Вы находитесь на странице: 1из 115

Digitally signed by Ccucu

DN: cn=Ccucu, c=US, o=Ccucu,

Ccucu ou=Ccucu's WareZ, email=forumc.


tk@gmail.com
Reason: I am the author of this
document
Date: 2005.07.27 14:10:25 +03'00'
Windows vulnerable to The vulnerability has not yet been
exploited, Microsoft claims. But
DoS attack security experts at the SANS
Institute reported an increase in
A recently discovered defect in scanning for port 3389, the one
Windows has made the software used by RDP. This may imply that
susceptible to a remotely hackers are looking for
accessed denial of service attack. defenceless systems.

The defect in the Remote Desktop


Protocol could affect Windows XP
SP2 users, as well as those using
Windows 2000, Windows XP SP1,
Windows XP Professional x64,
Windows Server 2003, Windows
Server 2003 SP1, and Windows
Server x64.

A patch will eventually be issued,


but for now Microsoft advises
users to block the port used by
RDP (TCP 3389), or disable
Terminal Services or Remote
Desktop.

Microsoft issued a security


advisory on Saturday
downplaying the risk. "Our initial
investigation has revealed that a
denial of service vulnerability
exists that could allow an attacker
to send a specially crafted Remote
Desktop Protocol (RDP) request to
an affected system", the company
said, which would cause affected
computers to crash over and over
again.
Email virus hoaxers, The email contains the following
text, users are urged to ignore it.
cold as Ice Like all hoaxes, poor spelling is a
good sign it's a sham.

You know the email that's gone


round saying put ICE then a
contact number in case of
emergency? Well don't do it cos....

Be very careful with this one -


although the intention is great it is
unfortunately phase one of a
phone based virus that is laying a
Mobile phone viruses are being path for propagating very quickly.
used as an excuse to send a hoax Passing it on is part of the virus
email that, ironically, does not interestingly, such is the
actually contain a virus. deviousness of the people who
write these things.
In the wake of the London
bombings many organizations
have been suggesting that users
should put a contact under the
name of "Ice" on their phone. The
acronym stands for "In Case of
Emergency," and is becoming
increasingly popular.

But email hoaxers are claiming


the entry will provide a port for a
new mobile phone virus that We have already seen the "second
specifically searches for the entry phase" where a program is sent
"Ice." Virus experts have as part of a ring-tone download
dismissed the emails. that goes into your address book
and looks for something it
"Brain-dead pranksters have recognises - you've guessed it, an
started a chain-letter email address book entry marked "ICE
warning against such practices, or I.C.E." or whatever. It then
because a mobile phone virus sends itself to the "ICE list",
might exploit it. This is charging you for the privilege.
nonsense," said Mikko Hyponnen,
director of antivirus research at
Finnish company F-Secure. "No
viruses to exploit the "Ice"
number exists or are likely to
exist."
Company porn creates that detect porn banned by their
policies, we were alarmed to find
regulatory nightmare the relatively low awareness of the
risk of legal ramifications and
potential exposure among those
responsible for the company's
Acceptable Computer Usage
policy."

IT directors are putting


businesses at financial risk by not
enforcing regulation linked to
porn prevention in the workplace.
The surveys also highlighted large
Two surveys of U.S. and U.K. discrepancies in how many staff
businesses found that over half of were disciplined for unacceptable
those who responded were not usage in U.S. and the U.K.
aware lawyers use company Whereas 70 percent of U.K. firms
internet records for evidence of had taken action against staff for
sexual harassment, workplace violating policy only 40 percent of
harassment and hostile work U.S. companies have done the
environments. same.

Almost two thirds were unaware


that child porn, its distribution and
consumption, is high on the FBI's
list of priorities over the next two
years, possibly resulting in
investigations into company
records.

"We were not surprised to see that


almost all leading organizations
surveyed have a computer usage
policy in place," said Alain
Recaborde, principal of Delta
Consulting, which conducted the
surveys of the largest 500 U.S.
and U.K. firms. "But given the
high percentage of organizations
"Clearly anybody using Google
needs to be aware of its policies,"
Google turns into ugly said Graham Titterington,
security risk monster principal analyst at analyst
company Ovum. "For example,
people assume email is more
secure than it actually is. You
should think about what data you
want to go to Google and what to
keep."

Google's email policy and rapid


growth is making it the security
risk of the century, an expert is
warning.

Chris Hoofnagle, senior counsel


at influential lobbyist group the
Electronic Privacy Information
Center (Epic) said that protecting Titterington suggested that
personal information is going to anyone concerned after reading
become increasingly difficult as Google's policies should opt for a
Google expands its search and paid, more private, service
email operations. instead.

"This is a lot of personal


information in one basket," said
Hoofnagle in an interview with
Associated Press. "Google is
becoming one of the largest
privacy risks on the internet."

Hoofnagle was keen not to


criticise Google's security policy
but suggested that due to the fact
it harvests far more information
than perhaps any other single
organisation, it will become a
major target for criminals.
Black Hat puts hacker administrators reasons for why they
should report intrusions to law
on mock trial enforcement. Justice Department
officials have complained that
LAS VEGAS--A raucous conference relatively few intrusions--almost all of
crowd heard real-life attorneys battle which would violate federal law--are
over a hacker's guilt in a mock trial reported to police.
held to illustrate how slippery
electronic evidence can be in
computer crime cases.

The mock trial, staged Wednesday


at the Black Hat Briefings security
conference here, centered on
whether a video game designer had
violated federal criminal laws by
helping someone to break into U.S.
Air Force computers.

In the government's evidence were


purported e-mail messages without
headers, and representations of
Internet Relay Chat conversations--
both of which can be altered without
leaving a trace.

Richard Salgado, a computer crime


prosecutor with the U.S. Justice
Department in Washington, D.C., In the mock trial's scenario, a
said that he participated in the mock disgruntled employee of GetA
trial to demonstrate to the Entertainment helped a teenage boy
conference audience what types of to enter an Air Force computer and
records should be kept to aid in use it to attack GetA's servers and
possible criminal prosecutions of modify character information.
electronic intruders. In evidence, the teenager admitted
to the intrusions, but said a designer
"It shouldn't be scary," Salgado said. at GetA Entertainment nicknamed
"A lot of people in the audience are "Weasel" had provided him with the
going to be the first responders, undocumented commands and the
collecting the evidence...They really unpublished Internet addresses that
need to think of us." made the break-in possible.
Salgado co-authored the Justice
Department's 2002 cybercrime "It's an area where we see a few
manual. He also wrote a Justice cases, but obviously as technology
Department bulletin in March 2001 blossoms and the potential for civil
that offered network and system and criminal litigation increases, we'll
see more," said U.S. District Judge
Philip Pro, the chief judge for the Microsoft.co.uk
Nevada district.
defaced in hacking
Pro said that he has participated in attack
mock trials convened by economists
and forensics scientists before, but
Microsoft.co.uk was defaced late on
that a computer security theme
Tuesday night with a message in
before a boisterous audience of
support of Venezuelan hacker Rafa.
hundreds was a novelty for him. In
Apocalypse hacked into Microsoft's
any kind of complex technology
UK web site (microsoft.co.uk) and
cases, Pro said, the key was for
uploaded a picture with the message
attorneys and technical experts to
"FREE RAFA - HACK IS NOT A
"use knowledge that the average
CRIME".
person can understand."
According to Microsoft spokes man
the pic has been removed as told to
theregister.co.uk . But the pic is still
there .

Salgado acknowledged that the facts


of the hypothetical case were
fanciful--such as what happened to a
virtual Pfizer's Rod of Endurance, a
piece of evidence--but the underlying
legal lessons were not.

The scenario was "based on


recurring patterns," Salgado said. "It
was intentionally designed to keep
the audience's interest."

The mock trial, which lasted three


hours, ended with a hung jury. Jury
members were chosen randomly
from conference attendees. Jennifer
Granick, director of Stanford
University's Center for Internet and
Society and mock defense counsel,
applauded the verdict, saying "any
hung jury is a win for the defense."
Hackers leak NASA In separate announcements, Visa
and American Express said they are
directory ending their relationships with
CardSystems Solutions Inc. in
Hackers have released the phone, Atlanta because the company didn't
email, and address directory for meet its contractual requirements in
NASA online. The directory contains providing processing services for
over 1000 associates, affiliates, merchants that accept the credit
engineeers, scientists, and friends of cards. The companies will no longer
NASA. NASA has yet to comment on allow CardSystems to process their
the situation. The directory was transactions after October.
released by SheepByte of the hacker
zine 'TIZ'.

Rosetta Jones, a spokeswoman for


San Francisco-based Visa, said in a
statement that the action against
CardSystems comes "after an
internal and forensics review of its
Visa, Amex cut ties processing practices demonstrated
that -- in violation of Visa's rules -- it
with processing firm did not have the appropriate controls
hit by security breach. in place to protect cardholder
information."
After October,
CardSystems won't be "Despite some remediation actions
taken by the processor since the
allowed to process initial reporting of the data
their transactions compromise, Visa cannot overlook
the significant harm the data
compromise and CardSystems'
Visa U.S.A. Inc. and American failure to maintain the required
Express Co. are terminating their security protections has had on Visa
contracts with a credit card member financial institutions and
transaction processing company that merchants, as well as the significant
was hit by hacker attacks, potentially concerns it has raised for
exposing 40 million card numbers to cardholders," Jones said.
online intruders. "CardSystems has not corrected,
and cannot at this point correct, the intruders who apparently infiltrated
failure to provide proper data CardSystems' network (see Security
security for Visa accounts." breach may have exposed 40M
credit cards). A MasterCard
spokeswoman said the credit card
company's fraud-detection system
first became aware of the infiltration
in May and the company promptly
launched an investigation into the
breach.

In a statement yesterday, Purchase,


N.Y.-based MasterCard said it will
continue to allow CardSystems to
provide transaction processing
CardSystems apparently kept credit
services because the company has
cardholder data on file after the
worked to improve its security and
transactions were processed, in
procedures since the earlier
violation of its agreement with Visa,
incidents.
she said. Because the data was still
on file, it could be accessed by
"MasterCard has required
intruders. "Visa's security
CardSystems Solutions to develop a
requirements were adopted precisely
detailed plan to bring its systems into
for the purpose of protecting
compliance with MasterCard security
cardholder information and guarding
requirements by August 31, 2005,"
against the type of data compromise
the statement said. "MasterCard is
recently experienced by
holding weekly meetings with them
CardSystems," Jones said.
to monitor progress, and as of today,
we are not aware of any deficiencies
in its systems that are incapable of
being remediated. They have
Judy Tenzer, a spokeswoman for
already ceased storing sensitive data
New York-based American Express,
in accordance with MasterCard
would not comment on the direct
rules.
cause for the termination of the
processing arrangements with
CardSystems.

A spokesman for CardSystems didn't


respond to numerous messages left
by a reporter today.

Last month, MasterCard


International Inc. announced that
13.9 million of its credit card
numbers were among the 40 million
that may have been accessed by
"However, if CardSystems cannot High-tech deception
demonstrate that they are in
compliance by that date, their ability helps workers
to provide services to MasterCard
members will be at risk," the
statement said.

Transaction processing companies


such as CardSystems process
transactions for merchants that
accept credit cards from retail
purchasers. The credit card
companies certify the processing
companies to provide the services.
Merchants that have used SAN FRANCISCO, California
CardSystems as their provider will (Reuters) -- High-technology tricks
be able to choose another once seen as the purview of
processing company to provide the hackers are now in the hands of
services once the agreements with ordinary office workers.
Visa and American Express are
ended, said Tenzer of American Gadgets these days are full of
Express. surprises with growing powers to
manipulate or deceive in the
workplace.

Simple tricks allow one to appear to


be hard at work in the office while
actually forwarding calls, e-mails and
instant messages to your mobile
phone.

One can backdate e-mails through


SyS64738's comment: this is a very rolling back a computer's built-in
good example on how a security clock or use background phone
breach can compromise the financial noises to concoct convincing
status of a company leading to excuses not to go to work.
bankrupcy. Any doubt CardSystem is
not yet filing the bankrupcy "Instead of being a slave to
procedure? We are sorry for its technology, you can master it, you
employees though, who are the first can make it look like you are working
direct victims of such cyber attack... when and where you are not," said
Marc Saltzman, 35, the author of
"White Collar Slacker's Handbook"
published in June.
Saltzman says computer trickery has minute amount of technical savvy
become mainstream as the not- you can wreak a lot of havoc."
super-tech savvy people seek ways
of coping with a 24/7 work culture He cited a recent case of nine-year-
and the increasing inability of people olds who scanned dollar bills into a
to dodge uncomfortable questions in computer, printed out the fakes and
an era of always-on broadband, used them to buy snacks at their
mobile phone and instant messaging school's cafeteria.
connections.
"With an inkjet printer you can create
"Just because you can be reached virtually any document that you want
everywhere does not mean you have to these days," Reynolds said.
to be in touch all the time," Saltzman
said in a phone interview. "The Reversing time
question is how do you turn the
tables?" Missed a deadline? No problem.

One simple trick to "reverse" time is


to backdate the clock settings on
your computer. E-mails will then
appear to have been sent earlier. Of
course, workers need to remember
to reset their clock to the correct time
afterward.

"It will certainly prove that you sent


the e-mail when you said you did,"
The book, published by technical Saltzman said. "You can just blame
publisher Que, provides a how-to the delay on the network."
manual for computer users to tell
little white lies to deceive friends and In Japan, the land of a thousand
colleagues. face-saving apologies, consumers
can invent convincing sounding
But the ease with which technology excuses for bosses or spouses by
can be used to bend the truth can using a small keychain device with
just as easily be used for criminal pre-recorded sounds that allows
activity such as identity theft and users to pretend to be where they
other crimes. are not.

"Technology and computers have "Alibi Intersection," as the device is


given dishonest people an ability to known, comes with six buttons that
pretend that they're someone they're generate noises such as driving a
not," said Martin Reynolds, an car, standing in a train station or
analyst at technology research firm hearing a front-door chime. A
Gartner Group. "Now, if you have a software version for mobile phones
that goes by the name of
SoundCover in Europe and Another trick is to sign onto instant
Soundster in the United States is messaging systems from home to
available. make it look you are already at work.
If your boss isn't in the same office
The noises lend aural authenticity to as you, it appears as if you are at
excuses when played in the work early. You can also decide
background of a mobile phone whether to disable the away feature
conversation. on your buddy list.

Users of Microsoft Outlook, the most If you are really worried your boss
popular e-mail management may try to contact you, have Instant
program, can make their bosses Messenger (IM) messages
think they are burning the midnight forwarded as a test message -- a
oil by composing e-mails that they separate mobile phone technology
set up to be sent out far later, say at that works in similar ways to IM on
one in the morning. computers -- Saltzman suggests.

Analyst Tim Bajarin of research firm


Creative Strategies said that while
computer trickery has become a fact
of life, it is concentrated among
younger workers who are more
comfortable with new technologies.

"The older computer user pretty


much lets the computer lie. They
won't tinker because they are
worried they are going to screw the
machine up," Bajarin said. "Most of
this group hasn't figured out how to
set their videocassette clock yet."

In Outlook, under options, the user


can check the box for "Do Not
Deliver before" option. Then choose
the time and each subsequent
message will be held in your Outbox
until the appointed hour.
USC says database "We are quite confident that there
was no massive downloading of
hacked data," Harrington said.

LOS ANGELES, California USC learned of the breach June 20


(Reuters) -- A University of when it was tipped off by a journalist,
Southern California database Harrington said. It has since shut
containing about 270,000 records down the Web site and has notified
of past applicants including their people whose names and Social
names and Social Security Security numbers were in the
numbers was hacked last month, database of the security breach.
officials said Tuesday.
The university was not able to
identify exactly which records may
have been exposed.

The site will be back up once new


security measures are taken, the
university said in a written statement.

A California law that took effect two


years ago requires institutions to
inform those affected when their
personal information has been stolen
The breach of the university's online
or accidentally released.
application database exposed
"dozens" of records to unauthorized
A number of states are considering
individuals, said Katharine
similar legislation, and a bill is
Harrington, USC dean of admissions
pending in the U.S. Senate that
and financial aid.
would also require institutions to tell
people when the privacy of their
She could not be more specific about
personal information has been
the number of people whose
compromised.
personal data may have been
viewed by the hacker or hackers or
Consumer advocates say such
what their motivation was for the
notification is important because it
computer break-in.
provides an opportunity for
consumers to put a fraud alert on
"There was not a sufficiently precise
their credit file.
tracking capability," Harrington said,
but added that the hackers had not
Identity theft is the top consumer
been able to access multiple records
fraud complaint, according to the
at once. Records were also only able
Federal Trade Commission, which
to be viewed at random, she said.
estimates that some 10 million
people are affected each year.
Sasser author gets or a retirement home, Kreutzfeldt
said.
suspended term
Prosecutors say Jaschan sent the
If U remember last months issue of computer worm on the Internet on
WareZ News Magazine, you should his 18th birthday, April 29, 2004.
remember that we talked about the
returning of the Sasser Virus. Well, It was blamed for shutting down
the author had been caught…. British Airways flight check-ins,
hospitals and government offices in
Hong Kong, part of Australia's rail
network, Finnish banks, British Coast
Guard stations, and millions of other
computers worldwide.

The court said it was impossible to


estimate the amount of damage. So
far, no international civil suits have
yet been filed, officials said.

Four German lawsuits were settled


for under €1,000 each, said Arend
Bosse, spokesman for the
Rotenburg-Wuemme State Court.

BERLIN, Germany (CNN) -- A Jaschan was caught last year after a


German court has convicted the tipster cashed in on a $250,000
teenager who created the Sasser reward offered by Microsoft, whose
worm that snarled tens of Windows system was prey to the
thousands of computers last year virus.
and sentenced him to 21 months'
probation. Microsoft says the virus was part of a
growing problem: hackers profiting
Sven Jaschan, 19, from the from Windows vulnerabilities
northwest town of Waffensen, could revealed by patches. The virus
have faced five years in prison as an appeared 18 days after the company
adult but was tried as a minor posted a patch to fix a flaw, and it
because the court determined he attacked computers that hadn't
created the virus when he was 17, downloaded the patch.
said Katharina Kreutzfeldt,
spokeswoman for the Verden State Jaschan, who reportedly spent up to
Court outside Bremen. 10 hours a day on his homemade
computer, told Stern Magazine in an
As part of the sentence, Jaschan will interview that he created the virus,
have to perform 30 hours of which he called "Netsky A," to
community work, either at a hospital combat two existing viruses,
Mydoom and Bagle. That led him to sites and products, including pornography,
develop the Netsky virus further -- and other methods to separate unsuspecting
users from their money. The term originated
and to modify it to create Sasser. from a Monty Python skit referring to the
canned meat product of the same name.
Jaschan, meanwhile, has taken a job Phishing is a method where spammers use
at a computer company that creates legitimate looking e-mails (appearing to
anti-virus programs. After three come from a credit card company, for
example) in attempt to get personal
years, Jaschan's conviction will be information that can be used to steal a
erased from public record if there are user's identity.
no new offenses, Kreutzfeldt said.
Spyware/adware
Authorities who questioned Jaschan These are applications that are usually
said they believed his motive was to downloaded unknowingly, often included in
a "free download" of some kind. These
become a famous programmer. He programs can overtake a computer's
was arrested at his computer at the available resources (memory, hard drive
home of his mother, who runs a space and Internet bandwidth), adversely
computer store. affecting its performance. Spyware is an
application designed to collect information
on a user, usually to build a marketing
SLANGS! profile. Adware refers to a program that will
"pop up" advertising on a users computer. A
user's surfing habits can trigger this
I write this because I got questions… advertising, so that the ad better targets the
people don’t know what these words user.
mean or they confuse them, so here
is a list of definitions: Virus/worm/Trojan horse
These prorams are designed to disrupt the
Denial of service use of a users machine. They are often
Denial of service is an attack on a site or downloaded unknowingly from Web sites or
service that overwhelms a Web site's as attachments in e-mail. A Trojan horse is a
servers with requests or messages, thus program that is not what it appears to be.
preventing users making legitimate For example it may purport to be a program
requests. to play a certain kind of video, and then will
do some harmful action instead. A worm is a
program designed to replicate itself and
Hacker/cracker/script kiddie
infect as many systems as possible.
A hacker is a skilled computer programmer
who enjoys pushing the limits of computer
systems. The term hacker has come to have
a negative connotation, implying that all
those who "hack" mean to do harm. Cracker
is the term created by the hacker community
to describe those who break the security of
a computer system -- usually with
malevolent intent. A script kiddie (also script
kitty or script bunny) is someone with little
experience who slightly alters code written
by others

