======================================================== +HCU Maillist Issue: 301 08/26/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Smalltalk #2 Subject: Aesculapius address #3 Subject: a most likely trivial problem ARTICLES: -----#1------------------------------------------------- Subject: Smalltalk Hi +All! Anyone tried to crack Smalltalk programs? It seems to me that Smalltalk makes kind of p-code. Similar to VB3 or InstallShield. My target is WebBase 4.1 ********************** and nothing iteresting discovered 'til now. zeezee ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: Aesculapius address Hi there Aesculapius, I've been trying to reach you at your criogen address but I always get a "Unknown user" message. Are you having a problem on that address? Greetings +PopJack ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: a most likely trivial problem Hi there, I literally started to learn c yesterday.. after having done everything in assembler, but at the moment I don't have a decent c reference and was wondering if someone could help me out with this: How can I translate the following in c? mov esi, 0000ffffh cdq idiv esi actually in this case cdq isn't necessary.., mainly i want to know how to replicate an idiv instruction... remember that after idiv esi, the quotient will be in eax and the remainder in edx.. thanks for any help. --minstrel =====End of Issue 301=================================== ======================================================== +HCU Maillist Issue: 302 08/27/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: none ARTICLES: -----#1------------------------------------------------- Subject: none hi minstrel, >How can I translate the following in c? easily :-) long eax, edx, esi; >mov esi, 0000ffffh esi = 0xffffh; >cdq //unnecessary in C >idiv esi eax /= esi; edx = eax % esi; -- Fresh. ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 302=================================== ======================================================== +HCU Maillist Issue: 303 08/27/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: none ARTICLES: -----#1------------------------------------------------- Subject: none Hi it's MUSO, I recently downloaded a demo-version of the programmer editor SlickEdit ************************************** which is very nice. However, they use one of those ready-made time-lock system where you can press a purchase button and where they show you how many days are left for you demo. Does this rember us to something? :-)) Yep, it looks like a new (maybe better) version of the time-lock stuff. The DLL they use is named: tl315inj.dll and it's the TimeLock 3.1 Client DLL by Preview Software. The product version is: 3.1.5.1 They have installed a file (vs30b_091598a.lic) into the $systemdir\previewsoft directory which is about 128 KB big. It mainly contains encrypted stuff. Now to the things I have found out so far: 1. While starting the program, a temporary file (os060680.bin) is generated. It's about 5KB big and it's written and read to it. This looks like they use this file to do some decryption. 2. Than there is an on-the-fly hidden OCX file generated (ws807489.ocx) in the system32 directory. This thing doesn't look like an ocx, it contains (I think) encrypted stuff too. 3. There exists an other of these OCX files (whith a much older date). This could be the other part of a key-pair. 4. Than there is a lot of read/write between the LIC file and the on-the-fly generated OCX file. I think this is some decryption stuff. After pressing the try-now button, the program starts. In that time the LIC file is accessed several times. I assume that all this is used to generate/decrypt some sensible code of the editor on-the-fly so that it can run. I have read the essay from JaZZ about 'Netscantools 3.1 but I'm a bit afraid that the patch will be really huge. I'm even not sure if there is enough room inside the exe to store the patch in. However, is there someone interested in working on this target? I'm not the hacker guru so a bit support would be nice. Muso... =====End of Issue 303=================================== ======================================================== +HCU Maillist Issue: 304 08/28/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: gthorne- ICQ useful tip ARTICLES: -----#1------------------------------------------------- Subject: gthorne- ICQ useful tip Message Body = one of the many anonymous readers of this hcuml sent me this icq tip that though it wont secure your plaintext transmissions, it will make most users not know your ip even ones with the patch! message here... Hi, I'm sending you this immediately after discovering it on ***************** Here is what I copied and pasted from their page today. It seems especially important to me in view of the so-called lack of privacy of ICQ. Please let me know what you think of the following. "ICQ Bug and IP Spoofing Want to make ICQ show your IP as any that you want? It will appear in the box that displays your current/last IP, and will work even if someone uses that ICQ sniffer. Well, here's how to do it: Click on the ICQ button. Click PREFERENCES. Click CONNECTION. Click I'M USING A PERMENANT INTERNET CONNECTION (LAN). Click I AM BEHIND A FIREWALL OR PROXY. Click FIREWALL SETTINGS. Click I AM USING A SOCKS 4 PROXY SERVER. Click NEXT. Now enter any IP you want into the SOCKS4 HOST box. Click NEXT. Click DONE. One nice trick is if you think that someone is trying to nuke you, enter in their IP into your current IP box, and see if they are stupid enough to nuke themselves! There is one problem with this though. Messages seem to send a little longer, but that's not that big of a deal (because it thinks you're behind a firewall)." - - - +gthorne =====End of Issue 304=================================== ======================================================== +HCU Maillist Issue: 305 09/02/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Re: Asm to C ARTICLES: -----#1------------------------------------------------- Subject: Re: Asm to C >Hi there, I literally started to learn c yesterday.. after having done >everything in assembler, but at the moment I don't have a decent c >reference and was wondering if someone could help me out with this: > >How can I translate the following in c? > >mov esi, 0000ffffh >cdq >idiv esi Well, it depends on the content of eax in this case. The CDQ is necessary, since the IDIV will AFAIK take the content of the 64bit-number in EDX:EAX to divide it by ESI. This can be represented in C by: var2=var1/0xFFFF; might be though that it is necessary to use div_i or something... HalVar =====End of Issue 305=================================== ======================================================== +HCU Maillist Issue: 306 09/03/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: none #2 Subject: Softlock help for newbie ARTICLES: -----#1------------------------------------------------- Subject: none Hi, unfortunately I didn't got some response about the TimeLock stuff in Visual-Slick-Edit... seems that no-one is interested anymore in doing a general unlock of these out-of-the-box licensing stuff. However, the VBox stuff (which is the new generation time-lock) is interesting too. So anybody interested in working on these? so long Muso... -----#2------------------------------------------------- Subject: Softlock help for newbie Hi all, I have been looking at softlock for the past 3 weeks with no luck. I think the main part of the code is within 40b69c. I get lost at this subrootine and have no idea what it is doing. Could someone give me a hand with this one? TIA George =====End of Issue 306=================================== ======================================================== +HCU Maillist Issue: 307 09/04/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Previewsoft #2 Subject: gthorne - underground news topics ARTICLES: -----#1------------------------------------------------- Subject: Previewsoft Hello Everyone Hello Muso I have a program Perlbuilder which also uses Previewsoft protection ( two .ocx, .lic, three Vbox file, etc). It makes two changes to the Register every time it starts up. But at the moment Iam too busy to continue. Maybe at a later date we can discussion this protection system. cheers Rundus ______________________________________________________ Get Your Private, Free Email at ********************** -----#2------------------------------------------------- Subject: gthorne - underground news topics from computer underground digest (for those who dont receive it) heres an interesting article regarding a turncoat hacker you may just have heard about i love stuff like this :) partially because several years ago i was contacted (though i doubt he knew much about me) by an ex member of one of the old hacker organizations (legion of doom) who had done precicely that - get a job with the government in trade for turning in compatriots obviously his warnings to me meant... uh alot (heh) +gthorne - - - From: Jim Galasyn ******************* Subject: File 3--Hacker snitches for FBI, escapes 60 year prison term Date: Thu, 13 Aug 1998 19:13:17 -0700 Would you hire a hacker? By Joseph C. Panettieri August 12, 1998 ***** Reseller Some of the world's largest corporations hired Justin Petersen. So did the FBI. In fact, in law-enforcement circles, he's known as Agent Steal, and he's got a long list of technical skills and references that would make most resellers drool. Consider his most recent tour of duty, which includes developing intranets and extranets for Cosmic Media, a Los Angeles-based Internet consulting firm that has deployed secure electronic commerce sites for Digital Media and other fledgling businesses. He has also launched his own 1,000 square-foot computer center, which features two server rooms, a control room and an earthquake resistant design. Now, for the twist: Petersen, 37, is also a reformed hacker. Earlier this decade he served time for breaking into several corporate networks, making bomb threats and stealing money from a bank electronically. [His run from justice.] "I imagine if I walked into a place and tried to get a regular job, my record would be an issue," concedes Petersen, speaking from the Los Angeles apartment he has called home since his release from prison last year. "But I've known a couple of guys from Cosmic Media for a long time, and I have other friends in the industry-including a Webmaster over at CNET. Friends who are aware of my convictions support me and hire me. "Hacking was a phase I went through," continues Petersen. "I learned what I wanted to learn, and I got it out of my system. That phase of my life is over." FBI informant As if Petersen's story wasn't outrageous enough, portions of his digital crime spree actually were committed while he was working undercover for the FBI, according to court documents obtained by ***** Reseller. He also has crossed paths with notorious Internet hacker Kevin Mitnick. Reformed hacker Justin Petersen is working side-by-side with Web consultants and resellers. Would you hire him? Add your comments to the bottom of this page. The FBI and the U.S. Department of Justice took Petersen's offenses quite seriously. When Petersen pleaded guilty to several computer-related crimes on March 27, 1995, the DOJ promptly issued a tersely worded press release stating that he faced a "maximum sentence of 60 years in prison and $2 million in fines." Today, that very same press release begs two troubling questions: How did Petersen emerge from prison so quickly? And can he be trusted to work with computers, the Internet and channel players? To be sure, hackers increasingly are turning over new leafs as resellers and security consultants. Says John Klein, president of Rent-A-Hacker ************************ "I've seen my customers hire hackers. Sometimes an 18-year-old kid who lives on the Internet has more experience than a 30 year old with a Master's [Degree] in computer science." Still, hiring a young cyberpunk who knocked over a few Web sites is one thing. But recruiting the likes of Agent Steal is in another class. Says Art Brieva, chief technology officer at The PC Authority, a Plainview, N.Y.-based reseller: "There are hackers who mess around with systems for the pure challenge of it, and then there are hackers who have malicious intent. I would tend to steer clear of the latter." Quite a childhood Petersen says he started wiretapping phone systems and hacking computers when he was only 12. In his early years, he simply explored computer systems rather than damage them. For more than a decade, he read about technology and honed his hacking skills before breaking into TRW Inc.'s credit system in 1989. Later that year, he and fellow cyberpunk Kevin Poulsen rigged Pacific Bell's telecom network and seized a radio station's phone lines to win a $10,000 call-in contest. "Poulsen taught me a great deal about hacking," allows Petersen. "But I was mostly self-taught. I bought lots of books and always read a lot about computers." Petersen, working with Poulsen, found a security hole in a Pacific Bell test and maintenance system that made the radio station hack possible. Petersen claims the duo could latch onto any phone line within Pacific Bell's network, monitor it, ring it, dial out, and so on. Far from complicated, the hack required a single PC and two phone lines (one for control via computer and one to monitor). "Pacific Bell thought the system was secure, but they shut it down after they discovered the weakness we exploited," Petersen says. After parting ways with Poulsen, Petersen fled to Texas in 1991 and was arrested after being caught driving a stolen Porsche. A search of Petersen's apartment by police uncovered more than a dozen fraudulent credit cards, modems and a computer. Police suspected Petersen was using the PC to illegally access TRW's credit system to obtain credit cards under several aliases, according to court documents. Rather than face full prosecution, Petersen's legal troubles took a dramatic turn for the better in September 1991. According to court documents, a Secret Service agent visited Petersen in a Texas jail several times and they struck a stunning deal: In return for pleading guilty to various computer-related crimes, Petersen agreed to work undercover for the FBI. He was released and placed under the FBI's supervision in California. Petersen's legal case also was transferred to California, and his sentencing was delayed until his work for the FBI was completed, according to the court documents. Hunting hackers The nature of Petersen's service for the FBI remains unclear at best. Neither the FBI nor the Secret Service is willing to comment about Petersen's case. For his part, Petersen claims the FBI rented him a furnished apartment and gave him a salary, two computers, two modems and phone lines to gather information about alleged hackers who may pose a threat to the government. In particular, Petersen and several attorneys close to his case say he helped the FBI amass evidence against former buddy Poulsen, as well as Mitnick and Lewis DePayne. Poulsen is now free after serving time for rigging the 1989 radio contest and facing a much more serious charge of international espionage. Mitnick and DePayne await a Jan. 19, 1999, trial date for an alleged Internet crime spree that Miramax, a major Hollywood movie studio, is transforming into a motion picture. As for Petersen, his work for the FBI continued until Oct. 22, 1993. On that day, government officials met with Petersen and asked him if he had committed additional computer-related crimes while working for the FBI. According to court documents, Petersen panicked and fled the meeting. Like Mitnick at the time, he was now a fugitive. Petersen remained at large for more than a year. He surfaced again on Aug. 17, 1994, when he hacked Heller Financial Inc., a commercial financial service provider in Glendale, Calif. Once inside Heller's network, Petersen identified a line between two network switches that was accidentally left unencrypted. Petersen used the weak link, which has since been corrected, to transfer $150,000 from Heller's electronic vaults to an account at Union Bank in Bellflower, Calif. Petersen made two bomb threats to Heller in an effort to distract employees so they would not notice the transfer of funds, according to court documents. This is only a test Petersen considered the first transfer a "test," and planned to return for more cash a few weeks after the first transaction. But the FBI was searching for him, and he was tracked down and arrested three weeks after hacking Heller's network. In early 1995 he pleaded guilty to committing computer wire fraud while a fugitive and didn't emerge from prison until April, 1997. Petersen's time behind bars fell far short of the potential 60-year sentence he faced. Some lawyers, including Mitnick's attorney, Donald Randolph, consider Petersen's short sentence rather curious. Others are surprised that Petersen is free to work with computers and the Internet. By contrast, Mitnick is only allowed to use a non-networked PC when researching documents related to his criminal case. Petersen faces no such restrictions. Says alleged hacker DePayne, the co-defendant in Mitnick's case: "Petersen hacked for profit then cooperated with the government. Poulsen didn't cooperate with the Feds. I'd say that's why Justin [Petersen], rather than Kevin [Poulsen], can now work with computers without any limitations." Asst. U.S. Attorney David Schindler says Petersen is subject to a "supervised release" and must "get approval" from a parole officer before accepting high-technology jobs or any other work that may tempt fate. Still, one question remains: How did Petersen circumvent the possible 60-year prison sentence mentioned in the 1995 DOJ press release? "That's a question I'd love the government to answer," says attorney Richard Sherman, who has defended Mitnick and currently represents DePayne. Schindler says Petersen got time off for good behavior, and adds that the DOJ's press release was a bit misleading. Enjoying freedom Petersen has certainly made the most of his early release. In recent months, he has devoured technical manuals, and quickly gotten up to speed on numerous technologies that gained popularity during his prison stay, including Windows 95, Windows NT, Java and Internet development tools. "I haven't been in any trouble since my release," he says (and attorney Schindler confirms). "I'm concentrating on Web development and my NT skills, and hope to launch an adult Web site down the road." Petersen, by all accounts, is no longer using his hacker skills, but he certainly doesn't hide his past. His personal Web site features legal documents from his court case, interviews published in hacker publications, as well as a few booby traps that could send some Web users running for cover. (Because of the latter issue, ***** Reseller has elected not to publish Petersen's URL.) Until very recently, the Web site manipulated a visitor's computer by launching nefarious Java applets. And his current e-mail address pokes fun at one of his former victims, Pacific Bell. It's unclear how long Petersen will continue working side-by-side with channel players. Aside from launching his adult Web site, Petersen also is promoting Los Angeles night clubs. But despite such demands on his time, he's willing to continue lending local Web consultants a hand if the price is right. And there are certainly resellers interested in the likes of Petersen. "Hackers are the best consultants out there," says Kevin Johnson, owner of security consultancy and reseller Johnson & Associates. "I've got a guy working for me who was a hacker, and he's very good at what he does." Even one of Petersen's staunchest critics, attorney Sherman, defends Petersen's right to work within the computer industry. Quips Sherman: "I don't think anyone's right to use a computer should be taken away. But if Justin hacks me, I'll kill him." =====End of Issue 307=================================== ======================================================== +HCU Maillist Issue: 308 09/08/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: LiquidFX Pro 4 got me stuck... #2 Subject: Gthorne's Post on Agent Steal #3 Subject: My propositions/intents (fravia+ here) ARTICLES: -----#1------------------------------------------------- Subject: LiquidFX Pro 4 got me stuck... hi, very pleased to discover this mailing list and hope i can play an active part. if i do not present my problem in the preferred manner pls let me know. Problem. trying to crack LiquidFx Pro 4 (web authoring tool) ********************* (6Mb +) (evaluation is 20 days and feature crippled) been at it for four days now (!) and i really want to figure it out. i think it will hold some interest to readers as it has anti-cracker protection. in particular it checks Name entered in the register screen against about 40 known crackers, so maybe some of you would like to find out if you are in that hall of fame. some of the names; byte ripper, stardogg, netspider, razzia, ... History. so here's how far i got. it's VB4 and my first VB4 crack. i have managed a few VB5's so far. got nowhere with this one for a while and then got hold of Razzia's tutorial, which after careful reading convinced me that this was gonna be easy! the idea being to locate the area of code in vb40032.dll where two strings are compared. if you do this the name entered is compared against the list of known crackers (if the name is in the list a message box "pls support us instead of trying to rip us off!" appears) then the serial number entered is compared against a 10 character (uppercase A-Z) string. in fact this name and serial comparison is done twice - i think about 92 comparisons in all. << aside: i had to do this in microsoft dev studio as both Softice and W32Dasm kept falling over -- any tips on how to stabilize Softice would be appreciated, i use 3.22 for Win95 >> i was sure that the deed was done now. the serial in Oscar for a previous version was also a 10 char string. but the serial didn't work. i think it is a red herring. so i tried break pointing aroung the number comparison code in vb40032.dll as mentioned in Razzia's essay, but nothing happening there. i tried bpx'ing on string comparison api functions but no luck there. bpx'ing hmemcpy didn't help. my latest tack has been bpx'ing vb40032.dll functions such as rtcBstrFromAnsi, rtcUpperCaseBstr, etc if i bpx on rtcBstrFromAnsi (after press register button) then F12 and put the bpx there with a do "dd eax" i can watch a stream of characters being generated that follows the pattern: for each character in serial generate one char (A to Z) , followed by 10 more (A to Z), these last ten are the characters that make up the red herring mentioned above. that's as far as i've got. hope someone can help. btw there is a file "lqfx.seq" in LiquidFX directory which holds the name/serial/days-remaining information. deleting this file gets your 20 days back. i have tried tampering with it but didn't achieve anything. Bye. looking forward to some feedback, m!NK ***************** -----#2------------------------------------------------- Subject: Gthorne's Post on Agent Steal Wasn't Agent Steal the one that turned in Poulsen ? HalVar (Too busy ATM) --- Sent through Global Message Exchange - ****************** -----#3------------------------------------------------- Subject: My propositions/intents (fravia+ here) Please read my new septem.htm page, where I am expressing some recent doubts and propositions. Would +anyone that care please contact me and tell me his two cents? I value +your input so much that I actually need +your advices. later +friends fravia+ =====End of Issue 308=================================== ======================================================== +HCU Maillist Issue: 309 09/11/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Fravia's plan #2 Subject: gthorne-more icq notes ARTICLES: -----#1------------------------------------------------- Subject: Fravia's plan Hi Fravia! You asked for our opinion about your plans on reshaping your site, so here is mine. 1) I agree, that you have to stop adding simple (keygen, patching etc.) essays and concentrate on papers. However, there will always be new comers (one day some of them will be teachers) who need to learn the very first steps. Therefore, keep even the simple essays up or if you want to purge the database (not enough space etc.) pass those to Greythorne or somebody else who willing to host them. The knowledge already collected should be available to the beginers. 2) What kind of essays to accept in the future. I think you should not categorically reject assays dealing with protections if they have a teaching value. Look at the very fine essay of bb's on simulating user input. It practically deals with nag screen elimination (pure cracking task), yet from a unique stand point teaching much more about how the program works than just finding the nag jump. Besides, if someone just want to have winzip surely will use oscar, so this assay has little value for the greedy ones. Therefore, I suggest to evaluate each essay by comparing the teaching value to the damage it might cause to the programmer. On this base I support the idea of accepting papers without mentioning the specific target. It is also obvious that the more generally applicable the approach the more value it has. 3) I think one good criterion might be that the new essays should contain some serious coding (more than just a a patch or a key generator) like rewriting some part of the program or adding some new function to it. This should help us to move on a new level where not just a superficial understanding of the code required, but a deeper understanding how the program, the compiler, and the operation system works together. Finally, I wish you good luck and keep up the nice work, your site means a lot to us. Regards, Zer0+ ____________________________________________________________________ Get free e-mail and a permanent address at ****************************** -----#2------------------------------------------------- Subject: gthorne-more icq notes Message Body = just wanted to mention that the icq hide-via-firewall method still shows your ip, it shows the firewall one also (how cute) you can test this with the icq sniffer at **************** in the DOS (denial of service) attacks section under ICQ proggies +gthorne =====End of Issue 309=================================== ======================================================== +HCU Maillist Issue: 310 09/12/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: New to cracking #2 Subject: MSVBVM50.DLL #3 Subject: MSVBVM50.DLL #4 Subject: MSVBVM50.DLL #5 Subject: Aesculapius! Please get in contact! (fravia+) #6 Subject: Re: +HCU ML Issue 309 ARTICLES: -----#1------------------------------------------------- Subject: New to cracking Hey all, I have recently started looking at source to understand better how programs work. I have a very good understanding of assembly. I have been looking at tutorials. Now I have a quick question. I noticed that message strings are loded in certain parts of memory. They are pushed. now I rarely see a pop. How do they get the information. What should I be looking for? TIA George -----#2------------------------------------------------- Subject: MSVBVM50.DLL Hi all :-) Sorry, I have forgotten the URL: ****************************************** NiKai ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: MSVBVM50.DLL Hi all :-) Sorry, I have forgotten the URL: ****************************************** NiKai ______________________________________________________ Get Your Private, Free Email at ********************** -----#4------------------------------------------------- Subject: MSVBVM50.DLL Hi all :-) I have taken up a section on my homepage which contains links to reverse engineering MSVBVM50.DLL. I collected them and when you have one for me: send it! I will publish it then. I think it=B4s a good idea to collect these infos because of the newbies among us and I saw in the last time many progs with this "protection". There are some approaches in MSVBVM50.DLL to fish serials. Maybe there are some more. Who knows? Fravia+: Sorry for my email, i had a wood in front of my head :-( byez, NiKai ______________________________________________________ Get Your Private, Free Email at ********************** -----#5------------------------------------------------- Subject: Aesculapius! Please get in contact! (fravia+) Dear +Aescu, I know of your current troubles, yet I'm getting more and more 'distress' messages by guys that are seriously scared that September is going to finish BEFORE they can contact you with the latest +HCU's strainer solution. Apparently none of your 'usual' email addresses works any more. THEREFORE If you read this or if anyone reading this can email this to you on another (to me unknown) address, please get immediatly in contact with me with a new yahoo (or whatever) fake address... there are good crackers, out there, that are "desperately" trying to send you their strainer solution. On the other hand, Master, if you need Megabytes_shelter / email_identities / web_depots / email filters... whatever, I am here to deliver to you anything you wish, of course :-) fravia+ -----#6------------------------------------------------- Subject: Re: +HCU ML Issue 309 >3) I think one good criterion might be that the new essays >should contain some serious coding (more than just a >a patch or a key generator) like rewriting some part of >the program or adding some new function to it. >This should help us to move on a new level where not just >a superficial understanding of the code required, but a >deeper understanding how the program, the compiler, >and the operation system works together. I absolutely agree. I remember my working on adding automatic target pointing, automatic missiles escaping, mapping and some other neat services and features to the good old Internet Quake for my friends. That was MUCH more fun than just cracking some stupid serial numbers or dumb dongles. It involved a lot of code optimization just to free some space for the new procedures and a lot of freaking ballistic math for God sake! - Fatal Exception (AKA C0DE Optimizer, AKA Stack Overflow) =====End of Issue 310===================================