home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1994 #2
/
Monster Media No. 2 (Monster Media)(1994).ISO
/
renegade
/
rghackpf.zip
/
HACKFREE.TXT
< prev
next >
Wrap
Text File
|
1994-06-14
|
3KB
|
75 lines
Step One
Taking out the easy way
The easiest and most simple way to hack any board is through
there archive menu, where you can manipulate and work with
temporary zip files. From here you can activate an ANSi Bomb to
format the Hard drive, or do many other things. One being, making
yourself file with users.dat and users.idx in it. Not a good
thing. With this, they have users, info, passwords, not to mention
yours, and they can do anything. Your at the mercy of the hacker.
Which is not a good thing, so to take out the easiest way, DISABLE
the Archive menu, from all users, and probably co-sysops. Even
your own account should not have access, because all your archive
manipulation can be done in dos.
Step Two
The Secret Jump
This is the secret jump technique used to jump from place to
place. The one way to stop this is to assign Security Levels TO
every menu, and every important commands. Most likely all of the
commands. This prevents this from happening and the unlikely
chance of them jumping to your sysop menu.
Step Three
The Co-Sysop
Make sure you fully trust and know your sysops. They can be
the one who leaks the password, or even hacks the board. Don't
give them access to the menu editor, or Pseudo Dos, as they can
fuck up your HD real easy. Trust them, but still be weary of them.
Step Four
The MCI Codes
MCi codes are Renegades one default. Many things can be done
with MCi manipulation, so for this there is one way to prevent it.
Use my handy batch file included in this. It does not prevent them
from crashing the system, but it does reload it and hang them up.
All safety. It also notifies you. Very important. Very Deadly.
Step Five
Viruses
The struggling hacker might prove to be a real idiot
sometimes. And this might include them uploading a virus. And if
you are unlucky enough to run it. BOOM....so run a virus check on
everything.
Step Six
Sysop Passwords
Make sure sysops use passwords that are 100% original and that
they change them at least every 15 days. That will keep the hacker
from getting these passwords. Especially the sysop password.
Step Seven
QWK System
Several methods of hacking can be done from here. None are
potentially dangerous and the batch file should handle it fine.
Step Eight
End
Well as of now, I can't think of any more, so that's about it.
This is version 1.0B and I will be writing updates as more bugs are
found. As for now, good luck...
Ear
Please contact me on CoD with any questions.
+1(714)282-7644
Handle: Support
Password: Support