home *** CD-ROM | disk | FTP | other *** search
Wrap
Text File | 2000-05-25 | 38.7 KB | 1,120 lines
======================================================== +HCU Maillist Issue: 90 12/16/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Ring0 Code #2 Subject: Re: PKZip project #3 Subject: c-dilla ARTICLES: -----#1------------------------------------------------- Subject: Ring0 Code +trurl: Now what would you want such an evil bit of code for? I have seen it two places, 1) in Pietrek's Windows 95 Systems Programming Secrets (so check O'Reilly and Schulman's sites), and 2) in Kauler's Windows Assembly Language & Systems Programming. Source code for 2) looks a little like this: (Case WM_Create): xcreate: call makering0selector invoke GETSTOCKOBJECT,OEM_FIXED_FONT mov hOemFont,ax ;handle to font. ret ..................... ..DATA dpmiproc DD 0 ;dpmi extensions entry point. RING0CALLGATE LABEL DWORD ;use this to call ring-0 code. ring0_off DW 0 ;callgate selector for RING0FUNC ring0_cs DW 0 ; / ms_dos_str DB "MS-DOS",0 ldt_selector DW 0 ;for direct writing to ldt. descriptor_selector DW 0 ;ring0, cannot be accessed directly. ring0errormsg DB "There was an error creating ring 0 access... aborting program.",0 ..CODE makering0selector PROC invoke GLOBALPAGELOCK,cs cmp ax,0 je lockfailed lea si,ms_dos_str mov ax,168Ah ;get dpmi extensions entry point. int 2Fh ;-->es:di (undocumented) ;*** cmp al,0 ????? ;*** jne extensionsnotfnd mov WORD PTR[dpmiproc],di ;save entry point mov WORD PTR[dpmiproc+2],es ; / mov ax,100h ;undocumented call dpmiproc ;-->ax=selector to ldt. jc extensionsnotfnd mov ldt_selector,ax mov es,ax ;create a ring-0 32-bit descriptor... push es invoke ALLOCSELECTOR,cs ;-->ax=alias to cs. pop es cmp ax,0 je selectorerror and ax,0FFF8h ;get offset of descriptor in ldt. mov bx,ax mov al,es:[bx+5] ;get access-rights byte. and al,10011111b ;clear dpl field.# mov es:[bx+5],al mov al,es:[bx+6] ;get granularity & seg-size bits. or al,01000000b ;set bit7, for 32-bit. mov es:[bx+6],al or bx,0100b ;set bit-2, selects ldt.leave dpl=0.# mov di,bx ;temp save. mov descriptor_selector,bx ;save. ;create callgate, to above descriptor..... push es invoke ALLOCSELECTOR,0 ;create a descriptor in ldt. pop es cmp ax,0 je selectorerror mov ring0_cs,ax ;save final selector. and ax,0FFF8h ;get offset of descriptor in ldt. mov bx,ax mov es:[bx],ring0func ;my ring0 code mov es:[bx+2],di ;ring0 alias. mov BYTE PTR es:[bx+4],0 ;04 ;****??dwords copied to stack. mov BYTE PTR es:[bx+5],11101100b ;present=1,dpl=3,app=00,type=C mov WORD PTR es:[bx+6],0 ; (type=C: 386 callgate) qwert: jmp SHORT qwerty lockfailed: extensionsnotfnd: selectorerror: lea si,ring0errormsg call errormsgproc call xquitmessage ;quit program. qwerty: ret makering0selector ENDP ;.................................... freeourselectors PROC invoke FREESELECTOR,descriptor_selector invoke FREESELECTOR,ring0_cs invoke GLOBALPAGEUNLOCK,cs ret freeourselectors ENDP ;.................................... That's enough for here. I have the 32-bit source code for the book avail at ******************************************************** and the 16-bit on my tools page. mammon_ ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: Re: PKZip project =46irst just a hello, been subscribed for a few days and this is my first post. Call me spyder (on here anyhow).=20 >Does anyone have the book "C Programmer's Guide to NetBIOS" or the=20 >CRC-32 algorithm used in pkzip? Nope but look for a zip password cracker called pkcrack (ftp search will find plenty) which comes with c source and certainly includes CRC32 routines. Source has got to be available for the for the infozip packages also.=20 Also get fzc104.zip which is worth running in case you get lucky with a short password and also worth running with the biggest word list you can find because it is so fast. If you really want to do it yourself then fzc104 may give you some sort of performance target to aim at (or be embarrassed by).=20 -----#3------------------------------------------------- Subject: c-dilla Hello All, I've been writing a lot of stuff that is not strictly cracking related - so back on to topic: I've just had a couple of emails out of the blue (from people in different continents) asking for information on a protection called 'C-Dilla' - the website is at: ************************ I think I'll take a look and see what I find - have you heard anything about this protection? From the sound of it, it should be a challege (apparently it uses VXDs etc)... Anybody want to check this out with me? Cya, +ReZiDeNt =====End of Issue 90==================================== ======================================================== +HCU Maillist Issue: 