an 8 character long string which is mapped to a resource via the KEY file and the override directory. Note that these are always 8 characters long, even though any characters after and including a NUL character in the name are ignored.
This document is probably rife with inaccuracies and inadequacies. If you believe parts of this to be in error, or you can help to fill in details of bits which are not yet known, please email me corrections.
When bits are numbered, they will be numbered with the least-significant bit as 0, and the most significant bit as 7, 15, or 31, for byte, word, or dword, respectively.
General
Some internal use is made of the language Lua, developed by TeCGraf at the Pontifical Catholic University of Rio de Janeiro in Brazil. This only applies to Baldur's Gate, as Lua was carefully excised in Planescape: Torment. It is primarily used for the cheats/debugging console, into which, in fact, can be typed complete Lua programs. There is a reference-manual online; it will take you a couple of hours if you read it all, much less if you just browse the highlights; it does not, as far as I've been able to determine, actually play an important role in the internal functioning of the engine, and was likely added as a debugging aid. Note that the AI scripts have nothing to do with Lua.
File Formats
Without further ado, here are the file formats. File formats are identified in 3 different ways. First, most file formats have a numerical code, which we will call the resType. Second, all file formats have an extension, which is used to determine what format the data inside is expected to be. Third, most of the file formats are tagged -- i.e. the first 4 bytes of the file are a (character) code, determining the format, as well as another 4 byte code, determining the version of the format.
resType extension format tag Notes Description
N/A .key 'KEY ' Directory of resources, their locations, and their types.
N/A .bif 'BIFF' Archive containing resources, as indexed by the .KEY file.
N/A .cbf 'BIF ' Icewind Dale only Compressed archive containing resources, as indexed by the .KEY file.
N/A .tlk 'TLK ' Table in which strings (and occasionally, sounds) are looked up by strref
N/A .acm ??? Music. Proprietary, and somewhat fiercely guarded by Interplay. Don't expect documentation of this format.
N/A .mus N/A Text format Music. I know nothing of this format.
0x0001 .bmp N/A Microsoft-endorsed standard for static graphics. This is, as often as not, used for storing palettes, rather than for storing bitmapped graphics. In this case, the file will be a 1x1 pixel image, with a full palette. 4, 8, and 24 bit BMPs are supported, but only uncompressed BMPs are supported.
0x0002 .mve ??? I do not know anything about this format. Also guarded by Interplay. Don't expect documentation for this format, either, as I am reluctant to displease Interplay and cause them to request these pages taken down.
0x0004 .wav 'WAVC' Sound files used throughout the game are stored in these formats. Note that 'WAVC' and 'RIFF' .wav files are used interchangeably throughout the engine; WAVC is an internal format -- more precisely, an ACM file with a header attached to simplify buffer estimation during file decompression.
0x0004 .wav N/A RIFF wave files. A published format. The Microsoft mmio* routines are not used for WAV reading. As a result, the file must be of the very straight-forward variety. Fortunately, most WAV files are.
0x0005 .wfx ??? Possibly some sort of bitmapped graphics? Will advise as more information becomes available
0x0006 .plt 'PLT ' A bitmapped graphics format used for paper dolls. I understand this format now, and will be writing it up soon. I believe that it basically consists of interleaved bytes of 'color type' and 'intensity'.
0x03e8 .bam 'BAM ' Used for animations as well as for multi-frame static graphics, this is a format supporting multiple animation cycles, each containing multiple frames. The GUI uses these extensively, as all the controls (buttons, sliders, etc) have controls represented by these files.
0x03e8 .bam 'BAMC' Baldur's Gate 2 only Simple zlib based compression format. Essentially, an entire BAM file is compressed using zlib and a small header prepended.
0x03e9 .wed 'WED ' Represents the graphics of a region. Some connectivity information appears here, though probably only for clipping purposes -- i.e. we have 2-d maps and tiles, but we need to simulate a 3-d environment. Thus, we store the walls in here so that we know which parts are raised, so that a person walking behind a wall is clipped. Anyway, this file type contains lists of regions (overlays), details for how animated tiles are to be animated, and which tiles change when doors are opened.
0x03ea .chu 'CHUI' A representation (a la Windows dialog templates) of GUI elements. Basically, it is a list of 'windows', which may optionally have a .mos as a background, and a list of 'controls' for each window. The controls include 'slider controls', 'text fields', 'buttons', 'scroll bars' and a few other assorted types
0x03eb .tis N/A This is the tileset information used for painting the screens. A tileset is basically an array of tiles which are composed of a palette of 256 24-bit colors and a block of pixels (typically 64x64) which are to be painted using that palette.
0x03ec .mos 'MOS ' Yet another tiled file-format. This is used for backgrounds for gui windows and for the overhead map of regions. It is likely that this is stored in tile format only because of the compression advantages, as opposed to the .tis files which are stored in tiled format because of the pragmatic advantage of being able to load tiles quickly on demand.
0x03ec .mos 'MOSC' Compressed format, exactly like BAMC format, except with a different signature field in the header.
0x03ed .itm 'ITM ' Objects which may appear in either the player character's inventory, or in various creatures 'inventory' are stored in these files.
0x03ee .spl 'SPL ' Spells are stored in this format. This includes wizard spells (spwi*), priest spells (sppr*), and innate spells (spin*), as well as any spells which monsters have which are unavailable to the user.
0x03ef .bcs N/A Text format Compiled script files, as are output by the script compiler.
0x03f0 .ids N/A Text format A mapping from numbers to text, typically giving descriptive names or labels to engine internals. For instance the exported functions that can be accessed from scripts are given IDs in one of these files.
0x03f1 .cre 'CRE ' All the monsters in the game are stored in this format, which associates statistics, graphics, and AI scripts to baddies.
0x03f2 .are 'AREA' A description of an area, but more schematic than WED files. The AREA file contains descriptions of where containers, doors, actors, and items are in the area.
0x03f3 .dlg 'DLG ' All inter-character dialog is scripted using these files.
0x03f4 .2da '2DA ' Text format. Note: Do not count on the signature being at the beginning of the file. The reason for this is twofold. First, these are text files and may have spaces before the signature. Second, these may be encrypted with a simple XOR key. (Enough to stop a snooper, but not enough to keep a determined intruder out.) A "two-dimensional array" file format which has, in addition to a 2-dim array of strings, column and row headers. Typically used for storing the AD&D rulesets.
0x03f5 .gam 'GAME' Save game file format -- stores the current state of the party and of the internal variables.
N/A .sav 'SAV ' Save game file format -- stores the current state of the areas the party has visited.
0x03f6 .sto 'STOR' Store file format. Stores information on a stores stock, it's prices, and what it's willing to buy.
0x03f7 .wmp 'WMAP' World map file format. This stores information on which areas are located where on the world-map, and which graphics to use for them. Work in progress!
0x03f8 .chr 'CHR ' Exported player characters are stored in this format, which actually contains a .cre file in its entirety.
0x03f8 .eff 'EFF ' ToTSC and IWD and BG2 The EFF V2.0 format replaces the old 30-byte effect structure found in CRE files and ITM files, and partially documented in the effects section. The EFF V2.0 format can be found either as a standalone file, or, if certain flags are set, in CRE files, and possibly in SPL and ITM files.
0x03f9 .bs N/A Text format Principally the same as the .bcs file, these are only used for character control scripts. It is likely that they are restricted to a subset of the functions callable from a .bcs
0x03fa .chr 'CHR ' Character files. Used to be 0x3f8, but now that's EFF, so... Dunno...
0x03fb .vvc ??? Visual 'spell casting' effects are somehow described by these files. it is not known how.
0x03fc .vef ??? Baldur's Gate 2 only Visual effects (possibly OpenGL effects?)
0x03fd .pro ??? Description of 'projectile' types
0x03fe .bio ??? Baldur's Gate 2 only Stores the edited biography of characters?
0x044c .bah ??? Baldur's Gate 2 only Unknown
N/A .baf N/A Text format This is the file format used for scripts for the Infinity Engine, both for character control and, one would assume, for scripted events (although scripted events can call a broader range of functions than character AI scripts). These files compile to either .bs or .bcs files.
0x0802 .ini N/A Text format
Torment and Icewind Dale This is basically the windows .ini file format. It is focused on storing things like quest information and respawn information for areas.
0x0803 .src N/A Torment only This is a binary file format, though very simple. It is used to determine the text that appears over people's heads on the overland screen.
N/A .toh 'TLK ' Icewind Dale only? "Talk Override Header". This is used for overrides to specific entries in the TLK file. There is evidence that it may exist in earlier versions, but I've only seen it used in Icewind Dale, where it is used for the purpose of customizing character biographies. It is used in conjunction with the .tot file.
N/A .tot N/A Icewind Dale only? "Talk Override Text". This is used for overrides to specific entries in the TLK file. There is evidence that it may exist in earlier versions, but I've only seen it used in Icewind Dale, where it is used for the purpose of customizing character biographies. It is used in conjunction with the .toh file.
Other miscellaneous bits
Information about the encryption used for the BG text files
Download current revision of the info (i.e. the version you are looking at now.)
Sample C source code using zlib to unpack .sav and Icewind Dale .cbf (compressed BIF) files.
Sample C source code using zlib to unpack BG2 compressed .bif files.
Sample C source code using zlib to unpack BG2 compressed .bam and .mos files.
Credits
Thanks go first, and foremost, to the teams at Bioware, Black Isle, and Interplay, for the fantastic games they've produced.
Eddy L O Jansson and Robert Risberg were responsible for starting this project and obviously for very major contributions. Eddy Jansson continues to make contributions, including work to make these pages validate strict.
Thanks also to Dmitry Jemerov who, in addition to publishing an excellent resource viewer (under the GNU Public License, no less), has shared his information, and continued to analyze the game data, which has been very useful in filling in gaps and correcting errors.
Thanks to Brian Frappier for supplying some sample data files for examination before I managed to get IWD, and for his continued dialog on issues regarding the project and the Infinity Engine.
Petr Zahradnik has made major contributions.
Many warm thanks to Aaron O'Neil for publishing the source to his GateKeeper editor. It helped us flesh out parts of the CRE structure (especially the spell table), and his analysis of the GAMEV1.1-structure was excellent. Aaron O'Neil was also responsible for originally pointing out the new compressed BAM file format.
Thanks to Thom Zakariassen for GAME struct related clarifications.
Thanks to Joost Mans for many recent clarifications and bug fixes.
Thanks to Grazzt for info on Icewind Dale weapons proficiencies.
Thanks to Banelord and Daelomin for helping to fill in some gaps.
Thanks to Michael Kay for clarifications to the AREA file format.
Thanks to Paul Victorey for a very lucid description of the WMAP format.
And for the sake of completeness, thanks to the folks at Datarescue for producing IDA Pro, which is the best disassembler on the market, and without which this information would be much less complete and much less accurate.
Hail to our robot masters.
Instructions:
Click upon the checkbox to the left of the file name and description that you're interested in. At the bottom of this web page you will find a button marked "Request Selected Files". Click upon this button and an E-Mail message will be sent to The Skeptic Tank containing the list of files you requested. If after clicking upon this button your web browser brings up an E-Mail form and expects you to send mail, your web browser software in incompatible with the mailto: action in forms that's part of the HTML 3.0 specification so you'll have to type-in the list of file names you're looking for and then send the email manually (or acquire a copy of Netscape which handles mailto: action in forms properly.)
If your computer can't handle ZIP files (PKZIP-compressed files) you may select a button toward the end of the page to automatically request that all ZIP files be unzipped before they're sent to you. If you receive ZIP files and see trash when you view it, you need to acquire a copy of PKUNZIP.EXE or you need to send your request again with the UNZIP option selected.
If you don't receive the files you've requested in two days, check your return mail address and make the request again.
Hacking. Most of this is either totally obsolete or is totally childish and in any event unworkable. As a historic look into the past when hacking was a sport, these files could be useful. Hell, most of this nonsense didn't work anyway.
23THINGS.TXT [2342 bytes] --- Top 23(!) things learned at DEF CON 1 By The White Ninja 'Jesus Hacks! Why don't YOU?' This text file idea blatantly leeched from: SummerCon! 1.
386I.TXT [1920 bytes] --- THE COMPUTER INCIDENT ADVISORY CAPABILITY CIAC ADVISORY NOTICE
5600.TXT [84069 bytes] --- [F] Self Test . Exit Application: Application: RING Invalid Menu Entry Application: Application: CONNECT Station Message Detail Accounting (SMDA) [A] Automatic SMDA Reports [B] On-Line SMDA Reports [
ACCESBLT.HAC [20551 bytes] --- Computer Systems Laboratory Bulletin November 1991 ADVANCED AUTHENTICATION TECHNOLOGY Introduction Computer systems and the information they store and process are valuable resources which need to be pr
ACCESSIN.TXT [14070 bytes] --- TIC INC. Presents. Vol:1/Issue:1.0 Accessing GEnie Free A Brief Tutorial on How to Beat the High Cost of Genie =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ This is Tic Inc's
ACRO01.TXT [4538 bytes] --- A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling out the New User Applicat
ACRO02.TXT [5532 bytes] --- It's amazing that my first Acronym's text file went over so well! So, here's the second and much larger companion to it.Acro 2. Yeah, I know 2 days is a long, long wait for a file. G If I keep th
ACROLIST.PHK [8181 bytes] --- VERSION the library version number: 1.30 containing 250 acronyms CREDITS the people who have helped by sending acronyms. ANI Automatic Number Identification MCM Miami Cracking Machine ICE International Crack
ADSSYS.TXT [10048 bytes] --- A Guide To: A.D.S. Systems.
AIO.BOX [2485 bytes] --- All In One Box BY: Disk Doctor Basicly, this should be common sense All You have to do is by a small box (Preferable a rated box that will keep it from interfering with that nice Raidio you carded last w
AIS.TXT [15248 bytes] --- AIS - Automatic Intercept System The DAIS II System by Computer Consoles Incorporated INTRODUCTION. ~ Computer Consoles Incorporated (CCI) manufactures various hardware appliances to be use
AIX.FUN [778 bytes] --- the CERT Advisories. You'd better get rid of the glaring AIX rlogin hole, if you haven't done so already (CERT CA-94:09). Check also CA-91:19, CA-92:05, CA-92:06, CA-92:07, CA-92:
ALLNET01.TXT [3939 bytes] --- == Hacking Allnet = = 01/xx/88
AMHACK.TXT [12374 bytes] --- Hacking Answering Machines 1990 by: Predat0r of Blitzkrieg Bbs 502/499-8933 ATT reports that in the year 1990, 11 million p
ANSIBOMB.TXT [10496 bytes] --- ANSI Bombs II: Tips and Techniques By The Raging Golem I. Introduction After writing the last file, a lot of people let me know about the mistakes I had made. I guess this file is to clear up those miscon
AOHELL.PHK [1071 bytes] --- Why I Wrote AOHell The reason I wanted to make this program is because I hate just about everyone on AOL. Yes, that probably means YOU. I'm sick of all the faggots, and I'm sick of all the God damn ped
AOLHAK.TXT [9252 bytes] --- How To Hack America On Line By: The Hooded Bobs The hooded bobs are currently. ThE cRowE, IckleMe and Ersatz First of all, this file will be of the most help to the beggining hacker on AOL, while m
ARPA.MAN [86379 bytes] --- NIC 50003 ARPANET INFORMATION BROCHURE DECEMBER 1985 ARPANET INFORMATION BROCHURE DECEMBER 1985 Editor: Stephen C. Dennett Elizabeth J. Feinler Francine Perillo Additional copies of this document may be obtain
ARPA1.HAC [7040 bytes] --- Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
ARPA2.HAC [12160 bytes] --- Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
ARPA3.HAC [7552 bytes] --- Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
ARPA4.HAC [4608 bytes] --- _ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
ARPA5.HAC [8064 bytes] --- Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
ARPA6.HAC [13824 bytes] --- Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
ARPANET.HAC [4439 bytes] --- [CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
ARPANET.TXT [4736 bytes] --- [CTRL-S STOP/START SPACEBAR TO EXIT] brought to you by: The Hollow Hills 805-682-5148 (c)opyright 1984 -the wyvern _ first of all part 4 will deal with: 1(and only one):
ARPANET1.CON [4505 bytes] --- / ARPANET / FIRST OF ALL PART 4 WILL DEAL WITH: 1(AND ONLY ONE):OPERATING SYSTEMS AND THEIR TAC ADDRESSES ACTUALLY BEFORE I BEGIN YOU MUST NEED TO KNOW: TO ATTACH TO S
ARPANET1.TXT [7040 bytes] --- Hacking ARPANET Part I by The SOURCE of -The Listening Post =- 408-923-7575 INTRODUCTION ARPANET (Advanced Research Proje
ARPANET2.TXT [12160 bytes] --- Hacking ARPAnet Part II by The SOURCE of -The Listening Post =- 408-923-7575 LEARNING WHO's WHO As mentioned earlier, ARP
ARPANET3.TXT [7552 bytes] --- Hacking ARPANET Part III by The Source ARPANET can't be faulted for the amount of information it is willing to disclose to a
ARPANET4.TXT [4608 bytes] --- _ First of all part 4 will deal with: 1(and only one): Operating systems and their TAC addresses Actually before I begin you
ARPANET5.TXT [8064 bytes] --- Hacking Arpanet Part V by The Source PEEKING AND SPYING This article discusses the commands that 'anonymous guest' can use to
ARPANET6.TXT [13824 bytes] --- Hacking ARPANET Part VI by The Source This last part of the Hacking ARPANET series provides some more iformation on the typ
AS400CMD.HAC [27788 bytes] --- IBM AS/400 Command Summary Command Description - - ADDACC Add Access Code ADDAJE Add Autostart Job Entry ADDAUTLE Add Authorization List Entry ADDBKP
AS400CMD.TXT [28178 bytes] --- @BEGIN_FILE_ID.DIZAll IBM AS/400 Commands Shell and scripting commands included . @END_FILE_ID.DIZTHe MiGHT HaS ReBoRN /\ Demon
ASPEN.TXT [16772 bytes] --- [R.A.W Productions] [01.13.92] [A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems] [Written by: Caveman] [Introduction] ASpEN, or 'Automated Speech Exchange Network,' is a voi
ASPEN2.TXT [11053 bytes] --- [R.a.W][Caveman] [03.27.92] [A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems: Part II] [Written by: Caveman] [I
ATAREBL.TXT --- r4 ATTENTION: All who enjoy the 60% discount on night and weekend calls with ATT.abandon all hope. ATT has declared malicious WAR on all consumers by reducing the 60% night and weekend discount to on
ATLAS.TXT [4938 bytes] --- % % Hacker's Atlas % % % Ragon/Wyv/Bof % Ltd % Presentation! %
ATM.TXT [8167 bytes] --- A. T. M. Fraud Made Easy | | | | summary and research by | | Count Zero | |
ATM-92.TXT [20096 bytes] --- ===- THE HIGH TECH HOOD SQUAD PRESENTS. AAAAAAA TTTTTTTTT MMM MMM ' A A TT MMM
ATM-MORE.TXT [20049 bytes] --- To: unix-wizards@sem.brl.mil Subj: [1070] Re: Here's a BRILLIANT password idea! But, in the UK at least, if you abort the 'login' attempt after the 2nd attempt (there is a button to do this), you get
ATM1.TXT [2773 bytes] --- - The Disk Jockey - - presents: - - - - Scam
ATMA.HAC [22036 bytes] --- (View: automatic teller machines From ames!amdahl!nsc!voder!wlbr!gins Mon Jul 13 12:41:23 PDT Article 479 of sci.crypt: From: gins@wlbr.UUCP (Fred Ginsburg) Subject: Re: ATM secret codes Summary: ATM stu
ATMAPPS.TXT [1771 bytes] --- 'GEE WHIZ' ATM APPLICAITONS ON THE HORIZON Nathan Felde, executive director of multimedia communications at the NYNEX Science Technology laboratory in Cambridge, Mass., waxes evangelical about the po
ATMHAC~1.TXT [5742 bytes] --- + HACKING ATM'S + Welcome everybody to my first article dealing with the manipulation of the Bank's Automated Teller Machines for the gain of money In this article I will show you ma
ATMS.TXT [20384 bytes] --- Track Layouts This is off the top of my head, but is 99% there. Also I'll ignore some obsolete stuff. The physical layout of the cards are standard. The LOGICA
AUSTHACK.HAC [7324 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo Australian Dialups = ISSUE: 1 =
AUSTPAC0.TXT [14674 bytes] --- === Compiled by Soft Beard 1990 === Accessing Telecom Australia`s AUSTPAC service. AUSTPAC is a great way to connect to major companies. This is how it works: You call AUSTPAC for 20cen
AUSTPAC1.TXT [11953 bytes] --- The following information is from the AUSTPAC character terminal manual. Austpac is available all the time except (currently) 11pm Thu - 7am Fri. This is their maintainance window. (Melb. time). When you
AUSTPAC2.TXT [20338 bytes] --- TYPE AUSTPAC.DOC TYPE Ver 5.3 - Multiple file lister CTL-S pauses, CTL-X skips to next file, CTL-C aborts === LISTING FILE: AUSTPAC .DOC AUSTPAC 1 . Austpac General Information 2 . Austpac Logon Instruct
AUSTPAC3.TXT [15830 bytes] --- The September 1989 - Apple Odessa - September 1989 Presents AUSTPAC Price List. A file bought to you by Negative Energy. Introduction The AUSTPAC data service which uses packet swi
AUTOHACK.TXT [5504 bytes] --- Documentation for [ A U T O - H A C K ] version 1.0 Written by: Grimalkin, 08/12/86 NOTICE: This program was written to further the education of the IBM PC computer users out there, and was not int
AUTONET1.TXT [11411 bytes] --- [ Hacker Supreme's - Hackers Directory Volume # 34 ] [ Compiled by: Ninja Squirrel and Logan - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] [ AUTONET SERIES (Section 1) ] HOW TO CONNECT TO AUTONET To
AUTOTE~1.ANA [5439 bytes] --- Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a private residence or o
AUTOVON1.HAC [2230 bytes] --- Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part I AUTOVON is the Military Voice Communications System. Each Military Installation has
AUTOVON2.HAC [3387 bytes] --- Uploaded By: Dark Creaper Brought to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part II 'Silver Boxes' Warning: This modification could permanently damage you phone!! Rea
AUTOVON3.HAC [1809 bytes] --- Uploaded By: Dark Creaper Brought to to you by: ShAdOwRuNnEr Intro to Automatic Voice Network Commonly know as AUTOVON Part III 'Operating Procedures' Now, you're at the part that you have been waiting for!
AUTOVONI.NST [19395 bytes] --- From DLEIBOLD@vm1.yorku.ca Fri Jun 19 20:35:22 1992 Received: from vm1.yorku.ca by gaak.LCS.MIT.EDU via TCP with SMTP id AA08522; Fri, 19 Jun 92 20:35:15 EDT Received: from VM1.YorkU.CA by vm1.yorku.ca
AVOIDCAP.TXT [2576 bytes] --- 'Planning Ahead' Every self respecting hacker or phone phreak should plan ahead. In this phile I hope to show you how and what to take when you have to make a break for it. I. Know Thy Neigborhood Knowing
BACKDO~1.TXT [19623 bytes] --- Backdoors By Christopher Klaus 8/4/97 Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this p
BANKHACK.TXT [12641 bytes] --- The Legion of Doom! EFT Division Presents HOW WE GOT RICH THROUGH ELECTRONIC FUND TRANSFERS (OR: GEE! NO, GTE!) A certain number of financial institutions that reside within the packet-switched confines o
BASIC.NET [14775 bytes] --- 11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outd
BASIC1.HAC [7491 bytes] --- Basics of Hacking I: Decs's Welcome to basics of hacking i: dec's in this article you will learn how to log
BASIC3.HAC [4349 bytes] --- The basics of hacking iii: data
BASICNET.HAC [14534 bytes] --- 11/20/89 - 7:30 EST-10:46Est - A File By Sk8 The SkinHead- BASIC NETWORKING Well, many people have asked me 'how do i use Telenethow do i use an outdi
BBSFILES.TXT [38272 bytes] --- Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILABLE TO THE THOUSANDS
BCTJ1_04.TXT [7457 bytes] --- Ethernet Fields
BEGING~1.TXT [48493 bytes] --- User's guide Well, howdi folks. I guess you are all wondering who's this guy (me) that's trying to show you a bit of everything. ? Well, I ain't telling you any
BOAHACK.TXT [6686 bytes] --- Hacking Bank Of America's Home Ban
BOCES.TXT [6957 bytes] --- SYSTEM 1 OR SYSTEM 2? ?SYS2 HEL-S560, BOCES INSTRUCTIONAL NETWORK - SYSTEM 2 READY ON PORT# 20 LIB NAME LENGTH NAME LENGTH NAME LENGTH NAME LENGTH -ASCII 846 ADDRES 1056 AL
BOM-HHP.TXT --- A BOM SQUAD RELEASE / / The History Of \ \ Hacking Phreaking / \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ By Raven - Okay boys and
BOOKS.TXT [41728 bytes] --- BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS (1973 through 1988) Note: A bibliography is now being developed to encompass 1989. ABUSE/MISUSE/CRIME AUTHOR: Fennelly, Lawrence J. TITLE: H
BTINFO.H-K [14037 bytes] --- No description yet
BUFFEROW.TXT [25453 bytes] --- How to write Buffer Overflows This is really rough, and some of it is not needed. I wrote this as a reminder note to myself as I really didn't want to look at any more ATT assembly again for a while and
BUMP.TXT [8231 bytes] --- [Image] Things that Go Bump in the Net This is a brief look at some of the more colorful characters in the menagerie of network security threats, with an emphasis on how they relate to agent-based systems
C64FUN1.TXT [2927 bytes] --- Number :/15 Subject :/C64 Fun!!!! From :/THE NIGHTSTALKER Date :/10/08/86 00:08:53 ET I suppose that one of the more interesting things one can do with a computer in a store like Sears or Toys R Us is
CALLCARD.PHK [1734 bytes] --- Pyromania Publishing Article #0006 Title| Hacking Calling Cards By | THE PYROMANIAC Date | September 23, 1987 Call | the Pyromania BBS! 3o1-xxx-xxxx Note | Sorry about 40 columns but I | prefer the
CANDYL~1.FAQ [4823 bytes] --- ## ## ## The CandyLand FAQ ## ## ## ## http:www.mcs.net/~candyman/ ## ## ## ## Answers to the most
CARCODES.TXT [3358 bytes] --- CODES USED BY COMPUTERS IN GM CARS New cars use computers to store and remember malfunctions that occur. These are displayed in the flashing sequences in the instrument cluster. A typical sequence of ins
CB1.TXT [3407 bytes] --- CITIBANK HACKING by Johnny Hindu Hello Hackers, this month I am going to show you excerpts from my hacking log. This excerpt is about my excursion with Citibank and how I got into it. Alright lets get g
CB2.TXT [2145 bytes] --- I figured out that the numbers at the end are the social security number. (not that long though). Nice now that I am in Johns account, what should I do.I tried a few bum keys. Here are the keys that wor
CBRSP-1.HAC [6075 bytes] --- We, the People proudly Present
CBVHACK.PNK [6694 bytes] --- CBV Hackin By PiNK ToRPeDo Original File Date: June 7, 1994 You might be saying to yourself. now PiNK - How do I get through those CHeeZY CBV's that everyone uses. There are at least six (6) wayz: 1: D
CHAOS01.TXT [1609 bytes] --- Pyro's Anonymous 'Chaos Chronicles' Issue #1 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
CHAOS02.TXT [2577 bytes] --- Pyro's Anonymous 'Chaos Chronicles' Issue #2 Author: Inphiniti Co-Author: Decibel Title: Information/Hacking Techniques for 80
CHAOS03.TXT [4264 bytes] --- Pyro's Anonymous 'Chaos Chronicles' Issue #3 Author: Inphiniti Co-Author: Decibel Title: Credit Card Fraud Tutorial All Rights
CHINA0~1.HAC [23257 bytes] --- CHiNA Newsletter #2 +-+ | | | A. T. M. Fraud Made Easy | | | | summary and research by | | Count
CHURCH4.PTL [9611 bytes] --- The PTL Club Proudly Presents Church Chat Volume 4 Written by: The Spiker Gee, this might look unprofessional but oh well. A newsletter is just to inform people about special thin
CITIBANK.TXT [6226 bytes] --- by Johnny Hindu Hello Hackers, this month I am going to show you excerpt from my hacking log. This excerpt is about my excursion with Citibank and how I got into it. Alright lets get going: December 20,
COMPUS.TXT [3286 bytes] --- FREE COMPUSERVE PASSWORDS BY DEVIOUS XEVIOUS There are several ways you can go about getting cis passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get Rad
COMPUSER.TXT [27008 bytes] --- 189 9 THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216, UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TO OSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! The index which follows gives a c
COM_SE~1.HAC [54579 bytes] --- United States General Accounting Office _ GAO Report to the Chairman, Committee on Science, Space, and Technology
COM_SE~2.HAC [15590 bytes] --- United States General Accounting Office _ GAO Testimony Before the Subcommittee on Government Information an
CONCIS.TXT [3488 bytes] --- FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
CONTACT.TXT [5246 bytes] --- ===== HOW TO CONTACT THE HACK SQUAD ===== If you have a report or comment, I can be reached through any of the following systems and/or networks: FidoNet: Backbone Echos SHAREWRE, PDREVIEW, DIRTY_DOZEN,
COPIER.HAC [10206 bytes] --- Magnetic Stripes Translated from Hack-Tik, #8, #9/10, available at PO Bos 22953,1100 DL Amsterdam, The Netherlands Translation by Dr. Abuse Text/Schematics _copied_ from 2600 Magazine, Summer 1991 by:
COSMOS.HAC [10942 bytes] --- C O S M O S C O P Y R I G H T 1 9 8 4 D O
COSMOS1.TXT [7458 bytes] --- uploaded by: the wizard of oz es saying it's changed. but they probably throw away those papers and you will be able to find alot of interesting inpho by trashing. also, most or all calls to cosmos are trac
COSMOS2.HAC [9608 bytes] --- The SYSOP of OSUNY wishes to thank Pirate-80 (304)-744-2253 for the contribution of this file $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ LEX LUTHOR $ $
COSMOS3.HAC [8320 bytes] --- The 1986 COSMOS FILES ART III: Service Orde
CRACKAM1.TXT [63466 bytes] --- Hacking Programs on the Amiga By FunToHack of K1W1 Christchurch New Zealand (all spelling mistakes are free) Version 1
CRACKDWN.TXT [26230 bytes] --- From 2600 magazine volume 7, number 1 SPRING To Subscribe: 2600, PO BOX 752, Middle Island, NY 11953-0752 $18 individual, $45 corporate yearly subscription rates FOR YOUR PROTECTION A year ago, we told the
CRACKER.TXT [37658 bytes] --- Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. By the consultants of the Network Security Solutions Ltd. Front-line Information Security Te
CREDITFR.TXT [8914 bytes] --- \=/ | Volume I of The Adventures in Fraud Series | | The Bible of Fraud | | By: | |
CREDUNIN.CON [1314 bytes] --- CREDIT UNIONS AND PROTECTION - - AGENCIES
CS.HAC [2815 bytes] --- How to get a free account on CompuServe CompuServe: Bastards who charge a
CS.TXT [2944 bytes] --- How to get a free account on CompuServe CompuServe: Bastards who charge a
CSL8_93.HAC [12359 bytes] --- CSL BULLETIN August 1993 SECURITY PROGRAM MANAGEMENT This bulletin discusses the establishment and operation of a security program as a management function and describes some of the features and issues c
CUSASS.HAC [3520 bytes] --- by THE MASTER The Master on out-of-state boards. A CN/A is a section of ATT ket up to supply it's offices' with Names and addresses of people who own a certain number. CN/A stands for: Customer's name
CYBER.TXT [11505 bytes] --- The CyberPunk Movement º º Written by Pazuzu for DnA º º May 12, 1993 º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ There's been a lot of talk lately about the CyberPunk M
DARTKIEW.HAC [20480 bytes] --- Dartmouth Kiewit System by the lone ranger Released:01-05-86 This might be some sort of on-going set of files but I doubt it. The only way I can see that it would be is that someone else would continue it
DATA.TAP [3604 bytes] --- FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Elric of Imrryr Lunatic Labs UnLtd FOR SEVERAL YEARS, I ACC
DATABASE.TXT [3142 bytes] --- CIRR DATABASE A tool for corporate research For more info, contact: Kerry Dressler through EnviroNet mail CIRR actually stands for the Company and Industrial Research Reports Datebase. Not all Librarie
DATAKIT.HAC [14409 bytes] --- - isn: How to connect across VCS/ISN boundaries. - Holmdel, Crawford Hill, and Short Hills locations have mostly ISN nodes. Other locations have primarily VCS (Datakit) nodes. In ge
DATAPAC.HAC [15579 bytes] --- A Guide to Dat
DATAPAC.TXT [14413 bytes] --- A Guide to DataPAC A Technical Information File for the Canad
DATAPAC1.TXT [16626 bytes] --- A Guide to Dat
DATAPAC2.TXT [19480 bytes] --- DATAPAC 3101 ITI PARAMETERS DESCRIPTION THE FOLLOWING WILL PROVIDE IN MORE DETAIL A DESCRIPTION OF ITI (84) PARAMETERS FOR DATAPAC 3101. DESCRIPTION - INTERNATIONAL PAD PARAMETERS 1)ABILITY TO ES
DATAPAC3.TXT [2430 bytes] --- If you've scammed a Datapac based account, here's a list of places within Canada that you can reach.gratuis! Datapac 3101 Public Outdial Ports Last updated April 3, 1989. The Datapac addresses
DATATAPP.TXT [4088 bytes] --- Dec 27 21:24 1985 data.tap Page 1 FEATURE ARTICLES AND REVIEWS- TAPPING COMPUTER DATA IS EASY, AND CLEARER THAN PHONE CALLS ! BY RIC BLACKMON, SYSOP OF A FED BBS Aquired by Lunatic Labs Uploaded by Elri
DC3-2.TXT [15498 bytes] --- DEF CON III Convention Update #1.80 (06.20.95) August 4-6th 1995 @ the Tropicana in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON
DDN01.HAC [2993 bytes] --- DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
DDN01.TXT [2993 bytes] --- DDN Security Bulletin 01 DCA DDN Defense Communications System Published by: DDN Security Coordination Center (SCC@NIC.DDN.M
DDN03.HAC [11207 bytes] --- DDN Security Bulletin 03 DCA DDN Defense Communications System 18 Oct 89 Published by: DDN Security Coordinat
DDN04.HAC [3143 bytes] --- DDN Security Bulletin 04 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordinat
DDN05.HAC [4295 bytes] --- DDN Security Bulletin 05 DCA DDN Defense Communications System 23 Oct 89 Published by: DDN Security Coordina
DDN06.HAC [3015 bytes] --- DDN Security Bulletin 06 DCA DDN Defense Communications System 1 Nov 89 Published by: DDN Security Coordinat
DDNET1.TXT [8294 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network The Department of Defense started the major networking scene in the US in the late '70s and early 80s. Their first
DDNET2.TXT [2421 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network \|/ By Star - - Fire [a member of Mysterion Grp] /|\ Diagram of DDN: _
DEBTCARD.TXT [3730 bytes] --- ISDN HARVARD MEDICAL SCHOOL INSTALLS ISDN-BASED DEBIT CARD SYSTEM Students pay up front, then monitor accounts during the school year Harvard University Medical School in Boston is living proof that we
DEC10.TXT [23846 bytes] --- (info Uploaded to The Cartel AE line.) - Hacking the Dec-10 system Part I: Logging In, and simple cmds. Note:Sysop's may download this file but please keep the appropriate credits. Welcome to Hacking
DEC_200.TXT [3239 bytes] --- r64 Msg#: 1 of 7 Subject: Decserver 200 revealed! Posted By: Surf Studd [Classified] Sent To: All Posted On: 10/23/90 at 09:05:54 PM
DEFAULTS.TXT [6726 bytes] --- Updated - 4/1/92 to include XENIX systems The Hollow's Alliance 415-236-2371 MONDO h/ph/c g-files and discussion Here's our seventh, and like I promised a few issues back, a large list of default pas
DEFCON~1.HAC [11951 bytes] --- D E F C O N I C O N V E N T I O N D E F C O N I C O N V E N T I O N DEF CON I CONVENTION D E F C O N I C O N V E N T I O N READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUT
DEFDB.HAC [77311 bytes] --- Department of Defense Federal Data Bases Ada Information Bulletin Board Ada Information Clearinghouse The Pentagon Data: (202) 694-0215 US Department of Defe
DEFENSE.HAC [10447 bytes] --- HARRY HACKALOT PRESENTS %% %% 'Defense Data Network B
DENIAL.TXT [45856 bytes] --- =INTRODUCTION TO DENIAL OF SERVICE= Hans Husman t95hhu@student.tdb.uu.se Last updated: Mon Oct 28 14:56:31 MET 1996 .0. FOREWORD .A. INTRODUCTION .A.1. WHAT IS A DENIAL OF SERVICE ATTACK? .A.2. WHY WOULD S
DENNING.TXT [58773 bytes] --- To be presented at the 13th National Computer Security Conference, Washington, D.C., Oct. 1-4, 1990. Concerning Hackers Who Break into Computer Systems Dorothy E. Denning Digital Equipment Corp., Systems
DES.TXT [22528 bytes] --- DATA ENCRYPTION STANDARD FACT SHEET Introduction The National Institute of Standards and Technology (NIST) of the Department of Commerce has recently received many inquiries regarding various aspects of t
DESBLT.TXT [24448 bytes] --- This NCSL Bulletin initiates a new publication series at the National Computer Systems Laboratory (NCSL). Each bulletin will present an in-depth discussion of a single topic of significant interest to t
DESVAL.HAC [3149 bytes] --- DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
DESVAL.TXT [3905 bytes] --- DES VALIDATION LIST MANUFACTURER DATE VALIDATED DEVICE ID 1. COLLINS - 10-15-77 765-5914-001 2. IBM - 11-01-77 4402182 3. MOTOROLA
DIALBACK.TXT [10113 bytes] --- Date: Thu, 28-Feb-85 Subject: Dial Back isn't always secure An increasingly popular technique for protecting dial-in ports from the ravages of hackers and other more sinister system penetrators is dial
DIALOG.TXT [8142 bytes] --- DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information available
DIALOG01.TXT [8543 bytes] --- DIALOG is one of the largest online databases. DIALOG currently provides access to over 250 databases containing a total of over 100 Million records. The range of information available
DIALOUT1.TXT [68938 bytes] --- Novice Mannual On Using Out Dial Modems by blue adept - - - - - - - - - - - - - - - - Contents: - What is an OutDial? - Where to find OutDials - How to use an OutDial - PCP NU
DIALOU~1.HAC [29446 bytes] --- From t891368@otto.bf.rmit.OZ.AU Fri May 17 15:07:43 1991 Received: from munnari.OZ.AU by milton.u.washington.edu (5.61/UW-NDC Revision: 2.1 ) id AA05809; Fri, 17 May 91 15:07:20 -0700 Received: from goa
DIALUP.HAC [18816 bytes] --- Arlington VA 703 841-9834C 703 841-9834CAthens OH 614 594-8364C 614 594-8364CAtlanta GA 404 237-8113C Atlant GA
DNICINF.HAC [13312 bytes] --- Qmodem Scroll Back Dump File INFO RELATIONS-P Date: 1990.08.02/W/T D A T E X - P - International Traffic Relations Explanatory notes: DNIC Data network identification
DOWJONES.TXT [2570 bytes] --- ==)- P TO PAUSE S TO STOP -(== Inside DJNS major commands prompts: 'enter query' main prompt 'database help' displays info about the database you specify 'database' moves directly t
DPACINTR.ROT [37561 bytes] --- Reign of Terror [ R o T ] Presents - INTRODUCTION TO DATAPAC - (and PSN's in general) Written by: Deicide A B
DPACNUAS.TXT [92595 bytes] --- Reign of Terror =- |= - =| . Proudly Presents . |=
DTSB.HAC [8894 bytes] --- _ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
EASYL.HAC [3968 bytes] --- PROFESSOR FALKEN [][] K][] IN ASSOCIATION WITH [][] []
EASYLINK.HCK [2399 bytes] --- HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cablegrams, a
EASYLINK.TXT [4686 bytes] --- PROFESSOR FALKEN [] [] K] [] IN ASSOCIATION WITH [] []
EDIT.TXT [17792 bytes] --- E.D.I.T - Electronic Deception, Interception Terrorism : The Radio Shack Reality! presented by Ian A. Murphy, President CEO IAM / Secure Data Systems Inc. 1225 North Second Street Philadelphia, Pa
ENA!.HAC [7877 bytes] --- Numb. 5 Title What is the ENA? From RICK Left 28-DEC-85 11:33 PM THE ENA VISION: What IS ENA? Edited by Stefanie Kott ENA is an organization that grew out of the First Inte
ENCYCLOP.TXT [1502 bytes] --- Message 1150 DATE/TIME: 03/20/89 20:18 From : GAZ HOWLAND To : ALL Subject: I need a mars bar, to help me, help me, Folder : E, 'Encyclopedia Hacktanica' Did you se
EPROMS.HAC [5566 bytes] --- Kingpin [RDT Syn.] presents: === A CLOSER LOOK AT EPROMS ====- A brief introduction to EPROMS, what they are used for, and how they work (Stolen from an undisclosed source) Whassup to Brian Obli
ESLF0006.TXT [57267 bytes] --- 16 START DOKS | | | An ESLF Republication of | Original Publication: || Whole Earth Magazine Issue: =-
ESS.TXT [7153 bytes] --- r72 TO PAUSE S TO STOP Electronic Switching System $ $ From 2600 mag. Feb '84 $ $+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$ (Courtesy of Black Knigh
ETHICS.HAC [3692 bytes] --- File: NEWSWEEK - TEACHING HACKERS ETHICS Read 6 times = Teaching Hackers Ethics = Newsweek/January 14, 1985 by Dennis A. Williams = = with Richard Sandza = [Word Processed by BIOC Agent 003] = The p
ETHICS.TXT [5148 bytes] --- þ']%%+f! ! )19AIQYai ÿ TES Presents - The Ethics of Hacking - written by Dissident I went up to a college this summer to look around, see if it was where I wanted
EVASIV.TXT [7297 bytes] --- Distributed by: Assailant's Blade and Ford Prefect The Inspectors Thoughts How many times have you had the need to be able to sneak up on somebody, enter a building unnoticed, or simply walk around wi
EXEGUIDE.TXT [23552 bytes] --- Executive Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible for developing stand
FAST.TXT [5301 bytes] --- = = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = = = =
FBIAFTHA.HAC [16896 bytes] --- The FBI fights computer crime with weapons that are at least ten years old, according to one insider with contacts deep inside the 'hack
FBICOMPU.HAC [5225 bytes] --- Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright (c) 1986 Capitol Information Association. All rights reserved. Permission is hereby granted to re
FBISYS.TXT [5281 bytes] --- From the Illumi-Net BBS Decatur, GA Conspiracy Theory Conference 404-377-1141 Summary of FBI Computer Systems By Ralph Harvey This article is reprinted from Full Disclosure. Copyright (c) 198
FCSCVOL1.HAC [641496 bytes] --- FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME I Protection Profile Development Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The cont
FCSCVOL2.HAC [566236 bytes] --- FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME II Registry of Protection Profiles Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The co
FDDI.HAC [2156 bytes] --- Learning to Appreciate Tokens: How do FDDI internals work? FDDI Networks feature a counter-rotating, dual fiber optic ring. The primary ring circulates in one direction; the secondary ring circulates in
FDP1.TXT [12668 bytes] --- . The Griffin . Presents:
FDP2.TXT [13449 bytes] --- Uploaded By: THE GRIFFIN . The Griffin . Presents:
FH.TXT [49876 bytes] --- Fuckin' Hacker 2.0 ~ A 2AF Presentation Written by: Hypnocosm Released: June 10, 1987 'It's just a fuckin' hacker!' AN OVERVIEW Fuckin' Hacker is a code-hacking piece of software. Anyone who
FINDHOLE.TXT [16372 bytes] --- Subject: Security holes manifest themselves in (broadly) four ways. Date: 11.10.93 ( Please contribute by sending E-Mail to scott@santafe.edu . ) [quoting from the comp.security.unix FAQ] Security h
FIREWALL.TXT [5904 bytes] --- @BEGIN_FILE_ID.DIZA text abou‚]t Internet f˜–irewalls. @END_FILE_ID.DIZ ++ |
FREEBIE3.HAC [103246 bytes] --- INFOLIST - 90 CHURCH STREET - BOX 2517 - NY, NY 10008 Version 3.1 Version 3.1 CompuFreebies
FREECIS.TXT [3278 bytes] --- FREE COMPUSERVE ACCESS There are several ways you can go about getting CIS passwords. The ones with unlimited access are quite a bit harder but, first of all, the simplest to get ar
FTP-PA~1.TXT [5648 bytes] --- Some problems with the File Transfer Protocol, a failure of common implementations, and suggestions for repair. By David Sacerdote (davids@secnet.com April, 1996) FTP servers can operate in two modes: ac
FTPBOUNC.TXT [10230 bytes] --- Subject: The FTP Bounce Attack Date: 12 Jul 1995 03:50:50 EDT This discusses one of many possible uses of the 'FTP server bounce attack'. The mechanism used is probably well-known, but to date interest i
FUNWITH5.HAC [5437 bytes] --- Fun with Automatic Tellers Preface: This is not a particularly easy scam to pull off, as it requires either advanced hacking techniques (TRW or banks) or serious balls (trashing a private residence or o
GARAGHAK.TXT [48489 bytes] --- Article 329 of alt.cyberpunk.tech: Xref: grayhawk alt.cyberpunk:2269 alt.cyberpunk.tech:329 Subject: Finally, Garage Door Opener Hacker Plans!!! (Long) Date: 3 Apr 92 06:08:07 GMT Sender: usenet@darkstar.
