Sunday, August 12, 2007

Burning Copy Protected Cd's

Burning Copy Protected Cd's .

A step by step guide




--------------------------------------------------------------


1] Introduction /Disclamier

2] Type of protections

3] Hardware Req.

4] Software Req.

5] Step bY Step guide


--------------------------------------------------------------

1] Introduction / Disclamier

This is my first origional tutorial written by me (technical info taken form the web)

hope u guys like it ..

More and more often these days Software companies and Game developers alike are coming up with new ways to stop people creating illegal copies of copyrighted software and games. A more obvious and common way for companies to do this is to use Commercially Developed CDR Protections which when used on the game or software makes it nearly impossible to copy the game. It is illegal to copy or burn a copyrighted game to sell or give to others, which most of you would know, but it is not illegal to make a personal back-up copy for yourself of the game provided you are the original owner of the game. The advantages of making a back-up copy of a game is that once you have the back-up copy you don't need the original so it can be kept safe in the cover and if the back up copy gets scratched you will still have the original game.


--------------------------------------------------------------

2] Type of protections

The following are the types of protections used to protect a cd from being replicated

CD Checks

SafeDisc

SecuRom

Illegal TOC (Table Of Contents)

OverSized/OverBurn CD's

LaserLock

ProtectCD

DiscGuard

CD-Cops

FADE

StarForce

SafeDisc 2

SecuRom

SecuRom Trigger Functions

In this tutorial we will be backing up a copy of Age Of Empires II (rise of nations)
which is protected by Safe Disc

--------------------------------------------------------------

3] Hardware Req.

1] A CD burner if u want to burn the backup or equivalent space of the cd on the hardisk
to burn an image and play it from the HDD

700MHz CPU and 128MB RAM is recommended

-------------------------------------------------------------

4] Software

1] Alcohol 120% [CD burning software] : We will be using Alcohol 120% as the cd burning software , I personally recomend this proggy .


4] and then click on "Run Alcohol 120%"


5] After Alcohol 120% is launched click the Image Making Wizard on the top left and
follow the wizard [remeber u require to have a max of 800mb somewhere on your disc to keep the
image . [ It took me around 25 mins to make the image. so be patient]
Alcohol can make the image in the following formats .cue ,.ccd and .mds
u can chose it to be burned in to any format , i burned the image using mds format



6] After the image is created and if u want to burn it on the cd , go back Alcohol and on the top left menu
chose the second option "Image Burning Wizard" rite below the Image Making Wizard and foolow the waizard
and u will have a backup copy burnt . The backup copy will also have the protection on it.

7] If you want to run it of the HDD go to where the image is stored on the disk and right click and say mount
image , the image will be loaded in the virtual drive created by alcohol.


---------------------------------------------------------------

Thats it folks ,

Plz post your comments / Suggestion Below

If u have any questions feel free to ask . i will try my level best to answer them

And PLEASE BURN COPY PROTECTED CDS ONLY FOR BACKUP IF YOU HAVE LEAGALLY PURCHASED IT

Create a New Drive for ur Favourite Folder

Use the SUBST command to substitute a drive letter for a path in order to treat a virtual drive (a reserved area rather than an actual disk drive) as a physical drive i.e create a new drive for your Favourite Folder in MS-DOS Prompt.

For e.g if you want to create a drive named Z for your Program files folder then u need to enter the followin in ur DOS mode : -

subst z: "c:\program files"

This will create a drive named Z in your My Computer so that you can directly access your program files contents from this Drive. You can also create a Seperate drive for your seperate folder for accessing data easily. For e.g Seperate drive for your music folder etc.

Colorize your old Black and White photos with Photoshop

Well you must be seeing many of your local studios' ads that say Black&White to Color. Well don't waste money by paying them. You can do it at you home with just a PC and Photoshop installed. Get your photos scanned and open it in Photoshop.







Note: I am using a pic of our lovely Ash for this tut. (Also this may not be the simplest way of getting around things.)




1) Open your photo.



2) Image---->Mode---->RGB Color (if it's not already in that mode)



OK. Now in this pic there are various elements that need to be colorized. There is skin, her dress, the background etc. (well, it’ll depend on your image)



3) Take out your Lasso Tool and make a selection around the skin area.






TIP: When using the Lasso Tool, select while using Shift key to add to you existing selection. This comes in handy while selecting different parts together like face, hand etc. Similarly use the Alt key to minus from the existing selection.



4) Right-click inside the selected area and click the Layer via Copy option. (We are doing this coz we don’t want to damage the original image.) . In the Layers window (Window---->Show Layers) right-click on the newly created layer and click Layer Properties and rename the layer to Skin.



5) Image---->Adjust---->Variations. Feel free to play with the colors here and select the most appropriate color for the skin.




6) Next select the background layer in your Layers Window and with the Lasso Tool select the background. Make a Layer via Copy. Name it background. Repeat the step 5).



7) Continue like this until you colorize all parts of your image. You can also go into real details like lips,teeth, eyes etc etc.

How to burn BIN/CUE files with Nero

First step is to make sure that your using Nero 6..6 or Nero 7 if not then you will have to updgrade to these versions before continuing with this guide

Go to start, all programs, Nero and open your Nero Burning Rom and you should be faced with this below





Now click Cancel then click the File tab then Options (preferences if you are using Nero 6.6)




Click the Expert Features tab then tick Enable Disc-at-once CD Overburning and change

the time to 84 mins. Also tick Enable generation of short lead out if you have that option




Click apply then click ok, jobs done ;)

Now onto burning the actual bin/cue files that you have to CD-R

Locate the folder where your downloaded KVCD is then right click with your mouse on the cue file and chose Open With
If you dont have the option like you see on the screenshot to chose Nero then you have to click Choose Program







If you are using v7 then you have to Click the browse button and go to the Nero/Nero 7/Core folder in your program files

Nero 6 users have to Click the browse button and go to the Ahead/Nero folder in your program files




Click on the Open button after that Nero should open up and all you have to do now is pick your burn speed which should be no more than 8x

Note: Also in future when your right click on a cue file the option should be there to open it with Nero so you dont have to go through all that again

Top 5 Criminal*** Hackers of all time

1.Kevin Mitnick

Mitnick is perhaps synonymous with Hacker. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer.
Mitnick is now a productive member of society. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker.

2. Adrian Lamo

Lamo hit major organizations hard, hacking into Microsoft and The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo frequently found security flaws and exploited them. He would often inform the companies of the flaw.
Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law.
Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. For this crime, Lamo was ordered to pay $65,000 in restitution. Additionally, he was sentenced to six months home confinement and 2 years probation. Probation expired January of 2007. Lamo now is a notable public speaker and award winning journalist.

3. Jonathan James (A.K.A Don Balcon)

At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. With this hack he was able to capture usernames and passwords and view highly confidential emails.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Today James aspires to start a computer security company.

4. Robert Tappan Morris

Morris is the son of a former National Security Agency scientist named Robert Morris. Robert is the creator of the Morris worm. This worm was credited as the first computer worm spread through the Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. Experts claim 6,000 machines were destroyed. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. His focus is computer network architecture.

5. Kevin Poulsen

Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. These actions earned him a Porsche among many other items.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. He was assessed a sentence of five years.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles.

How to make your computer Anti-DDoS (DDoS Protection)

<><><><><><><><><><><><><><><><><><><><>
How to make your computer Anti-DDoS (DDoS Protection)
<><><><><><><><><><><><><><><><><><><><>
What you need:
Harden It >>>>>>>>
CODE
http://rapidshare.com/files/47135381/Hardenit_by_D-HACKER.rar.html


rst, follow JoeyBe11's Tutorial on editing the regedit keys...

Open up regedit
Goto HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
Under Windows, add a new key called Psched, it may already be there.
Under the key Psched, add a DWORD value named "MaxOutstandingSends" without quotes, of course.
Once you have created the DWORD value named MaxOutstandingSends, right click on it and click modify.
Under value data, put 65535. Under base, Hexadecimal should be chosen.
Here's a few other registry values/keys to stop DoS/DDoS attacks in the event that you have a weak connection and your system can't even withstand 65535 connections:

[HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS]
"SYNATTACKPROTECT"=DWORD:00000002
"TCPMAXDATARETRANSMISSIONS"=DWORD:3
"TCPMAXHALFOPEN"=DWORD:64
"TCPMAXHALFOPENRETRIED"=DWORD:50
"TCPMAXPORTSEXHAUSTED"=DWORD:1
"TCPMAXCONNECTRESPONERETRANSMISSIONS"=DWORD:2
"ENABLEDEADGWDETECT"=DWORD:0
"ENABLEPMTUDISCOVERY"=DWORD:0
"KEEPALIVETIME"=DWORD:300000
"ALLOWUNQUALIFIEDQUERY"=DWORD:0
"DISABLEDYNAMICUPDATE"=DWORD:1

After this, now you have to open the program you downloaded, HardenIt
As your going through the steps HardenIt, check what I have put down (same order)...


- Complete Setup
- Syn Flood/Attack Protection (Good)
- 100 (Recommended for Workstations)
- 80 (Recommended for Workstations)
- 0 (Recommended, protection enables immediately when all ports are exhausted.)
- 2 (Recommended)
- 3 (Recommended)
- Enabled (Recommended)
- Workstation (300000ms or 5 minutes)
- Enabled (Recommended)
- Disabled (Recommended)
- Disabled (Recommended)
- Disabled (Recommended)
- Enabled (Recommended)
- 10 (Recommended)
- 10000 (!Workstations! - 64MB RAM)
- 10 (Recommended)
- Enabled (Recommended)
- 1 (Recommended - do not forward Sorce Routed packets)
- Enabled (Recommended)
- Disabled (Recommended)
- Disabled (Recommended)
- Enabled (Recommended)
- Restrict Anonymous (Level 1 - Recommended)
Does not allow anonymous numeration of SAM accounts and shares.
- Enable SAM restriction (Recommended)
Does not allow anonymous numeration of SAM accounts and shares.
- Disable Everyone Includes Anonymous (Recommended)
Null-session users won't have any rights.
- Retry Count 1 (Recommended)
- Smooth (90 seconds - Recommended)
- Enabled (Recommended)

Once you do this, follow the rest of the directions.


When your done installing HardenIt, it will seem like nothing happened. But really it edited more regedit keys. This will not effect your computer use at all, but it will keep your protected from being DDoS attacked.

This Tutorial was made by....
PBFreak817
JoeyBe11

If posted on other sites, please give credit.
Reply With Quote

Create An Ftp Server On Your Pc

Create An Ftp Server On Your Pc With Serv-u


Requirements:
Serv-U
No-IP.com Website

Quote:
Step 1. Getting a static IP address.
Get a static address for your FTP server. You will want to do this as opposed to using your IP address for several reasons. First, it’s easier keeping up-to-date. Imagine having to change all of your setting every time your IP changed. With No-IP, the No-IP service runs in background on your computer and updates your current IP address with your FTP server’s URL (for example, you get ftp://rkchoolie.serveftp.com). Second reason, you don’t want your IP address posted out there for everyone to see.

1. Go to www.No-IP.com to create a new user account.
2. Fill in the information that is required and the click Register button.
3. Your account has now been created and your account password has been emailed to you.
4. Check your email mailbox and wait for the mail that contains your password
5. Go back to www.No-IP.com and type your email address and password to login to your account.
6. Once in your account, click on Add a host in the left menu
7. Type in the Hostname you want (example: rkchoolie) and pick a Domain from the list (example: ftpserve.com)
8. Check Allow Wildcards and click the Submit button
9. You now have your static address (example: rkchoolie.serveftp.com)
10. Click on your OS link in the Dyn-Update Client in the bottom right menu and follow links to download the client
11. Once downloaded, install the software and type in your email address and password when asked.
12. Finally tick the checkbox near your static address.

You now have a static web address .


Quote:
Step 2. Installing and setting the FTP server
1. Install Serv-U 4.0.
2. Start Serv-U and use the wizard to setup your ftp.
3. Click next until you're asked for an IP address, leave it blank and then click next.
4. Type the domain name you've just registered above (example: preacher.serveftp.com) in the domain name field and then click Next.
5. You are asked if you want to allow anonymous access, select No and then click next.
6. You are then asked to create a named account, check yes and then click next.
7. Type in the user name you wish for this account (example: Harrie) and click next.
8. Type a password for this account (example: $p3c1aL). For security reasons, try to create a password with some letters, numbers and special characters. Then click next.
9. You will then be asked for the Home directory of the account you just created. Select the directory and then click next.
10. Select yes to lock this account to the Home directory. You want to do this so that the user can not go any further up that his home directory. Click next.
11. The account is now set so click finish.

Quote:
Step 3. Configuring user accounts
1. In the left tree-menu, select the account you've just created and then click on the General tab.
2. Check Hide ‘Hidden’ Files.
3. Check Allow only and enter the number one in the box.
4. Set the Max. download speed to what ever you want. If this is an account that many will be using, set it low to save on your bandwidth. I usually have mine set between 10 – 20. If you leave it blank, users will be able to download from you at full bandwidth.
5. Set the Max no. of users to how many you want to be able to log on at one time. This depends on your connection speed but try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6. Now, click on the Dir Access tab.
7. You should see the home folder in there. Highlight it and make your permissions.
8. If you only want users to be able to download check only Read, List, & Inherit.
9. If you want users to be able to upload, but to only one particular folder but not download, click the add button and then select that folder. Now highlight the folder and set these permissions on that folder. Check Write, Append, List, Create, & Inherit. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this special upload folder to be list first, before the home folder.
10. If there is a folder that you don’t want anyone to have access to, but it is inside the home folder, then click the add button and then select that folder. Now highlight the folder and make sure that all checkboxes are left. Once you have made the permissions click on the up arrow that is located at the bottom right-hand corner. You want this no access folder to be listed at the very top.
11. There are many other different sets of permissions you can play with. I just covered your basics.
12. Your server is now set!
13. Try logging on with the username and password and see if it works.