Autohack


SUBMITTED BY: czzylle

DATE: May 27, 2016, 6:55 a.m.

FORMAT: Text only

SIZE: 4.5 kB

HITS: 217

  1. First, a general overview of AutoHack. It contains two basic programs in
  2. one. A Scanner, which will scan through a set range of numbers and check for
  3. carriers, and a Hacker, which will "hack" through codes on a given Long
  4. Distance service, such as MCI, Sprint, Metrophone, or Allnet.
  5. =================
  6. Hacking Section
  7. =================
  8. The hacking section options consist of two subchoices, Begin, and Reconfigure.
  9. We will start with Reconfigure.
  10. Reconfigure allows you to change virtually every parameter in AutoHack Hacking
  11. Section. Here is a brief explaination of all of them.
  12. COM port.............The COM port that your modem is in. Can only be 1 or 2
  13. Hack port............The telephone number of the Long Distance service you wish
  14. to hack on.
  15. Start code...........The code to start hacking with.
  16. Increment............Allows you to set it to add a certain number to the code
  17. to try each time. If 0 is selected, it will be a totally
  18. random code, and if 99 is selected it will increment the
  19. code with a random number between 1 and 10.
  20. Time.................The number of minutes you want the hacker to run
  21. Opening delay........The number of seconds you want to wait after the Hack
  22. port is dialed, before the code/number is dialed.
  23. Wait carrier delay...The number of seconds you want to wait for a carrier after
  24. the dialing process begins (includes dialing time)
  25. Length of code.......The number of digits in the code
  26. Number of carrier....A telephone number to try that ALWAYS gives a carrier.
  27. It is a good idea to use one out of your own free-calling
  28. area
  29. When you have reconfigured it to your needs, hit [Q] [RETURN] to quit. This
  30. will save the configuration so you will not need to reconfigure again the next
  31. time you run AutoHack.
  32. Now, you select "Begin Hacking" from the Hacking menu, and the process will
  33. begin. If you wish to stop the hacker completely, hit [X]. If you wish to
  34. hide the screen, press [H]. Hiding the screen will put a fake screen over top
  35. with the words " The Genius Compiler " on the screen, and false compiling
  36. messages on the screen. When the hack is finished, if the screen is still
  37. hidded, it will display some status. The status "Error:" is the number of
  38. working codes you have gotten. Pressing any key will return to the main
  39. Hack menu.
  40. If you are in "Hide" mode, [H] will return you to the normal screen, and [X]
  41. will still quit.
  42. ==================
  43. Scanning section
  44. ==================
  45. The Scanner also has a reconfigure screen. These are the options it has:
  46. LD Prefix.......The Long Distance prefix to dial before dialing the number to
  47. check for carrier. This allows you to Scan a long distance
  48. area with MCI, Sprint, Metro, or another service, rather than
  49. paying with AT & T. To Scan numbers within your free-calling
  50. area, type [/] at the prompt to change it and it will become
  51. blank.
  52. Area code.......This is the area code of the numbers to be Scanned. If the
  53. LD Prefix is blank, however, this is ignored.
  54. Prefix..........This is the three digit prefix to the numbers to be Scanned.
  55. Start number....This is the first of the four digit numbers to be scanned.
  56. (xxx/xxx-nnnn <- nnnn represents the start number)
  57. End number......This is the last number to be Scanned (see Start number)
  58. Delay...........This is the number of seconds to wait for a carrier at a given
  59. Scanned number.
  60. When you are finished, press [Q] [RETURN]. Notice that these options, too,
  61. are saved so they do not need to be configured each time.
  62. When you begin, it will scan the numbers you have specified. You may press [X]
  63. to abort. Since this is not an illegal activity, I have found no reason to
  64. put the Hide Screen option in this section.
  65. =====================
  66. Reading the results
  67. =====================
  68. When a Hack or a Scan is finished, the results will be in a file on the disk
  69. called "Codes.Dat" (for the Hacker) or "Scanner.Dat" (for the Scanner). These
  70. files may then be printed out or just "Typed" on the screen from DOS.
  71. NOTE: Be sure to print these files, or rename them, before beginning another
  72. Hack or Scan, otherwise they will be overwritten.. I.E.. Poof!
  73. ===========
  74. That's it
  75. ===========

comments powered by Disqus