How to Kill a Computer Correctly

There are many reasons why someone might need to kill or put into the state of clinical death any computer piece of iron.
Most often such a need arises when, for example, at work "quite by accident" they buy new computers for secretaries with characteristics more suitable for a hardcore gamer. The loss of guarantee will not be difficult, but it is much more difficult to organize write-off of iron. Or, for example, a hacker bought a new piece of iron without thinking and looking at the reviews on the net. Devaysina is a Chinese hand-made article, and the owner feels a persistent need to take it back to the store. However, here he stumbles upon the wonders of his native bureaucracy and truly brilliant interpretations of the law on consumer rights. It turns out that they completely exclude the possibility of returning a technically sound product. Often it turns out that the buyer himself agreed to these disadvantageous conditions by signing his own sentence, called a guarantee coupon. It is in such cases that he can use the ability to competently kill a piece of iron without leaving any trace of a crime on the victim's body.


Reversible methods of murder
In some cases, an attacker can hedge himself in case the iron he wants to return has damages that deprive him of guarantees, but nevertheless somehow work. In this case, he does not want to kill the device completely and irrevocably, since this is fraught with a complete failure of the operation. Then the hacker risks getting a waiver of the warranty and an unrecoverable device that will not be able to vaporize to anybody and with an incomprehensible pretext. Kill the piece of iron so that it can be revived without problems, it is quite difficult. The fact is that the attacker must bypass the masters from the service center in this case, otherwise they will repair it and return it. Fortunately, in most service centers, they do not repair iron, but, with a finger in the sky, make a conclusion about marriage or breakage through the fault of the user and write the appropriate paper. Nevertheless, you need to consider the possibility of another approach, when the device still try to fix it. Toolkit hacker is best to have on hand a good and diverse tool. He in fact remembers that in most cases it is necessary to climb inside the device. Therefore, you must have a huge number of different screwdrivers of all types and sizes. Screwdrivers for non-standard screws may also be required. Often used alcohol, tweezers of different sizes and a scalpel. Aces are often used soldering iron, a good non-fuming flux and thermofan.
Winchester
Reversible methods
To kill a hard drive in such a way that only the hacker could restore it, it is possible only by hardware. Of course, you can twist the software part of the device by making software whitblocks, or emulate terrible brakes, disabling all modes of operation, except for PIO. But all this is quickly and qualitatively treated in the hands of a literate person, so you should not take risks. The surest way to make a screw shamelessly glitch, knock bows and refuse to work is damage to the contacts between the printed circuit board and the air filter unit. In most modern disks, the connection between the power unit and the board is provided by spring-loaded contacts built into the jar, while in the corresponding place on the printed circuit board there are contact pads in which these dents abut. If you break this place contact one or all dentists with the board, you can get very interesting special effects and glitches. I want to do it in such a way that nothing can be seen in this case, even if the service engineer gets there. The easiest way to achieve this is to apply a transparent, colorless lacquer to the contacts of the PCB, which will serve as a reliable insulator, and at the same time there will not be Is noticeable. In some models of hard drives, thin poles are being used instead of contacts, which are inserted into the connector on the printed circuit board. In this case, the attacker gently removes the cable from its connector and covers the contacts with the same lacquer. From this method automatically follows the reverse method, this time with a conductive varnish, which in the olden days was unfolded by a multiplier on Athlon processors. It all depends on the imagination of the hacker. The basic rule that guided the technology in this situation is that in no case should you touch the power circuits associated with the power of the hard drive, otherwise you can overdo it and arrange a colorful show with fireworks. Contacts during this smear very carefully, so that they can then be washed. Typically, they like to close low-current, but critical circuits, for example, data buses on the module, memory cache or BIOS. Some people like to mock the processor, but here it is necessary to act at random - datasheet on it is usually difficult to find. With the amount of varnish, try not to overdo it, as there is a possibility that it will have to be laundered.
Irreversible methods
To kill the device completely and irrevocably, a hacker can apply several truly blasphemous techniques. The first and most reliable is wrapping the hard in a towel and beating off the kidneys. Bute is usually strong, but neat, so as not to damage the appearance of the device. The beaten screw will receive all possible shifts in the mechanics of the can, so that it will cease to work forever. However, there is some danger that something will fall off within the bank, and under the guarantee it certainly will not be accepted, but this probability is minimal. The second way is to disfigure the electronics with electricity. For example, some villains take a piezo element from the lighter, connect the cylindrical side of the piezo element to the mass of the hard drive and let the beautiful electric arcs pass in the direction of any chosen microcircuit. The best thing for this is a chip cache, a processor and BIOS. The hacker can pour a conductive varnish under the legs of the chip so as to exclude any possibility of washing it off. If after all this the device continues to work, the villain will only have to tell others about the miracle.
CD / DVD drive
Reversible methods
With disk drives, the situation is quite different. On the one hand, it may seem that it is much easier to disable the CD-drive, but this is not always the case. The essence of the problem lies in the lack of access to the electronics of the cutter, because it is always reliably packed into the case, which protects the device from dust, and the user - from noise. At first glance it may seem that it is not a problem to unscrew the four screws and remove the cover, but in practice everything is not so simple. The fact is that in most companies, they seal the cases of such devices with warranty stickers. Programmatically it is possible only to destroy the device, pulling its feed in the process of flashing, but to restore the firmware after that will be very problematic. To villains there is only one way: to use that part of the board, which is available for modification, next to the power and interface connectors. Apply usually the same conductive varnish. There is a possibility to close any important trunk of the drive. Also, the hacker can try to pour the lacquer into the IDE connector. The effect, apparently, will be very interesting.
Irreversible methods
The first and most effective way is to turn off the power of the device at the time of the flashing. As already mentioned, to remove the BIOS chip from the board of the sidyuk is very problematic, as in most cases it is soldered there. As a consequence, it is almost impossible to disclose the conspiracy, that is, to expose the fraudster. To do this, remove the microcircuit, connect it to the programmer and analyze the contents. If even someone does this, then this will not be a proof of a crime, since the flashing of the firmware could occur due to some glitches of electronics. Through the open tray it is possible to maim the mechanics of the tray opening drive - for example, the bay in the pinion axis of the glue, however there is a high probability that with such a malfunction the hacker guarantees wrapped immediately and without hesitation.
Video card
Reversible methods
There is a huge number of ways to make the graphics card fool and in all its glory demonstrate a whole bunch of faults. The most effective way is to emulate some classic malfunction - for example, RAM. In this case, the villain has the opportunity to go software by dispersing the video card to such values ​​that it still somehow functioned, but already buggy. To fix the overclocking, the hacker needs to flash the received values ​​into the BIOS vidyuhi. To do this, he merges his native BIOS from the card, corrects one of the existing editors and refills it. As you know, this method is easily fixed by simple flashing, but it is unlikely that someone will bother with this. The villain can act simpler: just kill BIOS with the left firmware or turn off the computer at the moment when the flasher does not recommend it. Restore the BIOS of the video card then you can and to touch or with the second vidyuhi. For more reliable dirty tricks, the villain uses the same conductive varnish, generously painting the findings of one of the memory chips. As a result, various special effects will appear on the screen of the monitor in the form of strangers and strips.
Irreversible methods
There is a wide field for action. This is the first device we are discussing, which practically does not have protection from external influences. It, as a rule, does not have a hull and contains a minimum number of plastic parts. This means that with the help of a soldering iron or a thermofane, you can remove "spare" parts from it. For this, a good flux is needed, since the hacker has no right to leave traces of soldering and allow the evil service engineer to wrap the device. If you ever carefully examined the video card, you could not help but notice that it has a huge number of different elements. In this case, often not all the places on the board are occupied with parts, so the absence of a single component will be invisible, but the device will still refuse to work. Usually remove the elements located on the back of the board, at the place where the processor is installed. This increases the likelihood that the villain will remove the critical detail, not some filter. Also very sensitive is the obscuration of the RAM chips, after removal of which this chip will not function correctly. To remove the element neatly, the hacker needs to first warm it with a soldering iron or thermofan, and then gently pull with tweezers. After this, the villain must necessarily improve the place of intervention. To do this, the surface is smeared with flux and warmed up, as a result of which the contact areas will look as if there was nothing there. Will only wash away the alcohol flux. The method with the piezo element works well, but the RAM does not like such things. And, finally, the easiest way is to turn off the cooling of the video card and torment it in this state. True, this method is the most unpredictable - the processor can die, or the printed circuit board may burn, and, of course, it will not be taken as a guarantee.
Sound
Reversible methods
With sound cards, things are the same as with video. Not everyone knows that the overwhelming number of sounds have their own programmable BIOS, which the attacker can also kill, only to restore it is not so easy. Therefore, usually use fantasy and a little varnish.
Irreversible methods
The villain can try to burn the sound card processor, sharply giving a powerful signal to the line or microphone inputs, in the past, not one sound machine was burned. In this case, as a rule, not only the entrance itself is damaged, but also the circuits responsible for the exit, but as it will be taken into consideration in the service center, one can only guess.
Motherboard
Reversible methods
With a mum, a hacker can do whatever his heart desires, not particularly afraid of losing a guarantee. The reason is simple to disgrace. Inspect the entire printed circuit board for microdamages, lack of parts and other cunning modifications is very difficult because of its large size. Of course, the boards are inspected, but not under a microscope and without a catalog of elements on it. Only some necrophiles from the Mitinsky market and similar figures from small computer firms are capable of doing this, and they lose their money on this. In most large firms, there is simply no time for it. Therefore, if there are no obvious mechanical damages on the board, the villain can safely take it as a guarantee. The program to kill the mother in such a way that it was possible to "roll back" the malfunction is very difficult. Damage to BIOS will not do, because it is elementary fixed. It remains only conductive varnish. It is usually applied near vital nodes, for example, near the BIOS, clock generators, and also on the undisturbed parts of the board. Of course, the most reliable and less painful way is to remove some elements, but this method is reversible only with the reservation for good soldering equipment and straight arms, because putting the CMD element in place is much more difficult than removing it.
Irreversible methods
From irreversible it is necessary to allocate only dismantle of the important details necessary for work of a payment. The best are the different quartz generators and elements that stand on the internal bus between the bridges. Their absence will ensure the full inoperability of the board. However, piezoelectrode is also suitable. To avoid unnecessary suspicion, the villain can try to kill any part of it - for example, the memory controller. This failure will look much more plausible - the board will simply scream with a good mate, demanding inserting RAM. After all, the full death of mothers does not come so often.
Periphery
With the murder of the periphery, everything depends on the particular situation. For example, many printers and most CRT monitors have special service modes, because of which you can disfigure the device. In monitors using these modes
The villain can so warp the image that it will be almost impossible to restore the original settings. These settings are made at the plant with the participation of complex equipment, at home, and in a small service center this can not be fixed. Entering this menu is performed by pressing a certain combination of buttons, but for all monitors it is different. On some monitors, for example Sony, it does not exist at all, and access to the service menu is performed via a special data cable from the computer. With printers, the situation is similar, however, in household cheap printers such functions are rarely present, mostly it is possible on expensive production models intended for offices. The same applies to other devices, for example, to hardware dial up modems. In them, all settings are stored in the memory of the modem, with their help it can be brought to a completely inoperative state. The fact is that their settings allow you to completely change the response to the communication line, in certain situations the modem will simply stop seeing the line. However, this is treated with the usual return to the factory settings.
conclusions
As you can see, a villain can easily destroy any device. Most modern devices have their own internal firmware, and if you thoroughly study the details of their configuration and operation, you can successfully emulate many faults. Do not forget that in the service centers are also literate people who are sometimes not so simple to fool.