Spam/phish/phishing
This is unsolicited e-mail, usually sent out in
mass or bulk to several recipients. Spam is
largely made up of advertising for various
So, we came to our Free programs? Heck yes, sounds
like a plan to me..Cracks, serials?
second encounter with Huh? I needed those to completely
a MASTER OF WAREZ. own the program..That is never
guarantied...And sometimes it meant
This month I want you going to four or more websites
all to meet talkintina, before downloading or receiving the
crack or serial number..Voting and
the real Mistress of pop ups were out of control. Then I
WareZ. I admire her for learned about forums..Wow a
community setting with people all
her dedication and for over the world..Seeme like good
her knowledge, but I down to earth people with a lot of
knowledge. I remember being on a
think it’s better to hear site just about 2 years ago and I had
it all from her…. a question but could not find an
answer...I had been going to that
forum for about a month and I was
After becoming a member of a observing to see who was who, who
popular instant messenger program seemed like they knew something..I
on the internet, I trusted the wrong finally made my choice and looked
person...He used his hacking skills to up that member's profile..Kewl, there
get into my computer and plant was an email address so I sent him
things that would eventually be used my question via email. Let's call him
against me..So he thought...When Mike...He was very patient and helful
his plan backfired, he tried to hack and we just seemed to
into the BIOS System of my connect..Mind you, it is hard for me
computer and destroy it...But he to trust anyone in warez because of
failed again. It was definitely my IP my prior experiences.Mike kind of
number but not my computer..My took me under his wing and taught
boyfriend had just moved in and he me a lot of things.. Before you knew
had a nicer computer so I suggested it we were talking on the phone and
he hook his up in my bedroom, became very close..Or did we? I
where my had once been. The always remembered my so called
hacker did succeed at destroying the friend who tried so hard to destroy
computer temporarily, but it the one me..Well, Mike lives in the same
my boyfriend owned instead of place as the jerk that tied so hard to
mine.. Turned out my new boyfriend get me..But I trusted Mike
knew a thing or two about hackers anyway...From their I had a mentor,
and warez..I started asking sort of speak..He stuck by me and
questions and learning everything I continued to teach me..And he sure
could possibly learn. It didn't take was smart..I spread my wings and
long before I found a new started venturing to new warez
hobby...Exploring the Warez World.. sites.. I made lots of friends...Mike
That was about 9 years ago and I had to go away..He asked a friend to
must say I have learned a lot. watch over me while he was away..I
had lost my job and became very and feel I have learned some
involved in the warez world..So valuable lessons in life..
much so that this friend of Mikes
asked me to work with him building a written by TalkinTina
new site..Graphics was the start of it 7/02/05
for me..We became good
friends..We opened the site which
was very successful.. Each day we
worked and while working discussed
what was happening in our lives..
Before long we knew everything
about each other.. I was so happy
being a part of the Admin of this
site..I found people who I became
friends with..Or did I? Mike returned
to find we had opened the site which
was kicking butt...Jealousy? You
bet...Life is no different when you are
in cyber world than it is on the
streets. I tried to stay nutral between
the two long time friends but
eventually found myslef being
treated as the bad guy by
both..Others became involved and
them there were tests, or games as I
say...My loyalty to whom was at
stake.. I did learn at that point that
your computer is nothing more than
a box..You cannot see or feel the
emotions of who ever you speak
to..You have no clue as to who they
are, what they look like, etc...It was a
valuable lesson to learn.
I did not find many females that were
involved in the Warez World...I did
learn a valuable lesson or
two...Always remember that it is only
a box and you do not have any idea
who the person on the other side
might be.. As far as being a female
in the warez world....It has been an
experience I can never regret, but
only learn from..Today I can build a
These are some samples I wanted
computer from scratch, I have my you to see from tina’s works. Me and
own website, spend several hours tina are waiting for your opinions.
each day making graphics for others
We decided to take some peegee :If you notice I mainly
specialise in XXX because I have
interviews these month of been surfing for 5 years now and I
both old and new have joined a lot of forums over the
members to our forums. years and have found some
wonderful places
So I want you to meet Ccucu: that's nice. And what makes you
peegee and post more and more? What is your
goal?
klair_di_sardari peegee :My theory is to post
regularly so the forum does not go
Ccucu: First: please tell us who U are: stale and I have noticed lately that
Name(nick), age and location our new members are not posting,
peegee : Name:Freddo so we must lead by example. I also
peegee : Age: 52 - Location East enjoy the porn cult following that I
Coast of Australia seem have picked up.
Ccucu: When did U register to Ccucu's peegee : My goals are simply to be a
WareZ? And what made U register? Or part of a great team and maybe one
where did U hear about us? day get into the top posters list
peegee : Bouncing around the Ccucu: and how do U select the
hacking library I picked up a link to a posts? You take everything or you
warez site and ccucu's had a post on have a search criteria?
this site, that's how I found you. Then Number 1 criteria is Variety, 2.
I hung around for about a month to Quality, 3. Size
see how things worked so I would peegee : Not now only here
not make a fool of myself when first Ccucu: Are U part of the team on other
staring to post forums?
Ccucu: And you managed to make a peegee : I used to be a moderator at
great job! you are part of the team there novawarez & Administrator at h-
and hope to keep it this way for long
warez but both are now shut down
time from now
Ccucu: that's sad
peegee :Thank you for the peegee : I used to get a lot of good
compliment, ccucu's is my home, I post from them as well as new
like the way we all get on we're a members
cool group with the same idea in Ccucu: so, beside warez what are your
mind & that is too make this forum hobbies?
the best peegee : Car racing, Rugby Leauge,
Ccucu: So, with warez where did U Fishing and kinky sex
start? Ccucu: lol, that's nice
peegee : I started in the free warez Ccucu: you have a race car?
sites because I do not believe in peegee : I used to race cars but too
paying for anything but I love to expensive had to give it up
share, it's the ukrainian in me. Ccucu: yes, and rugby? you play?
Ccucu: yes, that's right... that's the peegee : Used to play, too old now
warez philosophy, as I see it Ccucu: so, now fishing and kinky sex is
Ccucu: So, when U post, how do U find good :P
the progs? peegee : YES :D
Ccucu: first question: name, age, Ccucu: I presume this is your main
location hobby, right?
klair_di_sardari: Nick name:- klair_di_sardari : Yes, This is my
PINKU hobby, I am in this field from 1 Year
klair_di_sardari : Age:- 16 Ccucu: so beside phones, you have
Location:- India any other hobbies?
Ccucu: when did U registered on klair_di_sardari : Humm, I hav
Ccucu's WareZ? hobby of Mobilez, Computer and
klair_di_sardari : from 3 weeks Forumz
Ccucu: ok, so in 3 weeks you made Ccucu: and this takes all your time
yourself a name there and got some Ccucu: I guess you are a student, right?
posts. So, why did U register and why klair_di_sardari : Yeah, I am
do U post? student
klair_di_sardari : I registered here klair_di_sardari : i am in school
becouse to share stuff, and I post Ccucu: What do U study?
here because this is my hobby klair_di_sardari : I study Science, I
Ccucu: how much time are U spending am in 11th class
on the site(average/day)? Ccucu: Any thing you want to mention
klair_di_sardari : I spend about 5-6 or add?
Hourz/day klair_di_sardari : I want to say a big
Ccucu: and in this time, how many thanks to CCUCU
posts you make? Ccucu: what for?
klair_di_sardari : i make about 30- klair_di_sardari : for taking ur
40 posts and sometimez more than priceless time for me.
40 Ccucu: lol, my time isn't that precious...
Ccucu: that's good. Where do U find the I am taking your time.... maybe you had
links? Or is it a secret? something better to do then talk to a
klair_di_sardari : i find links from crazy dude
other sites, like other forumz klair_di_sardari :: nono, i am feeling
Ccucu: and how do U select the posts? lucky to talk with U.
You take everything or you have a Ccucu: don't have too, feel lucky if U
search criteria? get the chance to talk with WiZz, not
klair_di_sardari : I search for best with me, he's the great MAN
posts, so users can easily
understand it.
Ccucu: Are U part of the team on other
forums?
klair_di_sardari : I am Moderator on
other two sites and i am Super
Member on 3-4 sites
Ccucu: That's good, so you have
experience :D
Ccucu: Where did U start? Some call
the place where they start the net
home... for instance mine is WiZzWorld

klair_di_sardari : I start everthing


from forum.gsmhosting.com
Ccucu: so, you are a ceel-phones guy
Scaning FTP’s pretty simple, extract the zip
somewhere and run the installer and
let it do it's business. When it's done
Scanning - Getting Started you will have some brand new icons
to play with in your start menu.

Introduction

Don't even know what scanning is?


Well let me tell you, without scanners
all these ftp's loaded with goodies
would never exist. Scanning is
simply using a special program to
ping tons of ftp's all at once and to
try and find active ftp's with
Start up Ping, you'll see the little
anonymous access and
splash screen and then it will load
upload/download permissions. This
the program up. This program can
tutorial is designed for people who
be used to scan for pubs or to scan
have never scanned before and want
ports, I don't know how to use the
to see what it is all about. I do not
port scanning functions so I will only
go into how to read the results or
be talking about pub scanning. First
what to do with them after a scan.
thing to do it open up the options by
This tutorial will simply give you the
going to Options -> Preferences or
basic setup and knowledge to
simply pressing F8. The first tab
perform a public ftp scan that
(Ping) you can leave alone because
generates some results. What to do
those settings are kind of advanced,
with the results when your done will
I don't even touch them. The second
be disused in other tutorials.
tab (List View) is just visual
preferences, I suggest just leaving
Necessary Tools them alone but you can mess with
them if you want.
• Grim's Ping - The only
scanning program I've ever
Ahhh the Pub Find tab, here is
used...
where the main setting are for
scanning for pubs. On the general
Installation & Setup tab in this section I have Threads set
to 130 and the timeout at 10.
Ok, if you have not downloaded the Although I recommend using
required programs yet, do it now. I something like 52 threads for
suggest making a special folder starters. Why 52 you ask? Well the
wherever you download stuff called more threads the faster a scan gets
"Scanning" or something similar to completed, but before you go
easily locate all the tools you may entering 500 it also requires more
collect. Anyway installing Ping is bandwidth and more CPU power.
The threads variable is actually how or not log any ftps. I choose not to
many pubs it checks at one time so log any... yes I said that right. This is
you can see how the default of 5 just a basic log, the actual results of
does not work very quickly when the scan get put into a different file.
your scanning thousands of ips. The The next box you want checked, this
reason for 52 specifically was that if will log all Wingate Engines that it
it's set at 50 there ends up being 4 comes across while looking for ftps,
left over and it just it much faster to they are useful to help FXP files
use 52. If you have a decent which is not a topic for here so I will
computer and a normal connection just leave it at that. These settings
52 is my recommended setting for will create a log of JUST Wingates
starting off, using something like 130 which may be useful later. The next
would probably work also and get it option is where these results are
done in about half the time. The kept... you can make this any
timeout is best left at 10 unless you location you would like but I suggest
know your response time if really just leaving it alone and it will store in
awful for ftps in which case you in the main Ping directory. The last
should set it a little higher, the two options should be left
higher the value the longer a scan unchecked... first one is self
will take. explanatory, the second I don't even
know what it does but I like how the
logs look now so I'm not going to
change it.

Moving onto the General Tab.


These are mainly personal
preferences. You can have it auto
save your queue in case you quit
Ping on accident or something. Also
if you've been disconnected it will try
Onto the Firewall and Firewall and figure out when you get
Backups tabs. Personally I leave reconnected and start scanning
these alone, some people like to again. Just set all these to your
scan with proxies (which is what grim liking or just leave them alone to get
calls firewalls) to keep their actions on with the scanning.
anonymous. I may add to this
section detailing on how to use this And onto the Permissions Tab. Here
feature at a later time. you will find all the options for
logging the found pubs with good
On to the Logging, This tab has a permissions. On the General Tab
bunch of options so I will give a you want to have the box checked
screenshot and explain them all. For and there should already be some
the top two check boxes you can directories entered here. I have
either log only anonymous ftps that mine rearranged to my liking (it
ping comes across, all ftps that it checks in the order they are listed)
scans (would make a huge log file), but they are fine the way they are
defaulted too. If you would like to The first method involves searching
add some more directories to check for web hosts and then scanning
the easiest way is to edit the ping.ini their ranges, usually this gets results
file manually. I have a pre-made dir but sometimes they are all being use
list, HERE, you can paste right into already. First go to HostSpot which
the ini over the current directory is a web host search engine. Now
information (Make sure ping is click the "View all hosts" which is
closed). On the Logging Tab You next to the navigation bar on the
can again change the location of the main page.
file but I suggest leaving it where it
is. The rest of the options should be From here go to random pages until
set up as in the picture to the right. you find a web host that looks nice
This will generate the most useful and big and fast. Really there is no
perms.log. The first 4 boxes should way to tell, but I usually look for
be checked and the last 2 hosts offering unlimited bandwidth
unchecked. and lots of space. Once you find
one click on it's name and you will go
to a page with more info about
them. Then right click on the link
right under the hosts name and
select "Copy Shortcut" which puts
their webpage on the clipboard.
Now switch over to Ping and select
Tools -> Single Host Lookup (or
simply press F9). Paste the URL in
here but either pressing CTRL-V or
OK that's it for setting up Grim's right clicking and selecting paste,
Ping... all ready to find some ranges then press lookup. A Dialog box will
to scan. But don't quit Grim's popup which shows the IP and the
because we will need it again soon. Hostname. When you click on OK
your pasted URL is replaced by the
Picking an IP Range IP it found. Select this and Copy it
by pressing CTRL-C or right clicking
OK... there are many ways to go and hitting copy. Now press close
about doing this... I will cover a few and go to the next section to scan
in here. The worst thing you can do the IP you found.
is just punch in random ip's, this will
in general give you no results. I The second method is along the
suggest reading through the first lines of random ip's but more
method before reading any others controlled. When you get good at it
because it has some basic skills that this is a great method for finding
may be needed elsewhere. Also in unclaimed pubs. First go to the IP
the other methods I may refer back Address Index (check my links
to the first method for things that are section for mirrors) and just check
already explained. out the main page for a minute.
Most Pubs are going to be found in
the Class C Range (Click Class C), To do a good scan you usually want
specifically in 204, 205, 206, 207, to scan the whole range so edit the
208, 209, 216. These are listed as third box and make it a "0" like in the
various US/Canadian Networks and picture. I also found out you can use
if you click on the link it gives you wildcards to paste an IP, so you can
more details about each range. replace the third box with a * and
Pubs are also commonly found in skip the "Add Multiple Ranges" step.
The Class A Range (go to Class A), Now make sure that "PubFind" is
mostly in 63-66 which is InterNIC selected and then press "Add to
Registration. OK go back to the Queue" which will add that small IP
Class C section and click on one of range to the queue. Now press "Add
the ranges I talked about above. Multiple Ranges" and enter in 255
Here you can just scroll and look for and press OK. This will take a
a company that looks like it might minute to complete and it will add
have a lot of FTP's and that's it. Just that full range to the queue. OK this
copy their start range to the should be enough to work with for
clipboard and move onto the next now so close that box, get ready,
section. and hit the Go button on the toolbar
(Stoplight Picture). Watch Ping scan
away, it shows various information
on the bottom like how many servers
found and everything like that. You
can view you perms.log and
results.log while scanning, the
options to do so are located in the
File Menu. Here you can also
My third method is just a minimize Ping to the system tray and
combination of methods one and then come back a few hours later to
two. First you find an IP using find it done.
method one then go to the IP
Address Index and find it. From
there you can see who owns that Scanning - Verifying Wingates
range and who owns everything
around it. If it looks good you can
scan that ip and all it's surroundings. Introduction
Once you find something suitable
copy the IP to the clipboard and Ok so you did a scan and now you
move to the next section. have this results.log file, what the
heck do you do with it? Well that's
Scan Away just what I will talk about in this
tutorial. Many people think verifying
First we have to get our IP into the Wingates involves plugging them
queue so hit the "Paste IP" button on into a ftp client one by one and
the top toolbar. Paste your new testing them... well I got sick of doing
found IP in here and hit OK. this so I invented my own way to
make another program do the work Start up Proxy Hunter and go to the
for me. menu System -> Load Options and
browse to the settings file you
extracted and load it. This will load
some settings but for some reason it
doesn't save everything so the rest
needs to be set up manually.

