Page 1 of 11 123 ... LastLast
Results 1 to 10 of 101

Thread: Tutorials Forum - Index

  1. #1
    Banned
    Join Date
    Aug 2001
    Location
    Yes
    Posts
    4,424

    Post Tutorials Forum - Index

    This is the Tutorials Forum Index.
    Last edited: April 30, 2004.
    Maintained by Negative.
    Copyright Jupiter Media.

    Only original tutorials are listed.

    On that note, I suggest you read Soulemans Copyright Law and related laws contained in Title 17 of the United States Code-article...

    PM me if I missed something, or if you want to see a post (re)moved.

    AntiOnline-related

    ANTIONLINE FAQ

    Welcome to the new AntiOnline - JP
    Newbies, please read this first - Kapperdog

    Improving the appearance of AO under Linux

    What to avoid while writing a tutorial - TigerShark

    Newbie Questions

    Newbie FAQs

    The Ultimate Newbie FAQ - Ennis

    AO Newbie FAQ - Simon Templer
    Newbie Questions answered I - Uraloony
    Newbie Questions answered II - Uraloony
    Newbie Questions answered III - Uraloony
    Newbie Questions answered IV - Uraloony
    Newbie Questions answered V - Uraloony
    Newbie Questions answered VI - Uraloony
    Miscellaneous FAQs - Remote_Access
    General Computer FAQ - tyger_claw
    Moving on to the next level - Ennis

    Searching the Internet

    Newbies - Search the Net - NetSyn
    Usefull Google tips - Faqt
    Getting the most out of Google - GreekGoddess
    The power of search engines - d00dz Attackin
    Alternative sources of information - d00ds Attackin

    Numbers and Conversions

    Binary, hex and decimal - MsMittens
    Binary and hexadecimal - Epison7
    Binary Numbers extended - Smirc
    Binary Conversions - sargx
    Numbering Systems - Conversions - HTRegz
    Algorithm Efficiencies - Algaen

    Internet Ethics

    Ethics - Ennis
    Flames I - Ennis
    Asking smart questions - PWaring

    Links

    Tutorials: links - Remote_Access_
    General Security and Links - Ennis

    Logical Ports - Badassatchu
    PC Boot processes - rcgreen

    IRC

    Introduction to IRC and AO IRC - MsMittens

    Getting on IRC - valhallen
    Basic IRC commands - Souleman
    Advanced IRC commands - Souleman
    IRC Operator commands - Souleman
    IRC flags - Souleman
    IRC safety - khakisrule
    IRC Administration & Defense - Syini666
    Configuring UnrealIRCD - Jethro

    Hardware

    Building your box

    Building your own box from scratch - allenb1963
    Hardware - Zepherin
    Computers and parts for free or nearly free - lekt0r
    Basic Hardware Troubleshoot - tyger_claw
    Cooling and Noise - basics - VictorKaum

    Processors

    Processors - Gore
    AMD vs. Intel - xmaddness

    BIOS

    BIOS upgrade - Dr_Evil
    BIOS Beep Codes - Dr_Evil

    Power On Self Test - sOnic
    IRQ - IO-adresses - sOnic

    PDA

    How to save PDA data on Battery Switch - tyger_claw
    Upgrade your PDA (RAM) - tyger_claw
    Securing your PDA - tyger_claw

    Wireless

    Wi-Fi and the Law - Negative
    Wireless Linux - Hogfly
    Installing Cisco wireless card on a RH9 laptop - TheHorse13
    Wireless 101 - mmelby
    Antenna theory for wireless networking - jinxy
    General Wardriving - Plastic
    Antenna Theory for Wireless Networking - Jinxy

    Hardware Miscellaneous

    Laser Printers - Er0k
    How to set-up a 2-cluster node clustered server, using Windows 2000 AS - heatwave
    Burning DVD to CD-r - hackophreak56

    Operating Systems

    General

    General - Ennis
    More basics - Ennis
    What OS is right for me? - pooh sun tzu
    Operating System Theory - gore
    FingerPrinting - Chsh
    Memory Organization - Ennis

    Dualbooting

    Dualboot Win9x and RedHat - xmaddness
    Dual Booting RH8.0 and WinXP - Trust_Not_123
    Booting Linux using the Win 2k boot menu - cgkanchi

    DOS - Disk Operating System

    Basics
    Dos commands - ac1dsp3trum
    DOS Basics - Ennis

    Batch-files
    DOS Advanced - Negative
    Batch Programming - ele5125
    DOS batch files - Jethro

    DOS Hacking
    Hacking with DOS - Tedob1
    NetBIOS - RiOtEr

    NetCat
    NetCat Part I - Tedob1
    NetCat Part II - Tedob1
    NetCat Part III - Tedob1
    NetCat Part IV - Tedob1
    NetCat for hacker games - Tedob1

    NetStat
    Netstat - Cheeseball
    Netstat - DeadAddict

    Debug
    Useful DEBUG scripts - AntiHaxor

    Microsoft Windows


    Securing Windows
    Securing a Windows system basics - Krang
    Minimum Security for those new to Securing a Windows OS - moxnix
    Windows XP Security Guide Part I - pooh sun tzu
    Windows XP Security Guide Part II - pooh sun tzu
    Making your Windows PC more Private and Secure - Valhallen
    Local physical security - Rewandythal
    Hardening Windows 2000 - Nebulus2000
    Windows NT security - Maestr0
    Service Pack Integration - noOdle
    Windows data security - nihil
    Securing Windows - aze
    How to really delete a file - slick8790
    How to restore a lost file - Wezper
    Making the Win9x/ME login more secure - el-half
    Stopping pop-ups that use win2k alerter service - breakology
    Dealing with spam - steve.milner
    Windows Forensics - Grinler
    Creating domains in Windows 2000/3 - NeuTron
    Event Logs the Easy Way - Tedob1
    Identifying Rogue Processes using Netstat and the Windows Taskmanager - 57686974656861
    Keeping Windows and Office Updates painless - SDK

    Windows exploits
    Microsoft Exploits - Basics - No0dle
    The Unicode vulnerabilities - sectac
    Fixing the RPC vulnerability - peace_on_earth

    The Windows registry
    Windows Registry - Ennis
    Windows Registry Tweaks - DeadAddict

    Windows keyboard
    Keyboard Shortcuts - amaze
    Keyboard Tricks - Tedob1
    Accents in Windows - White_Eskimo

    Windows Filesystems
    FAT vs NTFS - xmaddness
    NT/2K stability - xmaddness
    NT/2K stability - xmaddness

    Microsoft Internet Explorer
    Internet Explorer and the Hidden Zone - variable_node
    Configuring IE Security Zones - TonyBradley
    Disabling active scripting in IE - TonyBradley

    Microsoft Outlook (Express)
    Filtering out additional spam in Outlook - TheHorse13
    Dealing with spam - steve.milner

    Certification
    CISSP Notes: Security Models: Access Control Models - MsMittens

    Windows Server
    Securing an installation of IIS 4 - ntsa

    Windows Miscellaneous
    Enabling auditing in XP - TonyBradley
    Enabling PPPoE As a Service in Windows XP - HTRegz
    Scripting Internet Connections - ntsa
    Remote DSN Connections, using WinAPIs and the registry - ntsa
    Setting up RADIUS auth on win 2k - thehorse13
    Windows 2000 / XP Reboot - SDK
    The Win2k Command line - breakology

    Windows under the Hood
    Windows programming overview - journy101
    Win32 under the hood - journy101
    Win32 Getting down and dirty - journy101


    *nix

    Basics
    Improving AO's Appearance under Linux - slarty
    Welcome to Linux - Remote_Access_

    Installation
    Linux Installation - MsMittens
    Linux Installation - Rewandythal
    Installing SUSE 8.0 Pro - Gore
    Installing Slackware 9.0 - er0k
    Installing the 2.4.20 kernel - ThePreacher
    Linux kernel compiling - i2c

    Boot Managers
    Configuring LILO - tyger_claw
    Removing LILO - tyger_claw

    *nix file systems
    *nix file systems - tampabay420

    Basic commands
    *nix: Basic Commands - UberCoder
    Linux Basic Commands - brandon64_99
    Linux Navigation for Beginners - er0k
    Linux Navigation Part II - er0k
    Linux BASH - Basic commands - Cyclops07
    cfdisk - er0k

    I. *nix: Basic Commands +
    Addendum - MsMittens
    II. Permissions +
    Addendum - MsMittens
    III. Where am I? - MsMittens

    Monitoring your system - instronics

    Linux Certification
    Linux Professional Institute - Negative
    Linux LPI 101 - Part I - Negative
    Linux LPI 101 - Part II - Negative

    Creating a Linux-distribution
    Creating a Linux distro - Part I - Rewandythal
    Creating a Linux distro - Part II - Rewandythal
    Creating a Linux distro - Part III - Rewandythal
    Creating a Linux distro - Part I to Part IV - Rewandythal

    Troubleshooting
    Linux Rescue - Redhy
    When Linux hangs - doktorf00bar
    Rescue a Linux Machine - redhy

    IPTables
    IPTables - str34m3r
    IPTables NAT - str34m3r

    Mail in Linux
    ProcMail - Intro - roswell1329
    Fetchmail - gore
    Spam filter - problemchild

    nmap
    NMAP 3.48 - Part I - The Basics - thehorse13
    NMAP 3.48 - Part II - More Basics - thehorse13
    NMAP 3.48 - Part III - Common Output - thehorse13
    NMAP 3.48 - Part IV - Stealth Scans - thehorse13
    NMAP 3.48 Part V - Fingerprinting & Scanning - thehorse13
    Using nmap's idle scan - Showtime8000
    nmap: to the search of the open door - Anatra

    *nix Miscellaneous
    Permissions in octal -er0k
    awk - phaza7
    *NIx and vi High Level Overview - dspeidel
    Commonly used packages: FTP, SMTP, Web server - Vorlin
    CHROOT - Chsh
    Creating loadable kernel modules - Linuxcommando
    Apache Group Permissions - chsh
    One Time Passwords Tutorial for SUSE Linux - instronics
    sudo - instronics
    NetBIOS - RiOtEr
    XFree86 And Xinerama Multi-monitor - The_Magistrate
    Getting the most from your hdd with hdparm - str34m3r
    Transparent Proxy and Blocking Sites with Squid - Phat_Penguin
    Signing a certificate request with OpenSSL - thehorse13
    Sign your own certificate with OpenSSL - thehorse13
    Fluxbox - Er0k
    Linux gateway for a private LAN - MrLeachy
    .TGZ Packets - Soul's Ripper
    Installing from source - rewandythal
    Nessus installation on Red Hat - thehorse13
    Connecting to Linux remotely - SSH - steve.milner
    Setting Perms in Linux - thehorse13

    *BSD
    FreeBSD Install - Ratman2

    Networking

    Basics

    Basic Networking - Part I -{P²P}Apocalypse
    Basic Networking - Part II - {P²P}Apocalypse
    Basic Networking - Part III - {P²P}Apocalypse

    Basic Networking - Wizeman
    Building a Home Network - Rewandythal
    Remote and Local Access Explained - n01100110

    Networking Simplified - Part I - er0k
    Networking Simplified - Part II - er0k
    Networking Simplified - Part III - er0k
    Networking Simplified - Part IV - er0k
    Networking Simplified - Part V - er0k
    Networking Simplified - Part VI - er0k
    Networking Simplified - Part VII - er0k
    Networking Simplified - Part VIII - er0k
    Networking Simplified - Part IX - er0k

    Introduction to the net - Part II - The Radical

    Components

    Network Components - Negative
    RJ45 cables - Casper3699
    UTP Cables - cwk9

    Routers vs. Switches - Hot_Ice

    Fiber Optic Networks - .:Shrekkie:.

    PCI Modems - magickal1
    The Hayes Modem Command Set - magickal1
    LinkSys Router Configuration Part I - Ratman2
    LinkSys Router Configuration Part II - Ratman2

    Tools

    Diagnosis Tools and Utils - Instronics

    PING - variable_node
    DNS - sImplEmOrAls
    SAINT - MsMittens
    NetBIOS - Badassatchu
    SSL - proactive
    NetStat - Cheeseball
    TraceRoute - Sp1d3r-W0lf
    Telnet - hollow_man

    Packet Sniffing
    Packet Sniffing - IchNiSan
    Packet Sniffing - No0dle
    Sniffing - meloncholy

    TCP/IP

    OSI
    The OSI-model - Negative

    Basics
    TCP/IP intro - no0dle
    Basic TCP/IP and Networking - Limpster
    General - jparker

    IP Adresses - zxtech
    IP Headers - Guus

    Intro to IPv6 Adressing - variable_node

    Subnetting
    Subnetting - MsMittens
    Subnetting - Mountainman
    Subnet Masks - Terr
    Subnetting without binary - HTRegz

    TCPUtil
    Scripting Internet Connections - ntsa
    Search Engine submission 'exploit' - ntsa
    Google exploit - ntsa
    XE Converter Hack - ntsa
    Cloaked Exploit Scanner I - ntsa
    Cloaked Exploit Scanner II - ntsa

    Networking Miscellaneous
    System Administration - Niboreon.
    POP3 - mark_boyle2002
    POP3 - RogueSpy
    Spoofing - jparker
    Creatin .htaccess files - Jethro
    ArcServeIT - Custy_J
    Veritas BackUp - Custy_J
    Forced shutdown of a remote nt/2k server - ntsa
    Writing a Portscanner - tampabay420
    Footprinting - caffeine20
    Building Reverse SSL Proxy Server - Nebulus200
    Accessing a Cisco router via console using Linux - PuReExcTacy
    Determining the IP range on a host network - breakology
    Ethernet Switching - thread_killer
    Introduction to VLANs - HTRegz

    Programming

    Basics

    Miscellaneous Programming Tutorial Links - HurrayForSchool
    The language of programming - groovicus

    Newbie programmers tips - hollow_man
    Programming Languages - Introduction - Rewandythal
    Basic Program Logic and good programming practices - Zepherin
    Structured, Object Oriented and Visual Programming Languages - hollow_man
    Basic "hello world" programming - mrleachy

    Basic
    QBasic I- Jethro
    QBasic II - Jethro
    BASIC: The basics - ThePreacher
    QBasic intro Part I - slick8790
    QBasic intro Part II - slick8790

    Visual Basic
    VB Part I - Limpster
    Making a Connection & Safely Sending a String All in VisualBasic - JCHostingAdmin
    Re-usable code in VB6 - Quad
    VB: The finishing touch - Tedob1
    Web pages in VB - \/IP3R
    Visual Basic API - Limpster
    Your own chat program - Limpster

    Java(Script)
    JavaScript - Jethro
    JavaScript Objects - chsh
    How to use JavaScript to change pages - Lansing_Banda

    JAVA-Basics - Hot_ice
    JAVA text-editor - Hot_ice
    JAVA - l3aDmOnKeY
    JAVA - h3r3tic
    JAVA Applet - h3r3tic

    C / C++
    C - Chapter I - CGKanchi
    C - Chapter II - CGKanchi
    C - Chapter III - CGKanchi
    C - Chapter IV - CGKanchi

    C++ - Jethro
    High Level C++ - dspeidel
    The C / C++ Preprocessor - White_Eskimo
    Efficient C++ Programming - Gamemaster6502
    Secure C Programming - Evil Enchilada
    A HTTP proxy in C++ - proactive
    Writing to file in C++ - Tedob1
    C++ GUI Programming basics - Proactive
    Win32 Programming Part I - Introduction - Learning20
    Win32 API Programming with C Part II - Learning20
    Intro to file input / output in C++ - White_Eskimo
    Intro to pointers in C / C++ - White_Eskimo

    Assembler
    80x86 Assembly - Cheeseball
    ASM - Cheeseball
    Unassembly - rcgreen
    Using Hex Editor on precompiled Exes - mark_boyle2002

    PHP
    Secure PHP programming for PHP beginners - chsh
    PHP and a database - johnnymier
    PHP/MySQL Logger - Sick Dwarf
    PHP - er0k

    Cobol
    Cobol - Hot_ice

    Delphi
    Delphi Part I - cleanbash

    Python
    Python Introduction Part I - HTRegz
    Python Introduction Part II - HTRegz
    Python Introduction Part III - HTRegz
    Python Socket Programming - Basic Honeypot - HTRegz
    Developing a Port Scanner in Python - HTRegz

    Perl
    Perl regular expressions - ele5125
    Secure Applications in Perl - smirc
    Perl on the Commandlina - roswell1329

    CGI
    CGI Vulnerabilities and how to avoid them - neel

    Miscellaneous
    Prolog - Jabberwocky.
    Basic 3D Programming with QT - Proactive.
    TI-83+ BASIC tutorial - HurrayForSchool

    Dumping SQL-data to a text-file - ntsa

    Security

    Basics

    General Security + links - Ennis
    Complete Newbies Guide to Securing Your Home Computer - Prodikal
    Basic Security Testing - instronics
    Help! I think I've been hacked! - Tonybradley

    Computer Security 101 - Part I - TonyBradley
    Computer Security 101 - Part II - TonyBradley
    Computer Security 101 - Part III - TonyBradley
    Computer Security 101 - Part IV - TonyBradley
    Computer Security 101 - Part V - TonyBradley
    Computer Security 101 - Part VII - TonyBradley
    Computer Security 101 - Part VIII - TonyBradley
    Computer Security 101 - Part IX - TonyBradley
    Computer Security 101 - Part X - TonyBradley

    How do I hack (nearly) any OS? - Catch

    Windows Security
    Securing a Windows system basics - Krang
    Local physical security - Rewandythal
    Hardening Windows 2000 - Nebulus2000
    Protecting yourself from macro exploits - Zigar
    Defensive strategies - nihil
    Countermeasures - nihil

    Firewalling

    Firewall basics - Ennis
    Firewall tutorial - Micael

    IDS - Intrusion Detection Systems

    A Look Into IDS / Snort - qod
    IDS In-Depth / Intro - Plastic
    Network based intrusion detection solutions - The3ntropy
    Introduction to IDS - tonybradley
    AIDE and ARGUS IDS - instronics
    IDS - Anatra
    Network intrusions / Hunting down scriptkiddies - ntsa
    Building your own IDS tripwire - ntsa
    Central Secure Logging win2k - Tiger Shark

    Auditing - Vulnerability Scanning

    Security Auditing - Remote_Access_
    Security Policy - instronics
    Network Vulnerabilities and Countermeasures - Joey_Batch_File
    Introduction to Vulnerability Scanning - tonybradley

    Port Scanning - Packet Sniffing
    Introduction to Port Scanning -tonybradley
    Introduction to Packet Sniffing - tonybradley

    Forensics and Incident Response
    Example Forensics SOP/Procedure - TigerShark
    MicroSoft Metadata Forensics - Soda_Popinksy
    [url=http://www.antionline.com/showthread.php?s=&threadid=251428}Windows Forensics - Where to Look - What to Use - groovicus[/url]
    Pre-Incident Preparation - groovicus
    Incident Response - lessthanzero

    HoneyPots

    General HoneyPot Tutorial - alphabetarian

    Wargames

    Wargames PDF - MsMittens

    Encryption

    Basics - Negative
    Basics - Ennis
    Encryption explained - Noia
    PGP/GPG Security Aspects - KissCool
    GPG On Windows - KissCool
    Cryptography introduction - instronics
    Cryptography links - Angelus
    Public Key Cryptography - hypronix

    Anonymity

    The Proxomitron - Negative
    Tracing - mutt
    Avoid the RIAA - neta1o
    Web Based Proxies - FallenZen

    Wireless Security

    Secure your wireless network - DeadAddict
    Secure your wireless network - sickyourIT

    Malpractice

    Identity Theft
    Identity Theft - Dopeydadwarf
    Identity Theft - Part II - Dopeydadwarf

    Social Engineering
    Social Engineering: The Overview - jdenny
    Social Engineering - Spyrus
    Social Engineering - Whizkid2300
    Classic Social Engineering Attacks - Striek

    Buffer Overflows
    Buffer Overflows - zxtech
    Buffer Overflows - Meloncholy
    Buffer overflow protection - Souleman

    DoS - Denial of Service
    Surviving a DoS - DrToker
    Stop the DoS - Dr Toker
    Understanding DoS - NullDevice

    Malware

    Virii
    Basic Virus Survival - Ennis
    Virii - Anatra
    In-depth MS Blaster - SonOfGalen

    Trojans
    Trojan horse detection and removal Part I - alittlebitnumb
    Trojan horse detection and removal Part II - alittlebitnumb
    Trojans / Backdoors - slarty
    Trojans - Valhallen

    Security Miscellaneous

    PAM - instronics
    Credit Card Security - ntsa
    Insecure Government Computers - Catch
    Building your forensics toolkit - magnoon
    Cisco Password recovery- ComJo
    Layer 2 Switching Attacks and Mitigation - Networker
    Motion detection with a web cam - theuser
    HiJack This Usage - Soda_Popinsky
    The Evils of Default Security - catch

    Web

    HTML

    HTML Basics - Hot_Ice
    HTML - Jethro
    HTML - black_death
    HTML for Newbies - silentstalker
    HTML - DeadAddict
    HTML Tables - Hot_Ice

    Webdesign/-promotion

    Pictures/Photos
    .png-files - LoggOff
    Cleaning up a grainy photo in Photoshop - x acidreign x

    Flash
    Preloader Flash - Valhallen
    Advanced Loader (Flash MX) - valhallen
    Displaying Date/Time in Flash MX - valhallen
    Tooltips Flash MX - valhallen
    Finding the mouse location in Flash - valhallen
    MP3 player using flash(MX) - black_death

    CSS
    CSS - alittlebitnumb

    SWiSH
    SWiSH v2.0 I - Getting Acquainted - GreekGoddess
    SWiSH v2.0 II - The Basics - GreekGoddess
    Swish v2.0 III - Triumph Over Text Transitions

    phpbb
    Installing phpbb on Win XP Pro - h3r3tic

    Security
    Introduction to Web Security - Part I - MsMittens
    Protecting Download Links - Bluebeard96
    Protecting Yourself From Image Theft - GreekGoddess

    Promotion
    Google Secrets Revealed - dj_zeeshan
    Search Engine Optimization Tips - dj_zeeshan
    Promoting your website for free - dj_zeeshan

    E-commerce
    E-commerce - Juridian

    Miscellaneous
    Cookies - er0k
    Website Administration - Jethro

    Miscellaneous

    How to protect children online - tyger_claw
    Installation of a secure webserver - instronics

    Miscellaneous
    Quantum Computing - Wizeman
    Moving a NT4 DHCP Database to Windows 2000 DHCP Database - Spyrus

  2. #2
    Senior Member
    Join Date
    Oct 2001
    Posts
    484
    This definitely needs to stay at the top.
    Why am I still here?

  3. #3
    Senior Member
    Join Date
    Nov 2001
    Posts
    472
    Good job, Negative! This is the page that all newbies should have a link to.
    ---
    proactive

  4. #4
    oblio
    Guest
    pat on the back good post champ

  5. #5
    Senior Member
    Join Date
    Oct 2001
    Posts
    677
    Well done! The tutorials forum really needed an Index before it got too complicated and new users couldn't find old stuff!
    One Ring to rule them all, One Ring to find them.
    One Ring to bring them all and in the darkness bind them.
    (The Lord Of The Rings)
    http://www.bytekill.net

  6. #6

    Lightbulb Wow

    Great idea, I FINALY have a single place to direct numskulls (and a few others) to to learn stuff. Pure genius!

  7. #7
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323

    Talking

    Agreed. This is one that Perhaps JP could leave under the Tutorial intro that Negative or someone could edit regularly with a link to new tutorials as added.

    That said, what other tutorials can be added? (Umm.. and no, not how to hack hotmail). I won't be able to do any programming ones (I SUCK at programming and am still teaching myself) but others might be able to do some or point some links. Off the top of my muddled brain:

    - a look at processors (heh, this comes to mind since I will be getting into microcomponents next term) and other hardware components that might be helpful when setting up a software firewall
    - IPv6 and its effect or non-effect on hacking (both white hat and black hat)
    - creating a simple security policy
    - a look at how to protect a company from social engineering
    - the cycle of network security (planning, preparing, policy, practise)
    - network setups: where to put the firewall, honeypots and other goodies on your network
    - how to setup a honeypot
    - a look at NMAP and what it does

    Hrmm... That's all that came to mind (bit of a brain dump). What do you think should be here?
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  8. #8
    Senior Member
    Join Date
    Jul 2001
    Posts
    461
    Thanks Negative...

    That will be a big help.

  9. #9
    Senior Member
    Join Date
    Oct 2001
    Posts
    677
    I'm working on a Zone Alarm Pro setup & configuration tutorial at the moment, will upload it as soon as its done!!!
    One Ring to rule them all, One Ring to find them.
    One Ring to bring them all and in the darkness bind them.
    (The Lord Of The Rings)
    http://www.bytekill.net

  10. #10
    Junior Member
    Join Date
    Nov 2001
    Posts
    17

    Talking

    Thx much Negative.

    You just gave me a good reason not to be boored during my free days

    Makes me feel happy to see there are still people out there ready to help others.

    Let me know if I can be of any assistance one day (after having understood and memorized all of this info).
    Maybe I could buy you some Belgian Fries

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •