Make Money with Adsense

First you need to find niches where there is some traffic.

You should use the usual tools, such as the
overture inventory keyword data miner, to conduct research on how many searches are done for certain
key phrases (look for sites with at least 1000 searches per month). Don’t aim for keywords and topics that
are highly competitive, look for low competition with *some* traffic. Take for example Jonathan Wold’s
Sump Pumps Information niche. How random is that! Do you even know what a Sump Pump is? I don’t,
but he suspects enough people are searching for sump pump information online and he only needs a
handful of them to click his ads per day.
The key is to find topics that people search for and advertisers use Pay-Per-Click marketing and other
online advertising methods to sell to these people. Your niche content site helps to bring these two groups
together and you take your middle man fee, with the help of the search engines for traffic and advertising
programs for a monetization system.
Always be certain there are monetization possibilities before starting a niche content site otherwise you
will be wasting your time. Look for AdWord campaigns by doing Google searches for the niche you are
considering - if you see several ads down the right column that target the niche then you know advertisers
are paying to reach these markets. To be really thorough, log into AdWords and set some test campaigns
up and see what the bid prices are for your keyword research subjects. If the prices are reasonable then
there probably is some competition for those keyphrases from advertisers running AdWord campaigns.
Once you find a few niches you think have potential search those keyphrases and see what results show
up. If the natural search result sites that turn up are badly optimized (look for low PageRank, poor title
keyphrases and heading tag keyphrases) and you are confident that a site with well optimized content
would quickly jump to the top of the rankings and by quickly I mean about 3-6 months (remember the
Google Sandbox is going to impact how quickly you get high rankings) then you might have your first
candidate for a niche content site.
Scan For Competition
available. I highly recommend the webhost Hostgator . I have one of my niche websites hosted on
Hostgator and it has been a flawless experience with them. I have had absolutely no down time at all with
my Wordpress site hosted on Hostgator, and that is very important for me as I continue in my make
money online pursuits. I need to have my sites up and running all the time.
Choosing the right domain for your niche site its important because you are automatically selling your
customer with the name before they enter your niche site. Imagine if you are promoting a product in the
pet niche that is about dog training, wont it be good to have a domain like dogobedience.com ?
Most often people say i want a short domain name that is easily remembered but the bad news is that
most of those are long gone.
You should not bother yourself about how long the domain is, though i think you stick to most three
words domain that conveys your site motives. Also do not worry if a domain you have in mind is gone but
the .org or .net or you have to add dashes {i.e dog-obedience.com} is available you choose them too.
Think ahead when choosing your domain name, remember its going to be part of your advert campaign
and most of the time this flow is important because you have limited text to put in your campaign.
How To Find Content
At first thought this would probably be the hardest part of using the niche content site technique - how
do you come up with content for a niche site that very likely you have next to no interest in
or experience with? Now if you are not the writing type and can’t waffle on and bang out a few key
pages of content yourself by utilizing what’s already available online, then you may want to try these
options:
Use Private Label Rights articles (recommended) :
Private Label Rights Articles (PLR) are a fantastic way to add new content to your website or blog and fill
up your newsletter or autoresponder. Private label rights give you total rights to products such as
software, articles and eBooks. Unlike resell rights, where you have the right to sell a product, but not
change it in any way, private label rights afford you the right to change the product in any way you like
and claim it for your own.
In other words you can modify the product as you like. You can include links to your products or affiliate
products, change or add any graphics you wish, edit or use the existing content as is and ultimately put
your name on the product as the originator.
Republish Wikipedia content.
Wikipedia is an online encyclopedia contributed to by anyone and if you have ever used the site you know
that it has entries on virtually any topic you can think of. Chances are your obscure niche content site
topic will have some entries in the Wiki and under the GNU Free Documentation License you can
republish the content on your site.
The Importance Of Keyword Click Through Prices
For most niche content sites AdSense and/or Chitika will be the main monetization strategy. These
programs pay on a per click basis and click through prices are calculated based on advertiser demand. The
golden mix is to find a niche with few well established content sites but a lot of advertisers competing to
find customers. This means click through prices will be high but the market is not likely to stay untapped
for long and likely a bunch of competing content sites will pop up. In fact you may never find this
combination.
A more likely scenario is a niche where there are high click prices because of lots of advertisers and a few
well established content sites or moderate to low keyword prices but almost no competition. How you can
succeed in these situations is to be better at search engine optimization than any of the other sites. If your
site pulls more traffic you get more clicks.
The situation you want to avoid is a niche with few advertisers so low click through prices. No matter how
much traffic you get and much you dominate a niche, if there are no advertisers paying to use Google
AdWords you won’t get any AdSense income or it will be 10 cents a day from the one advertiser with no
competition. Bear in mind however that there are general advertisements, for example Chitika can show
cameras, computers and other electronic products that may appeal to a general audience and produce
enough click throughs to make it worthwhile. This is a risky venture though since your niche is not
relevant to your monetization method, the amount of income you earn will like be very random and
inconsistent.

