                            Step One
                     Taking out the easy way

     The easiest and most simple way to hack any board is through
there archive menu, where you can manipulate and work with
temporary zip files.  From here you can activate an ANSi Bomb to
format the Hard drive, or do many other things.  One being, making
yourself file with users.dat and users.idx in it.  Not a good
thing.  With this, they have users, info, passwords, not to mention
yours, and they can do anything.  Your at the mercy of the hacker. 
Which is not a good thing, so to take out the easiest way, DISABLE
the Archive menu, from all users, and probably co-sysops.  Even
your own account should not have access, because all your archive
manipulation can be done in dos.

                            Step Two
                         The Secret Jump

     This is the secret jump technique used to jump from place to
place.  The one way to stop this is to assign Security Levels TO
every menu, and every important commands.  Most likely all of the
commands.  This prevents this from happening and the unlikely
chance of them jumping to your sysop menu.

                           Step Three
                          The Co-Sysop

     Make sure you fully trust and know your sysops.  They can be
the one who leaks the password, or even hacks the board.  Don't
give them access to the menu editor, or Pseudo Dos, as they can
fuck up your HD real easy.  Trust them, but still be weary of them.

                            Step Four
                          The MCI Codes

     MCi codes are Renegades one default.  Many things can be done
with MCi manipulation, so for this there is one way to prevent it. 
Use my handy batch file included in this.  It does not prevent them
from crashing the system, but it does reload it and hang them up. 
All safety.  It also notifies you.  Very important.  Very Deadly.

                            Step Five
                             Viruses

     The struggling hacker might prove to be a real idiot
sometimes.  And this might include them uploading a virus.  And if
you are unlucky enough to run it.  BOOM....so run a virus check on
everything.

                            Step Six
                         Sysop Passwords

     Make sure sysops use passwords that are 100% original and that
they change them at least every 15 days.  That will keep the hacker
from getting these passwords.  Especially the sysop password.

                           Step Seven
                           QWK System

     Several methods of hacking can be done from here.  None are
potentially dangerous and the batch file should handle it fine.

                           Step Eight
                               End

     Well as of now, I can't think of any more, so that's about it. 
This is version 1.0B and I will be writing updates as more bugs are
found.  As for now, good luck...

                              Ear
Please contact me on CoD with any questions.
+1(714)282-7644
Handle: Support
Password: Support
