Форум Торонто - Torontovka.com
[Search] [Rules] [Register] [Login]
Forums » Archive » How to... 
Page: [1]
Author Message
Joined: 12/2/2002
Posts: 38
Posted on Tuesday, December 17, 2002 12:14:00 AM
 
IN THIS ARTICLE YOU WILL LEARN HOW TO LOG IN TO DEC'S, LOGGING OUT, AND ALL THE FUN STUFF TO DO IN-BETWEEN. ALL OF THIS INFORMATION IS BASED ON A STANDARD DEC SYSTEM. SINCE THERE ARE DEC SYSTEM S10 AND 20, AND WE FAVOR, THE DEC 20, THERE WILL BE MORE INFO ON THEM IN THIS ARTICLE. IT JUST SO HAPPENS THAT THE DEC 20 IS ALSO THE MORE COMMON OF THE TWO, AND IS USED BY MUCH MORE INTERESTING PEOPLE (IF YOU KNOW WHAT WE MEAN...) OK , THE FIRST THING YOU WANT TO DO WHEN YOU ARE RECEIVING CARRIER FROM A DEC SYSTEM IS TO FIND OUT THE FORMAT OF LOGIN NAMES. YOU CAN DO THIS BY LOOKING AT WHO IS ON THE SYSTEM. DEC= ] @ (THE 'EXEC' LEVEL PROMPT) YOU= ] SY SY IS SHORT FOR SY(STAT) AND SHOWS YOU THE SYSTEM STATUS. YOU SHOULD SEE THE FORMAT OF LOGIN NAMES... A SYSTAT USUALLY COMES UP IN THIS FORM: JOB LINE PROGRAM USER JOB: THE JOB NUMBER (NOT IMPORTANT UNLESS YOU WANT TO LOG THEM OFF LATER) LINE: WHAT LINE THEY ARE ON (USED TO TALK TO THEM...) THESE ARE BOTH TWO OR THREE DIGIT NUMBERS. PROGRAM: WHAT PROGRAM ARE THEY RUNNING UNDER? IF IT SAYS 'EXEC' THEY AREN'T DOING ANYTHING AT ALL... USER: AHHHAHHHH! THIS IS THE USER NAME THEY ARE LOGGED IN UNDER... COPY THE FORMAT, AND HACK YOURSELF OUT A WORKING CODE... LOGIN FORMAT IS AS SUCH: DEC= ] @ YOU= ] LOGIN USERNAME PASS WORD USERNAME IS THE USERNAME IN THE FORMAT YOU SAW ABOVE IN THE SYSTAT. AFTER YOU HIT THE SPACE AFTER YOUR USERNAME, IT WILL STOP ECHOING CHARACTERS
BACK TO YOUR SCREEN. THIS IS THE PASSWORD YOU ARE TYPING IN... REMEMBER, PEOPLE USUALLY USE THEIR NAME, THEIR DOG'S NAME, THE NAME OF A FAVORITE CHAR
ACTER IN A BOOK, OR SOMETHING LIKE THIS. A FEW CLEVER PEOPLE HAVE IT SET TO A KEY CLUSTER (QWERTY OR ASDFG). PW'S CAN BE FROM 1 TO 8 CHARACTERS LONG,
