Jump to content


  • Posts

  • Joined

  • Last visited

  • Days Won


chain last won the day on June 6 2020

chain had the most liked content!


About chain

  • Birthday 01/26/1962

Contact Methods

  • Website URL

Profile Information

  • Gender
  • Location
  • Interests
    scripting and chatting

Recent Profile Visitors

26,512 profile views

chain's Achievements

Grand Master

Grand Master (14/14)

  • Conversation Starter Rare
  • Week One Done Rare
  • One Month Later Rare
  • One Year In Rare

Recent Badges



  1. Microsoft's Windows 10 and the upcoming Windows 11 versions have been found vulnerable to a new local privilege escalation vulnerability that permits users with low-level permissions access Windows system files, in turn, enabling them to unmask the operating system installation password and even decrypt private keys. The vulnerability has been nicknamed "SeriousSAM." "Starting with Windows 10 build 1809, non-administrative users are granted access to SAM, SYSTEM, and SECURITY registry hive files," CERT Coordination Center (CERT/CC) said in a vulnerability note published Monday. "This can allow for local privilege escalation (LPE)." The operating system configuration files in question are as follows - c:\Windows\System32\config\sam c:\Windows\System32\config\system c:\Windows\System32\config\security Microsoft, which is tracking the vulnerability under the identifier CVE-2021-36934, acknowledged the issue, but has yet to roll out a patch, or provide a timeline for when the fix will be made available. "An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database," the Windows makers noted. "An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Read more here
  2. MySQL, an open source database developed by Oracle, powers some of Facebook’s most important workloads. We actively develop new features in MySQL to support our evolving requirements. These features change many different areas of MySQL, including client connectors, storage engine, optimizer, and replication. Each new major version of MySQL requires significant time and effort to migrate our workloads. The challenges include: Porting our custom features to the new version Ensuring replication is compatible between the major versions Minimizing changes needed for existing application queries Fixing performance regressions that prevent the server from supporting our workloads Read More Here
  3. Dear mIRC User,mIRC v7.66 has been released today.This is a small update that addresses a number of issues reported by users since the last release. It includes improvements, changes and fixes to a number of features, including:Added MDI area background color option to Colors dialog to allow users to change brightness of MDI area.Changed the editbox/nickname list line separator color so that it matches current theme.Changed /window -h to support hiding status windows in both the switchbar and the treebar.Changed channel and query window icons to make them more distinctive.Added colors dialog default/undo buttons to allow reset/revert of color settings.Changed /server to prioritize group name over server address to handle server group names that contain periods.Changed parsing of /mode commands that use combinations of +ovh to ensure compatibility with recent ircd changes.Fixed maximized MDI window duplicate icons bug.Changed tab completion to leave in place non-existent/empty identifiers/variables.Fixed select folder bug incorrectly filling in filename as a *.* wildcard.Updated CA root certificates cacert.pem file.How to upgrade?mIRC is distributed in an installer that installs mIRC on your computer for you. Simply download and run the installer from the download page on the mIRC website. Follow the instructions the installer gives to you. When upgrading all your old settings and scripts will stay as they were, if you want that. Read the questions the installer asks with care and nothing can go wrong. You will be chatting with the new mIRC in no time. If you get stuck or if you want to find out more about a certain feature, just click on a Help button or browse the Help file and you should find lots of hints to help you out.Where to download?As always, the latest version of mIRC can be downloaded from the download page on the mIRC website.Registering mIRCAs you know, mIRC can be downloaded freely and evaluated for 30 days. If you find that you enjoy using mIRC, it would be great and much appreciated if you registered your copy. This licenses you to use your copy of mIRC and helps to support our continued work on mIRC. You can find out how to register here.Full list of Fixes, Changes and Additions.For a more detailed list of recent changes, please see the whatsnew.txt file. You will need to read through the help file to learn more about these changes and their impact. Some changes are obvious, some need getting used to - please take your time to play with them and see how they work. May we invite you to use these forums for all questions you might have? The forums offer great help with everything related to mIRC!Thanks for using mIRC, have fun on IRC!
  4. chain


    Version 1.0.0


    Auto-identifies your bot to DALnet nick/channel services on connect and via dcc request to try and regain ops in any channels it is on.
  5. Version 1.0.0


    Simple script that identifies your bot to NickServ on DALnet.
  6. Version 1.0.0


    Will identify your bot once received the notice that nick is owned by someone else from NickServ. Can also use this script if the bot's need to be an op, unban & invite
  7. Version 1.0.0


    Identify script for Dalnet. Auto-identifies when the bot detects that NickServ wants a password, and auto checks to see if the bot has ops (if not, the bot will request ops from ChanServ). Also features manual commands to get the bot to identify and to op #channel.
  8. Version 1.0.0

    1 download

    Will help you to control channel access list from your bot (if you're not currently identify to the NickServ). For use only with IRC networks that have SirvService installed (ChanServ, NickServ, MemoServ services available.)
  9. Version 1.0.0


    Check the status of an existing channel aplication through CService on UnderNet.
  10. Version 1.0.0


    An event driven script (no timers used for output) to keep your bot authed to NickServ, keep your primary nick by ghosting and releasing it and finally of course to interact with ChanServ to join the channel and get op.
  11. Version 1.0.0


    Logs ChanServ VERBOSE notices. Has two types of channel activations and is useful for channel FOUNDERs and SOPs so they are aware with what is going on with the channel's access lists when they're offline. Also has a ChanServ WHY result logger for the person performing the access list modification.
  12. Version 1.0.0


    Adds public commands for adding and removing Vop/Hop/Aop/Sop/Akicks on ChanServ. Can be activated/deactivated on specific channels.
  13. Version 1.0.0


    Will reop an eggdrop bot when it is deoped by someone on some channel. Different channel activations and user punishment options can be setup. There are several features for exemption, user notification and logging the deoper. A good script to *always* keep your eggdrop bot opped on channels.
  14. Version 1.0.0


    Will trigger when your eggdrop bot needs an op/unban/invite/limit/key on a channel. Requests ChanServ to reop itself when it is deoped, and unban itself when it is banned and it would also invite itself when channels are set to invite-only, have a low channel limit or unknown channel key set.
  15. Version 1.0.0


    Makes the bot to use ChanServ to protect itself.
  • Create New...