Wednesday 2 November 2011

Partitioning Your Harddisk With Fdisk


Partitioning your HardDisk





Partitioning involves creating logical units on your hard drive that are then addressed as different drive letters. Not only does it help to organize your data (program files on one drive, games on another, documents on another) but also to speed up your PC. This is so because the drive head has to move a lesser distance for accessing data within one partition. You can also have different filesystems and OSs on the same hard drive.





Partitioning can be done using ‘fdisk’ in DOS/Windows 9x or ‘disk management’ in Windows 2000/ NT/XP. We will describe the procedure for fdisk, since disk management is GUI driven and the basics otherwise remain the same. While several other commercial packages like Partition Magic are available, these utilities (fdisk, computer management) are bundled with their respective OSs. You need a bootable floppy with fdisk.exe, format.com, and sys. com utilities. Before starting, decide how many partitions you want to create and their sizes. You can create one primary and one extended partition using the DOS fdisk. The extended partition can then have multiple logical partitions. Boot your machine using the bootable disk, and do the following.





Run fdisk. The utility will show you a numbered menu from where you can create, view, or delete partitions



The utility first asks you whether you want to enable large disk support. Type Y (for yes) and press enter if your hard-drive capacity is more than 4 GB. Large disk support creates a FAT32 partition, which can be greater than 2 GB



Select the first option from fdisk menu to create a primary partition. Specify the partition size in megabytes or percentage size when prompted for it



Similarly, create an extended partition. Extended partitions by themselves do not appear as drive letters. Instead, logical partitions must be created in them, which are then assigned drive letters



Exit fdisk and reboot the computer



Fdisk automatically assigns drive letters to all the partitions. You’ll need to format each partition in order to use it. Use format.com for the same



Your hard drive is now ready for taking an OS.


Outpost Rules, Outpost rules for system & app




Here you can find how to set up your Outpost firewall. Most of this rules I found on the internet, but some of them are mine. I think that you should be safer.



I used the online tests to test my firewall setings. The links to the this testers are:







CODE





http://scan.sygate.com/probe.html



http://www.auditmypc.com/



http://www.pcflank.com/about.htm



https://grc.com/x/ne.dll?bh0bkyd2



http://scan.sygatetech.com/



http://security1.norton.com/









SYSTEM:





Allow DNS Resolving



Protocol: UDP



Remote Port(s): DNS (53)



Action: Allow It





Allow Outgoing DHCP



Protocol: UDP



Remote Port(s): bootps (67),



bootp (68), dhcpv6-client (546),



dhcpv6-server (547)



Action: Allow It





Allow Inbound Identification



Protocol: TCP



Direction: Inbound



Local Port(s): AUTH (113)



Action: Allow It





Allow Loopback



Protocol: TCP



Remote Host: localhost



(127.0.0.1)



Action: Allow It





Allow GRE Protocol



Protocol: IP and the type is GRE



(IP protocol 47)



Action: Allow It



.



Allow PPTP control connection



Protocol: TCP



Remote Port(s): PPTP



Local Port(s): 1024-65535



Action: Allow It





Block Remote Procedure Call



(TCP)



Protocol: TCP



Direction: Inbound



Local Port(s): DCOM(135)



Action: Reject It





Block Remote Procedure Call



(UDP)



Protocol: UDP



Direction: Inbound



Local Port(s): 135



Action: Reject It





Block Server Message Block



Protocol (TCP)



Protocol: TCP



Direction: Inbound



Local Port(s): Microsoft DS (445)



Action: Reject It





Block Server Message Block



Protocol (UDP)



Protocol: UDP



Direction: Inbound



Local Port(s): Microsoft DS (445)



Action: Reject It





APPLICATION





SVCHOST.EXE





Allowing DHCP



Protocol: UDP



LocalPort: 68



RemotePort: 67



Direction: Inbound



AllowIt





Allowing DNS



Protocol: UDP



LocalPort: 53



AllowIt





Time Synchronizer



connection



Protocol: UDP



RemotePort: 123



AllowIt





Allowing HTTP



connection



Protocol: TCP



RemotePort: 80



Direction:



Outbound



AllowIt





Allowing HTTPS



connection



Protocol: TCP



RemotePort: 443



Direction:



Outbound



AllowIt





Blocking "SSDP



Discovery Service"



and "UPnP device



Host" services



Protocol: UDP



RemotePort: 1900



RemoteHost: 239.255.255.250



Direction: Inbound



Reject It





Blocking "SSDP



Discovery Service"



and "UPnP device



Host" services



Protocol: TCP



RemotePort: 5000



RemoteHost: 239.255.255.250



Direction: Inbound



Reject It





Blocking "SSDP



Discovery Service"



and "UPnP device



Host" services



Protocol: UDP



RemotePort: 5000



RemoteHost: 239.255.255.250



Direction: Inbound



Reject It





Blocking "Remote



Procedure Call"



Protocol: TCP



Local port: 135



Reject It





Web browsers:





Protocol: TCP



Direction: Outbound



Remote Port(s): HTTP(80), 81-83



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): HTTPS(443)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s):SOCKS (1080)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): 3128,8080, 8088



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): FTP(21)



Action: Allow It





Protocol: TCP



Direction: Inbound



Remote Port(s): FTP DATA (20)



Action: Allow It





Protocol: TCP



Direction: Inbound



Local Port(s): 1024- 65535



Direction:Outbound



Remote Port(s): 1024- 65535



Action: Allow It





Protocol: TCP



Direction: Inbound



Remote Port(s): 1375



Action: Allow It





Protocol: UDP



Direction: Inbound



Remote Port(s): 1040-1050



Action: Allow It





E-Mail clients:





Protocol: TCP



Direction: Outbound



Remote Port(s): SMTP (25)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): NNTP (119)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): POP3 (110)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): IMAP (143)



Action: Allow It





Protocol: TCP



Direction: Outbound



Remote Port(s): HTTP (80), 81-



83, HTTPS (443), SOCKS (1080),



3128, 8080, 8088, 11523



Action: Allow It





Antivirus updaters:





Protocol: TCP



Direction: Outbound



Remote Port(s): HTTP (80), 81-



83, HTTPS (443), SOCKS (1080),



3128, 8080, 8088, 11523



Action: Allow It



Symantec LiveUpdate HTTP



KAV Updater HTTP connection



McAfee Update



Update NOD32 virus definitions





Protocol: TCP



Direction: Outbound



Remote Port(s): FTP (21)



Action: Allow It



Symantec LiveUpdate FTP



KAV Updater FTP connection





Protocol: TCP



Direction: Inbound



Remote Port(s): FTP DATA (20)



Action: Allow It



Symantec LiveUpdate FTP DATA



KAV Updater FTP DATA connection





Protocol: TCP



Direction: Outbound



Remote Port(s): POP3 (110)



Action: Allow It



Scan incoming mail for viruses





Downloaders:





Protocol: TCP



Direction: Outbound



Remote Port(s): 80(HTTP), 81-



83,



443(HTTPS), 1080(SOCKS),



3128, 8080, 8088, 11523



Action: Allow It



FlashGet, GerRight, Go!Zilla, ReGet





Protocol: TCP



Direction: Outbound



Remote Port(s): FTP (21)



Action: Allow It



FlashGet, GerRight, Go!Zilla, ReGet





Protocol: TCP



Direction: Inbound



Remote Port(s): FTP DATA (20)



Action: Allow It



FlashGet, GerRight, Go!Zilla, ReGet





Protocol: TCP



Direction: Outbound



Remote Port(s): 1024-65535



Action: Allow It



ReGet PASV FTP connection





Protocol: TCP



Direction: Inbound



Remote Port(s): 1024-65535



Action: Allow It



ReGet PASV FTP connection





Protocol: TCP



Direction: Outbound



Remote Port(s): 80, 3128, 8080,



1080, 11523



Action: Allow It



ReGet Update





Trillian:





Trillian Pro Login



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote host is: www.ceruleanstudios.com



and Where the remote port is: HTTP



Action: Allow It





Trillian Pro AOL/ICQ Connection



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 443, 5190



Action: Allow It





Trillian mIRC AUTH Connection



Where the protocol is: TCP



and Where the direction is: Inbound



and Where the local port is: 113



Action: Allow It





Trillian mIRC Connection



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 6667



Action: Allow It





Trillian MSN Connection



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 1863



Action: Allow It





Trillian Yahoo Connection



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 5050



Action: Allow It





Bit Torrent:





Bit Torrent HTTP Connection Rule



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: HTTP



Action: Allow It





Bit Torrent HTTPS Connection Rule



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 443



Action: Allow It





Bit Torrent Network TCP Outbound Connection Rule



Where the protocol is: TCP



and Where the direction is: Outbound



and Where the remote port is: 1024 - 65535



Action: Allow It





Bit Torrent Network TCP Inbound Connection Rule



Where the protocol is: TCP



and Where the direction is: Inbound



and Where the local port is: 6881-6999



Action: Allow It





TCP Inbound Coverage Rule



Where the protocol is: TCP



and Where the direction is: Inbound



Action: Reject It





TCP Outbound Coverage Rule



Where the protocol is: TCP



and Where the direction is: Outbound



Action: Reject It





UDP Coverage Rule



Where the protocol is: UDP



Action: Reject It





* If you do not wish to share your files with others on the network you will need set this to Block It or leave it unchecked.


Original Sources




CAM -



A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.









TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.









TELECINE (TC) -



A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.









SCREENER (SCR) -



A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.









DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.









DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.









VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.









TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.









WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.









DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.









Watermarks -



A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.









Asian Silvers / PDVD -



These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.















Formats





VCD -



VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.









SVCD -



SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.









XVCD/XSVCD -



These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.









KVCD Thanks for lardo4life for the info



KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it's possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.









DivX / XviD -



DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.









CVD -



CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.









DVD-R -



Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.









MiniDVD -



MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.















Misc Info





Regional Coding -



This was designed to stop people buying American DVDs and watching them earlier in other countries, or for older films where world distribution is handled by different companies. A lot of players can either be hacked with a chip, or via a remote to disable this.









RCE -



RCE (Regional Coding Enhancement) was designed to overcome "Multiregion" players, but it had a lot of faults and was overcome. Very few titles are RCE encoded now, and it was very unpopular.









Macrovision -



Macrovision is the copy protection employed on most commercial DVDs. Its a system that will display lines and darken the images of copies that are made by sending the VHS signals it can't understand. Certain DVD players (for example the Dansai 852 from Tescos) have a secret menu where you can disable the macrovision, or a "video stabaliser" costs about 30UKP from Maplin (www.maplin.co.uk)









NTSC/PAL -



NTSC and PAL are the two main standards used across the world. NTSC has a higher frame rate than pal (29fps compared to 25fps) but PAL has an increased resolution, and gives off a generally sharper picture. Playing NTSC discs on PAL systems seems a lot easier than vice-versa, which is good news for the Brits An RGB enabled scart lead will play an NTSC picture in full colour on most modern tv sets, but to record this to a VHS tape, you will need to convert it to PAL50 (not PAL60 as the majority of DVD players do.) This is either achieved by an expensive converter box (in the regions of £200+) an onboard converter (such as the Dansai 852 / certain Daewoos / Samsung 709 ) or using a World Standards VCR which can record in any format.









News Sites -



There are generally 2 news sites for film release for p2p and they are:





nforce - VCD Help



Code:



http://www.vcdhelp.com/





Code:



http://www.nforce.nl.











About Release Files





RARset -



The movies are all supplied in RAR form, whether its v2 (rar>.rxx) or v3 (part01.rar > partxx.rar) form.









BIN/CUE -



VCD and SVCD films will extract to give a BIN/CUE. Load the .CUE into notepad and make sure the first line contains only a filename, and no path information. Then load the cue into Nero/CDRWin etc and this will burn the VCD/SVCD correctly. TV rips are released as MPEG. DivX files are just the plain DivX - .AVI









NFO -



An NFO file is supplied with each movie to promote the group, and give general iNFOrmation about the release, such as format, source, size, and any notes that may be of use. They are also used to recruit members and acquire hardware for the group.





SFV -



Also supplied for each disc is an SFV file. These are mainly used on site level to check each file has been uploaded correctly, but are also handy for people downloading to check they have all the files, and the CRC is correct. A program such as pdSFV or hkSFV is required to use these files.















Usenet Information





Access -



To get onto newsgroups, you will need a news server. Most ISPs supply one, but this is usually of poor retention (the amount of time the files are on server for) and poor completition (the amount of files that make it there). For the best service, a premium news server should be paid for, and these will often have bandwidth restrictions in place.









Software -



You will need a newsreader to access the files in the binary newsgroups. There are many different readers, and its usually down to personal opinion which is best. Xnews / Forte Agent / BNR 1 / BNR 2 are amongst the popular choices. Outlook has the ability to read newsgroups, but its recommended to not use that.









Format -



Usenet posts are often the same as those listed on VCDQUALiTY (i.e., untouched group releases) but you have to check the filenames and the description to make sure you get what you think you are getting. Generally releases should come down in .RAR sets. Posts will usually take more than one day to be uploaded, and can be spread out as far as a week.









PAR files -



As well as the .rxx files, you will also see files listed as .pxx/.par . These are PARITY files. Parity files are common in usenet posts, as a lot of times, there will be at least one or two damaged files on some servers. A parity file can be used to replace ANY ONE file that is missing from the rar set. The more PAR files you have, the more files you can replace. You will need a program called SMARTPAR for this.















Scene Tags





PROPER -



Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.









SUBBED -



In the case of a VCD, if a release is subbed, it usually means it has hard encoded subtitles burnt throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD supports switch able subtitles, so some DVDRips are released with switch able subs. This will be mentioned in the NFO file if included.









UNSUBBED -



When a film has had a subbed release in the past, an Unsubbed release may be released





LIMITED -



A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.









INTERNAL -



An internal release is done for several reasons. Classic DVD groups do a lot of .INTERNAL. releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.









STV -



Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.









OTHER TAGS -





*WS* for widescreen (letterbox)



*FS* for Fullscreen.









RECODE -



A recode is a previously released version, usually filtered through TMPGenc to remove subtitles, fix color etc. Whilst they can look better, its not looked upon highly as groups are expected to obtain their own sources.









REPACK -



If a group releases a bad rip, they will release a Repack which will fix the problems.









NUKED -



A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.





NUKE REASONS :: this is a list of common reasons a film can be nuked for (generally DVDRip)





** BAD A/R ** :: bad aspect ratio, ie people appear too fat/thin



** BAD IVTC ** :: bad inverse telecine. process of converting framerates was incorrect.



** INTERLACED ** :: black lines on movement as the field order is incorrect.









DUPE -



Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.


Outsmarting System File Protection


Tested in Windows 2000 sp2, Windows 2000 sp3 with and without IE6 sp1. Should work fine in XP and XPsp1





------------------------------





A lot of people are having troubles with System File Protection (SFP for short). This can be a major pain in the butt unless you know the tricks to it. Having only tweaked Windows 2000 Service Pack 3 I figured out a few things about SFP and replacing files:





1) TaskManger is your best friend when replacing files in 2k/XP.



When you open task manager you can do just about as much as you can do with Explorer just by going File>NewTask(Run..). From here you can either use the Run Dialog to launch programs one at a time, or select 'Browse' and explore. Using right click menu commands to do the bulk of your work (Copy, Paste, Rename). Problem is often times you can't replace items do to the fact that your browse is making calls to things you want to delete.





2) CommandLine or Cmd.exe is like that other friend you have that likes to help out.



One plus this has over TaskMan is you don't use the file you are trying to replace. A minus is that it can be a pain if you aren't an experienced DOS user.





3) Backups are your ace in the hole.



Always back your files up prior to doing anything (sometimes I don't bother and wish I did.). Keep It Simple Stupid applies here. Save yourself a few keystrokes and place your backups in something like C:\back\





4) SafeMode is the rest of the hand.



Windows2000 and XP (I believe) can both be booted into SafeMode. When your computer is first booting up, after your bios screen but before the Windows is Starting screen (I could be slightly wrong here seeing how I don't know the timing for sure.) you hit F4 or F8 to get the SafeMode menu. Select 'SafeMode with CommandPrompt'. Welcome to "DOS" on 2k/XP. Anything that can't be replaced while Windows is running can be replaced here. (url.dll) Syntax would be Copy c:\url.dll "c:\Program Files\Internet Explorer\" quotations allow you to put spaces in the path (I didn't know this)





...





Here we go. System File Protection, of Sytem File Checker is a neato feature of Windows meant to protect Joe Computeruser's PC from being ruined. When a needed System file is being replaced your File Checker says "Wait a minute this isn't mine." While this can be great in the long run, it's not a positive thing in Windows Hacking. The trick is to replace the files it uses to replace files.





...





1) First up you need to find the file you want to hack and then replace. Start>Search>Files and Folders>dllname. It's good to actually search for the file so you can find out all of the locations of all copies. Let the search finish just in case. If you have installed any service packs you will have probably have copies of the file in:





\winnt\servicepackfiles\i386\ (Win2k)



\windows\servicepackfiles\i386\ (XP)





As well as:





\winnt\system32\dllcache\ (hidden folder in Win2k)



\WINDOWS\system32\dllcache\ (hidden folder in XP)



\winnt\system32\ (win2k)



\windows\system32\ (XP)





2) Now that you have all of the locations, write them down on paper or your forehead just to be safe (backwards so it shows up in the mirror).





3) Make a backup (remember K.I.S.S.)





4) Hack your file and save it c:\ for simplicity.





5) Open TaskManger (Right click on your taskbar and select TaskManger)





6) Go to the 'Processes' Tab and find 'Explorer.exe' highlight it and push the 'End Process' button. Say Yeah to the popup.





7) Go to the first tab in TaskManger and select 'File>NewTask>Run>Browse' from this Window navigate to c:\ and higlight your hacked file. Right clic on it and select 'Copy' (don't Cut it.)





8) Nagivate to your Windows directory, open the \servicepackfiles\i386\ folder. Paste your hacked file and replace the copy that is in that folder.





9) Navigate to your respective dllcache folder, paste the file there too.





10) Replace the normail copy in system32 finally (or wherever it might be).





11) Reboot. Don't LogOff , Reboot.





Now chances are this won't go that smoothly. Either the file you want to replace is in use, or your pal and mine SFP will pop-up. It can mess with you in odd ways. I've replaced the servicepackfiles version and the dllcache files, then had SFP grab the normal and replace the other two with it. This can be frustrating. Or maybe the file is in use. This is where the Command Prompt comes into play. If you already replaced the files and rebooted to no change, launch TaskMan again, kill explorer.exe, then go 'File>NewTask>Run>Cmd.exe' Use the DOS commands to try to replace all of the copies of the file in that order using your hacked version in C:\





This is usually where you get the message from SFP telling you it's alive and kicking. You will get a rather urgent looking pop-up telling you that a file that Windows needs is being replaced by a different file. It will then ask you if you want keep the modified files. Say 'yes'. Next it will prompt you to insert your Windows cd to retrieve a copy of the file it needs. Click 'Cancel'. As a good rule of thumb, when you get this message replace what you need then reboot!





If your file still isn't changing, boot into SafeMode with CommandLine. Wait for Windows to take it's sweet time loading. Then just type copy c:\file.dll c:\winnt\servicepackfiles\i386\. Rinse and Repeat. Then reboot. This has worked for me 100% of the time, if followed it will work for you as well.


Overclocking_Tutorial




Overclocking takes on 3 forms:



First, is the casual overclocking, easy, and anyone can do it.



Second, is the right way to overclock, taking into account, everything.



Third, if you want serious power, your gonna need to be savy to what does what.





The casual overclocker gains about 5% increase, and really doesn't see any benefit from this, whilst it makes you feel good, no serious damage can be made, by upping the FSB a little, or changing your multiplier, only thing is, you want more.





The correct way to overclock, is to start looking at your system, check the motherboard specs, PSU, amount of harddrives, CD ROMS etc. (high end systems, including the lastest graphic cards will need serious power).





Lets take a base system like my old system setup:





AMD XP1700+ ( Thoroughbred JIUHB DLT3C )



Core Voltage = 1.50v



Maximum Die Temp = 90c



FSB = 266Mhz



(factory unlocked)





Jetway K266B KT266 chipset



DDR + SDR RAM (not together)



No onboard RAID





DDR RAM = Dane Elec PC2700 DDR (333Mhz)



Not registered





2 Hard drvies



1 CD Writer & 1 DVD ROM drive





2 LAN cards





1 PCI soundcard



(onboard sound turned off).





Now, lets look at what they can do:



The Thoroughbred is still the top processor for overclocking, Thunderbirds are just not upto it, even though they are capable of some really decent speeds, same as the Palamino, not to mention the Barton's (these are not what they have been made up to be).



(for the purpose of space, I'll not go into unlocking your CPU)





As you can see, my Thoroughbred has a core voltage of 1.5v, and as my motherboard is capable of giving my processor anything upto 1.85v, there is score for more there.



The FSB on my motherboard is capable of a max of 200Mhz (this is the magic number).



Die temps to a max of 90c is good (never been near it, yet!).





Now, to work out your Mhz on your system, or to check your multiplier or FSB, there is a little calculation you'll need to remember, and it's easy:





Your Mhz is worked out by your multiplier timed your FSB.



example:





CODE



133x10 = 1.33Ghz







Of course you can devide your Mhz with your known FSB to give you your multiplier etc.





Now for easy, I have the results of my previous unlocking tests handy, so I'll use them, and not the current speeds etc.





Standard Multiplier = 11.0



Overclocked Multiplier = 12.0





Standard Voltage = 1.50v



Overclocked Voltage = 1.52v





Standard FSB = 133Mhz



Overclocked FSB = 136Mhz





Standard Speed = 1467Mhz



Overclocked Speed = 1630Mhz





Standard Temps = CPU = 37c SYSTEM = 32c (idle) CPU = 44c SYSTEM = 36c (under load)



Overclocked Temps = CPU = 34c SYSTEM = 29c (idle) CPU 40c SYSTEM 34c (under load)





As you can see, the system is cooler when overclocked, this is due to having the correct cooling setup, and temps for it when it was standard, was standard cooling setup.





Basically, all I have done, is raised the FSB by 3mhz, the voltage by 0.02v and the multiplier by 1.0, this has given me a 163Mhz increase without over strssing my system, but, here is where it gets teadious:





To achieve this, it took me about a week, and this is how I did it:



I started by lowering the multiplier to 5.0, from there I raised the FSB to its max (at the time, have latest BIOS update for mobo, allowing 200Mhz FSB), 166Mhz, this is the correct way of overclocking.



From there, I started to raise the multiplier one by one, getting it back upto the standard multiplier or higher, checking the stability of the system each time.



(currently I am way passed the 136Mhz FSB, as I am running PC2700 DDR).





One thing to look at though, overclocking using the FSB WILL (unless your system allows you to specify it) mess with your PCI & RAM speeds.



Even raising it by 3Mhz can make your PCI cards to not work, and your RAM to get confused and crash your system.





Now your thinking to yourself 'I can do that' and yes you can, anyone can, but.......



It takes TIME, I can't stress that enough, if your going to try this, then you'll need to run your system for at least 6 hours between changing your multiplier, and as you can imagine, this can take a long time to do.





For your information, I used Hot CPU Tester, SETI & played Vietcong for testing purposes.





Now, for the hard part:





As most experienced overclockers will tell you, heat is your enemy, killing heat is your number 1 aim, don't worry about your speed at first, a 50Mhz increasde isn't gonna make your 3D Mark scream through the roof, actually, you'll probably not even get any better than what you did before.





There are several ways of dispersing heat, and they are:





Aircooling



Pro's: Cheap, effective at lower speeds.



Con's: Noisey, dust collectors, need maintanance.





Watercooling:



Pro's: Can lower your CPU by about 10c easily.



Con's: It has water in it, expensive, hard for some to understand.





Pelter:



Pro's: With watercooling, it's the daddy



Con's: ONLY EXPERIENCED PEOPLE NEED TO APPLY, very complicated, power hungry, NOT for the faint hearted. Stupidly expensive.





Aircooling:



Upgrading your CPU fan is the first step, there are several companies that offer aftermarket fans, which are better than the OEM fans are 2 a penny in todays world, but it's NOT just about your CPU fan, your system needs to breath, you need to get rid of 'hot spots' within your system.





Watercooling:



Its easier than most make out, its a good thing, kit prices can be got from about £120 ($200 US), just make sure they are upgradable, as you might want to add, a Northbridge water block & a GPU water block.



Modern day kits & parts are idiot proof, and will not leak, unless you act like Noah.





Pelter:



Pelter cooling is DANGEROUS, minly for your system, fitting it incorrectly, and you could end up with not only a baked CPU but a system that will end up as a very expensive paperweight.



Ask your local overclocking expert for more info.







Basically, if you can get hold of a decent Thoroughbred cored XP, your in luck (just like me), if its unlocked, then your in business, obviously, its not just down to your CPU, your motherboard and RAM will denote whether you can overclock big style or not.



I'd advise ANYONE thinking of overclocking, to research into it more, weigh up the odds on what they want or need, if your on a buget, DON'T attempt it, things can and do go wrong.



Most of the time, its not about 'mines faster than yours' or massive speed increases, its done by most, cause it can be. 90% of the time, you'd be better off buying a new CPU (as prices are so low), but if you get the urge, then a new world awaits you





great tutorial. this should help the OC noobs. If I can add something like you said know your specs of the mobo....and if you are serious about OC'ing dont go and get some generic NO-NAME ram and some ghetto mobo. to get the best stability go with ASUS and ABIT for the mobo and Crucial, Kingston, mushkin for the ram. A great forum for OC'ing is amdmb.com.







Indeed, if you are serious about your overclocking, its advised you only use serious brand names.



Generic parts are always a lower spec, and can easily destroy themselves with even a little stress aimed towards them.





Memory advice, use the folloing:





Kingston (added because of reviews, personally, I'm not sure about them).



Crucial (for Dual Channel DDR ONLY)



OCZ



Mushkin



Corsair



PNY (for EEC rated)



Samsung



Geil (my choice, when I can afford it)





Motherbord advice, use the following:





Asus A7N8X Deluxe nForce2



Asus A7N8X-VM nForce2



Asus A7N8X-X nForce2



Abit KD7-S KT400



Abit KV7 KT600



Abit NF7 v2.0 nForce2



Abit NF7-S v2.0 nForce2



MSI K7N2 Delta-L Nforce2



MSI KT6 Delta-LSR KT600



Epox 8RDA+ nForce2



Epox 8RGA+ nForce2





Any nForce2 motherboard would be best, they allow more score for overclocking your system.


Tuesday 1 November 2011

REVERSE CODING




----------------------



REVERSE CODING



----------------------







# Released by Cybnet Security Group



# legalz: modify and use at will, if you make any changes, improvements, updates or use the code



# in another project, please send us what you did and give credit



# if you have any questions, post them at forum.hackerthreads.net



# be sure to check out hackerthreads.org for updates and new tutorials/downloads





Copyrights reserved to k33t, 2002 from CYBNET Security Group



----------------------------------------------------------------------------------------------------





Index:



-------



1.Introduction



2.Disclaimer



3.Hexadecimal



4.RAM and ROM



5.ASM



6.Needed programs



7.Cracking



8.Conclusion



---------------------------



---Introduction----------





Welcome to my Reverse Coding tutorial! In this paper, you will



learn how to crack and modify your own software. I'll try to get



into as much detail as possible, yet also dumb it down a bit. =)



------------------------------------------------------------------------------------------------------



---Disclaimer------------





All information is purely for educational purposes only! The author



cannot be held responsible for any (ab)use of this information.



USE AT YOUR OWN RISK!!!



------------------------------------------------------------------------------------------------------



---Hexadecimal----------





To begin, I'm going to teach you about hexadecimal, so if you already



know it, then move on. Even if you do already know it, I suggest



sticking around for a refreshment of your memory.=)





Hexadecimal, or hex as it's more commonly known, is a base 16



numbering system. Base 16 meaning that it consists of 16 numbers:



0-9 and A-F. Each of these numbers (A-F=10-16) have a value of 4 bits



and are also called nibbles. In representing a hexadecimal number, one



would write an "0x" before the actual bit set. 0x is simply a tag put



before a hex number to let programmers know that it is in fact, hex.



When writing hex, you will not need to use this prefix.





If you haven't already noticed, the 0x prefix looks similar to that of exponential



notation. Actually this is where 0x has been derived, seeing as how



hex is simply a number that has been raised to a power of 16.



This means 10 in hexadecimal represents the value 16+0, or 16. So check



out this example:





0xB3 (hex)= 2*16(squared)+11*16(to the 1st power)+3*16(to the power of 0 )



=2*256+11*16+3=691 (decimal)





Yeah, you could do all of that, or you could be lazy and use an automated



program that does it all for you. Why do you need to know hex? Because



it's used by every piece of software and hardware. How? Memory based address



allocation. Here's an example:





When you clicked on your browsers icon to launch it, the click triggered a "call"



(an asm function that will be discussed more in depth in later chapters.) which



went back to the programs memory with the "click in it's hand." It finds the



address where the code is that makes the program launch and executes it. The



address is written in, you guessed it, hex. An example of an address would be



something like this:





101c5018





5108 would be the actual specific address and 101c would be the sector



of RAM were the address is located. Those are the basics of Hexadecimal



You should probley read this chapter againbecause getting a firm grasp on hex



is essential to cracking and moding programs.



----------------------------------------------------------------------------------------------------------



---RAM and ROM--------





In this section we are gonna learn about RAM and ROM. Many people kno about



the hardware part of RAM and ROM and that's gonna be very useful to you......



just not in this tutorial. =) We are about to learn about the "software" side. I use the



term software loosly in that software tends to have a GUI (Graphical User Interface)



and this does not. BUT, there are ways to access and modify the behavior of it that



I will talk about in this chapter, as well as in the next. To start off, I'll answer some



common questions:





What is RAM?





RAM (Random Access Memory) is basically memory and the process of accessing it.



The term "Random Access Memory" was approprietly given to this memory unit because



when executing a command, the CPU doesn't have to scroll through all the memory on



your PC until it finds the right address. It "randomly" whips out the addy from it's back



pocket and serves it up.This process is both quick and efficient. Learning this process



will help you understand the ASM functions in the next chapter.





How does RAM work?





When a command is issued and the memory is pulled from file, it must first go through



what is called a "vector". A vector is a "gateway" or a "sector" of RAM where the address



of the function is stored with others of it's own kind. An example of a vector would be



something like this:





8c0000b4-8c00ffff





This means that all "addressii" (hehe) that are between those values are stored in that



sector of RAM. A vector acts as a gateway in that, first, pass through a vector to get to



address. Your average program probley has about 30 to 40 main vectors, sectioning



off from boot until exit. Knowing the vector of an addy or a function will greatly reduce



your headache when you start searching for it.





ROM. ROM is a part of memory that doesn't change. (Although we can change it.=) )



Boot ROM for instance, follows the same plan of action it is called upon. ROM also has



vectors, just like RAM. ROM is not that important when it comes to cracking to we will



leave it alone for now.





Back to RAM. Believe it or not, but addressii (there I go again, I'm such a g33k.)



actually follow certain formats or syntax's for certain functions. Take hot keys for



example: In the under ground, we call them "Joker commands". By pressing a certain



combonation of keys, a program will run, close, be stupid, whatever. The syntax for a



Joker command is as follows:





0d-aaaaaf



000zvvvv





Let's examine this format a little closer.





0d= The proclemation of a specifyed format





aaaaa= The address of the function





f= The float or remainder; "Floating point number" ; decimal





000= "NOP" No operation





z= The "Booleon" as we the C++ programmers call it. A booleon is an "IF, THEN" statement.



"IF this is true, THEN do this." Value 0= equal; 1= different; 2=less than; 3=greater than.





vvvv= The combonation of hex values (The values of the keys pressed) used to execute the "CALL"





Say the "A" key had a vlaue of fffb and the "B" key has a vlaue of fffd. You would then add both



values using a hex calculator and get fff9 as the sum. The output on you calculator would



show 1fff8. Add the first value and the last value to find the fourth byte segment. So say



we've found the address of the Joker function (usually in the boot ROM sector) commonly



called the "Maple address" and we are ready to program in some hex code. Our code may



look like this:





0d7ae671



0000fff9





This means that IF the value of fff9 (A and B) is equal (0) to the address (aaaaf) of the function,



THEN execute it. See? Easy isn't it? You'll need to know things like this when modding programs



as a use of executing of your arbitrary code in certain parts of your program at a certain time.



Joker commands are also reversable in that if you enter the same code except with a 1,2, or 3,



in the z slot and by changing the button combonations. Reversable meaning terminating the



function or other functions that were started. A good use for this is for firewalls and babysitting



programs. Are you on a college machine and can't download stuff because of that pesky firewall?



Crack it open and program in some Joker commands so you can turn it on and off at will



WITHOUT the administrator's password!



--------------------------------------------------------------------------------------------------------------



---ASM-----------------------





To start off with our small and to the point ASM section, I'll warn you in advance, after reading this,



you'll need to go take a shower cause this is disgusting! Here we go!





To begin, I'm gonna define for you some functions that you'll be seeing alot of, and be using. Here they are:





.:Hex:. .:ASM:. .:MEANING:.





75,0f85 jne jump if not equal



74,0f84 je jump is equal



eb jmp jump directly to



90 nop no operation



77,0f87 ja jump if above



0f86 jna jump if not above



0f83 jae jump if above or equal to



0f82 jnae jump if not above or equal



0f82 jb jump if below



0f83 jnb jump is not below



of86 jbe jump if below or equal



0f87 jnbe jump if not below or equal



0f8f jg jump if greater



0f8e jng jump if not greater



0f8d jge jump if greater or equal



0f8c jnge jump if not greater or equal



0f8c jl jump if less



0f8d jnl jump if not less



0f8e jle jump if less or equal



0f8f jnle jump if not less or equal





The easy thing about most of the functions in ASM are that they sound like what they mean.



Jump, means of coarse, to Jump from one thing to another. Example:





"jmp 00401744" would mean to jump directly to the address 00401744 once the code



hits the function.





Let's look at "CALL". Call is a function that is used to "call" a certain task, string, address, whatever.



Take a look at this example:





"Call 0040ccc2" this would of coarse call the address 0040ccc2 and use it. Those are the functions



you'll be using.





The reason why I'm not going into loads of detail in this chapter is because when



cracking software, not an extensive amount of knowledge of ASM is needed. If you want



to know more or need help with something, e-mail me at the address provided at the end of



this tutorial. This chapter wasn't so nasty was it? Nah, it was easy =)



------------------------------------------------------------------------------------------------------------------------



---Needed Programs----------------





The programs you will need are as follows:





WDasm 8.9 or Higher



Hiew 6.1



Softice for win9x v3.24



SubmitWolf(demo)v4.01 (http://www.trellian.com/swolf)



Programming Language (C,C++,Pascal,ASM whatever you would like) Prefably C for this tutorial!



And a brain (no seriously)



--------------------------------------------------------------------------------------------------------------------------



---Cracking-----------------------------







Ok, here we go! The first thing you need to do is to open up SoftIce and then swolf32.exe which is the name given to our



target program. Go to the help menu and select register. Here's where your brain will come in, start to look



for how the protection is running by entering some random crap into the blank space. Don't press the OK button yet though.



Instead, press CTRL-D to bring up SoftIce. What we are gonna try to do is define a breakpoint, using BPX hmemcpy.



Hit CTRL-D again and it will bring you back to the program. Click OK on the box and SoftIce will again pop up. Now press F12



and it will bring you to the target program code. Scroll down a few lines and find:





:004167D9 8D4C2410 lea ecx, dword ptr {esp+10}--;ecx=the random crap you typed in.



:004167DD 8D94290000000 lea edx, dword ptr {esp+00000090}-;edx=name



:004167E4 51 push ecx



:004167E5 52 push edx



:004167E6 E8B5450100 call 0042ADA0----;this is the call which calculates the serial



:004167EB 83C410 add esp, 00000010--;



:004167EE 85C0 test eax, eax----;and return eax=1 if true (booleon =) )



:004167F0 0F8596000000 jne 0041688C----;jump to registered



:004167F6 8D442408 lea eax, dword ptr {esp+08}



:004167FA 8D8C2488000000 lea ecx, dword ptr {esp+00000088}



:00416801 50 push eax



:00416802 51 push ecx



:00416803 E868470100 call 0042AF70----;this call tests our serial



:00416808 83C408 add esp, 00000008---;



:0041680B 85C0 test eax, eax----;for v3.XX one.



:0041680D 7433 je 00416842;jump is equal





The call that we want to focas on is at 004167E6. This call tests wether our serial is for the correct version or not.



Let's trace the call 004ADA0:





*Referenced by a CALL at address:



:0042ABFC



:0042ADA 83EC30 sub esp, 00000030



:0042ADA3 55 push ebp



:0042ASA4 56 push esi



:004ADA5 57 push edi



:0042ADA6 8B7C24444 mov edi, dword ptr {esp+44}--;edi=our fake serial



:004ADAA 85FF test edi, edi



:004ADAC 0F4A7010000 je 0042AF59----;die if empty



:004ADB2 8B6C2440 mov ebp, dword ptr {esp+40}--ebp=our name



:0042ADB6 85ED test ebp, ebp



:004ADB8 0F849B010000 je 0042AF59---;die if empty



:004ADBE 8A07 mov al, byte ptr {edi}--;compare 1st byte of serial with 'p', die



:0042ADC0 3C50 cmp al, 50----;



:0042ADC2 0F8587010000 jne 0042AF4F----;if not equal



:0042ADC8 807F0134 cmp byte ptr {edi+01}, 34--:compare byte of serial with '4'



:004ADCC 750C jne 0042ADDA----;



:0042ADCE C70500C8430000000000 mov dword ptr {0043C800}, 00000000



:0042ADD8 EB1C jmp 0042ADF6





As we can see by the above, the code tells us that the first value of our serial will



be 'p' and a cycle of a four byte algorythm. I could go on and on about all of the internals



of all this stuff but that would be going beyond the scope of this tutorial. The idea was to show



how to crack this pro, and thats what I'm going to do. Based on the information I've given you, and the



information that you can deduce from reading the code, I've written a small key generator in C.



If you know C, then you'll be able to tell where i got the algorythms to write it. So here it is:





#include



#include





int main(void)



{



long code=555583,count1,count2;



char name[25],cod[5],type='0';



clrscr();



textcolor(14);



printf("This is a simple key-generator written by k33t of CYBNET Security Group");



printf("=================================================");



text color(10);



printf("SubmitWolf(demo)ver4.1 cracked by k33t");



textcolor(14);



printf("%c%c%c",0x10,0x10,0x10");



textcolor(12);



printf("Yup")



prinf("-November 2002");



prinf("'\n\nSelect Edition PRO(0) or Enterprise(1) (0/1)=");



scanf("%c",&type);



if(type=='1')code=557283;



getchar();



prinf("Enter Registration Name=");



scanf("%[^\n]",name);



for(count1=0;count1<=3;count1++



cod[count1]=name[count1];



for(count=1;count1=3;count1++){



for(count2=0;count2<=3;count2++)



cod[count2]=cod[count2]*(code%100);



code=code/100;



}



for(count1=0;name[count1]>0;count1++);



for(count2=0;count2<=3;count2++)



cod[count2]=cod[count2]^(name[count1]+3);



for=(count1-3;count1>=0;count1--){



code=code+(cod[count1]&0xFF);



if(count1>0)



code=code*0x100;



}



if(code<0)code=-code;



for(;code<10000;) code=code*10;



for(;code>999999;) code=code/10;



printf(Your Serial Number=P%c4-%ld",(type=='1')? 'E':'4'code);



return ;



}





Ok! So! An overall conclusion of this code is:





1.First two characters of the serial must be either 'PE' or 'P4'.



2.Multiply every first four characters or our name with every byte of our serial before '-'



3.XOR every four byte with every byte of our name.



4.Convert to positive number if<0.



5.Convert to number between 10000 and 1000000.





Forgive me if this code is buggy as I wrote it very quickly in the little spare time I had.





-----------------------------------------------------------------------------------------------------------



---Conclusion-------





Well how was your first cracking expierience? Not bad eh? Ok well if you have any questions,



problems,comments,.....criticsms.......you can e-mail them to me at:





k33t@hushmail.com



------------------------------


Refer to this site for SP2 FAQs.




Questions like:





Should I slipstream SP1 into Windows XP before SP2? Nope!







View them here:





hXXXp://www.ntu.edu.sg/CITS/getting+help/faqs/windows+xp+sp2.htm#q4





Windows XP SP2 (Service Pack 2) Frequently Asked Questions





What is the size of this Windows XP SP2?



What is the minimum requirement for the system to run Windows XP SP2?



Can I upgrade my system with Windows XP SP2?



Do I have to install an earlier Service Pack 1 before installing Windows XP SP2?



Is there any patch that is required to install prior to SP2 installation?



Where can I download (and install) a copy of Windows XP SP2?



Is there any application that has compatibility issues with Windows XP SP2?



What are the patches found in this Windows XP SP2?



What is new in Windows XP SP2?



How do I install Windows XP SP2?



What is this so called Windows Firewall?



How do I know that the Windows Firewall is enabled in my system?



Can I disable the Windows Firewall?



With Windows Firewall turn on, do I still need to have an anti-virus software installed on my computer?



My computer stops responding when I restart to complete the installation of Windows XP Service Pack 2. What should I do?



I receive a "Stop: c0000135" and "winsrv was not found" error message after I install Windows XP Service Pack 2?



After installing SP2 and reboot my system, I receive this message "Your network administrator can unblock this program for you". Why is this so and what should I do?



When I am surfing to some websites using Internet Explorer, I notice that Internet Explorer does not display some of the pop-up windows? Why is this so and what should I do to display these pop-up windows?







What is the size of this Windows XP SP2?



The size of Windows XP SP2 (Service Pack 2) is about 270MB (back to top)







What is the minimum requirement for the system to run Windows XP SP2?



You need a PC running Microsoft Windows XP with at least 233-MHz processor, 64 MB of RAM and 1.6GB of available hard-disk space during installation. (back to top)







Can I upgrade my system with Windows XP SP2?



If you are using any application/software provided by your School, do a quick check with your School IT Support whether that application/software can run on Win XP SP2. Thereafter, proceed to the next question below.





Note: Before installing Windows XP SP2, it is strongly recommended to back up or make a copy of your data files. (back to top)





Do I have to install an earlier Service Pack 1 before installing Windows XP SP2?



No. (back to top)





Is there any patch that is required to install prior to SP2 installation?



Microsoft has issue a critical patch (KB885523) that will resolve compatibility issue with a non-Microsoft software application installed on your computer. Download and install this patch prior the installation of SP2. This download can be found



CODE



http://www.microsoft.com/downloads/details.aspx?amp;displaylang=en.&familyid=65875203-CF1B-4D32-8F32-E00D004659F6&displaylang=en







** NO ACTIVE LINKS - Ninja **





Microsoft has issue a non-security critical update (KB885626) that will help to resolve an issue where a limited number of systems running a BIOS without production support for Intel Pentium 4 and Intel Celeron D processors based on Prescott C-0 stepping that can potentially hang on Windows XP Service Pack 2 installation.



This download can be found at



CODE



http://support.microsoft.com/default.aspx?scid=kb



;[LN];885626 (back to top)



** NO ACTIVE LINKS - Ninja **





Where can I download (and install) a copy of Windows XP SP2?



You can download a copy of Windows XP SP2 from one of the following methods:



a. Microsoft Download Site



b. Windows Update



c. Automatic Update



d. CD Order Process from Microsoft



e. CITS Software Directory (back to top)





Is there any application that has compatibility issues with Windows XP SP2?



Microsoft has list out a list of programs that are known to have experience a loss of



functionality when running on Windows XP SP2. Click here for more details.





There is also a list of programs that may stop working after installing Win XP SP2.



Click here for the details. (back to top)





What are the patches found in this Windows XP SP2?



Please refer to the following Microsoft sites for the updates:



a. Security patches



b. Fixes (back to top)





What is new in Windows XP SP2?



This SP2 has improved security technologies that will withstand malicious viruses and worms attacks. These technologies include:



a. Network protection (protection against malicious attacks)



b. Memory protection (prevent buffer overruns)



c. E-mail handling (improved attachment control using AES API)



d. Browsing security (lock down Local Machine zone and turn on pop-up blocker)



e. Computer maintenance (keep computer with the latest security updated)





For greater details, please refer to Microsoft site here (back to top)





How do I install Win XP SP2?



After you have downloaded the Win XP SP2, the Setup Wizard will appear.



a. Note: Remember to protect or back up all data files



b. In the 'Welcome to Windows XP Service Pack 2 Setup Wizard', click Next.



c. In the 'License Agreement', select 'I Agree' and click Next.



d. In the next screen for 'Uninstalled Folders', click Next to proceed.



e. The system will proceed to do the inspection of your current configuration, archive your current files and update your files. This will take quite a while, so please wait patiently.



f. At the end of the installation, click Finish and this will reboot your system.



g. After rebooting, a firewall option screen may appear. Select the 'ON' radio button to proceed with the turning on the Windows Firewall.



h. Ensure that the security essentials are all turn ON (by clicking Start -> Control Panel -> Security Center) (back to top)





What is this so called Windows Firewall?



Windows Firewall (previously known as Internet Connection Firewall or ICF in Win XP) is a software-based, stateful filtering firewall for Microsoft Windows XP.





After the Win XP SP2 installation, this Windows Firewall is turned on by default.





Windows Firewall provides protection for computers that are connected to a network by preventing unsolicited inbound connections through TCP/IP. The Configuration options include:



a. Enabling static exceptions for ports



b. Enabling exceptions for applications



c. Configuring basic ICMP options



d. Logging dropped packets and successful connections (back to top)





How do I know that the Windows Firewall is enabled in my system?



Go to the Control Panel and click Security Center and check that the Firewall is ON





Alternatively, if you open up the LAN connection icon, you will notice a lock symbol being shown.





Can I disable the Windows Firewall?



You can manually turn it off, if you have the administrator rights. However, it is advisable to leave it on in order to minimize any virus, worms or trogons attacks.





With Windows Firewall turn on, do I still need to have an anti-virus software installed on my computer?



Even with Windows Firewall turn on, it is still necessary to have an anti-virus software installed in the computer. Windows Firewall is NOT a replacement for anti-virus software but acts as a compliment to anti-virus software. (back to top)





My computer stops responding when I restart to complete the installation of Windows XP Service Pack 2. What should I do?



This issue may occur if either (1) your computer uses an Intel Pentium 4 or Intel Celeron D processor that is based on Prescott C-0 processor stepping or (2) Your computer has a BIOS version that is out of specification.





Contact your computer manufacturer for an updated version of BIOS that provides production support for the processor that is installed in your computer or refer to Microsoft article



CODE



http://support.microsoft.com/default.aspx?scid=kb



;[LN];885626 for resolution.



(back to top)



** NO ACTIVE LINKS - Ninja **





I receive a "Stop: c0000135" and "winsrv was not found" error message after I install Windows XP Service Pack 2?



This problem may occur if either you have (1) T.V. Media (TvMedia.tvmbho) from Total Velocity Corporation is installed on your computer or (2) not installed Critical Update 885523 or (3) tried to install Windows XP SP2.





Refer to Microsoft article



CODE



http://support.microsoft.com/?kbid=885523



for resolution



(back to top)



** NO ACTIVE LINKS - Ninja **





After installing SP2 and reboot my system, I receive this message "Your network administrator can unblock this program for you". Why is this so and what should I do?



This is because you are not the administrator of this system. You should use an administrator account to log in to unblock this program.



After logging in as an administrator, you can either choose to 'Keep Blocking' this program or 'Unblock' this program or 'Ask Me Later' when I run that program again as shown below.





When I am surfing to some websites using Internet Explorer, I notice that Internet Explorer does not display some of the pop-up windows? Why is this so and what should I do to display these pop-up windows?



When you install SP2, the pop-up blocker is turned on in Internet Explorer. It will block most automcatic pop-ups but it will play a sound and show the Information Bar when a pop-up is blocked as shown below.





To temporarily or always allow pop-ups from that website, click the Information Bar when it notifies a pop-up has been blocked. Choose the correct setting as shown below.





If you choose to 'Always Allow Pop-ups from This Site', it will prompt you to confirm again to permanently trust this website to allow pop-ups. Click 'Yes' if you are sure.


Please note: this tutorial is taken from here


http://www.virtualplastic.net/html/desk_adv.html#save





Recognize this ?? You've got all your windows sized, icons placed the way they look great.... explorer crash! (Or, the thing crashes not that much anymore, but it seems to forget sometimes...) And there you go again.. but, there's a way to recover all your settings, that's windows placing, sizing and icon positions, with just one click (Win 9x/2k).





First, make it all look, once more, just the way you want it to be. Choose about 30 folders you access frequently to look good (don't forget your win- and system dir, program files etc.).





Now these settings are in the Registry, open it and go to:



HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer



Select the folder 'Streams'. Choose 'Registry' in the toolbar, and 'export registry-key'. The information in the key is being stored in a .reg file, which is a simple textfile. Name & store where you want. Then do the same with the folder 'StreamMRU'.





Close RegEdit and open the last file with notepad. Remove the first line (REGEDIT4) and copy the rest. Then open your first file and paste it at the end. Save, close and make a shortcut to your desktop. And then, have fun and mess up all your favorite folders. Once exhausted (double)click your shortcut and confirm you wanna enter this info into the Registry. Rejoice!





A lot of graphic cards come with some software to save your desktop icon layout. If yours didn't, alternatives:





Softwarium Restore Desktop http://www.softwarium.com/download/RDSetup.exe "magically restores icons' positions after display resolution changing. You can also restore saved icons' positions manually by rightclicking on the desktop" (free, all versions).





(!!) An even more integrated solution, that works in all versions, is using layout.dll/layout.reg http://www.virtualplastic.net/download/hacks/layout.zip from the NT 4 Resource Kit. Put the .dll in your (9x) \Windows\System, (2k) \Winnt\System32 or (XP) \Windows\System32 folder, import the .reg file and have the option to save and restore (one configuration) in the rightclickmenu of My Computer and the bin (14 kB, source: Jorge Walker at Axcel216).


Quickly Start The Shared Folder Wizard




Want to share a folder, or multiple folders, quickly and easily?





You can invoke the Shared Folder Wizard by typing shrpubw.exe at the Run box or command line. The wizard takes you through the process of setting up a shared folder and allows you to start the process over within the same wizard, which is especially good if you want to make multiple folders shared.


Re-format & Re-install






Part 1





This series covers the basic steps of reformatting your hard drive and re-installing Windows. Now, this is not for the digitally squeamish and it's defiantly one of those do-at-your-own-risk deals. It's not intended for novices and should not be attempted unless you are fairly comfortable with DOS (if you have to ask what DOS is, than skip this tip).





A final warning - This is a general procedure so you may run into unforeseen problems. You may be able to get answers to problems at the message board, but don't come cryin' to me - You've been warned!!





OK, before we start any kind of disk formatting, we need to back up all the important info on your computer. I usually copy everything to my CD-R or a few zip disks. I generally only back up stuff that I created. I don't backup programs I have on disk, I re-install those. Make sure you get everything that's important to you backed up (maybe twice) because after we're done formatting the disk it will be COMPLETELY GONE!





Next, you'll want a boot disk. Even if you don't think you'll need it you should still have it, just in case.





To make a boot disk for win 95/98, (not a Windows recovery disk) follow these steps:





1. Open My Computer, insert a 3.5 floppy into your Drive A: and right-click the icon for your A: drive. Select Format from the resulting menu.





2. Select Full format and check the "Copy system files box". Then hit Start to format the disk.









>> Note that if you are using Win ME that the above little trick won't work. You'll need to go to your Start button, Settings, Control Panel. Open up the Add/Remove programs icon. From there, click the Startup Disk tab and create a new startup disk.<<





You should now have a bootable disk. You'll probably want to copy the following files to it:





EDIT.COM (you may need this to create or edit DOS files- this should be there if you made a Win ME recovery disk)



FORMAT.COM (for disk formatting)



FDISK.EXE (you'll lean about FDISK tomorrow- this should be there if you made a Win ME recovery disk)



MSCDEX.EXE (you may need this for your CD ROM)





All the above files should be under your C:\Windows\Command\ directory.



If not, use the Find feature to locate them (Start button, "Find" or "Search", depending on what version of Windows you have) . Once you find the files, right-click them and select Send to, 3 1/2 Floppy (A).









Here's some other stuff you'll want handy:





- Your CD ROM driver



- Your Windows CD



- Your Windows Setup Disk 1 (it's a floppy that you may have if you have a full version of Win 98. It's not 100% neces


Remote Desktop Through Company Firewall




Dont wanna take any credit for this as i got this from another forum thought of it as quite informative so pastin it here





Note this tutorial is collection of tips I gathered from searching the internet and some credit is due to the original authors. None of which I know.





A lot of people I know love using the Windows Remote Desktop feature at work, however are prevented from connecting to their home computer because of the company firewall. This is because most corporate firewalls block port 3389 which Remote Desktop uses. Most just switch to VNC, however most find it slower than Remote Desktop.





This quick tutorial shows how (from a fire walled network that blocks port 3389) you can access your home computer using MS Remote Desktop.





*This tutorial assumes you have or know how to setup and dynamic DNS client if you need one





*Assumes you know how to setup port forwarding if you need to.





Because Remote Desktop is using port 3389 by default, it is not possible to go through a firewall. So you can use port 443. Because this port is always open on your companies firewall to allow https. (One would assume )





At your home PC:





1) Configure Your pc to allow Remote Connections in your System Properties (windows - Break) tab Remote. Check 'Allow users to connect remote to this computer.





2) (add users if needed)





3) According to



CODE



http://support.microsoft.com/default.aspx?scid=kb;en-us;306759]





In the registry change



HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber to 443 (click Decimal radio button first)





*Configure your firewall to allow traffic through port 443 (If you need to)





*Configure your route to forward port 443 to your computer (If you need to)





If you have IIS running you have to change the port number of https. because it is already listening on this port.



C:\WINDOWS\system32\cscript.exe c:\inetpub\adminscripts\adsutil.vbs SET w3svc/1/



SecureBindings ":444:"





Or just disable IIS Service







For your PC at work:





According to



CODE



http://support.microsoft.com/default.aspx?scid=kb;en-us;304304





you can just type the port after the IP-Address of your home PC.





*Or if you have a Dynamic DNS Client such as No-IP or DynDNS you can type in that address.





Alternatively



You can add the following to the rdp file. (which you can get to click on Save As on the tab General of Remote Desktop Connection)



server port:i:443





Extra tip: to have access to your clients hard disk on your remote desktop, check Disk Drives on the tab Local Resources of Remote Desktop Connection


Port Numbers




ORT NUMBERS





(last updated 19 January 2005)





The port numbers are divided into three ranges: the Well Known Ports,



the Registered Ports, and the Dynamic and/or Private Ports.





The Well Known Ports are those from 0 through 1023.





The Registered Ports are those from 1024 through 49151





The Dynamic and/or Private Ports are those from 49152 through 65535







************************************************************************



* PLEASE NOTE THE FOLLOWING: *



* *



* 1. UNASSIGNED PORT NUMBERS SHOULD NOT BE USED. THE IANA WILL ASSIGN *



* THE NUMBER FOR THE PORT AFTER YOUR APPLICATION HAS BEEN APPROVED. *



* *



* 2. ASSIGNMENT OF A PORT NUMBER DOES NOT IN ANY WAY IMPLY AN *



* ENDORSEMENT OF AN APPLICATION OR PRODUCT, AND THE FACT THAT NETWORK *



* TRAFFIC IS FLOWING TO OR FROM A REGISTERED PORT DOES NOT MEAN THAT *



* IT IS "GOOD" TRAFFIC. FIREWALL AND SYSTEM ADMINISTRATORS SHOULD *



* CHOOSE HOW TO CONFIGURE THEIR SYSTEMS BASED ON THEIR KNOWLEDGE OF *



* THE TRAFFIC IN QUESTION, NOT WHETHER THERE IS A PORT NUMBER *



* REGISTERED OR NOT. *



************************************************************************







WELL KNOWN PORT NUMBERS





The Well Known Ports are assigned by the IANA and on most systems can



only be used by system (or root) processes or by programs executed by



privileged users.





Ports are used in the TCP [RFC793] to name the ends of logical



connections which carry long term conversations. For the purpose of



providing services to unknown callers, a service contact port is



defined. This list specifies the port used by the server process as



its contact port. The contact port is sometimes called the



"well-known port".





To the extent possible, these same port assignments are used with the



UDP [RFC768].





The range for assigned ports managed by the IANA is 0-1023.





Port Assignments:





Keyword Decimal Description References



------- ------- ----------- ----------



0/tcp Reserved



0/udp Reserved



# Jon Postel



tcpmux 1/tcp TCP Port Service Multiplexer



tcpmux 1/udp TCP Port Service Multiplexer



# Mark Lottor



compressnet 2/tcp Management Utility



compressnet 2/udp Management Utility



compressnet 3/tcp Compression Process



compressnet 3/udp Compression Process



# Bernie Volz



# 4/tcp Unassigned



# 4/udp Unassigned



rje 5/tcp Remote Job Entry



rje 5/udp Remote Job Entry



# Jon Postel



# 6/tcp Unassigned



# 6/udp Unassigned



echo 7/tcp Echo



echo 7/udp Echo



# Jon Postel



# 8/tcp Unassigned



# 8/udp Unassigned



discard 9/tcp Discard



discard 9/udp Discard



# Jon Postel



# 10/tcp Unassigned



# 10/udp Unassigned



systat 11/tcp Active Users



systat 11/udp Active Users



# Jon Postel



# 12/tcp Unassigned



# 12/udp Unassigned



daytime 13/tcp Daytime (RFC 867)



daytime 13/udp Daytime (RFC 867)



# Jon Postel



# 14/tcp Unassigned



# 14/udp Unassigned



# 15/tcp Unassigned [was netstat]



# 15/udp Unassigned



# 16/tcp Unassigned



# 16/udp Unassigned



qotd 17/tcp Quote of the Day



qotd 17/udp Quote of the Day



# Jon Postel



msp 18/tcp Message Send Protocol



msp 18/udp Message Send Protocol



# Rina Nethaniel <---none--->



chargen 19/tcp Character Generator



chargen 19/udp Character Generator



ftp-data 20/tcp File Transfer [Default Data]



ftp-data 20/udp File Transfer [Default Data]



ftp 21/tcp File Transfer [Control]



ftp 21/udp File Transfer [Control]



# Jon Postel



ssh 22/tcp SSH Remote Login Protocol



ssh 22/udp SSH Remote Login Protocol



# Tatu Ylonen



telnet 23/tcp Telnet



telnet 23/udp Telnet



# Jon Postel



24/tcp any private mail system



24/udp any private mail system



# Rick Adams



smtp 25/tcp Simple Mail Transfer



smtp 25/udp Simple Mail Transfer



# Jon Postel



# 26/tcp Unassigned



# 26/udp Unassigned



nsw-fe 27/tcp NSW User System FE



nsw-fe 27/udp NSW User System FE



# Robert Thomas



# 28/tcp Unassigned



# 28/udp Unassigned



msg-icp 29/tcp MSG ICP



msg-icp 29/udp MSG ICP



# Robert Thomas



# 30/tcp Unassigned



# 30/udp Unassigned



msg-auth 31/tcp MSG Authentication



msg-auth 31/udp MSG Authentication



# Robert Thomas



# 32/tcp Unassigned



# 32/udp Unassigned



dsp 33/tcp Display Support Protocol



dsp 33/udp Display Support Protocol



# Ed Cain



# 34/tcp Unassigned



# 34/udp Unassigned



35/tcp any private printer server



35/udp any private printer server



# Jon Postel



# 36/tcp Unassigned



# 36/udp Unassigned



time 37/tcp Time



time 37/udp Time



# Jon Postel



rap 38/tcp Route Access Protocol



rap 38/udp Route Access Protocol



# Robert Ullmann



rlp 39/tcp Resource Location Protocol



rlp 39/udp Resource Location Protocol



# Mike Accetta



# 40/tcp Unassigned



# 40/udp Unassigned



graphics 41/tcp Graphics



graphics 41/udp Graphics



name 42/tcp Host Name Server



name 42/udp Host Name Server



nameserver 42/tcp Host Name Server



nameserver 42/udp Host Name Server



nicname 43/tcp Who Is



nicname 43/udp Who Is



mpm-flags 44/tcp MPM FLAGS Protocol



mpm-flags 44/udp MPM FLAGS Protocol



mpm 45/tcp Message Processing Module [recv]



mpm 45/udp Message Processing Module [recv]



mpm-snd 46/tcp MPM [default send]



mpm-snd 46/udp MPM [default send]



# Jon Postel



ni-ftp 47/tcp NI FTP



ni-ftp 47/udp NI FTP



# Steve Kille



auditd 48/tcp Digital Audit Daemon



auditd 48/udp Digital Audit Daemon



# Larry Scott



tacacs 49/tcp Login Host Protocol (TACACS)



tacacs 49/udp Login Host Protocol (TACACS)



# Pieter Ditmars



re-mail-ck 50/tcp Remote Mail Checking Protocol



re-mail-ck 50/udp Remote Mail Checking Protocol



# Steve Dorner



la-maint 51/tcp IMP Logical Address Maintenance



la-maint 51/udp IMP Logical Address Maintenance



# Andy Malis



xns-time 52/tcp XNS Time Protocol



xns-time 52/udp XNS Time Protocol



# Susie Armstrong



domain 53/tcp Domain Name Server



domain 53/udp Domain Name Server



# Paul Mockapetris



xns-ch 54/tcp XNS Clearinghouse



xns-ch 54/udp XNS Clearinghouse



# Susie Armstrong



isi-gl 55/tcp ISI Graphics Language



isi-gl 55/udp ISI Graphics Language



xns-auth 56/tcp XNS Authentication



xns-auth 56/udp XNS Authentication



# Susie Armstrong



57/tcp any private terminal access



57/udp any private terminal access



# Jon Postel



xns-mail 58/tcp XNS Mail



xns-mail 58/udp XNS Mail



# Susie Armstrong



59/tcp any private file service



59/udp any private file service



# Jon Postel



60/tcp Unassigned



60/udp Unassigned



ni-mail 61/tcp NI MAIL



ni-mail 61/udp NI MAIL



# Steve Kille



acas 62/tcp ACA Services



acas 62/udp ACA Services



# E. Wald



whois++ 63/tcp whois++



whois++ 63/udp whois++



# Rickard Schoultz



covia 64/tcp Communications Integrator (CI)



covia 64/udp Communications Integrator (CI)



# Dan Smith



tacacs-ds 65/tcp TACACS-Database Service



tacacs-ds 65/udp TACACS-Database Service



# Kathy Huber



sql*net 66/tcp Oracle SQL*NET



sql*net 66/udp Oracle SQL*NET



# Jack Haverty



bootps 67/tcp Bootstrap Protocol Server



bootps 67/udp Bootstrap Protocol Server



bootpc 68/tcp Bootstrap Protocol Client



bootpc 68/udp Bootstrap Protocol Client



# Bill Croft



tftp 69/tcp Trivial File Transfer



tftp 69/udp Trivial File Transfer



# David Clark



gopher 70/tcp Gopher



gopher 70/udp Gopher



# Mark McCahill



netrjs-1 71/tcp Remote Job Service



netrjs-1 71/udp Remote Job Service



netrjs-2 72/tcp Remote Job Service



netrjs-2 72/udp Remote Job Service



netrjs-3 73/tcp Remote Job Service



netrjs-3 73/udp Remote Job Service



netrjs-4 74/tcp Remote Job Service



netrjs-4 74/udp Remote Job Service



# Bob Braden



75/tcp any private dial out service



75/udp any private dial out service



# Jon Postel



deos 76/tcp Distributed External Object Store



deos 76/udp Distributed External Object Store



# Robert Ullmann



77/tcp any private RJE service



77/udp any private RJE service



# Jon Postel



vettcp 78/tcp vettcp



vettcp 78/udp vettcp



# Christopher Leong



finger 79/tcp Finger



finger 79/udp Finger



# David Zimmerman



http 80/tcp World Wide Web HTTP



http 80/udp World Wide Web HTTP



www 80/tcp World Wide Web HTTP



www 80/udp World Wide Web HTTP



www-http 80/tcp World Wide Web HTTP



www-http 80/udp World Wide Web HTTP



# Tim Berners-Lee



hosts2-ns 81/tcp HOSTS2 Name Server



hosts2-ns 81/udp HOSTS2 Name Server



# Earl Killian



xfer 82/tcp XFER Utility



xfer 82/udp XFER Utility



# Thomas M. Smith



mit-ml-dev 83/tcp MIT ML Device



mit-ml-dev 83/udp MIT ML Device



# David Reed <--none--->



ctf 84/tcp Common Trace Facility



ctf 84/udp Common Trace Facility



# Hugh Thomas



mit-ml-dev 85/tcp MIT ML Device



mit-ml-dev 85/udp MIT ML Device



# David Reed <--none--->



mfcobol 86/tcp Micro Focus Cobol



mfcobol 86/udp Micro Focus Cobol



# Simon Edwards <--none--->



87/tcp any private terminal link



87/udp any private terminal link



# Jon Postel



kerberos 88/tcp Kerberos



kerberos 88/udp Kerberos



# B. Clifford Neuman



su-mit-tg 89/tcp SU/MIT Telnet Gateway



su-mit-tg 89/udp SU/MIT Telnet Gateway



# Mark Crispin



########### PORT 90 also being used unofficially by Pointcast #########



dnsix 90/tcp DNSIX Securit Attribute Token Map



dnsix 90/udp DNSIX Securit Attribute Token Map



# Charles Watt



mit-dov 91/tcp MIT Dover Spooler



mit-dov 91/udp MIT Dover Spooler



# Eliot Moss



npp 92/tcp Network Printing Protocol



npp 92/udp Network Printing Protocol



# Louis Mamakos



dcp 93/tcp Device Control Protocol



dcp 93/udp Device Control Protocol



# Daniel Tappan



objcall 94/tcp Tivoli Object Dispatcher



objcall 94/udp Tivoli Object Dispatcher



# Tom Bereiter <--none--->



supdup 95/tcp SUPDUP



supdup 95/udp SUPDUP



# Mark Crispin



dixie 96/tcp DIXIE Protocol Specification



dixie 96/udp DIXIE Protocol Specification



# Tim Howes



swift-rvf 97/tcp Swift Remote Virtural File Protocol



swift-rvf 97/udp Swift Remote Virtural File Protocol



# Maurice R. Turcotte



#



tacnews 98/tcp TAC News



tacnews 98/udp TAC News



# Jon Postel



metagram 99/tcp Metagram Relay



metagram 99/udp Metagram Relay



# Geoff Goodfellow



newacct 100/tcp [unauthorized use]



hostname 101/tcp NIC Host Name Server



hostname 101/udp NIC Host Name Server



# Jon Postel



iso-tsap 102/tcp ISO-TSAP Class 0



iso-tsap 102/udp ISO-TSAP Class 0



# Marshall Rose



gppitnp 103/tcp Genesis Point-to-Point Trans Net



gppitnp 103/udp Genesis Point-to-Point Trans Net



acr-nema 104/tcp ACR-NEMA Digital Imag. & Comm. 300



acr-nema 104/udp ACR-NEMA Digital Imag. & Comm. 300



# Patrick McNamee <--none--->



cso 105/tcp CCSO name server protocol



cso 105/udp CCSO name server protocol



# Martin Hamilton



csnet-ns 105/tcp Mailbox Name Nameserver



csnet-ns 105/udp Mailbox Name Nameserver



# Marvin Solomon



3com-tsmux 106/tcp 3COM-TSMUX



3com-tsmux 106/udp 3COM-TSMUX



# Jeremy Siegel



########## 106 Unauthorized use by insecure poppassd protocol



rtelnet 107/tcp Remote Telnet Service



rtelnet 107/udp Remote Telnet Service



# Jon Postel



snagas 108/tcp SNA Gateway Access Server



snagas 108/udp SNA Gateway Access Server



# Kevin Murphy



pop2 109/tcp Post Office Protocol - Version 2



pop2 109/udp Post Office Protocol - Version 2



# Joyce K. Reynolds



pop3 110/tcp Post Office Protocol - Version 3



pop3 110/udp Post Office Protocol - Version 3



# Marshall Rose



sunrpc 111/tcp SUN Remote Procedure Call



sunrpc 111/udp SUN Remote Procedure Call



# Chuck McManis



mcidas 112/tcp McIDAS Data Transmission Protocol



mcidas 112/udp McIDAS Data Transmission Protocol



# Glenn Davis



ident 113/tcp



auth 113/tcp Authentication Service



auth 113/udp Authentication Service



# Mike St. Johns



# 114 Deprecated June 2004



sftp 115/tcp Simple File Transfer Protocol



sftp 115/udp Simple File Transfer Protocol



# Mark Lottor



ansanotify 116/tcp ANSA REX Notify



ansanotify 116/udp ANSA REX Notify



# Nicola J. Howarth



uucp-path 117/tcp UUCP Path Service



uucp-path 117/udp UUCP Path Service



sqlserv 118/tcp SQL Services



sqlserv 118/udp SQL Services



# Larry Barnes



nntp 119/tcp Network News Transfer Protocol



nntp 119/udp Network News Transfer Protocol



# Phil Lapsley



cfdptkt 120/tcp CFDPTKT



cfdptkt 120/udp CFDPTKT



# John Ioannidis



erpc 121/tcp Encore Expedited Remote Pro.Call



erpc 121/udp Encore Expedited Remote Pro.Call



# Jack O'Neil <---none--->



smakynet 122/tcp SMAKYNET



smakynet 122/udp SMAKYNET



# Pierre Arnaud



ntp 123/tcp Network Time Protocol



ntp 123/udp Network Time Protocol



# Dave Mills



ansatrader 124/tcp ANSA REX Trader



ansatrader 124/udp ANSA REX Trader



# Nicola J. Howarth



locus-map 125/tcp Locus PC-Interface Net Map Ser



locus-map 125/udp Locus PC-Interface Net Map Ser



# Eric Peterson



nxedit 126/tcp NXEdit



nxedit 126/udp NXEdit



# Don Payette



###########Port 126 Previously assigned to application below#######



#unitary 126/tcp Unisys Unitary Login



#unitary 126/udp Unisys Unitary Login



#



###########Port 126 Previously assigned to application above#######



locus-con 127/tcp Locus PC-Interface Conn Server



locus-con 127/udp Locus PC-Interface Conn Server



# Eric Peterson



gss-xlicen 128/tcp GSS X License Verification



gss-xlicen 128/udp GSS X License Verification



# John Light



pwdgen 129/tcp Password Generator Protocol



pwdgen 129/udp Password Generator Protocol



# Frank J. Wacho



cisco-fna 130/tcp cisco FNATIVE



cisco-fna 130/udp cisco FNATIVE



cisco-tna 131/tcp cisco TNATIVE



cisco-tna 131/udp cisco TNATIVE



cisco-sys 132/tcp cisco SYSMAINT



cisco-sys 132/udp cisco SYSMAINT



statsrv 133/tcp Statistics Service



statsrv 133/udp Statistics Service



# Dave Mills



ingres-net 134/tcp INGRES-NET Service



ingres-net 134/udp INGRES-NET Service



# Mike Berrow <---none--->



epmap 135/tcp DCE endpoint resolution



epmap 135/udp DCE endpoint resolution



# Joe Pato



profile 136/tcp PROFILE Naming System



profile 136/udp PROFILE Naming System



# Larry Peterson



netbios-ns 137/tcp NETBIOS Name Service



netbios-ns 137/udp NETBIOS Name Service



netbios-dgm 138/tcp NETBIOS Datagram Service



netbios-dgm 138/udp NETBIOS Datagram Service



netbios-ssn 139/tcp NETBIOS Session Service



netbios-ssn 139/udp NETBIOS Session Service



# Jon Postel



emfis-data 140/tcp EMFIS Data Service



emfis-data 140/udp EMFIS Data Service



emfis-cntl 141/tcp EMFIS Control Service



emfis-cntl 141/udp EMFIS Control Service



# Gerd Beling



bl-idm 142/tcp Britton-Lee IDM



bl-idm 142/udp Britton-Lee IDM



# Susie Snitzer <---none--->



imap 143/tcp Internet Message Access Protocol



imap 143/udp Internet Message Access Protocol



# Mark Crispin



uma 144/tcp Universal Management Architecture



uma 144/udp Universal Management Architecture



# Jay Whitney



uaac 145/tcp UAAC Protocol



uaac 145/udp UAAC Protocol



# David A. Gomberg



iso-tp0 146/tcp ISO-IP0



iso-tp0 146/udp ISO-IP0



iso-ip 147/tcp ISO-IP



iso-ip 147/udp ISO-IP



# Marshall Rose



jargon 148/tcp Jargon



jargon 148/udp Jargon



# Bill Weinman



aed-512 149/tcp AED 512 Emulation Service



aed-512 149/udp AED 512 Emulation Service



# Albert G. Broscius



sql-net 150/tcp SQL-NET



sql-net 150/udp SQL-NET



# Martin Picard <<---none--->



hems 151/tcp HEMS



hems 151/udp HEMS



bftp 152/tcp Background File Transfer Program



bftp 152/udp Background File Transfer Program



# Annette DeSchon



sgmp 153/tcp SGMP



sgmp 153/udp SGMP



# Marty Schoffstahl



netsc-prod 154/tcp NETSC



netsc-prod 154/udp NETSC



netsc-dev 155/tcp NETSC



netsc-dev 155/udp NETSC



# Sergio Heker



sqlsrv 156/tcp SQL Service



sqlsrv 156/udp SQL Service



# Craig Rogers



knet-cmp 157/tcp KNET/VM Command/Message Protocol



knet-cmp 157/udp KNET/VM Command/Message Protocol



# Gary S. Malkin



pcmail-srv 158/tcp PCMail Server



pcmail-srv 158/udp PCMail Server



# Mark L. Lambert



nss-routing 159/tcp NSS-Routing



nss-routing 159/udp NSS-Routing



# Yakov Rekhter



sgmp-traps 160/tcp SGMP-TRAPS



sgmp-traps 160/udp SGMP-TRAPS



# Marty Schoffstahl



snmp 161/tcp SNMP



snmp 161/udp SNMP



snmptrap 162/tcp SNMPTRAP



snmptrap 162/udp SNMPTRAP



# Marshall Rose



cmip-man 163/tcp CMIP/TCP Manager



cmip-man 163/udp CMIP/TCP Manager



cmip-agent 164/tcp CMIP/TCP Agent



cmip-agent 164/udp CMIP/TCP Agent



# Amatzia Ben-Artzi <---none--->



xns-courier 165/tcp Xerox



xns-courier 165/udp Xerox



# Susie Armstrong



s-net 166/tcp Sirius Systems



s-net 166/udp Sirius Systems



# Brian Lloyd



namp 167/tcp NAMP



namp 167/udp NAMP



# Marty Schoffstahl



rsvd 168/tcp RSVD



rsvd 168/udp RSVD



# Neil Todd



send 169/tcp SEND



send 169/udp SEND



# William D. Wisner



print-srv 170/tcp Network PostScript



print-srv 170/udp Network PostScript



# Brian Reid



multiplex 171/tcp Network Innovations Multiplex



multiplex 171/udp Network Innovations Multiplex



cl/1 172/tcp Network Innovations CL/1



cl/1 172/udp Network Innovations CL/1



# Kevin DeVault <<---none--->



xyplex-mux 173/tcp Xyplex



xyplex-mux 173/udp Xyplex



# Bob Stewart



mailq 174/tcp MAILQ



mailq 174/udp MAILQ



# Rayan Zachariassen



vmnet 175/tcp VMNET



vmnet 175/udp VMNET



# Christopher Tengi



genrad-mux 176/tcp GENRAD-MUX



genrad-mux 176/udp GENRAD-MUX



# Ron Thornton



xdmcp 177/tcp X Display Manager Control Protocol



xdmcp 177/udp X Display Manager Control Protocol



# Robert W. Scheifler



nextstep 178/tcp NextStep Window Server



nextstep 178/udp NextStep Window Server



# Leo Hourvitz



bgp 179/tcp Border Gateway Protocol



bgp 179/udp Border Gateway Protocol



# Kirk Lougheed



ris 180/tcp Intergraph



ris 180/udp Intergraph



# Dave Buehmann



unify 181/tcp Unify



unify 181/udp Unify



# Mark Ainsley



audit 182/tcp Unisys Audit SITP



audit 182/udp Unisys Audit SITP



# Gil Greenbaum



ocbinder 183/tcp OCBinder



ocbinder 183/udp OCBinder



ocserver 184/tcp OCServer



ocserver 184/udp OCServer



# Jerrilynn Okamura <--none--->



remote-kis 185/tcp Remote-KIS



remote-kis 185/udp Remote-KIS



kis 186/tcp KIS Protocol



kis 186/udp KIS Protocol



# Ralph Droms



aci 187/tcp Application Communication Interface



aci 187/udp Application Communication Interface



# Rick Carlos



mumps 188/tcp Plus Five's MUMPS



mumps 188/udp Plus Five's MUMPS



# Hokey Stenn



qft 189/tcp Queued File Transport



qft 189/udp Queued File Transport



# Wayne Schroeder



gacp 190/tcp Gateway Access Control Protocol



gacp 190/udp Gateway Access Control Protocol



# C. Philip Wood



prospero 191/tcp Prospero Directory Service



prospero 191/udp Prospero Directory Service



# B. Clifford Neuman



osu-nms 192/tcp OSU Network Monitoring System



osu-nms 192/udp OSU Network Monitoring System



# Doug Karl



srmp 193/tcp Spider Remote Monitoring Protocol



srmp 193/udp Spider Remote Monitoring Protocol



# Ted J. Socolofsky



irc 194/tcp Internet Relay Chat Protocol



irc 194/udp Internet Relay Chat Protocol



# Jarkko Oikarinen



dn6-nlm-aud 195/tcp DNSIX Network Level Module Audit



dn6-nlm-aud 195/udp DNSIX Network Level Module Audit



dn6-smm-red 196/tcp DNSIX Session Mgt Module Audit Redir



dn6-smm-red 196/udp DNSIX Session Mgt Module Audit Redir



# Lawrence Lebahn



dls 197/tcp Directory Location Service



dls 197/udp Directory Location Service



dls-mon 198/tcp Directory Location Service Monitor



dls-mon 198/udp Directory Location Service Monitor



# Scott Bellew



smux 199/tcp SMUX



smux 199/udp SMUX



# Marshall Rose



src 200/tcp IBM System Resource Controller



src 200/udp IBM System Resource Controller



# Gerald McBrearty <---none--->



at-rtmp 201/tcp AppleTalk Routing Maintenance



at-rtmp 201/udp AppleTalk Routing Maintenance



at-nbp 202/tcp AppleTalk Name Binding



at-nbp 202/udp AppleTalk Name Binding



at-3 203/tcp AppleTalk Unused



at-3 203/udp AppleTalk Unused



at-echo 204/tcp AppleTalk Echo



at-echo 204/udp AppleTalk Echo



at-5 205/tcp AppleTalk Unused



at-5 205/udp AppleTalk Unused



at-zis 206/tcp AppleTalk Zone Information



at-zis 206/udp AppleTalk Zone Information



at-7 207/tcp AppleTalk Unused



at-7 207/udp AppleTalk Unused



at-8 208/tcp AppleTalk Unused



at-8 208/udp AppleTalk Unused



# Rob Chandhok



qmtp 209/tcp The Quick Mail Transfer Protocol



qmtp 209/udp The Quick Mail Transfer Protocol



# Dan Bernstein



z39.50 210/tcp ANSI Z39.50



z39.50 210/udp ANSI Z39.50



# Mark H. Needleman



914c/g 211/tcp Texas Instruments 914C/G Terminal



914c/g 211/udp Texas Instruments 914C/G Terminal



# Bill Harrell <---none--->



anet 212/tcp ATEXSSTR



anet 212/udp ATEXSSTR



# Jim Taylor



ipx 213/tcp IPX



ipx 213/udp IPX



# Don Provan



vmpwscs 214/tcp VM PWSCS



vmpwscs 214/udp VM PWSCS



# Dan Shia



softpc 215/tcp Insignia Solutions



softpc 215/udp Insignia Solutions



# Martyn Thomas <---none--->



CAIlic 216/tcp Computer Associates Int'l License Server



CAIlic 216/udp Computer Associates Int'l License Server



# Chuck Spitz



dbase 217/tcp dBASE Unix



dbase 217/udp dBASE Unix



# Don Gibson



#



mpp 218/tcp Netix Message Posting Protocol



mpp 218/udp Netix Message Posting Protocol



# Shannon Yeh



uarps 219/tcp Unisys ARPs



uarps 219/udp Unisys ARPs



# Ashok Marwaha <---none--->



imap3 220/tcp Interactive Mail Access Protocol v3



imap3 220/udp Interactive Mail Access Protocol v3



# James Rice



fln-spx 221/tcp Berkeley rlogind with SPX auth



fln-spx 221/udp Berkeley rlogind with SPX auth



rsh-spx 222/tcp Berkeley rshd with SPX auth



rsh-spx 222/udp Berkeley rshd with SPX auth



cdc 223/tcp Certificate Distribution Center



cdc 223/udp Certificate Distribution Center



# Kannan Alagappan



########### Possible Conflict of Port 222 with "Masqdialer"##############



### Contact for Masqdialer is Charles Wright ###



masqdialer 224/tcp masqdialer



masqdialer 224/udp masqdialer



# Charles Wright



# 225-241 Reserved



# Jon Postel



direct 242/tcp Direct



direct 242/udp Direct



# Herb Sutter



sur-meas 243/tcp Survey Measurement



sur-meas 243/udp Survey Measurement



# Dave Clark



inbusiness 244/tcp inbusiness



inbusiness 244/udp inbusiness



# Derrick Hisatake



link 245/tcp LINK



link 245/udp LINK



dsp3270 246/tcp Display Systems Protocol



dsp3270 246/udp Display Systems Protocol



# Weldon J. Showalter



subntbcst_tftp 247/tcp SUBNTBCST_TFTP



subntbcst_tftp 247/udp SUBNTBCST_TFTP



# John Fake



bhfhs 248/tcp bhfhs



bhfhs 248/udp bhfhs



# John Kelly



# 249-255 Reserved



# Jon Postel



rap 256/tcp RAP



rap 256/udp RAP



# J.S. Greenfield



set 257/tcp Secure Electronic Transaction



set 257/udp Secure Electronic Transaction



# Donald Eastlake



yak-chat 258/tcp Yak Winsock Personal Chat



yak-chat 258/udp Yak Winsock Personal Chat



# Brian Bandy



esro-gen 259/tcp Efficient Short Remote Operations



esro-gen 259/udp Efficient Short Remote Operations



# Mohsen Banan



openport 260/tcp Openport



openport 260/udp Openport



# John Marland



nsiiops 261/tcp IIOP Name Service over TLS/SSL



nsiiops 261/udp IIOP Name Service over TLS/SSL



# Jeff Stewart



arcisdms 262/tcp Arcisdms



arcisdms 262/udp Arcisdms



# Russell Crook (rmc@sni.ca>



hdap 263/tcp HDAP



hdap 263/udp HDAP



# Troy Gau



bgmp 264/tcp BGMP



bgmp 264/udp BGMP



# Dave Thaler



x-bone-ctl 265/tcp X-Bone CTL



x-bone-ctl 265/udp X-Bone CTL



# Joe Touch



sst 266/tcp SCSI on ST



sst 266/udp SCSI on ST



# Donald D. Woelz



td-service 267/tcp Tobit David Service Layer



td-service 267/udp Tobit David Service Layer



td-replica 268/tcp Tobit David Replica



td-replica 268/udp Tobit David Replica



# Franz-Josef Leuders



# 269-279 Unassigned



http-mgmt 280/tcp http-mgmt



http-mgmt 280/udp http-mgmt



# Adrian Pell



#



personal-link 281/tcp Personal Link



personal-link 281/udp Personal Link



# Dan Cummings



cableport-ax 282/tcp Cable Port A/X



cableport-ax 282/udp Cable Port A/X



# Craig Langfahl



rescap 283/tcp rescap



rescap 283/udp rescap



# Paul Hoffman



corerjd 284/tcp corerjd



corerjd 284/udp corerjd



# Chris Thornhill



# 285 Unassigned



fxp 286/tcp FXP Communication



fxp 286/udp FXP Communication



# James Darnall



k-block 287/tcp K-BLOCK



k-block 287/udp K-BLOCK



# Simon P Jackson



# 288-307 Unassigned



novastorbakcup 308/tcp Novastor Backup



novastorbakcup 308/udp Novastor Backup



# Brian Dickman



entrusttime 309/tcp EntrustTime



entrusttime 309/udp EntrustTime



# Peter Whittaker



bhmds 310/tcp bhmds



bhmds 310/udp bhmds



# John Kelly



asip-webadmin 311/tcp AppleShare IP WebAdmin



asip-webadmin 311/udp AppleShare IP WebAdmin



# Ann Huang



vslmp 312/tcp VSLMP



vslmp 312/udp VSLMP



# Gerben Wierda



magenta-logic 313/tcp Magenta Logic



magenta-logic 313/udp Magenta Logic



# Karl Rousseau



opalis-robot 314/tcp Opalis Robot



opalis-robot 314/udp Opalis Robot



# Laurent Domenech, Opalis



dpsi 315/tcp DPSI



dpsi 315/udp DPSI



# Tony Scamurra



decauth 316/tcp decAuth



decauth 316/udp decAuth



# Michael Agishtein



zannet 317/tcp Zannet



zannet 317/udp Zannet



# Zan Oliphant



pkix-timestamp 318/tcp PKIX TimeStamp



pkix-timestamp 318/udp PKIX TimeStamp



# Robert Zuccherato



ptp-event 319/tcp PTP Event



ptp-event 319/udp PTP Event



ptp-general 320/tcp PTP General



ptp-general 320/udp PTP General



# John Eidson



pip 321/tcp PIP



pip 321/udp PIP



# Gordon Mohr



rtsps 322/tcp RTSPS



rtsps 322/udp RTSPS



# Anders Klemets



# 323-332 Unassigned



texar 333/tcp Texar Security Port



texar 333/udp Texar Security Port



# Eugen Bacic



# 334-343 Unassigned



pdap 344/tcp Prospero Data Access Protocol



pdap 344/udp Prospero Data Access Protocol



# B. Clifford Neuman



pawserv 345/tcp Perf Analysis Workbench



pawserv 345/udp Perf Analysis Workbench



zserv 346/tcp Zebra server



zserv 346/udp Zebra server



fatserv 347/tcp Fatmen Server



fatserv 347/udp Fatmen Server



csi-sgwp 348/tcp Cabletron Management Protocol



csi-sgwp 348/udp Cabletron Management Protocol



mftp 349/tcp mftp



mftp 349/udp mftp



# Dave Feinleib



matip-type-a 350/tcp MATIP Type A



matip-type-a 350/udp MATIP Type A



matip-type-b 351/tcp MATIP Type B



matip-type-b 351/udp MATIP Type B



# Alain Robert



# The following entry records an unassigned but widespread use



bhoetty 351/tcp bhoetty (added 5/21/97)



bhoetty 351/udp bhoetty



# John Kelly



dtag-ste-sb 352/tcp DTAG (assigned long ago)



dtag-ste-sb 352/udp DTAG



# Ruediger Wald



# The following entry records an unassigned but widespread use



bhoedap4 352/tcp bhoedap4 (added 5/21/97)



bhoedap4 352/udp bhoedap4



# John Kelly



ndsauth 353/tcp NDSAUTH



ndsauth 353/udp NDSAUTH



# Jayakumar Ramalingam



bh611 354/tcp bh611



bh611 354/udp bh611



# John Kelly



datex-asn 355/tcp DATEX-ASN



datex-asn 355/udp DATEX-ASN



# Kenneth Vaughn



cloanto-net-1 356/tcp Cloanto Net 1



cloanto-net-1 356/udp Cloanto Net 1



# Michael Battilana



bhevent 357/tcp bhevent



bhevent 357/udp bhevent



# John Kelly



shrinkwrap 358/tcp Shrinkwrap



shrinkwrap 358/udp Shrinkwrap



# Bill Simpson



nsrmp 359/tcp Network Security Risk Management Protocol



nsrmp 359/udp Network Security Risk Management Protocol



# Eric Jacksch



scoi2odialog 360/tcp scoi2odialog



scoi2odialog 360/udp scoi2odialog



# Keith Petley



semantix 361/tcp Semantix



semantix 361/udp Semantix



# Semantix



srssend 362/tcp SRS Send



srssend 362/udp SRS Send



# Curt Mayer



rsvp_tunnel 363/tcp RSVP Tunnel



rsvp_tunnel 363/udp RSVP Tunnel



# Andreas Terzis



aurora-cmgr 364/tcp Aurora CMGR



aurora-cmgr 364/udp Aurora CMGR



# Philip Budne



dtk 365/tcp DTK



dtk 365/udp DTK



# Fred Cohen



odmr 366/tcp ODMR



odmr 366/udp ODMR



# Randall Gellens



mortgageware 367/tcp MortgageWare



mortgageware 367/udp MortgageWare



# Ole Hellevik



qbikgdp 368/tcp QbikGDP



qbikgdp 368/udp QbikGDP



# Adrien de Croy



rpc2portmap 369/tcp rpc2portmap



rpc2portmap 369/udp rpc2portmap



codaauth2 370/tcp codaauth2



codaauth2 370/udp codaauth2



# Robert Watson



clearcase 371/tcp Clearcase



clearcase 371/udp Clearcase



# Dave LeBlang



ulistproc 372/tcp ListProcessor



ulistproc 372/udp ListProcessor



# Anastasios Kotsikonas



legent-1 373/tcp Legent Corporation



legent-1 373/udp Legent Corporation



legent-2 374/tcp Legent Corporation



legent-2 374/udp Legent Corporation



# Keith Boyce <---none--->



hassle 375/tcp Hassle



hassle 375/udp Hassle



# Reinhard Doelz



nip 376/tcp Amiga Envoy Network Inquiry Proto



nip 376/udp Amiga Envoy Network Inquiry Proto



# Heinz Wrobel



tnETOS 377/tcp NEC Corporation



tnETOS 377/udp NEC Corporation



dsETOS 378/tcp NEC Corporation



dsETOS 378/udp NEC Corporation



# Tomoo Fujita



is99c 379/tcp TIA/EIA/IS-99 modem client



is99c 379/udp TIA/EIA/IS-99 modem client



is99s 380/tcp TIA/EIA/IS-99 modem server



is99s 380/udp TIA/EIA/IS-99 modem server



# Frank Quick



hp-collector 381/tcp hp performance data collector



hp-collector 381/udp hp performance data collector



hp-managed-node 382/tcp hp performance data managed node



hp-managed-node 382/udp hp performance data managed node



hp-alarm-mgr 383/tcp hp performance data alarm manager



hp-alarm-mgr 383/udp hp performance data alarm manager



# Frank Blakely



arns 384/tcp A Remote Network Server System



arns 384/udp A Remote Network Server System



# David Hornsby



ibm-app 385/tcp IBM Application



ibm-app 385/udp IBM Application



# Lisa Tomita <---none--->



asa 386/tcp ASA Message Router Object Def.



asa 386/udp ASA Message Router Object Def.



# Steve Laitinen



aurp 387/tcp Appletalk Update-Based Routing Pro.



aurp 387/udp Appletalk Update-Based Routing Pro.



# Chris Ranch



unidata-ldm 388/tcp Unidata LDM



unidata-ldm 388/udp Unidata LDM



# Glenn Davis



ldap 389/tcp Lightweight Directory Access Protocol



ldap 389/udp Lightweight Directory Access Protocol



# Tim Howes



uis 390/tcp UIS



uis 390/udp UIS



# Ed Barron <---none--->



synotics-relay 391/tcp SynOptics SNMP Relay Port



synotics-relay 391/udp SynOptics SNMP Relay Port



synotics-broker 392/tcp SynOptics Port Broker Port



synotics-broker 392/udp SynOptics Port Broker Port



# Illan Raab



meta5 393/tcp Meta5



meta5 393/udp Meta5



# Jim Kanzler



embl-ndt 394/tcp EMBL Nucleic Data Transfer



embl-ndt 394/udp EMBL Nucleic Data Transfer



# Peter Gad



netcp 395/tcp NETscout Control Protocol



netcp 395/udp NETscout Control Protocol



# Anil Singhal <---none--->



netware-ip 396/tcp Novell Netware over IP



netware-ip 396/udp Novell Netware over IP



mptn 397/tcp Multi Protocol Trans. Net.



mptn 397/udp Multi Protocol Trans. Net.



# Soumitra Sarkar



kryptolan 398/tcp Kryptolan



kryptolan 398/udp Kryptolan



# Peter de Laval



iso-tsap-c2 399/tcp ISO Transport Class 2 Non-Control over TCP



iso-tsap-c2 399/udp ISO Transport Class 2 Non-Control over UDP



# Yanick Pouffary



work-sol 400/tcp Workstation Solutions



work-sol 400/udp Workstation Solutions



# Jim Ward



ups 401/tcp Uninterruptible Power Supply



ups 401/udp Uninterruptible Power Supply



# Charles Bennett



genie 402/tcp Genie Protocol



genie 402/udp Genie Protocol



# Mark Hankin <---none--->



decap 403/tcp decap



decap 403/udp decap



nced 404/tcp nced



nced 404/udp nced



ncld 405/tcp ncld



ncld 405/udp ncld



# Richard Jones <---none--->



imsp 406/tcp Interactive Mail Support Protocol



imsp 406/udp Interactive Mail Support Protocol



# John Myers



timbuktu 407/tcp Timbuktu



timbuktu 407/udp Timbuktu



# Marc Epard



prm-sm 408/tcp Prospero Resource Manager Sys. Man.



prm-sm 408/udp Prospero Resource Manager Sys. Man.



prm-nm 409/tcp Prospero Resource Manager Node Man.



prm-nm 409/udp Prospero Resource Manager Node Man.



# B. Clifford Neuman



decladebug 410/tcp DECLadebug Remote Debug Protocol



decladebug 410/udp DECLadebug Remote Debug Protocol



# Anthony Berent



rmt 411/tcp Remote MT Protocol



rmt 411/udp Remote MT Protocol



# Peter Eriksson



synoptics-trap 412/tcp Trap Convention Port



synoptics-trap 412/udp Trap Convention Port



# Illan Raab



smsp 413/tcp Storage Management Services Protocol



smsp 413/udp Storage Management Services Protocol



# Murthy Srinivas



infoseek 414/tcp InfoSeek



infoseek 414/udp InfoSeek



# Steve Kirsch



bnet 415/tcp BNet



bnet 415/udp BNet



# Jim Mertz



silverplatter 416/tcp Silverplatter



silverplatter 416/udp Silverplatter



# Peter Ciuffetti



onmux 417/tcp Onmux



onmux 417/udp Onmux



# Stephen Hanna



hyper-g 418/tcp Hyper-G



hyper-g 418/udp Hyper-G



# Frank Kappe



ariel1 419/tcp Ariel 1



ariel1 419/udp Ariel 1



# Joel Karafin



smpte 420/tcp SMPTE



smpte 420/udp SMPTE



# Si Becker <71362.22@CompuServe.COM>



ariel2 421/tcp Ariel 2



ariel2 421/udp Ariel 2



ariel3 422/tcp Ariel 3



ariel3 422/udp Ariel 3



# Joel Karafin



opc-job-start 423/tcp IBM Operations Planning and Control Start



opc-job-start 423/udp IBM Operations Planning and Control Start



opc-job-track 424/tcp IBM Operations Planning and Control Track



opc-job-track 424/udp IBM Operations Planning and Control Track



# Conny Larsson



icad-el 425/tcp ICAD



icad-el 425/udp ICAD



# Larry Stone



smartsdp 426/tcp smartsdp



smartsdp 426/udp smartsdp



# Alexander Dupuy



svrloc 427/tcp Server Location



svrloc 427/udp Server Location



#



ocs_cmu 428/tcp OCS_CMU



ocs_cmu 428/udp OCS_CMU



ocs_amu 429/tcp OCS_AMU



ocs_amu 429/udp OCS_AMU



# Florence Wyman



utmpsd 430/tcp UTMPSD



utmpsd 430/udp UTMPSD



utmpcd 431/tcp UTMPCD



utmpcd 431/udp UTMPCD



iasd 432/tcp IASD



iasd 432/udp IASD



# Nir Baroz



nnsp 433/tcp NNSP



nnsp 433/udp NNSP



# Rob Robertson



mobileip-agent 434/tcp MobileIP-Agent



mobileip-agent 434/udp MobileIP-Agent



mobilip-mn 435/tcp MobilIP-MN



mobilip-mn 435/udp MobilIP-MN



# Kannan Alagappan



dna-cml 436/tcp DNA-CML



dna-cml 436/udp DNA-CML



# Dan Flowers



comscm 437/tcp comscm



comscm 437/udp comscm



# Jim Teague



dsfgw 438/tcp dsfgw



dsfgw 438/udp dsfgw



# Andy McKeen



dasp 439/tcp dasp Thomas Obermair



dasp 439/udp dasp tommy@inlab.m.eunet.de



# Thomas Obermair



sgcp 440/tcp sgcp



sgcp 440/udp sgcp



# Marshall Rose



decvms-sysmgt 441/tcp decvms-sysmgt



decvms-sysmgt 441/udp decvms-sysmgt



# Lee Barton



cvc_hostd 442/tcp cvc_hostd



cvc_hostd 442/udp cvc_hostd



# Bill Davidson



https 443/tcp http protocol over TLS/SSL



https 443/udp http protocol over TLS/SSL



# Kipp E.B. Hickman



snpp 444/tcp Simple Network Paging Protocol



snpp 444/udp Simple Network Paging Protocol



# [RFC1568]



microsoft-ds 445/tcp Microsoft-DS



microsoft-ds 445/udp Microsoft-DS



# Pradeep Bahl



ddm-rdb 446/tcp DDM-Remote Relational Database Access



ddm-rdb 446/udp DDM-Remote Relational Database Access



ddm-dfm 447/tcp DDM-Distributed File Management



ddm-dfm 447/udp DDM-Distributed File Management



# Steven Ritland



ddm-ssl 448/tcp DDM-Remote DB Access Using Secure Sockets



ddm-ssl 448/udp DDM-Remote DB Access Using Secure Sockets



# Steven Ritland



as-servermap 449/tcp AS Server Mapper



as-servermap 449/udp AS Server Mapper



# Barbara Foss



tserver 450/tcp Computer Supported Telecomunication Applications



tserver 450/udp Computer Supported Telecomunication Applications



# Harvey S. Schultz



sfs-smp-net 451/tcp Cray Network Semaphore server



sfs-smp-net 451/udp Cray Network Semaphore server



sfs-config 452/tcp Cray SFS config server



sfs-config 452/udp Cray SFS config server



# Walter Poxon



creativeserver 453/tcp CreativeServer



creativeserver 453/udp CreativeServer



contentserver 454/tcp ContentServer



contentserver 454/udp ContentServer



creativepartnr 455/tcp CreativePartnr



creativepartnr 455/udp CreativePartnr



# Jesus Ortiz



macon-tcp 456/tcp macon-tcp



macon-udp 456/udp macon-udp



# Yoshinobu Inoue



#



scohelp 457/tcp scohelp



scohelp 457/udp scohelp



# Faith Zack



appleqtc 458/tcp apple quick time



appleqtc 458/udp apple quick time



# Murali Ranganathan



#



ampr-rcmd 459/tcp ampr-rcmd



ampr-rcmd 459/udp ampr-rcmd



# Rob Janssen



skronk 460/tcp skronk



skronk 460/udp skronk



# Henry Strickland



datasurfsrv 461/tcp DataRampSrv



datasurfsrv 461/udp DataR