How to Make a Computer Never Respond Using Power Point

    How to Make a Computer Never Respond Using Power Point

       1. Start power point.
       2.Take a screen shot of the computer desktop so it shows all the icons and stuff.
       3.Paste the screen shot in the title slide until the screen shot fills up the whole slide
       4.Then copy the slide 20 times
       5.Make your slide loop able.
       6.To make the slide loopable, please read:
       7.Click slide show, set up show, then chek mark loop continusly until esc then click ok.
       8.Play the slide show.
       9.No matter how many times you click, the the desktop will never respond.
      10.To end this, click esc, or close powerpoint.


    Warnings

        * You might get in trouble
        
         Things You'll Need

        * Computer
        * Keyboard
        * Mouse
        * Power Point
        * This article as a guide
    Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

How to Take a Screenshot in Microsoft Windows

    How to Take a Screenshot in Microsoft Windows

    Do you want to take a screenshot without installation of a program in Microsoft Windows? Learn how to take screenshots of your desktop or internal computer problems, so that the people at Microsoft and other troubleshooting services can help you solve your problems much faster and more efficiently.

    In Windows XP
       1.Find out what key(s) on your keyboard you need to press to take a screenshot. It may be just pressing PrintScreen, PrtScrn, or pressing Fn or Ctrl then pressing another key.

       2.Press the screenshot keyboard shortcut that your keyboard uses to take a screenshot.(On the page that you want to take a screenshot.)

       1.Open Microsoft Paint or Microsoft Word. To do this, click Start > All Programs > Accessories > Paint. Click inside the white part of the screen.

    2.Go to the Edit menu and click Paste or you can press and hold "Ctrl" and tap V. Then you may crop if you like.

    3.Click File > Save As. In the box that pops up, change the "Save As Type" to PNG or JPG. Type in a file name for your image. Choose a place to save, like the Desktop, and click save.


    4.If you want to send your image to somebody, simply attach the .png file that you just saved to an email and send it along. Alternatively, you can upload it onto the internet by visiting a site like TinyPic.com and uploading it.

    In Windowws Vista


       1.In Windows Vista (except in Home Basic), there is a tool called the Snipping Tool.
              * To open it, click on the start menu, type snip, then hit enter (the latest version of Windows Vista updates the search results as you type each letter).
       2.Click on Snipping Tool.
       3.The Snipping Tool opens, and a white mask is applied on the screen. In the drop-down menu for the 'New' button, choose from a free-form snip, rectangular snip, window snip, or full-screen snip.
       4.In free-form snip mode, draw around the area you want to be captured. Drag a rectangle in rectangular snip mode. For window snip mode, select the window you want to capture. In full-screen mode, just selecting it from the drop-down menu makes the capture.
       5.The snipped image is then opened within the Snipping Tool, but is also copied to the Windows clipboard for use in other applications.

    In Windows 7

    If you want to take screenshots in Windows 7 it comes with little program called Snipping Tool, which can be found in the Start Menu/All Programs/Accessories.

    You can take a screenshot of the entire screen, a window or just a selection of the screen, that you select.

    In Windows 7, you can also take a screenshot by pressing Alt, Print Screen. You must hold down alt when you press print screen. I think this is easier to take a screenshot than the snipping tool if you want the whole screen.

    # If you want to take screenshot of just the active window (usually the one that's in front of all the others and activated), press "Alt - Print Screen". This means, you should hold down the Alt key and then press the Print Screen key.
    # A quicker way of accessing Microsoft Paint can be achieved by pressing the Windows key (Between "Ctrl" and "Alt" on many keyboards") and "R", then typing 'mspaint' in the box that appears.
    # Many laptops, to conserve keyboard space, have mapped the "PrtSc" key as a primary or secondary function on a shared key. To take a screenshot with "PrtSc" mapped to a key as a secondary function, you will need to locate your notebook's function key (usually labeled "Fn" and located along the bottom row) and engage it before touching "PrtSc."
    # Depending on your version of Windows, Paint will allow you to save the screenshot in different formats.

        * BMP is the default option (a lossless uncompressed format)
        * PNG is a lossless compressed format which also supports transparency
        * JPEG is a lossy, compressed image format, specifically developed for photographic images. For these images, it allows for the smallest file size with a good quality.
        * GIF just supports a limited number of colors. This format is outdated and shouldn't be used anymore.

    # If you plan on putting your screenshot on a website, be sure it does not exceed a suggested size limit

    # It is also possible to pause an internet video and make a screenshot of it. In this way you can create a still from a video, e.g. from Youtube.

        * As a rule your video player allows to make the video full screen and high quality, and to stop at the frame you want.
        * This capturing method may not work if you play the video from version 11 or newer from Windows Media Player.
        * You can use additional software to simplify process of screenshoting. For instance the portable freeware Screenshoter is very easy to use or the free tool http://lightshot.skillbrains.com/ which can capture any area (http://www.youtube.com/watch?v=Okkhhz0fJ3Y) to clipboard with one click. Another suitable software is http://www.techsmith.com/download/snagittrial.asp it can even shoot video. But SnagIt is commercial tool with price about $50.

    # For some computers all you have to do is to press the print screen button, then the picture goes straight to your hard drive.


    Note:If you have problems with the snipping tool the method followed Windows XP can be followed
     in Windows Vista And Windows 7.Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

How to Avoid Becoming a Script Kiddie

    How to Avoid Becoming a Script Kiddie


    A script kiddie is someone who knows basic information about the operation of computer systems, but lacks the knowledge or desire to discover and exploit/patch security holes without the use of tools written by better hackers. Script kiddies usually just use tools that abstract the underlying concepts of computer security.

    Script kiddies are widely considered to be immature, and are definitely not hackers. Being a script kiddie will not gain any recognition in the hacker community.

    Steps
       1. Learn a programming language in-depth. Hackers commonly prefer C or C++, though the language is up to you. Try to avoid languages with bad reputations like Visual Basic. Batch or VBScript do not count as programming languages, as they are not used to generate programs, they are used to script already created programs, despite the illusion of a program being created.
       2.Understand the underlying concepts of how operating systems function (i.e the Kernel), you will require an in-depth understanding of how both the windows and Linux operating systems work.
       3.Don't threaten to hack people that anger you. It makes you seem petty and immature. Go for logical debates instead of just attempting to destroy someone. Even if you don't 'win' the argument, you will come out without looking immature.
       4.Don't self-promote. This goes for any kind of hobby or job. Even if you're good at what you do, don't constantly tell everyone how skilled you are at programming in Assembly language, or your grasp of how a buffer overflow is achieved.
       5.Don't fall into the lure of the black-hat hacking community, also known as "malicious hackers". They hack primarily for their own selfish gain, to inflict pain into people's lives, and for self-entertainment. Not only is it illegal to hack people's computers, but if you are caught you could do some jail time and you will find it next to impossible to attain a job with any kind of contact with computers. Companies do not want someone who has a history of hacking with malicious intent (think about it, why would a computer company employ a hacker who may hack them?). Use your skills to help people, there are so many really awesome jobs for ethical hackers.
       6.Resist the urge to use use tools without understanding the concepts. Hacking tools can be great help in the process, but most tools are investigated by the companies they exploit, and therefore they don't usually work for long. If you understand the underlying concepts of programs and the operating system. With this knowledge, you can create your own exploits.
       7. Widen your interests, and keep an active social life. This isn't really related to script kiddies, but hackers in general often become so absorbed with their various projects on the computers, that they ignore their friends, or simply not make friends.

    Tips

    Many hackers favor the GPL software license when they release programs on the net. Its best to familiarize your self with this license.

    Warnings

    Despite the advantages of UNIX-based operating systems (Mac OS X, Linux etc.), don't constantly shout praise for them and put down Windows (it's immature and shallow). Be reasonable in your arguments and remember - knowing your way around all major operating systems is key to becoming a real hacker.Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

A Sparkling Seasonal Line-Up!

    posted by Christine Wells

    How did December get here so fast? Never fear, we have a fabulous program lined up to warm the cockles of your heart this holiday season!

    First up, on 2 December, Suz and Jo Davis take us on a field trip to Station Five to chat with Jo's incredible firefighters. A most... educational excursion, ladies! And there are some fabulous prizes to be won!

    Then, on December 3, Silhouette author Bonnie Vanak makes her first appearance in the Lair. Our in-depth reporter, Nancy, interviews Bonnie about her fabulous shifter romances.

    On December 6, warn the cabana boys because it's Party Time as our very own New York Times bestseller, Kate Carlisle launches her second Silhouette Desire, SWEET SURRENDER, BABY SURPRISE! RT Book Reviews says it's "Sweepingly romantic and startlingly sexy" and The Romance Reviews calls it "A tender romance with mass appeal." Wow!

    Join us for something a little different on December 7 when Dorie Graham chats with Nancy about creative intelligence. I'm really looking forward to that, as "creative intelligence" sometimes seems like an oxymoron when applied to yours truly!

    And Deck the Halls, because December 13 rings in our third annual 12 days of Christmas, with fun giveaways and more!

    But that's not all, because on December 16 the lovely Anna Campbell will chat with debut author Elizabeth Essex about her sizzling new release, The Pursuit of Pleasure!

    And now, just for a bit of Aussie flavour, let me leave you with a Christmas carol they sing at my son's kindergarten:

    Christmas where the gum trees grow
    There is no frost and there is no snow
    Christmas in Australia's hot
    Cold and frosty's what it's not
    When the bloom on the Jacaranda tree is here
    Christmas time is near!
    Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

How to Hack a Coke Machine

    How to Hack a Coke Machine

    Want to dazzle your friends with your technical powers while checking out the profitability of a vending machine route? Read on. Most Coke machines built since the late 1990s can be hacked with a simple access code. Once you enter the code, you can find out all kinds of information about the machine's sales.

    Please note that this article does not teach you how to steal drinks from drink machines. Stealing is, of course, illegal.

       1. Find a machine that has an LED screen and that is by "Royal Vendors". There should be a label on both sides of the machine. The small screen will typically scroll a message such as "Ice Cold Coca Cola". If the machine's LED display simply displays the price, the steps below may not work.
      
          2.Enter the access code by using the drink selection buttons. The default access code is 4, 2, 3, 1, but the buttons aren't numbered. They will either say nothing or have pictures of Coke, Diet Coke, Sprite, and other Coca-Cola products on them.

              * If the buttons are in a column, button 1 is the top one. Button 2 is the second one from the top, and so on.
              * If they are in a grid or other format, button 1 is the top left one. Button 2 is the one directly to the right of that, and so on.

      
          3.Scroll through the menu to find out information about the machine. Once you enter the correct access code, the message on the LED screen will change. Typically it will say "EROR," but on some machines it may simply display a number. Use the buttons to navigate through the menu.

              * Press button 1 at any time to return to the previous menu or to exit the menu to go back to normal mode.
              * Press button 2 to scroll up through the selections.
              * Press button 3 to scroll down through the selections.
              * Press button 4 to select the displayed menu option.


    Example Menu Options

        * ERROR: This menu option displays error messages for the machine, including problems that occurred with the refrigeration system, the vending mechanism, the bill changer, and the bill validator. To see error messages, press the select button (button 4) when the display shows ERROR, and then scroll through to see specific errors. Select an individual error to see more details. Generally if only one type of error has occurred you won't be able to scroll through other error options.
        * CASH: This option allows you to see the machine's total historical cash intake, as well as the resettable cash counted for each drink selection. Press the select button when the the LED display shows CASH. This will show you the historical cash counted by the machine. Note that it will include fractions of a dollar, such that if it displays 1452425, the historical cash count is $14,524.25. Use the scroll buttons (2 or 3) to navigate to the cash counts for each slot (each beverage selection). The number displayed will show first the slot number and then the revenue for that slot number since the last time the counter was reset. In some machines, it will be preceded by the letters CA or SL (for "slot").
        * SALE: This option allows you to see the machine's historical total number of sales, as well as the resettable number of sales for each drink selection. It works like the CASH menu above, except that the numbers displayed reflect the number of beverages sold.
        * RTN: Sometimes labeled EXIT, this option stands for "Return To Normal" and allows you to exit the menu completely and return the machine to normal mode. Press the select button to exit.
     

    Alternate Menu

        * On machines with two panels of six buttons on each side, the same 4-2-3-1 code will access the Electronic Counter for the machine. After accessing this menu, press 1 to see the total lifetime sales, 2 for the total lifetime items sold, 3 for a breakdown of items sold of each selection, 4 for a breakdown of cash generated for each selection, and 5 for the machine's internal temperature. After a while without input, the machine will return to the normal menu. On some machines, the 6 button will close the menu.


    Tips

        * This only works for Coke machines, which may sell products such as Barq's Root Beer, Sprite, Dasani, Evian, Fanta, Fresca, Frutopia, Full Throttle, Powerade, Hi-C, Minute Maid, Nestea, Odwalla, Mr. Pibb, Planet Java, Seagram's Ginger Ale, Simply Orange, Sparkletts, or Tab in addition to Coke and Diet Coke.
        * In general, these are the only options     * you can access without having the door unlocked and open. Different machines may list these options in somewhat different formats, so experiment a bit to learn what each new one does.
        * If you need to exit the menu quickly (i.e. when you just can't wait another second to buy an ice cold Coke) press the change (coin return) button. This will normally quit the menu, but on some machines it will display the machine's inner temperature.
        * Vending machine owners or service people have the option to change the access sequence from 4231 to some other combination of buttons, but they rarely do. This is probably because having one code makes it easier for anyone to service all the machines along a route. It may also be because the information you can access through the external menu with the door closed is limited and fairly harmless.
        * There are several videos available on the Internet that show people using this hack. Many claim to be able to change prices or get a free drink, but the videos don't actually show them doing so.
        * In order to get to the same menu in a machine that sells Pepsi products, simply enter 1,3,2,4. All the menu options should be the same. (This does not work on all Pepsi machines)
        * This might also work on some Coke vending machines that have a numeric keypad instead of buttons for specific drinks. Enter in the Coke code as usual, and you'll get to the sales menu!
        * Some machines require you to enter the code twice.
        * Several machines display a list of more codes, but most have the dispense options disabled.


    Warnings

        * This will generally be frowned upon by store staff or machine service people, so exercise caution when trying it out, and be sure to follow any applicable laws in your jurisdiction.
        * Don't do this if there's a line behind you, as people may get upset waiting for you.
        * You might waste your time doing this, as Coca-Cola has distributed new firmware to their vendors that would render these instructions unusable.
        * You may be asked to leave or be fined if the owner catches you.
        * Use common sense, don't do it when others are around or in front of a camera.
    Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

How to Crack a "Master Lock" Combination Lock

    How to Crack a "Master Lock" Combination Lock

    If you do not know the combination to a Master Lock combination lock, you have a few options. If the lock isn’t locked onto anything, look to see whether it has a serial number stamped on the back. If it does, you can follow a procedure to mail a photocopy to Master Lock for the combination. If it does not, Master Lock cannot provide you with a serial number so read on.

    If your lock is attached to something, you can break the lock, call a locksmith, use a shim, or figure out the combination. Of these options, only the last two will leave you with a usable lock without emptying your wallet. Unfortunately, there are 64,000 possible combinations on a standard 40 digit Master Lock. With this method, however, you can quickly narrow that down to 80 combinations, a workable number to try if you’ve got the time and the inclination to give it a shot.

    Steps

    This works with some Master Lock combination locks but may not work with all of them, especially not those that have no serial numbers. Some may not turn at all when the shackle is raised. It is rumored that Master Lock changed the combination algorithm on some of the locks, in particular those with serial numbers starting with the number 800. Some people, however, have reportedly had success cracking these with this method, too, so it may be worth a try. Check the discussion page for this article to check which serial numbers others succeed with.

    # Turn the lock’s dial clockwise to zero. It is a good idea to turn it at least three rotations first, just to make sure it’s clear.
    #3
    lock down if the shackle is locked onto something solid. Turn the dial slowly as you apply tension. If you can’t turn the dial at all, release the shackle and turn the dial clockwise just a number or two and then try it again.
    #4
    Find the first sticking point.


        * As you turn the dial clockwise with tension on the shackle, you will come to a point where you can’t turn the dial anymore. Make note of where it stops. Sometimes it will stick right on the numbers, but sometimes it will be between the numbers. If so, record the number to the half (e.g. 22.5, 7.5, etc.).
        * While continuing to apply tension to the shackle, turn the dial as far left (counter-clockwise) as you can. Make note of where it stops. Now you have a sticking "range." (Note: Some 800XXX locks have a two number range [e.g. 28-30], this sticking point is the last digit of your lock.)
        * Determine the sticking point by finding the number that's in the midpoint of the sticking range. A range of 4 and 5 would have a sticking point of 4.5. A range of 22.5 and 23.5 would have a sticking point of 23.

    #.5Release shackle tension and turn the dial slightly past the sticking point. Turn the dial clockwise about one number from the sticking point in order to allow you to "escape" that sticking point.
    #.6Reapply tension to the shackle and continue turning the dial clockwise to find all the sticking points. You should find a total of twelve sticking points in one complete turn of the dial. Write them down.
    #.7Find the third number of the combination.

        * Look at your list of sticking points and eliminate all those which are not whole numbers (i.e. cross off any number that ends in .5). You should eliminate 7 of the 12 numbers with this step.
        * Of the remaining sticking points, choose the one with the unique digit in the "ones" position. Four of the remaining five numbers will share the same number in the "ones" place, so for example, if the numbers left on the list are 4, 14, 24, 27, and 34, the number 27 is the only one which does not have a four in the "ones" place. This is the third number of the combination.

    #.8.Find the magic number. Divide the third number of the combination (27 in this case) by four and write down the remainder. In this case 27/4 = 6 remainder 3. Remember we are only concerned with the remainder, which will always be 0, 1, 2, or 3. Write down the magic number (3 in this example).
    #.9
    Find the possible first numbers of the combination. Add 4 to the magic number (3). Write down the result (7). Now add 4 to that and continue adding 4 to each resulting sum until you have gone completely around the dial once. Write down each of these numbers. Thus, for the example above the numbers would be 3, 7, 11, 15, 19, 23, 27, 31, 35, and 39. One of these numbers is the first number of the combination. (NOTE: For some 800XXX locks this will be the second number of the combination. The next set of numbers will be used as the first)
    #.10
    Find the possible second numbers in the combination. If your magic number is 0 or 1 then add 2 to it, otherwise subtract 2. Since our example magic number is 3, we subtract 2 and get 1. Write down the answer and add 4 to it. Now add 4 to each resulting sum until you have gone completely around the dial once. Thus, in the example, the numbers would be 1, 5, 9, 13, 17, 21, 25, 29, 33, and 37. One of these numbers is the second number in the combination.
    #.11
    Cross out the numbers (the possible 2ND numbers) Plus or Minus 2 [25 & 29] from the third number of the combination[27].
    #.12
    Figure out the correct combination by trial and error. You now know all the possible first numbers [3, 7, 11, 15, 19, 23, 27, 31, 35, 39], all the possible second numbers [1, 5, 9, 13, 17, 21, 33, 37], and the third number [27]. You’ve just narrowed down 64,000 combinations to only 80. Now try each combination until you find the correct one. If you’re lucky, you may need to try only a few but then again, you may need to try all 80.

    Tips

        * Only consider proceeding with this method if you enjoy a challenge. Otherwise, cutting off the lock and buying a new one makes more sense.
        * If your lock has a key way on the back, you can also drill a small hole next to it so that you can view the tumblers. After you align the tumblers, and determine the unlock code, you can seal the hole with a two-part epoxy.
        * Some times the sticking points for finding the 3rd number are not exactly on top of a number or between two numbers. In this case:
               1. turn clockwise (right) the first of the 12 sticking points from 0
               2. continue to turn clockwise to the opposite side of the dial
               3. turn counterclockwise (left) back to the first sticking point from 0
               4. pull up on the lock and turn the dial left and right in the small sticking area and right down the exact range. (e.g. 2.75-3.5)
               5. repeat this 4 more times for the numbers 10 more from each other. (e.g. 3, 13, 23, 33)
               6. now do steps 1-5 for the second sticking point past zero
               7. do the steps again for the third point past zero.
        * Each set of numbers will all have the same range. For example, one group may be .0 to .0, another .25 to .75 and the last .5 to .25 on either side of the sticking points.
        * The third number of the combination is the one that doesn't fit within it's group.On my lock, it was also the one that had the most play in the range (5.25-6.75, 15.5-16.25, 25.5-26.25, 35.5-36.25). So my third number was the 6. If you notice, those 4 ranges are all for numbers with 6 in the ones place, had I followed the directions above, I may have ended up trying for a different number! Steps 1-4 aren't required but it seemed to give me some better results. Some numbers seemed to slide one way or the other by .25 if I didn't do steps 1-4 for every sticking point.

    Warnings

        * Do not use this technique to crack someone else's lock without permission of the owner. If you do that, you are breaking the law and could be prosecuted accordingly.
        * When finding the sticking numbers, be very precise. Otherwise you won't get the correct numbers.
        * The "sticking" method does not work on Master Lock Sphero Locks.
    Source URL: http://gbejadacosta.blogspot.com/2010/11/
    Visit Gbejada Costa for Daily Updated Hairstyles Collection

Picking Master Locks

    Picking Master Locks 
     by The Jolly Roger


    Have you ever tried to impress someone by picking one of those
    Master combination locks and failed?

    The Master lock company made their older combination locks with a
    protection scheme.  If you pull the handle too hard, the knob will
    not turn.  That was their biggest mistake.

    The first number:

    Get out any of the Master locks so you know what is going on. 
    While pulling on the clasp (part that springs open when you get
    the combination right), turn the knob to the left until it will
    not move any more, and add five to the number you reach.  You now
    have the first number of the combination.

    The second number:

    Spin the dial around a couple of times, then go to the first
    number you got.  Turn the dial to the right, bypassing the first
    number once.  When you have bypassed the first number, start
    pulling on the clasp and turning the knob.  The knob will
    eventually fall into the groove and lock.  While in the groove,
    pull the clasp and turn the knob.  If the knob is loose, go to the
    next groove, if the knob is stiff, you have the second number of
    the combination.

    The third number:

    After getting the second number, spin the dial, then enter the two
    numbers.  Slowly spin the dial to the right, and at each number,
    pull on the clasp.  The lock will eventually open if you did the
    process right. 

    This method of opening Master locks only works on older models. 
    Someone informed Master of their mistake, and they employed a new
    mechanism that is foolproof (for now).

    The older models are from 1988-1990.  The newer models are being
    cracked on as we speak..
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Making Plastic Explosives from Bleach

      Making Plastic Explosives from Bleach          
      by The Jolly Roger

      Potassium chlorate is an extremely volatile explosive compound,
      and has been used in the past as the main explosive filler in
      grenades, land mines, and mortar rounds by such countries as
      France and Germany.  Common household bleach contains a small
      amount of potassium chlorate, which can be extracted by the
      procedure that follows.

      First off, you must obtain:

      [1]  A heat source (hot plate, stove, etc.)
      [2]  A hydrometer, or battery hydrometer
      [3]  A large Pyrex, or enameled steel container (to weigh
           chemicals)
      [4]  Potassium chloride (sold as a salt substitute at health and
           nutrition stores)

      Take one gallon of bleach, place it in the container, and begin
      heating it.  While this solution heats, weigh out 63 grams of
      potassium chloride and add this to the bleach being heated. 
      Constantly check the solution being heated with the hydrometer,
      and boil until you get a reading of 1.3.  If using a battery
      hydrometer, boil until you read a FULL charge.

      Take the solution and allow it to cool in a refrigerator until it
      is between room temperature and 0 degrees Celcius.  Filter out the
      crystals that have formed and save them.  Boil this solution again
      and cool as before.  Filter and save the crystals.

      Take the crystals that have been saved, and mix them with
      distilled water in the following proportions:  56 grams per 100
      milliliters distilled water.  Heat this solution until it boils
      and allow to cool.  Filter the solution and save the crystals that
      form upon cooling.  This process of purification is called
      "fractional crystalization".  These crystals should be relatively
      pure potassium chlorate.

      Powder these to the consistency of face powder, and heat gently to
      drive off all moisture.

      Now, melt five parts Vaseline with five parts wax.  Dissolve this
      in white gasoline (camp stove gasoline), and pour this liquid on
      90 parts potassium chlorate (the powdered crystals from above)
      into a plastic bowl.  Knead this liquid into the potassium
      chlorate until intimately mixed.  Allow all gasoline to evaporate.

      Finally, place this explosive into a cool, dry place.  Avoid
      friction, sulfur, sulfides, and phosphorous compounds.  This
      explosive is best molded to the desired shape and density of 1.3
      grams in a cube and dipped in wax until water proof.  These block
      type charges guarantee the highest detonation velocity.  Also, a
      blasting cap of at least a 3 grade must be used.

      The presence of the afore mentioned compounds (sulfur, sulfides,
      etc.) results in mixtures that are or can become highly sensitive
      and will possibly decompose explosively while in storage.  You
      should never store homemade explosives, and you must use EXTREME
      caution at all times while performing the processes in this
      article.

      You may obtain a catalog of other subject of this nature by
      writing:

           Information Publishing Co.
           Box 10042
           Odessa, Texas  79762
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Credit Card Fraud:

      Credit Card Fraud:



      For most of you out there, money is hard to come by.  Until now:
      Only for educational purpose.
      With the recent advent of plastic money (credit cards), it is
      easy to use someone else's credit card to order the items you have
      always desired in life.  The stakes are high, but the payoff is
      worth it.

      Step One:  Getting the credit card information
      First off, you must obtain the crucial item:  someone's credit
      card number.  The best way to get credit card numbers is to take
      the blue carbons used in a credit card transaction at your local
      department store.  These can usually be found in the garbage can
      next to the register, or for the more daring, in the garbage
      dumpster behind the store.  But, due to the large amount of credit
      card fraud, many stores have opted to use a carbonless transaction
      sheet, making things much more difficult.  This is where your
      phone comes in handy.

      First, look up someone in the phone book, and obtain as much
      information as possible about them.  Then, during business hours,
      call in a very convincing voice - "Hello, this is John Doe from
      the Visa Credit Card Fraud Investigations Department.  We have
      been informed that your credit card may have been used for
      fraudulent purposes, so will you please read off the numbers
      appearing on your Visa card for verification."  Of course, use
      your imagination!  Believe it or not, many people will fall for
      this ploy and give out their credit information.

      Now, assuming that you have your victim's credit card number, you
      should be able to decipher the information given.

      Step Two:  Recognizing information from carbon copies

      Card examples:

      [American Express]
      XXXX XXXXXX XXXXX
      MM/Y1 THRU MM/Y2
      JOE SHMOE

      [American Express]
      XXXX XXXXXX XXXXX
      MM/Y1 THRU MM/Y2
      JOE SHMOE

      Explanation:
         MM/Y1 is the date the card was issued, and MM/Y2 is the
         expiration date.  The American Express Gold Card has numbers
         XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00,
         even if the card holder is broke.
        
      [Mastercard]
      5XXX XXXX XXXX XXXX
      XXXX AAA DD-MM-YY MM/YY
      JOE SHMOE

      Explanation:
         XXXX in the second row may be asked for during the ordering
         process.  The first date is when the card was new, and the
         second is when the card expires.  The most frequent number
         combination used is 5424 1800 XXXX XXXX.  There are many of
         these cards in circulation, but many of these are on wanted
         lists, so check these first.

      [Visa]
      4XXX XXX(X) XXX(X) XXX(X)
      MM/YY    MM/YY*VISA
      JOE SHMOE

      Explanation:
         Visa is the most abundant card, and is accepted almost
         everywhere.  The "*VISA" is sometimes replaced with "BWG", or
         followed with a special code.  These codes are as follows:

         [1]  MM/YY*VISA V - Preferred Card
         [2]  MM/YY*VISA CV - Classic Card
         [3]  MM/YY*VISA PV - Premier Card
        
         Preferred Cards are backed with money, and are much safer to
         use.  Classic Cards are newer, harder to reproduce cards with
         decent backing.  Premier Cards are Classic Cards with Preferred
         coverage.  Common numbers are 4448 020 XXX XXX, 4254 5123 6000
         XXXX, and 4254 5123 8500 XXXX.  Any 4712 1250 XXXX XXXX cards
         are IBM Credit Union cards, and are risky to use, although
         they are usually covered for large purchases.

      Step Three:  Testing credit

      You should now have a Visa, Mastercard, or American Express
      credit card number, with the victim's address, zip code, and phone
      number.  By the way, if you have problems getting the address,
      most phone companies offer the Address Tracking Service, which is
      a special number you call that will give you an address from a
      phone number, at a nominal charge.  Now you need to check the
      balance of credit on the credit card (to make sure you don't run
      out of money), and you must also make sure that the card isn't
      stolen.  To do this you must obtain a phone number that
      businesses use to check out credit cards during purchases.  If you
      go to a department store, watch the cashier when someone makes a
      credit card purchase.  He/she will usually call a phone number,
      give the credit information, and then give what is called a
      "Merchant Number".  These numbers are usually written down on or
      around the register.  It is easy to either find these numbers and
      copy them, or to wait until they call one in.  Watch what they
      dial and wait for the 8 digit (usually) merchant number.  Once you
      call the number, in a calm voice, read off the account number,
      merchant number, amount, and expiration date.  The credit bureau
      will tell you if it is ok, and will give you an authorization
      number.  Pretend you are writing this number down, and repeat it
      back to them to check it.  Ignore this number completely, for it
      serves no real purpose.  However, once you do this, the bank
      removes dollars equal to what you told them, because the card was
      supposedly used to make a purchase.  Sometimes you can trick the
      operator by telling her the customer changed his mind and decided
      not to charge it.  Of course, some will not allow this.  Remember
      at all times that you are supposed to be a store clerk calling to
      check out the card for a purchase.  Act like you are talking with
      a customer when he/she "cancels".

      Step Four:  The drop

      Once the cards are cleared, you must find a place to have the
      package sent.  NEVER use a drop more than once.  The following are
      typical drop sites:

         [1]  An empty house
             
      An empty house makes an excellent place to send things.  Send the
      package UPS, and leave a note on the door saying, "UPS.  I work
      days, 8 to 6.  Could you please leave the package on the back door
      step?"  You can find dozens of houses from a real estate agent by
      telling them you want to look around for a house.  Ask for a list
      of twenty houses for sale, and tell them you will check out the
      area.  Do so, until you find one that suits your needs.

         [2]  Rent A Spot

      U-Haul sometimes rents spaces where you can have packages sent and
      signed for.  End your space when the package arrives.

         [3]  People's houses

      Find someone you do not know, and have the package sent there. 
      Call ahead saying that "I called the store and they sent the
      package to the wrong address.  It was already sent, but can you
      keep it there for me?"  This is a very reliable way if you keep
      calm when talking to the people.

      Do NOT try post office boxes.  Most of the time, UPS will not
      deliver to a post office box, and many people have been caught in
      the past attempting to use a post office box.  Also, when you have
      determined a drop site, keep an eye on it for suspicious
      characters and cars that have not been there before.

      Step Five:  Making the transaction

      You should now have a reliable credit card number with all the
      necessary billing information, and a good drop site.

      The best place to order from is catalogues, and mail order houses. 
      It is in your best interest to place the phone call from a pay
      phone, especially if it is a 1-800 number.  Now, when you call,
      don't try to disguise your voice, thinking you will trick the
      salesperson into believing you are an adult.  These folks are
      trained to detect this, so your best bet is to order in your own
      voice.  They will ask for the following:  name, name as it appears
      on card, phone number, billing address, expiration date, method of
      shipping, and product.  Ask if they offer UPS Red shipping (next
      day arrival), because it gives them less time to research an
      order.  If you are using American Express, you might have a bit of
      a problem shipping to an address other than the billing address. 
      Also, if the salesperson starts to ask questions, do NOT hang up. 
      Simply talk your way out of the situation, so you won't encourage
      investigation on the order.

      If everything goes right, you should have the product, free of
      charge.  Insurance picks up the tab, and no one is any wiser.  Be
      careful, and try not to order anything over $500.  In some states,
      UPS requires a signature for anything over $200, not to mention
      that anything over $200 is defined as grand theft, as well as
      credit fraud.  Get caught doing this, and you will bite it for a
      couple of years.  Good luck!

      First compiled in JRII..Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Cracking Zip Password Files

      Cracking Zip Password Files


      Tut On Cracking Zip Password Files..
      What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as Google.com.
      FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
      FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
      The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
      FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
      FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
      Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

      We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
      If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

      Now that we've gone through all the theoretical stuff, let's get to the actual commands.


      --------------------------------------------------------------------------------
      Bruteforce
      --------------------------------------------------------------------------------


      The command line you'll need to use for using brute force is:

      fzc -mb -nzFile.zip -lChr Lenght -cType of chars

      Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

      For Chr Lenght you can use 4 kind of switches...

      -> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
      -> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
      -> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
      -> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

      For the Type of chars we have 5 switches they are:

      -> a for using lowercase letters
      -> A for using uppercase letters
      -> ! for using simbols (check the Bforce.txt if you want to see what simbols)
      -> s for using space
      -> 1 for using numbers


      Example:
      If you want to find a password with lowercase and numbers by brute force you would just do something like:

      fzc -mb -nzTest.zip -l4-7 -ca1

      This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

      *****
      hint
      *****

      You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


      --------------------------------------------------------------------------------
      Wordlist
      --------------------------------------------------------------------------------

      Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
      To start a wordlist attak you'll do something like.

      fzc -mwMode number -nzFile.zip -nwWordlist

      Where:

      Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
      File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

      You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
      So if you something like

      fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

      FZC would just start reading at line 50 and would just read with length >= to 9.

      Example:

      If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

      fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50


      --------------------------------------------------------------------------------
      Resuming
      --------------------------------------------------------------------------------

      Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
      To resume the bruteforce attack you just need to do:

      fzc -mr

      And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
      But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

      fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

      Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.

      Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the programSource URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Daydreaming

    Computer Maintenance

       Computer Maintenance
      You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.


      Getting started

      Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

      * Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
      * Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
      * Install software updates immediately.
      When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
      An ounce of prevention

      A few simple steps will help you keep your files safe and clean.

      * Step 1: Update your software
      * Step 2: Backup your files
      * Step 3: Use antivirus software and keep it updated
      * Step 4: Change your passwords


      Developing ongoing maintenance practices

      Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

      * Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.




      * Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk
      .
      * Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords
      .

      Making a schedule

      One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    How To: Change Your Ip In Less Then 1 Minute

      How To: Change Your Ip In Less Then 1 Minute

      1. Click on "Start" in the bottom left hand corner of screen
      2. Click on "Run"
      3. Type in "command" and hit ok

      You should now be at an MSDOS prompt screen.

      4. Type "ipconfig /release" just like that, and hit "enter"
      5. Type "exit" and leave the prompt
      6. Right-click on "Network Places" or "My Network Places" on your desktop.
      7. Click on "properties"

      You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

      8. Right click on "Local Area Connection" and click "properties"
      9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
      10. Click on "Use the following IP address" under the "General" tab
      11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
      12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
      13. Hit the "Ok" button here
      14. Hit the "Ok" button again

      You should now be back to the "Local Area Connection" screen.

      15. Right-click back on "Local Area Connection" and go to properties again.
      16. Go back to the "TCP/IP" settings
      17. This time, select "Obtain an IP address automatically"
      tongue.gif 18. Hit "Ok"
      19. Hit "Ok" again
      20. You now have a new IP address

      With a little practice, you can easily get this process down to 15 seconds.

      P.S:
      This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Change Text in XP Start Button

       Change Text in XP Start Button


      Step 1 - Modify Explorer.exe File
      In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

      Get this from
      h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

      The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

      The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

      There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used Click Me!

      You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


      Step 2 – Modify the Registry

      !!!make a backup of your registry before making changes!!!

      Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

      HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

      In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

      Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Cannot Recover Lost Password in Windows XP

      Cannot Recover Lost Password in Windows XP


      Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
      You have several options to try and get around this problem.


      If you have access to another user account with administrator rights, you can use that account to change the password
      of the account that is locked out. You can also use the default Administrator account that is built into Windows XP.

      First you need to boot the system into Safe Mode.
      1.Restart your system.
      2.When you see the blue Dell globe or screen, press the ( F8 ) key about 3 times a second.
      3.You should get the Windows startup menu. Use the (Up or Down) arrow keys to highlight (SafeMode)
      4.Press (Enter) on (Safe Mode), then press (Enter) on (Windows XP).
      5.The system should boot to Safe Mode.

      Once you are at the Account Log on Screen, click on the icon
      for the user account with administrator rights, or click on the icon
      for the administrators account.
      Note: For Home the Administrator account isn't normally shown & in Safe Mode you have to press Ctrl+Alt+Delete keys twice to show.
      For PRO you can do this in normal mode

      When the system has booted to the desktop, use the following steps to change the accounts password.
      1.Click Start, Control Panel, Administrative Tools.
      2.Click Computer Management.
      3.Double click Local Users and Groups, double click the folder Users.
      4.Right click on the account name that is locked out, and click on Set Password.
      5.You may get a warning message about changing the password, simply click proceed.
      6.Leave the New Password box blank, also leave the Confirm Password box blank.
      7.Click OK, and OK again.
      8.Then close all Windows, reboot the system and try to log in.


      There are also applications that can recover the password for you.
      The following companies provide these applications at a cost.
      iOpus® Password Recovery XP here.
      LostPassword.com, here.
      Asterisk Password Recovery XP v1.89 here.
      Windows XP / 2000 / NT Key here.


      If the above information does not help in recovering the password, the only option left is to
      format the hard drive then reinstall Windows and the system software.
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Calculating Offsets

       Calculating Offsets

      Introduction

      This tutorial is more of a tip than a tutorial. It just explains how to calculate offsets for jumps and calls within the program you are patching.

      Types of Jumps/Calls

      Here I will just describe the different types of jumps and calls which you will come across:

      Short Jumps
      Short jumps be they conditional or unconditional jumps are 2 bytes long (or 1 nibble if your Californian ;-). These are relative jumps taken from the first byte after the two bytes of the jump. Using short jumps you can jump a maximum of 127 bytes forward and 128 bytes backwards.

      Long Jumps
      Long jumps if they are relative are 6 bytes long for conditional jumps and are 5 bytes long for unconditional jumps. For conditional jumps 2 bytes are used to identify that it is a long jump and what type of jump (je, jg, jns etc) it is. The other 4 bytes are used to show how far away the target location is relative to the first byte after the jump. In an unconditional jump only 1 byte is used to identify it as a long unconditional jump and the other 4 are used to show it's target's relative position, as with the conditional jumps.

      Calls
      There are two different types of calls which we will use. The normal type of call works the same as the long jumps in that it is relative to it's current position. The other type gives a reference to a memory location, register or stack position which holds the memory location it will call. The position held by the later is direct e.g. the memory location referenced may contain 401036h which would be the exact position that you would call, not relative to the position of the call. The size of these types of calls depends on any calculations involved in the call i.e. you could do: 'call dword ptr [eax * edx + 2]'. Long jumps can also be made using this method, but I didn't say that earlier as to avoid repetition.

      Tables
      Here is a brief list of all the different types of jumps/calls and their appropriate op-codes. Where different jumps have the same Op-Codes I have grouped them:

      Jump Description Short Op-Code Long Op-Code
      call procedure call E8xxxxxxxx N/A
      jmp u nconditional jump EBxx E9xxxxxxxx
      ja/jnbe jump if above 77xx 0F87xxxxxxxx
      jae/jnb/jnc jump if above or equal 73xx 0F83xxxxxxxx
      jb/jc/jnae jump if below 72xx 0F82xxxxxxxx
      jbe/jna jump if below or equal 76xx 0F86xxxxxxxx
      jcxz/jecxz jump if cx/ecx equals zero E3xx N/A
      je/jz jump if equal/zero 74xx 0F84xxxxxxxx
      jne/jnz jump if not equal/zero 75xx 0F85xxxxxxxx
      jg/jnle jump if greater 7Fxx 0F8Fxxxxxxxx
      jge/jnl jump if greater or equal 7Dxx 0F8Dxxxxxxxx
      jl/jnge jump if less 7Cxx 0F8Cxxxxxxxx
      jle/jng jump if less or equal 7Exx 0F8Exxxxxxxx
      jno jump if not overflow 71xx 0F81xxxxxxxx
      jnp/jpo jump if no parity/parity odd 7Bxx 0F8Bxxxxxxxx
      jns jump if not signed 79xx 0F89xxxxxxxx
      jo jump if overflow 70xx 0F80xxxxxxxx
      jp/jpe jump if parity/parity even 7Axx 0F8Axxxxxxxx
      js jump if sign 78xx 0F88xxxxxxxx



      Calculating Offsets (finding in the xx's in table)


      You will need to be able to calculate offsets when you add jumps and make calls within and to the code you have added. If you choose to do this by hand instead of using a tool then here are the basics:

      For jumps and calls further on in memory from your current position you take the address where you want to jump/call and subtract from it the memory location of the next instruction after your call/jump i.e.:

      (target mem address) - (mem location of next instruction after call/jump)

      Example
      If we wanted to jump to 4020d0 and the next instruction *after* the jump is at location 401093 then we would use the following calculation:

      4020d0 - 401093 = 103d

      We then write the jump instruction in hex as e93d100000 where e9 is the hex op-code for a long relative jump and 3d100000 is the result of our calculation expanded to dword size and reversed.

      For jumps and calls to locations *before* the current location in memory you take the address you want to call/jump to and subtract it from the memory location of the next instruction after your call/jump, then subtract 1 and finally perform a logical NOT on the result i.e.

      NOT(mem address of next instruction - target mem address - 1)

      Example
      If we wanted to call location 401184 and the address of the next instruction after the call is 402190 then we do the following calculation:

      NOT(402190 - 401184 - 1 ) = ffffeff4

      We can then write our call instruction in hex as e8f4efffff where e8 is the hex op-code for relative call and f4efffff is the result of the calculation in reverse order.

      If you want to practice with different examples then the best way to do this is to use a disassembler like WDASM which shows you the op-codes and try and work out the results yourself. Also as an end note you don't have to perform these calculations if you have enough room to make your jump or call instruction into an absolute jump call by doing the following as represented in assembler:

      mov eax, 4020d0
      call eax (or jmp eax)

      Final Notes

      Make life easier and use a program to do this ;-)Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Bulk Editing of Zip,Rar or mp3 Format

      Bulk Editing of Zip,Rar or mp3 Format


      You have just download a new album or game
      but all the files are .xxx and you need them to be
      zip's, rar's, mp3's etc.....
      then do the following

      -create a new folder
      -put all the files needing editing in the new folder
      -then goto "run" in the start menu
      -type in CMD and click ok

      -the next thing needs a few bits of old dos commands
      -you need to navagate CMD to the folder where the files are
      -you can do this by 1st getting the total address of the folder
      -and then typing it in cmd with a "cd" in front
      QUOTE
      cd c:\xxx\yyy\ccc\

      once you in the folder where the files are you can move on
      nb: u can check  in the right folder by typing dir to get a list of files

      -now type in....
      QUOTE
      rename *.* *.zip

      Nb : change the zip to what ever the extention needs to be (.rar, .mp3 etc)all done you should  now change the .* to what ever you needed and exit CMD type in "exit".
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Boot Winxp Fast

      Boot Winxp Fast

      Follow the following steps

      1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
      2. From the Start menu, select "Run..." & type "gpedit.msc".
      3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
      4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
      5. Click "OK", "Apply" & "OK" once again to exit.
      6. From the Start menu, select "Run..." & type "devmgmt.msc".
      7. Double click on "IDE ATA/ATAPI controllers"
      8. Right click on "Primary IDE Channel" and select "Properties".
      9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
      10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
      11. Reboot your computer.
      Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    Boot Block Recovery For Free

      Boot Block Recovery For Free


      You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:

      AWARD Bootblock recovery:

      That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).

      The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).

      These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it's valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.

      You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected "so to speak" and Bootblock recovery is activated.

      Sometimes, any combination of the high address pins won't work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you're not comfortable with "hot flashing" or "replacement BIOS".

      But to avoid further damage to your chip if you're not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.

      But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).

      About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I'm pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.

      AMIBIOS Recovery bootblock:
      1. Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.
      2. Insert the floppy in your system's floppydrive.
      3. Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.
      4 . Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.

      Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it's quite safe):
      CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.
      CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.
      CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok
      Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).
      Boot Block Recovery for FREE

      ************************************************
      BLACKOUT Flashing
      *************************************************

      Recovering a Corrupt AMI BIOS chip
      With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified. When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor. The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.

      AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state. The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins. If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on. The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.

      Recovering a Corrupt AWARD BIOS
      With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file. The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.

      · Create a bootable floppy diskette
      · Copy the BIOS file and flash utility to the diskette
      · Create an text file with any standard text editor and add the following lines

      @ECHO OFF
      FLASH763 BIOSFILE.BIN /py

      In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using. You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help screen. The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.Source URL: http://gbejadacosta.blogspot.com/2010/11/
      Visit Gbejada Costa for Daily Updated Hairstyles Collection

    50 Free Apps We're Most Thankful For

    My Ping in TotalPing.com

    Blog Archive