GETINFO.TXT [5978 bytes] --- -The Hackers' Guide To Investigations - - Presented by HALE, Originators - - of -
GISDOC.HAC [5966 bytes] --- Hacking the GIS computer Compliments of the Realm of the UNHOLY (xxx) xxx-xxxx This is about the GIS computer. This computer is actually a time sharing system designed to give High School students help w
GOODBYE.ANA [1796 bytes] --- The Best of The Station By: The Prowler - Mace Substitute - 3 PARTS: Alchohol 1/2 PARTS: Iodine 1/2 PARTS: Salt Or: 3 PARTS: Alchohol 1 PARTS: Iodized Salt (Mortons) It's not actual
GOODKIDS.HAC [4548 bytes] --- Computer Hackers are Good People Too! I am writing this artical in hopes of dispelling the general idea that all Hackers are terrible teenagers that dwell on Electronic Mischief! Most Hackers are basical
GOVTHLP.TXT [4106 bytes] --- 00:02:47 TO SEE: ENTER: INFORMATION SERVICES LEGIS, FLOOR, GRANTS-CONTRACTS, GPRO, ECON, or BUDGET ADMINISTRATIVE SERVICES SCHEDULE, MAIL, TELEDEX, KASEWORK, USED
GS1.TXT [16195 bytes] --- THE GS/1 USER'S
GTE.HAC [19883 bytes] --- No description yet
GTE.TXT [19883 bytes] --- No description yet
GUIDE.DOC [5437 bytes] --- The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess i can start off an
GUIDE.TXT [42423 bytes] --- The LOD/H Presents
GUIDEDOC.HAC [5437 bytes] --- The Flash presents the Rsts/e Hacker's Guide Well i have absolutely nothing at all to do tonight so i have decided to make a sort of 'semi-user' guide with commands and codes. I guess i can start off an
GUIDEHAK.TXT [176913 bytes] --- THE NEOPHYTE'S GUIDE TO HACKING
HACETHIC.TXT [6161 bytes] --- TES Presents | The Ethics of Hacking | written by Dissident I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about my interests,
HACK.FAQ [251055 bytes] --- #hack FAQ #HACK FAQ EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ! THE FAQ SUFFERED FROM A FLOPPY DISK CRASH. I BELIEVE I HAVE CORRECTED ALL ERRORS RESULTING FROM THE CRASH. IF YOU FIND ANY
HACK.HAC [4096 bytes] --- H.ACKING A.ND C.OMPUTER K.RASHING VOLUME NO. 9 BY GREY WOLF
HACK.LEG [11978 bytes] --- NOVEMBER 7, 1990 C:\TEXT\NETWORK1.TXT A PROPOSAL TO JOIN THE CORPORATE WORLD AND THE COMPUTER UNDERGROUND WITH A PEACEFUL, LEGAL SOLUTION by FATAL ERROR I have conceived a
HACK1.HAC [7960 bytes] --- THE BASICS OF HACKING: INTRO THE FIRST OF A SET OF ARTICLES: AN INTRODUCTION TO THE WORLD OF THE HACKER. BASIC
HACK2.HAC [7450 bytes] --- BASICS OF HACKING I: DECS'S WELCOME TO BASICS OF HACKING I: DEC'S. IN THIS ARTICLE YOU WILL LEARN HOW TO L OG IN
HACK4.HAC [4421 bytes] --- THE BASICS OF HACKING III: DATA WELC
HACK5.HAC [5761 bytes] --- ==)P to Pause, S to Stop (== = = = HACKING MCDONALDS = = = = BY 'HERB' THE HACKER = =
HACK6.HAC [5241 bytes] --- Hacking Voice Mail Systems Voice Mail is a relatively new concept and not much has been said about it. It is a very useful tool for the business person and the phreak. The way it works is that somebody
HACK7.TXT [4034 bytes] --- was writen shortly after my arrest. I am currently groupless, having resigned from the Racketeers, so ignore the signoff. The Conscience of a Hacker. by The Mentor . 1/8/86 Another one got caugh
HACK9.HAC [10950 bytes] --- Hacking Control Data Corporation's Cyber This article will cover getting into and using NOS (Networking Operating System) version 2.5.2 running on a Cyber 730 computer. Cybers generally run this operati
HACK9301.RPT [39068 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 1 for January, 1993 || Report Date:
HACK9302.RPT [59113 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 2 for February,1993 || Report Date:
HACK9303.RPT [53202 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 3 for March, 1993 || Report Date: M
HACK9304.RPT [66762 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Co-Moderator, || FidoNet International Echo SHAREWRE The Hack Report || Volume 2, Number 4 for April, 1993 || Report Date: A
HACK9305.RPT [91783 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 5 for May, 1993 || Report Date:
HACK9306.RPT [101520 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 6 for June 1993 || Report Date:
HACK9307.RPT [117584 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 7 for July 1993 || Report Date:
HACK9309.RPT [137473 bytes] --- || From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet || Int'l Echos SHAREWRE WARNINGS The Hack Report || Volume 2, Number 9 for September, 1993 || Report Da
HACK9401.RPT [75374 bytes] --- || From the files of The Hack Squad: || Compiled by W.H. (Bill) Lambdin || Volume 3, Issue 1 The Hack Report || Report Date: January 29. 1994 for Jan/Feb, 1994 || || Welcome to the fir
HACKACR.HAC [59638 bytes] --- The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by:MERCENARY Version Five [Sep/02/1992] In no way do we feel
HACKAD.TXT [5248 bytes] --- (A brief bit of humor from the September, 1990, issue of ANALOG SCIENCE FICTION/SCIENCE FACT MAGAZINE) Are You Bored? In a Rut? Looking for a New Career? If so, we have the answer to your problems .
HACKCOS.TXT [27333 bytes] --- LEX LUTHOR $ $ AND $ $ THE LEGION OF DOOM! $ $
HACKCRAK.TXT [29696 bytes] --- THE FOLLOWING TWO ARTICLES ARE FROM THE JUST-RELEASED SPRING EDITION OF 2600 MAGAZINE, THE HACKER QUARTERLY. ARTICLE ONE: AN OVERVIEW A year ago, we told t
HACKDICT.TXT [557056 bytes] --- = A = abbrev: -breev'/, -brev'/ n. Common abbreviation for `abbreviation'. ABEND: [ABnormal END] /ah'bend/, -bend'/ n. Abnormal termination (of software); {crash}; {lossage}. Derives from an error m
HACKER.TST [21534 bytes] --- Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. It has gone through many revisions prior to this initial releas
HACKER01.TXT [131072 bytes] --- NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF ARTS DEPARTMENT
HACKER03.TXT [4931 bytes] --- The Hacker's Guide to the Galaxy: A collection phone numbers Compiled by Atari Pirates, Inc. Voice lines 213-372-6244/Dial-A-Joke 818-765-2000/Dial-A-Joke 213-765-2000/Jokes 818-882-9524/Tele-Fun 818-982-7
HACKER1.TXT [19996 bytes] --- Diary of a Hacker Part 1 What I am about to write about happened in October of 1988, right after I had turned 16. Yes, I had a Computer. Yes, I was a hacker. Yes, this is my story. This story is all true.
HACKER11.TXT [2403 bytes] --- HACKING WESTERN UNION'S EASYLINK By BIOC Agent 003 Tuc TucBBS Uploaded by Elric of Imrryr Easylink is a system that allows you to send Telex, Telex II (TWX), mailgrams, telegrams, cablegrams, and
HACKERS.PAR [2238 bytes] --- From rop@neabbs.UUCP Sun Apr 2 09:28:48 1989 To: RISKS@KL.SRI.COM Date: Thu Mar 30 02:00:20 1989 Subject: Galactic Hacker Party GALACTIC HACKER PARTY 2nd, 3rd, 4th of August 1989 PARADISO, AMSTERDAM, HOLLA
HACKFAQ.HAC [55216 bytes] --- Summary: This posting contains a list of Frequently Asked Questions (and their answers) about hacking. It should be read by anyone who wishes to post to the alt.2600 newsgroup or use the IRC channel #ha
HACKGUID.TXT [11536 bytes] --- - Little Hackers Guide - by Szpaq - version minus 1.00 - Add to this file whatever you know interesting about hacking and post it Contents 1. Disassembling Windows .HLP files 2
HACKHOLL.TXT [4372 bytes] --- TITEL : HACKING IN HOLLAND AUTEUR : ROP GONGGRIJP DATUM : 18/10/88 UPLOAD DOOR: ROP GONGGRIJP UPLOADDATUM: 18/10/88 TREFWOORDEN: HACKING, ENGELS, PHREAK BEWERKT : 18/10/88 ROP IN 'T KORT : E
HACKHP2.HAC [15991 bytes] --- bioc agent 003's tutorial in ===============
HACKING.DOX [38174 bytes] --- Filename = BBSFILES.DOC THE FOLLOWING FILES WERE DOWNLOADED BY ME IN ONE EVENING, USING AN IBM-PC AND MODEM. THEY WERE DOWNLOADED TO SHOW THE NATURE OF THE INFORMATION READILY AVAILABLE TO THE THOUSANDS
HACKING.TAP [5840 bytes] --- Ok I'm back up at 3 o'clock in the morning to bring you another article Many of us out there think of ourselves as hackers but what is a REAL hackerWell for those of you out there that play with c
HACKING.TXT [30670 bytes] --- Ctrl-S to Stop/Start Ctrl-C to Cancel Alliance Presents: 'TRW Information' File #5 By: Type A' Maniac Thanx: The Hacker Bonker
HACKINGA.TXT [5856 bytes] --- Hacking Bank Of America's
HACKINGC.TXT [4524 bytes] --- WELL LETS SEE HERE, MOST THINGS I HAVE SEEN HAVE 6-10 DIGITS RIGHT? YET CREDIT CARDS HAVE AROUND 20 DIGITS, WHY? WELL ITS NOT NECESSARY OF COURSE FOR A CREDIT CARD TO HAVE THAT MANY, BUT IT DOES! EACH CARD
HACKINGE.TXT [2881 bytes] --- HACKING ECONET SYSTEMS / SJ. FILESERVERS LEVEL 3 AND ABOVE 1987 - AGC Written by: Jack Death Concept: Zapper Greets to: WDG, Leck, Pay, HJR, JAS, Mr 'WooD', ZZKJ, SPODS Things to try on ECONET systems:
HACKINGI.TXT [759 bytes] --- About :COMPUTERWORLD AD. From :MARK HAMILL To :ALL Date :10/15/84 (NOTE, THIS IS A REAL AD. TRY IT!) FROM A COMPUTERWORLD AD: DEAR HACKERS: .WE AT MICROFRAME HAVE DEVELOPED A DEVICE TO KEEP YOU
HACKINGT.TXT [1311 bytes] --- HACKING THE LEXINGTON :- -: AIR FORCE COMPUTER I don't know much about it
HACKIN~1.HAC [3367 bytes] --- HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life Since I have always felt that Baton Rouge was at a loss for GOOD hackers, I have taken it upon myself to educate the masses on this
HACKIRC.TXT [14052 bytes] --- Hacking IRC - The Definitive Guide Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide what I consider opt
HACKNET.DOX [9243 bytes] --- The Novell Network Hacking Guide By PeRSeUs/LoRd psYChobeTa of EmC Hey what'z up ?!? When my computer science teacher put up his new toy in our class, novell network 3.x, i knew that i would hack this b
HACKNET.TXT [7950 bytes] --- Subj:How to Hack your school's network To:All interested hackers Keywords:Hacking, Novell, Network, Dumb Sysop Bitch Well, here it is. Information on how to hack your schools network. Many sysops of your
HACKPCP.HAC [8519 bytes] --- The Weenie Warriors Weenie Warrior # 1 - The Pa
HACKPROD.TXT [3110 bytes] --- þáGâþ þárotherhood of Gíds and âetardsþ 'How to Hack Prodigy' By Desolated Dream áGâúBL/´DEúNULLúTLHSúTLPSIIúKRONiCKúHcH Prodigy is one of the easiest things in the world to hack. all you do is call
HACKPROF.TXT [2276 bytes] --- HACKER PROOF DOORS! It is possible. There is a basic flaw in doors that RBBS doesn't cover. The RBBS program doesn't keep users from uploading '.BAT' files. Consider this: RBBS has three basic tests to g
HACKQUIZ.TXT [21324 bytes] --- TITLE: THE HACKER TEST - Version 1.0 (LONG) Preface: 06.16.89 This test was conceived and written by Felix Lee, John Hayes and Angela Thomas at the end of the spring semester, 1989. It has gone throug
HACKSONG.TXT [5632 bytes] --- The Hacker's Song By Dave Touretzky and Don Libes (with no apologies whatever to Monty Python) I'm a hacker and I'm OK I work all night and I sleep all day. I wrote some hacks in APL, each on a single
HACKSYND.HAC [7296 bytes] --- ++ ! ! ! The Hacker Syndrome ! ! =================== ! ! By Tad Deriso ! !
HACKTALK.TXT [10240 bytes] --- This article is being presented through the StarBoard Journal of the FlagShip/StarShip SIGs (Special Interest Groups) on De
HACKTERM.TXT [4314 bytes] --- [ HEaT ] [ HackroNyms V.2.10 ] [Page 1] [ By Rad Man ] A.A.A. - Aces of ANSi Art AMEX - AMerican EXpress ANI - Automatic Number Identification [security type ph. c
HACKTIPS.HAC [3392 bytes] --- Space aborts, ^S pauses ======= ======= ======= HACKING TIPS #2 ======= ======= ======= ======= by Hoe Hopper ======= ======= REBEL ALLIA
HACKTIPS.TXT [5625 bytes] --- From Lan Times, 08 Feb 1993 TIPS FOR TRACKING HACKERS Hackers will make mistakes or leave traces in four areas: 1. Inbound- While attempting to break into a network through a private branch exxchange (PB
HACKTUT.TXT [21105 bytes] --- Hacking Tutorial Courtesy of the Jolly Roger What is hacking? According to popular belief the term hacker and hacking was founded at mit it comes from the root of a hack writer,some
HACKUNLM.HU1 [144657 bytes] --- The Mickey Mouse Club Presents. _ _ _
HACKUSA!.HAC [7666 bytes] --- Filename: Hacking USA Hackin' USA I was in the 'fast lane' of computer hacking for about 3 or 4 years (more than enough) and am now semi-retired. It is now time to pass the torch to those with extra
HACKWARN.HAC [5735 bytes] --- ]=]=] A warning to hackers [=[=[ Recently, here in Cherry Hill, NJ, a BBS system by the name 'Hackers Heaven' was closed down by police. The sysop(s) and users of this system were trading pirated
HACKWWIV.HAC [7679 bytes] --- ( Hacking into WWIV, Second Edition by Vision (updated by Weasel) WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. However, good
HACKWWIV.TXT [12294 bytes] --- Hacking into WWIV, Second Edition by Vision WWIV, when unmodified and when not using external chains/protocols/programs, is essentially impregnable. How
HACK_CIS.TXT [13288 bytes] --- The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGyver 6-22-91 OUR
HACK_EM.HAC [26119 bytes] --- _ _ THE BASICS OF HACKING: INTRO _
HACK_S.TXT [13935 bytes] --- r112 (View: hackalot.dir 20 UPLOADED BY: U/L BY:LORD CALADON [CTRL-S PAUSES/SPACE=QUIT] %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % HARRY HACKALOT'S OFFICIAL HACKER
HACK_THS.TXT [148109 bytes] --- NORTHERN ILLINOIS UNIVERSITY THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE MASTER OF ARTS DEPARTMENT
HAIBM370.TXT [2420 bytes] --- How to take control of your local IBM VM/370 system Writt
HAKDIC.TXT [231108 bytes] --- The Hacker's Dictionary A Guide to the World of Computer Wizards Guy L. Steele Jr. Donald R. Woods Raphael A. Finkel Mark R. Crisp Richard M. Stallman Geoffrey S. Goodfellow The Menu There are many dictionarie
HAKMEDIA.TXT [1771 bytes] --- Hackers in the Media, List start: 10/28/92 - Doomsday. Sneakers, Fall '92 'mysterious crypto black box that deciphers anything' WarGames, Spring 1984(5?) Computer Whiz breaks into Norad, and nearly
HANDBOOK.TXT [20162 bytes] --- \ Hacking CompuServe: / \ All you need to know / \ By: / \
HASHISH.TXT [6146 bytes] --- HASHISH The Exotic Elixir By: Ezrider Welcome, Allow me to usher you into the den of tranquility. We shall utilize Hashish as our guide to exotic places. as the aroma fills your head, the sweet tingling is
HCKR_HND.TXT [138752 bytes] --- Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because of the reformatting,
HD.HAC [5732 bytes] --- Summary of Hacker Supreme's Hacki
HD01.HAC [16446 bytes] --- [ HACKERS DIRECTORY VOLUME #1 ] [ COMPLIED FOR YOU BY: HACKER SUPREME MEMBERS, ] [ NINJA SQUIRREL /+\, and LOGAN - 5 ] [ Hack Copyright: Hacker Supreme 1986 ] Chapter
HD02.HAC [13873 bytes] --- [ Hackers Directory volume 2 ] [ Complied for you by: ] [ Hacker Supreme, The Cartel ] [ and The 'NIN TEMPLE'. ] [ Ninja Squirrel /+\ . ] [ Logan - 5 . ] [
HD03.HAC [16634 bytes] --- [ HACKERS DIRECTORY VOLUME 3 ] [ COMPILED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL ] [ And THE 'NIN TEMPLE'. ] [ Master - NINJA SQUIRREL /+\ ] [ Hack Copyright: Hacker Supreme 19
HD04.HAC [11329 bytes] --- [ HACKERS DIRECTORY VOLUME 4 ] [ COMPLIED FOR YOU BY, ] [ HACKER SUPREME, THE CARTEL, ] [ And THE 'NIN TEMPLE'. (Elite) ] [ MASTER - NINJA SQUIRREL /+\ ] [ Hack Copyrigh
HHACKING.IIX [5504 bytes] --- - CAT-HACK - - VOL I - - FROM : - -/\/\/\/\/\- THE /\/\YSTERY %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% WELCOME TO CAT-HACK VOL I PREFACE: THIS IS THE OFFICIAL NEWS LETTER OF CAT HACKERS TH
HIS-HP.TXT [9320 bytes] --- A BOM SQUAD RELEASE / / The History Of \ \ Hacking Phreaking / \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ By Raven - Okay boys and
HOHO93CZ.HAC [13356 bytes] --- This file will appear in a future cDc publication. December, 1993 Loosely based on the Exploits of HoHoCon 1993. All experiences are relativ
HOMEBANK.HAC [6056 bytes] --- Hacking Bank Of America's
HOMEBANK.TXT [5863 bytes] --- Hacking Bank Of America's
HORROR_S.TOR [48939 bytes] --- HACKING HORROR STORIES These are the responses to my ARPANET post of 27 October 82. If reading any of the stories below inspires you to send your own, please do! I will continue to upd
HP20001.HAC [12800 bytes] --- == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20002.HAC [15744 bytes] --- == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20003.HAC [9344 bytes] --- == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20004.HAC [5376 bytes] --- == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP20005.HAC [5120 bytes] --- == BLITZIOD ?? GALACTUS == == of == == THE ELITE HACKERS GUILD ==
HP30.TXT [116232 bytes] --- This file was downloaded from: _ _ _ / /_/ _/ / _/\ \ /
HP3000.HAC [10319 bytes] --- % Ctrl-S Pauses/Space Quits % Uploaded By: [GALACTUS]=- }======================================= = = = hacking the hp 3000 =
HP3000.TXT [111310 bytes] --- [0;35m [0;35mTHE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE
HP3000G.HAC [112566 bytes] --- THE COMPLETE HEWLETT PACKARD 3000 HACKERS GUIDE Presented this 28 day of March 1900 and 91 by AXIS Writen and Compiled by Night's Shadow With Help from INSANE! (aka Flatl
HP3000_T.HAC [14354 bytes] --- No description yet
IBM370.HAC [2688 bytes] --- How to take control of your local IBM VM/370 system Writt
IBMHACK.HAC [2686 bytes] --- File: HACKING THE IBM - PART 1 Hacking the I.B.M. By John Doe Part I Preface: Yes, that's right. This series of articles will deal with how to hack the I.B.M. We're not talking abo
ICON4U.NRG [1810 bytes] --- ++ | ICoN HaCKiNG | Written By úäïäâGYú | | | WiTH LoSER ACCESS! | ++ Here is a way to hack school ICoN systems with a gene
ID-BIZ.TXT [2850 bytes] --- How to have a profitable ID business By: MR. Puff N' Stuff Original Inspiration by : The Walking Glitch WARNING THIS DOCUMENT IS FOR INFORMATIONAL AND EDUCATIONAL PURPOSES ONLY. THE AUTHOR TAKES NO RESPONI
IDENTITY.TXT [7309 bytes] --- How To Create A New Indentity By The Walking Glitch Courtesy of the Jolly Roger! You might be saying, 'Hey Glitch, what do I need a new identity for?' The answer is simple. You might w
IIRGACR8.TXT [79728 bytes] --- The Hackers Acronym Chart Created for The Hacking Community By: THE INTERNATIONAL INFORMATION RETRIEVAL GUILD Compiled by:The IIRG=- Input by: MERCENARY Version Eight [05/16/1993] Mercenary/IIRG 862 Fa
IIU-004.TXT [9041 bytes] --- phile #4 - IIU 1990 Hacking on the compuserve information service typed by darkness Ever wonder what the hell compuserve is? Ever wonder how to get into it? Ever wonder why the russians brought back john
ILLINET.TXT [20430 bytes] --- Dial Access to ILLINET Online Terminal Settings Up to 9600 Baud (auto-adjusts to caller's modem speed 300-9600 baud Parity EVEN Word length of 7 bits 1 stop bit Full Duplex (Echo On
INET2000.TXT [3703 bytes] --- The [RoT]=- Introduction to Hacking The iNET 2000 Online Service )()()()()()()()()()()()() Written by Deicide on 04/05/93 INTRODUCTION iNet 2000, or as marketing people like to call it 'the intelligence
INFO3.GPH [4352 bytes] --- ++ ! HOW TO GET ANYTHING ON ANYBODY ! ! PART III ! ! ! ! MORE INFO-GATHERING. ! +-
INFOAM.TXT [51393 bytes] --- Exploring Information-Ameri
INFORMER.HAC [17320 bytes] --- TRI : The Remote Info
INNERC.TXT [15295 bytes] --- BLINDMAN'S BLUFF, HACKER STYLE From, Out of the Inner Circle, by Bill Landreth. THE SCENE: The control room in the computer center of one of the largest corporations in the world - an automobile manufac
INNERCIR.HAC [9856 bytes] --- HACKING TECHNIQUES Typed By: LOGAN-5 (Hacker Supreme) From the Inner Circle Book ) C
INTERCEP.HAC [10746 bytes] --- THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US Army) working in t
INTERCPT.TXT [23219 bytes] --- The High Tech Hoods Presents. PAGER, FAX, AND DATA INTERCEPT TECHNIQUES
INTERNET.HAC [49024 bytes] --- No description yet
INTTEL.HAC [1728 bytes] --- European Computers % % % % list #1 as compiled by % % % % Kerrang Khan % % % %%%%%%%%%%%%%%%%%%%%%%%
IPD.HAC [2004 bytes] --- Countries connected to the International Packet Switching Stream ++ ++
IPHIJACK.TXT [46396 bytes] --- Simple Active Attack Against TCP Laurent Joncheray Merit Network, Inc. 4251 Plymouth Road, Suite C Ann Arbor, MI 48105, USA Phone: +1 (313) 936 2065 Fax: +1 (313) 747 3185 E-mail: lpj@merit.edu Abstract This p
IRCHACK.HAC [14381 bytes] --- Submitted by: Weasel Here is a something about hacking irc. If you like it put it if not then don't. I think you'll like it though.Good page by the way. Very nice. Nice layout and everything. i think y
ISSM201.HAC [32229 bytes] --- The Information Systems Security Monitor
ISSM202.HAC [52667 bytes] --- The Information Systems Security Monitor
ISSM204.HAC [28850 bytes] --- Information Systems
ISSM301.HAC [24356 bytes] --- Information Systems
ISSM302.HAC [23394 bytes] --- Story #1 Volume 3 Number 2 April 1993 Story #2 In This Issue NLM Anti-Virus Review Team Virus Alert Retrac
ISSM303.HAC [22981 bytes] --- Information Systems
ISSM304.HAC [30656 bytes] --- Information Systems
JARGON~1.HAC [1147413 bytes] --- #========= THIS IS THE JARGON FILE, VERSION 2.9.11, 01 JAN 1993 =========# This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, a
JAVABUGS.TXT [5767 bytes] --- JAVASCRIPT PROBLEMS I'VE DISCOVERED These have all been reported back to Netscape. The press had a spotty record of reporting correctly on this. I've prepared a small report on the stories I've seen. I'm
JAVAINSE.TXT [2607 bytes] --- X-Digest: RISKS DIGEST 17.77 Subject: Java security problems Date: Sun, 18 Feb 1996 23:57:02 -0500 We have discovered a serious security problem with Netscape Navigator's 2.0 Java implementation. (The pr
JUL93BLT.TXT [16431 bytes] --- CSL BULLETIN July 1993 CONNECTING TO THE INTERNET: SECURITY CONSIDERATIONS This bulletin focuses on security considerations for organizations considering Internet connections. Spurred by developments in
KFYI-593.HAC [91136 bytes] --- kfyi-593.pt Kim Kommando Show 5-22-93 Segment One Cast of Speakers: KK: Kim Kommando MR: Mind Rape MY: Mercury B : Bruce : Any caller A : Announcer Intro Music. A : And now another hour of Arizona's most exc
KNOW.TXT [6193 bytes] --- HOW I KNEW WHEN I WAS HA
LDD.TXT [12237 bytes] --- How to Hack into CIS 3 = Amex 4 = Visa 5 = Mastercharge For How to Make CC#'s For a VISA: Make the First 4#'s 4019 or 4128 and the last number 0012 like: 4019 0190 1450 0012 4128 0190 1450 0012 4128 4010 1450
LICENSE.ASC [58618 bytes] --- Guerilla Guide to Licensing Software DRAFT VERSION 0.1 Abstract This short article discusses the weaknesses of various licensing schemes to control the use and distribution of Unix software. In particular
LNOISE.HAC [6020 bytes] --- Modem Noise Killer (alpha version) With this circuit diagram, some basic tools including a soldering iron, and four or five components from Radio Shack, you should be able to cut the noise/garbage that a
LODHBASI.HAC [42609 bytes] --- The LOD/H Presents
LOGONCBI.HAC [3235 bytes] --- .hac N I Z A T I O N P R E S E N T S XXXXXXXXXXXX XXXXXXXXXXXX XX XXXX XX XX XXXX XX XXX XX XXX XXX XX XXX XXXX XXXX XXXX XXXX XXX XX XXX XXX XX XXX XX XX
LOGONCBI.TXT [2949 bytes] --- T H E X O R G A N I Z A T I O N P R E S E N T S 'HOW TO LOGIN TO A C.B.I. SYSTEM' WRITTEN BY: L.E. PIRATE THANKS TO: ZANGIN The following is the login procedure to login to a C.B.I. system, a few
LONGPASS.TXT [14916 bytes] --- Longer Passwords On Password Security Dr. (Bob) Wallis, recently commented on having faster implementations of DES available and suggested using a site dependant number of iterations of the DES algorithm
MAILBOX.HAC [3368 bytes] --- Mailbox Systems Mailbox systems are the link between information and the underworld. If you have ever called one, then you will know the advantages of having one, especially the ones that are open to wh
MAIN.FRA [6763 bytes] --- = =- MAIN FRAMES =- =- THE PIRATE CLUB/1200 = AMERI
MCI.TXT [2020 bytes] --- 25 - - - MCI Mail Access Numbers - - - - Courtesy Of - - The Swamp - - (414)-353-8369
MCIMAIL.HAC [7772 bytes] --- File: HACKING MCI MAIL Read 25 times - = = - MCI MAIL: The Adventure Continues - = [2600 Ju
MCISPRIN.T [5278 bytes] --- HINTS ON HACKING- : : : : SPRINT,MCI,TELENET NUMBERS : :
MCIACC.TXT --- MCI NUMBERS 216-375-9040 AKRON, OH 518-462-2068 ALBANY, NY 215-433-2166 ALLENTOWN, PA 313-662-2041 ANN ARBOR, MI 404-525-0714 ATLANTA, GA 512-474-4397 AUSTIN, TX 805-395-0123 BAKERSFIELD, CA 301-995-30
MGTGUIDE.TXT [24448 bytes] --- Management Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST), is responsible for developing stand
MICKEYD.TXT [5145 bytes] --- P TO PAUSE S TO STOP
MICRRISK.HAC [63479 bytes] --- No description yet
MILINET.1 [5564 bytes] --- 3. (0) NOSC-CC, (2) LOGICON, (3) NPRDC 8. (0) NRL, (1) NRL-AIC, (3) NRL-TOPS10, (6) NRL-ARCTAN, (7) NRL-CSS 13. (1) GUNTER-ADAM, (2) GUNTER-TAC 14. (0) CMU-CS-B 16. (0) AMES-TSS, (1) AMES-TAC, (2) AM
MILNET.TXT [36799 bytes] --- @BEGIN_FILE_ID.DIZ /\ _ / U \/ _ / / ? \ \\ / \/ How to use the American Military Net @END_FILE_ID.DIZ FEATURES OF THE TAC ACCESS CONTROL SYSTEM (TACACS) To log in to the
MILNET1.HAC [7765 bytes] --- Finally it's here
MISM1.HAC [11776 bytes] --- How to get anything on anyone Part 1By Toxic Tunic
MISM10.HAC [2944 bytes] --- (taken from the book How To Get ANYTHING ON ANYBODY) By Lee Lapinrewritten by Woman Watcher for P-80- )
MISM20.HAC [3840 bytes] --- MASTERING THE
MISM42.HAC [1024 bytes] --- Atlantis BBS 215/844-8836 (Private)
MOB.TXT [8954 bytes] --- The THC Hack/Phreak Archives: MOB.TXT (176 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong to the authors. S
MODBOOK1.TXT [3585 bytes] --- No description yet
MODBOOK2.TXT [4182 bytes] --- No description yet
MODBOOK3.TXT [4522 bytes] --- No description yet
MODBOOK4.TXT [2787 bytes] --- No description yet
MODBOOK5.TXT [5199 bytes] --- No description yet
MORALITY.HAC [2654 bytes] --- File: HACKER MORALITY Read 33 times A lesson in phreaking and hacking morality: I find it truly discouraging when people, intelligent people seeking intellectual challenges, must revert to becoming common
MORESTUF.TXT [18930 bytes] --- Feature Sections - Menu : : [1].Krakowicz's Kracking Korner [2].Software Documentation [3].Software Documentation Vol.2 [4].Telecommunications Info [5].
MORPRIME.HAC [10579 bytes] --- RVEC Parameters and DMSTK Format A Telecom Computer Security Bulletin File _
MRSTS.HAC [5504 bytes] --- THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided that you'd li
MTEMPIST.HAC [10752 bytes] --- THE TEMPEST METHOD OF COMPUTER DATA INTERCEPTION! Let me begin by a brief history of myself. I spent the better part of six years in Uncle Sam's Country Club (better known as the US Army) working in t
NETWORKS.PHK [5522 bytes] --- File: Inter-Net Mail Help ANOTHER TELECOMMUNICATIONS PHILE FROM THE ARCHIVES OF THE PRIVATE SECTOR BBS (201) 366-4431, OFFICIAL B
NEUROMAN.PWD [3225 bytes] --- courtesy of diachun@autarch.acsu.buffalo.edu Here is a list of DataBases and passwords for NEUROMANCER. Password notation: 1) = level one passwd 2) = level two passwd [coded passwd]-decoded passwd Zon
NEWID.HAC [6543 bytes] --- New Identity Method 'A': A How-to ManualBrought to you by SSB G-files, Inc. 1) Go to a cemetary, the baby section. Find a baby who has lived for less than 1 day (his birthdate and deathdate must be
NEXTBUGS.TXT [7878 bytes] --- CA-90:06 CERT Advisory October 2, 1990 NeXT's System Software This message is to alert administrators of NeXT Computers of four potentially serious security problems. The information
NFS_TR~1.TXT [35713 bytes] --- NFS Tracing By Passive Network Monitoring Matt Blaze Department of Computer Science Princeton University mab@cs.princeton.edu ABSTRACT Traces of filesystem activity have proven to be useful for a wide var
NOTE9309.TXT [1984 bytes] --- || The Hack Report || Notes on the for September, 1993 || September 1993 Issue || As most of you will realize, this month's issue was late again. It seems that every time
NOVELL.HAC [10516 bytes] --- Date and Time: 09-26-1992 at 03:21:58 Originated By: Brett Warthen (BRETT @ INFINIE) There have been some discussions on various mailing lists over the past couple of weeks regarding security holes in N
NOVHACK.TXT [9096 bytes] --- Having Phun With Novell Brought 2 U by: Lord Foul/Decay 13th July
OCFBER.1 [1394 bytes] --- [Note: OCF is the Open Computing Facility at UC Berkeley.] Bylaws of the OCF. 1. The General Manager and the Site Managers cannot appoint directors except when the OCF is not in session and the B
OCFBER.2 [14491 bytes] --- [Note: OCF is the Open Computing Facility at UC Berkeley.] The OCF Constitution As ratified or amended by votes of the OCF membership: 3 February 1989 Preamble We, the computer using community of the Berke
ORANGE.TXT [319321 bytes] --- orange-boot.txt: No such file or directory % cat orange.boo orange.boo: No such file or directory % cat orange-book.txt CSC-STD-001-83 Library No. S225,711 DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALU
ORGS.HAC [8464 bytes] --- COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a message to the Sysop.
ORGS.TXT [8320 bytes] --- COMPUTER SECURITY ORGANIZATIONS NOTE - This list was developed in 1988, if you know of any other computer security organizations or modifications to the ones listed, please leave a message to the Sysop.
OUTDIAL.LST [12887 bytes] --- Eastern Western Net Runner Overdose The Knight .
OUTDIA~1.HAC [2652 bytes] --- npa ip address instructions 218 aa28.d.umn.edu~ type 'cli' then 'rlogin modem' then 'modem 129.72.1.59~
PACBELL.LST [3096 bytes] --- Pacific Bell Computer Systems Telephone Numbers For Pactime-A Computers (Logon instructions are at the end) AREA TERMINAL TEL NUMBER TEL NUMBER Los Angeles 300 BPS
PACNET.HAC [5300 bytes] --- PACNET AND KEEPING IN TOUCHInformation on connectionTo help with phreaking into the Pacnet system, the following information is offered for your use.Pacnet is a network that lets you talk to online
PACTIMEA.TXT [2811 bytes] --- Pacific Bell Computer Systems Brought to you by Another Hacker (^) The Elite Phreaker's Group (^) Telephone Numbers For Pactime-A Computer (Logon instructions are at the end) AREA TERMINAL TEL
PASSHACK.TXT [7070 bytes] --- The THC Hack/Phreak Archives: PASSHACK.FXR (157 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong to the author
PCHACK.TXT [32975 bytes] --- ==== The PC Hacking FAQ ==== Version 2.0 7/10/96 Written By Olcay Cirit, olcay@libtech.com DISCLAIMER: The author of this text disclaims all liability whatsoever
PCPHACK.PHK [9552 bytes] --- The Weenie Warriors Weenie Warrior # 1 - The Pa
PCPHACK.TXT [9537 bytes] --- The THC Hack/Phreak Archives: PCPHACK.TXT (245 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong to the authors
PCPOLD.PHK [7814 bytes] --- How to Use Telenet's PC Pursuit Service |_ |_ _ (View: pc pursuit phreakin/f/ove
PCPURSUE.TXT [238362 bytes] --- PcPursuit Outdia
PCPURSUI.YES [15104 bytes] --- PC PURSUIT AND TELENET LOCAL ACCESS NUMBERS FOR THE MOST UP-TO-DATE LISTING OF THE PC PURSUIT U.S. ACCESS TELEPHONE NUMBERS, DO THE FOLLOWING: 1. USE A MODEM TO DIAL 1-800-424-9494 WITH PARAMETERS SET AT
PDP11.HAC [1920 bytes] --- Pdp-11 Basic plus pr
PENTAGON.TXT [7534 bytes] --- Finally it's here
PH.TXT [30181 bytes] --- P-Hack Documentation Page 1 | P-Hack 1.0 Documentation. | Hello everyone, and thanks for trying P-Hack. I think that all you SERIOUS phreaks out there will find this as usefull and great as I think it i
PHONECOM.NFO [3304 bytes] --- Becoming More Informed. It was Sunday, January 19th, 1992. I was sorting through the local News Journal Paper and I discovered an article of interest in the local section. 'Hackers don't leave calling
PRIME.HAC [21725 bytes] --- help HELP command-name to get information on that command $$ Stores batch job submittal options inside command file Command file comment lines ABB
PRIMECPL.HAC [12018 bytes] --- _ An Introduction to PRIMOS CPL Directives Written by Necrovore A Telecom Computer Security Bulletin File _
PRIMOS.HAC [3968 bytes] --- FULL INFORMATION ON THIS TYPE OF SYSTEM. THE FOLLOWING NOTATION WILL BE USED CR CARRIAGE RETURN, RETURN OR ENTER (CHR$(13)) ^ A CONTROL CHARACTER LIKE ^C (BREAK, RUN STOP, OR CHR$(3)) HOW TO TE L
PW-HACK.TXT [5432 bytes] --- HIT Inc. Presents ® The Art of Password Hacking! ¯ PASSWORD HACKING: A FOREWORD Password hacking is one of the major parts of hacking. At one time or another, you will have to g
RAMCOMM.HAC [185184 bytes] --- This number was posted on The V0iD (482-6356) by Redline, and I figured it was worth a try to mess around with it. RAM Communications is a paging system run off a side channel of WZOU (94.5 FM). I tri
RAMPART1.HAC [8448 bytes] --- !!WHACKOLAND!WHACKOLAND!! W W H - HACKING RAMPART - H A SYSTEMS PT. I A C C K INTRODUCTION K O
RAMPART2.HAC [4864 bytes] --- !WHACKOLAND!WHACKOLAND! W HACKING RAMPART W H SYSTEMS H A A C PART II. C K K O IN DE
RCAGLOBE.TXT [3494 bytes] --- 13 (CTRL-S STOP/START SPACE TO EXIT) THE WASTELANDS (216)-442-5432 THE RCA NETWORK:PART I BY THE TELEX TROOPERS THE RCA NETWORK IS A SERVICE PROVIDED TO MANY COMPANIES FOR THEIR@TELEX, AND TELEGRAM NEEDS.
REVBLT.HAC [13726 bytes] --- NCSL BULLETIN OCTOBER, 1990 REVIEW OF FEDERAL AGENCY COMPUTER SECURITY AND PRIVACY PLANS (CSPP): A SUMMARY REPORT Sensitive information and information resources have become increasingly important to the
RIMEMAN.HAC [52781 bytes] --- RIME USERS GUIDE INTRODUCTION This manual deals with how you, as a user, can realize the most from the RIME network. It was written in response to your requests and will hopefully answer your questions o
RIPCO.TXT [13184 bytes] --- DR. RIPCO SEIZURE COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. On May 8, 1990, Agents of the United States Secret Service, along with police and telephone company security personnel execu
RISKS.TXT [6181 bytes] --- The text comes from a data file written by and for IC members. HACK YOUR OWN CODES. Don't leech from someone else. Having codes is like having sex, if you don't protect yourself you'll end up with a ven
RISKTOOL.HAC [33991 bytes] --- RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW The National Institute of Standards and Technology (NIST) and the National Computer Security Center (NCSC) have cooperatively established a Risk Management Re
ROWDY_DL.MAN [63720 bytes] --- MANUAL TO VERSION 1.1 OF THE ROWDY DIALER (By RowdyB) 1st Release: April '93 Please don't hesitate to bother me at either: at073@cleveland.freenet.edu or: RowdyB@utopia.hacktic.nl for bug reports, comments,
RSPWD.NEW [23723 bytes] --- root: password = H0iJKNsCCsiuk lastupdate = 726979743 flags = daemon: password = bin: password = sys: password = adm: password = uucp: password = guest: password = nobody: password = lpd: passw
RSTS.HAC [5376 bytes] --- THIS FILE WAS ORIGINALLY POSTED ON OSUNY (914)428-7216,UNLESS OTHERWISE NOTED. SUFFICIENT CREDIT SHOULD BE GIVEN TOOSUNY WHEN POSTING THIS FILE ON OTHER SYSTEMS! So, you've decided that you'd li
RSTS1.HAC [6778 bytes] --- ShadowSpawn BBS Presents. HACKING THE RSTS/E SYSTEM \\\ \\\ \\\ \\\ VOLUME I
RSTS2.HAC [4516 bytes] --- ShadowSpawn BBS Presents. INSIDE RSTS/E VOL. II INSIDE RSTS/E by: THE MARAUDER THE COUNCIL OF THE FEDERATION In this volume, i will discuss some of the basic bugs in RSTS/E that can be used to your adv
RSTS3.HAC [8829 bytes] --- ShadowSpawn BBS Presents. INSIDE RSTS/E VOLUME III BY: THE MARAUDER THE COUNCIL OF THE FEDERATION The information in this document is intended for informational purposes only COPYRIGHT (C) - SEPTEMBER 1
RSTS4.HAC [11880 bytes] --- ShadowSpawn BBS Presents INSIDE RSTS/E VOLUME IV By: The Marauder The Legion of Hackers ! The information in this document is intended for informational purposes only Written - December 11, 1984. Zone
RSTS_OZ.HAC [14028 bytes] --- :-: : : : M A K I N G T H E M O S T O F : :
RSX11.HAC [18944 bytes] --- )_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
RSX11M.TXT [18755 bytes] --- )_/: RSX11M Version 3.X Real Time Operating System :\_( [: An Introduction :] Written By: % Terminus Lord Digital %=- [%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%-%
RUHACKER.TXT [1501 bytes] --- Are You a Hacker? by ReDragon Take a little quiz for me today. Tell me if you fit this description. You got your net account several months ago. You have been surfing the net, and you laugh at those me
SANATM~1.HAC [6179 bytes] --- 12/25/90 | | | = Town Criers Posting Board ==- | |
SATELIT3.TXT [17718 bytes] --- SATELLITE SCRAMBLING SYSTEMS THE TRUTH FILMNET VIDEO: Satpac - AUDIO: Digital By XL This is a very simple system to hack video wise. All that Filmnet do is to remove the s
SATELITE.TXT [3636 bytes] --- :Satelite Frequencies:=- Edited and Compiled by: Sir Francis Drake The 135-138 MHz rang is know as the satelite band as most satelites broadcast here. However there are exceptions. Frequency (MHz)
SCA-AAA.TXT [9957 bytes] --- AAA - ACCESS ALL AREAS Computer Security Hacking Conference 1st - 2nd July, 1995 (Saturday Sunday) King's College, London, UK Written by Scavenger sca@advantage.co.za In march 1995 I got some informa
SCANPRG.TXT [5542 bytes] --- TES Presents | What To Look For In A Code Hacking Program | written by Dissident Phreaking's getting tricky these days, ain't it? Ok, there are two groups of things a code hacker should have, the necessiti
SECRETS2.HAC [7733 bytes] --- Big Secrets.Volume #2 % %_% % % % By - The
SECRETS3.HAC [4250 bytes] --- - Big Secrets No. 3 - By The Wyvern = Preface = You, volume 3 is here!!! Guess what we'll be talking about in volume 3? Well he
SECRET~1.HAC [233082 bytes] --- I N T R O D U C T I O N January 1990 One day, while raiding my parents attic, I came across some old books we had enjoyed as children. 'YOUNG'S DEMONSTRATIVE TRANSLATION OF SCIENTIFIC SECRETS' being on
SECURDEV.TXT [8616 bytes] --- Technical Hacking
SECURITY.FY8 [259023 bytes] --- Network Working Group P. Holbrook Request for Comments: 1244 CICNet FYI: 8
SECURITY.TXT [6184 bytes] --- / \ P R O F E S S O R F A L K E N ' S / /
SEQUENCE.TXT [22931 bytes] --- Sequence Number Attacks By Rik Farrow Kevin Mitnick's alleged attack on Tsutomu Shimomura's Computers used a vulnerability in TCP/IP and mistaken trust. Questions regarding this article should be directed
SHA.HAC [83219 bytes] --- No description yet
SHADEC.TXT [14173 bytes] --- THE USE OF A DECSERVER DOCUMENTATION BY THE CHIEF FOR SWEDISH HACKERS ASSOCIATION S.H.A. AND I.H.A. FILE #7 FEBRUARY 1990 x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/x/ LOGGING INTO TH
SHAHEWL.TXT [3723 bytes] --- Swedish Hacking Association presents Hacking Hewlett Packard series 3000 computers Part one Written by Mr Big Copyright (c) 1990 by Swedish Hacking Association This file will help you
SHAPROT3.TXT [91074 bytes] --- SWEDISH HACKERS ASSOCIATION PRESENTS 1990 THE 3rd PROTOCOL 1990 EDITORS : LIXOM BAH : MR BIG : PHEARLESS : THE CHIEF
SHW0293.ASC [8632 bytes] --- Syndicated Hack Watch Column 02-93 (March 93) Title: Red Hot Dutch To Be Banned? This royal throne of kings, this scepter'd isle, This earth of majesty, this seat of Mars, This other Eden, demi-paradise, T
SHW0394.ASC [9472 bytes] --- Syndicated Hack Watch - 03:1994 - -
SHW0494.ASC [12408 bytes] --- Syndicated Hack Watch - 04:1994 - -
SHW0593.ASC [6667 bytes] --- Red Hot Television Is Banned In a debacle that mirrors the 'Spycatcher' case of a few years ago, Red Hot Television's attempt at stopping the UK Heritage Secretary's proscription order coming
SHW0893.ASC [12544 bytes] --- Syndicated Hack Watch 08:93 The Start Of The War Sky had suffered its most devastating hack to date. Its security was demolished and the MultiChannels package was about to be introduced. They
SHW0993.ASC [8955 bytes] --- Syndicated Hack Watch - 09:1993 - -
SHW0994.BBS [12097 bytes] --- Syndicated Hack Watch - 09:1994 - -
SHW1093.ASC [10974 bytes] --- Syndicated Hack Watch - 10:1993 - -
SKEY.TXT [11048 bytes] --- Description of The S/KEY One-Time Password System Neil M. Haller nmh@thumper.bellcore.com Philip R. Karn karn@chicago.qualcomm.com ABSTRACT The S/KEY one-time password system provides authentication o
SKEYFL.TXT [11419 bytes] --- VULNERABILITIES IN THE S/KEY ONE TIME PASSWORD SYSTEM Author: Mudge _ This may be redistributed as long as proper credit is maintained. In o
SNOOP.TXT [4065 bytes] --- Abstruse Authors of Merca Presents Data Snooping : the Right Way
SSAN.HAC [4738 bytes] --- SUBJECT: The Social Security Number SSA has continually emphasized the fact that the SSN identifies a particular record only and the Social Security Card indicates the person whose record is identified b
SSN-STUF.TXT [19840 bytes] --- From ucdavis!ucbvax!RED.RUTGERS.EDU!AWalker Fri Nov 13 18:33:17 PST 1987 Article 136 of misc.security: From: AWalker@RED.RUTGERS.EDU ( Hobbit ) Subject: Yet more about SS numbers Date: 11 Nov 87 08:42:20
SSNUM.ANA [1791 bytes] --- File: ABOUT SS NUMBERS Read 13 times OFTEN MANY OF YOU MAY BE IN A POSITION OF NEEDING TO DO AN INFORMATION SEARCH ON AN INDIVIDUAL. IT IS SOMTIME A BIG HELP TO KNOW WHERE SOMEONE ORIGONALY CAME FROM, IN
STARMAST.TXT [12657 bytes] --- The Reign of Terror RoT guide to HACKING THE GANDALF STARMASTER (also known as PACX or Access Server) written by Deicide 05/22/93 INTRODUCTION This entire tphile is based on my knowledge and
STUPIDKI.HAC [4942 bytes] --- DURING THE PAST EIGHT YEARS, I HAVE BEEN HEAVILY INVOLVED WITH 'BULLETIN BOARD' SYSTEMS RUNNING ON MICROS AND MAINFRAMES. I'D LIKE TO GIVE A FEW EXAMPLES OF THE DESTRUCTIVENESS OF MANY OF THESE 'KIDS.' M
SUN413.TXT [31595 bytes] --- From tmk@uhunix.uhcc.Hawaii.Edu Thu Jun 30 08:54:17 EDT 1994 Subject: How to improve security on a newly installed SunOS 4.1.3 system. Summary: How to improve security on a newly installed SunOS 4.1.3
SUPERD.TXT [5112 bytes] --- No description yet
SYS75.HAC [9410 bytes] --- The Complete Guide to Definity G Series Systems AKA System 75 - 85 Written by: Scott Simpson June 18, 1992 Greets to: Invalid Media, The Missing Link, Randy Hacker, Dark Druid, Nickodemus, Mercury, Reneg
TAM.TXT --- Texas AM Network Security Package Overview 7/1/93 Dave Safford Doug Schales Dave Hess ABSTRACT: Last August, Texas AM University UNIX computers came under extensive attack from a coordinated group of inter
TCSB.03 [29427 bytes] --- _ ItaPac - A Brief Introduction Written by Blade Runner on 08/11/88 A Telecom Computer Security Bulletin File
TCSB.04 [11790 bytes] --- _ An Introduction to PRIMOS CPL Directives Written by Necrovore on 09/02/88 (Revised on 09/10/88) A Telecom Computer Security
TCSB.05 [30972 bytes] --- _ An Introduction to Packet Switched Networks Part I Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulletin
TCSB.06 [27636 bytes] --- _ An Introduction to Packet Switched Networks Part II Written by Blade Runner on 08/20/88 A Telecom Computer Security Bulleti
TCSB.08 [4370 bytes] --- _ Your Personal Phone Security Written By King Lucifer (Alias Byteman) on 8/10/88 A Telecom Computer Security Bulletin File
TCSB.11 [8938 bytes] --- _ DEC Terminal Server Basics Written by Mad Hacker {the original} on 09/10/88 A Telecom Computer Security Bulletin File Volume
TCSB.12 [3370 bytes] --- _ Expansion of the Z80 CPU Chip Written by King Lucifer (Alias Byteman) on 9/10/88 A Telecom Computer Security Bulletin File V
TECHHACK.HAC [8368 bytes] --- A Guide To: Systems.
TECHNICL.TXT [9809 bytes] --- No description yet
TELE3.TXT [8229 bytes] --- TELENET SCANNING
TELE5.HAC [6492 bytes] --- [ ==-HACKING TELENET=] by:- The Flash Uploaded by Elric of Imrryr For Those Who Like Living Dangerously: These are Telenet access codes. Telenet is a system by which one can access almost
TELECODE.TXT [24857 bytes] --- TELENET CODES 5/01/88 HACKED OUT BY !ZORON! ABBREVIATION LIST ^ = CNTRL UNK = UNKNOWN C.B. = CITIBANK C/C/M = CITICORP MANAGER REF = REFUSED COLLECT CALL @ CONNECTION | CONNEC
TELECOMM.TXT [2271 bytes] --- An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Some basic info about T
TELEINFO.TXT [6496 bytes] --- r74 Display what file? pr_ _ \/ Tommy's Holiday Camp +1 604 598-4259 \/ Tommy's You're in System Hacking Philes [-Files-][?][Q][ t Display what file? teleneth.t
TELENET.HAC [10465 bytes] --- Telenet The Secret Exposed. For years, people and myself, have offtend tried to'work telenet unto a coma' With no success, for the past few years, i have gathered data, and finally know the system, i
TELENET.TXT [2732 bytes] --- File: TELENET DIRECTORY ( TELENET DIRECTORY ) C 20120-VM 370 ONLINE C 20124 C 20125-NJIT EIES C 20130 C 20133 C 20138 C 20148 C 20154 C 20165
TELENET2.TXT [24259 bytes] --- TELENET INFORMATION Command: 2 ==)- P TO PAUSE S TO STOP -(== 'TELENET TERMINAL IDENTIFIERS' THIS IS A LIST OF THE TERMINAL IDENTIFIERS FOR TELENET AND THE SYSTEM TYPES THEY REPRESENT. REMEMBER WH
TELENETH.TXT [2203 bytes] --- An Introductory Guide To TeleNet Commands I don't know how many of you use TeleNet to call this system (or other systems) but I thought this might come in handy for those that do. Some basic info about T
TELENETI.PHK [2720 bytes] --- Here are instructions for using TELENET. There are some very basic things, which most people already know, and some other things, which even the most dedicated hackers have probably never even heard of
TELLERMA.TXT [1982 bytes] --- CRACKINGAUTOBANKTELLER MACHINES Downloaded by the Suspect Most auto teller machines require an ID card to retrieve money. The circuit ry inside the machines has been made mo re sophisticated year after ye
TELNETSN.TXT [8803 bytes] --- TELENET SCANNING
TELTERMZ.TXT [13604 bytes] --- Terminal Identifiers The following tables matches Terminal numerical IDs (telenet parmater 23) Generic and Specific Terminal Identifiers. ID # Generic Term ID Terminal Type (note) -
TEMPEST.HAC [5122 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo frm 'the threat of information theft by reception of electromagnetic radiation from rs-232 cables.' computers and security, 9(1990) 53-58 (factors
THUGLAN1.HAC [16453 bytes] --- Introduction to Hacking into LANs
THUGLAN1.TXT [16453 bytes] --- Introduction to Hacking into LANs
THUGLAN2.TXT [10483 bytes] --- General Information on LANs (Topologies, Etc.)
TIMENET.TXT [5434 bytes] --- The THC Hack/Phreak Archives: TIMENET.TXT (170 lines) Note: I did not write any of these textfiles. They are being posted from the archive as a public service only - any copyrights belong to the authors
TNET1.TXT [21888 bytes] --- Tymnet File #1 Courtesy of -:The Twilight Phone:- TYMNET INFORMATION SERVICE Welcome to TYMNET's Information Service! TYMNET is the world's largest Public Data Network, w
TNET2.TXT [16896 bytes] --- Tymnet File #2 Courtesy of -:The Twilight Phone:- TYPE THE NUMBER OF THE DESIRED MENU ITEN FOLLOWED BY A CARRIAGE RETURN:1 COMPANIES PROVIDING DATA BASE OR TIMESHAR
TNET3.TXT [14592 bytes] --- Tymnet File #3 Courtesy of the -:Twilight Phone:- COMMUNICATION PRODUCTS VERIFIED BY TYMNET TYMNET is the 'PC Friendly Network.' To make it easier for you to use
TOPS20.TXT [7075 bytes] --- Notes On Tops-20 Systems by The Blue Archer and The Legion of Hackers! Notes in brackets require the brackets.(2) This is just a basic overlay of the tops-20(Dec-20) And it's commands since most of these
TRANSDIR.TXT [14377 bytes] --- The Legion of Doom/Legion
TRASH.TXT [5888 bytes] --- DUMPSTER DIVING COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED. In light of the recent debates regarding the various activities of the ``hacking community and it various methods of collect
TRASHING.ROT [18277 bytes] --- Reign of Terror [ R o T ] presents. the art of TRASHING a how to guide for one of the most useful tools in hacking today Written by: Deicide /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
TRIAD187.HAC [19927 bytes] --- The Triad A 3-In-1 Text File Magazine .'Concepts to Educate the Educated'. Volume 1, Issue 1 November Issue, 1987 Chapter 1: Introduction to The Triad (Its purpose and Goals) Chapter 2: Tips On Be
TTYSPOOF.TXT [7786 bytes] --- TTY SPOOFING by SubEthan I know what you are going to say. 'THAT WAS ALREADY COVERED BY VAXBUSTER IN PHRACK-41!' Yeah, I know, but if you would shut your mouth for long enough and pay attention you migh
TYMENET.HAC [20577 bytes] --- TYMNET TECHNICAL AND USER DOCUMENTATION Tymnet provides for our customer use technical and user documentation. This directory lists the documentation available along with a brief description. The
TYMNET.TXT [205145 bytes] --- PACKET NETWORKS I written and compiled BY THE DIGITAL-DEMON (C) DEC. 29, 1990 Wel
TYMNET96.TXT [17283 bytes] --- March 11, 1994 BT-GNS TYMDIAL 9.6 WORLDWIDE ACCESS DIALUP ACCESS M PROV 100'S BPS N NODE CITY ST CNTRY DENS 3 12 24 96 ACCESS NO. P COMMENTS -
TYM_ODS.TXT [20850 bytes] --- +-TymNet OutDials Sorted By Area Code+-Page 1-+ :NPA ST OUTDIAL CITY :NPA ST OUTDIAL CITY : ++
UKGUIDE.HAC [13693 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo The Guide to Online Databases For U.K. Users ( ) denotes UK Users have special benefits Prestel. Time charge 7p/min 0800-1800 Mon-Sat 1p
UNINETA.PHK [7049 bytes] --- THE SOUTH POLE[312] 677-7140 - U N I N E T - THIS IS THE 5TH OPTION - ALONG WITH TELENET, TYMNET, SOURCENET, AND STC'S WATS LINES - IN TYING YOUR PERSONAL
UNIXWRAP.TXT [25638 bytes] --- TCP WRAPPER Network monitoring, access control, and booby traps. Wietse Venema Mathematics and Computing Science Eindhoven University of Technology The Netherlands wietse@wzv.win.tue.nl Abstract This paper pre
USENETHI.TXT [4277 bytes] --- Advanced Usenet Hi-jinks - To specifically cancel someone else's article, you need its message-ID. Your message headers, in addition to what's already there, should also contai
USRGUIDE.TXT [16128 bytes] --- Computer User's Guide to the Protection of Information Resources National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is responsible or developing st
VENDORS.HAC [55184 bytes] --- Security Vendors This list was prepared by the National Computer Security Association. It lists 480 vendors of security products and services. Vendors are listed alphabetically by company name. Where t
VERSTELL.ANA [3221 bytes] --- Here's some neat fun to have on versatellers in your city. Call the versateller network center and tell them the machine is dammaged. Tell them you have a problem with the machine.if they put you on
VMBHACK.TXT [4662 bytes] --- Disclaimer: By continuing to read past this point you are hereby agreeing that this information is for interest value onl
VTHACK1.TXT [9844 bytes] --- The VT Hacker by The Mad Hermit Welcome to the first installment of the hackers' corner. In this 'electronic magazine', I will be speaking out on various issues relating to computers, telephon
VTHACK2.TXT [9378 bytes] --- VT Hacker #2 courtesy of The Mad Hermit Well, there's some old news, so let's get it out of the way. The Novice menu stuff has changed slightly. Options 8-12 are no longer active. in a
VTHACK3.TXT [29178 bytes] --- Well, it's time for yet another installment in Virginia Tech hacking. Yes, it's VTHACK #3!!!! Brought to you by the Mad Hermit and crew. This time, we're going to focus on the OTHER big network
WANGHACK.HAC [5302 bytes] --- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo %+ %+
WANINFO.TXT [9788 bytes] --- Unauthorised Access UK 0636-708063 Jester Sluggo presents an insight on Wide-Area Networks Part 1 Part 1 contains information on ARPANET and CSNET. Part 2 contains information on BITNET, MFENET, UUCP and U
XEROX.HAC [2321 bytes] --- Hacking: X E R O X
XMUX.TXT [12318 bytes] --- The =RoT= Guide To GANDALF XMUX'S Written by: Deicide NOTE: While writing this file i assumed that the reader has a working knowledge of Packet-Switching Networks(Such as Sprintnet, Ty
YANOFF.TXT [44889 bytes] --- SPECIAL INTERNET CONNECTIONS: LAST UPDATE 5/16/94 Compiled by: Scott Yanoff - yanoff@csd4.csd.uwm.edu Copyright 1994 Scott Yanoff. No changes are to be made to this document without the author's written
ZEN.HAC [52401 bytes] --- From annaliza@netcom.com Ukn Dec 1 23:30:29 1993 Received: from mail.netcom.com (netcom3.netcom.com [192.100.81.103]) by kaiwan.kaiwan.com (8.6.4/8.6.4) with ESMTP id XAA29728 for budds@kaiwan.co
ZEROKNOW.TXT [21927 bytes] --- From gregmi@galileo.mis.net Sat Oct 12 23:31:23 1996 Date: Sat, 03 Aug 1996 22:39:21 -0400 To: netware-hack@dey-systems.com Subject: Draft of 'A Few Attacks on the Zero Knowledge State In Novell's NetWa
ZIPPASS.TXT [5637 bytes] --- Article 357 of sci.crypt: Xref: vpnet comp.compression:174 sci.crypt:357 Subject: Re: Security of PKZIP's encryption Date: 2 Apr 91 07:08:10 GMT References: 1991Mar26.150049.20882@athena.cs.uga.edu Sende
Select this to request that all *.ZIP files be unzipped before they're sent
Select this to leave *.ZIP files zipped (Default when neither buttons are selected)
Select this to request that your email address not be on any mailing list in the future.
Select this to continue to present your email address to mailing lists. (Default when neither buttons are selected)
Click here to request selected files
Move the db-consolidation branch from branches/work/digikam-dbconsolidation
to trunk/extragear/graphics/digikam.
The branch has all changes merged from its creation point
to the current state of branches/extragear/kde3/graphics/digikam.
--------------------------------------------------------------------------------
This file's purpose is to guide contributors and developers to help on the
digiKam project.
========================================================================
10 golden rules for starting with open source
========================================================================
Before to contribute to digiKam project, please take a look to this link:
http://schlitt.info/applications/blog/index.php?/archives/541-10-golden-rules-for-starting-with-open-source.html
========================================================================
Source code formatting:
========================================================================
Adhere to this style guide strictly while adding new code to digiKam or
working on existing code.
-------------------------------------------------------------------------
* Indentation length
-------------------------------------------------------------------------
Indent with 4 spaces exactly.
for eg:
void function()
{
....int a; // 4 spaces from beginning
....for (int i=0; i<10; i++) // 4 spaces from beginning
....{ // 4 spaces from beginning
........a = i; // 4 spaces from previous indent block
Emacs by default will indent to 4 spaces
vim users add this to you .vimrc
set tabstop=4
-------------------------------------------------------------------------
* Tabs vs Spaces
-------------------------------------------------------------------------
Absolutely no tabs. Use a sensible editor which will convert tabs to spaces.
This will reduce unnecessary changes in your cvs commits.
Emacs by default will convert tab to spaces.
For vim users, add this to your .vimrc
set expandtab
-------------------------------------------------------------------------
* Line length
-------------------------------------------------------------------------
Line length should never exceed 80 chars (unless really necessary - these
cases are rare). Having long lines greatly reduces readability of code
-------------------------------------------------------------------------
* Bracketing
-------------------------------------------------------------------------
In almost all cases, {} brackets should start on a newline and should be
aligned with previous line (follow the indentation spaces). for eg.
class A
{ //new line
...
for (int i=0; i<10; i++)
{ //new line
if (a == foobar)
{ //new line
...
}
else
{ // new line
..
}
-------------------------------------------------------------------------
* Positioning of Access modifiers
-------------------------------------------------------------------------
public, private, protected, public slots, ... should be aligned to the
beginning of the line with no margin
class A
{
public: // aligned to left
...
private slots: // aligned to left
Follow a consistent order in defining these attributes. The recommended
order is public, protected (functions), private (functions),
signals, public slots, protected slots, private slots, private (variables)
========================================================================
Class, file and Variable names:
========================================================================
-------------------------------------------------------------------------
* Class and filenames
-------------------------------------------------------------------------
- filenames should always be in lower-case
- class names should match the filenames. Capitalize the first letter and
other letters logically to improve readability
-------------------------------------------------------------------------
* Protected Member variables
-------------------------------------------------------------------------
- protected member variable names should always be of the form m_varName.
- Captilize logically so that it becomes easy to read it. Do not capitalize
the first letter after _ (Use m_varName not m_VarName)
- variable names should be indicative of their functionality and also of
the type they belong too if they are instances of qt widgets.
for eg, QCheckBox* m_autoRotateCheckBox;
-------------------------------------------------------------------------
* Non-Member variables
-------------------------------------------------------------------------
- non-member variables should follow the same naming convention as the member
variables, except for the leading m_
-------------------------------------------------------------------------
* Private Member variables
-------------------------------------------------------------------------
- private member variables must be stored in a d private container to reduce
compilation time and improve binary compatibilty between digiKam components.
See more informations how to use a 'd' private class at this url:
http://developer.kde.org/policies/librarypolicy.html
========================================================================
Comments and Whitespace
========================================================================
Use whitespaces liberally to improve readability. Add blank lines between logical
sections of the code.
Comment as much as possible. Position comments at the beginning of the
section/line you want to comment, NEVER at the end of the line
// put your comments here
a = (b == foobar) ? 1 : -1;
a = (b == foobar) ? 1 : -1; // you are asking for trouble by putting comments here
========================================================================
Header files
========================================================================
- Add copyright to top of every file. Use the same header than others digiKam
source code.
- Double inclusion protection defines are all upper case letters and are
composed of the classname and a H suffix separated by underscore
#ifndef ANOTHERNICECLASS_H
#define ANOTHERNICECLASS_H
class AnotherNiceClass
{
...
}
#endif
- Use forward declarations as much as possible.
class QFileInfo;
class A
{
....QFileInfo* m_fileInfo;
========================================================================
General recommendations
========================================================================
Please take a look into KDE contrib page tips before to write code/patches for
digiKam project : http://techbase.kde.org/Contribute
Use the same .cpp/.h header than the rest of digiKam project.
Use a decent editor which does auto-indentation/syntax-highlighting for you.
I personally use Emacs (Renchi) or Kdevelop (Gilles).
There are excellent initializer scripts in the kdesdk
package for xemacs and vim which can substantially increase your productivity.
Just to give a taste of what i can do with emacs (and kdesdk):
* automatically insert copyright (and ifdefs) in new files.
* insertion of class function definitions for declared class
functions in header with one keystroke
* switch between header and declaration files with one keystroke
* go to corresponding definition/declaration with one keystroke
* tab completion of variable/function names already declared.
========================================================================
GDB Backtrace
========================================================================
If you found a context to crash digiKam, you can provide a backtrace using GDB debugger.
digiKam need to be compiled with all debug info else the backtrace will not suitable.
There is a configure option for that:
# make -f Makefile.cvs
# ./configure --enable-debug=full
# make
# su
# make install.
To make a backtrace with GDB use following command:
# gdb digikam
> run
> ...
> _crash here_
> ...
> bt
> _the backtrace is here_
> quit
Post this backtrace at the right place (B.K.O or devel ML) for investigations by developers.
========================================================================
Memory leak
========================================================================
To check any memory leak problem in digiKam, valgrind is your friend (http://valgrind.org)
Try this command line to use with valgrind :
valgrind --tool=memcheck --leak-check=full --error-limit=no digikam
========================================================================
Profiling with cachegrind
========================================================================
Valgrind also includes a tool to find out in which parts of your code time is spent.
valgrind --tool=callgrind digikam
Profiling can be disabled at startup to limit the output to the code you are interested in.
Start with
valgrind --tool=callgrind --instr-atstart=no digikam
and prepare the situation you want to profile. Then, in another console, start profiling with
"callgrind_control -i on" and, after the situation has passed, request a profile dump with
"callgrind_control -d".
The resulting callgrind.out files need to be viewed with the kcachegrind program, e.g.:
kcachegrind callgrind.out.16693.1
=================================================================================
API Documentation Validation, User Documentation Validation, Source Code Checking
=================================================================================
The following site check on a dayly basis for the a.m. errors:
www.englishbreakfastnetwork.org/krazy/
It can be very useful, in particular before major releases.
Don't trust it blindly! Sometimes they propose too advanced modifications that are no compatible with the prevailant include files.
========================================================================
Usability issues
========================================================================
OpenUsability project has define default menu structure and keyboard shortcuts:
http://wiki.openusability.org/guidelines/index.php/Appendices:Keyboard_Shortcuts
========================================================================
Generate API documentation
========================================================================
To generate API documentation, you need to install:
- Doxygen program (http://www.doxygen.org).
- Dot program (http://www.graphviz.org)
Go to 'project' sub-folder and just run doxygen binary program. A new subfolder
named 'api' will be create. Warning, this can take a while.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Thanks to Jimmy Ruska’s video on YouTube, there are several quirks about phrasing search queries for Google that can find you files in a jiffy. I will detail the method and include it as a Firefox bookmark first, and then I’ll follow up with detailed information on the actual query.
Adding a bookmark
Here’s the process to have a bookmark in Firefox such that you can search for an MP3 song in Google by just typing “music yourSongTitle” in the Firefox address bar.
1. Create a new bookmark
Select “Bookmarks” from menu.
Select “Organize Bookmarks…“
Click on the “New bookmark button” (below the files menu)
2. Fill in the following for the fields in the window that appears
Name: Enter the name for bookmark. e.g. : Directory Listing
Location: Here, copy and paste the following Google query (an explanation follows)
“http://www.google.co.in/search?hl=en&q=intitle%3A%22index.of%22
+%28mp3%29+%s+-html+-htm+-php+-jsp&btnG=Google+Search&meta=“
(Include the whole query, without the quotation marks)
Keyword: This is the word you will use in the address bar to invoke the results for a song title (in our example, it is “music”)
Description: Give a description or leave empty
3. Now open a new tab and type “music yourSongTitle” and viola! — you will see links of directory listing for the MP3 you wanted
Deciphering the query
The crux of this hack is the clever usage of Google search tags for narrowing the result to only directory listings with keywords “MP3″ and negating results that include html, htm, php or jsp as directory listings.
Here is the break up of the query and the meaning of the tags:
intitle:”index of”: This searches for the “index of” keyword in title of files. This is usually the directory file that contains the list of all files.
(MP3): This tag implies a search for files with the keyword “MP3″ in the file name. To add more formats to search, include them separated by the OR (’|') separator.
%s: This is where the yourSongTitle you enter gets inserted. A clever innovation here is to separate the keywords in your song name with ‘.’ so that single character separations, such as underscores (’_') between words, are also included in results.
-html -htm -php -jsp: This basically tells the search engine that you don’t want (negate) html, htm, php or jsp files that give directory listings.
You can modify the same query for searching pdfs or any other file format. Also, there are few more keywords to limit the search to a particular site (site:siteName) or a filetype(filetype:pdf). I am no promoter of media piracy and the use of Google tag words makes search all the more effective and productive for daily use. Jimmy has also uploaded a new video on the implementation with few more features on his own site.
Do you find this Google hack useful? Well, I hope so.
——————————————————————————–
File servers "hold the gold" on your network. They house sensitive files, databases, passwords and more. When they go down the network is incapacitated. When they're breached, all hell can break loose. The following are true hacks I've discovered recently. I'll share with you what I came across and how the vulnerability was exploited -- all from a hacker's point of view. This will help put security vulnerabilities you hear about in the news and read in security bulletins into a new context -- one that can help you approach your security testing with a fresh perspective and the realization that not all security exploits are high-tech.
Step 1: Exploiting a missing patch
20 Sep 2006
Take all the Microsoft critical security updates you're expected to keep up with and combine those with some of my favorite vulnerability scanning and exploit tools and you've got a surefire exploit on your hands. One thing you'll find more and more is that most vulnerabilities -- such as the recent MS06-040 buffer overrun -- are directly exploitable from inside the network. This is due to the fact that a large proportion of networks don't use internal segmenting or intrusion prevention -- everything's trusted. Not good when you've got a rogue employee looking to control your server.
So, let's look at how the MS06-040 vulnerability can be easily exploited from a rogue insider's point of view. All that's required is a connection on your network and a couple of freely-downloadable security tools: Nessus and Metasploit. The following steps seal the deal:
He downloads installs Nessus and scans the network -- or a few key servers that he knows about -- looking for vulnerabilities.
He comes across this MS06-040 issue on a file server that allows "arbitrary code" execution -- that sounds like fun.
He goes to Metasploit's exploit listing page and sees that Metasploit supports this exploit.
He downloads and installs Metasploit, plugs in a few variables, and boom he's got a command prompt with full access to your server as shown in the following figure.
Using Metasploit against the MS06-040 flaw to obtain a server command prompt.
This can be done time and time again -- with this vulnerability and all the others affecting Windows and related applications -- without you ever knowing a thing about it. Imagine the damage that can be done with full server command prompt access: delete files, copy the backup SAM database and other sensitive files, add/remove users, and more. Simply run NET HELP at a command prompt and you can see what's available.
The same type of exploit can be carried out via the Internet on one of your publicly-accessible servers if it's not adequately protected behind a firewall. Also, it's important to remember that the network connection requirement I mentioned above can be obtained via an improperly secured wireless network. Like having a couple of access points connected directly to your network that serve up handheld scanners in your warehouse. There's hardly ever any WEP, WPA or other security controls for these scanners. Anyone within range (which is usually your parking lot or in adjacent buildings) can jump right onto your network to carry out their exploits.
Step 2: Sniffing the network for juicy info
20 Sep 2006
Speaking of unsecured wireless networks, all it takes for a malicious outsider to hop onto your network or glean sensitive information from it is to load up a wireless network analyzer such as CommView for WiFi or RFprotect Mobile. Furthermore, if he's able to obtain a physical connection to your network (or he's a trusted user), he can load a tool such as Cain and perform ARP poisoning allowing him to bypass your Ethernet switch 'security' and grab anything and everything off your network.
What does this have to do with hacking file servers? Easy -- the attacker simply gleans password information from SMB, POP3, Web, FTP, and even Windows authentication attempts right off the wire as shown below and uses that information as a direct link for unauthorized access into your file servers.
Passwords are easily gleaned of an Ethernet network.
Step 3: Stumbling across sensitive files
20 Sep 2006
I revisit this 'hack' a lot because the problem only seems to be getting worse. It's the issue of sensitive information stored in an unprotected fashion on server shares accessible to anyone on the network -- typically in 'public' folders. My theory on why this problem is getting worse is that network administrators have so much information to manage and their users are doing so many careless things with their files, it's seemingly impossible to get your hands around the problem. That's still no excuse in the regulators' eyes. Here's what can happen:
A network user with standard domain rights (or a hacker who's obtained their authentication information) scans the network for shares. A great tool for this is LANguard Network Security Scanner or some other tool that's freely available.
He finds shares and literally tries to connect to them one by one to see what he can see.
He realizes that there's so many files to sift through and decides to use the Windows Explorer search function -- or better yet -- a faster and more powerful tool such as Effective File Search or File Locator Pro to root out sensitive information.
He simply runs his tool searching for .doc, .xls, .txt, .pdf and similar files containing text strings such as 'ssn', 'dob', 'license', and so forth. He'll undoubtedly find dozens if not hundreds or thousands of files containing the information he's looking for.
He copies the information and then uses it against the victim via identity fraud, etc.
Again, test this for yourself and you'll see what I'm talking about. It doesn't matter what tool you use as long as you search for the right type of documents and the right text strings. The more the better.
If your file servers are publicly-accessible (heaven forbid, but I see it every now and then), there are various things an attacker can do with Google queries to root out sensitive server information as I outlined in my "How to Google hack Windows servers" tip. To test this for yourself I recommend using SiteDigger or Acunetix's Web Vulnerability Scanner that has a Google hacks scanning feature.
Step 4: Executing related hacks that indirectly affect file servers
20 Sep 2006
Finally, it's easy to overlook other vulnerabilities in your network infrastructure that can indirectly lead to file server manipulation and exploitation. These mostly revolve around physical security. One serious issue I came across was where the Web interface for a data center's physical security management system was accessible to all network users and anyone that was able to hop onto an unsecured wireless network from outside the building. Even worse, it was running with the default username and password. Once you logged in, door sensors could be disabled, security alerts could be rerouted, log files could be tampered with and so on. What a great way for an attacker to cover his tracks breaking into the data center!
I've also come across several situations while visiting busy real estate offices, healthcare facilities, and even during "open house" networking events at local businesses where servers were completely accessible to the public. No doors, no locks, not even the slightest physical security measure. These servers almost always have their screens unlocked which can make an administrator backdoor easy as pie to setup. The bad guys can also gain a leg up on how everything is interconnected and accessible to steal after hours or when no one is around. Think a stolen Windows file server is not easy to crack? As long as the hard disks are not encrypted, all it takes is the right tools (such as Ophcrack Live CD and NTAccess) to crack or reset the administrator password. Certainly an incentive to use whole disk encryption on your servers as a last line of defense!
Don't sit idle
Always remember that if the bad guys can do it you need to be doing it as well. What I'm trying to say is that you've got to ethically hack your file servers -- with a malicious mindset -- to see what can be done by both unruly insiders and outside attackers. Keep in mind that there's a method to all this madness as I outlined here in my domain controller penetration testing tip. This will ensure you're performing your testing in the right way at the right time with the right tools and so on.
Finally, don't forget that file server hacking is not necessarily the exploitation of high-tech vulnerabilities that take days, weeks or months to execute like we see in the movies. It's more so someone with malicious intent with the right tools and a little bit of time exploiting a basic IT oversight. Even with the greatest of intentions, we all get busy and miss or forget about a specific patch, access control or other network hole. It happens to the best of us -- but it's those very weaknesses that the bad guys thrive on the most.
?????????????????????????????????????????????????????????????????????????????????????
There was a time when Web development was about CGI scripting, JavaScript, and Java. Not any more. A series of articles from various sources suggest that a career path focused on honing skills for Web-ware (Web + Software) development can pay rich dividends.
APIs everywhere
Social networking has been booming and so has the avenue to monetize from the increased user base, so much so that firms have realized that the best strategy to capture market share is to have a roster of developer-converts a.k.a the users to chug out applications. It’s a win-win situation. The company gets the benefit of increased adoption due to increased utility. The developers get a share of revenue their apps generate. And the recent announcement from FaceBook that it will reward developers creating FaceBook apps (TechNewsWorld) is just the beginning. LinkedIN and MySpace, other popular social networking sites will also be releasing their APIs soon. Here’s a link to a starter’s guide on FaceBook API (the Screencast blog).
Mash-ups
Also, Google announced a mega mash-up to mash all mash-ups, opening another opportunity for wannabe Web developers to take the plunge. Mash-ups are a technique to merge various services (such as Google Maps) to tailor data from various sources to user-specific needs (such as mark out local grocery stores on a region map). Mash-ups rely heavily on AJAX technology (it’s a debate whether AJAX is a new technology as such since the features were always there, but let’s not get into that). Here’s a blog I scooped from the Net as a starting point for mash-ups development.
And if you are still wondering if it’s all worth the effort, apart from the fact that Web development can be a deeply gratifying experience, perhaps this piece from silicon.com can give more reasons for you to start.
Did I awaken the coder beast in you? Also, please do share more links for the good of the great TR development community.
Wednesday, June 20, 2007
Getting Started with the Facebook Platform API
In this three-part tutorial you'll learn how to:
Add the Developer Application to your Facebook account
Setup Java Client Library in Eclipse IDE
Use the Facebook Platform API
Index: HACKING
===================================================================
RCS file: /home/or/cvsroot/doc/HACKING,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -d -r1.2 -r1.3
--- HACKING 5 Apr 2003 19:04:05 -0000 1.2
+++ HACKING 3 Oct 2003 19:37:38 -0000 1.3
@@ -6,108 +6,113 @@
Read the README file first, so you can get familiar with the basics.
-1. The programs.
-
-1.1. "or". This is the main program here. It functions as either a server
-or a client, depending on which config file you give it.
-
-1.2. "orkeygen". Use "orkeygen file-for-privkey file-for-pubkey" to
-generate key files for an onion router.
-
-2. The pieces.
-
-2.1. Routers. Onion routers, as far as the 'or' program is concerned,
-are a bunch of data items that are loaded into the router_array when
-the program starts. Periodically it downloads a new set of routers
-from a directory server, and updates the router_array. When a new OR
-connection is started (see below), the relevant information is copied
-from the router struct to the connection struct.
+The pieces.
-2.2. Connections. A connection is a long-standing tcp socket between
-nodes. A connection is named based on what it's connected to -- an "OR
-connection" has an onion router on the other end, an "OP connection" has
-an onion proxy on the other end, an "exit connection" has a website or
-other server on the other end, and an "AP connection" has an application
-proxy (and thus a user) on the other end.
+ Routers. Onion routers, as far as the 'tor' program is concerned,
+ are a bunch of data items that are loaded into the router_array when
+ the program starts. Periodically it downloads a new set of routers
+ from a directory server, and updates the router_array. When a new OR
+ connection is started (see below), the relevant information is copied
+ from the router struct to the connection struct.
-2.3. Circuits. A circuit is a path over the onion routing
-network. Applications can connect to one end of the circuit, and can
-create exit connections at the other end of the circuit. AP and exit
-connections have only one circuit associated with them (and thus these
-connection types are closed when the circuit is closed), whereas OP and
-OR connections multiplex many circuits at once, and stay standing even
-when there are no circuits running over them.
+ Connections. A connection is a long-standing tcp socket between
+ nodes. A connection is named based on what it's connected to -- an "OR
+ connection" has an onion router on the other end, an "OP connection" has
+ an onion proxy on the other end, an "exit connection" has a website or
+ other server on the other end, and an "AP connection" has an application
+ proxy (and thus a user) on the other end.
-2.4. Topics. Topics are specific conversations between an AP and an exit.
-Topics are multiplexed over circuits.
+ Circuits. A circuit is a path over the onion routing
+ network. Applications can connect to one end of the circuit, and can
+ create exit connections at the other end of the circuit. AP and exit
+ connections have only one circuit associated with them (and thus these
+ connection types are closed when the circuit is closed), whereas OP and
+ OR connections multiplex many circuits at once, and stay standing even
+ when there are no circuits running over them.
-2.4. Cells. Some connections, specifically OR and OP connections, speak
-"cells". This means that data over that connection is bundled into 256
-byte packets (8 bytes of header and 248 bytes of payload). Each cell has
-a type, or "command", which indicates what it's for.
+ Streams. Streams are specific conversations between an AP and an exit.
+ Streams are multiplexed over circuits.
+ Cells. Some connections, specifically OR and OP connections, speak
+ "cells". This means that data over that connection is bundled into 256
+ byte packets (8 bytes of header and 248 bytes of payload). Each cell has
+ a type, or "command", which indicates what it's for.
-3. Important parameters in the code.
+Robustness features.
+[XXX no longer up to date]
+ Bandwidth throttling. Each cell-speaking connection has a maximum
+ bandwidth it can use, as specified in the routers.or file. Bandwidth
+ throttling can occur on both the sender side and the receiving side. If
+ the LinkPadding option is on, the sending side sends cells at regularly
+ spaced intervals (e.g., a connection with a bandwidth of 25600B/s would
+ queue a cell every 10ms). The receiving side protects against misbehaving
+ servers that send cells more frequently, by using a simple token bucket:
+ Each connection has a token bucket with a specified capacity. Tokens are
+ added to the bucket each second (when the bucket is full, new tokens
+ are discarded.) Each token represents permission to receive one byte
+ from the network --- to receive a byte, the connection must remove a
+ token from the bucket. Thus if the bucket is empty, that connection must
+ wait until more tokens arrive. The number of tokens we add enforces a
+ longterm average rate of incoming bytes, yet we still permit short-term
+ bursts above the allowed bandwidth. Currently bucket sizes are set to
+ ten seconds worth of traffic.
