G: / test> type /?
Display the contents of the text file.
TYPE [Drive:] [PATH] Filename, of course, Type also has other uses g: / test> type mm.exe> AlLeesno.exe
G: / test> Ally Phenoelit (http://www.phenoelit.de/)
USAGE: online: ./vncrack-h target.host.com -w WordList.txt [-opt's] Windows interactive mode: ./vncrack -w Enter Hex Key One Byte Per line - Find IT IN / HKEY_CURRENT_USER / Software / Orl / Winvnc3 / password or /hkey_users/.default/software/orl/winvnc3/password
Options for online mode: -v verbose (repeat -v for more) -p P connect to port P instead of 5900Options for PHoss intercepted challages: -c
G: / test> g: / test> Type Nul> mm.exe
G: / test> DIR mm.exe
G: / test directory
2005-02-07 21:48 AM 0 mm.exe 1 file 0 byte 0 directory 358, 486, 016 available bytes
G: / test>
---------------- I really don't know what this loophole is? If you really invade, you have to rely on this, then you haven't learned your home!