Jump to content


Most Liked Content


#360356 Has everyone been down repped or is it just me?

Posted by Powermaniac7 on 11 February 2012 - 08:01 AM

Hi all,

Been busy for a while and was distracted by other facets of life. Signed in today was reading some of the posts to see if anything major or interesting has happened and not much has changed as I expected (no offence). So it seems no harm there in being temporarily gone.

Now as I was reading some of the posts and a reply to my "Everything is Assumed" thread I noticed I had been down rep to -6 so I checked the Binary Revolution forum index page where it has a list of where you were down repped and which it was in like each thread over a long past with no replies as to why...I in some ways don't care but was wondering has another spam bot got lose or some dumb-ass, or did I make a thread that offended some community and they say it and one of them joined and down repped me for that. Anyway I was also wondering if this had happened to anyone else as well.

Thanks in advance for any replies.


#357224 Dell Laptop Password Issue ???

Posted by heisenbug on 18 February 2011 - 03:47 PM

Truth is i found the Laptop and intend keeping it but can't access the system without the password. In this case whats the best tool to use to hack the password?


After seeing your post #4, I withdrawal my advice.


After reading your comment #4 I also got really annoyed. I agree with Berzerk on this. Correct me if I am wrong, but it seems you don't know the difference between petty theft and hacking.

Here is what I consider the difference:

HACKING -
  • Taking a computer, and figuring out a way to bypass the password.
  • Disseminating the contents of the drive to find the owner's name, address, and pictures of them to identify them.
  • Being nice and installing programs to help them find their PC if they lose it again.
    • VNC - (to view the system)
    • An SSH server - (to help retrieve their files)
    • An IP beacon - (To say when the PC is online and what the IP address is)
  • Returning the laptop to the owner.
  • Occasionally checking in on the PC to make sure the system is ok, and they didn't lose it again. (What a good citizen!!!)

PETTY THEFT -
  • Not using google to find a simple kiddie script.
  • Being an idiot and telling everyone you are committing a crime.



#342859 Take down websites. [Dos tool]

Posted by Aghaster on 19 July 2009 - 08:32 AM

I swear to God that if you ever mature you'll look at this post in a couple of years with SHAME.


#361501 Understanding the Tandem Network

Posted by ThoughtPhreaker on 07 September 2012 - 04:44 AM

Hey Samo! Good to hear from you again. Sorry to give you a wall of text here, there's really no concise way to explain this.

In short, if you want to explore a long distance tandem, your best bet is to use a PIC code. There's a very simple trick that lets you push any destination you want directly into the tandem. We'll use Worldcom as an example, since it works from basically anywhere in the United States.
Ready? Dial 101-0555. That's it; no zero, nothing. What you get next is a dialtone straight from the tandem. In the case of the ex-Worldcom tandems, it's not quite as fun as it could be; it wants an authorization code a-la 950 calling card.

Here's an example of what you might find - http://thoughtphreak..._800223110.flac

That's from a DMS (500, I think) owned by Integra, one of the local CLECs. Most long distance tandems (AT&T's aside - we'll get into that in a bit) don't like terminating toll-free calls, so you'll end up getting weird messages that you'll never be able to hear normally unless your switch loses it's mind. What's so great about this is you're completely free from the dialing restrictions of a normal end office. Want to dial an NXX starting with 1 or 0? A code starting with #? *? There's nothing standing in your way. Sprint in particular stuck a speed dial function on their tandem for some weird reason in the #xx range. #99+anything seems to be it's own little exception - it'll wait for a very large amount of digits before eventually giving you a generic CBCAE recording. This might indicate they're hiding something else here.

There's one downside to this technique; if you're not subscribed to a carrier, they won't always let you play with the tandem. ex-MCI (0222) and Sprint are a couple good examples of this, but Sprint will give you a cool message as a consolation prize. Depending on your area, you might have better luck too. For example, the Qwest long distance network has a combination of DMS-250 and Sonus switches.

Sonus isn't fond of letting people have fun on the phone, so you'll just get a generic error recording. If you encounter Global Crossing's Sonus switches, you won't even get a custom recording, you'll get the Sonus stock one. It's worth a laugh if you ever hear it. It's under three seconds, and was clearly made last minute by an engineer.

Speaking of Global Crossing, like MCI/0222, they have a number of Alcatel DEX switches floating around. Dialing 101-0444 will just get you an error, though. The solution? 950-1044! What dialplan they're using is absolutely beyond me, though, so you're on your own there. There's suggestions - like 800-223-1104 (but only without a 1) going to an invalid code recording that suggest it might be for calling card use, but most things I can think to try just go to a CBCAD.

And then we come to AT&T's 0288 network. I'll level with you, this is something I haven't figured out at all. Whenever I've been fortunate to get a dialtone back, it's always been from one of their 5ESS toll tandems. If there's such thing as a pushy phone switch, this is it. It'll let you know right away if it thinks you're doing something wrong. And putting a 1 in front of your destination number is wrong. I haven't had time or an opportunity to just sit down and investigate this, but what I do know is it's unique from a lot of other switches. For one, it'll terminate toll-free calls, but only on specific carriers. I believe just AT&T and Global Crossing toll-frees. Sometimes, it gets a little weirder - like, if you dial 800-244-1111, you'll get a recording from a McLeodUSA DMS. What this means I'm not sure exactly, but my guess is since the 5E toll tandems are responsible for lending a hand in connecting toll-frees, they'll store translations for those toll-frees. If it happens to have one - outdated or not, it'll just use that instead of doing an SMS-800 dip.

Also of note on the AT&T tandems is the 600 NPA. Instead of just intercepting it like any invalid NPA, it'll pass this onto the 4ESS. This might indicate AT&T stashed something in there.

As for your question - is SS7 relevant to phreaks?

Absolutely. The very core practice of phreaking - introducing unorthodox input into the phone network - is fair game to everything, in or out of the speech channel. In the past, we've proved ISDN cause codes can trigger calls to take a different route, and it's been demonstrated that originating a ghost call (in short, an ANI fail on steroids - a call originated with no field other than the destination number) can be enough trouble that phone companies would probably scratch their heads as to whom they should send the bill to. It's understandable that figuring these things out is a challenge, but if anything, that should be a motivator. We're phone phreaks, we've got the resourcefulness to identify a piece of telco hardware by nothing more than vague sounds, and have fun in the process. This should be a reminder that there's always more to explore, and always another limit to break.


#361318 New to network hacking

Posted by phr34kc0der on 08 August 2012 - 02:37 PM

It's a mindset.

You hack to learn, you don't learn to hack.


#357578 YOUR ATM CARD CAN PAY YOU REAL MONEY

Posted by tmwhtkr on 22 March 2011 - 03:33 PM

That sounds like a lot of work! Can I just send you my bank account numbers and social and have you help me out?


#351481 password generator

Posted by SigFLUP on 22 March 2010 - 06:53 PM

So I just logged into binrev using this:
Posted Image
it automatically generates, stores, and types passwords and looks like a usb-keyboard to your computer.

That's a at89c5131 dev-board, this mcu is pretty much an 8051 with usb hardware. I'm probably going to keep touching up the code a little before I start printing boards.


#349663 Spoofcall/Trapcall

Posted by decoder on 21 January 2010 - 10:02 PM

Not to stir shit up, but I certainly agree that this forum shouldn't be a place where fake accounts come along and post allegations which result in people being terminated from their employment.

If "unlucky" was indeed the victim of a violation of his privacy by an employee of trapcall/spoofcard then he should have contacted them.

Also, if Lucky was fired without any evidence of a particular account being accessed by an employee, then he worked for a piece of shit company.

If I were a mod, i would have deleted this thread because even if the allegations were true, there was not a shred of evidence provided, and I do not believe that this is a place for such things. perhaps if "unlucky" simply voiced a concern over the privacy expectations when dealing with a particular service, but he didn't - he made an accusation directed at one man, without anything to back it up.

That being said, it's probably all true. :laugh: ...seriously.


#344876 I need to manipulate my cable tv.

Posted by R4p1d on 06 September 2009 - 11:50 PM

Every time i needed a channel on my cable tv, the company always ask for more money. Is there a way i could manipulate my cabletv without a hole in my pocket? Oh, i have direct tv.


Stop paying for tv service

Look into "FTA" or "FTA Receivers" Etc.

Just read up on the "Free to Air broadcasts"

You just buy a receiver, point your satellite at the orbiting satellite and you can get over 1,000 channels

Free.


#344337 Apparently SCO owns UNIX again

Posted by Colonel Panic on 28 August 2009 - 03:37 AM

SCO doesn't own UNIX, at least not yet. The actual "ownership" and copyright to UNIX is a very complicated issue. All this court decision did was "reverse material aspects" of the earlier verdict from 2007 that found Novell to be the rightful copyright owner. Now there's going to be yet another trial case to determine whether SCO does in fact own the copyright.

I don't think anybody seriously gives a shit about System V UNIX, UnixWare or any of SCO's other crappy, outdated products.

But a company like SCO, which has been in bankruptcy for over 2 years, has virtually no market share and appears to exist these days only for the purpose of suing other companies, might well gain legal ownership of the original System V UNIX code. In other words: they might gain a legal "leg to stand on" and cause more trouble for OSS creators and vendors.

For years, SCO has been bitching that Linux infringes on a copyright for the original UNIX code that it assumes it holds. They have sued companies like IBM and Novell which produce Linux-based software and distribute Linux as an OEM OS. They have disseminated propaganda to Linux users, accusing them of copyright infringement and alleging they could be liable for damages simply by running Linux. They have sued their own (former) customers who switched from using their products to using Linux. SCO is also known to have received financial backing from other, far more powerful interests whose goal is to ruin the open source software movement by any means possible. At this point, SCO clearly has nothing to lose, and Microsoft doesn't have to dirty their hands or risk hurting their own public image by attacking open source developers in court. Microsoft can just sit back and bash the OSS movement in the press, allege IP infringements, negotiate cross-licensing agreements and provide financial support to companies like SCO to file anti-OSS suits.

This may not be a potent threat to the very existence of Linux, but it could definitely harm Linux in the business market and lead to some very bad precedents regarding OSS and software copyright/patents in general.


BTW, I'm not the one who voted down your post. It's an interesting bit of news on a case I haven't really followed in awhile. Thanks for posting it.


#343963 Postage Machine Hacking

Posted by Phail_Saph on 21 August 2009 - 01:02 AM

Posted Image

The above is the 'offical' Postal Regulation for an IBI or Information Based Indicia. All this information is contained in the 2-D barcode to the upper left of a piece of metered mail. Look at some of your junk mail and it will be very clear what I mean. It's that box that looks like Lattera's avatar. The column that says barcode are all of the data items in that 2-D barcode that I'm talking about and the Human Readable is what you can decipher when you look at it...date, time, etc.

The information is digitally signed so that when the Post Office reads the mail it can be fairly certain that it came from a particular licensed meter.

What's crazy is that the meter internally communicates with 'itself' using an asymetric key system...public/private. That is the meter contains a postal security device which is tamper resistant (of course resistance is a relative term) that sends out commands to create and sign the indicia with all the signals being encrypted. Think of it like an HTTPS setup for internal communications or more appropriately like each command being digitally signed. Digital signatures use the public/private key system so this is closer to what is happening.

The whole postage meter industry is so wacky. What I mean is that to actually attack the meter directly is incredibly hard but not impossible;however, there are far easier ways to 'hack' a meter. The meter itself and access thereof is fairly easy due to primitive security. If you have physical control of a meter and a system that can interface with it you can do pretty much whatever you want. But not to be too much of a worry wort...printing postage is printing money; stamps are a legal form of tender so if you play games with this stuff the penalties are insanely harsh because of that. I know some smartass is saying to himself, "Oh then I can use it to buy my groceries?" Not exactly...unclaimed stamps can and must be refunded by the post office. If you show up with a stamp that is legally yours or if you can 'somehow' prove that that is a stamp of yours the post office refunds the amount on the stamp. Of course it isn't an immediate refund. You can't just show up with a meter label for a hundred bucks and walk away with a c-note.



#341651 RIP Pirate Bay

Posted by .solo on 01 July 2009 - 11:30 AM

Ohm, you obviously get off on policing binrev. Seriously, I've seen you crush countless topics with your sense of superior morality. The only thing that impresses me about you is that you always find some way to condescend. You've got a real talent.


#340641 New Operating Systems

Posted by Ohm on 12 June 2009 - 11:42 PM

Clearly the best was Windows 95. Don't you miss 3 reboots a day?

As for XP, it was received pretty badly at first. Pre-SP1, XP was quite buggy. Also, for the time it was resource heavy, so a lot of people complained they couldn't run it on their current machines. I always got a chuckle when people bashed Vista, yet praised XP which had similar problems at the start. Of course people were willing to bite the bullet since the alternative was Windows 98 (or for the enlightened few, Windows 2000). Now, you have XP which works and is stable, so you can sit back and poo Vista all you want.

I've also had no problems with Vista. If you have a fast enough machine, there's just not much to complain about. It works, what more do you want?

As long as you're listing future OSs, why not list Ubuntu 9.10?


#326986 Technical Books Online

Posted by Ohm on 03 January 2009 - 10:03 PM

Great link. Who wants to mirror this and stick up a torrent?


#362387 NEED HELP WITH JAVA

Posted by systems_glitch on 28 February 2013 - 06:59 PM

He doesn't want his prof to see




#359700 2600 CYBER MONDAY SPECIALS ONLINE - PLEASE BEHAVE IN AN ORDERLY FASHIO

Posted by BINREV SPYD3R on 28 November 2011 - 12:12 AM

While our holiday specials are indeed something to get hysterical about, there's no reason why we have to behave like the WalMart crowds. We're better than that. So if you decide to visit our online store to take advantage of prices so low we're practically giving it all away, please remain calm and remember that others are also in the store trying to get the best value. There's no need for denial of service attacks, buffer overflows, or pepper spray exploits. We will do our best to accommodate everyone.

http://www.2600.com/...w/article/12162


#359236 MCI Lawful Disclosure PDF

Posted by Afterm4th on 13 September 2011 - 03:20 AM

Full Pdf:
http://cryptome.org/...spy/mci-spy.pdf




Subpoena Compliance
and
Special Investigations
Law Enforcement Assistance Guide
for Internet Investigations
Law Enforcement Help Line (24/7): 877-646-6555
Facsimile: 703-886-0144CSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
2
COMPLIANCE AND SPECIAL INVESTIGATIONS CONTACTS
PHONE: FAX: EMAIL:
LAW ENFORCEMENT HELP LINE
(24/7)
877-646-6555 703-886-0144 csi@mci.com
Maricon Corpuz, Investigator 703-886-3830 703-886-0144 maricon.corpuz@mci.com
L. Rebecca Rohrer, Investigator 703-886-3832 703-886-0144 laura.rohrer@mci.com
John St. Clair, Manager CSI 703-886-3822 703-886-0144 john.stclair@mci.com
Sally Weaver, Legal Assistant 703-886-4075 703-886-4399 sally.weaver@mci.com
Subpoena requests for Internet
investigations:
Director
Network & Facilities Legal Team
MCI
22001 Loudoun County Pkwy
Ashburn, VA 20147
703-886-0700 703-886-0144
NOTE: For investigations regarding telephone-related subscriber information, please direct requests to:
Subpoena Compliance
MCI
1133 19
th
Street, NW
Washington, DC 20036
Phone: 202-736-6885
Fax: 202-736-6970
Email: subpoenas@mci.comCSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
3
MCI COMPLIANCE AND SPECIAL INVESTIGATIONS
Introduction
MCI is a global telecommunications company with an expansive IP network, providing data and
Internet services to businesses (including Internet Service Providers), state and federal
government entities, and residential customers worldwide. UUNET Technologies, Inc., an MCI
Company, provides wholesale online dial-up, remote Internet access and high bandwidth
dedicated access.
Compliance and Special Investigations (CSI) is an MCI resource dedicated to assisting Law
Enforcement with Internet related criminal and civil investigations for which MCI may have
evidence. The purpose of this guide is to provide Law Enforcement with a basic understanding of
how MCI may assist with Internet investigations. The CSI staff is committed to providing timely
and accurate responses to Law Enforcement requests. Questions and comments are
encouraged.
Serving a Request on MCI
Subpoenas, search warrants and court orders may be served on MCI by any of the following
methods:
• Facsimile (CSI requests a follow-up copy by mail)
• Mail
• Personal delivery
Upon receipt of a request, CSI assigns an internal MCI ticket (reference) number and
acknowledges receipt of the request by fax. Investigation results are returned to the requesting
officer by fax, unless CSI is otherwise instructed. The average subpoena response time is 7 – 10
business days. CSI endeavors to accommodate extraordinary circumstances or special response
requirements when possible.CSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
4
Request Format
In order to initiate an investigation, the following information is required to obtain accurate results:
• Internet Protocol (“IP”) address
• Date of connection
• Time of connection (if applicable)
• Time zone (when applicable, time zone information is critical to an accurate investigation
as the time zone is determined by the machine on which the connection is logged,
regardless of geographic location of the machine or the end user)
The language below, incorporating the above-referenced information, is suggested for a request
pertaining to Internet connections:
“Please provide any and all subscriber and/or account information pertaining to
the connection using [ IP address ],on [ date ], at [ time; time zone.]”
Response Formats
The information available to CSI, and the format of CSI’s response, will vary depending upon
whether the subject user’s Internet connection was established via a dynamic or static IP
address. (Note: through its UUNET subsidiary, MCI sells Internet services to resellers or
wholesale customers, who resell MCI products and services to Internet end-users, or large
corporate customers. As such, MCI has no customer relationship with most end-users and
therefore does not maintain detailed subscriber information or customer records for such users.)
Dynamic IP: An IP address that is temporarily assigned to an end user’s machine at the
time and for the duration of each connection. The most common application of dynamic IP
assignment is “dial-up” Internet access, which is established via a telephone line. Some DSL
service connections are also dynamic in that a new IP address is assigned to the DSL end
user each time the end user’s computer is turned on. MCI maintains dial-up and dynamic
DSL connection logs. However, because many of these users are not direct customers of
MCI, CSI has no visibility into the account information beyond the username. Generally, the
MCI reseller who maintains the account can provide further information about the user (e.g.
name, address, billing records, etc.). The reseller will most likely require a subpoena to do
so.
Static IP: An IP address that is permanently assigned to a computer. This type of Internet
connection is commonly referred to as dedicated, as it is “always on.” The end users are
generally employees of MCI corporate customers or customers of resellers to whom MCI hasCSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
5
allocated a block of IP addresses. MCI does not maintain logs for dedicated access,
however, CSI will provide contact information for the immediate MCI customer or reseller
whom will most likely require a subpoena to provide information pertaining to the request.
The table below illustrates the information that may be provided by CSI depending on the subject
user’s means of Internet access.
Access Method Response
Dynamic IP
(e.g. dial-up access,
some DSL services)
• Username (e.g. username@ispname.com)
• Reseller (including contact information)
• IP address of destination host, if available
• IP address of source host, if available
• Time of connection
• Time of disconnect
• ANI (Automatic Number Identification), if available
• DNIS (Dialed Number Identification Service), if available
Static IP
(e.g. dedicated
connections, some
DSL services)
• Site name (an MCI internal account identifier)
• Company name (the reseller or corporate customer to whom subject
IP has been allocated)
• Company contact information (e.g. address, phone/fax numbers)
• Technical contact (phone, fax and/or email, if available)
• Security contact (phone, fax and/or email, if available)CSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
6
Frequently Asked Questions
What is the turn-around time on a subpoena request?
CSI’s average response time is 7 - 10 business days, but may vary depending on the
circumstances.
Why is it important to provide the accurate time zone information on a request?
The correct time zone information is a crucial element for CSI to conduct an accurate
investigation. A connection’s time zone is determined by the machine that logs the
connection, regardless of the machine’s geographic location. For example, a logging
machine that is physically located in the Pacific time zone may be set to log all connections
in Eastern time. Please also note that the geographic location of the end user is irrelevant
to the time zone of the connection.
When obtaining connection information, always confirm the correct time zone with the
source of that information.
What is the retention period for MCI’s connection logs?
Logs for dial-up connections are maintained for approximately two years. MCI does
not maintain logs for dedicated access.
Why is ANI not always provided in responses?
The availability of ANI (origin telephone number) depends on the machine (or server) that
records the log-on information. Older machines that are still in use may not be configured
to record ANI. If requested, ANI information is always included in CSI’s response when
available.
Does MCI require a subpoena to confirm if a company or user associated with a particular
IP address is an MCI customer?
Yes. Disclosure of customer or user information is limited by both contractual obligations to
limit disclosure of such information and by federal and state laws that limit or prohibit
disclosure of information.
Does MCI alert its customers about requests served seeking information relative to
criminal investigations?
No. MCI maintains strict confidentiality with respect to all criminal matters. Customers are
not notified by MCI.
In the case of an international investigation, can a request be served on MCI in the U.S. if
the records reside with an MCI company overseas?
No. Requests seeking information relative to an overseas investigation must be served on
the appropriate entity in the country where the records reside.CSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
7
Common Terminology
Access number: A telephone number dialed by a subscriber to connect to the Internet. May
also be referred to as DNIS (Dialed Number Identification Service).

ANI (Automatic Number Identification): The origin telephone number from which the
connection to the Internet was established. (ANI information is not always available. When
captured, it will be included in a subpoena response.)
Authentication: The verification of the identity of a person or process.
Dedicated connection: A high speed, “always on” connection to the Internet.
Destination host: The dial-up user’s computer. The destination host is assigned a dynamic IP
address by the source host upon, and for the duration of, a dial-up user’s connection to the
Internet. Because this IP address is “dynamic” it varies with each connection.
Dial-up connection: A temporary connection between computers established over a telephone
line.
DNIS (Dialed Number Identification Service): The number dialed by a user or computer to
connect to the Internet. (Also known as an Access Number.)
DNS (Domain Name Server or Domain Name System): A mechanism on the Internet that
translates Internet addresses (URLs) into their corresponding IP addresses.
DSL (Digital Subscriber Line): High speed Internet connection over ordinary telephone lines.
Depending on type of DSL services, the associated IP address may be dynamic or static.
Dynamic IP: A temporary IP address assigned to an end-user at the time and for the duration of
each Internet connection.

Host: A computer that allows users to communicate with other host computers on a network.
IP address (Internet Protocol address): A unique, 32-bit number assigned to a specific host
(computer) on the Internet. All Web addresses (e.g. www.mci.com) and email addresses (e.g.
abuse@mci.com) have a corresponding IP address.
Message header: The information at the beginning of an email or bulletin board message that
contains the identities of the mail servers that the original message traveled through to get to its
final destination.
Point of Presence (PoP): A physical site with a collection of telecommunication equipment,
including devices designed for network access via dial-up connections.
Protocol: A series of rules and conventions that allow different kinds of computers and
applications to communicate over a network.
Reseller: A direct MCI customer who resells MCI’s products and services under its own name.
MCI allocates blocks of IP addresses to reseller customers who may reallocate the IP numbers to
their own customers.
Server: A computer that provides information to other computers and/or machines on a network.
For example, web servers send out web pages; mail servers deliver email; list servers administer
mailing lists, etc.CSI Law Enforcement Assistance (toll free): 877-646-6555
Fax Number: 703-886-0144
8
Source host (Source IP): The network access server that assigns the dynamic IP address for a
dial-up Internet connection to the dial-up user’s computer (the destination host).
Static IP: An IP address permanently assigned to a computer or other network machine;
typically associated with dedicated connections.
Traceroute: A utility that displays the connection path from one machine to a destination
machine, showing the amount of time it takes to get from start to finish and identifying each
machine through which the traffic travels.
URL (Universal Resource Locator): An Internet address, such as www.mci.com.
Username: The unique account identifier of an Internet user.
Whois: An online, searchable database of domain names available via the Internet. Whois
search results can provide detailed contact information for persons or entities to whom IP
addresses are assigned and/or domain name registrations are registered. (See www.arin.net)




#356084 Will pay for hacking SMF 1.1.11 forum

Posted by MichelleV on 30 November 2010 - 04:35 AM

My business is beiing ruined by a thread on a SMF forum. If you know how to gain admin acces or you can just mess the forum up permenently then I'm willing to pay!

Tanks in advance.


#143516 Hard drive password bypass.

Posted by m2mike on 26 September 2005 - 05:52 PM

Well, I finally have a need to get around a password protected hard drive on a Dell Latitude D600. I know there are a few methods that can be used to do this, but I wanted to post here and see if anyone can suggest anything else.

The hard drive in question has a password on it. I believe the term is "platter locked".

What I know of follows:

http://www.rockbox.org/lock.html

The utility atapwd, linked at the above url, looks like it might work, but I haven't gotten it to work yet.

http://a-ff.com/products/rrs/drives/

This is a company that provides an unlocking service for around $60.00. I don't want to spend money though.

http://www.vogon-for...cracker-pod.htm

These guys sell hardware and software that can clear the password and then image a drive for forensic purposes. I don't think they sell to civilians though.

There is also a thread on this elsewhere:

http://www.hardwarea...opic/34045/?o=0

Any thoughts as to where I should go to get this done?


#134581 PCB abbreviations

Posted by m2mike on 18 August 2005 - 02:16 AM

Can anyone point me in the right direction for a reference on abbreviations on a PCB board?

I know R means resistor and TB means terminal block. What are the other letters that can show up on a PCB and what do they stand for?

*Edit*

Just found this:

A = Assembly
B = Fan
BT = Battery
C = Capacitor
CB = Circuit Breaker 4-1
CR = Diode
D = Diode
DL = Delay Line
DS = Lamp
E = Terminal
F = Fuse
FL = Filter
J = Connector, Recept
K = Relay
L = Inductor
M = Meter
P = Connector, Plug
Q = Transistor, Semiconductor
R = Resistor, Potentiometer
RT = Temperature Sensing Element
S = Switch
T = Transformer
TB = Terminal Block
TP = Test Point
U = Integrated Circuit
V = Vacuum Tube, Neon Bulb, Photocell, etc.
VR = Zener Diode
W = Wire, Cable
X = Socket
Y = Crystal Unit


BinRev is hosted by the great people at Lunarpages!