Monday, July 18, 2011

Bust Avoidance For Dipshits


Notice how the feds and other appendages of law enforcement pop up every so
often and take down people. Ever wonder if your going to be next. if you have
wondered then your obviously doing something that increases your chances of
becoming a cellmate to a six foot 200lb guy named bubba. lots of idiots get
busted but if they took some care and were careful they would probably still
be out and not married to big bubba.

Here are 10 things that get the attention of the law if your doing any of
them then your a dipshit and are in possible danger of visiting bubba in the
state home for stupid hackers.

1. never brag about your exploits on public boards
2. never brag to people who ask you questions about your favorite passtimes
3. never use codes found on boards
4. never use cards found on boards
5. never call boards where you dont know anybody
6. never talk to people when they ask if you know how
7. never use an unsecure line when talking to people for the first time
8. never use a po box registered to you
9. never go to swapmeets or bbs get togethers
10. dont trust anybody

Now for any retards reading this ill explain a few things.

First about bragging, dont do it. it makes you look like an idiot and you
never know if the person listening is a fed or some other lowlife like phone
security or an informant. second cards and codes found on boards are off
limits for the obvious reasons,

1. You dont know if its been planted by the happy feds.
2. You dont know why it was placed there.

A simple rule,

'If its there it maybe a trap so dont touch it.'

Remember, phone companies can entrap you if they want and they often will use
a known code to trace asmany people as they can and then bust everybody all
at once. This can happen as long as a year later. boards where you dont know
anybody are also bad. anybody could be an informant or a fed. Yes they do
call boards just like we do. if somebody asks you how to do something, dont
tell them. why are they asking you instead of finding out on their own?

If they know what theyre doing they shouldnt have to ask you unless they are
trying to find out if your a good target for a set up or unless they are too
stupid to find it out on their own. Either way they aren't worth your trouble
or the risk. if they get busted do you think they will go quietly to jail or
will they try and give them other people so the law will go easy on them.

When somebody you dont know wants to talkvoice to you dont give them your
number, call them from a payphone or break into a car and use a carphone.
They might be trying a trace or trying to find out who you are. remember even
if it isn't a cop it may be someone out to hurt you. if you use a po box for
communicating to others dont use one registered to yourself, this is stupid.
You can be busted the moment that you take something illegal out of it.

Also for the paranoid, get a kid to get your mail for you. pay him a couple
bucks to do it and hide somewhere and watch him go to where you want your
mail put. On any board if a few users want to go meet to swap files or do
something, dont go. It could be a set up or you might end up being photographed
by some agengy looking for a bust.

Finally never ever trust anybody.
Do you know them well enough to entrust your freedom to. What happens if
they are cops. are they not going to bust you just because you trusted them?
Fuck no. Here's a few simple rules to follow if you would like to have a
better chance of staying away from the feds.

1. First use more than one handle it makes it a little harder to keep track
of you that way. Also dont call boards that let just anybody on them.
If the board isn't secure then you arent either.

The feds set up a board a while back and let the users do whatever they
wanted. They busted quite a few bozos for shit like codes, pirated software
and credit cards. If they did it once they will do it again. The enemy isn't
stupid and if something works, they stick with it.

2. Don't teach anybody things they dont know how t odo. Let them pratice on
thier own without your help. If they get busted the feds will want to know
who they know and you dont want to be one of them.

3. If a stupid shit runs a board requiring a code for access dont call it.
If it goes down so will all the users. Remember the phone companies aren't
prohibited from entrapment like the cops and they can and will trap you.

There are a few retards out there who like to post codes all over the place
to show that they can get them. These people should be shot. They bring more
attention to the area than would otherwise exist. Think about it, if a phone
company sees more and more stolen codes being used to originate calls from
one area, are they going to ignore it?

If you put a code on a board then people who dont know what the fuck they are
doing will use it and that can fuck up everybody. remember when mci and sprint
were using short codes and then they went to the long bitches. Makes things
more difficult to hack out and notice how there are fewer busts recently
compared to the old short codes. The assholes who dont know how to find them
can't call anymore.

Keep it that way.

If you are one of the people who finds cards and codes in trashcans and
dumpsters then dont be stupid and go to the same place more than once.

Don't laugh, some people do it at the same place, same time, all the time.
Then they wonder why they got busted! The enemy isn't stupid and they can
find the source of the problem pretty quickly.

That's about it for this one. Remember don't be careless and don't
underestimate your enemy, they can bust you if you are stupid.
Keep your information out of the hands of lamers and you should have no
trouble so the wise better not plan to sit down after bubba welcomes you
to jail.


Friday, April 1, 2011

How to Bypass BIOS Passwords ( Hack Bios )


BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.


Friday, March 25, 2011

Speed Up Internet access


Windows 2k/XP

  1. First, open the Windows Registry using Regedit, and (after backing up) navigate to:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
  2. Note the following lines (all hex dwords):
    Class = 008 ( biggrin.gif - indicates that TCP/IP is a name service provider, don't change
    LocalPriority = 1f3 (499) - local names cache
    HostsPriority = 1f4 (500) - the HOSTS file
    DnsPriority = 7d0 (2000) - DNS
    NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
  3. What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well
  4. Change the "Priority" lines to:
    LocalPriority = 005 (5) - local names cache
    HostsPriority = 006 (6) - the HOSTS file
    DnsPriority = 007 (7) - DNS
    NetbtPriority = 008 ( biggrin.gif - NetBT name-resolution, including WINS
  5. Reboot for changes to take effect

RESULTS WILL VARY
No matter how good your systems may be, they're only as effective as what you put into them.


    My Visitor

    LanggaNan

    Enter your email address:

    Delivered by FeedBurner

    POPULAR POSTS

    ENTER-TAB3-CONTENT-HERE
     

    Tutorial Blog Copyright © 2010 ZaL_yUn GaLuh VitaLoka RizaL The MoLex