Phrack Issue 68 #2
Phrack Issue 68 #2
Phrack Issue 68 #2
==
|=-----------------------------------------------------------------------=|
|=------------------------=[ L O O P B A C K ]=------------------------=|
|=-----------------------------------------------------------------------=|
|=-------------------------=[ Phrack Staff ]=--------------------------=|
|=-----------------------------------------------------------------------=|
Hi there!
The least we could say is that p67 caught the attention of a lot of people.
We got a very good feedback both IRL, on IRC and through the comments on
the website. Good. As you will soon find out, we had quite a bunch of
(un)interesting mails this year which we would like to share obviously ;>
Before going further, a quote from the last loopback is necessary:
---
We humbly apologize to all guys we never answered to neither by mail nor
through this phile because we suck at filtering our spam (this could
_absolutely_ not be a laziness issue, right?)
---
That said, we have to thank all the people that (un)voluntarily sent their
contributions, whatever these were.
As you will see, a polemic started with the release of the last scene phile
as several people felt a bit disappointed (to say the least) by the
description of the gr33k scene.
And they kept their promise with the help of some notorious big shots
of the greek hacking scene.
Don't worry, we published your side of the story as well. And now is time
for our little ... hem ... group therapy session ;-)
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x00 - Phrack .VS. the social networks ]=--------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Join now!
http://www.orkut.co.in/Join.aspx?id=ZZZZZZZZZZZZZZ&mt=22
* * *
[ To tell you the truth, help won't be necessary at this point :> ]
---
From: ***** ***** <[email protected]>
Subject: Invitation to connect on LinkedIn
LinkedIn
------------
- *****
**** ****
Owner at The Hacker News
New Delhi Area, India
--
(c) 2011, LinkedIn Corporation
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x01 - <?php include($teaMp0isoN) ?> ]=----------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
My first ever zine, read it and let me know what you think. hoping it gets
published in the next phrack magazine.
- TriCk
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x02 - The usual mails ]=-----------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
[ Have you ever been curious about the kind of mail we are used to
receive? Let's have a taste. ]
---
hello, I found some source code in phrack Magazine, but it is attach with
text mode, how can I get it?
---
---
From: [email protected]
Subject: edition 64 infected by OSX:Niqtana
Hello there,
http://www.sophos.com/en-us/threat-center/threat-analyses/
viruses-and-spyware/OSX~Niqtana-A/detailed-analysis.aspx
Kind Regards
---
Best Regards
Domenico *******
---
Do you have a mailing list that sends phrack out via email, or at least an
email reminder to go download it?
[ We don't. What would be the point in a bloggo/twitto world where
information spreads that fast? ]
Rob
---
---
[ New submission???? :D ]
ORDER DIPLOMA RIGHT NOW AND RAISE THE PROFESSIONAL LEVEL, SKILLS AND
EXPERIENCE!
[ Can we send our order in via PDF? You have to open it with
Acroread 9.x though, since you're only worth an 0lday to us.
Thank you for playing "rm me harder" w/ phrackstaff! ]
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x03 - Desperate house wifes ]=-----------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hi,
I have downloaded some adobe 3d files from a website, and need them to be
converted into autodesk inventor ipt files.
Can you teach me how to do this? If yes, I can send you some of the files
for trial, if you are successful, I am willing to pay for it.
[ Excellent! How much can you pay exactly? Our local liquor store no
longer accepts PDF conversion techniques in exchange for beer. ]
Luna
---
hi,
i'm in need of someone to help me in a cyber cat burglar kind of way.
i've tried all the legal ways... police, fbi, fed trade commission all to
busy with terrorist.
[ Now that they've caught Osama, they should have some free time. Try
to contact them again. ]
i can go to a detective then civil lawyer but that would take way too mush
time and an exorbitant amount of money.
I'm hoping to find or at least be lead to some one who is very creative in
using their computer. my only goal is to locate this person, i'm not out to
steal or do any harm.
if you think you can help me i'll give you my phone number, i can then
better explain why this way for me would be the only way to go, i lost 20
years of my life's hard work, i just want to locate this person.
