======================================================== +HCU Maillist Issue: 221 05/14/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: IDA SDK, ZIP cracking #2 Subject: dce30 #3 Subject: gthorne ida message #4 Subject: "Internet Magazin", June issue #5 Subject: Illegal Protection Schemes ARTICLES: -----#1------------------------------------------------- Subject: IDA SDK, ZIP cracking I've come across a similar problem with breaking zip files. The plaintext attack works really nicely when you have several files in a zip and know plaintext of one so can break the others. Some have now started 'double-zipping' placing zips within zips to try and stop this. This is a good and bad thing as it is annoying if we knew some of the original plaintext, but we also know something of the ZIP format. Annoyingly enough, we usually know the first 10 bytes of the ZIP file. I'm not sure if you can sacrifice the 3 extra bytes required for a more complex attack. However, if we know the names of the files within the ZIP we can _possibly_ perform a plaintext attack on that (I've not looked closely enough into the zip format). Another good thing is that the licence agreements etc. which are usually small text files are _stored_ and rarely change between versions so you can perform plaintext on that. The unfortunate thing is that pkcrack, afaik, doesn't allow known plaintext to be in the middle of a file, so you'll probably need to write your own cracker. Also, brute force, though somewhat crude, does quite often turn up the passwords (e.g. GhostSoft have now started to PW protect their Ghost updates - but use easy to brute force passwords) Thank you to those who sent me the IDA SDK directly (I received 3 copies to clog my inbox :) Please, no more! Regarding those who asked for IDA375, I'm going offline now so can't send to you. However, I got it posted to several T1 sites (sorry I don't have the URLs) and a lot of people now have it so you are likely to get hold of it somewhere. PaulGao's site has a copy (I haven't used tried it), my version is a RAR file. If you can't find it, contact me by email, and I'll get back to you sometime in June. If you need it, go onto IRC and ask around (#cracking, #cracking4newbies) as many people have it now. OK, sorry if it is slightly off-topic. Have a nice summer and I'll see you all in June. ~~ Ghiribizzo -----#2------------------------------------------------- Subject: dce30 Hi to all Hopefully someone know 'datacrack engine 2 or 3' by Piratel? can someone help me to find how is hidden the Piratel string? were a nice tutorial for me to find out get that and understanding other strange (for me) hidden the file can be found on cracking.m... as dce30us.zip it's packed but thats ok for that,i've tried the xor method but..:( I really appreciate a mate teach me and so continue by myself the rest! +haribo ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: gthorne ida message Message Body = for those of you who want it, i went ahead and put ida 375 on the site on my assembly page greythorne.home.ml.org i was surprised how many people did not know how to run ida in a resizeable window... by the time you get this message it will probably already be mentioned on the page - but heres the simple trick... make a batch file to run idaw.exe instead of running idaw.exe then make a shortcut to the batch file (set the properties to make it quit on exit of course) and guess what.. ida fills the dos box - so you can resize the dos box as you normally would, by choosing font sizes i can barely read my copy of ida in a window at all without doing this just a little tip for the newbies ;) +gthorne -----#4------------------------------------------------- Subject: "Internet Magazin", June issue "Internet Magazin" ************************* in its latest issue in the article "Secret Sites"(pp.22-26) speaks about Warez sites, legal aspects and interviews a New-York hacker Dark Soul ***** garden.net/users/zero/hack). "To be unknown on the Web/ Alias E-Mail adresses"(p.34) gives a list: akaMail, Alta Vista, BigFoot, Correo, EuroMail, ForeverMail, HotMail, MyMail, NetAdress, NetForward, Pobox, WorldPost. HotMail, often seen in our list, is qualified as Microsoft bought company, having a bad reputation to be misused by Spammers. "Books Online": *********** **************** *************** ************** "Handies on the Web. E-Mail, SMS (ShortMessageService) and Fax" (p.78) speaks about the usage of mobile phones. AZ111. -----#5------------------------------------------------- Subject: Illegal Protection Schemes For those of you have read my unfinished Legality of Cracking essay, here's another something that is to be included in the 'Illegal Protections' section: right,right,right,right,rightArialWHILE computer games enthusiasts were preparing to obliterate the evil alien race of Zerg, their computers were being hijacked by a software company, a lawsuit alleges. Donald Driscoll, a lawyer in Albany, California, is suing the maker of the Starcraft computer game, claiming that the software surreptitiously gathered confidential information. Arialright,right,right,right,rightIn Starcraft, players compete against each other over the Internet. Driscoll alleges that Blizzard Entertainment of Irvine, California, put a "trap door" in their software. "It takes a file that has important information about your computer and your programs, and if Blizzard requests, it tries to upload your e-mail address and name," he says. Susan Wooley, a spokeswoman for Blizzard, confirms that information has been gathered by Blizzard's games server, battle.net. "We were having problems with people being denied access, so our bat-tle.net server went in and gathered their e-mail addresses," she says. The company has also been able to spot pirated copies of right,right,right,right,rightits software, but Wooley says the data gathered were not used to catch pirates, and have been deleted. The trap door is no longer in use, she adds. right,right,right,right,rightHowever, David Banisar, a lawyer with the Electronic Privacy Information Center in Washington DC, argues that Blizzard's actions flouted Californian law. "It's downright illegal," he claims. Driscoll filed the lawsuit on behalf of an organisation called Intervention, based in Albany, which sues companies it claims are using unfair business practices. But he argues that the case raises wider privacy issues. "All the government would have to do is hook up with a popular game manufacturer, and it could search for accounting files and tell whether you're making more than you're reporting," says Driscoll. "We're trying to get the word out to software manufacturers: you can't just rummage through somebody's computer." Needless to say, this would be very interesting to look at. ~~ Ghiribizzo =====End of Issue 221=================================== ======================================================== +HCU Maillist Issue: 222 05/15/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: REQ: Help for Novell 3.12 #2 Subject: CryptKey #3 Subject: IDA Windows #4 Subject: IDA screen configuration ARTICLES: -----#1------------------------------------------------- Subject: REQ: Help for Novell 3.12 Hi all, I want to change the 5-User-license up to 25, but i donīt know where to start cracking (perhaps Server.exe?). Can someone help? NiKai ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: CryptKey to: Mu/Muso References can be found at the page: ****************************************************** where it was discribed as an uncrackable protectionist program, based on a one-chip LPT only-once-programmable device. It is rather a publicity page and a warning to crackers. AZ111. -----#3------------------------------------------------- Subject: IDA Windows Regarding IDA window resizing, - I can resize the window when IDAW is run directly from the .EXE. Maybe it is something to do with the default DOS program .PIF file or whatever? That said you may find IDAW screen drawing and navigation is *significantly* faster when it is run from a DOS prompt (or batch file). Some strangeness to do with the DOS window or winoldap being its parent. (That's under Win95 don't know about NT). Also don't forget you can set IDAW screen rows and columns in IDA.CFG. spyder -----#4------------------------------------------------- Subject: IDA screen configuration A lot of newbies I've spoken to don't seem to like using IDA. Perhaps it is due to having the default screen size? I found it impossible to use IDA with the default settings as so little of the listing could be seen. I haven't tried gthorne's batch file trick. You can modify the settings using the ida.cfg file (as well as many other settings). To change the screen size look for the following: SCREEN_MODE = 0x8440 // Screen mode to use // high byte - cols, low byte - rows // i.e. 0x5020 is 80cols, 32rows I use 8440 which corresponds to 132x64. The screen is not resizable but this isn't a problem for me. ~~ Ghiribizzo =====End of Issue 222=================================== ======================================================== +HCU Maillist Issue: 223 05/18/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: gthorne - ida speed and such #2 Subject: starcraft illegalities #3 Subject: The Big Brother Strikes Again ARTICLES: -----#1------------------------------------------------- Subject: gthorne - ida speed and such Message Body = ahh yes - i had a suspicion it was working faster before i think that was my original reason for working in the dos box - looking back on it heres what i think may be happening... in windows, the app is using memory on the fly allotted by windows itself in dos, the memory area is prerequisitioned and set as protected and unresizeable to me that says that anything running in a dos box will be not under the added stress of constant memory size adjustments i am sure there are probably some other non-obvious reasons as well, but unless completely off - it sounds reasonable to me as to why bonsoir, +gthorne -----#2------------------------------------------------- Subject: starcraft illegalities This is a multi-part message in MIME format. ------=_NextPart_000_0037_01BEA143.519D59E0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0038_01BEA143.519D59E0" ------=_NextPart_001_0038_01BEA143.519D59E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi all.. here is a bit of info I found about starcraft... might be of interest to = you all... =20 =20 >>>>>>.Quote =20 It has come to my attention (via a few friends on IRC, whose names I = have forgotten), that during any failed Starcraft BATTLE.NET connection (i.e. you have an invalid CD-Key), some sensitive information is = (illegally) retrieved from your registry and sent up to Blizzard. This only seems to occur the first time you connect using an invalid key, but not = afterwards. I have personally confirmed this using socket traces. =20 As of the writing of this document, 6 registry keys in particular are checked and sent back to Blizzard, who obviously hope to collect names = and e-mail addresses of those who attempt "invalid" connections to = BATTLE.NET. These 6 keys are: =20 HKEY_CURRENT_USER\Software\Microsoft\MS Setup (ACME)\User Info\DefName HKEY_CURRENT_USER\Software\Microsoft\Internet Mail and News\Mail\Sender = Name HKEY_CURRENT_USER\Software\Netscape Navigator\User\User_Name HKEY_CURRENT_USER\Software\Microsoft\Internet Mail and News\Mail\Sender = EMail HKEY_CURRENT_USER\Software\Netscape\Netscape Navigator\User\User_Addr HKEY_CURRENT_USER\Software\Kali\Kali95\User Info\email =20 Blizzard has the ability to change which registry keys are checked at = any time, but currently only these 6 are checked. I would advise doing a = "Find" operation in REGEDIT and removing any traces of your real e-mail and = name. =20 To combat this outright "invasion" of your computer privacy, I have = coded a small program that will make your computer "anonymous" by setting = these 6 registry keys to anonymous values. (Setting the names to Ben Dover and = ************************************* in particular). Just run = BNETANON.EXE to display your current settings and click YES to "anonymize" them. Any settings that show up as "" have never been created, so you don't need to worry about them. =20 Can't believe that Blizzard would do such a thing? Do the socket trace yourself: go to ************************** download Socket Spy/32, and register it using the following codes: =20 Name=3DBeowulf Company=3DRAZOR 1911 Code=3DOHJGH3LNLKM3O372 (note that all the O's are the letter O, not = zero) =20 Fire up Socket Spy/32, do "File/Begin Trace" (you may want to also turn = on Capture To Disk to save a .TXT copy of the trace) then launch Starcraft = and attempt a BATTLE.NET connection. After you are denied, exit out of = Starcraft and check out the trace results. If this is the first time you have = attempted to connect to BATTLE.NET using a particular bogus CD-Key, you should see = what I mean. Note that the registry keys are only polled the FIRST time you = try an invalid key, but not afterwards (I THINK). I have included a trace I = did myself as TRACE.TXT. =20 What does all of this mean? Well, if you plan to do "war-dialing" with generated keys to find a valid one, you will definately want to make = your information anonymous. If you don't ever use BATTLE.NET for Starcraft, then this doesn't affect you at all. - Beowulf [RAZOR 1911] >>>>>>>>>>end quote cheers....HaQue ------=_NextPart_001_0038_01BEA143.519D59E0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Hi all..
here is a bit of info I found about = starcraft...=20 might be of interest to you all...
 
 
>>>>>>.Quote
 
It has come to my attention (via a = few friends=20 on IRC, whose names I have
forgotten), that during any failed = Starcraft=20 BATTLE.NET connection
(i.e. you have an invalid CD-Key), some = sensitive=20 information is (illegally)
retrieved from your registry and sent up = to=20 Blizzard. This only seems to
occur the first time you connect using = an=20 invalid key, but not afterwards.
I have personally confirmed this = using=20 socket traces.
 
As of the writing of this document, = 6 registry=20 keys in particular are
checked and sent back to Blizzard, who = obviously hope=20 to collect names and
e-mail addresses of those who attempt=20 "invalid" connections to BATTLE.NET.
