textfiles/phreak/thief35.txt
2021-04-15 13:31:59 -05:00

492 lines
31 KiB
Plaintext

=======================================================================
C o d e T h i e f D e l u x e
R e v i s i o n 3 . 5 D o c u m e n t a t i o n
B y B r e w A s s o c i a t e s
A N O F F I C I A L P H O R T U N E 5 0 0 P R O D U C T
=======================================================================
-> Introduction To Code Thief Deluxe 3.5 <-
Well, here it finally is. Code Thief Deluxe 3.5. If you are new to
Code Thief, this is the file to read. If you are already familiar with
Code ÿThief, ÿespecially if you have Code Thief 3.0 ÿalready, ÿyou ÿcan
check ÿout just the new additions and updates to Code Thief ÿDeluxe ÿby
reading DELUXE.DOC, included in your Code Thief Deluxe ZIPfile.
As an incentive to read the documentation, ÿI ÿhave tried to lay out
all ÿof the 'little things' ÿabout the program and its behavior. ÿThis
will ÿhelp you understand more. ÿAlso notice that Code Thief does ÿnot
make any direct screen writes. ÿAll screen access is done through ÿthe
BIOS. ÿIts fast enough as it is, and shouldn't a hacker be able to run
in ÿthe BACKGROUND so you can do something else? ÿAs I am writing this
documentation I am in DesqView, with Code Thief running concurrently in
another window.
-> Disclaimer <-
There ÿis ÿno disclaimer. ÿCode Thief was written with ÿthe ÿintent
purpose of committing the crime of 'theft of services'. ÿOf course you
don't have to use it, ÿbut then again, ÿdo you have all of the money in
the ÿworld ÿat your disposal to pay for calling out of ÿstate ÿbulletin
boards plus the mainframes/mini computers that you are trying to hack?
-> From The Author <-
A LOT of work has gone into the Code Thief project, especially
revision 2.x/3.x of the program. ÿIf you support the program then be
sure to upload it to any and all of your favorite boards. It's a great
way ÿto increase your file points and ratio while helping ÿyour ÿfellow
long distance 'users'.
-> An Official Phortune 500 Product <-
My thanks to the Phortune 500 ÿBoard of Directors, ÿand the Phortune
500 membership. The Phortune 500 Board of Directors as of now consists
of: ÿÿBrew Associates (author of Code Thief), ÿRenegade Chemist, ÿAahz,
Quinton J. ÿMiranda, The Spiker, Striker, Red Knight, Major Havoc, ÿand
Lord Lawless.
-> Starting The Program <-
To start the program normally, enter THIEF from DOS. You can also
enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code
Thief will automatically hack the flagged multiple extenders with
multiple targets until the time specified, then drop back out to DOS.
This is great for a BBS's batch file. For instance, you can have your
BBS invoke a batch file at a certain time. This batch file could say
something like THIEF 5:30. This will invoke multiple target/multiple
extender hacking until 5:30 am. Note that all times are in 24 hour
mode. Also, if no multiple targets are found the defaults are
automatically used. This modification is on the request of an Opus BBS
sysop. Hope it comes in handy.
IF THE PROGRAM IS STARTED NORMALLY
When you first start the program you will see the main option menu.
At this and any menu you can use the up and down arrow keys to move the
highlight over an option and press RETURN or the SPACEBAR to finally
choose the option. I will try to move you through the running of the
program to get it working on your machine so it is suggested that you
print this documentation out and work the actual program as you read
it.
-> Setting Your Modem Paramaters <-
The first thing you will probably want to do is set your modem
paramaters. Use the up and down arrow keys to move the highlight over
option "H" on the main option menu then hit CR or RETURN, or just hit
"H" then CR or RETURN. You will be greeted with three more options.
First choose "Modem Specifics". This is where you can set the
paramaters for your particular modem. If a default doesn't match your
configuration then use the up and down arrow keys to move the highlight
over the option then hit RETURN or SPACE. The highlight will disappear
and ÿyou ÿcan make an entry. ÿIf it is a number or some ÿother ÿfield,
enter the new value to use. ÿIf it is some kind of a toggle, ÿuse your
left ÿand right arrow keys until what you want comes into view. ÿPress
RETURN when you are satisfied with your choice.