91 12/17/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: zipcrack & C-Dilla #2 Subject: Ring0 code ARTICLES: -----#1------------------------------------------------- Subject: zipcrack & C-Dilla Spyder: thanks for the info; I'd thought that pKcrack was for the old pkware algorithm (due to its ineffectiveness ;), but I downloaded a copy with the source code and sure enough, the CRC32 code is there, same file format...I've never had any luck with fzcrack, though, so hopefully I can come up with a better approach (a crytpanalyst I am not). +Rezident: Do you know of any software that uses this protection scheme? The web page was more of a sale pitch for developers; I found little real info on it (though I guess they're emailing one of my aliases a .ppt file protected by their software, who knows if it will ever get here). Most of these techniques seem pretty standard--looking for a key files, encrypting data/exe files on disk, looking for trusted apps, looking for a cd-rom, etc. mammon_ ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: Ring0 code Hello mammom_! >Now what would you want such an evil bit of code for? I want to be able to patch a program on the fly without using S.I.. I thought it would be possible to change a code segment attributes for writing to it and inserting a calls to a dll. If you think that I'm clueless, please let me know. I'm not very sure about this :-(( big thanks :)) +trurl =====End of Issue 91==================================== ======================================================== +HCU Maillist Issue: 92 12/18/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: C-Dilla #2 Subject: Subject: Ring0 code #3 Subject: WM_GETTEXT prob... ARTICLES: -----#1------------------------------------------------- Subject: C-Dilla Hello mammon, > Do you know of any software that uses this protection scheme? The > web page was more of a sale pitch for developers; I found little > real info on it (though I guess they're emailing one of my aliases a > .ppt file protected by their software, who knows if it will ever get > here). I don't know of any software apart from that demo they offered. I have had two requests mailed to me on the same day from different people, so I suppose someone must have something protected by this. One of the messages I recieved mentioned a scientific encyclopaedia of sorts on CD - the CD was given away freely at a conference, but it only works for 30 days... > Most of these techniques seem pretty standard--looking for a key > files, encrypting data/exe files on disk, looking for trusted apps, > looking for a cd-rom, etc. Yes, I reckon that, if nothing else, it would suceptible to a brute force 'push date' approach a la my corel crack. Cya, +ReZiDeNt -----#2------------------------------------------------- Subject: Subject: Ring0 code Well trurl ,i found a couple of days ago,a mem patch made by BLiTZ / PC97 for "Absolute FTP",i guess he is the one to contact for more info.. Seems like a very interesting subject btw,we miss win32 TSRs !! Keep us informed with your research.. k0X -----#3------------------------------------------------- Subject: WM_GETTEXT prob... Hi +all, Excuse me if this is a dumb newbie question, but I stumbled over another problem: I'm trying to crack "2do", some cheap-sh*t shareware off some cheap CD... Anyways, I couldn't immediately find a way how to break into the code, so I looked with HWND what the handle of the "Enter Regkey"-Dialog-box is. Then I set a bmsg dlgboxhandle wm_gettext. I expected WinICE to break now and giving me lParam, the address where the string would be stored. Unfortunately, WinICE gives me "invalid address" all the time :-( Anybody knows what I'm doing wrong ? Thanks in advance, HalVar ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 92==================================== ======================================================== +HCU Maillist Issue: 93 12/19/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: pw #2 Subject: zipcrack & Corel Trials ARTICLES: -----#1------------------------------------------------- Subject: pw Allo everyone, As been interesting by some new challenges,has anyone infos on protections used by those xxx web password. As usual,looking on xxx list warez bored me as looking for serial's warez,some months ago,i've looking to doing registrations myself to be fast and effective on what i want,but i just require some nfo's now on accessing this protection who is new on approach for me. i will clean my hd,if anyone want my serials reg list,i'l post it! Let me know all that,and thanx by advance to all ppl for knowledges like the one on this maillist and the 'we know who' ********************* -----#2------------------------------------------------- Subject: zipcrack & Corel Trials mammon_ wrote:- >Spyder: thanks for the info; I'd thought that pKcrack was for the old >pkware algorithm (due to its ineffectiveness ;), but I downloaded a copy >with the source code and sure enough, the CRC32 code is there, same file >format...I've never had any luck with fzcrack, though, so hopefully I >can come up with a better approach (a crytpanalyst I am not). You should also have a look here:- ******************************************************** Which is a completely different pkcrack. If you know the position and value of at least 13 bytes (and preferably a couple of hundred) in one of the encrypted files it will break the zip in a couple of hours. The guy wrote a paper on zip plain text attacks, you will find source there too - very interesting and useful if you are still working on it. (send him a postcard - I will). I only discovered it today (although the site looked familiar, must have been there before without paying attention). Took about 3 hours to break a zip that had been annoying me using a 200 byte file that was in a previous version which I did have a password for. fzc does work although I doubt anyone has the patience to find anything longer than 5 or 6 character passwords. The word list option is very fast, I created about 30Mb of words and names and place names and any junk I could find and it just rips through it. You have to get lucky but worth a try. Changing the subject to cracking Corel trials - I had a quick look at one of them. Sure looks like the trial code is just a wrapper stuck on the end of a normal executable. The 1st 6 segments are standard and the wrapper adds the last 4 maybe. Of course the standard segments have been encrypted. When faced with a similar problem I have had some success debugging or attaching to the program with Turbo debug and dumping the whole text segment to a file. Some fancy editing puts the decrypted code back into the executable then a bit more hacking around is required to overcome the remaining effects of the wrapper. This works fine for text segments but others will get corrupted by the program and even the loader. You really need to break and get control just after the segments have been decrypted. Don't really know enough about how Win32 loads and runs programs. Looks like the wrapper has some anti-debug features because turbo debug didn't want to break on memory writes to the encrypted segments. Lotus also distributes trials with a similar scheme which I also took a quick look at. They encrypt the entire original file and provide a separate front end program. The front end appears to spawn a .VXD which either hooks into some Win32 execution hook (launching it via OLE maybe?) or it might even hook into the memory manager and do the decryption during paging. Anyhow just some food for thought. Sypder ******************** (if I get round to checking it). ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 93==================================== ======================================================== +HCU Maillist Issue: 94 12/20/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: javascript ARTICLES: -----#1------------------------------------------------- Subject: javascript Hello all, I'm still fairly new to cracking so I'll mostly be hanging back unless I feel I can contribute something worthwhile.Its not much but atleast zero may not call me lazy ***************************************** has a online javascript e-mail bomber,if nothing else it may prove usefull to examine.Anyway,merry christmas to all. ooWARLORDoo ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 94==================================== ======================================================== +HCU Maillist Issue: 95 12/22/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: unpacking EXEs #2 Subject: MUST READ THIS!DO NOT USE ON-LINE E-MAIL BOMBERS ARTICLES: -----#1------------------------------------------------- Subject: unpacking EXEs Hi Spyder, > Changing the subject to cracking Corel trials - I had a quick look > at one of them. Sure looks like the trial code is just a wrapper > stuck on the end of a normal executable. The 1st 6 segments are > standard and the wrapper adds the last 4 maybe. Of course the > standard segments have been encrypted. Yes, it is a wrapper...that is why the disassembler chokes on it...I don't know much (in fact, anything) about executable encryption, so I can't tell you much more about it. > When faced with a similar problem I have had some success debugging > or attaching to the program with Turbo debug and dumping the whole > text segment to a file. Some fancy editing puts the decrypted code > back into the executable then a bit more hacking around is required > to overcome the remaining effects of the wrapper. Do you mean there is a way to remove the wrapper? I would be very interested in how this can be done. I have never seen a tutorial on generic unpacking of packed/encrypted files, and I've also never seen a program that can unpack packed windoze executables (although there are windoze packers around). > This works fine for text segments but others will get corrupted by > the program and even the loader. You really need to break and get > control just after the segments have been decrypted. Don't really > know enough about how Win32 loads and runs programs. Looks like the > wrapper has some anti-debug features because turbo debug didn't want > to break on memory writes to the encrypted segments. Use SoftICE. I don't think there is any anti-debug code (I didn't come accross any), although I suspect there is some anti-disassembly code in there. From what I have observed of the Corel/Elan scheme, the code is decrypted during and after the date checks, and the code is altered depending on the outcome. If this protection wrapper could be removed, the program should run fine, as there is no protection in the application code itself. It seems as though you are familiar with executable encryption/decryption techniques, as well as programming under windows? Perhaps I could ask you to consider writing a tutorial on the subject of unpacking and decrypting packed EXEs, particularly windoze ones? I'm sure the +HCU would be most grateful for an essay on this subject. Cya, +ReZiDeNt -----#2------------------------------------------------- Subject: MUST READ THIS!DO NOT USE ON-LINE E-MAIL BOMBERS Hi All, Unfortunetly I found out too late (after posting about the online e-mail bomber) I didn't use it but after checking out Fravias page on anonymity I was surfing round trying to find out exactly HOW someone could recieve those files from my computer.I found a site on this and it details doing such things but the important thing is that the on-line e-mail bomber is more then likely one of those tricks.DO NOT use it untill you have visited the web site at *************************************** and read/understand what is going on,I'm sure most of you already are secure enough in what you are doing but I wanted to post this warning and apologize for my extreme stupidity and be guaranteed that my butt will be sore for days to come from kicking it :-),again all apologies ooWARLORDoo ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 95==================================== ======================================================== +HCU Maillist Issue: 96 12/23/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: unpacking EXEs #2 Subject: unpacking EXEs.. a precision of the "question" possed and a half solution ARTICLES: -----#1------------------------------------------------- Subject: unpacking EXEs >>When faced with a similar problem I have had some success debugging >>or attaching to the program with Turbo debug and dumping the whole >>text segment to a file. Some fancy editing puts the decrypted code >>back into the executable then a bit more hacking around is >>required to overcome the remaining effects of the wrapper. > > Do you mean there is a way to remove the wrapper? I would be very >interested in how this can be done. Well (we assume) the whole original executable is there, some or all of it encrypted and some junk stuck on the end. It has to get decrypted to run so at some stage the contents of the original executable is lying there in memory (or maybe virtual memory). If you can grab it you could reconstruct the original executable or patch the decrypted stuff back in an work on bypassing the wrapper completely. It isn't easy but it is a nice solution, the original executable is what you want, although for these trial versions it has got to be a lot easier obtaining a real copy from somewhere. >>Looks like the >>wrapper has some anti-debug features because turbo debug didn't want >>to break on memory writes to the encrypted segments. > >Use SoftICE. I don't think there is any anti-debug code (I didn't >come accross any), I'm not really up to speed with softICE and as far as I know it doesn't have the ability to dump large lumps of memory to file (which Turbo Debug does). >It seems as though you are familiar with executable >encryption/decryption techniques, as well as programming under >windows? No not very, it was a required technique to work around a dongle wrapper which also encrypted some of the wrapped program, thankfully that only encrypted the .text segment which is unchanged and in memory all the time the program is running. >Perhaps I could ask you to consider writing a tutorial on the >subject of unpacking and decrypting packed EXEs, Maybe on the dongle stuff, that is a current project isn't it. Spyder... ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: unpacking EXEs.. a precision of the "question" possed and a half solution Unpacking EXE's is a fairly complicated process and I suppose this is why nobody ever wrote a tutorial on it. However this does not mean it cannot be done. The art of unpacking DOS exe and COM files is old and you can find generic type unpackers on ****************************** or text and sourcecodes on ************************ The manual task of unpacking DOS exefiles you can find described in Bugsy's Obsession EXE-dumper 2.4. It should be avaible on both the above links As for windows EXE files - there exists no single type of windows file rather there exists multiple different exe-formats of which the most important is NE, PE and LX. NE stands for New Executable and is the EXE format that MS introduced for Win 3.1 - it's some what old and IMHO very crappy. It's a 16 bit format. Documentation about this format exist unfortunately I don't have a URL. If you wanna figure it out yourself PKLITE comes in a version that packs this format. (this file format is outdated and is not much used anymore except by those people who still want their programs to run on win 3.1 without win32s installed) PE stands for Portable Executable and is the format MS introduced for windows NT & 95 (hence the portable). And it is by far the most common. Packers/encrypters for this format are "rare" since encrypting this fucked up advanced format with lots of possibillities of abuse is pretty hard. A formal documentation can be found on MS's developers pages or on ************************ Shortly I'll release the sourcecode for such a crypter myself and I suppose reading this sourcecode would tell you how to unpack it too. Let it be said: IT'S a very hard job. It can be done though weee.. :).. In reference to your specific problem - if the "envelope" does not decrypt the actual program it can be removed relatively easy: In the PE header there is a field called entrypointrva and you simply modify this to skip directly to the "real" program. Finding the real entry point can be like this: 1. Run a program by Matt Pietrek called PEDUMP on the EXE file. (if you don't have it it'll suffice to find the ImageBase in the PE header (find the documentation on the above link) ) find the ImageBase. Write this down. It's likely to be 400000h but could be 10000h if it was linked with an old linker. 2. Now load up the program with winice and trace thru the code untill you feel (back to the idea of "zen") that it calculates the old entrypoint and jmp's to it. The jump is liable to be preceeded by POPS, SUB register, [EBP+something] type, MOV register, [EBP+Something] and for the packagers I've seen so far the JMP itself is either of the type JMP Register or db E9h XX,XX,XX.. Trace this jump and write down the EIP. 3. Subtract the value found in 2 with the value found in 1 and patch it into the PE header following the above mentioned documentation at the point that says: EntryPointRVA. 4. You've now moved the entrypoint and hopefully everything works as it should without the start up code. LX stands for linear executable and is a very old format or rather to be exact covers a bunch of formats one for OS2, etc. The windows format is used for VxD's. Packers to this format exist (or I think that *ONE* packager exist) and unpacking this format is a particularly nasty job! If you in general are interested in this kinda topic I strongly suggest you refer to ************************ or ******************************* Or perhaps join Hanno Boeck's EXE mailing list - you can find a link to it on either of the above pages. Sorry about the shortness of the above.. I was in a hurry.. Stone - United Cracking Force =====End of Issue 96==================================== ======================================================== +HCU Maillist Issue: 97 12/24/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Kremlin v2.0 - Protection against wdasm? #2 Subject: Merry Christmas! #3 Subject: Re: +HCU ML Issue 96 ARTICLES: -----#1------------------------------------------------- Subject: Kremlin v2.0 - Protection against wdasm? Kremlin is one of my favourite encryption tools and i like too follow it with regards too the cracking aspects. It has been the subject of a couple of tutorials and the maker himself wrote a letter too fravia in good faith. When i noticed the new version 2.0 was out i d/l it too see if he had improved on the last version VERY bad protection. I was slightly dissapointed too see that the first .dll file i targeted (KremDLL.dll) housed the guts of the encryption scheme. after doing a half crack on it so it would accpet any rego key and running the program successfully i got a strange window with something along the lines of "Some how you have enter the correct regerstation key without paying for Kremlin... (yadda yadda yadda)" this also triggered the program too cripple itself again. Although it still accepted psuedo-rego keys. Without finding any referance too that particular window in KremDLL.dll i tried too disassemble main exe with wdasm and got a segment fault. Maybe he has learnt from the past after all? -faeton -----#2------------------------------------------------- Subject: Merry Christmas! 0 / \ MERRY /+ \ CHRISTMAS / * \ AND /+ *\ HAPPY / * * \ CRACKING! ^^^| |^^^ -----#3------------------------------------------------- Subject: Re: +HCU ML Issue 96 Hi all, I got a question concerning an idea for a rather tough protection sheme... Assuming you have a program with certain features disabled in the unregistered version, and you can unlock them with a Regkey. Now the programmer manipulates the valid serial in a way to get the exact amount of RAM to allocate for the full version with all features. Let's take a 14-digit RegKey and you should be pretty safe against any kind of brute-force. So even if somebody cracks your "check-serial" part, it wouldn't work since the program quits with an error message under Win95. HalVar ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 97==================================== ======================================================== +HCU Maillist Issue: 98 12/25/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Kremlin 2 #2 Subject: EXE wrappers #3 Subject: Thanks for the info #4 Subject: Merry Christmas! ARTICLES: -----#1------------------------------------------------- Subject: Kremlin 2 Kremlin 2 Will be published asap on my page, cracked (of course) by Jon later fravia+ -----#2------------------------------------------------- Subject: EXE wrappers Hi Spyder, > Well (we assume) the whole original executable is there, some or all > of it encrypted and some junk stuck on the end. Yes, the entire EXE is present in the case of Corel products - they are not limited in any way, apart from the 30-day limit. > memory). If you can grab it you could reconstruct the original > executable or patch the decrypted stuff back in an work on bypassing > the wrapper completely. Yes, this is what I thought - I just wish I knew *how* :-) > It isn't easy but it is a nice solution, the original executable is > what you want, although for these trial versions it has got to be a > lot easier obtaining a real copy from somewhere. Well, I've already cracked the Corel/Elan protection, but I still would like to know how to remove this sort of wrapper. It could be useful in defeating other protections. > I'm not really up to speed with softICE and as far as I know it > doesn't have the ability to dump large lumps of memory to file > (which Turbo Debug does). I suspect it probably does, the manuals will doubtless tell you. They are available from the numega website - the link to the files is on my webpage: *************************** > Maybe on the dongle stuff, that is a current project isn't it. Yes, it is. I wish I had a piece of dongle protected software to experiment with. Cya, +ReZiDeNt -----#3------------------------------------------------- Subject: Thanks for the info Hello Stone, > ****************************** or text and sourcecodes on > ************************ The manual task of unpacking DOS exefiles > you can find described in Bugsy's Obsession EXE-dumper 2.4. It > should be avaible on both the above links Yes, I've visited both these sites before. Your site I found very useful, thanks! > Sorry about the shortness of the above.. I was in a hurry.. Not at all! It was very useful and imformative! Thanks for taking the time to explain. Cya, +ReZiDeNt -----#4------------------------------------------------- Subject: Merry Christmas! Hi all! The title says it all - Merry Christmas! BTW, has anyone else noticed the almost obcene commercialism that has overtaken Christmas? Cya, +ReZiDeNt =====End of Issue 98==================================== ======================================================== +HCU Maillist Issue: 99 12/26/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: A request for help from obscura: War on a Spammer #2 Subject: Softice 3.2 Touchpad driver? #3 Subject: Thoughts inspired by the Kremlin post ARTICLES: -----#1------------------------------------------------- Subject: A request for help from obscura: War on a Spammer A request for help... I already told them that the only one that could really help (apart from +ORC) is +Alistair, tough. later fravia+ -------------Forwarded Message----------------- From: Mixmaster, ************************************* To: , ********************** Date: 25-12-97 0:06 RE: War on a Spammer Hello Fravia, Knowing how you feel about spam I would like to ask you and the best of the students of +ORC to join our fight. Daily our little usenet discussion group has been bombarded with porno spam from snatchpatch.com. We decided to fight this abuse. We were succesful in getting snatchpatch canceeled from an ISP . When we contacted Holonet.net the website provider we hit a brick wall. Yesterday we started contacting the other customers of Holonet to let them know of this abuse. The owner of snatchpatch (Rich Kwiat ) then mailed a virus to one of our members. I'll paste a copy of the email he received at the bottom. Please consider helping us out. When he starts sending viruses to people it is time to get serious. A whois lookup will show you that snatchpatch.com and amateurnight.com are one in the same. Both owned by: Administrative Contact: Kwiat, Rich (RK1829) amateur@AMATEURNIGHT.COM 954-433-1437 Have a happy holiday! Tom Here is a copy of the email containg the virus one our members received: From rich@ppp.nasionet.net Fri Dec 19 01:51:14 1997 Received: from LOCALNAME ([202.189.3.9]) by wasp.nasionet.net (Netscape Mail Server v1.1) with SMTP id AAA23486 for **************************** Fri, 19 Dec 1997 17:45:33 +0800 Message-ID: <349B25BA.7604#ppp.nasionet.net> Date: Fri, 19 Dec 1997 17:56:10 -0800 From: "Chan Chao Liang" <rich@ppp.nasionet.net> Save Address Block Sender Reply-To: rich@ppp.nasionet.net X-Mailer: Mozilla 3.0 (Win16; I) MIME-Version: 1.0 To: ************************* Subject: Greeting Content-Type: multipart/mixed; boundary="------------40C03E6C72" Attachment Enclosed! Hi Kenny, what'a nice Christian Name. Ha ! Ha ! Haaaaaaaaaaaaa! Some interesting info here is : 1. http://www.ultimate.inter.net/ultimate.html is a ultimate babe competition on net, try to go for top 10 2. Make sure you open the attached greeting xmas.exe That's all for now. Bye seewm@tm.net.my Download Attachment: XMAS.EXE --end of forwarded message fravia to +HCU general maillist -----#2------------------------------------------------- Subject: Softice 3.2 Touchpad driver? Greetings, Happy Holidays, and a prosperous new year! I use Softice 3.2 and can not find a driver for my Cirque Touchpad. I can use the normal mouse, but prefer the touchpad. Does anyone have a solution for this problem? Thanks zinger -----#3------------------------------------------------- Subject: Thoughts inspired by the Kremlin post Hi all! -faeton wrote about the author of Kremlin: >Maybe he has learnt from the past after all? This reminds me to ask if anybody has checked out the new versions of MS MONEY and MS PROJECT, if Microsoft has learnt anything from the strainer lessons? Probably, they don't care, but it would be fun to see whats the situation after a dozen people published tutorials about the protection. Some time ago I have tried to download them, but gave up (I think both above 20 meg now). Another thought for shareware programmers who are trying to produce crippled demo versions with regkeys (like Kremlin). Yesterday, I cracked +RCG's example 4 and wrote an essay to +Fravia which containes some ideas, how to implement a good cripple protection. Bye Zer0+ =====End of Issue 99==================================== ======================================================== +HCU Maillist Issue: 100 12/27/1997 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Steganography #2 Subject: new address ARTICLES: -----#1------------------------------------------------- Subject: Steganography Has anyone cracked the pictures on the steganography page? The text file includes a lot of goodies (Even a Cosmological view of the closest 2300 galaxies!), but no link to the advanced Steg page. Presumabley I either did something wrong, missed out on something, or Fravia was just joking. I would be interested if anyone else has had these problems(Some of the links connect to fravia.org, which I can't connect to, so maybe the advanced page is there ) +Alt-F4 ____________________________________________________________________ Get free e-mail and a permanent address at ************************* -----#2------------------------------------------------- Subject: new address Hi All! First of all: merry Christmas!!! :) Second: I've changed my address, now you can find me at **************** .... that's all! :) byez, .+MaLaTTiA. =====End of Issue 100=================================== -- End --