~ The Tools Sections ~
Main tools at searchlores,
Version 5.18: January 2008
|
|
|
|
|
SrTools | Go to the softwareversing tools
|
Introduction to the web searching
tools |
What are the main "searching tools" one could use? They could be reduced to the following four main ones:
-
a good operating system (which basically means GNU/Linux nowadays).
- a good browser
(which basically means Opera nowadays)
- a
good knowledge of wget, which is a most important "swiss knife" when
exploring the web
- and, finally, a fair knowledge of a powerful programming language (like python, or perl, or ruby) that
will allow you to build and refine quickly your own tools.
These four aspect are intertwined. You clearly cannot really search effectively if you are compelled to use an operating system
like windows, with a bazillion sniffing processes, DRM protections, firewalls and antiviri running in the background. And you
cannot seriously search the web using Microsoft explorer, it's like running blindfolded in a mine field.
Anyway this page will point both windows and GNU/Linux users to some
interesting tools worth experimenting with...
"Non software" tools
pointers |
[Archies
& FTP]: Tools for seekers.
[Iefaf's
ITool-Box]: Proxying, Stalking, Connecting,
Securing
[Translation services and other Linguistic aids]: (very useful for seekers).
The lore of tools (and the simplcity of tools
finding) |
How to find any tool: first of all -especialy in windows-
you better know the [exact
name] of your target, or, even better, of the
zipped file of your target (knowing names is quite an advantage, eh). Do not
limit yourself to zip and try a search for *.rar files as well. Do not forget
*.lha, *.arj and *.ace files either, duh. Of course, if you are using
a serious operating system like GNU/Linux, you should search for
*.run, *bz2, *.gz files, etc, and learn the "power features"
of gzip (GNU/Zip).
Lacking the exact name of your target,
you can try to guess
it :-) If you don't manage to guess it, try to find it
nevertheless applying some synecdochical searching
tactiques :-) Should you still have problems finding your target, and
should you have (probably wrongly) concluded that it does not seem to be
anywhere on Internet, check if it did maybe exist BEFORE on the web.
Once you have found (or inferred, or guessed) the name of your target,
either you use a [archie & ftp-search] or you search google/fast/ask/alta with something like +target_name +download nfo (if you'r stuck with windows files,
GNU/Linux files are of course there for free). For windows files you could also search for
+target_name +crack* +serial* nfo or +target_name (+warez OR +appz) nfo. Alternatively you could use
some underground, usenet and irc-related search
techniques, but be warned that some of this could be deemed "illegal" in some "copyright-bigot"
places.
Anyway, when seeking on such paths, you may enjoy the knowledge you'll
gather on our Webbits & Rabbits section...
Yet things are usually incredibly easy with windows appz (mostly because
the programmers do not know how to protect their software):
let's, for instance, imagine that you are interested in a specific application,
let's say the old teleport
pro version 1.28. In that case you could simply search for +"teleport
pro 1.28" +serial -"click on" -tits in order to quickly find a ready made
serial number (avoiding at the same time most commercial and porn sites) and register your free copy.
This is less fun - and way less instructive- than cracking your appz yourself,
but if you are in a hurry gets the mustard cut... the dark side of
the evil power of knowing how to search, I guess.
Note, once more, that if you switch to GNU/Linux once for all, as you should, leaving the windows
insecure and sniffing bazaar behind you, you'll never need to steal your software again: all applications
come completely free AND with their source
code, so that you can copy, use AND modify them to your heart's content.
Sniffing?
Yes, even before you ask: YES, your
ISP, your "free" search engines, and probably your friendly neighbours as well, all do actively
monitor your web activities and searches... that's the reason -especially if you'r stuck with toy operating systems like
windows, you should use some of the tools you'll find in this page... opera,
proxomitron,
a good firewall, ipticker... and, by all means,
learn some [anonymity
lore] basic as soon as you find some time...
for GNU/Linux for windows
Searchers should master all the following tools.
Unwashed should begin playing with each one of them for at least a couple of days, gasping in awe.
Have also a look at the different search commands available.
Wget
GNU/Wget is a very powerful free utility for non-interactive download of files from the Web.
It supports http, https, and ftp protocols, as well as retrieval through http proxies. Cosmic power
at your fingertips.
cURL
curl is a command line tool for transferring files with URL syntax,
supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS and FILE.
curl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload,
proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, kerberos...),
file transfer resume, proxy tunneling and a busload of other useful tricks (custom headers,
replace/remove internally generated headers,
custom user-agent strings, custom referrer strings etc.).
Pavuk
Pavuk is a program used to mirror the contents of WWW documents or files.
It transfers documents from HTTP, FTP, Gopher and optionally
from HTTPS (HTTP over SSL) servers. Pavuk has an optional GUI based on the GTK2 widget set
Etherape
Network traffic is displayed graphically. The more "talkative" a node is, the bigger its representation.
Most useful "quick checker" when you browse around.
-
Node and link color shows the most used protocol.
- User may select what level of the protocol stack to concentrate on.
- You may either look at traffic within your network, end to end IP, or even port to port TCP.
- Data can be captured "off the wire" from a live network connection, or read from a tcpdump capture file.
- Live data can be read from ethernet, FDDI, PPP and SLIP interfaces.
- The following frame and packet types are currently supported: ETH_II, 802.2, 803.3, IP, IPv6, ARP, X25L3, REVARP, ATALK, AARP, IPX, VINES, TRAIN, LOOP, VLAN, ICMP, IGMP, GGP, IPIP, TCP, EGP, PUP, UDP, IDP, TP, IPV6, ROUTING, RSVP, GRE, ESP, AH, ICMPV6, EON, VINES, EIGRP, OSPF, ENCAP, PIM, IPCOMP, VRRP; and most TCP and UDP services, like TELNET, FTP, HTTP, POP3, NNTP, NETBIOS, IRC, DOMAIN, SNMP, etc.
- Data display can be refined using a network filter.
- Display averaging and node persistence times are fully configurable.
- Name resolution is done using standard libc functions, thus supporting DNS, hosts file, etc.
- Clicking on a node/link opens a detail dialog showing protocol breakdown and other traffic statistics.
- Protocol summary dialog shows global traffic statistics by protocol.
Wireshark
Wireshark, the world's most powerful network protocol analyzer, a sort of tcpdump on steroids,
is a GNU licensed free software package that
outperforms tools costing thousands of euro and
has an incredible bounty of mighty features (but learn how to use its filters, or you'll sink inside your
captured data):
- Deep inspection of hundreds of protocols,
- Live capture and offline analysis
- Captured network data can be browsed via a GUI, or via the TTY-mode
TShark utility
- Most powerful display filters
- Rich VoIP analysis
- Read/write many different capture file formats:
tcpdump (libpcap),
Catapult DCT2000,
Cisco Secure IDS iplog,
Microsoft Network Monitor,
Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®,
Network Instruments Observer,
Novell LANalyzer,
RADCOM WAN/LAN Analyzer,
Shomiti/Finisar Surveyor,
Tektronix K12xx,
Visual Networks Visual UpTime,
WildPackets EtherPeek/TokenPeek/AiroPeek,
and many others
- Capture files compressed with gzip can be decompressed on the fly
- Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM,
Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom)
- Decryption support for many protocols, including
IPsec,
ISAKMP,
Kerberos,
SNMPv3,
SSL/TLS,
WEP,
and WPA/WPA2
- Coloring rules can be applied to the packet list for quick, intuitive
analysis
- Output can be exported to XML, PostScript, CSV, or plain text
Scapy
Scapy (created by my friend Philippe Biondi) is a mighty interactive packet manipulation program. Cosmic power, again,
for anyone that
will invest some time in mastering it.
This little marvel is able to forge or decode packets of
a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.
It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network
discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also
performs very well at a lot of other specific tasks that most other tools can't handle, like sending invalid frames,
injecting your own 802.11 frames, combining techniques (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP
encrypted channel, ...), etc :-)
Other useful tools
mtr
Finally there are some wondrous CLI tools that -amazingly enough- many searchers don't use:
For instance the mighty useful, dutch mtr, a
allinone traceroute+ping that substitutes traceroute
(mtr= "my traceroute"):
me@mybox:~$ sudo mtr www.searchlores.org
Use the "n" key to switch between DNS-names and IPs.
