======================================================================= C o d e T h i e f D e l u x e R e v i s i o n 3 . 5 D o c u m e n t a t i o n B y B r e w A s s o c i a t e s A N O F F I C I A L P H O R T U N E 5 0 0 P R O D U C T ======================================================================= -> Introduction To Code Thief Deluxe 3.5 <- Well, here it finally is. Code Thief Deluxe 3.5. If you are new to Code Thief, this is the file to read. If you are already familiar with Code ˙Thief, ˙especially if you have Code Thief 3.0 ˙already, ˙you ˙can check ˙out just the new additions and updates to Code Thief ˙Deluxe ˙by reading DELUXE.DOC, included in your Code Thief Deluxe ZIPfile. As an incentive to read the documentation, ˙I ˙have tried to lay out all ˙of the 'little things' ˙about the program and its behavior. ˙This will ˙help you understand more. ˙Also notice that Code Thief does ˙not make any direct screen writes. ˙All screen access is done through ˙the BIOS. ˙Its fast enough as it is, and shouldn't a hacker be able to run in ˙the BACKGROUND so you can do something else? ˙As I am writing this documentation I am in DesqView, with Code Thief running concurrently in another window. -> Disclaimer <- There ˙is ˙no disclaimer. ˙Code Thief was written with ˙the ˙intent purpose of committing the crime of 'theft of services'. ˙Of course you don't have to use it, ˙but then again, ˙do you have all of the money in the ˙world ˙at your disposal to pay for calling out of ˙state ˙bulletin boards plus the mainframes/mini computers that you are trying to hack? -> From The Author <- A LOT of work has gone into the Code Thief project, especially revision 2.x/3.x of the program. ˙If you support the program then be sure to upload it to any and all of your favorite boards. It's a great way ˙to increase your file points and ratio while helping ˙your ˙fellow long distance 'users'. -> An Official Phortune 500 Product <- My thanks to the Phortune 500 ˙Board of Directors, ˙and the Phortune 500 membership. The Phortune 500 Board of Directors as of now consists of: ˙˙Brew Associates (author of Code Thief), ˙Renegade Chemist, ˙Aahz, Quinton J. ˙Miranda, The Spiker, Striker, Red Knight, Major Havoc, ˙and Lord Lawless. -> Starting The Program <- To start the program normally, enter THIEF from DOS. You can also enter THIEF xx:xx from DOS (substitute a valid time for xx:xx) and Code Thief will automatically hack the flagged multiple extenders with multiple targets until the time specified, then drop back out to DOS. This is great for a BBS's batch file. For instance, you can have your BBS invoke a batch file at a certain time. This batch file could say something like THIEF 5:30. This will invoke multiple target/multiple extender hacking until 5:30 am. Note that all times are in 24 hour mode. Also, if no multiple targets are found the defaults are automatically used. This modification is on the request of an Opus BBS sysop. Hope it comes in handy. IF THE PROGRAM IS STARTED NORMALLY When you first start the program you will see the main option menu. At this and any menu you can use the up and down arrow keys to move the highlight over an option and press RETURN or the SPACEBAR to finally choose the option. I will try to move you through the running of the program to get it working on your machine so it is suggested that you print this documentation out and work the actual program as you read it. -> Setting Your Modem Paramaters <- The first thing you will probably want to do is set your modem paramaters. Use the up and down arrow keys to move the highlight over option "H" on the main option menu then hit CR or RETURN, or just hit "H" then CR or RETURN. You will be greeted with three more options. First choose "Modem Specifics". This is where you can set the paramaters for your particular modem. If a default doesn't match your configuration then use the up and down arrow keys to move the highlight over the option then hit RETURN or SPACE. The highlight will disappear and ˙you ˙can make an entry. ˙If it is a number or some ˙other ˙field, enter the new value to use. ˙If it is some kind of a toggle, ˙use your left ˙and right arrow keys until what you want comes into view. ˙Press RETURN when you are satisfied with your choice. MODEM SPECIFICS COM Port - This can be eighter COM1: COM2:, COM3: Or COM4:. ˙Use the left and right arrow keys to select Port 1, ˙Port 2, Port 3, Port 4. Then hit RETURN. Baud ˙Rate - Enter the baud rate to open the ˙modem ˙at ˙whenever hacking ˙or ˙scanning is performed. ˙Your choices are 300 ˙Baud, ˙1200 Baud, ˙and 2400 ˙Baud. ˙The left and right ˙arrow keys move you through the choices. ˙˙Hit RETURN when you are satisfied. PBX Mode - Choices are Yes and No. The left and right arrow keys moves you ˙through the choices and RETURN selects. If you ˙are ˙in ˙a ˙building with a PBX then you have ˙to enter Yes for this option. PBX Digit - This ˙is the PBX digit. ˙When you are in a ˙building with ˙a PBX installed a certain digit has to be dialed to receive an outside line. ˙If PBX mode is No, ˙then N/A will appear for Not Applicable. ˙Trying to change this with PBX mode to No will cause it to beep at you. PBX Delay - This ˙is the number of seconds after entering the ˙PBX digit ˙to wait for the outside line. ˙N/A if PBX Mode is No. Local Dialing - Not everyone has Touchtone (tm) ˙˙dialing ˙from ˙their home. If you don't change this to Pulse. Just select it with the highlight, ˙hit return, ˙then use the left or ˙right ˙arrow ˙key ˙to select the ˙new ˙option ˙and another return will make it permanent. Speaker On - Choose ˙Yes to keep the speaker on during hacking ˙and scanning or No to keep it off. Dial Tone Wait - This ˙is ˙the number of seconds the modem is ˙to ˙wait after picking up the line until starting to dial. ˙It does this through the Hayes (and compatibles) ˙command registers. Carrier Detect - This is the number of 1/10 seconds that a carrier must be present for the modem to detect it as valid. ˙This defeats some LD ˙service's ˙fake-carrier routines that send ˙a ˙fake ˙carrier ˙for a short ˙period ˙of ˙time. Remember ˙that ˙REAL carriers are ˙sent for ˙a ˙longer period ˙of time than fake carriers. ˙Experiment ˙with this one. Dialing Speed - This is the speed of the touchtone dialer. This is in 1/100 of a second. ˙This number can range from 50-255 (at least with the modem I use). User String - If there is something entered here then it is sent out to the modem. If you have an advanced modem, then set it to "ATX6" ˙to enable your extended result codes for such ˙things ˙as VOICE, ˙etc. ˙You can over-ride ˙the "Speaker ˙On" ˙˙setting by making this "ATM1". ˙˙That would be stupid, but it's just an example. MODEM RESULT CODES In this section you enter the result codes that your modem uses when in non-verbose mode. Note that the defaults should suffice. If you have ˙a ˙strange ˙modem configuration you can change ˙these. ˙˙Numbers aren't the only thing allowed here, ˙you can enter symbols like ";" ˙or ":", or etc. Someone had a strange "Hayes Compatible" modem and wanted this capability. I aim to please. -> Edit Extender Configurations <- The next thing you will want to do is create configurations for the different extenders you wish to hack. Choose "Edit Extender Configurations" ˙˙after you exit back to the main options menu. ˙If no EXTENDER.DAT ˙file ˙exists, ˙one will be created for you with ˙a ˙dummy initial record (you will want to change this of course, ˙1-800-000-0000 is ˙not ˙a valid extender). ˙If you haven't screwed anything up, ˙˙you should ˙now see the first record of the sample EXTENDER.DAT I ˙included in the Code Thief archive file. ˙These are just some 800 ˙extenders to get you started. Note that you might want to change some delays, ˙etc, to work for you. As they are now they work for ME. Your case might be different. Experiment. ˙Hitting [A] will ADD AN EXTENDER to the file. Hitting ˙[E] ˙will ˙EDIT the current extender (there's ˙that ˙highlight again!). ˙Hitting ˙[D] ˙will ˙prompt you to confirm the ˙DELETE of the extender ˙record. ˙˙Hitting [Q] will quit the ˙extender ˙editor. ˙˙To understand ˙all ˙of the fields for the individual extender, ˙˙let's ˙go through ˙the process of ADDING an extender. ˙You will notice that Code Thief is an extremely complex code hacker. But also note that there is so ˙much flexibility that you will be able to hack just about ˙anything that is out there, no matter what kind of format it is. ADD AN EXTENDER When you choose to ADD an extender you will be given the opportunity to enter ˙the ˙complete ˙configuration for the extender. ˙˙The ˙first thing is the telephone number of the extender. ˙After that is a short note ˙used ˙to identify the extender. ˙Note ˙that ˙throughout ˙the program ˙in ˙various ˙sections extenders are refered to by ˙this ˙short note, so make sure it is something you can easily recall. ˙You can make ˙it the number of the extender if you wish. ˙Anything goes ˙here, but the program will beep at you if you try to leave it blank. Next is the length of the codes. ˙For METRO it is 6, ˙MCI calling cards it ˙is 14, ˙etc. ˙No code lengths of ˙0 are allowed (it will beep). Next is the code template. ˙This idea is borrowed from Fuckin' ˙Hacker ˙from 2af because I think it ˙is ˙a very powerfull feature. ˙If this is used it completely over-rides the code length, hacking mode, ˙starting code, and sequential increment in your configuration. Anyway, here you are to construct a "template" for your codes. For instance, entering "444XXX" will make every code 6 digits and starting in 444. Entering "0X1X2X" ˙will make set the first, ˙third, ˙and fifth numbers in every code ˙to 0,1, ˙and 2 respectively and the second, ˙fourth, ˙˙and ˙sixth number in each code will be totally random. Commas are also allowed in the code template and will cause the modem to pause for 2 seconds. For instance, XXXX,9 will cause a random 4 number code to be sent, a pause for 2 seconds, then a 9 will be sent. This is good for hacking PBX's that require a code be sent then need a number for an outside line. Leave ˙the code template blank if you don't wish to use it. ˙˙Next ˙you will ˙enter the code delay. ˙This is the number of seconds to ˙delay before sending the code. Then you will enter the target delay. ˙This is ˙the ˙number ˙of seconds to wait until entering the ˙target ˙number. Notice that also in the config is an option to put the code first or not. If the code is sent first then the Code Delay should be the number of seconds to wait after dialing the extender until the code is sent after the extender answers and provides a dial tone. If the code is not sent first then the target number will be sent first. The target delay should be the number of seconds to wait after dialing the extender until the target is sent at the extender's dialtone. Then the code delay is the number of seconds to wait until sending the code AFTER the target number is sent. The timeout is next. This is the number of seconds to wait for your TARGET number to answer. If it doesn't ˙answer ˙within ˙this time the code ˙is ˙considered ˙invalid. Basically, the target delay tells the modem how long to wait. When the modem times out it tells Code Thief, and Code Thief moves on. Now enter a default Target number. ˙This is a number that always answers with ˙a modem ˙(is ˙never busy). ˙Telenet is perfect for this (so ˙enter ˙your local ˙Telenet ˙number). ˙˙Note that Code Thief can ˙also ˙use ˙random multiple ˙targets ˙- this is covered in the MULTIPLE TARGET ˙CONVERSION UTILITIES ˙that has been included as a Code Thief companion program ˙in your ˙Code ˙Thief ˙ARChive. ˙Read CONVERT.DOC ˙for ˙information ˙about targets and multiple ˙targets ˙at that. ˙Next is the hacking mode. Use your ˙left and right arrow keys to move through the selections and ˙hit RETURN when you are satisfied. ˙You can have Random codes, ˙Sequential codes, ˙or Both ˙- ˙sequential ˙codes ˙with a random increment. If you choose ˙Sequential or Both you are now prompted for the starting ˙code, otherwise this value is set to N/A. ˙Next ˙you enter the sequential increment only if Sequential hacking is chosen. ˙If sequential hacking is chosen then this is the number to increment ˙each code by. ˙If Both is ˙chosen, ˙˙then this number is random in the range ˙of ˙1-100 ˙˙when hacking. ˙˙If ˙Both or Random hacking is your chosen method ˙then ˙the Sequential ˙Increment is N/A. Note that the sequential increment is an integer, therefore any value from 1 to 32767 is valid. If "Sequential" hacking or "Both" ˙hacking is chosen and the increment ever exceeds the code length, ˙only the length of the code up to the code length will be used. ˙˙For example, ˙with a code length of 4 and an starting code ˙of 9999, ˙if an increment of 1 is made your next code will be 1000. ˙˙Now you ˙will be prompted as to if ˙the code should be entered first. ˙Use the left and right arrow keys to select Yes or No. ˙If you choose Yes, then ˙the code will be sent first. ˙Choose No and the target ˙will ˙be sent first. Next is the target prefix digit. ˙This is a number to add to the beginning of the target number. ˙For example, ˙for the MCI calling card service ˙you ˙enter the target first and prefix it with ˙a "0". ITT requires that the target be sent first and be prefixed by a ˙"1". ˙˙Other ˙services require that the CODE is sent first and ˙the target ˙has NO prefix. Next is the multiple extender flag. ˙If Yes then the extender will ˙be ˙flagged immediately as one to be used when Multiple Extender hacking is chosen. If you choose No, ˙then this extender will be put on reserve. More on this comes later. Next is multiple port mode. ˙˙Say the ˙extender number is 950-1000 ˙and the extender ˙has ˙multiple ˙port hunt groups from 950-1000 ˙˙to ˙950-2000. Choosing Yes to multiple ˙port mode will prompt you for the ending hunt number (in ˙my example it's 2000). ˙Now Code Thief will randomly ˙pick 950-1000 ˙˙to ˙950-2000 ˙whenever it dials the extender. ˙˙Ending ˙Hunt numbers ˙MUST be four digits ˙long ˙(that should be ˙self-explanatory). Note ˙that ˙if ˙your extender ˙is 1-800-555-0000 ˙and your Ending ˙Hunt Number is 0099 ˙Code Thief ˙won't ˙screw up by dialing 1-800-555-99 ˙or whatever number is chosen. It will properly dial 1-800-555-0099 (or 1- 800-555-0050 or 1-800-555-0026, ˙etc, ˙etc, ˙etc). Next you will enter the filename to place valid codes in. ˙Valid codes are logged with the time and date for convienence. ˙All valid code ˙files ˙end with the ".COD" extention. ˙When finished ˙entering all extender information it is saved to the EXTENDER.DAT file. OTHER EXTENDER EDITOR COMMANDS To ˙navigate through the configurations use the LEFT and RIGHT ˙arrow keys. ˙˙To ˙flag ˙an extender for deletion enter "D". ˙˙You ˙will ˙be prompted to enter "Y" ˙if you are sure or "N" if you are not. ˙Once an extender has been flagged for deletion it will be skipped over ˙when you ˙use ˙the left and right arrow keys. ˙Hit "Q" ˙to quit ˙this section. When you hit "Q" all extenders flagged for deletion are physically deleted. Another nice feature in this section is the ability to edit extenders. Hit "E" to choose edit. The highlight will appear. You can use the left, right, up, and down arrow keys to navigate the hightlight over the option you wish to change. Then hit RETURN or SPACE to enter a new value. When finished entering a new value (either by the keyboard or left and right arrow keys) ˙hit RETURN and ˙the ˙highlight will re-appear so that you may move it over ˙new things to edit. ˙When finished editing hit "Q" ˙when the highlight is present. Note that everything in the configuration is described in the ˙previous paragraph. ˙To choose a particular ˙extender ˙by ˙record number, ˙just enter the number. ˙You can't ˙see ˙extenders flagged for deletion (it will not go to them). One ˙more thing on deletion extender configurations. ˙If in the course of ˙using this section you delete ALL of your extender ˙configurations, the program will not have any configurations left to go to and it ˙will automatically ˙quit this section deleting the entire EXTENDER.DAT file. When ˙choosing ˙this section again, ˙a ˙new EXTENDER.DAT with ˙a ˙dummy record will be created. -> Edit The Multiple Target File <- Navigate back to the main menu. Choose "Edit The Multiple Target File". You will then be shown the current multiple target file. Now you can either hit "1" to add to it, "2" to delete entries from it or "3" to quit. Everything here is self-explanatory. A multiple target file is provided with the program. It is kept in ASCII file format for easy editing with your word processor, ˙if you wish. ˙Use the MULTIPLE TARGET CONVERSION UTILITIES in your Code Thief ARChive to get quick and painless ˙updates of your multiple target MTARG.DAT file off Telenet or even ˙˙Tymnet ˙at ˙regular ˙intervals. ˙˙Code ˙Thief ˙is ˙a ˙˙complete professional system that will solve all your hacking needs. -> Flag Extenders For Hacking Mode <- Exit ˙to the main menu and choose "Flag Extenders For Hacking Mode". This is the option to choose to change the flags on extenders. If it is flagged then it will be one of the extenders used when multiple extender hacking is chosen. The extenders will be shown, ˙eight to a page. A "+" in front of the extender means it will be included when multiple extender hacking is chosen, otherwise it will not. This option is included because some people don't want to hack all of the extenders they have configurations for. Editing an extender and changing the multiple extender flag does the same thing, but this is easier. If there are more than eight extenders then they will take up more than one page. You can flip through the pages by choosing "Jump To Next Page" and "Jump To Previous Page". Hitting RETURN or SPACE when the highlight is over an extener toggles the flag. -> Deluxe Exchange Scanner <- Navigate ˙back ˙to the main menu and choose "Deluxe ˙Exchange Scanner". ˙˙The ˙Code Thief Deluxe exchange scanner is a ˙full ˙screen exchange ˙scanner that can scan multiple exchanges from a database that you ˙can ˙configure. ˙When you choose this option if no exchanges ˙are defined, a dummy first record will be created for you. ˙Now hit [R] to replace this record and enter an exchange to scan, ˙the starting number in the exchange, then the ending number. To flag the exchange just hit [+] ˙next. ˙Unflagging is done by hitting [-]. ˙Note that to scan you must ˙have at lease one flagged exchange. ˙You can't scan nothing ˙can you? ˙˙˙The ˙exchange ˙editor ˙is ˙a ˙lot ˙like ˙the ˙"Edit ˙˙Extender Configurations" section. To jump to a particular exchange, ˙just enter the ˙number. ˙To move through the exchanges record by record ˙use ˙the left and right arrow keys coresponding to the direction in the file you wish ˙to ˙move. ˙Use [A] to add an exchange. ˙Use [D] ˙to ˙delete ˙an exchange ˙from the database. ˙Use the [SPACEBAR] to toggle weather ˙or not a particular exchange is in the toll free 1-800 area. ˙Hitting [Q] will quit the exchange scanner section, ˙but to start scanning hit ˙[G] for ˙Go. ˙You will be asked the timeout (number of seconds a ˙computer should ˙answer ˙in). ˙˙Then ˙Code Thief will check ˙to ˙see ˙how ˙many exchanges are flagged. When scanning and Code Thief reaches the ending number ˙in ˙an ˙exchange, ˙the exchange will be unflagged. ˙˙When ˙all flagged ˙exchanges ˙are changed to unflagged (all ˙exchanges ˙are ˙done being ˙scanned in the limits you specified in the configuration) ˙˙Code Thief will quit the exchange scanner. THE ACTUAL EXCHANGE SCANNER This ˙is ˙a ˙full screen exchange scanner ala the movie ˙WarGames ˙(the movie ˙sucked ˙by the way) ˙and it will show each of the ˙numbers dialed. ˙˙Numbers where computers are detected are shown BLINKING. If the modem does not detect ˙a dial tone when trying to dial (receives the no ˙dial ˙tone result code) it retrys the line. After 5 retries it exits the exchange scanner. If the modem sends a BUSY result code that is ˙logged ˙to the CARRIERS.TXT ˙disk ˙file along with ˙numbers ˙that produced a CONNECT result code of any baud. It will specifically log it as ˙a BUSY number or a number that the modem CONNECTed to. ˙You can then ˙consult ˙the log and dial these numbers back manually if you wish to ensure that the numbers listed as busy aren't important. When the screen fills up, Code Thief goes back to the beginning. -> View/Delete Code Files <- When you choose this option from the main option menu the disk will be searched for files with a .COD extention. If there are any they will be displayed. If there are no files with a .COD extention that will be displayed also. You have the option of viewing one of these files or deleting one. If you view one it will be one screen at a time so nothing scrolls past you. Note that the time and date the code was found is logged for your convienence. -> View/Delete Carrier File <- This option is also on the main option menu. All carriers found when using the exchange scanner are logged to a file called CARRIERS.TXT, as well as BUSY numbers if the modem sends a BUSY result code. When viewing the file it will be showed one screen at a time so nothing scrolls past you. You can also delete the file. Note that the time and date the number was found is logged for your convienence. -> Start Hacking <- After you choose this option you will be prompted as to weather you want to do Single Extender/Single Target Hacking, Single Extender/Multiple Target Hacking, Multiple Extender/Single Target Hacking, Or Multiple Extender/Multiple Target Hacking. ˙If you choose multiple target hacking of any kind the targets will be read into memory before hacking begins to cut down greatly on disk access time. If single extender hacking is chosen you will be prompted for the extender to hack. Use the arrow keys to highlight the extender you want then press RETURN or SPACE. If there is more than one page of extenders then highlight "Jump To Previous Page" and "Jump To Next Page" to navigate around the list. WHEN HACKING BEGINS You will be shown the complete statistics for every extender. Also shown ˙is the number of codes found, ˙the last code found as ˙well ˙as the number of codes found for that extender plus other statistics for the current hacking run for each extender. The number of extenders you ˙can have at any time is limited only to disk space, ˙of ˙course. Multiple ˙targets are limited to 500. ˙This is, ˙I ˙think, ˙more than enough. If you chose to quit hacking at a certain time, that time will be displayed on the screen as a reminder. ˙Hit ESCape to quit ˙hacking at any time. If you forgot to configure your modem and it is connected to ˙COM2 ˙˙(the default is COM1) ˙then Code ˙Thief ˙will ˙automatically recognize that ˙something is wrong and exit the exchange scanner. ˙You can ˙also ˙hit the SPACEBAR to skip to the next ˙code. ˙If you have ˙a picky modem like mine, only use the ESCape key or the SPACEbar when the modem is not sending any DTMF to the line. ˙But if you DO screw up the modem Code Thief will know and will make the attempt to recover. POSIBILITIES DURING HACKING Many things can happen during hacking. For instance, if the modem connects the code and extender is logged to it's respective disk file. If the modem sends an ERROR result code the current attempt is retryed again. If NO DIAL TONE is detected by the modem the current attempt is retryed. ˙˙If NO CARRIER or VOICE is detected by the modem the program moves on. ˙The maximum number of retrys that can ever be done in a row ˙is five. ˙Oh, ˙if the modem sends a RINGING result code that ˙is also ˙shown ˙to the user while the modem waits to timeout or ˙connect. Ringing ˙does ˙nothing ˙but just display "Ringing...". ˙If ˙the ˙modem receives a busy signal it goes on to another attempt. I origionally planned ˙on ˙making ˙it ˙retry ˙the code but ˙I ˙remembered ˙that ˙some extenders ˙send ˙a re-order which is a fast busy signal that ˙can ˙be detected by the modem and send a BUSY result code. -> Closing Notes <- I hope you understood this new documentation. Im not really a good writer, ˙so if you have any questions leave me a note on any board I happen to be on ˙and ˙I ˙will ˙try to answer it. ˙I hope you like Code Thief and find it usefull as I put a LOT of hours and hard work into it until I was satisfied. If anything goes wrong with the program on your machine, or anything else in general then leave me a note. I will try to diagnose the problem and stamp it out. COMMUNICATIONS ADDRESSES AND INTERRUPTS Here ˙are the communications address and interrupts that Code ˙Thief uses to access the communications ports. ˙COM1: and COM2: ˙are correct for ˙100% ˙˙of the applications. ˙COM3: ˙and COM4: ˙as defined by ˙the program will be correct 99% of the time. If you have a COM3: modem and Code Thief set at Port 3 doesn't work with it then change your modem to COM1: ˙˙or COM2: ˙if possible. ˙If you really need YOUR communications addresses and interrupts for COM3: ˙and COM4: ˙leave me a note with the correct ˙information on any board I am on and I will try to get ˙you ˙a new ˙THIEF.COM ˙and ˙THIEF.000. ˙˙But ˙note ˙that ˙the ˙addresses ˙and interrupts ˙used for COM3: and COM4: are going to be correct more times than not. Address Interrupt Address Interrupt ------- --------- ------- --------- COM1: 3F8 IRQ4 COM3: 3E8 IRQ4 COM2: 2F8 IRQ3 COM4: 2E8 IRQ3 F i l e s S u p p l i e d W i t h C o d e T h i e f 3 . 5 Make ˙sure that these are the files you received in your ZIPfile ˙of Code Thief revision 3.5. If these are not the files then what you got is ˙something that someone else re-ZIPed and forgot ˙to ˙include something in. I ask that you only distribute the origional ZIPfile because people have confused themselves in the past. THIEF35.DOC - Code Thief Deluxe v3.5 documentation DELUXE.DOC - What's new since Code Thief 3.0? THIEF.COM - Code Thief 3.5 - The actual program THIEF.000 - Primary ˙Code ˙Thief ˙overlay. ˙˙Must be ˙in ˙the ˙same directory ˙as ˙THIEF.COM and you must be logged to ˙that directory MTARG.DAT - Code ˙Thief ˙multiple target file - use Multiple ˙Target Conversion Utilities to make your own also EXTENDER.DAT - Sample 1-800 extender file to get you started MULTIPLE TARGET CONVERSION UTILITIES A CODE THIEF 3.5 COMPANION PROGRAM (be sure to read CONVERT.DOC to understand this) CONVERT.COM - Multiple Target Conversion Utilities - The program CONVERT.DOC - Multiple Target Conversion Utilities - The documentation TELENET.LST - Sample file off Telenet to get you started TYMNET.LST - Sample file off Tymnet to get you started TYMFIX.COM - You must run TYMFIX to make TYMNET.LST into ˙TYMNET.FIX. Only TYMNET.FIX ˙will ˙work ˙with ˙the ˙Multiple ˙Target Conversion ˙Utilities. ˙˙Also use TYMFIX.COM to fix the listings you ascii-download off Tymnet.