ANYTHING AFTER THAT IS IGNORED. YOU ARE FINALLY IN...IT WOULD BE NICE TO HAVE A LITTLE HELP, WOULDN'T IT? JUST TYPE A ? OR THE WORD HELP, AND IT WILL
GIVE YOU A WHOLE LIST OF TOPICS... SOME HANDY CHARACTERS FOR YOU TO KNOW WOULD BE THE CONTROL KEYS, WOULDN'T IT? BACKSPACE ON A DEC 20 IS RUB WHICH IS 255 ON YOUR ASCII CHART. ON THE DEC 10 IT IS CNTRL-H. TO ABORT A LONG LISTING OR A PROGRAM, CNTRL-C WORKS FINE. USE CNTRL-O TO STOP LONG OUTPUT TO
THE TERMINAL. THIS IS HANDY WHEN PLAYING A GAME, BUT YOU DON'T WANT TO CNTRL-C OUT. CNTRL-T FOR THE TIME. CNTRL-U WILL KILL THE WHOLE LINE YOU ARE
TYPING AT THE MOMENT. YOU MAY ACCIDENTLY RUN A PROGRAM WHERE THE ONLY WAY OUT IS A CNTRL-X, SO KEEP THAT IN RESERVE. CNTRL-S TO STOP LISTING, CNTRL-Q TO CONTINUE ON BOTH SYSTEMS. IS YOUR TERMINAL HAVING TROUBLE?? LIKE, IT PAUSES FOR NO REASON, OR IT DOESN'T BACKSPACE RIGHT? THIS IS BECAUSE BOTH SYSTEMS SUPPORT MANY TERMINALS, AND YOU HAVEN'T TOLD IT WHAT YOURS IS YET... YOU ARE USING A VT05 (ISN'T THAT FUNNY ? I THOUGHT I HAD AN APPLE) SO YOU NEED TO TELL IT YOU ARE ONE. DEC= ] @ YOU= ] INFORMATION TERMINAL OR... YOU= ] INFO TER THIS
SHOWS YOU WHAT YOUR TERMINAL IS SET UP AS... DEC= ] ALL SORTS OF SHIT, THEN THE @ YOU= ] SET TER VT05 THIS SETS YOUR TERMINAL TYPE TO VT05. NOW LET'S SEE
WHAT IS IN THE ACCOUNT (HERE AFTER ABBREVIATED ACCT.) THAT YOU HAVE HACKED ONTO... SAY = ] DIR SHORT FOR DIRECTORY, IT SHOWS YOU WHAT THE USER OF THE CODE HAS SAVE TO THE DISK. THERE SHOULD BE A FORMAT LIKE THIS: XXXXX.OOO XXXXX IS THE FILE NAME, FROM 1 TO 20 CHARACTE RS LONG. OOO IS THE FILE TYPE, ONE OF:
EXE, TXT, DAT, BAS, CMD AND A FEW OTHERS THAT ARE SYSTEM DEPENDANT. EXE IS A COMPILED PROGRAM THAT CAN BE RUN (JUST BY TYPING ITS NAME AT THE @).
Joined: 12/3/2002
Posts: 62
Posted on Tuesday, December 17, 2002 12:25:00 AM
 
