Copy Link
Add to Bookmark
Report

Phruwt Issue 02 003

eZine's profile picture
Published in 
Phruwt
 · 22 Aug 2019

  

________________________________________
Random Hacks - Everybody
________________________________________

These are just bits i picked up from other people. if your post or mail is
here thanks for the tip...e.mail us and well give credit where credit is
due next issue...

NOTE: I HAVE NOT TRIED THESE SO I DONÕT KNOW IF THEY WORK...

---------------------------------------------------------------------

-F-O-O-L-P-R-O-O-F- -A-N-S-W-E-R-S-

- Info on FoolProof

FoolProof does NOT encrypt the hard drive. It does modify the driver for
the hard drive though.... this makes is so FP boots every time the machine
does (with or w/o extensions that's why the shift key doesn't work).

FoolProof DOES encrypt the admins password. When FoolProof is installed
there is a dialog which asks for both the password and the key. the password
is encrypted with the key & generally made difficult to get at.

- How to Hack FoolProof

In order to bypass FoolProof you need two things:
1. A boot disk that will work on the FPed system.
2. About 30 sec of non-supervised time.

Make sure your admin. is gone BEFORE doing this. if you get caught, you
really get screwed over...

Run a program that takes a few sec to load (like Photoshop or any version of
MS word). Then while it is loading, force restart from either the kb or by
hitting the switch on the back if your computer has it (the kb command is
cmd-ctrl-reset so donÕt ask) Now quickly insert your boot disk (in case your
wondering, a disk tools disk works just fine... Often lazy admins leave
these lying around). and wait for the system to boot up. You then have full
access to drag, load or whatever. If U need to use the net or something,
simply drag the FoolProof init & cdev out of their respective folders onto
the desktop


- If it didn't work

You're a moron. You didn't force-restart at the right time (needs to be
WHILE a program is reading-writing from/to the HD... that's important)

- Why it works for the cool people

The FoolProof extension, among other things, intercepts the Restart & Shutdown
calls from the system and makes sure to disable any external boot device
(i hope i said that right... IÕm not thinking straight today). When you
manually restart, no call is made to the system.... it is just restarted
w/o locking or protecting anything.

- Good things to do to fuck your admin. over

Now the fun part. If you want to get even with your admin. for installing
FoolProof, there are several things u can do. here's a short list

install MacLife-Saver. This program logs all the keystrokes entered into a
file in the system folder. Wait a few days & ask your admin. for help with
some task that FoolProof inhibits, such as copying a file from a 3 1/2 disk
to a mounted volume. then wait a few more days and get the password from the
logs in the system folder.

install netbunny. of course this is only fun if you have a network set up.
wait a month or so, then set it off on a bunch of foolproofed machines.

install all of the utilities provided in the AnnoyancePack for Mac. they
do things like shuffle the menu bar when clicked, make the mouse move
weird, delete vowels whenever they are typed. other kool stuff too.

---------------------------------------------------------------------

-W-A-R-D-I-L-E-R-

> you cant wardial anymore without somebody calling
> back and fucking it up

au contraire! All you have to do is forward your calls to someone with 72#.
To do it, you dial 72# ( different than *xx codes ) and then you get a
dialtone. You then dial the number you want calls forwarded to. When they
pick up, you hang up. Now anyone who calls you or does a *69 will get
whoever you forward calls to! To deactivate it, dial 73# and thatÕs it!
Also preceded <sp?> all wardials with *67 EACH CALL. Then, NO ONE can
interrupt you. Ahhh...the wonders of modern technology. 8)

---------------------------------------------------------------------

F-I-R-S-T-C-L-A-S-S- -H-A-C-K-

There is one way to hack FirstClass if you have physical access to the
server. To do this, you first open the root level of the hard drive and
then open the folder named "FirstClass Post Office". The locate the folder
named "UserDir" and open that. From there, open the folder named "admin.". Then copy the file named .ENProf onto a disk. When you have the time, open
it up with Microsoft Word. To do this, you must change the "Show" pull-down
menu from "Readable Files" to "All Files" and THEN locate the .ENProf. You
will see the admin's password around the fourth or fifth line. If the admin.
is using a shorter password than he used to, then you will see his password,
followed by the correspoding characters of his old password. I.E., if
someone changed their password from "systemadmin" to "admin." it would look
like "adminmadmin". If you do not get on with the whole string listed, try
passwords by taking the last letter away until you get it. You can now give
yourself Administrator privs. From there, you can do everything the real
admin. can do, EXCEPT open the Admins desktop, and grant other users admin. privs.

---------------------------------------------------------------------

Here is a way to turn off
zoomrects in System 7 (other wise know as a Finder Hack):

The first thing you need to do is open up the finder with RedEdit. Then you
open the code resource, then look for Code ID 4, (this does need to be
decompressed). Then Select Find offset and look for the code 0078, this
should take you to this line:

48E7 1F38 594F 2FOF

Then select 4 bytes (48E7 1F38), Replace them with these codes:

6000 00E6

Save the copy of Finder and quit ResEdit, then Make the copy of the Finder
(the real thing) Put the old one in a safe place incase it screwed up. Now
just reboot the machine, and open up a Window.

---------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT