💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › thief35.txt captured on 2020-10-31 at 15:24:30.

View Raw

More Information

-=-=-=-=-=-=-

    
    =======================================================================
    
    
                       C o d e   T h i e f   D e l u x e
              R e v i s i o n   3 . 5   D o c u m e n t a t i o n
                      B y   B r e w   A s s o c i a t e s
    
        A N   O F F I C I A L   P H O R T U N E   5 0 0   P R O D U C T
    
    =======================================================================
    
    -> Introduction To Code Thief Deluxe 3.5 <-

       Well, here it finally is.  Code Thief Deluxe 3.5.  If you are new to 
    Code Thief, this is the file to read.  If you are already familiar with 
    Code ?Thief, ?especially if you have Code Thief 3.0 ?already, ?you ?can 
    check ?out just the new additions and updates to Code Thief ?Deluxe ?by 
    reading DELUXE.DOC, included in your Code Thief Deluxe ZIPfile. 
    
       As an incentive to read the documentation, ?I ?have tried to lay out 
    all ?of the 'little things' ?about the program and its behavior.  ?This 
    will ?help you understand more.  ?Also notice that Code Thief does ?not 
    make any direct screen writes.  ?All screen access is done through ?the 
    BIOS.  ?Its fast enough as it is, and shouldn't a hacker be able to run 
    in ?the BACKGROUND so you can do something else?  ?As I am writing this 
    documentation I am in DesqView, with Code Thief running concurrently in 
    another window.  

    -> Disclaimer <-

       There ?is ?no disclaimer.  ?Code Thief was written with ?the ?intent 
    purpose of committing the crime of 'theft of services'.  ?Of course you 
    don't have to use it, ?but then again, ?do you have all of the money in 
    the ?world ?at your disposal to pay for calling out of ?state ?bulletin 
    boards plus the mainframes/mini computers that you are trying to hack? 
    
    -> From The Author <-

       A LOT of work has gone  into  the  Code  Thief  project,  especially 
    revision  2.x/3.x  of the program.  ?If you support the program then be 
    sure to upload it to any and all of your favorite boards.  It's a great 
    way ?to increase your file points and ratio while helping ?your ?fellow 
    long distance 'users'.

    -> An Official Phortune 500 Product <-
    
       My thanks to the Phortune 500 ?Board of Directors, ?and the Phortune 
    500 membership.  The Phortune 500 Board of Directors as of now consists 
    of: ??Brew Associates (author of Code Thief), ?Renegade Chemist, ?Aahz, 
    Quinton J. ?Miranda, The Spiker, Striker, Red Knight, Major Havoc, ?and 
    Lord Lawless. 
    
    -> Starting The Program <-

       To start the program normally,  enter THIEF from DOS.  You can  also 
    enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code 
    Thief  will  automatically  hack  the  flagged  multiple extenders with 
    multiple targets until the time specified,  then drop back out to  DOS.  
    This is great for a BBS's batch file.  For instance,  you can have your 
    BBS invoke a batch file at a certain time.  This batch file  could  say 
    something  like  THIEF 5:30.  This will invoke multiple target/multiple 
    extender hacking until 5:30 am.  Note that all times  are  in  24  hour 
    mode.  Also,  if  no  multiple  targets  are  found  the  defaults  are 
    automatically used.  This modification is on the request of an Opus BBS 
    sysop.  Hope it comes in handy.  

                       IF THE PROGRAM IS STARTED NORMALLY
    
       When you first start the program you will see the main option  menu.  
    At this and any menu you can use the up and down arrow keys to move the 
    highlight  over  an  option and press RETURN or the SPACEBAR to finally 
    choose the option.  I will try to move you through the running  of  the 
    program  to  get it working on your machine so it is suggested that you 
    print this documentation out and work the actual program  as  you  read 
    it.  

    -> Setting Your Modem Paramaters <-

       The first thing you will probably want  to  do  is  set  your  modem 
    paramaters.  Use  the up and down arrow keys to move the highlight over 
    option "H" on the main option menu then hit CR or RETURN,  or just  hit 
    "H"  then  CR  or RETURN.  You will be greeted with three more options.  
    First  choose  "Modem  Specifics".  This  is  where  you  can  set  the 
    paramaters  for your particular modem.  If a default doesn't match your 
    configuration then use the up and down arrow keys to move the highlight 
    over the option then hit RETURN or SPACE.  The highlight will disappear 
    and ?you ?can make an entry.  ?If it is a number or some ?other ?field, 
    enter the new value to use.  ?If it is some kind of a toggle, ?use your 
    left ?and right arrow keys until what you want comes into view.  ?Press 
    RETURN when you are satisfied with your choice.  
    
                                MODEM SPECIFICS

    COM Port       - This can be eighter COM1: COM2:, COM3: Or COM4:.  ?Use 
                     the left  and right arrow keys to select Port 1, ?Port 
                     2, Port 3, Port 4.  Then hit RETURN. 
    Baud ?Rate     - Enter  the  baud rate to open the ?modem ?at ?whenever 
                     hacking ?or ?scanning is performed.  ?Your choices are 
                     300 ?Baud, ?1200 Baud, ?and 2400 ?Baud.  ?The left and 
                     right ?arrow keys move you through the choices.  ??Hit 
                     RETURN when you are satisfied. 
    PBX Mode       - Choices are Yes and No.  The left and right arrow keys 
                     moves you ?through the choices and RETURN selects.  If 
                     you ?are ?in ?a ?building with a PBX then you have ?to 
                     enter Yes for this option.
    PBX Digit      - This ?is the PBX  digit.  ?When you are in a ?building 
                     with ?a PBX installed a certain digit has to be dialed 
                     to receive an outside line.  ?If PBX mode is No, ?then 
                     N/A will appear for Not Applicable.  ?Trying to change 
                     this with PBX mode to No will cause it to beep at you.  
    PBX Delay      - This ?is the number of seconds after entering the ?PBX 
                     digit ?to wait for the outside line.  ?N/A if PBX Mode 
                     is No. 
    Local Dialing  - Not everyone has Touchtone (tm) ??dialing ?from ?their 
                     home.  If you don't change this to Pulse.  Just select 
                     it with the highlight, ?hit return, ?then use the left 
                     or ?right ?arrow ?key ?to select the ?new ?option ?and 
                     another return will make it permanent. 
    Speaker On     - Choose ?Yes to keep the speaker on during hacking ?and 
                     scanning or No to keep it off. 
    Dial Tone Wait - This ?is ?the number of seconds the modem is ?to ?wait 
                     after picking up the line until starting to dial.  ?It 
                     does this through the Hayes (and compatibles) ?command 
                     registers. 
    Carrier Detect - This is the number of 1/10 seconds that a carrier must 
                     be present for the modem to detect it as valid.  ?This 
                     defeats some LD ?service's ?fake-carrier routines that 
                     send ?a ?fake ?carrier ?for a short ?period ?of ?time.  
                     Remember ?that ?REAL carriers are ?sent for ?a ?longer 
                     period ?of time than fake carriers.  ?Experiment ?with 
                     this one.
    Dialing Speed  - This is the speed of the touchtone dialer.  This is in 
                     1/100 of a second.  ?This number can range from 50-255 
                     (at least with the modem I use). 
    User String    - If there is something entered here then it is sent out 
                     to the modem.  If you have an advanced modem, then set 
                     it to "ATX6" ?to enable your extended result codes for 
                     such ?things ?as VOICE, ?etc.  ?You can over-ride ?the 
                     "Speaker ?On" ??setting by making this "ATM1".  ??That 
                     would be stupid, but it's just an example. 
    
                               MODEM RESULT CODES

       In this section you enter the result codes that your modem uses when 
    in  non-verbose  mode.  Note  that the defaults should suffice.  If you 
    have ?a ?strange ?modem configuration you can change ?these.  ??Numbers 
    aren't the only thing allowed here, ?you can enter symbols like ";" ?or 
    ":", or etc.  Someone had a strange "Hayes Compatible" modem and wanted 
    this capability.  I aim to please. 
    