TXT IS A TEXT FILE, WHICH YOU CAN SEE BY TYPING= ] TYPE XXXXX.TXT DO NOT TRY TO= ] TYPE XXXXX.EXE THIS IS VERY BAD FOR YOUR TERMINAL AND WILL TELL YOU ABSOLUTLY NOTHING. DAT IS DATA THEY HAVE SAVED. BAS IS A BASIC PROGRAM, YOU CAN HAVE IT TYPED OUT FOR YOU. CMD IS A COMMAND TYPE FILE, A LITTLE TOO COMPLICATED TO GO INTO HERE. TRY = ] TAKE XXXXX.CMD BY THE WAY, THERE ARE OTHER USERS OUT THERE WHO MAY HAVE FILES YOU CAN USE (GEE, WHY ELSE AM I HERE?). TYPE = ] DIR [ *.* ] (DEC 20) = ] DIR [*,*] (DEC 10) * IS A WILDCARD, AND WILL ALLOW YOU TO ACCESS THE FILES ON OTHER ACCOUNTS IF THE USER HAS IT SET FOR PUBLIC ACCESS. IF IT ISN'T SET FOR PUBLIC ACCESS, THEN YOU WON'T SEE IT. TO RUN THAT PROGRAM: DEC= ] @ YOU= ] USERNAME PROGRAM-NAME USERNAME IS THE DIRECTORY YOU SAW THE FILE LISTED UNDER, AND FILE NAME WAS WHAT ELSE BUT THE FILE NAME? ** YOU ARE NOT
ALONE ** REMEMBER, YOU SAID (AT THE VERY START) SY SHORT FOR SYSTAT, AND HOW WE SAID THIS SHOWED THE OTHER USERS ON THE SYSTEM? WELL, YOU CAN TALK TO THEM, OR AT LEAST SEND A MESSAGE TO ANYONE YOU SEE LISTED IN A SYSTAT. YOU CAN DO THIS BY: DEC= ] THE USER LIST (FROM YOUR SYSTAT) YOU= ] TALK USERNAME (DEC 20) SEND USERNAME (DEC 10) TALK ALLOWS YOU AND THEM IMMEDIATE TRANSMISSION OF WHATEVER YOU/THEY TYPE TO BE SENT TO THE OTHER. SEND ONLY ALLOW YOU ONE MESSAGE TO BE SENT, AND ONLY AFTER YOU HIT [ RETURN ]. WITH SEND, THEY WILL SEND BACK TO YOU, WITH TALK YOU CAN JUST KEEP GOING. BY THE WAY, YOU MAY BE NOTICING WITH THE TALK COMMAND THAT WHAT YOU TYPE IS STILL ACTED UPON BY THE PARSER (CONTROL PROGRAM). TO AVOID THE CONSTANT ERROR MESSAGES TYPE EITHER: YOU= ] ;YOUR MESSAGE YOU= ] REM YOUR MESSAGE THE SEMI-COLON TELLS THE PARSER THAT
WHAT FOLLOWS IS JUST A COMMENT. REM IS SHORT FOR 'REMARK' AND IGNORES YOU FROM THEN ON UNTIL YOU TYPE A CNTRL-Z OR CNTRL-C, AT WHICH POINT IT PUTS YOU
BACK IN THE EXEC MODE. TO BREAK THE CONNECTION FROM A TALK COMMAND TYPE: YOU= ] BREAK PRIV'S: IF YOU HAPPEN TO HAVE PRIVS, YOU CAN DO ALL SORTS OF
THINGS. FIRST OF ALL, YOU HAVE TO ACTIVATE THOSE PRIVS. YOU= ] ENABLE THIS GIVES YOU A $ PROMPT, AND ALLOWS YOU TO DO THIS: WHATEVER YOU CAN DO TO YOUR
OWN DIRECTORY YOU CAN NOW DO TO ANY OTHER DIRECTORY. TO CREATE A NEW ACCT. USING YOUR PRIVS, JUST TYPE = ] BUILD USERNAME IF USERNAME IS OLD, YOU CAN EDIT IT, IF IT IS NEW, YOU CAN DEFINE IT TO BE WHATEVER YOU WISH. PRIVACY MEANS NOTHING TO A USER WITH PRIVS. BY THE WAY, THERE ARE VARIOUS LEVELS OF PRIVS: OPERATOR, WHEEL, CIA WHEEL IS THE MOST POWERFUL, BEING THAT HE CAN LOG IN FROM ANYWHERE AND HAVE HIS POWERS. OPERATORS HAVE THEIR POWER BECAUSE THEY ARE AT A SPECIAL TERMINAL ALLOWING THEM THE PRIVS. CIA IS SHORT FOR 'CONFIDENTIAL
INFORMATION ACCESS', WHICH ALLOWS YOU A LOW LEVEL AMOUNT OF PRIVS. NOT TO WORRY THOUGH, SINCE YOU CAN READ THE SYSTEM LOG FILE, WHICH ALSO HAS THE
PASSWORDS TO ALL THE OTHER ACCOUNTS. TO DE-CTIVATE YOUR PRIVS, TYPE YOU= ] DISABLE WHEN YOU HAVE PLAYED YOUR GREEDY HEART OUT, YOU CAN FINALLY LEAVE THE SYSTEM WITH THE COMMAND= ] LOGOUT THIS LOGS THE JOB YOU ARE USING OFF THE SYSTEM (THERE MAY BE VARIENTS OF THIS SUCH AS KJOB, OR KILLJOB). BY THE WAY, YOU CAN
SAY (IF YOU HAVE PRIVS) = ] LOGOUT USERNAME AFL KILLS THE USERNAME'S TERMINAL. THERE ARE MANY MORE COMMANDS, SO TRY THEM OUT. JUST REMEMBER: LEAVE THE
ACCOUNT IN THE SAME STATE AS YOU FOUND IT. THIS WAY THEY MAY NEVER KNOW THAT YOU ARE PLAYING LEECH OFF THEIR ACCT.
Joined: 12/3/2002
Posts: 62
Posted on Tuesday, December 17, 2002 12:26:00 AM
 
