Making a talk space (With Notepad)

Introduction: steps to make a speak space (With Notepad)

This Instructable demonstrates how to create a Chat space aided by the free of charge screens application labeled as Notepad. The program had not been copied and pasted, it actually was made from abrasion, you are able to duplicate and paste it (if you don’t should find out the rule). Exactly what performed I generate? I generated a chat place with notepad, I just used my desktop. How did I allow it to be? l see certain training, and over energy I built-up understanding on how to produce multiple various operable batch data files. We generated all of this by my self (with some assistance from “Prof. Pickle”), the “plans” will always be switching I hold adding a lot more pieces to it. it is exactly what I adore about development, you can easily keep changing it and growing it. In which do you get this? I made this inside my house. (I did not want to get any newer computer systems, I did not have to at your home). Just what do you find out? a€‹I discovered a lot more codes and instructions, i will be establishing and progressing inside my activity. Im merely happy with the truth that i made this all on my own, and this is indeed big of a code (i know it is not that larger, i recently would you like to believe it is). if I were to take action “again,” i’d add influence to really make the credentials and text more attractive. For all the chat place to be effective you should be aware of the internet protocol address regarding the individuals desktop that you want to deliver the content to. This chat room was password protected, and when a hacker tries to hack they it jokes about with them. An adequate amount of this, lets access it to the signal.

۱: THE SUM TOTAL RULE

Here’s All of the signal in a single larger listing. Content exactly the signal (everything between the hash tags #). After copying everything right here paste it in to a blank notepad file. rescue it a bat document (Messenger.bat). Notice latest step for further support preserving.

##################################################################################################### off Title Superman’s Chat Room color 0e :top echo ===Superman’s Chat Room=== ECHO 1 – access chat room via password ECHO 2 – access for Hackers ECHO 3 – get into the chat room without password ECHO 4 – Exit SET /P OPT=Please make a selection, and press enter: if %OPT%==1 GOTO OPTION1 if %OPT%==2 GOTO OPTION2 if %OPT%==3 GOTO OPTION3 if %opt%==4 GOTO OPTION4 :OPTION1 GOTO PASS ECHO Redirect to Password input :OPTION2 ECHO Redirect for Hackers ping -n 2 127.0.0.1>nul color c echo ============================================================================== echo Come on I know you are better than that, come on your a hacker crack the code! echo ============================================================================== ping -n 2 127.0.0.1>nul echo ACCESS DENIED pause exit :OPTION3 echo Free Access color c ping -n 2 127.0.0.1>nul echo ================================================================ ECHO Do you think I would actually let you get in without a password? echo ================================================================ ping -n 2 127.0.0.1>nul echo ACCESS DENIED pause Exit :OPTION4 echo Are you sure you want exit? echo Y/N echo type “Y” or “N” set input= set /p input= if %input%== y goto y if %input%== n goto n :y echo yes pause exit :n echo no echo redirect to menu ping -n 2 127.0.0.1>nul CLS goto top :PASS ECHO Enter the correct CORRECT password set /p pass=password: if %pass%==1234 goto Access Granted Cls COLOR C echo. echo ACCESS DENIED ping -n 2 127.0.0.1>nul EXIT cls goto pass :Access Granted color a echo Access Granted, Welcome. pause color a echo Instructions: Type the Ip address of the person you want to talk to enter the chat room, echo type it after “MESSENGER” after you enter the chat room. pause echo For “experienced” users hold the down the down arrow until you reach the Chat Room. echo if you are not farmiliar with “Superman’s Chat Room” than press any key once for the instructions. Pause echo Step 1) To find your IP addres open up command prompt in the Start Menu for windows users. Pause echo Step 2) Type “ipconfig” as soon as it opens. Pause echo Step 3) Record the IP address, and type it after the word “messenger” Pause echo Step 4) Begin chat room use Cls color c pause echo this code was created by Superman pause Cls echo . Warning! this code was not created nor intended for illegal use. echo This is your last chance to close this program or you will be entering the chat room! pause Cls echo Entering Chat Room pause :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% 2>nul||echo Your message did not go through && pause Pause Goto A ##################################################################################################### Yes, I know it really is a good sized amount of laws.

Step 2: THE LAWS BROKEN-IN toward COMPONENTS

Into the following measures i’ll digest the laws into its “blocks” the signal is constructed of 5 various parts witch I enjoy contact “obstructs.” The pieces is: the title and selection, the menus alternatives, the password input, the training, the warnings, and undoubtedly the messenger it self. We shall give an explanation for title and menu initially.

Step Three: THE NAME AND SELECTION

The image demonstrates what each thing try for/does. The name labels they (clearly) the selection help alleviate problems with hackers and nosy folk through your speak space. Only one with the possibilities will get you toward log on

Step 4: PASSWORD INSIGHT

The image shows exactly what each thing are for/does. the password protects it from folks that don’t know ideas on how to revise code or people who have bad vision,(it is quite hard to identify certain letters in a lot of lines of data) The code might be altered, from the record really 1234, once you find this backspace they (although not the rule) and type inside code, it can be if you would like.

Action 5: THE INSTRUCTIONS

The picture shows exactly what each thing are for/does. The training become petty easy to follow but you can change them if you wish to. the guidelines reveal what are their IP and ways to enter it.

Step 6: THE CAUTIONS

The image shows what each thing are for/does. The alert I placed on listed below are pointless, if you don’t need it to seem cool, you can remove these quite easily if you do not including driving two a lot more keys.

Action 7: THE MESSENGER BLOCK

This is the messenger from the plan, it sends and gets the emails, without this there’s absolutely no point out this system. Undoubtedly you can dissect the code of every parts and use it for other functions.

Action 8: PRESERVING

This is the way it will save you your batch document. mouse click “file,” “save your self since,” further, enter the file identity that you choose subsequently soon after title (no spots) sort “.bat” subsequently click rescue. An example “Myprogram.bat” (read photographs)

Action 9:

You may be done! I’m not responsible at all for just what you are doing with this particular!a€‹ anyone can declare that you made a system!

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

This template supports the sidebar's widgets. Add one or use Full Width layout.