Categories
Adventist Dating real singles site

Steps to make a talk place (With Notepad)

Steps to make a talk place (With Notepad)

Introduction: steps to make a speak place (With Notepad)

This Instructable shows you how to produce a speak area together with the complimentary microsoft windows registration called Notepad. This program was not copied and pasted, it actually was produced from scrape, possible copy and paste it (if you fail to need find out the code). Exactly what did I generate? We produced a chat space with notepad, i recently utilized my computers. Just how did we make it? l review some training, as well as times I established knowledge for you to write numerous various operable batch documents. We produced all of this by my self (with a bit of assistance from “Prof. Pickle”), the “plans” are always changing I hold adding additional parts to it. it is exactly what I like about programs, you can just hold altering they and evolving it. In which do you get this? I made this within my quarters. (I didn’t want to get any brand new personal computers, I did not must at home). What did you read? a€‹I discovered much more requirements and directions, i will be establishing and progressing during my interest. Im simply proud of the truth that i produced this all by myself, and this is indeed larger of a code (I understand it’s not that big, i recently would you like to think it is). basically was to do it “again,” i’d add result to help make the background and book more desirable. For the speak room to focus you have to be aware of the ip for the individuals pc that you want to transmit the content to. This chat place is password secured, of course, if a hacker attempts to hack they they jokes in using them. Enough of this, allows jump on on the rule.

1: THE SUM OF THE CODE

Is the signal in one single larger record. Backup simply the code (anything between the hash labels #). After copying everything right here paste they into a blank notepad document. save it a bat file (Messenger.bat). Look at last step for further assist preserving.

##################################################################################################### off Title Superman’s Chat Room color 0e :top echo ===Superman’s Chat Room=== ECHO 1 – access chat room via password ECHO 2 – access for Hackers ECHO 3 – get into the chat room without password ECHO 4 – Exit SET /P OPT=Please make a selection, and press enter: if %OPT%==1 GOTO OPTION1 if %OPT%==2 GOTO OPTION2 if %OPT%==3 GOTO OPTION3 if %opt%==4 GOTO OPTION4 :OPTION1 GOTO PASS ECHO Redirect to Password input :OPTION2 ECHO Redirect for Hackers ping -n 2 127.0.0.1>nul color c echo ============================================================================== echo Come on I know you are better than that, come on your a hacker crack the code! echo ============================================================================== ping -n 2 127.0.0.1>nul echo ACCESS DENIED pause exit :OPTION3 echo Free Access color c ping -n 2 127.0.0.1>nul echo ================================================================ ECHO Do you think I would actually let you get in without a password? echo ================================================================ ping -n 2 127.0.0.1>nul echo ACCESS DENIED pause Exit :OPTION4 echo Are you sure you want exit? echo Y/N echo type “Y” or “N” set input= set /p input= if %input%== y goto y if %input%== n goto n :y echo yes pause exit :n echo no echo redirect to menu ping -n 2 127.0.0.1>nul CLS goto top :PASS ECHO Enter the correct CORRECT password set /p pass=password: if %pass%==1234 goto Access Granted Cls COLOR C echo. echo ACCESS DENIED ping -n 2 127.0.0.1>nul EXIT cls goto pass :Access Granted color a echo Access Granted, Welcome. pause color a echo Instructions: Type the Ip address of the person you want to talk to enter the chat room, echo type it after “MESSENGER” after you enter the chat room. pause echo For “experienced” users hold the down the down arrow until you reach the Chat Room. echo if you are not farmiliar with “Superman’s Chat Room” than press any key once for the instructions. Pause echo Step 1) To find your IP addres open up command prompt in the Start Menu for windows users. Pause echo Step 2) Type “ipconfig” as soon as it opens. Pause echo Step 3) Record the IP address, and type it after the word “messenger” Pause echo Step 4) Begin chat room use Cls color c pause echo this code was created by Superman pause Cls echo . Warning! this try this code was not created nor intended for illegal use. echo This is your last chance to close this program or you will be entering the chat room! pause Cls echo Entering Chat Room pause :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% 2>nul||echo Your message did not go through && pause Pause Goto A ##################################################################################################### Yes, i am aware it’s a fair sized level of laws.

2: THE CODE BROKEN-IN inside ELEMENTS

When you look at the following measures I will break down the laws into the “blocks” the rule is made of 5 different pieces witch I enjoy name “obstructs.” The parts become: the concept and selection, the menus options, the code input, the guidance, the warnings, not to mention the messenger itself. We’re going to give an explanation for name and eating plan very first.

Step 3: THE NAME AND SELECTION

The picture demonstrates exactly what each thing is for/does. The name names they (clearly) the diet plan help prevent hackers and nosy group from your cam space. One regarding the options will bring you on the sign in

Step 4: CODE FEEDBACK

The image demonstrates what each thing try for/does. the code protects it from individuals who don’t know how exactly to revise signal or those who have bad eyesight,(it is quite difficult place a couple of characters in a lot of lines of data) The password is likely to be altered, from list really 1234, once you select this backspace they (although not the code) and kind inside password, it may be so long as you want.

Step 5: THE TRAINING

The image reveals what each thing is actually for/does. The training were petty easy to follow but you can modify them when you need to. the guidelines tell you what are your own IP and ways to input it.

Step 6: THE WARNINGS

The image reveals what each thing is for/does. The warning we put on listed here are pointless, if you do not need it to look cool, you’ll be able to erase these easily if you do not including moving two extra keys.

Action 7: THE MESSENGER BLOCK

This is actually the messenger with the regimen, it delivers and get the messages, without this there is no suggest the program. Undoubtedly you could dissect the signal of any part and use it for other uses.

Action 8: PRESERVING

This is why you save your group file. simply click “file,” “rescue as,” next, type in the file identity of your choosing next immediately after title (no spaces) means “.bat” then click rescue. An illustration “Myprogram.bat” (discover pictures)

Step 9:

You are complete! I am not responsible at all for what you do with this!a€‹ you will declare that you have made your system!

Leave a Reply

Your email address will not be published. Required fields are marked *