How To Look Like A Hacker On Mac

How to Look Like a Hacker (not Actual Hacking): Rules - you can only change the parts otherwise it wont work Commands: @echo off - looks better echo - how to communicate through your batch file pause - stops movement and asks user to press any key to continue cls - clears the screen t. Is your Mac starting to feel messy and sluggish after using iOS 8 on your iPhone every day? Even with all of the iOS-friendly features built in to Mac OS X Yosemite, your Mac can still feel kind of 'old' in comparison to an iOS device—but it doesn't have to. Using the tips and tricks below, you can easily make your Mac desktop or laptop look and feel like iOS 8 in no time.

Introduction: How to Look Like a Hacker (not Actual Hacking)

How To Look Like A Hacker On Mac

How To Look Like A Hacker On Mac Laptop

Rules - you can only change the ___ parts otherwise it wont work
Commands:
@echo off - looks better
echo ____ - how to communicate through your batch file
pause - stops movement and asks user to press any key to continue
cls - clears the screen
tree - looks hackerish
ping -n 2 127.0.0.1>nul - delay between revealing echo's
set /p question=_________?: - sets an answerable question. EG: do you want to hack?
if %question%___ goto :_ - this is how you answer your question. EG: if %question%yes goto :A
:_ - this is how you control different outcomes. EG: :a
Color:
Letter - Text
Number - Background
0 - Balck
1 - Blue
2 - Green
3 - Aqua
4 - Red
5 - Purple
6 - Yellow
7 - White
8 - Grey
9 - Light Blue
A - Light Green
B - Light Blue
C - Light Red
D - Light Purple
E - Light Yellow
F - Bright white
Usage: color 0a

Step 1: Method

1. Open a text document - Not Microsoft word
2. begin your code with:
@echo off
color ___
3. add any commands you want
4. when saving your file, always save it as a .bat. Meaning to add the file extension .bat after the name of the file
5. Open it up. i am telling you now, it wont work perfectly the first time so keep editing until you have it at where you want

Step 2: My Code

@echo off
color 0a
set /p question=Would you like to hack?:
if %question%yes goto yes1
if %question%no goto e
:e
exit
:no
cls
ping -n 2 127.0.0.1>nul
echo Harddrive Disengaged
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
goto e
:yes1
cls
echo Destination harddrive located
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo pinging localhost network...
ping -n 2 127.0.0.1>nul
echo responce found in 33...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo locating System Intel...
ping -n 2 127.0.0.1>nul
echo Extracting files...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Locating Storage database
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Database found
ping -n 2 127.0.0.1>nul
echo Extracting files...
Set /p question=Retrieve Passwords?:
if %question% yes goto yes2
if %question% no goto no
:yes2
echo -------------------------------
ping -n 2 127.0.0.1>nul
echo 'ENTER WEBSITE HERE' targeted
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
Echo Scanning cookies and data
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Username and password retrieved
ping -n 2 127.0.0.1>nul
echo Username and password sent to harddrive
ping -n 2 127.0.0.1>nul
echo -------------------------------
echo 'ENTER WEBSITE HERE' targeted
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Scanning cookies and data
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Username and password retrieved
ping -n 2 127.0.0.1>nul
echo Username and password sent to harddrive
ping -n 2 127.0.0.1>nul
echo --------------------------------
set /p question=Override System Operations?:
if %question%yes goto yes3
if %question% no goto no
:yes3
tree C:Users
echo Manual Override Complete
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
set /p question=Extract all files?:
if %question%yes goto yes4
if %question%no goto no
:yes4
cls
ping -n 2 127.0.0.1>nul
echo Destination Harddrive located
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo Preparing to Commence File Download
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
tree C:
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo All files Dowloaded
ping -n 2 127.0.0.1>nul
echo Safe to remove harddrive
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
pause
goto no
-------------------------------------------
The way to complete it is to say 'yes' at every intersection - note the lowercase
Feel free to comment/ask questions or if you have made a better code, share that too...
-Moonicornian

Be the First to Share

Recommendations

How To Look Like A Hacker On Mac Pro

71 21K

How To Look Like A Hacker On Mac Pc

4 409
DEC H-500 Computer Lab Reproduction in Electronics
  • Pocket-Sized Speed Challenge

  • Audio Challenge 2020

  • Maps Challenge

ok, couldn't resist, here's how:
1) log into macosx as your admin-level user.
2) install developer tools absolutely required
3) download http://www.asty.org/cmatrix/dist/cmatrix-1.1b.tar.gz this file
4) in the terminal:
kick ass!
PS: My friends allready thought I was a 'crazy hacker dude' but this will only add to it. For fuller effect, buy 20 usb --> serial adaptors, and take all your old macs, install linux or NetBSD on them, and connect them all to your G4. Sorround your self with the screens, and run cmatrix in various colors on them all. Then go to macosx.com and yell 'Moohooohooohooohaahaahaa I'm the ultimate hacker dude'.
enjoy.
ignore the compile errors - I don't know what they mean, and nobody else does
here's the url for the webpage - check out the screenshots
http://www.asty.org/cmatrix/