Copy Link
Add to Bookmark
Report

NuKE Nowhere Utilities v2.0

  




Documentation for The Nowhere Utilities
---------------------------------------


Introduction
------------

During my time a viral developer, I've quickly discovered many
operations that are quite useful for creating virii, trojans, and logic
bombs that DOS and most popular utility programs (PC-Tools, Norton
Utilities, etc.) either can't do or require too much time to do. Some
other operations, such as being able to alter the effective size of a
file, are useful in many non-viral situations. So I developed a set of
thirteen utilities, presented here, to help the aspiring rogue
programmer in his quest for electronic mayhem. (Several of these are
derived from ideas originally used in the now infamous C-Virus.) So
without further adieu, I give you (drum roll) **The Nowhere
Utilities**!


General notes
-------------

The following applies to all of the Nowhere Utilities: all will
give a command summary if "/?" is given as the first parameter; all
utilities preserve file date, time, and attributes, unless they are
specifically meant to change them (FIXATTR and FIXTIME in specific);
all utilities will work on read-only files (they automatically remove
the attribute if any writing needs to be performed and reset it when
.COM format for faster load times. All of the utilities were
finished); and all programs are in the written entirely in Borland C++
v3.0 using the tiny memory model (needed to create .COM files), and all
were written by myself, Nowhere Man, with some suggestions and comments
provided by friends, especially Rigor Mortis, Leeking Virus, and Guido
Sanchez. Thanks guys. Now, on with the utilities...


The utilities and their many uses
---------------------------------

Included in this set of utilities are ten separate programs. Below
is a list of them, as well a short summary of what they do and possible
uses for them. In addition to the summaries below, running any Nowhere
Utility with /? as a parameter displays the syntax for the program.


CIPHER
------

CIPHER is just that: a cipher. Give CIPHER a 32-bit decimal number as a
key, followed by one or more file names (wildcards allowed), and it
will encrypt the files. To unencrypt them, run CIPHER again with the
same key. As you've probably guessed, CIPHER uses an XOR-type
encryption method, but I've thrown a few modifications in to make it
harder to crack. Suggested uses: to encrypt things you don't want other
people to see (duh). I'd advise encrypting any sensitive data that
could be used against you in court, such as passwords, card numbers,
and phreaking codes (assuming, of course, you actually keep these
things in files). When you need these things, simply decipher them.



Nowhere Utilities v2.0 - 1- (C) 1992 Nowhere Man and [NuKE]




This way if the feds ever seize your computer while your at work or
school, there is no data for them to use as evidence during your trial.
This is also good for encrypting important E-Mail: tell the receiver,
either over the phone or on a different board, what the key will be.
Then run CIPHER on the program and use DBGSCRPT (see below) to generate
a DEBUG script to re-create the file. Do an ASCII upload of the DEBUG
script. The receive can just run the script through DEBUG, use CIPHER
to decrypt it, and the read the message, run the file, whatever. Great
for use on untrustworthy or suspicious boards, or places where the
sysop likes to snoop through other peoples' private mail.


CRYPTCOM
--------

CRYPTCOM is handy utility that allows you to encrypt .COM files
but still leave them executable. To invoke CRYPTCOM, just type
"CRYPTCOM" followed by one or more files that you wish to protect;
wildcards are allowed, and the ".COM" extension is assumed if none is
given. They key is chosen by CRYPTCOM automatically, so you don't need
to supply one. This program works by encrypting your .COM program and
adding some decryption code to the end. The file decrypts itself in RAM
at run-time, leaving the actual file unaltered with each execution of
the encrypted program. Suggested use: encrypting virii to slip past
virus scanners. It's rather obvious what to do: just run CRYPTCOM on
the virus. It is now unscannable, and it still runs normally. However,
just like the PKLITE trick of old, all subsequent infections will
contain the original virus, so basically, this just gets the virus in
the front door. Unlike PKLITE, though, no scanner (as of yet, at least)
can decrypt a CRYPTCOMed file and scan it, so you don't have to worry
about recent versions of SCAN catching you. (Also see NOLZEXE below for
another tactic.)


DBGSCRPT
--------

DBGSCRPT creates, as its name suggests, DEBUG scripts. DBGSCRPT
takes two arguments: the input file and the name of the file to contain
the script. To re-create the original file from the script, just type
"DEBUG < (scriptname)" and watch it do it's work. Note that wildcards
are not allowed by this program, and also note that DEBUG will not
allow itself to write .EXE files. If you are creating a script from an
.EXE file, rename it to a different extension before running DBGSCRPT,
and instruct whomever is receiving the script to change it back to an
.EXE when DEBUG is done. Suggested uses: creating scripts from binary
files to include in text files or E-Mail. This way you could post your
latest creation on your favorite virus board without having to upload
anything and without having to post your valuable source. You can also
include it in text files you put out (magazines, etc.) so you don't
have to distribute the virus in a separate file; the reader just cuts
out the script and runs it through DEBUG (40-Hex magazine is fond of
this technique). Again, no source code needs to change hands. Quite
useful, in the right situations.





Nowhere Utilities v2.0 - 2- (C) 1992 Nowhere Man and [NuKE]




DECRYPT
-------

DECRYPT is, as far as I know, a one-of-a-kind utility -- it will
crack almost all 8-bit and many 16-bit encryption schemes. There's only
one catch: you must know at least five consecutive characters in the
original (unencrypted) data. This string is passed as the first
parameter. The remaining arguments are the names of files to be
decrypted, wildcards allowed. DECRYPT will go through each file given,
attempting to decrypt it with a special proprietary algorithm which
will crack most standard 8- and 16-bit encryption schemes in under ten
seconds. If the file can be decrypted then DECRYPT will tell you which
encryption method and what key was used, and a file with the same base
name as the original and an extension of .DEC will be created
containing the decrypted contents of the file. Sometimes DECRYPT will
give a false positive, an invalid decryption; this is a normal
side-effect of the ultra-quick algorithm it uses (if you do get a false
positive, chances are the file couldn't be decrypted anyway).
DECRYPT has many uses. It's great for decrypting a virus attached
to a program, so long as you know a string in the virus ("*.COM" is a
good bet), or can be used to view those annoying encrypted data files
that too many programs seem to come with.
Please note that not every file can be decrypted; DECRYPT will
break the most common algorithms used in most low-security applications
(ie: adding/subtracting a constant, XORing by a constant, etc.). Also
make sure that the file you're dealing with is indeed encrypted. Not
every unreadable file is encoded, and unless you're pretty sure your
just wasting your time (albeit very little of it). Files must be under
32k for DECRYPT to work (DECRYPT loads the entire file into memory for
speed, so larger files will overflow the buffer). Outside of these
restrictions, DECRYPT is a valuable tool for any aspiring hacker.


FAKEFILE
--------

Picture this: you've just written up a great trojan or virus and
you've placed it into an executable file (or REPLACEd one). What's the
problem? Well, wouldn't you be suspicious if you downloaded a ZIP file
that was supposed to be a "Great shareware text editor" and all that
was in it was one lousy 5k .EXE? Ignoring the problem of documentation,
FAKEFILE is a great way to create phoney data files to go with your
virii and trojans. Now instead of renaming .ROL files to .DATs (as I've
observed in one lame trojan), you can make your own. FAKEFILE takes two
or more arguments. The first one is the size of the dummy file. Here
you can either give a fixed number, or use the -r switch, which will
make each file a random length between 100 and 33767 bytes. The
remaining parameters are the names of the fake files to create.
Wildcards are not allowed (duh). In addition to filling the files with
random bullshit, if FAKEFILE recognizes the extension on your filename
(.EXE, .GIF, .OBJ, etc.) then it will add a fake header to the file to
make it "legit" to programs that read those types of files. For
example, if you typed "FAKEFILE 30345 HOTSEX.GIF" FAKEFILE would create
a 30345-byte file containing the header "GIF87a" and 30339 bytes of
random data. Of course when you go to view the "GIF" you'll get
errors... Another tip: avoid "even" file sizes for most files. It may
seem suspicious, depending on the nature of the files.


Nowhere Utilities v2.0 - 3- (C) 1992 Nowhere Man and [NuKE]




As you might have guessed by now, there is another, and in my
.GIFs, .ROLs, even whole utilities, .EXE and all, and upload them
opinion, very lame, use for this utility. You can create fake to boards
for extra file points. I HIGHLY DISCOURAGE THIS. If everyone went
around doing this then you'd spend most of your time downloading crap,
and BBSing would die. Of course this is a great use if your dealing
with a real lame board; upload tons of dummy games and .GIFs under
several user names. The other users will get pissed at the sysop, and
his board will go down in no time. PLEASE ONLY DO THIS TO LAMERS; good
boards deserve to live. Again, heed my warning and don't be an asshole;
if you ever do download a wasteful file on any board, please report it
to the sysop. If you are a sysop and are reading this, I'd encourage
you to blacklist anyone who does such a stupid thing.


FAKEWARE
--------

If you're like me, then lame k-rad k00l "ELITE" boards probably
annoy the shit out of you. What better way to say "I hate you" then
with a virus, the gift that keeps on giving... Unfortunately, some of
these people actually know that games have more than one file, etc. and
won't run suspicious looking programs. FAKEWARE takes care of all of
this. With one command you can create a realistic looking .ZIP of a
"0-30 day ware" containing a virus or trojan of your choice. First,
prepare the virus or trojan by RESIZEing or REPLACEing it. Then just
execute "FAKEWARE (trojan/virus name)." In a minute or two FAKEWARE
will have generated a completely bogus game, right down to the .ZIP
comment.
FAKEWARE creates a fake title for your game, then creates between
five and twenty-five fake data files of random length and content (and
compressibility!). It includes your virus or trojan under as the main
.EXE, and even generates a fake .NFO file from either RAZOR, INC, or
TDT, complete with program description, cracking information, and
greets to all those cool pir8 doodz you know and love. FAKEWARE
executes PKZIP (which must be in the current directory or in your PATH
in order for FAKEWARE to work correctly), and adds a .ZIP comment, an
ad for a completely fake, yet very realistic, warez board. All
temporary file are deleted, of course. Now just upload the .ZIP as the
game that FAKEWARE tells you and you're all set; all you have to do now
is get the loser to run it...
FAKWARE will also generate a fake .EXE if no argument is given,
allowing you to send up tons of bogus wares to a stupid board to
discredit the sysop and create chaos. Unlike some other utilities, I
couldn't care less if you misuse it; I never did like warez boards
anyway...


FIXATTR
-------

This program lets you alter the attributes of files. Quite simple
and very legitimate. You can use either "+", "-", or "=", followed by
one or more of the following letters: A, H, R, and S. Using a plus sign
will add the specified attributes to the files' current attributes; a
minus sign will remove those attributes, if set; and the equals sign



Nowhere Utilities v2.0 - 4- (C) 1992 Nowhere Man and [NuKE]




will set the files' attributes to the ones given, removing any existing
ones. The letters above stand for (A)rchive, (H)idden, (R)ead-only, and
(S)ystem, respectively. Attributes for subdirectories cannot be
modified, but wildcards and multiple file names may be given after the
attributes. This is essentially the same as the DOS 5.0 or 4DOS ATTRIB
command, but it is usable by anyone, even those without DOS 5.0 or
4DOS. Suggested uses: hiding and/or write-protecting sensitive files
(or unhiding those pesky hidden files that some games still use), or
whatever else you can think of that requires attribute changes. This
utility is pretty basic, so I'm sure you'll think of other applications
for it.


FIXTIME
-------

FIXTIME is a basic "touch" utility, similar to those found under
UNIX and those that come with compilers such as Turbo C and Microsoft C
(although FIXTIME is superior to most compiler "touch" programs, as it
lets you set the file time to anything; more on that later). FIXTIME
can either take zero, one, or two arguments, followed by one or more
file names (wildcards allowed). If no other arguments are given besides
the file name(s), FIXTIME will set the time stamp of any and all
matching files to the current system time and date (which may not be
correct, if you're one of those people too lazy to set your system
clock). If a time is given, it must precede the file name(s) and be in
the standard 24- hour format (hh:mm:ss). All applicable files will have
their times set to that time; if no date is give then the system date
will be used. If a date is specified, it must precede the file name(s)
and be in the American date format (MM-DD-YY or MM/DD/YY, where the
year is any year between 1980 and 1999). As usual, no other aspects of
the file (size, attributes, etc.) are changed.
Suggested uses: to alter the time on documents that are past due
:-), to fix the date/time stamp of files to which you have added a
virus (though good virii always preserve the file's date and time), or
to change the date for any other purpose you can come up with (to
prevent someone from telling when you've written something, to change
the file times of files you've edited/modified, etc.). None of these
ideas really needs much elaboration; just be sure that if you're going
to want to change a file back that you remember to write down the
original time and date first...


NOLZEXE
-------

Don't you just hate it how executable-file compressors always
leave an annoying signature to show they've been used? Until now the
only way to remove these signatures to prevent people from UNLZEXEing
or PKLITE -Xing your program was to go in by hand with DEBUG or any
other hex editor and rip them out. Well, I've come up with this
handy-dandy utility to automatically destroy these headers for you,
preventing SCAN from detecting your PKLITEd virii and stopping assholes
from trying to disassemble or reverse-engineer your code. When invoking
NOLZEXE, all you must provide as parameters are the names of files you
wish to protect. Wildcards are allowed, and if no extension is given



Nowhere Utilities v2.0 - 5- (C) 1992 Nowhere Man and [NuKE]




then .EXE is assumed (though .COM files are supported, too). NOLZEXE
will then go through the files and completely cover all compressor
headers with random bytes; if a file is not compressed nothing will
happen to it. Versions 0.90 and 0.91 of LZEXE (the only versions
currently released) and all versions of PKLITE are supported. (If
anyone out there has found any other executable-file compressors that
they'd like to see supported in the next version, see below on where to
contact me.) The files will still execute properly and are otherwise
unchanged; however no virus scanner, CHK4LZE, or CHK4LITE program will
pick them out of the crowd. Suggested uses: as mentioned above, to
remove the headers on LZEXEd and PKLITEd virii to prevent scanning (my
ever-popular C-Virus used similar techniques), and to stop people from
disassembling or reverse-engineering your products (use the compressor
on them and then use NOLZEXE). This is also useful on trojans, as it
can stop CHK4BMB-type utilities from picking up your damaging code;
compress the trojan then NOLZEXE it. If your compressor refuses to work
on the file because it's too small (all to often the case with virii),
please read my notes about the subject under RESIZE below.


REPLACE
-------

Based upon an idea I had originally used in C-Virus, REPLACE
performs a great service to trojan- and virus-disseminators everywhere.
To put it bluntly, it just replaces one file (presumably a legitimate
one) with another (presumably a nasty one). On a more detailed level,
what REPLACE does is delete the original file, copy the new file to the
original's name, then reset the attributes, date, time, and size as
they were on the original file. Essentially, the new file has become
the old one. For example, you could "REPLACE LEMMINGS.EXE DIR-2.COM"
and then distribute "Lemmings" to all of the lame k-rad pir8 boards in
the area (good pirate boards wouldn't take such an old game to begin
with). As shown, .COMs may replace .EXEs, and vice-versa, with one
exception: and .EXE which REPLACEs a .COM must be smaller than 64k, or
else DOS will give an error when it is executed. Also note that
REPLACEing a file with a larger one will cause excess bytes in the new
file to be clipped (ie: if you replace a 1000 byte file with a 2000
byte one only the first 1000 bytes of the 2000 byte file will be
copied), so don't try it on executable files.
To run REPLACE, just provide two arguments, the first being the
name of the old file and the second the name of the new one, the file
to be replaced and the replacer, respectively. Wildcards are NOT
allowed. Also, remember the size warnings in the previous paragraphs to
avoid embarrassing mistakes (imagine how humiliating it would be to
upload a trojan to Ross Greenberg's shitty BBS and have it get an
error!). Have fun with this one.


RESIZE
------

RESIZE is a file resizer: it lets you alter the size of an
existing file, either making it larger or smaller. RESIZE may be
invoked in several different ways. If the first parameter is "-r" then
random byte filling is used (if the file size is being increased then



Nowhere Utilities v2.0 - 6- (C) 1992 Nowhere Man and [NuKE]




the extra space is padded with random bytes); otherwise blanks are used
as padding. The other parameter, besides file name(s) is the size
variation. This may be either relative or absolute. To modify a file's
size absolutely, you just give a number; the file's size is then
changed to that number. If you want the size to be relative, then you
give the size of the change (in bytes), preceded by either a "+" (to
make the file bigger) or "-" (to decrease it by the same amount). The
remaining parameters are file names, wildcards allowed. Note that if
you elect to make a file smaller, then the excess data will be forever
lost, so don't go around trimming things without good cause thinking
that you'll be saving disk space or something idiotic like that. If you
do you'll deserve it.
You might wonder "Why the -r option?" Well, it's there because if
you try to PKZIP or otherwise compress a RESIZEd file that was
blank-padded, then it will compress down to its original size (less
whatever it would have gone down to had it not been RESIZEd). If you
saw a 1000000 byte file in an archive being compress to 2000 bytes, I
think you'd be just a bit suspicious (though I know at least one
(ex-)sysop who wasn't, hehehe). With the random bytes the compressor is
unable to pack that area much, keeping the illusion that the file is
larger than it really is. Also, in case you were wondering, RESIZEd
executable files will still run normally, RESIZEd .GIFs will still view
properly, and so on. Suggested uses for RESIZE: to increase the size of
virii and trojans and upload them to boards (renamed, or course); after
all, would you download a 500-byte program labeled "really awesome
virtual reality simulator?" You would if it were one megabyte, though.
As I stated before, DO NOT ABUSE THIS PROGRAM AND UPLOAD INFLATED FILES
TO GOOD BOARDS FOR CREDIT. If you want to do it to a lamer, go ahead,
but like I said before, if everyone RESIZEd their files then everyone
would be wasting time download tiny, useless, lame programs made out to
be cool by their large size. Don't be lame and abuse these utilities;
they were meant for causing mayhem, but don't inflict it on your
friends.
RESIZE has a few other uses. You can RESIZE (normally) a file
which PKLITE or LZEXE refuses to compress; it will end up no larger,
and this method sure beats the old UNDELETE procedure.
An interesting side note. My friend Leeking Virus has discovered
another use for this versatile utility. Here's a way he came up with
(and tested, I might add) for crashing boards. When you go to upload
(or even download, depending on the software), most BBSs will tell you
how much space is free on the hard disk. What you do is RESIZE a small
file to take up at least that much space and then upload it while no
one's around (naturally boards with two gigabyte hard disks are pretty
much immune to this, as your hard disk must be large enough to hold the
RESIZEd file). You must be sure to NOT use the -r option, and NOT to
PKZIP it. Unless you want to totally waste time, be sure to use JMODEM
or another protocol with data compression. The file will still take
what it originally would to download, but it will swell up on the
receiver's hard disk to fill it up. Hehehe. On Telegard boards it has
the added advantage of locking up the board; Telegard tries to log the
fact that the disk is full to an error file, but since there's no room,
it can't create the file, so it tries, to log that error, and so on,
trapping the board in an infinite loop. Other BBS software might do
this too, but so far Telegard is the only system that's been tested. At



Nowhere Utilities v2.0 - 7- (C) 1992 Nowhere Man and [NuKE]




the very least there'll be no more uploads that day. Another
possibility is to RESIZE -r a file to the size of the target hard disk,
give it the read-only attribute, ZIP it up and give it to a board that
automatically PKUNZIPs files for scanning. Similar effects...


USER2TXT
--------

If you're into hacking boards, I'm sure you know the most prized
possession you can take is the user list. The information in that file
can get you accounts on many other boards all over the country (if the
people are stupid enough to use the same password on every board they
call, which many people are). But how do you take a user list, in
binary format, and turn it into a readable form? If you have Telegard
(or whatever other BBS it comes from) you could just copy it to your
GFILES directory, use the (U) option, and flip through the users one by
one, writing down the passwords and phone numbers. But what if you
don't have the time, or you don't have Telegard, or you'd like a nice
file for on-line reference from your comm program? USER2TXT fills that
gap.
To user USER2TXT, give it two parameters, the first being the name
of the Telegard v2.5/v2.7 or X-Ot-Icks v3.8 user list (almost always
USER.LST), and the second being the name of the output file. USER2TXT
will convert the binary data in the first file to readable ASCII. The
second file will contain each user's name, real name, password, and
phone number. The first user will always be the sysop. This program
really has only one use, which I've already described above. This is a
simple utility, but one that you'll find very useful.


WIPE
----

WIPE is a little utility I wrote to totally wipe a file off of a
disk. You run WIPE with one or more file names (wildcards allowed),
which are the files to wipe. The files are unrecoverable by normal
means (UNDELETE, QU, DISKEDIT, etc.), so be VERY careful with this; it
DOES NOT prompt you to verify your choice. This was done because I
figured if you were ever in the situation to need this program (a bust,
etc.) you would not want to be slowed down constantly hitting "Y." I'd
also advise renaming this program, as it's only a matter of time before
some lamer develops an ANSI bomb that runs it. Suggested uses for this
program: only one, really, and that's to destroy sensitive information
in case of a bust. If I were you, I'd write a batch file called
BUST.BAT, or something like that, that would automatically WIPE all of
the files you needed destroyed.
This program is much faster than Norton's DISKWIPE or WIPEFILE
because mine doesn't need to meet some silly military standard. I'm
sure if someone were REALLY REALLY desperate they could possibly get
your files back, but they'd need sophisticated equipment that no police
force would normally have. If you have the time (ie: you've been warned
the cops are coming for you) then I'd advise using WIPEDISK or another
military-standard wipe program, but WIPE is much faster in case you
don't have the time. Like I said, BE VERY CAREFUL WITH IT. Nowhere Man
and [NuKE] are NOT responsible if you fuck yourself over with this. It
is only meant for desperate situations.


Nowhere Utilities v2.0 - 8- (C) 1992 Nowhere Man and [NuKE]








Revision Information
--------------------

Version 2.00 (September 5, 1992)

o DECRYPT, FAKEWARE and USER2TXT programs added.

o Removed a bug in RESIZE that would create huge files if
you attempted to make a file smaller than it's current
size (ie: RESIZE -10000 TEST.DAT where TEST.DAT is only
5000 bytes long). Thanks to Guido Sanchez.

o Major revisions to FIXTIME. The help message was revised
to correctly indicate that several filenames can be used
(v1.00's help message read "FIXTIME [hh:mm:ss [mm-dd-yy]]
filename," but there should have been ellipses after
"filename"). I've also changed FIXTIME so that it isn't
necessary to specify a time in order to change file
dates. Dates and times are also checked for invalid
settings (for example, the time "99:99:99").

o CRYPTCOM's decryption routine has been changed, slightly
increasing its size but making it faster and more
compatible with certain (picky) programs.

o NOLZEXE now recognizes files compressed with PKLITE
v1.1x.

o All programs that utilized random numbers have had their
random-number generation routines updated. This will not
effect the functioning of the programs.

o Documentation cleaned up. Many spelling/grammatical
errors were fixed, the layout was changed, and several
inaccuracies (including a reference to a non-existent
paragraph) were corrected.


Version 1.00 (January 25, 1992)

o Initial release.


Closing comments
----------------

As you can see, the Nowhere Utilities are very powerful, but
they also can be abused -- DON'T. I intended for the entire virus
community to benefit from these, not for some losers to abuse them.
Other than that little warning, I heartily encourage you to experiment
with the utilities, to use them in new and interesting ways (if you
find a novel use for a utility, let me know so I can mention it in the
next version). Enjoy them.


Nowhere Utilities v2.0 - 9- (C) 1992 Nowhere Man and [NuKE]




As usual, greets go out to Rock Steady, Rigor Mortis, Leeking
Virus and Murdak, all [NuKE] and SCP members and sites, Phalcon/SKISM,
and all virus-writers everywhere. Thanks to anyone else who I forgot to
mention; your input into this project is still greatly appreciated,
even if I do forget a name here and there.
If anyone has any questions, comments, complaints, or
suggestions about this or any other fine product from Nowhere Man or
[NuKE], I can be reached at The Hell Pit and FreeMatrix, both official
U.S. distribution sites for [NuKE]. I also monitor most Chicago-area
networks, as well as NuKENet, Swashnet, CyberCrime International, P/S
Net, and FidoNet; responses to my products may be posted there also.
Once again, so long, and happy virusing.

-- Nowhere Man, [NuKE] '92












































Nowhere Utilities v2.0 - 10- (C) 1992 Nowhere Man and [NuKE]

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT