Guide to mostly harmless hack's journal picture

Guide to mostly harmless hack

followFollow
🤴
Administrator: eZine
🕒
Created 27 Dec 2022
📄
11 Articles

GUIDE TO (mostly) HARMLESS HACKING

written by Carolyn Meinel

Getting Serious with Win95

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
____________________________________ GUIDE TO (mostly) HARMLESS HACKING Microsoft-only version Number 1 Getting Serious with Win95 _____________________________________ by KeyDet89 Too many times on the newsgroups I see posts like "teach me to hack" and "all I have is Win95, will I ever learn to hack?" In this Guide you will learn: Important files on your system. My first program. Getting help. Finding out about programs. What can I do with an Internet connection? Well, you're in luck, the answer is a resounding YES!! However, there is a very basic step that must first be taken, and that is to define what is meant by "hacking." We...

Computer hacking. Where did it begin and how did it grow?

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
____________________________________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series Number 5 Computer hacking. Where did it begin and how did it grow? ____________________________________________________________ If you wonder what it was like in days of yore, ten, twenty, thirty years ago, how about letting and old lady tell you the way it used to be. Where shall we start? Seventeen years ago and the World Science Fiction Convention in Boston, Massachusetts? Back then the World Cons were the closest thing we had to hacker conventions. Picture 1980. Ted Nelson is running around with his Xanadu guys: Roger...

The Exploit Files: Basics of Breaking into Computers

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
____________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series Number 7 The Exploit Files ____________________________________ by keydet89@yahoo.com and Carolyn Meinel How many times have you read hacker newsgroups or email lists and seen posts that begged "teach me to hack", or asked "how do I hack this"? It often looks as though the person asking the question just doesn't understand the basics of vulnerabilities and their exploits. The purpose of this Guide is to explain what vulnerabilities and exploits are, and how they relate to computer security. Let's start with an example. Suppose that you a...

PGP for Newbies

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
____________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series Number 4 PGP for Newbies _____________________________________ Do you cringe at the idea of people snooping on your email and through the files on your computer? Encryption is the only way to be absolutely certain you can keep your private stuff really private. Even if you are a newbie, encryption can be surprisingly easy -- if you use the free PGP program, the encryption technique so powerful that it is illegal to use in some countries! The following GTMHH was written by Keydet89, so if you want to ask questions, email him and not me! (Carolyn ...

How to use the Web to look up information on hacking

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
___________________________________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series Number 4 How to use the Web to look up information on hacking. This GTMHH may be useful even to Uberhackers (oh, no, flame alert!) ____________________________________________________________ Want to become really, really unpopular? Try asking your hacker friends too many questions of the wrong sort. But, but, how do we know what are the wrong questions to ask? OK, I sympathize with your problems because I get flamed a lot, too. That's partly because I sincerely believe in asking dumb questions. I make my living asking...

How to Get a *Good* Shell Account (part 2)

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
_____________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #3 Part 2 How to Get a *Good* Shell Account _____________________________________ In this section you will learn: how to explore your shell account Ten Meinel Hall of Fame Shell Account Exploration Tools how to decide whether your shell account is any good for hacking Ten Meinel Hall of Fame LAN and Internet Exploration Tools Meinel Hall of Infamy Top Five Ways to Get Kicked out of Your Shell Account How to Explore Your Shell Account So you're in your shell account. You've tried the "ls -alF" command and are pretty sure this really, tru...

How to Get a *Good* Shell Account (part 1)

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
_____________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #3 Part 1 How to Get a *Good* Shell Account _____________________________________ In this section you will learn how to: tell whether you may already have a Unix shell account get a shell account log on to your shell account You've fixed up your Windows box to boot up with a lurid hacker logo. You've renamed "Recycle Bin" "Hidden Haxor Secrets". When you run Netscape or Internet Explorer, instead of that boring corporate logo, you have a full-color animated Mozilla destroying New York City. Now your friends and neighbors are terrified a...

Hacking from Windows 3.x, 95 and NT

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 28 Dec 2022
_______________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #2, Section 3. Hacking from Windows 3.x, 95 and NT ________________________________________ This lesson will tell you how, armed with even the lamest of on-line services such as America Online and the Windows 95 operating system, you can do some fairly serious Internet hacking -- today! In this lesson we will learn how to: Use secret Windows 95 DOS commands to track down and port surf computers used by famous on-line service providers. Telnet to computers that will let you use the invaluable hacker tools of whois, nslookup, and dig. Download ...

Hacking into Windows 95 (and a little bit of NT lore)!

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 27 Dec 2022
Ooops! We had a period on a line by itself followed by return which made the SMTP port think it had gotten the end of the message. Shoot, all the good stuff came after it! Now this time you get enough to learn the hacker way to edit Windows Registries and trash your CMOS, heh, heh... ________________________________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #2, Section 2. Hacking into Windows 95 (and a little bit of NT lore)! _________________________________________________________ Important warning: this is a beginners lesson. BEGINNERS. Will all you geniuses who were born already knowing 32-bit Wi...

Hacking from Windows 95!

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 27 Dec 2022
_____________________________________ GUIDE TO (mostly) HARMLESS HACKING Beginners' Series #2, Section One. Hacking from Windows 95! ______________________________________ Important warning: this is a beginners lesson. BEGINNERS. Will all you super k-rad elite haxors out there just skip reading this one, instead reading it and feeling all insulted at how easy it is and then emailing me to bleat "This GTMHH iz 2 ezy your ****** up, wee hate u!!!&$%" Go study something that seriously challenges your intellect such as "Unix for Dummies," OK? Have you ever seen what happens when someone with an America Online account posts to a hacke...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT