Google+ Badge

Sunday, 15 January 2017

TOOLS YOU WILL NEED (ADOBE AUDITION) in your Grand Theft Auto Vice City / Audio folder


in your Grand Theft Auto Vice City / Audio folder you will see a bunch of mp3's

you wanna find

stripa.mp3 (short clip only needs to be half of a song)

open a few songs for each clip you want to make.. (fade the beginning or end of the songs if you want to) and open multitrack view.. you can have them fade into eachother. once you have the multitrack session finished go to "FILE" then "SAVE MIXDOWN AS"

you want to save as a 128k 32000 Hz MONO FIle (the same type as the originals) but normal internet 128k 44.1 stereo should work also.. just save as say malibu.mp3 and then replace the one in your audio folder for the one you created.

when i walk into the Malibu i hear david banner and lil' jon singing

"YEEEAAAEEEHH!! OK!!..... WHAT!!..... WHAT!!" 

How to Hack UNIX


UNIXSYSV.HAK - File on hacking Unix System V's

                    From THE HACKER'S GUIDE TO W.S.U. comes
                     the ultimate in weekend entertainment

                           How to Hack UNIX System V
                      includes the INTRODUCTION TO HACKING
                           and HOW TO NOT GET CAUGHT

                           Last Revision: 1-18-89
                                 Version: 2.0

    Hacking is the art of attempting everything until something finally works.
The average hacker is usually only armed with educated guesses.  Why hack?
Generally, you have some reason.  My favorite reason being that it's fun.  But
these days are getting pretty suspicious and you have to watch yourself when
hacking even if you don't have malicious intents.  Hacking is lots of work and
is also dangerous.  So be careful and don't get caught!

    Okay great, how do I avoid getting caught?  That depends on what you are
doing.  In this file I will be discussing UNIX System V and therefore my
suggestions should only be taken as pertaining to that.  Even if you follow
my suggestions, you can still get caught.  Some operators are extremely
persistant and will stop at nothing to nail you.  If modems start answering
when you pick up a phone, or you become known as the "human carrier" by your
friends, then I suggest you lay low for awhile.
    Here are some obvious things to be aware of when you are hacking by modem,
I thought I'd include them in case you overlook them.  You should always be
on the lookout for these types of suspicious activity.
    1] Excessive line noise in an area that usually has none.
    2] You hear other voices simultaneously on the phone line.
       This occasionally happens normally with the old analog FDM
       multiplex equipment.  But it also can be caused by a wire tap,
       so try to be careful here!  * See the note on wire taps.
    3] Any van or minivan parked next to:
        a] A telephone pole.
        b] An underground steam vent hole.
        c] Also watch for cloth tee-pees with MA BELL symbols on them
           near poles or steam vents.
       This is a *DEAD GIVAWAY*!!!  If you see this, cease all hacking
       for at least a month!  (An make sure that the vans are GONE,
       --NOT-- just moved to another location!)
       >> Check for wires going to the van from the pole, or vent.  And
          check to see if the van is white (FBI uses these alot) or a
          phone co. van.
    4] Watch the abandoned rooms in your building, if they suddenly have
       lots of equipment in them, take note here!
    5] Anything unusual about the way your phone service operates that
       the neighbors don't seem to have going on!
That's all I can come up with right now.  But I'm sure there are more.

Belive it or not, this is still one of the most commonly used methods
of nabbing a hacker.  The above list is a good guide to detecting an active
wire tap.  If you can afford the equipment, you can do what is know as a
"sweep" of the phone line every now and then.  Another thing you can do is
build a device which monitors the phone line voltage.  If the voltage suddenly
drops during use, you either have a wire tap or someone picked up an extension.
Here are some specs for monitoring line voltage:
    Ringer voltage:90V at 20-30Hz
    Clear voltage:600V (Watch out!  This will toast any MOV you have
                        in your modem!  Usually this is used to fuse noisy
                        phone lines shut.)
The average cops don't have the equipment to properly implement a wire tap,
much less a data tap.  However, I have heard of data cops in Seattle and

    Here is yet another way you can get your butt caught.  It is getting
easier and easier for the average person to trace phone calls.  I just
found out a few days ago that dialing 33 on an on-campus phone will trace
the last call to that phone.  Rest assured that an operator will use this
to nab you if he can.  This however, only affects remote dial-ups, and not
the on-campus links.  Remote dial-ups used to be so safe, but no more...
-- more --A good place to hack from is a nearby terminal room.  *NOT* in the same
building that you live in!  Do it at night, so if there is a system operator
at all on duty late he will probably be sleeping.

    This is a fairly new method of catching hackers, and I really don't think
the average hacker has much to worry from it.  It is too complex to implement
and doesn't even work most of the time.  Especially if you're in an area that
has lots of TV's or computer monitors.  The device used basicly reads the
faint radio frequencies created by your monitor and translates them back into
a video signal.  When it actually does work the guy running it can see exactly
what you are seeing on your monitor.  Pretty tricky, but he has to be able to
pick out your signal first.

    Alright boys and girls, on top of everything else in the world we now are
bless with the wonders of Electronic Standardized Switching.  Or otherwise
known as ESS.  Remember that sharp increase in your phone bill about a year
ago?  "It's a new computerized system designed to allow quicker routing of
your calls".  Bullshit.  It sole purpose is to catch phreakers.  That's all
it does, and it does it well.  With this, the phone co. can trace a call in
-- more --.55 seconds to anywhere.  It keeps records on all calls, including local!
And just about every phone box in the books will not only refuse to work,
ESS will notify the cops when you try to use it!
    Have some faith.  ESS is not exactly the end of the world either.  Like
every system ever come up with, people will hack it.  And eventually it will
be just as easy to hack ESS as it was to do on the old phone system.

                       Okay!  Enough beginner's stuff!
                      Onward to hacking UNIX System V !

Not much here:  I just started this paper, and am still looking for
                anything I can add to it!
Remember:  The operator can see what you are doing at all times!  But
           usually they don't care or the information scrolls by so
           fast they don't have time to read it.
Note:  If you flub up your password or try to access secured files, the
       system will automaticly record everything that you do!  And on
       some systems, the system will record everything you do anyway!

    This is the heart of hacking a UNIX system.  You don't want to do any
hacking under any ID that can be associated with you.  And you don't want
to use another user's ID more than once if at all possible.

    There really is no way to get a name and password without first having
some level of access to the system.  How do I get in then?  I rely on the
fact that our GANDALF data switch is extremely unstable.  1 out of 5 logins
will drop you under someone else's name *NO QUESTIONS ASKED*.  Just change
parity (8N1 to E71) alot while GANDALF is loading UNIX.  Eventually, you
will get in this way.  This happens because a user hung up on the phone
line without loggig off!  So be sure to log yourself off the system when
you finish with *ANY* work.

    They saw.  A couple of days ago I was doing this and somehow I was
logged off of the system.  The words "LOGOFF" just appeared on my command
prompt and entered themselfs.  I suspect the guy whose number I used was in
-- more --the terminal room monitored by a superuser.  And he just told the SU that
there appeared to be two of him.  (Probably used the WHO command).

    Believe it or not, UNIX will actually allow you to lock out other
users from the system.  First, you select a target person.  Then you place
the file VI.LOGIN in their default directory (the one that UNIX automaticly
loads them into when they log onto the system).  You set up VI.LOGIN like

          VI.LOGIN   (Just the file name!)

So VI.LOGIN only contains one command.  VI.LOGIN is automaticly executed
when a person logs onto the system.  So as soon as your pigeon gets onto the
system he immeadiatly gets logged off!

