How to Shut Down or Crash
a Novell File Server
==============================================

Thinking about Paul Simon's classic song, "There must be Fifty Ways to Leave Your Lover", I figured that, regardless of the incredible security that exists on this most famous of secure programming examples, I concluded "There must be 50 ways to down a Novell File Server". Some of these might actually work, but the whole list should be taken in fun.
==============================================

  1. Write a program that completely fills the bindary with objects.
  2. Use the "8 back" rule to construct directories on top of each other so that you will have to traverse the entire tree in order to delete just one file.
  3. Use the method described in the standard Novell "HELP" system to craash the server (Hint: Look up the word "crash".)
  4. Force infinite non-existing connections.
  5. Alter date on workstation back to 1980 and start creating a few files (This actually works on Novell 3.11 and earlier!)
  6. Cause BTrieve lock/loop for file server infinite loop.
  7. Initiate Borland Backdoor, down file server from FCONSOLE.
  8. Manually trigger COPY PROTECTION from node inside network.
  9. Alter .BAT files to remap users to bad drive (network will have to be shut down in order to initiate repairs.
  10. Place LOGIN.BAT file in F:\LOGIN to make nifty effects, hack accounts.
  11. Crash router or MMAC units
  12. Reconfigure PC CMOS setup to be incompatible with the Network.
  13. Cause excessive collisions between two IPX workstations (untracable, no logins needed)
  14. Use Ethernet ICMP 'Denial' bug on all Internet domains, breaking all standard socket connections.
  15. Disable File Server sockets using ICMP bug.
  16. CPU Bound file server with constant encryption requests.
  17. Selective sabotage -- remove 1 pin from a multi-pin cable.
  18. Ask phone company to discontinue WAN support from any campus phone.
  19. Interject failed IPX return packets/SPX packets -- stall network.
  20. Tie up network with variable-length packet -- presumably one so large it won't finish anytime before a collision takes place.
  21. Send excessively huge print job to take up drive space on the network.
  22. Interject garbage directly into printer object, no account needed.
  23. TSR Hook -- Grab keyboard interrupt and record keystrokes, grab passwords, and sabotage.
  24. Inject Virus into RWCEF directories and files, Borland Backdoor.
  25. Press "reset" on file server (or power switch) and change CMOS password... And run like HELL! (not a good idea)
  26. Force power outages -- lightning rod to physical plant or sabotage by physical plant (presumably before or during tape backups, when bindary is set locked.)
  27. Bribe or eliminate network manager.
  28. Covertly break into computer room, steal computer and leave.
  29. Gain supervisor, and create two groups, recursively members of each other, fill RAM on server.
  30. Activate file lock on EVERYONE group.
  31. Call SPA to report on piracy ring on computer network (file server will be confiscated.)
  32. Call Secret Service, report fraud ring on computer system (file server will be confiscated.)
  33. Call FBI, report kiddie porn ring on computer system (file server will once again be confiscated.)
  34. Point out pornography can be obtained off of network to local religious quacks and newspaper, and that tax-dollars are spent to distribute this "filth". It will be shut down due to public outcry.
  35. Encourage users to abuse computer resources. (Taken away.)
  36. Send obnoxious messages and print-outs to easily upset administrators and directors.
  37. Hack an account, E-Mail pirated software to DOCKMASTER.NCSC.MIL, the National Security Agency's showcase for computer security.
  38. Hack an account, crash a military computer system with IMCP bug (military probe activity)
  39. Make above information readily available to new computer science majors.
  40. Fake-mail the ACLU slanderous, anti-ACLU letters, forward to public listservs, promote the possibility of liable lawsuit from a squadron of lawyers.
  41. Fake-mail someone important a nasty note from someone else on the network not quite as important.
  42. Stick toothpick to jam file server's cooling fan.
  43. Alter thermostat to up room temperture to maximum.
  44. Stick a floppy disk in file server -- if its rebooted, it can alter/ format the hard-drive(s).
  45. Initiate 250 SPX connections from computer workstation.
  46. Create an 80 meg BTrieve database, make some file server searches, resulting I/O / CPU bound problems will cause a workload failure.
  47. Force constant bindary wildcard searches, burdoning the machine and causing workload failure.
  48. Open over 255 sockets requesting a disk task from the file server (limit exception error.)
  49. Latch car battery cables to Ethernet cable, crashing all machines connected to the battery.
  50. Cause incoming network data overload from WAN machines.
  51. Set off sprinkler system.
  52. Switch input voltage selector on server to 220 volts.
  53. Don't give the right name for the printer server when at the console.
  54. Attach strong magnet to back panel of the file server.
  55. Fake-Mail "Mafia" threats from the system administrator of the network to administrators at other campuses for no reason except "we will break your network if you don't send us money."
  56. Sever some cables, pull a few plugs.
  57. Drill hole in roof over file server, wait for rainstorm.
  58. Spill soda pop on it.
  59. Shut off main circuit breaker.
  60. Piss on server (might have problem, however. Sort of like pissing on an electric fence.)
  61. Eject CD-ROM while file server is running.
  62. Remove the terminator from the last PC in the network.
  63. Place file server on David Koresh's Compound Apokolypse.
  64. Report the existence of the file server to the IRS.
  65. Lift up file server exactly one and a half feet above the floor or table, and drop it on it's rear/left corner.

==============================================

Disclaimer: All these ideas might cause seriuous trouble, so never try them. The ideas to this were collected during a class in Netware Programming from a friend of mine who, I guess, wouldn't like it if I would tell you his name.
==============================================