    -> Edit Extender Configurations <-

       The next thing you will want to do is create configurations for  the 
    different   extenders   you   wish  to  hack.   Choose  "Edit  Extender 
    Configurations" ??after you exit back to the main options menu.  ?If no 
    EXTENDER.DAT ?file ?exists, ?one will be created for you with ?a ?dummy 
    initial record (you will want to change this of course, ?1-800-000-0000 
    is ?not ?a valid extender).  ?If you haven't screwed anything up, ??you 
    should ?now see the first record of the sample EXTENDER.DAT I ?included 
    in the Code Thief archive file.  ?These are just some 800 ?extenders to 
    get you started.  Note that you might want to change some delays, ?etc, 
    to work for you.  As they are now they work for ME.  Your case might be 
    different.  Experiment.  ?Hitting [A] will ADD AN EXTENDER to the file.  
    Hitting ?[E] ?will ?EDIT the current extender (there's ?that ?highlight 
    again!).  ?Hitting ?[D] ?will ?prompt you to confirm the ?DELETE of the 
    extender ?record.  ??Hitting [Q] will quit the ?extender ?editor.  ??To 
    understand ?all ?of the fields for the individual extender, ??let's ?go 
    through ?the process of ADDING an extender.  ?You will notice that Code 
    Thief is an extremely complex code hacker.  But also note that there is 
    so ?much flexibility that you will be able to hack just about ?anything 
    that is out there, no matter what kind of format it is.  
    
    ADD AN EXTENDER

    When you choose to ADD an extender you will be given the opportunity to 
    enter ?the ?complete  ?configuration  for  the extender.  ??The  ?first  
    thing  is  the telephone number of the extender. ?After that is a short 
    note ?used ?to identify  the  extender.  ?Note  ?that ?throughout  ?the 
    program ?in ?various ?sections extenders are refered to by ?this ?short 
    note,  so make sure it is something you can  easily  recall.  ?You  can 
    make ?it the number of the extender if you wish.  ?Anything goes ?here, 
    but the program will beep at you if you try to leave it blank.  Next is 
    the length of the codes.  ?For METRO it is 6, ?MCI calling cards it ?is 
    14,  ?etc. ?No code lengths of ?0 are allowed (it will beep).  Next  is  
    the  code  template.  ?This idea is borrowed from Fuckin' ?Hacker ?from 
    2af because I think it ?is  ?a  very  powerfull  feature.  ?If this  is  
    used it completely over-rides the code length,  hacking mode, ?starting 
    code, and sequential increment in your configuration.  Anyway, here you 
    are to construct a "template" for your  codes.  For  instance, entering  
    "444XXX"  will  make every code 6 digits and starting in 444.  Entering 
    "0X1X2X" ?will make set the first, ?third,  ?and fifth numbers in every 
    code ?to 0,1, ?and 2 respectively and the second, ?fourth, ??and ?sixth 
    number in each code will be totally random.  Commas are also allowed in 
    the code template and will cause the modem to pause for 2 seconds.  For 
    instance,  XXXX,9 will cause a random 4 number code to be sent, a pause 
    for 2 seconds,  then a 9 will be sent.  This is good for hacking  PBX's 
    that  require  a  code  be sent then need a number for an outside line.  
    Leave ?the code template blank if you don't wish to use it. ??Next ?you 
    will ?enter the code delay.  ?This is the number of  seconds  to ?delay  
    before  sending the code.  Then you will enter the target delay.  ?This 
    is ?the ?number ?of seconds to wait until entering the ?target ?number.  
    Notice that also in the config is an option to put the  code  first  or 
    not.  If  the  code  is  sent  first  then the Code Delay should be the 
    number of seconds to wait after dialing the extender until the code  is 
    sent  after the extender answers and provides a dial tone.  If the code 
    is not sent first then the  target  number  will  be  sent  first.  The 
    target  delay should be the number of seconds to wait after dialing the 
    extender until the target is sent at the extender's dialtone.  Then the 
    code delay is the number of seconds to  wait  until  sending  the  code 
    AFTER  the  target  number  is sent.  The timeout is next.  This is the 
    number of seconds to wait for your  TARGET  number  to  answer.  If  it 
    doesn't  ?answer  ?within ?this time the code ?is ?considered ?invalid.  
    Basically, the target delay tells the modem how long to wait.  When the 
    modem times out it tells Code Thief, and Code Thief moves on. Now enter 
    a default Target number.  ?This is a number that always answers with ?a 
    modem ?(is ?never busy).  ?Telenet is perfect for this (so ?enter ?your 
    local ?Telenet ?number).  ??Note that Code Thief can ?also ?use ?random 
    multiple ?targets ?- this is covered in the MULTIPLE TARGET ?CONVERSION 
    UTILITIES ?that has been included as a Code Thief companion program ?in 
    your ?Code ?Thief ?ARChive.  ?Read CONVERT.DOC ?for ?information ?about 
    targets and multiple ?targets ?at that. ?Next is the hacking mode.  Use 
    your ?left and right arrow keys to move through the selections and ?hit 
    RETURN when you are satisfied.  ?You can have Random codes, ?Sequential 
    codes, ?or Both ?- ?sequential ?codes ?with a random increment.  If you 
    choose ?Sequential or Both you are now prompted for the starting ?code, 
    otherwise this value is set to N/A.  ?Next  ?you enter  the  sequential 
    increment only if Sequential hacking is chosen.  ?If sequential hacking 
    is chosen then this is the number to increment ?each code by.  ?If Both 
    is ?chosen, ??then this number is random in the range ?of ?1-100 ??when 
    hacking.  ??If ?Both or Random hacking is your chosen method ?then ?the 
    Sequential ?Increment is N/A.  Note that the sequential increment is an 
    integer, therefore any value from 1 to 32767 is valid.  If "Sequential" 
    hacking or "Both" ?hacking is chosen and the increment ever exceeds the 
    code length, ?only the length of the code up to the code length will be 
    used.  ??For example, ?with a code length of 4 and an starting code ?of 
    9999, ?if an increment of 1 is made your next code will be 1000.  ??Now 
    you ?will be prompted as to if ?the code should be entered first.  ?Use 
    the left and right arrow keys to select Yes or No.  ?If you choose Yes, 
    then ?the code will be sent first.  ?Choose No and the target ?will ?be 
    sent first.  Next is the target prefix digit.  ?This is a number to add 
    to the beginning of the target  number.  ?For  example,  ?for  the  MCI  
    calling card service ?you ?enter the target first and prefix it with ?a 
    "0".  ITT requires that the target  be  sent first  and  be prefixed by 
    a ?"1".  ??Other ?services require that the CODE is sent first and ?the 
    target  ?has  NO  prefix.  Next  is  the  multiple extender  flag.  ?If  
    Yes then  the  extender will ?be ?flagged immediately as one to be used 
    when Multiple Extender hacking is chosen.  If you choose No, ?then this 
    extender will be put  on  reserve.  More  on this comes later.  Next is 
    multiple port mode.  ??Say the ?extender number is  950-1000  ?and  the 
    extender ?has ?multiple ?port hunt groups from 950-1000 ??to ?950-2000.  
    Choosing Yes to multiple ?port mode will prompt you for the ending hunt 
    number (in ?my example it's 2000).  ?Now Code Thief will randomly ?pick 
    950-1000 ??to ?950-2000 ?whenever it dials the extender. ??Ending ?Hunt 
    numbers ?MUST be four digits ?long ?(that should be ?self-explanatory).  
    Note ?that ?if ?your extender ?is 1-800-555-0000 ?and your Ending ?Hunt 
    Number is 0099 ?Code Thief ?won't ?screw up by dialing 1-800-555-99 ?or 
    whatever number is chosen.  It will properly dial 1-800-555-0099 (or 1-
    800-555-0050 or 1-800-555-0026, ?etc, ?etc, ?etc).  Next you will enter 
    the filename to place valid codes in.  ?Valid codes are logged with the 
    time and date for convienence.  ?All valid code ?files  ?end  with  the  
    ".COD" extention.  ?When  finished  ?entering  all extender information 
    it is saved to the EXTENDER.DAT file. 

    OTHER EXTENDER EDITOR COMMANDS
    
    To  ?navigate  through the configurations use the LEFT and RIGHT ?arrow 
    keys.  ??To ?flag ?an extender for deletion enter "D".  ??You ?will ?be 
    prompted to enter "Y" ?if you are sure or "N" if  you  are  not.  ?Once  
    an extender has been flagged for deletion it will be skipped over ?when 
    you ?use ?the left and right  arrow  keys.  ?Hit  "Q"  ?to  quit  ?this 
    section.  When  you  hit  "Q"  all  extenders  flagged for deletion are 
    physically deleted.  Another  nice  feature  in  this  section  is  the 
    ability to edit extenders.  Hit "E" to choose edit.  The highlight will 
    appear.  You  can  use  the  left,  right,  up,  and down arrow keys to 
    navigate the hightlight over the option you wish to  change.  Then  hit 
    RETURN  or  SPACE  to  enter a new value.  When finished entering a new 
    value (either by the keyboard or left and right arrow keys) ?hit RETURN 
    and ?the ?highlight will re-appear so that you may  move it  over  ?new  
    things  to edit.  ?When finished editing hit "Q" ?when the highlight is 
    present.  Note that everything  in  the  configuration  is described in 
    the ?previous paragraph.  ?To choose a particular ?extender ?by ?record 
    number, ?just enter the number.  ?You can't ?see ?extenders flagged for 
    deletion (it will not go to them). 

    One ?more thing on deletion extender configurations.  ?If in the course 
    of ?using this section you delete ALL of your extender ?configurations, 
    the program will not have any configurations left to go to and it ?will 
    automatically ?quit this section deleting the entire EXTENDER.DAT file.  
    When ?choosing ?this section again, ?a ?new EXTENDER.DAT with ?a ?dummy 
    record will be created. 
    
    -> Edit The Multiple Target File <-

       Navigate back to the main menu.  Choose "Edit  The  Multiple  Target 
    File".  You  will  then be shown the current multiple target file.  Now 
    you can either hit "1" to add to it,  "2" to delete entries from it  or 
    "3"  to  quit.  Everything here is self-explanatory.  A multiple target 
    file is provided with the program.  It is kept in ASCII file format for 
    easy editing with your word processor, ?if you wish.  ?Use the MULTIPLE 
    TARGET CONVERSION UTILITIES in your Code Thief ARChive to get quick and 
    painless ?updates of your multiple target MTARG.DAT file off Telenet or 
    even ??Tymnet ?at ?regular ?intervals.  ??Code ?Thief ?is ?a ??complete 
    professional system that will solve all your hacking needs. 

    -> Flag Extenders For Hacking Mode <-

       Exit ?to the main menu and choose "Flag Extenders For Hacking Mode".  
    This  is  the option to choose to change the flags on extenders.  If it 
    is flagged then it will be one of  the  extenders  used  when  multiple 
    extender  hacking is chosen.  The extenders will be shown,  ?eight to a 
    page.  A "+" in front of the extender means it will  be  included  when 
    multiple  extender  hacking  is  chosen,  otherwise  it will not.  This 
    option is included because some people don't want to hack  all  of  the 
    extenders  they  have  configurations  for.  Editing  an  extender  and 
    changing the multiple extender flag does the same thing,  but  this  is 
    easier.  If  there are more than eight extenders then they will take up 
    more than one page.  You can flip through the pages by  choosing  "Jump 
    To  Next  Page"  and  "Jump To Previous Page".  Hitting RETURN or SPACE 
    when the highlight is over an extener toggles the flag.  

    -> Deluxe Exchange Scanner <-

       Navigate ?back  ?to  the  main  menu  and  choose  "Deluxe ?Exchange 
    Scanner".  ??The ?Code Thief Deluxe exchange scanner is a ?full ?screen 
    exchange ?scanner that can scan multiple exchanges from a database that 
    you ?can ?configure.  ?When you choose this option if no exchanges ?are 
    defined, a dummy first record will be created for you.  ?Now hit [R] to 
    replace this record and enter an exchange to scan, ?the starting number 
    in the exchange, then the ending number.  To flag the exchange just hit 
    [+] ?next.  ?Unflagging is done by hitting [-].  ?Note that to scan you 
    must ?have at lease one flagged exchange.  ?You can't scan nothing ?can 
    you?  ???The ?exchange ?editor ?is ?a ?lot ?like ?the ?"Edit ??Extender 
    Configurations" section.  To jump to a particular exchange, ?just enter 
    the ?number.  ?To move through the exchanges record by record ?use ?the 
    left and right arrow keys coresponding to the direction in the file you 
    wish ?to ?move.  ?Use [A] to add an exchange.  ?Use [D] ?to ?delete ?an 
    exchange ?from the database.  ?Use the [SPACEBAR] to toggle weather ?or 
    not a particular exchange is in the toll free 1-800 area.  ?Hitting [Q] 
    will quit the exchange scanner section, ?but to start scanning hit ?[G] 
    for ?Go.  ?You will be asked the timeout (number of seconds a ?computer 
    should ?answer ?in).  ??Then ?Code Thief will check ?to ?see ?how ?many 
    exchanges are flagged.  When scanning and Code Thief reaches the ending 
    number ?in ?an ?exchange, ?the exchange will be unflagged.  ??When ?all 
    flagged ?exchanges ?are changed to unflagged (all ?exchanges ?are ?done 
    being ?scanned in the limits you specified in the configuration) ??Code 
    Thief will quit the exchange scanner. 

    THE ACTUAL EXCHANGE SCANNER

    This ?is ?a ?full screen exchange scanner ala the movie ?WarGames ?(the 
    movie ?sucked ?by the way) ?and  it will  show  each  of  the  ?numbers 
    dialed.  ??Numbers where computers are detected are shown BLINKING.  If 
    the modem does not detect ?a dial  tone when  trying  to dial (receives 
    the no ?dial ?tone result code) it retrys the line.  After 5 retries it 
    exits the exchange scanner.  If the modem sends a BUSY result code that 
    is ?logged ?to the CARRIERS.TXT  ?disk  ?file along with ?numbers ?that 
    produced a CONNECT result code of any baud.  It will  specifically  log  
    it as ?a BUSY number or a number that the modem CONNECTed to.  ?You can 
    then ?consult ?the log and dial these numbers back manually if you wish 
    to ensure that the numbers listed as  busy  aren't important.  When the 
    screen fills up, Code Thief goes back to the beginning. 

    -> View/Delete Code Files <-

       When  you choose this option from the main option menu the disk will 
    be searched for files with a .COD extention.  If  there  are  any  they 
    will  be  displayed.  If  there are no files with a .COD extention that 
    will be displayed also.  You have the option of viewing  one  of  these 
    files or deleting one.  If you view one it will be one screen at a time 
    so  nothing scrolls past you.  Note that the time and date the code was 
    found is logged for your convienence.  

    -> View/Delete Carrier File <-

       This option is also on the main  option  menu.  All  carriers  found 
    when   using   the  exchange  scanner  are  logged  to  a  file  called 
    CARRIERS.TXT,  as well as BUSY numbers if the modem sends a BUSY result 
    code.  When  viewing the file it will be showed one screen at a time so 
    nothing scrolls past you.  You can also delete the file.  Note that the 
    time and date the number was found is logged for your convienence.  
            
    -> Start Hacking <-

       After you choose this option you will be prompted as to weather  you 
    want   to   do   Single   Extender/Single   Target   Hacking,    Single 
    Extender/Multiple  Target  Hacking,   Multiple  Extender/Single  Target 
    Hacking,  Or Multiple Extender/Multiple Target Hacking.  ?If you choose 
    multiple target hacking of any kind  the  targets  will  be  read  into 
    memory  before  hacking begins to cut down greatly on disk access time.  
    If single extender hacking is chosen  you  will  be  prompted  for  the 
    extender  to  hack.  Use  the  arrow keys to highlight the extender you 
    want then press RETURN or SPACE.  If there is more  than  one  page  of 
    extenders  then  highlight  "Jump  To  Previous Page" and "Jump To Next 
    Page" to navigate around the list.  

                              WHEN HACKING BEGINS
    
    You will  be shown  the  complete  statistics for every extender.  Also 
    shown ?is the number of codes found,  ?the last code found as ?well ?as  
    the  number  of codes  found  for  that  extender plus other statistics 
    for the current hacking run for each extender.  The number of extenders 
    you ?can have at any time is limited only to disk space,  ?of  ?course.  
    Multiple  ?targets are limited to 500.  ?This is, ?I ?think, ?more than 
    enough.  If you chose to quit hacking at a certain time, that time will 
    be displayed on the screen as a reminder.  ?Hit ESCape to quit ?hacking 
    at any time.  If you forgot to configure your modem and it is connected 
    to ?COM2 ??(the default is COM1) ?then Code ?Thief ?will ?automatically 
    recognize that ?something is wrong and exit the exchange scanner.  ?You 
    can ?also ?hit the SPACEBAR to skip to the next ?code.  ?If you have ?a 
    picky modem like mine, only use the ESCape key or the SPACEbar when the 
    modem is not sending any DTMF to the line.  ?But if you DO screw up the 
    modem Code Thief will know and will make the attempt to recover. 
    
                          POSIBILITIES DURING HACKING

       Many things can happen during hacking.  For instance,  if the  modem 
    connects  the code and extender is logged to it's respective disk file.  
    If the modem sends an ERROR result code the current attempt is  retryed 
    again.  If NO DIAL TONE is detected by the modem the current attempt is 
    retryed.  ??If NO CARRIER or VOICE is detected by the modem the program 
    moves on.  ?The  maximum  number  of  retrys that can ever be done in a 
    row ?is five.  ?Oh,  ?if the modem sends a RINGING result code that ?is 
    also ?shown ?to  the user while the modem waits to timeout or ?connect.  
    Ringing ?does ?nothing ?but just display "Ringing...".  ?If ?the ?modem  
    receives  a  busy signal  it goes on to another attempt.  I origionally 
    planned ?on ?making ?it ?retry ?the code but ?I ?remembered ?that ?some 
    extenders ?send ?a  re-order which  is a fast busy signal that ?can ?be 
    detected by the modem and send a BUSY result code.  
    
    -> Closing Notes <-

       I  hope you understood this new documentation.  Im not really a good 
    writer,  ?so if you have any questions leave me a note  on  any board I 
    happen to be on ?and ?I ?will ?try to answer it.  ?I hope you like Code 
    Thief and find it usefull as I put a LOT of hours and hard work into it 
    until I was satisfied.  If anything goes wrong with the program on your 
    machine,  or anything else in general then leave me a note.  I will try 
    to diagnose the problem and stamp it out.  

                    COMMUNICATIONS ADDRESSES AND INTERRUPTS

       Here ?are the communications address and interrupts that Code ?Thief 
    uses to access the communications ports.  ?COM1: and COM2: ?are correct 
    for ?100% ??of the applications.  ?COM3: ?and COM4: ?as defined by ?the 
    program will be correct 99% of the time.  If you have a COM3: modem and 
    Code Thief set at Port 3 doesn't work with it then change your modem to 
    COM1: ??or COM2: ?if possible.  ?If you really need YOUR communications 
    addresses and interrupts for COM3: ?and COM4: ?leave me a note with the 
    correct ?information on any board I am on and I will try to get ?you ?a 
    new ?THIEF.COM ?and ?THIEF.000.  ??But ?note ?that ?the ?addresses ?and 
    interrupts ?used for COM3: and COM4: are going to be correct more times 
    than not. 

              Address  Interrupt                Address  Interrupt
              -------  ---------                -------  ---------
        COM1: 3F8      IRQ4               COM3: 3E8      IRQ4
        COM2: 2F8      IRQ3               COM4: 2E8      IRQ3

            
      F i l e s   S u p p l i e d   W i t h   C o d e   T h i e f   3 . 5

       Make ?sure that these are the files you received in your ZIPfile ?of 
    Code  Thief revision 3.5.  If these are not the files then what you got 
    is ?something that  someone  else  re-ZIPed  and  forgot  ?to  ?include 
    something  in.  I  ask  that  you only distribute the origional ZIPfile 
    because people have confused themselves in the past. 

     THIEF35.DOC - Code Thief Deluxe v3.5 documentation
      DELUXE.DOC - What's new since Code Thief 3.0?
       THIEF.COM - Code Thief 3.5 - The actual program
       THIEF.000 - Primary ?Code ?Thief ?overlay.  ??Must be ?in ?the ?same 
                   directory ?as ?THIEF.COM and you must be logged to ?that 
                   directory
       MTARG.DAT - Code ?Thief ?multiple target file - use Multiple ?Target 
                   Conversion Utilities to make your own also 
    EXTENDER.DAT - Sample 1-800 extender file to get you started
    
                      MULTIPLE TARGET CONVERSION UTILITIES
                       A CODE THIEF 3.5 COMPANION PROGRAM
                (be sure to read CONVERT.DOC to understand this)

     CONVERT.COM - Multiple Target Conversion Utilities - The program
     CONVERT.DOC - Multiple Target Conversion Utilities - The documentation
     TELENET.LST - Sample file off Telenet to get you started
      TYMNET.LST - Sample file off Tymnet to get you started
      TYMFIX.COM - You must run TYMFIX to make TYMNET.LST into ?TYMNET.FIX.  
                   Only TYMNET.FIX ?will ?work ?with ?the ?Multiple ?Target 
                   Conversion ?Utilities.  ??Also use TYMFIX.COM to fix the 
                   listings you ascii-download off Tymnet.