HOW TO MANUAL - THE END OF ...

pdf > download > ebook > pobieranie > do ÂściÂągnięcia

HOW TO MANUAL - THE END OF DELETERS(1), Tutoriale, 1000 Tutoriali na każdy temat

[ Pobierz całość w formacie PDF ]
HOW TO MANUAL - THE END OF DELETERS"- - = W A R E Z P I R A T E Z = - -HOW TO MANUAL - THE END OF DELETERS===================================CREATED BY: [Piratez] 04/11/01TABLE OF CONTENTS=================Title Line1. Introduction_______________________________________________________232. Invisible Directories______________________________________________363. Inaccessable Directories___________________________________________834. Smart Directories__________________________________________________1355. Undeletable Files__________________________________________________1686. Ultimate Protection________________________________________________1997. FAQ________________________________________________________________2288. Contacts___________________________________________________________2509. Credits____________________________________________________________256Introduction============This doucmentation should not be used to exploit webservers. Some of thetechniques used here have certain outputs that can crash old servers makingthem unusable. Throughout this manual, techniques will be passed on fromexploits found in the 'windows' OS. That 'ACTUALLY' helps in the preventionof deletion. There are lots of methods in stopping a deleter, without theANY restrictions set on the server but most have some weak point. Aftercomming across foure new techniques, making a folder 'invisible' orundetectable from an ftp client LIST fuction. Making folders/directoriesinaccessable and clone prevention, creating smart directories which slowsdown the users attempt. I'm sure most users would thank me for this,'undeletable files'. After experiencing rock solid protection and safefiles. I decided to document it for future reference of the next generationof software pirates.Invisible Directories=====================The idea of invisiable directoires came about when I came across paths thatwere "/ /example/" and was not listed in the main folder but was still'accessable'. These can be created in all directories without other usersknowing it exists unless being searched for 'MANUALLY', which takes ages atthe present time to search through each folder for "/ /".Creating Invisible Directories------------------------------1. before******************************************************************./pub/./images/./_vti_pvt/./_vti_cnf/./_vti_log/./temp/******************************************************************2. after******************************************************************./ /~/temp/tagged/for/team/warezpiratez/fxp/ <- hidden folder./pub/./images/./_vti_pvt/./_vti_cnf/./_vti_log/./temp/******************************************************************To create the hidden folders, make a new dir. as follows using this method.[backslash][space][backslash][foldername1][backslash][foldername2]...ie. / /foldername1/foldername2/...the 'space' isn't a name but a 'character' that does not get listed,therefore making the directories impossible to view.NOTE: Making the hidden folders several LAYERS/SUB-DIRECTORIES deep isrecommended.ie. / / / /~/temp/tagged/for/ /team/warez/ /piratez/fxp/meaning.This technique is not 'anti-deletion proof' but hidden from deletion proof!WinkRead more to find out how to combine ALL THREE TECHNIQUE to make it'REMOTELY' impossible to delete. Please note the 'quotes', REMOTELY in asense that remote/local host. The 'siteadmin' can still 'delete' the folder"if he's around that is Smile"Inaccessable Directories========================Inaccessable directories prevents the user from 'entering' the folderperiod. The user will not be able to enter the folders unless knowing the'entire' remote path.Creating Inaccessable Directories----------------------------------1. before**************************************************************************************************************./temp/tagged/for/team/warezpiratez/fxp/./pub/./images/./_vti_pvt/./_vti_cnf/./_vti_log/./temp/**************************************************************************************************************2. after**************************************************************************************************************./COM1 / temp/tagged/for/team/warezpiratez/fxp/ <- inaccessable directories,due to 'COM1' former windows bug../pub/./images/./_vti_pvt/./_vti_cnf/./_vti_log/./temp/**************************************************************************************************************To create inaccessable folders, use the following list of 'UNUSABLE NAMES'COM1 COM1 COM3 COM4 (Windows COM PORTS)LPT1 LPT2 LPT3 LPT4 (Windows Printer Ports)AUXNULMake a new folder "COM1[space][backslash][space][backslash]ie. /COM1 / /NOTE: This makes the folder inaccessable, even to the siteadmin.(unlessaccessed from DOS, local with access to the machine.)To use the dir. Create a new folder called"COM1[space][backslash][space][foldername1][backslash][foldername2]ie. /COM1 / / ~/temp/tagged/NOTE: This folder is still inaccessable, if a user attempts to enter it. Togain access to the folder, the 'full path' must be known. To enter thefolder use the RAW command 'CWD' change dir. path. to enter the folder.ie. CWD /COM1 / / ~/temp/tagged/ and voila the folder is usable and working.TIP: Creating the folder 'several' LAYERS/SUB-DRIECTORIES deep. It isimpossible to enter.Smart Directories=================This technique involves, the creation of directories that are 'COPYRIGHT' WinkHow's that for a simple description. The idea is to create directories thatwould contain [peroids] thorough each of the subdirectories or segmenets.The use of this is quite sipmle, note the word 'COPY'RIGHT. Most users usethe ftp://login :password at ip :port/path/ format for faster access to an ftp.Creating Smart Directories--------------------------To create 'smart' directories. Make the folder names of each sub directoriescontain a period before, inside, and after words within the subdirectoriescreating a fake 'file' recognition. The Widows based clients will assume thefolders to be files with windows using its 8.3 format for file names1. before**************************************************************************************************************ftp://anonymous@anonymous@123.456.789:21/temp/tagged/for/team/warezpiratez/fxp/**************************************************************************************************************2. after**************************************************************************************************************ftp://anonymous@anonymous@123.456.789:21/temp/tagged ./for . /team. /. warez.piratez/fxp**************************************************************************************************************NOTE: Be as creative as possible with the dot formation, to prevent COPYINGof all folders through each directories. The idea is to make the directoriesact as file extensions therefore when copied, it will be 'queued'and the user has to enter the directories MANUALLY. Other 'SYMBOLS' can beused NOT ONLY just periods. But I find this most common, if the creatorintends to create a catch phrase 'memorable' to him alone.**************************************************************************************************************QUEUE: 1. /temp/tagged ./for . /team. /. warez .piratez/fxp <- result offolder extensions**************************************************************************************************************Undeletable Files=================Sad that we had to resolve to this but, this might be the end of deletion aswe speak. I find no other method out there that can accomplish this taskexcept setting restrictions from the server. This method involves the filebeing self-protected. Meaning the files are 'accessable'/'downloadable' butcan NOT be deleted. The idea is to make the file corrupted/crash making it'in use'.Creating Undeletable Files--------------------------To create a self protected file, rename the entire file including theextensions to the follwoing formatfilename[space][period]/[space]/ ie. filename ./ / The / / in the name asshown above in the previous exampleof creating invisible directories makes the .extesion impossible to view onthe pub as a windows recognized mimebut, once dowloaded it will be shown and accessable. How's that for wits.Wise up deleters, ~censored~ off!1. before**************************************************************************************************************warezpiratez.rar <- rar mime, winrar.**************************************************************************************************************2. renaming**************************************************************************************************************warezpiratez ./ /**************************************************************************************************************3.**************************************************************************************************************warezpiratez <- unknown file(undeletable,downloadable) <- file will take thecorrect mime format on localhost**************************************************************************************************************Ultimate Protection===================The ultimate protection is OBVIOULY, YOUR SELF and YOUR wits against thedeleters. Use private FTPs, getfast sites T1+, but in this case, it would be the combination of all fourtechniques. Using them into one major andthoughtout plan.Creating The Ultimate ... [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • chiara76.opx.pl
  •