Necessary Tools Go to System -> Change Options, on


the first tab, Search&Verify Options,
*NOTE: I have downloads restricted in the "Others" section the plug-in
to hits from my site, so if you get "FTP" should be selected.
"403 Forbidden" your browse or
download manager is not sending a Press the "Settings..." button and it
proper referral link. Try using IE, will pull up a box with ftp info,
hold shift (bypasses download Microsoft's site is the default.
managers), and left click the link, Although this seems like a good
that should defiantly work. idea, I found that the first line of their
login is very long and some wingates
• Proxy Hunter v3.1 B1 - cut it off and this makes Proxy
Designed to scan for Hunter mark some GOOD wingates
proxies, used in this as Not Matching. So what I use is
tutorial to verify ftp.adobe.com and a welcome
Wingates message of "230-ftp.adobe.com" (No
• Text Editor - Any text quotes of course). That's really all
editor with find and you need to change... you can look
replace functions will at the other options and play with
do (Notepad works) them, but the defaults work for
• FlashFXP - A great ftp everything else. You can see my
client designed with the current settings in the screenshot to
FXP Groups in mind. the left.
(Used in Wingate FAQ)
You can also go to the "Other
Installation & Setup Options" tab and configure them to
your liking, they are all personal
Ok just download Proxy Hunter preference options and can be
(hosted by me since the authors changed without any effect on the
webpage seems to have ability of checking Wingates.
disappeared) and the Settings file
into the folder you set up in the Make two new text files in a directory
previous tutorial. Open up the zip you want to store various logs in.
and run the exe file to install. Open Name them "wingate - unverified.log"
the Settings zip file and extract the and "wingate - verified.log" as this is
contents to the install folder of Proxy an easy way to keep track of the
Hunter. large list you will be collecting (mine
is over 400 long).
Verification Hunter and switch it to the "Results"
tab on the main screen. If there are
any results from a previous uses
right click on them and select "Select
All" then press the delete button on
the right side. Now right clicks on
the results window again and select
"Paste" (Sometimes right click wont
If you set up Ping correctly when you work, if that is the case just select
started scanning you should have a the results area and press CTRL-V).
results.log in the Ping directory with It will ask if you want to avoid pasting
a list of only Wingates. If there is no repetitious results, just click yes.
results.log check your Ping settings, Now it should show all the wingates
if you are sure they are correct you you have logged on this results tab,
must not have found any wingates if you get some error message make
(very rare). Ping signifies wingates sure you changed the results
by adding "WinGate engine" to the correctly with the find & replace step.
end of an IP. Copy everything form
the results.log and paste it into the Now press the verify all and it will go
unverified file you created, you can to work, after a minute or two it
then delete the results.log so it will should be done. Press the column
start clean on the next scan you do. where it says "Timing" until the
Go to the unverified log and select matches marked "Good" are on the
"WinGate engine" somewhere in the top, now it is sorted from the fastest
file, then go to the replace function of responses to the slowest (I have
your text editor (Edit -> Replace in found this is a good gauge of speed,
Notepad). It should automatically but not always accurate). The
enter the selected text into the "Find results marked at "Non-Matching are
What" field, and in the "Replace usually also good but the test ftp's
With" field enter in ":21@FTP" welcome message did not match
(without the quotes of course). Now what proxy hunter expected. This is
simply hit "Replace All" and it will do usually caused by Wingate welcome
the work. This is to get the log file messages and proxy hunter thinks it
ready for Proxy Hunter to Import. is the ftp welcome message.
Now you'll notice that there are a lot Occasionally you get some that
of space in the text still so you want come up "Non-Matching" that will not
to now put a space in the Find field work properly so those need to be
and nothing in the Replace field and tested out before they are used.
do a "Replace All" again. This
should remove all the space from the
Ok now open up your verified log file
text file, I know it works so try again
and make a line something like "-
if it didn't do anything. =[Good Wingates]=-" or whatever
you want to use for a section
OK now it is ready to import to Proxy heading. Now select all the Good
Hunter, press Ctrl-A (Select All) and Wingates in Proxy Hunter (click the
then Ctrl-C (Copy) to copy the whole top one hold shift and click the
list to the clipboard. No go to Proxy
bottom one) and right click on them • FlashFXP - A great ftp
and select copy. Sometimes it gives client designed with the
an error about "Clipboard Write FXP Groups in mind.
Failed" and then says it was (Used for Tagging)
successful, if it does this then do the
copy again because it most likely Installation & Setup
didn't work. Now go to the verified
log and paste the Good Wingates Installing Ping Companion (PC) and
into it. Do the same procedure and TagCheck is simple, just extract both
paste the Non-Matching Wingates zip files into the Ping directory. PC
into the log file also. You now have needs a small amount of
a listing of good wingates to use for configuration before we start using it.
messing around on pubs or FXPing.
Start up PC and then click the
Scanning - Verifying/Tagging Pubs options button. Set up the general
tab as I have in the screen shot. If
you have a fast connection you can
Introduction choose to upload the 1mb file and it
will be a good speed test, I suggest
So you did a scan and now you've using this only if your can upload at
got this perms.log thing and your least 100KBps. Also I like using
wondering what the heck you should Ping style logs because I find them
do with it... Well you could just copy nicer for posting purposes. On the
the whole thing and paste it as a firewalls you can import your firewall
post to a FXP board but personally I list from your ping.ini if you have any,
find it lame when people can't even otherwise just leave this off. On the
spend the time to run a few tests on FXP tab you can test a pub for
the pubs they find. Most of the time accepting FXP transfers and speed
it is because they do not know how using a dump that you may have.
to efficiently do this. In this tutorial I Enter all the information for the dump
will show several different ways to here and PC will try to FXP a file
make the pub fillers much happier from it to all the pubs that allow
when looking for pubs. uploading. This is not necessary so
if you do not have a dump you can
Necessary Tools just leave the box unchecked on this
tab. Tag check requires no setup
• Ping Companion - A and can be used as is.
great add-on program
for Ping also written by Using Ping Companion
Grim
• TagCheck -
Automatically checks
for Tags on pub using This program is quite simple, all you
a online database, also do is hit go and point it to a
written by Grim perms.log (NOT results.log) and then
hit ok. It will then start checking all
the pubs for upload/download, list, really get you noticed because not a
HD Space, and the FXP test if it's lot of scanners check for tags.
enabled. You can watch it go and
once it is done there will be a nice Tag Checking
new companion.log in the Ping
directory. If you open it up you'll
notice it looks just like the perms.log
but with some extra information in it.
The speeds next to Upload and
Download are very inaccurate when
using the 1kb file because it only
takes a second to transfer it. The
point of using that file is to make the
process go quick because it still Checking pubs for tags can be a
verifies the Upload and Download long and frustrating process, many of
status of the pub. Also most pubs the pubs you come across will
will get n/a for the HD Space check, already be tagged. Checking for
this is because it uploads a tags can either be done manually or
space.asp and then tries to check it using TagCheck. Many people
using http. If the site is not enabled prefer checking manually, including
for http or only allows viewing of html me. TagCheck is the easy way to do
files it will fail. It is does work you it, but can be very slow sometimes (if
will see the HD Space available in there are a lot of directories). In this
the log file as well. If a pub does not tutorial I will explain how to check for
allow uploading PC does not bother tags both ways. I suggest reading
with the other tests because it is then through this and the tagging section
useless, so all you will see is before proceeding, to same time you
"UPLOAD: No (0.00 kbytes/s)." If can tag pubs as you go along rather
you have the FXP test enabled you than checking them all and then
will see the transfer speed at the end going back and tagging.
of each pub listing. If it has an error
message rather than a speed then There are two ways you can use
PC could not FXP to that pub. Even TagCheck, either have it check the
if you have a FXPable dump to test whole list at once, or paste the IP in
from some pubs specifically block one by one. The easiest way is to
FXP transfers. Anything over 100k have it do the whole list, to do this
for a FXP test is fairly good. OK put perms.log in where it wants the
from here you can either skip to the address. Then all you do is hit start
end of this and post the log as we and away it goes. It will show all that
have it now and let the fillers check it thinks could be tags, most of the
for tags and tag the pubs time it is junk that has the same
themselves. Or you can continue words as a tag would and then
with the tutorial and check for the sometimes it does find tags. Once it
tags yourself. As a beginner I is done you can go through the list of
suggest checking yourself as it will pubs and mark the ones it found tags
on as "Tagged." If the tag is older
than 2 weeks the pub can be
checked manually to determine if /scanned/and/tagged/by/-
anyone is still using it. If it is not in =[jtp10181]=-
use it can be re-tagged by you. /tagged/by/-=[jtp10181]=-/for/-=[jtp-
FXP]=-
Manually checking is a little more
tricky, you first need to start up All you do is create those directories
FlashFXP and select the remote in side of each other in a temporary
pane (the right side usually). Go to folder on your computer. Once that
your log and select the first ip and is done you can start up FlashFXP
copy it and take mental note of the and connect to one of the untagged
pub dir, then go back to FlashFXP. pubs you found. On the pub right
Press F8, which is the hot key for the click and select "Make Folder" and
quick connect dialog, and paste your make a new folder named something
ip in and hit enter. Once it connects that shows this is a tag like simply
browse to the pub dir and take a look tag or tagged works fine. Then enter
and what's inside. If it is empty your that folder and on the local pane (left
lucky, you can tag it right there side) browse to where you started
without any further checking. your uploadable tag. Drag the first
Usually there will be a mess of folder of the tag to the pub and it will
folders inside, the first thing to look create all the directories just how you
for is any folders named: tag, did on your computer. Once it is
tagged, com, lpt, or prn. If you see complete you will be back where you
any of these check the creation date, started. Before you go double
if there are any within the last two clicking all the folders to get to the
weeks then mark the pub as tagged new working path, you can just use
and move to the next. If they are all the pull-down menu and it will show
fairly old you can start checking sub all the recently used directories. You
directories by double clicking them can simply select the longest one
and looking for folders with those and it will take you there. From here
same names in each sub dir. If you you can either copy the directory and
cannot find any tags within a few paste it into your log (over the old
levels deep it is usually same to directory) and move to the next pub,
assume that there is no one there. or you can try making some locked
Any recent tags found and you folders so people wont be able to
should leave the pub alone because delete your tag as easily.
someone else is probably using it
already. If you would like to make some
locked folders you first need to go
Tagging Pubs read Dir Locking - NT Basics if you
have an NT pub. If your pub is UNIX
The easiest way to tag pubs is to you can take a look at Dir Locking -
create a directory structure on your UNIX Advanced. Once you've got
computer and upload it to the pub. that figured out you can just make
Here is an example of some tags I some locked folders here at the end
might use: and then get into them and copy the
path and paste it to the log file.
You may be tempted to make a want to take these pubs and see if
locked folder earlier in your tag. I am they still work, if another group is
confused as to why people do this. If using them, if they allow
the whole tag is visible it is obvious upload/download, can be FXPed to
that someone took the work to make and their speed.
a tag and the pub will be used by a
group. When people make locked Necessary Tools
com folders right away it says to me
that it could just be someone • SmartFTP ? Very fast
screwing around or many other directory listing and
things. I like to keep the tag visible navigation. Allows for
so others recognize it better. Also multiple connections.
making locked folders in the root of • Personal FTP ? Only
the pub will more easily alert the needed if you don?t
sysop and get your tag deleted. have a good upload
rate yourself and if you
Posting Pubs want to check whether
or not the pub can to
We are now ready to post our log, so FXPed to.
find your favorite FXP board and get • Text Editor - Your
to the scans section. Read any rules favorite text editor,
they may have, some boards have Notepad works.
specific posting instructions. Show
your reading skills and follow them Installation & Setup
well and the FXP board admins will
respect you. Once you read over SmartFTP is already all setup as
their rules (if they have any) you can soon as installed. The only thing you
click the Link to create a new may want to change is the proxy
thread/post. If there are no setting, the default is not to use a
restrictions on the thread topic I proxy. If you want to use a proxy go
usually do one of the following. to "Tools", then "Settings", then
Currently I do: Perms xxx.xxx- select the "Proxy" tab. Select
xxx.xxx, where the xxx is the range "SOCKS 4" or "SOCKS 5". Enter the
that is being posted. I used to just IP address below beside the word
name the post with how many pubs I "Host" and enter "1080" for the port.
was posting, something like: -=[16 Don?t check "Login to proxy" unless
Tagged and Tested]=-. you are using a private proxy that
requires a username and password.
Scanning - Quick Pub Verification If you can?t get access to a personal
FTP you can run your own as long
as your upload rate is at least
Introduction 40KB/sec. However for this tutorial
we will assume you have access to a
You have perms.log file generated someone else?s private FTP server.
from a scan done using Grim?s Ping
or one posted on a FXP board. You Layout
If you intend to verify and tag a large dropping it into the pub
number of pubs then the layout in window. Use 200kb,
which you have your programs can 500kb, or 1mb file to
considerably decrease the time it test the speed.
takes to check them. Split your 5. Record the pub, your
screen in two halves. One side have tagged path, and the
SmartFTP, and the other have the speed of a file transfer.
list of pubs. Have Notepad open and
leave it in your taskbar so you can Scanning – Proxies
record tagged pubs with their
information.
Introduction
Verification
So you need some proxies so you
Simply copy an IP from the list of don't get the FBI knocking on your
pubs (start from the top and work door? The best way is to find them
your way down so you don?t do the yourself and you've come to the right
same IP twice) and paste it into the place to do just that.
"Address" bar in SmartFTP. Repeat
until you have 3 FTP?s open in Necessary Tools
SmartFTP. Then connect to your
personal ftp. Now you will have 4 *NOTE: I have downloads restricted
boxes open and it is still easy to see to hits from my site, so if you get
everything. "403 Forbidden" your browse or
download manager is not sending a
Order of Operations proper referral link. Try using IE,
hold shift (bypasses download
1. Connect to the pub and managers), and left click the link,
see if the pub still up. that should defiantly work.
Can you connect or do
you get an error? • Proxy Hunter v3.1 B1 -
2. Check if there are any Used to scan for
other tags on the pub. proxies of any kind.
If so are they older • FlashFXP - A great ftp
than 3 weeks? client designed with the
3. Tag the pub. Make a FXP Groups in mind.
folder containing the (Used in Proxy FAQ)
word "tag", and in the
nested folders include Installation & Setup
your boards name, the
scanners name, and First thing you need to do is install
your name. Proxy Hunter, just run the setup
4. Test the speed of the program and let it do it's thing. Now
pub. Transfer a file extract the settings file somewhere
from your personal so we can import it to PH (Proxy
FTP by dragging and Hunter). Start up PH and and go to
the menu System -> Load Options, is fairly tricky as there are many
and point it to the file you just options and types of proxies you can
extracted. I'm sure exactly what scan for. On the "Tasks" pane on the
options this loads but I'm pretty sure main window click the "Add Task"
it loads the verifying web pages and button at the bottom of the program.
nothing else. Select "searching Task" and click
next. On this screen press the "Add"
Now go to System -> Change button on the right and it will bring up
Options and make sure it's on the another dialog box. I personally like
"Search&Verify Options" tab. Here to scan whole ranges at a time
you can change the Parallel Sockets (216.5.0.0-216.5.255.255) and PH
to a suitable number depending on gives us an easy way to enter this. If
your machine and connection. I you want to scan just specific gaps
have DSL and P3 500MHz and I use of ips use the "Start&End Range"
260 for Searching and 120 for option. Otherwise to use my method
Verifying. With 56k the default select "Start + Subnet Size" and plug
settings should be good. You can your ip into the "Start addr:" blank.
also adjust the timeout settings Change the last two number to zero
depending on how through you want and then enter "1B" in the "Subnet
your search to be. For searching I size:" blank. If you want to scan
have my timeouts set to 10s and more that one range in a row change
20s, and for Verifying 10s and 45s. the value 1B accordingly (2B, 3B,
4B, etc.). Once you have this ready
On the "Other Options" tab you can press ok and it will enter into the box
set it up to redial your modem if you as a start and end range for you.
get disconnected, and there are also
some other options which do not Click Next again and go to the next
really affect scanning and can be section, here you pick what ports you
adjusted to your liking. want to scan and what types of
proxies your looking for. I only scan
Picking an IP Range for SOCKS proxies because they are
the most useful for pubbing and
I have found no way to find good scanning for pubs. Click the
proxy ranges yet. I usually just scan "Defined" button and a box should
the ranges I have found a lot of pubs load that is blank. Press the "open"
on and that seems to work. If you button here and load the Default
don't pub scan yourself check out settings for this box (only needs to
some scan posts and see what ip's be done once). This now shows
they are scanning. Once you find pretty much all the different types of
something that looks good move proxies you can scan for. For now
onto the next section. just select the one listed as Protocol
"SOCKS" and then click use. It will
Scan Away ask you "Must Try?" and what this
means is if the connection fails to the
First thing we need to do is get the ip IP should it try this one anyway (only
that was picked into the queue, this useful when scanning multiple
ports). Just press yes saying it • Unknown - PH cannot
should always check for SOCKS on tell what the heck this
Port 1080. is
• Protocol Error - The
Now you can press finish and it will port scanned is open
add your ip to the queue. You can but when trying to use
queue up as much as you'd like and the protocol being
once your ready press the blue play tested an error was
button in the upper right corner of the received
program. This will start the search • Need Authentication -
for SOCKS proxies. During the scan This proxy server
you can switch over to the "Results" needs a username and
tab to see what it is finding. I'll password
explain what all this means in the • Connection Failed -
next section. The ip being tested is
rejecting your
Results connection to that port
• Connection Timeout -
On the "Results" you can see exactly The proxy is not
what is being found with your scan, responding to the
don't be discouraged if nothing is connection request
there, it takes a while before any are • Verification Timeout - It
found sometimes. Once it does find connected to the proxy
some it will immediately test them but cannot verify due to
out for you and list the Status in that a timeout.
column. Here is what some of the
status messages mean: Once it is done scanning I like to sort
it by "Timing" by pressing the title of
• GOOD! - Duh... a good that column until the GOOD proxies
working proxy are on top. This sorts it with the
• Not Matching - The quickest to respond proxies on the
proxy can be top, using these will give you faster
connected to but the connection times.
data received does not
match what is expected (DpXpc)
(This is rare for
SOCKS proxies)
• Undecidable - Based
on the information
returned PH cannot
decide if this proxy
should be marked
"GOOD!" or "Not
Matching"
Complete guide for to a normal search-engine,
such as google.com and look
newbies to spoof for words "proxy list". NOTE,
one's identity on IRC not all proxys/wingates allow
you to use them, so go throught
Lots of people have always a list and test what ones can be
wondered how to go IRC totally used to bounce you into IRC.
anonymously, meaning how to
fake their IP or how to get kewl Next i'll explain how u may go
address like to an irc server with a kewl
"gates.is.owned.a0l.hax0rz.com address such as
". In this small text I try to (op.me.so.i.can.mass.deop.co
explain how this spoofing can m). In order to be able to use
be done in practice. that kind of kewl addresses you
have to buy a shell account
The easiest way to fake your with vhost support (or obtain
real IP is connecting to an IRC the information of a shell
server throught Wingate or account by asking a friend etc.).
Proxy server. This can be done There are lots of Shell
by inputting the proxy's or providers out there and buying
wingate's address and port to an basic bouncer account is not
your mIRC client's firewall part that expensive, my shell
(goto Options -> Connect -> account from strategical.net
Firewall). Make sure you are was $5 a month, so it's not that
using proxy server and you expensive isn't it? (Bouncer
have checked the "Proxy" take a note: Strategical.net
protocol, if using Socks4 seems to be an ultimate shell
firewall you must check the provider 'cause I have paid for
"Socks4" protocol and so on. only one month and now I'm
using it 4th month, and I have
never had any problems with
You may be now asking where their services, vhosts are fast
do I find these proxys and and always up). However you
wingates, it's easy to find have to be at least 18 years old
working proxies but working to buy a shell account, so you
wingates can be fairly rare. may have to ask your mother,
Take a look of Cyberarmy's father etc. to buy it for you (I
proxy-list page first wouldn't suggest credit card
http://www.cyberarmy.com/lists/ payment, but instead look for
proxy, next you may want to go providers that accepts cheques
or money orders). When you have a friend who is willing to
have an account up, you open let you bounce throught their
up a mIRC client and connect address to the IRC server.
to the shell provider (/server Obviously they need to have
strategical.net 37612), in that WinBNC daemon software (if
example you shell providers they are on an other operating
address is strategical.net and system than Windows they
the port where their BNC need BNC, ezBNC etc. daemon
daemon is listening on is what is made for other
37612. Next it will ask for a platforms) so you could connect
password, you would type throught their computer and
following: /quote pass mypass. address. Just go for some web
Then you choose a vhost to search-engine and look for
bounce throught, and then winbnc etc. Before your friend
when you know what one to runs the daemon for you he
use you type /quote vip have to specify listening port,
vhost.ya.chose.here. Now you password and admin password,
can connect to an IRC server, it may be recommended to
type following: /quote conn specify the list of IP/DNS's that
irc.server.here 6667. Now if can use the BNC (this list must
your vhost isn't banned from of course include your IP so
that server/network you can you can connect to you friends
chat there just as normal. BNC). This configuration can
be done modifying bnc.cfg file
I don't have a shell account and that comes with WinBNC
I don't want to pay for having package using notepad or
one, is there any other way to some other text-editor. Setting
connect to IRC except the correct values is very easy
wingates/proxys? and it is well explained in the
bnc.cfg file (just read the
yes, I first explain WinBNC and instruction on bnc.cfg file and
how you can bounce throught you'll be fine). Now, when
your friends address who is correct values is set your friend
running a WinBNC daemon for opens hes MS-DOS prompt
you. WinBNC daemon is similar and goes to directory where the
to BNC daemons that shell WinBNC was unzipped and
account providers are running runs the bnc.exe file. Then they
on their servers, offering give their IP address, their
password protection, vhost WinBNCs password and port to
support etc. So, you have to you and now you fill these
values to your IRC client for ex. destination host (the SubSeven
/server 144.64.24.100 porthere victim is running a kinda BNC
passwordhere. When for you without knowing about
connected to your friends it).
WinBNC you simply type /quote Once you have a SubSeven
conn irc.server.here victim you must connect to it
ircserversport password (note with your SubSeven client and
that your friend for pretty sure set up the port redirect. It asks
doesn't have vhosts so you can input port, output port and
connect using hes address output host, input port is the
only). port where you connect with
you IRC client, output port is
Take a note that there are other the port of IRC server and the
bouncers that can be used to output host is the destination
do the same job, but usually IRC server where we want to
they have features for spying connect. Now, you should input
and other non-wanted activities something like 2000 to the input
so I recommend you don't port field, 6667 or what ever
bounce throught these kind of port where the IRC server is
bouncers even if someone listening on to the output port
offers you their 'lame' bouncer field and the IRC servers
to use. address to the output host field,
for ex. irc.pdq.net.
If you don't have a friend who
would run a BNC for you, there Now when you have done that
are still methods for you can close you SubSeven
anonymous IRC'ing, lets take a client and open up your IRC
look of one useful feature that client. There in IRC client type
SubSeven trojan offers. The following: /server sub7victimsip
feature we are after for is port inputportyouspecified (for ex.
redirect, it can be used to /server 212.213.100.2 2000).
redirect all data to its Now it connects you to the
destination (for ex. to IRC specified IRC server with your
server) throught the SubSeven victims IP address (you can
victim, meaning the destination check it by doing a /whois on
host is not communicating with yourself).
you, instead it's
communicationg only with the You may have heard about
SubSeven victim, so there will Freedom project
be no traces of you on the (http://www.freedom.net), it's
made to give their clients WINDOWS 9x/ME
(customers) full anonymity over
the Internet. It works good on
SECURITY AND
IRC, web browsing, mail, telnet SYSTEM
etc. but I heard they are not RESTRICTIONS
giving free trials anymore, so
you have to pay for having their
services. Go check their page,
maybe you are interested in
their offers, but I wouldn't pay You can control the way your
Win95/98/ME system restricts
to them 'cause basically you access to certain areas or features
can get the same anonymity by (especially useful on multiuser
other (free)methods. machines) without having to mess
with Poledit.exe (Policy Editor), the
Also, you may have heard default Windows administrative
Blackangel project by The control tool.
Hackology Network
All you have to do is modify the
(http://www.hackology.com), Registry values listed below.
this Blackangel sounds You can either make these changes
fascinating and hopefully they manually using the Registry Editor
in Hackology have strength to (Regedit.exe), or save them in a
finish that project and get it .REG file for future use (name it for
done soon. example RESTRICT.REG). Start
Regedit and go to:

HKEY_LOCAL_MACHINE\SOFTWA
RE\Microsoft\Windows\CurrentVersi
on\Policies

Look in the left hand pane for these


subkeys:

1. Explorer
2. System
3. Network
4. WinOldApp

If they are not present, create them:


right-click... New... Key... Name it to
one of the values listed above.

Now you need to create (or modify if


it already exist) the following
DWORD values listed further below NoFind
enable/disable the
under the subkeys above. To create find/search command
a new DWORD value: right-click... enable/disable the
NoInternetIcon Internet icon on
New... DWORD... name it to one of desktop
the values listed further below. To enable/disable
modify one of these DWORD values: NoNetHood
Network Neighborhood
right-click... Modify... check the enable/disable recent
Decimal box... enter a value of 1 to documents in the Start
disable access to a certain feature, NoRecentDocsHistory Menu
(Win98/ME/IE4/IE5/IE6
or a value of 0 to enable access to a
only)
certain feature). These are the valid enable/disable the run
DWORD values (if not specified NoRun
command
otherwise) you can change under the enable/disable save
NoSaveSettings
following subkeys: settings upon exit
enable/disable folders
1. Explorer subkey: NoSetFolders in Start Menu...
Settings
enable/disable taskbar
Keyname Description
NoSetTaskbar in Start Menu...
enable/disable clear of Settings
ClearRecentDocsOnExit recent documents
enable/disable My
upon exit
NoSMMyDocs Documents folder in
DisableRegistryTools enable/disable registry Start Menu
editing tools
NoSMMyPictures enable/disable My
WARNING: If you
Pictures folder in Start
disable the Registry
Menu
Editor, you will NOT be
["NoSMMyDocs" and
able to modify ANY
"NoSMMyPictures"
Registry settings
courtesy of David
anymore, and the
Poole]
ONLY way to disable
system restrictions is enable/disable the
NoWindowsUpdate
to run/merge/register a Win98/ME web update
.REG/.INF/.VBS file!
NoAddPrinter
enable/disable addition 2. System subkey:
of new printers
enable/disable system Key Name Description
NoClose
shutdown NoAdminPage enable/disable
enable/disable existent the remote
NoDeletePrinter
printers deletion administration
enable/disable ALL tab
desktop items and NoConfigPage enable/disable
NoDesktop
desktop right-click the hardware
menu profiles tab
enable/disable NoControlPanel [hex] enable/disable
NoDevMgrUpdate Windows 98/ME web the control
update manager panel
NoDrives [hex] enable/disable ANY NoDevMgrPage enable/disable
drives in My the device
Computer/Explorer/IE manager tab
See "Hide Win9x NoDispAppearancePage enable/disable
Drives" for details the
appearance the network
display tab access tab
NoDispBackgroundPage enable/disable NoFileSharing enable/disable
the the network
background file sharing
display tab button
NoDispCPL enable/disable MinPwdLen set the
the display minimum
properties password
applet length (integer
NoDispScrSavPage enable/disable number: 0 -
the 99)
screensaver NoPrintSharing enable/disable
display tab the network
NoDispSettingsPage enable/disable print sharing
the settings button
display tab NoWorkgroupContents enable/disable
NoFileSysPage enable/disable network
the file system workgroup
button
NoPwdPage enable/disable 4. WinOldApp subkey:
the password
change tab
NoProfilePage enable/disable Key Name Description
the user Disabled enable/disable
profiles tab Ms-Dos Prompt
NoSecCPL enable/disable NoRealMode enable/disable
the password
applet real Ms-Dos
NoVirtMemPage enable/disable mode reboot
the virtual option
memory (Win95/98 only)
button
Similar settings for Explorer, Network
3. Network subkey: and System can be also found under
these Registry keys:
Key Name Description
DisablePwdCaching enable/disable HKEY_USERS\.Default\Software\Mi
password
caching crosoft\Windows\CurrentVersion\Poli
HideSharePwds [hex] enable/disable cies
shared
passwords and:
NoEntireNetwork enable/disable
entire network HKEY_CURRENT_USER\Software\
NoNetSetup enable/disable
Microsoft\Windows\CurrentVersion\P
the network
applet olicies
NoNetSetupIDPage enable/disable
the network If there is only one user, the
identification ".Default" key above contains all
tab global system settings. If more than
NoNetSetupSecurityPage enable/disable
one user, each user has its own EnforceShellExtensionSecurity self explanatory :)
subkey here, named after the LinkResolveIgnoreLinkInfo display/don't display
link info
username(s) found in Control NoActiveDesktop enable/disable active
Panel... Users, and the registry desktop
settings located under a user's NoActiveDesktopChanges enable/disable
subkey are valid only for that specific changes to active
desktop
user. If you double-click on any of NoAddPrinter enable/disable addition
these keys, you'll see 3 subkeys in of new printers
the left hand pane: Explorer, NoChangeStartMenu enable/disable
Network and System. changes to the Start
Menu
Create (or modify if already present) NoClose enable/disable closing
the following Binary [hex] values IE GUI
listed below under the subkeys NoDeletePrinter enable/disable existent
printers deletion
above. To create a new Binary
NoDeskTop enable/disable ALL
value: right-click... New... Binary... desktop items and
Name it to one of the values listed desktop right-click
below. menu
NoDevMgrUpdate enable/disable the
To modify one of these Binary [hex] Win98/ME web update
values: double-click on it... give it a manager
value of 01 00 00 00 to disable NoDrives [hex] enable/disable ALL
access to a certain system feature, drives in My
Computer/Explorer/IE
or a value of 00 00 00 00 to enable See "Hide Win9x
access to a certain system feature. Drives" for details.
Don't type the spaces, they will be NoDriveTypeAutoRun [hex] enable/disable the cd-
rom autorun command
inserted automatically.
NoEditMenu edit/don't edit the Start
Menu
Explorer subkey valid DWORD NoFavoritesMenu enable/disable
values (if not specified otherwise) favorites folder display
NoFileMenu enable/disable
that can be changed (some are valid Explorer/IE file menu
ONLY for Win98/ME and MS IE NoFind enable/disable the find
3/4/5/6): command
NoFolderOptions show/don't show
Folder Options menu
Key Name Description in explorer
CDRAutoRun [hex] enable/disable CD- NoHelp show/don't show Help
R/CD-RW/DVD- menu
R/DVD-RW drive(s) NoInternetIcon show/don't show the
autoRun Internet icon on
NOTE: This setting desktop
needs specific
CDR(W)/DVDR(W) NoLogOff show/don't show the
software installed, like Logoff menu in the
Roxio (Adaptec) Easy Start menu
CD Creator, DirectCD, NoNetConnectDisconnect enable/disable dial-up
CD Copier etc. networking
ClassicShell [hex] enable/disable the connect/disconnect
active desktop shell NoNetHood enable/disable network
ClearRecentDocsOnExit clear/don't clear recent neighborhood
docsuments upon exit NoRecentDocsHistory enable/disable recent
EditLevel edit security level documents in Start
(integer number: 0 - 4) Menu
(Win98/ME/IE4/IE5/IE6
ONLY) versions 3, 4, 5 and 6, and CAN be
NoRecentDocsMenu show/don't show the changed separately in the
recent documents
menu in the Start "CURRENT_USER" key, without
menu influencing the overall system
NoRun enable/disable the run operation.
command
ANY changes to these settings
NoSaveSettings [hex] enable/disable save
settings upon exit under ANY of these Registry keys
NoSetActiveDesktop enable/disable active require a Windows restart to take
desktop effect.
NoSetFolders enable/disable folder
settings
NoSetTaskbar enable/disable taskbar The MS Internet Explorer
settings 4.0x/5.xx/6.xx restrictions are found
NoStartBanner [hex] enable/disable the under these Registry keys:
splash screen upon IE
start
NoStartMenuSubFolders show/don't show HKEY_CURRENT_USER\Software\
subfolders in the Start Policies\Microsoft\Internet
Menu Explorer\Restrictions
NoTrayContextMenu show/don't show
context menu for tray
items and:
NoViewContextMenu show/don't show
context menu HKEY_USERS\.Default\Software\Pol
NoWindowsUpdate enable/disable
Win98/ME web update icies\Microsoft\Internet
NoWinKeys enable/disable Win9x Explorer\Restrictions
keys on 104+
keyboards
if there is only one user. If more than
RestrictRun enable/disable the run
menu one user, the ".Default" key above is
replaced with each "username" key.
Some of these values are also found All values are in DWORD format.
under: Type in the decimal box for the
desired value: 1 to disable or 0 to
HKEY_CURRENT_USER\Software\ enable the respective function/key
Microsoft\Windows\CurrentVersion\P combo:
olicies\Explorer
Key Name Description
Example: NoFileOpen enable/disable
NoControlPanel [hex] = open command in
enable/disable Control Panel File menu, Ctrl+O
and Ctrl+L
Most of the "CURRENT_USER" NoFileNew enable/disable
settings, especially the ones that Ctrl+N for
affect the entire system, change creating a new
automatically when you modify the window
similar values under the NoBrowserSaveAs enable/disable
"LOCAL_MACHINE" registry key the save and
(see above). Most of these values save as in the file
affect ONLY Internet Explorer menu
NoBrowserOptions enable/disable enable the respective
the Internet tab/setting/button.
options/properties Changing ANY of these settings
in the view menu does NOT require restarting
NoFavorites enable/disable Windows:
the favorites
Key Name Description
menu, adding to, Accessibility enable/disable
organizing accessibility settings
favorites Advanced enable/disable advanced
settings
NoSelectDownloadDir enable/disable AdvancedTab enable/disable the
the save as advanced tab
Autoconfig enable/disable autoconfig
dialog box upon settings
file download Cache enable/disable cache
settings
NoBrowserContextMenu enable/disable CalendarContact enable/disable contact
html context settings
menu Check_If_Default enable/disable check if IE
default browser setting
NoBrowserClose enable/disable Connection enable/disable
the close menuSettings connection settings
Certificates enable/disable certificates
and alt+F4 keys settings
to close a windoCertifPers
w enable/disable personal
certificates settings
NoFindFiles enable/disable CertifSite enable/disable certificates
the find menu publishers settings
and the F3 key Colors enable/disable color
settings
NoTheaterMode enable/disable Connection Wizard self explanatory =)
fullscreen (kioskConnectionsTab enable/disable
connections tab
mode) and the Connwiz Admin enable/disable
F11 key Lock connection wizard
administrative lockout
ContentTab enable/disable content
Internet Explorer Restrictions tab
Fonts enable/disable fonts
settings
The Internet Properties restrictions FormSuggest FormSuggest enable/disable
for MS Internet Explorer enable/disable forms Passwords passwords
4.0x/5.xx/6.xx (also found as a suggest setting suggest
setting
Control Panel applet) are located
under this Registry key: GeneralTab enable/disable General
tab
History enable/disable history
HKEY_USERS\.Default\Software\Pol settings
icies\Microsoft\Internet HomePage enable/disable homepage
settings
Explorer\Control Panel Languages enable/disable
Languages settings
Links enable/disable links
if there is only one user. If more than settings
one user, the ".Default" key above is Messaging enable/disable MS
replaced with each "username" key. messaging settings
Profiles enable/disable profiles
All values are in DWORD format. settings
Type in the Decimal box for the ProgramsTab enable/disable programs
tab
desired value: 1 to disable or 0 to
Proxy enable/disable proxy 3. Go to the Explorer Key
server settings
Ratings enable/disable ratings (Additional keys that can be
settings created under Policies are
ResetWebSettings enable/disable Reset web System, Explorer, Network
settings
SecAddSites enable/disable Security and WinOldApp)
Add sites settings 4. You can then add DWORD or
SecChangeSettings enable/disable security
changes binary values set to 1 in the
SecurityTab enable/disable security appropriate keys for ON and 0
tab for off.
Settings enable/disable settings
boxes
Wallet enable/disable MS wallet The following keys are valid:
settings (MS IE 5.xx and
newer ONLY)
Key Name Description
Change/Add Restrictions And NoDeletePrinter disables
Features deletion of
printers
If you want to make restrictions to NoAddPrinter disables
what users can do or use on there addition of
computer without having to run printers
poledit.exe, you can edit the registry. NoRun disables run
You can add and delete Windows command
features by editing the registry. In NoSetFolders removes
this key the value 0 is ON and the folders from
value 1 is Off. settings on
Start menu
Example: to Save Windows setting
NoSetTaskbar removes
add or modify the value name
taskbar from
NoSaveSettings to 0, if set to 1
settings on
Windows will not save settings. And
Start menu
NoDeletePrinter set to 1 will not
allow the user to delete a printer. NoFind removes the
find
command
The same key shows up at:
NoDrives hides drives
HKEY_USERS\(yourprofilename)\So in My
ftware\Microsoft\Windows\CurrentVe Computer
rsion\Policies\Explorer NoNetHood hides the
network
so change it there also if you are neighborhood
using different profiles. NoDesktop hides all
icons on the
1. Open RegEdit desktop
2. Go to NoClose disables
HKEY_CURRENT_USER\Sof shutdown
tware\Microsoft\CurrentVersio NoSaveSettings don't save
n\Policies settings on
exit exept for
DisableRegistryTools disable those listed in
registry the
editing tools RestrictRun
NoRecentDocsMenu hides the subkey
documents
shortcut at POLICY EDITOR
the Start
button Tips/Info
NoRecentDocsHistory clears history
of documents INDEX
NoFileMenu hides the file
menu in 1. Customize your system with
explorer the System Policy Editor
2. Don't want someone else
NoActiveDesktop no active
changing your Windows?
desktop
3. Restrictions without running
NoActiveDesktopChanges no changes Poledit
allowed to 4. Poledit Tips
active
desktop 1. Power users: Customize your
NoInternetIcon no internet system with the System Policy Editor
explorer icon
on the The policy editor comes free on the
desktop Win9x CD. Here's how to install it:
NoFavoritesMenu hides the Open the Control Panel and double-
favorite menu click on the Add/Remove Programs
NoChangeStartMenu disables icon. Select the Windows Setup tab,
changes to then click on the Have Disk button.
the Start Click on the Browse button and find
memu the ADMIN\APPTOOLS\POLEDIT
NoFolderOptions hides the folder on your Win9x installation CD.
folder options Click on OK twice. Select both
in the System Policy Editor and Group
explorer Policies and click on the Install
ClearRecentDocsOnExit empty the button.
recent
documents 2. Don't want someone else
folder on changing your Windows
reboot environment?
NoLogoff hides the log
off option in Use the System Policy Editor,
the Start located on the Win 95 installation
menu CD-ROM. Don't put the Policy Editor
RestrictRun disables all on your own hard drive or you'll
exe programs make it too easy for others to change
your configuration. When you need Settings on
it, pop in the CD-ROM, select Start... Start Menu
Run, and run the command NoSetTaskbar Removes
d:\admin\apptools\poledit\poledit.exe Taskbar from
, where d is your CD-ROM drive. Settings on
Start Menu
3. Restrictions without running NoFind Removes the
Poledit: Find
Command
If you want to make restrictions to NoDrives Hides Drives
what users can do without having to in My
running Poledit, changes can be Computer
made directly to the Registry.
NoNetHood Hides the
Network
This will allow you to make a .reg file
Neighborhood
with the specific restrictions you want
and importing them all at once. NoDesktop Hides all
items on the
1. Start Regedit Desktop
2. Go to NoClose Disables
HKEY_Current_User\Softwar Shutdown
e\Microsoft\CurrentVersion\Po NoSaveSettings Don't save
licies settings on
3. There should already be at exit
least a Explorer key DisableRegistryTools disable
4. Additional keys that can be registry
created under Policies are editing tools
System, Network and NOTE:
WinOldApp remember to
5. You can then add DWORD be careful of
values set to 1 in the this one!
appropriate keys
6. In the Explorer key you can 7.
add: 8. In the System key you can
add:
Key Name Description
NoDeletePrinter Disables Key Name Description
Deletion of NoDispCPL Disable
Printers Display
NoAddPrinter Disables Control Panel
Addition of NoDispBackgroundPage Hide
Printers Background
NoRun Disables Run Page
Command NoDispScrSavPage Hide Screen
NoSetFolders Removes Saver Page
Folders from NoDispAppearancePage Hide
Appearance Controls
Page NoPrintSharing Disable
NoDispSettingsPage Hide Settings Print
Page Sharing
NoSecCPL Disable Controls
Password
Control Panel 11.
NoPwdPage Hide 12. In the WinOldApp key you can
Password enter:
Change Page
NoAdminPage Hide Remote Key Name Description
Administration Disabled Disable MS-
Page DOS Prompt
NoProfilePage Hide User NoRealMode Disables
Profiles Page Single-Mode
NoDevMgrPage Hide Device MS-DOS
Manager
Page 4. Poledit Tips
NoConfigPage Hide
Hardware The policy editor will allow you to
Profiles Page remove the Run command from the
NoFileSysPage Hide File Start menu. You can also specify
System only certain apps that 95 can run
Button using a policy. Unfortunatly, booting
NoVirtMemPage Hide Virtual in safe mode will allow someone to
Memory run poledit, and undo all your
Button changes.

If you are on a network, the best way


9.
is to put the policy there, and
10. In the Network key you can
configure it so they must log in to
enter:
use the computer. Any changes
made with policy editor in safe mode
Key Name Description
will be reset after the user
NoNetSetup Disable the authenticates to the network, unless,
Network of course, they kill the network
Control configuration. But if that happens,
Panel they're now screwed.
NoNetSetupIDPage Hide
Identification Bottom line: If you have such a
Page problem with users hacking your
NoNetSetupSecurityPage Hide Access system and reasonable measures
Control taken with policy editor cannot stop
Page them, those people should not be
NoFileSharingControl Disable File allowed to use the computer in the
Sharing first place!
Don't forget, you can always use a This letter does a very good job of
bios password and lock the case, so that.
it can't be reset without a hammer
and screwdriver. You can also edit Once again, the following is directly
the msdos.sys file and change the from PC Magazine, and was written
bootmulti line to 0 so they can't enter by Richard Turner.
safe mode without a boot disk.
Disabling boot from floppy in the bios Publicly accessible computers, such
will afford you another level of as those in schools, require a
protection. There are also 3rd party significant degree of security to
utils which will handle these chores prevent abuse. The Windows 95 CD-
for you. ROM provides the tool you need to
implement restrictive policies on
SECURITY such machines in the form of the
Policy Editor (POLEDIT) application.
INDEX Unfortunately, the Windows 95
Resource Kit doesn't tell you how to
1. Creating Secure User Profiles use POLEDIT for standalone
under Win9x computers, so I developed a method
2. Disabling the Right-Click on of my own:
the Start Button
3. Disabling My Computer 1.Prepare the System.
4. For Your Eyes Only
5. Hidden Creator Use Explorer to make backup copies
6. Boot Keys - Locking Out of USER.DAT and SYSTEM.DAT, in
7. Restrictions without running case of emergency. Make sure you
Poledit have at least 10MB free on the
8. Hmmm? Windows drive to hold user profile
9. Useful Links information.

1. Creating Secure User Profiles 2.Enable User Profiles.


under Win9x:
Launch the Password applet in
The following is the text of a letter by Control Panel. Click the User Profiles
Richard Turner of Augusta, Georgia. tab, click the option Users Can
It was published in PC Magazine, Customize, and check the two
and is undoubtedly copyrighted by boxes. Click OK; Windows will
them. I'm including it because it restart.
addresses a common question about
how to create secure user profiles in 3.Create Profiles.
Win9x. This was a Stumper question
at one point - many people When Windows restarts, log on as
responded that the answer was to User and allow Windows to create
use the Policy Editor, but no one folders to hold your profile
explained the exact, best procedure. information. Shut down and log on
again as Administrator, with a
suitably obscure password, and and check the four boxes whose
again allow Windows to create captions begin with Remove, plus
profile folders. Don't forget this the two that say Hide All Items on
password! Desktop and Don't Save Settings on
Exit. Do not check the Disable
4.Restrict User Access to Programs. Shutdown command. Use Explorer
to create a folder named
While logged on as Adminstrator, C:\WINDOWS\PROFILE\DUMMY.
use Explorer to navigate to Back in POLEDIT, select
C:\WINDOWS\PROFILES\USER\ST Shell|Custom Folders and check all
ARTMENU. In this folder and those the boxes, filling in the dummy folder
below it, delete any shortcuts to name you just created for those that
programs the user shouldn't be require paths. Click OK and save the
allowed to run, including every file as CONFIG.POL.
shortcut to the Recent folder. Be
sure to delete the shortcuts to 7.Define User Policy.
POLEDIT, Regedit, and Explorer.
Load the example policy file
5.Install Policy Editor. MAXIMUM.POL, click on the Default
User icon, and chose Copy from the
Launch the Add/Remove Software Edit menu. Reload CONFIG.POL,
applet in Control Panel, click the click on the User icon, and select
Windows Setup tab, and press the Paste from the Edit menu. Double-
Have button. Navigate to the click the User icon and choose
ADMIN\APPTOOLS\POLEDIT folder Shell|Custom Folders. Click on the
of the Windows 95 CD-ROM and text of each check box in turn and, if
install POLEDIT.INF. This will install an edit box appears below, replace
POLEDIT and put it on the C:\WINDOWS with
Accessories\System Tools submenu C:\WINDOWS\PROFILES\USER.
of the Programs menu. It will also Make sure all boxes remain
place the critical policy template file checked. Select Control Panel |
ADMIN.ADM in the Passwords and check the Restrict
C:\WINDOWS\INF directory. If you box; then check the other four boxes
don't have the CD, you can that appear below. Under Shell |
download POLEDIT from Restrictions, check the Remove Run
somewhere on [www.microsoft.com] command, Remove Find command,
or CIS MSWIN. Hide Drives in My Computer, and
Don't Save Settings on Exit. Consult
6.Define Default User Policy. the Windows Resource Kit Help to
determine what other restrictions you
Launch POLEDIT, create a new file, may wish to add, but be sure not to
and add new users named User and check Disable ShutDown Command.
Administrator. Double-click the Now go to the Shell | Restrictions
Default User icon, select and System | Restrictions and
System|Restrictions, and check all change any gray check boxes to
four boxes. Select Shell |Restrictions blank.
8.Define Adminstrator Policy. on the desktop and no programs
available from the Start menu
Double-click the Administrator icon (nothing to do but log on again). This
and go through the entire list of time press ESC at the log-on prompt
restrictions, setting every check box to bypass entering a user name.
to blank, not gray. This protects the Again you should have no option but
Administrator policy from being to shut down and log on again.
affected by the Default User policy.
12.Protect Policies.
9.Define "no user" Policy.
Log on as User and confirm there is
Log on again, but press ESC to no way to run POLEDIT. For greater
close the log-on prompt. Run safety, change the file named
POLEDIT, select Open Registry from ADMIN.ADM (in the
the File menu, and double-click C:\WINDOWS\INF folder) to
Local User. Apply all the same something else. Use the DOS
restrictions you applied to Default command ATTRIB to remove the
User. Then log on as Adminstrator read-only, hidden, and system
again. attributes from the file
C:\MSDOS.SYS, and load it into
10.Enable Policy Loading. your favorite editor. Find the heading
[Options] and change the bootkeys=
Load CONFIG.POL in POLEDIT, key to bootkeys=0. If this key is not
open the Default Computer icon, present under [Options], simply add
select System, and check Enable it. Save the file and restore its read-
User Profiles. Under only, hidden, and system attributes.
Network\Update, check Remote This change prevents the user from
Update. Select Manual for the breaking out of Windows 95's startup
Update Mode, and enter process. Finally, if the system BIOS
C:\WIINDOWS\CONFIG.POL as permits, use its SETUP program to
your path. Save CONFIG.POL. Now disable booting from a floppy disk.
select Open Registry from the File
menu, double-click Local Computer, 2. Disabling the Right-Click on the
and make the same change to the Start Button:
network update mode. Save
changes and exit POLEDIT. Normally, when you right button click
on the Start button, it allows you to
11.Test Policies. open your programs folder, the
Explorer and run Find. In situations
Log on as User; check to see that where you don't want to allow users
the policy restrictions you specified to be able to do this in order to
are in place. Log on as Administrator secure your computer.
and check that there are no
restrictions. Now shut down and log 1. Start Regedit
on again, but use a new name and 2. Search for Desktop
password. There should be no icons
3. This should bring you to registry file before deleting it just in
HKEY_Classes_Root\Director case you want to enable it again.
y
4. Expand this section See the section on Installation to see
5. Under Shell is Find how to do this automatically during
6. Delete Find an install.
7. Move down a little in the
Registry to Folder 4. For your eyes only:
8. Expand this section and
remove Explore and Open Don't want your nosy neighbors
peeking at what you've got on your
Now when you right click on the Start computer when you step away from
button, nothing should happen. You your desk? Your screen saver's
can delete only those items that you certainly not going to stop them --
need. unless you password protect it.
Note: - On Microsoft keyboards, this Choose any password you want and
also disables the Window-E (for once that screen saver kicks in, you
Explorer) and Window-F (for Find) can't get back into what you were
keys. doing unless you enter the right
See the section on Installation to see password. So snoopers are locked
how to do this automatically during out. Nyaa-nyaa! To set a screen
an install. saver password, click the desktop
with the right mouse button and
3. Disabling My Computer: choose Properties to open the
Display Properties dialog box. Now
In areas where you are trying to click the Screen Saver tab, click the
restrict what users can do on the Password protected box, then click
computer, it might be beneficial to the Change button and enter a
disable the ability to click on My password -- twice. Click OK and
Computer and have access to the breathe easy. While you're at it (2
drives, control panel etc. tips in one!), now might be a good
time to set that screen saver to kick
To disable this: in a little faster. Just use the up and
down arrows next to Wait to adjust
1. Start Regedit how long it takes to kick in.
2. Search for 20D04FE0-3AEA-
1069-A2D8-08002B30309D 5. Hidden Creator:
3. This should bring you to the
HKEY_Classes_Root\CLSID Platform: all windows platforms
section
4. Delete the entire section When creating a directory in ms-dos,
name directory and press ALT255.
Now when you click on My Directory can be seen in directory
Computer, nothing will happen. You but can not be opened without
might want to export this section to a pressing ALT255 at end of directory
name. Great security feature to keep
people out of your private directory Drive Letter Value
or directories. A: 01 00 00 00
B: 02 00 00 00
6. Boot keys - Locking out C: 04 00 00 00
D: 08 00 00 00
Open a command prompt (from start
menu select RUN, then type E: 10 00 00 00
COMMAND), switch to the root F: 20 00 00 00
directory and issue the following G: 40 00 00 00
command: H: 80 00 00 00
I: 00 01 00 00
ATTRIB -H -R -S MSDOS.SYS J: 00 02 00 00
K: 00 04 00 00
This will remove the hidden, read L: 00 08 00 00
only and system attributes so you
M: 00 10 00 00
may edit it.
N: 00 20 00 00
BootKeys=1 Enables the special O: 00 40 00 00
startup option keys (F5, F6, and F8). P: 00 80 00 00
Setting this value to 0 prevents any Q: 00 00 01 00
startup keys from functioning. If R: 00 00 02 00
you're a systems administrator, this S: 00 00 04 00
setting lets you configure a more T: 00 00 08 00
secure system. U: 00 00 10 00
V: 00 00 20 00
BE SURE TO RE-ENABLE THE
W: 00 00 40 00
HIDDEN, READ ONLY, and
SYSTEM PROPERTIES after you X: 00 00 80 00
edit the MSDOS.SYS by typing: Y: 00 00 00 01
Z: 00 00 00 02
ATTRIB +H +R +S MSDOS.SYS
Where (for eg) you want to hide
7. Hiding Any Combination of Drives Drives {C,E,J,O,R,U,Y,Z} you would
give 'NoDrives' the value 14 42 12
If you want to stop a drive or any 03
combination of drives appearing in
Explorer/My Computer, add the Where C+E = 14, J+O = 42, R+U=12
Binary Value of 'NoDrives' in the and Y+Z = 03
registry at Please NOTE: The Numbers are to
HKEY_CURRENT_USER\Software\ be added in HEXadecimal ie: ABCD
Microsoft\Windows\CurrentVersion\P = 0F, not 15 All Drives Visible is 00
olicies\Explorer 00 00 00 All Drives Hidden is FF FF
FF 03
Give it a value from a combination of
the table below: 8. Hmmm? =)
I won't get into the fact that your MS-DOS Hacking
boss "probably" has the legal right to
do whatever he/she wants. Its
How to Use Telnet on a Windows
his/her computer and his/her
Computer
salary.... That being said: TweakUI
Telnet is great little program for
will automatically clear out things like
doing a couple of interesting things.
the Doc, Run, Find etc. In fact in
In fact, if you want to call yourself a
tweakui its under the tab
hacker, you absolutely MUST be
Paranoia.(which is kind of fitting) You
able to telnet! In this lesson you will
might also del everything in the
find out a few of the cool things a
\\windows\temp internet file folder.
hacker can do with telnet.
Disable file sharing so he can't sit at
If you are using Win95, you can find
his desk and look at your hard drive.
telnet in the c:\windows directory,
Last but not least, go to find and look
and on NT, in the c:\winnt\system32
for *.pwl . This will tell you if anyone
directory. There isn't a lot of online
is logging onto your pc with their
help concerning the usage of the
password.
program, so my goal is to provide
some information for new users.
First off, telnet isn't so much an
application as it is a protocol. Telnet
is protocol that runs over TCP/IP,
and was used for connecting to
remote computers. It provides a login
interface, and you can run
command-line programs by typing
the commands on your keyboard,
and the programs use the resources
of the remote machine. The results
are displayed in the terminal window
on your machine, but the memory
and CPU cycles consumed by the
program are located on the remote
machine. Therefore, telnet functions
as a terminal emulation program,
emulating a terminal on the remote
machine.
Now, telnet runs on your Win95 box
as a GUI application...that is to say
that you can type "telnet" at the
command prompt (in Windows 95
this is the MS-DOS prompt), and
assuming that your PATH is set
correctly, a window titled "telnet" will
open. This differs from your ftp
program in that all commands are
entered in the DOS window.
Let's begin by opening telnet. Simply NEWBIE NOTE: For most purposes,
open a DOS window by clicking you can leave the terminal type on
"start", then "programs", then "MS- VT100.
DOS", and at the command prompt,
type: In the Connect dialog box, you can
c:\telnet enter in the host to which
The window for telnet will open, and you wish to connect, and there is a
you can browse the features of the list box of several ports
program from the menu bar. you can connect to:
daytime: May give you the current
NEWBIE NOTE: In this text file, I am time on the server.
referring only to the telnet echo: May echo back whatever you
program that ships with Win95/NT. If type in, and will tell you that the
you type "telnet" at the computer you have connected to is
command prompt and you don't get alive nd running on the Internet.
the telnet window, make sure qotd: May provide you with a quote
that the program is on your hard of the day.
drive using the Start -> Find -> chargen: May display a continuous
Files or Folders command. Also stream of characters, useful for
make sure that your path statement spotting network problems, but may
includes the Windows directory. crash your telnet program.
There are many other programs telnet: May present you with a login
available that provide similar screen.
functionality, with a lot of other bells These will only work if the server to
and whistles, from any number of which you are trying to connect is
software sites. running these services. However,
you are not limited to just those
To learn a bit more about telnet, ports...you can type in any port
choose Help -> Contents, or number you wish. (For more on fun
Help -> Search for help on... from the ports, see the GTMHH, "Port Surf's
menu bar. Read through Up.") You will only successfully
the files in order to find more detailed connect to the port if the service in
explanations of things question is available. What occurs
you may wish to do. For example, in after you connect depends upon the
this explanation, I will protocol for that particular service.
primarily be covering how to use the When you are using telnet to
application and what it can connect to the telnet service on a
be used for, but now how to server, you will (in most cases) be
customize the colors for the presented with a banner and a login
application. prompt.
Now, if you choose Connect -> [Note from Carolyn Meinel: Many
Remote System, you will be people have written saying their
presented with a dialog window that telnet program fails to connect no
will ask you for the remote host, the matter what host they try to reach.
port and the terminal type. Here's a way to fix your problem.
First -- make sure you are already
connected to the Internet. If your again, that you have successfully
telnet program still cannot connect to completed the TCP negotiation and
anything, here's how to fix your you have a connection.
problem. Click "start" then "settings" Now, what you do from there is up to
then "control panel." Then click you. You can simply disconnect with
"Internet" then "connection." This the knowledge that, yes, there is a
screen will have two boxes that may service running on port 80, or you
or may not be checked. The top one can use your knowledge of the HTTP
says "connect to the Internet as protocol to retrieve the HTML source
needed." If that box is checked, for web pages on the server.
uncheck it -- but only uncheck it if How to Download Web Pages Via
you already have been having Telnet
problems connecting. The bottom To retrieve a web page for a server
box says "connect through a proxy using telnet, you need to connect to
server." If that box is checked, you that server on port 80, generally.
probably are on a local area network Some servers may use a different
and your systems administrator port number, such as 8080, but most
doesn't allow you to use telnet.] web servers run on port 80. The first
thing you need to do is click on
NEWBIE NOTE: It's not a good idea Terminal -> Preferences and make
to connect to a host on which you sure that there is a check in the
don't have a valid account. In your Local Echo box. Then, since most
attempts to guess a username and web pages will generally take up
password, all you will do is fill the log more than a single screen, enable
files on that host. From there, you logging by clicking Terminal -> Start
can very easily be traced, and your Logging... and select a location and
online service provider will probably filename. Keep in mind that as long
cancel your account. as logging is on, and the same file is
being logged to, all new information
Now, you can also use telnet to will be appended to the file, rather
connect to other ports, such as than overwriting the
ftp (21), smtp (25), pop3 (110), and original file. This is useful if you want
even http (80). When you to record several sessions, and edit
connect to ftp, smtp, and pop3, you out the extraneous information using
will be presented with a Notepad.
banner, or a line of text that displays Now, connect the remote host, and if
some information about the your connection is successful, type
service. This will give you a clue as in:
to the operating system GET / HTTP/1.0
running on the host computer, or it and hit enter twice.
may come right out and tell
you what the operating system NEWBIE NOTE: Make sure that you
is...for instance, AIX, Linux, hit enter twice...this is part
Solaris, or NT. If you successfully of the HTTP protocol. The single /
connect to port 80, you will after GET tells the server
see a blank screen. This indicates, to return the default index file, which
is generally "index.html". legal. You aren't attempting to
However, you can enter other compromise the target system, you
filenames, as well. are simply doing by hand what your
web browser does for you
You should have seen a bunch of automatically. Of course, this
text scroll by on the screen. Now you technique will not load images and
can open the log file in Notepad, and Java applets for you.
you will see the HTML
code for the page, just as though you Getting Finger Information Via Telnet
had chosen the View Source By now, you've probably heard or
option from your web browser. You read a lot about finger. It doesn't
will also get some additional seem like a very useful service, and
information...the headers for the file many sysadmins disable the service
will contain some information because it provides information on a
about the server. For example: particular user, information an evil
HTTP/1.0 200 Document follows hacker can take advantage of.
Date: Thu, 04 Jun 1998 14:46:46 Win95 doesn't ship with a finger
GMT client, but NT does. You can
Server: NCSA/1.5.2 download finger clients for Win95
Last-modified: Thu, 19 Feb 1998 from any number of software sites.
17:44:13 GMT But why do that when you have a
Content-type: text/html readily available client in telnet?
Content-length: 3196 The finger daemon or server runs on
One particularly interesting piece of port 79, so connect to a remote host
information is the server on that port. If the service is running,
name. This refers to the web server you will be presented with a blank
software that is running screen.
and serving web pages. You may
see other names in this field, NEWBIE NOTE: NT doesn't ship
such as versions of Microsoft IIS, with a finger daemon (A daemon is a
Purveyor, WebSite, etc. program on the remote computer
This will give you a clue as to the which waits for people like you to
underlying operating system connect to it), so generally speaking,
running on the server. and server that you find running
finger will be a Unix box. I say
SYSADMIN NOTE: This technique, "generally" because there are third-
used in conjunction with a party finger daemons available and
database of exploits on web servers, someone may want to run one on
can be particularly annoying. their NT computer.
Make sure you keep up on exploits
and the appropriate security The blank screen indicates that the
patches from your web server and finger daemon is waiting for input. If
operating system vendors. you have a particular user that you
are interested in, type in the
NEWBIE NOTE: This technique of username and hit enter. A response
gathering web pages is perfectly will be provided, and the daemon will
disconnect the client. If you don't is the letter "l". The second character
know a particular username, you can is a zero, not an "o".
start by simply hitting enter. In some I know that the program is supposed
cases, you may get a response such to run on NT, but I have
as "No one logged on." Or you may seen it run on Win95. It's a great little
get information of all currently logged program that can be used
on users. It all depends on whether to do some of the same things as
or not the sysadmin has chosen to telnet. However, there are
enable certain features of the advantages to using netcat...for one,
daemon. You can also try other it's a command-line program,
names, such as "root", "daemon", and it can be included in a batch file.
"ftp", "bin", etc. In fact, you can automate
Another neat trick to try out is multiple calls to netcat in a batch file,
something that I have seen referred saving the results to
to as "finger forwarding". To try this a text file.
out, you need two hosts that run
finger. Connect to the first host, NEWBIE NOTE: For more
host1.com, and enter the username information on batch files, see
that you are interested in. Then go to previous versions of the Guide To
the second host, and enter: (mostly) Harmless Hacking, Getting
user@host1.com Serious with Windows series ...one
You should see the same of them dealt with basic batch file
information! Again, this all depends programming.
upon
the configuration of the finger Before using netcat, take a look at
daemon. the readme.txt file provided in
Using Telnet from the Command the zipped archive you downloaded.
Line It goes over the instructions
Now, if you want to show your on how to download web pages
friends that you a "real man" using netcat, similar to what I
because "real men don't need no described earlier using telnet.
stinkin' GUIs", well just open up a There are two ways to go about
DOS window and type: getting finger information using
c:\>telnet <host> <port> netcat. The first is in interactive
and the program will automatically mode. Simply type:
attempt to connect to the host c:\>nc <host> 79
on the designated port for you. If the daemon is running, you won't
Using Netcat get a command prompt back. If this
Let me start by giving a mighty big is the case, type in the username
thanks to Weld Pond from L0pht for and hit enter. Or use the automatic
producing the netcat program for mode by first creating a text file
Windows NT. To get a copy of this containing the username of interest.
program, which comes with source For example, I typed:
code, simply go to: c:\>edit root
http://www.l0pht.com/~weld and entered the username "root",
NOTE: The first character of "l0pht: without the quotes. Then from
the command prompt, type: the phone or by written letter. To
c:\>nc <host> 79 < root disable sharing, click on My
and the response will appear on your Computer -> Control Panel ->
screen. You can save the Network -> File and Print Sharing. In
output to a file by adding the the dialog box that appears, uncheck
appropriate redirection operator both boxes. It's that easy.
to the end of the file: What Can They Do?
c:\>nc <host> 79 < root > nc.log What can someone do? Well, lots of
to create the file nc.log, or: stuff, but it largely depends on what
c:\>nc <host> 79 < root >> nc.log shares are available. If someone is
to append the response to the end of able to share a printer from your
nc.log. NOTE: Make sure machine, they can send you
that you use spaces between the annoying letters and messages. This
redirection operators. consumes time, your printer
ink/toner, and your paper. If they are
How to Break into a Windows 95 able to share a disk share, what they
machine Connected to the Internet can do largely depends upon what's
Disclaimer in that share. The share appears as
The intent of this file is NOT to another directory on the attacker's
provide a step-by-step guide to machine, so any programs they run
accessing a Win95 computer while it will be consuming their own
is connected to the Internet. The resources...memory, cpu cycles, etc.
intent is show you how to protect But if the attacker has read and write
yourself. access to those disk shares, then
There are no special tools needed to you're in trouble. If you take work
access a remote Win95 home, your files may be vulnerable.
machine...everything you need is Initialization and configuration files
right there on your Win95 system! can be searched for passwords.
Two methods will be described...the Files can be modified and deleted. A
command-line approach and the GUI particularly nasty thing to do is
approach. adding a line to your autoexec.bat
Protecting Yourself file so that the next time your
First, the method of protecting computer is booted, the hard drive is
yourself needs to be made perfectly formatted without any prompting
clear. DON'T SHARE FILES!! I can't from the user. Bad ju-ju, indeed.
stress that enough. If you are a ** The command-line approach **
home user, and you are connecting Okay, now for the part that should
a Win95 computer to the Internet via probably be titled "How they do it".
some dial-up method, disable All that is needed is the IP address
sharing. If you must share, use a of the remote machine. Now open up
strong password...8 characters a DOS window, and at the command
minimum, a mix of upper and lower prompt, type:
case letters and numbers, change c:\>nbtstat -A [ip_addr]
the password every now and again. If the remote machine is connected
If you need to transmit the to the Internet and the ports used for
password to someone, do so over sharing are not blocked, you should
see something like: connect to, and type the command:
NetBIOS Remote Machine Name c:\>net use g:
Table \\[ip_addr]\[share_name]
Name Type Status You will likely get a response that the
--------------------------------------------- command was completed
NAME <00> UNIQUE Registered successfully. If that is the case, type:
DOMAIN <00> GROUP Registered c:\>cd g:
NAME <03> UNIQUE Registered or which ever device name you
USERNAME <03> UNIQUE decided to use. You can now view
Registered what exists on that share using the
MAC Address = 00-00-00-00-00-00 dir commands, etc.
This machine name table shows the Now, you may be presented with a
machine and domain names, a password prompt when you ssue the
logged-on username, and the above command. If that is the case,
address of the Ethernet adapter (the typical "hacker" (I shudder at that
information has been obfuscated for term) methods may be used.
instructional purposes). ** The GUI approach **
**Note: This machine, if unpatched After issuing the nbtstat command,
and not protected with a firewall or you can opt for the GUI approach to
packet-filter router, may be accessing the shares on that
vulnerable to a range of denial of machine. To do so, make sure that
service attacks, which seem to be you leave the DOS window open, or
fairly popular, largely because they minimized...don't close it. Now, use
require no skill or knowledge to Notepad to open this file:
perpetrate. c:\windows\lmhosts.sam
The key piece of information that you Read over the file, and then open
are looking for is in the Type column. create another file in Notepad, called
A machine that has sharing enabled simply "Lmhosts", without an
will have a hex code of "<20>". extension. The file should contain
**Note: With the right tools, it is fairly the IP address of the host, the
simple for a sysadmin to write a NetBIOS name of the host (from the
batch file that combs a subnet or her nbtstat command), and #PRE,
entire network, looking for client separated by tabs. Once you have
machines with sharing enabled. This added this information, save it, and
batch file can then be run at specific minimize the window. In the DOS
times...every day at 2:00 am, only on command window, type:
Friday evenings or weekends, etc. c:\>nbtstat -R
If you find a machine with sharing This command reloads the cache
enabled, the next thing to do is type from the Lmhosts file you just
the following command: created.
c:\>net view \\[ip_addr] Now, click on Start -> Find ->
Now, your response may be varied. Computer, and type in the NetBIOS
You may find that there are no name of the computer...the same
shares on the list, or that there are one you added to the lmhosts file. If
several shares available. Choose your attempt to connect to the
which share you would like to machine is successful, you should
be presented with a window "locahost" or "my own computer." If
containing the available shares. You in doubt, break the Internet
may be presented with a password connection and then get online
prompt window, but again, typical again. The number that changes is
"hacker" (again, that term grates on the IP address of your friend's
me like fingernails on a chalk board, computer.
but today, it seems that it's all folks
understand) techniques may be used Evil Genius tip: Here is something
to break the password. really scary. In your shell account
give the "netstat" command. If your
Note from Carolyn Meinel: Want to ISP allows you to use it, you might
try this stuff without winding up in jail be able to get the dynamically
or getting expelled from school? Get assigned IP addresses of people
a friend to give you permission to try from all over the world -- everyone
to break in. who is browsing a Web site hosted
First, you will need his or her IP by your ISP, everyone using ftp,
address. Usually this will be different spammers you might catch red-
every time your friend logs on. You handed in the act of forging email on
friend can learn his or her IP address your ISP, guys up at 2AM playing on
by going to the DOS prompt while multiuser dungeons, IRC users, in
online and giving the command fact you will see everyone who is
"netstat -r". Something like this connected to your ISP!
should show up:
C:\WINDOWS>netstat -r YOU CAN GO TO JAIL WARNING:
Route Table If you find a Windows 95 box on the
Active Routes: Internet with file sharing enabled and
Network Address Netmask Gateway no password protection, you can still
Address Interface Metric get in big trouble for exploiting it. It's
0.0.0.0 0.0.0.0 198.999.176.84 just like finding a house whose
198.999.176.84 1 owner forgot to lock the door -- you
127.0.0.0 255.0.0.0 127.0.0.1 still are in trouble if someone catches
127.0.0.1 1 you inside. Tell temptation to take a
198.999.176.0 255.255.255.0 hike!
198.999.176.84 198.999.176.84 1 Final Words
198.999.176.84 255.255.255.255 Please remember that this Guide is
127.0.0.1 127.0.0.1 1 for instructional purposes only and is
198.999.176.255 255.255.255.255 meant to educate the sysadmin and
198.999.176.84 198.999.176.84 1 user alike. If someone uses this
224.0.0.0 224.0.0.0 198.999.176.84 information to gain access to a
198.999.176.84 1 system which they have no
255.255.255.255 255.255.255.255 permission or business messing
198.999.176.84 0.0.0.0 1 with, I (keydet) cannot be
Your friend's IP address should be responsible for the outcome. If you
under "Gateway Address." Ignore the are intending to try this information
127.0.0.1 as this will show up for out, do so with the consent and
everyone and simply means permission of a friend.
Making Windows XP ramifications of stopping the service,
leave it alone. Some services are
Boot 60% Faster critical to Windows XP's operations,
so make sure you understand what
Making Windows XP Boot 60% the service is before you disable it.
Faster
Whenever you start your computer,
you are faced with a few moments of To reduce the number of services
thumb twiddling while Windows XP that start on bootup, you can access
boots and prompts you to log on. two different areas of Windows XP.
Although you should expect to wait The first is the System Configuration
for a few moments, sometimes Utility. The Services tab shows you
Windows XP seems to boot rather the services that start when the
slowly. In fact, you may notice that computer boots.
over a period of time the PC that
used to roar to life seems a bit You can stop a service from starting
sluggish instead. Fortunately, you by simply clearing the check box
can perform several techniques that next to the service and clicking OK.
help Windows XP get the bootup However, before you do so, there is
speed you want. This chapter another way to disable services that
explores how to put these you may prefer because the
techniques to work. interface gives you more information
about the service in question.

Stopping Unneeded Startup Open Control Panel/Administrative


Services ToolsServices or else select
Start/Run, type services.msc, and
Along with the core operating system click OK. Either way, you see the
and programs that Windows XP runs Services console.
when it starts, there is also a host of
services involved. Many of these I prefer to use the Services console
services are necessary for Windows instead of the System Configuration
XP to operate correctly. However, Utility because it describes what the
many of them are for features in service does. Additionally, you can
Windows XP that you may not use at double-click a service and examine
all. You can peruse the services and its properties.
disable any service that you do not
want to run. The fewer services that Notice the Startup Type column in
run, the more quickly Windows XP Figure 4-2. This information lists
will boot. whether the service is automatic or
manual. Manual services are only
started in Windows XP when you
Caution: start a process that requires the
Exercise caution when stopping service. Some other process may
services. If you do not know what a require the service that has a
service does or are unsure of the "dependency" relationship with it; in
this case, the dependency service
will start, as well. Because these DNS Client: If you are not on a
services do not start automatically network, you do not need this
when you boot Windows XP, you do service. If you are, leave it alone.
not need to do anything with manual
services.
Error Reporting and Event Log: You
However, all services listed as don't have to use these services but
automatic start when Windows XP they can be very helpful, so I would
boots. These are the services that leave them configured as automatic.
increase boot time. As I have
mentioned, many of them are
necessary and important, so you Fax: If you don't use your computer
should not stop automatic services for fax services, you can disable this
from booting unless you are sure of one.
the ramifications. You can get this
information by looking at the
Description column. Here's a quick Help and Support: If you never use
look at common services you may the Windows XP Help and Support
want to live without: Center (found on the Start menu),
you can disable this service.

Automatic Updates: This service


enables Windows XP to check the IMAPI CD-Burning COM: This
Web automatically for updates. If you service enables you to burn CDs on
don't want to use Automatic your computer. If you never burn
Updates, you can disable the CDs, you can disable the service.
service. You can always check for
updates manually at the Windows
Update Web site. Indexing Service: Your computer
keeps an index of files but if you
rarely search for files, the service is
Computer Browser: If your computer just a resource hog. You can stop it
is not on a network, you don't need and turn the service to manual.
this service. If you are on a network,
leave it alone.
Windows Firewall/Internet
Connection Sharing: If you do not
DHCP Client: If you are not on a use these features, you can disable
network, you do not need this them.
service. If you are on a small
workgroup, you can still increase
boot time by configuring manual IP Infrared Monitor: If you do not use
addresses (which I explore later in infrared devices, you can disable this
this chapter). service.
automatic services, depending on
Messenger: This service sends alert software and other configurations on
messages on a local area network (it your computer. So it's a good idea to
is not the same as Windows look through the services and learn
Messenger). If you are not on a more about them. If you double-click
network, you can disable this a service, a Properties dialog box
service. appears

Notice that on the General tab, you


Print Spooler: If you do not do any see a Startup Type drop-down
printing from the computer, you can menu. If you want to change an
disable this service. If you print, automatic service to manual, select
make sure you leave it as automatic. Manual here and click OK. As a
general rule, don't disable a service
unless you are sure you will never
Remote Registry: This service allows use it. However, manual
remote users to modify the Registry configuration allows the service to be
on your computer. If you are not on a started when you find it necessary,
network, you can disable this thus speeding up your boot time.
service.
However, before you change a
service to manual, look at the
System Restore Service: This Dependencies tab (see Figure 4-4).
service allows you to use System This tab shows you which other
Restore. If you have turned off services depend upon the service
System Restore anyway, you do not you are considering changing.
need to turn off the service. If you
do, you turn off System Restore. Keep in mind that services are
necessary for the vast functionality
you get with Windows XP. Change
Themes: If you do not use themes, only those services that you
you can disable this service. understand and do not use. How you
use your Windows XP computer
should be the best guide in terms of
Windows Image Acquisition: If you optional startup services.
do not use scanners or digital
cameras, you can disable this
service. Tip:

Wireless Zero Configuration: If do The Indexing service and the System


not use wireless networking devices, Restore service take up a lot of disk
you can disable this service. space and system resources across
the board. You can live without the
Indexing service but I suggest that
You may have a number of other you keep using System Restore. It
works great when you are in a bind solving this problem.
and this is one case where the loss
of speed may not be worth the This isn't a networking book,
ramifications of not using System however, so I won't delve into the
Restore. implications of using a manual IP
address, but if you are using a
computer that functions as a host
computer to the Internet (using
Speed Tips and Tricks Internet Connection Sharing [ICS]),
you can get into connectivity
for Windows XP problems if you change the
Startup configuration of the IP address.
However, you can still work around
this problem by starting with the ICS
Aside from startup programs,
host computer.
services, and the Prefetch folder,
there are a number of other startup
Select Start/Connect To/Show All
procedures and issues you can
Connections. Right-click your
modify to help Windows XP start
network adapter card and click
faster. The following sections explore
Properties. On the General tab,
those tips and tricks.
select TCP/IP in the list of services
and click the Properties button.
Manual IP Addressing on Small
In the TCP/IP properties, you can
Office/Home Networks
see if you use an automatic or
manual IP address. In the example
Windows XP is configured to help
in Figure 4-5, I have configured a
you take care of networking. It uses
manual IP address of 90.0.0.1 and a
the TCP/IP protocol for networking in
default subnet mask. The other
workgroups, or what you might call
computers on my office network
small office or home networks that
each use a different IP address in
do not use a dedicated server.
the same class, such as 90.0.0.2,
90.0.0.3, 90.0.0.4, and so on. This
The problem is that automatic IP
way, each computer has a
addressing can be slow. When your
permanent IP address, which helps
computer boots, it has to query the
increase boot time. Note that if you
network to see what IP addresses
change the IP addresses of your
are already in use and then assign
computers, they must all use the
itself one. If you want to speed up
same subnet mask. A default subject
the boot time a bit, consider
mask of 255.255.255.0 will keep you
manually assigning IP addresses to
in good shape.
all computers on the network. This
way, the network computers do not
Make sure you understand the
have to worry about locating an
implications of changing IP
automatic IP address. Because one
addresses on your network. If you
is manually configured, the operating
have no networking experience at
system doesn't have to spend time
all, you may be wiser to leave the effect.
automatic IP addressing as is and try
to gain some speed using the
additional suggestions in this Disabling the Boot Logo
chapter.
You can remove the boot logo that
appears when you start Windows
Disabling Recent Documents XP. This little tweak probably shaves
History only a few seconds off your boot
time but seconds count if you are
Windows XP includes a feature that serious about trying to get Windows
keeps track of all recent documents XP up and running as quickly as
you have opened or used. The idea possible. The only negative is that if
is that you can select Start/Recent you remove the boot logo, you will
Documents History and quickly also not see any boot messages,
reopen any document you have such as check disk. (But if you are
recently used. I use many not having problems with your
documents each day and never use computer, this isn't such a big deal.)
the feature myself. In my opinion, I
can keep up with what I want to use To remove the boot logo, follow
without Windows XP doing it for me. these steps:
1. Select Start/Run, type msconfig,
The bad thing about Recent and click OK.
Documents History is that Windows 2. In the System Configuration Utility,
XP has to calculate what should be click the BOOT.INI tab.
put there each time you boot 3. On the BOOT.INI tab, click the
Windows, which can slow things NOGUIBOOT check box option.
down. So, if you never use the Click OK.
Recent Documents History, it's a
good idea to disable it. Here's how:
Removing Unwanted Fonts
1. Open the Registry Editor (select
Start/Run, type regedit, and click One trick that increases your boot
OK). time a bit is to lose any fonts in the
2. Navigate to Fonts folder in Control Panel that
HKEY_CURRENT_USER\Software\ you never use. The more fonts you
Microsoft\Windows\ have, the more processing Windows
CurrentVersion\Policies\Explorer. XP has to do to prep all of those
3. Create a NoRecentDocsHistory fonts for use. You must be a bit
D_WORD key. Double-click the careful here to not remove fonts that
value to open it once it is created. you might want, but there is a good
4. Set the Data Value to 1 to enable chance that you can live without
the restriction. many of them. For instance, you may
5. Click OK and close the Registry have foreign language fonts and
Editor. You'll need to restart the other symbol fonts (such as
computer for the change to take Wingdings) that you never use.
want to use them.
To delete unneeded fonts, follow
these steps: Note:
1. Open the Fonts folder in Control If you are interested in using Remote
Panel. Desktop or Remote Assistance, see
2. Select Edit/Select All and then my book Windows XP for Power
Edit/Copy. Users: Power Pack published by
3. Create a new folder on your John Wiley & Sons.
desktop, open it, and select
Edit/Paste. 1. Open the Start menu, right-click
4. In this new folder, delete any of My Computer, and choose
the fonts you do not want. Properties.
5. Return to the Fonts folder in 2. Click the Remote Tab.
Control Panel. Right-click the 3. Clear both check boxes to disable
selected fonts and click Delete. Remote Assistance and Remote
6. Go back to your new desktop Desktop.
folder and click Edit/Select All.
7. Return to your Fonts folder and
click Edit/Paste. You now have only Speeding Up the Dual-Boot
the desired fonts in the Fonts folder. Timeout

If you dual-boot your computer with


Windows XP and another operating
Tip: system, you see an operating
system selection menu on startup. If
You can directly delete fonts from you typically boot into Windows XP
the Fonts folder without creating the and not the other operating system,
secondary folder. However, I you can speed up the dual-boot
recommend the preceding steps to timeout value so that you do not wait
help ensure that you do not make a so long for the boot process to select
mistake in the deletion process. your default operating system and
continue with the boot process. The
default timeout value is 30 seconds
but you can change this setting to
Stopping Remote Assistance and 10. This gives you enough time to
Remote Desktop Sharing select the alternate operating system
if you want but also speeds up the
In Windows XP Professional, you boot process. You can skip this
have two remote networking features section if you do not use a dual-boot
called Remote Assistance and configuration.
Remote Desktop Sharing. These
remote networking features are very Follow these steps:
helpful in a variety of situations but if 1. Locate the boot.ini file on your
you don't use them, it is good idea to computer. It is a hidden file by
disable them to save boot time. You default; mine is located in C:\boot.ini.
can always enable them later if you 2. Open the file with Notepad (which
is what opens it by default).
3. Change the Timeout value to 10 1. Open the Registry Editor.
(see Figure 4-11). 2. Navigate to
4. Select File/Save and close HKEY_CURRENT_USER\Control
Notepad. Panel\Desktop. Select
WaitToKillAppTimeout and set the
value to 1000.
Speeding Up Your PPPoE 3. Select the HungAppTimeout value
Connection and set it to 1000 as well.
4. Navigate to
If you use a Point-to-Point Protocol HKEY_USERS\.DEFAULT\Control
connection over Ethernet (PPPoE), Panel\Desktop. Set the
you may notice a delay in using the WaitToKillAppTimeout and set the
PPPoE connection after startup. By value to 1000. Select the
default, there is a 120 second delay HungAppTimeout \newline value and
but you can stop this behavior by set it to 1000 as well.
manually configuring an IP address 5. Navigate to
for the network adapter card. If you HKEY_LOCAL_MACHINE\System\C
do not use a PPPoE connection, you urrentControlSet\Control. Select the
can skip this section. WaitToKillServiceTimeout value and
set it to 1000.
1. Select Start/Connect to/Show All 6. Close the Registry Editor.
Connections.
2. Open the TCP/IP properties for
your LAN network interface card. Automatically Killing Tasks on
3. Manually set the IP address on Shutdown
the TCP/IP properties to an
appropriate IP address and subnet You know the drill. You start to shut
mask for your network. down the computer, you wait a few
moments, and then you see a dialog
box asking if you want to kill an
Reducing the Wait Time application or service that is running.
Instead of prompting you, you can
When you start to shut down make Windows XP take care of the
Windows XP, it has to quit, or "kill," kill task automatically. Here's how:
any live applications or processes 1. Open the Registry Editor.
that are currently running. So close 2. Navigate to
all applications first. However, some HKEY_CURRENT_USER\Control
applications and processes are Panel\Desktop.
always running in the background. 3. Highlight the value AutoEndTasks
You can reduce the amount of time and change the value to 1.
that Windows XP waits for those 4. Close the Registry Editor.
applications and processes to close
before Windows XP kills them. Edit Well thats about it... when you done
three different Registry settings to all the steps you machine most run
change this: faster...without ANY errors!
Removing Windows
Windows Messenger 4.0 or later on
Messenger. a Windows XP Professional