-4. Robustness features.
+ The bandwidth throttling uses TCP to push back when we stop reading.
+ We extend it with token buckets to allow more flexibility for traffic
+ bursts.
-4.1. Bandwidth throttling. Each cell-speaking connection has a maximum
-bandwidth it can use, as specified in the routers.or file. Bandwidth
-throttling can occur on both the sender side and the receiving side. If
-the LinkPadding option is on, the sending side sends cells at regularly
-spaced intervals (e.g., a connection with a bandwidth of 25600B/s would
-queue a cell every 10ms). The receiving side protects against misbehaving
-servers that send cells more frequently, by using a simple token bucket:
+ Data congestion control. Even with the above bandwidth throttling,
+ we still need to worry about congestion, either accidental or intentional.
+ If a lot of people make circuits into same node, and they all come out
+ through the same connection, then that connection may become saturated
+ (be unable to send out data cells as quickly as it wants to). An adversary
+ can make a 'put' request through the onion routing network to a webserver
+ he owns, and then refuse to read any of the bytes at the webserver end
+ of the circuit. These bottlenecks can propagate back through the entire
+ network, mucking up everything.
-Each connection has a token bucket with a specified capacity. Tokens are
-added to the bucket each second (when the bucket is full, new tokens
-are discarded.) Each token represents permission to receive one byte
-from the network --- to receive a byte, the connection must remove a
-token from the bucket. Thus if the bucket is empty, that connection must
-wait until more tokens arrive. The number of tokens we add enforces a
-longterm average rate of incoming bytes, yet we still permit short-term
-bursts above the allowed bandwidth. Currently bucket sizes are set to
-ten seconds worth of traffic.
+ (See the tor-spec.txt document for details of how congestion control
+ works.)
-The bandwidth throttling uses TCP to push back when we stop reading.
-We extend it with token buckets to allow more flexibility for traffic
-bursts.
+ In practice, all the nodes in the circuit maintain a receive window
+ close to maximum except the exit node, which stays around 0, periodically
+ receiving a sendme and reading more data cells from the webserver.
+ In this way we can use pretty much all of the available bandwidth for
+ data, but gracefully back off when faced with multiple circuits (a new
+ sendme arrives only after some cells have traversed the entire network),
+ stalled network connections, or attacks.
-4.2. Data congestion control. Even with the above bandwidth throttling,
-we still need to worry about congestion, either accidental or intentional.
-If a lot of people make circuits into same node, and they all come out
-through the same connection, then that connection may become saturated
-(be unable to send out data cells as quickly as it wants to). An adversary
-can make a 'put' request through the onion routing network to a webserver
-he owns, and then refuse to read any of the bytes at the webserver end
-of the circuit. These bottlenecks can propagate back through the entire
-network, mucking up everything.
+ We don't need to reimplement full tcp windows, with sequence numbers,
+ the ability to drop cells when we're full etc, because the tcp streams
+ already guarantee in-order delivery of each cell. Rather than trying
+ to build some sort of tcp-on-tcp scheme, we implement this minimal data
+ congestion control; so far it's enough.
-(See the tor-spec.txt document for details of how congestion control
-works.)
+ Router twins. In many cases when we ask for a router with a given
+ address and port, we really mean a router who knows a given key. Router
+ twins are two or more routers that share the same private key. We thus
+ give routers extra flexibility in choosing the next hop in the circuit: if
+ some of the twins are down or slow, it can choose the more available ones.
-In practice, all the nodes in the circuit maintain a receive window
-close to maximum except the exit node, which stays around 0, periodically
-receiving a sendme and reading more data cells from the webserver.
-In this way we can use pretty much all of the available bandwidth for
-data, but gracefully back off when faced with multiple circuits (a new
-sendme arrives only after some cells have traversed the entire network),
-stalled network connections, or attacks.
+ Currently the code tries for the primary router first, and if it's down,
+ chooses the first available twin.
-We don't need to reimplement full tcp windows, with sequence numbers,
-the ability to drop cells when we're full etc, because the tcp streams
-already guarantee in-order delivery of each cell. Rather than trying
-to build some sort of tcp-on-tcp scheme, we implement this minimal data
-congestion control; so far it's enough.
+Coding conventions:
-4.3. Router twins. In many cases when we ask for a router with a given
-address and port, we really mean a router who knows a given key. Router
-twins are two or more routers that share the same private key. We thus
-give routers extra flexibility in choosing the next hop in the circuit: if
-some of the twins are down or slow, it can choose the more available ones.
+ Log convention: use only these four log severities.
-Currently the code tries for the primary router first, and if it's down,
-chooses the first available twin.
+ ERR is if something fatal just happened.
+ WARNING is something bad happened, but we're still running. The
+ bad thing is either a bug in the code, an attack or buggy
+ protocol/implementation of the remote peer, etc. The operator should
+ examine the bad thing and try to correct it.
+ (No error or warning messages should be expected. I expect most people
+ to run on -l warning eventually. If a library function is currently
+ called such that failure always means ERR, then the library function
+ should log WARNING and let the caller log ERR.)
+ INFO means something happened (maybe bad, maybe ok), but there's nothing
+ you need to (or can) do about it.
+ DEBUG is for everything louder than INFO.
[support] IRC Hacking Files
Morbus Iff morbus at disobey.com
Thu Dec 15 18:37:37 UTC 2005
Previous message: [support] IRC Hacking Files
Next message: [support] IRC Hacking Files
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
--------------------------------------------------------------------------------
> My hosting company has twice recently claimed there are IRC hacking
> files in one of my accounts which uses Drupal. Has anyone had this
> experience or have any idea how they could be uploaded into my account
> like that? Is there a security hole in Drupal that could cause this?
It's entirely possible if you're still using a version of Drupal that has
the XML-RPC bug (upgrade to 4.6.5, please!) - someone could easily have
done it (I've seen the attack numerous times against numerous apps).
pornlinks.
The hacks are produced links that are non visible to the eye and viewable in the source code.
Strangely dreamhost are still to acknowledge the severity of the hacking and have not released any status updates via blogs or forums!
To check if your sites have been attacked view the source of the index
pages on your domains and see if you can see links like those in the
source just like these pages[1] - You can also refer to the following
forum post[2] on dreamhost forums and a google blog search[3].
[1] http://geekup.org/index-hacked.php
[1] http://nwdc.org.uk/index-hacked.html
[2] http://tinyurl.com/2u5efw
[3] http://tinyurl.com/3ygjk7
The advise from Andrew Disley who notified us today of this attack is whether your sites have been hacked or not for security reasons CHANGE YOUR Password. I would further advise backing up your sites if not done so already.
Continue reading →
hacking
4 Comments
Spam free email contact
May 4th, 2007 — Joomla, hacking, tutorial
contactify.com is a simple innovative method to create a spam free email contact solution. The service actually works similar to tinyurl by providing you a url i.e. ‘contactify.com/asd12′ that pops up a email contact form.
You initially provide the email address you would like the message to be redirected to and a confirmation link is sent to that email address to activate the url;
Continue reading →
No Comments
Joomla administrator password retrieval made easy
May 4th, 2007 — Joomla, hacking, tutorial
We covered the issue about resetting your administrator password once lost. The main reason that you would resort to resetting your administrator password would be because by default the Joomla login feature within the backend for access requires you to enter your ‘username’ and ‘email address’ when attempting to retrieve a forgotten password. However if you forget your ‘username and password’ or just your ‘username’ then you would need to go through the procedure of resetting your Joomla password using phpmyadmin.
However iJoomla has provided a hack that will actually require you to enter just the ‘email address’ when retrieving a password.
go to ijoomla here and download the hack (you must be registered to the site):
password hack
***Please make sure you backup to following files prior to implementing this hack***
components/com_registration/registration.html.php
components/com_registration/registration.html.php
public_html/language/english.php (or any other language file)
Create a folder on your desktop and unzip the hack files to this folder;
1. Create a folder on your desktop and unzip the hack files to this folder;
2. Overwrite the above files that have been backed up with the attached files in the folder either by using FTP or JoomlaExplorer.
3. Test the forgot password page
4. If any problems occur then restore the backed up files.
Remember that hacks are not provided with any support and we do carry any guarantees or warranties.
Powered by ScribeFire.
No Comments
Custom Built FireFox for Mac Users
April 6th, 2007 — open source, hacking
For Mac Users who are interested in a faster, efficient customized version of FireFox browser (What FireFox can be customized?!); then you can go over here to download this version.
It is not not the original FireFox version and therefore will not have the FireFox Branding logo/text, etc. These are protected by copyright laws. It is a custom build of the firefox browser that that has been developed on top of the original and will have the same functions as the original, but has been tweaked.
Try it out:
Hacking Windows XP: Hacking Windows Explorer
Discuss this now (12 posts)
Working with Hidden Files
Just like every other Windows version, Windows XP likes to hide files. When you are interested in tweaking and customizing your computer, this hiding of files can become probematic, as many of the system files with which you want to work are often hidden. These next two sections will show you how to make Windows XP display all hidden and system files as well as the super hidden files.
Unhiding hidden files
When you are tweaking your computer, you often need to edit different configuration files for different applications. This can cause a problem since those configuration files are often hidden. The only way to edit them would be if you knew the exact file name and typed it in the Browse box manually. Otherwise, you would be out of luck.
Telling Explorer to show hidden files and folders is the only solution to this problem. Making Explorer show hidden files is just a matter of getting to the right place. Follow these steps to show all hidden files:
Open up a copy of Explorer in My Computer by clicking on the icon on the Desktop or Start panel.
Go to the Tools menu bar item and select Folder Options.
Click on the View tab to see all of the different file display options when the window appears.
Scroll down the list until you see the entries for Hidden Files and Folders. Select Show Hidden Files and Folders, as shown in Figure 5-10.
When you are finished, just click OK to save your changed and exit the configuration window. You should now see all of the hidden files on your computer that are hidden using the +h file attribute. However, you may notice that there still are some files that are not showing up. These are the system files. To show these files, continue on to the next section.
Figure 5-10
click on image for full view
Revealing the super hidden files
Microsoft has added many features to Windows XP to protect the critical files of the operating system. The system file checker, for instance, continually monitors the system files to ensure that no application will replace your system files with a version that Windows XP was not designed to work with. The new super hidden files feature allows Windows to protect itself even further by hiding some of its most critical files from the user. If they can't get to it, they can't hurt it, right?
Revealing the super hidden system files is not very difficult at all. You can uncheck the box on the list on the View tab of Folder Options, but where is the fun in that? Use the Registry Editor to turn this feature off:
Click on the Start button and select Run.
Type in regedit in the box and click OK to start up the Editor.
Once regedit appears, navigate through HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced.
Right-click on ShowSuperHidden and select Modify.
Change the value to 1 and click OK to save your changes.
Now you will be able to see all of the files on your computer, including the super hidden system files. Continued...
Disabling the Common Tasks Pane and Summing Up
Every time that you use Explorer, you are forced to view the new Common Tasks pane. The Common Tasks pane is the new panel that is displayed on the left side of the screen that provides you with links to various parts of the operating system as well as useful utilities. This new feature looks visually pleasing and seems to be a very nice and useful feature. However, that is not always the case. I do not think that I have ever used any link on my tasks pane or any of the other information that is shown on it. If you are like me and do not use your Common Tasks pane, why not remove it to recover some space that could be used to display more icons on your screen at once?
Removing the Common Tasks pane is very easy using the folder options that can be accessed in any Explorer window. Follow these steps to remove the Common Tasks pane from your windows:
Click on the Tools menu bar item from any open Explorer window and select Folder Options. If you do not have an open Explorer window, just open My Computer.
On the General tab, just select Use Classic Folders under the Tasks settings on the top.
Click OK to save your changes.
You have now removed the Common Tasks pane from all of your Explorer windows.
Click here for more Windows tricks, tweaks, and news on Microsoft's future OS: Longhorn.
Summary
This chapter has shown you many different ways that you can customize how Explorer looks and works. You discovered how to change file associations as well as how certain file types look when viewed in Explorer. Then, you found out how to customize the context menu as well as how to clean it up. The last part of this chapter showed you how you can customize the different views of Windows XP so that you can take advantage of the cool new features and increase your productivity as well.
--------------------------------------------------------------------------------
Related Articles:
• Fighting Viruses in Vista Without Antivirus Programs
• Hacking Vista: Optimize Core OS Components
• Stardock TweakVista Review
• 10 Reasons Not to Use Safari on Windows
• Speed Up Windows Vista
• more
Changing the Icon of any File Type
So far, you have learned how you can change the icons of the desktop icons. Now let's see how you can change the default icon that is displayed for any file type on your computer. Changing the icons is actually very easy; the most difficult part of the process is trying to figure out which icon to use. Additionally, keep in mind that you can use high-resolution icons that you can download from the Web.
To start changing your icons, you are going to use the Folder Options feature you used in the last section. Follow these steps to begin:
Open up Folder Options again by clicking on My Computer. When it launches, click on the Tools menu bar entry and select Folder Options.
Inside Folder Options, click on the File Types tab to reveal the list of all of the different file extensions on your computer.
Browse through the list and select the extension for which you want to change the icon.
Once you have the entry selected, click the Advanced button.
On the Edit File Type screen, click the Change Icon button, as shown in Figure 5-2.
The Change Icon screen will show. Here, you will be shown various system icons from which you can choose. If you do not find any that you like, just click on the Browse button and select an icon that you downloaded on your computer.
Once you find the perfect icon, click OK.
Click OK again to save your changes.
You don't have to reboot after you make your changes, because you will see your changes immediately after you click OK to save them. Continued...
Figure 5-2
click on image for full view
Hacking the Context Menu
What is the context menu? This is the menu that pops up when you right-click on a file. Over the years, these menus have become more and more useful. However, with the extra entries in the context menu, they often become cluttered with options and features that you just don't need. These next few sections will shown you how you can get your menus back under control as well as how you can take advantage of the new features to make your own context menu entries.
We will start off by removing items from the context menus and will then move on to adding and customizing the components of the menus.
Removing items from the context menu
Over time, your context menus can become cluttered with program entries from old programs that you don't use anymore. Sometimes you may experience programs that take over all of your context menus. Compression apps such as Winzip or Picozip always end up adding program entries to all of the context menus. I have Picozip installed on My Computer and every time I right-click on any file or folder, I see five entries from Picozip giving me different compression options. This can be a convenient feature, but if you don't compress and extract zip files very often, then you might not need the added convenience. Instead you could remove these entries from your context menu, which will give your system a cleaner interface as well as a small performance boost if you have a lot of extra entries in your context menu.
Caution: Before editing your registry, it would be wise to create a system restore point by using system restore. Doing so will provide an easy method to revert back to your original configuration before you make any changes—just in case you accidentally delete or modify something that hurts your computer.
Actually removing these programs from your context menus can be a little tricky since they can spread to different places in the registry. Also, the easy-to-use context menu editor used earlier to change the icon and default launch app for certain file types is not robust enough to allow the removal of entries from programs that take over all context menus such as Picozip. The only way to remove these types of entries is to edit the registry directly. If you want to remove an entry on a context menu that does not appear on every context menu and just appears on one or a few other file types, you can still use the easy-to-use editor. Because of that, I have provided you two different sets of steps depending on what you want to do. When you are ready, follow the steps below for the corresponding type of entry to remove it for good. Continued...
Removing Entries that appear in all Context Menus
This set of steps will show you how you can remove entries in the context menu that appear in all menus for all file types that were put there by programs such as Picozip.
Start up the Registry Editor by clicking on the Start button and selecting Run. Then type regedit in the box and click OK.
When the Registry Editor appears, expand the HKEY_CLASSES_ROOT folder. You will now see a list of every file type that is set up on your computer.
If the entry that you want to remove from the context menu appears in all context menus such as the Picozip example above, you will have to expand the * folder.
Now that you have the correct folder expanded, expand the Shellex and ContextMenuHandlers folders. Your registry path should look like HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers.
Look through the list until you find the entry that you want to remove. Right-click on the folder of the entry and select delete. You will find that identifying some of the programs is easy. For example, Picozip is labeled Picozip. However, you may run into some items that are listed using their application ID number or a vague name. If that is the case, copy (Control + C) the application ID, which is formatted like this—{XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX}—to the clipboard. You may have to expand the folder to see the ID. Then, once you have the ID copied to the clipboard, press Control + F to bring up the Search box in regedit and paste the ID in the box. Next, just click Find and you should be able to find some other references to that same ID in your registry that also might give you some clues to what it is. If that does not work, try doing a search on Google to see if that turns up anything.
Once you are finished removing all of the entries from your context menus, just close Registry Editor and you are finished. Your changes will be in effect immediately.
Removing entries that appear only under certain file types
If you want to remove an entry on a Context menu that appears on just one type of file or a few different types of files, this section will show you how to easily remove it using the context editor in Folder Options.
Open up My Computer.
Click on the Tools menu, select Folder Options, and click on the File Types tab.
Scroll though the list of file types and select the extension that you would like to modify.
Click the Advanced button to bring up the Edit File Type window. This is where you will see a list of all of the different entries that will show up in the context menu, shown here:
Figure 5-3
click on image for full view
Select the item that you want to remove and click Remove.
Click OK and you are finished.
If you ever want to revert back to your original context menus, you can just restore your computer to an earlier checkpoint. Or, if you didn't create a system restore checkpoint, you can just reinstall the app to take care of it. Continued...
Adding Your own Items to the Context Menu
Now that you have removed all of the extra clutter from your context menus, why not add some useful entries to your menus? You can add a lot of cool things to your context menus that can enhance your experience with your computer. My favorite item to add to my context menus is a "Send Attached to Message" entry. This entry in my context menu grew out of a need to find a better way to email files. I send a lot of messages every day, often just for the purpose of sending a file. I thought to myself, wouldn't it be cool if I could just right-click on a file and select some option that would automatically open up Microsoft Outlook, create a new message, and attach the file? That would streamline the whole process by knocking out a few steps.
Adding an entry to a context menu is very simple. The most difficult part of solving my little puzzle was figuring out how to launch Outlook so it would automatically create a message and attach the desired file to it. After a few minutes on Google researching, I came across Outlook-Tips.net which is a great resource for just the information that I was looking for. According to outlooktips.net, I just had to launch Outlook with the /a switch and the name of the file. Once I had this information, I had all of the pieces of the puzzle and was ready to start putting it together. Perform the following steps to learn how to add your own item to any File Types context menu:
First, open up My Computer.
Click on the Tools menu bar item and select Folder Options.
Click on the File Types tab to expose all of the different file types on your computer.
Because I usually send Word documents, I scrolled down the list of file types and selected the .doc file extension. Pick any other file extension for which you would like to add an entry.
Once you have the entry selected, click the Advanced button to bring up the Edit File type window.
Click the New button to add an entry.
In the Action box, type in the name that you want to appear on the menu. I typed in Send Attached to Message.
In the Application Used to Perform Action box, you will want to specify the application and any switches that you will want to use for this new entry. Click on the Browse button to easily browse to an executable file. I navigated until I found OUTLOOK.EXE inside the OFFICE11 folder.
When you click OK, the path to the executable file will fill the box. Now you will want to add any application flags at the end of the line. To tell Outlook to create a new message and attach a file to it, I had to add /a after the path followed by %L. The %L is a system variable that holds the name of the file that you are right-clicking on. When I was finished, my box looked like the following (including the quotes): "C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE" /a "%L".
When you are finished editing your new entry, click OK to save it.
You are now finished adding an entry to a specific File Types context menu. If you followed all of the previous steps to add the "Send Attached to message" entry, every time you right-click on a Word document, you will now see the new entry, as shown in Figure 5-4. If you want to add the same entry on other file types, just repeat the previous directions by selecting a different file type in step 4.
You can do even more things with the context menus. If I wanted to, I could use the different switches that I found on the Outlook Tips Web site to make my entry send the file to a specific person instead of leaving the To field blank in Outlook. Once you know the %L variable, you can send the name of the file to any program, given that you know the correct switches with which to launch the program. Continued...
Figure 5-4
click on image for full view
Modifying the Send To Menu
The Send To menu is one of features of my context menus that I use the most. The ability to right-click on any file and have a shortcut for it sent to the desktop is invaluable. All of the other features are very useful as well. How would you like to make it even more useful? It is very easy to add your own items to the Send To menu, such as folders that you can send files to. Do you have a folder that you store all of your music in? How about a folder that you store all of your digital photos in? Just follow the quick steps below to add anything that you want to your Send To context menu entry.
Open up My Computer and browse to the C drive, or whatever drive you have Windows installed to.
Browse through the Documents and Settings, your user name, and the Send To folders.
Tip: If you do not see any of the folders that are required in this section, you may have hidden files turned on. Because these folders are hidden by default, you will have to tell Windows to show all files. To this, refer to the section on working with hidden files towards the end of this chapter.
When you are looking at C:\Documents and Settings\Username\SendTo, you will see all of the files that appear in the Send To menu. If you want to add an entry to the menu, just copy a shortcut to this folder.
Let's say that you want to add your Digital Photos folder to your Send To menu. Just navigate to your Digital Photos folder and right-click on it and select Send To desktop. Then just cut and paste the shortcut that was created from your desktop into the SendTo folder.
If you ever want to remove some items from the Send To menu, just delete them from the Send To folder.
It's that simple. You are now finished customizing your Send To menu. Now you will be able to fine-tune all of the different features of your context menus so that you can get the most out of your Windows XP experience. Continued...
Customizing Your Folders
The folders of Windows XP can be customized in ways that never were possible before. You can easily change the icon of the folder as well as the way the folder behaves once you open it up. These next few sections will show you how you can take advantage of the great new folder features of XP.
Changing a folder icon and picture
Changing the icon that is displayed for a folder is one of the easiest ways to customize how it looks and to make it stand out from the rest of your folders. Windows XP also includes a new way to apply pictures to the front of your folders when you are using thumbnail view. This next section will show you how to can change the way your files and folders look as you browse through them by taking advantage of the new high-resolution icons.
Changing the folder icon and the folder picture are done within a folder properties menu. For the sake of demonstrating what you can do with these new features, create a new folder on one of your hard drives and call it Downloads. This can be a folder to which you can save all of your downloads so that they do not clutter up your desktop. Follow these steps to change the way this folder looks:
Right-click on the new folder that you just created, or on any folder that you want to customize, and select Properties.
Click on the Customize tab to reveal all of your customizing options.
Depending on what view you are currently using, whether it be the Icons, Tiles or Thumbnails view, will determine what you can customize. First, customize the icon, since that is the most popular way to customize the look of the folder. To do that, click on the Change Icon button on the bottom of the window.
Now you will be able to browse through the list of available system icons or you will be able to specify your own by clicking the Browse button. Personally, the system icons are good enough for this folder, so I would select one of the globe icons for the Downloads folder.
Once you have selected the icon that you want to use, just click the OK button to return to the Customize screen. Then click Apply to see your changes.
If you are using thumbnail view to view your icons, you can customize the folder by making an image appear on the front of the folder so that it can be used as a reminder of what is in the folder. To do that, just click the Choose Picture button on the Customize screen and specify a bitmap to be displayed on the file.
Once you are finished selecting the image, click OK to save your changes. Then click Apply on the Customize screen to see your changes. Remember that you will only see your changes if you are using the Thumbnails view. The view can be changed to Thumbnails view by clicking on the View menu bar item.
When you are finished changing the way your folder looks, just click the OK button to save your changes and exit the folder properties window. Continued...
Changing the Template of a Folder
Windows XP has several different ways to display the contents of a folder. Specifically, XP has many new ways to view different types of data inside a folder. For example, if you have a folder filled with MP3 files, Windows can display new information such as the title of the song, artist, year, track #, bitrate, duration, and other data from the ID3 tags (special data that keeps track of the title of the songs, artist, album, etc.) that are stored within a MP3 file when displaying the file in Details view with the music template selected. Another example is the new Filmstrip and Thumbnails view that can be selected to easily browse through your photos on your computer.
To get started customizing the folders on your computer so that they can take advantage of the new features, you have to set the template of the folder so that Windows Explorer knows how to display the contents of the folder. This can be done by using the Customize tab in Folder Properties. Follow these steps to specify the template that should be used for a specific folder:
Navigate to the folder that you want to modify, right-click it, and select Properties.
Click the Customize tab.
Select the template that you want to use by expanding the drop-down box, as shown in Figure 5-5. The default template that is used is the Documents template. Other template options include Pictures, Photo Album, Music, and Videos. There are actually a few different subsets of music as well, but it really does not matter which one you select since you will most likely be customizing the look further in the next section. The main purpose of changing the template is so that you will have a different set of features with which you can work and customize.
Figure 5-5
click on image for full view
Also, if you have a lot of folders within this folder with the same type of content, click the Also Apply This to All Subfolders checkbox so that your changes will be propagated to all subfolders as well.
You have now customized the template of the folder and are ready to customize the view. Continued...
Customizing the view folder
Now that you have the a specific template selected for your folder, you will have a more advanced feature list to work with so that you can display a lot of useful information about the file in your folder. First, you need to be aware of the new views that you can use in Windows XP:
The default view of Windows XP is the Tiles view, as shown in Figure 5-6. This view is basically exactly the same as the Icons view, but the icons that are displayed are just a little bigger.
Figure 5-6
click on image for full view
The Thumbnails view is one of the most useful new views of Windows XP, as shown in Figure 5-7:
Figure 5-7
click on image for full view
The Filmstrip view is another very useful view that makes it easy to browse through photos on your computer. It gives you the ability to see a large sample of the image as shown in Figure 5-8, so that you can see a more detailed preview without having to open up the file.
Figure 5-8
click on image for full view
The Details view is not exactly a new view, but it has been expanded to include many new fields that display useful file information such as ID3 tags and image data, such as dimensions and camera info.
The Details view can be customized like no other view can be. All of the columns that are displayed can be resized, removed, rearranged, and more can be added. This can all be accomplished by using some of the lesser-known tricks of the interface. To start off, customize a folder that contains a bunch of MP3 files. By now, you should have already changed the template for this folder to one of the music templates so that you can use the advanced music specific features. If you have not already done that, go back to the last section to find out how. When you are ready, follow these steps to customize all of the different parts of the detailed view:
Start off by resizing the columns. To do so, just place the mouse on the vertical line that is displayed between the columns and click and hold the left mouse button while you drag the mouse back and fourth.
Now, add some of the new columns that display information from the ID3 tags from the MP3 files. Just right-click on the column heading and select one of the many new options such as bit rate. You can even select more items to add from the bottom of the pop-up menu to see a list of even more items that you can add as shown in Figure 5-9. Repeat this step until you have added all of the new columns that you want.
Most likely there will be some columns that you just don't need. To remove these columns from the Details view, just right-click on the column heading and select the item once again to uncheck it. This will instantly remove the column from the view.
The last part of customizing the view is to set the order of the columns in a way that you like the best. To change the order of a column, just grab the column header and drag it around by holding down the left mouse button and moving the mouse.
Figure 5-9
click on image for full view
If you want to customize the detailed view of a folder that contains other multimedia files such as videos or photos, just repeat the previous steps and you will see additional column features with which you will be able to customize your detailed view. Continued...
Applying your Folder Settings to all Folders
When you first use Windows XP, all of the folders are configured to use the tiles view. Personally, I don't always like to use the tiles view for all of my folders. It takes up so much screen space and I usually end up scrolling though the long lists while trying to find the file that I want. Instead, I like to use the detailed view on all of the windows by default.
To do this, you could change the settings of every folder, but there is a much easier way. Instead, just customize one folder on our computer using the sections above so that you can get it looking great, then follow the steps below to apply the same configuration to all of the other folders on your computer.
1. While the folder that you customize is still open, click on the Tools menu bar item and select Folder Options. 2. Next, click the View tab. 3. Click the Apply to All Folders button and click Yes on the confirmation screen. Also, keep in mind that when you do that, you will overwrite your configuration on all of the other folders on your computer. 4. Then just click OK to close the Folder Options window and you are finished. If for some reason you don't like what you did and want to restore all of the folders on your computer to the original look, just click the Reset All Folders button that was next to the Apply to All Folders button on the View tab in Folder Options. Continued...
If you are new to the IT profession and do not know it yet - shipment of laptops has already surpassed that of the traditional desktop over a year ago.
It is therefore interesting to note that even with such a huge installed base - and the price of an additional laptop battery costing upwards of $100, there are hardly any guides around on how to maximize your runtime when on the road.
Well no longer, you can check out this piece here on how to keep the battery lifespan of your laptop going strong in Top 15 Ways to Extend Your Laptop’s Battery Life.
But if you are the impatient sort, I have summarized a few of them here:
Defrag regularly - reduces needless hard disk seeking
Dim your screen - self explanatory
Cut down background applications
Cut down external devices
Add more RAM - reduce virtual RAM usage
Run off ISO rather than physical CD/DVD
Keep battery contacts clean
Hibernate not standby
Take care of your battery *
Get a new (more power efficient) laptop
…
(*) Where lithium ion batteries are concerned, there is no “memory effect” to speak of. However, there are actually 3 Things You Should Already Know About Your Lithium Ion Battery that I wrote earlier this year. Hope you find it useful.
How do you manage your laptop when on the road?
If you are new to the IT profession and do not know it yet - shipment of laptops has already surpassed that of the traditional desktop over a year ago.
It is therefore interesting to note that even with such a huge installed base - and the price of an additional laptop battery costing upwards of $100, there are hardly any guides around on how to maximize your runtime when on the road.
Well no longer, you can check out this piece here on how to keep the battery lifespan of your laptop going strong in Top 15 Ways to Extend Your Laptop’s Battery Life.
But if you are the impatient sort, I have summarized a few of them here:
Defrag regularly - reduces needless hard disk seeking
Dim your screen - self explanatory
Cut down background applications
Cut down external devices
Add more RAM - reduce virtual RAM usage
Run off ISO rather than physical CD/DVD
Keep battery contacts clean
Hibernate not standby
Take care of your battery *
Get a new (more power efficient) laptop
…
(*) Where lithium ion batteries are concerned, there is no “memory effect” to speak of. However, there are actually 3 Things You Should Already Know About Your Lithium Ion Battery that I wrote earlier this year. Hope you find it useful.
How do you manage your laptop when on the road?
Before I became a news editor for TechRepublic, I wasn't always so nice. In elementary school, I picked on the people who I liked the most (ok, I still do that), and I was quick to stand up for myself regardless of the situation or circumstances (uhm, yeaaah…). Some people might have considered me to be a bully, and perhaps there's a hint of truth in that, although I contribute part of that to the third child syndrome - that, and having an older brother who was very close in age and incredibly competitive.
So, with my former reputation being what it is, I was compelled to click through and read the story about a video game called "Bully" that a Florida judge wanted to review before it was released to make sure it didn't violate public nuisance laws.
If you don't have time to read the entire story, here are the important details: An anti-video game attorney named Jack Thompson (no relation, I swear) filed a motion against the release of the game. "Thompson's lawsuit likens 'Bully' to a 'murder simulator,' alleging it will teach minors about methods of bullying and school violence. He asks the court to declare the game a 'public nuisance.'"
Take-Two, the maker of "Bully," doesn't advertise the game as being violent. "…its Web page for 'Bully' says that players will be able to 'stand up to bullies, get picked on by teachers, play pranks, win or lose the girl, and ultimately learn to navigate the obstacles of the worst school around, Bullworth Academy–a corrupt and crumbling prep school with an uptight facade.'"
Check out the photo gallery: "Bully" in action.
Good gravy, this Thompson guy needs a hobby. If video games are stressing him out that much, he should take up model cars or airplanes. Seriously. With all of the graphic violence, sexual content, and adult language within video games these days, my suggestion to people with more innocent sensibilities is to stay clear of them, because no one is forcing them to play.
E-mail This 0 Comments Permalink Sonja Thompson, Ethics Officer
Date: October 25th, 2006
Blogger: Sonja Thompson
Category: News
+0Worthwhile? I'm finally making my way through recent editions of TechRepublic's IT News Digest newsletter, which I intentionally flagged in my inbox so that I could go back and blog about some of the more interesting news stories that have bubbled up to the surface.
One of these stories is about HP hiring a new ethics officer (a gentleman by the name of Jon Hoak). I took an ethics class in college, but I had no idea that there was actually a job market for this sort of position. And after all of the hoopla surrounding HP lately, I'm even more surprised that they already HAD an ethics officer (Kevin Hunsaker, who is now facing criminal charges for his role in the company's leak probe).
I've worked for TechRepublic for seven years (as of this month - the 18th to be exact), but I've never heard of such a position. Sonja Thompson, Ethics Officer. Has a nice ring to it, doesn't it? Does your company have an ethics officer?
E-mail This 0 Comments Permalink Should we pay for our zips?
Date: October 25th, 2006
Blogger: Mark Kaelin
Category:
+0Worthwhile? I don't consider myself to be cheap with my money — if I want something I'm willing to pay for it. That mentality explains the three computers, two PDAs, an iPod, LCD TV, 1,000 Music CDs, and hundreds of computer games in my library. However, I don't derive great pleasure from spending money and will avoid spending if possible.
This is the dilemma I found myself in this past month, when I considered the upgrade to my favorite zip application WinZip. I paid for a license for WinZip probably 10 years ago and have diligently upgraded to the latest version as they became available. WinZip was a familiar friend on my PC — a piece of software I could count on to do its job without complaining. It was a comfort application. But then the folks at WinZip did something unfathomable, they demanded that I pay them more money to upgrade to version 10 of their software.
And while the incentive price was half what others were asked to pay, it still did not sit well. Not that the cost was exorbitant, it is quite reasonable, it is the fact that my license purchased way back when was what I considered to be "lifetime" license. The idea of paying again for the same software, like I was dealing with some big outfit like Microsoft or Apple, just never occurred to me.
With so many compression applications floating around, not to mention the fact that Windows XP comes with one built-in, it is just not possible for me to justify to myself the, measly though it is, $15 expense. Just yesterday, we ran a photo gallery of a compressing utility that is completely free to use, 7-Zip. I can find no reason to pay for the upgrade to WinZip and so another application staple on all my PCs is going away. I guess it is true what they say: The only constant in life is change.
What compression application do you use and would recommend I try?
E-mail This 0 Comments Permalink How many pumpkins does it take to operate a mobile phone?
Date: October 18th, 2006
Blogger: Sonja Thompson
Category: Off-topic, Mobile Phones, News, Power
+0Worthwhile? I planted pumpkins in my garden this year. Sure, you might think "big whoop" - but some countries in Africa are putting the pumpkin on top of a pedestral (figuratively speaking, that is) because it's generating electricity to help power mobile-phone networks. Check out the news story: "Pumpkin oil to power African phone networks."
According to the article, "Swedish telecom Ericsson and South African cell phone operator MTN said on Wednesday they want to start replacing diesel with biofuels in electricity generating stations powering mobile-phone base stations in rural Africa… Starting in Nigeria, Africa's most populous nation, fuel will be processed from palm, groundnut, pumpkin seeds, and jatropha… Ericsson estimates that around 0.5 square kilometers of palm oil crops are needed to generate the fuel for 20 base stations, the equivalent of 83 football fields."
My pumpkin patch was completely overgrown about a month and half ago, with vines trailing through the fence and into my neighbor's backyard. However, all I have to show for my hard labor is ONE lonely pumpkin. That wouldn't even generate enough juice to light the background screen on my cell phone. Good-bye biofuels, hello jack-o-lantern!
E-mail This 0 Comments Permalink Aztec pyramids, brochures, and aliens… Yahoo!
Date: October 18th, 2006
Blogger: Sonja Thompson
Category: Off-topic, News
+0Worthwhile? I take both of my jobs very seriously - a news editor for TechRepublic and a parent at home. While both of these roles are very different, I absolutely love it when they coincide, as they did last week when I ran across a news story about Mexico prohibiting Yahoo from placing lasers on top of Aztec pyramids. See the article: "Mexico to Yahoo: Not on our pyramid."
Let me explain…. My son is in 5th grade, and one of his social studies projects was to create a brochure about the Mayan or Aztec civilizations. He chose the Aztecs, I'm sure because there was more information about the Mayans in the book, and so he thought a Mayan brochure would require more work! However, I encouraged him to do some online research about the Aztecs, and I helped him compile and arrange the information into his brochure.
I learned a lot about the Aztecs, such as information about their culture, religion, technology, and monumental structures (ahhhh…. the pyramids). I helped my son search for the best Aztec pyramid pictures on the Internet. We selected a couple, printed them off, and he glued them to his brochure.
The very next day - the date the brochure was due - I ran across the Yahoo news story. The photo gallery that accompanied the article was spectacular… these photos were far better than any I had run across the day before. Check out the gallery: "Yahoo kicked off of pyramid."
Here's the low-down on the actual story - "Yahoo launched the project this [last] week aimed at gathering text, images, video, and sounds submitted by visitors from all over the world through 20 of the company's multiple-language sites. The information was to be beamed by laser into space on Oct. 25 from the Pyramid of the Sun at Teotihuacan, once the center of a sprawling Indian empire, in an attempt to communicate with extraterrestrial life." However, Mexico's National Institute of Anthropology and History intervened and said that the Yahoo event posed "technical and operational problems that might damage Teotihuacan."
I wonder if Yahoo has alternate plans to try contacting aliens, and I wonder if those plans will coincide with my son's next homework project!
E-mail This 0 Comments Permalink 64 percent of online gamers are women
Date: October 12th, 2006
Blogger: Sonja Thompson
Category: Women, Games, News
+0Worthwhile? I've chatted it up quite a bit on TechRepublic about women in gaming, and so every time I see a news story that relates to this topic, I have to give it a little love. Take a look at this recent news article: "Women outnumber men in online games, survey finds."
From the title alone, are you finding this hard to believe? Here are some tasty little morsels of the article for easier digestion:
"Of the 117 million active gamers in the U.S., 56 percent play games online. Sixty-four percent of those online gamers are female, according to results of the survey, released by Nielsen Entertainment."
Who exactly is an active gamer? "The survey defined active gamers as those who are 13 years or older, own at least one game device, and play at least one hour of video games a week… Nielsen surveyed 2,200 active gamers online in July."
What types of games devices did the study examine? "Game devices include game consoles, personal computers, and handhelds." The beloved PC was listed as the platform of choice. "Sixty-four percent of those who regularly played video games, played on PC-based systems."
Still surprised? I think with all of the media that women in gaming has received over the past several months, quite a few females who previously didn't play games have raised their eyebrows and started bending their opposable thumbs.
E-mail This 0 Comments Permalink 30-somethings dominate MySpace
Date: October 9th, 2006
Blogger: Sonja Thompson
Category: Networking, News
+0Worthwhile? MySpace isn't just for teens anymore, or at least that's what comScore Media Metrix claims in a recent study. In fact, the results show that 51.6 percent of U.S.-based visitors on MySpace in August of 2006 were 35 or older. Check out the news story: "MySpace drawing 'older' visitors, study finds."
According to the article, "The percentage of total visitors to MySpace aged 12 to 17 dropped from nearly 25 percent last year to about 12 percent in August. The percentage aged 18 to 24 has decreased only slightly, from 19.6 percent last year to just more than 18 percent this year."
It's confession time… do you have a profile on MySpace?
E-mail This 0 Comments Permalink Hot techie toys for the holidays
Date: October 5th, 2006
Blogger: Sonja Thompson
Category: Gadgets, News, Nintendo Wii
+0Worthwhile? Have you started shopping for your tech-centric co-workers, friends, and family? Your kids might be especially interested in checking out the “Hot Dozen” list of must-have holiday toys released by Toy Wishes magazine. Take a look at the news story: “Wii, T.M.X. Elmo make ‘Hot Dozen’ toy list.”
The article lists the “Hot Dozen” in alphabetical order:
Barbie and the 12 Dancing Princesses by Mattel
Bratz Forever Diamondz by privately held MGA Entertainment
Butterscotch My FurReal Friends Pony by Hasbro
Digi Makeover by Radica, which is now owned by Mattel
Fly Wheels XPV by Jakks Pacific
Kid Tough Digital Camera by Fisher-Price
Lego Mindstorms NXT by Lego
Magtastik by Mega Brands
Monopoly Here & Now by Hasbro
Speed Stacks StackPack by Jakks Pacific’s Play Along
T.M.X. Elmo by Fisher-Price
Wii by Nintendo
Some of the more advanced technology toys come with a heft price tag, such as Hasbro’s Butterscotch pony that has sensors that respond to light and sound for $299.99, Lego’s Mindstorms NXT “robotics toolset” for $249.99, and Nintendo’s Wii game console for $250.
Are there other techie toys that you have your eye on for this holiday shopping season? Please send your gift ideas my way!
E-mail This 0 Comments Permalink Do you bypass blogs when it comes to big news stories?
Date: October 3rd, 2006
Blogger: Sonja Thompson
Category: News
+0Worthwhile? When you are seeking the nitty-gritty details of big news stories, do you bypass blogs and go straight to Web sites that have a reputation for delivering up-to-date, accurate information? According to this recent news story, that’s exactly what the majority of people do: “Survey: For big news, consumers bypass blogs.”
LexisNexis conducted a survey of 333 business professionals and 1,167 consumers between the ages of 25 and 64. Here are a couple of the results:
Fifty percent said they turn to traditional media like television, radio, and newspapers as their primary source for information during major events such as hurricanes over “emerging media” (which is defined as Internet sites by citizen journalists in the form of blogs, podcasts or Internet-only publications).
Fifty-two percent of the consumers surveyed said they will probably stick with traditional news sources (including mainstream Internet news sites), while 35 percent said they would rely on both traditional and emerging media. Thirteen percent said they will rely primarily on emerging media for their news in the future.
I would be interested to see this study broken up by age groups. I believe the results would shift towards emerging technology with the younger generation. Traditional news sources aren’t a thing of the past, but blogs and podcasts continue to make ground in the news popularity contest. Do you bypass blogs when it comes to big news stories?
Reports from Ars Technica and The Register point to the spread of variants of Trojan viruses classified as ransomware. The viruses encrypt user data and threaten to publish them over the Web if the quoted amount is not paid.
Trojans encrypt users’ files so that they can no longer be accessed. The Trojan then plants a readme.txt where users will find it, and inside, demands $300 in order to decrypt the files. The ransom note tells the user in broken English that the files have been encrypted using RSA-4096 and that unless cold, hard cash is forked over within a period of time, the content of the files will be shared with the world and then deleted.
Apart from the fact that virus writers seem to be using varied ways to monetize from security threats, users need to note that the virus apparently spreads over open ports and not as file attachments. If you’re infected by this sort of virus, don’t panic and definitely DON’T pay up! Agencies are working on finding a way to decrypt the files, and the decryption solution will be available soon.
1. This screencast shows how to create a Facebook Platform application that you can use as a template for your own Facebook applications.(03:35):
http://www.thescreencast.com/2007/06/getting-started-with-facebook-platform.htmlhttp://www.sprocket2cog.blogspot.com/
http://www.morphography.uk.vu/bumpmaps.html
http://www.skeptictank.org/flist135.htm
http://www.ugcs.caltech.edu/~jedwin/baldur.html
http://blogs.techrepublic.com.com/tech-news/?p=805
Wednesday, July 25, 2007
Subscribe to:
Posts (Atom)