-
respond to root message with this e-mail
To the list;
I left the last message and I misspelled my e-mail address.
Respond to the root message to:
richardheil@lycos.com
thanks again
-
Senior Member
registered user
to flebber:
OK, here is what we know so far:
1. If you have the line
Code:
/dev/fd0 /floppy vfat defaults,user,noauto,showexec,umask=022 0 0
in your fstab file it means that knoppix has detected your floppy drive
2) If you have the line 'automounter started for floppy cdrom' when you start up it means that it has at least attempted to set up the automounter for the floppy drive.
Linux is different from Windows in how it reads drives, it needs to 'mount' the drive before it can read anything. The automounter is supposed to automatically mount the drive whenever a disk is inserted and the fstab line tells us that it will attempt to mount it in the directory /floppy. If there is no disk in the drive, you do not get a 'file not found' or 'device not ready' error like in windows, instead you get a 'file or folder /mnt/floppy does not exist' error because theis file is created by the automounter only when there is a disk inserted.
The commands we have been though so far are trying to mount the disk manually on the assumption that the automounter is not working. So let's try the automounter again:
In a terminal console, type: sudo /etc/init.d/autofs status
You should get something like this:
Code:
knoppix@1[knoppix]$ sudo /etc/init.d/autofs status
Configured Mount Points:
------------------------
/usr/sbin/automount --timeout=2 /mnt/auto program /etc/automount.sh
Active Mount Points:
--------------------
/usr/sbin/automount --pid-file=/var/run/autofs/_:mnt_:auto.pid --timeout=2 /mnt/auto program /etc/automount.sh
Now try 'sudo /etc/init.d/autofs reload'
Now, insert a disk then try the desktop icon again. What error message do you get? (Maybe we're lucky & it worked!)
I see perhaps some errors in what you were trying before:
When you got this:
i logged into root
it showed
root@box:/home/flebber I entered in the line you showed but i was denied permission
as
bash: /dev/fd0
ermission denied
did you perhaps just type '/dev/fd0' and not 'mount /dev/fd0' ?
When you did
for is /dev/fd0 I rec no such bash: is: command not found
It should have been 'ls /dev/fd0' as in LS not IS (but in lower case letters...Linux is case sensitive). It is short for 'list'. It should respond back /dev/fd0 if /dev/fd0 exist, no response means the mount point /dev/fd0 is missing.
-
Senior Member
registered user
to finder:
If you really are being stalked by a hacker, best solution is to install a firewall. Here is a couple of links to get you started on finding one:
http://www.smoothwall.org/
http://projectfiles.com/firewall/
To become root you use the su ("superuser") command
Code:
knoppix@1[knoppix]$ su
root@1[knoppix]#
For system security the first thing you should do is set passwords
First for user knoppix:
Code:
knoppix@1[knoppix]$ sudo passwd knoppix
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
then for root:
Code:
knoppix@1[knoppix]$ sudo passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
Notice I am setting both passwords without actually becoming root by using the 'sudo command since user knoppix has full sudo privilidges. This can also be a security risk, so for maximum security you may want to eliminate this by adding a # in front of the last line in /etc/sudoers file.
Your command ls /dev/fd0 worked as it should.
'bash /dev/fd0' was not a suggestion, it was a quoted response from a command. In your case, entering it as a command worked as it should & the error messages are a s would be expected.
The error message you got from entering sudo mount /dev/fd0 is unusual, you should have gotten a '/devfd0 is not a valid device file' error if there was no disk in the drive.
Since your fstab designated /mnt/auto/floppy as the mount point for floppies, first put a disk in the drive, then type 'ls /mnt/auto/floppy'. You should get the directory of the files on the floppy.
-
there is more than a firewall problem hee
11/11/04
To the list;
I entered this commend into the Knoppix console and this is the result. I have no problem with doing this for any requsst in oorder to learn more about this. Take a look at the output.This is a typical result that I get for every shell request. Nothing ever works on my shell. Its like its disabled. With this in mind lets throw out what I know about this.
