                           Mac Hacking - Step By Step

1. Determine your target

	The first step to hacking a Mac is picking a Mac. You should probably pick
one that is out of the way, because you will be doing some disk
swapping/other stuff that may alert a passing administrator.

2. Determine the target's security/protection

	This step is easy. You should first note the model number and the version
of system software that it is running. This will be very important later.
Then try to get some time on the computer. Try different things, and look
for a security program. Common ones are Foolproof and AtEase. Foolproof will
show you it's logo every time you try to do something that your not supposed
to and AtEase is characterized by it's drool-proof replacement for the
finder. The method that you will use to break in will get past _any_
security, but if you want to remove the security for good then you will have
to know what to look for.

3. Build a system disk

	Remember that model number? Well now it's time to pull it out. You also
should have noted what version of the system software was on that computer.
Lets say that you want to hack a PowerMac 7200 that's running system 7.5.3.
Now go on Altavista or Apple's site or (gasp) AOL (puke) and do a search for
'System 7.5.3' or something like that. Look through the results until you
find the installer or the disk images. Download the disk image called 'Disk
Tools'. The Disk Tools disk has a minimal set of software that will allow
you to boot the target off the disk drive. Once you have download the 'Disk
Tools' image, use a good disk image tool like ImageMaster or DiskCopy and
make a disk from the image.

4. Break in

	Get to the target. Pop your disk in the drive and hold down
Command-Control-Power (power is the little key with the sideways triangle up
at the top of the keyboard). The computer should restart, and then the disk
drive will spin up. If all goes well, you should start up without the
security program, running entirely off the Disk Tools disk. Now that you are
started up, you can do anything, including...

5. Remove the security!

	Note: Don't do this if you don't want people to know that the computer was
hacked! To remove the security program, open up the system folder (usually
named 'System' or 'System Folder' in the root directory) and look for a file
with the name of the security program in the 'Extensions', 'Control Panels'
and 'Startup Items' folders. When you find a file that looks like part of
the security program (and there may be more than one file), delete it.
What's this? It says that it can't be deleted because the file is locked?
Well, just select the file's icon and hit Command-I. This will bring up the
File Info window. There will be a little check-box at the bottom labeled
'Locked' with an 'X' in it. Uncheck it and close the window. Voila! You may
now empty the trash, eject your disk and restart.
