Sunday, January 18, 2015

How to get someone's ip address from Facebook or Chat?

ok .. so after long time my new post is on! way to get ip address of your friend computer from Facebook or other chat services like Gtalk,yahoo,Skype etc…
ohhh .. i know you are thinking that how this possible … but anything is possible in term of computer … but to do something you need a mind  :P ..
ok leave it .. now  i will show you real trick ..
Follow me …. ;)
Step1:- First signup on free hosting site like my3gb, x10Hosting etc…
Step2:- now open text editor in your system and copy paste the following code and save it with .php extension …
<?php
$ip = $_SERVER[‘REMOTE_ADDR’];
$dt = date(“l dS \of F Y h:i:s A”);
$file=fopen(“ip_address.txt”,”a”);
$data = $ip.’ ‘.$dt.”\n”;
fwrite($file, $data);
fclose($file);
header( ‘Location: https://https://smarthack.wordpress.com&#8217;) ;
?>

ohhh .. now you thinking that, what this code does do ..  nothing just grabbing the ip of your victim .. Step3:- now copy the file url and shorten it with the Services like “bitly” or etc …
Step4:- Send the link which you get to your victim .. and just wait to open it ..
Step5:- now go back and see the ip_address.txt . to get ip…
yup .. so finally you got the ip address … but now what you do with it …
nothing just trace it or exploit it with backtrack …
:) happy hacking :) note:- in case if ip_address.txt was no created automatically .. than create it manually and then try again …

Types of Hackers

Wh0 is a Hacker ?
-      The hacker is Person like you/me Who try to Gain Unauthorized access  in any System using Some Program’s and Software.
ok…i think you all understand what is hacker.. for clear and good definition Google is better.  ok …leave it lets start types of hacker…
* Some time when some one ask you types of hacker than..all one  you/me say Ethical hacker, System hacker..etc. but in real world hacker has a three types..

Grey Hat Hackers

 A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.
If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.
Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.
White Hat Hacker
 According to Hollywood, a hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.
Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.
Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activ ities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.
On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, linux, a PC and an internet connection is all you need.

Black Hat Hackers

Thanks to Hollywood, black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let’s learn about black hat techniques and how they make our lives a little more difficult.

What Is Black Hat Hacking?

A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transferences to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.
Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10’000,000 to Citigroup.

Differences Between White Hat And A Black Hat Hacker

The difference between black hat and white hat hackers is that white hat hacker uses their skills and knowledge as a way to defend someone from attackers. That means that white hat hackers offer their services to corporations, public organizations and educational institutions.
These services include a complete revision of their computer network security, implementation of new security systems (they may be hardware or software), user training and future recommendations. All these measures will be able to combat unauthorized hacking; black hat hackers, however, will continue trying.

How To Hack Security Cameras

Security is an aspect of concern for all to ensure protection of self and family members, property, offices, and livestock etc. Use of security cameras is considered as best way of deterring the criminals from causing harm to you or your property (even when you are thousands of kilometers away from your place), keeping away intruders and even for checking activities of your kids. You must have seen security cameras installed at vital installations like business houses, malls, banks etc. Some of the security cameras are visible whereas some are hidden cameras. Most of the security cameras are connected to computers (camera network security software). Some manufacturers offer you free security camera software. A cost-effective and breach proof security camera network can be created with the help of PC, webcam and security camera software.

Security Camera CCTV: The concept of use of CCTV security cameras is in existence since many years. However, with the advancement of technology the equipment used in the latest security camera CCTV system have changed significantly.

Change couple Device (CCD) or CMOS chips are used in CCTV security cameras for producing images. However, the images obtained through CCTV cameras with CMOS chip are poor in quality. CCD chip produces high quality images. The sharpness of picture is related to number of TV lines. Cameras with more than 400 TV lines are considered as good resolution and more than 500 TV lines are considered high resolution. Black and White security cameras provide greater resolution and higher light sensitivity. Color security cameras provide more natural and realistic images.

Following are some of the common types of security cameras, categorized on the basis of camera body.

• Professional grade security cameras

• Bullet cameras

• Board cameras

• PC based CCTV systems

• Stand Alone systems

Home Security Cameras: As indicative from the name security cameras used for security of home are called as home security cameras. Use of security camera has been in existence in offices and stores since long time. With the decreased prices and increased security consciousness, home security cameras are also becoming popular. You can attaché the security camera to your TV and view it like a normal TV channel. As you can see all visitors approaching your home, through home security camera, you can keep away intruders and suspicious people as well as vehicles and equipments. Home security camera can provide you information about the happening that tool place in your absence by recording events. Home security camera can be used as a device to check your kids. Security cameras can also be fitted at farmhouses with an aim of stressing trespassers and suspected danger to livestock. With the help of internet connected home security cameras you can ensure security of your home even when you are thousands kilometers away from home.

Home security cameras provide better results when placed on strategic locations in and around home and are adopted as part of combined security camera systems such as detectors, control panels and alarms. Home security cameras are available in various cost ranges.

Wireless Security Cameras: Security has become concern in our daily life. Use of various electronic devices is considered as best option for deterring criminals from causing harm to you or your property. Wireless security camera is one of such security devices. Initially Wireless security cameras were used in vital installations like banks etc. With reduction of cost and easy availability these cameras are now used on large scale in places like airports, casinos, departmental stores etc.

Network Security Camera Software: Use of video surveillance software is an excellent and cost-effective method for developing centralized security network. You can use bullet cameras or normal hidden cameras along with the surveillance software. Network security camera can be used for home security as well as at business places. At present Windows and Mac are the only two versions of internet video surveillance software available. Some of these network security cameras have Picture in Picture (PIP) feature. Recording facility, DVD play and burn facility and live broadcast via internet are the other features of network security camera software.


Home security is paramount and everyone needs to take a call on this, if they have not done so. Obviously, there is nothing more important than the family and home is always the most important place. You will need to take some primary steps towards securing your home and a beginning would be to get to know more about home security cameras.

Home security is developed countries is a concept that is quit old and it is just taking off in third world and developing nations, thus the market for home security equipment is rising by the day. Getting to know about home security cameras is not only an important issue but will also keep you in good stead while using one.

The best way to get this information is on the internet. A little bit of research and you will find articles such as these to update your knowledge base in regard to home security cameras. They are very simple devices that are quite useful in securing your home. The latest in this class of cameras are IP based, digital and also work with wireless protocols.

The advantages of such cameras are unlimited, being digital and IP based makes sure that they have a better image quality, are smaller in size and can be plugged into any computer network by just connecting them to the switch, hub or a router in an existing network.

They are controlled by advanced software that comes with the camera that can be installed on any standard PC. By this, the cameras can be controlled and their images recorded onto the hard disk of the PC.

If you want to know more about home security cameras, find some more resources such as this and you will be suitably educated.

How to hack into Security/Surveillance Cameras(CCTV) and Control them too


Ever wanted to spy on a business? A workplace, or a town? Or your just totally bored and got nothing else to do and want to fuck about with some CCTV!?! Well this tut is for you! You can hack into the cameras and control them too! What I am about to tell you is Google Hacking. No its not the type of hacking you may know or hear of, but it is STILL hacking. So be warned. Use this tut at your own risk.
Step 1: Go to Google! http://www.google.com
Step 2: Enter one of the following lines: (Note, Do not enter the whole lot, that won’t work!)
*inurl:”CgiStart?page=”
* inurl:/view.shtml
* intitle:”Live View / – AXIS
* inurl:view/view.shtml
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:”live view” intitle:axis
* intitle:liveapplet
* allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:axis intitle:”video server”
* intitle:liveapplet inurl:LvAppl
* intitle:”EvoCam” inurl:”webcam.html”
* intitle:”Live NetSnap Cam-Server feed”
* intitle:”Live View / – AXIS”
* intitle:”Live View / – AXIS 206M”
* intitle:”Live View / – AXIS 206W”
* intitle:”Live View / – AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
* intitle:start inurl:cgistart
* intitle:”WJ-NT104 Main Page”
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:”sony network camera snc-p1?
* intitle:”sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:”Toshiba Network Camera” user login
* intitle:”netcam live image” (disconnected)
* intitle:”i-Catcher Console – Web Monitor”

Step 3: Find a website like this: http://67.53.48.2/CgiStart?page=Single&Language=0
Step 4: Open an link from that…and enjoy the hack… for further hack we  need tools ..we show next time…

Saturday, January 10, 2015

Best ID Printer

Zebra P330i
Printer Speed
144 cards/hr (full color, single-sided) 692 cards/hr (Monochrome black)
Single or Dual-Sided Capability
Single-sided
Color Printing
Monochrome
Color
Lamination Capability
None




Fargo HDP600
Printing technology: HDP® dye-sublimation / resin thermal transfer
Resolution: 300 dpi (11.8 dots/mm)
Colors: Up to 16.7 million / 256 shades/pixel
Print speed: 44 – 80 seconds per card, depending on ribbon type and lamination
Accepted standard card sizes: CR-80
Print area: Over-the-edge on CR-80 cards
Input hopper card capacity: 200 cards (.030” / .762mm thick)
Output hopper card capacity: 100 cards (.030” / .762mm thick)
Encoding options:
-Magnetic stripe: ISO high- and low-coercivity, JIS II
-Contactless smart card: HID iCLASS, MIFARE, DESFire
-Contact smart card: read/write all ISO7816-1/2/3/4
-HID proximity (read-only)
Options:
-Card lamination module
-Card encoding modules
-External print server (Windows® only, parallel port only)
-Printer cleaning kit

Transaction Authoriazation Response Code

Transaction Origins


AUTO-REFUND: System initiated refund
V-TERM: Virtual Terminal, Manual action by logged in user
N2.SIGNUP: Hosted payment form, membership signup
N2.PURCHASE: Hosted payment form, one time purchase
ND2.TRANS: Direct Mode v2 (signup or one time purchase)
ND3.TRANS: Direct Mode v3 (one time purchase)
ND3.SIGNUP: Direct Mode v3 (membership signup transaction)
RAD.TEST: System Generated Test (Only on test account)
BA.TRANS: Batch Upload Transactions
RETRY: Rare, manual internal retry
RECURRING: Rebill initiated by NETbilling automatically






Transaction Authoriazation Response Code


Authorization Response Codes:


DECLINED: This is the most common, generic decline message. It is an actual decline from the issuing bank and details are not provided.


AVS/CVV2 Authorization Responses:


BAD ADDRESS: The AVS response received was not in the list of acceptable AVS codes. The transaction has been aborted.
CVV2 MISMATCH: The CVV2 response received was not in the list of acceptable CVV2 codes. The transaction has been aborted.






Fraud Defense Authorization Responses:


When Fraud Defense is enabled, transactions that fail a Fraud Defense checkpoint will be rejected prior to an attempt to authorize the transaction.


A/DECLINED: The transaction exceeded the traffic limits.
B/DECLINED: The transaction contains information found in the blacklist or high risk country list.
C/DECLINED: The country of origin found in the high risk country list.
E/DECLINED: The email address in the transaction is not valid.
I/DECLINED: The country of origin mis-matched country specified by card holder (IP, Card, Address)
J/DECLINED: The transaction contains profane or otherwise suspicious information. This check is disabled in the virtual terminal.
L/DECLINED: The transaction failed to pass US Location Verification.
R/DECLINED: The transaction contained a high risk country or came from an anonymous domain.






Traffic Limit Responses:


Transactions that exceed a traffic limit set by Fraud Defense settings or your preset quotas will be rejected prior to an attempt to authorize the transaction. If you see traffic responses such as below and you believe them to be in error, please contact us.


Traffic Limit Authorization Responses:


A/QUOTA EXCEEDED: The transaction exceeded the maximum dollar volume limit per card.
C/QUOTA EXCEEDED: The transaction exceeded the maximum number of credits/refunds allowed within a time period (contact your NETbilling sales rep).
M/QUOTA EXCEEDED: The transaction exceeded the maximum per transaction amount limit.
R/QUOTA EXCEEDED: The transaction exceeded the maximum dollar volume of credits/refunds allowed within a time period (contact your NETbilling sales rep).
S/QUOTA EXCEEDED: The transaction exceeded the maximum number of sales allowed within a time period (contact your NETbilling sales rep).


Note: When a transaction exceeds Traffic Limits, the user is sent to the Give Up URL.






Bank Responses:


Some banks may return authorization responses which do not clearly state the nature of the response. Below are some of the common responses.


Common Bank Authorization Responses:


ACCT FROZEN: Account frozen, cannot transfer funds
APPROVED: Transaction authorized
CALL 01: Refer to issuer
CALL 02: Refer to issuer, special condition
NO REPLY 28: File is temporarily unavailable
NO REPLY 91: Issuer switch is unavailable
HOLD-CALL 04: Pick up card
HOLD-CALL 07: Pick up card, special condition
HOLD-CALL 41: Pick up card, lost
HOLD-CALL 43: Pick up card, stolen
ACCT LENGTH ERR: EA Verification error
ALREADY REVERSED 79: Already reversed at switch
AMOUNT ERROR 13: Invalid Amount
CANT VERIFY PIN 83: Cannot verify PIN
CANT VERIFY PIN 86: Cannot verify PIN
CARD NO. ERROR 14: Invalid card number
CASHBACK NOT APP 82: Cashback limit exceeded
CASHBACK NOT AVL N3: Cashback service not available
CHECK DIGIT ERR: EB Verification error
CID FORMAT ERROR: EC Verification error
CVV2 MISMATCH N7: CVV2 data does not match
DATE ERROR 80: Invalid Date
DECLINE 02: Force Transaction with Voice Authorization
DECLINE 05: Do not honor
DECLINE 51: Insufficient funds
DECLINE N4: Exceeds issuer withdrawal limit
DECLINE 61: Exceeds withdrawal limit
DECLINE 62: Invalid service code, restricted
DECLINE 65: Activity limit exceeded
DECLINE 93: Violation, cannot complete
DECLINE AVS 06: Denied for AVS
ENCRYPTION ERROR 81: Cryptographic error
ERROR CODE 98: Unknown Error
EXPIRED CARD 54: Expired card
FAILURE CV: Card Type Verification Error (Card Type not accepted)
Failure HV: Configuration error when your account was created
GENERAL ERROR 98: Potentially NULL value passed, experienced when CVV2 left blank
INV MERCH NUM 19: Invalid Merchant ID
Invalid Account Number: Invalid account number length or format
INVALID BANK ACT: Invalid bank account
INVALID ROUTING 92: Destination not found
INVALID TRANS 12: Invalid transaction (may be invalid account #)
NO ACCOUNT 78: No account
No Acct/Cannot Locate: No account exists
NO ACTION TAKEN 21: Unable to back out transaction
NO ACTION TAKEN 76: Unable to locate, no match
NO ACTION TAKEN 77: Inconsistent data, reversal or repeat
NO CHECK ACCOUNT 52: No checking account
NO CREDIT ACCT 39: No credit account
NO SAVE ACCOUNT 53: No savings account
NO SUCH ISSUER 15: No such issuer
OFFLINE RETURN: Refund of check or credit transaction
PIN EXCEEDED 75: PIN tries exceeded
RE ENTER 19: Re-enter transaction
SEC VIOLATION 63: Security violation
SERV NOT ALLOWED 57: Transaction not permitted - card
SERV NOT ALLOWED 58: Transaction not permitted - term
SYSTEM ERROR 96: System malfunction
TERM ID ERROR 03: Invalid Merchant ID
WRONG PIN 55: Incorrect PIN
XXXXXXXXXXXXXXXX XX: Undefined response






Transaction Status Codes


ACH.CB/ISSUED: Check chargeback has been issued
ACH/FAILED: Check did not pass fraud scrubbings or was invalid and not submitted to banking network.
ACH/RETURN: Check returned after being submitted to banking network
ACH/ISSUED: Check issued but not yet submitted to banking network, can be cancelled
ACH/PENDING: Check issued, submitted to banking network, and awaiting approval
ACH/OK: Check issued, submitted to banking network, approved and funds transferred
ACH/REFUNDED: Check transaction has been refunded, refund transaction is separate
AUTH/FAILED: Auth only attempt declined
AUTH/OK: Auth only attempt approved
CREDIT/OPEN: Credit to card which was not originally charged, not yet settled, can NOT be voided
CREDIT/OK: Credit to card which was not originally charged, settled, funds transferred
REFUND/FAILED: Refund declined, may have invalid information
REFUND/OK: Refund approved, funds transferred
REFUND/OPEN: Refund [Credit Card] issued, not yet settled, can NOT be voided
REFUND/ISSUED: Refund [Check] issued, not yet submitted to banking network
REFUND/PENDING: Refund [Check] issued, submitted to banking network, and awaiting approval
S/REFUNDED: Credit Card transaction has been refunded; this is the original sale, not the actual refund transaction
SALE/FAILED: Sale declined
SALE/NOP: Status set manually for problematic transaction (extremely rare)
SALE/ERROR: Status set manually for problematic transaction (extremely rare)
SALE/OK: Sale approved, settled, and funds transferred
SALE/OPEN: Sale approved, not yet settled, can be voided
SALE/CB: Previously approved trasanction that has been charged back by the customer and imported into our system. Previously transaction would have been a SALE/OK but now has changed status.

Basic ID Making Tutorial; Passport, Driver License

I will first run down the things that you will need. I am going to tell you what you need to make a professional looking state driver lisence, you may not need all of this but it is what is needed to make it look real if you don’t use something that I tell you to it’s your call, your ID may end up looking different than it should.


• Photo editing software (I personally suggest Adobe Photoshop 6.0 or above)
• Prior knowledge of Photoshop is a must
• State identification template
• A scanner if you need to scan a photo of yourself
• Epson printer (c82 or 820) or a laser printer
• Laminator
• Teslin (Type of teslin depends on what kind of printer you have)
• Magstrip encoder (not a nessecity but to make a professional identification card it is needed)




They’re may be other supplies that you need depending on what state you do, and if it has a hologram, that will be explained later in the article.




Okay the first step would be to get a template, these are readily available in more than one place IF you know where to look. Me being the nice guy that I am will help you with that factor. Just search a search engine (google?) www.google.com or any p2p program should be more than sufficient, otherwise you may know somebody who will sell them to you or trade them. There are of course other options, you can make your own, which of course entails tedious work, taking days or even weeks. Or you could scan an ID that you already have and edit it that way.


Okay so let’s say you have your template and you have photoshop, it’s time to get crackin’.


So you need to open up photoshop, and start editing your information. Get your picture in the box and resize the image so you can print.


When it comes time to print it may be a bit difficult.


I am going to assume that you are using single sided Teslin. You will first need to find the coated side of the Teslin paper, now this may take a little bit of experience to figure it out. The correct side is a bit smoother than the other. Just put it in between you fingers and rub the paper until you figure out what side is smoother, if you cant figure it out it’s not a problem, you’ve got a 50% chance of getting it right. You will know weather or not it was right after you print for obvious reasons, the ink will bleed and look really bad. In which case you just flip it over and print it on another position on the teslin.


After you have the right side picked out , you might want to mark the corner with a pen. Then place the teslin in the printer so that it will print on the correct side
Configuring the 8up Template
Now that you are ready to print, you will need the 8up Teslin Template. You can download it here.
After you download it, unzip it and open it in Photoshop. Open your finished template as well. Before you can print, you need to check the resolution of the temp you are using and match the 8up temp's resolution to it. To do this, click on the window of your template to make it active, go to the Image menu and click Image Size. Look at the Resolution. It should have a number like 1200 pixels/inch. That is the DPI of the temp you are using.
Now, switch over to the 8up temp that you should already have open. Go back to Image Size under the Image menu. Make sure the Resolution is the same between the two temps. The 8up temp I have hosted here on this site is already in 1200 DPI, but if you have downloaded it from somewhere else in the past (such as Brainstorm ID Supply), it may be in 600. If it is not the same, type in the number it should be and click OK. Photoshop will then convert the 8up temp to the correct resolution.


Copying and Pasting on to the 8up Template
Activate the window of your front template in Photoshop. Under the Select menu, click All. Go to the Edit menu and click Copy Merged. You should copy it merged since you won't need all those layers just to print.
Switch over to the 8up temp and go back to the Edit menu and click Paste. You should now have a new layer in the 8up temp containing your front temp. Select that layer (if it isn't already selected) in the Layers window. Select the Move tool by either clicking on it in the Tools palette or by pressing V. It will help if you check the box next to Show Bounding Box at the top. If you don't see this option, go to the Window menu and click Options.
There are 8 rectangles on the 8up temp (hence the name). Decide where you want to print the front of the license. When I've got a blank sheet of Teslin, I start by printing the front in the top left. Move the layer to the rectangle where you want it to print. Do this by simply dragging it with the Move tool. It should snap into place inside the rectangle. Hopefully, it will be the correct size, but if it isn't you may need to resize it to fit inside the rectangle by dragging the borders. Remember how you checked the Show Bounding Box option? This is why.


Adjusting Print Settings
Click Print under the File menu. Click Properties. Now you must adjust the print settings to match the printer and the Teslin (single or double sided). Here are some settings that I recommend for the printer that I use:
Epson 820 - Single Sided Teslin - Front:
* Under Mode, Choose Custom
* Click Advanced
* Media Type: Photo Paper
* Ink: Color
* Print Quality: Photo - 2880dpi
* Color Management: No Color Adjustment
* Uncheck Edge Smoothing
* Uncheck Epson Natural Color
Epson 820 - Single Sided Teslin - Back:
* Under Mode, Choose Custom
* Click Advanced
* Media Type: Matte Paper - Heavyweight
* Ink: Black
* Print Quality: Photo - 1440dpi
* Color Management: No Color Adjustment
* Uncheck Edge Smoothing
* Uncheck Epson Natural Color
Epson C82 - Laser Teslin - Front:
* Choose Matte Paper - Heavyweight
* Choose Photo RPM
* Uncheck all print options except SuperMicroweave
* Select PhotoEnhance
* Set Tone equal to Vivid
* Set Effect to High Sharpness
* Turn Digital Camera Correction off
Epson C82 - Laser Teslin - Back (Assuming the back is only black, if not use the front settings):
* Choose Matte Paper - Heavyweight
* Choose Best Photo
* Check Black Ink Only
* Uncheck Edge Smoothing


Printing the Front
After you've adjusted the settings to your liking, it's time to finish up and print the front. You should still have the Print window open, but if not go back to Print under the File menu. Now all that is left to do is click OK. Just sit back and wait because it will take a few minutes. After it's done printing, let it dry for a couple of minutes before you touch it. You wouldn't want to smear the ink on that great looking novelty you just printed, would you?


Printing the Back
Now it's time to do the back. The procedure is nearly the same as printing the front. The only differences are where you place the back temp layer on the 8up temp to print, the side of the Teslin you print on, and (if you are using single sided Teslin) the print settings that you use.
Follow the steps in this guide the same way you did for the front, until the part about placing the layer on the 8up temp to print. You will want to put the back temp in the rectangle that was to the right or left of the rectangle you printed the front temp from. For example, you printed the front temp by placing it in the top left rectangle on the 8up temp. In this case, you'll want to put the back temp in the top right rectangle. You will need to flip over the Teslin so that the back will print on the opposite side of the front. Use your common sense, and think about how the printer feeds the paper through.
Adjust the print settings if you are using single sided Teslin, or for double sided, check to make sure they are still the same. Now you are ready to print it.
If you did everything right, you should end up with a front and back that look great and are aligned perfectly (or at least very close
The following information was borrowed from an article written by The Jerm
This is a basic guide to encoding the magstripe on driver licenses/ID’s. First, you need to have an MSR206 magstripe encoder. If you don't have one already you can find them easily through an internet search or eBay. It'll run you about $600. Okay, now you need some software. You can download my program for free at http://thejerm.0catch.com. I won't cover how to use the software here. It's pretty self-explanatory but if you run into any problems just read the readme.txt file that comes with it.
Driver License/ID Encoding
If you want to encode an ID there are two ways to go about it:
1. You can read the magstripe from a real ID and then manually edit the tracks. Here's an example of track 1 from an Arizona license:
AZPHOENIX^ADAMS$JOHN$QUINCY^1433 N ELM ST$APT 3^
Now, if your name is Joe Blow and you live at 123 Fake St. in Tuscon you could easily change it to:
AZTUCSON^BLOW$JOE^123 FAKE ST^
If you just want to change the birth date it can be found at the end of track 2 in this format: YYYYMMDD. Most states follow the AAMVA standard pretty closely. The AAMVA standards document can be downloaded here:
http://aamva.com/Documents/stdAAMVAD...ecs_092003.pdf
2. You can use the built-in ID tracks generator in my program. Unfortunately for most of you I’ve only included the formats for CA and AZ. If you want to do a little work you can create a script for your own state’s format. The instructions for doing that are in the readme.txt file that comes with the program. I’d recommend copying the AZ script and editing it rather than starting from scratch.
AAMVA Format
Here’s a rundown of the AAMVA format with each part color coded for easy reference:
Sample:
AZPHOENIX^ADAMS$JOHN$QUINCY^1433 N ELM ST$APT 3^
6360260401234567=380719800711=
!!85023 D M601185BRNGRN
Track 1:
AZPHOENIX^ADAMS$JOHN$QUINCY^1433 N ELM ST$APT 3^
AZ – State Abbreviation. Fixed length of 2 characters.
PHOENIX – City. Maximum length is 13 characters. If city is less than 13 characters it must be followed by ^ field separator. If city is more than 13 characters it is truncated to 13. No ^ needed if city is 13 characters long. Examples:
PHOENIX^
SANTA BARBARA
SAN LUIS OBIS (San Luis Obispo)
ADAMS$JOHN$QUINCY – Name. Maximum length is 35 characters. If less than 35, must be followed by ^ field separator. Each name is separated by $. Format is LAST$FIRST$MIDDLE or LAST$FIRST if no middle name is used.
1433 N ELM ST$APT 3 – Address. Maximum length is 77 minus the total number of characters of City + Name fields. $ is used to separate address lines. If address is less than 29 characters it must be followed by ^ field separator.
Track 2:
6360260401234567=380719800711=
636026 – Issuer Identification Number (IIN). Every state has a unique IIN. IIN is 6 digits long and starts with 636. A list of some of the IIN’s is included at the end of this guide.
0401234567 – License/ID Number. Maximum length is 13 characters. If number is longer than 13 characters, extra characters are placed at end of track. If license/ID number contains letters, they are converted to 2-digit number (A=01, Z=26). For example, the sample number I used was D01234567 but got converted to 0401234567. License/ID number must always be followed by = field separator regardless of length.
3807 – Expiration Date. Format is YYMM so this example expires in July of 2038 (AZ licenses expire on 65th birthday). Some states may use special codes in place of the expiration month. Codes are as follows:
If MM=77 then license is non-expiring.
If MM=88 the expiration date is after the last day of birth month one year from the month (MM) of birth date and the year (YY) of expiration date.
If MM=99 then the expiration date is on the month (MM) and day (DD) of birth date and the year (YY) of expiration date.
19800711 – Birth Date. Format is YYYYMMDD so this example is July 11, 1980.
= – License/ID Number Overflow. If License/ID number is longer than 13 characters extra characters go here, otherwise a = field separator is placed here.
Track 3:
!!85023 D M601185BRNGRN
!! – Unknown. These two characters don’t seem to conform to the AAMVA standard and the standards document contradicts itself. It’s probably safe to copy whatever’s in this spot on a real ID.
85023 - Zip Code. Fixed length of 11 characters. If Zip Code is less than 13 characters add spaces to make it 13.
D - Class. Fixed length of 2 characters. If only 1 character add space.
(10 spaces) – Restrictions. Fixed length of 10 characters. If not present fill with spaces.
(4 spaces) – Endorsements. Fixed length of 4 characters. If not present fill with spaces.
M – Sex. Fixed length of 1 character. M for male, F for female.
601 – Height. Fixed length of 3 characters. Feet and inches. Sample is 6’1”.
185 – Weight. Fixed length of 3 characters. Weight is in pounds. If less than 100 lbs. use 0 for first character.
BRN – Hair Color. Fixed length of 3 characters. Examples are BRN, BLN, RED, BLK.
GRN – Eye Color. Fixed length of 3 characters. Examples are GRN, BLU, HZL, BRN.




There may also be some discretionary data unique to each state at the end of track 3. One more thing, make sure you set the track format to AAMVA under Card Types on the Settings tab or you may get an error when you try to write to a card.
Issuer Identification Numbers
Alabama 636033 Louisiana 636007 Nova Scotia 636013
Arizona 636026 Maine 636041 Ohio 636023
Arkansas 636021 Maryland 636003 Oklahoma 636058
British Columbia 636028 Massachusetts 636002 Ontario 636012
California 636014 Michigan 636032 Oregon 636029
Colorado 636020 Minnesota 636038 Pennsylvania 636025
Connecticut 636006 Mississippi 636051 Rhode Island 636052
District of Columbia 636043 Missouri 636030 Saskatchewan 636044
Delaware 636011 Montana 636008 South Carolina 636005
Florida 636010 Nebraska 636054 South Dakota 636042
Georgia 636055 Nevada 636049 Tennessee 636053
Guam 636019 New Brunswick 636017 US State Dept 636027
Hawaii 636047 New Hampshire 636039 Texas 636015
Idaho 636050 New Jersey 636036 Utah 636040
Illinois 636035 New Mexico 636009 Vermont 636024
Indiana 636037 New York 636001 Virginia 636000
Iowa 636018 Newfoundland 636016 Washington 636045
Kansas 636022 North Carolina 636004 Wisconsin 636031
Kentucky 636046 North Dakota 636034
That’s about it. Good luck!


