💾 Archived View for spam.works › mirrors › textfiles › uploads › bc-newsletter-1.txt captured on 2023-11-14 at 12:37:35.
View Raw
More Information
⬅️ Previous capture (2023-06-16)
-=-=-=-=-=-=-
BlackCode Ravers Mailing List Issue 1
http://www.blackcode.com
Table of Contents
1.Editorial
2.Latest News about BlackCode
3.Why you should vote?
4.Encryption and PGP
5.Final Words
1.Editorial
=-=-=-=-=-=-=-=-=-=-=-=-=
Hello subscribers.
I'm tHe mAnIaC and I'll maintain the mailing list.
As you're subscriber you'll receive:
1.Latest news about BlackCode Ravers
2.Latest Security news
3.Latest news about trojans and anti-trojan software
4.Interesting texts about H/C/P/A
and many other things I hope you'll like and find useful.
I have one idea for the
list.I want it to become something like magazine or newsletter where
we post all of the latest news,texts about different things and so on.
But we need your help.So if you can write something or help us or
suggest something mail me at themaniac@blackcode.com.I'll really
appreciate if you do this.
I just can't handle all the section I want to include phreaking,cracking
and so on but I can't do it alone that's why I'm asking you to help me.
I'll also ask you to do some advertizing of the page if you like it.You can
put a link on your page or you can tell other people about it.Everyone
should know the page.
Be ready for BIG update of the page soon with many new texts and files
added.All the texts you see here will be also published on the web page.
2.Latest News about BlackCode
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Kung made his first virii for Blackcode (1.1 and 1.2).Check BC-Tech for more info and downloads.
Our mailing list has many new subscribers and I'm very happy about that.
3.Why you should vote?
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BlackCode has many visitors per day but most of them are not voting
for the page so I decided to write a little text about the voting and what
is it.I hope you'll like it and understand what the voting is about and
what you'll win if you vote.
About Voting
by tHe mAnIaC
In this text I'll explain you about the "BIG" thing called voting for one page because a lot of people
think this is not right and that they'll loose if they vote for some page.I hope you'll understand for
what is the voting about and why you should vote.I'll also tell you about LAME pages that fake
their votes and their ways of making the people vote for the site.
- This guide is for educational purposes only I do not take any responsibility about anything
happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision
There has been many list established on the net for the best H/C/P/A pages on the net something
like rank lists where people can vote if they like the page.Probably the most famous one are located
at:
www.cyberamy.com
www.progenic.com
www.blackcode.com
These are the places where most of the people go to check for cool sites about H/C/P/A information.
When you go to some H/C/P/A site on the net they'll probably
ask you to vote for them.You may ask why?
Well let's use one example.So some people create one web page and they ask you to vote in this way
they can see if the visitors like the page or not,because they won't continue with the page if there's
noone that is voting for them.When the web masters see that a lot of people are voting for them
they'll make updates of the page and put many and interesting things on it because there will be
someone to see them because there's also someone that is voting for them that is expecting
updates and new things on the page.That's why the webmasters will make the updates because
they won't want to disappoint the visitors that are voting for them.
I hope now you understand why you should vote and what you'll win when you vote for the page.
But of course you should not vote for page that you don't like.
When someone enters in these lists of cool pages he/she will first see what's on the top and the
first 10 pages because they're on the top that means that a lot of people are voting for them.
The visitor will go to see the page.But NOT ONLY the pages that are on the top are good believe me
when you check the small ones that even don't have ONE vote for them I'm sure you'll find something
that the big one and these that are on the top don't have.If you find some group you may find
their own programs and texts there and a lot of other things you thought are only in the big and the
best pages.But this is the net you CAN'T know every page because every day there're so MANY
new one made and also new group is being discovered new text has been written and so on.So
check every page not only these that are on the top and I'm sure you'll find something useful there.
BUT a lot of cool pages are not in these lists because everyone knows about them and they don't
want to be on these lists.They're famous and don't want to be there.That's why you shouldn't only
think that the pages you see on these lists are the ONLY one on the net with H/C/P/A information.
BUT there are so LAME pages on the net that make their visitors vote for them or click on adds and
give the lame page money.They just put link saying something like "FREE XXX" or "FRESH TEENS"
and just point them to some list you vote for them or make money for them.This is lame and I think
such pages shouldn't exist on the net,but they exist.There lists with H/C/P/A sites make anti-cheat
gateway that can stop such pages because there you should click once again on one JAVA button
to vote for the page and there's also a message saying that if you were tricked you can enter the list
WITHOUT voting for the site that trick you.This is cool and very useful if some page make you vote
for them.
Also they record your IP so can't vote more than once :-)
Yeah but there are many list that don't have anti-cheat gateway this is bad because everyone can
vote more that one time and the pages can trick the visitors.
So I hope you all understand why you should vote and what will you win if you vote.
4.Encryption and PGP
by tHe mAnIaC
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This guide is for educational purposes only I do not take any responsibility about anything
happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.
If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don't
change anything without the permission of the author.
<--=--=--=--=--=--=--=--=>
A word from the author:
I hope you like my texts and find them useful.
If you have any problem or some suggestion feel free to e-mail me but please don't send mails like
"I want to hack the US government please help me" or "Tell me how to blind a trojan into a .jpg"
Be sure if I can help you with something I will do it.
<--=--=--=--=--=--=--=--=>
Table of Contents
1.What is this text about?
2.About Encryption and how it works
3.About the Cryptography and PGP
4.Ways of breaking the encryption
-Bad pass phrases
-Not deleted files
-Viruses and trojans
-Fake Version of PGP
=--=--=--=--=--=--=--=--=
1.What is this text about?
-=-=-=-=-=-=-=-=-=
In this text I'll explain you everything about encryption,what is it,PGP,
ways that someone can read your encrypted files etc.Every hacker or
paranoid should use encryption and keep the other from reading their
files.The encryption is very important thing and I'll explain you how can
someone break and decrypt your files.
2.About Encryption and how it works
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The Encryption is very old.Even Julius Caesar used it when he was
sending messages because he didn't trust to his messengers.You see
encryption is everywhere,when you watch some spy film you see
there's always a computer with encrypted files or some film about hackers
when the feds busted the hacker and they see all of the hacker's files are
encrypted.
When you have simple .txt file that you can read this is called "plain text".
But when you use encryption and encrypt the file it will become unreadable
by the time you don't enter the password.This text is called cipher text.
The process of converting a cipher text into plain text is called decryption.
Here's a little example:
Plain text ==>Encryption==>Ciphertext==>Descryption==>Plaintext
This example shows you the way when you encrypt and decrypt a file.
3.About the Cryptography and PGP
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Cryptography is science that use the mathematics to encrypt and decrypt data.This science
let you keep your files and documents safe even on insecure networks like the Internet.
The cryptography can be weak and strong.The best is of course the strong one.Even when you
use all the computers in the world and they're doing billion operations in second you'll just need
BILLIONS of years to decrypt strong encryption.
PGP (Pretty Good Privacy) is maybe the best encryption program to encrypt your files and documents.
It work in this way:
When you encrypt one file with PGP,PGP first compress the file.This saves you disk space and modem
transmition.Then it creates a session key.This session key works with a very secure and fast
confidential encryption algorithm to encrypt the file.Then the session key is encrypted with the
recipient's public key.
PGP ask you for pass phrase not for password.This is more secure against the dictionary attacks
when someone tries to use all the words in a dictionary to get your password.When you use
pass phrase you can enter a whole phrase with upper and lowercase letters with numeric and
punctuation characters.
4.Ways of breaking the encryption
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
PGP has been written for people that want their files encrypted for people that want privacy.
When you send an e-mail it can be read from other people if you use PGP only the person for who
is the message will be able to read it.
Now you know many things about PGP and the encryption but you may like to know can someone
break it and read your private texts and files.In fact if you use all the computers in the world to
decrypt a simple PGP message they'll need 12 million times the age of the universe to break it.
You see this is the BEST the encryption is so strong noone can break it.
The people that program it has done their work now everything depends on you.
-Bad pass phrases
The algorithm is unbreakable but they're other ways to decrypt the text and read it.
One of the biggest mistakes when someone writes his/her pass phrase is that the pass phrase is
something like : "John" "I love you" and such lame phrases.Other one are the name of some friend
or something like that.This is not good because this is pass phrase not password make it longer
put numbers and other characters in it.The longer your pass phrase is the harder it will be guessed
but put whole sentences even one that doesn't make sense just think in this way:
Someone is brute-forcing thousands of pass phrases from a dictionary therefore my pass phrase
should be someone that is not there in the dictionary something very stupid like:
hEllowOrld33IjustwanTtoteLLtoev3ryon3thatI'maLamErandI'mahacKer666
This is easy to remember because it's funny and there are only a few numbers but you may not use
upper and lowercase characters.I hope you know will put some very good pass phrase and be sure
noone will know it.
Another mistake is that you may write the pass phase on a paper and if someone find it you'll loose
it and he/she will be able to read your encrypted files.
-Not deleted files
Another big security problem is how most of the operating systems delete files.So when you encrypt
the file you delete the plain text and of course leave the encrypted one.
But the system doesn't actually delete the file.It just mark those blocks of the disk deleted and free.
Someone may run a disk recovery program and still see all the files but in plaintext.Even when you're
writing your text file with a word editor it can create some temporary copies of it.When you close it
these files are deleted but as I told you they're still somewhere on your computer.
PGP has tool called PGP Secure Wipe that complete removes all deleted files from your computer
by overwriting them.In this way you'll only have the encrypted files on your computer.
-Viruses and Trojans
Another dangerous security problem are the viruses and the trojans.So when you infect with a
trojan the attacker may run a key logger on your system.
A key logger is a program that captures all keystrokes pressed by you then saves them on your
hard drive or send them to the attacker
- *****************************************
So after the attacker run it he/she will be able to see everything you have written on your computer
and of course with your PGP pass phrase.
There are also a viruses designed to do this.Simpy record your pass phrase and send it back to the
attacker.
-Fake Version of PGP
Another security problem is the PGP source that is
available so someone can make a fake copy of it that is recording your pass phase and
sending it back to the attacker.The program will look real and it will work but it may also have
functions you even don't know about.
A way of defending of these security problems is to use a trojan and a virus scanner.You should
also be sure your computer is clean from viruses and trojans when you install PGP and also be sure
you get PGP from Network Associates Inc. not from some other pages.
So now I hope you understand that PGP can't be braked but if you use it wisely and be sure
your pass phrase is good one,you're not infected with viruses or trojans and you're using the
real version of PGP you'll be secure.
5.Final Words
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This was the first big newsletter from us.I'm waiting for your e-mails and suggestions about the
list.I'll really appreciate if you can handle some section or help me with other things.You can contact me at: themaniac@blackcode.com
I think the idea is good and if many people start helping we'll create something very cool and
useful.Be ready for the next issue.
Bye for now and best wishes from me
tHe mAnIaC
List Moderator