This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Ardamax Keylogger Tutorial

A step-by-step guide to successfully creating a deployment package, sending it, and receiving information using Ardamax Keylogger. Now, in this guide, I only use one method of recieving information, and that's an FTP. I also do not protect the files. Any suggestions and comments are appreciated. Let's begin.

Head on over to:

CODE
http://www.ardamax.com/keylogger/


And scroll to the bottom. Download the free trial.

After downloading, open the program and install it. Simple enough, right? After installing, go to wherever you installed it at, and open it. It should open at the bottom right corner of your screen, down by the time. If not, press ctrl+shift+alt+h. Now, leave that alone.

Next, go to:

CODE
http://www.theserials.com/serial/serial_ardamax.html


Download the appropriate serial.

Now, open it, and it should give you a name and a jumble of letters and numbers.

Go back to the Ardamax icon at the bottom right, and right-click it.

Click the "Enter Registration Key" button.

Use your serial/crack to unlock the full version. Congratulations, you are now ready to make your first deployment package.

~NOTE~

If you want to attach the keylogger to an existing file, go ahead and place that on your desktop.

~NOTE~

Again, right click the icon at the bottom-right.

Click "Remote Installation".

Click next.

Now, if you want to attach your keylogger to an existing file, tick the box that says "Append keylogger engine to.." etc etc.

If you tick it, click Browse, and select the file.

If not, continue down. The installation folder on target computer needs to remain Windows System Folder for added security, so leave it be.

Add any additional components you would like. I just leave mine as "log viewer" since all I grab are passwords from games.

From this point, click next.

Now, this part is self explanatory. I tick all of the boxes, as to hide it from everything visible, otherwise they can just see it and be like "Wtf", uninstall, etc.

Can't have that, now can we?

Click next.

For Security, do what you want. I leave all of it as-is and click next again.

Now, untick the "Check for updates" box, else it will check for updates on their computer and they will know that they are bugged.

Click next.

Tick the "Start in hidden mode" box, and leave the "Run on windows startup" as-is.

You may pick a date to self destruct, if you like. Sounds noisy, right? It simply removes itself on selected date. If not, leave it alone, and it will never self destruct.

Click next.

Tick the "Send logs every.." box, and choose how frequently you would like to recieve information that has been sent.

Select 'FTP' and de-select everything else as a delivery method.

You may choose what you want to see. I take out screenshots. Causes lag for me.

Leave log format alone.

You may choose to send logs if it exceeds a certain size, or if you want it to send no matter what, untick the box, which is what I do.

Continue on! (next.)

Now the fun part. -_-.

Head on over to:

CODE
http://phpnet.us/


Make an account, etc etc.

Save your FTP Account name and password. You'll need it in a moment.

This site will be the site that holds all information recieved by the keylogger.

When you're done, scroll down a bit.

Under "FTP Accounts", click "File Manager".

Near the top, click the "New Dir" button, and create a directory by any name you want. My favorite is "lolbeans".

Now, hold that thought. Bring the keylogger back.

In Ftp Host, put in:

ftp.phpnet.us

In "Remote Folder", put in the new directory's name you made. So, in this scenario, "lolbeans" without the "'s.

Fill in your Username and Password.

I leave Passive Mode checked because I'm not sure what it does, rofl. :[

Leave port alone as well. It's default.

Now to make sure everything is correctly done, click test. It should tell you it all went through. And to double check, you can refresh your open window. Click your "lolbeans" directory and there should be a test file in it.

Click next, if you're still alive.

Tick anything and everything you want.

Next.

If you selected screenshots to be enabled, pick how you want them delivered. Click next. If not, ignore this step.

Browse where you want the keylogger to be placed. You can also change the icon, which is nifty. If you're apologizing to a bitch ex girlfriend/boyfriend of yours, you can change the icon to a notepad and name it "Apology", and they fall for it.

Next.

This screen will go over with you everything that you have chosen. Make sure it's all correct.

Click Finish.

Now, if you appended the keylogger to something, you're going to need to put the "install" (feel free to rename it so it's not so obvious) and appended file into a .zip or .rar file.

If not, you have the simple "Install" on your desktop. Also, feel free to rename it to something like "Apology" or "OMFGFunnypicture!!!.jpg"

Upload the file or .rar/.zip somewhere, and let your target download it. They will double click it, and on their end, nothing will happen, but secretly, they have been keylogged.

Check your FTP Directory that you made as frequently as you told it to send logs, and you'll have everything you need.

Feel free to test it out on yourself.

How to make ALL Trojan/Virus/Keylogger UNDETECTABLE

This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)


Ready? GO!

First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.

My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.

Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!

1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)... The direct link to dl the program is here:
Code:
http://nct.digitalriver.com/fulfill/0161.001

There is a form to fill out information, so put in your real email address, and then you'll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)

2. Once you download the program, install it.
3. Once installed, you open it up and see this:
Code:
http://img339.imageshack.us/img339/6...assportzh3.jpg

This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!

1. Download this pre-made settings. These settings are pre-made by me so you won't be confused. Everything is working.

DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:
http://rapidshare.com/files/8749860/projects.arm.html

DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:
http://rapidshare.com/files/8750048/projects.Stats.html


Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).

Where it says "Files to Protect" (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!

Now, once done, go to the bottom right and click "Build Project". A bunch of windows will come up, just click Yes and OK.

Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!


„It takes a long time to learn simplicity.“



AddThis Social Bookmark Button


How to Send Self-Destructing Emails

Ever sent an email you later regretted writing? We all have, but it can be especially bad when those emails are sent to the wrong person or get leaked on the Internet. You might not know this, but there are many providers that offer self destructing email services. These services give you complete control over who reads them, how long they exist, or whether they can be printed, copied, or forwarded. Hey, you don't have to be a secret agent to send self-destructing emails, just a very smart geek with a reputation to maintain, so check out what these sites can do for you:

Will Self-Destruct:
This service is free. There's no sign up process, but you have to fill out a
web-based form with the recipient's email address, subject, and your message.
The recipient receives an email with a link to a web page containing your
message. Once the link is accessed, a countdown begins, and the message is
destroyed. The email itself looks like spam, so make sure you tell your friend
to expect something from willselfdestruct.com.
SDMessage and
Destructing Message are two
similar alternatives.

KickNotes: Another web-based service
that sends self-destructing messages after filling out a form. You can actually
control the times the message can be viewed or how long you want the message to
exist. Once the message is created, you can either send a link to a web page
through your own email address or from KickNotes.



These sites can be useful if you want to send password or other important information that you don't want other people to see.

Boeing's New 787 May Be Vulnerable to Hacker Attack



Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems,The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to everything the plane controls.



AddThis Social Bookmark Button

new cool ascii for orkut testimonals

[b][red]$$$$$$___$$$$___$$$$$___$$$$$$_$$$_$$$_$$$$$$_$$$$$____
_$___$__$____$___$___$___$___$__$___$___$___$__$___$___
_$_____$______$__$___$___$______$___$___$______$___$___
_$__$__$______$__$___$___$__$___$___$___$__$___$___$___
_$$$$__$______$__$$$$____$$$$____$_$____$$$$___$$$$____
_$__$__$______$__$__$____$__$____$_$____$__$___$__$____
_$_____$______$__$__$____$_______$_$____$______$__$____
_$______$____$___$___$___$____$___$_____$____$_$___$___
$$$______$$$$___$$$___$$$$$$$$____$____$$$$$$_$$$___$$_

$$$$$$_$$$$$$__$$$_$$$$$$_$$___$$$_$$$$$$____$$$_$__
_$___$__$____$__$___$___$__$____$___$____$__$___$$__
_$______$____$__$___$______$$___$___$_____$_$____$__
_$__$___$____$__$___$__$___$_$__$___$_____$__$$_____
_$$$$___$$$$$___$___$$$$___$__$_$___$_____$____$$___
_$__$___$__$____$___$__$___$__$_$___$_____$______$__
_$______$___$___$___$______$___$$___$_____$_$____$__
_$______$___$___$___$____$_$____$___$____$__$$___$__
$$$____$$$___$$$$$_$$$$$$_$$$___$__$$$$$$___$_$$$___





[b][green]??7´´´´¶¶¶¶¶$1´´´´¶¶¶¶¶¶7´´o¶¶oo´¶oo¶7
´¶11¢$?o17¶´¶¶¶?¶¶?¶$¢1?$?¢¶¶¶¶¶´7´¶¶´11¢1¢$
´$77?´´¶´´¶´7¢?7´´o¶1¶´1oo1o´´¶¶¶´´¶¶´?¢o1¶
´?oo¢´´¶´´¶´7o?¢´´?¶´¶´´?77¢´´´´´´´¶¶´$77?¶
´?¢¢71´?´´¶´1¢?o1´??´¶´´¶71?´´´´´´´$¶¢77o¶
´¢??¢¢o77¶¶´´¢?o1´$¢1¶´´¶o1?´´´´´´´?¢o77´7
´¢??7o?1¶7´´´¢?o1´$o1¶´´¶¢1?´´´´´´´$?o77oo
´¢?¢77¶o1´´´1¢$o´´$o´$´´??´?´´´´´´´$?´¶17?7
´??¢o´?¶´o´´o$$7´´?o1o´´?$´7´´71´´´??´¢¢o7o
´$o¢?´´¶¶7´´$¶¶¢77¢oo?´¢¶¶¢?7$¶¶o1´??11´¢oo1
´¶?$¶´´´?¶o´´7¶¶¶$?¶¶¶´´7¶¶¶¶¶¶¶¶´7¶¶oo´¶??¶
´ooo?´´´´7¶o´´´ooooo´´´´´´7117o´´´´oo¢1´´¢¢



¦¦¦
10%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦
45%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
89%

¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
100%

* -:- *W* -:- *
* -:- *E* -:- *
* -:- *L* -:- *
* -:- *C* -:- *
* -:- *O* -:- *
* -:- *M* -:- *
* -:- *E* -:- *
* -:- * * -:- *

* -:- * * -:- *
* -:- *T* -:- *
* -:- *O* -:- *
* -:- * * -:- *

* -:- *M* -:- *
* -:- *Y* -:- *
* -:- * * -:- *

* -:- *P* -:- *
* -:- *R* -:- *
* -:- *O* -:- *
* -:- *F* -:- *
* -:- *I* -:- *
* -:- *L* -:- *
* -:- *E* -:- *
* -:- * * -:- *





I am 2

sweet




[b][red]____________000000____________000000
__________000000000000______00000000000
______000000000000000000__0000000000000000
____00000000000000000000000000000000000000
___00000000000000___000000000___000000000000
__000000000000000___000000000___00000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000000000___000000000___000000000000000
_0000000000___000000000000000000000___0000000000
__000000000___000000000000000000000___000000000
___000000000___0000000000000000000___000000000
_____000000000___000000000000000___000000000
_______00000000____00000000000____00000000
__________0000000_______________0000000
_____________0000000000000000000000000
_______________000000000000000000000
__________________000000000000000
___________________00000000000
______________________00000
________________________0



.
[b][pink]_________8"=,,88,
_____8""=""8'__"88a88'
.._.;88m a8___,8""_"8
__"8"'__"88"__A"_____8;
___"8,__"8___8_______"8,
____"8___8,__8,_______"8
_____8,__"8,_"8,_______8,
_____"8,__"8,_"8mm""""""8m.
______"8,am888i"'___ 3,mm"
______,8"___8"__ 3.m888"
_____,88P""""" 3I888888
________________"I888_
__________________"I8,
___________________"I8
____________________"I8_
________,mmeem.m""i,_I8""__,mmeem,'.
_______m""____._"8.8_I8__,8"___.__"88
______i8__._'__,mi""8I8_,8_._'__,8"_88
______88.'_,mm""____"8I88"m,,mm'" 8
______"8_m""_________"I8 ""'
_______"8_____________I8
______________________I8
______________________I8""
______________________I8
______________________I8
____________________""I8
______________________

[b][maroon]´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´ o´¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´Ã¸7¶Ã¸1¢```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¶´Ã¸1o1```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´.o¶¶7¶1```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´oo¶Ã¸```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¢¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´´´o¶¶¶```
´´´´´´´´´´´´´´´´´´´´´´´´´´$¶¶Ã¸```
´´´´´´´´´´´´´´´´´´´´´´´´´¶¶¶o```
´´´´´´´´´´´´´´1ø$7´´´´´¢¶¶¶1```
´´´´´´´´´´´´´Ã¸¶¶Ã¸7¢$ø7ø¶¶¶$```
´´´´´´´´´´´¶¶´´´11´´1¶Ã¸¶o```
´´´´´´´´´´´¶´1771´´¢¶Ã¸Ã¸$````
´´´´´´´´´´¶Ã¸´71177øø$$ø17o```
´´´´´´Ã¸¶¶¶Ã¸´177¢¶¶$øø7´17¢7````
´´´¶¶¶Ã¸1´´171¢Ã¸¶Ã¸1o¶$´177¢7`````
´¶¶Ã¸1´1777771o7ø¶¶¶¢o17o¢¢`````
¶¶1177777777717ooooo7oø¢1`````
$17oo7oo11777o771177¢7``````
o7o7oo$¶¶Ã¸77o7ooooooø``````
ooooo77177o¢7177ooooø``````
1¶¢ooooo7o¢o¢¶Ã¸o7ooøo`````
´o¶Ã¸¢oooooo7oø¶¢7o¢$1`````
´´´¢¶$¢¢oooooo7oo¢$o``````
´´´´´o¶¶¶Ã¸Ã¸¢oooø$¶7``````
``````````````````````
````````````````````
`````````````````

[b][black]----------. ;; .
---------/ ;;;; \ ____----- .;;.
--------|;(;;;-""-------`'-.,';;;;;\
---------\;'-------------------';;);/
--------/------------------------\;'
-------/------.;.-------.;.--------\
------|------;;o;;----;;o;;------|
------ ;----- '"-'`----`'-"'----- /
------/\-----------._. ---------/
-----;;;;;;_-----,_Y_,---- _.'
----/;;;;;;;\-`---.___.--- ';.
---/|;;;;;;;;;.__.;;;.-------\\
--; -\ ;;;;;;;;;;;;;;;;;;\------;\__--.;.
--|-----';;;;;;;;;;=;;;;'-------|-__;;;;/
--|-------`""`- .------._-----/;/;;\;;/
-/ ;------------/;;;;;;;-;/;;;;;;;/--|;/
-\_,\----------|;;;;;;;;;;;;;;;;;;|-|
------'-...----- ';;;;;;;;;;;;;;;;;;\/



[b][red]: ¸.•´¸.•*´¨) ¸.•*¨)
(¸.•´ (¸.•` * ¸.•´¸
... , . - . - , _ , TO
... ) ` - . .> ' `( ..
.. / . . . .`\ . . \ . you
.. |. . . . . |. . .|
... \ . . . ./ . ./ ..
..... `=(\ /.=` ......MAY
....... `-;`.-' ..
......... `)| ... , ..
.......... || _.-'| ..U
...... ,_|| \_,/ .....
.. , ..... \|| .' .HAVE
. |\ |\ ,. ||/ ......
..\` | /|.,|Y\, ..... MANY
'-...'-._..\||/ .....
... >_.-`Y| .........
........ ,_|| .......MORE
.......... \|| ......
........... || ......WITH GOOD
........... || ......
........... |/ ......
.¸.•*¨)¸.•*¨)HEALTH.
(¸.•´...¸.•´¸.•*´¨) ¸.•*¨)
(¸.•´ (¸.•` * ¸.•´¸.•*´¨)

┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼
┼┼┼██┼┼█████┼┼
┼┼┼██┼┼██┼██┼┼
┼┼┼██┼┼█████┼┼
┼┼┼██┼┼┼┼┼██┼┼
┼┼┼██████┼██┼┼
┼┼┼┼┼┼┼┼┼┼┼┼┼┼


███ ███ ███ ♥♥♥♥♥♥ ███ ███ ███
W ♣ E ♣ L ♣ C ♣ O ♣ M ♣ E
███ ███ ███ ♥♥♥♥♥♥ ███ ███ ███





[b][blue]
´´´´´´´´´´´´´´´´´Ã¸$´´´´´´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´¶¶¶´´´´´o¶¶¶¶¶7´´´´´´´´´
´´´´´´´´´´´´´´´1¶¶¶Ã¸´´´´´´¶¶¶¶7´´´´´´´´´
´´´´´´´´´´´´´´´´´´¶¶¶¶7o´$¶¶¶¶´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶´1¶¶¶¶¶´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶Ã¸´´´´´´´
´´´´´´´´´´´´´´´´´´´´´Ã¸¶¶¶¶¶¶¶¶¶¶$´´´´´´´
´´´´´´´´´´´´´´´´´´7¶¶¶¶¶¶¶¶¶¶¶¶¶o´´´´´´´
´´´´´´´´´´´´´´´´¶¶¶´´´´´´´¶¶¶¶¶¶7´´´´´´´
´´´´´o¶¶¶¶¶¶7´´¶¶¶´´´´´´´´´¢$$´´´´´´´´´´
´´´´´´´´´´´1¶¶¶¶¶¶¶¶¶7´´´´´´´´´´´´´´´´´´
´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶o´´´´´´´´´´´´´´´´
´´´¶¶¶¶¶¶´¶¶¶´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶$$¶$¶Ã¸´´´
´¶¶¶´´´´´¶¶´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶$¶¶¶¶
7¶´´´´´´¶¶¶¶´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´
¶¶´´¶¶¶¶Ã¸´´¶´´´´´¶¶¶¶¶¶¶¶7´1o¶¶o´´´´´´´´
¶¶´´1¶¶¶´´´¶´´´´´¶¶¶¶¶¶¶¶1´´´´1¶¶¶Ã¸´´´´´
´¶¶´´´´´´´¶¶´´´´´´´$¶¶¶¶¶¶¶¶¶¶¶1´´¶¶¶´´´
´7¶¶¶oø¶¶¶¶´´´´´´´´´´´´1øøø¶¶¶¶¶¶$´´¶¶´´
´´´´Ã¸¶¶¶7´´´´´´´´´´´´´´´´´¶¶´¶¶¶¶¶¶´¶¶´´
´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶´´´¶¶¶´´¶¶´´
´´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶o´´´´´¶¶´´´
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶o´´




[b][olive]~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~$$$$~~~
~~~~~~~~~~~~$$$$$$~~~
~~~~~~~~~~~.$$$**$$~~~
~~~~~~~~~~~$$$"~~'$$~~~
~~~~~~~~~~$$$"~~~~$$~~~
~~~~~~~~~~$$$~~~~.$$~~~
~~~~~~~~~~$$~~~~..$$~~~
~~~~~~~~~~$$~~~~.$$$~~~
~~~~~~~~~~$$~~~$$$$~~~~
~~~~~~~~~~~$$$$$$$$~~~~
~~~~~~~~~~~$$$$$$$~~~~
~~~~~~~~~.$$$$$$*~~~~
~~~~~~~~$$$$$$$"~~~
~~~~~~.$$$$$$$~~~
~~~~~$$$$$$"`$~~~~~
~~~~$$$$$*~~~$$~~~~~
~~~$$$$$~~~~~$$.$..~~~
~~$$$$$~~~~$$$$$$$$$$.~~
~~$$$$~~~.$$$$$$$$$$$$$~
~~$$$~~~~$$$*~'$~~$*$$$$
~~$$$~~~'$$"~~~$$~~~$$$$
~~3$$~~~~$$~~~~$$~~~~$$$
~~~$$$~~~$$$~~~'$~~~~$$$
~~~'*$$~~~~$$$~~$$~~:$$~
~~~~~$$$$~~~~~~~$$~$$"~
~~~~~~~$$*$$$$$$$$$"~~~
~~~~~~~~~~~~````~$$~~~
~~~~~~~~~~~~~~~~~'$~~~
~~~~~~~~~~..~~~~~~$$~~~
~~~~~~~~$$$$$$~~~~$$~~~
~~~~~~~$$$$$$$$~~~$$~~~
~~~~~~~$$$$$$$$~~~$$~~~
~~~~~~~~$$$$$"~~.$$~~~
~~~~~~~~~"*$$$$$*"~~~

      █████
     ██▒▒▒██
    █▒▒▒▒▒▒██
    █▒▒▒▒▒▒▒██
   ██▒▒▒▓▓▓▒▒██  █
   █▒▒▒▓▓▓▓▒▒▒█   █
  ██▒▒▒▓▓▓▓▓▒▒█   █
  █▒▒▒▓▓▓▓▓▓▒▒█   █
  █▒▒▒▓▓▓▓▓▓▒▒█ ████████
  ██▒▒▓▓▓▓▓▓▒▒█ █████  █
   █▒▒▒▓▓▓▓▒▒▒██████
   ██▒▒▒▓▓▒▒▒█████████████████
  ████▒▒▒▒▒▒██████▒▒▒▒▒▒▒▒▒▒▒▒███
 ██▒▒██▒▒▒▒██████▒▒▒▓▓▓▓▓▓▒▒▒▒▒██
██▒▒▒▒██▒▒██████▒▒▒▓▓▓▓▓▓▓▓▒▒▒▒██
█▒▒▒▒▒▒████████▒▒▒▓▓▓▓▓▓▓▓▓▒▒▒▒█
█▒▒▒▒▒▒▒▒█████▒▒▒▓▓▓▓▓▓▓▓▓▒▒▒▒██
██▒▒▒▒▒▒█████▒▒▒▒▓▓▓▓▓▓▓▓▒▒▒███
 ██▒▒▒▒▒███▒██▒▒▒▒▓▓▓▓▓▒▒▒▒██
  ███████▒▒▒▒██▒▒▒▒▒▒▒▒▒████
      █▒▒▒▒▒▒▒██████████
      ██▒▒▒▒▒▒▒██
       ██▒▒▒▒▒▒██
        ██▒▒▒▒██
         ██████


we r ________________##_________##
_______________###*_______*###
___________.*#####_________#####*.
__________*######__________######*
________*#######____________#######*
_______*########.__________.########*
______*#########.__________.#########*
______*######@###*_______*###@######*
_____*#########*###____###*#########*
____*##########*__*####*__*##########*
__*###########_____*_*______###########*
_############_______________############
*##*#########____FRIENDS ____#########*##*
*_____########______________########_____*
_______#######______________#######
________*######____________######*
_________*#####*__________*#####*
___________*####*________*####*
_____________*####______####*
_______________*##*____*##*
_________________*##__# #*
__________________*####*
_________________.######.
_______________.#########*
____ _________.###########*
_____________.####*__*######


_______####___####___####_SSS'_____########
_______####___####___####_'SSSSSs,____####
____,__####___####___####____""SSSs___####
__,#######"___"#########"__SsssSSSs___####
___"#####'_____"#######"__'SSSSSS"_____####

_####,____,####'
__"###,__,####'
___"####.####'_____,,,,,,,,,,,
____"######"____,########,,___####____,####
______####_____#####""####,__####____####
______####____,####____####_,####____####
______####____,###,____####__,####___####
______####_____'####,,####'____'####,,####
______####_______"######"______"######"

____ xxxxxxxx________xxxxxxxx T
____xxxxxxxxxx______xxxxxxxxxxx H
___xxxxxxxxxxxxx___xxxxxxxxxxxxx A
___xxxxxxxxxxxxxx_xxxxxxxxxxxxxx N
___xxxxxxxxxxxxxxxxxxxxxxxxxxxxx K
____xxxxxxxxxxxxxxxxxxxxxxxxxxxx S
_____xxxxxxxxxxxxxxxxxxxxxxxxxx
______xxxxxxxxxxxxxxxxxxxxxxx
_________xxxxxxxxxxxxxxxxxx F
___________xxxxxxxxxxxxx O
_____________xxxxxxxxx R
______________xxxxxx
_______________xxxx
_______________xxx B
______________xx E
_____________x I
___________x N
________xx G
______xxx
_____xxxx
___xxxxxx M
___xxxxxxx Y
____xxxxxxxx
______xxxxxxxx
________xxxxxxx F
_________xxxxxx R
_________xxxxxx I
________xxxxx E
_____xxxxxx N
____xxxx D
@@@______@@
@@@@_____@@
@@_@@____@@
@@__@@___@@
@@___@@__@@
@@____@@_@@
@@_____@@@@
@@______@@@

@@@@@@@@
___@@
___@@
___@@
___@@
___@@
@@@@@@@@

_____@@@@@@@@
___@@@@@@
_@@@@@@
@@@@@@
_@@@@@@
___@@@@@@
_____@@@@@@@@

@@@@@@@
@@
@@
@@@@@@@
@@
@@
@@@@@@@

______@@@@@@
___@@@@@
_@@@@
@@@@
_@@@@
___@@@@@
______@@@@@@

___@@@@@@@@@
_@@@_______@@@
@@@_________@@@
@@@_________@@@
@@@_________@@@
_@@@_______@@@
___@@@@@@@@@

___@@@@@@@@@
_@@@_______@@@
@@@_________@@@
@@@_________@@@
@@@_________@@@
_@@@_______@@@
___@@@@@@@@@

@@
@@
@@
@@
@@
@@@@@@@

¶¶¶¶¶¶
¶¶
¶¶¶¶¶
¶¶¶¶¶ aithful…
¶¶
¶¶

¶¶¶¶¶¶
¶¶___¶¶
¶¶___¶¶
¶¶¶¶¶¶
¶¶¶¶¶ espectful…
¶¶__¶¶
¶¶___¶¶

¶¶
¶¶
¶¶
¶¶ ntelligent…
¶¶
¶¶

¶¶¶¶¶¶
¶¶
¶¶¶¶¶ verlasting or loyal…
¶¶
¶¶¶¶¶¶

¶¶__¶¶
¶¶¶_¶¶
¶¶¶¶¶¶
¶¶¶¶¶¶ aughty…and
¶¶_¶¶¶
¶¶__¶¶

¶¶¶¶¶
¶¶¶¶¶¶
¶¶__¶¶¶
¶¶___¶¶earest of all…
¶¶__¶¶¶
¶¶¶¶¶¶
¶¶¶¶¶

█████████████████████████████████████
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
₪┼██┼┼┼┼██┼████┼┼┼███┼┼┼████┼██┼┼█┼┼₪
₪┼██┼┼┼┼██┼█┼┼┼█┼█┼┼┼█┼█┼┼┼┼┼██┼█┼┼┼₪
₪┼██┼┼┼┼██┼█████┼█┼┼┼█┼█┼┼┼┼┼███┼┼┼┼₪
₪┼██┼┼┼┼██┼█┼█┼┼┼█┼┼┼█┼█┼┼┼┼┼██┼█┼┼┼₪
₪┼██┼┼┼┼██┼█┼┼█┼┼█┼┼┼█┼█┼┼┼┼┼██┼┼█┼┼₪
₪┼┼██████┼┼█┼┼┼█┼┼███┼┼┼████┼██┼┼┼█┼₪
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
█████████████████████████████████████
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$'`$$$$$$$$$%`_$$$$$$$$$$$$$
$$$$$$$$$$__$$$$$$$$%__$$$$$$$$$$$$$$$
$$$$$$$$$$$__'$/_/_`$'_$$$$$$$$$$$$$
$$$$$$$$$$$$._i__i__/!_;$$$$$$$$$$$$
$$$$$$$$$$$$$.--'--'___$$$$$$$$$$$$$
$$$$$$^^$$$$$'_______J$$$$$$$$$$$$$$$
$$$$$$$___~""___`.___.$$$$$$$$$$$$$$$
$$$$$$$$$e,______;__.$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$.'___$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$.____$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$_____$$$$$$$$$$$$$$$


LANGUAGE OF FRIENDSHIP ♥
          ♥     ♥ A Always Funny

    ♥    ♥ B Beautiful Personality
C Common Interests
  D Delightfully Entertaining    
   .((`'-"`""-'''))E Exciting Person
   -)      (F Fashionable
   / -'(o _ o) \G Good Taste
   \  -( 0 )  /  “H Happy Times Together
  __'-....._'='_...-'__ I Intelligent Person
 -/`;♥'♥'♥ ♥'♥'♥;`\J Jolly Laughter
 -\_))  ''♥''  ((_/K Kind
  ♥.       -.♥L Listens Well
  -'♥.   ♥  -.♥' M Makes Jokes
  -/-'♥.    ♥'-\N Never Mean or Cruel
  _\__\'♥. .♥'/_/_O Original
 -(((___)_'♥'_(___)))♥ P People Person
Q Quality Time ♥
R Real Person
*´¨) S Secret Keeper
¸.•´¸.•*´¨) ¸.•*¨) T Terrific Sense of Humor
(¸.•´ (¸.•` *U Understanding ♥!
♥♥♥ V Very Special
♥♥♥ W Works Hard ♥♥♥
♥♥♥ X Xciting Person ♥♥♥
♥♥♥ Y You Are The Best ♥♥♥

__♥♥_♥♥
_♥♥___♥♥
_♥♥___♥♥_________♥♥♥♥
_♥♥___♥♥_______♥♥___♥♥♥♥
_♥♥__♥♥_______♥___♥♥___♥♥
__♥♥__♥______♥__♥♥__♥♥♥__♥♥
___♥♥__♥____♥__♥♥_____♥♥__♥
____♥♥_♥♥__♥♥_♥♥________♥♥
____♥♥___♥♥__♥♥
___♥___________♥
__♥_____________♥
_♥____♥_____♥____♥
_♥____/___@\_____♥
_♥_____/____/____♥
___♥_____W_____♥
_____♥♥_____♥♥
_______♥♥♥♥♥


.......,-.______________,=========,
......[|..)_____________)#######((_
....../===============..-..___,--".._\
....."-._,__,____["RelOading]_\.####/
......................\...(...).)...).####O##(
........................\..\____/,..#######\
.........................`===="....\#######\
...........................................\#######\
.............................................)##O####|
.............................................)..####__,"
..............................................`..--."."

₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪
₪┼┼████┼███┼█┼┼█┼█┼┼█┼█████┼┼₪
₪┼┼█┼┼█┼█┼█┼█┼█┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼█┼┼█┼█┼█┼██┼┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼█┼┼█┼█┼┼┼█┼█┼┼█┼┼█┼┼┼█┼┼┼┼₪
₪┼┼████┼█┼┼┼█┼┼█┼████┼┼┼█┼┼┼┼₪
₪┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼₪



₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω
○┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼○
●┼██┼┼┼██┼┼█┼┼┼█┼┼█████┼┼█┼┼█┼┼█┼┼┼●
○┼█┼█┼█┼█┼┼█┼┼┼█┼┼██┼┼┼┼┼┼┼┼█┼█┼┼┼┼○
●┼█┼┼█┼┼█┼┼█┼┼┼█┼┼█████┼┼█┼┼██┼┼┼┼┼●
○┼█┼┼┼┼┼█┼┼█┼┼┼█┼┼┼┼┼██┼┼█┼┼█┼█┼┼┼┼○
●┼█┼┼┼┼┼█┼┼█████┼┼█████┼┼█┼┼█┼┼█┼┼┼●
○┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼○
₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω₪₪Ω₪Ω


...........|/|/|/|/|/
..........(^O.O^)
..........(...(_)...)
............\..--../_----->
........./¯¯Y¯¯\.\
.........|....|.......\..\
.........|._.\_.....|\_.\
..........\__\......|...\..\
......(¯¯¯\...\_|/¯¯\__\_________oooooo
........)===ºººº====0000=========)
......(____/¯¯¯\__/
........./..../.........\...\
..__./._/.............\._.\__
(____ /.............(_____)


`````````````)||(
´´´´´´´´´´´´\´=´/
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´´´´|!!|
´´´´´´´´´´)~~)||(~~(
´´´´´´´¨´/´´´´||||´´´\
´´´´´´´´)´´´´´||||´´´´(
´´´´´´´(/´´´´´||||´´´´\)
´´´´´´´´/´´/´´)´´(´´\´´\
´´´´´´´´\´´´´((!!))´´´´/
´´´´´´´´´\´´((*()*))´´/
´´´´´´´´´)´´´´(!!)´``(
´´´´´´´´´/´´´´´´~´```\
´´´´´´´´/´´´´||||||´```\
´´´´´´´/´´´´´||||||´´´´´\
´´´´´´(\(´´´´´´´´´´´´´´)/)
´´´´´´´\(´´´======´´´)/

´´´´´´´´´´´´´´´´´´´´o¶$$$$$$$$$$$$$$$$$$$$¶Ã¸
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶¶
´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶$$$$¶¶¶¶¶¶¶¶¶¶
´´´´´´´´´1øø¶7´´´´´´7¶$$$$¶¶¶¶¶$$$¶¶¶¶¶¶¶¶¶¶
´´´´´1¶¶¶¶¶¶¶¶¶¶¶¢´´´¶¶$$$$¶¶$$¶¶$$¶¶¶¶¶¶¶¶¶
´´´´¶¶¶¶¶$¶¶¶¶¶¶¶¶1´´¶¶¶$$$$$$$$$$$$¶¶¶¶¶¶$¶
´´¶¶¶¶$$$$$$$$øø¶¶¶¶´´´¶¶$$$$$$$$$$$$$$$¶$¶¶
´¶¶¶¶¶$$$$$$¶$$$$$¶¶¶´´¶¶$$$$$$$$$$$$$$$$$$¶
1¶¶¶$$$¶¶¶¶¶¶¶$$$$¶¶¶$´¶¶¶¶$$$$$$$¶¶¶¶¶$$$$¶
¶¶¶¶$$$¶$$$$¶$$$¶¶¶¶¶¶¶¶¢¶¶¶¶$¶¶¶¶¶$øøøøøøøø
¶¶¶$$$$¶$$$$¶$$$$$$$$$$¶´´o¶¶¶¶¶¶¶Ã¸Ã¸$$$$$¶¶¶
¶¶¶¶$$$¶¶$¶¶¶¶$$$$$$$$¶¶¶´´´¶¶¶7´$$$¶$¶¶$$$¶
´¶¶¶$$$$$$¶$$¶$$$$$$$$$¶¶´´´´´´´¢¶¶$$$$$$$$¶
´¶¶¶¶¶$ø$$¶$$$$$$$$$$$$$¶¶´´oo´´¶¶$$$¶$$$$$$
´´¶¶¶¶¶$$$$$¶¶¶¶¶¶¶$$$¶¶¶¶¶´7´7¶¶$$$$$$$$$$$
´´´´¶¶Ã¸Ã¸Ã¸$øøø$¶¶$$$¶¶¶¶¶¶¢´´´¶¶¶¶$¶¶$$$$$$$$
´´´´Ã¸¶$$øø$$$øø¶¶$$$¶¶o´´´´´¶¶¶$$$$$$$$$$$$¶
´´´´´¶¶$$ø$ø$$ø$¶¶¶¶¶Ã¸´´´´¢¶¶¶$$$$$$$$$$$¶¶$
´´´´´o¶¶$ø$$$øøø$¶¶¶¶´´´Ã¸¶¶¶$$$$$$$$$$$$$¶$$
´´´´´´¶¶¶$$$$øø$ø¶¶¶¶´¶¶¶¶$ø$$$$$¶¶¶$$$$¶$$$


+++++++++++▄██▄
++▄██▄+++▄██████▄+++▄██▄
+██████+██████████+██████
+████████████████████████
+███████ KEEP SMILING ██████
++██████████████████████
+++████████████████████
+++++████████████████
+++++++████████████
++++++++++++██
++▄███▄+++++██+++++▄███▄
+███████++++██++++███████
++███████+++██+++███████
++++██████++██++██████
++++++█████+██+█████
++++++++██████████

_+++__________LIFE!!!_____________
_+88________ROCK_ON!!!____________
_+880_____________________________
_++88_____________________________
_++88_____________________________
__+880_________________________++_
__+888________________________+88_
__++880______________________+88__
__++888_____+++88__________+++8___
__++8888__+++8880++88____+++88____
__+++8888+++8880++8888__++888_____
___++888++8888+++888888++888______
___++88++8888++8888888++888_______
___++++++888888888888888888_______
____++++++88888888888888888_______
____++++++++000888888888888_______
_____+++++++000088888888888_______
______+++++++00088888888888_______
_______+++++++088888888888________
_______+++++++088888888888________
________+++++++8888888888_________
________+++++++0088888888_________
________++++++0088888888__________
________+++++0008888888___________
________############______________
________############___________

*********.--,_
********['****'\.
*********\*******`''|
*********|*********,]
**********`._******].
************|*****\
**********_/*******-'\
*********,'**********,'
*******_/'**********\*********************,....__
**|--''**************'-;__********|\*****/******.,'
***\**********************`--.__,'_*'----*****,-'
***`\*****************************\`-'\__****,|
,--;/*******OUT OF THE 100 CRORE*/*****.|*,/
\__***U R MY BESTTEST FRIEND *******'|****/**/*
**./**_-,*************************_|***
**\__/*/************************,/********"
*******|**********************_/
*******|********************,/
*******\*******************/
********|**************/.-'
*********\***********_/
**********|*********/
***********|********|
******.****|********|
******;*****\*******/
******'******|*****|
*************\****_|
**************\_,/ B IN TOUCH

FRIENDSHIP_..._ ..._(... (  ...).._
  (_....__..._) _(.. (  ...)
  /(_...._)(_...._..._)\
  / / / / | \ \  \
/ /  /  /  | \  \  \
♥ ♥    ♥  ♥ ♥   ♥    ♥ 
♥   ♥ ♥   ♥ ♥ ♥ ♥
♥ ♥   ♥   ♥    ♥ ♥ ♥   ♥
♥   ♥   ♥  ♥   ♥ ♥
♥  ♥    ♥   ♥ ♥ ♥   ♥
♥   ♥ ♥   ♥   ♥   ♥   ♥
♥   ♥   ♥   ♥    ♥   ♥  ♥  
´´´, •♥♪♥♪♥♪♥♪♥♥♪♥♪♥♪♥♪♥♪♥•
´´´¢ /Λ\\\\\\\\\\\\\\\\♥♪♥♥♪♥♥♪♥♪♥♥♪♥♪♥•
´´¢ /.....\\\\\\\\\\\\\\\\♥♪♥♪♥♥♪♥♪♥♥♪♥♪♥♪♥•
´¢ / ๑۩ ๑_\\\\\\\\\\\\\\\\♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥•
¢/¨à¹‘۩۞۩๑_\\\\\\\\\\\\\\\\´♪♥♪♥♪♥♥♪♥♪♥♪♥♪♥♪♥
¨▓¨.♪♥♥♪.▓♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥♪♥•|||||
¨▓¨.♪♥♥♪.▓¨★★★★★¨¨¨¨¨¨¨¨¨★★★★★|||
¨▓¨.♪♥♥♪.▓¨★★★★★¨¨¨¨¨¨¨¨¨★★★★★|||
¨▓¨.♪♥♥♪.▓••••••••••••••••••••
¨♥♥======♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥

•.¸¸.•♥´¨`♥•.¸Some friends are like a Flower•.¸¸.•♥´¨`♥•.¸
and when they finally bloom•.¸¸.•♥´¨`♥•.¸they wilt away•.¸¸.•♥´¨`♥•.¸
in just one day •.¸¸.•♥´¨`♥•.¸and some times just by noon•.¸¸.•♥´¨`♥•.¸
Some friends are like a cloudy day •.¸¸.•♥´¨`♥•.¸
and when the sun's in sight•.¸¸.•♥´¨`♥•.¸
it gets blocked by the grayest cloud

MY DRACULA EAT YOU
______________,___.-'"'=;___,_
______________|\.'-~`-.`-`;/|
______________\.`_'.'~-.`_'./
______________(\`,__=-'__,'/)
____________.-'-.(_d\_/b_).-'-._
_________/'.-'___'_.---._'___'-.`\
_______/'__.'_(=____(_)____=)_'.__`\
______/'__.',__`-.__.-.__.-'__,'.__`\
_____(_____.'.___V_______V__;_'._____)
_____(____|::__`-,__.-.__,-'__::|____)
_____|___/|`:._______________.:'|\___|
_____|__/_|_`:.______________:'_|`\__|
_____|_|__(__:._____________.:__)__|_|
_____|_|___(_`:.____________:'_)___|_|
_____|_|____\_:.___________.:_/____|_|
_____|_|_____\`:._________.:'/_____|_|
_____)_(______`\`:._____.:'/'______)_(
_____(__`)______)_`:._.:'_(______(`__)
_____\__'__)__.'___________`.__(__`__/
______\__'_)_/___.'"```"'.___\_(_`__/
_______`'"`__\__(_________)__/__`"'`
______________`.`._______.'.'___________
_.`___``"""'''--`_)_____(_'--'''"""``___`.
(_(_(___...--'"'`_________`'"'--...___)_)_)

Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.

40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning

Wednesday, October 24, 2007

G talk secret Parameters
There are a few secret parameters you can add to Google Talk and make it function differently. Following is the list of parameters

/nomutex: This allows you to open more than one instance of Google Talk
/autostart: Starts on it's own.
/forcestart: It forces it to start no matter what option was set.
/factoryreset: set settings back to default.
/S upgrade: Used when upgrading Google Talk
/register: This registers Google Talk in the registry, includig GMail Compose method.
/checkupdate: This keeps on checking for newer versions
/plaintextauth: It makes use of plain authentication mechanism instead then Google's GAIA mechanism.
/nogaiaauth: This disables GAIA authentication method. The same as above.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode

Most of them can be ued in the following way

Rifgt- click on the desktop.
Select "New " >>>"Shortcut"
Now browse through "My COMPUTER">>>"C:/">>>>"Program Files">>>>"Google">>"Google Talk">>>"Gtalk.exe"
Now add the extention that you want.
eg:- "......../gtalk.exe"/log.

Emotions!!
Following is the list of emoticons supported by gtalk.All these emotions appears in color in a conversation
:- :-O :-x :-P :-D :O :x :P :D
:) :( :) ;) ;( :'( : ;-) :-( :-)
B- B-O B-x B-P B-D B-) B-( B’( BO Bx BD
& some more

Gmail & talk supports animated emotions and they are
:- :=P :-D ;-) :-( :P :D :) :( ;-) ;) B-)

Chat Bots
A chatbot is a computer program designed to simulate conversation through a variety of methods.
They converse as much like people as their programming allows. If you want to add a chatbot to your Google Talk,
just add the account name as a friend.

Examples

indeedjobs@gmail.com (sends you fresh job postings matching your search query)

Conference Bot

Conference Bot is a bot that links together Google Talk users into one public conference room. This bot has been used as the basis of many bots for Google Talk. You can find a list of the active bots below.
If you want to create your own bot?
visit here



WM_COMMAND codes
Chat Window:
8001 - Start Call
40081 - Start muting microphone
8007 - Stop muting microphone
8008 - Stop Call
8015 - Show Send File dialog
8003 - Email
8013 - Start Voicemail
8008 - Stop Voicemail
8010 - Go off the record (both on and off)
8017 - View past chats
8011 - Block/unblock
Main Window:
40011 - Add Friend
40080 - Enable/Disable all notifications
40065 - Connection Monitor
40080 - Save all settings
40087 - Check for Updates Now
40088 - Inbox
40023 - About
40089 - Check Mail Now
40003 - Settings
40020 - Help
40088 - Email
40002 - Sign out
1404 - Voicemail

Add items to tray menu
Open Google Talk in Resource Hacker.
Go to menu -> 110 -> Click on 0. It will open as text.
Play with the menu items, for example you can add the item
MENUITEM "Settings", 40003, MFT_STRING, MFS_ENABLED
Click 'compile script'.
Close all instances of Google Talk!
Click File -> Save.


User Interface Editing
Open googletalk.exe in Resource Hacker.
Expand the Bitmap tree.
Save bitmaps 139, 5001-5104.
Edit the bitmaps in your image editor of choice to make them the color(s) you like.
Replace the original bitmaps with your edited bitmaps in Resource Hacker (Action > Replace Bitmap).
Save and try it out!.


Change Language
To change the language of Google Talk you will need to:

1.Open resource hacker.
2.Choose the menu: file, open.
3.Open the file c:\program files\google\google talk\googletalk.exe.
4.Now you will see a treeview on the left.
5.Double click on dialog.
6.Double click on 130.
7.Click on 0.
8.You will see a window and a bunch of text like 'CONTROL "Password:", 1003, STATIC'...
9.Change the text to another language, for example: 'CONTROL "Wachtwoord:", 1003, STATIC'...
10.Click 'Compile Script'.
11.Do this for all the dialogs.
12.Double click on 'String Table' in the treeview.
13.Click on 36.
14.Click on 0.
15.You will see a bunch of text like '567, "encountered an internal error'...
16.Change the text to another language, for example: '567, "er is een interne fout voorgekomen'...
17.Click 'Compile Script'.
18.Do this for all the string tables.
19.Make sure Google Talk is closed!!! and then click file, save.
20.When you reopen Google Talk it should now be in another language.


Registry Tweaks
You can edit most settings by opening regedit (start -> regedit),
and navigating to the key HKEY_CURRENT_USER\Software\Google\Google Talk

The "Google/Google Talk" key has several sub-keys that hold different option values:

Accounts: This one has subkeys for each different account that has logged in on the client. These keys have different values that store the username, password and connection options.
Autoupdate: Stores the current version information. When the client checks for updates it compares Google's response with these values. If an update is needed, it will download and update the new version.
Options: This is the most interesting part, where most of the current hacks should be used
Process: Stores the process ID. Probably used by Google Talk to detect if it's already running or not.
HKEY_CURRENT_USER\Software\Google\Google Talk\Options\api

The Google Talk API UID (unique ID).

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\chat_rect

Stores chat windows size/position.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\filter_online

Only show online contacts.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\font_charset

Stores what charset the font is in.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\has_checked_orkut_picture

?

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\logged_in_once

Stores if you've ever signed in.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_handler

Path to default mail application (if not GMail).

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_icon

Path to the default mail application's icon, index is separated with comma.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\mailto_backup_registred

If the mail application is registred.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\presence_note

?

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\theme

Specifys what theme you're using.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\welcome_shown

If the welcome messages are shown or not.

HKEY_CURRENT_USER\Software\Google\Google Talk\Options\window_rect

Stores main windows size/position.



Google Talk Tips and Tricks
Shortcuts

* CTRL + Mousewheel up/down over input textbox: Change the font size of the textbox.
* F9: Open Gmail to send an email to your friend
* F11: Start a call with your friend
* F12: Stop the current call
* ESC: Close the current window
* ALT + ESC: Minimize the current window
* TAB: Switch between multiple chat windows
* CTRL + I: Same as TAB
* SHIFT + TAB: Same as TAB but in reverse order
* CTRL + TAB: Same as SHIFT + TAB
* Windows + ESC: Open Google Talk (if it's minimized, or in the tray)

Conversation Text

* A message can be 32767 characters long.
* Certain smileys are recognized by Google Talk and will be shown in blue.
:-| :-O :-x :-P :-D ;-) :-( :| :O :x :P :D :) :( ;-| ;-O ;-x ;-P ;-D ;-) ;-( ;| ;O ;x ;P ;D ;) ;( B-| B-O B-x B-P B-D B-) B-( B'( BO Bx BD B) B( B) And you can put a ' between the characters to get another one shown in blue.
* To write text in bold, put it between *asteriks*
* To write text in italic, put it between _underscores_
* You can insert special characters like ♥♫☺ with 'Start / Programs / Accessories / System Tools / Character Maps'.

Conversation Window

* Drag a conversation window on top of another and they will dock together.
* Drag a file onto the chat history and you'll send the file to the selected contact.
* When you see a message notification, you can right click it to close it without focusing the conversation window.

Conference Calls

* What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2 instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.

Nickname & Status Message

* You can change your name in the Google Account page.
or To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name.
As a result all of your emails will have that nick as well, there is no way to seperate the two.
* You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.

Contacts

* You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).
* The Gmail account 'user@gmail.com' can't be invited as your friend.

Sound & Video

* It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open
up "Volume Control". Select "Options" and then "Properties". Then check the button
next to "Recording" then click OK. You may also have to change your setting under
Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.

Secret Startup Parameters

* /nomutex: allows you to open more than one instance of Google Talk
* /autostart: when Google Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
* /forcestart: same as /autostart, but forces it to start no matter what option was set.
* /S upgrade: Used when upgrading Google Talk
* /register: registers Google Talk in the registry, includig the GMail Compose method.
* /checkupdate: check for newer versions
* /plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
* /nogaiaauth: disables GAIA authentication method. The same as above.
* /factoryreset: set settings back to default.
* /gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
* /mailto email@host.com: send an email with Gmail
* /diag: start Google Talk in diagnostic mode
* /log: probably has something to do with the diagnostic logging
* /unregister: ?
* /embedding: ?

Others

* If there’s something you think is missing in Google Talk, send off a message to Google.
* There was a hidden game in Google Talk. In the about screen you could see 'play 23 21 13 16 21 19 . 7 1 13 5'. Each number represented a letter. a=1, b=2, c=3 .... When you translated this message it said: 'play wumpus.game'. To play this game you had to invite wumpus.game@gmail.com as a friend. wumpus.game@gmail.com is always offline now. You can still play Hunt the Wumpus here.
* Google Talk can dock into the Google Desktop Sidebar. Doubleclick on the titlebar in the Google Talk main window and it docks as a panel into the GDS and slides out when you click the top of the docked panel..

Google Hacks
Well, the Google’s query syntaxes discussed above can really help people to precise their search and get what they are exactly looking for.

Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.

Index Of

Using “Index of ” syntax to find sites enabled with Index browsing.

A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.

Index of /admin
Index of /passwd
Index of /password
Index of /mail

"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess

"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"

Looking for vulnerable sites or servers using “inurl:” or “allinurl:”.

a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.


b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:

http://www.securiteam.com/exploits/2BUQ4S0SAW.html

c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.

d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.

For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html

Other similar search using “inurl:” or “allinurl:” combined with other syntax


inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php

inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto


Looking for vulnerable sites or servers using “intitle:” or “allintitle:”

a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.

Other similar search using “intitle:” or “allintitle:” combined with other syntax

intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart

allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov



Other interesting Search Queries

To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:

allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php


To search for sites vulnerable to SQL Injection attacks:

allinurl:/privmsg.php
allinurl:/privmsg.php