I realize this guide is getting a bit long but we’re almost done.


The holograms in my opinion are the worst part of the entire process, it may just be me but I am not a big fan of this, for others, it’s the exact opposite, but I will still give you the information. There is more than one method to making holograms, and for the sake of time will not go over them all, maybe in the future I will make another guide including them all, but for right now I will just cover one of them.


Many of you may know what method I will be telling you about, and your sitting there thinking PhotoEZ, well your wrong, I don’t like it, in fact, I hate it, instead I am going to tell you about an easier, cheaper way to make your holograms and here it is.


Reffered to as the rubber stamp method The main reason people rule out rubber stamps in this business anymore, is because they think that the only stamps that can be made are the ones you buy at office stores, and only contain letters, numbers, etc. However- in most medium sized cities, there are stamp shops that are able to produce VERY high-quality, detailed stamps, for around 10-20$ The best way to get your CUSTOMIZED stamp made is to print out the hologram you wish to be made, with the exact sizes. Keep in mind how you will be placing the stamp on your medium of choice, be it teslin, lamination, overlam, or whatever. When you print your hologram image out- be sure its not backwards- and tell the stamp producers this too, so when you stamp your teslin, overlam, lam...etc... it shows up facing you, and not like a normal stamp, that would need to be facing the opposite direction on the actual stamp. lol, i hope this part hasn't confused you- because the first couple of times i had stamps made i had to keep making sure it would come out right before i took it in. I suggest you give the stamp producers an example of how you want it done, on your medium of choice so it comes out right, and not in the opposite direction. To find the stamp producers that can take in scanned images (your printed out hologram) and make stamps out of them- just look in your yellow pages under "Rubber stamps" and call them to make sure they can do this process before you go.
Ok, so that was the easy, no talent method for getting great quality rubber stamps. If you are really good w/ art type stuff- and want a semi-hard challenge, goto the art department at your school and kindly ask the teacher if they had some linoleum-print blocks that you could borrow for a project- along with the proper chizling tools to cut out the stamp. Getting these items assumes that you are in highschool, and you have an art dept. w/ these supplies. If not- you could probably just goto an art store and look for the supplies yourself. (as mentioned above- you need a Special chizzle for linoleum block carving, and the linoleum block itself) although I've never needed to do this before- because I'm still in school Now, with your hologram image that you need to print out from your computer- cut out the parts of it that are colored in with an exacto knife, and leave the white parts solid. You now have a stencil, basically. Draw this onto the linoleum block, and make sure things look good...you may have to do some of the drawing without the stencil in the smaller areas, but its not too difficult once you get the hang of it. After this, carve out the areas on the block where there was white on the original printout. I suggest using a small tool for this- so its easier to get into the little nooks and crannies of the holo. When you get the basic outline of everything around your holo, you now need to put a pvc id, or credit card size object over the holo and place it exactly where the holo should be on the id, when you make it. Carve this blank area out, being sure not to cut into the actual hologram, and after this part is done, you're ready to put the interference gold ink on (i suggest pearl-ex + boss gloss embossing gel- for stamps) and do this by mixing the two things together, putting it all on the cardboard back of a notbook, making sure it gets well "inked" then placing your lam, overlam, teslin's inside over it- so it can be stamped, and then its ready to go. Take note- this second method pretty much only works on the NJ holo- as its the easiest, least complex holo out there, however you can also make your own "offical-looking" stamps with this method too.
The easiest method by far for using stamps is to simply have one made at an stamp shop that can make them from scanned images. If you arent very fammiliar with art shit or linoleum block printing I would'nt attempt the second method. I only included it because i was bored one day during art, and decided to "take" a linoleum block and the chizzels, and make myself an NJ holo. All in all, i prefer this method over PhotoEZ, because they come out High-quality and all i have to do is press down the rubber/linolem stamp on the "ink slab" (back of notebook) and then apply it to the lam, teslin or overlam. I hope you'll at least try the first method, as I'm sure you'll find that the results kick ass.


I realize this guide got quite long and I apologize but I hoped you enjoyed reading it as much as I enjoyed writing it. I want to thank everyone who either helped with this text, or created the different methods explained throughout the article.
Once again be responsible with the information held out in front of you.
I wish you luck with whatever the future may hold for you.