A n00b question or two

A couple things... or maybe just one. I'm not sure. I'll remember later.

-I had a mission to delete everything on a rival company's computer. I hacked in, applied all the right junk, Proxy_bypass, Firewall_bypass, deleted everything, and deleted my logs. I reply saying the mission is done, they say they haven't heard of it. So I say "I'll fast forward time" A day goes by. Two. Nothing. I accessed the main computer, cracked the password and voice print, open up the file folder thing, nothing is there. Did I do something wrong?

- About passive traces. I think I've got them covered, but I want to check. I usually bounce everything through InterNIC, then when I'm done, I delete all the logs. Is this good?

I think that's all, if I think of anything i'll post it later.

------------------

1--You must enter the console, not the fileserver. When you are in the console, enter

cd usr
delete
*cd logs
*delete
cd sys
delete
shutdown

  • =not mandatory

2--Yes, that does it.

EDIT--Welcome to the boards

------------------
Going to war without France is like going deer hunting without your accordian.
"You're dumb." -Rawzer to whitedevil and whitedevil2

(This message has been edited by SlaVitiCkus (edited 06-02-2003).)

Thanks, now I'm gonna be 8.3k richer.

------------------

I have another question...

I took on a mission where my employer wants me to copy all the files from their rival computer and dump them in their computer. Do I have to manually copy them, or can I go to the console and do some magic?

------------------
Thanks, hopefully I'll be posting often.

(This message has been edited by Vashu (edited 06-02-2003).)

Just thought I'd throw in two cents "just in case" (and for anyone for whom it might be useful info).

When deleting logs at InterNIC, don't delete the initial "Connection from ..." log because when you disconnect a log entry will appear. If the matching connect is missing, then it looks suspicious and "they" will follow it.

And unfortunately, you've got to copy everything by hand. However, the mission is usually (note the usually) only for all the files of one specific type and they are usually also in sequence (e.g. x-y-0, x-y-1, x-y-2, etc.).

I almost copied every file on a system before I scrolled down and saw the sequence. Wanted to smack myself 😉

------------------

Alright, I'll re-read the email to see if they tell which one it is. Thanks.

------------------

I've been wondering about this. What do the boxes around some of your links mean? There are solid, moving dots and none, I saw something on the topic about cracking banks that you should route through all the solid box ones, but what exactly do they mean? Thanks.

------------------

Quote

Originally posted by Vashu:
**I've been wondering about this. What do the boxes around some of your links mean? There are solid, moving dots and none, I saw something on the topic about cracking banks that you should route through all the solid box ones, but what exactly do they mean? Thanks.

**

Solid lines: you have admin access (yeah!)
Doted lines: Client access (okay)
No box: you have no account at. (boo)

------------------

That makes sense. But another question. How do you get admin access on some of the file server computers? Cause all they have is an admin button, no password or anything. And I have admin access at InterNIC, but it's not solid. Is that bad?

------------------

Some servers have no admin account, banks, InterNIC, and file servers for instance and so you will never have an solid line around them. 🙂

------------------
(url="http://"http://uplink.stewsburntmonkey.com")The Uplink Directory(/url)

Ah, okay, thanks.

------------------

I hacked for a few missions, then I realized that I might need to delete the logs. I figured that they may have already begun a passive trace and I would need to delete all logs that were on my second bounce. So I hacked into the Uplink Training system (or whatever it is) and deleted all the logs but the ones for my connection. Is there anything that I'm doing wrong and do I need to delete the logs for that log-removal hack?

EDIT: I'm using log deleter v. 1.0 (all I can afford right now)
------------------
Clones are people two.
If UPS and Fed-Ex merged, would they be Fed-Up?
A man who's out to save Gidolan Keep, flies an Auroran ship, and hacks into computers to keep the bricks from falling past the line of destiny? Yep, that's me!

(This message has been edited by Thunderforge (edited 06-04-2003).)

Well... You need version 4.0, so I suggest accepting missions and asking for half/full pay in advance until you have enough to buy it. Also, if you leave ALL connection logs you must leave ALL disconnect logs.

------------------
CI-I@()s
(url="http://"http://www.evula.org/world-of-cha0s/")The Homepage of Cha0s(/url)

I meant that I deleted all logs but the ones relating to my current visit. And why must I use 4.0? I know that it's the best, but doesn't 1.0 do the same job, but lets them know that theyve been hacked?

------------------
Clones are people two.
If UPS and Fed-Ex merged, would they be Fed-Up?
A man who's out to save Gidolan Keep, flies an Auroran ship, and hacks into computers to keep the bricks from falling past the line of destiny? Yep, that's me!

Yes, but with any version besides 4.0 they can UNdelete the logs (you'll see an undeleter available for purchase in the software section...). Therefore you can still be caught.

------------------
CI-I@()s
(url="http://"http://www.evula.org/world-of-cha0s/")The Homepage of Cha0s(/url)

So what does the undeleter do for you? Do you have any use for it?

------------------
Clones are people two.
If UPS and Fed-Ex merged, would they be Fed-Up?
A man who's out to save Gidolan Keep, flies an Auroran ship, and hacks into computers to keep the bricks from falling past the line of destiny? Yep, that's me!

Got another question. I took on a mission where I'm s'posed to delete everything in this computer. I bounced it through some other links, bounced it through one of their own servers, but then I get a message that says something like "No external connections allowed". What does this mean?

------------------
That is not dead
which can eternal lie
And with strange aeons,
even death may die.

thunderforge--yes, when you are tracing hackers that deleted their logs
vashu- You must have the bouce right before the server their own public acess server

------------------
Going to war without France is like going deer hunting without your accordian.
"You're dumb." -Rawzer to whitedevil and whitedevil2

So I have to bounce it through their public access server? I bounced it though their Internal Services system and it didn't accept it. I'll try their public access server too.

------------------
That is not dead
which can eternal lie
And with strange aeons,
even death may die.

Okay, I bounced my signal through their access terminal, and it still said "Access to this computer is forbidden from external connections to the net" or something. What's up with that?

------------------
That is not dead
which can eternal lie
And with strange aeons,
even death may die.