Suggested Uses:  On a Prof a few days before your assignment is due.
                 Someone you really don't like (wait a few weeks so they
                    don't figure it out right away!)
                 It might work on the ROOT (The SuperUser's name)

    Here is yet another way to gather SEVERAL users names AND PASSWORDS.
First, (the hard part) wait until the beginning of a semester.  Now,
somehow you have to get a list of the ID numbers for students in UNIX-
oriented classes.  You can usually find one of these lists posted outside
a professor's office (try the computer science building) or one of many
other places.  Anyways, you have a list of student ID numbers.

    Now, preferably on the first day of class, start logging in as a few
(maybe 3-4) students.  I prefer to use ID's from low-level (100's) classes
as the students will just think that they've screwed up.  Log into the
system, and if the student hasn't been on the system before, you will
be prompted for a password!  And viola!  You not only have access but also
you have the password of your choice.  This happens because the computing
faculty is too lazy to pass out customized passwords to thier students.
New students are expected to select their own passwords, but that means
that the system won't be able to tell who is who!

Suggested Uses:  Most likely your access won't stay good for more than
                 a few days.  You might want to take full advantage of it
                 and really cause some havoc.  For one thing, you could
                 lock out an entire computer class!  (See LOCK OUT
                 described above).  If you're really good, and can crack
                 the coded passwords in the PASSWRDS file, then you can
                 get the Super-User (SU) password and have all the fun
                 you want!

                                   THE END

                                And Remember!
            This paper was provided for educational purposes only!

                              Special thanks to:
                              The Mad Phone-Man
                              The Grey Sorcerer
                               The Sneak Thief
                               Harry Hackalot

Hacking VoiceMail Systems

Hacking VoiceMail Systems

Voice Mail is a relatively new concept and not much has been said about it.
It is a very useful tool for the business person and the phreak.  The way it
works is that somebody wishing to get in touch with you calls a number,
usually a 1-800, and punches in on his touch-pad your mailbox number and then
he is able to leave a message for you.  Business experts report that this
almost totally eliminates telephone tag.  When a person wishes to pick up his
message all he needs to do is call the number enter a certain code and he can
hear his messages, transfer them, and do other misc. mailbox utilities.

Most VMSs are similar in the way they work.  There are a few different ways
the VMSs store the voice.  One way is that the voice is recorded digitally and
compressed and when heard it is reproduced back into the voice that recorded
it. Another method that is slower and uses more space, but costs less, stores
the voice on magnetic tape, the same type that is used to store data on a
computer, and then runs the tape at a slow speed.  Using this method the voice
does not need to be reproduced in any way and will sound normal as long as the
tape is running at a constant speed.  On some of the newer VMSs the voice is
digitally recorded and is transformed from the magnetic tape at about 2400
bits per second.

There are many different types and versions of voice mail systems.  Some of
the best and easiest to get on will be discussed.

These are direct dial (you don't have to enter a box number).  To get on one
of these, first have a number to any box on the system.  All of the other
boxes will be on the same prefix; just start scanning them until you find one
that has a message saying that person you are calling is not available.  This
usually means that the box has not been assigned to anybody yet.  Before the
nice lady's voice tells you to leave the message, hit #.  You will then be
prompted for your password.  The password will usually be the same as the last
four digits of the box's number or a simple number like 1000, 2000, etc.  Once
you get on, they are very user friendly and will prompt you with a menu of
options.  If you can't find any empty boxes or want to do more, you can hack
but the system administrators box, which will usually be 9999 on the same
prefix as the other boxes, will allow you to hear anybody's messages and
create and delete boxes.

Sperry Link
These systems are very nice.  They will usually be found on an 800 number.
These are one of the hardest to get a box on because you must hack out a user
ID (different from the person's box number) and a password.  When it answers,
if it says, "This is a Sperry Link voice station.  Please enter your user ID,"
you will have to start trying to find a valid user ID.  On most Sperrys it
will be a five digit number.  If it answers and says, "This is an X answering
service," you first have to hit *# to get the user number prompt.  Once you
get a valid user number will have oKVWV.."! password on most systems, it
will be 4 digits.  Once you get in, these are also very user friendly and have
many different options available.

This is probably one of the worst VMSs but it is by far the easiest to get
yourself a box.  When it answers you can hit * for a directory of the boxes on
it (it will only hold 23).  If you hit # you will be given a menu of options
and when you choose an option you will then be prompted for your ID number.
The ID number on an RSVP system will just about always be the same as the
mailbox number, which are always only 2 digits.

The Aspen voice message systems made by Octel Telecommunications is in my
opinion the BEST VMS made.  To get a box on an Aspen, you need to find an
empty box.  To find an empty box, scan the box numbers and if one says, "You
entered XXXX.  Please leave a message at the tone," then this is an empty box.
You next just press # and when prompted for your box number enter the number
of the empty box and friendly voice of the nice lady will guide you through
all of the steps of setting up your box.  She first tells you what you can do
with the box and then will prompt you with, "Please enter the temporary
password assigned to you by your system manager."  This password will usually
be 4 digits long and the same as the box number like 1000, etc.  Once you get
on their are many things you can do.  You can make a distribution list where
if you want to leave a certain message to more than one person, you can enter
the list number and all of the boxes on the list will get the message. You can
also have the system call you and notify you that you have new messages. These
systems also have what they call "Information center mailboxes" that are
listen only and can also have a password on them so the person calling has to
enter the password before he hears the greeting message.  Aspen VMSs have a
system managers mailbox that will just about give you total control of the
whole system and let you listen to people's mail, create and delete boxes, and
many other things.

Thank you for reading this file and if you would like to get in touch with me
VIA VOICE MAIL call 1-800-222-0311 and hit *2155.

                        //--Black Knight from 713--\\
                        |     for PHRACK XI (1987)  |

                             Mailbox Systems
   Mailbox systems are the link between information and the underworld. If
you have ever called one, then you will know the advantages of having one,
especially the ones that are  open to whole underworld, rather than just a
select few.  There are two types  of mailbox systems that are widely used.
   The first  type we will  talk about is the multiple mailbox systems, or
commonly referred to  as  message  systems.  These  systems  have  several
mailboxes set up on one number.  Usually, you  can access other  mailboxes
from that  number  by  pressing '*' or '#'.  Sometimes you  just enter the
mailbox number and you are connected.  These are the safest systems to use
to protect information from US Sprint and other  long distance  companies.
Since US Sprint and other companies  call  the destination  numbers, it is
safer to  have 800 mailbox systems, and  most  of  the time, the  multiple
mailbox systems  are on 800 numbers.  The  passcode on  these  systems can
vary in length and can be accessed by several  different methods, so it is
impossible to explain exactly how to hack these systems.
   The other type is the single mailbox system.  These  are usually set up
in a reserved  prefix in an area  code.  (Ex: 713-684-6xxx)  These systems
are usually  controlled by the  same type of hardware/software.  To access
the area  where you  enter the  passcode, just hit '0' for a second or so.
The passcodes are  four (4)  digits  long.  The only way to hack  these is
manually.  The best thing you could do is to  find one that does not  have
a recording from a person, but just the  digitized voice.  If you hack one
that  someone already  owns, they will  report it and  it will not last as

       Here is a list mailboxes or prefixes to help you get started
   Single                          Multiple                        Digits
------------                     ------------                     --------
213-281-8xxx                     212-714-2770                         3
213-285-8xxx                     216-586-5000                         4
213-515-2xxx                     415-338-7000 Aspen Message System    3
214-733-5xxx                     714-474-2033 Western Digital
214-855-6xxx                     800-222-0651 Vincent and Elkins      4
214-978-2xxx                     800-233-8488                         3
215-949-2xxx                     800-447-8477 Fairylink               7
312-450-8xxx                     800-521-5344                         3
313-768-1xxx                     800-524-2133 RCA                     4
405-557-8xxx                     800-527-0027 TTE TeleMessager        6
602-230-4xxx                     800-632-7777 Asynk                   6
619-492-8xxx                     800-645-7778 SoftCell Computers      4
713-684-6xxx                     800-648-9675 Zoykon                  4
                                 800-847-0003 Communications World    3

                                ==Phrack Inc.==

                Volume Three, Issue Thirty-four, File #6 of 11

                           HACKING VOICE MAIL SYSTEMS

                               by  Night Ranger


I, Night Ranger, or anyone else associated with Phrack, am not responsible
for anything the readers of this text may do.  This file is for informational
and educational purposes only and should not be used on any system or network
without written permission of the authorized persons in charge.


I decided to write this text file because I received numerous requests for
vmbs from people.  Vmbs are quite easy to hack, but if one doesn't know where
to start it can be hard.  Since there aren't any decent text files on this
subject, I couldn't refer them to read anything, and decided to write one
myself.  To the best of my knowledge, this is the most complete text on
hacking vmb systems.  If you have any comments or suggestions, please let me

Voice Mail Boxes (vmbs) have become a very popular way for hackers to get in
touch with each other and share information.  Probably the main reason for
this is their simplicity and availability.  Anyone can call a vmb regardless
of their location or computer type.  Vmbs are easily accessible because most
are toll free numbers, unlike bulletin boards.  Along with their advantages,
they do have their disadvantages.  Since they are easily accessible this
means not only hackers and phreaks can get information from them, but feds
and narcs as well.  Often they do not last longer than a week when taken
improperly.  After reading this file and practicing the methods described,
you should be able to hack voice mail systems with ease.  With these thoughts
in mind, let's get started.


The first thing you need to do is find a VIRGIN (unhacked) vmb system.  If
you hack on a system that already has hackers on it, your chance of finding
a box is considerably less and it increases the chance that the system
administrator will find the hacked boxes.  To find a virgin system, you need
to SCAN some 800 numbers until you find a vmb.  A good idea is to take the
number of a voice mail system you know, and scan the same exchange but not
close to the number you have.


If you get a high quality recording (not an answering machine) then it is
probably a vmb system.  Try entering the number 100, the recording should
stop.  If it does not, you may have to enter a special key (such as '*' '#'
'8' or '9') to enter the voice mail system.  After entering 100 it should
either connect you to something or do nothing.  If it does nothing, keep
entering (0)'s until it does something.  Count the number of digits you
entered and this will tell you how many digits the boxes on the system are.
You should note that many systems can have more than one box length depending
on the first number you enter, Eg. Boxes starting with a six can be five
digits while boxes starting with a seven can only be four.  For this file we
will assume you have found a four digit system, which is pretty common.  It
should do one of the following things...

1)  Give you an error message, Eg. 'Mailbox xxxx is invalid.'
2)  Ring the extension and then one of the following..
    1)  Someone or no one answers.
    2)  Connects you to a box.
3)  Connect you to mailbox xxxx.

If you get #1 then try some more numbers.  If you get #2 or #3 then you have
found a valid vmb (or extension in the case of 2-1).  Extensions usually have
a vmb for when they are not at their extension.  If you get an extension,
move on.  Where you find one box you will probably find more surrounding it.
Sometimes a system will try to be sneaky and put one valid vmb per 10 numbers.
Eg. Boxes would be at 105, 116, 121, ... with none in between.  Some systems
start boxes at either 10 after a round number or 100 after, depending on
whether it is a three or four box system.  For example, if you do not find
any around 100, try 110 and if you do not find any around 1000 try 1100.  The
only way to be sure is to try EVERY possible box number.  This takes time but
can be worth it.

Once you find a valid box (even if you do not know the passcode) there is a
simple trick to use when scanning for boxes outside of a vmb so that it does
not disconnect you after three invalid attempts.  What you do is try two box
numbers and then the third time enter a box number you know is valid.  Then
abort ( usually by pressing (*) or (#) ) and it will start over again.  From
there you can keep repeating this until you find a box you can hack on.


Different vmb systems have different login sequences (the way the vmb owner
gets into his box).  The most common way is to hit the pound (#) key from the
main menu.  This pound method works on most systems, including Aspens (more
on specific systems later).  It should respond with something like 'Enter
your mailbox.' and then 'Enter your passcode.'  Some systems have the
asterisk (*) key perform this function.  Another login method is hitting a
special key during the greeting (opening message) of the vmb.  On a Cindy or
Q Voice Mail system you hit the zero (0) key during the greet and since
you've already entered your mailbox number it will respond with 'Enter your
passcode.'  If (0) doesn't do anything try (#) or (*).  These previous two
methods of login are the most common, but it is possible some systems will
not respond to these commands.  If this should happen, keep playing around
with it and trying different keys.   If for some reason you cannot find the
login sequence, then save this system for later and move on.


This is where the basic hacking skills come to use.  When a system
administrator creates a box for someone, they use what's called a default
passcode.  This same code is used for all the new boxes on the system, and
often on other systems too.  Once the legitimate owner logs into his new vmb,
they are usually prompted to change the passcode, but not everyone realizes
that someone will be trying to get into their mailbox and quite a few people
leave their box with the default passcode or no passcode at all.  You should
try ALL the defaults I have listed first.

DEFAULTS           BOX NUMBER      TRY      

box number (bn)    3234            3234        Most Popular
bn backwards       2351            1532        Popular
bn+'0'             323             3230        Popular With Aspens

Some additional defaults in order of most to least common are:

4d        5d        6d
0000      00000     000000    *MOST POPULAR*
9999      99999     999999    *POPULAR*
1111      11111     111111    *POPULAR*
1234      12345     123456    *VERY POPULAR WITH OWNERS*
4321      54321     654321
6789      56789     456789
9876      98765     987654
2222      22222     222222      
3333      33333     333333
4444      44444     444444
5555      55555     555555
6666      66666     666666
7777      77777     777777      
8888      88888     888888

It is important to try ALL of these before giving up on a system.  If none of
these defaults work, try anything you think may be their passcode.  Also
remember that just because the system can have a four digit passcode the vmb
owner does not have to have use all four digits.  If you still cannot get
into the box, either the box owner has a good passcode or the system uses a
different default.  In either case, move on to another box.  If you seem to
be having no luck, then come back to this system later.  There are so many
vmb systems you should not spend too much time on one hard system.

If there's one thing I hate, it's a text file that says 'Hack into the
system.  Once you get in...' but unlike computer systems, vmb systems really
are easy to get into.  If you didn't get in, don't give up!  Try another
system and soon you will be in.  I would say that 90% of all voice mail
systems have a default listed above.  All you have to do is find a box with
one of the defaults.


The first thing you should do is listen to the messages in the box, if there
are any.  Take note of the dates the messages were left.  If they are more
than four weeks old, then it is pretty safe to assume the owner is not using
his box.  If there are any recent messages on it, you can assume he is
currently using his box.  NEVER take a box in use.  It will be deleted soon,
and will alert the system administrator that people are hacking the system.
This is the main reason vmb systems either go down, or tighten security.  If
you take a box that is not being used, it's probable no one will notice for
quite a while.


>From the main menu, see if there is an option to either send a message to
another user or check receipt of a message.  If there is you can search for
VIRGIN (unused) boxes) without being disconnected like you would from
outside of a box.  Virgin boxes have a 'generic' greeting and name.  Eg.
'Mailbox xxx' or 'Please leave your message for mailbox xxx...'   Write down
any boxes you find with a generic greeting or name, because they will
probably have the default passcode.  Another sign of a virgin box is a name
or greeting like 'This mailbox is for ...' or a women's voice saying a man's
name and vice versa, which is the system administrator's voice.  If the box
does not have this feature, simply use the previous method of scanning boxes
from the outside.  For an example of interior scanning, when inside an Aspen
box, chose (3) from the main menu to check for receipt.  It will respond with
'Enter box number.'  It is a good idea to start at a location you know there
are boxes present and scan consecutively, noting any boxes with a 'generic'
greeting.  If you enter an invalid box it will alert you and allow you to
enter another.  You can enter invalid box numbers forever, instead of the
usual three incorrect attempts from outside a box.


Now you need to find a box you can take over.  NEVER take a box in use; it
simply won't last.  Deserted boxes (with messages from months ago) are the
best and last the longest.  Take these first.  New boxes have a chance of
lasting, but if the person for whom the box was created tries to login,
you'll probably lose it.  If you find a box with the system administrator's
voice saying either the greeting or name (quite common), keeping it that way
will prolong the box life, especially the name.

This is the most important step in taking over a box!  Once you pick a box take over, watch it for at least three days BEFORE changing anything!  Once
you think it's not in use, then change only the passcode, nothing else!
Then login frequently for two to three days to monitor the box and make sure
no one is leaving messages in it.  Once you are pretty sure it is deserted,
change your greeting to something like 'Sorry I'm not in right now, please
leave your name and number and I'll get back to you.'  DO NOT say 'This is
Night Ranger dudes...' because if someone hears that it's good as gone.  Keep
your generic greeting for one week.  After that week, if there are no
messages from legitimate people, you can make your greeting say whatever you
want.  The whole process of getting a good vmb (that will last) takes about
7-10 days, the more time you take the better chance you have of keeping it
for long time.  If you take it over as soon as you get in, it'll probably
last you less than a week.  If you follow these instructions, chances are it
will last for months.  When you take some boxes, do not take too many at one
time.  You may need some to scan from later.  Plus listening to the messages
of the legitimate users can supply you with needed information, such as the
company's name, type of company, security measures, etc.


After you have become familiar with various systems, you will recognize them
by their characteristic female (or male) voice and will know what defaults
are most common and what tricks you can use.  The following is a few of a few
popular vmb systems.

ASPEN is one of the best vmb systems with the most features.  Many of them
will allow you to have two greetings (a regular and an extended absence
greeting), guest accounts, urgent or regular messages, and numerous other
features.  Aspens are easy to recognize because the female voice is very
annoying and often identifies herself as Aspen.  When you dial up an Aspen
system, sometimes you have to enter an (*) to get into the vmb system.  Once
you're in you hit (#) to login.  The system will respond with 'Mailbox number
please?'  If you enter an invalid mailbox the first time it will say 'Mailbox
xxx is invalid...' and the second time it will say 'You dialed xxx, there is
no such number...'  and after a third incorrect entry it will hang up.  If
you enter a valid box, it will say the box owner's name and 'Please enter
your passcode.'  The most common default for Aspens is either box number or
box number + (0).  You only get three attempts to enter a correct box number
and then three attempts to enter a correct passcode until it will disconnect
you.  From the main menu of an Aspen box you can enter (3) to scan for other
boxes so you won't be hung up like you would from outside the box.

CINDY is another popular system.  The system will start by saying 'Good
Morning/Afternoon/Evening.  Please enter the mailbox number you wish...' and
is easy to identify.  After three invalid box entries the system will say
'Good Day/Evening!' and hang up.  To login, enter the box number and during
the greet press (0) then your passcode.  The default for ALL Cindy systems is
(0).  From the main menu you can enter (6) to scan for other boxes so you
won't be hung up.  Cindy voice mail systems also have a guest feature, like
Aspens.  You can make a guest account for someone, and give them
password, and leave them messages.  To access their guest account, they just
login as you would except they enter their guest passcode.  Cindy systems
also have a feature where you can have it call a particular number and
deliver a recorded message.  However, I have yet to get this feature to work
on any Cindy boxes that I have.

MESSAGE CENTER is also very popular, especially with direct dials.  To login
on a Message Center, hit the (*) key during the greet and the system will
respond with 'Hello <name>.  Please enter your passcode.'  These vmbs are
very tricky with their passcode methods.  The first trick is when you enter
an invalid passcode it will stop you one digit AFTER the maximum passcode
length.  Eg. If you enter 1-2-3-4-5 and it gives you an error message you enter the fifth digit, that means the system uses a four digit passcode,
which is most common on Message Centers.  The second trick is that if you enter
an invalid code the first time, no matter what you enter as the second passcode
it will give you an error message and ask again.  Then if you entered the
correct passcode the second and third time it will let you login.  Also, most
Message Centers do not have a default, instead the new boxes are 'open' and
when you hit (*) it will let you in.  After hitting (*) the first time to
login a box you can hit (*) again and it will say 'Welcome to the Message
Center.' and from there you can dial other extensions.  This last feature can
be useful for scanning outside a box.  To find a new box, just keep entering
box numbers and hitting (*) to login.  If it doesn't say something to the
effect of welcome to your new mailbox then just hit (*) again and it will
send you back to the main system so you can enter another box.  This way you
will not be disconnected.  Once you find a box, you can enter (6) 'M'ake a
message to scan for other boxes with generic names.  After hitting (6) it
will ask for a mailbox number.  You can keep entering mailbox numbers until
you find a generic one.  Then you can cancel your message and go hack it out.

Q VOICE MAIL is a rather nice system but not as common.  It identifies itself
'Welcome to Q Voice Mail Paging' so there is no question about what system it
is.  The box numbers are usually five digits and to login you enter (0) like
a Cindy system.  From the main menu you can enter (3) to scan other boxes.

There are many more systems I recognize but do not know the name for them.
You will become familiar with these systems too.


You can use someone else's vmb system to practice the methods outlined above,
but if you want a box that will last you need to scan out a virgin system.
If you did everything above and could not get a vmb, try again on another
system.  If you follow everything correctly, I guarantee you will have more
vmbs than you know what to do with.  When you start getting a lot of them, if
you are having trouble, or just want to say hi be sure to drop me a line on
either of my internet addresses, or leave me a voice mail message.

NOTE:  Some information was purposely not included in this file to prevent
abuse to various systems.

                               Night Ranger

                 1-800-666-2336  Box 602  (After Business Hours)
                 1-800-435-2008  Box 896  (After Business Hours)

Friday, 13 January 2017

Block Adservers

Block Adservers

f you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I belive it will help you a lot

how it works
It's possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven't guessed already, the way you block ads it to provide bogus information about the domains we don't want to see - ie, all those servers out there that dedicate their existence to spewing out banner ads.

The hosts file

Probably the most common way people block ads like this is with something called the "hosts file". The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you're trying to reach, it sets the IP address for that computer to be whatever's in the hosts file. is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be And to do that, all we have to do is edit the hosts file. What will happen then is something like this:

  1. you visit a web page
  2. the web page contains a banner ad stored on the server ""
  3. your computer says " never heard of it. wait a second, let's see if I've got the number on me..."
  4. your computer finds its hosts file and checks to see if is listed
  5. it finds the hostname, which points to
  6. "great", says the computer, and sends off a request to for the banner ad that's supposed to be on the page
  7. "oh", says the computer, and fails to show anything because it just sent a request to itself for a banner ad

  Where's my hosts file?

    * Windows 95 / 98 / ME: C:\Windows (I think)
    * Windows NT: C:\WinNT\hosts
    * Windows 2000: C:\WinNT\system32\drivers\etc\
    * Windows XP: C:\Windows\System32\drivers\etc
    * FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts
    * Classic Mac OS: please read this helpful information submitted by David "iNerd" B
    * Mac OS 9: Marcia Skidmore sent in details that hopefully explain what you need to know

The format of the hosts file is very simple - IP address, whitespace, then a list of hostnames (except for older Macs; please see above). However, you don't need to know anything about the format if you don't want to as you can just view the list hosts file.

Of course, that's not the only way to use the list, but it's probably the most simple for most people.

here is the hosts list which are serving you the ads just append it to your hosts file and enjoy ad free surfing makes things faster. if you want ad from certain site then just remove it from the list below.