<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6578361456208529115</atom:id><lastBuildDate>Thu, 29 Aug 2024 22:26:47 +0000</lastBuildDate><category>aRTiCLe about CoMPuTer</category><category>aRTiCLe iNTeRNeT</category><category>PC TooL</category><category>MiG33 PC TooL</category><category>tips and trik PC</category><category>Trik iNTeRNeT</category><category>aRTiCLe PRoGRaM</category><category>HP TooL</category><category>aPPLiCaTioN FLooD</category><category>SoFTWaRe DeSiGN</category><category>ar</category><category>mig33 HP TooL</category><category>tips web</category><title>BuNKeR aPPLiCaTioN</title><description>This bunker for anything applications and more tips trik about PC ^_^</description><link>http://bunkerapplication.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>47</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:keywords>bunker,application,mig33</itunes:keywords><itunes:subtitle>blog for anything application free</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3958042961985624382</guid><pubDate>Mon, 15 Jun 2009 02:15:00 +0000</pubDate><atom:updated>2009-06-14T19:26:45.133-07:00</atom:updated><title>MIG33 EARTH (BETA)</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i296.photobucket.com/albums/mm161/skypiea_angel/cover.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 421px; height: 512px;" src="http://i296.photobucket.com/albums/mm161/skypiea_angel/cover.jpg" border="0" alt="" /&gt;&lt;/a&gt;&lt;br /&gt;Coming Soon........&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;PLease wait a few time to relese this appliaction&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2009/06/mig33-earth-beta.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-5434116034018277647</guid><pubDate>Wed, 08 Apr 2009 14:38:00 +0000</pubDate><atom:updated>2009-04-08T07:42:04.348-07:00</atom:updated><title>Ryuk v3</title><description>This i wantshare to you application for flood&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;a href="http://www.ziddu.com/download/4208586/setup_ryuk-v3.zip.html"&gt;DOWNLOAD LINK&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2009/04/ryuk-v3.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-1351768064572473344</guid><pubDate>Thu, 26 Feb 2009 14:23:00 +0000</pubDate><atom:updated>2009-02-26T06:32:48.941-08:00</atom:updated><title>CCP mig33</title><description>this i will share again to you application for change password and cek IDR for 40 ID&lt;br /&gt;&lt;br /&gt;:D&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;a href="http://uploads.bizhat.com/file/385742"&gt;DOWNLOAD LINK&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2009/02/ccp-mig33.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-5796537081945818097</guid><pubDate>Wed, 25 Feb 2009 06:22:00 +0000</pubDate><atom:updated>2009-03-16T17:28:30.411-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">MiG33 PC TooL</category><category domain="http://www.blogger.com/atom/ns#">PC TooL</category><title>Fast Crack Pass v1.0.5</title><description>Hallo all&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;this i will share my software to crack password in mig33&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;pv andra_craid to get serial number&lt;br /&gt;&lt;br /&gt; &lt;a href="http://www.ziddu.com/download/3891628/FasterCrackPassv1.0.5.rar.html"&gt;DOWNLOAD LINK 1&lt;/a&gt;&lt;br /&gt; &lt;a href="http://uploads.bizhat.com/file/389917"&gt;DOWNLOAD LINK 2&lt;/a&gt;</description><link>http://bunkerapplication.blogspot.com/2009/02/fast-crack-pass.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-8711749308802627054</guid><pubDate>Wed, 07 Jan 2009 08:04:00 +0000</pubDate><atom:updated>2009-01-08T06:14:38.389-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">MiG33 PC TooL</category><category domain="http://www.blogger.com/atom/ns#">PC TooL</category><title>AK-77 Auto Death v1.5 FINAL UPDATE</title><description>this i want share to you my own application for kicker in mig33&lt;br /&gt;&lt;br /&gt;please try it&lt;br /&gt;&lt;br /&gt;pv andra_craid for get password&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;a href="http://uploads.bizhat.com/file/374014"&gt;DOWNLOAD LINK FINAL UPDATE&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.evilshare.com/d00237c2-2edd-102c-802c-000b6aa2a5f8"&gt;LINK 2 NEW&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2009/01/ak-77-auto-death-v15.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-8740069007520930351</guid><pubDate>Sat, 03 Jan 2009 03:56:00 +0000</pubDate><atom:updated>2009-01-02T19:58:58.727-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Bit Torrent Tutorials</title><description>The first things you need to know about using Bit Torrent:&lt;br /&gt;&lt;br /&gt;-- Bit Torrent is aimed at broadband users (or any connection better than dialup).&lt;br /&gt;&lt;br /&gt;-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.&lt;br /&gt;&lt;br /&gt;-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)&lt;br /&gt;&lt;br /&gt;-- The method of downloading is not your conventional type of download. Since downloads do not come in as one&lt;br /&gt;&lt;br /&gt;big chunk, you are able to download from many people at once, increasing your download speeds. There may be&lt;br /&gt;&lt;br /&gt;100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly&lt;br /&gt;&lt;br /&gt;share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Before you use the plug-in, take a look at /http://www.suprnova.org, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I'll break this down.&lt;br /&gt;&lt;br /&gt;Added: Self explanitory, its the date the torrent was added.&lt;br /&gt;&lt;br /&gt;Name: Also self explanitory.&lt;br /&gt;&lt;br /&gt;Filesize: Duh&lt;br /&gt;&lt;br /&gt;Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.&lt;br /&gt;&lt;br /&gt;DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now that you should understand how torrent files work, and how to use them, on to Azureus!&lt;br /&gt;&lt;br /&gt;First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /http://java.sun.com/j2se/1.4.2/download.html&lt;br /&gt;&lt;br /&gt;Next, get Azureus at: /http://azureus.sourceforge.net&lt;br /&gt;&lt;br /&gt;Next, get the Suprnovalister plugin from /http://s93732957.onlinehome.us/storage/suprnovalister.jar&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Install Java JRE before you do ANYTHING.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Load up Azureus, and if you want, go through the settings and personalize it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In the menu bar, go to View &gt; Plugins &gt; Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File &gt; Open &gt; .torrent File in Azureus.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2009/01/bit-torrent-tutorials.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-6177121426974092895</guid><pubDate>Thu, 18 Dec 2008 07:37:00 +0000</pubDate><atom:updated>2008-12-17T23:42:47.159-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>Translating Binary To Text</title><description>A Tutorial for those willing to Learn&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Contents&lt;br /&gt;&lt;br /&gt;1. Introduction&lt;br /&gt;&lt;br /&gt;2. The Binary System&lt;br /&gt;&lt;br /&gt;3. Converting Binary to ASCII (Text)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Introduction:&lt;br /&gt;&lt;br /&gt;We&#146;ve all seen binary code. We&#146;ve come to think of them as a bunch of ones and zeroes in long strings&#133;&lt;br /&gt;&lt;br /&gt;010010101010101001101011&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;But these ones and zeroes can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal numbers we&#146;re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn&#146;t use the decimal system, so technically, when it converts binary to text, it doesn&#146;t go through the process I will show you. This is just a divertive way of explaining you how the binary system works.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The Binary System:&lt;br /&gt;&lt;br /&gt;Here&#146;s a simple example of binary:&lt;br /&gt;&lt;br /&gt;10101&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Let&#146;s think of the example above as empty slots:&lt;br /&gt;&lt;br /&gt;_ _ _ _ _&lt;br /&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;First off, you read binary from right-to-left. It&#146;s just the way it&#146;s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that&#146;s attached to that slot or you don&#146;t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:&lt;br /&gt;&lt;br /&gt;_ _ _ 1 0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As such, the number above equals to a decimal value of two.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As an example, let&#146;s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don&#146;t want a one, you want the second slot to also be 0 because you don&#146;t want a two, you want the third slot to also to be 0 because you don&#146;t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:&lt;br /&gt;&lt;br /&gt;1 0 0 0 (or simply 1000 without those underlines)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:&lt;br /&gt;&lt;br /&gt;1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To get it cleared up, here&#146;s another example:&lt;br /&gt;&lt;br /&gt;0 1 is the same as 1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Exercises: What do the following equal in decimal terms?&lt;br /&gt;&lt;br /&gt;a) 100&lt;br /&gt;&lt;br /&gt;b] 000100&lt;br /&gt;&lt;br /&gt;c) 100000&lt;br /&gt;&lt;br /&gt;d) 0010&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Answers:&lt;br /&gt;&lt;br /&gt;a) 4&lt;br /&gt;&lt;br /&gt;b] 4&lt;br /&gt;&lt;br /&gt;c) 32&lt;br /&gt;&lt;br /&gt;d) 2&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you got the answers above right, then you pretty much understand the basics of binary.&lt;br /&gt;&lt;br /&gt;Let&#146;s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:&lt;br /&gt;&lt;br /&gt;11&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As another example, let&#146;s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:&lt;br /&gt;&lt;br /&gt;101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here&#146;s an additional example:&lt;br /&gt;&lt;br /&gt;001011 [Reading from the right: 1(one) + 1(two) + 0(four) + 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Exercises: What do the following equal in decimal terms?&lt;br /&gt;&lt;br /&gt;a) 11011&lt;br /&gt;&lt;br /&gt;b] 110&lt;br /&gt;&lt;br /&gt;c) 010101&lt;br /&gt;&lt;br /&gt;d) 10110&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Answers:&lt;br /&gt;&lt;br /&gt;a) 27&lt;br /&gt;&lt;br /&gt;b] 6&lt;br /&gt;&lt;br /&gt;c) 21&lt;br /&gt;&lt;br /&gt;d) 22&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. Converting Binary to ASCII (Text)&lt;br /&gt;&lt;br /&gt;ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of &#147;k&#148; or &#147;5&#148; or whatever key you pressed.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here&#146;s an example of a message &#147;hidden&#148; in binary text:&lt;br /&gt;&lt;br /&gt;0100100001100101011011000110110001101111&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:&lt;br /&gt;&lt;br /&gt;01001000 01100101 01101100 01101100 01101111&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.&lt;br /&gt;&lt;br /&gt;01001000 = 72&lt;br /&gt;&lt;br /&gt;01100101 = 101&lt;br /&gt;&lt;br /&gt;01101100 = 108&lt;br /&gt;&lt;br /&gt;01101100 = 108&lt;br /&gt;&lt;br /&gt;01101111 = 111&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding &#147;H&#148; to show up.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Let&#146;s do so for the entire example message:&lt;br /&gt;&lt;br /&gt;72 = H&lt;br /&gt;&lt;br /&gt;101 = e&lt;br /&gt;&lt;br /&gt;108 = l&lt;br /&gt;&lt;br /&gt;108 = l&lt;br /&gt;&lt;br /&gt;111 = o&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So the entire &#147;hidden&#148; message translates to &#147;Hello&#148;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Exercise: Decode the following message&lt;br /&gt;&lt;br /&gt;010000110110111101101110011001110111001001100001011101000111010101101100011000010111010001&lt;br /&gt;&lt;br /&gt;101001011011110110111001110011 00100001&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Hint: The first step on your way to decoding the message (separated into bytes for you)&lt;br /&gt;&lt;br /&gt;01000011 01101111 01101110 01100111 01110010 01100001 01110100 01110101 01101100 01100001 01110100 01101001 01101111 01101110 01110011 00100001&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;PS. Please note that this is the information as I've come to understand it. As such, it's somewhat easier to understand, but it may not necessarily be accurate. In other words, if another source contradicts what has been indicated here, that source is probably right. This text was completely written up by me, with no other sources for aid. If you wish to distribute this text, feel free to do so, but I would appreciate it if you contacted me first.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/12/translating-binary-to-text.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3770274009563777217</guid><pubDate>Thu, 04 Dec 2008 09:05:00 +0000</pubDate><atom:updated>2008-12-04T01:07:27.007-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Trojan Port</title><description>this i want share trojan port :&lt;br /&gt;&lt;br /&gt;TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250&lt;br /&gt;&lt;br /&gt;TCP 28 Amanda.200&lt;br /&gt;&lt;br /&gt;TCP 31 MastersParadise.920&lt;br /&gt;&lt;br /&gt;TCP 68 Subseven.100&lt;br /&gt;&lt;br /&gt;TCP 142 NetTaxi.180&lt;br /&gt;&lt;br /&gt;TCP 146 Infector.141, Intruder.100, Intruder.100&lt;br /&gt;&lt;br /&gt;TCP 171 ATrojan.200&lt;br /&gt;&lt;br /&gt;TCP 285 WCTrojan.100&lt;br /&gt;&lt;br /&gt;TCP 286 WCTrojan.100&lt;br /&gt;&lt;br /&gt;TCP 334 Backage.310&lt;br /&gt;&lt;br /&gt;TCP 370 NeuroticKat.120, NeuroticKat.130&lt;br /&gt;&lt;br /&gt;TCP 413 Coma.109&lt;br /&gt;&lt;br /&gt;TCP 420 Breach.450&lt;br /&gt;&lt;br /&gt;TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100&lt;br /&gt;&lt;br /&gt;TCP 623 Rtb666.160&lt;br /&gt;&lt;br /&gt;TCP 660 Zaratustra.100&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;TCP 661 Noknok.800, Noknok.820&lt;br /&gt;&lt;br /&gt;TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110&lt;br /&gt;&lt;br /&gt;TCP 667 SniperNet.210, Snipernet.220&lt;br /&gt;&lt;br /&gt;TCP 668 Unicorn.101, Unicorn.110&lt;br /&gt;&lt;br /&gt;TCP 680 Rtb666.160&lt;br /&gt;&lt;br /&gt;TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332&lt;br /&gt;&lt;br /&gt;TCP 785 NetworkTerrorist.100&lt;br /&gt;&lt;br /&gt;TCP 800 NeuroticKitten.010&lt;br /&gt;&lt;br /&gt;TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130&lt;br /&gt;&lt;br /&gt;TCP 901 NetDevil.130, NetDevil.140&lt;br /&gt;&lt;br /&gt;TCP 1000 DerSpaeher.200&lt;br /&gt;&lt;br /&gt;TCP 1001 Silencer.100&lt;br /&gt;&lt;br /&gt;TCP 1008 AutoSpy.100&lt;br /&gt;&lt;br /&gt;TCP 1010 DerSpaeher.200&lt;br /&gt;&lt;br /&gt;TCP 1015 Doly.150&lt;br /&gt;&lt;br /&gt;TCP 1111 TPort.100&lt;br /&gt;&lt;br /&gt;TCP 1130 Noknok.800, Noknok.820&lt;br /&gt;&lt;br /&gt;TCP 1207 SoftWAR.100&lt;br /&gt;&lt;br /&gt;TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200&lt;br /&gt;&lt;br /&gt;TCP 1245 VoodooDoll.006&lt;br /&gt;&lt;br /&gt;TCP 1269 Matrix.130&lt;br /&gt;&lt;br /&gt;TCP 1480 RemoteHack.130&lt;br /&gt;&lt;br /&gt;TCP 1568 RemoteHack.100, RemoteHack.110&lt;br /&gt;&lt;br /&gt;TCP 1600 DirectConnection.100&lt;br /&gt;&lt;br /&gt;TCP 1601 DirectConnection.100&lt;br /&gt;&lt;br /&gt;TCP 1602 DirectConnection.100&lt;br /&gt;&lt;br /&gt;TCP 1634 NetCrack.100&lt;br /&gt;&lt;br /&gt;TCP 1784 Snid.120, Snid.212&lt;br /&gt;&lt;br /&gt;TCP 1999 TransmissionScout.100, TransmissionScout.110&lt;br /&gt;&lt;br /&gt;TCP 2000 ATrojan.200, InsaneNetwork.400&lt;br /&gt;&lt;br /&gt;TCP 2001 DIRT.220, TrojanCow.100&lt;br /&gt;&lt;br /&gt;TCP 2003 TransmissionScout.100, TransmissionScout.110&lt;br /&gt;&lt;br /&gt;TCP 2023 RipperPro.100&lt;br /&gt;&lt;br /&gt;TCP 2040 InfernoUploader.100&lt;br /&gt;&lt;br /&gt;TCP 2115 Bugs.100&lt;br /&gt;&lt;br /&gt;TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310&lt;br /&gt;&lt;br /&gt;TCP 2332 SilentSpy.202&lt;br /&gt;&lt;br /&gt;TCP 2589 Dagger.140&lt;br /&gt;&lt;br /&gt;TCP 2600 DigitalRootbeer.100&lt;br /&gt;&lt;br /&gt;TCP 2989 Rat.200&lt;br /&gt;&lt;br /&gt;TCP 3128 MastersParadise.970&lt;br /&gt;&lt;br /&gt;TCP 3129 MastersParadise.920, MastersParadise.970&lt;br /&gt;&lt;br /&gt;TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110&lt;br /&gt;&lt;br /&gt;TCP 3215 BlackStar.100, Ghost.230&lt;br /&gt;&lt;br /&gt;TCP 3333 Daodan.123&lt;br /&gt;&lt;br /&gt;TCP 3410 OptixPro.100, OptixPro.110&lt;br /&gt;&lt;br /&gt;TCP 3456 Force.155, TerrorTrojan.100&lt;br /&gt;&lt;br /&gt;TCP 3505 AutoSpy.130, AutoSpy.140&lt;br /&gt;&lt;br /&gt;TCP 3586 Snid.120, Snid.212&lt;br /&gt;&lt;br /&gt;TCP 3700 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 3723 Mantis.100&lt;br /&gt;&lt;br /&gt;TCP 3800 Eclypse.100&lt;br /&gt;&lt;br /&gt;TCP 3996 RemoteAnything.364&lt;br /&gt;&lt;br /&gt;TCP 4000 SkyDance.220, SkyDance.229&lt;br /&gt;&lt;br /&gt;TCP 4201 Wartrojan.160, Wartrojan.200&lt;br /&gt;&lt;br /&gt;TCP 4225 SilentSpy.202&lt;br /&gt;&lt;br /&gt;TCP 4321 Bobo.100&lt;br /&gt;&lt;br /&gt;TCP 4444 AlexTrojan.200, Crackdown.100&lt;br /&gt;&lt;br /&gt;TCP 4488 EventHorizon.100&lt;br /&gt;&lt;br /&gt;TCP 4523 Celine.100&lt;br /&gt;&lt;br /&gt;TCP 4545 InternalRevise.100, RemoteRevise.150&lt;br /&gt;&lt;br /&gt;TCP 4567 FileNail.100&lt;br /&gt;&lt;br /&gt;TCP 4666 Mneah.100&lt;br /&gt;&lt;br /&gt;TCP 4950 ICQTrojan.100&lt;br /&gt;&lt;br /&gt;TCP 5005 Aladino.060&lt;br /&gt;&lt;br /&gt;TCP 5025 Keylogger.WMRemote.100&lt;br /&gt;&lt;br /&gt;TCP 5031 NetMetro.104&lt;br /&gt;&lt;br /&gt;TCP 5032 NetMetro.104&lt;br /&gt;&lt;br /&gt;TCP 5033 NetMetro.104&lt;br /&gt;&lt;br /&gt;TCP 5050 RoxRat.100&lt;br /&gt;&lt;br /&gt;TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040&lt;br /&gt;&lt;br /&gt;TCP 5190 MBomber.100&lt;br /&gt;&lt;br /&gt;TCP 5277 WinShell.400&lt;br /&gt;&lt;br /&gt;TCP 5343 WCRat.100&lt;br /&gt;&lt;br /&gt;TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300&lt;br /&gt;&lt;br /&gt;TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100&lt;br /&gt;&lt;br /&gt;TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100&lt;br /&gt;&lt;br /&gt;TCP 5534 TheFlu.100&lt;br /&gt;&lt;br /&gt;TCP 5550 XTCP.200, XTCP.201&lt;br /&gt;&lt;br /&gt;TCP 5555 Noxcape.100, Noxcape.200&lt;br /&gt;&lt;br /&gt;TCP 5695 Assassin.100&lt;br /&gt;&lt;br /&gt;TCP 5714 WinCrash.100&lt;br /&gt;&lt;br /&gt;TCP 5741 WinCrash.100&lt;br /&gt;&lt;br /&gt;TCP 5742 WinCrash.103&lt;br /&gt;&lt;br /&gt;TCP 5802 Y3KRat.160&lt;br /&gt;&lt;br /&gt;TCP 5810 Y3KRat.160&lt;br /&gt;&lt;br /&gt;TCP 5838 Y3KRat.170&lt;br /&gt;&lt;br /&gt;TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5880 Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;TCP 5883 Y3KRat.110, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5884 Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5886 Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;TCP 5890 Y3KRat.140&lt;br /&gt;&lt;br /&gt;TCP 6400 Thething.100, Thething.150&lt;br /&gt;&lt;br /&gt;TCP 6556 AutoSpy.120, AutoSpy.122&lt;br /&gt;&lt;br /&gt;TCP 6655 Aqua.020&lt;br /&gt;&lt;br /&gt;TCP 6660 LameSpy.095&lt;br /&gt;&lt;br /&gt;TCP 6666 LameRemote.100, ProjectMayhem.100&lt;br /&gt;&lt;br /&gt;TCP 6669 Vampire.100&lt;br /&gt;&lt;br /&gt;TCP 6670 DeepThroat.200, DeepThroat.210&lt;br /&gt;&lt;br /&gt;TCP 6671 DeepThroat.310&lt;br /&gt;&lt;br /&gt;TCP 6699 HostControl.101&lt;br /&gt;&lt;br /&gt;TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190&lt;br /&gt;&lt;br /&gt;TCP 6712 Subseven.100&lt;br /&gt;&lt;br /&gt;TCP 6713 Subseven.100&lt;br /&gt;&lt;br /&gt;TCP 6767 NTRC.120&lt;br /&gt;&lt;br /&gt;TCP 6776 SubSeven.180, SubSeven.190, Subseven.200&lt;br /&gt;&lt;br /&gt;TCP 6789 Doly.200&lt;br /&gt;&lt;br /&gt;TCP 6796 SubSeven.214&lt;br /&gt;&lt;br /&gt;TCP 6912 ShitHeep.100&lt;br /&gt;&lt;br /&gt;TCP 6939 Indoctrination.100&lt;br /&gt;&lt;br /&gt;TCP 6953 Lithium.100&lt;br /&gt;&lt;br /&gt;TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120&lt;br /&gt;&lt;br /&gt;TCP 6970 Danton.330&lt;br /&gt;&lt;br /&gt;TCP 7001 Freak88.100&lt;br /&gt;&lt;br /&gt;TCP 7119 Massaker.100&lt;br /&gt;&lt;br /&gt;TCP 7200 Massaker.110&lt;br /&gt;&lt;br /&gt;TCP 7300 Coced.221&lt;br /&gt;&lt;br /&gt;TCP 7301 Coced.221&lt;br /&gt;&lt;br /&gt;TCP 7306 NetSpy.200, NetSpy.200&lt;br /&gt;&lt;br /&gt;TCP 7410 Phoenix.190, Phoenix.200&lt;br /&gt;&lt;br /&gt;TCP 7511 Genue.100&lt;br /&gt;&lt;br /&gt;TCP 7609 Snid.120, Snid.212&lt;br /&gt;&lt;br /&gt;TCP 7614 Wollf.130&lt;br /&gt;&lt;br /&gt;TCP 7648 BlackStar.100, Ghost.230&lt;br /&gt;&lt;br /&gt;TCP 7788 Last.2000, Matrix.200&lt;br /&gt;&lt;br /&gt;TCP 7826 MiniOblivion.010, Oblivion.010&lt;br /&gt;&lt;br /&gt;TCP 7887 SmallFun.110&lt;br /&gt;&lt;br /&gt;TCP 7891 Revenger.100&lt;br /&gt;&lt;br /&gt;TCP 7979 VagrNocker.200&lt;br /&gt;&lt;br /&gt;TCP 7997 VagrNocker.200&lt;br /&gt;&lt;br /&gt;TCP 8000 XConsole.100&lt;br /&gt;&lt;br /&gt;TCP 8011 Way.240&lt;br /&gt;&lt;br /&gt;TCP 8012 Ptakks.215, Ptakks.217&lt;br /&gt;&lt;br /&gt;TCP 8110 LoseLove.100&lt;br /&gt;&lt;br /&gt;TCP 8111 LoseLove.100&lt;br /&gt;&lt;br /&gt;TCP 8301 LoseLove.100&lt;br /&gt;&lt;br /&gt;TCP 8302 LoseLove.100&lt;br /&gt;&lt;br /&gt;TCP 8372 NetBoy.100&lt;br /&gt;&lt;br /&gt;TCP 8720 Connection.130&lt;br /&gt;&lt;br /&gt;TCP 8734 AutoSpy.110&lt;br /&gt;&lt;br /&gt;TCP 8811 Force.155&lt;br /&gt;&lt;br /&gt;TCP 8899 Last.2000&lt;br /&gt;&lt;br /&gt;TCP 9000 Aristotles.100&lt;br /&gt;&lt;br /&gt;TCP 9301 LoseLove.100&lt;br /&gt;&lt;br /&gt;TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170&lt;br /&gt;&lt;br /&gt;TCP 9401 InCommand.100, InCommand.110, InCommand.170&lt;br /&gt;&lt;br /&gt;TCP 9402 InCommand.100, InCommand.110&lt;br /&gt;&lt;br /&gt;TCP 9561 CRatPro.110&lt;br /&gt;&lt;br /&gt;TCP 9563 CRatPro.110&lt;br /&gt;&lt;br /&gt;TCP 9580 TheefLE.100&lt;br /&gt;&lt;br /&gt;TCP 9696 Danton.210, Ghost.230&lt;br /&gt;&lt;br /&gt;TCP 9697 Danton.320, Danton.330, Ghost.230&lt;br /&gt;&lt;br /&gt;TCP 9870 R3C.100&lt;br /&gt;&lt;br /&gt;TCP 9872 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 9873 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 9874 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 9875 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 9876 Rux.100, SheepGoat.100&lt;br /&gt;&lt;br /&gt;TCP 9877 SmallBigBrother.020&lt;br /&gt;&lt;br /&gt;TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120&lt;br /&gt;&lt;br /&gt;TCP 9879 SmallBigBrother.020&lt;br /&gt;&lt;br /&gt;TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300&lt;br /&gt;&lt;br /&gt;TCP 10001 DTr.130, DTr.140&lt;br /&gt;&lt;br /&gt;TCP 10013 Amanda.200&lt;br /&gt;&lt;br /&gt;TCP 10067 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 10100 Gift.240&lt;br /&gt;&lt;br /&gt;TCP 10101 NewSilencer.100&lt;br /&gt;&lt;br /&gt;TCP 10167 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;TCP 10528 HostControl.100, HostControl.260&lt;br /&gt;&lt;br /&gt;TCP 10607 Coma.109&lt;br /&gt;&lt;br /&gt;TCP 10666 Ambush.100&lt;br /&gt;&lt;br /&gt;TCP 11011 Amanda.200&lt;br /&gt;&lt;br /&gt;TCP 11050 HostControl.101&lt;br /&gt;&lt;br /&gt;TCP 11051 HostControl.100, HostControl.260&lt;br /&gt;&lt;br /&gt;TCP 11223 AntiNuke.100, Progenic.100, Progenic.110&lt;br /&gt;&lt;br /&gt;TCP 11225 Cyn.100, Cyn.103, Cyn.120&lt;br /&gt;&lt;br /&gt;TCP 11306 Noknok.800, Noknok.820&lt;br /&gt;&lt;br /&gt;TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400&lt;br /&gt;&lt;br /&gt;TCP 11991 PitfallSurprise.100&lt;br /&gt;&lt;br /&gt;TCP 12043 Frenzy.2000&lt;br /&gt;&lt;br /&gt;TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400&lt;br /&gt;&lt;br /&gt;TCP 12346 Netbus.160, Netbus.170&lt;br /&gt;&lt;br /&gt;TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317&lt;br /&gt;&lt;br /&gt;TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402&lt;br /&gt;&lt;br /&gt;TCP 12389 KheSanh.210&lt;br /&gt;&lt;br /&gt;TCP 12478 Bionet.210&lt;br /&gt;&lt;br /&gt;TCP 12623 Buttman.090, Buttman.100&lt;br /&gt;&lt;br /&gt;TCP 12624 Buttman.090, Buttman.100&lt;br /&gt;&lt;br /&gt;TCP 12625 Buttman.100&lt;br /&gt;&lt;br /&gt;TCP 12904 Akropolis.100, Rocks.100&lt;br /&gt;&lt;br /&gt;TCP 13473 Chupacabra.100&lt;br /&gt;&lt;br /&gt;TCP 13753 AFTP.010&lt;br /&gt;&lt;br /&gt;TCP 14100 Eurosol.100&lt;br /&gt;&lt;br /&gt;TCP 14194 CyberSpy.840&lt;br /&gt;&lt;br /&gt;TCP 14286 HellDriver.100&lt;br /&gt;&lt;br /&gt;TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070&lt;br /&gt;&lt;br /&gt;TCP 14501 PCInvader.060, PCInvader.070&lt;br /&gt;&lt;br /&gt;TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070&lt;br /&gt;&lt;br /&gt;TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070&lt;br /&gt;&lt;br /&gt;TCP 14504 PCInvader.050, PCInvader.060&lt;br /&gt;&lt;br /&gt;TCP 15092 HostControl.100, HostControl.260&lt;br /&gt;&lt;br /&gt;TCP 15382 SubZero.100&lt;br /&gt;&lt;br /&gt;TCP 15432 Cyn.210&lt;br /&gt;&lt;br /&gt;TCP 15555 ICMIBC.100&lt;br /&gt;&lt;br /&gt;TCP 16322 LastDoor.100&lt;br /&gt;&lt;br /&gt;TCP 16484 MoSucker.110&lt;br /&gt;&lt;br /&gt;TCP 16661 Dfch.010&lt;br /&gt;&lt;br /&gt;TCP 16969 Progenic.100&lt;br /&gt;&lt;br /&gt;TCP 16982 AcidShiver.100&lt;br /&gt;&lt;br /&gt;TCP 17300 Kuang.200&lt;br /&gt;&lt;br /&gt;TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521&lt;br /&gt;&lt;br /&gt;TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521&lt;br /&gt;&lt;br /&gt;TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100&lt;br /&gt;&lt;br /&gt;TCP 17593 AudioDoor.120&lt;br /&gt;&lt;br /&gt;TCP 19191 BlueFire.035, BlueFire.041&lt;br /&gt;&lt;br /&gt;TCP 19604 Metal.270&lt;br /&gt;&lt;br /&gt;TCP 19605 Metal.270&lt;br /&gt;&lt;br /&gt;TCP 19991 Dfch.010&lt;br /&gt;&lt;br /&gt;TCP 20000 Millenium.100&lt;br /&gt;&lt;br /&gt;TCP 20001 Millenium.100, PshychoFiles.180&lt;br /&gt;&lt;br /&gt;TCP 20002 AcidKor.100, PshychoFiles.180&lt;br /&gt;&lt;br /&gt;TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220&lt;br /&gt;&lt;br /&gt;TCP 21212 Schwindler.182&lt;br /&gt;&lt;br /&gt;TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135&lt;br /&gt;&lt;br /&gt;TCP 21579 Breach.2001&lt;br /&gt;&lt;br /&gt;TCP 21584 Breach.2001&lt;br /&gt;&lt;br /&gt;TCP 21684 Intruse.134&lt;br /&gt;&lt;br /&gt;TCP 22068 AcidShiver.110&lt;br /&gt;&lt;br /&gt;TCP 22115 Cyn.120&lt;br /&gt;&lt;br /&gt;TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600&lt;br /&gt;&lt;br /&gt;TCP 22223 Rux.400, Rux.500, Rux.600&lt;br /&gt;&lt;br /&gt;TCP 22456 Bla.200, Bla.503&lt;br /&gt;&lt;br /&gt;TCP 22457 AcidShiver.120, Bla.200, Bla.503&lt;br /&gt;&lt;br /&gt;TCP 22784 Intruzzo.110&lt;br /&gt;&lt;br /&gt;TCP 22845 Breach.450&lt;br /&gt;&lt;br /&gt;TCP 22847 Breach.450&lt;br /&gt;&lt;br /&gt;TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100&lt;br /&gt;&lt;br /&gt;TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100&lt;br /&gt;&lt;br /&gt;TCP 23032 Amanda.200&lt;br /&gt;&lt;br /&gt;TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110&lt;br /&gt;&lt;br /&gt;TCP 23456 EvilFTP.100, VagrNocker.400&lt;br /&gt;&lt;br /&gt;TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155&lt;br /&gt;&lt;br /&gt;TCP 23477 DonaldDick.153&lt;br /&gt;&lt;br /&gt;TCP 24000 Infector.170&lt;br /&gt;&lt;br /&gt;TCP 24307 Wildek.020&lt;br /&gt;&lt;br /&gt;TCP 25386 MoonPie.220&lt;br /&gt;&lt;br /&gt;TCP 25486 MoonPie.220&lt;br /&gt;&lt;br /&gt;TCP 25555 FreddyK.100, FreddyK.200&lt;br /&gt;&lt;br /&gt;TCP 25556 FreddyK.100&lt;br /&gt;&lt;br /&gt;TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400&lt;br /&gt;&lt;br /&gt;TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400&lt;br /&gt;&lt;br /&gt;TCP 25982 MoonPie.135, MoonPie.200&lt;br /&gt;&lt;br /&gt;TCP 26274 Delta.050&lt;br /&gt;&lt;br /&gt;TCP 27160 MoonPie.135, MoonPie.200&lt;br /&gt;&lt;br /&gt;TCP 27184 Alvgus.100, Alvgus.800&lt;br /&gt;&lt;br /&gt;TCP 27374 Muerte.110, Subseven.210, SubSeven.213&lt;br /&gt;&lt;br /&gt;TCP 28429 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28430 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28431 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28432 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28433 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28434 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28435 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 28436 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400&lt;br /&gt;&lt;br /&gt;TCP 29891 Unexplained.100&lt;br /&gt;&lt;br /&gt;TCP 30000 Infector.170&lt;br /&gt;&lt;br /&gt;TCP 30001 Error32.100&lt;br /&gt;&lt;br /&gt;TCP 30003 LamersDeath.100&lt;br /&gt;&lt;br /&gt;TCP 30029 AOLTrojan.110&lt;br /&gt;&lt;br /&gt;TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131&lt;br /&gt;&lt;br /&gt;TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131&lt;br /&gt;&lt;br /&gt;TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131&lt;br /&gt;&lt;br /&gt;TCP 30103 NetSphere.131&lt;br /&gt;&lt;br /&gt;TCP 30947 Intruse.134&lt;br /&gt;&lt;br /&gt;TCP 31320 LittleWitch.400, LittleWitch.420&lt;br /&gt;&lt;br /&gt;TCP 31337 BackOrifice.120, Khaled.100, OPC.200&lt;br /&gt;&lt;br /&gt;TCP 31415 Lithium.101&lt;br /&gt;&lt;br /&gt;TCP 31416 Lithium.100, Lithium.101&lt;br /&gt;&lt;br /&gt;TCP 31557 Xanadu.110&lt;br /&gt;&lt;br /&gt;TCP 31631 CleptoManicos.100&lt;br /&gt;&lt;br /&gt;TCP 31745 Buschtrommel.100, Buschtrommel.122&lt;br /&gt;&lt;br /&gt;TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;TCP 31887 BDDT.100&lt;br /&gt;&lt;br /&gt;TCP 31889 BDDT.100&lt;br /&gt;&lt;br /&gt;TCP 32100 ProjectNext.053&lt;br /&gt;&lt;br /&gt;TCP 32418 AcidBattery.100&lt;br /&gt;&lt;br /&gt;TCP 32791 Akropolis.100, Rocks.100&lt;br /&gt;&lt;br /&gt;TCP 33291 RemoteHak.001&lt;br /&gt;&lt;br /&gt;TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214&lt;br /&gt;&lt;br /&gt;TCP 33577 SonOfPsychward.020&lt;br /&gt;&lt;br /&gt;TCP 34324 TelnetServer.100&lt;br /&gt;&lt;br /&gt;TCP 34763 Infector.180, Infector.190, Infector.200&lt;br /&gt;&lt;br /&gt;TCP 35000 Infector.190, Infector.200&lt;br /&gt;&lt;br /&gt;TCP 35600 Subsari.140&lt;br /&gt;&lt;br /&gt;TCP 36794 BugBear.100&lt;br /&gt;&lt;br /&gt;TCP 37237 Mantis.020&lt;br /&gt;&lt;br /&gt;TCP 37651 YAT.210&lt;br /&gt;&lt;br /&gt;TCP 37653 YAT.310&lt;br /&gt;&lt;br /&gt;TCP 40308 Subsari.140&lt;br /&gt;&lt;br /&gt;TCP 40412 TheSpy.100&lt;br /&gt;&lt;br /&gt;TCP 40421 MastersParadise.970&lt;br /&gt;&lt;br /&gt;TCP 40422 MastersParadise.970&lt;br /&gt;&lt;br /&gt;TCP 40999 DiemsMutter.110, DiemsMutter.140&lt;br /&gt;&lt;br /&gt;TCP 41626 Shah.100&lt;br /&gt;&lt;br /&gt;TCP 44444 Prosiak.070&lt;br /&gt;&lt;br /&gt;TCP 45673 Akropolis.100, Rocks.100&lt;br /&gt;&lt;br /&gt;TCP 47262 Delta.050&lt;br /&gt;&lt;br /&gt;TCP 48006 Fragglerock.200&lt;br /&gt;&lt;br /&gt;TCP 49683 HolzPferd.210&lt;br /&gt;&lt;br /&gt;TCP 50000 Infector.180&lt;br /&gt;&lt;br /&gt;TCP 50130 Enterprise.100&lt;br /&gt;&lt;br /&gt;TCP 50766 Fore.100&lt;br /&gt;&lt;br /&gt;TCP 51234 Cyn.210&lt;br /&gt;&lt;br /&gt;TCP 51966 Cafeini.080, Cafeini.110&lt;br /&gt;&lt;br /&gt;TCP 54321 PCInvader.010&lt;br /&gt;&lt;br /&gt;TCP 57341 NetRaider.100&lt;br /&gt;&lt;br /&gt;TCP 57922 Bionet.084&lt;br /&gt;&lt;br /&gt;TCP 58008 Tron.100&lt;br /&gt;&lt;br /&gt;TCP 58009 Tron.100&lt;br /&gt;&lt;br /&gt;TCP 59090 AcidReign.200&lt;br /&gt;&lt;br /&gt;TCP 59211 DuckToy.100, DuckToy.101&lt;br /&gt;&lt;br /&gt;TCP 59345 NewFuture.100&lt;br /&gt;&lt;br /&gt;TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101&lt;br /&gt;&lt;br /&gt;TCP 60411 Connection.100, Connection.130&lt;br /&gt;&lt;br /&gt;TCP 60412 Connection.130&lt;br /&gt;&lt;br /&gt;TCP 60552 RoxRat.100&lt;br /&gt;&lt;br /&gt;TCP 63536 InsaneNetwork.500&lt;br /&gt;&lt;br /&gt;TCP 63878 AphexFTP.100&lt;br /&gt;&lt;br /&gt;TCP 63879 AphexFTP.100&lt;br /&gt;&lt;br /&gt;TCP 64969 Lithium.100&lt;br /&gt;&lt;br /&gt;TCP 65000 Socket.100&lt;br /&gt;&lt;br /&gt;UDP 1 SocketsDeTroie.250&lt;br /&gt;&lt;br /&gt;UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820&lt;br /&gt;&lt;br /&gt;UDP 1130 Noknok.800, Noknok.820&lt;br /&gt;&lt;br /&gt;UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310&lt;br /&gt;&lt;br /&gt;UDP 2989 Rat.200&lt;br /&gt;&lt;br /&gt;UDP 3128 MastersParadise.970&lt;br /&gt;&lt;br /&gt;UDP 3129 MastersParadise.920, MastersParadise.970&lt;br /&gt;&lt;br /&gt;UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110&lt;br /&gt;&lt;br /&gt;UDP 3333 Daodan.123&lt;br /&gt;&lt;br /&gt;UDP 3800 Eclypse.100&lt;br /&gt;&lt;br /&gt;UDP 3996 RemoteAnything.364&lt;br /&gt;&lt;br /&gt;UDP 4000 RemoteAnything.364&lt;br /&gt;&lt;br /&gt;UDP 5555 Daodan.123&lt;br /&gt;&lt;br /&gt;UDP 5881 Y3KRat.110, Y3KRat.140&lt;br /&gt;&lt;br /&gt;UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;UDP 5883 Y3KRat.110, Y3KRat.140&lt;br /&gt;&lt;br /&gt;UDP 5884 Y3KRat.140, Y3KRat.150&lt;br /&gt;&lt;br /&gt;UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;UDP 5886 Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140&lt;br /&gt;&lt;br /&gt;UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150&lt;br /&gt;&lt;br /&gt;UDP 6953 Lithium.100&lt;br /&gt;&lt;br /&gt;UDP 8012 Ptakks.217&lt;br /&gt;&lt;br /&gt;UDP 10067 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;UDP 10167 PortalOfDoom.100&lt;br /&gt;&lt;br /&gt;UDP 10666 Ambush.100&lt;br /&gt;&lt;br /&gt;UDP 11225 Cyn.100, Cyn.103, Cyn.120&lt;br /&gt;&lt;br /&gt;UDP 11306 Noknok.800, Noknok.820&lt;br /&gt;&lt;br /&gt;UDP 12389 KheSanh.210&lt;br /&gt;&lt;br /&gt;UDP 12623 Buttman.090, Buttman.100&lt;br /&gt;&lt;br /&gt;UDP 12625 Buttman.100&lt;br /&gt;&lt;br /&gt;UDP 14100 Eurosol.100&lt;br /&gt;&lt;br /&gt;UDP 23476 DonaldDick.155&lt;br /&gt;&lt;br /&gt;UDP 26274 Delta.050&lt;br /&gt;&lt;br /&gt;UDP 27184 Alvgus.100&lt;br /&gt;&lt;br /&gt;UDP 28431 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 28432 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 28433 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 28434 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 28435 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 28436 Hack'a'Tack.2000&lt;br /&gt;&lt;br /&gt;UDP 29891 Unexplained.100&lt;br /&gt;&lt;br /&gt;UDP 30103 NetSphere.131&lt;br /&gt;&lt;br /&gt;UDP 31320 LittleWitch.400, LittleWitch.420&lt;br /&gt;&lt;br /&gt;UDP 31337 BackOrifice.120, OPC.200&lt;br /&gt;&lt;br /&gt;UDP 31416 Lithium.100, Lithium.101&lt;br /&gt;&lt;br /&gt;UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112&lt;br /&gt;&lt;br /&gt;UDP 33333 Blackharaz.100&lt;br /&gt;&lt;br /&gt;UDP 47262 Delta.050&lt;br /&gt;&lt;br /&gt;UDP 49683 HolzPferd.210&lt;br /&gt;&lt;br /&gt;UDP 60000 MiniBacklash.100&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/12/trojan-port.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-613869744154126101</guid><pubDate>Thu, 04 Dec 2008 08:07:00 +0000</pubDate><atom:updated>2008-12-04T00:57:08.379-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>WINDOWS XP HIDDEN APPS</title><description>To run any of these apps go to Start &gt; Run and type the executable name (ie charmap).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;WINDOWS XP HIDDEN APPS:&lt;br /&gt;&lt;br /&gt;=========================================&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1) Character Map = charmap.exe (very useful for finding unusual characters)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2) Disk Cleanup = cleanmgr.exe&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;3) Clipboard Viewer = clipbrd.exe (views contents of Windows clipboard)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4) Dr Watson = drwtsn32.exe (Troubleshooting tool)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;5) DirectX diagnosis = dxdiag.exe (Diagnose &amp; test DirectX, video &amp; sound cards)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;6) Private character editor = eudcedit.exe (allows creation or modification of characters)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;7) IExpress Wizard = iexpress.exe (Create self-extracting / self-installing package)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;8) Microsoft Synchronization Manager = mobsync.exe (appears to allow synchronization of files on the network for when working offline. Apparently undocumented).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;9) Windows Media Player 5.1 = mplay32.exe (Retro version of Media Player, very basic).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;10) ODBC Data Source Administrator = odbcad32.exe (something to do with databases)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;11) Object Packager = packager.exe (to do with packaging objects for insertion in files, appears to have comprehensive help files).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;12) System Monitor = perfmon.exe (very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance, for uber-geeks only )&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;13) Program Manager = progman.exe (Legacy Windows 3.x desktop shell).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;14) Remote Access phone book = rasphone.exe (documentation is virtually non-existant).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;15) Registry Editor = regedt32.exe [also regedit.exe] (for hacking the Windows Registry).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;16) Network shared folder wizard = shrpubw.exe (creates shared folders on network).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;17) File siganture verification tool = sigverif.exe&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;18) Volume Contro = sndvol32.exe (I've included this for those people that lose it from the System Notification area).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;19) System Configuration Editor = sysedit.exe (modify System.ini &amp; Win.ini just like in Win98! ).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;20) Syskey = syskey.exe (Secures XP Account database - use with care, it's virtually undocumented but it appears to encrypt all passwords, I'm not sure of the full implications).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;21) Microsoft Telnet Client = telnet.exe&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;22) Driver Verifier Manager = verifier.exe (seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;23) Windows for Workgroups Chat = winchat.exe (appears to be an old NT utility to allow chat sessions over a LAN, help files available).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;24) System configuration = msconfig.exe (can use to control starup programs)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;25) gpedit.msc used to manage group policies, and permissions&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/12/windows-xp-hidden-apps.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3365271513317513092</guid><pubDate>Wed, 03 Dec 2008 00:22:00 +0000</pubDate><atom:updated>2008-12-02T16:28:31.422-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Getting A 1gb Yahoo China Account</title><description>1. Sign for a yahoo ID... you can do this in my.yahoo.com. DO NOT check the automatically create an Email address&lt;br /&gt;2. Clear ALL cookies&lt;br /&gt;3. Activate mail account at cn.mail.yahoo.com&lt;br /&gt;(you get 100Mb storage first *don't worry*), then sign-out&lt;br /&gt;NOTE: FYI, the two boxes in the activation page is lastname and firstname&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;Upgrading to 1Gb Yahoo China Account&lt;br /&gt;1. Sign-in to Yahoo Messenger, add a contact, sign-out&lt;br /&gt;2. Go back to cn.mail.yahoo.com (all pages would be in Chinese)&lt;br /&gt;3. Click the 1G orange label (graphic) *look at the lower right of the page*&lt;br /&gt;4. Type-in your Yahoo ID and Password *look at the bottom of the page*&lt;br /&gt;5. You'll go to two more Chinese pages (Just click the bottom centered label in the page)&lt;br /&gt;6. Tadah!! Your upgraded to 1Gig and your default is English with Free POP3&lt;br /&gt;&lt;br /&gt;There's no pesky graphic or flash ads at the moment... but your email add would be username[at]yahoo.com.cn&lt;br /&gt;&lt;br /&gt;I think that's good enough for people without Gmail&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/12/getting-1gb-yahoo-china-account.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3928497248066392785</guid><pubDate>Fri, 28 Nov 2008 08:25:00 +0000</pubDate><atom:updated>2008-11-28T00:27:21.075-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>Overclocking_Tutorial</title><description>Overclocking takes on 3 forms:&lt;br /&gt;First, is the casual overclocking, easy, and anyone can do it.&lt;br /&gt;Second, is the right way to overclock, taking into account, everything.&lt;br /&gt;Third, if you want serious power, your gonna need to be savy to what does what.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;The casual overclocker gains about 5% increase, and really doesn't see any benefit from this, whilst it makes you feel good, no serious damage can be made, by upping the FSB a little, or changing your multiplier, only thing is, you want more.&lt;br /&gt;&lt;br /&gt;The correct way to overclock, is to start looking at your system, check the motherboard specs, PSU, amount of harddrives, CD ROMS etc. (high end systems, including the lastest graphic cards will need serious power).&lt;br /&gt;&lt;br /&gt;Lets take a base system like my old system setup:&lt;br /&gt;&lt;br /&gt;AMD XP1700+ ( Thoroughbred JIUHB DLT3C )&lt;br /&gt;Core Voltage = 1.50v&lt;br /&gt;Maximum Die Temp = 90c&lt;br /&gt;FSB = 266Mhz&lt;br /&gt;(factory unlocked)&lt;br /&gt;&lt;br /&gt;Jetway K266B KT266 chipset&lt;br /&gt;DDR + SDR RAM (not together)&lt;br /&gt;No onboard RAID&lt;br /&gt;&lt;br /&gt;DDR RAM = Dane Elec PC2700 DDR (333Mhz)&lt;br /&gt;Not registered&lt;br /&gt;&lt;br /&gt;2 Hard drvies&lt;br /&gt;1 CD Writer &amp; 1 DVD ROM drive&lt;br /&gt;&lt;br /&gt;2 LAN cards&lt;br /&gt;&lt;br /&gt;1 PCI soundcard&lt;br /&gt;(onboard sound turned off).&lt;br /&gt;&lt;br /&gt;Now, lets look at what they can do:&lt;br /&gt;The Thoroughbred is still the top processor for overclocking, Thunderbirds are just not upto it, even though they are capable of some really decent speeds, same as the Palamino, not to mention the Barton's (these are not what they have been made up to be).&lt;br /&gt;(for the purpose of space, I'll not go into unlocking your CPU)&lt;br /&gt;&lt;br /&gt;As you can see, my Thoroughbred has a core voltage of 1.5v, and as my motherboard is capable of giving my processor anything upto 1.85v, there is score for more there.&lt;br /&gt;The FSB on my motherboard is capable of a max of 200Mhz (this is the magic number).&lt;br /&gt;Die temps to a max of 90c is good (never been near it, yet!).&lt;br /&gt;&lt;br /&gt;Now, to work out your Mhz on your system, or to check your multiplier or FSB, there is a little calculation you'll need to remember, and it's easy:&lt;br /&gt;&lt;br /&gt;Your Mhz is worked out by your multiplier timed your FSB.&lt;br /&gt;example:&lt;br /&gt;&lt;br /&gt;CODE&lt;br /&gt;133x10 = 1.33Ghz&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Of course you can devide your Mhz with your known FSB to give you your multiplier etc.&lt;br /&gt;&lt;br /&gt;Now for easy, I have the results of my previous unlocking tests handy, so I'll use them, and not the current speeds etc.&lt;br /&gt;&lt;br /&gt;Standard Multiplier = 11.0&lt;br /&gt;Overclocked Multiplier = 12.0&lt;br /&gt;&lt;br /&gt;Standard Voltage = 1.50v&lt;br /&gt;Overclocked Voltage = 1.52v&lt;br /&gt;&lt;br /&gt;Standard FSB = 133Mhz&lt;br /&gt;Overclocked FSB = 136Mhz&lt;br /&gt;&lt;br /&gt;Standard Speed = 1467Mhz&lt;br /&gt;Overclocked Speed = 1630Mhz&lt;br /&gt;&lt;br /&gt;Standard Temps = CPU = 37c SYSTEM = 32c (idle) CPU = 44c SYSTEM = 36c (under load)&lt;br /&gt;Overclocked Temps = CPU = 34c SYSTEM = 29c (idle) CPU 40c SYSTEM 34c (under load)&lt;br /&gt;&lt;br /&gt;As you can see, the system is cooler when overclocked, this is due to having the correct cooling setup, and temps for it when it was standard, was standard cooling setup.&lt;br /&gt;&lt;br /&gt;Basically, all I have done, is raised the FSB by 3mhz, the voltage by 0.02v and the multiplier by 1.0, this has given me a 163Mhz increase without over strssing my system, but, here is where it gets teadious:&lt;br /&gt;&lt;br /&gt;To achieve this, it took me about a week, and this is how I did it:&lt;br /&gt;I started by lowering the multiplier to 5.0, from there I raised the FSB to its max (at the time, have latest BIOS update for mobo, allowing 200Mhz FSB), 166Mhz, this is the correct way of overclocking.&lt;br /&gt;From there, I started to raise the multiplier one by one, getting it back upto the standard multiplier or higher, checking the stability of the system each time.&lt;br /&gt;(currently I am way passed the 136Mhz FSB, as I am running PC2700 DDR).&lt;br /&gt;&lt;br /&gt;One thing to look at though, overclocking using the FSB WILL (unless your system allows you to specify it) mess with your PCI &amp; RAM speeds.&lt;br /&gt;Even raising it by 3Mhz can make your PCI cards to not work, and your RAM to get confused and crash your system.&lt;br /&gt;&lt;br /&gt;Now your thinking to yourself 'I can do that' and yes you can, anyone can, but.......&lt;br /&gt;It takes TIME, I can't stress that enough, if your going to try this, then you'll need to run your system for at least 6 hours between changing your multiplier, and as you can imagine, this can take a long time to do.&lt;br /&gt;&lt;br /&gt;For your information, I used Hot CPU Tester, SETI &amp; played Vietcong for testing purposes.&lt;br /&gt;&lt;br /&gt;Now, for the hard part:&lt;br /&gt;&lt;br /&gt;As most experienced overclockers will tell you, heat is your enemy, killing heat is your number 1 aim, don't worry about your speed at first, a 50Mhz increasde isn't gonna make your 3D Mark scream through the roof, actually, you'll probably not even get any better than what you did before.&lt;br /&gt;&lt;br /&gt;There are several ways of dispersing heat, and they are:&lt;br /&gt;&lt;br /&gt;Aircooling&lt;br /&gt;Pro's: Cheap, effective at lower speeds.&lt;br /&gt;Con's: Noisey, dust collectors, need maintanance.&lt;br /&gt;&lt;br /&gt;Watercooling:&lt;br /&gt;Pro's: Can lower your CPU by about 10c easily.&lt;br /&gt;Con's: It has water in it, expensive, hard for some to understand.&lt;br /&gt;&lt;br /&gt;Pelter:&lt;br /&gt;Pro's: With watercooling, it's the daddy&lt;br /&gt;Con's: ONLY EXPERIENCED PEOPLE NEED TO APPLY, very complicated, power hungry, NOT for the faint hearted. Stupidly expensive.&lt;br /&gt;&lt;br /&gt;Aircooling:&lt;br /&gt;Upgrading your CPU fan is the first step, there are several companies that offer aftermarket fans, which are better than the OEM fans are 2 a penny in todays world, but it's NOT just about your CPU fan, your system needs to breath, you need to get rid of 'hot spots' within your system.&lt;br /&gt;&lt;br /&gt;Watercooling:&lt;br /&gt;Its easier than most make out, its a good thing, kit prices can be got from about �120 ($200 US), just make sure they are upgradable, as you might want to add, a Northbridge water block &amp; a GPU water block.&lt;br /&gt;Modern day kits &amp; parts are idiot proof, and will not leak, unless you act like Noah.&lt;br /&gt;&lt;br /&gt;Pelter:&lt;br /&gt;Pelter cooling is DANGEROUS, minly for your system, fitting it incorrectly, and you could end up with not only a baked CPU but a system that will end up as a very expensive paperweight.&lt;br /&gt;Ask your local overclocking expert for more info.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Basically, if you can get hold of a decent Thoroughbred cored XP, your in luck (just like me), if its unlocked, then your in business, obviously, its not just down to your CPU, your motherboard and RAM will denote whether you can overclock big style or not.&lt;br /&gt;I'd advise ANYONE thinking of overclocking, to research into it more, weigh up the odds on what they want or need, if your on a buget, DON'T attempt it, things can and do go wrong.&lt;br /&gt;Most of the time, its not about 'mines faster than yours' or massive speed increases, its done by most, cause it can be. 90% of the time, you'd be better off buying a new CPU (as prices are so low), but if you get the urge, then a new world awaits you&lt;br /&gt;&lt;br /&gt;great tutorial. this should help the OC noobs. If I can add something like you said know your specs of the mobo....and if you are serious about OC'ing dont go and get some generic NO-NAME ram and some ghetto mobo. to get the best stability go with ASUS and ABIT for the mobo and Crucial, Kingston, mushkin for the ram. A great forum for OC'ing is amdmb.com.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Indeed, if you are serious about your overclocking, its advised you only use serious brand names.&lt;br /&gt;Generic parts are always a lower spec, and can easily destroy themselves with even a little stress aimed towards them.&lt;br /&gt;&lt;br /&gt;Memory advice, use the folloing:&lt;br /&gt;&lt;br /&gt;Kingston (added because of reviews, personally, I'm not sure about them).&lt;br /&gt;Crucial (for Dual Channel DDR ONLY)&lt;br /&gt;OCZ&lt;br /&gt;Mushkin&lt;br /&gt;Corsair&lt;br /&gt;PNY (for EEC rated)&lt;br /&gt;Samsung&lt;br /&gt;Geil (my choice, when I can afford it)&lt;br /&gt;&lt;br /&gt;Motherbord advice, use the following:&lt;br /&gt;&lt;br /&gt;Asus A7N8X Deluxe nForce2&lt;br /&gt;Asus A7N8X-VM nForce2&lt;br /&gt;Asus A7N8X-X nForce2&lt;br /&gt;Abit KD7-S KT400&lt;br /&gt;Abit KV7 KT600&lt;br /&gt;Abit NF7 v2.0 nForce2&lt;br /&gt;Abit NF7-S v2.0 nForce2&lt;br /&gt;MSI K7N2 Delta-L Nforce2&lt;br /&gt;MSI KT6 Delta-LSR KT600&lt;br /&gt;Epox 8RDA+ nForce2&lt;br /&gt;Epox 8RGA+ nForce2&lt;br /&gt;&lt;br /&gt;Any nForce2 motherboard would be best, they allow more score for overclocking your system.&lt;br /&gt;_________________&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/overclockingtutorial_28.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-4535462896024961700</guid><pubDate>Fri, 28 Nov 2008 08:22:00 +0000</pubDate><atom:updated>2008-11-28T00:24:17.798-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe PRoGRaM</category><title>How to make key generators?</title><description>Introduction&lt;br /&gt;------------&lt;br /&gt;I take no responsibility of the usage of this information.&lt;br /&gt;This tutorial, is for educational knowledge ONLY.&lt;br /&gt;Hi there, in this tutorial, I intend to teach you how to make a pretty&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;simple keygen, of a program called W3Filer 32 V1.1.3.&lt;br /&gt;W3Filer is a pretty good web downloader...&lt;br /&gt;I guess some of you might know the program.&lt;br /&gt;I`ll assume you know:&lt;br /&gt;A.How to use debugger (in this case, SoftIce).&lt;br /&gt;B.How to crack, generally (finding protection routines,patching them,etc...).&lt;br /&gt;C.How to use Disassembler (This knowledge can help).&lt;br /&gt;D.Assembly.&lt;br /&gt;E.How to code in Turbo Pascal �.&lt;br /&gt;Tools you`ll need:&lt;br /&gt;A.SoftIce 3.00/01 or newer.&lt;br /&gt;C.The program W3Filer V1.13 (if not provided in this package), can be found in&lt;br /&gt;www.windows95.com I believe.&lt;br /&gt;D.Turbo Pascal (ANY version).&lt;br /&gt;Well, enough blah blah, let's go cracking...&lt;br /&gt;Run W3Filer 32.&lt;br /&gt;A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,&lt;br /&gt;We notice this program has some kind of serial number (Mine is 873977046),&lt;br /&gt;Let's keep the serial in mind, I bet we`ll meet it again while we're on&lt;br /&gt;the debugger.&lt;br /&gt;Well, now, let's put your name and a dummy reg code...&lt;br /&gt;set a BP on GetDlgItemTextA, and, press OK.&lt;br /&gt;We pop inside GetDlgItemTextA, Lets find the registration routine...&lt;br /&gt;I`ll save you the work, the registration routine is this:&lt;br /&gt;:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]&lt;br /&gt;:00404DB8 52 push edx ---&gt; Your user name here.&lt;br /&gt;:00404DB9 E80B550000 call 0040A2C9 ---&gt; Registration routine.&lt;br /&gt;:00404DBE 83C408 add esp, 00000008 ---&gt; Dunno exactly what is it.&lt;br /&gt;:00404DC1 85C0 test eax, eax ---&gt; Boolean identifier, 0 if&lt;br /&gt;:00404DC3 7D17 jge 00404DDC ---&gt; registration failed, 1 if&lt;br /&gt;OK.&lt;br /&gt;Well, Let's enter the CALL 40A2C9, and see what's inside it:&lt;br /&gt;(Please read my comments in the code).&lt;br /&gt;* Referenced by a CALL at Addresses:&lt;br /&gt;|:00404DB9 , :00407F76&lt;br /&gt;|&lt;br /&gt;:0040A2C9 55 push ebp&lt;br /&gt;:0040A2CA 8BEC mov ebp, esp&lt;br /&gt;:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0&lt;br /&gt;:0040A2D2 53 push ebx&lt;br /&gt;:0040A2D3 56 push esi&lt;br /&gt;:0040A2D4 57 push edi&lt;br /&gt;:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]&lt;br /&gt;:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]&lt;br /&gt;:0040A2DE 33C0 xor eax, eax&lt;br /&gt;:0040A2E0 EB16 jmp 0040A2F8&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A2FB�&lt;br /&gt;|&lt;br /&gt;:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----&gt; Here Starts the&lt;br /&gt;interesting part.&lt;br /&gt;:0040A2E5 83F920 cmp ecx, 00000020 ----&gt; ECX is the the current&lt;br /&gt;char in the user name, Hmm, 20h=' '...&lt;br /&gt;:0040A2E8 740D je 0040A2F7 ----&gt; Let's see,&lt;br /&gt;:0040A2EA 8A0A mov cl, byte ptr [edx] ----&gt; Generally, all this loop&lt;br /&gt;does, is copying&lt;br /&gt;the user name from&lt;br /&gt;[EDX], to [ESI], WITHOUT the spaces!&lt;br /&gt;(Keep this in mind! ).&lt;br /&gt;:0040A2EC 880C06 mov byte ptr [esi+eax], cl&lt;br /&gt;:0040A2EF 42 inc edx&lt;br /&gt;:0040A2F0 40 inc eax&lt;br /&gt;:0040A2F1 C6040600 mov byte ptr [esi+eax], 00&lt;br /&gt;:0040A2F5 EB01 jmp 0040A2F8&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A2E8�&lt;br /&gt;|&lt;br /&gt;:0040A2F7 42 inc edx&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Addresses:&lt;br /&gt;|:0040A2E0(U), :0040A2F5(U)&lt;br /&gt;|&lt;br /&gt;:0040A2F8 803A00 cmp byte ptr [edx], 00&lt;br /&gt;:0040A2FB 75E5 jne 0040A2E2 ----------------&gt; This is the loop , we got&lt;br /&gt;what it does,&lt;br /&gt;Let's continue tracing&lt;br /&gt;the code...&lt;br /&gt;:0040A2FD 56 push esi --------&gt; The user name is pushed, in order&lt;br /&gt;to&lt;br /&gt;Upcase it's chars.&lt;br /&gt;* Reference To: USER32.CharUpperA, Ord:0000h&lt;br /&gt;|&lt;br /&gt;:0040A2FE E80F330000 Call User!CharUpper ---&gt; After this, our name is in&lt;br /&gt;upper case.&lt;br /&gt;:0040A303 56 push esi -----&gt; Our name in upper case here.&lt;br /&gt;* Reference To: cw3220mt._strlen, Ord:0000h&lt;br /&gt;|&lt;br /&gt;:0040A304 E86F300000 Call 0040D378 ---&gt; This is the length of our name.&lt;br /&gt;:0040A309 59 pop ecx&lt;br /&gt;:0040A30A 8BC8 mov ecx, eax ---&gt; ECX=Length.&lt;br /&gt;:0040A30C 83F904 cmp ecx, 00000004 ---&gt; Length&gt;=4 (MUST).&lt;br /&gt;:0040A30F 7D05 jge 0040A316 ---&gt; Let's go to this address...&lt;br /&gt;:0040A311 83C8FF or eax, FFFFFFFF&lt;br /&gt;:0040A314 EB67 jmp 0040A37D&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A30F�&lt;br /&gt;|&lt;br /&gt;:0040A316 33D2 xor edx, edx&lt;br /&gt;:0040A318 33C0 xor eax, eax&lt;br /&gt;:0040A31A 3BC8 cmp ecx, eax&lt;br /&gt;:0040A31C 7E17 jle 0040A335 ---&gt; (Not important, just another useless&lt;br /&gt;checking).&lt;br /&gt;===================================================================================&lt;br /&gt;============ FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION ==================&lt;br /&gt;===================================================================================&lt;br /&gt;One thing before we continue, EDX = 00000000h as we enter to the next instructions.&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A333�&lt;br /&gt;|&lt;br /&gt;:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---&gt; EBX &lt;--- char in user&lt;br /&gt;name, offset EAX.&lt;br /&gt;:0040A322 C1E303 shl ebx, 03 -----&gt; Hmm, it shl's the char by 03h...&lt;br /&gt;(Remember that).&lt;br /&gt;:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---&gt; Now EDI &lt;--- Char in&lt;br /&gt;user name , offset EAX.&lt;br /&gt;:0040A329 0FAFF8 imul edi, eax -----&gt; It multiplies the char by the&lt;br /&gt;offset in user name! (Remember that).&lt;br /&gt;:0040A32C 03DF add ebx, edi -----&gt; Adds the result to EBX (That was&lt;br /&gt;Shelled (Ding Dong =)).&lt;br /&gt;:0040A32E 03D3 add edx, ebx -----&gt; EDX=EDX+EBX!!! - This is the CORE&lt;br /&gt;of this registration routine!!!&lt;br /&gt;:0040A330 40 inc eax -----&gt; Increase EAX by one (next char).&lt;br /&gt;:0040A331 3BC8 cmp ecx, eax&lt;br /&gt;:0040A333 7FE9 jg 0040A31E ----&gt; If ECX&lt;EAX then, we leave the&lt;br /&gt;loop.&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A31C�&lt;br /&gt;|&lt;br /&gt;:0040A335 A120674100 mov eax, dword ptr [00416720] ---&gt; HMMMMMM, What's in&lt;br /&gt;here?????&lt;br /&gt;:0040A33A C1F803 sar eax, 03 ---------&gt; WAIT! Please type in SIce '?&lt;br /&gt;EAX'&lt;br /&gt;Does this number in EAX look&lt;br /&gt;familiar to us? ;-)&lt;br /&gt;If you still don`t understand,&lt;br /&gt;than, It's&lt;br /&gt;our SERIAL NUMBER! (PLEASE, take&lt;br /&gt;your time, and check by&lt;br /&gt;yourself - don`t trust me!). OK,&lt;br /&gt;so now we know,&lt;br /&gt;That it SHR's EAX by 03 (SAR is&lt;br /&gt;almost identical to SHR).&lt;br /&gt;:0040A33D 03D0 add edx, eax ---------&gt; Hmm, it adds the result from the&lt;br /&gt;loop, the serial number shr'd by 03h&lt;br /&gt;:0040A33F 52 push edx -------&gt; Let's continue. (At this point, I&lt;br /&gt;can tell you , the reg number, is&lt;br /&gt;in EDX - only that the reg number&lt;br /&gt;is in HEX --&gt; That's how you enter it).&lt;br /&gt;* Possible StringData Ref from Data Obj -&gt;"%lx"&lt;br /&gt;|&lt;br /&gt;:0040A340 685EF54000 push 0040F55E&lt;br /&gt;:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]&lt;br /&gt;:0040A34B 52 push edx&lt;br /&gt;* Reference To: USER32.wsprintfA, Ord:0000h&lt;br /&gt;|&lt;br /&gt;:0040A34C E8E5320000 Call 0040D636 -------&gt; This one, does HEX2STR (Takes&lt;br /&gt;the value from EDX, and turns it to an hex string).&lt;br /&gt;:0040A351 83C40C add esp, 0000000C&lt;br /&gt;:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----&gt; type 'd ecx' -&lt;br /&gt;THIS is the reg number! That's enough for us, the rest of&lt;br /&gt;the code, is&lt;br /&gt;just for comparing the correct reg code with ours.&lt;br /&gt;:0040A35A 51 push ecx&lt;br /&gt;* Reference To: USER32.CharLowerA, Ord:0000h&lt;br /&gt;|&lt;br /&gt;:0040A35B E8B8320000 Call 0040D618&lt;br /&gt;:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]&lt;br /&gt;:0040A366 50 push eax&lt;br /&gt;:0040A367 FF750C push [ebp+0C]&lt;br /&gt;* Reference To: cw3220mt._strcmp, Ord:0000h&lt;br /&gt;|&lt;br /&gt;:0040A36A E875300000 Call 0040D3E4&lt;br /&gt;:0040A36F 83C408 add esp, 00000008&lt;br /&gt;:0040A372 85C0 test eax, eax&lt;br /&gt;:0040A374 7405 je 0040A37B&lt;br /&gt;:0040A376 83C8FF or eax, FFFFFFFF&lt;br /&gt;:0040A379 EB02 jmp 0040A37D&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Address:&lt;br /&gt;|:0040A374�&lt;br /&gt;|&lt;br /&gt;:0040A37B 33C0 xor eax, eax&lt;br /&gt;* Referenced by a (U)nconditional or �onditional Jump at Addresses:&lt;br /&gt;|:0040A314(U), :0040A379(U)&lt;br /&gt;|&lt;br /&gt;:0040A37D 5F pop edi&lt;br /&gt;:0040A37E 5E pop esi&lt;br /&gt;:0040A37F 5B pop ebx&lt;br /&gt;:0040A380 8BE5 mov esp, ebp&lt;br /&gt;:0040A382 5D pop ebp&lt;br /&gt;:0040A383 C3 ret&lt;br /&gt;Making the actual Keygen&lt;br /&gt;~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;Now, after I've explained how does the program calculate the registration&lt;br /&gt;code, you can either write your own keymaker, without looking at my code, or&lt;br /&gt;look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).&lt;br /&gt;That's it, here's the source of my keygen:&lt;br /&gt;------------------- Cut here ---------------------------------------------&lt;br /&gt;Program W3FilerKeygen;&lt;br /&gt;var&lt;br /&gt;Key,SerialNum,EB,ED,digit:Longint;&lt;br /&gt;I,x:Byte;&lt;br /&gt;Name,KeyHex:String;&lt;br /&gt;begin&lt;br /&gt;Writeln(' W3Filer32 V1.1.3 Keymaker');&lt;br /&gt;writeln('Cracked by ^pain^ ''97 / Rebels!');&lt;br /&gt;Write('Your Name:'); { Read the name }&lt;br /&gt;readln(Name);&lt;br /&gt;Write('Serial Number:');&lt;br /&gt;readln(SerialNum); {Yes, we need the serial number for the calculation!}&lt;br /&gt;Key:=0;&lt;br /&gt;x:=0;&lt;br /&gt;For I:=1 to length(Name) do&lt;br /&gt;begin&lt;br /&gt;Name[I]:=upcase(Name[i]);&lt;br /&gt;If Name[I]&lt;&gt;' ' then begin&lt;br /&gt;eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}&lt;br /&gt;Ed:=ord(Name[I]); {ED = Name[I]}&lt;br /&gt;ed:=ed*(x); {ED=ED*Offset}&lt;br /&gt;inc(x);&lt;br /&gt;eb:=eb+ed; {Add ED to EB}&lt;br /&gt;Key:=Key+EB; {Add EB to KEY}&lt;br /&gt;end;&lt;br /&gt;end;&lt;br /&gt;Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}&lt;br /&gt;{ From here, this is just HEX2STRING --&gt; I`m quite sure it's&lt;br /&gt;Self explaintory, else - go and learn number bases again! ;-)}&lt;br /&gt;KeyHex:='';&lt;br /&gt;repeat&lt;br /&gt;digit:=Key mod 16;&lt;br /&gt;key:=key div 16;&lt;br /&gt;If digit&lt;10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;&lt;br /&gt;If digit&gt;10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;&lt;br /&gt;until key=0;&lt;br /&gt;writeln('Your Key:',KeyHex);&lt;br /&gt;writeln(' Enjoy!');&lt;br /&gt;end.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-make-key-generators.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-4211726053081398887</guid><pubDate>Fri, 28 Nov 2008 08:10:00 +0000</pubDate><atom:updated>2008-11-28T00:21:59.245-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe PRoGRaM</category><title>REVERSE CODING</title><description>Welcome to my Reverse Coding tutorial! In this paper, you will&lt;br /&gt;learn how to crack and modify your own software. I'll try to get&lt;br /&gt;into as much detail as possible, yet also dumb it down a bit. =)&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;------------------------------------------------------------------------------------------------------&lt;br /&gt;---Disclaimer------------&lt;br /&gt;&lt;br /&gt;All information is purely for educational purposes only! The author&lt;br /&gt;cannot be held responsible for any (ab)use of this information.&lt;br /&gt;USE AT YOUR OWN RISK!!!&lt;br /&gt;------------------------------------------------------------------------------------------------------&lt;br /&gt;---Hexadecimal----------&lt;br /&gt;&lt;br /&gt;To begin, I'm going to teach you about hexadecimal, so if you already&lt;br /&gt;know it, then move on. Even if you do already know it, I suggest&lt;br /&gt;sticking around for a refreshment of your memory.=)&lt;br /&gt;&lt;br /&gt;Hexadecimal, or hex as it's more commonly known, is a base 16&lt;br /&gt;numbering system. Base 16 meaning that it consists of 16 numbers:&lt;br /&gt;0-9 and A-F. Each of these numbers (A-F=10-16) have a value of 4 bits&lt;br /&gt;and are also called nibbles. In representing a hexadecimal number, one&lt;br /&gt;would write an "0x" before the actual bit set. 0x is simply a tag put&lt;br /&gt;before a hex number to let programmers know that it is in fact, hex.&lt;br /&gt;When writing hex, you will not need to use this prefix.&lt;br /&gt;&lt;br /&gt;If you haven't already noticed, the 0x prefix looks similar to that of exponential&lt;br /&gt;notation. Actually this is where 0x has been derived, seeing as how&lt;br /&gt;hex is simply a number that has been raised to a power of 16.&lt;br /&gt;This means 10 in hexadecimal represents the value 16+0, or 16. So check&lt;br /&gt;out this example:&lt;br /&gt;&lt;br /&gt;0xB3 (hex)= 2*16(squared)+11*16(to the 1st power)+3*16(to the power of 0 )&lt;br /&gt;=2*256+11*16+3=691 (decimal)&lt;br /&gt;&lt;br /&gt;Yeah, you could do all of that, or you could be lazy and use an automated&lt;br /&gt;program that does it all for you. Why do you need to know hex? Because&lt;br /&gt;it's used by every piece of software and hardware. How? Memory based address&lt;br /&gt;allocation. Here's an example:&lt;br /&gt;&lt;br /&gt;When you clicked on your browsers icon to launch it, the click triggered a "call"&lt;br /&gt;(an asm function that will be discussed more in depth in later chapters.) which&lt;br /&gt;went back to the programs memory with the "click in it's hand." It finds the&lt;br /&gt;address where the code is that makes the program launch and executes it. The&lt;br /&gt;address is written in, you guessed it, hex. An example of an address would be&lt;br /&gt;something like this:&lt;br /&gt;&lt;br /&gt;101c5018&lt;br /&gt;&lt;br /&gt;5108 would be the actual specific address and 101c would be the sector&lt;br /&gt;of RAM were the address is located. Those are the basics of Hexadecimal&lt;br /&gt;You should probley read this chapter againbecause getting a firm grasp on hex&lt;br /&gt;is essential to cracking and moding programs.&lt;br /&gt;----------------------------------------------------------------------------------------------------------&lt;br /&gt;---RAM and ROM--------&lt;br /&gt;&lt;br /&gt;In this section we are gonna learn about RAM and ROM. Many people kno about&lt;br /&gt;the hardware part of RAM and ROM and that's gonna be very useful to you......&lt;br /&gt;just not in this tutorial. =) We are about to learn about the "software" side. I use the&lt;br /&gt;term software loosly in that software tends to have a GUI (Graphical User Interface)&lt;br /&gt;and this does not. BUT, there are ways to access and modify the behavior of it that&lt;br /&gt;I will talk about in this chapter, as well as in the next. To start off, I'll answer some&lt;br /&gt;common questions:&lt;br /&gt;&lt;br /&gt;What is RAM?&lt;br /&gt;&lt;br /&gt;RAM (Random Access Memory) is basically memory and the process of accessing it.&lt;br /&gt;The term "Random Access Memory" was approprietly given to this memory unit because&lt;br /&gt;when executing a command, the CPU doesn't have to scroll through all the memory on&lt;br /&gt;your PC until it finds the right address. It "randomly" whips out the addy from it's back&lt;br /&gt;pocket and serves it up.This process is both quick and efficient. Learning this process&lt;br /&gt;will help you understand the ASM functions in the next chapter.&lt;br /&gt;&lt;br /&gt;How does RAM work?&lt;br /&gt;&lt;br /&gt;When a command is issued and the memory is pulled from file, it must first go through&lt;br /&gt;what is called a "vector". A vector is a "gateway" or a "sector" of RAM where the address&lt;br /&gt;of the function is stored with others of it's own kind. An example of a vector would be&lt;br /&gt;something like this:&lt;br /&gt;&lt;br /&gt;8c0000b4-8c00ffff&lt;br /&gt;&lt;br /&gt;This means that all "addressii" (hehe) that are between those values are stored in that&lt;br /&gt;sector of RAM. A vector acts as a gateway in that, first, pass through a vector to get to&lt;br /&gt;address. Your average program probley has about 30 to 40 main vectors, sectioning&lt;br /&gt;off from boot until exit. Knowing the vector of an addy or a function will greatly reduce&lt;br /&gt;your headache when you start searching for it.&lt;br /&gt;&lt;br /&gt;ROM. ROM is a part of memory that doesn't change. (Although we can change it.=) )&lt;br /&gt;Boot ROM for instance, follows the same plan of action it is called upon. ROM also has&lt;br /&gt;vectors, just like RAM. ROM is not that important when it comes to cracking to we will&lt;br /&gt;leave it alone for now.&lt;br /&gt;&lt;br /&gt;Back to RAM. Believe it or not, but addressii (there I go again, I'm such a g33k.)&lt;br /&gt;actually follow certain formats or syntax's for certain functions. Take hot keys for&lt;br /&gt;example: In the under ground, we call them "Joker commands". By pressing a certain&lt;br /&gt;combonation of keys, a program will run, close, be stupid, whatever. The syntax for a&lt;br /&gt;Joker command is as follows:&lt;br /&gt;&lt;br /&gt;0d-aaaaaf&lt;br /&gt;000zvvvv&lt;br /&gt;&lt;br /&gt;Let's examine this format a little closer.&lt;br /&gt;&lt;br /&gt;0d= The proclemation of a specifyed format&lt;br /&gt;&lt;br /&gt;aaaaa= The address of the function&lt;br /&gt;&lt;br /&gt;f= The float or remainder; "Floating point number" ; decimal&lt;br /&gt;&lt;br /&gt;000= "NOP" No operation&lt;br /&gt;&lt;br /&gt;z= The "Booleon" as we the C++ programmers call it. A booleon is an "IF, THEN" statement.&lt;br /&gt;"IF this is true, THEN do this." Value 0= equal; 1= different; 2=less than; 3=greater than.&lt;br /&gt;&lt;br /&gt;vvvv= The combonation of hex values (The values of the keys pressed) used to execute the "CALL"&lt;br /&gt;&lt;br /&gt;Say the "A" key had a vlaue of fffb and the "B" key has a vlaue of fffd. You would then add both&lt;br /&gt;values using a hex calculator and get fff9 as the sum. The output on you calculator would&lt;br /&gt;show 1fff8. Add the first value and the last value to find the fourth byte segment. So say&lt;br /&gt;we've found the address of the Joker function (usually in the boot ROM sector) commonly&lt;br /&gt;called the "Maple address" and we are ready to program in some hex code. Our code may&lt;br /&gt;look like this:&lt;br /&gt;&lt;br /&gt;0d7ae671&lt;br /&gt;0000fff9&lt;br /&gt;&lt;br /&gt;This means that IF the value of fff9 (A and B) is equal (0) to the address (aaaaf) of the function,&lt;br /&gt;THEN execute it. See? Easy isn't it? You'll need to know things like this when modding programs&lt;br /&gt;as a use of executing of your arbitrary code in certain parts of your program at a certain time.&lt;br /&gt;Joker commands are also reversable in that if you enter the same code except with a 1,2, or 3,&lt;br /&gt;in the z slot and by changing the button combonations. Reversable meaning terminating the&lt;br /&gt;function or other functions that were started. A good use for this is for firewalls and babysitting&lt;br /&gt;programs. Are you on a college machine and can't download stuff because of that pesky firewall?&lt;br /&gt;Crack it open and program in some Joker commands so you can turn it on and off at will&lt;br /&gt;WITHOUT the administrator's password!&lt;br /&gt;--------------------------------------------------------------------------------------------------------------&lt;br /&gt;---ASM-----------------------&lt;br /&gt;&lt;br /&gt;To start off with our small and to the point ASM section, I'll warn you in advance, after reading this,&lt;br /&gt;you'll need to go take a shower cause this is disgusting! Here we go!&lt;br /&gt;&lt;br /&gt;To begin, I'm gonna define for you some functions that you'll be seeing alot of, and be using. Here they are:&lt;br /&gt;&lt;br /&gt;.:Hex:. .:ASM:. .:MEANING:.&lt;br /&gt;&lt;br /&gt;75,0f85 jne jump if not equal&lt;br /&gt;74,0f84 je jump is equal&lt;br /&gt;eb jmp jump directly to&lt;br /&gt;90 nop no operation&lt;br /&gt;77,0f87 ja jump if above&lt;br /&gt;0f86 jna jump if not above&lt;br /&gt;0f83 jae jump if above or equal to&lt;br /&gt;0f82 jnae jump if not above or equal&lt;br /&gt;0f82 jb jump if below&lt;br /&gt;0f83 jnb jump is not below&lt;br /&gt;of86 jbe jump if below or equal&lt;br /&gt;0f87 jnbe jump if not below or equal&lt;br /&gt;0f8f jg jump if greater&lt;br /&gt;0f8e jng jump if not greater&lt;br /&gt;0f8d jge jump if greater or equal&lt;br /&gt;0f8c jnge jump if not greater or equal&lt;br /&gt;0f8c jl jump if less&lt;br /&gt;0f8d jnl jump if not less&lt;br /&gt;0f8e jle jump if less or equal&lt;br /&gt;0f8f jnle jump if not less or equal&lt;br /&gt;&lt;br /&gt;The easy thing about most of the functions in ASM are that they sound like what they mean.&lt;br /&gt;Jump, means of coarse, to Jump from one thing to another. Example:&lt;br /&gt;&lt;br /&gt;"jmp 00401744" would mean to jump directly to the address 00401744 once the code&lt;br /&gt;hits the function.&lt;br /&gt;&lt;br /&gt;Let's look at "CALL". Call is a function that is used to "call" a certain task, string, address, whatever.&lt;br /&gt;Take a look at this example:&lt;br /&gt;&lt;br /&gt;"Call 0040ccc2" this would of coarse call the address 0040ccc2 and use it. Those are the functions&lt;br /&gt;you'll be using.&lt;br /&gt;&lt;br /&gt;The reason why I'm not going into loads of detail in this chapter is because when&lt;br /&gt;cracking software, not an extensive amount of knowledge of ASM is needed. If you want&lt;br /&gt;to know more or need help with something, e-mail me at the address provided at the end of&lt;br /&gt;this tutorial. This chapter wasn't so nasty was it? Nah, it was easy =)&lt;br /&gt;------------------------------------------------------------------------------------------------------------------------&lt;br /&gt;---Needed Programs----------------&lt;br /&gt;&lt;br /&gt;The programs you will need are as follows:&lt;br /&gt;&lt;br /&gt;WDasm 8.9 or Higher&lt;br /&gt;Hiew 6.1&lt;br /&gt;Softice for win9x v3.24&lt;br /&gt;SubmitWolf(demo)v4.01 (http://www.trellian.com/swolf)&lt;br /&gt;Programming Language (C,C++,Pascal,ASM whatever you would like) Prefably C for this tutorial!&lt;br /&gt;And a brain (no seriously)&lt;br /&gt;--------------------------------------------------------------------------------------------------------------------------&lt;br /&gt;---Cracking-----------------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ok, here we go! The first thing you need to do is to open up SoftIce and then swolf32.exe which is the name given to our&lt;br /&gt;target program. Go to the help menu and select register. Here's where your brain will come in, start to look&lt;br /&gt;for how the protection is running by entering some random crap into the blank space. Don't press the OK button yet though.&lt;br /&gt;Instead, press CTRL-D to bring up SoftIce. What we are gonna try to do is define a breakpoint, using BPX hmemcpy.&lt;br /&gt;Hit CTRL-D again and it will bring you back to the program. Click OK on the box and SoftIce will again pop up. Now press F12&lt;br /&gt;and it will bring you to the target program code. Scroll down a few lines and find:&lt;br /&gt;&lt;br /&gt;:004167D9 8D4C2410 lea ecx, dword ptr {esp+10}--;ecx=the random crap you typed in.&lt;br /&gt;:004167DD 8D94290000000 lea edx, dword ptr {esp+00000090}-;edx=name&lt;br /&gt;:004167E4 51 push ecx&lt;br /&gt;:004167E5 52 push edx&lt;br /&gt;:004167E6 E8B5450100 call 0042ADA0----;this is the call which calculates the serial&lt;br /&gt;:004167EB 83C410 add esp, 00000010--;&lt;br /&gt;:004167EE 85C0 test eax, eax----;and return eax=1 if true (booleon =) )&lt;br /&gt;:004167F0 0F8596000000 jne 0041688C----;jump to registered&lt;br /&gt;:004167F6 8D442408 lea eax, dword ptr {esp+08}&lt;br /&gt;:004167FA 8D8C2488000000 lea ecx, dword ptr {esp+00000088}&lt;br /&gt;:00416801 50 push eax&lt;br /&gt;:00416802 51 push ecx&lt;br /&gt;:00416803 E868470100 call 0042AF70----;this call tests our serial&lt;br /&gt;:00416808 83C408 add esp, 00000008---;&lt;br /&gt;:0041680B 85C0 test eax, eax----;for v3.XX one.&lt;br /&gt;:0041680D 7433 je 00416842;jump is equal&lt;br /&gt;&lt;br /&gt;The call that we want to focas on is at 004167E6. This call tests wether our serial is for the correct version or not.&lt;br /&gt;Let's trace the call 004ADA0:&lt;br /&gt;&lt;br /&gt;*Referenced by a CALL at address:&lt;br /&gt;:0042ABFC&lt;br /&gt;:0042ADA 83EC30 sub esp, 00000030&lt;br /&gt;:0042ADA3 55 push ebp&lt;br /&gt;:0042ASA4 56 push esi&lt;br /&gt;:004ADA5 57 push edi&lt;br /&gt;:0042ADA6 8B7C24444 mov edi, dword ptr {esp+44}--;edi=our fake serial&lt;br /&gt;:004ADAA 85FF test edi, edi&lt;br /&gt;:004ADAC 0F4A7010000 je 0042AF59----;die if empty&lt;br /&gt;:004ADB2 8B6C2440 mov ebp, dword ptr {esp+40}--ebp=our name&lt;br /&gt;:0042ADB6 85ED test ebp, ebp&lt;br /&gt;:004ADB8 0F849B010000 je 0042AF59---;die if empty&lt;br /&gt;:004ADBE 8A07 mov al, byte ptr {edi}--;compare 1st byte of serial with 'p', die&lt;br /&gt;:0042ADC0 3C50 cmp al, 50----;&lt;br /&gt;:0042ADC2 0F8587010000 jne 0042AF4F----;if not equal&lt;br /&gt;:0042ADC8 807F0134 cmp byte ptr {edi+01}, 34--:compare byte of serial with '4'&lt;br /&gt;:004ADCC 750C jne 0042ADDA----;&lt;br /&gt;:0042ADCE C70500C8430000000000 mov dword ptr {0043C800}, 00000000&lt;br /&gt;:0042ADD8 EB1C jmp 0042ADF6&lt;br /&gt;&lt;br /&gt;As we can see by the above, the code tells us that the first value of our serial will&lt;br /&gt;be 'p' and a cycle of a four byte algorythm. I could go on and on about all of the internals&lt;br /&gt;of all this stuff but that would be going beyond the scope of this tutorial. The idea was to show&lt;br /&gt;how to crack this pro, and thats what I'm going to do. Based on the information I've given you, and the&lt;br /&gt;information that you can deduce from reading the code, I've written a small key generator in C.&lt;br /&gt;If you know C, then you'll be able to tell where i got the algorythms to write it. So here it is:&lt;br /&gt;&lt;br /&gt;#include&lt;stdio.h&gt;&lt;br /&gt;#include&lt;conio.h&gt;&lt;br /&gt;&lt;br /&gt;int main(void)&lt;br /&gt;{&lt;br /&gt;long code=555583,count1,count2;&lt;br /&gt;char name[25],cod[5],type='0';&lt;br /&gt;clrscr();&lt;br /&gt;textcolor(14);&lt;br /&gt;printf("This is a simple key-generator written by k33t of CYBNET Security Group");&lt;br /&gt;printf("=================================================");&lt;br /&gt;text color(10);&lt;br /&gt;printf("SubmitWolf(demo)ver4.1 cracked by k33t");&lt;br /&gt;textcolor(14);&lt;br /&gt;printf("%c%c%c",0x10,0x10,0x10");&lt;br /&gt;textcolor(12);&lt;br /&gt;printf("Yup")&lt;br /&gt;prinf("-November 2002");&lt;br /&gt;prinf("'\n\nSelect Edition PRO(0) or Enterprise(1) (0/1)=");&lt;br /&gt;scanf("%c",&amp;type);&lt;br /&gt;if(type=='1')code=557283;&lt;br /&gt;getchar();&lt;br /&gt;prinf("Enter Registration Name=");&lt;br /&gt;scanf("%[^\n]",name);&lt;br /&gt;for(count1=0;count1&lt;=3;count1++&lt;br /&gt;cod[count1]=name[count1];&lt;br /&gt;for(count=1;count1=3;count1++){&lt;br /&gt;for(count2=0;count2&lt;=3;count2++)&lt;br /&gt;cod[count2]=cod[count2]*(code%100);&lt;br /&gt;code=code/100;&lt;br /&gt;}&lt;br /&gt;for(count1=0;name[count1]&gt;0;count1++);&lt;br /&gt;for(count2=0;count2&lt;=3;count2++)&lt;br /&gt;cod[count2]=cod[count2]^(name[count1]+3);&lt;br /&gt;for=(count1-3;count1&gt;=0;count1--){&lt;br /&gt;code=code+(cod[count1]&amp;0xFF);&lt;br /&gt;if(count1&gt;0)&lt;br /&gt;code=code*0x100;&lt;br /&gt;}&lt;br /&gt;if(code&lt;0)code=-code;&lt;br /&gt;for(;code&lt;10000;) code=code*10;&lt;br /&gt;for(;code&gt;999999;) code=code/10;&lt;br /&gt;printf(Your Serial Number=P%c4-%ld",(type=='1')? 'E':'4'code);&lt;br /&gt;return ;&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;Ok! So! An overall conclusion of this code is:&lt;br /&gt;&lt;br /&gt;1.First two characters of the serial must be either 'PE' or 'P4'.&lt;br /&gt;2.Multiply every first four characters or our name with every byte of our serial before '-'&lt;br /&gt;3.XOR every four byte with every byte of our name.&lt;br /&gt;4.Convert to positive number if&lt;0.&lt;br /&gt;5.Convert to number between 10000 and 1000000.&lt;br /&gt;&lt;br /&gt;Forgive me if this code is buggy as I wrote it very quickly in the little spare time I had.&lt;br /&gt;&lt;br /&gt;-----------------------------------------------------------------------------------------------------------&lt;br /&gt;---Conclusion-------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/reverse-coding.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3400777481355921753</guid><pubDate>Fri, 28 Nov 2008 08:06:00 +0000</pubDate><atom:updated>2008-11-28T00:20:38.179-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>WinXP Tips &amp; Trix - Winsock 2 Repair</title><description>Repairing Damaged Winsock2&lt;br /&gt;&lt;br /&gt;The symptoms when Winsock2 is damaged show when you try to release and renew the IP address using IPCONFIG...&lt;br /&gt;&lt;br /&gt;And you get the following error message:&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;An error occurred while renewing interface 'Internet': An operation was attempted on something that is not a socket.&lt;br /&gt;&lt;br /&gt;Also Internet Explorer may give the following error message:&lt;br /&gt;The page cannot be displayed Additionally, you may have no IP address or no Automatic Private IP Addressing (APIPA) address, and you may be receiving IP packets but not sending them.&lt;br /&gt;&lt;br /&gt;There are two easy ways to determine if Winsock2 is damaged:&lt;br /&gt;&lt;br /&gt;From the XP source files, go to the Support / Tools directory&lt;br /&gt;&lt;br /&gt;Winsock Test Method 1&lt;br /&gt;Run netdiag /test:winsock&lt;br /&gt;&lt;br /&gt;The end should say Winsock test ..... passed&lt;br /&gt;&lt;br /&gt;Winsock Test Method 2&lt;br /&gt;&lt;br /&gt;Run Msinfo32&lt;br /&gt;Click on the + by Components&lt;br /&gt;Click on the by Network&lt;br /&gt;Click on Protocol&lt;br /&gt;There should be 10 sections if the Winsock2 key is ok&lt;br /&gt;MSAFD Tcpip [TCP/IP]&lt;br /&gt;MSAFD Tcpip [UDP/IP]&lt;br /&gt;RSVP UDP Service Provider&lt;br /&gt;RSVP TCP Service Provider&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;MSAFD NetBIOS [\Device\NetBT_Tcpip...&lt;br /&gt;&lt;br /&gt;If the names are anything different from those in this list, then likely Winsock2 is corrupted and needs to be repaired.&lt;br /&gt;If you have any 3rd party software installed, the name MSAFD may be changed.&lt;br /&gt;There should be no fewer than 10 sections.&lt;br /&gt;&lt;br /&gt;To repair Winsock2&lt;br /&gt;&lt;br /&gt;Run Regedit&lt;br /&gt;Delete the following two registry keys:&lt;br /&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock&lt;br /&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2&lt;br /&gt;&lt;br /&gt;Restart the computer&lt;br /&gt;Go to Network Connections&lt;br /&gt;Right click and select Properties&lt;br /&gt;Click on the Install button&lt;br /&gt;Select Protocol&lt;br /&gt;Click on the Add button&lt;br /&gt;Click on the Have Disk button&lt;br /&gt;Browse to the \Windows\inf directory&lt;br /&gt;Click on the Open button&lt;br /&gt;Click on the OK button&lt;br /&gt;Highlight Internet Protocol (TCP/IP)&lt;br /&gt;Click on the OK button&lt;br /&gt;Reboot&lt;br /&gt;&lt;br /&gt;punk.gif&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/winxp-tips-trix-winsock-2-repair.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-50898701020364499</guid><pubDate>Fri, 28 Nov 2008 08:03:00 +0000</pubDate><atom:updated>2008-11-28T00:17:11.299-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Tutorial  Get the serial number you need</title><description>Get the serial number you need ! (For Certain Things)&lt;br /&gt;&lt;br /&gt;* Go to Google.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;* In the search field type: "Product name" 94FBR&lt;br /&gt;&lt;br /&gt;* Where, "Product Name" is the name of the item you want to find the serial number for.&lt;br /&gt;&lt;br /&gt;* And voila - there you go - the serial number you needed.&lt;br /&gt;&lt;br /&gt;HOW DOES THIS WORK?&lt;br /&gt;&lt;br /&gt;Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.&lt;br /&gt;&lt;br /&gt;See these example searches:&lt;br /&gt;&lt;br /&gt;"Photoshop 7" 94FBR&lt;br /&gt;"Age of Mythology" 94FBR&lt;br /&gt;"Nero Burning Rom 5.5" 94FBR&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/tutorial-get-serial-number-you-need.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-4991544439588082791</guid><pubDate>Fri, 28 Nov 2008 07:53:00 +0000</pubDate><atom:updated>2008-11-28T00:02:30.767-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe PRoGRaM</category><title>Standard ASCII Character Set</title><description>Standard ASCII Character Set= For Bytes&lt;br /&gt;The first 32 values (0 through 31) are codes for things like carriage return and line feed. The space character is the 33rd value, followed by punctuation, digits, uppercase characters and lowercase characters.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;0   NUL&lt;br /&gt;  1   SOH&lt;br /&gt;  2   STX&lt;br /&gt;  3   ETX&lt;br /&gt;  4   EOT&lt;br /&gt;  5   ENQ&lt;br /&gt;  6   ACK&lt;br /&gt;  7   BEL&lt;br /&gt;  8   BS&lt;br /&gt;  9   TAB&lt;br /&gt; 10   LF&lt;br /&gt; 11   VT&lt;br /&gt; 12   FF&lt;br /&gt; 13   CR&lt;br /&gt; 14   SO&lt;br /&gt; 15   SI&lt;br /&gt; 16   DLE&lt;br /&gt; 17   DC1&lt;br /&gt; 18   DC2&lt;br /&gt; 19   DC3&lt;br /&gt; 20   DC4&lt;br /&gt; 21   NAK&lt;br /&gt; 22   SYN&lt;br /&gt; 23   ETB&lt;br /&gt; 24   CAN&lt;br /&gt; 25   EM&lt;br /&gt; 26   SUB&lt;br /&gt; 27   ESC&lt;br /&gt; 28   FS&lt;br /&gt; 29   GS&lt;br /&gt; 30   RS&lt;br /&gt; 31   US&lt;br /&gt; 32&lt;br /&gt; 33   !&lt;br /&gt; 34   "&lt;br /&gt; 35   #&lt;br /&gt; 36   $&lt;br /&gt; 37   %&lt;br /&gt; 38   &amp;&lt;br /&gt; 39   '&lt;br /&gt; 40   (&lt;br /&gt; 41   )&lt;br /&gt; 42   *&lt;br /&gt; 43   +&lt;br /&gt; 44   ,&lt;br /&gt; 45   -&lt;br /&gt; 46   .&lt;br /&gt; 47   /&lt;br /&gt; 48   0&lt;br /&gt; 49   1&lt;br /&gt; 50   2&lt;br /&gt; 51   3&lt;br /&gt; 52   4&lt;br /&gt; 53   5&lt;br /&gt; 54   6&lt;br /&gt; 55   7&lt;br /&gt; 56   8&lt;br /&gt; 57   9&lt;br /&gt; 58   :&lt;br /&gt; 59   ;&lt;br /&gt; 60   &lt;&lt;br /&gt; 61   =&lt;br /&gt; 62   &gt;&lt;br /&gt; 63   ?&lt;br /&gt; 64   @&lt;br /&gt; 65   A&lt;br /&gt; 66   B&lt;br /&gt; 67   C&lt;br /&gt; 68   D&lt;br /&gt; 69   E&lt;br /&gt; 70   F&lt;br /&gt; 71   G&lt;br /&gt; 72   H&lt;br /&gt; 73   I&lt;br /&gt; 74   J&lt;br /&gt; 75   K&lt;br /&gt; 76   L&lt;br /&gt; 77   M&lt;br /&gt; 78   N&lt;br /&gt; 79   O&lt;br /&gt; 80   P&lt;br /&gt; 81   Q&lt;br /&gt; 82   R&lt;br /&gt; 83   S&lt;br /&gt; 84   T&lt;br /&gt; 85   U&lt;br /&gt; 86   V&lt;br /&gt; 87   W&lt;br /&gt; 88   X&lt;br /&gt; 89   Y&lt;br /&gt; 90   Z&lt;br /&gt; 91   [&lt;br /&gt; 92   \&lt;br /&gt; 93   ]&lt;br /&gt; 94   ^&lt;br /&gt; 95   _&lt;br /&gt; 96   `&lt;br /&gt; 97   a&lt;br /&gt; 98   b&lt;br /&gt; 99   c&lt;br /&gt;100   d&lt;br /&gt;101   e&lt;br /&gt;102   f&lt;br /&gt;103   g&lt;br /&gt;104   h&lt;br /&gt;105   i&lt;br /&gt;106   j&lt;br /&gt;107   k&lt;br /&gt;108   l&lt;br /&gt;109   m&lt;br /&gt;110   n&lt;br /&gt;111   o&lt;br /&gt;112   p&lt;br /&gt;113   q&lt;br /&gt;114   r&lt;br /&gt;115   s&lt;br /&gt;116   t&lt;br /&gt;117   u&lt;br /&gt;118   v&lt;br /&gt;119   w&lt;br /&gt;120   x&lt;br /&gt;121   y&lt;br /&gt;122   z&lt;br /&gt;123   {&lt;br /&gt;124   |&lt;br /&gt;125   }&lt;br /&gt;126   ~&lt;br /&gt;127   DEL&lt;br /&gt;&lt;br /&gt;Name&lt;br /&gt; &lt;br /&gt;Abbr.&lt;br /&gt; &lt;br /&gt;Size&lt;br /&gt;Kilo&lt;br /&gt; &lt;br /&gt;K&lt;br /&gt; &lt;br /&gt;2^10 = 1,024&lt;br /&gt;Mega&lt;br /&gt; &lt;br /&gt;M&lt;br /&gt; &lt;br /&gt;2^20 = 1,048,576&lt;br /&gt;Giga&lt;br /&gt; &lt;br /&gt;G&lt;br /&gt; &lt;br /&gt;2^30 = 1,073,741,824&lt;br /&gt;Tera&lt;br /&gt; &lt;br /&gt;T&lt;br /&gt; &lt;br /&gt;2^40 = 1,099,511,627,776&lt;br /&gt;Peta&lt;br /&gt; &lt;br /&gt;P&lt;br /&gt; &lt;br /&gt;2^50 = 1,125,899,906,842,624&lt;br /&gt;Exa&lt;br /&gt; &lt;br /&gt;E&lt;br /&gt; &lt;br /&gt;2^60 = 1,152,921,504,606,846,976&lt;br /&gt;Zetta&lt;br /&gt; &lt;br /&gt;Z&lt;br /&gt; &lt;br /&gt;2^70 = 1,180,591,620,717,411,303,424&lt;br /&gt;Yotta&lt;br /&gt; &lt;br /&gt;Y&lt;br /&gt; &lt;br /&gt;2^80 = 1,208,925,819,614,629,174,706,176 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/standard-ascii-character-set.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-6956765870028537412</guid><pubDate>Thu, 27 Nov 2008 08:10:00 +0000</pubDate><atom:updated>2008-11-27T00:12:43.981-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Google Tips &amp; Tricks, (utilizing search engine)</title><description>So much information is on the web, its mind boggling. Thankfully we have search&lt;br /&gt;&lt;br /&gt;engines to sift through them and catagorize them for us. Unfortunatly, there is still so&lt;br /&gt;&lt;br /&gt;much info that even with these search engines, its often a painstakingly slow process&lt;br /&gt;&lt;br /&gt;(something comparable to death for a hacker) to find exactly what you're looking for.&lt;br /&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;Lets get right into it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I use google.com as my primary search engine because it presently tops the charts as far as&lt;br /&gt;&lt;br /&gt;the sites that it indexes which means more pertinent info per search.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. Page translation.&lt;br /&gt;&lt;br /&gt;Just because someone speaks another language doesn't mean they dont have anything useful to say. I use translation tools like the ones found at&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://babelfish.altavista.com&lt;br /&gt;&lt;br /&gt;and&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://world.altavista.com&lt;br /&gt;&lt;br /&gt;to translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2. Directories.&lt;br /&gt;&lt;br /&gt;These days everything is about $$$. We have to deal/w SEO (search engine optimization) which seems like a good idea on paper until you do a search for toys and get 5 pornsites in the first 10 results. Using a sites directory will eliminate that. You can narrow your search down easily by looking for the info in specific catagories. (PS google DOES have directories, they're at: directory.google.com)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. Here are some tips that google refers to as "advanced"&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;A. "xxxx" / will look for the exact phrase. (google isnt case sensitive)&lt;br /&gt;&lt;br /&gt;B. -x / will search for something excluding a certain term&lt;br /&gt;&lt;br /&gt;C. filetype:xxx / searches for a particular file extention (exe, mp3, etc)&lt;br /&gt;&lt;br /&gt;D. -filetype:xxx / excludes a particular file extention&lt;br /&gt;&lt;br /&gt;E. allinurl:x / term in the url&lt;br /&gt;&lt;br /&gt;F. allintext:x / terms in the text of the page&lt;br /&gt;&lt;br /&gt;G. allintitle:x / terms in the html title of that page&lt;br /&gt;&lt;br /&gt;H. allinanchor:x / terms in the links&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4. OR&lt;br /&gt;&lt;br /&gt;Self explanatory, one or the other... (ie: binder OR joiner)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;5. ~X&lt;br /&gt;&lt;br /&gt;Synonyms/similar terms (in case you can't think of any yourself)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;6. Numbers in a range.&lt;br /&gt;&lt;br /&gt;Lets say you're looking for an mp3 player but only want to spend up to $90. Why swim through all the others? MP3 player $0..$90 The 2 periods will set a numeric range to search between. This also works with dates, weights, etc&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;7. +&lt;br /&gt;&lt;br /&gt;Ever type in a search and see something like this:&lt;br /&gt;&lt;br /&gt;"The following words are very common and were not included in your search:"&lt;br /&gt;&lt;br /&gt;Well, what if those common words are important in your search? You can force google to search through even the common terms by putting a + in front of the denied word.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;8. Preferences&lt;br /&gt;&lt;br /&gt;It amazes me when I use other peoples PCs that they dont have their google search preferences saved. When you use google as much as I do, who can afford to not have preferences? They're located on the right of the search box, and have several options, though I only find 2 applicable for myself...&lt;br /&gt;&lt;br /&gt;A. Open results in new browser&lt;br /&gt;&lt;br /&gt;B. Display 10-100 results per page. (I currently use 50 per page, but thats a resolution preference, and 5X's the default)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;9. *&lt;br /&gt;&lt;br /&gt;Wildcard searches. Great when applied to a previously mentioned method. If you only know the name of a prog, or are looking for ALL of a particular file (ie. you're DLing tunes) something like *.mp3 would list every mp3.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;10. Ever see this?&lt;br /&gt;&lt;br /&gt;"In order to show you the most relevant results, we have omitted some entries very similar to the X already displayed. If you like, you can repeat the search with the omitted results included." The answer is YES. yes yes yes. Did I mention yes? I meant to.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;11. Search EVERYWHERE&lt;br /&gt;&lt;br /&gt;Use the engine to its fullest. If you dont find your answer in the web section, try the group section. Hell, try a whole different search engine. Dont limit yourself, because sometimes engines seem to intentionally leave results out.&lt;br /&gt;&lt;br /&gt;ex. use google, yahoo, and altavista. search the same terms... pretty close, right? Now search for disney death. Funny, altavista has plenty of disney, but no death...hmmm.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you've read this far into this tutorial without saying, "Great, a guy that copied a few google help pages and thinks its useful info" then I will show you WHY (besides accuracy, speed, and consistancy finding info on ANYTHING) its nice to know how a search engine works. You combine it/w your knowledge of other protocol.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Example:&lt;br /&gt;&lt;br /&gt;Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:&lt;br /&gt;&lt;br /&gt;intitle:"Index of music" "rolling stones" mp3&lt;br /&gt;&lt;br /&gt;Substitute rolling stones/w your favorite band. No? Try the song name, or another file format. Play with it. Assuming SOMEONE made an FTP and uploaded it, you'll find it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For example....I wanted to find some Sepultura. If you never heard them before, they're a Brazilian heavy metal band that kicks ass. I started with this:&lt;br /&gt;&lt;br /&gt;intitle:"Index of music" "Sepultura" mp3 &lt;-- nothing&lt;br /&gt;&lt;br /&gt;intitle:"Index of música" "Sepultura" mp3 &lt;-- nothing&lt;br /&gt;&lt;br /&gt;intitle:"Index of musica" "Sepultura" mp3 &lt;-- not good enough&lt;br /&gt;&lt;br /&gt;intitle:"Index of music" "Sepultura" * &lt;-- found great stuff, but not enough Sepultura&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;At this point it occurs to me that I may be missing something, so I try:&lt;br /&gt;&lt;br /&gt;intitle:"index of *" "sepultura" mp3 &lt;-- BANG!&lt;br /&gt;&lt;br /&gt;(and thats without searching for spelling errors)&lt;br /&gt;&lt;br /&gt;Also try inurl:ftp&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I find that * works better for me than trying to guess other peoples mis-spellings.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The same method applies for ebooks, games, movies, SW, anything that may be on an FTP site.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I hope you enjoyed this tutorial, and I saw that recently a book and an article was written on the very same topic. I havn't read them as of yet, but check em out, and get back to me if you feel I missed something important and should include anything else.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;intitle:"index of" "google hacks" ebook&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Ps. I've said it before, I'll say it again... BE CREATIVE.&lt;br /&gt;&lt;br /&gt;You'll be surprised what you can find.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/google-tips-tricks-utilizing-search.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-3426450412390137586</guid><pubDate>Thu, 27 Nov 2008 08:08:00 +0000</pubDate><atom:updated>2008-11-27T00:13:55.128-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Get unlimited bandwidth from your host for free</title><description>NOTE: This applies only to specific hosting companies, due to the&lt;br /&gt;&lt;br /&gt;specific setup needed and does have its drawbacks.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;While setting up hosting space with a specific company I often deal&lt;br /&gt;&lt;br /&gt;with, I noticed that they used a shared IP. (IP shared by two or more&lt;br /&gt;&lt;br /&gt;websites/domains.) Well, the rates for unlimited bandwidth were&lt;br /&gt;&lt;br /&gt;around $50+ per month, which I found unreasonable. I didnt require&lt;br /&gt;&lt;br /&gt;much space, and didnt want to be limited to a mere 3 gig of traffic&lt;br /&gt;&lt;br /&gt;per month.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Back on track... When setting up the acct, the hosting company needs&lt;br /&gt;&lt;br /&gt;to know the domain name so that they can direct it accordingly.&lt;br /&gt;&lt;br /&gt;(example: 'http://www.123.4.567.890/~user1/ ,&lt;br /&gt;&lt;br /&gt;'http://www.123.4.567.890/~user2/ etc)&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;At this point you can give a url that doesnt belong to you at all. As&lt;br /&gt;&lt;br /&gt;long as the nameservers dont change, that should have absolutly no&lt;br /&gt;&lt;br /&gt;negative effects on you or your site whatsoever.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How it works is this:&lt;br /&gt;&lt;br /&gt;The host propogates you a certain amount space on its servers, and&lt;br /&gt;&lt;br /&gt;monitors the traffic that enters their space through the domain its&lt;br /&gt;&lt;br /&gt;registered under. Being that the domain isn't connected to the site&lt;br /&gt;&lt;br /&gt;at all, it registers ZERO traffic.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Zero traffic registered = can't possibly go over bandwidth&lt;br /&gt;&lt;br /&gt;restrictions&lt;br /&gt;&lt;br /&gt;can't possibly go over bandwidth restrictions = free unlimited&lt;br /&gt;&lt;br /&gt;bandwidth&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now the problems with this (besides the ethical ones) is that your&lt;br /&gt;&lt;br /&gt;host may offer X amount of mail addys with the acct&lt;br /&gt;&lt;br /&gt;(you@y...) and these will not work, as the name isnt on their&lt;br /&gt;&lt;br /&gt;DNS. However, some domain companies allow you to set it up&lt;br /&gt;&lt;br /&gt;regardless. Another problem seems to be strictly cosmetic, but can be&lt;br /&gt;&lt;br /&gt;highly problematic... Once you attach the domain you want onto the&lt;br /&gt;&lt;br /&gt;site, each page comes up/w the ip/UN the host propagated to your&lt;br /&gt;&lt;br /&gt;acct. Its at this point where you have to have a phenominal 10-15&lt;br /&gt;&lt;br /&gt;character alphanumerical or better (#, &amp;, etc) pw, or your site will&lt;br /&gt;&lt;br /&gt;be vulnerable to attack since the attacker already has your UN. This&lt;br /&gt;&lt;br /&gt;only gives attackers a slight advantage as the amount of time it&lt;br /&gt;&lt;br /&gt;would take to brute force a 10 character pw @ a rate of 1,000,000 per&lt;br /&gt;&lt;br /&gt;second is 10 years. Add numbers and case sensitivity to that and it&lt;br /&gt;&lt;br /&gt;becomes approx 26,980 years.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;While I'm on it, I may as well add that if you use this method,&lt;br /&gt;&lt;br /&gt;obviously you are going to be using the lowest cost hosting plan&lt;br /&gt;&lt;br /&gt;available, which in turn will offer the least amount of space. Thats&lt;br /&gt;&lt;br /&gt;why free hosts were invented.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Free hosts suck as a general rule. Who wants a site smothered in ads?&lt;br /&gt;&lt;br /&gt;However, if you upload all your programs, graphics and other large&lt;br /&gt;&lt;br /&gt;files (have a backup of course) to a reliable free host and target&lt;br /&gt;&lt;br /&gt;them accordingly from your site you have just freed up a signifigant&lt;br /&gt;&lt;br /&gt;amount of space. The only setback/w this is having to keep an index&lt;br /&gt;&lt;br /&gt;card or file around/w your pws, as you should never use the same one&lt;br /&gt;&lt;br /&gt;twice, and want to use complicated ones.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/get-unlimited-bandwidth-from-your-host.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-1674371518560894479</guid><pubDate>Thu, 27 Nov 2008 07:10:00 +0000</pubDate><atom:updated>2008-11-26T23:15:47.902-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>How To Convert File System, fat - fat32 to ntfs</title><description>open a dos prompt and give the command&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;convert d: /fs:ntfs&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;this command would convert your d: drive to ntfs.&lt;br /&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;if the system cannot lock the drive, you will be prompted to convert it during next reboot.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Normally you should select yes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Conversion from fat/fat32 to ntfs is non-destructive, your data on the drive will NOT be lost.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Be aware that converting to ntfs will make that partition of your&lt;br /&gt;&lt;br /&gt;drive unreadable under dos unless you have ntfs utilites to do so.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-convert-file-system-fat-fat32-to.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-8483591931348509693</guid><pubDate>Thu, 27 Nov 2008 07:00:00 +0000</pubDate><atom:updated>2008-11-26T23:02:24.581-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>How To Boot Xp Faster (updated)</title><description>First of all, this tweak only apply to those who only have one HDD on their primary IDE channel (nothing else on device 0 or 1) and a CD-ROM and/or DVD-ROM on the secondary IDE channel. Each time you boot Windows XP, there's an updated file called NTOSBOOT-*.pf who appears in your prefetch directory (%SystemRoot%Prefetch) and there's no need to erease any other files as the new prefetch option in XP really improves loading time of installed programs. We only want WindowsXP to boot faster and not decrease its performance. Thanks to Rod Cahoon (for the prefetch automation process...with a minor change of mine) and Zeb for the IDE Channel tweak as those two tricks, coupled together with a little modification, result in an&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;EXTREMELY fast bootup:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) &amp; save as "ntosboot.bat" in c:&lt;br /&gt;&lt;br /&gt;2. From the Start menu, select "Run..." &amp; type "gpedit.msc".&lt;br /&gt;&lt;br /&gt;3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.&lt;br /&gt;&lt;br /&gt;4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file &amp; click "Open".&lt;br /&gt;&lt;br /&gt;5. Click "OK", "Apply" &amp; "OK" once again to exit.&lt;br /&gt;&lt;br /&gt;6. From the Start menu, select "Run..." &amp; type "devmgmt.msc".&lt;br /&gt;&lt;br /&gt;7. Double click on "IDE ATA/ATAPI controllers"&lt;br /&gt;&lt;br /&gt;8. Right click on "Primary IDE Channel" and select "Properties".&lt;br /&gt;&lt;br /&gt;9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' &amp; click "OK".&lt;br /&gt;&lt;br /&gt;10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.&lt;br /&gt;&lt;br /&gt;11. Reboot your computer.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;WindowsXP should now boot REALLY faster. &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-boot-xp-faster-updated.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-8101819451112977194</guid><pubDate>Thu, 27 Nov 2008 06:58:00 +0000</pubDate><atom:updated>2008-11-26T22:59:39.224-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>Bit Torrent Tutorials</title><description>The first things you need to know about using Bit Torrent:&lt;br /&gt;&lt;br /&gt;-- Bit Torrent is aimed at broadband users (or any connection better than dialup).&lt;br /&gt;&lt;br /&gt;-- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.&lt;br /&gt;&lt;br /&gt;-- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;-- The method of downloading is not your conventional type of download. Since downloads do not come in as one&lt;br /&gt;&lt;br /&gt;big chunk, you are able to download from many people at once, increasing your download speeds. There may be&lt;br /&gt;&lt;br /&gt;100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)&lt;br /&gt;&lt;br /&gt;-- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantly&lt;br /&gt;&lt;br /&gt;share in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on suprnova.org (the #1 source for torrent downloads).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Before you use the plug-in, take a look at /http://www.suprnova.org, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to suprnova.org. Look at the columns:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I'll break this down.&lt;br /&gt;&lt;br /&gt;Added: Self explanitory, its the date the torrent was added.&lt;br /&gt;&lt;br /&gt;Name: Also self explanitory.&lt;br /&gt;&lt;br /&gt;Filesize: Duh&lt;br /&gt;&lt;br /&gt;Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.&lt;br /&gt;&lt;br /&gt;DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now that you should understand how torrent files work, and how to use them, on to Azureus!&lt;br /&gt;&lt;br /&gt;First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /http://java.sun.com/j2se/1.4.2/download.html&lt;br /&gt;&lt;br /&gt;Next, get Azureus at: /http://azureus.sourceforge.net&lt;br /&gt;&lt;br /&gt;Next, get the Suprnovalister plugin from /http://s93732957.onlinehome.us/storage/suprnovalister.jar&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Install Java JRE before you do ANYTHING.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Load up Azureus, and if you want, go through the settings and personalize it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In the menu bar, go to View &gt; Plugins &gt; Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of suprnova.org containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Alternatively, if you don't want to use the plugin... you can just head to suprnova.org and download files to any folder. Then go to File &gt; Open &gt; .torrent File in Azureus.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/bit-torrent-tutorials.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-2781066607311676021</guid><pubDate>Thu, 27 Nov 2008 06:51:00 +0000</pubDate><atom:updated>2008-11-26T23:10:28.252-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ar</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>Tutorial Assembly for nerds using linux</title><description>ssembly nowadays is a hard thing to learn, not because it's difficult but &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;because people thinks that there is no reason to learn assembly! That's &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;not true... With assembly you can have total power above the computer, and &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;know exactly what he's doing. Try to remember that while trying to learn! &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You may wondering: Why to read this tut? Good point... There are thousands &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;of papers for programming assembly in x86. That's true... But did they &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;teach you how to make apps for linux? Did they talked about linux &lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;interrupts? I don't think so... There are many tutorials about programming &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;assembly for x86 in dos and windows, but very few on linux. I want to &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;change that. So this is the first issue of a collection of papers about &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;that. If you find that this paper has any error, please contact me and let &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;me know. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;##### Index ##### &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. Numbering systems &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.1. Decimal system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2. Binary system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.1. Converting a binary number to a decimal number &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.2. Converting a decimal number to a binary number &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.3. Hexadecimal system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.4. Conventions &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2. Binaries in computers &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.1. Bit &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.2. Nibble &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.3. Byte &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.4. Word &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.5. Double word &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;###################### 1. Numbering systems ###################### &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.1. Decimal system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Nowadays we use the decimal numbering system in almost everything that is &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;related to numbers. We use it so often and in a natural way that we forget &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;it's meaning. What is decimal system? &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;. Every decimal number, has only digits between zero and nine, &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;making a total of 10 digits &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note: how many fingers do you have? ...10. In fact the decimal &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;system is bound to human anatomy. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;. Ok, and what is the meaning of each digit? Consider the &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;following numbers: 234 and 234,43 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We do some transformations &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-&gt; 234 i.e. 200 + 30 + 4 i.e. 2 * 10^2 + 3 * 10^1 + 4 * 10^0 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-&gt; 234,43 = 2 * 10^2 + 3 * 10^1 + 4 * 10^0 + 0,43 = 2 * 10^2 + 3 * &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;10^1 + 4 * 10^0 + 4 * 10^-1 + 3 * 10^-2 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Do you see the relation? Each digit appearing to the left of the &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;decimal point represents a value between zero and nine times an increasing &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;power of ten. Digits appearing to the right of the decimal point represent &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;a value between zero and nine times a decreasing power of ten. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2. Binary system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Binary system uses only two digits, by convention the digits are 0 and 1. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This system is so widely used in computers... By coincidence or not this &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;system adjusts perfectly to computers... Computers operate using binary &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;logic. The computer represents values using two different voltage levels, &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;in this way we can represent 0 and 1. Like I said before the same applies &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;to binary system, it is well adjust to computer anatomy! &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.1. Converting a binary number to a decimal number &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Apply the same rule we saw in 1.1, but with powers of two. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Example: 1010 -&gt; 1 * 2^3 + 0 * 2^2 + 1 * 2^1 + 0 * 2^0 = 10 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.2. Converting a decimal number to a binary number &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We have two ways to do it: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.2.1 We consecutively divide the decimal value by a power &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;two(keeping the remainder), while the result of the division is different &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;than zero. The binary representation is obtained by the sequence of &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;remainders in the inverse order of the divisions. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Consider the number 10(in decimal): &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;10 / 2 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;0 5 / 2 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1 2 / 2 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;0 1 / 2 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1 0 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So in binary we write 1010 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.2.2.2 You can try to find out the number by adding powers of two, &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;that added will produce the decimal result. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Consider for example number 123... hmmm it's a number not less than 2^0 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;and not greater then 2^7. Cool… &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;0 1 1 1 1 0 1 1 because 1 * 2^6 + 1 * 2^5 + 1 * &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2^4 + 1 * 2^3 + 0 * 2^2 + 1*2^1 + 1 * 2^0 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;= 123 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Our result is 1111011. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.3. Hexadecimal system &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You saw how many digits took to represent the number 123 in binary. 7 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;digits! Imagine 1200, 10000,... it hurts. So programmers had to choose &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;another numbering system, just to "talk" to the machine... and no... it's &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;not the decimal system!! You saw the trouble we had to convert one simple &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;number like 10 between decimal and binary... I think you don't want to &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;spend half of your life doing that. Engineers thought on that and they &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;elected the hexadecimal system... Hexadecimals is the "english" for &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;computers. They have two special features: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;- They're very compact &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;- it's simple to convert them to binary and vice-versa. A &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;hexadecimal number has digits with a value between 0 and 15 times a &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;certain power of sixteen. Because we only know digits between 0-9 we have &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;to use six more digits! We can use the 6 first letters of the alphabet. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Let's see a example: FF = 15 * 16^1 + 15 * 16^0 = 255 (16) (10) &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Converting between binary and hexadecimal is very easy! To convert binary &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;to hexadecimal remember that every four digits correspond to a single &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;hexadecimal digit... to convert back to binary just apply the inverse &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;rule! Let's take a look at the next example: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;110 1011 = 0110 1011 =6B &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;(2) (16) &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It's very easy!! To make things easier, take a look at the following &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;table: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;################ &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# D # H # B # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;################ &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 0 # 0 # 0000 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 1 # 1 # 0001 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 2 # 2 # 0010 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 3 # 3 # 0011 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 4 # 4 # 0100 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 5 # 5 # 0101 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 6 # 6 # 0110 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 7 # 7 # 0111 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 8 # 8 # 1000 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;# 9 # 9 # 1001 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#10 # A # 1010 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#11 # B # 1011 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#12 # C # 1100 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#13 # D # 1101 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#14 # E # 1110 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;#15 # F # 1111 # &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;################ &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1.4. Conventions &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Programming in assembly, requires you to obey some rules when using &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;numbers, because you can use three different numbering systems. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;When writing a number: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;- all numbers have to start with a decimal digit &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;- all numbers end with a letter, indicating the type of number: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;. for hexadecimals the letter is h &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;. binary numbers end with b &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;. decimals end with t or d We will use the following notation: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Xn Xn-1 ... X2 X1 -&gt; Xi represents a bit, and i&lt;-[0,1,...,n] represents &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;it's position. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;######################## 2. Binaries in computers ######################## &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.1. Bit is the abbreviation to binary digit. We'll use this abbreviation &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;all the time. As you may have guessed that “bit” is the smallest unit of &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;data on a binary computer. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.2. Nibble is a set of four bits. For example 1110, 1101, 1111 is a &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;nibble... every thing that has 4 bits is a nibble. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;X3 X2 X1 X0 -&gt; X1 X0 are the low order bits in the nibble, while &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;X2X3 are the high order bits. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.3. Byte -&gt; This is the most used data structure in computers. A byte is &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;a collection of eight bits: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;X7 X6 X5 X4 X3 X2 X1 X0 When referring to a byte we say that it's &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;low order nibble is X0 X1 X2 X3, while the high order nibble is X4 X5 X6 &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;X7. Note: bytes are used to represent characters using the ASCII &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;character set. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.4. A word consists of 2 bytes, i.e. a group of 16 bits. In a byte you &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;have a low order byte and high order byte. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2.5. A double word consists of 2 words, i.e. 4 bytes i.e. 32 bits. In a &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;double word you have a L.O. word and a H.O. word. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In the next tutorial I will talk about: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;- Arithmetic operations - Signed and unsigned numbers - System &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Organization - Flags and registers - Logical operations on bits - Some &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;instructions like: mov, jmp, call, and... &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/tutorial-assembly-for-nerds-using-linux.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-7482071478419752654</guid><pubDate>Tue, 25 Nov 2008 08:13:00 +0000</pubDate><atom:updated>2008-11-25T00:15:06.538-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>HOW TO GET ANY WINDOWS PASSWORD</title><description>ok..... here are the full details.....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;this works whether its windows 2000 or windows xp or windows xp SP1 or SP2 or windows server 2003....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;this works even if syskey encryption is employed...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;if it is FAT filesystem...&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;just copy the sam file like stated in the first post to an empty floppy disk and take it home. I'll tell u what to do with it later... DON'T DELETE THE ORIGINAL SAM FILE. just remove its attributes. the sam file is a file called SAM with no extension. YOU MUST ALSO GET.... a file called SYSTEM which is in the same folder as SAM. both files have no extensions...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;if it is NTFS....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;u have to download a program called NTFSPro.... it allows u to read from ntfs drives... the demo version allows read only. the full version is read-write.... you use the program to create an unbootable disk (so u will still need another bootable disk and an empty disk) that has the required files to access NTFS.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;use the boot disk to get into dos, then use the disks created with ntfspro to be able to access the filesystem, then copy the SAM and SYSTEM files to another empty disk to take home....&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;AT HOME: u have to get a program called SAMInside. it doesn't matter if it is demo version. SAMInside will open the SAM file and extract all the user account information and their passwords, including administrator. SAMInside will ask for the SYSTEM file too if the computer you took the SAM file from has syskey enabled. syskey encrypts the SAM file. SAMInside uses SYSTEM file to decrypt the SAM file. After SAMInside finishes, u still see user accounts and hashes beside them. the hashes are the encoded passwords. Use SAMInside to export the accounts and their hashes as a pwdump file into another program, called LophtCrack. it is currently in version 5, it is named LC5. the previous version, LC4 is just as good. u need the full or cracked version of the program. LC5 uses a brute force method by trying all possible combinations of letters numbers, and unprintable characters to find the correct password from the hashes in the pwdump file imported into it from SAMInside. This process of trying all passwords might take 5 minutes if the password is easy, up to a year if the password is long and hard (really really hard). LC5 howver, unlike LC4, is almost 100 times faster. both can be configured to try dictionary and common words before using all possible combinations of everything. Once the correct password is found, it will display the passwords in clear beside each account, including administrator.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I use this method so many times. I've compromised the whole school computer infrastructure. LC4 usually took between 1 second and 10 minutes to find the passwords because they were common words found in any english dictionary. I haven't used LC5 yet.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If there is anything unclear, anything I overlooked, plz tell me so that I can turn this into a very easy to follow tutorial to help anybody crack any windowz pass.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Programs needed: SAMInside (doesn't matter which version or if demo)&lt;br /&gt;&lt;br /&gt;LC4 or LC5 (lophtcrack)( must be full version)&lt;br /&gt;&lt;br /&gt;NTFSPro (doesn't matter if demo)&lt;br /&gt;&lt;br /&gt;any bootdisk maker&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Cracked or full version software can be found on any warez site. If u don"t know what that is or where to get the programs, post a message and I'll tell u or give them to u.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;P.S: I might not keep track of this forum, because I'm going to create a new topic and post tutorial there. if u want to post, plz post there.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-get-any-windows-password.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-6957746354473168903</guid><pubDate>Tue, 25 Nov 2008 08:11:00 +0000</pubDate><atom:updated>2008-11-25T00:27:35.667-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><category domain="http://www.blogger.com/atom/ns#">aRTiCLe iNTeRNeT</category><title>How to find a remote IP</title><description>Method 1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To view someone's IP# when they send you hotmail email do this:&lt;br /&gt;&lt;br /&gt;1) Click "Options" on the upper right side of the page.&lt;br /&gt;&lt;br /&gt;2) On the left side of the page, Click "Mail"&lt;br /&gt;&lt;br /&gt;3) Click "Mail Display Settings"&lt;br /&gt;&lt;br /&gt;4) Under "Message Headers" select "Full" or "Advanced"&lt;br /&gt;&lt;br /&gt;5) Click ok&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;Method 2&lt;br /&gt;&lt;br /&gt;reg a dydns account and install the ip pointer, so each time you ping the host name you regestored&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;for example:&lt;br /&gt;&lt;br /&gt;you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Method 3&lt;br /&gt;&lt;br /&gt;neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Method 4&lt;br /&gt;&lt;br /&gt;Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Other Ways&lt;br /&gt;&lt;br /&gt;-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll&lt;br /&gt;&lt;br /&gt;-originalicons.com there is a page for doin it (i dont like it, but it works)&lt;br /&gt;&lt;br /&gt;-or irc&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Here is a more detailed tutorial about using NetCat.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://www.onlamp.com/pub/a/onlamp/2003/05/29/netcat.html&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Windows users can download NetCat from here:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://www.atstake.com/research/tools/network_utilities/&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-find-remote-ip.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6578361456208529115.post-848986590046532004</guid><pubDate>Tue, 25 Nov 2008 06:52:00 +0000</pubDate><atom:updated>2008-11-25T00:23:20.998-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">aRTiCLe about CoMPuTer</category><title>how to execute chm files in linux</title><description>download the following rpms on ur pc:-&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://dag.wieers.com/packages/chmlib/chmlib-0.35-1.1.fc3.rf.i386.rpm&lt;br /&gt;&lt;br /&gt;ftp://rpmfind.net/linux/dag/fedora/3/en/i386/dag/RPMS/wxGTK-2.4.2-5.1.fc3.rf.i386.rpm&lt;br /&gt;&lt;br /&gt;http://acmserver.cs.ucr.edu/%7Ensoracco/rpms/xchm-0.9.8-1.i386.rpm&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;and also install them in the same sequence. using the command:-&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;rpm -ivh &lt;package name&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note:- i am giving the path of packages for fedora cpre 3. if want for any other os take a look at the following sites.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;chmlib:- http://dag.wieers.com/packages/chmlib/&lt;br /&gt;&lt;br /&gt;wxGTK:- ftp://rpmfind.net/linux/dag/&lt;br /&gt;&lt;br /&gt;xchm: - platform independent for all redhat's.............&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://bunkerapplication.blogspot.com/2008/11/how-to-execute-chm-files-in-linux.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>