These 6 keys = are:
 
HKEY_CURRENT_USER\Software\Microsoft\MS Setup=20 (ACME)\User = Info\DefName
HKEY_CURRENT_USER\Software\Microsoft\Internet Mail=20 and News\Mail\Sender Name
HKEY_CURRENT_USER\Software\Netscape=20 Navigator\User\User_Name
HKEY_CURRENT_USER\Software\Microsoft\Internet= Mail=20 and News\Mail\Sender = EMail
HKEY_CURRENT_USER\Software\Netscape\Netscape=20 Navigator\User\User_Addr
HKEY_CURRENT_USER\Software\Kali\Kali95\User=20 Info\email
 
Blizzard has the ability to change = which=20 registry keys are checked at any
time, but currently only these 6 are = checked. I would advise doing a "Find"
operation in REGEDIT = and=20 removing any traces of your real e-mail and name.
 
To combat this outright = "invasion" of=20 your computer privacy, I have coded
a small program that will make = your=20 computer "anonymous" by setting these
6 registry keys to = anonymous=20 values. (Setting the names to Ben Dover and
,=20 in particular). Just run BNETANON.EXE
to display your current = settings and=20 click YES to "anonymize" them. Any
settings that show up as = "<not defined>" have never been created, so you
don't = need to=20 worry about them.
 
Can't believe that Blizzard would do = such a=20 thing? Do the socket trace
yourself: go to "
register it using the following=20 codes:
 
   = Name=3DBeowulf
Company=3DRAZOR=20 1911
   Code=3DOHJGH3LNLKM3O372  (note that all the = O's are the=20 letter O, not zero)
 
Fire up Socket Spy/32, do = "File/Begin=20 Trace" (you may want to also turn on
Capture To Disk to save a = .TXT copy=20 of the trace) then launch Starcraft and
attempt a BATTLE.NET = connection.=20 After you are denied, exit out of Starcraft
and check out the trace = results.=20 If this is the first time you have attempted
to connect to BATTLE.NET = using a=20 particular bogus CD-Key, you should see what
I mean. Note that the = registry=20 keys are only polled the FIRST time you try
an invalid key, but not=20 afterwards (I THINK). I have included a trace I did
myself as=20 TRACE.TXT.
 
What does all of this mean? Well, if = you plan to=20 do "war-dialing" with
generated keys to find a valid one, = you will=20 definately want to make your
information anonymous. If you don't ever = use=20 BATTLE.NET for Starcraft,
then this doesn't affect you at = all.
          &nbs= p;            = ;            =              = - Beowulf [RAZOR 1911]
>>>>>>>>>>end=20 quote
cheers....HaQue
------=_NextPart_001_0038_01BEA143.519D59E0-- ------=_NextPart_000_0037_01BEA143.519D59E0 Content-Type: text/plain; name="TRACE.TXT" Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename="TRACE.TXT" recv (SOCKET=3D94, flags=3D0x0000) returns (10 bytes) 0000: FF 07 0A 00 02 00 00 00 00 00 .......... send (SOCKET=3D94, flags=3D0x0000) returns (4 bytes) 0000: FF 2D 04 00 .-.. send (SOCKET=3D94, flags=3D0x0000) returns (4 bytes) 0000: FF 30 21 00 .0!. send (SOCKET=3D94, flags=3D0x0000) returns (29 bytes) 0000: 00 00 00 00 33 37 33 33 36 38 30 32 34 36 30 35 = ....373368024605 0010: 30 00 52 41 5A 4F 52 20 31 39 31 31 00 0.RAZOR.1911. recv (SOCKET=3D94, flags=3D0x0000) returns (22 bytes) 0000: FF 2D 16 00 38 7B D7 5D 65 0C BD 01 69 63 6F 6E = .-..8{.]e...icon 0010: 73 2E 64 61 74 00 s.dat. recv (SOCKET=3D94, flags=3D0x0000) returns (21 bytes) 0000: FF 30 15 00 04 00 00 00 44 49 53 41 42 4C 45 44 = .0......DISABLED 0010: 20 4B 45 59 00 .KEY. recv (SOCKET=3D94, flags=3D0x0000) returns (385 bytes) 0000: FF 18 41 00 00 00 00 00 01 00 00 80 53 6F 66 74 = ..A.........Soft 0010: 77 61 72 65 5C 4D 69 63 72 6F 73 6F 66 74 5C 4D = ware\Microsoft\M 0020: 53 20 53 65 74 75 70 20 28 41 43 4D 45 29 5C 55 = S.Setup.(ACME)\U 0030: 73 65 72 20 49 6E 66 6F 00 44 65 66 4E 61 6D 65 = ser.Info.DefName .... etc. the rest of the registry keys send (SOCKET=3D94, flags=3D0x0000) returns (4 bytes) 0000: FF 18 xx xx send (SOCKET=3D94, flags=3D0x0000) returns (xx bytes) 0000: 00 00 00 00 (INSERT YOUR NAME/EMAIL HERE) = xxxxxxxxx closesocket (SOCKET=3D94) returns (NO ERROR) ------=_NextPart_000_0037_01BEA143.519D59E0-- -----#3------------------------------------------------- Subject: The Big Brother Strikes Again This is my first mail to this mailinglist. Some time ago I speculated with my friend about the NSA and the possibility if they had an automatic email-surveying system which could scan every piece of email sent on this earth. So my friend made a test. For a while he sent email and put names of terrorist organizations in them. He also added his webpage URL to email-signature. And a week after that his webpage was visited by a person with url ending with .mil suffix, which turned out to be a anti-terrorist