19 March 2010
hacking glosary
***********************************************************************
This article is being presented through the *StarBoard* Journal of the
FlagShip/StarShip SIGs (Special Interest Groups) on Delphi and GEnie
telecommunication networks. Permission is hereby granted to non-profit
organizations only to reprint this article or pass it along electronic-
ally as long as proper credit is given to both the author and the
*StarBoard* Journal. ***********************************************************************
This article is being presented through the *StarBoard* Journal of the
FlagShip/StarShip SIGs (Special Interest Groups) on Delphi and GEnie
telecommunication networks. Permission is hereby granted to non-profit
organizations only to reprint this article or pass it along electronic-
ally as long as proper credit is given to both the author and the
*StarBoard* Journal.
***********************************************************************
A Short 'HACKERSPEAK' Glossary
-
A reference to a few of the terms used by many computer hackers.
-
(Researched and compiled by members of the Hollywood User Group)
-
arg - (argh) noun. An argument, in the mathematical sense.
automagically - adverb. Automatically, but in a way which, for some
reason (for example, because it's too complicated or too trivial) the
speaker doesn't feel like explaining.
bells and whistles - n. Unnecessary (but often convenient, useful,
good-looking, or amusing) features of a program or other object. Added
to a bare-bones, working program.
bit - n. 1) A unit of information obtained by asking a question (e.g.
- 'I need a few bits about Punter protocol') 2) A mental flag;
reminder that something should be done eventually.
buffer - verb. The act of saving or setting aside something to be done ***********************************************************************
This article is being presented through the *StarBoard* Journal of the
FlagShip/StarShip SIGs (Special Interest Groups) on Delphi and GEnie
telecommunication networks. Permission is hereby granted to non-profit
organizations only to reprint this article or pass it along electronic-
ally as long as proper credit is given to both the author and the
*StarBoard* Journal.
***********************************************************************
A Short 'HACKERSPEAK' Glossary
-
A reference to a few of the terms used by many computer hackers.
-
(Researched and compiled by members of the Hollywood User Group)
-
arg - (argh) noun. An argument, in the mathematical sense.
automagically - adverb. Automatically, but in a way which, for some
reason (for example, because it's too complicated or too trivial) the
speaker doesn't feel like explaining.
bells and whistles - n. Unnecessary (but often convenient, useful,
good-looking, or amusing) features of a program or other object. Added
to a bare-bones, working program.
bit - n. 1) A unit of information obtained by asking a question (e.g.
- 'I need a few bits about Punter protocol') 2) A mental flag;
reminder that something should be done eventually.
buffer - verb. The act of saving or setting aside something to be done
later. (e.g. - 'I'm going to buffer that and go eat now').
bug - n. A problem or mistake; unwanted property or side effect.
Usually of a program, but can refer to a person. Can be very simple or
very complicated. Antonym: FEATURE.
bum - v. To improve something by rearranging or removing its parts.
Most often done to a program to increase speed or save memory space,
usually at the expense of clarity.
buzz - v. Of a program, to run without visible progress or certainty
of finishing. Resembles CATATONIA except that a buzzing loop may
eventually end.
canonical - (ki NAHN i kil) adjective. Standard, usual or ordinary way
of doing something.
catatonia - n. A condition in which something is supposed to happen,
but nothing does. (e.g. - Nothing you type will appear on the screen.
It's catatonic. Often means a CRASH has occured.)
crash - 1) n. Sudden, drastic failure. Usually refers to a complete
computer system or program. 2) v. To fail suddenly or cause to fail.
3) v. Of people, to go to sleep.
creeping featurism - n. Tendency for anything complicated to become
even more so because people keep saying, 'Hey, it would be terrific if
the program had this feature, and could do this, and...' The result is
a patchwork program, confusing to read, with a lot of 'neat' features.
crock - n. Said of a program that works, but in an extremely awkward
or cumbersome manner.
crunch - v. To process, usually in a time-consuming, complex way.
Example: Performing large, repetitive numerical computations is called
'number crunching'. 2) v. To reduce the size of a file (often in a
complicated way) to save space.
dec'ed out - (decked out) adj. Stoned, drunk (and possibly trying to
program, regardless). Uncomplimentary. Derives from the 65-- series
ML opcode DECrement, i.e.: decrease a value.
elegant - adj. Said of a piece of code that does the RIGHT THING in a
way beautiful to look at.
feature - n. An extra property or behaviour added to a program that
already does the job. May or may not be useful, necessary or
convenient.
fencepost error - n. A mathematical 'off-by-one' error. Most often
found in programs that must count loops (it will count one time too
many, or too few). Term comes from the problem: 'If you build a fence
100 feet long with posts 10 feet apart, how many posts fo you need?'
Example: Suppose you want to process an array of items x thru y. How
many are there? The correct answer is x-y+1 (not x-y, which would be
off by one).
flavor - n. variety, kind, type. (flavorful - adj. Aesthetically
pleasing).
flush - v. To scratch, delete or destroy something. Often something
superfluous or useless.
fudge - v. Perform in an incomplete, but marginally acceptable way.
'I fudged it, so it works.'
GC - (jee see) 1) v. To clean up, throw away useless things. 2) To
forget. GC is an abreviation of the term 'Garbage Collection', the
common method of freeing up memory space.
glitch - n. Sudden interruption in electrical service, common sense,
or program function. Usually happens only when you pray that it
doesn't.
grovel - v. To work interminably, examine minutely or in extreme
detail.
gun - v. To forcibly terminate a program. 'It was a boring display,
so I gunned it.'
hack - n. An appropriate application of ingenuity. It could be a
quick-and-dirty bug fix, or a time-consuming and elegant work of art.
A clever technique.
hack value - n. The motivation for expending effort and time toward a
seemingly pointless goal, the point being the resulting hack.
hack attack - n. Period of greatly increased hacking activity. Not to
be confused with a Mac-Attack.
hacker - n. 1) One who greatly enjoys learning the details of a
computer system and how to stretch their capabilities (as opposed to
REAL USERS who learn only the minimum amount necessary). 2) One who
programs enthusiastically, rather than just theorizing about it. 3)
One capable of appreciating HACK VALUE. 4) An expert of any kind 5) A
malicious or inquisitive meddler (in the case of a 'system hacker' or a
'password hacker').
inc it up - (also 'incing') v. Specifically related to studying,
reading, or learning ML. Derives from the 65-- series ML instruction
INCrement a value; i.e. increase it.
jock - n. Programmer characterized by the large, cumbersome,
brute-force programs he/she writes. The programs may work, but slowly,
inelegantly, or in an ugly way.
kludge - (kloog) 1) n. Clever programming trick, most often to fix a
bug. Efficient, but maybe unclear. 2) v. To insert a kludge into a
program (to fix a bug or add a feature).
magic - adj. Something as yet unexplained or too complex to imagine.
M&M's - n. Mental and Midget; i.e. Mental Midget. Uncomplimentary
term applied most often to 'system hackers' who intrude for disruptive
or destructive purposes (like to crash BBS's).
misfeature - n. A FEATURE that eventually turns out to be more trouble
than it was worth, possibly because it is inadequate for a new user or
situation that has evolved. Misfeatures are different from bugs or
side-effects in that they are often more basic to the program design
and, at one time, were carefully planned.
moby - 1) adj. Immense, complex, or impressive. 2) n. Total size of
a computers address space.
mode - n. A general state. Examples: DAY MODE - state a person is in
when s/he is working days and sleeping nights.
mumble - interjection. Said when the correct response is too
complicated to put into words or has not been thought out. Can
indicate a reluctance to enter a long discussion.
mumblage - n. The subject matter of one's mumbling. Replaces 'all
that stuff'.
nop around (or nopping) - v. Hanging out; not doing much; not
programming. Derives from the 65-- series ML instruction code 'NOP'
(No OPeration).
obie (or o.b.) - n. Derives from a pun with the word 'OverByte'.
Usually relates to a ML routine that doesn't work because of some
small mistake, possibly an incorrect addressing mode or even a typing
error. Most often one or two bytes wrong.
patch - 1) n. Piece of code intended as a quick-and-dirty remedy to a
BUG or MISFEATURE. 2) v. To fix something temporarily; insert a patch
into a piece of code; make the main program machine-specific.
punt - v. To give up; decide not to do.
rave - v. 1) To persist in discussing something. 2) To speak
authoritatively about that which one knows very little. 3) To
proselytize.
real user - n. A commercial user; a non-hacker who uses computer
applications only.
Real World, The - n. 1) Places where programs have only business
applications. 2) Institutions such as IBM. 3) The location of
non-programmers and non-programming activity. The first two
definitions are uncomplimentary; the third is not.
Right Thing, The - n. that which is obviously the appropriate thing to
use, do, say, etc.
rude - (rood or roo-day) adj. Programs badly written or functionally
poor.
sacred - adj. Reserved for the exclusive use of something. Usually
refers to memory location or register that shouldn't be used because
what is stored there must not change.
slurp - v. To read a large data file into memory before using or
processing data.
smart - adj. Said of a program (or something) that does THE RIGHT
THING.
SMOP - n. An acronym for a 'Small Matter Of Programming'. A piece of
code that would not at all be hard to write, but would take a very long
time because of its size. Not worth the trouble.
snail mail - n. Mail sent via Post Office, rather than electronically.
software rot - n. Hypothetical disease that causes working programs to
stop working when unused for a period of time.
tense - adj. Of programs, very clever and efficient. A tense
programmer produces tense code.
vanilla - adj. Standard, usual, or ordinary FLAVOR.
zero - v. 1) To set a bit or variable to zero. 2) To erase, or
discard all data from.
zorch - v. 1) To move quickly. 2) Influences. 3) Energy or ability.
later. (e.g. - 'I'm going to buffer that and go eat now').
bug - n. A problem or mistake; unwanted property or side effect.
Usually of a program, but can refer to a person. Can be very simple or
very complicated. Antonym: FEATURE.
bum - v. To improve something by rearranging or removing its parts.
Most often done to a program to increase speed or save memory space,
usually at the expense of clarity.
buzz - v. Of a program, to run without visible progress or certainty
of finishing. Resembles CATATONIA except that a buzzing loop may
eventually end.
canonical - (ki NAHN i kil) adjective. Standard, usual or ordinary way
of doing something.
catatonia - n. A condition in which something is supposed to happen,
but nothing does. (e.g. - Nothing you type will appear on the screen.
It's catatonic. Often means a CRASH has occured.)
crash - 1) n. Sudden, drastic failure. Usually refers to a complete
computer system or program. 2) v. To fail suddenly or cause to fail.
3) v. Of people, to go to sleep.
creeping featurism - n. Tendency for anything complicated to become
even more so because people keep saying, 'Hey, it would be terrific if
the program had this feature, and could do this, and...' The result is
a patchwork program, confusing to read, with a lot of 'neat' features.
crock - n. Said of a program that works, but in an extremely awkward
or cumbersome manner.
crunch - v. To process, usually in a time-consuming, complex way.
Example: Performing large, repetitive numerical computations is called
'number crunching'. 2) v. To reduce the size of a file (often in a
complicated way) to save space.
dec'ed out - (decked out) adj. Stoned, drunk (and possibly trying to
program, regardless). Uncomplimentary. Derives from the 65-- series
ML opcode DECrement, i.e.: decrease a value.
elegant - adj. Said of a piece of code that does the RIGHT THING in a
way beautiful to look at.
feature - n. An extra property or behaviour added to a program that
already does the job. May or may not be useful, necessary or
convenient.
fencepost error - n. A mathematical 'off-by-one' error. Most often
found in programs that must count loops (it will count one time too
many, or too few). Term comes from the problem: 'If you build a fence
100 feet long with posts 10 feet apart, how many posts fo you need?'
Example: Suppose you want to process an array of items x thru y. How
many are there? The correct answer is x-y+1 (not x-y, which would be
off by one).
flavor - n. variety, kind, type. (flavorful - adj. Aesthetically
pleasing).
flush - v. To scratch, delete or destroy something. Often something
superfluous or useless.
fudge - v. Perform in an incomplete, but marginally acceptable way.
'I fudged it, so it works.'
GC - (jee see) 1) v. To clean up, throw away useless things. 2) To
forget. GC is an abreviation of the term 'Garbage Collection', the
common method of freeing up memory space.
glitch - n. Sudden interruption in electrical service, common sense,
or program function. Usually happens only when you pray that it
doesn't.
grovel - v. To work interminably, examine minutely or in extreme
detail.
gun - v. To forcibly terminate a program. 'It was a boring display,
so I gunned it.'
hack - n. An appropriate application of ingenuity. It could be a
quick-and-dirty bug fix, or a time-consuming and elegant work of art.
A clever technique.
hack value - n. The motivation for expending effort and time toward a
seemingly pointless goal, the point being the resulting hack.
hack attack - n. Period of greatly increased hacking activity. Not to
be confused with a Mac-Attack.
hacker - n. 1) One who greatly enjoys learning the details of a
computer system and how to stretch their capabilities (as opposed to
REAL USERS who learn only the minimum amount necessary). 2) One who
programs enthusiastically, rather than just theorizing about it. 3)
One capable of appreciating HACK VALUE. 4) An expert of any kind 5) A
malicious or inquisitive meddler (in the case of a 'system hacker' or a
'password hacker').
inc it up - (also 'incing') v. Specifically related to studying,
reading, or learning ML. Derives from the 65-- series ML instruction
INCrement a value; i.e. increase it.
jock - n. Programmer characterized by the large, cumbersome,
brute-force programs he/she writes. The programs may work, but slowly,
inelegantly, or in an ugly way.
kludge - (kloog) 1) n. Clever programming trick, most often to fix a
bug. Efficient, but maybe unclear. 2) v. To insert a kludge into a
program (to fix a bug or add a feature).
magic - adj. Something as yet unexplained or too complex to imagine.
M&M's - n. Mental and Midget; i.e. Mental Midget. Uncomplimentary
term applied most often to 'system hackers' who intrude for disruptive
or destructive purposes (like to crash BBS's).
misfeature - n. A FEATURE that eventually turns out to be more trouble
than it was worth, possibly because it is inadequate for a new user or
situation that has evolved. Misfeatures are different from bugs or
side-effects in that they are often more basic to the program design
and, at one time, were carefully planned.
moby - 1) adj. Immense, complex, or impressive. 2) n. Total size of
a computers address space.
mode - n. A general state. Examples: DAY MODE - state a person is in
when s/he is working days and sleeping nights.
mumble - interjection. Said when the correct response is too
complicated to put into words or has not been thought out. Can
indicate a reluctance to enter a long discussion.
mumblage - n. The subject matter of one's mumbling. Replaces 'all
that stuff'.
nop around (or nopping) - v. Hanging out; not doing much; not
programming. Derives from the 65-- series ML instruction code 'NOP'
(No OPeration).
obie (or o.b.) - n. Derives from a pun with the word 'OverByte'.
Usually relates to a ML routine that doesn't work because of some
small mistake, possibly an incorrect addressing mode or even a typing
error. Most often one or two bytes wrong.
patch - 1) n. Piece of code intended as a quick-and-dirty remedy to a
BUG or MISFEATURE. 2) v. To fix something temporarily; insert a patch
into a piece of code; make the main program machine-specific.
punt - v. To give up; decide not to do.
rave - v. 1) To persist in discussing something. 2) To speak
authoritatively about that which one knows very little. 3) To
proselytize.
real user - n. A commercial user; a non-hacker who uses computer
applications only.
Real World, The - n. 1) Places where programs have only business
applications. 2) Institutions such as IBM. 3) The location of
non-programmers and non-programming activity. The first two
definitions are uncomplimentary; the third is not.
Right Thing, The - n. that which is obviously the appropriate thing to
use, do, say, etc.
rude - (rood or roo-day) adj. Programs badly written or functionally
poor.
sacred - adj. Reserved for the exclusive use of something. Usually
refers to memory location or register that shouldn't be used because
what is stored there must not change.
slurp - v. To read a large data file into memory before using or
processing data.
smart - adj. Said of a program (or something) that does THE RIGHT
THING.
SMOP - n. An acronym for a 'Small Matter Of Programming'. A piece of
code that would not at all be hard to write, but would take a very long
time because of its size. Not worth the trouble.
snail mail - n. Mail sent via Post Office, rather than electronically.
software rot - n. Hypothetical disease that causes working programs to
stop working when unused for a period of time.
tense - adj. Of programs, very clever and efficient. A tense
programmer produces tense code.
vanilla - adj. Standard, usual, or ordinary FLAVOR.
zero - v. 1) To set a bit or variable to zero. 2) To erase, or
discard all data from.
zorch - v. 1) To move quickly. 2) Influences. 3) Energy or ability.
***********************************************************************
A Short 'HACKERSPEAK' Glossary
-
A reference to a few of the terms used by many computer hackers.
-
(Researched and compiled by members of the Hollywood User Group)
-
arg - (argh) noun. An argument, in the mathematical sense.
automagically - adverb. Automatically, but in a way which, for some
reason (for example, because it's too complicated or too trivial) the
speaker doesn't feel like explaining.
bells and whistles - n. Unnecessary (but often convenient, useful,
good-looking, or amusing) features of a program or other object. Added
to a bare-bones, working program.
bit - n. 1) A unit of information obtained by asking a question (e.g.
- 'I need a few bits about Punter protocol') 2) A mental flag;
reminder that something should be done eventually.
buffer - verb. The act of saving or setting aside something to be done
later. (e.g. - 'I'm going to buffer that and go eat now').
bug - n. A problem or mistake; unwanted property or side effect.
Usually of a program, but can refer to a person. Can be very simple or
very complicated. Antonym: FEATURE.
bum - v. To improve something by rearranging or removing its parts.
Most often done to a program to increase speed or save memory space,
usually at the expense of clarity.
buzz - v. Of a program, to run without visible progress or certainty
of finishing. Resembles CATATONIA except that a buzzing loop may
eventually end.
canonical - (ki NAHN i kil) adjective. Standard, usual or ordinary way
of doing something.
catatonia - n. A condition in which something is supposed to happen,
but nothing does. (e.g. - Nothing you type will appear on the screen.
It's catatonic. Often means a CRASH has occured.)
crash - 1) n. Sudden, drastic failure. Usually refers to a complete
computer system or program. 2) v. To fail suddenly or cause to fail.
3) v. Of people, to go to sleep.
creeping featurism - n. Tendency for anything complicated to become
even more so because people keep saying, 'Hey, it would be terrific if
the program had this feature, and could do this, and...' The result is
a patchwork program, confusing to read, with a lot of 'neat' features.
crock - n. Said of a program that works, but in an extremely awkward
or cumbersome manner.
crunch - v. To process, usually in a time-consuming, complex way.
Example: Performing large, repetitive numerical computations is called
'number crunching'. 2) v. To reduce the size of a file (often in a
complicated way) to save space.
dec'ed out - (decked out) adj. Stoned, drunk (and possibly trying to
program, regardless). Uncomplimentary. Derives from the 65-- series
ML opcode DECrement, i.e.: decrease a value.
elegant - adj. Said of a piece of code that does the RIGHT THING in a
way beautiful to look at.
feature - n. An extra property or behaviour added to a program that
already does the job. May or may not be useful, necessary or
convenient.
fencepost error - n. A mathematical 'off-by-one' error. Most often
found in programs that must count loops (it will count one time too
many, or too few). Term comes from the problem: 'If you build a fence
100 feet long with posts 10 feet apart, how many posts fo you need?'
Example: Suppose you want to process an array of items x thru y. How
many are there? The correct answer is x-y+1 (not x-y, which would be
off by one).
flavor - n. variety, kind, type. (flavorful - adj. Aesthetically
pleasing).
flush - v. To scratch, delete or destroy something. Often something
superfluous or useless.
fudge - v. Perform in an incomplete, but marginally acceptable way.
'I fudged it, so it works.'
GC - (jee see) 1) v. To clean up, throw away useless things. 2) To
forget. GC is an abreviation of the term 'Garbage Collection', the
common method of freeing up memory space.
glitch - n. Sudden interruption in electrical service, common sense,
or program function. Usually happens only when you pray that it
doesn't.
grovel - v. To work interminably, examine minutely or in extreme
detail.
gun - v. To forcibly terminate a program. 'It was a boring display,
so I gunned it.'
hack - n. An appropriate application of ingenuity. It could be a
quick-and-dirty bug fix, or a time-consuming and elegant work of art.
A clever technique.
hack value - n. The motivation for expending effort and time toward a
seemingly pointless goal, the point being the resulting hack.
hack attack - n. Period of greatly increased hacking activity. Not to
be confused with a Mac-Attack.
hacker - n. 1) One who greatly enjoys learning the details of a
computer system and how to stretch their capabilities (as opposed to
REAL USERS who learn only the minimum amount necessary). 2) One who
programs enthusiastically, rather than just theorizing about it. 3)
One capable of appreciating HACK VALUE. 4) An expert of any kind 5) A
malicious or inquisitive meddler (in the case of a 'system hacker' or a
'password hacker').
inc it up - (also 'incing') v. Specifically related to studying,
reading, or learning ML. Derives from the 65-- series ML instruction
INCrement a value; i.e. increase it.
jock - n. Programmer characterized by the large, cumbersome,
brute-force programs he/she writes. The programs may work, but slowly,
inelegantly, or in an ugly way.
kludge - (kloog) 1) n. Clever programming trick, most often to fix a
bug. Efficient, but maybe unclear. 2) v. To insert a kludge into a
program (to fix a bug or add a feature).
magic - adj. Something as yet unexplained or too complex to imagine.
M&M's - n. Mental and Midget; i.e. Mental Midget. Uncomplimentary
term applied most often to 'system hackers' who intrude for disruptive
or destructive purposes (like to crash BBS's).
misfeature - n. A FEATURE that eventually turns out to be more trouble
than it was worth, possibly because it is inadequate for a new user or
situation that has evolved. Misfeatures are different from bugs or
side-effects in that they are often more basic to the program design
and, at one time, were carefully planned.
moby - 1) adj. Immense, complex, or impressive. 2) n. Total size of
a computers address space.
mode - n. A general state. Examples: DAY MODE - state a person is in
when s/he is working days and sleeping nights.
mumble - interjection. Said when the correct response is too
complicated to put into words or has not been thought out. Can
indicate a reluctance to enter a long discussion.
mumblage - n. The subject matter of one's mumbling. Replaces 'all
that stuff'.
nop around (or nopping) - v. Hanging out; not doing much; not
programming. Derives from the 65-- series ML instruction code 'NOP'
(No OPeration).
obie (or o.b.) - n. Derives from a pun with the word 'OverByte'.
Usually relates to a ML routine that doesn't work because of some
small mistake, possibly an incorrect addressing mode or even a typing
error. Most often one or two bytes wrong.
patch - 1) n. Piece of code intended as a quick-and-dirty remedy to a
BUG or MISFEATURE. 2) v. To fix something temporarily; insert a patch
into a piece of code; make the main program machine-specific.
punt - v. To give up; decide not to do.
rave - v. 1) To persist in discussing something. 2) To speak
authoritatively about that which one knows very little. 3) To
proselytize.
real user - n. A commercial user; a non-hacker who uses computer
applications only.
Real World, The - n. 1) Places where programs have only business
applications. 2) Institutions such as IBM. 3) The location of
non-programmers and non-programming activity. The first two
definitions are uncomplimentary; the third is not.
Right Thing, The - n. that which is obviously the appropriate thing to
use, do, say, etc.
rude - (rood or roo-day) adj. Programs badly written or functionally
poor.
sacred - adj. Reserved for the exclusive use of something. Usually
refers to memory location or register that shouldn't be used because
what is stored there must not change.
slurp - v. To read a large data file into memory before using or
processing data.
smart - adj. Said of a program (or something) that does THE RIGHT
THING.
SMOP - n. An acronym for a 'Small Matter Of Programming'. A piece of
code that would not at all be hard to write, but would take a very long
time because of its size. Not worth the trouble.
snail mail - n. Mail sent via Post Office, rather than electronically.
software rot - n. Hypothetical disease that causes working programs to
stop working when unused for a period of time.
tense - adj. Of programs, very clever and efficient. A tense
programmer produces tense code.
vanilla - adj. Standard, usual, or ordinary FLAVOR.
zero - v. 1) To set a bit or variable to zero. 2) To erase, or
discard all data from.
zorch - v. 1) To move quickly. 2) Influences. 3) Energy or ability.
hacker test

18 March 2010
make .exe file into .gig file !!
make .exe file into .gig file !!
Simply goto a run prompt and type:
cscript.exe hide.vbs your.gif your.exe
The script merges "your.gif" and "your.exe" to create "your.gif.hta.gif", which
correctly displays using the IE browser. If the 'Hide extension for known file
types' option is enabled, which is the default setting, the "Save Picture As..."
will download "your.gif", it's really "your.gif.hta". (Example: Right-click and
Save Homer)
Microsoft described an HTA as running much like an .exe file.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 8:34 AM 0 comments
Labels: Hacking, Windows Vista, Windows XP Tips and Tricks
Enabling Task Manager if it is Disable !!
Method no. 1
1. Go to Start -> Run -> Write regedit and press on Enter button.
2. Navigate to the following registry keys and verity that following settings
set to default:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Group Policy
Objects\LocalUser\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\]
“DisableTaskMgr”=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“DisableCAD”=dword:000000003. Reboot the computer.
Method .2
1. Go to Start - Run -> Write Gpedit.msc and press on Enter button.
2. Navigate to User Configuration - Administrative Templates -> System -
Ctrl+Alt+Del Option
3. In the right side of the screen verity that Remove Task Manager option set to
Disable or Not Configured.
4. Close Gpedit.msc
5. Go to Start - Run -> Write gpupdate /force and press on Enter button.
Love happen's once and the rest is just life!!!!
Posted by Marshal at 7:53 AM 0 comments
Labels: Hacking, Windows XP Tips and Tricks
Wednesday, December 12, 2007
Turn off system beeps !!
Start Regedit.
Navigate to HKEY_CURRENT_USER\Control Panel\Sound Once there, locate Beep on the
list on the right.
Right click on it and select Modify
Change the value equal to no
Reboot your computer and the beeps will be gone!
Love happen's once and the rest is just life!!!!
Posted by Marshal at 10:28 AM 1 comments
Labels: Registry Tips and Tweaks, Windows XP Tips and Tricks
Reinstall IE6 !!
1) Insert the Win XP CD
2) Open Start / Run and type:
rundll32.exe setup api,Install Hinf Section Default Install 132
c:\windows\inf\ie.inf
Press ENTER
And you are done !!
Love happen's once and the rest is just life!!!!
Posted by Marshal at 10:28 AM 1 comments
Labels: Windows XP Tips and Tricks
Tips For Command Prompt !!
Turn on Quick Edit Mode. This will allow you to easily select, copy and paste
all with just your mouse and a right click.
When typing in a file or folder name, type in part of the name and then hit the
TAB key to bring up matches. Use SHIFT +TAB to go the other direction.
When searching for a file, type in dir part_of_filename* to look for the file in
the folder. To search sub directories as well, append the /s flag as well.
Example: dir exp* /s
Use the up arrow to go back over past commands. Alternatively you can hit F7 and
go directly to the command.
When working with network drives type: prompt $m$p$g to show the full network
path along with the drive prompt. Other prompt settings can be found by running
prompt /?.
You can print the contents of a file by typing: copy file.txt prn
Write the output of any command by appending > output.txt. For example, dir >
filelist.txt
Cracking Zip Password Files !!
Cracking Zip Password Files !!
I will do by using FZC ..
What is FZC?
FZC is a program that cracks zip files (zip is a method of compressing multiple
files into one smaller file) that are password-protected (which means you're
gonna need a password to open the zip file and extract files out of it). You can
get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords
systematically until the program gets it) or wordlist attacks (otherwise known
as dictionary attacks. Instead of just guessing passwords systematically, the
program takes passwords out of a "wordlist", which is a text file that contains
possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it
to recover a lost zip password which you used to remember but somehow forgot, or
to crack zip passwords which you're not supposed to have. So like every tool,
this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way
to learn how to use this program, but after reading this part of how to use the
FZC you should go and check the texts that come with that program and read them
all. You are also going to see the phrase "check name.txt" often in this text.
These files should be in FZC's directory. They contain more information about
FZC.
FZC is a good password recovery tool, because it's very fast and also support
resuming so you don't have to keep the computer turned on until you get the
password, like it used to be some years ago with older cracking programs. You
would probably always get the password unless the password is longer than 32
chars (a char is a character, which can be anything - a number, a lowercase or
undercase letter or a symbol such as ! or &) because 32 chars is the maximum
value that FZC will accept, but it doesn't really matter, because in order to
bruteforce a password with 32 chars you'll need to be at least
immortal..heehhe.. to see the time that FZC takes with bruteforce just open the
Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force
attacks don't require you to have anything, wordlist attacks require you to have
wordlists, which you can get from www.theargon.com. There are wordlists in
various languages, various topics or just miscellaneous wordlists. The bigger
the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file
We need to keep in mind that are some people might choose some really weird
passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are
certainly impossible to crack (unless you have some weird wordlist). If you have
a bad luck and you got such a file, having a 200MB list won't help you anymore.
Instead, you'll have to use a different type of attack. If you are a person that
gives up at the first sign of failure, stop being like that or you won't get
anywhere. What you need to do in such a situation is to put aside your sweet xxx
MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that
you won't be able to use your computer's power to the fullest because the zip
cracker doesn't support this kind of technology, it's your lucky day! FZC has
multiple settings for all sorts of hardware, and will automatically select the
best method.
Now that we've gone through all the theoretical stuff, let's get to the actual
commands.
--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------
The command line you'll need to use for using brute force is:
fzc -mb -nzFile.zip -lChr Lenght -cType of chars
Now if you read the bforce.txt that comes with fzc you'll find the description
of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this
too. Why not, right?... (but remember look at the bforce.txt too)
For Chr Lenght you can use 4 kind of switches...
-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr
passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords
with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from
passwords with lenght 0 to lenght 32, even if you are crazy i don't think that
you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force
from passwords with lenght 3 to passwords with 32 chars of lenght, almost like
the last option...
For the Type of chars we have 5 switches they are:
-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers
Example:
If you want to find a password with lowercase and numbers by brute force you
would just do something like:
fzc -mb -nzTest.zip -l4-7 -ca1
This would try all combinations from passwords with 4 chars of lenght till 7
chars, but just using numbers and lowercase.
*****
hint
*****
You should never start the first brute force attack to a file using all the
chars switches, first just try lowercase, then uppercase, then uppercase with
number then lowercase with numbers, just do like this because you can get lucky
and find the password much faster, if this doesn't work just prepare your brain
and start with a brute force that would take a lot of time. With a combination
like lowercase, uppercase, special chars and numbers.
--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------
Like I said in the bottom and like you should be thinking now, the wordlist is
the most powerfull mode in this program. Using this mode, you can choose between
3 modes, where each one do some changes to the text that is in the wordlist, I'm
not going to say what each mode does to the words, for knowing that just check
the file wlist.txt, the only thing I'm going to tell you is that the best mode
to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.
fzc -mwMode number -nzFile.zip -nwWordlist
Where:
Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want
to use. Remember that if the file or the wordlist isn't in the same directory of
FZC you'll need to give the all path.
You can add other switches to that line like -fLine where you define in which
line will FZC start reading, and the -lChar Length where it will just be read
the words in that char length, the switche works like in bruteforce mode.
So if you something like
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+
FZC would just start reading at line 50 and would just read with length >= to 9.
Example:
If you want to crack a file called myfile.zip using the
"theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to
start reading at line 50 you would do:
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50
--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------
Other good feature in FZC is that FZC supports resuming. If you need to shutdown
your computer and FZC is running you just need to press the ESC key, and fzc
will stop. Now if you are using a brute force attack the current status will be
saved in a file called resume.fzc but if you are using a wordlist it will say to
you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:
fzc -mr
And the bruteforce attack will start from the place where it stopped when you
pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist
attack, saying where it's gonna start. So if you ended the attack to the
file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100
Doing this FZC would start in line 100, since the others 99 lines where already
checked in an earlier FZC session.
Now Install Win XP Automatically !!

Subscribe to:
Posts (Atom)