File finders
FF.zip ~ 5715 bytes
Use this old, useful program. NEVER use
the "start/search" function in windows xp, which silently connects
on port 80 to sa.windows.com (207.46.248.249)
in order to deliver to the ugly microsoft's minions your IP and what you are searching for on
your own harddisk. Start/search - in Windows XP - is MALWARE eo ipso.
agentran.zip ~ 787735 bytes ~ Agent Ransack, by David Vest,
is the freeware version of File Locator Pro
Agent Ransack is a useful tool for finding files and information on your hard drive fast and efficiently.
When searching the contents of files Agent Ransack also displays the text found.
Users can then quickly browse the results without having to separately open each file.
It uses regular expressions.
To find a file that begins with 'Dear' or 'Yesterday' followed at some point by 'Document' or 'Documents'
followed at some point by a number and that has a '.txt'
extension the expression would be: '^(Dear|Yesterday).*Documents?.*[0-9]+.*\.txt$'
You can test your regular expressions, before searching, through an ad hoc Test->Regular expression menu option
Use this program in order to search,
NEVER use
the "start/search" function in windows xp, which silently connects
on port 80 to sa.windows.com (207.46.248.249)
in order to deliver to the ugly microsoft's minions your IP and what you are searching for on
your own harddisk. In Windows the start/search function is just sniffing
MALWARE.
File Greppers
See also Agent Ransack above, which is a good grepper.
grep.zip ~ 4624 bytes
grep.zip ~ 7023 bytes grep.com
[Turbogrep version 3 by Borland,
1992]
grep20dw.zip ~
202064 bytes grep20dw.zip
[grep for Windows 95/98/NT, version 20d by Tim Charron
1998]
Most useful (Gnu) tool,
comes WITH SOURCE code
grep32.zip ~ 610381
bytes grep32.zip
[Windows grep 2.2., by Huw Millington
2000]
Code is a tag overbloated and slow, but, hey, it does not choke on windoze's
temp and swap files! Works quite well inside executables
(Old) Site Greppers
Teleport
Pro
teleport128.zip ~
1670460 bytes ~ Teleport Pro, version 1.28, 1997
See the following essays (regarding the bad habits of version 1.29):
Teleport Pro 1.29, malware
galore by Faulpelz, May 2000
Delving deeper into Teleport Pro
1.29 by Noos, October 2000
Teleport Pro V1.29 (Build
1107) by Faulpelz, January 2001
Stringers
strings.zip ~ 9272
bytes strings.zip ~ 17413 bytes strings.exe
Most useful tool, find printable strings in any binary
file, must have on your harddisk
bintscan.zip ~
84730 bytes bintscan.zip
[binary text scan!]
Most useful strings finder
Searching elsewhere
All-purpose Fetchers
wget1531.zip ~
106681 bytes strings.zip
[wget ver 1.5.3.1 GNU license]
Most useful
fetcher (non interactive network retriever) for windows, must have for speedy
mass-downloads
"Nothing, NOTHING, beats wget. Nothing."
(A+heist)
Searching the web with ready-made
bots
Ok, this is admittedly embarassing for 'real'
searchers
(coz you should write
your bots yourself instead of using commercial crap, that moreover is often
enough "advertisement infested"... well, at least we can easily "take care" of
this last annoying habit :-)
the "ferrets"
ferre302.zip ~ 503833
bytes ferre302.zip ~ 1134088 bytes webfer~1.exe
web ferret,
version 3.02, queries popular search engines, astounding useful results at
times. Disabling its awful "advertfeature" it's a real & easy
pleasure. See for instance how you can "clean" on the fly this bot on my Milan workshop papers,
or a more deeper analysis in this essay.
copernic.zip ~
2716185 bytes copernic.zip ~ Copernic 2000, french version.
Good bot, even if heavily commercial oriented and advertisement
banners infested (see +Tsehp's essays in my anti advertisement section).
+Tsehp demonstrated the utter banality of the advertisement removal
procedure for Copernic 2000/4.5... this gives us the possibility to
effectuate a simple - and eyes' soothing - "single byte shoot":
CopernicSvr.exe
:54BB5B E814E9F8FF call 4DA474
:54BB60 E88730F2FF call 46EBEC ;are we allowed to showe ads into your eyes?
:54BB65 84C0 test al, al ;ax is not zero? Ahah! Eat ads, poor luser!
:54BB67 0F8599000000 jne 54BC06 ;0F84... (je 54BC06 would sooth your eyeballs ;-)
:54BB6D A1B8785700 mov eax, dword ptr [5778B8]
:54BB72 80780C00 cmp byte ptr [eax+0C], 00
But we have [our own bots] as well...
Check also [mysearch.zip]: ~ 20233 bytes A search bot in Visual Basic by
Shoki (see [shokiwcd.htm])
Browsers
Either you know why you should
use these tools, or you search & learn, or just try and understand
:-)
"Probieren geht über studieren"
|
[Opera]
~ the ultimate browser for searchers. An incredible tool: your mighty sword on the web!
Check the ad hoc Tutti all'opera page!
Learn the mighty right click --> block content feature and enjoy!
|
Lynx
Lynx: [lynxy.zip] : 683992 bytes, ported from unix, works in a dos box,
very quick, try the non graphical way of quick browsing.
Lynx has some SERIOUS security problems (less than M$IE, anyway) - as
you will learn searching the web - but remains VERY quick, so consider the trade
off risk/speed
Pictureagent [pa27.zip] : 2716159 bytes, version 2.7
Fundamental tool for usenet
image retrieval, 'protected' with one of the stupidest protection you can find
around: the program carries a long hardcoded list of invalid names
(probably people that did spread their registration codes on usenet) and cracker
names like "hans die wurst", "donald ibarra", "escom/core", "iceman [ucf]" and
so on, followed by this silly codesnippet::41596D 8B442430 mov eax, dword ptr [esp+30]
:415971 3BF8 cmp edi, eax
:415973 757A jne 4159EF ;bad_guy_exit
:415975 85FF test edi, edi
:415977 7476 je 4159EF ;bad_guy_exit
:415979 83F801 cmp eax, 1
:41597C 7C71 jl 4159EF ;bad_guy_exit
:41597E 8D4C2410 lea ecx, dword ptr [esp+10]
:415982 C644242400 mov [esp+24], 0
and, ahem, you actually might
want to 'nop' the 4159ef 'bad guy' locations :-)
When will programmers
learn [some better tricks] to protect their software?
VLC is a cross-plaform multimedia player which can be used to read the stream from the network or display video read locally on the computer
under all operating systems. Here the windows version 0.7.0.: [VideoLAN070.zip] 5.116.711 bytes
The VideoLAN french project targets multimedia streaming of MPEG-1, MPEG-2, MPEG-4 and DivX files, DVDs, digital satellite channels, digital
terrestial television channels and live videos on a high-bandwidth IPv4 or IPv6 network in unicast or multicast under many OSes.
VideoLAN is free
software, and is released under the GNU General Public
License.
Images de-watermarking
tools |
JPG
JPG Cleaner v2.6 [jpgcln26.zip] : 291108 bytes, version 2.6
JPG Cleaner is a Fundamental tool for
image cleaning purposes, by Rainbow Software Programs: JPG Cleaner is a simple
but powerful utility for cleaning JPG files from anything that is not picture data. Commonly used programs
such as Adobe Photoshop write tons of additional information into JPG files, crap that isn't needed at all in
oredr to display correctly the picture.
Texts such as "File written by Adobe Photoshop, Creator: PolyView® Version 3.32 by Polybytes, LEAD Technologies Inc. V1.01
and all sort of preposterous crap will be eo ipso eliminated. Good riddance!
Also gets rid od picture previews (sometimes even bigger than main JPG data!)
And of all that useless color Management data
These data may (may!) be useul only when opening those files inside the program that created them.
Yet any other programs, such as any Internet Browser just skip such data, hence all this uselss crap is downloaded and then
again thrown away!
Always use this program when publishing JPG
files on the Internet: your JPG files will be smaller
(should they contain non-picture data) with NO QUALITY LOSS whasoever.
GIF
Gif Cleaner v2.6d [gc26inst.rar] : 400592 bytes, version 1.1
The FILE menu includes:
Remove Comments
Remove Extraneous Data
Show Embedded Comments
Output Comments to File and Set Display Time
The Remove Comments
Remove Extraneous Data
Show Embedded Comments
Show Images items are toggle menu items
*** Important Note ***
GifClean32 will NOT modify any graphics in the GIF file.
This means if you can see it, then it will be untouched. Comments are not
displayed when viewing gif files via your browser or gif viewing utility.
They are there for "record keeping purposes" or to identify the author, vendor, etc.
Total recorder [totrec22.zip] : 906191 bytes
Fundamental tool for sound
streams capture, dead easy to crack, see fu_softi.htm
[Port listeners, pingers and
tracerouters]
[Languages & useful
books]
[Checkers, sniffers,
whistles] [URL obfuscators] [Email IP address
spoofers] [Software
customizers]
[Corporate
countermeasures]
Port listeners, pingers &
tracerouters |
Very important to discover who is listening
where
netmon09.zip ~
256655 bytes netmon09.zip
[Let's log all covert
activities]
Netmonitor, version0 .9: useful tool, log everything that
listens
inzider.zip ~
210391 bytes inzider.zip
[Who is listening where?]
Inzider, version
1.2: useful tool, must have if you fear someone may be listening on your ports
à la BO...
netlab.zip ~ 228735
bytes netlab.zip
[Swiss pinging knife]
Netlab, version 1.35, by
Alexander Danileiko (1997): useful tool, must have for pinging, tracerouting
and port-listening...
Netlab, upon starting, contacts the time server at 198.83.19.241 through port 37
nc11nt.zip ~ 96561
bytes netcat.zip
[the Swiss Army Knife of TCP/IP]
Netcat, version 1.10, by
Hobbit: useful tool, must have tool! See Angela Zaharia's essay
A simple example of using Netcat is to pull down a web page from a web
server.
With Netcat you get to see the full HTTP header so you can see
which web server a particular site is running.
ipticker.zip ~ 29212
bytes IPTICKER (For windoze 2k & XP only)
[Monitor ALL your Internet connections]
ipTicker is a diagnostic tool that detects and measures IP (internet protocol) traffic to and from your PC.
It listens to all ports and reports the activities centrally on its screen in real time.
By http://www.soft-trek.com.au.
Very useful tool, small, not intrusive, powerful. But *very badly* protected:
:4039BE E833DFFFFF call 4018F6
:4039C3 85C0 test eax, eax
:4039C5 7512 jne 4039D9 ; jne "good guy"
:4039C7 6824D34000 push 40D324 ; --> "ipTicker v1.6 (U N R E G I S T E R E D V E R S I O N)"
So if somebody wants to be a "good guy" he just modifies the ONE byte in blue above, turning that jump if not equal into
a jump if equal instruction...
I believe that the programmers at soft-trek should learn [some
better tricks] to protect their software.
ethereal092.zip ~ 7089400 bytes, ethereal092.zip ETHEREAL!
(Version 0.92) eh :-) The best Network protocol analyzer. Trace
everything, investigate, check what's going on! CATCH spywares
REDHANDED!
(October 2006) Ethereal changed its name to WIRESHARK!
wireshark is the new name of the fantastic Ethereal protocol sniffer.
This is a very powerful tool to check what's really going on 'behind the scene' everytime you connect to
a server on the web. Power knwoledge for anyone interested in having power knowledge.
"Wireshark was written by an international group of networking experts, and is an example of the power of open source. It runs on Windows, Linux, UNIX, and other platforms"
|
Precious Item
|
Checkers, sniffers, whistles
Know what's going on inside a windoze box
winsight.zip ~
165169 bytes winsight.zip
[Whoa! All those programs are running on my
pc?]
winsight, version 2.05: useful Borland's tool, have a look, lotta
windows eh :-) Trace messages, investigate, check what's going on!
belarcadvisor.zip ~
606129 bytes BELARC ADVISOR!
Will show, on a html page, EVERYTHING that has been installed on the box where you are using it, with serial numbers :-)
Yep, System serial number, "Software LIcenses" like Microsoft XP's serial, Network Card MAC Address, and so on.
Didactically important tool as well, coz it shows you all the
data that windoze leaks around.
regrun2.zip ~
831086 bytes regrun2.zip
[Clear all misteries for windoze's configuration
and all sort of start up wonders]
Regrun2, version 2.25: an useful tool
to explore, check or change your configuration files, have a look. Trace,
investigate, check what's going on with this good tool!
An incredibly
simple protection scheme: the serial number routine is calculated from a name
/ email message combination that accepts one letter names as well (very bad
protectetiquette!) and shifts 0xF downwards based on the emailaddress (let's
say for instance that "a" at bozo@liveshere.com is 349120 and "b" at
bozo@liveshere.com is 349104, you'll guess that "c" will be 349088, and so on
:-) I believe that the programmers at Greatis should learn [some
better tricks] to protect their software.
regcle34.zip ~
251475 bytes regcle34.zip RegCleaner, by Jouni Vuorio, a GREAT tool.
Freeware. Does MUCH MORE than those expensive 'automatic' registry cleaners.
Try it! Search for "gator" and
"cmesys" on your own system, and you may have some
surprises... Inter alia it automatically removes all kinds
of junk from the registry. Corrupted data is also removed from the
registry. I say "inter alia" because this tool can have different uses
as well, as Vuorio points out: "Say you've accidentally destroyed a
nice shareware program what has a 30-day trial period. Later on, when
you notice that it's been destroyed, you try reinstalling it, only to
find out that you can't, because the program thinks that you're just
trying to get another 30 days. If you first remove the program's
registry entries, however, you may very well be able to reinstall the
software and recover your trial period again." |
Precious Item
|
URL obfuscators
If you want (to hope)
that your sysads don't know where you are surfing :-)
unfrozen3.zip ~
62543 bytes unfrozen3.zip
[A pleasure to play with, create synonyms for
your preferred URLs]
Unfrozen3, by Glow Armageddon (glow(at)w3(point)to), beautiful small tool to obfuscate the
URLs you are browsing to. "Hostname converter", must have for all those that
prefer not to leak too explicit loggings... see PCHelp's essay How to Obscure Any URL for
some explanations.
Check also [son_33_1.htm]: Javascript obscure conversion by
sonofsamiam, part of the [obscure.htm] section
Check also [urlcalc.zip]: ~ 43844 bytes Dotted decimal IP conversion to other
valid bases & Reverse obfuscation of a URL by Shoki (see [shokiwcd.htm])
and de-obfuscators :-)
[Sourcerer version
1]: ~ 30870 bytes,
This is version 1.0 of this javascript decrypter, the sources are included
by
Mordred Magic tool for seekers
Email IP address spoofers
If you wish
to maintain a certain degree of anonymity with your friends :-)
euthan.zip ~ 176108
bytes euthan.zip
[The tools of the evil spammers can be of some use for the
sons of the light]
Euthanasia, an old email bomber program that works
great for just sending emails: spoofs the IP address as well as the return
address and x-mailer (unfortunately it only works with certain smtp relays:
some reveal the real address anyway: check it and find a relay that work
before using). Thanks malan!
Software customizers
If you wish to
kill ads, tweak whatever or re-enable some grayed options
customiz.zip ~
653537 bytes customiz.zip
[The customizer per anthonomasia, version
1.10]
You'll find this even more useful than poledit when your system
administrator or your software programmer has chosen to 'disable' some
options... :-)
See for instance how you can modify on the fly the
webferret bot in this
essay. See also another interesting use of the customizer (tweaking EULAs)
in this [conference of mine]
customiz.exe ~
692224 bytes: this is customiz.zip version 1.10 autoextracting as
exe
very useful when you need to perform some quick tweakings from -say-
a web-café ;-)
customiz.jpg ~
653537 bytes: this is customiz.zip version 1.10 masqueraded as a
jpg
This is the old "anti-corporate" *.jpg
trick. Just click right onto it and choose save as, it will work even if you
are in a corporate cage where evil sysads have disabled zip and exe
downloading ;-)
cust115.zip ~
272528 bytes: cust115.zip [The customizer per anthonomasia, version
1.15] A ridicolous time check protection... any kid could set all
FOUR occurrences of 000007D1 (if you have installed it in 2001) to -say-
00000BB9 with the result that the program will expire in 3001. (And if
that's not enough... set all four to 00000FA1 :-) Maybe the
good people at wanga should learn [some better
tricks] to protect this most useful appz.
|
Precious Item
|
Corporate countermeasures
Escape the
censorship dictatures!
httport.zip ~
382426 bytes httport.zip
[TCP/IP through HTTP tunneling client by Dmitry
Dvoinikov]
You'll find this quite useful if you'r blocked by a
proxy... see all necessary instructions here: [httport.htm]
stego.htm
Steganography
Where you will find various tools
to embed your data in various kind of covers (images, sounds, files)
codebar.zip
~ 50488 bytes codebar.zip (CODEBAR!)
[ole +ORC explained how important this is]
Old, small, useful.
I liked
Whitmore's answer on Usenet, some time ago, to a commercial zombie that
accused users of 'stealing' when browsing with our beloved killerads on, this
text has been slightly modified:
"Banner ads are really silly.
Lately some bastards advertisers have begonnen to take note and 'penalize'
people using junkbuster and other banner killing software. What their defense
of this criminal attitude boils down to is that commercial webmasters incur
business expenses, and are responsible for finding a business model that at
least covers those expenses. Customers don't care if they cover their
expenses, they just want (x) and are willing to pay (n) to get it. If you
offer (x) for free, it's not stealing if people take it without being forced
to read ads -- remember, they're not concerned with advertisers' costs, they
just want their own expense to be (n) or less (where (n) is assumed to be
positive, thus zero -- free -- is less than (n)). If advertisers don't cover
their expenses, that's a problem with their business model, not consumer
behavior. If they had content that is worth an "admission" (a very big if in
my experience) then go ahead and charge one! If they can't, then they'd better
find a better business model. Expecting unusual behavior and giving the lack
of that behavior such negative (and illogical and inappropriate) label like
"stealing" is not going to serve them in the long run."
Of course
the junkbuster and proxomitron methods, that are described elsewhere on my
site, are pretty effective per se.
Two Opera's [
plug-ins]!
[http://www.intermute.com/] Intermute
[http://www.webwasher.com/] Webwasher, fairly easy to set up, and does away with
unwanted advertising, and other forms of annoying behavior from webpages.
[ao201.zip] Adsoff! 144919 bytes, original location:
http://www.intercantech.com, easy to crack... but you should buy this appz, it
deserves it.
[aaw562.zip] AD AWARE! (Version 5.0 = 5.62) 849144 bytes, original
location: http://www.lavasoftUSA.com/, very
useful to nuke spywares.
[http://www.oreilly.com/openbook/] O'Reilly English Language Online Books
Of course you should learn how to search effectively for books on the web, which is NOT as obvious
as it might seem to non-searchers.
Powerful firewalls for windoze &
proxies |
(the best firewall for windoze is unfortunately a commercial one:
Sygate Personal Firewall Pro, go grab its version 5.1 on the deep deep web :-)
[consl26.zip] 914258 bytes: Conseal PC Firewall for windoze 9x, Version 2.6
You'll enjoy the power and knowledge!
[fo-b2145]
~
[fo-b25ci]
BlackIce, one of the best personal firewalls around (the best one is Sygate, go grab it)
Good old Fosi seems to have spread it all over the web.
A possible alternative is
ZoneLabs Zone Alarm (Free edition) http://www.zonelabs.com
A possible alternative is Tiny Personal Firewall (free for personal use) at
http://www.webmasterfree.com/tpfw.html
[mproxy05.zip] 145807 bytes
MultiProxy is a multifunctional personal
proxy server you can install to protect your privacy by dynamically connecting
to non-transparent anonimizing public proxy servers only. You can also test a
list of proxy servers and sort them by connection speed and level of
anonimity.
For a couple of interesting lists see [pxylist1.txt] & [pxylist2.txt]
OUR_FRIEND_PROXOMITRON!
| |
Scott Lemmon, Proxomitron Author, passed away at the age of 36 on May 1st 2004 :-(
|
|
ProxN44.zip ~ 1141224 bytes proxo.zip (PROXOMITRON! Version Naoko-4.4)
[there is no need to explain how important this little thing is - complete documentation inside]
ProxN45j.zip ~ 1136575 bytes proxo.zip (PROXOMITRON! June Version)
[there is no need to explain how important this little thing is - complete documentation inside]
Older version:
proxo.zip ~ 873971 bytes proxo.zip (PROXOMITRON! Version Naoko-3)
If you never used it, you will wonder how comes you never used it before :-)
Check Oncle Faf goes inside proxomitron
|
Magical Item
|
How to input multiple proxies on the fly in Proxomitron, by
-Bone Digger
Copy your proxy list to your clipboard.
Click the Proxy button on the Proxomitron Main Window.
Click the Add button on the "External Proxy Selector" window.
Right Click in the "Enter New Proxy server" text box.
Choose Paste from the right click menu.
All unique proxies (i.e. those not already listed) from your clipboard will be added.
OR open the default.cfg file in a text editor.
Scroll to the [Proxies] section at the bottom.
Leave a full empty line below the "OpenLog = TRUE" and "Count = 1" line and paste or input your proxies one per line.
|
You'll find various proxy lists here and one ready to be pasted
inside proxomitron here |
By all means, use Proxomitron together with
Opera: cosmic power for your seeking trips!
|
Our friend Proximodo?
A possible new alternative to proxomitron (still in early development stage) could be proximodo, by
Antony Boucher.
"Basically, Proximodo is a clone of a great piece of software called The Proxomitron,
developed by Scott R. Lemmon. Now that for sad reasons Proxomitron is unmaintained, I started this project to carry on the idea. Though a few Proxomitron features are still missing in Proximodo (mainly SSL support) the essential is already there: 100% of Proxomitron filters will run under Proximodo (plus there is a menu to import your custom Proxomitron filters).
Proximodo currently comes with default Proxomitron filters, which can do quite a lot of different things.
But you can write your own filters, using a powerful syntax that, despite its seeming complexity, is quite easy to use and master."
Grisoft AVG Anti-virus (Free edition) http://www.grisoft.com
[w32gwiz.zip], ver 1.01 493706 bytes, by Vitaly (VitalyATATATTAODOTDOTDOTde)
"Win32 Game Wizard permits the user to modify the games so
that they can be much easier finished. It allows the user to customize games.
It removes protection, adds infinite lives, infinite weapons, etc."
[MemRead_BIN.zip] 133734 bytes, by ivo andonov (iDOTDOTDOTandonovATATATgallup-bbssDOTDOTDOTcom)
Let's see, ahem, if you undertand WHY the following
could be quite useful... remember old dos SICE 'snappings'? :-)
- Lists all processes and their modules currently running on the system.
- Lists the memory pages used by the selected process.
- Filter on the memory pages.
- Lists windows associated with each process
- Follower that will show the region occupied by each window you select
- Read/Write to other processes memory.
- Search in the memory pages selected from the list.
- ASCII search (automatic standard and UNICODE). Type ["something] (without the brackets) to search for "something"
- Binary
search. Type some numbers (for example 10 20 30) to search for the bytes
10 20 and 30. You can change from hex to dec using $ and # symbols. For example
the following search ($10 #20 $14 15) will search for $10 $14 $14 and $15
- Currently the search is byte oriented
- Remember the current state of a selected region of memory pages (like GameWizard).
- Search for changes in the remembered region.
- Search for differences. Using this search I found the address where Minesweeper
keeps the array of the play field. I have created a Minesweeper trainer.
- Search for increments
- Search for decrements
- Currently the search is byte oriented.
[hip20.zip], ver 2.0, 375501 bytes, by Davi Tassinari de Figueiredo (davitfATATATusaDOTDOTDOTnet)
A wondrous tool for file-hiding purposes, allows you to conceal
files inside bitmaps, using a password. This program version was published in may 2001.
Since Davi gives you the source code (260334 bytes)
as well, you can apply slight modifications: no echelon will ever be able to fech you on
the fly (unless they have you as a target).
This version is quite fast and relatively safe.
This is a DOS/Windows interface, a Linux one will eventually appear.
(c) III
Millennium: [fravia+], all rights reserved
Finally... Cosmic and Tactical depths |
Finally, since you are on my main "download" page, some old
gems, just in order to grasp how insignificant "we and our worries"
are, and how important it is to AVOID taking ourself too much seriously.
First take a look at the real small place our galaxy
has in the universe, through [this wondrous program], that every father should show to
his kids in
"relativising" awe... funny isn't it?
Mortals are at the same time nothing of
relevance and yet they have so much to give...
What? You still have a lot of time to
waste? Learn for free some strategy (and delve into such tactical depths)... and of
course, while playing, do not forget
to apply some sound theory to your virtual soldiers! :-)