[for better viewing use Word Wrap]


            001101101         101    110      001101010         0101010101
            01      01        010    010      10      10        101    101
            10       10       101    001      01       10       101    001
             01        01      0110110101      01        01      001    110
              10       10       1001001010      11       10       010    111   
              01      01        101    010      10      10        010    101
              10011011          010    001      10011010          1011011001

+-----------------------------------------------------------------------------------------------+            
                                   
                                     DIGITAL HACK DOT ORG 
 
                                           PRESENTS
                                           
                             *TIPS AND TRICKS THAT MAKE LIFE EASY*

                                   BY deEp c0ma AND vector12
         
                                     EDITED BY SID vicious

                            "knowledge is power, in ze right hands!"

+-----------------------------------------------------------------------------------------------+                                          DISCLAIMER
                                         ----------
THE INFORMATION PROVIDED HERE-IN IS FOR EDUCATIONAL PURPOSES ONLY.  THE MAIN OBJECTIVE OF THIS TEXT IS TO PROMOTE NET SECURITY AWARENESS.  THE AUTHORS OF THIS TEXT CANNOT BE HELD RESPONSIBLE FOR ILLEGAL ACTIONS ARISING FROM THE MISUSE OF THE MENTIONED TEXT.  IF SHOULD YOU DISAGREE, COMPLETELY OR PARTIALLY, WITH WHAT YOU HAVE JUST READ LEAVE IMMEDIATELY AND STOP READING THIS NOW.


     CONTENTS
     ~~~~~~~~ 
1. --Tips and tricks that make life easy--
1.1 Introduction
1.2 Explanation
1.3 Tips
1.4 Tricks 
1.5 Web links
1.6 Books
1.7 Conclusion
1.8 About the group...


   1.1 Introduction
   ****************

Ever wonder how you could use such and such applications quicker and faster?  How you could have maximized your desktop performances for better use?  Well, read further 'cause this text has been written for you.

   1.2 Explanation
   ***************

It is well known that Windows was at first not the most friendly operating system on the market. However, it rapidly became user-friendly, too user-friendly.  Now recent editions of Windows do everything for you at the click of a button but mind you there should be room for founded concern about this 'automated task manager' in the operating system.  We should always be careful of the machine, especially the Microsoft machine.

   1.3 Tips
   ********

If you want to have a fluid system and protect your machine from the hacker individuals at the same time follow these tips attentively:

 // download patches for your IExplorer whenever new ones are made [recommended that you             download them at www.microsoft.com only]

 // disable the Autocomplete feature in the Internet Options box

 // disable the Cookies feature

 // set your 'days to keep pages in history' to 0 days

 // disable User identification in the Internet Option box

 // disable all Active-X again in the Internet Options

 // disable Java permissions

 // delete your TEMPORARY INTERNET FILES and HISTORY folder, following the Riddler's instruction      in his text [see web links section]

 // And most important of all... change your browser if you use IExplorer!

 // always clear the list of documents located under START-DOCUMENTS whenever you have finished      using your computer, this list contains shortcuts to the files previously used by you and        can be easily accessed by an intruder [to clear it go to START-SETTINGS-TASK BAR AND START       MENU and click CLEAR in the DOCUMENTS MENU at the START MENU PROGRAMS]

 // choose another location other than MY DOCUMENTS for saving your sensitive files, the root        directory is the best place [that is C:\]

 // always use passwords for accessing sensitive materials, note that the password should            preferably be in alphanumeric form, for e.g. pAs5w03D

 // use PGP [Pretty Good Privacy] or any strong encryption means when sending emails and files       to your friends

 // use web-based email services, like Hotmail, rather than home-based as web-based email            companies provide better protection against spam and have up to date virus scanners for          checking suspecting attachments

 // scan all your downloaded files with , of course, the latest antivirus softwares! 

 // uninstall ICQ immediately if you use this program as having ICQ means inviting hackers to        hack you, in other words it is a form of digital suicide!

 // uninstall mIRC as it is the most hacked chat client  

 // never, ever, open any email if you don't know who send them.  Just delete them

 // delete your cookies everytime after your surfing session if you use Internet Explorer

 // avoid using MSN or Yahoo messengers if possible as hackers can easily obtain your ip address      through them

 // finally use 'hiding softwares' to hide your sensitive files from unwanted intruders like         Magic Folders [see web links section]


   1.4 Tricks
   **********

The tricks below have all been tested and have been found to work efficiently on Windows 95, 98 and 2000.  Furthermore, these tricks will facilitate your use of your computer to a greater extent.

 // The unaccessible directory trick
 ------------------------------------
[1] create a major directory on your hard disk, for example create 'C:\hacknotes'

[2] transfer all your required files to the directory

[3] open an MS DOS prompt and type at the command prompt: alt+206
    a symbol in the form of a cross will be display

[4] now return in the root directory and write at the command prompt (that is 'C:\'):
    'ren hacknotes (alt+206)hackingnotes' 

[5] then type 'dir' to confirm that your directory has been renamed 

[6] type 'exit' to exit MS DOS

[7] go to My Computer and click on '(C:)' to access your root directory

[8] locate your renamed directory, it should be like '(_)hacknotes' and double click on it, you      will find a message saying that "C:\(_)hacknotes does not exist" plus you cannot access it

[9] To access your directory open an DOS window and type at the command prompt: 
    'ren (alt+206)hacknotes hacknotes'

[10] Finally exit DOS and access your directory

Note: Always remember your code, that is for e.g. alt+206, without which you cannot access your        directory and remember that various codes can be made.  
      Check the list below for more codes:
       alt+197
       alt+179
       alt+174
       alt+714
       alt+194
       alt+943
       alt+789
       alt+759
       alt+731
       alt+426
       alt+465
       alt+735


 // The explorer crash trick
 ----------------------------
It sure sucks when Internet Explorer crashes and your computer must be restarted in order to use your browser again.  But there is another way instead of restarting your PC.  Follow the steps below.

When IExplorer crashes, a window appears saying "This program has performed an illegal operation. If the problem persists contact your program vendor".  All you have to do is to run Dr Watson simply and your problem will be solved!

To run Dr watson, go to Start, Programs, Assesories, System Tools and System Information.  A windows will now appear and select the Tools menu in the main tab and click on Dr Watson.  Immediately afterwards a small icon will appear on the right hand side of your Taskbar, close to where your time is displayed.  Double click on it and the problem is resolved!  Press OK to quit Dr Watson.

What Dr Watson does?  Dr Watson is a program that diagnoses your PC in order to find out if there is any program malfuntionning and if there is it will give you a report on the problems it has found out. 
If this still don't work then email us.


 // Creating a shortcut for shutdown and restart
 ------------------------------------------------
[1] On your desktop right-click your mouse and select NEW-SHORTCUT

[2] A window will suddenly appear telling you to type in the location of the item you want to        create a shortcut to

[3] Type in the command box:'C:\windows\rundll.exe user.exe,exitwindowsexec'
    Then select a name for the shortcut.  This shortcut will immediately restart Windows when        double-clicked upon.

[4] Type in the command box: 'c:\windows\rundll.exe user.exe,exitwindows'
    Then select a name for the shortcut.  This shortcut will shutdown your computer when             double-clicked upon.


 // The beep beep trick
 -----------------------
On several occasions when IExplorer crashes, and that window saying "an illegal operation has occurred" appears, and after clicking OK a beep beep sound can be heard coming from the CPU [especially if it is a TEXAS INSTRUMENTS CPU].  This sound can be quite frightening to the computer novice and annoying to the computer literate.  The solution of suppressing the beep beep sound is simple: all you have to do while hearing the sound is to right click continuously until no more sound is heard!  As simple as that.


 // Making customizable quick launches
 --------------------------------------
If you have too many icons on your desktop and that these icons are disfiguring the beautiful wallpaper on your desktop, then what you need is transferring your icons to the Quick Launch menu [note that the Quick Launch is located to the right of the START button and that the icons are smaller and only one click is necessary to launch a specified application in Quick Launch].

Therefore, to add other shortcuts to the Quick Launch follow these simple steps:

[1] Go to My Computer

[2] Go to the root directory, that is 'C:\' and go to the 'Windows' directory

[3] Go to the 'Application Data' directory and then to the 'Microsoft' directory

[4] Go to the 'Internet Explorer' directory and there go to the 'Quick Launch' directory

[5] In this directory you will see icons like the Internet Explorer blue icon and the Show         Desktop icon.  All you have to do is to create a shortcut to your specific application in        this directory.  And when you return to your desktop you will notice the new small icon in       the Quick Launch.


   1.5 Web links
   *************

Our surf report this time includes some awesome sites discovered by the 24-hours-a-day surfers working currently for the group.

packetstorm.deceptions.org - Packetstorm  computer security site and related(good ezines archive)

www.23.org                 -  the most violent computer group around!
www.attriction.org         -  the group with the most web defacements around
www.dis.org                -  another cool group on the scene

www.securityfocus.com      -  the most recommended security-dealing site by... hackers!
www.net-security.org       -  always has a plentiful number of security-related articles and                                   softwares [mostly sharewares]
www.securitysoftwares.com  -  a great resource for downloading cool softwares

www.reznor.com             -  The site for the Reznor Applied Technologies
www.satindeath.net         -  the homepage of an elite computer nerd and a goth as well!
www.netninja.com/index.php -  Brian Enigma's site, an elite guy [he's the one who wrote the Butt                               Trumpet plug in for Bo2k]

www.techiwarehouse.com     -  just go and check this security-related site


   1.6 Books
   *********

This month only one book has caught our attention, or our editor's attention.  Plus due to lack of time and resource other books have been not reviewed by the writing staff.  Our sincere apologies to you all interested by this section.  More books will be reviewed in the fourth edition.

+The little black book of email viruses
 by Mark Allen Ludwick [American Eagle Publications]
 FEB 02


   1.7 Conclusion
   **************

We sincerely hope that this text has provided you with sufficient tips and tricks that will make your life easy when using a PC.  Some tricks have been 'borrowed' from famous texts found on the net, while the rest are original ones.  If you have some genuine tips and tricks that you would like to share with us please send them in.  We will gladly publish them in our next edition of this text.


   1.8 About the group...
   **********************

Digital Hack Dot Org is the newly-borned group of computer loving individuals who are trying to earn a modest place in the vast place of the hacker's underground world.  DHD0 compromises of only 5 members namely: sid vici0us (commander in chief), zana tas (secretary), deEp coma (corporal) and digital flu (soldier), plus vector12 (shoe-polisher!).  Actually, we were here a long time ago but we have decided to make our presence felt just recently.  The obvious reason for this was that we were all newbies and that we were learning (we still are).  Keep watching as more tutorials are on their way.
Also, do not forget that real hackers drink milk!!!
  
*************************************************************************************************

             D   I   G   I   T   A   L     H   A   C   K     D   O   T     O   R   G

               k n o w l e d g e  i s  p o w e r, i n  z e  r i g h t  h a n d s !
      
            ==========================HACKERS WITH GRAMMAR===========================
          
                             contact us at amateur@fuckMicrosoft.com
                         
       
                            tips and tricks that make life easy v1.0
                                           08/03/2002

       PERMISSION TO DISTRIBUTE & COPY FREELY GIVEN, BUT IT MUST BE SHOWN THAT THE ORIGINAL             
                                AUTHORS ARE DIGITAL HACK DOT ORG
  