1) Click Start, click Run, type


What is Windows Messenger? gpedit.msc, and then press ENTER
2) Double-click the following items to
Windows Messenger is the Microsoft expand them:
instant messaging program built into
Windows XP. There is also a * Local Computer Policy
Windows Messenger service built * Computer Configuration
into Windows XP that helps produce * Administrative Templates
pop up ads via IP addresses. The * Windows Components
two programs are completely * Windows Messenger
separate and do different things
even though Microsoft has 3) Double-click on the option "Do not
essentially named them the same. allow Windows Messenger to run",
and then click Enabled.
Windows Messenger (the chat 4) Click OK, and then close the
program) is equally annoying if you window
dont use instant messaging.
Microsoft has tightly integrated this Windows Messenger 4.0 on a
program into many of its other Windows XP Home Edition
programs including Outlook Express,
Outlook and Remote Assistance. 1) Start Windows Messenger.
However there are ways to either 2) Click Options on the Tools menu.
disable it from starting, remove it, or 3) Click the Preferences tab, click to
for the most part completely get rid clear the "Run this program when
of it. Windows starts" check box, and then
click OK.
How do I disable Windows
Messenger from running? Windows Messenger 4.5 or Later on
either Windows XP Home or
The procedures for disabling Windows XP Professional
Windows Messenger will depend on
the version of Windows Messenger 1) Click on Start, Run
installed on your computer. 2) Type REGEDIT and press Enter
3) Click on the pluses (+) next to the 4) Uncheck the box for Enable
following items Instant Messaging in Microsoft
Outlook
* HKEY_LOCAL_MACHINE 5) Click OK
* Software
* Policies Outlook Express
* Microsoft 1) Open Outlook Express
2) Click Tools, Options
4) If the folder Messenger is not 3) Click General tab
listed, click on the Edit menu, point 4) Uncheck the box for Automatically
to New, click Key, and then type log on to Windows Messenger
Messenger for the name of the new 5) Click OK
registry key
5) If the folder Client is not listed What about removing Messenger or
under Messenger, click on the Edit uninstalling Windows Messenger
menu, point to New, click Key, and from Windows XP
then type Client for the name of the
new registry key The procedure for removing
6) On the Edit Menu, point to New, Windows Messenger depends on
click DWORD Value, and then type whether your system has Windows
PreventRun for the name of the new XP Service Pack 1 installed. To
DWORD value. Remember all of this determine whether Service Pack 1 is
is case sensitive. installed follow these directions:
7) Right-click the PreventRun value
that you created, click Modify, type 1 1) Click on Start
in the Value data box, and then click 2) Right click on My Computer
OK. 3) Click on Properties
8) Quit Registry Editor. 4) On the General tab, under System
if the words "Service Pack 1" are
How to stop Outlook or Outlook listed you have the service pack.
Express from running Windows
Messenger when they are opened Removing Messenger from
computers WITHOUT Service Pack
Outlook 1 installed
1) Open Outlook
2) Click on Tools, Options Make sure your Internet Explorer,
3) Click "Other" tab Outlook Express, Windows
Messenger and other programs are * Software
closed before doing this. * Microsoft
* Outlook Express
1) Click on Start, Run
2) Type the following (or cut and 4) Right click on the Outlook Express
paste it) into the Run line folder, click on New, click on
DWORD value, and then type Hide
RunDll32 Messenger for the name of the new
advpack.dll,LaunchINFSection registry key
%windir%\INF\msmsgs.inf,BLC.Rem 5) Right-click the Hide Messenger
ove value that you created, click Modify,
type 2 in the Value data box, and
3) Click on OK then click OK.
8) Quit Registry Editor.
Removing Messenger from
computers WITH Service Pack 1 What about MSN Messenger ?
installed
MSN Messenger is another chat
1) Click on Start, Control Panel program from Microsoft that can run
2) Double click on Add or Remove simultaneously with Windows
Programs Messenger. Follow the instructions
3) Select Add/Remove Windows below to remove it.
Components
4) Uncheck Windows Messenger 1) Click on Start, Control Panel
5) Click Next 2) Double click on Add or Remove
6) Click Finish Programs
7) Restart your computer 3) Find MSN Messenger in the list
and click on it
How to remove Windows Messenger 4) Click on Remove
from Outlook Express

1) Click on Start, Run


2) Type REGEDIT and Press Enter
3) Click on the Pluses (+) next to the
following items

* HKEY_LOCAL_MACHINE
LAN TIPS the network card in your second
computer. Follow all of the directions
provided by the network card
Please note that there are several
manufacturer, using the driver
methods available to configure your
diskettes supplied with the card.
personal network. This document
has been provided for your • Connect the adsl modem,
convenience and is by no means computers, and network hub or
exhaustive. Also note that PCNET.ca Router, as illustrated in figure one
does try to provide technical support
for LAN • If your hub has a built in up-link port
configuration/troubleshooting issues. or your Router has a WAN(Wide
But with the great amount of different Area Network)port, use a regular,
configurations that are possible we straight through RJ-45 cable to
will strive to point you in the correct connect the ADSL Modem from the
direction. hub

• Hubs without an up-link port require


Different methods for configuring a a special crossover cable to connect
Local Area Network (LAN) include: the ADSL Modem to the hub's first
port
• Using a network hub to connect
computers to the ADSL modem • Connect the primary and secondary
computers to individual ports on the
• Installing additional network cards in hub using standard, Category 5, RJ-
one computer and connect another 45 Ethernet cable Do not plug into
computer and the ADSL modem to the number one port on the hub.
that computer
• Once you obtain a solid ADSL
• Purchasing a router/firewall to status green light ,and a solid link
connect multiple computers to it and light(s) on the hub and the adsl
the ADSL connection modem, the network connection is
established

To Configure Your LAN Using a Configure the second computer


Network Hub or Router: using the same steps performed on
your primary system. Windows
The following materials are required: 95/98, NT and Macintosh computers
all require an installed and
• 1 10/100 multi-port Ethernet hub or configured TCP/IP stack, using
Router DHCP.
• 10/100 Ethernet card and driver
disks for each computer Security Note
• Category 5 RJ-45 Ethernet cables
• 1 category 5, crossover cable (If hub If you enable File and Print Sharing
does not have an up-link port) on your network, drives and printers
must be password protected, in
If one computer is already connected order to maintain network security.
to the Internet, install and configure We suggest that you install a firewall
if you are going to want to use File new network card, as per Microsoft
and printer sharing on your internal recommendations.
network. Use the troubleshooting
guide at the end of this document if Install the network card into
you find there is no network subsequent computers using the
connection. manufacturer's driver diskettes.
Again, use standard DHCP settings
Figure 1 for the network card.

Figure 2

To Configure Your LAN with two


Network Cards in one Computer

The following materials are required;

• A second network card and drivers


for your primary computer
• A network card and drivers for you
second computer
• Category 5 RJ-45 Ethernet

In this scenario, your primary


computer requires a second network
card configured according to the
manufacturer's specifications. The
original DHCP settings for the
primary computer remain the same.
Install a separate TCP/IP stack for
the second network card.

Figure 2 demonstrates what you see


when all components for two (2)
network cards are properly installed.
The Computer Name remains
unchanged. NT Service Packs must
be reinstalled after you configure the
Security Note Get the Most Out of
If you enable File and Print Sharing Your DVD Recorder
on your network, drives and printers
must be password protected, in
order to maintain network security. Whether you're recording TV shows or
Use the troubleshooting guide at the converting your VHS tapes to disc, these
tips will help.
end of this document if you find there
is no network connection. I admit it: I'm a former tape-a-holic. When I
began using a VCR some 20 years ago (I
Connect the primary computer, ended up teaching Mom and Dad how to
secondary computer and ADSL program the darn thing back then), I got
Modem, as shown in Figure 3. You hooked on the idea of creating my own
video library, replete with everything from
are now ready to install the software Star Trek episodes to gymnastics
on the second computer. Follow the competitions.
troubleshooting guide at the end of
this document if there is no network
connection.

LAN Trouble Shooting Guide

After checking all hardware


connections and installing software,
your primary computer will obtain an
internet address (IP) and connect to
the Internet using either network
configuration. The secondary
computer will obtain an IP address
providing you have correctly entered
the computer name (CS#) and
configured the TCP/IP stack.

Verify both computers have a valid


IP address. Windows 95/98 & ME
systems use the winipcfg utility, Recently, however, I stopped recording
while Windows NT uses ipconfig. Go video on tape and switched to DVD--and I
to the command prompt on the haven't looked back. But after using several
DVD recorders, I've identified some quirks
primary computer and Ping the IP and frustrations that are specific to frequent
address of the secondary computer, users like myself. Recording to DVD is very
and vice versa. If you have a working different from recording to tape; you
connection, you'll see a reply from encounter new types of hassles ranging
the other computer, indicating the from pesky so-called disc preparation times
to annoying delays in ejecting discs and the
speed of data transfers from one IP challenge of creating visually appealing
to the other. menus. The tips that follow are geared
towards hardcore videophiles (you know
who you are), but they're also applicable to
the most casual user.
days is integrated into these units at no
1. Choosing the Best Recorder for TV added cost.)
If you've already bought your DVD recorder,
skip to tip 2. But if you haven't, be prepared I don't make this recommendation just
to be confused by a torrent of acronyms and because of TiVo's personalized recording
options. DVD+R, DVD+RW, DVD-R, DVD- features and friendly graphical interface. The
RW, DVD-RAM, EPGs ... and you thought reason I suggest going this route is that
buying an HDTV would be confusing. these recorders have an amazing capacity
to automatically create navigational menus.
When you walk into a store, chances are All of the program data in TiVo's electronic
you won't be able to tell the differences program guide--as well as TiVo's visual
between the slim DVD recorders gracing the menu navigation structure--conveniently
shelves--at least, not at a glance. On the transfers over to any disc you burn.
outside, they look virtually identical. And the
only additional information you might get DVD recorders are typically limited in what
from the price tag or label is what format the they can do to label menus. When you
recorder supports and whether it has a hard record a disc, you end up with a generically
drive. labeled index, with thumbnails for each
recording or "title" on the disc, and boring
Don't stress so much about the formats. No and uninformative labels like "Title 01" (with,
single manufacturer supports all of the perhaps, the time and date added for good
formats available; a couple of makers come measure). TiVo-enabled recorders, in
close (Lite-On, Sony), supporting all but contrast, provide disc menus with the series
DVD-RAM. The - and + formats are quite name, episode title, and even a program
similar, and either will get the recording job summary as well as the date and time of the
done. recording. If you're recording to cheap write-
once media, this feature is invaluable. If
I've personally observed that the - format you're recording to rewritable media--which
discs tend to take longer to initialize and means you could conceivably edit the menu
finalize. By longer, I'm talking about titles at some point--this capability is still a
anywhere from 5 to 120 seconds, depending huge time-saver.
upon the unit--enough to be incredibly
annoying when you're sitting in front of the Avid videophiles who don't want to spring for
TV, your finger eagerly hovering over the TiVo should look for a DVD set-top unit with
record button to start a recording, or the a high-capacity hard drive of 80GB or more
eject button so you can swap discs without and high-speed dubbing of at least 8X. So
missing any action. far, I've seen only one recorder with both
high-speed dubbing capability and a high-
If your goal is to record a lot of TV shows, capacity hard drive, but I imagine that more
then I can't recommend highly enough a such units will be forthcoming--eventually.
DVD recorder with integrated TiVo service.
Humax, Pioneer, and Toshiba all offer such Beware of units that bill themselves as
recorders, which combine a hard drive of having "high-speed" dubbing: In most cases,
80GB or greater with a DVD burner, and, of the manufacturer is using the term to denote
course, the TiVo service. The full-blown recording speeds of 2X or 4X from the hard
TiVo service costs extra ($299 for the drive to DVD. Furthermore, some vendors
lifetime of the unit, on top of the cost of the are coming up with absurd-sounding
recorder) and adds two-week's worth of dubbing speeds--for example, 32X, a
program guides, a season-pass feature that number they derive based on how many
records all episodes of a show so you never hours' worth of recordings you can fit on a
miss your favorites, and artificial intelligence disc (8 hours at the lowest-quality recording
that finds and records programs you might mode), and the speed of the burner (4X in
enjoy. (A free limited version of TiVo's my example).
software that downloads electronic
programming information for the next three
whether it's the $30 Costco special in your
2. Allow Extra Time bedroom or your laptop's DVD-ROM drive.
If you're preparing to record a program,
budget a few extra minutes to get the unit Caution: You might think you don't need to
ready. Believe me, the seconds add up--as I finalize if you don't have more than one DVD
learned during my recording marathon of the player or drive, and you plan on playing your
Athens Olympiad. You need to factor in up DVD on your own recorder only. But what
to 30 seconds for the recorder to boot, about happens when, inevitably, you upgrade your
10 to 20 seconds for the disc to spin up, and recorder to a swankier, newer model? Or,
at least another 30 to 45 seconds for the even worse, when the model you're using
recorder to prepare the disc for recording now isn't working five years down the line?
(your unit might say "initialize" or "format"). Then what? You'll be left with a library full of
That's all before you can hit Record. unreadable discs. Although you might be
able to recover the raw video data from an
And when you're through recording, expect unfinalized disc using a program like
to wait 30 to 60 seconds to regain control of Infinadyne's CD/DVD Diagnostic, the
the recorder after you hit Stop. With some process is tedious and time-consuming.
models, the delay occurs after you hit Eject. Also, don't count on scavenging a backup
Either way, that delay could mean you'll unit off EBay in a few years: As I've learned,
miss the beginning of the next gymnast's discs may not be interchangeable, even
routine--and none of this takes into account between two recorder decks bearing the
disc finalization, which can take another 30 same model number from the same
seconds to 3 minutes, depending upon the manufacturer.
disc's format and how much of it you've
used.
4. Don't Abuse Your Discs
It's easy to leave discs out of their cases,
3. Finalize, Finalize, Finalize lying around or stacking up as you swap 'em
Disc finalization is the process that closes out for a new one. But avoid that temptation-
the disc so it can be read in other devices, -the dust will damage your discs, and you
such as a DVD player, DVD recorder, or increase the chances of accidental
DVD-ROM drive. It's also a process that scratches and scuffs.
bites. There, I've said it.
Also, avoid leaving your recorded DVDs
Finalization is the dirty little secret of DVD near a sunny window. The disc's dye layer is
recorders: It's a time-consuming extra step susceptible to light and heat; if either affects
that users of the venerable VCR don't the disc, its data may become unreadable.
expect. And it requires more effort than it
should, due to poor menu design on DVD Finally, clean your discs carefully. Use a lint-
recorders. I've yet to see a recorder that free cloth, compressed air, or a liquid
makes this step truly easy--all of them bury it cleanser intended for use with DVD media.
under a setup or menu item, and all of them Dust and other airborne particles can
require far too many clicks and layers scratch your disc, which could result in data
considering this is a N-E-C-E-S-S-A-R-Y loss. When cleaning with a lint-free cloth,
step for every write-once DVD-R or DVD+R stroke from the inside of the hub to the
you burn. outside of the disc. Never use a circular
motion from the inside out; and never use a
I recommend finalizing your disc as soon tissue, paper towel, or other random rag.
you're through recording. Due to quality
issues, you'll likely record only a maximum
of 2 hours of television per disc, which 5. Choose Your Media--and Labels--
means that no more than two weeks will Wisely
pass between finalization sessions. This A cheap spindle of media is tempting, but
way, when you go back to a recorded disc, it then you have to buy cases separately. And
will be ready to play in any DVD player-- what cases to buy? Small plastic jewel
cases? DVD movie-size cases? The
combinations can be frustrating, at best.

Spindles are indeed affordable, but don't


buy them without buying cases, too--and
keep both stashed near your TV and DVD
recorder setup, so you can easily grab a
disc from the recorder and place it into its
case. Otherwise, it's way too easy for stacks
of discs to pile up--a no-no, as I note in tip 4.

Also, consider buying discs that come in


oversized movie-style plastic cases. You'll
pay a little more, but the convenience is
worth it. Plus, you'll get a cardstock insert
that you can use to create handwritten
labels. If you get a high-speed dubbing unit,
make sure you buy media that matches the
recorder's speed.

If you do buy spindle media, keep in mind


that the cases you buy in bulk may not have
an insert on which you can scribble. If the
case lack inserts, improvise with a piece of
letter-size paper, folded over or cut up to fit
accordingly. Spend a little more money, and
you can get cardstock inserts.

There are a host of labeling software options


out there to help you craft your labels. But all
of these options are going to require you to
move your labeling operation over to the
PC--something that may not work into your
recording work flow.

Other PC-based labeling options include


printable media that you can use with an
inkjet printer. I'd stay away from adhesive
labels, though: They're difficult to apply
evenly, and could cause problems if the disc
is poorly manufactured.

If you're trying to keep your labeling efforts


nearer to your TV, I'd suggest using water-
based pens to write on the discs, and on the
label inserts, too, while you're at it. Another
possibility: If your handwriting is barely
better than chicken scrawl, then it's worth
buying a battery-operated labeler, such as
those offered by Brother or Casio. Both
companies offer half-inch-wide labels that fit
well along the spine of a DVD movie case.
own bandwidth. Here is what happens when
All About Wingates you FXP with a wingate:

You
Q: What is a Wingate? |
Commands
|
A: A wingate is normally a program which |
allows multiply computers on a network to FTP <=> Files & Commands <=> Wingate
share one internet connection. Many users <=> Files & Commands <=> FTP
foolishly have their wingate setup for
anonymous outside access which means we
can share their internet connection also. Secondly Wingates can be used to hide your
Many are run from users at home with own identity when messing with pubs.
broadband connections and can be upload Whether that be uploading, tagging or just
capped at anywhere from 16KBps - 24KBps, browsing. I always enable my Wingate
occasionally you will stumble across a nice while browsing pubs just to be safe. You will
and fast wingate with a really good transfer notice a slight slowdown but it is worth it
speed. because most Wingates do not have logging
enabled, so the sysop of a pub would have
to do a lot of work just to get your ip. Even if
Q: What the heck are they for? logging is enabled on the wingate most
sysops will not bother to annoy the people
for their logs.

Q: How do I get Wingates?


A: You can find them in posts in the "Scans"
section of most FXP boards. You can also
learn how to find your own while doing a pub
scan in my Scanning - Getting Started
tutorial.

Q: How do I use these things?


A: I have found that this is a mystery to
many people. It can be tricky but once you
A: Primarily Wingates are used as an aid in figure it out it's simple to do again.
FXPing files from one pub to another. Now
why do you need to use a wingate? Well
I primarily use Wingates with FlashFXP, but
most pubs have FXP transferring disabled
have also gotten them to work in SmartFTP
and you also cannot FXP from one NT pub
(May add info on this later). If you don't
to another NT pub. If you use a wingate
already have FlashFXP downloaded and
almost any set of pubs becomes FXPable
installed do that now. Now all you need to
because the files go through the wingate.
do is go into the options and to the "Proxy /
One pub thinks it is uploading to the wingate
Firewall / Ident" tab and enter in the correct
and the other thinks it is getting uploaded to
information. For the type select option 10,
from the wingate. The only downside to this
or if that causes error message with the
method of FXP transfer is that if the wingate
wingate option 11 can be used. *For
is slow your transfer will go slow. Always
FlashFXP < 1.4.2 use "User with no login
use the fastest wingate you have to speed
(user@host port)," or (user@host:port).
up transfers. Even with 56k you can FXP,
Enter in your Wingates address where it
and transfer files and unbelievable speeds
says "Host" and set the port number to 21.
because FXPing uses almost none of your
If you have a port 23 wingate it will not work
properly for FXP transfers, any other port
and it is most likely not a wingate. Some You
pubs/Wingates also want to request and |
Ident so enable this and just put "@msn" for Commands
the user id. That's it, your now ready to |
connect to pubs anonymously and FXP with Socks Proxy Server
ease. / \
Commands Commands
/ \
FTP <=> Files <=> FXPable FTP

All About Proxies


Q: How do I know if my proxy
Q: What are the different kinds is anonymous?
of proxies?
A: The easiest way to tell is to plug it into
you're browser and go to one of the many
A: (Mostly copied from Net Knowledge anonymous proxy checking websites. I'll
Base, tweaked to my liking) show you how to plug it into Internet
Explorer 6, anything else and your on your
Browser Proxies - Ports 8080, 3128, 80 - own for now.
These can be use to browse the internet
anonymously if you're paranoid about First load up IE and go to
people tracking you down. Tools -> Internet
Options... then switch it
Here is a diagram to help describe what is over to the "Connections"
happening when you use a browser proxy: tab. Here you will need to
click one of two buttons
Your Computer -> Internet -=> Proxy Server dependi
(An Intranet) -=> The Internet You Visit ng on
whether your on Dial-Up
Socks Proxies - Port 1080 - Some need or a Broadband/LAN
authentication, some don't. Sometimes connection. Look at the
people set up proxy servers, but allow screenshot and click the
outside access to them. These are your correct button. Once in
friends, they are kind enough to let you there it looks pretty much
connect through them, even though they the same for both
probably aren't aware. But beware, your IP buttons. Select the box in the "Proxy server"
is always in the log file, and can be passed section that says "Use a proxy server for
along. To check see How do I know if my your...". Then press the advanced button to
proxy is anonymous?. But remember to right of the check box. This brings us to the
switch your browser back, don't surf with next screen shot and where you enter the
Socks proxies. They usually disconnect you actual proxy information. If you have a
if too many bytes are moved through them. Socks proxy leave everything blank except
the "Socks" sections where you will enter
the address and the port (usually 1080).
Here is what happens when you use a proxy
Now get out of all of those dialogs by
to connect to two FTP sites and transfer files
pressing "OK" on each one. You're now
between the two:
setup to browse the internet with a proxy.
To test it out go to one of the following web
pages: MutiProxy -or- AllNettools. If it
shows the proxy ip address and not yours
then it's not going to show it to to any pubs
you connect to either.
Q: How do I get proxies? Next, apply this information in
designing a network of wireless
A: The easiest way is to check your favorite access points (AP). APs are the
FXP board for "SOCKS" posts, which should infrastructure radios, usually ceiling-
contain proxies. Also if you want to find your mounted, which connect to the wired
own head over to Scanning - Proxies.
network on one side and to users'
wireless network adapters over the
Q: How do I use these things? airwaves on the other. Wireless
veterans stress the importance of
A: Many people think this is something
complicated and painful but it is so simple site surveys and performance testing
you wouldn't believe it until you read this. to optimize AP placement.

It's actually pretty much the same as using a "This is because variations in
Wingate except slightly different settings. If firmware, antennas and physical
you don't already have FlashFXP layout can alter the performance and
downloaded and installed do that now. Now
all you need to do is go into the options and range of the very same [wireless]
to the "Proxy / Firewall / Ident" tab and enter chip set," says Craig Mathias, an
in the correct information. For the type analyst at Farpoint Group in
select either "Socks 4" or "Socks 5" Ashland, Mass.
depending on what type of Socks proxy
you're going to use. Enter in your proxy
address where it says "Host" and set the Because it's difficult to anticipate
port number to 1080. If you have a proxy on where walls and objects will interfere
any other port it is most likely not Socks and with wireless communication, a
not really what we want (and it will not work network staff member armed with a
with the Socks settings). Some pubs also wireless laptop typically walks
want to request and Ident so enable this and
just put "@msn" for the user id. That's it, around, installs APs and tests
your now ready to connect to pubs coverage—often trying out multiple
anonymously and upload without fear. antenna options for maximum signal
strength.

Wireless LAN This exercise will reveal how many


APs you need to meet capacity
FAQ requirements and how to position
adjacent APs to prevent coverage
holes. There are some rules of
thumb about how many users a
single AP can support. Gartner Inc.,
for example, recommends about 20
1. How do I plan capacity for a knowledge workers per 802.11b
mobile network? Wireless experts (11Mbit/sec.) radio.
suggest that you first identify which
applications the network will support But these ratios vary. Warehouses
and how much bandwidth they will often need lots of APs to ensure
consume. Then calculate how many floorwide coverage. But warehouse
users need mobility and in what applications don't consume much
places within your organization they bandwidth, and utilization of these
will require it.
APs is often only 2%, says Rob APs to further minimize interference,
Greenfield, chief scientist at SCLogic advises John Lawson, vice president
Inc., a reseller of WLANs in of IT and CIO at Tulane University in
Beltsville, Md. New Orleans. The university has
installed 1,200 APs from Andover,
On the other hand, a crowded office Mass.-based Enterasys Networks
space will require many more APs— Inc. across multiple campuses.
not to achieve range, but to support
more users and heftier applications. To segregate traffic in neighboring
devices, 802.11b offers three
"Shoot for under 40% to 50% AP different channels. "I've tried
utilization in office environments," installing APs without channel
Greenfield suggests. That will planning," says Lawson. "The result
compensate for not knowing how was unacceptable interference."
many users will be in range at any
given time. 3. Is my WLAN really secure? This
is a complicated question. Security
2. How can I avoid interference? advances collectively called Wi-Fi
Having multiple devices that use the Protected Access (WPA), based on
same frequency can result in emerging IEEE standards, will ship
interference with performance. in new products later this year. WPA
United Parcel Service Inc. learned overcomes the notorious static-
this when it combined short-range encryption-key weaknesses in
Bluetooth (1Mbit/sec.) wireless 802.11b's Wired Equivalent Privacy
technology with 802.11b LANs in a standard. In addition, comprehensive
warehouse pilot, explains Joan vendor-proprietary products and
MacEachern, lead services have long been available to
telecommunications analyst at the reinforce wireless privacy.
Atlanta-based worldwide package-
delivery company. Both Bluetooth However, to optimize security in
and 802.11b run in the 2.4-GHz WLANs immediately, the best
frequency band. approach is to employ IPsec virtual
private networks, which use Layer 3
To solve the problem, UPS and its encryption, even on a local
technology vendor, Symbol enterprise campus, says Dave
Technologies Inc. in Holtsville, N.Y., Passmore, an analyst at Burton
synchronized the Bluetooth network Group in Sterling, Va.
with Symbol's 802.11b APs. "Time
Division Multiple Access technology "This requires IPsec client software
in Symbol APs has scheduled the on user laptops and a device that
two networks to transmit at different terminates IPsec tunnels inside the
intervals to avoid overlaps," explains enterprise network firewall," he
MacEachern. explains.

And don't forget to alternate use of Passmore notes, however, that


802.11b channels in neighboring forthcoming WPA-compliant
products should resolve the need for Finally, emerging dual- and
local IPsec use in many multimode products "will eventually
organizations. make upgradability a nonissue," says
Mathias. Several enterprise-class
4. Which technology should I vendors offer APs that support
choose from the alphabet soup of 802.11a and a slot for either an
WLAN standards? Ken Dulaney, an 802.11b or 802.11g radio.
analyst at Gartner in San Jose, has a
simple answer: "802.11b is the only Meanwhile, trimode 802.11 b/a/g
mature, worldwide standard that can chip sets recently began shipping, so
be deployed today," he says. "For client adapters and APs that support
most enterprises, 802.11b bandwidth all WLANs could be available within
should suffice for most office tasks a year.
for at least the next four years."
5. What's the best way to manage
UPS, for example, is "building to my radio infrastructure? A wave of
current requirements, which is new WLAN "switch" architectures
802.11b," both in its warehouses and from established companies such as
at its IT headquarters, says Fred Symbol and Proxim Inc., as well as
Hoit, UPS's radio frequency from a bevy of start-ups, aim to ease
infrastructure manager. "We AP configuration and management in
anticipate a five-year life cycle," Hoit large installations. The idea is to
says. centralize control of a dumb AP
infrastructure in a "smart" collapsed-
Opinions are mixed about 802.11a, backbone device.
the successor to 802.11b that runs in
the 5-GHz frequency band with This approach purports to lower the
much faster speeds (54Mbit/sec.) but cost of each AP—which adds up in
a shorter coverage range. On the large shops that might require
plus side, you avoid interference hundreds or thousands of them—
when running 11a and 11b in and to enable greater scalability and
parallel, because the two LANs use lower operations costs.
separate frequencies. But Greenfield
says it's worth waiting a year for But that doesn't mean that if you
802.11g-compliant products to gain want a smart AP, you can't get
cross-compatibility with 802.11b. centralized management, too—
unless this option blows your budget.
The shorter transmission range of For example, Cisco Systems Inc.
80211a "means you'll need many offers its Wireless LAN Solutions
more APs for the same coverage, Engine, a data center appliance and
which will be more expensive," he CiscoWorks management module
says. Like 802.11a, 802.11g that centrally configures and
supports aggregate 54Mbit/sec. manages up to 500 APs. But Cisco
speeds but runs in the 2.4-GHz band Aironet 1100 and 1200 APs are far
and was designed for backward from dumb; they run the full
compatibility with 802.11b. complement of Cisco Internetworking
Operating System routing software— slower, 2.5/3G packet data services
enabling, for example, wireless (see chart above).
virtual LAN (VLAN) support.
Today's 2.5/3G services provide 20K
Symbol also supports wireless to 60Kbit/sec. throughput per user,
VLANs, but it builds them into its depending on the technology used.
Mobius Axon wireless switch, not So multimegabit-speed Wi-Fi
into the AP. VLAN profile information networks, where available, offer a
is enforced before incoming traffic better-performing option.
hits the wired network or outbound
traffic is distributed to wireless users.
DDR FAQ
6. Can I integrate WLANs with
other networks? Network nirvana is
when users can roam among
disparate wired and wireless
networks without having to What is RAM and why do I need
reconfigure settings or it?
reauthenticate. Multimode products
are emerging that combine several
versions of 802.11, as well as Adding memory (RAM) to your
connectivity to 2.5- and 3-generation system is the cheapest and most
(2.5/3G) mobile WANs from the effective way to make it run faster.
licensed carriers. For example, You can think of RAM as an
Texas Instruments Inc. in March incredibly fast hard drive that stores
announced chip sets for PDAs that information temporarily instead of
combine 802.11b, GSM/GPRS and permanently. When you start a
Bluetooth capabilities. NetMotion program it is loaded from the hard
Wireless Inc. in Seattle has client drive into RAM. When a program is
software for roaming among any running in RAM it can run hundreds
type of packet-based wired or to thousands of times faster than it
wireless LAN or WAN. The software can if run directly from the hard
simply detects the most robust drive. The problem is that the
network connection available and capacity of a standard hard drive is
transparently connects the user to it, many times the size of a computer's
keeping VPN sessions intact. RAM size, meaning it is possible to
load so many programs that the
Such internetwork roaming will grow RAM can no longer hold them. When
increasingly handy as WLAN-based that happens, your computer's virtual
public services, called Wi-Fi hot memory kicks in, and your system
spots, continue to sprout up in tries to read from your hard drive
airports, hotels, malls and other instead..
public locations. The licensed 2.5/3G
carriers have begun offering With the addition of more RAM, you'll
802.11b-based hot-spot services to be able to keep more programs open
complement their ubiquitous, but at once, speed up program
launches, and experience fewer What is bandwidth?
system crashes. Plus, it's a pretty
easy upgrade to make, requiring little Actually, it's a pretty simple concept.
technical expertise. Bandwidth is the amount of data you
can use (reading, writing, etc.) during
a given time period. Bandwidth is
So what is DDR RAM then? usually defined as the number of bits
per second that your computer can
handle.
DDR is the acronym for Double Data
Rate Synchronous DRAM (SDRAM). Remember that your computer
DDR SDRAM memory technology performs read and write operations
has evolved from mainstream PC100 redundantly. When you open a file,
and PC133. This memory technology your computer doesn't just call it
has enabled a new generation of from the hard drive to your screen; it
higher performance computer reads to and from the processor,
systems, including desktops, RAM, cache, memory, and hard
workstations, servers, portables, as drive every time you access a
well as new communications document. Even if you're just using a
products such as routers and word processing program to write a
switches. DDR memory technology letter, you're moving a lot of data
is also widely used in high- between the various parts of your
performance graphic adapters. computer that store information.
Start working on Digital video editing
DDR memory is clocked at the same or multiply this by hundreds of users
speed as normal SDRAM (ie 100, and you can see why bandwidth
133mhz), The big difference becomes a much bigger deal for
between DDR and SDRAM memory servers.
is that DDR can transport double the
amount of data it reads by utilizing A P3 processor with a 133MHz front
both the rising and falling edges of side bus (FSB) has a bandwidth of
the clock signal. SDRAM only carries about 1.06GB (gigabytes) per
information on the rising edge of a second. If this was all that your
signal. Basically this allows the DDR memory had to support, PC133
module to transfer data twice as fast SDRAM would probably be just fine.
as SDRAM. For example, instead of But, in addition to the supporting the
a data rate of 133MHz, DDR processor, the memory also has to
memory transfers data at 266MHz. support the bandwidth of the
Double data rate (DDR) SDRAM Peripheral Connect Interface (PCI)
gives you twice the bandwidth of bus as well as the newer high
standard SDRAM. performance graphics cards using an
Accelerated Graphics Port (AGPX4)
and soon AGPX8 will be demanding
a whopping 2133MB/s alone. .
Newer CPU’s have increased this
requirement even further, the AMD
Athlon XP using a 266mhz FSB speed of 166mhz reviewed by
(DDR) and the P4 Northwood upto a JEDEC and released by many of the
533mhz FSB (Quad-pumped) its not leading memory manufacturers early
long before your memory is a huge in 2002. Since DDR technology can
bottleneck in your system and other perform two data operations per
components are sitting around clock cycle (versus SDRAM’s single
waiting for it to catch up. This is why operation per clock cycle), the
a higher bandwidth memory is effective data throughput of a DDR
required. Enter DDR SDRAM. The DIMM are doubled over an SDRAM
266MHz DDR SDRAM (133MHz DIMM. For example, a 200MHz DDR
doubled) has the bandwidth of DIMM will support a 100MHz
2.1GB/sec and is referred to memory bus and a 266MHz DDR
PC2100. The PC2700 2.7GB/s and DIMM will support up to a 133MHz
PC3200 DDR upto 3.2GB/s. Future memory bus and 166mhz supporting
DDR standards aiming at upto 333mhz. A 200 MHz (400mhz DDR)
8.4GB/s (DDR533 Dual channel) has also been released but not yet
with Quad channel also being Jedec approved.
worked on.
An additional benefit of DDR is that it
only uses 2.5 volts per signal, as
So how does it work? opposed to the 3.3 volts used in
current SDR SDRAM. This may not
seem like much, but the less power
As in standard SDRAM, DDR required to drive the memory, the
SDRAM is tied to the front-side bus less drain on your power source.
clock in your system. The memory Less power also means longer
and bus execute instructions at the battery life in laptops!
same time rather than one of them
having to wait for the other. As bus JEDEC Specifications
speeds have increased, this has
improved system performance. DDR The specifications for DDR DIMM
modules, like their SDRAM modules are finalized by JEDEC.
predecessors, are called DIMMs. JEDEC is the semiconductor
They use motherboard system engineering standardization body of
designs similar to those used by the Electronic Industries Alliance
SDRAM; however, DDR is not (EIA) with about 300 active member
backward compatible with SDRAM- companies representing every
designed motherboards. DDR segment of the industry.
memory supports both ECC (error
correction code, typically used in
servers) and non-parity (used on
desktops/laptops.)

DDR DIMMs currently support


memory bus speeds of either 100 or
133MHz, with a faster memory bus
The naming convention Why Use DDR Technology?
recommended by JEDEC is as
follows:
DDR memory technology is an
Memory chips are referred to by their evolutionary improvement of mature
native speed: PC100 and PC133 SDRAM
technology. DDR memory chips are
200 MHz DDR SDRAM memory produced by semiconductor
chips are called DDR200 chips, and manufacturers using existing wafer
266 MHz DDR SDRAM memory fabs, processes and testers resulting
chips are called DDR266. in lower memory chip costs.

DDR DIMM modules are referred to Major technology and chipset


by their peak bandwidth, which is the companies, including, but not limited
maximum amount of data that can to, Intel® Corporation, Advanced
be delivered per second: Micro Devices, VIA Technologies,
Acer Labs (ALi), Silicon Integrated
A 200 MHz DDR DIMM is called a Systems (SIS), nVIDIA, ATI® and
PC1600 DIMM, and a 266 MHz DDR ServerWorks have supported DDR
DIMM is called a PC2100 DIMM. memory since its inception.
Motherboards and systems
To illustrate this on a 266 MHz DDR supporting DDR memory technology
DIMM module: Each module is 64 were introduced in Q4, 2000, and
bits wide, or 8 Bytes wide (each byte have ramped into high volume in
= 8 bits). To get the transfer rate, 2001. Now in 2002 its become hard
multiply the width of the DIMM to find a SDRAM based board.
module (8 Bytes) by the rated speed
of the memory module (in MHz): (8 DDR DIMMs have the same physical
Bytes) x (266 MHz/second) = 2,128 dimensions as SDRAM DIMMs, but
MB/second or about 2.1 have a different footprint that uses
Gigabytes/second. Therefore, the 184 pins compared to 168-pin
memory module is often referred to SDRAM DIMMs. Therefore, DDR
as PC2100. Similarly, a PC2700 memory technology is not backward-
DIMM module utilizes memory chips compatible with SDRAM and
rated at 333 MHz. requires motherboards and systems
especially designed for DDR.
JEDEC is already finalizing the DDR
II spec, which will double the data Add pic here
DDR - PC266 Single Notched Two operations
transfer once more, using the quad- 184 Pin DIMM (or Keyed) per hertz
pumped technology that is common VS
in AGP4x bus and the Pentium 4 Add pick here
SDRAM - PC133 Double Notched One operation
bus. Speeds of 600-800mhz for DDR 168 Pin DIMM (or Keyed) per hertz
are not far away.
DDR Question and Answer and Celeron processors do not
show any improvement when
used with DDR. The Intel P4 and
Q. How much faster is DDR when AMD Duron / XP range have
compared with PC133 SDRAM? shown a marked increase in
performance when matched with
A. While many factors need to be DDR RAM.
considered when determining
performance, applying a number of Q. What is the Cas Latency for
speed tests to DDR platforms DDR memory?
running a 1.2 GHz CPU can show
performance improvements of 30%
over PC133 SDRAM. A. DDR specifies a CL of 2.5 or 2.
At this time 2.5 is the most
Q. How much faster is DDR common value used in most
when compared with PC800 systems. Most quality ram we
RDRAM? have found runs at Cas2 and is
sold as such.
A. While again many factors need
to be considered when Q. Can you run PC133 on DDR
determining performance, in some motherboards?
applications we have seen a 5 -
10% improvement in speed. In A. No the connector on DDR is
others the RDRAM has shown to 184 rather than the 168 pins on
be up to 10% faster. The thing to the SDRAM. There are some
note is that DDR generally is less “transition” boards available that
than ½ the price of RDRAM have both SDRAM and DDR RAM
sockets. These allow you to use
Q. Do I need a special your older SDRAM and upgrade
motherboard for DDR? to the faster DDR as your budget
allows. You cannot use both at
A. Yes, your motherboard must the same time.
support DDR. Currently all
motherboard manufacturers have Q. How do you know it's time
DDR motherboards. The only for a memory upgrade?
question is which one and how
fast do you want to run it. A. There are several signs
indicating it may be time to
Q. Do I need a special CPU to upgrade your memory. If you see
support DDR? your mouse pointer turn into an
hourglass for significant periods of
A. Yes to take advantage of the time, if you hear your hard drive
performance benefits of DDR you working, or if your computer
must use a CPU that can take seems to work more slowly than
advantage of an increase in you expect, the reason is probably
memory bandwidth. The pentium3 insufficient memory. When the
memory is full, your system appearance of data from the RAM
transfers data to the hard drive. Chips on the module. CAS 2 is
This is called swapping. Since the therefore faster than CAS 2.5 as it
hard drive is considerably slower only takes 2 clock cycles in lieu of
than DRAM, your system seems 2.5.
slower altogether. Active to Read or Write Delay - -
The number of clocks between
Q. What about static electricity? the activation of a particular row
address inside the SDRAM's on
A. Before installing your memory, the module and the issuance of a
discharge any static electricity by read or write command to that
grounding yourself to a metal row.
object, such as the casing on your RAS Precharge - The minimum
computer. An anti-static wrist number of clocks between the
strap is recommended for completion of one memory access
additional safety. and the beginning of the next.
[Bookmark]ECC or (Error
Q. What Memory timings, Cas Checking and Correction)
Latency etc?
Q. What is the difference
A. If you look in your BIOS of your between ECC and non-ECC
PC you will find a range of (non-parity) memory?
settings that you can adjust in
relation to your memory. These A. If you are unsure of which type
can have a huge effect on not you have, just count the number
only system stability but also on of small black chips on one of
overall performance. I have read your existing memory modules. If
many reviews that don’t take the number of chips divides by
memory timings into account three evenly, then you need ECC.
when benchmarking a system. If the number of chips is does
You can make a very quick NOT divide evenly by three, you
system very slow if these settings have non-ECC or non-parity
are set up incorrectly. Alternately memory.
you can make your system If you plan to use your system as
perform a lot better if you learn to a server or a similar mission
tweak these settings. The most critical type machine, you may
common are CAS Latency, RAS want to take advantage of ECC. If
to CAS Delay and RAS you plan to use your system for
Precharge. Remember if you set regular home, office, or gaming
these to aggressively you can applications, you are better off
make your system unstable. with non-ECC. Current technology
DRAM is very stable and memory
CAS (Column Address Strobe) errors are rare, so unless you
Latency - The time from the have a need for ECC, you are
application of the memory better served with un-buffered
module's CAS address to the DDR SDRAM.
Q. How Much Memory Is
Q. What is meant by Registered Enough?
memory?
A. People will tell you that you can
A. "Registered" is a means of never have enough memory, but
"Buffering" the memory in that's not necessarily always true.
SDRAM. This means that the Some operating systems have
clock signal is boosted across the issues with large amounts of RAM
entire array of memory chips so and your applications may not
that the computer sees a clean ever use it if you have excessive
sharp clock signal instead of a amounts. Most motherboards
weakening clock signal as it have limits on the amount of
progresses along the length of the memory that your system can
memory path. Registered memory have or that the board can handle.
must be supported by the system If you're building a new PC, be
board and cannot be mixed with sure to check this out with the
"Un-buffered" modules. You must manufacturer before purchasing a
have only registered memory to motherboard.
use registered memory. This is a
further means of eliminating the Q. What is Virtual Memory ?
possibility of errors when reading
the data in memory and is used A. Virtual memory is simply your
when the data returned from hard drive trying to act like a RAM
memory is extremely critical, such chip. Your operating system
as in scientific or financial creates a temporary storage area
calculations where the integrity of on your Hard drive and uses it to
the data is CRITICAL. It also store some of the information it is
allows a module to be built using using at a given point in time.
more chips, allowing for larger Since the hard drive is so much
capacity modules to be made. slower than real memory,
programs stutter and sometimes
Q. What types of DDR memory crash when the hard drive has to
are available? do a job it was never designed for.
If you have enough physical
A. There are currently three types memory your virtual memory is
of DDR memory available. rarely needed. There are only two
1. PC1600 DDR provides a solutions to this problem: close
1.6GB/second throughput of data. some programs until virtual
2. PC2100 DDR, provides a memory is no longer needed, or
2.1GB/second throughput of data. add more physical memory. With
3. PC2700 DDR, provides a current memory prices are so low
2.7GB/second throughput of data and affordable it, the latter
4 PC3200 DDR , provides a solution is always preferable.
3.2GB/second throughput of data
NBA 2K6 moniker for its franchise mode, and
just like last year, you'll be building
your staff from the ground up by
hiring scouts and coaches to find
and develop the talent on your team.
You'll have a good idea of where
your team is heading during each
season thanks to detailed feedback
from players, agents, coaching staff,
It's only been a few months since the
media, and, of course, that most
NBA wrapped up its 2004/2005
vitriolic and detail-oriented group, the
season with a thrilling NBA Finals
fans.
series between the Spurs and the
Pistons, but already we're looking
ahead to next season. Will Larry
Brown end up coaching the Knicks?
Will LeBron James find a way to lead
the Cavs into the playoffs? Heck, will
Darko Milicic finally see some
substantial playing time? Of course,
we're also curious about the next
slate of basketball games arriving
this fall, and 2K Sports' NBA 2K6 is
no exception.
Because online play will be a big part
Since our last look at the game at E3 of the NBA 2K6 feature set, it's nice
in May, more details are leaking to know the VIP system will return
about the seventh game in 2K's once again as well. After all, there's
lauded hoops series. Many of the no better way to scout your buddy's
main features in the game will be tendencies online than to download
very familiar to fans of the series or his VIP profile and watch how he
to 2K Sports games in general. The does things. If you're feeling extra
two main modes--24/7 and "the froggy, you'll be able to jump into the
association"--return for another go- deep end of the competitive waters
round. In 24/7 mode, you'll be once so you can download profiles from
again living the life of an up-and- the top-ranked 2K6 players and then
coming NBA baller, but there will be truly put your skills to the test. After
an added streetball twist. 2K6's 24/7 tasting sweet victory, you'll be able to
mode, subtitled "Road to the EBC," retire to your crib, which is making its
will find your created baller debut in the NBA series this year.
competing at the Entertainer's Here's where you'll be able to cash
Basketball Classic (an annual street in credits to spiff up your digs, play
hoops event held at Harlem's Rucker minigames, or purchase in-game
Park) against both NBA players and music.
Def Jam performers, such as Red
Man, Method Man, Flavor Flav, and
others. The association is 2K Sports'
Kingdom Under Fire:
Heroes

As for what's new in 2K6, we It's always nice to be surprised in a


understand the game will feature a good way when it comes to games.
good deal of original animations, The catch is, of course, it doesn't
particularly those dealing with two- happen often these days. More often
and three-man situations in the post. than not, it's possible to get a fair
These include new blocks, such as sense of what a game has to offer
animations for blocking layups and well before it ships, which takes a bit
dunks from behind, as well as new of the fun out of trying to discover
steal animations that should bring little-known gems. The upside to this
some polish to the on-the-court is that when you do come across a
action. Word also has it that 2K6 will great game that's flown below the
feature a completely new control radar, the experience is that much
system, including a reworked turbo more special. Such is the case with
button and a new movement system. last year's Kingdom Under Fire: The
We got a glimpse of the game's Crusaders, an original game from
updated mechanics, including the Phantagram for the Xbox that was
slightly altered look to the free-throw the latest entry in a fairly
system and the directional steal underwhelming PC real-time-
controls that are now tied to the right strategy franchise. Nothing in the
analog stick, in our last peek at the game's past hinted at the greatness
game. So now we're eager to see that was to be found in the Xbox
how things have progressed, and version, which consisted of a mix of
we'd like to know what new twists RTS elements, light role-playing-
have been added since then. As game mechanics, and a good old-
soon as we know, you'll know. So fashioned dose of hacking and
stay tuned to our continuing slashing. As a result, when KUF: The
coverage of the game in the coming Crusaders hit, it made big waves on
months. the Xbox and left fans hungering for
more.

Thankfully, fans won't have to wait


too much longer, because the
sequel, Kingdom Under Fire:
Heroes, is on the horizon. We got
our first look at the ambitious sequel
at this year's E3 and have since had
the chance to hunker down and Some of the cast of characters in
mess about with a fairly complete Heroes will be familiar to those who
work-in-progress version of the played KUF: The Crusaders, as
promising game. The aspiring sequel many appeared in the original game
offers up most everything that was in lesser roles. The human alliance
great about the first game, as well as characters will include Rupert, a
attempts to fix what was busted. Hirondeiden messenger sent to
Furthermore, it adds new content. So rustle up help; Ellen, an Ecclesian
you're basically presented with pretty army captain; and Walter, a soldier
much everything you'd want from a on a mission from God (almost an
sequel. Does it all work, you ask? ancient Blues Brother). The dark
From the looks of things so far, we'd legion is represented by Cirith, a
say yes. female warrior who's a bit more
savvy than her appearance
Kingdom Under Fire: Heroes is again suggests; Morene Strident, a scantily
being developed by Phantagram's clad half-vampire who wields bone
Blue Side Studios, and it takes place blades for anyone who gets fresh;
on the continent of Bersia. The game Urukbarr, a powerful chieftain who
is set before the events in Kingdom guards the Dragon's Tomb; and
Under Fire: The Crusaders. You'll be Leinhart, son of King Valdemar.
dropped smack-dab in the middle of Each character will have his or her
the Encablossa War, playing as one own unique storyline that's part of
of seven new heroes that either hails the larger tapestry of the war. As in
from the good and noble human the original, the characters will all
alliance or the evil, but invariably interact in some ways over the
cooler-looking, dark legion. The war course of the game, which lends a
has been kicked off, in part, by the nice cohesive feel to the experience.
machinations of the kingdom of
Vellond, a nation made up of half-
vampires--led by the power-hungry
Valdemar--and dark elves that are
just looking for trouble. It seems that
Valdemar has been hard at work
destabilizing the nations around him
by stirring up trouble and leaving
everyone on edge. Unfortunately,
when a mysterious army slaughters
a small human village, the already
skittish powers spaz out. And before
you can say "Damn!", the shaky As far as the gameplay goes,
balance of power between the dark Kingdom Under Fire: Heroes seems
legion and the human alliance is to be nailing the right mix of old and
gone, and a full-scale war, complete new. You'll have the same basic
with a catchy name, is on. options as in the original game--
single-player and multiplayer--but
both have been buffed up
considerably. The single-player
game will send you through each of currency that can be used to trick out
the character's storylines, which the gang with weapons, armor, and
amounts to more than 50 new items. Controlling your forces on the
missions of content. Once you've battlefield has been improved thanks
made your way through those, you'll to the inclusion of a waypoint system
also find some unlockable characters that makes it easier to get your
as well, which should continue to forces in gear during a fight.
keep you busy. The core mechanics
have stayed basically the same. The Better still, new camera angles give
game will be broken up into several you more flexibility during combat.
different stages as you play. For those that felt the action was too
Cinematics will move the story along close in the previous game, a new
and tie into the briefings you'll isometric camera angle gives you an
receive that will prep you for your eagle-eyed view of the field of battle.
next mission. The battles themselves This will actually be pretty key,
will be split into tactics and action because the game will feature more
mode as you prepare your forces real-time strategy mechanics than its
and then engage your foe. predecessor, and it will require you
to do some multitasking. What's
more, the environment will play a
significant role in combat, as
elevation will offer bonuses and
downgrades to your forces.
Obviously, coming at foes from a
higher elevation will give you an
attack bonus. At the same time,
trying to attack or defend yourself
from foes that are at a higher
elevation than you is problematic
because of the penalties associated
You'll start out each mission with with being at a lower elevation. If this
both objectives to complete and your proves to be too much of a challenge
handpicked set of troops, led by for you, the game will feature
whichever hero you've chosen. As additional difficulty levels.
before, you'll be able to customize
and power up your forces in your As far as the multiplayer aspect is
castle. The leveling system has been concerned, KUF: Heroes has really
bulked up and offers more blossomed into its own, with three
functionality when you're managing game types on offer--troop battle,
your throngs of minions, of which hero battle, and invasion battle--all of
there are 40 different types. Once which represent vast improvements
again, you can assign leaders for over the original's skirmish fights.
clumps of your boys, and you can You'll be able to take on friends in
also assign different abilities to them. battles via system link or Xbox Live.
Progressing through the game will
yield experience that can be used to
improve your forces, in addition to
The presentation has been improved the quality of the original, and we're
over the original and features a more pleased by how it's coming together.
polished look and feel in just about
every aspect. The interfaces have While Kingdom Under Fire: Heroes
been slicked up some and are a bit may lack the element of surprise its
more intuitive to use. The actual predecessor possessed, the game is
graphics have seen subtle upgrades still shaping up to be a great follow-
that improve on detail and special up to one of the Xbox's best
effects. Character models and offerings. Blue Side looks to be ably
environments, which were walking the line between staying true
impressive in the first game, match to the core mechanics people loved
and even surpass what we've seen in the original and adding new
before. The greater variety in the content to enhance the experience.
terrain keeps the visuals interesting, The new multiplayer modes and
and the new units, such as the custom campaign features are all
elementals and swamp mammoths, icing on the already appealing cake.
look especially cool. The scope of If you were a fan of the original
battle is more expansive, especially game, it's a foregone conclusion
when the massive mammoths barely you're frothing at the mouth for
fit onscreen as troops race around Kingdom Under Fire: Heroes and will
the parts of the creature that are pick it up posthaste. If you're new to
visible. the series on the Xbox, you should
absolutely check this game out...if
you're looking for something meaty
to play for a good long time.

The audio, one of the highlights of


the first game, thanks to its retro '80s
rock music, is in fine form. Blue Side
has tapped Korean metal band
Crash for some tunes that will drive
you to engage in some air guitar as
you play. Another returning perk to
the package is the vast number of
language options. The current plan
calls for seven languages to present
the spoken voice in the game. So
far, everything we've heard matches
Fantastic Four (2005) for the experiment, and loses his job
thanks to them messing it up. Plus,
he's jealous because his (invisible)
girlfriend runs away from him to the
wimpy Richards. So he vows
revenge.

Meanwhile the superheroes are


Fantastic Four is a lot better than it forming into a team of sorts and
has any right to be. Going into this getting media attention for saving
expecting a complete bomb (as most some people on a bridge accident.
people having seen the trailers There's a lot of tension between
should) will leave you surprised. It's them as they adapt to their new
far from a great movie, but it's a powers, and The Thing in particular
good superhero flick. feels even more like an outcast in his
new state - he is the only one who
For those who've never read the can't turn his powers on and off at
comic, Fantastic Four is the story of will, after all. So, will they finally team
4 people who are changed into up in the end and defeat Dr. Doom?
superheroes by an accident at a It's a comic book movie... you figure
space station. They went up there to it out.
examine some cosmic radiation and
advance the human race and blah, So yes, it's a typical dumb old-school
blah, blah. It's never clear exactly comic story. The action scenes don't
what they were setting out to do. But disappoint though. The way they test
they go up there regardless - a out their powers is very reminiscent
radioactive wave whacks them (that of the first Spider-Man. And, despite
radiation... always up to no good) some wonky effects work (Reed
and a few days later... boom, Richards looks a little more plastic
superheroes. Reed Richards (Mr. than he should), it's pretty nifty to
Fantastic) is able to turn into rubber see these guys in action. One big
and stretch himself out, Sue Storm fault of the movie is that there's not
(Invisible Girl) can turn invisible, enough of these showcase scenes.
Johnny Storm (Human Torch) can Superheroes are supposed to
light himself up and fly, and The pummel bad guys, after all.
Thing, well he's just a rock monster.
The movie differs from the comic in Michael Chicklis' portrayal of The
that Victor Von Doom (that's Doctor Thing makes this movie work. He's
Doom to you) was up there in the the film's only sympathetic character.
station with them, and gets affected They could just scrap the rest of the
too. He starts turning into metal and team and put him in a solo movie
is able to store and release energy that'd be far better than the
from his hand. I don't know about (admittedly weak) Hulk. Ioan
you, but I liked him better when he Gruffudd is forgettable as Richards.
was just a maniac in a mask. He's supposed to be the leader of
Anyways, he had fronted the money the pack, a genius - but nowhere is
this evident. Not really good casting Charlie and the
here. Jessica Alba as Invisible Girl
(woman?) does one thing well... Chocolate Factory
wear low-cut shirts. She's as Movie Review
believable a scientist as my ass is.
Chris Evans as the Human Torch
plays his role well even if he's there
mostly for comic relief. It's obvious
he's having fun in this role, and
though he's a typical rich boy X-
games fanatic it's perfect for the
character. He gets a bunch of laughs
in the movie, and his rivalry with The
Thing is one of the few good
relationships in the whole thing.
Julian McMahon as Doctor Doom
doesn't really work, which is a shame
because he had the potential to be a
great villain. Instead of being evil
he's just petty. We need more
layered, insane characters in our
geek movies, damn it. Charlie Bucket (Freddie Highmore) is
a poor young boy living in a poor
small house with his poor parents
and his four poor grandparents. The
grandparents share a bed. His father
has lost his job. They eat cabbage
soup. Things are not fun in the
Bucket household. That is until
Charlie finds a rare gold ticket that
entitles him to an even rarer tour of
Willy Wonka's (Johnny Depp)
famous chocolate factory. There are
only five tickets that were available in
Despite its faults, Fantastic Four is a the entire world and five children
fun, silly movie. It's nothing you'll (and a guest of their choice) have
want to see multiple times, but the been the lucky recipients of the
kids will love it. Let's just hope they famous tickets. Along with Charlie
pull a Spider-Man 2 with the and one of his poor grandfathers,
inevitable sequel and expand on the Mike Teavee, Violet Beauregarde,
characters (and action). The origin Veruca Salt and Augustus Gloop will
story's out of the way, so now it's all tour Willy Wonka's factory and
time to get into the meat. I can easily one lucky child will get the prize of a
see this becoming a decent series. lifetime at the end of the tour, as long
as they can survive the fateful
singing of the Oompa Loompas (all
played by Deep Roy). I'm not going
to explain that - go see the movie. The dynamic duo of Tim Burton and
Johnny Depp have hit a home run
Tim Burton's Charlie and the right out of the park with this one. Or,
Chocolate Factory is a remake of the I suppose, as they say in Europe,
1971 classic entitled Willy Wonka they tapped a perfect header right
and the Chocolate Factory. Who has into the net. Or, in the porn world,
never seen Willy Wonka and the they tapped a perfect ass right
Chocolate Factory? Whoever has into...oh forget it.
not should take their head out of
their ass and see it right now. And I I have to say I have heard rumblings
plan on doing so as soon as I get my about Depp's Wonka being too
head out of my ass. Unfortunately, I Michael Jackson-ish, and yeah, I
had a childhood comparable to that saw that here and there with his
of Charlie Bucket so I have never various nuances and phobias but he
seen the 1971 movie and thus, there was still stupendous as was pretty
will be no comparisons here. much every single last person in the
Needless to say, I went into this movie. I have to admit, I wondered
movie with an open mind and an how this movie would have played
empty head. out with someone like Jim Carrey
playing the chocolate connoisseur
but I suppose that was just wishful
thinking. Carrey would have been a
treat but I don't want to take anything
away from Depp either.

All kidding aside, I really had no Overall, I really can't say enough
desire to see Charlie and the good things about Charlie and the
Chocolate Factory. It just seemed Chocolate Factory. Maybe that's
silly, wierd, childish and really not my because I was expecting so little and
kind of movie. To tell you the truth, got so much. I had a fabulous time at
the movie was silly, strange and the theatre and mark my words when
childish, just as I thought it would be. I say this movie will become an
But it was also far more enjoyable instant classic. The kiddies are going
than I initially imagined. I have to to love this one and I am sure it is a
say, I had an absolute blast watching movie that will be on their yearly
this movie. It's funny, it is visually "must-see" list for years to come.
astounding, there isn't a moment that
goes by where something isn't
happening that doesn't keep you
glued to the screen. The
performances are wonderful. The
musical bits are outstanding. The
look and feel of the movie is
fabulous. Charlie and the Chocolate
Factory is a movie for one and for all,
for adults and children alike to enjoy.
The Island Review Six Echo (played earnestly by Ewan
McGregor) starts to dream terrifying
images and begins to question the
nature of their life in this facility, he
uncovers some startling revelations
about his existence. Enter Micheal
Bay action formula.

The movie from this point goes into


autopilot as McGregor and the
beautiful Scarlett Johansson are on
the run from the powers that be who
will stop at nothing to contain the
security breach, for their escape
opens a whole can of worms. This
portion of the film was really well
What is The Island? This should be done. Bay really proves he can set
your state of mind when seeing this up an action sequence and there's a
film. You should avoid all spoilers on pretty wide variety of stunts going
this one - it makes it that much better on. We are talking pretty spectacular
of a film. The Island is Micheal Bay's looking scenes. Think Bad Boys 2 in
offering to this summer's plethora of the future. In particular I was wowed
action blockbusters which have so by the scene where McGregor pilots
far been more than fulfilling. The a futuristic police hover-bike through
Island continues this pattern. Micheal the city. The action scenes are gritty
Bay has crafted his finest work here, and hard-hitting. I really got caught
which I can assume is largely due to up and found myself questioning
Spielberg's production on this. how they could escape the situation.
Micheal Bay has dropped Jerry The portrayal of the future in this
Bruckheimer - a wise move if I may movie, while reminiscent of Minority
so say. This is definitely Micheal Report, was handled pretty well.
Bay's most focused movie. An Never getting too farfetched or
emotional sci-fi drama with overshadowing the emotional
adrenaline-fueled action scenes. context of the plot.

The Island is the hope of all the


citizens of an unnamed Utopian
society. They live in fear of an
outside world with vague memories
of a great contamination that forced
them into this sterilized underground
facility. The only redemption from
their dull existence is the chance to
win a lottery and visit the last
uncontaminated spot on earth - The
Island. But of course things are not
as they seem. When resident Lincoln
Perfect Catch. Instead of remaking
Another strong point in the movie is footie flick Fever Pitch (1997), the
the performances. Across the board, brothers take inspiration from the
everyone does pretty well. McGregor original Nick Hornby novel and
handles his role perfectly, playing it use baseball as a backdrop for the
down to earth. He and Scarlett both story of a man torn between his
managed to stay above everything passion for the game and the love
that was going on. They portrayed of a no-nonsense girl (Drew
their characters as people you can Barrymore). It's not pitch perfect
root for throughout the film. I wanted but the leads make a winning
to see them make it the whole time. team.
And that's a huge aspect of a movie
like this succeeding. In the first half hour the Farrellys
struggle to pick up the pace as Ben
There are some pretty strong tries desperately to score with
supporting roles too. Steve Buscemi Lindsey. But just when you're ready
has a small role which ends up being to throw in the towel, they end up
pivotol to the plot. He provides some going one-on-one and Ben reveals
of the funniest lines in the movie. his dirty little secret: he is
The comic relief is very well placed pathologically obsessed with the
here. Sean Bean plays the Boston Red Sox. At first Lindsey
villaneous type here like we know he plays along, but eventually grows
can. His performance reminded me resentful of all the compromises
of Equilibrium - a similar role here. she's forced to make.

Overall I'd have to say The Island is "DELIVERED WITH SUBTLETY"


a very enjoyable summer action
movie and a tier higher than anything It's a tenderly told love story that
Micheal Bay has done. If you have retains the cheeky spirit of Hornby's
already seen Batman and War Of book without the gross-out excesses
The Worlds this is definitely another we've come to expect from the
sweet movie this summer to add to Farrellys. Admittedly there is one
the list. gag involving a puddle of puke and a
hungry dog, but it's delivered with
The Perfect Catch subtlety and, for the most part, there
is an admirable commitment to
(2005) restraint. Likewise, Fallon avoids the
crackheaded clowning around of
Taxi and builds an honest rapport
with Barrymore as an earthy (rather
than hardnosed) career girl. After
taking a while to find their feet, the
Farrelly's don't quite knock it out of
Growing up is hard to do but the
the park, but The Perfect Catch does
Farrelly brothers and star Jimmy
Fallon show distinct signs of hit home in the end.
maturity in romantic comedy The
Silverlit X-UFO RC Flying
Toy
SKYN Tones Laptop
Covers-Skins

This is a new creation "hovering"


around the corner: the X-UFO. This
RC/hovercraft/UFO/flying saucer has SKYN Tones are reusable, durable
a range of 100 yards, a charge time glossy adhesive covers that are easy
of 100 minutes and an awesome fly to put on your laptop, and remove
time of 20-25 minutes. cleanly. You may not like all the
colours but trust me, it is still a lot
better than those dull, dark & gloomy
grey ones on the IBM’s, Dell’s, HP-
Batman Dark Knight TV Compaq’s & Toshiba’s. These may
just brighten up your day.

This Dark Knight-inspired 13-inch &


15-inch television from Hannspree
Global would look sharp in anyone's
“secret hideout”. It even sports a PC
input, for display resolution of up to
1024x768 (what most people are
using). It comes in black color, with a
stand & has a Batman Logo at the
back.
FlashPoint Intelligent MPEC Cinema Glasses
USB Keychain and MPEC Multimedia
ShareDrive Player - Headset Video
Review –Reader

FlashPoint USB ShareDrives allow


for "computerless" copying and Mobile Personal Entertainment
sharing of files - files placed in the Centre (MPEC for short) has
"share" directory will copy to a launched an entertainment headset
connected USB drive when the that consists of their own MPEC
share button is pressed, and simply Cinema Glasses & Multimedia
press the "load" button to copy files Player. The MPEC Cinema glasses
from the "load" folder on connected connect to the MPEC Player to
drive. It is a brilliant new way to project a virtual screen of 30". You
exchange files, business cards, and can watch your favorite movies and
company info at exhibitions, video files, play MP3s, and view
meetings, and conventions. photos while using a SD memory
Card for storage.
Tyco 1:6 Scale Batman good it isn’t by them, as their
products are damn expensive). The
Begins "Tumbler" Bat- iPod Alarm Clock Radio is a cool
mobile R/C Vehicle product, to which you can connect
your existing iPod & wake up to your
favorite tunes, AM/FM Radio, or to
the songs in your iPod. You can
even connect your High-fi stereo
systems (they give superior sound)
and other non-iPod MP3 player via a
patch cord. It measures 9.2inches
wide x 5.5 inches. U can get it on
iHome's website. Catch it fast before
someone else does.

Mustek PVR-H140
Personal Video Recorder
"The Tumbler" from the movie With 40GB Drive
"Batman Begins" is considered by
some to be the ultimate Bat-mobile.
With this cool R/C Vehicle from
Tyco, you can remote control your
own Tumbler! This R/C car sports
turbo engine sounds, headlights that
light, as well as adjustable air brakes
and dynamic working suspension.
There is a smaller R/C version of this
car, but it isn't anywhere even close
to cool, as cool as the big one is.

iPod Alarm Clock Radio


This new Mustek PVR handheld
video player/recorder offers VGA 30
fps AV recording, a 3.6" color TFT
LCD, with a 40GB internal hard
drive. You can even use it for playing
back photos, your Mp3 files, and use
it as a voice recorder. It even has an
additional SD/MMC slot allows for
importing/exporting of your files from
Well this is something I have been the device.
waiting from a long time, But thought
it would be made by Bose (well it is
Kameleon Remote SimBackup
Control

Mobile phones have revolutionised


the way we conduct our everyday
business. We don’t even know any
phone numbers off the top of your
Fumbling around for the TV remote
head, everything is stored in the
is one of modern life's greatest
mobile & these days you actually
irritants. And, with the advent of so
phone people by name and not their
many other remote controlled
actual number. But what will you do
devices - VCR, DVD, CD, Satellite -
if you lose your precious mobile. It is
couch potato life gets harder all the
a total nightmare, and you can’t write
time.
down every single name and number
in anticipation of this grim scenario.
Thankfully, you can now put an end
So this new product which is so
to multiple remote miseries with the
simple to use, lets you to backup
sleek and sophisticated Kameleon 6-
your SIM card.
in-1 and its little brother, the 4-in-1.
This ingenious little box can back up
These ingenious wafers of hi-tech
any SIM card with up to 255 phone
jiggery pokery are universal remote
records, and it's small enough to
control units that can operate up to
hang on your key ring. Transferring
six - entertainment appliances at
info into Simbackup is easier than
once. From your TV and VCR to
picking up the phone. Simply pop in
your DVD, CD, Audio, satellite and
your SIM card and the info is
cable, these gorgeously svelte, touch
automatically transferred to
sensitive remotes do the lot. It is
Simbackup's memory. An easy-to-
ergonomically designed to fit snugly
read LCD screen displays all the
into all manner of mitts, the
relevant info should you require it,
Kameleon impresses the very
and a handy flip cover protects
second you pick it up. Its built-in
Simbackup's sleek fascia from the
motion sensors activate an ultra
objects in your pocket. It has loads of
cool, electro-luminescent display
extra features including World Time
panel that resembles something from
clock, Alarm, Stop Watch and more.
the bridge of the Starship Enterprise.
Universal Firearm Tactiva TouchPad
Remote
It looks like a designer’s dream come
true. Way better than a tablet, this
pad lets you interact with your
computer with both of your hands,
allowing for a truly immersive and
tactile experience. Not only can you
use multiple fingers at once to drag
and resize objects, you can also feel
unique sensations through your
fingers that help you differentiate
objects. And because of TactaPad’s
camera, you can see a translucent
overlay of your hands on the screen,
allowing for greater control.
This 9mm semi-automatic-styled
clicker slides snugly beneath elastic
waistbands for quick draw access
and features a detachable lithium-ion
magazine, posi-lock channel
changer and safety mode to prevent
dropped pistols from accidentally
going off.
Tool Kit for Girls thermostat is on a smoke break or
the kids have messed with it. It is a
rug that detects when a person is on
the nearby and modifies the rug
temperature and the room
temperature accordingly. This feat of
heat is done with little IR sensor
magic and heating components in
the rug.

Gigabyte G-X5

This is an excellent toolkit containing


a hammer, a level, some pliers, and
some other household stuff design
just for the ladies. Each one of the
tools is specially marked with the
name Barbara K (who is apparently
some woman who fixes stuff). Priced
at about $80, this would be ideal for
women to use, if they ever need to
use them for something.

Matsushita Adaptive
Gigabyte, makers of all things
Electric Carpet mother-boardish, are diving into the
plethora of mobile phone
manufacturers with the new G-X5
phone and also a PDA phone. The
G-X5 will contain all of the standard
bells and whistles of modern mobile
phones.

Thermostats, on the whole, work


pretty well. However, this rug makes
up for those times when the
FingerGear bootable Creative Zen Sleek
computer-on-a-stick USB
flash drive

FingerGear is offering a Linux-based


Computer-On-a-stick USB 2.0 Flash
drive sporting a complete bootable
operating system out of the box. It’s
running Linux 2.6.x with a Gnome
GUI, and comes in capacities from
256MB up to 8GB. It also comes with It is an audio player trying to rival the
OpenOffice and a bunch of other iPod. It features a 20GB player with
common desktop and internet FM radio, mike, MP3 and WMA,
utilities pre-installed (GAIM, Firefox, playback compatibility. And
etc.). These are starting at $149 for measures (3.9” x 2.3” x 0.6”) that
the 256MB version. guarantee it’ll live up to its name.

Fujitsu’s Lifebook P1510


Well dude if you’re looking for the
latest mini convertible tablet PC,
then check out the Fujitsu P1510. It
actually has pretty good specs for a
tablet, including an 8.9-inch display,
60GB drive, 1.2Ghz Pentium M 753,
WiFi, CF slot, and 512MB RAM
standard.
Toshiba Qosmio G20 Acer TravelMate C310
convertible tablet

This device has a 14.1-inch XGA


display, Sonoma Centrino with
Pentium M and DDR2 SDRAM,
GeForce Go 6200 graphics, 802.11
b/g, Bluetooth, Gigabit Ethernet,
dual-layer DVD burner, 80 or 100GB
This is an absolute beauty, it
hard drive, 4-in-1 card reader,
features a cool & wide 17-inch
magnesium chassis, and what they
WXGA display, 1.73/1.86GHz
claim is an 8.5-hour battery.
Pentium M processor, 128MB
GeForce 6600, 160/200GB HDD,
512MB RAM standard, DVD-ROM Sony Librie
and a TV tuner. It runs on Windows
XP Home and Toshiba’s own media
center software. Maybe they might
launch a version with MCE later, but
this is also good.

Alienware’s Area-51m
7700
The Sony Librie has a beautiful and
This new version in the series comes crisp 6-inch SVGA screen. It could
with Windows XP Media Center just be some-thing dedicated e-book
Edition loaded. It features a 17-inch readers maybe looking for. It allows
widescreen display, 512MB of RAM, readers to use Sony-approved
3.4GHz Pentium 4 desktop software to convert Word, Excel,
processor, 256MB NVIDIA PowerPoint, PDF, HTML and RSS
GeForce™ Go 6800 video card, documents to the Sony BBeB format
60GB hard drive, DVD/CD-RW so that it can be read on it easily.
combo drive, and a mini PCI TV The Librie has a resolution of 170
tuner). It starts at $2,375. pixels per inch (more than twice that
of most computer monitors), enough
memory to hold up to 500 e-books,
and its four AAA batteries provide
enough power to flip through more
than 10,000 pages.
Cybook e-Book reader 100GB (4200 rpm) HDD, 1024MB
DDR2 SDRAM (2 x 512MB; dual
It is the first e-book reader that is channel at 400MHz) and maximum
totally open-standard, meaning you memory of 2048MB DDR2 SDRAM
can use it with any of your HTML, (2 x 1024MB), ATI® MOBILITY™
PDF, PRC, or RTF documents, RADEON™ X600 graphics (256MB
which is definitely appreciate dedicated DDR), 6-in-1 digital media
(especially considering the weird card reader, 54g™ 802.11b/g WLAN
closed format e-books of Sony Librie with 125HSM/SpeedBooster for
that expire after a 60 Days). The staying connected even when
Cybook runs on Windows CE and traveling, a 8x DVD±RW/R and CD-
comes with a 10-inch color LCD RW combo drive, or 8x DVD ±RW/R
display, gets 3 to 5 hours of battery drives with double layer write support
power, plays MP3 files, and comes writer to capture, burn, author, and
with Pocket versions of both Word edit DVDs with InterVideoWinDVD
and Excel. It even comes with a 56k Creator and InterVideo® Home
modem. You can add a WiFi card or Theater, 10/100 Ethernet LAN
add Compact Flash memory via its modem. It has four USB 2.0, one
PCMCIA slots. FireWire (IEEE 1394), one Fast
Infrared (FIR), and one S-Video TV
out and one ExpressCard/54 PC
HP Pavilion zd8080us slot. A HP dual TV tuner, a PVR with
Notebook PC Mini-Remote Control & comes with a
12-cell Lithium-Ion battery.

It can be configured to be the


centerpiece for your digital
entertainment. It supports up to two
live TV shows or series recordings at
the same time (even as you watch a
previously recorded third show).

This laptop is a user’s delight.


Running on Windows XP Media
Center 2005, it comes with a no-
nonsense Intel 3.4EGHz Pentium® 4
processor 550 with HT Technology,
800MHz FSB, and 1MB L2 cache, a
17" WXGA+ high-definition
BrightView widescreen display (1440
x 900) with wide viewing angle, a
We decided to make some
contests beginning with this
month of WareZ News Magazine,
so prepare yourself to be a
winner!
Are U a good graphic designer?
VCVTech grands you the chance to
become Moderator for life in the
forum if U make the best banner that
will say: VCVTech! Send your works
to: webmaster@ccucu.com !

Ccucu’s WareZ offers you the


chance to win a Golden Membership
for a month! We are giving the prize
for the best Install Screen for
programs uploaded by Ccucu’s
WareZ!
Send us your work at
forumc.tk@gmail.com . The best
work will be awarded!

RhEAL Computers and Ccucu’s


WareZ pays 50$ to the first one who
finds this program: Ra Workshop
WareZ Heav3n offers you the
(homepage:
chance to win MODERATOR rank
http://products.pyramid.ro/Ferestre_En.h
for a month if U answear this simple
tml). Good luck! Sent your links to:
question:
forumc.tk@gmail.com.
Where can U find find this program
and crack: Icooloader.
The first correct answear sent to:
annnutza02@gmail.com wins the
prize! Good luck!

Вам также может понравиться