<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5818762817573851132</id><updated>2024-10-09T15:57:34.925-07:00</updated><category term="Internet"/><category term="Hack Chat"/><category term="Progam"/><title type='text'>Hacking Tutorial</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://thesecrethacker.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5818762817573851132/posts/default'/><link rel='alternate' type='text/html' href='http://thesecrethacker.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>admin</name><uri>http://www.blogger.com/profile/05783781463508497592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5818762817573851132.post-3348123949183373439</id><published>2010-01-19T00:42:00.000-08:00</published><updated>2010-01-19T00:44:42.895-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Progam"/><title type='text'>What To Look For In A Code Hacking Program</title><content type='html'>written by Dissident&lt;br /&gt;&lt;br /&gt;   Phreaking&#39;s getting tricky these days, ain&#39;t it?&lt;br /&gt;   Ok, there are two groups of things a code hacker should have, the&lt;br /&gt;necessities and the things that are good to have...  Here are the necessities:&lt;br /&gt;&lt;br /&gt;   Mutliple ports.  If you constantly try to hack from the same port (the&lt;br /&gt;800/950 or whatever number that the company you&#39;re hacking from is on) you&lt;br /&gt;are begging to be caught.  The program should have an option to handle at&lt;br /&gt;least 5 different ports.  It should also be able to handle a different format&lt;br /&gt;for each one if necessary. (One could require nine digits, another only 4,&lt;br /&gt;another requiring a 9 before the place you&#39;re trying to call to, etc)&lt;br /&gt;   Multiple targets.  The program should be able to handle as many&lt;br /&gt;target numbers as it can ports.  If everytime you try a code you go to the&lt;br /&gt;same number you are, again, begging to be caught.&lt;br /&gt;   The ability to hack codes RANDOMLY.  And when I say random, I mean going&lt;br /&gt;as far as to have a different seed each time it generates a random code...&lt;br /&gt;If you hack sequentially I hope you get caught.&lt;br /&gt;   Not only should the codes it tries be random, but almost everything about&lt;br /&gt;the program should be random.  It should pick a random port, with a random&lt;br /&gt;target, and with a random code.  Believe it or not, some companies are starting&lt;br /&gt;to show some intelligence, and they&#39;re beginning to notice patterns. . .&lt;br /&gt;You can&#39;t predict chaos, remember that.&lt;br /&gt;   The ability to stop after a certain number of tries, or a certain number&lt;br /&gt;of successful codes, or at a certain time.  If you let the hacker run for a&lt;br /&gt;long time, you better have a LOT of ports and targets set up...  Hack for&lt;br /&gt;short periods of time, or for a relatively small number of tries.  If you&lt;br /&gt;get impatient and desperate for codes, you will make mistakes.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;        And now, the nice things to have.&lt;br /&gt;&lt;br /&gt;   The ability to have a random delay between the tones it dials.  Humans&lt;br /&gt;can&#39;t dial 11 digit numbers in .7 of a second, and the companies know that.&lt;br /&gt;Humans also cannot dial with a consistent gap between each tone.  If the&lt;br /&gt;program puts a random time between each tone, the system will have a better&lt;br /&gt;chance of thinking you&#39;re a human.&lt;br /&gt;   The program SHOULD be able to encrypt all of the codes it hacks when it&lt;br /&gt;saves them/prints them/etc.  That way, IF you get busted, you won&#39;t have so&lt;br /&gt;much evidence against you.  When you get nailed, they go through everything,&lt;br /&gt;even if they are idiot schmucks.  If your list of codes contains all &#39;wrong&#39;&lt;br /&gt;codes, they&#39;ll have less of a case against you.&lt;br /&gt;   It is also nice if the code hacker waits a random length of time between&lt;br /&gt;attempts, no matter how many ports it is trying.  If you&#39;re hacking random&lt;br /&gt;ports, with random targets, with a random delay between digits dialed, with a&lt;br /&gt;random amount of time between all of your attempts, and with a randomly&lt;br /&gt;generated code, you&#39;re going to be hard as hell to catch.&lt;br /&gt;&lt;br /&gt;   And now some warnings. . .&lt;br /&gt;&lt;br /&gt;   I don&#39;t know if it is a COMMON practice, but some companies have set up&lt;br /&gt;bad accounts (codes, whatever) for the specific purpose of catching whoever&lt;br /&gt;tries to use it.  If it doesn&#39;t belong to a real person, only a hacker would&lt;br /&gt;get it.&lt;br /&gt;   Don&#39;t hack fast...  If at all possible, dial fairly slowly.  I&#39;ve heard&lt;br /&gt;of places that watch for extremely fast dialers.&lt;br /&gt;   Don&#39;t phreak to the same place with the same code constantly.  I feel&lt;br /&gt;that one is self explanatory.&lt;br /&gt;   If you&#39;re very cautious, you can always use someone else&#39;s line when you&lt;br /&gt;are searching for codes.  But be SURE you don&#39;t leave anything that can point&lt;br /&gt;to you.&lt;br /&gt;   If you think there is a chance that you&#39;ve been snagged, or at least&lt;br /&gt;caught the attention of the Gestapo, stop phreaking.  The less stuff they&lt;br /&gt;have against you, the less of a case they&#39;ll have against you.  Also, if you&lt;br /&gt;keep phreaking, they&#39;ll sooner or later shove a printout in your face that&lt;br /&gt;contains every number dialed from your phone.  Don&#39;t bring everybody else down&lt;br /&gt;just because you got careless.&lt;br /&gt;&lt;br /&gt;   Speaking of bringing everyone else down...  I don&#39;t know if the truth has&lt;br /&gt;been out yet, so I&#39;ll bring it out.  There was a loser by the name of Jeremy&lt;br /&gt;Hall.  His common handles were &quot;Quicksilver&quot; and &quot;Shells&quot;.  He thought he was&lt;br /&gt;hot shit.  He set up many Alliance conferences, called up Voice Mailboxes&lt;br /&gt;almost everyday, etc.  He was about 13 years old, a little whiny brat.&lt;br /&gt;Well, there was also a damn good phracker by the handle of Amadeus.  Ever&lt;br /&gt;wonder what happened to him?  Quicksilver turned him in to save his own ass.&lt;br /&gt;He also caused alot of Mailboxes to come down, and I think a few boards came&lt;br /&gt;down because of his ignorance.&lt;br /&gt;&lt;br /&gt;Just thought I&#39;d mention that for those who knew Amadeus or Narcsilver.&lt;br /&gt;(BTW-Narc:615-647-8019  724 York Road  Clarksville, TN 37042&lt;br /&gt;&lt;br /&gt;Various programs with code-hacking functions written by members of TES-&lt;br /&gt;&lt;br /&gt;Commcracker and Coax - written by Cronus&lt;br /&gt;HAMR, HAMR 2.0,HAMR128 - written by Dissident&lt;br /&gt;CHOMPS under development - Cronus&lt;br /&gt;CHOMPS-Amiga also under development - Dissident&lt;br /&gt;&lt;br /&gt;All of the above except for HAMR 128 and CHOMPS Amiga were written/are being&lt;br /&gt;developed for Commodore 64s...  Commcracker/Coax/HAMR require 1660 modems,&lt;br /&gt;the rest will work with Hayes Compats.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://thesecrethacker.blogspot.com/feeds/3348123949183373439/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://thesecrethacker.blogspot.com/2010/01/what-to-look-for-in-code-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5818762817573851132/posts/default/3348123949183373439'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5818762817573851132/posts/default/3348123949183373439'/><link rel='alternate' type='text/html' href='http://thesecrethacker.blogspot.com/2010/01/what-to-look-for-in-code-hacking.html' title='What To Look For In A Code Hacking Program'/><author><name>admin</name><uri>http://www.blogger.com/profile/05783781463508497592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5818762817573851132.post-6045394892611532391</id><published>2010-01-17T13:15:00.001-08:00</published><updated>2010-01-17T13:19:40.198-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Chat"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><title type='text'>All mIRC Commands</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.weethet.nl/images/mirc/mirc_vcdnmpg.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 314px; height: 244px;&quot; src=&quot;http://www.weethet.nl/images/mirc/mirc_vcdnmpg.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;/ Recalls the previous command entered in the current window.&lt;br /&gt;/! Recalls the last command typed in any window.&lt;br /&gt;/action {action text} Sends the specifed action to the active channel or query window.&lt;br /&gt;/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.&lt;br /&gt;/ame {action text} Sends the specifed action to all channels which you are currently on.&lt;br /&gt;/amsg {text} Sends the specifed message to all channels which you are currently on.&lt;br /&gt;/auser {level} {nick|address} Adds a user with the specified access level to the remote users list.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off&lt;br /&gt;totally.&lt;br /&gt;/away {away message} Sets you away leave a message explaining that you are not currently paying&lt;br /&gt;attention to IRC.&lt;br /&gt;/away Sets you being back.&lt;br /&gt;/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.&lt;br /&gt;/beep {number} {delay} Locally beeps &#39;number&#39; times with &#39;delay&#39; in between the beeps. /channel&lt;br /&gt;Pops up the channel central window (only works in a channel).&lt;br /&gt;&lt;br /&gt;/clear Clears the entire scrollback buffer of the current window.&lt;br /&gt;/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on&lt;br /&gt;nickname.&lt;br /&gt;/closemsg {nickname} Closes the query window you have open to the specified nick.&lt;br /&gt;/creq [ask | auto | ignore] Sets your DCC &#39;On Chat request&#39; settings in DCC/Options.&lt;br /&gt;/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.&lt;br /&gt;/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.&lt;br /&gt;/describe {#channel} {action text} Sends the specifed action to the specified channel window.&lt;br /&gt;/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other&lt;br /&gt;applications.&lt;br /&gt;/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given&lt;br /&gt;service name.&lt;br /&gt;/disable {#groupname} De-activates a group of commands or events.&lt;br /&gt;/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.&lt;br /&gt;/dlevel {level} Changes the default user level in the remote section.&lt;br /&gt;/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.&lt;br /&gt;/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place&lt;br /&gt;in color N.&lt;br /&gt;/enable {#groupname} Activates a group of commands or events.&lt;br /&gt;/events [on|off] Shows the remote events status or sets it to listening or not.&lt;br /&gt;/exit Forces mIRC to closedown and exit.&lt;br /&gt;/finger Does a finger on a users address.&lt;br /&gt;/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.&lt;br /&gt;/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.&lt;br /&gt;/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.&lt;br /&gt;/guser {level} {nick} [type] Adds the user to the user list with the specified level and&lt;br /&gt;address type.&lt;br /&gt;/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.&lt;br /&gt;/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off&lt;br /&gt;totally.&lt;br /&gt;/invite {nickname} {#channel} Invites another user to a channel.&lt;br /&gt;/join {#channel} Makes you join the specified channel.&lt;br /&gt;/kick {#channel} {nickname} Kicks nickname off a given channel.&lt;br /&gt;/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for&lt;br /&gt;parameters.&lt;br /&gt;/log [on|off] Shows the logging status or sets it on or off for the current window.&lt;br /&gt;/me {action text} Sends the specifed action to the active channel or query window.&lt;br /&gt;/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.&lt;br /&gt;/msg {nickname} {message} Send a private message to this user without opening a query window.&lt;br /&gt;/names {#channel} Shows the nicks of all people on the given channel.&lt;br /&gt;/nick {new nickname} Changes your nickname to whatever you like.&lt;br /&gt;/notice {nick} {message} Send the specified notice message to the nick.&lt;br /&gt;/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.&lt;br /&gt;/onotice [#channel] {message} Send the specified notice message to all channel ops.&lt;br /&gt;/omsg [#channel] {message} Send the specified message to all ops on a channel.&lt;br /&gt;/part {#channel} Makes you leave the specified channel.&lt;br /&gt;/partall Makes you leave all channels you are on.&lt;br /&gt;/ping {server address} Pings the given server. NOT a nickname.&lt;br /&gt;/play [-c] {filename} [delay] Allows you to send text files to a window.&lt;br /&gt;/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.&lt;br /&gt;/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off&lt;br /&gt;totally.&lt;br /&gt;/query {nickname} {message} Open a query window to this user and send them the private message.&lt;br /&gt;/quit [reason] Disconnect you from IRC with the optional byebye message.&lt;br /&gt;/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!&lt;br /&gt;/remote [on|off] Shows the remote commands status or sets it to listening or not.&lt;br /&gt;/rlevel {access level} Removes all users from the remote users list with the specified access&lt;br /&gt;level.&lt;br /&gt;/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.&lt;br /&gt;/ruser {nick[!]|address} [type] Removes the user from the remote users list.&lt;br /&gt;/save {filename.ini} Saves remote sections into a specified INI file.&lt;br /&gt;/say {text} Says whatever you want to the active window.&lt;br /&gt;/server [server address [port] [password]] Reconnects to the previous server or a newly&lt;br /&gt;specified one.&lt;br /&gt;/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.&lt;br /&gt;/speak {text} Uses the external text to speech program Monologue to speak up the text.&lt;br /&gt;/sreq [ask | auto | ignore] Sets your DCC &#39;On Send request&#39; settings in DCC/Options.&lt;br /&gt;/time Tells you the time on the server you use.&lt;br /&gt;/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.&lt;br /&gt;/topic {#channel} {newtopic} Changes the topic for the specified channel.&lt;br /&gt;/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.&lt;br /&gt;/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.&lt;br /&gt;/uwho [nick] Pops up the user central with information about the specified user.&lt;br /&gt;/who {#channel} Shows the nicks of all people on the given channel.&lt;br /&gt;/who {*address.string*} Shows all people on IRC with a matching address.&lt;br /&gt;/whois {nickname} Shows information about someone in the status window.&lt;br /&gt;/whowas {nickname} Shows information about someone who -just- left IRC.&lt;br /&gt;/wavplay {c:\path\sound.wav} Locally plays the specified wave file.&lt;br /&gt;/write [-cidl] {filename} [text] To write the specified text to a .txt file.&lt;br /&gt;&lt;br /&gt;MoViEBoT #xdcc-help /server irc.atomic-irc.net&lt;br /&gt;&lt;br /&gt;We strive to make IRC easier for you!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://thesecrethacker.blogspot.com/feeds/6045394892611532391/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://thesecrethacker.blogspot.com/2010/01/all-mirc-commands_17.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5818762817573851132/posts/default/6045394892611532391'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5818762817573851132/posts/default/6045394892611532391'/><link rel='alternate' type='text/html' href='http://thesecrethacker.blogspot.com/2010/01/all-mirc-commands_17.html' title='All mIRC Commands'/><author><name>admin</name><uri>http://www.blogger.com/profile/05783781463508497592</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>