home *** CD-ROM | disk | FTP | other *** search
-
-
-
- Documentation for The Nowhere Utilities
- ---------------------------------------
-
-
- Introduction
- ------------
-
- During my time a viral developer, I've quickly discovered many
- operations that are quite useful for creating virii, trojans, and logic
- bombs that DOS and most popular utility programs (PC-Tools, Norton
- Utilities, etc.) either can't do or require too much time to do. Some
- other operations, such as being able to alter the effective size of a
- file, are useful in many non-viral situations. So I developed a set of
- thirteen utilities, presented here, to help the aspiring rogue
- programmer in his quest for electronic mayhem. (Several of these are
- derived from ideas originally used in the now infamous C-Virus.) So
- without further adieu, I give you (drum roll) **The Nowhere
- Utilities**!
-
-
- General notes
- -------------
-
- The following applies to all of the Nowhere Utilities: all will
- give a command summary if "/?" is given as the first parameter; all
- utilities preserve file date, time, and attributes, unless they are
- specifically meant to change them (FIXATTR and FIXTIME in specific);
- all utilities will work on read-only files (they automatically remove
- the attribute if any writing needs to be performed and reset it when
- .COM format for faster load times. All of the utilities were
- finished); and all programs are in the written entirely in Borland C++
- v3.0 using the tiny memory model (needed to create .COM files), and all
- were written by myself, Nowhere Man, with some suggestions and comments
- provided by friends, especially Rigor Mortis, Leeking Virus, and Guido
- Sanchez. Thanks guys. Now, on with the utilities...
-
-
- The utilities and their many uses
- ---------------------------------
-
- Included in this set of utilities are ten separate programs. Below
- is a list of them, as well a short summary of what they do and possible
- uses for them. In addition to the summaries below, running any Nowhere
- Utility with /? as a parameter displays the syntax for the program.
-
-
- CIPHER
- ------
-
- CIPHER is just that: a cipher. Give CIPHER a 32-bit decimal number as a
- key, followed by one or more file names (wildcards allowed), and it
- will encrypt the files. To unencrypt them, run CIPHER again with the
- same key. As you've probably guessed, CIPHER uses an XOR-type
- encryption method, but I've thrown a few modifications in to make it
- harder to crack. Suggested uses: to encrypt things you don't want other
- people to see (duh). I'd advise encrypting any sensitive data that
- could be used against you in court, such as passwords, card numbers,
- and phreaking codes (assuming, of course, you actually keep these
- things in files). When you need these things, simply decipher them.
-
-
-
- Nowhere Utilities v2.0 - 1 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- This way if the feds ever seize your computer while your at work or
- school, there is no data for them to use as evidence during your trial.
- This is also good for encrypting important E-Mail: tell the receiver,
- either over the phone or on a different board, what the key will be.
- Then run CIPHER on the program and use DBGSCRPT (see below) to generate
- a DEBUG script to re-create the file. Do an ASCII upload of the DEBUG
- script. The receive can just run the script through DEBUG, use CIPHER
- to decrypt it, and the read the message, run the file, whatever. Great
- for use on untrustworthy or suspicious boards, or places where the
- sysop likes to snoop through other peoples' private mail.
-
-
- CRYPTCOM
- --------
-
- CRYPTCOM is handy utility that allows you to encrypt .COM files
- but still leave them executable. To invoke CRYPTCOM, just type
- "CRYPTCOM" followed by one or more files that you wish to protect;
- wildcards are allowed, and the ".COM" extension is assumed if none is
- given. They key is chosen by CRYPTCOM automatically, so you don't need
- to supply one. This program works by encrypting your .COM program and
- adding some decryption code to the end. The file decrypts itself in RAM
- at run-time, leaving the actual file unaltered with each execution of
- the encrypted program. Suggested use: encrypting virii to slip past
- virus scanners. It's rather obvious what to do: just run CRYPTCOM on
- the virus. It is now unscannable, and it still runs normally. However,
- just like the PKLITE trick of old, all subsequent infections will
- contain the original virus, so basically, this just gets the virus in
- the front door. Unlike PKLITE, though, no scanner (as of yet, at least)
- can decrypt a CRYPTCOMed file and scan it, so you don't have to worry
- about recent versions of SCAN catching you. (Also see NOLZEXE below for
- another tactic.)
-
-
- DBGSCRPT
- --------
-
- DBGSCRPT creates, as its name suggests, DEBUG scripts. DBGSCRPT
- takes two arguments: the input file and the name of the file to contain
- the script. To re-create the original file from the script, just type
- "DEBUG < (scriptname)" and watch it do it's work. Note that wildcards
- are not allowed by this program, and also note that DEBUG will not
- allow itself to write .EXE files. If you are creating a script from an
- .EXE file, rename it to a different extension before running DBGSCRPT,
- and instruct whomever is receiving the script to change it back to an
- .EXE when DEBUG is done. Suggested uses: creating scripts from binary
- files to include in text files or E-Mail. This way you could post your
- latest creation on your favorite virus board without having to upload
- anything and without having to post your valuable source. You can also
- include it in text files you put out (magazines, etc.) so you don't
- have to distribute the virus in a separate file; the reader just cuts
- out the script and runs it through DEBUG (40-Hex magazine is fond of
- this technique). Again, no source code needs to change hands. Quite
- useful, in the right situations.
-
-
-
-
-
- Nowhere Utilities v2.0 - 2 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- DECRYPT
- -------
-
- DECRYPT is, as far as I know, a one-of-a-kind utility -- it will
- crack almost all 8-bit and many 16-bit encryption schemes. There's only
- one catch: you must know at least five consecutive characters in the
- original (unencrypted) data. This string is passed as the first
- parameter. The remaining arguments are the names of files to be
- decrypted, wildcards allowed. DECRYPT will go through each file given,
- attempting to decrypt it with a special proprietary algorithm which
- will crack most standard 8- and 16-bit encryption schemes in under ten
- seconds. If the file can be decrypted then DECRYPT will tell you which
- encryption method and what key was used, and a file with the same base
- name as the original and an extension of .DEC will be created
- containing the decrypted contents of the file. Sometimes DECRYPT will
- give a false positive, an invalid decryption; this is a normal
- side-effect of the ultra-quick algorithm it uses (if you do get a false
- positive, chances are the file couldn't be decrypted anyway).
- DECRYPT has many uses. It's great for decrypting a virus attached
- to a program, so long as you know a string in the virus ("*.COM" is a
- good bet), or can be used to view those annoying encrypted data files
- that too many programs seem to come with.
- Please note that not every file can be decrypted; DECRYPT will
- break the most common algorithms used in most low-security applications
- (ie: adding/subtracting a constant, XORing by a constant, etc.). Also
- make sure that the file you're dealing with is indeed encrypted. Not
- every unreadable file is encoded, and unless you're pretty sure your
- just wasting your time (albeit very little of it). Files must be under
- 32k for DECRYPT to work (DECRYPT loads the entire file into memory for
- speed, so larger files will overflow the buffer). Outside of these
- restrictions, DECRYPT is a valuable tool for any aspiring hacker.
-
-
- FAKEFILE
- --------
-
- Picture this: you've just written up a great trojan or virus and
- you've placed it into an executable file (or REPLACEd one). What's the
- problem? Well, wouldn't you be suspicious if you downloaded a ZIP file
- that was supposed to be a "Great shareware text editor" and all that
- was in it was one lousy 5k .EXE? Ignoring the problem of documentation,
- FAKEFILE is a great way to create phoney data files to go with your
- virii and trojans. Now instead of renaming .ROL files to .DATs (as I've
- observed in one lame trojan), you can make your own. FAKEFILE takes two
- or more arguments. The first one is the size of the dummy file. Here
- you can either give a fixed number, or use the -r switch, which will
- make each file a random length between 100 and 33767 bytes. The
- remaining parameters are the names of the fake files to create.
- Wildcards are not allowed (duh). In addition to filling the files with
- random bullshit, if FAKEFILE recognizes the extension on your filename
- (.EXE, .GIF, .OBJ, etc.) then it will add a fake header to the file to
- make it "legit" to programs that read those types of files. For
- example, if you typed "FAKEFILE 30345 HOTSEX.GIF" FAKEFILE would create
- a 30345-byte file containing the header "GIF87a" and 30339 bytes of
- random data. Of course when you go to view the "GIF" you'll get
- errors... Another tip: avoid "even" file sizes for most files. It may
- seem suspicious, depending on the nature of the files.
-
-
- Nowhere Utilities v2.0 - 3 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- As you might have guessed by now, there is another, and in my
- .GIFs, .ROLs, even whole utilities, .EXE and all, and upload them
- opinion, very lame, use for this utility. You can create fake to boards
- for extra file points. I HIGHLY DISCOURAGE THIS. If everyone went
- around doing this then you'd spend most of your time downloading crap,
- and BBSing would die. Of course this is a great use if your dealing
- with a real lame board; upload tons of dummy games and .GIFs under
- several user names. The other users will get pissed at the sysop, and
- his board will go down in no time. PLEASE ONLY DO THIS TO LAMERS; good
- boards deserve to live. Again, heed my warning and don't be an asshole;
- if you ever do download a wasteful file on any board, please report it
- to the sysop. If you are a sysop and are reading this, I'd encourage
- you to blacklist anyone who does such a stupid thing.
-
-
- FAKEWARE
- --------
-
- If you're like me, then lame k-rad k00l "ELITE" boards probably
- annoy the shit out of you. What better way to say "I hate you" then
- with a virus, the gift that keeps on giving... Unfortunately, some of
- these people actually know that games have more than one file, etc. and
- won't run suspicious looking programs. FAKEWARE takes care of all of
- this. With one command you can create a realistic looking .ZIP of a
- "0-30 day ware" containing a virus or trojan of your choice. First,
- prepare the virus or trojan by RESIZEing or REPLACEing it. Then just
- execute "FAKEWARE (trojan/virus name)." In a minute or two FAKEWARE
- will have generated a completely bogus game, right down to the .ZIP
- comment.
- FAKEWARE creates a fake title for your game, then creates between
- five and twenty-five fake data files of random length and content (and
- compressibility!). It includes your virus or trojan under as the main
- .EXE, and even generates a fake .NFO file from either RAZOR, INC, or
- TDT, complete with program description, cracking information, and
- greets to all those cool pir8 doodz you know and love. FAKEWARE
- executes PKZIP (which must be in the current directory or in your PATH
- in order for FAKEWARE to work correctly), and adds a .ZIP comment, an
- ad for a completely fake, yet very realistic, warez board. All
- temporary file are deleted, of course. Now just upload the .ZIP as the
- game that FAKEWARE tells you and you're all set; all you have to do now
- is get the loser to run it...
- FAKWARE will also generate a fake .EXE if no argument is given,
- allowing you to send up tons of bogus wares to a stupid board to
- discredit the sysop and create chaos. Unlike some other utilities, I
- couldn't care less if you misuse it; I never did like warez boards
- anyway...
-
-
- FIXATTR
- -------
-
- This program lets you alter the attributes of files. Quite simple
- and very legitimate. You can use either "+", "-", or "=", followed by
- one or more of the following letters: A, H, R, and S. Using a plus sign
- will add the specified attributes to the files' current attributes; a
- minus sign will remove those attributes, if set; and the equals sign
-
-
-
- Nowhere Utilities v2.0 - 4 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- will set the files' attributes to the ones given, removing any existing
- ones. The letters above stand for (A)rchive, (H)idden, (R)ead-only, and
- (S)ystem, respectively. Attributes for subdirectories cannot be
- modified, but wildcards and multiple file names may be given after the
- attributes. This is essentially the same as the DOS 5.0 or 4DOS ATTRIB
- command, but it is usable by anyone, even those without DOS 5.0 or
- 4DOS. Suggested uses: hiding and/or write-protecting sensitive files
- (or unhiding those pesky hidden files that some games still use), or
- whatever else you can think of that requires attribute changes. This
- utility is pretty basic, so I'm sure you'll think of other applications
- for it.
-
-
- FIXTIME
- -------
-
- FIXTIME is a basic "touch" utility, similar to those found under
- UNIX and those that come with compilers such as Turbo C and Microsoft C
- (although FIXTIME is superior to most compiler "touch" programs, as it
- lets you set the file time to anything; more on that later). FIXTIME
- can either take zero, one, or two arguments, followed by one or more
- file names (wildcards allowed). If no other arguments are given besides
- the file name(s), FIXTIME will set the time stamp of any and all
- matching files to the current system time and date (which may not be
- correct, if you're one of those people too lazy to set your system
- clock). If a time is given, it must precede the file name(s) and be in
- the standard 24- hour format (hh:mm:ss). All applicable files will have
- their times set to that time; if no date is give then the system date
- will be used. If a date is specified, it must precede the file name(s)
- and be in the American date format (MM-DD-YY or MM/DD/YY, where the
- year is any year between 1980 and 1999). As usual, no other aspects of
- the file (size, attributes, etc.) are changed.
- Suggested uses: to alter the time on documents that are past due
- :-), to fix the date/time stamp of files to which you have added a
- virus (though good virii always preserve the file's date and time), or
- to change the date for any other purpose you can come up with (to
- prevent someone from telling when you've written something, to change
- the file times of files you've edited/modified, etc.). None of these
- ideas really needs much elaboration; just be sure that if you're going
- to want to change a file back that you remember to write down the
- original time and date first...
-
-
- NOLZEXE
- -------
-
- Don't you just hate it how executable-file compressors always
- leave an annoying signature to show they've been used? Until now the
- only way to remove these signatures to prevent people from UNLZEXEing
- or PKLITE -Xing your program was to go in by hand with DEBUG or any
- other hex editor and rip them out. Well, I've come up with this
- handy-dandy utility to automatically destroy these headers for you,
- preventing SCAN from detecting your PKLITEd virii and stopping assholes
- from trying to disassemble or reverse-engineer your code. When invoking
- NOLZEXE, all you must provide as parameters are the names of files you
- wish to protect. Wildcards are allowed, and if no extension is given
-
-
-
- Nowhere Utilities v2.0 - 5 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- then .EXE is assumed (though .COM files are supported, too). NOLZEXE
- will then go through the files and completely cover all compressor
- headers with random bytes; if a file is not compressed nothing will
- happen to it. Versions 0.90 and 0.91 of LZEXE (the only versions
- currently released) and all versions of PKLITE are supported. (If
- anyone out there has found any other executable-file compressors that
- they'd like to see supported in the next version, see below on where to
- contact me.) The files will still execute properly and are otherwise
- unchanged; however no virus scanner, CHK4LZE, or CHK4LITE program will
- pick them out of the crowd. Suggested uses: as mentioned above, to
- remove the headers on LZEXEd and PKLITEd virii to prevent scanning (my
- ever-popular C-Virus used similar techniques), and to stop people from
- disassembling or reverse-engineering your products (use the compressor
- on them and then use NOLZEXE). This is also useful on trojans, as it
- can stop CHK4BMB-type utilities from picking up your damaging code;
- compress the trojan then NOLZEXE it. If your compressor refuses to work
- on the file because it's too small (all to often the case with virii),
- please read my notes about the subject under RESIZE below.
-
-
- REPLACE
- -------
-
- Based upon an idea I had originally used in C-Virus, REPLACE
- performs a great service to trojan- and virus-disseminators everywhere.
- To put it bluntly, it just replaces one file (presumably a legitimate
- one) with another (presumably a nasty one). On a more detailed level,
- what REPLACE does is delete the original file, copy the new file to the
- original's name, then reset the attributes, date, time, and size as
- they were on the original file. Essentially, the new file has become
- the old one. For example, you could "REPLACE LEMMINGS.EXE DIR-2.COM"
- and then distribute "Lemmings" to all of the lame k-rad pir8 boards in
- the area (good pirate boards wouldn't take such an old game to begin
- with). As shown, .COMs may replace .EXEs, and vice-versa, with one
- exception: and .EXE which REPLACEs a .COM must be smaller than 64k, or
- else DOS will give an error when it is executed. Also note that
- REPLACEing a file with a larger one will cause excess bytes in the new
- file to be clipped (ie: if you replace a 1000 byte file with a 2000
- byte one only the first 1000 bytes of the 2000 byte file will be
- copied), so don't try it on executable files.
- To run REPLACE, just provide two arguments, the first being the
- name of the old file and the second the name of the new one, the file
- to be replaced and the replacer, respectively. Wildcards are NOT
- allowed. Also, remember the size warnings in the previous paragraphs to
- avoid embarrassing mistakes (imagine how humiliating it would be to
- upload a trojan to Ross Greenberg's shitty BBS and have it get an
- error!). Have fun with this one.
-
-
- RESIZE
- ------
-
- RESIZE is a file resizer: it lets you alter the size of an
- existing file, either making it larger or smaller. RESIZE may be
- invoked in several different ways. If the first parameter is "-r" then
- random byte filling is used (if the file size is being increased then
-
-
-
- Nowhere Utilities v2.0 - 6 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- the extra space is padded with random bytes); otherwise blanks are used
- as padding. The other parameter, besides file name(s) is the size
- variation. This may be either relative or absolute. To modify a file's
- size absolutely, you just give a number; the file's size is then
- changed to that number. If you want the size to be relative, then you
- give the size of the change (in bytes), preceded by either a "+" (to
- make the file bigger) or "-" (to decrease it by the same amount). The
- remaining parameters are file names, wildcards allowed. Note that if
- you elect to make a file smaller, then the excess data will be forever
- lost, so don't go around trimming things without good cause thinking
- that you'll be saving disk space or something idiotic like that. If you
- do you'll deserve it.
- You might wonder "Why the -r option?" Well, it's there because if
- you try to PKZIP or otherwise compress a RESIZEd file that was
- blank-padded, then it will compress down to its original size (less
- whatever it would have gone down to had it not been RESIZEd). If you
- saw a 1000000 byte file in an archive being compress to 2000 bytes, I
- think you'd be just a bit suspicious (though I know at least one
- (ex-)sysop who wasn't, hehehe). With the random bytes the compressor is
- unable to pack that area much, keeping the illusion that the file is
- larger than it really is. Also, in case you were wondering, RESIZEd
- executable files will still run normally, RESIZEd .GIFs will still view
- properly, and so on. Suggested uses for RESIZE: to increase the size of
- virii and trojans and upload them to boards (renamed, or course); after
- all, would you download a 500-byte program labeled "really awesome
- virtual reality simulator?" You would if it were one megabyte, though.
- As I stated before, DO NOT ABUSE THIS PROGRAM AND UPLOAD INFLATED FILES
- TO GOOD BOARDS FOR CREDIT. If you want to do it to a lamer, go ahead,
- but like I said before, if everyone RESIZEd their files then everyone
- would be wasting time download tiny, useless, lame programs made out to
- be cool by their large size. Don't be lame and abuse these utilities;
- they were meant for causing mayhem, but don't inflict it on your
- friends.
- RESIZE has a few other uses. You can RESIZE (normally) a file
- which PKLITE or LZEXE refuses to compress; it will end up no larger,
- and this method sure beats the old UNDELETE procedure.
- An interesting side note. My friend Leeking Virus has discovered
- another use for this versatile utility. Here's a way he came up with
- (and tested, I might add) for crashing boards. When you go to upload
- (or even download, depending on the software), most BBSs will tell you
- how much space is free on the hard disk. What you do is RESIZE a small
- file to take up at least that much space and then upload it while no
- one's around (naturally boards with two gigabyte hard disks are pretty
- much immune to this, as your hard disk must be large enough to hold the
- RESIZEd file). You must be sure to NOT use the -r option, and NOT to
- PKZIP it. Unless you want to totally waste time, be sure to use JMODEM
- or another protocol with data compression. The file will still take
- what it originally would to download, but it will swell up on the
- receiver's hard disk to fill it up. Hehehe. On Telegard boards it has
- the added advantage of locking up the board; Telegard tries to log the
- fact that the disk is full to an error file, but since there's no room,
- it can't create the file, so it tries, to log that error, and so on,
- trapping the board in an infinite loop. Other BBS software might do
- this too, but so far Telegard is the only system that's been tested. At
-
-
-
- Nowhere Utilities v2.0 - 7 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- the very least there'll be no more uploads that day. Another
- possibility is to RESIZE -r a file to the size of the target hard disk,
- give it the read-only attribute, ZIP it up and give it to a board that
- automatically PKUNZIPs files for scanning. Similar effects...
-
-
- USER2TXT
- --------
-
- If you're into hacking boards, I'm sure you know the most prized
- possession you can take is the user list. The information in that file
- can get you accounts on many other boards all over the country (if the
- people are stupid enough to use the same password on every board they
- call, which many people are). But how do you take a user list, in
- binary format, and turn it into a readable form? If you have Telegard
- (or whatever other BBS it comes from) you could just copy it to your
- GFILES directory, use the (U) option, and flip through the users one by
- one, writing down the passwords and phone numbers. But what if you
- don't have the time, or you don't have Telegard, or you'd like a nice
- file for on-line reference from your comm program? USER2TXT fills that
- gap.
- To user USER2TXT, give it two parameters, the first being the name
- of the Telegard v2.5/v2.7 or X-Ot-Icks v3.8 user list (almost always
- USER.LST), and the second being the name of the output file. USER2TXT
- will convert the binary data in the first file to readable ASCII. The
- second file will contain each user's name, real name, password, and
- phone number. The first user will always be the sysop. This program
- really has only one use, which I've already described above. This is a
- simple utility, but one that you'll find very useful.
-
-
- WIPE
- ----
-
- WIPE is a little utility I wrote to totally wipe a file off of a
- disk. You run WIPE with one or more file names (wildcards allowed),
- which are the files to wipe. The files are unrecoverable by normal
- means (UNDELETE, QU, DISKEDIT, etc.), so be VERY careful with this; it
- DOES NOT prompt you to verify your choice. This was done because I
- figured if you were ever in the situation to need this program (a bust,
- etc.) you would not want to be slowed down constantly hitting "Y." I'd
- also advise renaming this program, as it's only a matter of time before
- some lamer develops an ANSI bomb that runs it. Suggested uses for this
- program: only one, really, and that's to destroy sensitive information
- in case of a bust. If I were you, I'd write a batch file called
- BUST.BAT, or something like that, that would automatically WIPE all of
- the files you needed destroyed.
- This program is much faster than Norton's DISKWIPE or WIPEFILE
- because mine doesn't need to meet some silly military standard. I'm
- sure if someone were REALLY REALLY desperate they could possibly get
- your files back, but they'd need sophisticated equipment that no police
- force would normally have. If you have the time (ie: you've been warned
- the cops are coming for you) then I'd advise using WIPEDISK or another
- military-standard wipe program, but WIPE is much faster in case you
- don't have the time. Like I said, BE VERY CAREFUL WITH IT. Nowhere Man
- and [NuKE] are NOT responsible if you fuck yourself over with this. It
- is only meant for desperate situations.
-
-
- Nowhere Utilities v2.0 - 8 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
-
-
-
-
- Revision Information
- --------------------
-
- Version 2.00 (September 5, 1992)
-
- o DECRYPT, FAKEWARE and USER2TXT programs added.
-
- o Removed a bug in RESIZE that would create huge files if
- you attempted to make a file smaller than it's current
- size (ie: RESIZE -10000 TEST.DAT where TEST.DAT is only
- 5000 bytes long). Thanks to Guido Sanchez.
-
- o Major revisions to FIXTIME. The help message was revised
- to correctly indicate that several filenames can be used
- (v1.00's help message read "FIXTIME [hh:mm:ss [mm-dd-yy]]
- filename," but there should have been ellipses after
- "filename"). I've also changed FIXTIME so that it isn't
- necessary to specify a time in order to change file
- dates. Dates and times are also checked for invalid
- settings (for example, the time "99:99:99").
-
- o CRYPTCOM's decryption routine has been changed, slightly
- increasing its size but making it faster and more
- compatible with certain (picky) programs.
-
- o NOLZEXE now recognizes files compressed with PKLITE
- v1.1x.
-
- o All programs that utilized random numbers have had their
- random-number generation routines updated. This will not
- effect the functioning of the programs.
-
- o Documentation cleaned up. Many spelling/grammatical
- errors were fixed, the layout was changed, and several
- inaccuracies (including a reference to a non-existent
- paragraph) were corrected.
-
-
- Version 1.00 (January 25, 1992)
-
- o Initial release.
-
-
- Closing comments
- ----------------
-
- As you can see, the Nowhere Utilities are very powerful, but
- they also can be abused -- DON'T. I intended for the entire virus
- community to benefit from these, not for some losers to abuse them.
- Other than that little warning, I heartily encourage you to experiment
- with the utilities, to use them in new and interesting ways (if you
- find a novel use for a utility, let me know so I can mention it in the
- next version). Enjoy them.
-
-
- Nowhere Utilities v2.0 - 9 - (C) 1992 Nowhere Man and [NuKE]
-
-
-
-
- As usual, greets go out to Rock Steady, Rigor Mortis, Leeking
- Virus and Murdak, all [NuKE] and SCP members and sites, Phalcon/SKISM,
- and all virus-writers everywhere. Thanks to anyone else who I forgot to
- mention; your input into this project is still greatly appreciated,
- even if I do forget a name here and there.
- If anyone has any questions, comments, complaints, or
- suggestions about this or any other fine product from Nowhere Man or
- [NuKE], I can be reached at The Hell Pit and FreeMatrix, both official
- U.S. distribution sites for [NuKE]. I also monitor most Chicago-area
- networks, as well as NuKENet, Swashnet, CyberCrime International, P/S
- Net, and FidoNet; responses to my products may be posted there also.
- Once again, so long, and happy virusing.
-
- -- Nowhere Man, [NuKE] '92
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Nowhere Utilities v2.0 - 10 - (C) 1992 Nowhere Man and [NuKE]
-