How to dial out of a UNIX System


Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo
HOW TO DIAL OUT ON A UNIX SYSTEM.
---------------------------------
This document makes the assumption that you are currently logged on to the
system and are sitting in a shell environment.
1. First of all we need to locate the L-devices file.
It should be found in the /usr/lib/uucp directory,
but in case it isn't typing:
find / -name L-devices -print
will show you where it is.
If you can't find it then don't worry as we can get
around it, only it will take a bit of trial and error.
2. If you found the L-devices file then we need to list
it by typing:
cat L-devices
If it runs off the screen then type:
cat L-devices | more
This will page the output - space displays the next
page and return will show the next line while q quits.
This file shows us to which serial line (port) the
modems (ACU's) are connected, it also shows when they
can be called and the baud rate.
We are interested in the serial line and the baud rate.
Choose a line with your desired speed and make a note of
the serial line. The speed is shown as 2400,1200,300 etc.
and the serial line as ttynn where nn is a number.
3. If you couldn't find/list the L-devices file then type:
who am i
This will show which serial line you are on, and as you
are on a modem then it's a fair bet that the others are
not too far away. e.g. If you are on line tty07 then
there's a good chance of a modem being on tty06,tty08 or
thereabouts.
4. Now we need to make a direct connection to the modem by
typing:
cu -sbaud -l/dev/ttynn dir
where baud and ttynn are your desired speed and serial
line respectively.
If you couldn't find/list the L-devices file then this is
where the trial and error I told you about comes in.
When you get it right it should come up with 'Connected'.
5. Now we are talking directly to the modem. As a precaution
at this point I suggest saving the modem's current config
by typing:
AT&W
Don't worry if you can't see what you are typing as it is
probably in quiet mode with echo off.
Now restore the factory default settings by typing:
AT&F
Now you can set up the modem as you require it, just as
you would with your own and use it as normal.
When you have finished type:
ATZ
to restore the modem back to it's initial state, then
type:
~.
It should come up 'Disconnected' and you should now be
back in your shell.
-------------------------------
It is probably best to try and log on to a RACE system on an 0800 number
as then it won't cost you a penny to call your favourite BBS's.
If you have any problems or need any UNIX information then send mail to
me on HackerNet and I'll see what I can do for you.
Wishing you all many, many, happy hours of hacking - THE ANALYST.
Downloaded From P-80 International Information Systems 304-744-2253

How to crash AOL

_--=PeEll=--_ (tm) on:

Fighting back against AOL (Assholes On-Line)
Definition: Today I'm going to show you how to make a system crusher that
should kill any computer without a surgeprotecter on their phone lines, and
some that do.
Materials: model rocket launching detonator (you know what I mean), spare
copper wire, electric tape, a power outlet , and some wire cutters.
First step: Look at your detonator, it should have a status light, a
launch button, and two wires coming out the fron with metallic clips on the
end. Now open up the back and take your batteries out.
Second step: Take some wire and wire one strand of copper to the positive
detector in the detonator. Wire the other end of this to the positive side
of a car battery. Wrap electric tape around it so it shock you later. Now
take another wire and wire it around the negative receptor in the detonator.
**DO NOT CONNECT THIS WIRE TO THE BATTERY**
Third step: You should now have two wires coming out the back of your
detonator, one connected to the battery (positive). Now shred the insulation
off the phone line your modem is connected to (no, not the one going toward
your computer). Attach the metal clips on the fron of your detonator to the
phone line. It will take a bit of experimenting to get them in the right
place.
Fourth step : Dial up an access, and when you connect, turn off your
modem, or unplug the phone line from your computer (not from the wall) unless
you want to blow up your own computer. Now carefully check all connections
in your detonator-battery hookup. With a plastic-lined pair of tweezers,
take the negative wire end and wrap it aroung the receptor on the battery.
Then you probably know what to do:
PRESS THE LAUNCH BUTTON!!!

Targets

Try to kill AOLNet. Sprintnet is better (cause of no tracing, and we are
not fighting Sprint (okay, so we are)). A little advice. Get a laptop, bud
box, and an extension cord, and set this thing up away from where you live.

Other ways

Make some homemade C-4, a detonator, and find when tha number is. Call
tha operator and say you have a fone number and no address. Sound confused.
If that doesn't work them use Jolly Rogers method of getting unlistend
numbers. Then bomb there lines, or just there building.

Uses

You could take out that new 28.8 number, or you could take out that 2400
and force them to make a new number. Chances are they will not make a 2400
bps line. Instead they might make another 28.8 line foe ya.

Mail bombs

Mail bomb Guides, TOSAdvisor, Steve Case, TOS Email1, CJs, and HOSTs and
of course that phag name MajorTom (Tom Lichty tha guy who writes those lame
AOL books), CliffStoll (he caught 5 Russian spies and wrote a book), I hate
him. You will lose an account, but then people can't report you to TOS.
Also mail bomb EVERYONE you can. Make an account named like JDoe232978, walk
into a public room (or even better, one of those damn faggot rooms like
M4M4Heat). Just pick a person at random or see which one is tha most phagish
and set your mail bomber at 550. Make tha subject like NEVER ASK FOR MY
PASSWORD!!! Something to make it look like they did something wrong. This
also helps to keep them from reporting you to TOS, and if they do, their mail
box is full. Then let it go. This is not to cause trouble with that person
(okay, so it is) it is to stresses out AOLs mail system. That is why there
are Ghosts, people with tha name Error, or when you are in a PR and 24+
people are there. That is why chain letters is a "Violation of the Terms of
Service." Oh, bite me.

Aqua boxs

AOL is trying to develop a type of Lock and Trace traps like tha F.B.I.
uses. It would be a good ideal to make an aqua box. When I make aqua boxes
I hook it up to another computer or to a Sega, Nintendo, etc. Just to have
tha knowledge that I am playing games with tha Feds.
TOSing

Get a GOOD TOSer. One that works and you canc change what it says.
Menace II AOL is my choice. Tha PW is OL' Dirty Bastard. I also use AOF
(America Off-Line) IM manipulation (it still works) and IM myself anything.
Then I manip. someone who I dislike. Copy it by hitting CRTL+C and then IM a
Guide that is on. Ask him if whoever is on that if XXXXXXX is with tha
billing department. Lead them on. They will ask if he asked foe your PW.
Say yes and hit CRTL+V to paste it there after he explains how to copy and
paste. Make it look like you are lame and new to AOL. Send him tha
manipulated text and he will TOS him/her. Make SuRe that tha person you are
TOSing is on. Have a FrankD8981 kinda name.

That is it. Do this to bring AOL to their knees. DON'T GIVE THIS TO AOL
STAFF!!!

_--=PeEll=--_(tm)

How To Customise Your start Button

First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit Download.com and search there for "Resource Hacker".
After you download it, follow the guide here:

Step 1:

A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
B - You see a Tree of all Resources in this file, expand the "String Table"
C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
E - Quit "Resource Hacker".

Step 2:

A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
D - Replace value of the "Shell" property to "MyStart.exe".
E - Quit "Registry Editor".
F - Restart your system.

Note about Registry Editor:
if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).


AmirBehzad Eslami's site has a handy tool for altering your start button, which makes life much easier, you can find his site here:
h**p://www.startbtn.main-page.com

How To Change A Cmos Battery

First the safety rules

The inside of a computer is a bad place full of electricity and sharp edges.
On the electricity side always when working on you computer make sure that it’s still plugged in to the power socket and the power is turned off, this is to ensure that any static
From you is discharged through the earth. The inside of most computer cases are unfinished metal and has very sharp edges so be careful.

The first signs of a battery failing are:-

1) your clock starts running slowly
2) when you boot (start) your computer it has a problem finding your hardware (no hard drive, no cd rom)

To change the battery you need the following tools

1) a X-point screwdriver
2) an anti-static strap(optional)
3) a new battery (seems logical)

Then unplug all the cables from the back of the computer as you remove them make a note where they came from. (So when you finished you can put them back)

Move the computer somewhere where you can work on it with ease

Remove the cover by locating the screws around the outer edge (back) of the computer
Some computer cases only require you to remove 2 screws on one side then a panel can be removed allowing you access to the computers insides, others you must remove 6 screws and remove the whole case by sliding it to the rear and lifting it off.

Now make sure that you read the safety instructions about static.
Look inside you will see a round silver thing that looks about the size of a 10p piece (quarter). This is the battery itself, carefully lift the retaining clip and slide the battery out. That’s it removed now go to your local computer retailer, electrical retailer (Tandy/Radio shack) taking the old battery with you and get a new battery.

Back to your computer insert the new battery by lifting the clip and sliding the battery in.

Reinstall your case and plug all the cables back (you did remember to label them didn’t you)

Now for the fun part.

You will now need to go into you bios….

Right the bios is the god of your computer.

To access it, when your computer first starts you will see a black screen with white text.

If you look carefully you will see a line that says something like "press del for setup" or some other key (F2 or ESC or tab) this will take you to god's house where you can make lots of changes to the way your machine works.

It is also the place where you can make your nice computer in to a rather expensive door stop so be careful and don’t go playing with anything.

You will now be presented with a blue screen with a lot of options on it,
The one we want is load optimised/default settings.

Press the F10 key and type y the computer should now reboot.

If every thing went well then your computer will now be up and running.



Shizers way: Keep computer running. Lay it on it's side and remove side cover to expose MoBo. Take any thin object, "small screwdriver, knife point, wood shiskabob skewer. Pull back the battery retaining clip. Toss the old battery in the junk recepticle, unless you belong to greenpeace and want to save the earth. Install the new battery. No need to reset bios becasue the compter supplies voltage to the cmos while it is running. Reset or resync clock with internet. Done!

How to clear Bios info 2

How to clear Bios info

READ EVEYTHING BEFORE YOU USE ANY METHOD LISTED BELOW

Basic BIOS password crack - works 9.9 times out of ten
This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



Accessing information on the hard disk
When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.

Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %����� �p������%, %������ �p������%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
Other passwords you may try (for AMI/AWARD or other BIOSes)
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.

Flashing BIOS via software
If you have access to the computer when it's turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have access to the computer, so you'd better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers
The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for "switching a jumper" I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to "brute force" it... trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don't know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn it off, and wait some seconds before to retry.

Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you'll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about one hour to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it. If at first it doesn't work, try to remove the battery overnight.
Important note: in laptop and notebooks you don't have to remove the computer's power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.

Short-circuiting the chip
Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26

Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can't flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

NOTE: Although these are 24-pin chips,
the Dallas chips may be missing 5 pins,
these are unused pins.
Most chips have unused pins,
though usually they are still present.

Dallas DS12885S
Benchmarq bq3258S
Hitachi HD146818AP
Samsung KS82C6818A
This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818.
Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd

Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

Replacing the chip
If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It's a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you'll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you'll then plug the new chip, in the eventuality that you'll have to change it again. If you can't find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer's website to see if there's the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.

Important
Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you'll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn't see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .

Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a "key-disk" in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop (***.bpsoft.com/downloads/index.html) to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for "KEY" followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.

Key protected cases
A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it.

How to clear Bios info

READ EVEYTHING BEFORE YOU USE ANY METHOD LISTED BELOW

Basic BIOS password crack - works 9.9 times out of ten
This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
Get DOS prompt and type:
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart the computer. It works on most versions of the AWARD BIOS.



Accessing information on the hard disk
When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2, or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP, and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then SAVE & EXIT SETUP. Now you have access to the hard disk.

Standard BIOS backdoor passwords
The first, less invasive, attempt to bypass a BIOS password is to try on of these standard manufacturer's backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
Other passwords you may try (for AMI/AWARD or other BIOSes)
LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj
Note that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW when using those keyboards. Also remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.

Flashing BIOS via software
If you have access to the computer when it's turned on, you could try one of those programs that remove the password from the BIOS, by invalidating its memory.
However, it might happen you don't have one of those programs when you have access to the computer, so you'd better learn how to do manually what they do. You can reset the BIOS to its default values using the MS-DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment enter the following commands:
AMI/AWARD BIOS
O 70 17
O 71 17
Q
PHOENIX BIOS
O 70 FF
O 71 17
Q
GENERIC
Invalidates CMOS RAM.
Should work on all AT motherboards
(XT motherboards don't have CMOS)
O 70 2E
O 71 FF
Q
Note that the first letter is a "O" not the number "0". The numbers which follow are two bytes in hex format.

Flashing BIOS via hardware
If you can't access the computer when it's on, and the standard backdoor passwords didn't work, you'll have to flash the BIOS via hardware. Please read the important notes at the end of this section before to try any of these methods.

Using the jumpers
The canonical way to flash the BIOS via hardware is to plug, unplug, or switch a jumper on the motherboard (for "switching a jumper" I mean that you find a jumper that joins the central pin and a side pin of a group of three pins, you should then unplug the jumper and then plug it to the central pin and to the pin on the opposite side, so if the jumper is normally on position 1-2, you have to put it on position 2-3, or vice versa). This jumper is not always located near to the BIOS, but could be anywhere on the motherboard.
To find the correct jumper you should read the motherboard's manual.
Once you've located the correct jumper, switch it (or plug or unplug it, depending from what the manual says) while the computer is turned OFF. Wait a couple of seconds then put the jumper back to its original position. In some motherboards it may happen that the computer will automatically turn itself on, after flashing the BIOS. In this case, turn it off, and put the jumper back to its original position, then turn it on again. Other motherboards require you turn the computer on for a few seconds to flash the BIOS.
If you don't have the motherboard's manual, you'll have to "brute force" it... trying out all the jumpers. In this case, try first the isolated ones (not in a group), the ones near to the BIOS, and the ones you can switch (as I explained before). If all them fail, try all the others. However, you must modify the status of only one jumper per attempt, otherwise you could damage the motherboard (since you don't know what the jumper you modified is actually meant for). If the password request screen still appear, try another one.
If after flashing the BIOS, the computer won't boot when you turn it on, turn it off, and wait some seconds before to retry.

Removing the battery
If you can't find the jumper to flash the BIOS or if such jumper doesn't exist, you can remove the battery that keeps the BIOS memory alive. It's a button-size battery somewhere on the motherboard (on elder computers the battery could be a small, typically blue, cylinder soldered to the motherboard, but usually has a jumper on its side to disconnect it, otherwise you'll have to unsolder it and then solder it back). Take it away for 15-30 minutes or more, then put it back and the data contained into the BIOS memory should be volatilized. I'd suggest you to remove it for about one hour to be sure, because if you put it back when the data aren't erased yet you'll have to wait more time, as you've never removed it. If at first it doesn't work, try to remove the battery overnight.
Important note: in laptop and notebooks you don't have to remove the computer's power batteries (which would be useless), but you should open your computer and remove the CMOS battery from the motherboard.

Short-circuiting the chip
Another way to clear the CMOS RAM is to reset it by short circuiting two pins of the BIOS chip for a few seconds. You can do that with a small piece of electric wire or with a bent paper clip. Always make sure that the computer is turned OFF before to try this operation.
Here is a list of EPROM chips that are commonly used in the BIOS industry. You may find similar chips with different names if they are compatible chips made by another brand. If you find the BIOS chip you are working on matches with one of the following you can try to short-circuit the appropriate pins. Be careful, because this operation may damage the chip.
CHIPS P82C206 (square)
Short together pins 12 and 32 (the first and the last pins on the bottom edge of the chip) or pins 74 and 75 (the two pins on the upper left corner).
gnd
74
|__________________
5v 75--| |
| |
| |
| CHIPS |
1 * | |
| P82C206 |
| |
| |
|___________________|
| |
| gnd | 5v
12 32
OPTi F82C206 (rectangular)
Short together pins 3 and 26 (third pin from left side and fifth pin from right side on the bottom edge).
80 51
|______________|
81 -| |- 50
| |
| |
| OPTi |
| |
| F82C206 |
| |
100-|________________|-31
|| | |
1 || | | 30
3 26

Dallas DS1287, DS1287A
Benchmarq bp3287MT, bq3287AMT
The Dallas DS1287 and DS1287A, and the compatible Benchmarq bp3287MT and bq3287AMT chips have a built-in battery. This battery should last up to ten years. Any motherboard using these chips should not have an additional battery (this means you can't flash the BIOS by removing a battery). When the battery fails, the RTC chip would be replaced.
CMOS RAM can be cleared on the 1287A and 3287AMT chips by shorting pins 12 and 21.
The 1287 (and 3287MT) differ from the 1287A in that the CMOS RAM can't be cleared. If there is a problem such as a forgotten password, the chip must be replaced. (In this case it is recommended to replace the 1287 with a 1287A). Also the Dallas 12887 and 12887A are similar but contain twice as much CMOS RAM storage.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21 RCL (RAM Clear)
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

NOTE: Although these are 24-pin chips,
the Dallas chips may be missing 5 pins,
these are unused pins.
Most chips have unused pins,
though usually they are still present.

Dallas DS12885S
Benchmarq bq3258S
Hitachi HD146818AP
Samsung KS82C6818A
This is a rectangular 24-pin DIP chip, usually in a socket. The number on the chip should end in 6818.
Although this chip is pin-compatible with the Dallas 1287/1287A, there is no built-in battery.
Short together pins 12 and 24.
5v
24 20 13
|___________|____________________|
| |
| DALLAS |
|> |
| DS12885S |
| |
|__________________________________|
| |
1 12
gnd

Motorola MC146818AP
Short pins 12 and 24. These are the pins on diagonally opposite corners - lower left and upper right. You might also try pins 12 and 20.
__________
1 -| * U |- 24 5v
2 -| |- 23
3 -| |- 22
4 -| |- 21
5 -| |- 20
6 -| |- 19
7 -| |- 18
8 -| |- 17
9 -| |- 16
10 -| |- 15
11 -| |- 14
gnd 12 -|__________|- 13

Replacing the chip
If nothing works, you could replace the existing BIOS chip with a new one you can buy from your specialized electronic shop or your computer supplier. It's a quick operation if the chip is inserted on a base and not soldered to the motherboard, otherwise you'll have to unsolder it and then put the new one. In this case would be more convenient to solder a base on which you'll then plug the new chip, in the eventuality that you'll have to change it again. If you can't find the BIOS chip specifically made for your motherboard, you should buy one of the same type (probably one of the ones shown above) and look in your motherboard manufacturer's website to see if there's the BIOS image to download. Then you should copy that image on the chip you bought with an EPROM programmer.

Important
Whether is the method you use, when you flash the BIOS not only the password, but also all the other configuration data will be reset to the factory defaults, so when you are booting for the first time after a BIOS flash, you should enter the CMOS configuration menu (as explained before) and fix up some things.
Also, when you boot Windows, it may happen that it finds some new device, because of the new configuration of the BIOS, in this case you'll probably need the Windows installation CD because Windows may ask you for some external files. If Windows doesn't see the CD-ROM try to eject and re-insert the CD-ROM again. If Windows can't find the CD-ROM drive and you set it properly from the BIOS config, just reboot with the reset key, and in the next run Windows should find it. However most files needed by the system while installing new hardware could also be found in C:WINDOWS, C:WINDOWSSYSTEM, or C:WINDOWSINF .

Key Disk for Toshiba laptops
Some Toshiba notebooks allow to bypass BIOS by inserting a "key-disk" in the floppy disk drive while booting. To create a Toshiba Keydisk, take a 720Kb or 1.44Mb floppy disk, format it (if it's not formatted yet), then use a hex editor such as Hex Workshop (***.bpsoft.com/downloads/index.html) to change the first five bytes of the second sector (the one after the boot sector) and set them to 4B 45 59 00 00 (note that the first three bytes are the ASCII for "KEY" followed by two zeroes). Once you have created the key disk put it into the notebook's drive and turn it on, then push the reset button and when asked for password, press Enter. You will be asked to Set Password again. Press Y and Enter. You'll enter the BIOS configuration where you can set a new password.

Key protected cases
A final note about those old computers (up to 486 and early Pentiums) protected with a key that prevented the use of the mouse and the keyboard or the power button. All you have to do with them is to follow the wires connected to the key hole, locate the jumper to which they are connected and unplug it.

HOW TO CAPTURE STREAMING MEDIA

HOW TO CAPTURE STREAMING MEDIA

many websites (http://ww.smashits.com) stream songs and videos
people believe they cannot be downloaded, quite why i dont know. they kinda think there is no file present to dwnld

once the file is located it can then be retrieved by nettransport
nettransport is able to dwnld any file whether ftp or rtsp etc

1. Download Project URL Snooper 1.02.01 from http://rain66.at.infoseek.co.jp/
2. Install URL Snooper (and WinPcap together)
3. Don't run URL Snooper when it is done installing
4. Restart computer
5. Open Project URL Snooper
6. Click on the General Options Tab
7. user posted image
8. Chose a network adapter
9. Now click on the search tab
10. Click Sniff Network
11. Go to a webpage and you should see some results in the results list
12. If nothing is appearing then chose another network adapter, until one works

13. Now you are ready to begin searching
14. Click the "Hide Non-Streaming URLs" option to hide all http:// references and only show URLs corresponding to streaming audio/video (rtsp, pnm, wma, etc.)
15. Then click Sniff Network
16. Your links should appear as you begin streaming your file
17. Select your desired stream user posted image
18. usually rm file user posted image
19. On the bottom there should be the link which you simply copy user posted image

20. Download nettransport from here ftp://down_transport:123@s1.5fox.com/NT2Setup_multi.EXE or
ftp://nettransport:nettransport@61.153.24...Setup_multi.EXE
http://lycos26486.l97.lycos.com.cn/download.htm

21. Install it
22. Click on new
23. Paste link

now you should be able to download any file
if u need ne help
jus ask
i think dialups may have problems

How To Bypass Web Filters, tutorial

How to bypass web filters



There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers:
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• http://www.aliveproxy.com
• http://www.multiproxy.org
• http://www.publicproxyservers.com/index.html
• http://www.tehbox.com/proxy
• http://www.proxz.com
• http://www.proxy4free.com/index.html
• http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• http://babelfish.altavista.com
• http://world.altavista.com
• http://translation.langenberg.com
• http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• http://proxify.com]http://proxify.com
• http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
• http://www.guardster.com/]http://www.guardster.com/
• http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
• http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
• https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
• http://www.anonymizer.ru]http://www.anonymizer.ru
• https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
• http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
• http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
• http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
• http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
• http://www.steganos.com]http://www.steganos.com
• http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
• http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
• http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.



How to Bypass BIOS Passwords

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

how to burn quicker in windows xp

windows xp has burning software built in which can cause problems sometimes when burning with other programs.

you can turn windows xp burning tool off like this.


Go to "administrative tools" in the control panel.

In the "services" list, disable the IMAPI CD-Burning COM service.

How To Boot Xp Faster (updated)

First of all, this tweak only apply to those who only have one HDD on their primary IDE channel (nothing else on device 0 or 1) and a CD-ROM and/or DVD-ROM on the secondary IDE channel. Each time you boot Windows XP, there's an updated file called NTOSBOOT-*.pf who appears in your prefetch directory (%SystemRoot%Prefetch) and there's no need to erease any other files as the new prefetch option in XP really improves loading time of installed programs. We only want WindowsXP to boot faster and not decrease its performance. Thanks to Rod Cahoon (for the prefetch automation process...with a minor change of mine) and Zeb for the IDE Channel tweak as those two tricks, coupled together with a little modification, result in an EXTREMELY fast bootup:

1. Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.

WindowsXP should now boot REALLY faster.

How to build a black box

How to build a black box?

I found this tutorial quite a long time ago and I don't know if it still works. Nevertheless , it might be interresting to read, you might even learn something from it! I would have gladly given credit to it's author but won't since I have no idea who he is. So here is his tutorial that remained unchanged ( I hope!):

A BLACK BOX
is a device that is hooked up to your phone that fixes your phone so that when you get a call, the caller doesn't get charged for the call. This is good for calls up to 1/2 hour, after 1/2 hour the phone Co. gets suspicious, and then you can guess what happens.

What this little beauty does is keep the line voltage from dropping to 10v when you answer your fone. The line is instead kept at 36v and it will make the fone think that it is still ringing while your talking. The reason for the 1/2 hour time limit is that the
phone CO. thinks that something is wrong after 1/2 an hour of ringing.

All parts are available at Radio Shack. Using the least possible parts and arangement, the cost is $0.98 !!!! And that is parts for two of them! Talk about a deal! If you want to splurge then you can get a small PC board, and a switch. There are two
schematics for this box, one is for most normal fones. The second one is
for fones that don't work with the first. It was made for use with a Bell
Trimline touch tone fone.

** Schematic 1 for most fones **
** LED ON: BOX ON **

FROM >--------------------GREEN-> TO
LINE >--! 1.8k LED !---RED--> FONE
!--///--!>--!
! !
------>/<-------
SPST



Parts: 1 1.8k 1/2 watt resistor
1 1.5v LED
1 SPST switch

You may just have two wires which you connect together for the switch.


** Schematic 2 for all fones **
** LED ON: BOX OFF **

FROM >---------------GREEN-> TO
LINE >------- ---RED--> FONE
! LED !
-->/<--!>--
! !
---///---
1.8k
�Parts: 1 2 watt resistor
1 1.5v LED
1 DPST switch


Here is the PC board layout that I recommend using. It is neat and is very easy to hook up.

Schematic #1 Schematic #2

************** ****************
* * * ------- *
* ----- * * ! ! *
* ! ! * * ! *
* RESISTOR ! * * ! ! ! *
* ! ! * * ! ! / *
* -------- ! * * ! ! *
* ! ! * * ! ! / *
* --SWITCH-- * * ! ! *
* ! ! * * ! ! / *
L * ! ! * F L * ! ! ! * F
I>RED- -RED>O I>RED- ---RED>O
N>-----GREEN---->N N>-----GREEN------>N
E * h * E E * * E
************** ****************

Once you have hooked up all the parts, you must figure out what set of wires go to the line and which go to the fone. This is because of the fact that LED's must be put in, in a certain direction. Depending on which way you put the LED is what controls what wires are for the line & fone.

How to find out:

Hook up the box in one direction using one set offor line and the other for fone.

*NOTE* For Model I switch should be OFF.
*NOTE* For Model ][ switch should be set to side connecting the led.

Once you have hooked it up, then pick up the fone and see if the LED is on. If it is, the LED will be lit. If is doesn't light then switch the wires and try again. Once you know which are which then label them. *NOTE* - If neither directions worked then your
�lable the switch in its current position as BOX ON.

How to use it:

The purpose of this box is for poeple who call you not to pay so it would make
sence that it can only be used to receive! calls. When the box is *ON* then you may only recieve calls. Your fone will ring like normal and the LED on the box will flash. If you answer the fone now, then the LED will light and the caller will not be charged. Hang up the fone after you are done talking like normal. You will not be able to get a dial-tone or call when the box is on, so turn the box *OFF* for normal calls. I don't recommend that you leave it on all the time, as you don't want it to answer when Ma Bell calls!

Hope it brought something to those who read it.

XIII
numberXIII@Phreaker.net

How To Backup Ps2 Games

Hi guys...here I found a tutorial of another Foum:
INFO: Text didn't write by me!


Okay, these are some methods to backup PS2 titles and Xbox titles, in order to play a backup you need a modchip of some sort, I have also included a tutorial on boot methods. Follow any one of these instructions to fit your needs. You can tell what format the PS2 title is by looking at the written side of the disc, DVD's are Silver and CD's are Purple. The DVD backup methods here consist of reading the image to the hard drive then burning it to the media for an easier backup, this depends on your hardware and it?s setup. I say that because the proper setup would be to have the Reader and Writer on separate IDE cables. This allows no cross information when doing Disc to Disc/On the fly copying. But, since most people would not know how to check or fix this, I suggest reading the image to your Hard Drive and then burning from there. *A little useful trick*, If the DVD backup "image" is small enough in size you can fit it onto a CD-R (80 minute or larger if need be) instead of using a more expensive DVD-R. I have done this succesfully using Prassi and the first tutorial for it below. In addition a DVD Movie backup will play on a PS2/Xbox without a chip. As I get more info I will update. Dexter


PS1/PS2 CD backup tutorials


Using CloneCD (v4.x.xx) for PS1/PS2

1. Start CloneCD
2. Select "Copy CD"
3. Select your Reader, press Next
4. Select "Game CD", press Next
5. Select/Deselect your options here (on the fly, cue or delete) then press Next
6. Select your Writer, press Next
7. Select your burn speed and "Game CD"
8. Press "OK" to begin


Using Alcohol 120% for PS1/PS2

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader & Read Speed
4. Select or Deselect ?Copy current disc on the fly?
5. For Datatype select which console PS1 or PS2, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Make sure the Datatype selected is the same you chose above
9. Press Start to begin


PS2 DVD backup tutorials


Using Prassi

1. Start Primo
2. Select "go to full application"
3. Right Click the drive that has your original in it
4. Select "build global image" and choose a path for the image (preferably on an NTFS opsys)
5. After the image is extracted go to next step
6. Choose the 3rd disc icon from the left *or* click file, new job, Global/Other Image
7. Then just burn the .gi (global image) of the game


This next way has one less step which saves some time because once you press record it does everything by itself (if you have a DVD reader and DVD Writer)

1. Start Primo
2. Use the "PrimoDVD Starter" (it's easier, and less confusing)
3. Choose "disc copy"
4. Select your Reader and Also your Writer
5. Select "make a temp image on HD..."
6. Select your burn speed and then record to begin


Using Nero

1. Start Nero, Use the Wizard (for easy use)
2. Select "DVD" then select Next
3. Select "Copy a DVD" then select Next
4. Select your source drive
5. Check OFF "copy on the fly" then select next
6. Select your write speed
7. Select either "Test", "Test and Burn" or "Burn"
8. Press "Burn" to begin

This next way is without the Wizard

1. Start Nero, and select "File" then "New..."
2. On upper left side of the window from the drop down menu select "DVD"
3. Select "DVD Copy" Icon
4. Select "Copy options" tab
5. Check OFF "copy on the fly"
6. Select source drive and read speed
7. If needed Select "Image" tab to choose image directory and select/deselect "delete image..."
8. Select "Burn" tab and choose your settings
9. Press "Copy" to begin


Using Alcohol 120%

1. Start Alcohol 120%
2. Select ?Copy Wizard?
3. Select your Reader
4. For ?Separate Image file every:? choose ?Never Separate?
5. Select or Deselect ?Copy current disc on the fly?, press Next
6. Select your Image location and Name for it, press Next
7. Select you Writer, Write Speed and anything else you feel you might need
8. Select or Deselect ?Delete image file after recording?
9. Press Start to begin


XBOX backup tutorials


Xbox original games are burned from the outside in. The only way to backup a title is to have a modchip like X-exuter (best), Enigma, or Xodus/Matrix. You also have to flash the bios and have a CD program inserted or installed into the X-Box named EVO-X (this allows you to assign the X-Box an IP address). The game has to be stored on the X-Box's HD, this allows you to file transfer the title to your PC using an ftp program like FlaxhFXP (best) or similar. From there you use a burning application to make the backup. Some applications allows you to "drag & drop" right from the Xbox or you can build an ISO of the image then burn to CD-R/W or DVD-R/W backup. (I will update this to show steps as soon as I have a minute)


Modded PS2 with or without Action Replay/GameShark CD & DVD backup booting methods

PS2 with NeoKey/Sbox & AR/GS, PS1 CD backup booting

1. Turn on PS2 and NeoKey/Sbox
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with NeoKey/Sbox & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot

* Note - Neokey will not play DVD-R!
* Note - Old versions of AR2/GS2 you might need to press R1+O instead of X to boot games


PS2 with Neo 2.2, PS1 CD backup booting

1. Turn on PS2
2. Press Eject
3. Insert PS1 CD backup
4. Press reset
5. PS2 tray will close
6. PS1 CD backup will now boot


PS2 with Neo 2.2 & AR/GS, PS2 CD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc
4. At the AR/GS menu, select Start Game, With/Without codes
5. Eject and swap to your PS2 CD backup and press X.
6. Screen will change and game will now boot


PS2 with Neo 2.2 & AR/GS, PS2 DVD backup booting

1. Have AR/GS dongle in a memory card slot
2. Power on your PS2
3. Insert AR/GS disc, close tray
4. Power off your PS2, wait a few seconds
5. Press and Hold Reset button to load AR/GS
6. At the AR2/GS2 menu, press EJECT while still holding Reset
7. Swap AR/GS disc for an Original-TOC-DVD* and wait 10 seconds
8. Select "AR/GS Codes"
9. Highlight "Add new code" and press X to get to the next screen
10. Press X three times. You will see "Updating code list please wait" each time)
11. Press "Start" on controller
12. Select "Without codes", press X
13. Then Press X again, and immediately release the Reset button, you will see "Updating code list please wait"
14. The PS2 tray will eject allowing you to swap Original-TOC-DVD* for DVD backup and then close on it?s own
15. Screen will change and game will now boot

* Note - "Original-TOC-DVD" is an original DVD that is a larger file size than the backup
* Note ? For a shortcut make a few ?Add new codes? and after step 8 just highlight one of them and press square to delete it, then proceed on with step 11

PS2 with Messiah

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


PS2 with Magic 2, 3 or 3.5

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.


Ps2 with Apple Mod

1. PSX Backups will boot directly.
2. PS2 CD-R Backups will boot directly.
3. PS2 Unpatched EA backups will boot directly.
4. PS2 DVD-R Backups will boot directly.[CODE]

How to Back Up the Registry

Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.


How to Export Registry Keys

Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.


How to Restore the Registry

To restore registry keys that you exported, double-click the .reg file that you saved.

How Phone Phreaks are Caught


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # HOW PHONE PHREAKS ARE CAUGHT #
# from 2600 magazine V4 #7 July 1987 #
# written by NO SEVERANCE #
# typed by G. A. ELLSWORTH #
# #
#()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(#

Until about four months ago, I worked for a large long distance company. I was given the pink slip because some guy in my office found out that I did a little hacking in my spare time. It seems that most companies just aren't into that anymore. I feel I should do all I can to keep phreaks from getting caught by the IC's(Independent Carriers or Interexchange Companies). Remember: a safe phreak is an educated phreak.
When you enter an authorization code to access a long distance company's network there are a few things that happen. The authorization code number you enter is cross referenced in a list of codes. When an unassigned code is received the switch will print a report consisting of the authorization code, the date and time, and the incoming trunk number (if known) along with other miscellaneous information.
When an authorization code is found at the end of a billing cycle to have been "abused" in the switch, one of two things is done. Most of the time the code is removed from the database and a new code is assigned. But there are times when the code is flagged "abused" in the switch. This is very dangerous. Your call goes through, but there is a bad code report printed.(this is similar to an unassigned code report, but it also prints out the number being called.) You have no way to know this is happening but the IC has plenty of time to have the call traced. This just goes to show that you should switch codes on a regular basis and not use one till it dies.

ACCESS

There are several ways to access an IC's network. Some are safe and some can be deadly.
FEATURE GROUP A (FGA). This is a local dial-up to a switch. It is just a regular old telephone number (for example 871-2600). When you dial the number it will ring (briefly) and give a dial tone telling you to proceed. There are NO identifying digits (i.e. your telephone number) sent to a switch. The switchis signaled to give you a dial tone from the ringing voltage alone. The only way you could be caught hacking codes on an FGA would be if Telco (your local telephone company) were to put an incoming trap on the FGA number. This causes the trunk number your call came over to be printed out. From the trunk number Telco could tell which central office (CO) your call was coming from. From there Telco could put an outgoing trap in your CO which would print the number of the person placing the call to that number--that is provided that you are in an ESS or other Electronic Switch. This is how a majority of people are caught hacking codes on a FGA access number.
Next down the line we have Feature Group B (FGB). There are two FGB signalling formats called FGB-T and FGB-D. All FGBs are 950-XXXX numebers and Ihave yet to find one that doesn't use FGB-T format.
When you dial an FGB number your call can take two paths: 1) Large COs havedirect trunks going to the different IC's. This is more common in Electronic offices. 2) Your call gets routed through a large switch called a tandem, whichin turn has trunks to all the ICs.
When you dial an FGB-T number the IC's switch receives: KP+ST
This prompts the switch to give you a dial tone. The IC gets no informationregarding your phone number. The only thing that makes it easier to catch you is that with a direct trunk from your central office when you enter a bad code the IC knows what office your coming from. Then it's just a matter of seeing who is calling that 950 number.
On the other hand, when you dial an FBG-D number the switch receives:

KP+(950-XXXX)+ST followed by

KP+0+NXX-XXXX+ST or KP+0+NPA

NXX-XXXX+ST

The first sequence tells that there is a call coming in, the 950-XXXX (optional) is the same 950 number that you call. The second sequence contains your number (ANI-Automatic Number Identification). If the call comes over the trunk directly from your CO it will not have your NPA (Area Code). If the call is routed through a tandem it will contain your NPA number. FGB-D was originallydeveloped so that when you got the dial tone you could enter just the number youwere calling and your call would go through; thus alleviating authorization codes. FGB-D can also be used as FGB-T, where the customer enters a code but the switch knows where the call is coming from. This could be used to detect hackers, but has not been done, yet at least not to my switch.
FGB-D was the prelude to FEATURE GROUP D (FGD). FGD is the heart of Equal Access. Since FGD can only be provided by electronic offices, equal access is only available under ESS (or any other electronic office). FGD is the signalling used for both 1+ dialing (when you choose an IC over AT&T) and 10XXX dialing. The signalling format for FGD goes as follows:

KP+II+10D(10 digits)+ST followed by

KP+10D+ST

The first sequence is called the identification sequence. This consists of KP. information digits(II), and the calling party's telephone number with NPA (10D ANI) finished up with ST. The second address seqeunce has KP, the called number (10D) followed by ST. There is a third FGD sequence not shown here whichhas to do with international calling--I may deal with this in a future article. When the IC's switch receives an FGD routing it will check the information digits to see if the call is approved and if so put the call through. Obviouslyif the information digits indicate the call is coming from a coin phone, the call will not go through.

This is a list of information digits commonly used by Bell Operating Companies.
Code Sequence Meaning
00 identification Regular line, no special treatment
01 identification ONI(Operator Number Identification) mulitparty lines
02 identification ANI failure
06 identification Hotel or Motel
07 identification Coinless,hospital,inmate etc.
08 identification InterLATA restricted
10 address 10X test call
13 international 011-plus:direct distance dialed
15 international 01-plus:operator assisted
27 identification Coin
68 identification InterLATA-restricted hotel or motel
78 identification InterLATA-restricted hospital, coinless, inmate etc.
95 address 959-XXXX test call

There is a provision with FGD so when you dial 10xxx# you will get a switchdial tone as if you dial a 950. Unfortunately, this is not the same as dialing a 950. The IC would receive:

KP+II+10D(ANI)+ST
KP+ST

The KP+ST gives you the dial tone, but the IC has your number by then.

800 NUMBERS

Now that we have the feature groups down pat we will talk about 800 numbers. Invisible to your eyes, there are two types of 800 numbers. There are those owned by AT&T--which sells WATS service. There are also new 800 exchanges owned by the IC's. So far, I believe only MCI, US SPRINT, and WesternUnion have bought there own 800 exchanges. It is very important not to use codes on 800 numbers in an exchange owned by an IC. But first...
When you dial an AT&T 800 number that goes to an IC's switch the following happens. The AT&T 800 number is translated at the AT&T switch to an equivalent POTS (Plain Old Telephone Service). This number is an FGA number and as stated before does not know where you're calling from. They might know what your general region is since the AT&T 800 numbers can translate to different POTS numbers depending on where you're calling from. This is the beauty of FGA and AT&T WATS but this is also why it's being phased out.
On the other hand, IC-owned 800 numbers are routed as FGD calls--very deadly. The IC receives:

KP+II+10D+ST

KP+800 NXX XXXX+ST

When you call an IC 800 number which goes to an authorization code-based service, you're taking a great risk. The IC's can find out very easily where you're calling from. If you're in an electronic central office your call can godirectly over an FGD trunk. When you dial and IC 800 number from a non-electronic CO your call gets routed through another switch, thus ending up with the same undesirable effect.
MCI is looking into getting an 800 billing service tariffed where a customer's 800 WATS bill shows the number of everyone who has called it. The way the IC's handle billing, if they wanted to find out who made a call to their800 number, that information would be available on billing tapes. The trick is not to use codes on an IC owned 800
The way to find out who owns an 800 exchange is to call 800-NXX-0000 (NXX being the 800 exchange). If this is owned by AT&T you will get a message saying, "You have reached the AT&T Long Distance Network. Thank you for choosing AT&T. This message will not be repeated." When you call an exchange owned by an IC you will usually get a recording telling you that your call cannot be completed as dialed, or else you will get a recording with the name ofthe of the IC. If you call another number in an AT&T 800 exchange (i.e. 800-NXX-0172) the recording you get should always have an area code followed by a number and a letter, for example, "Your call cannot be completed as dialed. Please check the number and dial again. 312 4T." AS of last month, most AT&T recordings are done in the same female voice. An MCI recording will tell you to"Call customer service at 800-444-4444" followed by a switch number ("MCI 20G"). Some companies such as US Sprint, are redesigning their networks. Since the merger of US Telecom and GTE Sprint, US Sprint has had 2 seperate networks. The US Telecom side was Network 1 an dthe GTE side was Network 2. US Sprint will be joining the two, thus forming Network 3. When Network 3 takes effect there will be no more 950-0777 or 10777. All customers will have 14 digit travel cards (referred to as FON cards, or Fiber Optic Network cards) based on their telephone numbers. Customers who don't have equal access will be given seven digit "home codes". These authorization codes may only be used from your home town or city. The access number they will be pushing for travel code service will be 800-877-8000. This cutover was supposed to be completed by June27th, 1987 but the operation has been pushed back.
One last way to tell if the port you dialed is in an IC's 800 exchange is if it doesn't ring before you get the tone. When you dial an FGA number it willring shortly but when you dial 10XXX# you get the tone right away. Last but notleast, I will provide you with a list of 800 exchanges that are owned by IC's. Amajority of them are owned by MCI.

1800-XXX-....
MCI

XXX= 234,274,283,284,288,289,333365,444,456,627,666,678,727,759,777,825,876,888,937,950,955,999

US SPRINT

XXX= 347,366,699,877

WESTERN UNION XXX= 988

And to avoid confusion, these are the AT&T 800 exchanges:

XXX= 202,212,221,222,223,225,227,228,231,232,233,235,237,238,241,242,243,245,247,248,251,252,253,255,257,258,262,263,265,267,268,272,282,292,302,213,321,322,323,325,327,328,331,332,334,336,338,341,342,343,344,345,346,348,351,352,354,356,358,361,362,363,367,368,372,382,387,392,402,412,421,422,423,424,426,428,431,432,433,435,437,438,441,442,443,445,446,447,448,451,452,453,457,458,461,462,463,456,468,471,482,492,502,512,521,522,523,524,525,526,527,528,531,532,533,535,537,538,541,542,543,544