How to Kill a Computer CorrectlyThere are many reasons why someone might need to kill or put into the state of clinical death any computer piece of iron.
Most often such a need arises when, for example, at work "quite by accident" they buy new computers for secretaries with characteristics more suitable for a hardcore gamer. It will not be difficult to arrange a guarantee, but it is much more difficult to organize a write-off. Or, for example, a hacker bought a new piece of iron without thinking and looking at the reviews on the net. Devaysina is a Chinese handicraft, and the owner feels a persistent need to take her back to the store. However, here he stumbles upon the wonders of his native bureaucracy and truly brilliant interpretations of the law on consumer rights. It turns out that they completely exclude the possibility of returning a technically sound product. Often it turns out that the buyer himself agreed to these disadvantageous conditions by signing his own sentence, called a guarantee coupon. It is in such cases that it can be useful to skillfully kill a piece of iron without leaving any trace of a crime on the victim's body.
Reversible methods of murder
In some cases, an attacker can hedge himself in case the iron he wants to return has damages that deprive him of guarantees, but nevertheless somehow work. In this case, he does not want to kill the device completely and irrevocably, since this is fraught with a complete failure of the operation. Then the hacker risks getting a waiver of the guarantee and an unrecoverable device, which will not be able to vaporize to anybody and do not get used to the pretext. Kill the piece of iron so that it can be revived without problems, it is quite difficult. The fact is that the attacker must bypass the masters from the service center in this case, otherwise they will repair it and return it. Fortunately, most service centers do not repair iron, but, with a finger in the sky, make a conclusion about the marriage or the breakdown through the fault of the user and write the appropriate paper. Nevertheless, you need to consider the possibility of another scenario, when the device still try to fix it. Toolkit hacker is best to have at hand a good and diverse tool. He in fact remembers that in most cases it is necessary to climb inside the device. Therefore, you must have a huge number of different screwdrivers of all types and sizes. Screwdrivers for non-standard screws may also be required. Often used alcohol, tweezers of different sizes and a scalpel. Aces are often used soldering iron, a good non-fuming flux and thermofan.
To kill a hard drive in such a way that only the hacker could restore it, it is possible only by hardware. Of course, you can twist the software part of the device by making software bad blocks, or emulate terrible brakes, disabling all modes of operation, except for PIO. But all this is quickly and qualitatively treated in the hands of a literate person, so you should not take risks. The surest way to make a screw shamelessly glitch, banging bows and refusing to work is damage to the contacts between the PCB and the HDA. In most modern disks, the connection between the airlock and the board is provided by spring-loaded contacts built into the jar, while in the corresponding place on the printed circuit board there are pads in which these dents abut. If you break this place contact one or all dentists with the board, you can get very interesting special effects and glitches. I want to do it in such a way that nothing can be seen in this case, even if the service engineer gets there. The easiest way to achieve this is to apply a transparent, colorless lacquer to the contacts of the PCB, which will serve as a reliable insulator, and at the same time there will not be is noticeable. In some models of hard drives, thin poles are being used instead of contacts, which are inserted into the connector on the printed-circuit board. In this case, the attacker gently removes the cable from its connector and covers the contacts with the same lacquer. From this method automatically follows the reverse method, this time with conductive varnish, which in the olden days unlocked the multiplier on Athlon processors. It all depends on the imagination of the hacker. The basic rule that guided the technology in this situation is that in no case should you touch the power circuits associated with the power of the hard drive, otherwise you can overdo it and arrange a colorful show with fireworks. Contacts during this smear very carefully, so that they can then be washed. Usually they like to close low-current, but critical circuits, for example, data buses on the module, memory cache or BIOS. Some people like to mock the processor, but here it is necessary to act at random - datasheet on it is usually difficult to find. With the amount of varnish, try not to overdo it, as there is a possibility that it will have to be laundered.
To kill the device completely and irrevocably, a hacker can apply several truly blasphemous techniques. The first and most reliable is wrapping the hard in a towel and beating off the kidneys. Bute is usually strong, but neat, so as not to damage the appearance of the device. A beaten screw will get all possible shifts in the mechanics of the can, so that it will cease to work forever. However, there is some danger that something will fall off within the bank, and under the guarantee it certainly will not be accepted, but this probability is minimal. The second way is to disfigure the electronics with electricity. For example, some villains take a piezo element from the lighter, connect the cylindrical side of the piezo element to the mass of the hard drive and let the beautiful electric arcs pass in the direction of any chosen microcircuit. The best thing for this is a chip cache, a processor and BIOS. The hacker can pour a conductive varnish under the legs of the chip so as to exclude any possibility of washing it off. If after all this the device continues to work, the villain will only have to tell others about the miracle.
CD / DVD drive
With disk drives, the situation is quite different. On the one hand, it may seem that it is much easier to disable the CD-drive, but this is not always the case. The essence of the problem lies in the lack of access to the electronics torch, because it is always reliably packed into the body, protecting the device from dust, and the user - from noise. At first glance it may seem that it is not a problem to unscrew the four screws and remove the cover, but in practice everything is not so simple. The fact is that in most companies they seal the cases of such devices with warranty stickers. Programmatically it is possible only to destroy the device, pulling it out in the process of flashing, but to restore after this firmware will be very problematic. The only way for villains is to use that part of the board that is available for modification, next to the power and interface connectors. Apply usually the same conductive varnish. There is a possibility to close any important trunk of the drive. Also, the hacker can try to pour the lacquer into the IDE connector. The effect, apparently, will be very interesting.
The first and most effective way is to turn off the power of the device at the time of the flashing. As already mentioned, to remove the BIOS chip from the board of the sidyuk is very problematic, as in most cases it is soldered there. As a consequence, it is almost impossible to disclose the conspiracy, that is, to expose the fraudster. To do this, remove the microcircuit, connect it to the programmer and analyze the contents. If even someone does this, then this will not be a proof of a crime, since the flashing of the firmware could occur due to some glitches of electronics. Through the open tray you can mutilate the mechanics of the tray opening drive - for example, the bay in the pinion axis of the glue, however there is a high probability that with such a malfunction the hacker's guarantees are wrapped immediately and without hesitation.
There is a huge number of ways to make the graphics card fool and in all its glory demonstrate a whole bunch of faults. The most effective way is to emulate some classic malfunction - for example, RAM. In this case, the villain has the opportunity to go software by dispersing the video card to such values that it still somehow functioned, but already buggy. To fix overclocking, the hacker needs to flash the received values into the BIOS vidyuhi. To do this, he merges his native BIOS from the card, corrects one of the existing editors and pours it back into place. As you know, this method is easily fixed by simple flashing, but it is unlikely that someone will bother with this. The villain can act simpler: just kill BIOS with the left firmware or turn off the computer at the moment when the flasher does not recommend it. Restore the BIOS of the video card then you can and to touch or with the participation of the second vidyuhi. For more reliable dirty tricks, the villain uses the same conductive varnish, lavishly drawing out the conclusions of one of the memory chips. As a result, various special effects will appear on the screen of the monitor in the form of strangers and strips.
There is a wide field for action. This is the first device we are discussing, practically without protection from external influences. It, as a rule, does not have a hull and contains a minimum number of plastic parts. This means that with the help of a soldering iron or thermofane, you can remove "spare" parts from it. For this, a good flux is needed, since the hacker has no right to leave traces of soldering and allow the evil service engineer to wrap the device. If you ever carefully examined the video card, you could not help but notice that it has a huge number of different elements. In this case, often not all the places on the board are filled with parts, so the absence of a single component will be invisible, but the device will still refuse to work. Usually remove the elements located on the back of the board, at the place where the processor is installed. This increases the likelihood that the villain will remove the critical detail, not some filter. Also very sensitive is the obscuration of RAM chips, after the removal of which this chip will not function correctly. To remove the element neatly, the hacker needs to first warm it with a soldering iron or thermofan, and then gently pull with tweezers. After this, the villain must necessarily improve the place of intervention. To do this, the surface is smeared with flux and warmed up, as a result of which the contact areas will look as if there was nothing there. Will only wash away the alcohol flux. The method with the piezo element works well, but the RAM does not like such things. And, finally, the easiest way is to turn off the cooling of the video card and torment it in this state. True, this method is the most unpredictable - the processor can die, or the printed circuit board may burn, and, of course, it will not be taken as a guarantee.
With sound cards, things are the same as with video. Not everyone knows that the overwhelming number of sounds have their own programmable BIOS, which the attacker can also kill, only to restore it is not so easy. Therefore, usually use fantasy and a little varnish.
The villain can try to burn the sound card processor, sharply giving a powerful signal to the line or microphone inputs, in the past, not one sound machine was burned. In this case, as a rule, not only the entrance itself is damaged, but also the circuits responsible for the exit, but as it will be taken into consideration in the service center, one can only guess.
With a mum, a hacker can do whatever his heart desires, not particularly afraid of losing a guarantee. The reason is simple to disgrace. Inspect the entire circuit board for microdamages, lack of parts and other cunning modifications is very difficult because of its large size. Of course, the boards are inspected, but not under a microscope and without a catalog of elements on it. Only a few necrophiles from the Mitinsky market and similar figures from small computer firms are capable of doing this, and they lose their money on this. In most large firms, there is simply no time for it. Therefore, if there are no obvious mechanical damages on the board, the villain can safely take it as a guarantee. The program to kill the mother in such a way that it was possible to "roll back" the malfunction is very difficult. Damage to BIOS will not do, because it is elementary fixed. It remains only conductive varnish. It is usually applied near vital nodes, for example, near the BIOS, clock generators, as well as on the undisturbed parts of the board. Of course, the most reliable and less pale way is to remove some elements, but this method is reversible only with the reservation for good soldering equipment and straight hands, because putting the CMD element in place is much more difficult than removing it.
From irreversible it is necessary to allocate only dismantle of the important details necessary for work of a payment. The best are the various quartz generators and the elements that stand on the internal bus between the bridges. Their absence will ensure the full inoperability of the board. However, piezoelectrode is also suitable. To avoid unnecessary suspicion, the villain can try to kill any part of it - for example, the memory controller. This breakdown will look much more plausible - the board will simply yell with a good mate, demanding inserting RAM. After all, the full death of mothers does not occur so often.
With the murder of the periphery, everything depends on the particular situation. For example, many printers and most CRT monitors have special service modes, due to which it is possible to disfigure the device. In monitors using these modes
The villain can so deform the image that it will be almost impossible to restore the original settings. These settings are made at the plant with the participation of complex equipment, at home, and in a small service center this can not be fixed. You enter this menu by pressing a certain combination of buttons, but for all monitors it is different. On some monitors, for example Sony, it does not exist at all, and access to the service menu is performed via a special data cable from the computer. With printers, the situation is similar, however, in household cheap printers such functions are rarely present, mostly it is possible on expensive productive models intended for offices. The same applies to other devices, for example, to hardware dial up modems. In them, all settings are stored in the memory of the modem, with their help it can be brought to a completely inoperative state. The fact is that their settings allow you to completely change the response to the communication line, in certain situations the modem will simply stop seeing the line. However, this is treated with the usual return to the factory settings.
As you can see, a villain can easily destroy any device. Most modern devices have their own internal firmware, and if you study the details of their configuration and operation, you can successfully emulate many faults. Do not forget that in the service centers are also literate people who are sometimes not so simple to cheat.