organization under NSA. Makes you think, doesn't it? Dirac ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 223=================================== ======================================================== +HCU Maillist Issue: 224 05/19/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Starcraft illegal ARTICLES: -----#1------------------------------------------------- Subject: Starcraft illegal Blizzard's crew tell was true of the spying activities,but was only to locate peoples who have bugs with the game... I've also heard,a trial should be engaged against for illegalities... anyway watch out.. ceban ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 224=================================== ======================================================== +HCU Maillist Issue: 225 05/20/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: IDA speed #2 Subject: Winrar #3 Subject: gthorne - ida speed and such ARTICLES: -----#1------------------------------------------------- Subject: IDA speed >ahh yes - i had a suspicion it was working faster before > >i think that was my original reason for working in the dos >box - looking back on it > >heres what i think may be happening... > >in windows, the app is using memory on the fly allotted by >windows itself in dos, the memory area is prerequisitioned >and set as protected and unresizeable to me that says that >anything running in a dos box will be not under the added >stress of constant memory size adjustments >i am sure there are probably some other non-obvious reasons >as well, but unless completely off - it sounds reasonable to >me as to why Hmmm, IDA itself doesn't run slowly it is screen drawing or just scrolling that gets killed - it can't even keep up with the keyboard repeat rate while scrolling with cursor keys. IDAW is a Win32 console app so I can't really see its memory allocation has much to do with the DOS window that started it. (talking Win95 here) If you look at the task list while running IDAW 'directly' you will see winoldap, looking at the window properties will show the application was apparently started by CONAGENT.EXE. CONAGENT.EXE is a real DOS program. I don't know how this lot hangs together but I do know IDAW runs a lot better started from a DOS window and I don't think it is the only Win32 console app so affected. spyder -----#2------------------------------------------------- Subject: Winrar Hello Everyone Iam trying to find or break a password in a rar file. But have found very little information, so far on CRC and/or rar's implementation of it by searching the web. Any help with detailed information, URLs, books, etc would be appreciated. cheers Rundus ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: gthorne - ida speed and such hi, U are right iDa under windows is slowest..... The real reason is because it is a Console32 APP.... Means it use the console API (getstdhandle, writefile) which is fucking slow !!! IDA under dos use Direct video access.... and when windows run, the app is allowed to do direct video access (they are in fact catched by a VXD which do it properly). This is the main reason. And this is not due to memory allocation on the fly. If u look at dos box properties, u will see that u can set the memory to be allocated when needed... If u ever write any console APP program u will notice what I say ;) cu =====End of Issue 225=================================== ======================================================== +HCU Maillist Issue: 226 05/21/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: RAR PW cracking #2 Subject: gthorne - ida on speed #3 Subject: RAR PW cracking ARTICLES: -----#1------------------------------------------------- Subject: RAR PW cracking I've seen it at 'password recovery tactics' (I don't know the link off-hand, but I think it may still be linked by my page) There are actually binaries there which crack the various versions of RAR - so you can reverse these to find out what's going on. Also Joe Pescel's (sp) page might have something (I don't know the url). You can probably pull others from the web somewhere. ~~ Ghiribizzo -----#2------------------------------------------------- Subject: gthorne - ida on speed Message Body = as always, i am thrilled by the number of responses to topics on this newsletter thank you all for posting :) and you guys are right, it doesnt make much sense how a win app stays within the confines of a dos box without making a separate window for it, three cheers to ilfak for that one! i keep trying to find the time to learn windows based programming, but it just hasnt been able to happen - for now i must satisfy myself with command prompt until my free time increases whats one more language when i have already programmed in over a dozen? on a different note: did anyone other than fravia and myself get postings from a new york jobhunter attempting recruitment? i have checked him out somewhat and his company really does search for people to work in silicon valley and new york city we are curious as to whether he has been surfing the web and randomly finding hackers and crackers - or less likely - he got a tip from someone we know any input on this one would be nice - unless someone has really done a number on net sources, he is legitimate for those of you who are worried about it, you shouldnt be check the website at ************ if you want to see for yourself and as always, thanks for your time fellow rev-engineers +gthorne -----#3------------------------------------------------- Subject: RAR PW cracking Hi +All! :) >I've seen it at 'password recovery tactics' (I don't know the link >off-hand, but I think it may still be linked by my page) It should be ******************************** but you can visit Ghiribizzo's GOOD page anyway, of course... ;)) byez, .+MaLaTTiA. =====End of Issue 226=================================== ======================================================== +HCU Maillist Issue: 227 05/23/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: otec #2 Subject: Email change #3 Subject: Ghiribizzo's Homepage #4 Subject: rar #5 Subject: Job hunting and OpentNT..... #6 Subject: about speed of IDA ARTICLES: -----#1------------------------------------------------- Subject: otec greythorne: Yeah, I got an email from this guy too. I sent him a note to the effect that he would have to come up with a much more convincing offer ($$$ ;) than "joining his pool of employees" to get me to compromise my handle that blatantly. But I did the same as you, he is legit and his email does point to the president of the company. Unfortunately I browsed his job listings and my last recruiter was much better ;) _m ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: Email change Sorry for this, but I've just realised that my email account has also been lost. If you've sent stuff to me recently then it has gone. You can use ************************ temporarily. ~~ Ghiribizzo -----#3------------------------------------------------- Subject: Ghiribizzo's Homepage Well, if it was on my homepage, it isn't there anymore. It got wiped. Well, it lasted quite a while anyway. There are no plans to replace it for the moment. ~~ Ghiribizzo -----#4------------------------------------------------- Subject: rar Hello Everyone Hello Ghiribizzo The rar file is rida98.exe and it's your password (or Caligo ) :-)) I have a copy of IDA v3.75 already, but became interested and traced through part of rida.exe. Finding where it compares the CRC values and the decryption of the password you have entered in with 8 bytes of the file at a time. cheers Rundus ______________________________________________________ Get Your Private, Free Email at ********************** -----#5------------------------------------------------- Subject: Job hunting and OpentNT..... Those Jobhunters fill my mailbox everyday, If they think can you can spell the word "PC", they contact you.... :-( (Spammmers) (example of today follows..) "From: Jim Rogers *********************** Subject: Job Opportunity To: ********************* UNIX.....Blabla...slime...sugar...$$$$...etc..... Now more serious talk, after fixing a date problem in OpenNT 2.1 (three files.) I was wondering if somebody made a key generator for it ??? (there was one for 2.0 and I saw some mails in the archive.) If not I like to make one but not alone as this would be my first one so sharing some thoughts would nice...... (I just bought the program so I have allready 2 working keys :-) ******************* -----#6------------------------------------------------- Subject: about speed of IDA IDAW is a Win32 console program. It use standard console display API's, and all these API's are very slowly. We can speed this by write video memory directly just as we do in DOS. Every Win32 console program has a correspondent VM. From the VMcb structure we can get 'CB_High_Linear' which is the base memory of the VM. So the console screen memory is CB_High_Linear + B8000h Write directly to this memory will speed your console program. Best regards, Liutaotao =====End of Issue 227=================================== ======================================================== +HCU Maillist Issue: 228 05/24/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Numega's new Java product #2 Subject: RAR PW ARTICLES: -----#1------------------------------------------------- Subject: Numega's new Java product Hi All! I got this in my mail today , and I know some of you are interested in Numega's product and Java in particular so do it at your own risk.... "Hello Java developer! I'd like to invite you to participate in the beta program for our latest Java development tool -- JCheck. NuMega JCheck is an automatic run-time error detection and diagnosis tool for Java developers. It automates Java debugging and helps solve tough Java problems. With JCheck you can: * Understand your program execution flow and debug logic errors quickly and easily with run-time event logging. * Analyze and diagnose difficult Java thread usage problems with advanced thread monitoring. * Build reliability into your Java applications and components while you develop. Why should I join? Aside from the thrill of getting your hands on the latest and greatest in development tools from NuMega, and having the power to make a difference in the development of those tools, you'll be eligible for our "Beta Rewards" program! How do I sign-up? It's easy! Start at the following link and accept our online non-disclosure agreement (NDA). Then, fill out our short survey about your current project and development environment. Once your application has been reviewed, you will be contacted with additional instructions and software. The URL: ********************************************* The user name is: "betaweb" The password is: "2manYbugs" (case-sensitive) Any other questions? If you have any additional questions, please contact our beta manger at ************************ Thank you and we look forward to working with you! The NuMega Beta Team" maybe I was a fool filing up there form but they do make use of it ;) Bisoux -----#2------------------------------------------------- Subject: RAR PW Rundus, The pw isn't mine. The version of IDA I sent about was named either IDA375.RAR or ID.DAT (though they could have been renamed). The archive was not passworded. The archive was an image of an installed IDA rather than the install files themselves (i.e. the NID files). The RAR file you've got is either from somewhere else, or someone put a PW on it (I hate it when they do that). ~~ Ghiribizzo =====End of Issue 228=================================== ======================================================== +HCU Maillist Issue: 229 05/24/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: win32.hlp & vb5 #2 Subject: Email echo #3 Subject: Evelock prot ARTICLES: -----#1------------------------------------------------- Subject: win32.hlp & vb5 Hi all, I was wondering if any1 out there knows of a newer win32.hlp? I would = thing that with win98 out there would be more functions to list etc.... = also I have been searching for a similar reference for VB functions.. is = there such an animal? also looking for a vb5 decompiler.... cheers, HaQue -----#2------------------------------------------------- Subject: Email echo Hello Everyone Hello Fravia The site ***************** doesn't seem to exist anymore. Are there any others you would recommend? Hello Ghiribizzo The pw rar file contains all the files for IDA V375 and its at lordcalgio site. So it must be his copy. I just assume it was your rar file and he had a copy of it. cheers Rundus ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: Evelock prot Hi all, i'm working in a protection from AZ-Tech called Everlock, is very inetersting and has some nice antidebugging trick, i want know is anyone has worked with it before, i didn't found any crack in the web or any info about it, it seems the only way to crack it is using a TSR or a program that block and simulate the writes to the key disk, the program that do this is a commercial copier called Neverlock Business, if someone want join this proyect i can share the info i have about the scheme. Norway =====End of Issue 229=================================== ======================================================== +HCU Maillist Issue: 230 05/25/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: echo.de (fravia+) ARTICLES: -----#1------------------------------------------------- Subject: echo.de (fravia+) Dear Rundus echo worked for me right now, so try again, there are some others like that, but they nail you down on their databases and then spam you with crap offers. Technische Uni Berlin is the only non profit one (until now, that is) I know of. Just try again. The server has MANY other interesting functions as well, btw. later fravia+ =====End of Issue 230===================================