[ Wow, sorry for being so hard on you with the previous comments,
Sabrina. It is obvious to us now that you are clearly retarded.
Please leave a comment on the website with your phone number. We'll
get back to you. ]
thank you
sabrina
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x04 - Cooperation ]=---------------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
From: Monika ****** <monika.******@software.com.pl>
Subject: cooperation
[ Our company? :D ]
Best Regards,
Monika ********
Software Press
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x05 - Help is requested! (again) ]=-------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hope you can help. I have a small video business and from my son's school
flashdrive my network of computers are infected with Persistent BIOS
Infection. My hard drive's have been rearranged with FAT segments and i
believe is running my XP/Win7 OS's as a virtual machine.
[ So you know but you don't know. That's good, have the half of you
that knows guide the other half that doesn't. You can't go wrong. ]
I have killed my network and now keep all computers separate but know
somehow i will get the infection back.
Could someone make me a batch file or better yet a ISO to boot and fix my
Bios and memory so it has Persistent BIOS Infection that is null. Giving
back my rendering power. Making it so i can't get this infection again.
[ Just a thought: maybe if you didn't run arbitrary batch files that
"someone" sent you, you wouldn't have this problem in the first
place. But most probably that's not it. It must be a 'Persistent BIOS
Infection' problem. ]
[ And yet another person willing to give us money. We should really run
a company :D ]
Thank You
Kevin ****
*******@att.net
---
hey,
i was searching some hacking forums site, & found one of the "phrack
Magazine".
It was pretty interesting. Can you help me out on how to hack Steam
Account.
---
Hey i was recently on your website and well i was looking for something to
mess with my friends, see were all in the same class and we all connect to
the same network/router thing, and you hve to login to gain acess to the
network, so i was wondering if there was a way to control my friends
computer with mine while were hook to the network.
[ XD ]
DoFoG
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x06 - About the scene philes ]=-----------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hi,
I would like say thanks each and every individual in Phrack team for
publishing our article. This will go a long way in creating awareness about
null community.
Thanks all....
[ And thank you for the scene phile. Always a pleasure to exchange with
interesting/nice people. ]
---
Hello Sir,
We are admin of "*The Hacker News*" : *http://www.thehackernews.com/* . We
read an article on your Website :
http://www.phrack.org/issues.html?issue=67&id=16#article
I wanna ask you that on what basis you write about "*Indian Cyber Army :
http://www.cyberarmy.in/*" .
*Whatever you write is not fair and I think it represents the mistake
done by you, that you write about a group without knowing about them,
Read This : *
*http://www.cyberarmy.in/p/about-us.html*
*and I think you should 1st know about it. Hope you will edit the
article.... as soon as possible.*
[ You may or may not be right and clearly we don't have enough
information to judge. For the sake of the truth and freedom of
speech, we are posting your comment. ]
*Thanks,*
[ No prob dude. ]
*Owner*
---
[ Yeah, we ordered the lamb gyros with extra pita and tzatziki. None of
you guys delivered. Worst Greek Hacking Scene evar! Would not order
from you again. ]
From: NIKO*** *ANTAZO*OY*** <[email protected]>
Subject: Read this, about errors - GHS
Nice to see Greek Hacking Scene on Phrack, but very sad to say that there
is no connection of all those with reality. This post represents something
that even doesn't exist except theory.
In the other hand, is not mentioned technological steps and targets that
Greek Hacking Scene archived, not in theory, but in actions.
However in the References i see nothing trust source, while you avoid posts
on newspapers, magazines and tv about Greek Hacking Scene.
Maybe Phrack can't handle the name of GHS and writing about fantasies.
Greek Hacking Scene is not a group, team or crew etc. but is ideology of
decades, is not about fame, but is about targets, technology and advance.
You must know that GHS does NOT follow things such "Hackers Manifesto" and
is well known that this person take back what he said about this manifesto
in shake to save him from things. He even does NOT defence his ideology,
how then we can accept such thing?! Basically we are what we create and we
gonna call hacking what we think hacking is, you can call us as you want,
but this can't change our actions, we not negotiate our ideology and we are
not followers of any paid, fantasy or theory ideologies. We rage against
machine, the system. Is good that Phrack exist cuz keep the magic to those
who want to be related with hacking. While you keep the feeling of magic to
your readers, we know that is all about coding, methodology and how far
each mind can think to do things.
About Greek Hacking Scene you forget to mention a lot of groups and people
(and is not about names) who they did things and they left lot of stuffs
behind. Those people and groups they never care about their nicknames or
the name of the group cuz is useless, can be any nickname or group name, at
the end what it left, is what had created. Who make it, it doesn't matter
really cuz those who make it as share they do it cuz they want.
If is to write about things that are not related with the true and reality,
better don't write about Greek Hacking Scene. You can write for posers and
others who they want fame, but not for GHS. You can write fantasy, stories,
anything you like, but as long as is not connected with reality and true,
then don't write about Greek Hacking Scene. Maybe you can write for any
other Greek Hacking Scene you want or you believe, but mention also that is
not connected all those stories with Greek Hacking Scene (GREEK SENTENCE).
Cheers,
Your article forgets to write about DefCon meetings that take place in
Greece, and of course about the unique Codehack meetings that shows live
Hacking. Or even is not mentioned things such SpyAdmin and Firehole, or
what about Hash, Phrapes, Cdx, r00thell, hackgr and more?! What about the
references on magazines, newspapers and tv? What about the members of Greek
Hacking Scene that works on penetration testing companies or making atm
softwares and banking or those who works in known computers and servers
companies and they create technology?!
About the grhack (that nobody knows) is those guys from auth that got
hacked their servers and their pcs and tooked personal files of them?
I read slasher?! This person who has the grhack site that you took as
reference?! With the name ********** **********?!
Oh come on, i have also beautiful pictures who they poser as engineers!
Oh now i got it! They write about their selfs! How smart... what a fame...
what a pose!
Before you write anything about Greek Hacking Scene take a look to the
targets. We have down anarchist such indymedia sites, and also nationalist
sites, as well he hacked into Goverment sites, political parties, national
services, and of course all the hacking-security related greek sites who
they offer only theory and lies that has no connection with reallity and
hacking.
And i guess so you promote the Anarchy?! So don't forget Phrack to mention
that everything you wrote is about Anarchy, not about hacking.
Greek Hacking Scene has members from all political sides and we have things
in common we work for.
This is grhack.net, this is the guy that send hopeless messages to google
blogspot to DOWN the info that SpyAdmin post, passwords, files, everything!
but look the comments of this website and the date, to know the existance
of spyadmin
http://press-gr.blogspot.com/2007/09/blog-post_3165.html
(SOMETHING IN GREEK...)
spyadmin.blogspot.com
(SOMETHING IN GREEK AGAIN)
(7 September 2007)
Now look also the date of the defacement in the zone-h digital archive:
http://zone-h.org/mirror/id/6638423
---
Greek Hacking Scene has no colour and does not support any political side.
Take example to indymedia athens, i will give you 2 links, in the first
they say that GHS is nationalist and hack their website, and in the other
link on the same website, they give congratulations in GHS cuz they did
actions and defacements according to left ideology.
In fact GHS has it's own ideology and act as GHS believe.
1 link:
http://athens.indymedia.org/front.php3?lang=3Del&article_id=3D706934
2 link:
http://athens.indymedia.org/front.php3?lang=3Del&article_id=3D620090
The comments are yours, let see the Freedom of Speech now, the TRUE the
REALITY, the FACTS!
Somes they didn't learn from their mistakes. GHS has no hate for anyone and
act not for revenge causes or anything else. According to all our actions,
we do warning and when we act we just put the informations as is, we don't
put sauses, you put sauses maybe.
Before some years there are many "hackers" in Greek chat rooms etc, they
speak about theory and when kids comming to learn, they laught only at them
and they make those kids to become like them, liers without education and
knowledge, kids that become like them, to know just some words, theory
without they know what for they speak about and to spend lost time chatting
and destroy other kids comming. Members of GHS hacked and take access in
most and almost all Greek websites, chat rooms, irc servers etc, that was
security-hacking related. We are always here, maybe not the same persons,
but members of GHS are change all the time and keep the safe ideology. In
the other hand, we let teenagers who are interested to hacking, we turn
them to coding, to let them think their future, education, freedom ideas
and to let them want to do things and create. Defacements and Hacking are
our fireworks to let them get the magic and on the way to show to them that
there are so many tools and things on net to hack a website and hack, but
if you want to go more further, you have to learn coding, to explore, to
let your mind free and think far away, for what can be happen and what not.
To go a step further with their minds, not by giving them stuff in the
plate, but let them do it and explore it by their selfs! I know keeps that
believe and do things, on the way they do things and go advance, those kids
are the next cycle of GHS who will pass the same ideas, believes and
technology to the next generations.
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x07 - Interesting mails ]=----------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
[ Dunno the guy. We already chose one anyway. You may have heard of
him. ]
---
Hi Guys,
Firstly, let me thank you for the on-going release of this great
e-zine.
[ You're welcome. ]
Most of these e-zines surfaced and then disappears over the horizon yet
albeit the long term delays in-between releases :)you've kept this
going.
Thank you.
[ ^_^ ]
I am very much interested in the up and coming release and would like
to know the date or drop us a note on the website.
[ Done. ]
Greetz,
infosec
---
YO!
do you still have an IRC?
---
we are looking for the original LoD members (or at list any way to
comunicate with them)
(specialy for night lightning)
[ Not sure about the true intentions but anyway this might help.]
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x08 - Greek people are angry ]=----------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
---
From: Iordanis Patimenos <[email protected]>
Subject: Phrack 67
YEAR: 2010, OSs:64-bit, protection mechanisms: ASLR, DEP, NX, .... , Attack
mechanisms: JAVA VM exploitation, Flash VM exploitation, ... the only
thing you had to do was to let the knowledge flow.
[ Well that's the point. You can. Oh wait, you would have known if
you had kept your sorry mouth shut and actually read the papers
first :> ]
New edit or better you didn't publish this new fucking delayed, bad content
phrack p67, BIG FAIL, that's not the PHRACK we know. What a retarded
content you provided after all this waiting time!!! Not a chance to compare
to previous phrack issues. This issue is just a joke, nothing more, happy
1st APril assholes, you made PHRACK seems trash magazine.
[ The cool thing with morons like you is that it would be pointless to
explain things, which makes our job somewhat easier. Congratulations
for your participation in p68, you've made it ;-) ]
-Fan of Phrack-
[ Yes. It shows. ]
---
[ WE DO HOPE WE ARE ]
I'M SURE THE NEW ISSUE WILL BE SUCH A FAIL AS THE PREVIOUS ONE (THE ONE
THAT YOU TRIED TO ADVERTISE AS A BIG HIT)
---
Most *FAIL* group ever in phrack, you hurt the magazine go away.
[ Hey now I remember you!!! :) It looks like you are obsessed with us.
You must be our number one fan in greece. Even now that we have so
many greek fans. ]
[ So:
1. Did you manage to download the file? :)))))
2. *EPIC* *FAIL*?
]
---
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x09 - PHRACK got spam'd? ]=---------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hi guys :)
Here's an article I've just written, I know it's a bit late for the
submissions, but perhaps you may publish it in the next issue. Anyway, the
topic is how to bypass a captcha, and, in particular, how to bypass the one
on your site :). No offense, but it's really weak.
[ Nobody's perfect! ]
if the paper is so bad written it can't be even read, send it back to me,
I'll try to rewrite it in a better way.
Bye,
darkjoker
---
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0A - The urge to get p68!!! ]=-----------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hi,
I have been following the magazine for a while now and I have been waiting
for the new issue. Last I checked it was suppose to come out in June...
Can you let me know when I should except the new issue?
[ Are you reading this? Then issue #68 is out. You're welcome. ]
Barak
[ That's the problem with every issue, you should NEVER trust us when
we announce dates ;) ]
---
Hello,
Best regards.
Roders.
---
Hello mate,
I am very interested in upcoming 68th issue of phrack.
The whole world is counting on you!!
I just want to know when will be the release and can you give me a glimpse
of contents inside it.
I will be eagerly waiting for your reply.
~Legend_Xeon
---
my life gets duller every day you don't release the new issue
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0B - Students project? ]=----------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
I am contacting you to tell you about my final year project for my degree.
I would be very grateful if you were able to follow my progress and perhaps
also contribute any tips and ideas. I will also be writing an application
which, if successful, I will be posting online for download.
Using the RC5 block cipher and the competitions run by RSA Laboratories
(1997-2007) as benchmarks, experiments will be conducted using different
methods of distributed computing. The implications of the results will lead
to a better understanding of how cryptanalysis can be conducted through
areas such as grids and internet-based cloud computing or virtualisation.
The reason for this project is that distribution methods have been used for
many years in order to conduct cryptanalysis; however, I have noticed that
this has been for purposes such as testing the security of new ciphers and
creating a better understanding of how they work. But, to my knowledge,
there has been little-to-no research into the implications of real-world
attacks through distribution.
Yours Sincerely,
Charmaine Anderson
---
Dear Phrack-Team,
[ Wasn't the early edition of phrack all scene .txt philes on BBSes?
Like, #7 was pre internet for sure. I doubt that any of the editors
back then would have bothered printing hardcopies, since it is
extremely inefficient and expensive and the target audience is ppl w/
computers. ]
Thanks in advance!
Yours,
Johannes Mitterer
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0C - Phrack & the chicks ]=--------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Hello Staff,
We are senior high school students from 'Stella Maris College' in the
Netherlands and we are writing an essay about the reputation of hacking. If
it is okay with you, we would like to ask a few questions:
- How could you start the site, because hacking is illegal and it might
endanger your users who discuss hacking?
- Have you ever gotten negative/positive reactions to your site? And what
where those reactions?
- Is there any information that is not known to people who are not hackers
and that is not easy to find in books or the internet? If so, where could
we find this information?
[ I'm not too sure you guys will be able to graduate with that many
questions so good luck :D ]
---
Thank you,
Eva
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0D - ROFL ]=-----------------------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
Man, I was bored taking a break from working on a vpn project at a library
and decided to make a script in bash to download and decompress the phrack
mags. Its newb meat but I guess Im just going to send it in for you guys to
laugh at, rofl.
[ ROFL indeed. ]
---
Jackie ***** ****** - *"Focus on Solutions not Problems"*
Email0: *****.*****.*****@gmail.com
Email1: [email protected]
---
Hi there,
[ Done! ]
Phrack Rules!
[ Sure it does! ]
---
Hi there,
[ And he really sent us pics. Your Grandma seems nice btw but you look
like a virgin geek unfortunately :( ]
---
[ Priceless. :') ]
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0E - Shame Shame Shame.......shame on you ]=---------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
The new fad when building a house is to run Cat-5 cable to every wall jack.
These jacks can then be used for either ethernet or phone. When we got our
new house built, we chose to get four of these jacks, and we intended to
use them for phone service. Unfortunately, the wifi is a bit flaky in
places (even with two access points.) This got annoying up until the point
where three of the four wall jacks were being used for ethernet, leaving
just one for phone. This was a problem.
The solution is to run both ethernet and phone over the same existing cat-5
cable. Every wall jack becomes two jacks, one RJ-11 for phone and one RJ-45
for ethernet. This neat hack could save you a lot of money, as you only
have to buy new wall plates and jacks rather than wall plates, jacks, and
hundreds of feet of wire.
[...]
Also note that this procedure will not work with PoE (Power over Ethernet)
devices. Nothing bad will happen, it just won't transmit power. See step 13
for apossibly unsafe way to keep your PoE and add phone service. Also, it
will not work with gigabit ethernet-- gigabit ethernet uses all four pairs.
It will work fine at 10/100 Mbps which is sufficient for most people
@(X_X)@
http://www.instructables.com/id/Hack-your-House-Run-both-ethernet-
and-phone-over-/
So not only did you send us a ripped paper. But you idiot were not
smart enough to click on "Next step" to copy the whole. LOL. ]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
P.S. -please reply whether my submission will be added or not in this
edition of ur highly esteemed Phrack magazine...loking forward to your
reply :)
cheers
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|--=[ 0x0F - Insanity or SPAM??? ]=--------------------------------------=|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
---
Can you please add me to your e-news letter list, so that I can recieve new
updates from your cite? I totally loved what you guys had written about ai,
and mind hacking and about hacking for the U.S. and Cypher Punks & Ninja
Strike Force! Best of luck to all of you staff members at Phrack! I would
like to know if you guys could please email me back some information in
regards about rsome bank accounts that was on CRYPTOME, or if you guys
could tell me about how you all had cash flow that came from hacked ATM
terminals that you guys had done remotely, because I need to be hacking
systems right now and I had all of my stuff jacked and I was robbed with
all of your softwares that I had for CIA/ NSA and I've been trying to log
onto some banking systems for my CIA/ NSA digital cash, or could you guys
send me some lock picks, or DIE BOLD keys to open some safes and vaults or
could you send me some Cypher Punks white paiges or other instructions to
interceptor frozen accounts on line and or how to obtain money for starting
a Cypher Punks EBB & FLO system to develope an agriculture business plan
that will help finance money for CIA & NSA op (ie- with IQT and with
Foresight Nanotechnology Institute and with CTBA.org) to counter the HASHID
culture? Such as GSPC in Morocco and in Algeria, GIA, FIS, ETI, AQIM,
Sahel Pan, DR-CONGO, AQAP, Hezbollah, HAMAS, Hizbullah, IMU, and fighting
against the salafyists in the Magreb's EU-Arabia HASHID zones, and against
the EVIL EMPIRE's MOIS, MEK, MEKO, PKK, VEVAK, ISI, FSB, KGB, NAK, GRU, and
Brazillian Guerillas and Chychenian Rebels and mob and Russian Mob for
GAZPROM Russian Mob Oil Monopoly and countering all of these groups members
and contacts and countering their economic insugernt threats
internationally, by hacking into their networks and locating them with RNM
ai, and blood clotting the Evil Empire, and moving and on the GO like CIA
backing the "Wrath of GOD" and with the Cult of CIA's MKULTRA program, and
I mean redndering synapsial "WET WORK" by taking their ballance with the
"EXIT BLOW," for NSA/ CIA's Ninja Strike Force and I want to be taking our
threats to the Land of Snow and flurries will show me to the rest of their
Evil Empires members locations by terminating them with Illuminati and I'll
be hacking their minds and their bank accounts and stealing all of their
wealth and contacts and other intelligence for RED Team, and taking their
materials as loot, and sending it onto an encrypted site, but I want to
creat my own ai online site with grant.gov grant money asap, and then once
that's done I can go and locate them with RNM ai, but I would like aving
somean ai quantum consciousness program with a self assembling "FOG" EW ai
HDD quantum computer with an infinite memory that would allow me to hack
bank accounts with an ip installed with nano-bio-technologies with inner
cellular blood vessel programming and cellular mind net morphing
technologies with RNM, nanotechnology made with a neuronal networking and
has a 3-d holographic video and 3-d holographic audio with real world and
mirror world ai 3-d/ 4-d softwares for an online Cypher Punks & Ninja
Strike Force & Cult of Dead Cow members with other CIA/ NSA Intelligence
Analysis Cammander's of Red Teaming (aka- COUNTER-INTELLIGENCE TEAM's ALPHA
& BRAVO:) Black Ops- Red Teaming forum with an ai 3-d GOOGLE EARTH PRO GPS
softwares with a soft mobi GLOBAL IP softwares package STEALTH NINJA phone
with SIG PRO Telecommunications softwares for NSA & CIA CT:qto let me know
about a should
---
Tchao-
The Devils Advocate.
[ Spamming or brainfucked? ]