Re: A83: Help


[Prev][Next][Index][Thread]

Re: A83: Help




Ummm..  Start small, end large...  Disassemble a G3 rom...  :)

>"Mr. Hacker" Probably couldn't figure out how! (What would he do with it,
>anyways!)
>
>Grant Stockly wrote:
>
>> Take over apple?!?  Why don't we just reverse engineer an Apple ROM!  I've
>> done it to the plus...  try it!
>>
>> >P.S. While you are taking over Apple, could you also get rid of Microsoft??
>> >;-)
>> >
>> >Robert Caldwell wrote:
>> >
>> >> actually i am a dedicated hacker and i have found no way around my own
>> >> system.  it isn't symbolised the way you said, it's more like you can
>> >> put anything in the toaster that YOU want (recording your presence), and
>> >> only YOU can get it out, anyone else touching the toaster will get
>> >> zapped (not killed, just a tingle).  the toaster can make poptarts too.
>> >> you can put something in one end of the toaster and someone else put
>> >> something in the other end, and only you two can access your own stuff
>> >> (of course you can tell it for other people to be able to touch it like
>> >> wife/husband).
>> >>
>> >> -Rob
>> >> ICQ:9188921 "No Sol to kill"
>> >> e-mail1:rc_ware@hotmail.com
>> >> e-mail2:rc_ware@yahoo.com
>> >> e-mail3:rc_ware@geocities.com
>> >> webpage:http://www.geocities.com/SiliconValley/Haven/4049/index.html
>> >>
>> >> {{True, for every scenario you thought of you found a solution,
>> >> but...for the
>> >> "dedicated" hacker, there is always a way. There is always a way around
>> >> any
>> >> possible protection scheme, no matter how elaborate! I really wouldn't
>> >> want
>> >> a system with such limited access, anyways.It's like buying a toaster
>> >> that
>> >> only lets you put toast in and never pops it out, and you can only make
>> >> toast on thursdays, unless there is a full moon, of course. Here's a
>> >> thought, if you really want the system to be read-only, dish out the
>> >> apps
>> >> on ROM cards! ;-)
>> >>
>> >> More later,
>> >> Nick
>> >>
>> >> Robert Caldwell wrote:
>> >>
>> >> > this seems like a good response, but not correct.  the system i
>> >> propose
>> >> > will contain an OS that only enables itself the ability to delete or
>> >> > rearrange file.  this means that you have to have a password to use
>> >> the
>> >> > deletion tool, and you also cannot at all costs use the HardDrive like
>> >> > the RAM (meaning no more looking up FATs or actually byte allocations
>> >> in
>> >> > memory).  this does bring down a lot of possible programs, but i
>> >> haven't
>> >> > seen a great game yet that needs to delete files on the harddrive.  i
>> >> > know saved games need to be cleaned out once in awhile, but that's why
>> >> i
>> >> > am putting a password protection on it, maybe i'll make a "deletable"
>> >> > file attribute that will allow that file to be deleted without
>> >> > confirmation.  virii were made by huge corporations in the first place
>> >> > in order for them to clean out their harddrive (deltree c:\*.* /y is
>> >> > usually used).  this isn't a hightech virus but it still gets the job
>> >> > done.  now the ability to delete massive amounts of files is gone (if
>> >> > the computer i propose is built).  since you can't send commands out
>> >> of
>> >> > the cpu like an OUT statement (unless you have priveladge of 0 which
>> >> you
>> >> > can't since that'll be my system only).
>> >> >
>> >> > this may sound stupid now, but until you see it you can't dis it
>> >> > (patience--spelling?).  for every hacker/cracker/virii scenario i came
>> >> > up with, i've also come up with a way to stop it.
>> >> >
>> >> > i can't say much more until i actually build the system and show you,
>> >> > but please feel free to criticize somemore.
>> >> >
>> >> > -Rob
>> >> > ICQ:9188921 "No Sol to kill"
>> >> > e-mail1:rc_ware@hotmail.com
>> >> > e-mail2:rc_ware@yahoo.com
>> >> > e-mail3:rc_ware@geocities.com
>> >> > webpage:http://www.geocities.com/SiliconValley/Haven/4049/index.html
>> >> >
>> >> > {{virii and hacking is ALWAYS possible no matter how tight you think
>> >> > your
>> >> > system is. if you want ppl to buy your system you gotta make it able
>> >> to
>> >> > do
>> >> > stuff, that would bring down the security so you will most definately
>> >> > have
>> >> > virii and hacking done on your system.
>> >> >
>> >> > >5)  anti-virii--the program will contain levels built in, the
>> >> > >multi-tasking system is built in also (windows isn't the built in
>> >> > >feature).  this means that if a file starts deleting or messing with
>> >> > >other files it will contact you about it and ask for a key
>> >> confirmation
>> >> > >that you are positive you want the files messed with.  if you delete
>> >> a
>> >> > >file, it is usually sent to the "recycling bin" but now its' name is
>> >> > >stored in a "temp" file where you can "empty your recycling bin" and
>> >> > >it'll ask you for confirmation.  this is the only way you can delete
>> >> > >files.  and for the case of saving over a file, it's simple, the
>> >> > program
>> >> > >can't have a file open without it having a header file saying that
>> >> that
>> >> > >file is used by the program.  (technical jargon)...just say that it
>> >> > >works, i've done some testing (trying to write virii in my mind) and
>> >> > >came up with deadend results (meaning the virii didn't work).
>> >> > >6)  unhackable--the cpu is unhackable, the privaledge (spelling?)
>> >> > levels
>> >> > >of each program don't allow it to read other programs' stuff (meaning
>> >> > no
>> >> > >"add-ons" allowed unless the company making the add-on gives me the
>> >> > code
>> >> > >and i'll place extra stuff in it to cross the system).  this doesn't
>> >> > >mean the cpu is hackable...it's just for add-ons.  it has a built in
>> >> > >hex/code/etc. editor that is upgradeable also (but only by me or my
>> >> > >company--when it's operational), this means that this is the only way
>> >> > to
>> >> > >view a file in hex, also meaning that you can't disassemble a program
>> >> > if
>> >> > >it is "sealed" (another new feature).  a "sealed" program is like an
>> >> > >uninstallable/not read-able at all type feature.  whenever a program
>> >> > >that is "sealed" is installed in the system the filename is stored in
>> >> > an
>> >> > >"uninstall" list, in which the user can only delete the file using
>> >> the
>> >> > >uninstall program (which is also built in.}}
>> >> >
>> >> > ______________________________________________________
>> >> > Get Your Private, Free Email at http://www.hotmail.com}}
>> >>
>> >> ______________________________________________________
>> >> Get Your Private, Free Email at http://www.hotmail.com
>> >
>> >
>> >
>> ><HTML>
>> >Whenever you do accomplish this feat (correction, <B><I>if</I></B> you
>> >accomplish this) I'll be amazed!
>> >
>> ><P>More later,
>> ><BR>Nick
>> >
>> ><P>P.S. While you are taking over Apple, could you also get rid of
>>Microsoft??
>> >;-)
>> >
>> ><P>Robert Caldwell wrote:
>> ><BLOCKQUOTE TYPE=CITE>actually i am a dedicated hacker and i have found
>> >no way around my own
>> ><BR>system.&nbsp; it isn't symbolised the way you said, it's more like
>> >you can
>> ><BR>put anything in the toaster that YOU want (recording your presence),
>> >and
>> ><BR>only YOU can get it out, anyone else touching the toaster will get
>> ><BR>zapped (not killed, just a tingle).&nbsp; the toaster can make poptarts
>> >too.
>> ><BR>you can put something in one end of the toaster and someone else put
>> ><BR>something in the other end, and only you two can access your own stuff
>> ><BR>(of course you can tell it for other people to be able to touch it
>> >like
>> ><BR>wife/husband).
>> >
>> ><P>-Rob
>> ><BR>ICQ:9188921 "No Sol to kill"
>> ><BR>e-mail1:rc_ware@hotmail.com
>> ><BR>e-mail2:rc_ware@yahoo.com
>> ><BR>e-mail3:rc_ware@geocities.com
>> ><BR>webpage:<A
>> >HREF="http://www.geocities.com/SiliconValley/Haven/4049/index.html">http://
>> >www.geocities.com/SiliconValley/Haven/4049/index.html</A>
>> >
>> ><P>{{True, for every scenario you thought of you found a solution,
>> ><BR>but...for the
>> ><BR>"dedicated" hacker, there is always a way. There is always a way around
>> ><BR>any
>> ><BR>possible protection scheme, no matter how elaborate! I really wouldn't
>> ><BR>want
>> ><BR>a system with such limited access, anyways.It's like buying a toaster
>> ><BR>that
>> ><BR>only lets you put toast in and never pops it out, and you can only
>> >make
>> ><BR>toast on thursdays, unless there is a full moon, of course. Here's
>> >a
>> ><BR>thought, if you really want the system to be read-only, dish out the
>> ><BR>apps
>> ><BR>on ROM cards! ;-)
>> >
>> ><P>More later,
>> ><BR>Nick
>> >
>> ><P>Robert Caldwell wrote:
>> >
>> ><P>> this seems like a good response, but not correct.&nbsp; the system
>> >i
>> ><BR>propose
>> ><BR>> will contain an OS that only enables itself the ability to delete
>> >or
>> ><BR>> rearrange file.&nbsp; this means that you have to have a password
>> >to use
>> ><BR>the
>> ><BR>> deletion tool, and you also cannot at all costs use the HardDrive
>> >like
>> ><BR>> the RAM (meaning no more looking up FATs or actually byte allocations
>> ><BR>in
>> ><BR>> memory).&nbsp; this does bring down a lot of possible programs, but
>> >i
>> ><BR>haven't
>> ><BR>> seen a great game yet that needs to delete files on the
>>harddrive.&nbsp;
>> >i
>> ><BR>> know saved games need to be cleaned out once in awhile, but that's
>> >why
>> ><BR>i
>> ><BR>> am putting a password protection on it, maybe i'll make a "deletable"
>> ><BR>> file attribute that will allow that file to be deleted without
>> ><BR>> confirmation.&nbsp; virii were made by huge corporations in the first
>> >place
>> ><BR>> in order for them to clean out their harddrive (deltree c:\*.* /y
>> >is
>> ><BR>> usually used).&nbsp; this isn't a hightech virus but it still gets
>> >the job
>> ><BR>> done.&nbsp; now the ability to delete massive amounts of files is
>> >gone (if
>> ><BR>> the computer i propose is built).&nbsp; since you can't send commands
>> >out
>> ><BR>of
>> ><BR>> the cpu like an OUT statement (unless you have priveladge of 0 which
>> ><BR>you
>> ><BR>> can't since that'll be my system only).
>> ><BR>>
>> ><BR>> this may sound stupid now, but until you see it you can't dis it
>> ><BR>> (patience--spelling?).&nbsp; for every hacker/cracker/virii scenario
>> >i came
>> ><BR>> up with, i've also come up with a way to stop it.
>> ><BR>>
>> ><BR>> i can't say much more until i actually build the system and show
>> >you,
>> ><BR>> but please feel free to criticize somemore.
>> ><BR>>
>> ><BR>> -Rob
>> ><BR>> ICQ:9188921 "No Sol to kill"
>> ><BR>> e-mail1:rc_ware@hotmail.com
>> ><BR>> e-mail2:rc_ware@yahoo.com
>> ><BR>> e-mail3:rc_ware@geocities.com
>> ><BR>> webpage:<A
>> >HREF="http://www.geocities.com/SiliconValley/Haven/4049/index.html">http://
>> >www.geocities.com/SiliconValley/Haven/4049/index.html</A>
>> ><BR>>
>> ><BR>> {{virii and hacking is ALWAYS possible no matter how tight you think
>> ><BR>> your
>> ><BR>> system is. if you want ppl to buy your system you gotta make it able
>> ><BR>to
>> ><BR>> do
>> ><BR>> stuff, that would bring down the security so you will most definately
>> ><BR>> have
>> ><BR>> virii and hacking done on your system.
>> ><BR>>
>> ><BR>> >5)&nbsp; anti-virii--the program will contain levels built in, the
>> ><BR>> >multi-tasking system is built in also (windows isn't the built in
>> ><BR>> >feature).&nbsp; this means that if a file starts deleting or messing
>> >with
>> ><BR>> >other files it will contact you about it and ask for a key
>> ><BR>confirmation
>> ><BR>> >that you are positive you want the files messed with.&nbsp; if you
>> >delete
>> ><BR>a
>> ><BR>> >file, it is usually sent to the "recycling bin" but now its' name
>> >is
>> ><BR>> >stored in a "temp" file where you can "empty your recycling bin"
>> >and
>> ><BR>> >it'll ask you for confirmation.&nbsp; this is the only way you can
>> >delete
>> ><BR>> >files.&nbsp; and for the case of saving over a file, it's simple,
>> >the
>> ><BR>> program
>> ><BR>> >can't have a file open without it having a header file saying that
>> ><BR>that
>> ><BR>> >file is used by the program.&nbsp; (technical jargon)...just say
>> >that it
>> ><BR>> >works, i've done some testing (trying to write virii in my mind)
>> >and
>> ><BR>> >came up with deadend results (meaning the virii didn't work).
>> ><BR>> >6)&nbsp; unhackable--the cpu is unhackable, the privaledge
>>(spelling?)
>> ><BR>> levels
>> ><BR>> >of each program don't allow it to read other programs' stuff (meaning
>> ><BR>> no
>> ><BR>> >"add-ons" allowed unless the company making the add-on gives me
>> >the
>> ><BR>> code
>> ><BR>> >and i'll place extra stuff in it to cross the system).&nbsp; this
>> >doesn't
>> ><BR>> >mean the cpu is hackable...it's just for add-ons.&nbsp; it has a
>> >built in
>> ><BR>> >hex/code/etc. editor that is upgradeable also (but only by me or
>> >my
>> ><BR>> >company--when it's operational), this means that this is the only
>> >way
>> ><BR>> to
>> ><BR>> >view a file in hex, also meaning that you can't disassemble a program
>> ><BR>> if
>> ><BR>> >it is "sealed" (another new feature).&nbsp; a "sealed" program is
>> >like an
>> ><BR>> >uninstallable/not read-able at all type feature.&nbsp; whenever
>> >a program
>> ><BR>> >that is "sealed" is installed in the system the filename is stored
>> >in
>> ><BR>> an
>> ><BR>> >"uninstall" list, in which the user can only delete the file using
>> ><BR>the
>> ><BR>> >uninstall program (which is also built in.}}
>> ><BR>>
>> ><BR>> ______________________________________________________
>> ><BR>> Get Your Private, Free Email at <A
>> >HREF="http://www.hotmail.com">http://www.hotmail.com</A>}}
>> >
>> ><P>______________________________________________________
>> ><BR>Get Your Private, Free Email at <A
>> >HREF="http://www.hotmail.com">http://www.hotmail.com</A></BLOCKQUOTE>
>> >&nbsp;</HTML>



Follow-Ups: