Kamis, 29 Januari 2009

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS
 
DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.
 
Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:
 
Using a manufacturers backdoor password to access the BIOS
 
Use password cracking software
 
Reset the CMOS using the jumpers or solder beads.
 
Removing the CMOS battery for at least 10 minutes
 
Overloading the keyboard buffer
 
Using a professional service
 
Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.
 
Backdoor passwords
Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.
 
WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords
 
Award BIOS backdoor passwords:
 
ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598
 
AMI BIOS backdoor passwords:
 
AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO
 
PHOENIX BIOS backdoor passwords:
 
Phoenix, PHOENIX, CMOS, BIOS
 
MISC. COMMON PASSWORDS
 
ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj
 
OTHER BIOS PASSWORDS BY MANUFACTURER
 
Manufacturer Password
VOBIS & IBM Merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba
 
TOSHIBA BIOS
 
Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot
 
IBM APTIVA BIOS
Press both mouse buttons repeatedly during the boot
Password cracking software
 
The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.
 
Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS
 
Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings
Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.
 
Removing the CMOS Battery
 
The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.
 
Overloading the KeyBoard Buffer
 
On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.
 
Jumping the Solder Beads on the CMOS
 
It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.
 
Using a professional service
 
If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.
 
FREE Animations for your email - by IncrediMail! Click Here!

Get unlimited bandwidth from your host for free

NOTE: This applies only to specific hosting companies, due to the
Specific setup needed and does have its drawbacks.
 
While setting up hosting space with a specific company I often deal
With, I noticed that they used a shared IP. (IP shared by two or more
Websites/domains.) Well, the rates for unlimited bandwidth were
Around $50+ per month, which I found unreasonable. I didn't require
Much space, and didn't want to be limited to a mere 3 gig of traffic
Per month.
 
Back on track... When setting up the acct, the hosting company needs
To know the domain name so that they can direct it accordingly.
(example: 'http://WWW.123.4.567.890/~user1/ ,
'http://WWW.123.4.567.890/~user2/ etc)
 
At this point you can give a URL that doesn't belong to you at all. As
Long as the nameservers don't change, that should have absolutly no
Negative effects on you or your site whatsoever.
 
How it works is this:
The host propogates you a certain amount space on its servers, and
Monitors the traffic that enters their space through the domain its
Registered under. Being that the domain isn't connected to the site
At all, it registers ZERO traffic.
 
Zero traffic registered = can't possibly go over bandwidth
Restrictions
Can't possibly go over bandwidth restrictions = free unlimited
Bandwidth
 
Now the problems with this (besides the ethical ones) is that your
Host may offer X amount of mail addys with the acct
(
you@y...) and these will not work, as the name isnt on their
DNS. However, some domain companies allow you to set it up
Regardless. Another problem seems to be strictly cosmetic, but can be
Highly problematic... Once you attach the domain you want onto the
Site, each page comes up/w the ip/UN the host propagated to your
Acct. Its at this point where you have to have a phenominal 10-15
Character alphanumerical or better (#, &, etc) pw, or your site will
Be vulnerable to attack since the attacker already has your UN. This
Only gives attackers a slight advantage as the amount of time it
Would take to brute force a 10 character pw @ a rate of 1,000,000 per
Second is 10 years. Add numbers and case sensitivity to that and it
Becomes approx 26,980 years.
 
While I'm on it, I may as well add that if you use this method,
Obviously you are going to be using the lowest cost hosting plan
Available, which in turn will offer the least amount of space. That's
Why free hosts were invented.
 
Free hosts suck as a general rule. Who wants a site smothered in ads?
However, if you upload all your programs, graphics and other large
Files (have a backup of course) to a reliable free host and target
Them accordingly from your site you have just freed up a signifigant
Amount of space. The only setback/w this is having to keep an index
Card or file around/w your pws, as you should never use the same one
Twice, and want to use complicated ones.
FREE Animations for your email - by IncrediMail! Click Here!

Selasa, 27 Januari 2009

Widget untuk Blog

Widget untuk Blog

Ada bermacam cara untuk mempercantik tampilan dari blog yang kita punya, mulai dari menambahkan kalender, jam dan masih banyak lagi. Untuk mencari Rupiah atau dollar biasanya diblog kita pasang adsense atawa iklan berupa banner, tapi yang akan kita bahas di sini yaitu widgetnya saja.

Adapun beberapa widget yang bisa kita gunakan untuk mempercantik blog kita, diantaranya :

1. Web counter
Web counter merupakan salah satu component yang sangat penting, dimana dengan Webcounter kita bias melihat berapa pengunjung yang datang ke blog kita.
berikut link yang menyediakan web counter www.easycounter.com.
Caranya :
• kamu masuk ke www.easycounter.com
• trus disitu ada form isian , kamu isikan data-data yang diminta, biasanya ada juga tampilan counter yang bias dipilih.
• setelah selesai kamu ambil coding htmlnya.

2. Rank

Rank biasanya buat nampang para blogger, unjuk gigi lah bahasa kerennya, dimana dengan rank ini kita bias mengetahui page range blog kita.
Beberapa page rank yang bias digunakan :
• Alexa www.alexa.com
• Technocrati www.technocrati.com
• Google Page rank www.pagerank.net

3. Recent Visitor dan My Community

Recent Visitor atawa my community merupakan component yang akan menampilkan siapa saja yang pernah berkunjung ke blog kita. Beberapa link yang menyediakan fasilitas tersebut :
• www.bloglog.com
• www.blogcatalog.com

4. Animator Headlines

Animator headlines merupakan fasilitas dari feedburner, dimana denganini kita bias menampilkan judul postingan yang pernah kita posting dalam bentuk animasi, biasanya ukurannya 468 x 60 berupa banner. Tapi bagu juga seperti yang kamu lihat diatas postingan ini.
Berikut link yang menyediakan Headline Animador www.feedburners.com


5. Langganan Artikel blog

Langganan article blog merupakan fasilitas yang memanjakan penggemar blog kamu, sehingga mereka bias mendapatkan postingan yang kamu publish di Blog langsung ke emailnya.
Link yang kamu bisa kunjungi www.feedburners.com

6. Trafic Blog

Trafic blog merupakan fasilitas yagn menyediakan trafik dib log kita, siapa saja yang berkunjung ke blog kita. Tampilannya seperti di samping kanan blog ini.
Linknya sebagai berikut : www.feedj.com atau kalau kamu ga mau pusing-pusing klik aja get feedj ! di traffic blog ini.

7. Tag board /Chat board

Tag board/chat board merupakan component yang musti ada, buat para penggemar blog kita, tampilannya seperti chat here bagian sasamping blog ini.
Kamu bisa mendapatkannya di lnk berikut
• www.shutmix.com
• www.tagboard.com

yach mungkin ini saja dulu widget yang bisa saya paparkan disini, kurang dan lebihnya mohon maaf, tunggu widget-widget berikutnya…

Keep smile bro …




Senin, 26 Januari 2009

16 Alterrnatif Mendapat Dollar di Internet

Ada Banyak penyedia provider yang menyediakan program-program Affiliate. Referral dan Adsense, berikut ini akan saya rincikan beberapa dari program-program tersebut.

1. Komisi Gratis.com
Komisi gratis merupakan program sejenis MLM tapi bedanya tidak perlu beli produk atawa keluar uang alias GRATIS!!!, setiap yang kamu refferensikan kamu akna mendapat Rp.25,-, untuk lebih lengkapnya kamu bias langsung daftar
Disini

2. Ide Bagus.com
Ide bagus.com merupakan penydia layanan webhosting, domain name dan sejenisnya, tapi klo kamu sebagai referral juga bias tanpa harus membeli produk mereka, sehingga kalau kamu dapat mereferensikan kepada orang lain dan orang klain itu membeli produk Ide Bagus.com, kamu bias mendapatkan komisi. Untuk daftar
Klik Disini

3. Reviewmu.com
Reviewmu.com menyediakan Refferal artinya klo kamu bias mereferensikan orang dan daftar kamu dapat dollare deh. Klik Disini Klo mo daftar

4. 000Webhosting
000 Webhosting merupakan penyedia Webhosting domain name dan sejenisnya hamper sama dengan Ide Bagus.com, Cuma jangan ditanya 000webhosting ini sudah sangat terkenal di para netter. Klo mo daftar jadi referral Klik Disini

5. Hyperwebenable.com
Hyperwebenable.com merupakan Converter dari Blog ke .com atawa .net gratis Loh !!!, so klo kamu mau daftar Klik Disini


6. Bidvertis
Bidcertis merupakan jasa advertising asing, untuk lebih jelasnya kamu bisa langsung ke websitenya Bidvertis Website

7. Box to.com
Nah ini yang paling bergengsi, kamu klak klik di iklan dapat duit, gak usah panjang lebar buruan daftar Klik Disini

8. Klik Rupiah.com
Klik rupiah.com sama dengan Bux to, Cuma yang ini local alias buatan Indonesia, jadi apabila kamu berminat sok lah tinggal Klik Disini

9. usfreeads.com
Ini saya saja baru dapat kemarin, program referral asing jadi langsung aja kunjungi websitenya Klik Disini

10. Kumpul Blogger.com
Klo yang ini wajib lah bagi para Blogger selain sebagai ajang Promosi Blog, juga sebaga sarana meraup rupiah, so langsung saja
Klik Disini

11. salehoo.com
Salehoo.com merupakan program referral asing, jadi langsung saja klik Klik Disini

12. Adsensecomp.com
Adsensecomp merupakan adsense local, klo kamau mau pasang diblog kamu silahkan copy-paste coding berikut


13. ppcindo.com
PPC Indo sama dengan adsensecamp, jadi klo mo pasang diblog silahkan copypaste coding berikut :


14. ppcinbox.com
Ppc Inbox sama dengan ppcindo, jadi langsung saja copy paste codingnya :


15. Adbride
Adbride merupakan advertising asaing klo mo gabung jadi refferalnya silahkan copy paste coding berikut


16. Homepages Friends
Yang ini lumayan menguntungkan kita jadikan Homepages friend sebagai search engine, tipa kita searcing pake Homepages kita dapat dollar Klik Disini untuk daftar

Sebenarnya masih banyak program-program Refferal, Affiliate dan Adsense lainnya, lain waktu saya informasikna kembali.
Sukses selalu untuk para Netter-netter sejati.. Keep Smile bro …







Tip dan Trik SMS Murah

Best Service of the Month Award - Majalah Sinyal edisi Mei 2006 Produk Smart Messenger berhasil mendapatkan award Best Service of the Month dari Majalah Sinyal untuk edisi bulan Mei 2006. Penghargaan ini menjadi bukti pengakuan kepada produk Smart Messenger sebagai suatu terobosan baru solusi mobile messagging yang hemat biaya & juga membuka peluang usaha.
Berikut artikel lengkapnya:
SMS Murah Rp. 10/SMS
Berapa kali anda berkirim SMS tiap bulan? Jika anda termasuk pecinta SMS, biaya pulsa Anda bisa sangat hemat dengan Smart Messenger. Berkirim SMS memang asyik. Bisa di jawab kapan saja, dan lebih murah. Namun, dengan biaya Rp. 350 sekali kirim dan batasan 160 karakter, tidaklah anda ingin mencoba cara lain yang lebih murah? Para programmer jagoan Indonesia ternyata mampu mengembangkan sebuah aplikasi yang mengoptimalkan pemakaian GPRS. Disebut Smart Messenger, aplikasi Java ini bisa menjadi aplikasi kunci untuk mengoptimalkan GPRS, karena mampu berkirim SMS/e-mail dengan cepat dan murah. Mulai dari Rp. 10 per SMS atau e-mail (tergantung tariff GPRS operator) dan 1000 karakter sekali kirim, tentu sebuah tawaran yang menarik bukan? Aplikasi ini berbasis Java, karena banyak ponsel kelas bawah saat ini sudah mendukung Java dan GPRS. Untuk sesama pemakai (member) berkirim sms atau email adalah gratis, berapapun banyaknya. Jadi pemakai hanya akan terkena tariff GPRS per KB. Sebagai informasi, SMS atau e-mail dengan 1000 karakter, besarnya sekitar 1KB. Enaknya, Anda tetap bisa berkirim SMS ke luar anggota, dengan tariff yang sangat miring, yaitu Rp. 1 (XL), Rp. 50 (IM3/As), dan Rp. 125 (lainnya). Jadi misalnya nomor Anda XL dan mengirim SMS ke non-anggota, maka hanya akan terkena charge Rp. 1 + Rp. 25 (GPRS) = Rp. 26. Setiap anggota akan mendapatkan mailbox yang dapat di akses lewat ponsel. Hebatnya, e-mail ini tak perlu di-download seperti saat anda punya e-mail di Hotpop atau Gmail, tapi otomatis akan terkirim dengan cepat ke ponsel (push e-mail), begitu terkoneksi via GPRS. Blackberry dan Ventus telah mendapat pesaing yang cerdas dan murah. Pesan SMS atau e-mail ini bisa disimpan di ponsel, dan kapasitasnya bisa di tentukan sendiri sampai ribuan pesan. Ditambah fasiltias chatting (forum) berbasis GPRS, maka komunikasi murah bisa dinikmati. Berikutnya, akan disiapkan pula fungsi getar untuk pesan masuk, berkirim SMS terjadwal (scheduler) dan file attachment.
Syarat pertama adalah ponsel yang mendukung Java dan GPRS. Untuk memulai, aktifkan GPRS, instalasi dan setting Smart Messenger sesuai tahapan di bawah. Sayangnya, aplikasi ini hanya bisa diaktifkan lewat sistem MLM, butuh seorang upline untuk menjadikan kita member. Ini karena memerlukan demo dan aktifasi GPRS, yang masih menjadi kesulitan bagi banyak orang awam. Jadi anda mesti membeli lewat seseorang yang sudah memakai Smart Messenger. Cara-cara berikut ini akan membuat kantong Anda tambah tebal.
SMS Murah dengan MLM Multi Level Marketing (MLM) memang marak dan umumnya menggiurkan. Namun banyak juga cerita-cerita “miring” menyangkut etika dan praktiknya. Layanan Smart Messenger ini menawarkan tidak hanya sekedar metode MLM tetapi juga solusi teknologi murah yang dapat menjadi alternatif. Setidaknya, ada beberapa pilihan dan konsekuensi saat kita menggunakan layanan via ponsel. Pertama, menggunakan fitur telepon yang gampang tetapi tentu saja mahal. Kedua, menggunakan fitur SMS. Fasilitas “seribu umat” ini memang terkenal murah dan fimiliar di kalangan masyarakat. Tetapi, orang cenderung mengirim SMS banyak-banyak karena terbatas 160 karakter setiap sekali pengiriman SMS. Jika dihitung-hitung, tetap saja biaya SMS jatuhnya mahal. Ketiga, menggunakan fasilitas GPRS bagi ponsel yang sudah diperkaya dengan fasilitas GPRS. Langkah yang ketiga tersebut memang sulit karena harus men-setting terlebih dahulu fasilitas GPRS di ponsel, di samping menyesuaikan setting-an layanan via GPRS masingmasing operator. Namun, kesulitan itu sebanding dengan hasil yang diperoleh. Coba bayangkan, untuk SMS saja, per 1000 karakter hanya memakan kurang dari 1KB. Padahal, operator-operator hanya memator harga Rp. 5-30 per kilobyte. Layanan dengan metode inilah yang diselenggarakan oleh Smart Messenger ini. Ternyata komunikasi menggunakan teknologi GPRS menawarkan harga yang jauh lebih murah. Mengapa teknologi ini kurang mendapat minat masyarakat ? Menurut Rimson dari PT. Smart Multi Solusi, alasan utama mengapa masyarakat kurang familiar dengan teknologi ini adalah kurangnya edukasi masyarakat soal teknologi ini. Selengkapnya tentang keunggulan ber SMS atau e-mail lewat layanan ini dapat anda simak pada rubrik Optimal di edisi ini.Dua Keuntungan Kehadiran Smart Messenger diklaim tidak menyaingi eksistensi operator tetapi mendukung operator beserta layanan karena program SMS generasi baru tetap menggunakan layanan GPRS operator. Dari sisi marketing, keberadaan Smart Messenger juga menjadi angin segar untuk mennagguk untuk di lading pertelekomunikasian yang sarat akan revenue. Dengan ikut dalam sistem marketing Smart Messenger, paling tidak kita mendapat dua keuntungan pokok, yaitu pertama, mendapatkan layanan SMS generasi baru yang sangat murah. Kedua, dengan program member get member, anggota mendapat komisi lebih dari tiap downline (anggota baru) yang berhasil didapatkan. Smart Messenger menggunakan sistem penjualan menyerupai sistem Multilevel Marketing. Program yang dinamakan Smart Link ini memungkinkan anggota (upline) menarik anggota baru (downline). Untuk setiap downline yang direferensikan ke Smart Link, member akan mendapatkan tambahan komisi. Perusahaan akan memberi komisi sampai keturunan ke-7 secara berjenjang.


Cukup 22 Ribu Untuk menjadi anggota Smart Messenger, orang yang berminat harus direferensikan oleh orang yang sudah terdaftar menjadi anggota. Maka, setiap kali mau masuk, calon anggota pasti ditanya siapa yang mereferensikannya. Hal ini tentu akan semakin menguntungkan bagi mereka yang sudah menjadi anggota dan mereferensi anggota baru karena komisinya akan semakin bertambah. Untuk menjadi anggota Smart Messenger, calon anggota yang sudah direferensi oleh upline tinggal membayar 50 ribu. Paket “gocap” itu terdiri dari biaya keanggotaan 20 ribu + Ppn 10% dan “pulsa” GPRS 28 ribu untuk berkomunikasi baik dengan non-anggota. Saat ini cara pembayaran bisa dilakukan secara langsung di kantor PR. Smar Multi Solusi atau dengan cara transfer via rekening BCA. Setelah itu, pihak Smart Messenger akan menyediakan fasiltas training sistem teknologi dan marketing bagi anggota baru. Langkah bisnis ini tetap bersifat fakultatif. Artinya, Anda tidak perlu masuk dalam link bisnis-nya jika memang tidak berminat. Tetapi, langkah memaksimalkan kinerja GPRS untuk mendapat layanan komunikasi yang lebih murah adalah suatu hal yang perlu dilirik.
Beberapa criteria Multi Level Marketing yang baik :
1. Produk mempunyai manfaat lebih dari harganya
2. Sistem MLM sederhana dan tidak berbelit-belit
3 . Member yang ingin berhenti dapat keluar tanpa beban kompensasi macam-macam.
Untuk informasi lebih jelas dan lengkap mengenai sms murah
Silahkan kunjungi : http://www.p-messenger.info
diambil dari
http://www.masterpaketdownload.com


Tip dan Trik SMS Murah

Best Service of the Month Award - Majalah Sinyal edisi Mei 2006 Produk Smart Messenger berhasil mendapatkan award Best Service of the Month dari Majalah Sinyal untuk edisi bulan Mei 2006. Penghargaan ini menjadi bukti pengakuan kepada produk Smart Messenger sebagai suatu terobosan baru solusi mobile messagging yang hemat biaya & juga membuka peluang usaha.
Berikut artikel lengkapnya:
SMS Murah Rp. 10/SMS
Berapa kali anda berkirim SMS tiap bulan? Jika anda termasuk pecinta SMS, biaya pulsa Anda bisa sangat hemat dengan Smart Messenger. Berkirim SMS memang asyik. Bisa di jawab kapan saja, dan lebih murah. Namun, dengan biaya Rp. 350 sekali kirim dan batasan 160 karakter, tidaklah anda ingin mencoba cara lain yang lebih murah? Para programmer jagoan Indonesia ternyata mampu mengembangkan sebuah aplikasi yang mengoptimalkan pemakaian GPRS. Disebut Smart Messenger, aplikasi Java ini bisa menjadi aplikasi kunci untuk mengoptimalkan GPRS, karena mampu berkirim SMS/e-mail dengan cepat dan murah. Mulai dari Rp. 10 per SMS atau e-mail (tergantung tariff GPRS operator) dan 1000 karakter sekali kirim, tentu sebuah tawaran yang menarik bukan? Aplikasi ini berbasis Java, karena banyak ponsel kelas bawah saat ini sudah mendukung Java dan GPRS. Untuk sesama pemakai (member) berkirim sms atau email adalah gratis, berapapun banyaknya. Jadi pemakai hanya akan terkena tariff GPRS per KB. Sebagai informasi, SMS atau e-mail dengan 1000 karakter, besarnya sekitar 1KB. Enaknya, Anda tetap bisa berkirim SMS ke luar anggota, dengan tariff yang sangat miring, yaitu Rp. 1 (XL), Rp. 50 (IM3/As), dan Rp. 125 (lainnya). Jadi misalnya nomor Anda XL dan mengirim SMS ke non-anggota, maka hanya akan terkena charge Rp. 1 + Rp. 25 (GPRS) = Rp. 26. Setiap anggota akan mendapatkan mailbox yang dapat di akses lewat ponsel. Hebatnya, e-mail ini tak perlu di-download seperti saat anda punya e-mail di Hotpop atau Gmail, tapi otomatis akan terkirim dengan cepat ke ponsel (push e-mail), begitu terkoneksi via GPRS. Blackberry dan Ventus telah mendapat pesaing yang cerdas dan murah. Pesan SMS atau e-mail ini bisa disimpan di ponsel, dan kapasitasnya bisa di tentukan sendiri sampai ribuan pesan. Ditambah fasiltias chatting (forum) berbasis GPRS, maka komunikasi murah bisa dinikmati. Berikutnya, akan disiapkan pula fungsi getar untuk pesan masuk, berkirim SMS terjadwal (scheduler) dan file attachment.
Syarat pertama adalah ponsel yang mendukung Java dan GPRS. Untuk memulai, aktifkan GPRS, instalasi dan setting Smart Messenger sesuai tahapan di bawah. Sayangnya, aplikasi ini hanya bisa diaktifkan lewat sistem MLM, butuh seorang upline untuk menjadikan kita member. Ini karena memerlukan demo dan aktifasi GPRS, yang masih menjadi kesulitan bagi banyak orang awam. Jadi anda mesti membeli lewat seseorang yang sudah memakai Smart Messenger. Cara-cara berikut ini akan membuat kantong Anda tambah tebal.
SMS Murah dengan MLM Multi Level Marketing (MLM) memang marak dan umumnya menggiurkan. Namun banyak juga cerita-cerita “miring” menyangkut etika dan praktiknya. Layanan Smart Messenger ini menawarkan tidak hanya sekedar metode MLM tetapi juga solusi teknologi murah yang dapat menjadi alternatif. Setidaknya, ada beberapa pilihan dan konsekuensi saat kita menggunakan layanan via ponsel. Pertama, menggunakan fitur telepon yang gampang tetapi tentu saja mahal. Kedua, menggunakan fitur SMS. Fasilitas “seribu umat” ini memang terkenal murah dan fimiliar di kalangan masyarakat. Tetapi, orang cenderung mengirim SMS banyak-banyak karena terbatas 160 karakter setiap sekali pengiriman SMS. Jika dihitung-hitung, tetap saja biaya SMS jatuhnya mahal. Ketiga, menggunakan fasilitas GPRS bagi ponsel yang sudah diperkaya dengan fasilitas GPRS. Langkah yang ketiga tersebut memang sulit karena harus men-setting terlebih dahulu fasilitas GPRS di ponsel, di samping menyesuaikan setting-an layanan via GPRS masingmasing operator. Namun, kesulitan itu sebanding dengan hasil yang diperoleh. Coba bayangkan, untuk SMS saja, per 1000 karakter hanya memakan kurang dari 1KB. Padahal, operator-operator hanya memator harga Rp. 5-30 per kilobyte. Layanan dengan metode inilah yang diselenggarakan oleh Smart Messenger ini. Ternyata komunikasi menggunakan teknologi GPRS menawarkan harga yang jauh lebih murah. Mengapa teknologi ini kurang mendapat minat masyarakat ? Menurut Rimson dari PT. Smart Multi Solusi, alasan utama mengapa masyarakat kurang familiar dengan teknologi ini adalah kurangnya edukasi masyarakat soal teknologi ini. Selengkapnya tentang keunggulan ber SMS atau e-mail lewat layanan ini dapat anda simak pada rubrik Optimal di edisi ini.Dua Keuntungan Kehadiran Smart Messenger diklaim tidak menyaingi eksistensi operator tetapi mendukung operator beserta layanan karena program SMS generasi baru tetap menggunakan layanan GPRS operator. Dari sisi marketing, keberadaan Smart Messenger juga menjadi angin segar untuk mennagguk untuk di lading pertelekomunikasian yang sarat akan revenue. Dengan ikut dalam sistem marketing Smart Messenger, paling tidak kita mendapat dua keuntungan pokok, yaitu pertama, mendapatkan layanan SMS generasi baru yang sangat murah. Kedua, dengan program member get member, anggota mendapat komisi lebih dari tiap downline (anggota baru) yang berhasil didapatkan. Smart Messenger menggunakan sistem penjualan menyerupai sistem Multilevel Marketing. Program yang dinamakan Smart Link ini memungkinkan anggota (upline) menarik anggota baru (downline). Untuk setiap downline yang direferensikan ke Smart Link, member akan mendapatkan tambahan komisi. Perusahaan akan memberi komisi sampai keturunan ke-7 secara berjenjang.
Cukup 22 Ribu Untuk menjadi anggota Smart Messenger, orang yang berminat harus direferensikan oleh orang yang sudah terdaftar menjadi anggota. Maka, setiap kali mau masuk, calon anggota pasti ditanya siapa yang mereferensikannya. Hal ini tentu akan semakin menguntungkan bagi mereka yang sudah menjadi anggota dan mereferensi anggota baru karena komisinya akan semakin bertambah. Untuk menjadi anggota Smart Messenger, calon anggota yang sudah direferensi oleh upline tinggal membayar 50 ribu. Paket “gocap” itu terdiri dari biaya keanggotaan 20 ribu + Ppn 10% dan “pulsa” GPRS 28 ribu untuk berkomunikasi baik dengan non-anggota. Saat ini cara pembayaran bisa dilakukan secara langsung di kantor PR. Smar Multi Solusi atau dengan cara transfer via rekening BCA. Setelah itu, pihak Smart Messenger akan menyediakan fasiltas training sistem teknologi dan marketing bagi anggota baru. Langkah bisnis ini tetap bersifat fakultatif. Artinya, Anda tidak perlu masuk dalam link bisnis-nya jika memang tidak berminat. Tetapi, langkah memaksimalkan kinerja GPRS untuk mendapat layanan komunikasi yang lebih murah adalah suatu hal yang perlu dilirik.
Beberapa criteria Multi Level Marketing yang baik :
1. Produk mempunyai manfaat lebih dari harganya
2. Sistem MLM sederhana dan tidak berbelit-belit
3 . Member yang ingin berhenti dapat keluar tanpa beban kompensasi macam-macam.
Untuk informasi lebih jelas dan lengkap mengenai sms murah
Silahkan kunjungi : http://www.p-messenger.info
diambil dari
http://www.masterpaketdownload.com




TELEPHONE GRATIS INTERNASIONAL Ke negara Cyprus ?

BUG TELKOMSEL & (FREE Phone ke-CYPRUS)

BUG TELKOMSEL -- kali ini akan saya jelaskan tentang suatu losting data

transfer yang terdapat pada simcard Telkomsel (Simpati / As / Hallo / Hoki ,dll).

Kenapa bisa terjadi? Kita akan bahas sebagai berikut dan juga contoh yang mungkin

bisa kita coba secara langsung.

Pertama-tama saya tujukan artikel ini semata mata sebagai bahan refrensi untuk

pihak

Telkomsel dan juga pengetahuan buat semua rekan-rekan di dunia maya untuk

bahan

tambahan pengetahuan tentang bug sistem telekomunikasi yang telah banyak

melanda

sejumlah vendor jasa komunikasi di Indonesia.

Pada artikel yang dulu pernah saya tulis tentang Bug Simcard Satelindo dengan SMS

Gratisnya ke sejumlah simcard code area wilayah jakarta. Dan hingga saat ini pihak

satelindo telah melakukan patching secara bagus hingga metode tersebut tidak

dapat

dilakukan lagi (good Job Satelindo).

Kita mulai >#_

Ada apa dengan Telkomsel? Yah itu yang menjadi pemikiran saya juga tadinya

hingga

mengakibatkan saya banyak melakukan ujicoba dengan simcardnya.

Sementara masih terdapat 2 bug yang saya temukan terdapat pada simcard

telkomsel

diantaranya:

1.FreeSMS Kesejumlah simcard code area daerah tertentu yang sistemnya hampir

sama dengan freeSMS yang terjadi pada pihak Satelindo dulu.

2.FreePHONE (Telphon gratis) yang sampai detik ini saya hanya menemukan bugnya

ke negara CYPRUS dengan kode area negara +357 .

Dibawah saya akan jelaskan lebih detil bug tersebut dan penggunaannya.

FreeSMS / SMS gratis

FreeSMS ke sejumlah simcard dengan kode simcard 081226*****

(simcard dengan code wilayah 26*****) kalau tidak salah code area jakarta.

Dengan bug terdapat pada sistem losting data transfers pada tiap melakukan

sms sending. (atau mungkin memang dari pihak telkomsel sengaja dibuka ? )

hingga dengan bug ini kita bisa manfaatkan sejumlah fasilitas sending sms

dengan semua format ke sejumlah simcard dengan kode area 26***** /

081226***** secara free /gratis.

Dengan cara sebagai berikut:

1.Simcard yang akan dipakai HARUS turunan Telkomsel (Simpati / As / Hallo / Hoki

,dll)

2.Tulis Sms seperti biasa dengan format bebas : D

3.Cara kirim sebagai berikut: (perhatikan – karena masih ditemukan pada code area

26*****)

http://www.masterpaketdownload.com © Yonathan SA - 2 -

TELEPHONE GRATIS INTERNASIONAL Ke negara Cyprus ?

•nomor tujuan misal 0812266523*
takut ntar

yang punya tahu n marah² ma penulis ? )

•jadi kita hanya tuliskan nomor tujuannya dengan cara : 2266523* <*nya ganti

dgn

angka aja atau terserah mau dicoba dengan nomor mana aja>

•dan kemudian … ? nice job .. terkirim juga kan….

•Bisa kita lakukan paling enak bila ga punya pulsa ? bisa lebih asik.

•Ingat … ceck sekali lagi pulsa anda bila tdk yakin… ? saya jamin ?

•Hanya bisa/berlaku di simcard turunan telkomsel saja.

Oke .. nice …

Note : BILA TRIK TERDAPAT LAPORAN PESAN FAILED/GAGAL BERARTI ADA 2

ARTIAN :

1) NOMOR YANG KITA TUJU TDK TERDAFTAR/TDK ADA

2) PIHAK TELKOMSEL TELAH MEMPATCHING SYSTEM INI

(KARENA TELAH SAYA PERNAH BAHAS DI FORUM #ECHO dalnet beberapa bulan lalu.

Trik ke 2

Dengan simcard turunan Telkomsel kita bisa melakukan telefon gratis ke negara

cyprus (kenapa cyprus? … heheh saat ini felling saya masih ke tahap “aneh” )

karena bug yang saya peroleh adalah kode area negara +357******** .

Ntah karena angin apa pihak Telkom dengan telkomselnya melakukan losting data

area ke negara Cyprus..? itu juga tersirat dalam fikiran saya. Dengan demikian

telephon secara free/tanpa biaya sepeserpun bisa kita lakukan. Hingga sampai

kapasitas bisa ngobrol dengan “bule” diluar negeri sana sepuas hati sampai

“kuping panas” (lumayan untuk latihan tofel/ cari cewek bule ).

Oke triknya seperti biasa:

1.Gunakan simcard turunan Telkomsel (Simpati / As / Hallo / Hoki ,dll).

2.Ceck terlebih dulu pulsa anda bila blum yakin, (DIJAMIN/garansi ?)

3.Ketik nomor telefon seperti biasa diawali dengan kode area tujuan negara

tadi… misal : +35799942026 / +35795621145 dll ? banyak sekali she … hampir

bisa dibilang semua nomor bisa kita hubungi FREE

4.Bila tdk terdapat nada tone berarti nomor tersebut blum dipasang/sedang

kena galian kabel telkom disana.

5.Dengarkan … apakah bisa … ? …





6.Nice .. crongatulation …

7.Telfonlah sampai kuping panas dan sampai bibir anda keriting .

Note: JANGAN LAKUKAN TRIK MENGGUNAKAN SIMCARD SELAIN TELKOMSEL!!

KARENA TRIK INI TIDAK BERFUNGSI PADA SIMCARD LAIN….

Dalam hal ini pihak telkomsel belum merasa dirugikan karena pihak telkomsel

tidak tahu hal ini atau memang pura² tidak tahu





Oke guest …

Semua artikel yang saya tulis adalah sebagai bahan referensi dan pengetahuan

tambahan saja bagi kita semua. Untuk pihak yang mencoba…

mohon jangan brutality yah .. ok.





Rahasia dan Trik Akses Internet Gratis

Pasti anda ingin bisa internet gratis, bisa nembus USA bisa hacking, cracking,
carding dari jauh, phreaking bahkan cari suami or istri, hehehe. Berikut adalah
peristiwa di jaman gua maseh suntuk.
Hahahahaa, pasti anda bingung kan!!! Bagaimana mungkin kita bisa acces internet
secara gratis apalagi tradisional, kok bisa? Karena alat yang membantu kali ini
hanyalah sebuah “KALENG”, mau modern pake aja parabola, tapi karena gua miskin
banget, makanya hanya pake’ kaleng aja (Wah ini kemampuan hacking yang
dihasilkan karena keterbatasan), Masih bingung lagi ‘kan, lha iya lah coz blom gue
jelasin kok berikut adalah penjelasan dari praktek lapangan kami, lho kok kami…
berarti banyak donk? Yah, memang betul coz perlu kerjasama minimal dua orang,
baca aja deh !!!
Pertama, anda harus membeli peralatan wireless LAN (WLAN) acces point, terserah
secara carding atawa dengan kejujuran! Tapi yang penulis sarankan adalah
sebaiknya anda meminjam WLAN acces point teman warnet anda, ‘kan klo gagal
tingal dikembalikin aja. Nah setelah itu barulah anda beraksi dengan tambahan
peralatan CPU dan monitor serta perlengkapan computer lainnya (udah tau, mas?)
Kedua, anda cari kaleng bunder ada alias bentuk tabung yang tutupnya dah nggak
ada karna bentuknya yang paling sesuai dengan hal ini. Kok bisa? Yah bisa aja
lageee! Lalu buatlah lubang di tengah permukaan dasar tersebut dan berilah dengan
menempelkan dalam lubang tersebut jack (alat penghubung) wireless LAN. Then
sambunglah jack wireless LAN dengan kabel antenna dan sambungkan ke acces
point. Trus-trus apalagi, sih? Setelah itu, sambungkan acces point tersebut dengan
kabel LAN dan sambungkan ke computer kamu. Eit jangan lupa letakkan antenna
kaleng tersebut diatas rumah atau yang cukup tinggi agar sinyal dapat terekam.
Nah, setelah itu barulah sedikit teknik hacking beraksi.

Ketiga, anda cari sinyal yang lewat di computer anda dengan menulis arp-a di
perintah start>run>command. Lalu jika belum ketemu? Jangan khawatir, hacker
ngak boleh menyerah coz baru sedikit keluarkan sedikit tekniknya. Coba anda puter
puter antenna kaleng yang anda taruh di atas rumah anda bersamaan dengan
pencarian arp-a di perintah command anda. Nah inilah diperlukan kerjasama antara
yang memutar kaleng dan orang yang mencari pelacakan tersebut. Belum juga kena
sinyal!!! Coba deh inget2 warnet yang paling dekat dengan kamu untuk diambil
koneksinya lalu arahkan ke warnet tersebut, coba deh?!? Klo belum lagee cari dan
download lah Netstumb di dunia yang fana ini, caranya dengan kata kunci Netstumb
di Google.



Nah setelah terkena sinyal tersebut letakkan dalam arah tersebut dan lindungilah
antenna tersebut dengan payung atau kerdus or yang sejenisnyauntuk melindungi
antenna tersebut dari pembalikkan arah oleh angin (Ini cuman tips tambahan dari
penulis). Barulah anda lakukan teknik selanjutnya! Dari yang anda lihat di dalam
arp-a tersebut lalu serasikan or samakan nomor DNS tersebut dalam computer kita.
Caranya start>settings>network connection dan lakukan seperti halnya membuat
jaringan LAN. Untuk IP dan gateway dicari informasinya lewat program Netstumb.
Setelah semuanya beres, barulah dari IP yang anda masukkan ke network
connection tersebut anda konnekkan ke internet explorer. Nah untuk sementara itu
internet sudah bisa berjalan tapi hanya bisa untuk WLAN & belum maksimal. Dari IP
tersebut didapatlah halaman page berisi data-data dari sinyal yang anda dapatkan.

Nah untuk mencari data-data tersebut yang anda butuhkan adalah program
Netstumb yang telah penulis sebutkan diatas. Lalu, ketikkan tuh di page tersebut.
Setelah itu akan ada pe-restart-an computer untuk menyesuaikan konfigurasi yang
telah kita masukkan ke dalam computer tersebut. Tunggu beberapa menit dan...
ding dong acces pun dapat berjalan lancar. Anda pun dapat berselancar ria. But
untuk agar tidak terlacak oleh pihak warnet, sebaiknya yang anda lakukan adalah
mainlah internet pada malam hari saat warnet tersebut molor dan para hacker biasa
nongol. Dan anda pun bisa ber FAQ ama yang lebih pinter dari gua.
diambil dari : http://www.masterpaketdownload.com © Yonathan SA


Senin, 19 Januari 2009

Closing Open Holes

Closing Open Holes
September 27, 2000
By Ankit Fadia

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked.

This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system.

Open Ports: A Threat to Security?

In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well, anyhow, before I move on, I would like to quickly recap the important part. So here goes, straight from the netstat tutorial:

Now, the ??a? option is used to display all open connections on the local machine. It also returns the remote system to which we are connected to, the port numbers of the remote system we are connected to (and the local machine) and also the type and state of connection we have with the remote system.

For Example,

C:\windows>netstat -a

Active Connections

Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED
TCP ankit:1036 dwarf.box.sk:ftp-data TIME_WAIT
TCP ankit:1043 banners.egroups.com:80 FIN_WAIT_2
TCP ankit:1045 mail2.mtnl.net.in:pop3 TIME_WAIT
TCP ankit:1052 zztop.boxnetwork.net:80 ESTABLISHED
TCP ankit:1053 mail2.mtnl.net.in:pop3 TIME_WAIT
UDP ankit:1025 *:*
UDP ankit:nbdatagram *:*


Now, let us take a single line from the above output and see what it stands for:

Proto Local Address Foreign Address State
TCP ankit:1031 dwarf.box.sk:ftp ESTABLISHED

Now, the above can be arranged as below:

Protocol: TCP (This can be Transmission Control Protocol or TCP, User Datagram Protocol or UDP or sometimes even, IP or Internet Protocol.)

Local System Name: ankit (This is the name of the local system that you set during the Windows setup.)

Local Port opened and being used by this connection: 1031

Remote System: dwarf.box.sk (This is the non-numerical form of the system to which we are connected.)

Remote Port: ftp (This is the port number of the remote system dwarf.box.sk to which we are connected.)

State of Connection: ESTABLISHED

?Netstat? with the ??a? argument is normally used, to get a list of open ports on your own system i.e. on the local system. This can be particularly useful to check and see whether your system has a Trojan installed or not. Yes, most good Antiviral software are able to detect the presence of Trojans, but, we are hackers, and need to software to tell us, whether we are infected or not. Besides, it is more fun to do something manually than to simply click on the ?Scan? button and let some software do it.

The following is a list of Trojans and the port numbers which they use, if you Netstat yourself and find any of the following open, then you can be pretty sure, that you are infected.



Port 12345(TCP) Netbus
Port 31337(UDP) Back Orifice

For complete list, refer to the Tutorial on Trojans at: hackingtruths.box.sk/trojans.txt
----

Now, the above tutorial resulted in a number of people raising questions like: If the 'netstat -a' command shows open ports on my system, does this mean that anyone can connect to them? Or, How can I close these open ports? How do I know if an open port is a threat to my system's security of not? Well, the answer to all these question would be clear, once you read the below paragraph:

Now, the thing to understand here is that, Port numbers are divided into three ranges:

The Well Known Ports are those from 0 through 1023. This range or ports is bound to the services running on them. By this what I mean is that each port usually has a specific service running on it. You see there is an internationally accepted Port Numbers to Services rule, (refer RFC 1700 Here) which specifies as to on what port number a particular service runs. For Example, By Default or normally FTP runs on Port 21. So if you find that Port 21 is open on a particular system, then it usually means that that particular system uses the FTP Protocol to transfer files. However, please note that some smart system administrators delibrately i.e. to fool lamers run fake services on popular ports. For Example, a system might be running a fake FTP daemon on Port 21. Although you get the same interface like the FTP daemon banner, response numbers etc, however, it actually might be a software logging your prescence and sometimes even tracing you!!!

The Registered Ports are those from 1024 through 49151. This range of port numbers is not bound to any specific service. Actually, Networking utlites like your Browser, Email Client, FTP software opens a random port within this range and starts a communication with the remote server. A port number within this range is the reason why you are able to surf the net or check your email etc.

If you find that when you give the netstat -a command, then a number of ports within this range are open, then you should probably not worry. These ports are simply opened so that you can get your software applications to do what you want them to do. These ports are opened temporarily by various applications to perform tasks. They act as a buffer transfering packets (data) received to the application and vis-a-versa. Once you close the application, then you find that these ports are closed automatically. For Example, when you type www.hotmail.com in your browser, then your browser randomly chooses a Registered Port and uses it as a buffer to communicate with the various remote servers involved.

The Dynamic and/or Private Ports are those from 49152 through 65535. This range is rarely used, and is mostly used by trojans, however some application do tend to use such high range port numbers. For Example,Sun starts their RPC ports at 32768.
So this basically brings us to what to do if you find that Netstat gives you a couple of open ports on your system:



1. Check the Trojan Port List and check if the open port matches with any of the popular ones. If it does then get a trojan Removal and remove the trojan.

2. If it doesn't or if the Trojan Remover says: No trojan found, then see if the open port lies in the registered Ports range. If yes, then you have nothing to worry, so forget about it.

***********************
HACKING TRUTH: A common technique employed by a number of system administrators, is remapping ports. For example, normally the default port for HTTP is 80. However, the system administrator could also remap it to Port 8080. Now, if that is the case, then the homepage hosted at that server would be at:

http://domain.com:8080 instead of
http://domain.com:80

The idea behind Port Remapping is that instead of running a service on a well known port, where it can easily be exploited, it would be better to run it on a not so well known port, as the hacker, would find it more difficult to find that service. He would have to port scan high range of numbers to discover port remapping.

The ports used for remapping are usually pretty easy to remember. They are choosen keeping in mind the default port number at which the service being remapped should be running. For Example, POP by default runs on Port 110. However, if you were to remap it, you would choose any of the following: 1010, 11000, 1111 etc etc

Some sysadmins also like to choose Port numbers in the following manner: 1234,2345,3456,4567 and so on... Yet another reason as to why Port Remapping is done, is that on a Unix System to be able to listen to a port under 1024, you must have root previledges.
************************


Firewalls

Use of Firewalls is no longer confined to servers or websites or commerical companies. Even if you simply dial up into your ISP or use PPP (Point to Point Protocol) to surf the net, you simply cannot do without a firewall. So what exactly is a firewall?

Well, in non-geek language, a firewall is basically a shield which protects your system from the untrusted non-reliable systems connected to the Internet. It is a software which listens to all ports on your system for any attempts to open a connection and when it detects such an attempt, then it reacts according to the predefined set of rules. So basically, a firewall is something that protects the network(or systen) from the Internet. It is derived from the concept of firewalls used in vehicles which is a barrier made of fire resistant material protecting the vehicle in case of fire.

Now, for a better 'according to the bible' defination of a firewall: A firewall is best described as a software or hardware or both Hardware and Software packet filter that allows only selected packets to pass through from the Internet to your private internal network. A firewall is a system or a group of systems which guard a trusted network( The Internal Private Network from the untrusted network (The Internet.)

NOTE: This was a very brief desciption of what a firewall is, I would not be going into the details of their working in this manual.

Anyway,the term 'Firewalls', (which were generally used by companies for commerical purposes) has evolved into a new term called 'Personal Firewalls'. Now this term is basically used to refer to firewalls installed on a standalone system which may or may not be networked i.e. It usually connects to an ISP. Or in other words a personal firewall is a firewall used for personal use.

Now that you have a basic desciption as to what a firewall is, let us move on to why exactly you need to install a Firewall? Or, how can not installing a firewall pose a threat to the security of your system?

You see, when you are connected to the Internet, then you have millions of other untrusted systems connected to it as well. If somehow someone found out your IP address, then they could do probably anything to your system. They could exploit any vulnerability existing in your system, damage your data, and even use your system to hack into other computers.

Finding out someone'e IP Address is not very difficult. Anybody can find out your IP, through various Chat Services, Instant Messengers (ICQ, MSN, AOL etc), through a common ISP and numerous other ways. Infact finding out the IP Address of a specific person is not always the priority of some hackers.

What I mean to say by that is that there are a number of Scripts and utilities available which scan all IP addresses between a certain range for predefined common vulnerabilities. For Example, Systems with File Sharing Enabled or a system running an OS which is vulnerable to the Ping of Death attack etc etc As soon as a vulnerable system is found, then they use the IP to carry out the attacks.

The most common scanners look for systems with RAT's or Remote Administration Tools installed. They send a packet to common Trojan ports and display whether the victim's system has that Trojan installed or not. The 'Scan Range of IP Addresses' that these programs accept are quite wide and one can easily find a vulnerable system in the matter of minutes or even seconds.

Trojan Horses like Back Orifice provide remote access to your system and can set up a password sniffer. The combination of a back door and a sniffer is a dangerous one: The back door provides future remote access, while the sniffer may reveal important information about you like your other Passwords, Bank Details, Credit Card Numbers, Social Security Number etc If your home system is connected to a local LAN and the attacker manages to install a backdoor on it, then you probably have given the attacker the same access level to your internal network, as you have. This wouls also mean that you will have created a back door into your network that bypasses any firewall that may be guarding the front door.

You may argue with me that as you are using a dial up link to your ISP via PPP, the attacker would be able to access your machine only when you are online. Well, yes that is true, however, not completely true. Yes, it does make access to your system when you reconnect, difficult, as you have a dynamic Internet Protocol Address. But, although this provides a faint hope of protection, routine scanning of the range of IP's in which your IP lies, will more often than not reveal your current Dynamic IP and the back door will provide access to your system.

*******************
HACKING TRUTH: Microsoft Says: War Dialer programs automatically scan for modems by trying every phone number within an exchange. If the modem can only be used for dial-out connections, a War Dialer won't discover it. However, PPP changes the equation, as it provides bidirectional transportmaking any connected system visible to scanners?and attackers.
*******************

So how do I protect myself from such Scans and unsolicitated attacks? Well, this is where Personal Firewalls come in. They just like their name suggests, protect you from unsolicitated connection probes, scans, attacks.

They listen to all ports for any connection requests received (from both legitimate and fake hosts) and sent (by applications like Browser, Email Client etc.) As soon as such an instance is recorded, it pops up a warning asking you what to do or whether to allow the connection to initiate or not. This warning message also contains the IP which is trying to initiate the connection and also the Port Number to which it is trying to connect i.e. the Port to which the packet was sent. It also protects your system from Port Scans, DOS Attacks, Vulnerability attacks etc. So basically it acts as a shield or a buffer which does not allow your system to communicate with the untrusted systems directly.

Most Personal Firewalls have extensive logging facilities which allows you to track down the attackers. Some popular firewalls are:

1.BlackICE Defender : An IDS for PC's. It's available at http://www.networkice.com.

2. ZoneAlarm: The easiest to setup and manage firewall. Get it for free at: www.zonelabs.com

Once you have installed a firewall on your system, you will often get a number of Warnings which might seem to be as if someone is trying to break into your system, however, they are actually bogus messages, which are caused by either your OS itself or due to the process called Allocation of Dynamic IP's. For a details description of these two, read on.

Many people complain that as soon as they dial into their ISP, their firewall says that such and such IP is probing Port X. What causes them?
Well, this is quite common. The cause is that somebody hung up just before you dialed in and your ISP assigned you the same IP address. You are now seeing the remains of communication with the previous person. This is most common when the person to which the IP was assigned earlier was using ICQ or chat programs, was connected to a Game Server or simply turned off his modem before his communication with remote servers was complete.

You might even get a message like: Such and Such IP is trying to initaite a Netbios Session on Port X. This again is extrememly common. The following is an explanation as to why it happens, which I picked up a couple of days ago: NetBIOS requests to UDP port 137 are the most common item you will see in your firewall reject logs. This comes about from a feature in Microsoft's Windows: when a program resolves an IP address into a name, it may send a NetBIOS query to IP address. This is part of the background radiation of the Internet, and is nothing to be concerned about.

What Causes them? On virtually all systems (UNIX, Macintosh, Windows), programs call the function 'gethostbyaddr()' with the desired address. This function will then do the appropriate lookup, and return the name. This function is part of the sockets API. The key thing to remember about gethostbyaddr() is that it is virtual. It doesn't specify how it resolves an address into a name. In practice, it will use all available mechanisms. If we look at UNIX, Windows, and Macintosh systems, we see the following techniques:

DNS in-addr.arpa PTR queries sent to the DNS server
NetBIOS NodeStatus queries sent to the IP address
lookups in the /etc/hosts file
AppleTalk over IP name query sent to the IP address
RPC query sent to the UNIX NIS server
NetBIOS lookup sent to the WINS server

Windows systems do the /etc/hosts, DNS, WINS, and NodeStatus techniques. In more excruciating detail, Microsoft has a generic system component called a naming service. All the protocol stacks in the system (NetBIOS, TCP/IP, Novel IPX, AppleTalk, Banyan, etc.) register the kinds of name resolutions they can perform. Some RPC products will likewise register an NIS naming service. When a program requests to resolve an address, this address gets passed onto the generic naming service. Windows will try each registered name resolution subsystem sequentially until it gets an answer.

(Side note: User's sometimes complained that accessing Windows servers is slow. This is caused by installing unneeded protocol stacks that must timeout first before the real protocol stack is queried for the server name.).

The order in which it performs these resolution steps for IP addresses can be configured under the Windows registry key

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider.

Breaking Through Firewalls

Although Firewalls are meant to provide your complete protection from Port Scan probes etc there are several holes existing in popular firewalls, waiting to be exploited. In this issue, I will discuss a hole in ZoneAlarm Version 2.1.10 to 2.0.26, which allows the attacker to port scan the target system (Although normally it should stop such scans.)

If one uses port 67 as the source port of a TCP or UDP scan, ZoneAlarm will let the packet through and will not notify the user. This means, that one can TCP or UDP port scan a ZoneAlarm protected computer as if there were no firewall there IF one uses port 67 as the source port on the packets.

Exploit:
UDP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sU 192.168.128.88

(Notice the -g67 which specifies source port).

TCP Scan:
You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sS 192.168.128.88

(Notice the -g67 which specifies source port).


Ankit Fadia

Minggu, 18 Januari 2009

Speed up Internet

Speed Up Internet

Windows 2k/XP

1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
2. Note the following lines (all hex dwords):
Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
4. Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS
5. Reboot for changes to take effect

2. Windows 9x/ME

1. The tweak is essentialy the same as in Windows 2000/XP, just the location in the Registry is slightly different. For a more detailed description see the Windows 2000/XP section above
2. Open the Windows Registry using Regedit, and (after backing up) navigate to:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP\ServiceProvider
3. You should see the following settings:
Class=hex:08,00,00,00

LocalPriority=hex:f3,01,00,00
HostsPriority=hex:f4,01,00,00
DnsPriority=hex:d0,07,00,00
NetbtPriority=hex:d1,07,00,00
4. The "priority" lines should be changed to:
LocalPriority=hex:05,00,00,00
HostsPriority=hex:06,00,00,00
DnsPriority=hex:07,00,00,00
NetbtPriority=hex:08,00,00,00
5. Reboot for changes to take effect

3. System.ini IRQ Tweak - Windows 9x/ME ONLY

1. Find your Network Card's IRQ

1. In order to add the entry to your System.ini file, you'd first have to find your NIC's IRQ
2. Right-click on My Computer icon on your Desktop, then left-click on Properties (a shortcut for that would be to press the 'Windows' + 'Pause' keys). Navigate to Device Manager and double-click on Computer. Under "View Resources" you will find a list of IRQs, each with description of the device that's using it. Note the IRQ number used by your Network Adapter

2. Adding the entry to System.ini

1. Once you've found the IRQ of your Network Card, you need to reserve some RAM for its use, by adding an entry to the System.ini file. You can edit the file in any text editor, however the easiest way is to use Windows' built in "System Configuration Editor"
2. Navigate to Start > Run and type sysedit . Find the [386enh] Section in the System.ini file and add Irq[n]=4096 under it, where [n] is the IRQ number of your NIC and 4096 is the amount of RAM you want to reserve in Kbytes. We recommend using 4096, however you can experiment with different values if you want. Save changes in the file, exit and reboot for changes to take effect.
Note: If you choose to try different values, keep in mind that reserving too much RAM for your NIC will decrease the amount of RAM available for applications, while reserving too little might not give the desired effect


3. Additional Thoughts
1. The only negative effect of the System.ini IRQ tweak is that it will reduce the amount of RAM available for running applications a bit, by reserving some specifically for your Network Card's use. The gain in performance usually outweighs the negative effect by far, considering any Computer with 32Mb of RAM or more
2. This tweak may or may not work for you. It is not a documented tweak by Windows
3. Keep in mind that if you add hardware to your system the IRQ of the Network Adapter might change, in which case you will need to modify the setting in System.ini
4. In systems with multiple NICs, you might want to add the setting for both IRQs. Also, you could reserve RAM for other IRQs if you wish, just use common sense and don't forget it reduces the amount of RAM available for running applications
5. If you are using an USB device, it does not have a specific IRQ, however you can try adding the entry using the IRQ of the USB Controller
6. For internal Cable Modems, you'd have to add the entry using the IRQ of your modem, rather than the IRQ of a Network Card



RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.

Trojan Port

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010

TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100



How to use the Web to look up information on hacking

___________________________________________________________
Want to become really, really unpopular? Try asking your hacker friends too many questions of the wrong sort.
But, but, how do we know what are the wrong questions to ask? OK, I sympathize with your problems because I get flamed a lot, too. That's partly because I sincerely believe in asking dumb questions. I make my living asking dumb questions. People pay me lots of money to go to conferences, call people on the phone and hang out on Usenet news groups asking dumb questions so I can find out stuff for them. And, guess what, sometimes the dumbest questions get you the best answers. So that's why you don't see me flaming people who ask dumb questions.
********************************************************
Newbie note: Have you been too afraid to ask the dumb question, "What is a flame?" Now you get to find out! It is a bunch of obnoxious rantings and ravings made in email or a Usenet post by some idiot who thinks he or she is proving his or her mental superiority through use of foul and/or impolite language such as "you suffer from rectocranial inversion," f*** y***, d****, b****, and of course @#$%^&*! This newbie note is my flame against those flamers to whom I am soooo superior.
********************************************************
But even though dumb questions can be good to ask, you may not like the flames they bring down on you. So, if you want to avoid flames, how do you find out answers for yourself?
This Guide covers one way to find out hacking information without having to ask people questions: by surfing the Web. The other way is to buy lots and lots of computer manuals, but that costs a lot of money. Also, in some parts of the world it is difficult to get manuals. Fortunately, however, almost anything you want to learn about computers and communications is available for free somewhere on the Web.
First, let's consider the Web search engines. Some just help you search the Web itself. But others enable you to search Usenet newsgroups that have been archived for many years back. Also, the best hacker email lists are archived on the Web, as well.
More how to search for hacker knowledge...
There are two major considerations in using Web search engines. One is what search engine to use, and the other is the search tactics themselves.
I have used many Web search engines. But eventually I came to the conclusion that for serious research, you only need two: Alavista ()and Dejanews (). Altavista is the best for the Web, while Dejanews is the best one for searching Usenet news groups. But, if you don't want to take me at my word, you may surf over to a site with links to almost all the Web and Newsgroup search engines at .
But just how do you efficiently use these search engines? If you ask them to find "hacker" or even "how to hack," you will get bazillions of Web sites and news group posts to read. OK, so you painfully surf through one hacker Web site after another. You get portentous-sounding organ music, skulls with red rolling eyes, animated fires burning, and each site has links to other sites with pretentious music and ungrammatical boastings about "I am 31337, d00dz!!! I am so *&&^%$ good at hacking you should bow down and kiss my $%^&&*!" But somehow they don't seem to have any actual information. Hey, welcome to the wannabe hacker world!
You need to figure out some words that help the search engine of your choice get more useful results. For example, let's say you want to find out whether I, the Supreme R00ler of the Happy Hacker world, am an elite hacker chick or merely some poser. Now the luser approach would to simply go to http://www.dejanews.com and do a search of Usenet news groups for "Carolyn Meinel," being sure to click the "old" button to bring up stuff from years back. But if you do that, you get this huge long list of posts, most of which have nothing to do with hacking:




CDMA vs GSM - carolyn meinel 1995/11/17
Re: October El Nino-Southern Oscillation info gonthier@usgs.gov (Gerard J. Gonthier) 1995/11/20
Re: Internic Wars MrGlucroft@psu.edu (The Reaver) 1995/11/30
shirkahn@earthlink.net (Christopher Proctor) 1995/12/16
Re: Lyndon LaRouche - who is he? lness@ucs.indiana.edu (lester john ness) 1996/01/06
U-B Color Index observation data - cmeinel@nmia.com (Carolyn P. Meinel) 1996/05/13
Re: Mars Fraud? History of one scientist involved gksmiley@aol.com (GK Smiley) 1996/08/11
Re: Mars Life Announcement: NO Fraud Issue twitch@hub.ofthe.net 1996/08/12
Hackers Helper E-Zine wanted - rcortes@tuna.hooked.net (Raul Cortes) 1996/12/06
Carolyn Meinel, Sooooooper Genius - nobody@cypherpunks.ca (John Anonymous MacDonald, a remailer node) 1996/12/12
Anyhow, this list goes on and on and on.
But if you specify "Carolyn Meinel hacker" and click "all" instead of "any" on the "Boolean" button, you get a list that starts with:
Media: "Unamailer delivers Christmas grief" -Mannella@ipifidpt.difi.unipi.it (Riccardo Mannella) 1996/12/30 Cu Digest, #8.93, Tue 31 Dec 96 - Cu Digest (tk0jut2@mvs.cso.niu.edu)
1996/12/31
RealAudio interview with Happy Hacker - bmcw@redbud.mv.com (Brian S. McWilliams) 1997/01/08

Etc.
This way all those posts about my boring life in the world of science don't show up, just the juicy hacker stuff.
Now suppose all you want to see is flames about what a terrible hacker I am. You could bring those to the top of the list by adding (with the "all" button still on) "flame" or "f***" or "b****" being careful to spell out those bad words instead fubarring them with ****s. For example, a search on "Carolyn Meinel hacker flame" with Boolean "all" turns up only one post. This important tome says the Happy Hacker list is a dire example of what happens when us prudish moderator types censor naughty words and inane diatribes.
******************************************
Newbie note: "Boolean" is math term. On the Dejanews search engine they figure the user doesn't have a clue of what "Boolean" means so they give you a choice of "any" or "all" and then label it "Boolean" so you feel stupid if you don't understand it. But in real Boolean algebra we can use the operators "and" "or" and "not" on word searches (or any searches of sets). "And" means you would have a search that turns up only items that have "all" the terms you specify; "or" means you would have a search that turns up "any" of the terms. The "not" operator would exclude items that included the "not" term even if they have any or all of the other search terms. Altavista has real Boolean algebra under its "advanced"" search option.
******************************************
But let's forget all those Web search engines for a minute. In my humble yet old-fashioned opinion, the best way to search the Web is to use it exactly the way its inventor, Tim Berners-Lee, intended. You start at a good spot and then follow the links to related sites. Imagine that!
Here's another of my old fogie tips. If you want to really whiz around the Web, and if you have a shell account, you can do it with the program lynx. At the prompt, just type "lynx followed by the URL you want to visit. Because lynx only shows text, you don't have to waste time waiting for the


10 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And doublecheck your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."