Friday 27 December 2013

Create your own Anti-Virus in Notepad++

Create your own Anti-Virus in Notepad++

For other you should pull out the big guns
Type the following code into Notepad:

@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of the viruses based on size
for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA “%% a”
echo deleting the hidden virus
echo for drive c and subfolders
for / R C: \%% a in (*. doc.exe) do del “%% a”
echo for drive d and subfolders
for / R D: \%% a in (*. doc.exe) do del “%% a”
echo Unhide Document
cd / d c: \
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d: \
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit

Save the file with bat extension,
For example antivirus.bat. then go to command prompt and run the Notepad file

4 Ways to Get Fast Boot Up Times


Step 1: Hard Disk Check-Up

Over time, your hard drives get degraded both physically and digitally. It’s important to monitor your drives health. An error or damaged sector can throw software loading into an infinite loop causing long load times. To check your drive health:
1. Click Start
2. Choose Computer
3. Right Click your Hard Drive
4. Choose Properties
5. Click Check Drives Health. After, the checkup gives you repair options or a clean bill of health.
6. Restart to get a faster boot up.

Step 2: Eliminate Startup Delay

To get faster boot up speeds, you can cut the boot delay to 0. The delay is in place to allow your startup processes some breathing room during loading. Your default delay is 30 seconds. So, you can eliminate it for faster boot up times.
1. Open your Start menu.
2. Click Run
3. In the command screen, type msconfig
4. In the system configuration utility, click either BOOT tab.
5. In the boot menu, change the default setting for the Time Out from 30 to 5 seconds.

Step 3: Organize your Hard Drive

If you are looking for something in a messy room, naturally, it’s going to take you longer to find something. This is a good metaphor for a hard drive. Over time, filing system gets disorganized. Periodically, you need to reorganize this filing system on your hard drive. Luckily, Windows has a good utility called Defrag that will put your system in order.
1.Open the Start Menu
2. Click on My Computer
3. Right Click your C: drive or your hard drive image.
4. Scroll down to the Click Properties
5. In the Properties Menus, Open the “Tools” menu.
6. Choose Defragment.
7. In the Disk Defragmenter menu. Click on Defragment

Step 4: Remove Excess Startup Programs

Most programs you add to your computer will opt to load when you start up your computer. Eventually, you will rack up a load of programs that kill faster boot times. You need to reduce the startup programs. You can easily disable unnecessary startup programs. Here is how:
1. Open your Start menu.
2. Click Run
3. Type msconfig, click Enter
4. In the system configuration utility, click either services or startup tab.
5. Uncheck all programs that you are no longer want to run in the background.
6. Click OK
Enjoy!!!

Thursday 26 December 2013

Protect Any Folder with Password Without Any Software

How To Lock Folder ?

1. Open Notepad and Copy code given below into it.

cls
@ECHO OFF
title pc-artist.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== pcartist goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


2. Save the notepad file as lock.bat (.bat is the must)
3. Now double click on lock.bat and a new folder will be created with name MyFolder
4. Copy all your data you want to protect in that New folder
5. Now double click on lock.bat and when command prompt appears Type Y and press enter.
6. Now MyFolder will be hidden from your view, to access that folder double click on lock.bat
7. It will ask for password enter your password and done. (Default password is pcartist)

To change the password replace pcartist with the new password in the above code

How To Further Secure?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

Monday 28 October 2013

How to create a Powerfull Keylogger

Rapzo Keylogger is one of the best keylogger to steal the data of your victim.

Note: You need to disable your Antivirus for the softwares to work.

Tools Required:
Rapzo Keylogger Download 
Simple Binder Download
  • First you need to Download the Rapzo Keylogger and Simple Binder.
  • Extract both the softwares, now go to Rapzo keylogger folder and create a keylogger using rapzo logger.exe
  • First Enable the Application and fill all the details like your email, pass..etc and test it(see screenshot)
  • Now go to Options on the top and check/tick Encrypt info, screen logger, stealers.
  • Now just click on Build Button thats it, your powerful keylogger is created.


How to make your keylogger file unsuspicious

  • Now Just Bind Your Keylogger File with the Image so that victim may not get any doubt.
  • Open Simple binder software and select your keylogger file and any Image file, save it with some name and click on bind button (see screenshot)
  • Done..when victim clicks on your binded keylogger an image will be displayed and keylogger gets installed.


Now if you scan your Binded keylogger file virus will be detected so you have to make your keylogger Undetectable by Antivirus.

How to Make Keylogger/Trojan Undetectable


Friday 25 October 2013

How To Get Someone’s Ip Address Through Facebook



Today, I am going to post the trick for getting someone’s Ip through Facebook.

Step 1 – First invite or ping that person for a chat on facebook.
Step 2 – Make sure your all other tabs in the browser and other services in the computer are closed. If Possible for you then delete all the cookies-cache and browsing history from your browser.
Step 3 – While chatting on Facebook go to Start >- Run >- cmd .
Step 4 – After Opening command Prompt Type netstat -an command and hit Enter.
Step 5 – Now you will get Ip Address of all the established connections there .
Step 6 – Note all the suspicious Ip’s and trace user using ip address tracer sites like whatismyip or ipmango.com .

That's It !
You can use the same trick for tracing IP of someones on Skype, gtalk and Yahoo Messenger.

DDOS Attack



DDOS attack is an attempt to make a computer resource unavailable to its intended users.

One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and the site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)

Basic Procedure/Logic employed in DDOS :
1.) Open Command Prompt in windows by going to Start -> All Programs -> Accessories -> Command Prompt.

2.) Type "ping site-ip -l 5120 -n 100000 -w 1".
Here "site-ip" is the IP Address of Target, You can also use site-name like "www.google.com" instead of site-ip."5120" is the size of packet sent to the target

Which is 5 KB in example. "100000" is the no of requests sent to the Target. "- w 1" is the waiting time after each request which is 1 sec in the example. You

can change these parameters according to your need, but Don't omit these.
This Attack is also called "Ping of Death" But In Actual a Single Computer using this Attack cannot Deface a Site for a long time. Hackers Create and install

botnets on different computers as trojans and use those Comprised Computers also to send these Dummy Packets to Target. When a Large no of

Compromised Computer send simultaneous Requests to the target, the target site will be offline and Defaced...

Sunday 18 August 2013

Top Ten Tips To Improve System Speed

                 
                               


1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.

5. Empty the recycle bin regularly.The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8. Always make two partitions in your hard drive. Install all large Software's (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9. When installing new Software's disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.



Enjoy Learning With Us