MODEM SPECIFICS
COM Port - This can be eighter COM1: COM2:, COM3: Or COM4:. ÿUse
the left and right arrow keys to select Port 1, ÿPort
2, Port 3, Port 4. Then hit RETURN.
Baud ÿRate - Enter the baud rate to open the ÿmodem ÿat ÿwhenever
hacking ÿor ÿscanning is performed. ÿYour choices are
300 ÿBaud, ÿ1200 Baud, ÿand 2400 ÿBaud. ÿThe left and
right ÿarrow keys move you through the choices. ÿÿHit
RETURN when you are satisfied.
PBX Mode - Choices are Yes and No. The left and right arrow keys
moves you ÿthrough the choices and RETURN selects. If
you ÿare ÿin ÿa ÿbuilding with a PBX then you have ÿto
enter Yes for this option.
PBX Digit - This ÿis the PBX digit. ÿWhen you are in a ÿbuilding
with ÿa PBX installed a certain digit has to be dialed
to receive an outside line. ÿIf PBX mode is No, ÿthen
N/A will appear for Not Applicable. ÿTrying to change
this with PBX mode to No will cause it to beep at you.
PBX Delay - This ÿis the number of seconds after entering the ÿPBX
digit ÿto wait for the outside line. ÿN/A if PBX Mode
is No.
Local Dialing - Not everyone has Touchtone (tm) ÿÿdialing ÿfrom ÿtheir
home. If you don't change this to Pulse. Just select
it with the highlight, ÿhit return, ÿthen use the left
or ÿright ÿarrow ÿkey ÿto select the ÿnew ÿoption ÿand
another return will make it permanent.
Speaker On - Choose ÿYes to keep the speaker on during hacking ÿand
scanning or No to keep it off.
Dial Tone Wait - This ÿis ÿthe number of seconds the modem is ÿto ÿwait
after picking up the line until starting to dial. ÿIt
does this through the Hayes (and compatibles) ÿcommand
registers.
Carrier Detect - This is the number of 1/10 seconds that a carrier must
be present for the modem to detect it as valid. ÿThis
defeats some LD ÿservice's ÿfake-carrier routines that
send ÿa ÿfake ÿcarrier ÿfor a short ÿperiod ÿof ÿtime.
Remember ÿthat ÿREAL carriers are ÿsent for ÿa ÿlonger
period ÿof time than fake carriers. ÿExperiment ÿwith
this one.
Dialing Speed - This is the speed of the touchtone dialer. This is in
1/100 of a second. ÿThis number can range from 50-255
(at least with the modem I use).
User String - If there is something entered here then it is sent out
to the modem. If you have an advanced modem, then set
it to "ATX6" ÿto enable your extended result codes for
such ÿthings ÿas VOICE, ÿetc. ÿYou can over-ride ÿthe
"Speaker ÿOn" ÿÿsetting by making this "ATM1". ÿÿThat
would be stupid, but it's just an example.
MODEM RESULT CODES
In this section you enter the result codes that your modem uses when
in non-verbose mode. Note that the defaults should suffice. If you
have ÿa ÿstrange ÿmodem configuration you can change ÿthese. ÿÿNumbers
aren't the only thing allowed here, ÿyou can enter symbols like ";" ÿor
":", or etc. Someone had a strange "Hayes Compatible" modem and wanted
this capability. I aim to please.
-> Edit Extender Configurations <-
The next thing you will want to do is create configurations for the
different extenders you wish to hack. Choose "Edit Extender
Configurations" ÿÿafter you exit back to the main options menu. ÿIf no
EXTENDER.DAT ÿfile ÿexists, ÿone will be created for you with ÿa ÿdummy
initial record (you will want to change this of course, ÿ1-800-000-0000
is ÿnot ÿa valid extender). ÿIf you haven't screwed anything up, ÿÿyou
should ÿnow see the first record of the sample EXTENDER.DAT I ÿincluded
in the Code Thief archive file. ÿThese are just some 800 ÿextenders to
get you started. Note that you might want to change some delays, ÿetc,
to work for you. As they are now they work for ME. Your case might be
different. Experiment. ÿHitting [A] will ADD AN EXTENDER to the file.
Hitting ÿ[E] ÿwill ÿEDIT the current extender (there's ÿthat ÿhighlight
again!). ÿHitting ÿ[D] ÿwill ÿprompt you to confirm the ÿDELETE of the
extender ÿrecord. ÿÿHitting [Q] will quit the ÿextender ÿeditor. ÿÿTo
understand ÿall ÿof the fields for the individual extender, ÿÿlet's ÿgo
through ÿthe process of ADDING an extender. ÿYou will notice that Code
Thief is an extremely complex code hacker. But also note that there is
so ÿmuch flexibility that you will be able to hack just about ÿanything
that is out there, no matter what kind of format it is.
ADD AN EXTENDER
When you choose to ADD an extender you will be given the opportunity to
enter ÿthe ÿcomplete ÿconfiguration for the extender. ÿÿThe ÿfirst
thing is the telephone number of the extender. ÿAfter that is a short
note ÿused ÿto identify the extender. ÿNote ÿthat ÿthroughout ÿthe
program ÿin ÿvarious ÿsections extenders are refered to by ÿthis ÿshort
note, so make sure it is something you can easily recall. ÿYou can
make ÿit the number of the extender if you wish. ÿAnything goes ÿhere,
but the program will beep at you if you try to leave it blank. Next is
the length of the codes. ÿFor METRO it is 6, ÿMCI calling cards it ÿis
14, ÿetc. ÿNo code lengths of ÿ0 are allowed (it will beep). Next is
the code template. ÿThis idea is borrowed from Fuckin' ÿHacker ÿfrom
2af because I think it ÿis ÿa very powerfull feature. ÿIf this is
used it completely over-rides the code length, hacking mode, ÿstarting
code, and sequential increment in your configuration. Anyway, here you
are to construct a "template" for your codes. For instance, entering
"444XXX" will make every code 6 digits and starting in 444. Entering
"0X1X2X" ÿwill make set the first, ÿthird, ÿand fifth numbers in every
code ÿto 0,1, ÿand 2 respectively and the second, ÿfourth, ÿÿand ÿsixth
number in each code will be totally random. Commas are also allowed in
the code template and will cause the modem to pause for 2 seconds. For
instance, XXXX,9 will cause a random 4 number code to be sent, a pause
for 2 seconds, then a 9 will be sent. This is good for hacking PBX's
that require a code be sent then need a number for an outside line.
Leave ÿthe code template blank if you don't wish to use it. ÿÿNext ÿyou
will ÿenter the code delay. ÿThis is the number of seconds to ÿdelay
before sending the code. Then you will enter the target delay. ÿThis
is ÿthe ÿnumber ÿof seconds to wait until entering the ÿtarget ÿnumber.
Notice that also in the config is an option to put the code first or
not. If the code is sent first then the Code Delay should be the
number of seconds to wait after dialing the extender until the code is
sent after the extender answers and provides a dial tone. If the code
is not sent first then the target number will be sent first. The
target delay should be the number of seconds to wait after dialing the
extender until the target is sent at the extender's dialtone. Then the
code delay is the number of seconds to wait until sending the code
AFTER the target number is sent. The timeout is next. This is the
number of seconds to wait for your TARGET number to answer. If it
doesn't ÿanswer ÿwithin ÿthis time the code ÿis ÿconsidered ÿinvalid.
Basically, the target delay tells the modem how long to wait. When the
modem times out it tells Code Thief, and Code Thief moves on. Now enter
a default Target number. ÿThis is a number that always answers with ÿa
modem ÿ(is ÿnever busy). ÿTelenet is perfect for this (so ÿenter ÿyour
local ÿTelenet ÿnumber). ÿÿNote that Code Thief can ÿalso ÿuse ÿrandom
multiple ÿtargets ÿ- this is covered in the MULTIPLE TARGET ÿCONVERSION
UTILITIES ÿthat has been included as a Code Thief companion program ÿin
your ÿCode ÿThief ÿARChive. ÿRead CONVERT.DOC ÿfor ÿinformation ÿabout
targets and multiple ÿtargets ÿat that. ÿNext is the hacking mode. Use
your ÿleft and right arrow keys to move through the selections and ÿhit
RETURN when you are satisfied. ÿYou can have Random codes, ÿSequential
codes, ÿor Both ÿ- ÿsequential ÿcodes ÿwith a random increment. If you
choose ÿSequential or Both you are now prompted for the starting ÿcode,
otherwise this value is set to N/A. ÿNext ÿyou enter the sequential
increment only if Sequential hacking is chosen. ÿIf sequential hacking
is chosen then this is the number to increment ÿeach code by. ÿIf Both
is ÿchosen, ÿÿthen this number is random in the range ÿof ÿ1-100 ÿÿwhen
hacking. ÿÿIf ÿBoth or Random hacking is your chosen method ÿthen ÿthe
Sequential ÿIncrement is N/A. Note that the sequential increment is an
integer, therefore any value from 1 to 32767 is valid. If "Sequential"
hacking or "Both" ÿhacking is chosen and the increment ever exceeds the
code length, ÿonly the length of the code up to the code length will be
used. ÿÿFor example, ÿwith a code length of 4 and an starting code ÿof
9999, ÿif an increment of 1 is made your next code will be 1000. ÿÿNow
you ÿwill be prompted as to if ÿthe code should be entered first. ÿUse
the left and right arrow keys to select Yes or No. ÿIf you choose Yes,
then ÿthe code will be sent first. ÿChoose No and the target ÿwill ÿbe
sent first. Next is the target prefix digit. ÿThis is a number to add
to the beginning of the target number. ÿFor example, ÿfor the MCI
calling card service ÿyou ÿenter the target first and prefix it with ÿa
"0". ITT requires that the target be sent first and be prefixed by
a ÿ"1". ÿÿOther ÿservices require that the CODE is sent first and ÿthe
target ÿhas NO prefix. Next is the multiple extender flag. ÿIf
Yes then the extender will ÿbe ÿflagged immediately as one to be used
when Multiple Extender hacking is chosen. If you choose No, ÿthen this
extender will be put on reserve. More on this comes later. Next is
multiple port mode. ÿÿSay the ÿextender number is 950-1000 ÿand the
extender ÿhas ÿmultiple ÿport hunt groups from 950-1000 ÿÿto ÿ950-2000.
Choosing Yes to multiple ÿport mode will prompt you for the ending hunt
number (in ÿmy example it's 2000). ÿNow Code Thief will randomly ÿpick
950-1000 ÿÿto ÿ950-2000 ÿwhenever it dials the extender. ÿÿEnding ÿHunt
numbers ÿMUST be four digits ÿlong ÿ(that should be ÿself-explanatory).
Note ÿthat ÿif ÿyour extender ÿis 1-800-555-0000 ÿand your Ending ÿHunt
Number is 0099 ÿCode Thief ÿwon't ÿscrew up by dialing 1-800-555-99 ÿor
whatever number is chosen. It will properly dial 1-800-555-0099 (or 1-
800-555-0050 or 1-800-555-0026, ÿetc, ÿetc, ÿetc). Next you will enter
the filename to place valid codes in. ÿValid codes are logged with the
time and date for convienence. ÿAll valid code ÿfiles ÿend with the
".COD" extention. ÿWhen finished ÿentering all extender information
it is saved to the EXTENDER.DAT file.
OTHER EXTENDER EDITOR COMMANDS
To ÿnavigate through the configurations use the LEFT and RIGHT ÿarrow
keys. ÿÿTo ÿflag ÿan extender for deletion enter "D". ÿÿYou ÿwill ÿbe
prompted to enter "Y" ÿif you are sure or "N" if you are not. ÿOnce
an extender has been flagged for deletion it will be skipped over ÿwhen
you ÿuse ÿthe left and right arrow keys. ÿHit "Q" ÿto quit ÿthis
section. When you hit "Q" all extenders flagged for deletion are
physically deleted. Another nice feature in this section is the
ability to edit extenders. Hit "E" to choose edit. The highlight will
appear. You can use the left, right, up, and down arrow keys to
navigate the hightlight over the option you wish to change. Then hit
RETURN or SPACE to enter a new value. When finished entering a new
value (either by the keyboard or left and right arrow keys) ÿhit RETURN
and ÿthe ÿhighlight will re-appear so that you may move it over ÿnew
things to edit. ÿWhen finished editing hit "Q" ÿwhen the highlight is
present. Note that everything in the configuration is described in
the ÿprevious paragraph. ÿTo choose a particular ÿextender ÿby ÿrecord
number, ÿjust enter the number. ÿYou can't ÿsee ÿextenders flagged for
deletion (it will not go to them).
One ÿmore thing on deletion extender configurations. ÿIf in the course
of ÿusing this section you delete ALL of your extender ÿconfigurations,
the program will not have any configurations left to go to and it ÿwill
automatically ÿquit this section deleting the entire EXTENDER.DAT file.
When ÿchoosing ÿthis section again, ÿa ÿnew EXTENDER.DAT with ÿa ÿdummy
record will be created.
-> Edit The Multiple Target File <-
Navigate back to the main menu. Choose "Edit The Multiple Target
File". You will then be shown the current multiple target file. Now
you can either hit "1" to add to it, "2" to delete entries from it or
"3" to quit. Everything here is self-explanatory. A multiple target
file is provided with the program. It is kept in ASCII file format for
easy editing with your word processor, ÿif you wish. ÿUse the MULTIPLE
TARGET CONVERSION UTILITIES in your Code Thief ARChive to get quick and
painless ÿupdates of your multiple target MTARG.DAT file off Telenet or
even ÿÿTymnet ÿat ÿregular ÿintervals. ÿÿCode ÿThief ÿis ÿa ÿÿcomplete
professional system that will solve all your hacking needs.
-> Flag Extenders For Hacking Mode <-
Exit ÿto the main menu and choose "Flag Extenders For Hacking Mode".
This is the option to choose to change the flags on extenders. If it
is flagged then it will be one of the extenders used when multiple
extender hacking is chosen. The extenders will be shown, ÿeight to a
page. A "+" in front of the extender means it will be included when
multiple extender hacking is chosen, otherwise it will not. This
option is included because some people don't want to hack all of the
extenders they have configurations for. Editing an extender and
changing the multiple extender flag does the same thing, but this is
easier. If there are more than eight extenders then they will take up
more than one page. You can flip through the pages by choosing "Jump
To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE
when the highlight is over an extener toggles the flag.
-> Deluxe Exchange Scanner <-
Navigate ÿback ÿto the main menu and choose "Deluxe ÿExchange
Scanner". ÿÿThe ÿCode Thief Deluxe exchange scanner is a ÿfull ÿscreen
exchange ÿscanner that can scan multiple exchanges from a database that
you ÿcan ÿconfigure. ÿWhen you choose this option if no exchanges ÿare
defined, a dummy first record will be created for you. ÿNow hit [R] to
replace this record and enter an exchange to scan, ÿthe starting number
in the exchange, then the ending number. To flag the exchange just hit
[+] ÿnext. ÿUnflagging is done by hitting [-]. ÿNote that to scan you
must ÿhave at lease one flagged exchange. ÿYou can't scan nothing ÿcan
you? ÿÿÿThe ÿexchange ÿeditor ÿis ÿa ÿlot ÿlike ÿthe ÿ"Edit ÿÿExtender
Configurations" section. To jump to a particular exchange, ÿjust enter
the ÿnumber. ÿTo move through the exchanges record by record ÿuse ÿthe
left and right arrow keys coresponding to the direction in the file you
wish ÿto ÿmove. ÿUse [A] to add an exchange. ÿUse [D] ÿto ÿdelete ÿan
exchange ÿfrom the database. ÿUse the [SPACEBAR] to toggle weather ÿor
not a particular exchange is in the toll free 1-800 area. ÿHitting [Q]
will quit the exchange scanner section, ÿbut to start scanning hit ÿ[G]
for ÿGo. ÿYou will be asked the timeout (number of seconds a ÿcomputer
should ÿanswer ÿin). ÿÿThen ÿCode Thief will check ÿto ÿsee ÿhow ÿmany
exchanges are flagged. When scanning and Code Thief reaches the ending
number ÿin ÿan ÿexchange, ÿthe exchange will be unflagged. ÿÿWhen ÿall
flagged ÿexchanges ÿare changed to unflagged (all ÿexchanges ÿare ÿdone
being ÿscanned in the limits you specified in the configuration) ÿÿCode
Thief will quit the exchange scanner.
THE ACTUAL EXCHANGE SCANNER
This ÿis ÿa ÿfull screen exchange scanner ala the movie ÿWarGames ÿ(the
movie ÿsucked ÿby the way) ÿand it will show each of the ÿnumbers
dialed. ÿÿNumbers where computers are detected are shown BLINKING. If
the modem does not detect ÿa dial tone when trying to dial (receives
the no ÿdial ÿtone result code) it retrys the line. After 5 retries it
exits the exchange scanner. If the modem sends a BUSY result code that
is ÿlogged ÿto the CARRIERS.TXT ÿdisk ÿfile along with ÿnumbers ÿthat
produced a CONNECT result code of any baud. It will specifically log
it as ÿa BUSY number or a number that the modem CONNECTed to. ÿYou can
then ÿconsult ÿthe log and dial these numbers back manually if you wish
to ensure that the numbers listed as busy aren't important. When the
screen fills up, Code Thief goes back to the beginning.
-> View/Delete Code Files <-
When you choose this option from the main option menu the disk will
be searched for files with a .COD extention. If there are any they
will be displayed. If there are no files with a .COD extention that
will be displayed also. You have the option of viewing one of these
files or deleting one. If you view one it will be one screen at a time
so nothing scrolls past you. Note that the time and date the code was
found is logged for your convienence.
-> View/Delete Carrier File <-
This option is also on the main option menu. All carriers found
when using the exchange scanner are logged to a file called
CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result
code. When viewing the file it will be showed one screen at a time so
nothing scrolls past you. You can also delete the file. Note that the
time and date the number was found is logged for your convienence.
-> Start Hacking <-
After you choose this option you will be prompted as to weather you
want to do Single Extender/Single Target Hacking, Single
Extender/Multiple Target Hacking, Multiple Extender/Single Target
Hacking, Or Multiple Extender/Multiple Target Hacking. ÿIf you choose
multiple target hacking of any kind the targets will be read into
memory before hacking begins to cut down greatly on disk access time.
If single extender hacking is chosen you will be prompted for the
extender to hack. Use the arrow keys to highlight the extender you
want then press RETURN or SPACE. If there is more than one page of
extenders then highlight "Jump To Previous Page" and "Jump To Next
Page" to navigate around the list.
WHEN HACKING BEGINS
You will be shown the complete statistics for every extender. Also
shown ÿis the number of codes found, ÿthe last code found as ÿwell ÿas
the number of codes found for that extender plus other statistics
for the current hacking run for each extender. The number of extenders
you ÿcan have at any time is limited only to disk space, ÿof ÿcourse.
Multiple ÿtargets are limited to 500. ÿThis is, ÿI ÿthink, ÿmore than
enough. If you chose to quit hacking at a certain time, that time will
be displayed on the screen as a reminder. ÿHit ESCape to quit ÿhacking
at any time. If you forgot to configure your modem and it is connected
to ÿCOM2 ÿÿ(the default is COM1) ÿthen Code ÿThief ÿwill ÿautomatically
recognize that ÿsomething is wrong and exit the exchange scanner. ÿYou
can ÿalso ÿhit the SPACEBAR to skip to the next ÿcode. ÿIf you have ÿa
picky modem like mine, only use the ESCape key or the SPACEbar when the
modem is not sending any DTMF to the line. ÿBut if you DO screw up the
modem Code Thief will know and will make the attempt to recover.
POSIBILITIES DURING HACKING
Many things can happen during hacking. For instance, if the modem
connects the code and extender is logged to it's respective disk file.
If the modem sends an ERROR result code the current attempt is retryed
again. If NO DIAL TONE is detected by the modem the current attempt is
retryed. ÿÿIf NO CARRIER or VOICE is detected by the modem the program
moves on. ÿThe maximum number of retrys that can ever be done in a
row ÿis five. ÿOh, ÿif the modem sends a RINGING result code that ÿis
also ÿshown ÿto the user while the modem waits to timeout or ÿconnect.
Ringing ÿdoes ÿnothing ÿbut just display "Ringing...". ÿIf ÿthe ÿmodem
receives a busy signal it goes on to another attempt. I origionally
planned ÿon ÿmaking ÿit ÿretry ÿthe code but ÿI ÿremembered ÿthat ÿsome
extenders ÿsend ÿa re-order which is a fast busy signal that ÿcan ÿbe
detected by the modem and send a BUSY result code.
-> Closing Notes <-
I hope you understood this new documentation. Im not really a good
writer, ÿso if you have any questions leave me a note on any board I
happen to be on ÿand ÿI ÿwill ÿtry to answer it. ÿI hope you like Code
Thief and find it usefull as I put a LOT of hours and hard work into it
until I was satisfied. If anything goes wrong with the program on your
machine, or anything else in general then leave me a note. I will try
to diagnose the problem and stamp it out.
COMMUNICATIONS ADDRESSES AND INTERRUPTS
Here ÿare the communications address and interrupts that Code ÿThief
uses to access the communications ports. ÿCOM1: and COM2: ÿare correct
for ÿ100% ÿÿof the applications. ÿCOM3: ÿand COM4: ÿas defined by ÿthe
program will be correct 99% of the time. If you have a COM3: modem and
Code Thief set at Port 3 doesn't work with it then change your modem to
COM1: ÿÿor COM2: ÿif possible. ÿIf you really need YOUR communications
addresses and interrupts for COM3: ÿand COM4: ÿleave me a note with the
correct ÿinformation on any board I am on and I will try to get ÿyou ÿa
new ÿTHIEF.COM ÿand ÿTHIEF.000. ÿÿBut ÿnote ÿthat ÿthe ÿaddresses ÿand
interrupts ÿused for COM3: and COM4: are going to be correct more times
than not.
Address Interrupt Address Interrupt
------- --------- ------- ---------
COM1: 3F8 IRQ4 COM3: 3E8 IRQ4
COM2: 2F8 IRQ3 COM4: 2E8 IRQ3
F i l e s S u p p l i e d W i t h C o d e T h i e f 3 . 5
Make ÿsure that these are the files you received in your ZIPfile ÿof
Code Thief revision 3.5. If these are not the files then what you got
is ÿsomething that someone else re-ZIPed and forgot ÿto ÿinclude
something in. I ask that you only distribute the origional ZIPfile
because people have confused themselves in the past.
THIEF35.DOC - Code Thief Deluxe v3.5 documentation
DELUXE.DOC - What's new since Code Thief 3.0?
THIEF.COM - Code Thief 3.5 - The actual program
THIEF.000 - Primary ÿCode ÿThief ÿoverlay. ÿÿMust be ÿin ÿthe ÿsame
directory ÿas ÿTHIEF.COM and you must be logged to ÿthat
directory
MTARG.DAT - Code ÿThief ÿmultiple target file - use Multiple ÿTarget
Conversion Utilities to make your own also
EXTENDER.DAT - Sample 1-800 extender file to get you started
MULTIPLE TARGET CONVERSION UTILITIES
A CODE THIEF 3.5 COMPANION PROGRAM
(be sure to read CONVERT.DOC to understand this)
CONVERT.COM - Multiple Target Conversion Utilities - The program
CONVERT.DOC - Multiple Target Conversion Utilities - The documentation
TELENET.LST - Sample file off Telenet to get you started
TYMNET.LST - Sample file off Tymnet to get you started
TYMFIX.COM - You must run TYMFIX to make TYMNET.LST into ÿTYMNET.FIX.
Only TYMNET.FIX ÿwill ÿwork ÿwith ÿthe ÿMultiple ÿTarget
Conversion ÿUtilities. ÿÿAlso use TYMFIX.COM to fix the
listings you ascii-download off Tymnet.