-
Correcting System Hang at Startup
If your system hangs about 2 or 3 minutes at startup, where you can't access the Start button or the Taskbar, it may be due to one specific service (Background Intelligent Transfer) running in the background. Microsoft put out a patch for this but it didn't work for me. Here's what you do:
1. Click on Start/Run, type 'msconfig', then click 'OK'.
2. Go to the 'Services' tab, find the 'Background Intelligent Transfer' service, disable it, apply the changes & reboot.
-
Faster startup of Windows XP
If your computer takes a long time to become useable after starting up or logging on, or you want a clean boot of Winodws XP try this,
Click Start > Run > Type "msconfig" > On the Startup tab click Disable All and on the Services tab check the Hide All Microsoft Service box and then click Disable All. Click Restart and Windows XP will restart with only the system services and applications running resulting in a vey fast logon / startup.
N.B This tweak will disable all non-system startup sevices and applications so if you have anything you want to run in the background such as anti virus software do not disable that item.
-
Getting More Processing Power
A clarification is needed on Spongebob's Tweak post for getting more processing power.
"In the Run box, type "Rundll32.exe advapi32.dll,ProcessIdleTasks". This frees up any idle tasks running in the background so that Windows XP can devote its full attention to what you want it to do. For example playing graphic intensive games."
While it DOES free up idle tasks, according to Microsoft, it can take up to 15 minutes to do so. You would not want to run this task before playing a game or using your machine as it will actually cause any tasks waiting for the system to become idle to be performed immediately.
Quote from Microsoft:
"When called from the command line, the ProcessIdleTasks work is done in the background asynchronously. It can take 10 to 15 minutes for idle tasks to complete. Task Manager will report processes running, and the disk will likely be active during this time"
The complete article can be found here:
http://www.microsoft.com/whdc/hwdev/...benchmark.mspx
-
Does this really help? Or is it just an idea? I will try it and see for myself with my other computer!
-
Intensive Registry Care Utilities All-In-One
Includes:
Intensive Registry Care Utilities All-In-One
01- Registry Mechanic v5.0.0.144
02- RegSupreme Professional v1.2.0.35
03- TweakNow RegCleaner Pro v2.5.2
04- Registry First Aid 4.1.0 Build 708
05- RegVac Registry Cleaner 4.02.09
06- Registry repair v1.45
07- Reg Organizer v2.5.0
08- Registry Healer 4.2.0.build.212
09- Registry Crawler v4.5.04
10- Registry cleaner v4.3.780
AIO Bonus eBook:
Microsoft Windows XP Registry Guid
Download: 28.8 MB
http://www.megaupload.com/?d=BRH44M8I
-
if you not sure in Edit your Registry Please Backup First !!!
-
Thank you
This one hell of a good post
Thanks again
-
20 things you didn't know about Windows XP
20 things you didn't know about Windows XP
You've read the reviews and digested the key feature
enhancements and operational changes. Now it's time to
delve a bit deeper and uncover some of Windows XP's
secrets.
1. It boasts how long it can stay up. Whereas previous
versions of Windows were coy about how long they went
between boots, XP is positively proud of its stamina.
Go to the Command Prompt in the Accessories menu from
the All Programs start button option, and then type
'systeminfo'. The computer will produce a lot of
useful info, including the uptime. If you want to keep
these, type 'systeminfo > info.txt'. This creates a
file called info.txt you can look at later with
Notepad. (Professional Edition only).
2. You can delete files immediately, without having
them move to the Recycle Bin first. Go to the Start
menu, select Run... and type 'gpedit.msc'; then select
User Configuration, Administrative Templates, Windows
Components, Windows Explorer and find the Do not move
deleted files to the Recycle Bin setting. Set it.
Poking around in gpedit will reveal a great many
interface and system options, but take care -- some
may stop your computer behaving as you wish.
(Professional Edition only).
3. You can lock your XP workstation with two clicks of
the mouse. Create a new shortcut on your desktop using
a right mouse click, and enter 'rundll32.exe
user32.dll,LockWorkStation' in the location field.
Give the shortcut a name you like. That's it -- just
double click on it and your computer will be locked.
And if that's not easy enough, Windows key + L will do
the same.
4. XP hides some system software you might want to
remove, such as Windows Messenger, but you can tickle
it and make it disgorge everything. Using Notepad or
Edit, edit the text file /windows/inf/sysoc.inf,
search for the word 'hide' and remove it. You can then
go to the Add or Remove Programs in the Control Panel,
select Add/Remove Windows Components and there will be
your prey, exposed and vulnerable.
5. For those skilled in the art of DOS batch files, XP
has a number of interesting new commands. These
include 'eventcreate' and 'eventtriggers' for creating
and watching system events, 'typeperf' for monitoring
performance of various subsystems, and 'schtasks' for
handling scheduled tasks. As usual, typing the command
name followed by /? will give a list of options --
they're all far too baroque to go into here.
6. XP has IP version 6 support -- the next generation
of IP. Unfortunately this is more than your ISP has,
so you can only experiment with this on your LAN. Type
'ipv6 install' into Run... (it's OK, it won't ruin
your existing network setup) and then 'ipv6 /?' at the
command line to find out more. If you don't know what
IPv6 is, don't worry and don't bother.
7. You can at last get rid of tasks on the computer
from the command line by using 'taskkill /pid' and the
task number, or just 'tskill' and the process number.
Find that out by typing 'tasklist', which will also
tell you a lot about what's going on in your system.
8. XP will treat Zip files like folders, which is nice
if you've got a fast machine. On slower machines, you
can make XP leave zip files well alone by typing
'regsvr32 /u zipfldr.dll' at the command line. If you
change your mind later, you can put things back as
they were by typing 'regsvr32 zipfldr.dll'.
9. XP has ClearType -- Microsoft's anti-aliasing font
display technology -- but doesn't have it enabled by
default. It's well worth trying, especially if you
were there for DOS and all those years of staring at a
screen have given you the eyes of an astigmatic bat.
To enable ClearType, right click on the desktop,
select Properties, Appearance, Effects, select
ClearType from the second drop-down menu and enable
the selection. Expect best results on laptop displays.
If you want to use ClearType on the Welcome login
screen as well, set the registry entry
HKEY_USERS/.DEFAULT/Control
Panel/Desktop/FontSmoothingType to 2.
10. You can use Remote Assistance to help a friend
who's using network address translation (NAT) on a
home network, but not automatically. Get your pal to
email you a Remote Assistance invitation and edit the
file. Under the RCTICKET attribute will be a NAT IP
address, like 192.168.1.10. Replace this with your
chum's real IP address -- they can find this out by
going to www.whatismyip.com -- and get them to make
sure that they've got port 3389 open on their firewall
and forwarded to the errant computer.
11. You can run a program as a different user without
logging out and back in again. Right click the icon,
select Run As... and enter the user name and password
you want to use. This only applies for that run. The
trick is particularly useful if you need to have
administrative permissions to install a program, which
many require. Note that you can have some fun by
running programs multiple times on the same system as
different users, but this can have unforeseen effects.
12. Windows XP can be very insistent about you
checking for auto updates, registering a Passport,
using Windows Messenger and so on. After a while, the
nagging goes away, but if you feel you might slip the
bonds of sanity before that point, run Regedit, go to
HKEY_CURRENT_USER/Software/Microsoft/Windows/Current
Version/Explorer/Advanced and create a DWORD value
called EnableBalloonTips with a value of 0.
13. You can start up without needing to enter a user
name or password. Select Run... from the start menu
and type 'control userpasswords2', which will open the
user accounts application. On the Users tab, clear the
box for Users Must Enter A User Name And Password To
Use This Computer, and click on OK. An Automatically
Log On dialog box will appear; enter the user name and
password for the account you want to use.
14. Internet Explorer 6 will automatically delete
temporary files, but only if you tell it to. Start the
browser, select Tools / Internet Options... and
Advanced, go down to the Security area and check the
box to Empty Temporary Internet Files folder when
browser is closed.
15. XP comes with a free Network Activity Light, just
in case you can't see the LEDs twinkle on your network
card. Right click on My Network Places on the desktop,
then select Properties. Right click on the description
for your LAN or dial-up connection, select Properties,
then check the Show icon in notification area when
connected box. You'll now see a tiny network icon on
the right of your task bar that glimmers nicely during
network traffic.
16. The Start Menu can be leisurely when it decides to
appear, but you can speed things along by changing the
registry entry HKEY_CURRENT_USER/Control
Panel/Desktop/MenuShowDelay from the default 400 to
something a little snappier. Like 0.
17. You can rename loads of files at once in Windows
Explorer. Highlight a set of files in a window, then
right click on one and rename it. All the other files
will be renamed to that name, with individual numbers
in brackets to distinguish them. Also, in a folder you
can arrange icons in alphabetised groups by View,
Arrange Icon By... Show In Groups.
18. Windows Media Player will display the cover art
for albums as it plays the tracks -- if it found the
picture on the Internet when you copied the tracks
from the CD. If it didn't, or if you have lots of
pre-WMP music files, you can put your own copy of the
cover art in the same directory as the tracks. Just
call it folder.jpg and Windows Media Player will pick
it up and display it.
19. Windows key + Break brings up the System
Properties dialogue box; Windows key + D brings up the
desktop; Windows key + Tab moves through the taskbar
buttons.
20. The next release of Windows XP, codenamed
Longhorn, is due out late next year or early 2003 and
won't be much to write home about. The next big
release is codenamed Blackcomb and will be out in
2003/2004.
-
-
Hacking with Windows XP
Hacking with Windows XP
Part I: The Magic of DOS
In this guide you will learn how to telnet, forge email, and use
nslookup with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows:
XP. How can you use XP in a way that sets you apart from the boring
millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up
people's TV sets and steal Sandra Bullock's email is going to find out
that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes,
that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System.
Windows XP (as well as NT and 2000) comes with two versions of DOS.
Command.com is an old DOS version. Various versions of command.com
come with Windows 95, 98, SE, ME, Window 3, and DOS only operating
systems.
The other DOS, which comes only with XP, 2000 and NT, is cmd.exe.
Usually cmd.exe is better than command.com because it is easier to
use, has more commands, and in some ways resembles the bash shell in
Linux and other Unix-type operating systems. For example, you can
repeat a command by using the up arrow until you back up to the
desired command. Unlike bash, however, your DOS command history is
erased whenever you shut down cmd.exe. The reason XP has both versions
of DOS is that sometimes a program that won?t run right in cmd.exe
will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare
DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny
nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open
sesame to local area networks. From DOS, without needing to download a
single hacker program, you can do amazingly sophisticated explorations
and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law
if you do not have permission to do so from the owner of that
computer. For example, if your friend gives you permission to break
into her Hotmail account, that won't protect you because Microsoft
owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school
just for bringing up a DOS prompt on a computer. Be sure to get a
teacher's WRITTEN permission before demonstrating that you can hack on
a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on
it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If
you type "help" at the DOS prompt, it gives you a long list of
commands. However, this list leaves out all the commands hackers love
to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As
you can guess by the name, TCP/IP is the protocol under which the
Internet runs. along with user datagram protocol (UDP). So when you
are connected to the Internet, you can try these commands against
other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to
communicate between computers. This is often used by Windows
computers, and by Unix/Linux type computers running Samba. You can
often use NetBIOS commands over the Internet (being carried inside of,
so to speak, TCP/IP). In many cases, however, NetBIOS commands will be
blocked by firewalls. Also, not many Internet computers run NetBIOS
because it is so easy to break in using them. We will cover NetBIOS
commands in the next Guide to XP Hacking.
The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of
like a seaport. It's where things can go in and/or out of a computer.
Some ports are easy to understand, like keyboard, monitor, printer and
modem. Other ports are virtual, meaning that they are created by
software. When that modem port of yours (or LAN or ISDN or DSL) is
connected to the Internet, your computer has the ability to open or
close any of over 65,000 different virtual ports, and has the ability
to connect to any of these on another computer - if it is running that
port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There
are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer
you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap
between lower case and capital letters. For example, user name Guest
is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their
user name and password are. Stop laughing, darn it, they really do. If
you don't know your user name and password, that means whoever runs
that computer didn't give you an account and doesn't want you to log
on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on
port 23. A connection attempt failed because the connected party did
not properly respond after a period of time, or established connection
failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host,
on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
Even though you can't telnet into an account inside some computer,
often you can get some information back or get that computer to do
something interesting for you. Yes, you can get a telnet connection to
succeed -without doing anything illegal --against almost any computer,
even if you don't have permission to log in. There are many legal
things you can do to many randomly chosen computers with telnet. For
example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which
enables encrypted connections between computers. If you want to SSH
into an account there, you can get a shell account for free at
http://freeshell.org . You can get a free SSH client program from
http://winfiles.com .
***************
You can get punched in the nose warning: Your online provider might
kick you off for making telnet probes of other computers. The solution
is to get a local online provider and make friends with the people who
run it, and convince them you are just doing harmless, legal
explorations.
*************
Sometimes a port is running an interesting program, but a firewall
won't let you in. For example, 10.0.0.3, a computer on my local area
network, runs an email sending program, (sendmail working together
with Postfix, and using Kmail to compose emails). I can use it from an
account inside 10.0.0.3 to send emails with headers that hide from
where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into]
Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what
its Internet address is because I don't want anyone messing with it. I
just want to mess with other people's computers with it, muhahaha.
That's also why I always keep my Internet address from showing up in
the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.
****************
Want a computer you can telnet into and mess around with, and not get
into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to
play with. Here's how to forge email to xyz@... using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 <techbroker.com> Service ready
Now you type in who you want the message to appear to come from:
helo santa@...
Techbroker.com will answer:
250 <techbroker.com> host ready
Next type in your mail from address:
mail from:santa@...
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@...
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with <CRLF>.<CRLF>
Carolyn's note: <CRLF> just means hit return. In case you can't see
that little period between the <CRLF>s, what you do to end composing
your email is to hit enter, type a period, then hit enter again.
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 <techbroker.com> Service closing transmission channel
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the
data command. After you give it, you can insert as many headers as you
choose. The trick is easier to show than explain:
220 <techbroker.com> Service ready
helo santa@...
250 <techbroker.com> host ready
mail from:santa@...
250 Requested mail action okay, completed
rcpt to:cmeinel@...
250 Requested mail action okay, completed
data
354 Start main input; end with <CRLF>.<CRLF>
from:santa@...
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 <techbroker.com> Service closing transmission channel
Connection to host lost.
The message then looks like:
from:santa@...
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type
goes into the body of the email.
Notice that the santa@... from the "mail from:" command
didn't show up in the header. Some mail servers would show both "from"
addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any
way to send email to someone outside techbroker, let us know, because
you will have broken our security, muhahaha! Don't worry, you have my
permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@...> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message]
RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message]
HELP
Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email
to a friend by telnetting to his or her online provider's email
sending computer(s).
With most online providers you need to get the exact name of their
email computer(s). Often it is simply mail.targetcomputer.com
(substitute the name of the online provider for targetcomputer). If
this doesn't work, you can find out the name of their email server
with the DOS nslookup program, which only runs from cmd.exe.
Here's an example:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
> set q=mx
> dimensional.com
Server: DNS1.wurld.net
Address: 206.61.52.11
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
dimensional.com nameserver = ns.dimensional.com
dimensional.com nameserver = ns-1.dimensional.com
dimensional.com nameserver = ns-2.dimensional.com
dimensional.com nameserver = ns-3.dimensional.com
dimensional.com nameserver = ns-4.dimensional.com
mail.dimensional.com internet address = 206.124.0.11
mx2.dimensional.com internet address = 206.124.0.30
mx3.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.10
ns.dimensional.com internet address = 206.124.26.254
ns.dimensional.com internet address = 206.124.0.254
ns.dimensional.com internet address = 206.124.1.254
ns.dimensional.com internet address = 209.98.32.54
ns.dimensional.com internet address = 206.124.0.32
ns.dimensional.com internet address = 206.124.0.30
ns.dimensional.com internet address = 206.124.0.25
ns.dimensional.com internet address = 206.124.0.15
ns.dimensional.com internet address = 206.124.0.21
ns.dimensional.com internet address = 206.124.0.9
ns-1.dimensional.com internet address = 206.124.26.254
ns-2.dimensional.com internet address = 209.98.32.54
ns-3.dimensional.com internet address = 206.124.1.254
ns-4.dimensional.com internet address = 206.124.0.254
>
The lines that tell you what computers will let you forge email to
people with @dimensional.com addresses are:
dimensional.com MX preference = 5, mail exchanger =
mail.dimensional.com
dimensional.com MX preference = 10, mail exchanger =
mx2.dimensional.com
dimensional.com MX preference = 20, mail exchanger =
mx3.dimensional.com
MX stands for mail exchange. The lower the preference number, the more
they would like you to use that address for email.If that lowest
number server is too busy, then try another server.
Sometimes when you ask about a mail server, nslookup will give you
this kind of error message:
DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to [207.217.120.202] timed-out
To get around this problem, you need to find out what are the domain
servers for your target online provider. A good place to start looking
is http://netsol.com/cgi-bin/whois/whois . If this doesn't work, see
http://happyhacker.org/HHA/fightback.shtml for how to find the domain
servers for any Internet address.
****************
Newbie note: A domain name server provides information on the names
and numbers assigned to computers on the Internet. For example,
dns1.wurld.net and dns2.wurld.net contain information on
happyhacker.org, techbroker.com, securitynewsportal.com, thirdpig.com
and sage-inc.com. When you query dns1.wurld.net about other computers,
it might have to go hunting for that information from other name
servers. That's why you might get a timed out failure.
***************
Once you know the domain servers for an online service, set one of
them for the server for your nslookup program. Here's how you do it:
C:\ >nslookup
Default Server: DNS1.wurld.net
Address: 206.61.52.11
Now give the command:
> server 207.217.126.41
Default Server: ns1.earthlink.net
Address: 207.217.126.41
Next command should be:
> set q=mx
> earthlink.net
Server: ns1.earthlink.net
Address: 207.217.126.41
earthlink.net MX preference = 5, mail exchanger = mx04.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx05.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx06.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx00.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx01.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx02.earthlink.net
earthlink.net MX preference = 5, mail exchanger = mx03.earthlink.net
earthlink.net nameserver = ns3.earthlink.net
earthlink.net nameserver = ns1.earthlink.net
earthlink.net nameserver = ns2.earthlink.net
mx00.earthlink.net internet address = 207.217.120.28
mx01.earthlink.net internet address = 207.217.120.29
mx02.earthlink.net internet address = 207.217.120.79
mx03.earthlink.net internet address = 207.217.120.78
mx04.earthlink.net internet address = 207.217.120.249
mx05.earthlink.net internet address = 207.217.120.31
mx06.earthlink.net internet address = 207.217.120.23
ns1.earthlink.net internet address = 207.217.126.41
ns2.earthlink.net internet address = 207.217.77.42
ns3.earthlink.net internet address = 207.217.120.43
>
Your own online service will usually not mind and may even be glad if
you use telnet to read your email. Sometimes a malicious person or
faulty email program will send you a message that is so screwed up
that your email program can't download it. With telnet you can manually
delete the bad email. Otherwise tech support has to do it for you.
If you think about it, this ability to forge email is a huge
temptation to spammers. How can your online provider keep the bad guys
from filling up a victim's email box with garbage? The first time a
bad guy tries this, probably nothing will stop him or her. The second
time the online provider might block the bad guy at the firewall,
maybe call the bad guy's online provider and kick him or her and maybe
get the bad guy busted or sued.
**************
You can go to jail warning: Sending hundreds or thousands of junk
emails to bomb someone's email account is a felony in the US.
***************
***************
You can get sued warning: Spamming, where you send only one email to
each person, but send thousands or millions of emails, is borderline
legal. However, spammers have been successfully sued when they forge
the email addresses of innocent people as senders of their spam.
****************
Now that you know how to read and write email with telnet, you
definitely have something you can use to show off with. Happy hacking!
Oh, here's one last goodie for advanced users. Get netcat for Windows.
It's a free program written by Weld Pond and Hobbit, and available
from many sites, for example
http://www.atstake.com/research/tool...work_utilities . It is
basically telnet on steroids. For example, using netcat, you can set
up a port on your Windows computer to allow people to telnet into a
DOS shell by using this command:
C:\>nc -L -p 5000 -t -e cmd.exe
You can specify a different port number than 5000. Just make sure it
doesn't conflict with another port by checking with the netstat
command. Then you and your friends, enemies and random losers can
either telnet in or netcat in with the command:
C:\>nc -v [ipaddress of target] [port]
Of course you will probably get hacked for setting up this port.
However, if you set up a sniffer to keep track of the action, you can
turn this scary back door into a fascinating honeypot. For example,
you could run it on port 23 and watch all the hackers who attack with
telnet hoping to log in. With some programming you could even fake a
unix-like login sequence and play some tricks on your attackers.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Bookmarks