I have been stalked for years by this person and I really still don't know who it is but I do work as a worker advocate so there are enemies to me in gov't and business.I shouldn't be attacked because I only advocate the true status of laws and rules as they now exist and do not seek different laws..I get into problems in the fact that laws that do benefit the worker are not at all adhered to. I am sometimes anomously attacked and so where is it coming from???? I don't care to get into this for now. The thing we have at hand is this remote root problem.I will continue with this series in order to bring some sense to this but first a starting point.
Now I have this computer and it got a trojan horse in it. I didn't know enough to expel it. I tried to get files, programs and even other OS's. This guy owned me and I couldn't shake him. When I put programs in they do not execute. I just got fed up and started using live CD's. They quickly go to hell but I mostly just check e-mail and surf so it is not a major loss but it is a pain at times too. I do at times work at trying to figure out the programming but he clearly has me over a barrel over this. I have hung in there against him and all of what he knows for the longest time.Its a tribute to what I know but I would like to get rid of this person now and so in a way I am appealling to the computer community to help purge this stalker from my life. I will provide data as you need it so bear with me.
Now the hacker has root so he is the general. I have little say in what is happening and I am not fully in control.This talk of putting up a firewall is his decision until I can throw him out. Got some ideas?
This belief that Knoppix or any other version of Linux/Unix can't be hacked is total crap. These hackers call pull dirty code on any version of any OS like you make selections for a MP3 file. They get root and can pipe it in and you can't stop it until you gain total control of root. How can you when they own certain progroms like telnet, ssh and others?
let me know what you think and maybe we can discuss a plan
thanks and guess what I will be offering more on this but I am going out now so later
about your suggestion this is the output
knoppix@ttyp0[knoppix]$ ls /mnt/auto/floppy
ls: /mnt/auto/floppy: No such file or directory
knoppix@ttyp0[knoppix]$
thanks again
finder
-
Senior Member
registered user
Re: there is more than a firewall problem hee
Originally Posted by
finder
11/11/04
....... this is the output
knoppix@ttyp0[knoppix]$ ls /mnt/auto/floppy
ls: /mnt/auto/floppy: No such file or directory
knoppix@ttyp0[knoppix]$
thanks again
finder
This is a normal output for this command if you do not have a disk in the floppy drive. The directory /mnt/auto/floppy is created by the automounter only when there is a disk in the drive.
If you are getting this result when you have a floppy disk in the drive it indicates that your automounter is not operating correctly.
If you feel that your system is being hacked, first change your root and user passwords. It would be a rare trojan that could keep up with a regularly changed password.
When you say, 'nothing ever works in my shell', what have you tried?
Try this:
ls /etc
You should get a directory listing of your /etc directory.
Try this
cat /etc/fstab
you should get a listing of you /etc/fstab file.
Try this
konqueror
You should get a couple of errors because you are trying to start an X (graphical interface) application from shell but konqueror should start.
try this
ping -c 5 216.239.57.99
you should get an output like this:
knoppix@2[knoppix]$ ping -c 5 216.239.57.99
PING 216.239.57.99 (216.239.57.99): 56 data bytes
64 bytes from 216.239.57.99: icmp_seq=0 ttl=239 time=75.7 ms
64 bytes from 216.239.57.99: icmp_seq=1 ttl=239 time=69.4 ms
64 bytes from 216.239.57.99: icmp_seq=2 ttl=239 time=69.6 ms
64 bytes from 216.239.57.99: icmp_seq=3 ttl=239 time=69.4 ms
64 bytes from 216.239.57.99: icmp_seq=4 ttl=239 time=71.3 ms
--- 216.239.57.99 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 69.4/71.0/75.7 ms
knoppix@2[knoppix]$
216.239.57.99 is the ip address for google. Ping tests your internet connection.
try this:
cat /etc/sudoers
You should get this
cat: /etc/sudoers: Permission denied
because the sudoers file is readable only by root.
Now try this:
sudo cat /etc/sudoers
You should get this:
# sudoers file.
#
# This file MUST be edited with the "visudo" command as root.
#
# See the man page for details on how to write a sudoers file.
#
# Host alias specification
# User alias specification
# Cmnd alias specification
# User privilege specification
root ALL=(ALL) ALL
# KNOPPIX WARNING: This allows the unprivileged knoppix user to start commands as root
# KNOPPIX WARNING: This is totally insecure and (almost) makes knoppix a second root account.
# KNOPPIX WARNING: Never allow external access to the knoppix user!!!
knoppix ALL=NOPASSWD: ALL
-
more regarding a hacked system that won't allow mnt fd0
To the list;
Now I will try the suggestions and see where they go. It is not possible to put up a firewall after being hacked unless you rid the computer of the bad code that may prevent your executing the firewall program. The first thing a hacker will do is shut down your firewall and then put in code that prevents your executing the program. I have heard that in the past all they had to do is get you to open a file that was only 35K but now that size is even less at 15K. A simple e-mail is what I think did me in a few years ago. I think that the original file created a telent or ssh connection and then a pipe is established with bad code after discovering what OS is in use.
Sadly the dirty code is not created by the punks that send them they are created and posted on the web by people or students that excel at programming and find flaws in the OS's. They write binaries and then some punk picks it up and uses it against someone that they may or may not know.
I did get this output for su when I entered it into a shell..I thought I could delete ssh and see what would happen.
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# delete file:/KNOPPIX/usr/bin/ssh
bash: delete: command not found
root@ttyp1[knoppix]# delete file:/KNOPPIX/usr/bin/ssh
bash: delete: command not found
root@ttyp1[knoppix]# del file:/KNOPPIX/usr/bin/ssh
bash: del: command not found
root@ttyp1[knoppix]# mnt fd0
bash: mnt: command not found
root@ttyp1[knoppix]# mount fd0
mount: can't find fd0 in /etc/fstab or /etc/mtab
root@ttyp1[knoppix]#
I also tried this.
knoppix@ttyp0[knoppix]$ sudo /etc/init.d/autofs status
Configured Mount Points:
------------------------
/usr/sbin/automount --timeout=2 /mnt/auto program /etc/automount.sh
Active Mount Points:
--------------------
/usr/sbin/automount --pid-file=/var/run/autofs/_:mnt_:auto.pid --timeout=2 /mnt/auto program /etc/automount.sh
knoppix@ttyp0[knoppix]$ sudo /etc/init.d/autofs reload
Reloading automounter: checking for changes...done.
Starting automounter: /mnt/auto.
knoppix@ttyp0[knoppix]$ mount fd0
mount: can't find fd0 in /etc/fstab or /etc/mtab
knoppix@ttyp0[knoppix]$
One thing that I felt would be a good suggestion is to get some idea of thr programming size that exists on the disk and to then have a test that runs on the installing computer to see if that is exactly the size of what was installed or if there is some other code that is present when KNOPPIX loads. Like a checksum test.
Second thing is if I have bad code then where is it? I took out my hard drive and so where would it be??? I don't believe it is on the disk itself because I don't have a CD-W drive. Read only so that is out.Then we have memory. Well when you turn off your computer you supposedly flush the contents of the ram. I think that for the most part this is true. I had a hacking problem and so I turned off the computer and physically removed all the ram fully from the computer and then later replaced it again.It made no difference. Then that leaves the systemboard/motherboard as the only place the bad code could be. Now I also have a cable modem and a syslink router. Do these devices store code and what kind? Dould they or the computer BIOS store any bad code. I don't get the proper color on my screen when I check my BIOS and so I think it is hacked. Still where would it be and it is possible to reflash remotely a BIOS so possibly did this happen and what effect could it have?
any ideas?
let me know
finder
richardheil@lycos.com
-
those suggestions checked out
To the list;
Sometimes getting root is not so easy.
knoppix@ttyp1[knoppix]$ /dev/fd0
bash: /dev/fd0: Permission denied
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]# su
root@ttyp1[knoppix]# passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]# su
root@ttyp1[knoppix]# passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]#
knoppix@ttyp1[knoppix]$ code
bash: code: command not found
knoppix@ttyp1[knoppix]$ sudo password knoppix
sudo: password: command not found
knoppix@ttyp1[knoppix]$ sudo password
sudo: password: command not found
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# sudo password
sudo: password: command not found
root@ttyp1[knoppix]# sudo password knoppix
sudo: password: command not found
root@ttyp1[knoppix]#
So I attempt to check out the sudos and do the find, search for sudos and I got three files and this is what it reads out.
Name In Subdirectory size modified permissions first matching line
sudoers KNOPPIX/ect/ 560 08/23/01 09:14 pm Inaccessible
sudoers KNOPPIX/usr/share/docs/s...3,966 09/03/03 06:33 am read only
sudoers ect/ 560 08/23/01 09:14 pm Inaccessible
I went to home and then tried to open either of the two inaccessible files and used gvim to open and at the bottom they tell me that permission denied.
I also get this error box.
Error -Konqueror
X Unable to run the command specified. The file or directory
file:/KNOPPIX/ect/ does not exist
with a floppy disk in the drive
knoppix@ttyp2[knoppix]$ su
root@ttyp2[knoppix]# ls /mnt/auto/floppy
ls: /mnt/auto/floppy: No such file or directory
root@ttyp2[knoppix]#
I tried this
knoppix@ttyp3[knoppix]$ ls /ect
ls: /ect: No such file or directory
knoppix@ttyp3[knoppix]$ su
root@ttyp3[knoppix]# ls /ect
ls: /ect: No such file or directory
root@ttyp3[knoppix]#
knoppix@ttyp0[knoppix]$ cat /ect/fstab
cat: /ect/fstab: No such file or directory
knoppix@ttyp0[knoppix]$ su
root@ttyp0[knoppix]# cat /ect/fstab
cat: /ect/fstab: No such file or directory
root@ttyp0[knoppix]#
with a router and cable modem connected but coax cable to ISP removed I got this output.
knoppix@ttyp0[knoppix]$ ping -c 5 216.239.57.99
PING 216.239.57.99 (216.239.57.99): 56 data bytes
--- 216.239.57.99 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
knoppix@ttyp0[knoppix]$
knoppix@ttyp0[knoppix]$
I will try it again when I re-connect to the net.
other suggestions
knoppix@ttyp1[knoppix]$ cat /ect/sudoers
cat: /ect/sudoers: No such file or directory
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# cat /ect/sudoers
cat: /ect/sudoers: No such file or directory
root@ttyp1[knoppix]#
any ideas?
let me know
finder
richardheil@lycos.com
-
Senior Member
registered user
Re: more regarding a hacked system that won't allow mnt fd0
Originally Posted by
finder
I did get this output for su when I entered it into a shell..I thought I could delete ssh and see what would happen.
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# delete file:/KNOPPIX/usr/bin/ssh
bash: delete: command not found
OK, so 'su' works and you can now become root whenever you need to.
But in Linux the command to delete a file is 'rm' (short for 'remove') not 'delete' or 'del'
And, the location of the file would be 'usr/bin/ssh' not 'KNOPPIX/usr/bin/ssh'
And, if I understand you correctly, you are running from CD so you will not be able to delete this file anyway because the CD is read only so you cannot change anything on it. You should get a 'read only file system error' if you enter the command correctly.
root@ttyp1[knoppix]# mnt fd0
bash: mnt: command not found
root@ttyp1[knoppix]# mount fd0
mount: can't find fd0 in /etc/fstab or /etc/mtab
root@ttyp1[knoppix]#
The correct command is 'mount' but you must specify '/dev/fd0' not just fd0.
I also tried this.
knoppix@ttyp0[knoppix]$ sudo /etc/init.d/autofs status
Configured Mount Points:
------------------------
/usr/sbin/automount --timeout=2 /mnt/auto program /etc/automount.sh
Active Mount Points:
--------------------
/usr/sbin/automount --pid-file=/var/run/autofs/_:mnt_:auto.pid --timeout=2 /mnt/auto program /etc/automount.sh
knoppix@ttyp0[knoppix]$ sudo /etc/init.d/autofs reload
Reloading automounter: checking for changes...done.
Starting automounter: /mnt/auto.
This looks OK
One thing that I felt would be a good suggestion is to get some idea of thr programming size that exists on the disk and to then have a test that runs on the installing computer to see if that is exactly the size of what was installed or if there is some other code that is present when KNOPPIX loads. Like a checksum test.
There is a checksum on the Knoppix download iso's.
Second thing is if I have bad code then where is it? I took out my hard drive and so where would it be??? I don't believe it is on the disk itself because I don't have a CD-W drive. Read only so that is out.Then we have memory. Well when you turn off your computer you supposedly flush the contents of the ram. I think that for the most part this is true. I had a hacking problem and so I turned off the computer and physically removed all the ram fully from the computer and then later replaced it again.It made no difference. Then that leaves the systemboard/motherboard as the only place the bad code could be. Now I also have a cable modem and a syslink router. Do these devices store code and what kind? Dould they or the computer BIOS store any bad code. I don't get the proper color on my screen when I check my BIOS and so I think it is hacked. Still where would it be and it is possible to reflash remotely a BIOS so possibly did this happen and what effect could it have?
This is a pretty good analysis and it leads to only one conclusion. At the present time it is highly unlikely that you are being hacked. Modem and router cannot store any code which is capable of being a trojan.
Although you may have been the victim of a hacker at one time, the only reason to suspect something wrong at present is that commands don't work as expected and we are finding that this is often due to incorrectly entered commands, I suggest you study Linux commands thoroughly to prevent errors. An excellent Linux reference book is 'Rute', which can be downloaded from http://www.icon.co.za/~psheer/book/index.html.gz. You will have to put your hard drive back in though, it's too big to fit in memory & you will need some place to store it.
If you reinstall your hard drive then format it using Qtparted running from the Knoppix CD it will be free of any bugs. I suggest also that you partition it into at least two partitions, one for operating system and one for data. That is more secure, a trojan is seldom capable of finding a second partition to attack data there. Qtparted can do the partition too.
Your second post:
knoppix@ttyp1[knoppix]$ /dev/fd0
bash: /dev/fd0: Permission denied
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]# su
root@ttyp1[knoppix]# passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]# su
root@ttyp1[knoppix]# passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
root@ttyp1[knoppix]# /dev/fd0
bash: /dev/fd0: Permission denied
root@ttyp1[knoppix]#
Here again you must enter 'mount /dev/fd0' not just '/dev/fd0' and you will get an error message if there is no disk in the floppy drive.
knoppix@ttyp1[knoppix]$ code
bash: code: command not found
knoppix@ttyp1[knoppix]$ sudo password knoppix
sudo: password: command not found
knoppix@ttyp1[knoppix]$ sudo password
sudo: password: command not found
knoppix@ttyp1[knoppix]$ su
root@ttyp1[knoppix]# sudo password
sudo: password: command not found
root@ttyp1[knoppix]# sudo password knoppix
sudo: password: command not found
root@ttyp1[knoppix]#
The command is 'passwd' not 'password'.
with a floppy disk in the drive
knoppix@ttyp2[knoppix]$ su
root@ttyp2[knoppix]# ls /mnt/auto/floppy
ls: /mnt/auto/floppy: No such file or directory
root@ttyp2[knoppix]#
There may be something error here, that should work with a disk in the drive.
knoppix@ttyp3[knoppix]$ ls /ect
ls: /ect: No such file or directory
......
knoppix@ttyp0[knoppix]$ cat /ect/fstab
cat: /ect/fstab: No such file or directory
knoppix@ttyp0[knoppix]$ su
root@ttyp0[knoppix]# cat /ect/fstab
cat: /ect/fstab: No such file or directory
root@ttyp0[knoppix]#
The directory is '/etc' not 'ect'.
with a router and cable modem connected but coax cable to ISP removed I got this output.
knoppix@ttyp0[knoppix]$ ping -c 5 216.239.57.99
PING 216.239.57.99 (216.239.57.99): 56 data bytes
--- 216.239.57.99 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
knoppix@ttyp0[knoppix]$
This is as expected. You cannot ping google if you are not on line.
-
more about root
to the list;
I did get some output from
knoppix@ttyp1[knoppix]$ cat /etc/fstab
proc /proc proc defaults 0 0
pts /dev/pts devpts mode=0622 0 0
/dev/fd0 /mnt/auto/floppy auto user,noauto,exec,umask=000 0 0
/dev/cdrom /mnt/auto/cdrom auto user,noauto,exec,ro 0 0
# Added by KNOPPIX
noauto,users,exec 0 0
knoppix@ttyp1[knoppix]$
I again tried the following command with a floppy in the drive.
knoppix@ttyp0[knoppix]$ mount /dev/fd0
/dev/fd0: Input/output error
mount: mount point /mnt/auto/floppy does not exist
knoppix@ttyp0[knoppix]$
Found this on the CD under security.