THIS ARTICLE WRITTEN BY: THE KNIGHTS OF SHADOW
Joined: 12/3/2002
Posts: 62
Posted on Tuesday, December 17, 2002 12:39:00 AM
 
.doc


For most of you out there, money is hard to come by. Until now:

With the recent advent of plastic money (credit cards), it is easy to use someone else's credit card to order the items you have always desired in life. The stakes are high, but the payoff is worth it.

Step One: Getting the credit card information

First off, you must obtain the crucial item: someone's credit card number. The best way to get credit card numbers is to take the blue carbons used in a credit card transaction at your local department store. These can usually be found in the garbage can next to the register, or for the more daring, in the garbage dumpster behind the store. But, due to the large amount of credit card fraud, many stores have opted to use a carbonless transaction sheet, making things much more difficult. This is where your phone comes in handy.

First, look up someone in the phone book, and obtain as much information as possible about them. Then, during business hours, call in a very convincing voice - "Hello, this is John Doe from the Visa Credit Card Fraud Investigations Department. We have been informed that your credit card may have been used for fraudulent purposes, so will you please read off the numbers appearing on your Visa card for verification." Of course, use your imagination! Believe it or not, many people will fall for this ploy and give out their credit information.

Now, assuming that you have your victim's credit card number, you should be able to decipher the information given.

Step Two: Recognizing information from carbon copies

Card example:

[American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2
JOE SHMOE

Explanation:

MM/Y1 is the date the card was issued, and MM/Y2 is the expiration date. The American Express Gold Card has numbers XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00, even if the card holder is broke.

[Mastercard]
5XXX XXXX XXXX XXXX
XXXX AAA DD-MM-YY MM/YY
JOE SHMOE

Explanation:

XXXX in the second row may be asked for during the ordering process. The first date is when the card was new, and the second is when the card expires. The most frequent number combination used is 5424 1800 XXXX XXXX. There are many of these cards in circulation, but many of these are on wanted lists, so check these first.

[Visa]
4XXX XXX(X) XXX(X) XXX(X)
MM/YY MM/YY*VISA
JOE SHMOE

Explanation:

Visa is the most abundant card, and is accepted almost everywhere. The "*VISA" is sometimes replaced with "BWG", or followed with a special code. These codes are as follows:

[1] MM/YY*VISA V - Preferred Card
[2] MM/YY*VISA CV - Classic Card
[3] MM/YY*VISA PV - Premier Card

Preferred Cards are backed with money, and are much safer to use. Classic Cards are newer, harder to reproduce cards with decent backing. Premier Cards are Classic Cards with Preferred coverage. Common numbers are 4448 020 XXX XXX, 4254 5123 6000 XXXX, and 4254 5123 8500 XXXX. Any 4712 1250 XXXX XXXX cards are IBM Credit Union cards, and are risky to use, although they are usually covered for large purchases.

Step Three: Testing credit

You should now have a Visa, Mastercard, or American Express credit card number, with the victim's address, zip code, and phone number. By the way, if you have problems getting the address, most phone companies offer the Address Tracking Service, which is a special number you call that will give you an address from a
phone number, at a nominal charge. Now you need to check the balance of credit on the credit card (to make sure you don't run out of money), and you must also make sure that the card isn't stolen. To do this you must obtain a phone number that businesses use to check out credit cards during purchases. If you go to a department store, watch the cashier when some
Joined: 9/3/2001
Posts: 22722
Posted on Tuesday, December 17, 2002 12:40:00 AM
 
s www.totse.com chto li?
Joined: 9/21/2001
Posts: 2605
Posted on Tuesday, December 17, 2002 12:44:00 AM
 
Ne tam takogo net sto pudov.
Joined: 9/21/2001
Posts: 2605
Posted on Tuesday, December 17, 2002 1:00:00 AM
 
whizzy wheel =) Ups.
Joined: 9/21/2001
Posts: 2605
Posted on Tuesday, December 17, 2002 1:06:00 AM
 
if short term, THINKO TEOLOGY BY Dissociated Press.
banana problem from the story of the little girl who said "I know how to spell `banana', but I don't know when to stop".
Joined: 12/26/2001
Posts: 2250
Posted on Tuesday, December 17, 2002 10:25:00 AM
 
With the recent advent of plastic money (credit cards)

:)))
Page: [1]
Forums » Archive » How to... 
Copyright © 2020 Torontovka.com, All rights reserved