SECURITY CONSIDERATIONS FOR KNOPPIX
====================================
1.) There is no automatic start of external accessible services.
2.) There are no default passwords. All accounts are locked by default.
Even local logins are not possible (unless you set a password or create
new user accounts as root).
3.) Therefore, all local interactive processes are started by init without
authorization.
Version 1.x up to and including 2.1-21-08-2001: Because there is no
valid password for "su", but still the possibility should exist to use
the system as "rescue cd", all programs (including KDE) are running
under root id.
Changed from version 2.1-24-08-2001 and up: The graphical desktop
is started with the unprivileged user id "knoppix". Programs that
only work for root are started using sudo without password. This has
the advantage of making faults caused by defective software very
unlikely, but does not enhance local security, since it is fairly
easy to switch between the "knoppix" and "root" account. The knoppix
user should never be allowed for external logins (in the case that
sshd or similar servers are being launched).
I guess there are some security issues about root? If there is no problem then why can't files/directories be found?
The various places I looked told me that root was locked or inactive so any user is root. Then how can remote sessions be stopped? How can ports and services be shut dosn? When
I attempt to execute programs they don't execute. When I attempt to use my router firewall it doesn't apply. So...
let me know
thanks again
finder
-
again I am stressing that there is no ability to mnt/floopy
To the list;
This is exactly what the original post brought up.Got ony ideas?
With a floppy in the floppy drive this was the output.
knoppix@ttyp0[knoppix]$ mnt /dev/fd0
bash: mnt: command not found
knoppix@ttyp0[knoppix]$ mount /dev/fd0
/dev/fd0: Input/output error
mount: mount point /mnt/auto/floppy does not exist
knoppix@ttyp0[knoppix]$ su
root@ttyp0[knoppix]# mnt /dev/floppy
bash: mnt: command not found
root@ttyp0[knoppix]# mount /dev/floppy
mount: can't find /dev/floppy in /etc/fstab or /etc/mtab
root@ttyp0[knoppix]# mount /dev/fd0
/dev/fd0: Input/output error
mount: mount point /mnt/auto/floppy does not exist
root@ttyp0[knoppix]# mount /dev/auto/floppy
mount: can't find /dev/auto/floppy in /etc/fstab or /etc/mtab
root@ttyp0[knoppix]# mnt /dev/auto/fd0
bash: mnt: command not found
root@ttyp0[knoppix]#
thanks again
finder
Similar Threads
-
By N1N in forum General Support
Replies: 1
Last Post: 11-02-2004, 06:56 PM
-
By Saenger in forum General Support
Replies: 0
Last Post: 05-18-2004, 04:58 PM
-
By evilmrhenry in forum Hdd Install / Debian / Apt
Replies: 2
Last Post: 12-07-2003, 05:51 PM
-
By UselessPython in forum General Support
Replies: 0
Last Post: 11-05-2003, 02:31 PM
-
By in forum General Support
Replies: 0
Last Post: 01-17-2003, 03:07 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Casio PB-700 Personal Computer Vintage *Parts Or Repair*
$45.00
Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW
$8.99
RARE NEW RETAIL BOX VINTAGE AST BTC 5140M WINDOWS PS2 KEYBOARD FCC E5XK8M104M10U
$29.95
Radio Shack Vintage Pc Circuit Boards
$40.00
Lot Of 5 Vintage IDE Hard Drives, Conner Seagate, Quantum, Maxtor *Non Working*
$27.99
Vintage Daryl F Gates Police Quest: SWAT PC computer game 1995 Sierra 4 disc
$3.33
Vintage Microsoft Wheel Mouse Optical Mouse Black (Factory Sealed Retail Box)
$49.99
Vintage Lot of 10 pcs Blue Intel inside Pentium stickers approx 2 X 2 cm
$8.00
Vintage Intel Universal Prom Programmer UPP-101
$1999.00
Vintage Evolis Dualys USB Serial ID Printer AS IS
$280.00